*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd60f30f6faa8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff801741232d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 250
Key : Analysis.Elapsed.mSec
Value: 2803
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 62
Key : Analysis.Init.Elapsed.mSec
Value: 20924
Key : Analysis.Memory.CommitPeak.Mb
Value: 152
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417cf94
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffd60f30f6faa8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801741232d2
FILE_IN_CAB: 052023-20765-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff8013471c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd60f30f6faa8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
DPC_STACK_BASE: FFFFF80130B8CFB0
TRAP_FRAME: fffff80130b8c470 -- (.trap 0xfffff80130b8c470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd60e1c302f00 rbx=0000000000000000 rcx=ffffd60e1c302f00
rdx=0000000114c6cba8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801741232d2 rsp=fffff80130b8c608 rbp=fffff80130b8c680
r8=00000000000000c0 r9=0000000000000038 r10=ffffd60e116ff000
r11=ffffd60f30f6fb68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff801`741232d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffd60f`30f6faa8=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff801`30b8c328 fffff801`33e40fa9 : 00000000`0000000a ffffd60f`30f6faa8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`30b8c330 fffff801`33e3c634 : ffffd60e`115316e8 00000000`00000000 ffffd60e`11531180 fffff801`38f12ac2 : nt!KiBugCheckDispatch+0x69
fffff801`30b8c470 fffff801`741232d2 : fffff801`74125b5d 00000000`e0658ed8 fffff801`30b8c680 ffffd60e`1b5ceaa0 : nt!KiPageFault+0x474
fffff801`30b8c608 fffff801`74125b5d : 00000000`e0658ed8 fffff801`30b8c680 ffffd60e`1b5ceaa0 fffff801`725e2d5c : kbdclass!memcpy+0x92
fffff801`30b8c610 fffff801`72611511 : ffffd60e`09a29190 fffff801`30b8c7d8 ffffd60e`068b7310 fffff801`30b8c7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff801`30b8c6b0 ffffd60e`09a29190 : fffff801`30b8c7d8 ffffd60e`068b7310 fffff801`30b8c7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff801`30b8c6b8 fffff801`30b8c7d8 : ffffd60e`068b7310 fffff801`30b8c7d8 00000000`00000008 fffff801`30b8c730 : 0xffffd60e`09a29190
fffff801`30b8c6c0 ffffd60e`068b7310 : fffff801`30b8c7d8 00000000`00000008 fffff801`30b8c730 ffffd60e`09a29040 : 0xfffff801`30b8c7d8
fffff801`30b8c6c8 fffff801`30b8c7d8 : 00000000`00000008 fffff801`30b8c730 ffffd60e`09a29040 fffff801`726113f0 : 0xffffd60e`068b7310
fffff801`30b8c6d0 00000000`00000008 : fffff801`30b8c730 ffffd60e`09a29040 fffff801`726113f0 fffff801`2f2d4180 : 0xfffff801`30b8c7d8
fffff801`30b8c6d8 fffff801`30b8c730 : ffffd60e`09a29040 fffff801`726113f0 fffff801`2f2d4180 fffff801`725eb848 : 0x8
fffff801`30b8c6e0 ffffd60e`09a29040 : fffff801`726113f0 fffff801`2f2d4180 fffff801`725eb848 ffffd60e`09a29190 : 0xfffff801`30b8c730
fffff801`30b8c6e8 fffff801`726113f0 : fffff801`2f2d4180 fffff801`725eb848 ffffd60e`09a29190 fffff801`30b8c769 : 0xffffd60e`09a29040
fffff801`30b8c6f0 fffff801`2f2d4180 : fffff801`725eb848 ffffd60e`09a29190 fffff801`30b8c769 ffffd60e`14e50b90 : HKKbdFltr+0x13f0
fffff801`30b8c6f8 fffff801`725eb848 : ffffd60e`09a29190 fffff801`30b8c769 ffffd60e`14e50b90 fffff801`725f0258 : 0xfffff801`2f2d4180
fffff801`30b8c700 fffff801`33c2a1da : 00000000`00000000 ffffd60e`00000010 00000000`00000000 ffff8401`ccbe0bf0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff801`30b8c7d0 fffff801`33c299e4 : 00000000`00000022 ffffd60e`1bec1080 fffff801`004dadd2 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff801`30b8cd20 fffff801`33e34d65 : 00000000`00000000 00000000`00000000 ffffd60e`1a6a9080 000001cb`d64cc830 : nt!KiRetireDpcList+0xfe4
fffff801`30b8cfb0 fffff801`33e34d0f : fffffd0a`88e1f949 fffff801`33c2c0c9 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffd0a`88e1f8b0 fffff801`33c2c0c9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn
fffffd0a`88e1f8c0 fffff801`33e344db : 00000000`00000000 ffffd60e`0999b860 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
fffffd0a`88e1f9b0 fffff801`33e2db11 : 00000000`00000001 000001ca`bb780000 00000000`00000000 00000000`00000001 : nt!KiDpcInterruptBypass+0x1b
fffffd0a`88e1f9e0 00007ff6`e18cad8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000087`f983f550 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`e18cad8a
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd60f30f6faa8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff801741232d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 250
Key : Analysis.Elapsed.mSec
Value: 2803
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 62
Key : Analysis.Init.Elapsed.mSec
Value: 20924
Key : Analysis.Memory.CommitPeak.Mb
Value: 152
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417cf94
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffd60f30f6faa8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801741232d2
FILE_IN_CAB: 052023-20765-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff8013471c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd60f30f6faa8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
DPC_STACK_BASE: FFFFF80130B8CFB0
TRAP_FRAME: fffff80130b8c470 -- (.trap 0xfffff80130b8c470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd60e1c302f00 rbx=0000000000000000 rcx=ffffd60e1c302f00
rdx=0000000114c6cba8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801741232d2 rsp=fffff80130b8c608 rbp=fffff80130b8c680
r8=00000000000000c0 r9=0000000000000038 r10=ffffd60e116ff000
r11=ffffd60f30f6fb68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff801`741232d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffd60f`30f6faa8=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff801`30b8c328 fffff801`33e40fa9 : 00000000`0000000a ffffd60f`30f6faa8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`30b8c330 fffff801`33e3c634 : ffffd60e`115316e8 00000000`00000000 ffffd60e`11531180 fffff801`38f12ac2 : nt!KiBugCheckDispatch+0x69
fffff801`30b8c470 fffff801`741232d2 : fffff801`74125b5d 00000000`e0658ed8 fffff801`30b8c680 ffffd60e`1b5ceaa0 : nt!KiPageFault+0x474
fffff801`30b8c608 fffff801`74125b5d : 00000000`e0658ed8 fffff801`30b8c680 ffffd60e`1b5ceaa0 fffff801`725e2d5c : kbdclass!memcpy+0x92
fffff801`30b8c610 fffff801`72611511 : ffffd60e`09a29190 fffff801`30b8c7d8 ffffd60e`068b7310 fffff801`30b8c7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff801`30b8c6b0 ffffd60e`09a29190 : fffff801`30b8c7d8 ffffd60e`068b7310 fffff801`30b8c7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff801`30b8c6b8 fffff801`30b8c7d8 : ffffd60e`068b7310 fffff801`30b8c7d8 00000000`00000008 fffff801`30b8c730 : 0xffffd60e`09a29190
fffff801`30b8c6c0 ffffd60e`068b7310 : fffff801`30b8c7d8 00000000`00000008 fffff801`30b8c730 ffffd60e`09a29040 : 0xfffff801`30b8c7d8
fffff801`30b8c6c8 fffff801`30b8c7d8 : 00000000`00000008 fffff801`30b8c730 ffffd60e`09a29040 fffff801`726113f0 : 0xffffd60e`068b7310
fffff801`30b8c6d0 00000000`00000008 : fffff801`30b8c730 ffffd60e`09a29040 fffff801`726113f0 fffff801`2f2d4180 : 0xfffff801`30b8c7d8
fffff801`30b8c6d8 fffff801`30b8c730 : ffffd60e`09a29040 fffff801`726113f0 fffff801`2f2d4180 fffff801`725eb848 : 0x8
fffff801`30b8c6e0 ffffd60e`09a29040 : fffff801`726113f0 fffff801`2f2d4180 fffff801`725eb848 ffffd60e`09a29190 : 0xfffff801`30b8c730
fffff801`30b8c6e8 fffff801`726113f0 : fffff801`2f2d4180 fffff801`725eb848 ffffd60e`09a29190 fffff801`30b8c769 : 0xffffd60e`09a29040
fffff801`30b8c6f0 fffff801`2f2d4180 : fffff801`725eb848 ffffd60e`09a29190 fffff801`30b8c769 ffffd60e`14e50b90 : HKKbdFltr+0x13f0
fffff801`30b8c6f8 fffff801`725eb848 : ffffd60e`09a29190 fffff801`30b8c769 ffffd60e`14e50b90 fffff801`725f0258 : 0xfffff801`2f2d4180
fffff801`30b8c700 fffff801`33c2a1da : 00000000`00000000 ffffd60e`00000010 00000000`00000000 ffff8401`ccbe0bf0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff801`30b8c7d0 fffff801`33c299e4 : 00000000`00000022 ffffd60e`1bec1080 fffff801`004dadd2 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff801`30b8cd20 fffff801`33e34d65 : 00000000`00000000 00000000`00000000 ffffd60e`1a6a9080 000001cb`d64cc830 : nt!KiRetireDpcList+0xfe4
fffff801`30b8cfb0 fffff801`33e34d0f : fffffd0a`88e1f949 fffff801`33c2c0c9 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffd0a`88e1f8b0 fffff801`33c2c0c9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn
fffffd0a`88e1f8c0 fffff801`33e344db : 00000000`00000000 ffffd60e`0999b860 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
fffffd0a`88e1f9b0 fffff801`33e2db11 : 00000000`00000001 000001ca`bb780000 00000000`00000000 00000000`00000001 : nt!KiDpcInterruptBypass+0x1b
fffffd0a`88e1f9e0 00007ff6`e18cad8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000087`f983f550 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`e18cad8a
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Evet bu da ihtimaller dahilinde.Üçüncü parti yazlım klavyenin LED'lerini kontrol eden bir uygulama olabilir mi?