Advertisement
Guest User

bsod

a guest
Jun 28th, 2025
11
0
5 days
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.47 KB | None | 0 0
  1. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  2. ExtensionRepository : Implicit
  3. UseExperimentalFeatureForNugetShare : true
  4. AllowNugetExeUpdate : true
  5. NonInteractiveNuget : true
  6. AllowNugetMSCredentialProviderInstall : true
  7. AllowParallelInitializationOfLocalRepositories : true
  8. EnableRedirectToChakraJsProvider : false
  9.  
  10. -- Configuring repositories
  11. ----> Repository : LocalInstalled, Enabled: true
  12. ----> Repository : UserExtensions, Enabled: true
  13.  
  14. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  15.  
  16. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  17.  
  18. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
  19. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  20. ----> Repository : LocalInstalled, Enabled: true, Packages count: 44
  21.  
  22. Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
  23. Copyright (c) Microsoft Corporation. All rights reserved.
  24.  
  25.  
  26. Loading Dump File [C:\Windows\Minidump\062825-11500-01.dmp]
  27. Mini Kernel Dump File: Only registers and stack trace are available
  28.  
  29.  
  30. ************* Path validation summary **************
  31. Response Time (ms) Location
  32. Deferred srv*
  33. Symbol search path is: srv*
  34. Executable search path is:
  35. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  36. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  37. Kernel base = 0xfffff800`15800000 PsLoadedModuleList = 0xfffff800`1642a7b0
  38. Debug session time: Sat Jun 28 01:49:42.983 2025 (UTC - 7:00)
  39. System Uptime: 0 days 0:04:23.599
  40. Loading Kernel Symbols
  41. ...............................................................
  42. ................................................................
  43. ................................................................
  44. .....................
  45. Loading User Symbols
  46. PEB is paged out (Peb.Ldr = 00000047`7f6d3018). Type ".hh dbgerr001" for details
  47. Loading unloaded module list
  48. .........
  49. For analysis of this file, run !analyze -v
  50. nt!KeBugCheckEx:
  51. fffff800`15bfdfe0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbf00`7a3998f0=000000000000001e
  52. 2: kd> !analyze -v
  53. Loading Kernel Symbols
  54. ...............................................................
  55. ................................................................
  56. ................................................................
  57. .....................
  58. Loading User Symbols
  59. PEB is paged out (Peb.Ldr = 00000047`7f6d3018). Type ".hh dbgerr001" for details
  60. Loading unloaded module list
  61. .........
  62. *******************************************************************************
  63. * *
  64. * Bugcheck Analysis *
  65. * *
  66. *******************************************************************************
  67.  
  68. KMODE_EXCEPTION_NOT_HANDLED (1e)
  69. This is a very common BugCheck. Usually the exception address pinpoints
  70. the driver/function that caused the problem. Always note this address
  71. as well as the link date of the driver/image that contains this address.
  72. Arguments:
  73. Arg1: ffffffffc0000005, The exception code that was not handled
  74. Arg2: fffff80015e07b62, The address that the exception occurred at
  75. Arg3: 0000000000000001, Parameter 0 of the exception
  76. Arg4: ffff840b00400000, Parameter 1 of the exception
  77.  
  78. Debugging Details:
  79. ------------------
  80.  
  81.  
  82. KEY_VALUES_STRING: 1
  83.  
  84. Key : Analysis.CPU.mSec
  85. Value: 1359
  86.  
  87. Key : Analysis.Elapsed.mSec
  88. Value: 1366
  89.  
  90. Key : Analysis.IO.Other.Mb
  91. Value: 0
  92.  
  93. Key : Analysis.IO.Read.Mb
  94. Value: 1
  95.  
  96. Key : Analysis.IO.Write.Mb
  97. Value: 1
  98.  
  99. Key : Analysis.Init.CPU.mSec
  100. Value: 500
  101.  
  102. Key : Analysis.Init.Elapsed.mSec
  103. Value: 20774
  104.  
  105. Key : Analysis.Memory.CommitPeak.Mb
  106. Value: 95
  107.  
  108. Key : Analysis.Version.DbgEng
  109. Value: 10.0.27829.1001
  110.  
  111. Key : Analysis.Version.Description
  112. Value: 10.2503.24.01 amd64fre
  113.  
  114. Key : Analysis.Version.Ext
  115. Value: 1.2503.24.1
  116.  
  117. Key : Bugcheck.Code.LegacyAPI
  118. Value: 0x1e
  119.  
  120. Key : Bugcheck.Code.TargetModel
  121. Value: 0x1e
  122.  
  123. Key : Dump.Attributes.AsUlong
  124. Value: 0x8
  125.  
  126. Key : Dump.Attributes.KernelGeneratedTriageDump
  127. Value: 1
  128.  
  129. Key : Failure.Bucket
  130. Value: AV_W_nt!ObpReferenceObjectByHandleWithTag
  131.  
  132. Key : Failure.Exception.IP.Address
  133. Value: 0xfffff80015e07b62
  134.  
  135. Key : Failure.Exception.IP.Module
  136. Value: nt
  137.  
  138. Key : Failure.Exception.IP.Offset
  139. Value: 0x607b62
  140.  
  141. Key : Failure.Hash
  142. Value: {fc3310fa-4a35-6f6d-c05c-6ce7b09b3db9}
  143.  
  144.  
  145. BUGCHECK_CODE: 1e
  146.  
  147. BUGCHECK_P1: ffffffffc0000005
  148.  
  149. BUGCHECK_P2: fffff80015e07b62
  150.  
  151. BUGCHECK_P3: 1
  152.  
  153. BUGCHECK_P4: ffff840b00400000
  154.  
  155. FILE_IN_CAB: 062825-11500-01.dmp
  156.  
  157. DUMP_FILE_ATTRIBUTES: 0x8
  158. Kernel Generated Triage Dump
  159.  
  160. FAULTING_THREAD: ffff840bbc131080
  161.  
  162. EXCEPTION_PARAMETER1: 0000000000000001
  163.  
  164. EXCEPTION_PARAMETER2: ffff840b00400000
  165.  
  166. WRITE_ADDRESS: fffff800164fb390: Unable to get MiVisibleState
  167. Unable to get NonPagedPoolStart
  168. Unable to get NonPagedPoolEnd
  169. Unable to get PagedPoolStart
  170. Unable to get PagedPoolEnd
  171. unable to get nt!MmSpecialPagesInUse
  172. ffff840b00400000
  173.  
  174. BLACKBOXBSD: 1 (!blackboxbsd)
  175.  
  176.  
  177. BLACKBOXNTFS: 1 (!blackboxntfs)
  178.  
  179.  
  180. BLACKBOXPNP: 1 (!blackboxpnp)
  181.  
  182.  
  183. BLACKBOXWINLOGON: 1
  184.  
  185. CUSTOMER_CRASH_COUNT: 1
  186.  
  187. PROCESS_NAME: Discord.exe
  188.  
  189. STACK_TEXT:
  190. ffffe60b`207d46e0 ffff840b`bc310080 : 00000000`9d1e29ba 00000000`00000000 fffff800`15c0e152 ffff840b`b9ad5080 : 0xffff840b`00400000
  191. ffffe60b`207d46e8 00000000`9d1e29ba : 00000000`00000000 fffff800`15c0e152 ffff840b`b9ad5080 00000000`00000001 : 0xffff840b`bc310080
  192. ffffe60b`207d46f0 00000000`00000000 : fffff800`15c0e152 ffff840b`b9ad5080 00000000`00000001 00000000`00000000 : 0x9d1e29ba
  193.  
  194.  
  195. SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+202
  196.  
  197. MODULE_NAME: nt
  198.  
  199. IMAGE_NAME: ntkrnlmp.exe
  200.  
  201. IMAGE_VERSION: 10.0.19041.5965
  202.  
  203. STACK_COMMAND: .process /r /p 0xffff840bbc310080; .thread 0xffff840bbc131080 ; kb
  204.  
  205. BUCKET_ID_FUNC_OFFSET: 202
  206.  
  207. FAILURE_BUCKET_ID: AV_W_nt!ObpReferenceObjectByHandleWithTag
  208.  
  209. OSPLATFORM_TYPE: x64
  210.  
  211. OSNAME: Windows 10
  212.  
  213. FAILURE_ID_HASH: {fc3310fa-4a35-6f6d-c05c-6ce7b09b3db9}
  214.  
  215. Followup: MachineOwner
  216. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement