Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\053111-21216-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631 Machine Name: Kernel base = 0xfffff800`03255000 PsLoadedModuleList = 0xfffff800`0349a650 Debug session time: Tue May 31 21:22:45.054 2011 (UTC + 2:00) System Uptime: 0 days 1:04:14.880 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff800035ac7fd, fffff8800c6d7920, 0} Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+46d ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff800035ac7fd, Address of the instruction which caused the bugcheck Arg3: fffff8800c6d7920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - La instrucci n en 0x%08lx hace referencia a la memoria en 0x%08lx. La memoria no se pudo %s. FAULTING_IP: nt!ObpQueryNameString+46d fffff800`035ac7fd 488b4c2448 mov rcx,qword ptr [rsp+48h] CONTEXT: fffff8800c6d7920 -- (.cxr 0xfffff8800c6d7920) rax=0000000000000034 rbx=fffff8a009b4dad0 rcx=fffff8a000004c80 rdx=000000000008dfe0 rsi=0000000000000001 rdi=0000000000000000 rip=fffff800035ac7fd rsp=fffff8800c6d8300 rbp=0000000000000078 r8=0000000000000210 r9=fffff8800c6d8458 r10=0000000000000000 r11=000000000000000f r12=0000000000000011 r13=fffff80003255000 r14=000000000008dfe0 r15=fffff8a009b4daf0 iopl=0 nv up ei pl nz ac pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010212 nt!ObpQueryNameString+0x46d: fffff800`035ac7fd 488b4c2448 mov rcx,qword ptr [rsp+48h] ss:0018:fffff880`0c6d8348=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: Sf.bin CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800035ac7fd STACK_TEXT: fffff880`0c6d8300 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpQueryNameString+0x46d FOLLOWUP_IP: nt!ObpQueryNameString+46d fffff800`035ac7fd 488b4c2448 mov rcx,qword ptr [rsp+48h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ObpQueryNameString+46d FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b STACK_COMMAND: .cxr 0xfffff8800c6d7920 ; kb FAILURE_BUCKET_ID: X64_0x3B_nt!ObpQueryNameString+46d BUCKET_ID: X64_0x3B_nt!ObpQueryNameString+46d Followup: MachineOwner ---------