ADDITIONAL_DEBUG_TEXT: Use '!findthebuild' command to search for the target build information. If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols. MODULE_NAME: RVFsSec FAULTING_MODULE: 804d7000 nt DEBUG_FLR_IMAGE_TIMESTAMP: 47ba6df1 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in "0x%08lx" verweist auf Speicher in "0x%08lx". Der Vorgang "%s" konnte nicht auf dem Speicher durchgef hrt werden. FAULTING_IP: nt+669c7 8053d9c7 8a27 mov ah,byte ptr [edi] TRAP_FRAME: b6fc3a50 -- (.trap 0xffffffffb6fc3a50) ErrCode = 00000000 eax=00000065 ebx=ba33be40 ecx=8a6cda40 edx=e121d800 esi=ba33b44b edi=00000000 eip=8053d9c7 esp=b6fc3ac4 ebp=b6fc3ad0 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 nt+0x669c7: 8053d9c7 8a27 mov ah,byte ptr [edi] ds:0023:00000000=?? Resetting default scope CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0x8E LAST_CONTROL_TRANSFER: from ba33b56d to 8053d9c7 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. b6fc3ad0 ba33b56d 00000000 ba33b44a b6fc3d64 nt+0x669c7 b6fc3af4 b6e130cf 025ad778 000f001f 00000000 RVFsSec+0x356d b6fc3d40 8054162c 025ad778 000f001f 00000000 OADriver+0x150cf b6fc3d64 7c91e4f4 badb0d00 025ad6d4 b6059d98 nt+0x6a62c b6fc3d68 badb0d00 025ad6d4 b6059d98 b6059dcc 0x7c91e4f4 b6fc3d6c 025ad6d4 b6059d98 b6059dcc 00000000 0xbadb0d00 b6fc3d70 b6059d98 b6059dcc 00000000 00000000 0x25ad6d4 b6fc3d74 b6059dcc 00000000 00000000 00000000 0xb6059d98 b6fc3d78 00000000 00000000 00000000 00000000 0xb6059dcc STACK_COMMAND: kb FOLLOWUP_IP: RVFsSec+356d ba33b56d 85c0 test eax,eax SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: RVFsSec+356d FOLLOWUP_NAME: MachineOwner IMAGE_NAME: RVFsSec.sys BUCKET_ID: WRONG_SYMBOLS Followup: MachineOwner ---------