PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff801394611d6, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for idmwfp.sys
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 163948
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffffd0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff801394611d6
BUGCHECK_P4: 2
READ_ADDRESS: fffff80139efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80139e0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80139e0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffd0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffa50d966c32e0 -- (.trap 0xffffa50d966c32e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801394611d6 rsp=ffffa50d966c3470 rbp=ffffa50d966c3739
r8=ffffd50df1cc7010 r9=ffffd50ded4f3480 r10=0000000000000000
r11=ffffad7ecc400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff801`394611d6 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope
STACK_TEXT:
ffffa50d`966c3038 fffff801`3961eb01 : 00000000`00000050 ffffffff`ffffffd0 00000000`00000002 ffffa50d`966c32e0 : nt!KeBugCheckEx
ffffa50d`966c3040 fffff801`3940c960 : ffff0000`00000000 00000000`00000002 ffffa50d`966c3360 00000000`00000000 : nt!MiSystemFault+0x1f42f1
ffffa50d`966c3140 fffff801`39603d5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffa50d`966c32e0 fffff801`394611d6 : 00000000`00000003 fffff801`460d3145 00000000`00002adc ffffd50d`f3ce3080 : nt!KiPageFault+0x35e
ffffa50d`966c3470 fffff801`3946119e : ffffd50d`f500cd10 fffff801`460fd360 00000000`00000000 00000000`50737050 : nt!ObfDereferenceObjectWithTag+0x26
ffffa50d`966c34b0 fffff801`460dacd4 : 00000000`00000003 fffff801`460fd360 00000000`00000000 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffffa50d`966c34e0 00000000`00000003 : fffff801`460fd360 00000000`00000000 00000000`00000000 ffffd50d`f500cd48 : idmwfp+0xacd4
ffffa50d`966c34e8 fffff801`460fd360 : 00000000`00000000 00000000`00000000 ffffd50d`f500cd48 fffff801`3944ca00 : 0x3
ffffa50d`966c34f0 00000000`00000000 : 00000000`00000000 ffffd50d`f500cd48 fffff801`3944ca00 00000000`00000000 : idmwfp+0x2d360
SYMBOL_NAME: idmwfp+acd4
MODULE_NAME: idmwfp
IMAGE_NAME: idmwfp.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: acd4
FAILURE_BUCKET_ID: AV_INVALID_idmwfp!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {18612644-684f-0bc1-eb01-2debba4b5ae9}
Followup: MachineOwner
---------