Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Richard\AppData\Local\Temp\Temp1_All .DMP 14-08.zip\081412-42791-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`05810000 PsLoadedModuleList = 0xfffff800`05a54670
Debug session time: Mon Aug 13 19:21:47.246 2012 (GMT-4)
System Uptime: 0 days 0:00:53.479
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {e3, fffff880041273b1, 13fc94130, 0}
Unable to load image NSKernel.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for NSKernel.sys
*** ERROR: Module load completed but symbols could not be loaded for NSKernel.sys
Probably caused by : [B]NSKernel.sys[/B] ( NSKernel+f3b1 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
[B]DRIVER_VERIFIER_DETECTED_VIOLATION[/B] (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000e3, Kernel Zw API called with user-mode address as parameter.
Arg2: fffff880041273b1, Address inside the driver making the incorrect API call.
Arg3: 000000013fc94130, User-mode address used as API parameter.
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc4_e3
FAULTING_IP:
NSKernel+f3b1
fffff880`041273b1 85c0 test eax,eax
FOLLOWUP_IP:
NSKernel+f3b1
fffff880`041273b1 85c0 test eax,eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WLIDSVC.EXE
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80005d153dc to fffff8000588f1c0
STACK_TEXT:
fffff880`0a9336f8 fffff800`05d153dc : 00000000`000000c4 00000000`000000e3 fffff880`041273b1 00000001`3fc94130 : nt!KeBugCheckEx
fffff880`0a933700 fffff800`05d15ec5 : fffffa80`07d81890 fffff800`05d1721e 00000000`0000027c fffff980`417acf80 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`0a933740 fffff800`05d1739e : 00000000`45524441 00000000`00001380 fffff880`0a933a60 fffff800`05d26f0d : nt!ViZwCheckAddress+0x35
fffff880`0a933780 fffff800`05d19c52 : fffff880`041273b1 fffff880`0a933a20 fffff980`417acf80 fffff880`04126d31 : nt!ViZwCheckUnicodeString+0x2e
fffff880`0a9337c0 fffff880`041273b1 : fffff980`3e096fe0 00000000`0000027c fffff880`0a933a20 00000000`00000000 : nt!VfZwQueryValueKey+0x42
fffff880`0a933810 fffff980`3e096fe0 : 00000000`0000027c fffff880`0a933a20 00000000`00000000 00000000`00001000 : NSKernel+0xf3b1
fffff880`0a933818 00000000`0000027c : fffff880`0a933a20 00000000`00000000 00000000`00001000 fffff880`0a933860 : 0xfffff980`3e096fe0
fffff880`0a933820 fffff880`0a933a20 : 00000000`00000000 00000000`00001000 fffff880`0a933860 00000000`00000000 : 0x27c
fffff880`0a933828 00000000`00000000 : 00000000`00001000 fffff880`0a933860 00000000`00000000 fffff880`0a933a60 : 0xfffff880`0a933a20
STACK_COMMAND: kb
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: NSKernel+f3b1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NSKernel
IMAGE_NAME: NSKernel.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4eb99f45
FAILURE_BUCKET_ID: X64_0xc4_e3_NSKernel+f3b1