I tried that and i get BSOD,as I expected.
Here's the new dump file : 2shared - download Minidump.rar
Here are the screenshots : ImageShack Album - 2 images
BugCheck 100000D1, {0, 2, 0, b76d81a1}
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.
CURRENT_IRQL: 2
PROCESS_NAME: Idle
STACK_TEXT:
805510fc 00000000 8a026008 8a026008 00000000 nv4_mini+0x2a11a1
Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )
b7437000 b7da53a0 nv4_mini.sys Fri Jan 07 20:47:36 2011 (4D27C238)
I've underclocked my CPU in the BIOS menu.
Tommorow I will take my pc to a tehnician because i'm sick of this.
I'll hope they will fix this.
Thx for help.
I will reply after that to see if the BSOD is fixed.
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031211-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Mar 12 05:37:29.000 2011 (UTC - 5:00)
System Uptime: 0 days 2:21:35.609
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
..........
Unable to load image nv4_mini.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nv4_mini.sys
*** ERROR: Module load completed but symbols could not be loaded for nv4_mini.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {0, 2, 0, b76d81a1}
Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: b76d81a1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
nv4_mini+2a11a1
b76d81a1 8b09 mov ecx,dword ptr [ecx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: Idle
LAST_CONTROL_TRANSFER: from 00000000 to b76d81a1
STACK_TEXT:
805510fc 00000000 8a025008 8a025008 00000000 nv4_mini+0x2a11a1
STACK_COMMAND: kb
FOLLOWUP_IP:
nv4_mini+2a11a1
b76d81a1 8b09 mov ecx,dword ptr [ecx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nv4_mini+2a11a1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nv4_mini
IMAGE_NAME: nv4_mini.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d27c238
FAILURE_BUCKET_ID: 0xD1_nv4_mini+2a11a1
BUCKET_ID: 0xD1_nv4_mini+2a11a1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Mar 11 07:42:58.671 2011 (UTC - 5:00)
System Uptime: 0 days 1:22:00.414
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
.............
Unable to load image nv4_mini.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nv4_mini.sys
*** ERROR: Module load completed but symbols could not be loaded for nv4_mini.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {0, 2, 0, b76d81a1}
Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: b76d81a1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
nv4_mini+2a11a1
b76d81a1 8b09 mov ecx,dword ptr [ecx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: Idle
LAST_CONTROL_TRANSFER: from 00000000 to b76d81a1
STACK_TEXT:
805510fc 00000000 8a026008 8a026008 00000000 nv4_mini+0x2a11a1
STACK_COMMAND: kb
FOLLOWUP_IP:
nv4_mini+2a11a1
b76d81a1 8b09 mov ecx,dword ptr [ecx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nv4_mini+2a11a1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nv4_mini
IMAGE_NAME: nv4_mini.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d27c238
FAILURE_BUCKET_ID: 0xD1_nv4_mini+2a11a1
BUCKET_ID: 0xD1_nv4_mini+2a11a1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031211-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Mar 12 07:04:25.609 2011 (UTC - 5:00)
System Uptime: 0 days 1:25:40.328
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
............
Unable to load image nv4_mini.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nv4_mini.sys
*** ERROR: Module load completed but symbols could not be loaded for nv4_mini.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {0, 2, 0, b76d81a1}
Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: b76d81a1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
nv4_mini+2a11a1
b76d81a1 8b09 mov ecx,dword ptr [ecx]
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: Idle
LAST_CONTROL_TRANSFER: from 00000000 to b76d81a1
STACK_TEXT:
805510fc 00000000 8a0be438 8a0be438 00000000 nv4_mini+0x2a11a1
STACK_COMMAND: kb
FOLLOWUP_IP:
nv4_mini+2a11a1
b76d81a1 8b09 mov ecx,dword ptr [ecx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nv4_mini+2a11a1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nv4_mini
IMAGE_NAME: nv4_mini.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d27c238
FAILURE_BUCKET_ID: 0xD1_nv4_mini+2a11a1
BUCKET_ID: 0xD1_nv4_mini+2a11a1
Followup: MachineOwner
---------
start end module name
b1750000 b177c000 000 000.fcl Fri Sep 26 09:11:12 2008 (48DCDF70)
b7f79000 b7fa6d80 ACPI ACPI.sys Sun Apr 13 14:36:33 2008 (480252B1)
b2773000 b2794b80 afd afd.sys Sun Apr 13 15:19:22 2008 (48025CBA)
b7f0b000 b7f22900 atapi atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
b81d8000 b81e0b80 atl01_xp atl01_xp.sys Tue Aug 22 01:36:57 2006 (44EA97F9)
b8733000 b8733c00 audstub audstub.sys Fri Aug 17 16:59:40 2001 (3B7D85BC)
b85ca000 b85cb080 Beep Beep.SYS Fri Aug 17 16:47:33 2001 (3B7D82E5)
b84b8000 b84bb000 BOOTVID BOOTVID.dll Fri Aug 17 16:49:09 2001 (3B7D8345)
b8148000 b8157900 Cdfs Cdfs.SYS Sun Apr 13 15:14:21 2008 (48025B8D)
b81f8000 b8207600 cdrom cdrom.sys Sun Apr 13 14:40:45 2008 (480253AD)
b80e8000 b80f4180 CLASSPNP CLASSPNP.SYS Sun Apr 13 15:16:21 2008 (48025C05)
b1bab000 b1bb4000 cpuz135_x32 cpuz135_x32.sys Wed Jan 19 11:45:17 2011 (4D37151D)
b80d8000 b80e0e00 disk disk.sys Sun Apr 13 14:40:46 2008 (480253AE)
b7f23000 b7f48700 dmio dmio.sys Sun Apr 13 14:44:45 2008 (4802549D)
b85ae000 b85af700 dmload dmload.sys Fri Aug 17 16:58:15 2001 (3B7D8567)
b82a8000 b82b6b00 drmk drmk.sys Sun Apr 13 14:45:12 2008 (480254B8)
b7270000 b72ab000 dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:15:09 2011 (4D2EB48D)
b2698000 b26af900 dump_atapi dump_atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
b85da000 b85db100 dump_WMILIB dump_WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
b4a03000 b4a05900 Dxapi Dxapi.sys Fri Aug 17 16:53:19 2001 (3B7D843F)
bd000000 bd011600 dxg dxg.sys Sun Apr 13 14:38:27 2008 (48025323)
b8763000 b8763d00 dxgthk dxgthk.sys Fri Aug 17 16:53:12 2001 (3B7D8438)
b83a8000 b83a9000 fdc fdc.sys unavailable (00000000)
b8128000 b8132e00 Fips Fips.SYS Sun Apr 13 14:33:27 2008 (480251F7)
b8400000 b8405000 flpydisk flpydisk.sys Sun Apr 13 14:40:24 2008 (48025398)
b7eeb000 b7f0ab00 fltMgr fltMgr.sys Sun Apr 13 14:32:58 2008 (480251DA)
b85c8000 b85c9f00 Fs_Rec Fs_Rec.SYS Fri Aug 17 16:49:37 2001 (3B7D8361)
b7f49000 b7f67880 ftdisk ftdisk.sys Fri Aug 17 16:52:41 2001 (3B7D8419)
806e4000 80704d00 hal halmacpi.dll Sun Apr 13 14:31:27 2008 (4802517F)
b7389000 b73b1000 HDAudBus HDAudBus.sys Thu May 26 11:46:29 2005 (4295EF55)
b1312000 b1352a80 HTTP HTTP.sys Sun Apr 13 14:53:48 2008 (480256BC)
b8228000 b8234d00 i8042prt i8042prt.sys Sun Apr 13 15:17:59 2008 (48025C67)
b81e8000 b81f2480 imapi imapi.sys Sun Apr 13 14:40:57 2008 (480253B9)
b2795000 b27ba500 ipnat ipnat.sys Sun Apr 13 14:57:10 2008 (48025786)
b2864000 b2876600 ipsec ipsec.sys Sun Apr 13 15:19:42 2008 (48025CCE)
b80a8000 b80b1180 isapnp isapnp.sys Sun Apr 13 14:36:40 2008 (480252B8)
b83b0000 b83b6000 kbdclass kbdclass.sys Sun Apr 13 14:39:46 2008 (48025372)
b85a8000 b85a9b80 kdcom kdcom.dll Fri Aug 17 16:49:10 2001 (3B7D8346)
b0eeb000 b0f15180 kmixer kmixer.sys Sun Apr 13 14:45:07 2008 (480254B3)
b7400000 b7422700 ks ks.sys Sun Apr 13 15:16:34 2008 (48025C12)
b7ec2000 b7ed8880 KSecDD KSecDD.sys Sun Apr 13 14:31:40 2008 (4802518C)
b85cc000 b85cd080 mnmdd mnmdd.SYS Fri Aug 17 16:57:28 2001 (3B7D8538)
b83b8000 b83bda00 mouclass mouclass.sys Sun Apr 13 14:39:47 2008 (48025373)
b80b8000 b80c2580 MountMgr MountMgr.sys Sun Apr 13 14:39:45 2008 (48025371)
b18e6000 b1912180 mrxdav mrxdav.sys Sun Apr 13 14:32:42 2008 (480251CA)
b26d8000 b2747780 mrxsmb mrxsmb.sys Sun Apr 13 15:16:58 2008 (48025C2A)
b8418000 b841ca80 Msfs Msfs.SYS Sun Apr 13 14:32:38 2008 (480251C6)
b8268000 b8270900 msgpc msgpc.sys Sun Apr 13 14:56:32 2008 (48025760)
b8574000 b8577c80 mssmbios mssmbios.sys Sun Apr 13 14:36:45 2008 (480252BD)
b7dee000 b7e07b80 Mup Mup.sys Sun Apr 13 15:17:05 2008 (48025C31)
b7e08000 b7e34980 NDIS NDIS.sys Sun Apr 13 15:20:35 2008 (48025D03)
b8554000 b8556780 ndistapi ndistapi.sys Sun Apr 13 14:57:27 2008 (48025797)
b1c27000 b1c2a900 ndisuio ndisuio.sys Sun Apr 13 14:55:57 2008 (4802573D)
b7372000 b7388580 ndiswan ndiswan.sys Sun Apr 13 15:20:41 2008 (48025D09)
b82b8000 b82c1e80 NDProxy NDProxy.SYS Sun Apr 13 14:57:28 2008 (48025798)
b8318000 b8320780 netbios netbios.sys Sun Apr 13 14:56:01 2008 (48025741)
b27bb000 b27e2c00 netbt netbt.sys Sun Apr 13 15:20:59 2008 (48025D1B)
b8420000 b8427880 Npfs Npfs.SYS Sun Apr 13 14:32:38 2008 (480251C6)
804d7000 806e4000 nt ntkrpamp.exe Sun Apr 13 14:31:06 2008 (4802516A)
b7e35000 b7ec1600 Ntfs Ntfs.sys Sun Apr 13 15:15:49 2008 (48025BE5)
b86f0000 b86f0b80 Null Null.SYS Fri Aug 17 16:47:39 2001 (3B7D82EB)
bd012000 bd62bf80 nv4_disp nv4_disp.dll Fri Jan 07 20:45:10 2011 (4D27C1A6)
b7437000 b7da53a0 nv4_mini nv4_mini.sys Fri Jan 07 20:47:36 2011 (4D27C238)
b73b1000 b73c4900 parport parport.sys Sun Apr 13 14:40:09 2008 (48025389)
b8330000 b8334d00 PartMgr PartMgr.sys Sun Apr 13 14:40:48 2008 (480253B0)
b861c000 b861da80 ParVdm ParVdm.SYS Fri Aug 17 16:49:49 2001 (3B7D836D)
b7f68000 b7f78a80 pci pci.sys Sun Apr 13 14:36:43 2008 (480252BB)
b8670000 b8670d00 pciide pciide.sys Fri Aug 17 16:51:49 2001 (3B7D83E5)
b8328000 b832e180 PCIIDEX PCIIDEX.SYS Sun Apr 13 14:40:29 2008 (4802539D)
b4ac7000 b4aeaa80 portcls portcls.sys Sun Apr 13 15:19:40 2008 (48025CCC)
b81c8000 b81d0c00 processr processr.sys Sun Apr 13 14:31:29 2008 (48025181)
b7361000 b7371e00 psched psched.sys Sun Apr 13 14:56:36 2008 (48025764)
b83c8000 b83cc580 ptilink ptilink.sys Fri Aug 17 16:49:53 2001 (3B7D8371)
b7329000 b732b280 rasacd rasacd.sys Fri Aug 17 16:55:39 2001 (3B7D84CB)
b8238000 b8244880 rasl2tp rasl2tp.sys Sun Apr 13 15:19:43 2008 (48025CCF)
b8248000 b8252200 raspppoe raspppoe.sys Sun Apr 13 14:57:31 2008 (4802579B)
b8258000 b8263d00 raspptp raspptp.sys Sun Apr 13 15:19:47 2008 (48025CD3)
b83d0000 b83d4080 raspti raspti.sys Fri Aug 17 16:55:32 2001 (3B7D84C4)
b2748000 b2772e80 rdbss rdbss.sys Sun Apr 13 15:28:38 2008 (48025EE6)
b85ce000 b85cf080 RDPCDD RDPCDD.sys Fri Aug 17 16:46:56 2001 (3B7D82C0)
b7331000 b7360e80 rdpdr rdpdr.sys Sun Apr 13 14:32:50 2008 (480251D2)
b8208000 b8216100 redbook redbook.sys Sun Apr 13 14:40:27 2008 (4802539B)
b4aeb000 b5133000 RtkHDAud RtkHDAud.sys Tue Jan 25 05:25:41 2011 (4D3EA525)
b8550000 b8553d80 serenum serenum.sys Sun Apr 13 14:40:12 2008 (4802538C)
b8218000 b8227c00 serial serial.sys Sun Apr 13 15:15:44 2008 (48025BE0)
b7ed9000 b7eeaf00 sr sr.sys Sun Apr 13 14:36:50 2008 (480252C2)
b17a4000 b17f5c00 srv srv.sys Sun Apr 13 15:15:08 2008 (48025BBC)
b85c0000 b85c1100 swenum swenum.sys Sun Apr 13 14:39:52 2008 (48025378)
b16c0000 b16ced80 sysaudio sysaudio.sys Sun Apr 13 15:15:55 2008 (48025BEB)
b280b000 b2863380 tcpip tcpip.sys Sun Apr 13 15:20:12 2008 (48025CEC)
b83c0000 b83c4a80 TDI TDI.SYS Sun Apr 13 15:00:04 2008 (48025834)
b8298000 b82a1f00 termdd termdd.sys Sun Apr 13 14:38:36 2008 (4802532C)
b10f9000 b1109200 Udfs Udfs.SYS Sun Apr 13 14:32:35 2008 (480251C3)
b72ab000 b7308f00 update update.sys Sun Apr 13 14:39:46 2008 (48025372)
b85c6000 b85c7280 USBD USBD.SYS Fri Aug 17 17:02:58 2001 (3B7D8682)
b83a0000 b83a7600 usbehci usbehci.sys Sun Apr 13 14:45:34 2008 (480254CE)
b82e8000 b82f6880 usbhub usbhub.sys Sun Apr 13 14:45:36 2008 (480254D0)
b73c5000 b73e8200 USBPORT USBPORT.SYS Sun Apr 13 14:45:34 2008 (480254CE)
b8398000 b839d080 usbuhci usbuhci.sys Sun Apr 13 14:45:34 2008 (480254CE)
b8410000 b8415200 vga vga.sys Sun Apr 13 14:44:40 2008 (48025498)
b85ac000 b85ad500 viaide viaide.sys Sun Apr 13 14:40:30 2008 (4802539E)
b7423000 b7436f00 VIDEOPRT VIDEOPRT.SYS Sun Apr 13 14:44:39 2008 (48025497)
b80c8000 b80d4c80 VolSnap VolSnap.sys Sun Apr 13 14:41:00 2008 (480253BC)
b8308000 b8310700 wanarp wanarp.sys Sun Apr 13 14:57:20 2008 (48025790)
b8428000 b842c500 watchdog watchdog.sys Sun Apr 13 14:44:59 2008 (480254AB)
b15fb000 b160f480 wdmaud wdmaud.sys Sun Apr 13 15:17:18 2008 (48025C3E)
bf800000 bf9c2980 win32k win32k.sys Sun Apr 13 15:29:46 2008 (48025F2A)
b85aa000 b85ab100 WMILIB WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
Unloaded modules:
b861e000 b8620000 splitter.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
b0eeb000 b0f16000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
b0eeb000 b0f16000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
b0fde000 b1009000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
b150d000 b1538000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
b87ab000 b87ac000 drmkaud.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00001000
b16a0000 b16ad000 DMusic.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
b1538000 b155b000 aec.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00023000
b16b0000 b16be000 swmidi.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
b85c4000 b85c6000 splitter.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
b8408000 b840d000 Cdaudio.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00005000
b732d000 b7330000 Sfloppy.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00003000
Mini031611-01.dmp
BugCheck 1000000A, {f83150bc, 1, 0, 80505f07}
PROCESS_NAME: uTorrent.exe
Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )
Mini031611-02.dmp
BugCheck 10000050, {e0188cfc, 0, 80505f07, 0}
PROCESS_NAME: chrome.exe
Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031611-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Mar 16 02:56:53.265 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:22.990
Loading Kernel Symbols
...............................................................
...............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {f83150bc, 1, 0, 80505f07}
Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: f83150bc, memory referenced
Arg2: 00000001, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80505f07, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: f83150bc
CURRENT_IRQL: 1
FAULTING_IP:
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81 mov ecx,dword ptr [ecx+eax*4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: uTorrent.exe
LAST_CONTROL_TRANSFER: from 8051af4d to 80505f07
STACK_TEXT:
b1432b38 8051af4d c0e0003c d323a000 00000000 nt!MiLocateAndReserveWsle+0x51
b1432b8c 805696dc d323a000 00000000 b1432cd8 nt!MmCheckCachedPageState+0x4ed
b1432c1c b7e55e9a 898ee450 027eb074 00020000 nt!CcFastCopyRead+0x152
b1432c74 b7ee09a2 898ee450 b1432cd8 00020000 Ntfs!NtfsCopyReadA+0x1bf
b1432c9c 8057c74e 898ee450 b1432cd8 00020000 sr!SrFastIoRead+0x40
b1432d38 8054161c 00000280 00000000 00000000 nt!NtReadFile+0x2c4
b1432d38 7c90e4f4 00000280 00000000 00000000 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0103fe74 00000000 00000000 00000000 00000000 0x7c90e4f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81 mov ecx,dword ptr [ecx+eax*4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiLocateAndReserveWsle+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4802516a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiLocateAndReserveWsle+51
BUCKET_ID: 0xA_nt!MiLocateAndReserveWsle+51
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031611-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Mar 16 03:02:08.796 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:30.543
Loading Kernel Symbols
...............................................................
...........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 10000050, {e0188cfc, 0, 80505f07, 0}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e0188cfc, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 80505f07, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: e0188cfc
FAULTING_IP:
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81 mov ecx,dword ptr [ecx+eax*4]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
LAST_CONTROL_TRANSFER: from 80513abe to 80505f07
STACK_TEXT:
b1005bc8 80513abe c0883cfc 77dd5ad1 8124dbb4 nt!MiLocateAndReserveWsle+0x51
b1005be0 805152b9 77dd5ad1 c03beea8 8124dbb4 nt!MiAddValidPageToWorkingSet+0x84
b1005c18 805163b8 80000000 77dd5ad1 c03beea8 nt!MiCompleteProtoPteFault+0x1cb
b1005c5c 8051650f 00000000 77dd5ad1 c03beea8 nt!MiResolveProtoPteFault+0x204
b1005ce0 80520ad8 e175b070 77dd5ad1 c03beea8 nt!MiDispatchFault+0xf1
b1005d4c 80544578 00000000 77dd5ad1 00000001 nt!MmAccessFault+0x1116
b1005d4c 7c917c33 00000000 77dd5ad1 00000001 nt!KiTrap0E+0xd0
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012f9d0 00000000 00000000 00000000 00000000 0x7c917c33
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81 mov ecx,dword ptr [ecx+eax*4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiLocateAndReserveWsle+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4802516a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x50_nt!MiLocateAndReserveWsle+51
BUCKET_ID: 0x50_nt!MiLocateAndReserveWsle+51
Followup: MachineOwner
---------
start end module name
b1728000 b1754000 000 000.fcl Fri Sep 26 09:11:12 2008 (48DCDF70)
b7f79000 b7fa6d80 ACPI ACPI.sys Sun Apr 13 14:36:33 2008 (480252B1)
b2773000 b2794b80 afd afd.sys Sun Apr 13 15:19:22 2008 (48025CBA)
b7f0b000 b7f22900 atapi atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
b81e8000 b81f0b80 atl01_xp atl01_xp.sys Tue Aug 22 01:36:57 2006 (44EA97F9)
b8750000 b8750c00 audstub audstub.sys Fri Aug 17 16:59:40 2001 (3B7D85BC)
b85c2000 b85c3080 Beep Beep.SYS Fri Aug 17 16:47:33 2001 (3B7D82E5)
b84b8000 b84bb000 BOOTVID BOOTVID.dll Fri Aug 17 16:49:09 2001 (3B7D8345)
b8178000 b8187900 Cdfs Cdfs.SYS Sun Apr 13 15:14:21 2008 (48025B8D)
b8208000 b8217600 cdrom cdrom.sys Sun Apr 13 14:40:45 2008 (480253AD)
b80e8000 b80f4180 CLASSPNP CLASSPNP.SYS Sun Apr 13 15:16:21 2008 (48025C05)
b1bb3000 b1bbc000 cpuz135_x32 cpuz135_x32.sys Wed Jan 19 11:45:17 2011 (4D37151D)
b80d8000 b80e0e00 disk disk.sys Sun Apr 13 14:40:46 2008 (480253AE)
b7f23000 b7f48700 dmio dmio.sys Sun Apr 13 14:44:45 2008 (4802549D)
b85ae000 b85af700 dmload dmload.sys Fri Aug 17 16:58:15 2001 (3B7D8567)
b8298000 b82a6b00 drmk drmk.sys Sun Apr 13 14:45:12 2008 (480254B8)
b71d0000 b720b000 dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:15:09 2011 (4D2EB48D)
b2698000 b26af900 dump_atapi dump_atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
b85cc000 b85cd100 dump_WMILIB dump_WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
b4a07000 b4a09900 Dxapi Dxapi.sys Fri Aug 17 16:53:19 2001 (3B7D843F)
bd000000 bd011600 dxg dxg.sys Sun Apr 13 14:38:27 2008 (48025323)
b86d3000 b86d3d00 dxgthk dxgthk.sys Fri Aug 17 16:53:12 2001 (3B7D8438)
b83b8000 b83b9000 fdc fdc.sys unavailable (00000000)
b82f8000 b8302e00 Fips Fips.SYS Sun Apr 13 14:33:27 2008 (480251F7)
b83e8000 b83ed000 flpydisk flpydisk.sys Sun Apr 13 14:40:24 2008 (48025398)
b7eeb000 b7f0ab00 fltMgr fltMgr.sys Sun Apr 13 14:32:58 2008 (480251DA)
b85c0000 b85c1f00 Fs_Rec Fs_Rec.SYS Fri Aug 17 16:49:37 2001 (3B7D8361)
b7f49000 b7f67880 ftdisk ftdisk.sys Fri Aug 17 16:52:41 2001 (3B7D8419)
806e4000 80704d00 hal halmacpi.dll Sun Apr 13 14:31:27 2008 (4802517F)
b7389000 b73b1000 HDAudBus HDAudBus.sys Thu May 26 11:46:29 2005 (4295EF55)
b1312000 b1352a80 HTTP HTTP.sys Sun Apr 13 14:53:48 2008 (480256BC)
b8238000 b8244d00 i8042prt i8042prt.sys Sun Apr 13 15:17:59 2008 (48025C67)
b81f8000 b8202480 imapi imapi.sys Sun Apr 13 14:40:57 2008 (480253B9)
b2795000 b27ba500 ipnat ipnat.sys Sun Apr 13 14:57:10 2008 (48025786)
b283c000 b284e600 ipsec ipsec.sys Sun Apr 13 15:19:42 2008 (48025CCE)
b80a8000 b80b1180 isapnp isapnp.sys Sun Apr 13 14:36:40 2008 (480252B8)
b83c0000 b83c6000 kbdclass kbdclass.sys Sun Apr 13 14:39:46 2008 (48025372)
b85a8000 b85a9b80 kdcom kdcom.dll Fri Aug 17 16:49:10 2001 (3B7D8346)
b73e9000 b740b700 ks ks.sys Sun Apr 13 15:16:34 2008 (48025C12)
b7ec2000 b7ed8880 KSecDD KSecDD.sys Sun Apr 13 14:31:40 2008 (4802518C)
b85c4000 b85c5080 mnmdd mnmdd.SYS Fri Aug 17 16:57:28 2001 (3B7D8538)
b83c8000 b83cda00 mouclass mouclass.sys Sun Apr 13 14:39:47 2008 (48025373)
b80b8000 b80c2580 MountMgr MountMgr.sys Sun Apr 13 14:39:45 2008 (48025371)
b18e6000 b1912180 mrxdav mrxdav.sys Sun Apr 13 14:32:42 2008 (480251CA)
b26d8000 b2747780 mrxsmb mrxsmb.sys Sun Apr 13 15:16:58 2008 (48025C2A)
b8400000 b8404a80 Msfs Msfs.SYS Sun Apr 13 14:32:38 2008 (480251C6)
b8278000 b8280900 msgpc msgpc.sys Sun Apr 13 14:56:32 2008 (48025760)
b8580000 b8583c80 mssmbios mssmbios.sys Sun Apr 13 14:36:45 2008 (480252BD)
b7dee000 b7e07b80 Mup Mup.sys Sun Apr 13 15:17:05 2008 (48025C31)
b7e08000 b7e34980 NDIS NDIS.sys Sun Apr 13 15:20:35 2008 (48025D03)
b8560000 b8562780 ndistapi ndistapi.sys Sun Apr 13 14:57:27 2008 (48025797)
b1b83000 b1b86900 ndisuio ndisuio.sys Sun Apr 13 14:55:57 2008 (4802573D)
b7372000 b7388580 ndiswan ndiswan.sys Sun Apr 13 15:20:41 2008 (48025D09)
b82a8000 b82b1e80 NDProxy NDProxy.SYS Sun Apr 13 14:57:28 2008 (48025798)
b82e8000 b82f0780 netbios netbios.sys Sun Apr 13 14:56:01 2008 (48025741)
b27bb000 b27e2c00 netbt netbt.sys Sun Apr 13 15:20:59 2008 (48025D1B)
b8408000 b840f880 Npfs Npfs.SYS Sun Apr 13 14:32:38 2008 (480251C6)
804d7000 806e4000 nt ntkrpamp.exe Sun Apr 13 14:31:06 2008 (4802516A)
b7e35000 b7ec1600 Ntfs Ntfs.sys Sun Apr 13 15:15:49 2008 (48025BE5)
b8706000 b8706b80 Null Null.SYS Fri Aug 17 16:47:39 2001 (3B7D82EB)
bd012000 bd62bf80 nv4_disp nv4_disp.dll Fri Jan 07 20:45:10 2011 (4D27C1A6)
b7420000 b7d8e3a0 nv4_mini nv4_mini.sys Fri Jan 07 20:47:36 2011 (4D27C238)
b73b1000 b73c4900 parport parport.sys Sun Apr 13 14:40:09 2008 (48025389)
b8330000 b8334d00 PartMgr PartMgr.sys Sun Apr 13 14:40:48 2008 (480253B0)
b85ea000 b85eba80 ParVdm ParVdm.SYS Fri Aug 17 16:49:49 2001 (3B7D836D)
b7f68000 b7f78a80 pci pci.sys Sun Apr 13 14:36:43 2008 (480252BB)
b8670000 b8670d00 pciide pciide.sys Fri Aug 17 16:51:49 2001 (3B7D83E5)
b8328000 b832e180 PCIIDEX PCIIDEX.SYS Sun Apr 13 14:40:29 2008 (4802539D)
b4a27000 b4a4aa80 portcls portcls.sys Sun Apr 13 15:19:40 2008 (48025CCC)
b81d8000 b81e0c00 processr processr.sys Sun Apr 13 14:31:29 2008 (48025181)
b7361000 b7371e00 psched psched.sys Sun Apr 13 14:56:36 2008 (48025764)
b83d8000 b83dc580 ptilink ptilink.sys Fri Aug 17 16:49:53 2001 (3B7D8371)
b80f8000 b8101200 PxHelp20 PxHelp20.sys Wed Mar 12 21:57:44 2008 (47D88A18)
b7329000 b732b280 rasacd rasacd.sys Fri Aug 17 16:55:39 2001 (3B7D84CB)
b8248000 b8254880 rasl2tp rasl2tp.sys Sun Apr 13 15:19:43 2008 (48025CCF)
b8258000 b8262200 raspppoe raspppoe.sys Sun Apr 13 14:57:31 2008 (4802579B)
b8268000 b8273d00 raspptp raspptp.sys Sun Apr 13 15:19:47 2008 (48025CD3)
b83e0000 b83e4080 raspti raspti.sys Fri Aug 17 16:55:32 2001 (3B7D84C4)
b2748000 b2772e80 rdbss rdbss.sys Sun Apr 13 15:28:38 2008 (48025EE6)
b85c6000 b85c7080 RDPCDD RDPCDD.sys Fri Aug 17 16:46:56 2001 (3B7D82C0)
b7331000 b7360e80 rdpdr rdpdr.sys Sun Apr 13 14:32:50 2008 (480251D2)
b8218000 b8226100 redbook redbook.sys Sun Apr 13 14:40:27 2008 (4802539B)
b4a4b000 b5093000 RtkHDAud RtkHDAud.sys Tue Jan 25 05:25:41 2011 (4D3EA525)
b855c000 b855fd80 serenum serenum.sys Sun Apr 13 14:40:12 2008 (4802538C)
b8228000 b8237c00 serial serial.sys Sun Apr 13 15:15:44 2008 (48025BE0)
b7ed9000 b7eeaf00 sr sr.sys Sun Apr 13 14:36:50 2008 (480252C2)
b17a4000 b17f5c00 srv srv.sys Sun Apr 13 15:15:08 2008 (48025BBC)
b85b8000 b85b9100 swenum swenum.sys Sun Apr 13 14:39:52 2008 (48025378)
b16a8000 b16b6d80 sysaudio sysaudio.sys Sun Apr 13 15:15:55 2008 (48025BEB)
b27e3000 b283b380 tcpip tcpip.sys Sun Apr 13 15:20:12 2008 (48025CEC)
b83d0000 b83d4a80 TDI TDI.SYS Sun Apr 13 15:00:04 2008 (48025834)
b8288000 b8291f00 termdd termdd.sys Sun Apr 13 14:38:36 2008 (4802532C)
b720b000 b7268f00 update update.sys Sun Apr 13 14:39:46 2008 (48025372)
b85be000 b85bf280 USBD USBD.SYS Fri Aug 17 17:02:58 2001 (3B7D8682)
b83b0000 b83b7600 usbehci usbehci.sys Sun Apr 13 14:45:34 2008 (480254CE)
b82b8000 b82c6880 usbhub usbhub.sys Sun Apr 13 14:45:36 2008 (480254D0)
b73c5000 b73e8200 USBPORT USBPORT.SYS Sun Apr 13 14:45:34 2008 (480254CE)
b83a8000 b83ad080 usbuhci usbuhci.sys Sun Apr 13 14:45:34 2008 (480254CE)
b83f8000 b83fd200 vga vga.sys Sun Apr 13 14:44:40 2008 (48025498)
b85ac000 b85ad500 viaide viaide.sys Sun Apr 13 14:40:30 2008 (4802539E)
b740c000 b741ff00 VIDEOPRT VIDEOPRT.SYS Sun Apr 13 14:44:39 2008 (48025497)
b80c8000 b80d4c80 VolSnap VolSnap.sys Sun Apr 13 14:41:00 2008 (480253BC)
b82d8000 b82e0700 wanarp wanarp.sys Sun Apr 13 14:57:20 2008 (48025790)
b8418000 b841c500 watchdog watchdog.sys Sun Apr 13 14:44:59 2008 (480254AB)
b155b000 b156f480 wdmaud wdmaud.sys Sun Apr 13 15:17:18 2008 (48025C3E)
bf800000 bf9c2980 win32k win32k.sys Sun Apr 13 15:29:46 2008 (48025F2A)
b85aa000 b85ab100 WMILIB WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
Unloaded modules:
b150d000 b1538000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
b871a000 b871b000 drmkaud.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00001000
b1688000 b1695000 DMusic.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
b1698000 b16a6000 swmidi.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
b1538000 b155b000 aec.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00023000
b85b6000 b85b8000 splitter.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
b83f0000 b83f5000 Cdaudio.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00005000
b732d000 b7330000 Sfloppy.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00003000