Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\111217-16364-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols\*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.23915.amd64fre.win7sp1_ldr.170913-0600 Machine Name: Kernel base = 0xfffff800`0e412000 PsLoadedModuleList = 0xfffff800`0e654750 Debug session time: Sun Nov 12 22:26:52.052 2017 (UTC + 1:00) System Uptime: 0 days 0:00:07.269 Loading Kernel Symbols ............................................................... ..................... Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c000001d, fffff8000e75e209, fffff880041c8d40, 0} Probably caused by : memory_corruption Followup: memory_corruption --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c000001d, Exception code that caused the bugcheck Arg2: fffff8000e75e209, Address of the instruction which caused the bugcheck Arg3: fffff880041c8d40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {WYJ FAULTING_IP: nt!ObDuplicateObject+319 fffff800`0e75e209 f093 lock xchg eax,ebx CONTEXT: fffff880041c8d40 -- (.cxr 0xfffff880041c8d40) rax=fffffa800838f030 rbx=fffffa800838d470 rcx=fffff8a000572b20 rdx=0000000000000034 rsi=fffffa8008395398 rdi=fffff8a0005730d0 rip=fffff8000e75e209 rsp=fffff880041c9710 rbp=fffffa8008395398 r8=fffff8a000573000 r9=0000000000000034 r10=0000000000000001 r11=fffffa800838f010 r12=fffff8a000572af0 r13=fffff880041c9a40 r14=0000000000000001 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 nt!ObDuplicateObject+0x319: fffff800`0e75e209 f093 lock xchg eax,ebx Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x3B PROCESS_NAME: smss.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000e75e209 STACK_TEXT: fffff880`041c9710 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObDuplicateObject+0x319 CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8000e75e20a - nt!ObDuplicateObject+31a [ 83:93 ] 1 error : !nt (fffff8000e75e20a) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .cxr 0xfffff880041c8d40 ; kb FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT Followup: memory_corruption ---------