Hi,
Your dumps have error code:
- 0x18 = indicates that the reference count of an object is illegal for the current state of the object.
- 0xD1 = a kernel-mode driver access pageable memory at high level IRQL.
First uninstall Alcohol/Daemon software because it's well known BSOD maker and I see its driver involved in the stack text.
Remove sptd.sys with this tools --> DuplexSecure - Downloads
Code:
fffff800`00b9cc30 fffffa80`02dff000 sptd+0x424ce
Then your antivirus Eset NOD32 is outdated so you must use the latest version or uninstall it completely.
I would recommend you to use MSE instead Eset.
http://www.microsoft.com/security_essentials/
Update these drivers:
Log
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {4f444658, 2, 1, fffff88002c5c0ef}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : usbehci.sys ( usbehci!EHCI_sMode_PollEndpointSlot+177 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000004f444658, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88002c5c0ef, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c60e0
000000004f444658
CURRENT_IRQL: 2
FAULTING_IP:
usbehci!EHCI_sMode_PollEndpointSlot+177
fffff880`02c5c0ef f0834e3808 lock or dword ptr [rsi+38h],8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c830 -- (.trap 0xfffff80000b9c830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8002fe8dc0
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002c5c0ef rsp=fffff80000b9c9c0 rbp=fffffa8002e376a0
r8=000000004f444648 r9=fffffa8004c20100 r10=0bad00000bad0000
r11=fffffa8004c00f20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
usbehci!EHCI_sMode_PollEndpointSlot+0x177:
fffff880`02c5c0ef f0834e3808 lock or dword ptr [rsi+38h],8 ds:75f8:00000000`00000038=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8dca9 to fffff80002e8e740
STACK_TEXT:
fffff800`00b9c6e8 fffff800`02e8dca9 : 00000000`0000000a 00000000`4f444658 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c6f0 fffff800`02e8c920 : fffff880`00000001 00000000`00000000 fffffa80`05dbdf30 fffffa80`02e36101 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c830 fffff880`02c5c0ef : 00000000`00000000 fffffa80`04c20100 fffffa80`04c32670 00000000`00000000 : nt!KiPageFault+0x260
fffff800`00b9c9c0 fffff880`02c5bba4 : fffffa80`04c20080 00000000`00000000 fffffa80`04c32670 fffffa80`02677600 : usbehci!EHCI_sMode_PollEndpointSlot+0x177
fffff800`00b9ca50 fffff880`02c60a71 : fffffa80`04c32500 fffffa80`02e361a0 00000000`00000000 00000000`00000001 : usbehci!EHCI_PollPerAsyEndpoint+0x84
fffff800`00b9cad0 fffff880`02c01e8b : 00000000`00000002 fffffa80`02e361a0 00000000`00000000 00000000`00000020 : usbehci!EHCI_PollEndpoint+0x41
fffff800`00b9cb10 fffff880`02c069b1 : 00000000`00000020 00000000`00000004 fffffa80`04c322c0 fffffa80`02e36050 : USBPORT!MPf_PollEndpoint+0x9b
fffff800`00b9cb40 fffff880`02c12043 : fffffa80`02e361a0 00000000`00000020 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff800`00b9cba0 fffff880`02c02f89 : fffffa80`02e36050 00000000`00000000 fffffa80`02dff702 fffffa80`02e36a10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff800`00b9cc00 fffff880`00ee14ce : fffffa80`02dff000 fffffa80`02e36a10 fffffa80`02dff750 fffffa80`02e36a28 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9cc30 fffffa80`02dff000 : fffffa80`02e36a10 fffffa80`02dff750 fffffa80`02e36a28 fffff800`03008e80 : sptd+0x424ce
fffff800`00b9cc38 fffffa80`02e36a10 : fffffa80`02dff750 fffffa80`02e36a28 fffff800`03008e80 00000000`00000000 : 0xfffffa80`02dff000
fffff800`00b9cc40 fffffa80`02dff750 : fffffa80`02e36a28 fffff800`03008e80 00000000`00000000 fffff800`00b96080 : 0xfffffa80`02e36a10
fffff800`00b9cc48 fffffa80`02e36a28 : fffff800`03008e80 00000000`00000000 fffff800`00b96080 00000000`00000022 : 0xfffffa80`02dff750
fffff800`00b9cc50 fffff800`03008e80 : 00000000`00000000 fffff800`00b96080 00000000`00000022 00000000`00000000 : 0xfffffa80`02e36a28
fffff800`00b9cc58 00000000`00000000 : fffff800`00b96080 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KiInitialPCR+0x180
STACK_COMMAND: kb
FOLLOWUP_IP:
usbehci!EHCI_sMode_PollEndpointSlot+177
fffff880`02c5c0ef f0834e3808 lock or dword ptr [rsi+38h],8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbehci!EHCI_sMode_PollEndpointSlot+177
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbehci
IMAGE_NAME: usbehci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_PollEndpointSlot+177
BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_PollEndpointSlot+177
Followup: MachineOwner