Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020611-26754-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032a2e50
Debug session time: Sun Feb 6 13:02:49.405 2011 (UTC - 5:00)
System Uptime: 0 days 6:07:53.483
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000320a7db, fffff8800856d7f0, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+72b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000320a7db, Address of the instruction which caused the bugcheck
Arg3: fffff8800856d7f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExFreePoolWithTag+72b
fffff800`0320a7db 483910 cmp qword ptr [rax],rdx
CONTEXT: fffff8800856d7f0 -- (.cxr 0xfffff8800856d7f0)
rax=ff7efa8006694a50 rbx=fffffa8006694148 rcx=0000000000001446
rdx=fffff8a00d165830 rsi=fffffa800975e5f0 rdi=fffffa8006694140
rip=fffff8000320a7db rsp=fffff8800856e1c0 rbp=0000000000000000
r8=fffff8a00d166000 r9=fffff8a00d165830 r10=00000000000007ff
r11=fffff8800856e1f0 r12=0000000000000000 r13=fffff8a00d163000
r14=fffff8a00d165820 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExFreePoolWithTag+0x72b:
fffff800`0320a7db 483910 cmp qword ptr [rax],rdx ds:002b:ff7efa80`06694a50=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: wbengine.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000320a7db
STACK_TEXT:
fffff880`0856e1c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x72b
FOLLOWUP_IP:
nt!ExFreePoolWithTag+72b
fffff800`0320a7db 483910 cmp qword ptr [rax],rdx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExFreePoolWithTag+72b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800856d7f0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExFreePoolWithTag+72b
BUCKET_ID: X64_0x3B_nt!ExFreePoolWithTag+72b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020611-25755-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03057000 PsLoadedModuleList = 0xfffff800`03294e50
Debug session time: Sat Feb 5 21:09:43.025 2011 (UTC - 5:00)
System Uptime: 0 days 0:49:34.492
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa80049ee820, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33906 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80049ee820
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000313af9e to fffff800030c7740
STACK_TEXT:
fffff880`09182968 fffff800`0313af9e : 00000000`0000001a 00000000`00041790 fffffa80`049ee820 00000000`0000ffff : nt!KeBugCheckEx
fffff880`09182970 fffff800`031090da : 00000000`00000000 00000000`46584fff fffffa80`00000000 fffffa80`06f40990 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`09182b30 fffff800`030c6993 : ffffffff`ffffffff 00000000`0022de10 00000000`0022de08 fffffa80`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`09182c20 00000000`779dff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0022ddd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779dff3a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33906
fffff800`0313af9e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33906
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020711-27253-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03003000 PsLoadedModuleList = 0xfffff800`03240e50
Debug session time: Mon Feb 7 10:18:24.254 2011 (UTC - 5:00)
System Uptime: 0 days 0:06:08.706
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003056c97, fffff88009a6fe20, 0}
Probably caused by : ntkrnlmp.exe ( nt!RtlDeleteNoSplay+6b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003056c97, Address of the instruction which caused the bugcheck
Arg3: fffff88009a6fe20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!RtlDeleteNoSplay+6b
fffff800`03056c97 488901 mov qword ptr [rcx],rax
CONTEXT: fffff88009a6fe20 -- (.cxr 0xfffff88009a6fe20)
rax=fffff8a007a343a8 rbx=fffffa800a0a73e8 rcx=0088000000000000
rdx=fffff8a007a343b0 rsi=fffff8a007fd45a8 rdi=0000000000000000
rip=fffff80003056c97 rsp=fffff88009a707f0 rbp=fffffa800a0a73e8
r8=ffffffffffffffff r9=00000000000000a0 r10=fffff80003003000
r11=fffff8a007fd45a8 r12=fffffa800916b720 r13=fffff8a007fd45a8
r14=fffff8a007fd45a8 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!RtlDeleteNoSplay+0x6b:
fffff800`03056c97 488901 mov qword ptr [rcx],rax ds:002b:00880000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Launcher.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003056c97
STACK_TEXT:
fffff880`09a707f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDeleteNoSplay+0x6b
FOLLOWUP_IP:
nt!RtlDeleteNoSplay+6b
fffff800`03056c97 488901 mov qword ptr [rcx],rax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!RtlDeleteNoSplay+6b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88009a6fe20 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!RtlDeleteNoSplay+6b
BUCKET_ID: X64_0x3B_nt!RtlDeleteNoSplay+6b
Followup: MachineOwner
---------