Advertisement
Guest User

Untitled

a guest
Dec 12th, 2019
631
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 50.22 KB | None | 0 0
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer
  3. Version: 0.9
  4. Time to analyze file(s): 00 hours and 02 minutes and 07 seconds
  5.  
  6. ================================= BIOS =================================
  7. VENDOR: American Megatrends Inc.
  8. VERSION: 1301
  9. DATE: 03/14/2018
  10.  
  11. ============================= MOTHERBOARD ==============================
  12. MANUFACTURER: ASUSTeK COMPUTER INC.
  13. PRODUCT: STRIX Z270H GAMING
  14. VERSION: Rev 1.xx
  15.  
  16. ================================= RAM ==================================
  17. Size Speed Manufacturer Part No.
  18. -------------- -------------- ------------------- ----------------------
  19. 0MHz
  20. 16384MB 2400MHz Corsair CMK32GX4M2A2400C14
  21. 0MHz
  22. 16384MB 2400MHz Corsair CMK32GX4M2A2400C14
  23.  
  24. ================================= CPU ==================================
  25. Processor Version: Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
  26. COUNT: 8
  27. MHZ: 4200
  28. VENDOR: GenuineIntel
  29. FAMILY: 6
  30. MODEL: 9e
  31. STEPPING: 9
  32. MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 8E'00000000 (cache) 8E'00000000 (init)
  33.  
  34. ================================== OS ==================================
  35. Product: WinNt, suite: TerminalServer SingleUserTS
  36. Built by: 17763.1.amd64fre.rs5_release.180914-1434
  37. BUILD_VERSION: 10.0.17763.864 (WinBuild.160101.0800)
  38. BUILD: 17763
  39. SERVICEPACK: 864
  40. PLATFORM_TYPE: x64
  41. NAME: Windows 10
  42. EDITION: Windows 10 WinNt TerminalServer SingleUserTS
  43. BUILD_TIMESTAMP: unknown_date
  44. BUILDDATESTAMP: 160101.0800
  45. BUILDLAB: WinBuild
  46. BUILDOSVER: 10.0.17763.864
  47.  
  48. =============================== DEBUGGER ===============================
  49. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  50. Copyright (c) Microsoft Corporation. All rights reserved.
  51.  
  52. =============================== COMMENTS ===============================
  53. * Information gathered from different dump files may be different. If
  54. Windows updates between two dump files, two or more OS versions may
  55. be shown above.
  56. * If the user updates the BIOS between dump files, two or more versions
  57. and dates may be shown above.
  58. * More RAM information can be found below in the full BIOS section.
  59.  
  60. ========================================================================
  61. ==================== Dump File: 121219-11765-01.dmp ====================
  62. ========================================================================
  63. Mini Kernel Dump File: Only registers and stack trace are available
  64. Windows 10 Kernel Version 17763 MP (8 procs) Free x64
  65. Kernel base = 0xfffff805`0440b000 PsLoadedModuleList = 0xfffff805`04824710
  66. Debug session time: Thu Dec 12 07:19:02.679 2019 (UTC - 5:00)
  67. System Uptime: 0 days 0:00:18.432
  68.  
  69. BugCheck C000021A, {ffff808a7d5fb9a0, ffffffffc0000428, 0, 24680010000}
  70. errfg" bg="errbg">ETW minidump data unavailable
  71. Probably caused by : memory_corruption
  72. Followup: memory_corruption
  73.  
  74. WINLOGON_FATAL_ERROR (c000021a)
  75. The Winlogon process terminated unexpectedly.
  76.  
  77. Arguments:
  78. Arg1: ffff808a7d5fb9a0, String that identifies the problem.
  79. Arg2: ffffffffc0000428, Error Code.
  80. Arg3: 0000000000000000
  81. Arg4: 0000024680010000
  82.  
  83. Debugging Details:
  84. ETW minidump data unavailable
  85. DUMP_CLASS: 1
  86. DUMP_QUALIFIER: 400
  87. ERROR_CODE: (NTSTATUS) 0xc000021a - {Fatal System Error} The %hs system process terminated unexpectedly with a status of 0x%08x (0x%08x 0x%08x). The system has been shut down.
  88. EXCEPTION_CODE: (NTSTATUS) 0xc000021a - {Fatal System Error} The %hs system process terminated unexpectedly with a status of 0x%08x (0x%08x 0x%08x). The system has been shut down.
  89. EXCEPTION_CODE_STR: c000021a
  90. EXCEPTION_PARAMETER1: ffff808a7d5fb9a0
  91. EXCEPTION_PARAMETER2: ffffffffc0000428
  92. EXCEPTION_PARAMETER3: 0000000000000000
  93. EXCEPTION_PARAMETER4: 24680010000
  94. DUMP_TYPE: 2
  95.  
  96. PROCESS_NAME: smss.exe
  97.  
  98. ADDITIONAL_DEBUG_TEXT: initial session process or
  99. BUGCHECK_STR: 0xc000021a_SmpDestroyControlBlock_smss.exe_Terminated_c0000428
  100. CUSTOMER_CRASH_COUNT: 1
  101. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  102. CURRENT_IRQL: 0
  103. LAST_CONTROL_TRANSFER: from fffff80504986bca to fffff805045c19c0
  104. STACK_TEXT:
  105. fffffb84`ebff2488 fffff805`04986bca : 00000000`0000004c 00000000`c000021a fffffb84`ec6472f0 ffffc00f`a359f3d0 : nt!KeBugCheckEx
  106. fffffb84`ebff2490 fffff805`04971ee2 : fffffb84`ebff25b0 fffffb84`ebff2550 ffffffff`800007dc fffffb84`ebff25b0 : nt!PopGracefulShutdown+0x29a
  107. fffffb84`ebff24d0 fffff805`04977e2c : 00000000`00000701 fffff805`00000006 00000000`00000004 00000000`00000000 : nt!PopTransitionSystemPowerStateEx+0x116e
  108. fffffb84`ebff2590 fffff805`045d2c05 : 00000000`00000000 fffff805`044bc5db 00000000`00000010 00000000`00000082 : nt!NtSetSystemPowerState+0x4c
  109. fffffb84`ebff2770 fffff805`045c56d0 : fffff805`04b6e69b 00000000`00000006 00000000`c0000004 ffffd981`b3ab9180 : nt!KiSystemServiceCopyEnd+0x25
  110. fffffb84`ebff2908 fffff805`04b6e69b : 00000000`00000006 00000000`c0000004 ffffd981`b3ab9180 00000000`00000000 : nt!KiServiceLinkage
  111. fffffb84`ebff2910 fffff805`04ad3249 : ffffc00f`9bd60080 fffff805`044f6cc9 fffff805`19f0e000 fffff805`00000000 : nt!PopIssueActionRequest+0x9b33b
  112. fffffb84`ebff29d0 fffff805`0446176f : 00000000`00000001 00000000`00000002 00000000`00000000 ffffc00f`9bd5aa00 : nt!PopPolicyWorkerAction+0x69
  113. fffffb84`ebff2a40 fffff805`044f620a : ffffc00f`00000001 ffffc00f`9bd60080 fffff805`044616e0 fffff805`04822080 : nt!PopPolicyWorkerThread+0x8f
  114. fffffb84`ebff2a70 fffff805`044639d5 : ffffc00f`9bd60080 ffffc00f`9bc9c300 ffffc00f`9bd60080 5b5d5e5f`5c415d41 : nt!ExpWorkerThread+0x16a
  115. fffffb84`ebff2b10 fffff805`045c8e3c : ffffd981`b3780180 ffffc00f`9bd60080 fffff805`04463980 ffd5f7e8`cb8b4800 : nt!PspSystemThreadStartup+0x55
  116. fffffb84`ebff2b60 00000000`00000000 : fffffb84`ebff3000 fffffb84`ebfec000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
  117. STACK_COMMAND: kb
  118. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  119. fffff8050448ff29-fffff8050448ff2a 2 bytes - nt!MmUnlockPages+e9
  120. [ 80 fa:00 d2 ]
  121. fffff8050449d003-fffff8050449d004 2 bytes - nt!MiLockPageTablePage+53 (+0xd0da)
  122. [ 80 fa:00 d2 ]
  123. fffff8050457f222-fffff8050457f223 2 bytes - nt!PpmResetPerformanceAccumulation+32 (+0xe221f)
  124. [ 48 ff:4c 8b ]
  125. fffff8050457f229-fffff8050457f22c 4 bytes - nt!PpmResetPerformanceAccumulation+39 (+0x07)
  126. [ 0f 1f 44 00:e8 a2 c3 8f ]
  127. fffff80504977f11-fffff80504977f15 5 bytes - nt!MiUpdateUserMappings+9
  128. [ d0 be 7d fb f6:b0 7e fd fa f5 ]
  129. fffff80504a611c8-fffff80504a611c9 2 bytes - nt!PfpPfnPrioRequest+a8
  130. [ 80 fa:00 d2 ]
  131. 17 errors : !nt (fffff8050448ff29-fffff80504a611c9)
  132. MODULE_NAME: memory_corruption
  133.  
  134. IMAGE_NAME: memory_corruption
  135.  
  136. FOLLOWUP_NAME: memory_corruption
  137. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  138. MEMORY_CORRUPTOR: LARGE
  139. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  140. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  141. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  142. TARGET_TIME: 2019-12-12T12:19:02.000Z
  143. SUITE_MASK: 272
  144. PRODUCT_TYPE: 1
  145. USER_LCID: 0
  146. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  147. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  148. Followup: memory_corruption
  149.  
  150. ========================================================================
  151. ===================== 3RD PARTY DRIVER QUICK LIST ======================
  152. ========================================================================
  153. Aug 02 2010 - AsUpIO.sys - ASUS Update Input Output driver http://www.asus.com/
  154. Oct 17 2011 - PxHlpa64.sys - Sonic CD/DVD driver
  155. May 30 2012 - FNETURPX.SYS - FNet User Proxy driver (FNet Co., Ltd.) http://www.gotofnet.com/
  156. Aug 22 2012 - AsIO.sys - ASUS Input Output driver http://www.asus.com/
  157. Sep 24 2015 - dtlitescsibus.sys - DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
  158. Dec 28 2015 - dtliteusbbus.sys - DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
  159. Jun 13 2016 - LGBusEnum.sys - Logitech GamePanel Virtual Bus Enumerator driver http://support.logitech.com/
  160. Jun 13 2016 - LGJoyXlCore.sys - Logitech Gaming Software driver http://support.logitech.com/
  161. Jul 15 2016 - FNETHYRAMAS.SYS - Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
  162. Sep 17 2016 - netfilter2.sys - NetFilter SDK TDI Hook driver (WPP) http://netfiltersdk.com/
  163. Sep 25 2017 - e1d65x64.sys - Intel(R) Gigabit Adapter NDIS 6.x driver https://downloadcenter.intel.com/
  164. Oct 03 2017 - TeeDriverW8x64.sys - Intel Management Engine Interface driver https://downloadcenter.intel.com/
  165. Oct 12 2017 - iaStorA.sys - Intel SATA Storage Device RAID Controller
  166. Oct 17 2017 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
  167. Aug 16 2018 - nvvhci.sys - Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
  168. Oct 08 2018 - SYMEVENT64x86.SYS - Symantec Event Library https://www.symantec.com/
  169. Mar 14 2019 - nvvad64v.sys - Nvidia Virtual Audio driver http://www.nvidia.com/
  170. Apr 11 2019 - CorsairVBusDriver.sys - Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
  171. Apr 11 2019 - CorsairVHidDriver.sys - Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
  172. Jun 21 2019 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  173. Jun 28 2019 - Ironx64.SYS - Symantec Iron driver http://www.symantec.com/
  174. Jul 10 2019 - IDSvia64.sys - Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
  175. Aug 08 2019 - SYMEFASI64.SYS - Symantec Extended File Attributes (SI) https://www.symantec.com/
  176. Sep 11 2019 - eeCtrl64.sys - Symantec Eraser Control driver http://www.symantec.com/
  177. Sep 11 2019 - EraserUtilRebootDrv.sys - Symantec Eraser Utility Reboot driver http://www.symantec.com/
  178. Sep 24 2019 - ccSetx64.sys - Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
  179. Sep 26 2019 - BHDrvx64.sys - Norton Security BASH driver http://www.symantec.com/
  180. Oct 09 2019 - SRTSPX64.SYS - Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
  181. Dec 06 2019 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  182.  
  183. ========================================================================
  184. ========================== 3RD PARTY DRIVERS ===========================
  185. ========================================================================
  186. Image path: \SystemRoot\SysWow64\drivers\AsUpIO.sys
  187. Image name: AsUpIO.sys
  188. Search : https://www.google.com/search?q=AsUpIO.sys
  189. ADA Info : ASUS Update Input Output driver http://www.asus.com/
  190. Timestamp : Mon Aug 2 2010
  191.  
  192. Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
  193. Image name: PxHlpa64.sys
  194. Search : https://www.google.com/search?q=PxHlpa64.sys
  195. ADA Info : Sonic CD/DVD driver
  196. Timestamp : Mon Oct 17 2011
  197.  
  198. Image path: \SystemRoot\System32\drivers\FNETURPX.SYS
  199. Image name: FNETURPX.SYS
  200. Search : https://www.google.com/search?q=FNETURPX.SYS
  201. ADA Info : FNet User Proxy driver (FNet Co., Ltd.) http://www.gotofnet.com/
  202. Timestamp : Wed May 30 2012
  203.  
  204. Image path: \SystemRoot\SysWow64\drivers\AsIO.sys
  205. Image name: AsIO.sys
  206. Search : https://www.google.com/search?q=AsIO.sys
  207. ADA Info : ASUS Input Output driver http://www.asus.com/
  208. Timestamp : Wed Aug 22 2012
  209.  
  210. Image path: \SystemRoot\System32\drivers\dtlitescsibus.sys
  211. Image name: dtlitescsibus.sys
  212. Search : https://www.google.com/search?q=dtlitescsibus.sys
  213. ADA Info : DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
  214. Timestamp : Thu Sep 24 2015
  215.  
  216. Image path: \SystemRoot\System32\drivers\dtliteusbbus.sys
  217. Image name: dtliteusbbus.sys
  218. Search : https://www.google.com/search?q=dtliteusbbus.sys
  219. ADA Info : DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
  220. Timestamp : Mon Dec 28 2015
  221.  
  222. Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
  223. Image name: LGBusEnum.sys
  224. Search : https://www.google.com/search?q=LGBusEnum.sys
  225. ADA Info : Logitech GamePanel Virtual Bus Enumerator driver http://support.logitech.com/
  226. Timestamp : Mon Jun 13 2016
  227.  
  228. Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
  229. Image name: LGJoyXlCore.sys
  230. Search : https://www.google.com/search?q=LGJoyXlCore.sys
  231. ADA Info : Logitech Gaming Software driver http://support.logitech.com/
  232. Timestamp : Mon Jun 13 2016
  233.  
  234. Image path: \SystemRoot\System32\drivers\FNETHYRAMAS.SYS
  235. Image name: FNETHYRAMAS.SYS
  236. Search : https://www.google.com/search?q=FNETHYRAMAS.SYS
  237. ADA Info : Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
  238. Timestamp : Fri Jul 15 2016
  239.  
  240. Image path: \SystemRoot\system32\drivers\netfilter2.sys
  241. Image name: netfilter2.sys
  242. Search : https://www.google.com/search?q=netfilter2.sys
  243. ADA Info : NetFilter SDK TDI Hook driver (WPP) http://netfiltersdk.com/
  244. Timestamp : Sat Sep 17 2016
  245.  
  246. Image path: \SystemRoot\system32\DRIVERS\e1d65x64.sys
  247. Image name: e1d65x64.sys
  248. Search : https://www.google.com/search?q=e1d65x64.sys
  249. ADA Info : Intel(R) Gigabit Adapter NDIS 6.x driver https://downloadcenter.intel.com/
  250. Timestamp : Mon Sep 25 2017
  251.  
  252. Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
  253. Image name: TeeDriverW8x64.sys
  254. Search : https://www.google.com/search?q=TeeDriverW8x64.sys
  255. ADA Info : Intel Management Engine Interface driver https://downloadcenter.intel.com/
  256. Timestamp : Tue Oct 3 2017
  257.  
  258. Image path: \SystemRoot\System32\drivers\iaStorA.sys
  259. Image name: iaStorA.sys
  260. Search : https://www.google.com/search?q=iaStorA.sys
  261. ADA Info : Intel SATA Storage Device RAID Controller
  262. Timestamp : Thu Oct 12 2017
  263.  
  264. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  265. Image name: RTKVHD64.sys
  266. Search : https://www.google.com/search?q=RTKVHD64.sys
  267. ADA Info : Realtek Audio System driver https://www.realtek.com/en/
  268. Timestamp : Tue Oct 17 2017
  269.  
  270. Image path: \SystemRoot\System32\drivers\nvvhci.sys
  271. Image name: nvvhci.sys
  272. Search : https://www.google.com/search?q=nvvhci.sys
  273. ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
  274. Timestamp : Thu Aug 16 2018
  275.  
  276. Image path: \??\C:\Windows\system32\Drivers\SYMEVENT64x86.SYS
  277. Image name: SYMEVENT64x86.SYS
  278. Search : https://www.google.com/search?q=SYMEVENT64x86.SYS
  279. ADA Info : Symantec Event Library https://www.symantec.com/
  280. Timestamp : Mon Oct 8 2018
  281.  
  282. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  283. Image name: nvvad64v.sys
  284. Search : https://www.google.com/search?q=nvvad64v.sys
  285. ADA Info : Nvidia Virtual Audio driver http://www.nvidia.com/
  286. Timestamp : Thu Mar 14 2019
  287.  
  288. Image path: \SystemRoot\System32\drivers\CorsairVBusDriver.sys
  289. Image name: CorsairVBusDriver.sys
  290. Search : https://www.google.com/search?q=CorsairVBusDriver.sys
  291. ADA Info : Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
  292. Timestamp : Thu Apr 11 2019
  293.  
  294. Image path: \SystemRoot\System32\drivers\CorsairVHidDriver.sys
  295. Image name: CorsairVHidDriver.sys
  296. Search : https://www.google.com/search?q=CorsairVHidDriver.sys
  297. ADA Info : Corsair Virtual Device driver (Corsair Utility Engine) http://www.corsair.com/
  298. Timestamp : Thu Apr 11 2019
  299.  
  300. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  301. Image name: nvhda64v.sys
  302. Search : https://www.google.com/search?q=nvhda64v.sys
  303. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  304. Timestamp : Fri Jun 21 2019
  305.  
  306. Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\Ironx64.SYS
  307. Image name: Ironx64.SYS
  308. Search : https://www.google.com/search?q=Ironx64.SYS
  309. ADA Info : Symantec Iron driver http://www.symantec.com/
  310. Timestamp : Fri Jun 28 2019
  311.  
  312. Image path: \??\C:\Program Files\Norton Security\NortonData\22.18.0.213\Definitions\IPSDefs\20191211.061\IDSvia64.sys
  313. Image name: IDSvia64.sys
  314. Search : https://www.google.com/search?q=IDSvia64.sys
  315. ADA Info : Symantec Intrusion Detection IDS Core driver http://www.symantec.com/
  316. Timestamp : Wed Jul 10 2019
  317.  
  318. Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\SYMEFASI64.SYS
  319. Image name: SYMEFASI64.SYS
  320. Search : https://www.google.com/search?q=SYMEFASI64.SYS
  321. ADA Info : Symantec Extended File Attributes (SI) https://www.symantec.com/
  322. Timestamp : Thu Aug 8 2019
  323.  
  324. Image path: \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\eeCtrl64.sys
  325. Image name: eeCtrl64.sys
  326. Search : https://www.google.com/search?q=eeCtrl64.sys
  327. ADA Info : Symantec Eraser Control driver http://www.symantec.com/
  328. Timestamp : Wed Sep 11 2019
  329.  
  330. Image path: \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys
  331. Image name: EraserUtilRebootDrv.sys
  332. Search : https://www.google.com/search?q=EraserUtilRebootDrv.sys
  333. ADA Info : Symantec Eraser Utility Reboot driver http://www.symantec.com/
  334. Timestamp : Wed Sep 11 2019
  335.  
  336. Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\ccSetx64.sys
  337. Image name: ccSetx64.sys
  338. Search : https://www.google.com/search?q=ccSetx64.sys
  339. ADA Info : Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
  340. Timestamp : Tue Sep 24 2019
  341.  
  342. Image path: \??\C:\Program Files\Norton Security\NortonData\22.18.0.213\Definitions\BASHDefs\20191209.001\BHDrvx64.sys
  343. Image name: BHDrvx64.sys
  344. Search : https://www.google.com/search?q=BHDrvx64.sys
  345. ADA Info : Norton Security BASH driver http://www.symantec.com/
  346. Timestamp : Thu Sep 26 2019
  347.  
  348. Image path: \SystemRoot\System32\drivers\NGCx64\1613090.03F\SRTSPX64.SYS
  349. Image name: SRTSPX64.SYS
  350. Search : https://www.google.com/search?q=SRTSPX64.SYS
  351. ADA Info : Symantec Real Time Storage Protection (PEL) http://www.symantec.com/
  352. Timestamp : Wed Oct 9 2019
  353.  
  354. Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_77e6900053c33f6f\nvlddmkm.sys
  355. Image name: nvlddmkm.sys
  356. Search : https://www.google.com/search?q=nvlddmkm.sys
  357. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  358. Timestamp : Fri Dec 6 2019
  359.  
  360. If any of the above drivers are from Microsoft then please let me know.
  361. I will have them moved to the Microsoft list on the next update.
  362.  
  363. ========================================================================
  364. ========================== MICROSOFT DRIVERS ===========================
  365. ========================================================================
  366. ACPI.sys ACPI Driver for NT (Microsoft)
  367. acpiex.sys ACPIEx Driver (Microsoft)
  368. acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
  369. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  370. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  371. ahcache.sys Application Compatibility Cache (Microsoft)
  372. bam.sys BAM Kernal driver (Microsoft)
  373. BasicDisplay.sys Basic Display driver (Microsoft)
  374. BasicRender.sys Basic Render driver (Microsoft)
  375. Beep.SYS BEEP driver (Microsoft)
  376. BOOTVID.dll VGA Boot Driver (Microsoft)
  377. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  378. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  379. CI.dll Code Integrity Module (Microsoft)
  380. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  381. CLFS.SYS Common Log File System Driver (Microsoft)
  382. clipsp.sys CLIP Service (Microsoft)
  383. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  384. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  385. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  386. crashdmp.sys Crash Dump driver (Microsoft)
  387. csc.sys Windows Client Side Caching driver (Microsoft)
  388. dfsc.sys DFS Namespace Client Driver (Microsoft)
  389. disk.sys PnP Disk Driver (Microsoft)
  390. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  391. dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  392. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  393. dump_iaStorA.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  394. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  395. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  396. fastfat.SYS Fast FAT File System Driver (Microsoft)
  397. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  398. fileinfo.sys FileInfo Filter Driver (Microsoft)
  399. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  400. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  401. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  402. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  403. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  404. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  405. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  406. HIDCLASS.SYS Hid Class Library (Microsoft)
  407. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  408. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  409. intelpep.sys Intel Power Engine Plugin (Microsoft)
  410. intelppm.sys Processor Device Driver (Microsoft)
  411. iorate.sys I/O rate control Filter (Microsoft)
  412. kbdclass.sys Keyboard Class Driver (Microsoft)
  413. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  414. kd.dll Local Kernal Debugger (Microsoft)
  415. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  416. ks.sys Kernal CSA Library (Microsoft)
  417. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  418. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  419. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  420. mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
  421. mouclass.sys Mouse Class Driver (Microsoft)
  422. mouhid.sys HID Mouse Filter Driver (Microsoft)
  423. mountmgr.sys Mount Point Manager (Microsoft)
  424. Msfs.SYS Mailslot driver (Microsoft)
  425. msisadrv.sys ISA Driver (Microsoft)
  426. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  427. mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
  428. mssmbios.sys System Management BIOS driver (Microsoft)
  429. mup.sys Multiple UNC Provider driver (Microsoft)
  430. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  431. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  432. netbios.sys NetBIOS Interface driver (Microsoft)
  433. netbt.sys MBT Transport driver (Microsoft)
  434. NETIO.SYS Network I/O Subsystem (Microsoft)
  435. Npfs.SYS NPFS driver (Microsoft)
  436. npsvctrig.sys Named pipe service triggers (Microsoft)
  437. nsiproxy.sys NSI Proxy driver (Microsoft)
  438. Ntfs.sys NT File System Driver (Microsoft)
  439. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  440. ntosext.sys NTOS Extension Host driver (Microsoft)
  441. Null.SYS NULL Driver (Microsoft)
  442. pacer.sys QoS Packet Scheduler (Microsoft)
  443. partmgr.sys Partition driver (Microsoft)
  444. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  445. pcw.sys Performance Counter Driver (Microsoft)
  446. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  447. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  448. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  449. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  450. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  451. rdyboost.sys ReadyBoost Driver (Microsoft)
  452. serenum.sys Serial Port Enumerator (Microsoft)
  453. serial.sys Serial Device Driver
  454. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  455. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  456. spaceport.sys Storage Spaces driver (Microsoft)
  457. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  458. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  459. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  460. tcpip.sys TCP/IP Protocol driver (Microsoft)
  461. TDI.SYS TDI Wrapper driver (Microsoft)
  462. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  463. tm.sys Kernel Transaction Manager driver (Microsoft)
  464. ucx01000.sys USB Controller Extension (Microsoft)
  465. UEFI.sys UEFI NT driver (Microsoft)
  466. umbus.sys User-Mode Bus Enumerator (Microsoft)
  467. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  468. USBD.SYS Universal Serial Bus Driver (Microsoft)
  469. UsbHub3.sys USB3 HUB driver (Microsoft)
  470. USBXHCI.SYS USB XHCI driver (Microsoft)
  471. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  472. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  473. volmgr.sys Volume Manager Driver (Microsoft)
  474. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  475. volsnap.sys Volume Shadow Copy driver (Microsoft)
  476. volume.sys Volume driver (Microsoft)
  477. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  478. watchdog.sys Watchdog driver (Microsoft)
  479. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  480. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  481. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  482. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  483. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  484. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  485. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  486. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  487. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  488. Wof.sys Windows Overlay Filter (Microsoft)
  489. WppRecorder.sys WPP Trace Recorder (Microsoft)
  490.  
  491. Unloaded modules:
  492. fffff805`1c540000 fffff805`1c550000 dump_storpor
  493. fffff805`1c9c0000 fffff805`1d511000 dump_iaStorA
  494. fffff805`1d540000 fffff805`1d55e000 dump_dumpfve
  495. fffff805`1c240000 fffff805`1c25c000 dam.sys
  496. fffff805`19b30000 fffff805`19b39000 MbamElam.sys
  497. fffff805`19b20000 fffff805`19b2b000 SymELAM.sys
  498. fffff805`05e10000 fffff805`05e20000 hwpolicy.sys
  499.  
  500. ========================================================================
  501. ============================== BIOS INFO ===============================
  502. ========================================================================
  503. [SMBIOS Data Tables v3.0]
  504. [DMI Version - 0]
  505. [2.0 Calling Convention - No]
  506. [Table Size - 4242 bytes]
  507. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  508. Vendor American Megatrends Inc.
  509. BIOS Version 1301
  510. BIOS Starting Address Segment f000
  511. BIOS Release Date 03/14/2018
  512. BIOS ROM Size 1000000
  513. BIOS Characteristics
  514. 07: - PCI Supported
  515. 10: - APM Supported
  516. 11: - Upgradeable FLASH BIOS
  517. 12: - BIOS Shadowing Supported
  518. 15: - CD-Boot Supported
  519. 16: - Selectable Boot Supported
  520. 17: - BIOS ROM Socketed
  521. 19: - EDD Supported
  522. 23: - 1.2MB Floppy Supported
  523. 24: - 720KB Floppy Supported
  524. 25: - 2.88MB Floppy Supported
  525. 26: - Print Screen Device Supported
  526. 27: - Keyboard Services Supported
  527. 28: - Serial Services Supported
  528. 29: - Printer Services Supported
  529. 32: - BIOS Vendor Reserved
  530. BIOS Characteristic Extensions
  531. 00: - ACPI Supported
  532. 01: - USB Legacy Supported
  533. 08: - BIOS Boot Specification Supported
  534. 10: - Specification Reserved
  535. 11: - Specification Reserved
  536. BIOS Major Revision 5
  537. BIOS Minor Revision 12
  538. EC Firmware Major Revision 255
  539. EC Firmware Minor Revision 255
  540. [System Information (Type 1) - Length 27 - Handle 0001h]
  541. Manufacturer System manufacturer
  542. Product Name System Product Name
  543. Version System Version
  544. UUID 00000000-0000-0000-0000-000000000000
  545. Wakeup Type Power Switch
  546. SKUNumber SKU
  547. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  548. Manufacturer ASUSTeK COMPUTER INC.
  549. Product STRIX Z270H GAMING
  550. Version Rev 1.xx
  551. Feature Flags 09h
  552. 1001043680: - 1001043728: - w8Ùgþ
  553. Location Default string
  554. Chassis Handle 0003h
  555. Board Type 0ah - Processor/Memory Module
  556. Number of Child Handles 0
  557. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  558. Manufacturer Default string
  559. Chassis Type Desktop
  560. Version Default string
  561. Bootup State Safe
  562. Power Supply State Safe
  563. Thermal State Safe
  564. Security Status None
  565. OEM Defined 0
  566. Height 0U
  567. Number of Power Cords 1
  568. Number of Contained Elements 0
  569. Contained Element Size 3
  570. [Onboard Devices Information (Type 10) - Length 6 - Handle 0025h]
  571. Number of Devices 1
  572. 01: Type Video [enabled]
  573. [OEM Strings (Type 11) - Length 5 - Handle 0026h]
  574. Number of Strings 4
  575. 1 Default string
  576. 2 Default string
  577. 3 Socrates
  578. 4 Default string
  579. [System Configuration Options (Type 12) - Length 5 - Handle 0027h]
  580. [Physical Memory Array (Type 16) - Length 23 - Handle 0042h]
  581. Location 03h - SystemBoard/Motherboard
  582. Use 03h - System Memory
  583. Memory Error Correction 03h - None
  584. Maximum Capacity 67108864KB
  585. Number of Memory Devices 4
  586. [Memory Device (Type 17) - Length 40 - Handle 0043h]
  587. Physical Memory Array Handle 0042h
  588. Total Width 0 bits
  589. Data Width 0 bits
  590. Form Factor 02h - Unknown
  591. Device Locator ChannelA-DIMM1
  592. Bank Locator BANK 0
  593. Memory Type 02h - Unknown
  594. Type Detail 0000h -
  595. Speed 0MHz
  596. [Memory Device (Type 17) - Length 40 - Handle 0044h]
  597. Physical Memory Array Handle 0042h
  598. Total Width 64 bits
  599. Data Width 64 bits
  600. Size 16384MB
  601. Form Factor 09h - DIMM
  602. Device Locator ChannelA-DIMM2
  603. Bank Locator BANK 1
  604. Memory Type 1ah - Specification Reserved
  605. Type Detail 4080h - Synchronous
  606. Speed 2400MHz
  607. Manufacturer Corsair
  608. Part Number CMK32GX4M2A2400C14
  609. [Memory Device (Type 17) - Length 40 - Handle 0045h]
  610. Physical Memory Array Handle 0042h
  611. Total Width 0 bits
  612. Data Width 0 bits
  613. Form Factor 02h - Unknown
  614. Device Locator ChannelB-DIMM1
  615. Bank Locator BANK 2
  616. Memory Type 02h - Unknown
  617. Type Detail 0000h -
  618. Speed 0MHz
  619. [Memory Device (Type 17) - Length 40 - Handle 0046h]
  620. Physical Memory Array Handle 0042h
  621. Total Width 64 bits
  622. Data Width 64 bits
  623. Size 16384MB
  624. Form Factor 09h - DIMM
  625. Device Locator ChannelB-DIMM2
  626. Bank Locator BANK 3
  627. Memory Type 1ah - Specification Reserved
  628. Type Detail 4080h - Synchronous
  629. Speed 2400MHz
  630. Manufacturer Corsair
  631. Part Number CMK32GX4M2A2400C14
  632. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0047h]
  633. Starting Address 00000000h
  634. Ending Address 01ffffffh
  635. Memory Array Handle 0042h
  636. Partition Width 02
  637. [Cache Information (Type 7) - Length 19 - Handle 0048h]
  638. Socket Designation L1 Cache
  639. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  640. Maximum Cache Size 0100h - 256K
  641. Installed Size 0100h - 256K
  642. Supported SRAM Type 0020h - Synchronous
  643. Current SRAM Type 0020h - Synchronous
  644. Cache Speed 0ns
  645. Error Correction Type ParitySingle-Bit ECC
  646. System Cache Type Unified
  647. Associativity 8-way Set-Associative
  648. [Cache Information (Type 7) - Length 19 - Handle 0049h]
  649. Socket Designation L2 Cache
  650. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  651. Maximum Cache Size 0400h - 1024K
  652. Installed Size 0400h - 1024K
  653. Supported SRAM Type 0020h - Synchronous
  654. Current SRAM Type 0020h - Synchronous
  655. Cache Speed 0ns
  656. Error Correction Type Multi-Bit ECC
  657. System Cache Type Unified
  658. Associativity 4-way Set-Associative
  659. [Cache Information (Type 7) - Length 19 - Handle 004ah]
  660. Socket Designation L3 Cache
  661. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  662. Maximum Cache Size 2000h - 8192K
  663. Installed Size 2000h - 8192K
  664. Supported SRAM Type 0020h - Synchronous
  665. Current SRAM Type 0020h - Synchronous
  666. Cache Speed 0ns
  667. Error Correction Type Specification Reserved
  668. System Cache Type Unified
  669. Associativity 16-way Set-Associative
  670. [Processor Information (Type 4) - Length 48 - Handle 004bh]
  671. Socket Designation LGA1151
  672. Processor Type Central Processor
  673. Processor Family c6h - Specification Reserved
  674. Processor Manufacturer Intel(R) Corporation
  675. Processor ID e9060900fffbebbf
  676. Processor Version Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
  677. Processor Voltage 8bh - 1.1V
  678. External Clock 100MHz
  679. Max Speed 8300MHz
  680. Current Speed 4200MHz
  681. Status Enabled Populated
  682. Processor Upgrade Other
  683. L1 Cache Handle 0048h
  684. L2 Cache Handle 0049h
  685. L3 Cache Handle 004ah
  686. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ch]
  687. Starting Address 00000000h
  688. Ending Address 00ffffffh
  689. Memory Device Handle 0044h
  690. Mem Array Mapped Adr Handle 0047h
  691. Interleave Position 01
  692. Interleave Data Depth 02
  693. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004dh]
  694. Starting Address 01000000h
  695. Ending Address 01ffffffh
  696. Memory Device Handle 0046h
  697. Mem Array Mapped Adr Handle 0047h
  698. Interleave Position 02
  699. Interleave Data Depth 02
  700.  
  701. ========================================================================
  702. ============================== IMAGE SCAN ==============================
  703. ========================================================================
  704.  
  705. MZ at 00007ff7`a15c0000, prot 00000004, type 00020000
  706. MZ at fffff805`0440b000, prot 00000040, type 01000000 - size a6e000
  707. Name: ntoskrnl.exe
  708. MZ at fffff805`04e7a000, prot 00000040, type 01000000 - size 9d000
  709. Name: HAL.dll
  710. MZ at fffff805`05000000, prot 00000040, type 01000000 - size b000
  711. Name: KD.dll
  712. MZ at fffff805`05200000, prot 00000040, type 01000000 - size 11000
  713. Name: WerLiveKernelApi.dll
  714. MZ at fffff805`0523e000, prot 00000040, type 01000000 - size 62000
  715. Name: msrpc.sys
  716. MZ at fffff805`052a1000, prot 00000040, type 01000000 - size 27000
  717. Name: ntostmhost.dll
  718. MZ at fffff805`052c9000, prot 00000040, type 01000000 - size 6a000
  719. Name: CLFS.SYS
  720. MZ at fffff805`05334000, prot 00000040, type 01000000 - size 18000
  721. Name: PSHED.dll
  722. MZ at fffff805`0534d000, prot 00000040, type 01000000 - size b000
  723. Name: BOOTVID.dll
  724. MZ at fffff805`05359000, prot 00000040, type 01000000 - size 10b000
  725. Name: clipsp.sys
  726. MZ at fffff805`054d6000, prot 00000040, type 01000000 - size e000
  727. Name: cmimcext.dll
  728. MZ at fffff805`054e5000, prot 00000040, type 01000000 - size c000
  729. Name: ntosext.dll
  730. MZ at fffff805`054f2000, prot 00000040, type 01000000 - size d4000
  731. Name: CI.dll
  732. MZ at fffff805`055c7000, prot 00000040, type 01000000 - size b8000
  733. Name: cng.sys
  734. MZ at fffff805`05df0000, prot 00000040, type 01000000 - size 11000
  735. Name: iorate.exe
  736. MZ at fffff805`05e20000, prot 00000040, type 01000000 - size 78000
  737. Name: fwpkclnt.sys
  738. MZ at fffff805`05ea0000, prot 00000040, type 01000000 - size 30000
  739. Name: wfplwfs.exe
  740. MZ at fffff805`05ee0000, prot 00000040, type 01000000 - size c8000
  741. Name: fvevol.exe
  742. MZ at fffff805`05fb0000, prot 00000040, type 01000000 - size b000
  743. Name: volume.exe
  744. MZ at fffff805`05fc0000, prot 00000040, type 01000000 - size 25000
  745. Name: MUP.SYS
  746. MZ at fffff805`19800000, prot 00000040, type 01000000 - size 70000
  747. Name: FLTMGR.SYS
  748. MZ at fffff805`19880000, prot 00000040, type 01000000 - size d1000
  749. Name: Wdf01000.exe
  750. MZ at fffff805`19960000, prot 00000040, type 01000000 - size 13000
  751. Name: WDFLDR.SYS
  752. MZ at fffff805`19980000, prot 00000040, type 01000000 - size 10000
  753. Name: WppRecorder.sys
  754. MZ at fffff805`199a0000, prot 00000040, type 01000000 - size f000
  755. Name: SleepStudyHelper.sys
  756. MZ at fffff805`199b0000, prot 00000040, type 01000000 - size 24000
  757. Name: acpiex.exe
  758. MZ at fffff805`199e0000, prot 00000040, type 01000000 - size 3f000
  759. Name: mssecflt.exe
  760. MZ at fffff805`19a20000, prot 00000040, type 01000000 - size 1a000
  761. Name: SgrmAgent.exe
  762. MZ at fffff805`19a40000, prot 00000040, type 01000000 - size c8000
  763. Name: ACPI.SYS
  764. MZ at fffff805`19b10000, prot 00000040, type 01000000 - size c000
  765. Name: WMILIB.SYS
  766. MZ at fffff805`19b40000, prot 00000040, type 01000000 - size 43000
  767. Name: intelpep.exe
  768. MZ at fffff805`19b90000, prot 00000040, type 01000000 - size 16000
  769. Name: WindowsTrustedRT.exe
  770. MZ at fffff805`19bb0000, prot 00000040, type 01000000 - size b000
  771. Name: WindowsTrustedRTProxy.exe
  772. MZ at fffff805`19bc0000, prot 00000040, type 01000000 - size 14000
  773. Name: pcw.exe
  774. MZ at fffff805`19c00000, prot 00000040, type 01000000 - size b000
  775. Name: msisadrv.exe
  776. MZ at fffff805`19c10000, prot 00000040, type 01000000 - size 6b000
  777. Name: pci.exe
  778. MZ at fffff805`19c80000, prot 00000040, type 01000000 - size 12000
  779. Name: vdrvroot.exe
  780. MZ at fffff805`19ca0000, prot 00000040, type 01000000 - size 2e000
  781. Name: PDC.exe
  782. MZ at fffff805`19cd0000, prot 00000040, type 01000000 - size 19000
  783. Name: CEA.sys
  784. MZ at fffff805`19cf0000, prot 00000040, type 01000000 - size 2f000
  785. Name: partmgr.exe
  786. MZ at fffff805`19d20000, prot 00000040, type 01000000 - size a8000
  787. Name: spaceport.exe
  788. MZ at fffff805`19dd0000, prot 00000040, type 01000000 - size 19000
  789. Name: volmgr.exe
  790. MZ at fffff805`19e60000, prot 00000040, type 01000000 - size 1f000
  791. Name: mountmgr.exe
  792. MZ at fffff805`19e80000, prot 00000040, type 01000000 - size 28d000
  793. Name: ntfs.exe
  794. MZ at fffff805`1a110000, prot 00000040, type 01000000 - size 153000
  795. Name: NDIS.SYS
  796. MZ at fffff805`1a270000, prot 00000040, type 01000000 - size 2d9000
  797. Name: TCPIP.SYS
  798. MZ at fffff805`1a550000, prot 00000040, type 01000000 - size 4f000
  799. Name: rdyboost.exe
  800. MZ at fffff805`1a5a0000, prot 00000040, type 01000000 - size 1c000
  801. Name: disk.exe
  802. MZ at fffff805`1a5c0000, prot 00000040, type 01000000 - size 1f3000
  803. Name: mcupdate_GenuineIntel.exe
  804. MZ at fffff805`1a7c0000, prot 00000040, type 01000000 - size 2b000
  805. Name: ksecdd.sys
  806. MZ at fffff805`1a800000, prot 00000040, type 01000000 - size 9b000
  807. Name: storport.sys
  808. MZ at fffff805`1a8a0000, prot 00000040, type 01000000 - size 1c000
  809. Name: EhStorClass.exe
  810. MZ at fffff805`1a8c0000, prot 00000040, type 01000000 - size 1a000
  811. Name: fileinfo.exe
  812. MZ at fffff805`1a8e0000, prot 00000040, type 01000000 - size 3e000
  813. Name: wof.exe
  814. MZ at fffff805`1a930000, prot 00000040, type 01000000 - size d000
  815. Name: fs_rec.exe
  816. MZ at fffff805`1a940000, prot 00000040, type 01000000 - size 95000
  817. Name: NETIO.SYS
  818. MZ at fffff805`1a9e0000, prot 00000040, type 01000000 - size 32000
  819. Name: ksecpkg.exe
  820. MZ at fffff805`1b590000, prot 00000040, type 01000000 - size 6d000
  821. Name: volsnap.exe
  822. MZ at fffff805`1c210000, prot 00000040, type 01000000 - size 2c000
  823. Name: dfsc.exe
  824. MZ at fffff805`1c260000, prot 00000040, type 01000000 - size 6b000
  825. Name: fastfat.exe
  826. MZ at fffff805`1c480000, prot 00000040, type 01000000 - size 6f000
  827. Name: CLASSPNP.SYS
  828. MZ at fffff805`1c510000, prot 00000040, type 01000000 - size 1c000
  829. Name: CRASHDMP.SYS
  830. MZ at fffff805`1c680000, prot 00000040, type 01000000 - size a000
  831. Name: null.exe
  832. MZ at fffff805`1c690000, prot 00000040, type 01000000 - size a000
  833. Name: beep.exe
  834. MZ at fffff805`1c6b0000, prot 00000040, type 01000000 - size 7a000
  835. Name: rdbss.sys
  836. MZ at fffff805`1c730000, prot 00000040, type 01000000 - size 94000
  837. Name: csc.exe
  838. MZ at fffff805`1c7f0000, prot 00000040, type 01000000 - size 12000
  839. Name: nsiproxy.exe
  840. MZ at fffff805`1c810000, prot 00000040, type 01000000 - size 10000
  841. Name: mssmbios.exe
  842. MZ at fffff805`1c9a0000, prot 00000040, type 01000000 - size a000
  843. Name: gpuenergydrv.exe
  844. MZ at fffff805`1d560000, prot 00000040, type 01000000 - size 2e000
  845. Name: cdrom.exe
  846. MZ at fffff805`1d5d0000, prot 00000040, type 01000000 - size 15000
  847. Name: filecrypt.exe
  848. MZ at fffff805`1d5f0000, prot 00000040, type 01000000 - size e000
  849. Name: tbs.sys
  850. MZ at fffff805`1d600000, prot 00000040, type 01000000 - size 16000
  851. Name: watchdog.sys
  852. MZ at fffff805`1d620000, prot 00000040, type 01000000 - size 16000
  853. Name: BasicDisplay.exe
  854. MZ at fffff805`1d640000, prot 00000040, type 01000000 - size 11000
  855. Name: BasicRender.exe
  856. MZ at fffff805`1d660000, prot 00000040, type 01000000 - size 1c000
  857. Name: npfs.exe
  858. MZ at fffff805`1d680000, prot 00000040, type 01000000 - size 11000
  859. Name: msfs.exe
  860. MZ at fffff805`1d6a0000, prot 00000040, type 01000000 - size 27000
  861. Name: tdx.exe
  862. MZ at fffff805`1d6d0000, prot 00000040, type 01000000 - size 10000
  863. Name: TDI.SYS
  864. MZ at fffff805`1d710000, prot 00000040, type 01000000 - size 51000
  865. Name: netbt.exe
  866. MZ at fffff805`1d770000, prot 00000040, type 01000000 - size 13000
  867. Name: afunix.dll
  868. MZ at fffff805`1d790000, prot 00000040, type 01000000 - size a6000
  869. Name: afd.exe
  870. MZ at fffff805`1d840000, prot 00000040, type 01000000 - size 1a000
  871. Name: vwififlt.SYS
  872. MZ at fffff805`1d860000, prot 00000040, type 01000000 - size 2b000
  873. Name: pacer.exe
  874. MZ at fffff805`1d890000, prot 00000040, type 01000000 - size 14000
  875. Name: netbios.exe
  876. MZ at fffff805`1d8b0000, prot 00000040, type 01000000 - size d000
  877. Name: NpSvcTrig.exe
  878. MZ at fffff805`1d8c0000, prot 00000040, type 01000000 - size 33b000
  879. Name: dxgkrnl.sys
  880. MZ at fffff805`1dc00000, prot 00000040, type 01000000 - size 84000
  881. Name: Vid.exe
  882. MZ at fffff805`1dc90000, prot 00000040, type 01000000 - size 1e000
  883. Name: winhvr.sys
  884. MZ at fffff805`1dcb0000, prot 00000040, type 01000000 - size 11000
  885. Name: CompositeBus.exe
  886. MZ at fffff805`1dcd0000, prot 00000040, type 01000000 - size d000
  887. Name: kdnic.sys
  888. MZ at fffff805`1dce0000, prot 00000040, type 01000000 - size 15000
  889. Name: UmBus.exe
  890. MZ at fffff805`1dd00000, prot 00000040, type 01000000 - size 3e000
  891. Name: intelppm.exe
  892. MZ at fffff805`1dd70000, prot 00000040, type 01000000 - size d000
  893. Name: NdisVirtualBus.exe
  894. MZ at fffff805`1dd80000, prot 00000040, type 01000000 - size c000
  895. Name: swenum.exe
  896. MZ at fffff805`1ddd0000, prot 00000040, type 01000000 - size e000
  897. Name: rdpbus.exe
  898. MZ at fffff805`1ddf0000, prot 00000040, type 01000000 - size 3b000
  899. Name: HIDCLASS.SYS
  900. MZ at fffff805`1de30000, prot 00000040, type 01000000 - size 13000
  901. Name: HIDPARSE.SYS
  902. MZ at fffff805`1de90000, prot 00000040, type 01000000 - size 93000
  903. Name: usbhub3.sys
  904. MZ at fffff805`1df30000, prot 00000040, type 01000000 - size e000
  905. Name: USBD.SYS
  906. MZ at fffff805`1df40000, prot 00000040, type 01000000 - size 11000
  907. Name: kbdhid.exe
  908. MZ at fffff805`1df60000, prot 00000040, type 01000000 - size 13000
  909. Name: kbdclass.exe
  910. MZ at fffff805`1e160000, prot 00000040, type 01000000 - size 14000
  911. Name: bam.exe
  912. MZ at fffff805`1e1a0000, prot 00000040, type 01000000 - size 4e000
  913. Name: ahcache.exe
  914. MZ at fffff805`1e800000, prot 00000040, type 01000000 - size 31000
  915. Name: usbccgp.exe
  916. MZ at fffff805`1e840000, prot 00000040, type 01000000 - size 12000
  917. Name: hidusb.exe
  918. MZ at fffff805`1e860000, prot 00000040, type 01000000 - size f000
  919. Name: mouhid.exe
  920. MZ at fffff805`1e870000, prot 00000040, type 01000000 - size 13000
  921. Name: mouclass.exe
  922. MZ at fffff805`1e8a0000, prot 00000040, type 01000000 - size f000
  923. Name: SYS.exe
  924. MZ at fffff805`1e8d0000, prot 00000004, type 00020000 - size 1d000
  925. Name: DUMPFVE.SYS
  926. MZ at fffff805`1fa00000, prot 00000040, type 01000000 - size 65000
  927. Name: portcls.sys
  928. MZ at fffff805`1faa0000, prot 00000040, type 01000000 - size 75000
  929. Name: ks.sys
  930. MZ at fffff805`1fb20000, prot 00000040, type 01000000 - size 78000
  931. Name: usbxhci.exe
  932. MZ at fffff805`1fba0000, prot 00000040, type 01000000 - size 3f000
  933. Name: ucx01000.exe
  934. MZ at fffff805`1fc20000, prot 00000040, type 01000000 - size 1c000
  935. Name: serial.exe
  936. MZ at fffff805`1fc40000, prot 00000040, type 01000000 - size f000
  937. Name: SerEnum.exe
  938. MZ at fffff805`1fce0000, prot 00000040, type 01000000 - size c000
  939. Name: wmiacpi.exe
  940. MZ at fffff805`1fcf0000, prot 00000040, type 01000000 - size b000
  941. Name: acpipagr.exe
  942. MZ at fffff805`1fd00000, prot 00000040, type 01000000 - size e000
  943. Name: UEFI.SYS
  944. MZ at fffff805`213b0000, prot 00000040, type 01000000 - size 1f000
  945. Name: hdaudbus.exe
  946. MZ at fffff805`213f0000, prot 00000040, type 01000000 - size f000
  947. Name: ksthunk.exe
  948.  
  949. ========================================================================
  950. ==================== Dump File: 112919-14390-01.dmp ====================
  951. ========================================================================
  952. Mini Kernel Dump File: Only registers and stack trace are available
  953. Windows 10 Kernel Version 17763 MP (8 procs) Free x64
  954. Kernel base = 0xfffff805`126b2000 PsLoadedModuleList = 0xfffff805`12acb710
  955. Debug session time: Fri Nov 29 14:43:02.508 2019 (UTC - 5:00)
  956. System Uptime: 3 days 21:51:54.991
  957.  
  958. BugCheck EF, {ffff8c8530dd9080, 0, 0, 0}
  959. errfg" bg="errbg">ETW minidump data unavailable
  960. Probably caused by : memory_corruption
  961. Followup: memory_corruption
  962.  
  963. CRITICAL_PROCESS_DIED (ef)
  964. A critical system process died
  965.  
  966. Arguments:
  967. Arg1: ffff8c8530dd9080, Process object or thread object
  968. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
  969. Arg3: 0000000000000000
  970. Arg4: 0000000000000000
  971.  
  972. Debugging Details:
  973. ETW minidump data unavailable
  974. DUMP_CLASS: 1
  975. DUMP_QUALIFIER: 400
  976. DUMP_TYPE: 2
  977.  
  978. PROCESS_NAME: svchost.exe
  979.  
  980. CRITICAL_PROCESS: svchost.exe
  981. EXCEPTION_CODE: (NTSTATUS) 0x507a7680 - <Unable to get error code text>
  982. ERROR_CODE: (NTSTATUS) 0x507a7680 - <Unable to get error code text>
  983. CUSTOMER_CRASH_COUNT: 1
  984. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  985. BUGCHECK_STR: 0xEF
  986. CURRENT_IRQL: 0
  987. LAST_CONTROL_TRANSFER: from fffff80512f3ceed to fffff805128689c0
  988. STACK_TEXT:
  989. ffff8382`016a7838 fffff805`12f3ceed : 00000000`000000ef ffff8c85`30dd9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  990. ffff8382`016a7840 fffff805`12e4e891 : 00000000`00000000 fffff805`1270c049 ffff8c85`30dd9080 fffff805`12704868 : nt!PspCatchCriticalBreak+0xfd
  991. ffff8382`016a78e0 fffff805`12cf062c : ffff8c85`00000000 00000000`00000000 ffff8c85`30dd9080 ffff8c85`30dd9358 : nt!PspTerminateAllThreads+0x15f3dd
  992. ffff8382`016a7950 fffff805`12cb1e39 : ffffffff`ffffffff ffff8382`016a7a80 ffff8c85`30dd9080 fffff805`12c44401 : nt!PspTerminateProcess+0xe0
  993. ffff8382`016a7990 fffff805`12879c05 : ffff8c85`00000c4c ffff8c85`507a7680 ffff8c85`30dd9080 0000006c`04a7f93c : nt!NtTerminateProcess+0xa9
  994. ffff8382`016a7a00 00007ff8`1f29fce4 : 00007ff8`1f310e4b 00007ff8`1f34112c 0000006c`04a7f900 0000006c`04a7aad9 : nt!KiSystemServiceCopyEnd+0x25
  995. 0000006c`04a7aa48 00007ff8`1f310e4b : 00007ff8`1f34112c 0000006c`04a7f900 0000006c`04a7aad9 00007ff8`1f2190e0 : 0x00007ff8`1f29fce4
  996. 0000006c`04a7aa50 00007ff8`1f34112c : 0000006c`04a7f900 0000006c`04a7aad9 00007ff8`1f2190e0 00000000`00000003 : 0x00007ff8`1f310e4b
  997. 0000006c`04a7aa58 0000006c`04a7f900 : 0000006c`04a7aad9 00007ff8`1f2190e0 00000000`00000003 00007ff8`1f2a788d : 0x00007ff8`1f34112c
  998. 0000006c`04a7aa60 0000006c`04a7aad9 : 00007ff8`1f2190e0 00000000`00000003 00007ff8`1f2a788d 00007ff8`1f34112c : 0x0000006c`04a7f900
  999. 0000006c`04a7aa68 00007ff8`1f2190e0 : 00000000`00000003 00007ff8`1f2a788d 00007ff8`1f34112c 00000000`00000006 : 0x0000006c`04a7aad9
  1000. 0000006c`04a7aa70 00000000`00000003 : 00007ff8`1f2a788d 00007ff8`1f34112c 00000000`00000006 00000000`00000004 : 0x00007ff8`1f2190e0
  1001. 0000006c`04a7aa78 00007ff8`1f2a788d : 00007ff8`1f34112c 00000000`00000006 00000000`00000004 00007ff8`0f553f30 : 0x3
  1002. 0000006c`04a7aa80 00007ff8`1f34112c : 00000000`00000006 00000000`00000004 00007ff8`0f553f30 00000000`00000000 : 0x00007ff8`1f2a788d
  1003. 0000006c`04a7aa88 00000000`00000006 : 00000000`00000004 00007ff8`0f553f30 00000000`00000000 00000000`00000000 : 0x00007ff8`1f34112c
  1004. 0000006c`04a7aa90 00000000`00000004 : 00007ff8`0f553f30 00000000`00000000 00000000`00000000 00000000`00050348 : 0x6
  1005. 0000006c`04a7aa98 00007ff8`0f553f30 : 00000000`00000000 00000000`00000000 00000000`00050348 00007ff8`1f28fd56 : 0x4
  1006. 0000006c`04a7aaa0 00000000`00000000 : 00000000`00000000 00000000`00050348 00007ff8`1f28fd56 00000000`00000019 : 0x00007ff8`0f553f30
  1007. STACK_COMMAND: kb
  1008. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1009. fffff80512826222-fffff80512826223 2 bytes - nt!PpmResetPerformanceAccumulation+32
  1010. [ 48 ff:4c 8b ]
  1011. fffff80512826229-fffff8051282622d 5 bytes - nt!PpmResetPerformanceAccumulation+39 (+0x07)
  1012. [ 0f 1f 44 00 00:e8 a2 f3 de ff ]
  1013. 7 errors : !nt (fffff80512826222-fffff8051282622d)
  1014. MODULE_NAME: memory_corruption
  1015.  
  1016. IMAGE_NAME: memory_corruption
  1017.  
  1018. FOLLOWUP_NAME: memory_corruption
  1019. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1020. MEMORY_CORRUPTOR: LARGE
  1021. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1022. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1023. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1024. TARGET_TIME: 2019-11-29T19:43:02.000Z
  1025. SUITE_MASK: 272
  1026. PRODUCT_TYPE: 1
  1027. USER_LCID: 0
  1028. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1029. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1030. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement