Game overlay kullanıyor musunuz?
Hocam steam.exe, searchapp, gameoverlay, gibi sebeplerden dolayı mavi ekran yemişsiniz sanırım.
Windows Update yapın, ekran kartınızı güncelleyin ve Windows bellek tanılama aracıyla RAM'lerinizi test ettirin.
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: ffff8444c03be0f8
Arg3: 0000000000000001
Arg4: 8a0000013cc1786b
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6203
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16195
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 5100
BUGCHECK_P2: ffff8444c03be0f8
BUGCHECK_P3: 1
BUGCHECK_P4: 8a0000013cc1786b
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchApp.exe
STACK_TEXT:
ffffb507`2ad534b8 fffff806`0581b5cd : 00000000`0000001a 00000000`00005100 ffff8444`c03be0f8 00000000`00000001 : nt!KeBugCheckEx
ffffb507`2ad534c0 fffff806`05674691 : fffff806`0604ed40 ffffd604`760ec700 00000000`00000000 00000000`000007f4 : nt!MiFlushTbAsNeeded+0x1fb54d
ffffb507`2ad53600 fffff806`05674b84 : 00000000`0000092e ffffd604`00000000 00000000`00001001 00000000`00000fff : nt!MiReservePtes+0x2f1
ffffb507`2ad536d0 fffff806`05709cad : ffffd604`789fae10 00000000`00000000 fffff806`06122fc0 ffffd604`757731c0 : nt!MmMapLockedPagesSpecifyCache+0xd4
ffffb507`2ad53730 fffff806`0563dee2 : ffffd604`789fae10 ffffb507`2ad53910 ffffb507`2ad537c0 00000000`31526d73 : nt!SmFpAllocate+0xa5
ffffb507`2ad53780 fffff806`0563da7e : 00000000`0000000c fffff806`061229c0 ffffd604`789fae10 00000000`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxPrepareToQueue+0x116
ffffb507`2ad537e0 fffff806`05709597 : 00000000`0000000c 00000000`00000001 ffffd604`789fae10 ffffd604`75773100 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x56
ffffb507`2ad53870 fffff806`0571d34b : ffffd604`00000001 ffffd604`757731c0 00000000`00000000 ffffd604`760ed000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffb507`2ad538e0 fffff806`056b6f60 : 0000007f`00000100 00000000`00000000 ffffb507`2ad53b38 fffff806`056b4eb0 : nt!SmPageRead+0x33
ffffb507`2ad53930 fffff806`056b4a0d : 00000000`00000002 ffffb507`2ad539c0 ffffb507`2ad53b38 ffffd604`757730b0 : nt!MiIssueHardFaultIo+0x10c
ffffb507`2ad53980 fffff806`0560c9c8 : 00000000`c0033333 00000000`00000000 00007ff8`a3047000 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffb507`2ad53a40 fffff806`056ccdd0 : 00000000`00000000 00000000`00000000 ffffd604`7750d918 00000000`0000033f : nt!MmAccessFault+0x468
ffffb507`2ad53be0 fffff806`056cccd5 : 00000000`00000000 ffffd604`7750d918 00000000`00000000 00000000`00000000 : nt!MiReleaseOutSwapReservations+0xb4
ffffb507`2ad53c90 fffff806`056ccbf3 : 00000000`00000000 ffffd604`77510d08 00000000`00000005 00000000`00000000 : nt!MiProcessWsInSwapRanges+0x71
ffffb507`2ad53cc0 fffff806`056cbf57 : 00000000`00000000 ffffd604`760ec080 00000000`00000000 00000000`00000000 : nt!MiProcessWsInSwapSupport+0x63
ffffb507`2ad53cf0 fffff806`05a5e05b : 00000000`00000001 00000000`00000001 ffffd604`73980140 00000000`00000003 : nt!MmInSwapWorkingSet+0xff
ffffb507`2ad53d70 fffff806`056d96d9 : 00000000`00000000 ffffd604`760ec080 ffffd604`741df040 ffffd604`75975060 : nt!PspChangeProcessExecutionState+0x227
ffffb507`2ad53e30 fffff806`05a120e6 : 00000000`00000000 ffffd604`75975060 00000000`00000000 fffff806`05a12572 : nt!PspExecuteJobFreezeThawCallback+0x69
ffffb507`2ad53e80 fffff806`05a11ff4 : ffffd604`75975060 ffffb507`2ad53fc9 fffff806`056d9670 ffffd604`75975060 : nt!PspCallJobHierarchyCallbacks+0xba
ffffb507`2ad53ed0 fffff806`05acb989 : 00000000`00000005 00000000`00000000 fffff806`056d9670 00000000`00000000 : nt!PspEnumJobsAndProcessesInJobHierarchy+0x1cc
ffffb507`2ad53f60 fffff806`05a604cf : ffffb605`68cfbde0 ffffb605`70143820 00000000`00000002 00000000`00000000 : nt!PspFreezeJobTree+0x105
ffffb507`2ad54030 fffff806`058071b5 : 00000196`0dee7ea8 00000000`00000000 ffffb507`2ad54c80 00000000`00000000 : nt!NtSetInformationJobObject+0x39f
ffffb507`2ad54c00 00007ff8`a6def284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000040`2817f248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a6def284
SYMBOL_NAME: nt!MiFlushTbAsNeeded+1fb54d
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1fb54d
FAILURE_BUCKET_ID: 0x1a_5100_nt!MiFlushTbAsNeeded
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {13b6d0a0-8171-b4a6-ae95-907aaf025545}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060682866f, Address of the instruction which caused the bugcheck
Arg3: fffff60f18b32bb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8592
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8060682866f
BUGCHECK_P3: fffff60f18b32bb0
BUGCHECK_P4: 0
CONTEXT: fffff60f18b32bb0 -- (.cxr 0xfffff60f18b32bb0)
rax=fffff80606200000 rbx=00000000000004ec rcx=000000000000006b
rdx=ffffc085d29fe3b0 rsi=ffffc085d29fe3b0 rdi=0000000000000000
rip=fffff8060682866f rsp=fffff60f18b335b0 rbp=fffff60f18b33699
r8=ffffaa040716c280 r9=ffffaa040716c280 r10=00000000ffffffff
r11=00000000000004f7 r12=0000000000000000 r13=ffffc085d09e6180
r14=ffffaa04073770e0 r15=00000000000004ec
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ObCloseHandleTableEntry+0x8f:
fffff806`0682866f 4c8b97a8000000 mov r10,qword ptr [rdi+0A8h] ds:002b:00000000`000000a8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HxT
STACK_TEXT:
fffff60f`18b335b0 fffff806`067d5f55 : 00000000`00000004 ffffc085`d3261e18 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x8f
fffff60f`18b336f0 fffff806`067d823d : ffffaa04`07135080 ffffaa04`07135080 ffffffff`ffffff01 ffffaa04`0716c6d8 : nt!ExSweepHandleTable+0xd5
fffff60f`18b337a0 fffff806`0685d6dc : ffffffff`ffffffff ffffaa04`0716c280 fffff60f`18b337f0 fffff806`068655dc : nt!ObKillProcess+0x35
fffff60f`18b337d0 fffff806`06906596 : ffffaa04`0716c280 ffffc085`d1a71190 fffff60f`18b33a20 00000000`00000000 : nt!PspRundownSingleProcess+0x204
fffff60f`18b33860 fffff806`068d22e8 : 00000000`00000001 00000000`00000001 00000000`00000000 000000e0`2444b000 : nt!PspExitThread+0x5f6
fffff60f`18b33960 fffff806`06467fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff60f`18b339a0 fffff806`065f9d20 : 00000000`00000000 fffff60f`18b33a50 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffff60f`18b33a50 fffff806`0660725f : 00007530`18b33b00 00000000`00000000 ffffaa04`07135080 ffffffff`dc3cba00 : nt!KiInitiateUserApc+0x70
fffff60f`18b33b90 00007ffe`04f8cb04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000e0`243bf278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`04f8cb04
SYMBOL_NAME: nt!ObCloseHandleTableEntry+8f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xfffff60f18b32bb0 ; kb
BUCKET_ID_FUNC_OFFSET: 8f
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObCloseHandleTableEntry
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6d2b6af8-c878-f9a4-39b8-9f62c5d0ad0d}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8017f2d85ce, Address of the instruction which caused the bugcheck
Arg3: fffffd84833b0ea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5280
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8017f2d85ce
BUGCHECK_P3: fffffd84833b0ea0
BUGCHECK_P4: 0
CONTEXT: fffffd84833b0ea0 -- (.cxr 0xfffffd84833b0ea0)
rax=0000000000000000 rbx=ffff9082db2f6bf0 rcx=ffffd801389423d8
rdx=ffffc80ca8577890 rsi=ffff9082db2f6bf0 rdi=00000000000006fc
rip=fffff8017f2d85ce rsp=fffffd84833b18a8 rbp=ffff9082db4d8b40
r8=0000000000000000 r9=ffffc80ca8577860 r10=00000000001423a0
r11=fffffd84833b18f0 r12=ffffd80138800050 r13=fffffd84833b1988
r14=fffff8017f2d8520 r15=000000000017fffc
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202
nt!ObpCaptureHandleInformation+0xae:
fffff801`7f2d85ce 8a4028 mov al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
fffffd84`833b18a8 fffff801`7f3483b1 : 00000000`000006fc 00000000`00000000 ffffc80c`00000000 fffff801`7ec74c12 : nt!ObpCaptureHandleInformation+0xae
fffffd84`833b18b0 fffff801`7f2d84a5 : fffff801`7f2d8520 ffff9082`db4d8b58 00000000`0017fffc fffffd84`833b19f0 : nt!ExpSnapShotHandleTables+0x131
fffffd84`833b1940 fffff801`7f345b31 : fffffd84`833b19f0 00000000`001423a0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39
fffffd84`833b1980 fffff801`7efe6dc9 : 00000000`0a68f050 fffff801`00020000 ffffd801`38800050 ffffc80c`aa005010 : nt!ExpGetHandleInformation+0x5d
fffffd84`833b19c0 fffff801`7efe5b37 : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149
fffffd84`833b1bc0 fffff801`7ee071b5 : ffffc80c`a71b0000 ffffc80c`a8145de0 fffffd84`833b1c18 fffffd84`833b1c80 : nt!NtQuerySystemInformation+0x37
fffffd84`833b1c00 00007ffb`b850c674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0019dd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b850c674
SYMBOL_NAME: nt!ObpCaptureHandleInformation+ae
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xfffffd84833b0ea0 ; kb
BUCKET_ID_FUNC_OFFSET: ae
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8014ced85ce, Address of the instruction which caused the bugcheck
Arg3: ffffc089d4860ea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18891
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8014ced85ce
BUGCHECK_P3: ffffc089d4860ea0
BUGCHECK_P4: 0
CONTEXT: ffffc089d4860ea0 -- (.cxr 0xffffc089d4860ea0)
rax=0000000000000000 rbx=ffffd10159f6b4e0 rcx=ffff80003b54fa28
rdx=ffffe38e84767250 rsi=ffffd10159f6b4e0 rdi=0000000000000138
rip=fffff8014ced85ce rsp=ffffc089d48618a8 rbp=ffffd1015a447200
r8=0000000000000000 r9=ffffe38e84767220 r10=000000000014f9f0
r11=ffffc089d48618f0 r12=ffff80003b400050 r13=ffffc089d4861988
r14=fffff8014ced8520 r15=000000000017fffc
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ObpCaptureHandleInformation+0xae:
fffff801`4ced85ce 8a4028 mov al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GameOverlayUI.exe
STACK_TEXT:
ffffc089`d48618a8 fffff801`4cf483b1 : 00000000`00000138 00000000`00000000 ffffe38e`00000000 fffff801`4c874c12 : nt!ObpCaptureHandleInformation+0xae
ffffc089`d48618b0 fffff801`4ced84a5 : fffff801`4ced8520 ffffd101`5a447218 00000000`0017fffc ffffc089`d48619f0 : nt!ExpSnapShotHandleTables+0x131
ffffc089`d4861940 fffff801`4cf45b31 : ffffc089`d48619f0 00000000`0014f9f0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39
ffffc089`d4861980 fffff801`4cbe6dc9 : 00000000`09d5b050 fffff801`00020000 ffff8000`3b400050 ffffe38e`8307e010 : nt!ExpGetHandleInformation+0x5d
ffffc089`d48619c0 fffff801`4cbe5b37 : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149
ffffc089`d4861bc0 fffff801`4ca071b5 : ffffe38e`85040000 00000000`00000000 ffffc089`d4861c80 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
ffffc089`d4861c00 00007ffc`dd42c674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`06c6dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dd42c674
SYMBOL_NAME: nt!ObpCaptureHandleInformation+ae
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffffc089d4860ea0 ; kb
BUCKET_ID_FUNC_OFFSET: ae
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5}
Followup: MachineOwner
---------
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: ffffc70efec9f560, Object type of the object whose reference count is being lowered
Arg2: ffffc70f087d7a60, Object whose reference count is being lowered
Arg3: 0000000000000001, Reserved
Arg4: ffffffffffffffff, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This bugcheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the object's reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3859
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7180
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 18
BUGCHECK_P1: ffffc70efec9f560
BUGCHECK_P2: ffffc70f087d7a60
BUGCHECK_P3: 1
BUGCHECK_P4: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff990c`259dba08 fffff802`686329bc : 00000000`00000018 ffffc70e`fec9f560 ffffc70f`087d7a60 00000000`00000001 : nt!KeBugCheckEx
ffff990c`259dba10 fffff802`6882887e : ffffc70e`fec9f560 00000000`00000000 ffffffff`ffffffff ffff9e84`b83f1a60 : nt!ObfDereferenceObjectWithTag+0x1d180c
ffff990c`259dba50 fffff802`6882c4fc : 00000000`00000298 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 : nt!ObCloseHandleTableEntry+0x29e
ffff990c`259dbb90 fffff802`686071b5 : ffffc70f`05c1a000 0000000d`5adfd090 ffff990c`259dbc80 ffffc70f`05c0a2d0 : nt!NtClose+0xec
ffff990c`259dbc00 00007ffb`4e22c194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000000d`5adfd378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4e22c194
SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+1d180c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d180c
FAILURE_BUCKET_ID: 0x18_OVER_DEREFERENCE_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4139309c-4e9f-52f0-ac5e-4041e7a86a20}
Followup: MachineOwner
---------
Windows bellek tanılama ile değil, Memtest86 ile belleklerinize test yapın. Sonucunu mutlaka paylaşın.
![]()
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000005100, The subtype of the bugcheck. Arg2: ffff8444c03be0f8. Arg3: 0000000000000001. Arg4: 8a0000013cc1786b. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 6203. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 16195. Key : Analysis.Memory.CommitPeak.Mb. Value: 80. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 1a. BUGCHECK_P1: 5100. BUGCHECK_P2: ffff8444c03be0f8. BUGCHECK_P3: 1. BUGCHECK_P4: 8a0000013cc1786b. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: SearchApp.exe. STACK_TEXT: ffffb507`2ad534b8 fffff806`0581b5cd : 00000000`0000001a 00000000`00005100 ffff8444`c03be0f8 00000000`00000001 : nt!KeBugCheckEx. ffffb507`2ad534c0 fffff806`05674691 : fffff806`0604ed40 ffffd604`760ec700 00000000`00000000 00000000`000007f4 : nt!MiFlushTbAsNeeded+0x1fb54d. ffffb507`2ad53600 fffff806`05674b84 : 00000000`0000092e ffffd604`00000000 00000000`00001001 00000000`00000fff : nt!MiReservePtes+0x2f1. ffffb507`2ad536d0 fffff806`05709cad : ffffd604`789fae10 00000000`00000000 fffff806`06122fc0 ffffd604`757731c0 : nt!MmMapLockedPagesSpecifyCache+0xd4. ffffb507`2ad53730 fffff806`0563dee2 : ffffd604`789fae10 ffffb507`2ad53910 ffffb507`2ad537c0 00000000`31526d73 : nt!SmFpAllocate+0xa5. ffffb507`2ad53780 fffff806`0563da7e : 00000000`0000000c fffff806`061229c0 ffffd604`789fae10 00000000`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxPrepareToQueue+0x116. ffffb507`2ad537e0 fffff806`05709597 : 00000000`0000000c 00000000`00000001 ffffd604`789fae10 ffffd604`75773100 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x56. ffffb507`2ad53870 fffff806`0571d34b : ffffd604`00000001 ffffd604`757731c0 00000000`00000000 ffffd604`760ed000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167. ffffb507`2ad538e0 fffff806`056b6f60 : 0000007f`00000100 00000000`00000000 ffffb507`2ad53b38 fffff806`056b4eb0 : nt!SmPageRead+0x33. ffffb507`2ad53930 fffff806`056b4a0d : 00000000`00000002 ffffb507`2ad539c0 ffffb507`2ad53b38 ffffd604`757730b0 : nt!MiIssueHardFaultIo+0x10c. ffffb507`2ad53980 fffff806`0560c9c8 : 00000000`c0033333 00000000`00000000 00007ff8`a3047000 00000000`00000000 : nt!MiIssueHardFault+0x29d. ffffb507`2ad53a40 fffff806`056ccdd0 : 00000000`00000000 00000000`00000000 ffffd604`7750d918 00000000`0000033f : nt!MmAccessFault+0x468. ffffb507`2ad53be0 fffff806`056cccd5 : 00000000`00000000 ffffd604`7750d918 00000000`00000000 00000000`00000000 : nt!MiReleaseOutSwapReservations+0xb4. ffffb507`2ad53c90 fffff806`056ccbf3 : 00000000`00000000 ffffd604`77510d08 00000000`00000005 00000000`00000000 : nt!MiProcessWsInSwapRanges+0x71. ffffb507`2ad53cc0 fffff806`056cbf57 : 00000000`00000000 ffffd604`760ec080 00000000`00000000 00000000`00000000 : nt!MiProcessWsInSwapSupport+0x63. ffffb507`2ad53cf0 fffff806`05a5e05b : 00000000`00000001 00000000`00000001 ffffd604`73980140 00000000`00000003 : nt!MmInSwapWorkingSet+0xff. ffffb507`2ad53d70 fffff806`056d96d9 : 00000000`00000000 ffffd604`760ec080 ffffd604`741df040 ffffd604`75975060 : nt!PspChangeProcessExecutionState+0x227. ffffb507`2ad53e30 fffff806`05a120e6 : 00000000`00000000 ffffd604`75975060 00000000`00000000 fffff806`05a12572 : nt!PspExecuteJobFreezeThawCallback+0x69. ffffb507`2ad53e80 fffff806`05a11ff4 : ffffd604`75975060 ffffb507`2ad53fc9 fffff806`056d9670 ffffd604`75975060 : nt!PspCallJobHierarchyCallbacks+0xba. ffffb507`2ad53ed0 fffff806`05acb989 : 00000000`00000005 00000000`00000000 fffff806`056d9670 00000000`00000000 : nt!PspEnumJobsAndProcessesInJobHierarchy+0x1cc. ffffb507`2ad53f60 fffff806`05a604cf : ffffb605`68cfbde0 ffffb605`70143820 00000000`00000002 00000000`00000000 : nt!PspFreezeJobTree+0x105. ffffb507`2ad54030 fffff806`058071b5 : 00000196`0dee7ea8 00000000`00000000 ffffb507`2ad54c80 00000000`00000000 : nt!NtSetInformationJobObject+0x39f. ffffb507`2ad54c00 00007ff8`a6def284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 00000040`2817f248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a6def284. SYMBOL_NAME: nt!MiFlushTbAsNeeded+1fb54d. MODULE_NAME: nt. IMAGE_VERSION: 10.0.19041.685. STACK_COMMAND: .thread ; .cxr ; kb. IMAGE_NAME: ntkrnlmp.exe. BUCKET_ID_FUNC_OFFSET: 1fb54d. FAILURE_BUCKET_ID: 0x1a_5100_nt!MiFlushTbAsNeeded. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {13b6d0a0-8171-b4a6-ae95-907aaf025545} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff8060682866f, Address of the instruction which caused the bugcheck. Arg3: fffff60f18b32bb0, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5624. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 8592. Key : Analysis.Memory.CommitPeak.Mb. Value: 76. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff8060682866f. BUGCHECK_P3: fffff60f18b32bb0. BUGCHECK_P4: 0. CONTEXT: fffff60f18b32bb0 -- (.cxr 0xfffff60f18b32bb0) rax=fffff80606200000 rbx=00000000000004ec rcx=000000000000006b. rdx=ffffc085d29fe3b0 rsi=ffffc085d29fe3b0 rdi=0000000000000000. rip=fffff8060682866f rsp=fffff60f18b335b0 rbp=fffff60f18b33699. r8=ffffaa040716c280 r9=ffffaa040716c280 r10=00000000ffffffff. r11=00000000000004f7 r12=0000000000000000 r13=ffffc085d09e6180. r14=ffffaa04073770e0 r15=00000000000004ec. iopl=0 nv up ei pl nz na pe nc. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202. nt!ObCloseHandleTableEntry+0x8f: fffff806`0682866f 4c8b97a8000000 mov r10,qword ptr [rdi+0A8h] ds:002b:00000000`000000a8=???????????????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: HxT. STACK_TEXT: fffff60f`18b335b0 fffff806`067d5f55 : 00000000`00000004 ffffc085`d3261e18 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x8f. fffff60f`18b336f0 fffff806`067d823d : ffffaa04`07135080 ffffaa04`07135080 ffffffff`ffffff01 ffffaa04`0716c6d8 : nt!ExSweepHandleTable+0xd5. fffff60f`18b337a0 fffff806`0685d6dc : ffffffff`ffffffff ffffaa04`0716c280 fffff60f`18b337f0 fffff806`068655dc : nt!ObKillProcess+0x35. fffff60f`18b337d0 fffff806`06906596 : ffffaa04`0716c280 ffffc085`d1a71190 fffff60f`18b33a20 00000000`00000000 : nt!PspRundownSingleProcess+0x204. fffff60f`18b33860 fffff806`068d22e8 : 00000000`00000001 00000000`00000001 00000000`00000000 000000e0`2444b000 : nt!PspExitThread+0x5f6. fffff60f`18b33960 fffff806`06467fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38. fffff60f`18b339a0 fffff806`065f9d20 : 00000000`00000000 fffff60f`18b33a50 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487. fffff60f`18b33a50 fffff806`0660725f : 00007530`18b33b00 00000000`00000000 ffffaa04`07135080 ffffffff`dc3cba00 : nt!KiInitiateUserApc+0x70. fffff60f`18b33b90 00007ffe`04f8cb04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f. 000000e0`243bf278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`04f8cb04. SYMBOL_NAME: nt!ObCloseHandleTableEntry+8f. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.19041.685. STACK_COMMAND: .cxr 0xfffff60f18b32bb0 ; kb. BUCKET_ID_FUNC_OFFSET: 8f. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObCloseHandleTableEntry. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {6d2b6af8-c878-f9a4-39b8-9f62c5d0ad0d} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff8017f2d85ce, Address of the instruction which caused the bugcheck. Arg3: fffffd84833b0ea0, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5140. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 5280. Key : Analysis.Memory.CommitPeak.Mb. Value: 74. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff8017f2d85ce. BUGCHECK_P3: fffffd84833b0ea0. BUGCHECK_P4: 0. CONTEXT: fffffd84833b0ea0 -- (.cxr 0xfffffd84833b0ea0) rax=0000000000000000 rbx=ffff9082db2f6bf0 rcx=ffffd801389423d8. rdx=ffffc80ca8577890 rsi=ffff9082db2f6bf0 rdi=00000000000006fc. rip=fffff8017f2d85ce rsp=fffffd84833b18a8 rbp=ffff9082db4d8b40. r8=0000000000000000 r9=ffffc80ca8577860 r10=00000000001423a0. r11=fffffd84833b18f0 r12=ffffd80138800050 r13=fffffd84833b1988. r14=fffff8017f2d8520 r15=000000000017fffc. iopl=0 nv up ei pl nz na pe nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202. nt!ObpCaptureHandleInformation+0xae: fffff801`7f2d85ce 8a4028 mov al,byte ptr [rax+28h] ds:002b:00000000`00000028=?? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: steam.exe. STACK_TEXT: fffffd84`833b18a8 fffff801`7f3483b1 : 00000000`000006fc 00000000`00000000 ffffc80c`00000000 fffff801`7ec74c12 : nt!ObpCaptureHandleInformation+0xae. fffffd84`833b18b0 fffff801`7f2d84a5 : fffff801`7f2d8520 ffff9082`db4d8b58 00000000`0017fffc fffffd84`833b19f0 : nt!ExpSnapShotHandleTables+0x131. fffffd84`833b1940 fffff801`7f345b31 : fffffd84`833b19f0 00000000`001423a0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39. fffffd84`833b1980 fffff801`7efe6dc9 : 00000000`0a68f050 fffff801`00020000 ffffd801`38800050 ffffc80c`aa005010 : nt!ExpGetHandleInformation+0x5d. fffffd84`833b19c0 fffff801`7efe5b37 : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149. fffffd84`833b1bc0 fffff801`7ee071b5 : ffffc80c`a71b0000 ffffc80c`a8145de0 fffffd84`833b1c18 fffffd84`833b1c80 : nt!NtQuerySystemInformation+0x37. fffffd84`833b1c00 00007ffb`b850c674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 00000000`0019dd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b850c674. SYMBOL_NAME: nt!ObpCaptureHandleInformation+ae. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.19041.685. STACK_COMMAND: .cxr 0xfffffd84833b0ea0 ; kb. BUCKET_ID_FUNC_OFFSET: ae. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff8014ced85ce, Address of the instruction which caused the bugcheck. Arg3: ffffc089d4860ea0, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 6124. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 18891. Key : Analysis.Memory.CommitPeak.Mb. Value: 83. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff8014ced85ce. BUGCHECK_P3: ffffc089d4860ea0. BUGCHECK_P4: 0. CONTEXT: ffffc089d4860ea0 -- (.cxr 0xffffc089d4860ea0) rax=0000000000000000 rbx=ffffd10159f6b4e0 rcx=ffff80003b54fa28. rdx=ffffe38e84767250 rsi=ffffd10159f6b4e0 rdi=0000000000000138. rip=fffff8014ced85ce rsp=ffffc089d48618a8 rbp=ffffd1015a447200. r8=0000000000000000 r9=ffffe38e84767220 r10=000000000014f9f0. r11=ffffc089d48618f0 r12=ffff80003b400050 r13=ffffc089d4861988. r14=fffff8014ced8520 r15=000000000017fffc. iopl=0 nv up ei pl nz na pe nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202. nt!ObpCaptureHandleInformation+0xae: fffff801`4ced85ce 8a4028 mov al,byte ptr [rax+28h] ds:002b:00000000`00000028=?? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: GameOverlayUI.exe. STACK_TEXT: ffffc089`d48618a8 fffff801`4cf483b1 : 00000000`00000138 00000000`00000000 ffffe38e`00000000 fffff801`4c874c12 : nt!ObpCaptureHandleInformation+0xae. ffffc089`d48618b0 fffff801`4ced84a5 : fffff801`4ced8520 ffffd101`5a447218 00000000`0017fffc ffffc089`d48619f0 : nt!ExpSnapShotHandleTables+0x131. ffffc089`d4861940 fffff801`4cf45b31 : ffffc089`d48619f0 00000000`0014f9f0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39. ffffc089`d4861980 fffff801`4cbe6dc9 : 00000000`09d5b050 fffff801`00020000 ffff8000`3b400050 ffffe38e`8307e010 : nt!ExpGetHandleInformation+0x5d. ffffc089`d48619c0 fffff801`4cbe5b37 : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149. ffffc089`d4861bc0 fffff801`4ca071b5 : ffffe38e`85040000 00000000`00000000 ffffc089`d4861c80 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37. ffffc089`d4861c00 00007ffc`dd42c674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 00000000`06c6dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dd42c674. SYMBOL_NAME: nt!ObpCaptureHandleInformation+ae. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.19041.685. STACK_COMMAND: .cxr 0xffffc089d4860ea0 ; kb. BUCKET_ID_FUNC_OFFSET: ae. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5} Followup: MachineOwner. --------- REFERENCE_BY_POINTER (18) Arguments: Arg1: ffffc70efec9f560, Object type of the object whose reference count is being lowered. Arg2: ffffc70f087d7a60, Object whose reference count is being lowered. Arg3: 0000000000000001, Reserved. Arg4: ffffffffffffffff, Reserved. The reference count of an object is illegal for the current state of the object. Each time a driver uses a pointer to an object the driver calls a kernel routine. to increment the reference count of the object. When the driver is done with the. pointer the driver calls another kernel routine to decrement the reference count. Drivers must match calls to the increment and decrement routines. This bugcheck. can occur because an object's reference count goes to zero while there are still. open handles to the object, in which case the fourth parameter indicates the number. of opened handles. It may also occur when the object's reference count drops below zero. whether or not there are open handles to the object, and in that case the fourth parameter. contains the actual value of the pointer references count. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3859. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 7180. Key : Analysis.Memory.CommitPeak.Mb. Value: 82. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 18. BUGCHECK_P1: ffffc70efec9f560. BUGCHECK_P2: ffffc70f087d7a60. BUGCHECK_P3: 1. BUGCHECK_P4: ffffffffffffffff. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: svchost.exe. STACK_TEXT: ffff990c`259dba08 fffff802`686329bc : 00000000`00000018 ffffc70e`fec9f560 ffffc70f`087d7a60 00000000`00000001 : nt!KeBugCheckEx. ffff990c`259dba10 fffff802`6882887e : ffffc70e`fec9f560 00000000`00000000 ffffffff`ffffffff ffff9e84`b83f1a60 : nt!ObfDereferenceObjectWithTag+0x1d180c. ffff990c`259dba50 fffff802`6882c4fc : 00000000`00000298 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 : nt!ObCloseHandleTableEntry+0x29e. ffff990c`259dbb90 fffff802`686071b5 : ffffc70f`05c1a000 0000000d`5adfd090 ffff990c`259dbc80 ffffc70f`05c0a2d0 : nt!NtClose+0xec. ffff990c`259dbc00 00007ffb`4e22c194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 0000000d`5adfd378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4e22c194. SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+1d180c. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.19041.685. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 1d180c. FAILURE_BUCKET_ID: 0x18_OVER_DEREFERENCE_nt!ObfDereferenceObjectWithTag. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {4139309c-4e9f-52f0-ac5e-4041e7a86a20} Followup: MachineOwner. ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.