New
#1
Random Crash
My computer seemed to crash with black screen.After reboot all seems well please see attached mini dump file
Thanks In Advance Billy
My computer seemed to crash with black screen.After reboot all seems well please see attached mini dump file
Thanks In Advance Billy
Your Eset Security Suite/Nod32 is the cause, remove it and replace it with MSE
Update any Brainbox software since the driver it uses is obsolete
http://www.brainboxes.com/software
Code:SSPORT.sys fffff880`084e6000 fffff880`084ee000 0x00008000 0x42fbda34 12/08/2005 03:07:32Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffea80093ca730, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff88006ce080f, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036bf0e0 ffffea80093ca730 CURRENT_IRQL: 2 FAULTING_IP: eamonm+880f fffff880`06ce080f 4c396710 cmp qword ptr [rdi+10h],r12 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: devices.exe TRAP_FRAME: fffff88009652680 -- (.trap 0xfffff88009652680) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80076e3088 rdx=fffffa800959c500 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88006ce080f rsp=fffff88009652810 rbp=fffff880096528a0 r8=0000000000000000 r9=0000000000000000 r10=fffffa8007b12b50 r11=0000000000000011 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc eamonm+0x880f: fffff880`06ce080f 4c396710 cmp qword ptr [rdi+10h],r12 ds:7070:00000000`00000010=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003486ca9 to fffff80003487740 STACK_TEXT: fffff880`09652538 fffff800`03486ca9 : 00000000`0000000a ffffea80`093ca730 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`09652540 fffff800`03485920 : fffffa80`0830fbc8 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69 fffff880`09652680 fffff880`06ce080f : fffffa80`07a63700 fffffa80`07b73010 00000000`10000004 00000000`00000001 : nt!KiPageFault+0x260 fffff880`09652810 fffffa80`07a63700 : fffffa80`07b73010 00000000`10000004 00000000`00000001 00000000`00000072 : eamonm+0x880f fffff880`09652818 fffffa80`07b73010 : 00000000`10000004 00000000`00000001 00000000`00000072 00000000`10000004 : 0xfffffa80`07a63700 fffff880`09652820 00000000`10000004 : 00000000`00000001 00000000`00000072 00000000`10000004 fffffa80`07a63730 : 0xfffffa80`07b73010 fffff880`09652828 00000000`00000001 : 00000000`00000072 00000000`10000004 fffffa80`07a63730 fffff880`00c51027 : 0x10000004 fffff880`09652830 00000000`00000072 : 00000000`10000004 fffffa80`07a63730 fffff880`00c51027 fffffa80`07a63880 : 0x1 fffff880`09652838 00000000`10000004 : fffffa80`07a63730 fffff880`00c51027 fffffa80`07a63880 fffffa80`093f8a40 : 0x72 fffff880`09652840 fffffa80`07a63730 : fffff880`00c51027 fffffa80`07a63880 fffffa80`093f8a40 fffffa80`0958e770 : 0x10000004 fffff880`09652848 fffff880`00c51027 : fffffa80`07a63880 fffffa80`093f8a40 fffffa80`0958e770 00000000`00000000 : 0xfffffa80`07a63730 fffff880`09652850 fffff880`00c51be9 : fffff880`09652900 fffffa80`07952d12 00000000`0008e300 fffffa80`0839a000 : fltmgr!FltpPerformPreCallbacks+0x2f7 fffff880`09652950 fffff880`00c506c7 : fffffa80`07b12b50 fffffa80`07952de0 fffffa80`06a2b2c0 fffffa80`08c17070 : fltmgr!FltpPassThrough+0x2d9 fffff880`096529d0 fffff800`0379b84f : fffffa80`07b12b50 fffffa80`0839a060 00000000`00000000 fffffa80`08c17070 : fltmgr!FltpDispatch+0xb7 fffff880`09652a30 fffff800`03781724 : 00000000`00000000 fffffa80`0839a060 00000000`00000000 fffff800`036fa949 : nt!IopCloseFile+0x11f fffff880`09652ac0 fffff800`0379b341 : fffffa80`0839a060 fffffa80`00000001 fffff8a0`0ac3a830 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4 fffff880`09652b40 fffff800`0379b254 : 00000000`00000350 fffffa80`0839a060 fffff8a0`0ac3a830 00000000`00000350 : nt!ObpCloseHandleTableEntry+0xb1 fffff880`09652bd0 fffff800`03486993 : fffffa80`0773f5a0 fffff880`09652ca0 00000000`7efdb000 fffff900`00008000 : nt!ObpCloseHandle+0x94 fffff880`09652c20 00000000`7781f7aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7781f7aa STACK_COMMAND: kb FOLLOWUP_IP: eamonm+880f fffff880`06ce080f 4c396710 cmp qword ptr [rdi+10h],r12 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: eamonm+880f FOLLOWUP_NAME: MachineOwner MODULE_NAME: eamonm IMAGE_NAME: eamonm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d006930 FAILURE_BUCKET_ID: X64_0xD1_eamonm+880f BUCKET_ID: X64_0xD1_eamonm+880f Followup: MachineOwner ---------