Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020211-38390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Wed Feb 2 07:50:34.659 2011 (UTC - 5:00)
System Uptime: 0 days 0:50:04.174
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, 0, fffff880079d5b20, 0}
Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3f0 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880079d5b20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+13
00000000`00000000 ?? ???
CONTEXT: fffff880079d5b20 -- (.cxr 0xfffff880079d5b20)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=0000000000000000 rsp=fffff880079d64f8 rbp=fffff880079d6b00
r8=fffff8a00001c6f8 r9=fffff880079d6b10 r10=0000000000000001
r11=fffff880079d62d8 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff880079d6a40 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
00000000`00000000 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b9b300 to 0000000000000000
STACK_TEXT:
fffff880`079d64f8 fffff800`02b9b300 : fffff980`06fcafb0 fffff800`02c72ae1 fffff880`079d6770 fffff880`079d6b10 : 0x0
fffff880`079d6500 fffff800`02b9c5eb : fffff980`007c4420 fffff980`007c4420 fffff880`079d6700 fffff880`079d6b10 : nt!CmpGetSymbolicLink+0x3f0
fffff880`079d6610 fffff800`02bbbe84 : fffff800`02b9bcc0 00000000`00000000 fffff980`6454cb10 00000000`00000001 : nt!CmpParseKey+0x92b
fffff880`079d68e0 fffff800`02bc0e4d : fffff980`6454cb10 fffff880`079d6a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`079d69e0 fffff800`02b9fdcc : 00000000`00000f00 00000000`00000000 fffff980`1ab32f01 fffff880`079d6aa8 : nt!ObOpenObjectByName+0x1cd
fffff880`079d6a90 fffff800`02ba1f0f : 00000000`05b1e880 00000000`00020019 00000000`05b1e908 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`079d6be0 fffff800`028c1993 : 00000000`00000001 000007ff`fffdb000 00000000`00000001 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff880`079d6c20 00000000`771b0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05b1e818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771b0caa
FOLLOWUP_IP:
nt!CmpGetSymbolicLink+3f0
fffff800`02b9b300 4885c0 test rax,rax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!CmpGetSymbolicLink+3f0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880079d5b20 ; kb
FAILURE_BUCKET_ID: X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0
BUCKET_ID: X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3f0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020211-33796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02851000 PsLoadedModuleList = 0xfffff800`02a8ee50
Debug session time: Wed Feb 2 06:55:39.995 2011 (UTC - 5:00)
System Uptime: 0 days 1:55:22.495
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002b9a2fd, fffff88007b91b30, 0}
Probably caused by : ntkrnlmp.exe ( nt!CmpGetSymbolicLink+3ed )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002b9a2fd, Address of the instruction which caused the bugcheck
Arg3: fffff88007b91b30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008 call qword ptr [rax+8]
CONTEXT: fffff88007b91b30 -- (.cxr 0xfffff88007b91b30)
rax=00000000007c4420 rbx=0000000000000000 rcx=00000000007c4420
rdx=0000000080000020 rsi=fffff8a00001c6f8 rdi=fffff8a00001c820
rip=fffff80002b9a2fd rsp=fffff88007b92500 rbp=fffff88007b92b00
r8=fffff8a00001c6f8 r9=fffff88007b92b10 r10=0000000000000001
r11=fffff88007b922f0 r12=fffff8a00001c728 r13=0000000000000011
r14=fffff88007b92a40 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!CmpGetSymbolicLink+0x3ed:
fffff800`02b9a2fd ff5008 call qword ptr [rax+8] ds:002b:00000000`007c4428=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b9b5eb to fffff80002b9a2fd
STACK_TEXT:
fffff880`07b92500 fffff800`02b9b5eb : fffff980`007c4420 fffff980`007c4420 fffff880`07b92700 fffff880`07b92b10 : nt!CmpGetSymbolicLink+0x3ed
fffff880`07b92610 fffff800`02bbae84 : fffff800`02b9acc0 00000000`00000000 fffff980`40adab10 fffff800`02964a01 : nt!CmpParseKey+0x92b
fffff880`07b928e0 fffff800`02bbfe4d : fffff980`40adab10 fffff880`07b92a40 00000000`00000040 fffff980`00524f30 : nt!ObpLookupObjectName+0x585
fffff880`07b929e0 fffff800`02b9edcc : 00000000`00000001 00000000`00000000 00000000`00048601 00000000`000f32be : nt!ObOpenObjectByName+0x1cd
fffff880`07b92a90 fffff800`02ba1fca : 00000000`013de430 00000000`00020019 00000000`013ddf30 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`07b92be0 fffff800`028c0993 : 00000000`00000095 fffff880`07b92ca0 00000000`00000200 00000000`00020019 : nt!NtOpenKey+0x12
fffff880`07b92c20 00000000`7787fe7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`013dded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7787fe7a
FOLLOWUP_IP:
nt!CmpGetSymbolicLink+3ed
fffff800`02b9a2fd ff5008 call qword ptr [rax+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CmpGetSymbolicLink+3ed
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88007b91b30 ; kb
FAILURE_BUCKET_ID: X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed
BUCKET_ID: X64_0x3B_VRFK_nt!CmpGetSymbolicLink+3ed
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-49920-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
Debug session time: Tue Feb 1 15:46:12.743 2011 (UTC - 5:00)
System Uptime: 0 days 0:13:22.476
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff80002b2dc06, c, 0, fffff800028b67a2}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+f13 )
Followup: Pool_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002b2dc06, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028b67a2, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac10e0
fffff80002b2dc06
CURRENT_IRQL: c
FAULTING_IP:
nt!RtlDispatchException+122
fffff800`028b67a2 410fb60c24 movzx ecx,byte ptr [r12]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff880031bd800 -- (.trap 0xfffff880031bd800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=f98046264f100002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897951 rsp=fffff880031bd990 rbp=0000000000000000
r8=0048bd4000490720 r9=0000000000000000 r10=0000000000000004
r11=0048bd400048baa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiIpiSendRequest+0x201:
fffff800`02897951 49895008 mov qword ptr [r8+8],rdx ds:4010:0048bd40`00490728=????????????????
Resetting default scope
EXCEPTION_RECORD: fffff880031bd758 -- (.exr 0xfffff880031bd758)
ExceptionAddress: fffff80002897951 (nt!KiIpiSendRequest+0x0000000000000201)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
LAST_CONTROL_TRANSFER: from fffff80002888ca9 to fffff80002889740
STACK_TEXT:
fffff880`031bc5d8 fffff800`02888ca9 : 00000000`0000000a fffff800`02b2dc06 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bc5e0 fffff800`02887920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031bc720 fffff800`028b67a2 : fffff800`02b2dc06 fffff880`031bc8f8 fffff880`031bd758 fffff800`02819000 : nt!KiPageFault+0x260
fffff880`031bc8b0 fffff800`028c39ef : fffff880`031bd758 fffff880`031bcfc0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`031bcf90 fffff800`02888d82 : fffff880`031bd758 fffff800`02a03e80 fffff880`031bd800 00000000`00000001 : nt!KiDispatchException+0x16f
fffff880`031bd620 fffff800`0288768a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`031bd800 fffff800`02897951 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`031bd990 fffff800`0289ccc4 : fffff800`00000000 fffff880`00000001 00000000`00000000 fffff800`00000000 : nt!KiIpiSendRequest+0x201
fffff880`031bda50 fffff800`02939ab6 : 00000000`00000000 fffff800`02a03e80 fffff980`46264f10 00000000`00000018 : nt!KiIpiSendRequestEx+0x84
fffff880`031bda90 fffff800`0299080d : 00000000`00000001 fffff880`031bdb50 fffff6fc`c0231320 fffff980`46264f10 : nt!KeFlushSingleTb+0x126
fffff880`031bdb10 fffff800`029bc356 : 00000000`0000071f 00000000`74707249 00000000`08627e80 fffff800`02a18480 : nt!MmFreeSpecialPool+0x34d
fffff880`031bdc50 fffff800`02d2e1f6 : 4f4f4f4f`4f4f4f00 4f4f4f4f`00000000 4f4f4f4f`4f4f4f00 4f4f4f4f`4f4f4f00 : nt!ExDeferredFreePool+0xf13
fffff880`031bdd00 fffff800`02b2dc06 : fffff980`00440b60 fffff980`0009ab30 4f4f4f4f`4f4f4f4f 4f4f4f4f`4f4f4f4f : nt!ViPoolDelayFreeTrimThreadRoutine+0x46
fffff880`031bdd40 fffff800`02867c26 : fffff800`02a03e80 fffff980`00440b60 fffff800`02a11c40 4f4f4f4f`4f4f4f4f : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd80 00000000`00000000 : fffff880`031be000 fffff880`031b8000 fffff880`031bda50 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+f13
fffff800`029bc356 90 nop
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: nt!ExDeferredFreePool+f13
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xA_VRFK_nt!ExDeferredFreePool+f13
BUCKET_ID: X64_0xA_VRFK_nt!ExDeferredFreePool+f13
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020311-27187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0285b000 PsLoadedModuleList = 0xfffff800`02a98e50
Debug session time: Thu Feb 3 03:25:27.439 2011 (UTC - 5:00)
System Uptime: 0 days 8:39:17.939
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck CC, {fffff9805bbcafb0, 1, fffff800028d080c, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42837 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_FREED_SPECIAL_POOL (cc)
Memory was referenced after it was freed.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff9805bbcafb0, memory referenced
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation
Arg3: fffff800028d080c, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, Mm internal code.
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b030e0
fffff9805bbcafb0
FAULTING_IP:
nt!ObfDereferenceObject+2c
fffff800`028d080c f0480fc11f lock xadd qword ptr [rdi],rbx
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xCC
PROCESS_NAME: SC2.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008bfc9c0 -- (.trap 0xfffff88008bfc9c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff9805bbcafe0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028d080c rsp=fffff88008bfcb50 rbp=fffff88008bfcca0
r8=fffff980283e6bb8 r9=0000000000000000 r10=fffffffffffffffd
r11=fffff880009e7100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObfDereferenceObject+0x2c:
fffff800`028d080c f0480fc11f lock xadd qword ptr [rdi],rbx ds:afe0:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000294bf14 to fffff800028cb740
STACK_TEXT:
fffff880`08bfc858 fffff800`0294bf14 : 00000000`00000050 fffff980`5bbcafb0 00000000`00000001 fffff880`08bfc9c0 : nt!KeBugCheckEx
fffff880`08bfc860 fffff800`028c982e : 00000000`00000001 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`08bfc9c0 fffff800`028d080c : fffff980`1d29cf20 fffff980`553b2b60 fffff8a0`02d7c000 00000000`742e2450 : nt!KiPageFault+0x16e
fffff880`08bfcb50 fffff800`02bc61ec : fffff880`08bfcca0 fffff980`5bbcafe0 00000000`00000000 fffff800`02bea000 : nt!ObfDereferenceObject+0x2c
fffff880`08bfcbb0 fffff800`028ca993 : fffff980`553b2b60 00000000`00000790 00000000`00000000 fffff980`5bbdafe0 : nt!NtWaitForSingleObject+0xcc
fffff880`08bfcc20 00000000`742e2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0d5ef0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x742e2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+42837
fffff800`0294bf14 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+42837
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xCC_VRFK_nt!_??_::FNODOBFM::_string_+42837
BUCKET_ID: X64_0xCC_VRFK_nt!_??_::FNODOBFM::_string_+42837
Followup: MachineOwner
---------