PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80472adba06, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9606
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffffd0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80472adba06
BUGCHECK_P4: 2
READ_ADDRESS: fffff804734fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047340f340: Unable to get Flags value from nt!KdVersionBlock
fffff8047340f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffd0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffffe3827f180140 -- (.trap 0xffffe3827f180140)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80472adba06 rsp=ffffe3827f1802d0 rbp=ffffe3827f180350
r8=ffffbd89ac47b114 r9=000000000000004c r10=00000000ffffffff
r11=0000000000000159 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff804`72adba06 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope
STACK_TEXT:
ffffe382`7f17fe98 fffff804`72c79b57 : 00000000`00000050 ffffffff`ffffffd0 00000000`00000002 ffffe382`7f180140 : nt!KeBugCheckEx
ffffe382`7f17fea0 fffff804`72aea5e0 : 8d010000`00008730 00000000`00000002 ffffe382`7f1801c0 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffe382`7f17ffa0 fffff804`72c0275e : 00000000`00000002 ffff9c01`d9b8d180 ffffbd89`ad7c4080 fffff804`72adf4cf : nt!MmAccessFault+0x400
ffffe382`7f180140 fffff804`72adba06 : ffffe382`7f1805c0 fffff804`731b1019 00000000`00000000 ffffbd89`ad7c4080 : nt!KiPageFault+0x35e
ffffe382`7f1802d0 fffff804`72ebc796 : ffffe382`7f1805b8 00000000`ffffffff ffffbd89`ae5198b0 ffffbd89`00000000 : nt!ObfDereferenceObjectWithTag+0x26
ffffe382`7f180310 fffff804`72e6cdab : ffffbd89`a5054000 fffff804`7e8dd778 00000000`00000009 fffffff6`0000000d : nt!ObWaitForMultipleObjects+0x336
ffffe382`7f180810 fffff804`72c05fb8 : 00000000`00000000 ffffbd89`ad7c4080 00000000`047df278 ffffe382`7f180aa8 : nt!NtWaitForMultipleObjects32+0x11b
ffffe382`7f180a90 00000000`77bf1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`047df258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf1cfc
SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+26
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 26
FAILURE_BUCKET_ID: AV_INVALID_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bf6808a0-c526-a191-e599-784e02b18e9e}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000001000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80344857486, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7614
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 1000000
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80344857486
READ_ADDRESS: fffff803452fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034520f340: Unable to get Flags value from nt!KdVersionBlock
fffff8034520f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000001000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
TRAP_FRAME: ffff828d6d1f7810 -- (.trap 0xffff828d6d1f7810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000a5c5092a957 rbx=0000000000000000 rcx=0000000000000fc0
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80344857486 rsp=ffff828d6d1f79a0 rbp=ffff828d6d1f7a69
r8=00000000000136f0 r9=0000000000000008 r10=ffffa40d42ccb918
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!KiEndThreadCycleAccumulation+0x86:
fffff803`44857486 488937 mov qword ptr [rdi],rsi ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff828d`6d1f76c8 fffff803`44a06569 : 00000000`0000000a 00000000`01000000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff828d`6d1f76d0 fffff803`44a02869 : bc9c3db7`bdb989f0 3db8eeee`c5032706 bc81ad6b`3f7eec03 3ca75489`4534c534 : nt!KiBugCheckDispatch+0x69
ffff828d`6d1f7810 fffff803`44857486 : 0000df94`f91c4969 ffffa40d`42ccb080 00000a5c`5092a957 ffff828d`6d1f7a69 : nt!KiPageFault+0x469
ffff828d`6d1f79a0 fffff803`44858376 : ffffb681`df540180 ffffb681`df54b340 00000a5c`50917200 ffff828d`6d1f79f0 : nt!KiEndThreadCycleAccumulation+0x86
ffff828d`6d1f79d0 fffff803`449fb3e6 : ffffa40d`42ccb000 ffff828d`6d1f7b80 00000000`26ddf944 00000000`00000000 : nt!KiQuantumEnd+0x2f6
ffff828d`6d1f7ad0 fffff803`449faa9e : ffffa40d`42ccb080 00000000`00000000 00000000`00000000 ffff828d`6d1f7b80 : nt!KiDispatchInterruptContinue+0x16
ffff828d`6d1f7b00 00000000`578e51ed : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee
00000000`26ddf738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x578e51ed
SYMBOL_NAME: nt!KiEndThreadCycleAccumulation+86
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 86
FAILURE_BUCKET_ID: AV_nt!KiEndThreadCycleAccumulation
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {de21fa6f-a424-647d-9da8-7d0af879e75a}
Followup: MachineOwner
---------