Имя пользователя:
Пароль:  
Помощь | Регистрация | Забыли пароль?  

Показать сообщение отдельно

Аватара для NickM

Ветеран


Contributor


Сообщения: 4264
Благодарности: 999

Профиль | Отправить PM | Цитировать


Цитата esitapov70:
И куда дальше копать? Где искать причину синего экрана? »
Попробуйте временно отключить/ пересоздать свап-файл.
Может какая защита рьяно работает?

Цитата esitapov70:
Чей-то WinDbg сильно врет. »


От 14го:
Скрытый текст
Код: Выделить весь код
Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\1\MEMORY_2023-02-14.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols
Deferred                                       symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 10 Kernel Version 17763 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff804`20409000 PsLoadedModuleList = 0xfffff804`20822430
Debug session time: Tue Feb 14 10:47:51.295 2023 (UTC + 5:00)
System Uptime: 0 days 0:17:38.165
Loading Kernel Symbols
...Page 200003c9b too large to be in the dump file.
............................................................
........................Page 2001081d0 too large to be in the dump file.
........................................
...........................Page 20010dc0f too large to be in the dump file.
...................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000086`086ea018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {1, 2, 1, fffff8042042e813}

Probably caused by : memory_corruption

Followup:     memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042042e813, address which referenced memory

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  G41M-ES2L

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F6

BIOS_DATE:  11/04/2009

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  G41M-ES2L

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  1

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8042042e813

WORKER_ROUTINE: 
+0
00000000`00000001 ??              ???

WORK_ITEM:  fffff8042042e813

CURRENT_IRQL:  2

CPU_COUNT: 2

CPU_MHZ: a8c

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CPU_MICROCODE: 6,17,a,0 (F,M,S,R)  SIG: A0C'00000000 (cache) A0C'00000000 (init)

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  csrss.exe

ANALYSIS_SESSION_HOST:  NICKMPC

ANALYSIS_SESSION_TIME:  02-16-2023 12:38:57.0142

ANALYSIS_VERSION: 10.0.10586.567 amd64fre

DPC_STACK_BASE:  FFFFFD0D97230FB0

TRAP_FRAME:  fffffd0d97230ad0 -- (.trap 0xfffffd0d97230ad0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042042e813 rsp=fffffd0d97230c60 rbp=fffffd0d97230d60
 r8=0000000000000029  r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiExecuteAllDpcs+0x313:
fffff804`2042e813 2020            and     byte ptr [rax],ah ds:00000000`00000001=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804205d5829 to fffff804205c1ea0

STACK_TEXT:  
fffffd0d`97230988 fffff804`205d5829 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffd0d`97230990 fffff804`205d150e : ffff9b88`0213d668 ffff958f`d1eb9c40 00000000`00000001 fffffd0d`97230e70 : nt!KiBugCheckDispatch+0x69
fffffd0d`97230ad0 fffff804`2042e813 : ffffa600`bb802f80 ffff958f`d18bd000 00000000`00000f44 ffffa600`bb802f80 : nt!KiPageFault+0x44e
fffffd0d`97230c60 fffff804`2042de2e : ffffa600`bb800180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x313
fffffd0d`97230da0 fffff804`205ca1a5 : 00000000`00000000 ffffa600`bb800180 fffffd0d`9787d660 00000000`00000000 : nt!KiRetireDpcList+0x1ae
fffffd0d`97230fb0 fffff804`205c9f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffffd0d`9787d5b0 fffff804`205c941c : 0f0f0f0f`0f0f0f0f ffff958f`d8442158 00000000`00000000 fffffd0d`9787d6e4 : nt!KiDispatchInterruptContinue
fffffd0d`9787d5e0 fffff804`20431442 : fffff804`20430fb8 00000000`00000000 00000000`00000000 ffff958f`d68203a0 : nt!KiDpcInterrupt+0x2dc
fffffd0d`9787d778 fffff804`20430fb8 : 00000000`00000000 00000000`00000000 ffff958f`d68203a0 fffff804`20431129 : nt!MmGetSessionIdEx+0x12
fffffd0d`9787d780 ffff8220`f39e9b57 : 00000000`00000012 00000000`00000000 00000000`00000000 ffff8236`0066c050 : nt!ExReleasePushLockExclusiveEx+0x1e8
fffffd0d`9787d7e0 ffff8220`f37b82f7 : fffffd0d`9787d944 fffffd0d`9787d9f0 ffff8220`f390c400 ffffddda`1ae3f3ae : win32kbase!EnterCrit+0x1e7
fffffd0d`9787d8c0 ffff8220`f36469cb : 00000000`00000001 00000000`00000001 ffff8220`f390c400 00000000`00000004 : win32kfull!EnterLeaveCrit::EnterLeaveCrit+0x17
fffffd0d`9787d8f0 ffff8220`f39ae11e : ffff958f`d6820080 ffff958f`d6820080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0xcdb
fffffd0d`9787db50 ffff8220`f3663fd0 : ffff958f`d6820080 fffffd0d`9787dc80 00000000`00000000 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x8e
fffffd0d`9787dbd0 fffff804`205d4ff5 : ffff958f`d6820080 00000000`00000005 0000024c`b3003ff0 00000000`00000324 : win32kfull!NtUserCallNoParam+0x70
fffffd0d`9787dc00 00007ffd`b6851144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000086`0007fd48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b6851144


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8042040a072 - nt!MmFreeIndependentPages+62
	[ f6:a5 ]
    fffff8042040a07f - nt!MmFreeIndependentPages+6f (+0x0d)
	[ fa:f3 ]
    fffff8042040d569 - nt!MiFlushDirtyBitsToPfn+79 (+0x34ea)
	[ f6:a5 ]
    fffff8042040d5ec - nt!MiFlushDirtyBitsToPfn+fc (+0x83)
	[ f6:a5 ]
    fffff8042040d683 - nt!MiFlushDirtyBitsToPfn+193 (+0x97)
	[ fa:f3 ]
    fffff804204109f7 - nt!MiLockStealSystemVm+33 (+0x3374)
	[ f6:a5 ]
    fffff80420410a28 - nt!MiLockStealSystemVm+64 (+0x31)
	[ f6:a5 ]
    fffff80420410ac1 - nt!MiLockStealSystemVm+fd (+0x99)
	[ fa:f3 ]
    fffff804204134a4 - nt!MiTranslatePageForCopy+84 (+0x29e3)
	[ f6:a5 ]
    fffff804204135e9 - nt!MiTranslatePageForCopy+1c9 (+0x145)
	[ fa:f3 ]
    fffff8042041360c - nt!MiTranslatePageForCopy+1ec (+0x23)
	[ fa:f3 ]
    fffff804204136a9 - nt!MiTranslatePageForCopy+289 (+0x9d)
	[ fa:f3 ]
    fffff804204136d3 - nt!MiTranslatePageForCopy+2b3 (+0x2a)
	[ fa:f3 ]
    fffff80420413713 - nt!MiTranslatePageForCopy+2f3 (+0x40)
	[ f6:a5 ]
    fffff804204137ff - nt!MiSynchronizeSystemVa+a7 (+0xec)
	[ f6:a5 ]
    fffff80420413912 - nt!MiSynchronizeSystemVa+1ba (+0x113)
	[ f6:a5 ]
    fffff804204139f9 - nt!MiPrefetchVirtualMemory+c9 (+0xe7)
	[ f6:a5 ]
    fffff80420413a03 - nt!MiPrefetchVirtualMemory+d3 (+0x0a)
	[ f6:a5 ]
    fffff80420413bc9 - nt!MiPrefetchVirtualMemory+299 (+0x1c6)
	[ f6:a5 ]
    fffff80420413bda - nt!MiPrefetchVirtualMemory+2aa (+0x11)
	[ f6:a5 ]
    fffff8042041596b - nt!MiWaitForInPageComplete+8b (+0x1d91)
	[ fa:f3 ]
    fffff80420415b2f - nt!MiWaitForInPageComplete+24f (+0x1c4)
	[ fa:f3 ]
    fffff80420415c97 - nt!MiWaitForInPageComplete+3b7 (+0x168)
	[ fa:f3 ]
    fffff8042041cd9c - nt!MiMakeSystemCachePteValid+44 (+0x7105)
	[ fa:f3 ]
    fffff8042041cdca - nt!MiMakeSystemCachePteValid+72 (+0x2e)
	[ f6:a5 ]
    fffff8042041d63a - nt!MmProtectPool+a6 (+0x870)
	[ f6:a5 ]
    fffff8042041d689 - nt!MmProtectPool+f5 (+0x4f)
	[ f6:a5 ]
    fffff8042041d6f5 - nt!MmProtectPool+161 (+0x6c)
	[ fa:f3 ]
    fffff8042041d726 - nt!MmProtectPool+192 (+0x31)
	[ f6:a5 ]
    fffff8042041d753 - nt!MmProtectPool+1bf (+0x2d)
	[ fa:f3 ]
    fffff8042041d83d - nt!MmProtectPool+2a9 (+0xea)
	[ f6:a5 ]
    fffff8042041d8da - nt!MmProtectPool+346 (+0x9d)
	[ fa:f3 ]
    fffff8042041da6c - nt!MiSetImageProtection+1c (+0x192)
	[ f6:a5 ]
    fffff804204237a6 - nt!MiIdentifyPfn+36 (+0x5d3a)
	[ fa:f3 ]
    fffff80420423b0d - nt!MiIdentifyPfn+39d (+0x367)
	[ f6:a5 ]
    fffff80420423be1 - nt!MiIdentifyPfn+471 (+0xd4)
	[ fa:f3 ]
    fffff80420423c96 - nt!MiIdentifyPfn+526 (+0xb5)
	[ f6:a5 ]
    fffff80420423d93 - nt!MiIdentifyPfn+623 (+0xfd)
	[ f6:a5 ]
    fffff80420423ebc - nt!MiIdentifyPfn+74c (+0x129)
	[ f6:a5 ]
    fffff80420424056 - nt!MiIdentifyPfn+8e6 (+0x19a)
	[ f6:a5 ]
    fffff8042042418d - nt!MiIsPfn+1d (+0x137)
	[ fa:f3 ]
    fffff8042042e813 - nt!KiExecuteAllDpcs+313 (+0xa686)
	[ a1:20 ]
    fffff8042042ec13 - nt!EtwpLogKernelEvent+283 (+0x400)
	[ 8b:89 ]
    fffff804204450a4-fffff804204450a9  6 bytes - nt!KiInSwapProcesses+14 (+0x16491)
	[ 68 df be 7d fb f6:58 ba 74 e9 d2 a5 ]
    fffff80420445e4c - nt!MiReferenceInPageFile+74 (+0xda8)
	[ fa:f3 ]
    fffff80420446204 - nt!MiUnlockMdlWritePages+54 (+0x3b8)
	[ fa:f3 ]
    fffff8042044634f - nt!MiUnlockMdlWritePages+19f (+0x14b)
	[ fa:f3 ]
    fffff8042044649e - nt!MiWriteCompletePfn+6e (+0x14f)
	[ fa:f3 ]
    fffff8042044687b - nt!MiIssueHardFault+12b (+0x3dd)
	[ fa:f3 ]
    fffff8042044695d - nt!MiIssueHardFault+20d (+0xe2)
	[ f6:a5 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
    fffff80420754d0e-fffff80420754d10  3 bytes - nt!ExFreePoolWithTag+10ae
	[ 40 fb f6:c0 d2 a5 ]
    fffff80420754d19-fffff80420754d1d  5 bytes - nt!ExFreePoolWithTag+10b9 (+0x0b)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff80420754d29-fffff80420754d2d  5 bytes - nt!ExFreePoolWithTag+10c9 (+0x10)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff80420754dbf - nt!ExFreePoolWithTag+115f (+0x96)
	[ f6:a5 ]
    fffff80420796c13 - nt!_xmm+b883
	[ e0:20 ]
    fffff80420946788-fffff8042094678a  3 bytes - nt!_guard_check_icall_fptr
	[ 30 de 57:50 bd 5c ]
    fffff80420946790-fffff80420946792  3 bytes - nt!_guard_dispatch_icall_fptr (+0x08)
	[ 70 e1 5b:a0 bd 5c ]
    fffff80420975005-fffff80420975009  5 bytes - nt!MiConvertHiberPhasePte+15
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff80420975014-fffff80420975018  5 bytes - nt!MiConvertHiberPhasePte+24 (+0x0f)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff80420976fa1-fffff80420976fa5  5 bytes - nt!MiUpdateUserMappings+9 (+0x1f8d)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff80420976fcc-fffff80420976fd0  5 bytes - nt!MiUpdateUserMappings+34 (+0x2b)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff8042097babc - nt!MmInitializeProcessor+48 (+0x4af0)
	[ f6:a5 ]
    fffff804209852e3 - nt!MiMarkNonPagedHiberPhasePte+83 (+0x9827)
	[ fa:f3 ]
    fffff8042098539e - nt!MmMarkHiberPhase+76 (+0xbb)
	[ fa:f3 ]
    fffff804209853ab - nt!MmMarkHiberPhase+83 (+0x0d)
	[ fa:f3 ]
    fffff804209b32a6 - nt!MmChangeImageProtection+166
	[ fa:f3 ]
    fffff804209b3b65 - nt!MiUnloadSystemImage+6e1 (+0x8bf)
	[ f6:a5 ]
    fffff804209b6c13 - nt!PfSnBuildDumpFromTrace+4b (+0x30ae)
	[ 44:04 ]
    fffff804209ce489 - nt!PfpPfnPrioRequest+a9 (+0x17876)
	[ fa:f3 ]
    fffff804209ce4c8 - nt!PfpPfnPrioRequest+e8 (+0x3f)
	[ fa:f3 ]
    fffff804209e8d14 - nt!MiRelocateImagePfn+94 (+0x1a84c)
	[ fa:f3 ]
    fffff804209e8d21 - nt!MiRelocateImagePfn+a1 (+0x0d)
	[ f6:a5 ]
    fffff804209e8d3c - nt!MiRelocateImagePfn+bc (+0x1b)
	[ f6:a5 ]
    fffff804209e8d74 - nt!MiRelocateImagePfn+f4 (+0x38)
	[ f6:a5 ]
    fffff804209e9345-fffff804209e9349  5 bytes - nt!MmHardFaultBytesRequired+55 (+0x5d1)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209e934f-fffff804209e9353  5 bytes - nt!MmHardFaultBytesRequired+5f (+0x0a)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209eabe7-fffff804209eabeb  5 bytes - nt!MmProtectVirtualMemory+307 (+0x1898)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209eac01-fffff804209eac05  5 bytes - nt!MmProtectVirtualMemory+321 (+0x1a)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209eac3b-fffff804209eac3f  5 bytes - nt!MmProtectVirtualMemory+35b (+0x3a)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209ece9b-fffff804209ece9f  5 bytes - nt!MiPfPrepareSequentialReadList+23b (+0x2260)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209eceb1-fffff804209eceb5  5 bytes - nt!MiPfPrepareSequentialReadList+251 (+0x16)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209ed12f-fffff804209ed133  5 bytes - nt!MiPfPrepareSequentialReadList+4cf (+0x27e)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209ed20b - nt!MiPfPrepareSequentialReadList+5ab (+0xdc)
	[ fa:f3 ]
    fffff804209ed79c-fffff804209ed7a0  5 bytes - nt!MiPfPrepareReadList+1dc (+0x591)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209ed7a6-fffff804209ed7aa  5 bytes - nt!MiPfPrepareReadList+1e6 (+0x0a)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209ed94e - nt!MiPfPrepareReadList+38e (+0x1a8)
	[ fa:f3 ]
    fffff804209eda48-fffff804209eda4c  5 bytes - nt!MiPfPrepareReadList+488 (+0xfa)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209eda52-fffff804209eda56  5 bytes - nt!MiPfPrepareReadList+492 (+0x0a)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209edff1 - nt!MiProcessCrcList+e1 (+0x59f)
	[ fa:f3 ]
    fffff804209ee005 - nt!MiProcessCrcList+f5 (+0x14)
	[ f6:a5 ]
    fffff804209ee00f - nt!MiProcessCrcList+ff (+0x0a)
	[ f6:a5 ]
    fffff804209ee0cd - nt!MiProcessCrcList+1bd (+0xbe)
	[ f6:a5 ]
    fffff804209ee0d7 - nt!MiProcessCrcList+1c7 (+0x0a)
	[ f6:a5 ]
    fffff804209ee102 - nt!MiProcessCrcList+1f2 (+0x2b)
	[ fa:f3 ]
    fffff804209ee420 - nt!MiProcessCrcList+510 (+0x31e)
	[ f6:a5 ]
    fffff804209f2813 - nt!MmManagePartitionMemoryInformation+19f (+0x43f3)
	[ 49:08 ]
    fffff804209f2c13 - nt!PspAllocateProcess+73 (+0x400)
	[ ac:6d ]
    fffff804209f821f - nt!MiCreateImageFileMap+12b (+0x560c)
	[ fa:f3 ]
    fffff804209fb16f-fffff804209fb173  5 bytes - nt!MiParseImageSectionHeaders+36f (+0x2f50)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209fb181-fffff804209fb185  5 bytes - nt!MiParseImageSectionHeaders+381 (+0x12)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209fbd26 - nt!MiPrefetchDriverPages+46 (+0xba5)
	[ f6:a5 ]
    fffff804209fbd2c-fffff804209fbd30  5 bytes - nt!MiPrefetchDriverPages+4c (+0x06)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209fbd36-fffff804209fbd3a  5 bytes - nt!MiPrefetchDriverPages+56 (+0x0a)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff804209fbfc8-fffff804209fbfcc  5 bytes - nt!MiChargeSegmentCommit+a8 (+0x292)
	[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
    fffff804209fbfd2-fffff804209fbfd6  5 bytes - nt!MiChargeSegmentCommit+b2 (+0x0a)
	[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
    fffff80420a347c0 - nt!MiValidateImagePfn+3c (+0x387ee)
	[ fa:f3 ]
    fffff80420a3480c - nt!MiValidateImagePfn+88 (+0x4c)
	[ f6:a5 ]
    fffff80420a4a813 - nt!EtwpAddRegEntryToGroup+143 (+0x16007)
	[ 44:04 ]
    fffff80420a4ac13 - nt!EtwpAddRegEntryToGroup+543 (+0x400)
	[ 8b:48 ]
    fffff80420a69bde - nt!MiMapLockedPagesInUserSpace+1ca (+0x1efcb)
	[ fa:f3 ]
    fffff80420a7da26 - nt!MiFreeInitializationCode+42 (+0x13e48)
	[ f6:a5 ]
    fffff80420a7db94 - nt!MiFreeInitializationCode+1b0 (+0x16e)
	[ fa:f3 ]
    fffff80420a7ed19 - nt!MiAllocateDriverPage+c5 (+0x1185)
	[ fa:f3 ]
    fffff80420a83540 - nt!MmCreateProcessAddressSpace+1a0 (+0x4827)
	[ f6:a5 ]
    fffff80420a8355b-fffff80420a83560  6 bytes - nt!MmCreateProcessAddressSpace+1bb (+0x1b)
	[ 68 df be 7d fb f6:58 ba 74 e9 d2 a5 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
6583 errors : !nt (fffff8042040a072-fffff80420cfac13)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2023-02-14T05:47:51.000Z

OSBUILD:  17763

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 25e9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

Последний раз редактировалось NickM, 16-02-2023 в 10:54.


Отправлено: 10:41, 16-02-2023 | #2722