Recovery from sleep problems at Dell Vostro 5471

Page 1 of 2 12 LastLast

  1. Posts : 11
    Windows 10 Home 64-bit EN (EU) 1903
       #1

    Recovery from sleep problems at Dell Vostro 5471


    I have a new laptop. I upgraded to SSD and added new RAM. Sometimes I had a problem to resume computer from sleep. Today it was resumed well, but after 3 minutes stopped responding. SFC says everything is OK.
    I tried to change SSD for a new one. When I tried to install new Windows from the scratch, I have received a lot of blue screens and system was completely broken after first online update. After the second installation I installed all drivers manually offline and denied automatic device driver installation. It is better but still not perfect I did not tried to change RAM module (Kingston SO-DIMM 8GB DDR4 2400MHz Single Rank). My OS version is 1903 18362.476.

    Last freeze looks like to be cause by my driver update politics, but I am afraid to allow automatic driver installation again.

    Attachment 257752

    Thank you very much in advance,
    Jiri
      My Computer


  2. Posts : 1,538
    Windows 8.1 Enterprise x64
       #2

    Test your RAM with HCI memtest - Test RAM with HCIDesign Memtest | Sysnative Forums
      My Computer


  3. Posts : 41,621
    windows 10 professional version 1607 build 14393.969 64 bit
       #3

    See rule #4.

    https://www.tenforums.com/misc.php?do=showrules

    No piracy or discussion of piracy allowed at all. Such as software, music, videos and other intellectual property violations (e.g. downloading youtube videos locally etc) - it is forum policy that no help shall be given to people who knowingly steal software or services.

    Please uninstall any pirated / cracked software and any tools / methods that can be used to bypass the activation of licenses.

    After completing the above please upload a new V2.
      My Computer


  4. Posts : 11
    Windows 10 Home 64-bit EN (EU) 1903
    Thread Starter
       #4

    MrPepka said:
    I tested memory for one night and day. No errors found.
      My Computer


  5. Posts : 1,538
    Windows 8.1 Enterprise x64
       #5

    Test your disks with SeaTools - SeaTools for DOS - Hard Drive Diagnostic
      My Computer


  6. Posts : 41,621
    windows 10 professional version 1607 build 14393.969 64 bit
       #6

    Please see post #3
      My Computer


  7. Posts : 11
    Windows 10 Home 64-bit EN (EU) 1903
    Thread Starter
       #7

    New log file


    zbook said:
    Please see post #3

    No problem. I have bunch of SW purchased, let me know the particular violation via message please.
    Attachment 258176
      My Computer


  8. Posts : 41,621
    windows 10 professional version 1607 build 14393.969 64 bit
       #8

    The logs were in a foreign language and could not be scanned.
    Please use English as the default language and upload a new V2 and DM into the thread:

    https://www.tenforums.com/tutorials/...dows-10-a.html
    Change Display Language in Windows 10
    BSOD - Posting Instructions
      My Computer


  9. Posts : 11
    Windows 10 Home 64-bit EN (EU) 1903
    Thread Starter
       #9

    English only


    I finally switched the system language after today's BSOD. The log should be delicious now, rawrrr.
    I snoozed my notebook with connected to the monitor and USB hub and I woke up it not connected. Then I have got the last error. I have to admit, that I did not migrated OS to SSD but I did a usual partition copy. But you will see something from the report.
      My Computer


  10. Posts : 1,538
    Windows 8.1 Enterprise x64
       #10

    Code:
    Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\mrpep\AppData\Local\Temp\Temp1_JIRKA-VOSTRO-(2020-01-04_19-36-59).zip\Crash Dumps\010420-50140-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*
    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 18362 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    18362.1.amd64fre.19h1_release.190318-1202
    Machine Name:
    Kernel base = 0xfffff807`3d000000 PsLoadedModuleList = 0xfffff807`3d448170
    Debug session time: Sat Jan  4 18:21:50.474 2020 (UTC + 1:00)
    System Uptime: 14 days 6:12:06.506
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .........................................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff807`3d1c14e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:fffffb06`8a414de0=0000000000000135
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    REGISTRY_FILTER_DRIVER_EXCEPTION (135)
    This bugcheck is caused by an unhandled exception in a registry filtering driver.
    This bugcheck indicates that a registry filtering driver didn't handle exception inside
    its notification routine. One can identify the driver by the 3rd parameter.
    Arguments:
    Arg1: ffffffffc0000006, ExceptionCode
    Arg2: fffffb068a415670, Address of the context record for the exception that caused the bugcheck
    Arg3: fffff80742dcff00, The driver's callback routine address
    Arg4: ffff818719c21e40, Internal
    
    Debugging Details:
    ------------------
    
    *** WARNING: Unable to verify timestamp for WdFilter.sys
    *** WARNING: Unable to verify checksum for win32k.sys
    
    KEY_VALUES_STRING: 1
    
        Key  : Analysis.CPU.Sec
        Value: 3
    
        Key  : Analysis.DebugAnalysisProvider.CPP
        Value: Create: 8007007e on DESKTOP-QO9C72C
    
        Key  : Analysis.DebugData
        Value: CreateObject
    
        Key  : Analysis.DebugModel
        Value: CreateObject
    
        Key  : Analysis.Elapsed.Sec
        Value: 9
    
        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 71
    
        Key  : Analysis.System
        Value: CreateObject
    
    
    ADDITIONAL_XML: 1
    
    BUGCHECK_CODE:  135
    
    BUGCHECK_P1: ffffffffc0000006
    
    BUGCHECK_P2: fffffb068a415670
    
    BUGCHECK_P3: fffff80742dcff00
    
    BUGCHECK_P4: ffff818719c21e40
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  Registry
    
    TRAP_FRAME:  ffffbc74a4e519eb -- (.trap 0xffffbc74a4e519eb)
    Unable to read trap frame at ffffbc74`a4e519eb
    
    STACK_TEXT:  
    fffffb06`8a414dd8 fffff807`3d827644 : 00000000`00000135 ffffffff`c0000006 fffffb06`8a415670 fffff807`42dcff00 : nt!KeBugCheckEx
    fffffb06`8a414de0 fffff807`3d798189 : fffffb06`8a416068 fffffb06`8a415670 fffffb06`8a411000 fffffb06`8a418000 : nt!CmpCallbackFatalFilter+0x24
    fffffb06`8a414e20 fffff807`3d19c559 : fffffb06`00000003 fffffb06`8a417090 fffffb06`8a411000 fffffb06`8a418000 : nt!CmpCallCallBacksEx$filt$1+0x19
    fffffb06`8a414e50 fffff807`3d1ca30f : fffffb06`8a417090 fffffb06`8a415430 00000000`00000000 00000000`00000000 : nt!_C_specific_handler+0xa9
    fffffb06`8a414ec0 fffff807`3d0c33c5 : 00000000`00000831 00000000`00000000 fffffb06`8a415430 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
    fffffb06`8a414ef0 fffff807`3d0c795e : fffffb06`8a415e28 fffffb06`8a415b70 fffffb06`8a415e28 ffff8187`21123000 : nt!RtlDispatchException+0x4a5
    fffffb06`8a415640 fffff807`3d1d341d : ffffe28e`1f943640 fffff807`3d086cdd ffffbc74`a4e519eb fffffb06`8a415ed0 : nt!KiDispatchException+0x16e
    fffffb06`8a415cf0 fffff807`3d1cf605 : 00000000`00000000 fffff807`00000000 00000000`a4aee0c2 ffffe28e`1f202a00 : nt!KiExceptionDispatch+0x11d
    fffffb06`8a415ed0 fffff807`3d68e592 : fffff807`3d62979f 00000000`0bd5ccc9 fffffb06`8a4163d0 ffffe28e`4c997080 : nt!KiPageFault+0x445
    fffffb06`8a416068 fffff807`3d62979f : 00000000`0bd5ccc9 fffffb06`8a4163d0 ffffe28e`4c997080 ffff8187`2a021c60 : nt!HvpGetCellPaged+0xa2
    fffffb06`8a416070 fffff807`3d628099 : 00000001`ffffffff 00000000`a4aee0c2 ffff8187`00000001 ffff8187`2a021c30 : nt!CmpDoCompareKeyName+0x2f
    fffffb06`8a4160c0 fffff807`3d5f226a : ffff8187`2a021c30 00000000`00000004 fffffb06`8a4162b8 fffffb06`8a416340 : nt!CmpWalkOneLevel+0x709
    fffffb06`8a4161d0 fffff807`3d5ef2d4 : ffffffff`0000001c fffffb06`8a416520 fffffb06`8a4164e8 00000000`00000000 : nt!CmpDoParseKey+0x9fa
    fffffb06`8a416470 fffff807`3d5ed1bf : ffffe28e`4e4d0a20 ffff8187`47bc2401 00000000`00000000 ffffd280`a881a100 : nt!CmpParseKey+0x274
    fffffb06`8a416690 fffff807`3d5eb621 : ffffe28e`4e4d0a00 fffffb06`8a4168d8 ffff8187`00000240 ffffe28e`1f8fd0c0 : nt!ObpLookupObjectName+0x78f
    fffffb06`8a416850 fffff807`3d5f4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffe28e`1f8fd0c0 : nt!ObOpenObjectByNameEx+0x201
    fffffb06`8a416990 fffff807`3d5f49bd : fffffb06`8a416e88 fffffb06`8a416d00 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x5c
    fffffb06`8a4169e0 fffff807`3d6bb942 : 00000000`40197b89 00000801`00000000 00020019`00000000 00000000`00020019 : nt!CmOpenKey+0x29d
    fffffb06`8a416c40 fffff807`3d1d2d15 : 00000000`00000000 fffffb06`8a416ce0 00000000`00000000 00000000`00000000 : nt!NtOpenKey+0x12
    fffffb06`8a416c80 fffff807`3d1c5320 : fffff807`42dd0a04 00000000`00000000 ffffd280`a89cc180 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
    fffffb06`8a416e18 fffff807`42dd0a04 : 00000000`00000000 ffffd280`a89cc180 00000000`00000000 ffffe28e`4aa41280 : nt!KiServiceLinkage
    fffffb06`8a416e20 00000000`00000000 : ffffd280`a89cc180 00000000`00000000 ffffe28e`4aa41280 00000000`00000000 : WdFilter+0x30a04
    
    
    SYMBOL_NAME:  nt!CmpCallbackFatalFilter+24
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    IMAGE_VERSION:  10.0.18362.476
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  24
    
    FAILURE_BUCKET_ID:  0x135_nt!CmpCallbackFatalFilter
    
    OS_VERSION:  10.0.18362.1
    
    BUILDLAB_STR:  19h1_release
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    FAILURE_ID_HASH:  {268799ab-cadc-ad38-fc81-f5ce11e413d5}
    
    Followup:     MachineOwner
    ---------
    
    1: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    1: kd> !dpx
    Start memory scan  : 0xfffffb068a414dd8 ($csp)
    End memory scan    : 0xfffffb068a418000 (Kernel Stack Base)
    
                   rsp : 0xfffffb068a414dd8 : 0xfffff8073d827644 : nt!CmpCallbackFatalFilter+0x24
                   r11 : 0xfffffb068a416068 : 0xfffff8073d62979f : nt!CmpDoCompareKeyName+0x2f
                   r14 : 0xfffffb068a4154b0 : 0xfffff8073d5eea3f : nt!CmpCallCallBacksEx+0x39f
    0xfffffb068a414dd8 : 0xfffff8073d827644 : nt!CmpCallbackFatalFilter+0x24
    *** WARNING: Unable to verify timestamp for WdFilter.sys
    0xfffffb068a414e10 : 0xfffff8073d68e592 : nt!HvpGetCellPaged+0xa2
    0xfffffb068a414e18 : 0xfffff8073d798189 : nt!CmpCallCallBacksEx$filt$1+0x19
    0xfffffb068a414e20 : 0xfffffb068a416068 : 0xfffff8073d62979f : nt!CmpDoCompareKeyName+0x2f
    0xfffffb068a414e30 : 0xfffffb068a411000 :  !da "iICIiAiIgIiICIiAiIgIiICIiAiIg5we6q336P88KZqGQe6q336P88KZqlloYV8KPV8uM0ZFpylkn4u/..."
    0xfffffb068a414e48 : 0xfffff8073d19c559 : nt!_C_specific_handler+0xa9
    0xfffffb068a414e60 : 0xfffffb068a411000 :  !da "iICIiAiIgIiICIiAiIgIiICIiAiIg5we6q336P88KZqGQe6q336P88KZqlloYV8KPV8uM0ZFpylkn4u/..."
    0xfffffb068a414e90 : 0xfffff8073d540244 : "nt!Ports <PERF> (nt+0x540244)"
    0xfffffb068a414ea8 : 0xfffff8073d5eea3f : nt!CmpCallCallBacksEx+0x39f
    0xfffffb068a414eb8 : 0xfffff8073d1ca30f : nt!RtlpExecuteHandlerForException+0xf
    0xfffffb068a414ee0 : 0xfffffb068a4154b0 : 0xfffff8073d5eea3f : nt!CmpCallCallBacksEx+0x39f
    0xfffffb068a414ee8 : 0xfffff8073d0c33c5 : nt!RtlDispatchException+0x4a5
    0xfffffb068a414f18 : 0xfffff8073d06b53d : nt!KeQueryCurrentStackInformationEx+0x6d
    0xfffffb068a414f38 : 0xfffff8073d078321 : nt!MiGetPage+0xf1
    0xfffffb068a414f48 : 0xfffffb068a411000 :  !da "iICIiAiIgIiICIiAiIgIiICIiAiIg5we6q336P88KZqGQe6q336P88KZqlloYV8KPV8uM0ZFpylkn4u/..."
    0xfffffb068a414f58 : 0xfffff8073d0c7254 : nt!RtlGetExtendedContextLength2+0x3c
    0xfffffb068a414f68 : 0xfffff8073d120010 : nt!RtlIsUntrustedObject+0x70
    0xfffffb068a414f98 : 0xfffff8073d0c301c : nt!RtlDispatchException+0xfc
    0xfffffb068a414ff0 : 0xfffff80742e00000 : "Ntfs!NtfsProtectClusters <PERF> (Ntfs+0x0)"
    0xfffffb068a414ff8 : 0xfffff80742e2f5e4 : Ntfs!_GSHandlerCheck_SEH
    0xfffffb068a415028 : 0xfffff8073d5ef27d : nt!CmpParseKey+0x21d
    0xfffffb068a415068 : 0xfffff8073d0476a7 : nt!IofCompleteRequest+0x17
    0xfffffb068a415098 : 0xfffff80742e1971b : Ntfs!NtfsExtendedCompleteRequestInternal+0x18b
    0xfffffb068a4150c8 : 0xfffff8073d08fc82 : nt!MiFindActualFaultingPte+0x12e
    0xfffffb068a4150d8 : 0xfffff80742e00000 : "Ntfs!NtfsProtectClusters <PERF> (Ntfs+0x0)"
    0xfffffb068a4150e0 : 0xfffff80742e967d4 : "Ntfs!g_RpcBindingHandleBound <PERF> (Ntfs+0x967d4)"
    0xfffffb068a4150e8 : 0xfffff80742e00000 : "Ntfs!NtfsProtectClusters <PERF> (Ntfs+0x0)"
    0xfffffb068a4150f0 : 0xfffff80742e967c8 : "Ntfs!g_RpcBindingHandleBound <PERF> (Ntfs+0x967c8)"
    0xfffffb068a4151e8 : 0xfffff8073d1050c3 : nt!RtlRaiseStatus+0x63
    0xfffffb068a415220 : 0xfffff8073d105092 : nt!RtlRaiseStatus+0x32
    0xfffffb068a4152b8 : 0xfffff8073d03c7e2 : nt!KiSwapThread+0xc22
    0xfffffb068a4152f8 : 0xfffffb068a411000 :  !da "iICIiAiIgIiICIiAiIgIiICIiAiIg5we6q336P88KZqGQe6q336P88KZqlloYV8KPV8uM0ZFpylkn4u/..."
    0xfffffb068a415368 : 0xfffff8073d06b53d : nt!KeQueryCurrentStackInformationEx+0x6d
    0xfffffb068a415398 : 0xfffffb068a411000 :  !da "iICIiAiIgIiICIiAiIgIiICIiAiIg5we6q336P88KZqGQe6q336P88KZqlloYV8KPV8uM0ZFpylkn4u/..."
    0xfffffb068a4153a8 : 0xfffff8073d0c7254 : nt!RtlGetExtendedContextLength2+0x3c
    0xfffffb068a4153b8 : 0xfffff8073d1207a0 : nt!RtlpGetStackLimitsEx+0x14
    0xfffffb068a4153e8 : 0xfffff8073d0c301c : nt!RtlDispatchException+0xfc
    0xfffffb068a415440 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415448 : 0xfffff8073d19c4b0 : nt!_C_specific_handler
    0xfffffb068a415458 : 0xfffffb068a411000 :  !da "iICIiAiIgIiICIiAiIgIiICIiAiIg5we6q336P88KZqGQe6q336P88KZqlloYV8KPV8uM0ZFpylkn4u/..."
    0xfffffb068a4154a0 : 0xfffff8073d540244 : "nt!Ports <PERF> (nt+0x540244)"
    0xfffffb068a4154b0 : 0xfffff8073d5eea3f : nt!CmpCallCallBacksEx+0x39f
    0xfffffb068a4154b8 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a4154c0 : 0xfffff8073d540244 : "nt!Ports <PERF> (nt+0x540244)"
    0xfffffb068a4154e0 : 0xfffff8073d19c4b0 : nt!_C_specific_handler
    0xfffffb068a415518 : 0xfffff8073d1c5320 : nt!KiServiceLinkage
    0xfffffb068a415520 : 0xfffff8073d6bb947 : nt!NtOpenKey+0x17
    0xfffffb068a415528 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415530 : 0xfffff8073d545920 : "nt!Ports <PERF> (nt+0x545920)"
    0xfffffb068a415538 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415540 : 0xfffff8073d5422a8 : "nt!Ports <PERF> (nt+0x5422a8)"
    0xfffffb068a415548 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415550 : 0xfffff8073d542188 : "nt!Ports <PERF> (nt+0x542188)"
    0xfffffb068a415558 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415560 : 0xfffff8073d540388 : "nt!Ports <PERF> (nt+0x540388)"
    0xfffffb068a415568 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415570 : 0xfffff8073d5402c8 : "nt!Ports <PERF> (nt+0x5402c8)"
    0xfffffb068a415578 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415580 : 0xfffff8073d54022c : "nt!Ports <PERF> (nt+0x54022c)"
    0xfffffb068a415588 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a415590 : 0xfffff8073d5401b4 : "nt!Ports <PERF> (nt+0x5401b4)"
    0xfffffb068a415598 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a4155a0 : 0xfffff8073d540430 : "nt!Ports <PERF> (nt+0x540430)"
    0xfffffb068a4155a8 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a4155b0 : 0xfffff8073d54040c : "nt!Ports <PERF> (nt+0x54040c)"
    0xfffffb068a4155b8 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a4155c0 : 0xfffff8073d5473cc : "nt!Ports <PERF> (nt+0x5473cc)"
    0xfffffb068a4155c8 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a4155d0 : 0xfffff8073d528aa8 : "nt!Ports <PERF> (nt+0x528aa8)"
    0xfffffb068a4155d8 : 0xfffff8073d000000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffffb068a4155e0 : 0xfffff8073d52822c : "nt!Ports <PERF> (nt+0x52822c)"
    0xfffffb068a4155f8 : 0xfffff8073d0c7cd6 : nt!KdTrap+0x22
    0xfffffb068a415638 : 0xfffff8073d0c795e : nt!KiDispatchException+0x16e
    0xfffffb068a415698 : 0xfffff8073d047d41 : nt!IopfCompleteRequest+0x681
    0xfffffb068a4156b8 : 0xfffff8073d039ddd : nt!ExAcquirePushLockSharedEx+0xed
    0xfffffb068a415708 : 0xfffffb068a416068 : 0xfffff8073d62979f : nt!CmpDoCompareKeyName+0x2f
    0xfffffb068a415768 : 0xfffff8073d68e592 : nt!HvpGetCellPaged+0xa2
    0xfffffb068a4157a8 : 0xfffff8073d0476a7 : nt!IofCompleteRequest+0x17
    0xfffffb068a4157d8 : 0xfffff80742e1971b : Ntfs!NtfsExtendedCompleteRequestInternal+0x18b
    0xfffffb068a415808 : 0xfffff8073d08fc82 : nt!MiFindActualFaultingPte+0x12e
    0xfffffb068a415818 : 0xffff818723277406 :  !du "{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a415958 : 0xfffff8073d0420ba : nt!KiAbEntryRemoveFromTree+0x18a
    0xfffffb068a4159e8 : 0xfffff8073d03a81d : nt!KeAbPostRelease+0x1dd
    0xfffffb068a415a38 : 0xfffff8073d0931f4 : nt!MiFreeInPageSupportBlock+0x84
    0xfffffb068a415a68 : 0xfffff8073d092ab6 : nt!MiFinishHardFault+0x6f6
    0xfffffb068a415ac8 : 0xfffff8073d0c7254 : nt!RtlGetExtendedContextLength2+0x3c
    0xfffffb068a415b08 : 0xfffff8073d0c714d : nt!RtlGetExtendedContextLength+0x2d
    0xfffffb068a415b68 : 0xfffff8073d054223 : nt!IoPageReadEx+0x1d3
    0xfffffb068a415ce8 : 0xfffff8073d1d341d : nt!KiExceptionDispatch+0x11d
    0xfffffb068a415cf8 : 0xfffff8073d086cdd : nt!MiIsRetryIoStatus+0x31
    0xfffffb068a415e38 : 0xfffff8073d68e592 : nt!HvpGetCellPaged+0xa2
    0xfffffb068a415ec8 : 0xfffff8073d1cf605 : nt!KiPageFault+0x445
    0xfffffb068a415ed0 : 0x0000000000000000 :  Trap @ fffffb068a415ed0
    0xfffffb068a415f38 : 0xfffff807417cea7a : CI!SIPolicyQueryWindowsLockdownMode+0x1a
    0xfffffb068a415f48 : 0xffff818723277406 :  !du "{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a415fa8 : 0xfffff8073d039ddd : nt!ExAcquirePushLockSharedEx+0xed
    0xfffffb068a415fe8 : 0xfffff8073d62be0b : nt!CmpAssignSecurityToKcb+0x87
    0xfffffb068a416018 : 0xfffff8073d5ef024 : nt!CmpUnlockKcb+0x34
    0xfffffb068a416038 : 0xfffff8073d68e592 : nt!HvpGetCellPaged+0xa2
    0xfffffb068a416050 : 0xfffffb068a416068 : 0xfffff8073d62979f : nt!CmpDoCompareKeyName+0x2f
    0xfffffb068a416068 : 0xfffff8073d62979f : nt!CmpDoCompareKeyName+0x2f
    0xfffffb068a4160b8 : 0xfffff8073d628099 : nt!CmpWalkOneLevel+0x709
    0xfffffb068a4161c8 : 0xfffff8073d5f226a : nt!CmpDoParseKey+0x9fa
    0xfffffb068a4162a8 : 0xffff8187232773c0 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4162f8 : 0xffff8187232773e0 :  !du "Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416398 : 0xffff8187232773c0 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4163a8 : 0xffff8187232773d2 :  !du "Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4163b8 : 0xffff8187232773e0 :  !du "Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4163c8 : 0xffff8187232773ee :  !du "ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4163d8 : 0xffff818723277406 :  !du "{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416428 : 0xfffff8073d033d80 : nt!RtlpHpLfhSlotAllocate+0x540
    0xfffffb068a416468 : 0xfffff8073d5ef2d4 : nt!CmpParseKey+0x274
    0xfffffb068a4164c8 : 0xffff8187232773c0 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416518 : 0x5555555555555555 :  !da "UUUUUUUU"
    0xfffffb068a4165f8 : 0xfffff8073d5f1225 : nt!ObpReferenceObjectByHandleWithTag+0x235
    0xfffffb068a416618 : 0xfffff8073d842fbe : nt!VrpShouldOperateOnCall+0x22
    Unable to load image \SystemRoot\system32\DRIVERS\klif.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for klif.sys
    0xfffffb068a416648 : 0xffff8187232773c0 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416678 : 0xfffff8073d5ef060 : nt!CmpParseKey
    0xfffffb068a416688 : 0xfffff8073d5ed1bf : nt!ObpLookupObjectName+0x78f
    0xfffffb068a416708 : 0xffff8187232773c0 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416770 : 0xffff81874a027d80 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416848 : 0xfffff8073d5eb621 : nt!ObOpenObjectByNameEx+0x201
    0xfffffb068a4168d0 : 0xfffffb068a416a58 : 0xffff81874a027d80 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4168e0 : 0xffff8187232773c0 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416988 : 0xfffff8073d5f4b3c : nt!ObOpenObjectByName+0x5c
    0xfffffb068a4169d8 : 0xfffff8073d5f49bd : nt!CmOpenKey+0x29d
    0xfffffb068a416a58 : 0xffff81874a027d80 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a416c38 : 0xfffff8073d6bb942 : nt!NtOpenKey+0x12
    0xfffffb068a416c78 : 0xfffff8073d1d2d15 : nt!KiSystemServiceCopyEnd+0x25
    0xfffffb068a416de8 : 0xfffff8073d1c5320 : nt!KiServiceLinkage
    0xfffffb068a416e58 : 0xfffff8073d03b644 : nt!KiCommitThreadWait+0x144
    0xfffffb068a416e70 : 0xfffff80742dad378 :  !du "\Registry"
    0xfffffb068a416fd8 : 0xfffff8073d0811a5 : nt!MiMarkPteDirty+0x15
    0xfffffb068a417048 : 0xfffff8073d039ddd : nt!ExAcquirePushLockSharedEx+0xed
    0xfffffb068a417088 : 0xfffff8073d5eea3f : nt!CmpCallCallBacksEx+0x39f
    0xfffffb068a4170a8 : 0xfffff8073d465b01 : nt!CmpPostLock+0x21
    0xfffffb068a417198 : 0xfffff8073d5ef27d : nt!CmpParseKey+0x21d
    0xfffffb068a4171f8 : 0xffff81874a027d80 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4172d8 : 0xfffff8073d070b44 : nt!SeAccessCheckWithHint+0x134
    0xfffffb068a417318 : 0xfffff8073d3781a8 : nt!RtlpRestrictedMapping
    0xfffffb068a417328 : 0xfffff8073d5f1225 : nt!ObpReferenceObjectByHandleWithTag+0x235
    0xfffffb068a4173a8 : 0xfffff8073d5ef060 : nt!CmpParseKey
    0xfffffb068a4173b8 : 0xfffff8073d5ed1bf : nt!ObpLookupObjectName+0x78f
    0xfffffb068a417438 : 0xffff81874a027d80 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a417578 : 0xfffff8073d5eb621 : nt!ObOpenObjectByNameEx+0x201
    0xfffffb068a417610 : 0xffff81874a027d80 :  !du "Software\Google\Update\ClientState\{3C122445-AECE-4309-90B7-85A6AEF42AC0}"
    0xfffffb068a4176b8 : 0xfffff8073d6b2085 : nt!CmCreateKey+0x475
    0xfffffb068a417938 : 0xfffff8073d6b1bfe : nt!NtCreateKey+0x2e
    0xfffffb068a417988 : 0xfffff8073d1d2d15 : nt!KiSystemServiceCopyEnd+0x25
    0xfffffb068a4179f8 : 0xfffff8073d1c79e0 : nt!KiDpcInterrupt+0x2f0
    0xfffffb068a417a00 : 0xffffe28e00000000 :  Trap @ fffffb068a417a00
    0xfffffb068a417b98 : 0xfffffb068a411000 :  !da "iICIiAiIgIiICIiAiIgIiICIiAiIg5we6q336P88KZqGQe6q336P88KZqlloYV8KPV8uM0ZFpylkn4u/..."
    
    1: kd> !blackboxpnp
        PnpActivityId      : {00000000-0000-0000-0000-000000000000}
        PnpActivityTime    : 132226288416709254
        PnpEventInformation: 3
        PnpEventInProgress : 0
        PnpProblemCode     : 24
        PnpVetoType        : 0
        DeviceId           : SWD\MMDEVAPI\{0.0.0.00000000}.{53ae4002-d19f-4651-a144-8809e4d3b2eb}
        VetoString         : 
    
    1: kd> .cxr fffffb068a415670
    rax=0000000000000000 rbx=fffffb068a4160c0 rcx=0000000000000007
    rdx=0000000001097ac8 rsi=0000000000000000 rdi=ffff818721123000
    rip=fffff8073d68e592 rsp=fffffb068a416068 rbp=ffff818721123000
     r8=000000000000001c  r9=ffffe28e4c997080 r10=0000022ba3fe8ac8
    r11=0000000000000ac8 r12=00000000a4aee0c2 r13=fffffb068a416320
    r14=0000000000000000 r15=0000022ba2fec6a4
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
    nt!HvpGetCellPaged+0xa2:
    fffff807`3d68e592 418b02          mov     eax,dword ptr [r10] ds:002b:0000022b`a3fe8ac8=????????
    1: kd> lmvm klif
    Browse full module list
    start             end                 module name
    fffff807`57100000 fffff807`571fc000   klif     T (no symbols)           
        Loaded symbol image file: klif.sys
        Image path: \SystemRoot\system32\DRIVERS\klif.sys
        Image name: klif.sys
        Browse all global symbols  functions  data
        Timestamp:        Fri Jun 24 14:00:24 2016 (576D20D8)
        CheckSum:         001010F3
        ImageSize:        000FC000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    Hmm very interesting bugcheck but causes a Kaspersky Internet Security. Please update it (check updates in program)
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 00:16.
Find Us




Windows 10 Forums