Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\admin\Documents\tencent files\1018827350\filerecv\091222-10500-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22000 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff807`5f200000 PsLoadedModuleList = 0xfffff807`5fe296b0 Debug session time: Mon Sep 12 17:59:56.685 2022 (UTC 8:00) System Uptime: 0 days 0:38:07.334 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ............... Loading User Symbols Loading unloaded module list .............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`5f617d40 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffb082`0003d700=000000000000001e 11: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8075f5dbe52, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: ExceptionRecord *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: ContextRecord *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4936 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 7084 Key : Analysis.Init.CPU.mSec Value: 890 Key : Analysis.Init.Elapsed.mSec Value: 44830 Key : Analysis.Memory.CommitPeak.Mb Value: 97 Key : Bugcheck.Code.DumpHeader Value: 0x1e Key : Bugcheck.Code.Register Value: 0x1e Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 091222-10500-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8075f5dbe52 BUGCHECK_P3: 0 BUGCHECK_P4: 0 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 READ_ADDRESS: fffff8075ff05450: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: explorer.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: ffffb082`0003d6f8 fffff807`5f6a2451 : 00000000`0000001e ffffffff`c0000005 fffff807`5f5dbe52 00000000`00000000 : nt!KeBugCheckEx ffffb082`0003d700 fffff807`5f62aace : 00000000`00001000 ffffb082`0003dfc0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException 0x1bfe41 ffffb082`0003dde0 fffff807`5f626ada : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch 0x10e ffffb082`0003dfc0 fffff807`5f5dbe52 : fffff807`5f5dbea9 ffffb082`0003e220 fffff807`5f88eb29 00000000`000000fa : nt!KiPageFault 0x41a ffffb082`0003e158 fffff807`5f5dbea9 : ffffb082`0003e220 fffff807`5f88eb29 00000000`000000fa ffffe004`34dfb030 : nt!_ascii_stricmp 0x6 ffffb082`0003e160 ffffe004`49764c66 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`5f47b197 : nt!stricmp 0x9 ffffb082`0003e190 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff807`5f47b197 00000000`000000c6 : 0xffffe004`49764c66 SYMBOL_NAME: nt!_ascii_stricmp 6 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22000.856 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 6 FAILURE_BUCKET_ID: AV_R_nt!_ascii_stricmp OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8469f5f9-adee-024b-6657-b50c7dbbefbd} Followup: MachineOwner --------- 11: kd> lmvm nt Browse full module list start end module name fffff807`5f200000 fffff807`60247000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\BBB8D103B4E32443656F0C6B3189D0C51\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\604804911047000\ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 60480491 (This is a reproducible build file hash, not a timestamp) CheckSum: 00B3F395 ImageSize: 01047000 File version: 10.0.22000.856 Product version: 10.0.22000.856 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 10.0.22000.856 FileVersion: 10.0.22000.856 (WinBuild.160101.0800) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

HiIamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.


点赞(71) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部