MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: ffff820bde544010
Arg3: ffff9a80b3f9e000
Arg4: ffffc90215c22952
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_31
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Spotify.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff800231f7059 to fffff80022bc23c0
STACK_TEXT:
ffffb08c`38ed1528 fffff800`231f7059 : 00000000`0000001a 00000000`00000031 ffff820b`de544010 ffff9a80`b3f9e000 : nt!KeBugCheckEx
ffffb08c`38ed1530 fffff800`230e06f0 : ffffc902`15c22010 00000000`0000001e ffff9a80`b3f9e000 00000000`00000000 : nt!MiApplyCompressedFixups+0x1167f9
ffffb08c`38ed1590 fffff800`22fe8481 : 00000000`0000001e ffff820b`de175080 ffffec00`03c15d20 00000000`639b0000 : nt!MiPerformFixups+0x80
ffffb08c`38ed1630 fffff800`22a93840 : 00000000`00000000 ffff820b`e3fca1d0 ffff820b`e3fca218 00000000`00000018 : nt!MiRelocateImagePfn+0x191
ffffb08c`38ed16a0 fffff800`22a942c8 : ffff820b`00000000 fffff800`00000000 00000000`00000000 ffff820b`de544218 : nt!MiValidateInPage+0x250
ffffb08c`38ed1750 fffff800`22a9471d : 00000000`00000003 ffffb08c`00000000 ffffb08c`38ed1908 fffff800`00000000 : nt!MiWaitForInPageComplete+0x278
ffffb08c`38ed1860 fffff800`22a5881b : 00000000`c0033333 00000000`00000001 00000000`739ce820 00000000`0d27d000 : nt!MiIssueHardFault+0x1ad
ffffb08c`38ed1960 fffff800`22bd041e : ffff820b`de175080 00000000`00000000 00000000`0024e000 00000000`00000000 : nt!MmAccessFault+0x40b
ffffb08c`38ed1b00 00000000`739ce820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0720d3e4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739ce820
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
fffff4094bd271f9-fffff4094bd271fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
fffff4094bd27269-fffff4094bd2726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
fffff4094bd27270-fffff4094bd27273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
fffff4094bd283d5-fffff4094bd283d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
fffff4094bd283dc-fffff4094bd283df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
fffff4094bd283e5-fffff4094bd283e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
fffff4094bd283ec-fffff4094bd283ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (fffff4094bd271f9-fffff4094bd283ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8071f8a2652, Address of the instruction which caused the bugcheck
Arg3: ffffe9838b47c1b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!KeAbPostRelease+122
fffff807`1f8a2652 8bd8 mov ebx,eax
CONTEXT: ffffe9838b47c1b0 -- (.cxr 0xffffe9838b47c1b0;r)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000060
rdx=0000000000000001 rsi=ffffb68d049cb400 rdi=ffffb68d049cb080
rip=fffff8071f8a2652 rsp=ffffe9838b47cba0 rbp=ffffb68cf8652bb8
r8=00000000ffffffff r9=7fffb68cf8652bb8 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffff890bfdeddb80 r13=ffffb68d04a2c6a4
r14=0000000000000001 r15=ffffb68d04a2c6e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KeAbPostRelease+0x122:
fffff807`1f8a2652 8bd8 mov ebx,eax
Last set context:
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000060
rdx=0000000000000001 rsi=ffffb68d049cb400 rdi=ffffb68d049cb080
rip=fffff8071f8a2652 rsp=ffffe9838b47cba0 rbp=ffffb68cf8652bb8
r8=00000000ffffffff r9=7fffb68cf8652bb8 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffff890bfdeddb80 r13=ffffb68d04a2c6a4
r14=0000000000000001 r15=ffffb68d04a2c6e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KeAbPostRelease+0x122:
fffff807`1f8a2652 8bd8 mov ebx,eax
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff8071f80c854 to fffff8071f8a2652
STACK_TEXT:
ffffe983`8b47cba0 fffff807`1f80c854 : ffffb68d`00000000 ffffb68d`00000001 ffffb68d`04a2c708 ffffb68c`f8652bb8 : nt!KeAbPostRelease+0x122
ffffe983`8b47cbf0 fffff807`244e75f7 : ffffb68d`043b3210 ffffb68d`04a2c708 ffffb68d`00000001 ffffb68d`04a2c708 : nt!KeReleaseGuardedMutex+0x44
ffffe983`8b47cc20 fffff807`244e8325 : 00000000`00004000 00000000`ffffbfff ffffb68d`04a2c6a0 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x5e7
ffffe983`8b47ccc0 fffff807`3384e487 : ffffb68d`049cb3a0 ffffb68d`043b3a90 ffffb68d`049cb080 ffff890b`feecd1b8 : FLTMGR!FltGetFileNameInformation+0x195
ffffe983`8b47cd40 fffff807`2451e6fe : 00000000`00000001 00000000`00000000 ffffb68d`043b3a90 fffff807`1f8a112d : luafv!LuafvGenerateFileName+0x57
ffffe983`8b47cd70 fffff807`2451e01b : ffffb68c`f8652500 ffffb68d`043b3a90 ffffb68d`04a2c708 fffff807`1f8a1d3d : FLTMGR!FltpCallOpenedFileNameHandler+0x7e
ffffe983`8b47cdd0 fffff807`244e74cf : ffffb68d`04a2c708 ffffb68d`00000000 ffffb68d`04918940 ffffb68d`04a2c708 : FLTMGR!FltpCreateFileNameInformation+0x19b
ffffe983`8b47ce30 fffff807`244e8325 : ffffb68d`00004000 00000000`ffffbfff ffffb68d`04a2c6a0 ffffb68c`fb6fc010 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffe983`8b47ced0 fffff807`24ee422a : ffffb68d`044cb0f8 ffffb68d`044cb0f8 00000000`0000206c ffff890b`fe98a300 : FLTMGR!FltGetFileNameInformation+0x195
ffffe983`8b47cf50 ffffb68d`044cb0f8 : ffffb68d`044cb0f8 00000000`0000206c ffff890b`fe98a300 ffff890b`00000004 : WdFilter+0x4422a
ffffe983`8b47cf58 ffffb68d`044cb0f8 : 00000000`0000206c ffff890b`fe98a300 ffff890b`00000004 00000000`00000000 : 0xffffb68d`044cb0f8
ffffe983`8b47cf60 00000000`0000206c : ffff890b`fe98a300 ffff890b`00000004 00000000`00000000 00000000`00000000 : 0xffffb68d`044cb0f8
ffffe983`8b47cf68 ffff890b`fe98a300 : ffff890b`00000004 00000000`00000000 00000000`00000000 01d66c35`8dbb796e : 0x206c
ffffe983`8b47cf70 ffff890b`00000004 : 00000000`00000000 00000000`00000000 01d66c35`8dbb796e 01d66c35`a4b48b53 : 0xffff890b`fe98a300
ffffe983`8b47cf78 00000000`00000000 : 00000000`00000000 01d66c35`8dbb796e 01d66c35`a4b48b53 01d66c35`a4b48b53 : 0xffff890b`00000004
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffc7dc89e471f9-ffffc7dc89e471fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
ffffc7dc89e47269-ffffc7dc89e4726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
ffffc7dc89e47270-ffffc7dc89e47273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
ffffc7dc89e483d5-ffffc7dc89e483d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
ffffc7dc89e483dc-ffffc7dc89e483df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
ffffc7dc89e483e5-ffffc7dc89e483e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
ffffc7dc89e483ec-ffffc7dc89e483ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (ffffc7dc89e471f9-ffffc7dc89e483ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffe9838b47c1b0 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8047ad40941, The address that the exception occurred at
Arg3: fffff50a0f496ac8, Exception Record Address
Arg4: fffff8047fe7c930, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!MiDemoteCombinedPte+51
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1
EXCEPTION_RECORD: fffff50a0f496ac8 -- (.exr 0xfffff50a0f496ac8)
ExceptionAddress: fffff8047ad40941 (nt!MiDemoteCombinedPte+0x0000000000000051)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8047fe7c930 -- (.cxr 0xfffff8047fe7c930;r)
rax=ffff86432190c000 rbx=0000000000000000 rcx=ffff8f06b18d7580
rdx=ffff863ffc7a2928 rsi=ffff863ffc7a2928 rdi=fffff50a0f497310
rip=fffff8047ad40941 rsp=fffff50a0f496d00 rbp=00007ff8f4525000
r8=8000000000000000 r9=ffff8f06adffb2c0 r10=0000000000000000
r11=ffff860000000000 r12=0000000000000000 r13=fffff50a0f497410
r14=8000000000000000 r15=ffff8f06b18d7580
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!MiDemoteCombinedPte+0x51:
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Last set context:
rax=ffff86432190c000 rbx=0000000000000000 rcx=ffff8f06b18d7580
rdx=ffff863ffc7a2928 rsi=ffff863ffc7a2928 rdi=fffff50a0f497310
rip=fffff8047ad40941 rsp=fffff50a0f496d00 rbp=00007ff8f4525000
r8=8000000000000000 r9=ffff8f06adffb2c0 r10=0000000000000000
r11=ffff860000000000 r12=0000000000000000 r13=fffff50a0f497410
r14=8000000000000000 r15=ffff8f06b18d7580
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!MiDemoteCombinedPte+0x51:
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
FOLLOWUP_IP:
nt!MiDemoteCombinedPte+51
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_STR: 0x0
LAST_CONTROL_TRANSFER: from fffff8047ac76b07 to fffff8047ad40941
STACK_TEXT:
fffff50a`0f496d00 fffff804`7ac76b07 : 00000000`00000000 ffff863f`fc7a28f8 00000000`00000002 00000000`00000000 : nt!MiDemoteCombinedPte+0x51
fffff50a`0f496dd0 fffff804`7ac732b7 : 00000000`00000000 fffff50a`0f497410 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427
fffff50a`0f496e70 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`1ffe3d10 : nt!MiWalkPageTablesRecursively+0x1e7
fffff50a`0f496f30 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`218fff18 : nt!MiWalkPageTablesRecursively+0x6a1
fffff50a`0f496ff0 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`2190c7f8 : nt!MiWalkPageTablesRecursively+0x6a1
fffff50a`0f4970b0 fffff804`7ac72efc : fffff50a`0f497410 00000000`00000004 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff50a`0f497170 fffff804`7ac72987 : fffff50a`0f497410 fffff50a`00000002 00000000`00000002 ffff8f06`00000000 : nt!MiWalkPageTables+0x36c
fffff50a`0f497270 fffff804`7ac720c2 : ffff8f06`b1509080 fffff804`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
fffff50a`0f497790 fffff804`7ac719da : ffff8f06`b18d7580 fffff50a`0f497a50 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3b2
fffff50a`0f497880 fffff804`7ac700f0 : fffff804`00000000 fffff804`00000000 fffff804`7b06a340 ffff8f06`a0e43500 : nt!MiProcessWorkingSets+0x1fa
fffff50a`0f497a30 fffff804`7aeca5c6 : 00000000`00000001 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
fffff50a`0f497af0 fffff804`7ad8c925 : 00000000`00000004 00000000`ffffffff fffff804`7b06a340 00000000`000000af : nt!MmWorkingSetManager+0x12
fffff50a`0f497b20 fffff804`7ad1e155 : ffff8f06`a0fd2080 00000000`00000080 fffff804`7ad8c7d0 00000000`00640078 : nt!KeBalanceSetManager+0x155
fffff50a`0f497c10 fffff804`7adc99c8 : fffff804`78326180 ffff8f06`a0fd2080 fffff804`7ad1e100 006f0048`00630076 : nt!PspSystemThreadStartup+0x55
fffff50a`0f497c60 00000000`00000000 : fffff50a`0f498000 fffff50a`0f492000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff8da99c4971f9-ffff8da99c4971fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
ffff8da99c497269-ffff8da99c49726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
ffff8da99c497270-ffff8da99c497273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
ffff8da99c4983d5-ffff8da99c4983d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
ffff8da99c4983dc-ffff8da99c4983df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
ffff8da99c4983e5-ffff8da99c4983e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
ffff8da99c4983ec-ffff8da99c4983ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (ffff8da99c4971f9-ffff8da99c4983ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xfffff8047fe7c930 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffc78ca15ca000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff803599d5550, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffc78ca15ca000
FAULTING_IP:
nt!memset+d0
fffff803`599d5550 0f1101 movups xmmword ptr [rcx],xmm0
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: lsass.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: ffffc78ca15c92b0 -- (.trap 0xffffc78ca15c92b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc78ca15c9520 rbx=0000000000000000 rcx=ffffc78ca15ca000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803599d5550 rsp=ffffc78ca15c9448 rbp=ffffc78ca15c9550
r8=0000000000000018 r9=ffffffffffffff64 r10=7ffffffffffffffc
r11=ffffc78ca15c9848 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!memset+0xd0:
fffff803`599d5550 0f1101 movups xmmword ptr [rcx],xmm0 ds:ffffc78c`a15ca000=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803599ecf1a to fffff803599c23c0
STACK_TEXT:
ffffc78c`a15c9008 fffff803`599ecf1a : 00000000`00000050 ffffc78c`a15ca000 00000000`00000002 ffffc78c`a15c92b0 : nt!KeBugCheckEx
ffffc78c`a15c9010 fffff803`5985875f : ffffdc86`b1a7d570 00000000`00000002 00000000`00000000 ffffc78c`a15ca000 : nt!MiSystemFault+0x1c5aba
ffffc78c`a15c9110 fffff803`599d041e : 00000000`00000040 00000000`00000000 000000c4`8227e360 ffffc78c`a15c9578 : nt!MmAccessFault+0x34f
ffffc78c`a15c92b0 fffff803`599d5550 : fffff803`59e137f7 ffffb68d`e22023a0 fffff803`598a1b7d ffffb68d`e2202080 : nt!KiPageFault+0x35e
ffffc78c`a15c9448 fffff803`59e137f7 : ffffb68d`e22023a0 fffff803`598a1b7d ffffb68d`e2202080 ffffdc86`b0e32540 : nt!memset+0xd0
ffffc78c`a15c9450 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmKeyBodyRemapToVirtualForEnum+0x67
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8035985878b-fffff8035985878f 5 bytes - nt!MmAccessFault+37b
[ df be 7d fb f6:1f 3f 7e fc f8 ]
fffff803598587b8-fffff803598587bc 5 bytes - nt!MmAccessFault+3a8 (+0x2d)
[ d7 be 7d fb f6:17 3f 7e fc f8 ]
fffff803599ecfcf - nt!MiSystemFault+1c5b6f (+0x194817)
[ f6:f8 ]
fffff803599ecfe5 - nt!MiSystemFault+1c5b85 (+0x16)
[ f6:f8 ]
12 errors : !nt (fffff8035985878b-fffff803599ecfe5)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8073487ee70
Arg3: 0000000047940cf0
Arg4: fffff8073159d2d4
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Spotify.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff807315d41e9 to fffff807315c23c0
STACK_TEXT:
fffff807`3487ed28 fffff807`315d41e9 : 00000000`0000007f 00000000`00000008 fffff807`3487ee70 00000000`47940cf0 : nt!KeBugCheckEx
fffff807`3487ed30 fffff807`315cf043 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`3487ee70 fffff807`3159d2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`47940cf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_security_check_cookie+0x4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffabe5164471f9-ffffabe5164471fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
ffffabe516447269-ffffabe51644726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
ffffabe516447270-ffffabe516447273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
ffffabe5164483d5-ffffabe5164483d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
ffffabe5164483dc-ffffabe5164483df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
ffffabe5164483e5-ffffabe5164483e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
ffffabe5164483ec-ffffabe5164483ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (ffffabe5164471f9-ffffabe5164483ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------