IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805704c114a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER:  O.E.M
SYSTEM_PRODUCT_NAME:  O.E.M
SYSTEM_SKU:   
SYSTEM_VERSION:   
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  080015
BIOS_DATE:  09/30/2011
BASEBOARD_MANUFACTURER:  FOXCONN
BASEBOARD_PRODUCT:  G41MXE/G41MXE-K
BASEBOARD_VERSION:  1.0
DUMP_TYPE:  2
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff805704c114a
WRITE_ADDRESS: fffff805709733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000020
CURRENT_IRQL:  2
FAULTING_IP:
nt!KiExecuteAllDpcs+2ea
fffff805`704c114a 49894720        mov     qword ptr [r15+20h],rax
CPU_COUNT: 2
CPU_MHZ: bfa
CPU_VENDOR:  GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 17
CPU_STEPPING: a
CPU_MICROCODE: 6,17,a,0 (F,M,S,R)  SIG: A0C'00000000 (cache) A0C'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  AV
PROCESS_NAME:  AMDRSServ.exe
ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME:  03-30-2020 15:44:32.0928
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
DPC_STACK_BASE:  FFFFF8057566EFB0
TRAP_FRAME:  fffff8057566eab0 -- (.trap 0xfffff8057566eab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000010c0992d1ca rbx=0000000000000000 rcx=ffffce82465bd000
rdx=0000010c00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805704c114a rsp=fffff8057566ec40 rbp=fffff8057566ed40
 r8=0000000000000000  r9=0000000000000000 r10=ffffce8249c20f88
r11=fffff8057566ee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2ea:
fffff805`704c114a 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff805705d41e9 to fffff805705c2380
STACK_TEXT: 
fffff805`7566e968 fffff805`705d41e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`7566e970 fffff805`705d052b : ffffe000`552766f0 fffff805`7566ee70 ffffce82`49b43000 fffff804`9484bd17 : nt!KiBugCheckDispatch+0x69
fffff805`7566eab0 fffff805`704c114a : fffff805`6d9c4f80 ffffce82`466a0000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x46b
fffff805`7566ec40 fffff805`704c07bf : 00000000`0000001c 00000000`00989680 fffff805`7566ee80 fffff805`6d9c5800 : nt!KiExecuteAllDpcs+0x2ea
fffff805`7566ed80 fffff805`705c93c5 : 00000000`00000000 fffff805`6d9c2180 ffffe000`55276640 00000000`00000001 : nt!KiRetireDpcList+0x1ef
fffff805`7566efb0 fffff805`705c91b0 : 00000000`00000000 fffff805`703602cb 00000000`01000000 fffff100`00000000 : nt!KxRetireDpcList+0x5
fffff10c`156291d0 fffff805`705c8a65 : 00000000`00000001 fffff805`705c3ee1 00000000`00000000 fffff10c`15629290 : nt!KiDispatchInterruptContinue
fffff10c`15629200 fffff805`705c3ee1 : 00000000`00000000 fffff10c`15629290 ffffe000`55276640 00000000`00000501 : nt!KiDpcInterruptBypass+0x25
fffff10c`15629210 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
THREAD_SHA1_HASH_MOD_FUNC:  e9ddd7334ce9ee4e578346f634110a08ba176517
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a72d3b2e53137bf3f0905dbd80b9a2a4cdfadcbf
THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2ea
fffff805`704c114a 49894720        mov     qword ptr [r15+20h],rax
FAULT_INSTR_CODE:  20478949
SYMBOL_STACK_INDEX:  3
SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ea
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  0
IMAGE_VERSION:  10.0.18362.720
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  2ea
FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs
BUCKET_ID:  AV_nt!KiExecuteAllDpcs
PRIMARY_PROBLEM_CLASS:  AV_nt!KiExecuteAllDpcs
TARGET_TIME:  2020-03-30T11:03:53.000Z
OSBUILD:  18362
OSSERVICEPACK:  720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  784
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE: 
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
BUILDDATESTAMP_STR:  190318-1202
BUILDLAB_STR:  19h1_release
BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME:  15a94
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:av_nt!kiexecutealldpcs
FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup:     MachineOwner
---------