1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000009b3823f818, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80339a27897, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for cpuz150_x64.sys
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4765
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 8716
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 405
    Key  : Analysis.Init.Elapsed.mSec
    Value: 5174
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88
    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa
    Key  : Bugcheck.Code.Register
    Value: 0xa
    Key  : Dump.Attributes.AsUlong
    Value: 1008
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
FILE_IN_CAB:  051623-25500-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump
BUGCHECK_CODE:  a
BUGCHECK_P1: 9b3823f818
BUGCHECK_P2: f
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80339a27897
WRITE_ADDRESS: fffff8033a31c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000009b3823f818
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  Corsair.Servic
TRAP_FRAME:  fffff38ba2658f30 -- (.trap 0xfffff38ba2658f30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000001d rbx=0000000000000000 rcx=fffff79840227000
rdx=0000009b3823f818 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80339a27897 rsp=fffff38ba26590c8 rbp=fffff79840227000
 r8=0000000000000060  r9=0000000000000060 r10=0000fffff80339a2
r11=ffffb8fed0e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!HalpPciReadMmConfigUlong+0x7:
fffff803`39a27897 8902            mov     dword ptr [rdx],eax ds:0000009b`3823f818=ffffffff
Resetting default scope
STACK_TEXT:
fffff38b`a2658de8 fffff803`39a40fa9     : 00000000`0000000a 0000009b`3823f818 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
fffff38b`a2658df0 fffff803`39a3c634     : 00000000`00000000 00000000`00000001 fffff38b`a2659119 fffff803`39a34df6 : nt!KiBugCheckDispatch+0x69
fffff38b`a2658f30 fffff803`39a27897     : fffff803`3995f14e ffff9408`6b5bf240 ffff9408`657de430 ffffdd38`202ff516 : nt!KiPageFault+0x474
fffff38b`a26590c8 fffff803`3995f14e     : ffff9408`6b5bf240 ffff9408`657de430 ffffdd38`202ff516 fffff803`3984139e : nt!HalpPciReadMmConfigUlong+0x7
fffff38b`a26590d0 fffff803`3995efa2     : 00000000`00000000 00000000`00000004 00000000`00000060 00000000`00000000 : nt!HalpPCIPerformConfigAccess+0x5a
fffff38b`a2659100 fffff803`3995ee15     : 00000000`00000000 00000000`00000004 0000009b`3823f818 00000000`00000000 : nt!HalpPciAccessMmConfigSpace+0x82
fffff38b`a2659140 fffff803`399c1d7a     : 00000000`00000000 00000000`00000000 0000009b`3823f818 00000000`00000004 : nt!HalpPCIConfig+0xc5
fffff38b`a26591c0 fffff803`399c1cd7     : 00000000`00000000 00000000`00000004 00000000`00000000 00000000`00000040 : nt!HalpReadPCIConfig+0x56
fffff38b`a2659210 fffff803`399c1bf1     : ffff9408`6dff4080 000f807f`b4bbbdff ffffc901`ab0d1180 fffff803`39a35027 : nt!HalpGetPCIData+0xd3
fffff38b`a26592e0 fffff803`91dc4455     : 00000000`00000000 00000000`00000001 fffff38b`a2659509 fffff803`39a34df6 : nt!HalGetBusDataByOffset+0x41
fffff38b`a2659320 00000000`00000000     : 00000000`00000001 fffff38b`a2659509 fffff803`39a34df6 fffff803`00000060 : cpuz150_x64+0x4455
SYMBOL_NAME:  cpuz150_x64+4455
MODULE_NAME: cpuz150_x64
IMAGE_NAME:  cpuz150_x64.sys
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  4455
FAILURE_BUCKET_ID:  AV_cpuz150_x64!unknown_function
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {613679c3-25a8-ff59-4c4a-b7463c7dcc5a}
Followup:     MachineOwner
---------