0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd08f999378b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8014a1532d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2249
    Key  : Analysis.Elapsed.mSec
    Value: 10721
    Key  : Analysis.IO.Other.Mb
    Value: 16
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 24
    Key  : Analysis.Init.CPU.mSec
    Value: 874
    Key  : Analysis.Init.Elapsed.mSec
    Value: 232989
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1
    Key  : Dump.Attributes.AsUlong
    Value: 1808
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy
    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84
    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1
    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0
    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1
    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0
    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0
    Key  : Hypervisor.Flags.CpuManager
    Value: 1
    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1
    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1
    Key  : Hypervisor.Flags.Epf
    Value: 0
    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1
    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1
    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0
    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0
    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0
    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1
    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1
    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0
    Key  : Hypervisor.Flags.RootScheduler
    Value: 0
    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1
    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0
    Key  : Hypervisor.Flags.Value
    Value: 21631230
    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe
    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1
    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1
    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1
    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0
    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1
    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0
    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1
    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1
    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.Nested
    Value: 0
    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.Value
    Value: 1015
    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7
BUGCHECK_CODE:  d1
BUGCHECK_P1: ffffd08f999378b8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8014a1532d2
FILE_IN_CAB:  111223-23250-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump
READ_ADDRESS: fffff80109d1d468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffd08f999378b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  fffff8010dcff9f0 -- (.trap 0xfffff8010dcff9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd08e2a32f480 rbx=0000000000000000 rcx=ffffd08e2a32f480
rdx=000000016f608438 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014a1532d2 rsp=fffff8010dcffb88 rbp=fffff8010dcffc00
 r8=00000000000000c0  r9=0000000000000038 r10=ffffd08e11afd000
r11=ffffd08f99937978 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff801`4a1532d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffd08f`999378b8=????????????????????????????????
Resetting default scope
STACK_TEXT: 
fffff801`0dcff8a8 fffff801`09427da9     : 00000000`0000000a ffffd08f`999378b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`0dcff8b0 fffff801`09423434     : 0003431d`1b9b8978 00000000`00000000 ffffd08e`0dd6e180 fffff801`27213242 : nt!KiBugCheckDispatch+0x69
fffff801`0dcff9f0 fffff801`4a1532d2     : fffff801`4a155b5d 00000000`74346158 fffff801`0dcffc00 ffffd08e`2f992960 : nt!KiPageFault+0x474
fffff801`0dcffb88 fffff801`4a155b5d     : 00000000`74346158 fffff801`0dcffc00 ffffd08e`2f992960 fffff801`4a112d5c : kbdclass!memcpy+0x92
fffff801`0dcffb90 fffff801`4a141511     : ffffd08e`0dfa5ae0 fffff801`0dcffd58 ffffd08e`0dc0d310 fffff801`0dcffd58 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff801`0dcffc30 ffffd08e`0dfa5ae0     : fffff801`0dcffd58 ffffd08e`0dc0d310 fffff801`0dcffd58 00000000`00000008 : HKKbdFltr+0x1511
fffff801`0dcffc38 fffff801`0dcffd58     : ffffd08e`0dc0d310 fffff801`0dcffd58 00000000`00000008 fffff801`0dcffcb0 : 0xffffd08e`0dfa5ae0
fffff801`0dcffc40 ffffd08e`0dc0d310     : fffff801`0dcffd58 00000000`00000008 fffff801`0dcffcb0 ffffd08e`0dfa5990 : 0xfffff801`0dcffd58
fffff801`0dcffc48 fffff801`0dcffd58     : 00000000`00000008 fffff801`0dcffcb0 ffffd08e`0dfa5990 fffff801`4a1413f0 : 0xffffd08e`0dc0d310
fffff801`0dcffc50 00000000`00000008     : fffff801`0dcffcb0 ffffd08e`0dfa5990 fffff801`4a1413f0 fffff801`06475180 : 0xfffff801`0dcffd58
fffff801`0dcffc58 fffff801`0dcffcb0     : ffffd08e`0dfa5990 fffff801`4a1413f0 fffff801`06475180 fffff801`4a11b848 : 0x8
fffff801`0dcffc60 ffffd08e`0dfa5990     : fffff801`4a1413f0 fffff801`06475180 fffff801`4a11b848 ffffd08e`0dfa5ae0 : 0xfffff801`0dcffcb0
fffff801`0dcffc68 fffff801`4a1413f0     : fffff801`06475180 fffff801`4a11b848 ffffd08e`0dfa5ae0 fffff801`0dcffce9 : 0xffffd08e`0dfa5990
fffff801`0dcffc70 fffff801`06475180     : fffff801`4a11b848 ffffd08e`0dfa5ae0 fffff801`0dcffce9 ffffd08e`0daa2090 : HKKbdFltr+0x13f0
fffff801`0dcffc78 fffff801`4a11b848     : ffffd08e`0dfa5ae0 fffff801`0dcffce9 ffffd08e`0daa2090 fffff801`4a120258 : 0xfffff801`06475180
fffff801`0dcffc80 fffff801`0922a72c     : 00000000`00000000 ffff9980`00000010 00000000`00000000 ffff9980`a7fd1830 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff801`0dcffd50 fffff801`09229731     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
fffff801`0dd00290 fffff801`0941753e     : 00000000`00000000 fffff801`06475180 fffff801`09d4d6c0 ffffd08e`13dfa080 : nt!KiRetireDpcList+0x1b1
fffff801`0dd00540 00000000`00000000     : fffff801`0dd01000 fffff801`0dcfa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME:  kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME:  kbdclass.sys
IMAGE_VERSION:  10.0.22621.1774
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  92
FAILURE_BUCKET_ID:  AV_kbdclass!memcpy
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup:     MachineOwner
---------