Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032011-34881-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03c0c000 PsLoadedModuleList = 0xfffff800`03e49e50
Debug session time: Sun Mar 20 05:19:05.781 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:19.843
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff96000311897, fffff88008685730, 0}
Probably caused by : win32k.sys ( win32k!BmfdQueryAdvanceWidthsTE+3f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff96000311897, Address of the instruction which caused the bugcheck
Arg3: fffff88008685730, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!BmfdQueryAdvanceWidthsTE+3f
fffff960`00311897 488b4910 mov rcx,qword ptr [rcx+10h]
CONTEXT: fffff88008685730 -- (.cxr 0xfffff88008685730)
rax=fffff88008686158 rbx=00000000ffffffff rcx=fffef900c0d5b020
rdx=fffff88008686138 rsi=fffff900c08dcca0 rdi=fffff900c08dccb8
rip=fffff96000311897 rsp=fffff88008686100 rbp=0000000000000001
r8=fffff88008686160 r9=0000000000000001 r10=0000000000000008
r11=fffff80003e7cb60 r12=fffff88008686220 r13=0000000000000001
r14=0000000000000001 r15=fffff900c0081000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
win32k!BmfdQueryAdvanceWidthsTE+0x3f:
fffff960`00311897 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:fffef900`c0d5b030=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff96000311897
STACK_TEXT:
fffff880`08686100 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!BmfdQueryAdvanceWidthsTE+0x3f
FOLLOWUP_IP:
win32k!BmfdQueryAdvanceWidthsTE+3f
fffff960`00311897 488b4910 mov rcx,qword ptr [rcx+10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!BmfdQueryAdvanceWidthsTE+3f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d23ecb0
STACK_COMMAND: .cxr 0xfffff88008685730 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!BmfdQueryAdvanceWidthsTE+3f
BUCKET_ID: X64_0x3B_win32k!BmfdQueryAdvanceWidthsTE+3f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032011-28750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03c4a000 PsLoadedModuleList = 0xfffff800`03e87e50
Debug session time: Sun Mar 20 05:28:53.459 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:41.911
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800040317f1, fffff88008bca0f0, 0}
Probably caused by : ntkrnlmp.exe ( nt!AuthzBasepRemoveSecurityAttributeFromLists+31 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800040317f1, Address of the instruction which caused the bugcheck
Arg3: fffff88008bca0f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!AuthzBasepRemoveSecurityAttributeFromLists+31
fffff800`040317f1 f6423801 test byte ptr [rdx+38h],1
CONTEXT: fffff88008bca0f0 -- (.cxr 0xfffff88008bca0f0)
rax=00000000000000c8 rbx=fffef8a005e1fcf8 rcx=fffff8a005e1fcf0
rdx=fffef8a005e1fcf8 rsi=fffff8a005e1fcf8 rdi=fffff8a005f88060
rip=fffff800040317f1 rsp=fffff88008bcaac8 rbp=fffff8a005e1fcf0
r8=0000000000000001 r9=0000000000000000 r10=fffff8a005e1fcf0
r11=00000000001f0001 r12=0000000000000000 r13=0000000000000001
r14=0000000001a4f550 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!AuthzBasepRemoveSecurityAttributeFromLists+0x31:
fffff800`040317f1 f6423801 test byte ptr [rdx+38h],1 ds:002b:fffef8a0`05e1fd30=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: wmpnetwk.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003feb8c3 to fffff800040317f1
STACK_TEXT:
fffff880`08bcaac8 fffff800`03feb8c3 : fffff8a0`05e849e0 fffff800`03def2dd fffffa80`066a0a20 00000000`00000000 : nt!AuthzBasepRemoveSecurityAttributeFromLists+0x31
fffff880`08bcaad0 fffff800`03cbf8b4 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`066a0a20 : nt! ?? ::NNGAKEGL::`string'+0x101c5
fffff880`08bcab00 fffff800`03fa569e : 00000000`00000000 fffff8a0`05d1bd40 fffff8a0`05d1bd20 00000000`00000001 : nt!ObfDereferenceObject+0xd4
fffff880`08bcab60 fffff800`03fb9d68 : fffff8a0`05d1bd20 00000000`00000001 fffffa80`06e5e910 00000000`ffffffff : nt!AlpcpSecurityDestroyProcedure+0x10e
fffff880`08bcab90 fffff800`03f55cfd : fffff8a0`05d1bd40 fffffa80`06e5e910 fffffa80`06e5e910 00000000`00000000 : nt!AlpcpDestroyBlob+0x28
fffff880`08bcabc0 fffff800`03cb9993 : fffffa80`06c7fb60 fffff880`08bcaca0 00000000`01a4f660 fffffa80`06e5e910 : nt!NtAlpcDeleteSecurityContext+0xdd
fffff880`08bcac20 00000000`779afe8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01a4f4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779afe8a
FOLLOWUP_IP:
nt!AuthzBasepRemoveSecurityAttributeFromLists+31
fffff800`040317f1 f6423801 test byte ptr [rdx+38h],1
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!AuthzBasepRemoveSecurityAttributeFromLists+31
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff88008bca0f0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!AuthzBasepRemoveSecurityAttributeFromLists+31
BUCKET_ID: X64_0x3B_nt!AuthzBasepRemoveSecurityAttributeFromLists+31
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031311-45645-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03811000 PsLoadedModuleList = 0xfffff800`03a4ee50
Debug session time: Sun Mar 13 11:23:55.216 2011 (UTC - 4:00)
System Uptime: 0 days 0:17:09.668
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
...................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88001050e99, fffff880097bab60, 0}
Probably caused by : Npfs.SYS ( Npfs!NpCreateClientEnd+45d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88001050e99, Address of the instruction which caused the bugcheck
Arg3: fffff880097bab60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
Npfs!NpCreateClientEnd+45d
fffff880`01050e99 488b01 mov rax,qword ptr [rcx]
CONTEXT: fffff880097bab60 -- (.cxr 0xfffff880097bab60)
rax=fffff8a001188a08 rbx=0000000000000001 rcx=fffefa800b2c9d68
rdx=fffff8a002ca6cf8 rsi=fffff8a002ca6c50 rdi=fffff880097bb700
rip=fffff88001050e99 rsp=fffff880097bb530 rbp=0000000000000004
r8=fffff880097bb690 r9=0000000000000000 r10=fffff800039fd480
r11=fffff8a00314e188 r12=0000000000000000 r13=0000000000000000
r14=fffffa800ad59340 r15=fffff8a0011889a0
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
Npfs!NpCreateClientEnd+0x45d:
fffff880`01050e99 488b01 mov rax,qword ptr [rcx] ds:002b:fffefa80`0b2c9d68=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: wmpnetwk.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88001050e99
STACK_TEXT:
fffff880`097bb530 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Npfs!NpCreateClientEnd+0x45d
FOLLOWUP_IP:
Npfs!NpCreateClientEnd+45d
fffff880`01050e99 488b01 mov rax,qword ptr [rcx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Npfs!NpCreateClientEnd+45d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc114
STACK_COMMAND: .cxr 0xfffff880097bab60 ; kb
FAILURE_BUCKET_ID: X64_0x3B_Npfs!NpCreateClientEnd+45d
BUCKET_ID: X64_0x3B_Npfs!NpCreateClientEnd+45d
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032011-33056-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03c1e000 PsLoadedModuleList = 0xfffff800`03e5be50
Debug session time: Sun Mar 20 05:00:31.949 2011 (UTC - 4:00)
System Uptime: 0 days 0:25:03.379
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88009eec8d8, fffff88009eec140, fffff880012b9660}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonClose+1a0 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88009eec8d8
Arg3: fffff88009eec140
Arg4: fffff880012b9660
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88009eec8d8 -- (.exr 0xfffff88009eec8d8)
ExceptionAddress: fffff880012b9660 (Ntfs!NtfsCommonClose+0x00000000000001a0)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88009eec140 -- (.cxr 0xfffff88009eec140)
rax=fffef8a00c4c6990 rbx=fffffa80085aec40 rcx=fffffa80085aec88
rdx=fffff8a00c4c67a0 rsi=fffff8a00c4c6670 rdi=fffff88009eecc38
rip=fffff880012b9660 rsp=fffff88009eecb10 rbp=fffff80003e335a0
r8=0000000000000000 r9=0000000000000009 r10=0000000000000004
r11=fffffa80081c78b0 r12=fffffa80081c7180 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsCommonClose+0x1a0:
fffff880`012b9660 f6400804 test byte ptr [rax+8],4 ds:002b:fffef8a0`0c4c6998=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ec60e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsCommonClose+1a0
fffff880`012b9660 f6400804 test byte ptr [rax+8],4
FAULTING_IP:
Ntfs!NtfsCommonClose+1a0
fffff880`012b9660 f6400804 test byte ptr [rax+8],4
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff8800129338f to fffff880012b9660
STACK_TEXT:
fffff880`09eecb10 fffff880`0129338f : fffffa80`085aec40 fffff8a0`0c4c67a0 fffff8a0`0c4c6670 fffffa80`081c7180 : Ntfs!NtfsCommonClose+0x1a0
fffff880`09eecbe0 fffff800`03c9b961 : 00000000`00000000 fffff880`01892500 fffffa80`0ae85f01 fffffa80`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`09eeccb0 fffff800`03f317c6 : 00000000`1167b07b fffffa80`0b85a660 00000000`00000080 fffffa80`067215f0 : nt!ExpWorkerThread+0x111
fffff880`09eecd40 fffff800`03c6cc26 : fffff880`02fd5180 fffffa80`0b85a660 fffffa80`06741b60 fffff880`0121d534 : nt!PspSystemThreadStartup+0x5a
fffff880`09eecd80 00000000`00000000 : fffff880`09eed000 fffff880`09ee7000 fffff880`09eec700 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsCommonClose+1a0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88009eec140 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+1a0
BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+1a0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032011-30076-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03c0a000 PsLoadedModuleList = 0xfffff800`03e47e50
Debug session time: Sun Mar 20 05:21:33.097 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:48.158
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c000001d, fffff96000149d9d, fffff8800602d510, 0}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff96000149d9d, Address of the instruction which caused the bugcheck
Arg3: fffff8800602d510, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
win32k!xxxCreateWindowSmIcon+7d
fffff960`00149d9d 4c ???
CONTEXT: fffff8800602d510 -- (.cxr 0xfffff8800602d510)
rax=fffff900c0581414 rbx=0000000000000000 rcx=fffff900c0580a70
rdx=00000000fffffffe rsi=fffff900c0c08670 rdi=0000000000000000
rip=fffff96000149d9d rsp=fffff8800602dee0 rbp=fffff900c00e3b40
r8=fffff900c0581290 r9=0000000000004000 r10=0000000000000003
r11=0000000000000003 r12=0000000000000001 r13=0000000000000005
r14=0000000000000000 r15=0000000000010027
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!xxxCreateWindowSmIcon+0x7d:
fffff960`00149d9d 4c ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: AsLoader.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff96000149cd0 to fffff96000149d9d
STACK_TEXT:
fffff880`0602dee0 fffff960`00149cd0 : 00000000`00000000 fffff900`c0c08670 00000000`00000001 00000000`00000000 : win32k!xxxCreateWindowSmIcon+0x7d
fffff880`0602df20 fffff960`00179e34 : 00000000`00000002 fffff900`c0c08670 00000000`00000001 00000000`00000000 : win32k!xxxDWP_SetIcon+0x1a0
fffff880`0602df70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxRealDefWindowProc+0xa7c
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
fffff96000149d9e - win32k!xxxCreateWindowSmIcon+7e
[ 0f:0e ]
1 error : !win32k (fffff96000149d9e)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffff8800602d510 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------