IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000900000938, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff806222b17c2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER:  To be filled by O.E.M.
SYSTEM_PRODUCT_NAME:  To be filled by O.E.M.
SYSTEM_SKU:  SKU
SYSTEM_VERSION:  To be filled by O.E.M.
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  2701
BIOS_DATE:  03/24/2016
BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT:  M5A97 LE R2.0
BASEBOARD_VERSION:  Rev 1.xx
DUMP_TYPE:  2
BUGCHECK_P1: 900000938
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff806222b17c2
READ_ADDRESS: fffff806227733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000900000938
CURRENT_IRQL:  2
FAULTING_IP:
nt!KiDeferredReadyThread+b02
fffff806`222b17c2 f6417002        test    byte ptr [rcx+70h],2
CPU_COUNT: 6
CPU_MHZ: db8
CPU_VENDOR:  AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  AV
PROCESS_NAME:  ACS.exe
ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME:  06-15-2020 18:01:48.0531
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
DPC_STACK_BASE:  FFFF9C09C205AFB0
TRAP_FRAME:  ffff9c09c205aa10 -- (.trap 0xffff9c09c205aa10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000008c8 rbx=0000000000000000 rcx=00000009000008c8
rdx=ffffc50786a44080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806222b17c2 rsp=ffff9c09c205aba0 rbp=ffff9c09c205ac20
 r8=000000000000000a  r9=0000000000000000 r10=0000000000000000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiDeferredReadyThread+0xb02:
fffff806`222b17c2 f6417002        test    byte ptr [rcx+70h],2 ds:00000009`00000938=??
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff806223d41e9 to fffff806223c23a0
STACK_TEXT: 
ffff9c09`c205a8c8 fffff806`223d41e9 : 00000000`0000000a 00000009`00000938 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9c09`c205a8d0 fffff806`223d0529 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9c09`c205aa10 fffff806`222b17c2 : ffffc507`00000000 ffffc507`00000000 ffffc507`84650080 ffffc507`84bea188 : nt!KiPageFault+0x469
ffff9c09`c205aba0 fffff806`222b0ba3 : ffffb401`a9d00180 00000000`00000000 fffff806`1d165800 00000000`00000000 : nt!KiDeferredReadyThread+0xb02
ffff9c09`c205ac60 fffff806`222513eb : ffffc507`86a44080 ffffc507`86a441f0 7c75300f`00000003 0000001f`4c1b49ff : nt!KiReadyThread+0x33
ffff9c09`c205ac90 fffff806`22250039 : 00000000`0000001c 00000000`00da7a64 00000000`0007d307 00000000`0000001f : nt!KiProcessExpiredTimerList+0x27b
ffff9c09`c205ad80 fffff806`223c93a5 : 00000000`00000000 ffffb401`a9d00180 ffffc507`7c2a5600 00007ff4`fc9ace10 : nt!KiRetireDpcList+0x4e9
ffff9c09`c205afb0 fffff806`223c9190 : fffff806`22175b30 fffff806`2215f37a ffff9c09`c3876b18 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff9c09`c3876ac0 fffff806`223c8a45 : 00007ff4`fc9ace10 fffff806`223c4411 00000000`00000000 ffff9c09`c3876b80 : nt!KiDispatchInterruptContinue
ffff9c09`c3876af0 fffff806`223c4411 : 00000000`00000000 ffff9c09`c3876b80 ffffc507`7c2a5600 ffffc507`8292fae0 : nt!KiDpcInterruptBypass+0x25
ffff9c09`c3876b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
THREAD_SHA1_HASH_MOD_FUNC:  08f6e48b26fb4727f0134084499f8f1bb7ad5358
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d7bdade5c3f853623a91c0709d37d07a13c5f6c8
THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiDeferredReadyThread+b02
fffff806`222b17c2 f6417002        test    byte ptr [rcx+70h],2
FAULT_INSTR_CODE:  27041f6
SYMBOL_STACK_INDEX:  3
SYMBOL_NAME:  nt!KiDeferredReadyThread+b02
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  4ff75719
IMAGE_VERSION:  10.0.18362.900
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  b02
FAILURE_BUCKET_ID:  AV_nt!KiDeferredReadyThread
BUCKET_ID:  AV_nt!KiDeferredReadyThread
PRIMARY_PROBLEM_CLASS:  AV_nt!KiDeferredReadyThread
TARGET_TIME:  2020-06-15T09:59:18.000Z
OSBUILD:  18362
OSSERVICEPACK:  900
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  272
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE: 
USER_LCID:  0
OSBUILD_TIMESTAMP:  2012-07-07 00:22:33
BUILDDATESTAMP_STR:  190318-1202
BUILDLAB_STR:  19h1_release
BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME:  3d12
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:av_nt!kideferredreadythread
FAILURE_ID_HASH:  {d70641df-b27f-49ce-f6c0-b234c7435b54}
Followup:     MachineOwner
---------