these crashes were caused by memory corruption. Because of which I would download memtestx86 for at least 5 passes
Let us know the results
Ken
Code:
Loading Dump File [C:\Users\K\Desktop\040310-17534-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Fri Apr 2 19:16:19.463 2010 (GMT-4)
System Uptime: 0 days 13:04:36.351
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff96000172ac0, fffff8800387f0c0, 0}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff96000172ac0, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800387f0c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!TimersProc+60
fffff960`00172ac0 8900 mov dword ptr [rax],eax
CONTEXT: fffff8800387f0c0 -- (.cxr 0xfffff8800387f0c0)
rax=000000000f99a027 rbx=0000000000000000 rcx=0000000002ce53f7
rdx=0000000000000000 rsi=000000007fffffff rdi=fffff900c39c1ea8
rip=fffff96000172ac0 rsp=fffff8800387faa0 rbp=000000000000000f
r8=fffffa8006141968 r9=0000000000000000 r10=fffffffffffffffd
r11=0000000014b8e830 r12=0000000000000000 r13=fffff9600038f2c0
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010216
win32k!TimersProc+0x60:
fffff960`00172ac0 8900 mov dword ptr [rax],eax ds:002b:00000000`0f99a027=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960001735d4 to fffff96000172ac0
STACK_TEXT:
fffff880`0387faa0 fffff960`001735d4 : 00000000`00000000 fffff960`0038fa90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x60
fffff880`0387faf0 fffff960`00104714 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`800002b8 : win32k!RawInputThread+0x9b4
fffff880`0387fbc0 fffff960`00183ea6 : fffffa80`00000002 fffff880`03864f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`0387fbf0 fffff800`02a8f153 : fffffa80`06220760 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`0387fc20 000007fe`fd393d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01dcfaf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd393d3a
CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32k
5 errors : !win32k (fffff96000172ac1-fffff96000172af1)
fffff96000172ac0 89 *00 e2 c7 21 00 e9 f6 00 00 00 48 8d 5f e8 0f ....!......H._..
fffff96000172ad0 0d *00 40 8b 53 48 f6 c2 20 *00 85 df 00 00 00 0f ..@.SH.. .......
fffff96000172ae0 ba *00 48 03 0f 82 cd 00 00 00 8b 4b 40 8b c1 2b ..H........K@..+
fffff96000172af0 c5 *00 43 40 3b cd 0f 87 bb 00 00 00 8b 43 44 89 ..C@;........CD.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff8800387f0c0 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff96000172ac0, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800387f0c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!TimersProc+60
fffff960`00172ac0 8900 mov dword ptr [rax],eax
CONTEXT: fffff8800387f0c0 -- (.cxr 0xfffff8800387f0c0)
rax=000000000f99a027 rbx=0000000000000000 rcx=0000000002ce53f7
rdx=0000000000000000 rsi=000000007fffffff rdi=fffff900c39c1ea8
rip=fffff96000172ac0 rsp=fffff8800387faa0 rbp=000000000000000f
r8=fffffa8006141968 r9=0000000000000000 r10=fffffffffffffffd
r11=0000000014b8e830 r12=0000000000000000 r13=fffff9600038f2c0
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010216
win32k!TimersProc+0x60:
fffff960`00172ac0 8900 mov dword ptr [rax],eax ds:002b:00000000`0f99a027=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960001735d4 to fffff96000172ac0
STACK_TEXT:
fffff880`0387faa0 fffff960`001735d4 : 00000000`00000000 fffff960`0038fa90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x60
fffff880`0387faf0 fffff960`00104714 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`800002b8 : win32k!RawInputThread+0x9b4
fffff880`0387fbc0 fffff960`00183ea6 : fffffa80`00000002 fffff880`03864f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`0387fbf0 fffff800`02a8f153 : fffffa80`06220760 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`0387fc20 000007fe`fd393d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01dcfaf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd393d3a
CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32k
5 errors : !win32k (fffff96000172ac1-fffff96000172af1)
fffff96000172ac0 89 *00 e2 c7 21 00 e9 f6 00 00 00 48 8d 5f e8 0f ....!......H._..
fffff96000172ad0 0d *00 40 8b 53 48 f6 c2 20 *00 85 df 00 00 00 0f ..@.SH.. .......
fffff96000172ae0 ba *00 48 03 0f 82 cd 00 00 00 8b 4b 40 8b c1 2b ..H........K@..+
fffff96000172af0 c5 *00 43 40 3b cd 0f 87 bb 00 00 00 8b 43 44 89 ..C@;........CD.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff8800387f0c0 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff96000172ac0, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800387f0c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!TimersProc+60
fffff960`00172ac0 8900 mov dword ptr [rax],eax
CONTEXT: fffff8800387f0c0 -- (.cxr 0xfffff8800387f0c0)
rax=000000000f99a027 rbx=0000000000000000 rcx=0000000002ce53f7
rdx=0000000000000000 rsi=000000007fffffff rdi=fffff900c39c1ea8
rip=fffff96000172ac0 rsp=fffff8800387faa0 rbp=000000000000000f
r8=fffffa8006141968 r9=0000000000000000 r10=fffffffffffffffd
r11=0000000014b8e830 r12=0000000000000000 r13=fffff9600038f2c0
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010216
win32k!TimersProc+0x60:
fffff960`00172ac0 8900 mov dword ptr [rax],eax ds:002b:00000000`0f99a027=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960001735d4 to fffff96000172ac0
STACK_TEXT:
fffff880`0387faa0 fffff960`001735d4 : 00000000`00000000 fffff960`0038fa90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x60
fffff880`0387faf0 fffff960`00104714 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`800002b8 : win32k!RawInputThread+0x9b4
fffff880`0387fbc0 fffff960`00183ea6 : fffffa80`00000002 fffff880`03864f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`0387fbf0 fffff800`02a8f153 : fffffa80`06220760 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`0387fc20 000007fe`fd393d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01dcfaf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd393d3a
CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32k
5 errors : !win32k (fffff96000172ac1-fffff96000172af1)
fffff96000172ac0 89 *00 e2 c7 21 00 e9 f6 00 00 00 48 8d 5f e8 0f ....!......H._..
fffff96000172ad0 0d *00 40 8b 53 48 f6 c2 20 *00 85 df 00 00 00 0f ..@.SH.. .......
fffff96000172ae0 ba *00 48 03 0f 82 cd 00 00 00 8b 4b 40 8b c1 2b ..H........K@..+
fffff96000172af0 c5 *00 43 40 3b cd 0f 87 bb 00 00 00 8b 43 44 89 ..C@;........CD.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff8800387f0c0 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------