Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer
- Version: 0.9
- Time to analyze file(s): 00 hours and 01 minutes and 02 seconds
- ================================= CPU ==================================
- COUNT: 8
- MHZ: 4200
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: 9e
- STEPPING: 9
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 17763.1.amd64fre.rs5_release.180914-1434
- BUILD_VERSION: 10.0.17763.864 (WinBuild.160101.0800)
- BUILD: 17763
- SERVICEPACK: 864
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- BUILD_TIMESTAMP: unknown_date
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.17763.864
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Additional BIOS information (including RAM information) was unreadable
- from the first dump file. This can be caused by an outdated BIOS.
- ========================================================================
- ==================== Dump File: 121319-9984-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 17763 MP (8 procs) Free x64
- Kernel base = 0xfffff800`15801000 PsLoadedModuleList = 0xfffff800`15c1a710
- Debug session time: Fri Dec 13 14:24:09.317 2019 (UTC - 5:00)
- System Uptime: 0 days 0:00:13.035
- BugCheck 50, {ffff9584ecd9c220, 0, fffff80016915a28, 2}
- Could not read faulting driver name
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffff9584ecd9c220, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff80016915a28, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80015d41390: Unable to get MiVisibleState
- ffff9584ecd9c220
- FAULTING_IP:
- CI!SymCryptFdefRawMulMulx+68
- fffff800`16915a28 c4e2fbf619 mulx rbx,rax,qword ptr [rcx]
- MM_INTERNAL_CODE: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- TRAP_FRAME: ffffbb8b8f145590 -- (.trap 0xffffbb8b8f145590)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ffff9584ecd9c220
- rdx=5ef041530738a6a2 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80016915a28 rsp=ffffbb8b8f145728 rbp=0000000000000000
- r8=ffff9484ecd9c420 r9=0000000000000008 r10=0000000000000000
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- CI!SymCryptFdefRawMulMulx+0x68:
- fffff800`16915a28 c4e2fbf619 mulx rbx,rax,qword ptr [rcx] ds:ffff9584`ecd9c220=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800159f8641 to fffff800159b79c0
- STACK_TEXT:
- ffffbb8b`8f1452a8 fffff800`159f8641 : 00000000`00000050 ffff9584`ecd9c220 00000000`00000000 ffffbb8b`8f145590 : nt!KeBugCheckEx
- ffffbb8b`8f1452b0 fffff800`15896b36 : ffffbb8b`8f145480 ffff8000`00000000 00000000`00000000 ffff9584`ecd9c220 : nt!MiSystemFault+0x193891
- ffffbb8b`8f1453f0 fffff800`159c54c9 : 00000800`00000000 ffffedf6`e5213b30 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1a6
- ffffbb8b`8f145590 fffff800`16915a28 : 00000000`00000001 ffff9484`ecd9c620 ffff9484`ecd9c020 ffff9484`e28a90e0 : nt!KiPageFault+0x349
- ffffbb8b`8f145728 fffff800`16908a80 : ffff9584`ecd9c220 00000000`00000008 ffff9484`ecd9c420 00000000`00000008 : CI!SymCryptFdefRawMulMulx+0x68
- ffffbb8b`8f145770 fffff800`16909c7f : ffff9484`e28a90e0 00000000`00008840 00000000`00000200 fffff800`169088ec : CI!SymCryptFdefModMulMontgomeryMulx+0x30
- ffffbb8b`8f1457b0 fffff800`169019ea : ffff9484`e28a9560 00000000`00008c40 ffff9484`e28a9000 ffff9484`ecd9c020 : CI!SymCryptModExpSquareAndMultiply32+0x17f
- ffffbb8b`8f145810 fffff800`1690235f : ffff9484`e28a9560 00000000`00008c40 ffff9484`e28a9000 ffff9484`ecd9c020 : CI!SymCryptModExp+0x2e
- ffffbb8b`8f145860 fffff800`169024a7 : ffff9484`00000f1e 00000000`72634943 ffff9484`e972e2e0 ffff9484`ecd9c020 : CI!SymCryptRsaCoreEnc+0x113
- ffffbb8b`8f145990 fffff800`169a1198 : 00000000`00000000 ffffbb8b`8f145ad9 ffff9484`e28a9000 00000273`977b3c0d : CI!SymCryptRsaPkcs1Verify+0xef
- ffffbb8b`8f145a10 fffff800`16953694 : 00000000`00002400 ffffbb8b`8f145b60 ffff0457`00000004 fffff800`169abc68 : CI!HashpVerifyPkcs1Signature+0x21c
- ffffbb8b`8f145b20 fffff800`1695450b : 00000000`00000000 ffffbb8b`8f145fe0 00000000`00000000 00000000`00000001 : CI!MinCryptVerifySignedHash+0x19c
- ffffbb8b`8f145c70 fffff800`16951a77 : 00000273`977b416d ffffbb8b`00000002 ffff9484`e96a72d0 fffff800`169ac070 : CI!MinCryptVerifyCertificateWithPolicy2+0xabb
- ffffbb8b`8f145de0 fffff800`169528ae : ffffbb8b`8f1460c4 ffff9484`e96aec30 00000000`00000000 00000000`00000000 : CI!MinCrypK_VerifySignedDataKModeEx+0x20f
- ffffbb8b`8f145ee0 fffff800`16952ae9 : 00000000`c0000225 00000000`c0000225 ffffbb8b`0000000f 00000273`977b24dc : CI!I_MinCryptVerifyRFC3161TimeStamp+0x76
- ffffbb8b`8f146070 fffff800`16951d7b : 00000000`00000000 ffff9484`ec7be8e8 00000000`00000000 ffffbb8b`8f1461a0 : CI!I_MinCryptGetSigningTime+0x11d
- ffffbb8b`8f146110 fffff800`16939591 : 00000273`977b0000 ffff9484`ec7be890 00000000`00000000 00000000`00000000 : CI!MinCrypK_VerifySignedDataKModeEx+0x513
- ffffbb8b`8f146210 fffff800`1693b437 : 00000000`00000004 00000000`000043f0 00000000`000043f0 ffff9484`ec7be890 : CI!I_ParseCatalog+0x85
- ffffbb8b`8f1462a0 fffff800`16939344 : 00000000`00000000 00000000`00000108 00000000`000043f0 ffffbb8b`8f1464f0 : CI!I_ParseCatalogAndMapHashes+0x97
- ffffbb8b`8f146320 fffff800`1693a013 : ffff9484`00000004 ffff9484`ec7be890 ffff9484`ec7be890 ffffbb8b`8f1464f0 : CI!I_MapCatalog+0x3e4
- ffffbb8b`8f146400 fffff800`16939bc1 : 00000000`00000000 ffff9484`e8b56070 ffffbb8b`8f146561 00000000`00000100 : CI!I_ReloadCatalog+0x263
- ffffbb8b`8f146480 fffff800`169398ce : 00000000`00000001 00000000`00000000 ffff9484`00000001 00000000`00000000 : CI!I_ReloadCatalogDirectory+0x271
- ffffbb8b`8f1465b0 fffff800`16938368 : ffff9484`e256da80 ffff9484`00000001 ffffbb8b`8f146720 00000000`00000004 : CI!I_ReloadCatalogs+0x17a
- ffffbb8b`8f146620 fffff800`16938058 : ffffbb8b`8f1469b8 00000000`00000014 ffff9484`e8a9ca80 00000000`00000001 : CI!I_FindFileOrHeaderHashInCatalogs+0x234
- ffffbb8b`8f146780 fffff800`16943103 : ffffbb8b`8f146974 ffffbb8b`8f146980 ffffbb8b`8f146970 ffffbb8b`8f1469b0 : CI!MinCrypK_VerifyHashInCatalog+0x110
- ffffbb8b`8f146830 fffff800`1693edc7 : ffff9484`e256d620 00000000`00000000 ffff9484`00000001 ffffbb8b`0000002a : CI!CiVerifyFileHashInCatalogs+0x183
- ffffbb8b`8f146910 fffff800`169401e8 : ffffbb8b`8f146d10 ffffbb8b`8f146d10 ffffbb8b`00000000 ffffbb8b`8f146d10 : CI!CipFindFileHash+0x2d3
- ffffbb8b`8f146a50 fffff800`1693fbd2 : ffff9484`e256d620 ffffd98e`92d641f0 ffffd98e`8867f300 fffff800`72d20000 : CI!CipValidateFileHash+0x258
- ffffbb8b`8f146b30 fffff800`1693e0c8 : ffffbb8b`8f146f88 00000000`00000000 ffffd98e`92d641f0 00000000`00000000 : CI!CipValidateImageHash+0xe6
- ffffbb8b`8f146c60 fffff800`15eb7fb6 : ffffbb8b`8f146eb0 fffff800`72d20000 00000000`0000000f fffff800`72d20000 : CI!CiValidateImageHeader+0x688
- ffffbb8b`8f146df0 fffff800`15eb7af7 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00076000 : nt!SeValidateImageHeader+0xd6
- ffffbb8b`8f146ea0 fffff800`15e46666 : 00000000`00000000 fffff800`15e0a78b 00000000`00000000 00000000`00000000 : nt!MiValidateSectionCreate+0x413
- ffffbb8b`8f147090 fffff800`15d97474 : ffffd98e`92d641f0 ffffbb8b`8f1471f0 00000000`00000001 ffffbb8b`8f1473d0 : nt!MiValidateSectionSigningPolicy+0xa6
- ffffbb8b`8f1470f0 fffff800`15e735ee : ffffd98e`92d641f0 ffffbb8b`8f1473d0 ffffbb8b`8f1473d0 00000000`00000002 : nt!MiCreateNewSection+0x4cc
- ffffbb8b`8f147260 fffff800`15e72b2e : ffffbb8b`8f147290 ffff9484`e8ab2920 ffffd98e`92d641f0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2fe
- ffffbb8b`8f147350 fffff800`1585d970 : ffffbb8b`8f147588 00000000`00000000 00000000`ffffffff ffffffff`800020a4 : nt!MiCreateSection+0x10e
- ffffbb8b`8f1474d0 fffff800`15e11606 : 00000000`00000000 ffffbb8b`8f1475e9 ffffffff`800020a4 ffff9484`e200b800 : nt!MiCreateSystemSection+0xa0
- ffffbb8b`8f147570 fffff800`15e37a32 : fffff800`15c1a710 ffffffff`800020a4 fffff800`15c38f90 ffff9484`00000012 : nt!MiCreateSectionForDriver+0x10e
- ffffbb8b`8f147650 fffff800`15eb6ee7 : ffffbb8b`8f1478a8 ffffbb8b`8f1477a0 00000000`00000000 fffff800`00000000 : nt!MiObtainSectionForDriver+0xa6
- ffffbb8b`8f1476a0 fffff800`15eb2493 : ffffbb8b`8f1478a8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImageEx+0xfb
- ffffbb8b`8f147850 fffff800`15eb0a8a : ffffbb8b`8f46a970 00000000`00000000 00000000`00000000 ffffd98e`8867a890 : nt!IopLoadDriver+0x21b
- ffffbb8b`8f147a30 fffff800`158ec20a : ffffd98e`00000000 ffffffff`80002028 ffffd98e`8a821040 ffffd98e`00000000 : nt!IopLoadUnloadDriver+0x4a
- ffffbb8b`8f147a70 fffff800`158599d5 : ffffd98e`8a821040 ffffd98e`8867f300 ffffd98e`8a821040 000024ed`b59bbfff : nt!ExpWorkerThread+0x16a
- ffffbb8b`8f147b10 fffff800`159bee3c : fffff800`146a0180 ffffd98e`8a821040 fffff800`15859980 00000000`00000000 : nt!PspSystemThreadStartup+0x55
- ffffbb8b`8f147b60 00000000`00000000 : ffffbb8b`8f148000 ffffbb8b`8f141000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80015822f5d - nt!MmBuildMdlForNonPagedPool+4d
- [ f6:ed ]
- fffff80015822fba-fffff80015822fbb 2 bytes - nt!MmBuildMdlForNonPagedPool+aa (+0x5d)
- [ 80 fa:00 be ]
- fffff8001583556c - nt!MiCountSharedPages+ac (+0x125b2)
- [ f6:ed ]
- fffff800158b3708 - nt!MmMapLockedPagesSpecifyCache+e8 (+0x7e19c)
- [ f6:ed ]
- fffff80015918801-fffff80015918802 2 bytes - nt!MiInitializeTransitionPfn+21 (+0x650f9)
- [ 80 fa:00 be ]
- fffff80015975222-fffff80015975223 2 bytes - nt!PpmResetPerformanceAccumulation+32 (+0x5ca21)
- [ 48 ff:4c 8b ]
- fffff80015975229-fffff8001597522c 4 bytes - nt!PpmResetPerformanceAccumulation+39 (+0x07)
- [ 0f 1f 44 00:e8 a2 c3 8f ]
- 13 errors : !nt (fffff80015822f5d-fffff8001597522c)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2019-12-13T19:24:09.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- ===================== 3RD PARTY DRIVER QUICK LIST ======================
- ========================================================================
- Aug 02 2010 - AsUpIO.sys - ASUS Update Input Output driver http://www.asus.com/
- Oct 17 2011 - PxHlpa64.sys - Sonic CD/DVD driver
- May 30 2012 - FNETURPX.SYS - FNet User Proxy driver (FNet Co., Ltd.) http://www.gotofnet.com/
- Aug 22 2012 - AsIO.sys - ASUS Input Output driver http://www.asus.com/
- Sep 24 2015 - dtlitescsibus.sys - DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
- Dec 28 2015 - dtliteusbbus.sys - DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
- Jun 13 2016 - LGBusEnum.sys - Logitech GamePanel Virtual Bus Enumerator driver http://support.logitech.com/
- Jun 13 2016 - LGJoyXlCore.sys - Logitech Gaming Software driver http://support.logitech.com/
- Jul 15 2016 - FNETHYRAMAS.SYS - Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
- Sep 17 2016 - netfilter2.sys - NetFilter SDK TDI Hook driver (WPP) http://netfiltersdk.com/
- Sep 25 2017 - e1d65x64.sys - Intel(R) Gigabit Adapter NDIS 6.x driver https://downloadcenter.intel.com/
- Oct 03 2017 - TeeDriverW8x64.sys - Intel Management Engine Interface driver https://downloadcenter.intel.com/
- Oct 12 2017 - iaStorA.sys - Intel SATA Storage Device RAID Controller
- Oct 17 2017 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
- Aug 16 2018 - nvvhci.sys - Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Oct 08 2018 - SYMEVENT64x86.SYS - Symantec Event Library https://www.symantec.com/
- Mar 14 2019 - nvvad64v.sys - Nvidia Virtual Audio driver http://www.nvidia.com/
- Apr 11 2019 - CorsairVBusDriver.sys - Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Apr 11 2019 - CorsairVHidDriver.sys - Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Jun 11 2019 - symnets.sys - Network Security WFP driver https://www.symantec.com/
- Jun 21 2019 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
- Jun 28 2019 - Ironx64.SYS - Symantec Iron driver http://www.symantec.com/
- Jul 10 2019 - IDSvia64.sys - Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
- Aug 08 2019 - SYMEFASI64.SYS - Symantec Extended File Attributes (SI) https://www.symantec.com/
- Sep 11 2019 - eeCtrl64.sys - Symantec Eraser Control driver http://www.symantec.com/
- Sep 11 2019 - EraserUtilRebootDrv.sys - Symantec Eraser Utility Reboot driver http://www.symantec.com/
- Sep 24 2019 - CorsairGamingAudio64.sys - Corsair Gaming Audio 64-bit driver
- Sep 24 2019 - ccSetx64.sys - Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Sep 26 2019 - BHDrvx64.sys - Norton Security BASH driver http://www.symantec.com/
- Oct 09 2019 - SRTSPX64.SYS - Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
- Dec 06 2019 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
- ========================================================================
- ========================== 3RD PARTY DRIVERS ===========================
- ========================================================================
- Image path: \SystemRoot\SysWow64\drivers\AsUpIO.sys
- Image name: AsUpIO.sys
- Search : https://www.google.com/search?q=AsUpIO.sys
- ADA Info : ASUS Update Input Output driver http://www.asus.com/
- Timestamp : Mon Aug 2 2010
- Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
- Image name: PxHlpa64.sys
- Search : https://www.google.com/search?q=PxHlpa64.sys
- ADA Info : Sonic CD/DVD driver
- Timestamp : Mon Oct 17 2011
- Image path: \SystemRoot\System32\drivers\FNETURPX.SYS
- Image name: FNETURPX.SYS
- Search : https://www.google.com/search?q=FNETURPX.SYS
- ADA Info : FNet User Proxy driver (FNet Co., Ltd.) http://www.gotofnet.com/
- Timestamp : Wed May 30 2012
- Image path: \SystemRoot\SysWow64\drivers\AsIO.sys
- Image name: AsIO.sys
- Search : https://www.google.com/search?q=AsIO.sys
- ADA Info : ASUS Input Output driver http://www.asus.com/
- Timestamp : Wed Aug 22 2012
- Image path: \SystemRoot\System32\drivers\dtlitescsibus.sys
- Image name: dtlitescsibus.sys
- Search : https://www.google.com/search?q=dtlitescsibus.sys
- ADA Info : DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
- Timestamp : Thu Sep 24 2015
- Image path: \SystemRoot\System32\drivers\dtliteusbbus.sys
- Image name: dtliteusbbus.sys
- Search : https://www.google.com/search?q=dtliteusbbus.sys
- ADA Info : DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
- Timestamp : Mon Dec 28 2015
- Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
- Image name: LGBusEnum.sys
- Search : https://www.google.com/search?q=LGBusEnum.sys
- ADA Info : Logitech GamePanel Virtual Bus Enumerator driver http://support.logitech.com/
- Timestamp : Mon Jun 13 2016
- Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
- Image name: LGJoyXlCore.sys
- Search : https://www.google.com/search?q=LGJoyXlCore.sys
- ADA Info : Logitech Gaming Software driver http://support.logitech.com/
- Timestamp : Mon Jun 13 2016
- Image path: \SystemRoot\System32\drivers\FNETHYRAMAS.SYS
- Image name: FNETHYRAMAS.SYS
- Search : https://www.google.com/search?q=FNETHYRAMAS.SYS
- ADA Info : Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
- Timestamp : Fri Jul 15 2016
- Image path: \SystemRoot\system32\drivers\netfilter2.sys
- Image name: netfilter2.sys
- Search : https://www.google.com/search?q=netfilter2.sys
- ADA Info : NetFilter SDK TDI Hook driver (WPP) http://netfiltersdk.com/
- Timestamp : Sat Sep 17 2016
- Image path: \SystemRoot\system32\DRIVERS\e1d65x64.sys
- Image name: e1d65x64.sys
- Search : https://www.google.com/search?q=e1d65x64.sys
- ADA Info : Intel(R) Gigabit Adapter NDIS 6.x driver https://downloadcenter.intel.com/
- Timestamp : Mon Sep 25 2017
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Search : https://www.google.com/search?q=TeeDriverW8x64.sys
- ADA Info : Intel Management Engine Interface driver https://downloadcenter.intel.com/
- Timestamp : Tue Oct 3 2017
- Image path: \SystemRoot\System32\drivers\iaStorA.sys
- Image name: iaStorA.sys
- Search : https://www.google.com/search?q=iaStorA.sys
- ADA Info : Intel SATA Storage Device RAID Controller
- Timestamp : Thu Oct 12 2017
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Search : https://www.google.com/search?q=RTKVHD64.sys
- ADA Info : Realtek Audio System driver https://www.realtek.com/en/
- Timestamp : Tue Oct 17 2017
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Search : https://www.google.com/search?q=nvvhci.sys
- ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Timestamp : Thu Aug 16 2018
- Image path: \??\C:\Windows\system32\Drivers\SYMEVENT64x86.SYS
- Image name: SYMEVENT64x86.SYS
- Search : https://www.google.com/search?q=SYMEVENT64x86.SYS
- ADA Info : Symantec Event Library https://www.symantec.com/
- Timestamp : Mon Oct 8 2018
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Search : https://www.google.com/search?q=nvvad64v.sys
- ADA Info : Nvidia Virtual Audio driver http://www.nvidia.com/
- Timestamp : Thu Mar 14 2019
- Image path: \SystemRoot\System32\drivers\CorsairVBusDriver.sys
- Image name: CorsairVBusDriver.sys
- Search : https://www.google.com/search?q=CorsairVBusDriver.sys
- ADA Info : Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Timestamp : Thu Apr 11 2019
- Image path: \SystemRoot\System32\drivers\CorsairVHidDriver.sys
- Image name: CorsairVHidDriver.sys
- Search : https://www.google.com/search?q=CorsairVHidDriver.sys
- ADA Info : Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Timestamp : Thu Apr 11 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\symnets.sys
- Image name: symnets.sys
- Search : https://www.google.com/search?q=symnets.sys
- ADA Info : Network Security WFP driver https://www.symantec.com/
- Timestamp : Tue Jun 11 2019
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Search : https://www.google.com/search?q=nvhda64v.sys
- ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
- Timestamp : Fri Jun 21 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\Ironx64.SYS
- Image name: Ironx64.SYS
- Search : https://www.google.com/search?q=Ironx64.SYS
- ADA Info : Symantec Iron driver http://www.symantec.com/
- Timestamp : Fri Jun 28 2019
- Image path: \??\C:\Program Files\Norton Security\NortonData\22.18.0.213\Definitions\IPSDefs\20191212.061\IDSvia64.sys
- Image name: IDSvia64.sys
- Search : https://www.google.com/search?q=IDSvia64.sys
- ADA Info : Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
- Timestamp : Wed Jul 10 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\SYMEFASI64.SYS
- Image name: SYMEFASI64.SYS
- Search : https://www.google.com/search?q=SYMEFASI64.SYS
- ADA Info : Symantec Extended File Attributes (SI) https://www.symantec.com/
- Timestamp : Thu Aug 8 2019
- Image path: \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\eeCtrl64.sys
- Image name: eeCtrl64.sys
- Search : https://www.google.com/search?q=eeCtrl64.sys
- ADA Info : Symantec Eraser Control driver http://www.symantec.com/
- Timestamp : Wed Sep 11 2019
- Image path: \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys
- Image name: EraserUtilRebootDrv.sys
- Search : https://www.google.com/search?q=EraserUtilRebootDrv.sys
- ADA Info : Symantec Eraser Utility Reboot driver http://www.symantec.com/
- Timestamp : Wed Sep 11 2019
- Image path: \SystemRoot\system32\DRIVERS\CorsairGamingAudio64.sys
- Image name: CorsairGamingAudio64.sys
- Search : https://www.google.com/search?q=CorsairGamingAudio64.sys
- ADA Info : Corsair Gaming Audio 64-bit driver
- Timestamp : Tue Sep 24 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\ccSetx64.sys
- Image name: ccSetx64.sys
- Search : https://www.google.com/search?q=ccSetx64.sys
- ADA Info : Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Timestamp : Tue Sep 24 2019
- Image path: \??\C:\Program Files\Norton Security\NortonData\22.18.0.213\Definitions\BASHDefs\20191210.001\BHDrvx64.sys
- Image name: BHDrvx64.sys
- Search : https://www.google.com/search?q=BHDrvx64.sys
- ADA Info : Norton Security BASH driver http://www.symantec.com/
- Timestamp : Thu Sep 26 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\SRTSPX64.SYS
- Image name: SRTSPX64.SYS
- Search : https://www.google.com/search?q=SRTSPX64.SYS
- ADA Info : Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
- Timestamp : Wed Oct 9 2019
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_77e6900053c33f6f\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Search : https://www.google.com/search?q=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Fri Dec 6 2019
- If any of the above drivers are from Microsoft then please let me know.
- I will have them moved to the Microsoft list on the next update.
- ========================================================================
- ========================== MICROSOFT DRIVERS ===========================
- ========================================================================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- afunix.sys AF_UNIX Socket Provider driver (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- bam.sys BAM Kernal driver (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- cdd.dll Canonical Display Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- crashdmp.sys Crash Dump driver (Microsoft)
- csc.sys Windows Client Side Caching driver (Microsoft)
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_iaStorA.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- fastfat.SYS Fast FAT File System Driver (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HIDCLASS.SYS Hid Class Library (Microsoft)
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kd.dll Local Kernal Debugger (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- Ntfs.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator (Microsoft)
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- serenum.sys Serial Port Enumerator (Microsoft)
- serial.sys Serial Device Driver
- SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- ucx01000.sys USB Controller Extension (Microsoft)
- UEFI.sys UEFI NT driver (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbaudio.sys USB Audio Class Driver (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- UsbHub3.sys USB3 HUB driver (Microsoft)
- USBXHCI.SYS USB XHCI driver (Microsoft)
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- Unloaded modules:
- fffff800`2d5a0000 fffff800`2d5bc000 dam.sys
- fffff800`2af30000 fffff800`2af39000 MbamElam.sys
- fffff800`2af20000 fffff800`2af2b000 SymELAM.sys
- fffff800`2ccb0000 fffff800`2ccc0000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO ===============================
- ========================================================================
- sysinfo: could not find necessary interfaces.
- sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
- ========================================================================
- ============================== IMAGE SCAN ==============================
- ========================================================================
- MZ at fffff800`15801000, prot 00000004, type 00020000 - size a6e000
- Name: ntoskrnl.exe
- MZ at fffff800`16270000, prot 00000040, type 01000000 - size 9d000
- Name: HAL.dll
- MZ at fffff800`16400000, prot 00000040, type 01000000 - size b000
- Name: KD.dll
- MZ at fffff800`16600000, prot 00000040, type 01000000 - size 11000
- Name: WerLiveKernelApi.dll
- MZ at fffff800`1663e000, prot 00000040, type 01000000 - size 62000
- Name: msrpc.sys
- MZ at fffff800`166a1000, prot 00000040, type 01000000 - size 27000
- Name: ntostmhost.dll
- MZ at fffff800`166c9000, prot 00000040, type 01000000 - size 6a000
- Name: CLFS.SYS
- MZ at fffff800`16734000, prot 00000040, type 01000000 - size 18000
- Name: PSHED.dll
- MZ at fffff800`1674d000, prot 00000040, type 01000000 - size b000
- Name: BOOTVID.dll
- MZ at fffff800`16759000, prot 00000040, type 01000000 - size 10b000
- Name: clipsp.sys
- MZ at fffff800`168d6000, prot 00000040, type 01000000 - size e000
- Name: cmimcext.dll
- MZ at fffff800`168e5000, prot 00000040, type 01000000 - size c000
- Name: ntosext.dll
- MZ at fffff800`168f2000, prot 00000040, type 01000000 - size d4000
- Name: CI.dll
- MZ at fffff800`169c7000, prot 00000040, type 01000000 - size b8000
- Name: cng.sys
- MZ at fffff800`2ac00000, prot 00000040, type 01000000 - size 70000
- Name: FLTMGR.SYS
- MZ at fffff800`2ac80000, prot 00000040, type 01000000 - size d1000
- Name: Wdf01000.exe
- MZ at fffff800`2ad60000, prot 00000040, type 01000000 - size 13000
- Name: WDFLDR.SYS
- MZ at fffff800`2ad80000, prot 00000040, type 01000000 - size 10000
- Name: WppRecorder.sys
- MZ at fffff800`2ada0000, prot 00000040, type 01000000 - size f000
- Name: SleepStudyHelper.sys
- MZ at fffff800`2adb0000, prot 00000040, type 01000000 - size 24000
- Name: acpiex.exe
- MZ at fffff800`2ade0000, prot 00000040, type 01000000 - size 3f000
- Name: mssecflt.exe
- MZ at fffff800`2ae20000, prot 00000040, type 01000000 - size 1a000
- Name: SgrmAgent.exe
- MZ at fffff800`2ae40000, prot 00000040, type 01000000 - size c8000
- Name: ACPI.SYS
- MZ at fffff800`2af10000, prot 00000040, type 01000000 - size c000
- Name: WMILIB.SYS
- MZ at fffff800`2af40000, prot 00000040, type 01000000 - size 43000
- Name: intelpep.exe
- MZ at fffff800`2af90000, prot 00000040, type 01000000 - size 16000
- Name: WindowsTrustedRT.exe
- MZ at fffff800`2afb0000, prot 00000040, type 01000000 - size b000
- Name: WindowsTrustedRTProxy.exe
- MZ at fffff800`2afc0000, prot 00000040, type 01000000 - size 14000
- Name: pcw.exe
- MZ at fffff800`2b000000, prot 00000040, type 01000000 - size b000
- Name: msisadrv.exe
- MZ at fffff800`2b010000, prot 00000040, type 01000000 - size 6b000
- Name: pci.exe
- MZ at fffff800`2b080000, prot 00000040, type 01000000 - size 12000
- Name: vdrvroot.exe
- MZ at fffff800`2b0a0000, prot 00000040, type 01000000 - size 2e000
- Name: PDC.exe
- MZ at fffff800`2b0d0000, prot 00000040, type 01000000 - size 19000
- Name: CEA.sys
- MZ at fffff800`2b0f0000, prot 00000040, type 01000000 - size 2f000
- Name: partmgr.exe
- MZ at fffff800`2b120000, prot 00000040, type 01000000 - size a8000
- Name: spaceport.exe
- MZ at fffff800`2b1d0000, prot 00000040, type 01000000 - size 19000
- Name: volmgr.exe
- MZ at fffff800`2b1f0000, prot 00000040, type 01000000 - size 63000
- Name: volmgrx.exe
- MZ at fffff800`2b260000, prot 00000040, type 01000000 - size 1f000
- Name: mountmgr.exe
- MZ at fffff800`2b280000, prot 00000040, type 01000000 - size 1c000
- Name: EhStorClass.exe
- MZ at fffff800`2b2a0000, prot 00000040, type 01000000 - size 1a000
- Name: fileinfo.exe
- MZ at fffff800`2b2c0000, prot 00000040, type 01000000 - size 3e000
- Name: wof.exe
- MZ at fffff800`2b310000, prot 00000040, type 01000000 - size 4f000
- Name: rdyboost.exe
- MZ at fffff800`2b360000, prot 00000040, type 01000000 - size 25000
- Name: MUP.SYS
- MZ at fffff800`2b390000, prot 00000040, type 01000000 - size 1c000
- Name: disk.exe
- MZ at fffff800`2b3b0000, prot 00000040, type 01000000 - size 6f000
- Name: CLASSPNP.SYS
- MZ at fffff800`2b420000, prot 00000040, type 01000000 - size 1c000
- Name: CRASHDMP.SYS
- MZ at fffff800`2b440000, prot 00000040, type 01000000 - size 2e000
- Name: cdrom.exe
- MZ at fffff800`2b4b0000, prot 00000040, type 01000000 - size 15000
- Name: filecrypt.exe
- MZ at fffff800`2b4d0000, prot 00000040, type 01000000 - size e000
- Name: tbs.sys
- MZ at fffff800`2b560000, prot 00000040, type 01000000 - size 1f3000
- Name: mcupdate_GenuineIntel.exe
- MZ at fffff800`2b760000, prot 00000040, type 01000000 - size 2b000
- Name: ksecdd.sys
- MZ at fffff800`2b790000, prot 00000040, type 01000000 - size a000
- Name: null.exe
- MZ at fffff800`2b7a0000, prot 00000040, type 01000000 - size a000
- Name: beep.exe
- MZ at fffff800`2b800000, prot 00000040, type 01000000 - size 9b000
- Name: storport.sys
- MZ at fffff800`2c400000, prot 00000040, type 01000000 - size 153000
- Name: NDIS.SYS
- MZ at fffff800`2c560000, prot 00000040, type 01000000 - size 95000
- Name: NETIO.SYS
- MZ at fffff800`2c600000, prot 00000040, type 01000000 - size 32000
- Name: ksecpkg.exe
- MZ at fffff800`2c640000, prot 00000040, type 01000000 - size 2d9000
- Name: TCPIP.SYS
- MZ at fffff800`2c920000, prot 00000040, type 01000000 - size 78000
- Name: fwpkclnt.sys
- MZ at fffff800`2c9a0000, prot 00000040, type 01000000 - size 30000
- Name: wfplwfs.exe
- MZ at fffff800`2cbd0000, prot 00000040, type 01000000 - size c8000
- Name: fvevol.exe
- MZ at fffff800`2cca0000, prot 00000040, type 01000000 - size b000
- Name: volume.exe
- MZ at fffff800`2ccd0000, prot 00000040, type 01000000 - size 28d000
- Name: ntfs.exe
- MZ at fffff800`2cf60000, prot 00000040, type 01000000 - size d000
- Name: fs_rec.exe
- MZ at fffff800`2cf70000, prot 00000040, type 01000000 - size 6d000
- Name: volsnap.exe
- MZ at fffff800`2cfe0000, prot 00000040, type 01000000 - size 11000
- Name: iorate.exe
- MZ at fffff800`2d000000, prot 00000040, type 01000000 - size a6000
- Name: afd.exe
- MZ at fffff800`2d0b0000, prot 00000040, type 01000000 - size 1a000
- Name: vwififlt.SYS
- MZ at fffff800`2d0d0000, prot 00000040, type 01000000 - size 2b000
- Name: pacer.exe
- MZ at fffff800`2d100000, prot 00000040, type 01000000 - size 14000
- Name: netbios.exe
- MZ at fffff800`2d120000, prot 00000040, type 01000000 - size 7a000
- Name: rdbss.sys
- MZ at fffff800`2d1a0000, prot 00000040, type 01000000 - size 94000
- Name: csc.exe
- MZ at fffff800`2d2f0000, prot 00000040, type 01000000 - size 12000
- Name: nsiproxy.exe
- MZ at fffff800`2d310000, prot 00000040, type 01000000 - size d000
- Name: NpSvcTrig.exe
- MZ at fffff800`2d320000, prot 00000040, type 01000000 - size 10000
- Name: mssmbios.exe
- MZ at fffff800`2d4b0000, prot 00000040, type 01000000 - size a000
- Name: gpuenergydrv.exe
- MZ at fffff800`2d570000, prot 00000040, type 01000000 - size 2c000
- Name: dfsc.exe
- MZ at fffff800`2d5c0000, prot 00000040, type 01000000 - size 6b000
- Name: fastfat.exe
- MZ at fffff800`2d730000, prot 00000040, type 01000000 - size 33b000
- Name: dxgkrnl.sys
- MZ at fffff800`2da70000, prot 00000040, type 01000000 - size 16000
- Name: watchdog.sys
- MZ at fffff800`2da90000, prot 00000040, type 01000000 - size 16000
- Name: BasicDisplay.exe
- MZ at fffff800`2dab0000, prot 00000040, type 01000000 - size 11000
- Name: BasicRender.exe
- MZ at fffff800`2dad0000, prot 00000040, type 01000000 - size 1c000
- Name: npfs.exe
- MZ at fffff800`2daf0000, prot 00000040, type 01000000 - size 11000
- Name: msfs.exe
- MZ at fffff800`2db10000, prot 00000040, type 01000000 - size 27000
- Name: tdx.exe
- MZ at fffff800`2db40000, prot 00000040, type 01000000 - size 10000
- Name: TDI.SYS
- MZ at fffff800`2db80000, prot 00000040, type 01000000 - size 51000
- Name: netbt.exe
- MZ at fffff800`2dbe0000, prot 00000040, type 01000000 - size 13000
- Name: afunix.dll
- MZ at fffff800`2dc20000, prot 00000040, type 01000000 - size 4e000
- Name: ahcache.exe
- MZ at fffff800`2dc70000, prot 00000040, type 01000000 - size 84000
- Name: Vid.exe
- MZ at fffff800`2dd00000, prot 00000040, type 01000000 - size 1e000
- Name: winhvr.sys
- MZ at fffff800`2dd20000, prot 00000040, type 01000000 - size 11000
- Name: CompositeBus.exe
- MZ at fffff800`2dd40000, prot 00000040, type 01000000 - size d000
- Name: kdnic.sys
- MZ at fffff800`2dd50000, prot 00000040, type 01000000 - size 15000
- Name: UmBus.exe
- MZ at fffff800`2e5e0000, prot 00000040, type 01000000 - size 14000
- Name: bam.exe
- MZ at fffff800`2e620000, prot 00000040, type 01000000 - size 1d000
- Name: DUMPFVE.SYS
- MZ at fffff800`2e640000, prot 00000040, type 01000000 - size d7000
- Name: dxgmms2.sys
- MZ at fffff800`2e720000, prot 00000040, type 01000000 - size 18000
- Name: monitor.exe
- MZ at fffff800`2e740000, prot 00000004, type 00020000 - size 29000
- Name: luafv.exe
- MZ at fffff800`2e770000, prot 00000004, type 00020000 - size 2d000
- Name: wcifs.exe
- MZ at fffff800`2fe00000, prot 00000040, type 01000000 - size 78000
- Name: usbxhci.exe
- MZ at fffff800`2fe80000, prot 00000040, type 01000000 - size 3f000
- Name: ucx01000.exe
- MZ at fffff800`2ff00000, prot 00000040, type 01000000 - size 1c000
- Name: serial.exe
- MZ at fffff800`2ff20000, prot 00000040, type 01000000 - size f000
- Name: SerEnum.exe
- MZ at fffff800`2ffc0000, prot 00000040, type 01000000 - size c000
- Name: wmiacpi.exe
- MZ at fffff800`2ffd0000, prot 00000040, type 01000000 - size 3e000
- Name: intelppm.exe
- MZ at fffff800`30010000, prot 00000040, type 01000000 - size b000
- Name: acpipagr.exe
- MZ at fffff800`30020000, prot 00000040, type 01000000 - size e000
- Name: UEFI.SYS
- MZ at fffff800`30050000, prot 00000040, type 01000000 - size f000
- Name: ksthunk.exe
- MZ at fffff800`30090000, prot 00000040, type 01000000 - size d000
- Name: NdisVirtualBus.exe
- MZ at fffff800`300a0000, prot 00000040, type 01000000 - size c000
- Name: swenum.exe
- MZ at fffff800`300f0000, prot 00000040, type 01000000 - size e000
- Name: rdpbus.exe
- MZ at fffff800`30110000, prot 00000040, type 01000000 - size 3b000
- Name: HIDCLASS.SYS
- MZ at fffff800`30150000, prot 00000040, type 01000000 - size 13000
- Name: HIDPARSE.SYS
- MZ at fffff800`301b0000, prot 00000040, type 01000000 - size 93000
- Name: usbhub3.sys
- MZ at fffff800`30250000, prot 00000040, type 01000000 - size e000
- Name: USBD.SYS
- MZ at fffff800`30260000, prot 00000040, type 01000000 - size 11000
- Name: kbdhid.exe
- MZ at fffff800`30280000, prot 00000040, type 01000000 - size 13000
- Name: kbdclass.exe
- MZ at fffff800`308a0000, prot 00000040, type 01000000 - size 31000
- Name: usbccgp.exe
- MZ at fffff800`308e0000, prot 00000040, type 01000000 - size 12000
- Name: hidusb.exe
- MZ at fffff800`30900000, prot 00000040, type 01000000 - size f000
- Name: mouhid.exe
- MZ at fffff800`30910000, prot 00000040, type 01000000 - size 13000
- Name: mouclass.exe
- MZ at fffff800`30930000, prot 00000040, type 01000000 - size 35000
- Name: USBAudio.exe
- MZ at fffff800`30c00000, prot 00000040, type 01000000 - size f000
- Name: SYS.exe
- MZ at fffff800`32450000, prot 00000040, type 01000000 - size 1f000
- Name: hdaudbus.exe
- MZ at fffff800`32470000, prot 00000040, type 01000000 - size 65000
- Name: portcls.sys
- MZ at fffff800`32510000, prot 00000040, type 01000000 - size 75000
- Name: ks.sys
- MZ at fffff800`72d20000, prot 00000004, type 00020000
Advertisement
Add Comment
Please, Sign In to add comment