Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer
- Version: 0.91
- Time to analyze file(s): 00 hours and 01 minutes and 10 seconds
- ================================= BIOS =================================
- VENDOR: American Megatrends Inc.
- VERSION: P7.50
- DATE: 01/23/2018
- ============================= MOTHERBOARD ==============================
- MANUFACTURER: ASRock
- PRODUCT: Z170 Pro4S
- ================================= RAM ==================================
- Size Speed Manufacturer Part No.
- -------------- -------------- ------------------- ----------------------
- 0MHz
- 8192MB 3000MHz Kingston KHX3000C15D4/8GX
- 0MHz
- 8192MB 3000MHz Kingston KHX3000C15D4/8GX
- ================================= CPU ==================================
- Processor Version: Intel(R) Core(TM) i5-6600K CPU @ 3.50GHz
- COUNT: 4
- MHZ: 3504
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: 5e
- STEPPING: 3
- MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 18362.1.amd64fre.19h1_release.190318-1202
- BUILD_VERSION: 10.0.18362.900 (WinBuild.160101.0800)
- BUILD: 18362
- SERVICEPACK: 900
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- BUILD_TIMESTAMP: 2012-07-06 17:22:33
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.18362.900
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Information gathered from different dump files may be different. If
- Windows updates between two dump files, two or more OS versions may
- be shown above.
- * If the user updates the BIOS between dump files, two or more versions
- and dates may be shown above.
- * More RAM information can be found below in a full BIOS section.
- ========================================================================
- ======================= Dump #1: ANALYZE VERBOSE =======================
- ====================== File: 062420-10578-01.dmp =======================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 18362 MP (4 procs) Free x64
- Kernel base = 0xfffff801`1b800000 PsLoadedModuleList = 0xfffff801`1bc48190
- Debug session time: Wed Jun 24 08:44:22.283 2020 (UTC - 4:00)
- System Uptime: 0 days 15:47:29.954
- BugCheck A, {fffff80122c986d8, ff, d3, fffff8011b84adc3}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffff80122c986d8, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 00000000000000d3, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8011b84adc3, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- WRITE_ADDRESS: fffff8011bd733b8: Unable to get MiVisibleState
- fffff80122c986d8
- CURRENT_IRQL: 0
- FAULTING_IP:
- nt!PpmIdleExecuteTransition+8b3
- fffff801`1b84adc3 e8d8100000 call nt!KeResumeClockTimerFromIdle (fffff801`1b84bea0)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff80122d38550 -- (.trap 0xfffff80122d38550)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff8011bd8f240 rbx=0000000000000000 rcx=0000000000000000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8011b84adc3 rsp=fffff80122d386e0 rbp=ffffd306efae1000
- r8=0000008000000000 r9=0000000000000000 r10=fffff8011b8f0150
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di pl zr na po nc
- nt!PpmIdleExecuteTransition+0x8b3:
- fffff801`1b84adc3 e8d8100000 call nt!KeResumeClockTimerFromIdle (fffff801`1b84bea0)
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8011b9d41e9 to fffff8011b9c23a0
- STACK_TEXT:
- fffff801`22d38408 fffff801`1b9d41e9 : 00000000`0000000a fffff801`22c986d8 00000000`000000ff 00000000`000000d3 : nt!KeBugCheckEx
- fffff801`22d38410 fffff801`1b9d0529 : 00000000`0000000f 00000000`00000000 00000000`00000000 fffff801`27cea5d7 : nt!KiBugCheckDispatch+0x69
- fffff801`22d38550 fffff801`1b84adc3 : 00000000`00000089 00000000`00989680 fffff801`1a2cd180 00000000`00000000 : nt!KiPageFault+0x469
- fffff801`22d386e0 fffff801`1b84a36e : 00000000`00000003 00000000`00000002 ffffd306`efae10f0 00000000`00000008 : nt!PpmIdleExecuteTransition+0x8b3
- fffff801`22d38a00 fffff801`1b9c5e94 : 00000000`00000000 fffff801`1a2cd180 ffffd306`f810b080 00000000`00000332 : nt!PoIdle+0x36e
- fffff801`22d38b60 00000000`00000000 : fffff801`22d39000 fffff801`22d32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8011b84a44f-fffff8011b84a450 2 bytes - nt!PoIdle+44f
- [ 48 ff:4c 8b ]
- fffff8011b84a456-fffff8011b84a459 4 bytes - nt!PoIdle+456 (+0x07)
- [ 0f 1f 44 00:e8 c5 ed a6 ]
- fffff8011b84a469-fffff8011b84a46a 2 bytes - nt!PoIdle+469 (+0x13)
- [ 48 ff:4c 8b ]
- fffff8011b84a470-fffff8011b84a473 4 bytes - nt!PoIdle+470 (+0x07)
- [ 0f 1f 44 00:e8 bb 63 a8 ]
- fffff8011b84a50a-fffff8011b84a50f 6 bytes - nt!PoIdle+50a (+0x9a)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b84accf-fffff8011b84acd0 2 bytes - nt!PpmIdleExecuteTransition+7bf (+0x7c5)
- [ 48 ff:4c 8b ]
- fffff8011b84acd6-fffff8011b84acd9 4 bytes - nt!PpmIdleExecuteTransition+7c6 (+0x07)
- [ 0f 1f 44 00:e8 95 db a6 ]
- fffff8011b8d3d32-fffff8011b8d3d37 6 bytes - nt!PspReaper+a2 (+0x8905c)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b8f015a-fffff8011b8f015f 6 bytes - nt!RtlUnsignedMultiplyHigh+a (+0x1c428)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b8f01da-fffff8011b8f01df 6 bytes - nt!ExIsResourceAcquiredExclusiveLite+7a (+0x80)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b8f01f6-fffff8011b8f01f7 2 bytes - nt!MiUnlockPageTableInternal+16 (+0x1c)
- [ 68 df:28 5f ]
- fffff8011b8f01f9-fffff8011b8f01fb 3 bytes - nt!MiUnlockPageTableInternal+19 (+0x03)
- [ 7d fb f6:7c f9 f2 ]
- fffff8011b8f020a - nt!MiUnlockPageTableInternal+2a (+0x11)
- [ d0:50 ]
- fffff8011b8f020c-fffff8011b8f020e 3 bytes - nt!MiUnlockPageTableInternal+2c (+0x02)
- [ 7d fb f6:7c f9 f2 ]
- fffff8011b8f0214 - nt!MiUnlockPageTableInternal+34 (+0x08)
- [ df:5f ]
- fffff8011b8f0216-fffff8011b8f0218 3 bytes - nt!MiUnlockPageTableInternal+36 (+0x02)
- [ 7d fb f6:7c f9 f2 ]
- fffff8011b96481e-fffff8011b964823 6 bytes - nt!KiTimerExpirationDpc+de (+0x74608)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b97603a-fffff8011b97603f 6 bytes - nt!EmpCheckErrataList+a (+0x1181c)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b976076-fffff8011b97607b 6 bytes - nt!IoAllocateErrorLogEntry+36 (+0x3c)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b9c237a-fffff8011b9c237b 2 bytes - nt!ZwLoadKey3+2a (+0x4c304)
- [ 84 00:4c 87 ]
- fffff8011b9c237d-fffff8011b9c237f 3 bytes - nt!ZwLoadKey3+2d (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c239a-fffff8011b9c239b 2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
- [ 84 00:4c 87 ]
- fffff8011b9c239d-fffff8011b9c239f 3 bytes - nt!KiBugCheckReturn+19 (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c24ca-fffff8011b9c24cb 2 bytes - nt!KeBugCheckEx+12a (+0x12d)
- [ 84 00:4c 87 ]
- fffff8011b9c24cd-fffff8011b9c24cf 3 bytes - nt!KeBugCheckEx+12d (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c25ca-fffff8011b9c25cb 2 bytes - nt!KeContextToKframes+fa (+0xfd)
- [ 84 00:4c 87 ]
- fffff8011b9c25cd-fffff8011b9c25cf 3 bytes - nt!KeContextToKframes+fd (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c261a-fffff8011b9c261b 2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
- [ 84 00:4c 87 ]
- fffff8011b9c261d-fffff8011b9c261f 3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c26ea-fffff8011b9c26ef 6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
- [ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
- fffff8011b9c286a-fffff8011b9c286b 2 bytes - nt!KiSaveProcessorControlState+17a (+0x180)
- [ 84 00:4c 87 ]
- fffff8011b9c286d-fffff8011b9c286f 3 bytes - nt!KiSaveProcessorControlState+17d (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c28ea-fffff8011b9c28ef 6 bytes - nt!KiRestoreDebugRegisterState+7a (+0x7d)
- [ cc 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
- fffff8011b9c2a7a-fffff8011b9c2a7b 2 bytes - nt!KiSaveDebugRegisterState+18a (+0x190)
- [ 84 00:4c 87 ]
- fffff8011b9c2a7d-fffff8011b9c2a7f 3 bytes - nt!KiSaveDebugRegisterState+18d (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c2a8a-fffff8011b9c2a8f 6 bytes - nt!KeGetCurrentStackPointer+a (+0x0d)
- [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
- fffff8011b9c2a9a-fffff8011b9c2a9b 2 bytes - nt!KeResetLegacyFloatingPointState+a (+0x10)
- [ 1f 80:4c 87 ]
- fffff8011b9c2a9d-fffff8011b9c2a9f 3 bytes - nt!KeResetLegacyFloatingPointState+d (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c2aaa-fffff8011b9c2aaf 6 bytes - nt!KeSaveLegacyFloatingPointControlWord+a (+0x0d)
- [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
- fffff8011b9c2aca-fffff8011b9c2acb 2 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1a (+0x20)
- [ 84 00:4c 87 ]
- fffff8011b9c2acd-fffff8011b9c2acf 3 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1d (+0x03)
- [ 00 00 00:98 c3 90 ]
- fffff8011b9c2d8a-fffff8011b9c2d8f 6 bytes - nt!NtContinue+2ba (+0x2bd)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011b9c36d8-fffff8011b9c36d9 2 bytes - nt!KiChainedDispatch+b8 (+0x94e)
- [ 48 ff:4c 8b ]
- fffff8011b9c36df-fffff8011b9c36e2 4 bytes - nt!KiChainedDispatch+bf (+0x07)
- [ 0f 1f 44 00:e8 3c 6a 8f ]
- fffff8011b9c3ef8-fffff8011b9c3ef9 2 bytes - nt!KiInterruptDispatch+b8 (+0x819)
- [ 48 ff:4c 8b ]
- fffff8011b9c3eff-fffff8011b9c3f02 4 bytes - nt!KiInterruptDispatch+bf (+0x07)
- [ 0f 1f 44 00:e8 1c 62 8f ]
- fffff8011b9c914a-fffff8011b9c914f 6 bytes - nt!KiSwapContext+da (+0x524b)
- [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
- fffff8011b9c91da-fffff8011b9c91df 6 bytes - nt!KiDispatchInterruptContinue+4a (+0x90)
- [ cc cc cc 0f 1f 00:4c 87 00 98 c3 90 ]
- fffff8011b9d41fa-fffff8011b9d41ff 6 bytes - nt!KiBugCheckDispatch+7a (+0xb020)
- [ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
- fffff8011bab335a-fffff8011bab335f 6 bytes - nt!KiForceIdleStopDpcRoutine+ea (+0xdf160)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011bf7d08e-fffff8011bf7d093 6 bytes - nt!PpmWmiDispatch+6e
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011c0cbc6a-fffff8011c0cbc6f 6 bytes - nt!PspProcessRundownWorker+aa (+0x14ebdc)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- fffff8011c0cbcd2-fffff8011c0cbcd7 6 bytes - nt!PspProcessRundownWorkerSingle+62 (+0x68)
- [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
- 202 errors : !nt (fffff8011b84a44f-fffff8011c0cbcd7)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2020-06-24T12:44:22.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ====================== Dump #1: 3RD PARTY DRIVERS ======================
- May 10 2011 - AsrAppCharger.sys - ASRock App Charger driver
- Jun 03 2015 - iaStorA.sys - Intel SATA Storage Device RAID Controller
- Jun 23 2015 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
- Apr 11 2018 - TeeDriverW8x64.sys - Intel Management Engine Interface driver https://downloadcenter.intel.com/
- Jun 11 2018 - e1i65x64.sys - Intel(R) Gigabit Adapter driver
- Mar 14 2019 - nvvad64v.sys - Nvidia Virtual Audio driver http://www.nvidia.com/
- May 14 2019 - UcmCxUcsiNvppc.sys - NVIDIA USB Type-C Port Policy Controller driver
- Jan 10 2020 - nvvhci.sys - Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Feb 19 2020 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
- May 15 2020 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
- May 20 2020 - FACEIT.sys - FACEIT Client https://www.faceit.com/
- ================== Dump #1: 3RD PARTY DRIVERS (FULL) ===================
- Image path: \SystemRoot\system32\DRIVERS\AsrAppCharger.sys
- Image name: AsrAppCharger.sys
- Search : https://www.google.com/search?q=AsrAppCharger.sys
- ADA Info : ASRock App Charger driver
- Timestamp : Tue May 10 2011
- Image path: \SystemRoot\System32\drivers\iaStorA.sys
- Image name: iaStorA.sys
- Search : https://www.google.com/search?q=iaStorA.sys
- ADA Info : Intel SATA Storage Device RAID Controller
- Timestamp : Wed Jun 3 2015
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Search : https://www.google.com/search?q=RTKVHD64.sys
- ADA Info : Realtek Audio System driver https://www.realtek.com/en/
- Timestamp : Tue Jun 23 2015
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Search : https://www.google.com/search?q=TeeDriverW8x64.sys
- ADA Info : Intel Management Engine Interface driver https://downloadcenter.intel.com/
- Timestamp : Wed Apr 11 2018
- Mapped memory image file: C:\ProgramData\dbg\sym\e1i65x64.sys\5B1EB8E28e000\e1i65x64.sys
- Image path: \SystemRoot\System32\drivers\e1i65x64.sys
- Image name: e1i65x64.sys
- Search : https://www.google.com/search?q=e1i65x64.sys
- ADA Info : Intel(R) Gigabit Adapter driver
- Timestamp : Mon Jun 11 2018
- File version: 12.17.10.8
- Product version: 10.0.10011.16384
- File flags: 8 (Mask 3F) Private
- File OS: 40004 NT Win32
- File type: 3.6 Driver
- File date: 00000000.00000000
- CompanyName: Intel Corporation
- ProductName: Intel(R) Gigabit Adapter
- InternalName: e1i65x64.sys
- OriginalFilename: e1i65x64.sys
- ProductVersion: 12.17.10.8
- FileVersion: 12.17.10.8
- FileDescription: Intel(R) Gigabit Adapter NDIS 6.x driver
- LegalCopyright: Copyright(C) 2013, Intel Corporation. All rights reserved.
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Search : https://www.google.com/search?q=nvvad64v.sys
- ADA Info : Nvidia Virtual Audio driver http://www.nvidia.com/
- Timestamp : Thu Mar 14 2019
- Image path: \SystemRoot\system32\DRIVERS\UcmCxUcsiNvppc.sys
- Image name: UcmCxUcsiNvppc.sys
- Search : https://www.google.com/search?q=UcmCxUcsiNvppc.sys
- ADA Info : NVIDIA USB Type-C Port Policy Controller driver
- Timestamp : Tue May 14 2019
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Search : https://www.google.com/search?q=nvvhci.sys
- ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Timestamp : Fri Jan 10 2020
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Search : https://www.google.com/search?q=nvhda64v.sys
- ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
- Timestamp : Wed Feb 19 2020
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdi.inf_amd64_2eaf9d620160f138\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Search : https://www.google.com/search?q=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Fri May 15 2020
- Image path: \SystemRoot\System32\Drivers\FACEIT.sys
- Image name: FACEIT.sys
- Search : https://www.google.com/search?q=FACEIT.sys
- ADA Info : FACEIT Client https://www.faceit.com/
- Timestamp : Wed May 20 2020
- ====================== Dump #1: MICROSOFT DRIVERS ======================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- afunix.sys AF_UNIX Socket Provider driver (Microsoft)
- AgileVpn.sys RAS Agil VPN Miniport Call Manager driver (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- bam.sys BAM Kernal driver (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- bindflt.sys Windows Bind Filter driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
- cdd.dll Canonical Display Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- cldflt.sys Cloud Files Mini Filter driver (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- condrv.sys Console Driver (Microsoft)
- crashdmp.sys Crash Dump driver (Microsoft)
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_iaStorA.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HIDCLASS.SYS Hid Class Library (Microsoft)
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- HTTP.sys HTTP Protocol Stack (Microsoft)
- hwpolicy.sys Hardware Policy Driver
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kd.dll Local Kernal Debugger (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
- mmcss.sys MMCSS Driver (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- MpKslDrv.sys Microsoft Anti-malware Protection driver
- mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
- mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
- mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- ndistapi.sys NDIS 3.0 Connection Wrapper driver (Microsoft)
- ndisuio.sys NDIS User mode I/O driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- ndiswan.sys MS PPP Framing Driver (Strong Encryption) Microsoft)
- NDProxy.sys NDIS Proxy driver (Microsoft)
- Ndu.sys Network Data Usage Monitoring driver (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- Ntfs.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator (Microsoft)
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rasl2tp.sys RAS L2TP Mini-port/Call-manager driver (Microsoft)
- raspppoe.sys RAS PPPoE Mini-port/Call manager driver (Microsoft)
- raspptp.sys Peer-to-Peer Tunneling Protocol (Microsoft)
- rassstp.sys RAS SSTP Miniport Call Manager driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdpvideominiport.sys RDP Video Miniport driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- rspndr.sys Link-Layer Topology Responder driver (Microsoft)
- serenum.sys Serial Port Enumerator (Microsoft)
- serial.sys Serial Device Driver
- SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- srv2.sys Smb 2.0 Server driver (Microsoft)
- srvnet.sys Server Network driver (Microsoft)
- stornvme.sys NVM Express Storport Miniport driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
- storqosflt.sys Storage QoS Filter driver (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- UcmCx.sys USB Connector Manager KMDF Class Extension
- ucx01000.sys USB Controller Extension (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbaudio2.sys Microsoft USB Audio Class 2.0 Driver
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- UsbHub3.sys USB3 HUB driver (Microsoft)
- USBXHCI.SYS USB XHCI driver (Microsoft)
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- WdBoot.sys Microsoft Antimalware Boot driver
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
- winquic.sys QUIC Transport Protocol driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- ====================== Dump #1: UNLOADED MODULES =======================
- fffff801`24f80000 fffff801`24f8e000 WSDPrint.sys
- fffff801`27460000 fffff801`274a6000 usbaudio2.sy
- fffff801`23740000 fffff801`2374f000 hiber_storpo
- fffff801`62c70000 fffff801`631e3000 hiber_iaStor
- fffff801`62c00000 fffff801`62c1e000 hiber_dumpfv
- fffff801`23580000 fffff801`23721000 EasyAntiChea
- fffff801`240e0000 fffff801`240f1000 MpKsl5a35fd8
- fffff801`23900000 fffff801`2390f000 dump_storpor
- fffff801`24930000 fffff801`24ea3000 dump_iaStorA
- fffff801`24ed0000 fffff801`24eee000 dump_dumpfve
- fffff801`24140000 fffff801`2415e000 dam.sys
- ====================== Dump #1: BIOS INFORMATION =======================
- [SMBIOS Data Tables v2.8]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 1735 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version P7.50
- BIOS Starting Address Segment f000
- BIOS Release Date 01/23/2018
- BIOS ROM Size e00000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 11
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASRock
- Product Z170 Pro4S
- Version
- Feature Flags 09h
- -442190112: - -442190064: - ÷7!ü
- Location
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 25 - Handle 0003h]
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 1
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 000ah]
- Number of Strings 1
- [Cache Information (Type 7) - Length 19 - Handle 000dh]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0080h - 128K
- Installed Size 0080h - 128K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Data
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 000eh]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0080h - 128K
- Installed Size 0080h - 128K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Instruction
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 000fh]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0010h]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 1800h - 6144K
- Installed Size 1800h - 6144K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [Processor Information (Type 4) - Length 48 - Handle 0011h]
- Socket Designation CPUSocket
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID e3060500fffbebbf
- Processor Version Intel(R) Core(TM) i5-6600K CPU @ 3.50GHz
- Processor Voltage 8bh - 1.1V
- External Clock 100MHz
- Max Speed 5000MHz
- Current Speed 3500MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 000eh
- L2 Cache Handle 000fh
- L3 Cache Handle 0010h
- [Physical Memory Array (Type 16) - Length 23 - Handle 0012h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0013h]
- Physical Memory Array Handle 0012h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0014h]
- Physical Memory Array Handle 0012h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 3000MHz
- Manufacturer Kingston
- Part Number KHX3000C15D4/8GX
- [Memory Device (Type 17) - Length 40 - Handle 0015h]
- Physical Memory Array Handle 0012h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0016h]
- Physical Memory Array Handle 0012h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 3000MHz
- Manufacturer Kingston
- Part Number KHX3000C15D4/8GX
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0017h]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0012h
- Partition Width 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0018h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 0014h
- Mem Array Mapped Adr Handle 0017h
- Partition Row Position 01
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0019h]
- Starting Address 00800000h
- Ending Address 00ffffffh
- Memory Device Handle 0016h
- Mem Array Mapped Adr Handle 0017h
- Partition Row Position 01
- Interleave Position 02
- Interleave Data Depth 02
- ========================== Dump #1: Extra #1 ===========================
- 0: kd> !verifier
- Verify Flags Level 0x00000000
- STANDARD FLAGS:
- [X] (0x00000000) Automatic Checks
- [ ] (0x00000001) Special pool
- [ ] (0x00000002) Force IRQL checking
- [ ] (0x00000008) Pool tracking
- [ ] (0x00000010) I/O verification
- [ ] (0x00000020) Deadlock detection
- [ ] (0x00000080) DMA checking
- [ ] (0x00000100) Security checks
- [ ] (0x00000800) Miscellaneous checks
- [ ] (0x00020000) DDI compliance checking
- ADDITIONAL FLAGS:
- [ ] (0x00000004) Randomized low resources simulation
- [ ] (0x00000200) Force pending I/O requests
- [ ] (0x00000400) IRP logging
- [ ] (0x00002000) Invariant MDL checking for stack
- [ ] (0x00004000) Invariant MDL checking for driver
- [ ] (0x00008000) Power framework delay fuzzing
- [ ] (0x00010000) Port/miniport interface checking
- [ ] (0x00040000) Systematic low resources simulation
- [ ] (0x00080000) DDI compliance checking (additional)
- [ ] (0x00200000) NDIS/WIFI verification
- [ ] (0x00800000) Kernel synchronization delay fuzzing
- [ ] (0x01000000) VM switch verification
- [ ] (0x02000000) Code integrity checks
- [X] Indicates flag is enabled
- Summary of All Verifier Statistics
- RaiseIrqls 0x0
- AcquireSpinLocks 0x0
- Synch Executions 0x0
- Trims 0x0
- Pool Allocations Attempted 0x0
- Pool Allocations Succeeded 0x0
- Pool Allocations Succeeded SpecialPool 0x0
- Pool Allocations With NO TAG 0x0
- Pool Allocations Failed 0x0
- Current paged pool allocations 0x0 for 00000000 bytes
- Peak paged pool allocations 0x0 for 00000000 bytes
- Current nonpaged pool allocations 0x0 for 00000000 bytes
- Peak nonpaged pool allocations 0x0 for 00000000 bytes
- ========================== Dump #1: Extra #2 ===========================
- 0: kd> !thread
- THREAD fffff8011bd91400 Cid 0000.0000 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
- Not impersonating
- GetUlongFromAddress: unable to read from fffff8011bc2ca14
- Owning Process fffff8011bd8e9c0 Image: System Process
- Attached Process ffffd306e9a6b300 Image: System
- fffff78000000000: Unable to get shared data
- Wait Start TickCount 3638396
- Context Switch Count 26744715 IdealProcessor: 0
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- Win32 Start Address nt!KiIdleLoop (0xfffff8011b9c5e50)
- Stack Init fffff80122d38b90 Current fffff80122d38b20
- Base fffff80122d39000 Limit fffff80122d32000 Call 0000000000000000
- Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 5
- Child-SP RetAddr : Args to Child : Call Site
- fffff801`22d38408 fffff801`1b9d41e9 : 00000000`0000000a fffff801`22c986d8 00000000`000000ff 00000000`000000d3 : nt!KeBugCheckEx
- fffff801`22d38410 fffff801`1b9d0529 : 00000000`0000000f 00000000`00000000 00000000`00000000 fffff801`27cea5d7 : nt!KiBugCheckDispatch+0x69
- fffff801`22d38550 fffff801`1b84adc3 : 00000000`00000089 00000000`00989680 fffff801`1a2cd180 00000000`00000000 : nt!KiPageFault+0x469 (TrapFrame @ fffff801`22d38550)
- fffff801`22d386e0 fffff801`1b84a36e : 00000000`00000003 00000000`00000002 ffffd306`efae10f0 00000000`00000008 : nt!PpmIdleExecuteTransition+0x8b3
- fffff801`22d38a00 fffff801`1b9c5e94 : 00000000`00000000 fffff801`1a2cd180 ffffd306`f810b080 00000000`00000332 : nt!PoIdle+0x36e
- fffff801`22d38b60 00000000`00000000 : fffff801`22d39000 fffff801`22d32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44
Add Comment
Please, Sign In to add comment