PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffed03e20ed640, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffed03e20ed640, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffed03e20ed640
BUGCHECK_P2: 11
BUGCHECK_P3: ffffed03e20ed640
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8077dafa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8077da0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8077da0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffed03e20ed640
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
TRAP_FRAME: ffffed03e20ed1e0 -- (.trap 0xffffed03e20ed1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd0a880911000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffed03e20ed640 rsp=ffffed03e20ed378 rbp=0000000000000000
r8=ffff810744e8fa80 r9=0000000000000000 r10=ffffd089e5c91af0
r11=ffffed03e20ed2a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffed03`e20ed640 d8d5 fcom st(5)
Resetting default scope
STACK_TEXT:
ffffed03`e20ecf38 fffff807`7d235c1d : 00000000`00000050 ffffed03`e20ed640 00000000`00000011 ffffed03`e20ed1e0 : nt!KeBugCheckEx
ffffed03`e20ecf40 fffff807`7d012ce0 : ffff8107`40e18470 00000000`00000011 ffffed03`e20ed260 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffffed03`e20ed040 fffff807`7d1ebb1e : ffffed03`e20ed1f8 ffffed03`e20ed1f0 ffff8107`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffed03`e20ed1e0 ffffed03`e20ed640 : ffffd0a8`80830e70 00000000`00000000 ffffd0a8`8061eaf0 ffffd0a8`80831150 : nt!KiPageFault+0x35e
ffffed03`e20ed378 ffffd0a8`80830e70 : 00000000`00000000 ffffd0a8`8061eaf0 ffffd0a8`80831150 ffffd089`e6a74972 : 0xffffed03`e20ed640
ffffed03`e20ed380 00000000`00000000 : ffffd0a8`8061eaf0 ffffd0a8`80831150 ffffd089`e6a74972 ffffd0a8`810817f0 : 0xffffd0a8`80830e70
CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kbase
172 errors : !win32kbase (ffffd089e5c91af2-ffffd089e5c91bef)
ffffd089e5c91af0 00 00 *00 *00 *00 *00 *00 *00 *00 00 00 *00 *00 *00 *00 *00 ................
ffffd089e5c91b00 00 *40 *00 *00 *00 *00 *00 00 *00 *00 *00 *00 *00 00 00 00 .@..............
...
ffffd089e5c91b20 00 40 00 00 00 *00 *00 *00 *00 *40 *00 *00 *00 *40 *00 *00 .@.......@...@..
ffffd089e5c91b30 *00 *40 *00 *00 *00 *40 *00 *00 *00 *40 00 00 00 40 00 00 .@...@...@...@..
ffffd089e5c91b40 00 40 *00 *00 *00 *40 *00 *00 *00 *40 *00 *00 *00 *40 *00 *00 .@...@...@...@..
ffffd089e5c91b50 *00 *40 *00 *00 *00 *40 00 *00 *00 *00 *00 *00 *00 *40 *00 00 .@...@.......@..
ffffd089e5c91b60 *00 *40 *00 *00 *00 *40 00 *00 *00 *00 *00 *00 *00 *00 *00 00 .@...@..........
ffffd089e5c91b70 *00 *40 *00 *00 *00 *40 *00 *00 00 00 00 *00 *00 *00 *00 *00 .@...@..........
ffffd089e5c91b80 *00 *40 *00 *00 *00 *40 *00 *00 *00 *00 00 00 00 00 00 00 .@...@..........
ffffd089e5c91b90 00 00 *00 *00 *00 *40 *00 *00 *00 *40 *00 00 00 *40 *00 *00 .....@...@...@..
ffffd089e5c91ba0 *00 *40 *00 00 00 *40 *00 *00 *00 *40 *00 *00 *00 *40 00 00 .@...@...@...@..
ffffd089e5c91bb0 00 *00 *00 *00 *00 *40 00 00 *00 *40 *00 *00 00 00 00 00 .....@...@......
ffffd089e5c91bc0 00 40 00 00 00 00 00 00 *00 *40 *00 *00 *00 *40 00 00 .@.......@...@..
ffffd089e5c91bd0 *00 *00 *00 *00 *00 *40 *00 *00 *00 *00 00 00 00 00 00 00 .....@..........
ffffd089e5c91be0 00 40 *00 *00 *00 *00 *00 *00 *00 *00 *00 *00 *00 *00 *00 *00 .@..............
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE_256
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_256
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c4e440c8-f34a-f4bb-4c2a-b6acf02f9cce}
Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff958029653100
Arg3: 0000400000004000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff958029653100
BUGCHECK_P3: 400000004000
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFaultSecure.exe
STACK_TEXT:
fffff987`e515c5d8 fffff807`4765418e : 00000000`0000001a 00000000`00041792 ffff9580`29653100 00004000`00004000 : nt!KeBugCheckEx
fffff987`e515c5e0 fffff807`474c215f : ffffe40e`7357b700 00000052`ca600000 0010001f`00000002 fffff987`e515c7d0 : nt!MiDeleteVa+0x191e6e
fffff987`e515c6d0 fffff807`474a787f : 00000000`00000000 00000000`00000060 ffffe40e`7357b7c0 ffffe40e`7514b080 : nt!MiDeletePagablePteRange+0x31f
fffff987`e515cb50 fffff807`47866a13 : ffffe40e`7357b080 00000000`00000000 ffffe40e`00000000 ffffe40e`00000001 : nt!MiDeleteVad+0x41f
fffff987`e515cc80 fffff807`478678b3 : ffffe40e`76596540 ffffe40e`76596540 ffffe40e`76988b60 ffffe40e`7357b080 : nt!MiCleanVad+0x43
fffff987`e515ccb0 fffff807`478b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe40e`7357b080 : nt!MmCleanProcessAddressSpace+0x137
fffff987`e515cd30 fffff807`47a2069b : 00000000`000022aa 00000000`000022aa fffff987`e515d350 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffff987`e515cdb0 fffff807`4788e2fd : 00000000`00000000 fffff987`e515d350 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x185e8b
fffff987`e515d2d0 fffff807`475ef378 : 00000000`00000002 00000000`00000001 00000000`00000000 00000227`7ae268e0 : nt!NtCreateUserProcess+0x6ed
fffff987`e515da90 00007fff`feb2c684 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a6`24b7d3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`feb2c684
SYMBOL_NAME: nt!MiDeleteVa+191e6e
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 191e6e
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------