pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


Crash installing Visual Studio Code on N:
Posted by Anonymous on Thu 4th Sep 2025 12:06
raw | new post

  1. Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Windows\MEMORY.DMP]
  6. Kernel Bitmap Dump File: Full address space is available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 10 Kernel Version 19041 MP (8 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Built by: 19041.1.amd64fre.vb_release.191206-1406
  13. Machine Name:
  14. Kernel base = 0xfffff800`1c400000 PsLoadedModuleList = 0xfffff800`1d02a3b0
  15. Debug session time: Thu Sep  4 12:59:18.229 2025 (UTC + 2:00)
  16. System Uptime: 0 days 0:04:08.443
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ................................................................
  21.  
  22. Loading User Symbols
  23. ................................................................
  24. ..............
  25. Loading unloaded module list
  26. .....................................
  27. For analysis of this file, run !analyze -v
  28. 6: kd> !analyze -v
  29. *******************************************************************************
  30. *                                                                             *
  31. *                        Bugcheck Analysis                                    *
  32. *                                                                             *
  33. *******************************************************************************
  34.  
  35. MEMORY_MANAGEMENT (1a)
  36.     # Any other values for parameter 1 must be individually examined.
  37. Arguments:
  38. Arg1: 0000000000041791, The subtype of the bugcheck.
  39. Arg2: ffff960005808840
  40. Arg3: ffffb58049042c30
  41. Arg4: 0000000000010001
  42.  
  43. Debugging Details:
  44. ------------------
  45.  
  46.  
  47. KEY_VALUES_STRING: 1
  48.  
  49.     Key  : Analysis.CPU.Sec
  50.     Value: 3
  51.  
  52.     Key  : Analysis.DebugAnalysisProvider.CPP
  53.     Value: Create: 8007007e on WINGRENDEL02
  54.  
  55.     Key  : Analysis.DebugData
  56.     Value: CreateObject
  57.  
  58.     Key  : Analysis.DebugModel
  59.     Value: CreateObject
  60.  
  61.     Key  : Analysis.Elapsed.Sec
  62.     Value: 8
  63.  
  64.     Key  : Analysis.Memory.CommitPeak.Mb
  65.     Value: 82
  66.  
  67.     Key  : Analysis.System
  68.     Value: CreateObject
  69.  
  70.  
  71. BUGCHECK_CODE:  1a
  72.  
  73. BUGCHECK_P1: 41791
  74.  
  75. BUGCHECK_P2: ffff960005808840
  76.  
  77. BUGCHECK_P3: ffffb58049042c30
  78.  
  79. BUGCHECK_P4: 10001
  80.  
  81. BLACKBOXBSD: 1 (!blackboxbsd)
  82.  
  83.  
  84. BLACKBOXNTFS: 1 (!blackboxntfs)
  85.  
  86.  
  87. BLACKBOXWINLOGON: 1
  88.  
  89. PROCESS_NAME:  MsMpEng.exe
  90.  
  91. STACK_TEXT:  
  92. ffffef0f`6eb33478 fffff800`1c645169 : 00000000`0000001a 00000000`00041791 ffff9600`05808840 ffffb580`49042c30 : nt!KeBugCheckEx
  93. ffffef0f`6eb33480 fffff800`1c9f7586 : ffffef0f`6eb336c0 00000000`00000103 ffffef0f`00000002 00000000`00000000 : nt!MmUnlockPages+0xd89
  94. ffffef0f`6eb33570 fffff800`1c9f62e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCopyVirtualMemory+0x7d6
  95. ffffef0f`6eb339c0 fffff800`1c9f617b : ffffb605`0c374080 00000029`cd57d538 000001ac`4ca88020 00000029`cd57d680 : nt!MiReadWriteVirtualMemory+0x153
  96. ffffef0f`6eb33a50 fffff800`1c811505 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8000`938ec180 : nt!NtReadVirtualMemory+0x1b
  97. ffffef0f`6eb33a90 00007ff9`4b84dcd4 : 00007ff9`493cfed5 000001ac`4d68b820 00007ff9`2c8f4b68 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  98. 00000029`cd57d518 00007ff9`493cfed5 : 000001ac`4d68b820 00007ff9`2c8f4b68 00000000`00000000 000001ac`4d68b820 : ntdll!NtReadVirtualMemory+0x14
  99. 00000029`cd57d520 00007ff9`2cd1a091 : 000001ac`4d68b908 000001ac`4d68b9d8 00000207`4fdc0000 00000207`4fdc0000 : KERNELBASE!ReadProcessMemory+0x15
  100. 00000029`cd57d570 00007ff9`2c8f3d0c : 00000207`4fdc9000 000001ac`4d68b820 00000000`00009000 000001ac`4ca88020 : mpengine!MpContainerOpen+0x314e1
  101. 00000029`cd57d5d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mpengine+0x213d0c
  102.  
  103.  
  104. SYMBOL_NAME:  nt!MmUnlockPages+d89
  105.  
  106. MODULE_NAME: nt
  107.  
  108. STACK_COMMAND:  .thread ; .cxr ; kb
  109.  
  110. IMAGE_NAME:  memory_corruption
  111.  
  112. BUCKET_ID_FUNC_OFFSET:  d89
  113.  
  114. FAILURE_BUCKET_ID:  0x1a_41791_nt!MmUnlockPages
  115.  
  116. OS_VERSION:  10.0.19041.1
  117.  
  118. BUILDLAB_STR:  vb_release
  119.  
  120. OSPLATFORM_TYPE:  x64
  121.  
  122. OSNAME:  Windows 10
  123.  
  124. FAILURE_ID_HASH:  {257cd050-e4e1-a6f4-7c65-0c6aaef71f68}
  125.  
  126. Followup:     MachineOwner

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at