*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe791e946c048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804710032d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3015
Key : Analysis.Elapsed.mSec
Value: 4862
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 7379
Key : Analysis.Memory.CommitPeak.Mb
Value: 147
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffe791e946c048
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804710032d2
FILE_IN_CAB: $RNAH3S8.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8041bd1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe791e946c048
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8041a498ec0 -- (.trap 0xfffff8041a498ec0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe789bd3841c0 rbx=0000000000000000 rcx=ffffe789bd3841c0
rdx=000000082c0e7e88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804710032d2 rsp=fffff8041a499058 rbp=fffff8041a4990d0
r8=00000000000000c0 r9=0000000000000038 r10=ffffe789afb39000
r11=ffffe791e946c108 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`710032d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffe791`e946c048=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff804`1a498d78 fffff804`1b440fa9 : 00000000`0000000a ffffe791`e946c048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`1a498d80 fffff804`1b43c634 : 00000000`00000000 00000000`00000000 fffff804`00000000 00000007`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`1a498ec0 fffff804`710032d2 : fffff804`71005b5d 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 : nt!KiPageFault+0x474
fffff804`1a499058 fffff804`71005b5d : 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 fffff804`1b21c43e : kbdclass!memcpy+0x92
fffff804`1a499060 fffff804`70ff1511 : ffffe789`ae975e70 fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`1a499100 ffffe789`ae975e70 : fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 : HKKbdFltr+0x1511
fffff804`1a499108 fffff804`1a499368 : ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 : 0xffffe789`ae975e70
fffff804`1a499110 ffffe789`aedc8310 : fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 00000000`00000000 : 0xfffff804`1a499368
fffff804`1a499118 fffff804`1a499368 : 00000000`00000000 fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 : 0xffffe789`aedc8310
fffff804`1a499120 00000000`00000000 : fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 fffff804`18392180 : 0xfffff804`1a499368
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
kbdclass.sys
hatası diye düşünmüştüm. Öyle görünüyor, ancak akışı incelerken araya Nvidia ekran kartı sürücüsünün de kaynadığını gördüm. 00000000`0000000a ffff801b`2f5bc950 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
00000000`00000001 ffff800f`f64af3b0 ffff800f`f202f000 fffff801`5a3c1193 : nt!KiBugCheckDispatch+0x69
fffff801`59f65cc5 ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c : nt!KiPageFault+0x474
ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c fffff801`a84585e0 : kbdclass!memcpy+0x92
ffff800f`eb5ece30 fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 : kbdclass!KeyboardClassServiceCallback+0x2d5
fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce : HKKbdFltr+0x1511
ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 : 0xffff800f`eb5ece30
fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 00000000`00000000 : 0xfffff801`581087d8
fffff801`970e57ce fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 : 0xffff800f`eb737310
fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 : 0xfffff801`581087d8
00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 fffff801`7f3e1d45 : nvlddmkm+0x657ce
fffff801`7f3f10c8 fffff801`58108699 fffff801`581087d8 00000000`00000003 : WppRecorder!WppAutoLogTrace+0x1a3
fffff801`58108699 fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 : klkbdflt+0x2c7b
fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c : klkbdflt+0x110c8
00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 : 0xfffff801`58108699
ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 : 0xfffff801`581087d8
fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 00000000`00000008 : 0x3
00000000`00000051 fffff801`523e12d3 00000000`00000008 fffff801`581086a0 : 0xffff800f`ebb35000
fffff801`7f3e26a0 00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 : i8042prt!WPP_RECORDER_SF_+0x7c
00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 : klkbdflt+0x11458
00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 : klkbdflt+0x26a0
ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 00000000`00000000 : 0xc
Timestamp: Saturday April 8 2023 10:19:44 (64311590)
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff801b2f5bc950, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80159f632d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for klkbdflt.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1952
Key : Analysis.Elapsed.mSec
Value: 7984
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 9444
Key : Analysis.Memory.CommitPeak.Mb
Value: 146
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff801b2f5bc950
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80159f632d2
FILE_IN_CAB: 052323-32078-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8015691c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff801b2f5bc950
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: aces.exe
DPC_STACK_BASE: FFFFF80158108FB0
TRAP_FRAME: fffff80158108330 -- (.trap 0xfffff80158108330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800feb78e934 rbx=0000000000000000 rcx=ffff800feb78e934
rdx=0000000b43e2e01c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80159f632d2 rsp=fffff801581084c8 rbp=fffff80158108540
r8=000000000000012c r9=0000000000000000 r10=fffff80155eb23d0
r11=ffff801b2f5bca7c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
kbdclass!memcpy+0x92:
fffff801`59f632d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff801b`2f5bc950=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff801`581081e8 fffff801`56040fa9 : 00000000`0000000a ffff801b`2f5bc950 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`581081f0 fffff801`5603c634 : 00000000`00000001 ffff800f`f64af3b0 ffff800f`f202f000 fffff801`5a3c1193 : nt!KiBugCheckDispatch+0x69
fffff801`58108330 fffff801`59f632d2 : fffff801`59f65cc5 ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c : nt!KiPageFault+0x474
fffff801`581084c8 fffff801`59f65cc5 : ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c fffff801`a84585e0 : kbdclass!memcpy+0x92
fffff801`581084d0 fffff801`a8451511 : ffff800f`eb5ece30 fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 : kbdclass!KeyboardClassServiceCallback+0x2d5
fffff801`58108570 ffff800f`eb5ece30 : fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce : HKKbdFltr+0x1511
fffff801`58108578 fffff801`581087d8 : ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 : 0xffff800f`eb5ece30
fffff801`58108580 ffff800f`eb737310 : fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 00000000`00000000 : 0xfffff801`581087d8
fffff801`58108588 fffff801`581087d8 : fffff801`970e57ce fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 : 0xffff800f`eb737310
fffff801`58108590 fffff801`970e57ce : fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 : 0xfffff801`581087d8
fffff801`58108598 fffff801`523e12d3 : 00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 fffff801`7f3e1d45 : nvlddmkm+0x657ce
fffff801`581085a0 fffff801`7f3e2c7b : fffff801`7f3f10c8 fffff801`58108699 fffff801`581087d8 00000000`00000003 : WppRecorder!WppAutoLogTrace+0x1a3
fffff801`58108600 fffff801`7f3f10c8 : fffff801`58108699 fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 : klkbdflt+0x2c7b
fffff801`58108608 fffff801`58108699 : fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c : klkbdflt+0x110c8
fffff801`58108610 fffff801`581087d8 : 00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 : 0xfffff801`58108699
fffff801`58108618 00000000`00000003 : ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 : 0xfffff801`581087d8
fffff801`58108620 ffff800f`ebb35000 : fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 00000000`00000008 : 0x3
fffff801`58108628 fffff801`a9fd2d5c : 00000000`00000051 fffff801`523e12d3 00000000`00000008 fffff801`581086a0 : 0xffff800f`ebb35000
fffff801`58108630 fffff801`7f3f1458 : fffff801`7f3e26a0 00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 : i8042prt!WPP_RECORDER_SF_+0x7c
fffff801`58108670 fffff801`7f3e26a0 : 00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 : klkbdflt+0x11458
fffff801`58108678 00000000`0000000c : 00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 : klkbdflt+0x26a0
fffff801`58108680 00000000`00000000 : ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 00000000`00000000 : 0xc
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe791e946c048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804710032d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3015
Key : Analysis.Elapsed.mSec
Value: 4862
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 7379
Key : Analysis.Memory.CommitPeak.Mb
Value: 147
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffe791e946c048
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804710032d2
FILE_IN_CAB: $RNAH3S8.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8041bd1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe791e946c048
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8041a498ec0 -- (.trap 0xfffff8041a498ec0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe789bd3841c0 rbx=0000000000000000 rcx=ffffe789bd3841c0
rdx=000000082c0e7e88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804710032d2 rsp=fffff8041a499058 rbp=fffff8041a4990d0
r8=00000000000000c0 r9=0000000000000038 r10=ffffe789afb39000
r11=ffffe791e946c108 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`710032d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffe791`e946c048=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff804`1a498d78 fffff804`1b440fa9 : 00000000`0000000a ffffe791`e946c048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`1a498d80 fffff804`1b43c634 : 00000000`00000000 00000000`00000000 fffff804`00000000 00000007`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`1a498ec0 fffff804`710032d2 : fffff804`71005b5d 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 : nt!KiPageFault+0x474
fffff804`1a499058 fffff804`71005b5d : 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 fffff804`1b21c43e : kbdclass!memcpy+0x92
fffff804`1a499060 fffff804`70ff1511 : ffffe789`ae975e70 fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`1a499100 ffffe789`ae975e70 : fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 : HKKbdFltr+0x1511
fffff804`1a499108 fffff804`1a499368 : ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 : 0xffffe789`ae975e70
fffff804`1a499110 ffffe789`aedc8310 : fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 00000000`00000000 : 0xfffff804`1a499368
fffff804`1a499118 fffff804`1a499368 : 00000000`00000000 fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 : 0xffffe789`aedc8310
fffff804`1a499120 00000000`00000000 : fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 fffff804`18392180 : 0xfffff804`1a499368
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------