************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToV8JsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41 Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\031324-9875-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff807`63a00000 PsLoadedModuleList = 0xfffff807`6462a770 Debug session time: Wed Mar 13 10:16:46.433 2024 (UTC - 3:00) System Uptime: 0 days 0:06:35.034 Loading Kernel Symbols ............................................................... ................................................................ ....................................................... Loading User Symbols Loading unloaded module list ..... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`63dfd5b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8000`0ad818f0=000000000000001e 12: kd> !analyze -v 06 ffffc288`6db26df0 ffffffff`b8797400 0xffffc80f`8ab8ee8f rax=0000000080040031 rbx=fffff80763d5ab14 rcx=0000000000000028 rdx=ffff80000ad28180 rsi=ffffc2886db27c50 rdi=b3b713ee6efe8dbe rip=ffffc80f8ab8ee8f rsp=ffffc2886db26df0 rbp=ffffc2886db26ef0 r8=0000000000000002 r9=ffffc80f8ab7901e r10=ffffc80f8ab790e6 r11=0000000000000000 r12=0000000080050031 r13=0000000000000001 r14=a3a007681c804506 r15=ffffc80f8a338140 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246 ffffc80f`8ab8ee8f 0f22c0 mov cr0,rax 06 ffffc288`6db26df0 ffffffff`b8797400 0xffffc80f`8ab8ee8f rax=0000000080040031 rbx=fffff80763d5ab14 rcx=0000000000000028 rdx=ffff80000ad28180 rsi=ffffc2886db27c50 rdi=b3b713ee6efe8dbe rip=ffffc80f8ab8ee8f rsp=ffffc2886db26df0 rbp=ffffc2886db26ef0 r8=0000000000000002 r9=ffffc80f8ab7901e r10=ffffc80f8ab790e6 r11=0000000000000000 r12=0000000080050031 r13=0000000000000001 r14=a3a007681c804506 r15=ffffc80f8a338140 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246 ffffc80f`8ab8ee8f 0f22c0 mov cr0,rax ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000096, The exception code that was not handled Arg2: ffffc80f8ab8ee8f, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: ExceptionRecord *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: ContextRecord *** *** *** ************************************************************************* *** WARNING: Check Image - Checksum mismatch - Dump: 0xea618, File: 0xe97fc - C:\ProgramData\Dbg\sym\dxgmms2.sys\E9794555e1000\dxgmms2.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3139 Key : Analysis.Elapsed.mSec Value: 8958 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 1 Key : Analysis.Init.CPU.mSec Value: 437 Key : Analysis.Init.Elapsed.mSec Value: 37063 Key : Analysis.Memory.CommitPeak.Mb Value: 96 Key : Bugcheck.Code.LegacyAPI Value: 0x1e Key : Bugcheck.Code.TargetModel Value: 0x1e Key : Failure.Bucket Value: 0x1E_C0000096_nt!KiDispatchException Key : Failure.Hash Value: {505cfaff-0bdc-8a96-0650-5a81952f0ba1} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000096 BUGCHECK_P2: ffffc80f8ab8ee8f BUGCHECK_P3: 0 BUGCHECK_P4: 0 FILE_IN_CAB: 031324-9875-01.dmp EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffff8000`0ad818e8 fffff807`63e7a67b : 00000000`0000001e ffffffff`c0000096 ffffc80f`8ab8ee8f 00000000`00000000 : nt!KeBugCheckEx ffff8000`0ad818f0 fffff807`63dfe6e2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x14130b ffff8000`0ad81fb0 fffff807`63dfe6b0 : fffff807`63e11ae5 00000000`00000003 000001f7`0e800000 ffffab55`807dc398 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffc288`6db26a78 fffff807`63e11ae5 : 00000000`00000003 000001f7`0e800000 ffffab55`807dc398 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue ffffc288`6db26a80 fffff807`63e0cfda : 00000000`00000200 ffffc80f`9c9b4080 00000000`79517350 ffffc288`6db26c90 : nt!KiExceptionDispatch+0x125 ffffc288`6db26c60 ffffc80f`8ab8ee8f : ffffffff`b8797400 00000000`00000001 ffffc80f`8ab7901e ffffffff`b8797400 : nt!KiGeneralProtectionFault+0x31a ffffc288`6db26df0 ffffffff`b8797400 : 00000000`00000001 ffffc80f`8ab7901e ffffffff`b8797400 00000000`00000000 : 0xffffc80f`8ab8ee8f ffffc288`6db26df8 00000000`00000001 : ffffc80f`8ab7901e ffffffff`b8797400 00000000`00000000 fffff807`63cb4d41 : 0xffffffff`b8797400 ffffc288`6db26e00 ffffc80f`8ab7901e : ffffffff`b8797400 00000000`00000000 fffff807`63cb4d41 ffffc80f`98f34230 : 0x1 ffffc288`6db26e08 ffffffff`b8797400 : 00000000`00000000 fffff807`63cb4d41 ffffc80f`98f34230 ffffc288`6db27910 : 0xffffc80f`8ab7901e ffffc288`6db26e10 00000000`00000000 : fffff807`63cb4d41 ffffc80f`98f34230 ffffc288`6db27910 00004f50`00000000 : 0xffffffff`b8797400 SYMBOL_NAME: nt!KiDispatchException+14130b MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.4046 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 14130b FAILURE_BUCKET_ID: 0x1E_C0000096_nt!KiDispatchException OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {505cfaff-0bdc-8a96-0650-5a81952f0ba1} Followup: MachineOwner ---------