0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000008, value 0 = read operation, 1 = write operation
Arg4: 00000000, address which referenced memory
Debugging Details:
------------------
MODULE_NAME: nt
FAULTING_MODULE: 84a45000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
00000000
CURRENT_IRQL: 0
FAULTING_IP:
+65722faf03afdebc
00000000 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 00000000 to 84a8b7eb
FAILED_INSTRUCTION_ADDRESS:
+65722faf03afdebc
00000000 ?? ???
STACK_TEXT:
84b6af7c 00000000 badb0d00 00000000 00000000 nt+0x467eb
STACK_COMMAND: kb
FOLLOWUP_IP:
nt+467eb
84a8b7eb 833dc48aba8400 cmp dword ptr [nt+0x163ac4 (84ba8ac4)],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt+467eb
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlpa.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------