Monster Abra A5 V16.7 mavi Ekran Sorunu

İşletim sistemi
Windows 10

BenFuro

Hectopat
Katılım
18 Temmuz 2020
Mesajlar
285
Makaleler
2
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Öncelikle merhaba. Battlefield 1 oynarken bi anda bilgisayar donuyor ve mavi ekran hatası veriyor. 1.5 hafta önce Ram aldım bilgisayara ve Windows 11'e geçmiştim. İlk mavi ekran hatasını orda aldım. Birkaç kere tekrarlayınca kurtarma menüsünden Windows 10'a geri döndüm. Bu gün de (az önce) bu şekilde hata aldım. Minidump klasöründe sadece bu dosya vardı. Bir de fotoğraf ekliyorum hatayla ilgili, ayarlarda kurcalarken buldum. Ram'i Hepsiburada üzerinden GameGaraj satıcısından almıştım. Eğer arızalı ise değişim yaparlar mı? Şimdiden teşekkürler.

********
Sistem:
Monster Abra A5 V16.7
GTX1650 4GB
İ5-11400H
8+8GB 3200mhz Ram

Minidump dosyası:

 

Dosya Ekleri

  • 1.png
    1.png
    13,7 KB · Görüntüleme: 13
  • 2.png
    2.png
    14,7 KB · Görüntüleme: 16
  • 3.png
    3.png
    13,7 KB · Görüntüleme: 10
  • 4.png
    4.png
    13,6 KB · Görüntüleme: 9
  • 5.png
    5.png
    13,7 KB · Görüntüleme: 12
  • 6.png
    6.png
    13,4 KB · Görüntüleme: 11
  • 7.png
    7.png
    11,2 KB · Görüntüleme: 9
  • ahmet.jpg
    ahmet.jpg
    138,8 KB · Görüntüleme: 12
Son düzenleyen: Moderatör:
Merhaba,

* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.

* Çünkü Monster laptopların bazı modellerindeki bu kbdclass.sys sürücü hatası kronik. Mesela sizin modelde.

* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.

* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.

msedge_s1A44xNAlK.png


* Hata devam ederse Control Center'ı silin gitsin.

* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.



* RAM'lerden biri CT8G4SFRA32A.M8FRS, diğeri CT8G4SFRA32A.M4FEA.

* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.


Döküm:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa71279bd5a10, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80395892f92, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2515

    Key  : Analysis.Elapsed.mSec
    Value: 11444

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 77

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4343

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 139

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.Value
    Value: 68673420

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 417df8c

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffa71279bd5a10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80395892f92

FILE_IN_CAB:  052823-12000-01.dmp

READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa71279bd5a10

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940
rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0
 r8=00000000000000c0  r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0
r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff803`95892f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff803`55d85b78 fffff803`5800fd29     : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`55d85b80 fffff803`5800b8e3     : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`55d85cc0 fffff803`95892f92     : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463
fffff803`55d85e58 fffff803`958956dd     : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92
fffff803`55d85e60 fffff803`95881511     : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`55d85f00 ffffa70f`7574ce30     : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511
fffff803`55d85f08 fffff803`55d86168     : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30
fffff803`55d85f10 ffffa70f`79bcc310     : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168
fffff803`55d85f18 fffff803`55d86168     : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310
fffff803`55d85f20 00000027`00000001     : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168
fffff803`55d85f28 fffff803`5b8e129b     : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001
fffff803`55d85f30 fffff803`55d86029     : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b
fffff803`55d85fa0 fffff803`55d86168     : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029
fffff803`55d85fa8 00000000`00000003     : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168
fffff803`55d85fb0 ffffa70f`79bff000     : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3
fffff803`55d85fb8 fffff803`5b8e129b     : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000
fffff803`55d85fc0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Merhaba,

* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.

* Çünkü Monster laptopların bazı modellerindeki bu kbdclass.sys sürücü hatası kronik. Mesela sizin modelde.

* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.

* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.

Eki Görüntüle 1797606

* Hata devam ederse Control Center'ı silin gitsin.

* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.



* RAM'lerden biri CT8G4SFRA32A.M8FRS, diğeri CT8G4SFRA32A.M4FEA.

* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.


Döküm:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa71279bd5a10, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80395892f92, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2515

    Key  : Analysis.Elapsed.mSec
    Value: 11444

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 77

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4343

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 139

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.Value
    Value: 68673420

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 417df8c

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffa71279bd5a10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80395892f92

FILE_IN_CAB:  052823-12000-01.dmp

READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa71279bd5a10

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940
rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0
 r8=00000000000000c0  r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0
r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff803`95892f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff803`55d85b78 fffff803`5800fd29     : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`55d85b80 fffff803`5800b8e3     : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`55d85cc0 fffff803`95892f92     : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463
fffff803`55d85e58 fffff803`958956dd     : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92
fffff803`55d85e60 fffff803`95881511     : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`55d85f00 ffffa70f`7574ce30     : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511
fffff803`55d85f08 fffff803`55d86168     : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30
fffff803`55d85f10 ffffa70f`79bcc310     : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168
fffff803`55d85f18 fffff803`55d86168     : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310
fffff803`55d85f20 00000027`00000001     : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168
fffff803`55d85f28 fffff803`5b8e129b     : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001
fffff803`55d85f30 fffff803`55d86029     : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b
fffff803`55d85fa0 fffff803`55d86168     : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029
fffff803`55d85fa8 00000000`00000003     : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168
fffff803`55d85fb0 ffffa70f`79bff000     : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3
fffff803`55d85fb8 fffff803`5b8e129b     : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000
fffff803`55d85fc0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
Çok teşekkür ederim. Control Center'i güncelliyorum şuan. Güncelleme yapacağım.

Merhaba,

* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.

* Çünkü Monster laptopların bazı modellerindeki bu kbdclass.sys sürücü hatası kronik. Mesela sizin modelde.

* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.

* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.

Eki Görüntüle 1797606

* Hata devam ederse Control Center'ı silin gitsin.

* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.


* RAM'lerden biri CT8g4sfra32a.m8frs, diğeri CT8g4sfra32a.m4fea.

* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.

Döküm:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa71279bd5a10, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80395892f92, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2515.

 Key : Analysis.Elapsed.mSec
 Value: 11444.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 77.

 Key : Analysis.Init.Elapsed.mSec
 Value: 4343.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 139.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Failure.Bucket
 Value: AV_kbdclass!memcpy

 Key : Failure.Hash
 Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

 Key : Hypervisor.Enlightenments.Value
 Value: 68673420.

 Key : Hypervisor.Enlightenments.ValueHex
 Value: 417df8c.

 Key : Hypervisor.Flags.AnyHypervisorPresent
 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened
 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable
 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint
 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested
 Value: 0

 Key : Hypervisor.Flags.CpuManager
 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi
 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled
 Value: 1

 Key : Hypervisor.Flags.Epf
 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks
 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable
 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber
 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl
 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush
 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing
 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone
 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos
 Value: 0

 Key : Hypervisor.Flags.RootScheduler
 Value: 0

 Key : Hypervisor.Flags.SynicAvailable
 Value: 1

 Key : Hypervisor.Flags.UseQpcBias
 Value: 0

 Key : Hypervisor.Flags.Value
 Value: 21631230.

 Key : Hypervisor.Flags.ValueHex
 Value: 14a10fe.

 Key : Hypervisor.Flags.VpAssistPage
 Value: 1

 Key : Hypervisor.Flags.VsmAvailable
 Value: 1

 Key : Hypervisor.RootFlags.AccessStats
 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor
 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading
 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync
 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV
 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt
 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.Nested
 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor
 Value: 1

 Key : Hypervisor.RootFlags.Value
 Value: 1015.

 Key : Hypervisor.RootFlags.ValueHex
 Value: 3f7.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffffa71279bd5a10.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80395892f92.

FILE_IN_CAB: 052823-12000-01.dmp

READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffffa71279bd5a10.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940
rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0
 r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0
r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
kbdclass!memcpy+0x92:
fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463
fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92
fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511
fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30
fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168
fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310
fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168
fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001
fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b
fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029
fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168
fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3.
fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000
fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass.

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 92.

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner.
---------

Güncelleme:
Şu an aynı hatayı tekrar aldım. Dediğiniz konuya gidip oradaki işlemleri deneyeceğim.

Merhaba,

* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.

* Çünkü Monster laptopların bazı modellerindeki bu kbdclass.sys sürücü hatası kronik. Mesela sizin modelde.

* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.

* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.

Eki Görüntüle 1797606

* Hata devam ederse Control Center'ı silin gitsin.

* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.


* RAM'lerden biri CT8g4sfra32a.m8frs, diğeri CT8g4sfra32a.m4fea.

* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.

Döküm:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa71279bd5a10, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80395892f92, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2515.

 Key : Analysis.Elapsed.mSec
 Value: 11444.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 77.

 Key : Analysis.Init.Elapsed.mSec
 Value: 4343.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 139.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Failure.Bucket
 Value: AV_kbdclass!memcpy

 Key : Failure.Hash
 Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

 Key : Hypervisor.Enlightenments.Value
 Value: 68673420.

 Key : Hypervisor.Enlightenments.ValueHex
 Value: 417df8c.

 Key : Hypervisor.Flags.AnyHypervisorPresent
 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened
 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable
 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint
 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested
 Value: 0

 Key : Hypervisor.Flags.CpuManager
 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi
 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled
 Value: 1

 Key : Hypervisor.Flags.Epf
 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks
 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable
 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber
 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl
 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush
 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing
 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone
 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos
 Value: 0

 Key : Hypervisor.Flags.RootScheduler
 Value: 0

 Key : Hypervisor.Flags.SynicAvailable
 Value: 1

 Key : Hypervisor.Flags.UseQpcBias
 Value: 0

 Key : Hypervisor.Flags.Value
 Value: 21631230.

 Key : Hypervisor.Flags.ValueHex
 Value: 14a10fe.

 Key : Hypervisor.Flags.VpAssistPage
 Value: 1

 Key : Hypervisor.Flags.VsmAvailable
 Value: 1

 Key : Hypervisor.RootFlags.AccessStats
 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor
 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading
 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync
 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV
 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt
 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.Nested
 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor
 Value: 1

 Key : Hypervisor.RootFlags.Value
 Value: 1015.

 Key : Hypervisor.RootFlags.ValueHex
 Value: 3f7.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffffa71279bd5a10.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80395892f92.

FILE_IN_CAB: 052823-12000-01.dmp

READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffffa71279bd5a10.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940
rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0
 r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0
r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
kbdclass!memcpy+0x92:
fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463
fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92
fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511
fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30
fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168
fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310
fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168
fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001
fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b
fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029
fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168
fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3.
fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000
fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass.

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 92.

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner.
---------

Güncelleme:
Şu an aynı hatayı tekrar aldım. Dediğiniz konuya gidip oradaki işlemleri deneyeceğim.

Merhaba,

* RAM değişimi ve Windows 11'e yükseltme gibi konular da şüpheliler arasında ancak olay başka gibi gözüküyor.

* Çünkü Monster laptopların bazı modellerindeki bu kbdclass.sys sürücü hatası kronik. Mesela sizin modelde.

* Bu hata Monster'ın Control Center programından kaynaklanıyor genelde.

* Control Center varsa bu programı silin.
* Daha sonra güncel sürümü indirin ve kurun. 23 Mart 2023'te güncelleme gelmiş.

Eki Görüntüle 1797606

* Hata devam ederse Control Center'ı silin gitsin.

* Programı kaldırmanıza rağmen fotoğrafını çektiğiniz yine aynı "kbdclass.sys" ile olan mavi ekran geliyorsa aşağıdaki çözümü uygulamanız gerekecek.


* RAM'lerden biri CT8g4sfra32a.m8frs, diğeri CT8g4sfra32a.m4fea.

* Yani aynısını aldığınız için RAM ile alakalı bir problem olacağını sanmıyorum. Kit şeklinde değil tabii ama en azından aynı model, aynı frekans, aynı CL ve timing değerlerine sahipler.

Döküm:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa71279bd5a10, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80395892f92, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2515.

 Key : Analysis.Elapsed.mSec
 Value: 11444.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 77.

 Key : Analysis.Init.Elapsed.mSec
 Value: 4343.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 139.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Failure.Bucket
 Value: AV_kbdclass!memcpy

 Key : Failure.Hash
 Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

 Key : Hypervisor.Enlightenments.Value
 Value: 68673420.

 Key : Hypervisor.Enlightenments.ValueHex
 Value: 417df8c.

 Key : Hypervisor.Flags.AnyHypervisorPresent
 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened
 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable
 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint
 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested
 Value: 0

 Key : Hypervisor.Flags.CpuManager
 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi
 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled
 Value: 1

 Key : Hypervisor.Flags.Epf
 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks
 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable
 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber
 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl
 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush
 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing
 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone
 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos
 Value: 0

 Key : Hypervisor.Flags.RootScheduler
 Value: 0

 Key : Hypervisor.Flags.SynicAvailable
 Value: 1

 Key : Hypervisor.Flags.UseQpcBias
 Value: 0

 Key : Hypervisor.Flags.Value
 Value: 21631230.

 Key : Hypervisor.Flags.ValueHex
 Value: 14a10fe.

 Key : Hypervisor.Flags.VpAssistPage
 Value: 1

 Key : Hypervisor.Flags.VsmAvailable
 Value: 1

 Key : Hypervisor.RootFlags.AccessStats
 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor
 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading
 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync
 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV
 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt
 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.Nested
 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor
 Value: 1

 Key : Hypervisor.RootFlags.Value
 Value: 1015.

 Key : Hypervisor.RootFlags.ValueHex
 Value: 3f7.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffffa71279bd5a10.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80395892f92.

FILE_IN_CAB: 052823-12000-01.dmp

READ_ADDRESS: fffff803588fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffffa71279bd5a10.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffff80355d85cc0 -- (.trap 0xfffff80355d85cc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f98884940 rbx=0000000000000000 rcx=ffffa70f98884940
rdx=00000002e13510d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80395892f92 rsp=fffff80355d85e58 rbp=fffff80355d85ed0
 r8=00000000000000c0 r9=ffffa70f79bca0a8 r10=ffffa70f79bca2a0
r11=ffffa71279bd5ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
kbdclass!memcpy+0x92:
fffff803`95892f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa712`79bd5a10=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff803`55d85b78 fffff803`5800fd29 : 00000000`0000000a ffffa712`79bd5a10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`55d85b80 fffff803`5800b8e3 : ffffa70f`80ade770 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`55d85cc0 fffff803`95892f92 : fffff803`958956dd 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 : nt!KiPageFault+0x463
fffff803`55d85e58 fffff803`958956dd : 00000000`00000450 fffff803`55d85ed0 ffffa70f`799efa20 00000000`00175d83 : kbdclass!memcpy+0x92
fffff803`55d85e60 fffff803`95881511 : ffffa70f`7574ce30 fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`55d85f00 ffffa70f`7574ce30 : fffff803`55d86168 ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 : HKKbdFltr+0x1511
fffff803`55d85f08 fffff803`55d86168 : ffffa70f`79bcc310 fffff803`55d86168 00000027`00000001 fffff803`5b8e129b : 0xffffa70f`7574ce30
fffff803`55d85f10 ffffa70f`79bcc310 : fffff803`55d86168 00000027`00000001 fffff803`5b8e129b 00000000`00000000 : 0xfffff803`55d86168
fffff803`55d85f18 fffff803`55d86168 : 00000027`00000001 fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 : 0xffffa70f`79bcc310
fffff803`55d85f20 00000027`00000001 : fffff803`5b8e129b 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 : 0xfffff803`55d86168
fffff803`55d85f28 fffff803`5b8e129b : 00000000`00000000 ffffa70f`79bd5e60 0000746c`89ab8d10 fffff803`76be1d45 : 0x00000027`00000001
fffff803`55d85f30 fffff803`55d86029 : fffff803`55d86168 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b : WppRecorder!WppAutoLogTrace+0x16b
fffff803`55d85fa0 fffff803`55d86168 : 00000000`00000003 ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 : 0xfffff803`55d86029
fffff803`55d85fa8 00000000`00000003 : ffffa70f`79bff000 fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 : 0xfffff803`55d86168
fffff803`55d85fb0 ffffa70f`79bff000 : fffff803`5b8e129b 00000000`00000051 fffff803`55d86028 00000000`00000008 : 0x3.
fffff803`55d85fb8 fffff803`5b8e129b : 00000000`00000051 fffff803`55d86028 00000000`00000008 fffff803`55d86030 : 0xffffa70f`79bff000
fffff803`55d85fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogTrace+0x16b

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass.

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 92.

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner.
---------

Güncelleme:
Şu an aynı hatayı tekrar aldım. Dediğiniz konuya gidip oradaki işlemleri deneyeceğim.
 
Son düzenleme:

Yeni konular

Geri
Yukarı