READ_ADDRESS: bebebf26 FAULTING_IP: win32k!OffsetChildren+40 970b934f 8b4668 mov eax,dword ptr [esi+68h] MM_INTERNAL_CODE: 2 IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 55e65292 MODULE_NAME: win32k FAULTING_MODULE: 97010000 win32k DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: b1.exe CURRENT_IRQL: 2 TRAP_FRAME: 9ea9fadc -- (.trap 0xffffffff9ea9fadc) ErrCode = 00000000 eax=00000000 ebx=00008000 ecx=fe4caf50 edx=ff810000 esi=bebebebe edi=00008000 eip=970b934f esp=9ea9fb50 ebp=9ea9fb6c iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 win32k!OffsetChildren+0x40: 970b934f 8b4668 mov eax,dword ptr [esi+68h] ds:0023:bebebf26=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82ae2ce7 to 82a7e308 STACK_TEXT: 9ea9f62c 82ae2ce7 00000003 f5aba55a 00000065 nt!RtlpBreakWithStatusInstruction 9ea9f67c 82ae37e5 00000003 c0602fa8 bebebf26 nt!KiBugCheckDebugBreak+0x1c 9ea9fa40 82a913c1 00000050 bebebf26 00000000 nt!KeBugCheck2+0x68b 9ea9fac4 82a43be8 00000000 bebebf26 00000000 nt!MmAccessFault+0x104 9ea9fac4 970b934f 00000000 bebebf26 00000000 nt!KiTrap0E+0xdc 9ea9fb6c 9709dc5c f9600618 00008000 00008000 win32k!OffsetChildren+0x40 9ea9fbf0 9709c0aa fe5c2f50 9723d860 fe5c2f50 win32k!zzzChangeStates+0x33e 9ea9fc6c 970b06ba 9723d860 00000000 f9600618 win32k!zzzBltValidBits+0x107 9ea9fcc4 970b0a97 fe5c2f50 00000000 00010164 win32k!xxxEndDeferWindowPosEx+0x152 9ea9fce4 9705ee7b f9600618 00000000 00000000 win32k!xxxSetWindowPos+0xf6 9ea9fd08 970b90a8 f9600618 0019f99c 00000000 win32k!xxxRedrawFrame+0x16 9ea9fd24 82a40a06 00010164 0000005a 0019f99c win32k!NtUserCallHwndLock+0x88 9ea9fd24 778771b4 00010164 0000005a 0019f99c nt!KiSystemServicePostCall 0019f988 01361436 00000000 00010164 0000005a ntdll!KiFastSystemCallRet WARNING: Stack unwind information not available. Following frames may be wrong. 0019f99c 0136157e 00010164 00000000 00000000 b1+0x1436 0019f9c8 01361871 00000001 0023b0b8 0023d3d0 b1+0x157e 0019fa14 7693ee6c 7ffd5000 0019fa60 77893ab3 b1+0x1871 0019fa20 77893ab3 7ffd5000 778d67ce 00000000 kernel32!BaseThreadInitThunk+0xe 0019fa60 77893a86 013618ee 7ffd5000 00000000 ntdll!__RtlUserThreadStart+0x70 0019fa78 00000000 013618ee 7ffd5000 00000000 ntdll!_RtlUserThreadStart+0x1b STACK_COMMAND: kb FOLLOWUP_IP: win32k!OffsetChildren+40 970b934f 8b4668 mov eax,dword ptr [esi+68h] SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: win32k!OffsetChildren+40 FOLLOWUP_NAME: MachineOwner FAILURE_BUCKET_ID: 0x50_VRF_win32k!OffsetChildren+40 BUCKET_ID: 0x50_VRF_win32k!OffsetChildren+40 Followup: MachineOwner ---------