Valorant'ta Monster Abra DRIVER_IRQL_NOT_LESS_OR_EQUAL hatası

İşletim sistemi
Windows 11

faarukbulut

Decapat
Katılım
14 Mayıs 2023
Mesajlar
3
RAM
8192 MB
SSD veya HDD modeli
Samsung PM9A1
Ekran kartı
GTX 1650 Ti
İşlemci
i5-10200H
Valorant oynarken sürekli mavi ekran hataları alıyorum. Sanırım bu hata fan değişimi ve Windows 11 ile birlikte gelmeye başladı daha önce böyle bir sorun olduğunu pek hatırlamıyorum. Bazen farklı hatalarlada mavi ekran verdiği oluyor. Biraz araştırdım Control Center'i kaldırmamı önerdiler kaldırdım yine devam etti o yüzden tekrar indirdim. Elimdeki 5 dump dosyasını upload ediyorum. Yardımcı olursanız çok sevinirim artık çok sıkmaya başladı bu sorun.

Minidump:
Google Drive
 
Son düzenleyen: Moderatör:
* Bazı Monster laptoplardaki klasik hata. Zaten kendiniz bulmuşsunuz ama sanırım tam olarak temizlememişsiniz. Monster ile alakalı tüm araçları kaldırmanız gerekiyor. Windows 10 ile bile sorun çıkarırken Windows 11 ile çıkarmaması için hiçbir sebep yok Monster araçlarının. Aşağıdaki iki konu kapsamlı olarak yardımcı olur.



* Bunun dışında şu iki sürücüde de bir problem var gibi.

IntelHaxm.sys = Intel® Hardware Accelerated Execution Manager
usbvideo.sys = USB Video Class Driver, yani Webcam.

* Intel ile alakalı tüm sürücülerinizi güncelleyin.

* Webcam'in kendisinde veya sürücüsünde bir problem olabilir. Hangi Webcam'i kullanıyorsanız sürücüsü var mı diye kontrol edin destek sayfasından. Sürücüsü yoksa aygıt yöneticisini açıp webcam'i bulup sağ tıklayıp "Cihazı kaldır" seçin. Laptopu yeniden başlatın ve sürücüyü otomatik olarak tekrar yüklesin. Veya Webcam çok elzem değilse şimdilik çıkarabilirsiniz.



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8586b965abec, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8055c2f32d2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.Elapsed.mSec
    Value: 3016

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 264

    Key  : Analysis.Init.Elapsed.mSec
    Value: 25181

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 165

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8586b965abec

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8055c2f32d2

FILE_IN_CAB:  061023-14281-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8052d31c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8586b965abec

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64

DPC_STACK_BASE:  FFFFF8052E308FB0

TRAP_FRAME:  ffff81a1bc8ccd58 -- (.trap 0xffff81a1bc8ccd58)
Unable to read trap frame at ffff81a1`bc8ccd58

STACK_TEXT:
fffff805`2e308328 fffff805`2ca40fa9     : 00000000`0000000a ffff8586`b965abec 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`2e308330 fffff805`2ca3c634     : ffff8583`b2dbf6e8 00000000`00000000 ffff8583`b2dbf180 fffff805`47e22ac2 : nt!KiBugCheckDispatch+0x69
fffff805`2e308470 fffff805`5c2f32d2     : fffff805`5c2f5b5d 00000000`000000e4 fffff805`2e308680 ffff8583`bd430aa0 : nt!KiPageFault+0x474
fffff805`2e308608 fffff805`5c2f5b5d     : 00000000`000000e4 fffff805`2e308680 ffff8583`bd430aa0 fffff805`5c2b2d5c : kbdclass!memcpy+0x92
fffff805`2e308610 fffff805`5c2e1511     : ffff8583`b2fdb190 fffff805`2e3087d8 ffff8583`b2fdc310 fffff805`2e3087d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`2e3086b0 ffff8583`b2fdb190     : fffff805`2e3087d8 ffff8583`b2fdc310 fffff805`2e3087d8 00000000`00000008 : HKKbdFltr+0x1511
fffff805`2e3086b8 fffff805`2e3087d8     : ffff8583`b2fdc310 fffff805`2e3087d8 00000000`00000008 fffff805`2e308730 : 0xffff8583`b2fdb190
fffff805`2e3086c0 ffff8583`b2fdc310     : fffff805`2e3087d8 00000000`00000008 fffff805`2e308730 ffff8583`b2fdb040 : 0xfffff805`2e3087d8
fffff805`2e3086c8 fffff805`2e3087d8     : 00000000`00000008 fffff805`2e308730 ffff8583`b2fdb040 fffff805`5c2e13f0 : 0xffff8583`b2fdc310
fffff805`2e3086d0 00000000`00000008     : fffff805`2e308730 ffff8583`b2fdb040 fffff805`5c2e13f0 fffff805`26617180 : 0xfffff805`2e3087d8
fffff805`2e3086d8 fffff805`2e308730     : ffff8583`b2fdb040 fffff805`5c2e13f0 fffff805`26617180 fffff805`5c2bb848 : 0x8
fffff805`2e3086e0 ffff8583`b2fdb040     : fffff805`5c2e13f0 fffff805`26617180 fffff805`5c2bb848 ffff8583`b2fdb190 : 0xfffff805`2e308730
fffff805`2e3086e8 fffff805`5c2e13f0     : fffff805`26617180 fffff805`5c2bb848 ffff8583`b2fdb190 fffff805`2e308769 : 0xffff8583`b2fdb040
fffff805`2e3086f0 fffff805`26617180     : fffff805`5c2bb848 ffff8583`b2fdb190 fffff805`2e308769 ffff8583`b2c05ad0 : HKKbdFltr+0x13f0
fffff805`2e3086f8 fffff805`5c2bb848     : ffff8583`b2fdb190 fffff805`2e308769 ffff8583`b2c05ad0 fffff805`5c2c0258 : 0xfffff805`26617180
fffff805`2e308700 fffff805`2c82a1da     : 00000000`00000000 fffff805`00000010 00000000`00000000 ffffa700`2096fe70 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff805`2e3087d0 fffff805`2c8299e4     : 00000000`00000022 ffff8583`ba8d6080 fffff805`003c1e7f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff805`2e308d20 fffff805`2ca34d65     : 00000000`00000000 00000000`00000000 ffff8583`c0eef080 ffffca88`6a6b4470 : nt!KiRetireDpcList+0xfe4
fffff805`2e308fb0 fffff805`2ca34d0f     : fffffa04`267273a9 fffff805`2c82c0c9 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffa04`26727310 fffff805`2c82c0c9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn
fffffa04`26727320 fffff805`2ca344db     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
fffffa04`26727410 fffff805`2ca2db11     : fffff805`8678e150 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
fffffa04`26727440 ffff81a1`bc9c8093     : fffff805`8678e150 00000000`00000000 ffff81a1`bc8ccd58 ffff81a1`bc9c81c2 : nt!KiInterruptDispatch+0xb1
fffffa04`267275d0 ffff81a1`bc9c7d69     : 00000000`00000000 00000000`00000000 fffff805`8678e150 fffffa04`26727810 : win32kfull!IsWindowHolographicForHitTest+0x1d3
fffffa04`267276c0 ffff81a1`bc9c77d6     : 0000021a`000003a1 00000000`00000000 00000000`00000000 0000021a`000003a1 : win32kfull!IsCompositionInputWindowForHitTest+0x21
fffffa04`267276f0 ffff81a1`bca20ce2     : 00000000`00000020 0000021a`000003a1 00000000`00001300 fffffa04`26727810 : win32kfull!xxxDCEWindowHitTestIndirect+0xe6
fffffa04`267277f0 ffff81a1`bca20c3e     : 0000021a`000003a1 00000000`00000001 fffffa04`26727919 ffff81a1`bc677cc9 : win32kfull!xxxDCEWindowHitTest+0x56
fffffa04`26727860 ffff81a1`bca20b71     : 0000021a`000003a1 00000000`00000000 00000000`00000020 00000000`00040282 : win32kfull!xxxWindowFromPoint+0xa6
fffffa04`26727980 ffff81a1`bd2d9656     : ffff8583`c0eef080 00000000`00000000 00000080`00000050 00000000`00000000 : win32kfull!NtUserWindowFromPoint+0x21
fffffa04`267279b0 fffff805`2ca406e5     : ffff8583`c0eef080 ffff8583`c3128d60 fffffa04`26727a60 00000000`00000000 : win32k!NtUserWindowFromPoint+0x16
fffffa04`267279e0 00007ffa`bb3016f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000000f`e797e908 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`bb3016f4


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe40f13d5f0dc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff805561c32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0x1cdca, File: 0x23395 - C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1812

    Key  : Analysis.Elapsed.mSec
    Value: 1827

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 218

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5560

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 152

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffe40f13d5f0dc

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805561c32d2

FILE_IN_CAB:  060923-14171-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff80515d1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffe40f13d5f0dc

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80519b00000 -- (.trap 0xfffff80519b00000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe40b597c86c0 rbx=0000000000000000 rcx=ffffe40b597c86c0
rdx=00000003ba596a1c rsi=0000000000000000 rdi=0000000000000000
rip=fffff805561c32d2 rsp=fffff80519b00198 rbp=fffff80519b00210
 r8=00000000000000c0  r9=0000000000000038 r10=ffffe40b4cbbb000
r11=ffffe40f13d5f19c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff805`561c32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffe40f`13d5f0dc=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff805`19affeb8 fffff805`15440fa9     : 00000000`0000000a ffffe40f`13d5f0dc 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`19affec0 fffff805`1543c634     : 00000123`5cb4a9be 00000000`00000000 ffffe40b`48db1180 fffff805`33e12ac2 : nt!KiBugCheckDispatch+0x69
fffff805`19b00000 fffff805`561c32d2     : fffff805`561c5b5d 00000000`3901cbf4 fffff805`19b00210 ffffe40b`572f0320 : nt!KiPageFault+0x474
fffff805`19b00198 fffff805`561c5b5d     : 00000000`3901cbf4 fffff805`19b00210 ffffe40b`572f0320 fffff805`54792d5c : kbdclass!memcpy+0x92
fffff805`19b001a0 fffff805`561b1511     : ffffe40b`4cba8ae0 fffff805`19b00368 ffffe40b`4cbb1310 fffff805`19b00368 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`19b00240 ffffe40b`4cba8ae0     : fffff805`19b00368 ffffe40b`4cbb1310 fffff805`19b00368 00000000`00000008 : HKKbdFltr+0x1511
fffff805`19b00248 fffff805`19b00368     : ffffe40b`4cbb1310 fffff805`19b00368 00000000`00000008 fffff805`19b002c0 : 0xffffe40b`4cba8ae0
fffff805`19b00250 ffffe40b`4cbb1310     : fffff805`19b00368 00000000`00000008 fffff805`19b002c0 ffffe40b`4cba8990 : 0xfffff805`19b00368
fffff805`19b00258 fffff805`19b00368     : 00000000`00000008 fffff805`19b002c0 ffffe40b`4cba8990 fffff805`561b13f0 : 0xffffe40b`4cbb1310
fffff805`19b00260 00000000`00000008     : fffff805`19b002c0 ffffe40b`4cba8990 fffff805`561b13f0 fffff805`11df5180 : 0xfffff805`19b00368
fffff805`19b00268 fffff805`19b002c0     : ffffe40b`4cba8990 fffff805`561b13f0 fffff805`11df5180 fffff805`5479b848 : 0x8
fffff805`19b00270 ffffe40b`4cba8990     : fffff805`561b13f0 fffff805`11df5180 fffff805`5479b848 ffffe40b`4cba8ae0 : 0xfffff805`19b002c0
fffff805`19b00278 fffff805`561b13f0     : fffff805`11df5180 fffff805`5479b848 ffffe40b`4cba8ae0 fffff805`19b002f9 : 0xffffe40b`4cba8990
fffff805`19b00280 fffff805`11df5180     : fffff805`5479b848 ffffe40b`4cba8ae0 fffff805`19b002f9 ffffe40b`5025d690 : HKKbdFltr+0x13f0
fffff805`19b00288 fffff805`5479b848     : ffffe40b`4cba8ae0 fffff805`19b002f9 ffffe40b`5025d690 fffff805`547a0258 : 0xfffff805`11df5180
fffff805`19b00290 fffff805`1522a1da     : 00000000`00000000 ffffe40b`00000010 00000000`00000000 ffff8000`9d0d6e70 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff805`19b00360 fffff805`152299e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff805`19b008b0 fffff805`154306ee     : 00000000`00000000 fffff805`11df5180 fffff805`15d4c6c0 ffffe40b`541e5080 : nt!KiRetireDpcList+0xfe4
fffff805`19b00b40 00000000`00000000     : fffff805`19b01000 fffff805`19afa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8c10abe20910, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff806b1d832d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2640

    Key  : Analysis.Elapsed.mSec
    Value: 4821

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 143

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8c10abe20910

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff806b1d832d2

FILE_IN_CAB:  060723-13843-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff80682f1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8c10abe20910

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64

DPC_STACK_BASE:  FFFFF806844EDFB0

TRAP_FRAME:  fffff806844ed470 -- (.trap 0xfffff806844ed470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c0c61e846c0 rbx=0000000000000000 rcx=ffff8c0c61e846c0
rdx=0000000449f9c250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806b1d832d2 rsp=fffff806844ed608 rbp=fffff806844ed680
 r8=00000000000000c0  r9=0000000000000038 r10=ffff8c0c4aa42000
r11=ffff8c10abe209d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff806`b1d832d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8c10`abe20910=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff806`844ed328 fffff806`82640fa9     : 00000000`0000000a ffff8c10`abe20910 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`844ed330 fffff806`8263c634     : ffff8c0c`46b8b6e8 00000000`00000000 ffff8c0c`46b8b180 fffff806`860d2ac2 : nt!KiBugCheckDispatch+0x69
fffff806`844ed470 fffff806`b1d832d2     : fffff806`b1d85b5d 00000000`9edb03c0 fffff806`844ed680 ffff8c0c`5378ba50 : nt!KiPageFault+0x474
fffff806`844ed608 fffff806`b1d85b5d     : 00000000`9edb03c0 fffff806`844ed680 ffff8c0c`5378ba50 fffff806`bc7c2d5c : kbdclass!memcpy+0x92
fffff806`844ed610 fffff806`bc7f1511     : ffff8c0c`46c179b0 fffff806`844ed7d8 ffff8c0c`4aa2f310 fffff806`844ed7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`844ed6b0 ffff8c0c`46c179b0     : fffff806`844ed7d8 ffff8c0c`4aa2f310 fffff806`844ed7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff806`844ed6b8 fffff806`844ed7d8     : ffff8c0c`4aa2f310 fffff806`844ed7d8 00000000`00000008 fffff806`844ed730 : 0xffff8c0c`46c179b0
fffff806`844ed6c0 ffff8c0c`4aa2f310     : fffff806`844ed7d8 00000000`00000008 fffff806`844ed730 ffff8c0c`46c17860 : 0xfffff806`844ed7d8
fffff806`844ed6c8 fffff806`844ed7d8     : 00000000`00000008 fffff806`844ed730 ffff8c0c`46c17860 fffff806`bc7f13f0 : 0xffff8c0c`4aa2f310
fffff806`844ed6d0 00000000`00000008     : fffff806`844ed730 ffff8c0c`46c17860 fffff806`bc7f13f0 fffff806`7c7f8180 : 0xfffff806`844ed7d8
fffff806`844ed6d8 fffff806`844ed730     : ffff8c0c`46c17860 fffff806`bc7f13f0 fffff806`7c7f8180 fffff806`bc7cb848 : 0x8
fffff806`844ed6e0 ffff8c0c`46c17860     : fffff806`bc7f13f0 fffff806`7c7f8180 fffff806`bc7cb848 ffff8c0c`46c179b0 : 0xfffff806`844ed730
fffff806`844ed6e8 fffff806`bc7f13f0     : fffff806`7c7f8180 fffff806`bc7cb848 ffff8c0c`46c179b0 fffff806`844ed769 : 0xffff8c0c`46c17860
fffff806`844ed6f0 fffff806`7c7f8180     : fffff806`bc7cb848 ffff8c0c`46c179b0 fffff806`844ed769 ffff8c0c`43d92de0 : HKKbdFltr+0x13f0
fffff806`844ed6f8 fffff806`bc7cb848     : ffff8c0c`46c179b0 fffff806`844ed769 ffff8c0c`43d92de0 fffff806`bc7d0258 : 0xfffff806`7c7f8180
fffff806`844ed700 fffff806`8242a1da     : 00000000`00000000 ffff8c0c`00000010 00000000`00000000 ffffb281`5aaa8e70 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`844ed7d0 fffff806`824299e4     : 00000000`00000022 ffff8c0c`50ef8480 fffff806`007287f2 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff806`844edd20 fffff806`82634d65     : 00000000`00000000 00000000`00000000 ffff8c0c`546df080 00000000`00000000 : nt!KiRetireDpcList+0xfe4
fffff806`844edfb0 fffff806`82634d0f     : fffffd0b`1881f719 fffff806`8242c0c9 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffd0b`1881f680 fffff806`8242c0c9     : 00000000`00000000 00000000`00000000 ffff8c0c`524ad080 00000000`00000006 : nt!KiPlatformSwapStacksAndCallReturn
fffffd0b`1881f690 fffff806`826344db     : 00000000`00000000 00000000`00000000 ffffac5a`c2894434 00000000`00000001 : nt!KiDispatchInterrupt+0xd9
fffffd0b`1881f780 fffff806`8262db11     : ffff8c0c`546df080 00000000`00000001 fffff806`7c7f8180 fffff806`7c7fb358 : nt!KiDpcInterruptBypass+0x1b
fffffd0b`1881f7b0 fffff806`828a0c53     : ffff8c0c`5ea1e260 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiInterruptDispatch+0xb1
fffffd0b`1881f940 fffff806`828a0b4b     : ffff8c0c`546df080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0xf3
fffffd0b`1881f9a0 fffff806`826406e5     : 000002e2`63fa3cc0 ffff8c0c`524ad080 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6b
fffffd0b`1881f9e0 00007ffe`380eecd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ed`f2fbf818 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`380eecd4


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
* Bazı Monster laptoplardaki klasik hata. Zaten kendiniz bulmuşsunuz ama sanırım tam olarak temizlememişsiniz. Monster ile alakalı tüm araçları kaldırmanız gerekiyor. Windows 10 ile bile sorun çıkarırken Windows 11 ile çıkarmaması için hiçbir sebep yok Monster araçlarının. Aşağıdaki iki konu kapsamlı olarak yardımcı olur.



* Bunun dışında şu iki sürücüde de bir problem var gibi.

IntelHaxm.sys = Intel® Hardware Accelerated Execution Manager
usbvideo.sys = USB Video Class Driver, yani Webcam.

* Intel ile alakalı tüm sürücülerinizi güncelleyin.

* Webcam'in kendisinde veya sürücüsünde bir problem olabilir. Hangi Webcam'i kullanıyorsanız sürücüsü var mı diye kontrol edin destek sayfasından. Sürücüsü yoksa aygıt yöneticisini açıp webcam'i bulup sağ tıklayıp "Cihazı kaldır" seçin. Laptopu yeniden başlatın ve sürücüyü otomatik olarak tekrar yüklesin. Veya Webcam çok elzem değilse şimdilik çıkarabilirsiniz.



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8586b965abec, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8055c2f32d2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.Elapsed.mSec
    Value: 3016

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 264

    Key  : Analysis.Init.Elapsed.mSec
    Value: 25181

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 165

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8586b965abec

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8055c2f32d2

FILE_IN_CAB:  061023-14281-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8052d31c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8586b965abec

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64

DPC_STACK_BASE:  FFFFF8052E308FB0

TRAP_FRAME:  ffff81a1bc8ccd58 -- (.trap 0xffff81a1bc8ccd58)
Unable to read trap frame at ffff81a1`bc8ccd58

STACK_TEXT:
fffff805`2e308328 fffff805`2ca40fa9     : 00000000`0000000a ffff8586`b965abec 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`2e308330 fffff805`2ca3c634     : ffff8583`b2dbf6e8 00000000`00000000 ffff8583`b2dbf180 fffff805`47e22ac2 : nt!KiBugCheckDispatch+0x69
fffff805`2e308470 fffff805`5c2f32d2     : fffff805`5c2f5b5d 00000000`000000e4 fffff805`2e308680 ffff8583`bd430aa0 : nt!KiPageFault+0x474
fffff805`2e308608 fffff805`5c2f5b5d     : 00000000`000000e4 fffff805`2e308680 ffff8583`bd430aa0 fffff805`5c2b2d5c : kbdclass!memcpy+0x92
fffff805`2e308610 fffff805`5c2e1511     : ffff8583`b2fdb190 fffff805`2e3087d8 ffff8583`b2fdc310 fffff805`2e3087d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`2e3086b0 ffff8583`b2fdb190     : fffff805`2e3087d8 ffff8583`b2fdc310 fffff805`2e3087d8 00000000`00000008 : HKKbdFltr+0x1511
fffff805`2e3086b8 fffff805`2e3087d8     : ffff8583`b2fdc310 fffff805`2e3087d8 00000000`00000008 fffff805`2e308730 : 0xffff8583`b2fdb190
fffff805`2e3086c0 ffff8583`b2fdc310     : fffff805`2e3087d8 00000000`00000008 fffff805`2e308730 ffff8583`b2fdb040 : 0xfffff805`2e3087d8
fffff805`2e3086c8 fffff805`2e3087d8     : 00000000`00000008 fffff805`2e308730 ffff8583`b2fdb040 fffff805`5c2e13f0 : 0xffff8583`b2fdc310
fffff805`2e3086d0 00000000`00000008     : fffff805`2e308730 ffff8583`b2fdb040 fffff805`5c2e13f0 fffff805`26617180 : 0xfffff805`2e3087d8
fffff805`2e3086d8 fffff805`2e308730     : ffff8583`b2fdb040 fffff805`5c2e13f0 fffff805`26617180 fffff805`5c2bb848 : 0x8
fffff805`2e3086e0 ffff8583`b2fdb040     : fffff805`5c2e13f0 fffff805`26617180 fffff805`5c2bb848 ffff8583`b2fdb190 : 0xfffff805`2e308730
fffff805`2e3086e8 fffff805`5c2e13f0     : fffff805`26617180 fffff805`5c2bb848 ffff8583`b2fdb190 fffff805`2e308769 : 0xffff8583`b2fdb040
fffff805`2e3086f0 fffff805`26617180     : fffff805`5c2bb848 ffff8583`b2fdb190 fffff805`2e308769 ffff8583`b2c05ad0 : HKKbdFltr+0x13f0
fffff805`2e3086f8 fffff805`5c2bb848     : ffff8583`b2fdb190 fffff805`2e308769 ffff8583`b2c05ad0 fffff805`5c2c0258 : 0xfffff805`26617180
fffff805`2e308700 fffff805`2c82a1da     : 00000000`00000000 fffff805`00000010 00000000`00000000 ffffa700`2096fe70 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff805`2e3087d0 fffff805`2c8299e4     : 00000000`00000022 ffff8583`ba8d6080 fffff805`003c1e7f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff805`2e308d20 fffff805`2ca34d65     : 00000000`00000000 00000000`00000000 ffff8583`c0eef080 ffffca88`6a6b4470 : nt!KiRetireDpcList+0xfe4
fffff805`2e308fb0 fffff805`2ca34d0f     : fffffa04`267273a9 fffff805`2c82c0c9 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffa04`26727310 fffff805`2c82c0c9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn
fffffa04`26727320 fffff805`2ca344db     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
fffffa04`26727410 fffff805`2ca2db11     : fffff805`8678e150 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
fffffa04`26727440 ffff81a1`bc9c8093     : fffff805`8678e150 00000000`00000000 ffff81a1`bc8ccd58 ffff81a1`bc9c81c2 : nt!KiInterruptDispatch+0xb1
fffffa04`267275d0 ffff81a1`bc9c7d69     : 00000000`00000000 00000000`00000000 fffff805`8678e150 fffffa04`26727810 : win32kfull!IsWindowHolographicForHitTest+0x1d3
fffffa04`267276c0 ffff81a1`bc9c77d6     : 0000021a`000003a1 00000000`00000000 00000000`00000000 0000021a`000003a1 : win32kfull!IsCompositionInputWindowForHitTest+0x21
fffffa04`267276f0 ffff81a1`bca20ce2     : 00000000`00000020 0000021a`000003a1 00000000`00001300 fffffa04`26727810 : win32kfull!xxxDCEWindowHitTestIndirect+0xe6
fffffa04`267277f0 ffff81a1`bca20c3e     : 0000021a`000003a1 00000000`00000001 fffffa04`26727919 ffff81a1`bc677cc9 : win32kfull!xxxDCEWindowHitTest+0x56
fffffa04`26727860 ffff81a1`bca20b71     : 0000021a`000003a1 00000000`00000000 00000000`00000020 00000000`00040282 : win32kfull!xxxWindowFromPoint+0xa6
fffffa04`26727980 ffff81a1`bd2d9656     : ffff8583`c0eef080 00000000`00000000 00000080`00000050 00000000`00000000 : win32kfull!NtUserWindowFromPoint+0x21
fffffa04`267279b0 fffff805`2ca406e5     : ffff8583`c0eef080 ffff8583`c3128d60 fffffa04`26727a60 00000000`00000000 : win32k!NtUserWindowFromPoint+0x16
fffffa04`267279e0 00007ffa`bb3016f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000000f`e797e908 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`bb3016f4


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe40f13d5f0dc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff805561c32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0x1cdca, File: 0x23395 - C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1812

    Key  : Analysis.Elapsed.mSec
    Value: 1827

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 218

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5560

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 152

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffe40f13d5f0dc

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805561c32d2

FILE_IN_CAB:  060923-14171-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff80515d1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffe40f13d5f0dc

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80519b00000 -- (.trap 0xfffff80519b00000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe40b597c86c0 rbx=0000000000000000 rcx=ffffe40b597c86c0
rdx=00000003ba596a1c rsi=0000000000000000 rdi=0000000000000000
rip=fffff805561c32d2 rsp=fffff80519b00198 rbp=fffff80519b00210
 r8=00000000000000c0  r9=0000000000000038 r10=ffffe40b4cbbb000
r11=ffffe40f13d5f19c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff805`561c32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffe40f`13d5f0dc=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff805`19affeb8 fffff805`15440fa9     : 00000000`0000000a ffffe40f`13d5f0dc 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`19affec0 fffff805`1543c634     : 00000123`5cb4a9be 00000000`00000000 ffffe40b`48db1180 fffff805`33e12ac2 : nt!KiBugCheckDispatch+0x69
fffff805`19b00000 fffff805`561c32d2     : fffff805`561c5b5d 00000000`3901cbf4 fffff805`19b00210 ffffe40b`572f0320 : nt!KiPageFault+0x474
fffff805`19b00198 fffff805`561c5b5d     : 00000000`3901cbf4 fffff805`19b00210 ffffe40b`572f0320 fffff805`54792d5c : kbdclass!memcpy+0x92
fffff805`19b001a0 fffff805`561b1511     : ffffe40b`4cba8ae0 fffff805`19b00368 ffffe40b`4cbb1310 fffff805`19b00368 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`19b00240 ffffe40b`4cba8ae0     : fffff805`19b00368 ffffe40b`4cbb1310 fffff805`19b00368 00000000`00000008 : HKKbdFltr+0x1511
fffff805`19b00248 fffff805`19b00368     : ffffe40b`4cbb1310 fffff805`19b00368 00000000`00000008 fffff805`19b002c0 : 0xffffe40b`4cba8ae0
fffff805`19b00250 ffffe40b`4cbb1310     : fffff805`19b00368 00000000`00000008 fffff805`19b002c0 ffffe40b`4cba8990 : 0xfffff805`19b00368
fffff805`19b00258 fffff805`19b00368     : 00000000`00000008 fffff805`19b002c0 ffffe40b`4cba8990 fffff805`561b13f0 : 0xffffe40b`4cbb1310
fffff805`19b00260 00000000`00000008     : fffff805`19b002c0 ffffe40b`4cba8990 fffff805`561b13f0 fffff805`11df5180 : 0xfffff805`19b00368
fffff805`19b00268 fffff805`19b002c0     : ffffe40b`4cba8990 fffff805`561b13f0 fffff805`11df5180 fffff805`5479b848 : 0x8
fffff805`19b00270 ffffe40b`4cba8990     : fffff805`561b13f0 fffff805`11df5180 fffff805`5479b848 ffffe40b`4cba8ae0 : 0xfffff805`19b002c0
fffff805`19b00278 fffff805`561b13f0     : fffff805`11df5180 fffff805`5479b848 ffffe40b`4cba8ae0 fffff805`19b002f9 : 0xffffe40b`4cba8990
fffff805`19b00280 fffff805`11df5180     : fffff805`5479b848 ffffe40b`4cba8ae0 fffff805`19b002f9 ffffe40b`5025d690 : HKKbdFltr+0x13f0
fffff805`19b00288 fffff805`5479b848     : ffffe40b`4cba8ae0 fffff805`19b002f9 ffffe40b`5025d690 fffff805`547a0258 : 0xfffff805`11df5180
fffff805`19b00290 fffff805`1522a1da     : 00000000`00000000 ffffe40b`00000010 00000000`00000000 ffff8000`9d0d6e70 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff805`19b00360 fffff805`152299e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff805`19b008b0 fffff805`154306ee     : 00000000`00000000 fffff805`11df5180 fffff805`15d4c6c0 ffffe40b`541e5080 : nt!KiRetireDpcList+0xfe4
fffff805`19b00b40 00000000`00000000     : fffff805`19b01000 fffff805`19afa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8c10abe20910, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff806b1d832d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2640

    Key  : Analysis.Elapsed.mSec
    Value: 4821

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 143

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8c10abe20910

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff806b1d832d2

FILE_IN_CAB:  060723-13843-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff80682f1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8c10abe20910

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64

DPC_STACK_BASE:  FFFFF806844EDFB0

TRAP_FRAME:  fffff806844ed470 -- (.trap 0xfffff806844ed470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c0c61e846c0 rbx=0000000000000000 rcx=ffff8c0c61e846c0
rdx=0000000449f9c250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806b1d832d2 rsp=fffff806844ed608 rbp=fffff806844ed680
 r8=00000000000000c0  r9=0000000000000038 r10=ffff8c0c4aa42000
r11=ffff8c10abe209d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff806`b1d832d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8c10`abe20910=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff806`844ed328 fffff806`82640fa9     : 00000000`0000000a ffff8c10`abe20910 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`844ed330 fffff806`8263c634     : ffff8c0c`46b8b6e8 00000000`00000000 ffff8c0c`46b8b180 fffff806`860d2ac2 : nt!KiBugCheckDispatch+0x69
fffff806`844ed470 fffff806`b1d832d2     : fffff806`b1d85b5d 00000000`9edb03c0 fffff806`844ed680 ffff8c0c`5378ba50 : nt!KiPageFault+0x474
fffff806`844ed608 fffff806`b1d85b5d     : 00000000`9edb03c0 fffff806`844ed680 ffff8c0c`5378ba50 fffff806`bc7c2d5c : kbdclass!memcpy+0x92
fffff806`844ed610 fffff806`bc7f1511     : ffff8c0c`46c179b0 fffff806`844ed7d8 ffff8c0c`4aa2f310 fffff806`844ed7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`844ed6b0 ffff8c0c`46c179b0     : fffff806`844ed7d8 ffff8c0c`4aa2f310 fffff806`844ed7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff806`844ed6b8 fffff806`844ed7d8     : ffff8c0c`4aa2f310 fffff806`844ed7d8 00000000`00000008 fffff806`844ed730 : 0xffff8c0c`46c179b0
fffff806`844ed6c0 ffff8c0c`4aa2f310     : fffff806`844ed7d8 00000000`00000008 fffff806`844ed730 ffff8c0c`46c17860 : 0xfffff806`844ed7d8
fffff806`844ed6c8 fffff806`844ed7d8     : 00000000`00000008 fffff806`844ed730 ffff8c0c`46c17860 fffff806`bc7f13f0 : 0xffff8c0c`4aa2f310
fffff806`844ed6d0 00000000`00000008     : fffff806`844ed730 ffff8c0c`46c17860 fffff806`bc7f13f0 fffff806`7c7f8180 : 0xfffff806`844ed7d8
fffff806`844ed6d8 fffff806`844ed730     : ffff8c0c`46c17860 fffff806`bc7f13f0 fffff806`7c7f8180 fffff806`bc7cb848 : 0x8
fffff806`844ed6e0 ffff8c0c`46c17860     : fffff806`bc7f13f0 fffff806`7c7f8180 fffff806`bc7cb848 ffff8c0c`46c179b0 : 0xfffff806`844ed730
fffff806`844ed6e8 fffff806`bc7f13f0     : fffff806`7c7f8180 fffff806`bc7cb848 ffff8c0c`46c179b0 fffff806`844ed769 : 0xffff8c0c`46c17860
fffff806`844ed6f0 fffff806`7c7f8180     : fffff806`bc7cb848 ffff8c0c`46c179b0 fffff806`844ed769 ffff8c0c`43d92de0 : HKKbdFltr+0x13f0
fffff806`844ed6f8 fffff806`bc7cb848     : ffff8c0c`46c179b0 fffff806`844ed769 ffff8c0c`43d92de0 fffff806`bc7d0258 : 0xfffff806`7c7f8180
fffff806`844ed700 fffff806`8242a1da     : 00000000`00000000 ffff8c0c`00000010 00000000`00000000 ffffb281`5aaa8e70 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`844ed7d0 fffff806`824299e4     : 00000000`00000022 ffff8c0c`50ef8480 fffff806`007287f2 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff806`844edd20 fffff806`82634d65     : 00000000`00000000 00000000`00000000 ffff8c0c`546df080 00000000`00000000 : nt!KiRetireDpcList+0xfe4
fffff806`844edfb0 fffff806`82634d0f     : fffffd0b`1881f719 fffff806`8242c0c9 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffd0b`1881f680 fffff806`8242c0c9     : 00000000`00000000 00000000`00000000 ffff8c0c`524ad080 00000000`00000006 : nt!KiPlatformSwapStacksAndCallReturn
fffffd0b`1881f690 fffff806`826344db     : 00000000`00000000 00000000`00000000 ffffac5a`c2894434 00000000`00000001 : nt!KiDispatchInterrupt+0xd9
fffffd0b`1881f780 fffff806`8262db11     : ffff8c0c`546df080 00000000`00000001 fffff806`7c7f8180 fffff806`7c7fb358 : nt!KiDpcInterruptBypass+0x1b
fffffd0b`1881f7b0 fffff806`828a0c53     : ffff8c0c`5ea1e260 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiInterruptDispatch+0xb1
fffffd0b`1881f940 fffff806`828a0b4b     : ffff8c0c`546df080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0xf3
fffffd0b`1881f9a0 fffff806`826406e5     : 000002e2`63fa3cc0 ffff8c0c`524ad080 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6b
fffffd0b`1881f9e0 00007ffe`380eecd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ed`f2fbf818 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`380eecd4


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

Gece tavsiyelerinizi uygulayacaktım fakat daha başlayamadan bilgisayarımda “bip” sesi çıkıp kapanma sorunu ortaya çıktı. Yaklaşık 2.5 ay önce bu sorunu yaşamıştım ve teknik servis sorunun fanlarda olduğunu söyleyip garantisi bittiği için ücretli olarak değiştirmişti. Sorun yine fanlarda sanırım. 2.5 ay aradan sonra yine fan bozulması ve bu mavi ekran hatası markaya karşı beni iyice bıktırmış duruma getirmeye başladı. Bugün kapalı oldukları için yarın ilk işim Monster’ı arayıp durumu bildirmek olacak umarım yardımcı olurlar. Moderatörlerden ricam henüz konu kapanmasın durumun seyrine göre ekleme yapabilirim. Yardımcı olduğunuz için teşekkür ederim @EgeN7
 

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı