360fans_44332287 发表于 2025-4-15 11:18

360huabao.exe引起蓝屏

有台win10安装360画报后,不定期蓝屏,蓝屏代码各异,以下是其中两个:
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc48f44004000, Virtual address for the attempted execute.
Arg2: 8100000256162921, PTE contents.
Arg3: ffff8789fb60ba00, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key: Analysis.CPU.mSec
    Value: 3827

    Key: Analysis.DebugAnalysisManager
    Value: Create

    Key: Analysis.Elapsed.mSec
    Value: 9406

    Key: Analysis.Init.CPU.mSec
    Value: 2217

    Key: Analysis.Init.Elapsed.mSec
    Value: 124710

    Key: Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key: WER.OS.Branch
    Value: ni_release

    Key: WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key: WER.OS.Version
    Value: 10.0.22621.1


DUMP_FILE_ATTRIBUTES: 0x1000

BUGCHECK_CODE:fc

BUGCHECK_P1: ffffc48f44004000

BUGCHECK_P2: 8100000256162921

BUGCHECK_P3: ffff8789fb60ba00

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:360huabao.exe

TRAP_FRAME:ffff8789fb60ba00 -- (.trap 0xffff8789fb60ba00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000077
rdx=0000000000000057 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc48f44004000 rsp=ffff8789fb60bb90 rbp=ffff8b03089c2a10
r8=0000000000000054r9=ffff8b02faede000 r10=000000000000000c
r11=ffff8b033150c592 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffffc48f`44004000 ??            ???
Resetting default scope

STACK_TEXT:
ffff8789`fb60b798 fffff802`14097d4e   : 00000000`000000fc ffffc48f`44004000 81000002`56162921 ffff8789`fb60ba00 : nt!KeBugCheckEx
ffff8789`fb60b7a0 fffff802`13ef8891   : ffffc48f`44004000 ffff8789`fb60b920 00000000`00000000 fffff802`1486f400 : nt!MiCheckSystemNxFault+0x1f638a
ffff8789`fb60b7e0 fffff802`13e3014c   : 00000000`00000000 00000000`00000011 00000000`00000000 ffffc48f`44004000 : nt!MiSystemFault+0x641
ffff8789`fb60b8e0 fffff802`1402917e   : 00000000`00000000 00000000`00000000 ffff8b03`3150c550 00000000`00000000 : nt!MmAccessFault+0x29c
ffff8789`fb60ba00 ffffc48f`44004000   : ffff8b03`089c2b00 ffff8789`00000004 ffff8b03`3150c550 ffff8b03`00000000 : nt!KiPageFault+0x37e
ffff8789`fb60bb90 ffff8b03`089c2b00   : ffff8789`00000004 ffff8b03`3150c550 ffff8b03`00000000 ffff8b03`0c8ba100 : 0xffffc48f`44004000
ffff8789`fb60bb98 ffff8789`00000004   : ffff8b03`3150c550 ffff8b03`00000000 ffff8b03`0c8ba100 00000000`00000000 : 0xffff8b03`089c2b00
ffff8789`fb60bba0 ffff8b03`3150c550   : ffff8b03`00000000 ffff8b03`0c8ba100 00000000`00000000 00000000`00000000 : 0xffff8789`00000004
ffff8789`fb60bba8 ffff8b03`00000000   : ffff8b03`0c8ba100 00000000`00000000 00000000`00000000 ffffc48f`9bb69438 : 0xffff8b03`3150c550
ffff8789`fb60bbb0 ffff8b03`0c8ba100   : 00000000`00000000 00000000`00000000 ffffc48f`9bb69438 ffffc48f`9bb69598 : 0xffff8b03`00000000
ffff8789`fb60bbb8 00000000`00000000   : 00000000`00000000 ffffc48f`9bb69438 ffffc48f`9bb69598 00000000`00000000 : 0xffff8b03`0c8ba100


SYMBOL_NAME:nt!MiCheckSystemNxFault+1f638a

MODULE_NAME: nt

STACK_COMMAND:.thread ; .cxr ; kb

IMAGE_NAME:ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:1f638a

FAILURE_BUCKET_ID:0xFC_nt!MiCheckSystemNxFault

OS_VERSION:10.0.22621.1

BUILDLAB_STR:ni_release

OSPLATFORM_TYPE:x64

OSNAME:Windows 10

FAILURE_ID_HASH:{a6ae5288-6b71-974a-9b09-23f14d998164}

Followup:   MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffd889da1f7d0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: fffffd889da1f7d0, If non-zero, the instruction address which referenced the bad memory
        address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key: Analysis.CPU.mSec
    Value: 3952

    Key: Analysis.DebugAnalysisManager
    Value: Create

    Key: Analysis.Elapsed.mSec
    Value: 3804

    Key: Analysis.Init.CPU.mSec
    Value: 1765

    Key: Analysis.Init.Elapsed.mSec
    Value: 28357

    Key: Analysis.Memory.CommitPeak.Mb
    Value: 98

    Key: WER.OS.Branch
    Value: ni_release

    Key: WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key: WER.OS.Version
    Value: 10.0.22621.1


DUMP_FILE_ATTRIBUTES: 0x1000

BUGCHECK_CODE:50

BUGCHECK_P1: fffffd889da1f7d0

BUGCHECK_P2: 11

BUGCHECK_P3: fffffd889da1f7d0

BUGCHECK_P4: 2

WRITE_ADDRESS: MAX_SYSTEM_VA_ASSIGNMENTS needs to be increased
fffffd889da1f7d0

MM_INTERNAL_CODE:2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:360huabao.exe

TRAP_FRAME:fffffd889da1f5d0 -- (.trap 0xfffffd889da1f5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff87800d3bb010 rbx=0000000000000000 rcx=ffff878ff09ec9a0
rdx=ffff87800d3bb010 rsi=0000000000000000 rdi=0000000000000000
rip=fffffd889da1f7d0 rsp=fffffd889da1f760 rbp=ffff878fdb93dd50
r8=ffff87800d3bb010r9=0000000000000008 r10=ffff878fdb6cbe80
r11=ffff878ff09ec9a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na pe nc
fffffd88`9da1f7d0 60            ???
Resetting default scope

STACK_TEXT:
fffffd88`9da1f3a8 fffff805`3f4b1fb0   : 00000000`00000050 fffffd88`9da1f7d0 00000000`00000011 fffffd88`9da1f5d0 : nt!KeBugCheckEx
fffffd88`9da1f3b0 fffff805`3f23014c   : 00000000`00000000 00000000`00000011 00000000`00000000 fffffd88`9da1f7d0 : nt!MiSystemFault+0x1b9d60
fffffd88`9da1f4b0 fffff805`3f42917e   : 00000000`00000000 00000000`00000000 ffff878f`db6cbe80 fffffd88`9da1f948 : nt!MmAccessFault+0x29c
fffffd88`9da1f5d0 fffffd88`9da1f7d0   : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x37e
fffffd88`9da1f760 00000000`00000000   : 00000000`00000000 00000000`00000000 00000000`00000000 ffff2813`1d26eca1 : 0xfffffd88`9da1f7d0


SYMBOL_NAME:nt!MiSystemFault+1b9d60

MODULE_NAME: nt

STACK_COMMAND:.thread ; .cxr ; kb

IMAGE_NAME:ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:1b9d60

FAILURE_BUCKET_ID:AV_INVALID_nt!MiSystemFault

OS_VERSION:10.0.22621.1

BUILDLAB_STR:ni_release

OSPLATFORM_TYPE:x64

OSNAME:Windows 10

FAILURE_ID_HASH:{8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:   MachineOwner
---------



香蕉玉米胡萝卜 发表于 2025-4-16 10:03

您好,您的反馈已转达给相关业务同学,我们会认真排查,感谢您的支持与反馈

香蕉玉米胡萝卜 发表于 2025-4-16 10:13

您好目前排查壁纸应该没有能力导致系统蓝屏,本地计算机蓝屏之后会有一个dmp文件,在C:\Windows\Minidump目录下,您看是否可以找到
页: [1]
查看完整版本: 360huabao.exe引起蓝屏