SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8061128d330, The address that the exception occurred at
Arg3: ffff8a08ae9369a8, Exception Record Address
Arg4: ffff8a08ae9361e0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3257
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8061128d330
BUGCHECK_P3: ffff8a08ae9369a8
BUGCHECK_P4: ffff8a08ae9361e0
EXCEPTION_RECORD: ffff8a08ae9369a8 -- (.exr 0xffff8a08ae9369a8)
ExceptionAddress: fffff8061128d330 (atikmdag+0x000000000014d330)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000001938
Attempt to read from address 0000000000001938
CONTEXT: ffff8a08ae9361e0 -- (.cxr 0xffff8a08ae9361e0)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000009 rsi=ffffa185a7c670a0 rdi=0000000000000000
rip=fffff8061128d330 rsp=ffff8a08ae936be0 rbp=0000000000000009
r8=0000000000000000 r9=0000000000000000 r10=ffffa185a521b000
r11=ffff8a08ae936b20 r12=0000000000000000 r13=ffffa185a521aa40
r14=ffffa185a7c670a0 r15=ffffa185a78e8020
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050282
atikmdag+0x14d330:
fffff806`1128d330 448b9138190000 mov r10d,dword ptr [rcx+1938h] ds:002b:00000000`00001938=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff806098fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8060980f330: Unable to get Flags value from nt!KdVersionBlock
fffff8060980f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000001938
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000001938
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff8a08`ae936be0 ffffa185`a7f58000 : 00000000`00000000 00000000`00000000 00000000`00888000 ffffa185`a7c670a0 : atikmdag+0x14d330
ffff8a08`ae936be8 00000000`00000000 : 00000000`00000000 00000000`00888000 ffffa185`a7c670a0 fffff806`113aa55c : 0xffffa185`a7f58000
SYMBOL_NAME: atikmdag+14d330
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
STACK_COMMAND: .cxr 0xffff8a08ae9361e0 ; kb
BUCKET_ID_FUNC_OFFSET: 14d330
FAILURE_BUCKET_ID: AV_atikmdag!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0252e3ed-fc29-a2ca-0f7a-b32a5492113a}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffff890a490073d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff890a49007328, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2702
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3859
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffff890a490073d0
BUGCHECK_P3: ffff890a49007328
BUGCHECK_P4: 0
TRAP_FRAME: ffff890a490073d0 -- (.trap 0xffff890a490073d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb306240877d0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffb306301b6770 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803558a3dda rsp=ffff890a49007560 rbp=ffffb3062dbefed0
r8=0000000000000001 r9=ffffb306301b6770 r10=ffffb306201c03d0
r11=ffffb3062ab3e708 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!RtlpTreeDoubleRotateNodes+0x16a:
fffff803`558a3dda cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff890a49007328 -- (.exr 0xffff890a49007328)
ExceptionAddress: fffff803558a3dda (nt!RtlpTreeDoubleRotateNodes+0x000000000000016a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff890a`490070a8 fffff803`55a07769 : 00000000`00000139 00000000`0000001d ffff890a`490073d0 ffff890a`49007328 : nt!KeBugCheckEx
ffff890a`490070b0 fffff803`55a07b90 : 00000000`00000000 ffff8b8c`f04df1e0 00000005`f05e2000 00000001`00100000 : nt!KiBugCheckDispatch+0x69
ffff890a`490071f0 fffff803`55a05f23 : 00000001`00000001 00000000`00000000 00000000`00000000 ffff890a`49007468 : nt!KiFastFailDispatch+0xd0
ffff890a`490073d0 fffff803`558a3dda : 00000000`00000003 fffff803`558a2d8e ffffb306`2ab3e700 00000000`00000003 : nt!KiRaiseSecurityCheckFailure+0x323
ffff890a`49007560 fffff803`558a2d8e : ffffb306`2ab3e700 00000000`00000003 00000000`00000002 ffff8b8c`f0de7478 : nt!RtlpTreeDoubleRotateNodes+0x16a
ffff890a`49007570 fffff803`509b16a0 : ffffb306`221958a0 ffffb306`240877d0 00000000`00000060 fffff803`55860913 : nt!RtlAvlInsertNodeEx+0x16e
ffff890a`490075b0 fffff803`509b155f : 00000000`00140000 ffffb306`221958a0 ffffb306`22197848 ffffb306`2dbefed0 : dxgmms2!CVirtualAddressAllocator::InsertVadToFreeList+0x74
ffff890a`49007610 fffff803`509b2edf : 00000000`00000000 ffffb306`221958a0 ffffb306`25eba988 ffffb306`25eba980 : dxgmms2!CVirtualAddressAllocator::FreeVadVirtualAddressRangeInternal+0x10b
ffff890a`49007690 fffff803`509b3104 : ffffb306`25eba998 ffffb306`262dc900 ffffb306`2dbefed0 ffffb306`1d765e01 : dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0xdf
ffff890a`490076e0 fffff803`509b3271 : 00000000`00000000 00000000`00000079 ffff890a`49007880 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::FreeAllocMappedVaRangeList+0x188
ffff890a`49007780 fffff803`509caa32 : ffffb306`1d765e30 ffff8b8c`00000001 00000000`00000001 ffffb306`1d6aa260 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0x11d
ffff890a`49007900 fffff803`509d43d9 : ffffb306`1d6aa1f0 ffff8b8c`f05f4201 00000000`00000000 00000000`0ee34400 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462
ffff890a`49007ae0 fffff803`55917e25 : ffff8b8c`f05f4280 fffff803`509d43d0 ffffb306`1d6aa1f0 000fa4ef`b59bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff890a`49007b10 fffff803`559fcdd8 : fffff803`504a6180 ffff8b8c`f05f4280 fffff803`55917dd0 00360032`00330038 : nt!PspSystemThreadStartup+0x55
ffff890a`49007b60 00000000`00000000 : ffff890a`49008000 ffff890a`49001000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!CVirtualAddressAllocator::InsertVadToFreeList+74
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1131
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 74
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_dxgmms2!CVirtualAddressAllocator::InsertVadToFreeList
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bb8816d8-0f5b-2b93-2f43-33ec643f6bbe}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff73ffed30000
Arg3: 0000000010000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3387
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff73ffed30000
BUGCHECK_P3: 10000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffe089`4cf87408 fffff807`25a9d0fa : 00000000`0000001a 00000000`00041792 fffff73f`fed30000 00000000`10000000 : nt!KeBugCheckEx
ffffe089`4cf87410 fffff807`25a0b9e6 : 00000000`00000000 ffffd084`67b31700 00000000`00000007 fffff73f`fed30000 : nt!MiDeleteVa+0x153a
ffffe089`4cf87510 fffff807`25a0bafb : fffff77b`9fff6980 ffffd084`67b31700 ffffe089`00000000 ffffe089`4cf87980 : nt!MiWalkPageTablesRecursively+0x776
ffffe089`4cf875b0 fffff807`25a0bafb : fffff77b`bdcfffb0 ffffd084`67b31700 ffffe089`00000001 ffffe089`4cf87990 : nt!MiWalkPageTablesRecursively+0x88b
ffffe089`4cf87650 fffff807`25a0bafb : fffff77b`bdcff000 ffffd084`67b31700 ffffe089`00000002 ffffe089`4cf879a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffe089`4cf876f0 fffff807`25a5de6b : ffff68f3`8ef69d85 ffffd084`67b31700 ffffe089`00000003 ffffe089`4cf879b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffe089`4cf87790 fffff807`25a9b991 : ffffe089`4cf87930 ffffd084`00000000 fffff77b`00000002 ffffffff`00000000 : nt!MiWalkPageTables+0x36b
ffffe089`4cf87890 fffff807`25a6baf0 : 00000000`00000001 ffffe089`00000000 ffffd084`67b31550 ffffd084`60f8b080 : nt!MiDeletePagablePteRange+0x4f1
ffffe089`4cf87ba0 fffff807`25e35c99 : ffffd084`646059c0 00000000`00000000 00000000`00000000 ffffd084`00000000 : nt!MiDeleteVad+0x360
ffffe089`4cf87cb0 fffff807`25e35a72 : ffffd084`6b624720 00007ffd`a5f30000 ffffd084`67b31080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe089`4cf87ce0 fffff807`25e358e9 : ffffd084`60f8b080 fffff807`25c071b5 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffe089`4cf87dc0 fffff807`25ed8ecc : ffffd084`60f8b080 00000148`268e8680 00000000`00000001 ffffd084`67b31080 : nt!NtUnmapViewOfSectionEx+0x99
ffffe089`4cf87e10 fffff807`25c071b5 : 00000000`00000000 00000148`00000000 00000000`00000000 00000000`00000000 : nt!NtUnmapViewOfSection+0xc
ffffe089`4cf87e40 00007ffd`a66cc4f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000035`429fe978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`a66cc4f4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa43fff070d80
Arg3: 0000000010000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3108
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3121
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffa43fff070d80
BUGCHECK_P3: 10000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
STACK_TEXT:
ffffbc81`6f106c48 fffff806`4849d0fa : 00000000`0000001a 00000000`00041792 ffffa43f`ff070d80 00000000`10000000 : nt!KeBugCheckEx
ffffbc81`6f106c50 fffff806`4840b9e6 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffa43f`ff070d80 : nt!MiDeleteVa+0x153a
ffffbc81`6f106d50 fffff806`4840bafb : ffffa452`1fff8380 ffffe401`6b084740 ffffbc81`00000000 ffffbc81`6f1071c0 : nt!MiWalkPageTablesRecursively+0x776
ffffbc81`6f106df0 fffff806`4840bafb : ffffa452`290fffc0 ffffe401`6b084740 ffffbc81`00000001 ffffbc81`6f1071d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffbc81`6f106e90 fffff806`4840bafb : ffffa452`290ff000 ffffe401`6b084740 ffffbc81`00000002 ffffbc81`6f1071e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffbc81`6f106f30 fffff806`4845de6b : 00000000`00000000 ffffe401`6b084740 00000000`00000003 ffffbc81`6f1071f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffbc81`6f106fd0 fffff806`4849b991 : ffffbc81`6f107170 ffffe401`00000000 ffffa43f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffbc81`6f1070d0 fffff806`4846baf0 : 00000000`00000001 ffffbc81`00000000 ffffe401`6b084590 ffffe401`6b0e7080 : nt!MiDeletePagablePteRange+0x4f1
ffffbc81`6f1073e0 fffff806`48835c99 : ffffe401`6ae90b40 00000000`00000000 ffffe401`00000000 ffffe401`00000000 : nt!MiDeleteVad+0x360
ffffbc81`6f1074f0 fffff806`48835330 : ffffe401`6ae90b40 ffffe401`6b084d60 ffffe401`6b0e7080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffbc81`6f107520 fffff806`488335ff : ffffe401`6ae90aa0 ffffe401`6ae90aa0 ffffe401`6ae90b40 ffffe401`6b0840c0 : nt!MiCleanVad+0x30
ffffbc81`6f107550 fffff806`4885d6e4 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe401`6b0840c0 : nt!MmCleanProcessAddressSpace+0x137
ffffbc81`6f1075d0 fffff806`48906596 : ffffe401`6b0840c0 ffff808b`2e7a2770 ffffbc81`6f107820 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffbc81`6f107660 fffff806`488d22e8 : 00000000`c000007b 00000000`00000001 ffffbc81`6f107890 000000b7`7ee94000 : nt!PspExitThread+0x5f6
ffffbc81`6f107760 fffff806`48467fb7 : ffffa452`1fff0101 00000000`00000000 ffffe401`6adcec10 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffbc81`6f1077a0 fffff806`485f9d20 : 000001fc`c1e52d00 ffffbc81`6f107850 000000b7`7eddf978 ffffe401`00000000 : nt!KiDeliverApc+0x487
ffffbc81`6f107850 fffff806`4860725f : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe401`6adcec10 : nt!KiInitiateUserApc+0x70
ffffbc81`6f107990 00007ffe`10a8fa04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000b7`7eddf928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`10a8fa04
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000057917, page frame number
Arg3: 0000000000000002, current page state
Arg4: 040000a0000ac216, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7203
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16089
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 57917
BUGCHECK_P3: 2
BUGCHECK_P4: 40000a0000ac216
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff406`bb1c5f08 fffff801`6929de00 : 00000000`0000004e 00000000`00000099 00000000`00057917 00000000`00000002 : nt!KeBugCheckEx
fffff406`bb1c5f10 fffff801`69093c99 : 1a000001`4a2f5867 80000000`00000000 00000000`00000001 00000000`00000016 : nt!MiDecrementShareCount+0x14ae50
fffff406`bb1c5f50 fffff801`6901d15f : fffff406`bb1c6380 ffff988f`049d1080 00000000`00000000 fffff406`bb1c6c40 : nt!MiDeletePteList+0x2d9
fffff406`bb1c6030 fffff801`6942ed3d : ffff988e`fe069080 ffff988f`007d0718 ffff988e`00000002 ffff988f`00000000 : nt!MiDecommitPages+0x43f
fffff406`bb1c6c00 fffff801`6942e3a3 : fffff406`bb1c6d80 00000000`00000000 fffff406`bb1c6d80 ffff988f`007d06f0 : nt!MiDecommitRegion+0x7d
fffff406`bb1c6c80 fffff801`6942dc95 : ffffc401`bf200100 fffff801`6904caf2 ffffc401`bf200340 ffffc401`d61d7cff : nt!MmFreeVirtualMemory+0x6d3
fffff406`bb1c6dd0 fffff801`692071b5 : ffff988e`fe069080 01800040`00000000 00000000`00000000 00000000`4b677844 : nt!NtFreeVirtualMemory+0x95
fffff406`bb1c6e30 fffff801`691f95e0 : fffff801`650b6448 ffffc401`cd791a60 fffff406`bb1c7089 ffffc401`cd791a60 : nt!KiSystemServiceCopyEnd+0x25
fffff406`bb1c6fc8 fffff801`650b6448 : ffffc401`cd791a60 fffff406`bb1c7089 ffffc401`cd791a60 fffff801`650b8c97 : nt!KiServiceLinkage
fffff406`bb1c6fd0 fffff801`650b4c5a : 00000000`00190000 ffff988f`0420c330 ffff988f`0420c940 ffffc401`cd783720 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
fffff406`bb1c7020 fffff801`650430c4 : 00000000`00000000 00000000`00000001 ffff988e`fec9a890 ffff988e`fec9ac30 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::~VIDMM_RECYCLE_HEAP_MGR+0x34a
fffff406`bb1c70f0 fffff801`650b5220 : ffffc401`dcf98070 fffff801`00000000 ffff988e`ffca9088 01000000`00100000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::`vector deleting destructor'+0x14
fffff406`bb1c7120 fffff801`65043112 : ffffc401`dcf98070 ffffc401`c3cc4b30 ffff988e`fec9a890 00000000`00000070 : dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0xa0
fffff406`bb1c7150 fffff801`6c7a8a44 : 00000000`00000001 ffffc401`c3cc4c00 ffffc401`00000000 00000000`00000023 : dxgmms2!VidMmTerminateProcess+0x12
fffff406`bb1c7180 fffff801`6c7a8547 : ffff988f`05fe47d0 fffff406`bb1c72b0 00000000`00000400 ffffc401`c3cc4b30 : dxgkrnl!VidMmTerminateProcessX+0x64
fffff406`bb1c71b0 fffff801`6c7a38e5 : ffffc401`c3cc4b30 ffff988f`049d1080 ffffc401`c3cc4b30 00000000`00040282 : dxgkrnl!DXGPROCESS::Destroy+0x1bf
fffff406`bb1c7420 fffff801`6c696b67 : 00000000`00000000 ffffc401`c3cc4b30 ffff988e`fb6edd30 fffff406`bb1c7580 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffff406`bb1c7570 fffff801`6943759f : 00000000`00000000 ffff988f`049d1080 ffff988e`fb6ed790 fffff801`01046000 : dxgkrnl!DxgkProcessNotify+0xf7
fffff406`bb1c75d0 fffff801`69462894 : ffff988f`049d1000 ffff988f`049d1080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffff406`bb1c76a0 fffff801`69506552 : ffff988e`fe0694b8 00000000`00000000 fffff406`bb1c7890 00000000`00000000 : nt!PspExitProcess+0x70
fffff406`bb1c76d0 fffff801`694d22e8 : ffff988e`00000022 00000000`00000001 fffff406`bb1c78e0 00000017`7cda0000 : nt!PspExitThread+0x5b2
fffff406`bb1c77d0 fffff801`69067fb7 : 00000000`408d0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff406`bb1c7810 fffff801`691f9d20 : 00000017`017ffb08 fffff406`bb1c78c0 fffff406`bb1c7a80 000001a1`00000000 : nt!KiDeliverApc+0x487
fffff406`bb1c78c0 fffff801`6920725f : ffff988e`fe069080 00000000`00000000 fffff406`bb1c7a18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
fffff406`bb1c7a00 00007ff9`a10ec034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000017`017ffad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a10ec034
SYMBOL_NAME: nt!MiDecrementShareCount+14ae50
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 14ae50
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {add373c4-2fe4-723e-d1db-12fcb6adef02}
Followup: MachineOwner
---------