************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 44 Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\35134\Desktop\1\051125-14140-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (32 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Kernel base = 0xfffff807`9c800000 PsLoadedModuleList = 0xfffff807`9d6f49c0 Debug session time: Sun May 11 23:05:50.545 2025 (UTC + 8:00) System Uptime: 0 days 0:02:12.152 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ........................................................ Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`00739018). Type ".hh dbgerr001" for details Loading unloaded module list ............ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`9ccb5520 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbf07`2e5fe550=000000000000003b