Guten Abend.
Ich bekomme in letzter Zeit häufig Bluesreens beim "booten" des Rechners.
Dabei werden zB Programme gelöscht die ich als letztes Installiert hatte.
Ich hoffe das die Information erst mal reicht. Ich kann nämlich daraus garnichts entnehmen.
Ich habe mit windows Debugging Tool die dmp datei ausgewertet:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\020811-12854-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c51000 PsLoadedModuleList = 0x82d99810
Debug session time: Tue Feb 8 21:48:16.053 2011 (UTC + 1:00)
System Uptime: 0 days 0:00:06.427
Loading Kernel Symbols
...............................................................
.........................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82e73123, 80786890, 80786470}
Probably caused by : ntkrpamp.exe ( nt!ObpLookupDirectoryEntry+2b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82e73123, The address that the exception occurred at
Arg3: 80786890, Exception Record Address
Arg4: 80786470, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
EXCEPTION_RECORD: 80786890 -- (.exr 0xffffffff80786890)
ExceptionAddress: 82e73123 (nt!ObpLookupDirectoryEntry+0x0000002b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00009b30
Attempt to read from address 00009b30
CONTEXT: 80786470 -- (.cxr 0xffffffff80786470)
eax=80786900 ebx=00000000 ecx=8710cc5c edx=00009b30 esi=80786990 edi=00000007
eip=82e73123 esp=80786958 ebp=80786968 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210202
nt!ObpLookupDirectoryEntry+0x2b:
82e73123 0fb702 movzx eax,word ptr [edx] ds:0023:00009b30=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00009b30
READ_ADDRESS: GetPointerFromAddress: unable to read from 82db9718
Unable to read MiSystemVaType memory at 82d99160
00009b30
FOLLOWUP_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 82e73001 to 82e73123
STACK_TEXT:
80786968 82e73001 8d0645d8 8710cc5c 00000000 nt!ObpLookupDirectoryEntry+0x2b
807869a4 82e5a052 8710cc70 8711c000 8710cc80 nt!ObpDeleteNameCheck+0xfb
807869bc 82df4874 8710cc80 00000000 8702b784 nt!ObMakeTemporaryObject+0x93
80786b9c 83002853 00000001 00000000 80786bd4 nt!IopLoadDriver+0x921
80786be8 82ffe87b 8080fcb0 8080a8a0 00000000 nt!IopInitializeSystemDrivers+0x163
80786c6c 83003e78 0080a8a0 85d0c980 85d6f020 nt!IoInitSystem+0x6de
80786d48 82ddc494 80786d90 82e5f6d3 8080a8a0 nt!Phase1InitializationDiscard+0xced
80786d50 82e5f6d3 8080a8a0 b8b65138 00000000 nt!Phase1Initialization+0xd
80786d90 82d110f9 82ddc487 8080a8a0 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpLookupDirectoryEntry+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
STACK_COMMAND: .cxr 0xffffffff80786470 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82e73123, The address that the exception occurred at
Arg3: 80786890, Exception Record Address
Arg4: 80786470, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
EXCEPTION_RECORD: 80786890 -- (.exr 0xffffffff80786890)
ExceptionAddress: 82e73123 (nt!ObpLookupDirectoryEntry+0x0000002b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00009b30
Attempt to read from address 00009b30
CONTEXT: 80786470 -- (.cxr 0xffffffff80786470)
eax=80786900 ebx=00000000 ecx=8710cc5c edx=00009b30 esi=80786990 edi=00000007
eip=82e73123 esp=80786958 ebp=80786968 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210202
nt!ObpLookupDirectoryEntry+0x2b:
82e73123 0fb702 movzx eax,word ptr [edx] ds:0023:00009b30=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00009b30
READ_ADDRESS: GetPointerFromAddress: unable to read from 82db9718
Unable to read MiSystemVaType memory at 82d99160
00009b30
FOLLOWUP_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 82e73001 to 82e73123
STACK_TEXT:
80786968 82e73001 8d0645d8 8710cc5c 00000000 nt!ObpLookupDirectoryEntry+0x2b
807869a4 82e5a052 8710cc70 8711c000 8710cc80 nt!ObpDeleteNameCheck+0xfb
807869bc 82df4874 8710cc80 00000000 8702b784 nt!ObMakeTemporaryObject+0x93
80786b9c 83002853 00000001 00000000 80786bd4 nt!IopLoadDriver+0x921
80786be8 82ffe87b 8080fcb0 8080a8a0 00000000 nt!IopInitializeSystemDrivers+0x163
80786c6c 83003e78 0080a8a0 85d0c980 85d6f020 nt!IoInitSystem+0x6de
80786d48 82ddc494 80786d90 82e5f6d3 8080a8a0 nt!Phase1InitializationDiscard+0xced
80786d50 82e5f6d3 8080a8a0 b8b65138 00000000 nt!Phase1Initialization+0xd
80786d90 82d110f9 82ddc487 8080a8a0 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpLookupDirectoryEntry+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
STACK_COMMAND: .cxr 0xffffffff80786470 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
Followup: MachineOwner
---------
0: kd> lmvm nt
start end module name
82c51000 83061000 nt (pdb symbols) c:\symbols\ntkrpamp.pdb\BF17F0A967FD4E7BBA4EB341B6C87CCB2\ntkrpamp.pdb
Loaded symbol image file: ntkrpamp.exe
Mapped memory image file: c:\symbols\ntkrnlpa.exe\4C1C3FAC410000\ntkrnlpa.exe
Image path: ntkrpamp.exe
Image name: ntkrpamp.exe
Timestamp: Sat Jun 19 05:55:24 2010 (4C1C3FAC)
CheckSum: 003CBBE7
ImageSize: 00410000
File version: 6.1.7600.16617
Product version: 6.1.7600.16617
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrpamp.exe
OriginalFilename: ntkrpamp.exe
ProductVersion: 6.1.7600.16617
FileVersion: 6.1.7600.16617 (win7_gdr.100618-1621)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
Ich bekomme in letzter Zeit häufig Bluesreens beim "booten" des Rechners.
Dabei werden zB Programme gelöscht die ich als letztes Installiert hatte.
Ich hoffe das die Information erst mal reicht. Ich kann nämlich daraus garnichts entnehmen.
Ich habe mit windows Debugging Tool die dmp datei ausgewertet:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\020811-12854-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c51000 PsLoadedModuleList = 0x82d99810
Debug session time: Tue Feb 8 21:48:16.053 2011 (UTC + 1:00)
System Uptime: 0 days 0:00:06.427
Loading Kernel Symbols
...............................................................
.........................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82e73123, 80786890, 80786470}
Probably caused by : ntkrpamp.exe ( nt!ObpLookupDirectoryEntry+2b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82e73123, The address that the exception occurred at
Arg3: 80786890, Exception Record Address
Arg4: 80786470, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
EXCEPTION_RECORD: 80786890 -- (.exr 0xffffffff80786890)
ExceptionAddress: 82e73123 (nt!ObpLookupDirectoryEntry+0x0000002b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00009b30
Attempt to read from address 00009b30
CONTEXT: 80786470 -- (.cxr 0xffffffff80786470)
eax=80786900 ebx=00000000 ecx=8710cc5c edx=00009b30 esi=80786990 edi=00000007
eip=82e73123 esp=80786958 ebp=80786968 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210202
nt!ObpLookupDirectoryEntry+0x2b:
82e73123 0fb702 movzx eax,word ptr [edx] ds:0023:00009b30=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00009b30
READ_ADDRESS: GetPointerFromAddress: unable to read from 82db9718
Unable to read MiSystemVaType memory at 82d99160
00009b30
FOLLOWUP_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 82e73001 to 82e73123
STACK_TEXT:
80786968 82e73001 8d0645d8 8710cc5c 00000000 nt!ObpLookupDirectoryEntry+0x2b
807869a4 82e5a052 8710cc70 8711c000 8710cc80 nt!ObpDeleteNameCheck+0xfb
807869bc 82df4874 8710cc80 00000000 8702b784 nt!ObMakeTemporaryObject+0x93
80786b9c 83002853 00000001 00000000 80786bd4 nt!IopLoadDriver+0x921
80786be8 82ffe87b 8080fcb0 8080a8a0 00000000 nt!IopInitializeSystemDrivers+0x163
80786c6c 83003e78 0080a8a0 85d0c980 85d6f020 nt!IoInitSystem+0x6de
80786d48 82ddc494 80786d90 82e5f6d3 8080a8a0 nt!Phase1InitializationDiscard+0xced
80786d50 82e5f6d3 8080a8a0 b8b65138 00000000 nt!Phase1Initialization+0xd
80786d90 82d110f9 82ddc487 8080a8a0 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpLookupDirectoryEntry+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
STACK_COMMAND: .cxr 0xffffffff80786470 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82e73123, The address that the exception occurred at
Arg3: 80786890, Exception Record Address
Arg4: 80786470, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
EXCEPTION_RECORD: 80786890 -- (.exr 0xffffffff80786890)
ExceptionAddress: 82e73123 (nt!ObpLookupDirectoryEntry+0x0000002b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00009b30
Attempt to read from address 00009b30
CONTEXT: 80786470 -- (.cxr 0xffffffff80786470)
eax=80786900 ebx=00000000 ecx=8710cc5c edx=00009b30 esi=80786990 edi=00000007
eip=82e73123 esp=80786958 ebp=80786968 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210202
nt!ObpLookupDirectoryEntry+0x2b:
82e73123 0fb702 movzx eax,word ptr [edx] ds:0023:00009b30=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00009b30
READ_ADDRESS: GetPointerFromAddress: unable to read from 82db9718
Unable to read MiSystemVaType memory at 82d99160
00009b30
FOLLOWUP_IP:
nt!ObpLookupDirectoryEntry+2b
82e73123 0fb702 movzx eax,word ptr [edx]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 82e73001 to 82e73123
STACK_TEXT:
80786968 82e73001 8d0645d8 8710cc5c 00000000 nt!ObpLookupDirectoryEntry+0x2b
807869a4 82e5a052 8710cc70 8711c000 8710cc80 nt!ObpDeleteNameCheck+0xfb
807869bc 82df4874 8710cc80 00000000 8702b784 nt!ObMakeTemporaryObject+0x93
80786b9c 83002853 00000001 00000000 80786bd4 nt!IopLoadDriver+0x921
80786be8 82ffe87b 8080fcb0 8080a8a0 00000000 nt!IopInitializeSystemDrivers+0x163
80786c6c 83003e78 0080a8a0 85d0c980 85d6f020 nt!IoInitSystem+0x6de
80786d48 82ddc494 80786d90 82e5f6d3 8080a8a0 nt!Phase1InitializationDiscard+0xced
80786d50 82e5f6d3 8080a8a0 b8b65138 00000000 nt!Phase1Initialization+0xd
80786d90 82d110f9 82ddc487 8080a8a0 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpLookupDirectoryEntry+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
STACK_COMMAND: .cxr 0xffffffff80786470 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
BUCKET_ID: 0x7E_nt!ObpLookupDirectoryEntry+2b
Followup: MachineOwner
---------
0: kd> lmvm nt
start end module name
82c51000 83061000 nt (pdb symbols) c:\symbols\ntkrpamp.pdb\BF17F0A967FD4E7BBA4EB341B6C87CCB2\ntkrpamp.pdb
Loaded symbol image file: ntkrpamp.exe
Mapped memory image file: c:\symbols\ntkrnlpa.exe\4C1C3FAC410000\ntkrnlpa.exe
Image path: ntkrpamp.exe
Image name: ntkrpamp.exe
Timestamp: Sat Jun 19 05:55:24 2010 (4C1C3FAC)
CheckSum: 003CBBE7
ImageSize: 00410000
File version: 6.1.7600.16617
Product version: 6.1.7600.16617
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrpamp.exe
OriginalFilename: ntkrpamp.exe
ProductVersion: 6.1.7600.16617
FileVersion: 6.1.7600.16617 (win7_gdr.100618-1621)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.


