Microsoft (R) Windows Debugger Version 10.0.27704.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\101624-8546-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff803`6d200000 PsLoadedModuleList = 0xfffff803`6de2a290
Debug session time: Wed Oct 16 15:05:42.662 2024 (UTC + 8:00)
System Uptime: 0 days 6:14:19.604
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00342018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`6d5f8fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc588`af48f410=000000000000003b
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff803a51d811c, Address of the instruction which caused the BugCheck
Arg3: ffffc588af48fd10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.