Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\Programme\111610-19500-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Invalid directory table base value 0x0
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to load image Unknown_Module_6e6f6c2e`54524356, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_6e6f6c2e`54524356
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_6e6f6c2e`54524356
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0304e000 PsLoadedModuleList = 0xfffff800`0328be50
Debug session time: Tue Nov 16 18:02:06.540 2010 (UTC + 1:00)
System Uptime: 0 days 0:56:17.163
Unable to load image Unknown_Module_6e6f6c2e`54524356, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_6e6f6c2e`54524356
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_6e6f6c2e`54524356
Debugger can not determine kernel base address
Loading Kernel Symbols
.
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
.Missing image name, possible paged-out or corrupt data.
..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {6dda, 2, 0, fffff8800480c349}
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000006dda, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800480c349, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
0000000000006dda
CURRENT_IRQL: 0
FAULTING_IP:
+6bdb2faf04f4ddbc
fffff880`0480c349 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from fffff800030cc24a to fffff88003bd59c2
STACK_TEXT:
fffff800`00b9cc98 fffff800`030cc24a : 00000000`0023ac9d fffffa80`04ff2dd8 4fcad23f`e1e2f5e7 a5f5034e`1a07aea0 : 0xfffff880`03bd59c2
fffff800`00b9cca0 00000000`0023ac9d : fffffa80`04ff2dd8 4fcad23f`e1e2f5e7 a5f5034e`1a07aea0 00000000`00000000 : 0xfffff800`030cc24a
fffff800`00b9cca8 fffffa80`04ff2dd8 : 4fcad23f`e1e2f5e7 a5f5034e`1a07aea0 00000000`00000000 fffff800`030c9bfc : <Unloaded_Unknown_Module_00000000`00000008>+0x23ac95
fffff800`00b9ccb0 4fcad23f`e1e2f5e7 : a5f5034e`1a07aea0 00000000`00000000 fffff800`030c9bfc 00000001`d6bfb1d3 : 0xfffffa80`04ff2dd8
fffff800`00b9ccb8 a5f5034e`1a07aea0 : 00000000`00000000 fffff800`030c9bfc 00000001`d6bfb1d3 00000001`d6bfb1d3 : 0x4fcad23f`e1e2f5e7
fffff800`00b9ccc0 00000000`00000000 : fffff800`030c9bfc 00000001`d6bfb1d3 00000001`d6bfb1d3 00000001`d6bfb1d3 : 0xa5f5034e`1a07aea0
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------