*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff830bd18d2523, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8026cc17804, address which referenced memory
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x2c1e2f, File: 0x2c1e23 - C:\ProgramData\Dbg\sym\win32kbase.sys\23B5CE9B2d1000\win32kbase.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.Elapsed.mSec
Value: 5790
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 1657
Key : Analysis.Memory.CommitPeak.Mb
Value: 135
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_vgk!unknown_function
Key : Failure.Hash
Value: {56c5cf79-d160-8711-720f-03c630d4c72b}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff830bd18d2523
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8026cc17804
FILE_IN_CAB: 061923-6968-01.dmp
READ_ADDRESS: fffff8026d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff830bd18d2523
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffffc083cf36f4e0 -- (.trap 0xffffc083cf36f4e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8026ca00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026cc17804 rsp=ffffc083cf36f670 rbp=ffffc083cf36f7a0
r8=0000000000000001 r9=0000000000000001 r10=ffffb08d1f2da8e8
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExFreeHeapPool+0x124:
fffff802`6cc17804 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
ffffc083`cf36f398 fffff802`6ce10029 : 00000000`0000000a ffff830b`d18d2523 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc083`cf36f3a0 fffff802`6ce0bbe3 : 00000000`00000088 00000000`000001a0 ffffb08d`18b58ab0 00000000`00000158 : nt!KiBugCheckDispatch+0x69
ffffc083`cf36f4e0 fffff802`6cc17804 : 00000000`00000020 fffff802`81310000 00000000`00000004 b734aa76`f89b2968 : nt!KiPageFault+0x463
ffffc083`cf36f670 fffff802`6d3b70b9 : fffff802`8138f060 00000000`00000000 00000000`00000008 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffffc083`cf36f750 fffff802`814881fe : 00000000`00000001 ffffb08d`1f2da340 00000000`00000001 00000000`0000010c : nt!ExFreePool+0x9
ffffc083`cf36f780 00000000`00000001 : ffffb08d`1f2da340 00000000`00000001 00000000`0000010c 00000000`00000001 : vgk+0x1781fe
ffffc083`cf36f788 ffffb08d`1f2da340 : 00000000`00000001 00000000`0000010c 00000000`00000001 00000000`00000008 : 0x1
ffffc083`cf36f790 00000000`00000001 : 00000000`0000010c 00000000`00000001 00000000`00000008 00000000`00000001 : 0xffffb08d`1f2da340
ffffc083`cf36f798 00000000`0000010c : 00000000`00000001 00000000`00000008 00000000`00000001 00000000`00000000 : 0x1
ffffc083`cf36f7a0 00000000`00000001 : 00000000`00000008 00000000`00000001 00000000`00000000 ffffc083`cf36f820 : 0x10c
ffffc083`cf36f7a8 00000000`00000008 : 00000000`00000001 00000000`00000000 ffffc083`cf36f820 fffff802`813e2802 : 0x1
ffffc083`cf36f7b0 00000000`00000001 : 00000000`00000000 ffffc083`cf36f820 fffff802`813e2802 fffff802`6cc1e5f0 : 0x8
ffffc083`cf36f7b8 00000000`00000000 : ffffc083`cf36f820 fffff802`813e2802 fffff802`6cc1e5f0 fffff802`6cc211f0 : 0x1
SYMBOL_NAME: vgk+1781fe
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1781fe
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------