Aslında hiç dökümleri incelemeden direk kbdclass.sys dediğiniz için aşağıdaki konuyu atacağım. Bilgisayar modelleri tamamen aynı değil, bu yüzden bu çözümü uygulamadan önce uyarayım bu konuyla ilgili.
Ayrıca o konudaki çözümü sunan
@Plyra da yardımcı olabilir, bu Monster laptopların problemini tam olarak anlamış değilim.
Şu ana kadar iki kere oldu ikisi de LoL oynarken oldu. Bilgisayarı 2 ay önce aldım. Sürücüleri aldıktan hemen sonra kurdum/güncelleştirdim. dmp dosya linki : dmp.rar Monster Abra V17.1, Windows 11 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely...
www.technopat.net
Dökümler:
Kod:Panoya kopyala
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe20b33874998, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8068f1f2fd2, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1030.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 4146.
Key : Analysis.Init.CPU.mSec
Value: 171.
Key : Analysis.Init.Elapsed.mSec
Value: 5664.
Key : Analysis.Memory.CommitPeak.Mb
Value: 144.
Key : Bugcheck.Code.DumpHeader
Value: 0xd1.
Key : Bugcheck.Code.Register
Value: 0xa.
Key : WER.OS.Branch
Value: co_release.
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 092422-13640-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.
BUGCHECK_CODE: d1.
BUGCHECK_P1: ffffe20b33874998.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8068f1f2fd2.
READ_ADDRESS: fffff80668b05450: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffffe20b33874998.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ACOrigins.exe
DPC_STACK_BASE: FFFFF806643FFFB0.
TRAP_FRAME: fffff806643ff7a0 -- (.trap 0xfffff806643ff7a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe208422c5540 rbx=0000000000000000 rcx=ffffe208422c5540
rdx=00000002f15af458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068f1f2fd2 rsp=fffff806643ff938 rbp=fffff806643ff9b0
r8=00000000000000c0 r9=ffffe20833a21b60 r10=ffffe20833a21000
r11=ffffe20b33874a58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
kbdclass!memcpy+0x92:
fffff806`8f1f2fd2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffe20b`33874998=????????????????????????????????
Resetting default scope.
STACK_TEXT:
fffff806`643ff658 fffff806`6822d9a9 : 00000000`0000000a ffffe20b`33874998 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`643ff660 fffff806`68229b00 : 00000000`00000000 00000000`00000000 fffff806`64074180 ffffa980`55840190 : nt!KiBugCheckDispatch+0x69
fffff806`643ff7a0 fffff806`8f1f2fd2 : fffff806`8f1f57ed 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 : nt!KiPageFault+0x440
fffff806`643ff938 fffff806`8f1f57ed : 00000000`000002b8 fffff806`643ff9b0 ffffe208`3e7d5320 fffff806`8f1b1cac : kbdclass!memcpy+0x92
fffff806`643ff940 fffff806`8f1e1511 : ffffe208`337f3aa0 fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`643ff9e0 ffffe208`337f3aa0 : fffff806`643ffb08 ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 : HKKbdFltr+0x1511
fffff806`643ff9e8 fffff806`643ffb08 : ffffe208`33a19310 fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 : 0xffffe208`337f3aa0
fffff806`643ff9f0 ffffe208`33a19310 : fffff806`643ffb08 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 : 0xfffff806`643ffb08
fffff806`643ff9f8 fffff806`643ffb08 : 00000000`00000008 fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 : 0xffffe208`33a19310
fffff806`643ffa00 00000000`00000008 : fffff806`643ffa60 ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 : 0xfffff806`643ffb08
fffff806`643ffa08 fffff806`643ffa60 : ffffe208`337f3950 fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 : 0x8.
fffff806`643ffa10 ffffe208`337f3950 : fffff806`8f1e13f0 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 : 0xfffff806`643ffa60
fffff806`643ffa18 fffff806`8f1e13f0 : 000008d4`0fe59017 fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 : 0xffffe208`337f3950
fffff806`643ffa20 000008d4`0fe59017 : fffff806`8f1bb618 ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 : HKKbdFltr+0x13f0
fffff806`643ffa28 fffff806`8f1bb618 : ffffe208`337f3aa0 fffff806`643ffa99 ffffe208`337d9d30 fffff806`8f1c01c8 : 0x000008d4`0fe59017
fffff806`643ffa30 fffff806`680c7c11 : fffff806`643ffe70 ffffe208`00000010 00000000`00000000 fffff806`640774c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`643ffb00 fffff806`680c6c12 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff806`643ffd00 fffff806`68222ab5 : 00000000`00000000 fffff806`64074180 ffffa980`563b1a00 00000000`00000001 : nt!KiRetireDpcList+0x2a2
fffff806`643fffb0 fffff806`68222890 : 00000000`00000000 fffff806`6802bf7a 0000007e`971ffa60 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff818a`bc23f210 fffff806`682220d5 : 00000000`00000001 fffff806`6821c9c1 ffffe208`40908080 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff818a`bc23f240 fffff806`6821c9c1 : ffffe208`40908080 00000000`00000000 ffff818a`bc23f460 ffffd02a`819b45f6 : nt!KiDpcInterruptBypass+0x25
ffff818a`bc23f250 fffff806`6822d1d5 : 00007ff7`351c9ca0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
ffff818a`bc23f3e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xbb
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass.
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22000.653
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 92.
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner.
---------
Kod:Panoya kopyala
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffcc1666b273e4, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8009ebf2fd2, address which referenced memory.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1389.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 7032.
Key : Analysis.Init.CPU.mSec
Value: 108.
Key : Analysis.Init.Elapsed.mSec
Value: 5427.
Key : Analysis.Memory.CommitPeak.Mb
Value: 134.
Key : Bugcheck.Code.DumpHeader
Value: 0xd1.
Key : Bugcheck.Code.Register
Value: 0xa.
Key : WER.OS.Branch
Value: co_release.
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 092422-13656-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.
BUGCHECK_CODE: d1.
BUGCHECK_P1: ffffcc1666b273e4.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8009ebf2fd2.
READ_ADDRESS: fffff80065b05450: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffffcc1666b273e4.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ACOrigins.exe
DPC_STACK_BASE: FFFFF80060B33FB0.
TRAP_FRAME: fffff80060b337a0 -- (.trap 0xfffff80060b337a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc0cd71c6ac0 rbx=0000000000000000 rcx=ffffcc0cd71c6ac0
rdx=000000098f960924 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ebf2fd2 rsp=fffff80060b33938 rbp=fffff80060b339b0
r8=00000000000000c0 r9=ffffcc0cc6bfe3b8 r10=ffffcc0cc6bfe000
r11=ffffcc1666b274a4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
kbdclass!memcpy+0x92:
fffff800`9ebf2fd2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffcc16`66b273e4=????????????????????????????????
Resetting default scope.
STACK_TEXT:
fffff800`60b33658 fffff800`6522d9a9 : 00000000`0000000a ffffcc16`66b273e4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`60b33660 fffff800`65229b00 : 00000000`00000000 00000000`00000000 fffff800`607a8180 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff800`60b337a0 fffff800`9ebf2fd2 : fffff800`9ebf57ed 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 : nt!KiPageFault+0x440
fffff800`60b33938 fffff800`9ebf57ed : 00000000`5fb500dc fffff800`60b339b0 ffffcc0c`d549b920 fffff800`9ebb1cac : kbdclass!memcpy+0x92
fffff800`60b33940 fffff800`9ebe1511 : ffffcc0c`c6c07aa0 fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`60b339e0 ffffcc0c`c6c07aa0 : fffff800`60b33b08 ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 : HKKbdFltr+0x1511
fffff800`60b339e8 fffff800`60b33b08 : ffffcc0c`c6c10310 fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 : 0xffffcc0c`c6c07aa0
fffff800`60b339f0 ffffcc0c`c6c10310 : fffff800`60b33b08 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 : 0xfffff800`60b33b08
fffff800`60b339f8 fffff800`60b33b08 : 00000000`00000008 fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 : 0xffffcc0c`c6c10310
fffff800`60b33a00 00000000`00000008 : fffff800`60b33a60 ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a : 0xfffff800`60b33b08
fffff800`60b33a08 fffff800`60b33a60 : ffffcc0c`c6c07950 fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 : 0x8.
fffff800`60b33a10 ffffcc0c`c6c07950 : fffff800`9ebe13f0 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 : 0xfffff800`60b33a60
fffff800`60b33a18 fffff800`9ebe13f0 : 000027bf`575d7d4a fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 : 0xffffcc0c`c6c07950
fffff800`60b33a20 000027bf`575d7d4a : fffff800`9ebbb618 ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 : HKKbdFltr+0x13f0
fffff800`60b33a28 fffff800`9ebbb618 : ffffcc0c`c6c07aa0 fffff800`60b33a99 ffffcc0c`c6ae8c60 fffff800`9ebc01c8 : 0x000027bf`575d7d4a
fffff800`60b33a30 fffff800`650c7c11 : fffff800`60b33e70 ffffcc0c`00000010 00000000`00000000 fffff800`607ab4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`60b33b00 fffff800`650c6c12 : 00000000`00000000 00000000`00000001 00000000`003b9b36 00000000`0000000f : nt!KiExecuteAllDpcs+0x491
fffff800`60b33d00 fffff800`65222ab5 : 00000000`00000000 fffff800`607a8180 ffff8b80`8b610a00 00000200`89cc7c88 : nt!KiRetireDpcList+0x2a2
fffff800`60b33fb0 fffff800`65222890 : ffffcc0c`dd826ae0 fffff800`6502bf7a 00000000`00000090 00000200`f3a597d0 : nt!KxRetireDpcList+0x5
ffffec8d`0f1973a0 fffff800`652220d5 : 00000200`89cc7c88 fffff800`6521c9c1 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffec8d`0f1973d0 fffff800`6521c9c1 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcc0c`00000000 : nt!KiDpcInterruptBypass+0x25
ffffec8d`0f1973e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass.
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22000.653
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 92.
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner.
---------
Kod:Panoya kopyala
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9f8988122d1c, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff804a8da2fd2, address which referenced memory.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1046.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 3731.
Key : Analysis.Init.CPU.mSec
Value: 171.
Key : Analysis.Init.Elapsed.mSec
Value: 4199.
Key : Analysis.Memory.CommitPeak.Mb
Value: 133.
Key : Bugcheck.Code.DumpHeader
Value: 0xd1.
Key : Bugcheck.Code.Register
Value: 0xa.
Key : WER.OS.Branch
Value: co_release.
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 092422-14031-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.
BUGCHECK_CODE: d1.
BUGCHECK_P1: ffff9f8988122d1c.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804a8da2fd2.
READ_ADDRESS: fffff8047ed05450: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffff9f8988122d1c.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ACOrigins.exe
DPC_STACK_BASE: FFFFF8047B694FB0.
TRAP_FRAME: fffff8047b6947a0 -- (.trap 0xfffff8047b6947a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f84740be0c0 rbx=0000000000000000 rcx=ffff9f84740be0c0
rdx=0000000514064c5c rsi=0000000000000000 rdi=0000000000000000
rip=fffff804a8da2fd2 rsp=fffff8047b694938 rbp=fffff8047b6949b0
r8=00000000000000c0 r9=ffff9f84736ec7a8 r10=ffff9f84736ec000
r11=ffff9f8988122ddc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
kbdclass!memcpy+0x92:
fffff804`a8da2fd2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9f89`88122d1c=????????????????????????????????
Resetting default scope.
STACK_TEXT:
fffff804`7b694658 fffff804`7e42d9a9 : 00000000`0000000a ffff9f89`88122d1c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`7b694660 fffff804`7e429b00 : 00000000`00000000 00000000`00000000 fffff804`7b309180 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff804`7b6947a0 fffff804`a8da2fd2 : fffff804`a8da57ed 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 : nt!KiPageFault+0x440
fffff804`7b694938 fffff804`a8da57ed : 00000000`ecfd07a4 fffff804`7b6949b0 ffff9f84`78c9daa0 fffff804`b61c1cac : kbdclass!memcpy+0x92
fffff804`7b694940 fffff804`b61f1511 : ffff9f84`674897d0 fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`7b6949e0 ffff9f84`674897d0 : fffff804`7b694b08 ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 : HKKbdFltr+0x1511
fffff804`7b6949e8 fffff804`7b694b08 : ffff9f84`72ff1310 fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 : 0xffff9f84`674897d0
fffff804`7b6949f0 ffff9f84`72ff1310 : fffff804`7b694b08 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 : 0xfffff804`7b694b08
fffff804`7b6949f8 fffff804`7b694b08 : 00000000`00000008 fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 : 0xffff9f84`72ff1310
fffff804`7b694a00 00000000`00000008 : fffff804`7b694a60 ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 : 0xfffff804`7b694b08
fffff804`7b694a08 fffff804`7b694a60 : ffff9f84`67489680 fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 : 0x8.
fffff804`7b694a10 ffff9f84`67489680 : fffff804`b61f13f0 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 : 0xfffff804`7b694a60
fffff804`7b694a18 fffff804`b61f13f0 : 0000c748`c5657ca7 fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 : 0xffff9f84`67489680
fffff804`7b694a20 0000c748`c5657ca7 : fffff804`b61cb618 ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 : HKKbdFltr+0x13f0
fffff804`7b694a28 fffff804`b61cb618 : ffff9f84`674897d0 fffff804`7b694a99 ffff9f84`750ecdd0 fffff804`b61d01c8 : 0x0000c748`c5657ca7
fffff804`7b694a30 fffff804`7e2c7c11 : fffff804`7b694e70 ffff9f84`00000010 00000000`00000000 fffff804`7b30c4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`7b694b00 fffff804`7e2c6c12 : 00000000`00000000 00000000`00000001 00000000`00666b7f 00000000`00000010 : nt!KiExecuteAllDpcs+0x491
fffff804`7b694d00 fffff804`7e422ab5 : 00000000`00000000 fffff804`7b309180 ffff8f80`3ef24a00 00000000`00000000 : nt!KiRetireDpcList+0x2a2
fffff804`7b694fb0 fffff804`7e422890 : 00000000`00000001 fffff804`7e22bf7a 0000027c`c212b620 0000027e`04537030 : nt!KxRetireDpcList+0x5
ffff8807`2680d3a0 fffff804`7e4220d5 : 00000000`00000000 fffff804`7e41c9c1 0000027d`eedee580 ffff9f84`74e132e0 : nt!KiDispatchInterruptContinue
ffff8807`2680d3d0 fffff804`7e41c9c1 : 0000027d`eedee580 ffff9f84`74e132e0 0000027c`c2071138 ffff9f84`00000000 : nt!KiDpcInterruptBypass+0x25
ffff8807`2680d3e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass.
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22000.653
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 92.
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner.
---------