*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80533e4baf9, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 53846
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: d0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80533e4baf9
READ_ADDRESS: fffff805348fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000000d0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
DPC_STACK_BASE: FFFFF80537496FB0
TRAP_FRAME: fffff80537496740 -- (.trap 0xfffff80537496740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffce83ab017080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80533e4baf9 rsp=fffff805374968d0 rbp=fffff805374969b1
r8=fffff80537496a68 r9=0000000000000000 r10=0000000000000fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiChooseTargetProcessor+0x89:
fffff805`33e4baf9 410fb683d0000000 movzx eax,byte ptr [r11+0D0h] ds:00000000`000000d0=??
Resetting default scope
STACK_TEXT:
fffff805`374965f8 fffff805`34007a69 : 00000000`0000000a 00000000`000000d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`37496600 fffff805`34003d69 : 00000000`00000000 fffff805`3749682c 00000000`a0324300 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`37496740 fffff805`33e4baf9 : ffffce83`9562c1b0 ffffce83`9562c1b0 00000000`00000000 fffff805`00000000 : nt!KiPageFault+0x469
fffff805`374968d0 fffff805`33e4addb : fffff805`37496a02 ffffce83`9a285738 00000000`00000000 fffff805`36797091 : nt!KiChooseTargetProcessor+0x89
fffff805`37496a10 fffff805`33e44c4d : 00000000`0005b80a fffff805`37496e60 00000000`00000080 fffff805`2ef2a180 : nt!KiDeferredReadySingleThread+0x28b
fffff805`37496c00 fffff805`33e45030 : fffff805`2ef2a180 00000000`00000000 ffffce83`ab0171f0 ffffce83`9a479ba0 : nt!KiReadyThread+0x4d
fffff805`37496c30 fffff805`33e072e9 : fffff805`2ef2a180 00000000`00000000 00000000`00000008 00000000`0005b80a : nt!KiProcessExpiredTimerList+0x290
fffff805`37496d20 fffff805`33ffcac5 : 00000000`00000000 fffff805`2ef2a180 fffff805`348f39e0 00000000`0a85e508 : nt!KiRetireDpcList+0x9d9
fffff805`37496fb0 fffff805`33ffc8b0 : fffff805`33ff1b70 fffff805`33eec5ca 00000000`00000000 00000000`2029f7f4 : nt!KxRetireDpcList+0x5
ffffc909`6a11eac0 fffff805`33ffc165 : 00000000`0a85e508 fffff805`33ff7b11 00000000`2029f6d0 ffffce83`9ea020c0 : nt!KiDispatchInterruptContinue
ffffc909`6a11eaf0 fffff805`33ff7b11 : 00000000`2029f6d0 ffffce83`9ea020c0 ffffc909`6a11eb18 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc909`6a11eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
SYMBOL_NAME: nt!KiChooseTargetProcessor+89
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 89
FAILURE_BUCKET_ID: AV_nt!KiChooseTargetProcessor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73fcfa5f-3a46-b7e6-d0fb-72b61d4db0b4}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8056e7a8068, Virtual address for the attempted execute.
Arg2: 8000000195136929, PTE contents.
Arg3: ffffd50e245f15d0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 134860
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: fc
BUGCHECK_P1: fffff8056e7a8068
BUGCHECK_P2: 8000000195136929
BUGCHECK_P3: ffffd50e245f15d0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: BEService.exe
TRAP_FRAME: ffffd50e245f15d0 -- (.trap 0xffffd50e245f15d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001400f8783 rbx=0000000000000000 rcx=00000000000af286
rdx=fffff80570de8783 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056e7a8068 rsp=ffffd50e245f1760 rbp=0000000000000084
r8=ffffffff0260de4f r9=ffffd50e245f1980 r10=fffff8056e7a8068
r11=fffff80570de87e7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
fffff805`6e7a8068 0000 add byte ptr [rax],al ds:00000001`400f8783=??
Resetting default scope
STACK_TEXT:
ffffd50e`245f12e8 fffff805`1bc718f0 : 00000000`000000fc fffff805`6e7a8068 80000001`95136929 ffffd50e`245f15d0 : nt!KeBugCheckEx
ffffd50e`245f12f0 fffff805`1ba2aed6 : fffff805`6e7a8068 ffffd50e`245f14f0 ffffd50e`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffd50e`245f1330 fffff805`1ba0c960 : 00000000`00000111 00000000`00000011 ffffd50e`245f1650 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffd50e`245f1430 fffff805`1bc03c5e : ffffffff`fd8190d1 ffffd50e`245f1650 ffffffff`ffff0850 00000000`00000001 : nt!MmAccessFault+0x400
ffffd50e`245f15d0 fffff805`6e7a8068 : 00000000`00000000 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 : nt!KiPageFault+0x35e
ffffd50e`245f1760 00000000`00000000 : 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 ffffd782`aa735a90 : 0xfffff805`6e7a8068
SYMBOL_NAME: nt!MiCheckSystemNxFault+159368
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 159368
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner
---------
Bana bildirim gelsin diye bu mesajı yazdım.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80533e4baf9, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 53846
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: d0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80533e4baf9
READ_ADDRESS: fffff805348fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
fffff8053480f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000000d0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
DPC_STACK_BASE: FFFFF80537496FB0
TRAP_FRAME: fffff80537496740 -- (.trap 0xfffff80537496740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffce83ab017080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80533e4baf9 rsp=fffff805374968d0 rbp=fffff805374969b1
r8=fffff80537496a68 r9=0000000000000000 r10=0000000000000fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiChooseTargetProcessor+0x89:
fffff805`33e4baf9 410fb683d0000000 movzx eax,byte ptr [r11+0D0h] ds:00000000`000000d0=??
Resetting default scope
STACK_TEXT:
fffff805`374965f8 fffff805`34007a69 : 00000000`0000000a 00000000`000000d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`37496600 fffff805`34003d69 : 00000000`00000000 fffff805`3749682c 00000000`a0324300 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`37496740 fffff805`33e4baf9 : ffffce83`9562c1b0 ffffce83`9562c1b0 00000000`00000000 fffff805`00000000 : nt!KiPageFault+0x469
fffff805`374968d0 fffff805`33e4addb : fffff805`37496a02 ffffce83`9a285738 00000000`00000000 fffff805`36797091 : nt!KiChooseTargetProcessor+0x89
fffff805`37496a10 fffff805`33e44c4d : 00000000`0005b80a fffff805`37496e60 00000000`00000080 fffff805`2ef2a180 : nt!KiDeferredReadySingleThread+0x28b
fffff805`37496c00 fffff805`33e45030 : fffff805`2ef2a180 00000000`00000000 ffffce83`ab0171f0 ffffce83`9a479ba0 : nt!KiReadyThread+0x4d
fffff805`37496c30 fffff805`33e072e9 : fffff805`2ef2a180 00000000`00000000 00000000`00000008 00000000`0005b80a : nt!KiProcessExpiredTimerList+0x290
fffff805`37496d20 fffff805`33ffcac5 : 00000000`00000000 fffff805`2ef2a180 fffff805`348f39e0 00000000`0a85e508 : nt!KiRetireDpcList+0x9d9
fffff805`37496fb0 fffff805`33ffc8b0 : fffff805`33ff1b70 fffff805`33eec5ca 00000000`00000000 00000000`2029f7f4 : nt!KxRetireDpcList+0x5
ffffc909`6a11eac0 fffff805`33ffc165 : 00000000`0a85e508 fffff805`33ff7b11 00000000`2029f6d0 ffffce83`9ea020c0 : nt!KiDispatchInterruptContinue
ffffc909`6a11eaf0 fffff805`33ff7b11 : 00000000`2029f6d0 ffffce83`9ea020c0 ffffc909`6a11eb18 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc909`6a11eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
SYMBOL_NAME: nt!KiChooseTargetProcessor+89
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 89
FAILURE_BUCKET_ID: AV_nt!KiChooseTargetProcessor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73fcfa5f-3a46-b7e6-d0fb-72b61d4db0b4}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8056e7a8068, Virtual address for the attempted execute.
Arg2: 8000000195136929, PTE contents.
Arg3: ffffd50e245f15d0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 134860
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: fc
BUGCHECK_P1: fffff8056e7a8068
BUGCHECK_P2: 8000000195136929
BUGCHECK_P3: ffffd50e245f15d0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: BEService.exe
TRAP_FRAME: ffffd50e245f15d0 -- (.trap 0xffffd50e245f15d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001400f8783 rbx=0000000000000000 rcx=00000000000af286
rdx=fffff80570de8783 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056e7a8068 rsp=ffffd50e245f1760 rbp=0000000000000084
r8=ffffffff0260de4f r9=ffffd50e245f1980 r10=fffff8056e7a8068
r11=fffff80570de87e7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
fffff805`6e7a8068 0000 add byte ptr [rax],al ds:00000001`400f8783=??
Resetting default scope
STACK_TEXT:
ffffd50e`245f12e8 fffff805`1bc718f0 : 00000000`000000fc fffff805`6e7a8068 80000001`95136929 ffffd50e`245f15d0 : nt!KeBugCheckEx
ffffd50e`245f12f0 fffff805`1ba2aed6 : fffff805`6e7a8068 ffffd50e`245f14f0 ffffd50e`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffd50e`245f1330 fffff805`1ba0c960 : 00000000`00000111 00000000`00000011 ffffd50e`245f1650 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffd50e`245f1430 fffff805`1bc03c5e : ffffffff`fd8190d1 ffffd50e`245f1650 ffffffff`ffff0850 00000000`00000001 : nt!MmAccessFault+0x400
ffffd50e`245f15d0 fffff805`6e7a8068 : 00000000`00000000 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 : nt!KiPageFault+0x35e
ffffd50e`245f1760 00000000`00000000 : 00000000`00000000 00000000`00000212 ffffd782`9f785bf0 ffffd782`aa735a90 : 0xfffff805`6e7a8068
SYMBOL_NAME: nt!MiCheckSystemNxFault+159368
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 159368
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.