Код:
Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\1\MEMORY_2023-02-14.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols
Deferred symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17763 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff804`20409000 PsLoadedModuleList = 0xfffff804`20822430
Debug session time: Tue Feb 14 10:47:51.295 2023 (UTC + 5:00)
System Uptime: 0 days 0:17:38.165
Loading Kernel Symbols
...Page 200003c9b too large to be in the dump file.
............................................................
........................Page 2001081d0 too large to be in the dump file.
........................................
...........................Page 20010dc0f too large to be in the dump file.
...................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000086`086ea018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1, 2, 1, fffff8042042e813}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042042e813, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: G41M-ES2L
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F6
BIOS_DATE: 11/04/2009
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: G41M-ES2L
BASEBOARD_VERSION: x.x
DUMP_TYPE: 1
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8042042e813
WORKER_ROUTINE:
+0
00000000`00000001 ?? ???
WORK_ITEM: fffff8042042e813
CURRENT_IRQL: 2
CPU_COUNT: 2
CPU_MHZ: a8c
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 17
CPU_STEPPING: a
CPU_MICROCODE: 6,17,a,0 (F,M,S,R) SIG: A0C'00000000 (cache) A0C'00000000 (init)
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: csrss.exe
ANALYSIS_SESSION_HOST: NICKMPC
ANALYSIS_SESSION_TIME: 02-16-2023 12:38:57.0142
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
DPC_STACK_BASE: FFFFFD0D97230FB0
TRAP_FRAME: fffffd0d97230ad0 -- (.trap 0xfffffd0d97230ad0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042042e813 rsp=fffffd0d97230c60 rbp=fffffd0d97230d60
r8=0000000000000029 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiExecuteAllDpcs+0x313:
fffff804`2042e813 2020 and byte ptr [rax],ah ds:00000000`00000001=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804205d5829 to fffff804205c1ea0
STACK_TEXT:
fffffd0d`97230988 fffff804`205d5829 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffd0d`97230990 fffff804`205d150e : ffff9b88`0213d668 ffff958f`d1eb9c40 00000000`00000001 fffffd0d`97230e70 : nt!KiBugCheckDispatch+0x69
fffffd0d`97230ad0 fffff804`2042e813 : ffffa600`bb802f80 ffff958f`d18bd000 00000000`00000f44 ffffa600`bb802f80 : nt!KiPageFault+0x44e
fffffd0d`97230c60 fffff804`2042de2e : ffffa600`bb800180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x313
fffffd0d`97230da0 fffff804`205ca1a5 : 00000000`00000000 ffffa600`bb800180 fffffd0d`9787d660 00000000`00000000 : nt!KiRetireDpcList+0x1ae
fffffd0d`97230fb0 fffff804`205c9f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffffd0d`9787d5b0 fffff804`205c941c : 0f0f0f0f`0f0f0f0f ffff958f`d8442158 00000000`00000000 fffffd0d`9787d6e4 : nt!KiDispatchInterruptContinue
fffffd0d`9787d5e0 fffff804`20431442 : fffff804`20430fb8 00000000`00000000 00000000`00000000 ffff958f`d68203a0 : nt!KiDpcInterrupt+0x2dc
fffffd0d`9787d778 fffff804`20430fb8 : 00000000`00000000 00000000`00000000 ffff958f`d68203a0 fffff804`20431129 : nt!MmGetSessionIdEx+0x12
fffffd0d`9787d780 ffff8220`f39e9b57 : 00000000`00000012 00000000`00000000 00000000`00000000 ffff8236`0066c050 : nt!ExReleasePushLockExclusiveEx+0x1e8
fffffd0d`9787d7e0 ffff8220`f37b82f7 : fffffd0d`9787d944 fffffd0d`9787d9f0 ffff8220`f390c400 ffffddda`1ae3f3ae : win32kbase!EnterCrit+0x1e7
fffffd0d`9787d8c0 ffff8220`f36469cb : 00000000`00000001 00000000`00000001 ffff8220`f390c400 00000000`00000004 : win32kfull!EnterLeaveCrit::EnterLeaveCrit+0x17
fffffd0d`9787d8f0 ffff8220`f39ae11e : ffff958f`d6820080 ffff958f`d6820080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0xcdb
fffffd0d`9787db50 ffff8220`f3663fd0 : ffff958f`d6820080 fffffd0d`9787dc80 00000000`00000000 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x8e
fffffd0d`9787dbd0 fffff804`205d4ff5 : ffff958f`d6820080 00000000`00000005 0000024c`b3003ff0 00000000`00000324 : win32kfull!NtUserCallNoParam+0x70
fffffd0d`9787dc00 00007ffd`b6851144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000086`0007fd48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b6851144
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8042040a072 - nt!MmFreeIndependentPages+62
[ f6:a5 ]
fffff8042040a07f - nt!MmFreeIndependentPages+6f (+0x0d)
[ fa:f3 ]
fffff8042040d569 - nt!MiFlushDirtyBitsToPfn+79 (+0x34ea)
[ f6:a5 ]
fffff8042040d5ec - nt!MiFlushDirtyBitsToPfn+fc (+0x83)
[ f6:a5 ]
fffff8042040d683 - nt!MiFlushDirtyBitsToPfn+193 (+0x97)
[ fa:f3 ]
fffff804204109f7 - nt!MiLockStealSystemVm+33 (+0x3374)
[ f6:a5 ]
fffff80420410a28 - nt!MiLockStealSystemVm+64 (+0x31)
[ f6:a5 ]
fffff80420410ac1 - nt!MiLockStealSystemVm+fd (+0x99)
[ fa:f3 ]
fffff804204134a4 - nt!MiTranslatePageForCopy+84 (+0x29e3)
[ f6:a5 ]
fffff804204135e9 - nt!MiTranslatePageForCopy+1c9 (+0x145)
[ fa:f3 ]
fffff8042041360c - nt!MiTranslatePageForCopy+1ec (+0x23)
[ fa:f3 ]
fffff804204136a9 - nt!MiTranslatePageForCopy+289 (+0x9d)
[ fa:f3 ]
fffff804204136d3 - nt!MiTranslatePageForCopy+2b3 (+0x2a)
[ fa:f3 ]
fffff80420413713 - nt!MiTranslatePageForCopy+2f3 (+0x40)
[ f6:a5 ]
fffff804204137ff - nt!MiSynchronizeSystemVa+a7 (+0xec)
[ f6:a5 ]
fffff80420413912 - nt!MiSynchronizeSystemVa+1ba (+0x113)
[ f6:a5 ]
fffff804204139f9 - nt!MiPrefetchVirtualMemory+c9 (+0xe7)
[ f6:a5 ]
fffff80420413a03 - nt!MiPrefetchVirtualMemory+d3 (+0x0a)
[ f6:a5 ]
fffff80420413bc9 - nt!MiPrefetchVirtualMemory+299 (+0x1c6)
[ f6:a5 ]
fffff80420413bda - nt!MiPrefetchVirtualMemory+2aa (+0x11)
[ f6:a5 ]
fffff8042041596b - nt!MiWaitForInPageComplete+8b (+0x1d91)
[ fa:f3 ]
fffff80420415b2f - nt!MiWaitForInPageComplete+24f (+0x1c4)
[ fa:f3 ]
fffff80420415c97 - nt!MiWaitForInPageComplete+3b7 (+0x168)
[ fa:f3 ]
fffff8042041cd9c - nt!MiMakeSystemCachePteValid+44 (+0x7105)
[ fa:f3 ]
fffff8042041cdca - nt!MiMakeSystemCachePteValid+72 (+0x2e)
[ f6:a5 ]
fffff8042041d63a - nt!MmProtectPool+a6 (+0x870)
[ f6:a5 ]
fffff8042041d689 - nt!MmProtectPool+f5 (+0x4f)
[ f6:a5 ]
fffff8042041d6f5 - nt!MmProtectPool+161 (+0x6c)
[ fa:f3 ]
fffff8042041d726 - nt!MmProtectPool+192 (+0x31)
[ f6:a5 ]
fffff8042041d753 - nt!MmProtectPool+1bf (+0x2d)
[ fa:f3 ]
fffff8042041d83d - nt!MmProtectPool+2a9 (+0xea)
[ f6:a5 ]
fffff8042041d8da - nt!MmProtectPool+346 (+0x9d)
[ fa:f3 ]
fffff8042041da6c - nt!MiSetImageProtection+1c (+0x192)
[ f6:a5 ]
fffff804204237a6 - nt!MiIdentifyPfn+36 (+0x5d3a)
[ fa:f3 ]
fffff80420423b0d - nt!MiIdentifyPfn+39d (+0x367)
[ f6:a5 ]
fffff80420423be1 - nt!MiIdentifyPfn+471 (+0xd4)
[ fa:f3 ]
fffff80420423c96 - nt!MiIdentifyPfn+526 (+0xb5)
[ f6:a5 ]
fffff80420423d93 - nt!MiIdentifyPfn+623 (+0xfd)
[ f6:a5 ]
fffff80420423ebc - nt!MiIdentifyPfn+74c (+0x129)
[ f6:a5 ]
fffff80420424056 - nt!MiIdentifyPfn+8e6 (+0x19a)
[ f6:a5 ]
fffff8042042418d - nt!MiIsPfn+1d (+0x137)
[ fa:f3 ]
fffff8042042e813 - nt!KiExecuteAllDpcs+313 (+0xa686)
[ a1:20 ]
fffff8042042ec13 - nt!EtwpLogKernelEvent+283 (+0x400)
[ 8b:89 ]
fffff804204450a4-fffff804204450a9 6 bytes - nt!KiInSwapProcesses+14 (+0x16491)
[ 68 df be 7d fb f6:58 ba 74 e9 d2 a5 ]
fffff80420445e4c - nt!MiReferenceInPageFile+74 (+0xda8)
[ fa:f3 ]
fffff80420446204 - nt!MiUnlockMdlWritePages+54 (+0x3b8)
[ fa:f3 ]
fffff8042044634f - nt!MiUnlockMdlWritePages+19f (+0x14b)
[ fa:f3 ]
fffff8042044649e - nt!MiWriteCompletePfn+6e (+0x14f)
[ fa:f3 ]
fffff8042044687b - nt!MiIssueHardFault+12b (+0x3dd)
[ fa:f3 ]
fffff8042044695d - nt!MiIssueHardFault+20d (+0xe2)
[ f6:a5 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
fffff80420754d0e-fffff80420754d10 3 bytes - nt!ExFreePoolWithTag+10ae
[ 40 fb f6:c0 d2 a5 ]
fffff80420754d19-fffff80420754d1d 5 bytes - nt!ExFreePoolWithTag+10b9 (+0x0b)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff80420754d29-fffff80420754d2d 5 bytes - nt!ExFreePoolWithTag+10c9 (+0x10)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff80420754dbf - nt!ExFreePoolWithTag+115f (+0x96)
[ f6:a5 ]
fffff80420796c13 - nt!_xmm+b883
[ e0:20 ]
fffff80420946788-fffff8042094678a 3 bytes - nt!_guard_check_icall_fptr
[ 30 de 57:50 bd 5c ]
fffff80420946790-fffff80420946792 3 bytes - nt!_guard_dispatch_icall_fptr (+0x08)
[ 70 e1 5b:a0 bd 5c ]
fffff80420975005-fffff80420975009 5 bytes - nt!MiConvertHiberPhasePte+15
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff80420975014-fffff80420975018 5 bytes - nt!MiConvertHiberPhasePte+24 (+0x0f)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff80420976fa1-fffff80420976fa5 5 bytes - nt!MiUpdateUserMappings+9 (+0x1f8d)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff80420976fcc-fffff80420976fd0 5 bytes - nt!MiUpdateUserMappings+34 (+0x2b)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff8042097babc - nt!MmInitializeProcessor+48 (+0x4af0)
[ f6:a5 ]
fffff804209852e3 - nt!MiMarkNonPagedHiberPhasePte+83 (+0x9827)
[ fa:f3 ]
fffff8042098539e - nt!MmMarkHiberPhase+76 (+0xbb)
[ fa:f3 ]
fffff804209853ab - nt!MmMarkHiberPhase+83 (+0x0d)
[ fa:f3 ]
fffff804209b32a6 - nt!MmChangeImageProtection+166
[ fa:f3 ]
fffff804209b3b65 - nt!MiUnloadSystemImage+6e1 (+0x8bf)
[ f6:a5 ]
fffff804209b6c13 - nt!PfSnBuildDumpFromTrace+4b (+0x30ae)
[ 44:04 ]
fffff804209ce489 - nt!PfpPfnPrioRequest+a9 (+0x17876)
[ fa:f3 ]
fffff804209ce4c8 - nt!PfpPfnPrioRequest+e8 (+0x3f)
[ fa:f3 ]
fffff804209e8d14 - nt!MiRelocateImagePfn+94 (+0x1a84c)
[ fa:f3 ]
fffff804209e8d21 - nt!MiRelocateImagePfn+a1 (+0x0d)
[ f6:a5 ]
fffff804209e8d3c - nt!MiRelocateImagePfn+bc (+0x1b)
[ f6:a5 ]
fffff804209e8d74 - nt!MiRelocateImagePfn+f4 (+0x38)
[ f6:a5 ]
fffff804209e9345-fffff804209e9349 5 bytes - nt!MmHardFaultBytesRequired+55 (+0x5d1)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209e934f-fffff804209e9353 5 bytes - nt!MmHardFaultBytesRequired+5f (+0x0a)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209eabe7-fffff804209eabeb 5 bytes - nt!MmProtectVirtualMemory+307 (+0x1898)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209eac01-fffff804209eac05 5 bytes - nt!MmProtectVirtualMemory+321 (+0x1a)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209eac3b-fffff804209eac3f 5 bytes - nt!MmProtectVirtualMemory+35b (+0x3a)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209ece9b-fffff804209ece9f 5 bytes - nt!MiPfPrepareSequentialReadList+23b (+0x2260)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209eceb1-fffff804209eceb5 5 bytes - nt!MiPfPrepareSequentialReadList+251 (+0x16)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209ed12f-fffff804209ed133 5 bytes - nt!MiPfPrepareSequentialReadList+4cf (+0x27e)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209ed20b - nt!MiPfPrepareSequentialReadList+5ab (+0xdc)
[ fa:f3 ]
fffff804209ed79c-fffff804209ed7a0 5 bytes - nt!MiPfPrepareReadList+1dc (+0x591)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209ed7a6-fffff804209ed7aa 5 bytes - nt!MiPfPrepareReadList+1e6 (+0x0a)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209ed94e - nt!MiPfPrepareReadList+38e (+0x1a8)
[ fa:f3 ]
fffff804209eda48-fffff804209eda4c 5 bytes - nt!MiPfPrepareReadList+488 (+0xfa)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209eda52-fffff804209eda56 5 bytes - nt!MiPfPrepareReadList+492 (+0x0a)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209edff1 - nt!MiProcessCrcList+e1 (+0x59f)
[ fa:f3 ]
fffff804209ee005 - nt!MiProcessCrcList+f5 (+0x14)
[ f6:a5 ]
fffff804209ee00f - nt!MiProcessCrcList+ff (+0x0a)
[ f6:a5 ]
fffff804209ee0cd - nt!MiProcessCrcList+1bd (+0xbe)
[ f6:a5 ]
fffff804209ee0d7 - nt!MiProcessCrcList+1c7 (+0x0a)
[ f6:a5 ]
fffff804209ee102 - nt!MiProcessCrcList+1f2 (+0x2b)
[ fa:f3 ]
fffff804209ee420 - nt!MiProcessCrcList+510 (+0x31e)
[ f6:a5 ]
fffff804209f2813 - nt!MmManagePartitionMemoryInformation+19f (+0x43f3)
[ 49:08 ]
fffff804209f2c13 - nt!PspAllocateProcess+73 (+0x400)
[ ac:6d ]
fffff804209f821f - nt!MiCreateImageFileMap+12b (+0x560c)
[ fa:f3 ]
fffff804209fb16f-fffff804209fb173 5 bytes - nt!MiParseImageSectionHeaders+36f (+0x2f50)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209fb181-fffff804209fb185 5 bytes - nt!MiParseImageSectionHeaders+381 (+0x12)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209fbd26 - nt!MiPrefetchDriverPages+46 (+0xba5)
[ f6:a5 ]
fffff804209fbd2c-fffff804209fbd30 5 bytes - nt!MiPrefetchDriverPages+4c (+0x06)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209fbd36-fffff804209fbd3a 5 bytes - nt!MiPrefetchDriverPages+56 (+0x0a)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff804209fbfc8-fffff804209fbfcc 5 bytes - nt!MiChargeSegmentCommit+a8 (+0x292)
[ d0 be 7d fb f6:b0 74 e9 d2 a5 ]
fffff804209fbfd2-fffff804209fbfd6 5 bytes - nt!MiChargeSegmentCommit+b2 (+0x0a)
[ d7 be 7d fb f6:b7 74 e9 d2 a5 ]
fffff80420a347c0 - nt!MiValidateImagePfn+3c (+0x387ee)
[ fa:f3 ]
fffff80420a3480c - nt!MiValidateImagePfn+88 (+0x4c)
[ f6:a5 ]
fffff80420a4a813 - nt!EtwpAddRegEntryToGroup+143 (+0x16007)
[ 44:04 ]
fffff80420a4ac13 - nt!EtwpAddRegEntryToGroup+543 (+0x400)
[ 8b:48 ]
fffff80420a69bde - nt!MiMapLockedPagesInUserSpace+1ca (+0x1efcb)
[ fa:f3 ]
fffff80420a7da26 - nt!MiFreeInitializationCode+42 (+0x13e48)
[ f6:a5 ]
fffff80420a7db94 - nt!MiFreeInitializationCode+1b0 (+0x16e)
[ fa:f3 ]
fffff80420a7ed19 - nt!MiAllocateDriverPage+c5 (+0x1185)
[ fa:f3 ]
fffff80420a83540 - nt!MmCreateProcessAddressSpace+1a0 (+0x4827)
[ f6:a5 ]
fffff80420a8355b-fffff80420a83560 6 bytes - nt!MmCreateProcessAddressSpace+1bb (+0x1b)
[ 68 df be 7d fb f6:58 ba 74 e9 d2 a5 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
6583 errors : !nt (fffff8042040a072-fffff80420cfac13)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2023-02-14T05:47:51.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 25e9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------