IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff802678ab000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802627d5820, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'mrxsmb20' and 'dump_storpor' overlap
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 fffff802678ab000
CURRENT_IRQL:  2
FAULTING_IP:
nt!memcpy+a0
fffff802`627d5820 f30f6f0411      movdqu  xmm0,xmmword ptr [rcx+rdx]
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  CODE_CORRUPTION
BUGCHECK_STR:  AV
PROCESS_NAME:  System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE:  FFFFF802678B1FB0
TRAP_FRAME:  fffff802678aa6a0 -- (.trap 0xfffff802678aa6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa98eac6bef98 rbx=0000000000000000 rcx=ffffa98eac6bf600
rdx=00004e73bb1eba00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802627d5820 rsp=fffff802678aa838 rbp=fffff802678aa8b0
 r8=0000000000000000  r9=ffffffffffffffcd r10=0000fffff8026273
r11=ffffa98eac6bef98 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!memcpy+0xa0:
fffff802`627d5820 f30f6f0411      movdqu  xmm0,xmmword ptr [rcx+rdx] ds:fffff802`678ab000=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff802627d4829 to fffff802627c2990
STACK_TEXT: 
fffff802`678aa558 fffff802`627d4829 : 00000000`0000000a fffff802`678ab000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`678aa560 fffff802`627d0b69 : 00000000`00000000 fffff802`6657a6e7 ffffa98e`acced1b0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff802`678aa6a0 fffff802`627d5820 : fffff802`62650afb 00000000`00000000 fffff802`5fc5ff00 ffffa98e`b122f108 : nt!KiPageFault+0x469
fffff802`678aa838 fffff802`62650afb : 00000000`00000000 fffff802`5fc5ff00 ffffa98e`b122f108 fffff802`678aa878 : nt!memcpy+0xa0
fffff802`678aa840 fffff802`626507f6 : fffff802`5fc5ff80 ffffa98e`ac40b000 fffff802`678aa8a8 00000000`00000002 : nt!EtwpLogKernelEvent+0x24b
fffff802`678aa8f0 fffff802`6264fd5f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x3f6
fffff802`678aaa30 fffff802`627c64be : 00000000`00000000 fffff802`5fc5d180 fffff802`62b8f400 ffffa98e`ac2ef080 : nt!KiRetireDpcList+0x1ef
fffff802`678aac60 00000000`00000000 : fffff802`678ab000 fffff802`678a5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e
STACK_COMMAND:  kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff802627c44e8-fffff802627c44e9  2 bytes - nt!KiInterruptDispatch+b8
    [ 48 ff:4c 8b ]
    fffff802627c44ef-fffff802627c44f2  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 2c 3c 8f ]
    fffff802627d513c-fffff802627d5140  5 bytes - nt!KiUmsRestoreUch+3c (+0x10c4d)
    [ ff e2 cc cc cc:e8 9f df 17 00 ]
11 errors : !nt (fffff802627c44e8-fffff802627d5140)
MODULE_NAME: memory_corruption
IMAGE_NAME:  memory_corruption
FOLLOWUP_NAME:  memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP:  0
MEMORY_CORRUPTOR:  LARGE
FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE
BUCKET_ID:  MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:memory_corruption_large
FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80121c0d573, Address of the instruction which caused the bugcheck
Arg3: ffffe288a4fa2e40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!CmpCallCallBacksEx+413
fffff801`21c0d573 4183ff0e        cmp     r15d,0Eh
CONTEXT:  ffffe288a4fa2e40 -- (.cxr 0xffffe288a4fa2e40;r)
rax=0000000000000000 rbx=ffffe288a4fa3a58 rcx=0000000000000000
rdx=fffff80121600000 rsi=ffffe38cb5e6bc10 rdi=0000000000000000
rip=fffff80121c0d573 rsp=ffffe288a4fa3830 rbp=ffffe288a4fa3b80
 r8=ffffe288a4fa37a0  r9=ffffe288a4fa37a8 r10=0000000000000000
r11=0000000000000003 r12=ffffe38c8e6bc040 r13=ffffe288a4fa3a00
r14=0000000000000001 r15=0000000000000003
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050297
nt!CmpCallCallBacksEx+0x413:
fffff801`21c0d573 4183ff0e        cmp     r15d,0Eh
Last set context:
rax=0000000000000000 rbx=ffffe288a4fa3a58 rcx=0000000000000000
rdx=fffff80121600000 rsi=ffffe38cb5e6bc10 rdi=0000000000000000
rip=fffff80121c0d573 rsp=ffffe288a4fa3830 rbp=ffffe288a4fa3b80
 r8=ffffe288a4fa37a0  r9=ffffe288a4fa37a8 r10=0000000000000000
r11=0000000000000003 r12=ffffe38c8e6bc040 r13=ffffe288a4fa3a00
r14=0000000000000001 r15=0000000000000003
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050297
nt!CmpCallCallBacksEx+0x413:
fffff801`21c0d573 4183ff0e        cmp     r15d,0Eh
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  CODE_CORRUPTION
BUGCHECK_STR:  0x3B
PROCESS_NAME:  Discord.exe
CURRENT_IRQL:  0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER:  from fffff80121c14400 to fffff80121c0d573
STACK_TEXT: 
ffffe288`a4fa3830 fffff801`21c14400 : ffffd10b`00000003 ffffe288`a4fa3a58 00000000`00000000 fffff801`21c13601 : nt!CmpCallCallBacksEx+0x413
ffffe288`a4fa3940 fffff801`21c8ad6c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpCallCallBacks+0x28
ffffe288`a4fa3990 fffff801`217d3c18 : ffffd10b`11fd2580 00000000`7744dc00 ffffe288`a4fa3b80 ffffd10b`0701f9e0 : nt!NtSetInformationKey+0x23c
ffffe288`a4fa3b00 00007ffd`59c7f2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0e4ee648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`59c7f2a4
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffff8159e76471f9-ffff8159e76471fe  6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
    [ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
    ffff8159e7647269-ffff8159e764726a  2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
    [ 48 ff:4c 8b ]
    ffff8159e7647270-ffff8159e7647273  4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
    [ 0f 1f 44 00:e8 ab f1 20 ]
    ffff8159e76483d5-ffff8159e76483d6  2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
    [ 48 ff:4c 8b ]
    ffff8159e76483dc-ffff8159e76483df  4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
    [ 0f 1f 44 00:e8 3f e0 20 ]
    ffff8159e76483e5-ffff8159e76483e6  2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
    [ 48 ff:4c 8b ]
    ffff8159e76483ec-ffff8159e76483ef  4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
    [ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (ffff8159e76471f9-ffff8159e76483ef)
MODULE_NAME: memory_corruption
IMAGE_NAME:  memory_corruption
FOLLOWUP_NAME:  memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP:  0
MEMORY_CORRUPTOR:  LARGE
STACK_COMMAND:  .cxr 0xffffe288a4fa2e40 ; kb
FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE
BUCKET_ID:  MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:memory_corruption_large
FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80456fd5792, The address that the exception occurred at
Arg3: fffff8045738f400, Parameter 0 of the exception
Arg4: 0000fffff80456f3, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM}  Ge ersiz Y nerge  Ge ersiz bir y nerge y r t lmeye  al
FAULTING_IP:
nt!memcpy+12
fffff804`56fd5792 4d8bc8          mov     r9,r8
EXCEPTION_PARAMETER1:  fffff8045738f400
EXCEPTION_PARAMETER2:  0000fffff80456f3
BUGCHECK_STR:  0x1E_c000001d
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  CODE_CORRUPTION
PROCESS_NAME:  System
CURRENT_IRQL:  2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE:  FFFFF8045BCB1FB0
EXCEPTION_RECORD:  fffff8045bcaa510 -- (.exr 0xfffff8045bcaa510)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME:  0000000008d1f119 -- (.trap 0x8d1f119)
Unable to read trap frame at 00000000`08d1f119
LAST_CONTROL_TRANSFER:  from fffff804570a5dbe to fffff80456fc2990
FAILED_INSTRUCTION_ADDRESS:
nt!memcpy+12
fffff804`56fd5792 4d8bc8          mov     r9,r8
STACK_TEXT: 
fffff804`5bca9648 fffff804`570a5dbe : 00000000`0000001e ffffffff`c000001d fffff804`56fd5792 fffff804`5738f400 : nt!KeBugCheckEx
fffff804`5bca9650 fffff804`56fcb782 : fffff804`5730f000 fffff804`56e00000 0005e20c`00ab5000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff804`5bca9690 fffff804`56e89555 : 00000000`00000000 00000000`00000000 fffff804`5bca9c00 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff804`5bca96c0 fffff804`56e8d66e : fffff804`5bcaa5f8 fffff804`5bcaa340 fffff804`5bcaa5f8 fffff804`5bcaa9b8 : nt!RtlDispatchException+0x4a5
fffff804`5bca9e10 fffff804`56fd495d : fffff804`5bcaa510 00000000`00000000 00000000`08d1f119 00000000`00000000 : nt!KiDispatchException+0x16e
fffff804`5bcaa4c0 fffff804`56fceee9 : 00000000`00000000 fffff804`5a97a6e7 ffffa288`694a41b0 00000000`00000000 : nt!KiExceptionDispatch+0x11d
fffff804`5bcaa6a0 fffff804`56fd5792 : fffff804`56e50afb 00000000`00000000 fffff804`541e7f00 ffffa288`6ca28108 : nt!KiInvalidOpcodeFault+0x329
fffff804`5bcaa838 fffff804`56e50afb : 00000000`00000000 fffff804`541e7f00 ffffa288`6ca28108 fffff804`5bcaa878 : nt!memcpy+0x12
fffff804`5bcaa840 fffff804`56e507f6 : fffff804`541e7f80 ffffa288`66c0e000 fffff804`5bcaa8a8 00000000`00000002 : nt!EtwpLogKernelEvent+0x24b
fffff804`5bcaa8f0 fffff804`56e4fd5f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x3f6
fffff804`5bcaaa30 fffff804`56fc64be : 00000000`00000000 fffff804`541e5180 fffff804`5738f400 ffffa288`699dd280 : nt!KiRetireDpcList+0x1ef
fffff804`5bcaac60 00000000`00000000 : fffff804`5bcab000 fffff804`5bca5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e
STACK_COMMAND:  kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal
    fffff80456d5d956-fffff80456d5d95b  6 bytes - hal!KeQueryPerformanceCounter+e6
    [ ff 15 b4 7f 07 00:e8 45 59 3f 00 90 ]
    fffff80456d5f37a - hal!HalPerformEndOfInterrupt+1a (+0x1a24)
    [ 00:90 ]
    fffff80456d5f457-fffff80456d5f458  2 bytes - hal!HalPutScatterGatherList+67 (+0xdd)
    [ 48 ff:4c 8b ]
    fffff80456d5f45e-fffff80456d5f461  4 bytes - hal!HalPutScatterGatherList+6e (+0x07)
    [ 0f 1f 44 00:e8 3d ec 40 ]
13 errors : !hal (fffff80456d5d956-fffff80456d5f461)
MODULE_NAME: memory_corruption
IMAGE_NAME:  memory_corruption
FOLLOWUP_NAME:  memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP:  0
MEMORY_CORRUPTOR:  LARGE
FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE
BUCKET_ID:  MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:memory_corruption_large
FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------