Bsod: powodowany przez hal.dll i ntoskml.exe - prz2197 - 24.06.2015 13:55
Witam,
Od pewnego czasu mam problem z uruchomieniem Windows 7. Po załadowaniu systemu działa on około 40 sekund po czym następuje Blue Screen. Na trybie awaryjnym wszystko działa jak należy. Kilka razy otrzymałem monit o to, aby użyć narzędzia do naprawy systemu jednak nic ono nie dało. Chciałbym raczej uniknąć formata, ponieważ system był stawiany około 4 miesiące temu. Dołączam plik dmp
Cytat:Specyfikacja komputera:
System: Windows 7 Professional 64-bit SP1 (oryginalny, pobrany z DreamSpark)
Procesor: Intel Core i5 4460
Płyta główna: Gigabyte GA-H81M-HD3
Zasilacz: SilentiumPC Deus G1 500W
RAM: Kingston HyperX Fury 8GB DDR3
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - thermalfake - 24.06.2015 21:25
Po bojach stoczonych z WinDbg i problemami z ściąganiem z sieci symboli mimo poprawnej konfiguracji ten się nareszcie poddał i działa jak powinien więc już mogę analizować mini zrzuty.
Więc po zapoznaniu się błąd 0x124 przeważnie wskazuje na problemy sprzętowe lecz tutaj błąd te a raczej przyczyna jest nieudokumentowana więc prawdy się nie dowiemy bez kontaktu z intel'em gdyż debugger wskazuje na błąd architektury sprzętowej procesora.
Uwzględniając to iż tryb awaryjny działa poprawnie (ładowane są tylko podstawowe elementy systemu bez sterowników i usług użytkownika) i to co zobaczyłem dodatkowo oprócz samego debuga można stwierdzić
- błąd nastąpił w procesie ekrn.exe czyli Eset Smart Security więc należało by go w awaryjnym wyciąć dedykowanym deinstalatorem -> http://kb.eset.pl/esetkb/index?page=content&id=SOLN2289
- jeśli tak ryje tylko eset to masz przyczynę a jeśli nie to lecisz dalej
W pierwszej kolejności syf instalowany podczas instalacji oprogramowania z płyty
Gigabyte EasyTune/EasySaver
GIGABYTE On/Off Charge
nVidia Streaming Kernel - zainstalować tylko sterownik grafiki, nic ponadto
Reszta jeśli ma jakieś usługi to je powyłączać
CDRTools/ElbyCDIO/DVD Region Killer/VirtualCloneDrive (elby CloneDVD™ 2)/AnyDVD
Daemon Tools
VirtualBox
Microsoft Virtual PC
Nero Backup
Cytat:===============================================================================
Common Platform Error Record @ fffffa8009e5e028
-------------------------------------------------------------------------------
Record Id : 01d0adc7d0c99f64
Severity : Fatal (1)
Length : 928
Creator : Microsoft
Notify Type : Machine Check Exception
Timestamp : 6/23/2015 15:19:45
Flags : 0x00000000
===============================================================================
Section 0 : Processor Generic
-------------------------------------------------------------------------------
Descriptor @ fffffa8009e5e0a8
Section @ fffffa8009e5e180
Offset : 344
Length : 192
Flags : 0x00000001 Primary
Severity : Fatal
Proc. Type : x86/x64
Instr. Set : x64
Error Type : Micro-Architectural Error
Flags : 0x00
CPU Version : 0x00000000000306c3
Processor ID : 0x0000000000000002
===============================================================================
Section 1 : x86/x64 Processor Specific
-------------------------------------------------------------------------------
Descriptor @ fffffa8009e5e0f0
Section @ fffffa8009e5e240
Offset : 536
Length : 128
Flags : 0x00000000
Severity : Fatal
Local APIC Id : 0x0000000000000002
CPU Id : c3 06 03 00 00 08 10 02 - bf fb fa 7f ff fb eb bf
00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
Proc. Info 0 @ fffffa8009e5e240
===============================================================================
Section 2 : x86/x64 MCA
-------------------------------------------------------------------------------
Descriptor @ fffffa8009e5e138
Section @ fffffa8009e5e2c0
Offset : 664
Length : 264
Flags : 0x00000000
Severity : Fatal
Error : Internal unclassified (Proc 1 Bank 1)
Status : 0xbf80000000200401
Address : 0x00000000fee00000
Misc. : 0x0000000000000086
A niżej pełny debug
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Downloads\062315-17986-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`0325e000 PsLoadedModuleList = 0xfffff800`034a5730
Debug session time: Tue Jun 23 17: 19: 45.226 2015 (UTC + 2: 00)
System Uptime: 0 days 0: 01: 35.537
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, fffffa8009e5e028, bf800000, 200401}
Probably caused by : hardware
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa8009e5e028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000bf800000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000200401, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'srv' and 'IntcDAud.sys' overlap
BUGCHECK_STR: 0x124_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: f
STACK_TEXT:
fffff880`009f7a58 fffff800`03227a3b : 00000000`00000124 00000000`00000000 fffffa80`09e5e028 00000000`bf800000 : nt!KeBugCheckEx
fffff880`009f7a60 fffff800`033ebc33 : 00000000`00000001 fffffa80`09efd590 00000000`00000000 fffffa80`09efd5e0 : hal!HalBugCheckSystem+0x1e3
fffff880`009f7aa0 fffff800`03227700 : 00000000`00000728 fffffa80`09efd590 fffff880`009f7e30 fffff880`009f7e00 : nt!WheaReportHwError+0x263
fffff880`009f7b00 fffff800`03227052 : fffffa80`09efd590 fffff880`009f7e30 fffffa80`09efd590 00000000`00000000 : hal!HalpMcaReportError+0x4c
fffff880`009f7c50 fffff800`03226f0d : 00000000`00000004 00000000`00000001 fffff880`009f7eb0 00000000`00000000 : hal!HalpMceHandler+0x9e
fffff880`009f7c90 fffff800`0321ae88 : 00000000`00000002 00000000`00001000 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0x55
fffff880`009f7cc0 fffff800`032d11ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
fffff880`009f7cf0 fffff800`032d1013 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x6c
fffff880`009f7e30 fffff800`032c9394 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x153
fffff880`08fe5638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memmove+0xb4
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_MAE
BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_MAE
Followup: MachineOwner
---------
rax=0000000000000000 rbx=00000000bf800000 rcx=0000000000000124
rdx=0000000000000000 rsi=0000000000000003 rdi=fffffa8009e5e148
rip=fffff800032d28c0 rsp=fffff880009f7a58 rbp=fffffa8009f0a4f9
r8=fffffa8009e5e028 r9=00000000bf800000 r10=0000000000200401
r11=0000000000000002 r12=fffff80003215000 r13=fffffa8009f0a4a0
r14=fffffa80067582d8 r15=0000000000000000
iopl=0 ov up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000a06
nt!KeBugCheckEx:
fffff800`032d28c0 48894c2408 mov qword ptr [rsp+8],rcx ss: 0018: fffff880`009f7a60=0000000000000124
Child-SP RetAddr : Args to Child : Call Site
fffff880`009f7a58 fffff800`03227a3b : 00000000`00000124 00000000`00000000 fffffa80`09e5e028 00000000`bf800000 : nt!KeBugCheckEx
fffff880`009f7a60 fffff800`033ebc33 : 00000000`00000001 fffffa80`09efd590 00000000`00000000 fffffa80`09efd5e0 : hal!HalBugCheckSystem+0x1e3
fffff880`009f7aa0 fffff800`03227700 : 00000000`00000728 fffffa80`09efd590 fffff880`009f7e30 fffff880`009f7e00 : nt!WheaReportHwError+0x263
fffff880`009f7b00 fffff800`03227052 : fffffa80`09efd590 fffff880`009f7e30 fffffa80`09efd590 00000000`00000000 : hal!HalpMcaReportError+0x4c
fffff880`009f7c50 fffff800`03226f0d : 00000000`00000004 00000000`00000001 fffff880`009f7eb0 00000000`00000000 : hal!HalpMceHandler+0x9e
fffff880`009f7c90 fffff800`0321ae88 : 00000000`00000002 00000000`00001000 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0x55
fffff880`009f7cc0 fffff800`032d11ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
fffff880`009f7cf0 fffff800`032d1013 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x6c
fffff880`009f7e30 fffff800`032c9394 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x153 (TrapFrame @ fffff880`009f7e30)
fffff880`08fe5638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memmove+0xb4
start end module name
fffff800`00bc4000 fffff800`00bce000 kdcom kdcom.dll Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff800`03215000 fffff800`0325e000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff800`0325e000 fffff800`0384a000 nt ntkrnlmp.exe Mon May 25 19: 07: 52 2015 (556356E8)
fffff880`00c0b000 fffff880`00c5a000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 14: 03: 51 2010 (4CE7C737)
fffff880`00c5a000 fffff880`00c6e000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00c6e000 fffff880`00ccc000 CLFS CLFS.SYS Wed Mar 04 04: 21: 12 2015 (54F67A28)
fffff880`00ccc000 fffff880`00d41000 CI CI.dll Fri Jun 27 04: 04: 21 2014 (53ACD125)
fffff880`00d41000 fffff880`00d9d000 volmgrx volmgrx.sys Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`00d9d000 fffff880`00dc7000 ataport ataport.SYS Mon Aug 05 03: 02: 45 2013 (51FEF9B5)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00e40000 fffff880`00e4a000 iusb3hcs iusb3hcs.sys Wed Feb 12 12: 06: 11 2014 (52FB55A3)
fffff880`00e4a000 fffff880`00e5f000 partmgr partmgr.sys Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00e5f000 fffff880`00e74000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00e74000 fffff880`00e8e000 mountmgr mountmgr.sys Tue Feb 03 03: 14: 35 2015 (54D02F0B)
fffff880`00e8e000 fffff880`00e97000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00e97000 fffff880`00ea2000 msahci msahci.sys Sat Nov 20 11: 33: 58 2010 (4CE7A416)
fffff880`00ea2000 fffff880`00eb2000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00eb2000 fffff880`00f74000 Wdf01000 Wdf01000.sys Sat Jun 22 05: 13: 05 2013 (51C51641)
fffff880`00f74000 fffff880`00f84000 WDFLDR WDFLDR.SYS Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`00f84000 fffff880`00fdb000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`00fdb000 fffff880`00fe4000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00fe4000 fffff880`00fee000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`01064000 storport storport.sys Tue Feb 04 02: 36: 50 2014 (52F04432)
fffff880`01064000 fffff880`0106f000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`0106f000 fffff880`010bb000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`010bb000 fffff880`010cf000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`010eb000 fffff880`013ae000 iaStorA iaStorA.sys Fri Apr 04 01: 00: 05 2014 (533DE7F5)
fffff880`013ae000 fffff880`013e8000 fvevol fvevol.sys Thu Jan 24 04: 11: 24 2013 (5100A65C)
fffff880`01420000 fffff880`015c9000 Ntfs Ntfs.sys Fri Jan 24 02: 14: 50 2014 (52E1BE8A)
fffff880`015c9000 fffff880`015f9000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`01600000 fffff880`01616000 NBVol NBVol.sys Tue Nov 22 02: 22: 00 2011 (4ECAF938)
fffff880`01616000 fffff880`01628000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`01628000 fffff880`01633000 iaStorF iaStorF.sys Fri Apr 04 01: 00: 09 2014 (533DE7F9)
fffff880`01633000 fffff880`0163c000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`0163c000 fffff880`01652000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01652000 fffff880`016b0000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`016b0000 fffff880`016cb000 ksecdd ksecdd.sys Mon May 25 18: 55: 06 2015 (556353EA)
fffff880`016cb000 fffff880`0173d000 cng cng.sys Fri Jan 30 04: 17: 08 2015 (54CAF7B4)
fffff880`0173d000 fffff880`0174e000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`0174e000 fffff880`01758000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`01758000 fffff880`017a1000 fwpkclnt fwpkclnt.sys Sat Apr 05 03: 23: 21 2014 (533F5B09)
fffff880`017a1000 fffff880`017ed000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`01800000 fffff880`01860000 NETIO NETIO.SYS Tue Nov 26 11: 21: 01 2013 (5294760D)
fffff880`01860000 fffff880`0188c000 ksecpkg ksecpkg.sys Mon May 25 19: 13: 28 2015 (55635838)
fffff880`0188c000 fffff880`018a2000 epfwwfp epfwwfp.sys Wed Jan 28 14: 02: 37 2015 (54C8DDED)
fffff880`018a2000 fffff880`018b2000 vmstorfl vmstorfl.sys Sat Nov 20 10: 57: 30 2010 (4CE79B8A)
fffff880`018b2000 fffff880`018ba000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`018ba000 fffff880`018c4000 speedfan speedfan.sys Sat Dec 29 21: 59: 35 2012 (50DF59B7)
fffff880`018c9000 fffff880`019bb000 ndis ndis.sys Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`019bb000 fffff880`019f5000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`019f5000 fffff880`019fe000 NBVolUp NBVolUp.sys Tue Nov 22 02: 25: 20 2011 (4ECAFA00)
fffff880`01a00000 fffff880`01bff000 tcpip tcpip.sys Sat Apr 05 03: 26: 44 2014 (533F5BD4)
fffff880`03c00000 fffff880`03ec3000 dump_iaStorA dump_iaStorA.sys Fri Apr 04 01: 00: 05 2014 (533DE7F5)
fffff880`03f2e000 fffff880`03f76000 dtsoftbus01 dtsoftbus01.sys Fri Feb 21 10: 49: 36 2014 (53072130)
fffff880`03f76000 fffff880`03fa0000 cdrom cdrom.sys Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`03fa0000 fffff880`03ffa000 usbhub usbhub.sys Wed Nov 27 02: 41: 36 2013 (52954DD0)
fffff880`04000000 fffff880`0404e000 mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 46: 28 2011 (4E17C104)
fffff880`0404e000 fffff880`04072000 mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 39: 37 2011 (4DB781E9)
fffff880`04072000 fffff880`04089000 atksgt atksgt.sys Sat Jun 04 17: 22: 26 2011 (4DEA4DB2)
fffff880`04089000 fffff880`040af000 HD_Hypervisor_amd64 HD-Hypervisor-amd64.sys Tue Mar 10 11: 21: 42 2015 (54FEC5B6)
fffff880`040b2000 fffff880`0417b000 HTTP HTTP.sys Wed Feb 25 04: 17: 55 2015 (54ED3EE3)
fffff880`0417b000 fffff880`04199000 bowser bowser.sys Wed Feb 23 05: 55: 04 2011 (4D649328)
fffff880`04199000 fffff880`041b1000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`041b1000 fffff880`041de000 mrxsmb mrxsmb.sys Wed Apr 27 04: 40: 38 2011 (4DB78226)
fffff880`041de000 fffff880`041ec000 lirsgt lirsgt.sys Mon Sep 28 17: 10: 35 2009 (4AC0D1EB)
fffff880`06e00000 fffff880`06e1d000 vpcusb vpcusb.sys Wed Sep 23 03: 32: 39 2009 (4AB97AB7)
fffff880`06e1d000 fffff880`06e32000 NDProxy NDProxy.SYS Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`06e44000 fffff880`06f2a000 VBoxDrv VBoxDrv.sys Mon Mar 16 17: 36: 37 2015 (55070695)
fffff880`06f32000 fffff880`06f46000 termdd termdd.sys Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff880`06f46000 fffff880`06f97000 rdbss rdbss.sys Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`06f97000 fffff880`06fa3000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`06fa3000 fffff880`06fae000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`06fae000 fffff880`06fcc000 ISODrv64 ISODrv64.sys Thu Nov 21 02: 22: 28 2013 (528D6054)
fffff880`06fcc000 fffff880`06fd6000 ElbyCDIO ElbyCDIO.sys Tue Feb 17 18: 11: 23 2009 (499AEFBB)
fffff880`06fd6000 fffff880`06fe5000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`06fe5000 fffff880`06ff7000 umbus umbus.sys Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`07000000 fffff880`07022000 tdx tdx.sys Tue Nov 11 02: 46: 26 2014 (54616A72)
fffff880`07022000 fffff880`0702f000 TDI TDI.SYS Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`0702f000 fffff880`0706b000 vpchbus vpchbus.sys Wed Sep 23 03: 32: 32 2009 (4AB97AB0)
fffff880`07071000 fffff880`07140000 eamonm eamonm.sys Tue Jan 20 11: 39: 35 2015 (54BE3067)
fffff880`07140000 fffff880`07149000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`07149000 fffff880`07150000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`07150000 fffff880`0717d000 ehdrv ehdrv.sys Tue Jan 20 11: 39: 52 2015 (54BE3078)
fffff880`0717d000 fffff880`0718b000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`0718b000 fffff880`071b0000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`071b0000 fffff880`071c0000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`071c0000 fffff880`071c9000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`071c9000 fffff880`071d2000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`071d2000 fffff880`071db000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`071db000 fffff880`071e6000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`071e6000 fffff880`071f7000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`07400000 fffff880`0740f000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`0740f000 fffff880`0742c000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`0742c000 fffff880`07447000 wanarp wanarp.sys Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`07447000 fffff880`0749d180 vpcvmm vpcvmm.sys Wed Sep 23 03: 32: 38 2009 (4AB97AB6)
fffff880`0749e000 fffff880`074c4000 VBoxUSBMon VBoxUSBMon.sys Mon Mar 16 17: 35: 44 2015 (55070660)
fffff880`074e0000 fffff880`07569000 afd afd.sys Fri May 30 08: 45: 48 2014 (5388291C)
fffff880`07569000 fffff880`075ae000 netbt netbt.sys Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`075ae000 fffff880`075b7000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`075b7000 fffff880`075dd000 pacer pacer.sys Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`075dd000 fffff880`075eb000 EpfwLWF EpfwLWF.sys Tue Jan 20 11: 41: 00 2015 (54BE30BC)
fffff880`075eb000 fffff880`075ff000 vpcnfltr vpcnfltr.sys Wed Sep 23 03: 32: 30 2009 (4AB97AAE)
fffff880`07600000 fffff880`07624000 HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`07624000 fffff880`07625e80 USBD USBD.SYS Wed Nov 27 02: 41: 03 2013 (52954DAF)
fffff880`07626000 fffff880`07642000 TeeDriverx64 TeeDriverx64.sys Thu Sep 05 20: 02: 18 2013 (5228C72A)
fffff880`07642000 fffff880`07654000 usbehci usbehci.sys Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`07654000 fffff880`076aa000 USBPORT USBPORT.SYS Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`076aa000 fffff880`076b6000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`076b8000 fffff880`077ad000 dxgkrnl dxgkrnl.sys Mon Jun 16 02: 58: 04 2014 (539E411C)
fffff880`077ad000 fffff880`077f3000 dxgmms1 dxgmms1.sys Wed Apr 10 05: 27: 15 2013 (5164DC13)
fffff880`077f3000 fffff880`077fe000 rdpbus rdpbus.sys Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`07800000 fffff880`078c5000 iusb3xhc iusb3xhc.sys Wed Feb 12 12: 04: 33 2014 (52FB5541)
fffff880`078c5000 fffff880`078d4000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`078d4000 fffff880`078e3000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`078e3000 fffff880`078f2000 usbrpm usbrpm.sys Sat Nov 20 12: 37: 19 2010 (4CE7B2EF)
fffff880`078f2000 fffff880`07975000 csc csc.sys Sat Nov 20 10: 27: 12 2010 (4CE79470)
fffff880`07975000 fffff880`07993000 dfsc dfsc.sys Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`07993000 fffff880`079a4000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`079a4000 fffff880`079ac000 AppleCharger AppleCharger.sys Mon Oct 28 02: 59: 21 2013 (526DC4F9)
fffff880`079ac000 fffff880`079d2000 tunnel tunnel.sys Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`079d2000 fffff880`079fd000 VBoxNetFlt VBoxNetFlt.sys Mon Mar 16 17: 35: 44 2015 (55070660)
fffff880`07c00000 fffff880`07c16000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`07c16000 fffff880`07c3a000 rasl2tp rasl2tp.sys Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`07c3b000 fffff880`07d1a000 Rt64win7 Rt64win7.sys Tue Mar 18 03: 27: 09 2014 (5327AEFD)
fffff880`07d1a000 fffff880`07d69000 xhcdrv xhcdrv.sys Wed Sep 25 05: 37: 22 2013 (52425A72)
fffff880`07d69000 fffff880`07d75000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`07d75000 fffff880`07d92000 parport parport.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`07d92000 fffff880`07da0000 ElbyCDFL ElbyCDFL.sys Thu Dec 14 22: 22: 27 2006 (4581C093)
fffff880`07da0000 fffff880`07db6000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`07db6000 fffff880`07dc6000 CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`07dc6000 fffff880`07dd0000 vcsvad vcsvad.sys Sun Nov 16 10: 51: 18 2008 (491FED16)
fffff880`07dd0000 fffff880`07df2000 drmk drmk.sys Fri Oct 04 04: 16: 30 2013 (524E24FE)
fffff880`07df2000 fffff880`07df7200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`07df8000 fffff880`07df9480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`08200000 fffff880`0821b000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`0821b000 fffff880`0823c000 raspptp raspptp.sys Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`0823c000 fffff880`08256000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`08256000 fffff880`0827e000 VBoxNetAdp VBoxNetAdp.sys Mon Mar 16 17: 35: 44 2015 (55070660)
fffff880`0827e000 fffff880`0828b000 nvvad64v nvvad64v.sys Thu Nov 20 16: 33: 54 2014 (546E09E2)
fffff880`0828b000 fffff880`08750000 igdkmd64 igdkmd64.sys Mon Mar 16 23: 54: 33 2015 (55075F29)
fffff880`08750000 fffff880`0878d000 portcls portcls.sys Fri Oct 04 03: 36: 02 2013 (524E1B82)
fffff880`0878d000 fffff880`087d0000 ks ks.sys Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`087d0000 fffff880`087ff000 ndiswan ndiswan.sys Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`09200000 fffff880`09239000 epfw epfw.sys Tue Jan 20 11: 41: 08 2015 (54BE30C4)
fffff880`09239000 fffff880`0924e000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`0924e000 fffff880`09266000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`09266000 fffff880`092fe000 srv srv.sys Fri Apr 29 05: 06: 06 2011 (4DBA2B1E)
fffff880`0930e000 fffff880`0936e000 iusb3hub iusb3hub.sys Wed Feb 12 12: 04: 30 2014 (52FB553E)
fffff880`0936e000 fffff880`0937c000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`0937c000 fffff880`0938f000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`0938f000 fffff880`0939b000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`0939b000 fffff880`093a9000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`093a9000 fffff880`093cc000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`093cc000 fffff880`093d6000 mbam mbam.sys Wed Sep 03 19: 50: 25 2014 (540754E1)
fffff880`09400000 fffff880`09469000 srv2 srv2.sys Fri Apr 29 05: 05: 46 2011 (4DBA2B0A)
fffff880`094a0000 fffff880`0954a000 peauth peauth.sys Tue Feb 03 04: 19: 12 2015 (54D03E30)
fffff880`0954a000 fffff880`09555000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`09555000 fffff880`09586000 srvnet srvnet.sys Fri Apr 29 05: 05: 35 2011 (4DBA2AFF)
fffff880`09586000 fffff880`09598000 tcpipreg tcpipreg.sys Wed Oct 03 18: 07: 26 2012 (506C62BE)
fffff880`09598000 fffff880`095eb000 nwifi nwifi.sys Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`095eb000 fffff880`095fe000 ndisuio ndisuio.sys Sat Nov 20 11: 50: 08 2010 (4CE7A7E0)
fffff880`09600000 fffff880`0960a000 dump_diskdump dump_diskdump.sys Tue Feb 04 02: 36: 25 2014 (52F04419)
fffff880`0960d000 fffff880`099c2780 RTKVHD64 RTKVHD64.sys Fri Mar 14 12: 03: 23 2014 (5322E1FB)
fffff880`099c3000 fffff880`09a00000 ViaHub3 ViaHub3.sys Wed Sep 25 05: 37: 26 2013 (52425A76)
fffff880`0b8a4000 fffff880`0b915000 spsys spsys.sys Mon May 11 19: 20: 58 2009 (4A085E7A)
fffff880`0b915000 fffff880`0b920000 asyncmac asyncmac.sys Tue Jul 14 02: 10: 13 2009 (4A5BCCE5)
fffff880`0b920000 fffff880`0b929000 gdrv gdrv.sys Thu Jul 04 06: 27: 55 2013 (51D4F9CB)
fffff880`0b929000 fffff880`0b933000 NvStreamKms NvStreamKms.sys Tue Mar 17 07: 19: 52 2015 (5507C788)
fffff880`0b933000 fffff880`0b93b000 etocdrv etocdrv.sys Tue Apr 16 10: 20: 56 2013 (516D09E8)
fffff960`00090000 fffff960`003b3000 win32k win32k.sys Mon May 25 19: 08: 15 2015 (556356FF)
fffff960`004f0000 fffff960`004fa000 TSDDD TSDDD.dll Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff960`006c0000 fffff960`006e7000 cdd cdd.dll unavailable (00000000)
fffff960`008e0000 fffff960`00942000 ATMFD ATMFD.DLL Fri Feb 20 04: 29: 16 2015 (54E6AA0C)
fffffa80`0a0dc000 fffffa80`0a0e3000 em015_64 em015_64.dat Fri Mar 01 14: 27: 56 2013 (5130ACDC)
fffffa80`0a11d000 fffffa80`0a151000 em006_64 em006_64.dat Wed Jun 03 09: 58: 23 2015 (556EB39F)
fffffa80`0a1d8000 fffffa80`0a23a000 em018_64 em018_64.dat Mon Jun 08 09: 42: 26 2015 (55754762)
fffffa80`0b630000 fffffa80`0b744000 em008_64 em008_64.dat Thu May 14 11: 33: 53 2015 (55546C01)
Unloaded modules:
fffff880`0929b000 fffff880`0930e000 IntcDAud.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00073000
fffff880`017ed000 fffff880`017fb000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01400000 fffff880`0140a000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`03c58000 fffff880`03f1b000 dump_iaStorA
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 002C3000
fffff880`03f1b000 fffff880`03f2e000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`06f2a000 fffff880`06f32000 UsbCharger.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
Bugcheck code 00000124
Arguments 00000000`00000000 fffffa80`09e5e028 00000000`bf800000 00000000`00200401
[CPU Information]
~MHz = REG_DWORD 3192
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 60 Stepping 3
ProcessorNameString = REG_SZ Intel(R) Core(TM) i5-4460 CPU @ 3.20GHz
Update Signature = REG_BINARY 0,0,0,0,12,0,0,0
Update Status = REG_DWORD 2
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 1200000000
Machine ID Information [From Smbios 2.7, DMIVersion 39, Size=3095]
BiosMajorRelease = 4
BiosMinorRelease = 6
BiosVendor = American Megatrends Inc.
BiosVersion = F5
BiosReleaseDate = 05/13/2014
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = H81M-HD3
SystemFamily = To be filled by O.E.M.
SystemVersion = To be filled by O.E.M.
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = H81M-HD3
BaseBoardVersion = x.x
CPUID: "Intel(R) Core(TM) i5-4460 CPU @ 3.20GHz"
MaxSpeed: 3200
CurrentSpeed: 3192
[SMBIOS Data Tables v2.7]
[DMI Version - 39]
[2.0 Calling Convention - No]
[Table Size - 3095 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version F5
BIOS Starting Address Segment f000
BIOS Release Date 05/13/2014
BIOS ROM Size 800000
BIOS Characteristics
07: - PCI Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
11: - Specification Reserved
BIOS Major Revision 4
BIOS Minor Revision 6
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer Gigabyte Technology Co., Ltd.
Product Name H81M-HD3
Version To be filled by O.E.M.
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber To be filled by O.E.M.
Family To be filled by O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer Gigabyte Technology Co., Ltd.
Product H81M-HD3
Version x.x
Serial Number
Asset Tag
Feature Flags 09h
266157428: - `å2
266157388: - `å2
Location To be filled by O.E.M.
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 22 - Handle 0003h]
Manufacturer Gigabyte Technology Co., Ltd.
Chassis Type Desktop
Version To Be Filled By O.E.M.
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 0
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Cache Information (Type 7) - Length 19 - Handle 0004h]
Socket Designation CPU Internal L1
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0100h - 256K
Installed Size 0100h - 256K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Other
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation CPU Internal L2
Cache Configuration 0181h - WB Enabled Int NonSocketed L2
Maximum Cache Size 0400h - 1024K
Installed Size 0400h - 1024K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation CPU Internal L3
Cache Configuration 0182h - WB Enabled Int NonSocketed L3
Maximum Cache Size 1800h - 6144K
Installed Size 1800h - 6144K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity Specification Reserved
[Physical Memory Array (Type 16) - Length 23 - Handle 0007h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 33554432KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 2
[Onboard Devices Information (Type 10) - Length 6 - Handle 0026h]
Number of Devices 1
01: Type Video [enabled]
01: Description To Be Filled By O.E.M.
[OEM Strings (Type 11) - Length 5 - Handle 0027h]
Number of Strings 5
1 To Be Filled By O.E.M.
2 To Be Filled By O.E.M.
3 To Be Filled By O.E.M.
4 To Be Filled By O.E.M.
5 To Be Filled By O.E.M.
[System Configuration Options (Type 12) - Length 5 - Handle 0028h]
[Processor Information (Type 4) - Length 42 - Handle 0040h]
Socket Designation SOCKET 0
Processor Type Central Processor
Processor Family c6h - Specification Reserved
Processor Manufacturer Intel
Processor ID c3060300fffbebbf
Processor Version Intel(R) Core(TM) i5-4460 CPU @ 3.20GHz
Processor Voltage 89h - 0.9V
External Clock 100MHz
Max Speed 7000MHz
Current Speed 3200MHz
Status Enabled Populated
Processor Upgrade Other
L1 Cache Handle 0004h
L2 Cache Handle 0005h
L3 Cache Handle 0006h
Serial Number [String Not Specified]
Asset Tag Number
Part Number Fill By OEM
[Memory Device (Type 17) - Length 34 - Handle 0041h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelA-DIMM0
Bank Locator BANK 0
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1600MHz
Manufacturer Kingston
Serial Number
Asset Tag Number
Part Number KHX1866C10D3/8G
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 0042h]
Starting Address 00000000h
Ending Address 007fffffh
Memory Device Handle 0041h
Mem Array Mapped Adr Handle 0046h
Partition Row Position [Unknown]
Interleave Position [Unknown]
Interleave Data Depth [Unknown]
[Memory Device (Type 17) - Length 34 - Handle 0043h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelA-DIMM1
Bank Locator BANK 1
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Device (Type 17) - Length 34 - Handle 0044h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelB-DIMM0
Bank Locator BANK 2
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Device (Type 17) - Length 34 - Handle 0045h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelB-DIMM1
Bank Locator BANK 3
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Array Mapped Address (Type 19) - Length 31 - Handle 0046h]
Starting Address 00000000h
Ending Address 007fffffh
Memory Array Handle 0007h
Partition Width 04
===============================================================================
Common Platform Error Record @ fffffa8009e5e028
-------------------------------------------------------------------------------
Record Id : 01d0adc7d0c99f64
Severity : Fatal (1)
Length : 928
Creator : Microsoft
Notify Type : Machine Check Exception
Timestamp : 6/23/2015 15: 19: 45
Flags : 0x00000000
===============================================================================
Section 0 : Processor Generic
-------------------------------------------------------------------------------
Descriptor @ fffffa8009e5e0a8
Section @ fffffa8009e5e180
Offset : 344
Length : 192
Flags : 0x00000001 Primary
Severity : Fatal
Proc. Type : x86/x64
Instr. Set : x64
Error Type : Micro-Architectural Error
Flags : 0x00
CPU Version : 0x00000000000306c3
Processor ID : 0x0000000000000002
===============================================================================
Section 1 : x86/x64 Processor Specific
-------------------------------------------------------------------------------
Descriptor @ fffffa8009e5e0f0
Section @ fffffa8009e5e240
Offset : 536
Length : 128
Flags : 0x00000000
Severity : Fatal
Local APIC Id : 0x0000000000000002
CPU Id : c3 06 03 00 00 08 10 02 - bf fb fa 7f ff fb eb bf
00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
Proc. Info 0 @ fffffa8009e5e240
===============================================================================
Section 2 : x86/x64 MCA
-------------------------------------------------------------------------------
Descriptor @ fffffa8009e5e138
Section @ fffffa8009e5e2c0
Offset : 664
Length : 264
Flags : 0x00000000
Severity : Fatal
Error : Internal unclassified (Proc 1 Bank 1)
Status : 0xbf80000000200401
Address : 0x00000000fee00000
Misc. : 0x0000000000000086
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - prz2197 - 25.06.2015 08:59
Czasami też, zaraz po włączeniu komputera startuje on na jakieś pół sekundy tj. startują wszystkie wentylatory i dysk i następuje wyłączenie. Robi tak, dopóki nie wyłączę zasilania.
[EDIT] Póki co, po odinstalowaniu Eset Smart Security komputer działa bez zarzutów.
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - thermalfake - 25.06.2015 21:04
Cytat:Czasami też, zaraz po włączeniu komputera startuje on na jakieś pół sekundy tj. startują wszystkie wentylatory i dysk i następuje wyłączenie. Robi tak, dopóki nie wyłączę zasilania.
Wgląda na chwilowe zwarcie któregoś z komponentów (przeważnie karty grafiki mi tak robiły) ale tego nie potwierdzę zdalnie. Do aktualizacji bios/uefi jak również obsadzenie pamięci ram w innych konfiguracjach. Zalecam wyjęcie sprzętu z obudowy i podpięcie tego metodą "na pająka". Jest też szansa iż mikrostyk z obudowy (power) podpięty do płyty głównej się chrzani i dlatego masz taki problem. Możesz go wypiąć a testowo przez parę dni zwierać piny PWR na płycie do odpalenia.
Cytat:Póki co, po odinstalowaniu Eset Smart Security komputer działa bez zarzutów.
Tak jak napisałem - w trybie awaryjnym nie ładuje się żadna usługa użytkownika dlatego zaproponowałem odinstalowanie Eset'a aby zobaczyć co się stanie podczas normalnego uruchamiania. Istota nie leży w samej dość zaawansowanej aplikacji lecz jakimś czynniku w systemie który powoduje taki stan nieprawidłowego działania aplikacji.
Mogę jeszcze zaproponować dogłębne skany z poziomu livecd - Eset Online Scanner i do tego MBAM a być może jeszcze coś z narzędzi Eset jakie zaproponuje ich support.
Aby nie zostać bez ochrony przez ten czas (i tak trzeba coś darmowego zainstalować na moment) proszę się skontaktować (najlepiej mailem) z supportem polskiego dystrybutora firmą Dagma z Katowic -> http://www.dagma.com.pl/Pomoc
Jeśli produkt był kupiony z polskiej dystrybucji (nie tani klucz z allegro) to masz prawo do wsparcia. Opisz dokładnie sprawę.
Proszę także napisać na forum za parę dni czy sprawa się rozwiązała gdyż będzie to jakiś punkt działań dla kolejnych podobnych problemów i abyśmy mogli zamknąć wątek ewentualnie jako rozwiązany.
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - prz2197 - 03.07.2015 13:32
Sprawa została rozwiązana, zainstalowałem od nowa pakiet Eset Smart Security i działa on bez najmniejszych problemów.
Mam jednak jeszcze jeden problem a mianowicie nie widzę mojej grupy domowej. Podczas rozwiązywania problemów otrzymuję komunikat: ,,usługa grupowanie sieci równorzędnej nie jest uruchomiona" oraz ,,nie działa protokół rozpoznawania nazw węzłów równorzędnych". Nie wiem czym to jest spowodowane. Możliwe, że podczas naprawy systemu z płyty jakiś plik systemowy uległ uszkodzeniu.
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - thermalfake - 04.07.2015 08:53
Masz parę rzeczy do sprawdzenia
http://answers.microsoft.com/pl-pl/windows/forum/windows_other-windows_programs/problem-z-dzia%C5%82aniem-grupy-domowej/fc5b4ad5-253d-47b4-93cf-cb1a787289bd
Oczywiście zobacz także co się stanie jeśli wejdziesz w Usługi (services.msc) i ręcznie je uruchomisz.
Grupę domową można zamienić grupą roboczą (kompatybilne z systemami starszymi niż Vista). Trzeba tylko we właściwościach komputera nadać tę samą nazwę grupy i przerestartować komputery.
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - prz2197 - 04.07.2015 11:29
Podczas ręcznego uruchamiania wyświetlają się komunikaty: System Windows nie może uruchomić usługi Protokół rozpownawania nazw równorzędnych na komputerze Komputer lokalny.Błąd 0x80630801: 0x80630801
oraz
System Windows nie może uruchomić usługi Grupowanie sieci równorzędnej na komputerze Komputer lokalny. Błąd 1068: Uruchomienie usługi zależności lub grupy nie powiodło się.
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - thermalfake - 11.07.2015 16:38
Szybciej będzie jak pokażesz dzienniki zdarzeń.
Pliki są trzymane w lokalizacji c:\windows\system32\winevt\logs\application.evtx oraz system.evtx
Wrzuć to na dowolny hosting typu zippyshare.com
Przy okazji pobierz VistaSysInfo -> http://www.vistax64.com/software-tools/176785-vistaforums-sysinfo-tool.html
Tym narzędziem sprawdź wszystkie usługi jaki mają status, wklej do pliku txt i również umieść do pobrania.
Porównując z defaultowym set'em zobaczymy co masz tam pokiełbaszone.
RE: Bsod: powodowany przez hal.dll i ntoskml.exe - prz2197 - 11.07.2015 19:42
Poradziłem sobie z problemem, dziękuję za pomoc.
Temat można zamknąć
|