今天的:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80533330925, Address of the instruction which caused the BugCheck
Arg3: fffffa0f2340eea0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15068
Key : Analysis.Init.CPU.mSec
Value: 499
Key : Analysis.Init.Elapsed.mSec
Value: 228993
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
FILE_IN_CAB: 062025-16343-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80533330925
BUGCHECK_P3: fffffa0f2340eea0
BUGCHECK_P4: 0
CONTEXT: fffffa0f2340eea0 -- (.cxr 0xfffffa0f2340eea0)
rax=ffff9a86cfa18b10 rbx=ff7f9a86cfa18a90 rcx=ffff9a86d05a67a0
rdx=00000000000003a0 rsi=00007ffb7d600000 rdi=ffff9a86d05a67a0
rip=fffff80533330925 rsp=fffffa0f2340f8c0 rbp=00007ffb7d600000
r8=00000007ffb7d600 r9=00000000ffb7d600 r10=fffff80533330600
r11=fffffa0f2340f998 r12=0000000000029000 r13=0000000000000000
r14=ffff9a86d37c3080 r15=00007ffb7d600000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!MiUnmapViewOfSection+0x235:
fffff805`33330925 48837b4000 cmp qword ptr [rbx+40h],0 ds:002b:ff7f9a86`cfa18ad0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
fffffa0f`2340f8c0 fffff805`333306bf : ffff9a86`d37c3080 fffff805`00000008 ffff9a86`b4d3f0c0 00000000`00000000 : nt!MiUnmapViewOfSection+0x235
fffffa0f`2340f9a0 fffff805`3333060c : ffff9a86`d3415040 00000000`07822b60 00000000`07822b60 ffff9a86`d37c3080 : nt!NtUnmapViewOfSectionEx+0x9f
fffffa0f`2340f9f0 fffff805`3302a005 : ffff9a86`d3415040 ffff9a86`d37bfb70 00007ffb`990baf00 ffff9a86`00000000 : nt!NtUnmapViewOfSection+0xc
fffffa0f`2340fa20 00007ffb`9ae90924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`072ff328 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`9ae90924
SYMBOL_NAME: nt!MiUnmapViewOfSection+235
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.5037
STACK_COMMAND: .cxr 0xfffffa0f2340eea0 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 235
FAILURE_BUCKET_ID: AV_nt!MiUnmapViewOfSection
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8303bfdb-3e97-23a2-3f09-76212d764fd7}
Followup: MachineOwner
昨天的:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff3282ab71c6f, Address of the instruction which caused the BugCheck
Arg3: fffff88e5bc9eae0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 64861
Key : Analysis.Init.CPU.mSec
Value: 156
Key : Analysis.Init.Elapsed.mSec
Value: 10803
Key : Analysis.Memory.CommitPeak.Mb
Value: 110
FILE_IN_CAB: 061925-14359-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff3282ab71c6f
BUGCHECK_P3: fffff88e5bc9eae0
BUGCHECK_P4: 0
CONTEXT: fffff88e5bc9eae0 -- (.cxr 0xfffff88e5bc9eae0)
rax=fffff8079d6d2410 rbx=0000000096000000 rcx=0000000020280800
rdx=0000000000000001 rsi=0000000000000001 rdi=fffff8076fd24bd0
rip=fffff3282ab71c6f rsp=fffff88e5bc9f500 rbp=0000000020280800
r8=ffff8089ce0f7010 r9=0000000000000000 r10=fffff80774603380
r11=fffff88e5bc9f610 r12=0000000000000001 r13=0000000096000000
r14=0000000020280800 r15=0000000096000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull!xxxSendNCPaint+0x67:
fffff328`2ab71c6f 8b90e8800000 mov edx,dword ptr [rax+80E8h] ds:002b:fffff807`9d6da4f8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LogonUI.exe
STACK_TEXT:
fffff88e`5bc9f500 fffff328`2ab715f8 : 00000000`00000020 00000000`00000003 00000000`00000001 fffff807`6fd24bd0 : win32kfull!xxxSendNCPaint+0x67
fffff88e`5bc9f550 fffff328`2ab718fd : ffff8089`da78d000 00000000`00000004 ffff8089`ce0f7010 fffff807`b400fec0 : win32kfull!xxxInternalDoSyncPaint+0x228
fffff88e`5bc9f5c0 fffff328`2ab712ac : fffff807`969d0150 fffff807`00000004 fffff88e`5bc9f729 fffff807`b4000000 : win32kfull!xxxInternalDoSyncPaint+0x52d
fffff88e`5bc9f630 fffff328`2abeb0a3 : 00000000`00000000 00000000`00000000 fffff807`b4000000 fffff328`2aaae760 : win32kfull!xxxDoSyncPaint+0x58
fffff88e`5bc9f660 fffff328`2ab99a53 : 00000000`00000001 fffff328`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxEndDeferWindowPosEx+0x943
fffff88e`5bc9f790 fffff328`2ab9995d : fffff807`6fd24bd0 00000000`00000001 fffff807`00000000 fffff328`00000000 : win32kfull!xxxSetWindowPosAndBand+0xc3
fffff88e`5bc9f820 fffff328`2ab995b8 : fffff807`6fd24bd0 fffff88e`5bc9f939 00000000`00000000 00000000`00010000 : win32kfull!xxxSetWindowPos+0x7d
fffff88e`5bc9f8a0 fffff328`2ab98f5a : 80000000`00000100 00000000`000207f6 fffff88e`5bc9faa0 00000000`00000000 : win32kfull!xxxShowWindowEx+0x61c
fffff88e`5bc9f9a0 fffff328`2b088f1a : ffffe30f`34aed080 000001d6`aaa1c660 00000000`00000000 00000000`00000000 : win32kfull!NtUserShowWindow+0xda
fffff88e`5bc9f9f0 fffff807`7482a005 : ffffe30f`34aed080 000001d6`ac9e0000 00000000`00000000 ffffe30f`3a8dd0c0 : win32k!NtUserShowWindow+0x16
fffff88e`5bc9fa20 00007ff8`2c851f24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000056`3dc7f818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2c851f24
CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kfull
2 errors : !win32kfull (fffff3282ab71c5a-fffff3282ab71c72)
fffff3282ab71c50 00 be 01 00 00 00 85 c0 0f 84 *24 00 00 00 48 8b ..........$...H.
...
fffff3282ab71c70 90 e8 *80 00 00 44 33 f5 8b c2 33 44 24 50 44 33 .....D3...3D$PD3
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff88e5bc9eae0 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
|
|
|
|
评论
直达楼层