Loading Dump File [G:\AV nowe\Dumpy\Mini100310-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\symbole*http://msdl.microsoft.com/download/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt Built by: 2600.xpsp_sp2_gdr.100216-1441 Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a6a0 Debug session time: Sun Oct 3 15:30:08.187 2010 (GMT+2) System Uptime: 0 days 3:08:41.788 Loading Kernel Symbols ............................................................... ................................................................ Loading User Symbols Loading unloaded module list .......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {decff00c, 2, 1, 804db8e3} Probably caused by : ntoskrnl.exe ( nt!KiDispatchInterrupt+6f ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: decff00c, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 804db8e3, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: decff00c CURRENT_IRQL: 2 FAULTING_IP: nt!KiDispatchInterrupt+6f 804db8e3 c6475001 mov byte ptr [edi+50h],1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xA TRAP_FRAME: f779eccc -- (.trap 0xfffffffff779eccc) ESP EDITED! New esp=00000000 ErrCode = 00000000 eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000 eip=00000000 esp=f779ed40 ebp=00000000 iopl=0 nv up di pl nz na po nc cs=0000 ss=0010 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000 00000000 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from 00000000 to 804e1892 STACK_TEXT: f779eccc 00000000 00000000 00000000 00000000 nt!KiTrap0E+0x233 WARNING: Frame IP not in any known module. Following frames may be wrong. 00000000 00000000 00000000 00000000 00000000 0x0 STACK_COMMAND: .bugcheck ; kb FOLLOWUP_IP: nt!KiDispatchInterrupt+6f 804db8e3 c6475001 mov byte ptr [edi+50h],1 SYMBOL_NAME: nt!KiDispatchInterrupt+6f FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntoskrnl.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4b7a9b6a FAILURE_BUCKET_ID: 0xA_nt!KiDispatchInterrupt+6f BUCKET_ID: 0xA_nt!KiDispatchInterrupt+6f Followup: MachineOwner ---------