Abra A5 v16.7.3 laptopla oyunda mavi ekran hatası

İşletim sistemi
Windows 11

Rodly

Kilopat
Katılım
4 Nisan 2017
Mesajlar
5
Daha fazla  
Cinsiyet
Erkek
RAM
16
Ekran kartı
Nvidia GTX 1650
İşlemci
11th Gen Intel(R) Core(TM) i5-11400H @ 2.70GHz
Monster Abra A5 v16.7.3 bilgisayarımda oyun oynarken mavi ekran hatası alıyorum. Tüm sürücülerim güncel ve daha yeni formatladım. Minidump dosyasının içeriğini aşağıya yazıyorum.

Kod:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\060823-23328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff807`07a00000 PsLoadedModuleList = 0xfffff807`086134d0
Debug session time: Thu Jun  8 20:34:12.398 2023 (UTC + 3:00)
System Uptime: 0 days 3:32:46.585
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`07e2c0f0 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffffb90f`d443f320=000000000000000a
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff93097c471464, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8074ca932d2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1406

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3022

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2637

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key  : WER.OS.Version
    Value: 10.0.22621.1


FILE_IN_CAB:  060823-23328-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff93097c471464

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8074ca932d2

READ_ADDRESS: fffff8070871c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff93097c471464

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RainbowSix.exe

DPC_STACK_BASE:  FFFFB90FD443FFB0

TRAP_FRAME:  ffffb90fd443f460 -- (.trap 0xffffb90fd443f460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff93038c587a40 rbx=0000000000000000 rcx=ffff93038c587a40
rdx=00000005efee9a24 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074ca932d2 rsp=ffffb90fd443f5f8 rbp=ffffb90fd443f670
 r8=00000000000000c0  r9=0000000000000038 r10=ffff93037baa1000
r11=ffff93097c471524 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff807`4ca932d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff9309`7c471464=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffffb90f`d443f318 fffff807`07e417a9     : 00000000`0000000a ffff9309`7c471464 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb90f`d443f320 fffff807`07e3ce34     : 00001f3b`c0aed4ae 00000000`00000000 ffff9303`7b93a180 fffff807`23c52ac2 : nt!KiBugCheckDispatch+0x69
ffffb90f`d443f460 fffff807`4ca932d2     : fffff807`4ca95b5d 00000000`ff2ebb2c ffffb90f`d443f670 ffff9303`8c8c59b0 : nt!KiPageFault+0x474
ffffb90f`d443f5f8 fffff807`4ca95b5d     : 00000000`ff2ebb2c ffffb90f`d443f670 ffff9303`8c8c59b0 fffff807`4ca52d5c : kbdclass!memcpy+0x92
ffffb90f`d443f600 fffff807`4ca81511     : ffff9303`7ba5a190 ffffb90f`d443f7c8 ffff9303`7ba5b310 ffffb90f`d443f7c8 : kbdclass!KeyboardClassServiceCallback+0x16d
ffffb90f`d443f6a0 ffff9303`7ba5a190     : ffffb90f`d443f7c8 ffff9303`7ba5b310 ffffb90f`d443f7c8 00000000`00000008 : HKKbdFltr+0x1511
ffffb90f`d443f6a8 ffffb90f`d443f7c8     : ffff9303`7ba5b310 ffffb90f`d443f7c8 00000000`00000008 ffffb90f`d443f720 : 0xffff9303`7ba5a190
ffffb90f`d443f6b0 ffff9303`7ba5b310     : ffffb90f`d443f7c8 00000000`00000008 ffffb90f`d443f720 ffff9303`7ba5a040 : 0xffffb90f`d443f7c8
ffffb90f`d443f6b8 ffffb90f`d443f7c8     : 00000000`00000008 ffffb90f`d443f720 ffff9303`7ba5a040 fffff807`4ca813f0 : 0xffff9303`7ba5b310
ffffb90f`d443f6c0 00000000`00000008     : ffffb90f`d443f720 ffff9303`7ba5a040 fffff807`4ca813f0 ffffa681`3fac5180 : 0xffffb90f`d443f7c8
ffffb90f`d443f6c8 ffffb90f`d443f720     : ffff9303`7ba5a040 fffff807`4ca813f0 ffffa681`3fac5180 fffff807`4ca5b848 : 0x8
ffffb90f`d443f6d0 ffff9303`7ba5a040     : fffff807`4ca813f0 ffffa681`3fac5180 fffff807`4ca5b848 ffff9303`7ba5a190 : 0xffffb90f`d443f720
ffffb90f`d443f6d8 fffff807`4ca813f0     : ffffa681`3fac5180 fffff807`4ca5b848 ffff9303`7ba5a190 ffffb90f`d443f759 : 0xffff9303`7ba5a040
ffffb90f`d443f6e0 ffffa681`3fac5180     : fffff807`4ca5b848 ffff9303`7ba5a190 ffffb90f`d443f759 ffff9303`7ba94040 : HKKbdFltr+0x13f0
ffffb90f`d443f6e8 fffff807`4ca5b848     : ffff9303`7ba5a190 ffffb90f`d443f759 ffff9303`7ba94040 fffff807`4ca60258 : 0xffffa681`3fac5180
ffffb90f`d443f6f0 fffff807`07cb3f6c     : 00000000`00000000 ffffa681`00000010 00000000`00000000 ffffa681`43cfcbf0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
ffffb90f`d443f7c0 fffff807`07cb2f5a     : 00000000`00000022 ffffa681`3fac5180 00000000`00000000 fffff807`0000000f : nt!KiExecuteAllDpcs+0x42c
ffffb90f`d443fd00 fffff807`07e35565     : fb78f6b7`e5b206e1 00000000`00000000 ffffa681`3fac5180 00000000`10000003 : nt!KiRetireDpcList+0x1ba
ffffb90f`d443ffb0 fffff807`07e3550f     : ffffb90f`d8bcf349 fffff807`07c451d5 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
ffffb90f`d8bcf2b0 fffff807`07c451d5     : 00000000`00000000 00000000`00000000 00000000`003f065c 00000000`000000ff : nt!KiPlatformSwapStacksAndCallReturn
ffffb90f`d8bcf2c0 fffff807`07e34cdb     : ffff9303`8760e080 ffffb90f`d8bcf460 ffffb90f`d8bcf460 0000005d`00000000 : nt!KiDispatchInterrupt+0xd5
ffffb90f`d8bcf3b0 fffff807`07e2e311     : 00000000`00000000 ffffa681`43cfcb40 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffffb90f`d8bcf3e0 00007ff8`cf1909c0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000005d`ac6cf4e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`cf1909c0


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.1774

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
Monster ile ilgili tüm araçları kaldır. Özellikle Control Center yazılımını bir daha mavi ekran almayacaksın.
 

Technopat Haberler

Geri
Yukarı