Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 36
- Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\Chris\AppData\Local\Temp\DCS (2).DMP]
- User Mini Dump File with Full Memory: Only application data is available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Version 19045 MP (12 procs) Free x64
- Product: WinNt, suite: SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Debug session time: Mon Jan 29 13:25:40.000 2024 (UTC - 8:00)
- System Uptime: 0 days 0:14:08.184
- Process Uptime: 0 days 0:00:09.000
- ................................................................
- ................................................................
- ..........................
- +------------------------------------------------------------------------+
- | This target supports Hardware-enforced Stack Protection. A HW based |
- | "Shadow Stack" may be available to assist in debugging and analysis. |
- | See aka.ms/userhsp for more info. |
- | |
- | dps @ssp |
- | |
- +------------------------------------------------------------------------+
- For analysis of this file, run !analyze -v
- DCS!SW+0x74ec35:
- 00007ff6`0273f6d5 0fbe0428 movsx eax,byte ptr [rax+rbp] ds:00007ff6`02c176b6=05
- 0:000> !analyze -v
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 843
- Key : Analysis.Elapsed.mSec
- Value: 9965
- Key : Analysis.IO.Other.Mb
- Value: 5
- Key : Analysis.IO.Read.Mb
- Value: 29
- Key : Analysis.IO.Write.Mb
- Value: 67
- Key : Analysis.Init.CPU.mSec
- Value: 265
- Key : Analysis.Init.Elapsed.mSec
- Value: 10101
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 108
- Key : Failure.Bucket
- Value: BREAKPOINT_80000003_DCS.exe!Unknown
- Key : Failure.Hash
- Value: {6c8c440b-eaea-0435-9fd3-d1c4f6008018}
- Key : Timeline.OS.Boot.DeltaSec
- Value: 848
- Key : Timeline.Process.Start.DeltaSec
- Value: 9
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Version
- Value: 10.0.19041.1
- Key : WER.Process.Version
- Value: 2.9.2.49940
- FILE_IN_CAB: DCS (2).DMP
- NTGLOBALFLAG: 0
- PROCESS_BAM_CURRENT_THROTTLED: 0
- PROCESS_BAM_PREVIOUS_THROTTLED: 0
- APPLICATION_VERIFIER_FLAGS: 0
- EXCEPTION_RECORD: (.exr -1)
- ExceptionAddress: 0000000000000000
- ExceptionCode: 80000003 (Break instruction exception)
- ExceptionFlags: 00000000
- NumberParameters: 0
- FAULTING_THREAD: 0000101c
- PROCESS_NAME: DCS.exe
- ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
- EXCEPTION_CODE_STR: 80000003
- STACK_TEXT:
- 000000d7`3e2fea90 00007ff6`0273ef76 : 00000000`00000000 0000020d`e5676040 0000020d`e4694d30 0000020d`e46a0ce0 : DCS!SW+0x74ec35
- 000000d7`3e2feaf0 00007ff6`0273d345 : 000000d7`3e2febb0 0000020d`e5676040 00000000`000ace15 0000020d`e48c5577 : DCS!SW+0x74e4d6
- 000000d7`3e2feb50 00007ff6`0273bdaf : 00000000`00000000 00000000`0022c909 00000000`00000001 00000000`00000000 : DCS!SW+0x74c8a5
- 000000d7`3e2febf0 00007ff6`0436ebbd : 0000020d`e4371500 000000d7`3e2ff1c0 0000020d`e45dc690 0000020d`e4371500 : DCS!SW+0x74b30f
- 000000d7`3e2fec50 00007ff6`0436dcb5 : 0000020d`e4371500 0000020d`00000000 00007ff6`0276c4a0 00000000`00000000 : DCS!AmdPowerXpressRequestHighPerformance+0x13e9bb9
- 000000d7`3e2ff0c0 00007ff6`04368f21 : 00000000`0000fffd 00000000`00000206 0000020d`e43714c0 00000000`00000003 : DCS!AmdPowerXpressRequestHighPerformance+0x13e8cb1
- 000000d7`3e2ff450 00007ff6`0436859e : 0000020d`e43714c0 0000020d`e3d36a00 0000020d`e43714c0 0000020d`e3d36a00 : DCS!AmdPowerXpressRequestHighPerformance+0x13e3f1d
- 000000d7`3e2ff4b0 00007ff6`04357927 : 0000020d`e45db910 00000000`00000000 00000000`00000000 0000020d`e43714c0 : DCS!AmdPowerXpressRequestHighPerformance+0x13e359a
- 000000d7`3e2ff4f0 00007ff6`028145ee : 00000000`0000000a 00000000`00000000 00000000`00000000 00000000`00000000 : DCS!AmdPowerXpressRequestHighPerformance+0x13d2923
- 000000d7`3e2ffce0 00007ffd`9e477344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : DCS!SW+0x823b4e
- 000000d7`3e2ffd20 00007ffd`a00426b1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
- 000000d7`3e2ffd50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
- STACK_COMMAND: ~0s; .ecxr ; kb
- SYMBOL_NAME: dcs+74ec35
- MODULE_NAME: DCS
- IMAGE_NAME: DCS.exe
- FAILURE_BUCKET_ID: BREAKPOINT_80000003_DCS.exe!Unknown
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- IMAGE_VERSION: 2.9.2.49940
- FAILURE_ID_HASH: {6c8c440b-eaea-0435-9fd3-d1c4f6008018}
- Followup: MachineOwner
- ---------
- 0:000> .exr -1
- ExceptionAddress: 0000000000000000
- ExceptionCode: 80000003 (Break instruction exception)
- ExceptionFlags: 00000000
- NumberParameters: 0
Advertisement
Add Comment
Please, Sign In to add comment