*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88002de2fb3, 1, fffff80002ee68e1, 0}
Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k+e4bb5 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88002de2fb3, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ee68e1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310c100
fffff88002de2fb3
FAULTING_IP:
nt!ExEnterPriorityRegionAndAcquireResourceExclusive+11
fffff800`02ee68e1 009353040000 add byte ptr [rbx+453h],dl
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880049a7f30 -- (.trap 0xfffff880049a7f30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880049a8118 rbx=0000000000000000 rcx=fffffa8003e9adb0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ee68e1 rsp=fffff880049a80c0 rbp=0000000000000000
r8=00000000039dcc30 r9=0000000000000001 r10=fffff960001c4b84
r11=000000007efa7000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExEnterPriorityRegionAndAcquireResourceExclusive+0x11:
fffff800`02ee68e1 009353040000 add byte ptr [rbx+453h],dl ds:0001:00000000`00000453=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e88a0c to fffff80002edcd00
STACK_TEXT:
fffff880`049a7dc8 fffff800`02e88a0c : 00000000`00000050 fffff880`02de2fb3 00000000`00000001 fffff880`049a7f30 : nt!KeBugCheckEx
fffff880`049a7dd0 fffff800`02edae2e : 00000000`00000001 fffff880`02de2fb3 00000000`00000000 fffff880`02de2b60 : nt! ?? ::FNODOBFM::`string'+0x4621f
fffff880`049a7f30 fffff800`02ee68e1 : 00000000`039dcc30 00000000`74b12450 00000000`00000000 00000003`000001f0 : nt!KiPageFault+0x16e
fffff880`049a80c0 fffff960`001c4bb5 : 00000000`00000000 00000000`00000001 00000000`039dcc30 00000000`00000000 : nt!ExEnterPriorityRegionAndAcquireResourceExclusive+0x11
fffff880`049a80f0 00000000`00000000 : 00000000`00000001 00000000`039dcc30 00000000`00000000 00000000`00000001 : win32k+0xe4bb5
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k+e4bb5
fffff960`001c4bb5 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32k+e4bb5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x50_win32k+e4bb5
BUCKET_ID: X64_0x50_win32k+e4bb5
Followup: MachineOwner