************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 43 Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Tizian\Desktop\030525-18484-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff806`1f600000 PsLoadedModuleList = 0xfffff806`2022a830 Debug session time: Wed Mar 5 16:20:56.478 2025 (UTC + 1:00) System Uptime: 4 days 0:12:33.293 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .................. Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`0108c018). Type ".hh dbgerr001" for details Loading unloaded module list .................................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`1f9fe720 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff910b`083e5150=0000000000000076 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PROCESS_HAS_LOCKED_PAGES (76) Caused by a driver not cleaning up correctly after an I/O. Arguments: Arg1: 0000000000000000, Locked memory pages found in process being terminated. Arg2: ffffa68c01652340, Process address. Arg3: 0000000000000001, Number of locked pages. Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not. Issue a !search over all of physical memory for the current process pointer. This will yield at least one MDL which points to it. Then do another !search for each MDL found, this will yield the IRP(s) that point to it, revealing which driver is leaking the pages. Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system will save stack traces so the guilty driver can be easily identified. When you enable this flag, if the driver commits the error again you will see a different BugCheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) - which can identify the offending driver(s). Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 687 Key : Analysis.Elapsed.mSec Value: 1150 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 140 Key : Analysis.Init.Elapsed.mSec Value: 11148 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Analysis.Version.DbgEng Value: 10.0.27793.1000 Key : Analysis.Version.Description Value: 10.2410.02.02 amd64fre Key : Analysis.Version.Ext Value: 1.2410.2.2 Key : Bugcheck.Code.LegacyAPI Value: 0x76 Key : Bugcheck.Code.TargetModel Value: 0x76 Key : Failure.Bucket Value: 0x76_qemu-system-x8_nt!MmDeleteProcessAddressSpace Key : Failure.Hash Value: {3a89bb24-ed54-3a24-5e90-73f7ae26efb1} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 76 BUGCHECK_P1: 0 BUGCHECK_P2: ffffa68c01652340 BUGCHECK_P3: 1 BUGCHECK_P4: 0 FILE_IN_CAB: 030525-18484-01.dmp FAULTING_THREAD: ffffa68c0bcd6080 PROCESS_NAME: qemu-system-x8 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 STACK_TEXT: ffff910b`083e5148 fffff806`1fe094ad : 00000000`00000076 00000000`00000000 ffffa68c`01652340 00000000`00000001 : nt!KeBugCheckEx ffff910b`083e5150 fffff806`1fc6278f : ffffa68c`01652340 ffff910b`083e5210 ffffa68c`0bcd6080 ffffa68c`01652788 : nt!MmDeleteProcessAddressSpace+0x1a3e71 ffff910b`083e51a0 fffff806`1fc32c60 : ffffa68c`01652310 ffffa68c`01652310 00000000`00000000 ffffa68b`e5950d20 : nt!PspProcessDelete+0x13f ffff910b`083e5230 fffff806`1f85a1a7 : 00000000`00000000 00000000`00000000 ffff910b`083e53b9 ffffa68c`01652340 : nt!ObpRemoveObjectRoutine+0x80 ffff910b`083e5290 fffff806`1fc384c9 : ffffa68c`01652310 00000000`00000000 00000000`00000000 ffffa68c`012e8080 : nt!ObfDereferenceObjectWithTag+0xc7 ffff910b`083e52d0 fffff806`1fc3320c : 00000000`00000a08 00000000`77859150 00000000`00040286 fffff806`2001b3a9 : nt!ObCloseHandleTableEntry+0x6c9 ffff910b`083e5410 fffff806`1fa12708 : ffffa68c`0bcd6000 00000000`0c960090 ffff910b`083e5500 ffffa68c`00000000 : nt!NtClose+0xec ffff910b`083e5480 00000000`777c1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`041af078 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777c1cfc SYMBOL_NAME: nt!MmDeleteProcessAddressSpace+1a3e71 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.5486 STACK_COMMAND: .process /r /p 0xffffa68c012e8080; .thread 0xffffa68c0bcd6080 ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 1a3e71 FAILURE_BUCKET_ID: 0x76_qemu-system-x8_nt!MmDeleteProcessAddressSpace OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3a89bb24-ed54-3a24-5e90-73f7ae26efb1} Followup: MachineOwner ---------