Имя пользователя:
Пароль:  
Помощь | Регистрация | Забыли пароль?  

Показать сообщение отдельно

Аватара для NickM

Ветеран


Contributor


Сообщения: 4275
Благодарности: 1003

Профиль | Отправить PM | Цитировать


Цитата esitapov70:
А почему вы думаете, что проблема связана с файлом подкачки? »
При простом анализе видно это:
Код: Выделить весь код
MODULE_NAME: memory_corruption
Накопитель "Хитачи" у Вас чуть-чуть подуставший + некоторые из-за "мифов" переносят/ либо отключают файл подкачки на твердотельных накопителях - поэтому и спросил.

Повторюсь:
Цитата NickM:
Попробуйте на время исключить/ отключить проблемный "Hitachi". »
Если интересно, то вот вывод !analyze -v одного из дампов:
Скрытый текст
Код: Выделить весь код
Loading Dump File [D:\1\MEMORY_2023-01-30.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols
Deferred                                       symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 10 Kernel Version 17763 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff807`52e16000 PsLoadedModuleList = 0xfffff807`5322f430
Debug session time: Mon Jan 30 10:19:45.953 2023 (UTC + 5:00)
System Uptime: 2 days 23:48:34.823
Loading Kernel Symbols
...............................................................
................................................................
................................................................

Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`031fa018).  Type ".hh dbgerr001" for details
Loading unloaded module list
...................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80eaa782ba5, 1, c0000225}

Probably caused by : memory_corruption

Followup:     memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80eaa782ba5, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 00000000c0000225, Parameter 1 of the exception

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  G41M-ES2L

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F6

BIOS_DATE:  11/04/2009

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  G41M-ES2L

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  1

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80eaa782ba5

BUGCHECK_P3: 1

BUGCHECK_P4: c0000225

WRITE_ADDRESS:  00000000c0000225 

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
Wof!WofAcquireFileSystemRundown+1
fffff80e`aa782ba5 3000            xor     byte ptr [rax],al

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  00000000c0000225

BUGCHECK_STR:  0x1E_c0000005_W

CPU_COUNT: 2

CPU_MHZ: a8c

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CPU_MICROCODE: 6,17,a,0 (F,M,S,R)  SIG: A0C'00000000 (cache) A0C'00000000 (init)

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  avp.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  NICKMPC

ANALYSIS_SESSION_TIME:  02-14-2023 14:30:40.0514

ANALYSIS_VERSION: 10.0.10586.567 amd64fre

TRAP_FRAME:  0000000000001000 -- (.trap 0x1000)
Unable to read trap frame at 00000000`00001000

LAST_CONTROL_TRANSFER:  from fffff807530188d9 to fffff80752fceea0

STACK_TEXT:  
ffffee0f`d8bbeb58 fffff807`530188d9 : 00000000`0000001e ffffffff`c0000005 fffff80e`aa782ba5 00000000`00000001 : nt!KeBugCheckEx
ffffee0f`d8bbeb60 fffff807`52fe2902 : 00000000`00000000 ffffee0f`d8bbf3f0 00000000`00001000 00000000`c0000225 : nt!KiDispatchException+0x180d89
ffffee0f`d8bbf210 fffff807`52fde4e8 : ffff8684`19600340 ffffee0f`d8bbf868 00000000`00000003 00000000`00002970 : nt!KiExceptionDispatch+0xc2
ffffee0f`d8bbf3f0 fffff80e`aa782ba5 : ffffee0f`d8bbf610 fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 : nt!KiPageFault+0x428
ffffee0f`d8bbf580 ffffee0f`d8bbf610 : fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 : Wof!WofAcquireFileSystemRundown+0x1
ffffee0f`d8bbf588 fffff80e`aa7818fd : ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 ffffee0f`d8bbf6a0 : 0xffffee0f`d8bbf610
ffffee0f`d8bbf590 fffff80e`a98dfca2 : ffffbc0c`09140b28 ffffee0f`d8bbf6e0 ffffee0f`00000001 00000000`00000000 : Wof!WofPreReadCallback+0x6d
ffffee0f`d8bbf650 fffff80e`a98d7389 : ffffee0f`d8bbf890 ffffee0f`d8bbfc00 00000000`00000003 fffff80e`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4d2
ffffee0f`d8bbf760 fffff80e`a98d6f6c : ffffbc0c`0b29d3b0 ffffee0f`d8bc0000 ffffee0f`d8bba000 ffffee0f`d8bbf890 : FLTMGR!FltpPerformPreCallbacks+0x79
ffffee0f`d8bbf7b0 fffff80e`a98d66f0 : ffffbc0c`091af010 00000000`00060043 ffffbc0c`091af010 ffffee0f`d8bbf8a0 : FLTMGR!FltpPassThroughInternal+0x8c
ffffee0f`d8bbf7e0 fffff80e`a98d612e : ffff8684`19ec07a0 00000000`00000000 ffff9c80`030479c0 00000000`00000000 : FLTMGR!FltpPassThrough+0x510
ffffee0f`d8bbf870 fffff807`52e43029 : ffffbc0c`091af010 fffff807`52e2232f ffffbc0c`05dff350 00000000`00000000 : FLTMGR!FltpDispatch+0x9e
ffffee0f`d8bbf8d0 fffff807`52e22218 : ffffbc0b`ffed1cd0 ffffbc0c`091af010 ffffbc0c`0b29d3e0 ffffbc0c`0b29d4a0 : nt!IofCallDriver+0x59
ffffee0f`d8bbf910 fffff807`52f395a9 : ffffbc0c`0b29d390 ffffbc0c`0b29d3b0 ffffbc0c`0b29d3f0 ffffbc0c`0b29d3e0 : nt!IoPageReadEx+0x188
ffffee0f`d8bbf960 fffff807`52e53b3d : 00000000`00000003 ffffee0f`d8bbf9f0 ffffee0f`d8bbfb58 ffff9a4d`00001dc0 : nt!MiIssueHardFaultIo+0xc1
ffffee0f`d8bbf9b0 fffff807`52e6ad5f : ffff8000`00000000 00000000`c0033333 00000000`7701a835 00000000`00000000 : nt!MiIssueHardFault+0x3ed
ffffee0f`d8bbfa60 fffff807`52fde403 : ffffbc0c`06f9c080 00000000`04981820 ffffee0f`d8bbfc80 ffffbc0c`0b2f7b60 : nt!MmAccessFault+0x32f
ffffee0f`d8bbfc00 00000000`7701a835 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x343
00000000`0693cc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7701a835


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80752e17071-fffff80752e17072  2 bytes - nt!MmFreeIndependentPages+61
	[ 80 f6:00 9a ]
    fffff80752e1707f - nt!MmFreeIndependentPages+6f (+0x0e)
	[ fa:9c ]
    fffff80752e1a568-fffff80752e1a569  2 bytes - nt!MiFlushDirtyBitsToPfn+78 (+0x34e9)
	[ 80 f6:00 9a ]
    fffff80752e1a5eb-fffff80752e1a5ec  2 bytes - nt!MiFlushDirtyBitsToPfn+fb (+0x83)
	[ 80 f6:00 9a ]
    fffff80752e1a683 - nt!MiFlushDirtyBitsToPfn+193 (+0x98)
	[ fa:9c ]
    fffff80752e1d9f6-fffff80752e1d9f7  2 bytes - nt!MiLockStealSystemVm+32 (+0x3373)
	[ 80 f6:00 9a ]
    fffff80752e1da27-fffff80752e1da28  2 bytes - nt!MiLockStealSystemVm+63 (+0x31)
	[ ff f6:7f 9a ]
    fffff80752e1dac1 - nt!MiLockStealSystemVm+fd (+0x9a)
	[ fa:9c ]
    fffff80752e204a3-fffff80752e204a4  2 bytes - nt!MiTranslatePageForCopy+83 (+0x29e2)
	[ 80 f6:00 9a ]
    fffff80752e205e9 - nt!MiTranslatePageForCopy+1c9 (+0x146)
	[ fa:9c ]
    fffff80752e2060c - nt!MiTranslatePageForCopy+1ec (+0x23)
	[ fa:9c ]
    fffff80752e206a9 - nt!MiTranslatePageForCopy+289 (+0x9d)
	[ fa:9c ]
    fffff80752e206d3 - nt!MiTranslatePageForCopy+2b3 (+0x2a)
	[ fa:9c ]
    fffff80752e20712-fffff80752e20713  2 bytes - nt!MiTranslatePageForCopy+2f2 (+0x3f)
	[ ff f6:7f 9a ]
    fffff80752e207fe-fffff80752e207ff  2 bytes - nt!MiSynchronizeSystemVa+a6 (+0xec)
	[ 80 f6:00 9a ]
    fffff80752e20911-fffff80752e20912  2 bytes - nt!MiSynchronizeSystemVa+1b9 (+0x113)
	[ 80 f6:00 9a ]
    fffff80752e209f8-fffff80752e209f9  2 bytes - nt!MiPrefetchVirtualMemory+c8 (+0xe7)
	[ 80 f6:00 9a ]
    fffff80752e20a02-fffff80752e20a03  2 bytes - nt!MiPrefetchVirtualMemory+d2 (+0x0a)
	[ ff f6:7f 9a ]
    fffff80752e20bc8-fffff80752e20bc9  2 bytes - nt!MiPrefetchVirtualMemory+298 (+0x1c6)
	[ 80 f6:00 9a ]
    fffff80752e20bd9-fffff80752e20bda  2 bytes - nt!MiPrefetchVirtualMemory+2a9 (+0x11)
	[ ff f6:7f 9a ]
    fffff80752e2296b - nt!MiWaitForInPageComplete+8b (+0x1d92)
	[ fa:9c ]
    fffff80752e22b2f - nt!MiWaitForInPageComplete+24f (+0x1c4)
	[ fa:9c ]
    fffff80752e22c97 - nt!MiWaitForInPageComplete+3b7 (+0x168)
	[ fa:9c ]
    fffff80752e29d9c - nt!MiMakeSystemCachePteValid+44 (+0x7105)
	[ fa:9c ]
    fffff80752e29dc9-fffff80752e29dca  2 bytes - nt!MiMakeSystemCachePteValid+71 (+0x2d)
	[ 80 f6:00 9a ]
    fffff80752e2a639-fffff80752e2a63a  2 bytes - nt!MmProtectPool+a5 (+0x870)
	[ 80 f6:00 9a ]
    fffff80752e2a688-fffff80752e2a689  2 bytes - nt!MmProtectPool+f4 (+0x4f)
	[ 80 f6:00 9a ]
    fffff80752e2a6f5 - nt!MmProtectPool+161 (+0x6d)
	[ fa:9c ]
    fffff80752e2a725-fffff80752e2a726  2 bytes - nt!MmProtectPool+191 (+0x30)
	[ 80 f6:00 9a ]
    fffff80752e2a753 - nt!MmProtectPool+1bf (+0x2e)
	[ fa:9c ]
    fffff80752e2a83c-fffff80752e2a83d  2 bytes - nt!MmProtectPool+2a8 (+0xe9)
	[ 80 f6:00 9a ]
    fffff80752e2a8da - nt!MmProtectPool+346 (+0x9e)
	[ fa:9c ]
    fffff80752e2aa6b-fffff80752e2aa6c  2 bytes - nt!MiSetImageProtection+1b (+0x191)
	[ 80 f6:00 9a ]
    fffff80752e307a6 - nt!MiIdentifyPfn+36 (+0x5d3b)
	[ fa:9c ]
    fffff80752e30b0c-fffff80752e30b0d  2 bytes - nt!MiIdentifyPfn+39c (+0x366)
	[ 80 f6:00 9a ]
    fffff80752e30be1 - nt!MiIdentifyPfn+471 (+0xd5)
	[ fa:9c ]
    fffff80752e30c95-fffff80752e30c96  2 bytes - nt!MiIdentifyPfn+525 (+0xb4)
	[ 80 f6:00 9a ]
    fffff80752e30d92-fffff80752e30d93  2 bytes - nt!MiIdentifyPfn+622 (+0xfd)
	[ ff f6:7f 9a ]
    fffff80752e30ebb-fffff80752e30ebc  2 bytes - nt!MiIdentifyPfn+74b (+0x129)
	[ ff f6:7f 9a ]
    fffff80752e31055-fffff80752e31056  2 bytes - nt!MiIdentifyPfn+8e5 (+0x19a)
	[ 80 f6:00 9a ]
    fffff80752e3118d - nt!MiIsPfn+1d (+0x138)
	[ fa:9c ]
    fffff80752e4a813 - nt!IopCompleteRequest+fb3 (+0x19686)
	[ 48:88 ]
    fffff80752e4ac13 - nt!IofCompleteRequest+3 (+0x400)
	[ 28:68 ]
    fffff80752e520a4-fffff80752e520a9  6 bytes - nt!KiInSwapProcesses+14 (+0x7491)
	[ 68 df be 7d fb f6:a0 49 93 26 4d 9a ]
    fffff80752e52e4c - nt!MiReferenceInPageFile+74 (+0xda8)
	[ fa:9c ]
    fffff80752e53204 - nt!MiUnlockMdlWritePages+54 (+0x3b8)
	[ fa:9c ]
    fffff80752e5334f - nt!MiUnlockMdlWritePages+19f (+0x14b)
	[ fa:9c ]
    fffff80752e5349e - nt!MiWriteCompletePfn+6e (+0x14f)
	[ fa:9c ]
    fffff80752e5387b - nt!MiIssueHardFault+12b (+0x3dd)
	[ fa:9c ]
    fffff80752e5395c-fffff80752e5395d  2 bytes - nt!MiIssueHardFault+20c (+0xe1)
	[ 80 f6:00 9a ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
    fffff80753161d0e-fffff80753161d10  3 bytes - nt!ExFreePoolWithTag+10ae
	[ 40 fb f6:00 4d 9a ]
    fffff80753161d19-fffff80753161d1d  5 bytes - nt!ExFreePoolWithTag+10b9 (+0x0b)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff80753161d29-fffff80753161d2d  5 bytes - nt!ExFreePoolWithTag+10c9 (+0x10)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff80753161dbe-fffff80753161dbf  2 bytes - nt!ExFreePoolWithTag+115e (+0x95)
	[ 80 f6:00 9a ]
    fffff80753162813 - nt!ExDeferredFreePool+73 (+0xa55)
	[ 33:b0 ]
    fffff80753162c13 - nt!ExAllocatePoolWithTag+2c03 (+0x400)
	[ 74:37 ]
    fffff807531b6813 - nt!_xmm+1e483
	[ 00:80 ]
    fffff807531f2813 - nt!_xmm+5a483 (+0x3c000)
	[ 00:80 ]
    fffff8075320e813 - nt!_xmm+76483 (+0x1c000)
	[ 00:80 ]
    fffff8075320ec13 - nt!_xmm+76883 (+0x400)
	[ 50:10 ]
    fffff80753306813 - nt!Ports <PERF> (nt+0x4f0813)
	[ 00:80 ]
    fffff80753342813 - nt!Ports <PERF> (nt+0x52c813) (+0x3c000)
	[ 00:80 ]
    fffff80753353788-fffff8075335378a  3 bytes - nt!_guard_check_icall_fptr
	[ 30 ae f8:50 8d fd ]
    fffff80753353790-fffff80753353792  3 bytes - nt!_guard_dispatch_icall_fptr (+0x08)
	[ 70 b1 fc:a0 8d fd ]
    fffff80753382005-fffff80753382009  5 bytes - nt!MiConvertHiberPhasePte+15
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff80753382014-fffff80753382018  5 bytes - nt!MiConvertHiberPhasePte+24 (+0x0f)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff80753383fa1-fffff80753383fa5  5 bytes - nt!MiUpdateUserMappings+9 (+0x1f8d)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff80753383fcc-fffff80753383fd0  5 bytes - nt!MiUpdateUserMappings+34 (+0x2b)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff80753388abb-fffff80753388abc  2 bytes - nt!MmInitializeProcessor+47 (+0x4aef)
	[ 80 f6:00 9a ]
    fffff807533922e3 - nt!MiMarkNonPagedHiberPhasePte+83 (+0x9828)
	[ fa:9c ]
    fffff8075339239e - nt!MmMarkHiberPhase+76 (+0xbb)
	[ fa:9c ]
    fffff807533923ab - nt!MmMarkHiberPhase+83 (+0x0d)
	[ fa:9c ]
    fffff80753396813 - nt!CmpCheckKeyOwnerForPca+43
	[ 02:80 ]
    fffff80753396c13 - nt!FsRtlpPrepareExtraCreateParametersForCreate+47 (+0x400)
	[ 48:0a ]
    fffff807533c02a6 - nt!MmChangeImageProtection+166 (+0x29693)
	[ fa:9c ]
    fffff807533c0b64-fffff807533c0b65  2 bytes - nt!MiUnloadSystemImage+6e0 (+0x8be)
	[ 80 f6:00 9a ]
    fffff807533d2813 - nt!EtwpUpdateFilterData+8ab (+0x11caf)
	[ cc:8c ]
    fffff807533d2c13 - nt!EtwpQueueNotification+5f (+0x400)
	[ 0f:cc ]
    fffff807533db489 - nt!PfpPfnPrioRequest+a9 (+0x8876)
	[ fa:9c ]
    fffff807533db4c8 - nt!PfpPfnPrioRequest+e8 (+0x3f)
	[ fa:9c ]
    fffff807533f5d14 - nt!MiRelocateImagePfn+94 (+0x1a84c)
	[ fa:9c ]
    fffff807533f5d20-fffff807533f5d21  2 bytes - nt!MiRelocateImagePfn+a0 (+0x0c)
	[ 80 f6:00 9a ]
    fffff807533f5d3b-fffff807533f5d3c  2 bytes - nt!MiRelocateImagePfn+bb (+0x1b)
	[ ff f6:7f 9a ]
    fffff807533f5d73-fffff807533f5d74  2 bytes - nt!MiRelocateImagePfn+f3 (+0x38)
	[ 80 f6:00 9a ]
    fffff807533f6345-fffff807533f6349  5 bytes - nt!MmHardFaultBytesRequired+55 (+0x5d2)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff807533f634f-fffff807533f6353  5 bytes - nt!MmHardFaultBytesRequired+5f (+0x0a)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff807533f7be7-fffff807533f7beb  5 bytes - nt!MmProtectVirtualMemory+307 (+0x1898)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff807533f7c01-fffff807533f7c05  5 bytes - nt!MmProtectVirtualMemory+321 (+0x1a)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff807533f7c3b-fffff807533f7c3f  5 bytes - nt!MmProtectVirtualMemory+35b (+0x3a)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff807533f9e9b-fffff807533f9e9f  5 bytes - nt!MiPfPrepareSequentialReadList+23b (+0x2260)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff807533f9eb1-fffff807533f9eb5  5 bytes - nt!MiPfPrepareSequentialReadList+251 (+0x16)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff807533fa12f-fffff807533fa133  5 bytes - nt!MiPfPrepareSequentialReadList+4cf (+0x27e)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff807533fa20b - nt!MiPfPrepareSequentialReadList+5ab (+0xdc)
	[ fa:9c ]
    fffff807533fa79c-fffff807533fa7a0  5 bytes - nt!MiPfPrepareReadList+1dc (+0x591)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff807533fa7a6-fffff807533fa7aa  5 bytes - nt!MiPfPrepareReadList+1e6 (+0x0a)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff807533fa94e - nt!MiPfPrepareReadList+38e (+0x1a8)
	[ fa:9c ]
    fffff807533faa48-fffff807533faa4c  5 bytes - nt!MiPfPrepareReadList+488 (+0xfa)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff807533faa52-fffff807533faa56  5 bytes - nt!MiPfPrepareReadList+492 (+0x0a)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff807533faff1 - nt!MiProcessCrcList+e1 (+0x59f)
	[ fa:9c ]
    fffff807533fb004-fffff807533fb005  2 bytes - nt!MiProcessCrcList+f4 (+0x13)
	[ 80 f6:00 9a ]
    fffff807533fb00e-fffff807533fb00f  2 bytes - nt!MiProcessCrcList+fe (+0x0a)
	[ ff f6:7f 9a ]
    fffff807533fb0cc-fffff807533fb0cd  2 bytes - nt!MiProcessCrcList+1bc (+0xbe)
	[ 80 f6:00 9a ]
    fffff807533fb0d6-fffff807533fb0d7  2 bytes - nt!MiProcessCrcList+1c6 (+0x0a)
	[ ff f6:7f 9a ]
    fffff807533fb102 - nt!MiProcessCrcList+1f2 (+0x2c)
	[ fa:9c ]
    fffff807533fb41f-fffff807533fb420  2 bytes - nt!MiProcessCrcList+50f (+0x31d)
	[ 80 f6:00 9a ]
    fffff8075340521f - nt!MiCreateImageFileMap+12b (+0x9e00)
	[ fa:9c ]
    fffff8075340816f-fffff80753408173  5 bytes - nt!MiParseImageSectionHeaders+36f (+0x2f50)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff80753408181-fffff80753408185  5 bytes - nt!MiParseImageSectionHeaders+381 (+0x12)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff80753408d25-fffff80753408d26  2 bytes - nt!MiPrefetchDriverPages+45 (+0xba4)
	[ 80 f6:00 9a ]
    fffff80753408d2c-fffff80753408d30  5 bytes - nt!MiPrefetchDriverPages+4c (+0x07)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff80753408d36-fffff80753408d3a  5 bytes - nt!MiPrefetchDriverPages+56 (+0x0a)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff80753408fc8-fffff80753408fcc  5 bytes - nt!MiChargeSegmentCommit+a8 (+0x292)
	[ d0 be 7d fb f6:40 93 26 4d 9a ]
    fffff80753408fd2-fffff80753408fd6  5 bytes - nt!MiChargeSegmentCommit+b2 (+0x0a)
	[ d7 be 7d fb f6:47 93 26 4d 9a ]
    fffff8075342e813 - nt!CmpWalkOneLevel+5a3 (+0x25841)
	[ 49:88 ]
    fffff8075342ec13 - nt!CmpFindSubKeyInRoot+d7 (+0x400)
	[ 00:41 ]
    fffff807534417c0 - nt!MiValidateImagePfn+3c (+0x12bad)
	[ fa:9c ]
    fffff8075344180b-fffff8075344180c  2 bytes - nt!MiValidateImagePfn+87 (+0x4b)
	[ 80 f6:00 9a ]
    fffff8075346a813 - nt!NtSetInformationThread+11d3 (+0x29008)
	[ ed:ac ]
    fffff8075346ac13 - nt!NtSetInformationThread+15d3 (+0x400)
	[ e8:e9 ]
    fffff80753476bde - nt!MiMapLockedPagesInUserSpace+1ca (+0xbfcb)
	[ fa:9c ]
    fffff8075348aa25-fffff8075348aa26  2 bytes - nt!MiFreeInitializationCode+41 (+0x13e47)
	[ 80 f6:00 9a ]
    fffff8075348ab94 - nt!MiFreeInitializationCode+1b0 (+0x16f)
	[ fa:9c ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
7608 errors : !nt (fffff80752e17071-fffff80753706813)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2023-01-30T05:19:45.000Z

OSBUILD:  17763

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 2655

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

Отправлено: 12:38, 14-02-2023 | #2718