Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\062121-8859-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
OK c:\Symbols
Deferred srv*c:\Symbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: c:\Symbols;srv*c:\Symbols*https://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff805`3d800000 PsLoadedModuleList = 0xfffff805`3e42a230
Debug session time: Mon Jun 21 20:07:03.621 2021 (UTC + 8:00)
System Uptime: 0 days 0:05:31.383
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`3dbf6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa8b`b7aeb120=000000000000003b
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff8053dae0093, Address of the instruction which caused the BugCheck
Arg3: ffffaa8bb7aeba20, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2767
Key : Analysis.Init.CPU.mSec
Value: 375
Key : Analysis.Init.Elapsed.mSec
Value: 5024
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff8053dae0093
BUGCHECK_P3: ffffaa8bb7aeba20
BUGCHECK_P4: 0
CONTEXT: ffffaa8bb7aeba20 -- (.cxr 0xffffaa8bb7aeba20)
rax=ffffaa8bb7aec448 rbx=ffffaa8bb7aed648 rcx=0000000000000001
rdx=ffffaa8bb7aed648 rsi=ffffaa8bb7aecc40 rdi=0000000000000001
rip=fffff8053dae0093 rsp=ffffaa8bb7aec420 rbp=ffffaa8bb7aeca30
r8=ffffaa8bb7aecc40 r9=ffffaa8bb7aeca80 r10=fffff8053dbcc9b0
r11=ffff767839600000 r12=ffffaa8bb7aed680 r13=ffffaa8bb7aed408
r14=ffffaa8bb7aeca80 r15=ffffaa8bb7aed408
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040202
nt!KeCheckStackAndTargetAddress+0x53:
fffff805`3dae0093 cc int 3
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: wemeetapp.exe
TRAP_FRAME: ffffda85955d44a0 -- (.trap 0xffffda85955d44a0)
Unable to read trap frame at ffffda85`955d44a0
STACK_TEXT:
ffffaa8b`b7aec420 fffff805`3dbcc9eb : ffffeadb`d6e6502a ffffeadb`d705e758 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffffaa8b`b7aec450 fffff805`3dbffae2 : ffffeadb`d705e758 ffffaa8b`b7aeca30 ffffeadb`d6ecdd79 00000000`00000000 : nt!_C_specific_handler+0x3b
ffffaa8b`b7aec4c0 fffff805`3da87547 : ffffaa8b`b7aeca30 00000000`00000000 ffffaa8b`b7aed680 ffffeadb`d6e6502a : nt!RtlpExecuteHandlerForException+0x12
ffffaa8b`b7aec4f0 fffff805`3da86136 : ffffaa8b`b7aed408 ffffaa8b`b7aed140 ffffaa8b`b7aed408 00000000`2d010785 : nt!RtlDispatchException+0x297
ffffaa8b`b7aecc10 fffff805`3dc08cac : 00000000`00001000 ffffaa8b`b7aed4b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffaa8b`b7aed2d0 fffff805`3dc04e43 : 00000000`00000001 fffff805`3da093a0 00000000`00000000 ffffda85`875a2980 : nt!KiExceptionDispatch+0x12c
ffffaa8b`b7aed4b0 00000000`00000001 : ffffaa8b`b7aed850 ffffeaa5`00603010 00000000`2d010785 ffffeaa5`007c4010 : nt!KiPageFault+0x443
ffffaa8b`b7aed648 ffffaa8b`b7aed850 : ffffeaa5`00603010 00000000`2d010785 ffffeaa5`007c4010 00000000`00000000 : 0x1
ffffaa8b`b7aed650 ffffeaa5`00603010 : 00000000`2d010785 ffffeaa5`007c4010 00000000`00000000 ffffeaa5`00911000 : 0xffffaa8b`b7aed850
ffffaa8b`b7aed658 00000000`2d010785 : ffffeaa5`007c4010 00000000`00000000 ffffeaa5`00911000 ffffeadb`d6e6502a : 0xffffeaa5`00603010
ffffaa8b`b7aed660 ffffeaa5`007c4010 : 00000000`00000000 ffffeaa5`00911000 ffffeadb`d6e6502a ffffeaa5`00911000 : 0x2d010785
ffffaa8b`b7aed668 00000000`00000000 : ffffeaa5`00911000 ffffeadb`d6e6502a ffffeaa5`00911000 ffffeaa5`00911000 : 0xffffeaa5`007c4010
SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+53
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .cxr 0xffffaa8bb7aeba20 ; kb
BUCKET_ID_FUNC_OFFSET: 53
FAILURE_BUCKET_ID: 0x3B_80000003_nt!KeCheckStackAndTargetAddress
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3c8e413e-71c2-0077-9ab0-f2dd61308472}
Followup: MachineOwner
--------- HiIamDave,anIndependentAdvisor,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.___________________________________________________________________PowertotheDeveloper!MSIGV72-17.3",i7-8750H(HexCore),32GBDDR4,4GBGeForceGTX1050Ti,256GBNVMeM2,2TBHDD此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。