DRIVER_IRQL_NOT_LESS_OR_EQUAL mavi ekran | kbdclass.sys

-BIOS sürümünü güncelle.
-Windows Update güncellemelerini yap, bekliyorsa 2004 sürümüne geç.
-Varsa overclock işlemlerini kaldır. Kuruluysa MSI Afterburner'ı kaldır.
-Discord uygulamasını kaldır. Aktif kullanıcıysan Chrome üzerinden kullanmaya devam et.

Dene ve sonucu bildir.
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc598269e169c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80561272f92, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8953

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-74VRRQ7

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22093

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc598269e169c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80561272f92

READ_ADDRESS: fffff80544efa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80544e0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80544e0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffc598269e169c

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

DPC_STACK_BASE:  FFFFF80547E64FB0

TRAP_FRAME:  fffff80547e64850 -- (.trap 0xfffff80547e64850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc58fb5a79a00 rbx=0000000000000000 rcx=ffffc58fb5a79a00
rdx=0000000870f67c9c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80561272f92 rsp=fffff80547e649e8 rbp=fffff80547e64a60
 r8=00000000000000c0  r9=ffffc58fa51090a8 r10=ffffc58fa5109c40
r11=ffffc598269e175c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`61272f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc598`269e169c=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff805`47e64708 fffff805`445efa29     : 00000000`0000000a ffffc598`269e169c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`47e64710 fffff805`445ebd29     : ffffc58f`aa110002 00000000`00000000 ffffc58f`aa4916c8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`47e64850 fffff805`61272f92     : fffff805`612756dd 00000000`7e71a2f4 fffff805`47e64a60 ffffc58f`af14f750 : nt!KiPageFault+0x469
fffff805`47e649e8 fffff805`612756dd     : 00000000`7e71a2f4 fffff805`47e64a60 ffffc58f`af14f750 fffff805`45cb129b : kbdclass!memcpy+0x92
fffff805`47e649f0 fffff805`61261511     : ffffc58f`a50c9190 fffff805`47e64bb8 ffffc58f`a510b310 fffff805`47e64bb8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`47e64a90 ffffc58f`a50c9190     : fffff805`47e64bb8 ffffc58f`a510b310 fffff805`47e64bb8 00000000`00000008 : HKKbdFltr+0x1511
fffff805`47e64a98 fffff805`47e64bb8     : ffffc58f`a510b310 fffff805`47e64bb8 00000000`00000008 fffff805`47e64b10 : 0xffffc58f`a50c9190
fffff805`47e64aa0 ffffc58f`a510b310     : fffff805`47e64bb8 00000000`00000008 fffff805`47e64b10 fffff805`612613f0 : 0xfffff805`47e64bb8
fffff805`47e64aa8 fffff805`47e64bb8     : 00000000`00000008 fffff805`47e64b10 fffff805`612613f0 ffffc58f`a5121980 : 0xffffc58f`a510b310
fffff805`47e64ab0 00000000`00000008     : fffff805`47e64b10 fffff805`612613f0 ffffc58f`a5121980 000066b9`188dcad7 : 0xfffff805`47e64bb8
fffff805`47e64ab8 fffff805`47e64b10     : fffff805`612613f0 ffffc58f`a5121980 000066b9`188dcad7 fffff805`612360db : 0x8
fffff805`47e64ac0 fffff805`612613f0     : ffffc58f`a5121980 000066b9`188dcad7 fffff805`612360db ffffc58f`a50c9190 : 0xfffff805`47e64b10
fffff805`47e64ac8 ffffc58f`a5121980     : 000066b9`188dcad7 fffff805`612360db ffffc58f`a50c9190 fffff805`47e64b49 : HKKbdFltr+0x13f0
fffff805`47e64ad0 000066b9`188dcad7     : fffff805`612360db ffffc58f`a50c9190 fffff805`47e64b49 fffff805`47e64e01 : 0xffffc58f`a5121980
fffff805`47e64ad8 fffff805`612360db     : ffffc58f`a50c9190 fffff805`47e64b49 fffff805`47e64e01 fffff805`6123f000 : 0x000066b9`188dcad7
fffff805`47e64ae0 fffff805`4443a6be     : fffff805`3ef10240 ffffc58f`00000010 00000000`00000000 fffff805`47e64e70 : i8042prt!I8042KeyboardIsrDpc+0x1bb
fffff805`47e64bb0 fffff805`444399a4     : fffff805`3ef0d180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x30e
fffff805`47e64d20 fffff805`445e4ba5     : 00000000`00000000 fffff805`3ef0d180 ffffe580`d0dc1dc0 00000000`1287e6e8 : nt!KiRetireDpcList+0x1f4
fffff805`47e64fb0 fffff805`445e4990     : ffffc58f`aec54080 fffff805`44516b2a 00000000`00000020 00000000`09bb6000 : nt!KxRetireDpcList+0x5
ffff8a8e`fcd3f9c0 fffff805`445e4245     : 00000000`1287e6e8 fffff805`445df6d1 00000000`09bb6000 ffff8a8e`fcd3fa80 : nt!KiDispatchInterruptContinue
ffff8a8e`fcd3f9f0 fffff805`445df6d1     : 00000000`09bb6000 ffff8a8e`fcd3fa80 00007ffa`8e8d5260 00000000`1287e5b0 : nt!KiDpcInterruptBypass+0x25
ffff8a8e`fcd3fa00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Virüs saçan dosya paylaşım servisleri kullanmayın öncelikle.

1597759290974.png


Sorun kbdclass.sys kaynaklı. Bu da Keyboard Class Driver oluyor. Klavyenizle ilgili bir yazılım ya da klavye ile ilgili bir sorundan dolayı mavi ekran alıyorsunuz gibi.

Windows sürümünüz de eski. 2004 son sürüm şu anda.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc598269e169c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80561272f92, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4577

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11882

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc598269e169c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80561272f92

READ_ADDRESS: fffff80544efa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80544e0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80544e0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffc598269e169c

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

DPC_STACK_BASE:  FFFFF80547E64FB0

TRAP_FRAME:  fffff80547e64850 -- (.trap 0xfffff80547e64850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc58fb5a79a00 rbx=0000000000000000 rcx=ffffc58fb5a79a00
rdx=0000000870f67c9c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80561272f92 rsp=fffff80547e649e8 rbp=fffff80547e64a60
 r8=00000000000000c0  r9=ffffc58fa51090a8 r10=ffffc58fa5109c40
r11=ffffc598269e175c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`61272f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc598`269e169c=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff805`47e64708 fffff805`445efa29     : 00000000`0000000a ffffc598`269e169c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`47e64710 fffff805`445ebd29     : ffffc58f`aa110002 00000000`00000000 ffffc58f`aa4916c8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`47e64850 fffff805`61272f92     : fffff805`612756dd 00000000`7e71a2f4 fffff805`47e64a60 ffffc58f`af14f750 : nt!KiPageFault+0x469
fffff805`47e649e8 fffff805`612756dd     : 00000000`7e71a2f4 fffff805`47e64a60 ffffc58f`af14f750 fffff805`45cb129b : kbdclass!memcpy+0x92
fffff805`47e649f0 fffff805`61261511     : ffffc58f`a50c9190 fffff805`47e64bb8 ffffc58f`a510b310 fffff805`47e64bb8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`47e64a90 ffffc58f`a50c9190     : fffff805`47e64bb8 ffffc58f`a510b310 fffff805`47e64bb8 00000000`00000008 : HKKbdFltr+0x1511
fffff805`47e64a98 fffff805`47e64bb8     : ffffc58f`a510b310 fffff805`47e64bb8 00000000`00000008 fffff805`47e64b10 : 0xffffc58f`a50c9190
fffff805`47e64aa0 ffffc58f`a510b310     : fffff805`47e64bb8 00000000`00000008 fffff805`47e64b10 fffff805`612613f0 : 0xfffff805`47e64bb8
fffff805`47e64aa8 fffff805`47e64bb8     : 00000000`00000008 fffff805`47e64b10 fffff805`612613f0 ffffc58f`a5121980 : 0xffffc58f`a510b310
fffff805`47e64ab0 00000000`00000008     : fffff805`47e64b10 fffff805`612613f0 ffffc58f`a5121980 000066b9`188dcad7 : 0xfffff805`47e64bb8
fffff805`47e64ab8 fffff805`47e64b10     : fffff805`612613f0 ffffc58f`a5121980 000066b9`188dcad7 fffff805`612360db : 0x8
fffff805`47e64ac0 fffff805`612613f0     : ffffc58f`a5121980 000066b9`188dcad7 fffff805`612360db ffffc58f`a50c9190 : 0xfffff805`47e64b10
fffff805`47e64ac8 ffffc58f`a5121980     : 000066b9`188dcad7 fffff805`612360db ffffc58f`a50c9190 fffff805`47e64b49 : HKKbdFltr+0x13f0
fffff805`47e64ad0 000066b9`188dcad7     : fffff805`612360db ffffc58f`a50c9190 fffff805`47e64b49 fffff805`47e64e01 : 0xffffc58f`a5121980
fffff805`47e64ad8 fffff805`612360db     : ffffc58f`a50c9190 fffff805`47e64b49 fffff805`47e64e01 fffff805`6123f000 : 0x000066b9`188dcad7
fffff805`47e64ae0 fffff805`4443a6be     : fffff805`3ef10240 ffffc58f`00000010 00000000`00000000 fffff805`47e64e70 : i8042prt!I8042KeyboardIsrDpc+0x1bb
fffff805`47e64bb0 fffff805`444399a4     : fffff805`3ef0d180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x30e
fffff805`47e64d20 fffff805`445e4ba5     : 00000000`00000000 fffff805`3ef0d180 ffffe580`d0dc1dc0 00000000`1287e6e8 : nt!KiRetireDpcList+0x1f4
fffff805`47e64fb0 fffff805`445e4990     : ffffc58f`aec54080 fffff805`44516b2a 00000000`00000020 00000000`09bb6000 : nt!KxRetireDpcList+0x5
ffff8a8e`fcd3f9c0 fffff805`445e4245     : 00000000`1287e6e8 fffff805`445df6d1 00000000`09bb6000 ffff8a8e`fcd3fa80 : nt!KiDispatchInterruptContinue
ffff8a8e`fcd3f9f0 fffff805`445df6d1     : 00000000`09bb6000 ffff8a8e`fcd3fa80 00007ffa`8e8d5260 00000000`1287e5b0 : nt!KiDpcInterruptBypass+0x25
ffff8a8e`fcd3fa00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

0: kd> lmvm kbdclass
Browse full module list
start             end                 module name
fffff805`61270000 fffff805`61284000   kbdclass # (pdb symbols)          C:\ProgramData\Dbg\sym\kbdclass.pdb\D57039F36E70898559E7A4155D2435C61\kbdclass.pdb
    Loaded symbol image file: kbdclass.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3156654A14000\kbdclass.sys
    Image path: \SystemRoot\System32\drivers\kbdclass.sys
    Image name: kbdclass.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        3156654A (This is a reproducible build file hash, not a timestamp)
    CheckSum:         0001CE1A
    ImageSize:        00014000
    File version:     10.0.19041.1030
    Product version:  10.0.19041.1030
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     kbdclass.sys
        OriginalFilename: kbdclass.sys
        ProductVersion:   10.0.19041.1030
        FileVersion:      10.0.19041.1030 (WinBuild.160101.0800)
        FileDescription:  Keyboard Class Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffb48f52372ac0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8045de62f92, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 26219

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffb48f52372ac0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8045de62f92

READ_ADDRESS: fffff80441afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80441a0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80441a0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffb48f52372ac0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LeagueClient.exe

DPC_STACK_BASE:  FFFFFB8EDB237FB0

TRAP_FRAME:  fffffb8edb237850 -- (.trap 0xfffffb8edb237850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48c46f43c40 rbx=0000000000000000 rcx=ffffb48c46f43c40
rdx=000000030b42ee80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045de62f92 rsp=fffffb8edb2379e8 rbp=fffffb8edb237a60
 r8=00000000000000c0  r9=ffffb48c3efba0a8 r10=ffffb48c3efbab98
r11=ffffb48f52372b80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`5de62f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffb48f`52372ac0=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffffb8e`db237708 fffff804`411efe29     : 00000000`0000000a ffffb48f`52372ac0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb8e`db237710 fffff804`411ec129     : ffffb48c`3eeb5180 fffff804`571c33c6 ffffb48c`3eeb5030 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffb8e`db237850 fffff804`5de62f92     : fffff804`5de656dd 00000000`ecb40a40 fffffb8e`db237a60 ffffb48c`4d698ad0 : nt!KiPageFault+0x469
fffffb8e`db2379e8 fffff804`5de656dd     : 00000000`ecb40a40 fffffb8e`db237a60 ffffb48c`4d698ad0 fffff804`42ab129b : kbdclass!memcpy+0x92
fffffb8e`db2379f0 fffff804`5de51511     : ffffb48c`3eeb6ad0 fffffb8e`db237bb8 ffffb48c`3ef96310 fffffb8e`db237bb8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffffb8e`db237a90 ffffb48c`3eeb6ad0     : fffffb8e`db237bb8 ffffb48c`3ef96310 fffffb8e`db237bb8 00000000`00000008 : HKKbdFltr+0x1511
fffffb8e`db237a98 fffffb8e`db237bb8     : ffffb48c`3ef96310 fffffb8e`db237bb8 00000000`00000008 fffffb8e`db237b10 : 0xffffb48c`3eeb6ad0
fffffb8e`db237aa0 ffffb48c`3ef96310     : fffffb8e`db237bb8 00000000`00000008 fffffb8e`db237b10 fffff804`5de513f0 : 0xfffffb8e`db237bb8
fffffb8e`db237aa8 fffffb8e`db237bb8     : 00000000`00000008 fffffb8e`db237b10 fffff804`5de513f0 ffffb48c`3ef6ab10 : 0xffffb48c`3ef96310
fffffb8e`db237ab0 00000000`00000008     : fffffb8e`db237b10 fffff804`5de513f0 ffffb48c`3ef6ab10 000029d2`31e86440 : 0xfffffb8e`db237bb8
fffffb8e`db237ab8 fffffb8e`db237b10     : fffff804`5de513f0 ffffb48c`3ef6ab10 000029d2`31e86440 fffff804`5de260db : 0x8
fffffb8e`db237ac0 fffff804`5de513f0     : ffffb48c`3ef6ab10 000029d2`31e86440 fffff804`5de260db ffffb48c`3eeb6ad0 : 0xfffffb8e`db237b10
fffffb8e`db237ac8 ffffb48c`3ef6ab10     : 000029d2`31e86440 fffff804`5de260db ffffb48c`3eeb6ad0 fffffb8e`db237b49 : HKKbdFltr+0x13f0
fffffb8e`db237ad0 000029d2`31e86440     : fffff804`5de260db ffffb48c`3eeb6ad0 fffffb8e`db237b49 fffffb8e`db237e01 : 0xffffb48c`3ef6ab10
fffffb8e`db237ad8 fffff804`5de260db     : ffffb48c`3eeb6ad0 fffffb8e`db237b49 fffffb8e`db237e01 fffff804`5de2f000 : 0x000029d2`31e86440
fffffb8e`db237ae0 fffff804`4103a6be     : ffff8a01`be50c240 ffffb48c`00000010 00000000`00000000 fffffb8e`db237e70 : i8042prt!I8042KeyboardIsrDpc+0x1bb
fffffb8e`db237bb0 fffff804`410399a4     : ffff8a01`be509180 cccccccc`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x30e
fffffb8e`db237d20 fffff804`411e4f85     : 7f83c02b`4c30468b ffff8a01`be509180 ffff8a01`bef3a3c0 00000000`00000000 : nt!KiRetireDpcList+0x1f4
fffffb8e`db237fb0 fffff804`411e4d70     : 00000000`00000000 fffff804`411160da 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffffb8e`dec5f9c0 fffff804`411e4625     : 00000000`00000000 fffff804`411dfab1 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
fffffb8e`dec5f9f0 fffff804`411dfab1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffb8e`dec5fa00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc91060fd3a38, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff806a0412f92, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25583

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc91060fd3a38

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff806a0412f92

READ_ADDRESS: fffff806842fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8068420f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8068420f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffc91060fd3a38

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

DPC_STACK_BASE:  FFFF998159037FB0

TRAP_FRAME:  ffff998159037850 -- (.trap 0xffff998159037850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc90f29aaa040 rbx=0000000000000000 rcx=ffffc90f29aaa040
rdx=00000001375299f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806a0412f92 rsp=ffff9981590379e8 rbp=ffff998159037a60
 r8=00000000000000c0  r9=ffffc90f18c6c0a8 r10=ffffc90f18c6c2d8
r11=ffffc91060fd3af8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`a0412f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc910`60fd3a38=????????????????????????????????
Resetting default scope

STACK_TEXT: 
ffff9981`59037708 fffff806`839efa29     : 00000000`0000000a ffffc910`60fd3a38 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9981`59037710 fffff806`839ebd29     : ffffc90f`18989180 fffff806`9b413946 ffffc90f`18989030 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9981`59037850 fffff806`a0412f92     : fffff806`a04156dd 00000000`b78a6a88 ffff9981`59037a60 ffffc90f`25cd4200 : nt!KiPageFault+0x469
ffff9981`590379e8 fffff806`a04156dd     : 00000000`b78a6a88 ffff9981`59037a60 ffffc90f`25cd4200 fffff806`86ab129b : kbdclass!memcpy+0x92
ffff9981`590379f0 fffff806`a0401511     : ffffc90f`18ad0190 ffff9981`59037bb8 ffffc90f`18ad1310 ffff9981`59037bb8 : kbdclass!KeyboardClassServiceCallback+0x16d
ffff9981`59037a90 ffffc90f`18ad0190     : ffff9981`59037bb8 ffffc90f`18ad1310 ffff9981`59037bb8 00000000`00000008 : HKKbdFltr+0x1511
ffff9981`59037a98 ffff9981`59037bb8     : ffffc90f`18ad1310 ffff9981`59037bb8 00000000`00000008 ffff9981`59037b10 : 0xffffc90f`18ad0190
ffff9981`59037aa0 ffffc90f`18ad1310     : ffff9981`59037bb8 00000000`00000008 ffff9981`59037b10 fffff806`a04013f0 : 0xffff9981`59037bb8
ffff9981`59037aa8 ffff9981`59037bb8     : 00000000`00000008 ffff9981`59037b10 fffff806`a04013f0 ffffc90f`18ae6980 : 0xffffc90f`18ad1310
ffff9981`59037ab0 00000000`00000008     : ffff9981`59037b10 fffff806`a04013f0 ffffc90f`18ae6980 00002e9b`3183e437 : 0xffff9981`59037bb8
ffff9981`59037ab8 ffff9981`59037b10     : fffff806`a04013f0 ffffc90f`18ae6980 00002e9b`3183e437 fffff806`a03d60db : 0x8
ffff9981`59037ac0 fffff806`a04013f0     : ffffc90f`18ae6980 00002e9b`3183e437 fffff806`a03d60db ffffc90f`18ad0190 : 0xffff9981`59037b10
ffff9981`59037ac8 ffffc90f`18ae6980     : 00002e9b`3183e437 fffff806`a03d60db ffffc90f`18ad0190 ffff9981`59037b49 : HKKbdFltr+0x13f0
ffff9981`59037ad0 00002e9b`3183e437     : fffff806`a03d60db ffffc90f`18ad0190 ffff9981`59037b49 ffff9981`59037e01 : 0xffffc90f`18ae6980
ffff9981`59037ad8 fffff806`a03d60db     : ffffc90f`18ad0190 ffff9981`59037b49 ffff9981`59037e01 fffff806`a03df000 : 0x00002e9b`3183e437
ffff9981`59037ae0 fffff806`8383a6be     : ffffdc01`00f27240 ffffc90f`00000010 00000000`00000000 ffff9981`59037e70 : i8042prt!I8042KeyboardIsrDpc+0x1bb
ffff9981`59037bb0 fffff806`838399a4     : ffffdc01`00f24180 81484d75`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x30e
ffff9981`59037d20 fffff806`839e4ba5     : 41ea8bf6`33000000 ffffdc01`00f24180 ffffdc01`01e3d3c0 00000000`fffffff5 : nt!KiRetireDpcList+0x1f4
ffff9981`59037fb0 fffff806`839e4990     : 00000000`00000001 fffff806`83916b2a ffff9981`5d337a08 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff9981`5d3379c0 fffff806`839e4245     : 00000000`fffffff5 fffff806`839df6d1 00000000`fffff87d ffffc90f`205379e0 : nt!KiDispatchInterruptContinue
ffff9981`5d3379f0 fffff806`839df6d1     : 00000000`fffff87d ffffc90f`205379e0 ffff9981`5d337a18 ffff9981`5d337a80 : nt!KiDpcInterruptBypass+0x25
ffff9981`5d337a00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Laptop olduğu için farklı bir uygulama yok sadece rengin ayarlanabildiği kontrol merkezi var sadece ne gibi bir sorundan kaynaklanıyor olabilir klavye için?
 
Son düzenleme:

Yeni konular

Geri
Yukarı