BugCheck A, {0, 2, 0, fffff80002ca1915}
[U][B]Unable to load image \SystemRoot\system32\DRIVERS\vfilter.sys[/B][/U], Win32 error 0n2
*** WARNING: Unable to verify timestamp for [U][B]vfilter.sys[/B][/U]
*** ERROR: Module load completed but symbols could not be loaded for [U][B]vfilter.sys[/B][/U]
[U][B]Probably caused by[/B][/U] : [U][B]vfilter.sys[/B][/U] ( [U][B]vfilter[/B][/U]+29a6 )
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ca1915, address which referenced memory
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ecc100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSetEvent+1e3
fffff800`02ca1915 488b00 mov rax,qword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800c358fc0 -- (.trap 0xfffff8800c358fc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8006d13888
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ca1915 rsp=fffff8800c359150 rbp=0000000000000002
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KeSetEvent+0x1e3:
fffff800`02ca1915 488b00 mov rax,qword ptr [rax] ds:0002:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c9c769 to fffff80002c9d1c0
STACK_TEXT:
fffff880`0c358e78 fffff800`02c9c769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0c358e80 fffff800`02c9b3e0 : fffffa80`0750f160 fffff880`0428bd13 ffff0000`0daa18b7 fffffa80`06d13880 : nt!KiBugCheckDispatch+0x69
fffff880`0c358fc0 fffff800`02ca1915 : fffff880`0c3591c0 fffff880`01886b0e 00000000`00000051 fffff880`0c359240 : nt!KiPageFault+0x260
fffff880`0c359150 fffff880`018869a6 : fffffa80`00000000 00000000`00000000 00000000`00000000 fffffa80`06d13870 : nt!KeSetEvent+0x1e3
fffff880`0c3591c0 fffffa80`00000000 : 00000000`00000000 00000000`00000000 fffffa80`06d13870 00000000`00000000 : [U][B]vfilter[/B][/U]+0x29a6
fffff880`0c3591c8 00000000`00000000 : 00000000`00000000 fffffa80`06d13870 00000000`00000000 fffff880`0188642b : 0xfffffa80`00000000
STACK_COMMAND: kb
FOLLOWUP_IP:
[U][B]vfilter[/B][/U]+29a6
fffff880`018869a6 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: [B]vfilter[/B] +29a6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: [U][B]vfilter[/B][/U]
IMAGE_NAME: [U][B]vfilter.sys[/B][/U]
DEBUG_FLR_IMAGE_TIMESTAMP: 4b048bff
FAILURE_BUCKET_ID: X64_0xA_[B]vfilter[/B]+29a6
BUCKET_ID: X64_0xA_[B]vfilter[/B]+29a6