An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88008ad85bb, address which referenced memory
fffff880`08ad85bb 49 dec ecx
LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000000000000
Your !analyze does not contain enough call stack data, and no OS version. maybe you do not have correct symbols.
Try to send your dump here and post the decode *in a suitable forum*. This is not a right forum for your issue.