Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\mcbac\Downloads\Telegram Desktop\051118-7109-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 16299 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 16299.15.amd64fre.rs3_release.170928-1534
- Machine Name:
- Kernel base = 0xfffff800`2ce82000 PsLoadedModuleList = 0xfffff800`2d1e3ff0
- Debug session time: Fri May 11 15:06:43.772 2018 (UTC - 3:00)
- System Uptime: 0 days 0:04:12.499
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- ................................................................
- ...
- Loading User Symbols
- Loading unloaded module list
- ...........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 12B, {ffffffffc00002c4, cf6, 294a80, ffffd181b0f20000}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : ntkrnlmp.exe ( nt!ST_STORE<SM_TRAITS>::StDmPageError+f4 )
- Followup: MachineOwner
- ---------
- 2: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
- This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
- Arguments:
- Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
- Arg2: 0000000000000cf6, physical page number
- Arg3: 0000000000294a80, zero
- Arg4: ffffd181b0f20000, zero
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534
- SYSTEM_MANUFACTURER: LENOVO
- SYSTEM_PRODUCT_NAME: 81CQ
- SYSTEM_SKU: LENOVO_MT_81CQ_BU_idea_FM_
- SYSTEM_VERSION: Lenovo Y720-15IKB
- BIOS_VENDOR: LENOVO
- BIOS_VERSION: 4GCN35WW
- BIOS_DATE: 02/23/2018
- BASEBOARD_MANUFACTURER: LENOVO
- BASEBOARD_PRODUCT: Provence-75I
- BASEBOARD_VERSION: SDK0J40688 WIN
- DUMP_TYPE: 2
- BUGCHECK_P1: ffffffffc00002c4
- BUGCHECK_P2: cf6
- BUGCHECK_P3: 294a80
- BUGCHECK_P4: ffffd181b0f20000
- SM_COMPRESSION_FORMAT: 3
- SM_SOURCE_PFN1: 48b6e5
- SM_SOURCE_PFN2: 48aee4
- SM_SOURCE_OFFSET: 4a80
- SM_SOURCE_SIZE: cf6
- SM_TARGET_PFN: 1a89
- SM_BUFFER_HASH: 133c35c0
- BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed
- CPU_COUNT: 8
- CPU_MHZ: af8
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 9e
- CPU_STEPPING: 9
- CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXPNP: 1 (!blackboxpnp)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: MCBACKER-LENOVO
- ANALYSIS_SESSION_TIME: 05-12-2018 18:48:17.0664
- ANALYSIS_VERSION: 10.0.17134.12 amd64fre
- LAST_CONTROL_TRANSFER: from fffff8002d0e75ac to fffff8002cfe60e0
- STACK_TEXT:
- ffffa58f`1f76f118 fffff800`2d0e75ac : 00000000`0000012b ffffffff`c00002c4 00000000`00000cf6 00000000`00294a80 : nt!KeBugCheckEx
- ffffa58f`1f76f120 fffff800`2d0e8a3e : 00000000`00000200 ffffe207`ecc5d050 00000000`00294a80 00000000`00294a80 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xf4
- ffffa58f`1f76f170 fffff800`2d0e8c2e : 00000000`00000004 ffffa58f`1f76f380 00000000`00000000 00000000`00000014 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x322
- ffffa58f`1f76f250 fffff800`2d0e9a82 : 00000000`00000001 00000000`00004a80 ffffe207`ecc5d050 00000000`00005000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xaa
- ffffa58f`1f76f2a0 fffff800`2d0e80aa : ffffe207`ffffffff ffffe207`e894f000 ffffa58f`1f76f380 ffffe207`edd7c1f0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1d6
- ffffa58f`1f76f340 fffff800`2d0e1f26 : ffffe207`edd7c1f0 00000000`00000000 00000000`00000001 ffffe207`ecc5e788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc2
- ffffa58f`1f76f3f0 fffff800`2d0e1e21 : ffffe207`ecc5d000 ffffa58f`1f76f510 fffff800`2d0e1e00 ffffe207`ecc5e788 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x76
- ffffa58f`1f76f450 fffff800`2cf31a3b : ffffe207`edfe8700 ffffa58f`1f76f510 ffffe207`eddcd060 00000000`00000003 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
- ffffa58f`1f76f480 fffff800`2d0e1d80 : 00000000`00000003 ffffe207`e894f000 ffffe207`ecc5d000 ffffe207`edd7c1f0 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
- ffffa58f`1f76f4d0 fffff800`2d0e35c1 : ffffa58f`1f76f5d0 fffff800`2ce8f951 00000000`00000000 fffff800`2d0e088e : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcc
- ffffa58f`1f76f5a0 fffff800`2d0e0f19 : 00000000`00000000 00000000`00000000 ffffa58f`1f76f650 ffffe207`edd7c1f0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x41
- ffffa58f`1f76f5f0 fffff800`2d0e1197 : 00000000`0000000c 00000000`00000005 ffffe207`edd7c1f0 ffffe207`eddcd060 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1e1
- ffffa58f`1f76f670 fffff800`2d0eb21e : ffffe207`00000005 ffffe207`eddcd110 00000000`00000000 ffffe207`ecc5d000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cf
- ffffa58f`1f76f6e0 fffff800`2d025f00 : ffffe207`eddcd010 ffffe207`edfe8700 ffffe207`edfe8700 fffff800`2cf10fcc : nt!SmPageRead+0x2e
- ffffa58f`1f76f730 fffff800`2cf10d1f : 00000000`00000002 ffffa58f`1f76f7c0 ffffe207`ed540ac0 00000000`00000000 : nt!MiIssueHardFaultIo+0x114f18
- ffffa58f`1f76f780 fffff800`2cef1941 : 00000000`00000000 00000000`c0033333 ffffa58f`1f76fa00 00000000`00000000 : nt!MiIssueHardFault+0x17f
- ffffa58f`1f76f820 fffff800`2cfefc72 : 00000000`00000006 0000005a`00000000 ffffe207`edfe8700 00000217`37f35220 : nt!MmAccessFault+0xcb1
- ffffa58f`1f76fa00 00007ff9`bbd04eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
- 0000005a`fcffb950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`bbd04eb3
- THREAD_SHA1_HASH_MOD_FUNC: 0e25f7e1a5e1caae3d28e6a7023983c4503045c5
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5d19ee7530f1c6c3ecf008a9b4f24cbb19c9459
- THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
- FOLLOWUP_IP:
- nt!ST_STORE<SM_TRAITS>::StDmPageError+f4
- fffff800`2d0e75ac cc int 3
- FAULT_INSTR_CODE: 48c033cc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+f4
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5a29b8d4
- IMAGE_VERSION: 10.0.16299.125
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: f4
- FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
- BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
- PRIMARY_PROBLEM_CLASS: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
- TARGET_TIME: 2018-05-11T18:06:43.000Z
- OSBUILD: 16299
- OSSERVICEPACK: 125
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-12-07 19:55:32
- BUILDDATESTAMP_STR: 170928-1534
- BUILDLAB_STR: rs3_release
- BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534
- ANALYSIS_SESSION_ELAPSED_TIME: 1626
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x12b_c00002c4_stctdecompressfailed_nt!st_store_sm_traits_::stdmpageerror
- FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
- Followup: MachineOwner
- ---------
- Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\mcbac\Downloads\Telegram Desktop\051218-12171-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 16299 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 16299.431.amd64fre.rs3_release_svc_escrow.180502-1908
- Machine Name:
- Kernel base = 0xfffff800`c121b000 PsLoadedModuleList = 0xfffff800`c1581030
- Debug session time: Sat May 12 10:08:27.098 2018 (UTC - 3:00)
- System Uptime: 0 days 0:00:04.849
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- .........
- Loading User Symbols
- Loading unloaded module list
- ...
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1A, {61941, ffffcc8aa5701000, 9, fffff88a2cd366d0}
- Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+382 )
- Followup: MachineOwner
- ---------
- 7: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000061941, The subtype of the bugcheck.
- Arg2: ffffcc8aa5701000
- Arg3: 0000000000000009
- Arg4: fffff88a2cd366d0
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 16299.431.amd64fre.rs3_release_svc_escrow.180502-1908
- DUMP_TYPE: 2
- BUGCHECK_P1: 61941
- BUGCHECK_P2: ffffcc8aa5701000
- BUGCHECK_P3: 9
- BUGCHECK_P4: fffff88a2cd366d0
- BUGCHECK_STR: 0x1a_61941
- CPU_COUNT: 8
- CPU_MHZ: af8
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 9e
- CPU_STEPPING: 9
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: MCBACKER-LENOVO
- ANALYSIS_SESSION_TIME: 05-12-2018 18:55:43.0899
- ANALYSIS_VERSION: 10.0.17134.12 amd64fre
- TRAP_FRAME: fffff88a2cd366d0 -- (.trap 0xfffff88a2cd366d0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000440000 rbx=0000000000000000 rcx=ffffa48404600000
- rdx=00002806a1101000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff800c13a3920 rsp=fffff88a2cd36868 rbp=0000000000000000
- r8=0000000000000000 r9=0000000000000800 r10=ffff8b800da07570
- r11=ffffa48404600000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!memcpy+0xa0:
- fffff800`c13a3920 f30f6f040a movdqu xmm0,xmmword ptr [rdx+rcx] ds:ffffcc8a`a5701000=????????????????????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800c126c671 to fffff800c1390570
- STACK_TEXT:
- fffff88a`2cd364f8 fffff800`c126c671 : 00000000`0000001a 00000000`00061941 ffffcc8a`a5701000 00000000`00000009 : nt!KeBugCheckEx
- fffff88a`2cd36500 fffff800`c139ee42 : 00000000`00000000 ffff8b80`0da07570 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1471
- fffff88a`2cd366d0 fffff800`c13a3920 : fffff800`c16dc18a ffff38d2`e4f48076 ffffdc88`f5bf82f0 ffffa484`04600000 : nt!KiPageFault+0x382
- fffff88a`2cd36868 fffff800`c16dc18a : ffff38d2`e4f48076 ffffdc88`f5bf82f0 ffffa484`04600000 ffffdc88`f5f4eca0 : nt!memcpy+0xa0
- fffff88a`2cd36870 fffff800`c16dbf14 : 00000000`00440000 00000000`0003f000 00000000`00200000 fffff88a`2cd36970 : nt!CcCopyBytesToUserBuffer+0x4a
- fffff88a`2cd368c0 fffff800`c12b1c9c : ffffdc88`ef19d440 00000000`00401000 00000000`0003f000 00000000`00800001 : nt!CcMapAndCopyFromCache+0x114
- fffff88a`2cd36960 fffff80d`04ad50f3 : fffff88a`2cd36a90 fffff88a`00000000 ffffdc88`00200000 ffffa484`03748ce8 : nt!CcCopyReadEx+0x12c
- fffff88a`2cd369f0 fffff80d`03808fbe : 00000000`000002b0 00000000`00000000 ffffdc88`f5f4eca0 ffffa484`04600000 : NTFS!NtfsCopyReadA+0x433
- fffff88a`2cd36cb0 fffff80d`038060d7 : fffff88a`2cd36da0 ffffdc88`f5f4ec00 ffffdc88`f35e2108 ffffdc88`f35e2010 : FLTMGR!FltpPerformFastIoCall+0x13e
- fffff88a`2cd36d10 fffff80d`0383b1f9 : 00000000`00000000 00000000`00200000 fffff88a`2cd36ff0 ffffffff`80000374 : FLTMGR!FltpPassThroughFastIo+0xc7
- fffff88a`2cd36d70 fffff800`c16e6d6b : fffff88a`2cd37168 fffff88a`2cd37168 00000000`00000000 fffff88a`2cd37168 : FLTMGR!FltpFastIoRead+0x159
- fffff88a`2cd36e10 fffff800`c13a2363 : fffff88a`2cd370a0 ffffffff`80000374 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x43b
- fffff88a`2cd36f00 fffff800`c1394400 : fffff800`c122f5e8 fffff88a`2cd37970 ffffffff`80000380 00400110`fffffff0 : nt!KiSystemServiceCopyEnd+0x13
- fffff88a`2cd37108 fffff800`c122f5e8 : fffff88a`2cd37970 ffffffff`80000380 00400110`fffffff0 ffffdc88`f4fe8190 : nt!KiServiceLinkage
- fffff88a`2cd37110 fffff800`c1679065 : ffffdc88`f4fe8190 00000000`00401000 fffff88a`2cd3733c ffffa484`04600000 : nt!CmpFileReadEx+0xc0
- fffff88a`2cd371c0 fffff800`c17a2c73 : 00000000`00000002 fffff800`c13a3ad0 00000000`00000010 00000000`00010282 : nt!CmpFileRead+0x25
- fffff88a`2cd37200 fffff800`c16dd862 : 00000000`00001000 00000000`00000000 00000000`00400000 00000000`00000000 : nt!HvpReadHiveDataFromFile+0x57
- fffff88a`2cd37240 fffff800`c16feeb0 : 00000000`00000000 00000000`04f09000 ffffa484`00200000 00000000`00400000 : nt!HvpMapHiveImage+0x66
- fffff88a`2cd37300 fffff800`c16fe221 : ffffa484`0386b000 00000000`00000000 00000000`00000006 ffffa484`0386b000 : nt!HvpMapHiveImageFromFile+0x74
- fffff88a`2cd37370 fffff800`c1700068 : fffff88a`2cd37788 00000000`00000004 00000000`00000000 ffffa484`0386b000 : nt!HvLoadHive+0x131
- fffff88a`2cd37460 fffff800`c16ffa48 : 00000000`00020200 00000000`00000001 fffff88a`00020200 00000000`00000718 : nt!HvInitializeHive+0x27c
- fffff88a`2cd374d0 fffff800`c1676d9f : 00000000`00000000 00000000`00000048 fffff88a`2cd377a0 00000000`00000000 : nt!CmpInitializeHive+0x514
- fffff88a`2cd376a0 fffff800`c17d9981 : fffff800`c156ae00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpInitHiveFromFile+0x3d7
- fffff88a`2cd378b0 fffff800`c12d9967 : ffffdc88`f5f42700 ffffdc88`f5f42700 fffff800`c17d98a0 00000000`00000002 : nt!CmpLoadHiveThread+0xe1
- fffff88a`2cd37b10 fffff800`c1397fb6 : ffff9200`6a840180 ffffdc88`f5f42700 fffff800`c12d9920 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- fffff88a`2cd37b60 00000000`00000000 : fffff88a`2cd38000 fffff88a`2cd31000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- THREAD_SHA1_HASH_MOD_FUNC: 8ba615762a7f37dfa15f9990ea4f19f9253daaa1
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a2650a986f6d292bf697237d855dc32d48701c27
- THREAD_SHA1_HASH_MOD: ea6b7db3e33c975d4b694fe424b9115e19a8e914
- FOLLOWUP_IP:
- nt!KiPageFault+382
- fffff800`c139ee42 85c0 test eax,eax
- FAULT_INSTR_CODE: 367cc085
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiPageFault+382
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5aeaa6a2
- IMAGE_VERSION: 10.0.16299.431
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 382
- FAILURE_BUCKET_ID: 0x1a_61941_nt!KiPageFault
- BUCKET_ID: 0x1a_61941_nt!KiPageFault
- PRIMARY_PROBLEM_CLASS: 0x1a_61941_nt!KiPageFault
- TARGET_TIME: 2018-05-12T13:08:27.000Z
- OSBUILD: 16299
- OSSERVICEPACK: 431
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2018-05-03 03:05:22
- BUILDDATESTAMP_STR: 180502-1908
- BUILDLAB_STR: rs3_release_svc_escrow
- BUILDOSVER_STR: 10.0.16299.431.amd64fre.rs3_release_svc_escrow.180502-1908
- ANALYSIS_SESSION_ELAPSED_TIME: 29a5
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1a_61941_nt!kipagefault
- FAILURE_ID_HASH: {60820728-e269-54d0-27b9-6b64c44bb18e}
- Followup: MachineOwner
- ---------
- Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\mcbac\Downloads\Telegram Desktop\051118-9890-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 16299 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 16299.15.amd64fre.rs3_release.170928-1534
- Machine Name:
- Kernel base = 0xfffff802`d320c000 PsLoadedModuleList = 0xfffff802`d356dff0
- Debug session time: Fri May 11 17:34:55.515 2018 (UTC - 3:00)
- System Uptime: 0 days 2:27:50.242
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- ................................................................
- ......
- Loading User Symbols
- Loading unloaded module list
- .......
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {ffffb5c080000240, 2, 0, fffff802d327ce65}
- Probably caused by : memory_corruption ( nt!MiDispatchFault+be5 )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffb5c080000240, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff802d327ce65, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534
- SYSTEM_MANUFACTURER: LENOVO
- SYSTEM_PRODUCT_NAME: 81CQ
- SYSTEM_SKU: LENOVO_MT_81CQ_BU_idea_FM_
- SYSTEM_VERSION: Lenovo Y720-15IKB
- BIOS_VENDOR: LENOVO
- BIOS_VERSION: 4GCN35WW
- BIOS_DATE: 02/23/2018
- BASEBOARD_MANUFACTURER: LENOVO
- BASEBOARD_PRODUCT: Provence-75I
- BASEBOARD_VERSION: SDK0J40688 WIN
- DUMP_TYPE: 2
- BUGCHECK_P1: ffffb5c080000240
- BUGCHECK_P2: 2
- BUGCHECK_P3: 0
- BUGCHECK_P4: fffff802d327ce65
- READ_ADDRESS: fffff802d3604380: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- ffffb5c080000240
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!MiDispatchFault+be5
- fffff802`d327ce65 498b5500 mov rdx,qword ptr [r13]
- CPU_COUNT: 8
- CPU_MHZ: af8
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 9e
- CPU_STEPPING: 9
- CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXPNP: 1 (!blackboxpnp)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: svchost.exe
- ANALYSIS_SESSION_HOST: MCBACKER-LENOVO
- ANALYSIS_SESSION_TIME: 05-12-2018 19:01:28.0992
- ANALYSIS_VERSION: 10.0.17134.12 amd64fre
- TRAP_FRAME: fffff38ba5ec6ba0 -- (.trap 0xfffff38ba5ec6ba0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ffffe089dfe06020
- rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802d32adaa4 rsp=fffff38ba5ec6d38 rbp=0000000000000005
- r8=000000000000001c r9=ffff9289ff180080 r10=ffffe089dc44f000
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- nt!HvpFaultCellWithClustering+0x24:
- fffff802`d32adaa4 8b01 mov eax,dword ptr [rcx] ds:ffffe089`dfe06020=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802d337b9e9 to fffff802d33700e0
- STACK_TEXT:
- fffff38b`a5ec6568 fffff802`d337b9e9 : 00000000`0000000a ffffb5c0`80000240 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff38b`a5ec6570 fffff802`d3379d7d : ffff8a80`0d902708 ffff8a80`0ded3560 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
- fffff38b`a5ec66b0 fffff802`d327ce65 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23d
- fffff38b`a5ec6840 fffff802`d327b316 : 00000000`00000000 ffffe089`dfe06020 fffff38b`a5ec6ba0 fffff38b`a5ec6ac0 : nt!MiDispatchFault+0xbe5
- fffff38b`a5ec69c0 fffff802`d3379c72 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x686
- fffff38b`a5ec6ba0 fffff802`d32adaa4 : fffff802`d370a8e6 00000000`01fdd020 fffff38b`a5ec6de0 fffff38b`a5ec7210 : nt!KiPageFault+0x132
- fffff38b`a5ec6d38 fffff802`d370a8e6 : 00000000`01fdd020 fffff38b`a5ec6de0 fffff38b`a5ec7210 00000000`01edb020 : nt!HvpFaultCellWithClustering+0x24
- fffff38b`a5ec6d40 fffff802`d36c677f : ffffe089`dc44f000 00000000`01fdd020 ffffe089`df5b7024 00000000`00000003 : nt!HvpGetCellPaged+0x76
- fffff38b`a5ec6d70 fffff802`d36c71dc : 00000001`ffffffff ffffe089`df593f6c 00000000`ebdc40e3 ffffe089`e2033858 : nt!CmpFindSubKeyInRoot+0x1cf
- fffff38b`a5ec6de0 fffff802`d370bc7b : ffffe089`e2033858 fffff38b`a5ec70a0 fffff38b`a5ec7038 fffff38b`a5ec70c0 : nt!CmpWalkOneLevel+0x69c
- fffff38b`a5ec6ee0 fffff802`d3707cb0 : fffff38b`0000001c fffff38b`a5ec73d0 fffff38b`a5ec7348 ffffe089`dc21c050 : nt!CmpDoParseKey+0x12db
- fffff38b`a5ec72d0 fffff802`d370e987 : 00000000`00000001 ffffe089`dc228001 ffff9289`00000000 ffffe089`dc217d01 : nt!CmpParseKey+0x270
- fffff38b`a5ec74b0 fffff802`d3706060 : ffff9289`f93dc600 fffff38b`a5ec7708 00000000`00000040 ffff9289`f4322ce0 : nt!ObpLookupObjectName+0x5b7
- fffff38b`a5ec7670 fffff802`d3705ced : ffffdec1`00000001 ffff9289`f4322ce0 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
- fffff38b`a5ec77b0 fffff802`d375e58e : 00000200`4ffad9b0 00000200`0087595a 00000000`00000180 00000000`00000000 : nt!CmOpenKey+0x29d
- fffff38b`a5ec79c0 fffff802`d337b553 : ffff9289`ff180080 00000000`0002004e 00000000`00000020 ffff9289`fabf1120 : nt!NtOpenKey+0x12
- fffff38b`a5ec7a00 00007ffc`b6340084 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 0000006c`707fe238 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b6340084
- THREAD_SHA1_HASH_MOD_FUNC: 3808487299b033042c0731b5adf4cdf46f839a36
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1fc2bf1102cc32ba8da655e6b48dcc34f4bcaa38
- THREAD_SHA1_HASH_MOD: aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c
- FOLLOWUP_IP:
- nt!MiDispatchFault+be5
- fffff802`d327ce65 498b5500 mov rdx,qword ptr [r13]
- FAULT_INSTR_CODE: 558b49
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!MiDispatchFault+be5
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 5a29b8d4
- IMAGE_VERSION: 10.0.16299.125
- STACK_COMMAND: .thread ; .cxr ; kb
- IMAGE_NAME: memory_corruption
- BUCKET_ID_FUNC_OFFSET: be5
- FAILURE_BUCKET_ID: AV_nt!MiDispatchFault
- BUCKET_ID: AV_nt!MiDispatchFault
- PRIMARY_PROBLEM_CLASS: AV_nt!MiDispatchFault
- TARGET_TIME: 2018-05-11T20:34:55.000Z
- OSBUILD: 16299
- OSSERVICEPACK: 125
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-12-07 19:55:32
- BUILDDATESTAMP_STR: 170928-1534
- BUILDLAB_STR: rs3_release
- BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534
- ANALYSIS_SESSION_ELAPSED_TIME: 563a
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_nt!midispatchfault
- FAILURE_ID_HASH: {c7894f84-75e4-6902-ea46-43fb07199b4f}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement