这几天连着两次蓝屏了,能帮忙看下吗
Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\mx\Desktop\092417-7140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.1715.amd64fre.rs1_release_inmarket.170906-1810
Machine Name:
Kernel base = 0xfffff803`d1891000 PsLoadedModuleList = 0xfffff803`d1b8f040
Debug session time: Sun Sep 24 10:18:25.843 2017 (UTC + 8:00)
System Uptime: 1 days 12:23:23.676
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffff8808d9e408fa, 10, ffff8808d9e408fa, 2}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiSystemFault+100265 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8808d9e408fa, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffff8808d9e408fa, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.14393.1715 (rs1_release_inmarket.170906-1810)
SYSTEM_MANUFACTURER: Hasee Computer
SYSTEM_PRODUCT_NAME: CP75S
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1.05.01
BIOS_DATE: 07/13/2016
BASEBOARD_MANUFACTURER: Notebook
BASEBOARD_PRODUCT: P7xxDM2(-G)
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: ffff8808d9e408fa
BUGCHECK_P2: 10
BUGCHECK_P3: ffff8808d9e408fa
BUGCHECK_P4: 2
READ_ADDRESS: fffff803d1c30338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff8808d9e408fa
FAULTING_IP:
+0
ffff8808`d9e408fa ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: 4
CPU_MHZ: a98
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 8A'00000000 (cache) 8A'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: ShellExperienc
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: MX
ANALYSIS_SESSION_TIME: 09-24-2017 10:21:44.0139
ANALYSIS_VERSION: 10.0.15063.468 amd64fre
TRAP_FRAME: ffff9c00e28268e0 -- (.trap 0xffff9c00e28268e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffd1a040 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000052 rsi=0000000000000000 rdi=0000000000000000
rip=ffff8808d9e408fa rsp=ffff9c00e2826a78 rbp=ffff9c00e2826b00
r8=0000000000005dff r9=0000000000000000 r10=ffff832c7de21a04
r11=0000000592d96000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ffff8808`d9e408fa ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803d1a0acc5 to fffff803d19e08b0
FAILED_INSTRUCTION_ADDRESS:
+0
ffff8808`d9e408fa ?? ???
STACK_TEXT:
ffff9c00`e28265e8 fffff803`d1a0acc5 : 00000000`00000050 ffff8808`d9e408fa 00000000`00000010 ffff9c00`e28268e0 : nt!KeBugCheckEx
ffff9c00`e28265f0 fffff803`d18e5f7d : 00000000`00000010 00000000`00000000 ffff9c00`e28268e0 ffff8808`d9e408fa : nt!MiSystemFault+0x100265
ffff9c00`e28266e0 fffff803`d19e9efc : 00000000`00000020 0000017f`6b204330 ffffd689`00000000 fffff803`d19e5c8f : nt!MmAccessFault+0x27d
ffff9c00`e28268e0 ffff8808`d9e408fa : ffff8808`d9f8a1b8 00000005`975ff0c0 ffff1408`3b060463 ffff9c00`e2826b60 : nt!KiPageFault+0x13c
ffff9c00`e2826a78 ffff8808`d9f8a1b8 : 00000005`975ff0c0 ffff1408`3b060463 ffff9c00`e2826b60 ffff9c00`e2826be0 : 0xffff8808`d9e408fa
ffff9c00`e2826a80 00000005`975ff0c0 : ffff1408`3b060463 ffff9c00`e2826b60 ffff9c00`e2826be0 00000005`00000000 : 0xffff8808`d9f8a1b8
ffff9c00`e2826a88 ffff1408`3b060463 : ffff9c00`e2826b60 ffff9c00`e2826be0 00000005`00000000 00001f80`02080014 : 0x00000005`975ff0c0
ffff9c00`e2826a90 ffff9c00`e2826b60 : ffff9c00`e2826be0 00000005`00000000 00001f80`02080014 00007ffa`61df1a90 : 0xffff1408`3b060463
ffff9c00`e2826a98 ffff9c00`e2826be0 : 00000005`00000000 00001f80`02080014 00007ffa`61df1a90 0000017f`6b2860c8 : 0xffff9c00`e2826b60
ffff9c00`e2826aa0 00000005`00000000 : 00001f80`02080014 00007ffa`61df1a90 0000017f`6b2860c8 00000005`975fedf0 : 0xffff9c00`e2826be0
ffff9c00`e2826aa8 00001f80`02080014 : 00007ffa`61df1a90 0000017f`6b2860c8 00000005`975fedf0 00000000`00000800 : 0x00000005`00000000
ffff9c00`e2826ab0 00007ffa`61df1a90 : 0000017f`6b2860c8 00000005`975fedf0 00000000`00000800 00000000`00000100 : 0x00001f80`02080014
ffff9c00`e2826ab8 0000017f`6b2860c8 : 00000005`975fedf0 00000000`00000800 00000000`00000100 0000003f`fd30ef8d : 0x00007ffa`61df1a90
ffff9c00`e2826ac0 00000005`975fedf0 : 00000000`00000800 00000000`00000100 0000003f`fd30ef8d 00000000`00041000 : 0x0000017f`6b2860c8
ffff9c00`e2826ac8 00000000`00000800 : 00000000`00000100 0000003f`fd30ef8d 00000000`00041000 00000005`92d96000 : 0x00000005`975fedf0
ffff9c00`e2826ad0 00000000`00000100 : 0000003f`fd30ef8d 00000000`00041000 00000005`92d96000 4abf2eac`5ade0c1f : 0x800
ffff9c00`e2826ad8 0000003f`fd30ef8d : 00000000`00041000 00000005`92d96000 4abf2eac`5ade0c1f e200b23d`26e44292 : 0x100
ffff9c00`e2826ae0 00000000`00041000 : 00000005`92d96000 4abf2eac`5ade0c1f e200b23d`26e44292 00000000`00000000 : 0x0000003f`fd30ef8d
ffff9c00`e2826ae8 00000005`92d96000 : 4abf2eac`5ade0c1f e200b23d`26e44292 00000000`00000000 00000000`00000000 : 0x41000
ffff9c00`e2826af0 4abf2eac`5ade0c1f : e200b23d`26e44292 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000005`92d96000
ffff9c00`e2826af8 e200b23d`26e44292 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x4abf2eac`5ade0c1f
ffff9c00`e2826b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xe200b23d`26e44292
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 286066363684387324adcce2155fa525a29903d5
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!MiSystemFault+100265
fffff803`d1a0acc5 cc int 3
FAULT_INSTR_CODE: cd8341cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+100265
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 59b0d121
IMAGE_VERSION: 10.0.14393.1715
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 100265
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault
TARGET_TIME: 2017-09-24T02:18:25.000Z
OSBUILD: 14393
OSSERVICEPACK: 1715
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-09-07 12:54:57
BUILDDATESTAMP_STR: 170906-1810
BUILDLAB_STR: rs1_release_inmarket
BUILDOSVER_STR: 10.0.14393.1715
ANALYSIS_SESSION_ELAPSED_TIME: 4b9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault
FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
Followup: MachineOwner
---------
上面是第二次的,下面是第一次的。。。看了下错误代码好像不一样
Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\mx\Desktop\092217-6093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.1715.amd64fre.rs1_release_inmarket.170906-1810
Machine Name:
Kernel base = 0xfffff803`52e91000 PsLoadedModuleList = 0xfffff803`5318f040
Debug session time: Fri Sep 22 21:54:32.961 2017 (UTC + 8:00)
System Uptime: 0 days 10:26:53.799
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
......................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {2, ffffa801fa7edc90, ffffa801fa7edbe8, 0}
*** ERROR: Module load completed but symbols could not be loaded for NTFS.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffa801fa7edc90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa801fa7edbe8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.14393.1715 (rs1_release_inmarket.170906-1810)
SYSTEM_MANUFACTURER: Hasee Computer
SYSTEM_PRODUCT_NAME: CP75S
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1.05.01
BIOS_DATE: 07/13/2016
BASEBOARD_MANUFACTURER: Notebook
BASEBOARD_PRODUCT: P7xxDM2(-G)
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: 2
BUGCHECK_P2: ffffa801fa7edc90
BUGCHECK_P3: ffffa801fa7edbe8
BUGCHECK_P4: 0
TRAP_FRAME: ffffd1834af00b4f -- (.trap 0xffffd1834af00b4f)
Unable to read trap frame at ffffd183`4af00b4f
EXCEPTION_RECORD: ffffa801f0aed100 -- (.exr 0xffffa801f0aed100)
Cannot read Exception record @ ffffa801f0aed100
CPU_COUNT: 4
CPU_MHZ: a98
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 8A'00000000 (cache) 8A'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
DEFAULT_BUCKET_ID: CODE_CORRUPTION
WATSON_BKT_EVENT: BEX
ANALYSIS_SESSION_HOST: MX
ANALYSIS_SESSION_TIME: 09-24-2017 10:23:55.0938
ANALYSIS_VERSION: 10.0.15063.468 amd64fre
LAST_CONTROL_TRANSFER: from fffff80352feba29 to fffff80352fe08b0
FAULTING_THREAD: 0000000000000000
STACK_TEXT:
ffffa801`fa7ed968 fffff803`52feba29 : 00000000`00000139 00000000`00000002 ffffa801`fa7edc90 ffffa801`fa7edbe8 : nt!KeBugCheckEx
ffffa801`fa7ed970 fffff803`52febd90 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff803`52eca4a1 : nt!KiBugCheckDispatch+0x69
ffffa801`fa7edab0 fffff803`52fead73 : ffffa801`fa7edf70 fffff803`52e1e277 ffffffff`ffd01a58 00000000`0000002f : nt!KiFastFailDispatch+0xd0
ffffa801`fa7edc90 fffff80c`3ec700c5 : fffff80c`3ec47616 fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c : nt!KiRaiseSecurityCheckFailure+0xf3
ffffa801`fa7ede28 fffff80c`3ec47616 : fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c fffff803`52e91000 : NTFS+0x500c5
ffffa801`fa7ede30 fffff803`52fe6cad : ffffa801`fa7f0000 ffffa801`fa7edf90 00000000`00000000 ffffa801`fa7e9000 : NTFS+0x27616
ffffa801`fa7ede60 fffff803`52f3a301 : ffffa801`fa7f0000 00000000`00000000 ffffa801`fa7e9000 fffff803`52fe56c6 : nt!RtlpExecuteHandlerForException+0xd
ffffa801`fa7ede90 fffff803`52f39077 : ffffa801`fa7eed88 ffffa801`fa7eeac0 ffffa801`fa7eed88 00000000`0010001f : nt!RtlDispatchException+0x421
ffffa801`fa7ee590 fffff803`52febb0e : ffffa801`f0aed100 00000000`00000000 ffffd183`4af00b4f ffffd183`4af5e9f8 : nt!KiDispatchException+0x1d7
ffffa801`fa7eec50 fffff803`52fe9fe1 : 00000000`00000006 00000000`00000011 9b93a053`907d5b7c 00000000`00000034 : nt!KiExceptionDispatch+0xce
ffffa801`fa7eee30 ffffd183`4af0458a : ffffd183`4a747400 fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 : nt!KiPageFault+0x221
ffffa801`fa7eefc0 ffffd183`4a747400 : fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 : 0xffffd183`4af0458a
ffffa801`fa7eefc8 fffff803`53189260 : ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a : 0xffffd183`4a747400
ffffa801`fa7eefd0 ffffd183`4af0056b : ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 : nt!PsWin32CallBack
ffffa801`fa7eefd8 ffffffff`b8797400 : 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 : 0xffffd183`4af0056b
ffffa801`fa7eefe0 00000000`00000000 : fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 ffffd183`41c87f40 : 0xffffffff`b8797400
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80352fe0b63-fffff80352fe0b70 14 bytes - nt!KiRestoreProcessorControlState+33
[ 0f 01 59 66 0f b7 41 70:68 00 50 77 d6 c7 44 24 ]
fffff80352fe0c40-fffff80352fe0c4d 14 bytes - nt!KiSaveProcessorControlState+50 (+0xdd)
[ 0f 01 49 66 0f 00 49 70:68 00 e0 77 d6 c7 44 24 ]
28 errors : !nt (fffff80352fe0b63-fffff80352fe0c4d)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: ~0s ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-09-22T13:54:32.000Z
OSBUILD: 14393
OSSERVICEPACK: 1715
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-09-07 12:54:57
BUILDDATESTAMP_STR: 170906-1810
BUILDLAB_STR: rs1_release_inmarket
BUILDOSVER_STR: 10.0.14393.1715
ANALYSIS_SESSION_ELAPSED_TIME: 1323
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\mx\Desktop\092217-6093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.1715.amd64fre.rs1_release_inmarket.170906-1810
Machine Name:
Kernel base = 0xfffff803`52e91000 PsLoadedModuleList = 0xfffff803`5318f040
Debug session time: Fri Sep 22 21:54:32.961 2017 (UTC + 8:00)
System Uptime: 0 days 10:26:53.799
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
......................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {2, ffffa801fa7edc90, ffffa801fa7edbe8, 0}
*** ERROR: Module load completed but symbols could not be loaded for NTFS.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffa801fa7edc90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa801fa7edbe8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.14393.1715 (rs1_release_inmarket.170906-1810)
SYSTEM_MANUFACTURER: Hasee Computer
SYSTEM_PRODUCT_NAME: CP75S
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1.05.01
BIOS_DATE: 07/13/2016
BASEBOARD_MANUFACTURER: Notebook
BASEBOARD_PRODUCT: P7xxDM2(-G)
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: 2
BUGCHECK_P2: ffffa801fa7edc90
BUGCHECK_P3: ffffa801fa7edbe8
BUGCHECK_P4: 0
TRAP_FRAME: ffffd1834af00b4f -- (.trap 0xffffd1834af00b4f)
Unable to read trap frame at ffffd183`4af00b4f
EXCEPTION_RECORD: ffffa801f0aed100 -- (.exr 0xffffa801f0aed100)
Cannot read Exception record @ ffffa801f0aed100
CPU_COUNT: 4
CPU_MHZ: a98
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 8A'00000000 (cache) 8A'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
DEFAULT_BUCKET_ID: CODE_CORRUPTION
WATSON_BKT_EVENT: BEX
ANALYSIS_SESSION_HOST: MX
ANALYSIS_SESSION_TIME: 09-24-2017 10:23:55.0938
ANALYSIS_VERSION: 10.0.15063.468 amd64fre
LAST_CONTROL_TRANSFER: from fffff80352feba29 to fffff80352fe08b0
FAULTING_THREAD: 0000000000000000
STACK_TEXT:
ffffa801`fa7ed968 fffff803`52feba29 : 00000000`00000139 00000000`00000002 ffffa801`fa7edc90 ffffa801`fa7edbe8 : nt!KeBugCheckEx
ffffa801`fa7ed970 fffff803`52febd90 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff803`52eca4a1 : nt!KiBugCheckDispatch+0x69
ffffa801`fa7edab0 fffff803`52fead73 : ffffa801`fa7edf70 fffff803`52e1e277 ffffffff`ffd01a58 00000000`0000002f : nt!KiFastFailDispatch+0xd0
ffffa801`fa7edc90 fffff80c`3ec700c5 : fffff80c`3ec47616 fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c : nt!KiRaiseSecurityCheckFailure+0xf3
ffffa801`fa7ede28 fffff80c`3ec47616 : fffff803`532305f0 fffff803`52f3b6d4 fffff80c`3ecdb71c fffff803`52e91000 : NTFS+0x500c5
ffffa801`fa7ede30 fffff803`52fe6cad : ffffa801`fa7f0000 ffffa801`fa7edf90 00000000`00000000 ffffa801`fa7e9000 : NTFS+0x27616
ffffa801`fa7ede60 fffff803`52f3a301 : ffffa801`fa7f0000 00000000`00000000 ffffa801`fa7e9000 fffff803`52fe56c6 : nt!RtlpExecuteHandlerForException+0xd
ffffa801`fa7ede90 fffff803`52f39077 : ffffa801`fa7eed88 ffffa801`fa7eeac0 ffffa801`fa7eed88 00000000`0010001f : nt!RtlDispatchException+0x421
ffffa801`fa7ee590 fffff803`52febb0e : ffffa801`f0aed100 00000000`00000000 ffffd183`4af00b4f ffffd183`4af5e9f8 : nt!KiDispatchException+0x1d7
ffffa801`fa7eec50 fffff803`52fe9fe1 : 00000000`00000006 00000000`00000011 9b93a053`907d5b7c 00000000`00000034 : nt!KiExceptionDispatch+0xce
ffffa801`fa7eee30 ffffd183`4af0458a : ffffd183`4a747400 fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 : nt!KiPageFault+0x221
ffffa801`fa7eefc0 ffffd183`4a747400 : fffff803`53189260 ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 : 0xffffd183`4af0458a
ffffa801`fa7eefc8 fffff803`53189260 : ffffd183`4af0056b ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a : 0xffffd183`4a747400
ffffa801`fa7eefd0 ffffd183`4af0056b : ffffffff`b8797400 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 : nt!PsWin32CallBack
ffffa801`fa7eefd8 ffffffff`b8797400 : 00000000`00000000 fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 : 0xffffd183`4af0056b
ffffa801`fa7eefe0 00000000`00000000 : fffff80c`3ed29a4a ffffa801`fa7ef840 ffffd183`402443a0 ffffd183`41c87f40 : 0xffffffff`b8797400
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80352fe0b63-fffff80352fe0b70 14 bytes - nt!KiRestoreProcessorControlState+33
[ 0f 01 59 66 0f b7 41 70:68 00 50 77 d6 c7 44 24 ]
fffff80352fe0c40-fffff80352fe0c4d 14 bytes - nt!KiSaveProcessorControlState+50 (+0xdd)
[ 0f 01 49 66 0f 00 49 70:68 00 e0 77 d6 c7 44 24 ]
28 errors : !nt (fffff80352fe0b63-fffff80352fe0c4d)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: ~0s ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-09-22T13:54:32.000Z
OSBUILD: 14393
OSSERVICEPACK: 1715
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-09-07 12:54:57
BUILDDATESTAMP_STR: 170906-1810
BUILDLAB_STR: rs1_release_inmarket
BUILDOSVER_STR: 10.0.14393.1715
ANALYSIS_SESSION_ELAPSED_TIME: 1323
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
最后更新:2017-09-24 11:03:15
上一篇:
电脑经常蓝屏提示我出现问题,然后闪退重启,去买电脑那里他又说要重装系统,怎么回事啊
下一篇:
xbox live怎么关闭家长监护
你的设备已过期,并缺少重要的安全和质量更新,因此存在风险。让我们带你重回正轨,这样
Microsoft store 无法联网,显示Microsoft Store需要联网,你似乎没有联网
设备以迁移 由于仅部分匹配或匹配不明确,因此无法迁移设备
由于在创建转储期间出错,创建转储文件失败。
发生临时 DNS 错误
应用商店,在我们这边发生问题,无法使你登陆,错误代码: 0xD000000D
照相机不可用,错误代码:0xA00F4244(0xC00DABE0)
应用商店打开异常提示“清单中指定了未知的布局”
自定义扫描Windows defender里面的设备性能和运行状况 黄色感叹号问题
windows预口体验成员内口版本遇到问题需要重启
热门内容
windows10 点开此电脑后,有两个显示硬盘盘符的目录是怎么回事?
windows 10 专业版无法下载中文语言包
KB4056892
win10不能共享文件夹
在Surfacebook上用Windows to go 1703版本,更新后重启蓝屏,无法进入系统
windows10 1709版本更新失败,错误0x8007001f
microdoft visual c++ 2015 redistributable
WIN10 Insider Preview 17025更新失败,错误代码0x80096004
计算机管理服务 出现一个内部错误(INVALID
关于控制面板中的安全和维护内提示Windows defender 防病毒已关闭的问题