PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe000f7ff1010, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff801cb8bf0d3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 46173
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe000f7ff1010
BUGCHECK_P2: 0
BUGCHECK_P3: fffff801cb8bf0d3
BUGCHECK_P4: 2
READ_ADDRESS: fffff801cbaace60: Unable to get Flags value from nt!KdVersionBlock
fffff801cbaace60: Unable to get Flags value from nt!KdVersionBlock
fffff801cbaace60: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff801cbb69298
GetUlongPtrFromAddress: unable to read from fffff801cbb69520
fffff801cbaace60: Unable to get Flags value from nt!KdVersionBlock
ffffe000f7ff1010 Nonpaged pool
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: IDMan.exe
TRAP_FRAME: ffffd001bbb56f10 -- (.trap 0xffffd001bbb56f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003ccc870 rbx=0000000000000000 rcx=0000058000000000
rdx=fffff801cb806000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801cb8bf0d3 rsp=ffffd001bbb570a0 rbp=ffffc00079228c30
r8=0000000000000000 r9=00000000050b6f3e r10=0000000000000002
r11=ffffb000762b3d72 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MmCopyToCachedPage+0x183:
fffff801`cb8bf0d3 498b0424 mov rax,qword ptr [r12] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffd001`bbb56ca8 fffff801`cb984d65 : 00000000`00000050 ffffe000`f7ff1010 00000000`00000000 ffffd001`bbb56f10 : nt!KeBugCheckEx
ffffd001`bbb56cb0 fffff801`cb85e2b9 : 00000000`00000000 ffffe000`eaf6e500 ffffd001`bbb56f10 ffffb000`7a640000 : nt! ?? ::FNODOBFM::`string'+0x1deb5
ffffd001`bbb56d50 fffff801`cb960c2f : 00000000`00000000 00000000`00000001 00000000`00000000 00000022`cb87ae70 : nt!MmAccessFault+0x769
ffffd001`bbb56f10 fffff801`cb8bf0d3 : 0000000f`ffffffff 000026d6`447e1ab0 fffffa80`009af650 ffffe000`f2882880 : nt!KiPageFault+0x12f
ffffd001`bbb570a0 fffff801`cb8beb4f : 00000000`00000000 00000000`03ff3d72 00000000`03ff3000 ffffd001`bbb5744c : nt!MmCopyToCachedPage+0x183
ffffd001`bbb57410 fffff801`cb8f1120 : ffffe000`ea411d60 00000000`050b6f3e ffffd001`bbb57568 ffffe000`00000000 : nt!CcMapAndCopyInToCache+0x21f
ffffd001`bbb57500 fffff801`96141d7c : 00000000`03ff42eb ffffe000`e8bfcdf0 ffffe000`eae4f8a0 ffffe000`e8bfcdf0 : nt!CcCopyWriteEx+0x260
ffffd001`bbb575a0 fffff801`95fa3061 : 00000000`000002b0 fffff801`cbbf3f95 ffff4ece`90018191 00000000`00000579 : Ntfs!NtfsCopyWriteA+0x2ed
ffffd001`bbb57820 fffff801`95fa37d6 : ffffd001`bbb57910 ffffe000`eae4f800 ffffe000`e8532cf0 ffffe000`e8532c00 : fltmgr!FltpPerformFastIoCall+0x1c1
ffffd001`bbb57880 fffff801`95fc9a4f : 00000000`00000010 fffff801`cbc13544 ffffe000`00000010 ffffd001`bbb579e0 : fltmgr!FltpPassThroughFastIo+0x165
ffffd001`bbb578e0 fffff801`cbc13064 : ffffe000`eae4f8a0 00000000`00000000 ffffd001`bbb579d8 ffffd001`bbb57a40 : fltmgr!FltpFastIoWrite+0x14f
ffffd001`bbb57990 fffff801`cb9621b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x410
ffffd001`bbb57a90 00000000`773a2352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05c5ed88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773a2352
SYMBOL_NAME: nt!MmCopyToCachedPage+183
MODULE_NAME: nt
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 183
FAILURE_BUCKET_ID: AV_nt!MmCopyToCachedPage
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {38463293-a177-b1cf-c39d-543c8a6c902d}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00021d20899, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803f0ddf9fb, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11646
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffc00021d20899
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803f0ddf9fb
READ_ADDRESS: fffff803f0f30e60: Unable to get Flags value from nt!KdVersionBlock
fffff803f0f30e60: Unable to get Flags value from nt!KdVersionBlock
fffff803f0f30e60: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff803f0fed298
GetUlongPtrFromAddress: unable to read from fffff803f0fed520
fffff803f0f30e60: Unable to get Flags value from nt!KdVersionBlock
ffffc00021d20899 Paged pool
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffd00021d206e0 -- (.trap 0xffffd00021d206e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd00021d20830
rdx=0000000000007ff6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803f0ddf9fb rsp=ffffd00021d20870 rbp=ffffc00021d208f0
r8=0000000000000000 r9=00000000000000a8 r10=fffff803f0c8a000
r11=fffff78000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
nt!KiDpcInterrupt+0xcb:
fffff803`f0ddf9fb 0fb64da9 movzx ecx,byte ptr [rbp-57h] ss:0018:ffffc000`21d20899=??
Resetting default scope
STACK_TEXT:
ffffd000`21d20598 fffff803`f0de64e9 : 00000000`0000000a ffffc000`21d20899 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`21d205a0 fffff803`f0de4d3a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe001`ae558940 : nt!KiBugCheckDispatch+0x69
ffffd000`21d206e0 fffff803`f0ddf9fb : 00000000`00000000 ffffd000`677310e0 ffffe001`ab2a6960 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`21d20870 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0xcb
SYMBOL_NAME: nt!KiDpcInterrupt+cb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: cb
FAILURE_BUCKET_ID: AV_nt!KiDpcInterrupt
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {c1149c79-430d-0297-4e4e-d298390f725f}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc0002456f720, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80199a3692b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13962
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffc0002456f720
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80199a3692b
READ_ADDRESS: fffff80199ca6e60: Unable to get Flags value from nt!KdVersionBlock
fffff80199ca6e60: Unable to get Flags value from nt!KdVersionBlock
fffff80199ca6e60: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80199d63298
GetUlongPtrFromAddress: unable to read from fffff80199d63520
fffff80199ca6e60: Unable to get Flags value from nt!KdVersionBlock
ffffc0002456f720 Paged pool
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd0002456ef80 -- (.trap 0xffffd0002456ef80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0002456f720 rbx=0000000000000000 rcx=ffffc0002456f720
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80199a3692b rsp=ffffd0002456f110 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffc0002456f720
r11=ffffd0002456f338 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KeSetEvent+0x3fb:
fffff801`99a3692b 488b09 mov rcx,qword ptr [rcx] ds:ffffc000`2456f720=????????????????
Resetting default scope
STACK_TEXT:
ffffd000`2456ee38 fffff801`99b5c4e9 : 00000000`0000000a ffffc000`2456f720 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`2456ee40 fffff801`99b5ad3a : 00000000`00000000 ffffd000`2456f718 ffffd000`2456f000 fffff800`f227fcf2 : nt!KiBugCheckDispatch+0x69
ffffd000`2456ef80 fffff801`99a3692b : ffffe001`160b8770 fffff800`f28e6f29 ffffe001`18f5f940 ffffe001`160b88c0 : nt!KiPageFault+0x23a
ffffd000`2456f110 fffff800`f24a838a : ffffc000`2456f720 ffffe001`00000000 00000000`00000000 ffffe001`00000000 : nt!KeSetEvent+0x3fb
ffffd000`2456f1d0 fffff801`99a38bea : 00000001`00000001 ffffe001`18f5f940 ffffd000`2456f300 00000000`00000000 : Ntfs!NtfsFlushDiskCacheCompletionRoutine+0x12
ffffd000`2456f200 fffff800`f2203f53 : ffffe001`161b6800 ffffbfbd`9f86ca00 ffffe001`15186800 fffff801`99cb2300 : nt!IopfCompleteRequest+0x2ea
ffffd000`2456f340 fffff800`f221738e : ffff80c2`7ac02b56 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidCompleteRequestEx+0x53
ffffd000`2456f410 fffff800`f2202415 : fffff800`f28d1010 00000000`00000000 00000000`00000000 00000000`00000001 : storport!RaUnitScsiIrp+0x15bae
ffffd000`2456f560 fffff800`f28c9458 : ffffe001`160b8ea8 ffffe001`160b8770 ffffe001`160b8e78 00000000`00000000 : storport!RaDriverScsiIrp+0x55
ffffd000`2456f5a0 fffff800`f28c91ad : ffffe001`160b8d80 ffffe001`160b8770 ffffe001`160b8f60 00000000`00000009 : disk!DiskFlushDispatch+0x128
ffffd000`2456f600 fffff800`f28e6d8d : 00000000`00000006 ffffc000`78a4bfc0 ffffe001`18f5f940 ffffe001`18f5f940 : disk!DiskShutdownFlush+0xcd
ffffd000`2456f670 fffff800`f23453c8 : ffffe001`161cca30 ffffd000`2456f6f8 ffffe001`161cca30 00000000`00000000 : CLASSPNP!ClassShutdownFlush+0x39
ffffd000`2456f6a0 fffff800`f24a831d : ffffd000`2456fa61 ffffc000`78a4bfc0 ffffe001`18f5f940 ffffe001`1574a6f0 : volmgr!VmFlushBuffers+0x138
ffffd000`2456f6e0 fffff800`f24a6778 : ffffe001`18f5f940 00000000`1968d73b 00000000`00000000 ffffc000`78a4bf00 : Ntfs!NtfsFlushDiskCache+0xad
ffffd000`2456f740 fffff800`f254541f : ffffc000`78a4bfc0 00000000`196b3356 ffffd000`2456fa01 00000000`00000000 : Ntfs!LfsFlushDiskCache+0x120
ffffd000`2456f820 fffff801`99aee4ac : ffffc000`78a4bfc0 00000000`196b3356 7fffffff`ffffffff 7fffffff`ffffffff : Ntfs!LfsFlushToLsn+0x10b
ffffd000`2456f880 fffff801`99a4fbf3 : ffffe001`16817bb0 00000000`00000000 00000000`00000000 ffffd000`2456faf8 : nt!CcAcquireByteRangeForWrite+0x850
ffffd000`2456f9b0 fffff801`99a5042b : ffffe001`15693b70 00000000`00000000 ffffe001`00000001 ffffd000`2456faf8 : nt!CcFlushCachePriv+0x37b
ffffd000`2456fac0 fffff801`99a9c38c : ffffe001`168a4c40 ffffe001`15186801 ffffe001`00000000 00000000`000441e4 : nt!CcWriteBehindInternal+0x17b
ffffd000`2456fb50 fffff801`99b01c70 : 00000000`00000000 ffffe001`15186700 00000000`00000080 ffffe001`15186700 : nt!ExpWorkerThread+0x28c
ffffd000`2456fc00 fffff801`99b56fc6 : ffffd001`a8940180 ffffe001`15186700 ffffe001`181c8880 fffff960`000fe544 : nt!PspSystemThreadStartup+0x58
ffffd000`2456fc60 00000000`00000000 : ffffd000`24570000 ffffd000`2456a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: disk!DiskFlushDispatch+128
MODULE_NAME: disk
IMAGE_NAME: disk.sys
IMAGE_VERSION: 6.3.9600.16384
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 128
FAILURE_BUCKET_ID: AV_disk!DiskFlushDispatch
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {3fe0836c-c708-98ef-41cf-eeab3ff35f71}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00001af21c864000
Arg3: 0000000000003e90
Arg4: fffff58010804000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21149
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41284
BUGCHECK_P2: 1af21c864000
BUGCHECK_P3: 3e90
BUGCHECK_P4: fffff58010804000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffd000`252675b8 fffff802`039f443d : 00000000`0000001a 00000000`00041284 00001af2`1c864000 00000000`00003e90 : nt!KeBugCheckEx
ffffd000`252675c0 fffff802`038dc728 : e9000001`c17a7867 ffffd000`25267710 fffff68d`790e4320 fffff580`10804000 : nt! ?? ::FNODOBFM::`string'+0x1658d
ffffd000`25267610 fffff802`0394075a : ffffe001`f46c0340 00000000`00000001 00000000`00000000 ffffe001`00000005 : nt!MiDeleteVirtualAddresses+0x558
ffffd000`252678a0 fffff802`0393f5e9 : ffffe001`f0fa9870 00000000`00000010 ffffe001`00000000 00000000`00000000 : nt!MiDeleteVad+0xbca
ffffd000`252679a0 fffff802`039d91b3 : 00000000`00000001 00000000`00502cf8 00000000`00000001 ffffe001`f4457df0 : nt!NtFreeVirtualMemory+0x879
ffffd000`25267b00 00007ffe`a3e50e2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000009a`7b00e6b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a3e50e2a
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+1658d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1658d
FAILURE_BUCKET_ID: 0x1a_41284_nt!_??_::FNODOBFM::_string_
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {c39d115f-eaa3-aeb6-09bd-1a63e83e1077}
Followup: MachineOwner
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a01f5928ed053b, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 52f8bcb1b86866dc, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2280
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8772
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 109
BUGCHECK_P1: a3a01f5928ed053b
BUGCHECK_P2: 0
BUGCHECK_P3: 52f8bcb1b86866dc
BUGCHECK_P4: 101
MEMORY_CORRUPTOR: ONE_BIT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd001`165c6088 00000000`00000000 : 00000000`00000109 a3a01f59`28ed053b 00000000`00000000 52f8bcb1`b86866dc : nt!KeBugCheckEx
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------