Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 43
- Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\040725-12515-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 26100 MP (16 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Kernel base = 0xfffff802`db000000 PsLoadedModuleList = 0xfffff802`dbef4920
- Debug session time: Mon Apr 7 11:33:35.040 2025 (UTC + 1:00)
- System Uptime: 0 days 15:58:09.469
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ........................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00000017`82a51018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ........................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff802`db4b54f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffda01`4646db50=0000000000000133
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement