Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works

BSOD WinXP Medion e1210 Netbook (BugCheck 100000BE)

  • Please log in to reply



    New Member

  • Member
  • Pip
  • 1 posts
Hello all!

I have a problem with a Medion e1210 Netbook. It crashes with a BSOD in always the same behaviour.

When W-LAN is activated and you connect to an insecure WLAN (e.g. in hotels) the system crashes after about 10-15 seconds with a BSOD.
When you connect to a (e.g.) WPA2 secured network via W-LAN everthing is fine. No crashes.

I attached the debugging protocol and the minidump file.

It would be great if someone could help me!


Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64
Copyright © Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\Toppa\Desktop\Mini052411-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*D:\Symbole*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Tue May 24 20:01:54.968 2011 (UTC + 2:00)
System Uptime: 0 days 0:03:10.656
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
*** WARNING: Unable to verify timestamp for elcapitd.sys
*** ERROR: Module load completed but symbols could not be loaded for elcapitd.sys
* *
* Bugcheck Analysis *
* *

Use !analyze -v to get detailed debugging information.

BugCheck 100000BE, {a7f47c1c, e115121, f7934b54, a}

Probably caused by : elcapitd.sys ( elcapitd+4dae )

Followup: MachineOwner

1: kd> !analyze -v
* *
* Bugcheck Analysis *
* *

An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arg1: a7f47c1c, Virtual address for the attempted write.
Arg2: 0e115121, PTE contents.
Arg3: f7934b54, (reserved)
Arg4: 0000000a, (reserved)

Debugging Details:





LAST_CONTROL_TRANSFER: from a76f2dae to 806e884a

f7934bc4 a76f2dae 00000000 a7f47c0b 8505b358 hal!KfAcquireSpinLock+0x1a
WARNING: Stack unwind information not available. Following frames may be wrong.
f7934bd8 a76f40ad 8505b358 8505b3ef 8505b358 elcapitd+0x4dae
f7934bf0 804f16c0 00000000 8505b358 f7934a2c elcapitd+0x60ad
f7934c20 a7f55f0c f7934c54 a7f55f1e 8505b358 nt!IopfCompleteRequest+0xa2
f7934c28 a7f55f1e 8505b358 00000000 00000000 tcpip!TCPNonCancellableRequestComplete+0x1a
f7934c54 a7f44491 070945d0 00000002 860945d4 tcpip!CloseTCB+0x184
f7934c70 a7f41071 860945d0 00000002 00000040 tcpip!DerefTCB+0x60
f7934c94 a7f3aa0e 00000002 00000002 f7934cc0 tcpip!ProcessPerCpuTCBDelayQ+0x131
f7934cc8 a7f3a955 00000002 a7f3a901 a7f3a3d6 tcpip!ProcessTCBDelayQ+0xc4
f7934cd4 a7f3a3d6 a7f7a000 00000000 a7f47e5c tcpip!TCPRcvComplete+0x20
f7934ce0 a7f47e5c a7f7b684 a7f7b680 a7f47d13 tcpip!IPRcvComplete+0x21
f7934d60 f77e93e4 a7f7b680 85e3d5e8 a7f7b690 tcpip!LoopXmitRtn+0x1e2
f7934d7c 805387cb 85e3d5e8 00000000 86bc2640 TDI!CTEpEventHandler+0x32
f7934dac 805cffa8 a7f7b680 00000000 00000000 nt!ExpWorkerThread+0xef
f7934ddc 8054615e 805386dc 00000001 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16


a76f2dae ?? ???


SYMBOL_NAME: elcapitd+4dae


MODULE_NAME: elcapitd

IMAGE_NAME: elcapitd.sys


FAILURE_BUCKET_ID: 0xBE_elcapitd+4dae

BUCKET_ID: 0xBE_elcapitd+4dae

Followup: MachineOwner

1: kd> lmvm elcapitd
start end module name
a76ee000 a76f7a40 elcapitd T (no symbols)
Loaded symbol image file: elcapitd.sys
Image path: elcapitd.sys
Image name: elcapitd.sys
Timestamp: Wed Mar 28 10:00:25 2007 (460A2099)
CheckSum: 00011263
ImageSize: 00009A40
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4

Attached Files

  • 0


Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP