*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80000000000, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff80000000000
BUGCHECK_P2: 10
BUGCHECK_P3: fffff80000000000
BUGCHECK_P4: 2
READ_ADDRESS: fffff80056f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80000000000
FAULTING_IP:
+0
fffff800`00000000 ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: fgpack2.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-01-2019 13:19:13.0254
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffffa0ae0b6b370 -- (.trap 0xfffffa0ae0b6b370)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80000000000 rbx=0000000000000000 rcx=ffff8004eec32440
rdx=ffff910182b3ad20 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000000000 rsp=fffffa0ae0b6b508 rbp=fffffa0ae0b6b610
r8=ffff9101914dd460 r9=0000000000000001 r10=0000000000000000
r11=ffffb0fc81800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff800`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80056be35d6 to fffff80056bc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`00000000 ?? ???
STACK_TEXT:
fffffa0a`e0b6b0c8 fffff800`56be35d6 : 00000000`00000050 fffff800`00000000 00000000`00000010 fffffa0a`e0b6b370 : nt!KeBugCheckEx
fffffa0a`e0b6b0d0 fffff800`56a72eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff800`00000000 : nt!MiSystemFault+0x1d6866
fffffa0a`e0b6b1d0 fffff800`56bcf520 : fffffa0a`c0000022 00000000`00000000 ffff9101`914dd620 00002000`00000001 : nt!MmAccessFault+0x34f
fffffa0a`e0b6b370 fffff800`00000000 : fffff800`56fed1bf fffff800`00000000 ffff8004`eec32410 ffff9101`00000000 : nt!KiPageFault+0x360
fffffa0a`e0b6b508 fffff800`56fed1bf : fffff800`00000000 ffff8004`eec32410 ffff9101`00000000 00000000`00000010 : 0xfffff800`00000000
fffffa0a`e0b6b510 fffff800`56feb621 : ffff9101`914dd400 fffffa0a`e0b6b758 00000000`00000040 ffff9101`82b3ad20 : nt!ObpLookupObjectName+0x78f
fffffa0a`e0b6b6d0 fffff800`56ff4b3c : fffffa0a`00000001 00000000`00000000 00000000`00000000 ffff9101`82b3ad20 : nt!ObOpenObjectByNameEx+0x201
fffffa0a`e0b6b810 fffff800`56ff49bd : 00000000`0009e598 fffffa0a`e0b6bb80 00000000`00000001 fffffa0a`e0b6b998 : nt!ObOpenObjectByName+0x5c
fffffa0a`e0b6b860 fffff800`56ff69df : 00000000`77d13620 00000000`0009fda0 00000000`0009eed0 00000000`0019f8c0 : nt!CmOpenKey+0x29d
fffffa0a`e0b6bac0 fffff800`56bd2d18 : 00000000`00000000 fffffa0a`e0b6bb80 00000000`0019f950 ffff9101`8f5d2ee0 : nt!NtOpenKeyEx+0xf
fffffa0a`e0b6bb00 00007ffd`6a2de414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6a2de414
THREAD_SHA1_HASH_MOD_FUNC: ed08aa3c55ca82ea377f3bb8c25bb1adc1209451
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 03d537f58f9da033731eab3080b47273fa3b2972
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff800`56be35d6 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+1d6866
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d6866
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault
TARGET_TIME: 2019-11-30T19:51:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 22ed
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault
FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8000a5465c5, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000004, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8000a5465c5
BUGCHECK_P3: 0
BUGCHECK_P4: 4
READ_ADDRESS: fffff80005d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000004
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
Ntfs!NtfsFsdRead+3b5
fffff800`0a5465c5 817b044e544653 cmp dword ptr [rbx+4],5346544Eh
EXCEPTION_PARAMETER2: 0000000000000004
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: fgpack2.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-01-2019 13:19:19.0915
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffffe4f2793c9000 -- (.exr 0xffffe4f2793c9000)
ExceptionAddress: 0000000000000000
ExceptionCode: ae2cc867
ExceptionFlags: 0a000003
NumberParameters: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff80005a2ff43 to fffff800059c14e0
STACK_TEXT:
ffffb30a`5dd08b58 fffff800`05a2ff43 : 00000000`0000001e ffffffff`c0000005 fffff800`0a5465c5 00000000`00000000 : nt!KeBugCheckEx
ffffb30a`5dd08b60 fffff800`059d341d : ffffe4f2`793c9000 ffffb30a`5dd093f0 ffff8000`00000000 00000000`00000004 : nt!KiDispatchException+0x168753
ffffb30a`5dd09210 fffff800`059cf605 : 00000000`00000000 ffffb30a`5dd095a8 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0x11d
ffffb30a`5dd093f0 fffff800`0a5465c5 : 00000001`00000000 00000019`00000002 ffffa103`06b29090 00000000`00000000 : nt!KiPageFault+0x445
ffffb30a`5dd09580 fffff800`05831f79 : ffffa103`48e0fad0 ffffa103`0b38a6d0 ffffa103`0b38aa70 ffffffff`ffffff00 : Ntfs!NtfsFsdRead+0x3b5
ffffb30a`5dd09640 fffff800`09ae55de : 00000000`00000000 ffffb30a`5dd09720 ffffa103`0b38a6d0 ffffb30a`5dd09730 : nt!IofCallDriver+0x59
ffffb30a`5dd09680 fffff800`09ae3f16 : ffffb30a`5dd09720 fffff800`0587a4a8 ffffb30a`5dd09801 ffffd30a`0d6ecdb8 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffb30a`5dd09700 fffff800`05831f79 : ffffa103`0b38a6d0 fffff800`0585463b 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xb6
ffffb30a`5dd09760 fffff800`05854223 : 00000000`00000005 ffffa103`0b38a6d0 ffffa103`0f9fdbb0 ffffa103`0f9fdc70 : nt!IofCallDriver+0x59
ffffb30a`5dd097a0 fffff800`0588e055 : ffffa103`0f9fdb60 00000000`00000000 ffffa103`0f9fdbc0 ffffa103`0f9fdb80 : nt!IoPageReadEx+0x1d3
ffffb30a`5dd09810 fffff800`0588d7a9 : 00000000`00000003 ffffb30a`5dd098f0 ffffb30a`5dd09a58 fffff800`05874ef6 : nt!MiIssueHardFaultIo+0xc1
ffffb30a`5dd09860 fffff800`05872fab : 00000000`c0033333 00000000`00000001 00007ffa`1fc312a0 00000000`00000000 : nt!MiIssueHardFault+0x489
ffffb30a`5dd09960 fffff800`059cf520 : ffffa103`0d9f0080 00000000`00000001 00000000`0022a000 00000000`00000000 : nt!MmAccessFault+0x40b
ffffb30a`5dd09b00 00007ffa`1fc312a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`0009e758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1fc312a0
THREAD_SHA1_HASH_MOD_FUNC: 77e929527fc62b1f9be33858d97c39233eeb0177
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 79edf94465d0597b5627d14acb0b120380c2a32d
THREAD_SHA1_HASH_MOD: 2d85234c457c8450211fa190d46db637fbd1d046
FOLLOWUP_IP:
Ntfs!NtfsFsdRead+3b5
fffff800`0a5465c5 817b044e544653 cmp dword ptr [rbx+4],5346544Eh
FAULT_INSTR_CODE: 4e047b81
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Ntfs!NtfsFsdRead+3b5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 18633ece
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3b5
FAILURE_BUCKET_ID: 0x1E_c0000005_R_Ntfs!NtfsFsdRead
BUCKET_ID: 0x1E_c0000005_R_Ntfs!NtfsFsdRead
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_Ntfs!NtfsFsdRead
TARGET_TIME: 2019-11-28T06:44:32.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7789
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_ntfs!ntfsfsdread
FAILURE_ID_HASH: {4639139c-5fb2-903f-4bad-de015fb311af}
Followup: MachineOwner
---------