*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800266cecb, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002c8bd3b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
PEB is paged out (Peb.Ldr = 00000000`fffdf01
. Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 00000000`fffdf01
. Type ".hh dbgerr001" for details
READ_ADDRESS: fffffa800266cecb
FAULTING_IP:
nt!MiAgeWorkingSet+41b
fffff800`02c8bd3b 410fb65f1b movzx ebx,byte ptr [r15+1Bh]
MM_INTERNAL_CODE: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: ShippingPC-BmG
CURRENT_IRQL: 0
TRAP_FRAME: fffff880033167a0 -- (.trap 0xfffff880033167a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000058000000000 rbx=0000000000000000 rcx=fffff68000275ac8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c8bd3b rsp=fffff88003316930 rbp=0000000000275acc
r8=0000000000000001 r9=fffffa800401cd78 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiAgeWorkingSet+0x41b:
fffff800`02c8bd3b 410fb65f1b movzx ebx,byte ptr [r15+1Bh] ds:372e:001b=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cf5bc2 to fffff80002c77f00
STACK_TEXT:
fffff880`03316638 fffff800`02cf5bc2 : 00000000`00000050 fffffa80`0266cecb 00000000`00000000 fffff880`033167a0 : nt!KeBugCheckEx
fffff880`03316640 fffff800`02c75fee : 00000000`00000000 e4000000`ccef9847 00000000`00001000 fffff800`02daabfe : nt! ?? ::FNODOBFM::`string'+0x40f90
fffff880`033167a0 fffff800`02c8bd3b : 00000003`00000000 e2900001`38181867 00000000`00000000 00000000`00035e29 : nt!KiPageFault+0x16e
fffff880`03316930 fffff800`02cf8a0e : fffffa80`0401cd78 fffff880`00000001 00000000`00000001 fffff880`03316bb0 : nt!MiAgeWorkingSet+0x41b
fffff880`03316ae0 fffff800`02c8c6e2 : 00000000`00001a9b 00000000`00000000 fffffa80`00000000 00000000`00000008 : nt! ?? ::FNODOBFM::`string'+0x49926
fffff880`03316b80 fffff800`02c8c96f : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03316bd0 fffff800`02f1b166 : fffffa80`03cf5680 00000000`00000080 fffffa80`03cd1040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03316d40 fffff800`02c56486 : fffff880`02f63180 fffffa80`03cf5680 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03316d80 00000000`00000000 : fffff880`03317000 fffff880`03311000 fffff880`03316710 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+41b
fffff800`02c8bd3b 410fb65f1b movzx ebx,byte ptr [r15+1Bh]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+41b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+41b
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+41b
Followup: MachineOwner
---------