firatyilmaz1903
Femtopat
- Katılım
- 20 Ekim 2025
- Mesajlar
- 11
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
- İşlemci: Intel Core i7 14650HX.
- Ekran kartı: NVIDIA GeForce RTX5060 100W+15W 8 GB.
- RAM: 32 GB (2×16) 5600MHz DDR5.
- Depolama: 1TB NVMe M.2 SSD.
************* Preparing the environment for debugger extensions gallery repositories **************
Extensionrepository : Implicit.
Useexperimentalfeaturefornugetshare : True.
Allownugetexeupdate : True.
Nonınteractivenuget : True.
Allownugetmscredentialproviderınstall : True.
Allowparallelınitializationoflocalrepositories : True.
Enableredirecttochakrajsprovider : False.
-- Configuring repositories.
----> Repository : Localınstalled, enabled: True.
----> Repository : Userextensions, enabled: True.
************* Waiting for debugger extensions gallery to ınitialize **************
----> Repository : Userextensions, enabled: True, packages count: 0
----> Repository : Localınstalled, enabled: True, packages count: 46.
Microsoft (r) Windows debugger version 10.0.29457.1000 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Windows\Minidump\112625-19078-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 26100 MP (24 procs) free X64.
Product: Winnt, Suite: Terminalserver singleuserts personal.
Kernel base = 0xfffff801`8ce00000 psloadedmodulelist = 0xfffff801`8dcf5030
Debug session time: Wed nov 26 21:12:22.359 2025 (utc + 3:00)
System uptime: 3 days 21:31:13.298
Loading kernel symbols.
..
Press CTRL-C (cdb, kd, ntsd) or CTRL-break (WinDbg) to abort symbol loads that take too long.
Run !SYM noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.........................................
Loading user symbols.
Peb is paged out (peb.ldr = 000000FE'2fd06018). Type ".hh dbgerr001" for details.
Loading unloaded module list.
..................................
For analysis of this file, run !analyze -v
NT!kebugcheckex:
Fffff801'8D2F6880 48894C2408 mov qword ptr [rsp+8],rcx SS:ffffa980'808D7fb0=????????????????
23: Kd> !analyze -v
Loading kernel symbols.
..
Press CTRL-C (cdb, kd, ntsd) or CTRL-break (WinDbg) to abort symbol loads that take too long.
Run !SYM noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.........................................
Loading user symbols.
Peb is paged out (peb.ldr = 000000FE'2fd06018). Type ".hh dbgerr001" for details.
Loading unloaded module list.
..................................
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, exception code that caused the bugcheck.
Arg2: FffFF8018D20F218, address of the instruction which caused the bugcheck.
Arg3: FffFA980808D88F0, address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Zero.
Debugging details:
------------------
Key_values_strıng: 1
Key : Analysis.CPU.msec
Value: 2812.
Key : Analysis.elapsed.msec
Value: 4554.
Key : Analysis.I
ther.MB
Value: 0
Key : Analysis.IO.read.MB
Value: 1
Key : Analysis.IO.write.MB
Value: 0
Key : Analysis.ınit.CPU.msec
Value: 1343.
Key : Analysis.ınit.elapsed.msec
Value: 31363.
Key : Analysis.Memory.commitpeak.MB
Value: 103.
Key : Analysis.version.dbgeng
Value: 10.0.29457.1000
Key : Analysis.version.description
Value: 10.2506.23.01 AMD64fre.
Key : Analysis.version.ext
Value: 1.2506.23.1
Key : Bugcheck.code.legacyapı
Value: 0x3b.
Key : Bugcheck.code.targetmodel
Value: 0x3b.
Key : Dump.attributes.asulong
Value: 0x21808.
Key : Dump.attributes.diagdatawrittentoheader
Value: 1
Key : Dump.attributes.errorcode
Value: 0x0.
Key : Dump.attributes.kernelgeneratedtriagedump
Value: 1
Key : Dump.attributes.lastline
Value: Dump completed successfully.
Key : Dump.attributes.progresspercentage
Value: 0
Key : Failure.bucket
Value: Av_nt!kxwaitforlockownershipwithırql
Key : Failure.exception.IP.address
Value: 0xfffff8018d20f218.
Key : Failure.exception.IP.module
Value: NT.
Key : Failure.exception.IP.offset
Value: 0x40f218.
Key : Failure.hash
Value: {A9412E74-FD67-6813-E6AA-AFE17BA295D4}
Key : Hypervisor.enlightenments.valuehex
Value: 0x7417df84.
Key : Hypervisor.flags.anyhypervisorpresent
Value: 1
Key : Hypervisor.flags.apicenlightened
Value: 0
Key : Hypervisor.flags.apicvirtualizationavailable
Value: 1
Key : Hypervisor.flags.asyncmemoryhint
Value: 0
Key : Hypervisor.flags.coreschedulerrequested
Value: 0
Key : Hypervisor.flags.cpumanager
Value: 1
Key : Hypervisor.flags.deprecateautoeoi
Value: 1
Key : Hypervisor.flags.dynamiccpudisabled
Value: 1
Key : Hypervisor.flags.epf
Value: 0
Key : Hypervisor.flags.extendedprocessormasks
Value: 1
Key : Hypervisor.flags.hardwarembecavailable
Value: 1
Key : Hypervisor.flags.maxbanknumber
Value: 0
Key : Hypervisor.flags.memoryzeroingcontrol
Value: 0
Key : Hypervisor.flags.noextendedrangeflush
Value: 0
Key : Hypervisor.flags.nononarchcoresharing
Value: 1
Key : Hypervisor.flags.phase0ınitdone
Value: 1
Key : Hypervisor.flags.powerschedulerqos
Value: 0
Key : Hypervisor.flags.rootscheduler
Value: 0
Key : Hypervisor.flags.synicavailable
Value: 1
Key : Hypervisor.flags.useqpcbias
Value: 0
Key : Hypervisor.flags.Value
Value: 55185662.
Key : Hypervisor.flags.valuehex
Value: 0x34a10fe.
Key : Hypervisor.flags.vpassistpage
Value: 1
Key : Hypervisor.flags.vsmavailable
Value: 1
Key : Hypervisor.rootflags.accessstats
Value: 1
Key : Hypervisor.rootflags.crashdumpenlightened
Value: 1
Key : Hypervisor.rootflags.createvirtualprocessor
Value: 1
Key : Hypervisor.rootflags.disablehyperthreading
Value: 0
Key : Hypervisor.rootflags.hosttimelinesync
Value: 1
Key : Hypervisor.rootflags.hypervisordebuggingenabled
Value: 0
Key : Hypervisor.rootflags.ıshyperv
Value: 1
Key : Hypervisor.rootflags.livedumpenlightened
Value: 1
Key : Hypervisor.rootflags.mapdeviceınterrupt
Value: 1
Key : Hypervisor.rootflags.mceenlightened
Value: 1
Key : Hypervisor.rootflags.nested
Value: 0
Key : Hypervisor.rootflags.startlogicalprocessor
Value: 1
Key : Hypervisor.rootflags.Value
Value: 1015.
Key : Hypervisor.rootflags.valuehex
Value: 0x3f7.
Key : Stack.pointer
Value: Prcbexception.
Key : Wer.System.bıosrevision
Value: 5.32.0.0
Bugcheck_code: 3B.
Bugcheck_p1: C0000005.
Bugcheck_p2: FFFFF8018D20F218.
Bugcheck_p3: FFFFA980808D88F0.
Bugcheck_p4: 0
Fıle_ın_cab: 112625-19078-01.dmp
Tag_not_defıned_202b: *** unknown tag in analysis list 202b.
Dump_fıle_attrıbutes: 0x21808.
Kernel generated triage dump.
Faultıng_thread: FFFF9886449CC080.
Context: FFFFA980808D88F0 -- (.cxr 0xffffa980808d88f0)
Rax = 0000000000000000 rbx = fffFF6867188F7D0 rcx = fffFF6867188F7C8.
Rdx = 0000900000008E00 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8018D20F218 rsp = fffFF6867188F6C0 rbp = fffFF6867188F730.
R8 = 0000000000000001 R9 = 0000000000000000 R10 = ffFF988639dea080.
R11 = 0000000000000000 R12 = 0000000000000001 R13 = ffffffffffffffff.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna pe NC.
CS = 0010 SS = 0000 DS = 002b es = 002b FS = 0053 GS = 002b efl = 00050282.
NT!kxwaitforlockownershipwithırql+0x48:
Fffff801'8D20F218 48890a mov qword ptr [rdx],rcx DS:002b:00009000'00008E00=????????????????
Resetting default scope.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1 (!blackboxwinlogon)
Customer_crash_count: 1
Process_name: WUDFHost.exe
Stack_text:
Fffff686'7188F6C0 fffff801'8D0D7B73 : Ffff9886'3C3C7500 00000000'00000000 ffffa980'80861180 00000000'00000001 : NT!kxwaitforlockownershipwithırql+0x48
Fffff686'7188F740 fffff801'8D140629 : Ffff9886'3C3C75e0 fffff686'7188FAA0 00000000'00000000 ffff9886'115b0C90 : NT!kiacquirequeuedspinlockınstrumented+0x73
Fffff686'7188F780 fffff801'8D4B2255 : Fffff686'7188FAA0 00000280'dff8A460 fffff686'7188FAA0 00000280'dff79330 : NT!ntwaitforworkviaworkerfactory+0xc79
Fffff686'7188F9B0 00007FF9'20A65974 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!kisystemservicecopyend+0x25
000000FE'2feffb88 00000000'00000000 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x00007ff9'20A65974.
Symbol_name: NT!kxwaitforlockownershipwithırql+48
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.26100.7171
Stack_command: .cxr 0xffffa980808d88f0 ; KB.
Bucket_ıd_func_offset: 48.
Faılure_bucket_ıd: Av_nt!kxwaitforlockownershipwithırql
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {A9412E74-FD67-6813-E6AA-AFE17BA295D4}
Followup: Machineowner.
---------
Extensionrepository : Implicit.
Useexperimentalfeaturefornugetshare : True.
Allownugetexeupdate : True.
Nonınteractivenuget : True.
Allownugetmscredentialproviderınstall : True.
Allowparallelınitializationoflocalrepositories : True.
Enableredirecttochakrajsprovider : False.
-- Configuring repositories.
----> Repository : Localınstalled, enabled: True.
----> Repository : Userextensions, enabled: True.
>>>>>>>>>>> Preparing the environment for debugger extensions gallery repositories completed, duration 0.000 seconds.
************* Waiting for debugger extensions gallery to ınitialize **************
>>>>>>>>>>> Waiting for debugger extensions gallery to ınitialize completed, duration 0.032 seconds.
----> Repository : Userextensions, enabled: True, packages count: 0
----> Repository : Localınstalled, enabled: True, packages count: 46.
Microsoft (r) Windows debugger version 10.0.29457.1000 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Windows\Minidump\112625-19078-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 26100 MP (24 procs) free X64.
Product: Winnt, Suite: Terminalserver singleuserts personal.
Kernel base = 0xfffff801`8ce00000 psloadedmodulelist = 0xfffff801`8dcf5030
Debug session time: Wed nov 26 21:12:22.359 2025 (utc + 3:00)
System uptime: 3 days 21:31:13.298
Loading kernel symbols.
..
Press CTRL-C (cdb, kd, ntsd) or CTRL-break (WinDbg) to abort symbol loads that take too long.
Run !SYM noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.........................................
Loading user symbols.
Peb is paged out (peb.ldr = 000000FE'2fd06018). Type ".hh dbgerr001" for details.
Loading unloaded module list.
..................................
For analysis of this file, run !analyze -v
NT!kebugcheckex:
Fffff801'8D2F6880 48894C2408 mov qword ptr [rsp+8],rcx SS:ffffa980'808D7fb0=????????????????
23: Kd> !analyze -v
Loading kernel symbols.
..
Press CTRL-C (cdb, kd, ntsd) or CTRL-break (WinDbg) to abort symbol loads that take too long.
Run !SYM noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.........................................
Loading user symbols.
Peb is paged out (peb.ldr = 000000FE'2fd06018). Type ".hh dbgerr001" for details.
Loading unloaded module list.
..................................
*******************************************************************************
- *
- Bugcheck analysis *
- *
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, exception code that caused the bugcheck.
Arg2: FffFF8018D20F218, address of the instruction which caused the bugcheck.
Arg3: FffFA980808D88F0, address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Zero.
Debugging details:
------------------
Key_values_strıng: 1
Key : Analysis.CPU.msec
Value: 2812.
Key : Analysis.elapsed.msec
Value: 4554.
Key : Analysis.I
Value: 0
Key : Analysis.IO.read.MB
Value: 1
Key : Analysis.IO.write.MB
Value: 0
Key : Analysis.ınit.CPU.msec
Value: 1343.
Key : Analysis.ınit.elapsed.msec
Value: 31363.
Key : Analysis.Memory.commitpeak.MB
Value: 103.
Key : Analysis.version.dbgeng
Value: 10.0.29457.1000
Key : Analysis.version.description
Value: 10.2506.23.01 AMD64fre.
Key : Analysis.version.ext
Value: 1.2506.23.1
Key : Bugcheck.code.legacyapı
Value: 0x3b.
Key : Bugcheck.code.targetmodel
Value: 0x3b.
Key : Dump.attributes.asulong
Value: 0x21808.
Key : Dump.attributes.diagdatawrittentoheader
Value: 1
Key : Dump.attributes.errorcode
Value: 0x0.
Key : Dump.attributes.kernelgeneratedtriagedump
Value: 1
Key : Dump.attributes.lastline
Value: Dump completed successfully.
Key : Dump.attributes.progresspercentage
Value: 0
Key : Failure.bucket
Value: Av_nt!kxwaitforlockownershipwithırql
Key : Failure.exception.IP.address
Value: 0xfffff8018d20f218.
Key : Failure.exception.IP.module
Value: NT.
Key : Failure.exception.IP.offset
Value: 0x40f218.
Key : Failure.hash
Value: {A9412E74-FD67-6813-E6AA-AFE17BA295D4}
Key : Hypervisor.enlightenments.valuehex
Value: 0x7417df84.
Key : Hypervisor.flags.anyhypervisorpresent
Value: 1
Key : Hypervisor.flags.apicenlightened
Value: 0
Key : Hypervisor.flags.apicvirtualizationavailable
Value: 1
Key : Hypervisor.flags.asyncmemoryhint
Value: 0
Key : Hypervisor.flags.coreschedulerrequested
Value: 0
Key : Hypervisor.flags.cpumanager
Value: 1
Key : Hypervisor.flags.deprecateautoeoi
Value: 1
Key : Hypervisor.flags.dynamiccpudisabled
Value: 1
Key : Hypervisor.flags.epf
Value: 0
Key : Hypervisor.flags.extendedprocessormasks
Value: 1
Key : Hypervisor.flags.hardwarembecavailable
Value: 1
Key : Hypervisor.flags.maxbanknumber
Value: 0
Key : Hypervisor.flags.memoryzeroingcontrol
Value: 0
Key : Hypervisor.flags.noextendedrangeflush
Value: 0
Key : Hypervisor.flags.nononarchcoresharing
Value: 1
Key : Hypervisor.flags.phase0ınitdone
Value: 1
Key : Hypervisor.flags.powerschedulerqos
Value: 0
Key : Hypervisor.flags.rootscheduler
Value: 0
Key : Hypervisor.flags.synicavailable
Value: 1
Key : Hypervisor.flags.useqpcbias
Value: 0
Key : Hypervisor.flags.Value
Value: 55185662.
Key : Hypervisor.flags.valuehex
Value: 0x34a10fe.
Key : Hypervisor.flags.vpassistpage
Value: 1
Key : Hypervisor.flags.vsmavailable
Value: 1
Key : Hypervisor.rootflags.accessstats
Value: 1
Key : Hypervisor.rootflags.crashdumpenlightened
Value: 1
Key : Hypervisor.rootflags.createvirtualprocessor
Value: 1
Key : Hypervisor.rootflags.disablehyperthreading
Value: 0
Key : Hypervisor.rootflags.hosttimelinesync
Value: 1
Key : Hypervisor.rootflags.hypervisordebuggingenabled
Value: 0
Key : Hypervisor.rootflags.ıshyperv
Value: 1
Key : Hypervisor.rootflags.livedumpenlightened
Value: 1
Key : Hypervisor.rootflags.mapdeviceınterrupt
Value: 1
Key : Hypervisor.rootflags.mceenlightened
Value: 1
Key : Hypervisor.rootflags.nested
Value: 0
Key : Hypervisor.rootflags.startlogicalprocessor
Value: 1
Key : Hypervisor.rootflags.Value
Value: 1015.
Key : Hypervisor.rootflags.valuehex
Value: 0x3f7.
Key : Stack.pointer
Value: Prcbexception.
Key : Wer.System.bıosrevision
Value: 5.32.0.0
Bugcheck_code: 3B.
Bugcheck_p1: C0000005.
Bugcheck_p2: FFFFF8018D20F218.
Bugcheck_p3: FFFFA980808D88F0.
Bugcheck_p4: 0
Fıle_ın_cab: 112625-19078-01.dmp
Tag_not_defıned_202b: *** unknown tag in analysis list 202b.
Dump_fıle_attrıbutes: 0x21808.
Kernel generated triage dump.
Faultıng_thread: FFFF9886449CC080.
Context: FFFFA980808D88F0 -- (.cxr 0xffffa980808d88f0)
Rax = 0000000000000000 rbx = fffFF6867188F7D0 rcx = fffFF6867188F7C8.
Rdx = 0000900000008E00 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8018D20F218 rsp = fffFF6867188F6C0 rbp = fffFF6867188F730.
R8 = 0000000000000001 R9 = 0000000000000000 R10 = ffFF988639dea080.
R11 = 0000000000000000 R12 = 0000000000000001 R13 = ffffffffffffffff.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna pe NC.
CS = 0010 SS = 0000 DS = 002b es = 002b FS = 0053 GS = 002b efl = 00050282.
NT!kxwaitforlockownershipwithırql+0x48:
Fffff801'8D20F218 48890a mov qword ptr [rdx],rcx DS:002b:00009000'00008E00=????????????????
Resetting default scope.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1 (!blackboxwinlogon)
Customer_crash_count: 1
Process_name: WUDFHost.exe
Stack_text:
Fffff686'7188F6C0 fffff801'8D0D7B73 : Ffff9886'3C3C7500 00000000'00000000 ffffa980'80861180 00000000'00000001 : NT!kxwaitforlockownershipwithırql+0x48
Fffff686'7188F740 fffff801'8D140629 : Ffff9886'3C3C75e0 fffff686'7188FAA0 00000000'00000000 ffff9886'115b0C90 : NT!kiacquirequeuedspinlockınstrumented+0x73
Fffff686'7188F780 fffff801'8D4B2255 : Fffff686'7188FAA0 00000280'dff8A460 fffff686'7188FAA0 00000280'dff79330 : NT!ntwaitforworkviaworkerfactory+0xc79
Fffff686'7188F9B0 00007FF9'20A65974 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!kisystemservicecopyend+0x25
000000FE'2feffb88 00000000'00000000 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x00007ff9'20A65974.
Symbol_name: NT!kxwaitforlockownershipwithırql+48
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.26100.7171
Stack_command: .cxr 0xffffa980808d88f0 ; KB.
Bucket_ıd_func_offset: 48.
Faılure_bucket_ıd: Av_nt!kxwaitforlockownershipwithırql
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {A9412E74-FD67-6813-E6AA-AFE17BA295D4}
Followup: Machineowner.
---------