*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff961ac59f030, 0, fffff961ac5c40b8, 0}
Could not read faulting driver name
Probably caused by : cdd.dll ( cdd!DrvDeleteDeviceBitmapEx+18 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff961ac59f030, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff961ac5c40b8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff961ac59f030
FAULTING_IP:
cdd!DrvDeleteDeviceBitmapEx+18
fffff961`ac5c40b8 488b4030 mov rax,qword ptr [rax+30h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: archeage.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
TRAP_FRAME: ffffd00024fe1390 -- (.trap 0xffffd00024fe1390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff961ac59f000 rbx=0000000000000000 rcx=fffff9014569ab50
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff961ac5c40b8 rsp=ffffd00024fe1520 rbp=ffffd00024fe1650
r8=0000000000000000 r9=0000000000000000 r10=7ffff90140015fb8
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cdd!DrvDeleteDeviceBitmapEx+0x18:
fffff961`ac5c40b8 488b4030 mov rax,qword ptr [rax+30h] ds:fffff961`ac59f030=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80229fbb04a to fffff80229f6ad00
STACK_TEXT:
ffffd000`24fe1148 fffff802`29fbb04a : 00000000`00000050 fffff961`ac59f030 00000000`00000000 ffffd000`24fe1390 : nt!KeBugCheckEx
ffffd000`24fe1150 fffff802`29e3c536 : 00000000`00000000 00000000`00000000 ffffd000`24fe1390 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4174a
ffffd000`24fe1240 fffff802`29f73dbd : 00000000`000000ff 00000000`00000000 409de5dc`00000005 34ef781c`00000005 : nt!MmAccessFault+0x696
ffffd000`24fe1390 fffff961`ac5c40b8 : 00000000`000023a8 00000000`000029f7 fffff901`4024ef28 fffff901`4560d870 : nt!KiPageFault+0x13d
ffffd000`24fe1520 fffff961`ac3c376a : fffff901`400cd010 ffffd000`24fe1650 fffff901`4560d870 00000000`00000001 : cdd!DrvDeleteDeviceBitmapEx+0x18
ffffd000`24fe1550 fffff961`ac3e4e28 : ffffe001`00000000 00000000`00000001 ffffd000`24fe1810 00000000`00000000 : win32kbase!SURFACE::bDeleteSurface+0x7da
ffffd000`24fe17a0 fffff961`ac42d444 : 00000000`000023a8 00000000`700529f7 00000000`00000001 00000000`00000000 : win32kbase!SURFREF::bDeleteSurface+0x14
ffffd000`24fe17d0 fffff961`ac3e3105 : 00000000`00000001 00000000`000023a8 fffff901`4560d870 00000000`00000000 : win32kbase!vCleanupSurfaces+0x49f64
ffffd000`24fe1800 fffff961`ac3e2d70 : 00000000`000023a8 ffffe001`3ba49080 fffff901`465d8380 fffff961`ac3eb5d4 : win32kbase!NtGdiCloseProcess+0xe5
ffffd000`24fe1840 fffff961`ac0d337f : fffff901`457dbc10 fffff901`457dbc10 00000000`00000000 ffffe001`3ecdced0 : win32kbase!GdiProcessCallout+0x40
ffffd000`24fe18c0 fffff802`2a2d6f72 : ffffd000`24fe19d8 ffffd000`24fe1a99 ffffe001`3ecdced0 00000000`00000000 : win32kfull!W32pProcessCallout+0xbf
ffffd000`24fe18f0 fffff802`2a2d768f : 00000000`00000000 ffffe001`418e0c90 ffffd000`24fe1a99 00000000`00000001 : nt!PsInvokeWin32Callout+0x42
ffffd000`24fe1930 fffff802`2a2be32a : 00000000`c0000005 ffffd000`24fe1a01 00000000`00000000 ffffe001`3ba49080 : nt!PspExitThread+0x66f
ffffd000`24fe1a30 fffff802`29f75363 : ffffe001`4858b080 00000000`00000000 ffffe001`4858b080 ffffe001`4b947930 : nt!NtTerminateProcess+0x11a
ffffd000`24fe1b00 00000000`57a21e52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0009efd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x57a21e52
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!DrvDeleteDeviceBitmapEx+18
fffff961`ac5c40b8 488b4030 mov rax,qword ptr [rax+30h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: cdd!DrvDeleteDeviceBitmapEx+18
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 559f38ff
IMAGE_VERSION: 10.0.10240.16384
BUCKET_ID_FUNC_OFFSET: 18
FAILURE_BUCKET_ID: AV_cdd!DrvDeleteDeviceBitmapEx
BUCKET_ID: AV_cdd!DrvDeleteDeviceBitmapEx
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_cdd!drvdeletedevicebitmapex
FAILURE_ID_HASH: {75a826ac-81ab-7822-6d60-6a74de0736c9}
Followup: MachineOwner
---------