Code:
-
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-19281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03206000 PsLoadedModuleList = 0xfffff800`0344b670
Debug session time: Thu Nov 10 19:07:52.373 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:38.248
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000330bb55, fffff88008a5cb40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000330bb55, Address of the instruction which caused the bugcheck
Arg3: fffff88008a5cb40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff88008a5cb40 -- (.cxr 0xfffff88008a5cb40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff555837472 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff8000330bb55 rsp=fffff88008a5d528 rbp=0000000000000000
r8=fffffe0008a5d560 r9=000fffbffffffffd r10=fffff88008a5d5d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000330bb55
STACK_TEXT:
fffff880`08a5d528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`0330bb55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88008a5cb40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-19843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03253000 PsLoadedModuleList = 0xfffff800`03498670
Debug session time: Fri Nov 11 00:57:56.089 2011 (UTC - 7:00)
System Uptime: 0 days 0:11:19.337
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C9, {7, fffff88008e33a10, fffff98013c2eee0, 0}
Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for pbfilter.sys
*** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys
Probably caused by : pbfilter.sys ( pbfilter+2a10 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set
Arg2: fffff88008e33a10, the cancel routine pointer
Arg3: fffff98013c2eee0, the IRP
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc9_7
DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7
IRP_CANCEL_ROUTINE:
pbfilter+2a10
fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx
FAULTING_IP:
pbfilter+2a10
fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx
FOLLOWUP_IP:
pbfilter+2a10
fffff880`08e33a10 48895c2408 mov qword ptr [rsp+8],rbx
IRP_ADDRESS: fffff98013c2eee0
DEVICE_OBJECT: fffffa8007aeb7c0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: uTorrent.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000376f072 to fffff800032cfc40
STACK_TEXT:
fffff880`0883e1b8 fffff800`0376f072 : 00000000`000000c9 00000000`00000007 fffff880`08e33a10 fffff980`13c2eee0 : nt!KeBugCheckEx
fffff880`0883e1c0 fffff880`08e339ea : 00000000`0000ecc2 00000000`00000000 fffffa80`07aeb910 fffff980`13c2eee0 : nt!IovCompleteRequest+0x72
fffff880`0883e290 00000000`0000ecc2 : 00000000`00000000 fffffa80`07aeb910 fffff980`13c2eee0 00000000`00000006 : pbfilter+0x29ea
fffff880`0883e298 00000000`00000000 : fffffa80`07aeb910 fffff980`13c2eee0 00000000`00000006 00000000`05baabe0 : 0xecc2
STACK_COMMAND: .bugcheck ; kb
SYMBOL_NAME: pbfilter+2a10
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pbfilter
IMAGE_NAME: pbfilter.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba
FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10
BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-21434-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03459670
Debug session time: Thu Nov 10 19:10:33.959 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:34.208
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003319b55, fffff8800701fb40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003319b55, Address of the instruction which caused the bugcheck
Arg3: fffff8800701fb40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff8800701fb40 -- (.cxr 0xfffff8800701fb40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff5557ab572 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff80003319b55 rsp=fffff88007020528 rbp=0000000000000000
r8=fffffe0007020560 r9=000fffbffffffffd r10=fffff880070205d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003319b55
STACK_TEXT:
fffff880`07020528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`03319b55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff8800701fb40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111011-29640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to load image Unknown_Module_34b29076`9d5e3040, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_34b29076`9d5e3040
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_34b29076`9d5e3040
Debugger can not determine kernel base address
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03258000 PsLoadedModuleList = 0xfffff800`0349d670
Debug session time: Thu Nov 10 19:55:26.351 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:36.226
Unable to load image Unknown_Module_34b29076`9d5e3040, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_34b29076`9d5e3040
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_34b29076`9d5e3040
Debugger can not determine kernel base address
Loading Kernel Symbols
.
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000335db55, fffff880094c6b40, 0}
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000335db55, Address of the instruction which caused the bugcheck
Arg3: fffff880094c6b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+0
fffff800`0335db55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff880094c6b40 -- (.cxr 0xfffff880094c6b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff55586ed1d rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff8000335db55 rsp=fffff880094c7528 rbp=0000000000000000
r8=fffffe00094c7560 r9=000fffbffffffffd r10=fffff880094c75d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
fffff800`0335db55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000335db55
STACK_TEXT:
fffff880`094c6278 fffff800`032d41e9 : 00000000`0000003b 00000000`c0000005 fffff800`0335db55 fffff880`094c6b40 : 0xfffff800`032d4c40
fffff880`094c6280 00000000`0000003b : 00000000`c0000005 fffff800`0335db55 fffff880`094c6b40 00000000`00000000 : 0xfffff800`032d41e9
fffff880`094c6288 00000000`c0000005 : fffff800`0335db55 fffff880`094c6b40 00000000`00000000 00000000`00703c0e : 0x3b
fffff880`094c6290 fffff800`0335db55 : fffff880`094c6b40 00000000`00000000 00000000`00703c0e 00000000`00000000 : 0xc0000005
fffff880`094c6298 fffff880`094c6b40 : 00000000`00000000 00000000`00703c0e 00000000`00000000 00000000`00000000 : 0xfffff800`0335db55
fffff880`094c62a0 00000000`00000000 : 00000000`00703c0e 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`094c6b40
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-19624-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0320a000 PsLoadedModuleList = 0xfffff800`0344f670
Debug session time: Fri Nov 11 01:07:09.385 2011 (UTC - 7:00)
System Uptime: 0 days 0:05:31.244
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C9, {7, fffff8800887ea10, fffff98010c7cee0, 0}
Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for pbfilter.sys
*** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys
Probably caused by : pbfilter.sys ( pbfilter+2a10 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set
Arg2: fffff8800887ea10, the cancel routine pointer
Arg3: fffff98010c7cee0, the IRP
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc9_7
DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7
IRP_CANCEL_ROUTINE:
pbfilter+2a10
fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx
FAULTING_IP:
pbfilter+2a10
fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx
FOLLOWUP_IP:
pbfilter+2a10
fffff880`0887ea10 48895c2408 mov qword ptr [rsp+8],rbx
IRP_ADDRESS: fffff98010c7cee0
DEVICE_OBJECT: fffffa8007780380
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80003726072 to fffff80003286c40
STACK_TEXT:
fffff880`03519068 fffff800`03726072 : 00000000`000000c9 00000000`00000007 fffff880`0887ea10 fffff980`10c7cee0 : nt!KeBugCheckEx
fffff880`03519070 fffff880`0887e9ea : 00000000`00002177 00000000`00000000 fffffa80`077804d0 fffff980`10c7cee0 : nt!IovCompleteRequest+0x72
fffff880`03519140 00000000`00002177 : 00000000`00000000 fffffa80`077804d0 fffff980`10c7cee0 fffffa80`0ca50550 : pbfilter+0x29ea
fffff880`03519148 00000000`00000000 : fffffa80`077804d0 fffff980`10c7cee0 fffffa80`0ca50550 00000000`3666795b : 0x2177
STACK_COMMAND: .bugcheck ; kb
SYMBOL_NAME: pbfilter+2a10
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pbfilter
IMAGE_NAME: pbfilter.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba
FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10
BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-19999-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03210000 PsLoadedModuleList = 0xfffff800`03455670
Debug session time: Fri Nov 11 01:09:59.037 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:21.286
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C9, {7, fffff88007973a10, fffff9800a630ee0, 0}
Unable to load image \??\C:\Program Files\PeerBlock\pbfilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for pbfilter.sys
*** ERROR: Module load completed but symbols could not be loaded for pbfilter.sys
Probably caused by : pbfilter.sys ( pbfilter+2a10 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 0000000000000007, IRP passed to IoCompleteRequest still has cancel routine set
Arg2: fffff88007973a10, the cancel routine pointer
Arg3: fffff9800a630ee0, the IRP
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc9_7
DRIVER_VERIFIER_IO_VIOLATION_TYPE: 7
IRP_CANCEL_ROUTINE:
pbfilter+2a10
fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx
FAULTING_IP:
pbfilter+2a10
fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx
FOLLOWUP_IP:
pbfilter+2a10
fffff880`07973a10 48895c2408 mov qword ptr [rsp+8],rbx
IRP_ADDRESS: fffff9800a630ee0
DEVICE_OBJECT: fffffa800d915cc0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000372c072 to fffff8000328cc40
STACK_TEXT:
fffff800`00b9a8f8 fffff800`0372c072 : 00000000`000000c9 00000000`00000007 fffff880`07973a10 fffff980`0a630ee0 : nt!KeBugCheckEx
fffff800`00b9a900 fffff880`079739ea : 00000000`0000e6c5 00000000`00000000 fffffa80`0d915e10 fffff980`0a630ee0 : nt!IovCompleteRequest+0x72
fffff800`00b9a9d0 00000000`0000e6c5 : 00000000`00000000 fffffa80`0d915e10 fffff980`0a630ee0 fffffa80`0bf84a80 : pbfilter+0x29ea
fffff800`00b9a9d8 00000000`00000000 : fffffa80`0d915e10 fffff980`0a630ee0 fffffa80`0bf84a80 00000000`60825f46 : 0xe6c5
STACK_COMMAND: .bugcheck ; kb
SYMBOL_NAME: pbfilter+2a10
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pbfilter
IMAGE_NAME: pbfilter.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cd60dba
FAILURE_BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10
BUCKET_ID: X64_0xc9_7_VRF_pbfilter+2a10
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111111-20389-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03252000 PsLoadedModuleList = 0xfffff800`03497670
Debug session time: Fri Nov 11 01:00:31.010 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:18.259
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003357b55, fffff880072e1b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003357b55, Address of the instruction which caused the bugcheck
Arg3: fffff880072e1b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff880072e1b40 -- (.cxr 0xfffff880072e1b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff5557ba0c8 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff80003357b55 rsp=fffff880072e2528 rbp=0000000000000000
r8=fffffe00072e2560 r9=000fffbffffffffd r10=fffff880072e25d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003357b55
STACK_TEXT:
fffff880`072e2528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`03357b55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff880072e1b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_VRF_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_VRF_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111211-20467-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0324f000 PsLoadedModuleList = 0xfffff800`03494670
Debug session time: Sat Nov 12 19:22:13.947 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:27.196
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003354b55, fffff8800941ab40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003354b55, Address of the instruction which caused the bugcheck
Arg3: fffff8800941ab40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff8800941ab40 -- (.cxr 0xfffff8800941ab40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff55586b3c8 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff80003354b55 rsp=fffff8800941b528 rbp=0000000000000000
r8=fffffe000941b560 r9=000fffbffffffffd r10=fffff8800941b5d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003354b55
STACK_TEXT:
fffff880`0941b528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`03354b55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff8800941ab40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\111211-35178-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03262000 PsLoadedModuleList = 0xfffff800`034a7670
Debug session time: Sat Nov 12 19:56:45.926 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:30.175
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003367b55, fffff88006d40b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003367b55, Address of the instruction which caused the bugcheck
Arg3: fffff88006d40b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff88006d40b40 -- (.cxr 0xfffff88006d40b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff55579c072 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff80003367b55 rsp=fffff88006d41528 rbp=0000000000000000
r8=fffffe0006d41560 r9=000fffbffffffffd r10=fffff88006d415d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003367b55
STACK_TEXT:
fffff880`06d41528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`03367b55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88006d40b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112211-23103-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0324d000 PsLoadedModuleList = 0xfffff800`03492670
Debug session time: Tue Nov 22 18:19:43.930 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:08.179
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003352b55, fffff88004028b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003352b55, Address of the instruction which caused the bugcheck
Arg3: fffff88004028b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff88004028b40 -- (.cxr 0xfffff88004028b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff5556ab872 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff80003352b55 rsp=fffff88004029528 rbp=0000000000000000
r8=fffffe0004029560 r9=000fffbffffffffd r10=fffff880040295d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003352b55
STACK_TEXT:
fffff880`04029528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`03352b55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88004028b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112711-16426-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0321c000 PsLoadedModuleList = 0xfffff800`03461670
Debug session time: Sun Nov 27 17:57:18.897 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:05.145
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003321b55, fffff880072f0b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003321b55, Address of the instruction which caused the bugcheck
Arg3: fffff880072f0b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff880072f0b40 -- (.cxr 0xfffff880072f0b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff5557ba5c8 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff80003321b55 rsp=fffff880072f1528 rbp=0000000000000000
r8=fffffe00072f1560 r9=000fffbffffffffd r10=fffff880072f15d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003321b55
STACK_TEXT:
fffff880`072f1528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`03321b55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff880072f0b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\112711-17565-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03216000 PsLoadedModuleList = 0xfffff800`0345b670
Debug session time: Sun Nov 27 17:59:40.175 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:22.424
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000331bb55, fffff88007242b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000331bb55, Address of the instruction which caused the bugcheck
Arg3: fffff88007242b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff88007242b40 -- (.cxr 0xfffff88007242b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff5557b6bc8 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff8000331bb55 rsp=fffff88007243528 rbp=0000000000000000
r8=fffffe0007243560 r9=000fffbffffffffd r10=fffff880072435d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000331bb55
STACK_TEXT:
fffff880`07243528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`0331bb55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88007242b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\120911-18142-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03213000 PsLoadedModuleList = 0xfffff800`03458670
Debug session time: Fri Dec 9 14:37:12.262 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:07.136
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003318b55, fffff88009561b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003318b55, Address of the instruction which caused the bugcheck
Arg3: fffff88009561b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff88009561b40 -- (.cxr 0xfffff88009561b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff5558720c8 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff80003318b55 rsp=fffff88009562528 rbp=0000000000000000
r8=fffffe0009562560 r9=000fffbffffffffd r10=fffff880095625d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003318b55
STACK_TEXT:
fffff880`09562528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`03318b55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88009561b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\121311-28626-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03256000 PsLoadedModuleList = 0xfffff800`0349b670
Debug session time: Tue Dec 13 19:38:59.978 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:21.227
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000335bb55, fffff8800931fb40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000335bb55, Address of the instruction which caused the bugcheck
Arg3: fffff8800931fb40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff8800931fb40 -- (.cxr 0xfffff8800931fb40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff55586601d rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff8000335bb55 rsp=fffff88009320528 rbp=0000000000000000
r8=fffffe0009320560 r9=000fffbffffffffd r10=fffff880093205d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000335bb55
STACK_TEXT:
fffff880`09320528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`0335bb55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff8800931fb40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\121811-12573-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0321a000 PsLoadedModuleList = 0xfffff800`0345f670
Debug session time: Sun Dec 18 12:25:58.091 2011 (UTC - 7:00)
System Uptime: 0 days 22:34:58.005
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa800541db80, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+360e8 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa800541db80
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: SearchProtocol
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003306218 to fffff80003296c40
STACK_TEXT:
fffff880`099b8058 fffff800`03306218 : 00000000`0000001a 00000000`00041790 fffffa80`0541db80 00000000`0000ffff : nt!KeBugCheckEx
fffff880`099b8060 fffff800`03268596 : fffffa80`09b34060 fffffa80`00000024 fffff8a0`000000b0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x360e8
fffff880`099b8910 fffff800`0356cb1a : fffff8a0`10adb530 00000000`00000001 00000000`00000000 fffffa80`0dbf9610 : nt!MmCleanProcessAddressSpace+0x96
fffff880`099b8960 fffff800`0354e48c : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x56a
fffff880`099b8a60 fffff800`03295ed3 : fffffa80`09b34060 00000000`00000000 fffffa80`0dbf9610 00000000`00000000 : nt!NtTerminateProcess+0x138
fffff880`099b8ae0 00000000`775515da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0014f878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775515da
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+360e8
fffff800`03306218 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+360e8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+360e8
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+360e8
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-10966-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0321b000 PsLoadedModuleList = 0xfffff800`03460670
Debug session time: Tue Dec 20 04:04:26.785 2011 (UTC - 7:00)
System Uptime: 1 days 15:37:31.034
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 3ee2, f2a3009}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+398d6 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 0000000000003ee2
Arg4: 000000000f2a3009
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000330a5b6 to fffff80003297c40
STACK_TEXT:
fffff880`057e7868 fffff800`0330a5b6 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00003ee2 : nt!KeBugCheckEx
fffff880`057e7870 fffff800`032a4f19 : 00000000`00000000 fffffa80`0b83f4d0 00000000`00a67000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x398d6
fffff880`057e7980 fffff800`03295d6e : 00000000`00000001 00000000`18f60000 00000000`ec001201 00000000`0734c340 : nt!MmAccessFault+0x359
fffff880`057e7ae0 000007fe`f4358e71 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0207d950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f4358e71
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+398d6
fffff800`0330a5b6 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+398d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+398d6
BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+398d6
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-11060-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0321e000 PsLoadedModuleList = 0xfffff800`03463670
Debug session time: Tue Dec 20 18:54:07.134 2011 (UTC - 7:00)
System Uptime: 0 days 10:24:08.008
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8005e3db80, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+36024 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8005e3db80
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: SearchProtocol
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000330a150 to fffff8000329ac40
STACK_TEXT:
fffff880`0d10d748 fffff800`0330a150 : 00000000`0000001a 00000000`00041790 fffffa80`05e3db80 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0d10d750 fffff800`0326cb79 : ffffffff`00000000 00000000`003affff fffffa80`00000000 fffffa80`0c285060 : nt! ?? ::FNODOBFM::`string'+0x36024
fffff880`0d10d910 fffff800`03570b1a : fffff8a0`0aa4fa70 00000000`00000001 00000000`00000000 fffffa80`0c285060 : nt!MmCleanProcessAddressSpace+0x679
fffff880`0d10d960 fffff800`0355248c : 00000000`00000000 00000000`00000001 000007ff`fffdd000 00000000`00000000 : nt!PspExitThread+0x56a
fffff880`0d10da60 fffff800`03299ed3 : fffffa80`0c86c9e0 00000000`00000000 fffffa80`0c285060 00000000`00000000 : nt!NtTerminateProcess+0x138
fffff880`0d10dae0 00000000`76d715da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001ef958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d715da
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+36024
fffff800`0330a150 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+36024
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-11559-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03267000 PsLoadedModuleList = 0xfffff800`034ac670
Debug session time: Tue Dec 20 18:56:37.256 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:07.131
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000336cb55, fffff8800a913b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000336cb55, Address of the instruction which caused the bugcheck
Arg3: fffff8800a913b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff8800a913b40 -- (.cxr 0xfffff8800a913b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff5558db172 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff8000336cb55 rsp=fffff8800a914528 rbp=0000000000000000
r8=fffffe000a914560 r9=000fffbffffffffd r10=fffff8800a9145d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000336cb55
STACK_TEXT:
fffff880`0a914528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`0336cb55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff8800a913b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-12417-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03249000 PsLoadedModuleList = 0xfffff800`0348e670
Debug session time: Tue Dec 20 19:40:02.958 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:08.207
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000334eb55, fffff88008f26b40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000334eb55, Address of the instruction which caused the bugcheck
Arg3: fffff88008f26b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff88008f26b40 -- (.cxr 0xfffff88008f26b40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff555850d1d rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff8000334eb55 rsp=fffff88008f27528 rbp=0000000000000000
r8=fffffe0008f27560 r9=000fffbffffffffd r10=fffff88008f275d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000334eb55
STACK_TEXT:
fffff880`08f27528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`0334eb55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88008f26b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-13369-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03459670
Debug session time: Tue Dec 20 19:41:41.231 2011 (UTC - 7:00)
System Uptime: 0 days 0:00:41.105
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {1236, fffffa800c6dc1a0, fffffa800c6dc1f0, 195f3d}
Probably caused by : rdyboost.sys ( rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000001236, The subtype of the bugcheck.
Arg2: fffffa800c6dc1a0
Arg3: fffffa800c6dc1f0
Arg4: 0000000000195f3d
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_1236
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003383dab to fffff80003290c40
STACK_TEXT:
fffff880`0434f998 fffff800`03383dab : 00000000`0000001a 00000000`00001236 fffffa80`0c6dc1a0 fffffa80`0c6dc1f0 : nt!KeBugCheckEx
fffff880`0434f9a0 fffff880`01f07eb2 : fffffa80`099a1118 fffffa80`0c6dc1a0 fffffa80`099a1118 00000000`00000710 : nt!MmFreePagesFromMdl+0x31b
fffff880`0434fa00 fffff880`01f14952 : fffffa80`099a1118 00000000`00000003 fffff880`02ba1000 fffff880`02ba1000 : rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+0x4e
fffff880`0434fa60 fffff880`01f12d98 : fffffa80`00000004 00000000`00000712 00000000`00000710 fffffa80`099a5000 : rdyboost!ST_STORE<SMD_TRAITS>::StCompactionPerformInMem+0x28e
fffff880`0434faf0 fffff880`01f124b4 : fffffa80`099a1438 00000000`00000080 fffffa80`099a1438 fffff880`03569f40 : rdyboost!ST_STORE<SMD_TRAITS>::StCompactionWorker+0x68
fffff880`0434fb40 fffff880`01f1141a : fffffa80`099a1438 fffff880`0434fbe0 00000000`00000080 fffffa80`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0xc0
fffff880`0434fba0 fffff800`0352bfee : 00000000`00000000 fffff880`00000000 fffffa80`09897b60 fffffa80`06706040 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152
fffff880`0434fc00 fffff800`032825e6 : fffff880`03565180 fffffa80`09897b60 fffffa80`06725b60 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x5a
fffff880`0434fc40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e
fffff880`01f07eb2 33d2 xor edx,edx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7982e
FAILURE_BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e
BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\MD2be\122011-14258-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03265000 PsLoadedModuleList = 0xfffff800`034aa670
Debug session time: Tue Dec 20 19:43:51.325 2011 (UTC - 7:00)
System Uptime: 0 days 0:01:10.200
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000336ab55, fffff880098dfb40, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000336ab55, Address of the instruction which caused the bugcheck
Arg3: fffff880098dfb40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff880098dfb40 -- (.cxr 0xfffff880098dfb40)
rax=000fffbffffffffd rbx=000fffffffffffff rcx=02ffee7fffffff70
rdx=fffffff555884ac8 rsi=fffffa80065ec000 rdi=0000058000000000
rip=fffff8000336ab55 rsp=fffff880098e0528 rbp=0000000000000000
r8=fffffe00098e0560 r9=000fffbffffffffd r10=fffff880098e05d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02ffee7f`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000336ab55
STACK_TEXT:
fffff880`098e0528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`0336ab55 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff880098dfb40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
Please remove any CD/DVD virtualization software, such as Daemon Tools/Alcohol 120%, as they use a driver called sptd.sys that is known to cause BSODs. Use the