PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff818a07798f18, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80106a76d3f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1562
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6598
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 25
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 17609
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 102222-11781-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff818a07798f18
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80106a76d3f
BUGCHECK_P4: 0
READ_ADDRESS: fffff8010751c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff818a07798f18
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc400ae71dfe0 -- (.trap 0xffffc400ae71dfe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff818a07798f08 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff818a02349f08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80106a76d3f rsp=ffffc400ae71e170 rbp=ffff818a02349f08
r8=ffff818a02349f08 r9=ffff818a02349f18 r10=ffff8189e30002d0
r11=ffff818a0cb9df08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlRbRemoveNode+0x51f:
fffff801`06a76d3f f6401001 test byte ptr [rax+10h],1 ds:ffff818a`07798f18=??
Resetting default scope
STACK_TEXT:
ffffc400`ae71ddb8 fffff801`06c7e557 : 00000000`00000050 ffff818a`07798f18 00000000`00000000 ffffc400`ae71dfe0 : nt!KeBugCheckEx
ffffc400`ae71ddc0 fffff801`06a53c4c : 00000000`00000000 00000000`00000000 ffffc400`ae71df79 00000000`00000000 : nt!MiSystemFault+0x22d827
ffffc400`ae71dec0 fffff801`06c36edd : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`06b1f2d2 : nt!MmAccessFault+0x29c
ffffc400`ae71dfe0 fffff801`06a76d3f : ffff818a`0b4b1f00 00000000`000004f2 ffff818a`0b4ac000 00000027`000e0000 : nt!KiPageFault+0x35d
ffffc400`ae71e170 fffff801`06a76362 : 00000000`00000000 ffffc400`ae71e390 ffff818a`0b4acfe0 00000000`00000027 : nt!RtlRbRemoveNode+0x51f
ffffc400`ae71e1a0 fffff801`06a73a19 : ffff8189`e30002c0 00000000`00000000 00000000`00002bed ffffc400`ae71e268 : nt!RtlpHpVsChunkCoalesce+0x272
ffffc400`ae71e1f0 fffff801`06a73932 : ffff818a`0aa51ca0 ffff8189`00000000 ffff8189`e30002c0 00000000`00000000 : nt!RtlpHpVsChunkFree+0x49
ffffc400`ae71e260 fffff801`06b21bfe : ffff8189`f38eb640 ffff818a`0a7a6d60 00000000`00000000 fffff801`06800000 : nt!RtlpHpVsContextFreeList+0x102
ffffc400`ae71e2d0 fffff801`06b21927 : ffff8189`e3000140 00000000`00000000 ffff8189`f38eb650 fffff801`06b21873 : nt!RtlpHpVsContextFree+0xfe
ffffc400`ae71e310 fffff801`0729aca5 : 00000000`6e664d46 fffff801`00000003 01000000`00000220 00000000`00000220 : nt!ExFreeHeapPool+0x3a7
ffffc400`ae71e3c0 fffff801`06a9314a : ffffffff`ffffffff fffff801`0476ff74 00000000`00000000 fffff801`0473b936 : nt!ExFreePool+0x25
ffffc400`ae71e400 fffff801`047705c7 : 00000000`00000000 fffff801`0473b936 ffffb00c`8c142c04 ffffb00c`9cb29150 : nt!ExFreeToNPagedLookasideList+0x2a
ffffc400`ae71e430 fffff801`047704c4 : 00000000`00004000 ffff8189`f38eb678 ffffb00c`939860c0 fffff801`0475b060 : FLTMGR!FltpFreeFileNameInformation+0x67
ffffc400`ae71e470 fffff801`047397f5 : 00000000`00000000 ffffb00c`9cb29150 ffffb00c`00004000 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0x214
ffffc400`ae71e4f0 fffff801`04738e21 : ffffc400`ae71e710 00000000`00000002 ffffb00c`00000000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x7d5
ffffc400`ae71e600 fffff801`04737da9 : ffffc400`ae71f000 ffffc400`ae719000 ffffb00c`916ccaa0 ffffc400`ae71e720 : FLTMGR!FltpPassThroughInternal+0xd1
ffffc400`ae71e650 fffff801`04737b8b : ffffffff`fffe7960 00000000`00000000 00000000`00000080 ffffb00c`8c08fd20 : FLTMGR!FltpPassThrough+0x179
ffffc400`ae71e6f0 fffff801`06acb875 : ffffb00c`9cb29150 fffff801`06ad4468 ffffb00c`9f8b8650 ffffb00c`87010000 : FLTMGR!FltpDispatch+0x8b
ffffc400`ae71e750 fffff801`06ec7bcc : ffffb00c`9cb29150 ffff818a`01db5e10 ffffb00c`8c1a5030 00000000`00000000 : nt!IofCallDriver+0x55
ffffc400`ae71e790 fffff801`06ec254e : ffffb00c`86f9b980 00000000`00000000 ffffb00c`9cb29120 ffff818a`01db5e10 : nt!IopDeleteFile+0x13c
ffffc400`ae71e810 fffff801`06acd3ff : 00000000`00000000 00000000`00000000 ffff818a`01db5e10 ffffb00c`9cb29150 : nt!ObpRemoveObjectRoutine+0x7e
ffffc400`ae71e870 fffff801`06f7315d : 00000000`00000000 ffffb00c`9f8b8610 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0x8f
ffffc400`ae71e8b0 fffff801`06e0f307 : 00000000`00000001 00000000`00000000 ffffc400`ae71e980 fffff801`0746afc0 : nt!MiSegmentDelete+0xf5
ffffc400`ae71e900 fffff801`06ce485d : fffff801`00000000 00000000`00000001 00000000`00000000 fffff801`0746b560 : nt!MiProcessDereferenceList+0x113
ffffc400`ae71e9c0 fffff801`06b08887 : ffffb00c`8c1dd280 ffffb00c`8c1dd280 00000000`00000080 fffff801`06bdae50 : nt!MiDereferenceSegmentThread+0x109a0d
ffffc400`ae71ebf0 fffff801`06c2c214 : ffffe700`a8b11180 ffffb00c`8c1dd280 fffff801`06b08830 00000000`00000000 : nt!PspSystemThreadStartup+0x57
ffffc400`ae71ec40 00000000`00000000 : ffffc400`ae71f000 ffffc400`ae719000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!RtlRbRemoveNode+51f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.675
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 51f
FAILURE_BUCKET_ID: AV_R_(null)_nt!RtlRbRemoveNode
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f2fc99a7-a568-9000-189c-318e268059a1}
Followup: MachineOwner
---------
4: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2594]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends International, LLC.
BiosVersion = B.G0
BiosReleaseDate = 07/26/2022
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7A38
SystemFamily = To be filled by O.E.M.
SystemVersion = 8.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-VDH MAX (MS-7A38)
BaseBoardVersion = 8.0
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000001, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000005, error status (normally i/o status code)
Arg3: ffffa10e364d5080, current process (virtual address for lock type 3, or PTE)
Arg4: ffffdcbffa8b9000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5374
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 15752
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.DumpHeader
Value: 0x7a
Key : Bugcheck.Code.Register
Value: 0x7a
Key : Dump.Attributes.AsUlong
Value: 808
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: KERNEL_DATA_INPAGE_ERROR.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
Kernel Generated Triage Dump
BUGCHECK_CODE: 7a
BUGCHECK_P1: 1
BUGCHECK_P2: ffffffffc0000005
BUGCHECK_P3: ffffa10e364d5080
BUGCHECK_P4: ffffdcbffa8b9000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
BLACKBOXDISK: 1
DISKSEC_ORG_ID:
DISKSEC_MODEL:
DISKSEC_MANUFACTURING_ID:
DISKSEC_ISSUE_DESC_STR:
DISKSEC_TOTAL_SIZE: 0
DISKSEC_REASON: 0
DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 0
DISKSEC_PUBLIC_OFFSET: 0
DISKSEC_PUBLIC_DATA_SIZE: 0
DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 0
DISKSEC_PRIVATE_OFFSET: 0
DISKSEC_PRIVATE_DATA_SIZE: 0
PROCESS_NAME: WmiPrvSE.exe
STACK_TEXT:
fffffd00`dc4d1238 fffff801`63e80693 : 00000000`0000007a 00000000`00000001 ffffffff`c0000005 ffffa10e`364d5080 : nt!KeBugCheckEx
fffffd00`dc4d1240 fffff801`63c5bc6c : 00000000`00000000 fffffd00`dc4d16b0 00000000`00000000 80000000`00000000 : nt!MiGetNextPageTablePte+0x223fe3
fffffd00`dc4d1300 fffff801`63c5beed : ffffdcee`00000000 fffffd00`00000000 00000000`00000001 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x6ac
fffffd00`dc4d1390 fffff801`63c5beed : ffffdcee`00000000 fffffd00`00000000 00000000`00000002 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x92d
fffffd00`dc4d1420 fffff801`63c7efb1 : 00000000`00000000 00000000`00000000 00000000`00000003 ffffa10e`364d5700 : nt!MiWalkPageTablesRecursively+0x92d
fffffd00`dc4d14b0 fffff801`63c4c3b3 : fffffd00`dc4d16b0 ffffdcbf`00000001 00000000`00000002 ffffdcee`00000000 : nt!MiWalkPageTables+0x371
fffffd00`dc4d15b0 fffff801`63c49a75 : 00000000`00000000 fffffd00`00000000 00000000`00000002 00000000`00000000 : nt!MiQueryAddressState+0x293
fffffd00`dc4d17c0 fffff801`640b2167 : fffffd00`dc4d1910 00007ff5`16c98000 ffffa10e`36550000 ffffa10e`365591c0 : nt!MiQueryAddressSpan+0x2a5
fffffd00`dc4d1880 fffff801`640b1a15 : ffff93e7`6b4e96e4 00000000`00000000 00000279`060023e8 00000000`00000000 : nt!MmQueryVirtualMemory+0x737
fffffd00`dc4d1a20 fffff801`63e3aa68 : 00000279`0ad6dbc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
fffffd00`dc4d1a70 00007ffe`f8a8f1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000db`5fc7daa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f8a8f1d4
SYMBOL_NAME: nt!MiGetNextPageTablePte+223fe3
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.608
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 223fe3
FAILURE_BUCKET_ID: 0x7a_c0000005_nt!MiGetNextPageTablePte
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4584103-842d-cac6-0c84-edfb0f8fe0b3}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffcc852b21d080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3030
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11716
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 23
Key : Analysis.Init.CPU.mSec
Value: 249
Key : Analysis.Init.Elapsed.mSec
Value: 13449
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Bugcheck.Code.DumpHeader
Value: 0xef
Key : Bugcheck.Code.Register
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: 25c49040
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: CRITICAL_PROCESS_DIED.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffcc852b21d080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: ffffcc852b21d7c0 -- (.exr 0xffffcc852b21d7c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x25c49040 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
ffffc78d`abed0d48 fffff807`39faf063 : 00000000`000000ef ffffcc85`2b21d080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc78d`abed0d50 fffff807`39ec0215 : ffffcc85`2b21d080 fffff807`3993ce65 00000000`00000002 fffff807`3993cd53 : nt!PspCatchCriticalBreak+0x11b
ffffc78d`abed0de0 fffff807`39d9bdd4 : ffffcc85`2b21d080 00000000`c0000409 ffffcc85`2b21d080 ffffc78d`abed1a00 : nt!PspTerminateAllThreads+0x161d41
ffffc78d`abed0e50 fffff807`39d9bbb0 : ffffffff`ffffffff ffffcc85`2b21d080 ffffcc85`25c49040 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffc78d`abed0e90 fffff807`39a2d278 : ffffc78d`00000e44 ffffcc85`25c49040 ffffcc85`2b21d080 fffff807`39de36a2 : nt!NtTerminateProcess+0xb0
ffffc78d`abed0f10 fffff807`39a1f510 : fffff807`39aae518 ffffffff`ffffffff ffffffff`ffffffff 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
ffffc78d`abed10a8 fffff807`39aae518 : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000001 ffffc78d`abed10e0 : nt!KiServiceLinkage
ffffc78d`abed10b0 fffff807`39a2dd06 : ffffcc85`2b21d7c0 fffff807`3986edc1 00000000`00000000 00007ffa`4a22ba40 : nt!KiDispatchException+0x1a0188
ffffc78d`abed1900 fffff807`39a2bfd2 : ffffcc85`25c49040 000000af`50bfebc0 000000af`50bff3e0 00000000`00000000 : nt!KiFastFailDispatch+0xc6
ffffc78d`abed1ae0 00007ffa`4a22ba78 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x312
000000af`50bfe3d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4a22ba78
SYMBOL_NAME: nt!PspCatchCriticalBreak+11b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.1042
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 11b
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_25c49040_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f54aec41-b9ff-fc4d-24ba-fb42c367a96e}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffffc2013133cf88
Arg3: 8100000284712825
Arg4: ffff8183e98e21c8
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1436
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4756
Key : Analysis.IO.Other.Mb
Value: 3
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 13724
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 808
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 102022-11984-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffffc2013133cf88
BUGCHECK_P3: 8100000284712825
BUGCHECK_P4: ffff8183e98e21c8
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
fffffc88`0a43cf78 fffff803`2ea81bdd : 00000000`0000001a 00000000`00000403 ffffc201`3133cf88 81000002`84712825 : nt!KeBugCheckEx
fffffc88`0a43cf80 fffff803`2e865855 : fffffc88`0a43d320 fffffc88`0a43d2b0 00000262`67800000 fffffc88`0a43d200 : nt!MiDeletePteRun+0x21f90d
fffffc88`0a43d180 fffff803`2e866f4d : ffffc201`3133cff8 00000000`00000000 00000000`00000000 ffffc261`009899e0 : nt!MiDeleteVaTail+0x55
fffffc88`0a43d1b0 fffff803`2e8a1d02 : 00000000`00000000 fffff803`2e8a1ecd fffffc88`0a43d578 ffffe202`f0f0b080 : nt!MiDeletePagablePteRange+0x53d
fffffc88`0a43d4e0 fffff803`2ecae378 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffc88`0a43d5b0 : nt!MiDeleteVirtualAddresses+0x52
fffffc88`0a43d530 fffff803`2ecf4b1e : ffffe202`f04fa080 ffffe202`f5ac8180 ffffe202`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
fffffc88`0a43d5f0 fffff803`2ecf4685 : ffffe202`f46f4010 ffffe202`f46f4010 ffffe202`f46f4010 ffffe202`f04fa080 : nt!MiCleanVad+0x42
fffffc88`0a43d620 fffff803`2ed3f0c1 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe202`f04fa080 : nt!MmCleanProcessAddressSpace+0x10d
fffffc88`0a43d6a0 fffff803`2ec8b464 : ffffe202`f04fa080 ffff8183`e8ad5630 fffffc88`0a43d8c9 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
fffffc88`0a43d730 fffff803`2edc6f48 : ffffe202`000000ff ffff4cb6`99a2c401 ffffe202`f0f0b0f4 00000062`8a008000 : nt!PspExitThread+0x63c
fffffc88`0a43d830 fffff803`2e817b67 : 00000000`00000000 fffff803`2e89c68a fffffc88`0a43d954 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffc88`0a43d870 fffff803`2ea2d1a0 : 00000000`00000001 fffffc88`0a43d930 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x4a7
fffffc88`0a43d930 fffff803`2ea3ab0f : ffffe202`f1b82d00 ffff9d00`f1c51180 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffc88`0a43da70 00007ffe`2e8329c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000062`8bfff858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2e8329c4
SYMBOL_NAME: nt!MiDeletePteRun+21f90d
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.674
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 21f90d
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------