Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 06 minutes and 04 seconds
- ================================ SYSTEM ================================
- MANUFACTURER: Gigabyte Technology Co., Ltd.
- ================================= BIOS =================================
- VENDOR: American Megatrends Inc.
- VERSION: F16
- DATE: 10/24/2012
- If you see multiple versions/dates above, it's because the information
- was pulled from different dump files. You can assume the higher version
- or later date is the correct info for the PC.
- ============================= MOTHERBOARD ==============================
- MANUFACTURER: Gigabyte Technology Co., Ltd.
- PRODUCT: Z77X-D3H
- ================================= RAM ==================================
- Size Speed Manufacturer Part No.
- -------------- -------------- ------------------- ----------------------
- 0MHz
- 8192MB 1600MHz 859B BLS8G3D1609DS1S00.
- 0MHz
- 8192MB 1600MHz 859B BLS8G3D1609DS1S00.
- More RAM information can be found below in the full BIOS section.
- ================================= CPU ==================================
- Processor Version: Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz
- COUNT: 8
- MHZ: 3503
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: 3a
- STEPPING: 9
- MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1593.amd64fre.rs1_release.170731-1934
- BUILD_VERSION: 10.0.14393.1593 (rs1_release.170731-1934)
- BUILD: 14393
- SERVICEPACK: 1593
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- BUILD_TIMESTAMP: 2017-08-01 14:29:18
- BUILDDATESTAMP: 170731-1934
- BUILDLAB: rs1_release
- BUILDOSVER: 10.0.14393.1593
- If you see multiple OS versions listed above, it's because the dump
- files were created at different times and Windows has updated to a
- new version.
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- ==================== Dump File: 082217-7921-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Kernel base = 0xfffff801`3f81d000 PsLoadedModuleList = 0xfffff801`3fb1b040
- Debug session time: Tue Aug 22 02:07:37.735 2017 (UTC - 4:00)
- System Uptime: 0 days 0:33:40.460
- BugCheck A, {fffffffffffffff9, 2, 0, fffff8013f847f3b}
- Probably caused by : hardware ( USBXHCI!Control_Transfer_Complete+cb )
- Followup: MachineOwner
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffffffffffffff9, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8013f847f3b, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8013fbbc338: Unable to get MiVisibleState
- fffffffffffffff9
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!RtlpWalkFrameChain+4fb
- fffff801`3f847f3b e80f866007 call fffff801`46e5054f
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff80141656720 -- (.trap 0xfffff80141656720)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000010 rbx=0000000000000000 rcx=fffff80141657730
- rdx=fffff80db1ede6ec rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8013f847f3b rsp=fffff801416568b0 rbp=0000000000000001
- r8=00007ffffffeffff r9=0000000000000003 r10=fffff80141656b28
- r11=fffff80141656910 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- nt!RtlpWalkFrameChain+0x4fb:
- fffff801`3f847f3b e80f866007 call fffff801`46e5054f
- Resetting default scope
- MISALIGNED_IP:
- nt!RtlpWalkFrameChain+4fb
- fffff801`3f847f3b e80f866007 call fffff801`46e5054f
- LAST_CONTROL_TRANSFER: from fffff8013f977a29 to fffff8013f96c870
- STACK_TEXT:
- fffff801`416565d8 fffff801`3f977a29 : 00000000`0000000a ffffffff`fffffff9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff801`416565e0 fffff801`3f976007 : ffffb70c`efa55c60 fffff801`3f858a02 ffffb70c`f318a520 ffffb70c`f318a520 : nt!KiBugCheckDispatch+0x69
- fffff801`41656720 fffff801`3f847f3b : 00000000`000017a4 fffff801`41656a48 00000000`00000004 fffff801`3f84790b : nt!KiPageFault+0x247
- fffff801`416568b0 fffff801`3f847853 : 00000000`00000004 fffff801`3ff2aa4e 00000000`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0x4fb
- fffff801`41656fd0 fffff801`3f8d6044 : 00000000`00000003 ffffb70c`eea52c98 00000000`00000000 fffff801`41652000 : nt!RtlWalkFrameChain+0x93
- fffff801`41657020 fffff801`3ff24b9c : ffffb70c`eea52c80 00000000`00000002 00000000`00000001 00000000`00000001 : nt!RtlCaptureStackBackTrace+0x44
- fffff801`41657050 fffff801`3ff24c4f : ffffeef7`6dc33d40 ffffeef7`7bb6e198 ffffeef7`7bbddb70 ffffeef7`7bbddee8 : nt!IovpLogStackCallout+0x1c
- fffff801`41657080 fffff801`3ff249c5 : 00000000`00000030 00000000`00000001 ffffb70c`f31821d0 fffff80d`b0a5224c : nt!ViPoolLogStackTrace+0x9f
- fffff801`416570c0 fffff801`3fa65d63 : 00000000`00000030 fffff801`3fa64a10 ffffb70c`efec5dc0 00000000`00000001 : nt!VfFreePoolNotification+0x5d
- fffff801`416570f0 fffff801`3f90dc1a : ffffb70c`f505f4a0 ffffb70c`f62d4c80 ffffb70c`f62d4c80 ffffb70c`00000003 : nt!ExFreePoolWithTag+0x1d63
- fffff801`416571d0 fffff801`3f84e762 : ffffb70c`f00dc820 fffff801`416572b9 ffffb70c`f2ff7e20 ffffb70c`f00dce93 : nt!IopUnloadSafeCompletion+0x5e
- fffff801`41657200 fffff801`3ff14f65 : ffffb70c`f00dc820 fffff801`41657399 ffffb70c`f318cb00 00000000`00000001 : nt!IopfCompleteRequest+0x112
- fffff801`41657320 fffff80d`ae2a6907 : 00000000`00000000 ffffb70c`f00dc820 ffffb70c`f318cbb0 ffffb70c`f318cbd0 : nt!IovCompleteRequest+0x1c1
- fffff801`41657400 fffff80d`ae2a3190 : 00000000`00000001 fffff801`00000000 00000000`00000008 fffff801`41657502 : Wdf01000!FxRequest::CompleteInternal+0x247
- fffff801`416574b0 fffff80d`b1ea398b : 00000000`00000040 ffffb70c`f318cbb0 ffffb70c`f26a5eb0 00000000`00000000 : Wdf01000!imp_WdfRequestComplete+0x90
- fffff801`41657510 fffff80d`b1ea35f0 : ffffb70c`f318cd50 fffff801`41657801 00000000`00000000 ffffb70c`f26a5eb0 : USBXHCI!Control_Transfer_Complete+0xcb
- fffff801`41657580 fffff80d`b1eadaef : ffffb70c`f318cd50 ffffb70c`f26a5eb0 ffffb70c`f26a5eb0 00000000`00000000 : USBXHCI!Control_Transfer_CompleteCancelable+0x3c
- fffff801`416575d0 fffff80d`b1eaed77 : fffff801`416577a0 ffffb70c`f2a11900 ffffb70c`f26daaf0 fffff801`3f839b6f : USBXHCI!Control_ProcessTransferEventWithED1+0x3cf
- fffff801`41657660 fffff80d`b1ea174b : 00000000`00000004 fffff801`41657778 00000000`00000008 fffff801`416577a0 : USBXHCI!Endpoint_TransferEventHandler+0xb7
- fffff801`416576d0 fffff80d`b1eaa80d : ffffb70c`f2a12cc0 ffffb70c`f2a12ff8 ffff8c81`e23ee0d0 fffff801`3fb5af10 : USBXHCI!UsbDevice_TransferEventHandler+0x87
- fffff801`41657730 fffff801`3f853fb5 : ffffffff`fffffffe 00000679`d24c33fd fffff801`3fb5af10 fffff801`3fb58180 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x74d
- fffff801`41657890 fffff801`3f85353f : 00000000`000000fe 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x335
- fffff801`416579e0 fffff801`3f96f8fa : 00000000`00000000 fffff801`3fb58180 fffff801`3fbd2940 ffffb70c`f5d21800 : nt!KiRetireDpcList+0x8df
- fffff801`41657c60 00000000`00000000 : fffff801`41658000 fffff801`41652000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 1624f2973c5e8636efa0624ae8494eca04e6a152
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1c42211bfdf926657c6d72a7f946ee8b542d58d7
- THREAD_SHA1_HASH_MOD: ae9f0ae62b3d0c10d47da5e1a7aa1dcf46606735
- FOLLOWUP_IP:
- USBXHCI!Control_Transfer_Complete+cb
- fffff80d`b1ea398b 488d4d58 lea rcx,[rbp+58h]
- FAULT_INSTR_CODE: 584d8d48
- SYMBOL_STACK_INDEX: f
- SYMBOL_NAME: USBXHCI!Control_Transfer_Complete+cb
- FOLLOWUP_NAME: MachineOwner
- IMAGE_NAME: hardware
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- IMAGE_VERSION: 10.0.14393.1358
- MODULE_NAME: hardware
- FAILURE_BUCKET_ID: IP_MISALIGNED
- BUCKET_ID: IP_MISALIGNED
- PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
- TARGET_TIME: 2017-08-22T06:07:37.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:ip_misaligned
- FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
- Followup: MachineOwner
- ========================================================================
- ===================== 3RD PARTY DRIVER QUICK LIST ======================
- ========================================================================
- unavailable - ATMFD.DLL - Adobe Type Manager Font Driver
- Dec 14 2011 - vsflt67.sys -
- May 03 2012 - GEARAspiWDM.sys -
- Dec 25 2012 - ammntdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Dec 25 2012 - amwrtdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Dec 25 2012 - ambakdrv.sys - Aomei driver (Aomei Technology Co)
- Jul 16 2013 - L1C63x64.sys -
- Nov 05 2014 - tap0901.sys - TAP-Win32 Virtual Private Network Driver 0901 (OpenVPN by OpenVPN Technologies) https://openvpn.net/
- Apr 13 2015 - mvs91xx.sys - Marvell Magni Windows Driver (Marvell Semiconductor, Inc.)
- Apr 13 2015 - mvxxmm.sys -
- Jun 02 2015 - cmudaxp.sys -
- Jun 09 2015 - lgcoretemp.sys - CPU Core Temperature Monitor http://support.logitech.com/
- Jul 07 2015 - TeeDriverW8x64.sys - Intel® Management Engine Interface
- Sep 16 2015 - rzpnk.sys - Razer Overlay Support https://www.razerzone.com/
- Sep 17 2015 - rzpmgrk.sys - Razer Overlay Support https://www.razerzone.com/
- Jun 13 2016 - LGBusEnum.sys - Logitech GamePanel Virtual Bus Enumerator Driver http://support.logitech.com/
- Jun 13 2016 - LGJoyXlCore.sys - Logitech Gaming Software driver http://support.logitech.com/
- Jun 13 2016 - LGVirHid.sys - Logitech Gamepanel Virtual HID Device driver http://support.logitech.com/
- Jun 15 2016 - rzendpt.sys - Razer RzEndPt driver https://www.razerzone.com/
- Jun 15 2016 - rzudd.sys - Razer Rzudd Engine Driver https://www.razerzone.com/
- Sep 30 2016 - RTCore64.sys - MSI Afterburner http://www.msi.com/ or EVGA Precision X http://www.evga.com/
- Jan 25 2017 - ehdrv.sys - ESET Helper driver https://www.eset.com/
- Jan 25 2017 - epfwwfpr.sys -
- Jun 02 2017 - MBAMSwissArmy.sys - MalwareBytes Anti-Malware system driver https://www.malwarebytes.com/
- Jun 19 2017 - eamonm.sys - ESET Anti-virus monitor https://www.eset.com/
- Jun 21 2017 - em000k_64.dll -
- Jul 18 2017 - em018k_64.dll -
- Aug 09 2017 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
- Aug 10 2017 - em006_64.dll -
- ========================================================================
- ========================== 3RD PARTY DRIVERS ===========================
- ========================================================================
- Image path: \SystemRoot\System32\ATMFD.DLL
- Image name: ATMFD.DLL
- Info Link : http://www.carrona.org/drivers/driver.php?id=ATMFD.DLL
- ADA Info : Adobe Type Manager Font Driver
- Timestamp : unavailable (00000000)
- Image path: \SystemRoot\system32\DRIVERS\vsflt67.sys
- Image name: vsflt67.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=vsflt67.sys
- Timestamp : Wed Dec 14 2011
- Image path: \SystemRoot\system32\DRIVERS\GEARAspiWDM.sys
- Image name: GEARAspiWDM.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=GEARAspiWDM.sys
- Timestamp : Thu May 3 2012
- Image path: \??\C:\WINDOWS\system32\ammntdrv.sys
- Image name: ammntdrv.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=ammntdrv.sys
- ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Timestamp : Tue Dec 25 2012
- Image path: \??\C:\WINDOWS\system32\amwrtdrv.sys
- Image name: amwrtdrv.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=amwrtdrv.sys
- ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Timestamp : Tue Dec 25 2012
- Image path: \SystemRoot\system32\ambakdrv.sys
- Image name: ambakdrv.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=ambakdrv.sys
- ADA Info : Aomei driver (Aomei Technology Co)
- Timestamp : Tue Dec 25 2012
- Image path: \SystemRoot\System32\drivers\L1C63x64.sys
- Image name: L1C63x64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=L1C63x64.sys
- Timestamp : Tue Jul 16 2013
- Image path: \SystemRoot\System32\drivers\tap0901.sys
- Image name: tap0901.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=tap0901.sys
- ADA Info : TAP-Win32 Virtual Private Network Driver 0901 (OpenVPN by OpenVPN Technologies) https://openvpn.net/
- Timestamp : Wed Nov 5 2014
- Image path: \SystemRoot\System32\drivers\mvs91xx.sys
- Image name: mvs91xx.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=mvs91xx.sys
- ADA Info : Marvell Magni Windows Driver (Marvell Semiconductor, Inc.)
- Timestamp : Mon Apr 13 2015
- Image path: \SystemRoot\System32\drivers\mvxxmm.sys
- Image name: mvxxmm.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=mvxxmm.sys
- Timestamp : Mon Apr 13 2015
- Image path: \SystemRoot\system32\drivers\cmudaxp.sys
- Image name: cmudaxp.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=cmudaxp.sys
- Timestamp : Tue Jun 2 2015
- Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
- Image name: lgcoretemp.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=lgcoretemp.sys
- ADA Info : CPU Core Temperature Monitor http://support.logitech.com/
- Timestamp : Tue Jun 9 2015
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
- ADA Info : Intel® Management Engine Interface
- Timestamp : Tue Jul 7 2015
- Image path: \??\C:\WINDOWS\system32\drivers\rzpnk.sys
- Image name: rzpnk.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
- ADA Info : Razer Overlay Support https://www.razerzone.com/
- Timestamp : Wed Sep 16 2015
- Image path: \??\C:\WINDOWS\system32\drivers\rzpmgrk.sys
- Image name: rzpmgrk.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
- ADA Info : Razer Overlay Support https://www.razerzone.com/
- Timestamp : Thu Sep 17 2015
- Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
- Image name: LGBusEnum.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=LGBusEnum.sys
- ADA Info : Logitech GamePanel Virtual Bus Enumerator Driver http://support.logitech.com/
- Timestamp : Mon Jun 13 2016
- Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
- Image name: LGJoyXlCore.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=LGJoyXlCore.sys
- ADA Info : Logitech Gaming Software driver http://support.logitech.com/
- Timestamp : Mon Jun 13 2016
- Image path: \SystemRoot\system32\drivers\LGVirHid.sys
- Image name: LGVirHid.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=LGVirHid.sys
- ADA Info : Logitech Gamepanel Virtual HID Device driver http://support.logitech.com/
- Timestamp : Mon Jun 13 2016
- Image path: \SystemRoot\System32\drivers\rzendpt.sys
- Image name: rzendpt.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
- ADA Info : Razer RzEndPt driver https://www.razerzone.com/
- Timestamp : Wed Jun 15 2016
- Image path: \SystemRoot\System32\drivers\rzudd.sys
- Image name: rzudd.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzudd.sys
- ADA Info : Razer Rzudd Engine Driver https://www.razerzone.com/
- Timestamp : Wed Jun 15 2016
- Image path: \??\C:\Program Files (x86)\MSI Afterburner\RTCore64.sys
- Image name: RTCore64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=RTCore64.sys
- ADA Info : MSI Afterburner http://www.msi.com/ or EVGA Precision X http://www.evga.com/
- Timestamp : Fri Sep 30 2016
- Image path: \SystemRoot\system32\DRIVERS\ehdrv.sys
- Image name: ehdrv.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=ehdrv.sys
- ADA Info : ESET Helper driver https://www.eset.com/
- Timestamp : Wed Jan 25 2017
- Image path: \SystemRoot\system32\DRIVERS\epfwwfpr.sys
- Image name: epfwwfpr.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=epfwwfpr.sys
- Timestamp : Wed Jan 25 2017
- Image path: \??\C:\WINDOWS\system32\drivers\MBAMSwissArmy.sys
- Image name: MBAMSwissArmy.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=MBAMSwissArmy.sys
- ADA Info : MalwareBytes Anti-Malware system driver https://www.malwarebytes.com/
- Timestamp : Fri Jun 2 2017
- Image path: \SystemRoot\system32\DRIVERS\eamonm.sys
- Image name: eamonm.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=eamonm.sys
- ADA Info : ESET Anti-virus monitor https://www.eset.com/
- Timestamp : Mon Jun 19 2017
- Image path: \??\C:\Program Files\ESET\ESET NOD32 Antivirus\Modules\em000k_64\1012\em000k_64.dll
- Image name: em000k_64.dll
- Info Link : http://www.carrona.org/drivers/driver.php?id=em000k_64.dll
- Timestamp : Wed Jun 21 2017
- Image path: \??\C:\Program Files\ESET\ESET NOD32 Antivirus\Modules\em018k_64\1502\em018k_64.dll
- Image name: em018k_64.dll
- Info Link : http://www.carrona.org/drivers/driver.php?id=em018k_64.dll
- Timestamp : Tue Jul 18 2017
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_9ab613610b40aa98\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Wed Aug 9 2017
- Image path: \??\C:\Program Files\ESET\ESET NOD32 Antivirus\Modules\em006_64\1166\em006_64.dll
- Image name: em006_64.dll
- Info Link : http://www.carrona.org/drivers/driver.php?id=em006_64.dll
- Timestamp : Thu Aug 10 2017
- If any of the above drivers are from Microsoft then please let me know.
- I will have them moved to the Microsoft list on the next update.
- ========================================================================
- ========================== MICROSOFT DRIVERS ===========================
- ========================================================================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
- cdd.dll Canonical Display Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- condrv.sys Console Driver (Microsoft)
- crashdmp.sys Crash Dump Driver
- csc.sys Windows Client Side Caching Driver
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_diskdump.sys Crash Dump Disk Driver
- dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
- dump_storahci.sys MS AHCI Storport Miniport Driver
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- EhStorTcgDrv.sys Microsoft driver for storage devices supporting IEEE 1667 and TCG protocols
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HdAudio.sys High Definition Audio Function driver (Microsoft)
- HIDCLASS.SYS Hid Class Library
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- HTTP.sys HTTP Protocol Stack (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kd.dll Local Kernal Debugger (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
- mmcss.sys MMCSS Driver (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
- mqac.sys Message Queuing Device Driver
- mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
- mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
- mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- ndisuio.sys NDIS User mode I/O driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- Ndu.sys Network Data Usage Monitoring driver (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- NTFS.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- nwifi.sys NativeWiFi Miniport Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- registry.sys Registry Container driver (Microsoft)
- rspndr.sys Link-Layer Topology Responder driver (Microsoft)
- serenum.sys Serial Port Enumerator
- serial.sys Serial Device Driver
- spaceport.sys Storage Spaces driver (Microsoft)
- srv.sys Server driver (Microsoft)
- srv2.sys Smb 2.0 Server driver (Microsoft)
- srvnet.sys Server Network driver (Microsoft)
- storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
- storport.sys A storage port driver that is especially suitable for use with high-performance buses, such as fibre channel buses, and RAID adapters. (Microsoft)
- storqosflt.sys Storage QoS Filter driver (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- TSDDD.dll Framebuffer Display Driver (Microsoft)
- tunnel.sys Microsoft Tunnel Interface driver (Microsoft)
- ucx01000.sys USB Controller Extension (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- usbehci.sys EHCI eUSB Miniport Driver (Microsoft)
- usbhub.sys Default Hub Driver for USB (Microsoft)
- UsbHub3.sys USB3 HUB Driver
- USBPORT.SYS USB 1.1 & 2.0 Port Driver (Microsoft)
- USBXHCI.SYS USB XHCI Driver
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- WudfPf.sys Windows Driver Foundation - User-mode Driver Framework Platform driver (Microsoft)
- Unloaded modules:
- fffff80d`af570000 fffff80d`af57f000 dump_storpor
- fffff80d`af5b0000 fffff80d`af5d4000 dump_storahc
- fffff80d`af600000 fffff80d`af61d000 dump_dumpfve
- fffff80d`b0d00000 fffff80d`b0d14000 dam.sys
- fffff80d`ae4b0000 fffff80d`ae4b8000 eelam.sys
- fffff80d`af470000 fffff80d`af47f000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO ===============================
- ========================================================================
- [SMBIOS Data Tables v2.7]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3104 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version F16
- BIOS Starting Address Segment f000
- BIOS Release Date 10/24/2012
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer Gigabyte Technology Co., Ltd.
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer Gigabyte Technology Co., Ltd.
- Product Z77X-D3H
- Feature Flags 09h
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer Gigabyte Technology Co., Ltd.
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 0
- [Cache Information (Type 7) - Length 19 - Handle 0004h]
- Socket Designation CPU Internal L1
- Cache Configuration 0080h - WT Enabled Int NonSocketed L1
- Maximum Cache Size 0080h - 128K
- Installed Size 0080h - 128K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Other
- Associativity 16-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0005h]
- Socket Designation CPU Internal L2
- Cache Configuration 0081h - WT Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Instruction
- Associativity 16-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0006h]
- Socket Designation CPU Internal L3
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Instruction
- Associativity Specification Reserved
- [Physical Memory Array (Type 16) - Length 23 - Handle 0007h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Number of Memory Devices 4
- [Onboard Devices Information (Type 10) - Length 6 - Handle 0026h]
- Number of Devices 1
- 01: Type Video [enabled]
- [OEM Strings (Type 11) - Length 5 - Handle 0027h]
- Number of Strings 1
- [System Configuration Options (Type 12) - Length 5 - Handle 0028h]
- [Memory Device (Type 17) - Length 34 - Handle 0040h]
- Physical Memory Array Handle 0007h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 34 - Handle 0041h]
- Physical Memory Array Handle 0007h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 859B
- Part Number BLS8G3D1609DS1S00.
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0042h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 0041h
- Mem Array Mapped Adr Handle 0047h
- Interleave Position 01
- Interleave Data Depth 02
- [Processor Information (Type 4) - Length 42 - Handle 0043h]
- Socket Designation Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz
- Processor Type Central Processor
- Processor Family c6h - Specification Reserved
- Processor Manufacturer Intel
- Processor ID a9060300fffbebbf
- Processor Version Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz
- Processor Voltage 8ch - 1.2V
- External Clock 100MHz
- Max Speed 7000MHz
- Current Speed 4400MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0004h
- L2 Cache Handle 0005h
- L3 Cache Handle 0006h
- [Memory Device (Type 17) - Length 34 - Handle 0044h]
- Physical Memory Array Handle 0007h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 34 - Handle 0045h]
- Physical Memory Array Handle 0007h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 859B
- Part Number BLS8G3D1609DS1S00.
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0046h]
- Starting Address 00800000h
- Ending Address 00ffffffh
- Memory Device Handle 0045h
- Mem Array Mapped Adr Handle 0047h
- Interleave Position 02
- Interleave Data Depth 02
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0047h]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0007h
- Partition Width 04
- ========================================================================
- ==================== Dump File: 082217-7500-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Kernel base = 0xfffff802`62c07000 PsLoadedModuleList = 0xfffff802`62f05040
- Debug session time: Tue Aug 22 18:54:06.891 2017 (UTC - 4:00)
- System Uptime: 0 days 0:31:30.617
- BugCheck 124, {0, ffff910f416e0028, f2000040, 10005}
- Probably caused by : GenuineIntel
- Followup: MachineOwner
- WHEA_UNCORRECTABLE_ERROR (124)
- A fatal hardware error has occurred. Parameter 1 identifies the type of error
- source that reported the error. Parameter 2 holds the address of the
- WHEA_ERROR_RECORD structure that describes the error conditon.
- Arguments:
- Arg1: 0000000000000000, Machine Check Exception
- Arg2: ffff910f416e0028, Address of the WHEA_ERROR_RECORD structure.
- Arg3: 00000000f2000040, High order 32-bits of the MCi_STATUS value.
- Arg4: 0000000000010005, Low order 32-bits of the MCi_STATUS value.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x124_GenuineIntel
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
- PROCESS_NAME: System
- CURRENT_IRQL: f
- STACK_TEXT:
- ffffc381`c7b716f8 fffff802`6345327f : 00000000`00000124 00000000`00000000 ffff910f`416e0028 00000000`f2000040 : nt!KeBugCheckEx
- ffffc381`c7b71700 fffff802`62e2d7e4 : ffff910f`416e0028 ffff910f`411c0880 ffff910f`411c0880 ffff910f`411c0880 : hal!HalBugCheckSystem+0xcf
- ffffc381`c7b71740 fffff802`6345376c : 00000000`00000728 00000000`00000001 ffffc381`c7b71b30 00000000`00000000 : nt!WheaReportHwError+0x258
- ffffc381`c7b717a0 fffff802`63453ac4 : ffff910f`00000010 ffff910f`411c0880 ffffc381`c7b71948 ffff910f`411c0880 : hal!HalpMcaReportError+0x50
- ffffc381`c7b718f0 fffff802`634539ae : ffff910f`40689b80 00000000`00000001 00000000`00000001 00000000`00000000 : hal!HalpMceHandlerCore+0xe8
- ffffc381`c7b71940 fffff802`63453bee : 00000000`00000008 00000000`00000001 00000000`00000000 00000000`00000000 : hal!HalpMceHandler+0xda
- ffffc381`c7b71980 fffff802`63453d70 : ffff910f`40689b80 ffffc381`c7b71bb0 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0xce
- ffffc381`c7b719b0 fffff802`62d607fb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
- ffffc381`c7b719e0 fffff802`62d60584 : 00000000`00000000 fffff802`62d60503 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x7b
- ffffc381`c7b71b20 fffff809`0cd41348 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x184
- ffffc381`c7b91858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x18
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 8a3debe308db92f808172b280ea37d168a0241fb
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a3d0fc6f45f5a5bf0f4efdb757bea1ce8adf8158
- THREAD_SHA1_HASH_MOD: 79568083e9b8a322b030a6184dee2335a8d0d817
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: GenuineIntel
- IMAGE_NAME: GenuineIntel
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- FAILURE_BUCKET_ID: 0x124_GenuineIntel_VRF_PROCESSOR_MAE
- BUCKET_ID: 0x124_GenuineIntel_VRF_PROCESSOR_MAE
- PRIMARY_PROBLEM_CLASS: 0x124_GenuineIntel_VRF_PROCESSOR_MAE
- TARGET_TIME: 2017-08-22T22:54:06.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x124_genuineintel_vrf_processor_mae
- FAILURE_ID_HASH: {bc35fdc5-444c-7088-a2e4-fddb46d38cd8}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 082217-7312-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Kernel base = 0xfffff803`bcc07000 PsLoadedModuleList = 0xfffff803`bcf05040
- Debug session time: Tue Aug 22 04:41:17.828 2017 (UTC - 4:00)
- System Uptime: 0 days 2:33:07.554
- BugCheck A, {fffffffffffffff9, 2, 0, fffff803bcc31f3b}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffffffffffffff9, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff803bcc31f3b, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff803bcfa6338: Unable to get MiVisibleState
- fffffffffffffff9
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!RtlpWalkFrameChain+4fb
- fffff803`bcc31f3b e80f866007 call fffff803`c423a54f
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff803bea56080 -- (.trap 0xfffff803bea56080)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=fffff803bea56af8
- rdx=fffff803bce8c478 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff803bcc31f3b rsp=fffff803bea56210 rbp=0000000000000001
- r8=00007ffffffeffff r9=000000000000000d r10=fffff803bea56488
- r11=fffff803bea56270 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe nc
- nt!RtlpWalkFrameChain+0x4fb:
- fffff803`bcc31f3b e80f866007 call fffff803`c423a54f
- Resetting default scope
- MISALIGNED_IP:
- nt!RtlpWalkFrameChain+4fb
- fffff803`bcc31f3b e80f866007 call fffff803`c423a54f
- LAST_CONTROL_TRANSFER: from fffff803bcd61a29 to fffff803bcd56870
- STACK_TEXT:
- fffff803`bea55f38 fffff803`bcd61a29 : 00000000`0000000a ffffffff`fffffff9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff803`bea55f40 fffff803`bcd60007 : ffffdfcb`5e5d88fd 00000000`00000000 00000000`00000000 00000000`000e0f46 : nt!KiBugCheckDispatch+0x69
- fffff803`bea56080 fffff803`bcc31f3b : 00000000`00248e02 fffff803`bea563a8 00000000`00000004 ffff970b`26bd1cf0 : nt!KiPageFault+0x247
- fffff803`bea56210 fffff803`bcc31853 : fffff80e`00000200 00000000`00000020 ffff970b`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0x4fb
- fffff803`bea56930 fffff803`bccc0044 : 00000000`00000003 ffff970b`22e63598 ffff970b`26db11b8 fffff803`bea52000 : nt!RtlWalkFrameChain+0x93
- fffff803`bea56980 fffff803`bd30eb9c : ffff970b`22e63580 00000000`00000002 00000000`00000001 00000000`00000000 : nt!RtlCaptureStackBackTrace+0x44
- fffff803`bea569b0 fffff803`bd30ec4f : ffffed76`a5c2ca78 ffffed76`bb52e160 ffffed76`bb5da970 ffffed76`bb5daed0 : nt!IovpLogStackCallout+0x1c
- fffff803`bea569e0 fffff803`bd30e9c5 : 00000000`00000040 fffff80e`c7f6f278 00000000`00000000 fffff803`bce4ed12 : nt!ViPoolLogStackTrace+0x9f
- fffff803`bea56a20 fffff803`bce4fd63 : 00000000`00000040 fffff80e`c7f75000 ffff970b`26dc88b0 00002ee0`00063000 : nt!VfFreePoolNotification+0x5d
- fffff803`bea56a50 fffff80e`c5e01717 : ffff970b`29fdfa60 ffff970b`26dc88b0 00000000`00000001 000068f4`00000004 : nt!ExFreePoolWithTag+0x1d63
- fffff803`bea56b30 fffff80e`c5e014d4 : ffff970b`26dc88b0 fffff80e`c5e161e8 ffff970b`26db11b8 fffff803`00000048 : usbccgp!DispatchPdoUrb+0x1e7
- fffff803`bea56c50 fffff80e`c5e011b1 : ffff970b`26db8a28 ffff970b`26db8a20 ffff970b`26dc88b0 fffff80e`c5e16178 : usbccgp!DispatchPdoInternalDeviceControl+0x84
- fffff803`bea56cb0 fffff803`bd2fed26 : ffff970b`26db88d0 ffff970b`26db8800 ffff970b`00000000 ffff970b`26dc88b0 : usbccgp!USBC_Dispatch+0x1b1
- fffff803`bea56d70 fffff803`bcc42a02 : ffff970b`26dc88b0 fffff803`bea56ef0 ffff970b`26dbc8e0 ffff970b`29ca54f0 : nt!IovCallDriver+0x252
- fffff803`bea56db0 fffff80e`c5e312a8 : ffff970b`00000200 00000000`00000098 ffff970b`26dc88b0 00000000`00000000 : nt!IofCallDriver+0x72
- fffff803`bea56df0 fffff80e`c64f2222 : 00000000`00000000 ffff970b`26dbc1d0 ffff970b`26dbc1d0 fffff803`bce4e34b : hidusb!HumInternalIoctl+0x2a8
- fffff803`bea570e0 fffff80e`c64f2000 : ffff970b`26dc72a0 00000000`00000000 fffff80e`c65062f8 00000000`00000013 : HIDCLASS!HidpSubmitInterruptRead+0x152
- fffff803`bea57160 fffff803`bcc38762 : ffff970b`26dc88b0 ffff970b`26dc88b0 ffff970b`26dbc1d0 ffff970b`26dc8e01 : HIDCLASS!HidpInterruptReadComplete+0x750
- fffff803`bea57240 fffff803`bd2fef65 : ffff970b`26dc88b0 fffff803`bea573d9 fffff80e`c4d76907 fffff803`bea57439 : nt!IopfCompleteRequest+0x112
- fffff803`bea57360 fffff80e`c4d76907 : 00000620`8014508e ffff970b`26dc88b0 ffff970b`27dfe020 ffff970b`27dfe040 : nt!IovCompleteRequest+0x1c1
- fffff803`bea57440 fffff80e`c4d73190 : ffff970b`00000001 fffff80e`00000000 ffff970b`27dfe102 ffff970b`00000002 : Wdf01000!FxRequest::CompleteInternal+0x247
- fffff803`bea574f0 fffff80e`c7f4a708 : ffff970b`27dfe1c0 ffff970b`27dfe020 ffff970b`26db6ce0 ffff970b`27dfe1c0 : Wdf01000!imp_WdfRequestComplete+0x90
- fffff803`bea57550 fffff80e`c7f3ac5a : ffff970b`27dfe1c0 00000000`00000014 00000000`00000000 ffff970b`27dfe240 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x175a4
- fffff803`bea575b0 fffff80e`c7f3ed77 : ffff970b`264443f0 fffff80e`c7f3a098 ffff970b`26d73110 fffff803`bea57760 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x2ba
- fffff803`bea57660 fffff80e`c7f3174b : 00000000`00000004 fffff803`bea57778 00000000`00000008 fffff803`bea577a0 : USBXHCI!Endpoint_TransferEventHandler+0xb7
- fffff803`bea576d0 fffff80e`c7f3a80d : ffff970b`26bcd8b0 ffff970b`26bcdbe8 ffffcb00`fe9c2440 fffff803`bd41e779 : USBXHCI!UsbDevice_TransferEventHandler+0x87
- fffff803`bea57730 fffff803`bcc3dfb5 : ffffffff`fffffffe 00001d52`3f804f63 fffff803`bcf44f10 fffff803`bcf42180 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x74d
- fffff803`bea57890 fffff803`bcc3d53f : 00000000`000000fe ffff970b`27ce10d0 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x335
- fffff803`bea579e0 fffff803`bcd598fa : 00000000`00000000 fffff803`bcf42180 fffff803`bcfbc940 ffff970b`2974d080 : nt!KiRetireDpcList+0x8df
- fffff803`bea57c60 00000000`00000000 : fffff803`bea58000 fffff803`bea52000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803bcc5d223-fffff803bcc5d224 2 bytes - nt!MiResolvePageTablePage+53
- [ 80 f6:00 ed ]
- fffff803bce4fc8d-fffff803bce4fc8f 3 bytes - nt!ExFreePoolWithTag+1c8d
- [ 40 fb f6:80 76 ed ]
- fffff803bce4fcc1-fffff803bce4fcc2 2 bytes - nt!ExFreePoolWithTag+1cc1 (+0x34)
- [ 80 fa:00 e2 ]
- 7 errors : !nt (fffff803bcc5d223-fffff803bce4fcc2)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-22T08:41:17.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement