Guest User

Untitled

a guest
Jul 4th, 2020
19
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer
  3. Version: 0.91
  4. Time to analyze file(s): 00 hours and 00 minutes and 27 seconds
  5.  
  6. ================================ SYSTEM ================================
  7. MANUFACTURER: Micro-Star International Co., Ltd.
  8. PRODUCT_NAME: MS-7C80
  9. VERSION: 1.0
  10.  
  11. ================================= BIOS =================================
  12. VENDOR: American Megatrends Inc.
  13. VERSION: 1.00
  14. DATE: 04/14/2020
  15.  
  16. ============================= MOTHERBOARD ==============================
  17. MANUFACTURER: Micro-Star International Co., Ltd.
  18. PRODUCT: MAG Z490 TOMAHAWK (MS-7C80)
  19. VERSION: 1.0
  20.  
  21. ================================= RAM ==================================
  22. Size Speed Manufacturer Part No.
  23. -------------- -------------- ------------------- ----------------------
  24. 0MHz
  25. 16384MB 3600MHz 04CD F4-3600C16-16GVKC
  26. 0MHz
  27. 16384MB 3600MHz 04CD F4-3600C16-16GVKC
  28.  
  29. ================================= CPU ==================================
  30. Processor Version: Intel(R) Core(TM) i5-10600K CPU @ 4.10GHz
  31. COUNT: c
  32. MHZ: 4104
  33. VENDOR: GenuineIntel
  34. FAMILY: 6
  35. MODEL: a5
  36. STEPPING: 5
  37. MICROCODE: 6,a5,5,0 (F,M,S,R) SIG: C8'00000000 (cache) C8'00000000 (init)
  38.  
  39. ================================== OS ==================================
  40. Product: WinNt, suite: TerminalServer SingleUserTS
  41. BUILD_VERSION: 10.0.19041.329 (WinBuild.160101.0800)
  42. BUILD: 19041
  43. SERVICEPACK: 329
  44. PLATFORM_TYPE: x64
  45. NAME: Windows 10
  46. EDITION: Windows 10 WinNt TerminalServer SingleUserTS
  47. BUILD_TIMESTAMP: unknown_date
  48. BUILDDATESTAMP: 160101.0800
  49. BUILDLAB: WinBuild
  50. BUILDOSVER: 10.0.19041.329
  51.  
  52. =============================== DEBUGGER ===============================
  53. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  54. Copyright (c) Microsoft Corporation. All rights reserved.
  55.  
  56. =============================== COMMENTS ===============================
  57. * Information gathered from different dump files may be different. If
  58. Windows updates between two dump files, two or more OS versions may
  59. be shown above.
  60. * If the user updates the BIOS between dump files, two or more versions
  61. and dates may be shown above.
  62. * More RAM information can be found below in a full BIOS section.
  63.  
  64. ========================================================================
  65. ======================= Dump #1: ANALYZE VERBOSE =======================
  66. ====================== File: 070320-15812-01.dmp =======================
  67. ========================================================================
  68.  
  69. Mini Kernel Dump File: Only registers and stack trace are available
  70. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  71. Kernel base = 0xfffff805`80813000 PsLoadedModuleList = 0xfffff805`8143d2b0
  72. Debug session time: Fri Jul 3 14:16:10.365 2020 (UTC - 4:00)
  73. System Uptime: 0 days 3:06:52.575
  74.  
  75. BugCheck 139, {4, ffffcc00b9d7c010, ffffcc00b9d7bf68, 0}
  76. Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
  77. Followup: MachineOwner
  78.  
  79. KERNEL_SECURITY_CHECK_FAILURE (139)
  80. A kernel component has corrupted a critical data structure. The corruption
  81. could potentially allow a malicious user to gain control of this machine.
  82.  
  83. Arguments:
  84. Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
  85. extents for the thread.
  86. Arg2: ffffcc00b9d7c010, Address of the trap frame for the exception that caused the bugcheck
  87. Arg3: ffffcc00b9d7bf68, Address of the exception record for the exception that caused the bugcheck
  88. Arg4: 0000000000000000, Reserved
  89.  
  90. Debugging Details:
  91. DUMP_CLASS: 1
  92. DUMP_QUALIFIER: 400
  93. DUMP_TYPE: 2
  94. DUMP_FILE_ATTRIBUTES: 0x8
  95. Kernel Generated Triage Dump
  96. TRAP_FRAME: ffffcc00b9d7c010 -- (.trap 0xffffcc00b9d7c010)
  97. NOTE: The trap frame does not contain all registers.
  98. Some register values may be zeroed or incorrect.
  99. rax=ffff8c8057739000 rbx=0000000000000000 rcx=0000000000000004
  100. rdx=ffff8c8057740000 rsi=0000000000000000 rdi=0000000000000000
  101. rip=fffff80580c9ad8d rsp=ffffcc00b9d7c1a0 rbp=ffffcc00b9d7c710
  102. r8=ffff8c8057740000 r9=ffffcc00b9d7c728 r10=ffff8c805773fa00
  103. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  104. r14=0000000000000000 r15=0000000000000000
  105. iopl=0 nv up ei pl zr na po nc
  106. nt!RtlpGetStackLimitsEx+0x14abed:
  107. fffff805`80c9ad8d cd29 int 29h
  108. Resetting default scope
  109. EXCEPTION_RECORD: ffffcc00b9d7bf68 -- (.exr 0xffffcc00b9d7bf68)
  110. ExceptionAddress: fffff80580c9ad8d (nt!RtlpGetStackLimitsEx+0x000000000014abed)
  111. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  112. ExceptionFlags: 00000001
  113. NumberParameters: 1
  114. Parameter[0]: 0000000000000004
  115. Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
  116. CUSTOMER_CRASH_COUNT: 1
  117. DEFAULT_BUCKET_ID: ESP_OUT_OF_RANGE
  118. BUGCHECK_STR: 0x139
  119.  
  120. PROCESS_NAME: ModernWarfare.
  121.  
  122. CURRENT_IRQL: 2
  123. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  124. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  125. EXCEPTION_CODE_STR: c0000409
  126. EXCEPTION_PARAMETER1: 0000000000000004
  127. WATSON_BKT_EVENT: BEX
  128. BAD_STACK_POINTER: ffffcc00b9d7bce8
  129. LAST_CONTROL_TRANSFER: from fffff80580c02929 to fffff80580bf0a20
  130. FAULTING_THREAD: 0000000000000000
  131. STACK_TEXT:
  132. ffffcc00`b9d7bce8 fffff805`80c02929 : 00000000`00000139 00000000`00000004 ffffcc00`b9d7c010 ffffcc00`b9d7bf68 : nt!KeBugCheckEx
  133. ffffcc00`b9d7bcf0 fffff805`80c02d50 : 00000000`00000000 00000000`00000000 ffffcc00`b9d7bee0 ffffcc00`b9d7bf78 : nt!KiBugCheckDispatch+0x69
  134. ffffcc00`b9d7be30 fffff805`80c010e3 : ffffcc00`b9d7c7c0 00000000`00000000 ffffcc00`b9d7ba60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
  135. ffffcc00`b9d7c010 fffff805`80c9ad8d : 00000045`eadfe120 00007fff`871bb15a ffffcc00`b9d7c710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
  136. ffffcc00`b9d7c1a0 fffff805`80c24df9 : ffffcc00`b9d7c710 00000000`00000000 ffff8c80`5773fa00 fffff805`00000003 : nt!RtlpGetStackLimitsEx+0x14abed
  137. ffffcc00`b9d7c1d0 fffff805`80a8e226 : ffff8c80`5773ef88 ffffcc00`b9d7ce20 ffff8c80`5773ef88 00000000`00000000 : nt!RtlDispatchException+0x1df0d9
  138. ffffcc00`b9d7c8f0 fffff805`80bf18b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
  139. ffffcc00`b9d7cfb0 fffff805`80bf1880 : fffff805`80c02a65 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 : nt!KxExceptionDispatchOnExceptionStack+0x12
  140. ffff8c80`5773ee48 fffff805`80c02a65 : 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 fffff805`80b29b0a : nt!KiExceptionDispatchOnExceptionStackContinue
  141. ffff8c80`5773ee50 fffff805`80bfe7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
  142. ffff8c80`5773f030 fffff805`80bf8957 : 00000000`00000000 fffff805`80a2b5cf ffff8c80`5773fa00 ffffa800`d1fe3408 : nt!KiGeneralProtectionFault+0x320
  143. ffff8c80`5773f1c0 fffff805`80a2b5cf : ffff8c80`5773fa00 ffffa800`d1fe3408 000fa2ca`00270dd6 002ca588`001bad52 : nt!ExpInterlockedPopEntrySListFault
  144. ffff8c80`5773f1d0 fffff805`80a2a972 : fffff805`81463ac0 ffff76b4`00000093 00000000`00000093 00000000`00000001 : nt!MiGetPage+0x35f
  145. ffff8c80`5773f2b0 fffff805`80a28656 : ffff8c80`5773f690 00000000`00000000 00000000`00000001 fffff805`80c81611 : nt!MiGetPageChain+0x172
  146. ffff8c80`5773f510 fffff805`80a28118 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`81463ac0 : nt!MiResolvePrivateZeroFault+0x176
  147. ffff8c80`5773f630 fffff805`80a274ed : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208
  148. ffff8c80`5773f720 fffff805`80a25a69 : 00000000`00000111 00000000`00000003 00000000`c0000016 fffff805`00000000 : nt!MiDispatchFault+0x22d
  149. ffff8c80`5773f860 fffff805`80bfeb1e : 000001a1`0cb56103 ffffb901`fe767460 00000000`00000001 ffffb901`00000000 : nt!MmAccessFault+0x189
  150. ffff8c80`5773fa00 00007fff`871bb15a : 0000019c`79ce0000 00007fff`00000005 00000000`00000038 000001bc`00000000 : nt!KiPageFault+0x35e
  151. 00000045`eadfe120 0000019c`79ce0000 : 00007fff`00000005 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 : 0x00007fff`871bb15a
  152. 00000045`eadfe128 00007fff`00000005 : 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 : 0x0000019c`79ce0000
  153. 00000045`eadfe130 00000000`00000038 : 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 : 0x00007fff`00000005
  154. 00000045`eadfe138 000001bc`00000000 : 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 : 0x38
  155. 00000045`eadfe140 000001a1`0e8f7d20 : 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 : 0x000001bc`00000000
  156. 00000045`eadfe148 000001a1`0e8f9b34 : 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 00000000`00000000 : 0x000001a1`0e8f7d20
  157. 00000045`eadfe150 000001a3`fc6cffe0 : 000001a1`0e8f8330 00000000`00000000 00000000`00000000 00000000`000001cc : 0x000001a1`0e8f9b34
  158. 00000045`eadfe158 000001a1`0e8f8330 : 00000000`00000000 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 : 0x000001a3`fc6cffe0
  159. 00000045`eadfe160 00000000`00000000 : 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 00000000`00000000 : 0x000001a1`0e8f8330
  160. THREAD_SHA1_HASH_MOD_FUNC: 7d221bf33ce405db2fad0126bfcdd720956ac548
  161. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5855d6d9414f306d0327bd8179630ba2cfe880a
  162. THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358
  163. FOLLOWUP_IP:
  164. nt!KiFastFailDispatch+d0
  165. fffff805`80c02d50 c644242000 mov byte ptr [rsp+20h],0
  166. FAULT_INSTR_CODE: 202444c6
  167. SYMBOL_STACK_INDEX: 2
  168. SYMBOL_NAME: nt!KiFastFailDispatch+d0
  169. FOLLOWUP_NAME: MachineOwner
  170. MODULE_NAME: nt
  171.  
  172. IMAGE_NAME: ntkrnlmp.exe
  173.  
  174. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  175. IMAGE_VERSION: 10.0.19041.329
  176. STACK_COMMAND: ~0s ; kb
  177. BUCKET_ID_FUNC_OFFSET: d0
  178. FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
  179. BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
  180. PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
  181. TARGET_TIME: 2020-07-03T18:16:10.000Z
  182. SUITE_MASK: 272
  183. PRODUCT_TYPE: 1
  184. USER_LCID: 0
  185. FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
  186. FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
  187. Followup: MachineOwner
  188.  
  189. ====================== Dump #1: 3RD PARTY DRIVERS ======================
  190.  
  191. Oct 08 2018 - SYMEVENT64x86.SYS - Symantec Event Library https://www.symantec.com/
  192. Apr 24 2019 - iqvw64e.sys - Intel Network Adapter Diagnostic driver http://www.intel.com/
  193. Jun 28 2019 - Ironx64.SYS - Symantec Iron driver http://www.symantec.com/
  194. Jul 10 2019 - IDSvia64.sys - Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
  195. Sep 11 2019 - eeCtrl64.sys - Symantec Eraser Control driver http://www.symantec.com/
  196. Sep 26 2019 - BHDrvx64.sys - Norton Security BASH driver http://www.symantec.com/
  197. Nov 18 2019 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  198. Dec 30 2019 - SRTSPX64.SYS - Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
  199. Dec 31 2019 - SymEvnt.sys - Symantec Event Library driver
  200. Jan 09 2020 - ccSetx64.sys - Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
  201. Jan 26 2020 - UcmCxUcsiNvppc.sys - NVIDIA USB Type-C Port Policy Controller driver
  202. Feb 03 2020 - e1d68x64.sys - Intel(R) Gigabit Adapter driver
  203. Feb 08 2020 - symnets.sys - Network Security WFP driver https://www.symantec.com/
  204. Feb 11 2020 - SYMEFASI64.SYS - Symantec Extended File Attributes (SI) https://www.symantec.com/
  205. Mar 24 2020 - TeeDriverW10x64.sys - Intel Management Engine Interface driver
  206. Apr 21 2020 - SRTSP64.SYS - Symantec Real Time Storage Protection http://www.symantec.com/
  207. Apr 29 2020 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
  208. Jun 09 2020 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  209. Jun 21 2020 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  210.  
  211. ================== Dump #1: 3RD PARTY DRIVERS (FULL) ===================
  212.  
  213. Image name: SYMEVENT64x86.SYS
  214. Search : https://www.google.com/search?q=SYMEVENT64x86.SYS
  215. ADA Info : Symantec Event Library https://www.symantec.com/
  216. Timestamp : Mon Oct 8 2018
  217.  
  218. Image name: iqvw64e.sys
  219. Search : https://www.google.com/search?q=iqvw64e.sys
  220. ADA Info : Intel Network Adapter Diagnostic driver http://www.intel.com/
  221. Timestamp : Wed Apr 24 2019
  222.  
  223. Image name: Ironx64.SYS
  224. Search : https://www.google.com/search?q=Ironx64.SYS
  225. ADA Info : Symantec Iron driver http://www.symantec.com/
  226. Timestamp : Fri Jun 28 2019
  227.  
  228. Image name: IDSvia64.sys
  229. Search : https://www.google.com/search?q=IDSvia64.sys
  230. ADA Info : Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
  231. Timestamp : Wed Jul 10 2019
  232.  
  233. Image name: eeCtrl64.sys
  234. Search : https://www.google.com/search?q=eeCtrl64.sys
  235. ADA Info : Symantec Eraser Control driver http://www.symantec.com/
  236. Timestamp : Wed Sep 11 2019
  237.  
  238. Image name: BHDrvx64.sys
  239. Search : https://www.google.com/search?q=BHDrvx64.sys
  240. ADA Info : Norton Security BASH driver http://www.symantec.com/
  241. Timestamp : Thu Sep 26 2019
  242.  
  243. Image name: rt640x64.sys
  244. Search : https://www.google.com/search?q=rt640x64.sys
  245. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  246. Timestamp : Mon Nov 18 2019
  247.  
  248. Image name: SRTSPX64.SYS
  249. Search : https://www.google.com/search?q=SRTSPX64.SYS
  250. ADA Info : Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
  251. Timestamp : Mon Dec 30 2019
  252.  
  253. Image name: SymEvnt.sys
  254. Search : https://www.google.com/search?q=SymEvnt.sys
  255. ADA Info : Symantec Event Library driver
  256. Timestamp : Tue Dec 31 2019
  257.  
  258. Image name: ccSetx64.sys
  259. Search : https://www.google.com/search?q=ccSetx64.sys
  260. ADA Info : Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
  261. Timestamp : Thu Jan 9 2020
  262.  
  263. Image name: UcmCxUcsiNvppc.sys
  264. Search : https://www.google.com/search?q=UcmCxUcsiNvppc.sys
  265. ADA Info : NVIDIA USB Type-C Port Policy Controller driver
  266. Timestamp : Sun Jan 26 2020
  267.  
  268. Image name: e1d68x64.sys
  269. Search : https://www.google.com/search?q=e1d68x64.sys
  270. ADA Info : Intel(R) Gigabit Adapter driver
  271. Timestamp : Mon Feb 3 2020
  272.  
  273. Image name: symnets.sys
  274. Search : https://www.google.com/search?q=symnets.sys
  275. ADA Info : Network Security WFP driver https://www.symantec.com/
  276. Timestamp : Sat Feb 8 2020
  277.  
  278. Image name: SYMEFASI64.SYS
  279. Search : https://www.google.com/search?q=SYMEFASI64.SYS
  280. ADA Info : Symantec Extended File Attributes (SI) https://www.symantec.com/
  281. Timestamp : Tue Feb 11 2020
  282.  
  283. Image name: TeeDriverW10x64.sys
  284. Search : https://www.google.com/search?q=TeeDriverW10x64.sys
  285. ADA Info : Intel Management Engine Interface driver
  286. Timestamp : Tue Mar 24 2020
  287.  
  288. Image name: SRTSP64.SYS
  289. Search : https://www.google.com/search?q=SRTSP64.SYS
  290. ADA Info : Symantec Real Time Storage Protection http://www.symantec.com/
  291. Timestamp : Tue Apr 21 2020
  292.  
  293. Image name: RTKVHD64.sys
  294. Search : https://www.google.com/search?q=RTKVHD64.sys
  295. ADA Info : Realtek Audio System driver https://www.realtek.com/en/
  296. Timestamp : Wed Apr 29 2020
  297.  
  298. Image name: nvhda64v.sys
  299. Search : https://www.google.com/search?q=nvhda64v.sys
  300. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  301. Timestamp : Tue Jun 9 2020
  302.  
  303. Image name: nvlddmkm.sys
  304. Search : https://www.google.com/search?q=nvlddmkm.sys
  305. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  306. Timestamp : Sun Jun 21 2020
  307.  
  308. ====================== Dump #1: MICROSOFT DRIVERS ======================
  309.  
  310. ACPI.sys ACPI Driver for NT (Microsoft)
  311. acpiex.sys ACPIEx Driver (Microsoft)
  312. acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
  313. acpitime.sys ACPI Wake Alarm (Microsoft)
  314. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  315. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  316. AgileVpn.sys RAS Agil VPN Miniport Call Manager driver (Microsoft)
  317. ahcache.sys Application Compatibility Cache (Microsoft)
  318. bam.sys BAM Kernal driver (Microsoft)
  319. BasicDisplay.sys Basic Display driver (Microsoft)
  320. BasicRender.sys Basic Render driver (Microsoft)
  321. Beep.SYS BEEP driver (Microsoft)
  322. bindflt.sys Windows Bind Filter driver (Microsoft)
  323. BOOTVID.dll VGA Boot Driver (Microsoft)
  324. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  325. cdd.dll Canonical Display Driver (Microsoft)
  326. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  327. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  328. CI.dll Code Integrity Module (Microsoft)
  329. CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
  330. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  331. cldflt.sys Cloud Files Mini Filter driver (Microsoft)
  332. CLFS.SYS Common Log File System Driver (Microsoft)
  333. clipsp.sys CLIP Service (Microsoft)
  334. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  335. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  336. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  337. condrv.sys Console Driver (Microsoft)
  338. crashdmp.sys Crash Dump driver (Microsoft)
  339. csc.sys Windows Client Side Caching driver (Microsoft)
  340. dfsc.sys DFS Namespace Client Driver (Microsoft)
  341. disk.sys PnP Disk Driver (Microsoft)
  342. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  343. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  344. dump_stornvme.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  345. dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
  346. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  347. dxgmms2.sys DirectX Graphics MMS
  348. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  349. fastfat.SYS Fast FAT File System Driver (Microsoft)
  350. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  351. fileinfo.sys FileInfo Filter Driver (Microsoft)
  352. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  353. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  354. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  355. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  356. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  357. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  358. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  359. HIDCLASS.SYS Hid Class Library (Microsoft)
  360. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  361. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  362. HTTP.sys HTTP Protocol Stack (Microsoft)
  363. intelpep.sys Intel Power Engine Plugin (Microsoft)
  364. intelppm.sys Processor Device Driver (Microsoft)
  365. IntelTA.sys Intel Telemetry Driver
  366. iorate.sys I/O rate control Filter (Microsoft)
  367. kbdclass.sys Keyboard Class Driver (Microsoft)
  368. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  369. kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
  370. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  371. ks.sys Kernal CSA Library (Microsoft)
  372. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  373. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  374. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  375. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  376. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  377. mcupdate.dll Media Center Update (Microsoft)
  378. mmcss.sys MMCSS Driver (Microsoft)
  379. monitor.sys Monitor Driver (Microsoft)
  380. mouclass.sys Mouse Class Driver (Microsoft)
  381. mouhid.sys HID Mouse Filter Driver (Microsoft)
  382. mountmgr.sys Mount Point Manager (Microsoft)
  383. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  384. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  385. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  386. Msfs.SYS Mailslot driver (Microsoft)
  387. msisadrv.sys ISA Driver (Microsoft)
  388. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  389. msquic.sys Windows QUIC Driver
  390. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  391. mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
  392. mssmbios.sys System Management BIOS driver (Microsoft)
  393. mup.sys Multiple UNC Provider driver (Microsoft)
  394. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  395. ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
  396. ndistapi.sys NDIS 3.0 Connection Wrapper driver (Microsoft)
  397. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  398. ndiswan.sys MS PPP Framing Driver (Strong Encryption) Microsoft)
  399. NDProxy.sys NDIS Proxy driver (Microsoft)
  400. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  401. netbios.sys NetBIOS Interface driver (Microsoft)
  402. netbt.sys MBT Transport driver (Microsoft)
  403. NETIO.SYS Network I/O Subsystem (Microsoft)
  404. Npfs.SYS NPFS driver (Microsoft)
  405. npsvctrig.sys Named pipe service triggers (Microsoft)
  406. nsiproxy.sys NSI Proxy driver (Microsoft)
  407. Ntfs.sys NT File System Driver (Microsoft)
  408. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  409. ntosext.sys NTOS Extension Host driver (Microsoft)
  410. Null.SYS NULL Driver (Microsoft)
  411. pacer.sys QoS Packet Scheduler (Microsoft)
  412. partmgr.sys Partition driver (Microsoft)
  413. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  414. pcw.sys Performance Counter Driver (Microsoft)
  415. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  416. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  417. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  418. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  419. rasl2tp.sys RAS L2TP Mini-port/Call-manager driver (Microsoft)
  420. raspppoe.sys RAS PPPoE Mini-port/Call manager driver (Microsoft)
  421. raspptp.sys Peer-to-Peer Tunneling Protocol (Microsoft)
  422. rassstp.sys RAS SSTP Miniport Call Manager driver (Microsoft)
  423. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  424. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  425. rdyboost.sys ReadyBoost Driver (Microsoft)
  426. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  427. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  428. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  429. spaceport.sys Storage Spaces driver (Microsoft)
  430. srv2.sys Smb 2.0 Server driver (Microsoft)
  431. srvnet.sys Server Network driver (Microsoft)
  432. storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
  433. stornvme.sys NVM Express Storport Miniport driver (Microsoft)
  434. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  435. storqosflt.sys Storage QoS Filter driver (Microsoft)
  436. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  437. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  438. tcpip.sys TCP/IP Protocol driver (Microsoft)
  439. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  440. TDI.SYS TDI Wrapper driver (Microsoft)
  441. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  442. tm.sys Kernel Transaction Manager driver (Microsoft)
  443. UcmCx.sys USB Connector Manager KMDF Class Extension
  444. ucx01000.sys USB Controller Extension (Microsoft)
  445. umbus.sys User-Mode Bus Enumerator (Microsoft)
  446. usbaudio.sys USB Audio Class Driver (Microsoft)
  447. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  448. USBD.SYS Universal Serial Bus Driver (Microsoft)
  449. UsbHub3.sys USB3 HUB driver (Microsoft)
  450. USBXHCI.SYS USB XHCI driver (Microsoft)
  451. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  452. VerifierExt.sys Driver Verifier Extension
  453. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  454. volmgr.sys Volume Manager Driver (Microsoft)
  455. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  456. volsnap.sys Volume Shadow Copy driver (Microsoft)
  457. volume.sys Volume driver (Microsoft)
  458. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  459. wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
  460. watchdog.sys Watchdog driver (Microsoft)
  461. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  462. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  463. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  464. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  465. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  466. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  467. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  468. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  469. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  470. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  471. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  472. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  473. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  474. Wof.sys Windows Overlay Filter (Microsoft)
  475. WppRecorder.sys WPP Trace Recorder (Microsoft)
  476.  
  477. ====================== Dump #1: UNLOADED MODULES =======================
  478.  
  479. fffff805`3d650000 fffff805`3d65f000 dump_storpor
  480. fffff805`3d690000 fffff805`3d6bc000 dump_stornvm
  481. fffff805`3d6e0000 fffff805`3d6fe000 dump_dumpfve
  482. fffff805`3bf40000 fffff805`3bf4f000 dump_storpor
  483. fffff805`3bf80000 fffff805`3bfac000 dump_stornvm
  484. fffff805`3bfd0000 fffff805`3bfee000 dump_dumpfve
  485. fffff805`3bd00000 fffff805`3bd1c000 dam.sys
  486. fffff805`82100000 fffff805`8210a000 SymELAM.sys
  487. fffff805`83320000 fffff805`83330000 hwpolicy.sys
  488.  
  489. ====================== Dump #1: BIOS INFORMATION =======================
  490.  
  491. [SMBIOS Data Tables v3.2]
  492. [DMI Version - 0]
  493. [2.0 Calling Convention - No]
  494. [Table Size - 4565 bytes]
  495. [BIOS Information (Type 0) - Length 26 - Handle 0000h]
  496. Vendor American Megatrends Inc.
  497. BIOS Version 1.00
  498. BIOS Starting Address Segment f000
  499. BIOS Release Date 04/14/2020
  500. BIOS ROM Size 1000000
  501. BIOS Characteristics
  502. 07: - PCI Supported
  503. 11: - Upgradeable FLASH BIOS
  504. 12: - BIOS Shadowing Supported
  505. 15: - CD-Boot Supported
  506. 16: - Selectable Boot Supported
  507. 17: - BIOS ROM Socketed
  508. 19: - EDD Supported
  509. 23: - 1.2MB Floppy Supported
  510. 24: - 720KB Floppy Supported
  511. 25: - 2.88MB Floppy Supported
  512. 26: - Print Screen Device Supported
  513. 27: - Keyboard Services Supported
  514. 28: - Serial Services Supported
  515. 29: - Printer Services Supported
  516. 32: - BIOS Vendor Reserved
  517. BIOS Characteristic Extensions
  518. 00: - ACPI Supported
  519. 01: - USB Legacy Supported
  520. 08: - BIOS Boot Specification Supported
  521. 10: - Specification Reserved
  522. 11: - Specification Reserved
  523. BIOS Major Revision 5
  524. BIOS Minor Revision 17
  525. EC Firmware Major Revision 255
  526. EC Firmware Minor Revision 255
  527. [System Information (Type 1) - Length 27 - Handle 0001h]
  528. Manufacturer Micro-Star International Co., Ltd.
  529. Product Name MS-7C80
  530. Version 1.0
  531. UUID 00000000-0000-0000-0000-000000000000
  532. Wakeup Type Power Switch
  533. SKUNumber Default string
  534. Family Default string
  535. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  536. Manufacturer Micro-Star International Co., Ltd.
  537. Product MAG Z490 TOMAHAWK (MS-7C80)
  538. Version 1.0
  539. Feature Flags 09h
  540. -258427168: - -258427120: - ÷7!ü
  541. Location Default string
  542. Chassis Handle 0003h
  543. Board Type 0ah - Processor/Memory Module
  544. Number of Child Handles 0
  545. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  546. Manufacturer Micro-Star International Co., Ltd.
  547. Chassis Type Desktop
  548. Version 1.0
  549. Bootup State Safe
  550. Power Supply State Safe
  551. Thermal State Safe
  552. Security Status None
  553. OEM Defined 0
  554. Height 0U
  555. Number of Power Cords 1
  556. Number of Contained Elements 0
  557. Contained Element Size 3
  558. [OEM Strings (Type 11) - Length 5 - Handle 0021h]
  559. Number of Strings 1
  560. 1 Default string
  561. [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
  562. [Physical Memory Array (Type 16) - Length 23 - Handle 0039h]
  563. Location 03h - SystemBoard/Motherboard
  564. Use 03h - System Memory
  565. Memory Error Correction 03h - None
  566. Maximum Capacity 67108864KB
  567. Number of Memory Devices 4
  568. [Memory Device (Type 17) - Length 84 - Handle 003ah]
  569. Physical Memory Array Handle 0039h
  570. Total Width 0 bits
  571. Data Width 0 bits
  572. Form Factor 02h - Unknown
  573. Device Locator ChannelA-DIMM0
  574. Bank Locator BANK 0
  575. Memory Type 02h - Unknown
  576. Type Detail 0000h -
  577. Speed 0MHz
  578. [Memory Device (Type 17) - Length 84 - Handle 003bh]
  579. Physical Memory Array Handle 0039h
  580. Total Width 64 bits
  581. Data Width 64 bits
  582. Size 16384MB
  583. Form Factor 09h - DIMM
  584. Device Locator ChannelA-DIMM1
  585. Bank Locator BANK 1
  586. Memory Type 1ah - Specification Reserved
  587. Type Detail 0080h - Synchronous
  588. Speed 3600MHz
  589. Manufacturer 04CD
  590. Part Number F4-3600C16-16GVKC
  591. [Memory Device (Type 17) - Length 84 - Handle 003ch]
  592. Physical Memory Array Handle 0039h
  593. Total Width 0 bits
  594. Data Width 0 bits
  595. Form Factor 02h - Unknown
  596. Device Locator ChannelB-DIMM0
  597. Bank Locator BANK 2
  598. Memory Type 02h - Unknown
  599. Type Detail 0000h -
  600. Speed 0MHz
  601. [Memory Device (Type 17) - Length 84 - Handle 003dh]
  602. Physical Memory Array Handle 0039h
  603. Total Width 64 bits
  604. Data Width 64 bits
  605. Size 16384MB
  606. Form Factor 09h - DIMM
  607. Device Locator ChannelB-DIMM1
  608. Bank Locator BANK 3
  609. Memory Type 1ah - Specification Reserved
  610. Type Detail 0080h - Synchronous
  611. Speed 3600MHz
  612. Manufacturer 04CD
  613. Part Number F4-3600C16-16GVKC
  614. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 003eh]
  615. Starting Address 00000000h
  616. Ending Address 01ffffffh
  617. Memory Array Handle 0039h
  618. Partition Width 02
  619. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 003fh]
  620. Starting Address 00000000h
  621. Ending Address 00ffffffh
  622. Memory Device Handle 003bh
  623. Mem Array Mapped Adr Handle 003eh
  624. Interleave Position 01
  625. Interleave Data Depth 02
  626. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0040h]
  627. Starting Address 01000000h
  628. Ending Address 01ffffffh
  629. Memory Device Handle 003dh
  630. Mem Array Mapped Adr Handle 003eh
  631. Interleave Position 02
  632. Interleave Data Depth 02
  633. [Cache Information (Type 7) - Length 27 - Handle 0046h]
  634. Socket Designation L1 Cache
  635. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  636. Maximum Cache Size 0180h - 384K
  637. Installed Size 0180h - 384K
  638. Supported SRAM Type 0020h - Synchronous
  639. Current SRAM Type 0020h - Synchronous
  640. Cache Speed 0ns
  641. Error Correction Type ParitySingle-Bit ECC
  642. System Cache Type Unified
  643. Associativity 8-way Set-Associative
  644. [Cache Information (Type 7) - Length 27 - Handle 0047h]
  645. Socket Designation L2 Cache
  646. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  647. Maximum Cache Size 0600h - 1536K
  648. Installed Size 0600h - 1536K
  649. Supported SRAM Type 0020h - Synchronous
  650. Current SRAM Type 0020h - Synchronous
  651. Cache Speed 0ns
  652. Error Correction Type Multi-Bit ECC
  653. System Cache Type Unified
  654. Associativity 4-way Set-Associative
  655. [Cache Information (Type 7) - Length 27 - Handle 0048h]
  656. Socket Designation L3 Cache
  657. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  658. Maximum Cache Size 3000h - 12288K
  659. Installed Size 3000h - 12288K
  660. Supported SRAM Type 0020h - Synchronous
  661. Current SRAM Type 0020h - Synchronous
  662. Cache Speed 0ns
  663. Error Correction Type Specification Reserved
  664. System Cache Type Unified
  665. Associativity 16-way Set-Associative
  666. [Processor Information (Type 4) - Length 48 - Handle 0049h]
  667. Socket Designation U3E1
  668. Processor Type Central Processor
  669. Processor Family cdh - Specification Reserved
  670. Processor Manufacturer Intel(R) Corporation
  671. Processor ID 55060a00fffbebbf
  672. Processor Version Intel(R) Core(TM) i5-10600K CPU @ 4.10GHz
  673. Processor Voltage 8ah - 1.0V
  674. External Clock 100MHz
  675. Max Speed 8300MHz
  676. Current Speed 4059MHz
  677. Status Enabled Populated
  678. Processor Upgrade Other
  679. L1 Cache Handle 0046h
  680. L2 Cache Handle 0047h
  681. L3 Cache Handle 0048h
  682.  
  683. ========================== Dump #1: Extra #1 ===========================
  684.  
  685. 3: kd> !verifier
  686. fffff8058143d6c0: Unable to get verifier list.
  687.  
  688. ========================== Dump #1: Extra #2 ===========================
  689.  
  690. 3: kd> !thread
  691. THREAD ffffb9028f7020c0 Cid 1410.1600 Teb: 00000045e9aed000 Win32Thread: ffffb902ae0b8fc0 RUNNING on processor 3
  692. Not impersonating
  693. GetUlongFromAddress: unable to read from fffff8058142443c
  694. Owning Process ffffb901f228b080 Image: ModernWarfare.
  695. Attached Process N/A Image: N/A
  696. fffff78000000000: Unable to get shared data
  697. Wait Start TickCount 717604
  698. Context Switch Count 24085184 IdealProcessor: 4
  699. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  700. UserTime 00:00:00.000
  701. KernelTime 00:00:00.000
  702. Win32 Start Address 0x00007ff733d970a0
  703. Stack Init ffff8c805773fb90 Current ffff8c805773f5a0
  704. Base ffff8c8057740000 Limit ffff8c8057739000 Call 0000000000000000
  705. Priority 9 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
  706. Child-SP RetAddr : Args to Child : Call Site
  707. ffffcc00`b9d7bce8 fffff805`80c02929 : 00000000`00000139 00000000`00000004 ffffcc00`b9d7c010 ffffcc00`b9d7bf68 : nt!KeBugCheckEx
  708. ffffcc00`b9d7bcf0 fffff805`80c02d50 : 00000000`00000000 00000000`00000000 ffffcc00`b9d7bee0 ffffcc00`b9d7bf78 : nt!KiBugCheckDispatch+0x69
  709. ffffcc00`b9d7be30 fffff805`80c010e3 : ffffcc00`b9d7c7c0 00000000`00000000 ffffcc00`b9d7ba60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
  710. ffffcc00`b9d7c010 fffff805`80c9ad8d : 00000045`eadfe120 00007fff`871bb15a ffffcc00`b9d7c710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 (TrapFrame @ ffffcc00`b9d7c010)
  711. ffffcc00`b9d7c1a0 fffff805`80c24df9 : ffffcc00`b9d7c710 00000000`00000000 ffff8c80`5773fa00 fffff805`00000003 : nt!RtlpGetStackLimitsEx+0x14abed
  712. ffffcc00`b9d7c1d0 fffff805`80a8e226 : ffff8c80`5773ef88 ffffcc00`b9d7ce20 ffff8c80`5773ef88 00000000`00000000 : nt!RtlDispatchException+0x1df0d9
  713. ffffcc00`b9d7c8f0 fffff805`80bf18b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
  714. ffffcc00`b9d7cfb0 fffff805`80bf1880 : fffff805`80c02a65 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 : nt!KxExceptionDispatchOnExceptionStack+0x12 (TrapFrame @ ffffcc00`b9d7ce70)
  715. ffff8c80`5773ee48 fffff805`80c02a65 : 00000000`005f3dc3 fffff805`80bf7475 ffffa480`11db9490 fffff805`80b29b0a : nt!KiExceptionDispatchOnExceptionStackContinue
  716. ffff8c80`5773ee50 fffff805`80bfe7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
  717. ffff8c80`5773f030 fffff805`80bf8957 : 00000000`00000000 fffff805`80a2b5cf ffff8c80`5773fa00 ffffa800`d1fe3408 : nt!KiGeneralProtectionFault+0x320 (TrapFrame @ ffff8c80`5773f030)
  718. ffff8c80`5773f1c0 fffff805`80a2b5cf : ffff8c80`5773fa00 ffffa800`d1fe3408 000fa2ca`00270dd6 002ca588`001bad52 : nt!ExpInterlockedPopEntrySListFault
  719. ffff8c80`5773f1d0 fffff805`80a2a972 : fffff805`81463ac0 ffff76b4`00000093 00000000`00000093 00000000`00000001 : nt!MiGetPage+0x35f
  720. ffff8c80`5773f2b0 fffff805`80a28656 : ffff8c80`5773f690 00000000`00000000 00000000`00000001 fffff805`80c81611 : nt!MiGetPageChain+0x172
  721. ffff8c80`5773f510 fffff805`80a28118 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`81463ac0 : nt!MiResolvePrivateZeroFault+0x176
  722. ffff8c80`5773f630 fffff805`80a274ed : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208
  723. ffff8c80`5773f720 fffff805`80a25a69 : 00000000`00000111 00000000`00000003 00000000`c0000016 fffff805`00000000 : nt!MiDispatchFault+0x22d
  724. ffff8c80`5773f860 fffff805`80bfeb1e : 000001a1`0cb56103 ffffb901`fe767460 00000000`00000001 ffffb901`00000000 : nt!MmAccessFault+0x189
  725. ffff8c80`5773fa00 00007fff`871bb15a : 0000019c`79ce0000 00007fff`00000005 00000000`00000038 000001bc`00000000 : nt!KiPageFault+0x35e (TrapFrame @ ffff8c80`5773fa00)
  726. 00000045`eadfe120 0000019c`79ce0000 : 00007fff`00000005 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 : 0x00007fff`871bb15a
  727. 00000045`eadfe128 00007fff`00000005 : 00000000`00000038 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 : 0x0000019c`79ce0000
  728. 00000045`eadfe130 00000000`00000038 : 000001bc`00000000 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 : 0x00007fff`00000005
  729. 00000045`eadfe138 000001bc`00000000 : 000001a1`0e8f7d20 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 : 0x38
  730. 00000045`eadfe140 000001a1`0e8f7d20 : 000001a1`0e8f9b34 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 : 0x000001bc`00000000
  731. 00000045`eadfe148 000001a1`0e8f9b34 : 000001a3`fc6cffe0 000001a1`0e8f8330 00000000`00000000 00000000`00000000 : 0x000001a1`0e8f7d20
  732. 00000045`eadfe150 000001a3`fc6cffe0 : 000001a1`0e8f8330 00000000`00000000 00000000`00000000 00000000`000001cc : 0x000001a1`0e8f9b34
  733. 00000045`eadfe158 000001a1`0e8f8330 : 00000000`00000000 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 : 0x000001a3`fc6cffe0
  734. 00000045`eadfe160 00000000`00000000 : 00000000`00000000 00000000`000001cc 000001a3`fc6cffd8 00000000`00000000 : 0x000001a1`0e8f8330
RAW Paste Data