Hi here it is the analysis of the dump file by windbg :
***
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe78c202cd763, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80360f11f34, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4592
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 65619
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 112746
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe78c202cd763
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80360f11f34
READ_ADDRESS: fffff803618fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe78c202cd763
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffff8502601d4500 -- (.trap 0xffff8502601d4500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80360c00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80360f11f34 rsp=ffff8502601d4690 rbp=ffff8502601d47c0
r8=0000000000000001 r9=0000000000000001 r10=ffffc009e83f8628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreeHeapPool+0x124:
fffff803
Resetting default scope
STACK_TEXT:
ffff8502
ffff8502
ffff8502
ffff8502
ffff8502
ffff8502
ffff8502
ffff8502
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.1052
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
Can you tell me what i should do ?
***
- *
- Bugcheck Analysis *
- *
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe78c202cd763, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80360f11f34, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4592
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 65619
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 112746
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe78c202cd763
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80360f11f34
READ_ADDRESS: fffff803618fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe78c202cd763
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffff8502601d4500 -- (.trap 0xffff8502601d4500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80360c00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80360f11f34 rsp=ffff8502601d4690 rbp=ffff8502601d47c0
r8=0000000000000001 r9=0000000000000001 r10=ffffc009e83f8628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreeHeapPool+0x124:
fffff803
60f11f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff
fffffff3=??Resetting default scope
STACK_TEXT:
ffff8502
601d43b8 fffff803
61008b69 : 000000000000000a ffffe78c
202cd763 0000000000000002 00000000
00000000 : nt!KeBugCheckExffff8502
601d43c0 fffff803
61004e69 : 0000000000000078 fffff803
00000000 ffff8502601d45d0 ffffe78c
2ff19938 : nt!KiBugCheckDispatch+0x69ffff8502
601d4500 fffff803
60f11f34 : 0000000000000001 00000000
00040286 0000000000000007 00000000
00002ae0 : nt!KiPageFault+0x469ffff8502
601d4690 fffff803
615b3149 : fffff803714c0000 ffffc009
db3e6120 0000000000000000 01000000
00100000 : nt!ExFreeHeapPool+0x124ffff8502
601d4770 fffff803
71c4ae9e : 0000000000002ae0 ffffc009
e83f8080 fffff803714c0000 00000000
00000008 : nt!ExFreePool+0x9ffff8502
601d47a0 00000000
00002ae0 : ffffc009e83f8080 fffff803
714c0000 0000000000000008 fffff803
714c0000 : vgk+0x78ae9effff8502
601d47a8 ffffc009
e83f8080 : fffff803714c0000 00000000
00000008 fffff803714c0000 00000000
00000001 : 0x2ae0ffff8502
601d47b0 fffff803
714c0000 : 0000000000000008 fffff803
714c0000 0000000000000001 00000000
00000000 : 0xffffc009e83f8080
ffff8502
601d47b8 0000000000000008 : fffff803
714c0000 0000000000000001 00000000
00000000 0000000000002ae0 : vgk
ffff8502
601d47c0 fffff803714c0000 : 00000000
00000001 0000000000000000 00000000
00002ae0 ffff8502601d4840 : 0x8
ffff8502
601d47c8 0000000000000001 : 00000000
00000000 0000000000002ae0 ffff8502
601d4840 fffff80371c04e1f : vgk
ffff8502
601d47d0 0000000000000000 : 00000000
00002ae0 ffff8502601d4840 fffff803
71c04e1f fffff803`60f60440 : 0x1SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.1052
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
Can you tell me what i should do ?