Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
- Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\021325-8968-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 26100 MP (20 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Kernel base = 0xfffff802`90c00000 PsLoadedModuleList = 0xfffff802`91af4850
- Debug session time: Thu Feb 13 14:26:49.850 2025 (UTC - 5:00)
- System Uptime: 64 days 19:19:32.843
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ................................................................
- .....
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00000026`37b23018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ..................................................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff802`910b85d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8200`832f6b20=000000000000000a
- 7: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffff80297c94083, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000008, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80290f2dbc3, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1437
- Key : Analysis.Elapsed.mSec
- Value: 3222
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 1
- Key : Analysis.IO.Write.Mb
- Value: 0
- Key : Analysis.Init.CPU.mSec
- Value: 484
- Key : Analysis.Init.Elapsed.mSec
- Value: 32869
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 88
- Key : Analysis.Version.DbgEng
- Value: 10.0.27725.1000
- Key : Analysis.Version.Description
- Value: 10.2408.27.01 amd64fre
- Key : Analysis.Version.Ext
- Value: 1.2408.27.1
- Key : Bugcheck.Code.LegacyAPI
- Value: 0xa
- Key : Bugcheck.Code.TargetModel
- Value: 0xa
- Key : Dump.Attributes.AsUlong
- Value: 21808
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : Failure.Bucket
- Value: AV_nt!KeQueryValuesThread
- Key : Failure.Hash
- Value: {c895ca60-5a6a-dc6e-0d58-a13309871622}
- Key : Hypervisor.Enlightenments.ValueHex
- Value: 7417df84
- Key : Hypervisor.Flags.AnyHypervisorPresent
- Value: 1
- Key : Hypervisor.Flags.ApicEnlightened
- Value: 0
- Key : Hypervisor.Flags.ApicVirtualizationAvailable
- Value: 1
- Key : Hypervisor.Flags.AsyncMemoryHint
- Value: 0
- Key : Hypervisor.Flags.CoreSchedulerRequested
- Value: 0
- Key : Hypervisor.Flags.CpuManager
- Value: 1
- Key : Hypervisor.Flags.DeprecateAutoEoi
- Value: 1
- Key : Hypervisor.Flags.DynamicCpuDisabled
- Value: 1
- Key : Hypervisor.Flags.Epf
- Value: 0
- Key : Hypervisor.Flags.ExtendedProcessorMasks
- Value: 1
- Key : Hypervisor.Flags.HardwareMbecAvailable
- Value: 1
- Key : Hypervisor.Flags.MaxBankNumber
- Value: 0
- Key : Hypervisor.Flags.MemoryZeroingControl
- Value: 0
- Key : Hypervisor.Flags.NoExtendedRangeFlush
- Value: 0
- Key : Hypervisor.Flags.NoNonArchCoreSharing
- Value: 1
- Key : Hypervisor.Flags.Phase0InitDone
- Value: 1
- Key : Hypervisor.Flags.PowerSchedulerQos
- Value: 0
- Key : Hypervisor.Flags.RootScheduler
- Value: 0
- Key : Hypervisor.Flags.SynicAvailable
- Value: 1
- Key : Hypervisor.Flags.UseQpcBias
- Value: 0
- Key : Hypervisor.Flags.Value
- Value: 55185662
- Key : Hypervisor.Flags.ValueHex
- Value: 34a10fe
- Key : Hypervisor.Flags.VpAssistPage
- Value: 1
- Key : Hypervisor.Flags.VsmAvailable
- Value: 1
- Key : Hypervisor.RootFlags.AccessStats
- Value: 1
- Key : Hypervisor.RootFlags.CrashdumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.CreateVirtualProcessor
- Value: 1
- Key : Hypervisor.RootFlags.DisableHyperthreading
- Value: 0
- Key : Hypervisor.RootFlags.HostTimelineSync
- Value: 1
- Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
- Value: 0
- Key : Hypervisor.RootFlags.IsHyperV
- Value: 1
- Key : Hypervisor.RootFlags.LivedumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.MapDeviceInterrupt
- Value: 1
- Key : Hypervisor.RootFlags.MceEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.Nested
- Value: 0
- Key : Hypervisor.RootFlags.StartLogicalProcessor
- Value: 1
- Key : Hypervisor.RootFlags.Value
- Value: 1015
- Key : Hypervisor.RootFlags.ValueHex
- Value: 3f7
- BUGCHECK_CODE: a
- BUGCHECK_P1: fffff80297c94083
- BUGCHECK_P2: 2
- BUGCHECK_P3: 8
- BUGCHECK_P4: fffff80290f2dbc3
- FILE_IN_CAB: 021325-8968-01.dmp
- DUMP_FILE_ATTRIBUTES: 0x21808
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffff9d07714e3080
- READ_ADDRESS: fffff80291bc34b0: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- fffff80297c94083
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: WmiPrvSE.exe
- TRAP_FRAME: ffff8200832f6c60 -- (.trap 0xffff8200832f6c60)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000001 rbx=0000000000000000 rcx=00000000151875da
- rdx=00000000146f6e77 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80290f2dbc3 rsp=ffff8200832f6df0 rbp=ffff9d072a1d0080
- r8=0000000000000000 r9=ffff8200832f7160 r10=ffff9d07714e38f0
- r11=ffff9d07714e3080 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!KeQueryValuesThread+0x1f3:
- fffff802`90f2dbc3 0fb6bd83020000 movzx edi,byte ptr [rbp+283h] ss:0018:ffff9d07`2a1d0303=??
- Resetting default scope
- STACK_TEXT:
- ffff8200`832f6b18 fffff802`9128dce9 : 00000000`0000000a fffff802`97c94083 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
- ffff8200`832f6b20 fffff802`91288fa8 : 00000000`00000030 ffff9d07`03e430d8 00000000`00000002 00000000`00000150 : nt!KiBugCheckDispatch+0x69
- ffff8200`832f6c60 fffff802`90f2dbc3 : ffff9d07`03e5a890 ffff9d07`03e5a890 ffff9d06`d0100000 ffff8200`832f6ee9 : nt!KiPageFault+0x468
- ffff8200`832f6df0 fffff802`9141cbb7 : 00000000`00000000 fffff802`00000000 00000000`00000785 00000000`00000000 : nt!KeQueryValuesThread+0x1f3
- ffff8200`832f6e50 fffff802`9141f5ce : ffff9d07`2b0dd080 00000000`00000000 ffff9d07`2b7ce080 00000000`2db920ee : nt!PsQueryStatisticsProcess+0x157
- ffff8200`832f6ee0 fffff802`9141e603 : 00000000`0005bd00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpCopyProcessInfo+0x3a
- ffff8200`832f6f50 fffff802`915b727e : 00000000`00000000 00000000`00068000 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0xf03
- ffff8200`832f75c0 fffff802`915b614e : 00000130`a36bd0f0 fffff802`9128e7c5 fffff802`9128e7c5 fffff802`9128e7c5 : nt!ExpQuerySystemInformation+0xfce
- ffff8200`832f79a0 fffff802`9128d355 : ffff9d07`714e0000 ffff9d07`714e3080 ffff9d07`714e3080 00000000`00060000 : nt!NtQuerySystemInformation+0x3e
- ffff8200`832f79e0 00007ffa`d567fde4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 00000026`3b36d218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d567fde4
- SYMBOL_NAME: nt!KeQueryValuesThread+1f3
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.26100.2605
- STACK_COMMAND: .process /r /p 0xffff9d0779c94080; .thread 0xffff9d07714e3080 ; kb
- BUCKET_ID_FUNC_OFFSET: 1f3
- FAILURE_BUCKET_ID: AV_nt!KeQueryValuesThread
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {c895ca60-5a6a-dc6e-0d58-a13309871622}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment