3050 Ti mavi ekran hatası

Laptop Monster ve sanırsam Control Center yazılımını kullanıyorsunuz " kbdclass.sys" sorun asıl sebebi " Keyboard Class Driver " RGB klavyelerin renkleri ile vs oynuyorsanız sorununuz kaynağı bu gibi görünüyor. Control Center yazılımını silerseniz muhtemelen sorununuz çözülecektir.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff800b8ea49a3c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804526632d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2327

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 10631

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 421

Key : Analysis.Init.Elapsed.mSec
Value: 7144

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Bugcheck.Code.DumpHeader
Value: 0xd1

Key : Bugcheck.Code.Register
Value: 0xa

Key : Dump.Attributes.AsUlong
Value: 1808

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0


FILE_IN_CAB: 041723-19078-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump

BUGCHECK_CODE: d1

BUGCHECK_P1: ffff800b8ea49a3c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804526632d2

READ_ADDRESS: fffff80410b1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff800b8ea49a3c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Lege

DPC_STACK_BASE: FFFF908D8992FFB0

TRAP_FRAME: ffff908d8992f890 -- (.trap 0xffff908d8992f890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800b0cfdbe40 rbx=0000000000000000 rcx=ffff800b0cfdbe40
rdx=0000000081a6dbfc rsi=0000000000000000 rdi=0000000000000000
rip=fffff804526632d2 rsp=ffff908d8992fa28 rbp=ffff908d8992faa0
r8=00000000000000c0 r9=0000000000000038 r10=ffff800affa26000
r11=ffff800b8ea49afc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`526632d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff800b`8ea49a3c=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff908d`8992f748 fffff804`1023e9a9 : 00000000`0000000a ffff800b`8ea49a3c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff908d`8992f750 fffff804`1023a034 : 00000000`00000000 ffff800a`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff908d`8992f890 fffff804`526632d2 : fffff804`52665b5d 00000000`73af8294 ffff908d`8992faa0 ffff800b`138e5aa0 : nt!KiPageFault+0x474
ffff908d`8992fa28 fffff804`52665b5d : 00000000`73af8294 ffff908d`8992faa0 ffff800b`138e5aa0 fffff804`52622d5c : kbdclass!memcpy+0x92
ffff908d`8992fa30 fffff804`52651511 : ffff800a`ffa021d0 ffff908d`8992fbf8 ffff800a`ffa0f310 ffff908d`8992fbf8 : kbdclass!KeyboardClassServiceCallback+0x16d
ffff908d`8992fad0 ffff800a`ffa021d0 : ffff908d`8992fbf8 ffff800a`ffa0f310 ffff908d`8992fbf8 00000000`00000008 : HKKbdFltr+0x1511
ffff908d`8992fad8 ffff908d`8992fbf8 : ffff800a`ffa0f310 ffff908d`8992fbf8 00000000`00000008 ffff908d`8992fb50 : 0xffff800a`ffa021d0
ffff908d`8992fae0 ffff800a`ffa0f310 : ffff908d`8992fbf8 00000000`00000008 ffff908d`8992fb50 ffff800a`ffa02080 : 0xffff908d`8992fbf8
ffff908d`8992fae8 ffff908d`8992fbf8 : 00000000`00000008 ffff908d`8992fb50 ffff800a`ffa02080 fffff804`526513f0 : 0xffff800a`ffa0f310
ffff908d`8992faf0 00000000`00000008 : ffff908d`8992fb50 ffff800a`ffa02080 fffff804`526513f0 00000000`00000012 : 0xffff908d`8992fbf8
ffff908d`8992faf8 ffff908d`8992fb50 : ffff800a`ffa02080 fffff804`526513f0 00000000`00000012 fffff804`5262b848 : 0x8
ffff908d`8992fb00 ffff800a`ffa02080 : fffff804`526513f0 00000000`00000012 fffff804`5262b848 ffff800a`ffa021d0 : 0xffff908d`8992fb50
ffff908d`8992fb08 fffff804`526513f0 : 00000000`00000012 fffff804`5262b848 ffff800a`ffa021d0 ffff908d`8992fb89 : 0xffff800a`ffa02080
ffff908d`8992fb10 00000000`00000012 : fffff804`5262b848 ffff800a`ffa021d0 ffff908d`8992fb89 ffff800a`ffa09dc0 : HKKbdFltr+0x13f0
ffff908d`8992fb18 fffff804`5262b848 : ffff800a`ffa021d0 ffff908d`8992fb89 ffff800a`ffa09dc0 fffff804`52630258 : 0x12
ffff908d`8992fb20 fffff804`1002815b : 00000000`00000008 ffff800a`00000010 00000000`00000000 ffff800a`ffa024f0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
ffff908d`8992fbf0 fffff804`100298d6 : ffffe581`00000001 ffff800b`00b5d80b ffff908d`8992fe20 00000000`00846ab2 : nt!KiProcessExpiredTimerList+0x1eb
ffff908d`8992fd20 fffff804`10232815 : 792cffc6`792cffc6 00000000`00000000 ffff800b`0f2f5080 00000000`00000000 : nt!KiRetireDpcList+0xed6
ffff908d`8992ffb0 fffff804`102327bf : ffff908d`8e11d349 fffff804`1002c0c9 ffffffff`ffffffff ffff6e0d`f91015b1 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff908d`8e11d2b0 fffff804`1002c0c9 : ffffffff`ffffffff ffff6e0d`f91015b1 ffff6e0d`f91015a1 ffffd75e`5d26c55a : nt!KiPlatformSwapStacksAndCallReturn
ffff908d`8e11d2c0 fffff804`10231f8b : ffff800b`0f2f5080 00007ff6`00000020 ffff908d`8e11d460 000000d4`3918f750 : nt!KiDispatchInterrupt+0xd9
ffff908d`8e11d3b0 fffff804`1022bde1 : 0000022d`5003f630 ffff800b`0b4eb080 ffff800b`00000000 ffff800b`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff908d`8e11d3e0 00007ff6`8212b5b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
000000d4`37f5ec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`8212b5b0


SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.23435.1000

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 92

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner
 

Technopat Haberler

Geri
Yukarı