1mpossibl3
Femtopat
- Katılım
- 5 Haziran 2023
- Mesajlar
- 9
Daha fazla
- Cinsiyet
- Erkek
x.zip MiniDump dosyasını bu linke ekledim. İnceleyip bilgi verirseniz sevinirim.Masaüstüne kopyalayıp açabiliyor musunuz?
Orijinal dosyayı paylaşın.
Minidump Dosyalarını Paylaşın
23.06.2025 tarihinde yapılan güncel rehbere aşağıdaki linkten erişebilirsiniz: https://www.technopat.net/sosyal/konu/minidump-nedir-nasil-paylasilir.3817531/ Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi...www.technopat.net
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd497347ecd84, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80072cb32d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1562
Key : Analysis.Elapsed.mSec
Value: 3328
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 6994
Key : Analysis.Memory.CommitPeak.Mb
Value: 153
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffd497347ecd84
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80072cb32d2
FILE_IN_CAB: 061323-14671-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8003631c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd497347ecd84
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SSJJ_BattleCli
DPC_STACK_BASE: FFFFF80039508FB0
TRAP_FRAME: fffff80039508470 -- (.trap 0xfffff80039508470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd48dc5347d80 rbx=0000000000000000 rcx=ffffd48dc5347d80
rdx=000000096f4a5004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80072cb32d2 rsp=fffff80039508608 rbp=fffff80039508680
r8=00000000000000c0 r9=0000000000000038 r10=ffffd48dbb1fb000
r11=ffffd497347ece44 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff800`72cb32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffd497`347ecd84=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff800`39508328 fffff800`35a40fa9 : 00000000`0000000a ffffd497`347ecd84 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`39508330 fffff800`35a3c634 : ffffd48d`bad7a6e8 00000000`00000000 ffffd48d`bad7a180 fffff800`508c2ac2 : nt!KiBugCheckDispatch+0x69
fffff800`39508470 fffff800`72cb32d2 : fffff800`72cb5b5d 00000000`8a687f4c fffff800`39508680 ffffd48d`c6d45280 : nt!KiPageFault+0x474
fffff800`39508608 fffff800`72cb5b5d : 00000000`8a687f4c fffff800`39508680 ffffd48d`c6d45280 fffff800`72c72d5c : kbdclass!memcpy+0x92
fffff800`39508610 fffff800`72ca1511 : ffffd48d`bb0aa3a0 fffff800`395087d8 ffffd48d`beae9310 fffff800`395087d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`395086b0 ffffd48d`bb0aa3a0 : fffff800`395087d8 ffffd48d`beae9310 fffff800`395087d8 00000000`00000008 : HKKbdFltr+0x1511
fffff800`395086b8 fffff800`395087d8 : ffffd48d`beae9310 fffff800`395087d8 00000000`00000008 fffff800`39508730 : 0xffffd48d`bb0aa3a0
fffff800`395086c0 ffffd48d`beae9310 : fffff800`395087d8 00000000`00000008 fffff800`39508730 ffffd48d`bb0aa250 : 0xfffff800`395087d8
fffff800`395086c8 fffff800`395087d8 : 00000000`00000008 fffff800`39508730 ffffd48d`bb0aa250 fffff800`72ca13f0 : 0xffffd48d`beae9310
fffff800`395086d0 00000000`00000008 : fffff800`39508730 ffffd48d`bb0aa250 fffff800`72ca13f0 fffff800`319b0180 : 0xfffff800`395087d8
fffff800`395086d8 fffff800`39508730 : ffffd48d`bb0aa250 fffff800`72ca13f0 fffff800`319b0180 fffff800`72c7b848 : 0x8
fffff800`395086e0 ffffd48d`bb0aa250 : fffff800`72ca13f0 fffff800`319b0180 fffff800`72c7b848 ffffd48d`bb0aa3a0 : 0xfffff800`39508730
fffff800`395086e8 fffff800`72ca13f0 : fffff800`319b0180 fffff800`72c7b848 ffffd48d`bb0aa3a0 fffff800`39508769 : 0xffffd48d`bb0aa250
fffff800`395086f0 fffff800`319b0180 : fffff800`72c7b848 ffffd48d`bb0aa3a0 fffff800`39508769 ffffd48d`bb18e9c0 : HKKbdFltr+0x13f0
fffff800`395086f8 fffff800`72c7b848 : ffffd48d`bb0aa3a0 fffff800`39508769 ffffd48d`bb18e9c0 fffff800`72c80258 : 0xfffff800`319b0180
fffff800`39508700 fffff800`3582a1da : 00000000`00000000 ffffd48d`00000010 00000000`00000000 ffffc381`e7bd26f0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`395087d0 fffff800`358299e4 : 00000000`00000022 ffffd48d`cad09080 fffff800`39508e20 00000000`0028875e : nt!KiExecuteAllDpcs+0x54a
fffff800`39508d20 fffff800`35a34d65 : 00000000`00000000 00000000`00000000 ffffd48d`ca6e3080 00000000`0000078c : nt!KiRetireDpcList+0xfe4
fffff800`39508fb0 fffff800`35a34d0f : ffff918b`ef12f349 fffff800`3582c0c9 00000000`00000001 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff918b`ef12f2b0 fffff800`3582c0c9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn
ffff918b`ef12f2c0 fffff800`35a344db : 00000000`00000000 ffffd48d`c76ce760 00000000`00000000 00000000`1053f7c8 : nt!KiDispatchInterrupt+0xd9
ffff918b`ef12f3b0 fffff800`35a2db11 : 00000000`00000001 00000000`1b20b9e0 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff918b`ef12f3e0 00000000`77751cef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`0ffce9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77751cef
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Control Center güncellemesini yaptım ama geçen gün tekrar mavi ekran aldım. Hatta Control Center'in açılmaması gibi bir sorunla karşılaştığım için tekrar yükledim. Sürekli hatayı aynı oyunda alıyorum birde başka hiçbir yerde mavi ekran çıkmıyor.Bazı Monster laptoplarda sıkça karşılaşılan bir hatayı almışsınız.
Çözümü Monster araçlarını (Control Center vs.) Sistemden tamamen kaldırmak.
Ama yeni güncelleme ile şansınızı denemek istiyorsanız Control Center'a 23.03.2023'te gelmiş olan güncellemeyi kurup deneyebilirsiniz. Eski Control Center'ı silin, PC'yi yeniden başlatın ve bunu yükleyin.
Yine kbdclass.sys mavi ekran hatası alırsanız Monster ile alakalı tüm araçları kaldırın. Klavye, Control Center vs. hepsini silin. Çözümü bu kadar. Hataları giderilmiş bir program yayınlanana kadar bekleyin.
Konu ile alakalı detaylı bilgi edinmek isterseniz aşağıdaki konuda bulunan mesajları inceleyebilirsiniz. NVIDIA sürücüsü kısmına takılmayın, o durum konudaki arkadaşın sistemine özgüydü. Ancak gerisi benzer.
Çözüldü: Abra A5 v16.6 laptop mavi ekran veriyor
Sistem modeli; Abra A5 v16.6. İki gün üst üste War Thunder oynarken mavi ekran hatası yedim. Laptopu iki yıldan beri kullanıyorum daha önce sıkıntı yaşamadım. https://drive.google.com/file/d/1tvcLLQTqt-l-0J25Ned2LgVOkZJRt47-/view?usp=sharingwww.technopat.net
Döküm:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffd497347ecd84, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff80072cb32d2, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1562 Key : Analysis.Elapsed.mSec Value: 3328 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 202 Key : Analysis.Init.Elapsed.mSec Value: 6994 Key : Analysis.Memory.CommitPeak.Mb Value: 153 Key : Bugcheck.Code.LegacyAPI Value: 0xd1 Key : Dump.Attributes.AsUlong Value: 1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_kbdclass!memcpy Key : Failure.Hash Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Key : Hypervisor.Enlightenments.ValueHex Value: 1417df84 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 21631230 Key : Hypervisor.Flags.ValueHex Value: 14a10fe Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 BUGCHECK_CODE: d1 BUGCHECK_P1: ffffd497347ecd84 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80072cb32d2 FILE_IN_CAB: 061323-14671-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage Dump READ_ADDRESS: fffff8003631c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffd497347ecd84 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: SSJJ_BattleCli DPC_STACK_BASE: FFFFF80039508FB0 TRAP_FRAME: fffff80039508470 -- (.trap 0xfffff80039508470) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffd48dc5347d80 rbx=0000000000000000 rcx=ffffd48dc5347d80 rdx=000000096f4a5004 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80072cb32d2 rsp=fffff80039508608 rbp=fffff80039508680 r8=00000000000000c0 r9=0000000000000038 r10=ffffd48dbb1fb000 r11=ffffd497347ece44 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc kbdclass!memcpy+0x92: fffff800`72cb32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffd497`347ecd84=???????????????????????????????? Resetting default scope STACK_TEXT: fffff800`39508328 fffff800`35a40fa9 : 00000000`0000000a ffffd497`347ecd84 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`39508330 fffff800`35a3c634 : ffffd48d`bad7a6e8 00000000`00000000 ffffd48d`bad7a180 fffff800`508c2ac2 : nt!KiBugCheckDispatch+0x69 fffff800`39508470 fffff800`72cb32d2 : fffff800`72cb5b5d 00000000`8a687f4c fffff800`39508680 ffffd48d`c6d45280 : nt!KiPageFault+0x474 fffff800`39508608 fffff800`72cb5b5d : 00000000`8a687f4c fffff800`39508680 ffffd48d`c6d45280 fffff800`72c72d5c : kbdclass!memcpy+0x92 fffff800`39508610 fffff800`72ca1511 : ffffd48d`bb0aa3a0 fffff800`395087d8 ffffd48d`beae9310 fffff800`395087d8 : kbdclass!KeyboardClassServiceCallback+0x16d fffff800`395086b0 ffffd48d`bb0aa3a0 : fffff800`395087d8 ffffd48d`beae9310 fffff800`395087d8 00000000`00000008 : HKKbdFltr+0x1511 fffff800`395086b8 fffff800`395087d8 : ffffd48d`beae9310 fffff800`395087d8 00000000`00000008 fffff800`39508730 : 0xffffd48d`bb0aa3a0 fffff800`395086c0 ffffd48d`beae9310 : fffff800`395087d8 00000000`00000008 fffff800`39508730 ffffd48d`bb0aa250 : 0xfffff800`395087d8 fffff800`395086c8 fffff800`395087d8 : 00000000`00000008 fffff800`39508730 ffffd48d`bb0aa250 fffff800`72ca13f0 : 0xffffd48d`beae9310 fffff800`395086d0 00000000`00000008 : fffff800`39508730 ffffd48d`bb0aa250 fffff800`72ca13f0 fffff800`319b0180 : 0xfffff800`395087d8 fffff800`395086d8 fffff800`39508730 : ffffd48d`bb0aa250 fffff800`72ca13f0 fffff800`319b0180 fffff800`72c7b848 : 0x8 fffff800`395086e0 ffffd48d`bb0aa250 : fffff800`72ca13f0 fffff800`319b0180 fffff800`72c7b848 ffffd48d`bb0aa3a0 : 0xfffff800`39508730 fffff800`395086e8 fffff800`72ca13f0 : fffff800`319b0180 fffff800`72c7b848 ffffd48d`bb0aa3a0 fffff800`39508769 : 0xffffd48d`bb0aa250 fffff800`395086f0 fffff800`319b0180 : fffff800`72c7b848 ffffd48d`bb0aa3a0 fffff800`39508769 ffffd48d`bb18e9c0 : HKKbdFltr+0x13f0 fffff800`395086f8 fffff800`72c7b848 : ffffd48d`bb0aa3a0 fffff800`39508769 ffffd48d`bb18e9c0 fffff800`72c80258 : 0xfffff800`319b0180 fffff800`39508700 fffff800`3582a1da : 00000000`00000000 ffffd48d`00000010 00000000`00000000 ffffc381`e7bd26f0 : i8042prt!I8042KeyboardIsrDpc+0x1a8 fffff800`395087d0 fffff800`358299e4 : 00000000`00000022 ffffd48d`cad09080 fffff800`39508e20 00000000`0028875e : nt!KiExecuteAllDpcs+0x54a fffff800`39508d20 fffff800`35a34d65 : 00000000`00000000 00000000`00000000 ffffd48d`ca6e3080 00000000`0000078c : nt!KiRetireDpcList+0xfe4 fffff800`39508fb0 fffff800`35a34d0f : ffff918b`ef12f349 fffff800`3582c0c9 00000000`00000001 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5 ffff918b`ef12f2b0 fffff800`3582c0c9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn ffff918b`ef12f2c0 fffff800`35a344db : 00000000`00000000 ffffd48d`c76ce760 00000000`00000000 00000000`1053f7c8 : nt!KiDispatchInterrupt+0xd9 ffff918b`ef12f3b0 fffff800`35a2db11 : 00000000`00000001 00000000`1b20b9e0 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b ffff918b`ef12f3e0 00000000`77751cef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1 00000000`0ffce9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77751cef SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.22621.601 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.