Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\051810-19125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\cache*http:
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50
Debug session time: Tue May 18 12:51:12.949 2010 (GMT+2)
System Uptime: 0 days 4:12:41.884
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck DE, {2, fffff8a0069a6580, 7000555545550405, 2aaab8c0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2d2a0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
POOL_CORRUPTION_IN_FILE_AREA (de)
A driver corrupted pool memory used for holding pages destined for disk.
This was discovered by the memory manager when dereferencing the file.
Arguments:
Arg1: 0000000000000002
Arg2: fffff8a0069a6580
Arg3: 7000555545550405
Arg4: 000000002aaab8c0
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xDE
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002a1f3d3 to fffff80002a7a600
STACK_TEXT:
fffff880`08541d18 fffff800`02a1f3d3 : 00000000`000000de 00000000`00000002 fffff8a0`069a6580 70005555`45550405 : nt!KeBugCheckEx
fffff880`08541d20 fffff800`02a5fa6e : 00000000`00000000 fffffa80`030b6e00 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2d2a0
fffff880`08541e10 fffff880`012a6447 : fffffa80`02679b68 00000000`00000000 fffff8a0`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0x172
fffff880`08541e80 fffff880`012bfc0a : fffff880`085426f0 fffff8a0`067ba930 fffff8a0`0185b140 fffff880`0854217c : Ntfs!NtfsDeleteFile+0x57b
fffff880`08542100 fffff880`0122daa9 : 00000000`00000000 fffff880`0107278c fffff880`08542650 fffff880`08531000 : Ntfs!NtfsCommonCleanup+0x15da
fffff880`08542510 fffff800`02a89d4a : fffff880`08542650 00000000`00000002 fffffa80`04df48e0 fffff800`02baf2dd : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`08542540 fffff880`0122d662 : fffff880`0122da90 fffff880`08542650 fffff880`08542900 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`08542620 fffff880`012cf244 : fffff880`085426f0 fffff880`085426f0 fffff880`085426f0 00000000`00000000 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`08542690 fffff880`0102823f : fffff880`085426f0 fffffa80`03207620 fffffa80`032079c0 fffffa80`058b9c60 : Ntfs!NtfsFsdCleanup+0x144
fffff880`08542900 fffff880`010266df : fffffa80`034b44e0 00000000`00000000 fffffa80`02e96500 fffffa80`03207620 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`08542990 fffff800`02d919af : fffffa80`03207620 fffffa80`055deb30 00000000`00000000 fffffa80`031eea90 : fltmgr!FltpDispatch+0xcf
fffff880`085429f0 fffff800`02d77604 : 00000000`00000000 fffffa80`055deb30 fffffa80`03200100 fffffa80`031eea90 : nt!IopCloseFile+0x11f
fffff880`08542a80 fffff800`02d914a1 : fffffa80`055deb30 fffffa80`00000001 fffff8a0`01778da0 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`08542b00 fffff800`02d913b4 : 00000000`00000d64 fffffa80`055deb30 fffff8a0`01778da0 00000000`00000d64 : nt!ObpCloseHandleTableEntry+0xb1
fffff880`08542b90 fffff800`02a79853 : fffffa80`04e44b60 fffff880`08542c60 00000000`7efdb000 00000000`7efdb000 : nt!ObpCloseHandle+0x94
fffff880`08542be0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+2d2a0
fffff800`02a1f3d3 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2d2a0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0xDE_nt!_??_::FNODOBFM::_string_+2d2a0
BUCKET_ID: X64_0xDE_nt!_??_::FNODOBFM::_string_+2d2a0
Followup: MachineOwner
---------