Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: srv*c:\work\Win_Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.23572.amd64fre.win7sp1_ldr.161011-0600 Machine Name: Kernel base = 0xfffff800`0364b000 PsLoadedModuleList = 0xfffff800`0388d730 Debug session time: Mon Jan 23 16:41:33.103 2017 (GMT+1) System Uptime: 0 days 5:32:25.587 Loading Kernel Symbols ............................................................... ................................................................ .....................Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details .Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details ............................. Loading User Symbols PEB is paged out (Peb.Ldr = 000007ff`fffdb018). Type ".hh dbgerr001" for details Loading unloaded module list ................ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffffccc78f60060, 0, fffff800036b023c, 7} Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details PEB is paged out (Peb.Ldr = 000007ff`fffdb018). Type ".hh dbgerr001" for details Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details PEB is paged out (Peb.Ldr = 000007ff`fffdb018). Type ".hh dbgerr001" for details Probably caused by : memory_corruption ( nt!MiDecommitPages+1fc ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffccc78f60060, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff800036b023c, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000007, (reserved) Debugging Details: ------------------ Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details PEB is paged out (Peb.Ldr = 000007ff`fffdb018). Type ".hh dbgerr001" for details Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details PEB is paged out (Peb.Ldr = 000007ff`fffdb018). Type ".hh dbgerr001" for details READ_ADDRESS: fffffccc78f60060 FAULTING_IP: nt!MiDecommitPages+1fc fffff800`036b023c 448b04c2 mov r8d,dword ptr [rdx+rax*8] MM_INTERNAL_CODE: 7 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: dllhost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff880090c1fc0 -- (.trap 0xfffff880090c1fc0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000498f1ec00c rbx=0000000000000000 rcx=0000000fffffffff rdx=fffffa8000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800036b023c rsp=fffff880090c2150 rbp=fffff680000cc010 r8=0000058000000000 r9=00000000ffffffff r10=ffffffffffffffff r11=0000000000000011 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiDecommitPages+0x1fc: fffff800`036b023c 448b04c2 mov r8d,dword ptr [rdx+rax*8] ds:acf8:0060=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003736c09 to fffff800036bb400 STACK_TEXT: fffff880`090c1e58 fffff800`03736c09 : 00000000`00000050 fffffccc`78f60060 00000000`00000000 fffff880`090c1fc0 : nt!KeBugCheckEx fffff880`090c1e60 fffff800`036b952e : 00000000`00000000 fffffccc`78f60060 ffff0800`00000900 8240c428`52002205 : nt! ?? ::FNODOBFM::`string'+0x3a251 fffff880`090c1fc0 fffff800`036b023c : fffff6fb`40000660 fffff680`000cc000 ffffffff`ffffffff 000fffff`00000004 : nt!KiPageFault+0x16e fffff880`090c2150 fffff800`036a8022 : fffffa80`00000001 00000000`0000225b fffffa80`09c9bb10 fffffa80`09c9bea8 : nt!MiDecommitPages+0x1fc fffff880`090c29e0 fffff800`036ba693 : ffffffff`ffffffff 00000000`071ef1e8 00000000`071ef1e0 00000000`00004000 : nt!NtFreeVirtualMemory+0x382 fffff880`090c2ae0 00000000`76dcbf1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`071ef1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76dcbf1a STACK_COMMAND: kb FOLLOWUP_IP: nt!MiDecommitPages+1fc fffff800`036b023c 448b04c2 mov r8d,dword ptr [rdx+rax*8] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiDecommitPages+1fc FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 57fcfdf3 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiDecommitPages+1fc BUCKET_ID: X64_0x50_nt!MiDecommitPages+1fc Followup: MachineOwner ---------