New
#1
BSOD while playing game
please help....documents attached....thanks a lot
please help....documents attached....thanks a lot
0x1E_c0000005_nt!KiSwapContext
0x7E_dxgmms1!VidSchiReadCommandFromContextQueue
1. Unistall Avast
2. Install MSE http://www.microsoft.com/security_essentials/
3. Uninstall Daemon Tools DuplexSecure - FAQ
4. Update drivers:
ATI
atikmdag.sys Tue Nov 24 22:44:50 2009
Atheros
athrx.sys Mon Oct 05 12:33:57 2009
Intel Management Engine
HECIx64.sys Thu Sep 17 15:54:16 2009
Intel Matrix Storage
iaStor.sys Tue Oct 13 14:15:56 2009
Intel® Driver Update Utility
HP Buttons
HpqKbFiltr.sys Wed Apr 29 09:48:30 2009
CRASH DUMPS
Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\DMP\122410-18392-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`0325f000 PsLoadedModuleList = 0xfffff800`0349ce50 Debug session time: Fri Dec 24 17:54:31.681 2010 (UTC - 4:00) System Uptime: 1 days 10:46:11.273 Loading Kernel Symbols ............................................................... ................................................................ .................................... Loading User Symbols Loading unloaded module list .................................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000007E, {ffffffffc0000005, fffff8800516a622, fffff8800959b948, fffff8800959b1b0} Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiReadCommandFromContextQueue+62 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8800516a622, The address that the exception occurred at Arg3: fffff8800959b948, Exception Record Address Arg4: fffff8800959b1b0, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: dxgmms1!VidSchiReadCommandFromContextQueue+62 fffff880`0516a622 488b5720 mov rdx,qword ptr [rdi+20h] EXCEPTION_RECORD: fffff8800959b948 -- (.exr 0xfffff8800959b948) ExceptionAddress: fffff8800516a622 (dxgmms1!VidSchiReadCommandFromContextQueue+0x0000000000000062) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff8800959b1b0 -- (.cxr 0xfffff8800959b1b0) rax=00000000ffffffff rbx=fffffa8006cbd9b0 rcx=fffffa8006cbd9b0 rdx=0000000000000001 rsi=fffffa8006794010 rdi=00fffa8006dc0ec0 rip=fffff8800516a622 rsp=fffff8800959bb80 rbp=0000000000000001 r8=000000000000000f r9=0000000000000000 r10=fffff8800516b2b4 r11=fffff8800959bb70 r12=fffffa8006802000 r13=fffff88005196dc0 r14=0000000000000000 r15=0000000000000001 iopl=0 nv up ei pl nz ac po cy cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010217 dxgmms1!VidSchiReadCommandFromContextQueue+0x62: fffff880`0516a622 488b5720 mov rdx,qword ptr [rdi+20h] ds:002b:00fffa80`06dc0ee0=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035070e0 ffffffffffffffff FOLLOWUP_IP: dxgmms1!VidSchiReadCommandFromContextQueue+62 fffff880`0516a622 488b5720 mov rdx,qword ptr [rdi+20h] BUGCHECK_STR: 0x7E LAST_CONTROL_TRANSFER: from fffff8800516a255 to fffff8800516a622 STACK_TEXT: fffff880`0959bb80 fffff880`0516a255 : fffffa80`06794010 fffffa80`06cbd9b0 00000000`00000000 00000000`00000001 : dxgmms1!VidSchiReadCommandFromContextQueue+0x62 fffff880`0959bbf0 fffff880`05196e7a : 00000000`00000000 fffffa80`06cbd9b0 00000000`00000080 fffffa80`06794010 : dxgmms1!VidSchiScheduleCommandToRun+0x169 fffff880`0959bd00 fffff800`03573c06 : 00000000`02613244 fffffa80`067cc060 fffffa80`03b52b30 fffffa80`067cc060 : dxgmms1!VidSchiWorkerThread+0xba fffff880`0959bd40 fffff800`032adc26 : fffff880`009ea180 fffffa80`067cc060 fffff880`009f4fc0 fffff880`0143b534 : nt!PspSystemThreadStartup+0x5a fffff880`0959bd80 00000000`00000000 : fffff880`0959c000 fffff880`09596000 fffff880`0959b690 00000000`00000000 : nt!KxStartSystemThread+0x16 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: dxgmms1!VidSchiReadCommandFromContextQueue+62 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578 STACK_COMMAND: .cxr 0xfffff8800959b1b0 ; kb FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VidSchiReadCommandFromContextQueue+62 BUCKET_ID: X64_0x7E_dxgmms1!VidSchiReadCommandFromContextQueue+62 Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\DMP\122610-16692-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50 Debug session time: Sun Dec 26 14:11:33.409 2010 (UTC - 4:00) System Uptime: 0 days 3:46:57.352 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, fffff8000328f639, 0, ffffffffffffffff} Probably caused by : ntkrnlmp.exe ( nt!KiSwapContext+d9 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8000328f639, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!KiSwapContext+d9 fffff800`0328f639 c3 ret EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034c10e0 ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. BUGCHECK_STR: 0x1E_c0000005 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff88003717738 -- (.exr 0xfffff88003717738) ExceptionAddress: fffff8000328f639 (nt!KiSwapContext+0x00000000000000d9) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff TRAP_FRAME: fffff880037177e0 -- (.trap 0xfffff880037177e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003717940 rdx=0000000000187000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000328f639 rsp=fffff88003717978 rbp=fffffa80049bc470 r8=fffffa8003b52bb8 r9=0000000000000000 r10=fffffffffffffffd r11=000000008000e5c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiSwapContext+0xd9: fffff800`0328f639 c3 ret Resetting default scope LAST_CONTROL_TRANSFER: from fffff800032c3a39 to fffff80003289740 STACK_TEXT: fffff880`03716f68 fffff800`032c3a39 : 00000000`0000001e ffffffff`c0000005 fffff800`0328f639 00000000`00000000 : nt!KeBugCheckEx fffff880`03716f70 fffff800`03288d82 : fffff880`03717738 fffffa80`049bc470 fffff880`037177e0 fffffa80`049bc530 : nt!KiDispatchException+0x1b9 fffff880`03717600 fffff800`0328768a : fffffa80`04a1aad0 fffffa80`04a1df88 00000000`00000014 fffff800`0328f9a2 : nt!KiExceptionDispatch+0xc2 fffff880`037177e0 fffff800`0328f639 : 00fff800`03290992 00000000`00000000 fffffa80`049bc470 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a fffff880`03717978 00fff800`03290992 : 00000000`00000000 fffffa80`049bc470 00000000`00000000 00000000`00000006 : nt!KiSwapContext+0xd9 fffff880`03717980 00000000`00000000 : fffffa80`049bc470 00000000`00000000 00000000`00000006 00000000`00000000 : 0xfff800`03290992 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiSwapContext+d9 fffff800`0328f639 c3 ret SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: nt!KiSwapContext+d9 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiSwapContext+d9 BUCKET_ID: X64_0x1E_c0000005_nt!KiSwapContext+d9 Followup: MachineOwner ---------
DRIVERS
Code:start end module name fffff880`0435b000 fffff880`043a0000 a1ze1fo3 a1ze1fo3.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7) fffff880`0102f000 fffff880`01086000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`03c5c000 fffff880`03ce6000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`043c6000 fffff880`043dc000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`013b5000 fffff880`013c0000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`0583a000 fffff880`05843000 aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D) fffff880`05800000 fffff880`0583a000 aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084) fffff880`03ce6000 fffff880`03cf0000 aswRdr aswRdr.SYS Tue Sep 07 10:47:47 2010 (4C865093) fffff880`01200000 fffff880`01223000 aswSP aswSP.SYS Tue Sep 07 10:52:07 2010 (4C865197) fffff880`01430000 fffff880`01440000 aswTdi aswTdi.SYS Tue Sep 07 10:52:27 2010 (4C8651AB) fffff880`01367000 fffff880`01370000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`01370000 fffff880`0139a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`0446e000 fffff880`045eb000 athrx athrx.sys Mon Oct 05 12:33:57 2009 (4ACA1FF5) fffff880`0531a000 fffff880`0533a000 AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0) fffff880`04a8c000 fffff880`050c2000 atikmdag atikmdag.sys Tue Nov 24 22:44:50 2009 (4B0CA832) fffff960`008d0000 fffff960`00931000 ATMFD ATMFD.DLL unavailable (00000000) fffff880`0109d000 fffff880`010a9000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5) fffff880`02f96000 fffff880`02f9d000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`013d4000 fffff880`013e5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`0556e000 fffff880`0558c000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00610000 fffff960`00637000 cdd cdd.dll unavailable (00000000) fffff880`015e8000 fffff880`015f5000 cdrblock cdrblock.sys Fri May 30 01:12:23 2008 (483F8CB7) fffff880`02f63000 fffff880`02f8d000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00cf2000 fffff880`00db2000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`01400000 fffff880`01430000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c94000 fffff880`00cf2000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03c51000 fffff880`03c55500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7) fffff880`01753000 fffff880`017c6000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`011ef000 fffff880`011f8000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`043b6000 fffff880`043c6000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`05afe000 fffff880`05b0c000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03dde000 fffff880`03dfc000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`03dcf000 fffff880`03dde000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`016c0000 fffff880`016d6000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`05377000 fffff880`05399000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`05b0c000 fffff880`05b1f000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`02e29000 fffff880`02f45000 dump_iaStor dump_iaStor.sys Tue Oct 13 14:15:56 2009 (4AD4C3DC) fffff880`05b1f000 fffff880`05b2b000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`050c2000 fffff880`051b6000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`051b6000 fffff880`051fc000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`00c00000 fffff880`00c36000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0) fffff880`013c0000 fffff880`013d4000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`00e00000 fffff880`00e4c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`017d7000 fffff880`017e1000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01686000 fffff880`016c0000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`0188b000 fffff880`018d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`037f5000 fffff800`0383e000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`04a00000 fffff880`04a24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`04a24000 fffff880`04a35000 HECIx64 HECIx64.sys Thu Sep 17 15:54:16 2009 (4AB293E8) fffff880`05b84000 fffff880`05b9d000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`05b9d000 fffff880`05ba5080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`05b76000 fffff880`05b84000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`04456000 fffff880`04462000 HpqKbFiltr HpqKbFiltr.sys Wed Apr 29 09:48:30 2009 (49F85AAE) fffff880`054a6000 fffff880`0556e000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`019e2000 fffff880`019eb000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`042cc000 fffff880`042ea000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`0124b000 fffff880`01367000 iaStor iaStor.sys Tue Oct 13 14:15:56 2009 (4AD4C3DC) fffff880`043a0000 fffff880`043b6000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`042ea000 fffff880`042f9000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff800`00b98000 fffff800`00ba2000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`00db2000 fffff880`00df5000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`01739000 fffff880`01753000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01860000 fffff880`0188b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`05399000 fffff880`0539e200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`05864000 fffff880`05879000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`05bc1000 fffff880`05be4000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00c3c000 fffff880`00c80000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`05bb3000 fffff880`05bc1000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`0434c000 fffff880`0435b000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`05ba6000 fffff880`05bb3000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00fba000 fffff880`00fd4000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`0558c000 fffff880`055a4000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`055a4000 fffff880`055d1000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`05400000 fffff880`0544e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`0544e000 fffff880`05471000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`0139a000 fffff880`013a5000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`02e00000 fffff880`02e0b000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`01086000 fffff880`01090000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`016db000 fffff880`01739000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`03dc4000 fffff880`03dcf000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`018dd000 fffff880`018ef000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`018f0000 fffff880`019e2000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04200000 fffff880`0420c000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`05879000 fffff880`0588c000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5) fffff880`0420c000 fffff880`0423b000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`05305000 fffff880`0531a000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`03d7a000 fffff880`03d89000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`03cf0000 fffff880`03d35000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01800000 fffff880`01860000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`02e0b000 fffff880`02e1c000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`03db8000 fffff880`03dc4000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`03219000 fffff800`037f5000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`01445000 fffff880`015e8000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`02f8d000 fffff880`02f96000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`0539f000 fffff880`053f2000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B) fffff880`03d3e000 fffff880`03d64000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`011da000 fffff880`011ef000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f16000 fffff880`00f49000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`013a5000 fffff880`013b5000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`017c6000 fffff880`017d7000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`05200000 fffff880`052a6000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`0533a000 fffff880`05377000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c80000 fffff880`00c94000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`043dc000 fffff880`04400000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`0423b000 fffff880`04256000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`04a46000 fffff880`04a67000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`04256000 fffff880`04270000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`03c00000 fffff880`03c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`02fe0000 fffff880`02fe9000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02fe9000 fffff880`02ff2000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02ff2000 fffff880`02ffb000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`0164c000 fffff880`01686000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`0588c000 fffff880`058a4000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`04400000 fffff880`04456000 Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95) fffff880`058b7000 fffff880`05afde00 RTKVHD64 RTKVHD64.sys Tue Jun 08 05:08:08 2010 (4C0E0878) fffff880`01000000 fffff880`0102f000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0) fffff880`05471000 fffff880`0547c000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E) fffff880`018d5000 fffff880`018dd000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`010ab000 fffff880`011d1000 sptd sptd.sys Sun Oct 11 16:55:14 2009 (4AD24632) fffff880`05f48000 fffff880`05fde000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318) fffff880`05ee1000 fffff880`05f48000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`055d1000 fffff880`055fe000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`045f8000 fffff880`045f9480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`042f9000 fffff880`0434c000 SynTP SynTP.sys Thu May 27 17:41:36 2010 (4BFEE710) fffff880`01a03000 fffff880`01c00000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`0547c000 fffff880`0548e000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02e1c000 fffff880`02e29000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`017e1000 fffff880`017ff000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`03da4000 fffff880`03db8000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00470000 fffff960`0047a000 TSDDD TSDDD.dll unavailable (00000000) fffff880`05e00000 fffff880`05e55000 udfs udfs.sys Tue Oct 06 22:34:35 2009 (4ACBFE3B) fffff880`04a67000 fffff880`04a79000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`05b2b000 fffff880`05b48000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`04462000 fffff880`04463f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`04a35000 fffff880`04a46000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`052ab000 fffff880`05305000 usbhub usbhub.sys Fri Sep 04 23:24:43 2009 (4AA1D9FB) fffff880`04276000 fffff880`042cc000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`05b48000 fffff880`05b75200 usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9) fffff880`01090000 fffff880`0109d000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`02f9d000 fffff880`02fab000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`02fab000 fffff880`02fd0000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`00f49000 fffff880`00f5e000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00f5e000 fffff880`00fba000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`01600000 fffff880`0164c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`045eb000 fffff880`045f8000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39) fffff880`03d64000 fffff880`03d7a000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A) fffff880`03d89000 fffff880`03da4000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`02fd0000 fffff880`02fe0000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e63000 fffff880`00f07000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f07000 fffff880`00f16000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`03d35000 fffff880`03d3e000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`000c0000 fffff960`003d0000 win32k win32k.sys unavailable (00000000) fffff880`04464000 fffff880`0446d000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`011d1000 fffff880`011da000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`05843000 fffff880`05864000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1) Unloaded modules: fffff880`05e55000 fffff880`05e86000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00031000 fffff880`05ec6000 fffff880`05ee1000 USBSTOR.SYS Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0001B000 fffff880`05e55000 fffff880`05ec6000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00071000 fffff880`019eb000 fffff880`019f9000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0000E000 fffff880`02e34000 fffff880`02f50000 dump_iaStor. Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0011C000 fffff880`02f50000 fffff880`02f63000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00013000 fffff880`01223000 fffff880`01249000 tunnel.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00026000
i don't have avast or deamon tools...i have MSE and magicdisc....and the drivers i'm updating but what can i do with that programs??
and i haven't found newer driver for matrix storage that i already have
Yes you do, otherwise you wouldn't have so many Avast drivers:
Code:fffff880`0583a000 fffff880`05843000 aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D) fffff880`05800000 fffff880`0583a000 aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084) fffff880`03ce6000 fffff880`03cf0000 aswRdr aswRdr.SYS Tue Sep 07 10:47:47 2010 (4C865093) fffff880`01200000 fffff880`01223000 aswSP aswSP.SYS Tue Sep 07 10:52:07 2010 (4C865197) fffff880`01430000 fffff880`01440000 aswTdi aswTdi.SYS Tue Sep 07 10:52:27 2010 (4C8651AB)
Uninstall Avast using the official uninstaller:
avast! Uninstall Utility
And this is Daemon Tools/Alcohol 120 driver that you should also uninstall:
DuplexSecure - FAQ
To update Intel drivers, use Intel® Driver Update Utility. If your motherboard is not outdated, the utility will find the updates for sure. Use it in IE, click to confirm its installation.
the sptd driver is not in my computer....i have downloaded the unistaller and it didn't found any sptd on my computer...what now??