BSOD Bug Check

  • Thread starter Thread starter hebinGurung
  • Start date Start date
H

hebinGurung

Guest
This is happening ever since I updated the window.. Plz Help


For analysis of this file, run !analyze -v

4: kd> !analyze -v

*****************************************************************************

* *

* Bugcheck Analysis *

* *

*****************************************************************************



ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)

An attempt was made to write to readonly memory. The guilty driver is on the

stack trace (and is typically the current instruction pointer).

When possible, the guilty driver's name (Unicode string) is printed on

the bugcheck screen and saved in KiBugCheckDriver.

Arguments:

Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.

Arg2: 8a00000000200121, PTE contents.

Arg3: ffffa68f2aec0b50, (reserved)

Arg4: 000000000000000a, (reserved)



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 3



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-GI59PR5



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 184



Key : Analysis.Memory.CommitPeak.Mb

Value: 66



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: be



BUGCHECK_P1: ffffc00c0403f5a8



BUGCHECK_P2: 8a00000000200121



BUGCHECK_P3: ffffa68f2aec0b50



BUGCHECK_P4: a



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXWINLOGON: 1



PROCESS_NAME: NVIDIA Web Helper.exe



TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001

rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000

r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff

r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei ng nz ac po cy

nt!MiWsleFree+0x17e:

fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????

Resetting default scope



STACK_TEXT:

ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx

ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4

ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef

ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e

ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e

ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb

ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444

ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f

ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776

ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b

ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1

ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9

ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227

ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110

ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157

ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55

ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4



MODULE_NAME: nt



STACK_COMMAND: .thread ; .cxr ; kb



IMAGE_NAME: memory_corruption



BUCKET_ID_FUNC_OFFSET: 16ccf4



FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}



Followup: MachineOwner

---------



4: kd>

4: kd> !analyze -v

*****************************************************************************

* *

* Bugcheck Analysis *

* *

*****************************************************************************



ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)

An attempt was made to write to readonly memory. The guilty driver is on the

stack trace (and is typically the current instruction pointer).

When possible, the guilty driver's name (Unicode string) is printed on

the bugcheck screen and saved in KiBugCheckDriver.

Arguments:

Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.

Arg2: 8a00000000200121, PTE contents.

Arg3: ffffa68f2aec0b50, (reserved)

Arg4: 000000000000000a, (reserved)



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 2



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-GI59PR5



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 2



Key : Analysis.Memory.CommitPeak.Mb

Value: 67



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: be



BUGCHECK_P1: ffffc00c0403f5a8



BUGCHECK_P2: 8a00000000200121



BUGCHECK_P3: ffffa68f2aec0b50



BUGCHECK_P4: a



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXWINLOGON: 1



PROCESS_NAME: NVIDIA Web Helper.exe



TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001

rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000

r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff

r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei ng nz ac po cy

nt!MiWsleFree+0x17e:

fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????

Resetting default scope



STACK_TEXT:

ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx

ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4

ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef

ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e

ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e

ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb

ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444

ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f

ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776

ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b

ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1

ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9

ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227

ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110

ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157

ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55

ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4



MODULE_NAME: nt



STACK_COMMAND: .thread ; .cxr ; kb



IMAGE_NAME: memory_corruption



BUCKET_ID_FUNC_OFFSET: 16ccf4



FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}



Followup: MachineOwner

---------



4: kd> !analyze -v

*****************************************************************************

* *

* Bugcheck Analysis *

* *

*****************************************************************************



ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)

An attempt was made to write to readonly memory. The guilty driver is on the

stack trace (and is typically the current instruction pointer).

When possible, the guilty driver's name (Unicode string) is printed on

the bugcheck screen and saved in KiBugCheckDriver.

Arguments:

Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.

Arg2: 8a00000000200121, PTE contents.

Arg3: ffffa68f2aec0b50, (reserved)

Arg4: 000000000000000a, (reserved)



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 2



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-GI59PR5



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 2



Key : Analysis.Memory.CommitPeak.Mb

Value: 67



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: be



BUGCHECK_P1: ffffc00c0403f5a8



BUGCHECK_P2: 8a00000000200121



BUGCHECK_P3: ffffa68f2aec0b50



BUGCHECK_P4: a



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXWINLOGON: 1



PROCESS_NAME: NVIDIA Web Helper.exe



TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001

rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000

r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff

r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei ng nz ac po cy

nt!MiWsleFree+0x17e:

fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????

Resetting default scope



STACK_TEXT:

ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx

ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4

ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef

ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e

ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e

ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb

ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444

ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f

ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776

ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b

ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b

ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1

ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9

ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227

ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110

ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157

ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55

ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4



MODULE_NAME: nt



STACK_COMMAND: .thread ; .cxr ; kb



IMAGE_NAME: memory_corruption



BUCKET_ID_FUNC_OFFSET: 16ccf4



FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}



Followup: MachineOwner

---------

Continue reading...
 
Back
Top