BugCheck 50, {fffff80003a3207c, 0, fffff88007b5ad83, 2}
Unable to load image \SystemRoot\System32\Drivers\[COLOR=#ff0000][U][B]SRTSPL64.SYS[/B][/U][/COLOR], Win32 error 0n2
*** WARNING: Unable to verify timestamp for SRTSPL64.SYS
*** ERROR: Module load completed but symbols could not be loaded for [COLOR=#ff0000][U][B]SRTSPL64.SYS[/B][/U][/COLOR]
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
[COLOR=#ff0000][U][B]Probably caused by : SRTSPL64.SYS ( SRTSPL64+27d83 )[/B][/U][/COLOR]
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80003a3207c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88007b5ad83, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003510100
fffff80003a3207c
FAULTING_IP:
SRTSPL64+27d83
fffff880`07b5ad83 420fb60c08 movzx ecx,byte ptr [rax+r9]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880033bd480 -- (.trap 0xfffff880033bd480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88007bab390 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88007b5ad83 rsp=fffff880033bd610 rbp=0000000000000001
r8=0000000000000440 r9=ffffff7ffbe86cec r10=fffff80003795028
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
[COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]+0x27d83:
fffff880`07b5ad83 420fb60c08 movzx ecx,byte ptr [rax+r9] ds:6480:fffff800`03a3207c=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003287f50 to fffff800032e11c0
STACK_TEXT:
fffff880`033bd318 fffff800`03287f50 : 00000000`00000050 fffff800`03a3207c 00000000`00000000 fffff880`033bd480 : nt!KeBugCheckEx
fffff880`033bd320 fffff800`032df2ee : 00000000`00000000 fffff800`03a3207c 00000000`00000000 fffff800`03262000 : nt! ?? ::FNODOBFM::`string'+0x43d86
fffff880`033bd480 fffff880`07b5ad83 : fffff800`03262000 00000000`00000001 ffffffff`00000040 fffff800`032dca10 : nt!KiPageFault+0x16e
fffff880`033bd610 fffff800`03262000 : 00000000`00000001 ffffffff`00000040 fffff800`032dca10 00000000`00000440 : [COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]+0x27d83
fffff880`033bd618 00000000`00000001 : ffffffff`00000040 fffff800`032dca10 00000000`00000440 00000000`00000086 : nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`033bd620 ffffffff`00000040 : fffff800`032dca10 00000000`00000440 00000000`00000086 ffffffff`80002100 : 0x1
fffff880`033bd628 fffff800`032dca0f : 00000000`00000440 00000000`00000086 ffffffff`80002100 fffff8a0`03377df0 : 0xffffffff`00000040
fffff880`033bd630 00000000`00000440 : 00000000`00000086 ffffffff`80002100 fffff8a0`03377df0 fffff8a0`03246250 : nt!KiIdleLoop+0x15f
fffff880`033bd638 00000000`00000086 : ffffffff`80002100 fffff8a0`03377df0 fffff8a0`03246250 fffff880`07b5cf49 : 0x440
fffff880`033bd640 ffffffff`80002100 : fffff8a0`03377df0 fffff8a0`03246250 fffff880`07b5cf49 00000000`00000001 : 0x86
fffff880`033bd648 fffff8a0`03377df0 : fffff8a0`03246250 fffff880`07b5cf49 00000000`00000001 00000000`00000001 : 0xffffffff`80002100
fffff880`033bd650 fffff8a0`03246250 : fffff880`07b5cf49 00000000`00000001 00000000`00000001 00000000`00000842 : 0xfffff8a0`03377df0
fffff880`033bd658 fffff880`07b5cf49 : 00000000`00000001 00000000`00000001 00000000`00000842 fffffa80`00000000 : 0xfffff8a0`03246250
fffff880`033bd660 00000000`00000001 : 00000000`00000001 00000000`00000842 fffffa80`00000000 00000006`00000001 : [COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]+0x29f49
fffff880`033bd668 00000000`00000001 : 00000000`00000842 fffffa80`00000000 00000006`00000001 00000000`00000001 : 0x1
fffff880`033bd670 00000000`00000842 : fffffa80`00000000 00000006`00000001 00000000`00000001 fffffa80`000000aa : 0x1
fffff880`033bd678 fffffa80`00000000 : 00000006`00000001 00000000`00000001 fffffa80`000000aa 00000000`00000000 : 0x842
fffff880`033bd680 00000006`00000001 : 00000000`00000001 fffffa80`000000aa 00000000`00000000 00000000`00000000 : 0xfffffa80`00000000
fffff880`033bd688 00000000`00000001 : fffffa80`000000aa 00000000`00000000 00000000`00000000 fffff800`03262000 : 0x6`00000001
fffff880`033bd690 fffffa80`000000aa : 00000000`00000000 00000000`00000000 fffff800`03262000 08004000`005e8000 : 0x1
fffff880`033bd698 00000000`00000000 : 00000000`00000000 fffff800`03262000 08004000`005e8000 00150078`00000000 : 0xfffffa80`000000aa
STACK_COMMAND: kb
FOLLOWUP_IP:
[COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]+27d83
fffff880`07b5ad83 420fb60c08 movzx ecx,byte ptr [rax+r9]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: [COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]+27d83
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: [COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]
IMAGE_NAME: [COLOR=#ff0000][U][B]SRTSPL64.SYS[/B][/U][/COLOR]
DEBUG_FLR_IMAGE_TIMESTAMP: 4a80e58a
FAILURE_BUCKET_ID: X64_0x50_[COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]+27d83
BUCKET_ID: X64_0x50_[COLOR=#ff0000][U][B]SRTSPL64[/B][/U][/COLOR]+27d83