Advertisement
Proudyy

extracted hexdump 1

Dec 5th, 2024 (edited)
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
VIM 10.80 KB | None | 0 0
  1. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  2.    ExtensionRepository : Implicit
  3.    UseExperimentalFeatureForNugetShare : true
  4.    AllowNugetExeUpdate : true
  5.    NonInteractiveNuget : true
  6.    AllowNugetMSCredentialProviderInstall : true
  7.    AllowParallelInitializationOfLocalRepositories : true
  8.    EnableRedirectToChakraJsProvider : false
  9.  
  10.    -- Configuring repositories
  11.       ----> Repository : LocalInstalled, Enabled: true
  12.       ----> Repository : UserExtensions, Enabled: true
  13.  
  14. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  15.  
  16. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  17.  
  18. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.141 seconds
  19.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  20.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
  21.  
  22. Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
  23. Copyright (c) Microsoft Corporation. All rights reserved.
  24.  
  25.  
  26. Loading Dump File [C:\Windows\Minidump\110824-19140-01.dmp]
  27. Mini Kernel Dump File: Only registers and stack trace are available
  28.  
  29.  
  30. ************* Path validation summary **************
  31. Response                         Time (ms)     Location
  32. Deferred                                       srv*
  33. Symbol search path is: srv*
  34. Executable search path is:
  35. Windows 10 Kernel Version 26100 MP (16 procs) Free x64
  36. Product: WinNt, suite: TerminalServer SingleUserTS
  37. Kernel base = 0xfffff805`add50000 PsLoadedModuleList = 0xfffff805`aec44750
  38. Debug session time: Fri Nov  8 21:29:56.900 2024 (UTC + 1:00)
  39. System Uptime: 0 days 0:00:07.800
  40. Loading Kernel Symbols
  41. ...............................................................
  42. ...................
  43. Loading User Symbols
  44.  
  45. Loading unloaded module list
  46. ...
  47. For analysis of this file, run !analyze -v
  48. nt!DebugPrompt+0x17:
  49. fffff805`ae2095e7 cc              int     3
  50. 0: kd> !analyze -v
  51. *******************************************************************************
  52. *                                                                             *
  53. *                        Bugcheck Analysis                                    *
  54. *                                                                             *
  55. *******************************************************************************
  56.  
  57. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
  58. This is a very common BugCheck.  Usually the exception address pinpoints
  59. the driver/function that caused the problem.  Always note this address
  60. as well as the link date of the driver/image that contains this address.
  61. Arguments:
  62. Arg1: ffffffff80000003, The exception code that was not handled
  63. Arg2: fffff805ae2095e8, The address that the exception occurred at
  64. Arg3: ffffb307bce06418, Exception Record Address
  65. Arg4: ffffb307bce05c00, Context Record Address
  66.  
  67. Debugging Details:
  68. ------------------
  69.  
  70.  
  71. KEY_VALUES_STRING: 1
  72.  
  73.     Key  : Analysis.CPU.mSec
  74.     Value: 1078
  75.  
  76.     Key  : Analysis.Elapsed.mSec
  77.     Value: 36439
  78.  
  79.     Key  : Analysis.IO.Other.Mb
  80.     Value: 14
  81.  
  82.     Key  : Analysis.IO.Read.Mb
  83.     Value: 1
  84.  
  85.     Key  : Analysis.IO.Write.Mb
  86.     Value: 24
  87.  
  88.     Key  : Analysis.Init.CPU.mSec
  89.     Value: 421
  90.  
  91.     Key  : Analysis.Init.Elapsed.mSec
  92.     Value: 351633
  93.  
  94.     Key  : Analysis.Memory.CommitPeak.Mb
  95.     Value: 94
  96.  
  97.     Key  : Analysis.Version.DbgEng
  98.     Value: 10.0.27725.1000
  99.  
  100.     Key  : Analysis.Version.Description
  101.     Value: 10.2408.27.01 amd64fre
  102.  
  103.     Key  : Analysis.Version.Ext
  104.     Value: 1.2408.27.1
  105.  
  106.     Key  : Bugcheck.Code.LegacyAPI
  107.     Value: 0x1000007e
  108.  
  109.     Key  : Bugcheck.Code.TargetModel
  110.     Value: 0x1000007e
  111.  
  112.     Key  : Dump.Attributes.AsUlong
  113.     Value: 21808
  114.  
  115.     Key  : Dump.Attributes.DiagDataWrittenToHeader
  116.     Value: 1
  117.  
  118.     Key  : Dump.Attributes.ErrorCode
  119.     Value: 0
  120.  
  121.     Key  : Dump.Attributes.KernelGeneratedTriageDump
  122.     Value: 1
  123.  
  124.     Key  : Dump.Attributes.LastLine
  125.     Value: Dump completed successfully.
  126.  
  127.     Key  : Dump.Attributes.ProgressPercentage
  128.     Value: 0
  129.  
  130.     Key  : Failure.Bucket
  131.     Value: 0x7E_80000003_vgk!unknown_function
  132.  
  133.     Key  : Failure.Hash
  134.     Value: {3110227d-dd4c-39b8-70a5-f054f10d0928}
  135.  
  136.     Key  : Hypervisor.Enlightenments.ValueHex
  137.     Value: 7497cf94
  138.  
  139.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  140.     Value: 1
  141.  
  142.     Key  : Hypervisor.Flags.ApicEnlightened
  143.     Value: 1
  144.  
  145.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  146.     Value: 0
  147.  
  148.     Key  : Hypervisor.Flags.AsyncMemoryHint
  149.     Value: 0
  150.  
  151.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  152.     Value: 0
  153.  
  154.     Key  : Hypervisor.Flags.CpuManager
  155.     Value: 1
  156.  
  157.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  158.     Value: 0
  159.  
  160.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  161.     Value: 1
  162.  
  163.     Key  : Hypervisor.Flags.Epf
  164.     Value: 0
  165.  
  166.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  167.     Value: 1
  168.  
  169.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  170.     Value: 1
  171.  
  172.     Key  : Hypervisor.Flags.MaxBankNumber
  173.     Value: 0
  174.  
  175.     Key  : Hypervisor.Flags.MemoryZeroingControl
  176.     Value: 0
  177.  
  178.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  179.     Value: 0
  180.  
  181.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  182.     Value: 1
  183.  
  184.     Key  : Hypervisor.Flags.Phase0InitDone
  185.     Value: 1
  186.  
  187.     Key  : Hypervisor.Flags.PowerSchedulerQos
  188.     Value: 0
  189.  
  190.     Key  : Hypervisor.Flags.RootScheduler
  191.     Value: 0
  192.  
  193.     Key  : Hypervisor.Flags.SynicAvailable
  194.     Value: 1
  195.  
  196.     Key  : Hypervisor.Flags.UseQpcBias
  197.     Value: 0
  198.  
  199.     Key  : Hypervisor.Flags.Value
  200.     Value: 38408431
  201.  
  202.     Key  : Hypervisor.Flags.ValueHex
  203.     Value: 24a10ef
  204.  
  205.     Key  : Hypervisor.Flags.VpAssistPage
  206.     Value: 1
  207.  
  208.     Key  : Hypervisor.Flags.VsmAvailable
  209.     Value: 1
  210.  
  211.     Key  : Hypervisor.RootFlags.AccessStats
  212.     Value: 1
  213.  
  214.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  215.     Value: 1
  216.  
  217.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  218.     Value: 1
  219.  
  220.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  221.     Value: 0
  222.  
  223.     Key  : Hypervisor.RootFlags.HostTimelineSync
  224.     Value: 1
  225.  
  226.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  227.     Value: 0
  228.  
  229.     Key  : Hypervisor.RootFlags.IsHyperV
  230.     Value: 1
  231.  
  232.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  233.     Value: 1
  234.  
  235.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  236.     Value: 1
  237.  
  238.     Key  : Hypervisor.RootFlags.MceEnlightened
  239.     Value: 1
  240.  
  241.     Key  : Hypervisor.RootFlags.Nested
  242.     Value: 0
  243.  
  244.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  245.     Value: 1
  246.  
  247.     Key  : Hypervisor.RootFlags.Value
  248.     Value: 1015
  249.  
  250.     Key  : Hypervisor.RootFlags.ValueHex
  251.     Value: 3f7
  252.  
  253.  
  254. BUGCHECK_CODE:  7e
  255.  
  256. BUGCHECK_P1: ffffffff80000003
  257.  
  258. BUGCHECK_P2: fffff805ae2095e8
  259.  
  260. BUGCHECK_P3: ffffb307bce06418
  261.  
  262. BUGCHECK_P4: ffffb307bce05c00
  263.  
  264. FILE_IN_CAB:  110824-19140-01.dmp
  265.  
  266. TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
  267.  
  268.  
  269. DUMP_FILE_ATTRIBUTES: 0x21808
  270.   Kernel Generated Triage Dump
  271.  
  272. FAULTING_THREAD:  ffffc90bcb5bc080
  273.  
  274. EXCEPTION_RECORD:  ffffb307bce06418 -- (.exr 0xffffb307bce06418)
  275. ExceptionAddress: fffff805ae2095e8 (nt!DebugPromptAfterInt3)
  276.    ExceptionCode: 80000003 (Break instruction exception)
  277.   ExceptionFlags: 00000000
  278. NumberParameters: 1
  279.    Parameter[0]: 0000000000000002
  280.  
  281. CONTEXT:  ffffb307bce05c00 -- (.cxr 0xffffb307bce05c00)
  282. rax=0000000000000002 rbx=fffff8053f7f0938 rcx=fffff8053f7ecfc0
  283. rdx=ffffb307bce00031 rsi=0000000000000080 rdi=fffff8027a6623c3
  284. rip=fffff805ae2095e7 rsp=ffffb307bce06658 rbp=0000000000002000
  285.  r8=ffffb307bce06740  r9=0000000000000002 r10=fffff805ae2f3ce0
  286. r11=0000000000000000 r12=0000000000000056 r13=0000000000000000
  287. r14=ffffc90bcb48ef40 r15=00000000656e6f4e
  288. iopl=0         nv up ei pl zr na po nc
  289. cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00040246
  290. nt!DebugPrompt+0x17:
  291. fffff805`ae2095e7 cc              int     3
  292. Resetting default scope
  293.  
  294. BLACKBOXNTFS: 1 (!blackboxntfs)
  295.  
  296.  
  297. CUSTOMER_CRASH_COUNT:  1
  298.  
  299. PROCESS_NAME:  System
  300.  
  301. ERROR_CODE: (NTSTATUS) 0x80000003 - {AUSNAHME}  Haltepunkt  Im Quellprogramm wurde ein Haltepunkt erreicht.
  302.  
  303. EXCEPTION_CODE_STR:  80000003
  304.  
  305. EXCEPTION_PARAMETER1:  0000000000000002
  306.  
  307. EXCEPTION_STR:  0x80000003
  308.  
  309. STACK_TEXT:  
  310. ffffb307`bce06658 fffff805`ae2f3d24     : fffff805`3f7f0938 00000000`00002000 00000000`00000080 fffff802`7a6623c3 : nt!DebugPrompt+0x17
  311. ffffb307`bce06660 fffff805`3f7d75aa     : fffff805`3f7ecf98 ffffb307`bce06718 00000000`00000000 ffffb307`bce066f0 : nt!DbgPrompt+0x44
  312. ffffb307`bce066b0 fffff805`3f7d723a     : 00000000`35520000 00000000`00000080 fffff805`3f7f0938 00000000`656e6f4e : VerifierExt!HvciReportIssueWithOptions+0x96
  313. ffffb307`bce06740 fffff805`3f7d76e3     : ffffc90b`cb56ae00 ffffb307`bce06841 00000000`00000000 d0197107`59e5cac8 : VerifierExt!HvciCheckPoolType+0x6a
  314. ffffb307`bce06780 fffff805`ae32d9f8     : fffff802`7a6623c3 00000000`00000000 2ec60ce8`001a1404 01200000`00000000 : VerifierExt!Hvci_ExAllocatePool2_Entry+0x13
  315. ffffb307`bce067b0 fffff805`ae8a26a1     : 00000000`00000080 00000000`00000000 00000000`00000000 00000000`656e6f4e : nt!DifExAllocatePoolWithTagWrapper+0xe8
  316. ffffb307`bce06880 fffff802`7a6623c3     : ffffc90b`d59c1e20 ffffb307`bce06c70 ffffc90b`d52f9500 ffffb307`bce06c70 : nt!VerifierExAllocatePoolWithTag+0xf1
  317. ffffb307`bce068e0 ffffc90b`d59c1e20     : ffffb307`bce06c70 ffffc90b`d52f9500 ffffb307`bce06c70 ffffb307`bce06f10 : vgk+0xa23c3
  318. ffffb307`bce068e8 ffffb307`bce06c70     : ffffc90b`d52f9500 ffffb307`bce06c70 ffffb307`bce06f10 fffff802`7a70d292 : 0xffffc90b`d59c1e20
  319. ffffb307`bce068f0 ffffc90b`d52f9500     : ffffb307`bce06c70 ffffb307`bce06f10 fffff802`7a70d292 ffffc90b`d59c1e20 : 0xffffb307`bce06c70
  320. ffffb307`bce068f8 ffffb307`bce06c70     : ffffb307`bce06f10 fffff802`7a70d292 ffffc90b`d59c1e20 fffff805`ae032602 : 0xffffc90b`d52f9500
  321. ffffb307`bce06900 ffffb307`bce06f10     : fffff802`7a70d292 ffffc90b`d59c1e20 fffff805`ae032602 fffff805`ae34aa6d : 0xffffb307`bce06c70
  322. ffffb307`bce06908 fffff802`7a70d292     : ffffc90b`d59c1e20 fffff805`ae032602 fffff805`ae34aa6d fffff802`7a704e9f : 0xffffb307`bce06f10
  323. ffffb307`bce06910 ffffc90b`d59c1e20     : fffff805`ae032602 fffff805`ae34aa6d fffff802`7a704e9f ffffb307`bce06bf0 : vgk+0x14d292
  324. ffffb307`bce06918 fffff805`ae032602     : fffff805`ae34aa6d fffff802`7a704e9f ffffb307`bce06bf0 ffffb307`bce06c48 : 0xffffc90b`d59c1e20
  325. ffffb307`bce06920 00000000`00000000     : ffffb307`bce06ca0 00000000`00000000 00000000`00040282 ffffffff`ffffffff : nt!ExAcquireSpinLockSharedAtDpcLevel+0x12
  326.  
  327.  
  328. SYMBOL_NAME:  vgk+a23c3
  329.  
  330. MODULE_NAME: vgk
  331.  
  332. IMAGE_NAME:  vgk.sys
  333.  
  334. STACK_COMMAND:  .cxr 0xffffb307bce05c00 ; kb
  335.  
  336. BUCKET_ID_FUNC_OFFSET:  a23c3
  337.  
  338. FAILURE_BUCKET_ID:  0x7E_80000003_vgk!unknown_function
  339.  
  340. OSPLATFORM_TYPE:  x64
  341.  
  342. OSNAME:  Windows 10
  343.  
  344. FAILURE_ID_HASH:  {3110227d-dd4c-39b8-70a5-f054f10d0928}
  345.  
  346. Followup:     MachineOwner
  347. ---------
Tags: Hexdump
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement