Guest User

mini dump when playing wow idle.=

a guest
Oct 15th, 2019
94
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.22 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\101519-7203-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9.  
  10. ************* Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred srv*
  13. Symbol search path is: srv*
  14. Executable search path is:
  15. Windows 10 Kernel Version 18362 MP (12 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Machine Name:
  18. Kernel base = 0xfffff800`48800000 PsLoadedModuleList = 0xfffff800`48c48210
  19. Debug session time: Tue Oct 15 16:21:35.565 2019 (UTC - 6:00)
  20. System Uptime: 0 days 0:47:18.310
  21. Loading Kernel Symbols
  22. ..
  23.  
  24. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  25. Run !sym noisy before .reload to track down problems loading symbols.
  26.  
  27. .............................................................
  28. ................................................................
  29. ................................................................
  30. .................
  31. Loading User Symbols
  32. Loading unloaded module list
  33. ..........
  34. For analysis of this file, run !analyze -v
  35. nt!KeBugCheckEx:
  36. fffff800`489c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff848e`49415df0=000000000000003b
  37. 8: kd> !analyze -v
  38. *******************************************************************************
  39. * *
  40. * Bugcheck Analysis *
  41. * *
  42. *******************************************************************************
  43.  
  44. SYSTEM_SERVICE_EXCEPTION (3b)
  45. An exception happened while executing a system service routine.
  46. Arguments:
  47. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  48. Arg2: fffff8005de5baa6, Address of the instruction which caused the bugcheck
  49. Arg3: ffff848e49416720, Address of the context record for the exception that caused the bugcheck
  50. Arg4: 0000000000000000, zero.
  51.  
  52. Debugging Details:
  53. ------------------
  54.  
  55.  
  56. KEY_VALUES_STRING: 1
  57.  
  58. Key : Analysis.CPU.Sec
  59. Value: 2
  60.  
  61. Key : Analysis.DebugAnalysisProvider.CPP
  62. Value: Create: 8007007e on DESKTOP-1CBU1CD
  63.  
  64. Key : Analysis.DebugData
  65. Value: CreateObject
  66.  
  67. Key : Analysis.DebugModel
  68. Value: CreateObject
  69.  
  70. Key : Analysis.Elapsed.Sec
  71. Value: 4
  72.  
  73. Key : Analysis.Memory.CommitPeak.Mb
  74. Value: 78
  75.  
  76. Key : Analysis.System
  77. Value: CreateObject
  78.  
  79.  
  80. DUMP_FILE_ATTRIBUTES: 0x8
  81. Kernel Generated Triage Dump
  82.  
  83. BUGCHECK_CODE: 3b
  84.  
  85. BUGCHECK_P1: c0000005
  86.  
  87. BUGCHECK_P2: fffff8005de5baa6
  88.  
  89. BUGCHECK_P3: ffff848e49416720
  90.  
  91. BUGCHECK_P4: 0
  92.  
  93. CONTEXT: ffff848e49416720 -- (.cxr 0xffff848e49416720)
  94. rax=0000000000000000 rbx=ffff9e88961f5080 rcx=e925b84a64500000
  95. rdx=ffffdc0bde5eb3a8 rsi=000001b6950a6740 rdi=0000000000000001
  96. rip=fffff8005de5baa6 rsp=ffff848e49417110 rbp=ffff848e49417a80
  97. r8=ffff848e494170e8 r9=00000000ffffffff r10=fffff80048838fa0
  98. r11=ffff848e494179e0 r12=0000000000002cd0 r13=000001b694f97220
  99. r14=ffffdc0bde5eb370 r15=00000000c000007b
  100. iopl=0 nv up ei pl zr na po nc
  101. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
  102. dxgkrnl!NtNotifyPresentToCompositionSurface+0x2e6:
  103. fffff800`5de5baa6 38498b cmp byte ptr [rcx-75h],cl ds:002b:e925b84a`644fff8b=??
  104. Resetting default scope
  105.  
  106. CUSTOMER_CRASH_COUNT: 1
  107.  
  108. PROCESS_NAME: Wow.exe
  109.  
  110. STACK_TEXT:
  111. ffff848e`49417110 fffff800`489d2b15 : ffff9e88`961f5080 ffff9e88`961f5080 000001b6`950a6740 00000000`00000020 : dxgkrnl!NtNotifyPresentToCompositionSurface+0x2e6
  112. ffff848e`49417a00 00007ffd`b3e877c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  113. 0000000e`b9f9d958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b3e877c4
  114.  
  115.  
  116. CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgkrnl
  117. 10 errors : !dxgkrnl (fffff8005de5b9a4-fffff8005de5bafc)
  118. fffff8005de5b9a0 00 c0 4c 8b *de 24 38 48 8b 7c 24 50 *25 8b 64 24 ..L..$8H.|$P%.d$
  119. fffff8005de5b9b0 40 eb 06 41 *fe 0d 00 00 c0 4c 8b 15 14 16 06 00 @..A.....L......
  120. ...
  121. fffff8005de5baa0 8b 73 30 49 *b7 7b 38 49 8b e3 41 5f *8f 5e 41 5c .s0I.{8I..A_.^A\
  122. fffff8005de5bab0 c3 cc cc cc *f8 cc cc cc cc cc cc cc fc cc cc cc ................
  123. ...
  124. fffff8005de5bae0 5c 24 20 49 *7c 5b b0 33 f6 49 89 73 *02 49 21 5b \$ I|[.3.I.s.I![
  125. fffff8005de5baf0 c0 33 c0 49 *aa 43 d0 49 89 43 d8 49 *92 43 e0 48 .3.I.C.I.C.I.C.H
  126.  
  127. MODULE_NAME: memory_corruption
  128.  
  129. IMAGE_NAME: memory_corruption
  130.  
  131. MEMORY_CORRUPTOR: STRIDE
  132.  
  133. STACK_COMMAND: .cxr 0xffff848e49416720 ; kb
  134.  
  135. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
  136.  
  137. OSPLATFORM_TYPE: x64
  138.  
  139. OSNAME: Windows 10
  140.  
  141. FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
  142.  
  143. Followup: memory_corruption
  144. ---------
  145.  
  146. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  147. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  148. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  149. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  150. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  151. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  152. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  153. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  154. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  155. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  156. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  157.  
  158. Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
  159. Copyright (c) Microsoft Corporation. All rights reserved.
  160.  
  161.  
  162. Loading Dump File [C:\Windows\Minidump\090919-8046-01.dmp]
  163. Could not open dump file [C:\Windows\Minidump\090919-8046-01.dmp], Win32 error 0n2
  164. "The system cannot find the file specified."
  165.  
  166. Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
  167. Copyright (c) Microsoft Corporation. All rights reserved.
  168.  
  169.  
  170. Loading Dump File [C:\Windows\Minidump\101419-11156-01.dmp]
  171. Mini Kernel Dump File: Only registers and stack trace are available
  172.  
  173.  
  174. ************* Path validation summary **************
  175. Response Time (ms) Location
  176. Deferred srv*
  177. Symbol search path is: srv*
  178. Executable search path is:
  179. Windows 10 Kernel Version 18362 MP (12 procs) Free x64
  180. Product: WinNt, suite: TerminalServer SingleUserTS
  181. Machine Name:
  182. Kernel base = 0xfffff807`0e600000 PsLoadedModuleList = 0xfffff807`0ea48210
  183. Debug session time: Mon Oct 14 15:38:36.820 2019 (UTC - 6:00)
  184. System Uptime: 0 days 0:12:21.564
  185. Loading Kernel Symbols
  186. ...............................................................
  187. ................................................................
  188. ................................................................
  189. .................
  190. Loading User Symbols
  191. Loading unloaded module list
  192. .........
  193. For analysis of this file, run !analyze -v
  194. nt!KeBugCheckEx:
  195. fffff807`0e7c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffcd87`0b337420=0000000000000050
  196. 3: kd> !analyze -v
  197. *******************************************************************************
  198. * *
  199. * Bugcheck Analysis *
  200. * *
  201. *******************************************************************************
  202.  
  203. PAGE_FAULT_IN_NONPAGED_AREA (50)
  204. Invalid system memory was referenced. This cannot be protected by try-except.
  205. Typically the address is just plain bad or it is pointing at freed memory.
  206. Arguments:
  207. Arg1: fffff8c325e44d60, memory referenced.
  208. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
  209. Arg3: fffff8c325e44d60, If non-zero, the instruction address which referenced the bad memory
  210. address.
  211. Arg4: 0000000000000002, (reserved)
  212.  
  213. Debugging Details:
  214. ------------------
  215.  
  216.  
  217. Could not read faulting driver name
  218.  
  219. KEY_VALUES_STRING: 1
  220.  
  221. Key : Analysis.CPU.Sec
  222. Value: 1
  223.  
  224. Key : Analysis.DebugAnalysisProvider.CPP
  225. Value: Create: 8007007e on DESKTOP-1CBU1CD
  226.  
  227. Key : Analysis.DebugData
  228. Value: CreateObject
  229.  
  230. Key : Analysis.DebugModel
  231. Value: CreateObject
  232.  
  233. Key : Analysis.Elapsed.Sec
  234. Value: 1
  235.  
  236. Key : Analysis.Memory.CommitPeak.Mb
  237. Value: 78
  238.  
  239. Key : Analysis.System
  240. Value: CreateObject
  241.  
  242.  
  243. DUMP_FILE_ATTRIBUTES: 0x8
  244. Kernel Generated Triage Dump
  245.  
  246. BUGCHECK_CODE: 50
  247.  
  248. BUGCHECK_P1: fffff8c325e44d60
  249.  
  250. BUGCHECK_P2: 10
  251.  
  252. BUGCHECK_P3: fffff8c325e44d60
  253.  
  254. BUGCHECK_P4: 2
  255.  
  256. READ_ADDRESS: fffff8070eb733b8: Unable to get MiVisibleState
  257. Unable to get NonPagedPoolStart
  258. Unable to get NonPagedPoolEnd
  259. Unable to get PagedPoolStart
  260. Unable to get PagedPoolEnd
  261. fffff8070ea2a3c8: Unable to get Flags value from nt!KdVersionBlock
  262. fffff8070ea2a3c8: Unable to get Flags value from nt!KdVersionBlock
  263. unable to get nt!MmSpecialPagesInUse
  264. fffff8c325e44d60
  265.  
  266. MM_INTERNAL_CODE: 2
  267.  
  268. CUSTOMER_CRASH_COUNT: 1
  269.  
  270. PROCESS_NAME: dwm.exe
  271.  
  272. TRAP_FRAME: ffffcd870b3376c0 -- (.trap 0xffffcd870b3376c0)
  273. NOTE: The trap frame does not contain all registers.
  274. Some register values may be zeroed or incorrect.
  275. rax=fffff8c325e44d60 rbx=0000000000000000 rcx=ffffe081d22f6a40
  276. rdx=ffffe081c81ea8a8 rsi=0000000000000000 rdi=0000000000000000
  277. rip=fffff8c325e44d60 rsp=ffffcd870b337858 rbp=ffffcd870b3378d8
  278. r8=ffffcd870b337838 r9=00000000ffffffff r10=7ffffffffffffffc
  279. r11=ffffd002aa26a080 r12=0000000000000000 r13=0000000000000000
  280. r14=0000000000000000 r15=0000000000000000
  281. iopl=0 nv up ei pl zr na po nc
  282. fffff8c3`25e44d60 ?? ???
  283. Resetting default scope
  284.  
  285. FAILED_INSTRUCTION_ADDRESS:
  286. +0
  287. fffff8c3`25e44d60 ?? ???
  288.  
  289. STACK_TEXT:
  290. ffffcd87`0b337418 fffff807`0e7e33d6 : 00000000`00000050 fffff8c3`25e44d60 00000000`00000010 ffffcd87`0b3376c0 : nt!KeBugCheckEx
  291. ffffcd87`0b337420 fffff807`0e672edf : ffffe081`d22ed000 00000000`00000010 00000000`00000000 fffff8c3`25e44d60 : nt!MiSystemFault+0x1d66a6
  292. ffffcd87`0b337520 fffff807`0e7cf320 : 00000000`0000057b 00000000`000000d0 ffffcd87`0b3379a8 00000000`00000064 : nt!MmAccessFault+0x34f
  293. ffffcd87`0b3376c0 fffff8c3`25e44d60 : ffff893c`eadf84cb 00000000`00000000 ffff8956`c0608ed0 00000000`00000001 : nt!KiPageFault+0x360
  294. ffffcd87`0b337858 ffff893c`eadf84cb : 00000000`00000000 ffff8956`c0608ed0 00000000`00000001 00000000`00000000 : 0xfffff8c3`25e44d60
  295. ffffcd87`0b337860 ffff893c`eadf8226 : ffffcd87`0b337a80 ffffcd87`0b3379a8 ffffcd87`0b337958 ffffe081`d22f6a40 : win32kbase!DirectComposition::CConnection::BeginFrame+0x1fb
  296. ffffcd87`0b337920 fffff807`0e7d2b15 : 00000000`000001fc ffffd002`aa26a080 00000000`000003e8 000001fe`83a9d420 : win32kbase!NtDCompositionBeginFrame+0x196
  297. ffffcd87`0b337a00 00007ffe`82f13404 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  298. 000000e1`44a9f538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`82f13404
  299.  
  300.  
  301. SYMBOL_NAME: win32kbase!DirectComposition::CConnection::BeginFrame+1fb
  302.  
  303. MODULE_NAME: win32kbase
  304.  
  305. IMAGE_NAME: win32kbase.sys
  306.  
  307. IMAGE_VERSION: 10.0.18362.418
  308.  
  309. STACK_COMMAND: .thread ; .cxr ; kb
  310.  
  311. BUCKET_ID_FUNC_OFFSET: 1fb
  312.  
  313. FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_win32kbase!DirectComposition::CConnection::BeginFrame
  314.  
  315. OSPLATFORM_TYPE: x64
  316.  
  317. OSNAME: Windows 10
  318.  
  319. FAILURE_ID_HASH: {c40542bf-cb23-3a7f-7278-fff0840dfa4d}
  320.  
  321. Followup: MachineOwner
  322. ---------
  323.  
  324. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  325. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  326. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  327. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  328. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  329. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  330. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  331. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  332. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  333. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  334. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  335.  
  336. Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
  337. Copyright (c) Microsoft Corporation. All rights reserved.
  338.  
  339.  
  340. Loading Dump File [C:\Windows\Minidump\101519-7203-01.dmp]
  341. Mini Kernel Dump File: Only registers and stack trace are available
  342.  
  343.  
  344. ************* Path validation summary **************
  345. Response Time (ms) Location
  346. Deferred srv*
  347. Symbol search path is: srv*
  348. Executable search path is:
  349. Windows 10 Kernel Version 18362 MP (12 procs) Free x64
  350. Product: WinNt, suite: TerminalServer SingleUserTS
  351. Machine Name:
  352. Kernel base = 0xfffff800`48800000 PsLoadedModuleList = 0xfffff800`48c48210
  353. Debug session time: Tue Oct 15 16:21:35.565 2019 (UTC - 6:00)
  354. System Uptime: 0 days 0:47:18.310
  355. Loading Kernel Symbols
  356. ...............................................................
  357. ................................................................
  358. ................................................................
  359. .................
  360. Loading User Symbols
  361. Loading unloaded module list
  362. ..........
  363. For analysis of this file, run !analyze -v
  364. nt!KeBugCheckEx:
  365. fffff800`489c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff848e`49415df0=000000000000003b
  366. 8: kd> !analyze -v
  367. *******************************************************************************
  368. * *
  369. * Bugcheck Analysis *
  370. * *
  371. *******************************************************************************
  372.  
  373. SYSTEM_SERVICE_EXCEPTION (3b)
  374. An exception happened while executing a system service routine.
  375. Arguments:
  376. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  377. Arg2: fffff8005de5baa6, Address of the instruction which caused the bugcheck
  378. Arg3: ffff848e49416720, Address of the context record for the exception that caused the bugcheck
  379. Arg4: 0000000000000000, zero.
  380.  
  381. Debugging Details:
  382. ------------------
  383.  
  384.  
  385. KEY_VALUES_STRING: 1
  386.  
  387. Key : Analysis.CPU.Sec
  388. Value: 2
  389.  
  390. Key : Analysis.DebugAnalysisProvider.CPP
  391. Value: Create: 8007007e on DESKTOP-1CBU1CD
  392.  
  393. Key : Analysis.DebugData
  394. Value: CreateObject
  395.  
  396. Key : Analysis.DebugModel
  397. Value: CreateObject
  398.  
  399. Key : Analysis.Elapsed.Sec
  400. Value: 2
  401.  
  402. Key : Analysis.Memory.CommitPeak.Mb
  403. Value: 78
  404.  
  405. Key : Analysis.System
  406. Value: CreateObject
  407.  
  408.  
  409. DUMP_FILE_ATTRIBUTES: 0x8
  410. Kernel Generated Triage Dump
  411.  
  412. BUGCHECK_CODE: 3b
  413.  
  414. BUGCHECK_P1: c0000005
  415.  
  416. BUGCHECK_P2: fffff8005de5baa6
  417.  
  418. BUGCHECK_P3: ffff848e49416720
  419.  
  420. BUGCHECK_P4: 0
  421.  
  422. CONTEXT: ffff848e49416720 -- (.cxr 0xffff848e49416720)
  423. rax=0000000000000000 rbx=ffff9e88961f5080 rcx=e925b84a64500000
  424. rdx=ffffdc0bde5eb3a8 rsi=000001b6950a6740 rdi=0000000000000001
  425. rip=fffff8005de5baa6 rsp=ffff848e49417110 rbp=ffff848e49417a80
  426. r8=ffff848e494170e8 r9=00000000ffffffff r10=fffff80048838fa0
  427. r11=ffff848e494179e0 r12=0000000000002cd0 r13=000001b694f97220
  428. r14=ffffdc0bde5eb370 r15=00000000c000007b
  429. iopl=0 nv up ei pl zr na po nc
  430. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
  431. dxgkrnl!NtNotifyPresentToCompositionSurface+0x2e6:
  432. fffff800`5de5baa6 38498b cmp byte ptr [rcx-75h],cl ds:002b:e925b84a`644fff8b=??
  433. Resetting default scope
  434.  
  435. CUSTOMER_CRASH_COUNT: 1
  436.  
  437. PROCESS_NAME: Wow.exe
  438.  
  439. STACK_TEXT:
  440. ffff848e`49417110 fffff800`489d2b15 : ffff9e88`961f5080 ffff9e88`961f5080 000001b6`950a6740 00000000`00000020 : dxgkrnl!NtNotifyPresentToCompositionSurface+0x2e6
  441. ffff848e`49417a00 00007ffd`b3e877c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  442. 0000000e`b9f9d958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b3e877c4
  443.  
  444.  
  445. CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgkrnl
  446. 10 errors : !dxgkrnl (fffff8005de5b9a4-fffff8005de5bafc)
  447. fffff8005de5b9a0 00 c0 4c 8b *de 24 38 48 8b 7c 24 50 *25 8b 64 24 ..L..$8H.|$P%.d$
  448. fffff8005de5b9b0 40 eb 06 41 *fe 0d 00 00 c0 4c 8b 15 14 16 06 00 @..A.....L......
  449. ...
  450. fffff8005de5baa0 8b 73 30 49 *b7 7b 38 49 8b e3 41 5f *8f 5e 41 5c .s0I.{8I..A_.^A\
  451. fffff8005de5bab0 c3 cc cc cc *f8 cc cc cc cc cc cc cc fc cc cc cc ................
  452. ...
  453. fffff8005de5bae0 5c 24 20 49 *7c 5b b0 33 f6 49 89 73 *02 49 21 5b \$ I|[.3.I.s.I![
  454. fffff8005de5baf0 c0 33 c0 49 *aa 43 d0 49 89 43 d8 49 *92 43 e0 48 .3.I.C.I.C.I.C.H
  455.  
  456. MODULE_NAME: memory_corruption
  457.  
  458. IMAGE_NAME: memory_corruption
  459.  
  460. MEMORY_CORRUPTOR: STRIDE
  461.  
  462. STACK_COMMAND: .cxr 0xffff848e49416720 ; kb
  463.  
  464. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
  465.  
  466. OSPLATFORM_TYPE: x64
  467.  
  468. OSNAME: Windows 10
  469.  
  470. FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
  471.  
  472. Followup: memory_corruption
  473. ---------
Add Comment
Please, Sign In to add comment