*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
FAULTING_IP:
ntdll!RtlFreeHeap+52
000007fe`7ec351d2 807f0f05 cmp byte ptr [rdi+0Fh],5
EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000007fe7ec351d2 (ntdll!RtlFreeHeap+0x0000000000000052)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000988a0c0f
Attempt to read from address 00000000988a0c0f
PROCESS_NAME: dxdiag.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000988a0c0f
READ_ADDRESS: 00000000988a0c0f
FOLLOWUP_IP:
ntdll!RtlFreeHeap+52
000007fe`7ec351d2 807f0f05 cmp byte ptr [rdi+0Fh],5
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
APP: dxdiag.exe
ADDITIONAL_DEBUG_TEXT: Enable Pageheap/AutoVerifer ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
LAST_CONTROL_TRANSFER: from 000007fe5a4c29c4 to 000007fe7ec351d2
FAULTING_THREAD: 0000000000001874
DEFAULT_BUCKET_ID: HEAP_CORRUPTION
PRIMARY_PROBLEM_CLASS: HEAP_CORRUPTION
BUGCHECK_STR: APPLICATION_FAULT_HEAP_CORRUPTION_HEAP_CORRUPTION_INVALID_POINTER_READ
STACK_TEXT:
00000000`00000000 00000000`00000000 heap_corruption!heap_corruption+0x0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: heap_corruption!heap_corruption
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: heap_corruption
IMAGE_NAME: heap_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: ** Pseudo Context ** ; kb
FAILURE_BUCKET_ID: HEAP_CORRUPTION_c0000005_heap_corruption!heap_corruption
BUCKET_ID: X64_APPLICATION_FAULT_HEAP_CORRUPTION_HEAP_CORRUPTION_INVALID_POINTER_READ_heap_corruption!heap_corruption
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/dxdiag_exe/6_2_8250_0/4f3f1d99/ntdll_dll/6_2_8250_0/4f3f2bec/c0000005/000051d2.htm?Retriage=1
Followup: MachineOwner
---------