IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcb86d5abb370, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8023146bb49, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffffcb86d5abb370
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8023146bb49
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
ffffcb86d5abb370
CURRENT_IRQL: 0
FAULTING_IP:
+0
fffff802`3146bb49 ?? ???
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV
BUGCHECK_STR: AV
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-14-2020 17:50:38.0076
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff802315d32e9 to fffff802315c14e0
STACK_TEXT:
ffffab08`df88b668 fffff802`315d32e9 : 00000000`0000000a ffffcb86`d5abb370 00000000`00000002 00000000`00000000 : 0xfffff802`315c14e0
ffffab08`df88b670 00000000`0000000a : ffffcb86`d5abb370 00000000`00000002 00000000`00000000 fffff802`3146bb49 : 0xfffff802`315d32e9
ffffab08`df88b678 ffffcb86`d5abb370 : 00000000`00000002 00000000`00000000 fffff802`3146bb49 ffffc386`cfe310b8 : 0xa
ffffab08`df88b680 00000000`00000002 : 00000000`00000000 fffff802`3146bb49 ffffc386`cfe310b8 00000000`00000000 : 0xffffcb86`d5abb370
ffffab08`df88b688 00000000`00000000 : fffff802`3146bb49 ffffc386`cfe310b8 00000000`00000000 00000000`00000000 : 0x2
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_AV
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
TARGET_TIME: 2020-01-12T21:06:37.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 14
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------