Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer
- Version: 0.91
- Time to analyze file(s): 00 hours and 00 minutes and 27 seconds
- ================================ SYSTEM ================================
- MANUFACTURER: Micro-Star International Co., Ltd.
- PRODUCT_NAME: MS-7C80
- VERSION: 1.0
- ================================= BIOS =================================
- VENDOR: American Megatrends Inc.
- VERSION: 1.00
- DATE: 04/14/2020
- ============================= MOTHERBOARD ==============================
- MANUFACTURER: Micro-Star International Co., Ltd.
- PRODUCT: MAG Z490 TOMAHAWK (MS-7C80)
- VERSION: 1.0
- ================================= RAM ==================================
- Size Speed Manufacturer Part No.
- -------------- -------------- ------------------- ----------------------
- 0MHz
- 16384MB 3600MHz 04CD F4-3600C16-16GVKC
- 0MHz
- 16384MB 3600MHz 04CD F4-3600C16-16GVKC
- ================================= CPU ==================================
- Processor Version: Intel(R) Core(TM) i5-10600K CPU @ 4.10GHz
- COUNT: c
- MHZ: 4104
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: a5
- STEPPING: 5
- MICROCODE: 6,a5,5,0 (F,M,S,R) SIG: C8'00000000 (cache) C8'00000000 (init)
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS
- BUILD_VERSION: 10.0.19041.329 (WinBuild.160101.0800)
- BUILD: 19041
- SERVICEPACK: 329
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- BUILD_TIMESTAMP: unknown_date
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.19041.329
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Information gathered from different dump files may be different. If
- Windows updates between two dump files, two or more OS versions may
- be shown above.
- * If the user updates the BIOS between dump files, two or more versions
- and dates may be shown above.
- * More RAM information can be found below in a full BIOS section.
- ========================================================================
- ======================= Dump #1: ANALYZE VERBOSE =======================
- ====================== File: 070320-15812-01.dmp =======================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Kernel base = 0xfffff805`80813000 PsLoadedModuleList = 0xfffff805`8143d2b0
- Debug session time: Fri Jul 3 14:16:10.365 2020 (UTC - 4:00)
- System Uptime: 0 days 3:06:52.575
- BugCheck 139, {4, ffffcc00b9d7c010, ffffcc00b9d7bf68, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
- Followup: MachineOwner
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
- extents for the thread.
- Arg2: ffffcc00b9d7c010, Address of the trap frame for the exception that caused the bugcheck
- Arg3: ffffcc00b9d7bf68, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- TRAP_FRAME: ffffcc00b9d7c010 -- (.trap 0xffffcc00b9d7c010)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffff8c8057739000 rbx=0000000000000000 rcx=0000000000000004
- rdx=ffff8c8057740000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80580c9ad8d rsp=ffffcc00b9d7c1a0 rbp=ffffcc00b9d7c710
- r8=ffff8c8057740000 r9=ffffcc00b9d7c728 r10=ffff8c805773fa00
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!RtlpGetStackLimitsEx+0x14abed:
- fffff805`80c9ad8d cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffffcc00b9d7bf68 -- (.exr 0xffffcc00b9d7bf68)
- ExceptionAddress: fffff80580c9ad8d (nt!RtlpGetStackLimitsEx+0x000000000014abed)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000004
- Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: ESP_OUT_OF_RANGE
- BUGCHECK_STR: 0x139
- PROCESS_NAME: ModernWarfare.
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000004
- WATSON_BKT_EVENT: BEX
- BAD_STACK_POINTER: ffffcc00b9d7bce8
- LAST_CONTROL_TRANSFER: from fffff80580c02929 to fffff80580bf0a20
- FAULTING_THREAD: 0000000000000000
- STACK_TEXT:
- ffffcc00`b9d7bce8 fffff805`80c02929 : 00000000`00000139 00000000`00000004 ffffcc00`b9d7c010 ffffcc00`b9d7bf68 : nt!KeBugCheckEx
- ffffcc00`b9d7bcf0 fffff805`80c02d50 : 00000000`00000000 00000000`00000000 ffffcc00`b9d7bee0 ffffcc00`b9d7bf78 : nt!KiBugCheckDispatch+0x69
- ffffcc00`b9d7be30 fffff805`80c010e3 : ffffcc00`b9d7c7c0 00000000`00000000 ffffcc00`b9d7ba60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
- ffffcc00`b9d7c010 fffff805`80c9ad8d : 00000045`eadfe120 00007fff`871bb15a ffffcc00`b9d7c710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
- ffffcc00`b9d7c1a0 fffff805`80c24df9 : ffffcc00`b9d7c710 00000000`00000000 ffff8c80`5773fa00 fffff805`00000003 : nt!RtlpGetStackLimitsEx+0x14abed
- ffffcc00`b9d7c1d0 fffff805`80a8e226 : ffff8c80`5773ef88 ffffcc00`b9d7ce20 ffff8c80`5773ef88 00000000`00000000 : nt!RtlDispatchException+0x1df0d9
- ffffcc00`b9d7c8f0 fffff805`80bf18b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
- ffffcc00`b9d7cfb0 fffff805`80bf1880 : fffff805`80c02a65 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 : nt!KxExceptionDispatchOnExceptionStack+0x12
- ffff8c80`5773ee48 fffff805`80c02a65 : 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 fffff805`80b29b0a : nt!KiExceptionDispatchOnExceptionStackContinue
- ffff8c80`5773ee50 fffff805`80bfe7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
- ffff8c80`5773f030 fffff805`80bf8957 : 00000000`00000000 fffff805`80a2b5cf ffff8c80`5773fa00 ffffa800`d1fe3408 : nt!KiGeneralProtectionFault+0x320
- ffff8c80`5773f1c0 fffff805`80a2b5cf : ffff8c80`5773fa00 ffffa800`d1fe3408 000fa2ca`00270dd6 002ca588`001bad52 : nt!ExpInterlockedPopEntrySListFault
- ffff8c80`5773f1d0 fffff805`80a2a972 : fffff805`81463ac0 ffff76b4`00000093 00000000`00000093 00000000`00000001 : nt!MiGetPage+0x35f
- ffff8c80`5773f2b0 fffff805`80a28656 : ffff8c80`5773f690 00000000`00000000 00000000`00000001 fffff805`80c81611 : nt!MiGetPageChain+0x172
- ffff8c80`5773f510 fffff805`80a28118 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`81463ac0 : nt!MiResolvePrivateZeroFault+0x176
- ffff8c80`5773f630 fffff805`80a274ed : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208
- ffff8c80`5773f720 fffff805`80a25a69 : 00000000`00000111 00000000`00000003 00000000`c0000016 fffff805`00000000 : nt!MiDispatchFault+0x22d
- ffff8c80`5773f860 fffff805`80bfeb1e : 000001a1`0cb56103 ffffb901`fe767460 00000000`00000001 ffffb901`00000000 : nt!MmAccessFault+0x189
- ffff8c80`5773fa00 00007fff`871bb15a : 0000019c`79ce0000 00007fff`00000005 00000000`00000038 000001bc`00000000 : nt!KiPageFault+0x35e
- 00000045`eadfe120 0000019c`79ce0000 : 00007fff`00000005 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 : 0x00007fff`871bb15a
- 00000045`eadfe128 00007fff`00000005 : 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 : 0x0000019c`79ce0000
- 00000045`eadfe130 00000000`00000038 : 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 : 0x00007fff`00000005
- 00000045`eadfe138 000001bc`00000000 : 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 : 0x38
- 00000045`eadfe140 000001a1`0e8f7d20 : 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 : 0x000001bc`00000000
- 00000045`eadfe148 000001a1`0e8f9b34 : 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 00000000`00000000 : 0x000001a1`0e8f7d20
- 00000045`eadfe150 000001a3`fc6cffe0 : 000001a1`0e8f8330 00000000`00000000 00000000`00000000 00000000`000001cc : 0x000001a1`0e8f9b34
- 00000045`eadfe158 000001a1`0e8f8330 : 00000000`00000000 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 : 0x000001a3`fc6cffe0
- 00000045`eadfe160 00000000`00000000 : 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 00000000`00000000 : 0x000001a1`0e8f8330
- THREAD_SHA1_HASH_MOD_FUNC: 7d221bf33ce405db2fad0126bfcdd720956ac548
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5855d6d9414f306d0327bd8179630ba2cfe880a
- THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358
- FOLLOWUP_IP:
- nt!KiFastFailDispatch+d0
- fffff805`80c02d50 c644242000 mov byte ptr [rsp+20h],0
- FAULT_INSTR_CODE: 202444c6
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiFastFailDispatch+d0
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- IMAGE_VERSION: 10.0.19041.329
- STACK_COMMAND: ~0s ; kb
- BUCKET_ID_FUNC_OFFSET: d0
- FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
- BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
- PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
- TARGET_TIME: 2020-07-03T18:16:10.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
- FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
- Followup: MachineOwner
- ====================== Dump #1: 3RD PARTY DRIVERS ======================
- Oct 08 2018 - SYMEVENT64x86.SYS - Symantec Event Library https://www.symantec.com/
- Apr 24 2019 - iqvw64e.sys - Intel Network Adapter Diagnostic driver http://www.intel.com/
- Jun 28 2019 - Ironx64.SYS - Symantec Iron driver http://www.symantec.com/
- Jul 10 2019 - IDSvia64.sys - Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
- Sep 11 2019 - eeCtrl64.sys - Symantec Eraser Control driver http://www.symantec.com/
- Sep 26 2019 - BHDrvx64.sys - Norton Security BASH driver http://www.symantec.com/
- Nov 18 2019 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
- Dec 30 2019 - SRTSPX64.SYS - Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
- Dec 31 2019 - SymEvnt.sys - Symantec Event Library driver
- Jan 09 2020 - ccSetx64.sys - Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Jan 26 2020 - UcmCxUcsiNvppc.sys - NVIDIA USB Type-C Port Policy Controller driver
- Feb 03 2020 - e1d68x64.sys - Intel(R) Gigabit Adapter driver
- Feb 08 2020 - symnets.sys - Network Security WFP driver https://www.symantec.com/
- Feb 11 2020 - SYMEFASI64.SYS - Symantec Extended File Attributes (SI) https://www.symantec.com/
- Mar 24 2020 - TeeDriverW10x64.sys - Intel Management Engine Interface driver
- Apr 21 2020 - SRTSP64.SYS - Symantec Real Time Storage Protection http://www.symantec.com/
- Apr 29 2020 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
- Jun 09 2020 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
- Jun 21 2020 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
- ================== Dump #1: 3RD PARTY DRIVERS (FULL) ===================
- Image name: SYMEVENT64x86.SYS
- Search : https://www.google.com/search?q=SYMEVENT64x86.SYS
- ADA Info : Symantec Event Library https://www.symantec.com/
- Timestamp : Mon Oct 8 2018
- Image name: iqvw64e.sys
- Search : https://www.google.com/search?q=iqvw64e.sys
- ADA Info : Intel Network Adapter Diagnostic driver http://www.intel.com/
- Timestamp : Wed Apr 24 2019
- Image name: Ironx64.SYS
- Search : https://www.google.com/search?q=Ironx64.SYS
- ADA Info : Symantec Iron driver http://www.symantec.com/
- Timestamp : Fri Jun 28 2019
- Image name: IDSvia64.sys
- Search : https://www.google.com/search?q=IDSvia64.sys
- ADA Info : Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
- Timestamp : Wed Jul 10 2019
- Image name: eeCtrl64.sys
- Search : https://www.google.com/search?q=eeCtrl64.sys
- ADA Info : Symantec Eraser Control driver http://www.symantec.com/
- Timestamp : Wed Sep 11 2019
- Image name: BHDrvx64.sys
- Search : https://www.google.com/search?q=BHDrvx64.sys
- ADA Info : Norton Security BASH driver http://www.symantec.com/
- Timestamp : Thu Sep 26 2019
- Image name: rt640x64.sys
- Search : https://www.google.com/search?q=rt640x64.sys
- ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
- Timestamp : Mon Nov 18 2019
- Image name: SRTSPX64.SYS
- Search : https://www.google.com/search?q=SRTSPX64.SYS
- ADA Info : Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
- Timestamp : Mon Dec 30 2019
- Image name: SymEvnt.sys
- Search : https://www.google.com/search?q=SymEvnt.sys
- ADA Info : Symantec Event Library driver
- Timestamp : Tue Dec 31 2019
- Image name: ccSetx64.sys
- Search : https://www.google.com/search?q=ccSetx64.sys
- ADA Info : Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Timestamp : Thu Jan 9 2020
- Image name: UcmCxUcsiNvppc.sys
- Search : https://www.google.com/search?q=UcmCxUcsiNvppc.sys
- ADA Info : NVIDIA USB Type-C Port Policy Controller driver
- Timestamp : Sun Jan 26 2020
- Image name: e1d68x64.sys
- Search : https://www.google.com/search?q=e1d68x64.sys
- ADA Info : Intel(R) Gigabit Adapter driver
- Timestamp : Mon Feb 3 2020
- Image name: symnets.sys
- Search : https://www.google.com/search?q=symnets.sys
- ADA Info : Network Security WFP driver https://www.symantec.com/
- Timestamp : Sat Feb 8 2020
- Image name: SYMEFASI64.SYS
- Search : https://www.google.com/search?q=SYMEFASI64.SYS
- ADA Info : Symantec Extended File Attributes (SI) https://www.symantec.com/
- Timestamp : Tue Feb 11 2020
- Image name: TeeDriverW10x64.sys
- Search : https://www.google.com/search?q=TeeDriverW10x64.sys
- ADA Info : Intel Management Engine Interface driver
- Timestamp : Tue Mar 24 2020
- Image name: SRTSP64.SYS
- Search : https://www.google.com/search?q=SRTSP64.SYS
- ADA Info : Symantec Real Time Storage Protection http://www.symantec.com/
- Timestamp : Tue Apr 21 2020
- Image name: RTKVHD64.sys
- Search : https://www.google.com/search?q=RTKVHD64.sys
- ADA Info : Realtek Audio System driver https://www.realtek.com/en/
- Timestamp : Wed Apr 29 2020
- Image name: nvhda64v.sys
- Search : https://www.google.com/search?q=nvhda64v.sys
- ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
- Timestamp : Tue Jun 9 2020
- Image name: nvlddmkm.sys
- Search : https://www.google.com/search?q=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Sun Jun 21 2020
- ====================== Dump #1: MICROSOFT DRIVERS ======================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
- acpitime.sys ACPI Wake Alarm (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- afunix.sys AF_UNIX Socket Provider driver (Microsoft)
- AgileVpn.sys RAS Agil VPN Miniport Call Manager driver (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- bam.sys BAM Kernal driver (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- bindflt.sys Windows Bind Filter driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
- cdd.dll Canonical Display Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- cldflt.sys Cloud Files Mini Filter driver (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- condrv.sys Console Driver (Microsoft)
- crashdmp.sys Crash Dump driver (Microsoft)
- csc.sys Windows Client Side Caching driver (Microsoft)
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_stornvme.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- fastfat.SYS Fast FAT File System Driver (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HIDCLASS.SYS Hid Class Library (Microsoft)
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- HTTP.sys HTTP Protocol Stack (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- IntelTA.sys Intel Telemetry Driver
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate.dll Media Center Update (Microsoft)
- mmcss.sys MMCSS Driver (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
- mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
- mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
- msquic.sys Windows QUIC Driver
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
- ndistapi.sys NDIS 3.0 Connection Wrapper driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- ndiswan.sys MS PPP Framing Driver (Strong Encryption) Microsoft)
- NDProxy.sys NDIS Proxy driver (Microsoft)
- Ndu.sys Network Data Usage Monitoring driver (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- Ntfs.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator (Microsoft)
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rasl2tp.sys RAS L2TP Mini-port/Call-manager driver (Microsoft)
- raspppoe.sys RAS PPPoE Mini-port/Call manager driver (Microsoft)
- raspptp.sys Peer-to-Peer Tunneling Protocol (Microsoft)
- rassstp.sys RAS SSTP Miniport Call Manager driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- rspndr.sys Link-Layer Topology Responder driver (Microsoft)
- SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- srv2.sys Smb 2.0 Server driver (Microsoft)
- srvnet.sys Server Network driver (Microsoft)
- storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
- stornvme.sys NVM Express Storport Miniport driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
- storqosflt.sys Storage QoS Filter driver (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- UcmCx.sys USB Connector Manager KMDF Class Extension
- ucx01000.sys USB Controller Extension (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbaudio.sys USB Audio Class Driver (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- UsbHub3.sys USB3 HUB driver (Microsoft)
- USBXHCI.SYS USB XHCI driver (Microsoft)
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- VerifierExt.sys Driver Verifier Extension
- Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- ====================== Dump #1: UNLOADED MODULES =======================
- fffff805`3d650000 fffff805`3d65f000 dump_storpor
- fffff805`3d690000 fffff805`3d6bc000 dump_stornvm
- fffff805`3d6e0000 fffff805`3d6fe000 dump_dumpfve
- fffff805`3bf40000 fffff805`3bf4f000 dump_storpor
- fffff805`3bf80000 fffff805`3bfac000 dump_stornvm
- fffff805`3bfd0000 fffff805`3bfee000 dump_dumpfve
- fffff805`3bd00000 fffff805`3bd1c000 dam.sys
- fffff805`82100000 fffff805`8210a000 SymELAM.sys
- fffff805`83320000 fffff805`83330000 hwpolicy.sys
- ====================== Dump #1: BIOS INFORMATION =======================
- [SMBIOS Data Tables v3.2]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 4565 bytes]
- [BIOS Information (Type 0) - Length 26 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 1.00
- BIOS Starting Address Segment f000
- BIOS Release Date 04/14/2020
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 17
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer Micro-Star International Co., Ltd.
- Product Name MS-7C80
- Version 1.0
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber Default string
- Family Default string
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer Micro-Star International Co., Ltd.
- Product MAG Z490 TOMAHAWK (MS-7C80)
- Version 1.0
- Feature Flags 09h
- -258427168: - -258427120: - Γ·7!ΓΌ
- Location Default string
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer Micro-Star International Co., Ltd.
- Chassis Type Desktop
- Version 1.0
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 0021h]
- Number of Strings 1
- 1 Default string
- [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
- [Physical Memory Array (Type 16) - Length 23 - Handle 0039h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 84 - Handle 003ah]
- Physical Memory Array Handle 0039h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 84 - Handle 003bh]
- Physical Memory Array Handle 0039h
- Total Width 64 bits
- Data Width 64 bits
- Size 16384MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 3600MHz
- Manufacturer 04CD
- Part Number F4-3600C16-16GVKC
- [Memory Device (Type 17) - Length 84 - Handle 003ch]
- Physical Memory Array Handle 0039h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 84 - Handle 003dh]
- Physical Memory Array Handle 0039h
- Total Width 64 bits
- Data Width 64 bits
- Size 16384MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 3600MHz
- Manufacturer 04CD
- Part Number F4-3600C16-16GVKC
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 003eh]
- Starting Address 00000000h
- Ending Address 01ffffffh
- Memory Array Handle 0039h
- Partition Width 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 003fh]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Device Handle 003bh
- Mem Array Mapped Adr Handle 003eh
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0040h]
- Starting Address 01000000h
- Ending Address 01ffffffh
- Memory Device Handle 003dh
- Mem Array Mapped Adr Handle 003eh
- Interleave Position 02
- Interleave Data Depth 02
- [Cache Information (Type 7) - Length 27 - Handle 0046h]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0180h - 384K
- Installed Size 0180h - 384K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 27 - Handle 0047h]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0600h - 1536K
- Installed Size 0600h - 1536K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 27 - Handle 0048h]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 3000h - 12288K
- Installed Size 3000h - 12288K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Processor Information (Type 4) - Length 48 - Handle 0049h]
- Socket Designation U3E1
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID 55060a00fffbebbf
- Processor Version Intel(R) Core(TM) i5-10600K CPU @ 4.10GHz
- Processor Voltage 8ah - 1.0V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 4059MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0046h
- L2 Cache Handle 0047h
- L3 Cache Handle 0048h
- ========================== Dump #1: Extra #1 ===========================
- 3: kd> !verifier
- fffff8058143d6c0: Unable to get verifier list.
- ========================== Dump #1: Extra #2 ===========================
- 3: kd> !thread
- THREAD ffffb9028f7020c0 Cid 1410.1600 Teb: 00000045e9aed000 Win32Thread: ffffb902ae0b8fc0 RUNNING on processor 3
- Not impersonating
- GetUlongFromAddress: unable to read from fffff8058142443c
- Owning Process ffffb901f228b080 Image: ModernWarfare.
- Attached Process N/A Image: N/A
- fffff78000000000: Unable to get shared data
- Wait Start TickCount 717604
- Context Switch Count 24085184 IdealProcessor: 4
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- Win32 Start Address 0x00007ff733d970a0
- Stack Init ffff8c805773fb90 Current ffff8c805773f5a0
- Base ffff8c8057740000 Limit ffff8c8057739000 Call 0000000000000000
- Priority 9 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
- Child-SP RetAddr : Args to Child : Call Site
- ffffcc00`b9d7bce8 fffff805`80c02929 : 00000000`00000139 00000000`00000004 ffffcc00`b9d7c010 ffffcc00`b9d7bf68 : nt!KeBugCheckEx
- ffffcc00`b9d7bcf0 fffff805`80c02d50 : 00000000`00000000 00000000`00000000 ffffcc00`b9d7bee0 ffffcc00`b9d7bf78 : nt!KiBugCheckDispatch+0x69
- ffffcc00`b9d7be30 fffff805`80c010e3 : ffffcc00`b9d7c7c0 00000000`00000000 ffffcc00`b9d7ba60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
- ffffcc00`b9d7c010 fffff805`80c9ad8d : 00000045`eadfe120 00007fff`871bb15a ffffcc00`b9d7c710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 (TrapFrame @ ffffcc00`b9d7c010)
- ffffcc00`b9d7c1a0 fffff805`80c24df9 : ffffcc00`b9d7c710 00000000`00000000 ffff8c80`5773fa00 fffff805`00000003 : nt!RtlpGetStackLimitsEx+0x14abed
- ffffcc00`b9d7c1d0 fffff805`80a8e226 : ffff8c80`5773ef88 ffffcc00`b9d7ce20 ffff8c80`5773ef88 00000000`00000000 : nt!RtlDispatchException+0x1df0d9
- ffffcc00`b9d7c8f0 fffff805`80bf18b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
- ffffcc00`b9d7cfb0 fffff805`80bf1880 : fffff805`80c02a65 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 : nt!KxExceptionDispatchOnExceptionStack+0x12 (TrapFrame @ ffffcc00`b9d7ce70)
- ffff8c80`5773ee48 fffff805`80c02a65 : 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 fffff805`80b29b0a : nt!KiExceptionDispatchOnExceptionStackContinue
- ffff8c80`5773ee50 fffff805`80bfe7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
- ffff8c80`5773f030 fffff805`80bf8957 : 00000000`00000000 fffff805`80a2b5cf ffff8c80`5773fa00 ffffa800`d1fe3408 : nt!KiGeneralProtectionFault+0x320 (TrapFrame @ ffff8c80`5773f030)
- ffff8c80`5773f1c0 fffff805`80a2b5cf : ffff8c80`5773fa00 ffffa800`d1fe3408 000fa2ca`00270dd6 002ca588`001bad52 : nt!ExpInterlockedPopEntrySListFault
- ffff8c80`5773f1d0 fffff805`80a2a972 : fffff805`81463ac0 ffff76b4`00000093 00000000`00000093 00000000`00000001 : nt!MiGetPage+0x35f
- ffff8c80`5773f2b0 fffff805`80a28656 : ffff8c80`5773f690 00000000`00000000 00000000`00000001 fffff805`80c81611 : nt!MiGetPageChain+0x172
- ffff8c80`5773f510 fffff805`80a28118 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`81463ac0 : nt!MiResolvePrivateZeroFault+0x176
- ffff8c80`5773f630 fffff805`80a274ed : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208
- ffff8c80`5773f720 fffff805`80a25a69 : 00000000`00000111 00000000`00000003 00000000`c0000016 fffff805`00000000 : nt!MiDispatchFault+0x22d
- ffff8c80`5773f860 fffff805`80bfeb1e : 000001a1`0cb56103 ffffb901`fe767460 00000000`00000001 ffffb901`00000000 : nt!MmAccessFault+0x189
- ffff8c80`5773fa00 00007fff`871bb15a : 0000019c`79ce0000 00007fff`00000005 00000000`00000038 000001bc`00000000 : nt!KiPageFault+0x35e (TrapFrame @ ffff8c80`5773fa00)
- 00000045`eadfe120 0000019c`79ce0000 : 00007fff`00000005 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 : 0x00007fff`871bb15a
- 00000045`eadfe128 00007fff`00000005 : 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 : 0x0000019c`79ce0000
- 00000045`eadfe130 00000000`00000038 : 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 : 0x00007fff`00000005
- 00000045`eadfe138 000001bc`00000000 : 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 : 0x38
- 00000045`eadfe140 000001a1`0e8f7d20 : 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 : 0x000001bc`00000000
- 00000045`eadfe148 000001a1`0e8f9b34 : 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 00000000`00000000 : 0x000001a1`0e8f7d20
- 00000045`eadfe150 000001a3`fc6cffe0 : 000001a1`0e8f8330 00000000`00000000 00000000`00000000 00000000`000001cc : 0x000001a1`0e8f9b34
- 00000045`eadfe158 000001a1`0e8f8330 : 00000000`00000000 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 : 0x000001a3`fc6cffe0
- 00000045`eadfe160 00000000`00000000 : 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 00000000`00000000 : 0x000001a1`0e8f8330
Add Comment
Please, Sign In to add comment