SHARE
TWEET

Untitled

a guest Oct 15th, 2019 84 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\User\Desktop\minidump\101519-18765-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9.  
  10. ************* Path validation summary **************
  11. Response                         Time (ms)     Location
  12. Deferred                                       srv*
  13. Symbol search path is: srv*
  14. Executable search path is:
  15. Windows 10 Kernel Version 18362 MP (4 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Built by: 18362.1.amd64fre.19h1_release.190318-1202
  18. Machine Name:
  19. Kernel base = 0xfffff804`2c000000 PsLoadedModuleList = 0xfffff804`2c448210
  20. Debug session time: Tue Oct 15 17:17:00.869 2019 (UTC + 2:00)
  21. System Uptime: 0 days 6:57:08.541
  22. Loading Kernel Symbols
  23. ...............................................................
  24. ................................................................
  25. .............................................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. .........
  29. For analysis of this file, run !analyze -v
  30. nt!KeBugCheckEx:
  31. fffff804`2c1c1220 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffa86`036a08d0=0000000000000018
  32. 1: kd> !analyze
  33. *******************************************************************************
  34. *                                                                             *
  35. *                        Bugcheck Analysis                                    *
  36. *                                                                             *
  37. *******************************************************************************
  38.  
  39. REFERENCE_BY_POINTER (18)
  40. Arguments:
  41. Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
  42. Arg2: ffffd1030b0c2080, Object whose reference count is being lowered
  43. Arg3: 0000000000000006, Reserved
  44. Arg4: ffffffffffffffff, Reserved
  45.     The reference count of an object is illegal for the current state of the object.
  46.     Each time a driver uses a pointer to an object the driver calls a kernel routine
  47.     to increment the reference count of the object. When the driver is done with the
  48.     pointer the driver calls another kernel routine to decrement the reference count.
  49.     Drivers must match calls to the increment and decrement routines. This bugcheck
  50.     can occur because an object's reference count goes to zero while there are still
  51.     open handles to the object, in which case the fourth parameter indicates the number
  52.     of opened handles. It may also occur when the object's reference count drops below zero
  53.     whether or not there are open handles to the object, and in that case the fourth parameter
  54.     contains the actual value of the pointer references count.
  55.  
  56. Debugging Details:
  57. ------------------
  58.  
  59. *** WARNING: Unable to verify checksum for win32k.sys
  60.  
  61. BUGCHECK_CODE:  18
  62.  
  63. BUGCHECK_P1: 0
  64.  
  65. BUGCHECK_P2: ffffd1030b0c2080
  66.  
  67. BUGCHECK_P3: 6
  68.  
  69. BUGCHECK_P4: ffffffffffffffff
  70.  
  71. PROCESS_NAME:  System
  72.  
  73. SYMBOL_NAME:  nt!IopDecrementDeviceObjectRef+1c2834
  74.  
  75. MODULE_NAME: nt
  76.  
  77. IMAGE_NAME:  ntkrnlmp.exe
  78.  
  79. FAILURE_BUCKET_ID:  0x18_nt!IopDecrementDeviceObjectRef
  80.  
  81. FAILURE_ID_HASH:  {5152315d-027b-14f6-89cb-14807d0ae67b}
  82.  
  83. Followup:     MachineOwner
  84. ---------
  85.  
  86. 1: kd> !analyze -v
  87. *******************************************************************************
  88. *                                                                             *
  89. *                        Bugcheck Analysis                                    *
  90. *                                                                             *
  91. *******************************************************************************
  92.  
  93. REFERENCE_BY_POINTER (18)
  94. Arguments:
  95. Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
  96. Arg2: ffffd1030b0c2080, Object whose reference count is being lowered
  97. Arg3: 0000000000000006, Reserved
  98. Arg4: ffffffffffffffff, Reserved
  99.     The reference count of an object is illegal for the current state of the object.
  100.     Each time a driver uses a pointer to an object the driver calls a kernel routine
  101.     to increment the reference count of the object. When the driver is done with the
  102.     pointer the driver calls another kernel routine to decrement the reference count.
  103.     Drivers must match calls to the increment and decrement routines. This bugcheck
  104.     can occur because an object's reference count goes to zero while there are still
  105.     open handles to the object, in which case the fourth parameter indicates the number
  106.     of opened handles. It may also occur when the object's reference count drops below zero
  107.     whether or not there are open handles to the object, and in that case the fourth parameter
  108.     contains the actual value of the pointer references count.
  109.  
  110. Debugging Details:
  111. ------------------
  112.  
  113.  
  114. KEY_VALUES_STRING: 1
  115.  
  116.     Key  : Analysis.CPU.Sec
  117.     Value: 3
  118.  
  119.     Key  : Analysis.DebugAnalysisProvider.CPP
  120.     Value: Create: 8007007e on DESKTOP-QL4QG86
  121.  
  122.     Key  : Analysis.DebugData
  123.     Value: CreateObject
  124.  
  125.     Key  : Analysis.DebugModel
  126.     Value: CreateObject
  127.  
  128.     Key  : Analysis.Elapsed.Sec
  129.     Value: 5
  130.  
  131.     Key  : Analysis.Memory.CommitPeak.Mb
  132.     Value: 70
  133.  
  134.     Key  : Analysis.System
  135.     Value: CreateObject
  136.  
  137.  
  138. BUGCHECK_CODE:  18
  139.  
  140. BUGCHECK_P1: 0
  141.  
  142. BUGCHECK_P2: ffffd1030b0c2080
  143.  
  144. BUGCHECK_P3: 6
  145.  
  146. BUGCHECK_P4: ffffffffffffffff
  147.  
  148. BLACKBOXBSD: 1 (!blackboxbsd)
  149.  
  150.  
  151. BLACKBOXNTFS: 1 (!blackboxntfs)
  152.  
  153.  
  154. BLACKBOXPNP: 1 (!blackboxpnp)
  155.  
  156.  
  157. BLACKBOXWINLOGON: 1
  158.  
  159. CUSTOMER_CRASH_COUNT:  1
  160.  
  161. PROCESS_NAME:  System
  162.  
  163. STACK_TEXT:  
  164. fffffa86`036a08c8 fffff804`2c1f44a4 : 00000000`00000018 00000000`00000000 ffffd103`0b0c2080 00000000`00000006 : nt!KeBugCheckEx
  165. fffffa86`036a08d0 fffff804`2c5e7362 : ffffd103`0e12dc50 ffffd103`0aa1ddb0 00000000`00000000 ffffd103`0b325030 : nt!IopDecrementDeviceObjectRef+0x1c2834
  166. fffffa86`036a0920 fffff804`2c5f94c0 : ffffd103`035d0a80 00000000`00000000 ffffd103`035d5e80 ffffd103`0af18788 : nt!IopDeleteFile+0x1b2
  167. fffffa86`036a09a0 fffff804`2c039084 : 00000000`00000000 00000000`00000000 ffffd103`035d0a80 ffffd103`0e12dc50 : nt!ObpRemoveObjectRoutine+0x80
  168. fffffa86`036a0a00 fffff804`2c08aa58 : fffffa86`036a0a00 fffffa86`036a0ae8 ffffd103`0af18670 fffffa86`036a0ae8 : nt!ObfDereferenceObject+0xa4
  169. fffffa86`036a0a40 fffff804`2c08b8f0 : 00000000`00002278 fffffa86`036a0b09 ffffd103`0cf72040 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x18c
  170. fffffa86`036a0a90 fffff804`2c0bd465 : ffffd103`03474b00 fffff804`00000000 00000000`00002278 fffffa86`030aea90 : nt!CcWriteBehindInternal+0x3a0
  171. fffffa86`036a0b70 fffff804`2c12a725 : ffffd103`0a957040 00000000`00000080 ffffd103`03496300 00000000`00000000 : nt!ExpWorkerThread+0x105
  172. fffffa86`036a0c10 fffff804`2c1c886a : ffff9401`8d344180 ffffd103`0a957040 fffff804`2c12a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
  173. fffffa86`036a0c60 00000000`00000000 : fffffa86`036a1000 fffffa86`0369b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
  174.  
  175.  
  176. SYMBOL_NAME:  nt!IopDecrementDeviceObjectRef+1c2834
  177.  
  178. MODULE_NAME: nt
  179.  
  180. IMAGE_NAME:  ntkrnlmp.exe
  181.  
  182. IMAGE_VERSION:  10.0.18362.418
  183.  
  184. STACK_COMMAND:  .thread ; .cxr ; kb
  185.  
  186. BUCKET_ID_FUNC_OFFSET:  1c2834
  187.  
  188. FAILURE_BUCKET_ID:  0x18_nt!IopDecrementDeviceObjectRef
  189.  
  190. OS_VERSION:  10.0.18362.1
  191.  
  192. BUILDLAB_STR:  19h1_release
  193.  
  194. OSPLATFORM_TYPE:  x64
  195.  
  196. OSNAME:  Windows 10
  197.  
  198. FAILURE_ID_HASH:  {5152315d-027b-14f6-89cb-14807d0ae67b}
  199.  
  200. Followup:     MachineOwner
  201. ---------
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top