Most active thread stack trace:
- Code: Select all
ntkrnlpa.exe!KeSetEvent+0x2a1
ntkrnlpa.exe!KeDelayExecutionThread+0x5cc
ntkrnlpa.exe!KeWaitForMutexObject+0x393
ntkrnlpa.exe!KeQueryHighestNodeNumber+0x9fe
ntkrnlpa.exe!KeRemoveQueueEx+0x988
ntkrnlpa.exe!KeDelayExecutionThread+0x5cc
ntkrnlpa.exe!KeWaitForMutexObject+0x393
ntkrnlpa.exe!NtWaitForSingleObject+0x1e8
ntkrnlpa.exe!ZwYieldExecution+0xb66
ntdll.dll!KiFastSystemCallRet
WinGate.exe!l4linkSt::operator=+0x13d8c8
WinGate.exe!l4linkSt::operator=+0x13d0da
WinGate.exe!l4linkSt::operator=+0x129ab5
kernel32.dll!BaseThreadInitThunk+0x12
ntdll.dll!RtlInitializeExceptionChain+0x63
ntdll.dll!RtlInitializeExceptionChain+0x36