Çözüldü Monster Abra A5 17.2 mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Katılım
12 Mayıs 2019
Mesajlar
223
Çözümler
1
Yaklaşık 1 hafta önce Monster Abra A5 17.2 laptop aldım.
Shadow of the Tomb Raider.
Battlefield 1
Minecraft Dungeons.
Dying Light oyunlarında hiçbir sıkıntı olmaz iken Assassin's Creed Origins oyununda kbdclass.sys mavi ekran hatasını alıyorum. Yardımcı olabilir misiniz?
Minidump dosyamı aşağıda paylaştım.
 
Çözüm
Aslında hiç dökümleri incelemeden direk kbdclass.sys dediğiniz için aşağıdaki konuyu atacağım. Bilgisayar modelleri tamamen aynı değil, bu yüzden bu çözümü uygulamadan önce uyarayım bu konuyla ilgili.

Ayrıca o konudaki çözümü sunan @Plyra da yardımcı olabilir, bu Monster laptopların problemini tam olarak anlamış değilim.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe20b33874998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8068f1f2fd2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1030

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4146

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5664

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 144

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  092422-13640-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffe20b33874998

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8068f1f2fd2

READ_ADDRESS: fffff80668b05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffe20b33874998

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ACOrigins.exe

DPC_STACK_BASE:  FFFFF806643FFFB0

TRAP_FRAME:  fffff806643ff7a0 -- (.trap 0xfffff806643ff7a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe208422c5540 rbx=0000000000000000 rcx=ffffe208422c5540
rdx=00000002f15af458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068f1f2fd2 rsp=fffff806643ff938 rbp=fffff806643ff9b0
 r8=00000000000000c0  r9=ffffe20833a21b60 r10=ffffe20833a21000
r11=ffffe20b33874a58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`8f1f2fd2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffe20b`33874998=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff806`643ff658 fffff806`6822d9a9     : 00000000`0000000a ffffe20b`33874998 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`643ff660 fffff806`68229b00     : 00000000`00000000 00000000`00000000 fffff806`64074180 ffffa980`55840190 : nt!KiBugCheckDispatch+0x69
fffff806`643ff7a0 fffff806`8f1f2fd2     : fffff806`8f1f57ed 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 : nt!KiPageFault+0x440
fffff806`643ff938 fffff806`8f1f57ed     : 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 fffff806`8f1b1cac : kbdclass!memcpy+0x92
fffff806`643ff940 fffff806`8f1e1511     : ffffe208`337f3aa0 fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`643ff9e0 ffffe208`337f3aa0     : fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 : HKKbdFltr+0x1511
fffff806`643ff9e8 fffff806`643ffb08     : ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 : 0xffffe208`337f3aa0
fffff806`643ff9f0 ffffe208`33a19310     : fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 : 0xfffff806`643ffb08
fffff806`643ff9f8 fffff806`643ffb08     : 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 : 0xffffe208`33a19310
fffff806`643ffa00 00000000`00000008     : fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 : 0xfffff806`643ffb08
fffff806`643ffa08 fffff806`643ffa60     : ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 : 0x8
fffff806`643ffa10 ffffe208`337f3950     : fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 : 0xfffff806`643ffa60
fffff806`643ffa18 fffff806`8f1e13f0     : 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 : 0xffffe208`337f3950
fffff806`643ffa20 000008d4`0fe59017     : fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 : HKKbdFltr+0x13f0
fffff806`643ffa28 fffff806`8f1bb618     : ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 fffff806`8f1c01c8 : 0x000008d4`0fe59017
fffff806`643ffa30 fffff806`680c7c11     : fffff806`643ffe70 ffffe208`00000010 00000000`00000000 fffff806`640774c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`643ffb00 fffff806`680c6c12     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff806`643ffd00 fffff806`68222ab5     : 00000000`00000000 fffff806`64074180 ffffa980`563b1a00 00000000`00000001 : nt!KiRetireDpcList+0x2a2
fffff806`643fffb0 fffff806`68222890     : 00000000`00000000 fffff806`6802bf7a 0000007e`971ffa60 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff818a`bc23f210 fffff806`682220d5     : 00000000`00000001 fffff806`6821c9c1 ffffe208`40908080 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff818a`bc23f240 fffff806`6821c9c1     : ffffe208`40908080 00000000`00000000 ffff818a`bc23f460 ffffd02a`819b45f6 : nt!KiDpcInterruptBypass+0x25
ffff818a`bc23f250 fffff806`6822d1d5     : 00007ff7`351c9ca0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
ffff818a`bc23f3e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xbb


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22000.653

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffcc1666b273e4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8009ebf2fd2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1389

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7032

    Key  : Analysis.Init.CPU.mSec
    Value: 108

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5427

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  092422-13656-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffcc1666b273e4

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8009ebf2fd2

READ_ADDRESS: fffff80065b05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffcc1666b273e4

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ACOrigins.exe

DPC_STACK_BASE:  FFFFF80060B33FB0

TRAP_FRAME:  fffff80060b337a0 -- (.trap 0xfffff80060b337a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc0cd71c6ac0 rbx=0000000000000000 rcx=ffffcc0cd71c6ac0
rdx=000000098f960924 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ebf2fd2 rsp=fffff80060b33938 rbp=fffff80060b339b0
 r8=00000000000000c0  r9=ffffcc0cc6bfe3b8 r10=ffffcc0cc6bfe000
r11=ffffcc1666b274a4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff800`9ebf2fd2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffcc16`66b273e4=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff800`60b33658 fffff800`6522d9a9     : 00000000`0000000a ffffcc16`66b273e4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`60b33660 fffff800`65229b00     : 00000000`00000000 00000000`00000000 fffff800`607a8180 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff800`60b337a0 fffff800`9ebf2fd2     : fffff800`9ebf57ed 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 : nt!KiPageFault+0x440
fffff800`60b33938 fffff800`9ebf57ed     : 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 fffff800`9ebb1cac : kbdclass!memcpy+0x92
fffff800`60b33940 fffff800`9ebe1511     : ffffcc0c`c6c07aa0 fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`60b339e0 ffffcc0c`c6c07aa0     : fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 : HKKbdFltr+0x1511
fffff800`60b339e8 fffff800`60b33b08     : ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 : 0xffffcc0c`c6c07aa0
fffff800`60b339f0 ffffcc0c`c6c10310     : fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 : 0xfffff800`60b33b08
fffff800`60b339f8 fffff800`60b33b08     : 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 : 0xffffcc0c`c6c10310
fffff800`60b33a00 00000000`00000008     : fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a : 0xfffff800`60b33b08
fffff800`60b33a08 fffff800`60b33a60     : ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 : 0x8
fffff800`60b33a10 ffffcc0c`c6c07950     : fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 : 0xfffff800`60b33a60
fffff800`60b33a18 fffff800`9ebe13f0     : 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 : 0xffffcc0c`c6c07950
fffff800`60b33a20 000027bf`575d7d4a     : fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 : HKKbdFltr+0x13f0
fffff800`60b33a28 fffff800`9ebbb618     : ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 fffff800`9ebc01c8 : 0x000027bf`575d7d4a
fffff800`60b33a30 fffff800`650c7c11     : fffff800`60b33e70 ffffcc0c`00000010 00000000`00000000 fffff800`607ab4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`60b33b00 fffff800`650c6c12     : 00000000`00000000 00000000`00000001 00000000`003b9b36 00000000`0000000f : nt!KiExecuteAllDpcs+0x491
fffff800`60b33d00 fffff800`65222ab5     : 00000000`00000000 fffff800`607a8180 ffff8b80`8b610a00 00000200`89cc7c88 : nt!KiRetireDpcList+0x2a2
fffff800`60b33fb0 fffff800`65222890     : ffffcc0c`dd826ae0 fffff800`6502bf7a 00000000`00000090 00000200`f3a597d0 : nt!KxRetireDpcList+0x5
ffffec8d`0f1973a0 fffff800`652220d5     : 00000200`89cc7c88 fffff800`6521c9c1 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffec8d`0f1973d0 fffff800`6521c9c1     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcc0c`00000000 : nt!KiDpcInterruptBypass+0x25
ffffec8d`0f1973e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22000.653

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9f8988122d1c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804a8da2fd2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1046

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3731

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4199

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 133

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  092422-14031-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff9f8988122d1c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804a8da2fd2

READ_ADDRESS: fffff8047ed05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9f8988122d1c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ACOrigins.exe

DPC_STACK_BASE:  FFFFF8047B694FB0

TRAP_FRAME:  fffff8047b6947a0 -- (.trap 0xfffff8047b6947a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f84740be0c0 rbx=0000000000000000 rcx=ffff9f84740be0c0
rdx=0000000514064c5c rsi=0000000000000000 rdi=0000000000000000
rip=fffff804a8da2fd2 rsp=fffff8047b694938 rbp=fffff8047b6949b0
 r8=00000000000000c0  r9=ffff9f84736ec7a8 r10=ffff9f84736ec000
r11=ffff9f8988122ddc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`a8da2fd2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff9f89`88122d1c=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff804`7b694658 fffff804`7e42d9a9     : 00000000`0000000a ffff9f89`88122d1c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`7b694660 fffff804`7e429b00     : 00000000`00000000 00000000`00000000 fffff804`7b309180 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff804`7b6947a0 fffff804`a8da2fd2     : fffff804`a8da57ed 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 : nt!KiPageFault+0x440
fffff804`7b694938 fffff804`a8da57ed     : 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 fffff804`b61c1cac : kbdclass!memcpy+0x92
fffff804`7b694940 fffff804`b61f1511     : ffff9f84`674897d0 fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`7b6949e0 ffff9f84`674897d0     : fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 : HKKbdFltr+0x1511
fffff804`7b6949e8 fffff804`7b694b08     : ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 : 0xffff9f84`674897d0
fffff804`7b6949f0 ffff9f84`72ff1310     : fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 : 0xfffff804`7b694b08
fffff804`7b6949f8 fffff804`7b694b08     : 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 : 0xffff9f84`72ff1310
fffff804`7b694a00 00000000`00000008     : fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 : 0xfffff804`7b694b08
fffff804`7b694a08 fffff804`7b694a60     : ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 : 0x8
fffff804`7b694a10 ffff9f84`67489680     : fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 : 0xfffff804`7b694a60
fffff804`7b694a18 fffff804`b61f13f0     : 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 : 0xffff9f84`67489680
fffff804`7b694a20 0000c748`c5657ca7     : fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 : HKKbdFltr+0x13f0
fffff804`7b694a28 fffff804`b61cb618     : ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 fffff804`b61d01c8 : 0x0000c748`c5657ca7
fffff804`7b694a30 fffff804`7e2c7c11     : fffff804`7b694e70 ffff9f84`00000010 00000000`00000000 fffff804`7b30c4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`7b694b00 fffff804`7e2c6c12     : 00000000`00000000 00000000`00000001 00000000`00666b7f 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff804`7b694d00 fffff804`7e422ab5     : 00000000`00000000 fffff804`7b309180 ffff8f80`3ef24a00 00000000`00000000 : nt!KiRetireDpcList+0x2a2
fffff804`7b694fb0 fffff804`7e422890     : 00000000`00000001 fffff804`7e22bf7a 0000027c`c212b620 0000027e`04537030 : nt!KxRetireDpcList+0x5
ffff8807`2680d3a0 fffff804`7e4220d5     : 00000000`00000000 fffff804`7e41c9c1 0000027d`eedee580 ffff9f84`74e132e0 : nt!KiDispatchInterruptContinue
ffff8807`2680d3d0 fffff804`7e41c9c1     : 0000027d`eedee580 ffff9f84`74e132e0 0000027c`c2071138 ffff9f84`00000000 : nt!KiDpcInterruptBypass+0x25
ffff8807`2680d3e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22000.653

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
Aslında hiç dökümleri incelemeden direk kbdclass.sys dediğiniz için aşağıdaki konuyu atacağım. Bilgisayar modelleri tamamen aynı değil, bu yüzden bu çözümü uygulamadan önce uyarayım bu konuyla ilgili.

Ayrıca o konudaki çözümü sunan @Plyra da yardımcı olabilir, bu Monster laptopların problemini tam olarak anlamış değilim.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe20b33874998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8068f1f2fd2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1030

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4146

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5664

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 144

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  092422-13640-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffe20b33874998

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8068f1f2fd2

READ_ADDRESS: fffff80668b05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffe20b33874998

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ACOrigins.exe

DPC_STACK_BASE:  FFFFF806643FFFB0

TRAP_FRAME:  fffff806643ff7a0 -- (.trap 0xfffff806643ff7a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe208422c5540 rbx=0000000000000000 rcx=ffffe208422c5540
rdx=00000002f15af458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068f1f2fd2 rsp=fffff806643ff938 rbp=fffff806643ff9b0
 r8=00000000000000c0  r9=ffffe20833a21b60 r10=ffffe20833a21000
r11=ffffe20b33874a58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`8f1f2fd2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffe20b`33874998=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff806`643ff658 fffff806`6822d9a9     : 00000000`0000000a ffffe20b`33874998 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`643ff660 fffff806`68229b00     : 00000000`00000000 00000000`00000000 fffff806`64074180 ffffa980`55840190 : nt!KiBugCheckDispatch+0x69
fffff806`643ff7a0 fffff806`8f1f2fd2     : fffff806`8f1f57ed 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 : nt!KiPageFault+0x440
fffff806`643ff938 fffff806`8f1f57ed     : 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 fffff806`8f1b1cac : kbdclass!memcpy+0x92
fffff806`643ff940 fffff806`8f1e1511     : ffffe208`337f3aa0 fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`643ff9e0 ffffe208`337f3aa0     : fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 : HKKbdFltr+0x1511
fffff806`643ff9e8 fffff806`643ffb08     : ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 : 0xffffe208`337f3aa0
fffff806`643ff9f0 ffffe208`33a19310     : fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 : 0xfffff806`643ffb08
fffff806`643ff9f8 fffff806`643ffb08     : 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 : 0xffffe208`33a19310
fffff806`643ffa00 00000000`00000008     : fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 : 0xfffff806`643ffb08
fffff806`643ffa08 fffff806`643ffa60     : ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 : 0x8
fffff806`643ffa10 ffffe208`337f3950     : fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 : 0xfffff806`643ffa60
fffff806`643ffa18 fffff806`8f1e13f0     : 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 : 0xffffe208`337f3950
fffff806`643ffa20 000008d4`0fe59017     : fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 : HKKbdFltr+0x13f0
fffff806`643ffa28 fffff806`8f1bb618     : ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 fffff806`8f1c01c8 : 0x000008d4`0fe59017
fffff806`643ffa30 fffff806`680c7c11     : fffff806`643ffe70 ffffe208`00000010 00000000`00000000 fffff806`640774c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`643ffb00 fffff806`680c6c12     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff806`643ffd00 fffff806`68222ab5     : 00000000`00000000 fffff806`64074180 ffffa980`563b1a00 00000000`00000001 : nt!KiRetireDpcList+0x2a2
fffff806`643fffb0 fffff806`68222890     : 00000000`00000000 fffff806`6802bf7a 0000007e`971ffa60 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff818a`bc23f210 fffff806`682220d5     : 00000000`00000001 fffff806`6821c9c1 ffffe208`40908080 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff818a`bc23f240 fffff806`6821c9c1     : ffffe208`40908080 00000000`00000000 ffff818a`bc23f460 ffffd02a`819b45f6 : nt!KiDpcInterruptBypass+0x25
ffff818a`bc23f250 fffff806`6822d1d5     : 00007ff7`351c9ca0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
ffff818a`bc23f3e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xbb


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22000.653

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffcc1666b273e4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8009ebf2fd2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1389

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7032

    Key  : Analysis.Init.CPU.mSec
    Value: 108

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5427

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  092422-13656-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffcc1666b273e4

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8009ebf2fd2

READ_ADDRESS: fffff80065b05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffcc1666b273e4

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ACOrigins.exe

DPC_STACK_BASE:  FFFFF80060B33FB0

TRAP_FRAME:  fffff80060b337a0 -- (.trap 0xfffff80060b337a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc0cd71c6ac0 rbx=0000000000000000 rcx=ffffcc0cd71c6ac0
rdx=000000098f960924 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ebf2fd2 rsp=fffff80060b33938 rbp=fffff80060b339b0
 r8=00000000000000c0  r9=ffffcc0cc6bfe3b8 r10=ffffcc0cc6bfe000
r11=ffffcc1666b274a4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff800`9ebf2fd2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffcc16`66b273e4=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff800`60b33658 fffff800`6522d9a9     : 00000000`0000000a ffffcc16`66b273e4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`60b33660 fffff800`65229b00     : 00000000`00000000 00000000`00000000 fffff800`607a8180 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff800`60b337a0 fffff800`9ebf2fd2     : fffff800`9ebf57ed 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 : nt!KiPageFault+0x440
fffff800`60b33938 fffff800`9ebf57ed     : 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 fffff800`9ebb1cac : kbdclass!memcpy+0x92
fffff800`60b33940 fffff800`9ebe1511     : ffffcc0c`c6c07aa0 fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`60b339e0 ffffcc0c`c6c07aa0     : fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 : HKKbdFltr+0x1511
fffff800`60b339e8 fffff800`60b33b08     : ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 : 0xffffcc0c`c6c07aa0
fffff800`60b339f0 ffffcc0c`c6c10310     : fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 : 0xfffff800`60b33b08
fffff800`60b339f8 fffff800`60b33b08     : 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 : 0xffffcc0c`c6c10310
fffff800`60b33a00 00000000`00000008     : fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a : 0xfffff800`60b33b08
fffff800`60b33a08 fffff800`60b33a60     : ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 : 0x8
fffff800`60b33a10 ffffcc0c`c6c07950     : fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 : 0xfffff800`60b33a60
fffff800`60b33a18 fffff800`9ebe13f0     : 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 : 0xffffcc0c`c6c07950
fffff800`60b33a20 000027bf`575d7d4a     : fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 : HKKbdFltr+0x13f0
fffff800`60b33a28 fffff800`9ebbb618     : ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 fffff800`9ebc01c8 : 0x000027bf`575d7d4a
fffff800`60b33a30 fffff800`650c7c11     : fffff800`60b33e70 ffffcc0c`00000010 00000000`00000000 fffff800`607ab4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`60b33b00 fffff800`650c6c12     : 00000000`00000000 00000000`00000001 00000000`003b9b36 00000000`0000000f : nt!KiExecuteAllDpcs+0x491
fffff800`60b33d00 fffff800`65222ab5     : 00000000`00000000 fffff800`607a8180 ffff8b80`8b610a00 00000200`89cc7c88 : nt!KiRetireDpcList+0x2a2
fffff800`60b33fb0 fffff800`65222890     : ffffcc0c`dd826ae0 fffff800`6502bf7a 00000000`00000090 00000200`f3a597d0 : nt!KxRetireDpcList+0x5
ffffec8d`0f1973a0 fffff800`652220d5     : 00000200`89cc7c88 fffff800`6521c9c1 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffec8d`0f1973d0 fffff800`6521c9c1     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcc0c`00000000 : nt!KiDpcInterruptBypass+0x25
ffffec8d`0f1973e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22000.653

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9f8988122d1c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804a8da2fd2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1046

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3731

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4199

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 133

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  092422-14031-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff9f8988122d1c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804a8da2fd2

READ_ADDRESS: fffff8047ed05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9f8988122d1c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ACOrigins.exe

DPC_STACK_BASE:  FFFFF8047B694FB0

TRAP_FRAME:  fffff8047b6947a0 -- (.trap 0xfffff8047b6947a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f84740be0c0 rbx=0000000000000000 rcx=ffff9f84740be0c0
rdx=0000000514064c5c rsi=0000000000000000 rdi=0000000000000000
rip=fffff804a8da2fd2 rsp=fffff8047b694938 rbp=fffff8047b6949b0
 r8=00000000000000c0  r9=ffff9f84736ec7a8 r10=ffff9f84736ec000
r11=ffff9f8988122ddc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`a8da2fd2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff9f89`88122d1c=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff804`7b694658 fffff804`7e42d9a9     : 00000000`0000000a ffff9f89`88122d1c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`7b694660 fffff804`7e429b00     : 00000000`00000000 00000000`00000000 fffff804`7b309180 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff804`7b6947a0 fffff804`a8da2fd2     : fffff804`a8da57ed 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 : nt!KiPageFault+0x440
fffff804`7b694938 fffff804`a8da57ed     : 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 fffff804`b61c1cac : kbdclass!memcpy+0x92
fffff804`7b694940 fffff804`b61f1511     : ffff9f84`674897d0 fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`7b6949e0 ffff9f84`674897d0     : fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 : HKKbdFltr+0x1511
fffff804`7b6949e8 fffff804`7b694b08     : ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 : 0xffff9f84`674897d0
fffff804`7b6949f0 ffff9f84`72ff1310     : fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 : 0xfffff804`7b694b08
fffff804`7b6949f8 fffff804`7b694b08     : 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 : 0xffff9f84`72ff1310
fffff804`7b694a00 00000000`00000008     : fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 : 0xfffff804`7b694b08
fffff804`7b694a08 fffff804`7b694a60     : ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 : 0x8
fffff804`7b694a10 ffff9f84`67489680     : fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 : 0xfffff804`7b694a60
fffff804`7b694a18 fffff804`b61f13f0     : 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 : 0xffff9f84`67489680
fffff804`7b694a20 0000c748`c5657ca7     : fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 : HKKbdFltr+0x13f0
fffff804`7b694a28 fffff804`b61cb618     : ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 fffff804`b61d01c8 : 0x0000c748`c5657ca7
fffff804`7b694a30 fffff804`7e2c7c11     : fffff804`7b694e70 ffff9f84`00000010 00000000`00000000 fffff804`7b30c4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`7b694b00 fffff804`7e2c6c12     : 00000000`00000000 00000000`00000001 00000000`00666b7f 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff804`7b694d00 fffff804`7e422ab5     : 00000000`00000000 fffff804`7b309180 ffff8f80`3ef24a00 00000000`00000000 : nt!KiRetireDpcList+0x2a2
fffff804`7b694fb0 fffff804`7e422890     : 00000000`00000001 fffff804`7e22bf7a 0000027c`c212b620 0000027e`04537030 : nt!KxRetireDpcList+0x5
ffff8807`2680d3a0 fffff804`7e4220d5     : 00000000`00000000 fffff804`7e41c9c1 0000027d`eedee580 ffff9f84`74e132e0 : nt!KiDispatchInterruptContinue
ffff8807`2680d3d0 fffff804`7e41c9c1     : 0000027d`eedee580 ffff9f84`74e132e0 0000027c`c2071138 ffff9f84`00000000 : nt!KiDpcInterruptBypass+0x25
ffff8807`2680d3e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22000.653

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Çözüm
Aslında hiç dökümleri incelemeden direk kbdclass.sys dediğiniz için aşağıdaki konuyu atacağım. Bilgisayar modelleri tamamen aynı değil, bu yüzden bu çözümü uygulamadan önce uyarayım bu konuyla ilgili.

Ayrıca o konudaki çözümü sunan @Plyra da yardımcı olabilir, bu Monster laptopların problemini tam olarak anlamış değilim.


Dökümler:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe20b33874998, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8068f1f2fd2, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1030.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 4146.

 Key : Analysis.Init.CPU.mSec
 Value: 171.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5664.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 144.

 Key : Bugcheck.Code.DumpHeader
 Value: 0xd1.

 Key : Bugcheck.Code.Register
 Value: 0xa.

 Key : WER.OS.Branch
 Value: co_release.

 Key : WER.OS.Timestamp
 Value: 2021-06-04T16:28:00Z

 Key : WER.OS.Version
 Value: 10.0.22000.1

FILE_IN_CAB: 092422-13640-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffffe20b33874998.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8068f1f2fd2.

READ_ADDRESS: fffff80668b05450: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffffe20b33874998.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: ACOrigins.exe

DPC_STACK_BASE: FFFFF806643FFFB0.

TRAP_FRAME: fffff806643ff7a0 -- (.trap 0xfffff806643ff7a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe208422c5540 rbx=0000000000000000 rcx=ffffe208422c5540
rdx=00000002f15af458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068f1f2fd2 rsp=fffff806643ff938 rbp=fffff806643ff9b0
 r8=00000000000000c0 r9=ffffe20833a21b60 r10=ffffe20833a21000
r11=ffffe20b33874a58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
kbdclass!memcpy+0x92:
fffff806`8f1f2fd2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffe20b`33874998=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff806`643ff658 fffff806`6822d9a9 : 00000000`0000000a ffffe20b`33874998 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`643ff660 fffff806`68229b00 : 00000000`00000000 00000000`00000000 fffff806`64074180 ffffa980`55840190 : nt!KiBugCheckDispatch+0x69
fffff806`643ff7a0 fffff806`8f1f2fd2 : fffff806`8f1f57ed 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 : nt!KiPageFault+0x440
fffff806`643ff938 fffff806`8f1f57ed : 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 fffff806`8f1b1cac : kbdclass!memcpy+0x92
fffff806`643ff940 fffff806`8f1e1511 : ffffe208`337f3aa0 fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`643ff9e0 ffffe208`337f3aa0 : fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 : HKKbdFltr+0x1511
fffff806`643ff9e8 fffff806`643ffb08 : ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 : 0xffffe208`337f3aa0
fffff806`643ff9f0 ffffe208`33a19310 : fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 : 0xfffff806`643ffb08
fffff806`643ff9f8 fffff806`643ffb08 : 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 : 0xffffe208`33a19310
fffff806`643ffa00 00000000`00000008 : fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 : 0xfffff806`643ffb08
fffff806`643ffa08 fffff806`643ffa60 : ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 : 0x8.
fffff806`643ffa10 ffffe208`337f3950 : fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 : 0xfffff806`643ffa60
fffff806`643ffa18 fffff806`8f1e13f0 : 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 : 0xffffe208`337f3950
fffff806`643ffa20 000008d4`0fe59017 : fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 : HKKbdFltr+0x13f0
fffff806`643ffa28 fffff806`8f1bb618 : ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 fffff806`8f1c01c8 : 0x000008d4`0fe59017
fffff806`643ffa30 fffff806`680c7c11 : fffff806`643ffe70 ffffe208`00000010 00000000`00000000 fffff806`640774c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`643ffb00 fffff806`680c6c12 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff806`643ffd00 fffff806`68222ab5 : 00000000`00000000 fffff806`64074180 ffffa980`563b1a00 00000000`00000001 : nt!KiRetireDpcList+0x2a2
fffff806`643fffb0 fffff806`68222890 : 00000000`00000000 fffff806`6802bf7a 0000007e`971ffa60 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff818a`bc23f210 fffff806`682220d5 : 00000000`00000001 fffff806`6821c9c1 ffffe208`40908080 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff818a`bc23f240 fffff806`6821c9c1 : ffffe208`40908080 00000000`00000000 ffff818a`bc23f460 ffffd02a`819b45f6 : nt!KiDpcInterruptBypass+0x25
ffff818a`bc23f250 fffff806`6822d1d5 : 00007ff7`351c9ca0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
ffff818a`bc23f3e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xbb

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass.

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.22000.653

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 92.

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner.
---------

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffcc1666b273e4, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8009ebf2fd2, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1389.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 7032.

 Key : Analysis.Init.CPU.mSec
 Value: 108.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5427.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 134.

 Key : Bugcheck.Code.DumpHeader
 Value: 0xd1.

 Key : Bugcheck.Code.Register
 Value: 0xa.

 Key : WER.OS.Branch
 Value: co_release.

 Key : WER.OS.Timestamp
 Value: 2021-06-04T16:28:00Z

 Key : WER.OS.Version
 Value: 10.0.22000.1

FILE_IN_CAB: 092422-13656-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffffcc1666b273e4.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8009ebf2fd2.

READ_ADDRESS: fffff80065b05450: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffffcc1666b273e4.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: ACOrigins.exe

DPC_STACK_BASE: FFFFF80060B33FB0.

TRAP_FRAME: fffff80060b337a0 -- (.trap 0xfffff80060b337a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc0cd71c6ac0 rbx=0000000000000000 rcx=ffffcc0cd71c6ac0
rdx=000000098f960924 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ebf2fd2 rsp=fffff80060b33938 rbp=fffff80060b339b0
 r8=00000000000000c0 r9=ffffcc0cc6bfe3b8 r10=ffffcc0cc6bfe000
r11=ffffcc1666b274a4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
kbdclass!memcpy+0x92:
fffff800`9ebf2fd2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffcc16`66b273e4=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff800`60b33658 fffff800`6522d9a9 : 00000000`0000000a ffffcc16`66b273e4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`60b33660 fffff800`65229b00 : 00000000`00000000 00000000`00000000 fffff800`607a8180 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff800`60b337a0 fffff800`9ebf2fd2 : fffff800`9ebf57ed 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 : nt!KiPageFault+0x440
fffff800`60b33938 fffff800`9ebf57ed : 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 fffff800`9ebb1cac : kbdclass!memcpy+0x92
fffff800`60b33940 fffff800`9ebe1511 : ffffcc0c`c6c07aa0 fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`60b339e0 ffffcc0c`c6c07aa0 : fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 : HKKbdFltr+0x1511
fffff800`60b339e8 fffff800`60b33b08 : ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 : 0xffffcc0c`c6c07aa0
fffff800`60b339f0 ffffcc0c`c6c10310 : fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 : 0xfffff800`60b33b08
fffff800`60b339f8 fffff800`60b33b08 : 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 : 0xffffcc0c`c6c10310
fffff800`60b33a00 00000000`00000008 : fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a : 0xfffff800`60b33b08
fffff800`60b33a08 fffff800`60b33a60 : ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 : 0x8.
fffff800`60b33a10 ffffcc0c`c6c07950 : fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 : 0xfffff800`60b33a60
fffff800`60b33a18 fffff800`9ebe13f0 : 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 : 0xffffcc0c`c6c07950
fffff800`60b33a20 000027bf`575d7d4a : fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 : HKKbdFltr+0x13f0
fffff800`60b33a28 fffff800`9ebbb618 : ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 fffff800`9ebc01c8 : 0x000027bf`575d7d4a
fffff800`60b33a30 fffff800`650c7c11 : fffff800`60b33e70 ffffcc0c`00000010 00000000`00000000 fffff800`607ab4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`60b33b00 fffff800`650c6c12 : 00000000`00000000 00000000`00000001 00000000`003b9b36 00000000`0000000f : nt!KiExecuteAllDpcs+0x491
fffff800`60b33d00 fffff800`65222ab5 : 00000000`00000000 fffff800`607a8180 ffff8b80`8b610a00 00000200`89cc7c88 : nt!KiRetireDpcList+0x2a2
fffff800`60b33fb0 fffff800`65222890 : ffffcc0c`dd826ae0 fffff800`6502bf7a 00000000`00000090 00000200`f3a597d0 : nt!KxRetireDpcList+0x5
ffffec8d`0f1973a0 fffff800`652220d5 : 00000200`89cc7c88 fffff800`6521c9c1 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffec8d`0f1973d0 fffff800`6521c9c1 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcc0c`00000000 : nt!KiDpcInterruptBypass+0x25
ffffec8d`0f1973e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass.

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.22000.653

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 92.

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner.
---------

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9f8988122d1c, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff804a8da2fd2, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1046.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 3731.

 Key : Analysis.Init.CPU.mSec
 Value: 171.

 Key : Analysis.Init.Elapsed.mSec
 Value: 4199.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 133.

 Key : Bugcheck.Code.DumpHeader
 Value: 0xd1.

 Key : Bugcheck.Code.Register
 Value: 0xa.

 Key : WER.OS.Branch
 Value: co_release.

 Key : WER.OS.Timestamp
 Value: 2021-06-04T16:28:00Z

 Key : WER.OS.Version
 Value: 10.0.22000.1

FILE_IN_CAB: 092422-14031-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffff9f8988122d1c.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804a8da2fd2.

READ_ADDRESS: fffff8047ed05450: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffff9f8988122d1c.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: ACOrigins.exe

DPC_STACK_BASE: FFFFF8047B694FB0.

TRAP_FRAME: fffff8047b6947a0 -- (.trap 0xfffff8047b6947a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f84740be0c0 rbx=0000000000000000 rcx=ffff9f84740be0c0
rdx=0000000514064c5c rsi=0000000000000000 rdi=0000000000000000
rip=fffff804a8da2fd2 rsp=fffff8047b694938 rbp=fffff8047b6949b0
 r8=00000000000000c0 r9=ffff9f84736ec7a8 r10=ffff9f84736ec000
r11=ffff9f8988122ddc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
kbdclass!memcpy+0x92:
fffff804`a8da2fd2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9f89`88122d1c=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff804`7b694658 fffff804`7e42d9a9 : 00000000`0000000a ffff9f89`88122d1c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`7b694660 fffff804`7e429b00 : 00000000`00000000 00000000`00000000 fffff804`7b309180 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff804`7b6947a0 fffff804`a8da2fd2 : fffff804`a8da57ed 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 : nt!KiPageFault+0x440
fffff804`7b694938 fffff804`a8da57ed : 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 fffff804`b61c1cac : kbdclass!memcpy+0x92
fffff804`7b694940 fffff804`b61f1511 : ffff9f84`674897d0 fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`7b6949e0 ffff9f84`674897d0 : fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 : HKKbdFltr+0x1511
fffff804`7b6949e8 fffff804`7b694b08 : ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 : 0xffff9f84`674897d0
fffff804`7b6949f0 ffff9f84`72ff1310 : fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 : 0xfffff804`7b694b08
fffff804`7b6949f8 fffff804`7b694b08 : 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 : 0xffff9f84`72ff1310
fffff804`7b694a00 00000000`00000008 : fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 : 0xfffff804`7b694b08
fffff804`7b694a08 fffff804`7b694a60 : ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 : 0x8.
fffff804`7b694a10 ffff9f84`67489680 : fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 : 0xfffff804`7b694a60
fffff804`7b694a18 fffff804`b61f13f0 : 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 : 0xffff9f84`67489680
fffff804`7b694a20 0000c748`c5657ca7 : fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 : HKKbdFltr+0x13f0
fffff804`7b694a28 fffff804`b61cb618 : ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 fffff804`b61d01c8 : 0x0000c748`c5657ca7
fffff804`7b694a30 fffff804`7e2c7c11 : fffff804`7b694e70 ffff9f84`00000010 00000000`00000000 fffff804`7b30c4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`7b694b00 fffff804`7e2c6c12 : 00000000`00000000 00000000`00000001 00000000`00666b7f 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff804`7b694d00 fffff804`7e422ab5 : 00000000`00000000 fffff804`7b309180 ffff8f80`3ef24a00 00000000`00000000 : nt!KiRetireDpcList+0x2a2
fffff804`7b694fb0 fffff804`7e422890 : 00000000`00000001 fffff804`7e22bf7a 0000027c`c212b620 0000027e`04537030 : nt!KxRetireDpcList+0x5
ffff8807`2680d3a0 fffff804`7e4220d5 : 00000000`00000000 fffff804`7e41c9c1 0000027d`eedee580 ffff9f84`74e132e0 : nt!KiDispatchInterruptContinue
ffff8807`2680d3d0 fffff804`7e41c9c1 : 0000027d`eedee580 ffff9f84`74e132e0 0000027c`c2071138 ffff9f84`00000000 : nt!KiDpcInterruptBypass+0x25
ffff8807`2680d3e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass.

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.22000.653

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 92.

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner.
---------

Evet bu konuyu gördüm lakin çözümde açıkladığı "ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor." cümlesinden dolayı kısayollar gider diye denemek istememiştim.
 

Yeni konular

Geri
Yukarı