V
vwhite3135
I think its due to a processor related issue I just don't know what exactly. Anyway to tell what I should be looking for in here?
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 8 Kernel Version 9200 MP (64 procs) Free x64
Product: Server, suite: TerminalServer DataCenter SingleUserTS
Built by: 9200.22570.amd64fre.win8_ldr.180908-0600
Machine Name:
Kernel base = 0xfffff802`ea613000 PsLoadedModuleList = 0xfffff802`ea8af9c0
Debug session time: Tue May 7 13:29:51.717 2019 (UTC - 4:00)
System Uptime: 178 days 5:19:13.362
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000096, fffff802ea63ad70, 0, 0}
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!KeDeepSleepProcessor+d0 )
Followup: MachineOwner
---------
12: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff802ea63ad70, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 9200.22570.amd64fre.win8_ldr.180908-0600
SYSTEM_MANUFACTURER: Supermicro
SYSTEM_PRODUCT_NAME: H8QG6
SYSTEM_SKU: 1234567890
SYSTEM_VERSION: 1234567890
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 3.5
BIOS_DATE: 12/16/2013
BASEBOARD_MANUFACTURER: Supermicro
BASEBOARD_PRODUCT: H8QG6
BASEBOARD_VERSION: 1234567890
DUMP_TYPE: 1
BUGCHECK_P1: ffffffffc0000096
BUGCHECK_P2: fffff802ea63ad70
BUGCHECK_P3: 0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
FAULTING_IP:
nt!KeDeepSleepProcessor+d0
fffff802`ea63ad70 0f22e0 mov cr4,rax
BUGCHECK_STR: 0x1E_c0000096
CPU_COUNT: 40
CPU_MHZ: 960
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: Computer1
ANALYSIS_SESSION_TIME: 05-07-2019 13:42:18.0697
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
EXCEPTION_RECORD: 000000000000004c -- (.exr 0x4c)
Cannot read Exception record @ 000000000000004c
LAST_CONTROL_TRANSFER: from fffff802ea726abe to fffff802ea7c2420
STACK_TEXT:
fffff880`03031898 fffff802`ea726abe : 00000000`0000001e ffffffff`c0000096 fffff802`ea63ad70 00000000`00000000 : nt!KeBugCheckEx
fffff880`030318a0 fffff802`ea7cb05d : fffffa80`fcc17aa0 fffffa80`fcc047c0 fffff880`03031a10 fffff880`0994dc35 : nt!KiFatalExceptionHandler+0x22
fffff880`030318e0 fffff802`ea65bed7 : 00000000`00000000 fffff880`0302c000 fffffa82`2a174480 fffff880`03033000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`03031910 fffff802`ea72c3b2 : fffff880`03032808 fffff880`03032550 fffff880`03032808 fffffa80`fcc17010 : nt!RtlDispatchException+0x44b
fffff880`03032020 fffff802`ea7d2702 : 00000000`0000004c 00000000`00000000 00000000`00000000 fffffa80`c1c9acc0 : nt!KiDispatchException+0x142
fffff880`030326d0 fffff802`ea7cf732 : ff000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`030328b0 fffff802`ea63ad70 : fffff802`ea63ca42 fffffa80`fcc17010 fffffa80`fcc17aa0 fffffa80`fcc171d0 : nt!KiGeneralProtectionFault+0x2f2
fffff880`03032a48 fffff880`03032ad8 : fffff880`03000180 fffff880`03032b68 fffff880`03000180 fffff880`03032b64 : nt!KeDeepSleepProcessor+0xd0
fffff880`03032a78 fffff880`03000180 : fffff880`03032b68 fffff880`03000180 fffff880`03032b64 00000000`00000000 : 0xfffff880`03032ad8
fffff880`03032a80 fffff880`03032b68 : fffff880`03000180 fffff880`03032b64 00000000`00000000 fffffa80`fcc17010 : 0xfffff880`03000180
fffff880`03032a88 fffff880`03000180 : fffff880`03032b64 00000000`00000000 fffffa80`fcc17010 fffffa80`fcc171d0 : 0xfffff880`03032b68
fffff880`03032a90 fffff880`03032b64 : 00000000`00000000 fffffa80`fcc17010 fffffa80`fcc171d0 fffffa80`fcc17aa0 : 0xfffff880`03000180
fffff880`03032a98 00000000`00000000 : fffffa80`fcc17010 fffffa80`fcc171d0 fffffa80`fcc17aa0 fffff802`ea78997d : 0xfffff880`03032b64
THREAD_SHA1_HASH_MOD_FUNC: 0869d1dfa73fadec8f2dd1607789d2936913a0a3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eef7eb2917c242b57f6bd56c53d214dcfee93ad6
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KeDeepSleepProcessor+d0
fffff802`ea63ad70 0f22e0 mov cr4,rax
FAULT_INSTR_CODE: fe0220f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KeDeepSleepProcessor+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5b949310
IMAGE_VERSION: 6.2.9200.22570
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x1E_c0000096_nt!KeDeepSleepProcessor
BUCKET_ID: 0x1E_c0000096_nt!KeDeepSleepProcessor
PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_nt!KeDeepSleepProcessor
TARGET_TIME: 2019-05-07T17:29:51.000Z
OSBUILD: 9200
OSSERVICEPACK: 22570
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 400
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 8
OSEDITION: Windows 8 Server TerminalServer DataCenter SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-09-08 23:27:12
BUILDDATESTAMP_STR: 180908-0600
BUILDLAB_STR: win8_ldr
BUILDOSVER_STR: 6.2.9200.22570.amd64fre.win8_ldr.180908-0600
ANALYSIS_SESSION_ELAPSED_TIME: b5a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000096_nt!kedeepsleepprocessor
FAILURE_ID_HASH: {ed990e23-16c2-4600-4fe6-56612b27e720}
Followup: MachineOwner
---------
12: kd> .exr 0x4c
Cannot read Exception record @ 000000000000004c
Continue reading...
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 8 Kernel Version 9200 MP (64 procs) Free x64
Product: Server, suite: TerminalServer DataCenter SingleUserTS
Built by: 9200.22570.amd64fre.win8_ldr.180908-0600
Machine Name:
Kernel base = 0xfffff802`ea613000 PsLoadedModuleList = 0xfffff802`ea8af9c0
Debug session time: Tue May 7 13:29:51.717 2019 (UTC - 4:00)
System Uptime: 178 days 5:19:13.362
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000096, fffff802ea63ad70, 0, 0}
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!KeDeepSleepProcessor+d0 )
Followup: MachineOwner
---------
12: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff802ea63ad70, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
Page 7d3600 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 9200.22570.amd64fre.win8_ldr.180908-0600
SYSTEM_MANUFACTURER: Supermicro
SYSTEM_PRODUCT_NAME: H8QG6
SYSTEM_SKU: 1234567890
SYSTEM_VERSION: 1234567890
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 3.5
BIOS_DATE: 12/16/2013
BASEBOARD_MANUFACTURER: Supermicro
BASEBOARD_PRODUCT: H8QG6
BASEBOARD_VERSION: 1234567890
DUMP_TYPE: 1
BUGCHECK_P1: ffffffffc0000096
BUGCHECK_P2: fffff802ea63ad70
BUGCHECK_P3: 0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
FAULTING_IP:
nt!KeDeepSleepProcessor+d0
fffff802`ea63ad70 0f22e0 mov cr4,rax
BUGCHECK_STR: 0x1E_c0000096
CPU_COUNT: 40
CPU_MHZ: 960
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: Computer1
ANALYSIS_SESSION_TIME: 05-07-2019 13:42:18.0697
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
EXCEPTION_RECORD: 000000000000004c -- (.exr 0x4c)
Cannot read Exception record @ 000000000000004c
LAST_CONTROL_TRANSFER: from fffff802ea726abe to fffff802ea7c2420
STACK_TEXT:
fffff880`03031898 fffff802`ea726abe : 00000000`0000001e ffffffff`c0000096 fffff802`ea63ad70 00000000`00000000 : nt!KeBugCheckEx
fffff880`030318a0 fffff802`ea7cb05d : fffffa80`fcc17aa0 fffffa80`fcc047c0 fffff880`03031a10 fffff880`0994dc35 : nt!KiFatalExceptionHandler+0x22
fffff880`030318e0 fffff802`ea65bed7 : 00000000`00000000 fffff880`0302c000 fffffa82`2a174480 fffff880`03033000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`03031910 fffff802`ea72c3b2 : fffff880`03032808 fffff880`03032550 fffff880`03032808 fffffa80`fcc17010 : nt!RtlDispatchException+0x44b
fffff880`03032020 fffff802`ea7d2702 : 00000000`0000004c 00000000`00000000 00000000`00000000 fffffa80`c1c9acc0 : nt!KiDispatchException+0x142
fffff880`030326d0 fffff802`ea7cf732 : ff000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`030328b0 fffff802`ea63ad70 : fffff802`ea63ca42 fffffa80`fcc17010 fffffa80`fcc17aa0 fffffa80`fcc171d0 : nt!KiGeneralProtectionFault+0x2f2
fffff880`03032a48 fffff880`03032ad8 : fffff880`03000180 fffff880`03032b68 fffff880`03000180 fffff880`03032b64 : nt!KeDeepSleepProcessor+0xd0
fffff880`03032a78 fffff880`03000180 : fffff880`03032b68 fffff880`03000180 fffff880`03032b64 00000000`00000000 : 0xfffff880`03032ad8
fffff880`03032a80 fffff880`03032b68 : fffff880`03000180 fffff880`03032b64 00000000`00000000 fffffa80`fcc17010 : 0xfffff880`03000180
fffff880`03032a88 fffff880`03000180 : fffff880`03032b64 00000000`00000000 fffffa80`fcc17010 fffffa80`fcc171d0 : 0xfffff880`03032b68
fffff880`03032a90 fffff880`03032b64 : 00000000`00000000 fffffa80`fcc17010 fffffa80`fcc171d0 fffffa80`fcc17aa0 : 0xfffff880`03000180
fffff880`03032a98 00000000`00000000 : fffffa80`fcc17010 fffffa80`fcc171d0 fffffa80`fcc17aa0 fffff802`ea78997d : 0xfffff880`03032b64
THREAD_SHA1_HASH_MOD_FUNC: 0869d1dfa73fadec8f2dd1607789d2936913a0a3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eef7eb2917c242b57f6bd56c53d214dcfee93ad6
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KeDeepSleepProcessor+d0
fffff802`ea63ad70 0f22e0 mov cr4,rax
FAULT_INSTR_CODE: fe0220f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KeDeepSleepProcessor+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5b949310
IMAGE_VERSION: 6.2.9200.22570
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x1E_c0000096_nt!KeDeepSleepProcessor
BUCKET_ID: 0x1E_c0000096_nt!KeDeepSleepProcessor
PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_nt!KeDeepSleepProcessor
TARGET_TIME: 2019-05-07T17:29:51.000Z
OSBUILD: 9200
OSSERVICEPACK: 22570
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 400
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 8
OSEDITION: Windows 8 Server TerminalServer DataCenter SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-09-08 23:27:12
BUILDDATESTAMP_STR: 180908-0600
BUILDLAB_STR: win8_ldr
BUILDOSVER_STR: 6.2.9200.22570.amd64fre.win8_ldr.180908-0600
ANALYSIS_SESSION_ELAPSED_TIME: b5a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000096_nt!kedeepsleepprocessor
FAILURE_ID_HASH: {ed990e23-16c2-4600-4fe6-56612b27e720}
Followup: MachineOwner
---------
12: kd> .exr 0x4c
Cannot read Exception record @ 000000000000004c
Continue reading...