Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\061221-8109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`2f600000 PsLoadedModuleList = 0xfffff803`3022a230
Debug session time: Sat Jun 12 14:28:27.422 2021 (UTC + 8:00)
System Uptime: 0 days 19:20:43.932
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2f9f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffda80`6de1bad0=000000000000009c
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\061221-8109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`2f600000 PsLoadedModuleList = 0xfffff803`3022a230
Debug session time: Sat Jun 12 14:28:27.422 2021 (UTC + 8:00)
System Uptime: 0 days 19:20:43.932
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2f9f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffda80`6de1bad0=000000000000009c