Happened while using RichCopy to copy over data to the drives:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800a7ffffe, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004b167d5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Failed calling InternetOpenUrl, GLE=12029
READ_ADDRESS: fffffa800a7ffffe Nonpaged pool
FAULTING_IP:
covefs+167d5
fffff880`04b167d5 0fb70448 movzx eax,word ptr [rax+rcx*2]
MM_INTERNAL_CODE: 0
IMAGE_NAME: covefs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4f10ce9d
MODULE_NAME: covefs
FAULTING_MODULE: fffff88004b00000 covefs
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: RichCopy64.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800f5b2670 -- (.trap 0xfffff8800f5b2670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a7f80aa rbx=0000000000000000 rcx=0000000000003faa
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004b167d5 rsp=fffff8800f5b2800 rbp=fffffa80084c16d0
r8=0000000000000001 r9=0000000000000002 r10=fffffa80084c16d0
r11=fffffa8009841b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
covefs+0x167d5:
fffff880`04b167d5 0fb70448 movzx eax,word ptr [rax+rcx*2] ds:fffffa80`0a7ffffe=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800016469fc to fffff8000169ac40
STACK_TEXT:
fffff880`0f5b2508 fffff800`016469fc : 00000000`00000050 fffffa80`0a7ffffe 00000000`00000000 fffff880`0f5b2670 : nt!KeBugCheckEx [d:\win7sp1_gdr\minkernel\ntos\ke\amd64\procstat.asm @ 177] fffff880`0f5b2510 fffff800`01698d6e : 00000000`00000000 fffffa80`0a7ffffe fffffa80`06716500 fffffa80`089b2460 : nt!MmAccessFault+0xffffffff`fff9ee3c
fffff880`0f5b2670 fffff880`04b167d5 : 00003faa`00007ff6 fffffa80`0e1d9f00 fffff8a0`06c7b410 fffff880`04b0ce51 : nt!KiPageFault+0x16e [d:\win7sp1_gdr\minkernel\ntos\ke\amd64\trap.asm @ 932] fffff880`0f5b2800 fffff880`04b16918 : fffffa80`09977940 fffff880`0f5b2860 fffff880`0f5b28b0 fffff800`01696470 : covefs+0x167d5
fffff880`0f5b2840 fffff880`04b1ff6a : fffffa80`09977940 fffffa80`089b2460 00000000`00000000 00000000`00000000 : covefs+0x16918 fffff880`0f5b2890 fffff880`0132d6af : fffffa80`089b4b90 fffffa80`0a2b61c0 00000000`00000000 fffffa80`098875b0 : covefs+0x1ff6a
fffff880`0f5b29d0 fffff800`019a2a0f : fffffa80`0a2b61c0 fffffa80`084c16d0 00000000`00000000 fffffa80`098875b0 : fltmgr!FltpDispatch+0x9f [d:\w7rtm\minkernel\fs\filtermgr\filter\fltmgr.c @ 4312] fffff880`0f5b2a30 fffff800`01992174 : 00000000`00000000 fffffa80`084c16d0 00000000`00000101 fffffa80`098875b0 : nt!IopCloseFile+0x11f [d:\win7sp1_gdr\minkernel\ntos\io\iomgr\objsup.c @ 601]
fffff880`0f5b2ac0 fffff800`01991f31 : fffffa80`084c16d0 fffffa80`00000001 fffff8a0`06c7b410 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4 [d:\win7sp1_gdr\minkernel\ntos\ob\obhandle.c @ 3125] fffff880`0f5b2b40 fffff800`019924f4 : 00000000`00000a98 fffffa80`084c16d0 fffff8a0`06c7b410 00000000`00000a98 : nt!ObpCloseHandleTableEntry+0xb1 [d:\win7sp1_gdr\minkernel\ntos\ob\obclose.c @ 203]
fffff880`0f5b2bd0 fffff800`01699ed3 : fffffa80`09841b60 fffff880`0f5b2ca0 00000000`042fe9f8 fffffa80`00000000 : nt!ObpCloseHandle+0x94 [d:\win7sp1_gdr\minkernel\ntos\ob\obclose.c @ 378] fffff880`0f5b2c20 00000000`77ac140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 [d:\win7sp1_gdr\minkernel\ntos\ke\amd64\trap.asm @ 2072]
00000000`0b586948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ac140a
Can provide the MEMORY.DMP if needed.