*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a008617ff8, 1, fffff802cbd39a1e, 0}
Could not read faulting driver name
TRIAGER: Could not open triage file : C:\Program Files\Windows Kits\8.0\Debuggers\x86\triage\modclass.ini, error 2
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2fd0c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a008617ff8, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff802cbd39a1e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : C:\Program Files\Windows Kits\8.0\Debuggers\x86\triage\modclass.ini, error 2
OVERLAPPED_MODULE: Address regions for 'luafv' and 'WinUSB.sys' overlap
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff802cbf4b178
GetUlongFromAddress: unable to read from fffff802cbf4b1f8
fffff8a008617ff8 Paged pool
FAULTING_IP:
nt!memcpy+25e
fffff802`cbd39a1e 48894118 mov qword ptr [rcx+18h],rax
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: TiWorker.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880169950e0 -- (.trap 0xfffff880169950e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0097000000730072 rbx=0000000000000000 rcx=fffff8a008617fe0
rdx=ffffffffff593000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802cbd39a1e rsp=fffff88016995278 rbp=fffff880169952e9
r8=0000000000011000 r9=0000000000000880 r10=006500730055006c
r11=fffff8a008607000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!memcpy+0x25e:
fffff802`cbd39a1e 48894118 mov qword ptr [rcx+18h],rax ds:fffff8a0`08617ff8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802cbdfa79c to fffff802cbdbb140
STACK_TEXT:
fffff880`16994f38 fffff802`cbdfa79c : 00000000`00000050 fffff8a0`08617ff8 00000000`00000001 fffff880`169950e0 : nt!KeBugCheckEx
fffff880`16994f40 fffff802`cbc4a53e : 00000000`00000001 fffff8a0`08617ff8 fffffa80`04c0f940 fffff8a0`08617ff8 : nt! ?? ::FNODOBFM::`string'+0x2fd0c
fffff880`16994fe0 fffff802`cbdc4cae : 00000000`00000001 00000000`00000800 00000000`00000700 fffff8a0`090d7000 : nt!MmAccessFault+0x54e
fffff880`169950e0 fffff802`cbd39a1e : fffff802`cc0ecada fffff8a0`090d7000 fffff880`169952e9 fffff8a0`03267010 : nt!KiPageFault+0x16e
fffff880`16995278 fffff802`cc0ecada : fffff8a0`090d7000 fffff880`169952e9 fffff8a0`03267010 00000000`00000001 : nt!memcpy+0x25e
fffff880`16995280 fffff802`cc1a7f26 : fffff8a0`000016b8 fffff880`00aa9e00 fffff8a0`002d7000 fffff8a0`00001000 : nt!HvpRecoverData+0x3a2
fffff880`16995350 fffff802`cbfe85f0 : 00000000`00ac0000 fffff8a0`03270000 01cd17e7`09421d96 fffff8a0`03271000 : nt! ?? ::NNGAKEGL::`string'+0x12d16
fffff880`169953c0 fffff802`cbfe8062 : 00000000`00000000 00000000`00000002 fffff880`169954b9 00000000`00000001 : nt!HvInitializeHive+0x22c
fffff880`16995420 fffff802`cc01ade8 : fffff880`169955c8 ffffffff`00000001 fffff880`00000000 00000000`00000002 : nt!CmpInitializeHive+0x422
fffff880`16995500 fffff802`cbff5e7f : 00000000`00000000 00000000`00000000 00000000`00000008 fffff802`cbdbe926 : nt!CmpInitHiveFromFile+0x284
fffff880`16995680 fffff802`cbff4649 : 00000000`00000000 00000000`00000000 fffffa80`0365a000 00000000`00000801 : nt!CmpCmdHiveOpen+0x8b
fffff880`16995880 fffff802`cbff66c3 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`00000021 : nt!CmLoadKey+0x111
fffff880`169959c0 fffff802`cc0d3394 : fffffa80`04c0f940 00000000`00000002 000000e1`00000000 00000000`00000000 : nt!NtLoadKeyEx+0x7bf
fffff880`16995bf0 fffff802`cbdc6213 : 00000000`00000000 fffffa80`04c0f940 fffff880`16995cc0 000000e1`e794eb00 : nt!NtLoadKey+0x24
fffff880`16995c40 000007fe`8f2241eb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000e1`e794ea58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`8f2241eb
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+2fd0c
fffff802`cbdfa79c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2fd0c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f3f2adb
FAILURE_BUCKET_ID: X64_AV_nt!_??_::FNODOBFM::_string_+2fd0c
BUCKET_ID: X64_AV_nt!_??_::FNODOBFM::_string_+2fd0c