Advertisement
Guest User

Untitled

a guest
Jul 23rd, 2020
141
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 124.51 KB | None | 0 0
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer
  3. Version: 0.91
  4. Time to analyze file(s): 00 hours and 02 minutes and 07 seconds
  5.  
  6. ================================ SYSTEM ================================
  7. MANUFACTURER: Micro-Star International Co., Ltd.
  8. PRODUCT_NAME: MS-7A38
  9. VERSION: 2.0
  10.  
  11. ================================= BIOS =================================
  12. VENDOR: American Megatrends Inc.
  13. VERSION: A.JQ
  14. DATE: 11/29/2019
  15.  
  16. ============================= MOTHERBOARD ==============================
  17. MANUFACTURER: Micro-Star International Co., Ltd
  18. PRODUCT: B350M PRO-VDH (MS-7A38)
  19. VERSION: 2.0
  20.  
  21. ================================= RAM ==================================
  22. Size Speed Manufacturer Part No.
  23. -------------- -------------- ------------------- ----------------------
  24. 2400MHz Unknown Unknown
  25. 8192MB 2400MHz Unknown CMV8GX4M1A2400C16
  26. 2400MHz Unknown Unknown
  27. 2400MHz Unknown Unknown
  28.  
  29. ================================= CPU ==================================
  30. Processor Version: AMD Ryzen 3 1300X Quad-Core Processor
  31. COUNT: 4
  32. MHZ: 3500
  33. VENDOR: AuthenticAMD
  34. FAMILY: 17
  35. MODEL: 1
  36. STEPPING: 1
  37.  
  38. ================================== OS ==================================
  39. Product: WinNt, suite: TerminalServer SingleUserTS
  40. BUILD_VERSION: 10.0.19041.264 (WinBuild.160101.0800)
  41. BUILD: 19041
  42. SERVICEPACK: 264
  43. PLATFORM_TYPE: x64
  44. NAME: Windows 10
  45. EDITION: Windows 10 WinNt TerminalServer SingleUserTS
  46. BUILD_TIMESTAMP: unknown_date
  47. BUILDDATESTAMP: 160101.0800
  48. BUILDLAB: WinBuild
  49. BUILDOSVER: 10.0.19041.264
  50. Built by: 19041.1.amd64fre.vb_release.191206-1406
  51.  
  52. =============================== DEBUGGER ===============================
  53. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  54. Copyright (c) Microsoft Corporation. All rights reserved.
  55.  
  56. =============================== COMMENTS ===============================
  57. * Information gathered from different dump files may be different. If
  58. Windows updates between two dump files, two or more OS versions may
  59. be shown above.
  60. * If the user updates the BIOS between dump files, two or more versions
  61. and dates may be shown above.
  62. * More RAM information can be found below in a full BIOS section.
  63.  
  64. ========================================================================
  65. ======================= Dump #1: ANALYZE VERBOSE =======================
  66. ======================= File: 072320-9671-01.dmp =======================
  67. ========================================================================
  68.  
  69. Mini Kernel Dump File: Only registers and stack trace are available
  70. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  71. Kernel base = 0xfffff804`09c00000 PsLoadedModuleList = 0xfffff804`0a82a250
  72. Debug session time: Thu Jul 23 09:50:53.146 2020 (UTC - 4:00)
  73. System Uptime: 0 days 0:02:45.823
  74.  
  75. BugCheck 1A, {41792, ffffb0bffa7e53c0, 10000000000000, 0}
  76. Probably caused by : memory_corruption ( ONE_BIT )
  77. Followup: MachineOwner
  78.  
  79. MEMORY_MANAGEMENT (1a)
  80. # Any other values for parameter 1 must be individually examined.
  81.  
  82. Arguments:
  83. Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
  84. the PTE. Parameters 3/4 contain the low/high parts of the PTE.
  85. Arg2: ffffb0bffa7e53c0
  86. Arg3: 0010000000000000
  87. Arg4: 0000000000000000
  88.  
  89. Debugging Details:
  90. DUMP_CLASS: 1
  91. DUMP_QUALIFIER: 400
  92. DUMP_TYPE: 2
  93. DUMP_FILE_ATTRIBUTES: 0x8
  94. Kernel Generated Triage Dump
  95. MEMORY_CORRUPTOR: ONE_BIT
  96. BUGCHECK_STR: 0x1a_41792
  97. CUSTOMER_CRASH_COUNT: 1
  98. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  99.  
  100. PROCESS_NAME: svchost.exe
  101.  
  102. CURRENT_IRQL: 2
  103. STACK_TEXT:
  104. ffff8489`117e6e48 fffff804`0a05418e : 00000000`0000001a 00000000`00041792 ffffb0bf`fa7e53c0 00100000`00000000 : nt!KeBugCheckEx
  105. ffff8489`117e6e50 fffff804`09e119d1 : 00000000`00000003 ffffb0bf`fa7e5000 ffff8489`117e7320 00000000`00000003 : nt!MiDeleteVa+0x191e6e
  106. ffff8489`117e6f40 fffff804`09e11cf0 : 00000000`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
  107. ffff8489`117e6fd0 fffff804`09e11cf0 : 00000000`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
  108. ffff8489`117e7060 fffff804`09e11cf0 : ffff8489`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
  109. ffff8489`117e70f0 fffff804`09e0e5fb : 00000000`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
  110. ffff8489`117e7180 fffff804`09ec22d1 : ffff8489`117e7320 ffffb305`00000000 ffffb0be`00000002 ffff8489`00000000 : nt!MiWalkPageTables+0x36b
  111. ffff8489`117e7280 fffff804`09ea787f : 00000000`00000000 00000000`00000060 ffffb305`b05cb980 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
  112. ffff8489`117e7700 fffff804`0a1ea999 : ffffb305`b05cb240 00000000`00000000 ffffb305`00000000 ffffb305`00000001 : nt!MiDeleteVad+0x41f
  113. ffff8489`117e7830 fffff804`0a266a00 : ffffb305`ac6370a0 ffffb305`b0224d60 ffffb305`b0524080 00000000`00000000 : nt!MiUnmapVad+0x49
  114. ffff8489`117e7860 fffff804`0a2678b3 : ffffb305`a7ab7e10 ffffb305`a7ab7e10 ffffb305`ac6370a0 ffffb305`b05cb240 : nt!MiCleanVad+0x30
  115. ffff8489`117e7890 fffff804`0a2b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb305`b05cb240 : nt!MmCleanProcessAddressSpace+0x137
  116. ffff8489`117e7910 fffff804`0a1e8c32 : ffffb305`b05cb240 ffff9e0a`a0f4a730 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
  117. ffff8489`117e7990 fffff804`0a24e29e : ffffb305`00000000 00000000`00000001 00000000`00000000 00000001`5b00d000 : nt!PspExitThread+0x5f6
  118. ffff8489`117e7a90 fffff804`09fef378 : ffffb305`b05cb240 ffffb305`b0524080 ffff8489`117e7b80 ffffb305`ad57eae0 : nt!NtTerminateProcess+0xde
  119. ffff8489`117e7b00 00007ff9`3760b314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  120. 00000001`5af5fd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3760b314
  121. STACK_COMMAND: kb
  122. THREAD_SHA1_HASH_MOD_FUNC: 28819333630b094e437e8f4b5f5cbb772be47b43
  123. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 94238bd61675a831ebf837a98bf71113a8b4fa41
  124. THREAD_SHA1_HASH_MOD: 9eef8c7ca0ce66f8b8b34848179f303828cff762
  125. SYMBOL_NAME: ONE_BIT
  126. FOLLOWUP_NAME: MachineOwner
  127. MODULE_NAME: hardware
  128.  
  129. IMAGE_NAME: memory_corruption
  130.  
  131. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  132. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
  133. BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
  134. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
  135. TARGET_TIME: 2020-07-23T13:50:53.000Z
  136. SUITE_MASK: 272
  137. PRODUCT_TYPE: 1
  138. USER_LCID: 0
  139. FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
  140. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
  141. Followup: MachineOwner
  142.  
  143. ====================== Dump #1: 3RD PARTY DRIVERS ======================
  144.  
  145. Mar 14 2016 - amdgpio3.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  146. Mar 19 2019 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  147. May 14 2019 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
  148. Oct 02 2019 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  149. Nov 18 2019 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  150. Jan 14 2020 - amdgpio2.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  151. Mar 06 2020 - amdpsp.sys - Advanced Micro Devices, Inc http://support.amd.com/
  152. Apr 10 2020 - AMDPCIDev.sys - Advanced Micro Devices PCI Device driver
  153.  
  154. ================== Dump #1: 3RD PARTY DRIVERS (FULL) ===================
  155.  
  156. Image name: amdgpio3.sys
  157. Search : https://www.google.com/search?q=amdgpio3.sys
  158. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  159. Timestamp : Mon Mar 14 2016
  160.  
  161. Image name: nvhda64v.sys
  162. Search : https://www.google.com/search?q=nvhda64v.sys
  163. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  164. Timestamp : Tue Mar 19 2019
  165.  
  166. Image name: RTKVHD64.sys
  167. Search : https://www.google.com/search?q=RTKVHD64.sys
  168. ADA Info : Realtek Audio System driver https://www.realtek.com/en/
  169. Timestamp : Tue May 14 2019
  170.  
  171. Image name: nvlddmkm.sys
  172. Search : https://www.google.com/search?q=nvlddmkm.sys
  173. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  174. Timestamp : Wed Oct 2 2019
  175.  
  176. Image name: rt640x64.sys
  177. Search : https://www.google.com/search?q=rt640x64.sys
  178. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  179. Timestamp : Mon Nov 18 2019
  180.  
  181. Image name: amdgpio2.sys
  182. Search : https://www.google.com/search?q=amdgpio2.sys
  183. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  184. Timestamp : Tue Jan 14 2020
  185.  
  186. Image name: amdpsp.sys
  187. Search : https://www.google.com/search?q=amdpsp.sys
  188. ADA Info : Advanced Micro Devices, Inc http://support.amd.com/
  189. Timestamp : Fri Mar 6 2020
  190.  
  191. Image name: AMDPCIDev.sys
  192. Search : https://www.google.com/search?q=AMDPCIDev.sys
  193. ADA Info : Advanced Micro Devices PCI Device driver
  194. Timestamp : Fri Apr 10 2020
  195.  
  196. ====================== Dump #1: MICROSOFT DRIVERS ======================
  197.  
  198. ACPI.sys ACPI Driver for NT (Microsoft)
  199. acpiex.sys ACPIEx Driver (Microsoft)
  200. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  201. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  202. ahcache.sys Application Compatibility Cache (Microsoft)
  203. amdppm.sys Processor Device Driver
  204. bam.sys BAM Kernal driver (Microsoft)
  205. BasicDisplay.sys Basic Display driver (Microsoft)
  206. BasicRender.sys Basic Render driver (Microsoft)
  207. Beep.SYS BEEP driver (Microsoft)
  208. bindflt.sys Windows Bind Filter driver (Microsoft)
  209. BOOTVID.dll VGA Boot Driver (Microsoft)
  210. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  211. cdd.dll Canonical Display Driver (Microsoft)
  212. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  213. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  214. CI.dll Code Integrity Module (Microsoft)
  215. CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
  216. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  217. cldflt.sys Cloud Files Mini Filter driver (Microsoft)
  218. CLFS.SYS Common Log File System Driver (Microsoft)
  219. clipsp.sys CLIP Service (Microsoft)
  220. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  221. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  222. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  223. crashdmp.sys Crash Dump driver (Microsoft)
  224. csc.sys Windows Client Side Caching driver (Microsoft)
  225. dfsc.sys DFS Namespace Client Driver (Microsoft)
  226. disk.sys PnP Disk Driver (Microsoft)
  227. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  228. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  229. dump_storahci.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  230. dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
  231. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  232. dxgmms2.sys DirectX Graphics MMS
  233. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  234. fastfat.SYS Fast FAT File System Driver (Microsoft)
  235. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  236. fileinfo.sys FileInfo Filter Driver (Microsoft)
  237. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  238. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  239. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  240. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  241. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  242. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  243. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  244. HIDCLASS.SYS Hid Class Library (Microsoft)
  245. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  246. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  247. HTTP.sys HTTP Protocol Stack (Microsoft)
  248. intelpep.sys Intel Power Engine Plugin (Microsoft)
  249. IntelTA.sys Intel Telemetry Driver
  250. iorate.sys I/O rate control Filter (Microsoft)
  251. kbdclass.sys Keyboard Class Driver (Microsoft)
  252. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  253. kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
  254. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  255. ks.sys Kernal CSA Library (Microsoft)
  256. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  257. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  258. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  259. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  260. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  261. mcupdate.dll Media Center Update (Microsoft)
  262. mmcss.sys MMCSS Driver (Microsoft)
  263. monitor.sys Monitor Driver (Microsoft)
  264. mouclass.sys Mouse Class Driver (Microsoft)
  265. mouhid.sys HID Mouse Filter Driver (Microsoft)
  266. mountmgr.sys Mount Point Manager (Microsoft)
  267. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  268. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  269. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  270. Msfs.SYS Mailslot driver (Microsoft)
  271. msgpioclx.sys GPIO Class Extension Driver (Microsoft)
  272. msisadrv.sys ISA Driver (Microsoft)
  273. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  274. msquic.sys Windows QUIC Driver
  275. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  276. mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
  277. mssmbios.sys System Management BIOS driver (Microsoft)
  278. mup.sys Multiple UNC Provider driver (Microsoft)
  279. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  280. ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
  281. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  282. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  283. netbios.sys NetBIOS Interface driver (Microsoft)
  284. netbt.sys MBT Transport driver (Microsoft)
  285. NETIO.SYS Network I/O Subsystem (Microsoft)
  286. Npfs.SYS NPFS driver (Microsoft)
  287. npsvctrig.sys Named pipe service triggers (Microsoft)
  288. nsiproxy.sys NSI Proxy driver (Microsoft)
  289. Ntfs.sys NT File System Driver (Microsoft)
  290. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  291. ntosext.sys NTOS Extension Host driver (Microsoft)
  292. Null.SYS NULL Driver (Microsoft)
  293. pacer.sys QoS Packet Scheduler (Microsoft)
  294. parport.sys Parallel Port Driver (Microsoft)
  295. partmgr.sys Partition driver (Microsoft)
  296. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  297. pcw.sys Performance Counter Driver (Microsoft)
  298. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  299. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  300. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  301. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  302. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  303. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  304. rdyboost.sys ReadyBoost Driver (Microsoft)
  305. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  306. serenum.sys Serial Port Enumerator (Microsoft)
  307. serial.sys Serial Device Driver
  308. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  309. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  310. spaceport.sys Storage Spaces driver (Microsoft)
  311. srv2.sys Smb 2.0 Server driver (Microsoft)
  312. srvnet.sys Server Network driver (Microsoft)
  313. storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
  314. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  315. storqosflt.sys Storage QoS Filter driver (Microsoft)
  316. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  317. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  318. tcpip.sys TCP/IP Protocol driver (Microsoft)
  319. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  320. TDI.SYS TDI Wrapper driver (Microsoft)
  321. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  322. tm.sys Kernel Transaction Manager driver (Microsoft)
  323. ucx01000.sys USB Controller Extension (Microsoft)
  324. UEFI.sys UEFI NT driver (Microsoft)
  325. umbus.sys User-Mode Bus Enumerator (Microsoft)
  326. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  327. USBD.SYS Universal Serial Bus Driver (Microsoft)
  328. UsbHub3.sys USB3 HUB driver (Microsoft)
  329. USBXHCI.SYS USB XHCI driver (Microsoft)
  330. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  331. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  332. volmgr.sys Volume Manager Driver (Microsoft)
  333. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  334. volsnap.sys Volume Shadow Copy driver (Microsoft)
  335. volume.sys Volume driver (Microsoft)
  336. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  337. watchdog.sys Watchdog driver (Microsoft)
  338. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  339. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  340. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  341. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  342. WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
  343. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  344. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  345. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  346. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  347. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  348. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  349. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  350. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  351. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  352. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  353. Wof.sys Windows Overlay Filter (Microsoft)
  354. WpdUpFltr.sys Portable Device Upper Class Filter driver (Microsoft)
  355. WppRecorder.sys WPP Trace Recorder (Microsoft)
  356. WUDFRd.sys Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft)
  357.  
  358. ====================== Dump #1: UNLOADED MODULES =======================
  359.  
  360. fffff804`076a0000 fffff804`076af000 dump_storpor
  361. fffff804`076f0000 fffff804`07723000 dump_storahc
  362. fffff804`07750000 fffff804`0776e000 dump_dumpfve
  363. fffff804`187e0000 fffff804`187ef000 dump_storpor
  364. fffff804`17e40000 fffff804`17e73000 dump_storahc
  365. fffff804`17ea0000 fffff804`17ebe000 dump_dumpfve
  366. fffff804`178a0000 fffff804`178af000 dump_storpor
  367. fffff804`178f0000 fffff804`17923000 dump_storahc
  368. fffff804`17950000 fffff804`1796e000 dump_dumpfve
  369. fffff804`17d20000 fffff804`17d3c000 dam.sys
  370. fffff804`0dc00000 fffff804`0dc11000 WdBoot.sys
  371. fffff804`0ec90000 fffff804`0eca0000 hwpolicy.sys
  372.  
  373. ====================== Dump #1: BIOS INFORMATION =======================
  374.  
  375. sysinfo: could not find necessary interfaces.
  376. sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
  377.  
  378. ========================== Dump #1: Extra #1 ===========================
  379.  
  380. 2: kd> !verifier
  381. fffff8040a82a660: Unable to get verifier list.
  382.  
  383. ========================== Dump #1: Extra #2 ===========================
  384.  
  385. 2: kd> !thread
  386. THREAD ffffb305b0524080 Cid 0f58.0f5c Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 2
  387. Not impersonating
  388. GetUlongFromAddress: unable to read from fffff8040a81143c
  389. Owning Process ffffb305b05cb240 Image: svchost.exe
  390. Attached Process N/A Image: N/A
  391. fffff78000000000: Unable to get shared data
  392. Wait Start TickCount 10612
  393. Context Switch Count 108 IdealProcessor: 1
  394. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  395. UserTime 00:00:00.000
  396. KernelTime 00:00:00.000
  397. Win32 Start Address 0x00007ff78d4e4e80
  398. Stack Init ffff8489117e7c90 Current ffff8489117e7340
  399. Base ffff8489117e8000 Limit ffff8489117e2000 Call 0000000000000000
  400. Priority 9 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
  401. Child-SP RetAddr : Args to Child : Call Site
  402. ffff8489`117e6e48 fffff804`0a05418e : 00000000`0000001a 00000000`00041792 ffffb0bf`fa7e53c0 00100000`00000000 : nt!KeBugCheckEx
  403. ffff8489`117e6e50 fffff804`09e119d1 : 00000000`00000003 ffffb0bf`fa7e5000 ffff8489`117e7320 00000000`00000003 : nt!MiDeleteVa+0x191e6e
  404. ffff8489`117e6f40 fffff804`09e11cf0 : 00000000`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
  405. ffff8489`117e6fd0 fffff804`09e11cf0 : 00000000`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
  406. ffff8489`117e7060 fffff804`09e11cf0 : ffff8489`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
  407. ffff8489`117e70f0 fffff804`09e0e5fb : 00000000`00000000 ffffb305`b05cb8c0 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
  408. ffff8489`117e7180 fffff804`09ec22d1 : ffff8489`117e7320 ffffb305`00000000 ffffb0be`00000002 ffff8489`00000000 : nt!MiWalkPageTables+0x36b
  409. ffff8489`117e7280 fffff804`09ea787f : 00000000`00000000 00000000`00000060 ffffb305`b05cb980 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
  410. ffff8489`117e7700 fffff804`0a1ea999 : ffffb305`b05cb240 00000000`00000000 ffffb305`00000000 ffffb305`00000001 : nt!MiDeleteVad+0x41f
  411. ffff8489`117e7830 fffff804`0a266a00 : ffffb305`ac6370a0 ffffb305`b0224d60 ffffb305`b0524080 00000000`00000000 : nt!MiUnmapVad+0x49
  412. ffff8489`117e7860 fffff804`0a2678b3 : ffffb305`a7ab7e10 ffffb305`a7ab7e10 ffffb305`ac6370a0 ffffb305`b05cb240 : nt!MiCleanVad+0x30
  413. ffff8489`117e7890 fffff804`0a2b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb305`b05cb240 : nt!MmCleanProcessAddressSpace+0x137
  414. ffff8489`117e7910 fffff804`0a1e8c32 : ffffb305`b05cb240 ffff9e0a`a0f4a730 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
  415. ffff8489`117e7990 fffff804`0a24e29e : ffffb305`00000000 00000000`00000001 00000000`00000000 00000001`5b00d000 : nt!PspExitThread+0x5f6
  416. ffff8489`117e7a90 fffff804`09fef378 : ffffb305`b05cb240 ffffb305`b0524080 ffff8489`117e7b80 ffffb305`ad57eae0 : nt!NtTerminateProcess+0xde
  417. ffff8489`117e7b00 00007ff9`3760b314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 (TrapFrame @ ffff8489`117e7b00)
  418. 00000001`5af5fd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3760b314
  419.  
  420.  
  421. ========================================================================
  422. ======================= Dump #2: ANALYZE VERBOSE =======================
  423. ======================= File: 072320-9265-01.dmp =======================
  424. ========================================================================
  425.  
  426. Mini Kernel Dump File: Only registers and stack trace are available
  427. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  428. Kernel base = 0xfffff800`54600000 PsLoadedModuleList = 0xfffff800`5522a250
  429. Debug session time: Thu Jul 23 09:47:39.936 2020 (UTC - 4:00)
  430. System Uptime: 0 days 0:01:24.613
  431.  
  432. BugCheck 3B, {c0000094, fffff5adbcb8e88d, ffff8b8a29aada50, 0}
  433. Probably caused by : memory_corruption
  434. Followup: memory_corruption
  435.  
  436. SYSTEM_SERVICE_EXCEPTION (3b)
  437. An exception happened while executing a system service routine.
  438.  
  439. Arguments:
  440. Arg1: 00000000c0000094, Exception code that caused the bugcheck
  441. Arg2: fffff5adbcb8e88d, Address of the instruction which caused the bugcheck
  442. Arg3: ffff8b8a29aada50, Address of the context record for the exception that caused the bugcheck
  443. Arg4: 0000000000000000, zero.
  444.  
  445. Debugging Details:
  446. DUMP_CLASS: 1
  447. DUMP_QUALIFIER: 400
  448. DUMP_TYPE: 2
  449. EXCEPTION_CODE: (NTSTATUS) 0xc0000094 - {EXCEPTION} Integer division by zero.
  450. FAULTING_IP:
  451. win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+219
  452. fffff5ad`bcb8e88d 48f7b1f0010000 div rax,qword ptr [rcx+1F0h]
  453. CONTEXT: ffff8b8a29aada50 -- (.cxr 0xffff8b8a29aada50)
  454. rax=0000000000000000 rbx=fffff5ce85fe0390 rcx=fffff5ce80609620
  455. rdx=0000000000000000 rsi=0000000000000000 rdi=fffff5ce80609620
  456. rip=fffff5adbcb8e88d rsp=ffff8b8a29aae450 rbp=ffff8b8a29aae610
  457. r8=0000000000000008 r9=7ffff5adbdc6b338 r10=0000000000000000
  458. r11=ffffc07a96200000 r12=fffff5ce85fb8bb0 r13=0000000000000001
  459. r14=0000000000000010 r15=ffff8b8a29aae7f8
  460. iopl=0 nv up ei pl zr na po nc
  461. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
  462. win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x219:
  463. fffff5ad`bcb8e88d 48f7b1f0010000 div rax,qword ptr [rcx+1F0h] ds:002b:fffff5ce`80609810=0000000000000000
  464. Resetting default scope
  465. CUSTOMER_CRASH_COUNT: 1
  466. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  467. BUGCHECK_STR: 0x3B
  468.  
  469. PROCESS_NAME: SearchApp.exe
  470.  
  471. CURRENT_IRQL: 0
  472. LAST_CONTROL_TRANSFER: from fffff5adbcb7d0f8 to fffff5adbcb8e88d
  473. STACK_TEXT:
  474. ffff8b8a`29aae450 fffff5ad`bcb7d0f8 : fffff5ce`80609620 00100000`00000000 fffff5ce`80608ec0 ffffc07a`96200000 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x219
  475. ffff8b8a`29aae480 fffff5ad`bcb7d056 : ffff8b8a`29aae610 fffff5ce`80608ec0 ffff9501`bbc68c90 00000000`0000006b : win32kbase!DirectComposition::CSystemChannel::ReleaseSystemResource+0x34
  476. ffff8b8a`29aae4b0 fffff5ad`bcb7aabd : ffff9501`bd025cf8 00000000`00000000 00000000`00000060 00000000`00000000 : win32kbase!DirectComposition::CConnection::ReleaseSystemResource+0x4a
  477. ffff8b8a`29aae4e0 fffff5ad`bcbbe84d : fffff5ce`80200340 fffff5ce`80201880 fffff5ce`80201ac0 00000000`00000060 : win32kbase!DirectComposition::CSharedSystemResource::Delete+0x2d
  478. ffff8b8a`29aae510 fffff5ad`bc8110d0 : 00000000`c000001c fffff5ce`80602080 00000000`756d4344 ffff8b8a`29aae7f8 : win32kbase!W32CalloutDispatch+0x5fd
  479. ffff8b8a`29aae720 fffff800`54c613a9 : ffff8b8a`29aae7f8 00000000`00000015 fffff800`5521de80 ffff8b8a`29aae940 : win32k!W32CalloutDispatchThunk+0x30
  480. ffff8b8a`29aae760 fffff800`54c6172d : 00000000`00000015 ffff8b8a`29aae7e0 00000000`00000000 ffffc07a`96200000 : nt!ExCallCallBack+0x3d
  481. ffff8b8a`29aae790 fffff800`54d03326 : ffff9501`bd025cb0 ffff8b8a`29aae7e0 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0xbd
  482. ffff8b8a`29aae7c0 fffff800`54c0c2f0 : ffff9501`00000001 ffff9501`bd025ce0 00000000`00000024 fffff5ad`bcb8e2ca : nt!ExpWin32DeleteProcedure+0x76
  483. ffff8b8a`29aae7f0 fffff800`54824e97 : 00000000`00000000 00000000`00000000 fffff5ce`85fb8bb0 ffff9501`bd025ce0 : nt!ObpRemoveObjectRoutine+0x80
  484. ffff8b8a`29aae850 fffff800`5480198e : fffff5ce`80768330 00000000`00000000 fffff5ad`bcc009c0 ffffc07a`96200000 : nt!ObfDereferenceObjectWithTag+0xc7
  485. ffff8b8a`29aae890 fffff5ad`bcc009ec : fffff5ce`841d0020 ffff8b8a`29aae9b1 ffff8b8a`29aae9b1 ffff8b8a`29aae940 : nt!HalPutDmaAdapter+0xe
  486. ffff8b8a`29aae8c0 fffff5ad`bcb8e78f : fffff5ce`80768330 fffff5ad`bcc01011 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CSharedInteractionMarshaler::ReleaseAllReferences+0x2c
  487. ffff8b8a`29aae8f0 fffff5ad`bcb8e62a : 00000000`00000000 fffff5ad`bcc00fc4 fffff5ce`841d0008 ffff8b8a`29aaea39 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x11b
  488. ffff8b8a`29aae920 fffff5ad`bcb8cfd5 : fffff5ce`85fb8bb0 ffff8b8a`29aaeb80 fffff5ce`841d0008 fffff800`54822a59 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x82
  489. ffff8b8a`29aae960 fffff5ad`bcb8c971 : fffff5ce`85fb8bb0 00000000`00000000 00000000`00000000 ffff9501`bd806e01 : win32kbase!DirectComposition::CApplicationChannel::ProcessCommandBufferIterator+0x5a5
  490. ffff8b8a`29aaea20 fffff5ad`bc81edfd : 00000000`00000000 0000020a`00000018 000000bf`c953e494 000000bf`c953e4e0 : win32kbase!NtDCompositionProcessChannelBatchBuffer+0x1a1
  491. ffff8b8a`29aaeac0 fffff800`549ef378 : ffff9501`bd87a000 ffff9501`bb5a1080 ffff8b8a`29aaeb80 ffff9501`00000000 : win32k!NtDCompositionProcessChannelBatchBuffer+0x15
  492. ffff8b8a`29aaeb00 00007ffb`19f83724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  493. 000000bf`c953e408 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`19f83724
  494. CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
  495. fffff5adbc8110cb-fffff5adbc8110d0 6 bytes - win32k!W32CalloutDispatchThunk+2b
  496. [ ff 15 8f 38 07 00:e8 d0 91 09 00 90 ]
  497. fffff5adbc81111f-fffff5adbc811124 6 bytes - win32k!W32CalloutDispatchThunk+7f (+0x54)
  498. [ ff 15 3b 38 07 00:e8 7c 91 09 00 90 ]
  499. fffff5adbc81113a-fffff5adbc81113f 6 bytes - win32k!W32CalloutDispatchThunk+9a (+0x1b)
  500. [ ff 15 20 38 07 00:e8 61 91 09 00 90 ]
  501. fffff5adbc811150-fffff5adbc811151 2 bytes - win32k!W32CalloutDispatchThunk+b0 (+0x16)
  502. [ 48 ff:4c 8b ]
  503. fffff5adbc811157-fffff5adbc81115a 4 bytes - win32k!W32CalloutDispatchThunk+b7 (+0x07)
  504. [ 0f 1f 44 00:e8 c4 92 09 ]
  505. fffff5adbc811177-fffff5adbc81117c 6 bytes - win32k!W32CalloutDispatchThunk+d7 (+0x20)
  506. [ ff 15 e3 37 07 00:e8 24 91 09 00 90 ]
  507. fffff5adbc811198-fffff5adbc811199 2 bytes - win32k!W32CalloutDispatchThunk+f8 (+0x21)
  508. [ 48 ff:4c 8b ]
  509. fffff5adbc81119f - win32k!W32CalloutDispatchThunk+ff (+0x07)
  510. [ 0f:e8 ]
  511. fffff5adbc8154b9 - win32k!NtUserDispatchMessage+15 (+0x431a)
  512. [ 00:90 ]
  513. fffff5adbc8154d8-fffff5adbc8154dd 6 bytes - win32k!NtUserDoSoundConnect+10 (+0x1f)
  514. [ ff 15 82 f4 06 00:e8 c3 4d 09 00 90 ]
  515. fffff5adbc815504-fffff5adbc815509 6 bytes - win32k!NtUserDoSoundDisconnect+10 (+0x2c)
  516. [ ff 15 56 f4 06 00:e8 97 4d 09 00 90 ]
  517. fffff5adbc815530-fffff5adbc815535 6 bytes - win32k!NtUserDragDetect+10 (+0x2c)
  518. [ ff 15 2a f4 06 00:e8 6b 4d 09 00 90 ]
  519. fffff5adbc81555e-fffff5adbc815563 6 bytes - win32k!NtUserDragObject+1a (+0x2e)
  520. [ ff 15 fc f3 06 00:e8 3d 4d 09 00 90 ]
  521. fffff5adbc815580-fffff5adbc815585 6 bytes - win32k!NtUserDrawAnimatedRects+10 (+0x22)
  522. [ ff 15 da f3 06 00:e8 1b 4d 09 00 90 ]
  523. fffff5adbc8155a4-fffff5adbc8155a9 6 bytes - win32k!NtUserDrawCaption+10 (+0x24)
  524. [ ff 15 b6 f3 06 00:e8 f7 4c 09 00 90 ]
  525. 70 errors : !win32k (fffff5adbc8110cb-fffff5adbc8155a9)
  526. MODULE_NAME: memory_corruption
  527.  
  528. IMAGE_NAME: memory_corruption
  529.  
  530. FOLLOWUP_NAME: memory_corruption
  531. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  532. MEMORY_CORRUPTOR: LARGE
  533. STACK_COMMAND: .cxr 0xffff8b8a29aada50 ; kb
  534. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  535. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  536. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  537. TARGET_TIME: 2020-07-23T13:47:39.000Z
  538. SUITE_MASK: 272
  539. PRODUCT_TYPE: 1
  540. USER_LCID: 0
  541. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  542. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  543. Followup: memory_corruption
  544.  
  545. ====================== Dump #2: 3RD PARTY DRIVERS ======================
  546.  
  547. Mar 14 2016 - amdgpio3.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  548. Mar 19 2019 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  549. May 14 2019 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
  550. Oct 02 2019 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  551. Nov 18 2019 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  552. Jan 14 2020 - amdgpio2.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  553. Mar 06 2020 - amdpsp.sys - Advanced Micro Devices, Inc http://support.amd.com/
  554. Apr 10 2020 - AMDPCIDev.sys - Advanced Micro Devices PCI Device driver
  555.  
  556. ================== Dump #2: 3RD PARTY DRIVERS (FULL) ===================
  557.  
  558. Image path: \SystemRoot\System32\drivers\amdgpio3.sys
  559. Image name: amdgpio3.sys
  560. Search : https://www.google.com/search?q=amdgpio3.sys
  561. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  562. Timestamp : Mon Mar 14 2016
  563.  
  564. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  565. Image name: nvhda64v.sys
  566. Search : https://www.google.com/search?q=nvhda64v.sys
  567. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  568. Timestamp : Tue Mar 19 2019
  569.  
  570. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  571. Image name: RTKVHD64.sys
  572. Search : https://www.google.com/search?q=RTKVHD64.sys
  573. ADA Info : Realtek Audio System driver https://www.realtek.com/en/
  574. Timestamp : Tue May 14 2019
  575.  
  576. Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_90685a092bcf58c7\nvlddmkm.sys
  577. Image name: nvlddmkm.sys
  578. Search : https://www.google.com/search?q=nvlddmkm.sys
  579. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  580. Timestamp : Wed Oct 2 2019
  581.  
  582. Image path: \SystemRoot\System32\drivers\rt640x64.sys
  583. Image name: rt640x64.sys
  584. Search : https://www.google.com/search?q=rt640x64.sys
  585. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  586. Timestamp : Mon Nov 18 2019
  587.  
  588. Image path: \SystemRoot\System32\drivers\amdgpio2.sys
  589. Image name: amdgpio2.sys
  590. Search : https://www.google.com/search?q=amdgpio2.sys
  591. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  592. Timestamp : Tue Jan 14 2020
  593.  
  594. Image path: \SystemRoot\system32\DRIVERS\amdpsp.sys
  595. Image name: amdpsp.sys
  596. Search : https://www.google.com/search?q=amdpsp.sys
  597. ADA Info : Advanced Micro Devices, Inc http://support.amd.com/
  598. Timestamp : Fri Mar 6 2020
  599.  
  600. Image path: \SystemRoot\System32\drivers\AMDPCIDev.sys
  601. Image name: AMDPCIDev.sys
  602. Search : https://www.google.com/search?q=AMDPCIDev.sys
  603. ADA Info : Advanced Micro Devices PCI Device driver
  604. Timestamp : Fri Apr 10 2020
  605.  
  606. ====================== Dump #2: MICROSOFT DRIVERS ======================
  607.  
  608. ACPI.sys ACPI Driver for NT (Microsoft)
  609. acpiex.sys ACPIEx Driver (Microsoft)
  610. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  611. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  612. ahcache.sys Application Compatibility Cache (Microsoft)
  613. amdppm.sys Processor Device Driver
  614. bam.sys BAM Kernal driver (Microsoft)
  615. BasicDisplay.sys Basic Display driver (Microsoft)
  616. BasicRender.sys Basic Render driver (Microsoft)
  617. Beep.SYS BEEP driver (Microsoft)
  618. bindflt.sys Windows Bind Filter driver (Microsoft)
  619. BOOTVID.dll VGA Boot Driver (Microsoft)
  620. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  621. cdd.dll Canonical Display Driver (Microsoft)
  622. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  623. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  624. CI.dll Code Integrity Module (Microsoft)
  625. CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
  626. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  627. cldflt.sys Cloud Files Mini Filter driver (Microsoft)
  628. CLFS.SYS Common Log File System Driver (Microsoft)
  629. clipsp.sys CLIP Service (Microsoft)
  630. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  631. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  632. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  633. crashdmp.sys Crash Dump driver (Microsoft)
  634. csc.sys Windows Client Side Caching driver (Microsoft)
  635. dfsc.sys DFS Namespace Client Driver (Microsoft)
  636. disk.sys PnP Disk Driver (Microsoft)
  637. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  638. dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  639. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  640. dump_storahci.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  641. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  642. dxgmms2.sys DirectX Graphics MMS
  643. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  644. fastfat.SYS Fast FAT File System Driver (Microsoft)
  645. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  646. fileinfo.sys FileInfo Filter Driver (Microsoft)
  647. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  648. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  649. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  650. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  651. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  652. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  653. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  654. HIDCLASS.SYS Hid Class Library (Microsoft)
  655. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  656. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  657. HTTP.sys HTTP Protocol Stack (Microsoft)
  658. intelpep.sys Intel Power Engine Plugin (Microsoft)
  659. IntelTA.sys Intel Telemetry Driver
  660. iorate.sys I/O rate control Filter (Microsoft)
  661. kbdclass.sys Keyboard Class Driver (Microsoft)
  662. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  663. kd.dll Local Kernal Debugger (Microsoft)
  664. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  665. ks.sys Kernal CSA Library (Microsoft)
  666. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  667. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  668. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  669. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  670. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  671. mcupdate_AuthenticAMD.dll AMD Microcode Update Library (Microsoft)
  672. mmcss.sys MMCSS Driver (Microsoft)
  673. monitor.sys Monitor Driver (Microsoft)
  674. mouclass.sys Mouse Class Driver (Microsoft)
  675. mouhid.sys HID Mouse Filter Driver (Microsoft)
  676. mountmgr.sys Mount Point Manager (Microsoft)
  677. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  678. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  679. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  680. Msfs.SYS Mailslot driver (Microsoft)
  681. msgpioclx.sys GPIO Class Extension Driver (Microsoft)
  682. msisadrv.sys ISA Driver (Microsoft)
  683. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  684. msquic.sys Windows QUIC Driver
  685. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  686. mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
  687. mssmbios.sys System Management BIOS driver (Microsoft)
  688. mup.sys Multiple UNC Provider driver (Microsoft)
  689. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  690. ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
  691. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  692. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  693. netbios.sys NetBIOS Interface driver (Microsoft)
  694. netbt.sys MBT Transport driver (Microsoft)
  695. NETIO.SYS Network I/O Subsystem (Microsoft)
  696. Npfs.SYS NPFS driver (Microsoft)
  697. npsvctrig.sys Named pipe service triggers (Microsoft)
  698. nsiproxy.sys NSI Proxy driver (Microsoft)
  699. Ntfs.sys NT File System Driver (Microsoft)
  700. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  701. ntosext.sys NTOS Extension Host driver (Microsoft)
  702. Null.SYS NULL Driver (Microsoft)
  703. pacer.sys QoS Packet Scheduler (Microsoft)
  704. parport.sys Parallel Port Driver (Microsoft)
  705. partmgr.sys Partition driver (Microsoft)
  706. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  707. pcw.sys Performance Counter Driver (Microsoft)
  708. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  709. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  710. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  711. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  712. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  713. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  714. rdyboost.sys ReadyBoost Driver (Microsoft)
  715. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  716. serenum.sys Serial Port Enumerator (Microsoft)
  717. serial.sys Serial Device Driver
  718. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  719. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  720. spaceport.sys Storage Spaces driver (Microsoft)
  721. srv2.sys Smb 2.0 Server driver (Microsoft)
  722. srvnet.sys Server Network driver (Microsoft)
  723. storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
  724. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  725. storqosflt.sys Storage QoS Filter driver (Microsoft)
  726. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  727. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  728. tcpip.sys TCP/IP Protocol driver (Microsoft)
  729. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  730. TDI.SYS TDI Wrapper driver (Microsoft)
  731. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  732. tm.sys Kernel Transaction Manager driver (Microsoft)
  733. ucx01000.sys USB Controller Extension (Microsoft)
  734. UEFI.sys UEFI NT driver (Microsoft)
  735. umbus.sys User-Mode Bus Enumerator (Microsoft)
  736. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  737. USBD.SYS Universal Serial Bus Driver (Microsoft)
  738. UsbHub3.sys USB3 HUB driver (Microsoft)
  739. USBXHCI.SYS USB XHCI driver (Microsoft)
  740. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  741. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  742. volmgr.sys Volume Manager Driver (Microsoft)
  743. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  744. volsnap.sys Volume Shadow Copy driver (Microsoft)
  745. volume.sys Volume driver (Microsoft)
  746. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  747. watchdog.sys Watchdog driver (Microsoft)
  748. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  749. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  750. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  751. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  752. WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
  753. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  754. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  755. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  756. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  757. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  758. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  759. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  760. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  761. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  762. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  763. Wof.sys Windows Overlay Filter (Microsoft)
  764. WpdUpFltr.sys Portable Device Upper Class Filter driver (Microsoft)
  765. WppRecorder.sys WPP Trace Recorder (Microsoft)
  766. WUDFRd.sys Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft)
  767.  
  768. ====================== Dump #2: UNLOADED MODULES =======================
  769.  
  770. fffff800`61d90000 fffff800`61d9f000 dump_storpor
  771. fffff800`61400000 fffff800`61433000 dump_storahc
  772. fffff800`61460000 fffff800`6147e000 dump_dumpfve
  773. fffff800`61e30000 fffff800`61e4c000 dam.sys
  774. fffff800`58000000 fffff800`58011000 WdBoot.sys
  775. fffff800`59090000 fffff800`590a0000 hwpolicy.sys
  776.  
  777. ====================== Dump #2: BIOS INFORMATION =======================
  778.  
  779. sysinfo: could not find necessary interfaces.
  780. sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
  781.  
  782. ========================== Dump #2: Extra #1 ===========================
  783.  
  784. 3: kd> !verifier
  785. Verify Flags Level 0x00000000
  786. STANDARD FLAGS:
  787. [X] (0x00000000) Automatic Checks
  788. [ ] (0x00000001) Special pool
  789. [ ] (0x00000002) Force IRQL checking
  790. [ ] (0x00000008) Pool tracking
  791. [ ] (0x00000010) I/O verification
  792. [ ] (0x00000020) Deadlock detection
  793. [ ] (0x00000080) DMA checking
  794. [ ] (0x00000100) Security checks
  795. [ ] (0x00000800) Miscellaneous checks
  796. [ ] (0x00020000) DDI compliance checking
  797. ADDITIONAL FLAGS:
  798. [ ] (0x00000004) Randomized low resources simulation
  799. [ ] (0x00000200) Force pending I/O requests
  800. [ ] (0x00000400) IRP logging
  801. [ ] (0x00002000) Invariant MDL checking for stack
  802. [ ] (0x00004000) Invariant MDL checking for driver
  803. [ ] (0x00008000) Power framework delay fuzzing
  804. [ ] (0x00010000) Port/miniport interface checking
  805. [ ] (0x00040000) Systematic low resources simulation
  806. [ ] (0x00080000) DDI compliance checking (additional)
  807. [ ] (0x00200000) NDIS/WIFI verification
  808. [ ] (0x00800000) Kernel synchronization delay fuzzing
  809. [ ] (0x01000000) VM switch verification
  810. [ ] (0x02000000) Code integrity checks
  811. [X] Indicates flag is enabled
  812. Summary of All Verifier Statistics
  813. RaiseIrqls 0x0
  814. AcquireSpinLocks 0x0
  815. Synch Executions 0x0
  816. Trims 0x0
  817. Pool Allocations Attempted 0x0
  818. Pool Allocations Succeeded 0x0
  819. Pool Allocations Succeeded SpecialPool 0x0
  820. Pool Allocations With NO TAG 0x0
  821. Pool Allocations Failed 0x0
  822. Current paged pool allocations 0x0 for 00000000 bytes
  823. Peak paged pool allocations 0x0 for 00000000 bytes
  824. Current nonpaged pool allocations 0x0 for 00000000 bytes
  825. Peak nonpaged pool allocations 0x0 for 00000000 bytes
  826.  
  827. ========================== Dump #2: Extra #2 ===========================
  828.  
  829. 3: kd> !thread
  830. THREAD ffff9501bd87a080 Cid 17b8.1c60 Teb: 000000bfc4c74000 Win32Thread: ffff9501bd6e9bd0 RUNNING on processor 3
  831. Not impersonating
  832. GetUlongFromAddress: unable to read from fffff8005521143c
  833. Owning Process ffff9501bb44f080 Image: SearchApp.exe
  834. Attached Process N/A Image: N/A
  835. fffff78000000000: Unable to get shared data
  836. Wait Start TickCount 5415
  837. Context Switch Count 206 IdealProcessor: 0
  838. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  839. UserTime 00:00:00.000
  840. KernelTime 00:00:00.000
  841. Win32 Start Address 0x00007ffaf8238e00
  842. Stack Init ffff8b8a29aaec90 Current ffff8b8a29aae120
  843. Base ffff8b8a29aaf000 Limit ffff8b8a29aa9000 Call 0000000000000000
  844. Priority 11 BasePriority 8 PriorityDecrement 2 IoPriority 2 PagePriority 5
  845. Scheduling Group: ffff9501b8944090 <Cannot find Rank field of nt!_KSCB> KSCB: ffff9501b8944608 rank 0
  846. Child-SP RetAddr : Args to Child : Call Site
  847. ffff8b8a`29aad148 fffff800`549ef929 : 00000000`0000003b 00000000`c0000094 fffff5ad`bcb8e88d ffff8b8a`29aada50 : nt!KeBugCheckEx
  848. ffff8b8a`29aad150 fffff800`549eed7c : ffff8b8a`29aad8f0 fffff800`546e68e0 ffff8b8a`29aad340 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  849. ffff8b8a`29aad290 fffff800`549e68e2 : fffff800`549eed00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceHandler+0x7c
  850. ffff8b8a`29aad2d0 fffff800`54832fb7 : ffff8b8a`29aad840 00000000`00000000 ffff8b8a`29aaeb00 fffff800`549ef378 : nt!RtlpExecuteHandlerForException+0x12
  851. ffff8b8a`29aad300 fffff800`5487b226 : ffff8b8a`29aae218 ffff8b8a`29aadf50 ffff8b8a`29aae218 fffff5ce`80609620 : nt!RtlDispatchException+0x297
  852. ffff8b8a`29aada20 fffff800`549efa6c : ffff8b8a`29aae4f4 00000000`00000000 ffff8b8a`29aae278 ffffe406`0cb4e770 : nt!KiDispatchException+0x186
  853. ffff8b8a`29aae0e0 fffff800`549e870a : 00000000`00000001 00001000`00000001 000860f6`be34ffff 00000000`54cf27ff : nt!KiExceptionDispatch+0x12c
  854. ffff8b8a`29aae2c0 fffff5ad`bcb8e88d : 00000000`00000000 ffff9501`bbc68cf0 00000000`00000000 00000000`00000000 : nt!KiDivideErrorFault+0x30a (TrapFrame @ ffff8b8a`29aae2c0)
  855. ffff8b8a`29aae450 fffff5ad`bcb7d0f8 : fffff5ce`80609620 00100000`00000000 fffff5ce`80608ec0 ffffc07a`96200000 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x219
  856. ffff8b8a`29aae480 fffff5ad`bcb7d056 : ffff8b8a`29aae610 fffff5ce`80608ec0 ffff9501`bbc68c90 00000000`0000006b : win32kbase!DirectComposition::CSystemChannel::ReleaseSystemResource+0x34
  857. ffff8b8a`29aae4b0 fffff5ad`bcb7aabd : ffff9501`bd025cf8 00000000`00000000 00000000`00000060 00000000`00000000 : win32kbase!DirectComposition::CConnection::ReleaseSystemResource+0x4a
  858. ffff8b8a`29aae4e0 fffff5ad`bcbbe84d : fffff5ce`80200340 fffff5ce`80201880 fffff5ce`80201ac0 00000000`00000060 : win32kbase!DirectComposition::CSharedSystemResource::Delete+0x2d
  859. ffff8b8a`29aae510 fffff5ad`bc8110d0 : 00000000`c000001c fffff5ce`80602080 00000000`756d4344 ffff8b8a`29aae7f8 : win32kbase!W32CalloutDispatch+0x5fd
  860. ffff8b8a`29aae720 fffff800`54c613a9 : ffff8b8a`29aae7f8 00000000`00000015 fffff800`5521de80 ffff8b8a`29aae940 : win32k!W32CalloutDispatchThunk+0x30
  861. ffff8b8a`29aae760 fffff800`54c6172d : 00000000`00000015 ffff8b8a`29aae7e0 00000000`00000000 ffffc07a`96200000 : nt!ExCallCallBack+0x3d
  862. ffff8b8a`29aae790 fffff800`54d03326 : ffff9501`bd025cb0 ffff8b8a`29aae7e0 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0xbd
  863. ffff8b8a`29aae7c0 fffff800`54c0c2f0 : ffff9501`00000001 ffff9501`bd025ce0 00000000`00000024 fffff5ad`bcb8e2ca : nt!ExpWin32DeleteProcedure+0x76
  864. ffff8b8a`29aae7f0 fffff800`54824e97 : 00000000`00000000 00000000`00000000 fffff5ce`85fb8bb0 ffff9501`bd025ce0 : nt!ObpRemoveObjectRoutine+0x80
  865. ffff8b8a`29aae850 fffff800`5480198e : fffff5ce`80768330 00000000`00000000 fffff5ad`bcc009c0 ffffc07a`96200000 : nt!ObfDereferenceObjectWithTag+0xc7
  866. ffff8b8a`29aae890 fffff5ad`bcc009ec : fffff5ce`841d0020 ffff8b8a`29aae9b1 ffff8b8a`29aae9b1 ffff8b8a`29aae940 : nt!HalPutDmaAdapter+0xe
  867. ffff8b8a`29aae8c0 fffff5ad`bcb8e78f : fffff5ce`80768330 fffff5ad`bcc01011 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CSharedInteractionMarshaler::ReleaseAllReferences+0x2c
  868. ffff8b8a`29aae8f0 fffff5ad`bcb8e62a : 00000000`00000000 fffff5ad`bcc00fc4 fffff5ce`841d0008 ffff8b8a`29aaea39 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x11b
  869. ffff8b8a`29aae920 fffff5ad`bcb8cfd5 : fffff5ce`85fb8bb0 ffff8b8a`29aaeb80 fffff5ce`841d0008 fffff800`54822a59 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x82
  870. ffff8b8a`29aae960 fffff5ad`bcb8c971 : fffff5ce`85fb8bb0 00000000`00000000 00000000`00000000 ffff9501`bd806e01 : win32kbase!DirectComposition::CApplicationChannel::ProcessCommandBufferIterator+0x5a5
  871. ffff8b8a`29aaea20 fffff5ad`bc81edfd : 00000000`00000000 0000020a`00000018 000000bf`c953e494 000000bf`c953e4e0 : win32kbase!NtDCompositionProcessChannelBatchBuffer+0x1a1
  872. ffff8b8a`29aaeac0 fffff800`549ef378 : ffff9501`bd87a000 ffff9501`bb5a1080 ffff8b8a`29aaeb80 ffff9501`00000000 : win32k!NtDCompositionProcessChannelBatchBuffer+0x15
  873. ffff8b8a`29aaeb00 00007ffb`19f83724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 (TrapFrame @ ffff8b8a`29aaeb00)
  874. 000000bf`c953e408 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`19f83724
  875.  
  876.  
  877. ========================================================================
  878. ======================= Dump #3: ANALYZE VERBOSE =======================
  879. ======================= File: 072320-6812-01.dmp =======================
  880. ========================================================================
  881.  
  882. Mini Kernel Dump File: Only registers and stack trace are available
  883. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  884. Kernel base = 0xfffff803`3b200000 PsLoadedModuleList = 0xfffff803`3be2a250
  885. Debug session time: Thu Jul 23 10:04:45.468 2020 (UTC - 4:00)
  886. System Uptime: 0 days 0:04:43.126
  887.  
  888. BugCheck 139, {3, ffffef09610fb750, ffffef09610fb6a8, 0}
  889. Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
  890. Followup: MachineOwner
  891.  
  892. KERNEL_SECURITY_CHECK_FAILURE (139)
  893. A kernel component has corrupted a critical data structure. The corruption
  894. could potentially allow a malicious user to gain control of this machine.
  895.  
  896. Arguments:
  897. Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
  898. Arg2: ffffef09610fb750, Address of the trap frame for the exception that caused the bugcheck
  899. Arg3: ffffef09610fb6a8, Address of the exception record for the exception that caused the bugcheck
  900. Arg4: 0000000000000000, Reserved
  901.  
  902. Debugging Details:
  903. DUMP_CLASS: 1
  904. DUMP_QUALIFIER: 400
  905. DUMP_TYPE: 2
  906. DUMP_FILE_ATTRIBUTES: 0x8
  907. Kernel Generated Triage Dump
  908. TRAP_FRAME: ffffef09610fb750 -- (.trap 0xffffef09610fb750)
  909. NOTE: The trap frame does not contain all registers.
  910. Some register values may be zeroed or incorrect.
  911. rax=ffffdf034808e378 rbx=0000000000000000 rcx=0000000000000003
  912. rdx=ffffdf03484763b8 rsi=0000000000000000 rdi=0000000000000000
  913. rip=fffff8033b40a30b rsp=ffffef09610fb8e0 rbp=ffffdf0346f19240
  914. r8=0000000000000001 r9=0000000000000000 r10=0000fffff8033b00
  915. r11=ffffaa0088b28180 r12=0000000000000000 r13=0000000000000000
  916. r14=0000000000000000 r15=0000000000000000
  917. iopl=0 nv up ei ng nz na po cy
  918. nt!KeTerminateThread+0x31f:
  919. fffff803`3b40a30b cd29 int 29h
  920. Resetting default scope
  921. EXCEPTION_RECORD: ffffef09610fb6a8 -- (.exr 0xffffef09610fb6a8)
  922. ExceptionAddress: fffff8033b40a30b (nt!KeTerminateThread+0x000000000000031f)
  923. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  924. ExceptionFlags: 00000001
  925. NumberParameters: 1
  926. Parameter[0]: 0000000000000003
  927. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
  928. CUSTOMER_CRASH_COUNT: 1
  929. DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
  930. BUGCHECK_STR: 0x139
  931. CURRENT_IRQL: 2
  932. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  933. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  934. EXCEPTION_CODE_STR: c0000409
  935. EXCEPTION_PARAMETER1: 0000000000000003
  936. LAST_CONTROL_TRANSFER: from fffff8033b5ef929 to fffff8033b5dda20
  937. STACK_TEXT:
  938. ffffef09`610fb428 fffff803`3b5ef929 : 00000000`00000139 00000000`00000003 ffffef09`610fb750 ffffef09`610fb6a8 : nt!KeBugCheckEx
  939. ffffef09`610fb430 fffff803`3b5efd50 : ffffdf03`484d7080 fffff803`3b5e47a6 00000000`00000000 fffff803`3b5e4475 : nt!KiBugCheckDispatch+0x69
  940. ffffef09`610fb570 fffff803`3b5ee0e3 : ffffffff`ffffffff 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiFastFailDispatch+0xd0
  941. ffffef09`610fb750 fffff803`3b40a30b : ffffdf03`48485080 fffff803`00000000 ffffdf03`00000000 ffffdf03`48485080 : nt!KiRaiseSecurityCheckFailure+0x323
  942. ffffef09`610fb8e0 fffff803`3b7e8ac5 : ffffdf03`484854b8 00000000`00000000 000000c1`fd125000 00000000`00000000 : nt!KeTerminateThread+0x31f
  943. ffffef09`610fb970 fffff803`3b7e8003 : 00000000`00000000 ffffdf03`46bc2500 00000000`00000000 000000c1`fd125000 : nt!PspExitThread+0x489
  944. ffffef09`610fba70 fffff803`3b7e7f8a : 00000000`00000000 00000000`00000000 ffffdf03`48485080 ffffdf03`46bc25e0 : nt!PspTerminateThreadByPointer+0x53
  945. ffffef09`610fbab0 fffff803`3b5ef378 : 00000000`00000000 ffffdf03`48485080 ffffef09`610fbb80 ffffdf03`00000000 : nt!NtTerminateThread+0x4a
  946. ffffef09`610fbb00 00007ff8`a824b7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  947. 000000c1`fd8ff478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a824b7f4
  948. STACK_COMMAND: kb
  949. THREAD_SHA1_HASH_MOD_FUNC: bc28c396bd6d9725c9c176d532b910141b010cf2
  950. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5e9b277f9e54f456a521b75c48f0a73a1f695eb
  951. THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
  952. FOLLOWUP_IP:
  953. nt!KiFastFailDispatch+d0
  954. fffff803`3b5efd50 c644242000 mov byte ptr [rsp+20h],0
  955. FAULT_INSTR_CODE: 202444c6
  956. SYMBOL_STACK_INDEX: 2
  957. SYMBOL_NAME: nt!KiFastFailDispatch+d0
  958. FOLLOWUP_NAME: MachineOwner
  959. MODULE_NAME: nt
  960.  
  961. IMAGE_NAME: ntkrnlmp.exe
  962.  
  963. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  964. IMAGE_VERSION: 10.0.19041.264
  965. BUCKET_ID_FUNC_OFFSET: d0
  966. FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
  967. BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
  968. PRIMARY_PROBLEM_CLASS: 0x139_3_nt!KiFastFailDispatch
  969. TARGET_TIME: 2020-07-23T14:04:45.000Z
  970. SUITE_MASK: 272
  971. PRODUCT_TYPE: 1
  972. USER_LCID: 0
  973. FAILURE_ID_HASH_STRING: km:0x139_3_nt!kifastfaildispatch
  974. FAILURE_ID_HASH: {36173680-6f08-995f-065a-3d368c996911}
  975. Followup: MachineOwner
  976.  
  977. ====================== Dump #3: 3RD PARTY DRIVERS ======================
  978.  
  979. Mar 14 2016 - amdgpio3.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  980. Mar 19 2019 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  981. May 14 2019 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
  982. Oct 02 2019 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  983. Nov 18 2019 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  984. Jan 14 2020 - amdgpio2.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  985. Mar 06 2020 - amdpsp.sys - Advanced Micro Devices, Inc http://support.amd.com/
  986. Apr 10 2020 - AMDPCIDev.sys - Advanced Micro Devices PCI Device driver
  987.  
  988. ================== Dump #3: 3RD PARTY DRIVERS (FULL) ===================
  989.  
  990. Image name: amdgpio3.sys
  991. Search : https://www.google.com/search?q=amdgpio3.sys
  992. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  993. Timestamp : Mon Mar 14 2016
  994.  
  995. Image name: nvhda64v.sys
  996. Search : https://www.google.com/search?q=nvhda64v.sys
  997. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  998. Timestamp : Tue Mar 19 2019
  999.  
  1000. Image name: RTKVHD64.sys
  1001. Search : https://www.google.com/search?q=RTKVHD64.sys
  1002. ADA Info : Realtek Audio System driver https://www.realtek.com/en/
  1003. Timestamp : Tue May 14 2019
  1004.  
  1005. Image name: nvlddmkm.sys
  1006. Search : https://www.google.com/search?q=nvlddmkm.sys
  1007. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  1008. Timestamp : Wed Oct 2 2019
  1009.  
  1010. Image name: rt640x64.sys
  1011. Search : https://www.google.com/search?q=rt640x64.sys
  1012. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  1013. Timestamp : Mon Nov 18 2019
  1014.  
  1015. Image name: amdgpio2.sys
  1016. Search : https://www.google.com/search?q=amdgpio2.sys
  1017. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  1018. Timestamp : Tue Jan 14 2020
  1019.  
  1020. Image name: amdpsp.sys
  1021. Search : https://www.google.com/search?q=amdpsp.sys
  1022. ADA Info : Advanced Micro Devices, Inc http://support.amd.com/
  1023. Timestamp : Fri Mar 6 2020
  1024.  
  1025. Image name: AMDPCIDev.sys
  1026. Search : https://www.google.com/search?q=AMDPCIDev.sys
  1027. ADA Info : Advanced Micro Devices PCI Device driver
  1028. Timestamp : Fri Apr 10 2020
  1029.  
  1030. ====================== Dump #3: MICROSOFT DRIVERS ======================
  1031.  
  1032. ACPI.sys ACPI Driver for NT (Microsoft)
  1033. acpiex.sys ACPIEx Driver (Microsoft)
  1034. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  1035. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  1036. ahcache.sys Application Compatibility Cache (Microsoft)
  1037. amdppm.sys Processor Device Driver
  1038. bam.sys BAM Kernal driver (Microsoft)
  1039. BasicDisplay.sys Basic Display driver (Microsoft)
  1040. BasicRender.sys Basic Render driver (Microsoft)
  1041. Beep.SYS BEEP driver (Microsoft)
  1042. bindflt.sys Windows Bind Filter driver (Microsoft)
  1043. BOOTVID.dll VGA Boot Driver (Microsoft)
  1044. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  1045. cdd.dll Canonical Display Driver (Microsoft)
  1046. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  1047. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  1048. CI.dll Code Integrity Module (Microsoft)
  1049. CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
  1050. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  1051. cldflt.sys Cloud Files Mini Filter driver (Microsoft)
  1052. CLFS.SYS Common Log File System Driver (Microsoft)
  1053. clipsp.sys CLIP Service (Microsoft)
  1054. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  1055. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  1056. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  1057. condrv.sys Console Driver (Microsoft)
  1058. crashdmp.sys Crash Dump driver (Microsoft)
  1059. csc.sys Windows Client Side Caching driver (Microsoft)
  1060. dfsc.sys DFS Namespace Client Driver (Microsoft)
  1061. disk.sys PnP Disk Driver (Microsoft)
  1062. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  1063. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  1064. dump_storahci.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  1065. dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
  1066. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  1067. dxgmms2.sys DirectX Graphics MMS
  1068. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  1069. fastfat.SYS Fast FAT File System Driver (Microsoft)
  1070. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  1071. fileinfo.sys FileInfo Filter Driver (Microsoft)
  1072. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  1073. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  1074. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  1075. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  1076. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  1077. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  1078. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  1079. HIDCLASS.SYS Hid Class Library (Microsoft)
  1080. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  1081. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  1082. HTTP.sys HTTP Protocol Stack (Microsoft)
  1083. intelpep.sys Intel Power Engine Plugin (Microsoft)
  1084. IntelTA.sys Intel Telemetry Driver
  1085. iorate.sys I/O rate control Filter (Microsoft)
  1086. kbdclass.sys Keyboard Class Driver (Microsoft)
  1087. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  1088. kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
  1089. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  1090. ks.sys Kernal CSA Library (Microsoft)
  1091. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  1092. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  1093. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  1094. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  1095. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  1096. mcupdate.dll Media Center Update (Microsoft)
  1097. mmcss.sys MMCSS Driver (Microsoft)
  1098. monitor.sys Monitor Driver (Microsoft)
  1099. mouclass.sys Mouse Class Driver (Microsoft)
  1100. mouhid.sys HID Mouse Filter Driver (Microsoft)
  1101. mountmgr.sys Mount Point Manager (Microsoft)
  1102. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  1103. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  1104. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  1105. Msfs.SYS Mailslot driver (Microsoft)
  1106. msgpioclx.sys GPIO Class Extension Driver (Microsoft)
  1107. msisadrv.sys ISA Driver (Microsoft)
  1108. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  1109. msquic.sys Windows QUIC Driver
  1110. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  1111. mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
  1112. mssmbios.sys System Management BIOS driver (Microsoft)
  1113. mup.sys Multiple UNC Provider driver (Microsoft)
  1114. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  1115. ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
  1116. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  1117. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  1118. netbios.sys NetBIOS Interface driver (Microsoft)
  1119. netbt.sys MBT Transport driver (Microsoft)
  1120. NETIO.SYS Network I/O Subsystem (Microsoft)
  1121. Npfs.SYS NPFS driver (Microsoft)
  1122. npsvctrig.sys Named pipe service triggers (Microsoft)
  1123. nsiproxy.sys NSI Proxy driver (Microsoft)
  1124. Ntfs.sys NT File System Driver (Microsoft)
  1125. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  1126. ntosext.sys NTOS Extension Host driver (Microsoft)
  1127. Null.SYS NULL Driver (Microsoft)
  1128. pacer.sys QoS Packet Scheduler (Microsoft)
  1129. parport.sys Parallel Port Driver (Microsoft)
  1130. partmgr.sys Partition driver (Microsoft)
  1131. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  1132. pcw.sys Performance Counter Driver (Microsoft)
  1133. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  1134. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  1135. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  1136. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  1137. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  1138. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  1139. rdyboost.sys ReadyBoost Driver (Microsoft)
  1140. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  1141. serenum.sys Serial Port Enumerator (Microsoft)
  1142. serial.sys Serial Device Driver
  1143. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  1144. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  1145. spaceport.sys Storage Spaces driver (Microsoft)
  1146. srv2.sys Smb 2.0 Server driver (Microsoft)
  1147. srvnet.sys Server Network driver (Microsoft)
  1148. storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
  1149. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  1150. storqosflt.sys Storage QoS Filter driver (Microsoft)
  1151. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  1152. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  1153. tcpip.sys TCP/IP Protocol driver (Microsoft)
  1154. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  1155. TDI.SYS TDI Wrapper driver (Microsoft)
  1156. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  1157. tm.sys Kernel Transaction Manager driver (Microsoft)
  1158. ucx01000.sys USB Controller Extension (Microsoft)
  1159. UEFI.sys UEFI NT driver (Microsoft)
  1160. umbus.sys User-Mode Bus Enumerator (Microsoft)
  1161. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  1162. USBD.SYS Universal Serial Bus Driver (Microsoft)
  1163. UsbHub3.sys USB3 HUB driver (Microsoft)
  1164. USBXHCI.SYS USB XHCI driver (Microsoft)
  1165. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  1166. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  1167. volmgr.sys Volume Manager Driver (Microsoft)
  1168. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  1169. volsnap.sys Volume Shadow Copy driver (Microsoft)
  1170. volume.sys Volume driver (Microsoft)
  1171. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  1172. watchdog.sys Watchdog driver (Microsoft)
  1173. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  1174. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  1175. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  1176. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  1177. WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
  1178. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  1179. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  1180. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  1181. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  1182. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  1183. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  1184. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  1185. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  1186. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  1187. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  1188. Wof.sys Windows Overlay Filter (Microsoft)
  1189. WppRecorder.sys WPP Trace Recorder (Microsoft)
  1190.  
  1191. ====================== Dump #3: UNLOADED MODULES =======================
  1192.  
  1193. fffff803`48a30000 fffff803`48a3f000 dump_storpor
  1194. fffff803`48a80000 fffff803`48ab3000 dump_storahc
  1195. fffff803`48ae0000 fffff803`48afe000 dump_dumpfve
  1196. fffff803`49330000 fffff803`4934c000 dam.sys
  1197. fffff803`3f600000 fffff803`3f611000 WdBoot.sys
  1198. fffff803`40690000 fffff803`406a0000 hwpolicy.sys
  1199.  
  1200. ====================== Dump #3: BIOS INFORMATION =======================
  1201.  
  1202. sysinfo: could not find necessary interfaces.
  1203. sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
  1204.  
  1205. ========================== Dump #3: Extra #1 ===========================
  1206.  
  1207. 2: kd> !verifier
  1208. fffff8033be2a660: Unable to get verifier list.
  1209.  
  1210. ========================== Dump #3: Extra #2 ===========================
  1211.  
  1212. 2: kd> !thread
  1213. THREAD ffffdf0348485080 Cid 16cc.1a8c Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 2
  1214. Not impersonating
  1215. GetUlongFromAddress: unable to read from fffff8033be1143c
  1216. Owning Process ffffdf0346f19240 Image:
  1217. Attached Process N/A Image: N/A
  1218. fffff78000000000: Unable to get shared data
  1219. Wait Start TickCount 18120
  1220. Context Switch Count 476 IdealProcessor: 1
  1221. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  1222. UserTime 00:00:00.000
  1223. KernelTime 00:00:00.000
  1224. Win32 Start Address 0x00007ff8a81c20e0
  1225. Stack Init ffffef09610fbc90 Current ffffef09610fb540
  1226. Base ffffef09610fc000 Limit ffffef09610f6000 Call 0000000000000000
  1227. Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
  1228. Child-SP RetAddr : Args to Child : Call Site
  1229. ffffef09`610fb428 fffff803`3b5ef929 : 00000000`00000139 00000000`00000003 ffffef09`610fb750 ffffef09`610fb6a8 : nt!KeBugCheckEx
  1230. ffffef09`610fb430 fffff803`3b5efd50 : ffffdf03`484d7080 fffff803`3b5e47a6 00000000`00000000 fffff803`3b5e4475 : nt!KiBugCheckDispatch+0x69
  1231. ffffef09`610fb570 fffff803`3b5ee0e3 : ffffffff`ffffffff 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiFastFailDispatch+0xd0
  1232. ffffef09`610fb750 fffff803`3b40a30b : ffffdf03`48485080 fffff803`00000000 ffffdf03`00000000 ffffdf03`48485080 : nt!KiRaiseSecurityCheckFailure+0x323 (TrapFrame @ ffffef09`610fb750)
  1233. ffffef09`610fb8e0 fffff803`3b7e8ac5 : ffffdf03`484854b8 00000000`00000000 000000c1`fd125000 00000000`00000000 : nt!KeTerminateThread+0x31f
  1234. ffffef09`610fb970 fffff803`3b7e8003 : 00000000`00000000 ffffdf03`46bc2500 00000000`00000000 000000c1`fd125000 : nt!PspExitThread+0x489
  1235. ffffef09`610fba70 fffff803`3b7e7f8a : 00000000`00000000 00000000`00000000 ffffdf03`48485080 ffffdf03`46bc25e0 : nt!PspTerminateThreadByPointer+0x53
  1236. ffffef09`610fbab0 fffff803`3b5ef378 : 00000000`00000000 ffffdf03`48485080 ffffef09`610fbb80 ffffdf03`00000000 : nt!NtTerminateThread+0x4a
  1237. ffffef09`610fbb00 00007ff8`a824b7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 (TrapFrame @ ffffef09`610fbb00)
  1238. 000000c1`fd8ff478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a824b7f4
  1239.  
  1240.  
  1241. ========================================================================
  1242. ======================= Dump #4: ANALYZE VERBOSE =======================
  1243. ======================= File: 072320-6703-01.dmp =======================
  1244. ========================================================================
  1245.  
  1246. Mini Kernel Dump File: Only registers and stack trace are available
  1247. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  1248. Kernel base = 0xfffff804`55200000 PsLoadedModuleList = 0xfffff804`55e2a250
  1249. Debug session time: Thu Jul 23 10:06:36.976 2020 (UTC - 4:00)
  1250. System Uptime: 0 days 0:01:19.636
  1251.  
  1252. BugCheck 1A, {41792, ffff94bffffe13c0, 10000000000000, 0}
  1253. Probably caused by : memory_corruption ( ONE_BIT )
  1254. Followup: MachineOwner
  1255.  
  1256. MEMORY_MANAGEMENT (1a)
  1257. # Any other values for parameter 1 must be individually examined.
  1258.  
  1259. Arguments:
  1260. Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
  1261. the PTE. Parameters 3/4 contain the low/high parts of the PTE.
  1262. Arg2: ffff94bffffe13c0
  1263. Arg3: 0010000000000000
  1264. Arg4: 0000000000000000
  1265.  
  1266. Debugging Details:
  1267. DUMP_CLASS: 1
  1268. DUMP_QUALIFIER: 400
  1269. DUMP_TYPE: 2
  1270. DUMP_FILE_ATTRIBUTES: 0x8
  1271. Kernel Generated Triage Dump
  1272. MEMORY_CORRUPTOR: ONE_BIT
  1273. BUGCHECK_STR: 0x1a_41792
  1274. CUSTOMER_CRASH_COUNT: 1
  1275. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1276.  
  1277. PROCESS_NAME: browser_broker
  1278.  
  1279. CURRENT_IRQL: 2
  1280. STACK_TEXT:
  1281. fffffe02`8e02fc18 fffff804`5565418e : 00000000`0000001a 00000000`00041792 ffff94bf`fffe13c0 00100000`00000000 : nt!KeBugCheckEx
  1282. fffffe02`8e02fc20 fffff804`554119d1 : 00000000`00000003 ffff94bf`fffe1000 fffffe02`8e0300f0 00000000`00000003 : nt!MiDeleteVa+0x191e6e
  1283. fffffe02`8e02fd10 fffff804`55411cf0 : 00000000`00000000 ffff9605`059ec940 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
  1284. fffffe02`8e02fda0 fffff804`55411cf0 : 00000000`00000000 ffff9605`059ec940 ffff94ca`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
  1285. fffffe02`8e02fe30 fffff804`55411cf0 : fffffe02`8e0300f0 ffff9605`059ec940 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
  1286. fffffe02`8e02fec0 fffff804`5540e5fb : 00000000`00000000 ffff9605`059ec940 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
  1287. fffffe02`8e02ff50 fffff804`554c22d1 : fffffe02`8e0300f0 ffff9605`00000000 ffff94bf`00000002 fffffe02`00000000 : nt!MiWalkPageTables+0x36b
  1288. fffffe02`8e030050 fffff804`554a787f : 00000000`00000000 00000000`00000060 ffff9605`059eca00 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
  1289. fffffe02`8e0304d0 fffff804`557ea999 : ffff9605`059ec2c0 00000000`00000000 ffff9605`00000000 ffff9605`00000001 : nt!MiDeleteVad+0x41f
  1290. fffffe02`8e030600 fffff804`55866a00 : ffff9605`05cadbc0 ffff9605`03d43d10 ffff9605`0596a080 00000000`00000000 : nt!MiUnmapVad+0x49
  1291. fffffe02`8e030630 fffff804`558678b3 : ffff9605`05c79c80 ffff9605`05c79c80 ffff9605`05cadbc0 ffff9605`059ec2c0 : nt!MiCleanVad+0x30
  1292. fffffe02`8e030660 fffff804`558b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9605`059ec2c0 : nt!MmCleanProcessAddressSpace+0x137
  1293. fffffe02`8e0306e0 fffff804`557e8c32 : ffff9605`059ec2c0 ffff8002`2c6f0770 fffffe02`8e030920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
  1294. fffffe02`8e030760 fffff804`558f4c98 : 00000000`40010004 00000000`00000001 00000000`00000000 00000066`72f58000 : nt!PspExitThread+0x5f6
  1295. fffffe02`8e030860 fffff804`5542a4e7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
  1296. fffffe02`8e0308a0 fffff804`555e1fc0 : 00000000`00000000 fffffe02`8e030950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
  1297. fffffe02`8e030950 fffff804`555ef41f : 00000000`000001e0 00000000`00000000 00000000`00000000 ffff9605`05c4de60 : nt!KiInitiateUserApc+0x70
  1298. fffffe02`8e030a90 00007fff`fea8a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
  1299. 00000066`7307f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`fea8a104
  1300. STACK_COMMAND: kb
  1301. THREAD_SHA1_HASH_MOD_FUNC: c091b23167a9747ad03bff889b67c15ac126f525
  1302. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1ddc7aee47fd16b761fbaba61b7c38b17300b4a6
  1303. THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
  1304. SYMBOL_NAME: ONE_BIT
  1305. FOLLOWUP_NAME: MachineOwner
  1306. MODULE_NAME: hardware
  1307.  
  1308. IMAGE_NAME: memory_corruption
  1309.  
  1310. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1311. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
  1312. BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
  1313. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
  1314. TARGET_TIME: 2020-07-23T14:06:36.000Z
  1315. SUITE_MASK: 272
  1316. PRODUCT_TYPE: 1
  1317. USER_LCID: 0
  1318. FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
  1319. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
  1320. Followup: MachineOwner
  1321.  
  1322. ====================== Dump #4: 3RD PARTY DRIVERS ======================
  1323.  
  1324. Mar 14 2016 - amdgpio3.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  1325. Mar 19 2019 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  1326. May 14 2019 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
  1327. Oct 02 2019 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  1328. Nov 18 2019 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  1329. Jan 14 2020 - amdgpio2.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  1330. Mar 06 2020 - amdpsp.sys - Advanced Micro Devices, Inc http://support.amd.com/
  1331. Apr 10 2020 - AMDPCIDev.sys - Advanced Micro Devices PCI Device driver
  1332.  
  1333. ================== Dump #4: 3RD PARTY DRIVERS (FULL) ===================
  1334.  
  1335. Image name: amdgpio3.sys
  1336. Search : https://www.google.com/search?q=amdgpio3.sys
  1337. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  1338. Timestamp : Mon Mar 14 2016
  1339.  
  1340. Image name: nvhda64v.sys
  1341. Search : https://www.google.com/search?q=nvhda64v.sys
  1342. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  1343. Timestamp : Tue Mar 19 2019
  1344.  
  1345. Image name: RTKVHD64.sys
  1346. Search : https://www.google.com/search?q=RTKVHD64.sys
  1347. ADA Info : Realtek Audio System driver https://www.realtek.com/en/
  1348. Timestamp : Tue May 14 2019
  1349.  
  1350. Image name: nvlddmkm.sys
  1351. Search : https://www.google.com/search?q=nvlddmkm.sys
  1352. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  1353. Timestamp : Wed Oct 2 2019
  1354.  
  1355. Image name: rt640x64.sys
  1356. Search : https://www.google.com/search?q=rt640x64.sys
  1357. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  1358. Timestamp : Mon Nov 18 2019
  1359.  
  1360. Image name: amdgpio2.sys
  1361. Search : https://www.google.com/search?q=amdgpio2.sys
  1362. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  1363. Timestamp : Tue Jan 14 2020
  1364.  
  1365. Image name: amdpsp.sys
  1366. Search : https://www.google.com/search?q=amdpsp.sys
  1367. ADA Info : Advanced Micro Devices, Inc http://support.amd.com/
  1368. Timestamp : Fri Mar 6 2020
  1369.  
  1370. Image name: AMDPCIDev.sys
  1371. Search : https://www.google.com/search?q=AMDPCIDev.sys
  1372. ADA Info : Advanced Micro Devices PCI Device driver
  1373. Timestamp : Fri Apr 10 2020
  1374.  
  1375. ====================== Dump #4: MICROSOFT DRIVERS ======================
  1376.  
  1377. ACPI.sys ACPI Driver for NT (Microsoft)
  1378. acpiex.sys ACPIEx Driver (Microsoft)
  1379. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  1380. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  1381. ahcache.sys Application Compatibility Cache (Microsoft)
  1382. amdppm.sys Processor Device Driver
  1383. bam.sys BAM Kernal driver (Microsoft)
  1384. BasicDisplay.sys Basic Display driver (Microsoft)
  1385. BasicRender.sys Basic Render driver (Microsoft)
  1386. Beep.SYS BEEP driver (Microsoft)
  1387. bindflt.sys Windows Bind Filter driver (Microsoft)
  1388. BOOTVID.dll VGA Boot Driver (Microsoft)
  1389. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  1390. cdd.dll Canonical Display Driver (Microsoft)
  1391. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  1392. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  1393. CI.dll Code Integrity Module (Microsoft)
  1394. CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
  1395. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  1396. cldflt.sys Cloud Files Mini Filter driver (Microsoft)
  1397. CLFS.SYS Common Log File System Driver (Microsoft)
  1398. clipsp.sys CLIP Service (Microsoft)
  1399. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  1400. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  1401. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  1402. crashdmp.sys Crash Dump driver (Microsoft)
  1403. csc.sys Windows Client Side Caching driver (Microsoft)
  1404. dfsc.sys DFS Namespace Client Driver (Microsoft)
  1405. disk.sys PnP Disk Driver (Microsoft)
  1406. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  1407. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  1408. dump_storahci.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  1409. dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
  1410. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  1411. dxgmms2.sys DirectX Graphics MMS
  1412. fastfat.SYS Fast FAT File System Driver (Microsoft)
  1413. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  1414. fileinfo.sys FileInfo Filter Driver (Microsoft)
  1415. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  1416. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  1417. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  1418. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  1419. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  1420. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  1421. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  1422. HIDCLASS.SYS Hid Class Library (Microsoft)
  1423. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  1424. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  1425. HTTP.sys HTTP Protocol Stack (Microsoft)
  1426. intelpep.sys Intel Power Engine Plugin (Microsoft)
  1427. IntelTA.sys Intel Telemetry Driver
  1428. iorate.sys I/O rate control Filter (Microsoft)
  1429. kbdclass.sys Keyboard Class Driver (Microsoft)
  1430. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  1431. kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
  1432. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  1433. ks.sys Kernal CSA Library (Microsoft)
  1434. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  1435. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  1436. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  1437. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  1438. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  1439. mcupdate.dll Media Center Update (Microsoft)
  1440. mmcss.sys MMCSS Driver (Microsoft)
  1441. monitor.sys Monitor Driver (Microsoft)
  1442. mouclass.sys Mouse Class Driver (Microsoft)
  1443. mouhid.sys HID Mouse Filter Driver (Microsoft)
  1444. mountmgr.sys Mount Point Manager (Microsoft)
  1445. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  1446. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  1447. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  1448. Msfs.SYS Mailslot driver (Microsoft)
  1449. msgpioclx.sys GPIO Class Extension Driver (Microsoft)
  1450. msisadrv.sys ISA Driver (Microsoft)
  1451. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  1452. msquic.sys Windows QUIC Driver
  1453. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  1454. mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
  1455. mssmbios.sys System Management BIOS driver (Microsoft)
  1456. mup.sys Multiple UNC Provider driver (Microsoft)
  1457. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  1458. ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
  1459. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  1460. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  1461. netbios.sys NetBIOS Interface driver (Microsoft)
  1462. netbt.sys MBT Transport driver (Microsoft)
  1463. NETIO.SYS Network I/O Subsystem (Microsoft)
  1464. Npfs.SYS NPFS driver (Microsoft)
  1465. npsvctrig.sys Named pipe service triggers (Microsoft)
  1466. nsiproxy.sys NSI Proxy driver (Microsoft)
  1467. Ntfs.sys NT File System Driver (Microsoft)
  1468. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  1469. ntosext.sys NTOS Extension Host driver (Microsoft)
  1470. Null.SYS NULL Driver (Microsoft)
  1471. pacer.sys QoS Packet Scheduler (Microsoft)
  1472. parport.sys Parallel Port Driver (Microsoft)
  1473. partmgr.sys Partition driver (Microsoft)
  1474. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  1475. pcw.sys Performance Counter Driver (Microsoft)
  1476. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  1477. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  1478. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  1479. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  1480. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  1481. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  1482. rdyboost.sys ReadyBoost Driver (Microsoft)
  1483. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  1484. serenum.sys Serial Port Enumerator (Microsoft)
  1485. serial.sys Serial Device Driver
  1486. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  1487. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  1488. spaceport.sys Storage Spaces driver (Microsoft)
  1489. srv2.sys Smb 2.0 Server driver (Microsoft)
  1490. srvnet.sys Server Network driver (Microsoft)
  1491. storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
  1492. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  1493. storqosflt.sys Storage QoS Filter driver (Microsoft)
  1494. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  1495. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  1496. tcpip.sys TCP/IP Protocol driver (Microsoft)
  1497. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  1498. TDI.SYS TDI Wrapper driver (Microsoft)
  1499. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  1500. tm.sys Kernel Transaction Manager driver (Microsoft)
  1501. ucx01000.sys USB Controller Extension (Microsoft)
  1502. UEFI.sys UEFI NT driver (Microsoft)
  1503. umbus.sys User-Mode Bus Enumerator (Microsoft)
  1504. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  1505. USBD.SYS Universal Serial Bus Driver (Microsoft)
  1506. UsbHub3.sys USB3 HUB driver (Microsoft)
  1507. USBXHCI.SYS USB XHCI driver (Microsoft)
  1508. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  1509. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  1510. volmgr.sys Volume Manager Driver (Microsoft)
  1511. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  1512. volsnap.sys Volume Shadow Copy driver (Microsoft)
  1513. volume.sys Volume driver (Microsoft)
  1514. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  1515. watchdog.sys Watchdog driver (Microsoft)
  1516. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  1517. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  1518. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  1519. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  1520. WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
  1521. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  1522. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  1523. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  1524. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  1525. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  1526. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  1527. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  1528. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  1529. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  1530. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  1531. Wof.sys Windows Overlay Filter (Microsoft)
  1532. WppRecorder.sys WPP Trace Recorder (Microsoft)
  1533.  
  1534. ====================== Dump #4: UNLOADED MODULES =======================
  1535.  
  1536. fffff804`64e30000 fffff804`64e3f000 WpdUpFltr.sy
  1537. fffff804`64dd0000 fffff804`64e25000 WUDFRd.sys
  1538. fffff804`64da0000 fffff804`64dc6000 USBSTOR.SYS
  1539. fffff804`575c0000 fffff804`575dd000 EhStorClass.
  1540. fffff804`61480000 fffff804`6148f000 dump_storpor
  1541. fffff804`614d0000 fffff804`61503000 dump_storahc
  1542. fffff804`61530000 fffff804`6154e000 dump_dumpfve
  1543. fffff804`60f10000 fffff804`60f2c000 dam.sys
  1544. fffff804`571f0000 fffff804`57201000 WdBoot.sys
  1545. fffff804`58290000 fffff804`582a0000 hwpolicy.sys
  1546.  
  1547. ====================== Dump #4: BIOS INFORMATION =======================
  1548.  
  1549. sysinfo: could not find necessary interfaces.
  1550. sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
  1551.  
  1552. ========================== Dump #4: Extra #1 ===========================
  1553.  
  1554. 0: kd> !verifier
  1555. fffff80455e2a660: Unable to get verifier list.
  1556.  
  1557. ========================== Dump #4: Extra #2 ===========================
  1558.  
  1559. 0: kd> !thread
  1560. THREAD ffff96050596a080 Cid 1a98.1a9c Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
  1561. Not impersonating
  1562. GetUlongFromAddress: unable to read from fffff80455e1143c
  1563. Owning Process ffff9605059ec2c0 Image: browser_broker
  1564. Attached Process N/A Image: N/A
  1565. fffff78000000000: Unable to get shared data
  1566. Wait Start TickCount 5096
  1567. Context Switch Count 215 IdealProcessor: 1
  1568. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  1569. UserTime 00:00:00.000
  1570. KernelTime 00:00:00.000
  1571. Win32 Start Address 0x00007ff6db801ff0
  1572. Stack Init fffffe028e030c90 Current fffffe028e030120
  1573. Base fffffe028e031000 Limit fffffe028e02b000 Call 0000000000000000
  1574. Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
  1575. Child-SP RetAddr : Args to Child : Call Site
  1576. fffffe02`8e02fc18 fffff804`5565418e : 00000000`0000001a 00000000`00041792 ffff94bf`fffe13c0 00100000`00000000 : nt!KeBugCheckEx
  1577. fffffe02`8e02fc20 fffff804`554119d1 : 00000000`00000003 ffff94bf`fffe1000 fffffe02`8e0300f0 00000000`00000003 : nt!MiDeleteVa+0x191e6e
  1578. fffffe02`8e02fd10 fffff804`55411cf0 : 00000000`00000000 ffff9605`059ec940 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
  1579. fffffe02`8e02fda0 fffff804`55411cf0 : 00000000`00000000 ffff9605`059ec940 ffff94ca`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
  1580. fffffe02`8e02fe30 fffff804`55411cf0 : fffffe02`8e0300f0 ffff9605`059ec940 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
  1581. fffffe02`8e02fec0 fffff804`5540e5fb : 00000000`00000000 ffff9605`059ec940 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
  1582. fffffe02`8e02ff50 fffff804`554c22d1 : fffffe02`8e0300f0 ffff9605`00000000 ffff94bf`00000002 fffffe02`00000000 : nt!MiWalkPageTables+0x36b
  1583. fffffe02`8e030050 fffff804`554a787f : 00000000`00000000 00000000`00000060 ffff9605`059eca00 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
  1584. fffffe02`8e0304d0 fffff804`557ea999 : ffff9605`059ec2c0 00000000`00000000 ffff9605`00000000 ffff9605`00000001 : nt!MiDeleteVad+0x41f
  1585. fffffe02`8e030600 fffff804`55866a00 : ffff9605`05cadbc0 ffff9605`03d43d10 ffff9605`0596a080 00000000`00000000 : nt!MiUnmapVad+0x49
  1586. fffffe02`8e030630 fffff804`558678b3 : ffff9605`05c79c80 ffff9605`05c79c80 ffff9605`05cadbc0 ffff9605`059ec2c0 : nt!MiCleanVad+0x30
  1587. fffffe02`8e030660 fffff804`558b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9605`059ec2c0 : nt!MmCleanProcessAddressSpace+0x137
  1588. fffffe02`8e0306e0 fffff804`557e8c32 : ffff9605`059ec2c0 ffff8002`2c6f0770 fffffe02`8e030920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
  1589. fffffe02`8e030760 fffff804`558f4c98 : 00000000`40010004 00000000`00000001 00000000`00000000 00000066`72f58000 : nt!PspExitThread+0x5f6
  1590. fffffe02`8e030860 fffff804`5542a4e7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
  1591. fffffe02`8e0308a0 fffff804`555e1fc0 : 00000000`00000000 fffffe02`8e030950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
  1592. fffffe02`8e030950 fffff804`555ef41f : 00000000`000001e0 00000000`00000000 00000000`00000000 ffff9605`05c4de60 : nt!KiInitiateUserApc+0x70
  1593. fffffe02`8e030a90 00007fff`fea8a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f (TrapFrame @ fffffe02`8e030b00)
  1594. 00000066`7307f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`fea8a104
  1595.  
  1596.  
  1597. ========================================================================
  1598. ======================= Dump #5: ANALYZE VERBOSE =======================
  1599. ======================= File: 072320-5156-01.dmp =======================
  1600. ========================================================================
  1601.  
  1602. Mini Kernel Dump File: Only registers and stack trace are available
  1603. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  1604. Kernel base = 0xfffff801`08400000 PsLoadedModuleList = 0xfffff801`0902a250
  1605. Debug session time: Thu Jul 23 08:57:45.073 2020 (UTC - 4:00)
  1606. System Uptime: 0 days 0:00:13.750
  1607.  
  1608. BugCheck 3B, {c0000005, fffff8010869057d, ffffc900a21bc920, 0}
  1609. Probably caused by : memory_corruption
  1610. Followup: memory_corruption
  1611.  
  1612. SYSTEM_SERVICE_EXCEPTION (3b)
  1613. An exception happened while executing a system service routine.
  1614.  
  1615. Arguments:
  1616. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  1617. Arg2: fffff8010869057d, Address of the instruction which caused the bugcheck
  1618. Arg3: ffffc900a21bc920, Address of the context record for the exception that caused the bugcheck
  1619. Arg4: 0000000000000000, zero.
  1620.  
  1621. Debugging Details:
  1622. DUMP_CLASS: 1
  1623. DUMP_QUALIFIER: 400
  1624. DUMP_TYPE: 2
  1625. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1626. FAULTING_IP:
  1627. nt!MiFinishHardFault+31d
  1628. fffff801`0869057d f0490fba6f183f lock bts qword ptr [r15+18h],3Fh
  1629. CONTEXT: ffffc900a21bc920 -- (.cxr 0xffffc900a21bc920)
  1630. rax=fffff98000000000 rbx=0000000000000001 rcx=0000000000000000
  1631. rdx=0000000000000000 rsi=0000000000000000 rdi=ffffde0934689028
  1632. rip=fffff8010869057d rsp=ffffd908ba5b7fe0 rbp=0000000000000000
  1633. r8=fffff98000000000 r9=8000000000000000 r10=00000000c000003f
  1634. r11=ffffaf3fffffff78 r12=ffffde09346883c0 r13=0000000000000002
  1635. r14=0000000000000000 r15=02fff98004e40aa0
  1636. iopl=0 nv up ei pl nz na pe nc
  1637. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
  1638. nt!MiFinishHardFault+0x31d:
  1639. fffff801`0869057d f0490fba6f183f lock bts qword ptr [r15+18h],3Fh ds:002b:02fff980`04e40ab8=????????????????
  1640. Resetting default scope
  1641. CUSTOMER_CRASH_COUNT: 1
  1642. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1643. BUGCHECK_STR: 0x3B
  1644.  
  1645. PROCESS_NAME: msoobe.exe
  1646.  
  1647. CURRENT_IRQL: 2
  1648. BAD_STACK_POINTER: ffffc900a21bc018
  1649. LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8010869057d
  1650. STACK_TEXT:
  1651. ffffd908`ba5b7fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFinishHardFault+0x31d
  1652. CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
  1653. fffff80104dd6d06-fffff80104dd6d07 2 bytes - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+2c6
  1654. [ 48 ff:4c 8b ]
  1655. fffff80104dd6d0d-fffff80104dd6d11 5 bytes - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+2cd (+0x07)
  1656. [ 0f 1f 44 00 00:e8 8e 50 87 03 ]
  1657. 7 errors : !FLTMGR (fffff80104dd6d06-fffff80104dd6d11)
  1658. MODULE_NAME: memory_corruption
  1659.  
  1660. IMAGE_NAME: memory_corruption
  1661.  
  1662. FOLLOWUP_NAME: memory_corruption
  1663. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1664. MEMORY_CORRUPTOR: LARGE
  1665. STACK_COMMAND: .cxr 0xffffc900a21bc920 ; kb
  1666. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1667. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1668. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1669. TARGET_TIME: 2020-07-23T12:57:45.000Z
  1670. SUITE_MASK: 272
  1671. PRODUCT_TYPE: 1
  1672. USER_LCID: 0
  1673. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1674. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1675. Followup: memory_corruption
  1676.  
  1677. ====================== Dump #5: 3RD PARTY DRIVERS ======================
  1678.  
  1679. Feb 07 2019 - amdgpio2.sys - AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  1680. May 24 2019 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  1681.  
  1682. ================== Dump #5: 3RD PARTY DRIVERS (FULL) ===================
  1683.  
  1684. Mapped memory image file: C:\ProgramData\dbg\sym\amdgpio2.sys\5C5BFB24c000\amdgpio2.sys
  1685. Image path: \SystemRoot\System32\drivers\amdgpio2.sys
  1686. Image name: amdgpio2.sys
  1687. Search : https://www.google.com/search?q=amdgpio2.sys
  1688. ADA Info : AMD GPIO Controller Driver from Advanced Micro Devices http://support.amd.com/
  1689. Timestamp : Thu Feb 7 2019
  1690. File version: 2.2.0.71
  1691. Product version: 2.2.0.71
  1692. File flags: 8 (Mask 3F) Private
  1693. File OS: 40004 NT Win32
  1694. File type: 3.7 Driver
  1695. File date: 00000000.00000000
  1696. CompanyName: Advanced Micro Devices, Inc
  1697. ProductName: AMD GPIO Controller Driver
  1698. InternalName: amdgpio2.sys
  1699. OriginalFilename: amdgpio2.sys
  1700. ProductVersion: 2.2.0.71
  1701. FileVersion: 2.2.0.71
  1702. FileDescription: AMD GPIO Controller Driver
  1703. LegalCopyright: Copyright © 2012-2019 Advanced Micro Devices, Inc
  1704.  
  1705. Mapped memory image file: C:\ProgramData\dbg\sym\rt640x64.sys\5CE7AF86ad000\rt640x64.sys
  1706. Image path: \SystemRoot\System32\drivers\rt640x64.sys
  1707. Image name: rt640x64.sys
  1708. Search : https://www.google.com/search?q=rt640x64.sys
  1709. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
  1710. Timestamp : Fri May 24 2019
  1711. File version: 9.1.410.2015
  1712. Product version: 9.1.410.2015
  1713. File flags: 8 (Mask 3F) Private
  1714. File OS: 40004 NT Win32
  1715. File type: 3.6 Driver
  1716. File date: 00000000.00000000
  1717. CompanyName: Realtek
  1718. ProductName: Realtek 8125/8136/8168/8169 PCI/PCIe Adapters
  1719. InternalName: rt640x64.sys
  1720. OriginalFilename: rt640x64.sys
  1721. ProductVersion: 9.001.0410.2015
  1722. FileVersion: 9.001.0410.2015
  1723. FileDescription: Realtek 8125/8136/8168/8169 NDIS 6.40 64-bit Driver
  1724. LegalCopyright: Copyright (C) 2019 Realtek Semiconductor Corporation. All Right Reserved.
  1725.  
  1726. ====================== Dump #5: MICROSOFT DRIVERS ======================
  1727.  
  1728. ACPI.sys ACPI Driver for NT (Microsoft)
  1729. acpiex.sys ACPIEx Driver (Microsoft)
  1730. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  1731. afunix.sys AF_UNIX Socket Provider driver (Microsoft)
  1732. ahcache.sys Application Compatibility Cache (Microsoft)
  1733. amdppm.sys Processor Device Driver
  1734. bam.sys BAM Kernal driver (Microsoft)
  1735. BasicDisplay.sys Basic Display driver (Microsoft)
  1736. BasicRender.sys Basic Render driver (Microsoft)
  1737. Beep.SYS BEEP driver (Microsoft)
  1738. bindflt.sys Windows Bind Filter driver (Microsoft)
  1739. BOOTVID.dll VGA Boot Driver (Microsoft)
  1740. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  1741. cdd.dll Canonical Display Driver (Microsoft)
  1742. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  1743. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  1744. CI.dll Code Integrity Module (Microsoft)
  1745. CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
  1746. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  1747. cldflt.sys Cloud Files Mini Filter driver (Microsoft)
  1748. CLFS.SYS Common Log File System Driver (Microsoft)
  1749. clipsp.sys CLIP Service (Microsoft)
  1750. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  1751. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  1752. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  1753. crashdmp.sys Crash Dump driver (Microsoft)
  1754. csc.sys Windows Client Side Caching driver (Microsoft)
  1755. dfsc.sys DFS Namespace Client Driver (Microsoft)
  1756. disk.sys PnP Disk Driver (Microsoft)
  1757. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  1758. dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  1759. dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  1760. dump_storahci.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  1761. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  1762. dxgmms2.sys DirectX Graphics MMS
  1763. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  1764. fastfat.SYS Fast FAT File System Driver (Microsoft)
  1765. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  1766. fileinfo.sys FileInfo Filter Driver (Microsoft)
  1767. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  1768. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  1769. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  1770. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  1771. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  1772. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  1773. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  1774. HdAudio.sys High Definition Audio Function driver (Microsoft)
  1775. HIDCLASS.SYS Hid Class Library (Microsoft)
  1776. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  1777. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  1778. HTTP.sys HTTP Protocol Stack (Microsoft)
  1779. intelpep.sys Intel Power Engine Plugin (Microsoft)
  1780. IntelTA.sys Intel Telemetry Driver
  1781. iorate.sys I/O rate control Filter (Microsoft)
  1782. kbdclass.sys Keyboard Class Driver (Microsoft)
  1783. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  1784. kd.dll Local Kernal Debugger (Microsoft)
  1785. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  1786. ks.sys Kernal CSA Library (Microsoft)
  1787. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  1788. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  1789. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  1790. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  1791. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  1792. mcupdate_AuthenticAMD.dll AMD Microcode Update Library (Microsoft)
  1793. mmcss.sys MMCSS Driver (Microsoft)
  1794. monitor.sys Monitor Driver (Microsoft)
  1795. mouclass.sys Mouse Class Driver (Microsoft)
  1796. mouhid.sys HID Mouse Filter Driver (Microsoft)
  1797. mountmgr.sys Mount Point Manager (Microsoft)
  1798. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  1799. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  1800. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  1801. Msfs.SYS Mailslot driver (Microsoft)
  1802. msgpioclx.sys GPIO Class Extension Driver (Microsoft)
  1803. msisadrv.sys ISA Driver (Microsoft)
  1804. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  1805. msquic.sys Windows QUIC Driver
  1806. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  1807. mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
  1808. mssmbios.sys System Management BIOS driver (Microsoft)
  1809. mup.sys Multiple UNC Provider driver (Microsoft)
  1810. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  1811. ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
  1812. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  1813. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  1814. netbios.sys NetBIOS Interface driver (Microsoft)
  1815. netbt.sys MBT Transport driver (Microsoft)
  1816. NETIO.SYS Network I/O Subsystem (Microsoft)
  1817. Npfs.SYS NPFS driver (Microsoft)
  1818. npsvctrig.sys Named pipe service triggers (Microsoft)
  1819. nsiproxy.sys NSI Proxy driver (Microsoft)
  1820. Ntfs.sys NT File System Driver (Microsoft)
  1821. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  1822. ntosext.sys NTOS Extension Host driver (Microsoft)
  1823. Null.SYS NULL Driver (Microsoft)
  1824. pacer.sys QoS Packet Scheduler (Microsoft)
  1825. parport.sys Parallel Port Driver (Microsoft)
  1826. partmgr.sys Partition driver (Microsoft)
  1827. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  1828. pcw.sys Performance Counter Driver (Microsoft)
  1829. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  1830. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  1831. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  1832. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  1833. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  1834. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  1835. rdyboost.sys ReadyBoost Driver (Microsoft)
  1836. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  1837. serenum.sys Serial Port Enumerator (Microsoft)
  1838. serial.sys Serial Device Driver
  1839. SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
  1840. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  1841. spaceport.sys Storage Spaces driver (Microsoft)
  1842. srv2.sys Smb 2.0 Server driver (Microsoft)
  1843. srvnet.sys Server Network driver (Microsoft)
  1844. storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
  1845. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  1846. storqosflt.sys Storage QoS Filter driver (Microsoft)
  1847. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  1848. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  1849. tcpip.sys TCP/IP Protocol driver (Microsoft)
  1850. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  1851. TDI.SYS TDI Wrapper driver (Microsoft)
  1852. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  1853. tm.sys Kernel Transaction Manager driver (Microsoft)
  1854. ucx01000.sys USB Controller Extension (Microsoft)
  1855. UEFI.sys UEFI NT driver (Microsoft)
  1856. umbus.sys User-Mode Bus Enumerator (Microsoft)
  1857. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  1858. USBD.SYS Universal Serial Bus Driver (Microsoft)
  1859. UsbHub3.sys USB3 HUB driver (Microsoft)
  1860. USBXHCI.SYS USB XHCI driver (Microsoft)
  1861. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  1862. Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
  1863. volmgr.sys Volume Manager Driver (Microsoft)
  1864. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  1865. volsnap.sys Volume Shadow Copy driver (Microsoft)
  1866. volume.sys Volume driver (Microsoft)
  1867. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  1868. watchdog.sys Watchdog driver (Microsoft)
  1869. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  1870. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  1871. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  1872. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  1873. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  1874. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  1875. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  1876. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  1877. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  1878. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  1879. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  1880. winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
  1881. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  1882. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  1883. Wof.sys Windows Overlay Filter (Microsoft)
  1884. WpdUpFltr.sys Portable Device Upper Class Filter driver (Microsoft)
  1885. WppRecorder.sys WPP Trace Recorder (Microsoft)
  1886. WUDFRd.sys Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft)
  1887.  
  1888. ====================== Dump #5: UNLOADED MODULES =======================
  1889.  
  1890. fffff801`13c00000 fffff801`13c0f000 dump_storpor
  1891. fffff801`13c50000 fffff801`13c83000 dump_storahc
  1892. fffff801`13cb0000 fffff801`13cce000 dump_dumpfve
  1893. fffff801`14670000 fffff801`1468c000 dam.sys
  1894. fffff801`0a800000 fffff801`0a811000 WdBoot.sys
  1895. fffff801`0b860000 fffff801`0b870000 hwpolicy.sys
  1896.  
  1897. ====================== Dump #5: BIOS INFORMATION =======================
  1898.  
  1899. [SMBIOS Data Tables v2.8]
  1900. [DMI Version - 0]
  1901. [2.0 Calling Convention - No]
  1902. [Table Size - 2444 bytes]
  1903. [BIOS Information (Type 0) - Length 26 - Handle 0000h]
  1904. Vendor American Megatrends Inc.
  1905. BIOS Version A.JQ
  1906. BIOS Starting Address Segment f000
  1907. BIOS Release Date 11/29/2019
  1908. BIOS ROM Size 1000000
  1909. BIOS Characteristics
  1910. 07: - PCI Supported
  1911. 11: - Upgradeable FLASH BIOS
  1912. 12: - BIOS Shadowing Supported
  1913. 15: - CD-Boot Supported
  1914. 16: - Selectable Boot Supported
  1915. 17: - BIOS ROM Socketed
  1916. 19: - EDD Supported
  1917. 23: - 1.2MB Floppy Supported
  1918. 24: - 720KB Floppy Supported
  1919. 25: - 2.88MB Floppy Supported
  1920. 26: - Print Screen Device Supported
  1921. 27: - Keyboard Services Supported
  1922. 28: - Serial Services Supported
  1923. 29: - Printer Services Supported
  1924. 32: - BIOS Vendor Reserved
  1925. BIOS Characteristic Extensions
  1926. 00: - ACPI Supported
  1927. 01: - USB Legacy Supported
  1928. 08: - BIOS Boot Specification Supported
  1929. 10: - Specification Reserved
  1930. 11: - Specification Reserved
  1931. BIOS Major Revision 5
  1932. BIOS Minor Revision 14
  1933. EC Firmware Major Revision 255
  1934. EC Firmware Minor Revision 255
  1935. [System Information (Type 1) - Length 27 - Handle 0001h]
  1936. Manufacturer Micro-Star International Co., Ltd.
  1937. Product Name MS-7A38
  1938. Version 2.0
  1939. UUID 00000000-0000-0000-0000-000000000000
  1940. Wakeup Type Power Switch
  1941. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  1942. Manufacturer Micro-Star International Co., Ltd
  1943. Product B350M PRO-VDH (MS-7A38)
  1944. Version 2.0
  1945. Feature Flags 09h
  1946. -1856522528: - -1856522480: - «?Íû
  1947. Chassis Handle 0003h
  1948. Board Type 0ah - Processor/Memory Module
  1949. Number of Child Handles 0
  1950. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  1951. Manufacturer Micro-Star International Co., Ltd.
  1952. Chassis Type Desktop
  1953. Version 2.0
  1954. Bootup State Safe
  1955. Power Supply State Safe
  1956. Thermal State Safe
  1957. Security Status None
  1958. OEM Defined 0
  1959. Height 0U
  1960. Number of Power Cords 1
  1961. Number of Contained Elements 0
  1962. Contained Element Size 3
  1963. [OEM Strings (Type 11) - Length 5 - Handle 000bh]
  1964. Number of Strings 1
  1965. [System Configuration Options (Type 12) - Length 5 - Handle 000ch]
  1966. [32Bit Memory Error Information (Type 18) - Length 23 - Handle 000eh]
  1967. [Physical Memory Array (Type 16) - Length 23 - Handle 000fh]
  1968. Location 03h - SystemBoard/Motherboard
  1969. Use 03h - System Memory
  1970. Memory Error Correction 03h - None
  1971. Maximum Capacity 134217728KB
  1972. Memory Error Inf Handle 000eh
  1973. Number of Memory Devices 4
  1974. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0010h]
  1975. Starting Address 00000000h
  1976. Ending Address 007fffffh
  1977. Memory Array Handle 000fh
  1978. Partition Width 01
  1979. [Cache Information (Type 7) - Length 19 - Handle 0011h]
  1980. Socket Designation L1 - Cache
  1981. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  1982. Maximum Cache Size 0180h - 384K
  1983. Installed Size 0180h - 384K
  1984. Supported SRAM Type 0010h - Pipeline-Burst
  1985. Current SRAM Type 0010h - Pipeline-Burst
  1986. Cache Speed 1ns
  1987. Error Correction Type Specification Reserved
  1988. System Cache Type Unified
  1989. Associativity 8-way Set-Associative
  1990. [Cache Information (Type 7) - Length 19 - Handle 0012h]
  1991. Socket Designation L2 - Cache
  1992. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  1993. Maximum Cache Size 0800h - 2048K
  1994. Installed Size 0800h - 2048K
  1995. Supported SRAM Type 0010h - Pipeline-Burst
  1996. Current SRAM Type 0010h - Pipeline-Burst
  1997. Cache Speed 1ns
  1998. Error Correction Type Specification Reserved
  1999. System Cache Type Unified
  2000. Associativity 8-way Set-Associative
  2001. [Cache Information (Type 7) - Length 19 - Handle 0013h]
  2002. Socket Designation L3 - Cache
  2003. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  2004. Maximum Cache Size 2000h - 8192K
  2005. Installed Size 2000h - 8192K
  2006. Supported SRAM Type 0010h - Pipeline-Burst
  2007. Current SRAM Type 0010h - Pipeline-Burst
  2008. Cache Speed 1ns
  2009. Error Correction Type Specification Reserved
  2010. System Cache Type Unified
  2011. Associativity 16-way Set-Associative
  2012. [Processor Information (Type 4) - Length 48 - Handle 0014h]
  2013. Socket Designation AM4
  2014. Processor Type Central Processor
  2015. Processor Family 6bh - Specification Reserved
  2016. Processor Manufacturer Advanced Micro Devices, Inc.
  2017. Processor ID 110f8000fffb8b17
  2018. Processor Version AMD Ryzen 3 1300X Quad-Core Processor
  2019. Processor Voltage 8ch - 1.2V
  2020. External Clock 100MHz
  2021. Max Speed 3900MHz
  2022. Current Speed 3500MHz
  2023. Status Enabled Populated
  2024. Processor Upgrade Specification Reserved
  2025. L1 Cache Handle 0011h
  2026. L2 Cache Handle 0012h
  2027. L3 Cache Handle 0013h
  2028. Part Number Unknown
  2029. [32Bit Memory Error Information (Type 18) - Length 23 - Handle 0015h]
  2030. [Memory Device (Type 17) - Length 40 - Handle 0016h]
  2031. Physical Memory Array Handle 000fh
  2032. Memory Error Info Handle 0015h
  2033. Form Factor 02h - Unknown
  2034. Device Locator DIMM 0
  2035. Bank Locator P0 CHANNEL A
  2036. Memory Type 02h - Unknown
  2037. Type Detail 0004h - Unknown
  2038. Speed 2400MHz
  2039. Manufacturer Unknown
  2040. Part Number Unknown
  2041. [32Bit Memory Error Information (Type 18) - Length 23 - Handle 0017h]
  2042. [Memory Device (Type 17) - Length 40 - Handle 0018h]
  2043. Physical Memory Array Handle 000fh
  2044. Memory Error Info Handle 0017h
  2045. Total Width 64 bits
  2046. Data Width 64 bits
  2047. Size 8192MB
  2048. Form Factor 09h - DIMM
  2049. Device Locator DIMM 1
  2050. Bank Locator P0 CHANNEL A
  2051. Memory Type 1ah - Specification Reserved
  2052. Type Detail 4080h - Synchronous
  2053. Speed 2400MHz
  2054. Manufacturer Unknown
  2055. Part Number CMV8GX4M1A2400C16
  2056. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0019h]
  2057. Starting Address 00000000h
  2058. Ending Address 007fffffh
  2059. Memory Device Handle 0018h
  2060. Mem Array Mapped Adr Handle 0010h
  2061. Interleave Position [None]
  2062. Interleave Data Depth [None]
  2063. [32Bit Memory Error Information (Type 18) - Length 23 - Handle 001ah]
  2064. [Memory Device (Type 17) - Length 40 - Handle 001bh]
  2065. Physical Memory Array Handle 000fh
  2066. Memory Error Info Handle 001ah
  2067. Form Factor 02h - Unknown
  2068. Device Locator DIMM 0
  2069. Bank Locator P0 CHANNEL B
  2070. Memory Type 02h - Unknown
  2071. Type Detail 0004h - Unknown
  2072. Speed 2400MHz
  2073. Manufacturer Unknown
  2074. Part Number Unknown
  2075. [32Bit Memory Error Information (Type 18) - Length 23 - Handle 001ch]
  2076. [Memory Device (Type 17) - Length 40 - Handle 001dh]
  2077. Physical Memory Array Handle 000fh
  2078. Memory Error Info Handle 001ch
  2079. Form Factor 02h - Unknown
  2080. Device Locator DIMM 1
  2081. Bank Locator P0 CHANNEL B
  2082. Memory Type 02h - Unknown
  2083. Type Detail 0004h - Unknown
  2084. Speed 2400MHz
  2085. Manufacturer Unknown
  2086. Part Number Unknown
  2087.  
  2088. ========================== Dump #5: Extra #1 ===========================
  2089.  
  2090. 2: kd> !verifier
  2091. Verify Flags Level 0x00000000
  2092. STANDARD FLAGS:
  2093. [X] (0x00000000) Automatic Checks
  2094. [ ] (0x00000001) Special pool
  2095. [ ] (0x00000002) Force IRQL checking
  2096. [ ] (0x00000008) Pool tracking
  2097. [ ] (0x00000010) I/O verification
  2098. [ ] (0x00000020) Deadlock detection
  2099. [ ] (0x00000080) DMA checking
  2100. [ ] (0x00000100) Security checks
  2101. [ ] (0x00000800) Miscellaneous checks
  2102. [ ] (0x00020000) DDI compliance checking
  2103. ADDITIONAL FLAGS:
  2104. [ ] (0x00000004) Randomized low resources simulation
  2105. [ ] (0x00000200) Force pending I/O requests
  2106. [ ] (0x00000400) IRP logging
  2107. [ ] (0x00002000) Invariant MDL checking for stack
  2108. [ ] (0x00004000) Invariant MDL checking for driver
  2109. [ ] (0x00008000) Power framework delay fuzzing
  2110. [ ] (0x00010000) Port/miniport interface checking
  2111. [ ] (0x00040000) Systematic low resources simulation
  2112. [ ] (0x00080000) DDI compliance checking (additional)
  2113. [ ] (0x00200000) NDIS/WIFI verification
  2114. [ ] (0x00800000) Kernel synchronization delay fuzzing
  2115. [ ] (0x01000000) VM switch verification
  2116. [ ] (0x02000000) Code integrity checks
  2117. [X] Indicates flag is enabled
  2118. Summary of All Verifier Statistics
  2119. RaiseIrqls 0x0
  2120. AcquireSpinLocks 0x0
  2121. Synch Executions 0x0
  2122. Trims 0x0
  2123. Pool Allocations Attempted 0x0
  2124. Pool Allocations Succeeded 0x0
  2125. Pool Allocations Succeeded SpecialPool 0x0
  2126. Pool Allocations With NO TAG 0x0
  2127. Pool Allocations Failed 0x0
  2128. Current paged pool allocations 0x0 for 00000000 bytes
  2129. Peak paged pool allocations 0x0 for 00000000 bytes
  2130. Current nonpaged pool allocations 0x0 for 00000000 bytes
  2131. Peak nonpaged pool allocations 0x0 for 00000000 bytes
  2132.  
  2133. ========================== Dump #5: Extra #2 ===========================
  2134.  
  2135. 2: kd> !thread
  2136. THREAD ffffde0934395080 Cid 0508.0598 Teb: 00000098be7cd000 Win32Thread: ffffde0934224370 RUNNING on processor 2
  2137. IRP List:
  2138. Unable to read nt!_IRP @ ffffde0934c698b0
  2139. Not impersonating
  2140. GetUlongFromAddress: unable to read from fffff8010901143c
  2141. Owning Process ffffde09342e0080 Image: msoobe.exe
  2142. Attached Process N/A Image: N/A
  2143. fffff78000000000: Unable to get shared data
  2144. Wait Start TickCount 879
  2145. Context Switch Count 841 IdealProcessor: 2
  2146. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  2147. UserTime 00:00:00.000
  2148. KernelTime 00:00:00.000
  2149. Win32 Start Address 0x00007ff982b820e0
  2150. Stack Init ffffd908ba5b8c90 Current ffffd908ba5b7cd0
  2151. Base ffffd908ba5b9000 Limit ffffd908ba5b3000 Call 0000000000000000
  2152. Priority 9 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
  2153. Child-SP RetAddr : Args to Child : Call Site
  2154. ffffc900`a21bc018 fffff801`087ef929 : 00000000`0000003b 00000000`c0000005 fffff801`0869057d ffffc900`a21bc920 : nt!KeBugCheckEx
  2155. ffffc900`a21bc020 fffff801`087eed7c : ffffd908`ba5b7da8 fffff801`084e68e0 ffffc900`a21bc210 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  2156. ffffc900`a21bc160 fffff801`087e68e2 : fffff801`087eed00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceHandler+0x7c
  2157. ffffc900`a21bc1a0 fffff801`08632fb7 : ffffc900`a21bc710 00000000`00000000 ffffd908`ba5b8a90 fffff801`087ef378 : nt!RtlpExecuteHandlerForException+0x12
  2158. ffffc900`a21bc1d0 fffff801`0867b226 : ffffd908`ba5b7da8 ffffc900`a21bce20 ffffd908`ba5b7da8 ffffde09`34689028 : nt!RtlDispatchException+0x297
  2159. ffffc900`a21bc8f0 fffff801`087de8b2 : b60f4400`1de7df88 000000c0`248c88c9 fffffe5a`e901b641 4ccb8b4c`4c24448b : nt!KiDispatchException+0x186
  2160. ffffc900`a21bcfb0 fffff801`087de880 : fffff801`087efa65 00000000`0000020d 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 (TrapFrame @ ffffc900`a21bce70)
  2161. ffffd908`ba5b7c68 fffff801`087efa65 : 00000000`0000020d 00000000`00000000 00000000`00000000 fffff801`08793a63 : nt!KiExceptionDispatchOnExceptionStackContinue
  2162. ffffd908`ba5b7c70 fffff801`087eb7a0 : ffffc900`fffffffe 00000000`ffffffff 00000000`000001d0 00000000`00000000 : nt!KiExceptionDispatch+0x125
  2163. ffffd908`ba5b7e50 fffff801`0869057d : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 (TrapFrame @ ffffd908`ba5b7e50)
  2164. ffffd908`ba5b7fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFinishHardFault+0x31d
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement