Ek olarak Razer ürününüzün sürücüsünü ve Razer'a ait tüm uygulamaları kaldırın.
Yükleyeceğiniz BIOS sürümünü aşağıdan indirebilirsiniz. (7C09v17 sürümü.)
Ağ sürücüsü için ise aşağıdaki linkten indireceğinizi kurun.
Ha son olarak klavye ve mouse harici tüm USB aygıtlarınızı çıkartın. Kamera aygıtınızı ise farklı bir USB portuna takın.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000014, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff804102c0d6c, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 41821
Key : Analysis.Memory.CommitPeak.Mb
Value: 105
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 14
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804102c0d6c
WRITE_ADDRESS: fffff8040dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040da0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8040da0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000014
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
DPC_STACK_BASE: FFFF8C0F72447FB0
TRAP_FRAME: ffff8c0f72446860 -- (.trap 0xffff8c0f72446860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000014 rbx=0000000000000000 rcx=0000000003901003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804102c0d6c rsp=ffff8c0f724469f0 rbp=ffff8c0f72446af0
r8=0000000000000000 r9=00000000d30006e0 r10=ffffb78bbd4e5af0
r11=ffffb78bc1823280 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
tcpip!TcpTcbHeaderSend+0x2fc:
fffff804`102c0d6c 6644897f10 mov word ptr [rdi+10h],r15w ds:00000000`00000010=????
Resetting default scope
STACK_TEXT:
ffff8c0f`72446718 fffff804`0d207169 : 00000000`0000000a 00000000`00000014 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8c0f`72446720 fffff804`0d203469 : d30006e0`8bc982c6 000005ac`0000a500 00000001`00000118 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8c0f`72446860 fffff804`102c0d6c : ffffb78b`c16a0260 00000000`0000100a ffffb78b`ba9bd9f0 ffffb78b`b66d0008 : nt!KiPageFault+0x469
ffff8c0f`724469f0 fffff804`102c3206 : ffffb78b`c16a0260 00000000`00000080 ffff8f01`6e0162e2 ffffb78b`b1de7240 : tcpip!TcpTcbHeaderSend+0x2fc
ffff8c0f`72446ca0 fffff804`102c174e : ffffb78b`b1f05e00 06059fed`6d6e128b ffffb78b`00000002 00000000`00000000 : tcpip!TcpReceive+0x4d6
ffff8c0f`72446d90 fffff804`102d399a : 00000000`00000000 00000000`00000001 ffffb78b`babd9780 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
ffff8c0f`72446dd0 fffff804`1032e57f : ffffb78b`bae4a110 ffffb78b`bad888a0 ffffb78b`bd4e5906 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6ba
ffff8c0f`72447060 fffff804`0d00d468 : ffffb78b`b66e27e0 00000000`00000002 ffffb78b`bf7b2080 ffff8c0f`72447358 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12f
ffff8c0f`724471b0 fffff804`0d00d3dd : fffff804`1032e450 ffff8c0f`72447358 ffffb78b`b1de7c40 fffff804`101d23af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8c0f`72447220 fffff804`103215ed : 00000000`00000000 00000000`00000000 ffffb78b`bf84c520 fffff804`105a142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8c0f`72447260 fffff804`10320ccd : 00000000`00000001 ffff8c0f`724473c0 ffffb78b`bad888a0 ffff8c0f`724473d0 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffff8c0f`724472c0 fffff804`10061eb1 : ffffb78b`baaf5cc1 00000000`00000001 ffffb78b`b6bf2a70 ffff8c0f`724476d0 : tcpip!FlReceiveNetBufferListChain+0x46d
ffff8c0f`72447570 fffff804`10061ccb : ffffb78b`bad838a0 00000000`00000001 ffff8c0f`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
ffff8c0f`72447650 fffff804`10067ef1 : ffffb78b`ba4ee1a0 ffffb78b`ba9c7001 ffffb78b`ba4ee1a0 fffff804`0da20f01 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffff8c0f`724476d0 fffff804`1009dee3 : ffffb78b`ba9c7030 ffff8c0f`724477a1 00000000`00000000 00000000`f8d1439a : ndis!ndisCallReceiveHandler+0x61
ffff8c0f`72447720 fffff804`10064a94 : 00000000`00205237 00000000`00000001 ffffb78b`ba4ee1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffff8c0f`724477f0 fffff804`274c8356 : fffff804`0f3a2b30 fffff804`0f3a2b30 ffff8c0f`72447980 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff8c0f`72447880 fffff804`0f3a2b2f : fffff804`0f3a2b30 ffff8c0f`72447980 00000000`00000000 00000000`00000001 : rt640x64+0x28356
ffff8c0f`72447888 fffff804`0f3a2b2f : ffff8c0f`72447980 00000000`00000000 00000000`00000001 00000000`00000000 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffff8c0f`72447890 ffff8c0f`72447980 : 00000000`00000000 00000000`00000001 00000000`00000000 00000002`00000001 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffff8c0f`72447898 00000000`00000000 : 00000000`00000001 00000000`00000000 00000002`00000001 80000000`00000001 : 0xffff8c0f`72447980
SYMBOL_NAME: rt640x64+28356
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 28356
FAILURE_BUCKET_ID: AV_rt640x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}
Followup: MachineOwner
---------[/CODE]