*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa89506f45fe0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8036d8d44d4, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OHH9VN5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 34988
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa89506f45fe0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8036d8d44d4
BUGCHECK_P4: 2
READ_ADDRESS: fffff80344b713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80344a283c8: Unable to get Flags value from nt!KdVersionBlock
fffff80344a283c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa89506f45fe0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vmmem
TRAP_FRAME: ffff8a0c589332c0 -- (.trap 0xffff8a0c589332c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036d8d44d4 rsp=ffff8a0c58933450 rbp=0000000000000206
r8=0000000000000000 r9=0000000000000000 r10=ffffac037d8d6118
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
xhunter1+0x44d4:
fffff803`6d8d44d4 428a0439 mov al,byte ptr [rcx+r15] ds:00000000`00000000=??
Resetting default scope
STACK_TEXT:
ffff8a0c`58933018 fffff803`44813ae0 : 00000000`00000050 ffffa895`06f45fe0 00000000`00000000 ffff8a0c`589332c0 : nt!KeBugCheckEx
ffff8a0c`58933020 fffff803`446cdcbf : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa895`06f45fe0 : nt!MiSystemFault+0x18f320
ffff8a0c`58933120 fffff803`447d1b5e : 00000000`00000001 ffffa895`06f45fe0 ffff8d01`4a619830 00000000`00000000 : nt!MmAccessFault+0x34f
ffff8a0c`589332c0 fffff803`6d8d44d4 : 00000000`00000206 00000000`00000206 00000000`00000000 ffffa895`06f45fe0 : nt!KiPageFault+0x35e
ffff8a0c`58933450 00000000`00000206 : 00000000`00000206 00000000`00000000 ffffa895`06f45fe0 ffffac03`00000000 : xhunter1+0x44d4
ffff8a0c`58933458 00000000`00000206 : 00000000`00000000 ffffa895`06f45fe0 ffffac03`00000000 ffff8a0c`58933550 : 0x206
ffff8a0c`58933460 00000000`00000000 : ffffa895`06f45fe0 ffffac03`00000000 ffff8a0c`58933550 00000000`00000000 : 0x206
SYMBOL_NAME: xhunter1+44d4
MODULE_NAME: xhunter1
IMAGE_NAME: xhunter1.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 44d4
FAILURE_BUCKET_ID: AV_R_INVALID_xhunter1!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c66260ca-cd62-b45c-d6d9-1600a64e12d3}
Followup: MachineOwner