Win10 蓝屏 有没有人分析下什么原因,有没有解决办法

Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\WINDOWS\Minidump\070121-11109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff80756600000 PsLoadedModuleList = 0xfffff8075722a230
Debug session time: Thu Jul 1 15:55:37.998 2021 (UTC + 8:00)
System Uptime: 0 days 5:45:31.031
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807569f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd704a3d617b0=000000000000000a
1: kd> !analyze -v


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8075690fa23, address which referenced memory

Debugging Details:

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 1842

Key  : Analysis.DebugAnalysisManager
Value: Create

Key  : Analysis.Elapsed.mSec
Value: 6750

Key  : Analysis.Init.CPU.mSec
Value: 968

Key  : Analysis.Init.Elapsed.mSec
Value: 785949

Key  : Analysis.Memory.CommitPeak.Mb
Value: 81

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8075690fa23

READ_ADDRESS: fffff807572fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WeChat.exe

IRP_ADDRESS: 80000001a1afe788

TRAP_FRAME: ffffd704a3d618f0 -- (.trap 0xffffd704a3d618f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd704a3d61598
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075690fa23 rsp=ffffd704a3d61a80 rbp=ffffb38166dc9180
r8=0000000000000000 r9=ffffb38166788000 r10=fffff80757259000
r11=ffff880c0a406000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KeSetEvent+0x173:
fffff8075690fa23 4d8b6d00 mov r13,qword ptr [r13] ds:0000000000000000=????????????????
Resetting default scope

STACK_TEXT:
ffffd704a3d617a8 fffff80756a08b69 : 000000000000000a 0000000000000000 0000000000000002 0000000000000000 : nt!KeBugCheckEx
ffffd704a3d617b0 fffff80756a04e69 : 00000001ffffffff fffff807568b64d5 0000000015000000 0000000000000000 : nt!KiBugCheckDispatch+0x69
ffffd704a3d618f0 fffff8075690fa23 : ffffd704a3d61598 0000000000000000 3d37f364d74e0682 3d37f364d74e0682 : nt!KiPageFault+0x469
ffffd704a3d61a80 fffff8075690f3d9 : 0000000000000001 ffffd704a3d61c50 0000000100000000 ffffd880ee780000 : nt!KeSetEvent+0x173
ffffd704a3d61b10 fffff8075680ee00 : 80000001a1afe800 ffff880c00000000 0000000000000000 ffff880c0aa86010 : nt!IopCompleteRequest+0x599
ffffd704a3d61bd0 fffff807569faf80 : 0000000000000000 0000000000000000 880c2e5a00000000 0000000000000000 : nt!KiDeliverApc+0x1b0
ffffd704a3d61c80 fffff80756928041 : 0000000000000114 0000000000000000 ffffd880ee780000 0000000000000000 : nt!KiApcInterrupt+0x2f0
ffffd704a3d61e10 fffff8075683138b : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!MmAccessFault+0x231
ffffd704a3d61fb0 fffff807568233a5 : 0000000000000000 0000000000000000 ffffd704a3d621f0 ffffd704a3d621d4 : nt!MmCheckCachedPageStates+0x17eb
ffffd704a3d62180 fffff8075682232a : ffff880c10632d00 000000000ed6a9d0 ffffd704a3d62378 ffff880c00000000 : nt!CcMapAndCopyInToCache+0x605
ffffd704a3d62320 fffff8075a09870c : 0000000000000000 ffffd704a3d62600 ffff880c0d2a96e8 0000000000000000 : nt!CcCopyWriteEx+0xea
ffffd704a3d623a0 fffff8075a094393 : ffff880c0d2a96e8 ffff880c0b11d4e0 ffffd704a3d62640 0000000000000000 : Ntfs!NtfsCommonWrite+0x3f0c
ffffd704a3d625d0 fffff807569185b5 : ffff880c0badba20 ffff880c0b11d4e0 ffff880c0b11d4e0 ffff880c00558d60 : Ntfs!NtfsFsdWrite+0x1d3
ffffd704a3d626a0 fffff80753df6ccf : 0000000000000000 ffffd704a3d627a0 0000000000000008 fffff80753df6ccf : nt!IofCallDriver+0x55
ffffd704a3d626e0 fffff80753df48d3 : ffffd704a3d62770 0000000000000000 0000000000000000 fffff8075680827e : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd704a3d62750 fffff807569185b5 : ffff880c0b11d4e0 0000000000000204 ffff880c0c33ed10 fffff807569185b5 : FLTMGR!FltpDispatch+0xa3
ffffd704a3d627b0 fffff80756ce2748 : 0000000000000001 ffff880c0c33f800 0000000000000001 ffff880c0b11d910 : nt!IofCallDriver+0x55
ffffd704a3d627f0 fffff80756cf88ef : ffff880c00000000 ffffd704a3d62a80 000000001268dd60 ffffd704a3d62a80 : nt!IopSynchronousServiceTail+0x1a8
ffffd704a3d62890 fffff80756a085b5 : ffff880c00000000 0000000000001370 0000000000000000 000000000c4ee7f4 : nt!NtWriteFile+0x66f
ffffd704a3d62990 00000000775b1cfc : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x25
000000000571eda8 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x775b1cfc

SYMBOL_NAME: nt!KeSetEvent+173

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1052

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 173

FAILURE_BUCKET_ID: AV_nt!KeSetEvent

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c42bf4ac-5ef0-4bd6-418f-0d54b7c20876}

Followup: MachineOwner

看都看麻了,要不重启一下吧

重启不行的话 就重装