@simpel1970
nein es kommt nicht das gleiche. Es gibt scheinbar zwei Auslöser. Der eine ist ksthnunk.sys siehe oben, und hier detailiert:
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002a9624e, Address of the instruction which caused the bugcheck
Arg3: fffff8800db98df0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!KiSignalSynchronizationObject+4e
fffff800`02a9624e 488908 mov qword ptr [rax],rcx
CONTEXT: fffff8800db98df0 -- (.cxr 0xfffff8800db98df0)
rax=850fe48445ffffff rbx=fffff8800db998b8 rcx=59840fc00000163d
rdx=fffff8800db998b0 rsi=fffff8800db998b0 rdi=59840fc00000163d
rip=fffff80002a9624e rsp=fffff8800db997d0 rbp=0000000000000000
r8=0000000000000000 r9=00000000c0000005 r10=fffff8800db99980
r11=fffff8800db999a8 r12=fffff80002a939c1 r13=fffff88002fd5180
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!KiSignalSynchronizationObject+0x4e:
fffff800`02a9624e 488908 mov qword ptr [rax],rcx ds:002b:850fe484`45ffffff=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: ehrecvr.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002a94646 to fffff80002a9624e
STACK_TEXT:
fffff880`0db997d0 fffff800`02a94646 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSignalSynchronizationObject+0x4e
fffff880`0db99820 fffff880`02dd262e : 00000000`00000000 fffffa80`00000000 fffffa80`0857f400 00000000`01b3e780 : nt!KeSetEvent+0x106
fffff880`0db99890 fffff800`02a939c1 : fffff880`0db998b8 fffffa80`0857f450 fffffa80`07072a20 fffff880`02dd2c21 : ksthunk!CKernelFilterDevice:

eferIrpCompletion+0x12
fffff880`0db998c0 fffff880`02dd294c : 00000000`00000001 fffffa80`07072c00 fffffa80`0857f450 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`0db999b0 fffff800`02da6687 : fffffa80`07064dd0 fffff880`0db99ca0 fffffa80`c0000005 fffffa80`07064dd0 : ksthunk!CKernelFilterDevice:

ispatchIrp+0x244
fffff880`0db99a10 fffff800`02da6ee6 : 00000000`01b3e678 00000000`000008cc 00000000`00000000 00000000`01b3e710 : nt!IopXxxControlFile+0x607
fffff880`0db99b40 fffff800`02a8f253 : fffffa80`06f3db50 00000000`01b3e658 fffff880`0db99bc8 00000000`00000003 : nt!NtDeviceIoControlFile+0x56
fffff880`0db99bb0 00000000`7735138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01b3e608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7735138a
FOLLOWUP_IP:
ksthunk!CKernelFilterDevice:

eferIrpCompletion+12
fffff880`02dd262e b8160000c0 mov eax,0C0000016h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: ksthunk!CKernelFilterDevice:

eferIrpCompletion+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ksthunk
IMAGE_NAME: ksthunk.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bca93
STACK_COMMAND: .cxr 0xfffff8800db98df0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_ksthunk!CKernelFilterDevice:

eferIrpCompletion+12
BUCKET_ID: X64_0x3B_ksthunk!CKernelFilterDevice:

eferIrpCompletion+12
Followup: MachineOwner
---------
und der komplette andere ist ks.sys, siehe hier detailliert:
Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\*****\Desktop\Dateien\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: srv*c:\websymbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`02a67000 PsLoadedModuleList = 0xfffff800`02cab670
Debug session time: Sun Oct 21 18:40:01.799 2012 (UTC + 2:00)
System Uptime: 0 days 1:42:48.063
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffde018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88007e030c0, fffff8800aa1fbd0, 0}
Probably caused by : ks.sys ( ks!CKsQueue::UnlockStreamPointer+64 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88007e030c0, Address of the instruction which caused the bugcheck
Arg3: fffff8800aa1fbd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
ks!CKsQueue::UnlockStreamPointer+64
fffff880`07e030c0 488b7030 mov rsi,qword ptr [rax+30h]
CONTEXT: fffff8800aa1fbd0 -- (.cxr 0xfffff8800aa1fbd0)
rax=0000000000000000 rbx=fffffa8007a8b7b0 rcx=fffff88007e13180
rdx=fffffa8006ec5f60 rsi=0000000000000001 rdi=fffffa8006ec5f60
rip=fffff88007e030c0 rsp=fffff8800aa205b0 rbp=0000000000000001
r8=0000000000000001 r9=0000000000000000 r10=0000000000000800
r11=0000000000000000 r12=fffffa8008142c10 r13=fffff8800aa20801
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
ks!CKsQueue::UnlockStreamPointer+0x64:
fffff880`07e030c0 488b7030 mov rsi,qword ptr [rax+30h] ds:002b:00000000`00000030=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: ehrecvr.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff88007e0d034 to fffff88007e030c0
STACK_TEXT:
fffff880`0aa205b0 fffff880`07e0d034 : fffffa80`08e2e6c0 00000001`00000004 fffffa80`06ec5fc0 00000000`00000001 : ks!CKsQueue::UnlockStreamPointer+0x64
fffff880`0aa20600 fffff880`07e7a5de : fffffa80`08e2e6c0 fffffa80`06ec5fc0 00000000`00000001 fffffa80`07a8b800 : ks!KsStreamPointerAdvance+0x58
fffff880`0aa20630 fffff880`07e6a33f : fffffa80`07a544f0 fffffa80`08de5b08 00000000`00000000 fffffa80`07a8b800 : Ph3xIB64!CMpegEncoderOutputPin:

rocess+0x27e
fffff880`0aa206d0 fffff880`07e02cef : 00000000`00000000 fffff800`00000000 fffffa80`07a54700 00000000`00000800 : Ph3xIB64!BasePinProcess+0x2f
fffff880`0aa20700 fffff880`07e02e8c : fffffa80`08de5b08 00000000`00000000 fffffa80`07a54900 fffffa80`07a8b800 : ks!CKsPin:

rocessingObjectWork+0xe3
fffff880`0aa20750 fffff880`07e02487 : fffffa80`07a8b7b0 fffffa80`07a54900 fffffa80`07a54670 fffffa80`07a8b7b0 : ks!CKsPin:

rocess+0x70
fffff880`0aa20780 fffff880`07e021d1 : fffffa80`07a8b7b0 fffffa80`07a54970 fffffa80`07a54720 fffffa80`07a54670 : ks!CKsQueue::AddFrame+0x1e7
fffff880`0aa207c0 fffff880`07e1b26f : 00000000`00000000 fffffa80`08e27060 fffff880`0aa208c0 fffffa80`08df6448 : ks!CKsQueue::TransferKsIrp+0x4a1
fffff880`0aa20850 fffff880`07e1a7bb : fffffa80`08389bc0 00000000`00000801 00000000`00000000 fffffa80`07a549a0 : ks!CKsPin:

ispatchDeviceIoControl+0x20b
fffff880`0aa208b0 fffff880`07e01560 : fffff800`02c6d990 fffff800`02dcbe37 fffff880`0aa20b98 fffffa80`076074d0 : ks!KsDispatchIrp+0xdb
fffff880`0aa208e0 fffff880`07e703af : fffffa80`0854b510 fffffa80`0854baf0 00000000`00000001 fffffa80`07a549a0 : ks!CKsDevice:

assThroughIrp+0xc0
fffff880`0aa20920 fffff880`07e67565 : fffffa80`0854b510 fffffa80`0854baf0 00000000`00000000 00000000`00000001 : Ph3xIB64!CVampDevice::VampAdapterDispatch+0x17b
fffff880`0aa20980 fffff880`07e47825 : fffffa80`07a54958 fffffa80`07a549a0 fffffa80`0854baf0 fffffa80`07a54720 : Ph3xIB64!VampAdapterDispatch+0x39
fffff880`0aa209b0 fffff800`02dfc687 : fffffa80`08fba070 fffff880`0aa20ca0 fffffa80`00000000 fffffa80`08fba070 : ksthunk!CKernelFilterDevice:

ispatchIrp+0x11d
fffff880`0aa20a10 fffff800`02dfcee6 : 00000000`058ff618 00000000`000006a0 00000000`00000000 00000000`0474ec80 : nt!IopXxxControlFile+0x607
fffff880`0aa20b40 fffff800`02ae5253 : fffffa80`08e27060 00000000`058ff5f8 fffff880`0aa20bc8 00000000`058ff7b8 : nt!NtDeviceIoControlFile+0x56
fffff880`0aa20bb0 00000000`776a138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`058ff5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776a138a
FOLLOWUP_IP:
ks!CKsQueue::UnlockStreamPointer+64
fffff880`07e030c0 488b7030 mov rsi,qword ptr [rax+30h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: ks!CKsQueue::UnlockStreamPointer+64
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ks
IMAGE_NAME: ks.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a3f3
STACK_COMMAND: .cxr 0xfffff8800aa1fbd0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_ks!CKsQueue::UnlockStreamPointer+64
BUCKET_ID: X64_0x3B_ks!CKsQueue::UnlockStreamPointer+64
Followup: MachineOwner
---------
LG Fab