Help |
BSOD's (Blue Screen Of Death's) are usually caused one or more of the following:
So what can you do? You can:
Another helpful method is to use the process of elimination. Remove all unnecessary USB devices and drivers for a few days. If the crashes stop, you know it was one of those devices (or their drivers). Remove any extra hard drives for a few days. If you have on-board video on your motherboard, try removing your extra graphics card (and drivers) and use the on-board video for a few days. Eliminate each piece of the PC as you go along until you find out the source of the crashes. Remember to remove the drivers for each device too.
Through the forums, you will asked to do these things. If you do any of it by yourself, keep in mind to report any changes/updates/test results in the forums.
Image Scan |
Name: WIN32K.SYS
MZ at fffff6ec`a8a00000, prot 00000040, type 01000000 - size 2a8000
Name: win32kbase.sys
MZ at fffff6ec`a8d50000, prot 00000040, type 01000000 - size 48000
Name: cdd.dll
MZ at fffff6ec`a8f60000, prot 00000040, type 01000000 - size 3a0000
Name: win32kfull.sys
MZ at fffff804`f1a20000, prot 00000040, type 01000000 - size 1d000
Name: DUMPFVE.SYS
MZ at fffff804`f1a60000, prot 00000040, type 01000000 - size 30000
Name: cdrom.exe
MZ at fffff804`f1aa0000, prot 00000040, type 01000000 - size 15000
Name: filecrypt.exe
MZ at fffff804`f1ac0000, prot 00000040, type 01000000 - size e000
Name: tbs.sys
MZ at fffff804`f1ad0000, prot 00000040, type 01000000 - size a000
Name: null.exe
MZ at fffff804`f1ae0000, prot 00000040, type 01000000 - size a000
Name: beep.exe
MZ at fffff804`f1af0000, prot 00000040, type 01000000 - size 373000
Name: dxgkrnl.sys
MZ at fffff804`f1e70000, prot 00000040, type 01000000 - size 16000
Name: watchdog.sys
MZ at fffff804`f1e90000, prot 00000040, type 01000000 - size 16000
Name: BasicDisplay.exe
MZ at fffff804`f1eb0000, prot 00000040, type 01000000 - size 11000
Name: BasicRender.exe
MZ at fffff804`f1ed0000, prot 00000040, type 01000000 - size 1c000
Name: npfs.exe
MZ at fffff804`f1ef0000, prot 00000040, type 01000000 - size 11000
Name: msfs.exe
MZ at fffff804`f1f10000, prot 00000040, type 01000000 - size 26000
Name: tdx.exe
MZ at fffff804`f1f40000, prot 00000040, type 01000000 - size 10000
Name: TDI.SYS
MZ at fffff804`f1f60000, prot 00000040, type 01000000 - size 59000
Name: netbt.exe
MZ at fffff804`f1fc0000, prot 00000040, type 01000000 - size 13000
Name: afunix.dll
MZ at fffff804`f1fe0000, prot 00000040, type 01000000 - size a7000
Name: afd.exe
MZ at fffff804`f20b0000, prot 00000040, type 01000000 - size 1a000
Name: vwififlt.SYS
MZ at fffff804`f20d0000, prot 00000040, type 01000000 - size 2b000
Name: pacer.exe
MZ at fffff804`f2100000, prot 00000040, type 01000000 - size 14000
Name: netbios.exe
MZ at fffff804`f2120000, prot 00000040, type 01000000 - size 7b000
Name: rdbss.sys
MZ at fffff804`f21c0000, prot 00000040, type 01000000 - size 1d000
Name: CRASHDMP.SYS
MZ at fffff804`f21e0000, prot 00000040, type 01000000 - size d000
Name: atapi.exe
MZ at fffff804`f2200000, prot 00000040, type 01000000 - size d000
Name: NpSvcTrig.exe
MZ at fffff804`f24d0000, prot 00000040, type 01000000 - size 10000
Name: mssmbios.exe
MZ at fffff804`f2500000, prot 00000040, type 01000000 - size a000
Name: gpuenergydrv.exe
MZ at fffff804`f2510000, prot 00000040, type 01000000 - size 2c000
Name: dfsc.exe
MZ at fffff804`f2560000, prot 00000040, type 01000000 - size 16000
Name: bam.exe
MZ at fffff804`f2580000, prot 00000040, type 01000000 - size 4f000
Name: ahcache.exe
MZ at fffff804`f25e0000, prot 00000040, type 01000000 - size 8c000
Name: Vid.exe
MZ at fffff804`f2670000, prot 00000040, type 01000000 - size 1f000
Name: winhvr.sys
MZ at fffff804`f2690000, prot 00000040, type 01000000 - size 11000
Name: CompositeBus.exe
MZ at fffff804`f26b0000, prot 00000040, type 01000000 - size d000
Name: kdnic.sys
MZ at fffff804`f26c0000, prot 00000040, type 01000000 - size 15000
Name: UmBus.exe
MZ at fffff804`f26e0000, prot 00000040, type 01000000 - size 3f000
Name: intelppm.exe
MZ at fffff804`f2c40000, prot 00000040, type 01000000 - size 8a000
Name: usbhub.exe
MZ at fffff804`f2cd0000, prot 00000040, type 01000000 - size f000
Name: flpydisk.exe
MZ at fffff804`f2d20000, prot 00000040, type 01000000 - size 6e000
Name: HDAudio.exe
MZ at fffff804`f2db0000, prot 00000040, type 01000000 - size 13000
Name: HIDPARSE.SYS
MZ at fffff804`f2dd0000, prot 00000040, type 01000000 - size 33000
Name: usbccgp.exe
MZ at fffff804`f2e10000, prot 00000040, type 01000000 - size 12000
Name: hidusb.exe
MZ at fffff804`f2e30000, prot 00000040, type 01000000 - size 3b000
Name: HIDCLASS.SYS
MZ at fffff804`f2e70000, prot 00000040, type 01000000 - size 10000
Name: mouhid.exe
MZ at fffff804`f2e90000, prot 00000040, type 01000000 - size 13000
Name: mouclass.exe
MZ at fffff804`f2eb0000, prot 00000040, type 01000000 - size 11000
Name: kbdhid.exe
MZ at fffff804`f2ed0000, prot 00000040, type 01000000 - size 14000
Name: kbdclass.exe
MZ at fffff804`f2f00000, prot 00000040, type 01000000 - size 94000
Name: csc.exe
MZ at fffff804`f2fe0000, prot 00000040, type 01000000 - size 12000
Name: nsiproxy.exe
MZ at fffff804`f3000000, prot 00000040, type 01000000 - size 77000
Name: cldflt.exe
MZ at fffff804`f3080000, prot 00000040, type 01000000 - size 1a000
Name: storqosflt.exe
MZ at fffff804`f3120000, prot 00000040, type 01000000 - size 19000
Name: mslldp.exe
MZ at fffff804`f31d0000, prot 00000040, type 01000000 - size 18000
Name: lltdio.exe
MZ at fffff804`f31f0000, prot 00000040, type 01000000 - size 1b000
Name: rspndr.exe
MZ at fffff804`f3210000, prot 00000040, type 01000000 - size 1d000
Name: wanarp.exe
MZ at fffff804`f3230000, prot 00000040, type 01000000 - size 38000
Name: winquic.sys
MZ at fffff804`f3270000, prot 00000040, type 01000000 - size 145000
Name: http.exe
MZ at fffff804`f33c0000, prot 00000040, type 01000000 - size 25000
Name: bowser.exe
MZ at fffff804`f3400000, prot 00000040, type 01000000 - size da000
Name: dxgmms2.sys
MZ at fffff804`f34e0000, prot 00000040, type 01000000 - size 18000
Name: monitor.exe
MZ at fffff804`f3500000, prot 00000040, type 01000000 - size 2a000
Name: luafv.exe
MZ at fffff804`f3530000, prot 00000040, type 01000000 - size 36000
Name: wcifs.exe
MZ at fffff804`f3570000, prot 00000040, type 01000000 - size 50000
Name: WUDFRd.exe
MZ at fffff804`f35d0000, prot 00000040, type 01000000 - size e000
Name: WpdUpFltr.exe
MZ at fffff804`f35e0000, prot 00000040, type 01000000 - size 1a000
Name: mpsdrv.exe
MZ at fffff804`f4230000, prot 00000040, type 01000000 - size 78000
Name: ks.sys
MZ at fffff804`f42b0000, prot 00000040, type 01000000 - size 11000
Name: usbuhci.exe
MZ at fffff804`f42d0000, prot 00000040, type 01000000 - size 7a000
Name: USBPORT.SYS
MZ at fffff804`f4350000, prot 00000040, type 01000000 - size 1d000
Name: usbehci.exe
MZ at fffff804`f4370000, prot 00000040, type 01000000 - size f000
Name: ksthunk.exe
MZ at fffff804`f4380000, prot 00000040, type 01000000 - size f000
Name: fdc.exe
MZ at fffff804`f4390000, prot 00000040, type 01000000 - size 1f000
Name: parport.exe
MZ at fffff804`f43c0000, prot 00000040, type 01000000 - size 1c000
Name: serial.exe
MZ at fffff804`f43e0000, prot 00000040, type 01000000 - size f000
Name: SerEnum.exe
MZ at fffff804`f4410000, prot 00000040, type 01000000 - size d000
Name: NdisVirtualBus.exe
MZ at fffff804`f4420000, prot 00000040, type 01000000 - size c000
Name: swenum.exe
MZ at fffff804`f4430000, prot 00000040, type 01000000 - size e000
Name: rdpbus.exe
MZ at fffff804`f4440000, prot 00000040, type 01000000 - size e000
Name: USBD.SYS
MZ at fffff804`f5560000, prot 00000040, type 01000000 - size 22000
Name: hdaudbus.exe
MZ at fffff804`f5590000, prot 00000040, type 01000000 - size 67000
Name: portcls.sys
MZ at fffff804`f5800000, prot 00000040, type 01000000 - size 27000
Name: ndu.exe
MZ at fffff804`f5910000, prot 00000040, type 01000000 - size 14000
Name: tcpipreg.exe
MZ at fffff804`f5930000, prot 00000040, type 01000000 - size 1d000
Name: rassstp.exe
MZ at fffff804`f5950000, prot 00000040, type 01000000 - size 41000
Name: ndproxy.exe
MZ at fffff804`f59a0000, prot 00000040, type 01000000 - size 27000
Name: AgileVpn.exe
MZ at fffff804`f59d0000, prot 00000040, type 01000000 - size 22000
Name: rasl2tp.exe
MZ at fffff804`f5a00000, prot 00000040, type 01000000 - size 20000
Name: raspptp.exe
MZ at fffff804`f5a30000, prot 00000040, type 01000000 - size 1c000
Name: raspppoe.exe
MZ at fffff804`f5a50000, prot 00000040, type 01000000 - size f000
Name: NDISTAPI.SYS
MZ at fffff804`f5a60000, prot 00000040, type 01000000 - size 3a000
Name: ndiswan.exe
MZ at fffff804`f5aa0000, prot 00000040, type 01000000 - size 13000
Name: condrv.exe
MZ at fffff804`f5ae0000, prot 00000040, type 01000000 - size 18000
Name: ndisuio.exe
MZ at fffff804`f5b00000, prot 00000040, type 01000000 - size d000
Name: rdpvideominiport.exe
MZ at fffff804`f5b90000, prot 00000040, type 01000000 - size 21000
Name: bindflt.exe
MZ at fffff804`f61d0000, prot 00000040, type 01000000 - size 8f000
Name: mrxsmb.sys
MZ at fffff804`f6260000, prot 00000040, type 01000000 - size 45000
Name: mrxsmb20.exe
MZ at fffff804`f62b0000, prot 00000040, type 01000000 - size 53000
Name: srvnet.sys
MZ at fffff804`f6310000, prot 00000040, type 01000000 - size 14000
Name: mmcss.exe
MZ at fffff804`f6330000, prot 00000040, type 01000000 - size c5000
Name: srv2.exe
MZ at fffff806`5295d000, prot 00000040, type 01000000 - size a3000
Name: HAL.dll
MZ at fffff806`52a00000, prot 00000040, type 01000000 - size ab5000
Name: ntoskrnl.exe
MZ at fffff806`56020000, prot 00000040, type 01000000 - size 11000
Name: WerLiveKernelApi.dll
MZ at fffff806`56040000, prot 00000040, type 01000000 - size 2a000
Name: ksecdd.sys
MZ at fffff806`56070000, prot 00000040, type 01000000 - size 60000
Name: msrpc.sys
MZ at fffff806`560e0000, prot 00000040, type 01000000 - size 27000
Name: ntostmhost.dll
MZ at fffff806`56110000, prot 00000040, type 01000000 - size 68000
Name: CLFS.SYS
MZ at fffff806`56180000, prot 00000040, type 01000000 - size 1a000
Name: PSHED.dll
MZ at fffff806`561a0000, prot 00000040, type 01000000 - size b000
Name: BOOTVID.dll
MZ at fffff806`561b0000, prot 00000040, type 01000000 - size 105000
Name: clipsp.sys
MZ at fffff806`562c0000, prot 00000040, type 01000000 - size 71000
Name: FLTMGR.SYS
MZ at fffff806`56340000, prot 00000040, type 01000000 - size e000
Name: cmimcext.dll
MZ at fffff806`56350000, prot 00000040, type 01000000 - size c000
Name: ntosext.dll
MZ at fffff806`56360000, prot 00000040, type 01000000 - size dc000
Name: CI.dll
MZ at fffff806`56440000, prot 00000040, type 01000000 - size bc000
Name: cng.sys
MZ at fffff806`56500000, prot 00000040, type 01000000 - size d5000
Name: Wdf01000.exe
MZ at fffff806`565e0000, prot 00000040, type 01000000 - size 13000
Name: WDFLDR.SYS
MZ at fffff806`56600000, prot 00000040, type 01000000 - size f000
Name: SleepStudyHelper.sys
MZ at fffff806`56610000, prot 00000040, type 01000000 - size 10000
Name: WppRecorder.sys
MZ at fffff806`56630000, prot 00000040, type 01000000 - size 25000
Name: acpiex.exe
MZ at fffff806`56660000, prot 00000040, type 01000000 - size 49000
Name: mssecflt.exe
MZ at fffff806`566b0000, prot 00000040, type 01000000 - size 1a000
Name: SgrmAgent.exe
MZ at fffff806`566d0000, prot 00000040, type 01000000 - size cc000
Name: ACPI.SYS
MZ at fffff806`567a0000, prot 00000040, type 01000000 - size c000
Name: WMILIB.SYS
MZ at fffff806`567b0000, prot 00000040, type 01000000 - size 49000
Name: intelpep.exe
MZ at fffff806`56800000, prot 00000040, type 01000000 - size 17000
Name: WindowsTrustedRT.exe
MZ at fffff806`56820000, prot 00000040, type 01000000 - size b000
Name: WindowsTrustedRTProxy.exe
MZ at fffff806`56830000, prot 00000040, type 01000000 - size 15000
Name: pcw.exe
MZ at fffff806`56850000, prot 00000040, type 01000000 - size b000
Name: msisadrv.exe
MZ at fffff806`56860000, prot 00000040, type 01000000 - size 6f000
Name: pci.exe
MZ at fffff806`568d0000, prot 00000040, type 01000000 - size 13000
Name: vdrvroot.exe
MZ at fffff806`568f0000, prot 00000040, type 01000000 - size 33000
Name: PDC.exe
MZ at fffff806`56930000, prot 00000040, type 01000000 - size 19000
Name: CEA.sys
MZ at fffff806`56950000, prot 00000040, type 01000000 - size 30000
Name: partmgr.exe
MZ at fffff806`56990000, prot 00000040, type 01000000 - size a000
Name: pciide.exe
MZ at fffff806`569a0000, prot 00000040, type 01000000 - size 13000
Name: PCIIDEX.SYS
MZ at fffff806`569c0000, prot 00000040, type 01000000 - size b000
Name: intelide.exe
MZ at fffff806`569d0000, prot 00000040, type 01000000 - size 1a000
Name: volmgr.exe
MZ at fffff806`569f0000, prot 00000040, type 01000000 - size d000
Name: atapi.exe
MZ at fffff806`56a00000, prot 00000040, type 01000000 - size a5000
Name: spaceport.exe
MZ at fffff806`56ab0000, prot 00000040, type 01000000 - size 63000
Name: volmgrx.exe
MZ at fffff806`56b20000, prot 00000040, type 01000000 - size 1f000
Name: mountmgr.exe
MZ at fffff806`56b40000, prot 00000040, type 01000000 - size 3b000
Name: ataport.SYS
MZ at fffff806`56b80000, prot 00000040, type 01000000 - size 21000
Name: EhStorTcgDrv.exe
MZ at fffff806`56bb0000, prot 00000040, type 01000000 - size 1b000
Name: EhStorClass.exe
MZ at fffff806`56bd0000, prot 00000040, type 01000000 - size 1a000
Name: fileinfo.exe
MZ at fffff806`56bf0000, prot 00000040, type 01000000 - size 3d000
Name: wof.exe
MZ at fffff806`56c30000, prot 00000040, type 01000000 - size 29e000
Name: ntfs.exe
MZ at fffff806`56ed0000, prot 00000040, type 01000000 - size d000
Name: fs_rec.exe
MZ at fffff806`56ee0000, prot 00000040, type 01000000 - size 172000
Name: NDIS.SYS
MZ at fffff806`57060000, prot 00000040, type 01000000 - size 94000
Name: NETIO.SYS
MZ at fffff806`57100000, prot 00000040, type 01000000 - size 32000
Name: ksecpkg.exe
MZ at fffff806`57140000, prot 00000040, type 01000000 - size 2ea000
Name: TCPIP.SYS
MZ at fffff806`57430000, prot 00000040, type 01000000 - size 7a000
Name: fwpkclnt.sys
MZ at fffff806`574b0000, prot 00000040, type 01000000 - size 30000
Name: wfplwfs.exe
MZ at fffff806`574f0000, prot 00000040, type 01000000 - size c9000
Name: fvevol.exe
MZ at fffff806`575c0000, prot 00000040, type 01000000 - size b000
Name: volume.exe
MZ at fffff806`575d0000, prot 00000040, type 01000000 - size 6d000
Name: volsnap.exe
MZ at fffff806`57640000, prot 00000040, type 01000000 - size 4e000
Name: rdyboost.exe
MZ at fffff806`57690000, prot 00000040, type 01000000 - size 25000
Name: MUP.SYS
MZ at fffff806`576c0000, prot 00000040, type 01000000 - size 12000
Name: iorate.exe
MZ at fffff806`576f0000, prot 00000040, type 01000000 - size 1c000
Name: disk.exe
MZ at fffff806`57710000, prot 00000040, type 01000000 - size 6b000
Name: CLASSPNP.SYS
BIOS Information |
[SMBIOS Data Tables v2.5]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 2340 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version 0408
BIOS Starting Address Segment f000
BIOS Release Date 07/20/2009
BIOS ROM Size 100000
BIOS Characteristics
04: - ISA Supported
07: - PCI Supported
09: - Plug and Play Supported
10: - APM Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
14: - ESCD Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
04: - LS120-Boot Supported
05: - ATAPI ZIP-Boot Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
BIOS Major Revision 4
BIOS Minor Revision 8
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer System manufacturer
Product Name System Product Name
Version System Version
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer ASUSTeK Computer INC.
Product P5QL/EPU
Version Rev X.0x
Feature Flags 09h
957724384: - 957724432: - 8?xø
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
Manufacturer Chassis Manufacture
Chassis Type Desktop
Version Chassis Version
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 17
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Processor Information (Type 4) - Length 40 - Handle 0004h]
Socket Designation LGA775
Processor Type Central Processor
Processor Family bfh - Specification Reserved
Processor Manufacturer Intel
Processor ID 77060100fffbebbf
Processor Version Intel(R) Core(TM)2 Quad CPU Q9300 @ 2.50GHz
Processor Voltage 8ch - 1.2V
External Clock 333MHz
Max Speed 3800MHz
Current Speed 2500MHz
Status Enabled Populated
Processor Upgrade Other
L1 Cache Handle 0005h
L2 Cache Handle 0006h
L3 Cache Handle 0007h
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation L1-Cache
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0080h - 128K
Installed Size 0080h - 128K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type ParitySingle-Bit ECC
System Cache Type Data
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation L2-Cache
Cache Configuration 0181h - WB Enabled Int NonSocketed L2
Maximum Cache Size 1800h - 6144K
Installed Size 1800h - 6144K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity Other
[Cache Information (Type 7) - Length 19 - Handle 0007h]
Socket Designation L3-Cache
Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
Maximum Cache Size 0000h - 0K
Installed Size 0000h - 0K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[Onboard Devices Information (Type 10) - Length 6 - Handle 002eh]
Number of Devices 1
01: Type Ethernet [enabled]
01: Description Onboard Ethernet
[OEM Strings (Type 11) - Length 5 - Handle 002fh]
Number of Strings 4
1 20CF30329D1F
[System Configuration Options (Type 12) - Length 5 - Handle 0030h]
[Physical Memory Array (Type 16) - Length 15 - Handle 0033h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 16777216KB
Number of Memory Devices 4
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 0034h]
Starting Address 00000000h
Ending Address 007fffffh
Memory Array Handle 0033h
Partition Width 04
[Memory Device (Type 17) - Length 27 - Handle 0035h]
Physical Memory Array Handle 0033h
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Locator DIMM0
Bank Locator BANK0
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer0
Part Number PartNum0
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0036h]
Starting Address 00000000h
Ending Address 001fffffh
Memory Device Handle 0035h
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 0037h]
Physical Memory Array Handle 0033h
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Locator DIMM1
Bank Locator BANK1
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer1
Part Number PartNum1
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0038h]
Starting Address 00210000h
Ending Address 0040ffffh
Memory Device Handle 0037h
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 0039h]
Physical Memory Array Handle 0033h
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Locator DIMM2
Bank Locator BANK2
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer2
Part Number PartNum2
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003ah]
Starting Address 00210000h
Ending Address 0040ffffh
Memory Device Handle 0039h
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 003bh]
Physical Memory Array Handle 0033h
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Locator DIMM3
Bank Locator BANK3
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer3
Part Number PartNum3
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003ch]
Starting Address 00210000h
Ending Address 0040ffffh
Memory Device Handle 003bh
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
Most of this information is taken from the BIOS. If the dump file did not include the full BIOS section (as seen on the left), then some information below may be missing.
System Information |
BIOS |
VENDOR: American Megatrends Inc.
VERSION: 0408
DATE: 07/20/2009
Motherboard |
MANUFACTURER: ASUSTeK Computer INC.
PRODUCT: P5QL/EPU
VERSION: Rev X.0x
RAM |
Size | Speed | Manufacturer | Part No. |
2048MB | 800MHz | Manufacturer0 | PartNum0 |
2048MB | 800MHz | Manufacturer1 | PartNum1 |
2048MB | 800MHz | Manufacturer2 | PartNum2 |
2048MB | 800MHz | Manufacturer3 | PartNum3 |
CPU |
Processor Version: Intel(R) Core(TM)2 Quad CPU Q9300 @ 2.50GHz
COUNT: 4
MHZ: 2508
VENDOR: GenuineIntel
FAMILY: 6
MODEL: 17
STEPPING: 7
MICROCODE: 6,17,7,0 (F,M,S,R) SIG: 70B'00000000 (cache) 70B'00000000 (init)
OS |
Product: WinNt, suite: TerminalServer SingleUserTS
BUILD_VERSION: 10.0.18362.295 (WinBuild.160101.0800)
BUILD: 18362
SERVICEPACK: 295
PLATFORM_TYPE: x64
NAME: Windows 10
EDITION: Windows 10 WinNt TerminalServer SingleUserTS
BUILD_TIMESTAMP: 1998-05-30 17:12:57
BUILDDATESTAMP: 160101.0800
BUILDLAB: WinBuild
BUILDOSVER: 10.0.18362.295
Debugger |
Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Comments |
* Information gathered from different dump files may be different. If
Windows updates between two dump files, two or more OS versions may
be shown above.
* If the user updates the BIOS between dump files, two or more versions
and dates may be shown above.
* More RAM information can be found below in the full BIOS section.
3rd Party Drivers (Quick List) |
Date | Driver | Description |
C-Media Audio WDM driver | ||
Asus Advanced Configuration and Power Interface http://www.asus.com/ | ||
HWiNFO AMD64 Kernel driver https://www.hwinfo.com/ | ||
Nvidia HDMI Audio Device http://www.nvidia.com/ | ||
Panda Kernel Memory Access driver | ||
TAP-Windows Virtual Network driver (OpenVPN Technologies, Inc.) | ||
Nvidia Graphics Card driver http://www.nvidia.com/ | ||
Alocr Micro USB Mass Storage Driver | ||
Nano Network Security (Panda Security S.L.) | ||
Nvidia Virtual USB Host Controller driver http://www.nvidia.com/ | ||
Nano Network Security Application Layer Protocol Colorizer (Panda Security S.L.) | ||
Panda Endpoint Protection driver (Panda Security) | ||
Nano Network Security Http Parser (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Panda Cloud Antivirus - Filter driver | ||
Panda Cloud Antivirus - Filter driver | ||
Panda Cloud Antivirus - Kernel Controller driver | ||
Panda Cloud Antivirus - Filter driver | ||
Panda Cloud Antivirus driver | ||
Panda Cloud Antivirus - Filter driver | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Nano Network Security (Panda Security S.L.) | ||
Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/ |
3rd Party Drivers |
Image name: cmudax3.sys
Search : https://www.google.com/search?q=cmudax3.sys
ADA Info : C-Media Audio WDM driver
Timestamp : Tue Sep 4 2012
Image name: ASACPI.sys
Search : https://www.google.com/search?q=ASACPI.sys
ADA Info : Asus Advanced Configuration and Power Interface http://www.asus.com/
Timestamp : Thu Nov 1 2012
Image name: HWiNFO64A.SYS
Search : https://www.google.com/search?q=HWiNFO64A.SYS
ADA Info : HWiNFO AMD64 Kernel driver https://www.hwinfo.com/
Timestamp : Tue Mar 31 2015
Image name: nvhda64v.sys
Search : https://www.google.com/search?q=nvhda64v.sys
ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
Timestamp : Tue May 10 2016
Image name: PSKMAD.sys
Search : https://www.google.com/search?q=PSKMAD.sys
ADA Info : Panda Kernel Memory Access driver
Timestamp : Mon May 22 2017
Image name: aftap0901.sys
Search : https://www.google.com/search?q=aftap0901.sys
ADA Info : TAP-Windows Virtual Network driver (OpenVPN Technologies, Inc.)
Timestamp : Mon Nov 6 2017
Image name: nvlddmkm.sys
Search : https://www.google.com/search?q=nvlddmkm.sys
ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
Timestamp : Fri Mar 23 2018
Image name: AmUStor.SYS
Search : https://www.google.com/search?q=AmUStor.SYS
ADA Info : Alocr Micro USB Mass Storage Driver
Timestamp : Wed Apr 25 2018
Image name: NNSNAHSL.sys
Search : https://www.google.com/search?q=NNSNAHSL.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Fri Jul 6 2018
Image name: nvvhci.sys
Search : https://www.google.com/search?q=nvvhci.sys
ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
Timestamp : Thu Aug 16 2018
Image name: NNSALPC.sys
Search : https://www.google.com/search?q=NNSALPC.sys
ADA Info : Nano Network Security Application Layer Protocol Colorizer (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSDNS.sys
Search : https://www.google.com/search?q=NNSDNS.sys
ADA Info : Panda Endpoint Protection driver (Panda Security)
Timestamp : Mon Mar 4 2019
Image name: NNSHTTP.sys
Search : https://www.google.com/search?q=NNSHTTP.sys
ADA Info : Nano Network Security Http Parser (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSIDS.sys
Search : https://www.google.com/search?q=NNSIDS.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSPICC.sys
Search : https://www.google.com/search?q=NNSPICC.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSPOP3.sys
Search : https://www.google.com/search?q=NNSPOP3.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSPROT.sys
Search : https://www.google.com/search?q=NNSPROT.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSSMTP.sys
Search : https://www.google.com/search?q=NNSSMTP.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSSTRM.sys
Search : https://www.google.com/search?q=NNSSTRM.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: NNSTLSC.sys
Search : https://www.google.com/search?q=NNSTLSC.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 4 2019
Image name: PSINAflt.sys
Search : https://www.google.com/search?q=PSINAflt.sys
ADA Info : Panda Cloud Antivirus - Filter driver
Timestamp : Mon Mar 4 2019
Image name: PSINFile.sys
Search : https://www.google.com/search?q=PSINFile.sys
ADA Info : Panda Cloud Antivirus - Filter driver
Timestamp : Mon Mar 4 2019
Image name: PSINKNC.sys
Search : https://www.google.com/search?q=PSINKNC.sys
ADA Info : Panda Cloud Antivirus - Kernel Controller driver
Timestamp : Mon Mar 4 2019
Image name: PSINProc.sys
Search : https://www.google.com/search?q=PSINProc.sys
ADA Info : Panda Cloud Antivirus - Filter driver
Timestamp : Mon Mar 4 2019
Image name: PSINProt.sys
Search : https://www.google.com/search?q=PSINProt.sys
ADA Info : Panda Cloud Antivirus driver
Timestamp : Mon Mar 4 2019
Image name: PSINReg.sys
Search : https://www.google.com/search?q=PSINReg.sys
ADA Info : Panda Cloud Antivirus - Filter driver
Timestamp : Mon Mar 4 2019
Image name: NNSPIHSW.sys
Search : https://www.google.com/search?q=NNSPIHSW.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Tue Mar 5 2019
Image name: NNSHTTPS.sys
Search : https://www.google.com/search?q=NNSHTTPS.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Wed Mar 6 2019
Image name: NNSPRV.sys
Search : https://www.google.com/search?q=NNSPRV.sys
ADA Info : Nano Network Security (Panda Security S.L.)
Timestamp : Mon Mar 25 2019
Image name: rt640x64.sys
Search : https://www.google.com/search?q=rt640x64.sys
ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver https://www.realtek.com/en/
Timestamp : Fri May 10 2019
If any of the above drivers are from Microsoft then please let me know.
I will have them moved to the Microsoft list on the next update.
Microsoft Drivers |
Driver | Description |
ACPI.sys | ACPI Driver for NT (Microsoft) |
acpiex.sys | ACPIEx Driver (Microsoft) |
afd.sys | Ancillary Function Driver for WinSock (Microsoft) |
afunix.sys | AF_UNIX Socket Provider driver (Microsoft) |
AgileVpn.sys | RAS Agil VPN Miniport Call Manager driver (Microsoft) |
ahcache.sys | Application Compatibility Cache (Microsoft) |
atapi.sys | ATAPI IDE MiniPort driver (Microsoft) |
ataport.SYS | ATAPI Driver Extension (Microsoft) |
bam.sys | BAM Kernal driver (Microsoft) |
BasicDisplay.sys | Basic Display driver (Microsoft) |
BasicRender.sys | Basic Render driver (Microsoft) |
Beep.SYS | BEEP driver (Microsoft) |
bindflt.sys | Windows Bind Filter driver (Microsoft) |
BOOTVID.dll | VGA Boot Driver (Microsoft) |
bowser.sys | NT Lan Manager Datagram Receiver Driver (Microsoft) |
cdd.dll | Canonical Display Driver (Microsoft) |
cdrom.sys | SCSI CD-ROM Driver (Microsoft) |
CEA.sys | Event Aggregation Kernal Mode Library (Microsoft) |
CI.dll | Code Integrity Module (Microsoft) |
CLASSPNP.SYS | SCSI Class System Dll (Microsoft) |
cldflt.sys | Cloud Files Mini Filter driver (Microsoft) |
CLFS.SYS | Common Log File System Driver (Microsoft) |
clipsp.sys | CLIP Service (Microsoft) |
cmimcext.sys | Kernal Configuration Manager Initial Con. Driver (Microsoft) |
cng.sys | Kernal Cryptography, Next Generation Driver (Microsoft) |
CompositeBus.sys | Multi-Transport Composite Bus Enumerator (Microsoft) |
condrv.sys | Console Driver (Microsoft) |
crashdmp.sys | Crash Dump driver (Microsoft) |
csc.sys | Windows Client Side Caching driver (Microsoft) |
dfsc.sys | DFS Namespace Client Driver (Microsoft) |
disk.sys | PnP Disk Driver (Microsoft) |
drmk.sys | Digital Rights Management (DRM) driver (Microsoft) |
dump_atapi.sys | (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files. |
dump_ataport.sys | (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files. |
dump_dumpfve.sys | (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files. |
dxgkrnl.sys | DirectX Graphics Kernal (Microsoft) |
dxgmms2.sys | DirectX Graphics MMS |
EhStorClass.sys | Enhanced Storage Class driver for IEEE... (Microsoft) |
EhStorTcgDrv.sys | Microsoft driver for storage devices supporting IEEE 1667 and TCG protocols |
fdc.sys | Floppy Disk Controller driver (Microsoft) |
filecrypt.sys | Windows sandboxing and encryption filter (Microsoft) |
fileinfo.sys | FileInfo Filter Driver (Microsoft) |
flpydisk.sys | Floppy Driver |
FLTMGR.SYS | Filesystem Filter Manager (Microsoft) |
Fs_Rec.sys | File System Recognizer Driver (Microsoft) |
fvevol.sys | BitLocker Driver Encryption Driver (Microsoft) |
fwpkclnt.sys | FWP/IPsec Kernal-Mode API (Microsoft) |
gpuenergydrv.sys | GPU Energy Kernal Driver (Microsoft) |
hal.dll | Hardware Abstraction Layer DLL (Microsoft) |
HDAudBus.sys | High Definition Audio Bus Driver (Microsoft) |
HdAudio.sys | High Definition Audio Function driver (Microsoft) |
HIDCLASS.SYS | Hid Class Library (Microsoft) |
HIDPARSE.SYS | Hid Parsing Library (Microsoft) |
hidusb.sys | USB Miniport Driver for Input Devices (Microsoft) |
HTTP.sys | HTTP Protocol Stack (Microsoft) |
intelide.sys | Intel PCI IDE Driver |
intelpep.sys | Intel Power Engine Plugin (Microsoft) |
intelppm.sys | Processor Device Driver (Microsoft) |
iorate.sys | I/O rate control Filter (Microsoft) |
kbdclass.sys | Keyboard Class Driver (Microsoft) |
kbdhid.sys | HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft) |
kdcom.dll | Kernel Debugger HW Extension DLL (Microsoft) |
kdnic.sys | Microsoft Kernel Debugger Network Miniport (Microsoft) |
ks.sys | Kernal CSA Library (Microsoft) |
ksecdd.sys | Kernel Security Support Provider Interface (Microsoft) |
ksecpkg.sys | Kernel Security Support Provider Interface Packages (Microsoft) |
ksthunk.sys | Kernal Streaming WOW Thunk Service (Microsoft) |
lltdio.sys | Link-Layer Topology Mapper I/O Driver (Microsoft) |
luafv.sys | LUA File Virtualization Filter Driver (Microsoft) |
mcupdate.dll | Media Center Update (Microsoft) |
mmcss.sys | MMCSS Driver (Microsoft) |
monitor.sys | Monitor Driver (Microsoft) |
mouclass.sys | Mouse Class Driver (Microsoft) |
mouhid.sys | HID Mouse Filter Driver (Microsoft) |
mountmgr.sys | Mount Point Manager (Microsoft) |
mpsdrv.sys | Microsoft Protection Service Driver (Microsoft) |
mrxsmb.sys | SMB MiniRedirector Wrapper and Engine (Microsoft) |
mrxsmb20.sys | Longhorn SMB 2.0 Redirector (Microsoft) |
Msfs.SYS | Mailslot driver (Microsoft) |
msisadrv.sys | ISA Driver (Microsoft) |
mslldp.sys | Microsoft Link-Layer Discovery Protocol... (Microsoft) |
msrpc.sys | Kernel Remote Procedure Call Provider (Microsoft) |
mssecflt.sys | Microsoft Security Events Component file system filter driver (Microsoft) |
mssmbios.sys | System Management BIOS driver (Microsoft) |
mup.sys | Multiple UNC Provider driver (Microsoft) |
ndis.sys | Network Driver Interface Specification (NDIS) driver (Microsoft) |
ndistapi.sys | NDIS 3.0 Connection Wrapper driver (Microsoft) |
ndisuio.sys | NDIS User mode I/O driver (Microsoft) |
NdisVirtualBus.sys | Virtual Network Adapter Enumerator (Microsoft) |
ndiswan.sys | MS PPP Framing Driver (Strong Encryption) Microsoft) |
NDProxy.sys | NDIS Proxy driver (Microsoft) |
Ndu.sys | Network Data Usage Monitoring driver (Microsoft) |
netbios.sys | NetBIOS Interface driver (Microsoft) |
netbt.sys | MBT Transport driver (Microsoft) |
NETIO.SYS | Network I/O Subsystem (Microsoft) |
Npfs.SYS | NPFS driver (Microsoft) |
npsvctrig.sys | Named pipe service triggers (Microsoft) |
nsiproxy.sys | NSI Proxy driver (Microsoft) |
Ntfs.sys | NT File System Driver (Microsoft) |
ntkrnlmp.exe | Windows NT operating system kernel (Microsoft) |
ntosext.sys | NTOS Extension Host driver (Microsoft) |
Null.SYS | NULL Driver (Microsoft) |
pacer.sys | QoS Packet Scheduler (Microsoft) |
parport.sys | Parallel Port Driver (Microsoft) |
partmgr.sys | Partition driver (Microsoft) |
pci.sys | NT Plug and Play PCI Enumerator (Microsoft) |
pciide.sys | Generic PCI IDE Bus Driver (Microsoft) |
PCIIDEX.SYS | PCI IDE Bus driver file (Microsoft) |
pcw.sys | Performance Counter Driver (Microsoft) |
pdc.sys | Power Dependency Coordinator Driver (Microsoft) |
peauth.sys | Protected Environment Authentication and Authorization Export Driver (Microsoft) |
portcls.sys | Class Driver for Port/Miniport Devices system driver (Microsoft) |
PSHED.dll | Platform Specific Hardware Error driver (Microsoft) |
rasl2tp.sys | RAS L2TP Mini-port/Call-manager driver (Microsoft) |
raspppoe.sys | RAS PPPoE Mini-port/Call manager driver (Microsoft) |
raspptp.sys | Peer-to-Peer Tunneling Protocol (Microsoft) |
rassstp.sys | RAS SSTP Miniport Call Manager driver (Microsoft) |
rdbss.sys | Redirected Drive Buffering SubSystem driver (Microsoft) |
rdpbus.sys | Microsoft RDP Bus Device driver (Microsoft) |
rdpvideominiport.sys | RDP Video Miniport driver (Microsoft) |
rdyboost.sys | ReadyBoost Driver (Microsoft) |
rspndr.sys | Link-Layer Topology Responder driver (Microsoft) |
serenum.sys | Serial Port Enumerator (Microsoft) |
serial.sys | Serial Device Driver |
SgrmAgent.sys | System Guard Runtime Monitor Agent driver (Microsoft) |
SleepStudyHelper.sys | Sleep Study Helper driver (Microsoft) |
spaceport.sys | Storage Spaces driver (Microsoft) |
srv2.sys | Smb 2.0 Server driver (Microsoft) |
srvnet.sys | Server Network driver (Microsoft) |
storqosflt.sys | Storage QoS Filter driver (Microsoft) |
swenum.sys | Plug and Play Software Device Enumerator (Microsoft) |
tbs.sys | Export driver for kernel mode TPM API (Microsoft) |
tcpip.sys | TCP/IP Protocol driver (Microsoft) |
tcpipreg.sys | Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft) |
TDI.SYS | TDI Wrapper driver (Microsoft) |
tdx.sys | NetIO Legacy TDI x-bit Support Driver (Microsoft) |
tm.sys | Kernel Transaction Manager driver (Microsoft) |
umbus.sys | User-Mode Bus Enumerator (Microsoft) |
usbccgp.sys | USB Common Class Generic Parent Driver (Microsoft) |
USBD.SYS | Universal Serial Bus Driver (Microsoft) |
usbehci.sys | EHCI eUSB Miniport Driver (Microsoft) |
usbhub.sys | Default Hub Driver for USB (Microsoft) |
USBPORT.SYS | USB 1.1 & 2.0 Port Driver (Microsoft) |
usbuhci.sys | UHCI USB Miniport driver (Microsoft) |
vdrvroot.sys | Virtual Drive Root Enumerator (Microsoft) |
Vid.sys | Microsoft Hyper-V Virtualization Infrastructure Driver |
volmgr.sys | Volume Manager Driver (Microsoft) |
volmgrx.sys | Volume Manager Extension Driver (Microsoft) |
volsnap.sys | Volume Shadow Copy driver (Microsoft) |
volume.sys | Volume driver (Microsoft) |
vwififlt.sys | Virtual WiFi Filter Driver (Microsoft) |
wanarp.sys | MS Remote Access and Routing ARP driver (Microsoft) |
watchdog.sys | Watchdog driver (Microsoft) |
wcifs.sys | Windows Container Isolation FS Filter driver (Microsoft) |
Wdf01000.sys | Kernel Mode Driver Framework Runtime (Microsoft) |
WDFLDR.SYS | Kernel Mode Driver Framework Loader (Microsoft) |
werkernel.sys | Windows Error Reporting Kernel driver (Microsoft) |
wfplwfs.sys | WPF NDIS Lightweight Filter driver (Microsoft) |
win32k.sys | Full/Desktop Multi-User Win32 driver (Microsoft) |
win32kbase.sys | Base Win32k Kernel Driver (Microsoft) |
win32kfull.sys | Full/Desktop Win32k Kernel Driver (Microsoft) |
WindowsTrustedRT.sys | Windows Trusted Runtime Interface driver (Microsoft) |
WindowsTrustedRTProxy.sys | Windows Trusted Runtime Service Proxy driver (Microsoft) |
winhvr.sys | Windows Hypervisor Root Interface Driver |
winquic.sys | QUIC Transport Protocol driver (Microsoft) |
WMILIB.SYS | WMILIB WMI support library DLL (Microsoft) |
Wof.sys | Windows Overlay Filter (Microsoft) |
WpdUpFltr.sys | Portable Device Upper Class Filter driver (Microsoft) |
WppRecorder.sys | WPP Trace Recorder (Microsoft) |
WUDFRd.sys | Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft) |
Unloaded Modules |
Start | End | Driver |
fffff804`f5bc0000 | fffff804`f5cc1000 | EasyAntiChea |
fffff804`fa170000 | fffff804`fb257000 | mracdrv.sys |
fffff804`f5b50000 | fffff804`f5b60000 | hiber_atapor |
fffff804`f5b60000 | fffff804`f5b6e000 | hiber_atapi. |
fffff804`f5b70000 | fffff804`f5b8e000 | hiber_dumpfv |
fffff804`f5b10000 | fffff804`f5b20000 | hiber_atapor |
fffff804`f5b20000 | fffff804`f5b2e000 | hiber_atapi. |
fffff804`f5b30000 | fffff804`f5b4e000 | hiber_dumpfv |
fffff804`f9580000 | fffff804`fa667000 | mracdrv.sys |
fffff804`f21f0000 | fffff804`f2200000 | dump_ataport |
fffff804`f1a10000 | fffff804`f1a1e000 | dump_atapi.s |
fffff804`f1a40000 | fffff804`f1a5e000 | dump_dumpfve |
fffff804`f2540000 | fffff804`f255e000 | dam.sys |
fffff806`576e0000 | fffff806`576f0000 | hwpolicy.sys |
Dump #1: 081719-10906-01.dmp |
Mini Kernel Dump File: Only registers and stack trace are available
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Kernel base = 0xfffff806`52a00000 PsLoadedModuleList = 0xfffff806`52e46490
Debug session time: Sat Aug 17 13:07:26.043 2019 (UTC - 4:00)
System Uptime: 2 days 2:48:21.819
BugCheck D1, {0, 2, 1, fffff804f23abbee}
*** WARNING: Unable to verify timestamp for NNSPIHSW.sys
*** ERROR: Module load completed but symbols could not be loaded for NNSPIHSW.sys
Probably caused by : hardware ( NNSPIHSW+bbee )
Followup: MachineOwner
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff804f23abbee, address which referenced memory
Debugging Details:
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
WRITE_ADDRESS: fffff80652f713b8: Unable to get MiVisibleState
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
NNSPIHSW+bbee
fffff804`f23abbee 0000 add byte ptr [rax],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: ffffc08e83dfc6c0 -- (.trap 0xffffc08e83dfc6c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff804f23b4820
rdx=ffffac043b3f5344 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804f23abbee rsp=ffffc08e83dfc850 rbp=0000000000006180
r8=0000000000000000 r9=0000000000000006 r10=ffffac043550b1e8
r11=ffffc08e83dfc930 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NNSPIHSW+0xbbee:
fffff804`f23abbee 0000 add byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope
MISALIGNED_IP:
NNSPIHSW+bbee
fffff804`f23abbee 0000 add byte ptr [rax],al
LAST_CONTROL_TRANSFER: from fffff80652bd1ae9 to fffff80652bbfcc0
STACK_TEXT:
ffffc08e`83dfc578 fffff806`52bd1ae9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffc08e`83dfc580 fffff806`52bcde2b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc08e`83dfc6c0 fffff804`f23abbee : ffffac04`3550b1e8 fffff804`f23ab86a ffffac04`3b3f5344 ffffc08e`83dfc900 : nt!KiPageFault+0x46b
ffffc08e`83dfc850 ffffac04`3550b1e8 : fffff804`f23ab86a ffffac04`3b3f5344 ffffc08e`83dfc900 ffffac04`35505000 : NNSPIHSW+0xbbee
ffffc08e`83dfc858 fffff804`f23ab86a : ffffac04`3b3f5344 ffffc08e`83dfc900 ffffac04`35505000 fffff804`f23b2000 : 0xffffac04`3550b1e8
ffffc08e`83dfc860 ffffac04`3b3f5344 : ffffc08e`83dfc900 ffffac04`35505000 fffff804`f23b2000 fffff804`f23b0201 : NNSPIHSW+0xb86a
ffffc08e`83dfc868 ffffc08e`83dfc900 : ffffac04`35505000 fffff804`f23b2000 fffff804`f23b0201 fffff804`f23ad925 : 0xffffac04`3b3f5344
ffffc08e`83dfc870 ffffac04`35505000 : fffff804`f23b2000 fffff804`f23b0201 fffff804`f23ad925 ffffac04`35505000 : 0xffffc08e`83dfc900
ffffc08e`83dfc878 fffff804`f23b2000 : fffff804`f23b0201 fffff804`f23ad925 ffffac04`35505000 00000000`00000138 : 0xffffac04`35505000
ffffc08e`83dfc880 fffff804`f23b0201 : fffff804`f23ad925 ffffac04`35505000 00000000`00000138 ffffac04`3b3f5344 : NNSPIHSW+0x12000
ffffc08e`83dfc888 fffff804`f23ad925 : ffffac04`35505000 00000000`00000138 ffffac04`3b3f5344 fffff804`f23b02d0 : NNSPIHSW+0x10201
ffffc08e`83dfc890 ffffac04`35505000 : 00000000`00000138 ffffac04`3b3f5344 fffff804`f23b02d0 00000000`00000000 : NNSPIHSW+0xd925
ffffc08e`83dfc898 00000000`00000138 : ffffac04`3b3f5344 fffff804`f23b02d0 00000000`00000000 00000000`00000000 : 0xffffac04`35505000
ffffc08e`83dfc8a0 ffffac04`3b3f5344 : fffff804`f23b02d0 00000000`00000000 00000000`00000000 00000000`00000000 : 0x138
ffffc08e`83dfc8a8 fffff804`f23b02d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffac04`3b3f5344
ffffc08e`83dfc8b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NNSPIHSW+0x102d0
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: f720e975830123736b71c198a7e2b43191256ef7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 32f948eef336207543bf02bfa7229524d94d55a5
THREAD_SHA1_HASH_MOD: dfa3a2b6a98d2ba010f4c16028beff49759121d0
FOLLOWUP_IP:
NNSPIHSW+bbee
fffff804`f23abbee 0000 add byte ptr [rax],al
FAULT_INSTR_CODE: 0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NNSPIHSW+bbee
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: IP_MISALIGNED_NNSPIHSW.sys
BUCKET_ID: IP_MISALIGNED_NNSPIHSW.sys
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_NNSPIHSW.sys
TARGET_TIME: 2019-08-17T17:07:26.000Z
SUITE_MASK: 272
PRODUCT_TYPE: 1
USER_LCID: 0
FAILURE_ID_HASH_STRING: km:ip_misaligned_nnspihsw.sys
FAILURE_ID_HASH: {928ce8cf-07ca-84a8-7de3-e93c0b92dcff}
Followup: MachineOwner
Dump #2: 081519-10656-01.dmp |
Mini Kernel Dump File: Only registers and stack trace are available
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Kernel base = 0xfffff800`50c00000 PsLoadedModuleList = 0xfffff800`51046490
Debug session time: Thu Aug 15 09:10:49.699 2019 (UTC - 4:00)
System Uptime: 0 days 1:58:18.476
BugCheck D1, {fffff8890edbf739, 2, 1, fffff801591a6d62}
*** WARNING: Unable to verify timestamp for NNSNAHSL.sys
*** ERROR: Module load completed but symbols could not be loaded for NNSNAHSL.sys
Probably caused by : NNSNAHSL.sys ( NNSNAHSL+6d62 )
Followup: MachineOwner
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8890edbf739, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff801591a6d62, address which referenced memory
Debugging Details:
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
WRITE_ADDRESS: fffff800511713b8: Unable to get MiVisibleState
fffff8890edbf739
CURRENT_IRQL: 2
FAULTING_IP:
NNSNAHSL+6d62
fffff801`591a6d62 0180e1040420 add dword ptr [rax+200404E1h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: GameCenter.exe
TRAP_FRAME: fffff888eed7f020 -- (.trap 0xfffff888eed7f020)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff888eed7f258 rbx=0000000000000000 rcx=fffff801591b26c0
rdx=ffff810102d2b9b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801591a6d62 rsp=fffff888eed7f1b4 rbp=fffff888eed7f1b8
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff888eed7f3a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
NNSNAHSL+0x6d62:
fffff801`591a6d62 0180e1040420 add dword ptr [rax+200404E1h],eax ds:fffff889`0edbf739=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80050dd1ae9 to fffff80050dbfcc0
STACK_TEXT:
fffff888`eed7eed8 fffff800`50dd1ae9 : 00000000`0000000a fffff889`0edbf739 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff888`eed7eee0 fffff800`50dcde2b : fffff801`00000004 fffff800`5431e891 fffff888`00000003 00000000`00000005 : nt!KiBugCheckDispatch+0x69
fffff888`eed7f020 fffff801`591a6d62 : 591b1400`fffff888 eed7f202`ffffea01 00000000`fffff888 00000001`00000000 : nt!KiPageFault+0x46b
fffff888`eed7f1b4 591b1400`fffff888 : eed7f202`ffffea01 00000000`fffff888 00000001`00000000 00000000`fffff888 : NNSNAHSL+0x6d62
fffff888`eed7f1bc eed7f202`ffffea01 : 00000000`fffff888 00000001`00000000 00000000`fffff888 ff6de790`00000000 : 0x591b1400`fffff888
fffff888`eed7f1c4 00000000`fffff888 : 00000001`00000000 00000000`fffff888 ff6de790`00000000 fe93ae61`ffff810f : 0xeed7f202`ffffea01
fffff888`eed7f1cc 00000001`00000000 : 00000000`fffff888 ff6de790`00000000 fe93ae61`ffff810f 00000000`ffff810f : 0xfffff888
fffff888`eed7f1d4 00000000`fffff888 : ff6de790`00000000 fe93ae61`ffff810f 00000000`ffff810f 00000000`00000000 : 0x00000001`00000000
fffff888`eed7f1dc ff6de790`00000000 : fe93ae61`ffff810f 00000000`ffff810f 00000000`00000000 00000000`00000000 : 0xfffff888
fffff888`eed7f1e4 fe93ae61`ffff810f : 00000000`ffff810f 00000000`00000000 00000000`00000000 00000000`00000000 : 0xff6de790`00000000
fffff888`eed7f1ec 00000000`ffff810f : 00000000`00000000 00000000`00000000 00000000`00000000 02d2b9b0`00000000 : 0xfe93ae61`ffff810f
fffff888`eed7f1f4 00000000`00000000 : 00000000`00000000 00000000`00000000 02d2b9b0`00000000 00000000`ffff8101 : 0xffff810f
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 7c2a14df4d7ed4161d1d098e3a649f7a9714a310
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f345e1f1ceae063717e6eea13d256d648a6e6197
THREAD_SHA1_HASH_MOD: 7ae3c3dfc48d6e40b0232cf066041f48e5e47f74
FOLLOWUP_IP:
NNSNAHSL+6d62
fffff801`591a6d62 0180e1040420 add dword ptr [rax+200404E1h],eax
FAULT_INSTR_CODE: 4e18001
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NNSNAHSL+6d62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NNSNAHSL
IMAGE_NAME: NNSNAHSL.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5b3f6af2
BUCKET_ID_FUNC_OFFSET: 6d62
FAILURE_BUCKET_ID: AV_NNSNAHSL!unknown_function
BUCKET_ID: AV_NNSNAHSL!unknown_function
PRIMARY_PROBLEM_CLASS: AV_NNSNAHSL!unknown_function
TARGET_TIME: 2019-08-15T13:10:49.000Z
SUITE_MASK: 272
PRODUCT_TYPE: 1
USER_LCID: 0
FAILURE_ID_HASH_STRING: km:av_nnsnahsl!unknown_function
FAILURE_ID_HASH: {9bcdfa14-2360-8937-7284-3881cac9288a}
Followup: MachineOwner