Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Minidump\081715-6078-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 9600.17936.amd64fre.winblue_ltsb.150715-0840 Machine Name: Kernel base = 0xfffff800`3f811000 PsLoadedModuleList = 0xfffff800`3fae67b0 Debug session time: Mon Aug 17 15:23:22.526 2015 (UTC + 2:00) System Uptime: 0 days 1:12:59.842 Loading Kernel Symbols ............................................................... ................................................................ ................................. Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8003fe095a5, ffffd0003a1e26d0, 0} Probably caused by : memory_corruption ( nt!MiCloneNoChange+d ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8003fe095a5, Address of the instruction which caused the bugcheck Arg3: ffffd0003a1e26d0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo FAULTING_IP: nt!MiCloneNoChange+d fffff800`3fe095a5 83780802 cmp dword ptr [rax+8],2 CONTEXT: ffffd0003a1e26d0 -- (.cxr 0xffffd0003a1e26d0;r) rax=0000000000000001 rbx=0000000000000000 rcx=ffffe001f8d4cbc0 rdx=ffffe001ff9481d0 rsi=ffffe001f8d4cbc0 rdi=ffffe001ff9481d0 rip=fffff8003fe095a5 rsp=ffffd0003a1e3100 rbp=ffffd0003a1e3219 r8=0000000000000000 r9=ffffe001f917a080 r10=ffffe001ff9481d0 r11=7ffffffffffffffc r12=ffffe001ff948010 r13=0000000000000000 r14=ffffe001fed0f970 r15=ffffe001fdfd18c0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiCloneNoChange+0xd: fffff800`3fe095a5 83780802 cmp dword ptr [rax+8],2 ds:002b:00000000`00000009=???????? Last set context: rax=0000000000000001 rbx=0000000000000000 rcx=ffffe001f8d4cbc0 rdx=ffffe001ff9481d0 rsi=ffffe001f8d4cbc0 rdi=ffffe001ff9481d0 rip=fffff8003fe095a5 rsp=ffffd0003a1e3100 rbp=ffffd0003a1e3219 r8=0000000000000000 r9=ffffe001f917a080 r10=ffffe001ff9481d0 r11=7ffffffffffffffc r12=ffffe001ff948010 r13=0000000000000000 r14=ffffe001fed0f970 r15=ffffe001fdfd18c0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!MiCloneNoChange+0xd: fffff800`3fe095a5 83780802 cmp dword ptr [rax+8],2 ds:002b:00000000`00000009=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff8003fe0ebc5 to fffff8003fe095a5 STACK_TEXT: ffffd000`3a1e3100 fffff800`3fe0ebc5 : 00000000`6c646156 00000000`00000000 ffffe001`f917a080 ffffe001`00000000 : nt!MiCloneNoChange+0xd ffffd000`3a1e3140 fffff800`3fd73199 : ffffe001`f917a080 ffffd000`3a1e3359 ffffe001`f917a080 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x3f1 ffffd000`3a1e3280 fffff800`3fcb7fca : 00000000`000002a0 00000000`000002a0 ffffd000`3a1e3b80 00000000`00000009 : nt! ?? ::NNGAKEGL::`string'+0x3b479 ffffd000`3a1e33c0 fffff800`3fd23e32 : 00000000`00000000 ffffd000`00000080 ffffe001`f86777d0 00000000`00000001 : nt!PspAllocateProcess+0x11a6 ffffd000`3a1e3790 fffff800`3fe1eb62 : 00000000`000009b7 fffff800`3fc3bd03 ffffe001`f9203080 00000000`0c3edbc8 : nt!PspCreateProcess+0x19a ffffd000`3a1e3a40 fffff800`3f96c1b3 : ffffffff`fffffffe ffffe001`f9203080 00000000`0c3ede78 fffff800`3fbb095e : nt!NtCreateProcessEx+0x76 ffffd000`3a1e3a90 00007ffa`240c16aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0c3edeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`240c16aa FOLLOWUP_IP: nt!MiCloneNoChange+d fffff800`3fe095a5 83780802 cmp dword ptr [rax+8],2 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiCloneNoChange+d FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 55a68c66 IMAGE_VERSION: 6.3.9600.17936 STACK_COMMAND: .cxr 0xffffd0003a1e26d0 ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: d FAILURE_BUCKET_ID: 0x3B_nt!MiCloneNoChange BUCKET_ID: 0x3B_nt!MiCloneNoChange ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_nt!miclonenochange FAILURE_ID_HASH: {e684c6a9-32ce-50a3-9b00-a58da87efbc6} Followup: MachineOwner ---------