816
windows
用瀏覽器在線看視頻,或者玩遊戲時電腦偶會會藍屏
64位win10係統
用瀏覽器在線看視頻,或者玩遊戲時電腦偶會會藍屏,下麵是windbg分析的dump文件,希望各位幫忙分析下看問題出在哪裏,謝謝!
Loading Dump File [C:\Windows\Minidump\052617-13078-01.dmp]
Loading Dump File [C:\Windows\Minidump\052617-13078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
************* Symbol Path validation summary **************
Response Time (ms) Location
Response Time (ms) Location
Deferred Deferred SRV*C:\websymbols*https://msdl.microsoft.com/download/symbolsSRV*C:\websymbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: Symbol search path is: SRV*C:\websymbols*https://msdl.microsoft.com/download/symbols
SRV*C:\websymbols*https://msdl.microsoft.com/download/symbols
Executable search path is:
Executable search path is:
Windows 10 Kernel Windows 10 Kernel Version 14393Version 14393 MP MP (4 procs) (4 procs) Free x64
Free x64
Product: Product: WinNtWinNt, suite:, suite: TerminalServer TerminalServer SingleUserTS SingleUserTS
Built by: 14393.1198.amd64fre.rs1_release_sec.170427-1353
Built by: 14393.1198.amd64fre.rs1_release_sec.170427-1353
Machine Name:Machine Name:
Kernel base = 0xfffff803`74605000 PsLoadedModuleList = 0xfffff803`74904000
Kernel base = 0xfffff803`74605000 PsLoadedModuleList = 0xfffff803`74904000
Debug session time: Fri May 26 22:00:08.789 2017 (UTC + 8:00)
Debug session time: Fri May 26 22:00:08.789 2017 (UTC + 8:00)
System Uptime: 3 days 3:14:16.596System Uptime: 3 days 3:14:16.596
Loading Kernel Symbols
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
Run !sym noisy before .reload to track down problems loading symbols.
............................................................................................................................
................................................................................................................................
................................................................................................................................
..........
Loading User Symbols
Loading User Symbols
Loading unloaded module list
.Loading unloaded module list
.................................................................................................
Unable to deliver callback, Unable to deliver callback, 3131
*******************************************************************************
*******************************************************************************
* *
* *
* Bugcheck Analysis *
* Bugcheck Analysis *
* *
* *
*******************************************************************************
*******************************************************************************
Use Use !analyze -v !analyze -v to get detailed debugging information.
to get detailed debugging information.
BugCheck BugCheck 3B3B, {, {c0000005c0000005, , ffffb40d37473dc8ffffb40d37473dc8, , ffffe201db654450ffffe201db654450, , 00}
}
*** WARNING: Unable to verify timestamp for *** WARNING: Unable to verify timestamp for ehdrv.sysehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for *** ERROR: Module load completed but symbols could not be loaded for ehdrv.sysehdrv.sys
Probably caused by : Probably caused by : memory_corruptionmemory_corruption
Followup:
Followup: memory_corruptionmemory_corruption
---------
---------
2: kd> !analyze -v
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffb40d37473dc8, Address of the instruction which caused the bugcheck
Arg3: ffffe201db654450, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffb40d37473dc8, Address of the instruction which caused the bugcheck
Arg3: ffffe201db654450, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
DUMP_CLASS:
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 14393.1198.amd64fre.rs1_release_sec.170427-1353
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0905
BIOS_DATE: 03/18/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: B75M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffb40d37473dc8
BUGCHECK_P3: ffffe201db654450
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+01
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 14393.1198.amd64fre.rs1_release_sec.170427-1353
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0905
BIOS_DATE: 03/18/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: B75M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffb40d37473dc8
BUGCHECK_P3: ffffe201db654450
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+0
ffffb40d`37473dc8 488b8888140000 mov rcx,qword ptr [rax+1488h]
ffffb40d`37473dc8 488b8888140000 mov rcx,qword ptr [rax+1488h]
CONTEXT:
CONTEXT: ffffe201db654450 -- (.cxr 0xffffe201db654450)
ffffe201db654450 -- (.cxr 0xffffe201db654450)
rax=00000000002b6000 rbx=ffffb40d3a76f080 rcx=ffffb40d3a76f080
rdx=ffffe201db654db0 rsi=0000000000000000 rdi=0000000000003f9c
rip=ffffb40d37473dc8 rsp=ffffe201db654e60 rbp=0000000000001aa4
r8=ffffe201db656000 r9=ffffe201db656000 r10=ffffe201db650000
r11=7ffffffffffffffc r12=ffffe201db655360 r13=ffffe201db655110
r14=0000000000000001 r15=ffffb40d3de58080
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000206
ffffb40d`37473dc8 488b8888140000 mov rcx,qword ptr [rax+1488h] ds:002b:00000000`002b7488=????????????????
rax=00000000002b6000 rbx=ffffb40d3a76f080 rcx=ffffb40d3a76f080
rdx=ffffe201db654db0 rsi=0000000000000000 rdi=0000000000003f9c
rip=ffffb40d37473dc8 rsp=ffffe201db654e60 rbp=0000000000001aa4
r8=ffffe201db656000 r9=ffffe201db656000 r10=ffffe201db650000
r11=7ffffffffffffffc r12=ffffe201db655360 r13=ffffe201db655110
r14=0000000000000001 r15=ffffb40d3de58080
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000206
ffffb40d`37473dc8 488b8888140000 mov rcx,qword ptr [rax+1488h] ds:002b:00000000`002b7488=????????????????
Resetting default scope
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: tpweb.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: CV4DB5Z9VXJBWRX
ANALYSIS_SESSION_TIME: 05-26-2017 23:03:26.0492
ANALYSIS_VERSION: 10.0.15063.400 amd64fre
LAST_CONTROL_TRANSFER: from 0000000000000011 to ffffb40d37473dc8
STACK_TEXT:
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: tpweb.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: CV4DB5Z9VXJBWRX
ANALYSIS_SESSION_TIME: 05-26-2017 23:03:26.0492
ANALYSIS_VERSION: 10.0.15063.400 amd64fre
LAST_CONTROL_TRANSFER: from 0000000000000011 to ffffb40d37473dc8
STACK_TEXT:
ffffe201`db654e60 00000000`00000011 : ffffd20a`eca605a0 00000000`00000010 00000000`00010286 ffffb40d`373d06d8 : 0xffffb40d`37473dc8
ffffe201`db654e68 ffffd20a`eca605a0 : 00000000`00000010 00000000`00010286 ffffb40d`373d06d8 ffffb40d`37473ac9 : 0x11
ffffe201`db654e70 00000000`00000010 : 00000000`00010286 ffffb40d`373d06d8 ffffb40d`37473ac9 ffffe201`db656000 : 0xffffd20a`eca605a0
ffffe201`db654e78 00000000`00010286 : ffffb40d`373d06d8 ffffb40d`37473ac9 ffffe201`db656000 ffffb40d`373d06d8 : 0x10
ffffe201`db654e80 ffffb40d`373d06d8 : ffffb40d`37473ac9 ffffe201`db656000 ffffb40d`373d06d8 ffffe201`db650000 : 0x10286
ffffe201`db654e88 ffffb40d`37473ac9 : ffffe201`db656000 ffffb40d`373d06d8 ffffe201`db650000 ffffe201`db655110 : 0xffffb40d`373d06d8
ffffe201`db654e90 ffffe201`db656000 : ffffb40d`373d06d8 ffffe201`db650000 ffffe201`db655110 00000000`00000001 : 0xffffb40d`37473ac9
ffffe201`db654e98 ffffb40d`373d06d8 : ffffe201`db650000 ffffe201`db655110 00000000`00000001 ffffb40d`3de58080 : 0xffffe201`db656000
ffffe201`db654ea0 ffffe201`db650000 : ffffe201`db655110 00000000`00000001 ffffb40d`3de58080 00000000`00000011 : 0xffffb40d`373d06d8
ffffe201`db654ea8 ffffe201`db655110 : 00000000`00000001 ffffb40d`3de58080 00000000`00000011 ffffd20a`eca605a0 : 0xffffe201`db650000
ffffe201`db654eb0 00000000`00000001 : ffffb40d`3de58080 00000000`00000011 ffffd20a`eca605a0 00000000`00000010 : 0xffffe201`db655110
ffffe201`db654eb8 ffffb40d`3de58080 : 00000000`00000011 ffffd20a`eca605a0 00000000`00000010 00000000`00010286 : 0x1
ffffe201`db654ec0 00000000`00000011 : ffffd20a`eca605a0 00000000`00000010 00000000`00010286 ffffb40d`3df89800 : 0xffffb40d`3de58080
ffffe201`db654ec8 ffffd20a`eca605a0 : 00000000`00000010 00000000`00010286 ffffb40d`3df89800 ffffb40d`373dd580 : 0x11
ffffe201`db654ed0 00000000`00000010 : 00000000`00010286 ffffb40d`3df89800 ffffb40d`373dd580 ffffb40d`373e7df8 : 0xffffd20a`eca605a0
ffffe201`db654ed8 00000000`00010286 : ffffb40d`3df89800 ffffb40d`373dd580 ffffb40d`373e7df8 fffff801`4a28ef35 : 0x10
ffffe201`db654ee0 ffffb40d`3df89800 : ffffb40d`373dd580 ffffb40d`373e7df8 fffff801`4a28ef35 ffffb40d`3de58080 : 0x10286
ffffe201`db654ee8 ffffb40d`373dd580 : ffffb40d`373e7df8 fffff801`4a28ef35 ffffb40d`3de58080 00000000`0000003f : 0xffffb40d`3df89800
ffffe201`db654ef0 ffffb40d`373e7df8 : fffff801`4a28ef35 ffffb40d`3de58080 00000000`0000003f 00000000`00000001 : 0xffffb40d`373dd580
ffffe201`db654ef8 fffff801`4a28ef35 : ffffb40d`3de58080 00000000`0000003f 00000000`00000001 00000000`00000040 : 0xffffb40d`373e7df8
ffffe201`db654f00 ffffb40d`3de58080 : 00000000`0000003f 00000000`00000001 00000000`00000040 fffff803`7493a668 : ehdrv+0x1ef35
ffffe201`db654f08 00000000`0000003f : 00000000`00000001 00000000`00000040 fffff803`7493a668 fffff803`74a3d146 : 0xffffb40d`3de58080
ffffe201`db654f10 00000000`00000001 : 00000000`00000040 fffff803`7493a668 fffff803`74a3d146 fffff803`7493a660 : 0x3f
ffffe201`db654f18 00000000`00000040 : fffff803`7493a668 fffff803`74a3d146 fffff803`7493a660 fffff803`7493a668 : 0x1
ffffe201`db654f20 fffff803`7493a668 : fffff803`74a3d146 fffff803`7493a660 fffff803`7493a668 ffffe201`db655110 : 0x40
ffffe201`db654f28 fffff803`74a3d146 : fffff803`7493a660 fffff803`7493a668 ffffe201`db655110 00000000`00000000 : nt!PspCreateThreadNotifyRoutine+0x8
ffffe201`db654f30 fffff803`74a73d8b : 00000000`00000000 ffffe201`db655130 ffffb40d`3de58080 ffffb40d`3de58080 : nt!PspCallThreadNotifyRoutines+0xa6
ffffe201`db654f70 fffff803`74a54643 : ffffb40d`3de58080 ffffb40d`3df89800 ffffe201`db655380 ffffe201`db655090 : nt!PspInsertThread+0x43b
ffffe201`db655030 fffff803`74a5422b : 00000000`00000000 ffffb40d`3e1bc001 ffffe201`00000001 ffffe201`db6553c0 : nt!PspCreateThread+0x23b
ffffe201`db6552f0 fffff803`7475e893 : 00000000`746c6644 ffffe201`db655b08 00000000`00000000 00000000`00000000 : nt!NtCreateThreadEx+0x1ef
ffffe201`db655a90 00007fff`01627784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0088e0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`01627784
ffffe201`db654e60 00000000`00000011 : ffffd20a`eca605a0 00000000`00000010 00000000`00010286 ffffb40d`373d06d8 : 0xffffb40d`37473dc8
ffffe201`db654e68 ffffd20a`eca605a0 : 00000000`00000010 00000000`00010286 ffffb40d`373d06d8 ffffb40d`37473ac9 : 0x11
ffffe201`db654e70 00000000`00000010 : 00000000`00010286 ffffb40d`373d06d8 ffffb40d`37473ac9 ffffe201`db656000 : 0xffffd20a`eca605a0
ffffe201`db654e78 00000000`00010286 : ffffb40d`373d06d8 ffffb40d`37473ac9 ffffe201`db656000 ffffb40d`373d06d8 : 0x10
ffffe201`db654e80 ffffb40d`373d06d8 : ffffb40d`37473ac9 ffffe201`db656000 ffffb40d`373d06d8 ffffe201`db650000 : 0x10286
ffffe201`db654e88 ffffb40d`37473ac9 : ffffe201`db656000 ffffb40d`373d06d8 ffffe201`db650000 ffffe201`db655110 : 0xffffb40d`373d06d8
ffffe201`db654e90 ffffe201`db656000 : ffffb40d`373d06d8 ffffe201`db650000 ffffe201`db655110 00000000`00000001 : 0xffffb40d`37473ac9
ffffe201`db654e98 ffffb40d`373d06d8 : ffffe201`db650000 ffffe201`db655110 00000000`00000001 ffffb40d`3de58080 : 0xffffe201`db656000
ffffe201`db654ea0 ffffe201`db650000 : ffffe201`db655110 00000000`00000001 ffffb40d`3de58080 00000000`00000011 : 0xffffb40d`373d06d8
ffffe201`db654ea8 ffffe201`db655110 : 00000000`00000001 ffffb40d`3de58080 00000000`00000011 ffffd20a`eca605a0 : 0xffffe201`db650000
ffffe201`db654eb0 00000000`00000001 : ffffb40d`3de58080 00000000`00000011 ffffd20a`eca605a0 00000000`00000010 : 0xffffe201`db655110
ffffe201`db654eb8 ffffb40d`3de58080 : 00000000`00000011 ffffd20a`eca605a0 00000000`00000010 00000000`00010286 : 0x1
ffffe201`db654ec0 00000000`00000011 : ffffd20a`eca605a0 00000000`00000010 00000000`00010286 ffffb40d`3df89800 : 0xffffb40d`3de58080
ffffe201`db654ec8 ffffd20a`eca605a0 : 00000000`00000010 00000000`00010286 ffffb40d`3df89800 ffffb40d`373dd580 : 0x11
ffffe201`db654ed0 00000000`00000010 : 00000000`00010286 ffffb40d`3df89800 ffffb40d`373dd580 ffffb40d`373e7df8 : 0xffffd20a`eca605a0
ffffe201`db654ed8 00000000`00010286 : ffffb40d`3df89800 ffffb40d`373dd580 ffffb40d`373e7df8 fffff801`4a28ef35 : 0x10
ffffe201`db654ee0 ffffb40d`3df89800 : ffffb40d`373dd580 ffffb40d`373e7df8 fffff801`4a28ef35 ffffb40d`3de58080 : 0x10286
ffffe201`db654ee8 ffffb40d`373dd580 : ffffb40d`373e7df8 fffff801`4a28ef35 ffffb40d`3de58080 00000000`0000003f : 0xffffb40d`3df89800
ffffe201`db654ef0 ffffb40d`373e7df8 : fffff801`4a28ef35 ffffb40d`3de58080 00000000`0000003f 00000000`00000001 : 0xffffb40d`373dd580
ffffe201`db654ef8 fffff801`4a28ef35 : ffffb40d`3de58080 00000000`0000003f 00000000`00000001 00000000`00000040 : 0xffffb40d`373e7df8
ffffe201`db654f00 ffffb40d`3de58080 : 00000000`0000003f 00000000`00000001 00000000`00000040 fffff803`7493a668 : ehdrv+0x1ef35
ffffe201`db654f08 00000000`0000003f : 00000000`00000001 00000000`00000040 fffff803`7493a668 fffff803`74a3d146 : 0xffffb40d`3de58080
ffffe201`db654f10 00000000`00000001 : 00000000`00000040 fffff803`7493a668 fffff803`74a3d146 fffff803`7493a660 : 0x3f
ffffe201`db654f18 00000000`00000040 : fffff803`7493a668 fffff803`74a3d146 fffff803`7493a660 fffff803`7493a668 : 0x1
ffffe201`db654f20 fffff803`7493a668 : fffff803`74a3d146 fffff803`7493a660 fffff803`7493a668 ffffe201`db655110 : 0x40
ffffe201`db654f28 fffff803`74a3d146 : fffff803`7493a660 fffff803`7493a668 ffffe201`db655110 00000000`00000000 : nt!PspCreateThreadNotifyRoutine+0x8
ffffe201`db654f30 fffff803`74a73d8b : 00000000`00000000 ffffe201`db655130 ffffb40d`3de58080 ffffb40d`3de58080 : nt!PspCallThreadNotifyRoutines+0xa6
ffffe201`db654f70 fffff803`74a54643 : ffffb40d`3de58080 ffffb40d`3df89800 ffffe201`db655380 ffffe201`db655090 : nt!PspInsertThread+0x43b
ffffe201`db655030 fffff803`74a5422b : 00000000`00000000 ffffb40d`3e1bc001 ffffe201`00000001 ffffe201`db6553c0 : nt!PspCreateThread+0x23b
ffffe201`db6552f0 fffff803`7475e893 : 00000000`746c6644 ffffe201`db655b08 00000000`00000000 00000000`00000000 : nt!NtCreateThreadEx+0x1ef
ffffe201`db655a90 00007fff`01627784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0088e0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`01627784
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80374753eb3fffff80374753eb3--fffff80374753ec0fffff80374753ec0 14 bytes 14 bytes - nt!KiRestoreProcessorControlState+33 - nt!KiRestoreProcessorControlState+33
[
[ 0f 0f 01 01 59 59 66 66 0f 0f b7 b7 41 41 70 70::68 68 00 00 60 60 76 76 e3 e3 c7 c7 44 44 24 24 ]
]
fffff80374753f90fffff80374753f90--fffff80374753f9dfffff80374753f9d 14 bytes 14 bytes - nt!KiSaveProcessorControlState+50 - nt!KiSaveProcessorControlState+50 (+0xdd) (+0xdd)
[
[ 0f 0f 01 01 49 49 66 66 0f 0f 00 00 49 49 70 70::68 68 00 00 80 80 76 76 e3 e3 c7 c7 44 44 24 24 ]
]
28 errors : !nt 28 errors : !nt ((fffff80374753eb3fffff80374753eb3--fffff80374753f9dfffff80374753f9d))
MODULE_NAME:
MODULE_NAME: memory_corruption
memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffe201db654450 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-05-26T14:00:08.000Z
OSBUILD: 14393
OSSERVICEPACK: 1198
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-04-28 07:39:04
BUILDDATESTAMP_STR: 170427-1353
BUILDLAB_STR: rs1_release_sec
BUILDOSVER_STR: 10.0.14393.1198.amd64fre.rs1_release_sec.170427-1353
ANALYSIS_SESSION_ELAPSED_TIME: 160a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffe201db654450 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-05-26T14:00:08.000Z
OSBUILD: 14393
OSSERVICEPACK: 1198
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-04-28 07:39:04
BUILDDATESTAMP_STR: 170427-1353
BUILDLAB_STR: rs1_release_sec
BUILDOSVER_STR: 10.0.14393.1198.amd64fre.rs1_release_sec.170427-1353
ANALYSIS_SESSION_ELAPSED_TIME: 160a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
2: kd> lmvm memory_corruption
2: kd> lmvm memory_corruption
Browse full module list
Browse full module list
start end module name
start end module name
最後更新:2017-05-26 23:42:11
上一篇:
激活應用 Microsoft.BingWeather
下一篇:
KB4020102更新詳情?
你的設備已過期,並缺少重要的安全和質量更新,因此存在風險。讓我們帶你重回正軌,這樣
Microsoft store 無法聯網,顯示Microsoft Store需要聯網,你似乎沒有聯網
設備以遷移 由於僅部分匹配或匹配不明確,因此無法遷移設備
由於在創建轉儲期間出錯,創建轉儲文件失敗。
發生臨時 DNS 錯誤
應用商店,在我們這邊發生問題,無法使你登陸,錯誤代碼: 0xD000000D
照相機不可用,錯誤代碼:0xA00F4244(0xC00DABE0)
應用商店打開異常提示“清單中指定了未知的布局”
自定義掃描Windows defender裏麵的設備性能和運行狀況 黃色感歎號問題
windows預口體驗成員內口版本遇到問題需要重啟
熱門內容
windows10 點開此電腦後,有兩個顯示硬盤盤符的目錄是怎麼回事?
windows 10 專業版無法下載中文語言包
KB4056892
win10不能共享文件夾
在Surfacebook上用Windows to go 1703版本,更新後重啟藍屏,無法進入係統
windows10 1709版本更新失敗,錯誤0x8007001f
microdoft visual c++ 2015 redistributable
WIN10 Insider Preview 17025更新失敗,錯誤代碼0x80096004
計算機管理服務 出現一個內部錯誤(INVALID
關於控製麵板中的安全和維護內提示Windows defender 防病毒已關閉的問題