Code:
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\krazy7\Windows_NT6_BSOD_jcgriff2\122711-15210-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0324f000 PsLoadedModuleList = 0xfffff800`03494670
Debug session time: Tue Dec 27 05:53:19.144 2011 (UTC - 7:00)
System Uptime: 0 days 15:07:06.596
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : hardware ( mouclass!WPP_RECORDER_SF_qq+60 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+6637333138336133
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: League of Lege
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff80000ba26b8 -- (.exr 0xfffff80000ba26b8)
ExceptionAddress: fffff8800f20e654 (mouclass!WPP_RECORDER_SF_qq+0x0000000000000060)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff80000ba2760 -- (.trap 0xfffff80000ba2760)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800f2122d0 rbx=0000000000000000 rcx=fffff8800f213580
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800f20e654 rsp=fffff80000ba28f0 rbp=0000000000000018
r8=0000000000000004 r9=0000000000000030 r10=0000000000000020
r11=fffff80000ba2948 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
mouclass!WPP_RECORDER_SF_qq+0x60:
fffff880`0f20e654 642448 and al,48h
Resetting default scope
MISALIGNED_IP:
mouclass!WPP_RECORDER_SF_qq+60
fffff880`0f20e654 642448 and al,48h
LAST_CONTROL_TRANSFER: from fffff800032c35fe to fffff800032cbc10
STACK_TEXT:
fffff800`00ba1798 fffff800`032c35fe : 00000000`00000000 fffffa80`0537e9ee fffff800`00ba1f10 fffff800`032f7830 : nt!KeBugCheck
fffff800`00ba17a0 fffff800`032f74fd : fffff800`034d571c fffff800`03412c30 fffff800`0324f000 fffff800`00ba26b8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00ba17d0 fffff800`032f62d5 : fffff800`03416028 fffff800`00ba1848 fffff800`00ba26b8 fffff800`0324f000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00ba1800 fffff800`03307361 : fffff800`00ba26b8 fffff800`00ba1f10 fffff800`00000000 fffffa80`052cc960 : nt!RtlDispatchException+0x415
fffff800`00ba1ee0 fffff800`032cb2c2 : fffff800`00ba26b8 00000000`00003530 fffff800`00ba2760 00000000`00000008 : nt!KiDispatchException+0x135
fffff800`00ba2580 fffff800`032c941f : fffff800`00ba2760 fffff880`03ca8f02 fffffa80`03ffc700 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff800`00ba2760 fffff880`0f20e654 : 00000000`0000002f fffff880`0f20e54e 00000000`0000002d fffff880`0f20e0a0 : nt!KiInvalidOpcodeFault+0x11f
fffff800`00ba28f0 fffff880`0f20f9ad : 00000000`00000018 fffffa80`05d8da80 fffffa80`05d8da80 00000000`00000007 : mouclass!WPP_RECORDER_SF_qq+0x60
fffff800`00ba2950 fffff880`07167c79 : 00000000`00000002 00000000`ffffffff fffffa80`05e03b30 fffffa80`05daede0 : mouclass!MouseClassServiceCallback+0x155
fffff800`00ba29d0 fffff800`032cf021 : fffffa80`04915b7b fffff800`00000000 fffffa80`00000001 fffff880`00000001 : mouhid!MouHid_ReadComplete+0x69d
fffff800`00ba2a50 fffff880`03c789c4 : fffffa80`05dac9b0 fffffa80`05dac906 fffffa80`05da7a00 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff800`00ba2b40 fffff880`03c78c2d : fffffa80`05d85f02 fffffa80`05d85f20 fffffa80`05da7a00 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x130
fffff800`00ba2bd0 fffff800`032cf021 : fffffa80`05b4a24b 00000000`00000000 fffffa80`05da7801 fffffa80`05b4a010 : HIDCLASS!HidpInterruptReadComplete+0x235
fffff800`00ba2c60 fffff880`03cb6631 : fffffa80`05256050 fffffa80`0645f000 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff800`00ba2d50 fffff880`03cb6b0f : fffffa80`05fa4202 fffffa80`05b4a010 00000000`ffffffff fffffa80`05256eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff800`00ba2e30 fffff880`03cb466f : fffffa80`05256eb0 fffffa80`052561a0 fffffa80`05257050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff800`00ba2e90 fffff880`03ca5f89 : fffffa80`05256050 00000000`00000000 fffffa80`05256e02 fffffa80`05256eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff800`00ba2ed0 fffff800`032d70ac : fffff800`03441e80 fffffa80`05256eb0 fffffa80`05256ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00ba2f00 fffff800`032ce765 : 00000000`00000000 fffffa80`03d60b60 00000000`00000000 fffff880`03ca5db0 : nt!KiRetireDpcList+0x1bc
fffff800`00ba2fb0 fffff800`032ce57c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KyRetireDpcList+0x5
fffff880`0df01ba0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
mouclass!WPP_RECORDER_SF_qq+60
fffff880`0f20e654 642448 and al,48h
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: mouclass!WPP_RECORDER_SF_qq+60
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_mouclass.sys
BUCKET_ID: X64_IP_MISALIGNED_mouclass.sys
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\krazy7\Windows_NT6_BSOD_jcgriff2\122711-17097-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03259000 PsLoadedModuleList = 0xfffff800`0349e670
Debug session time: Tue Dec 27 14:20:35.370 2011 (UTC - 7:00)
System Uptime: 0 days 8:26:40.212
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {4f444648, 2, 1, fffff8800f012d3f}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_iCompleteDoneTransfer+123 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000004f444648, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800f012d3f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003508100
000000004f444648
CURRENT_IRQL: 2
FAULTING_IP:
USBPORT!USBPORT_Core_iCompleteDoneTransfer+123
fffff880`0f012d3f 41b808000000 mov r8d,8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c950 -- (.trap 0xfffff80000b9c950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800f012d3f rsp=fffff80000b9cae0 rbp=0000000000000000
r8=000000004f444648 r9=000000000000000b r10=00000000ffffffff
r11=fffffa80052121a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x123:
fffff880`0f012d3f 41b808000000 mov r8d,8
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d51e9 to fffff800032d5c40
STACK_TEXT:
fffff800`00b9c808 fffff800`032d51e9 : 00000000`0000000a 00000000`4f444648 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c810 fffff800`032d3e60 : fffffa80`052121a0 fffff880`0f002783 fffffa80`05212ba0 fffffa80`052121a0 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c950 fffff880`0f012d3f : fffffa80`05212eb0 00000000`ffffffff fffffa80`05212050 fffff880`0f01156a : nt!KiPageFault+0x260
fffff800`00b9cae0 fffff880`0f013b0f : fffffa80`04561602 fffffa80`05b7fc60 00000000`ffffffff fffffa80`05212eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x123
fffff800`00b9cbc0 fffff880`0f01166f : fffffa80`05212eb0 fffffa80`052121a0 fffffa80`05213050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff800`00b9cc20 fffff880`0f002f89 : fffffa80`05212050 00000000`00000000 fffffa80`05212e02 fffffa80`05212eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff800`00b9cc60 fffff800`032e10ac : fffff800`0344be80 fffffa80`05212eb0 fffffa80`05212ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9cc90 fffff800`032cd96a : fffff800`0344be80 fffff800`03459cc0 00000000`00000000 fffff880`0f002db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_iCompleteDoneTransfer+123
fffff880`0f012d3f 41b808000000 mov r8d,8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBPORT!USBPORT_Core_iCompleteDoneTransfer+123
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8c0c08
FAILURE_BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iCompleteDoneTransfer+123
BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iCompleteDoneTransfer+123
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\krazy7\Windows_NT6_BSOD_jcgriff2\122911-15802-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0320f000 PsLoadedModuleList = 0xfffff800`03454670
Debug session time: Wed Dec 28 16:34:29.729 2011 (UTC - 7:00)
System Uptime: 0 days 2:25:30.181
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff87ffbdef490, 2, 8, fffff87ffbdef490}
Probably caused by : usbuhci.sys ( usbuhci!UhciPollAsyncEndpoint+165 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff87ffbdef490, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff87ffbdef490, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034be100
fffff87ffbdef490
CURRENT_IRQL: 2
FAULTING_IP:
+6637333138336133
fffff87f`fbdef490 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: League of Lege
TRAP_FRAME: fffff80000ba2bb0 -- (.trap 0xfffff80000ba2bb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004c2e2ff rbx=0000000000000000 rcx=fffffa8005229c80
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff87ffbdef490 rsp=fffff80000ba2d48 rbp=fffff8800771d700
r8=000000004f444648 r9=00000000cff3a780 r10=00000000ffffffff
r11=fffffa8005c9e820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fffff87f`fbdef490 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000328b1e9 to fffff8000328bc40
FAILED_INSTRUCTION_ADDRESS:
+6637333138336133
fffff87f`fbdef490 ?? ???
STACK_TEXT:
fffff800`00ba2a68 fffff800`0328b1e9 : 00000000`0000000a fffff87f`fbdef490 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`00ba2a70 fffff800`03289e60 : 00000000`00000000 fffffa80`04c6f000 00000000`00000000 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff800`00ba2bb0 fffff87f`fbdef490 : fffff880`0fdef34d 00000000`00000002 fffffa80`04c2e258 fffffa80`04c2e258 : nt!KiPageFault+0x260
fffff800`00ba2d48 fffff880`0fdef34d : 00000000`00000002 fffffa80`04c2e258 fffffa80`04c2e258 fffffa80`04c2e318 : 0xfffff87f`fbdef490
fffff800`00ba2d50 fffff880`0fdec2d6 : 00000000`00000002 fffffa80`04c2e010 00000000`00000000 fffffa80`052251a0 : usbuhci!UhciPollAsyncEndpoint+0x165
fffff800`00ba2db0 fffff880`06d1be8b : fffffa80`052251a0 00000000`00000002 00000000`00000000 00000000`00000040 : usbuhci!UhciPollEndpoint+0x1a
fffff800`00ba2de0 fffff880`06d209d1 : 00000000`00000040 00000000`00000004 fffffa80`04c2e010 fffffa80`05225050 : USBPORT!MPf_PollEndpoint+0x9b
fffff800`00ba2e10 fffff880`06d2c077 : fffffa80`052251a0 00000000`00000040 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff800`00ba2e70 fffff880`06d1cf89 : fffffa80`05225050 00000000`00000000 fffffa80`05225a02 fffffa80`05225a18 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1c3
fffff800`00ba2ed0 fffff800`032970ac : fffff800`03401e80 fffffa80`05225a18 fffffa80`05225a30 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00ba2f00 fffff800`0328e765 : 00000000`00000000 fffffa80`04121b60 00000000`00000000 fffff880`06d1cdb0 : nt!KiRetireDpcList+0x1bc
fffff800`00ba2fb0 fffff800`0328e57c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KyRetireDpcList+0x5
fffff880`09cc3ba0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
usbuhci!UhciPollAsyncEndpoint+165
fffff880`0fdef34d 0300 add eax,dword ptr [rax]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: usbuhci!UhciPollAsyncEndpoint+165
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbuhci
IMAGE_NAME: usbuhci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8c0bff
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_usbuhci!UhciPollAsyncEndpoint+165
BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_usbuhci!UhciPollAsyncEndpoint+165
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\krazy7\Windows_NT6_BSOD_jcgriff2\122911-13478-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0325d000 PsLoadedModuleList = 0xfffff800`034a2670
Debug session time: Thu Dec 29 06:48:59.475 2011 (UTC - 7:00)
System Uptime: 0 days 14:13:51.926
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {3f4, 2, 1, fffff880081afac0}
Probably caused by : hidusb.sys ( hidusb!WppAutoLogTrace+108 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000003f4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880081afac0, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350c100
00000000000003f4
CURRENT_IRQL: 2
FAULTING_IP:
hidusb!WppAutoLogTrace+108
fffff880`081afac0 66894108 mov word ptr [rcx+8],ax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b640 -- (.trap 0xfffff88002f8b640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000003f4 rbx=0000000000000000 rcx=fffffa8004c9546c
rdx=000000000000524c rsi=0000000000000000 rdi=0000000000000000
rip=fffff880081afac0 rsp=fffff88002f8b7d0 rbp=0000000000000000
r8=fffffa8004c95498 r9=fffff880081b11c0 r10=000000000000002c
r11=fffffa8004c95000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
hidusb!WppAutoLogTrace+0x108:
fffff880`081afac0 66894108 mov word ptr [rcx+8],ax ds:23c0:fffffa80`04c95474=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d91e9 to fffff800032d9c40
STACK_TEXT:
fffff880`02f8b4f8 fffff800`032d91e9 : 00000000`0000000a 00000000`000003f4 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f8b500 fffff800`032d7e60 : fffffa80`052b6670 fffff880`0f0804a0 00000000`00000012 fffffa80`04ef4d30 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b640 fffff880`081afac0 : 00000000`00000000 fffff800`032dd021 fffffa80`04f2dafb fffff880`00000000 : nt!KiPageFault+0x260
fffff880`02f8b7d0 fffff880`081acd2d : fffffa80`039f7148 fffffa80`052b6670 00000000`00000004 fffff880`0f07fb2b : hidusb!WppAutoLogTrace+0x108
fffff880`02f8b830 fffff880`081ace76 : fffffa80`05db9ab0 fffffa80`05d66b30 00000000`0000000d fffff880`0f076622 : hidusb!WPP_RECORDER_SF_qq+0xa1
fffff880`02f8b890 fffff880`0f078555 : fffffa80`05db9a01 fffffa80`05db9ab0 fffffa80`04f2dc60 00000000`00000008 : hidusb!HumInternalIoctl+0x52
fffff880`02f8b900 fffff880`0f078d75 : fffffa80`05db9ab0 fffffa80`05d66ca0 00000000`00000000 00000000`00000008 : HIDCLASS!HidpSubmitInterruptRead+0xdd
fffff880`02f8b960 fffff800`032dd021 : fffffa80`04f2de9b 00000000`00000000 fffffa80`05d66b01 fffffa80`04f2dc00 : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff880`02f8b9f0 fffff880`03e44631 : fffffa80`0522b050 fffffa80`0412a400 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`02f8bae0 fffff880`03e44b0f : fffffa80`04df7502 fffffa80`04f2dc60 00000000`ffffffff fffffa80`0522beb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bbc0 fffff880`03e4266f : fffffa80`0522beb0 fffffa80`0522b1a0 fffffa80`0522c050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc20 fffff880`03e33f89 : fffffa80`0522b050 00000000`00000000 fffffa80`0522be02 fffffa80`0522beb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bc60 fffff800`032e50ac : fffff880`02f63180 fffffa80`0522beb0 fffffa80`0522bec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bc90 fffff800`032d196a : fffff880`02f63180 fffff880`02f6dfc0 00000000`00000000 fffff880`03e33db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f8bd40 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
hidusb!WppAutoLogTrace+108
fffff880`081afac0 66894108 mov word ptr [rcx+8],ax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: hidusb!WppAutoLogTrace+108
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hidusb
IMAGE_NAME: hidusb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a665
FAILURE_BUCKET_ID: X64_0xD1_hidusb!WppAutoLogTrace+108
BUCKET_ID: X64_0xD1_hidusb!WppAutoLogTrace+108
Followup: MachineOwner
---------
Your blue screens were related to hardware once, USBPORT.SYS, usbuhci.sys, and hidusb.sys. League of Legends was the attributed program in two of the four cases.