PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb903d9005a10, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80533c25a18, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JC78BRD
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 37
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb903d9005a10
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80533c25a18
BUGCHECK_P4: 2
READ_ADDRESS: fffff805346fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb903d9005a10
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff18b4ca29790 -- (.trap 0xfffff18b4ca29790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffce0c12b6b040
rdx=ffffb903d9005a10 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80533c25a18 rsp=fffff18b4ca29920 rbp=0000000000000000
r8=fffff18b4ca29970 r9=0000000000000022 r10=00000000ffffffff
r11=0000000000000088 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExAcquirePushLockExclusiveEx+0x108:
fffff805`33c25a18 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff18b`4ca294e8 fffff805`33e35c1d : 00000000`00000050 ffffb903`d9005a10 00000000`00000002 fffff18b`4ca29790 : nt!KeBugCheckEx
fffff18b`4ca294f0 fffff805`33c12ce0 : fffff18b`4ca296dc 00000000`00000002 fffff18b`4ca29810 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff18b`4ca295f0 fffff805`33debb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff18b`4ca29790 fffff805`33c25a18 : ffffce0c`12b6b040 ffffb903`d9005a10 ffffce0c`12b6b040 00000000`00000000 : nt!KiPageFault+0x35e
fffff18b`4ca29920 fffff805`33c689c6 : ffffb903`d9005a00 ffffce0c`00000000 00000000`00000000 ffffbb03`e7f76000 : nt!ExAcquirePushLockExclusiveEx+0x108
fffff18b`4ca29960 fffff805`33c66e44 : 00000000`00000001 ffff8180`427a4ad0 ffffce0c`1b19cb80 ffffce0c`1adfd640 : nt!RtlpHpAcquireLockExclusive+0x2a
fffff18b`4ca29990 fffff805`33c40a72 : ffffbb03`d9000340 00000000`400000ff 00000000`00000000 fffff18b`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244
fffff18b`4ca29a40 fffff805`343c1019 : ffffce0c`00000000 ffffce0c`1b19cb80 00000000`2a807471 01000000`00100000 : nt!ExFreeHeapPool+0x362
fffff18b`4ca29b20 fffff805`381397d7 : fffff805`3812c920 fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 : nt!ExFreePool+0x9
fffff18b`4ca29b50 fffff805`3812c920 : fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 : WdFilter+0x197d7
fffff18b`4ca29b58 fffff805`38133000 : ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 : WdFilter+0xc920
fffff18b`4ca29b60 ffffbb03`e69a3910 : 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 : WdFilter+0x13000
fffff18b`4ca29b68 00000000`00000000 : ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 00000000`00000001 : 0xffffbb03`e69a3910
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.264
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_INVALID_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7a7d19a2-c846-89a6-4e1c-40c2337eab13}
Followup: Pool_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc4680202050, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8043dc25a18, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JC78BRD
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffc4680202050
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8043dc25a18
BUGCHECK_P4: 2
READ_ADDRESS: fffff8043e6fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffffc4680202050
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Origin.exe
TRAP_FRAME: fffff889d7c91440 -- (.trap 0xfffff889d7c91440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd78facdc9080
rdx=fffffc4680202050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043dc25a18 rsp=fffff889d7c915d0 rbp=0000000000000000
r8=fffff889d7c91620 r9=0000000000000002 r10=00000000ffffffff
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExAcquirePushLockExclusiveEx+0x108:
fffff804`3dc25a18 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff889`d7c91198 fffff804`3de35c1d : 00000000`00000050 fffffc46`80202050 00000000`00000002 fffff889`d7c91440 : nt!KeBugCheckEx
fffff889`d7c911a0 fffff804`3dc12ce0 : ffffd78f`acdc9080 00000000`00000002 fffff889`d7c914c0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff889`d7c912a0 fffff804`3ddebb1e : ffffd78f`ac9e0000 00000000`3bf9e428 fffff804`3dd51a00 fffff804`3dce73cf : nt!MmAccessFault+0x400
fffff889`d7c91440 fffff804`3dc25a18 : ffffd78f`acdc9080 fffffc46`80202050 00000000`00000032 00000000`00000000 : nt!KiPageFault+0x35e
fffff889`d7c915d0 fffff804`3dc689c6 : fffffc46`80202040 00000000`00000001 ffffd78f`00000000 fffffe46`86830000 : nt!ExAcquirePushLockExclusiveEx+0x108
fffff889`d7c91610 fffff804`3dc66e44 : fffff889`d7c91749 fffff804`00000000 fffff804`3dc34810 00000000`00000001 : nt!RtlpHpAcquireLockExclusive+0x2a
fffff889`d7c91640 fffff804`3dc40a72 : fffffe46`80200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244
fffff889`d7c916f0 fffff804`3e3c1019 : fffffe46`00000000 fffffe26`c83e16b8 fffffe26`c88b9030 01000000`00100000 : nt!ExFreeHeapPool+0x362
fffff889`d7c917d0 fffffe26`c88b9082 : fffffe46`84336010 00000000`00000000 ffffd78f`acdc9000 fffff889`d7c91710 : nt!ExFreePool+0x9
fffff889`d7c91800 fffffe26`c819c487 : 00000000`00000000 fffffe46`868305c0 fffffe46`868305c0 fffffe46`86898610 : win32kfull!Win32FreePoolImpl+0x52
fffff889`d7c91830 fffffe26`c88861a3 : fffffe46`86898610 fffffe46`86898bc0 00000000`80006010 fffffe46`86898610 : win32kbase!Win32FreePool+0x37
fffff889`d7c91860 fffffe26`c888a6e8 : fffffe46`86220b90 fffffe26`c83e16b8 00000000`00000000 fffffe46`86220b90 : win32kfull!xxxProcessNotifyWinEvent+0x35f
fffff889`d7c91900 fffffe26`c888b5dc : fffffe46`86872500 00000000`00000000 fffffe46`86872500 00000000`00000000 : win32kfull!xxxProcessEventMessage+0x2e0
fffff889`d7c91c30 fffffe26`c888fbe6 : fffffe46`84336010 fffff889`d7c929d8 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0x83c
fffff889`d7c924e0 fffffe26`c888ec98 : fffff889`d7c929d8 00000000`00000000 00000000`00000000 fffff889`d7c92aa8 : win32kfull!xxxRealInternalGetMessage+0xee6
fffff889`d7c92980 fffffe26`c7e671ad : ffffd78f`acdc9080 00000000`005cde48 fffff889`d7c92aa8 00000000`00685000 : win32kfull!NtUserPeekMessage+0x158
fffff889`d7c92a40 fffff804`3ddef378 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtUserPeekMessage+0x29
fffff889`d7c92a90 00007ff9`17a0ff64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`005cde28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`17a0ff64
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.264
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_INVALID_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7a7d19a2-c846-89a6-4e1c-40c2337eab13}
Followup: Pool_corruption
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff928605b64ec8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff980201096dd0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JC78BRD
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: be
BUGCHECK_P1: ffff928605b64ec8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffff980201096dd0
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffff980201096dd0 -- (.trap 0xffff980201096dd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff928605b64eb0
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80009efedd9 rsp=ffff980201096f60 rbp=ffffc901646b8c90
r8=000000000001c6c1 r9=ffffc901646b8c90 r10=0000000000000000
r11=ffffc90000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff800`09efedd9 f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:ffff9286`05b64ec8=????????????????
Resetting default scope
STACK_TEXT:
ffff9802`01096bd8 fffff800`0a087340 : 00000000`000000be ffff9286`05b64ec8 8a000000`00200121 ffff9802`01096dd0 : nt!KeBugCheckEx
ffff9802`01096be0 fffff800`09e12dcf : 8a000000`00200121 00000000`00000003 ffff9802`01096e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffff9802`01096c30 fffff800`09febb1e : ffffc964`9fff6b78 00000000`00000000 ffff9802`010974b8 00000000`00000000 : nt!MmAccessFault+0x4ef
ffff9802`01096dd0 fffff800`09efedd9 : ffffb902`d6859700 0000000f`ffffffff 000002c8`d7192000 00000000`00000003 : nt!KiPageFault+0x35e
ffff9802`01096f60 fffff800`09ec421f : ffff9286`05b64eb0 ffff9280`00000000 ffff9286`05b64eb0 ffffb902`c984b090 : nt!MiLockSetPfnPriority+0x11
ffff9802`01096f90 fffff800`09ec39b4 : ffff9286`05b64eb0 00000000`00000000 000002c8`d7192000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef
ffff9802`01096ff0 fffff800`09e119d1 : 00000000`00000000 ffff9802`01097560 00000000`00000000 00000000`00000004 : nt!MiAgePte+0x134
ffff9802`01097080 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffff9802`01097110 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`010971a0 fffff800`09e11cf0 : ffff9802`01097560 ffffb902`d6859700 ffffc964`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`01097230 fffff800`09e0e5fb : 00000000`00000000 ffffb902`d6859700 ffff9802`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`010972c0 fffff800`09e0dee1 : ffff9802`01097560 00000000`00000000 00000000`00000002 fffff800`00000000 : nt!MiWalkPageTables+0x36b
ffff9802`010973c0 fffff800`09e0d5e9 : 00000000`00000000 00000000`00000000 ffffa680`6afc71c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffff9802`010978d0 fffff800`09e0cd97 : 00000000`00000000 ffff9802`01097a80 ffff9802`01097a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffff9802`010979c0 fffff800`09ee61b8 : fffff800`0a850a00 ffff9802`01097a80 00000000`00000171 fffff800`00020200 : nt!MiProcessWorkingSets+0x227
ffff9802`01097a60 fffff800`09fa34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff800`06241180 : nt!MiWorkingSetManager+0xb8
ffff9802`01097b20 fffff800`09f46715 : ffffb902`c9935080 00000000`00000080 fffff800`09fa3370 33480039`7992058b : nt!KeBalanceSetManager+0x157
ffff9802`01097c10 fffff800`09fe5078 : ffffa680`69aa1180 ffffb902`c9935080 fffff800`09f466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55
ffff9802`01097c60 00000000`00000000 : ffff9802`01098000 ffff9802`01092000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+14baec
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 14baec
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff858605ed7678, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa00314896dd0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JC78BRD
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: be
BUGCHECK_P1: ffff858605ed7678
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa00314896dd0
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
TRAP_FRAME: ffffa00314896dd0 -- (.trap 0xffffa00314896dd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff858605ed7660
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801616fedd9 rsp=ffffa00314896f60 rbp=ffff8c80ec014c90
r8=0000000000005ff1 r9=ffff8c80ec014c90 r10=0000000000000000
r11=ffff8c8000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff801`616fedd9 f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:ffff8586`05ed7678=????????????????
Resetting default scope
STACK_TEXT:
ffffa003`14896bd8 fffff801`61887340 : 00000000`000000be ffff8586`05ed7678 8a000000`00200121 ffffa003`14896dd0 : nt!KeBugCheckEx
ffffa003`14896be0 fffff801`61612dcf : 8a000000`00200121 00000000`00000003 ffffa003`14896e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffffa003`14896c30 fffff801`617ebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffa003`14896dd0 fffff801`616fedd9 : ffffb38a`981df940 0000000f`ffffffff 000001d8`02992000 00000000`00000003 : nt!KiPageFault+0x35e
ffffa003`14896f60 fffff801`616c421f : ffff8586`05ed7660 ffff8580`00000000 ffff8586`05ed7660 ffffb38a`8ae4b090 : nt!MiLockSetPfnPriority+0x11
ffffa003`14896f90 fffff801`616c39b4 : ffff8586`05ed7660 00000000`00000000 000001d8`02992000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef
ffffa003`14896ff0 fffff801`616119d1 : 00000000`00000000 ffffa003`14897560 00000000`00000000 00000000`00000003 : nt!MiAgePte+0x134
ffffa003`14897080 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffffa003`14897110 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`148971a0 fffff801`61611cf0 : ffffa003`14897560 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`14897230 fffff801`6160e5fb : 00000000`00000000 ffffb38a`981df940 ffffa003`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`148972c0 fffff801`6160dee1 : ffffa003`14897560 00000000`00000000 00000000`00000002 fffff801`00000000 : nt!MiWalkPageTables+0x36b
ffffa003`148973c0 fffff801`6160d5e9 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa003`148978d0 fffff801`6160cd97 : 00000000`00000000 ffffa003`14897a80 ffffa003`14897a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa003`148979c0 fffff801`616e61b8 : fffff801`62050a00 ffffa003`14897a80 00000000`00000089 ffffa181`00000200 : nt!MiProcessWorkingSets+0x227
ffffa003`14897a60 fffff801`617a34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff801`5e1bd180 : nt!MiWorkingSetManager+0xb8
ffffa003`14897b20 fffff801`61746715 : ffffb38a`8af24080 00000000`00000080 fffff801`617a3370 33480039`7992058b : nt!KeBalanceSetManager+0x157
ffffa003`14897c10 fffff801`617e5078 : ffffa181`d46a1180 ffffb38a`8af24080 fffff801`617466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55
ffffa003`14897c60 00000000`00000000 : ffffa003`14898000 ffffa003`14892000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+14baec
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 14baec
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 00000000201b7cee
Arg3: 0000000000000001
Arg4: 00000000201b7cee
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JC78BRD
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61948
BUGCHECK_P2: 201b7cee
BUGCHECK_P3: 1
BUGCHECK_P4: 201b7cee
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffffa86`5cd8ddf8 fffff804`65479de0 : 00000000`0000001a 00000000`00061948 00000000`201b7cee 00000000`00000001 : nt!KeBugCheckEx
fffffa86`5cd8de00 fffff804`652abdd3 : 00000000`002a1a02 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x15c798
fffffa86`5cd8de90 fffff804`652c1568 : fffffa86`5cd8e190 ffffa753`80838058 fffffa86`5cd8e240 00000000`00000000 : nt!MiDeletePteRun+0xff3
fffffa86`5cd8e0c0 fffff804`652c217b : fffffa86`5cd8e1f0 ffffd404`ef869700 ffffa701`0700bc78 fffffa86`5cd8e1f0 : nt!MiDeleteVaTail+0x78
fffffa86`5cd8e0f0 fffff804`652a787f : 00000000`00000000 00000000`00000060 ffffd404`ef8697c0 ffffd404`ef83c080 : nt!MiDeletePagablePteRange+0x33b
fffffa86`5cd8e570 fffff804`65666a13 : ffffd404`ef869080 00000000`00000000 ffffd404`00000000 ffffd404`00000001 : nt!MiDeleteVad+0x41f
fffffa86`5cd8e6a0 fffff804`656678b3 : ffffd404`ef7c3ac0 ffffd404`ef7c3ac0 ffffd404`ec4d07f0 ffffd404`ef869080 : nt!MiCleanVad+0x43
fffffa86`5cd8e6d0 fffff804`656b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd404`ef869080 : nt!MmCleanProcessAddressSpace+0x137
fffffa86`5cd8e750 fffff804`655e8c32 : ffffd404`ef869080 ffff8000`dc11c060 fffffa86`5cd8e990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffffa86`5cd8e7d0 fffff804`656f4c98 : ffffd404`c0000374 00000000`00000001 fffffa86`5cd8e9e0 0000004d`6d4ae000 : nt!PspExitThread+0x5f6
fffffa86`5cd8e8d0 fffff804`6522a4e7 : 00000000`40d00088 00000000`00000000 00000000`00000000 fffff804`65214bb6 : nt!KiSchedulerApcTerminate+0x38
fffffa86`5cd8e910 fffff804`653e1fc0 : 0000004d`6f5ff568 fffffa86`5cd8e9c0 fffffa86`5cd8eb80 7fffffff`00000000 : nt!KiDeliverApc+0x487
fffffa86`5cd8e9c0 fffff804`653ef41f : ffffd404`ef83c080 ffffd404`ec910e60 fffffa86`5cd8eb18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
fffffa86`5cd8eb00 00007ffe`5dacae14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000004d`6f5ff538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5dacae14
SYMBOL_NAME: nt!MiDereferenceIoPages+15c798
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 15c798
FAILURE_BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {16899f95-043e-78ea-0aba-e664d76c4fc5}
Followup: MachineOwner
---------
Testi yapmıştım windows üzerinde sorun çıktı sonra Valorant şüphelendim sildim sonra tekrar test ettim sorun çıkmadı. Sabah beri değişik mavi ekran hatası yiyordum. Sorun Valorant oyunu sanırsam sildim sonra test ettim sorun çıkmadı.Memtest86 ile USB üzerinden RAM hata testi yapar mısın? Bir de ne olur ne olmaz HDD Sentinel ile bad sector testi yapıp sağlığına falan bak diskin.
Kod:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffb903d9005a10, memory referenced. Arg2: 0000000000000002, value 0 = read operation, 1 = write operation. Arg3: fffff80533c25a18, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 4 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-JC78BRD Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 37 Key : Analysis.Memory.CommitPeak.Mb Value: 72 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffb903d9005a10 BUGCHECK_P2: 2 BUGCHECK_P3: fffff80533c25a18 BUGCHECK_P4: 2 READ_ADDRESS: fffff805346fa388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffb903d9005a10 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff18b4ca29790 -- (.trap 0xfffff18b4ca29790) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffce0c12b6b040 rdx=ffffb903d9005a10 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80533c25a18 rsp=fffff18b4ca29920 rbp=0000000000000000 r8=fffff18b4ca29970 r9=0000000000000022 r10=00000000ffffffff r11=0000000000000088 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!ExAcquirePushLockExclusiveEx+0x108: fffff805`33c25a18 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=???????????????? Resetting default scope STACK_TEXT: fffff18b`4ca294e8 fffff805`33e35c1d : 00000000`00000050 ffffb903`d9005a10 00000000`00000002 fffff18b`4ca29790 : nt!KeBugCheckEx fffff18b`4ca294f0 fffff805`33c12ce0 : fffff18b`4ca296dc 00000000`00000002 fffff18b`4ca29810 00000000`00000000 : nt!MiSystemFault+0x1ad4ed fffff18b`4ca295f0 fffff805`33debb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400 fffff18b`4ca29790 fffff805`33c25a18 : ffffce0c`12b6b040 ffffb903`d9005a10 ffffce0c`12b6b040 00000000`00000000 : nt!KiPageFault+0x35e fffff18b`4ca29920 fffff805`33c689c6 : ffffb903`d9005a00 ffffce0c`00000000 00000000`00000000 ffffbb03`e7f76000 : nt!ExAcquirePushLockExclusiveEx+0x108 fffff18b`4ca29960 fffff805`33c66e44 : 00000000`00000001 ffff8180`427a4ad0 ffffce0c`1b19cb80 ffffce0c`1adfd640 : nt!RtlpHpAcquireLockExclusive+0x2a fffff18b`4ca29990 fffff805`33c40a72 : ffffbb03`d9000340 00000000`400000ff 00000000`00000000 fffff18b`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244 fffff18b`4ca29a40 fffff805`343c1019 : ffffce0c`00000000 ffffce0c`1b19cb80 00000000`2a807471 01000000`00100000 : nt!ExFreeHeapPool+0x362 fffff18b`4ca29b20 fffff805`381397d7 : fffff805`3812c920 fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 : nt!ExFreePool+0x9 fffff18b`4ca29b50 fffff805`3812c920 : fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 : WdFilter+0x197d7 fffff18b`4ca29b58 fffff805`38133000 : ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 : WdFilter+0xc920 fffff18b`4ca29b60 ffffbb03`e69a3910 : 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 : WdFilter+0x13000 fffff18b`4ca29b68 00000000`00000000 : ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 00000000`00000001 : 0xffffbb03`e69a3910 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.264 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: AV_INVALID_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7a7d19a2-c846-89a6-4e1c-40c2337eab13} Followup: Pool_corruption ---------Kod:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffc4680202050, memory referenced. Arg2: 0000000000000002, value 0 = read operation, 1 = write operation. Arg3: fffff8043dc25a18, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 6 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-JC78BRD Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 9 Key : Analysis.Memory.CommitPeak.Mb Value: 86 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: fffffc4680202050 BUGCHECK_P2: 2 BUGCHECK_P3: fffff8043dc25a18 BUGCHECK_P4: 2 READ_ADDRESS: fffff8043e6fa388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse fffffc4680202050 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Origin.exe TRAP_FRAME: fffff889d7c91440 -- (.trap 0xfffff889d7c91440) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffd78facdc9080 rdx=fffffc4680202050 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8043dc25a18 rsp=fffff889d7c915d0 rbp=0000000000000000 r8=fffff889d7c91620 r9=0000000000000002 r10=00000000ffffffff r11=000000000000000e r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!ExAcquirePushLockExclusiveEx+0x108: fffff804`3dc25a18 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=???????????????? Resetting default scope STACK_TEXT: fffff889`d7c91198 fffff804`3de35c1d : 00000000`00000050 fffffc46`80202050 00000000`00000002 fffff889`d7c91440 : nt!KeBugCheckEx fffff889`d7c911a0 fffff804`3dc12ce0 : ffffd78f`acdc9080 00000000`00000002 fffff889`d7c914c0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed fffff889`d7c912a0 fffff804`3ddebb1e : ffffd78f`ac9e0000 00000000`3bf9e428 fffff804`3dd51a00 fffff804`3dce73cf : nt!MmAccessFault+0x400 fffff889`d7c91440 fffff804`3dc25a18 : ffffd78f`acdc9080 fffffc46`80202050 00000000`00000032 00000000`00000000 : nt!KiPageFault+0x35e fffff889`d7c915d0 fffff804`3dc689c6 : fffffc46`80202040 00000000`00000001 ffffd78f`00000000 fffffe46`86830000 : nt!ExAcquirePushLockExclusiveEx+0x108 fffff889`d7c91610 fffff804`3dc66e44 : fffff889`d7c91749 fffff804`00000000 fffff804`3dc34810 00000000`00000001 : nt!RtlpHpAcquireLockExclusive+0x2a fffff889`d7c91640 fffff804`3dc40a72 : fffffe46`80200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244 fffff889`d7c916f0 fffff804`3e3c1019 : fffffe46`00000000 fffffe26`c83e16b8 fffffe26`c88b9030 01000000`00100000 : nt!ExFreeHeapPool+0x362 fffff889`d7c917d0 fffffe26`c88b9082 : fffffe46`84336010 00000000`00000000 ffffd78f`acdc9000 fffff889`d7c91710 : nt!ExFreePool+0x9 fffff889`d7c91800 fffffe26`c819c487 : 00000000`00000000 fffffe46`868305c0 fffffe46`868305c0 fffffe46`86898610 : win32kfull!Win32FreePoolImpl+0x52 fffff889`d7c91830 fffffe26`c88861a3 : fffffe46`86898610 fffffe46`86898bc0 00000000`80006010 fffffe46`86898610 : win32kbase!Win32FreePool+0x37 fffff889`d7c91860 fffffe26`c888a6e8 : fffffe46`86220b90 fffffe26`c83e16b8 00000000`00000000 fffffe46`86220b90 : win32kfull!xxxProcessNotifyWinEvent+0x35f fffff889`d7c91900 fffffe26`c888b5dc : fffffe46`86872500 00000000`00000000 fffffe46`86872500 00000000`00000000 : win32kfull!xxxProcessEventMessage+0x2e0 fffff889`d7c91c30 fffffe26`c888fbe6 : fffffe46`84336010 fffff889`d7c929d8 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0x83c fffff889`d7c924e0 fffffe26`c888ec98 : fffff889`d7c929d8 00000000`00000000 00000000`00000000 fffff889`d7c92aa8 : win32kfull!xxxRealInternalGetMessage+0xee6 fffff889`d7c92980 fffffe26`c7e671ad : ffffd78f`acdc9080 00000000`005cde48 fffff889`d7c92aa8 00000000`00685000 : win32kfull!NtUserPeekMessage+0x158 fffff889`d7c92a40 fffff804`3ddef378 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtUserPeekMessage+0x29 fffff889`d7c92a90 00007ff9`17a0ff64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`005cde28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`17a0ff64 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.264 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: AV_INVALID_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7a7d19a2-c846-89a6-4e1c-40c2337eab13} Followup: Pool_corruption ---------Kod:ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffff928605b64ec8, Virtual address for the attempted write. Arg2: 8a00000000200121, PTE contents. Arg3: ffff980201096dd0, (reserved) Arg4: 000000000000000a, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-JC78BRD Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 3 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: be BUGCHECK_P1: ffff928605b64ec8 BUGCHECK_P2: 8a00000000200121 BUGCHECK_P3: ffff980201096dd0 BUGCHECK_P4: a BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe TRAP_FRAME: ffff980201096dd0 -- (.trap 0xffff980201096dd0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffff928605b64eb0 rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80009efedd9 rsp=ffff980201096f60 rbp=ffffc901646b8c90 r8=000000000001c6c1 r9=ffffc901646b8c90 r10=0000000000000000 r11=ffffc90000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MiLockSetPfnPriority+0x11: fffff800`09efedd9 f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:ffff9286`05b64ec8=???????????????? Resetting default scope STACK_TEXT: ffff9802`01096bd8 fffff800`0a087340 : 00000000`000000be ffff9286`05b64ec8 8a000000`00200121 ffff9802`01096dd0 : nt!KeBugCheckEx ffff9802`01096be0 fffff800`09e12dcf : 8a000000`00200121 00000000`00000003 ffff9802`01096e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec ffff9802`01096c30 fffff800`09febb1e : ffffc964`9fff6b78 00000000`00000000 ffff9802`010974b8 00000000`00000000 : nt!MmAccessFault+0x4ef ffff9802`01096dd0 fffff800`09efedd9 : ffffb902`d6859700 0000000f`ffffffff 000002c8`d7192000 00000000`00000003 : nt!KiPageFault+0x35e ffff9802`01096f60 fffff800`09ec421f : ffff9286`05b64eb0 ffff9280`00000000 ffff9286`05b64eb0 ffffb902`c984b090 : nt!MiLockSetPfnPriority+0x11 ffff9802`01096f90 fffff800`09ec39b4 : ffff9286`05b64eb0 00000000`00000000 000002c8`d7192000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef ffff9802`01096ff0 fffff800`09e119d1 : 00000000`00000000 ffff9802`01097560 00000000`00000000 00000000`00000004 : nt!MiAgePte+0x134 ffff9802`01097080 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301 ffff9802`01097110 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620 ffff9802`010971a0 fffff800`09e11cf0 : ffff9802`01097560 ffffb902`d6859700 ffffc964`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620 ffff9802`01097230 fffff800`09e0e5fb : 00000000`00000000 ffffb902`d6859700 ffff9802`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620 ffff9802`010972c0 fffff800`09e0dee1 : ffff9802`01097560 00000000`00000000 00000000`00000002 fffff800`00000000 : nt!MiWalkPageTables+0x36b ffff9802`010973c0 fffff800`09e0d5e9 : 00000000`00000000 00000000`00000000 ffffa680`6afc71c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1 ffff9802`010978d0 fffff800`09e0cd97 : 00000000`00000000 ffff9802`01097a80 ffff9802`01097a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9 ffff9802`010979c0 fffff800`09ee61b8 : fffff800`0a850a00 ffff9802`01097a80 00000000`00000171 fffff800`00020200 : nt!MiProcessWorkingSets+0x227 ffff9802`01097a60 fffff800`09fa34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff800`06241180 : nt!MiWorkingSetManager+0xb8 ffff9802`01097b20 fffff800`09f46715 : ffffb902`c9935080 00000000`00000080 fffff800`09fa3370 33480039`7992058b : nt!KeBalanceSetManager+0x157 ffff9802`01097c10 fffff800`09fe5078 : ffffa680`69aa1180 ffffb902`c9935080 fffff800`09f466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55 ffff9802`01097c60 00000000`00000000 : ffff9802`01098000 ffff9802`01092000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiRaisedIrqlFault+14baec MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 14baec FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d} Followup: MachineOwner ---------Kod:ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffff858605ed7678, Virtual address for the attempted write. Arg2: 8a00000000200121, PTE contents. Arg3: ffffa00314896dd0, (reserved) Arg4: 000000000000000a, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-JC78BRD Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 3 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: be BUGCHECK_P1: ffff858605ed7678 BUGCHECK_P2: 8a00000000200121 BUGCHECK_P3: ffffa00314896dd0 BUGCHECK_P4: a BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe TRAP_FRAME: ffffa00314896dd0 -- (.trap 0xffffa00314896dd0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffff858605ed7660 rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000 rip=fffff801616fedd9 rsp=ffffa00314896f60 rbp=ffff8c80ec014c90 r8=0000000000005ff1 r9=ffff8c80ec014c90 r10=0000000000000000 r11=ffff8c8000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MiLockSetPfnPriority+0x11: fffff801`616fedd9 f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:ffff8586`05ed7678=???????????????? Resetting default scope STACK_TEXT: ffffa003`14896bd8 fffff801`61887340 : 00000000`000000be ffff8586`05ed7678 8a000000`00200121 ffffa003`14896dd0 : nt!KeBugCheckEx ffffa003`14896be0 fffff801`61612dcf : 8a000000`00200121 00000000`00000003 ffffa003`14896e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec ffffa003`14896c30 fffff801`617ebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef ffffa003`14896dd0 fffff801`616fedd9 : ffffb38a`981df940 0000000f`ffffffff 000001d8`02992000 00000000`00000003 : nt!KiPageFault+0x35e ffffa003`14896f60 fffff801`616c421f : ffff8586`05ed7660 ffff8580`00000000 ffff8586`05ed7660 ffffb38a`8ae4b090 : nt!MiLockSetPfnPriority+0x11 ffffa003`14896f90 fffff801`616c39b4 : ffff8586`05ed7660 00000000`00000000 000001d8`02992000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef ffffa003`14896ff0 fffff801`616119d1 : 00000000`00000000 ffffa003`14897560 00000000`00000000 00000000`00000003 : nt!MiAgePte+0x134 ffffa003`14897080 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301 ffffa003`14897110 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620 ffffa003`148971a0 fffff801`61611cf0 : ffffa003`14897560 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620 ffffa003`14897230 fffff801`6160e5fb : 00000000`00000000 ffffb38a`981df940 ffffa003`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620 ffffa003`148972c0 fffff801`6160dee1 : ffffa003`14897560 00000000`00000000 00000000`00000002 fffff801`00000000 : nt!MiWalkPageTables+0x36b ffffa003`148973c0 fffff801`6160d5e9 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1 ffffa003`148978d0 fffff801`6160cd97 : 00000000`00000000 ffffa003`14897a80 ffffa003`14897a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9 ffffa003`148979c0 fffff801`616e61b8 : fffff801`62050a00 ffffa003`14897a80 00000000`00000089 ffffa181`00000200 : nt!MiProcessWorkingSets+0x227 ffffa003`14897a60 fffff801`617a34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff801`5e1bd180 : nt!MiWorkingSetManager+0xb8 ffffa003`14897b20 fffff801`61746715 : ffffb38a`8af24080 00000000`00000080 fffff801`617a3370 33480039`7992058b : nt!KeBalanceSetManager+0x157 ffffa003`14897c10 fffff801`617e5078 : ffffa181`d46a1180 ffffb38a`8af24080 fffff801`617466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55 ffffa003`14897c60 00000000`00000000 : ffffa003`14898000 ffffa003`14892000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiRaisedIrqlFault+14baec MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 14baec FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d} Followup: MachineOwner ---------Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061948, The subtype of the bugcheck. Arg2: 00000000201b7cee Arg3: 0000000000000001 Arg4: 00000000201b7cee Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-JC78BRD Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 16 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 61948 BUGCHECK_P2: 201b7cee BUGCHECK_P3: 1 BUGCHECK_P4: 201b7cee BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe STACK_TEXT: fffffa86`5cd8ddf8 fffff804`65479de0 : 00000000`0000001a 00000000`00061948 00000000`201b7cee 00000000`00000001 : nt!KeBugCheckEx fffffa86`5cd8de00 fffff804`652abdd3 : 00000000`002a1a02 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x15c798 fffffa86`5cd8de90 fffff804`652c1568 : fffffa86`5cd8e190 ffffa753`80838058 fffffa86`5cd8e240 00000000`00000000 : nt!MiDeletePteRun+0xff3 fffffa86`5cd8e0c0 fffff804`652c217b : fffffa86`5cd8e1f0 ffffd404`ef869700 ffffa701`0700bc78 fffffa86`5cd8e1f0 : nt!MiDeleteVaTail+0x78 fffffa86`5cd8e0f0 fffff804`652a787f : 00000000`00000000 00000000`00000060 ffffd404`ef8697c0 ffffd404`ef83c080 : nt!MiDeletePagablePteRange+0x33b fffffa86`5cd8e570 fffff804`65666a13 : ffffd404`ef869080 00000000`00000000 ffffd404`00000000 ffffd404`00000001 : nt!MiDeleteVad+0x41f fffffa86`5cd8e6a0 fffff804`656678b3 : ffffd404`ef7c3ac0 ffffd404`ef7c3ac0 ffffd404`ec4d07f0 ffffd404`ef869080 : nt!MiCleanVad+0x43 fffffa86`5cd8e6d0 fffff804`656b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd404`ef869080 : nt!MmCleanProcessAddressSpace+0x137 fffffa86`5cd8e750 fffff804`655e8c32 : ffffd404`ef869080 ffff8000`dc11c060 fffffa86`5cd8e990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b fffffa86`5cd8e7d0 fffff804`656f4c98 : ffffd404`c0000374 00000000`00000001 fffffa86`5cd8e9e0 0000004d`6d4ae000 : nt!PspExitThread+0x5f6 fffffa86`5cd8e8d0 fffff804`6522a4e7 : 00000000`40d00088 00000000`00000000 00000000`00000000 fffff804`65214bb6 : nt!KiSchedulerApcTerminate+0x38 fffffa86`5cd8e910 fffff804`653e1fc0 : 0000004d`6f5ff568 fffffa86`5cd8e9c0 fffffa86`5cd8eb80 7fffffff`00000000 : nt!KiDeliverApc+0x487 fffffa86`5cd8e9c0 fffff804`653ef41f : ffffd404`ef83c080 ffffd404`ec910e60 fffffa86`5cd8eb18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70 fffffa86`5cd8eb00 00007ffe`5dacae14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 0000004d`6f5ff538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5dacae14 SYMBOL_NAME: nt!MiDereferenceIoPages+15c798 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 15c798 FAILURE_BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {16899f95-043e-78ea-0aba-e664d76c4fc5} Followup: MachineOwner ---------Kod:
Windows üzerinden değil, USB üzerinden Memtest86 ile yap diyoruz. Ama o bile sorun bulduysa sorun RAM'lerde belli zaten.
RAM ile Valorant ilişiği olduğunu hiç sanmıyorum, oyun teste etki ediyor. Memtest ile yaparsan etki edecek bir şey olmadığı için nesnel ve güvenilir bir sonuç çıkacaktır. Yapmam diyorsan sen bilirsin.
Test ediyorum. Evet sülalesi gibi sorun buldu. Çözümü nedir? İlk başlarda sorun yoktu sonrada olmayı başladı.RAM ile Valorant ilişiği olduğunu hiç sanmıyorum, oyun teste etki ediyor. Memtest ile yaparsan etki edecek bir şey olmadığı için nesnel ve güvenilir bir sonuç çıkacaktır. Yapmam diyorsan sen bilirsin.
RAM arızalı zaten hata verdiyse. RAM değiştirmeniz lazım yani.
Deneyin bakalım. Hata bulduysa çaresi yok benim bildiğim kadarıyla. Araştırabilirsiniz kendiniz de. @Murat5038 gelince detaylı bilgi verir.Daha yeni aldım. Sonradan olmayı başladı nasıl arızalı olmayı başlıyor yapmayın şunu. Şu an BIOS sıfırladım ve RAM yer değiştirdim. Bir daha test yapacağım.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.