There are all 6 minidump files
DUMP 1
Microsoft ® Windows Debugger Version 6.11.0001.404 X86
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\minidump\Mini041609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsof...ownload/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.050329-1536
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Apr 16 14:26:52.796 2009 (GMT-7)
System Uptime: 0 days 0:52:02.484
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {4, 1c, 0, 804f9f5f}
Probably caused by : ntkrpamp.exe ( nt!KeSetEvent+13 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 0000001c, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804f9f5f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000004
CURRENT_IRQL: 1c
FAULTING_IP:
nt!KeSetEvent+13
804f9f5f 8b7904 mov edi,dword ptr [ecx+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: vsmon.exe
LAST_CONTROL_TRANSFER: from 8061bd88 to 804f9f5f
STACK_TEXT:
a2cb4be0 8061bd88 00000000 00000000 00000000 nt!KeSetEvent+0x13
a2cb4ddc 805450de b9d30b85 877d70c0 00000000 nt!CcPfBootWorker+0x4ac
a2cb4de4 877d70c0 00000000 4000027f 02e90000 nt!KiThreadStartup+0x16
WARNING: Frame IP not in any known module. Following frames may be wrong.
a2cb4de8 00000000 4000027f 02e90000 5ad72679 0x877d70c0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeSetEvent+13
804f9f5f 8b7904 mov edi,dword ptr [ecx+4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeSetEvent+13
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4249fa54
FAILURE_BUCKET_ID: 0xA_nt!KeSetEvent+13
BUCKET_ID: 0xA_nt!KeSetEvent+13
Followup: MachineOwner
---------
__________________
DUMP 2
Microsoft ® Windows Debugger Version 6.11.0001.404 X86
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\minidump\Mini041609-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsof...ownload/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.050329-1536
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Apr 16 14:28:01.484 2009 (GMT-7)
System Uptime: 0 days 0:00:38.183
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {4, 1c, 0, 804f9f5f}
Probably caused by : ntkrpamp.exe ( nt!KeSetEvent+13 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 0000001c, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804f9f5f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000004
CURRENT_IRQL: 1c
FAULTING_IP:
nt!KeSetEvent+13
804f9f5f 8b7904 mov edi,dword ptr [ecx+4]
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: vsmon.exe
LAST_CONTROL_TRANSFER: from 8061bd88 to 804f9f5f
STACK_TEXT:
ba1f7be0 8061bd88 00000000 00000000 00000000 nt!KeSetEvent+0x13
ba1f7d74 00000000 00000000 00000000 00000000 nt!CcPfBootWorker+0x4ac
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeSetEvent+13
804f9f5f 8b7904 mov edi,dword ptr [ecx+4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeSetEvent+13
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4249fa54
FAILURE_BUCKET_ID: 0xA_nt!KeSetEvent+13
BUCKET_ID: 0xA_nt!KeSetEvent+13
Followup: MachineOwner
---------
_________________________
DUMP 3
Microsoft ® Windows Debugger Version 6.11.0001.404 X86
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\minidump\Mini041609-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsof...ownload/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.050329-1536
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Apr 16 14:32:30.984 2009 (GMT-7)
System Uptime: 0 days 0:02:24.664
Loading Kernel Symbols
...............................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {4, 1c, 0, 804f9f5f}
Probably caused by : ntkrpamp.exe ( nt!KeSetEvent+13 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 0000001c, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804f9f5f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000004
CURRENT_IRQL: 1c
FAULTING_IP:
nt!KeSetEvent+13
804f9f5f 8b7904 mov edi,dword ptr [ecx+4]
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: vsmon.exe
LAST_CONTROL_TRANSFER: from 8061bd88 to 804f9f5f
STACK_TEXT:
a19f5be0 8061bd88 00000000 00000000 00000000 nt!KeSetEvent+0x13
a19f5ddc 805450de b9d30b85 87796bf8 00000000 nt!CcPfBootWorker+0x4ac
a19f5de4 87796bf8 00000000 4000027f 02e90000 nt!KiThreadStartup+0x16
WARNING: Frame IP not in any known module. Following frames may be wrong.
a19f5de8 00000000 4000027f 02e90000 5ad72679 0x87796bf8
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeSetEvent+13
804f9f5f 8b7904 mov edi,dword ptr [ecx+4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeSetEvent+13
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4249fa54
FAILURE_BUCKET_ID: 0xA_nt!KeSetEvent+13
BUCKET_ID: 0xA_nt!KeSetEvent+13
Followup: MachineOwner