Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: srv*c:\work\Win_Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.23572.amd64fre.win7sp1_ldr.161011-0600
Machine Name:
Kernel base = 0xfffff800`0364b000 PsLoadedModuleList = 0xfffff800`0388d730
Debug session time: Mon Jan 23 16:41:33.103 2017 (GMT+1)
System Uptime: 0 days 5:32:25.587
Loading Kernel Symbols
...............................................................
................................................................
.....................Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details
.Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details
.............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdb018).  Type ".hh dbgerr001" for details
Loading unloaded module list
................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffccc78f60060, 0, fffff800036b023c, 7}

Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details
Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdb018).  Type ".hh dbgerr001" for details
Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details
Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdb018).  Type ".hh dbgerr001" for details
Probably caused by : memory_corruption ( nt!MiDecommitPages+1fc )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffccc78f60060, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800036b023c, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------

Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details
Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdb018).  Type ".hh dbgerr001" for details
Page 1b7a1f not present in the dump file. Type ".hh dbgerr004" for details
Page 1b47b4 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdb018).  Type ".hh dbgerr001" for details

READ_ADDRESS:  fffffccc78f60060 

FAULTING_IP: 
nt!MiDecommitPages+1fc
fffff800`036b023c 448b04c2        mov     r8d,dword ptr [rdx+rax*8]

MM_INTERNAL_CODE:  7

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  dllhost.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880090c1fc0 -- (.trap 0xfffff880090c1fc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000498f1ec00c rbx=0000000000000000 rcx=0000000fffffffff
rdx=fffffa8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036b023c rsp=fffff880090c2150 rbp=fffff680000cc010
 r8=0000058000000000  r9=00000000ffffffff r10=ffffffffffffffff
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiDecommitPages+0x1fc:
fffff800`036b023c 448b04c2        mov     r8d,dword ptr [rdx+rax*8] ds:acf8:0060=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003736c09 to fffff800036bb400

STACK_TEXT:  
fffff880`090c1e58 fffff800`03736c09 : 00000000`00000050 fffffccc`78f60060 00000000`00000000 fffff880`090c1fc0 : nt!KeBugCheckEx
fffff880`090c1e60 fffff800`036b952e : 00000000`00000000 fffffccc`78f60060 ffff0800`00000900 8240c428`52002205 : nt! ?? ::FNODOBFM::`string'+0x3a251
fffff880`090c1fc0 fffff800`036b023c : fffff6fb`40000660 fffff680`000cc000 ffffffff`ffffffff 000fffff`00000004 : nt!KiPageFault+0x16e
fffff880`090c2150 fffff800`036a8022 : fffffa80`00000001 00000000`0000225b fffffa80`09c9bb10 fffffa80`09c9bea8 : nt!MiDecommitPages+0x1fc
fffff880`090c29e0 fffff800`036ba693 : ffffffff`ffffffff 00000000`071ef1e8 00000000`071ef1e0 00000000`00004000 : nt!NtFreeVirtualMemory+0x382
fffff880`090c2ae0 00000000`76dcbf1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`071ef1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76dcbf1a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiDecommitPages+1fc
fffff800`036b023c 448b04c2        mov     r8d,dword ptr [rdx+rax*8]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiDecommitPages+1fc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  57fcfdf3

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!MiDecommitPages+1fc

BUCKET_ID:  X64_0x50_nt!MiDecommitPages+1fc

Followup: MachineOwner
---------