I have been dealing with this problem with my gaming pc. It will blue screen randomly with no warning. I have looked for solutions everywhere telling me its my drivers, windows update, or hardware problems. All my drivers are up to date, my windows is up to date, I have re-seated the ram, my power supply is more than what my system needs, and I can't find anything wrong with it excepted cable management. I have a AMD Ryzen 5 1500x Quad-Core Processor, 16GB of ram, BitFEniz Formula Gold 650W 80PLUS power supply, AMD RX 580 4GB graphics cards. Below I have 3 minidumps if they can shed some light on the subject!
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff803b70aca70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff803b70ac9c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: TiWorker.exe
CURRENT_IRQL: 2
BAD_PAGES_DETECTED: bd4d
LAST_CONTROL_TRANSFER: from fffff803b4e5b069 to fffff803b4e4a490
STACK_TEXT:
fffff803`b70ac748 fffff803`b4e5b069 : 00000000`00000139 00000000`00000003 fffff803`b70aca70 fffff803`b70ac9c8 : nt!KeBugCheckEx
fffff803`b70ac750 fffff803`b4e5b410 : ffff8504`f3491400 fffff803`b4ce0434 00000000`00000000 fffff806`6ca5483f : nt!KiBugCheckDispatch+0x69
fffff803`b70ac890 fffff803`b4e59a1f : 00000000`00000000 ffff8504`f7073040 fffff803`b5109240 fffff803`b4ce0434 : nt!KiFastFailDispatch+0xd0
fffff803`b70aca70 fffff803`b4e9b5a7 : 00000000`000000ff ffff8504`f0fe0000 00000000`00000000 ffff8504`f240d108 : nt!KiRaiseSecurityCheckFailure+0x2df
fffff803`b70acc00 fffff803`b4d7ec85 : fffff803`b70ace60 ffff8504`00000000 fffff803`b70ace68 fffff803`00000000 : nt!KiTimerWaitTest+0x11c687
fffff803`b70accb0 fffff803`b4d7dc67 : 00000000`00000010 00000000`00000000 00000000`00342771 00000000`00000019 : nt!KiProcessExpiredTimerList+0xb5
fffff803`b70acda0 fffff803`b4e513e5 : 00000000`00000000 fffff803`b2c48180 ffffbf0c`f718eb80 fffff803`b4c77cb0 : nt!KiRetireDpcList+0x4c7
fffff803`b70acfb0 fffff803`b4e511e0 : 0000018d`798fa210 fffff803`b4c184e6 00000000`00000000 70455509`7359319e : nt!KxRetireDpcList+0x5
ffffbf0c`f718eac0 fffff803`b4e50b15 : 96b100f8`48b0a2c1 fffff803`b4e4c2b1 0000018d`798fa210 fffff803`b4c77cb0 : nt!KiDispatchInterruptContinue
ffffbf0c`f718eaf0 fffff803`b4e4c2b1 : 0000018d`798fa210 fffff803`b4c77cb0 ffffbf0c`f718eb80 ffff8504`fa482501 : nt!KiDpcInterruptBypass+0x25
ffffbf0c`f718eb00 00007ffd`6065e39b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
0000000c`1bdffaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffd`6065e39b
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 48461 instance(s) of page corruption, target is likely to have memory corruption.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80193ca5720, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80193ca5678, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
BAD_PAGES_DETECTED: 945a
LAST_CONTROL_TRANSFER: from fffff801919ca069 to fffff801919b9490
STACK_TEXT:
fffff801`93ca53f8 fffff801`919ca069 : 00000000`00000139 00000000`00000003 fffff801`93ca5720 fffff801`93ca5678 : nt!KeBugCheckEx
fffff801`93ca5400 fffff801`919ca410 : ffff9c0e`12dfde60 fffff801`91acaa88 00000000`00000010 ffff9c0e`1697f040 : nt!KiBugCheckDispatch+0x69
fffff801`93ca5540 fffff801`919c8a1f : ffff9c0e`1283b328 fffff801`8f7ddec8 00000000`6b53f5a2 00000000`6b53f5a2 : nt!KiFastFailDispatch+0xd0
fffff801`93ca5720 fffff801`91a0a5a7 : 00000000`000000ff 00000000`00000000 fffff801`8f7d8180 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x2df
fffff801`93ca58b0 fffff801`918edc85 : fffff801`93ca5b10 00000000`00000000 fffff801`93ca5b18 00000000`00000000 : nt!KiTimerWaitTest+0x11c687
fffff801`93ca5960 fffff801`918ecc67 : 00000000`0000001e fffff801`91838a1a 00000000`00342771 00000000`00000019 : nt!KiProcessExpiredTimerList+0xb5
fffff801`93ca5a50 fffff801`919bcbca : 00000000`00000000 fffff801`8f7d8180 00000000`001a6560 fffff801`91c7a400 : nt!KiRetireDpcList+0x4c7
fffff801`93ca5c60 00000000`00000000 : fffff801`93ca6000 fffff801`93ca0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 37978 instance(s) of page corruption, target is likely to have memory corruption.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000002c0000042d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803cf71f51e, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000002c0000042d
CURRENT_IRQL: 2
FAULTING_IP:
nt!PpmCheckStart+fe
fffff803`cf71f51e 4c8b04c8 mov r8,qword ptr [rax+rcx*8]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: csrss.exe
BAD_PAGES_DETECTED: c991
TRAP_FRAME: ffffb10d49ec13a0 -- (.trap 0xffffb10d49ec13a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000002c0000042d rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803cf71f51e rsp=ffffb10d49ec1530 rbp=0000000000000001
r8=fffff803cf99ebd0 r9=0000000000000006 r10=7fffffffffffff01
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!PpmCheckStart+0xfe:
fffff803`cf71f51e 4c8b04c8 mov r8,qword ptr [rax+rcx*8] ds:0000002c`0000042d=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803cf7bc069 to fffff803cf7ab490
STACK_TEXT:
ffffb10d`49ec1258 fffff803`cf7bc069 : 00000000`0000000a 0000002c`0000042d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb10d`49ec1260 fffff803`cf7b8ce5 : 00000000`00000010 00000000`00000086 ffffb10d`49ec13c8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb10d`49ec13a0 fffff803`cf71f51e : 00000000`00000000 00000000`00000000 ffff9f8a`fb260c70 ffff9f8a`fd1c29f0 : nt!KiPageFault+0x425
ffffb10d`49ec1530 fffff803`cf74df14 : ffffb10d`49ec1600 00000000`00000000 00000000`00000000 ffffe0da`40285f68 : nt!PpmCheckStart+0xfe
ffffb10d`49ec15f0 fffff803`cf74551e : 00000000`00000000 ffffe0da`40285f68 ffff9f8a`fd1c2080 00000000`00000000 : nt!PpmCheckCustomRun+0x20
ffffb10d`49ec1620 ffffe087`1ed764d6 : 000003fc`000001cd ffffb10d`49ec1771 ffffe087`1edb5758 ffffe087`1ede4bb0 : nt!PoLatencySensitivityHint+0x13e
ffffb10d`49ec16a0 ffffe087`1ed72a36 : ffffe0da`402057f0 ffff9f8b`01c04920 00000000`00000018 ffffe0da`402057f0 : win32kbase!CMouseProcessor:😛rocessInput+0x2b6
ffffb10d`49ec17d0 ffffe087`1ed64470 : ffffe0da`402057f0 00000000`00000003 00000000`00000000 fffff803`00000000 : win32kbase!CMouseSensor:😛rocessInput+0x56
ffffb10d`49ec1810 ffffe087`1ec6018d : 00000000`00000040 00000000`00000000 00000000`00000003 ffffe0da`402057f0 : win32kbase!CBaseInput::OnReadNotification+0x80
ffffb10d`49ec1850 ffffe087`1ec5ffa2 : ffff9f8a`fd0eebc0 ffffe0da`40284210 ffffe0da`40284210 00000000`00000002 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x1bd
ffffb10d`49ec18a0 ffffe087`1ec87bd0 : ffffe087`1ede8601 00000000`00000000 ffffe087`1ede4bb0 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffb10d`49ec18d0 ffffe087`1ec87e03 : 00000000`00000004 00000000`00000000 ffffe087`1ede4bc8 00000000`0000000d : win32kbase!LegacyInputDispatcher:😀ispatch+0x88
ffffb10d`49ec1900 ffffe087`1e2429cd : ffffe0da`40284570 ffffb10d`49ec1a29 00000000`00000002 ffffe087`1ede8601 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x1e3
ffffb10d`49ec1950 ffffe087`1e242760 : 00000000`00000000 00000000`00000001 00000000`00000001 ffffe087`1ede8600 : win32kfull!xxxDesktopThreadWaiter+0x11d
ffffb10d`49ec19d0 ffffe087`1ece98f2 : ffff9f8a`fd1c2080 ffff9f8a`fd1c2080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x2c0
ffffb10d`49ec1a90 ffffe087`1e28c19e : ffff9f8a`00000001 ffffe087`1ede8600 ffff9f8a`fd1c2080 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xb2
ffffb10d`49ec1ad0 fffff803`cf7bbb43 : ffff9f8a`fd1c2080 00000000`00000005 000001cd`3ac04080 00000000`00000450 : win32kfull!NtUserCallNoParam+0x5e
ffffb10d`49ec1b00 00007fff`c5931124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000007d`ef53fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c5931124
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 51601 instance(s) of page corruption, target is likely to have memory corruption.
If anyone knows what I can do to hopefully fix this, please responds let me know!!
Thanks,
Avatar12341
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff803b70aca70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff803b70ac9c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: TiWorker.exe
CURRENT_IRQL: 2
BAD_PAGES_DETECTED: bd4d
LAST_CONTROL_TRANSFER: from fffff803b4e5b069 to fffff803b4e4a490
STACK_TEXT:
fffff803`b70ac748 fffff803`b4e5b069 : 00000000`00000139 00000000`00000003 fffff803`b70aca70 fffff803`b70ac9c8 : nt!KeBugCheckEx
fffff803`b70ac750 fffff803`b4e5b410 : ffff8504`f3491400 fffff803`b4ce0434 00000000`00000000 fffff806`6ca5483f : nt!KiBugCheckDispatch+0x69
fffff803`b70ac890 fffff803`b4e59a1f : 00000000`00000000 ffff8504`f7073040 fffff803`b5109240 fffff803`b4ce0434 : nt!KiFastFailDispatch+0xd0
fffff803`b70aca70 fffff803`b4e9b5a7 : 00000000`000000ff ffff8504`f0fe0000 00000000`00000000 ffff8504`f240d108 : nt!KiRaiseSecurityCheckFailure+0x2df
fffff803`b70acc00 fffff803`b4d7ec85 : fffff803`b70ace60 ffff8504`00000000 fffff803`b70ace68 fffff803`00000000 : nt!KiTimerWaitTest+0x11c687
fffff803`b70accb0 fffff803`b4d7dc67 : 00000000`00000010 00000000`00000000 00000000`00342771 00000000`00000019 : nt!KiProcessExpiredTimerList+0xb5
fffff803`b70acda0 fffff803`b4e513e5 : 00000000`00000000 fffff803`b2c48180 ffffbf0c`f718eb80 fffff803`b4c77cb0 : nt!KiRetireDpcList+0x4c7
fffff803`b70acfb0 fffff803`b4e511e0 : 0000018d`798fa210 fffff803`b4c184e6 00000000`00000000 70455509`7359319e : nt!KxRetireDpcList+0x5
ffffbf0c`f718eac0 fffff803`b4e50b15 : 96b100f8`48b0a2c1 fffff803`b4e4c2b1 0000018d`798fa210 fffff803`b4c77cb0 : nt!KiDispatchInterruptContinue
ffffbf0c`f718eaf0 fffff803`b4e4c2b1 : 0000018d`798fa210 fffff803`b4c77cb0 ffffbf0c`f718eb80 ffff8504`fa482501 : nt!KiDpcInterruptBypass+0x25
ffffbf0c`f718eb00 00007ffd`6065e39b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
0000000c`1bdffaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffd`6065e39b
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 48461 instance(s) of page corruption, target is likely to have memory corruption.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80193ca5720, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80193ca5678, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
BAD_PAGES_DETECTED: 945a
LAST_CONTROL_TRANSFER: from fffff801919ca069 to fffff801919b9490
STACK_TEXT:
fffff801`93ca53f8 fffff801`919ca069 : 00000000`00000139 00000000`00000003 fffff801`93ca5720 fffff801`93ca5678 : nt!KeBugCheckEx
fffff801`93ca5400 fffff801`919ca410 : ffff9c0e`12dfde60 fffff801`91acaa88 00000000`00000010 ffff9c0e`1697f040 : nt!KiBugCheckDispatch+0x69
fffff801`93ca5540 fffff801`919c8a1f : ffff9c0e`1283b328 fffff801`8f7ddec8 00000000`6b53f5a2 00000000`6b53f5a2 : nt!KiFastFailDispatch+0xd0
fffff801`93ca5720 fffff801`91a0a5a7 : 00000000`000000ff 00000000`00000000 fffff801`8f7d8180 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x2df
fffff801`93ca58b0 fffff801`918edc85 : fffff801`93ca5b10 00000000`00000000 fffff801`93ca5b18 00000000`00000000 : nt!KiTimerWaitTest+0x11c687
fffff801`93ca5960 fffff801`918ecc67 : 00000000`0000001e fffff801`91838a1a 00000000`00342771 00000000`00000019 : nt!KiProcessExpiredTimerList+0xb5
fffff801`93ca5a50 fffff801`919bcbca : 00000000`00000000 fffff801`8f7d8180 00000000`001a6560 fffff801`91c7a400 : nt!KiRetireDpcList+0x4c7
fffff801`93ca5c60 00000000`00000000 : fffff801`93ca6000 fffff801`93ca0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 37978 instance(s) of page corruption, target is likely to have memory corruption.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000002c0000042d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803cf71f51e, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000002c0000042d
CURRENT_IRQL: 2
FAULTING_IP:
nt!PpmCheckStart+fe
fffff803`cf71f51e 4c8b04c8 mov r8,qword ptr [rax+rcx*8]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: csrss.exe
BAD_PAGES_DETECTED: c991
TRAP_FRAME: ffffb10d49ec13a0 -- (.trap 0xffffb10d49ec13a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000002c0000042d rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803cf71f51e rsp=ffffb10d49ec1530 rbp=0000000000000001
r8=fffff803cf99ebd0 r9=0000000000000006 r10=7fffffffffffff01
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!PpmCheckStart+0xfe:
fffff803`cf71f51e 4c8b04c8 mov r8,qword ptr [rax+rcx*8] ds:0000002c`0000042d=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803cf7bc069 to fffff803cf7ab490
STACK_TEXT:
ffffb10d`49ec1258 fffff803`cf7bc069 : 00000000`0000000a 0000002c`0000042d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb10d`49ec1260 fffff803`cf7b8ce5 : 00000000`00000010 00000000`00000086 ffffb10d`49ec13c8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb10d`49ec13a0 fffff803`cf71f51e : 00000000`00000000 00000000`00000000 ffff9f8a`fb260c70 ffff9f8a`fd1c29f0 : nt!KiPageFault+0x425
ffffb10d`49ec1530 fffff803`cf74df14 : ffffb10d`49ec1600 00000000`00000000 00000000`00000000 ffffe0da`40285f68 : nt!PpmCheckStart+0xfe
ffffb10d`49ec15f0 fffff803`cf74551e : 00000000`00000000 ffffe0da`40285f68 ffff9f8a`fd1c2080 00000000`00000000 : nt!PpmCheckCustomRun+0x20
ffffb10d`49ec1620 ffffe087`1ed764d6 : 000003fc`000001cd ffffb10d`49ec1771 ffffe087`1edb5758 ffffe087`1ede4bb0 : nt!PoLatencySensitivityHint+0x13e
ffffb10d`49ec16a0 ffffe087`1ed72a36 : ffffe0da`402057f0 ffff9f8b`01c04920 00000000`00000018 ffffe0da`402057f0 : win32kbase!CMouseProcessor:😛rocessInput+0x2b6
ffffb10d`49ec17d0 ffffe087`1ed64470 : ffffe0da`402057f0 00000000`00000003 00000000`00000000 fffff803`00000000 : win32kbase!CMouseSensor:😛rocessInput+0x56
ffffb10d`49ec1810 ffffe087`1ec6018d : 00000000`00000040 00000000`00000000 00000000`00000003 ffffe0da`402057f0 : win32kbase!CBaseInput::OnReadNotification+0x80
ffffb10d`49ec1850 ffffe087`1ec5ffa2 : ffff9f8a`fd0eebc0 ffffe0da`40284210 ffffe0da`40284210 00000000`00000002 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x1bd
ffffb10d`49ec18a0 ffffe087`1ec87bd0 : ffffe087`1ede8601 00000000`00000000 ffffe087`1ede4bb0 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffb10d`49ec18d0 ffffe087`1ec87e03 : 00000000`00000004 00000000`00000000 ffffe087`1ede4bc8 00000000`0000000d : win32kbase!LegacyInputDispatcher:😀ispatch+0x88
ffffb10d`49ec1900 ffffe087`1e2429cd : ffffe0da`40284570 ffffb10d`49ec1a29 00000000`00000002 ffffe087`1ede8601 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x1e3
ffffb10d`49ec1950 ffffe087`1e242760 : 00000000`00000000 00000000`00000001 00000000`00000001 ffffe087`1ede8600 : win32kfull!xxxDesktopThreadWaiter+0x11d
ffffb10d`49ec19d0 ffffe087`1ece98f2 : ffff9f8a`fd1c2080 ffff9f8a`fd1c2080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x2c0
ffffb10d`49ec1a90 ffffe087`1e28c19e : ffff9f8a`00000001 ffffe087`1ede8600 ffff9f8a`fd1c2080 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xb2
ffffb10d`49ec1ad0 fffff803`cf7bbb43 : ffff9f8a`fd1c2080 00000000`00000005 000001cd`3ac04080 00000000`00000450 : win32kfull!NtUserCallNoParam+0x5e
ffffb10d`49ec1b00 00007fff`c5931124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000007d`ef53fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c5931124
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 51601 instance(s) of page corruption, target is likely to have memory corruption.
If anyone knows what I can do to hopefully fix this, please responds let me know!!
Thanks,
Avatar12341