PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff98c686a3f388, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff9897375cfca8, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER:  LENOVO
SYSTEM_PRODUCT_NAME:  81AX
SYSTEM_SKU:  LENOVO_MT_81AX_BU_idea_FM_V330-15IKB
SYSTEM_VERSION:  Lenovo V330-15IKB
BIOS_VENDOR:  LENOVO
BIOS_VERSION:  6SCN40WW
BIOS_DATE:  11/01/2018
BASEBOARD_MANUFACTURER:  LENOVO
BASEBOARD_PRODUCT:  LNVNB161216
BASEBOARD_VERSION:  NO DPK
DUMP_TYPE:  2
BUGCHECK_P1: ffff98c686a3f388
BUGCHECK_P2: 0
BUGCHECK_P3: ffff9897375cfca8
BUGCHECK_P4: 2
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff807638da4c0
fffff80763955390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff98c686a3f388
FAULTING_IP:
win32kbase!GrepValidateVisRgn+78
ffff9897`375cfca8 8b5558          mov     edx,dword ptr [rbp+58h]
MM_INTERNAL_CODE:  2
CPU_COUNT: 8
CPU_MHZ: 708
CPU_VENDOR:  GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 8e
CPU_STEPPING: a
CPU_MICROCODE: 6,8e,a,0 (F,M,S,R)  SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  AV
PROCESS_NAME:  explorer.exe
CURRENT_IRQL:  0
ANALYSIS_SESSION_HOST:  DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME:  03-15-2019 11:14:33.0376
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME:  ffff8686dff6f8d0 -- (.trap 0xffff8686dff6f8d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000010c259 rbx=0000000000000000 rcx=ffff98c2806e3010
rdx=ffff98c286a3f330 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9897375cfca8 rsp=ffff8686dff6fa60 rbp=ffff98c286a3f330
r8=ffff8686dff6fb08  r9=ffff98c2842f7840 r10=7ffffffffffffffc
r11=ffff8686dff6faf8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32kbase!GrepValidateVisRgn+0x78:
ffff9897`375cfca8 8b5558          mov     edx,dword ptr [rbp+58h] ss:0018:ffff98c2`86a3f388=00000000
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff807635f5e9b to fffff807635c6440
STACK_TEXT:
ffff8686`dff6f5e8 fffff807`635f5e9b : 00000000`00000050 ffff98c6`86a3f388 00000000`00000000 ffff8686`dff6f8d0 : nt!KeBugCheckEx
ffff8686`dff6f5f0 fffff807`6351a957 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff98c6`86a3f388 : nt!MiSystemFault+0x1ac1db
ffff8686`dff6f730 fffff807`635d3f83 : ffffc707`102502c0 ffff98c2`80613170 00000000`00000000 ffff98c2`808c00c0 : nt!MmAccessFault+0x327
ffff8686`dff6f8d0 ffff9897`375cfca8 : 00000000`0000067c ffff8686`dff6fab8 00000000`80000002 00000000`80000002 : nt!KiPageFault+0x343
ffff8686`dff6fa60 ffff9897`375cedd9 : ffff98c2`80602980 00000000`00000000 00000000`000009b6 00000000`00000000 : win32kbase!GrepValidateVisRgn+0x78
ffff8686`dff6fb00 ffff9897`375d01f4 : ffff98c2`808308c0 00000000`00000000 ffff8686`00004003 ffff98c2`84da0b60 : win32kbase!_GetDCEx+0x1e39
ffff8686`dff6fd10 fffff807`635d7685 : 00007ff6`00000000 ffffc707`102502c0 00000000`00000000 00000000`00000020 : win32kbase!NtUserGetDC+0x164
ffff8686`dff6fe40 00007ffb`267c11e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0375b0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`267c11e4
THREAD_SHA1_HASH_MOD_FUNC:  613b4c59e497ad0e16ec69a99dd5cf4d940b7dce
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  7f42c30d00d78ac292e88f5cbde0c24bb6c74ebc
THREAD_SHA1_HASH_MOD:  3e1b276afd23cc304eca99dc1018bd8eef691a5f
FOLLOWUP_IP:
win32kbase!GrepValidateVisRgn+78
ffff9897`375cfca8 8b5558          mov     edx,dword ptr [rbp+58h]
FAULT_INSTR_CODE:  4458558b
SYMBOL_STACK_INDEX:  4
SYMBOL_NAME:  win32kbase!GrepValidateVisRgn+78
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME:  win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP:  2b1dc0fa
IMAGE_VERSION:  10.0.17763.316
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  78
FAILURE_BUCKET_ID:  AV_R_INVALID_win32kbase!GrepValidateVisRgn
BUCKET_ID:  AV_R_INVALID_win32kbase!GrepValidateVisRgn
PRIMARY_PROBLEM_CLASS:  AV_R_INVALID_win32kbase!GrepValidateVisRgn
TARGET_TIME:  2019-02-20T15:16:07.000Z
OSBUILD:  17763
OSSERVICEPACK:  316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  272
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
BUILDDATESTAMP_STR:  180914-1434
BUILDLAB_STR:  rs5_release
BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME:  3103
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:av_r_invalid_win32kbase!grepvalidatevisrgn
FAILURE_ID_HASH:  {be63fdb6-af3a-8c3f-467a-4e474f58344d}
Followup:     MachineOwner
---------