kbdclass.sys sürücü hatası kronik. Mesela sizin modelde.*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa71279bd5a10, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80395892f92, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2515
Key : Analysis.Elapsed.mSec
Value: 11444
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 77
Key : Analysis.Init.Elapsed.mSec
Value: 4343
Key : Analysis.Memory.CommitPeak.Mb
Value: 139
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffa71279bd5a10
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80395892f92
FILE_IN_CAB: 052823-12000-01.dmp
READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa71279bd5a10
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940
rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0
r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0
r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463
fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92
fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511
fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30
fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168
fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310
fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168
fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001
fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b
fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029
fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168
fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3
fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000
fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Çok teşekkür ederim. Control Center'i güncelliyorum şuan. Güncelleme yapacağım.Merhaba,
* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.
* Çünkü Monster laptopların bazı modellerindeki bukbdclass.syssürücü hatası kronik. Mesela sizin modelde.
* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.
* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.
Eki Görüntüle 1797606Sürücü ve İndirmeler - Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarı
Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarıwww.monsternotebook.com.tr
* Hata devam ederse Control Center'ı silin gitsin.
* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.
Çözüldü: Monster Abra V17.1 kbdclass.sys mavi ekran hatası
Şu ana kadar iki kere oldu ikisi de LoL oynarken oldu. Bilgisayarı 2 ay önce aldım. Sürücüleri aldıktan hemen sonra kurdum/güncelleştirdim. dmp dosya linki : dmp.rar Monster Abra V17.1, Windows 11 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely...www.technopat.net
* RAM'lerden biri CT8G4SFRA32A.M8FRS, diğeri CT8G4SFRA32A.M4FEA.
* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.
Döküm:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffa71279bd5a10, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff80395892f92, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2515 Key : Analysis.Elapsed.mSec Value: 11444 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 77 Key : Analysis.Init.Elapsed.mSec Value: 4343 Key : Analysis.Memory.CommitPeak.Mb Value: 139 Key : Bugcheck.Code.LegacyAPI Value: 0xd1 Key : Failure.Bucket Value: AV_kbdclass!memcpy Key : Failure.Hash Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Key : Hypervisor.Enlightenments.Value Value: 68673420 Key : Hypervisor.Enlightenments.ValueHex Value: 417df8c Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 21631230 Key : Hypervisor.Flags.ValueHex Value: 14a10fe Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: d1 BUGCHECK_P1: ffffa71279bd5a10 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80395892f92 FILE_IN_CAB: 052823-12000-01.dmp READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffa71279bd5a10 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940 rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0 r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0 r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc kbdclass!memcpy+0x92: fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=???????????????????????????????? Resetting default scope STACK_TEXT: fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463 fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92 fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511 fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30 fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168 fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310 fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168 fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001 fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029 fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168 fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3 fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000 fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner ---------
Merhaba,
* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.
* Çünkü Monster laptopların bazı modellerindeki bukbdclass.syssürücü hatası kronik. Mesela sizin modelde.
* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.
* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.
Eki Görüntüle 1797606Sürücü ve İndirmeler - Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarı
Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarıwww.monsternotebook.com.tr
* Hata devam ederse Control Center'ı silin gitsin.
* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.
Çözüldü: Monster Abra V17.1 kbdclass.sys mavi ekran hatası
Şu ana kadar iki kere oldu ikisi de LoL oynarken oldu. Bilgisayarı 2 ay önce aldım. Sürücüleri aldıktan hemen sonra kurdum/güncelleştirdim. dmp dosya linki : dmp.rar Monster Abra V17.1, Windows 11 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely...www.technopat.net
* RAM'lerden biri CT8g4sfra32a.m8frs, diğeri CT8g4sfra32a.m4fea.
* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.
Döküm:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffa71279bd5a10, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff80395892f92, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2515. Key : Analysis.Elapsed.mSec Value: 11444. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 77. Key : Analysis.Init.Elapsed.mSec Value: 4343. Key : Analysis.Memory.CommitPeak.Mb Value: 139. Key : Bugcheck.Code.LegacyAPI Value: 0xd1. Key : Failure.Bucket Value: AV_kbdclass!memcpy Key : Failure.Hash Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Key : Hypervisor.Enlightenments.Value Value: 68673420. Key : Hypervisor.Enlightenments.ValueHex Value: 417df8c. Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 21631230. Key : Hypervisor.Flags.ValueHex Value: 14a10fe. Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015. Key : Hypervisor.RootFlags.ValueHex Value: 3f7. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: d1. BUGCHECK_P1: ffffa71279bd5a10. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80395892f92. FILE_IN_CAB: 052823-12000-01.dmp READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse ffffa71279bd5a10. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940 rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0 r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0 r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc. kbdclass!memcpy+0x92: fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=???????????????????????????????? Resetting default scope. STACK_TEXT: fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463 fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92 fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511 fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30 fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168 fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310 fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168 fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001 fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029 fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168 fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3. fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000 fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass. IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 92. FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner. ---------
Merhaba,
* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.
* Çünkü Monster laptopların bazı modellerindeki bukbdclass.syssürücü hatası kronik. Mesela sizin modelde.
* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.
* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.
Eki Görüntüle 1797606Sürücü ve İndirmeler - Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarı
Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarıwww.monsternotebook.com.tr
* Hata devam ederse Control Center'ı silin gitsin.
* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.
Çözüldü: Monster Abra V17.1 kbdclass.sys mavi ekran hatası
Şu ana kadar iki kere oldu ikisi de LoL oynarken oldu. Bilgisayarı 2 ay önce aldım. Sürücüleri aldıktan hemen sonra kurdum/güncelleştirdim. dmp dosya linki : dmp.rar Monster Abra V17.1, Windows 11 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely...www.technopat.net
* RAM'lerden biri CT8g4sfra32a.m8frs, diğeri CT8g4sfra32a.m4fea.
* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.
Döküm:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffa71279bd5a10, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff80395892f92, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2515. Key : Analysis.Elapsed.mSec Value: 11444. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 77. Key : Analysis.Init.Elapsed.mSec Value: 4343. Key : Analysis.Memory.CommitPeak.Mb Value: 139. Key : Bugcheck.Code.LegacyAPI Value: 0xd1. Key : Failure.Bucket Value: AV_kbdclass!memcpy Key : Failure.Hash Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Key : Hypervisor.Enlightenments.Value Value: 68673420. Key : Hypervisor.Enlightenments.ValueHex Value: 417df8c. Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 21631230. Key : Hypervisor.Flags.ValueHex Value: 14a10fe. Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015. Key : Hypervisor.RootFlags.ValueHex Value: 3f7. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: d1. BUGCHECK_P1: ffffa71279bd5a10. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80395892f92. FILE_IN_CAB: 052823-12000-01.dmp READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse ffffa71279bd5a10. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940 rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0 r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0 r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc. kbdclass!memcpy+0x92: fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=???????????????????????????????? Resetting default scope. STACK_TEXT: fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463 fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92 fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511 fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30 fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168 fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310 fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168 fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001 fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029 fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168 fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3. fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000 fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass. IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 92. FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner. ---------
Merhaba,
* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.
* Çünkü Monster laptopların bazı modellerindeki bukbdclass.syssürücü hatası kronik. Mesela sizin modelde.
* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.
* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.
Eki Görüntüle 1797606Sürücü ve İndirmeler - Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarı
Abra A5 V16.7 Serisi 15,6" Oyun Bilgisayarıwww.monsternotebook.com.tr
* Hata devam ederse Control Center'ı silin gitsin.
* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.
Çözüldü: Monster Abra V17.1 kbdclass.sys mavi ekran hatası
Şu ana kadar iki kere oldu ikisi de LoL oynarken oldu. Bilgisayarı 2 ay önce aldım. Sürücüleri aldıktan hemen sonra kurdum/güncelleştirdim. dmp dosya linki : dmp.rar Monster Abra V17.1, Windows 11 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely...www.technopat.net
* RAM'lerden biri CT8g4sfra32a.m8frs, diğeri CT8g4sfra32a.m4fea.
* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.
Döküm:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffa71279bd5a10, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff80395892f92, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2515. Key : Analysis.Elapsed.mSec Value: 11444. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 77. Key : Analysis.Init.Elapsed.mSec Value: 4343. Key : Analysis.Memory.CommitPeak.Mb Value: 139. Key : Bugcheck.Code.LegacyAPI Value: 0xd1. Key : Failure.Bucket Value: AV_kbdclass!memcpy Key : Failure.Hash Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Key : Hypervisor.Enlightenments.Value Value: 68673420. Key : Hypervisor.Enlightenments.ValueHex Value: 417df8c. Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 21631230. Key : Hypervisor.Flags.ValueHex Value: 14a10fe. Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015. Key : Hypervisor.RootFlags.ValueHex Value: 3f7. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: d1. BUGCHECK_P1: ffffa71279bd5a10. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80395892f92. FILE_IN_CAB: 052823-12000-01.dmp READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse ffffa71279bd5a10. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940 rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0 r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0 r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc. kbdclass!memcpy+0x92: fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=???????????????????????????????? Resetting default scope. STACK_TEXT: fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463 fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92 fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511 fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30 fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168 fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310 fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168 fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001 fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029 fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168 fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3. fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000 fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass. IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 92. FAILURE_BUCKET_ID: AV_kbdclass!memcpy OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner. ---------