Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini032413-03.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: http://msdl.microsoft.com/download/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 2600.xpsp_sp3_gdr.130107-0416 Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b2c0 Debug session time: Sun Mar 24 14:01:31.031 2013 (GMT+1) System Uptime: 0 days 0:49:09.625 Loading Kernel Symbols ............................................................... ............................................... Loading User Symbols Loading unloaded module list ............ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000000A, {cf5c4, 1c, 1, 804e3340} Unable to load image intelppm.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for intelppm.sys *** ERROR: Module load completed but symbols could not be loaded for intelppm.sys Probably caused by : memory_corruption Followup: memory_corruption --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000cf5c4, memory referenced Arg2: 0000001c, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 804e3340, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: 000cf5c4 CURRENT_IRQL: 1c FAULTING_IP: nt!KeUpdateRunTime+6 804e3340 ff80c4052d00 inc dword ptr [eax+2D05C4h] CUSTOMER_CRASH_COUNT: 3 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: Idle LAST_CONTROL_TRANSFER: from 804e3306 to 804e3340 STACK_TEXT: 80550fac 804e3306 8929f602 8929f602 000000d1 nt!KeUpdateRunTime+0x6 80550fac f7529162 8929f602 8929f602 000000d1 nt!KeUpdateSystemTime+0x137 WARNING: Stack unwind information not available. Following frames may be wrong. 80551030 ffdffc70 80515711 ffdff000 80559d20 intelppm+0x2162 80551050 804dbb37 00000000 0000000e 00000000 0xffdffc70 80551054 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x10 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (804e3344-804e335c) 804e3340 ff 80 c4 05 *2d 00 8b 98 24 01 00 00 *31 4b 44 f7 ....-...$...1KD. 804e3350 45 70 00 00 *32 00 75 42 f6 45 6c 01 *49 3c ba 00 Ep..2.uB.El.I<.. MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption ---------