PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a800259a4c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002e560d1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf40e0
fffff8a800259a4c
FAULTING_IP:
nt!MmEnumerateAndReferenceImages+151
fffff800`02e560d1 8b413c mov eax,dword ptr [rcx+3Ch]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: userinit.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880073726c0 -- (.trap 0xfffff880073726c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a000259950 rbx=0000000000000000 rcx=fffff8a800259a10
rdx=fffffa8004a3732b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e560d1 rsp=fffff88007372850 rbp=fffffa8004a374f0
r8=000000000000000c r9=fffffa800365ba00 r10=fffffa800365b148
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MmEnumerateAndReferenceImages+0x151:
fffff800`02e560d1 8b413c mov eax,dword ptr [rcx+3Ch] ds:fffff8a8`00259a4c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b3bb91 to fffff80002abdf00
STACK_TEXT:
fffff880`07372558 fffff800`02b3bb91 : 00000000`00000050 fffff8a8`00259a4c 00000000`00000000 fffff880`073726c0 : nt!KeBugCheckEx
fffff880`07372560 fffff800`02abbfee : 00000000`00000000 fffffa80`05b25ae0 fffff800`02c4b800 fffffa80`05dee000 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`073726c0 fffff800`02e560d1 : 00000000`00000001 fffffa80`05b25ae0 00000000`0000010e 00000000`000007ff : nt!KiPageFault+0x16e
fffff880`07372850 fffff800`02d18958 : fffffa80`05b2db30 fffff880`07372940 00000000`00000000 00000000`000007e4 : nt!MmEnumerateAndReferenceImages+0x151
fffff880`073728d0 fffff800`02d799c2 : fffffa80`05b2db30 00000000`00000000 fffffa80`05b25ae0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x212a9
fffff880`07372a70 fffff800`02da06eb : 000007ff`fffde000 00000000`00000001 00000000`00000000 fffffa80`053f5910 : nt!PspExitProcess+0x4e
fffff880`07372ad0 fffff800`02d79cb8 : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x3bb
fffff880`07372ba0 fffff800`02abd153 : fffffa80`05b2db30 fffff880`00000000 fffffa80`05b25ae0 00000000`00000000 : nt!NtTerminateProcess+0x138
fffff880`07372c20 00000000`77b0017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0026f728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b0017a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmEnumerateAndReferenceImages+151
fffff800`02e560d1 8b413c mov eax,dword ptr [rcx+3Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MmEnumerateAndReferenceImages+151
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MmEnumerateAndReferenceImages+151
BUCKET_ID: X64_0x50_nt!MmEnumerateAndReferenceImages+151
Followup: MachineOwner
---------