PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff800033f80cc6, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8066cfcbdd0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff800033f80cc6
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8066cfcbdd0
BUGCHECK_P4: 0
READ_ADDRESS: fffff806557733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8065562a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8065562a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff800033f80cc6
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffffdf0b1809e360 -- (.trap 0xffffdf0b1809e360)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800033f80000 rbx=0000000000000000 rcx=ffff800033f80cc6
rdx=00003d036b041fc2 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066cfcbdd0 rsp=ffffdf0b1809e4f8 rbp=ffffbd03a52a5c00
r8=0000000000000084 r9=0000000000000004 r10=ffff800033f80000
r11=ffffb75badd6e000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
vgk+0x1bdd0:
fffff806`6cfcbdd0 8a01 mov al,byte ptr [rcx] ds:ffff8000`33f80cc6=00
Resetting default scope
STACK_TEXT:
ffffdf0b`1809e0b8 fffff806`5542dfc1 : 00000000`00000050 ffff8000`33f80cc6 00000000`00000000 ffffdf0b`1809e360 : nt!KeBugCheckEx
ffffdf0b`1809e0c0 fffff806`552c91af : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8000`33f80cc6 : nt!MiSystemFault+0x195f21
ffffdf0b`1809e1c0 fffff806`553d041e : ffffbd03`94a79630 fffff806`553c884e 00000000`00000cc6 ffff8000`33f80000 : nt!MmAccessFault+0x34f
ffffdf0b`1809e360 fffff806`6cfcbdd0 : fffff806`6d2c40b7 ffffbd03`94a79630 00000000`00000001 00000001`8b3c2c88 : nt!KiPageFault+0x35e
ffffdf0b`1809e4f8 fffff806`6d2c40b7 : ffffbd03`94a79630 00000000`00000001 00000001`8b3c2c88 ffffbd03`a52a5c00 : vgk+0x1bdd0
ffffdf0b`1809e500 ffffbd03`94a79630 : 00000000`00000001 00000001`8b3c2c88 ffffbd03`a52a5c00 ffff8000`33f80000 : vgk+0x3140b7
ffffdf0b`1809e508 00000000`00000001 : 00000001`8b3c2c88 ffffbd03`a52a5c00 ffff8000`33f80000 00000001`8b3c2000 : 0xffffbd03`94a79630
ffffdf0b`1809e510 00000001`8b3c2c88 : ffffbd03`a52a5c00 ffff8000`33f80000 00000001`8b3c2000 00000000`00000000 : 0x1
ffffdf0b`1809e518 ffffbd03`a52a5c00 : ffff8000`33f80000 00000001`8b3c2000 00000000`00000000 00000000`00000000 : 0x00000001`8b3c2c88
ffffdf0b`1809e520 ffff8000`33f80000 : 00000001`8b3c2000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbd03`a52a5c00
ffffdf0b`1809e528 00000001`8b3c2000 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbd03`947db4d0 : 0xffff8000`33f80000
ffffdf0b`1809e530 00000000`00000000 : 00000000`00000000 00000000`00000000 ffffbd03`947db4d0 00000000`00000001 : 0x00000001`8b3c2000
SYMBOL_NAME: vgk+1bdd0
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1bdd0
FAILURE_BUCKET_ID: AV_R_INVALID_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b36e8bf9-ceaa-edef-4fc4-24c03e23c347}
Followup: MachineOwner
---------
3: kd> lmvm vgk
Browse full module list
start end module name
fffff806`6cfb0000 fffff806`6d2dc000 vgk T (no symbols)
Loaded symbol image file: vgk.sys
Image path: \??\C:\Program Files\Riot Vanguard\vgk.sys
Image name: vgk.sys
Browse all global symbols functions data
Timestamp: Thu Apr 30 07:28:40 2020 (5EAA53F8)
CheckSum: 0033159E
ImageSize: 0032C000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: