MagicAndre1981
Admiral
- Registriert
- Feb. 2004
- Beiträge
- 7.463
ändere mal die Command Rate im BIOS/UEFI auf 2.
Folge dem Video um zu sehen, wie unsere Website als Web-App auf dem Startbildschirm installiert werden kann.
Anmerkung: Diese Funktion ist in einigen Browsern möglicherweise nicht verfügbar.
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
fffff96000189f00-fffff96000189f0e 15 bytes - win32k!bSpComputeScan+95
[ 40 43 39 00 60 f9 ff ff:00 44 0a 02 80 09 72 01 ]
fffff96000189f10-fffff96000189f1a 11 bytes - win32k!bSpComputeScan+a5 (+0x10)
[ a0 aa 13 00 60 f9 ff ff:00 dd fb ff 00 b7 d5 00 ]
fffff96000189f1c-fffff96000189f1e 3 bytes - win32k!bSpComputeScan+b1 (+0x0c)
[ 60 f9 ff:00 a5 fb ]
fffff96000189f20-fffff96000189f26 7 bytes - win32k!bSpComputeScan+b5 (+0x04)
[ d0 5c 18 00 60 f9 ff:00 8f ff ff 03 9c e3 ]
fffff96000189f28-fffff96000189f36 15 bytes - win32k!bSpComputeScan+bd (+0x08)
[ 70 fa 25 00 60 f9 ff ff:87 f4 c5 ff 80 ae 09 01 ]
fffff96000189f38-fffff96000189f3a 3 bytes - win32k!_RegisterLogonProcess+9 (+0x10)
[ 50 59 18:00 9b d3 ]
fffff96000189f3c-fffff96000189f42 7 bytes - win32k!_RegisterLogonProcess+d (+0x04)
[ 60 f9 ff ff f0 97 18:c0 aa e1 00 00 ed d5 ]
fffff96000189f44-fffff96000189f5a 23 bytes - win32k!_RegisterLogonProcess+15 (+0x08)
[ 60 f9 ff ff c0 d8 16 00:00 53 06 00 80 23 07 02 ]
fffff96000189f5c-fffff96000189f72 23 bytes - win32k!_RegisterLogonProcess+2d (+0x18)
[ 60 f9 ff ff 44 40 15 00:00 3d 15 01 40 ac b0 ff ]
fffff96000189f74-fffff96000189f76 3 bytes - win32k!_RegisterLogonProcess+45 (+0x18)
[ 60 f9 ff:c0 3a ea ]
fffff96000189f78-fffff96000189f7a 3 bytes - win32k!_RegisterLogonProcess+49 (+0x04)
[ ac b9 26:04 98 dd ]
fffff96000189f7c-fffff96000189f7e 3 bytes - win32k!_RegisterLogonProcess+4d (+0x04)
[ 60 f9 ff:00 86 b0 ]
fffff96000189f80-fffff96000189f82 3 bytes - win32k!_RegisterLogonProcess+51 (+0x04)
[ d0 fd 25:00 d1 fd ]
fffff96000189f84-fffff96000189f8a 7 bytes - win32k!_RegisterLogonProcess+55 (+0x04)
[ 60 f9 ff ff 30 04 19:c0 69 c7 00 01 f4 39 ]
fffff96000189f8c-fffff96000189f96 11 bytes - win32k!_RegisterLogonProcess+5d (+0x08)
[ 60 f9 ff ff 38 11 39 00:c0 fd de 00 40 1f d4 ff ]
fffff96000189f98-fffff96000189f9a 3 bytes - win32k!_RegisterLogonProcess+69 (+0x0c)
[ 0c 90 26:03 ad db ]
fffff96000189f9c-fffff96000189fa2 7 bytes - win32k!_RegisterLogonProcess+6d (+0x04)
[ 60 f9 ff ff e0 2d 13:00 62 c7 00 80 5a e0 ]
fffff96000189fa4-fffff96000189faa 7 bytes - win32k!_RegisterLogonProcess+75 (+0x08)
[ 60 f9 ff ff a4 5d 26:00 02 e3 00 00 26 e2 ]
fffff96000189fac-fffff96000189fae 3 bytes - win32k!_RegisterLogonProcess+7d (+0x08)
[ 60 f9 ff:0c aa af ]
fffff96000189fb0-fffff96000189fb2 3 bytes - win32k!_RegisterLogonProcess+81 (+0x04)
[ b4 8d 26:00 59 a5 ]
fffff96000189fb4-fffff96000189fba 7 bytes - win32k!_RegisterLogonProcess+85 (+0x04)
[ 60 f9 ff ff d0 f2 29:00 28 d7 00 c0 5e df ]
fffff96000189fbc-fffff96000189fc2 7 bytes - win32k!_RegisterLogonProcess+8d (+0x08)
[ 60 f9 ff ff c4 a9 13:40 36 da 00 80 21 3a ]
fffff96000189fc4-fffff96000189fcf 12 bytes - win32k!_RegisterLogonProcess+95 (+0x08)
[ 60 f9 ff ff 28 e1 25 00:00 91 5b 01 00 5c ad ff ]
fffff96000189fd1-fffff96000189fda 10 bytes - win32k!_RegisterLogonProcess+a2 (+0x0d)
[ b6 16 00 60 f9 ff ff 58:1d 1e 01 00 53 c4 00 00 ]
fffff96000189fdc-fffff96000189fde 3 bytes - win32k!_RegisterLogonProcess+ad (+0x0b)
[ 60 f9 ff:80 77 ae ]
fffff96000189fe0-fffff96000189fe2 3 bytes - win32k!_RegisterLogonProcess+b1 (+0x04)
[ ac 8f 26:00 a2 d4 ]
fffff96000189fe4-fffff96000189fe6 3 bytes - win32k!_RegisterLogonProcess+b5 (+0x04)
[ 60 f9 ff:80 f3 b4 ]
fffff96000189fe8-fffff96000189fea 3 bytes - win32k!_RegisterLogonProcess+b9 (+0x04)
[ ac 42 17:05 dc 16 ]
fffff96000189fec-fffff96000189ff6 11 bytes - win32k!_RegisterLogonProcess+bd (+0x04)
[ 60 f9 ff ff 80 78 26 00:40 40 c9 00 c0 a6 ae ff ]
fffff96000189ff8-fffff96000189ffa 3 bytes - win32k!SPRITERANGELOCK::vLockExclusive+a (+0x0c)
[ 60 a7 13:40 7d a5 ]
fffff96000189ffc-fffff96000189fff 4 bytes - win32k!SPRITERANGELOCK::vLockExclusive+e (+0x04)
[ 60 f9 ff ff:00 7e 5f 01 ]
226 errors : !win32k (fffff96000189f00-fffff96000189fff)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffd001a0027000 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE