Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\092222-11031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff807`54000000 PsLoadedModuleList = 0xfffff807`54c2a290
Debug session time: Thu Sep 22 21:57:14.088 2022 (UTC + 8:00)
System Uptime: 0 days 0:33:43.772
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`543f8fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa86`264f2120=000000000000000a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2155
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14547
Key : Analysis.Init.CPU.mSec
Value: 905
Key : Analysis.Init.Elapsed.mSec
Value: 817911
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092222-11031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 28f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807542f6330
READ_ADDRESS: fffff80754cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000028f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
r8=ffffffffffffff80 r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c cmp ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope
STACK_TEXT:
fffffa86`264f2118 fffff807`5440af69 : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269 : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330 : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000 : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170
SYMBOL_NAME: nt!RtlpHpSegPageRangeShrink+170
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 170
FAILURE_BUCKET_ID: AV_nt!RtlpHpSegPageRangeShrink
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68a44547-f035-1581-b1c7-d81166d1cc9a}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1717
Key : Analysis.Init.CPU.mSec
Value: 5077
Key : Analysis.Init.Elapsed.mSec
Value: 834507
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092222-11031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 28f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807542f6330
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000028f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
r8=ffffffffffffff80 r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c cmp ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope
STACK_TEXT:
fffffa86`264f2118 fffff807`5440af69 : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269 : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330 : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000 : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170
SYMBOL_NAME: nt!RtlpHpSegPageRangeShrink+170
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 170
FAILURE_BUCKET_ID: AV_nt!RtlpHpSegPageRangeShrink
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68a44547-f035-1581-b1c7-d81166d1cc9a}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1734
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1727
Key : Analysis.Init.CPU.mSec
Value: 7562
Key : Analysis.Init.Elapsed.mSec
Value: 836998
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092222-11031-01.dmp<365>
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 28f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807542f6330
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000028f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
r8=ffffffffffffff80 r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c cmp ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope
STACK_TEXT:
fffffa86`264f2118 fffff807`5440af69 : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269 : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330 : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000 : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170
SYMBOL_NAME: nt!RtlpHpSegPageRangeShrink+170
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 170
FAILURE_BUCKET_ID: AV_nt!RtlpHpSegPageRangeShrink
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68a44547-f035-1581-b1c7-d81166d1cc9a}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1719
Key : Analysis.Init.CPU.mSec
Value: 10078
Key : Analysis.Init.Elapsed.mSec
Value: 839506
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092222-11031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 28f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807542f6330
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000028f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
r8=ffffffffffffff80 r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c cmp ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope
STACK_TEXT:
fffffa86`264f2118 fffff807`5440af69 : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269 : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330 : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000 : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170
SYMBOL_NAME: nt!RtlpHpSegPageRangeShrink+170
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 170
FAILURE_BUCKET_ID: AV_nt!RtlpHpSegPageRangeShrink
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68a44547-f035-1581-b1c7-d81166d1cc9a}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1726
Key : Analysis.Init.CPU.mSec
Value: 12561
Key : Analysis.Init.Elapsed.mSec
Value: 853898
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092222-11031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 28f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807542f6330
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000028f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
r8=ffffffffffffff80 r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c cmp ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope
STACK_TEXT:
fffffa86`264f2118 fffff807`5440af69 : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269 : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330 : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000 : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170
SYMBOL_NAME: nt!RtlpHpSegPageRangeShrink+170
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 170
FAILURE_BUCKET_ID: AV_nt!RtlpHpSegPageRangeShrink
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68a44547-f035-1581-b1c7-d81166d1cc9a}
Followup: MachineOwner
---------
10: kd> lmvm nt
Browse full module list
start end module name
fffff807`54000000 fffff807`55046000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\2FF0D7221046000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 2FF0D722 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5D116
ImageSize: 01046000
File version: 10.0.19041.2006
Product version: 10.0.19041.2006
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.2006
FileVersion: 10.0.19041.2006 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved. Hiandthanksforreachingout.MynameisBernardaWindowsfanlikeyou.I'llbehappytohelpyououttoday.Iunderstandtheissueyouhave,nothingtoworryIamheretohelp,andjusttoconfirmcanyoustillusetheaffecteddevice?ifso,weneedtoanalyzetheerror,canyoupleasecheckifyouhaveminidumpfilesonthePCsothatwecanfurtherexaminewhatistherootcauseoftheissue?PressWindowskey+E(Toopenfileexplorer)Click"ThisPC">thenfollowthefilepath:C:\Windows\MinidumpCopytheMinidumpfilesandsavethemtoanotherlocationlikeDesktoporDocuments.ThenpleaseuploadittoCloudstorageandpleasesharetheshareablelinkhere.LetmeknowhowitgoesandIhopethathelps.BernardIndependentAdvisor此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
链接:https://pan.baidu.com/s/1CDLktSjpsL3cCYAavSLK3A?pwd=shfg提取码:shfg复制这段内容后打开百度网盘手机App,操作更方便哦此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
Hi,thanksforreplying,Icannotaccessthefile,canyoutrytouploaditfromhere:https://onedrive.live.com/此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
https://1drv.ms/u/s!Ap98oWm0kleqizNJeGEd_JYpOwyV?e=ij4DXB此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
Hi,thanksforthedetailedreply,uponanalyzingtheDMPfiles,andtheerrorntkrnlmp.exe,thisisusuallycausedbyDamagedpowercordsandadaptersanddriversandsoftwareupdates,tofixthisissuekindlyrefertothestepsprovidedonthislink:https://www.lifewire.com/fix-the-ntkrnlmp-exe-e.Note:Thisisanon-Microsoftwebsite.Thepageappearstobeprovidingaccurate,safeinformation.WatchoutforadsonthesitethatmayadvertiseproductsfrequentlyclassifiedasaPUP(PotentiallyUnwantedProducts).Thoroughlyresearchanyproductadvertisedonthesitebeforeyoudecidetodownloadandinstallit.此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。