Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 44
- Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\062825-11500-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Kernel base = 0xfffff800`15800000 PsLoadedModuleList = 0xfffff800`1642a7b0
- Debug session time: Sat Jun 28 01:49:42.983 2025 (UTC - 7:00)
- System Uptime: 0 days 0:04:23.599
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .....................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00000047`7f6d3018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff800`15bfdfe0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbf00`7a3998f0=000000000000001e
- 2: kd> !analyze -v
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .....................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00000047`7f6d3018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common BugCheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80015e07b62, The address that the exception occurred at
- Arg3: 0000000000000001, Parameter 0 of the exception
- Arg4: ffff840b00400000, Parameter 1 of the exception
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1359
- Key : Analysis.Elapsed.mSec
- Value: 1366
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 1
- Key : Analysis.IO.Write.Mb
- Value: 1
- Key : Analysis.Init.CPU.mSec
- Value: 500
- Key : Analysis.Init.Elapsed.mSec
- Value: 20774
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 95
- Key : Analysis.Version.DbgEng
- Value: 10.0.27829.1001
- Key : Analysis.Version.Description
- Value: 10.2503.24.01 amd64fre
- Key : Analysis.Version.Ext
- Value: 1.2503.24.1
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x1e
- Key : Bugcheck.Code.TargetModel
- Value: 0x1e
- Key : Dump.Attributes.AsUlong
- Value: 0x8
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Failure.Bucket
- Value: AV_W_nt!ObpReferenceObjectByHandleWithTag
- Key : Failure.Exception.IP.Address
- Value: 0xfffff80015e07b62
- Key : Failure.Exception.IP.Module
- Value: nt
- Key : Failure.Exception.IP.Offset
- Value: 0x607b62
- Key : Failure.Hash
- Value: {fc3310fa-4a35-6f6d-c05c-6ce7b09b3db9}
- BUGCHECK_CODE: 1e
- BUGCHECK_P1: ffffffffc0000005
- BUGCHECK_P2: fffff80015e07b62
- BUGCHECK_P3: 1
- BUGCHECK_P4: ffff840b00400000
- FILE_IN_CAB: 062825-11500-01.dmp
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffff840bbc131080
- EXCEPTION_PARAMETER1: 0000000000000001
- EXCEPTION_PARAMETER2: ffff840b00400000
- WRITE_ADDRESS: fffff800164fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- ffff840b00400000
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: Discord.exe
- STACK_TEXT:
- ffffe60b`207d46e0 ffff840b`bc310080 : 00000000`9d1e29ba 00000000`00000000 fffff800`15c0e152 ffff840b`b9ad5080 : 0xffff840b`00400000
- ffffe60b`207d46e8 00000000`9d1e29ba : 00000000`00000000 fffff800`15c0e152 ffff840b`b9ad5080 00000000`00000001 : 0xffff840b`bc310080
- ffffe60b`207d46f0 00000000`00000000 : fffff800`15c0e152 ffff840b`b9ad5080 00000000`00000001 00000000`00000000 : 0x9d1e29ba
- SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+202
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.19041.5965
- STACK_COMMAND: .process /r /p 0xffff840bbc310080; .thread 0xffff840bbc131080 ; kb
- BUCKET_ID_FUNC_OFFSET: 202
- FAILURE_BUCKET_ID: AV_W_nt!ObpReferenceObjectByHandleWithTag
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {fc3310fa-4a35-6f6d-c05c-6ce7b09b3db9}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement