Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Temp\Rar$DI00.026\103110-28953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0301f000 PsLoadedModuleList = 0xfffff800`0325ce50
Debug session time: Sun Oct 31 13:34:27.566 2010 (UTC - 4:00)
System Uptime: 0 days 3:34:33.783
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {3452, 2fdf000, fffff700011087a8, 86400000bfe87424}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339e3 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003452, The subtype of the bugcheck.
Arg2: 0000000002fdf000
Arg3: fffff700011087a8
Arg4: 86400000bfe87424
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_3452
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003103073 to fffff8000308f740
STACK_TEXT:
fffff880`06fcf068 fffff800`03103073 : 00000000`0000001a 00000000`00003452 00000000`02fdf000 fffff700`011087a8 : nt!KeBugCheckEx
fffff880`06fcf070 fffff800`0306268a : fffffa80`06a49060 fffffa80`00000000 fffff8a0`00009c1e fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x339e3
fffff880`06fcf920 fffff800`03374dcf : fffff8a0`08098830 fffff880`06fcfc20 00000000`00000000 fffffa80`06a1cb60 : nt!MmCleanProcessAddressSpace+0x96
fffff880`06fcf970 fffff800`0334d635 : 00000000`000000ff fffff8a0`00f8d401 00000000`7efad000 fffffa80`06a12b60 : nt!PspExitThread+0x92f
fffff880`06fcfa30 fffff800`0306c1db : 00000000`7efad000 fffffa80`0a4fa060 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`06fcfa60 fffff800`0306c620 : 00000000`0fe3f948 fffff880`06fcfae0 fffff800`0334d74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`06fcfae0 fffff800`0308ea37 : fffffa80`06a1cb60 00000000`7efad000 00000000`000000c0 00000000`7efad000 : nt!KiInitiateUserApc+0x70
fffff880`06fcfc20 00000000`779a165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0747e5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a165a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+339e3
fffff800`03103073 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339e3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_3452_nt!_??_::FNODOBFM::_string_+339e3
BUCKET_ID: X64_0x1a_3452_nt!_??_::FNODOBFM::_string_+339e3
Followup: MachineOwner
---------