ATTEMPTED_WRITE_TO_READONLY_MEMORY mavi ekran hatası

GameLoop programını kaldır tekrar yükle.

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8055f2a0000, Virtual address for the attempted write.
Arg2: 8900000430802021, PTE contents.
Arg3: ffff9a0993ea75c0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

Unable to load image \??\C:\Windows\system32\drivers\UniSafe.sys, Win32 error 0n2

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1701

BIOS_DATE:  09/12/2013

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  P8H67-M LE

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: fffff8055f2a0000

BUGCHECK_P2: 8900000430802021

BUGCHECK_P3: ffff9a0993ea75c0

BUGCHECK_P4: a

CPU_COUNT: 8

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 20'00000000 (cache) 20'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  AndroidEmulator.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-12-2020 16:28:23.0234

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff9a0993ea75c0 -- (.trap 0xffff9a0993ea75c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8055f2a0000 rbx=0000000000000000 rcx=fffff8055f2a0000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055f2cf180 rsp=ffff9a0993ea7758 rbp=ffffb383c4cff230
 r8=0000000000000000  r9=0000000000000040 r10=0000000000000020
r11=ffffb383c4cff2b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
UniSafe+0x2f180:
fffff805`5f2cf180 488911          mov     qword ptr [rcx],rdx ds:fffff805`5f2a0000=0000000300905a4d
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80562a001e7 to fffff805629c2380

STACK_TEXT: 
ffff9a09`93ea73d8 fffff805`62a001e7 : 00000000`000000be fffff805`5f2a0000 89000004`30802021 ffff9a09`93ea75c0 : nt!KeBugCheckEx
ffff9a09`93ea73e0 fffff805`628c92fa : 89000004`30802021 00000000`00000003 ffff9a09`93ea7520 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437
ffff9a09`93ea7420 fffff805`629d0420 : ffffb383`b8400340 ffffb383`b8401200 ffffb383`b8401380 ffffd6eb`000000a0 : nt!MmAccessFault+0x48a
ffff9a09`93ea75c0 fffff805`5f2cf180 : fffff805`5f2aa11b ffffb383`7ca93b60 00000000`635adbb7 f1dc14ab`635adbb7 : nt!KiPageFault+0x360
ffff9a09`93ea7758 fffff805`5f2aa11b : ffffb383`7ca93b60 00000000`635adbb7 f1dc14ab`635adbb7 6596f109`d78946cf : UniSafe+0x2f180
ffff9a09`93ea7760 ffffb383`7ca93b60 : 00000000`635adbb7 f1dc14ab`635adbb7 6596f109`d78946cf 00000000`0022c404 : UniSafe+0xa11b
ffff9a09`93ea7768 00000000`635adbb7 : f1dc14ab`635adbb7 6596f109`d78946cf 00000000`0022c404 00000000`00000080 : 0xffffb383`7ca93b60
ffff9a09`93ea7770 f1dc14ab`635adbb7 : 6596f109`d78946cf 00000000`0022c404 00000000`00000080 ffffb383`c13829f0 : 0x635adbb7
ffff9a09`93ea7778 6596f109`d78946cf : 00000000`0022c404 00000000`00000080 ffffb383`c13829f0 ffffb383`c4cff230 : 0xf1dc14ab`635adbb7
ffff9a09`93ea7780 00000000`0022c404 : 00000000`00000080 ffffb383`c13829f0 ffffb383`c4cff230 ffffb383`b8367184 : 0x6596f109`d78946cf
ffff9a09`93ea7788 00000000`00000080 : ffffb383`c13829f0 ffffb383`c4cff230 ffffb383`b8367184 fffff805`5f2e6340 : 0x22c404
ffff9a09`93ea7790 ffffb383`c13829f0 : ffffb383`c4cff230 ffffb383`b8367184 fffff805`5f2e6340 00000000`00000080 : 0x80
ffff9a09`93ea7798 ffffb383`c4cff230 : ffffb383`b8367184 fffff805`5f2e6340 00000000`00000080 ffffb383`c0113eb0 : 0xffffb383`c13829f0
ffff9a09`93ea77a0 ffffb383`b8367184 : fffff805`5f2e6340 00000000`00000080 ffffb383`c0113eb0 00000000`00000080 : 0xffffb383`c4cff230
ffff9a09`93ea77a8 fffff805`5f2e6340 : 00000000`00000080 ffffb383`c0113eb0 00000000`00000080 00000000`00000080 : 0xffffb383`b8367184
ffff9a09`93ea77b0 00000000`00000080 : ffffb383`c0113eb0 00000000`00000080 00000000`00000080 ffffb383`c7b77580 : UniSafe+0x46340
ffff9a09`93ea77b8 ffffb383`c0113eb0 : 00000000`00000080 00000000`00000080 ffffb383`c7b77580 fffff805`62eba815 : 0x80
ffff9a09`93ea77c0 00000000`00000080 : 00000000`00000080 ffffb383`c7b77580 fffff805`62eba815 ffffb383`c13829f0 : 0xffffb383`c0113eb0
ffff9a09`93ea77c8 00000000`00000080 : ffffb383`c7b77580 fffff805`62eba815 ffffb383`c13829f0 ffffb383`c7a479c0 : 0x80
ffff9a09`93ea77d0 ffffb383`c7b77580 : fffff805`62eba815 ffffb383`c13829f0 ffffb383`c7a479c0 00000000`00000000 : 0x80
ffff9a09`93ea77d8 fffff805`62eba815 : ffffb383`c13829f0 ffffb383`c7a479c0 00000000`00000000 00000000`00000000 : 0xffffb383`c7b77580
ffff9a09`93ea77e0 ffffb383`c0113eb0 : 00000000`00000001 ffffb383`c7a479c0 ffffb383`c215e2f0 ffffb383`c215e300 : nt!ObpReferenceObjectByHandleWithTag+0x235
ffff9a09`93ea7870 00000000`00000001 : ffffb383`c7a479c0 ffffb383`c215e2f0 ffffb383`c215e300 ffffb383`c7a479c0 : 0xffffb383`c0113eb0
ffff9a09`93ea7878 ffffb383`c7a479c0 : ffffb383`c215e2f0 ffffb383`c215e300 ffffb383`c7a479c0 00000000`00000001 : 0x1
ffff9a09`93ea7880 ffffb383`c215e2f0 : ffffb383`c215e300 ffffb383`c7a479c0 00000000`00000001 00000000`00000001 : 0xffffb383`c7a479c0
ffff9a09`93ea7888 ffffb383`c215e300 : ffffb383`c7a479c0 00000000`00000001 00000000`00000001 fffff805`6290aefe : 0xffffb383`c215e2f0
ffff9a09`93ea7890 ffffb383`c7a479c0 : 00000000`00000001 00000000`00000001 fffff805`6290aefe 00000000`027d2e70 : 0xffffb383`c215e300
ffff9a09`93ea7898 00000000`00000001 : 00000000`00000001 fffff805`6290aefe 00000000`027d2e70 ffffb481`6dbe2eb9 : 0xffffb383`c7a479c0
ffff9a09`93ea78a0 00000000`00000001 : fffff805`6290aefe 00000000`027d2e70 ffffb481`6dbe2eb9 00000000`00000000 : 0x1
ffff9a09`93ea78a8 fffff805`6290aefe : 00000000`027d2e70 ffffb481`6dbe2eb9 00000000`00000000 00000000`00000080 : 0x1
ffff9a09`93ea78b0 fffff805`62eb29e0 : 00000000`00000000 ffff9a09`93ea7b80 ffffb383`c0113eb0 ffff9a09`93ea7b80 : nt!IopVerifierExAllocatePoolWithQuota+0xfe
ffff9a09`93ea7900 fffff805`62eb1db6 : ffff9a09`93ea7aa8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffff9a09`93ea7a20 fffff805`629d3c18 : 00000000`06bbfda0 00000000`00293000 00000000`00000000 00007ffe`33db2960 : nt!NtDeviceIoControlFile+0x56
ffff9a09`93ea7a90 00000000`77b61cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`06bbf308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b61cbc


THREAD_SHA1_HASH_MOD_FUNC:  bcc8236b7adc06136017d8817b363070f5c05925

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a8b59a343270704987d6dc83f510779dd34e2c11

THREAD_SHA1_HASH_MOD:  a5605a56cd5bb134fe5b9213500cab5faf61fdb5

FOLLOWUP_IP:
UniSafe+2f180
fffff805`5f2cf180 488911          mov     qword ptr [rcx],rdx

FAULT_INSTR_CODE:  48118948

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  UniSafe+2f180

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: UniSafe

IMAGE_NAME:  UniSafe.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5df72f3c

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2f180

FAILURE_BUCKET_ID:  0xBE_UniSafe!unknown_function

BUCKET_ID:  0xBE_UniSafe!unknown_function

PRIMARY_PROBLEM_CLASS:  0xBE_UniSafe!unknown_function

TARGET_TIME:  2020-04-12T13:11:23.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5e70

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xbe_unisafe!unknown_function

FAILURE_ID_HASH:  {9ead2942-8e1e-0a30-1cdf-a7c5222ffc5a}

Followup:     MachineOwner
---------
 
Gameloop programını kaldır tekrar yükle.

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the.
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on.
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8055f2a0000, Virtual address for the attempted write.
Arg2: 8900000430802021, PTE contents.
Arg3: ffff9a0993ea75c0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

Unable to load image \??\C:\Windows\system32\drivers\UniSafe.sys, Win32 error 0n2.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: System manufacturer.

SYSTEM_PRODUCT_NAME: System Product Name.

SYSTEM_SKU: SKU.

SYSTEM_VERSION: System Version.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 1701.

BIOS_DATE: 09/12/2013.

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: P8H67-M LE.

BASEBOARD_VERSION: Rev X.0x.

DUMP_TYPE: 2.

BUGCHECK_P1: fffff8055f2a0000.

BUGCHECK_P2: 8900000430802021.

BUGCHECK_P3: ffff9a0993ea75c0.

BUGCHECK_P4: a.

CPU_COUNT: 8.

CPU_MHZ: d40.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 3a.

CPU_STEPPING: 9.

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 20'00000000 (cache) 20'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: 0xBE.

PROCESS_NAME: AndroidEmulator.exe.

CURRENT_IRQL: 2.

ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB.

ANALYSIS_SESSION_TIME: 04-12-2020 16:28:23.0234.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: ffff9a0993ea75c0 -- (.trap 0xffff9a0993ea75c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8055f2a0000 rbx=0000000000000000 rcx=fffff8055f2a0000.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8055f2cf180 rsp=ffff9a0993ea7758 rbp=ffffb383c4cff230.
r8=0000000000000000 r9=0000000000000040 r10=0000000000000020.
r11=ffffb383c4cff2b0 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na pe cy.
UniSafe+0x2f180:
fffff805`5f2cf180 488911 mov qword ptr [rcx],rdx ds:fffff805`5f2a0000=0000000300905a4d.
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff80562a001e7 to fffff805629c2380.

STACK_TEXT:
ffff9a09`93ea73d8 fffff805`62a001e7 : 00000000`000000be fffff805`5f2a0000 89000004`30802021 ffff9a09`93ea75c0 : nt!KeBugCheckEx.
ffff9a09`93ea73e0 fffff805`628c92fa : 89000004`30802021 00000000`00000003 ffff9a09`93ea7520 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437.
ffff9a09`93ea7420 fffff805`629d0420 : ffffb383`b8400340 ffffb383`b8401200 ffffb383`b8401380 ffffd6eb`000000a0 : nt!MmAccessFault+0x48a.
ffff9a09`93ea75c0 fffff805`5f2cf180 : fffff805`5f2aa11b ffffb383`7ca93b60 00000000`635adbb7 f1dc14ab`635adbb7 : nt!KiPageFault+0x360.
ffff9a09`93ea7758 fffff805`5f2aa11b : ffffb383`7ca93b60 00000000`635adbb7 f1dc14ab`635adbb7 6596f109`d78946cf : UniSafe+0x2f180.
ffff9a09`93ea7760 ffffb383`7ca93b60 : 00000000`635adbb7 f1dc14ab`635adbb7 6596f109`d78946cf 00000000`0022c404 : UniSafe+0xa11b.
ffff9a09`93ea7768 00000000`635adbb7 : f1dc14ab`635adbb7 6596f109`d78946cf 00000000`0022c404 00000000`00000080 : 0xffffb383`7ca93b60.
ffff9a09`93ea7770 f1dc14ab`635adbb7 : 6596f109`d78946cf 00000000`0022c404 00000000`00000080 ffffb383`c13829f0 : 0x635adbb7.
ffff9a09`93ea7778 6596f109`d78946cf : 00000000`0022c404 00000000`00000080 ffffb383`c13829f0 ffffb383`c4cff230 : 0xf1dc14ab`635adbb7.
ffff9a09`93ea7780 00000000`0022c404 : 00000000`00000080 ffffb383`c13829f0 ffffb383`c4cff230 ffffb383`b8367184 : 0x6596f109`d78946cf.
ffff9a09`93ea7788 00000000`00000080 : ffffb383`c13829f0 ffffb383`c4cff230 ffffb383`b8367184 fffff805`5f2e6340 : 0x22c404.
ffff9a09`93ea7790 ffffb383`c13829f0 : ffffb383`c4cff230 ffffb383`b8367184 fffff805`5f2e6340 00000000`00000080 : 0x80.
ffff9a09`93ea7798 ffffb383`c4cff230 : ffffb383`b8367184 fffff805`5f2e6340 00000000`00000080 ffffb383`c0113eb0 : 0xffffb383`c13829f0.
ffff9a09`93ea77a0 ffffb383`b8367184 : fffff805`5f2e6340 00000000`00000080 ffffb383`c0113eb0 00000000`00000080 : 0xffffb383`c4cff230.
ffff9a09`93ea77a8 fffff805`5f2e6340 : 00000000`00000080 ffffb383`c0113eb0 00000000`00000080 00000000`00000080 : 0xffffb383`b8367184.
ffff9a09`93ea77b0 00000000`00000080 : ffffb383`c0113eb0 00000000`00000080 00000000`00000080 ffffb383`c7b77580 : UniSafe+0x46340.
ffff9a09`93ea77b8 ffffb383`c0113eb0 : 00000000`00000080 00000000`00000080 ffffb383`c7b77580 fffff805`62eba815 : 0x80.
ffff9a09`93ea77c0 00000000`00000080 : 00000000`00000080 ffffb383`c7b77580 fffff805`62eba815 ffffb383`c13829f0 : 0xffffb383`c0113eb0.
ffff9a09`93ea77c8 00000000`00000080 : ffffb383`c7b77580 fffff805`62eba815 ffffb383`c13829f0 ffffb383`c7a479c0 : 0x80.
ffff9a09`93ea77d0 ffffb383`c7b77580 : fffff805`62eba815 ffffb383`c13829f0 ffffb383`c7a479c0 00000000`00000000 : 0x80.
ffff9a09`93ea77d8 fffff805`62eba815 : ffffb383`c13829f0 ffffb383`c7a479c0 00000000`00000000 00000000`00000000 : 0xffffb383`c7b77580.
ffff9a09`93ea77e0 ffffb383`c0113eb0 : 00000000`00000001 ffffb383`c7a479c0 ffffb383`c215e2f0 ffffb383`c215e300 : nt!ObpReferenceObjectByHandleWithTag+0x235.
ffff9a09`93ea7870 00000000`00000001 : ffffb383`c7a479c0 ffffb383`c215e2f0 ffffb383`c215e300 ffffb383`c7a479c0 : 0xffffb383`c0113eb0.
ffff9a09`93ea7878 ffffb383`c7a479c0 : ffffb383`c215e2f0 ffffb383`c215e300 ffffb383`c7a479c0 00000000`00000001 : 0x1.
ffff9a09`93ea7880 ffffb383`c215e2f0 : ffffb383`c215e300 ffffb383`c7a479c0 00000000`00000001 00000000`00000001 : 0xffffb383`c7a479c0.
ffff9a09`93ea7888 ffffb383`c215e300 : ffffb383`c7a479c0 00000000`00000001 00000000`00000001 fffff805`6290aefe : 0xffffb383`c215e2f0.
ffff9a09`93ea7890 ffffb383`c7a479c0 : 00000000`00000001 00000000`00000001 fffff805`6290aefe 00000000`027d2e70 : 0xffffb383`c215e300.
ffff9a09`93ea7898 00000000`00000001 : 00000000`00000001 fffff805`6290aefe 00000000`027d2e70 ffffb481`6dbe2eb9 : 0xffffb383`c7a479c0.
ffff9a09`93ea78a0 00000000`00000001 : fffff805`6290aefe 00000000`027d2e70 ffffb481`6dbe2eb9 00000000`00000000 : 0x1.
ffff9a09`93ea78a8 fffff805`6290aefe : 00000000`027d2e70 ffffb481`6dbe2eb9 00000000`00000000 00000000`00000080 : 0x1.
ffff9a09`93ea78b0 fffff805`62eb29e0 : 00000000`00000000 ffff9a09`93ea7b80 ffffb383`c0113eb0 ffff9a09`93ea7b80 : nt!IopVerifierExAllocatePoolWithQuota+0xfe.
ffff9a09`93ea7900 fffff805`62eb1db6 : ffff9a09`93ea7aa8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10.
ffff9a09`93ea7a20 fffff805`629d3c18 : 00000000`06bbfda0 00000000`00293000 00000000`00000000 00007ffe`33db2960 : nt!NtDeviceIoControlFile+0x56.
ffff9a09`93ea7a90 00000000`77b61cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000000`06bbf308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b61cbc.

THREAD_SHA1_HASH_MOD_FUNC: bcc8236b7adc06136017d8817b363070f5c05925.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a8b59a343270704987d6dc83f510779dd34e2c11.

THREAD_SHA1_HASH_MOD: a5605a56cd5bb134fe5b9213500cab5faf61fdb5.

FOLLOWUP_IP:
UniSafe+2f180.
fffff805`5f2cf180 488911 mov qword ptr [rcx],rdx.

FAULT_INSTR_CODE: 48118948.

SYMBOL_STACK_INDEX: 4.

SYMBOL_NAME: UniSafe+2f180.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: UniSafe.

IMAGE_NAME: UniSafe.sys.

DEBUG_FLR_IMAGE_TIMESTAMP: 5df72f3c.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2f180.

FAILURE_BUCKET_ID: 0xBE_UniSafe!unknown_function.

BUCKET_ID: 0xBE_UniSafe!unknown_function.

PRIMARY_PROBLEM_CLASS: 0xBE_UniSafe!unknown_function.

TARGET_TIME: 2020-04-12T13:11:23.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 720.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 5e70.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0xbe_unisafe!unknown_function.

FAILURE_ID_HASH: {9ead2942-8e1e-0a30-1cdf-a7c5222ffc5a}

Followup: MachineOwner.
---------
GameLoop'u kaldırdım ama bu bellek testi çok uzun sürer mi acaba?
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı