Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc. Show DivPrimary Analysis Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com) Online Crash Dump Analysis Service See http://www.osronline.com for more information Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.22948.amd64fre.win7sp1_ldr.150202-1521 Machine Name: Kernel base = 0xfffff800`03664000 PsLoadedModuleList = 0xfffff800`038a7890 Debug session time: Sat Mar 28 13:05:34.166 2015 (UTC - 4:00) System Uptime: 0 days 21:04:44.524 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a00339102c, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff880046e3be0, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003911100 GetUlongFromAddress: unable to read from fffff800039111c8 fffff8a00339102c Paged pool FAULTING_IP: NNSStrm+36be0 fffff880`046e3be0 488b040a mov rax,qword ptr [rdx+rcx] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: System CURRENT_IRQL: 0 TRAP_FRAME: fffff88002fd26e0 -- (.trap 0xfffff88002fd26e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000007fffff70000 rbx=0000000000000000 rcx=000007fffff70000 rdx=fffff0a00342102c rsi=0000000000000000 rdi=0000000000000000 rip=fffff880046e3be0 rsp=fffff88002fd2878 rbp=fffffa80040f5b94 r8=000000000000006f r9=0000000000000003 r10=fffffa8008ad2450 r11=000007fffff70000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy NNSStrm+0x36be0: fffff880`046e3be0 488b040a mov rax,qword ptr [rdx+rcx] ds:fffff8a0`0339102c=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003755951 to fffff800036d7e80 STACK_TEXT: fffff880`02fd2578 fffff800`03755951 : 00000000`00000050 fffff8a0`0339102c 00000000`00000000 fffff880`02fd26e0 : nt!KeBugCheckEx fffff880`02fd2580 fffff800`036d5fae : 00000000`00000000 fffff8a0`0339102c 00000000`00000000 fffff8a0`0b6608a4 : nt! ?? ::FNODOBFM::`string'+0x4398f fffff880`02fd26e0 fffff880`046e3be0 : fffff880`046cb20d 000007ff`fff70000 fffff8a0`0b6608a4 00600000`00102000 : nt!KiPageFault+0x16e fffff880`02fd2878 fffff880`046cb20d : 000007ff`fff70000 fffff8a0`0b6608a4 00600000`00102000 00000000`00000000 : NNSStrm+0x36be0 fffff880`02fd2880 000007ff`fff70000 : fffff8a0`0b6608a4 00600000`00102000 00000000`00000000 fffff880`046e9148 : NNSStrm+0x1e20d fffff880`02fd2888 fffff8a0`0b6608a4 : 00600000`00102000 00000000`00000000 fffff880`046e9148 fffff880`03168f40 : 0x7ff`fff70000 fffff880`02fd2890 00600000`00102000 : 00000000`00000000 fffff880`046e9148 fffff880`03168f40 fffffa80`049a67b0 : 0xfffff8a0`0b6608a4 fffff880`02fd2898 00000000`00000000 : fffff880`046e9148 fffff880`03168f40 fffffa80`049a67b0 00000000`00000082 : 0x600000`00102000 STACK_COMMAND: kb FOLLOWUP_IP: NNSStrm+36be0 fffff880`046e3be0 488b040a mov rax,qword ptr [rdx+rcx] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: NNSStrm+36be0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NNSStrm IMAGE_NAME: NNSStrm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 538f2f31 FAILURE_BUCKET_ID: X64_0x50_NNSStrm+36be0 BUCKET_ID: X64_0x50_NNSStrm+36be0 Followup: MachineOwner --------- This free analysis is provided by OSR Open Systems Resources, Inc. Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window) Hide DivCrash Code Links View the MSDN page for PAGE_FAULT_IN_NONPAGED_AREA Search Google for PAGE_FAULT_IN_NONPAGED_AREA Bugchecks Explained: PAGE_FAULT_IN_NONPAGED_AREA Show DivInformation About Address 0xfffff8a00339102c Show DivLoaded Module List Show DivRaw Stack Contents Show DivDump Header Information Show DivStrings