Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.18914.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\xxxx\Desktop\072519-51859-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 17763 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 17763.1.amd64fre.rs5_release.180914-1434
- Machine Name:
- Kernel base = 0xfffff801`6e8a9000 PsLoadedModuleList = 0xfffff801`6ecc4670
- Debug session time: Thu Jul 25 17:54:38.114 2019 (UTC - 4:00)
- System Uptime: 14 days 1:22:51.902
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ............................
- Loading User Symbols
- Loading unloaded module list
- ..................................................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff801`6ea5cf50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff801`717e71c0=000000000000000a
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: ffff8901cd7ce002, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff80189f52018, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 18
- Key : Analysis.Elapsed.Sec
- Value: 43
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 71
- PROCESSES_ANALYSIS: 1
- SERVICE_ANALYSIS: 1
- STACKHASH_ANALYSIS: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
- DUMP_TYPE: 2
- BUGCHECK_P1: ffff8901cd7ce002
- BUGCHECK_P2: 2
- BUGCHECK_P3: 0
- BUGCHECK_P4: fffff80189f52018
- READ_ADDRESS: GetUlongFromAddress: unable to read from fffff8016ed70440
- fffff8016edeb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- ffff8901cd7ce002
- CURRENT_IRQL: 2
- FAULTING_IP:
- Qcamain10x64+f2018
- fffff801`89f52018 0fb64602 movzx eax,byte ptr [rsi+2]
- CPU_COUNT: 8
- CPU_MHZ: d50
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: steamwebhelper.exe
- ANALYSIS_SESSION_HOST: DESKTOP-G54RMMH
- ANALYSIS_SESSION_TIME: 07-25-2019 18:23:45.0024
- ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
- DPC_STACK_BASE: FFFFF801717E7FB0
- TRAP_FRAME: fffff801717e7300 -- (.trap 0xfffff801717e7300)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000305a5eab rbx=0000000000000000 rcx=00000000e259b6c0
- rdx=00000000000026be rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80189f52018 rsp=fffff801717e7490 rbp=fffff801717e74d0
- r8=0000000000000004 r9=0000000000ff00ff r10=000000000000fffc
- r11=fffff801717e74be r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- Qcamain10x64+0xf2018:
- fffff801`89f52018 0fb64602 movzx eax,byte ptr [rsi+2] ds:00000000`00000002=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8016ea6e7e9 to fffff8016ea5cf50
- STACK_TEXT:
- fffff801`717e71b8 fffff801`6ea6e7e9 : 00000000`0000000a ffff8901`cd7ce002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff801`717e71c0 fffff801`6ea6abd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff801`717e7300 fffff801`89f52018 : fffff801`717e75b8 00000000`00000008 ffffaba1`0f20b0e8 ffffca80`0d7c0ad0 : nt!KiPageFault+0x454
- fffff801`717e7490 fffff801`717e75b8 : 00000000`00000008 ffffaba1`0f20b0e8 ffffca80`0d7c0ad0 ffffca80`10370018 : Qcamain10x64+0xf2018
- fffff801`717e7498 00000000`00000008 : ffffaba1`0f20b0e8 ffffca80`0d7c0ad0 ffffca80`10370018 c0c28bd8`b49ab841 : 0xfffff801`717e75b8
- fffff801`717e74a0 ffffaba1`0f20b0e8 : ffffca80`0d7c0ad0 ffffca80`10370018 c0c28bd8`b49ab841 00000000`c0c23ab0 : 0x8
- fffff801`717e74a8 ffffca80`0d7c0ad0 : ffffca80`10370018 c0c28bd8`b49ab841 00000000`c0c23ab0 ffffaba1`0f20b618 : 0xffffaba1`0f20b0e8
- fffff801`717e74b0 ffffca80`10370018 : c0c28bd8`b49ab841 00000000`c0c23ab0 ffffaba1`0f20b618 ffffca80`10376310 : 0xffffca80`0d7c0ad0
- fffff801`717e74b8 c0c28bd8`b49ab841 : 00000000`c0c23ab0 ffffaba1`0f20b618 ffffca80`10376310 00000000`00000000 : 0xffffca80`10370018
- fffff801`717e74c0 00000000`c0c23ab0 : ffffaba1`0f20b618 ffffca80`10376310 00000000`00000000 ffffca80`0cc0ee80 : 0xc0c28bd8`b49ab841
- fffff801`717e74c8 ffffaba1`0f20b618 : ffffca80`10376310 00000000`00000000 ffffca80`0cc0ee80 00000000`00000018 : 0xc0c23ab0
- fffff801`717e74d0 ffffca80`10376310 : 00000000`00000000 ffffca80`0cc0ee80 00000000`00000018 ffffca80`12f04cd0 : 0xffffaba1`0f20b618
- fffff801`717e74d8 00000000`00000000 : ffffca80`0cc0ee80 00000000`00000018 ffffca80`12f04cd0 fffff801`89f529ed : 0xffffca80`10376310
- THREAD_SHA1_HASH_MOD_FUNC: f9984675d98b35b052cf87489b7e7e32f901817c
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9b0432f1a96ae4a32b0426bd9034801d927cc957
- THREAD_SHA1_HASH_MOD: 7472fd63d5f67a2537c280bf0c0b27a13092ea6c
- FOLLOWUP_IP:
- Qcamain10x64+f2018
- fffff801`89f52018 0fb64602 movzx eax,byte ptr [rsi+2]
- FAULT_INSTR_CODE: 246b60f
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: Qcamain10x64+f2018
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Qcamain10x64
- IMAGE_NAME: Qcamain10x64.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 5b30610c
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: f2018
- FAILURE_BUCKET_ID: AV_Qcamain10x64!unknown_function
- BUCKET_ID: AV_Qcamain10x64!unknown_function
- PRIMARY_PROBLEM_CLASS: AV_Qcamain10x64!unknown_function
- TARGET_TIME: 2019-07-25T21:54:38.000Z
- OSBUILD: 17763
- OSSERVICEPACK: 615
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2020-05-15 12:13:35
- BUILDDATESTAMP_STR: 180914-1434
- BUILDLAB_STR: rs5_release
- BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
- ANALYSIS_SESSION_ELAPSED_TIME: a7fb
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_qcamain10x64!unknown_function
- FAILURE_ID_HASH: {f52cafb4-1320-aedf-2a5d-ab5464b9e487}
- Followup: MachineOwner
- ---------
- 0: kd> lmvm Qcamain10x64
- Browse full module list
- start end module name
- fffff801`89e60000 fffff801`8a0e8000 Qcamain10x64 T (no symbols)
- Loaded symbol image file: Qcamain10x64.sys
- Image path: \SystemRoot\System32\drivers\Qcamain10x64.sys
- Image name: Qcamain10x64.sys
- Browse all global symbols functions data
- Timestamp: Sun Jun 24 20:27:08 2018 (5B30610C)
- CheckSum: 00244958
- ImageSize: 00288000
- Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
- Information from resource tables:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement