Win7升級10後不定時藍屏重啟 - 電腦
By Megan
at 2020-01-14T18:32
at 2020-01-14T18:32
Table of Contents
CPU:I5-4430
MB:ASUS-M11AD
RAM:威剛DDR3 4G + 金士頓DDR3 4G
GPU:技嘉AMD RX570 4G
週末升級成Win10之後每過幾個小時就會藍屏重啟
升級後驅動有更新過
以下是dmp檔
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address
space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred
SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is:
SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`61e00000 PsLoadedModuleList = 0xfffff802`62248130
Debug session time: Tue Jan 14 01:58:02.396 2020 (UTC + 8:00)
System Uptime: 0 days 4:15:59.001
Loading Kernel Symbols
...............................................................
.Page 200000b12 too large to be in the dump file.
...............................................................
...............................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb88c142e66d0, Address of the trap frame for the exception that
caused the bugcheck
Arg3: ffffb88c142e6628, Address of the exception record for the exception
that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: ASUSTeK COMPUTER INC.
SYSTEM_PRODUCT_NAME: M11AD
SYSTEM_SKU: All
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0602
BIOS_DATE: 03/19/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M11AD
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb88c142e66d0
BUGCHECK_P3: ffffb88c142e6628
BUGCHECK_P4: 0
TRAP_FRAME: ffffb88c142e66d0 -- (.trap 0xffffb88c142e66d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe58bbef235c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80262046b0d rsp=ffffb88c142e6860 rbp=ffffe58bbef4fc48
r8=ffffe58bbef4fc48 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
nt!ExInterlockedInsertTailList+0x13f0ed:
fffff802`62046b0d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb88c142e6628 -- (.exr 0xffffb88c142e6628)
ExceptionAddress: fffff80262046b0d
(nt!ExInterlockedInsertTailList+0x000000000013f0ed)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: bb1
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 25'00000000 (cache) 25'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: 9487-PC
ANALYSIS_SESSION_TIME: 01-14-2020 18:15:01.0105
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80261fd32e9 to fffff80261fc14e0
STACK_TEXT:
ffffb88c`142e63a8 fffff802`61fd32e9 : 00000000`00000139 00000000`00000003
ffffb88c`142e66d0 ffffb88c`142e6628 : nt!KeBugCheckEx
ffffb88c`142e63b0 fffff802`61fd3710 : fffff802`652ed208 fffff802`652810d7
ffffe58b`ba3a73f0 00000000`00000007 : nt!KiBugCheckDispatch+0x69
ffffb88c`142e64f0 fffff802`61fd1aa5 : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb88c`142e66d0 fffff802`62046b0d : ffffe58b`c0470040 00000000`00000000
ffffe58b`bef235c8 ffffe58b`bef4fc58 : nt!KiRaiseSecurityCheckFailure+0x325
ffffb88c`142e6860 fffff802`601d5521 : ffffe58b`c0470040 00000000`00000080
fffff802`601d6eb0 ffffe58b`bef3d030 : nt!ExInterlockedInsertTailList+0x13f0ed
ffffb88c`142e6890 fffff802`601fa190 : ffffe58b`bef3d030 ffffe58b`bef235c8
ffffe58b`bef19060 ffffe58b`bef235c8 : athurx+0x5521
ffffb88c`142e68c0 fffff802`601fb02a : ffffe58b`bef235f8 ffffbc00`1d161180
00000000`00000000 ffffe58b`bef3d030 : athurx+0x2a190
ffffb88c`142e6900 fffff802`60285903 : ffffe58b`bef235f8 ffffe58b`bef3d030
fffff802`601d6eb0 00000000`00000080 : athurx+0x2b02a
ffffb88c`142e6930 fffff802`601f9f63 : ffffe58b`bef235f8 00000000`000000cc
ffffe58b`00000000 ffffffff`fd050f80 : athurx+0xb5903
ffffb88c`142e6960 fffff802`6028676c : ffffe58b`bef235f8 00000000`00000001
00000023`c5a8932b 00000000`00000000 : athurx+0x29f63
ffffb88c`142e6990 fffff802`6026f685 : ffffe58b`bef19030 fffff802`00000017
ffffb88c`142e6a34 02b5872a`00000004 : athurx+0xb676c
ffffb88c`142e69f0 fffff802`6026f3bb : ffffe58b`c0238030 00000000`00004048
00000000`00000000 00000000`00000000 : athurx+0x9f685
ffffb88c`142e6a50 fffff802`60301469 : ffffe58b`c0238030 ffffe58b`00004048
ffffe58b`b8a97040 ffffbc00`1d161180 : athurx+0x9f3bb
ffffb88c`142e6a90 fffff802`602925fa : ffffe58b`c0238030 00000000`0000000d
00000000`00000000 ffffe58b`c01d5000 : athurx+0x131469
ffffb88c`142e6ae0 fffff802`60201367 : ffffe58b`c01d5030 fffff802`5e74df68
02b5872a`d5699b99 00000000`00000000 : athurx+0xc25fa
ffffb88c`142e6b30 fffff802`601d6f83 : ffffe58b`bef20030 00000000`00000010
ffffb88c`142e6ba0 00000000`00000000 : athurx+0x31367
ffffb88c`142e6b60 fffff802`61f2a7a5 : ffffe58b`bef3d030 fffff802`601d6eb0
ffffe58b`bef3d030 00002425`bd9bbfff : athurx+0x6f83
ffffb88c`142e6c10 fffff802`61fc8b2a : ffffbc00`1d161180 ffffe58b`c0470040
fffff802`61f2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb88c`142e6c60 00000000`00000000 : ffffb88c`142e7000 ffffb88c`142e1000
00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: d33f3f872da89a1d42240e2ca030e77aeb1ad31f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ddfb84fee8d885ee69a32a1459f94ec383daccaf
THREAD_SHA1_HASH_MOD: 17c72ad0449b3aea6866e5a89120b394c16342e1
FOLLOWUP_IP:
athurx+5521
fffff802`601d5521 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: athurx+5521
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athurx
IMAGE_NAME: athurx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4daeb071
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5521
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_athurx!unknown_function
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_athurx!unknown_function
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_athurx!unknown_function
TARGET_TIME: 2020-01-13T17:58:02.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 23:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 369f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_athurx!unknown_function
FAILURE_ID_HASH: {cf0b00cb-8b52-be47-e20d-865e290d55f0}
Followup: MachineOwner
---------
煩請各位幫忙
--
MB:ASUS-M11AD
RAM:威剛DDR3 4G + 金士頓DDR3 4G
GPU:技嘉AMD RX570 4G
週末升級成Win10之後每過幾個小時就會藍屏重啟
升級後驅動有更新過
以下是dmp檔
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address
space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred
SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is:
SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`61e00000 PsLoadedModuleList = 0xfffff802`62248130
Debug session time: Tue Jan 14 01:58:02.396 2020 (UTC + 8:00)
System Uptime: 0 days 4:15:59.001
Loading Kernel Symbols
...............................................................
.Page 200000b12 too large to be in the dump file.
...............................................................
...............................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb88c142e66d0, Address of the trap frame for the exception that
caused the bugcheck
Arg3: ffffb88c142e6628, Address of the exception record for the exception
that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: ASUSTeK COMPUTER INC.
SYSTEM_PRODUCT_NAME: M11AD
SYSTEM_SKU: All
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0602
BIOS_DATE: 03/19/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M11AD
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb88c142e66d0
BUGCHECK_P3: ffffb88c142e6628
BUGCHECK_P4: 0
TRAP_FRAME: ffffb88c142e66d0 -- (.trap 0xffffb88c142e66d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe58bbef235c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80262046b0d rsp=ffffb88c142e6860 rbp=ffffe58bbef4fc48
r8=ffffe58bbef4fc48 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
nt!ExInterlockedInsertTailList+0x13f0ed:
fffff802`62046b0d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb88c142e6628 -- (.exr 0xffffb88c142e6628)
ExceptionAddress: fffff80262046b0d
(nt!ExInterlockedInsertTailList+0x000000000013f0ed)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: bb1
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 25'00000000 (cache) 25'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: 9487-PC
ANALYSIS_SESSION_TIME: 01-14-2020 18:15:01.0105
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80261fd32e9 to fffff80261fc14e0
STACK_TEXT:
ffffb88c`142e63a8 fffff802`61fd32e9 : 00000000`00000139 00000000`00000003
ffffb88c`142e66d0 ffffb88c`142e6628 : nt!KeBugCheckEx
ffffb88c`142e63b0 fffff802`61fd3710 : fffff802`652ed208 fffff802`652810d7
ffffe58b`ba3a73f0 00000000`00000007 : nt!KiBugCheckDispatch+0x69
ffffb88c`142e64f0 fffff802`61fd1aa5 : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb88c`142e66d0 fffff802`62046b0d : ffffe58b`c0470040 00000000`00000000
ffffe58b`bef235c8 ffffe58b`bef4fc58 : nt!KiRaiseSecurityCheckFailure+0x325
ffffb88c`142e6860 fffff802`601d5521 : ffffe58b`c0470040 00000000`00000080
fffff802`601d6eb0 ffffe58b`bef3d030 : nt!ExInterlockedInsertTailList+0x13f0ed
ffffb88c`142e6890 fffff802`601fa190 : ffffe58b`bef3d030 ffffe58b`bef235c8
ffffe58b`bef19060 ffffe58b`bef235c8 : athurx+0x5521
ffffb88c`142e68c0 fffff802`601fb02a : ffffe58b`bef235f8 ffffbc00`1d161180
00000000`00000000 ffffe58b`bef3d030 : athurx+0x2a190
ffffb88c`142e6900 fffff802`60285903 : ffffe58b`bef235f8 ffffe58b`bef3d030
fffff802`601d6eb0 00000000`00000080 : athurx+0x2b02a
ffffb88c`142e6930 fffff802`601f9f63 : ffffe58b`bef235f8 00000000`000000cc
ffffe58b`00000000 ffffffff`fd050f80 : athurx+0xb5903
ffffb88c`142e6960 fffff802`6028676c : ffffe58b`bef235f8 00000000`00000001
00000023`c5a8932b 00000000`00000000 : athurx+0x29f63
ffffb88c`142e6990 fffff802`6026f685 : ffffe58b`bef19030 fffff802`00000017
ffffb88c`142e6a34 02b5872a`00000004 : athurx+0xb676c
ffffb88c`142e69f0 fffff802`6026f3bb : ffffe58b`c0238030 00000000`00004048
00000000`00000000 00000000`00000000 : athurx+0x9f685
ffffb88c`142e6a50 fffff802`60301469 : ffffe58b`c0238030 ffffe58b`00004048
ffffe58b`b8a97040 ffffbc00`1d161180 : athurx+0x9f3bb
ffffb88c`142e6a90 fffff802`602925fa : ffffe58b`c0238030 00000000`0000000d
00000000`00000000 ffffe58b`c01d5000 : athurx+0x131469
ffffb88c`142e6ae0 fffff802`60201367 : ffffe58b`c01d5030 fffff802`5e74df68
02b5872a`d5699b99 00000000`00000000 : athurx+0xc25fa
ffffb88c`142e6b30 fffff802`601d6f83 : ffffe58b`bef20030 00000000`00000010
ffffb88c`142e6ba0 00000000`00000000 : athurx+0x31367
ffffb88c`142e6b60 fffff802`61f2a7a5 : ffffe58b`bef3d030 fffff802`601d6eb0
ffffe58b`bef3d030 00002425`bd9bbfff : athurx+0x6f83
ffffb88c`142e6c10 fffff802`61fc8b2a : ffffbc00`1d161180 ffffe58b`c0470040
fffff802`61f2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb88c`142e6c60 00000000`00000000 : ffffb88c`142e7000 ffffb88c`142e1000
00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: d33f3f872da89a1d42240e2ca030e77aeb1ad31f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ddfb84fee8d885ee69a32a1459f94ec383daccaf
THREAD_SHA1_HASH_MOD: 17c72ad0449b3aea6866e5a89120b394c16342e1
FOLLOWUP_IP:
athurx+5521
fffff802`601d5521 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: athurx+5521
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athurx
IMAGE_NAME: athurx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4daeb071
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5521
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_athurx!unknown_function
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_athurx!unknown_function
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_athurx!unknown_function
TARGET_TIME: 2020-01-13T17:58:02.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 23:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 369f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_athurx!unknown_function
FAILURE_ID_HASH: {cf0b00cb-8b52-be47-e20d-865e290d55f0}
Followup: MachineOwner
---------
煩請各位幫忙
--
Tags:
電腦
All Comments
By Leila
at 2020-01-17T17:40
at 2020-01-17T17:40
By Noah
at 2020-01-20T17:40
at 2020-01-20T17:40
By Vanessa
at 2020-01-22T15:46
at 2020-01-22T15:46
By Madame
at 2020-01-27T01:28
at 2020-01-27T01:28
By Wallis
at 2020-01-30T02:57
at 2020-01-30T02:57
By Elma
at 2020-02-03T03:22
at 2020-02-03T03:22
By Frederic
at 2020-02-05T15:10
at 2020-02-05T15:10
Related Posts
電腦不定時凍結、藍屏、綠屏
By Hamiltion
at 2020-01-12T23:51
at 2020-01-12T23:51
更換記憶體後電腦會突然黑屏
By Victoria
at 2020-01-12T23:50
at 2020-01-12T23:50
想買外接的BD燒錄機讀藍光片
By Dora
at 2020-01-12T23:11
at 2020-01-12T23:11
A300官網支援記憶體讓電腦出現藍屏和黑屏
By Catherine
at 2020-01-11T10:38
at 2020-01-11T10:38
1700 segv_test ng:45
By Todd Johnson
at 2020-01-10T17:56
at 2020-01-10T17:56