E5450 sistem mavi ekran hatası

ravbin

Femtopat
Katılım
31 Aralık 2020
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Bilgisayarım arada mavi ekran veriyor. DMP dosyalarını aşağıya ekliyorum.

Xeon E5450 OC 4.02 GHz.
ASUS P5QC.
Gigabyte 750 Ti 2 GB.
Nanya 4 GB 1333MHz tek kanal DDR3.

RAM'ler DDR2 çift slot takılı iken de aynı sorun vardı.

Minidump
 
Game overlay kullanıyor musunuz ?
Hocam steam.exe, SearchApp, GameOverlay, gibi sebeplerden dolayı mavi ekran yemişsiniz sanırım.
Windows update yapın, ekran kartınızı güncelleyin ve windows bellek tanılama aracıyla ramlerinizi test ettirin.
 
Son düzenleme:
Game overlay kullanıyor musunuz?
Hocam steam.exe, searchapp, gameoverlay, gibi sebeplerden dolayı mavi ekran yemişsiniz sanırım.
Windows Update yapın, ekran kartınızı güncelleyin ve Windows bellek tanılama aracıyla RAM'lerinizi test ettirin.

Bilerek kullanmıyorum ama oyun açarken ekrana Gaming overlay bildirimi çıkıyor. Deneyeceğim.
 
Windows Bellek Tanılama ile değil, MemTest86 ile belleklerinize test yapın. Sonucunu mutlaka paylaşın.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: ffff8444c03be0f8
Arg3: 0000000000000001
Arg4: 8a0000013cc1786b

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6203

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16195

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 5100

BUGCHECK_P2: ffff8444c03be0f8

BUGCHECK_P3: 1

BUGCHECK_P4: 8a0000013cc1786b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SearchApp.exe

STACK_TEXT: 
ffffb507`2ad534b8 fffff806`0581b5cd     : 00000000`0000001a 00000000`00005100 ffff8444`c03be0f8 00000000`00000001 : nt!KeBugCheckEx
ffffb507`2ad534c0 fffff806`05674691     : fffff806`0604ed40 ffffd604`760ec700 00000000`00000000 00000000`000007f4 : nt!MiFlushTbAsNeeded+0x1fb54d
ffffb507`2ad53600 fffff806`05674b84     : 00000000`0000092e ffffd604`00000000 00000000`00001001 00000000`00000fff : nt!MiReservePtes+0x2f1
ffffb507`2ad536d0 fffff806`05709cad     : ffffd604`789fae10 00000000`00000000 fffff806`06122fc0 ffffd604`757731c0 : nt!MmMapLockedPagesSpecifyCache+0xd4
ffffb507`2ad53730 fffff806`0563dee2     : ffffd604`789fae10 ffffb507`2ad53910 ffffb507`2ad537c0 00000000`31526d73 : nt!SmFpAllocate+0xa5
ffffb507`2ad53780 fffff806`0563da7e     : 00000000`0000000c fffff806`061229c0 ffffd604`789fae10 00000000`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxPrepareToQueue+0x116
ffffb507`2ad537e0 fffff806`05709597     : 00000000`0000000c 00000000`00000001 ffffd604`789fae10 ffffd604`75773100 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x56
ffffb507`2ad53870 fffff806`0571d34b     : ffffd604`00000001 ffffd604`757731c0 00000000`00000000 ffffd604`760ed000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffb507`2ad538e0 fffff806`056b6f60     : 0000007f`00000100 00000000`00000000 ffffb507`2ad53b38 fffff806`056b4eb0 : nt!SmPageRead+0x33
ffffb507`2ad53930 fffff806`056b4a0d     : 00000000`00000002 ffffb507`2ad539c0 ffffb507`2ad53b38 ffffd604`757730b0 : nt!MiIssueHardFaultIo+0x10c
ffffb507`2ad53980 fffff806`0560c9c8     : 00000000`c0033333 00000000`00000000 00007ff8`a3047000 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffb507`2ad53a40 fffff806`056ccdd0     : 00000000`00000000 00000000`00000000 ffffd604`7750d918 00000000`0000033f : nt!MmAccessFault+0x468
ffffb507`2ad53be0 fffff806`056cccd5     : 00000000`00000000 ffffd604`7750d918 00000000`00000000 00000000`00000000 : nt!MiReleaseOutSwapReservations+0xb4
ffffb507`2ad53c90 fffff806`056ccbf3     : 00000000`00000000 ffffd604`77510d08 00000000`00000005 00000000`00000000 : nt!MiProcessWsInSwapRanges+0x71
ffffb507`2ad53cc0 fffff806`056cbf57     : 00000000`00000000 ffffd604`760ec080 00000000`00000000 00000000`00000000 : nt!MiProcessWsInSwapSupport+0x63
ffffb507`2ad53cf0 fffff806`05a5e05b     : 00000000`00000001 00000000`00000001 ffffd604`73980140 00000000`00000003 : nt!MmInSwapWorkingSet+0xff
ffffb507`2ad53d70 fffff806`056d96d9     : 00000000`00000000 ffffd604`760ec080 ffffd604`741df040 ffffd604`75975060 : nt!PspChangeProcessExecutionState+0x227
ffffb507`2ad53e30 fffff806`05a120e6     : 00000000`00000000 ffffd604`75975060 00000000`00000000 fffff806`05a12572 : nt!PspExecuteJobFreezeThawCallback+0x69
ffffb507`2ad53e80 fffff806`05a11ff4     : ffffd604`75975060 ffffb507`2ad53fc9 fffff806`056d9670 ffffd604`75975060 : nt!PspCallJobHierarchyCallbacks+0xba
ffffb507`2ad53ed0 fffff806`05acb989     : 00000000`00000005 00000000`00000000 fffff806`056d9670 00000000`00000000 : nt!PspEnumJobsAndProcessesInJobHierarchy+0x1cc
ffffb507`2ad53f60 fffff806`05a604cf     : ffffb605`68cfbde0 ffffb605`70143820 00000000`00000002 00000000`00000000 : nt!PspFreezeJobTree+0x105
ffffb507`2ad54030 fffff806`058071b5     : 00000196`0dee7ea8 00000000`00000000 ffffb507`2ad54c80 00000000`00000000 : nt!NtSetInformationJobObject+0x39f
ffffb507`2ad54c00 00007ff8`a6def284     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000040`2817f248 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a6def284


SYMBOL_NAME:  nt!MiFlushTbAsNeeded+1fb54d

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1fb54d

FAILURE_BUCKET_ID:  0x1a_5100_nt!MiFlushTbAsNeeded

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {13b6d0a0-8171-b4a6-ae95-907aaf025545}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060682866f, Address of the instruction which caused the bugcheck
Arg3: fffff60f18b32bb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8592

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060682866f

BUGCHECK_P3: fffff60f18b32bb0

BUGCHECK_P4: 0

CONTEXT:  fffff60f18b32bb0 -- (.cxr 0xfffff60f18b32bb0)
rax=fffff80606200000 rbx=00000000000004ec rcx=000000000000006b
rdx=ffffc085d29fe3b0 rsi=ffffc085d29fe3b0 rdi=0000000000000000
rip=fffff8060682866f rsp=fffff60f18b335b0 rbp=fffff60f18b33699
 r8=ffffaa040716c280  r9=ffffaa040716c280 r10=00000000ffffffff
r11=00000000000004f7 r12=0000000000000000 r13=ffffc085d09e6180
r14=ffffaa04073770e0 r15=00000000000004ec
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!ObCloseHandleTableEntry+0x8f:
fffff806`0682866f 4c8b97a8000000  mov     r10,qword ptr [rdi+0A8h] ds:002b:00000000`000000a8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  HxT

STACK_TEXT: 
fffff60f`18b335b0 fffff806`067d5f55     : 00000000`00000004 ffffc085`d3261e18 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x8f
fffff60f`18b336f0 fffff806`067d823d     : ffffaa04`07135080 ffffaa04`07135080 ffffffff`ffffff01 ffffaa04`0716c6d8 : nt!ExSweepHandleTable+0xd5
fffff60f`18b337a0 fffff806`0685d6dc     : ffffffff`ffffffff ffffaa04`0716c280 fffff60f`18b337f0 fffff806`068655dc : nt!ObKillProcess+0x35
fffff60f`18b337d0 fffff806`06906596     : ffffaa04`0716c280 ffffc085`d1a71190 fffff60f`18b33a20 00000000`00000000 : nt!PspRundownSingleProcess+0x204
fffff60f`18b33860 fffff806`068d22e8     : 00000000`00000001 00000000`00000001 00000000`00000000 000000e0`2444b000 : nt!PspExitThread+0x5f6
fffff60f`18b33960 fffff806`06467fb7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff60f`18b339a0 fffff806`065f9d20     : 00000000`00000000 fffff60f`18b33a50 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffff60f`18b33a50 fffff806`0660725f     : 00007530`18b33b00 00000000`00000000 ffffaa04`07135080 ffffffff`dc3cba00 : nt!KiInitiateUserApc+0x70
fffff60f`18b33b90 00007ffe`04f8cb04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000e0`243bf278 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`04f8cb04


SYMBOL_NAME:  nt!ObCloseHandleTableEntry+8f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xfffff60f18b32bb0 ; kb

BUCKET_ID_FUNC_OFFSET:  8f

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObCloseHandleTableEntry

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6d2b6af8-c878-f9a4-39b8-9f62c5d0ad0d}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8017f2d85ce, Address of the instruction which caused the bugcheck
Arg3: fffffd84833b0ea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5280

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8017f2d85ce

BUGCHECK_P3: fffffd84833b0ea0

BUGCHECK_P4: 0

CONTEXT:  fffffd84833b0ea0 -- (.cxr 0xfffffd84833b0ea0)
rax=0000000000000000 rbx=ffff9082db2f6bf0 rcx=ffffd801389423d8
rdx=ffffc80ca8577890 rsi=ffff9082db2f6bf0 rdi=00000000000006fc
rip=fffff8017f2d85ce rsp=fffffd84833b18a8 rbp=ffff9082db4d8b40
 r8=0000000000000000  r9=ffffc80ca8577860 r10=00000000001423a0
r11=fffffd84833b18f0 r12=ffffd80138800050 r13=fffffd84833b1988
r14=fffff8017f2d8520 r15=000000000017fffc
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210202
nt!ObpCaptureHandleInformation+0xae:
fffff801`7f2d85ce 8a4028          mov     al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

STACK_TEXT: 
fffffd84`833b18a8 fffff801`7f3483b1     : 00000000`000006fc 00000000`00000000 ffffc80c`00000000 fffff801`7ec74c12 : nt!ObpCaptureHandleInformation+0xae
fffffd84`833b18b0 fffff801`7f2d84a5     : fffff801`7f2d8520 ffff9082`db4d8b58 00000000`0017fffc fffffd84`833b19f0 : nt!ExpSnapShotHandleTables+0x131
fffffd84`833b1940 fffff801`7f345b31     : fffffd84`833b19f0 00000000`001423a0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39
fffffd84`833b1980 fffff801`7efe6dc9     : 00000000`0a68f050 fffff801`00020000 ffffd801`38800050 ffffc80c`aa005010 : nt!ExpGetHandleInformation+0x5d
fffffd84`833b19c0 fffff801`7efe5b37     : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149
fffffd84`833b1bc0 fffff801`7ee071b5     : ffffc80c`a71b0000 ffffc80c`a8145de0 fffffd84`833b1c18 fffffd84`833b1c80 : nt!NtQuerySystemInformation+0x37
fffffd84`833b1c00 00007ffb`b850c674     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0019dd88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b850c674


SYMBOL_NAME:  nt!ObpCaptureHandleInformation+ae

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xfffffd84833b0ea0 ; kb

BUCKET_ID_FUNC_OFFSET:  ae

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8014ced85ce, Address of the instruction which caused the bugcheck
Arg3: ffffc089d4860ea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6124

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18891

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8014ced85ce

BUGCHECK_P3: ffffc089d4860ea0

BUGCHECK_P4: 0

CONTEXT:  ffffc089d4860ea0 -- (.cxr 0xffffc089d4860ea0)
rax=0000000000000000 rbx=ffffd10159f6b4e0 rcx=ffff80003b54fa28
rdx=ffffe38e84767250 rsi=ffffd10159f6b4e0 rdi=0000000000000138
rip=fffff8014ced85ce rsp=ffffc089d48618a8 rbp=ffffd1015a447200
 r8=0000000000000000  r9=ffffe38e84767220 r10=000000000014f9f0
r11=ffffc089d48618f0 r12=ffff80003b400050 r13=ffffc089d4861988
r14=fffff8014ced8520 r15=000000000017fffc
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!ObpCaptureHandleInformation+0xae:
fffff801`4ced85ce 8a4028          mov     al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GameOverlayUI.exe

STACK_TEXT: 
ffffc089`d48618a8 fffff801`4cf483b1     : 00000000`00000138 00000000`00000000 ffffe38e`00000000 fffff801`4c874c12 : nt!ObpCaptureHandleInformation+0xae
ffffc089`d48618b0 fffff801`4ced84a5     : fffff801`4ced8520 ffffd101`5a447218 00000000`0017fffc ffffc089`d48619f0 : nt!ExpSnapShotHandleTables+0x131
ffffc089`d4861940 fffff801`4cf45b31     : ffffc089`d48619f0 00000000`0014f9f0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39
ffffc089`d4861980 fffff801`4cbe6dc9     : 00000000`09d5b050 fffff801`00020000 ffff8000`3b400050 ffffe38e`8307e010 : nt!ExpGetHandleInformation+0x5d
ffffc089`d48619c0 fffff801`4cbe5b37     : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149
ffffc089`d4861bc0 fffff801`4ca071b5     : ffffe38e`85040000 00000000`00000000 ffffc089`d4861c80 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
ffffc089`d4861c00 00007ffc`dd42c674     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`06c6dff8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dd42c674


SYMBOL_NAME:  nt!ObpCaptureHandleInformation+ae

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffffc089d4860ea0 ; kb

BUCKET_ID_FUNC_OFFSET:  ae

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
---------

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: ffffc70efec9f560, Object type of the object whose reference count is being lowered
Arg2: ffffc70f087d7a60, Object whose reference count is being lowered
Arg3: 0000000000000001, Reserved
Arg4: ffffffffffffffff, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This bugcheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3859

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7180

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  18

BUGCHECK_P1: ffffc70efec9f560

BUGCHECK_P2: ffffc70f087d7a60

BUGCHECK_P3: 1

BUGCHECK_P4: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffff990c`259dba08 fffff802`686329bc     : 00000000`00000018 ffffc70e`fec9f560 ffffc70f`087d7a60 00000000`00000001 : nt!KeBugCheckEx
ffff990c`259dba10 fffff802`6882887e     : ffffc70e`fec9f560 00000000`00000000 ffffffff`ffffffff ffff9e84`b83f1a60 : nt!ObfDereferenceObjectWithTag+0x1d180c
ffff990c`259dba50 fffff802`6882c4fc     : 00000000`00000298 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 : nt!ObCloseHandleTableEntry+0x29e
ffff990c`259dbb90 fffff802`686071b5     : ffffc70f`05c1a000 0000000d`5adfd090 ffff990c`259dbc80 ffffc70f`05c0a2d0 : nt!NtClose+0xec
ffff990c`259dbc00 00007ffb`4e22c194     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000000d`5adfd378 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4e22c194


SYMBOL_NAME:  nt!ObfDereferenceObjectWithTag+1d180c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1d180c

FAILURE_BUCKET_ID:  0x18_OVER_DEREFERENCE_nt!ObfDereferenceObjectWithTag

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4139309c-4e9f-52f0-ac5e-4041e7a86a20}

Followup:     MachineOwner
---------
 
Windows bellek tanılama ile değil, Memtest86 ile belleklerinize test yapın. Sonucunu mutlaka paylaşın.

Kod:
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: ffff8444c03be0f8.
Arg3: 0000000000000001.
Arg4: 8a0000013cc1786b.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6203.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 16195.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 5100.

BUGCHECK_P2: ffff8444c03be0f8.

BUGCHECK_P3: 1.

BUGCHECK_P4: 8a0000013cc1786b.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: SearchApp.exe.

STACK_TEXT:
ffffb507`2ad534b8 fffff806`0581b5cd : 00000000`0000001a 00000000`00005100 ffff8444`c03be0f8 00000000`00000001 : nt!KeBugCheckEx.
ffffb507`2ad534c0 fffff806`05674691 : fffff806`0604ed40 ffffd604`760ec700 00000000`00000000 00000000`000007f4 : nt!MiFlushTbAsNeeded+0x1fb54d.
ffffb507`2ad53600 fffff806`05674b84 : 00000000`0000092e ffffd604`00000000 00000000`00001001 00000000`00000fff : nt!MiReservePtes+0x2f1.
ffffb507`2ad536d0 fffff806`05709cad : ffffd604`789fae10 00000000`00000000 fffff806`06122fc0 ffffd604`757731c0 : nt!MmMapLockedPagesSpecifyCache+0xd4.
ffffb507`2ad53730 fffff806`0563dee2 : ffffd604`789fae10 ffffb507`2ad53910 ffffb507`2ad537c0 00000000`31526d73 : nt!SmFpAllocate+0xa5.
ffffb507`2ad53780 fffff806`0563da7e : 00000000`0000000c fffff806`061229c0 ffffd604`789fae10 00000000`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxPrepareToQueue+0x116.
ffffb507`2ad537e0 fffff806`05709597 : 00000000`0000000c 00000000`00000001 ffffd604`789fae10 ffffd604`75773100 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x56.
ffffb507`2ad53870 fffff806`0571d34b : ffffd604`00000001 ffffd604`757731c0 00000000`00000000 ffffd604`760ed000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167.
ffffb507`2ad538e0 fffff806`056b6f60 : 0000007f`00000100 00000000`00000000 ffffb507`2ad53b38 fffff806`056b4eb0 : nt!SmPageRead+0x33.
ffffb507`2ad53930 fffff806`056b4a0d : 00000000`00000002 ffffb507`2ad539c0 ffffb507`2ad53b38 ffffd604`757730b0 : nt!MiIssueHardFaultIo+0x10c.
ffffb507`2ad53980 fffff806`0560c9c8 : 00000000`c0033333 00000000`00000000 00007ff8`a3047000 00000000`00000000 : nt!MiIssueHardFault+0x29d.
ffffb507`2ad53a40 fffff806`056ccdd0 : 00000000`00000000 00000000`00000000 ffffd604`7750d918 00000000`0000033f : nt!MmAccessFault+0x468.
ffffb507`2ad53be0 fffff806`056cccd5 : 00000000`00000000 ffffd604`7750d918 00000000`00000000 00000000`00000000 : nt!MiReleaseOutSwapReservations+0xb4.
ffffb507`2ad53c90 fffff806`056ccbf3 : 00000000`00000000 ffffd604`77510d08 00000000`00000005 00000000`00000000 : nt!MiProcessWsInSwapRanges+0x71.
ffffb507`2ad53cc0 fffff806`056cbf57 : 00000000`00000000 ffffd604`760ec080 00000000`00000000 00000000`00000000 : nt!MiProcessWsInSwapSupport+0x63.
ffffb507`2ad53cf0 fffff806`05a5e05b : 00000000`00000001 00000000`00000001 ffffd604`73980140 00000000`00000003 : nt!MmInSwapWorkingSet+0xff.
ffffb507`2ad53d70 fffff806`056d96d9 : 00000000`00000000 ffffd604`760ec080 ffffd604`741df040 ffffd604`75975060 : nt!PspChangeProcessExecutionState+0x227.
ffffb507`2ad53e30 fffff806`05a120e6 : 00000000`00000000 ffffd604`75975060 00000000`00000000 fffff806`05a12572 : nt!PspExecuteJobFreezeThawCallback+0x69.
ffffb507`2ad53e80 fffff806`05a11ff4 : ffffd604`75975060 ffffb507`2ad53fc9 fffff806`056d9670 ffffd604`75975060 : nt!PspCallJobHierarchyCallbacks+0xba.
ffffb507`2ad53ed0 fffff806`05acb989 : 00000000`00000005 00000000`00000000 fffff806`056d9670 00000000`00000000 : nt!PspEnumJobsAndProcessesInJobHierarchy+0x1cc.
ffffb507`2ad53f60 fffff806`05a604cf : ffffb605`68cfbde0 ffffb605`70143820 00000000`00000002 00000000`00000000 : nt!PspFreezeJobTree+0x105.
ffffb507`2ad54030 fffff806`058071b5 : 00000196`0dee7ea8 00000000`00000000 ffffb507`2ad54c80 00000000`00000000 : nt!NtSetInformationJobObject+0x39f.
ffffb507`2ad54c00 00007ff8`a6def284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000040`2817f248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a6def284.

SYMBOL_NAME: nt!MiFlushTbAsNeeded+1fb54d.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 1fb54d.

FAILURE_BUCKET_ID: 0x1a_5100_nt!MiFlushTbAsNeeded.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {13b6d0a0-8171-b4a6-ae95-907aaf025545}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff8060682866f, Address of the instruction which caused the bugcheck.
Arg3: fffff60f18b32bb0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5624.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 8592.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8060682866f.

BUGCHECK_P3: fffff60f18b32bb0.

BUGCHECK_P4: 0.

CONTEXT: fffff60f18b32bb0 -- (.cxr 0xfffff60f18b32bb0)
rax=fffff80606200000 rbx=00000000000004ec rcx=000000000000006b.
rdx=ffffc085d29fe3b0 rsi=ffffc085d29fe3b0 rdi=0000000000000000.
rip=fffff8060682866f rsp=fffff60f18b335b0 rbp=fffff60f18b33699.
r8=ffffaa040716c280 r9=ffffaa040716c280 r10=00000000ffffffff.
r11=00000000000004f7 r12=0000000000000000 r13=ffffc085d09e6180.
r14=ffffaa04073770e0 r15=00000000000004ec.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202.
nt!ObCloseHandleTableEntry+0x8f:
fffff806`0682866f 4c8b97a8000000 mov r10,qword ptr [rdi+0A8h] ds:002b:00000000`000000a8=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: HxT.

STACK_TEXT:
fffff60f`18b335b0 fffff806`067d5f55 : 00000000`00000004 ffffc085`d3261e18 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x8f.
fffff60f`18b336f0 fffff806`067d823d : ffffaa04`07135080 ffffaa04`07135080 ffffffff`ffffff01 ffffaa04`0716c6d8 : nt!ExSweepHandleTable+0xd5.
fffff60f`18b337a0 fffff806`0685d6dc : ffffffff`ffffffff ffffaa04`0716c280 fffff60f`18b337f0 fffff806`068655dc : nt!ObKillProcess+0x35.
fffff60f`18b337d0 fffff806`06906596 : ffffaa04`0716c280 ffffc085`d1a71190 fffff60f`18b33a20 00000000`00000000 : nt!PspRundownSingleProcess+0x204.
fffff60f`18b33860 fffff806`068d22e8 : 00000000`00000001 00000000`00000001 00000000`00000000 000000e0`2444b000 : nt!PspExitThread+0x5f6.
fffff60f`18b33960 fffff806`06467fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38.
fffff60f`18b339a0 fffff806`065f9d20 : 00000000`00000000 fffff60f`18b33a50 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487.
fffff60f`18b33a50 fffff806`0660725f : 00007530`18b33b00 00000000`00000000 ffffaa04`07135080 ffffffff`dc3cba00 : nt!KiInitiateUserApc+0x70.
fffff60f`18b33b90 00007ffe`04f8cb04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
000000e0`243bf278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`04f8cb04.

SYMBOL_NAME: nt!ObCloseHandleTableEntry+8f.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .cxr 0xfffff60f18b32bb0 ; kb.

BUCKET_ID_FUNC_OFFSET: 8f.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObCloseHandleTableEntry.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6d2b6af8-c878-f9a4-39b8-9f62c5d0ad0d}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff8017f2d85ce, Address of the instruction which caused the bugcheck.
Arg3: fffffd84833b0ea0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5140.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 5280.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8017f2d85ce.

BUGCHECK_P3: fffffd84833b0ea0.

BUGCHECK_P4: 0.

CONTEXT: fffffd84833b0ea0 -- (.cxr 0xfffffd84833b0ea0)
rax=0000000000000000 rbx=ffff9082db2f6bf0 rcx=ffffd801389423d8.
rdx=ffffc80ca8577890 rsi=ffff9082db2f6bf0 rdi=00000000000006fc.
rip=fffff8017f2d85ce rsp=fffffd84833b18a8 rbp=ffff9082db4d8b40.
r8=0000000000000000 r9=ffffc80ca8577860 r10=00000000001423a0.
r11=fffffd84833b18f0 r12=ffffd80138800050 r13=fffffd84833b1988.
r14=fffff8017f2d8520 r15=000000000017fffc.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202.
nt!ObpCaptureHandleInformation+0xae:
fffff801`7f2d85ce 8a4028 mov al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: steam.exe.

STACK_TEXT:
fffffd84`833b18a8 fffff801`7f3483b1 : 00000000`000006fc 00000000`00000000 ffffc80c`00000000 fffff801`7ec74c12 : nt!ObpCaptureHandleInformation+0xae.
fffffd84`833b18b0 fffff801`7f2d84a5 : fffff801`7f2d8520 ffff9082`db4d8b58 00000000`0017fffc fffffd84`833b19f0 : nt!ExpSnapShotHandleTables+0x131.
fffffd84`833b1940 fffff801`7f345b31 : fffffd84`833b19f0 00000000`001423a0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39.
fffffd84`833b1980 fffff801`7efe6dc9 : 00000000`0a68f050 fffff801`00020000 ffffd801`38800050 ffffc80c`aa005010 : nt!ExpGetHandleInformation+0x5d.
fffffd84`833b19c0 fffff801`7efe5b37 : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149.
fffffd84`833b1bc0 fffff801`7ee071b5 : ffffc80c`a71b0000 ffffc80c`a8145de0 fffffd84`833b1c18 fffffd84`833b1c80 : nt!NtQuerySystemInformation+0x37.
fffffd84`833b1c00 00007ffb`b850c674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0019dd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b850c674.

SYMBOL_NAME: nt!ObpCaptureHandleInformation+ae.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .cxr 0xfffffd84833b0ea0 ; kb.

BUCKET_ID_FUNC_OFFSET: ae.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff8014ced85ce, Address of the instruction which caused the bugcheck.
Arg3: ffffc089d4860ea0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6124.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 18891.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8014ced85ce.

BUGCHECK_P3: ffffc089d4860ea0.

BUGCHECK_P4: 0.

CONTEXT: ffffc089d4860ea0 -- (.cxr 0xffffc089d4860ea0)
rax=0000000000000000 rbx=ffffd10159f6b4e0 rcx=ffff80003b54fa28.
rdx=ffffe38e84767250 rsi=ffffd10159f6b4e0 rdi=0000000000000138.
rip=fffff8014ced85ce rsp=ffffc089d48618a8 rbp=ffffd1015a447200.
r8=0000000000000000 r9=ffffe38e84767220 r10=000000000014f9f0.
r11=ffffc089d48618f0 r12=ffff80003b400050 r13=ffffc089d4861988.
r14=fffff8014ced8520 r15=000000000017fffc.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202.
nt!ObpCaptureHandleInformation+0xae:
fffff801`4ced85ce 8a4028 mov al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: GameOverlayUI.exe.

STACK_TEXT:
ffffc089`d48618a8 fffff801`4cf483b1 : 00000000`00000138 00000000`00000000 ffffe38e`00000000 fffff801`4c874c12 : nt!ObpCaptureHandleInformation+0xae.
ffffc089`d48618b0 fffff801`4ced84a5 : fffff801`4ced8520 ffffd101`5a447218 00000000`0017fffc ffffc089`d48619f0 : nt!ExpSnapShotHandleTables+0x131.
ffffc089`d4861940 fffff801`4cf45b31 : ffffc089`d48619f0 00000000`0014f9f0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39.
ffffc089`d4861980 fffff801`4cbe6dc9 : 00000000`09d5b050 fffff801`00020000 ffff8000`3b400050 ffffe38e`8307e010 : nt!ExpGetHandleInformation+0x5d.
ffffc089`d48619c0 fffff801`4cbe5b37 : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149.
ffffc089`d4861bc0 fffff801`4ca071b5 : ffffe38e`85040000 00000000`00000000 ffffc089`d4861c80 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37.
ffffc089`d4861c00 00007ffc`dd42c674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`06c6dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dd42c674.

SYMBOL_NAME: nt!ObpCaptureHandleInformation+ae.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .cxr 0xffffc089d4860ea0 ; kb.

BUCKET_ID_FUNC_OFFSET: ae.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup: MachineOwner.
---------

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: ffffc70efec9f560, Object type of the object whose reference count is being lowered.
Arg2: ffffc70f087d7a60, Object whose reference count is being lowered.
Arg3: 0000000000000001, Reserved.
Arg4: ffffffffffffffff, Reserved.
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine.
to increment the reference count of the object. When the driver is done with the.
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This bugcheck.
can occur because an object's reference count goes to zero while there are still.
open handles to the object, in which case the fourth parameter indicates the number.
of opened handles. It may also occur when the object's reference count drops below zero.
whether or not there are open handles to the object, and in that case the fourth parameter.
contains the actual value of the pointer references count.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3859.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 7180.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 18.

BUGCHECK_P1: ffffc70efec9f560.

BUGCHECK_P2: ffffc70f087d7a60.

BUGCHECK_P3: 1.

BUGCHECK_P4: ffffffffffffffff.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

STACK_TEXT:
ffff990c`259dba08 fffff802`686329bc : 00000000`00000018 ffffc70e`fec9f560 ffffc70f`087d7a60 00000000`00000001 : nt!KeBugCheckEx.
ffff990c`259dba10 fffff802`6882887e : ffffc70e`fec9f560 00000000`00000000 ffffffff`ffffffff ffff9e84`b83f1a60 : nt!ObfDereferenceObjectWithTag+0x1d180c.
ffff990c`259dba50 fffff802`6882c4fc : 00000000`00000298 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 ffffc70f`05c0a2d0 : nt!ObCloseHandleTableEntry+0x29e.
ffff990c`259dbb90 fffff802`686071b5 : ffffc70f`05c1a000 0000000d`5adfd090 ffff990c`259dbc80 ffffc70f`05c0a2d0 : nt!NtClose+0xec.
ffff990c`259dbc00 00007ffb`4e22c194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
0000000d`5adfd378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4e22c194.

SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+1d180c.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1d180c.

FAILURE_BUCKET_ID: 0x18_OVER_DEREFERENCE_nt!ObfDereferenceObjectWithTag.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {4139309c-4e9f-52f0-ac5e-4041e7a86a20}

Followup: MachineOwner.
---------

Bayağıdır bilgisayar ile ilgilenmiyordum testi yeni yaptım. Hiçbir hata bulunamadı ESC'ye basıp çıkın yazdı ama kayıt dosyası oluşturuyorsa nerede bilmiyorum.

Bilgisayara daha önceden denemek için başka bir işlemci takmıştım. Onun driver kalıntıları sebep oluyorsa diye formatladım bir bilgisayarı. Hem de Home sürümü kurdum daha hafif olsun diye. Tekrar mavi ekran alırsam paylaşırım.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı