不知道怎么上传dmp文件 把内容放上来了
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\050423-717281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`19a00000 PsLoadedModuleList = 0xfffff807`1a62a2b0
Debug session time: Thu May 4 23:06:06.047 2023 (UTC + 8:00)
System Uptime: 0 days 11:23:15.786
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`19df92d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffab82`675554a0=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8071a001d0b, Address of the instruction which caused the BugCheck
Arg3: ffffab8267555da0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4233
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 24604
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 3923
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 050423-717281-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8071a001d0b
BUGCHECK_P3: ffffab8267555da0
BUGCHECK_P4: 0
CONTEXT: ffffab8267555da0 -- (.cxr 0xffffab8267555da0)
rax=0000000000000000 rbx=ffffab8267556980 rcx=0000000000000011
rdx=fffff8071a648298 rsi=fffff8071a6482a0 rdi=0000000000000000
rip=fffff8071a001d0b rsp=ffffab82675567a0 rbp=ffffab8267556b80
r8=ffffab82675567b0 r9=fffff80719a00001 r10=0000fffff8071a00
r11=ffffab82675568a8 r12=4442453126380011 r13=ffffab8267556928
r14=0000000000000001 r15=0000000000000007
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!CmpCallCallBacksEx+0xdb:
fffff807`1a001d0b 4d8b2424 mov r12,qword ptr [r12] ds:002b:44424531`26380011=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
ffffab82`675567a0 fffff807`1a02e774 : ffffad8f`00000007 ffffab82`67556980 00000000`00000000 00000000`0384e001 : nt!CmpCallCallBacksEx+0xdb
ffffab82`675568b0 fffff807`19e0caf8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffad8f`dfa46130 : nt!NtQueryKey+0x2e4
ffffab82`67556a90 00007ffd`6422d384 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0384dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6422d384
SYMBOL_NAME: nt!CmpCallCallBacksEx+db
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2251
STACK_COMMAND: .cxr 0xffffab8267555da0 ; kb
BUCKET_ID_FUNC_OFFSET: db
FAILURE_BUCKET_ID: AV_nt!CmpCallCallBacksEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {177c5141-fb33-dc3d-9406-7fff37bf4cce}
Followup: MachineOwner
---------
|
|
|
|
评论
直达楼层