Chris W
Member
Windows 11 Version 22H2 (OS Build 22621. 1848)
Hello, I'm having some trouble with the old BSOD. I ran a dumpfile analysis but unfortunately the information inside is beyond me. :) Any help would be greatly appreciated.
Heres the contents of the dumpfile analysis:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
************* Waiting for Debugger Extensions Gallery to Initialize **************
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Chris\Desktop\070223-8531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff804`6b400000 PsLoadedModuleList = 0xfffff804`6c0134b0
Debug session time: Sun Jul 2 00:29:18.828 2023 (UTC + 1:00)
System Uptime: 0 days 2:21:09.777
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`6b82c280 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd84`9f01f030=000000000000000a
28: kd> !analyze -v
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046b673849, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1062
Key : Analysis.Elapsed.mSec
Value: 16054
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 29
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 35863
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!MiInsertPageInFreeOrZeroedList
Key : Failure.Hash
Value: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: a
BUGCHECK_P1: 10
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8046b673849
FILE_IN_CAB: 070223-8531-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8046c11c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000010
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffd849f01f170 -- (.trap 0xfffffd849f01f170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046b673849 rsp=fffffd849f01f300 rbp=0000000000000001
r8=0000000000302af9 r9=0000000000000001 r10=00000000000000f9
r11=fffffd849f01f448 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiInsertPageInFreeOrZeroedList+0x259:
fffff804`6b673849 498b4510 mov rax,qword ptr [r13+10h] ds:00000000`00000010=????????????????
Resetting default scope
STACK_TEXT:
fffffd84`9f01f028 fffff804`6b8418a9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffd84`9f01f030 fffff804`6b83cf34 : ffff96a3`b75eca5b fffff804`6b680fed ffffad80`0b09b4d0 00000000`00000006 : nt!KiBugCheckDispatch+0x69
fffffd84`9f01f170 fffff804`6b673849 : 00000000`00000000 00000000`00000000 00000000`00000002 ffffad80`09065e80 : nt!KiPageFault+0x474
fffffd84`9f01f300 fffff804`6b61b99b : 00000000`00302af9 00000000`00000000 00000000`00000001 fffff804`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x259
fffffd84`9f01f450 fffff804`6b61b8c3 : ffffad80`00000000 ffffad80`09080eb0 00000000`00dc0b60 00000000`41800000 : nt!MiReturnFreeZeroPage+0xa3
fffffd84`9f01f480 fffff804`6b61b07a : 00000000`00000003 00000000`00000003 00000000`00000002 00000000`00000000 : nt!MiReleaseFreshPage+0x1f
fffffd84`9f01f4b0 fffff804`6b61afc1 : ffffad80`29422200 00000000`00000003 fffffd84`9f01f630 00000000`41800000 : nt!MiDeleteUltraMapContext+0x9a
fffffd84`9f01f500 fffff804`6b78ed88 : 00000000`00000000 fffffd84`9f01f630 00000000`00000000 00000000`41800000 : nt!MiDeleteUltraThreadContext+0x19
fffffd84`9f01f530 fffff804`6b87a030 : fffff804`6c06b300 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFindContiguousPagesEx+0x4c8
fffffd84`9f01f780 fffff804`6b8faebb : ffffad81`00000000 00000000`00000000 00000000`00000002 00000000`001fe500 : nt!MiRebuildLargePage+0x176
fffffd84`9f01f8b0 fffff804`6b6b0c65 : ffffd28b`0b4b2a00 fffff804`6c06b300 00000000`001fe500 00000000`00000000 : nt!MiRebuildLargePages+0x17308b
fffffd84`9f01f940 fffff804`6b6d8dc7 : ffffd28b`2e7f1040 00000000`000002a6 ffffd28b`2e7f1040 fffff804`6b6b0b10 : nt!ExpWorkerThread+0x155
fffffd84`9f01fb30 fffff804`6b8311e4 : ffff8580`2c711180 ffffd28b`2e7f1040 fffff804`6b6d8d70 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffffd84`9f01fb80 00000000`00000000 : fffffd84`9f020000 fffffd84`9f019000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+259
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 259
FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Followup: MachineOwner
---------
Hello, I'm having some trouble with the old BSOD. I ran a dumpfile analysis but unfortunately the information inside is beyond me. :) Any help would be greatly appreciated.
Heres the contents of the dumpfile analysis:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
----> Repository : UserExtensions, Enabled: true, Packages count: 0>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Chris\Desktop\070223-8531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff804`6b400000 PsLoadedModuleList = 0xfffff804`6c0134b0
Debug session time: Sun Jul 2 00:29:18.828 2023 (UTC + 1:00)
System Uptime: 0 days 2:21:09.777
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`6b82c280 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd84`9f01f030=000000000000000a
28: kd> !analyze -v
*******************************************************************************
- *
- Bugcheck Analysis *
- *
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046b673849, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1062
Key : Analysis.Elapsed.mSec
Value: 16054
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 29
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 35863
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!MiInsertPageInFreeOrZeroedList
Key : Failure.Hash
Value: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: a
BUGCHECK_P1: 10
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8046b673849
FILE_IN_CAB: 070223-8531-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8046c11c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000010
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffd849f01f170 -- (.trap 0xfffffd849f01f170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046b673849 rsp=fffffd849f01f300 rbp=0000000000000001
r8=0000000000302af9 r9=0000000000000001 r10=00000000000000f9
r11=fffffd849f01f448 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiInsertPageInFreeOrZeroedList+0x259:
fffff804`6b673849 498b4510 mov rax,qword ptr [r13+10h] ds:00000000`00000010=????????????????
Resetting default scope
STACK_TEXT:
fffffd84`9f01f028 fffff804`6b8418a9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffd84`9f01f030 fffff804`6b83cf34 : ffff96a3`b75eca5b fffff804`6b680fed ffffad80`0b09b4d0 00000000`00000006 : nt!KiBugCheckDispatch+0x69
fffffd84`9f01f170 fffff804`6b673849 : 00000000`00000000 00000000`00000000 00000000`00000002 ffffad80`09065e80 : nt!KiPageFault+0x474
fffffd84`9f01f300 fffff804`6b61b99b : 00000000`00302af9 00000000`00000000 00000000`00000001 fffff804`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x259
fffffd84`9f01f450 fffff804`6b61b8c3 : ffffad80`00000000 ffffad80`09080eb0 00000000`00dc0b60 00000000`41800000 : nt!MiReturnFreeZeroPage+0xa3
fffffd84`9f01f480 fffff804`6b61b07a : 00000000`00000003 00000000`00000003 00000000`00000002 00000000`00000000 : nt!MiReleaseFreshPage+0x1f
fffffd84`9f01f4b0 fffff804`6b61afc1 : ffffad80`29422200 00000000`00000003 fffffd84`9f01f630 00000000`41800000 : nt!MiDeleteUltraMapContext+0x9a
fffffd84`9f01f500 fffff804`6b78ed88 : 00000000`00000000 fffffd84`9f01f630 00000000`00000000 00000000`41800000 : nt!MiDeleteUltraThreadContext+0x19
fffffd84`9f01f530 fffff804`6b87a030 : fffff804`6c06b300 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFindContiguousPagesEx+0x4c8
fffffd84`9f01f780 fffff804`6b8faebb : ffffad81`00000000 00000000`00000000 00000000`00000002 00000000`001fe500 : nt!MiRebuildLargePage+0x176
fffffd84`9f01f8b0 fffff804`6b6b0c65 : ffffd28b`0b4b2a00 fffff804`6c06b300 00000000`001fe500 00000000`00000000 : nt!MiRebuildLargePages+0x17308b
fffffd84`9f01f940 fffff804`6b6d8dc7 : ffffd28b`2e7f1040 00000000`000002a6 ffffd28b`2e7f1040 fffff804`6b6b0b10 : nt!ExpWorkerThread+0x155
fffffd84`9f01fb30 fffff804`6b8311e4 : ffff8580`2c711180 ffffd28b`2e7f1040 fffff804`6b6d8d70 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffffd84`9f01fb80 00000000`00000000 : fffffd84`9f020000 fffffd84`9f019000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+259
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 259
FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Followup: MachineOwner
---------
My Computer
System One
-
- OS
- Windows 11
- Computer type
- PC/Desktop
- CPU
- i-9 13900K
- Motherboard
- MSI Tomahawk DDR5
- Memory
- 64GB corsdair Vengance 6600Mhz
- Graphics Card(s)
- Onboard
- PSU
- be quiet M12 Pure power 1200W