Advertisement
Guest User

Untitled

a guest
Jun 28th, 2025
6
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.41 KB | None | 0 0
  1. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  2. ExtensionRepository : Implicit
  3. UseExperimentalFeatureForNugetShare : true
  4. AllowNugetExeUpdate : true
  5. NonInteractiveNuget : true
  6. AllowNugetMSCredentialProviderInstall : true
  7. AllowParallelInitializationOfLocalRepositories : true
  8. EnableRedirectToChakraJsProvider : false
  9.  
  10. -- Configuring repositories
  11. ----> Repository : LocalInstalled, Enabled: true
  12. ----> Repository : UserExtensions, Enabled: true
  13.  
  14. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  15.  
  16. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  17.  
  18. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
  19. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  20. ----> Repository : LocalInstalled, Enabled: true, Packages count: 44
  21.  
  22. Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
  23. Copyright (c) Microsoft Corporation. All rights reserved.
  24.  
  25.  
  26. Loading Dump File [C:\Windows\Minidump\062825-10265-01.dmp]
  27. Mini Kernel Dump File: Only registers and stack trace are available
  28.  
  29.  
  30. ************* Path validation summary **************
  31. Response Time (ms) Location
  32. Deferred srv*
  33. Symbol search path is: srv*
  34. Executable search path is:
  35. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  36. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  37. Kernel base = 0xfffff803`68a00000 PsLoadedModuleList = 0xfffff803`6962a7b0
  38. Debug session time: Sat Jun 28 01:40:04.281 2025 (UTC - 7:00)
  39. System Uptime: 0 days 0:13:57.897
  40. Loading Kernel Symbols
  41. ...............................................................
  42. ................................................................
  43. ................................................................
  44. ....................
  45. Loading User Symbols
  46. PEB is paged out (Peb.Ldr = 000000e4`a2d8e018). Type ".hh dbgerr001" for details
  47. Loading unloaded module list
  48. .........
  49. For analysis of this file, run !analyze -v
  50. nt!KeBugCheckEx:
  51. fffff803`68dfdfe0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb481`3bb998f0=000000000000001e
  52. 2: kd> !analyze -v
  53. Loading Kernel Symbols
  54. ...............................................................
  55. ................................................................
  56. ................................................................
  57. ....................
  58. Loading User Symbols
  59. PEB is paged out (Peb.Ldr = 000000e4`a2d8e018). Type ".hh dbgerr001" for details
  60. Loading unloaded module list
  61. .........
  62. *******************************************************************************
  63. * *
  64. * Bugcheck Analysis *
  65. * *
  66. *******************************************************************************
  67.  
  68. KMODE_EXCEPTION_NOT_HANDLED (1e)
  69. This is a very common BugCheck. Usually the exception address pinpoints
  70. the driver/function that caused the problem. Always note this address
  71. as well as the link date of the driver/image that contains this address.
  72. Arguments:
  73. Arg1: ffffffffc0000005, The exception code that was not handled
  74. Arg2: fffff80368c2b5b9, The address that the exception occurred at
  75. Arg3: 0000000000000000, Parameter 0 of the exception
  76. Arg4: ffffffffffffffff, Parameter 1 of the exception
  77.  
  78. Debugging Details:
  79. ------------------
  80.  
  81.  
  82. KEY_VALUES_STRING: 1
  83.  
  84. Key : Analysis.CPU.mSec
  85. Value: 1328
  86.  
  87. Key : Analysis.Elapsed.mSec
  88. Value: 1339
  89.  
  90. Key : Analysis.IO.Other.Mb
  91. Value: 0
  92.  
  93. Key : Analysis.IO.Read.Mb
  94. Value: 1
  95.  
  96. Key : Analysis.IO.Write.Mb
  97. Value: 0
  98.  
  99. Key : Analysis.Init.CPU.mSec
  100. Value: 453
  101.  
  102. Key : Analysis.Init.Elapsed.mSec
  103. Value: 13797
  104.  
  105. Key : Analysis.Memory.CommitPeak.Mb
  106. Value: 100
  107.  
  108. Key : Analysis.Version.DbgEng
  109. Value: 10.0.27829.1001
  110.  
  111. Key : Analysis.Version.Description
  112. Value: 10.2503.24.01 amd64fre
  113.  
  114. Key : Analysis.Version.Ext
  115. Value: 1.2503.24.1
  116.  
  117. Key : Bugcheck.Code.LegacyAPI
  118. Value: 0x1e
  119.  
  120. Key : Bugcheck.Code.TargetModel
  121. Value: 0x1e
  122.  
  123. Key : Dump.Attributes.AsUlong
  124. Value: 0x8
  125.  
  126. Key : Dump.Attributes.KernelGeneratedTriageDump
  127. Value: 1
  128.  
  129. Key : Failure.Bucket
  130. Value: AV_R_nt!KiAbProcessContextSwitch
  131.  
  132. Key : Failure.Exception.IP.Address
  133. Value: 0xfffff80368c2b5b9
  134.  
  135. Key : Failure.Exception.IP.Module
  136. Value: nt
  137.  
  138. Key : Failure.Exception.IP.Offset
  139. Value: 0x22b5b9
  140.  
  141. Key : Failure.Hash
  142. Value: {268d189a-ad1c-2337-2466-3499310f4dc9}
  143.  
  144.  
  145. BUGCHECK_CODE: 1e
  146.  
  147. BUGCHECK_P1: ffffffffc0000005
  148.  
  149. BUGCHECK_P2: fffff80368c2b5b9
  150.  
  151. BUGCHECK_P3: 0
  152.  
  153. BUGCHECK_P4: ffffffffffffffff
  154.  
  155. FILE_IN_CAB: 062825-10265-01.dmp
  156.  
  157. DUMP_FILE_ATTRIBUTES: 0x8
  158. Kernel Generated Triage Dump
  159.  
  160. FAULTING_THREAD: ffffdf8b231960c0
  161.  
  162. EXCEPTION_PARAMETER1: 0000000000000000
  163.  
  164. EXCEPTION_PARAMETER2: ffffffffffffffff
  165.  
  166. READ_ADDRESS: fffff803696fb390: Unable to get MiVisibleState
  167. Unable to get NonPagedPoolStart
  168. Unable to get NonPagedPoolEnd
  169. Unable to get PagedPoolStart
  170. Unable to get PagedPoolEnd
  171. unable to get nt!MmSpecialPagesInUse
  172. ffffffffffffffff
  173.  
  174. BLACKBOXBSD: 1 (!blackboxbsd)
  175.  
  176.  
  177. BLACKBOXNTFS: 1 (!blackboxntfs)
  178.  
  179.  
  180. BLACKBOXPNP: 1 (!blackboxpnp)
  181.  
  182.  
  183. BLACKBOXWINLOGON: 1
  184.  
  185. CUSTOMER_CRASH_COUNT: 1
  186.  
  187. PROCESS_NAME: Discord.exe
  188.  
  189. STACK_TEXT:
  190. fffffc0c`ce6f46e0 00000000`00000fff : 00000000`00000001 00000000`00000000 fffff803`00000000 00000000`00000000 : 0xffffffff
  191. fffffc0c`ce6f46e8 00000000`00000001 : 00000000`00000000 fffff803`00000000 00000000`00000000 00000000`00000000 : 0xfff
  192. fffffc0c`ce6f46f0 00000000`00000000 : fffff803`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1
  193.  
  194.  
  195. SYMBOL_NAME: nt!KiAbProcessContextSwitch+69
  196.  
  197. MODULE_NAME: nt
  198.  
  199. IMAGE_NAME: ntkrnlmp.exe
  200.  
  201. IMAGE_VERSION: 10.0.19041.5965
  202.  
  203. STACK_COMMAND: .process /r /p 0xffffdf8b22f0a080; .thread 0xffffdf8b231960c0 ; kb
  204.  
  205. BUCKET_ID_FUNC_OFFSET: 69
  206.  
  207. FAILURE_BUCKET_ID: AV_R_nt!KiAbProcessContextSwitch
  208.  
  209. OSPLATFORM_TYPE: x64
  210.  
  211. OSNAME: Windows 10
  212.  
  213. FAILURE_ID_HASH: {268d189a-ad1c-2337-2466-3499310f4dc9}
  214.  
  215. Followup: MachineOwner
  216. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement