Hi
I have been having system crashes lately and the log details are mentioned below.
Kindly help me find out the reason for the crash please.
Thanks in advance.
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Dump completed successfully, progress percentage: 100
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff803
Debug session time: Thu Feb 3 14:17:55.082 2022 (UTC + 8:00)
System Uptime: 0 days 5:18:18.717
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000b9
SYMBOL_NAME: nt!MiDeleteFinalPageTables+250a80
MODULE_NAME: nt
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 250a80
FAILURE_BUCKET_ID: 0x1a_3453_nt!MiDeleteFinalPageTables
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5341b5a0-5b02-2da1-51b3-df124a48f6f9}
Followup: MachineOwner
---------
I have been having system crashes lately and the log details are mentioned below.
Kindly help me find out the reason for the crash please.
Thanks in advance.
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Dump completed successfully, progress percentage: 100
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff803
45800000 PsLoadedModuleList = 0xfffff803
46429bc0Debug session time: Thu Feb 3 14:17:55.082 2022 (UTC + 8:00)
System Uptime: 0 days 5:18:18.717
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000b9
f0d8d018). Type ".hh dbgerr001" for details
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803
45c16220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa0bec637750=000000000000001a
8: kd> !analyze -v
*******************************************************************************
[LIST]
[*]*
[*]Bugcheck Analysis *
[*]*
[/LIST]
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003453, The subtype of the BugCheck.
Arg2: ffffc581739d90c0
Arg3: 00000000001da363
Arg4: 0000000000000003
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2187
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 29986
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 366996
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3453
BUGCHECK_P2: ffffc581739d90c0
BUGCHECK_P3: 1da363
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffffa0b
ec637748 fffff80345c5a10c : 00000000
0000001a 0000000000003453 ffffc581
739d90c0 00000000001da363 : nt!KeBugCheckEx
fffffa0b
ec637750 fffff80345e60f04 : ffffc581
73bd3080 ffffc581739d9800 ffffc581
739d9740 ffffc581739d9508 : nt!MiDeleteFinalPageTables+0x250a80
fffffa0b
ec637810 fffff80345ed37b6 : ffffc581
73bd3080 00000000ffffffff ffffc581
739d9508 ffffc581739d90c0 : nt!MmDeleteProcessAddressSpace+0x64
fffffa0b
ec637860 fffff80345f6fc60 : ffffc581
739d90c0 ffffc581739d9090 fffffa0b
ec637a49 0000000000000000 : nt!PspProcessDelete+0x156
fffffa0b
ec6378f0 fffff80345b03737 : 00000000
00000000 0000000000000000 fffffa0b
ec637a49 ffffc581739d90c0 : nt!ObpRemoveObjectRoutine+0x80
fffffa0b
ec637950 fffff80345f6d7ad : 00000000
00000001 ffffc581739d9090 ffffc581
739d9090 ffffc58167cc77a0 : nt!ObfDereferenceObjectWithTag+0xc7
fffffa0b
ec637990 fffff80345f6bf79 : ffffc581
73bd3080 0000640800098460 00000000
0000266c 0000000000000000 : nt!ObpCloseHandle+0x2dd
fffffa0b
ec637ab0 fffff80345c28778 : ffffc581
73bd3080 0000000000000000 00000000
00000000 ffffc58100000000 : nt!NtClose+0x39
fffffa0b
ec637ae0 00007ffbee663934 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x28
0000000d
d7bfe498 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x00007ffb
ee663934SYMBOL_NAME: nt!MiDeleteFinalPageTables+250a80
MODULE_NAME: nt
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 250a80
FAILURE_BUCKET_ID: 0x1a_3453_nt!MiDeleteFinalPageTables
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5341b5a0-5b02-2da1-51b3-df124a48f6f9}
Followup: MachineOwner
---------