1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbd894cf7e800, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8065a408a04, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
    Key  : AV.Type
    Value: Write
    Key  : Analysis.CPU.mSec
    Value: 3952
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 22883
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 405
    Key  : Analysis.Init.Elapsed.mSec
    Value: 8115
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50
    Key  : Bugcheck.Code.Register
    Value: 0x50
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
FILE_IN_CAB:  061123-18625-01.dmp
BUGCHECK_CODE:  50
BUGCHECK_P1: ffffbd894cf7e800
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8065a408a04
BUGCHECK_P4: 2
READ_ADDRESS: fffff8065aefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffbd894cf7e800
MM_INTERNAL_CODE:  2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  ffff9309171ccf80 -- (.trap 0xffff9309171ccf80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffbd894cf7e830
rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8065a408a04 rsp=ffff9309171cd110 rbp=ffffbf8948a965e0
 r8=ffff9309171cd190  r9=7fffbf895176d5c8 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ObfReferenceObjectWithTag+0x24:
fffff806`5a408a04 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope
STACK_TEXT: 
ffff9309`171cccd8 fffff806`5a64ac53     : 00000000`00000050 ffffbd89`4cf7e800 00000000`00000002 ffff9309`171ccf80 : nt!KeBugCheckEx
ffff9309`171ccce0 fffff806`5a46e7b0     : ffffbf89`51000000 00000000`00000002 ffff9309`171cd000 00000000`00000000 : nt!MiSystemFault+0x1b2273
ffff9309`171ccde0 fffff806`5a60b7d8     : 00000000`000004b8 ffff9309`171cd018 ffffbf89`51b03000 00000000`00001001 : nt!MmAccessFault+0x400
ffff9309`171ccf80 fffff806`5a408a04     : 00000000`00001000 ffffbf89`48b57b30 ffffbf89`4a453690 fffff806`5a420ceb : nt!KiPageFault+0x358
ffff9309`171cd110 fffff806`5a409844     : ffffbd89`4cf7e830 ffffbf89`48b97260 ffffbf89`48b97260 ffffe180`d3541d00 : nt!ObfReferenceObjectWithTag+0x24
ffff9309`171cd150 fffff806`5a448044     : ffffbf89`5176d4c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObFastReferenceObjectLocked+0x1c
ffff9309`171cd180 fffff806`5a44801a     : ffffbf89`48b97260 ffffbf89`5176d4b0 ffffbf89`5176d4b0 ffffbf89`5176d4c0 : nt!CcSlowReferenceSharedCacheMapFileObject+0x20
ffff9309`171cd1b0 fffff806`5a49cd4d     : ffffbf89`48b57b30 ffffbf89`51d367b0 ffffbf89`00000000 ffffbf89`00000000 : nt!CcReferenceSharedCacheMapFileObject+0x26
ffff9309`171cd1e0 fffff806`5a53b955     : ffffbf89`48b57b30 ffff9309`171cd330 ffff9309`00001000 00000001`0a49cc32 : nt!CcGetDirtyPagesHelper+0x11d
ffff9309`171cd2d0 fffff806`5a53b88f     : ffffbf89`4a40c5a8 ffff9309`171cda80 ffff9309`171cda00 00000001`0a5deef6 : nt!CcForEachPartition+0xb5
ffff9309`171cd310 fffff806`5c5e7f22     : ffffbf89`4a40c5a8 ffff9309`171cda00 00000001`0a5deef6 ffffbf89`4a40c5a8 : nt!CcGetDirtyPages+0x2f
ffff9309`171cd370 fffff806`5c60c642     : 00000000`00000000 ffff9309`171ce000 01d99c5c`f6520f00 ffffbf89`4a40c100 : Ntfs!NtfsCheckpointVolume+0x5e2
ffff9309`171cd870 fffff806`5c60b14d     : ffff9309`171cda10 ffffbf89`4a40c180 ffff9309`171cd9c0 01d99c5c`f6520f01 : Ntfs!NtfsCheckpointAllVolumesWorker+0xe2
ffff9309`171cd8d0 fffff806`5c60a6ae     : ffff9309`171cda10 00000000`00000000 00000000`00000000 fffff806`5c60c560 : Ntfs!NtfsForEachVcb+0x201
ffff9309`171cd980 fffff806`5a48e5c5     : ffffbf89`4a453040 ffffbf89`4a453040 ffffbf89`48a806a0 fffff806`5c5952b0 : Ntfs!NtfsCheckpointAllVolumes+0x1ee
ffff9309`171cdcb0 fffff806`5a5265f5     : ffffbf89`4a453040 00000000`00000080 ffffbf89`48a7c080 00018000`a91b3ffe : nt!ExpWorkerThread+0x105
ffff9309`171cdd50 fffff806`5a6048d8     : ffff9b81`77580180 ffffbf89`4a453040 fffff806`5a5265a0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9309`171cdda0 00000000`00000000     : ffff9309`171ce000 ffff9309`171c8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME:  nt!ObfReferenceObjectWithTag+24
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.2965
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  24
FAILURE_BUCKET_ID:  AV_W_(null)_nt!ObfReferenceObjectWithTag
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {394d19ec-4517-867a-8907-1b617d1d34f0}
Followup:     MachineOwner
---------