@
KKLeon 文本日志如下
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MicrosoftEdgeU
STACK_TEXT:
ffff840a`0744bf88 fffff803`3b8b968a : 00000000`0000001a 00000000`00041792 ffffc180`0000d850 00400000`00000000 : nt!KeBugCheckEx
ffff840a`0744bf90 fffff803`3b80c4d6 : 00000000`00000000 00000000`00000000 00000000`0000002b ffffc180`0000d850 : nt!MiDeleteVa+0x153a
ffff840a`0744c090 fffff803`3b80c5eb : ffffc1e0`00000000 ffffb18d`19dc6700 ffff840a`00000000 ffff840a`0744c500 : nt!MiWalkPageTablesRecursively+0x776
ffff840a`0744c130 fffff803`3b80c5eb : ffffc1e0`f0600000 ffffb18d`19dc6700 ffff840a`00000001 ffff840a`0744c510 : nt!MiWalkPageTablesRecursively+0x88b
ffff840a`0744c1d0 fffff803`3b80c5eb : ffffc1e0`f0600000 ffffb18d`19dc6700 ffff840a`00000002 ffff840a`0744c520 : nt!MiWalkPageTablesRecursively+0x88b
ffff840a`0744c270 fffff803`3b8095eb : 00000000`00000000 ffffb18d`19dc6700 00000000`00000003 ffff840a`0744c530 : nt!MiWalkPageTablesRecursively+0x88b
ffff840a`0744c310 fffff803`3b8b7f21 : ffff840a`0744c4b0 ffffb18d`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff840a`0744c410 fffff803`3b81c328 : 00000000`00000001 ffffb18d`00000000 ffffb18d`19dc6550 ffffb18d`19b3f080 : nt!MiDeletePagablePteRange+0x4f1
ffff840a`0744c720 fffff803`3bc1e649 : ffffb18d`00000000 00000000`00000000 ffffb18d`00000000 ffffb18d`19dc6080 : nt!MiDeleteVad+0x378
ffff840a`0744c820 fffff803`3bc1eaa8 : ffffb18d`18f54bb0 ffffb18d`19dc6d20 ffffb18d`19b3f080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff840a`0744c850 fffff803`3bc38863 : ffffb18d`1977da80 ffffb18d`1977da80 ffffb18d`18f54bb0 ffffb18d`19dc6080 : nt!MiCleanVad+0x30
ffff840a`0744c880 fffff803`3bc04704 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb18d`19dc6080 : nt!MmCleanProcessAddressSpace+0x137
ffff840a`0744c900 fffff803`3bcc390e : ffffb18d`19dc6080 ffffc205`3dc19730 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff840a`0744c990 fffff803`3bd0723e : ffffb18d`00000000 00000000`00000001 00000000`00000000 00000000`00bde000 : nt!PspExitThread+0x5f6
ffff840a`0744ca90 fffff803`3ba11308 : ffffb18d`19dc6080 ffffb18d`19b3f080 fffffa00`1437cb80 ffffb18d`19dc6080 : nt!NtTerminateProcess+0xde
ffff840a`0744cb00 00000000`77891cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0097ebd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77891cfc
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .process /r /p 0xffffb18d19dc6080; .thread 0xffffb18d19b3f080; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: X64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Weixin.exe
STACK_TEXT:
fffffa00`1437f5d8 fffff803`67a67e1a : 00000000`000000be ffffc218`06754ae8 8a000000`00200121 fffffa00`1437f7d0 : nt!KeBugCheckEx
fffffa00`1437f5e0 fffff803`6780d53f : 8a000000`00200121 00000000`00000003 fffffa00`1437f850 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ca8e
fffffa00`1437f630 fffff803`67a0d46d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
fffffa00`1437f7d0 fffff803`67b58686 : 85000802`2718f847 fffffa00`00000000 00000000`00000000 ffffc200`0714dab0 : nt!KiPageFault+0x36d
fffffa00`1437f960 fffff803`67b595a3 : 00000000`00000001 ffffaf85`d6f482c0 ffffaf85`d7360080 ffffdb80`f0cf4f50 : nt!MiBuildForkPte+0x5fa
fffffa00`1437fa90 fffff803`67ed9111 : ffffaf85`d6f482c0 fffffa00`1437fd99 ffffaf85`d7360080 ffffaf85`d7360080 : nt!MiCloneVads+0x4ab
fffffa00`1437fd20 fffff803`67e3f565 : 00000000`00000000 fffffa00`00000000 00000000`00000000 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x261
fffffa00`1437fe00 fffff803`67d0594b : 00000000`00002ab1 fffffa00`14380b80 00000000`00000000 00000000`00000000 : nt!MmInitializeProcessAddressSpace+0x143d31
fffffa00`1437fff0 fffff803`67dce2e2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x1d13
fffffa00`14380760 fffff803`67f06e45 : ffff1edd`4799000b ffff1edd`479901ab 00000000`00000000 00000000`00000000 : nt!PspCreateProcess+0x242
fffffa00`14380a30 fffff803`67a11308 : 00000000`00000000 00000000`00000000 00000000`77566d4d fffffa00`14380ae8 : nt!NtCreateProcessEx+0x85
fffffa00`14380a90 00007ffe`8174de94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000089`c2adf638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8174de94
SYMBOL_NAME: nt!MiRaisedIrqlFault+16ca8e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.6093
STACK_COMMAND: .process /r /p 0xffffaf85de84c340; .thread 0xffffaf85e0db4540; kb
BUCKET_ID_FUNC_OFFSET: 16ca8e
FAILURE_BUCKET_ID: AV_nt!MiRaisedIrqlFault
OSPLATFORM_TYPE: X64
OSNAME: Windows 10
FAILURE_ID_HASH: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}
Followup: MachineOwner