Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\031223-8421-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff806`6ce00000 PsLoadedModuleList = 0xfffff806`6da13430 Debug session time: Sun Mar 12 16:44:54.521 2023 (UTC - 5:00) System Uptime: 0 days 0:27:10.238 Loading Kernel Symbols ............................................................... ................................................................ ............................................................ Loading User Symbols Loading unloaded module list ........... For analysis of this file, run !analyze -v 14: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffffffffffa98, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8066d023ddb, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Type Value: Read Key : Analysis.CPU.mSec Value: 1093 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 3106 Key : Analysis.Init.CPU.mSec Value: 249 Key : Analysis.Init.Elapsed.mSec Value: 95516 Key : Analysis.Memory.CommitPeak.Mb Value: 96 FILE_IN_CAB: 031223-8421-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x808 Kernel Generated Triage Dump BUGCHECK_CODE: 50 BUGCHECK_P1: fffffffffffffa98 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8066d023ddb BUGCHECK_P4: 2 READ_ADDRESS: fffff8066db1c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse fffffffffffffa98 MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: AsusCertServic TRAP_FRAME: ffffda86c1f9e360 -- (.trap 0xffffda86c1f9e360) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffffffffffa98 rdx=000000006e457350 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8066d023ddb rsp=ffffda86c1f9e4f0 rbp=ffffda86c1f9f420 r8=0000000000000000 r9=7ffffffffffffffc r10=00000000ffffffff r11=0000000000002120 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe cy nt!ObReferenceObjectSafeWithTag+0xb: fffff806`6d023ddb 488b01 mov rax,qword ptr [rcx] ds:ffffffff`fffffa98=???????????????? Resetting default scope STACK_TEXT: ffffda86`c1f9e138 fffff806`6d281dbb : 00000000`00000050 ffffffff`fffffa98 00000000`00000000 ffffda86`c1f9e360 : nt!KeBugCheckEx ffffda86`c1f9e140 fffff806`6d05766c : ffffb805`864023b9 00000000`00000000 ffffda86`c1f9e2f9 00000000`00000000 : nt!MiSystemFault+0x22d66b ffffda86`c1f9e240 fffff806`6d239f29 : 00000000`00000000 00000000`00000090 00000000`00000000 00000000`00d00090 : nt!MmAccessFault+0x29c ffffda86`c1f9e360 fffff806`6d023ddb : 00000000`02b278a8 00000000`00000000 ffffb805`95d404b8 00000000`00000000 : nt!KiPageFault+0x369 ffffda86`c1f9e4f0 fffff806`6d4ab092 : ffffda86`c1f9f420 ffffb805`00000000 ffffb805`9473e5b8 00000000`00000090 : nt!ObReferenceObjectSafeWithTag+0xb ffffda86`c1f9e520 fffff806`6d4ba895 : 00000000`00000000 00000000`00010400 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x682 ffffda86`c1f9eb30 fffff806`6d4b9a69 : ffffb805`944cc080 fffff806`6d4d1a70 00000000`00e58000 00000000`01470000 : nt!ExpQuerySystemInformation+0xcf5 ffffda86`c1f9f360 fffff806`6d23e0e5 : ffffb805`944c0000 ffffb805`92ef5080 ffffffff`ff676980 00000000`00000000 : nt!NtQuerySystemInformation+0x79 ffffda86`c1f9f3a0 00007ff9`c4d4f314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000000`01d0dd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c4d4f314 SYMBOL_NAME: nt!ObReferenceObjectSafeWithTag+b MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.1344 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: b FAILURE_BUCKET_ID: AV_R_(null)_nt!ObReferenceObjectSafeWithTag OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2389c295-bfc4-1483-3bcc-a71c3102cb1e} Followup: MachineOwner ---------