Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Minidump\081715-6406-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 9600.17736.amd64fre.winblue_r9.150322-1500 Machine Name: Kernel base = 0xfffff802`c7405000 PsLoadedModuleList = 0xfffff802`c76de850 Debug session time: Mon Aug 17 10:45:54.296 2015 (UTC + 2:00) System Uptime: 2 days 21:38:26.923 Loading Kernel Symbols ............................................................... ................................................................ .................................. Loading User Symbols Loading unloaded module list .................................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff802c7a01f71, ffffd00021e9d6d0, 0} Probably caused by : memory_corruption ( nt!MiCloneNoChange+d ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff802c7a01f71, Address of the instruction which caused the bugcheck Arg3: ffffd00021e9d6d0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo FAULTING_IP: nt!MiCloneNoChange+d fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 CONTEXT: ffffd00021e9d6d0 -- (.cxr 0xffffd00021e9d6d0;r) rax=7645655202030008 rbx=0000000000000000 rcx=ffffe0005cc50430 rdx=ffffe0005d1b2230 rsi=ffffe0005cc50430 rdi=ffffe0005d1b2230 rip=fffff802c7a01f71 rsp=ffffd00021e9e100 rbp=ffffd00021e9e219 r8=0000000000000000 r9=ffffe0005d6008c0 r10=ffffe0005d1b2230 r11=7ffffffffffffffc r12=ffffe0005d6ee4e0 r13=0000000000000000 r14=ffffe0005cbd2130 r15=ffffe000563fc8c0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202 nt!MiCloneNoChange+0xd: fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 ds:002b:76456552`02030010=???????? Last set context: rax=7645655202030008 rbx=0000000000000000 rcx=ffffe0005cc50430 rdx=ffffe0005d1b2230 rsi=ffffe0005cc50430 rdi=ffffe0005d1b2230 rip=fffff802c7a01f71 rsp=ffffd00021e9e100 rbp=ffffd00021e9e219 r8=0000000000000000 r9=ffffe0005d6008c0 r10=ffffe0005d1b2230 r11=7ffffffffffffffc r12=ffffe0005d6ee4e0 r13=0000000000000000 r14=ffffe0005cbd2130 r15=ffffe000563fc8c0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202 nt!MiCloneNoChange+0xd: fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 ds:002b:76456552`02030010=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: SCNotification CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff802c7a07591 to fffff802c7a01f71 STACK_TEXT: ffffd000`21e9e100 fffff802`c7a07591 : 00000000`6c646156 00000000`00000000 ffffe000`5d6008c0 ffffe000`00000000 : nt!MiCloneNoChange+0xd ffffd000`21e9e140 fffff802`c796518f : ffffe000`5d6008c0 ffffd000`21e9e359 ffffe000`5d6008c0 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x3f1 ffffd000`21e9e280 fffff802`c78b053a : 00000000`00000320 00000000`00000320 ffffd000`21e9eb80 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x352df ffffd000`21e9e3c0 fffff802`c791bfa2 : 00000000`00000000 000fcc00`00000080 ffffe000`557e73a0 00000000`00000001 : nt!PspAllocateProcess+0x11a6 ffffd000`21e9e790 fffff802`c7a1731a : 00000000`00abfdb0 00000000`00000000 ffffe000`5678d080 00000000`00abe248 : nt!PspCreateProcess+0x19a ffffd000`21e9ea40 fffff802`c75614b3 : fffff6fb`7dbed000 fffff6fb`7da00008 fffff6fb`40001dc8 fffff680`003b9c28 : nt!NtCreateProcessEx+0x76 ffffd000`21e9ea90 00007fff`a35b169a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`00abe1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a35b169a FOLLOWUP_IP: nt!MiCloneNoChange+d fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiCloneNoChange+d FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 550f41a6 IMAGE_VERSION: 6.3.9600.17736 STACK_COMMAND: .cxr 0xffffd00021e9d6d0 ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: d FAILURE_BUCKET_ID: 0x3B_nt!MiCloneNoChange BUCKET_ID: 0x3B_nt!MiCloneNoChange ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_nt!miclonenochange FAILURE_ID_HASH: {e684c6a9-32ce-50a3-9b00-a58da87efbc6} Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff802c7a01f71, Address of the instruction which caused the bugcheck Arg3: ffffd00021e9d6d0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo FAULTING_IP: nt!MiCloneNoChange+d fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 CONTEXT: ffffd00021e9d6d0 -- (.cxr 0xffffd00021e9d6d0;r) rax=7645655202030008 rbx=0000000000000000 rcx=ffffe0005cc50430 rdx=ffffe0005d1b2230 rsi=ffffe0005cc50430 rdi=ffffe0005d1b2230 rip=fffff802c7a01f71 rsp=ffffd00021e9e100 rbp=ffffd00021e9e219 r8=0000000000000000 r9=ffffe0005d6008c0 r10=ffffe0005d1b2230 r11=7ffffffffffffffc r12=ffffe0005d6ee4e0 r13=0000000000000000 r14=ffffe0005cbd2130 r15=ffffe000563fc8c0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202 nt!MiCloneNoChange+0xd: fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 ds:002b:76456552`02030010=???????? Last set context: rax=7645655202030008 rbx=0000000000000000 rcx=ffffe0005cc50430 rdx=ffffe0005d1b2230 rsi=ffffe0005cc50430 rdi=ffffe0005d1b2230 rip=fffff802c7a01f71 rsp=ffffd00021e9e100 rbp=ffffd00021e9e219 r8=0000000000000000 r9=ffffe0005d6008c0 r10=ffffe0005d1b2230 r11=7ffffffffffffffc r12=ffffe0005d6ee4e0 r13=0000000000000000 r14=ffffe0005cbd2130 r15=ffffe000563fc8c0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202 nt!MiCloneNoChange+0xd: fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 ds:002b:76456552`02030010=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: SCNotification CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff802c7a07591 to fffff802c7a01f71 STACK_TEXT: ffffd000`21e9e100 fffff802`c7a07591 : 00000000`6c646156 00000000`00000000 ffffe000`5d6008c0 ffffe000`00000000 : nt!MiCloneNoChange+0xd ffffd000`21e9e140 fffff802`c796518f : ffffe000`5d6008c0 ffffd000`21e9e359 ffffe000`5d6008c0 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x3f1 ffffd000`21e9e280 fffff802`c78b053a : 00000000`00000320 00000000`00000320 ffffd000`21e9eb80 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x352df ffffd000`21e9e3c0 fffff802`c791bfa2 : 00000000`00000000 000fcc00`00000080 ffffe000`557e73a0 00000000`00000001 : nt!PspAllocateProcess+0x11a6 ffffd000`21e9e790 fffff802`c7a1731a : 00000000`00abfdb0 00000000`00000000 ffffe000`5678d080 00000000`00abe248 : nt!PspCreateProcess+0x19a ffffd000`21e9ea40 fffff802`c75614b3 : fffff6fb`7dbed000 fffff6fb`7da00008 fffff6fb`40001dc8 fffff680`003b9c28 : nt!NtCreateProcessEx+0x76 ffffd000`21e9ea90 00007fff`a35b169a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`00abe1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a35b169a FOLLOWUP_IP: nt!MiCloneNoChange+d fffff802`c7a01f71 83780802 cmp dword ptr [rax+8],2 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiCloneNoChange+d FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 550f41a6 IMAGE_VERSION: 6.3.9600.17736 STACK_COMMAND: .cxr 0xffffd00021e9d6d0 ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: d FAILURE_BUCKET_ID: 0x3B_nt!MiCloneNoChange BUCKET_ID: 0x3B_nt!MiCloneNoChange ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_nt!miclonenochange FAILURE_ID_HASH: {e684c6a9-32ce-50a3-9b00-a58da87efbc6} Followup: MachineOwner ---------