Question System crashed with unknown reason

Feb 3, 2022
1
0
10
Hi

I have been having system crashes lately and the log details are mentioned below.

Kindly help me find out the reason for the crash please.

Thanks in advance.

Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Dump completed successfully, progress percentage: 100

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff80345800000 PsLoadedModuleList = 0xfffff80346429bc0
Debug session time: Thu Feb 3 14:17:55.082 2022 (UTC + 8:00)
System Uptime: 0 days 5:18:18.717
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000b9f0d8d018). Type ".hh dbgerr001" for details Loading unloaded module list ................ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff80345c16220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa0bec637750=000000000000001a 8: kd> !analyze -v ******************************************************************************* [LIST] [*]* [*]Bugcheck Analysis * [*]* [/LIST] ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000003453, The subtype of the BugCheck. Arg2: ffffc581739d90c0 Arg3: 00000000001da363 Arg4: 0000000000000003 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2187 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 29986 Key : Analysis.Init.CPU.mSec Value: 671 Key : Analysis.Init.Elapsed.mSec Value: 366996 Key : Analysis.Memory.CommitPeak.Mb Value: 78 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: MEMORY.DMP DUMP_FILE_ATTRIBUTES: 0x1000 BUGCHECK_CODE: 1a BUGCHECK_P1: 3453 BUGCHECK_P2: ffffc581739d90c0 BUGCHECK_P3: 1da363 BUGCHECK_P4: 3 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: chrome.exe STACK_TEXT: fffffa0bec637748 fffff80345c5a10c : 000000000000001a 0000000000003453 ffffc581739d90c0 00000000001da363 : nt!KeBugCheckEx fffffa0bec637750 fffff80345e60f04 : ffffc58173bd3080 ffffc581739d9800 ffffc581739d9740 ffffc581739d9508 : nt!MiDeleteFinalPageTables+0x250a80 fffffa0bec637810 fffff80345ed37b6 : ffffc58173bd3080 00000000ffffffff ffffc581739d9508 ffffc581739d90c0 : nt!MmDeleteProcessAddressSpace+0x64 fffffa0bec637860 fffff80345f6fc60 : ffffc581739d90c0 ffffc581739d9090 fffffa0bec637a49 0000000000000000 : nt!PspProcessDelete+0x156 fffffa0bec6378f0 fffff80345b03737 : 0000000000000000 0000000000000000 fffffa0bec637a49 ffffc581739d90c0 : nt!ObpRemoveObjectRoutine+0x80 fffffa0bec637950 fffff80345f6d7ad : 0000000000000001 ffffc581739d9090 ffffc581739d9090 ffffc58167cc77a0 : nt!ObfDereferenceObjectWithTag+0xc7 fffffa0bec637990 fffff80345f6bf79 : ffffc58173bd3080 0000640800098460 000000000000266c 0000000000000000 : nt!ObpCloseHandle+0x2dd fffffa0bec637ab0 fffff80345c28778 : ffffc58173bd3080 0000000000000000 0000000000000000 ffffc58100000000 : nt!NtClose+0x39 fffffa0bec637ae0 00007ffbee663934 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x28 0000000dd7bfe498 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x00007ffbee663934


SYMBOL_NAME: nt!MiDeleteFinalPageTables+250a80

MODULE_NAME: nt

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 250a80

FAILURE_BUCKET_ID: 0x1a_3453_nt!MiDeleteFinalPageTables

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5341b5a0-5b02-2da1-51b3-df124a48f6f9}

Followup: MachineOwner
---------