Çözüldü RTX 3050 Ti sistemde mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 11

brtgu

Femtopat
Katılım
20 Mart 2023
Mesajlar
19
Daha fazla  
Cinsiyet
Erkek
RAM
SAMSUNG 3200MHz 16GB RAM 22 CL
SSD veya HDD modeli
SAMSUNG MZVL4512HBLU-OOB07 SSD
Ekran kartı
NVIDIA GeForce RTX 3050 Ti Laptop GPU
Anakart
Sistem Modeli: ABRA A5 17.2
İşlemci
11th Gen Intel(R) Core(TM) i5-11400H
Bilgisayarı yaklaşık 4 aydır kullanıyorum FreeDOS olarak alıp kendim Windows 11 kurmuştum arada bir mavi ekran hatası alıyorum. Bu sıklık bazen 3 günde bir bazen 2 haftada bir oluyordu. Genelde oyun oynarken oluyor. Dün yine oyun oynarken mavi ekran hatası aldım ve daha kapsamlı araştırmaya karar verdim. Yardımcı olur musunuz?
minidump


Not: Dün yaşadığım minidumpı atabildim sadece öncekileri arşive ekleyemedim.

Format atsam düzelir mi?
 
Son düzenleyen: Moderatör:
Çözüm
kbdclass.sys Monster yazılımı kaynaklı. Çözümünü paylaşıyorum. Ya Monster yazılımlarını cihazdan kaldıracaksınız. Monster Control Center'ya da alttaki çözümü deneyeceksiniz. Eğer alttaki çözüm işinize yaramazsa Monster yazılımlarını kaldırın.

Kod:
(Plyra 15 Haziran 2022)
Regediti açın.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8291a57d3940, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8005b8a32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3671

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8141

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  060423-21265-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8291a57d3940

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8005b8a32d2

READ_ADDRESS: fffff8001751c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8291a57d3940

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80019bc59f0 -- (.trap 0xfffff80019bc59f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828a974ac940 rbx=0000000000000000 rcx=ffff828a974ac940
rdx=000000070e327000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005b8a32d2 rsp=fffff80019bc5b88 rbp=fffff80019bc5c00
 r8=00000000000000c0  r9=0000000000000038 r10=ffff828a69edc000
r11=ffff8291a57d3a00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff800`5b8a32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8291`a57d3940=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff800`19bc58a8 fffff800`16c417a9     : 00000000`0000000a ffff8291`a57d3940 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`19bc58b0 fffff800`16c3ce34     : 00021a13`a5ac837c 00000000`00000000 ffff828a`69df2180 fffff800`2cc12ac2 : nt!KiBugCheckDispatch+0x69
fffff800`19bc59f0 fffff800`5b8a32d2     : fffff800`5b8a5b5d 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 : nt!KiPageFault+0x474
fffff800`19bc5b88 fffff800`5b8a5b5d     : 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 fffff800`5b862d5c : kbdclass!memcpy+0x92
fffff800`19bc5b90 fffff800`5b891511     : ffff828a`69dcc190 fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`19bc5c30 ffff828a`69dcc190     : fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 : HKKbdFltr+0x1511
fffff800`19bc5c38 fffff800`19bc5d58     : ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 : 0xffff828a`69dcc190
fffff800`19bc5c40 ffff828a`69d98310     : fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 : 0xfffff800`19bc5d58
fffff800`19bc5c48 fffff800`19bc5d58     : 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 : 0xffff828a`69d98310
fffff800`19bc5c50 00000000`00000008     : fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 : 0xfffff800`19bc5d58
fffff800`19bc5c58 fffff800`19bc5cb0     : ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 : 0x8
fffff800`19bc5c60 ffff828a`69dcc040     : fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 : 0xfffff800`19bc5cb0
fffff800`19bc5c68 fffff800`5b8913f0     : fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 : 0xffff828a`69dcc040
fffff800`19bc5c70 fffff800`10ecb180     : fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 : HKKbdFltr+0x13f0
fffff800`19bc5c78 fffff800`5b86b848     : ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 fffff800`5b870258 : 0xfffff800`10ecb180
fffff800`19bc5c80 fffff800`16ab3f6c     : 00000000`00000000 ffffb900`00000010 00000000`00000000 ffffb900`241c2970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`19bc5d50 fffff800`16ab2f5a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
fffff800`19bc6290 fffff800`16c30eee     : 00000000`00000000 fffff800`10ecb180 fffff800`1754c6c0 ffff828a`729bd080 : nt!KiRetireDpcList+0x1ba
fffff800`19bc6540 00000000`00000000     : fffff800`19bc7000 fffff800`19bc0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23435.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
kbdclass.sys Monster yazılımı kaynaklı. Çözümünü paylaşıyorum. Ya Monster yazılımlarını cihazdan kaldıracaksınız. Monster Control Center'ya da alttaki çözümü deneyeceksiniz. Eğer alttaki çözüm işinize yaramazsa Monster yazılımlarını kaldırın.

Kod:
(Plyra 15 Haziran 2022)
Regediti açın.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8291a57d3940, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8005b8a32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3671

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8141

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  060423-21265-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8291a57d3940

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8005b8a32d2

READ_ADDRESS: fffff8001751c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8291a57d3940

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80019bc59f0 -- (.trap 0xfffff80019bc59f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828a974ac940 rbx=0000000000000000 rcx=ffff828a974ac940
rdx=000000070e327000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005b8a32d2 rsp=fffff80019bc5b88 rbp=fffff80019bc5c00
 r8=00000000000000c0  r9=0000000000000038 r10=ffff828a69edc000
r11=ffff8291a57d3a00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff800`5b8a32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8291`a57d3940=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff800`19bc58a8 fffff800`16c417a9     : 00000000`0000000a ffff8291`a57d3940 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`19bc58b0 fffff800`16c3ce34     : 00021a13`a5ac837c 00000000`00000000 ffff828a`69df2180 fffff800`2cc12ac2 : nt!KiBugCheckDispatch+0x69
fffff800`19bc59f0 fffff800`5b8a32d2     : fffff800`5b8a5b5d 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 : nt!KiPageFault+0x474
fffff800`19bc5b88 fffff800`5b8a5b5d     : 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 fffff800`5b862d5c : kbdclass!memcpy+0x92
fffff800`19bc5b90 fffff800`5b891511     : ffff828a`69dcc190 fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`19bc5c30 ffff828a`69dcc190     : fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 : HKKbdFltr+0x1511
fffff800`19bc5c38 fffff800`19bc5d58     : ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 : 0xffff828a`69dcc190
fffff800`19bc5c40 ffff828a`69d98310     : fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 : 0xfffff800`19bc5d58
fffff800`19bc5c48 fffff800`19bc5d58     : 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 : 0xffff828a`69d98310
fffff800`19bc5c50 00000000`00000008     : fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 : 0xfffff800`19bc5d58
fffff800`19bc5c58 fffff800`19bc5cb0     : ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 : 0x8
fffff800`19bc5c60 ffff828a`69dcc040     : fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 : 0xfffff800`19bc5cb0
fffff800`19bc5c68 fffff800`5b8913f0     : fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 : 0xffff828a`69dcc040
fffff800`19bc5c70 fffff800`10ecb180     : fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 : HKKbdFltr+0x13f0
fffff800`19bc5c78 fffff800`5b86b848     : ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 fffff800`5b870258 : 0xfffff800`10ecb180
fffff800`19bc5c80 fffff800`16ab3f6c     : 00000000`00000000 ffffb900`00000010 00000000`00000000 ffffb900`241c2970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`19bc5d50 fffff800`16ab2f5a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
fffff800`19bc6290 fffff800`16c30eee     : 00000000`00000000 fffff800`10ecb180 fffff800`1754c6c0 ffff828a`729bd080 : nt!KiRetireDpcList+0x1ba
fffff800`19bc6540 00000000`00000000     : fffff800`19bc7000 fffff800`19bc0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23435.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Çözüm
İlk yönergeyi uyguladım 2.kodu cmdye mi yapıştırmam gerekiyor?

bilgilendirme için teşekkürler bu arada @lazye

kbdclass.sys Monster yazılımı kaynaklı. Çözümünü paylaşıyorum. Ya Monster yazılımlarını cihazdan kaldıracaksınız. Monster Control Center'ya da alttaki çözümü deneyeceksiniz. Eğer alttaki çözüm işinize yaramazsa Monster yazılımlarını kaldırın.

Kod:
(Plyra 15 Haziran 2022)
Regediti açın.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8291a57d3940, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8005b8a32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3671

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8141

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  060423-21265-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8291a57d3940

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8005b8a32d2

READ_ADDRESS: fffff8001751c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8291a57d3940

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80019bc59f0 -- (.trap 0xfffff80019bc59f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828a974ac940 rbx=0000000000000000 rcx=ffff828a974ac940
rdx=000000070e327000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005b8a32d2 rsp=fffff80019bc5b88 rbp=fffff80019bc5c00
 r8=00000000000000c0  r9=0000000000000038 r10=ffff828a69edc000
r11=ffff8291a57d3a00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff800`5b8a32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8291`a57d3940=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff800`19bc58a8 fffff800`16c417a9     : 00000000`0000000a ffff8291`a57d3940 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`19bc58b0 fffff800`16c3ce34     : 00021a13`a5ac837c 00000000`00000000 ffff828a`69df2180 fffff800`2cc12ac2 : nt!KiBugCheckDispatch+0x69
fffff800`19bc59f0 fffff800`5b8a32d2     : fffff800`5b8a5b5d 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 : nt!KiPageFault+0x474
fffff800`19bc5b88 fffff800`5b8a5b5d     : 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 fffff800`5b862d5c : kbdclass!memcpy+0x92
fffff800`19bc5b90 fffff800`5b891511     : ffff828a`69dcc190 fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`19bc5c30 ffff828a`69dcc190     : fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 : HKKbdFltr+0x1511
fffff800`19bc5c38 fffff800`19bc5d58     : ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 : 0xffff828a`69dcc190
fffff800`19bc5c40 ffff828a`69d98310     : fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 : 0xfffff800`19bc5d58
fffff800`19bc5c48 fffff800`19bc5d58     : 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 : 0xffff828a`69d98310
fffff800`19bc5c50 00000000`00000008     : fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 : 0xfffff800`19bc5d58
fffff800`19bc5c58 fffff800`19bc5cb0     : ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 : 0x8
fffff800`19bc5c60 ffff828a`69dcc040     : fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 : 0xfffff800`19bc5cb0
fffff800`19bc5c68 fffff800`5b8913f0     : fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 : 0xffff828a`69dcc040
fffff800`19bc5c70 fffff800`10ecb180     : fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 : HKKbdFltr+0x13f0
fffff800`19bc5c78 fffff800`5b86b848     : ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 fffff800`5b870258 : 0xfffff800`10ecb180
fffff800`19bc5c80 fffff800`16ab3f6c     : 00000000`00000000 ffffb900`00000010 00000000`00000000 ffffb900`241c2970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`19bc5d50 fffff800`16ab2f5a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
fffff800`19bc6290 fffff800`16c30eee     : 00000000`00000000 fffff800`10ecb180 fffff800`1754c6c0 ffff828a`729bd080 : nt!KiRetireDpcList+0x1ba
fffff800`19bc6540 00000000`00000000     : fffff800`19bc7000 fffff800`19bc0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23435.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
İlk yönergeyi uyguladım 2.kodu cmdye mi yapıştırmam gerekiyor?

bilgilendirme için teşekkürler bu arada @lazye
 
İlk yönergeyi uyguladım 2.kodu cmdye mi yapıştırmam gerekiyor?

bilgilendirme için teşekkürler bu arada @lazye


İlk yönergeyi uyguladım 2.kodu cmdye mi yapıştırmam gerekiyor?

bilgilendirme için teşekkürler bu arada @lazye
Hocam ikinci çok uzun olan kod mavi ekran hata analizi onla ilgili herhangi bir şey yapmanız gerekmiyor .
 
Sorun çözüldüyse birkaç gün sonra çözüldü olarak işaretleyin. Rica ederim.
 

Technopat Haberler

Yeni konular

Geri
Yukarı