Microsoft (r) Windows debugger version 10.0.20153.1000 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Windows\Minidump\102020-19265-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
PROduct: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. VB_RELEASE. 191206-1406.
Machine name:
Kernel base = 0xfffff807`23600000 psloadedmodulelist = 0xfffff807`2422a310.
Debug session time: Tue oct 20 14:51:26.782 2020 (utc + 3:00)
System uptime: 0 days 18:49:10.027.
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v.
Nt! Kebugcheckex:
Fffff807'239F45A0 48894C2408 mov qword PTR [rsp+8],rcx SS:0018:ffffbe0D'C37FBA30=0000000000000018.
Loading dump file [C:\Windows\MEMORY.DMP]
Kernel bitmap dump file: Kernel address space is available, user address space may not be available.
Can't set dump file contexts.
Machineınfo: Setcontext failed - thread: 000001F3DC56C610 handle: 6 ID: 6 - error == 0x8000FFFF.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
PROduct: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. VB_RELEASE. 191206-1406.
Machine name:
Kernel base = 0xfffff807`23600000 psloadedmodulelist = 0xfffff807`2422a310.
Debug session time: Tue oct 20 14:51:26.782 2020 (utc + 3:00)
System uptime: 0 days 18:49:10.027.
Loading kernel symbols.
Loading user symbols.
Peb is paged out (peb. LDR = 00000000'00E95018). Type ".Hh dbgerr001" for details.
Loading unloaded module list.
Nt! Kebugcheckex:
Fffff807'239F45A0 48894C2408 mov qword PTR [rsp+8],rcx SS:0018:ffffbe0D'C37FBA30=0000000000000018.
||1:5: kd>! Analyze -v.
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: FFFFAC049CAC20C0, object type of the object whose reference count is being lowered.
Arg2: FFFFAC04AD48E9E0, object whose reference count is being lowered.
Arg3: 0000000000000001, reserved.
Arg4: 9000000000000001, reserved.
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine.
To increment the reference count of the object. When the driver is done with the.
Pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This bugcheck.
Can occur because an object's reference count goes to Zero while there are still.
Open handles to the object, in which case the fourth parameter indicates the number.
Of opened handles. It may also occur when the object's reference count drops below Zero.
Whether or not there are open handles to the object, and in that case the fourth parameter.
Contains the actual Value of the pointer references count.
Debugging details:
------------------
KEY_VALUES_STRING: 1.
Key: Analysis. CPU. Msec.
Value: 3515.
Key: Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007E on desktop-jfhuv9Q.
Key: Analysis. Debugdata.
Value: Createobject.
Key: Analysis. Debugmodel.
Value: Createobject.
Key: Analysis. Elapsed. Msec.
Value: 9872.
Key: Analysis. Memory. Commitpeak. MB.
Value: 108.
Key: Analysis. System.
Value: Createobject.
Key: Wer. OS. Branch.
Value: VB_RELEASE.
Key: Wer. OS. Timestamp.
Value: 2019-12-06T14:06:00Z.
Key: Wer. OS. Version.
Value: 10.0. 19041. 1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 18.
BUGCHECK_P1: FFFFAC049CAC20C0.
BUGCHECK_P2: FFFFAC04AD48E9E0.
BUGCHECK_P3: 1.
BUGCHECK_P4: 9000000000000001.
Blackboxbsd: 1 (!Blackboxbsd)
Blackboxntfs: 1 (!Blackboxntfs)
Blackboxpnp: 1 (!Blackboxpnp)
Blackboxwınlogon: 1.
PROCESS_NAME: steam.exe.
STACK_TEXT:
Ffffbe0D'C37FBA28 fffff807'23A6C834: 00000000'00000018 ffffac04'9cac20C0 ffffac04'AD48E9E0 00000000'00000001: Nt! Kebugcheckex.
Ffffbe0D'C37FBA30 fffff807'2389CCC'e: 00000000'00000000 ffffac04'AD48E9E0 00000000'039cfda0 00000000'00F8D000: Nt! Obfdereferenceobjectwithtag+0x190E54.
Ffffbe0D'C37FBA70 fffff807'23C56AF7: Ffffac04'00000000 00000000'00000000 ffffbe0D'C37FBB80 ffffac04'AD48E9E0: Nt! Halputdmaadapter+0xe.
Ffffbe0D'C37fbaa0 fffff807'23A05FB8: Ffffac04'A676F080 00000000'0F44F534 00000000'00000000 00000000'00000001: Nt! Ntreleasesemaphore+0xc7.
Ffffbe0D'C37FBB00 00000000'77B01CFC: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! Kisystemservicecopyend+0x28.
00000000'039CF228 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x77b01cfc.
SYMBOL_NAME: Nt! Obfdereferenceobjectwithtag+190E54.
MODULE_NAME: NT.
IMAGE_NAME: ntkrnlmp.exe.
STACK_COMMAND:. Thread;. Cxr; KB.
BUCKET_ID_FUNC_OFFSET: 190E54.
FAILURE_BUCKET_ID: 0x18_CORRUPT_REF_COUNT_nt!ObfDereferenceObjectWithTag.
OS_VERSION: 10.0. 19041. 1.
BUILDLAB_STR: VB_RELEASE.
OSPLATFORM_TYPE: X64.
Osname: Windows 10.
FAILURE_ID_HASH: {FA6B3516-71CB-1E92-B987-B8BEBD3458AC}
Followup: Machineowner.
---------
Galiba 0x18 hata kodu eğer doğru okuduysam.