IRQL_NOT_LESS_OR_EQUAL Mavi Ekran Hatası

Katılım
14 Ağustos 2010
Mesajlar
79.057
Makaleler
289
Çözümler
2.268
Yer
İstanbul
Daha fazla  
Cinsiyet
Erkek
Profil Kapağı
1522743131
Sorunun ekran kartı sürücüsü veya ekran kartı kaynaklı olduğunu düşünüyorum.

Tavsiyeler:
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80578e3a67e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 88

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80578e3a67e

WRITE_ADDRESS: fffff805798fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057980f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8057980f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  BlackSquadGame.exe

DPC_STACK_BASE:  FFFFF8057F471FB0

TRAP_FRAME:  fffff8057f471a20 -- (.trap 0xfffff8057f471a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001096823de4c0 rbx=0000000000000000 rcx=ffffd98d57257000
rdx=0000109600000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80578e3a67e rsp=fffff8057f471bb0 rbp=fffff8057f471cb0
 r8=0000000000000000  r9=0000000000000000 r10=ffffd98d5f21bf88
r11=fffff8057f471e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`78e3a67e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff805`7f4718d8 fffff805`78fef929 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`7f4718e0 fffff805`78febc29 : ffff9481`919e7e70 ffffd98d`59fc06e8 ffffd98d`5f123000 fffff805`8d01b717 : nt!KiBugCheckDispatch+0x69
fffff805`7f471a20 fffff805`78e3a67e : fffff805`7723c240 ffffd98d`57253000 fffff805`7f471e70 fffff805`00000002 : nt!KiPageFault+0x469
fffff805`7f471bb0 fffff805`78e39984 : fffff805`77239180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee
fffff805`7f471d20 fffff805`78fe4a65 : 00000000`00000000 fffff805`77239180 ffff9481`919e7dc0 00007ff4`6b8ec2e0 : nt!KiRetireDpcList+0x1f4
fffff805`7f471fb0 fffff805`78fe4850 : fffff805`78fd9b10 fffff805`78f16b0a 00000000`00000018 00007ffb`a0627b60 : nt!KxRetireDpcList+0x5
ffffeb80`33236ac0 fffff805`78fe4105 : 00007ff4`6b8ec2e0 fffff805`78fdf591 00007ff4`e8e41810 00000000`0b94c400 : nt!KiDispatchInterruptContinue
ffffeb80`33236af0 fffff805`78fdf591 : 00007ff4`e8e41810 00000000`0b94c400 ffffeb80`00000000 ffffd98d`00000000 : nt!KiDpcInterruptBypass+0x25
ffffeb80`33236b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8012403a67e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 79

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8012403a67e

WRITE_ADDRESS: fffff80124afa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80124a0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80124a0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffdf0181c296d0 -- (.trap 0xffffdf0181c296d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000f0887f8f575 rbx=0000000000000000 rcx=ffffba07e9698000
rdx=00000f0800000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012403a67e rsp=ffffdf0181c29860 rbp=ffffdf0181c29960
 r8=0000000000000000  r9=0000000000000000 r10=ffffba07f1511fa8
r11=ffffdf0181c29b10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`2403a67e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
ffffdf01`81c29588 fffff801`241ef929 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffdf01`81c29590 fffff801`241ebc29 : ffff9180`28f5fe70 ffffba07`ee3d46e8 ffffba07`f14c5000 fffff801`3666b717 : nt!KiBugCheckDispatch+0x69
ffffdf01`81c296d0 fffff801`2403a67e : ffff9180`284a4240 ffffba07`e9653000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
ffffdf01`81c29860 fffff801`24039984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
ffffdf01`81c299d0 fffff801`241e158e : ffffffff`00000000 ffff9180`284a1180 ffff9180`284ac340 ffffba07`f180e280 : nt!KiRetireDpcList+0x1f4
ffffdf01`81c29c60 00000000`00000000 : ffffdf01`81c2a000 ffffdf01`81c24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8005423a67e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 84

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8005423a67e

WRITE_ADDRESS: fffff80054cfa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80054c0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80054c0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80059c6a6d0 -- (.trap 0xfffff80059c6a6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00002cefea91548c rbx=0000000000000000 rcx=ffffb58660857000
rdx=00002cef00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005423a67e rsp=fffff80059c6a860 rbp=fffff80059c6a960
 r8=0000000000000000  r9=0000000000000000 r10=ffffb586695ebe08
r11=fffff80059c6ab10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff800`5423a67e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff800`59c6a588 fffff800`543ef929 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`59c6a590 fffff800`543ebc29 : ffffc700`7b69ed30 ffffb586`664466e8 ffffb586`69743000 fffff800`6beeb717 : nt!KiBugCheckDispatch+0x69
fffff800`59c6a6d0 fffff800`5423a67e : fffff800`51a02240 ffffb586`60853000 fffff800`519ff180 ffffb586`00000002 : nt!KiPageFault+0x469
fffff800`59c6a860 fffff800`54239984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff800`59c6a9d0 fffff800`543e158e : 00000000`00000000 fffff800`519ff180 fffff800`54d26600 ffffb586`6b6812c0 : nt!KiRetireDpcList+0x1f4
fffff800`59c6ac60 00000000`00000000 : fffff800`59c6b000 fffff800`59c65000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8052363a67e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 86

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8052363a67e

WRITE_ADDRESS: fffff805240fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052400f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8052400f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80527c6a6d0 -- (.trap 0xfffff80527c6a6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000aadeb0734c0 rbx=0000000000000000 rcx=ffffe205fcc57000
rdx=00000aad00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052363a67e rsp=fffff80527c6a860 rbp=fffff80527c6a960
 r8=0000000000000000  r9=0000000000000000 r10=ffffe20605ab2f58
r11=fffff80527c6ab10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`2363a67e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff805`27c6a588 fffff805`237ef929 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`27c6a590 fffff805`237ebc29 : ffffc401`8e291d30 ffffe206`00a996e8 ffffe206`05b43000 fffff805`3636b717 : nt!KiBugCheckDispatch+0x69
fffff805`27c6a6d0 fffff805`2363a67e : fffff805`1fb3d240 ffffe205`fcc20000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff805`27c6a860 fffff805`23639984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff805`27c6a9d0 fffff805`237e158e : 00000000`00000000 fffff805`1fb3a180 fffff805`24126600 ffffe206`0a038080 : nt!KiRetireDpcList+0x1f4
fffff805`27c6ac60 00000000`00000000 : fffff805`27c6b000 fffff805`27c65000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8032ca3a67e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 80

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8032ca3a67e

WRITE_ADDRESS: fffff8032d4fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8032d40f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8032d40f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  AMDRSServ.exe

DPC_STACK_BASE:  FFFFF80331A71FB0

TRAP_FRAME:  fffff80331a71a20 -- (.trap 0xfffff80331a71a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000ac73f889c0 rbx=0000000000000000 rcx=ffffde8569e57000
rdx=000000ac00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032ca3a67e rsp=fffff80331a71bb0 rbp=fffff80331a71cb0
 r8=0000000000000000  r9=0000000000000000 r10=ffffde8572cfcf68
r11=fffff80331a71e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff803`2ca3a67e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff803`31a718d8 fffff803`2cbef929 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff803`31a718e0 fffff803`2cbebc29 : ffffa001`fbd9cd30 ffffde85`6dc0a6e8 ffffde85`72d64000 fffff803`4043b717 : nt!KiBugCheckDispatch+0x69
fffff803`31a71a20 fffff803`2ca3a67e : fffff803`29906240 ffffde85`69e53000 fffff803`31a71e70 ffffde85`00000002 : nt!KiPageFault+0x469
fffff803`31a71bb0 fffff803`2ca39984 : fffff803`29903180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee
fffff803`31a71d20 fffff803`2cbe4a65 : 00000000`00000000 fffff803`29903180 ffffa001`fbd9cc80 000000ac`76d3ebf8 : nt!KiRetireDpcList+0x1f4
fffff803`31a71fb0 fffff803`2cbe4850 : fffff803`2cbd9b10 fffff803`2cb16b0a 00000000`00000000 ffffde85`746b4f60 : nt!KxRetireDpcList+0x5
ffff8287`6cabcac0 fffff803`2cbe4105 : 000000ac`76d3ebf8 fffff803`2cbdf591 00000000`00000010 0000021e`5a4893a8 : nt!KiDispatchInterruptContinue
ffff8287`6cabcaf0 fffff803`2cbdf591 : 00000000`00000010 0000021e`5a4893a8 00000000`00000000 00000000`00000001 : nt!KiDpcInterruptBypass+0x25
ffff8287`6cabcb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

Kod:
start             end                 module name
ffffdb8b`e6000000 ffffdb8b`e62e5000   win32kbase \SystemRoot\System32\win32kbase.sys
ffffdb8b`e62f0000 ffffdb8b`e66a5000   win32kfull \SystemRoot\System32\win32kfull.sys
ffffdb8b`e66b0000 ffffdb8b`e66f8000   cdd      \SystemRoot\System32\cdd.dll
ffffdb8b`e6ac0000 ffffdb8b`e6b5a000   win32k   \SystemRoot\System32\win32k.sys
fffff803`2a710000 fffff803`2a738000   mcupdate_AuthenticAMD \SystemRoot\system32\mcupdate_AuthenticAMD.dll
fffff803`2a740000 fffff803`2a746000   hal      hal.dll     
fffff803`2a750000 fffff803`2a75b000   kd       \SystemRoot\system32\kd.dll
fffff803`2a760000 fffff803`2a787000   tm       \SystemRoot\System32\drivers\tm.sys
fffff803`2a790000 fffff803`2a7f9000   CLFS     \SystemRoot\System32\drivers\CLFS.SYS
fffff803`2a800000 fffff803`2a81a000   PSHED    \SystemRoot\system32\PSHED.dll
fffff803`2a820000 fffff803`2a82b000   BOOTVID  \SystemRoot\system32\BOOTVID.dll
fffff803`2a830000 fffff803`2a943000   clipsp   \SystemRoot\System32\drivers\clipsp.sys
fffff803`2a950000 fffff803`2a9bf000   FLTMGR   \SystemRoot\System32\drivers\FLTMGR.SYS
fffff803`2a9c0000 fffff803`2a9eb000   ksecdd   \SystemRoot\System32\drivers\ksecdd.sys
fffff803`2a9f0000 fffff803`2aa52000   msrpc    \SystemRoot\System32\drivers\msrpc.sys
fffff803`2aa60000 fffff803`2aa6e000   cmimcext \SystemRoot\System32\drivers\cmimcext.sys
fffff803`2aa70000 fffff803`2aa81000   werkernel \SystemRoot\System32\drivers\werkernel.sys
fffff803`2aa90000 fffff803`2aa9c000   ntosext  \SystemRoot\System32\drivers\ntosext.sys
fffff803`2aaa0000 fffff803`2aab3000   WDFLDR   \SystemRoot\system32\drivers\WDFLDR.SYS
fffff803`2aac0000 fffff803`2aacf000   SleepStudyHelper \SystemRoot\system32\drivers\SleepStudyHelper.sys
fffff803`2aad0000 fffff803`2aae1000   WppRecorder \SystemRoot\system32\drivers\WppRecorder.sys
fffff803`2aaf0000 fffff803`2ab0a000   SgrmAgent \SystemRoot\system32\drivers\SgrmAgent.sys
fffff803`2c800000 fffff803`2d846000   nt       ntkrnlmp.exe
fffff803`30000000 fffff803`300e1000   CI       \SystemRoot\system32\CI.dll
fffff803`300f0000 fffff803`301a7000   cng      \SystemRoot\System32\drivers\cng.sys
fffff803`301b0000 fffff803`30281000   Wdf01000 \SystemRoot\system32\drivers\Wdf01000.sys
fffff803`30290000 fffff803`302b6000   acpiex   \SystemRoot\System32\Drivers\acpiex.sys
fffff803`302c0000 fffff803`3038c000   ACPI     \SystemRoot\System32\drivers\ACPI.sys
fffff803`30390000 fffff803`3039c000   WMILIB   \SystemRoot\System32\drivers\WMILIB.SYS
fffff803`303c0000 fffff803`30425000   intelpep \SystemRoot\System32\drivers\intelpep.sys
fffff803`30430000 fffff803`30447000   WindowsTrustedRT \SystemRoot\system32\drivers\WindowsTrustedRT.sys
fffff803`30450000 fffff803`3045b000   IntelTA  \SystemRoot\System32\drivers\IntelTA.sys
fffff803`30460000 fffff803`3046b000   WindowsTrustedRTProxy \SystemRoot\System32\drivers\WindowsTrustedRTProxy.sys
fffff803`30470000 fffff803`30484000   pcw      \SystemRoot\System32\drivers\pcw.sys
fffff803`30490000 fffff803`3049b000   msisadrv \SystemRoot\System32\drivers\msisadrv.sys
fffff803`304a0000 fffff803`30516000   pci      \SystemRoot\System32\drivers\pci.sys
fffff803`30520000 fffff803`30535000   vdrvroot \SystemRoot\System32\drivers\vdrvroot.sys
fffff803`30540000 fffff803`30556000   amdkmpfd \SystemRoot\System32\drivers\amdkmpfd.sys
fffff803`30560000 fffff803`3058f000   pdc      \SystemRoot\system32\drivers\pdc.sys
fffff803`30590000 fffff803`305a9000   CEA      \SystemRoot\system32\drivers\CEA.sys
fffff803`305b0000 fffff803`305e1000   partmgr  \SystemRoot\System32\drivers\partmgr.sys
fffff803`305f0000 fffff803`3069b000   spaceport \SystemRoot\System32\drivers\spaceport.sys
fffff803`306a0000 fffff803`306b9000   volmgr   \SystemRoot\System32\drivers\volmgr.sys
fffff803`306c0000 fffff803`30723000   volmgrx  \SystemRoot\System32\drivers\volmgrx.sys
fffff803`30730000 fffff803`3074e000   mountmgr \SystemRoot\System32\drivers\mountmgr.sys
fffff803`30750000 fffff803`30782000   storahci \SystemRoot\System32\drivers\storahci.sys
fffff803`307b0000 fffff803`307ca000   fileinfo \SystemRoot\System32\drivers\fileinfo.sys
fffff803`307d0000 fffff803`307dd000   Fs_Rec   \SystemRoot\System32\Drivers\Fs_Rec.sys
fffff803`307e0000 fffff803`307eb000   volume   \SystemRoot\System32\drivers\volume.sys
fffff803`30800000 fffff803`308b0000   storport \SystemRoot\System32\drivers\storport.sys
fffff803`308c0000 fffff803`30900000   Wof      \SystemRoot\System32\Drivers\Wof.sys
fffff803`30910000 fffff803`30977000   WdFilter \SystemRoot\system32\drivers\wd\WdFilter.sys
fffff803`30980000 fffff803`30c59000   Ntfs     \SystemRoot\System32\Drivers\Ntfs.sys
fffff803`30c60000 fffff803`30dcf000   ndis     \SystemRoot\system32\drivers\ndis.sys
fffff803`30dd0000 fffff803`30e68000   NETIO    \SystemRoot\system32\drivers\NETIO.SYS
fffff803`30e70000 fffff803`30ea2000   ksecpkg  \SystemRoot\System32\Drivers\ksecpkg.sys
fffff803`30eb0000 fffff803`30ed2000   amdpsp   \SystemRoot\System32\drivers\amdpsp.sys
fffff803`30ee0000 fffff803`311cc000   tcpip    \SystemRoot\System32\drivers\tcpip.sys
fffff803`311d0000 fffff803`3124f000   fwpkclnt \SystemRoot\System32\drivers\fwpkclnt.sys
fffff803`31250000 fffff803`31280000   wfplwfs  \SystemRoot\System32\drivers\wfplwfs.sys
fffff803`31290000 fffff803`31359000   fvevol   \SystemRoot\System32\DRIVERS\fvevol.sys
fffff803`31360000 fffff803`313cd000   volsnap  \SystemRoot\System32\drivers\volsnap.sys
fffff803`313d0000 fffff803`31420000   rdyboost \SystemRoot\System32\drivers\rdyboost.sys
fffff803`31430000 fffff803`31456000   mup      \SystemRoot\System32\Drivers\mup.sys
fffff803`31460000 fffff803`31472000   iorate   \SystemRoot\system32\drivers\iorate.sys
fffff803`31480000 fffff803`3149c000   disk     \SystemRoot\System32\drivers\disk.sys
fffff803`314a0000 fffff803`3150c000   CLASSPNP \SystemRoot\System32\drivers\CLASSPNP.SYS
fffff803`39a00000 fffff803`39a1e000   crashdmp \SystemRoot\System32\Drivers\crashdmp.sys
fffff803`39a20000 fffff803`39a72000   srvnet   \SystemRoot\System32\DRIVERS\srvnet.sys
fffff803`3a110000 fffff803`3a140000   cdrom    \SystemRoot\System32\drivers\cdrom.sys
fffff803`3a150000 fffff803`3a165000   filecrypt \SystemRoot\system32\drivers\filecrypt.sys
fffff803`3a170000 fffff803`3a17e000   tbs      \SystemRoot\system32\drivers\tbs.sys
fffff803`3a180000 fffff803`3a18a000   Null     \SystemRoot\System32\Drivers\Null.SYS
fffff803`3a190000 fffff803`3a19a000   Beep     \SystemRoot\System32\Drivers\Beep.SYS
fffff803`3a1a0000 fffff803`3a544000   dxgkrnl  \SystemRoot\System32\drivers\dxgkrnl.sys
fffff803`3a550000 fffff803`3a568000   watchdog \SystemRoot\System32\drivers\watchdog.sys
fffff803`3a570000 fffff803`3a586000   BasicDisplay \SystemRoot\System32\DriverStore\FileRepository\basicdisplay.inf_amd64_62ba5773ba05edee\BasicDisplay.sys
fffff803`3a590000 fffff803`3a5a1000   BasicRender \SystemRoot\System32\DriverStore\FileRepository\basicrender.inf_amd64_49a8589f00d970d9\BasicRender.sys
fffff803`3a5b0000 fffff803`3a5cc000   Npfs     \SystemRoot\System32\Drivers\Npfs.SYS
fffff803`3a5d0000 fffff803`3a5e1000   Msfs     \SystemRoot\System32\Drivers\Msfs.SYS
fffff803`3a5f0000 fffff803`3a60b000   CimFS    \SystemRoot\System32\Drivers\CimFS.SYS
fffff803`3a610000 fffff803`3a632000   tdx      \SystemRoot\system32\DRIVERS\tdx.sys
fffff803`3a640000 fffff803`3a650000   TDI      \SystemRoot\system32\DRIVERS\TDI.SYS
fffff803`3a660000 fffff803`3a6bc000   netbt    \SystemRoot\System32\DRIVERS\netbt.sys
fffff803`3a6c0000 fffff803`3a6d3000   afunix   \SystemRoot\system32\drivers\afunix.sys
fffff803`3a6e0000 fffff803`3a783000   afd      \SystemRoot\system32\drivers\afd.sys
fffff803`3a790000 fffff803`3a7aa000   vwififlt \SystemRoot\System32\drivers\vwififlt.sys
fffff803`3a7b0000 fffff803`3a7db000   pacer    \SystemRoot\System32\drivers\pacer.sys
fffff803`3a7e0000 fffff803`3a7f4000   ndiscap  \SystemRoot\System32\drivers\ndiscap.sys
fffff803`3a800000 fffff803`3a814000   netbios  \SystemRoot\system32\drivers\netbios.sys
fffff803`3a820000 fffff803`3a8c1000   Vid      \SystemRoot\System32\drivers\Vid.sys
fffff803`3a8d0000 fffff803`3a8f1000   winhvr   \SystemRoot\System32\drivers\winhvr.sys
fffff803`3a900000 fffff803`3a97b000   rdbss    \SystemRoot\system32\DRIVERS\rdbss.sys
fffff803`3a980000 fffff803`3a992000   nsiproxy \SystemRoot\system32\drivers\nsiproxy.sys
fffff803`3a9a0000 fffff803`3a9ae000   npsvctrig \SystemRoot\System32\drivers\npsvctrig.sys
fffff803`3a9b0000 fffff803`3a9c0000   mssmbios \SystemRoot\System32\drivers\mssmbios.sys
fffff803`3aa00000 fffff803`3aa15000   umbus    \SystemRoot\System32\DriverStore\FileRepository\umbus.inf_amd64_b78a9c5b6fd62c27\umbus.sys
fffff803`3aa20000 fffff803`3aa55000   idmwfp   \SystemRoot\system32\DRIVERS\idmwfp.sys
fffff803`3aa70000 fffff803`3aa80000   MpKsl94246423 \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{25A5CADA-FB33-43AD-90F2-3DDBDD5C8D48}\MpKsl94246423.sys
fffff803`3aa90000 fffff803`3aa9a000   gpuenergydrv \SystemRoot\System32\drivers\gpuenergydrv.sys
fffff803`3aaa0000 fffff803`3aacc000   dfsc     \SystemRoot\System32\Drivers\dfsc.sys
fffff803`3aaf0000 fffff803`3ab5c000   fastfat  \SystemRoot\System32\Drivers\fastfat.SYS
fffff803`3ab60000 fffff803`3ab77000   bam      \SystemRoot\system32\drivers\bam.sys
fffff803`3ab80000 fffff803`3abce000   ahcache  \SystemRoot\system32\DRIVERS\ahcache.sys
fffff803`3abd0000 fffff803`3abe2000   CompositeBus \SystemRoot\System32\DriverStore\FileRepository\compositebus.inf_amd64_7500cffa210c6946\CompositeBus.sys
fffff803`3abf0000 fffff803`3abfd000   kdnic    \SystemRoot\System32\drivers\kdnic.sys
fffff803`3ac00000 fffff803`3ad11000   rt640x64 \SystemRoot\System32\drivers\rt640x64.sys
fffff803`3ad20000 fffff803`3adb2000   atikmpag \SystemRoot\System32\DriverStore\FileRepository\u0352369.inf_amd64_275818c45a90b362\B352355\atikmpag.sys
fffff803`3adc0000 fffff803`3ade5000   bowser   \SystemRoot\system32\DRIVERS\bowser.sys
fffff803`3adf0000 fffff803`3ae35000   mrxsmb20 \SystemRoot\system32\DRIVERS\mrxsmb20.sys
fffff803`3ae40000 fffff803`3aed8000   USBXHCI  \SystemRoot\System32\drivers\USBXHCI.SYS
fffff803`3aee0000 fffff803`3af24000   ucx01000 \SystemRoot\system32\drivers\ucx01000.sys
fffff803`3af30000 fffff803`3afc3000   mrxsmb   \SystemRoot\system32\DRIVERS\mrxsmb.sys
fffff803`3f400000 fffff803`3f43b000   amdppm   \SystemRoot\System32\drivers\amdppm.sys
fffff803`3f440000 fffff803`3f44c000   wmiacpi  \SystemRoot\System32\drivers\wmiacpi.sys
fffff803`3f450000 fffff803`3f45a000   amdgpio3 \SystemRoot\System32\drivers\amdgpio3.sys
fffff803`3f460000 fffff803`3f46e000   UEFI     \SystemRoot\System32\DriverStore\FileRepository\uefi.inf_amd64_c1628ffa62c8e54c\UEFI.sys
fffff803`3f470000 fffff803`3f47d000   NdisVirtualBus \SystemRoot\System32\drivers\NdisVirtualBus.sys
fffff803`3f480000 fffff803`3f48c000   swenum   \SystemRoot\System32\DriverStore\FileRepository\swenum.inf_amd64_16a14542b63c02af\swenum.sys
fffff803`3f490000 fffff803`3f49e000   rdpbus   \SystemRoot\System32\drivers\rdpbus.sys
fffff803`3f4a0000 fffff803`3f543000   UsbHub3  \SystemRoot\System32\drivers\UsbHub3.sys
fffff803`3f550000 fffff803`3f55e000   USBD     \SystemRoot\System32\drivers\USBD.SYS
fffff803`3f560000 fffff803`3f57d000   AtihdWT6 \SystemRoot\system32\drivers\AtihdWT6.sys
fffff803`3f580000 fffff803`3f58f000   ksthunk  \SystemRoot\system32\drivers\ksthunk.sys
fffff803`3f590000 fffff803`3fbbc000   RTKVHD64 \SystemRoot\system32\drivers\RTKVHD64.sys
fffff803`3fbc0000 fffff803`3fbe5000   USBSTOR  \SystemRoot\System32\drivers\USBSTOR.SYS
fffff803`3fbf0000 fffff803`3fc24000   usbccgp  \SystemRoot\System32\drivers\usbccgp.sys
fffff803`3fc30000 fffff803`3fc42000   hidusb   \SystemRoot\System32\drivers\hidusb.sys
fffff803`3fc50000 fffff803`3fc8f000   HIDCLASS \SystemRoot\System32\drivers\HIDCLASS.SYS
fffff803`3fc90000 fffff803`3fca3000   HIDPARSE \SystemRoot\System32\drivers\HIDPARSE.SYS
fffff803`3fcb0000 fffff803`3fcc1000   kbdhid   \SystemRoot\System32\drivers\kbdhid.sys
fffff803`3fcd0000 fffff803`3fce4000   kbdclass \SystemRoot\System32\drivers\kbdclass.sys
fffff803`3fcf0000 fffff803`3fd00000   mouhid   \SystemRoot\System32\drivers\mouhid.sys
fffff803`3fd10000 fffff803`3fd23000   mouclass \SystemRoot\System32\drivers\mouclass.sys
fffff803`3fd40000 fffff803`3fd4e000   dump_diskdump \SystemRoot\System32\Drivers\dump_diskdump.sys
fffff803`3fd90000 fffff803`3fdc2000   dump_storahci \SystemRoot\System32\drivers\dump_storahci.sys
fffff803`3fdf0000 fffff803`3fe0d000   dump_dumpfve \SystemRoot\System32\Drivers\dump_dumpfve.sys
fffff803`3fe10000 fffff803`3fef2000   dxgmms2  \SystemRoot\System32\drivers\dxgmms2.sys
fffff803`3ff00000 fffff803`3ff1b000   monitor  \SystemRoot\System32\drivers\monitor.sys
fffff803`3ff20000 fffff803`3ff49000   luafv    \SystemRoot\system32\drivers\luafv.sys
fffff803`3ff50000 fffff803`3ff86000   wcifs    \SystemRoot\system32\drivers\wcifs.sys
fffff803`3ff90000 fffff803`3ffe4000   WUDFRd   \SystemRoot\system32\DRIVERS\WUDFRd.sys
fffff803`3fff0000 fffff803`4006f000   cldflt   \SystemRoot\system32\drivers\cldflt.sys
fffff803`40070000 fffff803`4007e000   WpdUpFltr \SystemRoot\System32\drivers\WpdUpFltr.sys
fffff803`40080000 fffff803`4009a000   storqosflt \SystemRoot\system32\drivers\storqosflt.sys
fffff803`400a0000 fffff803`400c7000   bindflt  \SystemRoot\system32\drivers\bindflt.sys
fffff803`400d0000 fffff803`400e8000   lltdio   \SystemRoot\system32\drivers\lltdio.sys
fffff803`400f0000 fffff803`40108000   mslldp   \SystemRoot\system32\drivers\mslldp.sys
fffff803`40110000 fffff803`4012b000   rspndr   \SystemRoot\system32\drivers\rspndr.sys
fffff803`40130000 fffff803`4014d000   wanarp   \SystemRoot\System32\DRIVERS\wanarp.sys
fffff803`40150000 fffff803`401a6000   msquic   \SystemRoot\system32\drivers\msquic.sys
fffff803`401b0000 fffff803`40336000   HTTP     \SystemRoot\system32\drivers\HTTP.sys
fffff803`40340000 fffff803`44226000   atikmdag \SystemRoot\System32\DriverStore\FileRepository\u0352369.inf_amd64_275818c45a90b362\B352355\atikmdag.sys
fffff803`44230000 fffff803`44255000   HDAudBus \SystemRoot\System32\drivers\HDAudBus.sys
fffff803`44260000 fffff803`442c6000   portcls  \SystemRoot\System32\drivers\portcls.sys
fffff803`442d0000 fffff803`442f1000   drmk     \SystemRoot\System32\drivers\drmk.sys
fffff803`44300000 fffff803`44376000   ks       \SystemRoot\System32\drivers\ks.sys
fffff803`44380000 fffff803`4438a000   AMDPCIDev \SystemRoot\System32\drivers\AMDPCIDev.sys
fffff803`44390000 fffff803`4439c000   amdgpio2 \SystemRoot\System32\drivers\amdgpio2.sys
fffff803`443a0000 fffff803`443d2000   msgpioclx \SystemRoot\System32\Drivers\msgpioclx.sys
fffff803`443e0000 fffff803`443fa000   mpsdrv   \SystemRoot\System32\drivers\mpsdrv.sys
fffff803`78200000 fffff803`782c7000   srv2     \SystemRoot\System32\DRIVERS\srv2.sys
fffff803`782d0000 fffff803`782ed000   NDProxy  \SystemRoot\System32\DRIVERS\NDProxy.sys
fffff803`782f0000 fffff803`78317000   AgileVpn \SystemRoot\System32\drivers\AgileVpn.sys
fffff803`78320000 fffff803`78341000   rasl2tp  \SystemRoot\System32\drivers\rasl2tp.sys
fffff803`78350000 fffff803`78371000   raspptp  \SystemRoot\System32\drivers\raspptp.sys
fffff803`78380000 fffff803`7839c000   raspppoe \SystemRoot\System32\DRIVERS\raspppoe.sys
fffff803`783a0000 fffff803`783af000   ndistapi \SystemRoot\System32\DRIVERS\ndistapi.sys
fffff803`783b0000 fffff803`783ea000   ndiswan  \SystemRoot\System32\drivers\ndiswan.sys
fffff803`783f0000 fffff803`78403000   condrv   \SystemRoot\System32\drivers\condrv.sys
fffff803`78410000 fffff803`78425000   WdNisDrv \SystemRoot\system32\drivers\wd\WdNisDrv.sys
fffff803`78430000 fffff803`7870a000   BEDaisy  \??\C:\Program Files (x86)\Common Files\BattlEye\BEDaisy.sys
fffff803`78710000 fffff803`78720000   MpKslDrv \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{25A5CADA-FB33-43AD-90F2-3DDBDD5C8D48}\MpKslDrv.sys
fffff803`78fb0000 fffff803`79086000   peauth   \SystemRoot\system32\drivers\peauth.sys
fffff803`79090000 fffff803`790a4000   mmcss    \SystemRoot\system32\drivers\mmcss.sys
fffff803`790b0000 fffff803`79102000   mrxsmb10 \SystemRoot\system32\DRIVERS\mrxsmb10.sys
fffff803`79110000 fffff803`79137000   Ndu      \SystemRoot\system32\drivers\Ndu.sys
fffff803`79140000 fffff803`79155000   tcpipreg \SystemRoot\System32\drivers\tcpipreg.sys
fffff803`79160000 fffff803`7917c000   rassstp  \SystemRoot\System32\drivers\rassstp.sys

Unloaded modules:
fffff803`39b00000 fffff803`3a10a000   vgk.sys
fffff803`39a30000 fffff803`39a3f000   dump_storpor
fffff803`39a80000 fffff803`39ab3000   dump_storahc
fffff803`39ae0000 fffff803`39afe000   dump_dumpfve
fffff803`30790000 fffff803`307ad000   EhStorClass.
fffff803`3aad0000 fffff803`3aaec000   dam.sys
fffff803`303a0000 fffff803`303b1000   WdBoot.sys
fffff803`307f0000 fffff803`30800000   hwpolicy.sys
 
IRQL_NOT_LESS_OR_EQUAL genellikle bir sürücünün donanıma erişmesine izin verilmediğinden dolayı ortaya çıkmaktadır. Mesela sistem veya yönetici izni olan herhangi bir program, ekran kartı sürücüsünün ekran kartı ile olan iletişimine engel olursa bu hatayı alırsınız.

IRQL= Interrupt Request Level

Vanguard gibi rezalet Anti-Cheat'lerde bu hatayı almanız mümkündür çünkü Kernel seviyesinde her bir halta karışabilecek yetkisi vardır. Bu konuyu Reddit üzerinde sormuştum, Kernel seviyesinde çalışan sürücü ve program yazan geliştiricilerin hepsi Kernel seviyesinde olan Anti-Cheat yazılımlarına karşı fakat nedense oyuncular bu tarz Anti-Cheat sistemlerine bayılıyor.
Çok güzel anlatmışsın dostum. Son paragraf hariç bildiğim şeylerdi, minidump dosyasını okuduğum konularda da görürsem kaldırtıyordum zaten. Teşekkür ederim bilgilendirmen için.
 
Lm komutunu kullanarak diğer bozuk ya da yüklenemeyen SYS dosyalarını unloaded modules adı altında ki bölümde görebilirsiniz. Bu SYS dosyalarını internette araştırarak hangi yazılıma ait olduğunu öğrenebilirsiniz.
 

Yeni konular

Geri
Yukarı