Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.328 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 43
- Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\061625-19375-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 22621 MP (32 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Kernel base = 0xfffff807`62000000 PsLoadedModuleList = 0xfffff807`62c134f0
- Debug session time: Mon Jun 16 18:14:36.670 2025 (UTC - 6:00)
- System Uptime: 0 days 22:30:14.317
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ................................................................
- .
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 000000f0`96df2018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .......................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff807`62417ee0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff960c`1e03a0e0=000000000000003b
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the BugCheck
- Arg2: fffff807622cf97f, Address of the instruction which caused the BugCheck
- Arg3: ffff960c1e03aa30, Address of the context record for the exception that caused the BugCheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 93
- Key : Analysis.Elapsed.mSec
- Value: 2892
- Key : Analysis.IO.Other.Mb
- Value: 4
- Key : Analysis.IO.Read.Mb
- Value: 1
- Key : Analysis.IO.Write.Mb
- Value: 28
- Key : Analysis.Init.CPU.mSec
- Value: 93
- Key : Analysis.Init.Elapsed.mSec
- Value: 8448
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 94
- Key : Analysis.Version.DbgEng
- Value: 10.0.27793.1000
- Key : Analysis.Version.Description
- Value: 10.2410.02.02 amd64fre
- Key : Analysis.Version.Ext
- Value: 1.2410.2.2
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x3b
- Key : Bugcheck.Code.TargetModel
- Value: 0x3b
- Key : Dump.Attributes.AsUlong
- Value: 0x1808
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0x0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : Failure.Bucket
- Value: AV_pcw!_PCW_INSTANCE::Release
- Key : Failure.Exception.IP.Address
- Value: 0xfffff807622cf97f
- Key : Failure.Exception.IP.Module
- Value: nt
- Key : Failure.Exception.IP.Offset
- Value: 0x2cf97f
- Key : Failure.Hash
- Value: {a15fca40-7a8e-f8a1-56d8-18bb28de2ae7}
- Key : Hypervisor.Enlightenments.ValueHex
- Value: 0x1417df84
- Key : Hypervisor.Flags.AnyHypervisorPresent
- Value: 1
- Key : Hypervisor.Flags.ApicEnlightened
- Value: 0
- Key : Hypervisor.Flags.ApicVirtualizationAvailable
- Value: 1
- Key : Hypervisor.Flags.AsyncMemoryHint
- Value: 0
- Key : Hypervisor.Flags.CoreSchedulerRequested
- Value: 0
- Key : Hypervisor.Flags.CpuManager
- Value: 1
- Key : Hypervisor.Flags.DeprecateAutoEoi
- Value: 1
- Key : Hypervisor.Flags.DynamicCpuDisabled
- Value: 1
- Key : Hypervisor.Flags.Epf
- Value: 0
- Key : Hypervisor.Flags.ExtendedProcessorMasks
- Value: 1
- Key : Hypervisor.Flags.HardwareMbecAvailable
- Value: 1
- Key : Hypervisor.Flags.MaxBankNumber
- Value: 0
- Key : Hypervisor.Flags.MemoryZeroingControl
- Value: 0
- Key : Hypervisor.Flags.NoExtendedRangeFlush
- Value: 0
- Key : Hypervisor.Flags.NoNonArchCoreSharing
- Value: 1
- Key : Hypervisor.Flags.Phase0InitDone
- Value: 1
- Key : Hypervisor.Flags.PowerSchedulerQos
- Value: 0
- Key : Hypervisor.Flags.RootScheduler
- Value: 0
- Key : Hypervisor.Flags.SynicAvailable
- Value: 1
- Key : Hypervisor.Flags.UseQpcBias
- Value: 0
- Key : Hypervisor.Flags.Value
- Value: 21631230
- Key : Hypervisor.Flags.ValueHex
- Value: 0x14a10fe
- Key : Hypervisor.Flags.VpAssistPage
- Value: 1
- Key : Hypervisor.Flags.VsmAvailable
- Value: 1
- Key : Hypervisor.RootFlags.AccessStats
- Value: 1
- Key : Hypervisor.RootFlags.CrashdumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.CreateVirtualProcessor
- Value: 1
- Key : Hypervisor.RootFlags.DisableHyperthreading
- Value: 0
- Key : Hypervisor.RootFlags.HostTimelineSync
- Value: 1
- Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
- Value: 0
- Key : Hypervisor.RootFlags.IsHyperV
- Value: 1
- Key : Hypervisor.RootFlags.LivedumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.MapDeviceInterrupt
- Value: 1
- Key : Hypervisor.RootFlags.MceEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.Nested
- Value: 0
- Key : Hypervisor.RootFlags.StartLogicalProcessor
- Value: 1
- Key : Hypervisor.RootFlags.Value
- Value: 1015
- Key : Hypervisor.RootFlags.ValueHex
- Value: 0x3f7
- BUGCHECK_CODE: 3b
- BUGCHECK_P1: c0000005
- BUGCHECK_P2: fffff807622cf97f
- BUGCHECK_P3: ffff960c1e03aa30
- BUGCHECK_P4: 0
- FILE_IN_CAB: 061625-19375-01.dmp
- TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
- DUMP_FILE_ATTRIBUTES: 0x1808
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffff860ca37912c0
- CONTEXT: ffff960c1e03aa30 -- (.cxr 0xffff960c1e03aa30)
- rax=4cc35e4120c48380 rbx=ffff860ca37919c0 rcx=7ffffffffffffffc
- rdx=0000000000000000 rsi=ffff960c1e03b468 rdi=ccc35e4120c48380
- rip=fffff807622cf97f rsp=ffff960c1e03b450 rbp=ffffd20e121c6390
- r8=0000000000000000 r9=7ffffffffffffffc r10=fffff807622cf8c0
- r11=000000000a84f990 r12=0000000000000000 r13=ffffd20e61c048d0
- r14=ffff960c1e03b580 r15=ffffd20e1097dc80
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
- nt!ExAcquirePushLockExclusiveEx+0xbf:
- fffff807`622cf97f f0480fba2f00 lock bts qword ptr [rdi],0 ds:002b:ccc35e41`20c48380=????????????????
- Resetting default scope
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: UsbMonitorL.ex
- STACK_TEXT:
- ffff960c`1e03b450 fffff807`667aa21b : ffff960c`1e03b468 00000000`00000001 ffff960c`1e03b530 fffff807`627b0954 : nt!ExAcquirePushLockExclusiveEx+0xbf
- ffff960c`1e03b490 fffff807`667aa14d : ffffd20e`1097dc80 00000000`00000001 ffffd20e`1097dc80 ffff960c`1e03b580 : pcw!_PCW_INSTANCE::Release+0x4f
- ffff960c`1e03b4c0 fffff807`667a58ef : ffffd20e`272819c0 ffffd20e`121c6390 00000000`00000000 00000000`000037ef : pcw!PCW_COUNTERSET_BASE::NextInstance+0x99
- ffff960c`1e03b4f0 fffff807`667a54a0 : 00000000`00000000 ffff960c`1e03b639 ffffd20e`1097dc80 ffffd20e`121c6390 : pcw!PCW_QUERY_ITEM::CollectInstances+0x11b
- ffff960c`1e03b560 fffff807`667a6f43 : ffffd20e`61c048d0 00000000`00000000 ffff960c`00011038 ffff960c`1e03b778 : pcw!PCW_QUERY::Collect+0x218
- ffff960c`1e03b6a0 fffff807`667a6b6a : ffffd20e`61c048d0 00000000`00000004 00000000`00000008 00000000`00000003 : pcw!PcwpIoctlCollect+0x63
- ffff960c`1e03b6d0 fffff807`6269f15e : 00000000`0001e368 ffff860c`a31b5770 00000000`00000000 00000000`00000000 : pcw!PcwpFastIoDeviceControl+0x15a
- ffff960c`1e03b750 fffff807`6269ece6 : 000000f0`991fe108 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x45e
- ffff960c`1e03b940 fffff807`6242d505 : 00000000`00000000 ffffd20e`252bb700 ffff860c`00000000 ffff860c`968b72f0 : nt!NtDeviceIoControlFile+0x56
- ffff960c`1e03b9b0 00007ffa`adc50d34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 000000f0`991fddd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`adc50d34
- STACK_COMMAND: .process /r /p 0xffefffffffffffff; .cxr 0xffff960c1e03aa30 ; kb
- SYMBOL_NAME: pcw!_PCW_INSTANCE::Release+4f
- MODULE_NAME: pcw
- IMAGE_NAME: pcw.sys
- IMAGE_VERSION: 10.0.22621.4034
- BUCKET_ID_FUNC_OFFSET: 4f
- FAILURE_BUCKET_ID: AV_pcw!_PCW_INSTANCE::Release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {a15fca40-7a8e-f8a1-56d8-18bb28de2ae7}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement