Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\122521-12015-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff802`6dc00000 PsLoadedModuleList = 0xfffff802`6e82a1b0 Debug session time: Sat Dec 25 09:02:36.409 2021 (UTC 8:00) System Uptime: 0 days 0:56:05.172 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .................................................... Loading User Symbols Loading unloaded module list .............. Cannot read PEB32 from WOW64 TEB32 0001252d - Win32 error 0n30 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 13A, {11, ffff8d0723e02100, ffff8d0738cec060, 0} Probably caused by : Unknown_Image ( PAGE_NOT_ZERO ) Followup: MachineOwner --------- *** Memory manager detected 75053 instance(s) of page corruption, target is likely to have memory corruption. 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Unknown bugcheck code (13a) Unknown bugcheck description Arguments: Arg1: 0000000000000011 Arg2: ffff8d0723e02100 Arg3: ffff8d0738cec060 Arg4: 0000000000000000 Debugging Details: ------------------ CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x13A PROCESS_NAME: System CURRENT_IRQL: 0 BAD_PAGES_DETECTED: 1252d LAST_CONTROL_TRANSFER: from fffff8026e18e438 to fffff8026dff70d0 STACK_TEXT: fffff30a`344bf0d8 fffff802`6e18e438 : 00000000`0000013a 00000000`00000011 ffff8d07`23e02100 ffff8d07`38cec060 : nt!KeBugCheckEx fffff30a`344bf0e0 fffff802`6e18e498 : 00000000`00000011 00000000`00000000 ffff8d07`23e02100 fffff802`6fee129b : nt!RtlpHeapHandleError 0x40 fffff30a`344bf120 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError 0x58 STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 75053 instance(s) of page corruption, target is likely to have memory corruption.

I'mDyari.Thanksforreachingout.Iwillbehappytoassistyouinthisregard.KindlycheckC:\Windows\MinidumpandcopyavailableminidumpfilestothedesktopthensharethemwithmeinordertoanalyzethemtoindicatewhichfileiscausingtheBSOD.Regards,


点赞(78) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部