PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80041e17a79, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80001cf0faa, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Page dd6b8 not present in the dump file. Type ".hh dbgerr004" for details
Page dd6b8 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 7601.18741.amd64fre.win7sp1_gdr.150202-1526
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P1.30
BIOS_DATE: 06/22/2010
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: N68C-S
BASEBOARD_VERSION:
DUMP_TYPE: 1
BUGCHECK_P1: fffff80041e17a79
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80001cf0faa
BUGCHECK_P4: 5
READ_ADDRESS: fffff80041e17a79
FAULTING_IP:
nt!RtlUnwindEx+284
fffff800`01cf0faa 0fb64201 movzx eax,byte ptr [rdx+1]
MM_INTERNAL_CODE: 5
CPU_COUNT: 2
CPU_MHZ: bbb
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: f
CPU_MODEL: 6b
CPU_STEPPING: 2
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 05-01-2019 17:26:21.0408
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: fffff8800880d920 -- (.trap 0xfffff8800880d920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000bc017038 rbx=0000000000000000 rcx=00000000000000bc
rdx=fffff900c1fe6e38 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000099824 rsp=fffff8800880dab8 rbp=fffff8800880dcbc
r8=000000000000003c r9=0000000001ff0000 r10=00000000032afb4c
r11=0000000000000034 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32k!vAlphaPerPixelOnly+0x34:
fffff960`00099824 418b3a mov edi,dword ptr [r10] ds:00000000`032afb4c=????????
Resetting default scope
EXCEPTION_RECORD: fffff8800880d878 -- (.exr 0xfffff8800880d878)
ExceptionAddress: fffff96000099824 (win32k!vAlphaPerPixelOnly+0x0000000000000034)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000002
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000032afb4c
Attempt to read from address 00000000032afb4c
LAST_CONTROL_TRANSFER: from fffff80001d43873 to fffff80001cc5ec0
STACK_TEXT:
fffff880`0880bf88 fffff800`01d43873 : 00000000`00000050 fffff800`41e17a79 00000000`00000000 fffff880`0880c0f0 : nt!KeBugCheckEx
fffff880`0880bf90 fffff800`01cc3fee : 00000000`00000000 fffff800`41e17a79 00000000`00000000 00000000`00000024 : nt! ?? ::FNODOBFM::`string'+0x43801
fffff880`0880c0f0 fffff800`01cf0faa : fffff880`0880d5a0 fffff880`0880c2d0 00000000`00000000 fffff800`01c51000 : nt!KiPageFault+0x16e
fffff880`0880c280 fffff800`01cf1c8c : fffff880`0880dac0 fffff960`000a62b5 fffff880`0880d878 ffffffff`c0000005 : nt!RtlUnwindEx+0x284
fffff880`0880c920 fffff800`01cf16cd : fffff960`0035a830 fffff880`0880dac0 00000000`00000000 fffff960`00090000 : nt!_C_specific_handler+0xcc
fffff880`0880c990 fffff800`01cf04a5 : fffff960`0035a830 fffff880`0880ca08 fffff880`0880d878 fffff960`00090000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0880c9c0 fffff800`01d01431 : fffff880`0880d878 fffff880`0880d0d0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x415
fffff880`0880d0a0 fffff800`01cc5542 : fffff880`0880d878 fffff900`c1fe6e54 fffff880`0880d920 00000000`00ff00ff : nt!KiDispatchException+0x135
fffff880`0880d740 fffff800`01cc40ba : 00000000`00000000 00000000`032afb4c fffff880`0880de00 fffff900`c1fe6e54 : nt!KiExceptionDispatch+0xc2
fffff880`0880d920 fffff960`00099824 : fffff960`000a62ab 00000000`00000000 00000000`032afb30 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`0880dab8 fffff960`000a62ab : 00000000`00000000 00000000`032afb30 00000000`00000000 fffff880`036b5c38 : win32k!vAlphaPerPixelOnly+0x34
fffff880`0880dac0 fffff960`000a5e98 : fffff900`c1cf1ae0 00000000`0000003c 00000000`0000035c 00000000`00000000 : win32k!AlphaScanLineBlend+0x303
fffff880`0880db80 fffff960`002748bd : 00000000`00000000 fffff900`00000000 fffff900`00000000 00000000`00000000 : win32k!EngAlphaBlend+0x4dc
fffff880`0880de40 fffff960`00274e96 : fffff900`c1f97cd8 00000000`00000000 fffff900`c205c018 00000000`00000000 : win32k!NtGdiUpdateTransform+0x1365
fffff880`0880df00 fffff960`00275105 : fffff900`c1f97cd8 fffff900`c1dd8018 00000000`00000000 fffff900`c2080cd0 : win32k!NtGdiUpdateTransform+0x193e
fffff880`0880e020 fffff960`002752c4 : fffff900`c00c0010 00000000`0000003c fffff880`0880e470 fffff900`c1f97cc0 : win32k!EngNineGrid+0xb1
fffff880`0880e0c0 fffff960`00275781 : 00000000`00000000 fffff900`c1dd8018 00000000`00000000 fffff900`c1f97cc0 : win32k!EngDrawStream+0x1a0
fffff880`0880e170 fffff960`002760d3 : fffff880`0880e288 fffff900`c2135560 fffff900`c1dd8000 fffff900`c2080cd0 : win32k!NtGdiDrawStreamInternal+0x47d
fffff880`0880e220 fffff960`002918f0 : 00000000`07010d6b 00000000`00000000 fffff880`0880e440 fffff960`00000000 : win32k!GreDrawStream+0x917
fffff880`0880e410 fffff800`01cc5153 : fffffa80`05bd2060 00000000`0363e838 00000000`39040778 00000000`0216d6f0 : win32k!NtGdiDrawStream+0x9c
fffff880`0880e570 000007fe`fe9731ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0363e678 fffff800`01cbd510 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`fe9731ba
fffff880`0880e750 00000000`00000000 : fffff960`001664db 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiCallUserMode
THREAD_SHA1_HASH_MOD_FUNC: dd9943a79eefc3d20c748399032f9fb44b175b0b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5662efa39d4c148d848e885282c1547d5e126b84
THREAD_SHA1_HASH_MOD: 81bef1b93d227eaeced0aac2b9c6e0f241787956
FOLLOWUP_IP:
win32k!vAlphaPerPixelOnly+34
fffff960`00099824 418b3a mov edi,dword ptr [r10]
FAULT_INSTR_CODE: 803a8b41
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: win32k!vAlphaPerPixelOnly+34
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53f7e73f
IMAGE_VERSION: 6.1.7601.18577
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x50_win32k!vAlphaPerPixelOnly+34
BUCKET_ID: X64_0x50_win32k!vAlphaPerPixelOnly+34
PRIMARY_PROBLEM_CLASS: X64_0x50_win32k!vAlphaPerPixelOnly+34
TARGET_TIME: 2019-05-01T00:04:14.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-02-03 05:25:01
BUILDDATESTAMP_STR: 150202-1526
BUILDLAB_STR: win7sp1_gdr
BUILDOSVER_STR: 6.1.7601.18741.amd64fre.win7sp1_gdr.150202-1526
ANALYSIS_SESSION_ELAPSED_TIME: 3753
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_win32k!valphaperpixelonly+34
FAILURE_ID_HASH: {de6012b7-ad9e-7c9f-b2f3-607e76b94015}
Followup: MachineOwner
---------