TE
TE
Beanos
Guest
okay,
Dann werde ich das nachher gleich mal versuchen
Dann werde ich das nachher gleich mal versuchen
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 0000000000005701
Arg4: 000046ff00007958
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88009448860 -- (.trap 0xfffff88009448860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000ff rbx=0000000000000000 rcx=0000000006ba8000
rdx=0000000007274000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003197c56 rsp=fffff880094489f0 rbp=fffff88009448ca0
r8=0000000000000000 r9=00000000ffffffff r10=0400000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ProbeForWrite+0x36:
fffff800`03197c56 0fb601 movzx eax,byte ptr [rcx] ds:8b50:00000000`06ba8000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ef32a6 to fffff80002e81d00
STACK_TEXT:
fffff880`094485e8 fffff800`02ef32a6 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00005701 : nt!KeBugCheckEx
fffff880`094485f0 fffff800`02e8ef69 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x398d6
fffff880`09448700 fffff800`02e7fe2e : 00000000`00000000 00000000`06ba8000 00000000`07273f00 00000000`07273fff : nt!MmAccessFault+0x359
fffff880`09448860 fffff800`03197c56 : fffffa80`058c4910 00000000`00000004 00000000`00001000 00000000`06b80000 : nt!KiPageFault+0x16e
fffff880`094489f0 fffff800`03124753 : fffffa80`05704060 00000000`07273fff 00000000`00000004 00000000`0012dde8 : nt!ProbeForWrite+0x36
fffff880`09448a20 fffff800`03126642 : 00000000`06b80000 fffffa80`05704060 00000000`00000000 fffff880`00000000 : nt!MiSecureVirtualMemory+0x113
fffff880`09448a90 fffff960`00194ee3 : fffff880`09448ca0 fffffa80`056e9060 00000000`0012dde8 fffff880`09448bd0 : nt!MmSecureVirtualMemory+0x16
fffff880`09448ad0 fffff800`02e80f93 : 00000000`4801118a 00000000`00000294 00000000`00000000 00000000`00000000 : win32k!NtGdiCreateDIBSection+0x27b
fffff880`09448bb0 00000000`74a9056a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012ddc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74a9056a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!NtGdiCreateDIBSection+27b
fffff960`00194ee3 4c8be8 mov r13,rax
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: win32k!NtGdiCreateDIBSection+27b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f104c
FAILURE_BUCKET_ID: X64_0x1a_5003_win32k!NtGdiCreateDIBSection+27b
BUCKET_ID: X64_0x1a_5003_win32k!NtGdiCreateDIBSection+27b
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 0000000000005701
Arg4: 000046ff00007958
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88009448860 -- (.trap 0xfffff88009448860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000ff rbx=0000000000000000 rcx=0000000006ba8000
rdx=0000000007274000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003197c56 rsp=fffff880094489f0 rbp=fffff88009448ca0
r8=0000000000000000 r9=00000000ffffffff r10=0400000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ProbeForWrite+0x36:
fffff800`03197c56 0fb601 movzx eax,byte ptr [rcx] ds:8b50:00000000`06ba8000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ef32a6 to fffff80002e81d00
STACK_TEXT:
fffff880`094485e8 fffff800`02ef32a6 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00005701 : nt!KeBugCheckEx
fffff880`094485f0 fffff800`02e8ef69 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x398d6
fffff880`09448700 fffff800`02e7fe2e : 00000000`00000000 00000000`06ba8000 00000000`07273f00 00000000`07273fff : nt!MmAccessFault+0x359
fffff880`09448860 fffff800`03197c56 : fffffa80`058c4910 00000000`00000004 00000000`00001000 00000000`06b80000 : nt!KiPageFault+0x16e
fffff880`094489f0 fffff800`03124753 : fffffa80`05704060 00000000`07273fff 00000000`00000004 00000000`0012dde8 : nt!ProbeForWrite+0x36
fffff880`09448a20 fffff800`03126642 : 00000000`06b80000 fffffa80`05704060 00000000`00000000 fffff880`00000000 : nt!MiSecureVirtualMemory+0x113
fffff880`09448a90 fffff960`00194ee3 : fffff880`09448ca0 fffffa80`056e9060 00000000`0012dde8 fffff880`09448bd0 : nt!MmSecureVirtualMemory+0x16
fffff880`09448ad0 fffff800`02e80f93 : 00000000`4801118a 00000000`00000294 00000000`00000000 00000000`00000000 : win32k!NtGdiCreateDIBSection+0x27b
fffff880`09448bb0 00000000`74a9056a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012ddc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74a9056a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!NtGdiCreateDIBSection+27b
fffff960`00194ee3 4c8be8 mov r13,rax
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: win32k!NtGdiCreateDIBSection+27b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f104c
FAILURE_BUCKET_ID: X64_0x1a_5003_win32k!NtGdiCreateDIBSection+27b
BUCKET_ID: X64_0x1a_5003_win32k!NtGdiCreateDIBSection+27b
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6f340001d80, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ed031b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003115100
fffff6f340001d80
FAULTING_IP:
nt!MiAgeWorkingSet+1d1
fffff800`02ed031b 488b19 mov rbx,qword ptr [rcx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880035167c0 -- (.trap 0xfffff880035167c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000007ffffffff8 rbx=0000000000000000 rcx=fffff6f340001d80
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed031b rsp=fffff88003516950 rbp=007ffff340001d80
r8=0000000000000001 r9=fffffa8005abbec8 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiAgeWorkingSet+0x1d1:
fffff800`02ed031b 488b19 mov rbx,qword ptr [rcx] ds:fffff6f3`40001d80=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e903cf to fffff80002ee5d00
STACK_TEXT:
fffff880`03516658 fffff800`02e903cf : 00000000`00000050 fffff6f3`40001d80 00000000`00000000 fffff880`035167c0 : nt!KeBugCheckEx
fffff880`03516660 fffff800`02ee3e2e : 00000000`00000000 fffff6f3`40001d80 00000000`00001000 00000980`00000000 : nt! ?? ::FNODOBFM::`string'+0x44891
fffff880`035167c0 fffff800`02ed031b : 00000003`00000000 19b00000`38237867 00000000`00000000 00000000`0000019b : nt!KiPageFault+0x16e
fffff880`03516950 fffff800`02f5f4f5 : fffffa80`05abbec8 fffff880`00000001 00000000`00000001 fffff880`03516bb0 : nt!MiAgeWorkingSet+0x1d1
fffff880`03516b00 fffff800`02ed08c6 : 00000000`00000326 00000000`00000000 fffffa80`00000000 00000000`00000005 : nt! ?? ::FNODOBFM::`string'+0x4d886
fffff880`03516b80 fffff800`02ed0d67 : 00000000`00000008 fffff880`03516c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03516bd0 fffff800`0318232e : fffffa80`052ec680 00000000`00000080 fffffa80`052199e0 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03516d40 fffff800`02ed7666 : fffff880`03164180 fffffa80`052ec680 fffff880`0316efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03516d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+1d1
fffff800`02ed031b 488b19 mov rbx,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+1d1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+1d1
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+1d1
Followup: MachineOwner
---------
die spannung des arbeitsspeichers ist auf den ersten beiden bei 2,1, bei den 2. beiden bei 1,8. (sollte ich das angleichen?)
kann natürlich etwas dauern, da der pc nicht jeden tag abstürzt
fffff880`09448700 fffff800`02e7fe2e : 00000000`00000000 00000000`06ba8000 00000000`07273f00 00000000`07273fff : nt!MmAccessFault+0x359
...
fffff880`035167c0 fffff800`02ed031b : 00000003`00000000 19b00000`38237867 00000000`00000000 00000000`0000019b : nt!KiPageFault+0x16e
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6f3400019d0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002fe2665, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003113100
fffff6f3400019d0
FAULTING_IP:
nt!MiEmptyWorkingSet+1c5
fffff800`02fe2665 488b02 mov rax,qword ptr [rdx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: CurseClient.ex
CURRENT_IRQL: 0
TRAP_FRAME: fffff880079ce4c0 -- (.trap 0xfffff880079ce4c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000098000000000 rbx=0000000000000000 rcx=007ffff3400019d6
rdx=fffff6f3400019d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002fe2665 rsp=fffff880079ce650 rbp=000000000000000b
r8=0000000fffffffff r9=0000000000000001 r10=0000000000000000
r11=0000000000000013 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiEmptyWorkingSet+0x1c5:
fffff800`02fe2665 488b02 mov rax,qword ptr [rdx] ds:c404:fffff6f3`400019d0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8e3cf to fffff80002ee3d00
STACK_TEXT:
fffff880`079ce358 fffff800`02e8e3cf : 00000000`00000050 fffff6f3`400019d0 00000000`00000000 fffff880`079ce4c0 : nt!KeBugCheckEx
fffff880`079ce360 fffff800`02ee1e2e : 00000000`00000000 fffff6f3`400019d0 000007fe`f2386000 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x44891
fffff880`079ce4c0 fffff800`02fe2665 : 00000003`00000000 ffffffff`ffffffff 00000000`0000000a fffffa80`09267878 : nt!KiPageFault+0x16e
fffff880`079ce650 fffff800`0312451d : fffffa80`0658d060 00000000`00000001 ffffffff`ffffffff fffff880`079ceca0 : nt!MiEmptyWorkingSet+0x1c5
fffff880`079ce700 fffff800`033321cd : 00000000`00000001 00000000`000002fd 00000000`00000000 00000000`00000100 : nt!MmAdjustWorkingSetSizeEx+0xad
fffff880`079ce780 fffff800`03236cab : 00000000`00000008 00000000`00000000 00000000`00000001 00000000`247adfc0 : nt!PspSetQuotaLimits+0x32d
fffff880`079ce8d0 fffff800`02ee2f93 : fffffa80`0658d060 fffff880`079ceca0 00000000`1cc645b0 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x4b510
fffff880`079cec20 00000000`772414da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`247adf88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772414da
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiEmptyWorkingSet+1c5
fffff800`02fe2665 488b02 mov rax,qword ptr [rdx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiEmptyWorkingSet+1c5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiEmptyWorkingSet+1c5
BUCKET_ID: X64_0x50_nt!MiEmptyWorkingSet+1c5
Followup: MachineOwner
---------
Arg2: 0000000000000000, value 0 = read operation
...
fffff880`079ce4c0 fffff800`02fe2665 : 00000003`00000000 ffffffff`ffffffff 00000000`0000000a fffffa80`09267878 : nt!KiPageFault+0x16e
...
IMAGE_NAME: memory_corruption
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000000640, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000000c73c, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002b1133c to fffff80002a81700
STACK_TEXT:
fffff880`0656e6e8 fffff800`02b1133c : 00000000`0000004e 00000000`00000099 00000000`00000640 00000000`00000002 : nt!KeBugCheckEx
fffff880`0656e6f0 fffff800`02a25417 : 00000000`00002000 fffffa80`00276bd0 00000000`00000000 fffff880`0656e7d0 : nt!MiBadShareCount+0x4c
fffff880`0656e730 fffff800`02d96f0d : fffff980`26980000 fffff8a0`1952e990 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2c11b
fffff880`0656ea10 fffff800`02a9a567 : 00000000`00000000 fffffa80`064551b0 00000000`00000000 00000000`00100000 : nt!CcUnmapVacb+0x5d
fffff880`0656ea50 fffff800`02a71294 : 00000000`00000001 fffffa80`0c1a51e0 fffffa80`0dbdb300 00000000`00000000 : nt!CcUnmapVacbArray+0x1b7
fffff880`0656eae0 fffff800`02a74d1c : fffffa80`0dbdb300 00000000`00000030 fffffa80`0dbdb300 fffffa80`09325a00 : nt!CcDeleteSharedCacheMap+0x140
fffff880`0656eb50 fffff800`02a7551c : fffff800`02c88100 fffff880`0656ec58 00000000`00000000 00000000`00000000 : nt!CcWriteBehind+0x5bc
fffff880`0656ec00 fffff800`02a8e961 : fffffa80`0520aab0 fffff880`014bf230 fffff800`02c88140 00000000`00000002 : nt!CcWorkerThread+0x1c8
fffff880`0656ecb0 fffff800`02d24bc6 : 00000000`0286305b fffffa80`09325a20 00000000`00000080 fffffa80`051f1b30 : nt!ExpWorkerThread+0x111
fffff880`0656ed40 fffff800`02a5fbc6 : fffff800`02bfbe80 fffffa80`09325a20 fffffa80`052091a0 fffff880`01449534 : nt!PspSystemThreadStartup+0x5a
fffff880`0656ed80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02b1133c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------