Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD launching TERA MMO, error 0x00000050

30 May 2014   #1
Dataspell

Windows 7 home premium 64 bit
 
 
BSOD launching TERA MMO, error 0x00000050

Ive already run check disck and two different memtests for four passes and got no errors on either, I blue screen every time I try to launch TERA. I also posted about this on the forums there and someone mentioned that TERA has a memory leak and that will sometimes cause it to use a lot of memory. I have a few different crash logs:


Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Bruce\Documents\crash\052914-87329-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`0480d000 PsLoadedModuleList = 0xfffff800`04a51670
Debug session time: Thu May 29 01:29:00.309 2014 (UTC - 4:00)
System Uptime: 0 days 1:34:52.166
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff880afc88cd0, 1, fffffa80095df2e6, 5}


Could not read faulting driver name
Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff880afc88cd0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffffa80095df2e6, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abb100
GetUlongFromAddress: unable to read from fffff80004abb1c0
 fffff880afc88cd0 Nonpaged pool

FAULTING_IP: 
+ab3783872089359
fffffa80`095df2e6 f3aa            rep stos byte ptr [rdi]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  CTAELicensing.

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre

TRAP_FRAME:  fffff8800c942380 -- (.trap 0xfffff8800c942380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000057371200
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa80095df2e6 rsp=fffff8800c942518 rbp=fffffa8006ed04e0
 r8=0000000057371200  r9=0000000000000001 r10=fffff88006ff9cd0
r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffffa80`095df2e6 f3aa            rep stos byte ptr [rdi]
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80004832f0f to fffff8000488c1c0

STACK_TEXT:  
fffff880`0c942518 fffffa80`095df7e4 : 00000000`00000022 fffffa80`06ed0380 fffffa80`00000001 fffffa80`06ed04e0 : 0xfffffa80`095df2e6
fffff880`0c942520 00000000`00000022 : fffffa80`06ed0380 fffffa80`00000001 fffffa80`06ed04e0 fffffa80`00000001 : 0xfffffa80`095df7e4
fffff880`0c942528 fffffa80`06ed0380 : fffffa80`00000001 fffffa80`06ed04e0 fffffa80`00000001 fffffa80`00000000 : 0x22
fffff880`0c942530 fffffa80`00000001 : fffffa80`06ed04e0 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`06ed0380
fffff880`0c942538 fffffa80`06ed04e0 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001
fffff880`0c942540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`06ed04e0 : 0xfffffa80`06ed04e0
fffff880`0c942548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`06ed04e0 fffffa80`06ed0380 : 0xfffffa80`00000001
fffff880`0c942550 00000000`00000200 : 00000000`00000200 fffffa80`06ed04e0 fffffa80`06ed0380 fffffa80`06ed0380 : 0xfffffa80`00000000
fffff880`0c942558 00000000`00000200 : fffffa80`06ed04e0 fffffa80`06ed0380 fffffa80`06ed0380 fffff880`0100b7a7 : 0x200
fffff880`0c942560 fffffa80`06ed04e0 : fffffa80`06ed0380 fffffa80`06ed0380 fffff880`0100b7a7 fffffa80`06ed0380 : 0x200
fffff880`0c942568 fffffa80`06ed0380 : fffffa80`06ed0380 fffff880`0100b7a7 fffffa80`06ed0380 fffffa80`06ed0380 : 0xfffffa80`06ed04e0
fffff880`0c942570 fffffa80`06ed0380 : fffff880`0100b7a7 fffffa80`06ed0380 fffffa80`06ed0380 fffffa80`07598550 : 0xfffffa80`06ed0380
fffff880`0c942578 fffff880`0100b7a7 : fffffa80`06ed0380 fffffa80`06ed0380 fffffa80`07598550 fffff8a0`1d675298 : 0xfffffa80`06ed0380
fffff880`0c942580 fffff880`01013789 : fffff880`01031b50 fffff880`0c942738 00000000`00000200 fffffa80`06ed04e0 : ACPI!ACPIDispatchForwardIrp+0x37
fffff880`0c9425b0 fffff880`0100ba3f : fffff880`01031b50 fffffa80`074bda90 fffffa80`06ed0380 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75
fffff880`0c9425e0 fffff880`00dcb445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b
fffff880`0c942660 fffff880`00dcb975 : fffffa80`078bd010 fffffa80`07598550 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355
fffff880`0c942700 fffff880`012340af : fffffa80`111d9c10 fffffa80`111d9c10 fffffa80`111d9e00 fffffa80`11aba320 : CLASSPNP!ClassReadWrite+0xd5
fffff880`0c942750 fffff800`04af31b0 : fffffa80`111d9e48 fffffa80`06e04c40 fffffa80`11670f20 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f
fffff880`0c942780 fffff800`04af2e4d : 00000000`00000000 fffff880`0c942860 fffffa80`111d9c10 fffff800`04881ddd : nt!RawReadWriteDeviceControl+0xa8
fffff880`0c9427c0 fffff880`00f4cbcf : fffffa80`111d9e48 fffffa80`11485690 00000000`00000000 fffffa80`111d9c10 : nt!RawDispatch+0x7d
fffff880`0c942820 fffff880`00f4b6df : fffffa80`09430bd0 00000000`00000001 fffffa80`09430b00 fffffa80`111d9c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0c9428b0 fffff800`04b8feab : 00000000`00000000 fffffa80`11670f20 00000000`00000001 fffffa80`111d9c10 : fltmgr!FltpDispatch+0xcf
fffff880`0c942910 fffff800`04b71753 : fffffa80`11670f20 fffffa80`111d9c01 fffffa80`11670f20 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb
fffff880`0c942980 fffff800`0488b453 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`0c942a70 00000000`750a2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0049f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750a2e09


STACK_COMMAND:  .trap 0xfffff8800c942380 ; kb

FOLLOWUP_IP: 
partmgr!PmGlobalDispatch+9f
fffff880`012340af 8bf0            mov     esi,eax

SYMBOL_STACK_INDEX:  12

SYMBOL_NAME:  partmgr!PmGlobalDispatch+9f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4f641bc1

IMAGE_VERSION:  6.1.7601.17796

FAILURE_BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f

BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x50_partmgr!pmglobaldispatch+9f

FAILURE_ID_HASH:  {52e5f7db-32c8-b25d-7537-9fbcea4fd678}

Followup: MachineOwner
---------
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Bruce\Documents\crash\052914-65333-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`04812000 PsLoadedModuleList = 0xfffff800`04a556d0
Debug session time: Thu May 29 23:09:14.905 2014 (UTC - 4:00)
System Uptime: 0 days 0:11:30.873
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff880b36ba520, 1, fffffa8007a632e6, 5}


Could not read faulting driver name
Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff880b36ba520, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffffa8007a632e6, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
Nnn
Debugging Details:
------------------


Could not read faulting driver name

OVERLAPPED_MODULE: Address regions for 'lltdio' and 'RtsUVStor.sy' overlap

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abf100
GetUlongFromAddress: unable to read from fffff80004abf1c0
 fffff880b36ba520 Nonpaged pool

FAULTING_IP: 
+7b371f073829359
fffffa80`07a632e6 f3aa            rep stos byte ptr [rdi]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  CTAELicensing.

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre

TRAP_FRAME:  fffff8800a944380 -- (.trap 0xfffff8800a944380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000057373a00
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa8007a632e6 rsp=fffff8800a944518 rbp=fffffa801048c170
 r8=0000000057373a00  r9=0000000000000001 r10=fffff8800aa2dd20
r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffffa80`07a632e6 f3aa            rep stos byte ptr [rdi]
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800049045b3 to fffff80004887bc0

STACK_TEXT:  
fffff880`0a944518 fffffa80`07a637e4 : 00000000`00000022 fffffa80`1048c010 fffffa80`00000001 fffffa80`1048c170 : 0xfffffa80`07a632e6
fffff880`0a944520 00000000`00000022 : fffffa80`1048c010 fffffa80`00000001 fffffa80`1048c170 fffffa80`00000001 : 0xfffffa80`07a637e4
fffff880`0a944528 fffffa80`1048c010 : fffffa80`00000001 fffffa80`1048c170 fffffa80`00000001 fffffa80`00000000 : 0x22
fffff880`0a944530 fffffa80`00000001 : fffffa80`1048c170 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`1048c010
fffff880`0a944538 fffffa80`1048c170 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001
fffff880`0a944540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`1048c170 : 0xfffffa80`1048c170
fffff880`0a944548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`1048c170 fffffa80`1048c010 : 0xfffffa80`00000001
fffff880`0a944550 00000000`00000200 : 00000000`00000200 fffffa80`1048c170 fffffa80`1048c010 fffffa80`1048c010 : 0xfffffa80`00000000
fffff880`0a944558 00000000`00000200 : fffffa80`1048c170 fffffa80`1048c010 fffffa80`1048c010 fffff880`00f467a7 : 0x200
fffff880`0a944560 fffffa80`1048c170 : fffffa80`1048c010 fffffa80`1048c010 fffff880`00f467a7 fffffa80`1048c010 : 0x200
fffff880`0a944568 fffffa80`1048c010 : fffffa80`1048c010 fffff880`00f467a7 fffffa80`1048c010 fffffa80`1048c010 : 0xfffffa80`1048c170
fffff880`0a944570 fffffa80`1048c010 : fffff880`00f467a7 fffffa80`1048c010 fffffa80`1048c010 fffffa80`075656e0 : 0xfffffa80`1048c010
fffff880`0a944578 fffff880`00f467a7 : fffffa80`1048c010 fffffa80`1048c010 fffffa80`075656e0 fffff8a0`1f74fa98 : 0xfffffa80`1048c010
fffff880`0a944580 fffff880`00f4e789 : fffff880`00f6cb50 fffff880`0a944738 00000000`00000200 fffffa80`1048c170 : ACPI!ACPIDispatchForwardIrp+0x37
fffff880`0a9445b0 fffff880`00f46a3f : fffff880`00f6cb50 fffffa80`074c7010 fffffa80`1048c010 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75
fffff880`0a9445e0 fffff880`01401445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b
fffff880`0a944660 fffff880`01401975 : fffffa80`078c3010 fffffa80`075656e0 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355
fffff880`0a944700 fffff880`010340af : fffffa80`10af98b0 fffffa80`10af98b0 fffffa80`10af9aa0 fffffa80`10b9b800 : CLASSPNP!ClassReadWrite+0xd5
fffff880`0a944750 fffff800`04af4a28 : fffffa80`10af9ae8 fffffa80`10847e50 fffffa80`10192630 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f
fffff880`0a944780 fffff800`04af46bd : 00000000`00000000 fffff880`0a944860 fffffa80`10af98b0 fffff800`0487d7fd : nt!RawReadWriteDeviceControl+0xa8
fffff880`0a9447c0 fffff880`01242bcf : fffffa80`10af9ae8 fffffa80`096a7e30 00000000`00000000 fffffa80`10af98b0 : nt!RawDispatch+0x7d
fffff880`0a944820 fffff880`012416df : fffffa80`10bc1990 00000000`00000001 fffffa80`10bc1900 fffffa80`10af98b0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0a9448b0 fffff800`04b9117b : 00000000`00000000 fffffa80`10192630 00000000`00000001 fffffa80`10af98b0 : fltmgr!FltpDispatch+0xcf
fffff880`0a944910 fffff800`04b70e53 : fffffa80`10192630 fffffa80`10af9801 fffffa80`10192630 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb
fffff880`0a944980 fffff800`04886e53 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`0a944a70 00000000`756e2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d6f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x756e2e09


STACK_COMMAND:  .trap 0xfffff8800a944380 ; kb

FOLLOWUP_IP: 
partmgr!PmGlobalDispatch+9f
fffff880`010340af 8bf0            mov     esi,eax

SYMBOL_STACK_INDEX:  12

SYMBOL_NAME:  partmgr!PmGlobalDispatch+9f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4f641bc1

IMAGE_VERSION:  6.1.7601.17796

FAILURE_BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f

BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x50_partmgr!pmglobaldispatch+9f

FAILURE_ID_HASH:  {52e5f7db-32c8-b25d-7537-9fbcea4fd678}

Followup: MachineOwner
---------



My System SpecsSystem Spec
.
30 May 2014   #2
Dataspell

Windows 7 home premium 64 bit
 
 

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Bruce\Documents\crash\052914-58905-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`04812000 PsLoadedModuleList = 0xfffff800`04a556d0
Debug session time: Thu May 29 22:52:03.695 2014 (UTC - 4:00)
System Uptime: 0 days 0:00:35.663
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8a002dfc000, 0, fffff800048d636e, 0}


Could not read faulting driver name
Probably caused by : cng.sys ( cng!HashFirstUserModeCallerBlobs+a5 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a002dfc000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800048d636e, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abf100
GetUlongFromAddress: unable to read from fffff80004abf1c0
 fffff8a002dfc000 Paged pool

FAULTING_IP: 
nt!wcsstr+56
fffff800`048d636e 66418b00        mov     ax,word ptr [r8]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre

TRAP_FRAME:  fffff880069f8730 -- (.trap 0xfffff880069f8730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000004d rbx=0000000000000000 rcx=0000000000000043
rdx=fffff80004b8fe40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800048d636e rsp=fffff880069f88c8 rbp=0000000000000000
 r8=fffff8a002dfc000  r9=0000009ffe26c1c0 r10=fffff80004b8fe40
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!wcsstr+0x56:
fffff800`048d636e 66418b00        mov     ax,word ptr [r8] ds:fffff8a0`02dfc000=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80004905bf0 to fffff80004887bc0

STACK_TEXT:  
fffff880`069f85c8 fffff800`04905bf0 : 00000000`00000050 fffff8a0`02dfc000 00000000`00000000 fffff880`069f8730 : nt!KeBugCheckEx
fffff880`069f85d0 fffff800`04885cee : 00000000`00000000 fffff8a0`02dfc000 fffffa80`07b41200 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4518f
fffff880`069f8730 fffff800`048d636e : fffff800`04c8f7fe 00000000`0000003a 00000000`00000000 ffffffff`8000036c : nt!KiPageFault+0x16e
fffff880`069f88c8 fffff800`04c8f7fe : 00000000`0000003a 00000000`00000000 ffffffff`8000036c 00000000`00000000 : nt!wcsstr+0x56
fffff880`069f88d0 fffff800`04c8f860 : fffff880`0000003a fffff8a0`02dfbfc0 ffffffff`8000032c fffff880`069f8fc0 : nt!SiIsWinPEBoot+0x4e
fffff880`069f8910 fffff800`04c92952 : ffffffff`8000032c 00000000`00000082 fffff880`069f8a18 fffff800`04883410 : nt!SiCheckForUfdWinpeBoot+0x30
fffff880`069f89f0 fffff800`04c92a1d : 00000000`00000000 fffff800`04caa440 00000000`0000ffff fffff880`069f9040 : nt!SiCheckForAlternateSystemDisk+0x12
fffff880`069f8a20 fffff800`04caa467 : fffff880`069f8c10 fafe441d`61b42e84 ffffffff`8000032c ffffe4f2`53175058 : nt!SiGetBiosSystemDisk+0x9d
fffff880`069f8aa0 fffff800`04c8fb5a : fffff880`069f8b50 fffff800`04af2d55 00000000`4b505953 00000000`0000015a : nt!SiGetSystemDisk+0x27
fffff880`069f8ad0 fffff800`04c1554d : fffff8a0`00000030 fffff880`069f8c10 fffff880`069f8b90 fffff880`069f8b50 : nt!SiGetSystemDeviceName+0x3a
fffff880`069f8b30 fffff800`04c95207 : fffff800`04c948e0 fffff8a0`0355b000 00000000`00020000 fffff880`069f8c10 : nt!IopRetrieveSystemDeviceName+0xac
fffff880`069f8b90 fffff800`04bec715 : 00000000`00000000 fffff880`069f8c10 fffff880`00000000 fffffa80`00000018 : nt!IoQuerySystemDeviceName+0x37
fffff880`069f8bd0 fffff800`04b933ad : fffff8a0`0355b000 fffffa80`6365734b fffff880`017402a8 fffff8a0`00000001 : nt! ?? ::NNGAKEGL::`string'+0x52a88
fffff880`069f8f80 fffff800`04886e53 : 00000000`00013268 fffff880`03100000 00000000`4649524d 00000000`00000001 : nt!NtQuerySystemInformation+0x4d
fffff880`069f8fc0 fffff800`04883410 : fffff880`01735015 00000000`00020000 fffff880`069f9600 fffff8a0`0355b000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`069f9158 fffff880`01735015 : 00000000`00020000 fffff880`069f9600 fffff8a0`0355b000 00000000`00000001 : nt!KiServiceLinkage
fffff880`069f9160 fffff880`0173401b : fffff8a0`0353b048 00000000`00000001 fffff880`069f92d0 00000000`00000000 : cng!HashFirstUserModeCallerBlobs+0xa5
fffff880`069f9220 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : cng!dblint_sqrt+0x1fb


STACK_COMMAND:  kb

FOLLOWUP_IP: 
cng!HashFirstUserModeCallerBlobs+a5
fffff880`01735015 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  10

SYMBOL_NAME:  cng!HashFirstUserModeCallerBlobs+a5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: cng

IMAGE_NAME:  cng.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  50194fb7

IMAGE_VERSION:  6.1.7601.17919

FAILURE_BUCKET_ID:  X64_0x50_cng!HashFirstUserModeCallerBlobs+a5

BUCKET_ID:  X64_0x50_cng!HashFirstUserModeCallerBlobs+a5

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x50_cng!hashfirstusermodecallerblobs+a5

FAILURE_ID_HASH:  {8becbeb9-5929-fe3f-d8a0-a3a5715bd4a1}

Followup: MachineOwner
---------
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Bruce\Documents\crash\053014-130089-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`04856000 PsLoadedModuleList = 0xfffff800`04a996d0
Debug session time: Fri May 30 02:00:13.719 2014 (UTC - 4:00)
System Uptime: 0 days 0:29:17.577
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff880b302d320, 1, fffffa80079392e6, 5}


Could not read faulting driver name
Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff880b302d320, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffffa80079392e6, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004b03100
GetUlongFromAddress: unable to read from fffff80004b031c0
 fffff880b302d320 Nonpaged pool

FAULTING_IP: 
+89b81e071a69359
fffffa80`079392e6 f3aa            rep stos byte ptr [rdi]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  CTAELicensing.

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre

TRAP_FRAME:  fffff8800cb74380 -- (.trap 0xfffff8800cb74380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000057374c00
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa80079392e6 rsp=fffff8800cb74518 rbp=fffffa80116d1600
 r8=0000000057374c00  r9=0000000000000001 r10=fffff8800a3a1d20
r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffffa80`079392e6 f3aa            rep stos byte ptr [rdi]
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800049485b3 to fffff800048cbbc0

STACK_TEXT:  
fffff880`0cb74518 fffffa80`079397e4 : 00000000`00000022 fffffa80`116d14a0 fffffa80`00000001 fffffa80`116d1600 : 0xfffffa80`079392e6
fffff880`0cb74520 00000000`00000022 : fffffa80`116d14a0 fffffa80`00000001 fffffa80`116d1600 fffffa80`00000001 : 0xfffffa80`079397e4
fffff880`0cb74528 fffffa80`116d14a0 : fffffa80`00000001 fffffa80`116d1600 fffffa80`00000001 fffffa80`00000000 : 0x22
fffff880`0cb74530 fffffa80`00000001 : fffffa80`116d1600 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`116d14a0
fffff880`0cb74538 fffffa80`116d1600 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001
fffff880`0cb74540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`116d1600 : 0xfffffa80`116d1600
fffff880`0cb74548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`116d1600 fffffa80`116d14a0 : 0xfffffa80`00000001
fffff880`0cb74550 00000000`00000200 : 00000000`00000200 fffffa80`116d1600 fffffa80`116d14a0 fffffa80`116d14a0 : 0xfffffa80`00000000
fffff880`0cb74558 00000000`00000200 : fffffa80`116d1600 fffffa80`116d14a0 fffffa80`116d14a0 fffff880`00f4a7a7 : 0x200
fffff880`0cb74560 fffffa80`116d1600 : fffffa80`116d14a0 fffffa80`116d14a0 fffff880`00f4a7a7 fffffa80`116d14a0 : 0x200
fffff880`0cb74568 fffffa80`116d14a0 : fffffa80`116d14a0 fffff880`00f4a7a7 fffffa80`116d14a0 fffffa80`116d14a0 : 0xfffffa80`116d1600
fffff880`0cb74570 fffffa80`116d14a0 : fffff880`00f4a7a7 fffffa80`116d14a0 fffffa80`116d14a0 fffffa80`075b9b20 : 0xfffffa80`116d14a0
fffff880`0cb74578 fffff880`00f4a7a7 : fffffa80`116d14a0 fffffa80`116d14a0 fffffa80`075b9b20 fffff8a0`1de8bbf8 : 0xfffffa80`116d14a0
fffff880`0cb74580 fffff880`00f52789 : fffff880`00f70b50 fffff880`0cb74738 00000000`00000200 fffffa80`116d1600 : ACPI!ACPIDispatchForwardIrp+0x37
fffff880`0cb745b0 fffff880`00f4aa3f : fffff880`00f70b50 fffffa80`067087d0 fffffa80`116d14a0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75
fffff880`0cb745e0 fffff880`017c3445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b
fffff880`0cb74660 fffff880`017c3975 : fffffa80`07804530 fffffa80`075b9b20 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355
fffff880`0cb74700 fffff880`010340af : fffffa80`119da400 fffffa80`119da400 fffffa80`119da5f0 fffffa80`11e331a0 : CLASSPNP!ClassReadWrite+0xd5
fffff880`0cb74750 fffff800`04b38a28 : fffffa80`119da638 fffffa80`116b5640 fffffa80`11ba5320 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f
fffff880`0cb74780 fffff800`04b386bd : 00000000`00000000 fffff880`0cb74860 fffffa80`119da400 fffff800`048c17fd : nt!RawReadWriteDeviceControl+0xa8
fffff880`0cb747c0 fffff880`0120dbcf : fffffa80`119da638 fffffa80`11359860 00000000`00000000 fffffa80`119da400 : nt!RawDispatch+0x7d
fffff880`0cb74820 fffff880`0120c6df : fffffa80`11d312d0 00000000`00000001 fffffa80`11d31200 fffffa80`119da400 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0cb748b0 fffff800`04bd517b : 00000000`00000000 fffffa80`11ba5320 00000000`00000001 fffffa80`119da400 : fltmgr!FltpDispatch+0xcf
fffff880`0cb74910 fffff800`04bb4e53 : fffffa80`11ba5320 fffffa80`119da401 fffffa80`11ba5320 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb
fffff880`0cb74980 fffff800`048cae53 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`0cb74a70 00000000`74c92e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00a1f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74c92e09


STACK_COMMAND:  .trap 0xfffff8800cb74380 ; kb

FOLLOWUP_IP: 
partmgr!PmGlobalDispatch+9f
fffff880`010340af 8bf0            mov     esi,eax

SYMBOL_STACK_INDEX:  12

SYMBOL_NAME:  partmgr!PmGlobalDispatch+9f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4f641bc1

IMAGE_VERSION:  6.1.7601.17796

FAILURE_BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f

BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x50_partmgr!pmglobaldispatch+9f

FAILURE_ID_HASH:  {52e5f7db-32c8-b25d-7537-9fbcea4fd678}

Followup: MachineOwner
---------
My System SpecsSystem Spec
Reply

 BSOD launching TERA MMO, error 0x00000050




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
BSOD Playing Tera Online, Error 0x00000124
Disregard.
BSOD Help and Support
BSOD playing Tera, error 0x00000116
My laptop has two graphics card: Nvidia GTX 660m and Intel graphics. Both with updated drivers. Whenever I use the Nvidia graphics card I crash within 5-20 minutes of game play in Tera Rising Online. With Intel graphics the game runs fine but the quality is horrible and performance is bad. Please...
BSOD Help and Support
BSOD playing TERA online, error 0x0000007e
um, hello, this is the first post of mine here, so please go easy on me :) to the main point, i recently re-installed my windows into Windows 7 x64 and currently having a few times BSOD while playing TERA online, which is never happened before (using Windows 7 x86). First BSOD happened with...
BSOD Help and Support
BSOD playing GW2 and Tera error 116
The crashes are completely random I can stop the crashes by lowerwing the graphics all the way to the bottom but raising them just once and my computer starts crashing again but to be honest playing games like Tera and GW2 on the lowest graphics feels like a waste.
BSOD Help and Support
BSOD when Launching Autocad, error 0x00000050
Hello, I am helping a client resolve a BSOD issue which occurs whenever Autocad is launched. Here is some general information regarding the BSOD: Bug Check String: PAGE_FAULT_IN_NONPAGED_AREA Bug Check Code: 0x00000050 Parameters: fffff880`f0bb6230 00000000`00000001 ...
BSOD Help and Support
IRQl_NOT_LESS_OR_EQUAL Random BSOD While playing Tera, Error 0xA
Hello, I just brought a brand new custom built desktop computer 3 weeks ago which basically has all the lastest hardware inside of it and it runs perfectly with no problems but least once or twice i have had a BSOD while on Mozilla Firefox while streaming but i looked at its AddOns and some said...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 20:16.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App