Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini082410-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:/Symbole*http://msdl.microsoft.com/download/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 2600.xpsp_sp3_gdr.100216-1514 Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720 Debug session time: Tue Aug 24 10:58:08.218 2010 (GMT+2) System Uptime: 0 days 0:05:43.826 Loading Kernel Symbols ............................................................... ......................................................... Loading User Symbols Loading unloaded module list .......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 10000050, {ccefa205, 0, ba712df5, 0} Unable to load image aswMon2.SYS, Win32 error 0n2 *** WARNING: Unable to verify timestamp for aswMon2.SYS *** ERROR: Module load completed but symbols could not be loaded for aswMon2.SYS Could not read faulting driver name Probably caused by : aswMon2.SYS ( aswMon2+6a99 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ccefa205, memory referenced. Arg2: 00000000, value 0 = read operation, 1 = write operation. Arg3: ba712df5, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: ccefa205 FAULTING_IP: fltMgr!FltpPerformFastIoCall+d ba712df5 8b7004 mov esi,dword ptr [eax+4] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: firefox.exe LAST_CONTROL_TRANSFER: from ba71eb99 to ba712df5 STACK_TEXT: b4b57bec ba71eb99 00000004 00000000 b4b57c1c fltMgr!FltpPerformFastIoCall+0xd b4b57c3c b577ca99 8a4d9970 b4b57cd4 00004000 fltMgr!FltpFastIoWrite+0xa9 WARNING: Stack unwind information not available. Following frames may be wrong. b4b57c90 8057d1fd 8a4d9970 b4b57cd4 00004000 aswMon2+0x6a99 b4b57d38 8054163c 0000027c 00000000 00000000 nt!NtWriteFile+0x30b b4b57d38 7c90e514 0000027c 00000000 00000000 nt!KiFastCallEntry+0xfc 1caefd50 00000000 00000000 00000000 00000000 0x7c90e514 STACK_COMMAND: kb FOLLOWUP_IP: aswMon2+6a99 b577ca99 ?? ??? SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: aswMon2+6a99 FOLLOWUP_NAME: MachineOwner MODULE_NAME: aswMon2 IMAGE_NAME: aswMon2.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4aaf72cc FAILURE_BUCKET_ID: 0x50_aswMon2+6a99 BUCKET_ID: 0x50_aswMon2+6a99 Followup: MachineOwner ---------