i9-7920X sistemde KERNEL_SECURITY_CHECK_FAILURE hatası

CaLViN

Centipat
Katılım
14 Haziran 2020
Mesajlar
9
Yer
Antalya
Sevgili dostlar,
Son haftalarda nadiren de olsa mavi ekran hatası almaya başladım.
Hata bazen tarayıcı kullanırken bazen de oyun oynarken olabiliyor. Kasa sıcaklıkları normal, herhangi bir yüklenme olmadığında da hata aldığım oluyor.
Dump dosyasının içinden çıkamadım, yorumlayabilir misiniz?

Kod:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (24 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`25800000 PsLoadedModuleList = 0xfffff805`2642a2d0
Debug session time: Mon Feb 21 22:57:05.386 2022 (UTC + 3:00)
System Uptime: 0 days 18:15:19.852
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
..............................................
Loading User Symbols.

Loading unloaded module list.
.............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`25bf7610 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd280`9182e280=0000000000000139
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd2809182e5a0, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffd2809182e4f8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

Unable to load image \SystemRoot\system32\DRIVERS\klmouflt.sys, Win32 error 0n2.

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 4171.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 37631.

 Key : Analysis.Init.CPU.mSec
 Value: 749.

 Key : Analysis.Init.Elapsed.mSec
 Value: 3670.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 106.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd2809182e5a0.

BUGCHECK_P3: ffffd2809182e4f8.

BUGCHECK_P4: 0

TRAP_FRAME: ffffd2809182e5a0 -- (.trap 0xffffd2809182e5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd2809182e7a0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805444344ed rsp=ffffd2809182e738 rbp=ffffd2809182e7b0
 r8=ffff9c07fac25dd8 r9=ffffd2809182e8e4 r10=fffff80525a1e350
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy.
mouclass!MouseClassDequeueRead+0x51:
fffff805`444344ed cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffd2809182e4f8 -- (.exr 0xffffd2809182e4f8)
ExceptionAddress: fffff805444344ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffd280`9182e278 fffff805`25c09569 : 00000000`00000139 00000000`00000003 ffffd280`9182e5a0 ffffd280`9182e4f8 : nt!KeBugCheckEx
ffffd280`9182e280 fffff805`25c09990 : ffff9c07`e9010340 00000000`000000c0 00000000`00000100 01800040`475580e7 : nt!KiBugCheckDispatch+0x69
ffffd280`9182e3c0 fffff805`25c07d23 : 00000000`00000002 00000000`00000000 ffff9c07`faa832b0 00000000`00000002 : nt!KiFastFailDispatch+0xd0
ffffd280`9182e5a0 fffff805`444344ed : fffff805`44434c7a ffff9c07`fac25d40 00000000`000000c0 00000000`00000100 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd280`9182e738 fffff805`44434c7a : ffff9c07`fac25d40 00000000`000000c0 00000000`00000100 ffff9c07`f3e2e010 : mouclass!MouseClassDequeueRead+0x51
ffffd280`9182e740 fffff805`44411776 : 00000099`0415b25c ffff9c07`fac24ec0 ffff9c07`fabd0e80 ffffd280`9182e8e4 : mouclass!MouseClassServiceCallback+0x9a
ffffd280`9182e7e0 fffff805`443f3aa8 : 00000000`00000000 00000000`00000002 ffffd280`9182e8f8 ffffd280`9182e8e4 : klmouflt+0x1776
ffffd280`9182e8a0 fffff805`25a84ffe : 00000000`00000000 00000000`00000000 00000000`0007c001 fffff805`00000000 : mouhid!MouHid_ReadComplete+0x758
ffffd280`9182e940 fffff805`25a84ec7 : 00000000`00000000 ffff9c07`faa2d006 ffff9c07`faac8c50 00000000`00000000 : nt!IopfCompleteRequest+0x11e
ffffd280`9182ea30 fffff805`440faef5 : ffff9c07`f662ee98 ffff9c07`fabad102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
ffffd280`9182ea60 fffff805`440fa7ed : ffff9c07`fabad1d0 ffff9c07`fabad102 ffff9c07`fabad1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
ffffd280`9182eb60 fffff805`25a84ffe : ffff9c07`f3e2f010 ffff9c07`f3e2f010 ffffd280`9182ec01 ffff9c07`f3e2f7a3 : HIDCLASS!HidpInterruptReadComplete+0x37d
ffffd280`9182ec00 fffff805`25a84ec7 : 00000000`00000001 00000000`00000000 ffff9c07`fabdc020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffffd280`9182ecf0 fffff805`2aba811a : 00000000`00000000 ffff9c07`f3fc0b90 ffff9c07`f3e2f010 ffffd280`9182edd0 : nt!IofCompleteRequest+0x17
ffffd280`9182ed20 fffff805`2aba5bbf : ffff9c07`fc63e402 ffff9c08`04bd0a20 ffff9c07`f3e2f010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffffd280`9182edb0 fffff805`40e9c1dd : 00000000`ffffff02 ffff9c07`fc63e280 ffff9c07`fabdc400 ffff9c07`fabdc400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffffd280`9182ee10 fffff805`40e9c0a1 : ffff9c07`fc63e420 00000000`00000009 ffff9c07`fc63e4b0 ffffd280`9182f028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9
ffffd280`9182ee70 fffff805`40e9be90 : 00000000`00000004 ffffd280`9182efe0 00000000`00000000 ffff9c07`fabdb620 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
ffffd280`9182ef20 fffff805`40e968f1 : 00000000`00000004 ffffd280`9182eff8 00000000`00000008 ffffd280`9182f000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
ffffd280`9182ef50 fffff805`40e96425 : 00000000`00000780 000063f8`0c049700 ffff9c07`f4538920 ffff9c07`fa7a0d00 : USBXHCI!Endpoint_TransferEventHandler+0xb1
ffffd280`9182efb0 fffff805`40e960fc : ffff9c07`f3dde368 ffffd400`5d9e0180 000063f8`0c020338 ffffd280`9182f0d0 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffffd280`9182f0b0 fffff805`2aba38f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffffd280`9182f0e0 fffff805`25a9a3fe : ffffd400`5d9e3240 fffff805`40e3870b ffffd280`9182f3e0 ffff9c08`007f4080 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
ffffd280`9182f120 fffff805`25a996e4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffd280`9182f290 fffff805`25bfb17e : ffffffff`00000000 ffffd400`5d9e0180 ffffd400`5d9eb640 ffff9c08`007f4080 : nt!KiRetireDpcList+0x1f4
ffffd280`9182f520 00000000`00000000 : ffffd280`91830000 ffffd280`91829000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: mouclass!MouseClassDequeueRead+51

MODULE_NAME: mouclass.

IMAGE_NAME: mouclass.sys

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 51.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32}

Followup: MachineOwner.
---------

Bu arada HD Tune ile disk testi, ramtest ile bellek testi yaptım.
Hata bulunamadı.
 
Son düzenleyen: Moderatör:
İlk olarak Kaspersky antivirüs programını kaldırın.
 
Merhaba,
Minidump dosyasını da ekliyorum.



Teşekkür ederim.
Az önce aldığım mavi ekran hatasını da ekliyorum :


Kaspersky'ı kaldırın ve sistemi test edin. Bu arada kaldırdıktan sonra da tekrar kurabileceğinizi belirtmeliyim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff3860aa2e5a0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff3860aa2e4f8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klmouflt.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5718

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 14996

Key : Analysis.Init.CPU.mSec
Value: 999

Key : Analysis.Init.Elapsed.mSec
Value: 4788

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 022522-8609-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff3860aa2e5a0

BUGCHECK_P3: fffff3860aa2e4f8

BUGCHECK_P4: 0

TRAP_FRAME: fffff3860aa2e5a0 -- (.trap 0xfffff3860aa2e5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff3860aa2e7a0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043ae044ed rsp=fffff3860aa2e738 rbp=fffff3860aa2e7b0
r8=ffffbc8bef6c9c18 r9=fffff3860aa2e8e4 r10=fffff8041ca1e350
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
mouclass!MouseClassDequeueRead+0x51:
fffff804`3ae044ed cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff3860aa2e4f8 -- (.exr 0xfffff3860aa2e4f8)
ExceptionAddress: fffff8043ae044ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff386`0aa2e278 fffff804`1cc09569 : 00000000`00000139 00000000`00000003 fffff386`0aa2e5a0 fffff386`0aa2e4f8 : nt!KeBugCheckEx
fffff386`0aa2e280 fffff804`1cc09990 : ffffbc8b`d8010340 00000000`000000c0 00000000`00000100 01800040`3a8d80e7 : nt!KiBugCheckDispatch+0x69
fffff386`0aa2e3c0 fffff804`1cc07d23 : 00000000`00f3ff3f ffff8200`790e4180 0007cecf`000b1d96 0007cecf`000b1d96 : nt!KiFastFailDispatch+0xd0
fffff386`0aa2e5a0 fffff804`3ae044ed : fffff804`3ae04c7a ffffbc8b`ef6c9b80 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff386`0aa2e738 fffff804`3ae04c7a : ffffbc8b`ef6c9b80 00000000`00000000 00000000`00000000 00000000`00000000 : mouclass!MouseClassDequeueRead+0x51
fffff386`0aa2e740 fffff804`3ade1776 : 00000012`45411bc9 ffffbc8b`f0a37d00 ffffbc8b`f0a18ba0 fffff386`0aa2e8e4 : mouclass!MouseClassServiceCallback+0x9a
fffff386`0aa2e7e0 00000012`45411bc9 : ffffbc8b`f0a37d00 ffffbc8b`f0a18ba0 fffff386`0aa2e8e4 00000000`00000000 : klmouflt+0x1776
fffff386`0aa2e7e8 ffffbc8b`f0a37d00 : ffffbc8b`f0a18ba0 fffff386`0aa2e8e4 00000000`00000000 fffffc7e`20801f00 : 0x00000012`45411bc9
fffff386`0aa2e7f0 ffffbc8b`f0a18ba0 : fffff386`0aa2e8e4 00000000`00000000 fffffc7e`20801f00 fffffc7e`3f104008 : 0xffffbc8b`f0a37d00
fffff386`0aa2e7f8 fffff386`0aa2e8e4 : 00000000`00000000 fffffc7e`20801f00 fffffc7e`3f104008 fffffc7e`3f1f8820 : 0xffffbc8b`f0a18ba0
fffff386`0aa2e800 00000000`00000000 : fffffc7e`20801f00 fffffc7e`3f104008 fffffc7e`3f1f8820 ffffbc8b`f8bd34e0 : 0xfffff386`0aa2e8e4


SYMBOL_NAME: mouclass!MouseClassDequeueRead+51

MODULE_NAME: mouclass

IMAGE_NAME: mouclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 51

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132902169366275207
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SWD\DAFUPnPProvider\uuid:F00DBABE-AA5E-BABA-DADA-1C3008196F20
VetoString :

start end module name
ffffb619`c8a00000 ffffb619`c8cd3000 win32kbase (deferred)
ffffb619`c8ce0000 ffffb619`c9096000 win32kfull (deferred)
ffffb619`c90a0000 ffffb619`c90e9000 cdd (deferred)
ffffb619`c9200000 ffffb619`c929a000 win32k T (no symbols)
fffff804`1b590000 fffff804`1b81f000 mcupdate_GenuineIntel (deferred)
fffff804`1b820000 fffff804`1b826000 hal (deferred)
fffff804`1b830000 fffff804`1b83b000 kd (deferred)
fffff804`1b840000 fffff804`1b867000 tm (deferred)
fffff804`1b870000 fffff804`1b8db000 CLFS (deferred)
fffff804`1b8e0000 fffff804`1b8fa000 PSHED (deferred)
fffff804`1b900000 fffff804`1b90b000 BOOTVID (deferred)
fffff804`1b910000 fffff804`1b97f000 FLTMGR (deferred)
fffff804`1b980000 fffff804`1b98e000 cmimcext (deferred)
fffff804`1c800000 fffff804`1d846000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\0EAEDA60844E2DA1D0C4CEB3B2450F1D1\ntkrnlmp.pdb
fffff804`20e00000 fffff804`20f14000 clipsp (deferred)
fffff804`20f20000 fffff804`20f49000 ksecdd (deferred)
fffff804`20f50000 fffff804`20fb1000 msrpc (deferred)
fffff804`20fc0000 fffff804`20fd1000 werkernel (deferred)
fffff804`20fe0000 fffff804`20fec000 ntosext (deferred)
fffff804`20ff0000 fffff804`210d5000 CI (deferred)
fffff804`210e0000 fffff804`2119b000 cng (deferred)
fffff804`211a0000 fffff804`21271000 Wdf01000 (deferred)
fffff804`21280000 fffff804`21293000 WDFLDR (deferred)
fffff804`212a0000 fffff804`212af000 SleepStudyHelper (deferred)
fffff804`212b0000 fffff804`212c1000 WppRecorder (deferred)
fffff804`212d0000 fffff804`212f6000 acpiex (deferred)
fffff804`21300000 fffff804`21356000 mssecflt (deferred)
fffff804`21360000 fffff804`2137a000 SgrmAgent (deferred)
fffff804`21380000 fffff804`2144c000 ACPI (deferred)
fffff804`21450000 fffff804`2145c000 WMILIB (deferred)
fffff804`21460000 fffff804`2146b000 msisadrv (deferred)
fffff804`21470000 fffff804`214e7000 pci (deferred)
fffff804`214f0000 fffff804`21534000 tpm (deferred)
fffff804`21550000 fffff804`215bb000 intelpep (deferred)
fffff804`215c0000 fffff804`215d7000 WindowsTrustedRT (deferred)
fffff804`215e0000 fffff804`215eb000 IntelTA (deferred)
fffff804`215f0000 fffff804`215fb000 WindowsTrustedRTProxy (deferred)
fffff804`21600000 fffff804`21614000 pcw (deferred)
fffff804`21620000 fffff804`21666000 klupd_klif_arkmon (deferred)
fffff804`21670000 fffff804`21685000 vdrvroot (deferred)
fffff804`21690000 fffff804`216cc000 cm_km (deferred)
fffff804`216d0000 fffff804`216ff000 pdc (deferred)
fffff804`21700000 fffff804`21719000 CEA (deferred)
fffff804`21720000 fffff804`21751000 partmgr (deferred)
fffff804`21760000 fffff804`2180b000 spaceport (deferred)
fffff804`21810000 fffff804`21829000 volmgr (deferred)
fffff804`21830000 fffff804`21893000 volmgrx (deferred)
fffff804`218a0000 fffff804`218be000 mountmgr (deferred)
fffff804`218c0000 fffff804`219d5000 iaStorAVC (deferred)
fffff804`219e0000 fffff804`21a94000 storport (deferred)
fffff804`21aa0000 fffff804`21ac2000 secnvme (deferred)
fffff804`21ad0000 fffff804`21aec000 EhStorClass (deferred)
fffff804`21af0000 fffff804`21b0a000 fileinfo (deferred)
fffff804`21b10000 fffff804`21b50000 Wof (deferred)
fffff804`21b60000 fffff804`21e39000 Ntfs (deferred)
fffff804`21e40000 fffff804`21e4d000 Fs_Rec (deferred)
fffff804`21e50000 fffff804`21fbf000 ndis (deferred)
fffff804`21fc0000 fffff804`22058000 NETIO (deferred)
fffff804`22060000 fffff804`22092000 ksecpkg (deferred)
fffff804`220a0000 fffff804`2238c000 tcpip (deferred)
fffff804`22390000 fffff804`2240f000 fwpkclnt (deferred)
fffff804`22410000 fffff804`22440000 wfplwfs (deferred)
fffff804`22450000 fffff804`22518000 fvevol (deferred)
fffff804`22520000 fffff804`2252b000 volume (deferred)
fffff804`22530000 fffff804`2259d000 volsnap (deferred)
fffff804`225a0000 fffff804`225f0000 rdyboost (deferred)
fffff804`22600000 fffff804`22626000 mup (deferred)
fffff804`22630000 fffff804`2264a000 klupd_klif_klbg (deferred)
fffff804`22650000 fffff804`22662000 iorate (deferred)
fffff804`22690000 fffff804`226ac000 disk (deferred)
fffff804`226b0000 fffff804`2271c000 CLASSPNP (deferred)
fffff804`35800000 fffff804`35830000 cdrom (deferred)
fffff804`35840000 fffff804`358ce000 klflt (deferred)
fffff804`358d0000 fffff804`35902000 klbackupflt (deferred)
fffff804`35910000 fffff804`35925000 filecrypt (deferred)
fffff804`35930000 fffff804`3593e000 tbs (deferred)
fffff804`35940000 fffff804`35ada000 klhk (deferred)
fffff804`35ae0000 fffff804`35be4000 klif (deferred)
fffff804`35bf0000 fffff804`35c66000 ks (deferred)
fffff804`35c70000 fffff804`35c83000 klpd (deferred)
fffff804`35c90000 fffff804`35d3c000 klgse (deferred)
fffff804`35d40000 fffff804`35d5d000 kldisk (deferred)
fffff804`35d60000 fffff804`35d6a000 Null (deferred)
fffff804`35d70000 fffff804`35d7a000 Beep (deferred)
fffff804`35d80000 fffff804`3612a000 dxgkrnl (deferred)
fffff804`36130000 fffff804`36148000 watchdog (deferred)
fffff804`36150000 fffff804`36166000 BasicDisplay (deferred)
fffff804`36170000 fffff804`36181000 BasicRender (deferred)
fffff804`36190000 fffff804`361f0000 googledrivefs3688 (deferred)
fffff804`36200000 fffff804`3621c000 Npfs (deferred)
fffff804`36220000 fffff804`36231000 Msfs (deferred)
fffff804`36240000 fffff804`3625e000 CimFS (deferred)
fffff804`36260000 fffff804`36284000 klwfp (deferred)
fffff804`36290000 fffff804`362b2000 tdx (deferred)
fffff804`362f0000 fffff804`3630e000 crashdmp (deferred)
fffff804`36310000 fffff804`3634b000 ndiswan (deferred)
fffff804`363d0000 fffff804`363e9000 klbackupdisk (deferred)
fffff804`36400000 fffff804`3645c000 netbt (deferred)
fffff804`36460000 fffff804`36475000 afunix (deferred)
fffff804`36480000 fffff804`36525000 afd (deferred)
fffff804`36530000 fffff804`3657d000 klwtp (deferred)
fffff804`36580000 fffff804`36596000 klim6 (deferred)
fffff804`365a0000 fffff804`365ba000 vwififlt (deferred)
fffff804`365c0000 fffff804`365eb000 pacer (deferred)
fffff804`365f0000 fffff804`36604000 ndiscap (deferred)
fffff804`36610000 fffff804`36624000 netbios (deferred)
fffff804`36630000 fffff804`366d1000 Vid (deferred)
fffff804`366e0000 fffff804`36701000 winhvr (deferred)
fffff804`36710000 fffff804`3678c000 rdbss (deferred)
fffff804`36790000 fffff804`367a5000 klpnpflt (deferred)
fffff804`367b0000 fffff804`36847000 csc (deferred)
fffff804`36850000 fffff804`36862000 nsiproxy (deferred)
fffff804`36870000 fffff804`3687e000 npsvctrig (deferred)
fffff804`36880000 fffff804`36890000 mssmbios (deferred)
fffff804`368a0000 fffff804`368e9000 kneps (deferred)
fffff804`36940000 fffff804`36950000 HWiNFO64A_167 (deferred)
fffff804`36960000 fffff804`36970000 HWiNFO64A_165 (deferred)
fffff804`36980000 fffff804`36990000 HWiNFO64A_161 (deferred)
fffff804`369a0000 fffff804`369b0000 HWiNFO64A_160 (deferred)
fffff804`369c0000 fffff804`369d0000 HWiNFO64A_151 (deferred)
fffff804`369e0000 fffff804`369f0000 HWiNFO64A_150 (deferred)
fffff804`36a00000 fffff804`36a0f000 HWiNFO64A (deferred)
fffff804`36a10000 fffff804`36a1a000 gpuenergydrv (deferred)
fffff804`36a20000 fffff804`36a4c000 dfsc (deferred)
fffff804`36a70000 fffff804`36adc000 fastfat (deferred)
fffff804`36ae0000 fffff804`36af7000 bam (deferred)
fffff804`36b00000 fffff804`36b06000 AsIO (deferred)
fffff804`36b10000 fffff804`36b5e000 ahcache (deferred)
fffff804`36b60000 fffff804`36b72000 CompositeBus (deferred)
fffff804`36b80000 fffff804`36b8d000 kdnic (deferred)
fffff804`36b90000 fffff804`36ba5000 umbus (deferred)
fffff804`36bb0000 fffff804`36bf0000 intelppm (deferred)
fffff804`36c00000 fffff804`36c0c000 wmiacpi (deferred)
fffff804`36c10000 fffff804`36cae000 USBXHCI (deferred)
fffff804`36cb0000 fffff804`36cf4000 ucx01000 (deferred)
fffff804`36d00000 fffff804`36d4c000 TeeDriverW10x64 (deferred)
fffff804`36d50000 fffff804`36da3000 qca11adx (deferred)
fffff804`36db0000 fffff804`36dbe000 vwifibus (deferred)
fffff804`36dc0000 fffff804`36e53000 e1r68x64 (deferred)
fffff804`36e60000 fffff804`370e9000 Qcamain10x64 (deferred)
fffff804`370f0000 fffff804`37118000 AgileVpn (deferred)
fffff804`37120000 fffff804`37141000 rasl2tp (deferred)
fffff804`37150000 fffff804`37171000 raspptp (deferred)
fffff804`37180000 fffff804`3719c000 raspppoe (deferred)
fffff804`371b0000 fffff804`371c0000 TDI (deferred)
fffff804`371d0000 fffff804`371e2000 condrv (deferred)
fffff804`37200000 fffff804`37266000 portcls (deferred)
fffff804`37270000 fffff804`37291000 drmk (deferred)
fffff804`372a0000 fffff804`3732e000 e1i65x64 (deferred)
fffff804`37330000 fffff804`37384000 WUDFRd (deferred)
fffff804`37390000 fffff804`37412000 cldflt (deferred)
fffff804`37420000 fffff804`3742e000 WpdUpFltr (deferred)
fffff804`37430000 fffff804`3745f000 rdpdr (deferred)
fffff804`37460000 fffff804`3747a000 storqosflt (deferred)
fffff804`37480000 fffff804`374a8000 bindflt (deferred)
fffff804`374b0000 fffff804`374d5000 bowser (deferred)
fffff804`374e0000 fffff804`37536000 msquic (deferred)
fffff804`37540000 fffff804`375d3000 mrxsmb (deferred)
fffff804`375e0000 fffff804`37625000 mrxsmb20 (deferred)
fffff804`37630000 fffff804`37657000 tsusbhub (deferred)
fffff804`37660000 fffff804`37678000 mslldp (deferred)
fffff804`37680000 fffff804`37698000 lltdio (deferred)
fffff804`376a0000 fffff804`376bd000 wanarp (deferred)
fffff804`376c0000 fffff804`376db000 rspndr (deferred)
fffff804`376e0000 fffff804`3779f000 nwifi (deferred)
fffff804`377a0000 fffff804`377b8000 ndisuio (deferred)
fffff804`377c0000 fffff804`37947000 HTTP (deferred)
fffff804`37950000 fffff804`3796a000 mpsdrv (deferred)
fffff804`37970000 fffff804`37978000 lgcoretemp (deferred)
fffff804`37980000 fffff804`37989000 megabatteryX64 (deferred)
fffff804`37990000 fffff804`379a0000 BATTC (deferred)
fffff804`379b0000 fffff804`37a03000 srvnet (deferred)
fffff804`37a10000 fffff804`37a43000 mqac (deferred)
fffff804`37a50000 fffff804`37a77000 Ndu (deferred)
fffff804`37a80000 fffff804`37a94000 mmcss (deferred)
fffff804`37aa0000 fffff804`37ab5000 tcpipreg (deferred)
fffff804`37ac0000 fffff804`37b96000 peauth (deferred)
fffff804`37ba0000 fffff804`37c67000 srv2 (deferred)
fffff804`37c70000 fffff804`37c8c000 rassstp (deferred)
fffff804`37c90000 fffff804`37cad000 NDProxy (deferred)
fffff804`37cb0000 fffff804`37cbf000 ndistapi (deferred)
fffff804`37cc0000 fffff804`37db2000 wdiwifi (deferred)
fffff804`37dc0000 fffff804`37de5000 HDAudBus (deferred)
fffff804`3a800000 fffff804`3a80e000 UEFI (deferred)
fffff804`3a810000 fffff804`3a820000 nvvad64v (deferred)
fffff804`3a830000 fffff804`3a83f000 ksthunk (deferred)
fffff804`3a840000 fffff804`3a850000 nvvhci (deferred)
fffff804`3a860000 fffff804`3a86d000 NvModuleTracker (deferred)
fffff804`3a870000 fffff804`3a87d000 NdisVirtualBus (deferred)
fffff804`3a880000 fffff804`3a88c000 swenum (deferred)
fffff804`3a890000 fffff804`3a894e00 LGBusEnum (deferred)
fffff804`3a8a0000 fffff804`3a8ac800 LGJoyXlCore (deferred)
fffff804`3a8b0000 fffff804`3a8be000 rdpbus (deferred)
fffff804`3a8c0000 fffff804`3a963000 UsbHub3 (deferred)
fffff804`3a970000 fffff804`3a97e000 USBD (deferred)
fffff804`3a980000 fffff804`3a9ef000 HdAudio (deferred)
fffff804`3a9f0000 fffff804`3aa11000 nvhda64v (deferred)
fffff804`3aa20000 fffff804`3aa45000 USBSTOR (deferred)
fffff804`3aa50000 fffff804`3aa63000 btfilter (deferred)
fffff804`3aa70000 fffff804`3aa91000 BTHUSB (deferred)
fffff804`3aaa0000 fffff804`3ac24000 BTHport (deferred)
fffff804`3ac30000 fffff804`3ac42000 hidusb (deferred)
fffff804`3ac50000 fffff804`3ac8f000 HIDCLASS (deferred)
fffff804`3ac90000 fffff804`3aca3000 HIDPARSE (deferred)
fffff804`3acb0000 fffff804`3ace3000 usbccgp (deferred)
fffff804`3acf0000 fffff804`3ad2a000 usbaudio (deferred)
fffff804`3ad30000 fffff804`3ad3c000 ladfGSS (deferred)
fffff804`3ad40000 fffff804`3ad59000 LEqdUsb (deferred)
fffff804`3ad60000 fffff804`3ad71000 kbdhid (deferred)
fffff804`3ad80000 fffff804`3ad99000 klkbdflt (deferred)
fffff804`3ada0000 fffff804`3adb4000 kbdclass (deferred)
fffff804`3adc0000 fffff804`3add0000 mouhid (deferred)
fffff804`3ade0000 fffff804`3adfa000 klmouflt T (no symbols)
fffff804`3ae00000 fffff804`3ae13000 mouclass # (pdb symbols) C:\ProgramData\Dbg\sym\mouclass.pdb\392D9C9826032AE11D78F55A3D6E971A1\mouclass.pdb
fffff804`3ae20000 fffff804`3ae28000 LHidEqd (deferred)
fffff804`3ae30000 fffff804`3ae48000 LHidFilt (deferred)
fffff804`3ae60000 fffff804`3ae6e000 dump_diskdump (deferred)
fffff804`3aea0000 fffff804`3aec2000 dump_secnvme (deferred)
fffff804`3aef0000 fffff804`3af0d000 dump_dumpfve (deferred)
fffff804`3af10000 fffff804`3aff1000 dxgmms2 (deferred)
fffff804`3b000000 fffff804`3b01b000 monitor (deferred)
fffff804`3b020000 fffff804`3b02d000 rdpvideominiport (deferred)
fffff804`3b030000 fffff804`3b059000 luafv (deferred)
fffff804`3b060000 fffff804`3b096000 wcifs (deferred)
fffff804`3b0a0000 fffff804`3d9c6000 nvlddmkm (deferred)
fffff804`3d9d0000 fffff804`3d9f1000 IntelNit (deferred)
fffff804`75620000 fffff804`7562d000 WSDPrint (deferred)
fffff804`75630000 fffff804`7563d000 WSDScan (deferred)
fffff804`75640000 fffff804`7568e000 klupd_klif_klark (deferred)
fffff804`764b0000 fffff804`76a88000 iqvw64e (deferred)
fffff804`76a90000 fffff804`76aa3000 vwifimp (deferred)
fffff804`76ab0000 fffff804`76ae8000 klupd_klif_mark (deferred)
fffff804`76af0000 fffff804`76af9000 IOMap64 (deferred)
fffff804`76b00000 fffff804`76b41000 klids (deferred)
fffff804`76b50000 fffff804`76b59000 DUMETR64 (deferred)
fffff804`76bc0000 fffff804`76bc8000 690b33e1_0462_4e84_9bea_c7552b45432a (deferred)
fffff804`76bd0000 fffff804`76bd2500 LGVirHid (deferred)

Unloaded modules:
fffff804`76bb0000 fffff804`76bbe000 WSDScan.sys
fffff804`76ba0000 fffff804`76bae000 WSDPrint.sys
fffff804`75610000 fffff804`75618000 magdrvamd64.
fffff804`75600000 fffff804`75608000 magdrvamd64.
fffff804`76bf0000 fffff804`76bf8000 magdrvamd64.
fffff804`76be0000 fffff804`76be8000 magdrvamd64.
fffff804`76b90000 fffff804`76b9e000 WSDScan.sys
fffff804`76b80000 fffff804`76b8e000 WSDPrint.sys
fffff804`76b70000 fffff804`76b7e000 WSDScan.sys
fffff804`76b60000 fffff804`76b6e000 WSDPrint.sys
fffff804`368f0000 fffff804`36932000 klids.sys
fffff804`36320000 fffff804`3632f000 dump_storpor
fffff804`36360000 fffff804`36383000 dump_secnvme
fffff804`363b0000 fffff804`363ce000 dump_dumpfve
fffff804`36a50000 fffff804`36a6c000 dam.sys
fffff804`21540000 fffff804`2154f000 klelam.sys
fffff804`22670000 fffff804`22681000 hwpolicy.sys[/CODE]
 
Samsung Magician yazılımını kaldırın.

Kaspersky antivirüs programını hala kaldırmadığınızı görüyorum. Kaldırın.

Klavye ve fare sürücüsünü veya yazılımı kurduysanız kaldırın.
 
Merhaba,
Kaspersky, Logitech yazılımı ve Samsung Magician arasından kullanmadığım tek yazılım Samsung Magician.
Öncelikle bunu kaldırdım.
1-2 gün deneyip hata alıp almadığım bildireceğim.
Yardımlarınız için teşekkür ederim.
Sanırım Windows 11'e geçiş yapmak sorunları çözdü. Belki de Samsung Magician yazılımı sorunluydu. Tam olarak sebebini bilemiyorum lakin şimdilik mavi ekran hatası almıyorum.
Farklı bir durum olursa bu başlık altına yazacağım.
Desteğinizden ötürü teşekkürler.
 
Son düzenleme:

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı