ensblcn
Kilopat
Daha fazla
- Cinsiyet
- Erkek
- Meslek
- Öğrenci (Uçak gövde-motor)
123020-16062-01.dmp
drive.google.com
CS:GO oyun ortasında oluyor %90.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9f1433c45804, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8066dc42f92, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4499
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17784
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff9f1433c45804
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8066dc42f92
READ_ADDRESS: fffff806510fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8065100f330: Unable to get Flags value from nt!KdVersionBlock
fffff8065100f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9f1433c45804
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff00a6b83f400 -- (.trap 0xfffff00a6b83f400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f0acfbb81c0 rbx=0000000000000000 rcx=ffff9f0acfbb81c0
rdx=000000096408d644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066dc42f92 rsp=fffff00a6b83f598 rbp=fffff00a6b83f610
r8=00000000000000c0 r9=ffff9f0ac6c8a0a8 r10=ffff9f0ac6c8afc0
r11=ffff9f1433c458c4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff806`6dc42f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9f14`33c45804=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff00a`6b83f2b8 fffff806`50807769 : 00000000`0000000a ffff9f14`33c45804 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff00a`6b83f2c0 fffff806`50803a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff00a`6b83f400 fffff806`6dc42f92 : fffff806`6dc456dd 00000000`92d05cbc fffff00a`6b83f610 ffff9f0a`cd82b010 : nt!KiPageFault+0x469
fffff00a`6b83f598 fffff806`6dc456dd : 00000000`92d05cbc fffff00a`6b83f610 ffff9f0a`cd82b010 fffff806`52ab129b : kbdclass!memcpy+0x92
fffff00a`6b83f5a0 fffff806`6dc31511 : ffff9f0a`c67cf190 fffff00a`6b83f768 ffff9f0a`c64c3310 fffff00a`6b83f768 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff00a`6b83f640 ffff9f0a`c67cf190 : fffff00a`6b83f768 ffff9f0a`c64c3310 fffff00a`6b83f768 00000000`00000008 : HKKbdFltr+0x1511
fffff00a`6b83f648 fffff00a`6b83f768 : ffff9f0a`c64c3310 fffff00a`6b83f768 00000000`00000008 fffff00a`6b83f6c0 : 0xffff9f0a`c67cf190
fffff00a`6b83f650 ffff9f0a`c64c3310 : fffff00a`6b83f768 00000000`00000008 fffff00a`6b83f6c0 fffff806`6dc313f0 : 0xfffff00a`6b83f768
fffff00a`6b83f658 fffff00a`6b83f768 : 00000000`00000008 fffff00a`6b83f6c0 fffff806`6dc313f0 ffff9f0a`c67d6dc0 : 0xffff9f0a`c64c3310
fffff00a`6b83f660 00000000`00000008 : fffff00a`6b83f6c0 fffff806`6dc313f0 ffff9f0a`c67d6dc0 00000562`dfb76e9e : 0xfffff00a`6b83f768
fffff00a`6b83f668 fffff00a`6b83f6c0 : fffff806`6dc313f0 ffff9f0a`c67d6dc0 00000562`dfb76e9e fffff806`6dc060db : 0x8
fffff00a`6b83f670 fffff806`6dc313f0 : ffff9f0a`c67d6dc0 00000562`dfb76e9e fffff806`6dc060db ffff9f0a`c67cf190 : 0xfffff00a`6b83f6c0
fffff00a`6b83f678 ffff9f0a`c67d6dc0 : 00000562`dfb76e9e fffff806`6dc060db ffff9f0a`c67cf190 fffff00a`6b83f6f9 : HKKbdFltr+0x13f0
fffff00a`6b83f680 00000562`dfb76e9e : fffff806`6dc060db ffff9f0a`c67cf190 fffff00a`6b83f6f9 fffff00a`6b83fa01 : 0xffff9f0a`c67d6dc0
fffff00a`6b83f688 fffff806`6dc060db : ffff9f0a`c67cf190 fffff00a`6b83f6f9 fffff00a`6b83fa01 fffff806`6dc0f000 : 0x00000562`dfb76e9e
fffff00a`6b83f690 fffff806`5060781e : ffffc380`9cde1240 00000000`00000010 00000000`00000000 fffff00a`6b83fa20 : i8042prt!I8042KeyboardIsrDpc+0x1bb
fffff00a`6b83f760 fffff806`50606b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff00a`6b83f8d0 fffff806`507f92ee : ffffffff`00000000 ffffc380`9cdde180 ffffc380`9cde9240 ffff9f0a`ccc2a080 : nt!KiRetireDpcList+0x1f4
fffff00a`6b83fb60 00000000`00000000 : fffff00a`6b840000 fffff00a`6b839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Garantiye mesaj atmayı deneyebilirsiniz.
İnceleyin derim .15000 TL laptop önerisi
@Saltopat bu arkadaşda 3 markayı kullanmış fanboy. Ama bizim yönden iyi fanboy. Ben her markayı eleştiririm. Yoğun bir MSI kullanıcısıyım ama MSI kusursuz demiyorum mesela. Örnek vermem gerekirse MSI'ın GF63 Thin modelini bana bedava verseler almam. 😂www.technopat.net
Hocam, şu an Memtest yapıyorum.Emin olmamakla birlikte Monster Control Center'ı kaldırmayı deneyebilir misiniz?
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffff9f1433c45804, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8066dc42f92, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4499 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 17784 Key : Analysis.Memory.CommitPeak.Mb Value: 78 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: ffff9f1433c45804 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8066dc42f92 READ_ADDRESS: fffff806510fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8065100f330: Unable to get Flags value from nt!KdVersionBlock fffff8065100f330: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffff9f1433c45804 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff00a6b83f400 -- (.trap 0xfffff00a6b83f400) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff9f0acfbb81c0 rbx=0000000000000000 rcx=ffff9f0acfbb81c0 rdx=000000096408d644 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8066dc42f92 rsp=fffff00a6b83f598 rbp=fffff00a6b83f610 r8=00000000000000c0 r9=ffff9f0ac6c8a0a8 r10=ffff9f0ac6c8afc0 r11=ffff9f1433c458c4 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc kbdclass!memcpy+0x92: fffff806`6dc42f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9f14`33c45804=???????????????????????????????? Resetting default scope STACK_TEXT: fffff00a`6b83f2b8 fffff806`50807769 : 00000000`0000000a ffff9f14`33c45804 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff00a`6b83f2c0 fffff806`50803a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff00a`6b83f400 fffff806`6dc42f92 : fffff806`6dc456dd 00000000`92d05cbc fffff00a`6b83f610 ffff9f0a`cd82b010 : nt!KiPageFault+0x469 fffff00a`6b83f598 fffff806`6dc456dd : 00000000`92d05cbc fffff00a`6b83f610 ffff9f0a`cd82b010 fffff806`52ab129b : kbdclass!memcpy+0x92 fffff00a`6b83f5a0 fffff806`6dc31511 : ffff9f0a`c67cf190 fffff00a`6b83f768 ffff9f0a`c64c3310 fffff00a`6b83f768 : kbdclass!KeyboardClassServiceCallback+0x16d fffff00a`6b83f640 ffff9f0a`c67cf190 : fffff00a`6b83f768 ffff9f0a`c64c3310 fffff00a`6b83f768 00000000`00000008 : HKKbdFltr+0x1511 fffff00a`6b83f648 fffff00a`6b83f768 : ffff9f0a`c64c3310 fffff00a`6b83f768 00000000`00000008 fffff00a`6b83f6c0 : 0xffff9f0a`c67cf190 fffff00a`6b83f650 ffff9f0a`c64c3310 : fffff00a`6b83f768 00000000`00000008 fffff00a`6b83f6c0 fffff806`6dc313f0 : 0xfffff00a`6b83f768 fffff00a`6b83f658 fffff00a`6b83f768 : 00000000`00000008 fffff00a`6b83f6c0 fffff806`6dc313f0 ffff9f0a`c67d6dc0 : 0xffff9f0a`c64c3310 fffff00a`6b83f660 00000000`00000008 : fffff00a`6b83f6c0 fffff806`6dc313f0 ffff9f0a`c67d6dc0 00000562`dfb76e9e : 0xfffff00a`6b83f768 fffff00a`6b83f668 fffff00a`6b83f6c0 : fffff806`6dc313f0 ffff9f0a`c67d6dc0 00000562`dfb76e9e fffff806`6dc060db : 0x8 fffff00a`6b83f670 fffff806`6dc313f0 : ffff9f0a`c67d6dc0 00000562`dfb76e9e fffff806`6dc060db ffff9f0a`c67cf190 : 0xfffff00a`6b83f6c0 fffff00a`6b83f678 ffff9f0a`c67d6dc0 : 00000562`dfb76e9e fffff806`6dc060db ffff9f0a`c67cf190 fffff00a`6b83f6f9 : HKKbdFltr+0x13f0 fffff00a`6b83f680 00000562`dfb76e9e : fffff806`6dc060db ffff9f0a`c67cf190 fffff00a`6b83f6f9 fffff00a`6b83fa01 : 0xffff9f0a`c67d6dc0 fffff00a`6b83f688 fffff806`6dc060db : ffff9f0a`c67cf190 fffff00a`6b83f6f9 fffff00a`6b83fa01 fffff806`6dc0f000 : 0x00000562`dfb76e9e fffff00a`6b83f690 fffff806`5060781e : ffffc380`9cde1240 00000000`00000010 00000000`00000000 fffff00a`6b83fa20 : i8042prt!I8042KeyboardIsrDpc+0x1bb fffff00a`6b83f760 fffff806`50606b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e fffff00a`6b83f8d0 fffff806`507f92ee : ffffffff`00000000 ffffc380`9cdde180 ffffc380`9cde9240 ffff9f0a`ccc2a080 : nt!KiRetireDpcList+0x1f4 fffff00a`6b83fb60 00000000`00000000 : fffff00a`6b840000 fffff00a`6b839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner ---------
RAM'lerle alakalı bir şey göremedim ama siz bilirsiniz. Yapmak istiyorsanız yapın, en azından içiniz rahat eder.Hocam şu an MemTest yapıyorum.
Hocam tek dosya vardı yazılımsaldır inşallah teknik servisin dediği tek şey ormat atınRAM'lerle alakalı bir şey göremedim ama siz bilirsiniz. Yapmak istiyorsanız yapın, en azından içiniz rahat eder.
Bu arada tek bu döküm dosyası mı vardı yoksa başka dosyalar da mı var?
Hocam cc olmazsa pc güç modları kullanılamaz ama başka tavsiyeniz var mıdırEmin olmamakla birlikte Monster Control Center'ı kaldırmayı deneyebilir misiniz?
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffff9f1433c45804, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8066dc42f92, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4499 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 17784 Key : Analysis.Memory.CommitPeak.Mb Value: 78 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: ffff9f1433c45804 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8066dc42f92 READ_ADDRESS: fffff806510fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8065100f330: Unable to get Flags value from nt!KdVersionBlock fffff8065100f330: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffff9f1433c45804 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff00a6b83f400 -- (.trap 0xfffff00a6b83f400) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff9f0acfbb81c0 rbx=0000000000000000 rcx=ffff9f0acfbb81c0 rdx=000000096408d644 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8066dc42f92 rsp=fffff00a6b83f598 rbp=fffff00a6b83f610 r8=00000000000000c0 r9=ffff9f0ac6c8a0a8 r10=ffff9f0ac6c8afc0 r11=ffff9f1433c458c4 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc kbdclass!memcpy+0x92: fffff806`6dc42f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9f14`33c45804=???????????????????????????????? Resetting default scope STACK_TEXT: fffff00a`6b83f2b8 fffff806`50807769 : 00000000`0000000a ffff9f14`33c45804 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff00a`6b83f2c0 fffff806`50803a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff00a`6b83f400 fffff806`6dc42f92 : fffff806`6dc456dd 00000000`92d05cbc fffff00a`6b83f610 ffff9f0a`cd82b010 : nt!KiPageFault+0x469 fffff00a`6b83f598 fffff806`6dc456dd : 00000000`92d05cbc fffff00a`6b83f610 ffff9f0a`cd82b010 fffff806`52ab129b : kbdclass!memcpy+0x92 fffff00a`6b83f5a0 fffff806`6dc31511 : ffff9f0a`c67cf190 fffff00a`6b83f768 ffff9f0a`c64c3310 fffff00a`6b83f768 : kbdclass!KeyboardClassServiceCallback+0x16d fffff00a`6b83f640 ffff9f0a`c67cf190 : fffff00a`6b83f768 ffff9f0a`c64c3310 fffff00a`6b83f768 00000000`00000008 : HKKbdFltr+0x1511 fffff00a`6b83f648 fffff00a`6b83f768 : ffff9f0a`c64c3310 fffff00a`6b83f768 00000000`00000008 fffff00a`6b83f6c0 : 0xffff9f0a`c67cf190 fffff00a`6b83f650 ffff9f0a`c64c3310 : fffff00a`6b83f768 00000000`00000008 fffff00a`6b83f6c0 fffff806`6dc313f0 : 0xfffff00a`6b83f768 fffff00a`6b83f658 fffff00a`6b83f768 : 00000000`00000008 fffff00a`6b83f6c0 fffff806`6dc313f0 ffff9f0a`c67d6dc0 : 0xffff9f0a`c64c3310 fffff00a`6b83f660 00000000`00000008 : fffff00a`6b83f6c0 fffff806`6dc313f0 ffff9f0a`c67d6dc0 00000562`dfb76e9e : 0xfffff00a`6b83f768 fffff00a`6b83f668 fffff00a`6b83f6c0 : fffff806`6dc313f0 ffff9f0a`c67d6dc0 00000562`dfb76e9e fffff806`6dc060db : 0x8 fffff00a`6b83f670 fffff806`6dc313f0 : ffff9f0a`c67d6dc0 00000562`dfb76e9e fffff806`6dc060db ffff9f0a`c67cf190 : 0xfffff00a`6b83f6c0 fffff00a`6b83f678 ffff9f0a`c67d6dc0 : 00000562`dfb76e9e fffff806`6dc060db ffff9f0a`c67cf190 fffff00a`6b83f6f9 : HKKbdFltr+0x13f0 fffff00a`6b83f680 00000562`dfb76e9e : fffff806`6dc060db ffff9f0a`c67cf190 fffff00a`6b83f6f9 fffff00a`6b83fa01 : 0xffff9f0a`c67d6dc0 fffff00a`6b83f688 fffff806`6dc060db : ffff9f0a`c67cf190 fffff00a`6b83f6f9 fffff00a`6b83fa01 fffff806`6dc0f000 : 0x00000562`dfb76e9e fffff00a`6b83f690 fffff806`5060781e : ffffc380`9cde1240 00000000`00000010 00000000`00000000 fffff00a`6b83fa20 : i8042prt!I8042KeyboardIsrDpc+0x1bb fffff00a`6b83f760 fffff806`50606b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e fffff00a`6b83f8d0 fffff806`507f92ee : ffffffff`00000000 ffffc380`9cdde180 ffffc380`9cde9240 ffff9f0a`ccc2a080 : nt!KiRetireDpcList+0x1f4 fffff00a`6b83fb60 00000000`00000000 : fffff00a`6b840000 fffff00a`6b839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.