Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032811-16863-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c4d000 PsLoadedModuleList = 0xfffff800`02e8ae50
Debug session time: Mon Mar 28 00:44:28.184 2011 (UTC - 4:00)
System Uptime: 1 days 20:21:53.679
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {2000a, 2, 0, fffff80002cdeef1}
Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+47e )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000002000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cdeef1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef50e0
000000000002000a
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmUnlockPages+11
fffff800`02cdeef1 440fb7410a movzx r8d,word ptr [rcx+0Ah]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff88002f93670 -- (.trap 0xfffff88002f93670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060970 rbx=0000000000000000 rcx=0000000000020000
rdx=fffff88002f93906 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cdeef1 rsp=fffff88002f93800 rbp=00000000a000000c
r8=000000000000000b r9=fffff88003f622d0 r10=0000000000000020
r11=fffff88002f93968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MmUnlockPages+0x11:
fffff800`02cdeef1 440fb7410a movzx r8d,word ptr [rcx+0Ah] ds:1970:00000000`0002000a=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cbcca9 to fffff80002cbd740
STACK_TEXT:
fffff880`02f93528 fffff800`02cbcca9 : 00000000`0000000a 00000000`0002000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f93530 fffff800`02cbb920 : fffffa80`07b2b300 00000000`00020000 fffffa80`07d451a0 fffff880`10b67f79 : nt!KiBugCheckDispatch+0x69
fffff880`02f93670 fffff800`02cdeef1 : fffff880`02f64180 fffffa80`08fe5301 fffffa80`07b2b538 fffffa80`082a41a0 : nt!KiPageFault+0x260
fffff880`02f93800 fffff800`02cbfae8 : fffffa80`089c3150 fffff880`10b8f0d8 fffffa80`07b2b300 fffff880`03f612c3 : nt!MmUnlockPages+0x11
fffff880`02f93890 fffff880`03f5fcd6 : 00000000`00000004 fffffa80`08aa0a06 fffffa80`08aa0ad0 00000000`00000000 : nt!IopfCompleteRequest+0x168
fffff880`02f93970 fffff880`05185c79 : 00000000`00000002 00000000`ffffffff fffffa80`07bd1010 fffffa80`08aa0190 : mouclass!MouseClassServiceCallback+0x47e
fffff880`02f939f0 fffff800`02cbfd26 : fffffa80`07e8fd93 fffff880`00000000 fffffa80`00000001 00000000`00000000 : mouhid!MouHid_ReadComplete+0x69d
fffff880`02f93a70 fffff880`05165acc : fffffa80`08a90c50 fffffa80`08a90c06 fffffa80`08a8f700 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f93b50 fffff880`05165d35 : fffffa80`08a90602 fffffa80`08a90660 fffffa80`08a8f7e0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x130
fffff880`02f93be0 fffff800`02cbfd26 : fffffa80`07bc6ee3 00000000`00000000 fffffa80`08a8f601 fffffa80`07bc6c60 : HIDCLASS!HidpInterruptReadComplete+0x235
fffff880`02f93c70 fffff880`10b755d9 : fffffa80`07d45050 fffffa80`06ccf500 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f93d50 fffff880`10b75ab7 : fffffa80`08ee1502 fffffa80`07bc6c60 00000000`ffffffff fffffa80`07d45ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f93e30 fffff880`10b7364f : fffffa80`07d45ea8 fffffa80`07d451a0 fffffa80`07d46040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f93e90 fffff880`10b64f89 : fffffa80`07d45050 00000000`00000000 fffffa80`07d45e02 fffffa80`07d45ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f93ed0 fffff800`02cc8bfc : fffff880`02f64180 fffffa80`07d45ea8 fffffa80`07d45ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f93f00 fffff800`02cc3865 : fffff880`02f8cc98 fffffa80`08ae2580 00000000`00000000 fffff880`10b64db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f93fb0 fffff800`02cc367c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`046fabe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
mouclass!MouseClassServiceCallback+47e
fffff880`03f5fcd6 488d4e20 lea rcx,[rsi+20h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: mouclass!MouseClassServiceCallback+47e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc116
FAILURE_BUCKET_ID: X64_0xA_mouclass!MouseClassServiceCallback+47e
BUCKET_ID: X64_0xA_mouclass!MouseClassServiceCallback+47e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032311-14086-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Wed Mar 23 14:49:08.402 2011 (UTC - 4:00)
System Uptime: 0 days 6:15:44.947
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffff80002c18cb0, fffff80002c38cb0, fffff80002c18cb0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )
Followup: Pool_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffff80002c18cb0, the pool entry being checked.
Arg3: fffff80002c38cb0, the read back flink freelist value (should be the same as 2).
Arg4: fffff80002c18cb0, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Downloader_Dia
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002bbcd6f to fffff80002a89740
STACK_TEXT:
fffff880`03b03b88 fffff800`02bbcd6f : 00000000`00000019 00000000`00000003 fffff800`02c18cb0 fffff800`02c38cb0 : nt!KeBugCheckEx
fffff880`03b03b90 fffff800`02a691ea : fffff880`00000000 00000000`00000000 00000000`6c624e54 fffffa80`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`03b03c80 fffff880`01490271 : fffff8a0`09b53010 fffffa80`00000038 fffff880`01254a00 00060000`000000a0 : nt!ExAllocatePoolWithTagPriority+0x4a
fffff880`03b03d10 fffff880`015828a1 : fffffa80`00000001 00000000`00000009 fffff880`03b03e98 00000000`00000014 : ndis!NdisAllocateNetBufferList+0x342
fffff880`03b03d60 fffff880`0167a329 : 00000000`00000009 fffffa80`079fe5f0 00000000`00000000 00000000`00000000 : NETIO!NetioAllocateAndReferenceNetBufferListNetBufferMdlAndData+0x21
fffff880`03b03d90 fffff880`01678bc9 : fffffa80`08f04190 00000000`00000001 00000000`0000b48f 00000000`00000009 : tcpip!TcpBeginTcbSend+0x299
fffff880`03b04010 fffff880`0167703a : fffff880`03b04300 fffff8a0`09b53450 00000000`00000000 fffff880`03b04300 : tcpip!TcpTcbSend+0x1d9
fffff880`03b04290 fffff880`01676e28 : fffffa80`079fe5f0 fffffa80`079fe5f0 00000000`00000000 00000000`00000001 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0x19a
fffff880`03b042c0 fffff880`01676e7b : 00000000`00003f01 fffff800`02abc0be fffffa80`06f70b60 fffff880`010dd0a2 : tcpip!TcpEnqueueTcbSend+0x438
fffff880`03b04360 fffff800`02a98e5a : fffff880`03b04430 fffff880`010dc32e fffffa80`09246440 fffff880`03b044c0 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`03b04390 fffff880`0167cdaa : fffff880`01676e60 fffff880`03b044a0 fffffa80`0731c600 fffff880`02cf36ac : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`03b04470 fffff880`02d0b67b : fffffa80`078e7260 fffff880`03b04ca0 00000000`00000009 fffffa80`06d3e280 : tcpip!TcpTlConnectionSend+0x7a
fffff880`03b044e0 fffff880`02cf2423 : 00000000`00000000 fffffa80`00000000 00000000`00000000 fffff880`03b048f0 : afd!AfdFastConnectionSend+0x38b
fffff880`03b046a0 fffff800`02da22b3 : 00000000`00000009 fffffa80`09244490 00000000`03a4f5d4 fffff800`02bbe201 : afd!AfdFastIoDeviceControl+0x413
fffff880`03b04a10 fffff800`02da2da6 : fffffa80`08dc0060 00000000`000006b4 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
fffff880`03b04b40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+a56
fffff800`02bbcd6f cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+a56
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032811-12729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Mon Mar 28 17:49:48.328 2011 (UTC - 4:00)
System Uptime: 0 days 9:27:40.873
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002cb1acf, 0, 10}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+13f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cb1acf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000010, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiSwapWslEntries+13f
fffff800`02cb1acf 488b5110 mov rdx,qword ptr [rcx+10h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
0000000000000010
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: SearchIndexer.
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff8800779c8e8 -- (.exr 0xfffff8800779c8e8)
ExceptionAddress: fffff80002cb1acf (nt!MiSwapWslEntries+0x000000000000013f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
TRAP_FRAME: fffff8800779c990 -- (.trap 0xfffff8800779c990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cb1acf rsp=fffff8800779cb20 rbp=fffff8800779cca0
r8=fffff80002c11000 r9=fffffa8000000000 r10=0000000000000000
r11=fffff8800779ca60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiSwapWslEntries+0x13f:
fffff800`02cb1acf 488b5110 mov rdx,qword ptr [rcx+10h] ds:00000000`00000010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cbba39 to fffff80002c81740
STACK_TEXT:
fffff880`0779c118 fffff800`02cbba39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cb1acf 00000000`00000000 : nt!KeBugCheckEx
fffff880`0779c120 fffff800`02c80d82 : fffff880`0779c8e8 fffffa80`08f22820 fffff880`0779c990 fffff680`00000000 : nt!KiDispatchException+0x1b9
fffff880`0779c7b0 fffff800`02c7f8fa : 00000000`00000000 fffffa80`08f22820 fffff880`0779cb00 00000000`06c0fa00 : nt!KiExceptionDispatch+0xc2
fffff880`0779c990 fffff800`02cb1acf : 00000000`00000001 fffff880`0779cba8 fffff880`0779cbc8 00000000`000e8401 : nt!KiPageFault+0x23a
fffff880`0779cb20 00000000`0000ff00 : fffffa80`08f22891 fffffa80`08f22868 fffffa80`08f22864 fffff880`0779cbe0 : nt!MiSwapWslEntries+0x13f
fffff880`0779cb80 fffffa80`08f22891 : fffffa80`08f22868 fffffa80`08f22864 fffff880`0779cbe0 fffffa80`07a11060 : 0xff00
fffff880`0779cb88 fffffa80`08f22868 : fffffa80`08f22864 fffff880`0779cbe0 fffffa80`07a11060 00000000`00000000 : 0xfffffa80`08f22891
fffff880`0779cb90 fffffa80`08f22864 : fffff880`0779cbe0 fffffa80`07a11060 00000000`00000000 00000000`00000000 : 0xfffffa80`08f22868
fffff880`0779cb98 fffff880`0779cbe0 : fffffa80`07a11060 00000000`00000000 00000000`00000000 fffffa80`00000000 : 0xfffffa80`08f22864
fffff880`0779cba0 fffffa80`07a11060 : 00000000`00000000 00000000`00000000 fffffa80`00000000 00000000`00000000 : 0xfffff880`0779cbe0
fffff880`0779cba8 00000000`00000000 : 00000000`00000000 fffffa80`00000000 00000000`00000000 fffffa80`082cd760 : 0xfffffa80`07a11060
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSwapWslEntries+13f
fffff800`02cb1acf 488b5110 mov rdx,qword ptr [rcx+10h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiSwapWslEntries+13f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiSwapWslEntries+13f
BUCKET_ID: X64_0x1E_c0000005_nt!MiSwapWslEntries+13f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032811-12604-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c01000 PsLoadedModuleList = 0xfffff800`02e3ee50
Debug session time: Mon Mar 28 17:59:38.343 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:42.263
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002c7622f, fffff880063810b0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiDeferredReadyThread+34f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c7622f, Address of the instruction which caused the bugcheck
Arg3: fffff880063810b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiDeferredReadyThread+34f
fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0
CONTEXT: fffff880063810b0 -- (.cxr 0xfffff880063810b0)
rax=0000000000000000 rbx=0000f824b48b4cab rcx=0000000000000000
rdx=0000000000000000 rsi=fffff88002fd5180 rdi=fffffa80091ba5f0
rip=fffff80002c7622f rsp=fffff88006381a80 rbp=0000000000020003
r8=0000000000000001 r9=fffffa80091ba6f8 r10=fffff80002c01000
r11=00000000000f00ff r12=0000f824b48b4cab r13=fffff88002fd5180
r14=fffffa80091ba6f8 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010292
nt!KiDeferredReadyThread+0x34f:
fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0 ds:002b:0000f824`b48b4cdb=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002c8286b to fffff80002c7622f
STACK_TEXT:
fffff880`06381a80 fffff800`02c8286b : fffff880`02fd5180 fffff880`02fd5180 00000000`00000000 fffffa80`07b4fb90 : nt!KiDeferredReadyThread+0x34f
fffff880`06381b00 fffff800`02f6bcf4 : 00000000`00000000 00000000`00000000 00000000`015e0a00 fffff880`00000000 : nt!KiInsertQueue+0x15b
fffff880`06381b70 fffff800`02c817ae : 00000000`00000000 00000000`00000001 fffffa80`091b2060 fffffa80`091b2060 : nt!IoSetIoCompletionEx+0x58
fffff880`06381ba0 fffff800`02c70993 : fffffa80`091b7060 fffffa80`091b2060 fffff880`06381ca0 00000000`015e0a00 : nt!NtReleaseWorkerFactoryWorker+0x196
fffff880`06381c20 00000000`76dd0a6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`062bf5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76dd0a6a
FOLLOWUP_IP:
nt!KiDeferredReadyThread+34f
fffff800`02c7622f f0490fba6c243000 lock bts qword ptr [r12+30h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiDeferredReadyThread+34f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff880063810b0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KiDeferredReadyThread+34f
BUCKET_ID: X64_0x3B_nt!KiDeferredReadyThread+34f
Followup: MachineOwner
---------