Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (
http://www.osr.com)
Online Crash Dump Analysis Service
See
http://www.osronline.com for more information
Windows 8 Kernel Version 17763 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff805`5bc11000 PsLoadedModuleList = 0xfffff805`5c02ba50
Debug session time: Wed Jan 9 15:04:57.203 2019 (UTC - 5:00)
System Uptime: 0 days 6:05:35.909
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8055bd02e46, Address of the instruction which caused the bugcheck
Arg3: ffffec863c4b4d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt!MiDeleteVad+15b6
fffff805`5bd02e46 418b447504 mov eax,dword ptr [r13+rsi*2+4]
CONTEXT: ffffec863c4b4d20 -- (.cxr 0xffffec863c4b4d20)
rax=0000000000000040 rbx=0000000000000008 rcx=0000000000000002
rdx=0000000000000002 rsi=ffffaf85bca28080 rdi=0000000000000000
rip=fffff8055bd02e46 rsp=ffffec863c4b5710 rbp=ffffec863c4b5810
r8=0000000000000003 r9=7fffaf85be0e8ba8 r10=7ffffffffffffffc
r11=ffffec863c4b5680 r12=0000000000000000 r13=ffffaf85bc7a3a30
r14=ffffaf85be0e8ba8 r15=ffffaf85bc7a3a90
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MiDeleteVad+0x15b6:
fffff805`5bd02e46 418b447504 mov eax,dword ptr [r13+rsi*2+4] ds:002b:ffff0e91`35bf3b34=????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 126a7
LAST_CONTROL_TRANSFER: from fffff8055c1c3d61 to fffff8055bd02e46
STACK_TEXT:
ffffec86`3c4b5710 fffff805`5c1c3d61 : 00000002`00000000 ffffaf85`bca28080 ffffaf85`bc7a3a30 00000000`00001000 : nt!MiDeleteVad+0x15b6
ffffec86`3c4b5880 fffff805`5c1c3b5f : ffffaf85`bc7a3a30 00000000`00000000 00000197`887a0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec86`3c4b58b0 fffff805`5c1c35ff : ffffd6ca`6f455a37 fffff805`5bd29639 00000000`00000000 ffffeddf`011c8660 : nt!MiUnmapViewOfSection+0x11f
ffffec86`3c4b5990 ffffedc1`085e3a4e : ffffaf85`bca49f40 00000000`085bd8d6 00000001`00000001 0000000c`00000000 : nt!MmUnmapViewOfSection+0xf
ffffec86`3c4b59c0 ffffedc1`085e3a1d : 00000000`bca49f02 00000000`00000000 00000000`00000001 fffff805`5bd2a875 : win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView+0x26
ffffec86`3c4b59f0 ffffedc1`085e3815 : 00000000`00000000 ffffaf85`bcb83810 00000000`00000000 ffffeddf`08546be0 : win32kbase!DirectComposition::CBatchSharedMemoryPool::Reset+0x19
ffffec86`3c4b5a20 ffffedc1`085e33c3 : 00000000`00000000 00000000`00000001 ffffeddf`08546b01 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x281
ffffec86`3c4b5aa0 fffff805`5bdd3d85 : ffffaf85`bca28080 ffffec86`3c4b5b80 00000197`88609130 00000000`00000000 : win32kbase!NtDCompositionSubmitDWMBatch+0x153
ffffec86`3c4b5b00 00007ffb`414d38a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002a`8e1cfbb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffb`414d38a4
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xffffec863c4b4d20 ; kb
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 75431 instance(s) of page corruption, target is likely to have memory corruption.