8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80329facdd4, Address of the instruction which caused the BugCheck
Arg3: fffff18e5aa26f10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4905
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21663
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 359
Key : Analysis.Init.Elapsed.mSec
Value: 3816
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051723-4515-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80329facdd4
BUGCHECK_P3: fffff18e5aa26f10
BUGCHECK_P4: 0
CONTEXT: fffff18e5aa26f10 -- (.cxr 0xfffff18e5aa26f10)
rax=0000000200000000 rbx=ffffa381aa37e460 rcx=0000000000000000
rdx=ffffa381aa6a45a0 rsi=ffffffffffffffff rdi=ffffa381aa6a45a0
rip=fffff80329facdd4 rsp=fffff18e5aa27910 rbp=fffff18e5aa27b40
r8=ffffb48a00a32010 r9=ffffb48a00a2f000 r10=ffffb48a00a2f000
r11=fffff18e5aa278f0 r12=0000000000000000 r13=fffff18e5aa279c8
r14=00000033153fc690 r15=ffffa381a9cd9de0
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
dxgkrnl!DxgkLock2+0xabca4:
fffff803`29facdd4 448b5804 mov r11d,dword ptr [rax+4] ds:002b:00000002`00000004=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff18e`5aa27910 fffff803`1c20f4f8 : ffffb48a`033040c0 ffffb48a`033040c0 00000167`b2aee750 fffff18e`5aa27b40 : dxgkrnl!DxgkLock2+0xabca4
fffff18e`5aa27ac0 00007ffb`28275024 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000033`153fc5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`28275024
SYMBOL_NAME: dxgkrnl!DxgkLock2+abca4
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.2913
STACK_COMMAND: .cxr 0xfffff18e5aa26f10 ; kb
BUCKET_ID_FUNC_OFFSET: abca4
FAILURE_BUCKET_ID: AV_dxgkrnl!DxgkLock2
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {deeb7bac-be95-c735-2b46-8529a215b0c6}
Followup: MachineOwner
---------
8: kd> lm
start end module name
ffffa2d5`55640000 ffffa2d5`556db000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\79DD5C76CFB01D2AA46291496497A0FB1\win32k.pdb
ffffa2d5`55800000 ffffa2d5`55bb5000 win32kfull (deferred)
ffffa2d5`55bc0000 ffffa2d5`55c09000 cdd (deferred)
ffffa2d5`56180000 ffffa2d5`56450000 win32kbase (deferred)
fffff803`184f0000 fffff803`18518000 mcupdate_AuthenticAMD (deferred)
fffff803`18520000 fffff803`18526000 hal (deferred)
fffff803`18530000 fffff803`1853b000 kd (deferred)
fffff803`18540000 fffff803`18567000 tm (deferred)
fffff803`18570000 fffff803`185dc000 CLFS (deferred)
fffff803`185e0000 fffff803`185fa000 PSHED (deferred)
fffff803`18600000 fffff803`1860b000 BOOTVID (deferred)
fffff803`18610000 fffff803`18726000 clipsp (deferred)
fffff803`18730000 fffff803`1879d000 FLTMGR (deferred)
fffff803`187a0000 fffff803`187c9000 ksecdd (deferred)
fffff803`187d0000 fffff803`18833000 msrpc (deferred)
fffff803`18840000 fffff803`1884e000 cmimcext (deferred)
fffff803`18850000 fffff803`18861000 werkernel (deferred)
fffff803`18870000 fffff803`1887c000 ntosext (deferred)
fffff803`18880000 fffff803`18893000 WDFLDR (deferred)
fffff803`188a0000 fffff803`188af000 SleepStudyHelper (deferred)
fffff803`188b0000 fffff803`188c1000 WppRecorder (deferred)
fffff803`188d0000 fffff803`188dd000 msseccore (deferred)
fffff803`188e0000 fffff803`188ec000 WMILIB (deferred)
fffff803`1be00000 fffff803`1ce46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\89284D0CA6ACC8274B9A44BD5AF9290B1\ntkrnlmp.pdb
fffff803`1de00000 fffff803`1dee9000 CI (deferred)
fffff803`1def0000 fffff803`1dfab000 cng (deferred)
fffff803`1dfb0000 fffff803`1e081000 Wdf01000 (deferred)
fffff803`1e090000 fffff803`1e0b6000 acpiex (deferred)
fffff803`1e0c0000 fffff803`1e0da000 SgrmAgent (deferred)
fffff803`1e0e0000 fffff803`1e1ac000 ACPI (deferred)
fffff803`1e1b0000 fffff803`1e1bb000 msisadrv (deferred)
fffff803`1e1e0000 fffff803`1e1f7000 WindowsTrustedRT (deferred)
fffff803`1e200000 fffff803`1e277000 pci (deferred)
fffff803`1e280000 fffff803`1e2c4000 tpm (deferred)
fffff803`1e2d0000 fffff803`1e33b000 intelpep (deferred)
fffff803`1e340000 fffff803`1e34b000 IntelTA (deferred)
fffff803`1e350000 fffff803`1e35b000 WindowsTrustedRTProxy (deferred)
fffff803`1e360000 fffff803`1e374000 pcw (deferred)
fffff803`1e380000 fffff803`1e395000 vdrvroot (deferred)
fffff803`1e3a0000 fffff803`1e3cf000 pdc (deferred)
fffff803`1e3d0000 fffff803`1e3e9000 CEA (deferred)
fffff803`1e3f0000 fffff803`1e421000 partmgr (deferred)
fffff803`1e430000 fffff803`1e4dc000 spaceport (deferred)
fffff803`1e4e0000 fffff803`1e4f9000 volmgr (deferred)
fffff803`1e500000 fffff803`1e563000 volmgrx (deferred)
fffff803`1e570000 fffff803`1e58e000 mountmgr (deferred)
fffff803`1e590000 fffff803`1e5c2000 storahci (deferred)
fffff803`1e5d0000 fffff803`1e685000 storport (deferred)
fffff803`1e690000 fffff803`1e6c0000 stornvme (deferred)
fffff803`1e6d0000 fffff803`1e6ec000 EhStorClass (deferred)
fffff803`1e6f0000 fffff803`1e70a000 fileinfo (deferred)
fffff803`1e710000 fffff803`1e750000 Wof (deferred)
fffff803`1e760000 fffff803`1e7ba000 WdFilter (deferred)
fffff803`1e7c0000 fffff803`1ea96000 Ntfs (deferred)
fffff803`1eaa0000 fffff803`1eaad000 Fs_Rec (deferred)
fffff803`1eab0000 fffff803`1ec1f000 ndis (deferred)
fffff803`1ec20000 fffff803`1ecbc000 NETIO (deferred)
fffff803`1ecc0000 fffff803`1ecf2000 ksecpkg (deferred)
fffff803`1ed00000 fffff803`1ed21000 amdpsp (deferred)
fffff803`1ed30000 fffff803`1f01e000 tcpip (deferred)
fffff803`1f020000 fffff803`1f09f000 fwpkclnt (deferred)
fffff803`1f0a0000 fffff803`1f0d0000 wfplwfs (deferred)
fffff803`1f0e0000 fffff803`1f1a8000 fvevol (deferred)
fffff803`1f1b0000 fffff803`1f1bb000 volume (deferred)
fffff803`1f1c0000 fffff803`1f22d000 volsnap (deferred)
fffff803`1f230000 fffff803`1f280000 rdyboost (deferred)
fffff803`1f290000 fffff803`1f2b6000 mup (deferred)
fffff803`1f2c0000 fffff803`1f2d2000 iorate (deferred)
fffff803`1f300000 fffff803`1f31f000 disk (deferred)
fffff803`1f320000 fffff803`1f393000 CLASSPNP (deferred)
fffff803`29e00000 fffff803`2a1aa000 dxgkrnl (pdb symbols) C:\ProgramData\Dbg\sym\dxgkrnl.pdb\A6DEAA223671DC25021F75AF6962C72F1\dxgkrnl.pdb
fffff803`2a1b0000 fffff803`2a1c8000 watchdog (pdb symbols) C:\ProgramData\Dbg\sym\watchdog.pdb\80A022D1E1CC64A61C754306AB16E5B81\watchdog.pdb
fffff803`2a1d0000 fffff803`2a1e6000 BasicDisplay (deferred)
fffff803`2a1f0000 fffff803`2a201000 BasicRender (deferred)
fffff803`2a210000 fffff803`2a22c000 Npfs (deferred)
fffff803`2a230000 fffff803`2a241000 Msfs (deferred)
fffff803`2a250000 fffff803`2a26e000 CimFS (deferred)
fffff803`2a270000 fffff803`2a292000 tdx (deferred)
fffff803`2a2a0000 fffff803`2a2b0000 TDI (deferred)
fffff803`2a2c0000 fffff803`2a31c000 netbt (deferred)
fffff803`2a320000 fffff803`2a334000 afunix (deferred)
fffff803`2a340000 fffff803`2a3e7000 afd (deferred)
fffff803`2a3f0000 fffff803`2a40a000 vwififlt (deferred)
fffff803`2a410000 fffff803`2a43b000 pacer (deferred)
fffff803`2a440000 fffff803`2a454000 ndiscap (deferred)
fffff803`2a460000 fffff803`2a474000 netbios (deferred)
fffff803`2a480000 fffff803`2a521000 Vid (deferred)
fffff803`2a530000 fffff803`2a551000 winhvr (deferred)
fffff803`2a560000 fffff803`2a5db000 rdbss (deferred)
fffff803`2a5e0000 fffff803`2a675000 csc (deferred)
fffff803`2a680000 fffff803`2a692000 nsiproxy (deferred)
fffff803`2a6a0000 fffff803`2a6ae000 npsvctrig (deferred)
fffff803`2a6b0000 fffff803`2a6c0000 mssmbios (deferred)
fffff803`2a6d0000 fffff803`2a6da000 gpuenergydrv (deferred)
fffff803`2a6e0000 fffff803`2a70c000 dfsc (deferred)
fffff803`2a710000 fffff803`2a725000 umbus (deferred)
fffff803`2a730000 fffff803`2a79c000 fastfat (deferred)
fffff803`2a7a0000 fffff803`2a7b7000 bam (deferred)
fffff803`2a7c0000 fffff803`2a80e000 ahcache (deferred)
fffff803`2a810000 fffff803`2a822000 CompositeBus (deferred)
fffff803`2a830000 fffff803`2a83d000 kdnic (deferred)
fffff803`2a860000 fffff803`2a87e000 crashdmp (deferred)
fffff803`2a880000 fffff803`2a8d6000 msquic (deferred)
fffff803`2a960000 fffff803`2a990000 cdrom (deferred)
fffff803`2a9a0000 fffff803`2a9b5000 filecrypt (deferred)
fffff803`2a9c0000 fffff803`2a9ce000 tbs (deferred)
fffff803`2a9d0000 fffff803`2a9da000 Null (deferred)
fffff803`2a9e0000 fffff803`2a9ea000 Beep (deferred)
fffff803`2ba00000 fffff803`2ba44000 ucx01000 (deferred)
fffff803`2ba50000 fffff803`2bb6a000 rt640x64 (deferred)
fffff803`2bb70000 fffff803`2bbc4000 WudfRd (deferred)
fffff803`2bbd0000 fffff803`2bbfb000 luafv (deferred)
fffff803`2bc00000 fffff803`2bc37000 wcifs (deferred)
fffff803`2bc40000 fffff803`2bcc0000 cldflt (deferred)
fffff803`2bcd0000 fffff803`2bcf7000 bindflt (deferred)
fffff803`2bd00000 fffff803`2bd18000 mslldp (deferred)
fffff803`2bd20000 fffff803`2bd38000 lltdio (deferred)
fffff803`2bd40000 fffff803`2bd5b000 rspndr (deferred)
fffff803`2bd60000 fffff803`2bdfe000 USBXHCI (deferred)
fffff803`35400000 fffff803`35466000 portcls (deferred)
fffff803`35470000 fffff803`35491000 drmk (deferred)
fffff803`354a0000 fffff803`35516000 ks (deferred)
fffff803`35520000 fffff803`3552a000 AMDPCIDev (deferred)
fffff803`35530000 fffff803`3554c000 serial (deferred)
fffff803`35550000 fffff803`3555f000 serenum (deferred)
fffff803`35560000 fffff803`3556c000 amdgpio2 (deferred)
fffff803`35570000 fffff803`355a2000 msgpioclx (deferred)
fffff803`355b0000 fffff803`355bc000 wmiacpi (deferred)
fffff803`355c0000 fffff803`355fc000 amdppm (deferred)
fffff803`35600000 fffff803`3560a000 amdgpio3 (deferred)
fffff803`35610000 fffff803`3561d000 NdisVirtualBus (deferred)
fffff803`35620000 fffff803`3562c000 swenum (deferred)
fffff803`35630000 fffff803`3563e000 rdpbus (deferred)
fffff803`35640000 fffff803`356e3000 UsbHub3 (deferred)
fffff803`356f0000 fffff803`356fe000 USBD (deferred)
fffff803`35700000 fffff803`35723000 nvhda64v (deferred)
fffff803`35730000 fffff803`3573f000 ksthunk (deferred)
fffff803`35740000 fffff803`35d78000 RTKVHD64 (deferred)
fffff803`35d80000 fffff803`35da6000 USBSTOR (deferred)
fffff803`35db0000 fffff803`35dc3000 hidparse (deferred)
fffff803`35de0000 fffff803`35def000 dump_dumpstorport (deferred)
fffff803`35e30000 fffff803`35e60000 dump_stornvme (deferred)
fffff803`35e90000 fffff803`35ead000 dump_dumpfve (deferred)
fffff803`35eb0000 fffff803`35ee4000 usbccgp (deferred)
fffff803`35ef0000 fffff803`35f02000 hidusb (deferred)
fffff803`35f10000 fffff803`35f53000 HIDCLASS (deferred)
fffff803`35f60000 fffff803`35f70000 mouhid (deferred)
fffff803`35f80000 fffff803`35f93000 mouclass (deferred)
fffff803`35fa0000 fffff803`35fb1000 kbdhid (deferred)
fffff803`35fc0000 fffff803`35fd4000 kbdclass (deferred)
fffff803`35fe0000 fffff803`3601a000 usbaudio (deferred)
fffff803`36020000 fffff803`36101000 dxgmms2 (deferred)
fffff803`36110000 fffff803`3612b000 monitor (deferred)
fffff803`36130000 fffff803`3613e000 WpdUpFltr (deferred)
fffff803`36150000 fffff803`385ae000 nvlddmkm (deferred)
fffff803`385b0000 fffff803`385d7000 HDAudBus (deferred)
fffff803`385e0000 fffff803`385fa000 storqosflt (deferred)
fffff803`7d000000 fffff803`7d046000 mrxsmb20 (deferred)
fffff803`7d050000 fffff803`7d064000 mmcss (deferred)
fffff803`7d070000 fffff803`7d0c7000 srvnet (deferred)
fffff803`7d0d0000 fffff803`7d0f7000 Ndu (deferred)
fffff803`7d100000 fffff803`7d1d7000 peauth (deferred)
fffff803`7d1e0000 fffff803`7d1f5000 tcpipreg (deferred)
fffff803`7d200000 fffff803`7d2c7000 srv2 (deferred)
fffff803`7d2d0000 fffff803`7d2e2000 WdNisDrv (deferred)
fffff803`7d2f0000 fffff803`7d302000 condrv (deferred)
fffff803`7df40000 fffff803`7e0c7000 HTTP (deferred)
fffff803`7e0d0000 fffff803`7e0f5000 bowser (deferred)
fffff803`7e100000 fffff803`7e11a000 mpsdrv (deferred)
fffff803`7e120000 fffff803`7e1b4000 mrxsmb (deferred)
Unloaded modules:
fffff803`36020000 fffff803`36075000 WudfRd.sys
fffff803`2a890000 fffff803`2a8a0000 dump_storpor
fffff803`2a8e0000 fffff803`2a911000 dump_stornvm
fffff803`2a940000 fffff803`2a95e000 dump_dumpfve
fffff803`2a710000 fffff803`2a72c000 dam.sys
fffff803`1e1c0000 fffff803`1e1d1000 WdBoot.sys
fffff803`1f2e0000 fffff803`1f2f1000 hwpolicy.sys
---
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff800731783138, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8023e2ddbb1, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3250
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4055
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 6234
Key : Analysis.Init.Elapsed.mSec
Value: 9522
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051723-6015-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: ffff800731783138
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8023e2ddbb1
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff800731783138
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffffef865f2c76f0 -- (.trap 0xffffef865f2c76f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff800731783118 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023e2ddbb1 rsp=ffffef865f2c7880 rbp=ffffef865f2c7900
r8=ffff800533fc4080 r9=fffff8023e000000 r10=ffffffffffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiDeliverApc+0x101:
fffff802`3e2ddbb1 488b4e30 mov rcx,qword ptr [rsi+30h] ds:00000000`00000030=????????????????
Resetting default scope
STACK_TEXT:
ffffef86`5f2c75a8 fffff802`3e40fd29 : 00000000`0000000a ffff8007`31783138 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffef86`5f2c75b0 fffff802`3e40b8e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffef86`5f2c76f0 fffff802`3e2ddbb1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x463
ffffef86`5f2c7880 fffff802`3e2dda6b : 00000000`00000634 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x101
ffffef86`5f2c7930 fffff802`3e21eb2f : ffff8005`401e1bb0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x2b
ffffef86`5f2c7960 fffff802`3e611b31 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeLeaveCriticalRegionThread+0x2f
ffffef86`5f2c7990 fffff802`3e6118ee : ffff8005`33fc4080 00000000`00000002 ffff8005`292ea0c0 fffff802`3e221101 : nt!ObpReferenceObjectByHandleWithTag+0x231
ffffef86`5f2c7a20 fffff802`3e6b2e40 : 00000000`0843f718 fffff802`3e61159a ffff8005`31783080 00000000`00000000 : nt!ObReferenceObjectByHandle+0x2e
ffffef86`5f2c7a70 fffff802`3e40f4f8 : ffff8005`31783080 ffff8005`401e1be0 ffffef86`5f2c7ad8 ffffef86`5f2c7b40 : nt!NtClearEvent+0x50
ffffef86`5f2c7ac0 00000000`77c01cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`07cbf148 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c01cfc
SYMBOL_NAME: nt!KiDeliverApc+101
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 101
FAILURE_BUCKET_ID: AV_nt!KiDeliverApc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f94393b9-4308-5aa6-9044-71825dde3286}
Followup: MachineOwner
---------
3: kd> !pool
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
The pool page you have specified is not in this dump.
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2416]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends International, LLC.
BiosVersion = 2.A0
BiosReleaseDate = 03/06/2023
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7C96
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B550M-A PRO (MS-7C96)
BaseBoardVersion = 1.0