************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 46
Microsoft (R) Windows Debugger Version 10.0.29482.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\cihan\Downloads\010926-21984-01 -.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff802`86800000 PsLoadedModuleList = 0xfffff802`876f5010
Debug session time: Fri Jan 9 19:44:20.493 2026 (UTC + 1:00)
System Uptime: 0 days 2:27:57.209
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`0025f018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`86cfb310 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb06`93c03600=000000000000003b
3: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`0025f018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
*******************************************************************************
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff802255b4bd4, Address of the instruction which caused the BugCheck
Arg3: fffffb0693c03f40, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1125
Key : Analysis.Elapsed.mSec
Value: 5855
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 578
Key : Analysis.Init.Elapsed.mSec
Value: 25520
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.Version.DbgEng
Value: 10.0.29482.1003
Key : Analysis.Version.Description
Value: 10.2509.29.03 amd64fre
Key : Analysis.Version.Ext
Value: 1.2509.29.3
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_vgk!unknown_function
Key : Failure.Exception.IP.Address
Value: 0xfffff802255b4bd4
Key : Failure.Exception.IP.Module
Value: vgk
Key : Failure.Exception.IP.Offset
Value: 0xec4bd4
Key : Failure.Hash
Value: {56c5cf79-d160-8711-720f-03c630d4c72b}
Key : Faulting.IP.Type
Value: Paged
Key : WER.System.BIOSRevision
Value: 5.14.0.0
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff802255b4bd4
BUGCHECK_P3: fffffb0693c03f40
BUGCHECK_P4: 0
FILE_IN_CAB: 010926-21984-01 -.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffbe87976430c0
CONTEXT: fffffb0693c03f40 -- (.cxr 0xfffffb0693c03f40)
rax=0000000000000009 rbx=0000000000000190 rcx=fffff8022471d996
rdx=0000000000000013 rsi=f2debf6cb1f9bb6f rdi=00000001406ce1cf
rip=fffff802255b4bd4 rsp=fffffb0693c04970 rbp=0000000000000030
r8=dfb5e1fc7f57fbfc r9=0000000000000150 r10=79ffde47fbffddbf
r11=70c0254820e1a100 r12=00000001404cc80f r13=a633d6190df5a5f3
r14=ce6c5375a2115300 r15=cf64d27710a18558
iopl=0 ov up ei pl zr na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050a47
vgk+0xec4bd4:
fffff802`255b4bd4 41803f00 cmp byte ptr [r15],0 ds:002b:cf64d277`10a18558=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
PROCESS_NAME: vgc.exe
IP_IN_PAGED_CODE:
vgk+ec4bd4
fffff802`255b4bd4 41803f00 cmp byte ptr [r15],0
STACK_TEXT:
fffffb06`93c04970 00000000`000001e8 : 00000000`00000138 00000000`00000000 dd4ce77d`24ad17d4 00000000`000000c8 : vgk+0xec4bd4
fffffb06`93c04978 00000000`00000138 : 00000000`00000000 dd4ce77d`24ad17d4 00000000`000000c8 00000000`00000001 : 0x1e8
fffffb06`93c04980 00000000`00000000 : dd4ce77d`24ad17d4 00000000`000000c8 00000000`00000001 00000000`00000170 : 0x138
SYMBOL_NAME: vgk+ec4bd4
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .process /r /p 0xff000000ff; .cxr 0xfffffb0693c03f40 ; kb
BUCKET_ID_FUNC_OFFSET: ec4bd4
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------