Advertisement
Guest User

Untitled

a guest
Jun 16th, 2025
13
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.30 KB | Software | 0 0
  1. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  2. ExtensionRepository : Implicit
  3. UseExperimentalFeatureForNugetShare : true
  4. AllowNugetExeUpdate : true
  5. NonInteractiveNuget : true
  6. AllowNugetMSCredentialProviderInstall : true
  7. AllowParallelInitializationOfLocalRepositories : true
  8. EnableRedirectToChakraJsProvider : false
  9.  
  10. -- Configuring repositories
  11. ----> Repository : LocalInstalled, Enabled: true
  12. ----> Repository : UserExtensions, Enabled: true
  13.  
  14. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  15.  
  16. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  17.  
  18. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.328 seconds
  19. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  20. ----> Repository : LocalInstalled, Enabled: true, Packages count: 43
  21.  
  22. Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
  23. Copyright (c) Microsoft Corporation. All rights reserved.
  24.  
  25.  
  26. Loading Dump File [C:\Windows\Minidump\061625-19375-01.dmp]
  27. Mini Kernel Dump File: Only registers and stack trace are available
  28.  
  29.  
  30. ************* Path validation summary **************
  31. Response Time (ms) Location
  32. Deferred srv*
  33. Symbol search path is: srv*
  34. Executable search path is:
  35. Windows 10 Kernel Version 22621 MP (32 procs) Free x64
  36. Product: WinNt, suite: TerminalServer SingleUserTS
  37. Kernel base = 0xfffff807`62000000 PsLoadedModuleList = 0xfffff807`62c134f0
  38. Debug session time: Mon Jun 16 18:14:36.670 2025 (UTC - 6:00)
  39. System Uptime: 0 days 22:30:14.317
  40. Loading Kernel Symbols
  41. ...............................................................
  42. ................................................................
  43. ................................................................
  44. ................................................................
  45. .
  46. Loading User Symbols
  47. PEB is paged out (Peb.Ldr = 000000f0`96df2018). Type ".hh dbgerr001" for details
  48. Loading unloaded module list
  49. .......................
  50. For analysis of this file, run !analyze -v
  51. nt!KeBugCheckEx:
  52. fffff807`62417ee0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff960c`1e03a0e0=000000000000003b
  53. 4: kd> !analyze -v
  54. *******************************************************************************
  55. * *
  56. * Bugcheck Analysis *
  57. * *
  58. *******************************************************************************
  59.  
  60. SYSTEM_SERVICE_EXCEPTION (3b)
  61. An exception happened while executing a system service routine.
  62. Arguments:
  63. Arg1: 00000000c0000005, Exception code that caused the BugCheck
  64. Arg2: fffff807622cf97f, Address of the instruction which caused the BugCheck
  65. Arg3: ffff960c1e03aa30, Address of the context record for the exception that caused the BugCheck
  66. Arg4: 0000000000000000, zero.
  67.  
  68. Debugging Details:
  69. ------------------
  70.  
  71.  
  72. KEY_VALUES_STRING: 1
  73.  
  74. Key : Analysis.CPU.mSec
  75. Value: 93
  76.  
  77. Key : Analysis.Elapsed.mSec
  78. Value: 2892
  79.  
  80. Key : Analysis.IO.Other.Mb
  81. Value: 4
  82.  
  83. Key : Analysis.IO.Read.Mb
  84. Value: 1
  85.  
  86. Key : Analysis.IO.Write.Mb
  87. Value: 28
  88.  
  89. Key : Analysis.Init.CPU.mSec
  90. Value: 93
  91.  
  92. Key : Analysis.Init.Elapsed.mSec
  93. Value: 8448
  94.  
  95. Key : Analysis.Memory.CommitPeak.Mb
  96. Value: 94
  97.  
  98. Key : Analysis.Version.DbgEng
  99. Value: 10.0.27793.1000
  100.  
  101. Key : Analysis.Version.Description
  102. Value: 10.2410.02.02 amd64fre
  103.  
  104. Key : Analysis.Version.Ext
  105. Value: 1.2410.2.2
  106.  
  107. Key : Bugcheck.Code.LegacyAPI
  108. Value: 0x3b
  109.  
  110. Key : Bugcheck.Code.TargetModel
  111. Value: 0x3b
  112.  
  113. Key : Dump.Attributes.AsUlong
  114. Value: 0x1808
  115.  
  116. Key : Dump.Attributes.DiagDataWrittenToHeader
  117. Value: 1
  118.  
  119. Key : Dump.Attributes.ErrorCode
  120. Value: 0x0
  121.  
  122. Key : Dump.Attributes.KernelGeneratedTriageDump
  123. Value: 1
  124.  
  125. Key : Dump.Attributes.LastLine
  126. Value: Dump completed successfully.
  127.  
  128. Key : Dump.Attributes.ProgressPercentage
  129. Value: 0
  130.  
  131. Key : Failure.Bucket
  132. Value: AV_pcw!_PCW_INSTANCE::Release
  133.  
  134. Key : Failure.Exception.IP.Address
  135. Value: 0xfffff807622cf97f
  136.  
  137. Key : Failure.Exception.IP.Module
  138. Value: nt
  139.  
  140. Key : Failure.Exception.IP.Offset
  141. Value: 0x2cf97f
  142.  
  143. Key : Failure.Hash
  144. Value: {a15fca40-7a8e-f8a1-56d8-18bb28de2ae7}
  145.  
  146. Key : Hypervisor.Enlightenments.ValueHex
  147. Value: 0x1417df84
  148.  
  149. Key : Hypervisor.Flags.AnyHypervisorPresent
  150. Value: 1
  151.  
  152. Key : Hypervisor.Flags.ApicEnlightened
  153. Value: 0
  154.  
  155. Key : Hypervisor.Flags.ApicVirtualizationAvailable
  156. Value: 1
  157.  
  158. Key : Hypervisor.Flags.AsyncMemoryHint
  159. Value: 0
  160.  
  161. Key : Hypervisor.Flags.CoreSchedulerRequested
  162. Value: 0
  163.  
  164. Key : Hypervisor.Flags.CpuManager
  165. Value: 1
  166.  
  167. Key : Hypervisor.Flags.DeprecateAutoEoi
  168. Value: 1
  169.  
  170. Key : Hypervisor.Flags.DynamicCpuDisabled
  171. Value: 1
  172.  
  173. Key : Hypervisor.Flags.Epf
  174. Value: 0
  175.  
  176. Key : Hypervisor.Flags.ExtendedProcessorMasks
  177. Value: 1
  178.  
  179. Key : Hypervisor.Flags.HardwareMbecAvailable
  180. Value: 1
  181.  
  182. Key : Hypervisor.Flags.MaxBankNumber
  183. Value: 0
  184.  
  185. Key : Hypervisor.Flags.MemoryZeroingControl
  186. Value: 0
  187.  
  188. Key : Hypervisor.Flags.NoExtendedRangeFlush
  189. Value: 0
  190.  
  191. Key : Hypervisor.Flags.NoNonArchCoreSharing
  192. Value: 1
  193.  
  194. Key : Hypervisor.Flags.Phase0InitDone
  195. Value: 1
  196.  
  197. Key : Hypervisor.Flags.PowerSchedulerQos
  198. Value: 0
  199.  
  200. Key : Hypervisor.Flags.RootScheduler
  201. Value: 0
  202.  
  203. Key : Hypervisor.Flags.SynicAvailable
  204. Value: 1
  205.  
  206. Key : Hypervisor.Flags.UseQpcBias
  207. Value: 0
  208.  
  209. Key : Hypervisor.Flags.Value
  210. Value: 21631230
  211.  
  212. Key : Hypervisor.Flags.ValueHex
  213. Value: 0x14a10fe
  214.  
  215. Key : Hypervisor.Flags.VpAssistPage
  216. Value: 1
  217.  
  218. Key : Hypervisor.Flags.VsmAvailable
  219. Value: 1
  220.  
  221. Key : Hypervisor.RootFlags.AccessStats
  222. Value: 1
  223.  
  224. Key : Hypervisor.RootFlags.CrashdumpEnlightened
  225. Value: 1
  226.  
  227. Key : Hypervisor.RootFlags.CreateVirtualProcessor
  228. Value: 1
  229.  
  230. Key : Hypervisor.RootFlags.DisableHyperthreading
  231. Value: 0
  232.  
  233. Key : Hypervisor.RootFlags.HostTimelineSync
  234. Value: 1
  235.  
  236. Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  237. Value: 0
  238.  
  239. Key : Hypervisor.RootFlags.IsHyperV
  240. Value: 1
  241.  
  242. Key : Hypervisor.RootFlags.LivedumpEnlightened
  243. Value: 1
  244.  
  245. Key : Hypervisor.RootFlags.MapDeviceInterrupt
  246. Value: 1
  247.  
  248. Key : Hypervisor.RootFlags.MceEnlightened
  249. Value: 1
  250.  
  251. Key : Hypervisor.RootFlags.Nested
  252. Value: 0
  253.  
  254. Key : Hypervisor.RootFlags.StartLogicalProcessor
  255. Value: 1
  256.  
  257. Key : Hypervisor.RootFlags.Value
  258. Value: 1015
  259.  
  260. Key : Hypervisor.RootFlags.ValueHex
  261. Value: 0x3f7
  262.  
  263.  
  264. BUGCHECK_CODE: 3b
  265.  
  266. BUGCHECK_P1: c0000005
  267.  
  268. BUGCHECK_P2: fffff807622cf97f
  269.  
  270. BUGCHECK_P3: ffff960c1e03aa30
  271.  
  272. BUGCHECK_P4: 0
  273.  
  274. FILE_IN_CAB: 061625-19375-01.dmp
  275.  
  276. TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
  277.  
  278.  
  279. DUMP_FILE_ATTRIBUTES: 0x1808
  280. Kernel Generated Triage Dump
  281.  
  282. FAULTING_THREAD: ffff860ca37912c0
  283.  
  284. CONTEXT: ffff960c1e03aa30 -- (.cxr 0xffff960c1e03aa30)
  285. rax=4cc35e4120c48380 rbx=ffff860ca37919c0 rcx=7ffffffffffffffc
  286. rdx=0000000000000000 rsi=ffff960c1e03b468 rdi=ccc35e4120c48380
  287. rip=fffff807622cf97f rsp=ffff960c1e03b450 rbp=ffffd20e121c6390
  288. r8=0000000000000000 r9=7ffffffffffffffc r10=fffff807622cf8c0
  289. r11=000000000a84f990 r12=0000000000000000 r13=ffffd20e61c048d0
  290. r14=ffff960c1e03b580 r15=ffffd20e1097dc80
  291. iopl=0 nv up ei pl nz na pe nc
  292. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
  293. nt!ExAcquirePushLockExclusiveEx+0xbf:
  294. fffff807`622cf97f f0480fba2f00 lock bts qword ptr [rdi],0 ds:002b:ccc35e41`20c48380=????????????????
  295. Resetting default scope
  296.  
  297. BLACKBOXBSD: 1 (!blackboxbsd)
  298.  
  299.  
  300. BLACKBOXNTFS: 1 (!blackboxntfs)
  301.  
  302.  
  303. BLACKBOXPNP: 1 (!blackboxpnp)
  304.  
  305.  
  306. BLACKBOXWINLOGON: 1
  307.  
  308. CUSTOMER_CRASH_COUNT: 1
  309.  
  310. PROCESS_NAME: UsbMonitorL.ex
  311.  
  312. STACK_TEXT:
  313. ffff960c`1e03b450 fffff807`667aa21b : ffff960c`1e03b468 00000000`00000001 ffff960c`1e03b530 fffff807`627b0954 : nt!ExAcquirePushLockExclusiveEx+0xbf
  314. ffff960c`1e03b490 fffff807`667aa14d : ffffd20e`1097dc80 00000000`00000001 ffffd20e`1097dc80 ffff960c`1e03b580 : pcw!_PCW_INSTANCE::Release+0x4f
  315. ffff960c`1e03b4c0 fffff807`667a58ef : ffffd20e`272819c0 ffffd20e`121c6390 00000000`00000000 00000000`000037ef : pcw!PCW_COUNTERSET_BASE::NextInstance+0x99
  316. ffff960c`1e03b4f0 fffff807`667a54a0 : 00000000`00000000 ffff960c`1e03b639 ffffd20e`1097dc80 ffffd20e`121c6390 : pcw!PCW_QUERY_ITEM::CollectInstances+0x11b
  317. ffff960c`1e03b560 fffff807`667a6f43 : ffffd20e`61c048d0 00000000`00000000 ffff960c`00011038 ffff960c`1e03b778 : pcw!PCW_QUERY::Collect+0x218
  318. ffff960c`1e03b6a0 fffff807`667a6b6a : ffffd20e`61c048d0 00000000`00000004 00000000`00000008 00000000`00000003 : pcw!PcwpIoctlCollect+0x63
  319. ffff960c`1e03b6d0 fffff807`6269f15e : 00000000`0001e368 ffff860c`a31b5770 00000000`00000000 00000000`00000000 : pcw!PcwpFastIoDeviceControl+0x15a
  320. ffff960c`1e03b750 fffff807`6269ece6 : 000000f0`991fe108 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x45e
  321. ffff960c`1e03b940 fffff807`6242d505 : 00000000`00000000 ffffd20e`252bb700 ffff860c`00000000 ffff860c`968b72f0 : nt!NtDeviceIoControlFile+0x56
  322. ffff960c`1e03b9b0 00007ffa`adc50d34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  323. 000000f0`991fddd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`adc50d34
  324.  
  325.  
  326. STACK_COMMAND: .process /r /p 0xffefffffffffffff; .cxr 0xffff960c1e03aa30 ; kb
  327.  
  328. SYMBOL_NAME: pcw!_PCW_INSTANCE::Release+4f
  329.  
  330. MODULE_NAME: pcw
  331.  
  332. IMAGE_NAME: pcw.sys
  333.  
  334. IMAGE_VERSION: 10.0.22621.4034
  335.  
  336. BUCKET_ID_FUNC_OFFSET: 4f
  337.  
  338. FAILURE_BUCKET_ID: AV_pcw!_PCW_INSTANCE::Release
  339.  
  340. OSPLATFORM_TYPE: x64
  341.  
  342. OSNAME: Windows 10
  343.  
  344. FAILURE_ID_HASH: {a15fca40-7a8e-f8a1-56d8-18bb28de2ae7}
  345.  
  346. Followup: MachineOwner
  347. ---------
Tags: help
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement