Figured out how to read dump file and found this.. Not sure what to do next tho..
***
***
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000003c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80142c479a6, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17652
Key : Analysis.Init.CPU.mSec
Value: 1281
Key : Analysis.Init.Elapsed.mSec
Value: 43160
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 020822-16484-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 3c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80142c479a6
READ_ADDRESS: fffff801436fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000003c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff9a8d06c59fe0 -- (.trap 0xffff9a8d06c59fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000003d
rdx=ffff9fcfe7f3f7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80142c479a6 rsp=ffff9a8d06c5a170 rbp=ffffdd0c0d35d038
r8=0000000000000004 r9=000000000000003c r10=ffff9fcfe7f3ffff
r11=ffff9a8d06c5a100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MmUnmapViewInSystemCache+0x656:
fffff801
42c479a6 4d8b34c1 mov r14,qword ptr [r9+rax*8] ds:00000000
0000003c=????????????????
Resetting default scope
STACK_TEXT:
ffff9a8d
06c59e98 fffff801
42e09269 : 00000000
0000000a 00000000
0000003c 00000000
00000002 00000000
00000000 : nt!KeBugCheckEx
ffff9a8d
06c59ea0 fffff801
42e05569 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : nt!KiBugCheckDispatch+0x69
ffff9a8d
06c59fe0 fffff801
42c479a6 : fffff801
43652800 00000000
00000000 ffffdd0c
14642a30 fffff801
43650bc0 : nt!KiPageFault+0x469
ffff9a8d
06c5a170 fffff801
430975af : ffffc584
0a83c000 ffff8a8e
b34b7fa0 ffffdd0c
00000000 fffff801
42cbe500 : nt!MmUnmapViewInSystemCache+0x656
ffff9a8d
06c5a290 fffff801
42cbecb6 : 00000000
00000000 ffffdd0c
14849da0 ffffdd0c
0d3e94e0 00000000
00000001 : nt!CcUnmapVacb+0x63
ffff9a8d
06c5a2d0 fffff801
42c2f7ba : 00000000
00100001 ffffdd0c
0d375a20 00000000
00100000 00000000
00000001 : nt!CcUnmapVacbArray+0x206
ffff9a8d
06c5a340 fffff801
42ffcb90 : 00000000
00000000 00000000
00000000 ffff9a8d
06c5a480 ffff9a8d
06c5a490 : nt!CcGetVirtualAddress+0x40a
ffff9a8d
06c5a3e0 fffff801
42c2ecf9 : 00000000
00000000 00000000
00139c00 00000000
00000000 00000000
00000001 : nt!CcMapAndCopyFromCache+0x80
ffff9a8d
06c5a480 fffff801
458d452d : ffff9a8d
06c5a5e0 00000000
00000000 ffff8a8e
00000200 00000000
00000200 : nt!CcCopyReadEx+0x139
ffff9a8d
06c5a530 fffff801
3f71738b : 00000000
00000000 ffff9a8d
06c5a908 ffff9a8d
06c5a8c8 00000257
790456a0 : Ntfs!NtfsCopyReadA+0x2ed
ffff9a8d
06c5a820 fffff801
3f7142bf : ffff9a8d
06c5a930 ffff9a8d
06c5a8c8 ffffdd0c
1767b110 ffffdd0c
1767b010 : FLTMGR!FltpPerformFastIoCall+0x16b
ffff9a8d
06c5a880 fffff801
3f74bab5 : ffff9a8d
06c5b000 ffff9a8d
06c55000 ffffdd0c
143db080 fffff801
42ff5cbe : FLTMGR!FltpPassThroughFastIo+0x25f
ffff9a8d
06c5a900 fffff801
4308c71f : ffffdd0c
188f45b0 00000000
00000000 00000000
00000000 ffffdd0c
00000000 : FLTMGR!FltpFastIoRead+0x165
ffff9a8d
06c5a9b0 fffff801
42e08cb8 : ffffdd0c
143db080 00000000
00000000 00000000
00000000 0000009d
f7e7bc08 : nt!NtReadFile+0x37f
ffff9a8d
06c5aa90 00007ffc
cee8ce34 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009d
f7e7bb48 00000000
00000000 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : 0x00007ffc`cee8ce34
SYMBOL_NAME: nt!MmUnmapViewInSystemCache+656
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 656
FAILURE_BUCKET_ID: AV_nt!MmUnmapViewInSystemCache
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {80afe466-eb8f-b487-72ea-f53cab570ee4}
Followup: MachineOwner