请使用手机微信扫码安全登录

切换账号密码登录

绑定手机号

应国家法规对于账号实名的要求,请您在进行下一步操作前,需要先完成手机绑定 (若绑定失败,请重新登录绑定)。了解更多

不绑定绑定手机号

360官网 | 360商城

推荐论坛版块360粉丝商城360用户活动常见问题
使用Windbg查看蓝屏dmp文件

  1. Microsoft (R) Windows Debugger Version 10.0.19041.5609 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.


  3. Loading Dump File [C:\Windows\Minidump\122125-13281-01.dmp]
  4. Mini Kernel Dump File: Only registers and stack trace are available


  5. ************* Path validation summary **************
  6. Response                         Time (ms)     Location
  7. Deferred                                      
  8. Symbol search path is
  9. Executable search path is:
  10. Windows 10 Kernel Version 19041 MP (16 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Built by: 19041.1.amd64fre.vb_release.191206-1406
  13. Machine Name:
  14. Kernel base = 0xfffff806`61e00000 PsLoadedModuleList = 0xfffff806`62a2a930
  15. Debug session time: Sun Dec 21 23:23:21.916 2025 (UTC + 8:00)
  16. System Uptime: 0 days 0:25:12.685
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ................................................................
  21. .................................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. .....................
  25. For analysis of this file, run !analyze -v
  26. 8: kd> !analyze -v
  27. *******************************************************************************
  28. *                                                                             *
  29. *                        Bugcheck Analysis                                    *
  30. *                                                                             *
  31. *******************************************************************************

  32. ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
  33. An attempt was made to write to readonly memory.  The guilty driver is on the
  34. stack trace (and is typically the current instruction pointer).
  35. When possible, the guilty driver's name (Unicode string) is printed on
  36. the bugcheck screen and saved in KiBugCheckDriver.
  37. Arguments:
  38. Arg1: fffff8066be0af9d, Virtual address for the attempted write.
  39. Arg2: 090000040cb80121, PTE contents.
  40. Arg3: ffff8d89001487b0, (reserved)
  41. Arg4: 000000000000000b, (reserved)

  42. Debugging Details:
  43. ------------------

  44. *** WARNING: Unable to verify timestamp for 360Hvm64.sys

  45. KEY_VALUES_STRING: 1

  46.     Key  : Analysis.CPU.Sec
  47.     Value: 3

  48.     Key  : Analysis.DebugAnalysisProvider.CPP
  49.     Value: Create: 8007007e on DESKTOP-2QRH2K5

  50.     Key  : Analysis.DebugData
  51.     Value: CreateObject

  52.     Key  : Analysis.DebugModel
  53.     Value: CreateObject

  54.     Key  : Analysis.Elapsed.Sec
  55.     Value: 25

  56.     Key  : Analysis.Memory.CommitPeak.Mb
  57.     Value: 82

  58.     Key  : Analysis.System
  59.     Value: CreateObject


  60. BUGCHECK_CODE:  be

  61. BUGCHECK_P1: fffff8066be0af9d

  62. BUGCHECK_P2: 90000040cb80121

  63. BUGCHECK_P3: ffff8d89001487b0

  64. BUGCHECK_P4: b

  65. BLACKBOXBSD: 1 (!blackboxbsd)


  66. BLACKBOXNTFS: 1 (!blackboxntfs)


  67. BLACKBOXPNP: 1 (!blackboxpnp)


  68. BLACKBOXWINLOGON: 1

  69. CUSTOMER_CRASH_COUNT:  1

  70. PROCESS_NAME:  PNXClientHost.exe

  71. TRAP_FRAME:  ffff8d89001487b0 -- (.trap 0xffff8d89001487b0)
  72. NOTE: The trap frame does not contain all registers.
  73. Some register values may be zeroed or incorrect.
  74. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000011
  75. rdx=ffff8d89001489d0 rsi=0000000000000000 rdi=0000000000000000
  76. rip=fffff8066be0ae72 rsp=ffff8d8900148940 rbp=ffff8d8900148b00
  77. r8=ffff8d8900148a70  r9=ffff8d89001489f0 r10=0000000000000000
  78. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  79. r14=0000000000000000 r15=0000000000000000
  80. iopl=0         nv up ei pl zr na po nc
  81. 360Hvm64+0xae72:
  82. fffff806`6be0ae72 f0834718ff      lock add dword ptr [rdi+18h],0FFFFFFFFh ds:00000000`00000018=????????
  83. Resetting default scope

  84. STACK_TEXT:  
  85. ffff8d89`00148508 fffff806`62248c59 : 00000000`000000be fffff806`6be0af9d 09000004`0cb80121 ffff8d89`001487b0 : nt!KeBugCheckEx
  86. ffff8d89`00148510 fffff806`6200d450 : 00000000`00000000 00000000`00000003 ffff8d89`00148830 00000000`00000000 : nt!MiSystemFault+0x1b71d9
  87. ffff8d89`00148610 fffff806`6220d66d : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`620cb16e : nt!MmAccessFault+0x400
  88. ffff8d89`001487b0 fffff806`6be0ae72 : 00000000`00000000 00000000`00000000 00000000`77566d4d ffff8d89`00148998 : nt!KiPageFault+0x36d
  89. ffff8d89`00148940 00000000`00000000 : 00000000`00000000 00000000`77566d4d ffff8d89`00148998 00000000`77104660 : 360Hvm64+0xae72


  90. SYMBOL_NAME:  360Hvm64+ae72

  91. MODULE_NAME: 360Hvm64

  92. IMAGE_NAME:  360Hvm64.sys

  93. STACK_COMMAND:  .thread ; .cxr ; kb

  94. BUCKET_ID_FUNC_OFFSET:  ae72

  95. FAILURE_BUCKET_ID:  0xBE_360Hvm64!unknown_function

  96. OS_VERSION:  10.0.19041.1

  97. BUILDLAB_STR:  vb_release

  98. OSPLATFORM_TYPE:  x64

  99. OSNAME:  Windows 10

  100. FAILURE_ID_HASH:  {6a5bb82a-2dcf-a9b2-e07b-b4ed901a5685}

  101. Followup:     MachineOwner
  102. ---------

  103. 8: kd> lmvm 360Hvm64
  104. Browse full module list
  105. start             end                 module name
  106. fffff806`6be00000 fffff806`6befe000   360Hvm64 T (no symbols)           
  107.     Loaded symbol image file: 360Hvm64.sys
  108.     Image path: \SystemRoot\System32\Drivers\360Hvm64.sys
  109.     Image name: 360Hvm64.sys
  110.     Browse all global symbols  functions  data
  111.     Timestamp:        Mon Jul 14 14:40:56 2025 (6874A678)
  112.     CheckSum:         00075FA4
  113.     ImageSize:        000FE000
  114.     Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
  115.     Information from resource tables:
复制代码


共 2 个关于360Hvm64.sys导致蓝屏的回复 最后回复于 2025-12-22 11:56

评论

直达楼层

沙发
360fans_fj1kJm LV1.上等兵 楼主 发表于 2025-12-22 10:55 | 只看该作者 | 私信

IP属地: 辽宁省

通过360AI云盘分享的文件:蓝屏dmp文件
360AI云盘无需下载,在线播放视频,畅享超清原画、极速播放
链接:
surl_yNKaPr6wN8t
(提取码:cfed)
复制这段内容打开「360AI云盘APP」即可获取
板凳
leo0205 产品答疑师 发表于 2025-12-22 11:56 | 只看该作者 | 私信

IP属地: 未知

感谢您的反馈,我们同步技术去分析
您需要登录后才可以回帖 登录 | 注册

本版积分规则

360fans_fj1kJm LV1.上等兵

粉丝:0 关注:0 积分:1

精华:0 金币:8 经验:4

IP属地: 未知

最后登录时间:2025-12-22

私信 加好友

最新活动

2025年360感恩用户节盛典圆满落幕|与用户

排行榜

热度排行 查看排行
本月
    本月

      扫码添加360客服号,涨知识的同时还有超多福利等你哦

      快速回复 返回顶部 返回列表