阅读610 返回首页    go 微软 go windows


这几天连着两次蓝屏了,能帮忙看下吗

Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\mx\Desktop\092417-7140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.1715.amd64fre.rs1_release_inmarket.170906-1810
Machine Name:
Kernel base = 0xfffff803`d1891000 PsLoadedModuleList = 0xfffff803`d1b8f040
Debug session time: Sun Sep 24 10:18:25.843 2017 (UTC + 8:00)
System Uptime: 1 days 12:23:23.676
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffff8808d9e408fa, 10, ffff8808d9e408fa, 2}


Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiSystemFault+100265 )

Followup:     MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8808d9e408fa, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffff8808d9e408fa, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.14393.1715 (rs1_release_inmarket.170906-1810)

SYSTEM_MANUFACTURER:  Hasee Computer

SYSTEM_PRODUCT_NAME:  CP75S

SYSTEM_SKU:  Not Applicable                  

SYSTEM_VERSION:  Not Applicable                  

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.05.01

BIOS_DATE:  07/13/2016

BASEBOARD_MANUFACTURER:  Notebook                        

BASEBOARD_PRODUCT:  P7xxDM2(-G)                     

BASEBOARD_VERSION:  Not Applicable                  

DUMP_TYPE:  2

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_P1: ffff8808d9e408fa

BUGCHECK_P2: 10

BUGCHECK_P3: ffff8808d9e408fa

BUGCHECK_P4: 2

READ_ADDRESS: fffff803d1c30338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffff8808d9e408fa 

FAULTING_IP: 
+0
ffff8808`d9e408fa ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: 4

CPU_MHZ: a98

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 8A'00000000 (cache) 8A'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  ShellExperienc

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MX

ANALYSIS_SESSION_TIME:  09-24-2017 10:21:44.0139

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

TRAP_FRAME:  ffff9c00e28268e0 -- (.trap 0xffff9c00e28268e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffd1a040 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000052 rsi=0000000000000000 rdi=0000000000000000
rip=ffff8808d9e408fa rsp=ffff9c00e2826a78 rbp=ffff9c00e2826b00
 r8=0000000000005dff  r9=0000000000000000 r10=ffff832c7de21a04
r11=0000000592d96000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffff8808`d9e408fa ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803d1a0acc5 to fffff803d19e08b0

FAILED_INSTRUCTION_ADDRESS: 
+0
ffff8808`d9e408fa ??              ???

STACK_TEXT:  
ffff9c00`e28265e8 fffff803`d1a0acc5 : 00000000`00000050 ffff8808`d9e408fa 00000000`00000010 ffff9c00`e28268e0 : nt!KeBugCheckEx
ffff9c00`e28265f0 fffff803`d18e5f7d : 00000000`00000010 00000000`00000000 ffff9c00`e28268e0 ffff8808`d9e408fa : nt!MiSystemFault+0x100265
ffff9c00`e28266e0 fffff803`d19e9efc : 00000000`00000020 0000017f`6b204330 ffffd689`00000000 fffff803`d19e5c8f : nt!MmAccessFault+0x27d
ffff9c00`e28268e0 ffff8808`d9e408fa : ffff8808`d9f8a1b8 00000005`975ff0c0 ffff1408`3b060463 ffff9c00`e2826b60 : nt!KiPageFault+0x13c
ffff9c00`e2826a78 ffff8808`d9f8a1b8 : 00000005`975ff0c0 ffff1408`3b060463 ffff9c00`e2826b60 ffff9c00`e2826be0 : 0xffff8808`d9e408fa
ffff9c00`e2826a80 00000005`975ff0c0 : ffff1408`3b060463 ffff9c00`e2826b60 ffff9c00`e2826be0 00000005`00000000 : 0xffff8808`d9f8a1b8
ffff9c00`e2826a88 ffff1408`3b060463 : ffff9c00`e2826b60 ffff9c00`e2826be0 00000005`00000000 00001f80`02080014 : 0x00000005`975ff0c0
ffff9c00`e2826a90 ffff9c00`e2826b60 : ffff9c00`e2826be0 00000005`00000000 00001f80`02080014 00007ffa`61df1a90 : 0xffff1408`3b060463
ffff9c00`e2826a98 ffff9c00`e2826be0 : 00000005`00000000 00001f80`02080014 00007ffa`61df1a90 0000017f`6b2860c8 : 0xffff9c00`e2826b60
ffff9c00`e2826aa0 00000005`00000000 : 00001f80`02080014 00007ffa`61df1a90 0000017f`6b2860c8 00000005`975fedf0 : 0xffff9c00`e2826be0
ffff9c00`e2826aa8 00001f80`02080014 : 00007ffa`61df1a90 0000017f`6b2860c8 00000005`975fedf0 00000000`00000800 : 0x00000005`00000000
ffff9c00`e2826ab0 00007ffa`61df1a90 : 0000017f`6b2860c8 00000005`975fedf0 00000000`00000800 00000000`00000100 : 0x00001f80`02080014
ffff9c00`e2826ab8 0000017f`6b2860c8 : 00000005`975fedf0 00000000`00000800 00000000`00000100 0000003f`fd30ef8d : 0x00007ffa`61df1a90
ffff9c00`e2826ac0 00000005`975fedf0 : 00000000`00000800 00000000`00000100 0000003f`fd30ef8d 00000000`00041000 : 0x0000017f`6b2860c8
ffff9c00`e2826ac8 00000000`00000800 : 00000000`00000100 0000003f`fd30ef8d 00000000`00041000 00000005`92d96000 : 0x00000005`975fedf0
ffff9c00`e2826ad0 00000000`00000100 : 0000003f`fd30ef8d 00000000`00041000 00000005`92d96000 4abf2eac`5ade0c1f : 0x800
ffff9c00`e2826ad8 0000003f`fd30ef8d : 00000000`00041000 00000005`92d96000 4abf2eac`5ade0c1f e200b23d`26e44292 : 0x100
ffff9c00`e2826ae0 00000000`00041000 : 00000005`92d96000 4abf2eac`5ade0c1f e200b23d`26e44292 00000000`00000000 : 0x0000003f`fd30ef8d
ffff9c00`e2826ae8 00000005`92d96000 : 4abf2eac`5ade0c1f e200b23d`26e44292 00000000`00000000 00000000`00000000 : 0x41000
ffff9c00`e2826af0 4abf2eac`5ade0c1f : e200b23d`26e44292 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000005`92d96000
ffff9c00`e2826af8 e200b23d`26e44292 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x4abf2eac`5ade0c1f
ffff9c00`e2826b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xe200b23d`26e44292


STACK_COMMAND:  kb

THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  286066363684387324adcce2155fa525a29903d5

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP: 
nt!MiSystemFault+100265
fffff803`d1a0acc5 cc              int     3

FAULT_INSTR_CODE:  cd8341cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+100265

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  59b0d121

IMAGE_VERSION:  10.0.14393.1715

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  100265

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_nt!MiSystemFault

TARGET_TIME:  2017-09-24T02:18:25.000Z

OSBUILD:  14393

OSSERVICEPACK:  1715

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2017-09-07 12:54:57

BUILDDATESTAMP_STR:  170906-1810

BUILDLAB_STR:  rs1_release_inmarket

BUILDOSVER_STR:  10.0.14393.1715

ANALYSIS_SESSION_ELAPSED_TIME:  4b9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_nt!misystemfault

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------

上面是第二次的,下面是第一次的。。。看了下错误代码好像不一样


Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\mx\Desktop\092217-6093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.1715.amd64fre.rs1_release_inmarket.170906-1810
Machine Name:
Kernel base = 0xfffff803`52e91000 PsLoadedModuleList = 0xfffff803`5318f040
Debug session time: Fri Sep 22 21:54:32.961 2017 (UTC + 8:00)
System Uptime: 0 days 10:26:53.799
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
......................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 139, {2, ffffa801fa7edc90, ffffa801fa7edbe8, 0}

*** ERROR: Module load completed but symbols could not be loaded for NTFS.sys
Probably caused by : memory_corruption

Followup:     memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffa801fa7edc90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa801fa7edbe8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.14393.1715 (rs1_release_inmarket.170906-1810)

SYSTEM_MANUFACTURER:  Hasee Computer

SYSTEM_PRODUCT_NAME:  CP75S

SYSTEM_SKU:  Not Applicable                  

SYSTEM_VERSION:  Not Applicable                  

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.05.01

BIOS_DATE:  07/13/2016

BASEBOARD_MANUFACTURER:  Notebook                        

BASEBOARD_PRODUCT:  P7xxDM2(-G)                     

BASEBOARD_VERSION:  Not Applicable                  

DUMP_TYPE:  2

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_P1: 2

BUGCHECK_P2: ffffa801fa7edc90

BUGCHECK_P3: ffffa801fa7edbe8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd1834af00b4f -- (.trap 0xffffd1834af00b4f)
Unable to read trap frame at ffffd183`4af00b4f

EXCEPTION_RECORD:  ffffa801f0aed100 -- (.exr 0xffffa801f0aed100)
Cannot read Exception record @ ffffa801f0aed100

CPU_COUNT: 4

CPU_MHZ: a98

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 8A'00000000 (cache) 8A'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

WATSON_BKT_EVENT:  BEX

ANALYSIS_SESSION_HOST:  MX

ANALYSIS_SESSION_TIME:  09-24-2017 10:23:55.0938

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80352feba29 to fffff80352fe08b0

FAULTING_THREAD:  0000000000000000

STACK_TEXT:  
ffffa801`fa7ed968 fffff803`52feba29 : 00000000`00000139 00000000`00000002 ffffa801`fa7edc90 ffffa801`fa7edbe8 : nt!KeBugCheckEx
ffffa801`fa7ed970 fffff803`52febd90 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff803`52eca4a1 : nt!KiBugCheckDispatch+0x69
ffffa801`fa7edab0 fffff803`52fead73 : ffffa801`fa7edf70 fffff803`52e1e277 ffffffff`ffd01a58 00000000`0000002f : nt!KiFastFailDispatch+0xd0
ffffa801`fa7edc90 fffff80c`3ec700c5 : fffff80c`3ec47616 fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c : nt!KiRaiseSecurityCheckFailure+0xf3
ffffa801`fa7ede28 fffff80c`3ec47616 : fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c fffff803`52e91000 : NTFS+0x500c5
ffffa801`fa7ede30 fffff803`52fe6cad : ffffa801`fa7f0000 ffffa801`fa7edf90 00000000`00000000 ffffa801`fa7e9000 : NTFS+0x27616
ffffa801`fa7ede60 fffff803`52f3a301 : ffffa801`fa7f0000 00000000`00000000 ffffa801`fa7e9000 fffff803`52fe56c6 : nt!RtlpExecuteHandlerForException+0xd
ffffa801`fa7ede90 fffff803`52f39077 : ffffa801`fa7eed88 ffffa801`fa7eeac0 ffffa801`fa7eed88 00000000`0010001f : nt!RtlDispatchException+0x421
ffffa801`fa7ee590 fffff803`52febb0e : ffffa801`f0aed100 00000000`00000000 ffffd183`4af00b4f ffffd183`4af5e9f8 : nt!KiDispatchException+0x1d7
ffffa801`fa7eec50 fffff803`52fe9fe1 : 00000000`00000006 00000000`00000011 9b93a053`907d5b7c 00000000`00000034 : nt!KiExceptionDispatch+0xce
ffffa801`fa7eee30 ffffd183`4af0458a : ffffd183`4a747400 fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 : nt!KiPageFault+0x221
ffffa801`fa7eefc0 ffffd183`4a747400 : fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 : 0xffffd183`4af0458a
ffffa801`fa7eefc8 fffff803`53189260 : ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a : 0xffffd183`4a747400
ffffa801`fa7eefd0 ffffd183`4af0056b : ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 : nt!PsWin32CallBack
ffffa801`fa7eefd8 ffffffff`b8797400 : 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 : 0xffffd183`4af0056b
ffffa801`fa7eefe0 00000000`00000000 : fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 ffffd183`41c87f40 : 0xffffffff`b8797400


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80352fe0b63-fffff80352fe0b70  14 bytes - nt!KiRestoreProcessorControlState+33
[ 0f 01 59 66 0f b7 41 70:68 00 50 77 d6 c7 44 24 ]
    fffff80352fe0c40-fffff80352fe0c4d  14 bytes - nt!KiSaveProcessorControlState+50 (+0xdd)
[ 0f 01 49 66 0f 00 49 70:68 00 e0 77 d6 c7 44 24 ]
28 errors : !nt (fffff80352fe0b63-fffff80352fe0c4d)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  ~0s ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2017-09-22T13:54:32.000Z

OSBUILD:  14393

OSSERVICEPACK:  1715

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2017-09-07 12:54:57

BUILDDATESTAMP_STR:  170906-1810

BUILDLAB_STR:  rs1_release_inmarket

BUILDOSVER_STR:  10.0.14393.1715

ANALYSIS_SESSION_ELAPSED_TIME:  1323

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\mx\Desktop\092217-6093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.1715.amd64fre.rs1_release_inmarket.170906-1810
Machine Name:
Kernel base = 0xfffff803`52e91000 PsLoadedModuleList = 0xfffff803`5318f040
Debug session time: Fri Sep 22 21:54:32.961 2017 (UTC + 8:00)
System Uptime: 0 days 10:26:53.799
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
......................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 139, {2, ffffa801fa7edc90, ffffa801fa7edbe8, 0}

*** ERROR: Module load completed but symbols could not be loaded for NTFS.sys
Probably caused by : memory_corruption

Followup:     memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffa801fa7edc90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa801fa7edbe8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.14393.1715 (rs1_release_inmarket.170906-1810)

SYSTEM_MANUFACTURER:  Hasee Computer

SYSTEM_PRODUCT_NAME:  CP75S

SYSTEM_SKU:  Not Applicable                  

SYSTEM_VERSION:  Not Applicable                  

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.05.01

BIOS_DATE:  07/13/2016

BASEBOARD_MANUFACTURER:  Notebook                        

BASEBOARD_PRODUCT:  P7xxDM2(-G)                     

BASEBOARD_VERSION:  Not Applicable                  

DUMP_TYPE:  2

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_P1: 2

BUGCHECK_P2: ffffa801fa7edc90

BUGCHECK_P3: ffffa801fa7edbe8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd1834af00b4f -- (.trap 0xffffd1834af00b4f)
Unable to read trap frame at ffffd183`4af00b4f

EXCEPTION_RECORD:  ffffa801f0aed100 -- (.exr 0xffffa801f0aed100)
Cannot read Exception record @ ffffa801f0aed100

CPU_COUNT: 4

CPU_MHZ: a98

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 8A'00000000 (cache) 8A'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

WATSON_BKT_EVENT:  BEX

ANALYSIS_SESSION_HOST:  MX

ANALYSIS_SESSION_TIME:  09-24-2017 10:23:55.0938

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80352feba29 to fffff80352fe08b0

FAULTING_THREAD:  0000000000000000

STACK_TEXT:  
ffffa801`fa7ed968 fffff803`52feba29 : 00000000`00000139 00000000`00000002 ffffa801`fa7edc90 ffffa801`fa7edbe8 : nt!KeBugCheckEx
ffffa801`fa7ed970 fffff803`52febd90 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff803`52eca4a1 : nt!KiBugCheckDispatch+0x69
ffffa801`fa7edab0 fffff803`52fead73 : ffffa801`fa7edf70 fffff803`52e1e277 ffffffff`ffd01a58 00000000`0000002f : nt!KiFastFailDispatch+0xd0
ffffa801`fa7edc90 fffff80c`3ec700c5 : fffff80c`3ec47616 fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c : nt!KiRaiseSecurityCheckFailure+0xf3
ffffa801`fa7ede28 fffff80c`3ec47616 : fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c fffff803`52e91000 : NTFS+0x500c5
ffffa801`fa7ede30 fffff803`52fe6cad : ffffa801`fa7f0000 ffffa801`fa7edf90 00000000`00000000 ffffa801`fa7e9000 : NTFS+0x27616
ffffa801`fa7ede60 fffff803`52f3a301 : ffffa801`fa7f0000 00000000`00000000 ffffa801`fa7e9000 fffff803`52fe56c6 : nt!RtlpExecuteHandlerForException+0xd
ffffa801`fa7ede90 fffff803`52f39077 : ffffa801`fa7eed88 ffffa801`fa7eeac0 ffffa801`fa7eed88 00000000`0010001f : nt!RtlDispatchException+0x421
ffffa801`fa7ee590 fffff803`52febb0e : ffffa801`f0aed100 00000000`00000000 ffffd183`4af00b4f ffffd183`4af5e9f8 : nt!KiDispatchException+0x1d7
ffffa801`fa7eec50 fffff803`52fe9fe1 : 00000000`00000006 00000000`00000011 9b93a053`907d5b7c 00000000`00000034 : nt!KiExceptionDispatch+0xce
ffffa801`fa7eee30 ffffd183`4af0458a : ffffd183`4a747400 fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 : nt!KiPageFault+0x221
ffffa801`fa7eefc0 ffffd183`4a747400 : fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 : 0xffffd183`4af0458a
ffffa801`fa7eefc8 fffff803`53189260 : ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a : 0xffffd183`4a747400
ffffa801`fa7eefd0 ffffd183`4af0056b : ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 : nt!PsWin32CallBack
ffffa801`fa7eefd8 ffffffff`b8797400 : 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 : 0xffffd183`4af0056b
ffffa801`fa7eefe0 00000000`00000000 : fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 ffffd183`41c87f40 : 0xffffffff`b8797400


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80352fe0b63-fffff80352fe0b70  14 bytes - nt!KiRestoreProcessorControlState+33
[ 0f 01 59 66 0f b7 41 70:68 00 50 77 d6 c7 44 24 ]
    fffff80352fe0c40-fffff80352fe0c4d  14 bytes - nt!KiSaveProcessorControlState+50 (+0xdd)
[ 0f 01 49 66 0f 00 49 70:68 00 e0 77 d6 c7 44 24 ]
28 errors : !nt (fffff80352fe0b63-fffff80352fe0c4d)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  ~0s ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2017-09-22T13:54:32.000Z

OSBUILD:  14393

OSSERVICEPACK:  1715

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2017-09-07 12:54:57

BUILDDATESTAMP_STR:  170906-1810

BUILDLAB_STR:  rs1_release_inmarket

BUILDOSVER_STR:  10.0.14393.1715

ANALYSIS_SESSION_ELAPSED_TIME:  1323

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------



最后更新:2017-09-24 11:03:15

  上一篇:go 电脑经常蓝屏提示我出现问题,然后闪退重启,去买电脑那里他又说要重装系统,怎么回事啊
  下一篇:go xbox live怎么关闭家长监护