Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\121520-38093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff806`82800000 PsLoadedModuleList = 0xfffff806`82c461b0
Debug session time: Tue Dec 15 21:40:26.717 2020 (UTC + 3:00)
System Uptime: 0 days 0:08:01.469
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`829c3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd00d`89da2f70=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbd88bcd882d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80693e04ce6, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5152
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffbd88bcd882d8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80693e04ce6
BUGCHECK_P4: 2
READ_ADDRESS: fffff80682d713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80682c283b8: Unable to get Flags value from nt!KdVersionBlock
fffff80682c283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbd88bcd882d8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd00d89da3210 -- (.trap 0xffffd00d89da3210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000010 rbx=0000000000000000 rcx=ffffbd88bcd882d8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80693e04ce6 rsp=ffffd00d89da33a0 rbp=00000000003ec0c0
r8=ffffbd88bcd882d8 r9=0000000000069033 r10=ffffd00d89da35b6
r11=0000000000040286 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
vgk+0x534ce6:
fffff806`93e04ce6 66410fb638 movzx di,byte ptr [r8] ds:ffffbd88`bcd882d8=??
Resetting default scope
STACK_TEXT:
ffffd00d`89da2f68 fffff806`82a0de82 : 00000000`00000050 ffffbd88`bcd882d8 00000000`00000000 ffffd00d`89da3210 : nt!KeBugCheckEx
ffffd00d`89da2f70 fffff806`828caaff : bd887cb9`c5c00001 00000000`00000000 00000000`00000000 ffffbd88`bcd882d8 : nt!MiSystemFault+0x198d62
ffffd00d`89da3070 fffff806`829d1b5e : 00000000`00000004 ffffbd88`6e1e9880 00000000`00000000 00000000`00501802 : nt!MmAccessFault+0x34f
ffffd00d`89da3210 fffff806`93e04ce6 : 00000000`00000000 ffffbd88`6e2e6c80 ffffbd88`bcd882d8 00000000`00000004 : nt!KiPageFault+0x35e
ffffd00d`89da33a0 00000000`00000000 : ffffbd88`6e2e6c80 ffffbd88`bcd882d8 00000000`00000004 00000000`00040282 : vgk+0x534ce6
SYMBOL_NAME: vgk+534ce6
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 534ce6
FAILURE_BUCKET_ID: AV_R_INVALID_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b36e8bf9-ceaa-edef-4fc4-24c03e23c347}
Followup: MachineOwner
---------