PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff860c120cb8f0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffff860c120cb8f0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7281
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 63522
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff860c120cb8f0
BUGCHECK_P2: 11
BUGCHECK_P3: ffff860c120cb8f0
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8031bf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031be283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8031be283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff860c120cb8f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SteelSeriesEngine3.exe
TRAP_FRAME: ffff978704e2ffd0 -- (.trap 0xffff978704e2ffd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=7c2b73457d680000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff860c120cb8f0 rsp=ffff978704e30160 rbp=0000000000000001
r8=ffffc604d4e3e6d0 r9=0000000000000002 r10=fffff8031d70b3c0
r11=ffffc604d4e3cc90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ffff860c`120cb8f0 04f1 add al,0F1h
Resetting default scope
STACK_TEXT:
ffff9787`04e2fd28 fffff803`1bc0de82 : 00000000`00000050 ffff860c`120cb8f0 00000000`00000011 ffff9787`04e2ffd0 : nt!KeBugCheckEx
ffff9787`04e2fd30 fffff803`1bacaaff : ffff9787`04e305c0 00000000`00000011 00000000`00000000 ffff860c`120cb8f0 : nt!MiSystemFault+0x198d62
ffff9787`04e2fe30 fffff803`1bbd1b5e : ffffc604`c1ce8170 00000000`00000400 00000000`10000004 ffff9787`04e30060 : nt!MmAccessFault+0x34f
ffff9787`04e2ffd0 ffff860c`120cb8f0 : ffff9787`04e30219 fffff803`1d6e4a8c ffff860c`120cb8f0 00000000`00000000 : nt!KiPageFault+0x35e
ffff9787`04e30160 ffff9787`04e30219 : fffff803`1d6e4a8c ffff860c`120cb8f0 00000000`00000000 00000000`00000000 : 0xffff860c`120cb8f0
ffff9787`04e30168 fffff803`1d6e4a8c : ffff860c`120cb8f0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9787`04e30219
ffff9787`04e30170 fffff803`1d6e2f8c : ffff9787`04e30310 ffff860c`0e780400 ffff9787`04e309f2 fffff803`1d6e6400 : FLTMGR!FltpPerformPreCallbacks+0x2fc
ffff9787`04e30280 fffff803`1d71c981 : 00000000`00000000 ffff9787`04e3062c 00000000`00000000 ffff860c`06639d60 : FLTMGR!FltpPassThroughFastIo+0x8c
ffff9787`04e302e0 fffff803`1c0bb96f : 00000000`6d4e6f49 fffff803`1bd6e06d ffff860c`00000003 00000000`00000000 : FLTMGR!FltpFastIoQueryOpen+0x131
ffff9787`04e30380 fffff803`1c000e95 : 00000000`00000045 00000000`00000045 ffff860c`06821ab0 ffff9787`00000000 : nt!IopQueryInformation+0x8f
ffff9787`04e303e0 fffff803`1bff666f : ffff860c`0661a8f0 ffff860c`0661a845 ffff860c`13d47010 00000000`00000001 : nt!IopParseDevice+0xff5
ffff9787`04e30550 fffff803`1bff4ad1 : ffff860c`13d47000 ffff9787`04e30798 00000000`00000040 ffff860c`018edf00 : nt!ObpLookupObjectName+0x78f
ffff9787`04e30710 fffff803`1c016e04 : 00000000`00000001 000000b0`873ff610 00000000`00000028 000000b0`873ff5e0 : nt!ObOpenObjectByNameEx+0x201
ffff9787`04e30850 fffff803`1bbd5358 : 00000000`9338358a ffff9787`04e30b80 ffff860c`10947080 ffff860c`0f3d0860 : nt!NtQueryFullAttributesFile+0x1b4
ffff9787`04e30b00 00007ff8`63d9eee4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`873ff588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`63d9eee4
SYMBOL_NAME: nt!MiSystemFault+198d62
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1316
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 198d62
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff978e6e0fa504, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8065e611b6c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 71678
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff978e6e0fa504
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8065e611b6c
BUGCHECK_P4: 2
READ_ADDRESS: fffff806535713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff806534283b8: Unable to get Flags value from nt!KdVersionBlock
fffff806534283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff978e6e0fa504
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: fffff68b8fa8b690 -- (.trap 0xfffff68b8fa8b690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffcd82da732080
rdx=ffff978e1301daa8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8065e611b6c rsp=fffff68b8fa8b820 rbp=00000000000a735e
r8=fffff68b8fa8b828 r9=00000000ffffffff r10=fffff8065303e220
r11=ffffd0ff56e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgkrnl!CFlipToken::InFrame+0x48c:
fffff806`5e611b6c 4883c458 add rsp,58h
Resetting default scope
STACK_TEXT:
fffff68b`8fa8b3e8 fffff806`5320de82 : 00000000`00000050 ffff978e`6e0fa504 00000000`00000002 fffff68b`8fa8b690 : nt!KeBugCheckEx
fffff68b`8fa8b3f0 fffff806`530caaff : fffff68b`8fa8b808 00000000`00000002 00000000`00000000 ffff978e`6e0fa504 : nt!MiSystemFault+0x198d62
fffff68b`8fa8b4f0 fffff806`531d1b5e : fffff806`5305a570 ffffcc13`4565bd0a 00000000`009fb8d8 fffff68b`8fa8b710 : nt!MmAccessFault+0x34f
fffff68b`8fa8b690 fffff806`5e611b6c : ffff978e`1301da70 ffff978e`00000000 00000000`00000001 ffff978e`1301da70 : nt!KiPageFault+0x35e
fffff68b`8fa8b820 fffff806`5e60eaa6 : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : dxgkrnl!CFlipToken::InFrame+0x48c
fffff68b`8fa8b8c0 ffffcc13`455ee82d : ffffcd82`d8c1d200 ffffcc33`80607e01 ffff978e`0f1ab920 ffff978e`0ece4c40 : dxgkrnl!CTokenManager::ReleaseToFrame+0x266
fffff68b`8fa8b960 ffffcc13`455ee5e6 : fffff68b`8fa8bb80 fffff68b`8fa8baa8 fffff68b`8fa8ba58 ffff978e`192b80a0 : win32kbase!DirectComposition::CConnection::BeginFrame+0x19d
fffff68b`8fa8ba20 fffff806`531d5358 : 00000000`00000200 ffffcd82`da732080 00000000`000003e8 0000023e`a1229690 : win32kbase!NtDCompositionBeginFrame+0x196
fffff68b`8fa8bb00 00007ffc`30f03404 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000048`e2c1f4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`30f03404
SYMBOL_NAME: dxgkrnl!CFlipToken::InFrame+48c
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.18362.1237
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 48c
FAILURE_BUCKET_ID: AV_INVALID_dxgkrnl!CFlipToken::InFrame
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d32a3d10-6683-49a6-3817-4f3a11d552a8}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the bugcheck.
Arg2: ffffcde702342b68
Arg3: 8a0000016cb39963
Arg4: ffffcde702342b6f
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3889
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18202
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 404
BUGCHECK_P2: ffffcde702342b68
BUGCHECK_P3: 8a0000016cb39963
BUGCHECK_P4: ffffcde702342b6f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffce04`6373f858 fffff807`3a7ee02c : 00000000`0000001a 00000000`00000404 ffffcde7`02342b68 8a000001`6cb39963 : nt!KeBugCheckEx
ffffce04`6373f860 fffff807`3a623f75 : fffff807`3aa66f80 00000000`00000000 ffffcde7`02342b68 00000000`00000000 : nt!MiDeleteValidSystemPage+0x1c9adc
ffffce04`6373f900 fffff807`3a60463a : ffffcde7`02342b60 fffff807`3a605200 fffff807`00000007 8a000001`6cb39963 : nt!MiDeleteKernelStack+0x125
ffffce04`6373f9b0 fffff807`3a604f75 : ffffce04`6373fa08 00000000`00000000 fffff807`3aa669c0 fffff807`3aa66698 : nt!MiDeleteCachedKernelStack+0x4a
ffffce04`6373f9f0 fffff807`3a6f1dae : fffff807`3aa68480 00000000`ffffffff 00000000`00000001 ffffe28d`b6244010 : nt!MiAdjustCachedStacks+0x115
ffffce04`6373fa30 fffff807`3a8c9a16 : 00000000`00000001 00000000`00000002 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xe6
ffffce04`6373faf0 fffff807`3a78d6c5 : 00000000`00000002 00000000`ffffffff fffff807`3aa68480 00000000`0000052e : nt!MmWorkingSetManager+0x12
ffffce04`6373fb20 fffff807`3a733585 : ffffe28d`b6379080 00000000`00000080 fffff807`3a78d570 c93345ff`c9209b0d : nt!KeBalanceSetManager+0x155
ffffce04`6373fc10 fffff807`3a7cb128 : ffff8001`858de180 ffffe28d`b6379080 fffff807`3a733530 8b4cffaf`6b92e8f7 : nt!PspSystemThreadStartup+0x55
ffffce04`6373fc60 00000000`00000000 : ffffce04`63740000 ffffce04`6373a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDeleteValidSystemPage+1c9adc
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1316
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1c9adc
FAILURE_BUCKET_ID: 0x1a_404_nt!MiDeleteValidSystemPage
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {57d19cf7-fb4a-adfd-0709-78f77073d319}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
user space of the system process. Parameter 2 contains the
address of the attempted write.
Arg2: 0000000000040292
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4359
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 39505
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 4477
BUGCHECK_P2: 40292
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa7031546f800 -- (.trap 0xffffa7031546f800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000040292 rbx=0000000000000000 rcx=ffffa7031546fbb0
rdx=0000000000000090 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241247b08 rsp=ffffa7031546f990 rbp=000007f37fc25908
r8=fffff80241247b04 r9=ffffa7031546fba8 r10=fffffffffffd4852
r11=ffffa7031546fba0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
vgk+0x447b08:
fffff802`41247b08 0000 add byte ptr [rax],al ds:00000000`00040292=??
Resetting default scope
STACK_TEXT:
ffffa703`1546f418 fffff802`3344c734 : 00000000`0000001a 00000000`00004477 00000000`00040292 00000000`00000000 : nt!KeBugCheckEx
ffffa703`1546f420 fffff802`3325da22 : 00000000`00000000 00000000`00000002 00000000`00000008 ffffa703`1546f610 : nt!MiCheckFatalAccessViolation+0x12d444
ffffa703`1546f460 fffff802`332cb5cc : ffffa4ff`ffffffff ffffa480`00000000 ffffa480`00000000 ffffa4d2`40000000 : nt!MiInPagePageTable+0x2f2
ffffa703`1546f5b0 fffff802`332ca8fe : 00000000`ffce7562 ffffa703`1546f6e0 ffff9481`00000002 ffffa703`00000001 : nt!MiUserFault+0x7dc
ffffa703`1546f660 fffff802`333d1b5e : 00000000`fff66988 ffffa703`1546f880 00000000`000000ee fffff802`333c5645 : nt!MmAccessFault+0x14e
ffffa703`1546f800 fffff802`41247b08 : fffff802`33200000 00000000`000001f4 ffffa703`1546f9e8 ffff9481`574f2000 : nt!KiPageFault+0x35e
ffffa703`1546f990 fffff802`33200000 : 00000000`000001f4 ffffa703`1546f9e8 ffff9481`574f2000 ffffa807`d3096300 : vgk+0x447b08
ffffa703`1546f998 00000000`000001f4 : ffffa703`1546f9e8 ffff9481`574f2000 ffffa807`d3096300 fffff801`00e00000 : nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)
ffffa703`1546f9a0 ffffa703`1546f9e8 : ffff9481`574f2000 ffffa807`d3096300 fffff801`00e00000 fffff802`40e47500 : 0x1f4
ffffa703`1546f9a8 ffff9481`574f2000 : ffffa807`d3096300 fffff801`00e00000 fffff802`40e47500 fffff802`40e3bbbc : 0xffffa703`1546f9e8
ffffa703`1546f9b0 ffffa807`d3096300 : fffff801`00e00000 fffff802`40e47500 fffff802`40e3bbbc 00000000`000000ee : 0xffff9481`574f2000
ffffa703`1546f9b8 fffff801`00e00000 : fffff802`40e47500 fffff802`40e3bbbc 00000000`000000ee 00000000`00000080 : 0xffffa807`d3096300
ffffa703`1546f9c0 fffff802`40e47500 : fffff802`40e3bbbc 00000000`000000ee 00000000`00000080 00000000`00040286 : 0xfffff801`00e00000
ffffa703`1546f9c8 fffff802`40e3bbbc : 00000000`000000ee 00000000`00000080 00000000`00040286 00000000`00040286 : vgk+0x47500
ffffa703`1546f9d0 00000000`000000ee : 00000000`00000080 00000000`00040286 00000000`00040286 00000000`00040256 : vgk+0x3bbbc
ffffa703`1546f9d8 00000000`00000080 : 00000000`00040286 00000000`00040286 00000000`00040256 00000000`00000000 : 0xee
ffffa703`1546f9e0 00000000`00040286 : 00000000`00040286 00000000`00040256 00000000`00000000 fffff802`40e46070 : 0x80
ffffa703`1546f9e8 00000000`00040286 : 00000000`00040256 00000000`00000000 fffff802`40e46070 00000000`00000001 : 0x40286
ffffa703`1546f9f0 00000000`00040256 : 00000000`00000000 fffff802`40e46070 00000000`00000001 ffffa807`d3096300 : 0x40286
ffffa703`1546f9f8 00000000`00000000 : fffff802`40e46070 00000000`00000001 ffffa807`d3096300 00000000`00040202 : 0x40256
SYMBOL_NAME: vgk+447b08
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 447b08
FAILURE_BUCKET_ID: 0x1a_4477_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfc1f34f-5511-cf01-9893-b1e85d098e7e}
Followup: MachineOwner
---------