* * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the BugCheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffffe433f9cc02a8, Virtual address for the attempted write. Arg2: 8a00000010100121, PTE contents. Arg3: ffffe08cc71c9700, (reserved) Arg4: 000000000000000a, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1827 Key : Analysis.Elapsed.mSec Value: 6220 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 296 Key : Analysis.Init.Elapsed.mSec Value: 21510 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Bugcheck.Code.LegacyAPI Value: 0xbe Key : Bugcheck.Code.TargetModel Value: 0xbe Key : Failure.Bucket Value: AV_nt!MiRaisedIrqlFault Key : Failure.Hash Value: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: be BUGCHECK_P1: ffffe433f9cc02a8 BUGCHECK_P2: 8a00000010100121 BUGCHECK_P3: ffffe08cc71c9700 BUGCHECK_P4: a FILE_IN_CAB: 062124-12718-01.dmp BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe TRAP_FRAME: ffffe08cc71c9700 -- (.trap 0xffffe08cc71c9700) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe433f9cc0290 rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000 rip=fffff804334a82fd rsp=ffffe08cc71c9890 rbp=ffffe433f9cc0290 r8=0000000000018011 r9=ffffb7bffdbe3948 r10=0000000000000000 r11=ffffb78000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MiLockSetPfnPriority+0x11: fffff804`334a82fd f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:ffffe433`f9cc02a8=???????????????? Resetting default scope STACK_TEXT: ffffe08c`c71c9508 fffff804`33676832 : 00000000`000000be ffffe433`f9cc02a8 8a000000`10100121 ffffe08c`c71c9700 : nt!KeBugCheckEx ffffe08c`c71c9510 fffff804`3341bf1f : 8a000000`10100121 00000000`00000003 ffffe08c`c71c9780 00000000`00000000 : nt!MiRaisedIrqlFault+0x14b34a ffffe08c`c71c9560 fffff804`3360dc6d : 00000000`00000001 00000000`00000000 ffffb7db`c0000260 00000000`00000000 : nt!MmAccessFault+0x4ef ffffe08c`c71c9700 fffff804`334a82fd : ffffd00f`87adc700 00000000`00000001 ffffb7bf`fdbe3948 ffffb7bf`fdbe3948 : nt!KiPageFault+0x36d ffffe08c`c71c9890 fffff804`334836e1 : ffffe180`00000000 ffffe08c`00000000 ffffe180`00000000 ffffb7bf`fdbe3920 : nt!MiLockSetPfnPriority+0x11 ffffe08c`c71c98c0 fffff804`3348350f : ffffe08c`c71c9ee0 ffffb7bf`fdbe3948 ffffe433`f9cc0290 00000000`00000000 : nt!MiAgePteWorker+0x1a1 ffffe08c`c71c9920 fffff804`3341aeb6 : ffffe08c`c71c9ee0 ffffb7bf`fdbe3948 00000000`00000000 614fe6a8`99563e63 : nt!MiAgePte+0x51f ffffe08c`c71c99c0 fffff804`3341afcb : ffffb7db`00000000 ffffd00f`87adc700 00000000`00000000 ffffe08c`c71c9f30 : nt!MiWalkPageTablesRecursively+0x776 ffffe08c`c71c9a60 fffff804`3341afcb : ffffb7db`edefff68 ffffd00f`87adc700 00000000`00000001 ffffe08c`c71c9f40 : nt!MiWalkPageTablesRecursively+0x88b ffffe08c`c71c9b00 fffff804`3341afcb : ffffb7db`edeff000 ffffd00f`87adc700 00000000`00000002 ffffe08c`c71c9f50 : nt!MiWalkPageTablesRecursively+0x88b ffffe08c`c71c9ba0 fffff804`33417fcb : 00000000`00000000 ffffd00f`87adc700 ffffe08c`00000003 ffffe08c`c71c9f60 : nt!MiWalkPageTablesRecursively+0x88b ffffe08c`c71c9c40 fffff804`334178b1 : ffffe08c`c71c9ee0 ffffb901`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffe08c`c71c9d40 fffff804`33416fb9 : 00000000`00000000 00000000`00000000 ffffb901`f81c51c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1 ffffe08c`c71ca250 fffff804`334167c7 : 00000000`00000000 ffffe08c`c71ca400 ffffe08c`c71ca3c0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9 ffffe08c`c71ca340 fffff804`334b5f10 : fffff804`33e50c40 ffffe08c`c71ca400 00000000`000034bf ffffb901`00000200 : nt!MiProcessWorkingSets+0x227 ffffe08c`c71ca3e0 fffff804`335b8a97 : 00000000`00000004 00000000`00000004 00000000`ffffffff ffffb901`f6fc0180 : nt!MiWorkingSetManager+0x110 ffffe08c`c71ca4a0 fffff804`33548da5 : ffffd00f`6e3225c0 00000000`00000080 fffff804`335b8940 00000000`00000000 : nt!KeBalanceSetManager+0x157 ffffe08c`c71ca590 fffff804`33606b58 : ffffb901`f6e49180 ffffd00f`6e3225c0 fffff804`33548d50 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffe08c`c71ca5e0 00000000`00000000 : ffffe08c`c71cb000 ffffe08c`c71c4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiRaisedIrqlFault+14b34a MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.4522 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 14b34a FAILURE_BUCKET_ID: AV_nt!MiRaisedIrqlFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5} Followup: MachineOwner
For Windows 10:
- First, go to this location on your computer: C:\Windows\minidump. Then, copy all the files you find there and paste them on your desktop. After that, select all the copied files then choose "Send to" then click "Compressed (Zipped) Folder".
For Windows 11:
- First, go to this location on your computer: C:\Windows\minidump. Then, copy all the files you find there and paste them on your desktop. After that, select all the copied files then choose "Compressed to Zip File".
Finally, drag and drop that to google drive and share the link here
**Note**: When I mean copy/paste i mean ctrl+c/ctrl+v
Or much better
- Run powershell as admin
- type Compress-Archive -Path "C:/Windows/minidump/*" -DestinationPath "$env:USERPROFILE/Desktop/minidump.zip"
- Press enter
- Go to your desktop (win+r -> type %userprofile%/desktop)
- Drag and drop the minidump.zip to google drive and share the link here