Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041111-16645-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`0303de50
Debug session time: Mon Apr 11 06:31:45.172 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:11.358
Loading Kernel Symbols
..........................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 6B, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!Phase1InitializationDiscard+1331 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PROCESS1_INITIALIZATION_FAILED (6b)
Arguments:
Arg1: 0000000000000000, Indicates the NT status code that caused the failure.
Arg2: 0000000000000000, (reserved)
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x6B
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800033a2bc1 to fffff80002e71ed0
STACK_TEXT:
fffff880`009a9b38 fffff800`033a2bc1 : 00000000`00000000 00000000`00000000 fffff800`00812a10 fffff800`00812a10 : nt!KeBugCheck
fffff880`009a9b40 fffff800`032f3419 : f343b59b`7b843db1 fffffa80`024bd040 00000000`00000080 fffffa80`024bc450 : nt!Phase1InitializationDiscard+0x1331
fffff880`009a9d10 fffff800`03115166 : af377cc1`fc18a2a3 00000000`00000080 270398de`95a0b2c1 fffff800`02e50479 : nt!Phase1Initialization+0x9
fffff880`009a9d40 fffff800`02e50486 : fffff800`02feae80 fffffa80`024bd040 fffff800`02ff8c40 dedae6ff`ff6ecfb9 : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!Phase1InitializationDiscard+1331
fffff800`033a2bc1 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!Phase1InitializationDiscard+1331
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x6B_nt!Phase1InitializationDiscard+1331
BUCKET_ID: X64_0x6B_nt!Phase1InitializationDiscard+1331
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031211-14071-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
Debug session time: Sat Mar 12 08:17:59.604 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:12.791
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8000e4fba0, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8000e4fba0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ee726e to fffff80002e74f00
STACK_TEXT:
fffff880`04ca0828 fffff800`02ee726e : 00000000`0000001a 00000000`00041790 fffffa80`00e4fba0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`04ca0830 fffff800`02ea85d9 : 00000000`00000000 000007fe`fbc0bfff fffffa80`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x339d6
fffff880`04ca09f0 fffff800`0318ae50 : fffffa80`04dfa160 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`04ca0b10 fffff800`0318b25b : 00000000`00000000 000007fe`fbbe0000 fffffa80`00000001 fffffa80`05297df0 : nt!MiUnmapViewOfSection+0x1b0
fffff880`04ca0bd0 fffff800`02e74153 : fffffa80`04bee960 fffff880`04ca0ca0 fffffa80`05986b30 fffffa80`05257550 : nt!NtUnmapViewOfSection+0x5f
fffff880`04ca0c20 00000000`76e1015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0020bb38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e1015a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+339d6
fffff800`02ee726e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031211-13088-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`03053e50
Debug session time: Sat Mar 12 08:13:42.577 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:40.763
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000319b10e, fffff8800643ee30, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpCloseHandleTableEntry+3e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000319b10e, Address of the instruction which caused the bugcheck
Arg3: fffff8800643ee30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObpCloseHandleTableEntry+3e
fffff800`0319b10e 410fb6442418 movzx eax,byte ptr [r12+18h]
CONTEXT: fffff8800643ee30 -- (.cxr 0xfffff8800643ee30)
rax=ffff0000058efef1 rbx=fffff80003038300 rcx=fffff8a0010ee1e0
rdx=fffff8a00140a7b0 rsi=fffffa8005bcf060 rdi=fffffa8005bcf060
rip=fffff8000319b10e rsp=fffff8800643f810 rbp=fffff8a0010ee1e0
r8=fffffa800592d5e0 r9=00000000000001ec r10=00000000000001ec
r11=fffff8800643f870 r12=ffff0000058efef0 r13=0000000000000000
r14=fffffa800592d700 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ObpCloseHandleTableEntry+0x3e:
fffff800`0319b10e 410fb6442418 movzx eax,byte ptr [r12+18h] ds:002b:ffff0000`058eff08=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: IAANTmon.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000319b10e
STACK_TEXT:
fffff880`0643f810 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCloseHandleTableEntry+0x3e
FOLLOWUP_IP:
nt!ObpCloseHandleTableEntry+3e
fffff800`0319b10e 410fb6442418 movzx eax,byte ptr [r12+18h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpCloseHandleTableEntry+3e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff8800643ee30 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObpCloseHandleTableEntry+3e
BUCKET_ID: X64_0x3B_nt!ObpCloseHandleTableEntry+3e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041111-15834-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03090e50
Debug session time: Mon Apr 11 06:44:04.606 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:01.183
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, fffffa80045e4600, fffffa80045e48e0, fffff800031cd240}
Probably caused by : wininit.exe
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa80045e4600, Terminating object
Arg3: fffffa80045e48e0, Process image file name
Arg4: fffff800031cd240, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: fffffa80045e4600
IMAGE_NAME: wininit.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: wininit
FAULTING_MODULE: 0000000000000000
PROCESS_NAME: wininit.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0xF4_C0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`02ab8b58 fffff800`03250142 : 00000000`000000f4 00000000`00000003 fffffa80`045e4600 fffffa80`045e48e0 : nt!KeBugCheckEx
fffff880`02ab8b60 fffff800`031fc269 : ffffffff`ffffffff fffffa80`05ee0640 fffffa80`045e4600 fffffa80`045e4600 : nt!PspCatchCriticalBreak+0x92
fffff880`02ab8ba0 fffff800`03180c74 : ffffffff`ffffffff 00000000`00000001 fffffa80`045e4600 00000000`00000008 : nt! ?? ::NNGAKEGL::`string'+0x17a06
fffff880`02ab8bf0 fffff800`02ec4153 : fffffa80`045e4600 fffff880`c0000005 fffffa80`05ee0640 00000000`00000000 : nt!NtTerminateProcess+0xf4
fffff880`02ab8c70 fffff800`02ec06f0 : fffff800`02f04ada fffff880`02ab9a00 fffff880`02ab9340 fffff880`02ab9c20 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02ab8e08 fffff800`02f04ada : fffff880`02ab9a00 fffff880`02ab9340 fffff880`02ab9c20 00000000`00000002 : nt!KiServiceLinkage
fffff880`02ab8e10 fffff800`02fc73d9 : fffff880`02ab9a00 fffff880`02ab9a00 fffff880`02ab9c20 fffff880`02ab94e0 : nt! ?? ::FNODOBFM::`string'+0x4619d
fffff880`02ab94b0 fffff800`02ec6bfb : fffff880`02ab9a00 fffffa80`05ee0640 00000000`00000000 fffff880`02ab9bc0 : nt!KiRaiseException+0x1b9
fffff880`02ab9ae0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtRaiseException+0x7b
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: X64_0xF4_C0000005_IMAGE_wininit.exe
BUCKET_ID: X64_0xF4_C0000005_IMAGE_wininit.exe
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041111-15085-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e01000 PsLoadedModuleList = 0xfffff800`0303ee50
Debug session time: Mon Apr 11 07:02:42.007 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:51.194
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, fffffa8004969730, fffffa8004969a10, fffff8000317b240}
Probably caused by : csrss.exe
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa8004969730, Terminating object
Arg3: fffffa8004969a10, Process image file name
Arg4: fffff8000317b240, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: fffffa8004969730
IMAGE_NAME: csrss.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: csrss
FAULTING_MODULE: 0000000000000000
PROCESS_NAME: csrss.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0xF4_C0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`02b7fb08 fffff800`031fe142 : 00000000`000000f4 00000000`00000003 fffffa80`04969730 fffffa80`04969a10 : nt!KeBugCheckEx
fffff880`02b7fb10 fffff800`031aa269 : ffffffff`ffffffff fffffa80`04c58b60 fffffa80`04969730 fffffa80`04969730 : nt!PspCatchCriticalBreak+0x92
fffff880`02b7fb50 fffff800`0312ec74 : ffffffff`ffffffff 00000000`00000001 fffffa80`04969730 00000000`00000008 : nt! ?? ::NNGAKEGL::`string'+0x17a06
fffff880`02b7fba0 fffff800`02e72153 : fffffa80`04969730 fffff880`c0000005 fffffa80`04c58b60 fffffa80`052a8b60 : nt!NtTerminateProcess+0xf4
fffff880`02b7fc20 00000000`774a017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0144e278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774a017a
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: X64_0xF4_C0000005_IMAGE_csrss.exe
BUCKET_ID: X64_0xF4_C0000005_IMAGE_csrss.exe
Followup: MachineOwner
---------