Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031811-67766-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Fri Mar 18 13:35:59.786 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:18.548
Loading Kernel Symbols
...................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 6B, {ffffffffc000009d, 2, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!PsLocateSystemDlls+bd )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PROCESS1_INITIALIZATION_FAILED (6b)
Arguments:
Arg1: ffffffffc000009d, Indicates the NT status code that caused the failure.
Arg2: 0000000000000002, (reserved)
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x6B
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ed311d to fffff80002a8d740
STACK_TEXT:
fffff880`009a99f8 fffff800`02ed311d : 00000000`0000006b ffffffff`c000009d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009a9a00 fffff800`02fbcb3d : fffff800`00814130 00000000`00000002 00000000`00000000 fffff800`02c07e80 : nt!PsLocateSystemDlls+0xbd
fffff880`009a9a40 fffff800`02fbfcec : 00000000`00000000 00000000`00000010 ffffffff`80000028 fffff800`00814130 : nt!IoInitSystem+0x85d
fffff880`009a9b40 fffff800`02f10219 : 00000000`00000000 fffffa80`036c91c0 00000000`00000080 fffffa80`036c9740 : nt!Phase1InitializationDiscard+0x129c
fffff880`009a9d10 fffff800`02d307c6 : 00000000`00000000 00000000`00000080 00000000`00000000 fffff800`02a6bc19 : nt!Phase1Initialization+0x9
fffff880`009a9d40 fffff800`02a6bc26 : fffff800`02c07e80 fffffa80`036c91c0 fffff800`02c15c40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PsLocateSystemDlls+bd
fffff800`02ed311d cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PsLocateSystemDlls+bd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x6B_nt!PsLocateSystemDlls+bd
BUCKET_ID: X64_0x6B_nt!PsLocateSystemDlls+bd
Followup: MachineOwner
---------