Um nocheinmal auf die Auswertung zurückzukommen:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Eigene Dateien\HELP\limbi007\040612-20373-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`03268000 PsLoadedModuleList = 0xfffff800`034ac650
Debug session time: Fri Apr 6 12:24:28.199 2012 (GMT+2)
System Uptime: 0 days 1:40:15.386
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800032c6fb0, 0, 2c}
Probably caused by : memory_corruption ( nt!MiSelectImageBase+6c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800032c6fb0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000000000000002c, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in "0x%08lx" verweist auf Speicher in "0x%08lx". Der Vorgang "%s" konnte nicht auf dem Speicher durchgef hrt werden.
FAULTING_IP:
nt!MiSelectImageBase+6c
fffff800`032c6fb0 664185402c test word ptr [r8+2Ch],ax
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000000000002c
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003516100
000000000000002c
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002ba1fe0 -- (.trap 0xfffff88002ba1fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000002000 rbx=0000000000000000 rcx=0000000100000000
rdx=fffff800034962c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032c6fb0 rsp=fffff88002ba2170 rbp=0000000000000001
r8=0000000000000000 r9=000000000000fdff r10=0000000000000000
r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!MiSelectImageBase+0x6c:
fffff800`032c6fb0 664185402c test word ptr [r8+2Ch],ax ds:00000000`0000002c=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000332fa08 to fffff800032e4d40
STACK_TEXT:
fffff880`02ba1758 fffff800`0332fa08 : 00000000`0000001e ffffffff`c0000005 fffff800`032c6fb0 00000000`00000000 : nt!KeBugCheckEx
fffff880`02ba1760 fffff800`032e43c2 : fffff880`02ba1f38 ffffffff`ffffffff fffff880`02ba1fe0 fffff8a0`021df8f0 : nt! ?? ::FNODOBFM::`string'+0x48d2d
fffff880`02ba1e00 fffff800`032e2f3a : 00000000`00000000 00000000`0000002c fffff880`012b9d00 ffffffff`ffffffff : nt!KiExceptionDispatch+0xc2
fffff880`02ba1fe0 fffff800`032c6fb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`02ba2170 fffff800`035bfb48 : fffff8a0`021df8f0 fffff8a0`02145b60 00000000`00000000 00000000`0000fe00 : nt!MiSelectImageBase+0x6c
fffff880`02ba2260 fffff800`035e073f : 00000000`00000004 00000000`00000080 00000000`01000000 00000000`01000000 : nt!MiRelocateImageAgain+0xe8
fffff880`02ba22b0 fffff800`035bf2a6 : fffff880`02ba2500 fffff8a0`0e4005b0 fffff880`02ba25a8 fffff880`02ba24f8 : nt!MmCreateSection+0x2df
fffff880`02ba24b0 fffff800`0373f865 : fffff8a0`0e130850 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x171
fffff880`02ba2530 fffff800`0373fc17 : 00000000`00000010 fffff8a0`0d8514c0 fffff880`02ba26c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
fffff880`02ba2620 fffff800`03740047 : fffff880`02ba2740 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
fffff880`02ba2710 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchScenario+0x187
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSelectImageBase+6c
fffff800`032c6fb0 664185402c test word ptr [r8+2Ch],ax
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiSelectImageBase+6c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ec79dd2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_nt!MiSelectImageBase+6c
BUCKET_ID: X64_0x1E_nt!MiSelectImageBase+6c
Followup: MachineOwner
---------