Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\Desktop\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff800`84c00000 PsLoadedModuleList = 0xfffff800`8582a2d0 Debug session time: Wed Apr 27 23:01:13.979 2022 (UTC 8:00) System Uptime: 0 days 7:06:11.953 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................................................ Loading User Symbols Loading unloaded module list ............... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`84ff7620 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffff838b`6f01e8f0=0000000000000050 6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffff8507ade3c338, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8008203a7c4, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Unable to load image \??\C:\WINDOWS\system32\drivers\lrtp.sys, Win32 error 0n2 KEY_VALUES_STRING: 1 Key : AV.Type Value: Read Key : Analysis.CPU.mSec Value: 3968 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 11294 Key : Analysis.Init.CPU.mSec Value: 312 Key : Analysis.Init.Elapsed.mSec Value: 9164 Key : Analysis.Memory.CommitPeak.Mb Value: 86 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: MEMORY.DMP BUGCHECK_CODE: 50 BUGCHECK_P1: ffff8507ade3c338 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8008203a7c4 BUGCHECK_P4: 2 READ_ADDRESS: ffff8507ade3c338 Paged pool MM_INTERNAL_CODE: 2 IMAGE_NAME: lrtp.sys MODULE_NAME: lrtp FAULTING_MODULE: fffff80082030000 FLTMGR BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System TRAP_FRAME: ffff838b6f01eb90 -- (.trap 0xffff838b6f01eb90) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff8507ade3c318 rbx=0000000000000000 rcx=ffffdc0faa235240 rdx=ffff8507ade3c318 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8008203a7c4 rsp=ffff838b6f01ed28 rbp=ffffdc0faa2351e0 r8=ffffdc0fbeb05db0 r9=0000000000000000 r10=ffff85073685c9f8 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc FLTMGR!TreeInsert 0x14: fffff800`8203a7c4 488b4020 mov rax,qword ptr [rax 20h] ds:ffff8507`ade3c338=???????????????? Resetting default scope STACK_TEXT: ffff838b`6f01e8e8 fffff800`8504a86f : 00000000`00000050 ffff8507`ade3c338 00000000`00000000 ffff838b`6f01eb90 : nt!KeBugCheckEx ffff838b`6f01e8f0 fffff800`84e9f550 : ffffdc0f`00000000 00000000`00000000 ffff838b`6f01ec10 00000000`00000000 : nt!MiSystemFault 0x18d2ff ffff838b`6f01e9f0 fffff800`8500575e : ffff8507`3685c9f8 fffff800`85230288 ffff838b`6f01ed18 00000000`00000000 : nt!MmAccessFault 0x400 ffff838b`6f01eb90 fffff800`8203a7c4 : fffff800`8206da2d ffff8507`3685e158 ffffdc0f`aa2351a0 00000000`00000000 : nt!KiPageFault 0x35e ffff838b`6f01ed28 fffff800`8206da2d : ffff8507`3685e158 ffffdc0f`aa2351a0 00000000`00000000 ffffdc0f`aa2351a0 : FLTMGR!TreeInsert 0x14 ffff838b`6f01ed30 fffff800`820373e4 : ffffdc0f`aa2351a0 ffffdc0f`beb05db0 ffffdc0f`aa2351a4 ffffdc0f`aa2351e0 : FLTMGR!FltpCacheCreateNames 0x1ed ffff838b`6f01edc0 fffff800`8206c124 : ffff838b`6f01ee70 ffffdc0f`beb05e08 00000000`00000000 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted 0x6a4 ffff838b`6f01ee30 fffff800`84e8f835 : 00000000`00000000 ffffdc0f`a3bd94b0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate 0x324 ffff838b`6f01eee0 fffff800`84e90e34 : 00000000`00000003 ffffdc0f`b6cd2950 ffffdc0f`6d4e6f49 fffff800`84e90a63 : nt!IofCallDriver 0x55 ffff838b`6f01ef20 fffff800`8527891d : ffff838b`6f01f1e0 ffffdc0f`a3bd94b0 ffffdc0f`beb05e48 00000000`00000000 : nt!IoCallDriverWithTracing 0x34 ffff838b`6f01ef70 fffff800`851f307e : ffffdc0f`a3bd94b0 00000000`00000094 ffffdc0f`ae87b010 ffffdc0f`ae87b000 : nt!IopParseDevice 0x117d ffff838b`6f01f0e0 fffff800`85295fda : ffffdc0f`ae87b000 ffff838b`6f01f348 00000000`00000240 ffffdc0f`a1148da0 : nt!ObpLookupObjectName 0x3fe ffff838b`6f01f2b0 fffff800`85216e2f : ffff8507`00000000 ffff838b`6f01f798 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx 0x1fa ffff838b`6f01f3e0 fffff800`85216978 : ffff838b`6f01f758 00000000`00000000 ffff838b`6f01f798 ffff838b`6f01f788 : nt!IopCreateFile 0x40f ffff838b`6f01f480 fffff800`85008fb5 : 00000000`00004518 ffff8507`16a003ff 00000000`00000000 ffffdc0f`b6cd2950 : nt!NtOpenFile 0x58 ffff838b`6f01f510 fffff800`84ffb480 : fffff800`9b362df9 ffff838b`6f01f770 00000000`0000002a 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x25 ffff838b`6f01f718 fffff800`9b362df9 : ffff838b`6f01f770 00000000`0000002a 00000000`00000000 00000000`00000054 : nt!KiServiceLinkage ffff838b`6f01f720 fffff800`9b362f79 : ffffdc0f`bdf63000 ffffdc0f`bdf63000 00000000`00000088 ffffdc0f`be7c7000 : lrtp 0x2df9 ffff838b`6f01fa10 fffff800`9b363ddd : ffffffff`00011588 ffffdc0f`a309b000 ffff838b`6f01fa90 ffffdc0f`a309b000 : lrtp 0x2f79 ffff838b`6f01fa60 fffff800`9b36393e : fffff800`00000000 fffff800`000000d6 ffffdc0f`be702000 00000000`00000000 : lrtp 0x3ddd ffff838b`6f01fad0 fffff800`84f55a15 : ffffdc0f`a309b040 ffffffff`b8797400 00000000`00000000 000fa4ef`bd9bbfff : lrtp 0x393e ffff838b`6f01fb10 fffff800`84ffec78 : ffffb001`9aa80180 ffffdc0f`a309b040 fffff800`84f559c0 00000000`00000000 : nt!PspSystemThreadStartup 0x55 ffff838b`6f01fb60 00000000`00000000 : ffff838b`6f020000 ffff838b`6f019000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread 0x28 SYMBOL_NAME: lrtp 2df9 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 2df9 FAILURE_BUCKET_ID: AV_R_(null)_lrtp!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f0b8af22-54b9-e9bf-96f9-a4baa3cc8281} Followup: MachineOwner ---------

HiIamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.


MingYiHao你好刚刚与您联系,您在上传小型转储文件时遇到任何困难吗?___________________________________________________________________PowertotheDeveloper!MSIGV72-17.3",i7-8750H(HexCore),32GBDDR4,4GBGeForceGTX1050Ti,256GBNVMeM2,2TBHDD此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(39) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部