Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122810-32635-01-dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0304c000 PsLoadedModuleList = 0xfffff800`03289e50
Debug session time: Tue Dec 28 13:58:06.411 2010 (UTC - 5:00)
System Uptime: 0 days 1:26:38.597
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800030c9ba4, fffff88006116100, 0}
Probably caused by : ntkrnlmp.exe ( nt!NtQueryLicenseValue+28a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800030c9ba4, Address of the instruction which caused the bugcheck
Arg3: fffff88006116100, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!RtlInitUnicodeString+24
fffff800`030c9ba4 66f2af repne scas word ptr [rdi]
CONTEXT: fffff88006116100 -- (.cxr 0xfffff88006116100)
rax=0000000000000000 rbx=0000000000000001 rcx=ffffffffffffffff
rdx=effff80003200a50 rsi=0000000000000001 rdi=effff80003200a50
rip=fffff800030c9ba4 rsp=fffff88006116ad0 rbp=fffff88006116ca0
r8=fffff88006116b48 r9=ffffff5ffda945b0 r10=fffff8a00576c4e0
r11=fffff8a00576c50e r12=fffff80003262a28 r13=0000000000000011
r14=0000000000000002 r15=0000000007a5f2f0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!RtlInitUnicodeString+0x24:
fffff800`030c9ba4 66f2af repne scas word ptr [rdi]
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800033a861f to fffff800030c9ba4
STACK_TEXT:
fffff880`06116ad0 fffff800`033a861f : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`000007ff : nt!RtlInitUnicodeString+0x24
fffff880`06116ae0 fffff800`030bb993 : fffffa80`0dfd9b00 00000000`00000000 00000000`00000000 fffff800`00000000 : nt!NtQueryLicenseValue+0x28a
fffff880`06116bb0 00000000`77370f7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`07a5f268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77370f7a
FOLLOWUP_IP:
nt!NtQueryLicenseValue+28a
fffff800`033a861f 440fb74c2468 movzx r9d,word ptr [rsp+68h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!NtQueryLicenseValue+28a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88006116100 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!NtQueryLicenseValue+28a
BUCKET_ID: X64_0x3B_nt!NtQueryLicenseValue+28a
Followup: MachineOwner
---------