onlyhelly
Hectopat
- Katılım
- 5 Haziran 2020
- Mesajlar
- 12
- İşlemci
- İntel i5 11400
minidump - Google Drive
drive.google.com
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc30bb5582f4c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8044f2a32d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2156
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4321
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 389
Key : Analysis.Init.Elapsed.mSec
Value: 1985
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 042623-17812-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffc30bb5582f4c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8044f2a32d2
READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc30bb5582f4c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
DPC_STACK_BASE: FFFFF8040D49DFB0
TRAP_FRAME: fffff8040d49d470 -- (.trap 0xfffff8040d49d470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400
rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680
r8=00000000000000c0 r9=0000000000000038 r10=ffffc3039af31000
r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`4f2a32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff804`0d49d328 fffff804`08e3e9a9 : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`0d49d330 fffff804`08e3a034 : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69
fffff804`0d49d470 fffff804`4f2a32d2 : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474
fffff804`0d49d608 fffff804`4f2a5b5d : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92
fffff804`0d49d610 fffff804`4f291511 : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`0d49d6b0 ffffc303`97159510 : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`0d49d6b8 fffff804`0d49d7d8 : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510
fffff804`0d49d6c0 ffffc303`a7fd1310 : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8
fffff804`0d49d6c8 fffff804`0d49d7d8 : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310
fffff804`0d49d6d0 00000000`00000008 : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8
fffff804`0d49d6d8 fffff804`0d49d730 : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8
fffff804`0d49d6e0 ffffc303`971593c0 : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730
fffff804`0d49d6e8 fffff804`4f2913f0 : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0
fffff804`0d49d6f0 fffff804`04b73180 : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0
fffff804`0d49d6f8 fffff804`4f26b848 : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180
fffff804`0d49d700 fffff804`08c2a1da : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`0d49d7d0 fffff804`08c299e4 : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff804`0d49dd20 fffff804`08e32815 : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4
fffff804`0d49dfb0 fffff804`08e327bf : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff890b`2e57f2b0 fffff804`08c2c0c9 : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn
ffff890b`2e57f2c0 fffff804`08e31f8b : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
ffff890b`2e57f3b0 fffff804`08e2b5c1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff890b`2e57f3e0 00007ff7`f117862b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000002e`ac5dfd30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23435.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
0: kd> lmvm kbdclass
Browse full module list
start end module name
fffff804`4f2a0000 fffff804`4f2b5000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb
Loaded symbol image file: kbdclass.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys
Image path: \SystemRoot\System32\drivers\kbdclass.sys
Image name: kbdclass.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 3D8A7081 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0001CDCA
ImageSize: 00015000
File version: 10.0.23435.1000
Product version: 10.0.23435.1000
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: kbdclass.sys
OriginalFilename: kbdclass.sys
ProductVersion: 10.0.23435.1000
FileVersion: 10.0.23435.1000 (WinBuild.160101.0800)
FileDescription: Keyboard Class Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc30bb5582f4c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8044f2a32d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2156
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4321
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 389
Key : Analysis.Init.Elapsed.mSec
Value: 1985
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 042623-17812-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffc30bb5582f4c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8044f2a32d2
READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc30bb5582f4c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
DPC_STACK_BASE: FFFFF8040D49DFB0
TRAP_FRAME: fffff8040d49d470 -- (.trap 0xfffff8040d49d470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400
rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680
r8=00000000000000c0 r9=0000000000000038 r10=ffffc3039af31000
r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`4f2a32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff804`0d49d328 fffff804`08e3e9a9 : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`0d49d330 fffff804`08e3a034 : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69
fffff804`0d49d470 fffff804`4f2a32d2 : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474
fffff804`0d49d608 fffff804`4f2a5b5d : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92
fffff804`0d49d610 fffff804`4f291511 : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`0d49d6b0 ffffc303`97159510 : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`0d49d6b8 fffff804`0d49d7d8 : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510
fffff804`0d49d6c0 ffffc303`a7fd1310 : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8
fffff804`0d49d6c8 fffff804`0d49d7d8 : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310
fffff804`0d49d6d0 00000000`00000008 : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8
fffff804`0d49d6d8 fffff804`0d49d730 : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8
fffff804`0d49d6e0 ffffc303`971593c0 : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730
fffff804`0d49d6e8 fffff804`4f2913f0 : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0
fffff804`0d49d6f0 fffff804`04b73180 : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0
fffff804`0d49d6f8 fffff804`4f26b848 : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180
fffff804`0d49d700 fffff804`08c2a1da : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`0d49d7d0 fffff804`08c299e4 : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff804`0d49dd20 fffff804`08e32815 : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4
fffff804`0d49dfb0 fffff804`08e327bf : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff890b`2e57f2b0 fffff804`08c2c0c9 : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn
ffff890b`2e57f2c0 fffff804`08e31f8b : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
ffff890b`2e57f3b0 fffff804`08e2b5c1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff890b`2e57f3e0 00007ff7`f117862b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000002e`ac5dfd30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23435.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
0: kd> lmvm kbdclass
Browse full module list
start end module name
fffff804`4f2a0000 fffff804`4f2b5000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb
Loaded symbol image file: kbdclass.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys
Image path: \SystemRoot\System32\drivers\kbdclass.sys
Image name: kbdclass.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 3D8A7081 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0001CDCA
ImageSize: 00015000
File version: 10.0.23435.1000
Product version: 10.0.23435.1000
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: kbdclass.sys
OriginalFilename: kbdclass.sys
ProductVersion: 10.0.23435.1000
FileVersion: 10.0.23435.1000 (WinBuild.160101.0800)
FileDescription: Keyboard Class Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
@TheEasTurco öncelikle bilmediğimiz konularda yanlış yönlendirme yapmayalım. Ekran kartı ile alakalı bir sorun yok.
@onlyhelly Sorununuz asıl kaynağı " kbdclass.sys " dosyasıdır. Bu SYS dosyası da Monster Control Center uygulaması ile özelleştirdiğiniz klavyenize bağlı bir SYS dosyasıdır. Kısaca Monster Control Center uygulamasını silerseniz sorunun çözüleceğini görebilirsiniz silmek istemiyorum diyorsanız şu çözüm yolunu deneyin.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.
Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.
Kod:0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffc30bb5582f4c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8044f2a32d2, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2156 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4321 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 389 Key : Analysis.Init.Elapsed.mSec Value: 1985 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : Bugcheck.Code.DumpHeader Value: 0xd1 Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: ni_release Key : WER.OS.Timestamp Value: 2022-05-06T12:50:00Z Key : WER.OS.Version Value: 10.0.22621.1 FILE_IN_CAB: 042623-17812-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b BUGCHECK_CODE: d1 BUGCHECK_P1: ffffc30bb5582f4c BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8044f2a32d2 READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffc30bb5582f4c BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VALORANT-Win64-Shipping.exe DPC_STACK_BASE: FFFFF8040D49DFB0 TRAP_FRAME: fffff8040d49d470 -- (.trap 0xfffff8040d49d470) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400 rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000 rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680 r8=00000000000000c0 r9=0000000000000038 r10=ffffc3039af31000 r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc kbdclass!memcpy+0x92: fffff804`4f2a32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=???????????????????????????????? Resetting default scope STACK_TEXT: fffff804`0d49d328 fffff804`08e3e9a9 : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff804`0d49d330 fffff804`08e3a034 : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69 fffff804`0d49d470 fffff804`4f2a32d2 : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474 fffff804`0d49d608 fffff804`4f2a5b5d : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92 fffff804`0d49d610 fffff804`4f291511 : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d fffff804`0d49d6b0 ffffc303`97159510 : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511 fffff804`0d49d6b8 fffff804`0d49d7d8 : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510 fffff804`0d49d6c0 ffffc303`a7fd1310 : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8 fffff804`0d49d6c8 fffff804`0d49d7d8 : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310 fffff804`0d49d6d0 00000000`00000008 : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8 fffff804`0d49d6d8 fffff804`0d49d730 : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8 fffff804`0d49d6e0 ffffc303`971593c0 : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730 fffff804`0d49d6e8 fffff804`4f2913f0 : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0 fffff804`0d49d6f0 fffff804`04b73180 : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0 fffff804`0d49d6f8 fffff804`4f26b848 : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180 fffff804`0d49d700 fffff804`08c2a1da : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8 fffff804`0d49d7d0 fffff804`08c299e4 : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a fffff804`0d49dd20 fffff804`08e32815 : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4 fffff804`0d49dfb0 fffff804`08e327bf : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5 ffff890b`2e57f2b0 fffff804`08c2c0c9 : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn ffff890b`2e57f2c0 fffff804`08e31f8b : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9 ffff890b`2e57f3b0 fffff804`08e2b5c1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b ffff890b`2e57f3e0 00007ff7`f117862b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1 0000002e`ac5dfd30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.23435.1000 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner --------- 0: kd> lmvm kbdclass Browse full module list start end module name fffff804`4f2a0000 fffff804`4f2b5000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb Loaded symbol image file: kbdclass.sys Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys Image path: \SystemRoot\System32\drivers\kbdclass.sys Image name: kbdclass.sys Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 3D8A7081 (This is a reproducible build file hash, not a timestamp) CheckSum: 0001CDCA ImageSize: 00015000 File version: 10.0.23435.1000 Product version: 10.0.23435.1000 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: kbdclass.sys OriginalFilename: kbdclass.sys ProductVersion: 10.0.23435.1000 FileVersion: 10.0.23435.1000 (WinBuild.160101.0800) FileDescription: Keyboard Class Driver LegalCopyright: © Microsoft Corporation. All rights reserved.
Merhaba çözüm yönteminiz için sağ olun ama söylediğiniz dosyaları bulamıyorum nerede olması gerek
Windows tuşu+R
komutu çalıştır penceresinden Regedit yazın ve Tamam'a tıklayın. Önünüze gelecek.Hocam ben bu konuyu biliyorum yanlışlık olmuş olabilir kusura bakmayın.Yazmayı unutmuşumWindows tuşu+R
komutu çalıştır penceresinden Regedit yazın ve Tamam'a tıklayın. Önünüze gelecek.
Hocam ben bu konuyu biliyorum yanlışlık olmuş olabilir kusura bakmayın.
@TheEasTurco öncelikle bilmediğimiz konularda yanlış yönlendirme yapmayalım. Ekran kartı ile alakalı bir sorun yok.
@onlyhelly Sorununuz asıl kaynağı " kbdclass.sys " dosyasıdır. Bu SYS dosyası da Monster Control Center uygulaması ile özelleştirdiğiniz klavyenize bağlı bir SYS dosyasıdır. Kısaca Monster Control Center uygulamasını silerseniz sorunun çözüleceğini görebilirsiniz silmek istemiyorum diyorsanız şu çözüm yolunu deneyin.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.
Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.
Kod:0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffc30bb5582f4c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8044f2a32d2, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2156 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4321 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 389 Key : Analysis.Init.Elapsed.mSec Value: 1985 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : Bugcheck.Code.DumpHeader Value: 0xd1 Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: ni_release Key : WER.OS.Timestamp Value: 2022-05-06T12:50:00Z Key : WER.OS.Version Value: 10.0.22621.1 FILE_IN_CAB: 042623-17812-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b BUGCHECK_CODE: d1 BUGCHECK_P1: ffffc30bb5582f4c BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8044f2a32d2 READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffc30bb5582f4c BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VALORANT-Win64-Shipping.exe DPC_STACK_BASE: FFFFF8040D49DFB0 TRAP_FRAME: fffff8040d49d470 -- (.trap 0xfffff8040d49d470) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400 rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000 rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680 r8=00000000000000c0 r9=0000000000000038 r10=ffffc3039af31000 r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc kbdclass!memcpy+0x92: fffff804`4f2a32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=???????????????????????????????? Resetting default scope STACK_TEXT: fffff804`0d49d328 fffff804`08e3e9a9 : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff804`0d49d330 fffff804`08e3a034 : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69 fffff804`0d49d470 fffff804`4f2a32d2 : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474 fffff804`0d49d608 fffff804`4f2a5b5d : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92 fffff804`0d49d610 fffff804`4f291511 : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d fffff804`0d49d6b0 ffffc303`97159510 : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511 fffff804`0d49d6b8 fffff804`0d49d7d8 : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510 fffff804`0d49d6c0 ffffc303`a7fd1310 : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8 fffff804`0d49d6c8 fffff804`0d49d7d8 : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310 fffff804`0d49d6d0 00000000`00000008 : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8 fffff804`0d49d6d8 fffff804`0d49d730 : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8 fffff804`0d49d6e0 ffffc303`971593c0 : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730 fffff804`0d49d6e8 fffff804`4f2913f0 : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0 fffff804`0d49d6f0 fffff804`04b73180 : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0 fffff804`0d49d6f8 fffff804`4f26b848 : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180 fffff804`0d49d700 fffff804`08c2a1da : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8 fffff804`0d49d7d0 fffff804`08c299e4 : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a fffff804`0d49dd20 fffff804`08e32815 : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4 fffff804`0d49dfb0 fffff804`08e327bf : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5 ffff890b`2e57f2b0 fffff804`08c2c0c9 : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn ffff890b`2e57f2c0 fffff804`08e31f8b : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9 ffff890b`2e57f3b0 fffff804`08e2b5c1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b ffff890b`2e57f3e0 00007ff7`f117862b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1 0000002e`ac5dfd30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.23435.1000 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner --------- 0: kd> lmvm kbdclass Browse full module list start end module name fffff804`4f2a0000 fffff804`4f2b5000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb Loaded symbol image file: kbdclass.sys Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys Image path: \SystemRoot\System32\drivers\kbdclass.sys Image name: kbdclass.sys Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 3D8A7081 (This is a reproducible build file hash, not a timestamp) CheckSum: 0001CDCA ImageSize: 00015000 File version: 10.0.23435.1000 Product version: 10.0.23435.1000 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: kbdclass.sys OriginalFilename: kbdclass.sys ProductVersion: 10.0.23435.1000 FileVersion: 10.0.23435.1000 (WinBuild.160101.0800) FileDescription: Keyboard Class Driver LegalCopyright: © Microsoft Corporation. All rights reserved.
rica ederim.Çok sağ olun sorunum neredeyse 1 yıl sonunda çözüldü.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.