wolf78989

Untitled

Feb 20th, 2025
26
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.51 KB | Help | 0 0
  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3. ExtensionRepository : Implicit
  4. UseExperimentalFeatureForNugetShare : true
  5. AllowNugetExeUpdate : true
  6. NonInteractiveNuget : true
  7. AllowNugetMSCredentialProviderInstall : true
  8. AllowParallelInitializationOfLocalRepositories : true
  9. EnableRedirectToChakraJsProvider : false
  10.  
  11. -- Configuring repositories
  12. ----> Repository : LocalInstalled, Enabled: true
  13. ----> Repository : UserExtensions, Enabled: true
  14.  
  15. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  16.  
  17. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  18.  
  19. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
  20. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  21. ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
  22.  
  23. Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
  24. Copyright (c) Microsoft Corporation. All rights reserved.
  25.  
  26.  
  27. Loading Dump File [C:\Windows\Minidump\021325-8968-01.dmp]
  28. Mini Kernel Dump File: Only registers and stack trace are available
  29.  
  30.  
  31. ************* Path validation summary **************
  32. Response Time (ms) Location
  33. Deferred srv*
  34. Symbol search path is: srv*
  35. Executable search path is:
  36. Windows 10 Kernel Version 26100 MP (20 procs) Free x64
  37. Product: WinNt, suite: TerminalServer SingleUserTS
  38. Kernel base = 0xfffff802`90c00000 PsLoadedModuleList = 0xfffff802`91af4850
  39. Debug session time: Thu Feb 13 14:26:49.850 2025 (UTC - 5:00)
  40. System Uptime: 64 days 19:19:32.843
  41. Loading Kernel Symbols
  42. ...............................................................
  43. ................................................................
  44. ................................................................
  45. ................................................................
  46. .....
  47. Loading User Symbols
  48. PEB is paged out (Peb.Ldr = 00000026`37b23018). Type ".hh dbgerr001" for details
  49. Loading unloaded module list
  50. ..................................................
  51. For analysis of this file, run !analyze -v
  52. nt!KeBugCheckEx:
  53. fffff802`910b85d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8200`832f6b20=000000000000000a
  54. 7: kd> !analyze -v
  55. *******************************************************************************
  56. * *
  57. * Bugcheck Analysis *
  58. * *
  59. *******************************************************************************
  60.  
  61. IRQL_NOT_LESS_OR_EQUAL (a)
  62. An attempt was made to access a pageable (or completely invalid) address at an
  63. interrupt request level (IRQL) that is too high. This is usually
  64. caused by drivers using improper addresses.
  65. If a kernel debugger is available get the stack backtrace.
  66. Arguments:
  67. Arg1: fffff80297c94083, memory referenced
  68. Arg2: 0000000000000002, IRQL
  69. Arg3: 0000000000000008, bitfield :
  70. bit 0 : value 0 = read operation, 1 = write operation
  71. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  72. Arg4: fffff80290f2dbc3, address which referenced memory
  73.  
  74. Debugging Details:
  75. ------------------
  76.  
  77.  
  78. KEY_VALUES_STRING: 1
  79.  
  80. Key : Analysis.CPU.mSec
  81. Value: 1437
  82.  
  83. Key : Analysis.Elapsed.mSec
  84. Value: 3222
  85.  
  86. Key : Analysis.IO.Other.Mb
  87. Value: 0
  88.  
  89. Key : Analysis.IO.Read.Mb
  90. Value: 1
  91.  
  92. Key : Analysis.IO.Write.Mb
  93. Value: 0
  94.  
  95. Key : Analysis.Init.CPU.mSec
  96. Value: 484
  97.  
  98. Key : Analysis.Init.Elapsed.mSec
  99. Value: 32869
  100.  
  101. Key : Analysis.Memory.CommitPeak.Mb
  102. Value: 88
  103.  
  104. Key : Analysis.Version.DbgEng
  105. Value: 10.0.27725.1000
  106.  
  107. Key : Analysis.Version.Description
  108. Value: 10.2408.27.01 amd64fre
  109.  
  110. Key : Analysis.Version.Ext
  111. Value: 1.2408.27.1
  112.  
  113. Key : Bugcheck.Code.LegacyAPI
  114. Value: 0xa
  115.  
  116. Key : Bugcheck.Code.TargetModel
  117. Value: 0xa
  118.  
  119. Key : Dump.Attributes.AsUlong
  120. Value: 21808
  121.  
  122. Key : Dump.Attributes.DiagDataWrittenToHeader
  123. Value: 1
  124.  
  125. Key : Dump.Attributes.ErrorCode
  126. Value: 0
  127.  
  128. Key : Dump.Attributes.KernelGeneratedTriageDump
  129. Value: 1
  130.  
  131. Key : Dump.Attributes.LastLine
  132. Value: Dump completed successfully.
  133.  
  134. Key : Dump.Attributes.ProgressPercentage
  135. Value: 0
  136.  
  137. Key : Failure.Bucket
  138. Value: AV_nt!KeQueryValuesThread
  139.  
  140. Key : Failure.Hash
  141. Value: {c895ca60-5a6a-dc6e-0d58-a13309871622}
  142.  
  143. Key : Hypervisor.Enlightenments.ValueHex
  144. Value: 7417df84
  145.  
  146. Key : Hypervisor.Flags.AnyHypervisorPresent
  147. Value: 1
  148.  
  149. Key : Hypervisor.Flags.ApicEnlightened
  150. Value: 0
  151.  
  152. Key : Hypervisor.Flags.ApicVirtualizationAvailable
  153. Value: 1
  154.  
  155. Key : Hypervisor.Flags.AsyncMemoryHint
  156. Value: 0
  157.  
  158. Key : Hypervisor.Flags.CoreSchedulerRequested
  159. Value: 0
  160.  
  161. Key : Hypervisor.Flags.CpuManager
  162. Value: 1
  163.  
  164. Key : Hypervisor.Flags.DeprecateAutoEoi
  165. Value: 1
  166.  
  167. Key : Hypervisor.Flags.DynamicCpuDisabled
  168. Value: 1
  169.  
  170. Key : Hypervisor.Flags.Epf
  171. Value: 0
  172.  
  173. Key : Hypervisor.Flags.ExtendedProcessorMasks
  174. Value: 1
  175.  
  176. Key : Hypervisor.Flags.HardwareMbecAvailable
  177. Value: 1
  178.  
  179. Key : Hypervisor.Flags.MaxBankNumber
  180. Value: 0
  181.  
  182. Key : Hypervisor.Flags.MemoryZeroingControl
  183. Value: 0
  184.  
  185. Key : Hypervisor.Flags.NoExtendedRangeFlush
  186. Value: 0
  187.  
  188. Key : Hypervisor.Flags.NoNonArchCoreSharing
  189. Value: 1
  190.  
  191. Key : Hypervisor.Flags.Phase0InitDone
  192. Value: 1
  193.  
  194. Key : Hypervisor.Flags.PowerSchedulerQos
  195. Value: 0
  196.  
  197. Key : Hypervisor.Flags.RootScheduler
  198. Value: 0
  199.  
  200. Key : Hypervisor.Flags.SynicAvailable
  201. Value: 1
  202.  
  203. Key : Hypervisor.Flags.UseQpcBias
  204. Value: 0
  205.  
  206. Key : Hypervisor.Flags.Value
  207. Value: 55185662
  208.  
  209. Key : Hypervisor.Flags.ValueHex
  210. Value: 34a10fe
  211.  
  212. Key : Hypervisor.Flags.VpAssistPage
  213. Value: 1
  214.  
  215. Key : Hypervisor.Flags.VsmAvailable
  216. Value: 1
  217.  
  218. Key : Hypervisor.RootFlags.AccessStats
  219. Value: 1
  220.  
  221. Key : Hypervisor.RootFlags.CrashdumpEnlightened
  222. Value: 1
  223.  
  224. Key : Hypervisor.RootFlags.CreateVirtualProcessor
  225. Value: 1
  226.  
  227. Key : Hypervisor.RootFlags.DisableHyperthreading
  228. Value: 0
  229.  
  230. Key : Hypervisor.RootFlags.HostTimelineSync
  231. Value: 1
  232.  
  233. Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  234. Value: 0
  235.  
  236. Key : Hypervisor.RootFlags.IsHyperV
  237. Value: 1
  238.  
  239. Key : Hypervisor.RootFlags.LivedumpEnlightened
  240. Value: 1
  241.  
  242. Key : Hypervisor.RootFlags.MapDeviceInterrupt
  243. Value: 1
  244.  
  245. Key : Hypervisor.RootFlags.MceEnlightened
  246. Value: 1
  247.  
  248. Key : Hypervisor.RootFlags.Nested
  249. Value: 0
  250.  
  251. Key : Hypervisor.RootFlags.StartLogicalProcessor
  252. Value: 1
  253.  
  254. Key : Hypervisor.RootFlags.Value
  255. Value: 1015
  256.  
  257. Key : Hypervisor.RootFlags.ValueHex
  258. Value: 3f7
  259.  
  260.  
  261. BUGCHECK_CODE: a
  262.  
  263. BUGCHECK_P1: fffff80297c94083
  264.  
  265. BUGCHECK_P2: 2
  266.  
  267. BUGCHECK_P3: 8
  268.  
  269. BUGCHECK_P4: fffff80290f2dbc3
  270.  
  271. FILE_IN_CAB: 021325-8968-01.dmp
  272.  
  273. DUMP_FILE_ATTRIBUTES: 0x21808
  274. Kernel Generated Triage Dump
  275.  
  276. FAULTING_THREAD: ffff9d07714e3080
  277.  
  278. READ_ADDRESS: fffff80291bc34b0: Unable to get MiVisibleState
  279. Unable to get NonPagedPoolStart
  280. Unable to get NonPagedPoolEnd
  281. Unable to get PagedPoolStart
  282. Unable to get PagedPoolEnd
  283. unable to get nt!MmSpecialPagesInUse
  284. fffff80297c94083
  285.  
  286. BLACKBOXBSD: 1 (!blackboxbsd)
  287.  
  288.  
  289. BLACKBOXNTFS: 1 (!blackboxntfs)
  290.  
  291.  
  292. BLACKBOXPNP: 1 (!blackboxpnp)
  293.  
  294.  
  295. BLACKBOXWINLOGON: 1
  296.  
  297. CUSTOMER_CRASH_COUNT: 1
  298.  
  299. PROCESS_NAME: WmiPrvSE.exe
  300.  
  301. TRAP_FRAME: ffff8200832f6c60 -- (.trap 0xffff8200832f6c60)
  302. NOTE: The trap frame does not contain all registers.
  303. Some register values may be zeroed or incorrect.
  304. rax=0000000000000001 rbx=0000000000000000 rcx=00000000151875da
  305. rdx=00000000146f6e77 rsi=0000000000000000 rdi=0000000000000000
  306. rip=fffff80290f2dbc3 rsp=ffff8200832f6df0 rbp=ffff9d072a1d0080
  307. r8=0000000000000000 r9=ffff8200832f7160 r10=ffff9d07714e38f0
  308. r11=ffff9d07714e3080 r12=0000000000000000 r13=0000000000000000
  309. r14=0000000000000000 r15=0000000000000000
  310. iopl=0 nv up ei pl zr na po nc
  311. nt!KeQueryValuesThread+0x1f3:
  312. fffff802`90f2dbc3 0fb6bd83020000 movzx edi,byte ptr [rbp+283h] ss:0018:ffff9d07`2a1d0303=??
  313. Resetting default scope
  314.  
  315. STACK_TEXT:
  316. ffff8200`832f6b18 fffff802`9128dce9 : 00000000`0000000a fffff802`97c94083 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
  317. ffff8200`832f6b20 fffff802`91288fa8 : 00000000`00000030 ffff9d07`03e430d8 00000000`00000002 00000000`00000150 : nt!KiBugCheckDispatch+0x69
  318. ffff8200`832f6c60 fffff802`90f2dbc3 : ffff9d07`03e5a890 ffff9d07`03e5a890 ffff9d06`d0100000 ffff8200`832f6ee9 : nt!KiPageFault+0x468
  319. ffff8200`832f6df0 fffff802`9141cbb7 : 00000000`00000000 fffff802`00000000 00000000`00000785 00000000`00000000 : nt!KeQueryValuesThread+0x1f3
  320. ffff8200`832f6e50 fffff802`9141f5ce : ffff9d07`2b0dd080 00000000`00000000 ffff9d07`2b7ce080 00000000`2db920ee : nt!PsQueryStatisticsProcess+0x157
  321. ffff8200`832f6ee0 fffff802`9141e603 : 00000000`0005bd00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpCopyProcessInfo+0x3a
  322. ffff8200`832f6f50 fffff802`915b727e : 00000000`00000000 00000000`00068000 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0xf03
  323. ffff8200`832f75c0 fffff802`915b614e : 00000130`a36bd0f0 fffff802`9128e7c5 fffff802`9128e7c5 fffff802`9128e7c5 : nt!ExpQuerySystemInformation+0xfce
  324. ffff8200`832f79a0 fffff802`9128d355 : ffff9d07`714e0000 ffff9d07`714e3080 ffff9d07`714e3080 00000000`00060000 : nt!NtQuerySystemInformation+0x3e
  325. ffff8200`832f79e0 00007ffa`d567fde4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  326. 00000026`3b36d218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d567fde4
  327.  
  328.  
  329. SYMBOL_NAME: nt!KeQueryValuesThread+1f3
  330.  
  331. MODULE_NAME: nt
  332.  
  333. IMAGE_NAME: ntkrnlmp.exe
  334.  
  335. IMAGE_VERSION: 10.0.26100.2605
  336.  
  337. STACK_COMMAND: .process /r /p 0xffff9d0779c94080; .thread 0xffff9d07714e3080 ; kb
  338.  
  339. BUCKET_ID_FUNC_OFFSET: 1f3
  340.  
  341. FAILURE_BUCKET_ID: AV_nt!KeQueryValuesThread
  342.  
  343. OSPLATFORM_TYPE: x64
  344.  
  345. OSNAME: Windows 10
  346.  
  347. FAILURE_ID_HASH: {c895ca60-5a6a-dc6e-0d58-a13309871622}
  348.  
  349. Followup: MachineOwner
  350. ---------
  351.  
  352.  
Tags: windows BSOD
Advertisement
Add Comment
Please, Sign In to add comment