Heres the minidump in case anyone wants to see it:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini051912-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat May 19 12:38:25.618 2012 (UTC - 4:00)
System Uptime: 0 days 23:05:13.940
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {f6c3c9e6, 1c, 1, 80502e02}
Probably caused by : ntoskrnl.exe ( nt!KdpStub+4f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: f6c3c9e6, memory referenced
Arg2: 0000001c, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80502e02, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: f6c3c9e6
CURRENT_IRQL: 1c
FAULTING_IP:
nt!KdpStub+4f
80502e02 8902 mov dword ptr [edx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: ffxivgame.exe
LAST_CONTROL_TRANSFER: from 80502f4b to 80502e02
STACK_TEXT:
b84cbe68 80502f4b 00000000 b84cbe84 00000000 nt!KdpStub+0x4f
b84cbe94 8050215a 83c4daf4 0000007c b84cbfbc nt!MiDeletePte+0x374
b84cbfa0 80502347 83c4da09 ffdff9c0 ffdff000 nt!RtlpBitsClearTotal+0xda
b84cbfcc 80545eff 8055c4c0 00000000 00512a7c nt!KiFindFirstSetRight+0xb7
ffdff980 00000000 b84cc000 0034333c 00000000 nt!ExpCheckForResource+0x17
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KdpStub+4f
80502e02 8902 mov dword ptr [edx],eax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KdpStub+4f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f857c1e
FAILURE_BUCKET_ID: 0xA_nt!KdpStub+4f
BUCKET_ID: 0xA_nt!KdpStub+4f
Followup: MachineOwner
---------