this is what I get when I open the file with WinDbg
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\\Desktop\Mini081909-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x80554040
Debug session time: Wed Aug 19 14:15:56.390 2009 (GMT-4)
System Uptime: 0 days 5:49:49.984
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
...........
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {4, 2, 0, 8051efe7}
Probably caused by : memory_corruption ( nt!MmProbeAndLockSelectedPages+165 )
Followup: MachineOwner
---------
kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8051efe7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000004
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmProbeAndLockSelectedPages+165
8051efe7 f6400401 test byte ptr [eax+4],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: iexplore.exe
LAST_CONTROL_TRANSFER: from 00000000 to 8051efe7
STACK_TEXT:
b3a2c308 00000000 c00c1910 c00c1918 886e89a8 nt!MmProbeAndLockSelectedPages+0x165
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmProbeAndLockSelectedPages+165
8051efe7 f6400401 test byte ptr [eax+4],1
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmProbeAndLockSelectedPages+165
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MmProbeAndLockSelectedPages+165
BUCKET_ID: 0xA_nt!MmProbeAndLockSelectedPages+165
Followup: MachineOwner
---------
kd> lmvm nt
start end module name
804d7000 806cf680 nt M (pdb symbols) c:\windows\symbols\exe\ntoskrnl.pdb
Loaded symbol image file: ntoskrnl.exe
Image path: ntoskrnl.exe
Image name: ntoskrnl.exe
Timestamp: Fri Feb 06 05:32:51 2009 (498C11D3)
CheckSum: 00206AC2
ImageSize: 001F8680
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
kd> p
^ No runnable debuggees error in 'p'