i5 10200H 1650 Ti GTA 5 oynarken mavi ekran hatası

İşletim sistemi
Windows 11
Monster laptopların kronik sorunu Monster ile alakalı her şeyi silin Control Center vs. Sorunun çözülecektir.

Eğer silmek istemezsen şunu dene;

[Alıntıdır] @Plyra

Regedit'i açın ve;

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318} klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318} klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff948a9a0d79a0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80255fa32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2921

    Key  : Analysis.Elapsed.mSec
    Value: 4202

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6620

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff948a9a0d79a0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80255fa32d2

FILE_IN_CAB:  070423-14562-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8021771c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff948a9a0d79a0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTA5.exe

DPC_STACK_BASE:  FFFFF80214ADCFB0

TRAP_FRAME:  fffff80214adc460 -- (.trap 0xfffff80214adc460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9489c3f23240 rbx=0000000000000000 rcx=ffff9489c3f23240
rdx=00000000d61b4760 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80255fa32d2 rsp=fffff80214adc5f8 rbp=fffff80214adc670
 r8=00000000000000c0  r9=0000000000000038 r10=ffff9489b89f3000
r11=ffff948a9a0d7a60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff802`55fa32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff948a`9a0d79a0=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff802`14adc318 fffff802`16e418a9     : 00000000`0000000a ffff948a`9a0d79a0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`14adc320 fffff802`16e3cf34     : 00000000`00000000 00000000`00000000 ffff9489`bf12b6c8 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff802`14adc460 fffff802`55fa32d2     : fffff802`55fa5b5d 00000000`21958330 fffff802`14adc670 ffff9489`c3795a20 : nt!KiPageFault+0x474
fffff802`14adc5f8 fffff802`55fa5b5d     : 00000000`21958330 fffff802`14adc670 ffff9489`c3795a20 fffff802`55f62d5c : kbdclass!memcpy+0x92
fffff802`14adc600 fffff802`55f91511     : ffff9489`b8766aa0 fffff802`14adc7c8 ffff9489`b8775310 fffff802`14adc7c8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`14adc6a0 ffff9489`b8766aa0     : fffff802`14adc7c8 ffff9489`b8775310 fffff802`14adc7c8 00000000`00000008 : HKKbdFltr+0x1511
fffff802`14adc6a8 fffff802`14adc7c8     : ffff9489`b8775310 fffff802`14adc7c8 00000000`00000008 fffff802`14adc720 : 0xffff9489`b8766aa0
fffff802`14adc6b0 ffff9489`b8775310     : fffff802`14adc7c8 00000000`00000008 fffff802`14adc720 ffff9489`b8766950 : 0xfffff802`14adc7c8
fffff802`14adc6b8 fffff802`14adc7c8     : 00000000`00000008 fffff802`14adc720 ffff9489`b8766950 fffff802`55f913f0 : 0xffff9489`b8775310
fffff802`14adc6c0 00000000`00000008     : fffff802`14adc720 ffff9489`b8766950 fffff802`55f913f0 fffff802`133a8180 : 0xfffff802`14adc7c8
fffff802`14adc6c8 fffff802`14adc720     : ffff9489`b8766950 fffff802`55f913f0 fffff802`133a8180 fffff802`55f6b848 : 0x8
fffff802`14adc6d0 ffff9489`b8766950     : fffff802`55f913f0 fffff802`133a8180 fffff802`55f6b848 ffff9489`b8766aa0 : 0xfffff802`14adc720
fffff802`14adc6d8 fffff802`55f913f0     : fffff802`133a8180 fffff802`55f6b848 ffff9489`b8766aa0 fffff802`14adc759 : 0xffff9489`b8766950
fffff802`14adc6e0 fffff802`133a8180     : fffff802`55f6b848 ffff9489`b8766aa0 fffff802`14adc759 ffff9489`b9591280 : HKKbdFltr+0x13f0
fffff802`14adc6e8 fffff802`55f6b848     : ffff9489`b8766aa0 fffff802`14adc759 ffff9489`b9591280 fffff802`55f70258 : 0xfffff802`133a8180
fffff802`14adc6f0 fffff802`16ca7a4c     : 00000000`00000000 ffff8101`00000010 00000000`00000000 ffff8101`50aa7bf0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`14adc7c0 fffff802`16ca6a3a     : 00000000`00000022 fffff802`133a8180 00000000`023a83b5 00000000`00000010 : nt!KiExecuteAllDpcs+0x42c
fffff802`14adcd00 fffff802`16e356f5     : 00000000`00000000 00000000`00000000 fffff802`133a8180 000001fa`9d8dff01 : nt!KiRetireDpcList+0x1ba
fffff802`14adcfb0 fffff802`16e3569f     : ffffca80`f965f949 fffff802`16c418a5 00000000`43800000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
ffffca80`f965f8b0 fffff802`16c418a5     : 00000000`43800000 00000000`00000000 00000000`43800000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn
ffffca80`f965f8c0 fffff802`16e34e6b     : 00000000`00000000 00000088`f14df000 00000000`00000000 00000088`f14df000 : nt!KiDispatchInterrupt+0xd5
ffffca80`f965f9b0 fffff802`16e2e4a1     : 0000000a`4115c200 ffff8101`50aa7000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffffca80`f965f9e0 00007ffe`3f842530     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000088`f493fca0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3f842530


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23435.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 

Geri
Yukarı