Hello and Welcome !
Seems like the Driver that caused the System to crash would be uxpatch.sys mostly used to patch to use custom themes. If you have any software and if you have tried to patch uninstall it.
If you can't find the go to Start | under search type in "Drivers" | then look for uxpatch.sys and rename it to uxpatch.old and reboot your System.
Also run the SFC /SCANNOW Command - System File Checker to make sure if any issues with OS it will repair it.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff9801043d000, memory referenced
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
Arg3: fffff88005de2eb9, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310b0e0
fffff9801043d000
FAULTING_IP:
uxpatch+1eb9
fffff880`05de2eb9 488b470c mov rax,qword ptr [rdi+0Ch]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xD6
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880031b6460 -- (.trap 0xfffff880031b6460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=fffff8a00182ce90
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005de2eb9 rsp=fffff880031b65f0 rbp=ffffffff80000408
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffa8004c121a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
uxpatch+0x1eb9:
fffff880`05de2eb9 488b470c mov rax,qword ptr [rdi+0Ch] ds:8f70:00000000`0000000c=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f53f14 to fffff80002ed3740
STACK_TEXT:
fffff880`031b62f8 fffff800`02f53f14 : 00000000`00000050 fffff980`1043d000 00000000`00000000 fffff880`031b6460 : nt!KeBugCheckEx
fffff880`031b6300 fffff800`02ed182e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`02e73967 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`031b6460 fffff880`05de2eb9 : 00000000`c0000023 ffffffff`80000408 fffff880`05de53e0 fffff800`02ecef30 : nt!KiPageFault+0x16e
fffff880`031b65f0 00000000`c0000023 : ffffffff`80000408 fffff880`05de53e0 fffff800`02ecef30 00000000`00000010 : uxpatch+0x1eb9
fffff880`031b65f8 ffffffff`80000408 : fffff880`05de53e0 fffff800`02ecef30 00000000`00000010 fffff880`031b6648 : 0xc0000023
fffff880`031b6600 fffff880`05de53e0 : fffff800`02ecef30 00000000`00000010 fffff880`031b6648 fffff880`001c001a : 0xffffffff`80000408
fffff880`031b6608 fffff800`02ecef2f : 00000000`00000010 fffff880`031b6648 fffff880`001c001a fffff880`05de3c30 : uxpatch+0x43e0
fffff880`031b6610 00000000`00000010 : fffff880`031b6648 fffff880`001c001a fffff880`05de3c30 00000000`00000086 : nt!KiIdleLoop+0x15f
fffff880`031b6618 fffff880`031b6648 : fffff880`001c001a fffff880`05de3c30 00000000`00000086 fffff880`05de3081 : 0x10
fffff880`031b6620 fffff880`001c001a : fffff880`05de3c30 00000000`00000086 fffff880`05de3081 fffff880`05de53e0 : 0xfffff880`031b6648
fffff880`031b6628 fffff880`05de3c30 : 00000000`00000086 fffff880`05de3081 fffff880`05de53e0 fffff880`00000010 : 0xfffff880`001c001a
fffff880`031b6630 00000000`00000086 : fffff880`05de3081 fffff880`05de53e0 fffff880`00000010 fffff880`05de53e8 : uxpatch+0x2c30
fffff880`031b6638 fffff880`05de3081 : fffff880`05de53e0 fffff880`00000010 fffff880`05de53e8 00000000`00000000 : 0x86
fffff880`031b6640 fffff880`05de53e0 : fffff880`00000010 fffff880`05de53e8 00000000`00000000 fffffa80`00860084 : uxpatch+0x2081
fffff880`031b6648 fffff880`00000010 : fffff880`05de53e8 00000000`00000000 fffffa80`00860084 fffff980`10438f70 : uxpatch+0x43e0
fffff880`031b6650 fffff880`05de53e8 : 00000000`00000000 fffffa80`00860084 fffff980`10438f70 fffffa80`00000030 : 0xfffff880`00000010
fffff880`031b6658 00000000`00000000 : fffffa80`00860084 fffff980`10438f70 fffffa80`00000030 00000000`00000000 : uxpatch+0x43e8
STACK_COMMAND: kb
FOLLOWUP_IP:
uxpatch+1eb9
fffff880`05de2eb9 488b470c mov rax,qword ptr [rdi+0Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: uxpatch+1eb9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: uxpatch
IMAGE_NAME: uxpatch.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5ac17e
FAILURE_BUCKET_ID: X64_0xD6_VRF_uxpatch+1eb9
BUCKET_ID: X64_0xD6_VRF_uxpatch+1eb9
Hope this helps,
Captain