Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Tom\Desktop\XOEM-PC-(2022-01-15_06-12-49)\Crash Dumps\011522-59078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*
http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`45400000 PsLoadedModuleList = 0xfffff806`4602a2b0
Debug session time: Sat Jan 15 02:25:42.338 2022 (UTC - 8:00)
System Uptime: 0 days 7:42:10.038
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
.....
For analysis of this file, run !analyze -v
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80657156bc3, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for L1C60x64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 33035
Key : Analysis.Init.CPU.mSec
Value: 703
Key : Analysis.Init.Elapsed.mSec
Value: 9750
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80657156bc3
READ_ADDRESS: fffff806460fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AvastSvc.exe
TRAP_FRAME: ffffe587dd81a9c0 -- (.trap 0xffffe587dd81a9c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000015f2
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80657156bc3 rsp=ffffe587dd81ab50 rbp=ffffd584f4ecef58
r8=0000000000000129 r9=ffffd584f4738000 r10=0000fffff8065715
r11=ffffd6fc6be00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
L1C60x64+0x6bc3:
fffff806`57156bc3 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffe587`dd81a878 fffff806`45809269 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe587`dd81a880 fffff806`45805569 : 00000000`00000000 00000000`00000000 ffffd584`f4275770 fffff806`458c900e : nt!KiBugCheckDispatch+0x69
ffffe587`dd81a9c0 fffff806`57156bc3 : ffffd584`f470fc80 ffffd584`f14c9c30 ffffd584`f14c9c30 ffffd584`f470fc01 : nt!KiPageFault+0x469
ffffe587`dd81ab50 ffffd584`f470fc80 : ffffd584`f14c9c30 ffffd584`f14c9c30 ffffd584`f470fc01 00000000`00000000 : L1C60x64+0x6bc3
ffffe587`dd81ab58 ffffd584`f14c9c30 : ffffd584`f14c9c30 ffffd584`f470fc01 00000000`00000000 00000000`00000030 : 0xffffd584`f470fc80
ffffe587`dd81ab60 ffffd584`f14c9c30 : ffffd584`f470fc01 00000000`00000000 00000000`00000030 ffffd584`f14c9c30 : 0xffffd584`f14c9c30
ffffe587`dd81ab68 ffffd584`f470fc01 : 00000000`00000000 00000000`00000030 ffffd584`f14c9c30 ffffd584`f4eb1870 : 0xffffd584`f14c9c30
ffffe587`dd81ab70 00000000`00000000 : 00000000`00000030 ffffd584`f14c9c30 ffffd584`f4eb1870 ffffd584`f4ecef58 : 0xffffd584`f470fc01
SYMBOL_NAME: L1C60x64+6bc3
MODULE_NAME: L1C60x64
IMAGE_NAME: L1C60x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6bc3
FAILURE_BUCKET_ID: AV_L1C60x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1d03ffd4-c719-b38a-bf4c-7f61eaa39750}
Followup: MachineOwner