PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff818a07798f18, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80106a76d3f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : AV.Type
    Value: Read
    Key  : Analysis.CPU.mSec
    Value: 1562
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 6598
    Key  : Analysis.IO.Other.Mb
    Value: 4
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 25
    Key  : Analysis.Init.CPU.mSec
    Value: 374
    Key  : Analysis.Init.Elapsed.mSec
    Value: 17609
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50
    Key  : Bugcheck.Code.Register
    Value: 0x50
    Key  : Dump.Attributes.AsUlong
    Value: 1808
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
FILE_IN_CAB:  102222-11781-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump
BUGCHECK_CODE:  50
BUGCHECK_P1: ffff818a07798f18
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80106a76d3f
BUGCHECK_P4: 0
READ_ADDRESS: fffff8010751c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff818a07798f18
MM_INTERNAL_CODE:  0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  ffffc400ae71dfe0 -- (.trap 0xffffc400ae71dfe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff818a07798f08 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff818a02349f08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80106a76d3f rsp=ffffc400ae71e170 rbp=ffff818a02349f08
 r8=ffff818a02349f08  r9=ffff818a02349f18 r10=ffff8189e30002d0
r11=ffff818a0cb9df08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlRbRemoveNode+0x51f:
fffff801`06a76d3f f6401001        test    byte ptr [rax+10h],1 ds:ffff818a`07798f18=??
Resetting default scope
STACK_TEXT: 
ffffc400`ae71ddb8 fffff801`06c7e557     : 00000000`00000050 ffff818a`07798f18 00000000`00000000 ffffc400`ae71dfe0 : nt!KeBugCheckEx
ffffc400`ae71ddc0 fffff801`06a53c4c     : 00000000`00000000 00000000`00000000 ffffc400`ae71df79 00000000`00000000 : nt!MiSystemFault+0x22d827
ffffc400`ae71dec0 fffff801`06c36edd     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`06b1f2d2 : nt!MmAccessFault+0x29c
ffffc400`ae71dfe0 fffff801`06a76d3f     : ffff818a`0b4b1f00 00000000`000004f2 ffff818a`0b4ac000 00000027`000e0000 : nt!KiPageFault+0x35d
ffffc400`ae71e170 fffff801`06a76362     : 00000000`00000000 ffffc400`ae71e390 ffff818a`0b4acfe0 00000000`00000027 : nt!RtlRbRemoveNode+0x51f
ffffc400`ae71e1a0 fffff801`06a73a19     : ffff8189`e30002c0 00000000`00000000 00000000`00002bed ffffc400`ae71e268 : nt!RtlpHpVsChunkCoalesce+0x272
ffffc400`ae71e1f0 fffff801`06a73932     : ffff818a`0aa51ca0 ffff8189`00000000 ffff8189`e30002c0 00000000`00000000 : nt!RtlpHpVsChunkFree+0x49
ffffc400`ae71e260 fffff801`06b21bfe     : ffff8189`f38eb640 ffff818a`0a7a6d60 00000000`00000000 fffff801`06800000 : nt!RtlpHpVsContextFreeList+0x102
ffffc400`ae71e2d0 fffff801`06b21927     : ffff8189`e3000140 00000000`00000000 ffff8189`f38eb650 fffff801`06b21873 : nt!RtlpHpVsContextFree+0xfe
ffffc400`ae71e310 fffff801`0729aca5     : 00000000`6e664d46 fffff801`00000003 01000000`00000220 00000000`00000220 : nt!ExFreeHeapPool+0x3a7
ffffc400`ae71e3c0 fffff801`06a9314a     : ffffffff`ffffffff fffff801`0476ff74 00000000`00000000 fffff801`0473b936 : nt!ExFreePool+0x25
ffffc400`ae71e400 fffff801`047705c7     : 00000000`00000000 fffff801`0473b936 ffffb00c`8c142c04 ffffb00c`9cb29150 : nt!ExFreeToNPagedLookasideList+0x2a
ffffc400`ae71e430 fffff801`047704c4     : 00000000`00004000 ffff8189`f38eb678 ffffb00c`939860c0 fffff801`0475b060 : FLTMGR!FltpFreeFileNameInformation+0x67
ffffc400`ae71e470 fffff801`047397f5     : 00000000`00000000 ffffb00c`9cb29150 ffffb00c`00004000 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0x214
ffffc400`ae71e4f0 fffff801`04738e21     : ffffc400`ae71e710 00000000`00000002 ffffb00c`00000000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x7d5
ffffc400`ae71e600 fffff801`04737da9     : ffffc400`ae71f000 ffffc400`ae719000 ffffb00c`916ccaa0 ffffc400`ae71e720 : FLTMGR!FltpPassThroughInternal+0xd1
ffffc400`ae71e650 fffff801`04737b8b     : ffffffff`fffe7960 00000000`00000000 00000000`00000080 ffffb00c`8c08fd20 : FLTMGR!FltpPassThrough+0x179
ffffc400`ae71e6f0 fffff801`06acb875     : ffffb00c`9cb29150 fffff801`06ad4468 ffffb00c`9f8b8650 ffffb00c`87010000 : FLTMGR!FltpDispatch+0x8b
ffffc400`ae71e750 fffff801`06ec7bcc     : ffffb00c`9cb29150 ffff818a`01db5e10 ffffb00c`8c1a5030 00000000`00000000 : nt!IofCallDriver+0x55
ffffc400`ae71e790 fffff801`06ec254e     : ffffb00c`86f9b980 00000000`00000000 ffffb00c`9cb29120 ffff818a`01db5e10 : nt!IopDeleteFile+0x13c
ffffc400`ae71e810 fffff801`06acd3ff     : 00000000`00000000 00000000`00000000 ffff818a`01db5e10 ffffb00c`9cb29150 : nt!ObpRemoveObjectRoutine+0x7e
ffffc400`ae71e870 fffff801`06f7315d     : 00000000`00000000 ffffb00c`9f8b8610 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0x8f
ffffc400`ae71e8b0 fffff801`06e0f307     : 00000000`00000001 00000000`00000000 ffffc400`ae71e980 fffff801`0746afc0 : nt!MiSegmentDelete+0xf5
ffffc400`ae71e900 fffff801`06ce485d     : fffff801`00000000 00000000`00000001 00000000`00000000 fffff801`0746b560 : nt!MiProcessDereferenceList+0x113
ffffc400`ae71e9c0 fffff801`06b08887     : ffffb00c`8c1dd280 ffffb00c`8c1dd280 00000000`00000080 fffff801`06bdae50 : nt!MiDereferenceSegmentThread+0x109a0d
ffffc400`ae71ebf0 fffff801`06c2c214     : ffffe700`a8b11180 ffffb00c`8c1dd280 fffff801`06b08830 00000000`00000000 : nt!PspSystemThreadStartup+0x57
ffffc400`ae71ec40 00000000`00000000     : ffffc400`ae71f000 ffffc400`ae719000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME:  nt!RtlRbRemoveNode+51f
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.675
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  51f
FAILURE_BUCKET_ID:  AV_R_(null)_nt!RtlRbRemoveNode
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f2fc99a7-a568-9000-189c-318e268059a1}
Followup:     MachineOwner
---------
4: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2594]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends International, LLC.
BiosVersion = B.G0
BiosReleaseDate = 07/26/2022
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7A38
SystemFamily = To be filled by O.E.M.
SystemVersion = 8.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-VDH MAX (MS-7A38)
BaseBoardVersion = 8.0
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000001, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000005, error status (normally i/o status code)
Arg3: ffffa10e364d5080, current process (virtual address for lock type 3, or PTE)
Arg4: ffffdcbffa8b9000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1483
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 5374
    Key  : Analysis.IO.Other.Mb
    Value: 4
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 24
    Key  : Analysis.Init.CPU.mSec
    Value: 374
    Key  : Analysis.Init.Elapsed.mSec
    Value: 15752
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x7a
    Key  : Bugcheck.Code.Register
    Value: 0x7a
    Key  : Dump.Attributes.AsUlong
    Value: 808
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
FILE_IN_CAB:  KERNEL_DATA_INPAGE_ERROR.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump
BUGCHECK_CODE:  7a
BUGCHECK_P1: 1
BUGCHECK_P2: ffffffffc0000005
BUGCHECK_P3: ffffa10e364d5080
BUGCHECK_P4: ffffdcbffa8b9000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.
BLACKBOXDISK: 1
DISKSEC_ORG_ID: 
DISKSEC_MODEL: 
DISKSEC_MANUFACTURING_ID: 
DISKSEC_ISSUE_DESC_STR: 
DISKSEC_TOTAL_SIZE: 0
DISKSEC_REASON: 0
DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 0
DISKSEC_PUBLIC_OFFSET: 0
DISKSEC_PUBLIC_DATA_SIZE: 0
DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 0
DISKSEC_PRIVATE_OFFSET: 0
DISKSEC_PRIVATE_DATA_SIZE: 0
PROCESS_NAME:  WmiPrvSE.exe
STACK_TEXT: 
fffffd00`dc4d1238 fffff801`63e80693     : 00000000`0000007a 00000000`00000001 ffffffff`c0000005 ffffa10e`364d5080 : nt!KeBugCheckEx
fffffd00`dc4d1240 fffff801`63c5bc6c     : 00000000`00000000 fffffd00`dc4d16b0 00000000`00000000 80000000`00000000 : nt!MiGetNextPageTablePte+0x223fe3
fffffd00`dc4d1300 fffff801`63c5beed     : ffffdcee`00000000 fffffd00`00000000 00000000`00000001 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x6ac
fffffd00`dc4d1390 fffff801`63c5beed     : ffffdcee`00000000 fffffd00`00000000 00000000`00000002 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x92d
fffffd00`dc4d1420 fffff801`63c7efb1     : 00000000`00000000 00000000`00000000 00000000`00000003 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x92d
fffffd00`dc4d14b0 fffff801`63c4c3b3     : fffffd00`dc4d16b0 ffffdcbf`00000001 00000000`00000002 ffffdcee`00000000 : nt!MiWalkPageTables+0x371
fffffd00`dc4d15b0 fffff801`63c49a75     : 00000000`00000000 fffffd00`00000000 00000000`00000002 00000000`00000000 : nt!MiQueryAddressState+0x293
fffffd00`dc4d17c0 fffff801`640b2167     : fffffd00`dc4d1910 00007ff5`16c98000 ffffa10e`36550000 ffffa10e`365591c0 : nt!MiQueryAddressSpan+0x2a5
fffffd00`dc4d1880 fffff801`640b1a15     : ffff93e7`6b4e96e4 00000000`00000000 00000279`060023e8 00000000`00000000 : nt!MmQueryVirtualMemory+0x737
fffffd00`dc4d1a20 fffff801`63e3aa68     : 00000279`0ad6dbc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
fffffd00`dc4d1a70 00007ffe`f8a8f1d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000db`5fc7daa8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f8a8f1d4
SYMBOL_NAME:  nt!MiGetNextPageTablePte+223fe3
MODULE_NAME: nt
IMAGE_VERSION:  10.0.22621.608
STACK_COMMAND:  .cxr; .ecxr ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  223fe3
FAILURE_BUCKET_ID:  0x7a_c0000005_nt!MiGetNextPageTablePte
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {d4584103-842d-cac6-0c84-edfb0f8fe0b3}
Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffcc852b21d080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 3030
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 11716
    Key  : Analysis.IO.Other.Mb
    Value: 4
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 23
    Key  : Analysis.Init.CPU.mSec
    Value: 249
    Key  : Analysis.Init.Elapsed.mSec
    Value: 13449
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87
    Key  : Bugcheck.Code.DumpHeader
    Value: 0xef
    Key  : Bugcheck.Code.Register
    Value: 0xef
    Key  : CriticalProcessDied.ExceptionCode
    Value: 25c49040
    Key  : CriticalProcessDied.Process
    Value: svchost.exe
    Key  : Dump.Attributes.AsUlong
    Value: 1808
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
FILE_IN_CAB:  CRITICAL_PROCESS_DIED.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump
BUGCHECK_CODE:  ef
BUGCHECK_P1: ffffcc852b21d080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME:  svchost.exe
CRITICAL_PROCESS:  svchost.exe
EXCEPTION_RECORD:  ffffcc852b21d7c0 -- (.exr 0xffffcc852b21d7c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x25c49040 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
EXCEPTION_STR:  0x0
STACK_TEXT: 
ffffc78d`abed0d48 fffff807`39faf063     : 00000000`000000ef ffffcc85`2b21d080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc78d`abed0d50 fffff807`39ec0215     : ffffcc85`2b21d080 fffff807`3993ce65 00000000`00000002 fffff807`3993cd53 : nt!PspCatchCriticalBreak+0x11b
ffffc78d`abed0de0 fffff807`39d9bdd4     : ffffcc85`2b21d080 00000000`c0000409 ffffcc85`2b21d080 ffffc78d`abed1a00 : nt!PspTerminateAllThreads+0x161d41
ffffc78d`abed0e50 fffff807`39d9bbb0     : ffffffff`ffffffff ffffcc85`2b21d080 ffffcc85`25c49040 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffc78d`abed0e90 fffff807`39a2d278     : ffffc78d`00000e44 ffffcc85`25c49040 ffffcc85`2b21d080 fffff807`39de36a2 : nt!NtTerminateProcess+0xb0
ffffc78d`abed0f10 fffff807`39a1f510     : fffff807`39aae518 ffffffff`ffffffff ffffffff`ffffffff 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
ffffc78d`abed10a8 fffff807`39aae518     : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000001 ffffc78d`abed10e0 : nt!KiServiceLinkage
ffffc78d`abed10b0 fffff807`39a2dd06     : ffffcc85`2b21d7c0 fffff807`3986edc1 00000000`00000000 00007ffa`4a22ba40 : nt!KiDispatchException+0x1a0188
ffffc78d`abed1900 fffff807`39a2bfd2     : ffffcc85`25c49040 000000af`50bfebc0 000000af`50bff3e0 00000000`00000000 : nt!KiFastFailDispatch+0xc6
ffffc78d`abed1ae0 00007ffa`4a22ba78     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x312
000000af`50bfe3d0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4a22ba78
SYMBOL_NAME:  nt!PspCatchCriticalBreak+11b
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22000.1042
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  11b
FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_25c49040_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f54aec41-b9ff-fc4d-24ba-fb42c367a96e}
Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffffc2013133cf88
Arg3: 8100000284712825
Arg4: ffff8183e98e21c8
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1436
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 4756
    Key  : Analysis.IO.Other.Mb
    Value: 3
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 24
    Key  : Analysis.Init.CPU.mSec
    Value: 374
    Key  : Analysis.Init.Elapsed.mSec
    Value: 13724
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a
    Key  : Bugcheck.Code.Register
    Value: 0x1a
    Key  : Dump.Attributes.AsUlong
    Value: 808
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
FILE_IN_CAB:  102022-11984-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump
BUGCHECK_CODE:  1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffffc2013133cf88
BUGCHECK_P3: 8100000284712825
BUGCHECK_P4: ffff8183e98e21c8
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  MsMpEng.exe
STACK_TEXT: 
fffffc88`0a43cf78 fffff803`2ea81bdd     : 00000000`0000001a 00000000`00000403 ffffc201`3133cf88 81000002`84712825 : nt!KeBugCheckEx
fffffc88`0a43cf80 fffff803`2e865855     : fffffc88`0a43d320 fffffc88`0a43d2b0 00000262`67800000 fffffc88`0a43d200 : nt!MiDeletePteRun+0x21f90d
fffffc88`0a43d180 fffff803`2e866f4d     : ffffc201`3133cff8 00000000`00000000 00000000`00000000 ffffc261`009899e0 : nt!MiDeleteVaTail+0x55
fffffc88`0a43d1b0 fffff803`2e8a1d02     : 00000000`00000000 fffff803`2e8a1ecd fffffc88`0a43d578 ffffe202`f0f0b080 : nt!MiDeletePagablePteRange+0x53d
fffffc88`0a43d4e0 fffff803`2ecae378     : 00000000`00000000 00000000`00000001 00000000`00000000 fffffc88`0a43d5b0 : nt!MiDeleteVirtualAddresses+0x52
fffffc88`0a43d530 fffff803`2ecf4b1e     : ffffe202`f04fa080 ffffe202`f5ac8180 ffffe202`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
fffffc88`0a43d5f0 fffff803`2ecf4685     : ffffe202`f46f4010 ffffe202`f46f4010 ffffe202`f46f4010 ffffe202`f04fa080 : nt!MiCleanVad+0x42
fffffc88`0a43d620 fffff803`2ed3f0c1     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe202`f04fa080 : nt!MmCleanProcessAddressSpace+0x10d
fffffc88`0a43d6a0 fffff803`2ec8b464     : ffffe202`f04fa080 ffff8183`e8ad5630 fffffc88`0a43d8c9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
fffffc88`0a43d730 fffff803`2edc6f48     : ffffe202`000000ff ffff4cb6`99a2c401 ffffe202`f0f0b0f4 00000062`8a008000 : nt!PspExitThread+0x63c
fffffc88`0a43d830 fffff803`2e817b67     : 00000000`00000000 fffff803`2e89c68a fffffc88`0a43d954 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffc88`0a43d870 fffff803`2ea2d1a0     : 00000000`00000001 fffffc88`0a43d930 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x4a7
fffffc88`0a43d930 fffff803`2ea3ab0f     : ffffe202`f1b82d00 ffff9d00`f1c51180 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffc88`0a43da70 00007ffe`2e8329c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000062`8bfff858 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2e8329c4
SYMBOL_NAME:  nt!MiDeletePteRun+21f90d
MODULE_NAME: nt
IMAGE_VERSION:  10.0.22621.674
STACK_COMMAND:  .cxr; .ecxr ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  21f90d
FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup:     MachineOwner
---------