Guest User

Untitled

a guest
Jun 26th, 2020
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 40.13 KB | None | 0 0
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer
  3. Version: 0.91
  4. Time to analyze file(s): 00 hours and 01 minutes and 10 seconds
  5.  
  6. ================================= BIOS =================================
  7. VENDOR: American Megatrends Inc.
  8. VERSION: P7.50
  9. DATE: 01/23/2018
  10.  
  11. ============================= MOTHERBOARD ==============================
  12. MANUFACTURER: ASRock
  13. PRODUCT: Z170 Pro4S
  14.  
  15. ================================= RAM ==================================
  16. Size Speed Manufacturer Part No.
  17. -------------- -------------- ------------------- ----------------------
  18. 0MHz
  19. 8192MB 3000MHz Kingston KHX3000C15D4/8GX
  20. 0MHz
  21. 8192MB 3000MHz Kingston KHX3000C15D4/8GX
  22.  
  23. ================================= CPU ==================================
  24. Processor Version: Intel(R) Core(TM) i5-6600K CPU @ 3.50GHz
  25. COUNT: 4
  26. MHZ: 3504
  27. VENDOR: GenuineIntel
  28. FAMILY: 6
  29. MODEL: 5e
  30. STEPPING: 3
  31. MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)
  32.  
  33. ================================== OS ==================================
  34. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  35. Built by: 18362.1.amd64fre.19h1_release.190318-1202
  36. BUILD_VERSION: 10.0.18362.900 (WinBuild.160101.0800)
  37. BUILD: 18362
  38. SERVICEPACK: 900
  39. PLATFORM_TYPE: x64
  40. NAME: Windows 10
  41. EDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  42. BUILD_TIMESTAMP: 2012-07-06 17:22:33
  43. BUILDDATESTAMP: 160101.0800
  44. BUILDLAB: WinBuild
  45. BUILDOSVER: 10.0.18362.900
  46.  
  47. =============================== DEBUGGER ===============================
  48. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  49. Copyright (c) Microsoft Corporation. All rights reserved.
  50.  
  51. =============================== COMMENTS ===============================
  52. * Information gathered from different dump files may be different. If
  53. Windows updates between two dump files, two or more OS versions may
  54. be shown above.
  55. * If the user updates the BIOS between dump files, two or more versions
  56. and dates may be shown above.
  57. * More RAM information can be found below in a full BIOS section.
  58.  
  59. ========================================================================
  60. ======================= Dump #1: ANALYZE VERBOSE =======================
  61. ====================== File: 062420-10578-01.dmp =======================
  62. ========================================================================
  63.  
  64. Mini Kernel Dump File: Only registers and stack trace are available
  65. Windows 10 Kernel Version 18362 MP (4 procs) Free x64
  66. Kernel base = 0xfffff801`1b800000 PsLoadedModuleList = 0xfffff801`1bc48190
  67. Debug session time: Wed Jun 24 08:44:22.283 2020 (UTC - 4:00)
  68. System Uptime: 0 days 15:47:29.954
  69.  
  70. BugCheck A, {fffff80122c986d8, ff, d3, fffff8011b84adc3}
  71. *** WARNING: Unable to verify timestamp for win32k.sys
  72. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  73. Probably caused by : memory_corruption
  74. Followup: memory_corruption
  75.  
  76. IRQL_NOT_LESS_OR_EQUAL (a)
  77. An attempt was made to access a pageable (or completely invalid) address at an
  78. interrupt request level (IRQL) that is too high. This is usually
  79. caused by drivers using improper addresses.
  80. If a kernel debugger is available get the stack backtrace.
  81.  
  82. Arguments:
  83. Arg1: fffff80122c986d8, memory referenced
  84. Arg2: 00000000000000ff, IRQL
  85. Arg3: 00000000000000d3, bitfield :
  86. bit 0 : value 0 = read operation, 1 = write operation
  87. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  88. Arg4: fffff8011b84adc3, address which referenced memory
  89.  
  90. Debugging Details:
  91. DUMP_CLASS: 1
  92. DUMP_QUALIFIER: 400
  93. DUMP_TYPE: 2
  94. WRITE_ADDRESS: fffff8011bd733b8: Unable to get MiVisibleState
  95. fffff80122c986d8
  96. CURRENT_IRQL: 0
  97. FAULTING_IP:
  98. nt!PpmIdleExecuteTransition+8b3
  99. fffff801`1b84adc3 e8d8100000 call nt!KeResumeClockTimerFromIdle (fffff801`1b84bea0)
  100. CUSTOMER_CRASH_COUNT: 1
  101. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  102. BUGCHECK_STR: AV
  103.  
  104. PROCESS_NAME: System
  105.  
  106. TRAP_FRAME: fffff80122d38550 -- (.trap 0xfffff80122d38550)
  107. NOTE: The trap frame does not contain all registers.
  108. Some register values may be zeroed or incorrect.
  109. rax=fffff8011bd8f240 rbx=0000000000000000 rcx=0000000000000000
  110. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  111. rip=fffff8011b84adc3 rsp=fffff80122d386e0 rbp=ffffd306efae1000
  112. r8=0000008000000000 r9=0000000000000000 r10=fffff8011b8f0150
  113. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  114. r14=0000000000000000 r15=0000000000000000
  115. iopl=0 nv up di pl zr na po nc
  116. nt!PpmIdleExecuteTransition+0x8b3:
  117. fffff801`1b84adc3 e8d8100000 call nt!KeResumeClockTimerFromIdle (fffff801`1b84bea0)
  118. Resetting default scope
  119. LAST_CONTROL_TRANSFER: from fffff8011b9d41e9 to fffff8011b9c23a0
  120. STACK_TEXT:
  121. fffff801`22d38408 fffff801`1b9d41e9 : 00000000`0000000a fffff801`22c986d8 00000000`000000ff 00000000`000000d3 : nt!KeBugCheckEx
  122. fffff801`22d38410 fffff801`1b9d0529 : 00000000`0000000f 00000000`00000000 00000000`00000000 fffff801`27cea5d7 : nt!KiBugCheckDispatch+0x69
  123. fffff801`22d38550 fffff801`1b84adc3 : 00000000`00000089 00000000`00989680 fffff801`1a2cd180 00000000`00000000 : nt!KiPageFault+0x469
  124. fffff801`22d386e0 fffff801`1b84a36e : 00000000`00000003 00000000`00000002 ffffd306`efae10f0 00000000`00000008 : nt!PpmIdleExecuteTransition+0x8b3
  125. fffff801`22d38a00 fffff801`1b9c5e94 : 00000000`00000000 fffff801`1a2cd180 ffffd306`f810b080 00000000`00000332 : nt!PoIdle+0x36e
  126. fffff801`22d38b60 00000000`00000000 : fffff801`22d39000 fffff801`22d32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44
  127. STACK_COMMAND: kb
  128. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  129. fffff8011b84a44f-fffff8011b84a450 2 bytes - nt!PoIdle+44f
  130. [ 48 ff:4c 8b ]
  131. fffff8011b84a456-fffff8011b84a459 4 bytes - nt!PoIdle+456 (+0x07)
  132. [ 0f 1f 44 00:e8 c5 ed a6 ]
  133. fffff8011b84a469-fffff8011b84a46a 2 bytes - nt!PoIdle+469 (+0x13)
  134. [ 48 ff:4c 8b ]
  135. fffff8011b84a470-fffff8011b84a473 4 bytes - nt!PoIdle+470 (+0x07)
  136. [ 0f 1f 44 00:e8 bb 63 a8 ]
  137. fffff8011b84a50a-fffff8011b84a50f 6 bytes - nt!PoIdle+50a (+0x9a)
  138. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  139. fffff8011b84accf-fffff8011b84acd0 2 bytes - nt!PpmIdleExecuteTransition+7bf (+0x7c5)
  140. [ 48 ff:4c 8b ]
  141. fffff8011b84acd6-fffff8011b84acd9 4 bytes - nt!PpmIdleExecuteTransition+7c6 (+0x07)
  142. [ 0f 1f 44 00:e8 95 db a6 ]
  143. fffff8011b8d3d32-fffff8011b8d3d37 6 bytes - nt!PspReaper+a2 (+0x8905c)
  144. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  145. fffff8011b8f015a-fffff8011b8f015f 6 bytes - nt!RtlUnsignedMultiplyHigh+a (+0x1c428)
  146. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  147. fffff8011b8f01da-fffff8011b8f01df 6 bytes - nt!ExIsResourceAcquiredExclusiveLite+7a (+0x80)
  148. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  149. fffff8011b8f01f6-fffff8011b8f01f7 2 bytes - nt!MiUnlockPageTableInternal+16 (+0x1c)
  150. [ 68 df:28 5f ]
  151. fffff8011b8f01f9-fffff8011b8f01fb 3 bytes - nt!MiUnlockPageTableInternal+19 (+0x03)
  152. [ 7d fb f6:7c f9 f2 ]
  153. fffff8011b8f020a - nt!MiUnlockPageTableInternal+2a (+0x11)
  154. [ d0:50 ]
  155. fffff8011b8f020c-fffff8011b8f020e 3 bytes - nt!MiUnlockPageTableInternal+2c (+0x02)
  156. [ 7d fb f6:7c f9 f2 ]
  157. fffff8011b8f0214 - nt!MiUnlockPageTableInternal+34 (+0x08)
  158. [ df:5f ]
  159. fffff8011b8f0216-fffff8011b8f0218 3 bytes - nt!MiUnlockPageTableInternal+36 (+0x02)
  160. [ 7d fb f6:7c f9 f2 ]
  161. fffff8011b96481e-fffff8011b964823 6 bytes - nt!KiTimerExpirationDpc+de (+0x74608)
  162. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  163. fffff8011b97603a-fffff8011b97603f 6 bytes - nt!EmpCheckErrataList+a (+0x1181c)
  164. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  165. fffff8011b976076-fffff8011b97607b 6 bytes - nt!IoAllocateErrorLogEntry+36 (+0x3c)
  166. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  167. fffff8011b9c237a-fffff8011b9c237b 2 bytes - nt!ZwLoadKey3+2a (+0x4c304)
  168. [ 84 00:4c 87 ]
  169. fffff8011b9c237d-fffff8011b9c237f 3 bytes - nt!ZwLoadKey3+2d (+0x03)
  170. [ 00 00 00:98 c3 90 ]
  171. fffff8011b9c239a-fffff8011b9c239b 2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
  172. [ 84 00:4c 87 ]
  173. fffff8011b9c239d-fffff8011b9c239f 3 bytes - nt!KiBugCheckReturn+19 (+0x03)
  174. [ 00 00 00:98 c3 90 ]
  175. fffff8011b9c24ca-fffff8011b9c24cb 2 bytes - nt!KeBugCheckEx+12a (+0x12d)
  176. [ 84 00:4c 87 ]
  177. fffff8011b9c24cd-fffff8011b9c24cf 3 bytes - nt!KeBugCheckEx+12d (+0x03)
  178. [ 00 00 00:98 c3 90 ]
  179. fffff8011b9c25ca-fffff8011b9c25cb 2 bytes - nt!KeContextToKframes+fa (+0xfd)
  180. [ 84 00:4c 87 ]
  181. fffff8011b9c25cd-fffff8011b9c25cf 3 bytes - nt!KeContextToKframes+fd (+0x03)
  182. [ 00 00 00:98 c3 90 ]
  183. fffff8011b9c261a-fffff8011b9c261b 2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
  184. [ 84 00:4c 87 ]
  185. fffff8011b9c261d-fffff8011b9c261f 3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
  186. [ 00 00 00:98 c3 90 ]
  187. fffff8011b9c26ea-fffff8011b9c26ef 6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
  188. [ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
  189. fffff8011b9c286a-fffff8011b9c286b 2 bytes - nt!KiSaveProcessorControlState+17a (+0x180)
  190. [ 84 00:4c 87 ]
  191. fffff8011b9c286d-fffff8011b9c286f 3 bytes - nt!KiSaveProcessorControlState+17d (+0x03)
  192. [ 00 00 00:98 c3 90 ]
  193. fffff8011b9c28ea-fffff8011b9c28ef 6 bytes - nt!KiRestoreDebugRegisterState+7a (+0x7d)
  194. [ cc 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
  195. fffff8011b9c2a7a-fffff8011b9c2a7b 2 bytes - nt!KiSaveDebugRegisterState+18a (+0x190)
  196. [ 84 00:4c 87 ]
  197. fffff8011b9c2a7d-fffff8011b9c2a7f 3 bytes - nt!KiSaveDebugRegisterState+18d (+0x03)
  198. [ 00 00 00:98 c3 90 ]
  199. fffff8011b9c2a8a-fffff8011b9c2a8f 6 bytes - nt!KeGetCurrentStackPointer+a (+0x0d)
  200. [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
  201. fffff8011b9c2a9a-fffff8011b9c2a9b 2 bytes - nt!KeResetLegacyFloatingPointState+a (+0x10)
  202. [ 1f 80:4c 87 ]
  203. fffff8011b9c2a9d-fffff8011b9c2a9f 3 bytes - nt!KeResetLegacyFloatingPointState+d (+0x03)
  204. [ 00 00 00:98 c3 90 ]
  205. fffff8011b9c2aaa-fffff8011b9c2aaf 6 bytes - nt!KeSaveLegacyFloatingPointControlWord+a (+0x0d)
  206. [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
  207. fffff8011b9c2aca-fffff8011b9c2acb 2 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1a (+0x20)
  208. [ 84 00:4c 87 ]
  209. fffff8011b9c2acd-fffff8011b9c2acf 3 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1d (+0x03)
  210. [ 00 00 00:98 c3 90 ]
  211. fffff8011b9c2d8a-fffff8011b9c2d8f 6 bytes - nt!NtContinue+2ba (+0x2bd)
  212. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  213. fffff8011b9c36d8-fffff8011b9c36d9 2 bytes - nt!KiChainedDispatch+b8 (+0x94e)
  214. [ 48 ff:4c 8b ]
  215. fffff8011b9c36df-fffff8011b9c36e2 4 bytes - nt!KiChainedDispatch+bf (+0x07)
  216. [ 0f 1f 44 00:e8 3c 6a 8f ]
  217. fffff8011b9c3ef8-fffff8011b9c3ef9 2 bytes - nt!KiInterruptDispatch+b8 (+0x819)
  218. [ 48 ff:4c 8b ]
  219. fffff8011b9c3eff-fffff8011b9c3f02 4 bytes - nt!KiInterruptDispatch+bf (+0x07)
  220. [ 0f 1f 44 00:e8 1c 62 8f ]
  221. fffff8011b9c914a-fffff8011b9c914f 6 bytes - nt!KiSwapContext+da (+0x524b)
  222. [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
  223. fffff8011b9c91da-fffff8011b9c91df 6 bytes - nt!KiDispatchInterruptContinue+4a (+0x90)
  224. [ cc cc cc 0f 1f 00:4c 87 00 98 c3 90 ]
  225. fffff8011b9d41fa-fffff8011b9d41ff 6 bytes - nt!KiBugCheckDispatch+7a (+0xb020)
  226. [ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
  227. fffff8011bab335a-fffff8011bab335f 6 bytes - nt!KiForceIdleStopDpcRoutine+ea (+0xdf160)
  228. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  229. fffff8011bf7d08e-fffff8011bf7d093 6 bytes - nt!PpmWmiDispatch+6e
  230. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  231. fffff8011c0cbc6a-fffff8011c0cbc6f 6 bytes - nt!PspProcessRundownWorker+aa (+0x14ebdc)
  232. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  233. fffff8011c0cbcd2-fffff8011c0cbcd7 6 bytes - nt!PspProcessRundownWorkerSingle+62 (+0x68)
  234. [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
  235. 202 errors : !nt (fffff8011b84a44f-fffff8011c0cbcd7)
  236. MODULE_NAME: memory_corruption
  237.  
  238. IMAGE_NAME: memory_corruption
  239.  
  240. FOLLOWUP_NAME: memory_corruption
  241. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  242. MEMORY_CORRUPTOR: LARGE
  243. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  244. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  245. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  246. TARGET_TIME: 2020-06-24T12:44:22.000Z
  247. SUITE_MASK: 784
  248. PRODUCT_TYPE: 1
  249. USER_LCID: 0
  250. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  251. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  252. Followup: memory_corruption
  253.  
  254. ====================== Dump #1: 3RD PARTY DRIVERS ======================
  255.  
  256. May 10 2011 - AsrAppCharger.sys - ASRock App Charger driver
  257. Jun 03 2015 - iaStorA.sys - Intel SATA Storage Device RAID Controller
  258. Jun 23 2015 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
  259. Apr 11 2018 - TeeDriverW8x64.sys - Intel Management Engine Interface driver https://downloadcenter.intel.com/
  260. Jun 11 2018 - e1i65x64.sys - Intel(R) Gigabit Adapter driver
  261. Mar 14 2019 - nvvad64v.sys - Nvidia Virtual Audio driver http://www.nvidia.com/
  262. May 14 2019 - UcmCxUcsiNvppc.sys - NVIDIA USB Type-C Port Policy Controller driver
  263. Jan 10 2020 - nvvhci.sys - Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
  264. Feb 19 2020 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  265. May 15 2020 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  266. May 20 2020 - FACEIT.sys - FACEIT Client https://www.faceit.com/
  267.  
  268. ================== Dump #1: 3RD PARTY DRIVERS (FULL) ===================
  269.  
  270. Image path: \SystemRoot\system32\DRIVERS\AsrAppCharger.sys
  271. Image name: AsrAppCharger.sys
  272. Search : https://www.google.com/search?q=AsrAppCharger.sys
  273. ADA Info : ASRock App Charger driver
  274. Timestamp : Tue May 10 2011
  275.  
  276. Image path: \SystemRoot\System32\drivers\iaStorA.sys
  277. Image name: iaStorA.sys
  278. Search : https://www.google.com/search?q=iaStorA.sys
  279. ADA Info : Intel SATA Storage Device RAID Controller
  280. Timestamp : Wed Jun 3 2015
  281.  
  282. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  283. Image name: RTKVHD64.sys
  284. Search : https://www.google.com/search?q=RTKVHD64.sys
  285. ADA Info : Realtek Audio System driver https://www.realtek.com/en/
  286. Timestamp : Tue Jun 23 2015
  287.  
  288. Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
  289. Image name: TeeDriverW8x64.sys
  290. Search : https://www.google.com/search?q=TeeDriverW8x64.sys
  291. ADA Info : Intel Management Engine Interface driver https://downloadcenter.intel.com/
  292. Timestamp : Wed Apr 11 2018
  293.  
  294. Mapped memory image file: C:\ProgramData\dbg\sym\e1i65x64.sys\5B1EB8E28e000\e1i65x64.sys
  295. Image path: \SystemRoot\System32\drivers\e1i65x64.sys
  296. Image name: e1i65x64.sys
  297. Search : https://www.google.com/search?q=e1i65x64.sys
  298. ADA Info : Intel(R) Gigabit Adapter driver
  299. Timestamp : Mon Jun 11 2018
  300. File version: 12.17.10.8
  301. Product version: 10.0.10011.16384
  302. File flags: 8 (Mask 3F) Private
  303. File OS: 40004 NT Win32
  304. File type: 3.6 Driver
  305. File date: 00000000.00000000
  306. CompanyName: Intel Corporation
  307. ProductName: Intel(R) Gigabit Adapter
  308. InternalName: e1i65x64.sys
  309. OriginalFilename: e1i65x64.sys
  310. ProductVersion: 12.17.10.8
  311. FileVersion: 12.17.10.8
  312. FileDescription: Intel(R) Gigabit Adapter NDIS 6.x driver
  313. LegalCopyright: Copyright(C) 2013, Intel Corporation. All rights reserved.
  314.  
  315. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  316. Image name: nvvad64v.sys
  317. Search : https://www.google.com/search?q=nvvad64v.sys
  318. ADA Info : Nvidia Virtual Audio driver http://www.nvidia.com/
  319. Timestamp : Thu Mar 14 2019
  320.  
  321. Image path: \SystemRoot\system32\DRIVERS\UcmCxUcsiNvppc.sys
  322. Image name: UcmCxUcsiNvppc.sys
  323. Search : https://www.google.com/search?q=UcmCxUcsiNvppc.sys
  324. ADA Info : NVIDIA USB Type-C Port Policy Controller driver
  325. Timestamp : Tue May 14 2019
  326.  
  327. Image path: \SystemRoot\System32\drivers\nvvhci.sys
  328. Image name: nvvhci.sys
  329. Search : https://www.google.com/search?q=nvvhci.sys
  330. ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
  331. Timestamp : Fri Jan 10 2020
  332.  
  333. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  334. Image name: nvhda64v.sys
  335. Search : https://www.google.com/search?q=nvhda64v.sys
  336. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  337. Timestamp : Wed Feb 19 2020
  338.  
  339. Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdi.inf_amd64_2eaf9d620160f138\nvlddmkm.sys
  340. Image name: nvlddmkm.sys
  341. Search : https://www.google.com/search?q=nvlddmkm.sys
  342. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  343. Timestamp : Fri May 15 2020
  344.  
  345. Image path: \SystemRoot\System32\Drivers\FACEIT.sys
  346. Image name: FACEIT.sys
  347. Search : https://www.google.com/search?q=FACEIT.sys
  348. ADA Info : FACEIT Client https://www.faceit.com/
  349. Timestamp : Wed May 20 2020
  350.  
  351. ====================== Dump #1: MICROSOFT DRIVERS ======================
  352.  
  353. ACPI.sys ACPI Driver for NT (Microsoft)
  354. acpiex.sys ACPIEx Driver (Microsoft)
  355. acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
  356. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  357. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  358. AgileVpn.sys RAS Agil VPN Miniport Call Manager driver (Microsoft)
  359. ahcache.sys Application Compatibility Cache (Microsoft)
  360. bam.sys BAM Kernal driver (Microsoft)
  361. BasicDisplay.sys Basic Display driver (Microsoft)
  362. BasicRender.sys Basic Render driver (Microsoft)
  363. Beep.SYS BEEP driver (Microsoft)
  364. bindflt.sys Windows Bind Filter driver (Microsoft)
  365. BOOTVID.dll VGA Boot Driver (Microsoft)
  366. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  367. cdd.dll Canonical Display Driver (Microsoft)
  368. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  369. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  370. CI.dll Code Integrity Module (Microsoft)
  371. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  372. cldflt.sys Cloud Files Mini Filter driver (Microsoft)
  373. CLFS.SYS Common Log File System Driver (Microsoft)
  374. clipsp.sys CLIP Service (Microsoft)
  375. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  376. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  377. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  378. condrv.sys Console Driver (Microsoft)
  379. crashdmp.sys Crash Dump driver (Microsoft)
  380. dfsc.sys DFS Namespace Client Driver (Microsoft)
  381. disk.sys PnP Disk Driver (Microsoft)
  382. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  383. dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  384. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  385. dump_iaStorA.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  386. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  387. dxgmms2.sys DirectX Graphics MMS
  388. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  389. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  390. fileinfo.sys FileInfo Filter Driver (Microsoft)
  391. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  392. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  393. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  394. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  395. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  396. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  397. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  398. HIDCLASS.SYS Hid Class Library (Microsoft)
  399. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  400. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  401. HTTP.sys HTTP Protocol Stack (Microsoft)
  402. hwpolicy.sys Hardware Policy Driver
  403. intelpep.sys Intel Power Engine Plugin (Microsoft)
  404. intelppm.sys Processor Device Driver (Microsoft)
  405. iorate.sys I/O rate control Filter (Microsoft)
  406. kbdclass.sys Keyboard Class Driver (Microsoft)
  407. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  408. kd.dll Local Kernal Debugger (Microsoft)
  409. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  410. ks.sys Kernal CSA Library (Microsoft)
  411. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  412. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  413. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  414. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  415. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  416. mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
  417. mmcss.sys MMCSS Driver (Microsoft)
  418. monitor.sys Monitor Driver (Microsoft)
  419. mouclass.sys Mouse Class Driver (Microsoft)
  420. mouhid.sys HID Mouse Filter Driver (Microsoft)
  421. mountmgr.sys Mount Point Manager (Microsoft)
  422. MpKslDrv.sys Microsoft Anti-malware Protection driver
  423. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  424. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  425. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  426. Msfs.SYS Mailslot driver (Microsoft)
  427. msisadrv.sys ISA Driver (Microsoft)
  428. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  429. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  430. mssmbios.sys System Management BIOS driver (Microsoft)
  431. mup.sys Multiple UNC Provider driver (Microsoft)
  432. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  433. ndistapi.sys NDIS 3.0 Connection Wrapper driver (Microsoft)
  434. ndisuio.sys NDIS User mode I/O driver (Microsoft)
  435. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  436. ndiswan.sys MS PPP Framing Driver (Strong Encryption) Microsoft)
  437. NDProxy.sys NDIS Proxy driver (Microsoft)
  438. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  439. netbios.sys NetBIOS Interface driver (Microsoft)
  440. netbt.sys MBT Transport driver (Microsoft)
  441. NETIO.SYS Network I/O Subsystem (Microsoft)
  442. Npfs.SYS NPFS driver (Microsoft)
  443. npsvctrig.sys Named pipe service triggers (Microsoft)
  444. nsiproxy.sys NSI Proxy driver (Microsoft)
  445. Ntfs.sys NT File System Driver (Microsoft)
  446. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  447. ntosext.sys NTOS Extension Host driver (Microsoft)
  448. Null.SYS NULL Driver (Microsoft)
  449. pacer.sys QoS Packet Scheduler (Microsoft)
  450. partmgr.sys Partition driver (Microsoft)
  451. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  452. pcw.sys Performance Counter Driver (Microsoft)
  453. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  454. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  455. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  456. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  457. rasl2tp.sys RAS L2TP Mini-port/Call-manager driver (Microsoft)
  458. raspppoe.sys RAS PPPoE Mini-port/Call manager driver (Microsoft)
  459. raspptp.sys Peer-to-Peer Tunneling Protocol (Microsoft)
  460. rassstp.sys RAS SSTP Miniport Call Manager driver (Microsoft)
  461. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  462. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  463. rdpvideominiport.sys RDP Video Miniport driver (Microsoft)
  464. rdyboost.sys ReadyBoost Driver (Microsoft)
  465. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  466. serenum.sys Serial Port Enumerator (Microsoft)
  467. serial.sys Serial Device Driver
  468. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  469. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  470. spaceport.sys Storage Spaces driver (Microsoft)
  471. srv2.sys Smb 2.0 Server driver (Microsoft)
  472. srvnet.sys Server Network driver (Microsoft)
  473. stornvme.sys NVM Express Storport Miniport driver (Microsoft)
  474. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  475. storqosflt.sys Storage QoS Filter driver (Microsoft)
  476. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  477. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  478. tcpip.sys TCP/IP Protocol driver (Microsoft)
  479. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  480. TDI.SYS TDI Wrapper driver (Microsoft)
  481. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  482. tm.sys Kernel Transaction Manager driver (Microsoft)
  483. UcmCx.sys USB Connector Manager KMDF Class Extension
  484. ucx01000.sys USB Controller Extension (Microsoft)
  485. umbus.sys User-Mode Bus Enumerator (Microsoft)
  486. usbaudio2.sys Microsoft USB Audio Class 2.0 Driver
  487. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  488. USBD.SYS Universal Serial Bus Driver (Microsoft)
  489. UsbHub3.sys USB3 HUB driver (Microsoft)
  490. USBXHCI.SYS USB XHCI driver (Microsoft)
  491. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  492. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  493. volmgr.sys Volume Manager Driver (Microsoft)
  494. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  495. volsnap.sys Volume Shadow Copy driver (Microsoft)
  496. volume.sys Volume driver (Microsoft)
  497. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  498. wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
  499. watchdog.sys Watchdog driver (Microsoft)
  500. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  501. WdBoot.sys Microsoft Antimalware Boot driver
  502. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  503. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  504. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  505. WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
  506. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  507. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  508. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  509. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  510. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  511. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  512. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  513. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  514. winquic.sys QUIC Transport Protocol driver (Microsoft)
  515. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  516. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  517. Wof.sys Windows Overlay Filter (Microsoft)
  518. WppRecorder.sys WPP Trace Recorder (Microsoft)
  519.  
  520. ====================== Dump #1: UNLOADED MODULES =======================
  521.  
  522. fffff801`24f80000 fffff801`24f8e000 WSDPrint.sys
  523. fffff801`27460000 fffff801`274a6000 usbaudio2.sy
  524. fffff801`23740000 fffff801`2374f000 hiber_storpo
  525. fffff801`62c70000 fffff801`631e3000 hiber_iaStor
  526. fffff801`62c00000 fffff801`62c1e000 hiber_dumpfv
  527. fffff801`23580000 fffff801`23721000 EasyAntiChea
  528. fffff801`240e0000 fffff801`240f1000 MpKsl5a35fd8
  529. fffff801`23900000 fffff801`2390f000 dump_storpor
  530. fffff801`24930000 fffff801`24ea3000 dump_iaStorA
  531. fffff801`24ed0000 fffff801`24eee000 dump_dumpfve
  532. fffff801`24140000 fffff801`2415e000 dam.sys
  533.  
  534. ====================== Dump #1: BIOS INFORMATION =======================
  535.  
  536. [SMBIOS Data Tables v2.8]
  537. [DMI Version - 0]
  538. [2.0 Calling Convention - No]
  539. [Table Size - 1735 bytes]
  540. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  541. Vendor American Megatrends Inc.
  542. BIOS Version P7.50
  543. BIOS Starting Address Segment f000
  544. BIOS Release Date 01/23/2018
  545. BIOS ROM Size e00000
  546. BIOS Characteristics
  547. 07: - PCI Supported
  548. 11: - Upgradeable FLASH BIOS
  549. 12: - BIOS Shadowing Supported
  550. 15: - CD-Boot Supported
  551. 16: - Selectable Boot Supported
  552. 17: - BIOS ROM Socketed
  553. 19: - EDD Supported
  554. 23: - 1.2MB Floppy Supported
  555. 24: - 720KB Floppy Supported
  556. 25: - 2.88MB Floppy Supported
  557. 26: - Print Screen Device Supported
  558. 27: - Keyboard Services Supported
  559. 28: - Serial Services Supported
  560. 29: - Printer Services Supported
  561. 32: - BIOS Vendor Reserved
  562. BIOS Characteristic Extensions
  563. 00: - ACPI Supported
  564. 01: - USB Legacy Supported
  565. 08: - BIOS Boot Specification Supported
  566. 10: - Specification Reserved
  567. 11: - Specification Reserved
  568. BIOS Major Revision 5
  569. BIOS Minor Revision 11
  570. EC Firmware Major Revision 255
  571. EC Firmware Minor Revision 255
  572. [System Information (Type 1) - Length 27 - Handle 0001h]
  573. UUID 00000000-0000-0000-0000-000000000000
  574. Wakeup Type Power Switch
  575. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  576. Manufacturer ASRock
  577. Product Z170 Pro4S
  578. Version
  579. Feature Flags 09h
  580. -442190112: - -442190064: - ÷7!ü
  581. Location
  582. Chassis Handle 0003h
  583. Board Type 0ah - Processor/Memory Module
  584. Number of Child Handles 0
  585. [System Enclosure (Type 3) - Length 25 - Handle 0003h]
  586. Chassis Type Desktop
  587. Bootup State Safe
  588. Power Supply State Safe
  589. Thermal State Safe
  590. Security Status None
  591. OEM Defined 0
  592. Height 0U
  593. Number of Power Cords 1
  594. Number of Contained Elements 1
  595. Contained Element Size 3
  596. [OEM Strings (Type 11) - Length 5 - Handle 000ah]
  597. Number of Strings 1
  598. [Cache Information (Type 7) - Length 19 - Handle 000dh]
  599. Socket Designation L1 Cache
  600. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  601. Maximum Cache Size 0080h - 128K
  602. Installed Size 0080h - 128K
  603. Supported SRAM Type 0020h - Synchronous
  604. Current SRAM Type 0020h - Synchronous
  605. Cache Speed 0ns
  606. Error Correction Type ParitySingle-Bit ECC
  607. System Cache Type Data
  608. Associativity 8-way Set-Associative
  609. [Cache Information (Type 7) - Length 19 - Handle 000eh]
  610. Socket Designation L1 Cache
  611. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  612. Maximum Cache Size 0080h - 128K
  613. Installed Size 0080h - 128K
  614. Supported SRAM Type 0020h - Synchronous
  615. Current SRAM Type 0020h - Synchronous
  616. Cache Speed 0ns
  617. Error Correction Type ParitySingle-Bit ECC
  618. System Cache Type Instruction
  619. Associativity 8-way Set-Associative
  620. [Cache Information (Type 7) - Length 19 - Handle 000fh]
  621. Socket Designation L2 Cache
  622. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  623. Maximum Cache Size 0400h - 1024K
  624. Installed Size 0400h - 1024K
  625. Supported SRAM Type 0020h - Synchronous
  626. Current SRAM Type 0020h - Synchronous
  627. Cache Speed 0ns
  628. Error Correction Type Multi-Bit ECC
  629. System Cache Type Unified
  630. Associativity 4-way Set-Associative
  631. [Cache Information (Type 7) - Length 19 - Handle 0010h]
  632. Socket Designation L3 Cache
  633. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  634. Maximum Cache Size 1800h - 6144K
  635. Installed Size 1800h - 6144K
  636. Supported SRAM Type 0020h - Synchronous
  637. Current SRAM Type 0020h - Synchronous
  638. Cache Speed 0ns
  639. Error Correction Type Specification Reserved
  640. System Cache Type Unified
  641. Associativity Specification Reserved
  642. [Processor Information (Type 4) - Length 48 - Handle 0011h]
  643. Socket Designation CPUSocket
  644. Processor Type Central Processor
  645. Processor Family cdh - Specification Reserved
  646. Processor Manufacturer Intel(R) Corporation
  647. Processor ID e3060500fffbebbf
  648. Processor Version Intel(R) Core(TM) i5-6600K CPU @ 3.50GHz
  649. Processor Voltage 8bh - 1.1V
  650. External Clock 100MHz
  651. Max Speed 5000MHz
  652. Current Speed 3500MHz
  653. Status Enabled Populated
  654. Processor Upgrade Other
  655. L1 Cache Handle 000eh
  656. L2 Cache Handle 000fh
  657. L3 Cache Handle 0010h
  658. [Physical Memory Array (Type 16) - Length 23 - Handle 0012h]
  659. Location 03h - SystemBoard/Motherboard
  660. Use 03h - System Memory
  661. Memory Error Correction 03h - None
  662. Maximum Capacity 67108864KB
  663. Number of Memory Devices 4
  664. [Memory Device (Type 17) - Length 40 - Handle 0013h]
  665. Physical Memory Array Handle 0012h
  666. Total Width 0 bits
  667. Data Width 0 bits
  668. Form Factor 09h - DIMM
  669. Device Locator ChannelA-DIMM0
  670. Bank Locator BANK 0
  671. Memory Type 02h - Unknown
  672. Type Detail 0000h -
  673. Speed 0MHz
  674. [Memory Device (Type 17) - Length 40 - Handle 0014h]
  675. Physical Memory Array Handle 0012h
  676. Total Width 64 bits
  677. Data Width 64 bits
  678. Size 8192MB
  679. Form Factor 09h - DIMM
  680. Device Locator ChannelA-DIMM1
  681. Bank Locator BANK 1
  682. Memory Type 1ah - Specification Reserved
  683. Type Detail 0080h - Synchronous
  684. Speed 3000MHz
  685. Manufacturer Kingston
  686. Part Number KHX3000C15D4/8GX
  687. [Memory Device (Type 17) - Length 40 - Handle 0015h]
  688. Physical Memory Array Handle 0012h
  689. Total Width 0 bits
  690. Data Width 0 bits
  691. Form Factor 09h - DIMM
  692. Device Locator ChannelB-DIMM0
  693. Bank Locator BANK 2
  694. Memory Type 02h - Unknown
  695. Type Detail 0000h -
  696. Speed 0MHz
  697. [Memory Device (Type 17) - Length 40 - Handle 0016h]
  698. Physical Memory Array Handle 0012h
  699. Total Width 64 bits
  700. Data Width 64 bits
  701. Size 8192MB
  702. Form Factor 09h - DIMM
  703. Device Locator ChannelB-DIMM1
  704. Bank Locator BANK 3
  705. Memory Type 1ah - Specification Reserved
  706. Type Detail 0080h - Synchronous
  707. Speed 3000MHz
  708. Manufacturer Kingston
  709. Part Number KHX3000C15D4/8GX
  710. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0017h]
  711. Starting Address 00000000h
  712. Ending Address 00ffffffh
  713. Memory Array Handle 0012h
  714. Partition Width 02
  715. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0018h]
  716. Starting Address 00000000h
  717. Ending Address 007fffffh
  718. Memory Device Handle 0014h
  719. Mem Array Mapped Adr Handle 0017h
  720. Partition Row Position 01
  721. Interleave Position 01
  722. Interleave Data Depth 02
  723. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0019h]
  724. Starting Address 00800000h
  725. Ending Address 00ffffffh
  726. Memory Device Handle 0016h
  727. Mem Array Mapped Adr Handle 0017h
  728. Partition Row Position 01
  729. Interleave Position 02
  730. Interleave Data Depth 02
  731.  
  732. ========================== Dump #1: Extra #1 ===========================
  733.  
  734. 0: kd> !verifier
  735. Verify Flags Level 0x00000000
  736. STANDARD FLAGS:
  737. [X] (0x00000000) Automatic Checks
  738. [ ] (0x00000001) Special pool
  739. [ ] (0x00000002) Force IRQL checking
  740. [ ] (0x00000008) Pool tracking
  741. [ ] (0x00000010) I/O verification
  742. [ ] (0x00000020) Deadlock detection
  743. [ ] (0x00000080) DMA checking
  744. [ ] (0x00000100) Security checks
  745. [ ] (0x00000800) Miscellaneous checks
  746. [ ] (0x00020000) DDI compliance checking
  747. ADDITIONAL FLAGS:
  748. [ ] (0x00000004) Randomized low resources simulation
  749. [ ] (0x00000200) Force pending I/O requests
  750. [ ] (0x00000400) IRP logging
  751. [ ] (0x00002000) Invariant MDL checking for stack
  752. [ ] (0x00004000) Invariant MDL checking for driver
  753. [ ] (0x00008000) Power framework delay fuzzing
  754. [ ] (0x00010000) Port/miniport interface checking
  755. [ ] (0x00040000) Systematic low resources simulation
  756. [ ] (0x00080000) DDI compliance checking (additional)
  757. [ ] (0x00200000) NDIS/WIFI verification
  758. [ ] (0x00800000) Kernel synchronization delay fuzzing
  759. [ ] (0x01000000) VM switch verification
  760. [ ] (0x02000000) Code integrity checks
  761. [X] Indicates flag is enabled
  762. Summary of All Verifier Statistics
  763. RaiseIrqls 0x0
  764. AcquireSpinLocks 0x0
  765. Synch Executions 0x0
  766. Trims 0x0
  767. Pool Allocations Attempted 0x0
  768. Pool Allocations Succeeded 0x0
  769. Pool Allocations Succeeded SpecialPool 0x0
  770. Pool Allocations With NO TAG 0x0
  771. Pool Allocations Failed 0x0
  772. Current paged pool allocations 0x0 for 00000000 bytes
  773. Peak paged pool allocations 0x0 for 00000000 bytes
  774. Current nonpaged pool allocations 0x0 for 00000000 bytes
  775. Peak nonpaged pool allocations 0x0 for 00000000 bytes
  776.  
  777. ========================== Dump #1: Extra #2 ===========================
  778.  
  779. 0: kd> !thread
  780. THREAD fffff8011bd91400 Cid 0000.0000 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
  781. Not impersonating
  782. GetUlongFromAddress: unable to read from fffff8011bc2ca14
  783. Owning Process fffff8011bd8e9c0 Image: System Process
  784. Attached Process ffffd306e9a6b300 Image: System
  785. fffff78000000000: Unable to get shared data
  786. Wait Start TickCount 3638396
  787. Context Switch Count 26744715 IdealProcessor: 0
  788. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  789. UserTime 00:00:00.000
  790. KernelTime 00:00:00.000
  791. Win32 Start Address nt!KiIdleLoop (0xfffff8011b9c5e50)
  792. Stack Init fffff80122d38b90 Current fffff80122d38b20
  793. Base fffff80122d39000 Limit fffff80122d32000 Call 0000000000000000
  794. Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 5
  795. Child-SP RetAddr : Args to Child : Call Site
  796. fffff801`22d38408 fffff801`1b9d41e9 : 00000000`0000000a fffff801`22c986d8 00000000`000000ff 00000000`000000d3 : nt!KeBugCheckEx
  797. fffff801`22d38410 fffff801`1b9d0529 : 00000000`0000000f 00000000`00000000 00000000`00000000 fffff801`27cea5d7 : nt!KiBugCheckDispatch+0x69
  798. fffff801`22d38550 fffff801`1b84adc3 : 00000000`00000089 00000000`00989680 fffff801`1a2cd180 00000000`00000000 : nt!KiPageFault+0x469 (TrapFrame @ fffff801`22d38550)
  799. fffff801`22d386e0 fffff801`1b84a36e : 00000000`00000003 00000000`00000002 ffffd306`efae10f0 00000000`00000008 : nt!PpmIdleExecuteTransition+0x8b3
  800. fffff801`22d38a00 fffff801`1b9c5e94 : 00000000`00000000 fffff801`1a2cd180 ffffd306`f810b080 00000000`00000332 : nt!PoIdle+0x36e
  801. fffff801`22d38b60 00000000`00000000 : fffff801`22d39000 fffff801`22d32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44
Add Comment
Please, Sign In to add comment