Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini061410-03.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: C:\Symbole Executable search path is: Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 2600.xpsp_sp3_gdr.100216-1514 Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720 Debug session time: Mon Jun 14 13:06:03.953 2010 (GMT+2) System Uptime: 0 days 3:20:45.670 Loading Kernel Symbols ............................................................... ......................................................... Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 100000D1, {0, 1c, 1, 8714400c} *** ERROR: Symbol file could not be found. Defaulted to export symbols for win32k.sys - Unable to load image kwpcafog.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for kwpcafog.sys *** ERROR: Module load completed but symbols could not be loaded for kwpcafog.sys Probably caused by : kwpcafog.sys ( kwpcafog+22c7 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000, memory referenced Arg2: 0000001c, IRQL Arg3: 00000001, value 0 = read operation, 1 = write operation Arg4: 8714400c, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: 00000000 CURRENT_IRQL: 1c FAULTING_IP: +22c7 8714400c 3000 xor byte ptr [eax],al CUSTOMER_CRASH_COUNT: 3 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: dtqj0qou.exe UNALIGNED_STACK_POINTER: b5521b33 LAST_CONTROL_TRANSFER: from 521b7487 to 8714400c SYMBOL_ON_RAW_STACK: 1 STACK_ADDR_RAW_STACK_SYMBOL: ffffffffb5521c28 STACK_COMMAND: dds B5521C28-0x20 ; kb STACK_TEXT: b5521c08 00000200 b5521c0c 00000000 b5521c10 8a5c6028 b5521c14 00000000 b5521c18 b5521ce4 b5521c1c b5521ce4 b5521c20 00000000 b5521c24 b4c0b2c7 kwpcafog+0x22c7 b5521c28 00000000 b5521c2c 0000004a b5521c30 0032f310 b5521c34 b5521bc4 b5521c38 00000400 b5521c3c b5521cf8 b5521c40 bf989143 win32k!HT_ComputeRGBGammaTable+0x9fa9 b5521c44 bf992b90 win32k!HT_ComputeRGBGammaTable+0x139f6 b5521c48 ffffffff b5521c4c b5521c98 b5521c50 bf8141ba win32k!EngDeleteSurface+0x906 b5521c54 bc69f548 b5521c58 0000000c b5521c5c 00000000 b5521c60 e32b9950 b5521c64 e10db870 b5521c68 e2c15890 b5521c6c 00000000 b5521c70 b5521d64 b5521c74 bf80ee66 win32k!EngFreeUserMem+0x5bd0 b5521c78 b5521ce4 b5521c7c 8a435020 b5521c80 87366370 b5521c84 010000c6 FOLLOWUP_IP: kwpcafog+22c7 b4c0b2c7 ?? ??? SYMBOL_NAME: kwpcafog+22c7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: kwpcafog IMAGE_NAME: kwpcafog.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4b274f8d FAILURE_BUCKET_ID: 0xD1_kwpcafog+22c7 BUCKET_ID: 0xD1_kwpcafog+22c7 Followup: MachineOwner ---------