*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9a8ce4ecef28, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8049d7132d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 31
    Key  : Analysis.Elapsed.mSec
    Value: 11805
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 46
    Key  : Analysis.Init.Elapsed.mSec
    Value: 7415
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1
    Key  : Bugcheck.Code.TargetModel
    Value: 0xd1
    Key  : Dump.Attributes.AsUlong
    Value: 1808
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy
    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84
    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1
    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0
    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1
    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0
    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0
    Key  : Hypervisor.Flags.CpuManager
    Value: 1
    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1
    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1
    Key  : Hypervisor.Flags.Epf
    Value: 0
    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1
    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1
    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0
    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0
    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0
    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1
    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1
    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0
    Key  : Hypervisor.Flags.RootScheduler
    Value: 0
    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1
    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0
    Key  : Hypervisor.Flags.Value
    Value: 21631230
    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe
    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1
    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1
    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1
    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0
    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1
    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0
    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1
    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1
    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.Nested
    Value: 0
    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.Value
    Value: 1015
    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7
BUGCHECK_CODE:  d1
BUGCHECK_P1: ffff9a8ce4ecef28
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8049d7132d2
FILE_IN_CAB:  033024-23250-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump
READ_ADDRESS: fffff80453d1c470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9a8ce4ecef28
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  VALORANT-Win64
DPC_STACK_BASE:  FFFFF80450F6FFB0
TRAP_FRAME:  fffff80450f6f460 -- (.trap 0xfffff80450f6f460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9a89b9a539c0 rbx=0000000000000000 rcx=ffff9a89b9a539c0
rdx=000000032b47b568 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8049d7132d2 rsp=fffff80450f6f5f8 rbp=fffff80450f6f670
 r8=00000000000000c0  r9=0000000000000038 r10=ffff9a89a5b93000
r11=ffff9a8ce4ecefe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`9d7132d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff9a8c`e4ecef28=????????????????????????????????
Resetting default scope
STACK_TEXT: 
fffff804`50f6f318 fffff804`5342d329     : 00000000`0000000a ffff9a8c`e4ecef28 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`50f6f320 fffff804`53428834     : ffff9a89`a5a421c0 fffff804`50f6f508 00000000`ffffff02 fffff804`95a3306f : nt!KiBugCheckDispatch+0x69
fffff804`50f6f460 fffff804`9d7132d2     : fffff804`9d715b5d 00000000`c0c4a008 fffff804`50f6f670 ffff9a89`b62e1010 : nt!KiPageFault+0x474
fffff804`50f6f5f8 fffff804`9d715b5d     : 00000000`c0c4a008 fffff804`50f6f670 ffff9a89`b62e1010 fffff804`9d6d2d5c : kbdclass!memcpy+0x92
fffff804`50f6f600 fffff804`9d701511     : ffff9a89`a4881ae0 fffff804`50f6f7c8 ffff9a89`a5b38310 fffff804`50f6f7c8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`50f6f6a0 ffff9a89`a4881ae0     : fffff804`50f6f7c8 ffff9a89`a5b38310 fffff804`50f6f7c8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`50f6f6a8 fffff804`50f6f7c8     : ffff9a89`a5b38310 fffff804`50f6f7c8 00000000`00000008 fffff804`50f6f720 : 0xffff9a89`a4881ae0
fffff804`50f6f6b0 ffff9a89`a5b38310     : fffff804`50f6f7c8 00000000`00000008 fffff804`50f6f720 ffff9a89`a4881990 : 0xfffff804`50f6f7c8
fffff804`50f6f6b8 fffff804`50f6f7c8     : 00000000`00000008 fffff804`50f6f720 ffff9a89`a4881990 fffff804`9d7013f0 : 0xffff9a89`a5b38310
fffff804`50f6f6c0 00000000`00000008     : fffff804`50f6f720 ffff9a89`a4881990 fffff804`9d7013f0 fffff804`4f8e6180 : 0xfffff804`50f6f7c8
fffff804`50f6f6c8 fffff804`50f6f720     : ffff9a89`a4881990 fffff804`9d7013f0 fffff804`4f8e6180 fffff804`9d6db848 : 0x8
fffff804`50f6f6d0 ffff9a89`a4881990     : fffff804`9d7013f0 fffff804`4f8e6180 fffff804`9d6db848 ffff9a89`a4881ae0 : 0xfffff804`50f6f720
fffff804`50f6f6d8 fffff804`9d7013f0     : fffff804`4f8e6180 fffff804`9d6db848 ffff9a89`a4881ae0 fffff804`50f6f759 : 0xffff9a89`a4881990
fffff804`50f6f6e0 fffff804`4f8e6180     : fffff804`9d6db848 ffff9a89`a4881ae0 fffff804`50f6f759 ffff9a89`a554d9e0 : HKKbdFltr+0x13f0
fffff804`50f6f6e8 fffff804`9d6db848     : ffff9a89`a4881ae0 fffff804`50f6f759 ffff9a89`a554d9e0 fffff804`9d6e0258 : 0xfffff804`4f8e6180
fffff804`50f6f6f0 fffff804`532251bc     : 00000000`00000000 ffffd880`00000010 00000000`00000000 ffffd880`32cc20b0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`50f6f7c0 fffff804`53226471     : 00000000`00000000 fffff804`50f6fe00 ffff9a89`b5ac8990 00000000`000002d7 : nt!KiExecuteAllDpcs+0x42c
fffff804`50f6fd00 fffff804`53420f75     : 00000000`00000000 00000000`00000000 fffff804`4f8e6180 00000226`41633330 : nt!KiRetireDpcList+0x1b1
fffff804`50f6ffb0 fffff804`53420f1f     : ffff9686`67b8f989 fffff804`53229ef5 00000000`00000000 ffff9a89`b4ea2be0 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff9686`67b8f8f0 fffff804`53229ef5     : 00000000`00000000 ffff9a89`b4ea2be0 00000000`00040246 fffff804`5321cf2b : nt!KiPlatformSwapStacksAndCallReturn
ffff9686`67b8f900 fffff804`534206cb     : 00000000`00000000 00000000`000000ff 00000225`dad1edc0 00000226`41633330 : nt!KiDispatchInterrupt+0xd5
ffff9686`67b8f9f0 fffff804`53419ac1     : ffff9686`67b8faa0 00000226`415ec020 00000225`c353bbc0 00000226`41633388 : nt!KiDpcInterruptBypass+0x1b
ffff9686`67b8fa20 00007ff7`dedc3056     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
000000ae`e4f7d940 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`dedc3056
SYMBOL_NAME:  kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME:  kbdclass.sys
IMAGE_VERSION:  10.0.22621.1774
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  92
FAILURE_BUCKET_ID:  AV_kbdclass!memcpy
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup:     MachineOwner
---------