Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Emre\AppData\Local\Temp\Rar$DIa9960.22923\050123-23687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff802`3be00000 PsLoadedModuleList = 0xfffff802`3ca13490
Debug session time: Mon May 1 01:26:28.340 2023 (UTC + 3:00)
System Uptime: 4 days 18:37:49.776
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`3c22b8f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff802`41e058c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffb90303f9ccc4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8028270324f, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3407
Key : Analysis.IO.Other.Mb
Value: 14
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 30
Key : Analysis.Init.CPU.mSec
Value: 375
Key : Analysis.Init.Elapsed.mSec
Value: 15548
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 050123-23687-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffb90303f9ccc4
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8028270324f
READ_ADDRESS: fffff8023cb1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb90303f9ccc4
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80241e05a00 -- (.trap 0xfffff80241e05a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb90015cefc80 rbx=0000000000000000 rcx=ffffb90015cefc80
rdx=ffffb90303f9ccc4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8028270324f rsp=fffff80241e05b98 rbp=fffff80241e05c10
r8=000000000000000c r9=0000000000000038 r10=ffffb90003dd9000
r11=fffff80241e05b90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
kbdclass!memcpy+0xf:
fffff802`8270324f 4c8b1a mov r11,qword ptr [rdx] ds:ffffb903`03f9ccc4=????????????????
Resetting default scope
STACK_TEXT:
fffff802`41e058b8 fffff802`3c240fa9 : 00000000`0000000a ffffb903`03f9ccc4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`41e058c0 fffff802`3c23c634 : 000003c0`d25ac63f 00000000`00000000 00000000`0000000f ffffb90f`fa8b4760 : nt!KiBugCheckDispatch+0x69
fffff802`41e05a00 fffff802`8270324f : fffff802`82705b5d 00000000`0000000c fffff802`41e05c10 ffffb900`10343960 : nt!KiPageFault+0x474
fffff802`41e05b98 fffff802`82705b5d : 00000000`0000000c fffff802`41e05c10 ffffb900`10343960 fffff802`826c2d5c : kbdclass!memcpy+0xf
fffff802`41e05ba0 fffff802`826f1511 : ffffb900`03d8b190 fffff802`41e05d68 ffffb900`03d8c310 fffff802`41e05d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`41e05c40 ffffb900`03d8b190 : fffff802`41e05d68 ffffb900`03d8c310 fffff802`41e05d68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`41e05c48 fffff802`41e05d68 : ffffb900`03d8c310 fffff802`41e05d68 00000000`00000008 fffff802`41e05cc0 : 0xffffb900`03d8b190
fffff802`41e05c50 ffffb900`03d8c310 : fffff802`41e05d68 00000000`00000008 fffff802`41e05cc0 ffffb900`03d8b040 : 0xfffff802`41e05d68
fffff802`41e05c58 fffff802`41e05d68 : 00000000`00000008 fffff802`41e05cc0 ffffb900`03d8b040 fffff802`826f13f0 : 0xffffb900`03d8c310
fffff802`41e05c60 00000000`00000008 : fffff802`41e05cc0 ffffb900`03d8b040 fffff802`826f13f0 fffff802`393e6180 : 0xfffff802`41e05d68
fffff802`41e05c68 fffff802`41e05cc0 : ffffb900`03d8b040 fffff802`826f13f0 fffff802`393e6180 fffff802`826cb848 : 0x8
fffff802`41e05c70 ffffb900`03d8b040 : fffff802`826f13f0 fffff802`393e6180 fffff802`826cb848 ffffb900`03d8b190 : 0xfffff802`41e05cc0
fffff802`41e05c78 fffff802`826f13f0 : fffff802`393e6180 fffff802`826cb848 ffffb900`03d8b190 fffff802`41e05cf9 : 0xffffb900`03d8b040
fffff802`41e05c80 fffff802`393e6180 : fffff802`826cb848 ffffb900`03d8b190 fffff802`41e05cf9 ffffb900`03cb8c90 : HKKbdFltr+0x13f0
fffff802`41e05c88 fffff802`826cb848 : ffffb900`03d8b190 fffff802`41e05cf9 ffffb900`03cb8c90 fffff802`826d0258 : 0xfffff802`393e6180
fffff802`41e05c90 fffff802`3c02a1da : 00000000`00000000 fffff802`00000001 00000000`00000000 ffffcb80`71b0c970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`41e05d60 fffff802`3c0299e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`41e062b0 fffff802`3c2306ee : 00000000`00000000 fffff802`393e6180 00000000`00000000 fffff802`3cb4c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`41e06540 00000000`00000000 : fffff802`41e07000 fffff802`41e00000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+f
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23145.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------