Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032711-24414-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
Debug session time: Sun Mar 27 12:47:54.702 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:00.764
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3D, {fffff880032b6f60, 0, 0, fffff80002cbc780}
Probably caused by : ntkrnlmp.exe ( nt!KiInterruptHandler+29 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff880032b6f60
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff80002cbc780
Debugging Details:
------------------
CONTEXT: fffff880032b6f60 -- (.cxr 0xfffff880032b6f60)
rax=0000000000000000 rbx=fffffa80073c2b58 rcx=fffffa80073c2ca8
rdx=fffffa80073a4a38 rsi=0000000000000040 rdi=fffffa80073580d8
rip=fffff80002cbc780 rsp=fffff880032b7938 rbp=fffffa80073a4a08
r8=fffff880032b7960 r9=0000000000000000 r10=fffffa80073a4a08
r11=0000000000000000 r12=fffffa800736c168 r13=fffffa80073580d8
r14=fffffa80063ad300 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000202
nt!DbgBreakPoint:
fffff800`02cbc780 cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3D
PROCESS_NAME: System
CURRENT_IRQL: 5
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002cbc780
STACK_TEXT:
fffff880`032b66a8 fffff800`02cc3ca9 : 00000000`0000003d fffff880`032b6f60 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`032b66b0 fffff800`02cbffe9 : 1b2a1b2a`f3ccf3cc 998e998e`5c005c00 fffff880`032b6f60 fffff800`02cf1668 : nt!KiBugCheckDispatch+0x69
fffff880`032b67f0 fffff800`02cea40d : fffff880`00c442f4 fffff880`00c4258c fffff880`00c30000 fffff880`032b76f8 : nt!KiInterruptHandler+0x29
fffff880`032b6820 fffff800`02cf1a90 : fffff800`02e1393c fffff880`032b6898 fffff880`032b76f8 fffff800`02c54000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`032b6850 fffff800`02cfe9ef : fffff880`032b76f8 fffff880`032b6f60 fffff880`00000000 fffffa80`073580d8 : nt!RtlDispatchException+0x410
fffff880`032b6f30 fffff800`02cc3d82 : fffff880`032b76f8 fffffa80`073c2b58 fffff880`032b77a0 00000000`00000040 : nt!KiDispatchException+0x16f
fffff880`032b75c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInterruptHandler+29
fffff800`02cbffe9 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiInterruptHandler+29
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x3D_nt!KiInterruptHandler+29
BUCKET_ID: X64_0x3D_nt!KiInterruptHandler+29
Followup: MachineOwner
---------