Neler Yeni

Windows 11 Hata Almaktan Bıktım

MertFM

80+ Silver
Katılım
6 Ağustos 2022
Mesajlar
2,028
Dahası  
Reaksiyon skoru
1,055
İsim
Mertcan Ceylan
Monster Control Center'dan kaynaklı sorun veriyor hocam. Kaldırırsan sorun çözülür ama kaldırmadan nasıl çözüleceğini bilmiyorum. (Forumda bir arkadaşın başına daha gelmişti.) Eğer Monster Control Center'ın en yeni sürücüsü varsa onu kurmayı dene.
hocam hiç şaşırmadım açıkcası zaten bi halta yaradığı da yok açıkcası bunu monster a ileteceğim teşekkür ederim. Nasıl anladığını bir kaç fotoğraf ile anlatma şansınz var mı ? müşteri hizmetlerine de bilgi vereyim hemde kendim de bilgi sahibi olabileyim uzun değilse
 

Emre Zengin

Moderatör
Katılım
22 Nisan 2021
Mesajlar
19,276
En İyi Cevap
18
Dahası  
Reaksiyon skoru
7,489
Konum
Çorlu/Tekirdağ
İsim
Emre Zengin
hocam hiç şaşırmadım açıkcası zaten bi halta yaradığı da yok açıkcası bunu monster a ileteceğim teşekkür ederim. Nasıl anladığını bir kaç fotoğraf ile anlatma şansınz var mı ? müşteri hizmetlerine de bilgi vereyim hemde kendim de bilgi sahibi olabileyim uzun değilse

Kod:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Emre\AppData\Local\Temp\Rar$DIa9960.22923\050123-23687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff802`3be00000 PsLoadedModuleList = 0xfffff802`3ca13490
Debug session time: Mon May  1 01:26:28.340 2023 (UTC + 3:00)
System Uptime: 4 days 18:37:49.776
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`3c22b8f0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff802`41e058c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffb90303f9ccc4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8028270324f, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 1765

Key  : Analysis.DebugAnalysisManager
Value: Create

Key  : Analysis.Elapsed.mSec
Value: 3407

Key  : Analysis.IO.Other.Mb
Value: 14

Key  : Analysis.IO.Read.Mb
Value: 0

Key  : Analysis.IO.Write.Mb
Value: 30

Key  : Analysis.Init.CPU.mSec
Value: 375

Key  : Analysis.Init.Elapsed.mSec
Value: 15548

Key  : Analysis.Memory.CommitPeak.Mb
Value: 99

Key  : Bugcheck.Code.DumpHeader
Value: 0xd1

Key  : Bugcheck.Code.Register
Value: 0xa

Key  : WER.OS.Branch
Value: ni_release

Key  : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z

Key  : WER.OS.Version
Value: 10.0.22621.1


FILE_IN_CAB:  050123-23687-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffb90303f9ccc4

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8028270324f

READ_ADDRESS: fffff8023cb1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb90303f9ccc4

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80241e05a00 -- (.trap 0xfffff80241e05a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb90015cefc80 rbx=0000000000000000 rcx=ffffb90015cefc80
rdx=ffffb90303f9ccc4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8028270324f rsp=fffff80241e05b98 rbp=fffff80241e05c10
r8=000000000000000c  r9=0000000000000038 r10=ffffb90003dd9000
r11=fffff80241e05b90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
kbdclass!memcpy+0xf:
fffff802`8270324f 4c8b1a          mov     r11,qword ptr [rdx] ds:ffffb903`03f9ccc4=????????????????
Resetting default scope

STACK_TEXT:
fffff802`41e058b8 fffff802`3c240fa9     : 00000000`0000000a ffffb903`03f9ccc4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`41e058c0 fffff802`3c23c634     : 000003c0`d25ac63f 00000000`00000000 00000000`0000000f ffffb90f`fa8b4760 : nt!KiBugCheckDispatch+0x69
fffff802`41e05a00 fffff802`8270324f     : fffff802`82705b5d 00000000`0000000c fffff802`41e05c10 ffffb900`10343960 : nt!KiPageFault+0x474
fffff802`41e05b98 fffff802`82705b5d     : 00000000`0000000c fffff802`41e05c10 ffffb900`10343960 fffff802`826c2d5c : kbdclass!memcpy+0xf
fffff802`41e05ba0 fffff802`826f1511     : ffffb900`03d8b190 fffff802`41e05d68 ffffb900`03d8c310 fffff802`41e05d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`41e05c40 ffffb900`03d8b190     : fffff802`41e05d68 ffffb900`03d8c310 fffff802`41e05d68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`41e05c48 fffff802`41e05d68     : ffffb900`03d8c310 fffff802`41e05d68 00000000`00000008 fffff802`41e05cc0 : 0xffffb900`03d8b190
fffff802`41e05c50 ffffb900`03d8c310     : fffff802`41e05d68 00000000`00000008 fffff802`41e05cc0 ffffb900`03d8b040 : 0xfffff802`41e05d68
fffff802`41e05c58 fffff802`41e05d68     : 00000000`00000008 fffff802`41e05cc0 ffffb900`03d8b040 fffff802`826f13f0 : 0xffffb900`03d8c310
fffff802`41e05c60 00000000`00000008     : fffff802`41e05cc0 ffffb900`03d8b040 fffff802`826f13f0 fffff802`393e6180 : 0xfffff802`41e05d68
fffff802`41e05c68 fffff802`41e05cc0     : ffffb900`03d8b040 fffff802`826f13f0 fffff802`393e6180 fffff802`826cb848 : 0x8
fffff802`41e05c70 ffffb900`03d8b040     : fffff802`826f13f0 fffff802`393e6180 fffff802`826cb848 ffffb900`03d8b190 : 0xfffff802`41e05cc0
fffff802`41e05c78 fffff802`826f13f0     : fffff802`393e6180 fffff802`826cb848 ffffb900`03d8b190 fffff802`41e05cf9 : 0xffffb900`03d8b040
fffff802`41e05c80 fffff802`393e6180     : fffff802`826cb848 ffffb900`03d8b190 fffff802`41e05cf9 ffffb900`03cb8c90 : HKKbdFltr+0x13f0
fffff802`41e05c88 fffff802`826cb848     : ffffb900`03d8b190 fffff802`41e05cf9 ffffb900`03cb8c90 fffff802`826d0258 : 0xfffff802`393e6180
fffff802`41e05c90 fffff802`3c02a1da     : 00000000`00000000 fffff802`00000001 00000000`00000000 ffffcb80`71b0c970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`41e05d60 fffff802`3c0299e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`41e062b0 fffff802`3c2306ee     : 00000000`00000000 fffff802`393e6180 00000000`00000000 fffff802`3cb4c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`41e06540 00000000`00000000     : fffff802`41e07000 fffff802`41e00000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+f

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23145.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  f

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

kbdclass.sys hatası vermiş. Önceki tecrübeme dayanarak Monster Control Center kaynaklı bir sorun olduğunu söyleyebilirim. Analizi yaptığım programın adı WinDBG.
 

MertFM

80+ Silver
Katılım
6 Ağustos 2022
Mesajlar
2,028
Dahası  
Reaksiyon skoru
1,055
İsim
Mertcan Ceylan
Kod:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Emre\AppData\Local\Temp\Rar$DIa9960.22923\050123-23687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff802`3be00000 PsLoadedModuleList = 0xfffff802`3ca13490
Debug session time: Mon May  1 01:26:28.340 2023 (UTC + 3:00)
System Uptime: 4 days 18:37:49.776
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`3c22b8f0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff802`41e058c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffb90303f9ccc4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8028270324f, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 1765

Key  : Analysis.DebugAnalysisManager
Value: Create

Key  : Analysis.Elapsed.mSec
Value: 3407

Key  : Analysis.IO.Other.Mb
Value: 14

Key  : Analysis.IO.Read.Mb
Value: 0

Key  : Analysis.IO.Write.Mb
Value: 30

Key  : Analysis.Init.CPU.mSec
Value: 375

Key  : Analysis.Init.Elapsed.mSec
Value: 15548

Key  : Analysis.Memory.CommitPeak.Mb
Value: 99

Key  : Bugcheck.Code.DumpHeader
Value: 0xd1

Key  : Bugcheck.Code.Register
Value: 0xa

Key  : WER.OS.Branch
Value: ni_release

Key  : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z

Key  : WER.OS.Version
Value: 10.0.22621.1


FILE_IN_CAB:  050123-23687-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffb90303f9ccc4

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8028270324f

READ_ADDRESS: fffff8023cb1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb90303f9ccc4

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80241e05a00 -- (.trap 0xfffff80241e05a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb90015cefc80 rbx=0000000000000000 rcx=ffffb90015cefc80
rdx=ffffb90303f9ccc4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8028270324f rsp=fffff80241e05b98 rbp=fffff80241e05c10
r8=000000000000000c  r9=0000000000000038 r10=ffffb90003dd9000
r11=fffff80241e05b90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
kbdclass!memcpy+0xf:
fffff802`8270324f 4c8b1a          mov     r11,qword ptr [rdx] ds:ffffb903`03f9ccc4=????????????????
Resetting default scope

STACK_TEXT:
fffff802`41e058b8 fffff802`3c240fa9     : 00000000`0000000a ffffb903`03f9ccc4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`41e058c0 fffff802`3c23c634     : 000003c0`d25ac63f 00000000`00000000 00000000`0000000f ffffb90f`fa8b4760 : nt!KiBugCheckDispatch+0x69
fffff802`41e05a00 fffff802`8270324f     : fffff802`82705b5d 00000000`0000000c fffff802`41e05c10 ffffb900`10343960 : nt!KiPageFault+0x474
fffff802`41e05b98 fffff802`82705b5d     : 00000000`0000000c fffff802`41e05c10 ffffb900`10343960 fffff802`826c2d5c : kbdclass!memcpy+0xf
fffff802`41e05ba0 fffff802`826f1511     : ffffb900`03d8b190 fffff802`41e05d68 ffffb900`03d8c310 fffff802`41e05d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`41e05c40 ffffb900`03d8b190     : fffff802`41e05d68 ffffb900`03d8c310 fffff802`41e05d68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`41e05c48 fffff802`41e05d68     : ffffb900`03d8c310 fffff802`41e05d68 00000000`00000008 fffff802`41e05cc0 : 0xffffb900`03d8b190
fffff802`41e05c50 ffffb900`03d8c310     : fffff802`41e05d68 00000000`00000008 fffff802`41e05cc0 ffffb900`03d8b040 : 0xfffff802`41e05d68
fffff802`41e05c58 fffff802`41e05d68     : 00000000`00000008 fffff802`41e05cc0 ffffb900`03d8b040 fffff802`826f13f0 : 0xffffb900`03d8c310
fffff802`41e05c60 00000000`00000008     : fffff802`41e05cc0 ffffb900`03d8b040 fffff802`826f13f0 fffff802`393e6180 : 0xfffff802`41e05d68
fffff802`41e05c68 fffff802`41e05cc0     : ffffb900`03d8b040 fffff802`826f13f0 fffff802`393e6180 fffff802`826cb848 : 0x8
fffff802`41e05c70 ffffb900`03d8b040     : fffff802`826f13f0 fffff802`393e6180 fffff802`826cb848 ffffb900`03d8b190 : 0xfffff802`41e05cc0
fffff802`41e05c78 fffff802`826f13f0     : fffff802`393e6180 fffff802`826cb848 ffffb900`03d8b190 fffff802`41e05cf9 : 0xffffb900`03d8b040
fffff802`41e05c80 fffff802`393e6180     : fffff802`826cb848 ffffb900`03d8b190 fffff802`41e05cf9 ffffb900`03cb8c90 : HKKbdFltr+0x13f0
fffff802`41e05c88 fffff802`826cb848     : ffffb900`03d8b190 fffff802`41e05cf9 ffffb900`03cb8c90 fffff802`826d0258 : 0xfffff802`393e6180
fffff802`41e05c90 fffff802`3c02a1da     : 00000000`00000000 fffff802`00000001 00000000`00000000 ffffcb80`71b0c970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`41e05d60 fffff802`3c0299e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`41e062b0 fffff802`3c2306ee     : 00000000`00000000 fffff802`393e6180 00000000`00000000 fffff802`3cb4c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`41e06540 00000000`00000000     : fffff802`41e07000 fffff802`41e00000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+f

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23145.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  f

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

kbdclass.sys hatası vermiş. Önceki tecrübemden dayanarak Monster Control Center kaynaklı bir sorun olduğunu söyleyebilirim. Analizi yaptığım programın adı WinDBG.
çok teşekkürler hocam
 
Top Bottom