Код:
Loading Dump File [D:\1\MEMORY_2023-01-30.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols
Deferred symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17763 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff807`52e16000 PsLoadedModuleList = 0xfffff807`5322f430
Debug session time: Mon Jan 30 10:19:45.953 2023 (UTC + 5:00)
System Uptime: 2 days 23:48:34.823
Loading Kernel Symbols
...............................................................
................................................................
................................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`031fa018). Type ".hh dbgerr001" for details
Loading unloaded module list
...................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80eaa782ba5, 1, c0000225}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80eaa782ba5, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 00000000c0000225, Parameter 1 of the exception
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: G41M-ES2L
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F6
BIOS_DATE: 11/04/2009
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: G41M-ES2L
BASEBOARD_VERSION: x.x
DUMP_TYPE: 1
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80eaa782ba5
BUGCHECK_P3: 1
BUGCHECK_P4: c0000225
WRITE_ADDRESS: 00000000c0000225
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
Wof!WofAcquireFileSystemRundown+1
fffff80e`aa782ba5 3000 xor byte ptr [rax],al
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000000c0000225
BUGCHECK_STR: 0x1E_c0000005_W
CPU_COUNT: 2
CPU_MHZ: a8c
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 17
CPU_STEPPING: a
CPU_MICROCODE: 6,17,a,0 (F,M,S,R) SIG: A0C'00000000 (cache) A0C'00000000 (init)
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: avp.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: NICKMPC
ANALYSIS_SESSION_TIME: 02-14-2023 14:30:40.0514
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
TRAP_FRAME: 0000000000001000 -- (.trap 0x1000)
Unable to read trap frame at 00000000`00001000
LAST_CONTROL_TRANSFER: from fffff807530188d9 to fffff80752fceea0
STACK_TEXT:
ffffee0f`d8bbeb58 fffff807`530188d9 : 00000000`0000001e ffffffff`c0000005 fffff80e`aa782ba5 00000000`00000001 : nt!KeBugCheckEx
ffffee0f`d8bbeb60 fffff807`52fe2902 : 00000000`00000000 ffffee0f`d8bbf3f0 00000000`00001000 00000000`c0000225 : nt!KiDispatchException+0x180d89
ffffee0f`d8bbf210 fffff807`52fde4e8 : ffff8684`19600340 ffffee0f`d8bbf868 00000000`00000003 00000000`00002970 : nt!KiExceptionDispatch+0xc2
ffffee0f`d8bbf3f0 fffff80e`aa782ba5 : ffffee0f`d8bbf610 fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 : nt!KiPageFault+0x428
ffffee0f`d8bbf580 ffffee0f`d8bbf610 : fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 : Wof!WofAcquireFileSystemRundown+0x1
ffffee0f`d8bbf588 fffff80e`aa7818fd : ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 ffffee0f`d8bbf6a0 : 0xffffee0f`d8bbf610
ffffee0f`d8bbf590 fffff80e`a98dfca2 : ffffbc0c`09140b28 ffffee0f`d8bbf6e0 ffffee0f`00000001 00000000`00000000 : Wof!WofPreReadCallback+0x6d
ffffee0f`d8bbf650 fffff80e`a98d7389 : ffffee0f`d8bbf890 ffffee0f`d8bbfc00 00000000`00000003 fffff80e`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4d2
ffffee0f`d8bbf760 fffff80e`a98d6f6c : ffffbc0c`0b29d3b0 ffffee0f`d8bc0000 ffffee0f`d8bba000 ffffee0f`d8bbf890 : FLTMGR!FltpPerformPreCallbacks+0x79
ffffee0f`d8bbf7b0 fffff80e`a98d66f0 : ffffbc0c`091af010 00000000`00060043 ffffbc0c`091af010 ffffee0f`d8bbf8a0 : FLTMGR!FltpPassThroughInternal+0x8c
ffffee0f`d8bbf7e0 fffff80e`a98d612e : ffff8684`19ec07a0 00000000`00000000 ffff9c80`030479c0 00000000`00000000 : FLTMGR!FltpPassThrough+0x510
ffffee0f`d8bbf870 fffff807`52e43029 : ffffbc0c`091af010 fffff807`52e2232f ffffbc0c`05dff350 00000000`00000000 : FLTMGR!FltpDispatch+0x9e
ffffee0f`d8bbf8d0 fffff807`52e22218 : ffffbc0b`ffed1cd0 ffffbc0c`091af010 ffffbc0c`0b29d3e0 ffffbc0c`0b29d4a0 : nt!IofCallDriver+0x59
ffffee0f`d8bbf910 fffff807`52f395a9 : ffffbc0c`0b29d390 ffffbc0c`0b29d3b0 ffffbc0c`0b29d3f0 ffffbc0c`0b29d3e0 : nt!IoPageReadEx+0x188
ffffee0f`d8bbf960 fffff807`52e53b3d : 00000000`00000003 ffffee0f`d8bbf9f0 ffffee0f`d8bbfb58 ffff9a4d`00001dc0 : nt!MiIssueHardFaultIo+0xc1
ffffee0f`d8bbf9b0 fffff807`52e6ad5f : ffff8000`00000000 00000000`c0033333 00000000`7701a835 00000000`00000000 : nt!MiIssueHardFault+0x3ed
ffffee0f`d8bbfa60 fffff807`52fde403 : ffffbc0c`06f9c080 00000000`04981820 ffffee0f`d8bbfc80 ffffbc0c`0b2f7b60 : nt!MmAccessFault+0x32f
ffffee0f`d8bbfc00 00000000`7701a835 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x343
00000000`0693cc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7701a835
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80752e17071-fffff80752e17072 2 bytes - nt!MmFreeIndependentPages+61
[ 80 f6:00 9a ]
fffff80752e1707f - nt!MmFreeIndependentPages+6f (+0x0e)
[ fa:9c ]
fffff80752e1a568-fffff80752e1a569 2 bytes - nt!MiFlushDirtyBitsToPfn+78 (+0x34e9)
[ 80 f6:00 9a ]
fffff80752e1a5eb-fffff80752e1a5ec 2 bytes - nt!MiFlushDirtyBitsToPfn+fb (+0x83)
[ 80 f6:00 9a ]
fffff80752e1a683 - nt!MiFlushDirtyBitsToPfn+193 (+0x98)
[ fa:9c ]
fffff80752e1d9f6-fffff80752e1d9f7 2 bytes - nt!MiLockStealSystemVm+32 (+0x3373)
[ 80 f6:00 9a ]
fffff80752e1da27-fffff80752e1da28 2 bytes - nt!MiLockStealSystemVm+63 (+0x31)
[ ff f6:7f 9a ]
fffff80752e1dac1 - nt!MiLockStealSystemVm+fd (+0x9a)
[ fa:9c ]
fffff80752e204a3-fffff80752e204a4 2 bytes - nt!MiTranslatePageForCopy+83 (+0x29e2)
[ 80 f6:00 9a ]
fffff80752e205e9 - nt!MiTranslatePageForCopy+1c9 (+0x146)
[ fa:9c ]
fffff80752e2060c - nt!MiTranslatePageForCopy+1ec (+0x23)
[ fa:9c ]
fffff80752e206a9 - nt!MiTranslatePageForCopy+289 (+0x9d)
[ fa:9c ]
fffff80752e206d3 - nt!MiTranslatePageForCopy+2b3 (+0x2a)
[ fa:9c ]
fffff80752e20712-fffff80752e20713 2 bytes - nt!MiTranslatePageForCopy+2f2 (+0x3f)
[ ff f6:7f 9a ]
fffff80752e207fe-fffff80752e207ff 2 bytes - nt!MiSynchronizeSystemVa+a6 (+0xec)
[ 80 f6:00 9a ]
fffff80752e20911-fffff80752e20912 2 bytes - nt!MiSynchronizeSystemVa+1b9 (+0x113)
[ 80 f6:00 9a ]
fffff80752e209f8-fffff80752e209f9 2 bytes - nt!MiPrefetchVirtualMemory+c8 (+0xe7)
[ 80 f6:00 9a ]
fffff80752e20a02-fffff80752e20a03 2 bytes - nt!MiPrefetchVirtualMemory+d2 (+0x0a)
[ ff f6:7f 9a ]
fffff80752e20bc8-fffff80752e20bc9 2 bytes - nt!MiPrefetchVirtualMemory+298 (+0x1c6)
[ 80 f6:00 9a ]
fffff80752e20bd9-fffff80752e20bda 2 bytes - nt!MiPrefetchVirtualMemory+2a9 (+0x11)
[ ff f6:7f 9a ]
fffff80752e2296b - nt!MiWaitForInPageComplete+8b (+0x1d92)
[ fa:9c ]
fffff80752e22b2f - nt!MiWaitForInPageComplete+24f (+0x1c4)
[ fa:9c ]
fffff80752e22c97 - nt!MiWaitForInPageComplete+3b7 (+0x168)
[ fa:9c ]
fffff80752e29d9c - nt!MiMakeSystemCachePteValid+44 (+0x7105)
[ fa:9c ]
fffff80752e29dc9-fffff80752e29dca 2 bytes - nt!MiMakeSystemCachePteValid+71 (+0x2d)
[ 80 f6:00 9a ]
fffff80752e2a639-fffff80752e2a63a 2 bytes - nt!MmProtectPool+a5 (+0x870)
[ 80 f6:00 9a ]
fffff80752e2a688-fffff80752e2a689 2 bytes - nt!MmProtectPool+f4 (+0x4f)
[ 80 f6:00 9a ]
fffff80752e2a6f5 - nt!MmProtectPool+161 (+0x6d)
[ fa:9c ]
fffff80752e2a725-fffff80752e2a726 2 bytes - nt!MmProtectPool+191 (+0x30)
[ 80 f6:00 9a ]
fffff80752e2a753 - nt!MmProtectPool+1bf (+0x2e)
[ fa:9c ]
fffff80752e2a83c-fffff80752e2a83d 2 bytes - nt!MmProtectPool+2a8 (+0xe9)
[ 80 f6:00 9a ]
fffff80752e2a8da - nt!MmProtectPool+346 (+0x9e)
[ fa:9c ]
fffff80752e2aa6b-fffff80752e2aa6c 2 bytes - nt!MiSetImageProtection+1b (+0x191)
[ 80 f6:00 9a ]
fffff80752e307a6 - nt!MiIdentifyPfn+36 (+0x5d3b)
[ fa:9c ]
fffff80752e30b0c-fffff80752e30b0d 2 bytes - nt!MiIdentifyPfn+39c (+0x366)
[ 80 f6:00 9a ]
fffff80752e30be1 - nt!MiIdentifyPfn+471 (+0xd5)
[ fa:9c ]
fffff80752e30c95-fffff80752e30c96 2 bytes - nt!MiIdentifyPfn+525 (+0xb4)
[ 80 f6:00 9a ]
fffff80752e30d92-fffff80752e30d93 2 bytes - nt!MiIdentifyPfn+622 (+0xfd)
[ ff f6:7f 9a ]
fffff80752e30ebb-fffff80752e30ebc 2 bytes - nt!MiIdentifyPfn+74b (+0x129)
[ ff f6:7f 9a ]
fffff80752e31055-fffff80752e31056 2 bytes - nt!MiIdentifyPfn+8e5 (+0x19a)
[ 80 f6:00 9a ]
fffff80752e3118d - nt!MiIsPfn+1d (+0x138)
[ fa:9c ]
fffff80752e4a813 - nt!IopCompleteRequest+fb3 (+0x19686)
[ 48:88 ]
fffff80752e4ac13 - nt!IofCompleteRequest+3 (+0x400)
[ 28:68 ]
fffff80752e520a4-fffff80752e520a9 6 bytes - nt!KiInSwapProcesses+14 (+0x7491)
[ 68 df be 7d fb f6:a0 49 93 26 4d 9a ]
fffff80752e52e4c - nt!MiReferenceInPageFile+74 (+0xda8)
[ fa:9c ]
fffff80752e53204 - nt!MiUnlockMdlWritePages+54 (+0x3b8)
[ fa:9c ]
fffff80752e5334f - nt!MiUnlockMdlWritePages+19f (+0x14b)
[ fa:9c ]
fffff80752e5349e - nt!MiWriteCompletePfn+6e (+0x14f)
[ fa:9c ]
fffff80752e5387b - nt!MiIssueHardFault+12b (+0x3dd)
[ fa:9c ]
fffff80752e5395c-fffff80752e5395d 2 bytes - nt!MiIssueHardFault+20c (+0xe1)
[ 80 f6:00 9a ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
fffff80753161d0e-fffff80753161d10 3 bytes - nt!ExFreePoolWithTag+10ae
[ 40 fb f6:00 4d 9a ]
fffff80753161d19-fffff80753161d1d 5 bytes - nt!ExFreePoolWithTag+10b9 (+0x0b)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff80753161d29-fffff80753161d2d 5 bytes - nt!ExFreePoolWithTag+10c9 (+0x10)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff80753161dbe-fffff80753161dbf 2 bytes - nt!ExFreePoolWithTag+115e (+0x95)
[ 80 f6:00 9a ]
fffff80753162813 - nt!ExDeferredFreePool+73 (+0xa55)
[ 33:b0 ]
fffff80753162c13 - nt!ExAllocatePoolWithTag+2c03 (+0x400)
[ 74:37 ]
fffff807531b6813 - nt!_xmm+1e483
[ 00:80 ]
fffff807531f2813 - nt!_xmm+5a483 (+0x3c000)
[ 00:80 ]
fffff8075320e813 - nt!_xmm+76483 (+0x1c000)
[ 00:80 ]
fffff8075320ec13 - nt!_xmm+76883 (+0x400)
[ 50:10 ]
fffff80753306813 - nt!Ports <PERF> (nt+0x4f0813)
[ 00:80 ]
fffff80753342813 - nt!Ports <PERF> (nt+0x52c813) (+0x3c000)
[ 00:80 ]
fffff80753353788-fffff8075335378a 3 bytes - nt!_guard_check_icall_fptr
[ 30 ae f8:50 8d fd ]
fffff80753353790-fffff80753353792 3 bytes - nt!_guard_dispatch_icall_fptr (+0x08)
[ 70 b1 fc:a0 8d fd ]
fffff80753382005-fffff80753382009 5 bytes - nt!MiConvertHiberPhasePte+15
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff80753382014-fffff80753382018 5 bytes - nt!MiConvertHiberPhasePte+24 (+0x0f)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff80753383fa1-fffff80753383fa5 5 bytes - nt!MiUpdateUserMappings+9 (+0x1f8d)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff80753383fcc-fffff80753383fd0 5 bytes - nt!MiUpdateUserMappings+34 (+0x2b)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff80753388abb-fffff80753388abc 2 bytes - nt!MmInitializeProcessor+47 (+0x4aef)
[ 80 f6:00 9a ]
fffff807533922e3 - nt!MiMarkNonPagedHiberPhasePte+83 (+0x9828)
[ fa:9c ]
fffff8075339239e - nt!MmMarkHiberPhase+76 (+0xbb)
[ fa:9c ]
fffff807533923ab - nt!MmMarkHiberPhase+83 (+0x0d)
[ fa:9c ]
fffff80753396813 - nt!CmpCheckKeyOwnerForPca+43
[ 02:80 ]
fffff80753396c13 - nt!FsRtlpPrepareExtraCreateParametersForCreate+47 (+0x400)
[ 48:0a ]
fffff807533c02a6 - nt!MmChangeImageProtection+166 (+0x29693)
[ fa:9c ]
fffff807533c0b64-fffff807533c0b65 2 bytes - nt!MiUnloadSystemImage+6e0 (+0x8be)
[ 80 f6:00 9a ]
fffff807533d2813 - nt!EtwpUpdateFilterData+8ab (+0x11caf)
[ cc:8c ]
fffff807533d2c13 - nt!EtwpQueueNotification+5f (+0x400)
[ 0f:cc ]
fffff807533db489 - nt!PfpPfnPrioRequest+a9 (+0x8876)
[ fa:9c ]
fffff807533db4c8 - nt!PfpPfnPrioRequest+e8 (+0x3f)
[ fa:9c ]
fffff807533f5d14 - nt!MiRelocateImagePfn+94 (+0x1a84c)
[ fa:9c ]
fffff807533f5d20-fffff807533f5d21 2 bytes - nt!MiRelocateImagePfn+a0 (+0x0c)
[ 80 f6:00 9a ]
fffff807533f5d3b-fffff807533f5d3c 2 bytes - nt!MiRelocateImagePfn+bb (+0x1b)
[ ff f6:7f 9a ]
fffff807533f5d73-fffff807533f5d74 2 bytes - nt!MiRelocateImagePfn+f3 (+0x38)
[ 80 f6:00 9a ]
fffff807533f6345-fffff807533f6349 5 bytes - nt!MmHardFaultBytesRequired+55 (+0x5d2)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff807533f634f-fffff807533f6353 5 bytes - nt!MmHardFaultBytesRequired+5f (+0x0a)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff807533f7be7-fffff807533f7beb 5 bytes - nt!MmProtectVirtualMemory+307 (+0x1898)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff807533f7c01-fffff807533f7c05 5 bytes - nt!MmProtectVirtualMemory+321 (+0x1a)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff807533f7c3b-fffff807533f7c3f 5 bytes - nt!MmProtectVirtualMemory+35b (+0x3a)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff807533f9e9b-fffff807533f9e9f 5 bytes - nt!MiPfPrepareSequentialReadList+23b (+0x2260)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff807533f9eb1-fffff807533f9eb5 5 bytes - nt!MiPfPrepareSequentialReadList+251 (+0x16)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff807533fa12f-fffff807533fa133 5 bytes - nt!MiPfPrepareSequentialReadList+4cf (+0x27e)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff807533fa20b - nt!MiPfPrepareSequentialReadList+5ab (+0xdc)
[ fa:9c ]
fffff807533fa79c-fffff807533fa7a0 5 bytes - nt!MiPfPrepareReadList+1dc (+0x591)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff807533fa7a6-fffff807533fa7aa 5 bytes - nt!MiPfPrepareReadList+1e6 (+0x0a)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff807533fa94e - nt!MiPfPrepareReadList+38e (+0x1a8)
[ fa:9c ]
fffff807533faa48-fffff807533faa4c 5 bytes - nt!MiPfPrepareReadList+488 (+0xfa)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff807533faa52-fffff807533faa56 5 bytes - nt!MiPfPrepareReadList+492 (+0x0a)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff807533faff1 - nt!MiProcessCrcList+e1 (+0x59f)
[ fa:9c ]
fffff807533fb004-fffff807533fb005 2 bytes - nt!MiProcessCrcList+f4 (+0x13)
[ 80 f6:00 9a ]
fffff807533fb00e-fffff807533fb00f 2 bytes - nt!MiProcessCrcList+fe (+0x0a)
[ ff f6:7f 9a ]
fffff807533fb0cc-fffff807533fb0cd 2 bytes - nt!MiProcessCrcList+1bc (+0xbe)
[ 80 f6:00 9a ]
fffff807533fb0d6-fffff807533fb0d7 2 bytes - nt!MiProcessCrcList+1c6 (+0x0a)
[ ff f6:7f 9a ]
fffff807533fb102 - nt!MiProcessCrcList+1f2 (+0x2c)
[ fa:9c ]
fffff807533fb41f-fffff807533fb420 2 bytes - nt!MiProcessCrcList+50f (+0x31d)
[ 80 f6:00 9a ]
fffff8075340521f - nt!MiCreateImageFileMap+12b (+0x9e00)
[ fa:9c ]
fffff8075340816f-fffff80753408173 5 bytes - nt!MiParseImageSectionHeaders+36f (+0x2f50)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff80753408181-fffff80753408185 5 bytes - nt!MiParseImageSectionHeaders+381 (+0x12)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff80753408d25-fffff80753408d26 2 bytes - nt!MiPrefetchDriverPages+45 (+0xba4)
[ 80 f6:00 9a ]
fffff80753408d2c-fffff80753408d30 5 bytes - nt!MiPrefetchDriverPages+4c (+0x07)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff80753408d36-fffff80753408d3a 5 bytes - nt!MiPrefetchDriverPages+56 (+0x0a)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff80753408fc8-fffff80753408fcc 5 bytes - nt!MiChargeSegmentCommit+a8 (+0x292)
[ d0 be 7d fb f6:40 93 26 4d 9a ]
fffff80753408fd2-fffff80753408fd6 5 bytes - nt!MiChargeSegmentCommit+b2 (+0x0a)
[ d7 be 7d fb f6:47 93 26 4d 9a ]
fffff8075342e813 - nt!CmpWalkOneLevel+5a3 (+0x25841)
[ 49:88 ]
fffff8075342ec13 - nt!CmpFindSubKeyInRoot+d7 (+0x400)
[ 00:41 ]
fffff807534417c0 - nt!MiValidateImagePfn+3c (+0x12bad)
[ fa:9c ]
fffff8075344180b-fffff8075344180c 2 bytes - nt!MiValidateImagePfn+87 (+0x4b)
[ 80 f6:00 9a ]
fffff8075346a813 - nt!NtSetInformationThread+11d3 (+0x29008)
[ ed:ac ]
fffff8075346ac13 - nt!NtSetInformationThread+15d3 (+0x400)
[ e8:e9 ]
fffff80753476bde - nt!MiMapLockedPagesInUserSpace+1ca (+0xbfcb)
[ fa:9c ]
fffff8075348aa25-fffff8075348aa26 2 bytes - nt!MiFreeInitializationCode+41 (+0x13e47)
[ 80 f6:00 9a ]
fffff8075348ab94 - nt!MiFreeInitializationCode+1b0 (+0x16f)
[ fa:9c ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
7608 errors : !nt (fffff80752e17071-fffff80753706813)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2023-01-30T05:19:45.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 2655
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------