Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\070121-11109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff80756600000 PsLoadedModuleList = 0xfffff807
5722a230
Debug session time: Thu Jul 1 15:55:37.998 2021 (UTC + 8:00)
System Uptime: 0 days 5:45:31.031
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807569f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd704
a3d617b0=000000000000000a
1: kd> !analyze -v
*
Bugcheck Analysis *
*
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8075690fa23, address which referenced memory
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1842
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6750
Key : Analysis.Init.CPU.mSec
Value: 968
Key : Analysis.Init.Elapsed.mSec
Value: 785949
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8075690fa23
READ_ADDRESS: fffff807572fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WeChat.exe
IRP_ADDRESS: 80000001a1afe788
TRAP_FRAME: ffffd704a3d618f0 -- (.trap 0xffffd704a3d618f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd704a3d61598
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075690fa23 rsp=ffffd704a3d61a80 rbp=ffffb38166dc9180
r8=0000000000000000 r9=ffffb38166788000 r10=fffff80757259000
r11=ffff880c0a406000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KeSetEvent+0x173:
fffff8075690fa23 4d8b6d00 mov r13,qword ptr [r13] ds:00000000
00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffd704a3d617a8 fffff807
56a08b69 : 000000000000000a 00000000
00000000 0000000000000002 00000000
00000000 : nt!KeBugCheckEx
ffffd704a3d617b0 fffff807
56a04e69 : 00000001ffffffff fffff807
568b64d5 0000000015000000 00000000
00000000 : nt!KiBugCheckDispatch+0x69
ffffd704a3d618f0 fffff807
5690fa23 : ffffd704a3d61598 00000000
00000000 3d37f364d74e0682 3d37f364
d74e0682 : nt!KiPageFault+0x469
ffffd704a3d61a80 fffff807
5690f3d9 : 0000000000000001 ffffd704
a3d61c50 0000000100000000 ffffd880
ee780000 : nt!KeSetEvent+0x173
ffffd704a3d61b10 fffff807
5680ee00 : 80000001a1afe800 ffff880c
00000000 0000000000000000 ffff880c
0aa86010 : nt!IopCompleteRequest+0x599
ffffd704a3d61bd0 fffff807
569faf80 : 0000000000000000 00000000
00000000 880c2e5a00000000 00000000
00000000 : nt!KiDeliverApc+0x1b0
ffffd704a3d61c80 fffff807
56928041 : 0000000000000114 00000000
00000000 ffffd880ee780000 00000000
00000000 : nt!KiApcInterrupt+0x2f0
ffffd704a3d61e10 fffff807
5683138b : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!MmAccessFault+0x231
ffffd704a3d61fb0 fffff807
568233a5 : 0000000000000000 00000000
00000000 ffffd704a3d621f0 ffffd704
a3d621d4 : nt!MmCheckCachedPageStates+0x17eb
ffffd704a3d62180 fffff807
5682232a : ffff880c10632d00 00000000
0ed6a9d0 ffffd704a3d62378 ffff880c
00000000 : nt!CcMapAndCopyInToCache+0x605
ffffd704a3d62320 fffff807
5a09870c : 0000000000000000 ffffd704
a3d62600 ffff880c0d2a96e8 00000000
00000000 : nt!CcCopyWriteEx+0xea
ffffd704a3d623a0 fffff807
5a094393 : ffff880c0d2a96e8 ffff880c
0b11d4e0 ffffd704a3d62640 00000000
00000000 : Ntfs!NtfsCommonWrite+0x3f0c
ffffd704a3d625d0 fffff807
569185b5 : ffff880c0badba20 ffff880c
0b11d4e0 ffff880c0b11d4e0 ffff880c
00558d60 : Ntfs!NtfsFsdWrite+0x1d3
ffffd704a3d626a0 fffff807
53df6ccf : 0000000000000000 ffffd704
a3d627a0 0000000000000008 fffff807
53df6ccf : nt!IofCallDriver+0x55
ffffd704a3d626e0 fffff807
53df48d3 : ffffd704a3d62770 00000000
00000000 0000000000000000 fffff807
5680827e : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd704a3d62750 fffff807
569185b5 : ffff880c0b11d4e0 00000000
00000204 ffff880c0c33ed10 fffff807
569185b5 : FLTMGR!FltpDispatch+0xa3
ffffd704a3d627b0 fffff807
56ce2748 : 0000000000000001 ffff880c
0c33f800 0000000000000001 ffff880c
0b11d910 : nt!IofCallDriver+0x55
ffffd704a3d627f0 fffff807
56cf88ef : ffff880c00000000 ffffd704
a3d62a80 000000001268dd60 ffffd704
a3d62a80 : nt!IopSynchronousServiceTail+0x1a8
ffffd704a3d62890 fffff807
56a085b5 : ffff880c00000000 00000000
00001370 0000000000000000 00000000
0c4ee7f4 : nt!NtWriteFile+0x66f
ffffd704a3d62990 00000000
775b1cfc : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25
000000000571eda8 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x775b1cfc
SYMBOL_NAME: nt!KeSetEvent+173
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 173
FAILURE_BUCKET_ID: AV_nt!KeSetEvent
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c42bf4ac-5ef0-4bd6-418f-0d54b7c20876}
看都看麻了,要不重启一下吧
重启不行的话 就重装