MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000c622
Arg4: 0000c62d00018c62
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88009685c40 -- (.trap 0xfffff88009685c40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000042f0000 rbx=0000000000000000 rcx=00ffffff00ffffff
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000139ad0 rsp=fffff88009685dd0 rbp=00000000ffffffff
r8=00000000000002f1 r9=00000000042f0000 r10=0000000000000001
r11=0000000000000012 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32k!vSolidFillRect1+0x13c:
fffff960`00139ad0 488908 mov qword ptr [rax],rcx ds:22f8:00000000`042f0000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e2579c to fffff80002e91d00
STACK_TEXT:
fffff880`09685ad8 fffff800`02e2579c : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000c622 : nt!KeBugCheckEx
fffff880`09685ae0 fffff800`02e8fe2e : 00000000`00000001 00000000`042f0000 0000000a`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x4700d
fffff880`09685c40 fffff960`00139ad0 : fffff960`00139994 fffff900`c22edcc0 00000000`00000000 00000000`042f0000 : nt!KiPageFault+0x16e
fffff880`09685dd0 fffff960`00139874 : fffff880`09686220 00000000`00000012 00000000`042f0000 00000000`00ffffff : win32k!vSolidFillRect1+0x13c
fffff880`09685e10 fffff960`001158ed : 00000000`00000005 fffff880`09686220 00000000`00000000 fffff880`00ffffff : win32k!vDIBSolidBlt+0x204
fffff880`09685ff0 fffff960`000ff8e5 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff900`c22edcc0 : win32k!EngBitBlt+0x79d
fffff880`09686100 fffff960`000ff4cc : 00000000`00000000 fffff880`09686520 fffff880`09686390 fffff900`0000f0f0 : win32k!GrePatBltLockedDC+0x2f9
fffff880`096861b0 fffff960`002d5a90 : fffff880`09686390 fffff800`03136642 00000000`0009cf80 fffff960`00000000 : win32k!GrePolyPatBltInternal+0x2ec
fffff880`09686300 fffff800`02e90f93 : 00000000`0009c6c8 00000000`00f00021 00000000`0009cf80 00000000`00000001 : win32k!NtGdiPolyPatBlt+0x308
fffff880`09686430 00000000`74e802ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0009c6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74e802ba
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!vSolidFillRect1+13c
fffff960`00139ad0 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!vSolidFillRect1+13c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4de066b3
FAILURE_BUCKET_ID: X64_0x1a_5003_win32k!vSolidFillRect1+13c
BUCKET_ID: X64_0x1a_5003_win32k!vSolidFillRect1+13c
Followup: MachineOwner