Il secondo è:

Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini110210-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Tue Nov 2 17:55:22.625 2010 (GMT+1)
System Uptime: 0 days 0:04:28.359
Loading Kernel Symbols
.................................................. .................................................. .................................
Loading User Symbols
Loading unloaded module list
.......
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {800012d8, 2, 1, 804f478e}

Probably caused by : ntkrpamp.exe ( nt!IopTimerDispatch+4e )

Followup: MachineOwner
---------

0: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 800012d8, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804f478e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 800012d8

CURRENT_IRQL: 2

FAULTING_IP:
nt!IopTimerDispatch+4e
804f478e ff4df8 dec dword ptr [ebp-8]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: Idle

LAST_CONTROL_TRANSFER: from 8050220f to 804f478e

STACK_TEXT:
805512e0 8050220f 8055adc0 00000000 bd229710 nt!IopTimerDispatch+0x4e
805513fc 8050232b 8055c0c0 ffdff9c0 ffdff000 nt!KiTimerListExpire+0x14b
80551428 80545ebf 8055c4c0 00000000 00004316 nt!KiTimerExpiration+0xb1
80551440 8055be60 ffdffc50 00000000 8055be60 nt!KiRetireDpcList+0x61
80551450 80545da4 00000000 0000000e 00000000 nt!KiIdleThread0
80551454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!IopTimerDispatch+4e
804f478e ff4df8 dec dword ptr [ebp-8]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!IopTimerDispatch+4e

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8

FAILURE_BUCKET_ID: 0xA_W_nt!IopTimerDispatch+4e

BUCKET_ID: 0xA_W_nt!IopTimerDispatch+4e

Followup: MachineOwner
---------


Grazie mille!!!