I am getting this on the windows debugger any help would be appreciated.
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Dump completed successfully, progress percentage: 100
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff8041d400000 PsLoadedModuleList = 0xfffff804
1e0297b0
Debug session time: Sun Sep 4 17:48:12.975 2022 (UTC - 5:00)
System Uptime: 0 days 0:08:15.609
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000005c55d51018). Type ".hh dbgerr001" for details Loading unloaded module list .......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff804
1d81acf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc03`c3cca3a0=0000000000000050
11: kd> !analyze -v
**
Bugcheck Analysis
**
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8041db3d456, memory referenced.
Arg2: 0000000000000003, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8041d68cd46, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2890
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4445
Key : Analysis.Init.CPU.mSec
Value: 937
Key : Analysis.Init.Elapsed.mSec
Value: 18096
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.KiBugCheckData
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 1000
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff8041db3d456
BUGCHECK_P2: 3
BUGCHECK_P3: fffff8041d68cd46
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8041db3d456
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Dell.TechHub.Instrumentation.SubAgent.exe
TRAP_FRAME: fffffc03c3cca640 -- (.trap 0xfffffc03c3cca640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8041db3d486 rbx=0000000000000000 rcx=fffff8041db3d486
rdx=ffffc6090ed8dae0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041d68cd46 rsp=fffffc03c3cca7d0 rbp=fffffc03c3ccab60
r8=d707962d36b0fffe r9=fffff8041d400000 r10=0000fffff8041d00
r11=ffffd7079a311b40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfDereferenceObject+0x26:
fffff8041d68cd46 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff
ffffffd0=????????????????
Resetting default scope
STACK_TEXT:
fffffc03c3cca398 fffff804
1d8ad7d9 : 0000000000000050 fffff804
1db3d456 0000000000000003 fffffc03
c3cca640 : nt!KeBugCheckEx
fffffc03c3cca3a0 fffff804
1d6ae096 : 0000000000000000 00000000
00000003 fffffc03c3cca5a0 00000000
00000000 : nt!MiSystemFault+0x1c8c09
fffffc03c3cca4a0 fffff804
1d8299f5 : 0000000001d961d8 ffffc609
24370080 0000000000000000 fffff804
1db28939 : nt!MmAccessFault+0x2a6
fffffc03c3cca640 fffff804
1d68cd46 : ffffc6090ed8dae0 fffff804
1deaf001 00000000746c6644 fffffc03
c3cca800 : nt!KiPageFault+0x335
fffffc03c3cca7d0 fffff804
1db3d799 : 00000000c0000008 0000005c
56b7d8d8 0000000000000000 00000000
00000000 : nt!ObfDereferenceObject+0x26
fffffc03c3cca810 fffff804
1d82d378 : 000001d9614a45e0 0000005c
56b7dd68 0000000000000001 00000000
000014e0 : nt!NtQueryKey+0x449
fffffc03c3ccaa70 00007ff9
b2303e44 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005c56b7d858 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ff9`b2303e44
SYMBOL_NAME: nt!MiSystemFault+1c8c09
MODULE_NAME: nt
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1c8c09
FAILURE_BUCKET_ID: AV_W_(null)_nt!MiSystemFault
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {66411fc0-2fe2-a1a3-7539-3b3fcf286ba7}
Followup: MachineOwner
---------