PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd4c99e8cb9c0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8031f0f2793, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5139
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12726
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd4c99e8cb9c0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8031f0f2793
BUGCHECK_P4: 2
READ_ADDRESS: fffff803047713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff803046283b8: Unable to get Flags value from nt!KdVersionBlock
fffff803046283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd4c99e8cb9c0
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff90f0ae07660 -- (.trap 0xfffff90f0ae07660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000f02 rbx=0000000000000000 rcx=00000008fffffff7
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031f0f2793 rsp=fffff90f0ae077f0 rbp=0000000000000000
r8=ffffd481946f4e40 r9=0000000000000002 r10=ffffd48194483a20
r11=fffff90f0ae077d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323:
fffff803`1f0f2793 8984cea8000000 mov dword ptr [rsi+rcx*8+0A8h],eax ds:00000048`00000060=????????
Resetting default scope
STACK_TEXT:
fffff90f`0ae073b8 fffff803`043ed75a : 00000000`00000050 ffffd4c9`9e8cb9c0 00000000`00000002 fffff90f`0ae07660 : nt!KeBugCheckEx
fffff90f`0ae073c0 fffff803`0425889f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffd4c9`9e8cb9c0 : nt!MiSystemFault+0x1c62fa
fffff90f`0ae074c0 fffff803`043d0c5e : fffff90f`0ae077c8 00000000`00000000 ffffd481`99196190 00000006`6c3178d6 : nt!MmAccessFault+0x34f
fffff90f`0ae07660 fffff803`1f0f2793 : ffffd481`a1b1f2c0 ffffd481`a1c8f3d0 ffffd481`9e8cb960 fffff803`1eec2eda : nt!KiPageFault+0x35e
fffff90f`0ae077f0 fffff803`1ef91819 : ffffd481`991c29b0 00000000`00000000 fffff803`1f323000 ffffd481`96934301 : Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323
fffff90f`0ae07860 fffff803`1ef24b0f : fffff803`1ef91790 fffff90f`0ae07990 ffffd481`96934300 00000000`00000000 : Netwtw06!mmacAlDispatchCmdRespCbJob+0x89
fffff90f`0ae07890 fffff803`08de0722 : ffffd481`9dcab040 ffffd481`9aa68420 00000000`00000000 fffff803`08de0710 : Netwtw06!prvJobScheduler_jobExecuter+0x45f
fffff90f`0ae079d0 fffff803`04291fef : 00000000`00000000 ffffd481`9acc8500 ffffd481`00000000 fffff803`1bb35050 : ndis!ndisDispatchIoWorkItem+0x12
fffff90f`0ae07a00 fffff803`04283aa5 : ffffd481`944cfa60 ffffd481`9dcab040 fffff803`04291ef0 00000000`0000000d : nt!IopProcessWorkItem+0xff
fffff90f`0ae07a70 fffff803`0431e235 : ffffd481`9dcab040 00000000`00000080 ffffd481`94480300 00000000`00000080 : nt!ExpWorkerThread+0x105
fffff90f`0ae07b10 fffff803`043ca1d8 : ffff9201`5cba1180 ffffd481`9dcab040 fffff803`0431e1e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff90f`0ae07b60 00000000`00000000 : fffff90f`0ae08000 fffff90f`0ae01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Netwtw06!prvMvmManagerTimeEventResponseHandler+323
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
IMAGE_VERSION: 20.50.0.5
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 323
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!prvMvmManagerTimeEventResponseHandler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d71428cf-496d-5e77-45fa-f3ffc163411a}
Followup: MachineOwner
---------
2: kd> lmvm Netwtw06
Browse full module list
start end module name
fffff803`1ee00000 fffff803`1f69b000 Netwtw06 (pdb symbols) C:\ProgramData\Dbg\sym\Netwtw06.pdb\89DA3DCFF2B2441B874E70ADB862BDDE1\Netwtw06.pdb
Loaded symbol image file: Netwtw06.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\Netwtw06.sys\5B1952F789b000\Netwtw06.sys
Image path: \SystemRoot\System32\drivers\Netwtw06.sys
Image name: Netwtw06.sys
Browse all global symbols functions data
Timestamp: Thu Jun 7 18:44:55 2018 (5B1952F7)
CheckSum: 00855347
ImageSize: 0089B000
File version: 20.50.0.5
Product version: 1.0.1.0
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Intel Corporation
ProductName: Intel® Wireless WiFi Link Adapter
InternalName: .sys
OriginalFilename: .sys
FileVersion: 20.50.0.5
FileDescription: Intel® Wireless WiFi Link Driver
LegalCopyright: Copyright © Intel Corporation 2011
Comments: NDIS650_MINIPORT
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff804f5a763530, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8024abd2793, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14084
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff804f5a763530
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8024abd2793
BUGCHECK_P4: 2
READ_ADDRESS: fffff8022cf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8022ce283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8022ce283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff804f5a763530
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffcc88abd17660 -- (.trap 0xffffcc88abd17660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000603 rbx=0000000000000000 rcx=00000008fffffff7
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8024abd2793 rsp=ffffcc88abd177f0 rbp=0000000000000000
r8=ffff80074fa3f880 r9=0000000000000002 r10=ffff80074f683720
r11=ffffcc88abd177d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323:
fffff802`4abd2793 8984cea8000000 mov dword ptr [rsi+rcx*8+0A8h],eax ds:00000048`00000060=????????
Resetting default scope
STACK_TEXT:
ffffcc88`abd173b8 fffff802`2cbed75a : 00000000`00000050 ffff804f`5a763530 00000000`00000002 ffffcc88`abd17660 : nt!KeBugCheckEx
ffffcc88`abd173c0 fffff802`2ca5889f : 00000000`00000040 00000000`00000002 00000000`00000000 ffff804f`5a763530 : nt!MiSystemFault+0x1c62fa
ffffcc88`abd174c0 fffff802`2cbd0c5e : ffffcc88`abd177c8 00000000`00000000 ffff8007`54594cf0 00000002`4828fb29 : nt!MmAccessFault+0x34f
ffffcc88`abd17660 fffff802`4abd2793 : ffff8007`5cab3b00 ffff8007`4fbaf4f0 ffff8007`5a7634d0 fffff802`4a9a2eda : nt!KiPageFault+0x35e
ffffcc88`abd177f0 fffff802`4aa71819 : ffff8007`545d29b0 00000000`00000000 fffff802`4ae03000 ffff8007`51f15201 : Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323
ffffcc88`abd17860 fffff802`4aa04b0f : fffff802`4aa71790 ffffcc88`abd17990 ffff8007`51f15200 00000000`00000000 : Netwtw06!mmacAlDispatchCmdRespCbJob+0x89
ffffcc88`abd17890 fffff802`321e0722 : ffff8007`590a2040 ffff8007`54061960 00000000`00000000 fffff802`321e0710 : Netwtw06!prvJobScheduler_jobExecuter+0x45f
ffffcc88`abd179d0 fffff802`2ca91fef : 00000000`00000000 ffff8007`590a1040 ffff8007`00000000 fffff802`45005050 : ndis!ndisDispatchIoWorkItem+0x12
ffffcc88`abd17a00 fffff802`2ca83aa5 : ffff8007`4f67e5f0 ffff8007`590a2040 fffff802`2ca91ef0 00000000`0000000c : nt!IopProcessWorkItem+0xff
ffffcc88`abd17a70 fffff802`2cb1e235 : ffff8007`590a2040 00000000`00000080 ffff8007`4f67f040 fffff802`2cbcb6a0 : nt!ExpWorkerThread+0x105
ffffcc88`abd17b10 fffff802`2cbca1d8 : ffffab00`862de180 ffff8007`590a2040 fffff802`2cb1e1e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffcc88`abd17b60 00000000`00000000 : ffffcc88`abd18000 ffffcc88`abd11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Netwtw06!prvMvmManagerTimeEventResponseHandler+323
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
IMAGE_VERSION: 20.50.0.5
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 323
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!prvMvmManagerTimeEventResponseHandler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d71428cf-496d-5e77-45fa-f3ffc163411a}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb452768c0a00, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80174cf2793, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5780
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17053
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb452768c0a00
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80174cf2793
BUGCHECK_P4: 2
READ_ADDRESS: fffff8015ab713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015aa283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8015aa283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb452768c0a00
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe909a36b0660 -- (.trap 0xffffe909a36b0660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000003e01 rbx=0000000000000000 rcx=00000008fffffff7
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80174cf2793 rsp=ffffe909a36b07f0 rbp=0000000000000000
r8=ffffb40a6ca3f940 r9=0000000000000006 r10=ffffb40a6c683840
r11=ffffe909a36b07d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323:
fffff801`74cf2793 8984cea8000000 mov dword ptr [rsi+rcx*8+0A8h],eax ds:00000048`00000060=????????
Resetting default scope
STACK_TEXT:
ffffe909`a36b03b8 fffff801`5a7ed75a : 00000000`00000050 ffffb452`768c0a00 00000000`00000002 ffffe909`a36b0660 : nt!KeBugCheckEx
ffffe909`a36b03c0 fffff801`5a65889f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffb452`768c0a00 : nt!MiSystemFault+0x1c62fa
ffffe909`a36b04c0 fffff801`5a7d0c5e : ffffe909`a36b07c8 00000000`00000000 ffffb40a`6e67aaa0 00000001`06f39541 : nt!MmAccessFault+0x34f
ffffe909`a36b0660 fffff801`74cf2793 : ffffb40a`782409c0 ffffb40a`76ecaee0 ffffb40a`768c09a0 fffff801`74ac2eda : nt!KiPageFault+0x35e
ffffe909`a36b07f0 fffff801`74b91819 : ffffb40a`72c459b0 00000000`00000000 fffff801`74f23000 00000000`00000001 : Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323
ffffe909`a36b0860 fffff801`74b24b0f : fffff801`74b91790 ffffe909`a36b0990 ffffb40a`6ef73a70 00000000`00000000 : Netwtw06!mmacAlDispatchCmdRespCbJob+0x89
ffffe909`a36b0890 fffff801`5cdd0722 : ffffb40a`6e729580 ffffb40a`72c5e140 00000000`00000000 fffff801`5cdd0710 : Netwtw06!prvJobScheduler_jobExecuter+0x45f
ffffe909`a36b09d0 fffff801`5a691fef : 00000000`00000000 ffffb40a`751f5080 ffffb40a`00000000 fffff801`6f8f5050 : ndis!ndisDispatchIoWorkItem+0x12
ffffe909`a36b0a00 fffff801`5a683aa5 : ffffb40a`6c6e0a20 ffffb40a`6e729580 fffff801`5a691ef0 ffffd900`0000000f : nt!IopProcessWorkItem+0xff
ffffe909`a36b0a70 fffff801`5a71e235 : ffffb40a`6e729580 00000000`00000080 ffffb40a`6c6cf080 000024ef`bd9bbfff : nt!ExpWorkerThread+0x105
ffffe909`a36b0b10 fffff801`5a7ca1d8 : ffffd900`dd379180 ffffb40a`6e729580 fffff801`5a71e1e0 00000050`0000001c : nt!PspSystemThreadStartup+0x55
ffffe909`a36b0b60 00000000`00000000 : ffffe909`a36b1000 ffffe909`a36aa000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Netwtw06!prvMvmManagerTimeEventResponseHandler+323
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
IMAGE_VERSION: 20.50.0.5
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 323
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!prvMvmManagerTimeEventResponseHandler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d71428cf-496d-5e77-45fa-f3ffc163411a}
Followup: MachineOwner
---------