Microsoft (R) Windows Debugger Version 6.10.0003.233 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [G:\AV nowe\Dumpy\Mini092010-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\symbole*http://msdl.microsoft.com/download/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt Built by: 2600.xpsp_sp2_gdr.100216-1441 Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a6a0 Debug session time: Mon Sep 20 17:43:06.515 2010 (GMT+2) System Uptime: 0 days 0:06:48.121 Loading Kernel Symbols ............................................................... ............................................................... Loading User Symbols Loading unloaded module list .......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {1, 2, 1, f6c2ef8b} Unable to load image \SystemRoot\system32\drivers\ALCXWDM.SYS, Win32 error 0n2 *** WARNING: Unable to verify timestamp for ALCXWDM.SYS *** ERROR: Module load completed but symbols could not be loaded for ALCXWDM.SYS Probably caused by : ALCXWDM.SYS ( ALCXWDM+54f8b ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000001, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, value 0 = read operation, 1 = write operation Arg4: f6c2ef8b, address which referenced memory Debugging Details: ------------------ WORKER_ROUTINE: +1 00000001 ?? ??? WORK_ITEM: f6c2ef8b CURRENT_IRQL: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xD1 TRAP_FRAME: f794aba8 -- (.trap 0xfffffffff794aba8) ErrCode = 00000002 eax=829a900a ebx=00000001 ecx=829a9968 edx=0000548f esi=00000b4a edi=000013f3 eip=f6c2ef8b esp=f794ac1c ebp=00000767 iopl=0 nv up ei pl nz na po cy cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010203 ALCXWDM+0x54f8b: f6c2ef8b ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from f6c2ef8b to 804e1892 STACK_TEXT: f794aba8 f6c2ef8b badb0d00 0000548f 000000c0 nt!KiTrap0E+0x233 WARNING: Stack unwind information not available. Following frames may be wrong. f794ac18 00000000 829a9008 f794accc 82a8aed0 ALCXWDM+0x54f8b STACK_COMMAND: kb FOLLOWUP_IP: ALCXWDM+54f8b f6c2ef8b ?? ??? SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: ALCXWDM+54f8b FOLLOWUP_NAME: MachineOwner MODULE_NAME: ALCXWDM IMAGE_NAME: ALCXWDM.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 0 FAILURE_BUCKET_ID: 0xD1_ALCXWDM+54f8b BUCKET_ID: 0xD1_ALCXWDM+54f8b Followup: MachineOwner ---------