Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer
- Version: 0.9
- Time to analyze file(s): 00 hours and 02 minutes and 07 seconds
- ================================= BIOS =================================
- VENDOR: American Megatrends Inc.
- VERSION: 1301
- DATE: 03/14/2018
- ============================= MOTHERBOARD ==============================
- MANUFACTURER: ASUSTeK COMPUTER INC.
- PRODUCT: STRIX Z270H GAMING
- VERSION: Rev 1.xx
- ================================= RAM ==================================
- Size Speed Manufacturer Part No.
- -------------- -------------- ------------------- ----------------------
- 0MHz
- 16384MB 2400MHz Corsair CMK32GX4M2A2400C14
- 0MHz
- 16384MB 2400MHz Corsair CMK32GX4M2A2400C14
- ================================= CPU ==================================
- Processor Version: Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
- COUNT: 8
- MHZ: 4200
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: 9e
- STEPPING: 9
- MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 8E'00000000 (cache) 8E'00000000 (init)
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 17763.1.amd64fre.rs5_release.180914-1434
- BUILD_VERSION: 10.0.17763.864 (WinBuild.160101.0800)
- BUILD: 17763
- SERVICEPACK: 864
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- BUILD_TIMESTAMP: unknown_date
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.17763.864
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Information gathered from different dump files may be different. If
- Windows updates between two dump files, two or more OS versions may
- be shown above.
- * If the user updates the BIOS between dump files, two or more versions
- and dates may be shown above.
- * More RAM information can be found below in the full BIOS section.
- ========================================================================
- ==================== Dump File: 121219-11765-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 17763 MP (8 procs) Free x64
- Kernel base = 0xfffff805`0440b000 PsLoadedModuleList = 0xfffff805`04824710
- Debug session time: Thu Dec 12 07:19:02.679 2019 (UTC - 5:00)
- System Uptime: 0 days 0:00:18.432
- BugCheck C000021A, {ffff808a7d5fb9a0, ffffffffc0000428, 0, 24680010000}
- errfg" bg="errbg">ETW minidump data unavailable
- Probably caused by : memory_corruption
- Followup: memory_corruption
- WINLOGON_FATAL_ERROR (c000021a)
- The Winlogon process terminated unexpectedly.
- Arguments:
- Arg1: ffff808a7d5fb9a0, String that identifies the problem.
- Arg2: ffffffffc0000428, Error Code.
- Arg3: 0000000000000000
- Arg4: 0000024680010000
- Debugging Details:
- ETW minidump data unavailable
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- ERROR_CODE: (NTSTATUS) 0xc000021a - {Fatal System Error} The %hs system process terminated unexpectedly with a status of 0x%08x (0x%08x 0x%08x). The system has been shut down.
- EXCEPTION_CODE: (NTSTATUS) 0xc000021a - {Fatal System Error} The %hs system process terminated unexpectedly with a status of 0x%08x (0x%08x 0x%08x). The system has been shut down.
- EXCEPTION_CODE_STR: c000021a
- EXCEPTION_PARAMETER1: ffff808a7d5fb9a0
- EXCEPTION_PARAMETER2: ffffffffc0000428
- EXCEPTION_PARAMETER3: 0000000000000000
- EXCEPTION_PARAMETER4: 24680010000
- DUMP_TYPE: 2
- PROCESS_NAME: smss.exe
- ADDITIONAL_DEBUG_TEXT: initial session process or
- BUGCHECK_STR: 0xc000021a_SmpDestroyControlBlock_smss.exe_Terminated_c0000428
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff80504986bca to fffff805045c19c0
- STACK_TEXT:
- fffffb84`ebff2488 fffff805`04986bca : 00000000`0000004c 00000000`c000021a fffffb84`ec6472f0 ffffc00f`a359f3d0 : nt!KeBugCheckEx
- fffffb84`ebff2490 fffff805`04971ee2 : fffffb84`ebff25b0 fffffb84`ebff2550 ffffffff`800007dc fffffb84`ebff25b0 : nt!PopGracefulShutdown+0x29a
- fffffb84`ebff24d0 fffff805`04977e2c : 00000000`00000701 fffff805`00000006 00000000`00000004 00000000`00000000 : nt!PopTransitionSystemPowerStateEx+0x116e
- fffffb84`ebff2590 fffff805`045d2c05 : 00000000`00000000 fffff805`044bc5db 00000000`00000010 00000000`00000082 : nt!NtSetSystemPowerState+0x4c
- fffffb84`ebff2770 fffff805`045c56d0 : fffff805`04b6e69b 00000000`00000006 00000000`c0000004 ffffd981`b3ab9180 : nt!KiSystemServiceCopyEnd+0x25
- fffffb84`ebff2908 fffff805`04b6e69b : 00000000`00000006 00000000`c0000004 ffffd981`b3ab9180 00000000`00000000 : nt!KiServiceLinkage
- fffffb84`ebff2910 fffff805`04ad3249 : ffffc00f`9bd60080 fffff805`044f6cc9 fffff805`19f0e000 fffff805`00000000 : nt!PopIssueActionRequest+0x9b33b
- fffffb84`ebff29d0 fffff805`0446176f : 00000000`00000001 00000000`00000002 00000000`00000000 ffffc00f`9bd5aa00 : nt!PopPolicyWorkerAction+0x69
- fffffb84`ebff2a40 fffff805`044f620a : ffffc00f`00000001 ffffc00f`9bd60080 fffff805`044616e0 fffff805`04822080 : nt!PopPolicyWorkerThread+0x8f
- fffffb84`ebff2a70 fffff805`044639d5 : ffffc00f`9bd60080 ffffc00f`9bc9c300 ffffc00f`9bd60080 5b5d5e5f`5c415d41 : nt!ExpWorkerThread+0x16a
- fffffb84`ebff2b10 fffff805`045c8e3c : ffffd981`b3780180 ffffc00f`9bd60080 fffff805`04463980 ffd5f7e8`cb8b4800 : nt!PspSystemThreadStartup+0x55
- fffffb84`ebff2b60 00000000`00000000 : fffffb84`ebff3000 fffffb84`ebfec000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8050448ff29-fffff8050448ff2a 2 bytes - nt!MmUnlockPages+e9
- [ 80 fa:00 d2 ]
- fffff8050449d003-fffff8050449d004 2 bytes - nt!MiLockPageTablePage+53 (+0xd0da)
- [ 80 fa:00 d2 ]
- fffff8050457f222-fffff8050457f223 2 bytes - nt!PpmResetPerformanceAccumulation+32 (+0xe221f)
- [ 48 ff:4c 8b ]
- fffff8050457f229-fffff8050457f22c 4 bytes - nt!PpmResetPerformanceAccumulation+39 (+0x07)
- [ 0f 1f 44 00:e8 a2 c3 8f ]
- fffff80504977f11-fffff80504977f15 5 bytes - nt!MiUpdateUserMappings+9
- [ d0 be 7d fb f6:b0 7e fd fa f5 ]
- fffff80504a611c8-fffff80504a611c9 2 bytes - nt!PfpPfnPrioRequest+a8
- [ 80 fa:00 d2 ]
- 17 errors : !nt (fffff8050448ff29-fffff80504a611c9)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2019-12-12T12:19:02.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- ===================== 3RD PARTY DRIVER QUICK LIST ======================
- ========================================================================
- Aug 02 2010 - AsUpIO.sys - ASUS Update Input Output driver http://www.asus.com/
- Oct 17 2011 - PxHlpa64.sys - Sonic CD/DVD driver
- May 30 2012 - FNETURPX.SYS - FNet User Proxy driver (FNet Co., Ltd.) http://www.gotofnet.com/
- Aug 22 2012 - AsIO.sys - ASUS Input Output driver http://www.asus.com/
- Sep 24 2015 - dtlitescsibus.sys - DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
- Dec 28 2015 - dtliteusbbus.sys - DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
- Jun 13 2016 - LGBusEnum.sys - Logitech GamePanel Virtual Bus Enumerator driver http://support.logitech.com/
- Jun 13 2016 - LGJoyXlCore.sys - Logitech Gaming Software driver http://support.logitech.com/
- Jul 15 2016 - FNETHYRAMAS.SYS - Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
- Sep 17 2016 - netfilter2.sys - NetFilter SDK TDI Hook driver (WPP) http://netfiltersdk.com/
- Sep 25 2017 - e1d65x64.sys - Intel(R) Gigabit Adapter NDIS 6.x driver https://downloadcenter.intel.com/
- Oct 03 2017 - TeeDriverW8x64.sys - Intel Management Engine Interface driver https://downloadcenter.intel.com/
- Oct 12 2017 - iaStorA.sys - Intel SATA Storage Device RAID Controller
- Oct 17 2017 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
- Aug 16 2018 - nvvhci.sys - Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Oct 08 2018 - SYMEVENT64x86.SYS - Symantec Event Library https://www.symantec.com/
- Mar 14 2019 - nvvad64v.sys - Nvidia Virtual Audio driver http://www.nvidia.com/
- Apr 11 2019 - CorsairVBusDriver.sys - Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Apr 11 2019 - CorsairVHidDriver.sys - Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Jun 21 2019 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
- Jun 28 2019 - Ironx64.SYS - Symantec Iron driver http://www.symantec.com/
- Jul 10 2019 - IDSvia64.sys - Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
- Aug 08 2019 - SYMEFASI64.SYS - Symantec Extended File Attributes (SI) https://www.symantec.com/
- Sep 11 2019 - eeCtrl64.sys - Symantec Eraser Control driver http://www.symantec.com/
- Sep 11 2019 - EraserUtilRebootDrv.sys - Symantec Eraser Utility Reboot driver http://www.symantec.com/
- Sep 24 2019 - ccSetx64.sys - Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Sep 26 2019 - BHDrvx64.sys - Norton Security BASH driver http://www.symantec.com/
- Oct 09 2019 - SRTSPX64.SYS - Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
- Dec 06 2019 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
- ========================================================================
- ========================== 3RD PARTY DRIVERS ===========================
- ========================================================================
- Image path: \SystemRoot\SysWow64\drivers\AsUpIO.sys
- Image name: AsUpIO.sys
- Search : https://www.google.com/search?q=AsUpIO.sys
- ADA Info : ASUS Update Input Output driver http://www.asus.com/
- Timestamp : Mon Aug 2 2010
- Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
- Image name: PxHlpa64.sys
- Search : https://www.google.com/search?q=PxHlpa64.sys
- ADA Info : Sonic CD/DVD driver
- Timestamp : Mon Oct 17 2011
- Image path: \SystemRoot\System32\drivers\FNETURPX.SYS
- Image name: FNETURPX.SYS
- Search : https://www.google.com/search?q=FNETURPX.SYS
- ADA Info : FNet User Proxy driver (FNet Co., Ltd.) http://www.gotofnet.com/
- Timestamp : Wed May 30 2012
- Image path: \SystemRoot\SysWow64\drivers\AsIO.sys
- Image name: AsIO.sys
- Search : https://www.google.com/search?q=AsIO.sys
- ADA Info : ASUS Input Output driver http://www.asus.com/
- Timestamp : Wed Aug 22 2012
- Image path: \SystemRoot\System32\drivers\dtlitescsibus.sys
- Image name: dtlitescsibus.sys
- Search : https://www.google.com/search?q=dtlitescsibus.sys
- ADA Info : DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
- Timestamp : Thu Sep 24 2015
- Image path: \SystemRoot\System32\drivers\dtliteusbbus.sys
- Image name: dtliteusbbus.sys
- Search : https://www.google.com/search?q=dtliteusbbus.sys
- ADA Info : DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
- Timestamp : Mon Dec 28 2015
- Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
- Image name: LGBusEnum.sys
- Search : https://www.google.com/search?q=LGBusEnum.sys
- ADA Info : Logitech GamePanel Virtual Bus Enumerator driver http://support.logitech.com/
- Timestamp : Mon Jun 13 2016
- Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
- Image name: LGJoyXlCore.sys
- Search : https://www.google.com/search?q=LGJoyXlCore.sys
- ADA Info : Logitech Gaming Software driver http://support.logitech.com/
- Timestamp : Mon Jun 13 2016
- Image path: \SystemRoot\System32\drivers\FNETHYRAMAS.SYS
- Image name: FNETHYRAMAS.SYS
- Search : https://www.google.com/search?q=FNETHYRAMAS.SYS
- ADA Info : Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
- Timestamp : Fri Jul 15 2016
- Image path: \SystemRoot\system32\drivers\netfilter2.sys
- Image name: netfilter2.sys
- Search : https://www.google.com/search?q=netfilter2.sys
- ADA Info : NetFilter SDK TDI Hook driver (WPP) http://netfiltersdk.com/
- Timestamp : Sat Sep 17 2016
- Image path: \SystemRoot\system32\DRIVERS\e1d65x64.sys
- Image name: e1d65x64.sys
- Search : https://www.google.com/search?q=e1d65x64.sys
- ADA Info : Intel(R) Gigabit Adapter NDIS 6.x driver https://downloadcenter.intel.com/
- Timestamp : Mon Sep 25 2017
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Search : https://www.google.com/search?q=TeeDriverW8x64.sys
- ADA Info : Intel Management Engine Interface driver https://downloadcenter.intel.com/
- Timestamp : Tue Oct 3 2017
- Image path: \SystemRoot\System32\drivers\iaStorA.sys
- Image name: iaStorA.sys
- Search : https://www.google.com/search?q=iaStorA.sys
- ADA Info : Intel SATA Storage Device RAID Controller
- Timestamp : Thu Oct 12 2017
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Search : https://www.google.com/search?q=RTKVHD64.sys
- ADA Info : Realtek Audio System driver https://www.realtek.com/en/
- Timestamp : Tue Oct 17 2017
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Search : https://www.google.com/search?q=nvvhci.sys
- ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Timestamp : Thu Aug 16 2018
- Image path: \??\C:\Windows\system32\Drivers\SYMEVENT64x86.SYS
- Image name: SYMEVENT64x86.SYS
- Search : https://www.google.com/search?q=SYMEVENT64x86.SYS
- ADA Info : Symantec Event Library https://www.symantec.com/
- Timestamp : Mon Oct 8 2018
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Search : https://www.google.com/search?q=nvvad64v.sys
- ADA Info : Nvidia Virtual Audio driver http://www.nvidia.com/
- Timestamp : Thu Mar 14 2019
- Image path: \SystemRoot\System32\drivers\CorsairVBusDriver.sys
- Image name: CorsairVBusDriver.sys
- Search : https://www.google.com/search?q=CorsairVBusDriver.sys
- ADA Info : Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Timestamp : Thu Apr 11 2019
- Image path: \SystemRoot\System32\drivers\CorsairVHidDriver.sys
- Image name: CorsairVHidDriver.sys
- Search : https://www.google.com/search?q=CorsairVHidDriver.sys
- ADA Info : Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
- Timestamp : Thu Apr 11 2019
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Search : https://www.google.com/search?q=nvhda64v.sys
- ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
- Timestamp : Fri Jun 21 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\Ironx64.SYS
- Image name: Ironx64.SYS
- Search : https://www.google.com/search?q=Ironx64.SYS
- ADA Info : Symantec Iron driver http://www.symantec.com/
- Timestamp : Fri Jun 28 2019
- Image path: \??\C:\Program Files\Norton Security\NortonData\22.18.0.213\Definitions\IPSDefs\20191211.061\IDSvia64.sys
- Image name: IDSvia64.sys
- Search : https://www.google.com/search?q=IDSvia64.sys
- ADA Info : Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
- Timestamp : Wed Jul 10 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\SYMEFASI64.SYS
- Image name: SYMEFASI64.SYS
- Search : https://www.google.com/search?q=SYMEFASI64.SYS
- ADA Info : Symantec Extended File Attributes (SI) https://www.symantec.com/
- Timestamp : Thu Aug 8 2019
- Image path: \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\eeCtrl64.sys
- Image name: eeCtrl64.sys
- Search : https://www.google.com/search?q=eeCtrl64.sys
- ADA Info : Symantec Eraser Control driver http://www.symantec.com/
- Timestamp : Wed Sep 11 2019
- Image path: \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys
- Image name: EraserUtilRebootDrv.sys
- Search : https://www.google.com/search?q=EraserUtilRebootDrv.sys
- ADA Info : Symantec Eraser Utility Reboot driver http://www.symantec.com/
- Timestamp : Wed Sep 11 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\ccSetx64.sys
- Image name: ccSetx64.sys
- Search : https://www.google.com/search?q=ccSetx64.sys
- ADA Info : Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Timestamp : Tue Sep 24 2019
- Image path: \??\C:\Program Files\Norton Security\NortonData\22.18.0.213\Definitions\BASHDefs\20191209.001\BHDrvx64.sys
- Image name: BHDrvx64.sys
- Search : https://www.google.com/search?q=BHDrvx64.sys
- ADA Info : Norton Security BASH driver http://www.symantec.com/
- Timestamp : Thu Sep 26 2019
- Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\SRTSPX64.SYS
- Image name: SRTSPX64.SYS
- Search : https://www.google.com/search?q=SRTSPX64.SYS
- ADA Info : Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
- Timestamp : Wed Oct 9 2019
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_77e6900053c33f6f\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Search : https://www.google.com/search?q=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Fri Dec 6 2019
- If any of the above drivers are from Microsoft then please let me know.
- I will have them moved to the Microsoft list on the next update.
- ========================================================================
- ========================== MICROSOFT DRIVERS ===========================
- ========================================================================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- afunix.sys AF_UNIX Socket Provider driver (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- bam.sys BAM Kernal driver (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- crashdmp.sys Crash Dump driver (Microsoft)
- csc.sys Windows Client Side Caching driver (Microsoft)
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_iaStorA.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- fastfat.SYS Fast FAT File System Driver (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HIDCLASS.SYS Hid Class Library (Microsoft)
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kd.dll Local Kernal Debugger (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- Ntfs.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator (Microsoft)
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- serenum.sys Serial Port Enumerator (Microsoft)
- serial.sys Serial Device Driver
- SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- ucx01000.sys USB Controller Extension (Microsoft)
- UEFI.sys UEFI NT driver (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- UsbHub3.sys USB3 HUB driver (Microsoft)
- USBXHCI.SYS USB XHCI driver (Microsoft)
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- Unloaded modules:
- fffff805`1c540000 fffff805`1c550000 dump_storpor
- fffff805`1c9c0000 fffff805`1d511000 dump_iaStorA
- fffff805`1d540000 fffff805`1d55e000 dump_dumpfve
- fffff805`1c240000 fffff805`1c25c000 dam.sys
- fffff805`19b30000 fffff805`19b39000 MbamElam.sys
- fffff805`19b20000 fffff805`19b2b000 SymELAM.sys
- fffff805`05e10000 fffff805`05e20000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO ===============================
- ========================================================================
- [SMBIOS Data Tables v3.0]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 4242 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 1301
- BIOS Starting Address Segment f000
- BIOS Release Date 03/14/2018
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 10: - APM Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 12
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer System manufacturer
- Product Name System Product Name
- Version System Version
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber SKU
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASUSTeK COMPUTER INC.
- Product STRIX Z270H GAMING
- Version Rev 1.xx
- Feature Flags 09h
- 1001043680: - 1001043728: - w8Ùgþ
- Location Default string
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer Default string
- Chassis Type Desktop
- Version Default string
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [Onboard Devices Information (Type 10) - Length 6 - Handle 0025h]
- Number of Devices 1
- 01: Type Video [enabled]
- [OEM Strings (Type 11) - Length 5 - Handle 0026h]
- Number of Strings 4
- 1 Default string
- 2 Default string
- 3 Socrates
- 4 Default string
- [System Configuration Options (Type 12) - Length 5 - Handle 0027h]
- [Physical Memory Array (Type 16) - Length 23 - Handle 0042h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0043h]
- Physical Memory Array Handle 0042h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 0
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0044h]
- Physical Memory Array Handle 0042h
- Total Width 64 bits
- Data Width 64 bits
- Size 16384MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM2
- Bank Locator BANK 1
- Memory Type 1ah - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 2400MHz
- Manufacturer Corsair
- Part Number CMK32GX4M2A2400C14
- [Memory Device (Type 17) - Length 40 - Handle 0045h]
- Physical Memory Array Handle 0042h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 2
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0046h]
- Physical Memory Array Handle 0042h
- Total Width 64 bits
- Data Width 64 bits
- Size 16384MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM2
- Bank Locator BANK 3
- Memory Type 1ah - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 2400MHz
- Manufacturer Corsair
- Part Number CMK32GX4M2A2400C14
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0047h]
- Starting Address 00000000h
- Ending Address 01ffffffh
- Memory Array Handle 0042h
- Partition Width 02
- [Cache Information (Type 7) - Length 19 - Handle 0048h]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0049h]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 004ah]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Processor Information (Type 4) - Length 48 - Handle 004bh]
- Socket Designation LGA1151
- Processor Type Central Processor
- Processor Family c6h - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID e9060900fffbebbf
- Processor Version Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
- Processor Voltage 8bh - 1.1V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 4200MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0048h
- L2 Cache Handle 0049h
- L3 Cache Handle 004ah
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ch]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Device Handle 0044h
- Mem Array Mapped Adr Handle 0047h
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004dh]
- Starting Address 01000000h
- Ending Address 01ffffffh
- Memory Device Handle 0046h
- Mem Array Mapped Adr Handle 0047h
- Interleave Position 02
- Interleave Data Depth 02
- ========================================================================
- ============================== IMAGE SCAN ==============================
- ========================================================================
- MZ at 00007ff7`a15c0000, prot 00000004, type 00020000
- MZ at fffff805`0440b000, prot 00000040, type 01000000 - size a6e000
- Name: ntoskrnl.exe
- MZ at fffff805`04e7a000, prot 00000040, type 01000000 - size 9d000
- Name: HAL.dll
- MZ at fffff805`05000000, prot 00000040, type 01000000 - size b000
- Name: KD.dll
- MZ at fffff805`05200000, prot 00000040, type 01000000 - size 11000
- Name: WerLiveKernelApi.dll
- MZ at fffff805`0523e000, prot 00000040, type 01000000 - size 62000
- Name: msrpc.sys
- MZ at fffff805`052a1000, prot 00000040, type 01000000 - size 27000
- Name: ntostmhost.dll
- MZ at fffff805`052c9000, prot 00000040, type 01000000 - size 6a000
- Name: CLFS.SYS
- MZ at fffff805`05334000, prot 00000040, type 01000000 - size 18000
- Name: PSHED.dll
- MZ at fffff805`0534d000, prot 00000040, type 01000000 - size b000
- Name: BOOTVID.dll
- MZ at fffff805`05359000, prot 00000040, type 01000000 - size 10b000
- Name: clipsp.sys
- MZ at fffff805`054d6000, prot 00000040, type 01000000 - size e000
- Name: cmimcext.dll
- MZ at fffff805`054e5000, prot 00000040, type 01000000 - size c000
- Name: ntosext.dll
- MZ at fffff805`054f2000, prot 00000040, type 01000000 - size d4000
- Name: CI.dll
- MZ at fffff805`055c7000, prot 00000040, type 01000000 - size b8000
- Name: cng.sys
- MZ at fffff805`05df0000, prot 00000040, type 01000000 - size 11000
- Name: iorate.exe
- MZ at fffff805`05e20000, prot 00000040, type 01000000 - size 78000
- Name: fwpkclnt.sys
- MZ at fffff805`05ea0000, prot 00000040, type 01000000 - size 30000
- Name: wfplwfs.exe
- MZ at fffff805`05ee0000, prot 00000040, type 01000000 - size c8000
- Name: fvevol.exe
- MZ at fffff805`05fb0000, prot 00000040, type 01000000 - size b000
- Name: volume.exe
- MZ at fffff805`05fc0000, prot 00000040, type 01000000 - size 25000
- Name: MUP.SYS
- MZ at fffff805`19800000, prot 00000040, type 01000000 - size 70000
- Name: FLTMGR.SYS
- MZ at fffff805`19880000, prot 00000040, type 01000000 - size d1000
- Name: Wdf01000.exe
- MZ at fffff805`19960000, prot 00000040, type 01000000 - size 13000
- Name: WDFLDR.SYS
- MZ at fffff805`19980000, prot 00000040, type 01000000 - size 10000
- Name: WppRecorder.sys
- MZ at fffff805`199a0000, prot 00000040, type 01000000 - size f000
- Name: SleepStudyHelper.sys
- MZ at fffff805`199b0000, prot 00000040, type 01000000 - size 24000
- Name: acpiex.exe
- MZ at fffff805`199e0000, prot 00000040, type 01000000 - size 3f000
- Name: mssecflt.exe
- MZ at fffff805`19a20000, prot 00000040, type 01000000 - size 1a000
- Name: SgrmAgent.exe
- MZ at fffff805`19a40000, prot 00000040, type 01000000 - size c8000
- Name: ACPI.SYS
- MZ at fffff805`19b10000, prot 00000040, type 01000000 - size c000
- Name: WMILIB.SYS
- MZ at fffff805`19b40000, prot 00000040, type 01000000 - size 43000
- Name: intelpep.exe
- MZ at fffff805`19b90000, prot 00000040, type 01000000 - size 16000
- Name: WindowsTrustedRT.exe
- MZ at fffff805`19bb0000, prot 00000040, type 01000000 - size b000
- Name: WindowsTrustedRTProxy.exe
- MZ at fffff805`19bc0000, prot 00000040, type 01000000 - size 14000
- Name: pcw.exe
- MZ at fffff805`19c00000, prot 00000040, type 01000000 - size b000
- Name: msisadrv.exe
- MZ at fffff805`19c10000, prot 00000040, type 01000000 - size 6b000
- Name: pci.exe
- MZ at fffff805`19c80000, prot 00000040, type 01000000 - size 12000
- Name: vdrvroot.exe
- MZ at fffff805`19ca0000, prot 00000040, type 01000000 - size 2e000
- Name: PDC.exe
- MZ at fffff805`19cd0000, prot 00000040, type 01000000 - size 19000
- Name: CEA.sys
- MZ at fffff805`19cf0000, prot 00000040, type 01000000 - size 2f000
- Name: partmgr.exe
- MZ at fffff805`19d20000, prot 00000040, type 01000000 - size a8000
- Name: spaceport.exe
- MZ at fffff805`19dd0000, prot 00000040, type 01000000 - size 19000
- Name: volmgr.exe
- MZ at fffff805`19e60000, prot 00000040, type 01000000 - size 1f000
- Name: mountmgr.exe
- MZ at fffff805`19e80000, prot 00000040, type 01000000 - size 28d000
- Name: ntfs.exe
- MZ at fffff805`1a110000, prot 00000040, type 01000000 - size 153000
- Name: NDIS.SYS
- MZ at fffff805`1a270000, prot 00000040, type 01000000 - size 2d9000
- Name: TCPIP.SYS
- MZ at fffff805`1a550000, prot 00000040, type 01000000 - size 4f000
- Name: rdyboost.exe
- MZ at fffff805`1a5a0000, prot 00000040, type 01000000 - size 1c000
- Name: disk.exe
- MZ at fffff805`1a5c0000, prot 00000040, type 01000000 - size 1f3000
- Name: mcupdate_GenuineIntel.exe
- MZ at fffff805`1a7c0000, prot 00000040, type 01000000 - size 2b000
- Name: ksecdd.sys
- MZ at fffff805`1a800000, prot 00000040, type 01000000 - size 9b000
- Name: storport.sys
- MZ at fffff805`1a8a0000, prot 00000040, type 01000000 - size 1c000
- Name: EhStorClass.exe
- MZ at fffff805`1a8c0000, prot 00000040, type 01000000 - size 1a000
- Name: fileinfo.exe
- MZ at fffff805`1a8e0000, prot 00000040, type 01000000 - size 3e000
- Name: wof.exe
- MZ at fffff805`1a930000, prot 00000040, type 01000000 - size d000
- Name: fs_rec.exe
- MZ at fffff805`1a940000, prot 00000040, type 01000000 - size 95000
- Name: NETIO.SYS
- MZ at fffff805`1a9e0000, prot 00000040, type 01000000 - size 32000
- Name: ksecpkg.exe
- MZ at fffff805`1b590000, prot 00000040, type 01000000 - size 6d000
- Name: volsnap.exe
- MZ at fffff805`1c210000, prot 00000040, type 01000000 - size 2c000
- Name: dfsc.exe
- MZ at fffff805`1c260000, prot 00000040, type 01000000 - size 6b000
- Name: fastfat.exe
- MZ at fffff805`1c480000, prot 00000040, type 01000000 - size 6f000
- Name: CLASSPNP.SYS
- MZ at fffff805`1c510000, prot 00000040, type 01000000 - size 1c000
- Name: CRASHDMP.SYS
- MZ at fffff805`1c680000, prot 00000040, type 01000000 - size a000
- Name: null.exe
- MZ at fffff805`1c690000, prot 00000040, type 01000000 - size a000
- Name: beep.exe
- MZ at fffff805`1c6b0000, prot 00000040, type 01000000 - size 7a000
- Name: rdbss.sys
- MZ at fffff805`1c730000, prot 00000040, type 01000000 - size 94000
- Name: csc.exe
- MZ at fffff805`1c7f0000, prot 00000040, type 01000000 - size 12000
- Name: nsiproxy.exe
- MZ at fffff805`1c810000, prot 00000040, type 01000000 - size 10000
- Name: mssmbios.exe
- MZ at fffff805`1c9a0000, prot 00000040, type 01000000 - size a000
- Name: gpuenergydrv.exe
- MZ at fffff805`1d560000, prot 00000040, type 01000000 - size 2e000
- Name: cdrom.exe
- MZ at fffff805`1d5d0000, prot 00000040, type 01000000 - size 15000
- Name: filecrypt.exe
- MZ at fffff805`1d5f0000, prot 00000040, type 01000000 - size e000
- Name: tbs.sys
- MZ at fffff805`1d600000, prot 00000040, type 01000000 - size 16000
- Name: watchdog.sys
- MZ at fffff805`1d620000, prot 00000040, type 01000000 - size 16000
- Name: BasicDisplay.exe
- MZ at fffff805`1d640000, prot 00000040, type 01000000 - size 11000
- Name: BasicRender.exe
- MZ at fffff805`1d660000, prot 00000040, type 01000000 - size 1c000
- Name: npfs.exe
- MZ at fffff805`1d680000, prot 00000040, type 01000000 - size 11000
- Name: msfs.exe
- MZ at fffff805`1d6a0000, prot 00000040, type 01000000 - size 27000
- Name: tdx.exe
- MZ at fffff805`1d6d0000, prot 00000040, type 01000000 - size 10000
- Name: TDI.SYS
- MZ at fffff805`1d710000, prot 00000040, type 01000000 - size 51000
- Name: netbt.exe
- MZ at fffff805`1d770000, prot 00000040, type 01000000 - size 13000
- Name: afunix.dll
- MZ at fffff805`1d790000, prot 00000040, type 01000000 - size a6000
- Name: afd.exe
- MZ at fffff805`1d840000, prot 00000040, type 01000000 - size 1a000
- Name: vwififlt.SYS
- MZ at fffff805`1d860000, prot 00000040, type 01000000 - size 2b000
- Name: pacer.exe
- MZ at fffff805`1d890000, prot 00000040, type 01000000 - size 14000
- Name: netbios.exe
- MZ at fffff805`1d8b0000, prot 00000040, type 01000000 - size d000
- Name: NpSvcTrig.exe
- MZ at fffff805`1d8c0000, prot 00000040, type 01000000 - size 33b000
- Name: dxgkrnl.sys
- MZ at fffff805`1dc00000, prot 00000040, type 01000000 - size 84000
- Name: Vid.exe
- MZ at fffff805`1dc90000, prot 00000040, type 01000000 - size 1e000
- Name: winhvr.sys
- MZ at fffff805`1dcb0000, prot 00000040, type 01000000 - size 11000
- Name: CompositeBus.exe
- MZ at fffff805`1dcd0000, prot 00000040, type 01000000 - size d000
- Name: kdnic.sys
- MZ at fffff805`1dce0000, prot 00000040, type 01000000 - size 15000
- Name: UmBus.exe
- MZ at fffff805`1dd00000, prot 00000040, type 01000000 - size 3e000
- Name: intelppm.exe
- MZ at fffff805`1dd70000, prot 00000040, type 01000000 - size d000
- Name: NdisVirtualBus.exe
- MZ at fffff805`1dd80000, prot 00000040, type 01000000 - size c000
- Name: swenum.exe
- MZ at fffff805`1ddd0000, prot 00000040, type 01000000 - size e000
- Name: rdpbus.exe
- MZ at fffff805`1ddf0000, prot 00000040, type 01000000 - size 3b000
- Name: HIDCLASS.SYS
- MZ at fffff805`1de30000, prot 00000040, type 01000000 - size 13000
- Name: HIDPARSE.SYS
- MZ at fffff805`1de90000, prot 00000040, type 01000000 - size 93000
- Name: usbhub3.sys
- MZ at fffff805`1df30000, prot 00000040, type 01000000 - size e000
- Name: USBD.SYS
- MZ at fffff805`1df40000, prot 00000040, type 01000000 - size 11000
- Name: kbdhid.exe
- MZ at fffff805`1df60000, prot 00000040, type 01000000 - size 13000
- Name: kbdclass.exe
- MZ at fffff805`1e160000, prot 00000040, type 01000000 - size 14000
- Name: bam.exe
- MZ at fffff805`1e1a0000, prot 00000040, type 01000000 - size 4e000
- Name: ahcache.exe
- MZ at fffff805`1e800000, prot 00000040, type 01000000 - size 31000
- Name: usbccgp.exe
- MZ at fffff805`1e840000, prot 00000040, type 01000000 - size 12000
- Name: hidusb.exe
- MZ at fffff805`1e860000, prot 00000040, type 01000000 - size f000
- Name: mouhid.exe
- MZ at fffff805`1e870000, prot 00000040, type 01000000 - size 13000
- Name: mouclass.exe
- MZ at fffff805`1e8a0000, prot 00000040, type 01000000 - size f000
- Name: SYS.exe
- MZ at fffff805`1e8d0000, prot 00000004, type 00020000 - size 1d000
- Name: DUMPFVE.SYS
- MZ at fffff805`1fa00000, prot 00000040, type 01000000 - size 65000
- Name: portcls.sys
- MZ at fffff805`1faa0000, prot 00000040, type 01000000 - size 75000
- Name: ks.sys
- MZ at fffff805`1fb20000, prot 00000040, type 01000000 - size 78000
- Name: usbxhci.exe
- MZ at fffff805`1fba0000, prot 00000040, type 01000000 - size 3f000
- Name: ucx01000.exe
- MZ at fffff805`1fc20000, prot 00000040, type 01000000 - size 1c000
- Name: serial.exe
- MZ at fffff805`1fc40000, prot 00000040, type 01000000 - size f000
- Name: SerEnum.exe
- MZ at fffff805`1fce0000, prot 00000040, type 01000000 - size c000
- Name: wmiacpi.exe
- MZ at fffff805`1fcf0000, prot 00000040, type 01000000 - size b000
- Name: acpipagr.exe
- MZ at fffff805`1fd00000, prot 00000040, type 01000000 - size e000
- Name: UEFI.SYS
- MZ at fffff805`213b0000, prot 00000040, type 01000000 - size 1f000
- Name: hdaudbus.exe
- MZ at fffff805`213f0000, prot 00000040, type 01000000 - size f000
- Name: ksthunk.exe
- ========================================================================
- ==================== Dump File: 112919-14390-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 17763 MP (8 procs) Free x64
- Kernel base = 0xfffff805`126b2000 PsLoadedModuleList = 0xfffff805`12acb710
- Debug session time: Fri Nov 29 14:43:02.508 2019 (UTC - 5:00)
- System Uptime: 3 days 21:51:54.991
- BugCheck EF, {ffff8c8530dd9080, 0, 0, 0}
- errfg" bg="errbg">ETW minidump data unavailable
- Probably caused by : memory_corruption
- Followup: memory_corruption
- CRITICAL_PROCESS_DIED (ef)
- A critical system process died
- Arguments:
- Arg1: ffff8c8530dd9080, Process object or thread object
- Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
- Arg3: 0000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- ETW minidump data unavailable
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- PROCESS_NAME: svchost.exe
- CRITICAL_PROCESS: svchost.exe
- EXCEPTION_CODE: (NTSTATUS) 0x507a7680 - <Unable to get error code text>
- ERROR_CODE: (NTSTATUS) 0x507a7680 - <Unable to get error code text>
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0xEF
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff80512f3ceed to fffff805128689c0
- STACK_TEXT:
- ffff8382`016a7838 fffff805`12f3ceed : 00000000`000000ef ffff8c85`30dd9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- ffff8382`016a7840 fffff805`12e4e891 : 00000000`00000000 fffff805`1270c049 ffff8c85`30dd9080 fffff805`12704868 : nt!PspCatchCriticalBreak+0xfd
- ffff8382`016a78e0 fffff805`12cf062c : ffff8c85`00000000 00000000`00000000 ffff8c85`30dd9080 ffff8c85`30dd9358 : nt!PspTerminateAllThreads+0x15f3dd
- ffff8382`016a7950 fffff805`12cb1e39 : ffffffff`ffffffff ffff8382`016a7a80 ffff8c85`30dd9080 fffff805`12c44401 : nt!PspTerminateProcess+0xe0
- ffff8382`016a7990 fffff805`12879c05 : ffff8c85`00000c4c ffff8c85`507a7680 ffff8c85`30dd9080 0000006c`04a7f93c : nt!NtTerminateProcess+0xa9
- ffff8382`016a7a00 00007ff8`1f29fce4 : 00007ff8`1f310e4b 00007ff8`1f34112c 0000006c`04a7f900 0000006c`04a7aad9 : nt!KiSystemServiceCopyEnd+0x25
- 0000006c`04a7aa48 00007ff8`1f310e4b : 00007ff8`1f34112c 0000006c`04a7f900 0000006c`04a7aad9 00007ff8`1f2190e0 : 0x00007ff8`1f29fce4
- 0000006c`04a7aa50 00007ff8`1f34112c : 0000006c`04a7f900 0000006c`04a7aad9 00007ff8`1f2190e0 00000000`00000003 : 0x00007ff8`1f310e4b
- 0000006c`04a7aa58 0000006c`04a7f900 : 0000006c`04a7aad9 00007ff8`1f2190e0 00000000`00000003 00007ff8`1f2a788d : 0x00007ff8`1f34112c
- 0000006c`04a7aa60 0000006c`04a7aad9 : 00007ff8`1f2190e0 00000000`00000003 00007ff8`1f2a788d 00007ff8`1f34112c : 0x0000006c`04a7f900
- 0000006c`04a7aa68 00007ff8`1f2190e0 : 00000000`00000003 00007ff8`1f2a788d 00007ff8`1f34112c 00000000`00000006 : 0x0000006c`04a7aad9
- 0000006c`04a7aa70 00000000`00000003 : 00007ff8`1f2a788d 00007ff8`1f34112c 00000000`00000006 00000000`00000004 : 0x00007ff8`1f2190e0
- 0000006c`04a7aa78 00007ff8`1f2a788d : 00007ff8`1f34112c 00000000`00000006 00000000`00000004 00007ff8`0f553f30 : 0x3
- 0000006c`04a7aa80 00007ff8`1f34112c : 00000000`00000006 00000000`00000004 00007ff8`0f553f30 00000000`00000000 : 0x00007ff8`1f2a788d
- 0000006c`04a7aa88 00000000`00000006 : 00000000`00000004 00007ff8`0f553f30 00000000`00000000 00000000`00000000 : 0x00007ff8`1f34112c
- 0000006c`04a7aa90 00000000`00000004 : 00007ff8`0f553f30 00000000`00000000 00000000`00000000 00000000`00050348 : 0x6
- 0000006c`04a7aa98 00007ff8`0f553f30 : 00000000`00000000 00000000`00000000 00000000`00050348 00007ff8`1f28fd56 : 0x4
- 0000006c`04a7aaa0 00000000`00000000 : 00000000`00000000 00000000`00050348 00007ff8`1f28fd56 00000000`00000019 : 0x00007ff8`0f553f30
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80512826222-fffff80512826223 2 bytes - nt!PpmResetPerformanceAccumulation+32
- [ 48 ff:4c 8b ]
- fffff80512826229-fffff8051282622d 5 bytes - nt!PpmResetPerformanceAccumulation+39 (+0x07)
- [ 0f 1f 44 00 00:e8 a2 f3 de ff ]
- 7 errors : !nt (fffff80512826222-fffff8051282622d)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2019-11-29T19:43:02.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement