Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051011-37112-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c15000 PsLoadedModuleList = 0xfffff800`02e5ae90
Debug session time: Tue May 10 16:31:53.642 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:29.453
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002cc76c2, fffff8800761fe50, 0}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cc76c2, Address of the instruction which caused the bugcheck
Arg3: fffff8800761fe50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiDeleteVirtualAddresses+4ba
fffff800`02cc76c2 8b00 mov eax,dword ptr [rax]
CONTEXT: fffff8800761fe50 -- (.cxr 0xfffff8800761fe50)
rax=f8a00f1210000001 rbx=fffffa8001516b30 rcx=fffffa8003d2b048
rdx=0000000000000000 rsi=da70000070791025 rdi=fffff6800007e300
rip=fffff80002cc76c2 rsp=fffff88007620830 rbp=000000000fc60000
r8=0000000000001000 r9=fffffa8007b5ab30 r10=00000000000000f4
r11=0000000000000000 r12=fffff6800007eff8 r13=0000000000005da7
r14=0000000000000000 r15=fffffa8000ac2a20
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!MiDeleteVirtualAddresses+0x4ba:
fffff800`02cc76c2 8b00 mov eax,dword ptr [rax] ds:002b:f8a00f12`10000001=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002cc76c2
STACK_TEXT:
fffff880`07620830 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x4ba
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
11 errors : !nt (fffff80002cc74cb-fffff80002cc76fb)
fffff80002cc74c0 20 00 00 00 48 8b 47 08 48 8b 50 *00 44 0f b7 82 ...H.G.H.P.D...
fffff80002cc74d0 88 00 00 00 0f b7 82 8a 00 00 00 *00 44 89 84 24 ............D..$
...
fffff80002cc74f0 73 25 45 *00 b7 c0 48 8d 8c 24 98 00 00 00 48 81 s%E...H..$....H.
...
fffff80002cc76c0 03 00 8b *00 24 c0 01 00 00 85 c9 *04 85 3d 01 00 ....$........=..
fffff80002cc76d0 00 4d 8d *00 98 03 00 00 45 8b c5 *00 8b cd 49 8b .M......E.....I.
fffff80002cc76e0 5c 24 68 *00 8b d4 48 89 5c 24 78 *00 80 d8 fd ff \$h...H.\$x.....
fffff80002cc76f0 48 8b 4b *00 44 8b f8 49 b8 ff ff *00 ff 0f 00 00 H.K.D..I........
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff8800761fe50 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------