- RAM
- 16GB
- SSD veya HDD modeli
- 1TB
- Ekran kartı
- GTX 1650
- İşlemci
- İ5-11400H
Minidump.rar

kbdclass.sys
sürücüsü ile alakalı hata alıyorsunuz.*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff841801628d0c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80341d532d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 984
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4228
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 9167
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092922-14531-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff841801628d0c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80341d532d2
READ_ADDRESS: fffff8030691c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff841801628d0c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8030ae0d9e0 -- (.trap 0xfffff8030ae0d9e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff840ec3ef6e40 rbx=0000000000000000 rcx=ffff840ec3ef6e40
rdx=000000093d731ecc rsi=0000000000000000 rdi=0000000000000000
rip=fffff80341d532d2 rsp=fffff8030ae0db78 rbp=fffff8030ae0dbf0
r8=00000000000000c0 r9=0000000000000038 r10=ffff840ebb0fc000
r11=ffff841801628dcc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff803`41d532d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8418`01628d0c=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff803`0ae0d898 fffff803`06033fa9 : 00000000`0000000a ffff8418`01628d0c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`0ae0d8a0 fffff803`0602fee8 : 00000000`000024dc 000000d3`0dfd1ce9 000000d3`0cb98016 000000d3`0cb7314b : nt!KiBugCheckDispatch+0x69
fffff803`0ae0d9e0 fffff803`41d532d2 : fffff803`41d55b5d 00000000`ba640114 fffff803`0ae0dbf0 ffff840e`cacedaa0 : nt!KiPageFault+0x468
fffff803`0ae0db78 fffff803`41d55b5d : 00000000`ba640114 fffff803`0ae0dbf0 ffff840e`cacedaa0 fffff803`41d12d5c : kbdclass!memcpy+0x92
fffff803`0ae0db80 fffff803`41d41511 : ffff840e`ba336190 fffff803`0ae0dd48 ffff840e`bb0c7310 fffff803`0ae0dd48 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`0ae0dc20 ffff840e`ba336190 : fffff803`0ae0dd48 ffff840e`bb0c7310 fffff803`0ae0dd48 00000000`00000008 : HKKbdFltr+0x1511
fffff803`0ae0dc28 fffff803`0ae0dd48 : ffff840e`bb0c7310 fffff803`0ae0dd48 00000000`00000008 fffff803`0ae0dca0 : 0xffff840e`ba336190
fffff803`0ae0dc30 ffff840e`bb0c7310 : fffff803`0ae0dd48 00000000`00000008 fffff803`0ae0dca0 ffff840e`ba336040 : 0xfffff803`0ae0dd48
fffff803`0ae0dc38 fffff803`0ae0dd48 : 00000000`00000008 fffff803`0ae0dca0 ffff840e`ba336040 fffff803`41d413f0 : 0xffff840e`bb0c7310
fffff803`0ae0dc40 00000000`00000008 : fffff803`0ae0dca0 ffff840e`ba336040 fffff803`41d413f0 fffff803`026a2180 : 0xfffff803`0ae0dd48
fffff803`0ae0dc48 fffff803`0ae0dca0 : ffff840e`ba336040 fffff803`41d413f0 fffff803`026a2180 fffff803`41d1b848 : 0x8
fffff803`0ae0dc50 ffff840e`ba336040 : fffff803`41d413f0 fffff803`026a2180 fffff803`41d1b848 ffff840e`ba336190 : 0xfffff803`0ae0dca0
fffff803`0ae0dc58 fffff803`41d413f0 : fffff803`026a2180 fffff803`41d1b848 ffff840e`ba336190 fffff803`0ae0dcd9 : 0xffff840e`ba336040
fffff803`0ae0dc60 fffff803`026a2180 : fffff803`41d1b848 ffff840e`ba336190 fffff803`0ae0dcd9 ffff840e`bb01ad70 : HKKbdFltr+0x13f0
fffff803`0ae0dc68 fffff803`41d1b848 : ffff840e`ba336190 fffff803`0ae0dcd9 ffff840e`bb01ad70 fffff803`41d20258 : 0xfffff803`026a2180
fffff803`0ae0dc70 fffff803`05e81e5a : 00000000`00000000 ffff840e`00000010 00000000`00000000 ffffe681`3173d5b0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff803`0ae0dd40 fffff803`05e80ea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x51a
fffff803`0ae0e290 fffff803`06024f6e : 00000000`00000000 fffff803`026a2180 fffff803`0694c6c0 ffff840e`c33b9480 : nt!KiRetireDpcList+0x1b4
fffff803`0ae0e540 00000000`00000000 : fffff803`0ae0f000 fffff803`0ae08000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
kbdclass.sys
sürücüsü ile alakalı hata alıyorsunuz.*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff841801628d0c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80341d532d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 984
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4228
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 9167
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092922-14531-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff841801628d0c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80341d532d2
READ_ADDRESS: fffff8030691c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff841801628d0c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8030ae0d9e0 -- (.trap 0xfffff8030ae0d9e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff840ec3ef6e40 rbx=0000000000000000 rcx=ffff840ec3ef6e40
rdx=000000093d731ecc rsi=0000000000000000 rdi=0000000000000000
rip=fffff80341d532d2 rsp=fffff8030ae0db78 rbp=fffff8030ae0dbf0
r8=00000000000000c0 r9=0000000000000038 r10=ffff840ebb0fc000
r11=ffff841801628dcc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff803`41d532d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8418`01628d0c=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff803`0ae0d898 fffff803`06033fa9 : 00000000`0000000a ffff8418`01628d0c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`0ae0d8a0 fffff803`0602fee8 : 00000000`000024dc 000000d3`0dfd1ce9 000000d3`0cb98016 000000d3`0cb7314b : nt!KiBugCheckDispatch+0x69
fffff803`0ae0d9e0 fffff803`41d532d2 : fffff803`41d55b5d 00000000`ba640114 fffff803`0ae0dbf0 ffff840e`cacedaa0 : nt!KiPageFault+0x468
fffff803`0ae0db78 fffff803`41d55b5d : 00000000`ba640114 fffff803`0ae0dbf0 ffff840e`cacedaa0 fffff803`41d12d5c : kbdclass!memcpy+0x92
fffff803`0ae0db80 fffff803`41d41511 : ffff840e`ba336190 fffff803`0ae0dd48 ffff840e`bb0c7310 fffff803`0ae0dd48 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`0ae0dc20 ffff840e`ba336190 : fffff803`0ae0dd48 ffff840e`bb0c7310 fffff803`0ae0dd48 00000000`00000008 : HKKbdFltr+0x1511
fffff803`0ae0dc28 fffff803`0ae0dd48 : ffff840e`bb0c7310 fffff803`0ae0dd48 00000000`00000008 fffff803`0ae0dca0 : 0xffff840e`ba336190
fffff803`0ae0dc30 ffff840e`bb0c7310 : fffff803`0ae0dd48 00000000`00000008 fffff803`0ae0dca0 ffff840e`ba336040 : 0xfffff803`0ae0dd48
fffff803`0ae0dc38 fffff803`0ae0dd48 : 00000000`00000008 fffff803`0ae0dca0 ffff840e`ba336040 fffff803`41d413f0 : 0xffff840e`bb0c7310
fffff803`0ae0dc40 00000000`00000008 : fffff803`0ae0dca0 ffff840e`ba336040 fffff803`41d413f0 fffff803`026a2180 : 0xfffff803`0ae0dd48
fffff803`0ae0dc48 fffff803`0ae0dca0 : ffff840e`ba336040 fffff803`41d413f0 fffff803`026a2180 fffff803`41d1b848 : 0x8
fffff803`0ae0dc50 ffff840e`ba336040 : fffff803`41d413f0 fffff803`026a2180 fffff803`41d1b848 ffff840e`ba336190 : 0xfffff803`0ae0dca0
fffff803`0ae0dc58 fffff803`41d413f0 : fffff803`026a2180 fffff803`41d1b848 ffff840e`ba336190 fffff803`0ae0dcd9 : 0xffff840e`ba336040
fffff803`0ae0dc60 fffff803`026a2180 : fffff803`41d1b848 ffff840e`ba336190 fffff803`0ae0dcd9 ffff840e`bb01ad70 : HKKbdFltr+0x13f0
fffff803`0ae0dc68 fffff803`41d1b848 : ffff840e`ba336190 fffff803`0ae0dcd9 ffff840e`bb01ad70 fffff803`41d20258 : 0xfffff803`026a2180
fffff803`0ae0dc70 fffff803`05e81e5a : 00000000`00000000 ffff840e`00000010 00000000`00000000 ffffe681`3173d5b0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff803`0ae0dd40 fffff803`05e80ea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x51a
fffff803`0ae0e290 fffff803`06024f6e : 00000000`00000000 fffff803`026a2180 fffff803`0694c6c0 ffff840e`c33b9480 : nt!KiRetireDpcList+0x1b4
fffff803`0ae0e540 00000000`00000000 : fffff803`0ae0f000 fffff803`0ae08000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Monster laptoplardaki meşhurkbdclass.sys
sürücüsü ile alakalı hata alıyorsunuz.
Aşağıdaki konuda Abra v17.1 modelinde de sizinkine çok benzer bir mavi ekran için çözüm önerilmiş. Konu sahibinin sorunu çözülmüş ama o çözüm mesajının biraz aşağısında da başkası farklı bir modelde aynı çözümü denerken sorun yaşamış. Deneyip denememek size kalmış yani. Ama o deneyip de farklı sonuç alan arkadaşın laptop modeli A5 v16.4 olması lazım. Sizinki Abra A7 v12.5. illaki deneyin demiyorum ama bu şekilde çözülme olasılığı var.
Çözüldü: Monster Abra V17.1 kbdclass.sys mavi ekran hatası
Şu ana kadar iki kere oldu ikisi de LoL oynarken oldu. Bilgisayarı 2 ay önce aldım. Sürücüleri aldıktan hemen sonra kurdum/güncelleştirdim. dmp dosya linki : dmp.rar Monster Abra V17.1, Windows 11 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely...www.technopat.net
Döküm:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffff841801628d0c, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff80341d532d2, address which referenced memory. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 984. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 4228. Key : Analysis.Init.CPU.mSec Value: 171. Key : Analysis.Init.Elapsed.mSec Value: 9167. Key : Analysis.Memory.CommitPeak.Mb Value: 134. Key : Bugcheck.Code.DumpHeader Value: 0xd1. Key : Bugcheck.Code.Register Value: 0xa. Key : Dump.Attributes.AsUlong Value: 1808. Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 092922-14531-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b. DUMP_FILE_ATTRIBUTES: 0x1808. Kernel Generated Triage Dump. BUGCHECK_CODE: d1. BUGCHECK_P1: ffff841801628d0c. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80341d532d2. READ_ADDRESS: fffff8030691c468: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse ffff841801628d0c. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. TRAP_FRAME: fffff8030ae0d9e0 -- (.trap 0xfffff8030ae0d9e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff840ec3ef6e40 rbx=0000000000000000 rcx=ffff840ec3ef6e40 rdx=000000093d731ecc rsi=0000000000000000 rdi=0000000000000000 rip=fffff80341d532d2 rsp=fffff8030ae0db78 rbp=fffff8030ae0dbf0 r8=00000000000000c0 r9=0000000000000038 r10=ffff840ebb0fc000 r11=ffff841801628dcc r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc. kbdclass!memcpy+0x92: fffff803`41d532d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8418`01628d0c=???????????????????????????????? Resetting default scope. STACK_TEXT: fffff803`0ae0d898 fffff803`06033fa9 : 00000000`0000000a ffff8418`01628d0c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff803`0ae0d8a0 fffff803`0602fee8 : 00000000`000024dc 000000d3`0dfd1ce9 000000d3`0cb98016 000000d3`0cb7314b : nt!KiBugCheckDispatch+0x69 fffff803`0ae0d9e0 fffff803`41d532d2 : fffff803`41d55b5d 00000000`ba640114 fffff803`0ae0dbf0 ffff840e`cacedaa0 : nt!KiPageFault+0x468 fffff803`0ae0db78 fffff803`41d55b5d : 00000000`ba640114 fffff803`0ae0dbf0 ffff840e`cacedaa0 fffff803`41d12d5c : kbdclass!memcpy+0x92 fffff803`0ae0db80 fffff803`41d41511 : ffff840e`ba336190 fffff803`0ae0dd48 ffff840e`bb0c7310 fffff803`0ae0dd48 : kbdclass!KeyboardClassServiceCallback+0x16d fffff803`0ae0dc20 ffff840e`ba336190 : fffff803`0ae0dd48 ffff840e`bb0c7310 fffff803`0ae0dd48 00000000`00000008 : HKKbdFltr+0x1511 fffff803`0ae0dc28 fffff803`0ae0dd48 : ffff840e`bb0c7310 fffff803`0ae0dd48 00000000`00000008 fffff803`0ae0dca0 : 0xffff840e`ba336190 fffff803`0ae0dc30 ffff840e`bb0c7310 : fffff803`0ae0dd48 00000000`00000008 fffff803`0ae0dca0 ffff840e`ba336040 : 0xfffff803`0ae0dd48 fffff803`0ae0dc38 fffff803`0ae0dd48 : 00000000`00000008 fffff803`0ae0dca0 ffff840e`ba336040 fffff803`41d413f0 : 0xffff840e`bb0c7310 fffff803`0ae0dc40 00000000`00000008 : fffff803`0ae0dca0 ffff840e`ba336040 fffff803`41d413f0 fffff803`026a2180 : 0xfffff803`0ae0dd48 fffff803`0ae0dc48 fffff803`0ae0dca0 : ffff840e`ba336040 fffff803`41d413f0 fffff803`026a2180 fffff803`41d1b848 : 0x8. fffff803`0ae0dc50 ffff840e`ba336040 : fffff803`41d413f0 fffff803`026a2180 fffff803`41d1b848 ffff840e`ba336190 : 0xfffff803`0ae0dca0 fffff803`0ae0dc58 fffff803`41d413f0 : fffff803`026a2180 fffff803`41d1b848 ffff840e`ba336190 fffff803`0ae0dcd9 : 0xffff840e`ba336040 fffff803`0ae0dc60 fffff803`026a2180 : fffff803`41d1b848 ffff840e`ba336190 fffff803`0ae0dcd9 ffff840e`bb01ad70 : HKKbdFltr+0x13f0 fffff803`0ae0dc68 fffff803`41d1b848 : ffff840e`ba336190 fffff803`0ae0dcd9 ffff840e`bb01ad70 fffff803`41d20258 : 0xfffff803`026a2180 fffff803`0ae0dc70 fffff803`05e81e5a : 00000000`00000000 ffff840e`00000010 00000000`00000000 ffffe681`3173d5b0 : i8042prt!I8042KeyboardIsrDpc+0x1a8 fffff803`0ae0dd40 fffff803`05e80ea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x51a fffff803`0ae0e290 fffff803`06024f6e : 00000000`00000000 fffff803`026a2180 fffff803`0694c6c0 ffff840e`c33b9480 : nt!KiRetireDpcList+0x1b4 fffff803`0ae0e540 00000000`00000000 : fffff803`0ae0f000 fffff803`0ae08000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass. IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.22621.601 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 92. FAILURE_BUCKET_ID: AV_kbdclass!memcpy OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner. ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.