Stop Error Dump File Analysis - Dump file analysed: 092119-22765-01.dmp] on 21/09/19

Analysed using Microsoft (R) Windows Debugger Version 10.0.18362.1 X86 and PCT Analyser V5.2 (Copyright 2019)

Click on each button to view the relevant information

General Tips for Stop Errors (BSOD)

Firstly, you can follow the Microsoft online Blue Screen wizard here.

Diagnostic / Testing Tools

What are Stop Errors?

Firstly, it is worth clarifying that a BSOD is only attributed to Windows, for example, where Windows has a Blue Screen, Linux actually has something known as a System Panic. However, you’ll find Linux is much less prone to them.

Microsoft defines a blue screen very well:

“When Microsoft Windows encounters a condition that compromises safe system operation, the system halts. This condition is called a bug check. It is also commonly referred to as a system crash, a kernel error, a Stop error, or BSOD. A hardware device, its driver, or related software might have caused this error.”

In simple terms – it’s when Windows has detected a problem that could have caused damage or corruption to the operating system, or your computer itself, and therefore needed to STOP.

That’s why technically it’s called a stop error, stop code, or a bug check. They are more indicative of a fatal system crash. For the purpose of standardisation, we will call this a bug check (Bugcheck = BSOD).

So, there are some important considerations to take before continuing:

Summary

Debug session time: Sat Sep 21 08:30:47.855 2019 (UTC + 1:00)System Uptime: 0 days 0:01:13.588

BugCheck C4 ----- DRIVER_VERIFIER_DETECTED_VIOLATION

Probably caused by : clipsp.sys ( clipsp!ClipSpUninitialize+3839f )

Arg1: 000000000002001f, ID of the 'IrqlZwPassive' rule that was violated.

Arg2: fffff80717f56328, A pointer to the string describing the violated rule condition.

Arg3: 0000000000000000, Reserved (unused).

Arg4: 0000000000000000, Reserved (unused).

PROCESS_NAME: sppsvc.exe

MODULE_NAME: clipsp

IMAGE_NAME: clipsp.sys -----> CLIP Service


Bugcheck Description:

DRIVER_VERIFIER_DETECTED_VIOLATION

"This is the general bug check code for fatal errors found by Driver Verifier. For more information, see Handling a Bug Check When Driver Verifier is Enabled on Microsoft docs. Parameter 1 identifies the type of violation. The meaning of the remaining parameters varies with the value of Parameter 1."

About your bugcheck / typical cause:

"This bug check can only occur when Driver Verifier has been instructed to monitor one or more drivers. If you did not intend to use Driver Verifier, you should deactivate it. You might also consider removing the driver that caused this problem. If you are the driver writer, use the information obtained through this bug check to fix the bugs in your code. For full details on Driver Verifier, see the Driver Verifier section of the Windows Driver Kit (WDK)."

System Information

This includes BIOS, Motherboard, Processor, and Memory. Not all dump files will contain hardware information, and therefore this will not always be complete

Operating System

OSNAME: Windows 10

OSBUILD: 18362

OSPLATFORM_TYPE: x64

OSSERVICEPACK: 356

BIOS Information

No data

Mainboard Information

No Data

Processor Information

No data

Memory Information

Slot Size Speed Part Number
Memory Slot 1 No Data
Memory Slot 2 No Data
Memory Slot 3 No Data
Memory Slot 4 No Data

Loaded Modules

To disable third party modules, use Autoruns (Microsoft Program)

Modules are listed from OLDEST to NEWEST - typically out of drivers should be looked at first. Total Modules Loaded = Total 9
1- ModuleName Column1 2- Time Stamp 3- Company 4- Description
amdgpio3.sys 14/03/2016 AMD AMD GPIO Controller Driver
nvhda64v.sys 15/12/2017 NVIDIA NVIDIA Audio HDMI Driver (nForce Chip)
nvlddmkm.sys 23/03/2018 NVIDIA NVIDIA Video Drivers
AMDRyzenMasterDriver.sys 18/10/2018 AMD Ryzen Master Driver
RTKVHD64.sys 13/11/2018 Realtek Realtek HD Audio Driver
rt640x64.sys 10/05/2019 Realtek Realtek Audio Driver
amdgpio2.sys 17/05/2019 AMD AMD GPIO Controller Driver
amdpsp.sys 19/06/2019 AMD AMD Chipset Driver
AMDPCIDev.sys 24/07/2019 AMD AMD Ryzen OC Utility

Column1 Dump File

Microsoft (R) Windows Debugger Version 10.0.18362.1 X86

Copyright (c) Microsoft Corporation. All rights reserved.

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 18362 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Machine Name:

Kernel base = 0xfffff807`16eae000 PsLoadedModuleList = 0xfffff807`172f55b0

Debug session time: Sat Sep 21 08:30:47.855 2019 (UTC + 1:00)

System Uptime: 0 days 0:01:13.588

Loading Kernel Symbols

..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.

Run !sym noisy before .reload to track down problems loading symbols.

.............................................................

................................................................

.............................................

Loading User Symbols

Loading unloaded module list

......

For analysis of this file, run !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C4, {2001f, fffff80717f56328, 0, 0}

Probably caused by : clipsp.sys ( clipsp!ClipSpUninitialize+3839f )

Followup: MachineOwner

---------

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

DRIVER_VERIFIER_DETECTED_VIOLATION (c4)

A device driver attempting to corrupt the system has been caught. This is

because the driver was specified in the registry as being suspect (by the

The reference count of an object is illegal for the current state of the object. administrator) and the kernel has enabled substantial checking of this driver.

Each time a driver uses a pointer to an object the driver calls a kernel routine If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will

to increment the reference count of the object. When the driver is done with the be among the most commonly seen crashes.

pointer the driver calls another kernel routine to decrement the reference count. Arguments:

Drivers must match calls to the increment and decrement routines. This bugcheck Arg1: 000000000002001f, ID of the 'IrqlZwPassive' rule that was violated.

can occur because an object's reference count goes to zero while there are still Arg2: fffff80717f56328, A pointer to the string describing the violated rule condition.

open handles to the object, in which case the fourth parameter indicates the number Arg3: 0000000000000000, Reserved (unused).

of opened handles. It may also occur when the object's reference count drops below zero Arg4: 0000000000000000, Reserved (unused).

contains the actual value of the pointer references count. Debugging Details:

------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.18362.356 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8

Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: 2001f

BUGCHECK_P2: fffff80717f56328

BUGCHECK_P3: 0

BUGCHECK_P4: 0

DV_VIOLATED_CONDITION: ZwQueryValueKey should only be called at IRQL = PASSIVE_LEVEL.

DV_MSDN_LINK: https://go.microsoft.com/fwlink/?LinkId=216048

DV_RULE_INFO: 0x2001F

BUGCHECK_STR: 0xc4_IrqlZwPassive_XDV

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: sppsvc.exe

CURRENT_IRQL: 1

ANALYSIS_SESSION_HOST: DESKTOP-CL34DUR

ANALYSIS_SESSION_TIME: 09-21-2019 16:03:53.0101

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER: from fffff80717f4538b to fffff8071706f0a0

STACK_TEXT:

ffff9206`5794e1a8 fffff807`17f4538b : 00000000`000000c4 00000000`0002001f fffff807`17f56328 00000000`00000000 : nt!KeBugCheckEx

ffff9206`5794e1b0 fffff807`17f43a89 : 00000000`0002001f 00000000`0002001f ffff9206`5794e448 ffff818b`0be6fc30 : VerifierExt!XdvInitiateBugcheck+0x3f

ffff9206`5794e1f0 fffff807`17f21d53 : fffff807`17cbb25f ffff9206`5794e448 00000000`00000000 ffff9206`5794e448 : VerifierExt!XdvUnifiedBugCheck+0x239

ffff9206`5794e260 fffff807`17f21dab : 00000000`00000023 ffff9206`5794e440 00000000`50494c43 00000000`00000020 : VerifierExt!SLIC_ZwQueryValueKey_entry_IrqlZwPassive+0x33

ffff9206`5794e2a0 fffff807`178370b3 : fffff807`17cbb25f ffff9206`5794e448 00000000`00000000 fffff807`17820715 : VerifierExt!ZwQueryValueKey_wrapper+0x4b

ffff9206`5794e340 fffff807`17cbb25f : ffff978a`f6f2ef70 ffff9206`5794e3f0 00000000`00000000 00000000`00000020 : nt!VfZwQueryValueKey+0x83

ffff9206`5794e3a0 fffff807`17cc2144 : ffff978a`f6f2ef70 00000000`00000000 00000000`00000000 ffff978a`f6f2ef70 : clipsp!ClipSpUninitialize+0x3839f

ffff9206`5794e420 fffff807`17c7f419 : 00000000`00000023 ffffffff`800001c0 ffff9206`5794e590 fffff807`17cbd372 : clipsp!ClipSpUninitialize+0x3f284

ffff9206`5794e470 fffff807`17c7f3c0 : ffff9206`5794e590 ffffffff`800001c0 ffff978a`f6f32fd0 ffff9206`5794e590 : clipsp+0xaf419

ffff9206`5794e4c0 fffff807`17c7eca1 : 00000000`00000000 ffff9206`5794e5f9 ffff978a`f6f26fa0 00000000`00000000 : clipsp+0xaf3c0

ffff9206`5794e510 fffff807`17c7e9bb : fffff807`17c731d0 00000000`c0000272 fffff807`17c73e80 00000000`00000000 : clipsp+0xaeca1

ffff9206`5794e640 fffff807`17c7e896 : 00000000`c0000272 00000000`00000072 ffff9206`5794e771 00000000`00000072 : clipsp+0xae9bb

ffff9206`5794e6b0 fffff807`17c7e5bd : 00000000`00000000 ffff9206`5794ee20 ffff9206`5794e848 00000000`00000001 : clipsp+0xae896

ffff9206`5794e7c0 fffff807`176878f4 : 00000000`00000004 ffff9206`5794ec50 00000000`00000072 ffff818b`00000000 : clipsp+0xae5bd

ffff9206`5794e840 fffff807`17540ab8 : fffff807`17315b40 fffff807`16f21092 00000000`00000110 00000000`00000000 : nt!ExQueryLicenseValueInternal+0x146e24

ffff9206`5794eac0 fffff807`17080918 : 00000000`00000000 ffff9206`5794ee28 ffff9206`5794ee58 00000000`00000004 : nt!NtQueryLicenseValue+0x2b8

ffff9206`5794eb60 fffff807`17072ee0 : fffff807`17836d50 fffff807`7e0d6450 ffff9206`5794edf0 ffff9206`5794ee28 : nt!KiSystemServiceCopyEnd+0x28

ffff9206`5794ed68 fffff807`17836d50 : fffff807`7e0d6450 ffff9206`5794edf0 ffff9206`5794ee28 ffff9206`00000000 : nt!KiServiceLinkage

ffff9206`5794ed70 fffff807`7e0d6450 : ffff9206`5794ee58 ffff818b`0bec7788 00000000`00000000 fffff807`7e0d63f4 : nt!VfZwQueryLicenseValue+0x80

ffff9206`5794edc0 fffff807`7e0d2054 : 00000000`00000010 00000000`00050213 ffff9206`00000000 00000000`00000000 : csc!CscLicensingQueryDWord+0x5c

ffff9206`5794ee10 fffff807`16f9dc3d : 00000000`00000000 ffffffff`ffffffff ffff818b`2a0a7640 fffff807`00000000 : csc!CscLicensingPolicyChangeCallback+0x44

ffff9206`5794ee40 fffff807`16f9db6c : ffffffff`ffffffff 00000000`00000001 00000000`00000000 00000000`ffffffff : nt!ExNotifyWithProcessing+0xc5

ffff9206`5794ee90 fffff807`175428f6 : 00000000`00000000 ffff9206`5794f108 00000000`00000004 00000000`ffffffff : nt!ExNotifyCallback+0xc

ffff9206`5794eec0 fffff807`17541d5c : ffff978a`00000001 ffffffff`00000000 ffffffff`80001dd0 ffff818b`2a0a7640 : nt!MmMapViewInSystemSpace+0x56

ffff9206`5794eef0 fffff807`1753ad18 : 00000000`00000000 fffff807`1704c400 00000000`00000000 00000000`00050216 : nt!ExUpdateLicenseDataInternal+0x9ac

ffff9206`5794f350 fffff807`1753dbbf : ffff9206`5794f490 00000000`00000000 00000000`c0000095 ffff978a`ee743c10 : nt!SPCallServerHandleUpdatePolicies+0x160

ffff9206`5794f390 fffff807`1753c1e5 : 00000000`00000100 ffff9206`5794f7e0 00000000`0000e954 00000225`ce700490 : nt!SPCall2ServerInternal+0x19cb

ffff9206`5794f6c0 fffff807`16f17ff8 : ffff9206`5794fb80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SPCallServerHandleIsAppLicensed+0x6c9

ffff9206`5794f700 fffff807`16f17f6d : fffff807`1753c1c0 ffff9206`5794f7e0 ffff9206`5794f8c0 ffff9206`5794f880 : nt!KeExpandKernelStackAndCalloutInternal+0x78

ffff9206`5794f770 fffff807`17570cbc : 00000000`20534c53 fffff807`1721c06d 00000000`00000001 ffff9206`5794fb80 : nt!KeExpandKernelStackAndCalloutEx+0x1d

ffff9206`5794f7b0 fffff807`17570bc7 : 00000000`00000000 ffff9206`5794fb80 00000000`00000000 00000000`00000000 : nt!ExHandleSPCall2+0x27c

ffff9206`5794f810 fffff807`1748e74a : fffffa7d`00000000 000000f2`19bfe900 00000000`00000000 000000f2`19bfe900 : nt!ExHandleSPCall2+0x187

ffff9206`5794f8b0 fffff807`1748e26b : 00000000`0000000a 00000000`00000e8b 00000225`cf376ab0 00000000`0000e8b0 : nt!ExpQuerySystemInformation+0x3ba

ffff9206`5794fac0 fffff807`17080918 : 93278d84`3bbdc445 ffff9206`5794fb80 00000000`0000e8a0 ffffffff`94b62e00 : nt!NtQuerySystemInformation+0x2b

ffff9206`5794fb00 00007ffc`99cbc794 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28

000000f2`19bfe5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`99cbc794

THREAD_SHA1_HASH_MOD_FUNC: 0fba482d9ec65a40aa822d7e6241fa65cb2c2b34

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 133ca81ba37847c1726c0fb235b935c392ff3251

THREAD_SHA1_HASH_MOD: cc42a2d8a10a7df66656483a739ad17de19fe4cf

FOLLOWUP_IP:

clipsp!ClipSpUninitialize+3839f

fffff807`17cbb25f ad lods dword ptr [rsi]

FAULT_INSTR_CODE: 1970ebad

SYMBOL_STACK_INDEX: 6

SYMBOL_NAME: clipsp!ClipSpUninitialize+3839f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: clipsp

IMAGE_NAME: clipsp.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5c90178f

IMAGE_VERSION: 10.0.18362.1

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 3839f

FAILURE_BUCKET_ID: 0xc4_IrqlZwPassive_XDV_clipsp!ClipSpUninitialize

BUCKET_ID: 0xc4_IrqlZwPassive_XDV_clipsp!ClipSpUninitialize

PRIMARY_PROBLEM_CLASS: 0xc4_IrqlZwPassive_XDV_clipsp!ClipSpUninitialize

TARGET_TIME: 2019-09-21T07:30:47.000Z

OSBUILD: 18362

OSSERVICEPACK: 356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.18362.356

ANALYSIS_SESSION_ELAPSED_TIME: 91b

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0xc4_irqlzwpassive_xdv_clipsp!clipspuninitialize

FAILURE_ID_HASH: {7d78d2e9-293b-d159-5661-1bea7728ce6a}

Followup: MachineOwner

---------

@ win32kfull.sys 35ac83be

@ win32kbase.sys 69d38732

@ cdd.dll e63e8bf3

@ win32k.sys 7b83186f

@ hal.dll 81442445

@ E:\WinDBG\Debuggers\x86\sym\ntkrnlmp.pdb\CE7FFB00C20B87500211456B3E905C471\ntkrnlmp.pdb a5839c4d

@ kdcom.dll 5a75d524

@ mcupdate.dll f9972f7b

@ werkernel.sys 958e14b2

@ ksecdd.sys a35f28f6

@ msrpc.sys 8e1a4f15

@ tm.sys 9a74c3b7

@ CLFS.SYS 07bc3c0b

@ PSHED.dll b21f9dda

@ BOOTVID.dll 0f301604

@ clipsp.sys 5c90178f

@ FLTMGR.SYS 801a5f11

@ cmimcext.sys c7f022b4

@ ntosext.sys bac877d8

@ CI.dll 64b700c8

@ cng.sys 5444b5a1

@ E:\WinDBG\Debuggers\x86\sym\VerifierExt.pdb\49B8FA6FD9D04B632AE771CC45A6D91C1\VerifierExt.pdb 1a0e4e4f

@ Wdf01000.sys 116a658a

@ WDFLDR.SYS 3b396780

@ SleepStudyHelper.sys ba6e2346

@ WppRecorder.sys 34a54231

@ acpiex.sys 2b91edb2

@ mssecflt.sys 9c3fcc09

@ SgrmAgent.sys f851a195

@ ACPI.sys 90b929f2

@ WMILIB.SYS 59021e3d

@ intelpep.sys 48981283

@ WindowsTrustedRT.sys cb95ce3d

@ WindowsTrustedRTProxy.sys 514e3023

@ pcw.sys 6b731527

@ msisadrv.sys 5e470a0e

@ pci.sys d78389fa

@ vdrvroot.sys 0101bcc6

@ pdc.sys 87c34d95

@ CEA.sys f3811107

@ partmgr.sys 89c96ad1

@ spaceport.sys dc82b965

@ volmgr.sys 211cef76

@ volmgrx.sys d6f366b7

@ mountmgr.sys 242db05f

@ EhStorClass.sys 526cc202

@ storahci.sys 381e77bb

@ storport.sys a692ce5b

@ fileinfo.sys 24bbed20

@ Wof.sys 3cb75347

@ WdFilter.sys 8a73d08b

@ Fs_Rec.sys 49e932ba

@ ndis.sys 7a2508ba

@ NETIO.SYS e3375155

@ amdpsp.sys 5d0a4a77

@ Ntfs.sys d9a3ce82

@ ksecpkg.sys e1e129d5

@ tcpip.sys 61ae2576

@ fwpkclnt.sys 58c1e6ed

@ wfplwfs.sys 60902cbb

@ fvevol.sys d4b5a2e7

@ volume.sys a4e9fdfa

@ volsnap.sys 1876f533

@ rdyboost.sys f450ceb3

@ mup.sys 565e0311

@ iorate.sys 18d52dda

@ disk.sys 384fefed

@ CLASSPNP.SYS 09ed6e49

@ srvnet.sys 220ab43d

@ Ndu.sys 23725908

@ mmcss.sys 3ee4136d

@ peauth.sys 54b328cc

@ tcpipreg.sys 3451b629

@ srv2.sys bd56acc9

@ rassstp.sys 6ec6a1e5

@ NDProxy.sys 193fe713

@ AgileVpn.sys a96aff6d

@ rasl2tp.sys a7aa404e

@ raspptp.sys 54893590

@ raspppoe.sys 053a7d72

@ ndistapi.sys 690d0d05

@ ndiswan.sys fb43c10d

@ WSDPrint.sys fce23e82

@ WSDScan.sys ed66a961

@ WdNisDrv.sys afc7a2ac

@ mrxsmb20.sys 2a968ecc

@ AMDRyzenMasterDriver.sys 5bc8105a

@ dxgkrnl.sys f0008504

@ watchdog.sys 21474799

@ BasicDisplay.sys 4e6e05e1

@ BasicRender.sys 82a93228

@ Npfs.SYS b03ecfd3

@ Msfs.SYS 91fe0ff4

@ tdx.sys 0a1f3dc4

@ TDI.SYS 894065a0

@ netbt.sys 113d2a22

@ afunix.sys 9d6c12c4

@ afd.sys b88dd13e

@ vwififlt.sys 39396289

@ pacer.sys e7276bde

@ netbios.sys b37fd2e9

@ rdbss.sys bce0ed0a

@ E:\WinDBG\Debuggers\x86\sym\csc.pdb\E27F93CC1D474B3A45218B8DF6423ACF1\csc.pdb b0cbd8b6

@ nsiproxy.sys 528da18a

@ npsvctrig.sys 0e7ac006

@ E:\WinDBG\Debuggers\x86\sym\mssmbios.pdb\7CE0C1D2DD53B809A668DE8F5F91012E1\mssmbios.pdb e6dc521d

@ gpuenergydrv.sys 0cc24294

@ dfsc.sys fabe3f7d

@ bam.sys 22198778

@ crashdmp.sys 2985cb13

@ mrxsmb.sys 1e559e99

@ cdrom.sys 9f6b0b7b

@ filecrypt.sys 4ead73c1

@ tbs.sys 965bac31

@ Null.SYS e822087b

@ Beep.SYS 528ec21a

@ ahcache.sys a8473be2

@ Vid.sys b7cfc354

@ winhvr.sys cf370026

@ CompositeBus.sys f050d616

@ kdnic.sys 1ff5f7f5

@ umbus.sys 3104a4ad

@ USBXHCI.SYS 951b0a79

@ rt640x64.sys 5cd53d6b

@ nwifi.sys be919ea8

@ winquic.sys d60f7863

@ HTTP.sys aac6df8e

@ bowser.sys d37f2e35

@ mpsdrv.sys 7d5af2f0

@ luafv.sys 08a8e82a

@ wcifs.sys 6c454d30

@ cldflt.sys ff0d7e8e

@ storqosflt.sys d77c69c8

@ mslldp.sys 15c3108a

@ lltdio.sys 707e9308

@ ucx01000.sys 04268533

@ rspndr.sys ed98d1ee

@ wanarp.sys 1bd57cfb

@ ndisuio.sys 38fd20ee

@ HIDPARSE.SYS 0d56f932

@ kbdhid.sys 4cf68ca7

@ kbdclass.sys 0b474226

@ mouhid.sys a140c187

@ mouclass.sys 4a22ffb8

@ dump_storport.sys 5cc3d020

@ RTKVHD64.sys 5beab150

@ usbccgp.sys 5d2af1d1

@ hidusb.sys 7b9189fe

@ HIDCLASS.SYS d4d0dee6

@ portcls.sys d4f15bf0

@ drmk.sys a3e06fb0

@ ks.sys 1f5fe6fb

@ AMDPCIDev.sys 5d3848ec

@ serial.sys b6549b39

@ serenum.sys 0b8b1db3

@ amdppm.sys dd8872d0

@ amdgpio2.sys 5cde452f

@ msgpioclx.sys 137f3458

@ wmiacpi.sys af7efce5

@ amdgpio3.sys 56e69038

@ NdisVirtualBus.sys d217410a

@ swenum.sys c4d73525

@ rdpbus.sys 4e9899f8

@ UsbHub3.sys d4267d67

@ USBD.SYS cd63ce9d

@ nvhda64v.sys 5a338527

@ ksthunk.sys 15502221

@ dump_storahci.sys 381e77bb

@ dump_dumpfve.sys 4bedf38a

@ dxgmms2.sys 79e12d93

@ monitor.sys 93f54fb5

@ nvlddmkm.sys 5ab5877e

@ HDAudBus.sys aecd2958

sysinfo: could not find necessary interfaces.

sysinfo: note that mssmbios.sys must be loaded (XPSP2+).

sysinfo: could not find necessary interfaces.

sysinfo: note that mssmbios.sys must be loaded (XPSP2+).

Additional Commands

No additional commands run in this instance