PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8452210fff08, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8044baeb7e8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8211
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8452210fff08
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8044baeb7e8
BUGCHECK_P4: b
READ_ADDRESS: fffff8044c4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044c40f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044c40f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8452210fff08
MM_INTERNAL_CODE: b
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: DiscordPTB.exe
TRAP_FRAME: ffff8085f2f006c0 -- (.trap 0xffff8085f2f006c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff841000000000 rbx=0000000000000000 rcx=ffffd30455e76940
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044baeb7e8 rsp=ffff8085f2f00850 rbp=ffffd30455e76940
r8=ffff8452210fff08 r9=000000001ffe1048 r10=0000000000000001
r11=ffff844200000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiFastLockLeafPageTable+0x108:
fffff804`4baeb7e8 498b00 mov rax,qword ptr [r8] ds:ffff8452`210fff08=????????????????
Resetting default scope
STACK_TEXT:
ffff8085`f2f004c8 fffff804`4bc4114e : 00000000`00000050 ffff8452`210fff08 00000000`00000000 ffff8085`f2f006c0 : nt!KeBugCheckEx
ffff8085`f2f004d0 fffff804`4baea58f : 00000000`00000000 00000000`00000000 ffff8085`f2f00740 00000000`00000000 : nt!MiRaisedIrqlFault+0x1bf342
ffff8085`f2f00520 fffff804`4bc0335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffff8085`f2f006c0 fffff804`4baeb7e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff8085`f2f00850 fffff804`4baeab95 : ffffd304`55e76940 ffff8442`211087f8 ffff8085`00000002 ffff8442`1ffe1048 : nt!MiFastLockLeafPageTable+0x108
ffff8085`f2f008d0 fffff804`4baea20a : 40140000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x415
ffff8085`f2f00960 fffff804`4bc0335e : ffffd304`5506c080 00000000`0a53deb0 ffff8085`f2f00b18 ffffffff`ffd40e00 : nt!MmAccessFault+0x16a
ffff8085`f2f00b00 00007ff8`412933e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0a43e528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`412933e0
SYMBOL_NAME: nt!MiFastLockLeafPageTable+108
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 108
FAILURE_BUCKET_ID: AV_R_INVALID_nt!MiFastLockLeafPageTable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fae2af10-f309-b607-4d82-6f12498b5636}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffa686bd487100, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10204
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffa686bd487100
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: services.exe
CRITICAL_PROCESS: services.exe
ERROR_CODE: (NTSTATUS) 0xbf426080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {eb550c82-428f-4b6e-80e5-b412fdd1f4c2}
IMAGE_NAME: unknown
MODULE_NAME: unknown
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff9d04`8f1d4938 fffff803`57106fb2 : 00000000`000000ef ffffa686`bd487100 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff9d04`8f1d4940 fffff803`56fd7e33 : 00000000`00000000 fffff803`56a60ec5 00000000`00000002 fffff803`56a60def : nt!PspCatchCriticalBreak+0x10e
ffff9d04`8f1d49e0 fffff803`56e4a9b0 : ffffa686`00000000 00000000`00000000 ffffa686`bd487100 ffffa686`bd487538 : nt!PspTerminateAllThreads+0x1ee427
ffff9d04`8f1d4a50 fffff803`56e4a7ac : ffffa686`bd487100 00000000`00000000 000000a7`8d9ef8dc fffff803`56f0470a : nt!PspTerminateProcess+0xe0
ffff9d04`8f1d4a90 fffff803`56c06bb8 : ffffa686`bd487100 ffffa686`bf426080 ffff9d04`8f1d4b80 ffffa686`bd487100 : nt!NtTerminateProcess+0x9c
ffff9d04`8f1d4b00 00007ff9`eb8ac324 : 00007ff9`eb922693 00007ff9`eb951364 000000a7`8d9ef8a0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a7`8d9ee8e8 00007ff9`eb922693 : 00007ff9`eb951364 000000a7`8d9ef8a0 00000000`00000000 00007ff9`eb810000 : 0x00007ff9`eb8ac324
000000a7`8d9ee8f0 00007ff9`eb951364 : 000000a7`8d9ef8a0 00000000`00000000 00007ff9`eb810000 00000000`00000004 : 0x00007ff9`eb922693
000000a7`8d9ee8f8 000000a7`8d9ef8a0 : 00000000`00000000 00007ff9`eb810000 00000000`00000004 00007ff9`eb8b331d : 0x00007ff9`eb951364
000000a7`8d9ee900 00000000`00000000 : 00007ff9`eb810000 00000000`00000004 00007ff9`eb8b331d 00007ff9`eb951364 : 0x000000a7`8d9ef8a0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_bf426080_unknown!_IMAGE_unknown
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {241660f9-a1bc-4504-c0ea-88eb3e47acb3}
Followup: MachineOwner
---------