Using EvtQuery API in parallel threads is blocking each other
I am trying to read evtx logs from different machines using EvtQuery API. Each thread will be querying a machine in parallel. But I can observe that all the threads are blocked when the EvtQuery API is called due to an internal critical section wait. This can be observed visibly when a querying machine is not reachable.
Is this an expected behavior, or am I doing any mistake? Please help.
Code:
EVT_HANDLE OpenRemoteSession(LPWSTR lpwszRemote)
{
EVT_HANDLE hRemote = NULL;
EVT_RPC_LOGIN Credentials;
RtlZeroMemory(&Credentials, sizeof(EVT_RPC_LOGIN));
Credentials.Server = lpwszRemote;
Credentials.Domain = L"greendir";
Credentials.User = L"greendir\test";
Credentials.Password = L"Test@123";
Credentials.Flags = EvtRpcLoginAuthNegotiate;
hRemote = EvtOpenSession(EvtRpcLogin, &Credentials, 0, 0);
if (hRemote == NULL) {
printf("EvtOpenSession failed %lu", GetLastError());
}
SecureZeroMemory(&Credentials, sizeof(EVT_RPC_LOGIN));
return hRemote;
}
void ReadMachineLogs(LPWSTR lpwszRemote) {
printf("\n%ws :: Read logs - START", lpwszRemote);
EVT_HANDLE sessionHandle = OpenRemoteSession(lpwszRemote);
printf("\n%ws :: Got remote handle", lpwszRemote);
if (sessionHandle == NULL) {
printf("\n%ws :: Open remote session failed", lpwszRemote);
}
else {
DWORD flagvalues = 0x1;
wchar_t* XPathQuery = NULL;
printf("\n%ws :: GenerateXPathQuery - START", lpwszRemote);
XPathQuery = GenerateXPathQuery(L"security", L"0");
printf("\n%ws :: GenerateXPathQuery - END", lpwszRemote);
printf("\n%ws :: EvtQuery - START", lpwszRemote);
EvtQuery(sessionHandle, L"security", XPathQuery, flagvalues);
printf("\n%ws :: EvtQuery - END", lpwszRemote);
}
//printf("\n%ws :: Read logs - END", lpwszRemote);
}
int main(int argc, char* argv[])
{
LPWSTR list[] = { L"orange-pc", L"apple-pc", L"mango-pc", L"papaya-pc" };
std::thread t1(ReadMachineLogs, list[0]);
std::thread t2(ReadMachineLogs, list[1]);
std::thread t3(ReadMachineLogs, list[2]);
std::thread t4(ReadMachineLogs, list[3]);
t1.join();
t2.join();
t3.join();
t4.join();
return 0;
}
Dump:
0:000> !locks
CritSec wevtapi!g_objectTable+0 at 00007ffac93e6960
WaiterWoken No
LockCount 3
RecursionCount 1
OwningThread 2eec
EntryCount 0
ContentionCount 7
*** Locked
Scanned 14 critical sections
0:000> ~*kv
. 0 Id: 6bf8.32e8 Suspend: 1 Teb: 00000067`4b0a1000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b2ff8a8 00007ffa
cca81e93 : 0000e189125ce14c 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!NtWaitForSingleObject+0x14
01 000000674b2ff8b0 00007ffa
ab832bcf : 0000000000000000 00007ff7
e864cb70 0000000000000000 00000000
00000290 : KERNELBASE!WaitForSingleObjectEx+0x93
02 000000674b2ff950 00007ff7
e864940d : 0000000000000000 00000000
00000000 0000000000007590 00007ff7
00000002 : msvcp140!_Thrd_join+0x1f [d:\agent_work\2\s\src\vctools\crt\github\stl\src\cthread.cpp @ 56]
03 (Inline Function) ---------------- : --------
-------- ---------------- --------
-------- ---------------- : EvtBugDebug!std::thread::join+0x2d (Inline Function @ 00007ff7
e864940d) [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\thread @ 113]
04 000000674b2ff980 00007ff7
e864a220 : 000001d160817ec0 000001d1
60808280 000001d16081c290 00000000
00000000 : EvtBugDebug!main+0x16d [D:\EvtBugDebugMain.cpp @ 294]
05 (Inline Function) ---------------- : --------
-------- ---------------- --------
-------- ---------------- : EvtBugDebug!invoke_main+0x22 (Inline Function @ 00007ff7
e864a220) [D:\agent_work\9\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 78]
06 000000674b2ffa10 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : EvtBugDebug!__scrt_common_main_seh+0x10c [D:\agent_work\9\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 288]
07 000000674b2ffa50 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
08 000000674b2ffa80 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
1 Id: 6bf8.4180 Suspend: 1 Teb: 00000067`4b0a5000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b4ff758 00007ffa
cf713fe0 : 0000000000000000 00000000
00000000 000001d1607ed810 00000000
00000006 : ntdll!NtWaitForWorkViaWorkerFactory+0x14
01 000000674b4ff760 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!TppWorkerThread+0x300
02 000000674b4ffb20 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
03 000000674b4ffb50 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
2 Id: 6bf8.7410 Suspend: 1 Teb: 00000067`4b0a7000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b5ff938 00007ffa
cf713fe0 : 0000000000000000 00000000
00000000 000001d1607ed810 00000000
00000008 : ntdll!NtWaitForWorkViaWorkerFactory+0x14
01 000000674b5ff940 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!TppWorkerThread+0x300
02 000000674b5ffd00 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
03 000000674b5ffd30 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
3 Id: 6bf8.147c Suspend: 1 Teb: 00000067`4b0a9000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b6ff578 00007ffa
cf713fe0 : 0000006700000002 00000067
4b0a0000 000001d1607ed810 00000000
00000000 : ntdll!NtWaitForWorkViaWorkerFactory+0x14
01 000000674b6ff580 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!TppWorkerThread+0x300
02 000000674b6ff940 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
03 000000674b6ff970 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
4 Id: 6bf8.7e4c Suspend: 1 Teb: 00000067`4b0ab000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b3ff388 00007ffa
cf6e7619 : 00000000000007b7 000001d1
607e0000 000000674b3ff468 00007ffa
cf7260b9 : ntdll!NtWaitForAlertByThreadId+0x14
01 000000674b3ff390 00007ffa
cf6e74d2 : 0000000000000000 00000000
00000000 000000674b3ff478 00007ffa
c93e6968 : ntdll!RtlpWaitOnAddressWithTimeout+0x81
02 000000674b3ff3c0 00007ffa
cf6e72fd : 00007ffac93e6960 00000000
00001722 0000000000000000 000001d1
607e0000 : ntdll!RtlpWaitOnAddress+0xae
03 000000674b3ff430 00007ffa
cf6fb576 : 00007ffacc98a4f0 00000000
00007e4c 00000000fffffff6 00000000
00000000 : ntdll!RtlpWaitOnCriticalSection+0xfd
04 000000674b3ff510 00007ffa
cf6fb3c0 : 0000000000000000 00000067
4b3ff660 000000674b3ff688 00000000
00000000 : ntdll!RtlpEnterCriticalSectionContended+0x1a6
05 000000674b3ff570 00007ffa
c939a761 : 0000000000000001 00007ffa
c9399626 0000000000000000 00000067
4b3ff698 : ntdll!RtlEnterCriticalSection+0x40
06 000000674b3ff5a0 00007ffa
c939a8fe : 00007ffac93e6960 00000067
4b3ff688 000001d160837460 00000000
00000002 : wevtapi!HandleTable::Emplace<QueryResult,wmi::AutoRef<Session> &,wchar_t const * &,wchar_t const * &,unsigned long &>+0x45
07 000000674b3ff610 00007ffa
c939426d : 000001d160819030 00000000
00000002 0000000000000000 00000000
00000000 : wevtapi!ObjectTable::EmplaceObject<QueryResult,wmi::AutoRef<Session> & __ptr64,wchar_t const * __ptr64 & __ptr64,wchar_t const * __ptr64 & __ptr64,unsigned long & __ptr64>+0x2a
08 000000674b3ff650 00007ff7
e8649277 : 00007ff7e867fdf8 00007ff7
e867fe30 000000674b3ff658 00000067
4b3ff701 : wevtapi!EvtQuery+0xed
09 000000674b3ff7c0 00007ff7
e864959f : 0000000000000000 000001d1
6081c6d0 0000000000000000 00000000
00000000 : EvtBugDebug!ReadMachineLogs+0x147 [D:\EvtBugDebugMain.cpp @ 282]
0a (Inline Function) ---------------- : --------
-------- ---------------- --------
-------- ---------------- : EvtBugDebug!std::invoke+0x6 (Inline Function @ 00007ff7
e864959f) [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\type_traits @ 1607]
0b 000000674b3ff830 00007ffa
cc8c0e82 : 0000000000000000 000001d1
608064a0 0000000000000000 00000000
00000000 : EvtBugDebug!std::thread::_Invoke<std::tuple<void (__cdecl*)(wchar_t *),wchar_t >,0,1>+0xf [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\thread @ 44]
0c 000000674b3ff860 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ucrtbase!thread_start<unsigned int (__cdecl)(void *),1>+0x42
0d 000000674b3ff890 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
0e 000000674b3ff8c0 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
5 Id: 6bf8.2eec Suspend: 1 Teb: 00000067`4b0ad000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b7fd808 00007ffa
cca81e93 : 000000674b7fdb30 00000000
00000000 0000b347689ee08f 00000000
00000010 : ntdll!NtWaitForSingleObject+0x14
01 000000674b7fd810 00007ffa
ce7b1219 : 000000000000035c 000001d1
6084ab88 0000000000000000 00000000
000002a8 : KERNELBASE!WaitForSingleObjectEx+0x93
02 000000674b7fd8b0 00007ffa
ce7af917 : 00000000000000e2 000001d1
6084a9a0 0000000000000000 00000000
00000123 : rpcrt4!WS_OpenEx+0x2d9
03 000000674b7fda60 00007ffa
ce7af7d8 : 0000000000000000 00000067
4b7fde30 000001d1608279d6 00000000
00000000 : rpcrt4!TCPOrHTTP_Open+0x127
04 000000674b7fdca0 00007ffa
ce7877f2 : 0000000000000000 00000000
00000001 000001d1607f91c0 00007ffa
ce769a95 : rpcrt4!TCP_Open+0xa8
05 000000674b7fdd10 00007ffa
ce7873e8 : 0000000000000000 000001d1
6084a9b0 000000674b7fde00 000001d1
6084a6a0 : rpcrt4!OSF_CCONNECTION::TransOpen+0xd6
06 000000674b7fddb0 00007ffa
ce787150 : 000001d16084af30 000001d1
6084a6a0 0000000000000000 000001d1
607f91c0 : rpcrt4!OSF_CCONNECTION::OpenConnectionAndBind+0x148
07 000000674b7fde60 00007ffa
ce7693d1 : 000001d16084a830 00000000
00000001 000001d16084a6a0 000001d1
6084a6f0 : rpcrt4!OSF_CCALL::BindToServer+0xdc
08 000000674b7fdf00 00007ffa
ce769206 : 0000000000000000 00000067
4b7fe060 000001d16084a6f0 000001d1
00000000 : rpcrt4!OSF_BINDING_HANDLE::InitCCallWithAssociation+0xa5
09 000000674b7fdf60 00007ffa
ce768bd7 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : rpcrt4!OSF_BINDING_HANDLE::AllocateCCall+0x256
0a 000000674b7fe0c0 00007ffa
ce818edf : 000000674b7fe4a0 00000000
00000000 000001d16084af30 00000000
00000000 : rpcrt4!OSF_BINDING_HANDLE::NegotiateTransferSyntax+0x37
0b 000000674b7fe110 00007ffa
ce818161 : 00007fface823c90 00000000
00000003 0000000000000000 00007ffa
ce81ed80 : rpcrt4!NdrpClientCall3+0x6df
0c 000000674b7fe470 00007ffa
ce766819 : 000001d16084a6a0 00000067
4b7fe8a0 0000000000000000 000001d1
6084a6a0 : rpcrt4!NdrClientCall3+0xf1
0d 000000674b7fe800 00007ffa
ce766609 : 000001d16084a310 00000000
00000000 0000000000000000 00000000
00000000 : rpcrt4!EP_LOOKUP_DATA::LookupNextChunk+0x115
0e 000000674b7fe8d0 00007ffa
ce79e2e5 : 000001d16081eb90 000001d1
6081c830 000001d160827950 00000000
00000000 : rpcrt4!EP_LOOKUP_DATA::ResolveEndpoint+0x191
0f 000000674b7fe970 00007ffa
ce7aef3e : 000001d16081eb80 00000000
00000000 0000000000000000 00000000
00000000 : rpcrt4!ResolveEndpointWithEpMapper+0x95
10 000000674b7fe9e0 00007ffa
ce7ed0b0 : 0000000000000000 00000067
4b7febb0 00007ffac93d1640 000001d1
607fd8b8 : rpcrt4!OSF_BINDING_HANDLE::ResolveBindingWorker+0xc6
11 000000674b7fea80 00007ffa
ce7c4bf4 : 0000000000000000 00000000
00000000 0000000000000000 000001d1
607fd8b8 : rpcrt4!OSF_BINDING_HANDLE::ResolveEndpointWithEpMapper+0x58
12 000000674b7feab0 00007ffa
ce768bd7 : 00007ffacc48e070 00000000
00000000 0000000000000000 000001d1
607fe530 : rpcrt4!OSF_BINDING_HANDLE::AllocateCCall+0x5bc44
13 000000674b7fec10 00007ffa
ce818edf : 000000674b7feff0 00000000
00000000 00007ffa00000000 00000067
4b7feda0 : rpcrt4!OSF_BINDING_HANDLE::NegotiateTransferSyntax+0x37
14 000000674b7fec60 00007ffa
ce818161 : 00007ffac93d1500 00000000
00000005 0000000000000000 00007ffa
c93d10e8 : rpcrt4!NdrpClientCall3+0x6df
15 000000674b7fefc0 00007ffa
c939a558 : 00000000d80005dd ffffffff
ffffffff 0000000000000000 000001d1
607fd800 : rpcrt4!NdrClientCall3+0xf1
16 000000674b7ff350 00007ffa
c939a7e0 : 0000006700000003 00000067
4b7ff5c8 00007ffac93e6988 00000000
00000000 : wevtapi!QueryResult::QueryResult+0x12c
17 000000674b7ff4e0 00007ffa
c939a8fe : 00007ffac93e6960 00000067
4b7ff5c8 000001d16082f4c0 00000000
00000001 : wevtapi!HandleTable::Emplace<QueryResult,wmi::AutoRef<Session> &,wchar_t const * &,wchar_t const * &,unsigned long &>+0xc4
18 000000674b7ff550 00007ffa
c939426d : 000001d160818c90 00000000
00000001 00000000000003ff 00000000
000065a0 : wevtapi!ObjectTable::EmplaceObject<QueryResult,wmi::AutoRef<Session> & __ptr64,wchar_t const * __ptr64 & __ptr64,wchar_t const * __ptr64 & __ptr64,unsigned long & __ptr64>+0x2a
19 000000674b7ff590 00007ff7
e8649277 : 00007ff7e867fdf8 00007ff7
e867fe18 000000674b7fdb18 000001d1
6081d535 : wevtapi!EvtQuery+0xed
1a 000000674b7ff700 00007ff7
e864959f : 0000000000000000 000001d1
6081c4d0 0000000000000000 00000000
00000000 : EvtBugDebug!ReadMachineLogs+0x147 [D:\EvtBugDebugMain.cpp @ 282]
1b (Inline Function) ---------------- : --------
-------- ---------------- --------
-------- ---------------- : EvtBugDebug!std::invoke+0x6 (Inline Function @ 00007ff7
e864959f) [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\type_traits @ 1607]
1c 000000674b7ff770 00007ffa
cc8c0e82 : 000001d160806680 00000000
00000000 0000000000000000 00000000
00000000 : EvtBugDebug!std::thread::_Invoke<std::tuple<void (__cdecl*)(wchar_t *),wchar_t >,0,1>+0xf [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\thread @ 44]
1d 000000674b7ff7a0 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ucrtbase!thread_start<unsigned int (__cdecl)(void *),1>+0x42
1e 000000674b7ff7d0 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
1f 000000674b7ff800 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
6 Id: 6bf8.7804 Suspend: 1 Teb: 00000067`4b0af000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b8ff968 00007ffa
cf6e7619 : 00000000000007dd 000001d1
d30004d7 000001d1607eb350 00007ffa
cf7265d3 : ntdll!NtWaitForAlertByThreadId+0x14
01 000000674b8ff970 00007ffa
cf6e74d2 : 0000000000000000 00000000
00000000 000000674b8ffa58 00007ffa
c93e6968 : ntdll!RtlpWaitOnAddressWithTimeout+0x81
02 000000674b8ff9a0 00007ffa
cf6e72fd : 00007ffac93e6960 00000000
00001722 0000000000000000 000001d1
607e0000 : ntdll!RtlpWaitOnAddress+0xae
03 000000674b8ffa10 00007ffa
cf6fb576 : 0000000000000001 00000000
000003ff 00000000fffffff2 000001d1
6083dfa0 : ntdll!RtlpWaitOnCriticalSection+0xfd
04 000000674b8ffaf0 00007ffa
cf6fb3c0 : 00000000000003ff 00000067
4b8ffc40 000000674b8ffc68 00000000
00000000 : ntdll!RtlpEnterCriticalSectionContended+0x1a6
05 000000674b8ffb50 00007ffa
c939a761 : 0000000000000001 00007ffa
c9399626 0000000000000000 00000067
4b8ffc78 : ntdll!RtlEnterCriticalSection+0x40
06 000000674b8ffb80 00007ffa
c939a8fe : 00007ffac93e6960 00000067
4b8ffc68 000001d16084b200 00000000
00000004 : wevtapi!HandleTable::Emplace<QueryResult,wmi::AutoRef<Session> &,wchar_t const * &,wchar_t const * &,unsigned long &>+0x45
07 000000674b8ffbf0 00007ffa
c939426d : 000001d1607f7000 00000000
00000004 00000000000003ff 00000000
000065a0 : wevtapi!ObjectTable::EmplaceObject<QueryResult,wmi::AutoRef<Session> & __ptr64,wchar_t const * __ptr64 & __ptr64,wchar_t const * __ptr64 & __ptr64,unsigned long & __ptr64>+0x2a
08 000000674b8ffc30 00007ff7
e8649277 : 00007ff7e867fdf8 00007ff7
e867fe60 000000674b8fe1b8 000001d1
6081d535 : wevtapi!EvtQuery+0xed
09 000000674b8ffda0 00007ff7
e864959f : 0000000000000000 000001d1
6081c1d0 0000000000000000 00000000
00000000 : EvtBugDebug!ReadMachineLogs+0x147 [D:\EvtBugDebugMain.cpp @ 282]
0a (Inline Function) ---------------- : --------
-------- ---------------- --------
-------- ---------------- : EvtBugDebug!std::invoke+0x6 (Inline Function @ 00007ff7
e864959f) [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\type_traits @ 1607]
0b 000000674b8ffe10 00007ffa
cc8c0e82 : 0000000000000000 000001d1
608062f0 0000000000000000 00000000
00000000 : EvtBugDebug!std::thread::_Invoke<std::tuple<void (__cdecl*)(wchar_t *),wchar_t >,0,1>+0xf [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\thread @ 44]
0c 000000674b8ffe40 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ucrtbase!thread_start<unsigned int (__cdecl)(void *),1>+0x42
0d 000000674b8ffe70 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
0e 000000674b8ffea0 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
7 Id: 6bf8.7590 Suspend: 1 Teb: 00000067`4b0b1000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674b9ff9d8 00007ffa
cf6e7619 : 0000000000000826 000001d1
d30004d7 000001d1607eb350 00007ffa
cf7265d3 : ntdll!NtWaitForAlertByThreadId+0x14
01 000000674b9ff9e0 00007ffa
cf6e74d2 : 0000000000000000 00000000
00000000 000000674b9ffac8 00007ffa
c93e6968 : ntdll!RtlpWaitOnAddressWithTimeout+0x81
02 000000674b9ffa10 00007ffa
cf6e72fd : 00007ffac93e6960 00000000
00001722 0000000000000000 000001d1
607e0000 : ntdll!RtlpWaitOnAddress+0xae
03 000000674b9ffa80 00007ffa
cf6fb576 : 00007ffacc98a4f0 00000000
00007590 00000000fffffff2 00000000
00000000 : ntdll!RtlpWaitOnCriticalSection+0xfd
04 000000674b9ffb60 00007ffa
cf6fb3c0 : 0000000000000000 00000067
4b9ffcb0 000000674b9ffcd8 00000000
00000000 : ntdll!RtlpEnterCriticalSectionContended+0x1a6
05 000000674b9ffbc0 00007ffa
c939a761 : 0000000000000001 00007ffa
c9399626 0000000000000000 00000067
4b9ffce8 : ntdll!RtlEnterCriticalSection+0x40
06 000000674b9ffbf0 00007ffa
c939a8fe : 00007ffac93e6960 00000067
4b9ffcd8 000001d160843d70 00000000
00000003 : wevtapi!HandleTable::Emplace<QueryResult,wmi::AutoRef<Session> &,wchar_t const * &,wchar_t const * &,unsigned long &>+0x45
07 000000674b9ffc60 00007ffa
c939426d : 000001d1607f3b10 00000000
00000003 0000000000000000 00000000
00000000 : wevtapi!ObjectTable::EmplaceObject<QueryResult,wmi::AutoRef<Session> & __ptr64,wchar_t const * __ptr64 & __ptr64,wchar_t const * __ptr64 & __ptr64,unsigned long & __ptr64>+0x2a
08 000000674b9ffca0 00007ff7
e8649277 : 00007ff7e867fdf8 00007ff7
e867fe48 000000674b9fe228 000001d1
6081d536 : wevtapi!EvtQuery+0xed
09 000000674b9ffe10 00007ff7
e864959f : 0000000000000000 000001d1
6081c290 0000000000000000 00000000
00000000 : EvtBugDebug!ReadMachineLogs+0x147 [D:\EvtBugDebugMain.cpp @ 282]
0a (Inline Function) ---------------- : --------
-------- ---------------- --------
-------- ---------------- : EvtBugDebug!std::invoke+0x6 (Inline Function @ 00007ff7
e864959f) [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\type_traits @ 1607]
0b 000000674b9ffe80 00007ffa
cc8c0e82 : 0000000000000000 000001d1
607feb60 0000000000000000 00000000
00000000 : EvtBugDebug!std::thread::_Invoke<std::tuple<void (__cdecl*)(wchar_t *),wchar_t >,0,1>+0xf [D:\IApps\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.27.29110\include\thread @ 44]
0c 000000674b9ffeb0 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ucrtbase!thread_start<unsigned int (__cdecl)(void *),1>+0x42
0d 000000674b9ffee0 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
0e 000000674b9fff10 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
8 Id: 6bf8.2190 Suspend: 0 Teb: 00000067`4b0b3000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674baff648 00007ffa
cf713fe0 : 0000000000000000 00000000
00000000 000001d160852d60 00000000
00000009 : ntdll!NtWaitForWorkViaWorkerFactory+0x14
01 000000674baff650 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!TppWorkerThread+0x300
02 000000674baffa10 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
03 000000674baffa40 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21
9 Id: 6bf8.7ae4 Suspend: 0 Teb: 00000067`4b0b5000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00 000000674bbff898 00007ffa
cf713fe0 : 0000006700000002 00000067
4b0a0000 000001d160852d60 00000000
00000000 : ntdll!NtWaitForWorkViaWorkerFactory+0x14
01 000000674bbff8a0 00007ffa
ce5b7bd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!TppWorkerThread+0x300
02 000000674bbffc60 00007ffa
cf74ce51 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : kernel32!BaseThreadInitThunk+0x14
03 000000674bbffc90 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!RtlUserThreadStart+0x21