请使用手机微信扫码安全登录

切换账号密码登录

绑定手机号

应国家法规对于账号实名的要求,请您在进行下一步操作前,需要先完成手机绑定 (若绑定失败,请重新登录绑定)。了解更多

不绑定绑定手机号

360官网 | 360商城

推荐论坛版块360粉丝商城360用户活动常见问题

蓝屏

2026-4-22 22:57 | 复制链接
1 13
最近玩游戏时不时就会蓝屏强制重启,用了windbg解析之后看不太懂,但是看上面跟360有关,有没有大佬帮忙看看:
ExtensionGallery settings after reading 'SOFTWARE\Microsoft\Debug Engine' registry:
ExtensionGallery ExtensionRepository: Implicit
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false
   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 46
Microsoft (R) Windows Debugger Version 10.0.29547.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\042226-12953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff801`76000000 PsLoadedModuleList = 0xfffff801`76ef4770
Debug session time: Wed Apr 22 22:15:14.782 2026 (UTC + 8:00)
System Uptime: 0 days 4:59:23.414
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`0035b018).  Type ".hh dbgerr001" for details
Loading unloaded module list
......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`764b8b00 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffa86`1849f130=0000000000000139
6: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`0035b018).  Type ".hh dbgerr001" for details
Loading unloaded module list
......................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffa861849f450, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffa861849f3a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for 360Hvm64.sys
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1093
    Key  : Analysis.Elapsed.mSec
    Value: 196046
    Key  : Analysis.IO.Other.Mb
    Value: 18
    Key  : Analysis.IO.Read.Mb
    Value: 1
    Key  : Analysis.IO.Write.Mb
    Value: 31
    Key  : Analysis.Init.CPU.mSec
    Value: 578
    Key  : Analysis.Init.Elapsed.mSec
    Value: 518948
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91
    Key  : Analysis.Version.DbgEng
    Value: 10.0.29547.1002
    Key  : Analysis.Version.Description
    Value: 10.2602.27.2 amd64fre
    Key  : Analysis.Version.Ext
    Value: 1.2602.27.2
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139
    Key  : Bugcheck.Code.TargetModel
    Value: 0x139
    Key  : Dump.Attributes.AsUlong
    Value: 0x20008
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY
    Key  : FailFast.Type
    Value: 3
    Key  : Failure.Bucket
    Value: 0x139_3_CORRUPT_LIST_ENTRY_360Hvm64!unknown_function
    Key  : Failure.Exception.Code
    Value: 0xc0000409
    Key  : Failure.Exception.Record
    Value: 0xfffffa861849f3a8
    Key  : Failure.Hash
    Value: {522cdf40-8775-9721-6cae-96f6385e7178}
    Key  : WER.System.BIOSRevision
    Value: 10.28.0.0
BUGCHECK_CODE:  139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffa861849f450
BUGCHECK_P3: fffffa861849f3a8
BUGCHECK_P4: 0
FILE_IN_CAB:  042226-12953-01.dmp
DUMP_FILE_ATTRIBUTES: 0x20008
  Kernel Generated Triage Dump
FAULTING_THREAD:  ffffdb8a33cab080
TRAP_FRAME:  fffffa861849f450 -- (.trap 0xfffffa861849f450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8082be388198 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff808278bc5a80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80108e719a9 rsp=fffffa861849f5e0 rbp=ffffdb8a20066960
r8=0000000000000000  r9=0000000000000009 r10=fffff80176226660
r11=fffffa861849f558 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
Ntfs!NtfsCommonClose+0x619:
fffff801`08e719a9 cd29            int     29h
Resetting default scope
EXCEPTION_RECORD:  fffffa861849f3a8 -- (.exr 0xfffffa861849f3a8)
ExceptionAddress: fffff80108e719a9 (Ntfs!NtfsCommonClose+0x0000000000000619)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon) (!blackboxwinlogonnotify)
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  Sky.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR:  c0000409
EXCEPTION_PARAMETER1:  0000000000000003
EXCEPTION_STR:  0xc0000409
STACK_TEXT:  
fffffa86`1849f128 fffff801`76686fe9     : 00000000`00000139 00000000`00000003 fffffa86`1849f450 fffffa86`1849f3a8 : nt!KeBugCheckEx
fffffa86`1849f130 fffff801`766875f2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffa86`1849f270 fffff801`76685228     : ffffdb8a`197e15d0 fffff801`762ad8b2 ffffdb8a`19832710 ffffdb8a`3e190420 : nt!KiFastFailDispatch+0xb2
fffffa86`1849f450 fffff801`08e719a9     : ffffdb8a`20066960 fffffa86`1849f728 00000000`00000000 00000000`c00000d8 : nt!KiRaiseSecurityCheckFailure+0x368
fffffa86`1849f5e0 fffff801`08e70761     : ffffdb8a`32431d28 ffff8082`78bc5700 ffff8082`78bc55a0 ffffdb89`d58181b0 : Ntfs!NtfsCommonClose+0x619
fffffa86`1849f6c0 fffff801`7629697e     : ffffdb8a`2e60f8a0 ffffdb89`d164b050 ffffdb8a`2e60f908 ffffdb89`d546e200 : Ntfs!NtfsFsdClose+0x321
fffffa86`1849f830 fffff801`07b56afc     : ffffdb8a`2e60f8a0 ffffdb8a`2e60f8a0 ffffdb89`cd100000 00000000`00000000 : nt!IofCallDriver+0xbe
fffffa86`1849f870 fffff801`07b55c19     : fffffa86`1849f970 ffffdb89`d57af9c0 ffff8082`c5233800 ffffdb8a`20066d90 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x23c
fffffa86`1849f910 fffff801`7629697e     : 00000000`00000000 ffffdb8a`3e190420 ffffdb89`d5605d60 00000000`00000000 : FLTMGR!FltpDispatch+0x109
fffffa86`1849f9b0 fffff801`76828d49     : ffffdb89`d5818030 ffffdb89`d5605d60 00000000`ffff8005 ffffdb8a`3e190420 : nt!IofCallDriver+0xbe
fffffa86`1849f9f0 fffff801`768646cc     : 00000000`00000000 ffffdb8a`3e190420 ffffdb8a`3e1903f0 ffffdb8a`2e53f0c0 : nt!IopDeleteFile+0x139
fffffa86`1849fa80 fffff801`7625b769     : 00000000`00000000 00000000`00000000 fffffa86`1849fc20 ffffdb8a`3e190420 : nt!ObpRemoveObjectRoutine+0xfc
fffffa86`1849fae0 fffff801`7685c7a5     : 00000000`00000001 00000000`00000001 ffffdb8a`3e190420 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x79
fffffa86`1849fb20 fffff801`7685aef9     : ffff8082`748a6000 fffff801`4895aef0 00000000`00000000 00000029`d33aa0e1 : nt!ObCloseHandleTableEntry+0x3e5
fffffa86`1849fc70 fffff801`4896873d     : ffffdb8a`33cab000 00000000`00000005 00000000`00000000 00000000`00000000 : nt!NtClose+0xe9
fffffa86`1849fce0 ffffdb8a`33cab000     : 00000000`00000005 00000000`00000000 00000000`00000000 fffffa86`1849fd10 : 360Hvm64+0x1873d
fffffa86`1849fce8 00000000`00000005     : 00000000`00000000 00000000`00000000 fffffa86`1849fd10 fffffa86`1849fe20 : 0xffffdb8a`33cab000
fffffa86`1849fcf0 00000000`00000000     : 00000000`00000000 fffffa86`1849fd10 fffffa86`1849fe20 ffffc8e4`400027e8 : 0x5
SYMBOL_NAME:  360Hvm64+1873d
MODULE_NAME: 360Hvm64
IMAGE_NAME:  360Hvm64.sys
STACK_COMMAND: .process /r /p 0xffffdb8a2e53f0c0; .thread /r /p 0xffffdb8a33cab080 ; kb
BUCKET_ID_FUNC_OFFSET:  1873d
FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_360Hvm64!unknown_function
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {522cdf40-8775-9721-6cae-96f6385e7178}
Followup:     MachineOwner
---------









































































共 1 个关于蓝屏的回复 最后回复于 2026-4-23 10:42

评论

直达楼层

沙发
leo0205 产品答疑师 发表于 2026-4-23 10:42 | 只看该作者 | 私信

IP属地: 未知

您好,您直接把dump文件上传到附件中,我们看下,还有您最好获取个核心dump文件,这样才能比较清晰的看到哪个模块导致的蓝屏
您需要登录后才可以回帖 登录 | 注册

本版积分规则

360fans_54484284 LV1.上等兵

粉丝:0 关注:0 积分:8

精华:0 金币:45 经验:7

IP属地: 局域网

最后登录时间:2026-4-23

私信 加好友

最新活动

【官方公告】360安全龙虾已入驻360社区

排行榜

热度排行 查看排行
本月
    本月

      扫码添加360粉丝团助手有超多福利等你来哦

      快速回复 返回顶部 返回列表