Hello I am new to the forum but I have read up on the issues I am having. I have downloaded the debugging tools for Windows and created a debug log file from my minidump. See below:
* Bugcheck Analysis *
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0004102a, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804da6db, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0004102a
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSynchronizeExecution+5
804da6db 8b4b29 mov ecx,dword ptr [ebx+29h]
CUSTOMER_CRASH_COUNT: 8
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: explorer.exe
LAST_CONTROL_TRANSFER: from 804dbbd4 to 804da6db
STACK_TEXT:
f8965fd0 804dbbd4 8230c610 8230c5fc 00000000 nt!KeSynchronizeExecution+0x5
f8965ff4 804db89e ef302c9c 00000000 00000000 nt!KiRetireDpcList+0x46
f8965ff8 ef302c9c 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a
WARNING: Frame IP not in any known module. Following frames may be wrong.
804db89e 00000000 00000009 bb835675 00000128 0xef302c9c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeSynchronizeExecution+5
804da6db 8b4b29 mov ecx,dword ptr [ebx+29h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeSynchronizeExecution+5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 45e54711
FAILURE_BUCKET_ID: 0xA_nt!KeSynchronizeExecution+5
BUCKET_ID: 0xA_nt!KeSynchronizeExecution+5
Followup: MachineOwner
---------
eax=82004448 ebx=00041001 ecx=00000000 edx=00000000 esi=82004410 edi=f8106d90
eip=804da6db esp=f8965fb0 ebp=f8965fd0 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
nt!KeSynchronizeExecution+0x5:
804da6db 8b4b29 mov ecx,dword ptr [ebx+29h] ds:0023:0004102a=????????
ChildEBP RetAddr Args to Child
f8965fd0 804dbbd4 8230c610 8230c5fc 00000000 nt!KeSynchronizeExecution+0x5
f8965ff4 804db89e ef302c9c 00000000 00000000 nt!KiRetireDpcList+0x46 (FPO: [0,0,0])
f8965ff8 ef302c9c 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a (FPO: [Uses EBP] [0,0,1])
WARNING: Frame IP not in any known module. Following frames may be wrong.
804db89e 00000000 00000009 bb835675 00000128 0xef302c9c
start end module name
804d7000 806eb500 nt ntoskrnl.exe Wed Feb 28 04:10:41 2007 (45E54711)
806ec000 806ffd80 hal halacpi.dll Wed Aug 04 01:59:04 2004 (41107B28)
Unloaded modules:
ee5c1000 ee5ec000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
f881a000 f8822000 usbccgp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ee5a8000 ee5c1000 nwusbmdm.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ee58f000 ee5a8000 nwusbser.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
Thanks in advance,
MysticalFever
* Bugcheck Analysis *
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0004102a, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804da6db, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0004102a
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSynchronizeExecution+5
804da6db 8b4b29 mov ecx,dword ptr [ebx+29h]
CUSTOMER_CRASH_COUNT: 8
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: explorer.exe
LAST_CONTROL_TRANSFER: from 804dbbd4 to 804da6db
STACK_TEXT:
f8965fd0 804dbbd4 8230c610 8230c5fc 00000000 nt!KeSynchronizeExecution+0x5
f8965ff4 804db89e ef302c9c 00000000 00000000 nt!KiRetireDpcList+0x46
f8965ff8 ef302c9c 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a
WARNING: Frame IP not in any known module. Following frames may be wrong.
804db89e 00000000 00000009 bb835675 00000128 0xef302c9c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeSynchronizeExecution+5
804da6db 8b4b29 mov ecx,dword ptr [ebx+29h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeSynchronizeExecution+5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 45e54711
FAILURE_BUCKET_ID: 0xA_nt!KeSynchronizeExecution+5
BUCKET_ID: 0xA_nt!KeSynchronizeExecution+5
Followup: MachineOwner
---------
eax=82004448 ebx=00041001 ecx=00000000 edx=00000000 esi=82004410 edi=f8106d90
eip=804da6db esp=f8965fb0 ebp=f8965fd0 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
nt!KeSynchronizeExecution+0x5:
804da6db 8b4b29 mov ecx,dword ptr [ebx+29h] ds:0023:0004102a=????????
ChildEBP RetAddr Args to Child
f8965fd0 804dbbd4 8230c610 8230c5fc 00000000 nt!KeSynchronizeExecution+0x5
f8965ff4 804db89e ef302c9c 00000000 00000000 nt!KiRetireDpcList+0x46 (FPO: [0,0,0])
f8965ff8 ef302c9c 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a (FPO: [Uses EBP] [0,0,1])
WARNING: Frame IP not in any known module. Following frames may be wrong.
804db89e 00000000 00000009 bb835675 00000128 0xef302c9c
start end module name
804d7000 806eb500 nt ntoskrnl.exe Wed Feb 28 04:10:41 2007 (45E54711)
806ec000 806ffd80 hal halacpi.dll Wed Aug 04 01:59:04 2004 (41107B28)
Unloaded modules:
ee5c1000 ee5ec000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
f881a000 f8822000 usbccgp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ee5a8000 ee5c1000 nwusbmdm.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ee58f000 ee5a8000 nwusbser.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
Thanks in advance,
MysticalFever