Here MEMORY.DMP https://drive.google.com/file/d/1FT8yHjQU_BNsWqgO9fk1jmdfQGYXyKPp/view?usp=sharing
and my debug output
-------------------------------------------------------------------------------------------------------------------------------------------
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\staim\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*c:\cache*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*c:\cache*https://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`05600000 PsLoadedModuleList = 0xfffff806`0622a250
Debug session time: Wed May 13 20:00:51.572 2020 (UTC + 2:00)
System Uptime: 0 days 0:00:11.284
Loading Kernel Symbols
...............................................................
....Page 103f3a not present in the dump file. Type ".hh dbgerr004" for details
............................................................
.....................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff806ee1a6800, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806059bc451, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-4MKPM3M
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff806ee1a6800
BUGCHECK_P2: 0
BUGCHECK_P3: fffff806059bc451
BUGCHECK_P4: 2
READ_ADDRESS: fffff806ee1a6800
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
PROCESS_NAME: System
TRAP_FRAME: ffffe406b7a92480 -- (.trap 0xffffe406b7a92480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff806ee1a6800 rbx=0000000000000000 rcx=000007f911e59800
rdx=00000000bd48675b rsi=0000000000000000 rdi=0000000000000000
rip=fffff806059bc451 rsp=ffffe406b7a92618 rbp=ffffe406b7a92650
r8=7efefefefefefeff r9=0000000000000000 r10=000000009e3779b9
r11=8101010101010100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!strlen+0x31:
fffff806`059bc451 488b10 mov rdx,qword ptr [rax] ds:fffff806`ee1a6800=????????????????
Resetting default scope
STACK_TEXT:
ffffe406`b7a921d8 fffff806`05a35c1d : 00000000`00000050 fffff806`ee1a6800 00000000`00000000 ffffe406`b7a92480 : nt!KeBugCheckEx
ffffe406`b7a921e0 fffff806`05812ce0 : 00000000`00000000 00000000`00000000 ffffe406`b7a92500 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffffe406`b7a922e0 fffff806`059ebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffe406`b7a92480 fffff806`059bc451 : fffff806`0d15b558 00000014`db520f40 00000000`00000000 ffffcf7c`0302bfc0 : nt!KiPageFault+0x35e
ffffe406`b7a92618 fffff806`0d15b558 : 00000014`db520f40 00000000`00000000 ffffcf7c`0302bfc0 ffffcf67`be018158 : nt!strlen+0x31
ffffe406`b7a92620 fffff806`0d10ff7e : 00000000`00000000 4e932dcf`4e932dcf 00000000`00000001 ffffe406`b7a92898 : aksfridge+0x5b558
ffffe406`b7a926a0 fffff806`0d1100c3 : ffffffff`8000233c ffffd30b`00000000 00000000`06b88057 fffff806`05d4315c : aksfridge+0xff7e
ffffe406`b7a926e0 fffff806`0d11f055 : ffffd30b`0b2a3460 00000000`000000df fffff806`0d17b000 00000000`00000002 : aksfridge+0x100c3
ffffe406`b7a92740 fffff806`05d5f164 : ffff8186`b19ad000 00000000`00000000 ffff8186`00000002 ffffe406`b7a92928 : aksfridge+0x1f055
ffffe406`b7a92900 fffff806`05d2a6c9 : 00000000`00000014 00000000`00000000 00000000`00000000 00000000`00001000 : nt!PnpCallDriverEntry+0x4c
ffffe406`b7a92960 fffff806`05d6fd67 : 00000000`00000000 00000000`00000000 fffff806`06324440 ffff8186`a9cc0b00 : nt!IopLoadDriver+0x4e5
ffffe406`b7a92b30 fffff806`05833f25 : ffff8186`00000000 ffffffff`8000233c ffff8186`a9ccd140 ffff8186`00000000 : nt!IopLoadUnloadDriver+0x57
ffffe406`b7a92b70 fffff806`05946715 : ffff8186`a9ccd140 00000000`00000080 ffff8186`a9c93040 8993c9a6`c6d01f33 : nt!ExpWorkerThread+0x105
ffffe406`b7a92c10 fffff806`059e5078 : fffff806`00566180 ffff8186`a9ccd140 fffff806`059466c0 91cd2f70`4fb6536d : nt!PspSystemThreadStartup+0x55
ffffe406`b7a92c60 00000000`00000000 : ffffe406`b7a93000 ffffe406`b7a8d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: aksfridge+5b558
MODULE_NAME: aksfridge
IMAGE_NAME: aksfridge.sys
IMAGE_VERSION: 1.77.3441.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5b558
FAILURE_BUCKET_ID: AV_R_INVALID_aksfridge!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7970908d-bb77-adf6-e29e-9053eb9e30e3}
Followup: MachineOwner
---------