吾爱破解 - 52pojie.cn

 找回密码
 注册[Register]

QQ登录

只需一步,快速开始

查看: 182|回复: 1
收起左侧

[其他求助] 请求分析电脑蓝屏dmp文件

[复制链接]
x_year 发表于 2024-10-16 15:45
25吾爱币
解析出来的  
************* Preparing the environment for Debugger Extensions Gallery repositories **************   ExtensionRepository : Implicit   UseExperimentalFeatureForNugetShare : true   AllowNugetExeUpdate : true   NonInteractiveNuget : true   AllowNugetMSCredentialProviderInstall : true   AllowParallelInitializationOfLocalRepositories : true   EnableRedirectToChakraJsProvider : false   -- Configuring repositories      ----> Repository : LocalInstalled, Enabled: true      ----> Repository : UserExtensions, Enabled: true>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds************* Waiting for Debugger Extensions Gallery to Initialize **************>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds   ----> Repository : UserExtensions, Enabled: true, Packages count: 0   ----> Repository : LocalInstalled, Enabled: true, Packages count: 42Microsoft (R) Windows Debugger Version 10.0.27704.1001 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\101624-8546-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path valIDAtion summary **************Response                         Time (ms)     LocationDeferred                                       srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSKernel base = 0xfffff803`6d200000 PsLoadedModuleList = 0xfffff803`6de2a290Debug session time: Wed Oct 16 15:05:42.662 2024 (UTC + 8:00)System Uptime: 0 days 6:14:19.604Loading Kernel Symbols..........................................................................................................................................................................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 00000000`00342018).  Type ".hh dbgerr001" for detailsLoading unloaded module list.........................................For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff803`6d5f8fa0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffc588`af48f410=000000000000003b15: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************SYSTEM_SERVICE_EXCEPTION (3b)An exception happened while executing a system service routine.Arguments:Arg1: 00000000c0000005, Exception code that caused the BugCheckArg2: fffff803a51d811c, Address of the instruction which caused the BugCheckArg3: ffffc588af48fd10, Address of the context record for the exception that caused the BugCheckArg4: 0000000000000000, zero.Debugging Details:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 2281    Key  : Analysis.Elapsed.mSec    Value: 3370    Key  : Analysis.IO.Other.Mb    Value: 0    Key  : Analysis.IO.Read.Mb    Value: 0    Key  : Analysis.IO.Write.Mb    Value: 0    Key  : Analysis.Init.CPU.mSec    Value: 343    Key  : Analysis.Init.Elapsed.mSec    Value: 6215    Key  : Analysis.Memory.CommitPeak.Mb    Value: 92    Key  : Analysis.Version.DbgEng    Value: 10.0.27704.1001    Key  : Analysis.Version.Description    Value: 10.2408.27.01 amd64fre    Key  : Analysis.Version.Ext    Value: 1.2408.27.1    Key  : Bugcheck.Code.LegacyAPI    Value: 0x3b    Key  : Bugcheck.Code.TargetModel    Value: 0x3b    Key  : Dump.Attributes.AsUlong    Value: 8    Key  : Dump.Attributes.KernelGeneratedTriageDump    Value: 1    Key  : Failure.Bucket    Value: AV_d1908dad6c814e919x7b1fde41d1a44b!unknown_function    Key  : Failure.Hash    Value: {6419b87a-8d7a-8782-9b00-1e50346875e0}BUGCHECK_CODE:  3bBUGCHECK_P1: c0000005BUGCHECK_P2: fffff803a51d811cBUGCHECK_P3: ffffc588af48fd10BUGCHECK_P4: 0FILE_IN_CAB:  101624-8546-01.dmpDUMP_FILE_ATTRIBUTES: 0x8  Kernel Generated Triage DumpFAULTING_THREAD:  ffff818894fc8080CONTEXT:  ffffc588af48fd10 -- (.cxr 0xffffc588af48fd10)rax=0000000000000000 rbx=ffff81889653c540 rcx=00000000009cdf70rdx=ffff81888a324970 rsi=0000000000000068 rdi=0000000000000000rip=fffff803a51d811c rsp=ffffc588af490710 rbp=0000000000000002 r8=ffff81888a324970  r9=0000000000000118 r10=ffff81887cf7bc80r11=ffff81889653c540 r12=0000000000000000 r13=0000000000000000r14=ffff818891243820 r15=ffff8188857a5740iopl=0         nv up ei pl nz na pe nccs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202d1908dad6c814e919x7b1fde41d1a44b+0x811c:fffff803`a51d811c 8379180b        cmp     dword ptr [rcx+18h],0Bh ds:002b:00000000`009cdf88=????????Resetting default scopeBLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  svchost.exeSTACK_TEXT:  ffffc588`af490710 00000000`00000002     : 00000000`00000000 ffff8188`91243820 ffff8188`857a5740 ffff8188`9653c540 : d1908dad6c814e919x7b1fde41d1a44b+0x811cffffc588`af490718 00000000`00000000     : ffff8188`91243820 ffff8188`857a5740 ffff8188`9653c540 fffff803`6d42a6b5 : 0x2SYMBOL_NAME:  d1908dad6c814e919x7b1fde41d1a44b+811cMODULE_NAME: d1908dad6c814e919x7b1fde41d1a44bIMAGE_NAME:  d1908dad6c814e919x7b1fde41d1a44bSTACK_COMMAND:  .cxr 0xffffc588af48fd10 ; kbBUCKET_ID_FUNC_OFFSET:  811cFAILURE_BUCKET_ID:  AV_d1908dad6c814e919x7b1fde41d1a44b!unknown_functionOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {6419b87a-8d7a-8782-9b00-1e50346875e0}Followup:     MachineOwner---------

发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。

 楼主| x_year 发表于 2024-10-16 15:46

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 42

Microsoft (R) Windows Debugger Version 10.0.27704.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\101624-8546-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff803`6d200000 PsLoadedModuleList = 0xfffff803`6de2a290
Debug session time: Wed Oct 16 15:05:42.662 2024 (UTC + 8:00)
System Uptime: 0 days 6:14:19.604
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00342018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`6d5f8fa0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffc588`af48f410=000000000000003b
15: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff803a51d811c, Address of the instruction which caused the BugCheck
Arg3: ffffc588af48fd10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2281

    Key  : Analysis.Elapsed.mSec
    Value: 3370

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6215

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.Version.DbgEng
    Value: 10.0.27704.1001

    Key  : Analysis.Version.Description
    Value: 10.2408.27.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2408.27.1

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Bugcheck.Code.TargetModel
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: AV_d1908dad6c814e919x7b1fde41d1a44b!unknown_function

    Key  : Failure.Hash
    Value: {6419b87a-8d7a-8782-9b00-1e50346875e0}


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff803a51d811c

BUGCHECK_P3: ffffc588af48fd10

BUGCHECK_P4: 0

FILE_IN_CAB:  101624-8546-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffff818894fc8080

CONTEXT:  ffffc588af48fd10 -- (.cxr 0xffffc588af48fd10)
rax=0000000000000000 rbx=ffff81889653c540 rcx=00000000009cdf70
rdx=ffff81888a324970 rsi=0000000000000068 rdi=0000000000000000
rip=fffff803a51d811c rsp=ffffc588af490710 rbp=0000000000000002
r8=ffff81888a324970  r9=0000000000000118 r10=ffff81887cf7bc80
r11=ffff81889653c540 r12=0000000000000000 r13=0000000000000000
r14=ffff818891243820 r15=ffff8188857a5740
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
d1908dad6c814e919x7b1fde41d1a44b+0x811c:
fffff803`a51d811c 8379180b        cmp     dword ptr [rcx+18h],0Bh ds:002b:00000000`009cdf88=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:  
ffffc588`af490710 00000000`00000002     : 00000000`00000000 ffff8188`91243820 ffff8188`857a5740 ffff8188`9653c540 : d1908dad6c814e919x7b1fde41d1a44b+0x811c
ffffc588`af490718 00000000`00000000     : ffff8188`91243820 ffff8188`857a5740 ffff8188`9653c540 fffff803`6d42a6b5 : 0x2


SYMBOL_NAME:  d1908dad6c814e919x7b1fde41d1a44b+811c

MODULE_NAME: d1908dad6c814e919x7b1fde41d1a44b

IMAGE_NAME:  d1908dad6c814e919x7b1fde41d1a44b

STACK_COMMAND:  .cxr 0xffffc588af48fd10 ; kb

BUCKET_ID_FUNC_OFFSET:  811c

FAILURE_BUCKET_ID:  AV_d1908dad6c814e919x7b1fde41d1a44b!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6419b87a-8d7a-8782-9b00-1e50346875e0}

Followup:     MachineOwner
---------

您需要登录后才可以回帖 登录 | 注册[Register]

本版积分规则

返回列表

RSS订阅|小黑屋|处罚记录|联系我们|吾爱破解 - LCG - LSG ( 京ICP备16042023号 | 京公网安备 11010502030087号 )

GMT+8, 2024-12-15 10:39

Powered by Discuz!

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表