IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcb86d5abb370, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8023146bb49, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE:  2
BUGCHECK_P1: ffffcb86d5abb370
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8023146bb49
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
 ffffcb86d5abb370
CURRENT_IRQL:  0
FAULTING_IP:
+0
fffff802`3146bb49 ??              ???
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR:  AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_AV
BUGCHECK_STR:  AV
ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3
ANALYSIS_SESSION_TIME:  01-14-2020 17:50:38.0076
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER:  from fffff802315d32e9 to fffff802315c14e0
STACK_TEXT: 
ffffab08`df88b668 fffff802`315d32e9 : 00000000`0000000a ffffcb86`d5abb370 00000000`00000002 00000000`00000000 : 0xfffff802`315c14e0
ffffab08`df88b670 00000000`0000000a : ffffcb86`d5abb370 00000000`00000002 00000000`00000000 fffff802`3146bb49 : 0xfffff802`315d32e9
ffffab08`df88b678 ffffcb86`d5abb370 : 00000000`00000002 00000000`00000000 fffff802`3146bb49 ffffc386`cfe310b8 : 0xa
ffffab08`df88b680 00000000`00000002 : 00000000`00000000 fffff802`3146bb49 ffffc386`cfe310b8 00000000`00000000 : 0xffffcb86`d5abb370
ffffab08`df88b688 00000000`00000000 : fffff802`3146bb49 ffffc386`cfe310b8 00000000`00000000 00000000`00000000 : 0x2
SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME:  Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP:  0
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID:  CORRUPT_MODULELIST_AV
PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_AV
FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV
TARGET_TIME:  2020-01-12T21:06:37.000Z
OSBUILD:  18362
OSSERVICEPACK:  0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  272
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE: 
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
ANALYSIS_SESSION_ELAPSED_TIME:  14
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_av
FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup:     MachineOwner
---------