MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005002, The subtype of the bugcheck.
Arg2: fffff781c0000000
Arg3: 000000000000de46
Arg4: 0000fe47fffffffe
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-I8FA0KP
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 10
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 1a
BUGCHECK_P1: 5002
BUGCHECK_P2: fffff781c0000000
BUGCHECK_P3: de46
BUGCHECK_P4: fe47fffffffe
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88008e84720 -- (.trap 0xfffff88008e84720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00b648000 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dc6406 rsp=fffff88008e848b0 rbp=0000000000001000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff88008e84880 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExAllocatePoolWithTag+0x326:
fffff800`02dc6406 448928 mov dword ptr [rax],r13d ds:fffff8a0`0b648000=????????
Resetting default scope
STACK_TEXT:
fffff880`08e843b8 fffff800`02d04f67 : 00000000`0000001a 00000000`00005002 fffff781`c0000000 00000000`0000de46 : nt!KeBugCheckEx
fffff880`08e843c0 fffff800`02cb91ce : 00000000`00000001 fffff8a0`0b648000 fffff880`08e84720 fffff6fc`5005b240 : nt! ?? ::FNODOBFM::`string'+0x2a7fa
fffff880`08e844b0 fffff800`02ca943b : fffff8a0`00f41060 00000000`00000000 00000000`00000000 ffffffff`00000000 : nt!MiDispatchFault+0x8ce
fffff880`08e845c0 fffff800`02c9976e : 00000000`00000001 fffff8a0`0b648000 ffff0074`03c6ff00 fffffa80`03c61640 : nt!MmAccessFault+0xe1b
fffff880`08e84720 fffff800`02dc6406 : fffffa80`03c61640 00000000`000000b3 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`08e848b0 fffff800`02f94f34 : 00000000`00000004 fffffa80`03c6ff30 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x326
fffff880`08e849a0 fffff800`02f94dbb : 00000000`00000001 fffffa80`03d06101 00000000`00000000 fffff880`08e84a38 : nt!ObpAllocateObject+0xc4
fffff880`08e84a00 fffff800`02f633c4 : 00000000`00b4e160 00000000`00000002 fffff8a0`0b637230 fffff8a0`00f41060 : nt!ObCreateObject+0xdb
fffff880`08e84a70 fffff800`02f41c4f : 00000000`00000004 00000000`00b4e1b0 00000000`00000000 00000000`00000001 : nt!SepDuplicateToken+0xf4
fffff880`08e84b10 fffff800`02c9a8d3 : fffffa80`06df0b60 00000000`00b4e138 fffff880`08e84bc8 00000000`00000000 : nt!NtDuplicateToken+0x147
fffff880`08e84bb0 00000000`7726173a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00b4e118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7726173a
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2a7fa
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.17514
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x1a_5002_nt!_??_::FNODOBFM::_string_+2a7fa
OS_VERSION: 7.1.7601.17514
BUILDLAB_STR: win7sp1_rtm
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {078945c8-674a-36ba-4966-c87c886b0dbb}
Followup: MachineOwner