debugging list hope this helps
Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\121514-68780-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*DownstreamStore*http://msdl.microsoft.com/download/symbols
Symbol search path is: srv*DownstreamStore*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff80003a60000 PsLoadedModuleList = 0xfffff80003ca3890
Debug session time: Mon Dec 15 10:34:42.069 2014 (UTC + 11:00)
System Uptime: 0 days 0:20:33.896
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8005d8a6f0, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+35084 )
Followup: MachineOwner
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8005d8a6f0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff80003b46d50 to fffff80003ad5bc0
STACK_TEXT:
fffff8800e36df78 fffff80003b46d50 : 000000000000001a 0000000000041790 fffffa8005d8a6f0 000000000000ffff : nt!KeBugCheckEx
fffff8800e36df80 fffff80003aa6e75 : ffffffff00000000 000000002f99ffff fffffa8000000000 fffffa8018a67060 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff8800e36e140 fffff80003dab05a : fffff8a018ab8060 fffff8800e36e480 0000000000000000 fffffa8018a67060 : nt!MmCleanProcessAddressSpace+0x679
fffff8800e36e190 fffff80003d8fb7d : 00000000c0000420 fffff8800e36ec01 000000007ef32000 fffffa8018c84060 : nt!PspExitThread+0x56a
fffff8800e36e290 fffff80003ac86fa : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!PsExitSpecialApc+0x1d
fffff8800e36e2c0 fffff80003ac8a40 : 0000000018c6e0b0 fffff8800e36e340 fffff80003d8faf0 0000000000000001 : nt!KiDeliverApc+0x2ca
fffff8800e36e340 fffff80003ad4ef7 : fffffa8018a67060 000000007ef32000 0000000000000020 0000000000000020 : nt!KiInitiateUserApc+0x70
fffff8800e36e480 0000000076d811d6 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceExit+0x9c
0000000018c6e030 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x76d811d6
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+35084
fffff800`03b46d50 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
IMAGE_VERSION: 6.1.7601.18409
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35084
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35084
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_41790_nt!_??_::fnodobfm::_string_+35084
FAILURE_ID_HASH: {f6a6ed79-e275-9f8c-d5a4-3a37a32b0b4e}
Followup: MachineOwner
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8005d8a6f0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff80003b46d50 to fffff80003ad5bc0
STACK_TEXT:
fffff8800e36df78 fffff80003b46d50 : 000000000000001a 0000000000041790 fffffa8005d8a6f0 000000000000ffff : nt!KeBugCheckEx
fffff8800e36df80 fffff80003aa6e75 : ffffffff00000000 000000002f99ffff fffffa8000000000 fffffa8018a67060 : nt! ?? ::FNODOBFM::`string'+0x35084
fffff8800e36e140 fffff80003dab05a : fffff8a018ab8060 fffff8800e36e480 0000000000000000 fffffa8018a67060 : nt!MmCleanProcessAddressSpace+0x679
fffff8800e36e190 fffff80003d8fb7d : 00000000c0000420 fffff8800e36ec01 000000007ef32000 fffffa8018c84060 : nt!PspExitThread+0x56a
fffff8800e36e290 fffff80003ac86fa : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!PsExitSpecialApc+0x1d
fffff8800e36e2c0 fffff80003ac8a40 : 0000000018c6e0b0 fffff8800e36e340 fffff80003d8faf0 0000000000000001 : nt!KiDeliverApc+0x2ca
fffff8800e36e340 fffff80003ad4ef7 : fffffa8018a67060 000000007ef32000 0000000000000020 0000000000000020 : nt!KiInitiateUserApc+0x70
fffff8800e36e480 0000000076d811d6 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceExit+0x9c
0000000018c6e030 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x76d811d6
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+35084
fffff800`03b46d50 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35084
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
IMAGE_VERSION: 6.1.7601.18409
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35084
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35084
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_41790_nt!_??_::fnodobfm::_string_+35084
FAILURE_ID_HASH: {f6a6ed79-e275-9f8c-d5a4-3a37a32b0b4e}
Followup: MachineOwner