Share via

BLUE SCREEN PROBLEM

Anonymous
2024-06-21T19:27:50+00:00
  • *                        Bugcheck Analysis                                    * *                                                                             *
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe433f9cc02a8, Virtual address for the attempted write.
Arg2: 8a00000010100121, PTE contents.
Arg3: ffffe08cc71c9700, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1827

    Key  : Analysis.Elapsed.mSec
    Value: 6220

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 296

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21510

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xbe

    Key  : Bugcheck.Code.TargetModel
    Value: 0xbe

    Key  : Failure.Bucket
    Value: AV_nt!MiRaisedIrqlFault

    Key  : Failure.Hash
    Value: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffffe433f9cc02a8

BUGCHECK_P2: 8a00000010100121

BUGCHECK_P3: ffffe08cc71c9700

BUGCHECK_P4: a

FILE_IN_CAB:  062124-12718-01.dmp

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffe08cc71c9700 -- (.trap 0xffffe08cc71c9700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe433f9cc0290
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804334a82fd rsp=ffffe08cc71c9890 rbp=ffffe433f9cc0290
 r8=0000000000018011  r9=ffffb7bffdbe3948 r10=0000000000000000
r11=ffffb78000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff804`334a82fd f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffffe433`f9cc02a8=????????????????
Resetting default scope

STACK_TEXT:  
ffffe08c`c71c9508 fffff804`33676832     : 00000000`000000be ffffe433`f9cc02a8 8a000000`10100121 ffffe08c`c71c9700 : nt!KeBugCheckEx
ffffe08c`c71c9510 fffff804`3341bf1f     : 8a000000`10100121 00000000`00000003 ffffe08c`c71c9780 00000000`00000000 : nt!MiRaisedIrqlFault+0x14b34a
ffffe08c`c71c9560 fffff804`3360dc6d     : 00000000`00000001 00000000`00000000 ffffb7db`c0000260 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffe08c`c71c9700 fffff804`334a82fd     : ffffd00f`87adc700 00000000`00000001 ffffb7bf`fdbe3948 ffffb7bf`fdbe3948 : nt!KiPageFault+0x36d
ffffe08c`c71c9890 fffff804`334836e1     : ffffe180`00000000 ffffe08c`00000000 ffffe180`00000000 ffffb7bf`fdbe3920 : nt!MiLockSetPfnPriority+0x11
ffffe08c`c71c98c0 fffff804`3348350f     : ffffe08c`c71c9ee0 ffffb7bf`fdbe3948 ffffe433`f9cc0290 00000000`00000000 : nt!MiAgePteWorker+0x1a1
ffffe08c`c71c9920 fffff804`3341aeb6     : ffffe08c`c71c9ee0 ffffb7bf`fdbe3948 00000000`00000000 614fe6a8`99563e63 : nt!MiAgePte+0x51f
ffffe08c`c71c99c0 fffff804`3341afcb     : ffffb7db`00000000 ffffd00f`87adc700 00000000`00000000 ffffe08c`c71c9f30 : nt!MiWalkPageTablesRecursively+0x776
ffffe08c`c71c9a60 fffff804`3341afcb     : ffffb7db`edefff68 ffffd00f`87adc700 00000000`00000001 ffffe08c`c71c9f40 : nt!MiWalkPageTablesRecursively+0x88b
ffffe08c`c71c9b00 fffff804`3341afcb     : ffffb7db`edeff000 ffffd00f`87adc700 00000000`00000002 ffffe08c`c71c9f50 : nt!MiWalkPageTablesRecursively+0x88b
ffffe08c`c71c9ba0 fffff804`33417fcb     : 00000000`00000000 ffffd00f`87adc700 ffffe08c`00000003 ffffe08c`c71c9f60 : nt!MiWalkPageTablesRecursively+0x88b
ffffe08c`c71c9c40 fffff804`334178b1     : ffffe08c`c71c9ee0 ffffb901`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffe08c`c71c9d40 fffff804`33416fb9     : 00000000`00000000 00000000`00000000 ffffb901`f81c51c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffe08c`c71ca250 fffff804`334167c7     : 00000000`00000000 ffffe08c`c71ca400 ffffe08c`c71ca3c0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffe08c`c71ca340 fffff804`334b5f10     : fffff804`33e50c40 ffffe08c`c71ca400 00000000`000034bf ffffb901`00000200 : nt!MiProcessWorkingSets+0x227
ffffe08c`c71ca3e0 fffff804`335b8a97     : 00000000`00000004 00000000`00000004 00000000`ffffffff ffffb901`f6fc0180 : nt!MiWorkingSetManager+0x110
ffffe08c`c71ca4a0 fffff804`33548da5     : ffffd00f`6e3225c0 00000000`00000080 fffff804`335b8940 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffe08c`c71ca590 fffff804`33606b58     : ffffb901`f6e49180 ffffd00f`6e3225c0 fffff804`33548d50 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe08c`c71ca5e0 00000000`00000000     : ffffe08c`c71cb000 ffffe08c`c71c4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME:  nt!MiRaisedIrqlFault+14b34a

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.4522

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  14b34a

FAILURE_BUCKET_ID:  AV_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}

Followup:     MachineOwner
Windows for home | Windows 10 | Performance and system failures

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question.

0 comments No comments

2 answers

Sort by: Most helpful
  1. Anonymous
    2024-06-21T21:25:16+00:00
                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
    An attempt was made to write to readonly memory.  The guilty driver is on the
    stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the BugCheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: ffffe433f9cc02a8, Virtual address for the attempted write.
    Arg2: 8a00000010100121, PTE contents.
    Arg3: ffffe08cc71c9700, (reserved)
    Arg4: 000000000000000a, (reserved)
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
        Key  : Analysis.CPU.mSec
        Value: 1827
    
        Key  : Analysis.Elapsed.mSec
        Value: 6220
    
        Key  : Analysis.IO.Other.Mb
        Value: 0
    
        Key  : Analysis.IO.Read.Mb
        Value: 0
    
        Key  : Analysis.IO.Write.Mb
        Value: 0
    
        Key  : Analysis.Init.CPU.mSec
        Value: 296
    
        Key  : Analysis.Init.Elapsed.mSec
        Value: 21510
    
        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 82
    
        Key  : Bugcheck.Code.LegacyAPI
        Value: 0xbe
    
        Key  : Bugcheck.Code.TargetModel
        Value: 0xbe
    
        Key  : Failure.Bucket
        Value: AV_nt!MiRaisedIrqlFault
    
        Key  : Failure.Hash
        Value: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}
    
        Key  : WER.OS.Branch
        Value: vb_release
    
        Key  : WER.OS.Version
        Value: 10.0.19041.1
    
    
    BUGCHECK_CODE:  be
    
    BUGCHECK_P1: ffffe433f9cc02a8
    
    BUGCHECK_P2: 8a00000010100121
    
    BUGCHECK_P3: ffffe08cc71c9700
    
    BUGCHECK_P4: a
    
    FILE_IN_CAB:  062124-12718-01.dmp
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  chrome.exe
    
    TRAP_FRAME:  ffffe08cc71c9700 -- (.trap 0xffffe08cc71c9700)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=ffffe433f9cc0290
    rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff804334a82fd rsp=ffffe08cc71c9890 rbp=ffffe433f9cc0290
     r8=0000000000018011  r9=ffffb7bffdbe3948 r10=0000000000000000
    r11=ffffb78000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiLockSetPfnPriority+0x11:
    fffff804`334a82fd f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffffe433`f9cc02a8=????????????????
    Resetting default scope
    
    STACK_TEXT:  
    ffffe08c`c71c9508 fffff804`33676832     : 00000000`000000be ffffe433`f9cc02a8 8a000000`10100121 ffffe08c`c71c9700 : nt!KeBugCheckEx
    ffffe08c`c71c9510 fffff804`3341bf1f     : 8a000000`10100121 00000000`00000003 ffffe08c`c71c9780 00000000`00000000 : nt!MiRaisedIrqlFault+0x14b34a
    ffffe08c`c71c9560 fffff804`3360dc6d     : 00000000`00000001 00000000`00000000 ffffb7db`c0000260 00000000`00000000 : nt!MmAccessFault+0x4ef
    ffffe08c`c71c9700 fffff804`334a82fd     : ffffd00f`87adc700 00000000`00000001 ffffb7bf`fdbe3948 ffffb7bf`fdbe3948 : nt!KiPageFault+0x36d
    ffffe08c`c71c9890 fffff804`334836e1     : ffffe180`00000000 ffffe08c`00000000 ffffe180`00000000 ffffb7bf`fdbe3920 : nt!MiLockSetPfnPriority+0x11
    ffffe08c`c71c98c0 fffff804`3348350f     : ffffe08c`c71c9ee0 ffffb7bf`fdbe3948 ffffe433`f9cc0290 00000000`00000000 : nt!MiAgePteWorker+0x1a1
    ffffe08c`c71c9920 fffff804`3341aeb6     : ffffe08c`c71c9ee0 ffffb7bf`fdbe3948 00000000`00000000 614fe6a8`99563e63 : nt!MiAgePte+0x51f
    ffffe08c`c71c99c0 fffff804`3341afcb     : ffffb7db`00000000 ffffd00f`87adc700 00000000`00000000 ffffe08c`c71c9f30 : nt!MiWalkPageTablesRecursively+0x776
    ffffe08c`c71c9a60 fffff804`3341afcb     : ffffb7db`edefff68 ffffd00f`87adc700 00000000`00000001 ffffe08c`c71c9f40 : nt!MiWalkPageTablesRecursively+0x88b
    ffffe08c`c71c9b00 fffff804`3341afcb     : ffffb7db`edeff000 ffffd00f`87adc700 00000000`00000002 ffffe08c`c71c9f50 : nt!MiWalkPageTablesRecursively+0x88b
    ffffe08c`c71c9ba0 fffff804`33417fcb     : 00000000`00000000 ffffd00f`87adc700 ffffe08c`00000003 ffffe08c`c71c9f60 : nt!MiWalkPageTablesRecursively+0x88b
    ffffe08c`c71c9c40 fffff804`334178b1     : ffffe08c`c71c9ee0 ffffb901`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
    ffffe08c`c71c9d40 fffff804`33416fb9     : 00000000`00000000 00000000`00000000 ffffb901`f81c51c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
    ffffe08c`c71ca250 fffff804`334167c7     : 00000000`00000000 ffffe08c`c71ca400 ffffe08c`c71ca3c0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
    ffffe08c`c71ca340 fffff804`334b5f10     : fffff804`33e50c40 ffffe08c`c71ca400 00000000`000034bf ffffb901`00000200 : nt!MiProcessWorkingSets+0x227
    ffffe08c`c71ca3e0 fffff804`335b8a97     : 00000000`00000004 00000000`00000004 00000000`ffffffff ffffb901`f6fc0180 : nt!MiWorkingSetManager+0x110
    ffffe08c`c71ca4a0 fffff804`33548da5     : ffffd00f`6e3225c0 00000000`00000080 fffff804`335b8940 00000000`00000000 : nt!KeBalanceSetManager+0x157
    ffffe08c`c71ca590 fffff804`33606b58     : ffffb901`f6e49180 ffffd00f`6e3225c0 fffff804`33548d50 00000000`00000000 : nt!PspSystemThreadStartup+0x55
    ffffe08c`c71ca5e0 00000000`00000000     : ffffe08c`c71cb000 ffffe08c`c71c4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
    
    
    SYMBOL_NAME:  nt!MiRaisedIrqlFault+14b34a
    
    MODULE_NAME: nt
    
    IMAGE_VERSION:  10.0.19041.4522
    
    STACK_COMMAND:  .cxr; .ecxr ; kb
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    BUCKET_ID_FUNC_OFFSET:  14b34a
    
    FAILURE_BUCKET_ID:  AV_nt!MiRaisedIrqlFault
    
    OS_VERSION:  10.0.19041.1
    
    BUILDLAB_STR:  vb_release
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    FAILURE_ID_HASH:  {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}
    
    Followup:     MachineOwner
    

    For Windows 10:

    - First, go to this location on your computer: C:\Windows\minidump. Then, copy all the files you find there and paste them on your desktop. After that, select all the copied files then choose "Send to" then click "Compressed (Zipped) Folder".

    For Windows 11:

    - First, go to this location on your computer: C:\Windows\minidump. Then, copy all the files you find there and paste them on your desktop. After that, select all the copied files then choose "Compressed to Zip File".

    Finally, drag and drop that to google drive and share the link here

    **Note**: When I mean copy/paste i mean ctrl+c/ctrl+v

    Or much better

    - Run powershell as admin

    - type Compress-Archive -Path "C:/Windows/minidump/*" -DestinationPath "$env:USERPROFILE/Desktop/minidump.zip"

    - Press enter

    - Go to your desktop (win+r -> type %userprofile%/desktop)

    - Drag and drop the minidump.zip to google drive and share the link here

    Was this answer helpful?

    0 comments No comments
  2. Anonymous
    2024-06-21T20:01:58+00:00

    Hi, Giuseppe. I'm Robinson, and I’m happy to help you today.

    The minidump indicates that the crash was caused by a driver issue, but could not identify which driver had caused the problem.

    You can use the Driver Verifier to gather more information about which driver is causing the problem.

    Step 1: Create a system restore point. in case anything goes wrong you will be able to restore your computer. You can see how to do it at this link.

    https://support.microsoft.com/en-us/windows/cre...

    Step 2: Enable the Driver Verifier

    1-Right-click on Start then click on Windows Terminal (admin)

    2-Type this command and press Enter:

    Verifier

    3-Select "Create custom settings (for code developers)" and click Next

    4-In the "Select individual settings from a full list", select everything except "Low Resource Simulation", "and "Force Pending I/O Requests" and click Next

    5-Select "Select driver names from a list" and click Next

    6-Select everything except the driver provided by Microsoft and click on Finished

    7-Reboot your computer and use it normally until your computer crashes again

    8-Compact the new minidump, save it to OneDrive or Google Drive and share it here

    Step 3:Disable the Driver Verifier

    1-Right-click on Start then click on Windows Terminal (admin)

    2-Type this command and press Enter:

    Verifier

    3-Select "Delete existing settings" and click on Finish

    Was this answer helpful?

    0 comments No comments