Advertisement
Guest User

Untitled

a guest
Aug 22nd, 2017
515
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 48.36 KB | None | 0 0
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer by gardenman
  3. Time to debug file(s): 00 hours and 06 minutes and 04 seconds
  4.  
  5. ================================ SYSTEM ================================
  6. MANUFACTURER: Gigabyte Technology Co., Ltd.
  7.  
  8. ================================= BIOS =================================
  9. VENDOR: American Megatrends Inc.
  10. VERSION: F16
  11. DATE: 10/24/2012
  12.  
  13. If you see multiple versions/dates above, it's because the information
  14. was pulled from different dump files. You can assume the higher version
  15. or later date is the correct info for the PC.
  16.  
  17. ============================= MOTHERBOARD ==============================
  18. MANUFACTURER: Gigabyte Technology Co., Ltd.
  19. PRODUCT: Z77X-D3H
  20.  
  21. ================================= RAM ==================================
  22. Size Speed Manufacturer Part No.
  23. -------------- -------------- ------------------- ----------------------
  24. 0MHz
  25. 8192MB 1600MHz 859B BLS8G3D1609DS1S00.
  26. 0MHz
  27. 8192MB 1600MHz 859B BLS8G3D1609DS1S00.
  28.  
  29. More RAM information can be found below in the full BIOS section.
  30.  
  31. ================================= CPU ==================================
  32. Processor Version: Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz
  33. COUNT: 8
  34. MHZ: 3503
  35. VENDOR: GenuineIntel
  36. FAMILY: 6
  37. MODEL: 3a
  38. STEPPING: 9
  39. MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
  40.  
  41. ================================== OS ==================================
  42. Product: WinNt, suite: TerminalServer SingleUserTS
  43. Built by: 14393.1593.amd64fre.rs1_release.170731-1934
  44. BUILD_VERSION: 10.0.14393.1593 (rs1_release.170731-1934)
  45. BUILD: 14393
  46. SERVICEPACK: 1593
  47. PLATFORM_TYPE: x64
  48. NAME: Windows 10
  49. EDITION: Windows 10 WinNt TerminalServer SingleUserTS
  50. BUILD_TIMESTAMP: 2017-08-01 14:29:18
  51. BUILDDATESTAMP: 170731-1934
  52. BUILDLAB: rs1_release
  53. BUILDOSVER: 10.0.14393.1593
  54.  
  55. If you see multiple OS versions listed above, it's because the dump
  56. files were created at different times and Windows has updated to a
  57. new version.
  58.  
  59. =============================== DEBUGGER ===============================
  60. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  61. Copyright (c) Microsoft Corporation. All rights reserved.
  62.  
  63. ========================================================================
  64. ==================== Dump File: 082217-7921-01.dmp =====================
  65. ========================================================================
  66. Mini Kernel Dump File: Only registers and stack trace are available
  67. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  68. Kernel base = 0xfffff801`3f81d000 PsLoadedModuleList = 0xfffff801`3fb1b040
  69. Debug session time: Tue Aug 22 02:07:37.735 2017 (UTC - 4:00)
  70. System Uptime: 0 days 0:33:40.460
  71.  
  72. BugCheck A, {fffffffffffffff9, 2, 0, fffff8013f847f3b}
  73. Probably caused by : hardware ( USBXHCI!Control_Transfer_Complete+cb )
  74. Followup: MachineOwner
  75.  
  76. IRQL_NOT_LESS_OR_EQUAL (a)
  77. An attempt was made to access a pageable (or completely invalid) address at an
  78. interrupt request level (IRQL) that is too high. This is usually
  79. caused by drivers using improper addresses.
  80. If a kernel debugger is available get the stack backtrace.
  81.  
  82. Arguments:
  83. Arg1: fffffffffffffff9, memory referenced
  84. Arg2: 0000000000000002, IRQL
  85. Arg3: 0000000000000000, bitfield :
  86. bit 0 : value 0 = read operation, 1 = write operation
  87. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  88. Arg4: fffff8013f847f3b, address which referenced memory
  89.  
  90. Debugging Details:
  91. DUMP_CLASS: 1
  92. DUMP_QUALIFIER: 400
  93. DUMP_TYPE: 2
  94. READ_ADDRESS: fffff8013fbbc338: Unable to get MiVisibleState
  95. fffffffffffffff9
  96. CURRENT_IRQL: 2
  97. FAULTING_IP:
  98. nt!RtlpWalkFrameChain+4fb
  99. fffff801`3f847f3b e80f866007 call fffff801`46e5054f
  100. CUSTOMER_CRASH_COUNT: 1
  101. DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
  102. BUGCHECK_STR: AV
  103.  
  104. PROCESS_NAME: System
  105.  
  106. TRAP_FRAME: fffff80141656720 -- (.trap 0xfffff80141656720)
  107. NOTE: The trap frame does not contain all registers.
  108. Some register values may be zeroed or incorrect.
  109. rax=0000000000000010 rbx=0000000000000000 rcx=fffff80141657730
  110. rdx=fffff80db1ede6ec rsi=0000000000000000 rdi=0000000000000000
  111. rip=fffff8013f847f3b rsp=fffff801416568b0 rbp=0000000000000001
  112. r8=00007ffffffeffff r9=0000000000000003 r10=fffff80141656b28
  113. r11=fffff80141656910 r12=0000000000000000 r13=0000000000000000
  114. r14=0000000000000000 r15=0000000000000000
  115. iopl=0 nv up ei ng nz na po nc
  116. nt!RtlpWalkFrameChain+0x4fb:
  117. fffff801`3f847f3b e80f866007 call fffff801`46e5054f
  118. Resetting default scope
  119. MISALIGNED_IP:
  120. nt!RtlpWalkFrameChain+4fb
  121. fffff801`3f847f3b e80f866007 call fffff801`46e5054f
  122. LAST_CONTROL_TRANSFER: from fffff8013f977a29 to fffff8013f96c870
  123. STACK_TEXT:
  124. fffff801`416565d8 fffff801`3f977a29 : 00000000`0000000a ffffffff`fffffff9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  125. fffff801`416565e0 fffff801`3f976007 : ffffb70c`efa55c60 fffff801`3f858a02 ffffb70c`f318a520 ffffb70c`f318a520 : nt!KiBugCheckDispatch+0x69
  126. fffff801`41656720 fffff801`3f847f3b : 00000000`000017a4 fffff801`41656a48 00000000`00000004 fffff801`3f84790b : nt!KiPageFault+0x247
  127. fffff801`416568b0 fffff801`3f847853 : 00000000`00000004 fffff801`3ff2aa4e 00000000`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0x4fb
  128. fffff801`41656fd0 fffff801`3f8d6044 : 00000000`00000003 ffffb70c`eea52c98 00000000`00000000 fffff801`41652000 : nt!RtlWalkFrameChain+0x93
  129. fffff801`41657020 fffff801`3ff24b9c : ffffb70c`eea52c80 00000000`00000002 00000000`00000001 00000000`00000001 : nt!RtlCaptureStackBackTrace+0x44
  130. fffff801`41657050 fffff801`3ff24c4f : ffffeef7`6dc33d40 ffffeef7`7bb6e198 ffffeef7`7bbddb70 ffffeef7`7bbddee8 : nt!IovpLogStackCallout+0x1c
  131. fffff801`41657080 fffff801`3ff249c5 : 00000000`00000030 00000000`00000001 ffffb70c`f31821d0 fffff80d`b0a5224c : nt!ViPoolLogStackTrace+0x9f
  132. fffff801`416570c0 fffff801`3fa65d63 : 00000000`00000030 fffff801`3fa64a10 ffffb70c`efec5dc0 00000000`00000001 : nt!VfFreePoolNotification+0x5d
  133. fffff801`416570f0 fffff801`3f90dc1a : ffffb70c`f505f4a0 ffffb70c`f62d4c80 ffffb70c`f62d4c80 ffffb70c`00000003 : nt!ExFreePoolWithTag+0x1d63
  134. fffff801`416571d0 fffff801`3f84e762 : ffffb70c`f00dc820 fffff801`416572b9 ffffb70c`f2ff7e20 ffffb70c`f00dce93 : nt!IopUnloadSafeCompletion+0x5e
  135. fffff801`41657200 fffff801`3ff14f65 : ffffb70c`f00dc820 fffff801`41657399 ffffb70c`f318cb00 00000000`00000001 : nt!IopfCompleteRequest+0x112
  136. fffff801`41657320 fffff80d`ae2a6907 : 00000000`00000000 ffffb70c`f00dc820 ffffb70c`f318cbb0 ffffb70c`f318cbd0 : nt!IovCompleteRequest+0x1c1
  137. fffff801`41657400 fffff80d`ae2a3190 : 00000000`00000001 fffff801`00000000 00000000`00000008 fffff801`41657502 : Wdf01000!FxRequest::CompleteInternal+0x247
  138. fffff801`416574b0 fffff80d`b1ea398b : 00000000`00000040 ffffb70c`f318cbb0 ffffb70c`f26a5eb0 00000000`00000000 : Wdf01000!imp_WdfRequestComplete+0x90
  139. fffff801`41657510 fffff80d`b1ea35f0 : ffffb70c`f318cd50 fffff801`41657801 00000000`00000000 ffffb70c`f26a5eb0 : USBXHCI!Control_Transfer_Complete+0xcb
  140. fffff801`41657580 fffff80d`b1eadaef : ffffb70c`f318cd50 ffffb70c`f26a5eb0 ffffb70c`f26a5eb0 00000000`00000000 : USBXHCI!Control_Transfer_CompleteCancelable+0x3c
  141. fffff801`416575d0 fffff80d`b1eaed77 : fffff801`416577a0 ffffb70c`f2a11900 ffffb70c`f26daaf0 fffff801`3f839b6f : USBXHCI!Control_ProcessTransferEventWithED1+0x3cf
  142. fffff801`41657660 fffff80d`b1ea174b : 00000000`00000004 fffff801`41657778 00000000`00000008 fffff801`416577a0 : USBXHCI!Endpoint_TransferEventHandler+0xb7
  143. fffff801`416576d0 fffff80d`b1eaa80d : ffffb70c`f2a12cc0 ffffb70c`f2a12ff8 ffff8c81`e23ee0d0 fffff801`3fb5af10 : USBXHCI!UsbDevice_TransferEventHandler+0x87
  144. fffff801`41657730 fffff801`3f853fb5 : ffffffff`fffffffe 00000679`d24c33fd fffff801`3fb5af10 fffff801`3fb58180 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x74d
  145. fffff801`41657890 fffff801`3f85353f : 00000000`000000fe 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x335
  146. fffff801`416579e0 fffff801`3f96f8fa : 00000000`00000000 fffff801`3fb58180 fffff801`3fbd2940 ffffb70c`f5d21800 : nt!KiRetireDpcList+0x8df
  147. fffff801`41657c60 00000000`00000000 : fffff801`41658000 fffff801`41652000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  148. STACK_COMMAND: kb
  149. THREAD_SHA1_HASH_MOD_FUNC: 1624f2973c5e8636efa0624ae8494eca04e6a152
  150. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1c42211bfdf926657c6d72a7f946ee8b542d58d7
  151. THREAD_SHA1_HASH_MOD: ae9f0ae62b3d0c10d47da5e1a7aa1dcf46606735
  152. FOLLOWUP_IP:
  153. USBXHCI!Control_Transfer_Complete+cb
  154. fffff80d`b1ea398b 488d4d58 lea rcx,[rbp+58h]
  155. FAULT_INSTR_CODE: 584d8d48
  156. SYMBOL_STACK_INDEX: f
  157. SYMBOL_NAME: USBXHCI!Control_Transfer_Complete+cb
  158. FOLLOWUP_NAME: MachineOwner
  159.  
  160. IMAGE_NAME: hardware
  161.  
  162. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  163. IMAGE_VERSION: 10.0.14393.1358
  164. MODULE_NAME: hardware
  165. FAILURE_BUCKET_ID: IP_MISALIGNED
  166. BUCKET_ID: IP_MISALIGNED
  167. PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
  168. TARGET_TIME: 2017-08-22T06:07:37.000Z
  169. SUITE_MASK: 272
  170. PRODUCT_TYPE: 1
  171. USER_LCID: 0
  172. FAILURE_ID_HASH_STRING: km:ip_misaligned
  173. FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
  174. Followup: MachineOwner
  175.  
  176. ========================================================================
  177. ===================== 3RD PARTY DRIVER QUICK LIST ======================
  178. ========================================================================
  179. unavailable - ATMFD.DLL - Adobe Type Manager Font Driver
  180. Dec 14 2011 - vsflt67.sys -
  181. May 03 2012 - GEARAspiWDM.sys -
  182. Dec 25 2012 - ammntdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  183. Dec 25 2012 - amwrtdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  184. Dec 25 2012 - ambakdrv.sys - Aomei driver (Aomei Technology Co)
  185. Jul 16 2013 - L1C63x64.sys -
  186. Nov 05 2014 - tap0901.sys - TAP-Win32 Virtual Private Network Driver 0901 (OpenVPN by OpenVPN Technologies) https://openvpn.net/
  187. Apr 13 2015 - mvs91xx.sys - Marvell Magni Windows Driver (Marvell Semiconductor, Inc.)
  188. Apr 13 2015 - mvxxmm.sys -
  189. Jun 02 2015 - cmudaxp.sys -
  190. Jun 09 2015 - lgcoretemp.sys - CPU Core Temperature Monitor http://support.logitech.com/
  191. Jul 07 2015 - TeeDriverW8x64.sys - Intel® Management Engine Interface
  192. Sep 16 2015 - rzpnk.sys - Razer Overlay Support https://www.razerzone.com/
  193. Sep 17 2015 - rzpmgrk.sys - Razer Overlay Support https://www.razerzone.com/
  194. Jun 13 2016 - LGBusEnum.sys - Logitech GamePanel Virtual Bus Enumerator Driver http://support.logitech.com/
  195. Jun 13 2016 - LGJoyXlCore.sys - Logitech Gaming Software driver http://support.logitech.com/
  196. Jun 13 2016 - LGVirHid.sys - Logitech Gamepanel Virtual HID Device driver http://support.logitech.com/
  197. Jun 15 2016 - rzendpt.sys - Razer RzEndPt driver https://www.razerzone.com/
  198. Jun 15 2016 - rzudd.sys - Razer Rzudd Engine Driver https://www.razerzone.com/
  199. Sep 30 2016 - RTCore64.sys - MSI Afterburner http://www.msi.com/ or EVGA Precision X http://www.evga.com/
  200. Jan 25 2017 - ehdrv.sys - ESET Helper driver https://www.eset.com/
  201. Jan 25 2017 - epfwwfpr.sys -
  202. Jun 02 2017 - MBAMSwissArmy.sys - MalwareBytes Anti-Malware system driver https://www.malwarebytes.com/
  203. Jun 19 2017 - eamonm.sys - ESET Anti-virus monitor https://www.eset.com/
  204. Jun 21 2017 - em000k_64.dll -
  205. Jul 18 2017 - em018k_64.dll -
  206. Aug 09 2017 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  207. Aug 10 2017 - em006_64.dll -
  208.  
  209. ========================================================================
  210. ========================== 3RD PARTY DRIVERS ===========================
  211. ========================================================================
  212. Image path: \SystemRoot\System32\ATMFD.DLL
  213. Image name: ATMFD.DLL
  214. Info Link : http://www.carrona.org/drivers/driver.php?id=ATMFD.DLL
  215. ADA Info : Adobe Type Manager Font Driver
  216. Timestamp : unavailable (00000000)
  217.  
  218. Image path: \SystemRoot\system32\DRIVERS\vsflt67.sys
  219. Image name: vsflt67.sys
  220. Info Link : http://www.carrona.org/drivers/driver.php?id=vsflt67.sys
  221. Timestamp : Wed Dec 14 2011
  222.  
  223. Image path: \SystemRoot\system32\DRIVERS\GEARAspiWDM.sys
  224. Image name: GEARAspiWDM.sys
  225. Info Link : http://www.carrona.org/drivers/driver.php?id=GEARAspiWDM.sys
  226. Timestamp : Thu May 3 2012
  227.  
  228. Image path: \??\C:\WINDOWS\system32\ammntdrv.sys
  229. Image name: ammntdrv.sys
  230. Info Link : http://www.carrona.org/drivers/driver.php?id=ammntdrv.sys
  231. ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  232. Timestamp : Tue Dec 25 2012
  233.  
  234. Image path: \??\C:\WINDOWS\system32\amwrtdrv.sys
  235. Image name: amwrtdrv.sys
  236. Info Link : http://www.carrona.org/drivers/driver.php?id=amwrtdrv.sys
  237. ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  238. Timestamp : Tue Dec 25 2012
  239.  
  240. Image path: \SystemRoot\system32\ambakdrv.sys
  241. Image name: ambakdrv.sys
  242. Info Link : http://www.carrona.org/drivers/driver.php?id=ambakdrv.sys
  243. ADA Info : Aomei driver (Aomei Technology Co)
  244. Timestamp : Tue Dec 25 2012
  245.  
  246. Image path: \SystemRoot\System32\drivers\L1C63x64.sys
  247. Image name: L1C63x64.sys
  248. Info Link : http://www.carrona.org/drivers/driver.php?id=L1C63x64.sys
  249. Timestamp : Tue Jul 16 2013
  250.  
  251. Image path: \SystemRoot\System32\drivers\tap0901.sys
  252. Image name: tap0901.sys
  253. Info Link : http://www.carrona.org/drivers/driver.php?id=tap0901.sys
  254. ADA Info : TAP-Win32 Virtual Private Network Driver 0901 (OpenVPN by OpenVPN Technologies) https://openvpn.net/
  255. Timestamp : Wed Nov 5 2014
  256.  
  257. Image path: \SystemRoot\System32\drivers\mvs91xx.sys
  258. Image name: mvs91xx.sys
  259. Info Link : http://www.carrona.org/drivers/driver.php?id=mvs91xx.sys
  260. ADA Info : Marvell Magni Windows Driver (Marvell Semiconductor, Inc.)
  261. Timestamp : Mon Apr 13 2015
  262.  
  263. Image path: \SystemRoot\System32\drivers\mvxxmm.sys
  264. Image name: mvxxmm.sys
  265. Info Link : http://www.carrona.org/drivers/driver.php?id=mvxxmm.sys
  266. Timestamp : Mon Apr 13 2015
  267.  
  268. Image path: \SystemRoot\system32\drivers\cmudaxp.sys
  269. Image name: cmudaxp.sys
  270. Info Link : http://www.carrona.org/drivers/driver.php?id=cmudaxp.sys
  271. Timestamp : Tue Jun 2 2015
  272.  
  273. Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
  274. Image name: lgcoretemp.sys
  275. Info Link : http://www.carrona.org/drivers/driver.php?id=lgcoretemp.sys
  276. ADA Info : CPU Core Temperature Monitor http://support.logitech.com/
  277. Timestamp : Tue Jun 9 2015
  278.  
  279. Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
  280. Image name: TeeDriverW8x64.sys
  281. Info Link : http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
  282. ADA Info : Intel® Management Engine Interface
  283. Timestamp : Tue Jul 7 2015
  284.  
  285. Image path: \??\C:\WINDOWS\system32\drivers\rzpnk.sys
  286. Image name: rzpnk.sys
  287. Info Link : http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
  288. ADA Info : Razer Overlay Support https://www.razerzone.com/
  289. Timestamp : Wed Sep 16 2015
  290.  
  291. Image path: \??\C:\WINDOWS\system32\drivers\rzpmgrk.sys
  292. Image name: rzpmgrk.sys
  293. Info Link : http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
  294. ADA Info : Razer Overlay Support https://www.razerzone.com/
  295. Timestamp : Thu Sep 17 2015
  296.  
  297. Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
  298. Image name: LGBusEnum.sys
  299. Info Link : http://www.carrona.org/drivers/driver.php?id=LGBusEnum.sys
  300. ADA Info : Logitech GamePanel Virtual Bus Enumerator Driver http://support.logitech.com/
  301. Timestamp : Mon Jun 13 2016
  302.  
  303. Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
  304. Image name: LGJoyXlCore.sys
  305. Info Link : http://www.carrona.org/drivers/driver.php?id=LGJoyXlCore.sys
  306. ADA Info : Logitech Gaming Software driver http://support.logitech.com/
  307. Timestamp : Mon Jun 13 2016
  308.  
  309. Image path: \SystemRoot\system32\drivers\LGVirHid.sys
  310. Image name: LGVirHid.sys
  311. Info Link : http://www.carrona.org/drivers/driver.php?id=LGVirHid.sys
  312. ADA Info : Logitech Gamepanel Virtual HID Device driver http://support.logitech.com/
  313. Timestamp : Mon Jun 13 2016
  314.  
  315. Image path: \SystemRoot\System32\drivers\rzendpt.sys
  316. Image name: rzendpt.sys
  317. Info Link : http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
  318. ADA Info : Razer RzEndPt driver https://www.razerzone.com/
  319. Timestamp : Wed Jun 15 2016
  320.  
  321. Image path: \SystemRoot\System32\drivers\rzudd.sys
  322. Image name: rzudd.sys
  323. Info Link : http://www.carrona.org/drivers/driver.php?id=rzudd.sys
  324. ADA Info : Razer Rzudd Engine Driver https://www.razerzone.com/
  325. Timestamp : Wed Jun 15 2016
  326.  
  327. Image path: \??\C:\Program Files (x86)\MSI Afterburner\RTCore64.sys
  328. Image name: RTCore64.sys
  329. Info Link : http://www.carrona.org/drivers/driver.php?id=RTCore64.sys
  330. ADA Info : MSI Afterburner http://www.msi.com/ or EVGA Precision X http://www.evga.com/
  331. Timestamp : Fri Sep 30 2016
  332.  
  333. Image path: \SystemRoot\system32\DRIVERS\ehdrv.sys
  334. Image name: ehdrv.sys
  335. Info Link : http://www.carrona.org/drivers/driver.php?id=ehdrv.sys
  336. ADA Info : ESET Helper driver https://www.eset.com/
  337. Timestamp : Wed Jan 25 2017
  338.  
  339. Image path: \SystemRoot\system32\DRIVERS\epfwwfpr.sys
  340. Image name: epfwwfpr.sys
  341. Info Link : http://www.carrona.org/drivers/driver.php?id=epfwwfpr.sys
  342. Timestamp : Wed Jan 25 2017
  343.  
  344. Image path: \??\C:\WINDOWS\system32\drivers\MBAMSwissArmy.sys
  345. Image name: MBAMSwissArmy.sys
  346. Info Link : http://www.carrona.org/drivers/driver.php?id=MBAMSwissArmy.sys
  347. ADA Info : MalwareBytes Anti-Malware system driver https://www.malwarebytes.com/
  348. Timestamp : Fri Jun 2 2017
  349.  
  350. Image path: \SystemRoot\system32\DRIVERS\eamonm.sys
  351. Image name: eamonm.sys
  352. Info Link : http://www.carrona.org/drivers/driver.php?id=eamonm.sys
  353. ADA Info : ESET Anti-virus monitor https://www.eset.com/
  354. Timestamp : Mon Jun 19 2017
  355.  
  356. Image path: \??\C:\Program Files\ESET\ESET NOD32 Antivirus\Modules\em000k_64\1012\em000k_64.dll
  357. Image name: em000k_64.dll
  358. Info Link : http://www.carrona.org/drivers/driver.php?id=em000k_64.dll
  359. Timestamp : Wed Jun 21 2017
  360.  
  361. Image path: \??\C:\Program Files\ESET\ESET NOD32 Antivirus\Modules\em018k_64\1502\em018k_64.dll
  362. Image name: em018k_64.dll
  363. Info Link : http://www.carrona.org/drivers/driver.php?id=em018k_64.dll
  364. Timestamp : Tue Jul 18 2017
  365.  
  366. Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_9ab613610b40aa98\nvlddmkm.sys
  367. Image name: nvlddmkm.sys
  368. Info Link : http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
  369. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  370. Timestamp : Wed Aug 9 2017
  371.  
  372. Image path: \??\C:\Program Files\ESET\ESET NOD32 Antivirus\Modules\em006_64\1166\em006_64.dll
  373. Image name: em006_64.dll
  374. Info Link : http://www.carrona.org/drivers/driver.php?id=em006_64.dll
  375. Timestamp : Thu Aug 10 2017
  376.  
  377. If any of the above drivers are from Microsoft then please let me know.
  378. I will have them moved to the Microsoft list on the next update.
  379.  
  380. ========================================================================
  381. ========================== MICROSOFT DRIVERS ===========================
  382. ========================================================================
  383. ACPI.sys ACPI Driver for NT (Microsoft)
  384. acpiex.sys ACPIEx Driver (Microsoft)
  385. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  386. ahcache.sys Application Compatibility Cache (Microsoft)
  387. BasicDisplay.sys Basic Display driver (Microsoft)
  388. BasicRender.sys Basic Render driver (Microsoft)
  389. Beep.SYS BEEP driver (Microsoft)
  390. BOOTVID.dll VGA Boot Driver (Microsoft)
  391. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  392. cdd.dll Canonical Display Driver (Microsoft)
  393. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  394. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  395. CI.dll Code Integrity Module (Microsoft)
  396. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  397. CLFS.SYS Common Log File System Driver (Microsoft)
  398. clipsp.sys CLIP Service (Microsoft)
  399. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  400. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  401. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  402. condrv.sys Console Driver (Microsoft)
  403. crashdmp.sys Crash Dump Driver
  404. csc.sys Windows Client Side Caching Driver
  405. dfsc.sys DFS Namespace Client Driver (Microsoft)
  406. disk.sys PnP Disk Driver (Microsoft)
  407. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  408. dump_diskdump.sys Crash Dump Disk Driver
  409. dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
  410. dump_storahci.sys MS AHCI Storport Miniport Driver
  411. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  412. dxgmms2.sys DirectX Graphics MMS
  413. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  414. EhStorTcgDrv.sys Microsoft driver for storage devices supporting IEEE 1667 and TCG protocols
  415. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  416. fileinfo.sys FileInfo Filter Driver (Microsoft)
  417. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  418. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  419. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  420. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  421. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  422. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  423. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  424. HdAudio.sys High Definition Audio Function driver (Microsoft)
  425. HIDCLASS.SYS Hid Class Library
  426. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  427. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  428. HTTP.sys HTTP Protocol Stack (Microsoft)
  429. intelpep.sys Intel Power Engine Plugin (Microsoft)
  430. intelppm.sys Processor Device Driver (Microsoft)
  431. iorate.sys I/O rate control Filter (Microsoft)
  432. kbdclass.sys Keyboard Class Driver (Microsoft)
  433. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  434. kd.dll Local Kernal Debugger (Microsoft)
  435. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  436. ks.sys Kernal CSA Library (Microsoft)
  437. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  438. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  439. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  440. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  441. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  442. mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
  443. mmcss.sys MMCSS Driver (Microsoft)
  444. monitor.sys Monitor Driver (Microsoft)
  445. mouclass.sys Mouse Class Driver (Microsoft)
  446. mouhid.sys HID Mouse Filter Driver (Microsoft)
  447. mountmgr.sys Mount Point Manager (Microsoft)
  448. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  449. mqac.sys Message Queuing Device Driver
  450. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  451. mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
  452. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  453. Msfs.SYS Mailslot driver (Microsoft)
  454. msisadrv.sys ISA Driver (Microsoft)
  455. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  456. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  457. mssmbios.sys System Management BIOS driver (Microsoft)
  458. mup.sys Multiple UNC Provider driver (Microsoft)
  459. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  460. ndisuio.sys NDIS User mode I/O driver (Microsoft)
  461. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  462. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  463. netbios.sys NetBIOS Interface driver (Microsoft)
  464. netbt.sys MBT Transport driver (Microsoft)
  465. NETIO.SYS Network I/O Subsystem (Microsoft)
  466. Npfs.SYS NPFS driver (Microsoft)
  467. npsvctrig.sys Named pipe service triggers (Microsoft)
  468. nsiproxy.sys NSI Proxy driver (Microsoft)
  469. NTFS.sys NT File System Driver (Microsoft)
  470. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  471. ntosext.sys NTOS Extension Host driver (Microsoft)
  472. Null.SYS NULL Driver (Microsoft)
  473. nwifi.sys NativeWiFi Miniport Driver (Microsoft)
  474. pacer.sys QoS Packet Scheduler (Microsoft)
  475. partmgr.sys Partition driver (Microsoft)
  476. pci.sys NT Plug and Play PCI Enumerator
  477. pcw.sys Performance Counter Driver (Microsoft)
  478. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  479. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  480. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  481. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  482. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  483. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  484. rdyboost.sys ReadyBoost Driver (Microsoft)
  485. registry.sys Registry Container driver (Microsoft)
  486. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  487. serenum.sys Serial Port Enumerator
  488. serial.sys Serial Device Driver
  489. spaceport.sys Storage Spaces driver (Microsoft)
  490. srv.sys Server driver (Microsoft)
  491. srv2.sys Smb 2.0 Server driver (Microsoft)
  492. srvnet.sys Server Network driver (Microsoft)
  493. storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
  494. storport.sys A storage port driver that is especially suitable for use with high-performance buses, such as fibre channel buses, and RAID adapters. (Microsoft)
  495. storqosflt.sys Storage QoS Filter driver (Microsoft)
  496. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  497. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  498. tcpip.sys TCP/IP Protocol driver (Microsoft)
  499. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  500. TDI.SYS TDI Wrapper driver (Microsoft)
  501. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  502. tm.sys Kernel Transaction Manager driver (Microsoft)
  503. TSDDD.dll Framebuffer Display Driver (Microsoft)
  504. tunnel.sys Microsoft Tunnel Interface driver (Microsoft)
  505. ucx01000.sys USB Controller Extension (Microsoft)
  506. umbus.sys User-Mode Bus Enumerator (Microsoft)
  507. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  508. USBD.SYS Universal Serial Bus Driver (Microsoft)
  509. usbehci.sys EHCI eUSB Miniport Driver (Microsoft)
  510. usbhub.sys Default Hub Driver for USB (Microsoft)
  511. UsbHub3.sys USB3 HUB Driver
  512. USBPORT.SYS USB 1.1 & 2.0 Port Driver (Microsoft)
  513. USBXHCI.SYS USB XHCI Driver
  514. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  515. volmgr.sys Volume Manager Driver (Microsoft)
  516. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  517. volsnap.sys Volume Shadow Copy driver (Microsoft)
  518. volume.sys Volume driver (Microsoft)
  519. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  520. wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
  521. watchdog.sys Watchdog driver (Microsoft)
  522. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  523. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  524. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  525. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  526. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  527. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  528. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  529. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  530. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  531. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  532. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  533. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  534. Wof.sys Windows Overlay Filter (Microsoft)
  535. WppRecorder.sys WPP Trace Recorder (Microsoft)
  536. WudfPf.sys Windows Driver Foundation - User-mode Driver Framework Platform driver (Microsoft)
  537.  
  538. Unloaded modules:
  539. fffff80d`af570000 fffff80d`af57f000 dump_storpor
  540. fffff80d`af5b0000 fffff80d`af5d4000 dump_storahc
  541. fffff80d`af600000 fffff80d`af61d000 dump_dumpfve
  542. fffff80d`b0d00000 fffff80d`b0d14000 dam.sys
  543. fffff80d`ae4b0000 fffff80d`ae4b8000 eelam.sys
  544. fffff80d`af470000 fffff80d`af47f000 hwpolicy.sys
  545.  
  546. ========================================================================
  547. ============================== BIOS INFO ===============================
  548. ========================================================================
  549. [SMBIOS Data Tables v2.7]
  550. [DMI Version - 0]
  551. [2.0 Calling Convention - No]
  552. [Table Size - 3104 bytes]
  553. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  554. Vendor American Megatrends Inc.
  555. BIOS Version F16
  556. BIOS Starting Address Segment f000
  557. BIOS Release Date 10/24/2012
  558. BIOS ROM Size 800000
  559. BIOS Characteristics
  560. 07: - PCI Supported
  561. 11: - Upgradeable FLASH BIOS
  562. 12: - BIOS Shadowing Supported
  563. 15: - CD-Boot Supported
  564. 16: - Selectable Boot Supported
  565. 17: - BIOS ROM Socketed
  566. 19: - EDD Supported
  567. 23: - 1.2MB Floppy Supported
  568. 24: - 720KB Floppy Supported
  569. 25: - 2.88MB Floppy Supported
  570. 26: - Print Screen Device Supported
  571. 27: - Keyboard Services Supported
  572. 28: - Serial Services Supported
  573. 29: - Printer Services Supported
  574. 32: - BIOS Vendor Reserved
  575. BIOS Characteristic Extensions
  576. 00: - ACPI Supported
  577. 01: - USB Legacy Supported
  578. 08: - BIOS Boot Specification Supported
  579. 10: - Specification Reserved
  580. 11: - Specification Reserved
  581. BIOS Major Revision 4
  582. BIOS Minor Revision 6
  583. EC Firmware Major Revision 255
  584. EC Firmware Minor Revision 255
  585. [System Information (Type 1) - Length 27 - Handle 0001h]
  586. Manufacturer Gigabyte Technology Co., Ltd.
  587. UUID 00000000-0000-0000-0000-000000000000
  588. Wakeup Type Power Switch
  589. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  590. Manufacturer Gigabyte Technology Co., Ltd.
  591. Product Z77X-D3H
  592. Feature Flags 09h
  593. Chassis Handle 0003h
  594. Board Type 0ah - Processor/Memory Module
  595. Number of Child Handles 0
  596. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  597. Manufacturer Gigabyte Technology Co., Ltd.
  598. Chassis Type Desktop
  599. Bootup State Safe
  600. Power Supply State Safe
  601. Thermal State Safe
  602. Security Status None
  603. OEM Defined 0
  604. Height 0U
  605. Number of Power Cords 1
  606. Number of Contained Elements 0
  607. Contained Element Size 0
  608. [Cache Information (Type 7) - Length 19 - Handle 0004h]
  609. Socket Designation CPU Internal L1
  610. Cache Configuration 0080h - WT Enabled Int NonSocketed L1
  611. Maximum Cache Size 0080h - 128K
  612. Installed Size 0080h - 128K
  613. Supported SRAM Type 0002h - Unknown
  614. Current SRAM Type 0002h - Unknown
  615. Cache Speed 0ns
  616. Error Correction Type ParitySingle-Bit ECC
  617. System Cache Type Other
  618. Associativity 16-way Set-Associative
  619. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  620. Socket Designation CPU Internal L2
  621. Cache Configuration 0081h - WT Enabled Int NonSocketed L2
  622. Maximum Cache Size 0400h - 1024K
  623. Installed Size 0400h - 1024K
  624. Supported SRAM Type 0002h - Unknown
  625. Current SRAM Type 0002h - Unknown
  626. Cache Speed 0ns
  627. Error Correction Type Specification Reserved
  628. System Cache Type Instruction
  629. Associativity 16-way Set-Associative
  630. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  631. Socket Designation CPU Internal L3
  632. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  633. Maximum Cache Size 2000h - 8192K
  634. Installed Size 2000h - 8192K
  635. Supported SRAM Type 0002h - Unknown
  636. Current SRAM Type 0002h - Unknown
  637. Cache Speed 0ns
  638. Error Correction Type Specification Reserved
  639. System Cache Type Instruction
  640. Associativity Specification Reserved
  641. [Physical Memory Array (Type 16) - Length 23 - Handle 0007h]
  642. Location 03h - SystemBoard/Motherboard
  643. Use 03h - System Memory
  644. Memory Error Correction 03h - None
  645. Maximum Capacity 33554432KB
  646. Number of Memory Devices 4
  647. [Onboard Devices Information (Type 10) - Length 6 - Handle 0026h]
  648. Number of Devices 1
  649. 01: Type Video [enabled]
  650. [OEM Strings (Type 11) - Length 5 - Handle 0027h]
  651. Number of Strings 1
  652. [System Configuration Options (Type 12) - Length 5 - Handle 0028h]
  653. [Memory Device (Type 17) - Length 34 - Handle 0040h]
  654. Physical Memory Array Handle 0007h
  655. Total Width 0 bits
  656. Data Width 0 bits
  657. Form Factor 09h - DIMM
  658. Device Locator ChannelA-DIMM0
  659. Bank Locator BANK 0
  660. Memory Type 02h - Unknown
  661. Type Detail 0000h -
  662. Speed 0MHz
  663. [Memory Device (Type 17) - Length 34 - Handle 0041h]
  664. Physical Memory Array Handle 0007h
  665. Total Width 64 bits
  666. Data Width 64 bits
  667. Size 8192MB
  668. Form Factor 09h - DIMM
  669. Device Locator ChannelA-DIMM1
  670. Bank Locator BANK 1
  671. Memory Type 18h - Specification Reserved
  672. Type Detail 0080h - Synchronous
  673. Speed 1600MHz
  674. Manufacturer 859B
  675. Part Number BLS8G3D1609DS1S00.
  676. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0042h]
  677. Starting Address 00000000h
  678. Ending Address 007fffffh
  679. Memory Device Handle 0041h
  680. Mem Array Mapped Adr Handle 0047h
  681. Interleave Position 01
  682. Interleave Data Depth 02
  683. [Processor Information (Type 4) - Length 42 - Handle 0043h]
  684. Socket Designation Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz
  685. Processor Type Central Processor
  686. Processor Family c6h - Specification Reserved
  687. Processor Manufacturer Intel
  688. Processor ID a9060300fffbebbf
  689. Processor Version Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz
  690. Processor Voltage 8ch - 1.2V
  691. External Clock 100MHz
  692. Max Speed 7000MHz
  693. Current Speed 4400MHz
  694. Status Enabled Populated
  695. Processor Upgrade Other
  696. L1 Cache Handle 0004h
  697. L2 Cache Handle 0005h
  698. L3 Cache Handle 0006h
  699. [Memory Device (Type 17) - Length 34 - Handle 0044h]
  700. Physical Memory Array Handle 0007h
  701. Total Width 0 bits
  702. Data Width 0 bits
  703. Form Factor 09h - DIMM
  704. Device Locator ChannelB-DIMM0
  705. Bank Locator BANK 2
  706. Memory Type 02h - Unknown
  707. Type Detail 0000h -
  708. Speed 0MHz
  709. [Memory Device (Type 17) - Length 34 - Handle 0045h]
  710. Physical Memory Array Handle 0007h
  711. Total Width 64 bits
  712. Data Width 64 bits
  713. Size 8192MB
  714. Form Factor 09h - DIMM
  715. Device Locator ChannelB-DIMM1
  716. Bank Locator BANK 3
  717. Memory Type 18h - Specification Reserved
  718. Type Detail 0080h - Synchronous
  719. Speed 1600MHz
  720. Manufacturer 859B
  721. Part Number BLS8G3D1609DS1S00.
  722. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0046h]
  723. Starting Address 00800000h
  724. Ending Address 00ffffffh
  725. Memory Device Handle 0045h
  726. Mem Array Mapped Adr Handle 0047h
  727. Interleave Position 02
  728. Interleave Data Depth 02
  729. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0047h]
  730. Starting Address 00000000h
  731. Ending Address 00ffffffh
  732. Memory Array Handle 0007h
  733. Partition Width 04
  734.  
  735. ========================================================================
  736. ==================== Dump File: 082217-7500-01.dmp =====================
  737. ========================================================================
  738. Mini Kernel Dump File: Only registers and stack trace are available
  739. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  740. Kernel base = 0xfffff802`62c07000 PsLoadedModuleList = 0xfffff802`62f05040
  741. Debug session time: Tue Aug 22 18:54:06.891 2017 (UTC - 4:00)
  742. System Uptime: 0 days 0:31:30.617
  743.  
  744. BugCheck 124, {0, ffff910f416e0028, f2000040, 10005}
  745. Probably caused by : GenuineIntel
  746. Followup: MachineOwner
  747.  
  748. WHEA_UNCORRECTABLE_ERROR (124)
  749. A fatal hardware error has occurred. Parameter 1 identifies the type of error
  750. source that reported the error. Parameter 2 holds the address of the
  751. WHEA_ERROR_RECORD structure that describes the error conditon.
  752.  
  753. Arguments:
  754. Arg1: 0000000000000000, Machine Check Exception
  755. Arg2: ffff910f416e0028, Address of the WHEA_ERROR_RECORD structure.
  756. Arg3: 00000000f2000040, High order 32-bits of the MCi_STATUS value.
  757. Arg4: 0000000000010005, Low order 32-bits of the MCi_STATUS value.
  758.  
  759. Debugging Details:
  760. DUMP_CLASS: 1
  761. DUMP_QUALIFIER: 400
  762. DUMP_TYPE: 2
  763. BUGCHECK_STR: 0x124_GenuineIntel
  764. CUSTOMER_CRASH_COUNT: 1
  765. DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
  766.  
  767. PROCESS_NAME: System
  768.  
  769. CURRENT_IRQL: f
  770. STACK_TEXT:
  771. ffffc381`c7b716f8 fffff802`6345327f : 00000000`00000124 00000000`00000000 ffff910f`416e0028 00000000`f2000040 : nt!KeBugCheckEx
  772. ffffc381`c7b71700 fffff802`62e2d7e4 : ffff910f`416e0028 ffff910f`411c0880 ffff910f`411c0880 ffff910f`411c0880 : hal!HalBugCheckSystem+0xcf
  773. ffffc381`c7b71740 fffff802`6345376c : 00000000`00000728 00000000`00000001 ffffc381`c7b71b30 00000000`00000000 : nt!WheaReportHwError+0x258
  774. ffffc381`c7b717a0 fffff802`63453ac4 : ffff910f`00000010 ffff910f`411c0880 ffffc381`c7b71948 ffff910f`411c0880 : hal!HalpMcaReportError+0x50
  775. ffffc381`c7b718f0 fffff802`634539ae : ffff910f`40689b80 00000000`00000001 00000000`00000001 00000000`00000000 : hal!HalpMceHandlerCore+0xe8
  776. ffffc381`c7b71940 fffff802`63453bee : 00000000`00000008 00000000`00000001 00000000`00000000 00000000`00000000 : hal!HalpMceHandler+0xda
  777. ffffc381`c7b71980 fffff802`63453d70 : ffff910f`40689b80 ffffc381`c7b71bb0 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0xce
  778. ffffc381`c7b719b0 fffff802`62d607fb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
  779. ffffc381`c7b719e0 fffff802`62d60584 : 00000000`00000000 fffff802`62d60503 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x7b
  780. ffffc381`c7b71b20 fffff809`0cd41348 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x184
  781. ffffc381`c7b91858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x18
  782. STACK_COMMAND: kb
  783. THREAD_SHA1_HASH_MOD_FUNC: 8a3debe308db92f808172b280ea37d168a0241fb
  784. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a3d0fc6f45f5a5bf0f4efdb757bea1ce8adf8158
  785. THREAD_SHA1_HASH_MOD: 79568083e9b8a322b030a6184dee2335a8d0d817
  786. FOLLOWUP_NAME: MachineOwner
  787. MODULE_NAME: GenuineIntel
  788.  
  789. IMAGE_NAME: GenuineIntel
  790.  
  791. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  792. FAILURE_BUCKET_ID: 0x124_GenuineIntel_VRF_PROCESSOR_MAE
  793. BUCKET_ID: 0x124_GenuineIntel_VRF_PROCESSOR_MAE
  794. PRIMARY_PROBLEM_CLASS: 0x124_GenuineIntel_VRF_PROCESSOR_MAE
  795. TARGET_TIME: 2017-08-22T22:54:06.000Z
  796. SUITE_MASK: 272
  797. PRODUCT_TYPE: 1
  798. USER_LCID: 0
  799. FAILURE_ID_HASH_STRING: km:0x124_genuineintel_vrf_processor_mae
  800. FAILURE_ID_HASH: {bc35fdc5-444c-7088-a2e4-fddb46d38cd8}
  801. Followup: MachineOwner
  802.  
  803. ========================================================================
  804. ==================== Dump File: 082217-7312-01.dmp =====================
  805. ========================================================================
  806. Mini Kernel Dump File: Only registers and stack trace are available
  807. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  808. Kernel base = 0xfffff803`bcc07000 PsLoadedModuleList = 0xfffff803`bcf05040
  809. Debug session time: Tue Aug 22 04:41:17.828 2017 (UTC - 4:00)
  810. System Uptime: 0 days 2:33:07.554
  811.  
  812. BugCheck A, {fffffffffffffff9, 2, 0, fffff803bcc31f3b}
  813. *** WARNING: Unable to verify timestamp for win32k.sys
  814. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  815. Probably caused by : memory_corruption
  816. Followup: memory_corruption
  817.  
  818. IRQL_NOT_LESS_OR_EQUAL (a)
  819. An attempt was made to access a pageable (or completely invalid) address at an
  820. interrupt request level (IRQL) that is too high. This is usually
  821. caused by drivers using improper addresses.
  822. If a kernel debugger is available get the stack backtrace.
  823.  
  824. Arguments:
  825. Arg1: fffffffffffffff9, memory referenced
  826. Arg2: 0000000000000002, IRQL
  827. Arg3: 0000000000000000, bitfield :
  828. bit 0 : value 0 = read operation, 1 = write operation
  829. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  830. Arg4: fffff803bcc31f3b, address which referenced memory
  831.  
  832. Debugging Details:
  833. DUMP_CLASS: 1
  834. DUMP_QUALIFIER: 400
  835. DUMP_TYPE: 2
  836. READ_ADDRESS: fffff803bcfa6338: Unable to get MiVisibleState
  837. fffffffffffffff9
  838. CURRENT_IRQL: 2
  839. FAULTING_IP:
  840. nt!RtlpWalkFrameChain+4fb
  841. fffff803`bcc31f3b e80f866007 call fffff803`c423a54f
  842. CUSTOMER_CRASH_COUNT: 1
  843. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  844. BUGCHECK_STR: AV
  845.  
  846. PROCESS_NAME: System
  847.  
  848. TRAP_FRAME: fffff803bea56080 -- (.trap 0xfffff803bea56080)
  849. NOTE: The trap frame does not contain all registers.
  850. Some register values may be zeroed or incorrect.
  851. rax=0000000000000000 rbx=0000000000000000 rcx=fffff803bea56af8
  852. rdx=fffff803bce8c478 rsi=0000000000000000 rdi=0000000000000000
  853. rip=fffff803bcc31f3b rsp=fffff803bea56210 rbp=0000000000000001
  854. r8=00007ffffffeffff r9=000000000000000d r10=fffff803bea56488
  855. r11=fffff803bea56270 r12=0000000000000000 r13=0000000000000000
  856. r14=0000000000000000 r15=0000000000000000
  857. iopl=0 nv up ei ng nz na pe nc
  858. nt!RtlpWalkFrameChain+0x4fb:
  859. fffff803`bcc31f3b e80f866007 call fffff803`c423a54f
  860. Resetting default scope
  861. MISALIGNED_IP:
  862. nt!RtlpWalkFrameChain+4fb
  863. fffff803`bcc31f3b e80f866007 call fffff803`c423a54f
  864. LAST_CONTROL_TRANSFER: from fffff803bcd61a29 to fffff803bcd56870
  865. STACK_TEXT:
  866. fffff803`bea55f38 fffff803`bcd61a29 : 00000000`0000000a ffffffff`fffffff9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  867. fffff803`bea55f40 fffff803`bcd60007 : ffffdfcb`5e5d88fd 00000000`00000000 00000000`00000000 00000000`000e0f46 : nt!KiBugCheckDispatch+0x69
  868. fffff803`bea56080 fffff803`bcc31f3b : 00000000`00248e02 fffff803`bea563a8 00000000`00000004 ffff970b`26bd1cf0 : nt!KiPageFault+0x247
  869. fffff803`bea56210 fffff803`bcc31853 : fffff80e`00000200 00000000`00000020 ffff970b`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0x4fb
  870. fffff803`bea56930 fffff803`bccc0044 : 00000000`00000003 ffff970b`22e63598 ffff970b`26db11b8 fffff803`bea52000 : nt!RtlWalkFrameChain+0x93
  871. fffff803`bea56980 fffff803`bd30eb9c : ffff970b`22e63580 00000000`00000002 00000000`00000001 00000000`00000000 : nt!RtlCaptureStackBackTrace+0x44
  872. fffff803`bea569b0 fffff803`bd30ec4f : ffffed76`a5c2ca78 ffffed76`bb52e160 ffffed76`bb5da970 ffffed76`bb5daed0 : nt!IovpLogStackCallout+0x1c
  873. fffff803`bea569e0 fffff803`bd30e9c5 : 00000000`00000040 fffff80e`c7f6f278 00000000`00000000 fffff803`bce4ed12 : nt!ViPoolLogStackTrace+0x9f
  874. fffff803`bea56a20 fffff803`bce4fd63 : 00000000`00000040 fffff80e`c7f75000 ffff970b`26dc88b0 00002ee0`00063000 : nt!VfFreePoolNotification+0x5d
  875. fffff803`bea56a50 fffff80e`c5e01717 : ffff970b`29fdfa60 ffff970b`26dc88b0 00000000`00000001 000068f4`00000004 : nt!ExFreePoolWithTag+0x1d63
  876. fffff803`bea56b30 fffff80e`c5e014d4 : ffff970b`26dc88b0 fffff80e`c5e161e8 ffff970b`26db11b8 fffff803`00000048 : usbccgp!DispatchPdoUrb+0x1e7
  877. fffff803`bea56c50 fffff80e`c5e011b1 : ffff970b`26db8a28 ffff970b`26db8a20 ffff970b`26dc88b0 fffff80e`c5e16178 : usbccgp!DispatchPdoInternalDeviceControl+0x84
  878. fffff803`bea56cb0 fffff803`bd2fed26 : ffff970b`26db88d0 ffff970b`26db8800 ffff970b`00000000 ffff970b`26dc88b0 : usbccgp!USBC_Dispatch+0x1b1
  879. fffff803`bea56d70 fffff803`bcc42a02 : ffff970b`26dc88b0 fffff803`bea56ef0 ffff970b`26dbc8e0 ffff970b`29ca54f0 : nt!IovCallDriver+0x252
  880. fffff803`bea56db0 fffff80e`c5e312a8 : ffff970b`00000200 00000000`00000098 ffff970b`26dc88b0 00000000`00000000 : nt!IofCallDriver+0x72
  881. fffff803`bea56df0 fffff80e`c64f2222 : 00000000`00000000 ffff970b`26dbc1d0 ffff970b`26dbc1d0 fffff803`bce4e34b : hidusb!HumInternalIoctl+0x2a8
  882. fffff803`bea570e0 fffff80e`c64f2000 : ffff970b`26dc72a0 00000000`00000000 fffff80e`c65062f8 00000000`00000013 : HIDCLASS!HidpSubmitInterruptRead+0x152
  883. fffff803`bea57160 fffff803`bcc38762 : ffff970b`26dc88b0 ffff970b`26dc88b0 ffff970b`26dbc1d0 ffff970b`26dc8e01 : HIDCLASS!HidpInterruptReadComplete+0x750
  884. fffff803`bea57240 fffff803`bd2fef65 : ffff970b`26dc88b0 fffff803`bea573d9 fffff80e`c4d76907 fffff803`bea57439 : nt!IopfCompleteRequest+0x112
  885. fffff803`bea57360 fffff80e`c4d76907 : 00000620`8014508e ffff970b`26dc88b0 ffff970b`27dfe020 ffff970b`27dfe040 : nt!IovCompleteRequest+0x1c1
  886. fffff803`bea57440 fffff80e`c4d73190 : ffff970b`00000001 fffff80e`00000000 ffff970b`27dfe102 ffff970b`00000002 : Wdf01000!FxRequest::CompleteInternal+0x247
  887. fffff803`bea574f0 fffff80e`c7f4a708 : ffff970b`27dfe1c0 ffff970b`27dfe020 ffff970b`26db6ce0 ffff970b`27dfe1c0 : Wdf01000!imp_WdfRequestComplete+0x90
  888. fffff803`bea57550 fffff80e`c7f3ac5a : ffff970b`27dfe1c0 00000000`00000014 00000000`00000000 ffff970b`27dfe240 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x175a4
  889. fffff803`bea575b0 fffff80e`c7f3ed77 : ffff970b`264443f0 fffff80e`c7f3a098 ffff970b`26d73110 fffff803`bea57760 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x2ba
  890. fffff803`bea57660 fffff80e`c7f3174b : 00000000`00000004 fffff803`bea57778 00000000`00000008 fffff803`bea577a0 : USBXHCI!Endpoint_TransferEventHandler+0xb7
  891. fffff803`bea576d0 fffff80e`c7f3a80d : ffff970b`26bcd8b0 ffff970b`26bcdbe8 ffffcb00`fe9c2440 fffff803`bd41e779 : USBXHCI!UsbDevice_TransferEventHandler+0x87
  892. fffff803`bea57730 fffff803`bcc3dfb5 : ffffffff`fffffffe 00001d52`3f804f63 fffff803`bcf44f10 fffff803`bcf42180 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x74d
  893. fffff803`bea57890 fffff803`bcc3d53f : 00000000`000000fe ffff970b`27ce10d0 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x335
  894. fffff803`bea579e0 fffff803`bcd598fa : 00000000`00000000 fffff803`bcf42180 fffff803`bcfbc940 ffff970b`2974d080 : nt!KiRetireDpcList+0x8df
  895. fffff803`bea57c60 00000000`00000000 : fffff803`bea58000 fffff803`bea52000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  896. STACK_COMMAND: kb
  897. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  898. fffff803bcc5d223-fffff803bcc5d224 2 bytes - nt!MiResolvePageTablePage+53
  899. [ 80 f6:00 ed ]
  900. fffff803bce4fc8d-fffff803bce4fc8f 3 bytes - nt!ExFreePoolWithTag+1c8d
  901. [ 40 fb f6:80 76 ed ]
  902. fffff803bce4fcc1-fffff803bce4fcc2 2 bytes - nt!ExFreePoolWithTag+1cc1 (+0x34)
  903. [ 80 fa:00 e2 ]
  904. 7 errors : !nt (fffff803bcc5d223-fffff803bce4fcc2)
  905. MODULE_NAME: memory_corruption
  906.  
  907. IMAGE_NAME: memory_corruption
  908.  
  909. FOLLOWUP_NAME: memory_corruption
  910. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  911. MEMORY_CORRUPTOR: LARGE
  912. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  913. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  914. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  915. TARGET_TIME: 2017-08-22T08:41:17.000Z
  916. SUITE_MASK: 272
  917. PRODUCT_TYPE: 1
  918. USER_LCID: 0
  919. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  920. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  921. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement