Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\111617-13369-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols\*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.23915.amd64fre.win7sp1_ldr.170913-0600 Machine Name: Kernel base = 0xfffff800`0e452000 PsLoadedModuleList = 0xfffff800`0e694750 Debug session time: Thu Nov 16 11:11:53.802 2017 (UTC + 1:00) System Uptime: 0 days 0:00:07.160 Loading Kernel Symbols ............................................................... ................... Loading User Symbols Loading unloaded module list . ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8000e4c87ed, fffff880041ddc70, 0} Probably caused by : memory_corruption Followup: memory_corruption --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8000e4c87ed, Address of the instruction which caused the bugcheck Arg3: fffff880041ddc70, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo FAULTING_IP: nt!KeFlushMultipleRangeTb+1ad fffff800`0e4c87ed a34c8d1dfb9d00004d mov dword ptr [4D00009DFB1D8D4Ch],eax CONTEXT: fffff880041ddc70 -- (.cxr 0xfffff880041ddc70) rax=0101010101010101 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000001 rsi=fffff880041de748 rdi=fffff880033b4180 rip=fffff8000e4c87ed rsp=fffff880041de640 rbp=0000000000000000 r8=0000000000000004 r9=0000000000000000 r10=fffff880041de690 r11=33333333333372d0 r12=0000000000000000 r13=0000000000000001 r14=5555555555555555 r15=0f0f0f0f0f0f0f0f iopl=0 nv up ei pl nz na pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010203 nt!KeFlushMultipleRangeTb+0x1ad: fffff800`0e4c87ed a34c8d1dfb9d00004d mov dword ptr [4D00009DFB1D8D4Ch],eax ds:002b:4d00009d`fb1d8d4c=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x3B PROCESS_NAME: smss.exe CURRENT_IRQL: c LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000e4c87ed STACK_TEXT: fffff880`041de640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeFlushMultipleRangeTb+0x1ad CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8000e4c87ea - nt!KeFlushMultipleRangeTb+1aa [ 3b:bb ] 1 error : !nt (fffff8000e4c87ea) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .cxr 0xfffff880041ddc70 ; kb FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT Followup: memory_corruption ---------