Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`03c64000 PsLoadedModuleList = 0xfffff800`03ea1e50
Debug session time: Mon Jun 8 11:47:10.663 2015 (UTC - 4:00)
System Uptime: 0 days 2:58:39.959
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c61fffc0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff9600019392e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003f0c0e0
GetUlongFromAddress: unable to read from fffff80003f0c198
fffff900c61fffc0
FAULTING_IP:
win32k!memmove+25e
fffff960`0019392e 48894118 mov qword ptr [rcx+18h],rax
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: LogonUI.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800cdb8b30 -- (.trap 0xfffff8800cdb8b30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ff043a7aff043a7a rbx=0000000000000000 rcx=fffff900c61fffa8
rdx=000006ff3f14debc rsi=0000000000000000 rdi=0000000000000000
rip=fffff9600019392e rsp=fffff8800cdb8cc8 rbp=fffff8800cdb8da0
r8=0000000000000270 r9=0000000000000013 r10=ff043a7aff06397a
r11=fffff900c61ffd58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32k!memmove+0x25e:
fffff960`0019392e 48894118 mov qword ptr [rcx+18h],rax ds:fffff900`c61fffc0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003d551e4 to fffff80003cd5f00
STACK_TEXT:
fffff880`0cdb89c8 fffff800`03d551e4 : 00000000`00000050 fffff900`c61fffc0 00000000`00000001 fffff880`0cdb8b30 : nt!KeBugCheckEx
fffff880`0cdb89d0 fffff800`03cd3fee : 00000000`00000001 00000000`0534dc14 fffff6fc`80634f00 fffff880`093fdc00 : nt! ?? ::FNODOBFM::`string'+0x42907
fffff880`0cdb8b30 fffff960`0019392e : fffff960`0015b681 ffff0800`00000011 fffff800`03ca395b fffff880`0cdb8da0 : nt!KiPageFault+0x16e
fffff880`0cdb8cc8 fffff960`0015b681 : ffff0800`00000011 fffff800`03ca395b fffff880`0cdb8da0 00000000`00000000 : win32k!memmove+0x25e
fffff880`0cdb8cd0 fffff960`001557f8 : 00000000`00000001 fffff900`c2d8c2f0 00000000`00000000 fffff880`0cdb93d0 : win32k!vSrcCopyS32D32Identity+0x71
fffff880`0cdb8d00 fffff960`00105449 : fffff900`c2d8c308 fffff900`c2edb6a8 fffff880`0cdb9668 fffff900`c2119270 : win32k!EngCopyBits+0x908
fffff880`0cdb9010 fffff960`007eaed7 : fffff900`c2edb690 fffff900`c2edb6a8 00000000`00000000 fffff880`0cdb9400 : win32k!EngBitBlt+0x3b9
fffff880`0cdb9110 fffff960`007eb008 : 00000000`00000000 fffff960`00000001 00000000`00000000 fffff880`0cdb9668 : cdd!DrvBitBlt+0x1057
fffff880`0cdb9330 fffff960`0032c07b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : cdd!DrvCopyBits+0x44
fffff880`0cdb93a0 fffff960`00271544 : 00000005`00000005 00000000`00000000 00000000`0000cccc 00000000`00000000 : win32k!OffCopyBits+0xc7
fffff880`0cdb9400 fffff960`002719d8 : fffff900`c07f4ce8 00000000`00000000 00000000`00000000 fffff880`0cdb9668 : win32k!SpBitBlt+0x418
fffff880`0cdb97f0 fffff960`002c3994 : 00000000`00000000 fffff900`c0774470 fffff900`c0000de0 fffff900`c0774470 : win32k!SpCopyBits+0x44
fffff880`0cdb9860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtGdiBitBltInternal+0xc94
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!DrvBitBlt+1057
fffff960`007eaed7 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: cdd!DrvBitBlt+1057
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bde94
FAILURE_BUCKET_ID: X64_0x50_cdd!DrvBitBlt+1057
BUCKET_ID: X64_0x50_cdd!DrvBitBlt+1057
Followup: MachineOwner