Thanks! That was helpful. It looks like the culprit is ntoskrnl.exe, but what does that mean?? I've attached the minidump from yesterday. There were two, but they were exactly the same.
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\New Folder\Mini081006-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\WINDOWS\Symbols
Executable search path is: C:\WINDOWS\I386
Unable to load image ntoskrnl.exe, Win32 error 2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a420
Debug session time: Thu Aug 10 09:19:49.718 2006 (GMT-7)
System Uptime: 0 days 4:16:21.264
Unable to load image ntoskrnl.exe, Win32 error 2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.........................................................................................................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {c007b904, 2, 0, 804e91b7}
Probably caused by : ntoskrnl.exe ( nt!IoSetThreadHardErrorMode+16 )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: c007b904, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 804e91b7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: c007b904
CURRENT_IRQL: 2
FAULTING_IP:
nt!IoSetThreadHardErrorMode+16
804e91b7 f60301 test byte ptr [ebx],1
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: mcinsupd.exe
LAST_CONTROL_TRANSFER: from 804ebace to 804e91b7
STACK_TEXT:
f7906e80 804ebace cff2ba55 00000023 83dff890 nt!IoSetThreadHardErrorMode+0x16
f7906fa4 804dc378 cff2ba55 00000023 ffdff000 nt!MiInsertVad+0x36
f7906fd0 804dbbd4 80559280 00000000 000f0550 nt!KiWaitTest+0x56
f7906fd4 80559280 00000000 000f0550 00000000 nt!ExReleaseResourceLite+0x4
f7906fd8 00000000 000f0550 00000000 00000000 nt!VdmStringIoBuffer+0x3a0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IoSetThreadHardErrorMode+16
804e91b7 f60301 test byte ptr [ebx],1
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!IoSetThreadHardErrorMode+16
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 42250ff9
FAILURE_BUCKET_ID: 0xA_nt!IoSetThreadHardErrorMode+16
BUCKET_ID: 0xA_nt!IoSetThreadHardErrorMode+16
Followup: MachineOwner
---------
kd> lmvm nt
start end module name
804d7000 806eb100 nt M (pdb symbols) C:\WINDOWS\Symbols\exe\ntoskrnl.pdb
Loaded symbol image file: ntoskrnl.exe
Image path: ntoskrnl.exe
Image name: ntoskrnl.exe
Timestamp: Tue Mar 01 16:59:37 2005 (42250FF9)
CheckSum: 002198AF
ImageSize: 00214100
Translations: 0000.04b0 0000.04e0 0409.04b0 0409.04e0
WARNING: Whitespace at end of path element