Microsoft (R) Windows Debugger Version 6.8.0004.0 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\MEMORY051208.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: srv*c:\programfiler\Debugging Tools for Windows\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 2600.xpsp_sp2_gdr.070227-2254 Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620 Debug session time: Mon May 12 16:14:11.031 2008 (GMT+2) System Uptime: 0 days 6:01:17.596 Loading Kernel Symbols .................................................................................................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 7ffdb00c). Type ".hh dbgerr001" for details Loading unloaded module list ................................ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {20000c, 2, 0, 804dc406} PEB is paged out (Peb.Ldr = 7ffdb00c). Type ".hh dbgerr001" for details PEB is paged out (Peb.Ldr = 7ffdb00c). Type ".hh dbgerr001" for details Probably caused by : ntoskrnl.exe ( nt!KiTimerListExpire+ab ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0020000c, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 804dc406, address which referenced memory Debugging Details: ------------------ PEB is paged out (Peb.Ldr = 7ffdb00c). Type ".hh dbgerr001" for details PEB is paged out (Peb.Ldr = 7ffdb00c). Type ".hh dbgerr001" for details READ_ADDRESS: 0020000c CURRENT_IRQL: 2 FAULTING_IP: nt!KiTimerListExpire+ab 804dc406 8b470c mov eax,dword ptr [edi+0Ch] DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: wmplayer.exe TRAP_FRAME: f78a6e2c -- (.trap 0xfffffffff78a6e2c) ErrCode = 00000000 eax=00000000 ebx=f78a6eb0 ecx=f78a6e88 edx=8a1436a0 esi=899d9e98 edi=00200000 eip=804dc406 esp=f78a6ea0 ebp=f78a6fa4 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 nt!KiTimerListExpire+0xab: 804dc406 8b470c mov eax,dword ptr [edi+0Ch] ds:0023:0020000c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 804dc406 to 804e187f STACK_TEXT: f78a6e2c 804dc406 badb0d00 8a1436a0 8ba36f48 nt!KiTrap0E+0x233 f78a6fa4 804dc378 78dac04d 00000032 ffdff000 nt!KiTimerListExpire+0xab f78a6fd0 804dbbd4 80559480 00000000 00152b66 nt!KiTimerExpiration+0xaf f78a6ff4 804db89e b6d4dd44 00000000 00000000 nt!KiRetireDpcList+0x46 f78a6ff8 b6d4dd44 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a WARNING: Frame IP not in any known module. Following frames may be wrong. 804db89e 00000000 00000009 bb835675 00000128 0xb6d4dd44 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiTimerListExpire+ab 804dc406 8b470c mov eax,dword ptr [edi+0Ch] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiTimerListExpire+ab FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntoskrnl.exe DEBUG_FLR_IMAGE_TIMESTAMP: 45e54711 FAILURE_BUCKET_ID: 0xA_VRF_nt!KiTimerListExpire+ab BUCKET_ID: 0xA_VRF_nt!KiTimerListExpire+ab Followup: MachineOwner --------- kd> !thread THREAD 8a1436a0 Cid 07cc.0d7c Teb: 7ffa9000 Win32Thread: e48b04b8 RUNNING on processor 0 Not impersonating DeviceMap e23ade88 Owning Process 89b71468 Image: wmplayer.exe Wait Start TickCount 1387366 Ticks: 0 Context Switch Count 28419 LargeStack UserTime 00:00:22.078 KernelTime 00:00:02.328 Win32 Start Address 0x77c2a341 Start Address 0x7c810659 Stack Init b6d4e000 Current b6d4dd34 Base b6d4e000 Limit b6d4a000 Call 0 Priority 8 BasePriority 8 PriorityDecrement 0 DecrementCount 16 ChildEBP RetAddr Args to Child f78a6e2c 804dc406 badb0d00 8a1436a0 8ba36f48 nt!KiTrap0E+0x233 (FPO: [0,0] TrapFrame @ f78a6e2c) f78a6fa4 804dc378 78dac04d 00000032 ffdff000 nt!KiTimerListExpire+0xab (FPO: [Non-Fpo]) f78a6fd0 804dbbd4 80559480 00000000 00152b66 nt!KiTimerExpiration+0xaf (FPO: [Non-Fpo]) f78a6ff4 804db89e b6d4dd44 00000000 00000000 nt!KiRetireDpcList+0x46 (FPO: [0,0,0]) f78a6ff8 b6d4dd44 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a (FPO: [Uses EBP] [0,0,1]) WARNING: Frame IP not in any known module. Following frames may be wrong. 804db89e 00000000 00000009 bb835675 00000128 0xb6d4dd44