Probably caused by : win32k.sys ( win32k!PDEVOBJ::vSync+12 ) Followup: MachineOwner --------- nt!RtlpBreakWithStatusInstruction: 82c87308 cc int 3 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5) Memory was referenced after it was freed. This cannot be protected by try-except. When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fef10df0, memory referenced Arg2: 00000000, value 0 = read operation, 1 = write operation Arg3: 930355f9, if non-zero, the address which referenced memory. Arg4: 00000000, (reserved) Debugging Details: ------------------ READ_ADDRESS: fef10df0 Special pool FAULTING_IP: win32k!PDEVOBJ::vSync+12 930355f9 f7404800100000 test dword ptr [eax+48h],1000h MM_INTERNAL_CODE: 0 IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 56422bfd MODULE_NAME: win32k FAULTING_MODULE: 92f70000 win32k DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD5 PROCESS_NAME: explorer.exe CURRENT_IRQL: 2 TRAP_FRAME: 9dd58c84 -- (.trap 0xffffffff9dd58c84) ErrCode = 00000000 eax=fef10da8 ebx=9303a235 ecx=fef10da8 edx=00000002 esi=9dd58d20 edi=fef10db8 eip=930355f9 esp=9dd58cf8 ebp=9dd58d00 iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282 win32k!PDEVOBJ::vSync+0x12: 930355f9 f7404800100000 test dword ptr [eax+48h],1000h ds:0023:fef10df0=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82cebce7 to 82c87308 STACK_TEXT: 9dd587d4 82cebce7 00000003 cc91d39c 00000065 nt!RtlpBreakWithStatusInstruction 9dd58824 82cec7e5 00000003 00000000 000fab92 nt!KiBugCheckDebugBreak+0x1c 9dd58be8 82c9a3c1 00000050 fef10df0 00000000 nt!KeBugCheck2+0x68b 9dd58c6c 82c4cbe8 00000000 fef10df0 00000000 nt!MmAccessFault+0x104 9dd58c6c 930355f9 00000000 fef10df0 00000000 nt!KiTrap0E+0xdc 9dd58d00 9303a1aa fef10db8 00000000 00000002 win32k!PDEVOBJ::vSync+0x12 9dd58d24 9303a243 00000040 82c49a06 0233f424 win32k!vSynchronizeDriver+0x12f 9dd58d2c 82c49a06 0233f424 776e71b4 badb0d00 win32k!GreFlush+0x7 9dd58d2c 776e71b4 0233f424 776e71b4 badb0d00 nt!KiSystemServicePostCall 0233f3fc 76ba5fde 76ba5fe9 744145dd 0233f4bc ntdll!KiFastSystemCallRet 0233f400 76ba5fe9 744145dd 0233f4bc 0026e5c8 GDI32!NtGdiFlush+0xc 0233f404 744145dd 0233f4bc 0026e5c8 0233f478 GDI32!GdiFlush+0x5 0233f424 74414966 070101cd 00010076 0233f558 UxTheme!COffScreenBuffer::CreateBuffer+0x95 0233f44c 7441413d 0026e664 00000000 00266a70 UxTheme!CPaintBuffer::_BeginWithoutAnim+0x2c 0233f460 74414354 0233f478 00000000 0233f584 UxTheme!CPaintBuffer::BeginAnimation+0x5c 0233f4c4 74414a2f 00000000 0026e5c8 0233f558 UxTheme!CPaintBufferPool::Impl::BeginAnimation+0x1f5 0233f4f0 744149e9 070101cd 0233f558 00000002 UxTheme!CPaintBufferPool::BeginBufferedPaint+0x27 0233f520 00414b52 070101cd 0233f558 00000002 UxTheme!BeginBufferedPaint+0x54 0233f588 00413caf 070101cd 0000000f 0031b950 Explorer!CTaskListWnd::_HandlePaint+0x7e 0233f5f8 0041203f 00010076 0000000f 00000000 Explorer!CTaskListWnd::v_WndProc+0x509 0233f61c 7782c4f7 00010076 0000000f 00000000 Explorer!CImpWndProc::s_WndProc+0x68 0233f648 77825faf 00411ffd 00010076 0000000f USER32!InternalCallWinProc+0x23 0233f6c0 77824f1b 00000000 00411ffd 00010076 USER32!UserCallWinProcCheckWow+0xe0 0233f720 77824f8d 00894668 0000000f 00000000 USER32!DispatchClientMessage+0xe6 0233f748 776e70ee 0233f760 00000018 0233f7b0 USER32!__fnDWORD+0x24 0233f774 77825d1c 77825d43 0233f7e8 0d699209 ntdll!KiUserCallbackDispatcher+0x2e 0233f778 77825d43 0233f7e8 0d699209 80000000 USER32!NtUserDispatchMessage+0xc 0233f7c0 7782cc88 00411ffd 00000000 0233f810 USER32!DispatchMessageWorker+0x3e4 0233f7d0 00411f3e 0233f7e8 00000000 80000000 USER32!DispatchMessageW+0xf 0233f810 00438907 00000000 76b50041 0233f8a8 Explorer!CTray::_MessageLoop+0x24e 0233f820 76b543c0 004c1460 00000000 00000000 Explorer!CTray::MainThreadProc+0x8a 0233f8a8 76aaee6c 0016f884 0233f8f4 77703ab3 SHLWAPI!WrapperThreadProc+0x1b5 0233f8b4 77703ab3 0016f884 7544527f 00000000 kernel32!BaseThreadInitThunk+0xe 0233f8f4 77703a86 76b542ed 0016f884 00000000 ntdll!__RtlUserThreadStart+0x70 0233f90c 00000000 76b542ed 0016f884 00000000 ntdll!_RtlUserThreadStart+0x1b STACK_COMMAND: kb FOLLOWUP_IP: win32k!PDEVOBJ::vSync+12 930355f9 f7404800100000 test dword ptr [eax+48h],1000h SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: win32k!PDEVOBJ::vSync+12 FOLLOWUP_NAME: MachineOwner FAILURE_BUCKET_ID: 0xD5_VRF_win32k!PDEVOBJ::vSync+12 BUCKET_ID: 0xD5_VRF_win32k!PDEVOBJ::vSync+12 Followup: MachineOwner ---------