This is pretty much the only useful info in the bug report which I assume reflects code in mfplat.dll. Maybe it means something to you. Not all are the same read address and sometimes it is an error writing to an address. This is just one example:
Access violation at address 73269836 in module 'Mfplat.dll'. Read of address 0B990000
Assembler Information:
-------------------------------------------------------------------------------
; Base Address: $73269000, Allocation Base: $731C0000, Region Size: 712704
; Allocation Protect: PAGE_EXECUTE_WRITECOPY, Protect: PAGE_EXECUTE_READ
; State: MEM_COMMIT, Type: MEM_IMAGE
;
7326980E 880431 MOV [ECX+ESI], AL
73269811 46 INC ESI
73269812 83EA01 SUB EDX, 1
73269815 75F5 JNZ -$0B ; ($7326980C)
73269817 8B4DF4 MOV ECX, [EBP-$0C]
7326981A 8B55E8 MOV EDX, [EBP-$18]
7326981D 8B75FC MOV ESI, [EBP-4]
73269820 8B45F8 MOV EAX, [EBP-8]
73269823 03F1 ADD ESI, ECX
73269825 03C1 ADD EAX, ECX
73269827 837DEC00 CMP DWORD PTR [EBP-$14], 0
7326982B 763A JBE +$3A ; ($73269867)
7326982D 8B4DEC MOV ECX, [EBP-$14]
73269830 894DE4 MOV [EBP-$1C], ECX
73269833 8B4DF4 MOV ECX, [EBP-$0C]
73269836 0F1006 MOVUPS XMM0, [ESI] ; <-- EXCEPTION
73269839 0F188600030000 PREFETCHNTA BYTE PTR [ESI+$00000300]
73269840 0F105E10 MOVUPS XMM3, [ESI+$10]
73269844 0F105620 MOVUPS XMM2, [ESI+$20]
73269848 0F104E30 MOVUPS XMM1, [ESI+$30]
7326984C 83C640 ADD ESI, $40
7326984F 0F1100 MOVUPS [EAX], XMM0
73269852 0F115810 MOVUPS [EAX+$10], XMM3
73269856 0F115020 MOVUPS [EAX+$20], XMM2
7326985A 0F114830 MOVUPS [EAX+$30], XMM1
7326985E 83C040 ADD EAX, $40
73269861 836DE401 SUB DWORD PTR [EBP-$1C], 1
73269865 75CF JNZ -$31 ; ($73269836)
73269867 85FF TEST EDI, EDI
73269869 7415 JZ +$15 ; ($73269880)
7326986B 897DE4 MOV [EBP-$1C], EDI
7326986E 0F1006 MOVUPS XMM0, [ESI]
Registers:
-----------------------------
EAX: 0C8D0048 EDI: 00000000
EBX: 0B0FFA88 ESI: 0B990000
ECX: 00000000 EBP: 0B0FFA80
EDX: 00000000 ESP: 0B0FFA48
EIP: 73269836 FLG: 00010206
EXP: 73269836 STK: 0B0FFA48
Eric