nt!RtlpBreakWithStatusInstruction:
80528bdc cc int 3
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 1025b6a0, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 1025b6a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 1025b6a0
CURRENT_IRQL: 2
FAULTING_IP:
MSVCR100D+5b6a0
1025b6a0 ?? ???
PROCESS_NAME: open.exe
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: b2491d64 -- (.trap 0xffffffffb2491d64)
ErrCode = 00000004
eax=00000001 ebx=7ffde000 ecx=0012f594 edx=7c92e4f4 esi=0012f5ac edi=0012ff68
eip=1025b6a0 esp=0012f5a4 ebp=0012ff68 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
MSVCR100D+0x5b6a0:
001b:1025b6a0 ?? ???
Resetting default scope