Stop Error Dump File Analysis - Dump file analysed: 092119-37531-01.dmp] on 21/09/19

Analysed using Microsoft (R) Windows Debugger Version 10.0.18362.1 X86 and PCT Analyser V5.2 (Copyright 2019)

Click on each button to view the relevant information

General Tips for Stop Errors (BSOD)

Firstly, you can follow the Microsoft online Blue Screen wizard here.

Diagnostic / Testing Tools

What are Stop Errors?

Firstly, it is worth clarifying that a BSOD is only attributed to Windows, for example, where Windows has a Blue Screen, Linux actually has something known as a System Panic. However, you’ll find Linux is much less prone to them.

Microsoft defines a blue screen very well:

“When Microsoft Windows encounters a condition that compromises safe system operation, the system halts. This condition is called a bug check. It is also commonly referred to as a system crash, a kernel error, a Stop error, or BSOD. A hardware device, its driver, or related software might have caused this error.”

In simple terms – it’s when Windows has detected a problem that could have caused damage or corruption to the operating system, or your computer itself, and therefore needed to STOP.

That’s why technically it’s called a stop error, stop code, or a bug check. They are more indicative of a fatal system crash. For the purpose of standardisation, we will call this a bug check (Bugcheck = BSOD).

So, there are some important considerations to take before continuing:

Summary

Debug session time: Sat Sep 21 08:27:29.387 2019 (UTC + 1:00)System Uptime: 0 days 0:02:57.118

BugCheck C4 ----- DRIVER_VERIFIER_DETECTED_VIOLATION

Probably caused by : clipsp.sys ( clipsp!ClipSpUninitialize+3839f )

Arg1: 000000000002001f, ID of the 'IrqlZwPassive' rule that was violated.

Arg2: fffff80657356328, A pointer to the string describing the violated rule condition.

Arg3: 0000000000000000, Reserved (unused).

Arg4: 0000000000000000, Reserved (unused).

PROCESS_NAME: sppsvc.exe

MODULE_NAME: clipsp

IMAGE_NAME: clipsp.sys -----> CLIP Service


Bugcheck Description:

DRIVER_VERIFIER_DETECTED_VIOLATION

"This is the general bug check code for fatal errors found by Driver Verifier. For more information, see Handling a Bug Check When Driver Verifier is Enabled on Microsoft docs. Parameter 1 identifies the type of violation. The meaning of the remaining parameters varies with the value of Parameter 1."

About your bugcheck / typical cause:

"This bug check can only occur when Driver Verifier has been instructed to monitor one or more drivers. If you did not intend to use Driver Verifier, you should deactivate it. You might also consider removing the driver that caused this problem. If you are the driver writer, use the information obtained through this bug check to fix the bugs in your code. For full details on Driver Verifier, see the Driver Verifier section of the Windows Driver Kit (WDK)."

System Information

This includes BIOS, Motherboard, Processor, and Memory. Not all dump files will contain hardware information, and therefore this will not always be complete

Operating System

OSNAME: Windows 10

OSBUILD: 18362

OSPLATFORM_TYPE: x64

OSSERVICEPACK: 356

BIOS Information

No data

Mainboard Information

No Data

Processor Information

No data

Memory Information

Slot Size Speed Part Number
Memory Slot 1 No Data
Memory Slot 2 No Data
Memory Slot 3 No Data
Memory Slot 4 No Data

Loaded Modules

To disable third party modules, use Autoruns (Microsoft Program)

Modules are listed from OLDEST to NEWEST - typically out of drivers should be looked at first. Total Modules Loaded = Total 9
1- ModuleName Column1 2- Time Stamp 3- Company 4- Description
amdgpio3.sys 14/03/2016 AMD AMD GPIO Controller Driver
nvhda64v.sys 15/12/2017 NVIDIA NVIDIA Audio HDMI Driver (nForce Chip)
nvlddmkm.sys 23/03/2018 NVIDIA NVIDIA Video Drivers
AMDRyzenMasterDriver.sys 18/10/2018 AMD Ryzen Master Driver
RTKVHD64.sys 13/11/2018 Realtek Realtek HD Audio Driver
rt640x64.sys 10/05/2019 Realtek Realtek Audio Driver
amdgpio2.sys 17/05/2019 AMD AMD GPIO Controller Driver
amdpsp.sys 19/06/2019 AMD AMD Chipset Driver
AMDPCIDev.sys 24/07/2019 AMD AMD Ryzen OC Utility

Column1 Dump File

Microsoft (R) Windows Debugger Version 10.0.18362.1 X86

Copyright (c) Microsoft Corporation. All rights reserved.

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 18362 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Machine Name:

Kernel base = 0xfffff806`562b6000 PsLoadedModuleList = 0xfffff806`566fd5b0

Debug session time: Sat Sep 21 08:27:29.387 2019 (UTC + 1:00)

System Uptime: 0 days 0:02:57.118

Loading Kernel Symbols

..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.

Run !sym noisy before .reload to track down problems loading symbols.

.............................................................

................................................................

............................................

Loading User Symbols

Loading unloaded module list

........

For analysis of this file, run !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C4, {2001f, fffff80657356328, 0, 0}

Probably caused by : clipsp.sys ( clipsp!ClipSpUninitialize+3839f )

Followup: MachineOwner

---------

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

DRIVER_VERIFIER_DETECTED_VIOLATION (c4)

A device driver attempting to corrupt the system has been caught. This is

because the driver was specified in the registry as being suspect (by the

The reference count of an object is illegal for the current state of the object. administrator) and the kernel has enabled substantial checking of this driver.

Each time a driver uses a pointer to an object the driver calls a kernel routine If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will

to increment the reference count of the object. When the driver is done with the be among the most commonly seen crashes.

pointer the driver calls another kernel routine to decrement the reference count. Arguments:

Drivers must match calls to the increment and decrement routines. This bugcheck Arg1: 000000000002001f, ID of the 'IrqlZwPassive' rule that was violated.

can occur because an object's reference count goes to zero while there are still Arg2: fffff80657356328, A pointer to the string describing the violated rule condition.

open handles to the object, in which case the fourth parameter indicates the number Arg3: 0000000000000000, Reserved (unused).

of opened handles. It may also occur when the object's reference count drops below zero Arg4: 0000000000000000, Reserved (unused).

contains the actual value of the pointer references count. Debugging Details:

------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.18362.356 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8

Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: 2001f

BUGCHECK_P2: fffff80657356328

BUGCHECK_P3: 0

BUGCHECK_P4: 0

DV_VIOLATED_CONDITION: ZwQueryValueKey should only be called at IRQL = PASSIVE_LEVEL.

DV_MSDN_LINK: https://go.microsoft.com/fwlink/?LinkId=216048

DV_RULE_INFO: 0x2001F

BUGCHECK_STR: 0xc4_IrqlZwPassive_XDV

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: sppsvc.exe

CURRENT_IRQL: 1

ANALYSIS_SESSION_HOST: DESKTOP-CL34DUR

ANALYSIS_SESSION_TIME: 09-21-2019 16:03:49.0876

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER: from fffff8065734538b to fffff806564770a0

STACK_TEXT:

ffff8104`a41b71a8 fffff806`5734538b : 00000000`000000c4 00000000`0002001f fffff806`57356328 00000000`00000000 : nt!KeBugCheckEx

ffff8104`a41b71b0 fffff806`57343a89 : 00000000`0002001f 00000000`0002001f ffff8104`a41b7448 ffffd481`f2e6fbc0 : VerifierExt!XdvInitiateBugcheck+0x3f

ffff8104`a41b71f0 fffff806`57321d53 : fffff806`570bb25f ffff8104`a41b7448 00000000`00000000 ffff8104`a41b7448 : VerifierExt!XdvUnifiedBugCheck+0x239

ffff8104`a41b7260 fffff806`57321dab : 00000000`00000023 ffff8104`a41b7440 00000000`50494c43 00000000`00000020 : VerifierExt!SLIC_ZwQueryValueKey_entry_IrqlZwPassive+0x33

ffff8104`a41b72a0 fffff806`56c3f0b3 : fffff806`570bb25f ffff8104`a41b7448 00000000`00000000 fffff806`56c28715 : VerifierExt!ZwQueryValueKey_wrapper+0x4b

ffff8104`a41b7340 fffff806`570bb25f : ffffac06`6fb06f70 ffff8104`a41b73f0 00000000`00000000 00000000`00000020 : nt!VfZwQueryValueKey+0x83

ffff8104`a41b73a0 fffff806`570c2144 : ffffac06`6fb06f70 00000000`00000000 00000000`00000000 ffffac06`6fb06f70 : clipsp!ClipSpUninitialize+0x3839f

ffff8104`a41b7420 fffff806`5707f419 : 00000000`00000023 ffffffff`800002cc ffff8104`a41b7590 fffff806`570bd372 : clipsp!ClipSpUninitialize+0x3f284

ffff8104`a41b7470 fffff806`5707f3c0 : ffff8104`a41b7590 ffffffff`800002cc ffffac06`6fb04fd0 ffff8104`a41b7590 : clipsp+0xaf419

ffff8104`a41b74c0 fffff806`5707eca1 : 00000000`00000000 ffff8104`a41b75f9 ffffac06`6fb02fa0 00000000`00000000 : clipsp+0xaf3c0

ffff8104`a41b7510 fffff806`5707e9bb : fffff806`570731d0 00000000`c0000272 fffff806`57073e80 00000000`00000000 : clipsp+0xaeca1

ffff8104`a41b7640 fffff806`5707e896 : 00000000`c0000272 00000000`00000072 ffff8104`a41b7771 00000000`00000072 : clipsp+0xae9bb

ffff8104`a41b76b0 fffff806`5707e5bd : 00000000`00000000 ffff8104`a41b7e20 ffff8104`a41b7848 00000000`00000001 : clipsp+0xae896

ffff8104`a41b77c0 fffff806`56a8f8f4 : 00000000`00000004 ffff8104`a41b7c50 00000000`00000072 ffffd481`00000000 : clipsp+0xae5bd

ffff8104`a41b7840 fffff806`56948ab8 : fffff806`5671db40 fffff806`56329092 00000000`00000110 00000000`00000000 : nt!ExQueryLicenseValueInternal+0x146e24

ffff8104`a41b7ac0 fffff806`56488918 : 00000000`00000000 ffff8104`a41b7e28 ffff8104`a41b7e58 00000000`00000004 : nt!NtQueryLicenseValue+0x2b8

ffff8104`a41b7b60 fffff806`5647aee0 : fffff806`56c3ed50 fffff803`2f286450 ffff8104`a41b7df0 ffff8104`a41b7e28 : nt!KiSystemServiceCopyEnd+0x28

ffff8104`a41b7d68 fffff806`56c3ed50 : fffff803`2f286450 ffff8104`a41b7df0 ffff8104`a41b7e28 ffff8104`00000000 : nt!KiServiceLinkage

ffff8104`a41b7d70 fffff803`2f286450 : ffff8104`a41b7e58 ffffd481`f2ec9fa8 00000000`00000000 fffff803`2f2863f4 : nt!VfZwQueryLicenseValue+0x80

ffff8104`a41b7dc0 fffff803`2f282054 : 00000000`00000010 00000000`00050217 ffff8104`00000000 00000000`00000000 : csc!CscLicensingQueryDWord+0x5c

ffff8104`a41b7e10 fffff806`563a5c3d : 00000000`00000000 ffffffff`ffffffff ffffd481`fff8b080 fffff806`00000000 : csc!CscLicensingPolicyChangeCallback+0x44

ffff8104`a41b7e40 fffff806`563a5b6c : ffffffff`ffffffff 00000000`00000001 00000000`00000000 00000000`ffffffff : nt!ExNotifyWithProcessing+0xc5

ffff8104`a41b7e90 fffff806`5694a8f6 : 00000000`00000000 ffff8104`a41b8108 00000000`00000004 00000000`ffffffff : nt!ExNotifyCallback+0xc

ffff8104`a41b7ec0 fffff806`56949d5c : ffffac06`00000001 ffffffff`00000000 ffffffff`80001da8 ffffd481`fff8b080 : nt!MmMapViewInSystemSpace+0x56

ffff8104`a41b7ef0 fffff806`56942d18 : 00000000`00000000 fffff806`56454400 00000000`00000000 00000000`00050216 : nt!ExUpdateLicenseDataInternal+0x9ac

ffff8104`a41b8350 fffff806`56945bbf : ffff8104`a41b8490 00000000`00000000 00000000`c0000095 ffffac06`6c726390 : nt!SPCallServerHandleUpdatePolicies+0x160

ffff8104`a41b8390 fffff806`569441e5 : 00000000`00000080 ffff8104`a41b87e0 00000000`0000e954 00000252`7f88ec80 : nt!SPCall2ServerInternal+0x19cb

ffff8104`a41b86c0 fffff806`5631fff8 : ffff8104`a41b8b80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SPCallServerHandleIsAppLicensed+0x6c9

ffff8104`a41b8700 fffff806`5631ff6d : fffff806`569441c0 ffff8104`a41b87e0 ffff8104`a41b88c0 ffff8104`a41b8880 : nt!KeExpandKernelStackAndCalloutInternal+0x78

ffff8104`a41b8770 fffff806`56978cbc : 00000000`20534c53 fffff806`5662406d 00000000`00000001 ffff8104`a41b8b80 : nt!KeExpandKernelStackAndCalloutEx+0x1d

ffff8104`a41b87b0 fffff806`56978bc7 : 00000000`00000000 ffff8104`a41b8b80 00000000`00000000 00000000`00000000 : nt!ExHandleSPCall2+0x27c

ffff8104`a41b8810 fffff806`5689674a : fffffbfd`00000000 000000f9`63bff450 00000000`00000000 000000f9`63bff450 : nt!ExHandleSPCall2+0x187

ffff8104`a41b88b0 fffff806`5689626b : 00000000`0000000a 00000000`00000e96 00000252`005bc010 00000000`0000e960 : nt!ExpQuerySystemInformation+0x3ba

ffff8104`a41b8ac0 fffff806`56488918 : ffffd481`fff8b080 000000f9`63bff428 00000000`0000e954 ffffffff`94b62e00 : nt!NtQuerySystemInformation+0x2b

ffff8104`a41b8b00 00007ff8`f985c794 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28

000000f9`63bff108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f985c794

THREAD_SHA1_HASH_MOD_FUNC: 0fba482d9ec65a40aa822d7e6241fa65cb2c2b34

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 133ca81ba37847c1726c0fb235b935c392ff3251

THREAD_SHA1_HASH_MOD: cc42a2d8a10a7df66656483a739ad17de19fe4cf

FOLLOWUP_IP:

clipsp!ClipSpUninitialize+3839f

fffff806`570bb25f ad lods dword ptr [rsi]

FAULT_INSTR_CODE: 1970ebad

SYMBOL_STACK_INDEX: 6

SYMBOL_NAME: clipsp!ClipSpUninitialize+3839f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: clipsp

IMAGE_NAME: clipsp.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5c90178f

IMAGE_VERSION: 10.0.18362.1

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 3839f

FAILURE_BUCKET_ID: 0xc4_IrqlZwPassive_XDV_clipsp!ClipSpUninitialize

BUCKET_ID: 0xc4_IrqlZwPassive_XDV_clipsp!ClipSpUninitialize

PRIMARY_PROBLEM_CLASS: 0xc4_IrqlZwPassive_XDV_clipsp!ClipSpUninitialize

TARGET_TIME: 2019-09-21T07:27:29.000Z

OSBUILD: 18362

OSSERVICEPACK: 356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.18362.356

ANALYSIS_SESSION_ELAPSED_TIME: 98e

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0xc4_irqlzwpassive_xdv_clipsp!clipspuninitialize

FAILURE_ID_HASH: {7d78d2e9-293b-d159-5661-1bea7728ce6a}

Followup: MachineOwner

---------

@ win32kbase.sys 69d38732

@ win32k.sys 7b83186f

@ cdd.dll e63e8bf3

@ win32kfull.sys 35ac83be

@ Vid.sys b7cfc354

@ CompositeBus.sys f050d616

@ kdnic.sys 1ff5f7f5

@ umbus.sys 3104a4ad

@ USBXHCI.SYS 951b0a79

@ ucx01000.sys 04268533

@ AMDRyzenMasterDriver.sys 5bc8105a

@ crashdmp.sys 2985cb13

@ mrxsmb.sys 1e559e99

@ cdrom.sys 9f6b0b7b

@ filecrypt.sys 4ead73c1

@ tbs.sys 965bac31

@ Null.SYS e822087b

@ Beep.SYS 528ec21a

@ ahcache.sys a8473be2

@ TDI.SYS 894065a0

@ netbt.sys 113d2a22

@ afunix.sys 9d6c12c4

@ afd.sys b88dd13e

@ vwififlt.sys 39396289

@ pacer.sys e7276bde

@ netbios.sys b37fd2e9

@ rdbss.sys bce0ed0a

@ E:\WinDBG\Debuggers\x86\sym\csc.pdb\E27F93CC1D474B3A45218B8DF6423ACF1\csc.pdb b0cbd8b6

@ nsiproxy.sys 528da18a

@ npsvctrig.sys 0e7ac006

@ E:\WinDBG\Debuggers\x86\sym\mssmbios.pdb\7CE0C1D2DD53B809A668DE8F5F91012E1\mssmbios.pdb e6dc521d

@ gpuenergydrv.sys 0cc24294

@ dfsc.sys fabe3f7d

@ winhvr.sys cf370026

@ bam.sys 22198778

@ dxgkrnl.sys f0008504

@ watchdog.sys 21474799

@ BasicDisplay.sys 4e6e05e1

@ BasicRender.sys 82a93228

@ Npfs.SYS b03ecfd3

@ Msfs.SYS 91fe0ff4

@ tdx.sys 0a1f3dc4

@ RTKVHD64.sys 5beab150

@ UsbHub3.sys d4267d67

@ usbccgp.sys 5d2af1d1

@ HIDCLASS.SYS d4d0dee6

@ HIDPARSE.SYS 0d56f932

@ kbdhid.sys 4cf68ca7

@ kbdclass.sys 0b474226

@ mouhid.sys a140c187

@ mouclass.sys 4a22ffb8

@ rt640x64.sys 5cd53d6b

@ dump_storport.sys 5cc3d020

@ dump_storahci.sys 381e77bb

@ dump_dumpfve.sys 4bedf38a

@ mslldp.sys 15c3108a

@ winquic.sys d60f7863

@ HTTP.sys aac6df8e

@ lltdio.sys 707e9308

@ rspndr.sys ed98d1ee

@ wanarp.sys 1bd57cfb

@ nwifi.sys be919ea8

@ ndisuio.sys 38fd20ee

@ bowser.sys d37f2e35

@ mpsdrv.sys 7d5af2f0

@ mrxsmb20.sys 2a968ecc

@ dxgmms2.sys 79e12d93

@ monitor.sys 93f54fb5

@ luafv.sys 08a8e82a

@ wcifs.sys 6c454d30

@ cldflt.sys ff0d7e8e

@ storqosflt.sys d77c69c8

@ ks.sys 1f5fe6fb

@ AMDPCIDev.sys 5d3848ec

@ serial.sys b6549b39

@ serenum.sys 0b8b1db3

@ amdppm.sys dd8872d0

@ amdgpio2.sys 5cde452f

@ msgpioclx.sys 137f3458

@ wmiacpi.sys af7efce5

@ amdgpio3.sys 56e69038

@ NdisVirtualBus.sys d217410a

@ swenum.sys c4d73525

@ rdpbus.sys 4e9899f8

@ nvhda64v.sys 5a338527

@ ksthunk.sys 15502221

@ USBD.SYS cd63ce9d

@ nvlddmkm.sys 5ab5877e

@ HDAudBus.sys aecd2958

@ portcls.sys d4f15bf0

@ drmk.sys a3e06fb0

@ hidusb.sys 7b9189fe

@ srvnet.sys 220ab43d

@ Ndu.sys 23725908

@ mmcss.sys 3ee4136d

@ peauth.sys 54b328cc

@ tcpipreg.sys 3451b629

@ AgileVpn.sys a96aff6d

@ rasl2tp.sys a7aa404e

@ raspptp.sys 54893590

@ raspppoe.sys 053a7d72

@ ndistapi.sys 690d0d05

@ ndiswan.sys fb43c10d

@ WdNisDrv.sys afc7a2ac

@ srv2.sys bd56acc9

@ rassstp.sys 6ec6a1e5

@ NDProxy.sys 193fe713

@ hal.dll 81442445

@ E:\WinDBG\Debuggers\x86\sym\ntkrnlmp.pdb\CE7FFB00C20B87500211456B3E905C471\ntkrnlmp.pdb a5839c4d

@ kdcom.dll 5a75d524

@ mcupdate.dll f9972f7b

@ werkernel.sys 958e14b2

@ ksecdd.sys a35f28f6

@ msrpc.sys 8e1a4f15

@ tm.sys 9a74c3b7

@ CLFS.SYS 07bc3c0b

@ PSHED.dll b21f9dda

@ BOOTVID.dll 0f301604

@ clipsp.sys 5c90178f

@ FLTMGR.SYS 801a5f11

@ cmimcext.sys c7f022b4

@ ntosext.sys bac877d8

@ CI.dll 64b700c8

@ cng.sys 5444b5a1

@ E:\WinDBG\Debuggers\x86\sym\VerifierExt.pdb\49B8FA6FD9D04B632AE771CC45A6D91C1\VerifierExt.pdb 1a0e4e4f

@ Wdf01000.sys 116a658a

@ WDFLDR.SYS 3b396780

@ SleepStudyHelper.sys ba6e2346

@ WppRecorder.sys 34a54231

@ acpiex.sys 2b91edb2

@ mssecflt.sys 9c3fcc09

@ SgrmAgent.sys f851a195

@ ACPI.sys 90b929f2

@ WMILIB.SYS 59021e3d

@ intelpep.sys 48981283

@ WindowsTrustedRT.sys cb95ce3d

@ WindowsTrustedRTProxy.sys 514e3023

@ pcw.sys 6b731527

@ msisadrv.sys 5e470a0e

@ pci.sys d78389fa

@ vdrvroot.sys 0101bcc6

@ pdc.sys 87c34d95

@ CEA.sys f3811107

@ partmgr.sys 89c96ad1

@ spaceport.sys dc82b965

@ volmgr.sys 211cef76

@ volmgrx.sys d6f366b7

@ mountmgr.sys 242db05f

@ EhStorClass.sys 526cc202

@ storahci.sys 381e77bb

@ storport.sys a692ce5b

@ fileinfo.sys 24bbed20

@ Wof.sys 3cb75347

@ WdFilter.sys 8a73d08b

@ Fs_Rec.sys 49e932ba

@ ndis.sys 7a2508ba

@ NETIO.SYS e3375155

@ amdpsp.sys 5d0a4a77

@ Ntfs.sys d9a3ce82

@ ksecpkg.sys e1e129d5

@ tcpip.sys 61ae2576

@ fwpkclnt.sys 58c1e6ed

@ wfplwfs.sys 60902cbb

@ fvevol.sys d4b5a2e7

@ volume.sys a4e9fdfa

@ volsnap.sys 1876f533

@ storufs.sys 4615a6d6

@ rdyboost.sys f450ceb3

@ mup.sys 565e0311

@ iorate.sys 18d52dda

@ disk.sys 384fefed

@ CLASSPNP.SYS 09ed6e49

sysinfo: could not find necessary interfaces.

sysinfo: note that mssmbios.sys must be loaded (XPSP2+).

sysinfo: could not find necessary interfaces.

sysinfo: note that mssmbios.sys must be loaded (XPSP2+).

Additional Commands

No additional commands run in this instance