PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffeef77bb00800, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80319e7dde9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3108
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3197
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
Key : Dump.Attributes.RequiredDumpfileSize
Value: 0xb5f17cbe
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffeef77bb00800
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80319e7dde9
BUGCHECK_P4: 2
READ_ADDRESS: fffff8031a8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031a80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8031a80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffeef77bb00800
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff808757cf7530 -- (.trap 0xffff808757cf7530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeef77bbdd7f8 rbx=0000000000000000 rcx=0a000002f38d9863
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80319e7dde9 rsp=ffff808757cf76c0 rbp=ffff808757cf7730
r8=0000007ffffffff8 r9=ffffeef77bb00800 r10=0000000000000002
r11=ffffeef77bbdd000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MI_IS_PHYSICAL_ADDRESS+0x89:
fffff803`19e7dde9 498b09 mov rcx,qword ptr [r9] ds:ffffeef7`7bb00800=????????????????
Resetting default scope
STACK_TEXT:
ffff8087`57cf7288 fffff803`1a01ebbb : 00000000`00000050 ffffeef7`7bb00800 00000000`00000000 ffff8087`57cf7530 : nt!KeBugCheckEx
ffff8087`57cf7290 fffff803`19e0c960 : ffff8087`57cf7730 00000000`00000000 ffff8087`57cf75b0 00000000`00000000 : nt!MiSystemFault+0x1f43ab
ffff8087`57cf7390 fffff803`1a003c5e : fffff803`374fb0e0 fffff803`19eec5ca 00000000`00000010 fffff803`3772ff1a : nt!MmAccessFault+0x400
ffff8087`57cf7530 fffff803`19e7dde9 : ffffeec0`20100800 ffffeef7`60100800 ffffeef7`7bb00800 ffffeef7`7bbdd800 : nt!KiPageFault+0x35e
ffff8087`57cf76c0 fffff803`19f3bb46 : ffff8087`57cf7708 00000000`00000000 00000000`00000001 fffff803`373058f0 : nt!MI_IS_PHYSICAL_ADDRESS+0x89
ffff8087`57cf76f0 fffff803`19f3baed : 00000000`00000100 ffff8087`57cf7818 00008040`20100000 00000000`00040246 : nt!MiGetPhysicalAddress+0x42
ffff8087`57cf7760 fffff803`37802f06 : 00000000`00000001 ffff8087`00000000 00000000`00000000 00000000`99efe301 : nt!MmGetPhysicalAddress+0x1d
ffff8087`57cf7790 00000000`00000001 : ffff8087`00000000 00000000`00000000 00000000`99efe301 ffff8087`57cf7aa8 : vgk+0x542f06
ffff8087`57cf7798 ffff8087`00000000 : 00000000`00000000 00000000`99efe301 ffff8087`57cf7aa8 00000000`00000000 : 0x1
ffff8087`57cf77a0 00000000`00000000 : 00000000`99efe301 ffff8087`57cf7aa8 00000000`00000000 ffff8087`57cf7910 : 0xffff8087`00000000
SYMBOL_NAME: vgk+542f06
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 542f06
FAILURE_BUCKET_ID: AV_R_INVALID_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b36e8bf9-ceaa-edef-4fc4-24c03e23c347}
Followup: MachineOwner
---------