*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8501848139d8, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80651c95147, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : AV.Type
    Value: Read
    Key  : Analysis.CPU.mSec
    Value: 1780
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 11087
    Key  : Analysis.IO.Other.Mb
    Value: 15
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 20
    Key  : Analysis.Init.CPU.mSec
    Value: 217
    Key  : Analysis.Init.Elapsed.mSec
    Value: 159243
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 155
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50
    Key  : Bugcheck.Code.Register
    Value: 0x50
    Key  : Dump.Attributes.AsUlong
    Value: 1808
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
FILE_IN_CAB:  050823-17515-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump
BUGCHECK_CODE:  50
BUGCHECK_P1: ffff8501848139d8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80651c95147
BUGCHECK_P4: 2
READ_ADDRESS: fffff8065231c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8501848139d8
MM_INTERNAL_CODE:  2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  WerFault.exe
TRAP_FRAME:  ffffe481327b7440 -- (.trap 0xffffe481327b7440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fff80017cf5c880 rbx=0000000000000000 rcx=7ffffffffffffffc
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80651c95147 rsp=ffffe481327b75d0 rbp=000000000000000b
 r8=0000000000000000  r9=8001aac1ca900000 r10=0000000000000d4b
r11=00000000ffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ExpAllocateHandleTableEntry+0x7b:
fffff806`51c95147 488b4708        mov     rax,qword ptr [rdi+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
ffffe481`327b7218 fffff806`51aa4d81     : 00000000`00000050 ffff8501`848139d8 00000000`00000000 ffffe481`327b7440 : nt!KeBugCheckEx
ffffe481`327b7220 fffff806`518eb4dc     : 001f0001`00000000 00000000`00000000 ffffe481`327b73d9 00000000`00000000 : nt!MiSystemFault+0x1bc7c1
ffffe481`327b7320 fffff806`51a39f29     : ffffd180`b2982810 00000000`00000000 ffffe481`327b7678 fffff806`518426dc : nt!MmAccessFault+0x29c
ffffe481`327b7440 fffff806`51c95147     : ffff8001`7cf5c580 ffffba0e`00000000 00000000`00000000 ffff8001`7cf5c880 : nt!KiPageFault+0x369
ffffe481`327b75d0 fffff806`51c95062     : ffffba0e`00000010 ffff8001`aac1ca60 ffffe481`327b7650 ffff8001`8f01b568 : nt!ExpAllocateHandleTableEntry+0x7b
ffffe481`327b7620 fffff806`51de4f4b     : ffff8001`aac1ca60 00000000`00000000 ffff8001`8f01b568 ffffe481`327b7890 : nt!ExCreateHandleEx+0x6a
ffffe481`327b7670 fffff806`51cb6388     : fffff806`51601800 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpAllocateMessageFunction+0x4b
ffffe481`327b76b0 fffff806`51d22ee5     : ffff4c3f`00000603 ffffe481`327b7770 ffffba0e`94402a00 ffffba0e`a48c8b00 : nt!AlpcpAllocateBlob+0xb8
ffffe481`327b76e0 fffff806`51d23620     : ffffba0e`94402ad0 ffffe481`327b7770 ffffba0e`a48c8ca0 ffffba0e`a48c8ca0 : nt!AlpcpAllocateMessage+0x41
ffffe481`327b7710 fffff806`51d231ee     : ffffe481`327b7830 ffffe481`327b7818 ffffe481`00020000 ffffffec`7faa1db0 : nt!AlpcpCreateClientPort+0x2d0
ffffe481`327b77b0 fffff806`51d21830     : 00000000`00000000 00000000`00000000 00007fff`76c732ec 00000000`00000014 : nt!AlpcpConnectPort+0x272
ffffe481`327b7930 fffff806`51a3e0e5     : ffffffff`fffffffa ffffba0e`86835080 00000013`8055dfd8 00000013`8055df38 : nt!NtAlpcConnectPortEx+0x70
ffffe481`327b79b0 00007fff`7884fb84     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000013`8055e128 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`7884fb84
SYMBOL_NAME:  nt!ExpAllocateHandleTableEntry+7b
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.1555
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  7b
FAILURE_BUCKET_ID:  AV_R_(null)_nt!ExpAllocateHandleTableEntry
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {057ca722-8246-3c91-57a3-2501ef38bce9}
Followup:     MachineOwner
---------