请使用手机微信扫码安全登录

切换账号密码登录

绑定手机号

应国家法规对于账号实名的要求,请您在进行下一步操作前,需要先完成手机绑定 (若绑定失败,请重新登录绑定)。了解更多

不绑定绑定手机号

360官网 | 360商城

推荐论坛版块活动360粉丝商城众测粉丝轰趴馆常见问题
本帖最后由 dfcf437192 于 2023-1-29 09:07 编辑
没有一丝丝防备,你就这样蓝屏...内心是崩溃的

这是近几次的蓝屏,那位大佬帮我看一下

附件为下
Minidump.zip (1.17 MB)


最近一次蓝屏

  1. Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.


  3. Loading Dump File [C:\Windows\Minidump\012923-239390-01.dmp]
  4. Mini Kernel Dump File: Only registers and stack trace are available

  5. Symbol search path is: srv*
  6. Executable search path is:
  7. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  8. Product: WinNt, suite: TerminalServer SingleUserTS
  9. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  10. Machine Name:
  11. Kernel base = 0xfffff802`4b000000 PsLoadedModuleList = 0xfffff802`4bc2a1f0
  12. Debug session time: Sun Jan 29 02:13:16.302 2023 (UTC + 8:00)
  13. System Uptime: 0 days 10:51:33.147
  14. Loading Kernel Symbols
  15. ...............................................................
  16. ................................................................
  17. ................................................................
  18. ......................
  19. Loading User Symbols
  20. Loading unloaded module list
  21. .....................
  22. For analysis of this file, run !analyze -v
  23. 1: kd> !analyze -v
  24. *******************************************************************************
  25. *                                                                             *
  26. *                        Bugcheck Analysis                                    *
  27. *                                                                             *
  28. *******************************************************************************

  29. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  30. An attempt was made to access a pageable (or completely invalid) address at an
  31. interrupt request level (IRQL) that is too high.  This is usually
  32. caused by drivers using improper addresses.
  33. If kernel debugger is available get stack backtrace.
  34. Arguments:
  35. Arg1: 0000000000000001, memory referenced
  36. Arg2: 0000000000000002, IRQL
  37. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  38. Arg4: fffff802504a0a7f, address which referenced memory

  39. Debugging Details:
  40. ------------------

  41. *** WARNING: Unable to verify timestamp for e1c65x64.sys
  42. *** WARNING: Unable to verify timestamp for win32k.sys

  43. KEY_VALUES_STRING: 1

  44.     Key  : Analysis.CPU.mSec
  45.     Value: 4812

  46.     Key  : Analysis.DebugAnalysisManager
  47.     Value: Create

  48.     Key  : Analysis.Elapsed.mSec
  49.     Value: 84802

  50.     Key  : Analysis.Init.CPU.mSec
  51.     Value: 3874

  52.     Key  : Analysis.Init.Elapsed.mSec
  53.     Value: 805153

  54.     Key  : Analysis.Memory.CommitPeak.Mb
  55.     Value: 104

  56.     Key  : WER.OS.Branch
  57.     Value: vb_release

  58.     Key  : WER.OS.Timestamp
  59.     Value: 2019-12-06T14:06:00Z

  60.     Key  : WER.OS.Version
  61.     Value: 10.0.19041.1


  62. FILE_IN_CAB:  012923-239390-01.dmp

  63. BUGCHECK_CODE:  d1

  64. BUGCHECK_P1: 1

  65. BUGCHECK_P2: 2

  66. BUGCHECK_P3: 0

  67. BUGCHECK_P4: fffff802504a0a7f

  68. READ_ADDRESS: fffff8024bcfa390: Unable to get MiVisibleState
  69. Unable to get NonPagedPoolStart
  70. Unable to get NonPagedPoolEnd
  71. Unable to get PagedPoolStart
  72. Unable to get PagedPoolEnd
  73. unable to get nt!MmSpecialPagesInUse
  74. 0000000000000001

  75. BLACKBOXBSD: 1 (!blackboxbsd)


  76. BLACKBOXNTFS: 1 (!blackboxntfs)


  77. BLACKBOXPNP: 1 (!blackboxpnp)


  78. BLACKBOXWINLOGON: 1

  79. CUSTOMER_CRASH_COUNT:  1

  80. PROCESS_NAME:  System

  81. TRAP_FRAME:  ffffa40ac54265c0 -- (.trap 0xffffa40ac54265c0)
  82. NOTE: The trap frame does not contain all registers.
  83. Some register values may be zeroed or incorrect.
  84. rax=0000000000000006 rbx=0000000000000000 rcx=0000000000000001
  85. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  86. rip=fffff802504a0a7f rsp=ffffa40ac5426758 rbp=ffffa40ac54267e0
  87. r8=ffffa40ac5426790  r9=0000000000000005 r10=ffffa40ac5426878
  88. r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
  89. r14=0000000000000000 r15=0000000000000000
  90. iopl=0         nv up ei pl nz na po nc
  91. NETIO!NetiopUpdateFlowHashSignature+0xb:
  92. fffff802`504a0a7f 0fb601          movzx   eax,byte ptr [rcx] ds:00000000`00000001=??
  93. Resetting default scope

  94. STACK_TEXT:  
  95. ffffa40a`c5426478 fffff802`4b40e129     : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  96. ffffa40a`c5426480 fffff802`4b409ce3     : 00000000`0000000c fffff802`4b9b5094 00000000`00000002 ffff8106`8c7d7c38 : nt!KiBugCheckDispatch+0x69
  97. ffffa40a`c54265c0 fffff802`504a0a7f     : fffff802`504ba07a ffff8106`8b5f6a20 fffff802`50496a13 ffff8106`8b5f6a88 : nt!KiPageFault+0x463
  98. ffffa40a`c5426758 fffff802`504ba07a     : ffff8106`8b5f6a20 fffff802`50496a13 ffff8106`8b5f6a88 fffff802`504ba0a1 : NETIO!NetiopUpdateFlowHashSignature+0xb
  99. ffffa40a`c5426760 fffff802`504baac4     : 00000000`00000000 00000000`00000006 ffff8106`82ccd280 fffff802`504bab95 : NETIO!ComputeHashAccessPrecheck+0x22
  100. ffffa40a`c5426790 fffff802`504ac3ba     : ffff8106`00000000 ffff8106`874558d8 ffff8106`87455108 fffff802`504ac52a : NETIO!FindCacheMatch+0x1cea8
  101. ffffa40a`c5426820 fffff802`5049bc97     : 00000000`00000000 ffff8106`88364288 ffff8106`87673070 fffff802`5049bb6d : NETIO!CompareSecurityContexts+0xde
  102. ffffa40a`c54268e0 fffff802`5049b71e     : ffff8106`87673070 ffff8106`82c53c40 00000000`00000000 fffff802`5049b219 : NETIO!MatchValues+0x197
  103. ffffa40a`c5426930 fffff802`504980bd     : ffff8106`872ce600 ffffa40a`c5426f28 00000000`00000000 ffffa40a`c5426b90 : NETIO!IndexHashClassify+0x21e
  104. ffffa40a`c54269f0 fffff802`5059576f     : ffff8106`874d9c60 ffff8106`85b31890 ffff8106`851f3460 ffff8106`874d9c60 : NETIO!KfdClassify+0x2ad
  105. ffffa40a`c5426de0 fffff802`50594439     : 00000000`00000003 ffffa40a`c54275d0 00000000`00000017 00000000`00000000 : tcpip!WfpAlepAuthorizeReceive+0xcaf
  106. ffffa40a`c5427440 fffff802`50590e61     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`508614ac : tcpip!WfpAleAuthorizeReceive+0x569
  107. ffffa40a`c5427830 fffff802`505b5df4     : 00000000`00000180 ffffa40a`00000011 00000000`00000003 00000000`00000000 : tcpip!ProcessALEForTransportPacket+0x451
  108. ffffa40a`c5427a00 fffff802`505b94b4     : fffff802`4bc165c0 ffffe501`7590b140 ffff8106`877378c8 fffff802`4b288bb5 : tcpip!WfpProcessInTransportStackIndication+0xed4
  109. ffffa40a`c5427e70 fffff802`50598fa4     : ffffe501`7590b140 00000000`00000202 00000000`0000028c ffff8106`00000000 : tcpip!InetInspectReceiveDatagram+0x2c4
  110. ffffa40a`c5427fd0 fffff802`505987f6     : ffffa40a`c54282f0 00000000`00000000 ffffa40a`c54282f0 00000000`00000000 : tcpip!UdpInspectDatagramAndCreateMessageIndications+0x104
  111. ffffa40a`c54281f0 fffff802`50597fa4     : ffff8106`88007400 ffffa40a`c5428510 00000000`00000003 ffffa40a`c5428478 : tcpip!UdpDeliverDatagrams+0x366
  112. ffffa40a`c5428410 fffff802`50597040     : 00000000`00000000 00000000`00000001 fffff802`507654c8 00000000`00000000 : tcpip!UdpReceiveDatagrams+0xe54
  113. ffffa40a`c5428820 fffff802`505b471b     : 00000000`00009411 fffff802`50765000 fffff802`50770508 00000000`00000011 : tcpip!UdpNlClientReceiveDatagrams+0x10
  114. ffffa40a`c5428850 fffff802`505b115d     : 00000000`00000000 ffff8106`82d33000 00000000`00000000 ffff8106`82d33000 : tcpip!IppProcessDeliverList+0xcb
  115. ffffa40a`c5428930 fffff802`505b054f     : fffff802`50765000 ffff8106`82d6b8c0 ffff8106`82d33000 fffff802`5061bb00 : tcpip!IppReceiveHeaderBatch+0x3ad
  116. ffffa40a`c5428a30 fffff802`5059da8b     : ffff8106`8566c1e0 ffff8106`85611780 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
  117. ffffa40a`c5428b50 fffff802`505f437e     : ffff8106`8566c1e0 ffff8106`856b7850 fffff802`00000006 ffffa40a`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0xe4b
  118. ffffa40a`c5428df0 fffff802`4b2f9a48     : ffff8106`82dae180 00000000`00000002 ffffe501`7590b140 ffffa40a`c54290e8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
  119. ffffa40a`c5428f40 fffff802`4b2f99bd     : fffff802`505f4250 ffffa40a`c54290e8 ffff8106`82b23240 fffff802`504923af : nt!KeExpandKernelStackAndCalloutInternal+0x78
  120. ffffa40a`c5428fb0 fffff802`505d030d     : ffff8106`000003e8 00060080`01000000 ffff8106`8896fd30 fffff802`5086142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
  121. ffffa40a`c5428ff0 fffff802`505cf9ed     : 00000000`00000801 ffffa40a`c5429150 ffff8106`856b7850 00000000`00000000 : tcpip!NetioExpandKernelStackAndCallout+0x8d
  122. ffffa40a`c5429050 fffff802`50321eb0     : ffff8106`855ff141 00000000`00000001 ffff8106`850fe490 ffffa40a`c5429460 : tcpip!FlReceiveNetBufferListChain+0x46d
  123. ffffa40a`c5429300 fffff802`50321ccb     : ffff8106`851f38b0 00000000`0000dd01 ffffa40a`00000000 fffffff6`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
  124. ffffa40a`c54293e0 fffff802`50327ef0     : ffff8106`851371a0 ffff8106`85611701 ffff8106`851371a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
  125. ffffa40a`c5429460 fffff802`5035dfef     : ffff8106`85611780 ffffa40a`c5429531 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
  126. ffffa40a`c54294b0 fffff802`50324a94     : 00000000`00262d49 00000000`00000801 ffff8106`851371a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
  127. ffffa40a`c5429580 fffff802`5c894984     : ffff8106`851c7000 ffff8106`851c7000 ffff8106`851371a0 ffff8106`85611780 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
  128. ffffa40a`c5429610 ffff8106`851c7000     : ffff8106`851c7000 ffff8106`851371a0 ffff8106`85611780 ffff8106`00000801 : e1c65x64+0x24984
  129. ffffa40a`c5429618 ffff8106`851c7000     : ffff8106`851371a0 ffff8106`85611780 ffff8106`00000801 00000000`00000000 : 0xffff8106`851c7000
  130. ffffa40a`c5429620 ffff8106`851371a0     : ffff8106`85611780 ffff8106`00000801 00000000`00000000 ffff8106`85611780 : 0xffff8106`851c7000
  131. ffffa40a`c5429628 ffff8106`85611780     : ffff8106`00000801 00000000`00000000 ffff8106`85611780 fffff802`5c89526d : 0xffff8106`851371a0
  132. ffffa40a`c5429630 ffff8106`00000801     : 00000000`00000000 ffff8106`85611780 fffff802`5c89526d 00000000`00000001 : 0xffff8106`85611780
  133. ffffa40a`c5429638 00000000`00000000     : ffff8106`85611780 fffff802`5c89526d 00000000`00000001 ffff8106`85611780 : 0xffff8106`00000801


  134. SYMBOL_NAME:  NETIO!NetiopUpdateFlowHashSignature+b

  135. MODULE_NAME: NETIO

  136. IMAGE_NAME:  NETIO.SYS

  137. IMAGE_VERSION:  10.0.19041.2193

  138. STACK_COMMAND:  .cxr; .ecxr ; kb

  139. BUCKET_ID_FUNC_OFFSET:  b

  140. FAILURE_BUCKET_ID:  AV_NETIO!NetiopUpdateFlowHashSignature

  141. OS_VERSION:  10.0.19041.1

  142. BUILDLAB_STR:  vb_release

  143. OSPLATFORM_TYPE:  x64

  144. OSNAME:  Windows 10

  145. FAILURE_ID_HASH:  {c92b7983-1617-69ed-2e80-f93f22a3cac6}

  146. Followup:     MachineOwner
  147. ---------

  148. 1: kd> lmvm NETIO
  149. Browse full module list
  150. start             end                 module name
  151. fffff802`50490000 fffff802`5052c000   NETIO      (pdb symbols)          D:\Program Files (x86)\Windows Kits\10\Debuggers\x64\sym\netio.pdb\1DB22BF8B3A258B09E629D8E6E159DE71\netio.pdb
  152.     Loaded symbol image file: NETIO.SYS
  153.     Mapped memory image file: D:\Program Files (x86)\Windows Kits\10\Debuggers\x64\sym\NETIO.SYS\BC214F5A9c000\NETIO.SYS
  154.     Image path: \SystemRoot\system32\drivers\NETIO.SYS
  155.     Image name: NETIO.SYS
  156.     Browse all global symbols  functions  data
  157.     Image was built with /Brepro flag.
  158.     Timestamp:        BC214F5A (This is a reproducible build file hash, not a timestamp)
  159.     CheckSum:         00098F19
  160.     ImageSize:        0009C000
  161.     File version:     10.0.19041.2193
  162.     Product version:  10.0.19041.2193
  163.     File flags:       0 (Mask 3F)
  164.     File OS:          40004 NT Win32
  165.     File type:        3.6 Driver
  166.     File date:        00000000.00000000
  167.     Translations:     0409.04b0
  168.     Information from resource tables:
  169.         CompanyName:      Microsoft Corporation
  170.         ProductName:      Microsoft® Windows® Operating System
  171.         InternalName:     netio.sys
  172.         OriginalFilename: netio.sys
  173.         ProductVersion:   10.0.19041.2193
  174.         FileVersion:      10.0.19041.2193 (WinBuild.160101.0800)
  175.         FileDeion:  Network I/O Subsystem
  176.         LegalCopyright:   © Microsoft Corporation. All rights reserved.
复制代码



这是第二个蓝屏信息



  1. Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.


  3. Loading Dump File [C:\Windows\Minidump\012823-19203-01.dmp]
  4. Mini Kernel Dump File: Only registers and stack trace are available

  5. Symbol search path is: srv*
  6. Executable search path is:
  7. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  8. Product: WinNt, suite: TerminalServer SingleUserTS
  9. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  10. Machine Name:
  11. Kernel base = 0xfffff805`77800000 PsLoadedModuleList = 0xfffff805`7842a2d0
  12. Debug session time: Sat Jan 28 14:57:44.699 2023 (UTC + 8:00)
  13. System Uptime: 0 days 17:54:35.543
  14. Loading Kernel Symbols
  15. ...............................................................
  16. ................................................................
  17. ................................................................
  18. .......................
  19. Loading User Symbols
  20. Loading unloaded module list
  21. ...........................
  22. For analysis of this file, run !analyze -v
  23. 0: kd> !analyze -v
  24. *******************************************************************************
  25. *                                                                             *
  26. *                        Bugcheck Analysis                                    *
  27. *                                                                             *
  28. *******************************************************************************

  29. SYSTEM_SERVICE_EXCEPTION (3b)
  30. An exception happened while executing a system service routine.
  31. Arguments:
  32. Arg1: 00000000c0000005, Exception code that caused the BugCheck
  33. Arg2: fffff80577e2436f, Address of the instruction which caused the BugCheck
  34. Arg3: ffffbc0c5dc1ae10, Address of the context record for the exception that caused the BugCheck
  35. Arg4: 0000000000000000, zero.

  36. Debugging Details:
  37. ------------------

  38. *** WARNING: Unable to verify timestamp for 360Hvm64.sys

  39. KEY_VALUES_STRING: 1

  40.     Key  : Analysis.CPU.mSec
  41.     Value: 4515

  42.     Key  : Analysis.DebugAnalysisManager
  43.     Value: Create

  44.     Key  : Analysis.Elapsed.mSec
  45.     Value: 17592

  46.     Key  : Analysis.Init.CPU.mSec
  47.     Value: 2234

  48.     Key  : Analysis.Init.Elapsed.mSec
  49.     Value: 6953

  50.     Key  : Analysis.Memory.CommitPeak.Mb
  51.     Value: 92

  52.     Key  : WER.OS.Branch
  53.     Value: vb_release

  54.     Key  : WER.OS.Timestamp
  55.     Value: 2019-12-06T14:06:00Z

  56.     Key  : WER.OS.Version
  57.     Value: 10.0.19041.1


  58. FILE_IN_CAB:  012823-19203-01.dmp

  59. BUGCHECK_CODE:  3b

  60. BUGCHECK_P1: c0000005

  61. BUGCHECK_P2: fffff80577e2436f

  62. BUGCHECK_P3: ffffbc0c5dc1ae10

  63. BUGCHECK_P4: 0

  64. CONTEXT:  ffffbc0c5dc1ae10 -- (.cxr 0xffffbc0c5dc1ae10)
  65. rax=fffff80577800000 rbx=ffffd9042ade9050 rcx=00000000000000ae
  66. rdx=ffff970fbcdfe250 rsi=ffff970fbcdfe250 rdi=ffffd9042f8ee080
  67. rip=fffff80577e2436f rsp=ffffbc0c5dc1b810 rbp=ffffbc0c5dc1b8f9
  68. r8=ffffd9042ade9080  r9=0000000000000c94 r10=fffff780000002d8
  69. r11=fffff67b3d9ec000 r12=0000000000000000 r13=0000000000000c94
  70. r14=ffff970faf849b40 r15=0000000000000001
  71. iopl=0         nv up ei pl nz na pe nc
  72. cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
  73. nt!ObCloseHandleTableEntry+0x8f:
  74. fffff805`77e2436f 4d8b9424a8000000 mov     r10,qword ptr [r12+0A8h] ds:002b:00000000`000000a8=????????????????
  75. Resetting default scope

  76. BLACKBOXBSD: 1 (!blackboxbsd)


  77. BLACKBOXNTFS: 1 (!blackboxntfs)


  78. BLACKBOXPNP: 1 (!blackboxpnp)


  79. BLACKBOXWINLOGON: 1

  80. CUSTOMER_CRASH_COUNT:  1

  81. PROCESS_NAME:  ServiceHub.Host.Dotnet.x64

  82. STACK_TEXT:  
  83. ffffbc0c`5dc1b810 fffff805`77e287dc     : 00000000`00000c94 fffff805`868a8f9c 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x8f
  84. ffffbc0c`5dc1b950 fffff805`868b2e59     : ffffd904`10feb000 fffff805`00000005 ffffbc0c`5dc1bb80 00000000`00000000 : nt!NtClose+0xec
  85. ffffbc0c`5dc1b9c0 ffffd904`10feb000     : fffff805`00000005 ffffbc0c`5dc1bb80 00000000`00000000 ffffbc0c`5dc1b9f0 : 360Hvm64+0x12e59
  86. ffffbc0c`5dc1b9c8 fffff805`00000005     : ffffbc0c`5dc1bb80 00000000`00000000 ffffbc0c`5dc1b9f0 ffffbc0c`5dc1bb00 : 0xffffd904`10feb000
  87. ffffbc0c`5dc1b9d0 ffffbc0c`5dc1bb80     : 00000000`00000000 ffffbc0c`5dc1b9f0 ffffbc0c`5dc1bb00 00000000`00000000 : 0xfffff805`00000005
  88. ffffbc0c`5dc1b9d8 00000000`00000000     : ffffbc0c`5dc1b9f0 ffffbc0c`5dc1bb00 00000000`00000000 fffff805`868a9031 : 0xffffbc0c`5dc1bb80


  89. SYMBOL_NAME:  360Hvm64+12e59

  90. MODULE_NAME: 360Hvm64

  91. IMAGE_NAME:  360Hvm64.sys

  92. STACK_COMMAND:  .cxr 0xffffbc0c5dc1ae10 ; kb

  93. BUCKET_ID_FUNC_OFFSET:  12e59

  94. FAILURE_BUCKET_ID:  AV_360Hvm64!unknown_function

  95. OS_VERSION:  10.0.19041.1

  96. BUILDLAB_STR:  vb_release

  97. OSPLATFORM_TYPE:  x64

  98. OSNAME:  Windows 10

  99. FAILURE_ID_HASH:  {d912e14a-1aa7-da0a-fb32-31dc39167240}

  100. Followup:     MachineOwner
  101. ---------

复制代码




这是第三个蓝屏信息


  1. Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.


  3. Loading Dump File [C:\Windows\Minidump\012723-17406-01.dmp]
  4. Mini Kernel Dump File: Only registers and stack trace are available

  5. Symbol search path is: srv*
  6. Executable search path is:
  7. Windows 10 Kernel Version 19041 MP (4 procs) Free x64
  8. Product: WinNt, suite: TerminalServer SingleUserTS
  9. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  10. Machine Name:
  11. Kernel base = 0xfffff800`52800000 PsLoadedModuleList = 0xfffff800`5342a2d0
  12. Debug session time: Fri Jan 27 21:02:41.054 2023 (UTC + 8:00)
  13. System Uptime: 6 days 3:35:35.522
  14. Loading Kernel Symbols
  15. ...............................................................
  16. ................................................................
  17. ................................................................
  18. ....................
  19. Loading User Symbols
  20. Loading unloaded module list
  21. ..........................
  22. For analysis of this file, run !analyze -v
  23. 0: kd> !analyze -v
  24. *******************************************************************************
  25. *                                                                             *
  26. *                        Bugcheck Analysis                                    *
  27. *                                                                             *
  28. *******************************************************************************

  29. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  30. This is a very common BugCheck.  Usually the exception address pinpoints
  31. the driver/function that caused the problem.  Always note this address
  32. as well as the link date of the driver/image that contains this address.
  33. Some common problems are exception code 0x80000003.  This means a hard
  34. coded breakpoint or assertion was hit, but this system was booted
  35. /NODEBUG.  This is not supposed to happen as developers should never have
  36. hardcoded breakpoints in retail code, but ...
  37. If this happens, make sure a debugger gets connected, and the
  38. system is booted /DEBUG.  This will let us see why this breakpoint is
  39. happening.
  40. Arguments:
  41. Arg1: ffffffffc0000005, The exception code that was not handled
  42. Arg2: fffff80052a2df30, The address that the exception occurred at
  43. Arg3: ffff8084351bf658, Exception Record Address
  44. Arg4: fffff800592b8920, Context Record Address

  45. Debugging Details:
  46. ------------------

  47. *** WARNING: Unable to verify timestamp for win32k.sys

  48. KEY_VALUES_STRING: 1

  49.     Key  : AV.Fault
  50.     Value: Read

  51.     Key  : Analysis.CPU.mSec
  52.     Value: 6015

  53.     Key  : Analysis.DebugAnalysisManager
  54.     Value: Create

  55.     Key  : Analysis.Elapsed.mSec
  56.     Value: 154435

  57.     Key  : Analysis.Init.CPU.mSec
  58.     Value: 2078

  59.     Key  : Analysis.Init.Elapsed.mSec
  60.     Value: 7010

  61.     Key  : Analysis.Memory.CommitPeak.Mb
  62.     Value: 97

  63.     Key  : WER.OS.Branch
  64.     Value: vb_release

  65.     Key  : WER.OS.Timestamp
  66.     Value: 2019-12-06T14:06:00Z

  67.     Key  : WER.OS.Version
  68.     Value: 10.0.19041.1


  69. FILE_IN_CAB:  012723-17406-01.dmp

  70. BUGCHECK_CODE:  7e

  71. BUGCHECK_P1: ffffffffc0000005

  72. BUGCHECK_P2: fffff80052a2df30

  73. BUGCHECK_P3: ffff8084351bf658

  74. BUGCHECK_P4: fffff800592b8920

  75. EXCEPTION_RECORD:  ffff8084351bf658 -- (.exr 0xffff8084351bf658)
  76. ExceptionAddress: fffff80052a2df30 (nt!RtlpHpVsContextFree+0x0000000000000380)
  77.    ExceptionCode: c0000005 (Access violation)
  78.   ExceptionFlags: 00000000
  79. NumberParameters: 2
  80.    Parameter[0]: 0000000000000000
  81.    Parameter[1]: ffffffffffffffff
  82. Attempt to read from address ffffffffffffffff

  83. CONTEXT:  fffff800592b8920 -- (.cxr 0xfffff800592b8920)
  84. rax=ca062da6bf08ffff rbx=ffffca0637396000 rcx=00000000a0e107ca
  85. rdx=ca062da6bf08ffff rsi=ffffca0627202280 rdi=3333333333333333
  86. rip=fffff80052a2df30 rsp=ffff8084351bf890 rbp=ffff8084351bf900
  87. r8=0000000000100000  r9=44025ef028ad519b r10=0000000000000000
  88. r11=ffffca0627202290 r12=0000000000000000 r13=ffffca063764fff0
  89. r14=ffffca063739aee0 r15=0000000000000000
  90. iopl=0         nv up ei ng nz na po nc
  91. cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
  92. nt!RtlpHpVsContextFree+0x380:
  93. fffff800`52a2df30 8b4af8          mov     ecx,dword ptr [rdx-8] ds:002b:ca062da6`bf08fff7=????????
  94. Resetting default scope

  95. BLACKBOXBSD: 1 (!blackboxbsd)


  96. BLACKBOXNTFS: 1 (!blackboxntfs)


  97. BLACKBOXPNP: 1 (!blackboxpnp)


  98. BLACKBOXWINLOGON: 1

  99. CUSTOMER_CRASH_COUNT:  1

  100. PROCESS_NAME:  System

  101. READ_ADDRESS: fffff800534fb390: Unable to get MiVisibleState
  102. Unable to get NonPagedPoolStart
  103. Unable to get NonPagedPoolEnd
  104. Unable to get PagedPoolStart
  105. Unable to get PagedPoolEnd
  106. unable to get nt!MmSpecialPagesInUse
  107. ffffffffffffffff

  108. ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p            0x%p                    %s

  109. EXCEPTION_CODE_STR:  c0000005

  110. EXCEPTION_PARAMETER1:  0000000000000000

  111. EXCEPTION_PARAMETER2:  ffffffffffffffff

  112. EXCEPTION_STR:  0xc0000005

  113. STACK_TEXT:  
  114. ffff8084`351bf890 fffff800`52a2c6c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x380
  115. ffff8084`351bf930 fffff800`531b5019     : 00000000`00000a10 ffffca06`3739b010 00000000`00000960 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
  116. ffff8084`351bfa10 fffff800`52e37654     : ffffca06`3739b050 ffffca06`3739b050 ffffca06`278d2820 fffff800`53453900 : nt!ExFreePool+0x9
  117. ffff8084`351bfa40 fffff800`52e37468     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
  118. ffff8084`351bfaa0 fffff800`52a173f7     : 00000000`00000000 00000000`00000000 fffff800`52a7b5c0 ffffca06`3739b080 : nt!ObpRemoveObjectRoutine+0x88
  119. ffff8084`351bfb00 fffff800`52a7b632     : 00000000`00000001 00000000`00000000 00000000`00000000 ffffca06`3739b4d8 : nt!ObfDereferenceObjectWithTag+0xc7
  120. ffff8084`351bfb40 fffff800`52a5b3d5     : ffffca06`33bab040 ffffca06`278adb40 ffffca06`278adb40 ffffca06`00000000 : nt!PspReaper+0x72
  121. ffff8084`351bfb70 fffff800`52b030e5     : ffffca06`33bab040 00000000`00000080 ffffca06`2789c040 00000000`00000000 : nt!ExpWorkerThread+0x105
  122. ffff8084`351bfc10 fffff800`52c02e08     : fffff800`5121e180 ffffca06`33bab040 fffff800`52b03090 00000000`00000246 : nt!PspSystemThreadStartup+0x55
  123. ffff8084`351bfc60 00000000`00000000     : ffff8084`351c0000 ffff8084`351ba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


  124. SYMBOL_NAME:  nt!RtlpHpVsContextFree+380

  125. MODULE_NAME: nt

  126. IMAGE_NAME:  ntkrnlmp.exe

  127. IMAGE_VERSION:  10.0.19041.2486

  128. STACK_COMMAND:  .cxr 0xfffff800592b8920 ; kb

  129. BUCKET_ID_FUNC_OFFSET:  380

  130. FAILURE_BUCKET_ID:  AV_nt!RtlpHpVsContextFree

  131. OS_VERSION:  10.0.19041.1

  132. BUILDLAB_STR:  vb_release

  133. OSPLATFORM_TYPE:  x64

  134. OSNAME:  Windows 10

  135. FAILURE_ID_HASH:  {a3a70975-d33b-54e0-8fd5-b41d85acac01}

  136. Followup:     MachineOwner
  137. ---------

复制代码



附件如上压缩包,请好心的大佬帮忙看一下,天天蓝屏我的内心是崩溃的...感谢你们!







共 3 个关于WIN10电脑不定时蓝屏,我快崩溃了,那位好心的大哥帮忙看一下问题?的回复 最后回复于 2023-1-29 14:32

评论

直达楼层

沙发
大眼睛大大_大 产品答疑师 发表于 2023-1-29 10:34 | 只看该作者 | 私信

IP属地: 未知

您好,根据分析NETIO.SYS驱动导致,这个驱动属于网络驱动,建议您使用360驱动大师更新网卡驱动试试
板凳
oxp100277 LV5.少尉 发表于 2023-1-29 12:08 | 只看该作者 | 私信

IP属地: 广东省


按照操作楼上的方法
地板
辉哥_huige LV8.少校 发表于 2023-1-29 14:32 | 只看该作者 | 私信

IP属地: 未知

本帖最后由 辉哥_huige 于 2023-1-29 14:35 编辑
  @dfcf437192  22621是win11 22H2的版本,不是win10的22621版本
您需要登录后才可以回帖 登录 | 注册

本版积分规则

360fans_uid809429 LV3.中士

粉丝:1 关注:0 积分:154

精华:0 金币:339 经验:143

IP属地: 局域网

最后登录时间:2023-10-18

360商城青铜会员

私信 加好友

最新活动

社区限时活动 | 五一去哪玩?分享赢好礼

排行榜

热度排行 查看排行
今日 本周 本月 全部
    今日 本周 本月 全部

      内容推荐 热门推荐最新主帖

      扫码添加360客服号,涨知识的同时还有超多福利等你哦

      快速回复 返回顶部 返回列表