*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff800b8ea49a3c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804526632d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2327
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10631
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 7144
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 041723-19078-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff800b8ea49a3c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804526632d2
READ_ADDRESS: fffff80410b1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff800b8ea49a3c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Lege
DPC_STACK_BASE: FFFF908D8992FFB0
TRAP_FRAME: ffff908d8992f890 -- (.trap 0xffff908d8992f890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800b0cfdbe40 rbx=0000000000000000 rcx=ffff800b0cfdbe40
rdx=0000000081a6dbfc rsi=0000000000000000 rdi=0000000000000000
rip=fffff804526632d2 rsp=ffff908d8992fa28 rbp=ffff908d8992faa0
r8=00000000000000c0 r9=0000000000000038 r10=ffff800affa26000
r11=ffff800b8ea49afc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`526632d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff800b`8ea49a3c=????????????????????????????????
Resetting default scope
STACK_TEXT:
ffff908d`8992f748 fffff804`1023e9a9 : 00000000`0000000a ffff800b`8ea49a3c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff908d`8992f750 fffff804`1023a034 : 00000000`00000000 ffff800a`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff908d`8992f890 fffff804`526632d2 : fffff804`52665b5d 00000000`73af8294 ffff908d`8992faa0 ffff800b`138e5aa0 : nt!KiPageFault+0x474
ffff908d`8992fa28 fffff804`52665b5d : 00000000`73af8294 ffff908d`8992faa0 ffff800b`138e5aa0 fffff804`52622d5c : kbdclass!memcpy+0x92
ffff908d`8992fa30 fffff804`52651511 : ffff800a`ffa021d0 ffff908d`8992fbf8 ffff800a`ffa0f310 ffff908d`8992fbf8 : kbdclass!KeyboardClassServiceCallback+0x16d
ffff908d`8992fad0 ffff800a`ffa021d0 : ffff908d`8992fbf8 ffff800a`ffa0f310 ffff908d`8992fbf8 00000000`00000008 : HKKbdFltr+0x1511
ffff908d`8992fad8 ffff908d`8992fbf8 : ffff800a`ffa0f310 ffff908d`8992fbf8 00000000`00000008 ffff908d`8992fb50 : 0xffff800a`ffa021d0
ffff908d`8992fae0 ffff800a`ffa0f310 : ffff908d`8992fbf8 00000000`00000008 ffff908d`8992fb50 ffff800a`ffa02080 : 0xffff908d`8992fbf8
ffff908d`8992fae8 ffff908d`8992fbf8 : 00000000`00000008 ffff908d`8992fb50 ffff800a`ffa02080 fffff804`526513f0 : 0xffff800a`ffa0f310
ffff908d`8992faf0 00000000`00000008 : ffff908d`8992fb50 ffff800a`ffa02080 fffff804`526513f0 00000000`00000012 : 0xffff908d`8992fbf8
ffff908d`8992faf8 ffff908d`8992fb50 : ffff800a`ffa02080 fffff804`526513f0 00000000`00000012 fffff804`5262b848 : 0x8
ffff908d`8992fb00 ffff800a`ffa02080 : fffff804`526513f0 00000000`00000012 fffff804`5262b848 ffff800a`ffa021d0 : 0xffff908d`8992fb50
ffff908d`8992fb08 fffff804`526513f0 : 00000000`00000012 fffff804`5262b848 ffff800a`ffa021d0 ffff908d`8992fb89 : 0xffff800a`ffa02080
ffff908d`8992fb10 00000000`00000012 : fffff804`5262b848 ffff800a`ffa021d0 ffff908d`8992fb89 ffff800a`ffa09dc0 : HKKbdFltr+0x13f0
ffff908d`8992fb18 fffff804`5262b848 : ffff800a`ffa021d0 ffff908d`8992fb89 ffff800a`ffa09dc0 fffff804`52630258 : 0x12
ffff908d`8992fb20 fffff804`1002815b : 00000000`00000008 ffff800a`00000010 00000000`00000000 ffff800a`ffa024f0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
ffff908d`8992fbf0 fffff804`100298d6 : ffffe581`00000001 ffff800b`00b5d80b ffff908d`8992fe20 00000000`00846ab2 : nt!KiProcessExpiredTimerList+0x1eb
ffff908d`8992fd20 fffff804`10232815 : 792cffc6`792cffc6 00000000`00000000 ffff800b`0f2f5080 00000000`00000000 : nt!KiRetireDpcList+0xed6
ffff908d`8992ffb0 fffff804`102327bf : ffff908d`8e11d349 fffff804`1002c0c9 ffffffff`ffffffff ffff6e0d`f91015b1 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff908d`8e11d2b0 fffff804`1002c0c9 : ffffffff`ffffffff ffff6e0d`f91015b1 ffff6e0d`f91015a1 ffffd75e`5d26c55a : nt!KiPlatformSwapStacksAndCallReturn
ffff908d`8e11d2c0 fffff804`10231f8b : ffff800b`0f2f5080 00007ff6`00000020 ffff908d`8e11d460 000000d4`3918f750 : nt!KiDispatchInterrupt+0xd9
ffff908d`8e11d3b0 fffff804`1022bde1 : 0000022d`5003f630 ffff800b`0b4eb080 ffff800b`00000000 ffff800b`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff908d`8e11d3e0 00007ff6`8212b5b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
000000d4`37f5ec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`8212b5b0
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23435.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner