: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000142cda, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0a000140001420fa, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1390
Key : Analysis.Elapsed.mSec
Value: 1590
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 6
Key : Analysis.Init.CPU.mSec
Value: 78
Key : Analysis.Init.Elapsed.mSec
Value: 10435
Key : Analysis.Memory.CommitPeak.Mb
Value: 146
Key : Bugcheck.Code.LegacyAPI
Value: 0x4e
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: 0x4E_99_nt!MiBadShareCount
Key : Failure.Hash
Value: {60e553e9-e4c5-ed08-9be6-c353e0011003}
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 142cda
BUGCHECK_P3: 2
BUGCHECK_P4: a000140001420fa
FILE_IN_CAB: 071623-7109-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff9709`48ddac28 fffff807`4a5f3547 : 00000000`0000004e 00000000`00000099 00000000`00142cda 00000000`00000002 : nt!KeBugCheckEx
ffff9709`48ddac30 fffff807`4a4c6c28 : 8a000001`00000002 00000000`00000004 04e84a93`00000000 00000000`00000000 : nt!MiBadShareCount+0x5b
ffff9709`48ddac70 fffff807`4a4bf72e : 00000000`00000000 ffff9709`48ddb380 fffffcbf`fe7d0000 ffff9709`48ddb2d0 : nt!MiDeletePteRun+0x1798
ffff9709`48ddae80 fffff807`4a46dd2d : 00000000`00000000 ffff9d09`536c0780 ffff9709`48ddb2d0 fffffcbf`fe7cfff8 : nt!MiDeleteVaTail+0x6e
ffff9709`48ddaeb0 fffff807`4a46d94b : fffffcfe`00000000 ffff9d09`536c0780 ffff9709`00000000 ffff9709`48ddb320 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9709`48ddaf50 fffff807`4a46d94b : fffffcfe`7f2fff98 ffff9d09`536c0780 ffff9709`00000001 ffff9709`48ddb330 : nt!MiWalkPageTablesRecursively+0x88b
ffff9709`48ddaff0 fffff807`4a46d94b : fffffcfe`7f2ff000 ffff9d09`536c0780 ffff9709`00000002 ffff9709`48ddb340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9709`48ddb090 fffff807`4a46a94b : ffff9709`48ddb1a8 ffff9d09`536c0780 ffff9709`00000003 ffff9709`48ddb350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9709`48ddb130 fffff807`4a4bad41 : ffff9709`48ddb2d0 ffff9d09`00000000 ffffffff`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9709`48ddb230 fffff807`4a47e830 : 00000000`00000001 ffff9709`00000000 ffff9d09`536c05d0 ffff9d09`53728080 : nt!MiDeletePagablePteRange+0x4f1
ffff9709`48ddb540 fffff807`4a886329 : ffff9d09`5333d860 00000000`00000000 ffff9d09`00000000 ffff9d09`00000000 : nt!MiDeleteVad+0x360
ffff9709`48ddb650 fffff807`4a885ccc : ffff9d09`5333d860 ffff9d09`51ca5d20 ffff9d09`53728080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9709`48ddb680 fffff807`4a824b1f : ffff9d09`5333c820 ffff9d09`5333c820 ffff9d09`5333d860 ffff9d09`536c0100 : nt!MiCleanVad+0x30
ffff9709`48ddb6b0 fffff807`4a831c50 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9d09`536c0100 : nt!MmCleanProcessAddressSpace+0x137
ffff9709`48ddb730 fffff807`4a884682 : ffff9d09`536c0100 ffffc105`0ea0e7b0 ffff9709`48ddb959 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9709`48ddb7c0 fffff807`4a8c8588 : ffff9d09`00000000 fffff807`4a41bf01 00010003`00000008 00000082`3c36e000 : nt!PspExitThread+0x5f6
ffff9709`48ddb8c0 fffff807`4a4de0cd : ffff9d09`53728080 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
ffff9709`48ddb900 fffff807`4a601510 : 00000000`00000000 ffff9709`48ddb9c0 ffff9709`48ddbb00 00000082`3f3ff8c8 : nt!KiDeliverApc+0x60d
ffff9709`48ddb9c0 fffff807`4a60f99f : ffff9d09`53728080 ffff9d09`536a1560 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffff9709`48ddbb00 00007ffd`5352d064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000082`3f3ff798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5352d064
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.3208
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8068100d997, Address of the instruction which caused the BugCheck
Arg3: ffffe808ea87c580, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1265
Key : Analysis.Elapsed.mSec
Value: 1443
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 4956
Key : Analysis.Memory.CommitPeak.Mb
Value: 146
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_nt!ObpCaptureObjectCreateInformation
Key : Failure.Hash
Value: {d923332f-b1e9-aecc-24bc-872e4bfcabd5}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8068100d997
BUGCHECK_P3: ffffe808ea87c580
BUGCHECK_P4: 0
FILE_IN_CAB: 071523-9703-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
CONTEXT: ffffe808ea87c580 -- (.cxr 0xffffe808ea87c580)
rax=0000000000000007 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000001 rdi=0000000000000000
rip=fffff8068100d997 rsp=ffffe808ea87cf80 rbp=ffffab06ecab0380
r8=0000000000000000 r9=ffffe808ea87d078 r10=ffffab06ecab0380
r11=ffffe808ea87d0c8 r12=0000000000000001 r13=0000000000000000
r14=ffffab06ecaf52a0 r15=ffffe808ea87d078
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ObpCaptureObjectCreateInformation+0x37:
fffff806`8100d997 0f110b movups xmmword ptr [rbx],xmm1 ds:002b:00000000`00000000=????????????????????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: services.exe
STACK_TEXT:
ffffe808`ea87cf80 fffff806`8100eaed : 00000000`00000000 ffffab07`03054cd0 00000000`00000000 fffff806`8101cbd7 : nt!ObpCaptureObjectCreateInformation+0x37
ffffe808`ea87d020 fffff806`8101a8c1 : ffffc187`fdf9be70 ffffc187`fdf9be70 ffffe808`ea87d940 00000000`00000000 : nt!CmpCreateKeyBody+0xcd
ffffe808`ea87d0d0 fffff806`8101a053 : ffffc187`0000001c ffffe808`ea87d420 ffffe808`ea87d3d8 ffffab07`0210a760 : nt!CmpDoParseKey+0x5d1
ffffe808`ea87d370 fffff806`8101571e : fffff806`81019d01 00000000`00000000 ffffab07`0210a760 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffe808`ea87d510 fffff806`8100d3ea : ffffab07`0210a700 ffffe808`ea87d778 ffffab06`00000040 ffffab06`ecaf52a0 : nt!ObpLookupObjectName+0x3fe
ffffe808`ea87d6e0 fffff806`8100d1cc : ffffc187`00000000 00000000`00000000 00000000`00000000 ffffab06`ecaf52a0 : nt!ObOpenObjectByNameEx+0x1fa
ffffe808`ea87d810 fffff806`8100cb11 : 000000a3`7177e100 ffffe808`ea87db80 00000000`00000001 00007ff6`d3787918 : nt!ObOpenObjectByName+0x5c
ffffe808`ea87d860 fffff806`810ba362 : 000000a3`7177ee60 000000a3`7177edf8 000000a3`7177edc0 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffe808`ea87dac0 fffff806`80e0f8f8 : ffffab06`fea46000 ffffab06`feecab80 ffffe808`ea87db80 00000000`00000000 : nt!NtOpenKey+0x12
ffffe808`ea87db00 00007ff8`0400d224 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a3`7177e0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`0400d224
SYMBOL_NAME: nt!ObpCaptureObjectCreateInformation+37
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3208
STACK_COMMAND: .cxr 0xffffe808ea87c580 ; kb
BUCKET_ID_FUNC_OFFSET: 37
FAILURE_BUCKET_ID: AV_nt!ObpCaptureObjectCreateInformation
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d923332f-b1e9-aecc-24bc-872e4bfcabd5}
Followup: MachineOwner
---------