Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\092222-11031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff807`54000000 PsLoadedModuleList = 0xfffff807`54c2a290
Debug session time: Thu Sep 22 21:57:14.088 2022 (UTC + 8:00)
System Uptime: 0 days 0:33:43.772
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`543f8fa0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffa86`264f2120=000000000000000a
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2155

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14547

    Key  : Analysis.Init.CPU.mSec
    Value: 905

    Key  : Analysis.Init.Elapsed.mSec
    Value: 817911

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092222-11031-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 28f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807542f6330

READ_ADDRESS: fffff80754cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 000000000000028f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
 r8=ffffffffffffff80  r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c          cmp     ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope

STACK_TEXT: 
fffffa86`264f2118 fffff807`5440af69     : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269     : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330     : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000     : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170


SYMBOL_NAME:  nt!RtlpHpSegPageRangeShrink+170

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  170

FAILURE_BUCKET_ID:  AV_nt!RtlpHpSegPageRangeShrink

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68a44547-f035-1581-b1c7-d81166d1cc9a}

Followup:     MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1718

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1717

    Key  : Analysis.Init.CPU.mSec
    Value: 5077

    Key  : Analysis.Init.Elapsed.mSec
    Value: 834507

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092222-11031-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 28f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807542f6330

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 000000000000028f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
 r8=ffffffffffffff80  r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c          cmp     ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope

STACK_TEXT: 
fffffa86`264f2118 fffff807`5440af69     : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269     : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330     : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000     : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170


SYMBOL_NAME:  nt!RtlpHpSegPageRangeShrink+170

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  170

FAILURE_BUCKET_ID:  AV_nt!RtlpHpSegPageRangeShrink

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68a44547-f035-1581-b1c7-d81166d1cc9a}

Followup:     MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1734

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1727

    Key  : Analysis.Init.CPU.mSec
    Value: 7562

    Key  : Analysis.Init.Elapsed.mSec
    Value: 836998

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092222-11031-01.dmp<365>
DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 28f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807542f6330

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 000000000000028f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
 r8=ffffffffffffff80  r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c          cmp     ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope

STACK_TEXT: 
fffffa86`264f2118 fffff807`5440af69     : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269     : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330     : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000     : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170


SYMBOL_NAME:  nt!RtlpHpSegPageRangeShrink+170

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  170

FAILURE_BUCKET_ID:  AV_nt!RtlpHpSegPageRangeShrink

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68a44547-f035-1581-b1c7-d81166d1cc9a}

Followup:     MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1718

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1719

    Key  : Analysis.Init.CPU.mSec
    Value: 10078

    Key  : Analysis.Init.Elapsed.mSec
    Value: 839506

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092222-11031-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 28f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807542f6330

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 000000000000028f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
 r8=ffffffffffffff80  r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c          cmp     ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope

STACK_TEXT: 
fffffa86`264f2118 fffff807`5440af69     : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269     : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330     : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000     : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170


SYMBOL_NAME:  nt!RtlpHpSegPageRangeShrink+170

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  170

FAILURE_BUCKET_ID:  AV_nt!RtlpHpSegPageRangeShrink

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68a44547-f035-1581-b1c7-d81166d1cc9a}

Followup:     MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000028f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807542f6330, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1718

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1726

    Key  : Analysis.Init.CPU.mSec
    Value: 12561

    Key  : Analysis.Init.Elapsed.mSec
    Value: 853898

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092222-11031-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 28f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807542f6330

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 000000000000028f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffffa86264f2260 -- (.trap 0xfffffa86264f2260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000273 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000273 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807542f6330 rsp=fffffa86264f23f0 rbp=000000000000017c
 r8=ffffffffffffff80  r9=0000000000000001 r10=ffffd38279cfe000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpSegPageRangeShrink+0x170:
fffff807`542f6330 3b4a1c          cmp     ecx,dword ptr [rdx+1Ch] ds:00000000`0000028f=????????
Resetting default scope

STACK_TEXT: 
fffffa86`264f2118 fffff807`5440af69     : 00000000`0000000a 00000000`0000028f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa86`264f2120 fffff807`54407269     : fffffa86`264f2320 00000000`00000000 00000000`00000000 17aafea6`0033e52a : nt!KiBugCheckDispatch+0x69
fffffa86`264f2260 fffff807`542f6330     : 00000000`00000000 00000000`00000000 ffffd382`61c02000 00000000`00000200 : nt!KiPageFault+0x469
fffffa86`264f23f0 00000000`00000000     : 00000000`00000001 fffff807`542f62ab ffffffff`ffffffff 00000000`00000001 : nt!RtlpHpSegPageRangeShrink+0x170


SYMBOL_NAME:  nt!RtlpHpSegPageRangeShrink+170

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  170

FAILURE_BUCKET_ID:  AV_nt!RtlpHpSegPageRangeShrink

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68a44547-f035-1581-b1c7-d81166d1cc9a}

Followup:     MachineOwner
---------

10: kd> lmvm nt
Browse full module list
start             end                 module name
fffff807`54000000 fffff807`55046000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\2FF0D7221046000\ntkrnlmp.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        2FF0D722 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A5D116
    ImageSize:        01046000
    File version:     10.0.19041.2006
    Product version:  10.0.19041.2006
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.19041.2006
        FileVersion:      10.0.19041.2006 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.      Hiandthanksforreachingout.MynameisBernardaWindowsfanlikeyou.I'llbehappytohelpyououttoday.Iunderstandtheissueyouhave,nothingtoworryIamheretohelp,andjusttoconfirmcanyoustillusetheaffecteddevice?ifso,weneedtoanalyzetheerror,canyoupleasecheckifyouhaveminidumpfilesonthePCsothatwecanfurtherexaminewhatistherootcauseoftheissue?PressWindowskey+E(Toopenfileexplorer)Click"ThisPC">thenfollowthefilepath:C:\Windows\MinidumpCopytheMinidumpfilesandsavethemtoanotherlocationlikeDesktoporDocuments.ThenpleaseuploadittoCloudstorageandpleasesharetheshareablelinkhere.LetmeknowhowitgoesandIhopethathelps.BernardIndependentAdvisor此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        链接:https://pan.baidu.com/s/1CDLktSjpsL3cCYAavSLK3A?pwd=shfg提取码:shfg复制这段内容后打开百度网盘手机App,操作更方便哦此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        Hi,thanksforreplying,Icannotaccessthefile,canyoutrytouploaditfromhere:https://onedrive.live.com/此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        https://1drv.ms/u/s!Ap98oWm0kleqizNJeGEd_JYpOwyV?e=ij4DXB此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        Hi,thanksforthedetailedreply,uponanalyzingtheDMPfiles,andtheerrorntkrnlmp.exe,thisisusuallycausedbyDamagedpowercordsandadaptersanddriversandsoftwareupdates,tofixthisissuekindlyrefertothestepsprovidedonthislink:https://www.lifewire.com/fix-the-ntkrnlmp-exe-e.Note:Thisisanon-Microsoftwebsite.Thepageappearstobeprovidingaccurate,safeinformation.WatchoutforadsonthesitethatmayadvertiseproductsfrequentlyclassifiedasaPUP(PotentiallyUnwantedProducts).Thoroughlyresearchanyproductadvertisedonthesitebeforeyoudecidetodownloadandinstallit.此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。

点赞(56) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部