Code:
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\Tervel\121811-22354-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03204000 PsLoadedModuleList = 0xfffff800`03449670
Debug session time: Sun Dec 18 08:26:39.077 2011 (UTC - 7:00)
System Uptime: 0 days 0:50:08.509
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, e87a001, 862c, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 000000000e87a001
Arg3: 000000000000862c
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800032d85a7 to fffff80003280c40
STACK_TEXT:
fffff880`08b0d7e8 fffff800`032d85a7 : 00000000`0000001a 00000000`00041284 00000000`0e87a001 00000000`0000862c : nt!KeBugCheckEx
fffff880`08b0d7f0 fffff800`032efe6c : fffffa80`015c0180 e2c00000`74008825 00000000`0e879000 c5300000`8f57f825 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`08b0d830 fffff800`032b4569 : fffff900`00000000 00000000`0ec5ffff fffff880`00000000 00000000`00001001 : nt! ?? ::FNODOBFM::`string'+0x35d20
fffff880`08b0d9f0 fffff800`03598221 : fffffa80`038e6010 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`08b0db10 fffff800`03598623 : 00000000`00000000 00000000`0e7c0000 fffffa80`00000001 00000000`00000001 : nt!MiUnmapViewOfSection+0x1b1
fffff880`08b0dbd0 fffff800`0327fed3 : fffffa80`05b96b60 fffff880`08b0dbd8 fffffa80`05971a60 00000000`7efdb000 : nt!NtUnmapViewOfSection+0x5f
fffff880`08b0dc20 00000000`775315ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000bdea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775315ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4ac3
fffff800`032d85a7 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4ac3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\Tervel\010912-33977-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Invalid directory table base value 0x0
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to load image Unknown_Module_53706341`0203008c, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_53706341`0203008c
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_53706341`0203008c
Debugger can not determine kernel base address
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03202000 PsLoadedModuleList = 0xfffff800`03447670
Debug session time: Mon Jan 9 11:15:01.960 2012 (UTC - 7:00)
System Uptime: 0 days 2:58:02.724
Unable to load image Unknown_Module_53706341`0203008c, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_53706341`0203008c
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_53706341`0203008c
Debugger can not determine kernel base address
Loading Kernel Symbols
.
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003544833, fffff88009cc30d0, 0}
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003544833, Address of the instruction which caused the bugcheck
Arg3: fffff88009cc30d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+6166363732346330
fffff800`03544833 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh
CONTEXT: fffff88009cc30d0 -- (.cxr 0xfffff88009cc30d0)
Unable to read context, Win32 error 0n30
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800032884a9 to fffff880041b97f2
STACK_TEXT:
fffff800`00b9cc98 fffff800`032884a9 : 00000000`0026be7a fffffa80`03d710a8 fffff800`03402cc0 00000000`00000001 : 0xfffff880`041b97f2
fffff800`00b9cca0 00000000`0026be7a : fffffa80`03d710a8 fffff800`03402cc0 00000000`00000001 fffff800`033f4e80 : 0xfffff800`032884a9
fffff800`00b9cca8 fffffa80`03d710a8 : fffff800`03402cc0 00000000`00000001 fffff800`033f4e80 fffff800`0328a167 : 0x26be7a
fffff800`00b9ccb0 fffff800`03402cc0 : 00000000`00000001 fffff800`033f4e80 fffff800`0328a167 00000006`50c47fe1 : 0xfffffa80`03d710a8
fffff800`00b9ccb8 00000000`00000001 : fffff800`033f4e80 fffff800`0328a167 00000006`50c47fe1 00000006`000a72f1 : 0xfffff800`03402cc0
fffff800`00b9ccc0 fffff800`033f4e80 : fffff800`0328a167 00000006`50c47fe1 00000006`000a72f1 00000006`50c47fe1 : 0x1
fffff800`00b9ccc8 fffff800`0328a167 : 00000006`50c47fe1 00000006`000a72f1 00000006`50c47fe1 00000000`000000f1 : 0xfffff800`033f4e80
fffff800`00b9ccd0 00000006`50c47fe1 : 00000006`000a72f1 00000006`50c47fe1 00000000`000000f1 fffffa80`03d71010 : 0xfffff800`0328a167
fffff800`00b9ccd8 00000006`000a72f1 : 00000006`50c47fe1 00000000`000000f1 fffffa80`03d71010 400000c2`400000c1 : 0x6`50c47fe1
fffff800`00b9cce0 00000006`50c47fe1 : 00000000`000000f1 fffffa80`03d71010 400000c2`400000c1 0000000f`400000c3 : 0x6`000a72f1
fffff800`00b9cce8 00000000`000000f1 : fffffa80`03d71010 400000c2`400000c1 0000000f`400000c3 00000005`8495f9ac : 0x6`50c47fe1
fffff800`00b9ccf0 fffffa80`03d71010 : 400000c2`400000c1 0000000f`400000c3 00000005`8495f9ac fffff800`00b96080 : 0xf1
fffff800`00b9ccf8 400000c2`400000c1 : 0000000f`400000c3 00000005`8495f9ac fffff800`00b96080 fffffa80`024b8890 : 0xfffffa80`03d71010
fffff800`00b9cd00 0000000f`400000c3 : 00000005`8495f9ac fffff800`00b96080 fffffa80`024b8890 00000000`00000000 : 0x400000c2`400000c1
fffff800`00b9cd08 00000005`8495f9ac : fffff800`00b96080 fffffa80`024b8890 00000000`00000000 00001942`8c4ae6fa : 0xf`400000c3
fffff800`00b9cd10 fffff800`00b96080 : fffffa80`024b8890 00000000`00000000 00001942`8c4ae6fa 00001942`8c4aeeb8 : 0x5`8495f9ac
fffff800`00b9cd18 fffffa80`024b8890 : 00000000`00000000 00001942`8c4ae6fa 00001942`8c4aeeb8 fffff800`032818a4 : 0xfffff800`00b96080
fffff800`00b9cd20 00000000`00000000 : 00001942`8c4ae6fa 00001942`8c4aeeb8 fffff800`032818a4 fffff800`00b96080 : 0xfffffa80`024b8890
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\Tervel\011112-22401-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0325c000 PsLoadedModuleList = 0xfffff800`034a1670
Debug session time: Wed Jan 11 07:14:13.788 2012 (UTC - 7:00)
System Uptime: 0 days 1:39:09.567
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {7, 8547e, 1, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3824b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 000000000008547e, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000334a140 to fffff800032d8c40
STACK_TEXT:
fffff880`03364988 fffff800`0334a140 : 00000000`0000004e 00000000`00000007 00000000`0008547e 00000000`00000001 : nt!KeBugCheckEx
fffff880`03364990 fffff800`03273b64 : fffffa80`02db0010 00000000`00000000 00000000`00000000 fffffa80`024cd040 : nt! ?? ::FNODOBFM::`string'+0x3824b
fffff880`03364a70 fffff800`03273ba6 : 00000000`00000001 00000000`00000000 fffff800`03479260 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x54
fffff880`03364aa0 fffff800`03284d85 : fffffa80`024cd040 00000000`0b6c4000 00000000`0b6c4000 fffff800`03479260 : nt!MmWaitForCacheManagerPrefetch+0x1e
fffff880`03364ad0 fffff800`0331e98e : fffffa80`035ab3a0 fffffa80`00000000 fffffa80`00000005 00000000`00000001 : nt!CcPerformReadAhead+0x341
fffff880`03364c00 fffff800`032e3001 : fffffa80`024ffd60 fffff800`035cf901 fffff800`034da8d0 fffff800`00000002 : nt!CcWorkerThread+0x21e
fffff880`03364cb0 fffff800`03573fee : 00000000`00000000 fffffa80`024cd040 00000000`00000080 fffffa80`024b8890 : nt!ExpWorkerThread+0x111
fffff880`03364d40 fffff800`032ca5e6 : fffff880`03163180 fffffa80`024cd040 fffff880`0316dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03364d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+3824b
fffff800`0334a140 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3824b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+3824b
BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+3824b
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\Tervel\011212-21715-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0324c000 PsLoadedModuleList = 0xfffff800`03491670
Debug session time: Thu Jan 12 06:32:40.355 2012 (UTC - 7:00)
System Uptime: 0 days 0:19:03.744
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800032c7ee0, fffff8800862e240, 0}
Probably caused by : hardware ( nt!KiSystemServiceExit+5 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800032c7ee0, Address of the instruction which caused the bugcheck
Arg3: fffff8800862e240, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiSystemServiceExit+5
fffff800`032c7ee0 0000 add byte ptr [rax],al
CONTEXT: fffff8800862e240 -- (.cxr 0xfffff8800862e240)
rax=0000000000000000 rbx=fffffa80035e4300 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000006c0f900 rdi=0000000000000000
rip=fffff800032c7ee0 rsp=fffff8800862ec00 rbp=fffff8800862ec00
r8=fffffa800326f000 r9=0000000000000000 r10=fffffffffffffffe
r11=fffffa8004e76a20 r12=00000000fff2c000 r13=0000000003e5fd20
r14=0000000003e5ef10 r15=0000000073212450
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=0000 efl=00010286
nt!KiSystemServiceExit+0x5:
fffff800`032c7ee0 0000 add byte ptr [rax],al ds:002b:00000000`00000000=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!KiSystemServiceExit+5
fffff800`032c7ee0 0000 add byte ptr [rax],al
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800032c7ee0
STACK_TEXT:
fffff880`0862ec00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x5
FOLLOWUP_IP:
nt!KiSystemServiceExit+5
fffff800`032c7ee0 0000 add byte ptr [rax],al
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiSystemServiceExit+5
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff8800862e240 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Your bluescreen crash files are inconclusive, but point to a hardware problem.