*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffcc81c56f7bdc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80732a55720, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for dxgmms2.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-D1N1ELH
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 52474
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffcc81c56f7bdc
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80732a55720
WRITE_ADDRESS: fffff8072acfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8072ac0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8072ac0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffcc81c56f7bdc
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
DPC_STACK_BASE: FFFFFB0B47867FB0
TRAP_FRAME: fffffb0b47867770 -- (.trap 0xfffffb0b47867770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80732a55720 rsp=fffffb0b47867900 rbp=fffffb0b47867950
r8=0000000000000000 r9=000000145290ce00 r10=fffff8073249be00
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
dxgmms2+0x35720:
fffff807`32a55720 c687dc2b001000 mov byte ptr [rdi+10002BDCh],0 ds:00000000`10002bdc=??
Resetting default scope
STACK_TEXT:
fffffb0b`47867628 fffff807`2a405e69 : 00000000`0000000a ffffcc81`c56f7bdc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffb0b`47867630 fffff807`2a402169 : 00000000`00000000 fffff807`2a000000 fffffb0b`4786786c fffff807`2a2cac08 : nt!KiBugCheckDispatch+0x69
fffffb0b`47867770 fffff807`32a55720 : 00000000`00000000 ffffe300`7dce6180 fffffb0b`478679fc 00000000`00000000 : nt!KiPageFault+0x469
fffffb0b`47867900 00000000`00000000 : ffffe300`7dce6180 fffffb0b`478679fc 00000000`00000000 00000000`00000000 : dxgmms2+0x35720
CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgmms2
fffff80732a55725 - dxgmms2+35725
[ 00:10 ]
1 error : !dxgmms2 (fffff80732a55725)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------