KERNEL_SECURITY_CHECK_FAILURE mavi ekran

CaLViN

Centipat
Katılım
14 Haziran 2020
Mesajlar
9
Yer
Antalya
Merhaba dostlar,
Aranıza yeni katıldım.

Sıklıkla mavi ekran sorunu yaşamaya başladım.
Dump dosyamı kendim biraz inceledim ama neticeye ulaşamadım.

Son iki DMP dosyamı buraya ekledim:



Rica etsem yorumlayabilir misiniz?

Müteşekkirim.
 
Son düzenleyen: Moderatör:
Fareniz nedir? Fareniz için kullandığınız bir yazılım var mı?

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8185e9c2e5e0, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffff8185e9c2e538, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klmouflt.sys.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 4.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 11.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 84.

Key : Analysis.System.
Value: CreateObject.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3.

BUGCHECK_P2: ffff8185e9c2e5e0.

BUGCHECK_P3: ffff8185e9c2e538.

BUGCHECK_P4: 0.

TRAP_FRAME: ffff8185e9c2e5e0 -- (.trap 0xffff8185e9c2e5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8185e9c2e7e0 rbx=0000000000000000 rcx=0000000000000003.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff804289244ed rsp=ffff8185e9c2e778 rbp=ffff8185e9c2e7f0.
r8=ffffc90c8c76ae98 r9=ffff8185e9c2e8e4 r10=fffff804106d0290.
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz ac pe cy.
mouclass!MouseClassDequeueRead+0x51:
fffff804`289244ed cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff8185e9c2e538 -- (.exr 0xffff8185e9c2e538)
ExceptionAddress: fffff804289244ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff8185`e9c2e2b8 fffff804`107ef929 : 00000000`00000139 00000000`00000003 ffff8185`e9c2e5e0 ffff8185`e9c2e538 : nt!KeBugCheckEx.
ffff8185`e9c2e2c0 fffff804`107efd50 : 00000000`00000040 00000000`00000b24 00000000`00000002 ffffc90c`960c3140 : nt!KiBugCheckDispatch+0x69.
ffff8185`e9c2e400 fffff804`107ee0e3 : 00000000`00000246 00000000`000005ce 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0.
ffff8185`e9c2e5e0 fffff804`289244ed : fffff804`28924c7a ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323.
ffff8185`e9c2e778 fffff804`28924c7a : ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 ffff8185`e9c2e8f0 : mouclass!MouseClassDequeueRead+0x51.
ffff8185`e9c2e780 fffff804`28911403 : ffffc90c`8c73fde0 ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 : mouclass!MouseClassServiceCallback+0x9a.
ffff8185`e9c2e820 ffffc90c`8c73fde0 : ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 : klmouflt+0x1403.
ffff8185`e9c2e828 ffffc90c`8c73fc90 : ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 : 0xffffc90c`8c73fde0.
ffff8185`e9c2e830 ffffc90c`8d299a10 : ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 : 0xffffc90c`8c73fc90.
ffff8185`e9c2e838 ffff8185`e9c2e8e4 : 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 00000000`00000008 : 0xffffc90c`8d299a10.
ffff8185`e9c2e840 00000000`000001a0 : fffff804`287c23c4 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 : 0xffff8185`e9c2e8e4.
ffff8185`e9c2e848 fffff804`287c23c4 : 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 00000000`00000000 : 0x1a0.
ffff8185`e9c2e850 fffff804`288f3aa8 : 00000000`00000000 00000000`00000002 ffff8185`e9c2e8f8 ffffc90c`8d2998b0 : HIDPARSE!HidP_GetScaledUsageValue+0x174.
ffff8185`e9c2e8a0 fffff804`1063c7ce : 00000000`00000000 ffff8185`e9c2ea00 00000000`00000001 ffff8185`00000000 : mouhid!MouHid_ReadComplete+0x758.
ffff8185`e9c2e940 fffff804`1063c697 : 00000000`00000000 ffffc90c`8808f006 ffffc90c`8d2b4970 00000000`00000000 : nt!IopfCompleteRequest+0x11e.
ffff8185`e9c2ea30 fffff804`2878aef5 : ffffc90c`8ce4d5d8 ffffc90c`8c76c102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17.
ffff8185`e9c2ea60 fffff804`2878a7ed : ffffc90c`8c76c1d0 ffffc90c`8c76c102 ffffc90c`8c76c1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5.
ffff8185`e9c2eb60 fffff804`1063c7ce : ffffc90c`8c77f010 ffffc90c`8c77f010 ffff8185`e9c2ec01 ffffc90c`8c77f75b : HIDCLASS!HidpInterruptReadComplete+0x37d.
ffff8185`e9c2ec00 fffff804`1063c697 : 00000000`00000001 00000000`00000000 ffffc90c`8c685020 00000000`00000002 : nt!IopfCompleteRequest+0x11e.
ffff8185`e9c2ecf0 fffff804`125a811a : 00000000`00000000 ffffc90c`86475dd0 ffffc90c`8c77f010 ffff8185`e9c2edd0 : nt!IofCompleteRequest+0x17.
ffff8185`e9c2ed20 fffff804`125a5bbf : ffffc90c`8dcdbb02 ffffc90c`8c6b87a0 ffffc90c`8c77f010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffff8185`e9c2edb0 fffff804`27af0eed : 00000000`ffffff02 ffffc90c`8dcdba30 ffffc90c`8c685400 ffffc90c`8c685400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffff8185`e9c2ee10 fffff804`27af0db1 : ffffc90c`8dcdbbd0 00000000`00000009 ffffc90c`8dcdbc60 ffff8185`e9c2f028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9.
ffff8185`e9c2ee70 fffff804`27af0ba0 : 00000000`00000004 ffff8185`e9c2efe0 00000000`00000000 ffffc90c`8c71f050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd.
ffff8185`e9c2ef20 fffff804`27ae88c1 : 00000000`00000004 ffff8185`e9c2eff8 00000000`00000008 ffff8185`e9c2f000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10.
ffff8185`e9c2ef50 fffff804`27ae83f5 : 00000000`00000780 000036f3`799a1700 ffffc90c`868d4330 ffffc90c`8c545cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb1.
ffff8185`e9c2efb0 fffff804`27ae80cc : 00000000`00000002 00000000`00000000 000036f3`81809328 00000000`00000001 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315.
ffff8185`e9c2f0b0 fffff804`125a38f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc.
ffff8185`e9c2f0e0 fffff804`1063a69e : ffffa001`5d9e3240 00000000`00000000 ffff8185`e9c2f3e0 fffff804`27a8870b : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
ffff8185`e9c2f120 fffff804`10639984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e.
ffff8185`e9c2f290 fffff804`107e158e : ffffffff`00000000 ffffa001`5d9e0180 ffffa001`5d9eb640 ffffc90c`944c0080 : nt!KiRetireDpcList+0x1f4.
ffff8185`e9c2f520 00000000`00000000 : ffff8185`e9c30000 ffff8185`e9c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: mouclass!MouseClassDequeueRead+51.

MODULE_NAME: mouclass.

IMAGE_NAME: mouclass.sys.

IMAGE_VERSION: 10.0.19041.1030.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 51.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32}

Followup: MachineOwner.
---------

Logitech yazılımı sorun çıkartıyor olabilir. Kaldırıp, mavi ekran alıp almadığını dener misin?
 
Son düzenleme:
2 Tane fare kullanıyorum.
Logitech MX Master 2S ve g903.
Yazılım olarak Logitech Gaming software ve Logitech options yüklü.
2 Senedir sorunsuz bir şekilde kullanıyordum.
1 Hafta önce yeni bir yedekleme diskini sisteme bağladım. Ayrıca son Windows 10 - 2020 güncellemesini yaptım.

Ben daha çok bu ikisinden şüpheleniyordum. Bu detaylar ışığında öneriniz ne olabilir acaba?
 
Kaspersky kaldır tekrar yükle veya güncelle, düzelmezse farklı antivirüs programına geç.

Samsung bir cihaz takılıysa farklı porta tak, sürücüsü varsa kaldır.

Asus GPU Tweak, DU Meter programlarını kaldır.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8185e9c2e5e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8185e9c2e538, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klmouflt.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0802

BIOS_DATE:  09/06/2017

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X299-DELUXE

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8185e9c2e5e0

BUGCHECK_P3: ffff8185e9c2e538

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8185e9c2e5e0 -- (.trap 0xffff8185e9c2e5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8185e9c2e7e0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804289244ed rsp=ffff8185e9c2e778 rbp=ffff8185e9c2e7f0
 r8=ffffc90c8c76ae98  r9=ffff8185e9c2e8e4 r10=fffff804106d0290
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
mouclass!MouseClassDequeueRead+0x51:
fffff804`289244ed cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8185e9c2e538 -- (.exr 0xffff8185e9c2e538)
ExceptionAddress: fffff804289244ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 18

CPU_MHZ: b58

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 55

CPU_STEPPING: 4

CPU_MICROCODE: 6,55,4,0 (F,M,S,R)  SIG: 200005E'00000000 (cache) 200005E'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-14-2020 16:58:50.0002

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff804107ef929 to fffff804107dda20

STACK_TEXT: 
ffff8185`e9c2e2b8 fffff804`107ef929 : 00000000`00000139 00000000`00000003 ffff8185`e9c2e5e0 ffff8185`e9c2e538 : nt!KeBugCheckEx
ffff8185`e9c2e2c0 fffff804`107efd50 : 00000000`00000040 00000000`00000b24 00000000`00000002 ffffc90c`960c3140 : nt!KiBugCheckDispatch+0x69
ffff8185`e9c2e400 fffff804`107ee0e3 : 00000000`00000246 00000000`000005ce 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8185`e9c2e5e0 fffff804`289244ed : fffff804`28924c7a ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8185`e9c2e778 fffff804`28924c7a : ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 ffff8185`e9c2e8f0 : mouclass!MouseClassDequeueRead+0x51
ffff8185`e9c2e780 fffff804`28911403 : ffffc90c`8c73fde0 ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 : mouclass!MouseClassServiceCallback+0x9a
ffff8185`e9c2e820 ffffc90c`8c73fde0 : ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 : klmouflt+0x1403
ffff8185`e9c2e828 ffffc90c`8c73fc90 : ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 : 0xffffc90c`8c73fde0
ffff8185`e9c2e830 ffffc90c`8d299a10 : ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 : 0xffffc90c`8c73fc90
ffff8185`e9c2e838 ffff8185`e9c2e8e4 : 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 00000000`00000008 : 0xffffc90c`8d299a10
ffff8185`e9c2e840 00000000`000001a0 : fffff804`287c23c4 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 : 0xffff8185`e9c2e8e4
ffff8185`e9c2e848 fffff804`287c23c4 : 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 00000000`00000000 : 0x1a0
ffff8185`e9c2e850 fffff804`288f3aa8 : 00000000`00000000 00000000`00000002 ffff8185`e9c2e8f8 ffffc90c`8d2998b0 : HIDPARSE!HidP_GetScaledUsageValue+0x174
ffff8185`e9c2e8a0 fffff804`1063c7ce : 00000000`00000000 ffff8185`e9c2ea00 00000000`00000001 ffff8185`00000000 : mouhid!MouHid_ReadComplete+0x758
ffff8185`e9c2e940 fffff804`1063c697 : 00000000`00000000 ffffc90c`8808f006 ffffc90c`8d2b4970 00000000`00000000 : nt!IopfCompleteRequest+0x11e
ffff8185`e9c2ea30 fffff804`2878aef5 : ffffc90c`8ce4d5d8 ffffc90c`8c76c102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
ffff8185`e9c2ea60 fffff804`2878a7ed : ffffc90c`8c76c1d0 ffffc90c`8c76c102 ffffc90c`8c76c1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
ffff8185`e9c2eb60 fffff804`1063c7ce : ffffc90c`8c77f010 ffffc90c`8c77f010 ffff8185`e9c2ec01 ffffc90c`8c77f75b : HIDCLASS!HidpInterruptReadComplete+0x37d
ffff8185`e9c2ec00 fffff804`1063c697 : 00000000`00000001 00000000`00000000 ffffc90c`8c685020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffff8185`e9c2ecf0 fffff804`125a811a : 00000000`00000000 ffffc90c`86475dd0 ffffc90c`8c77f010 ffff8185`e9c2edd0 : nt!IofCompleteRequest+0x17
ffff8185`e9c2ed20 fffff804`125a5bbf : ffffc90c`8dcdbb02 ffffc90c`8c6b87a0 ffffc90c`8c77f010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffff8185`e9c2edb0 fffff804`27af0eed : 00000000`ffffff02 ffffc90c`8dcdba30 ffffc90c`8c685400 ffffc90c`8c685400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffff8185`e9c2ee10 fffff804`27af0db1 : ffffc90c`8dcdbbd0 00000000`00000009 ffffc90c`8dcdbc60 ffff8185`e9c2f028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9
ffff8185`e9c2ee70 fffff804`27af0ba0 : 00000000`00000004 ffff8185`e9c2efe0 00000000`00000000 ffffc90c`8c71f050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
ffff8185`e9c2ef20 fffff804`27ae88c1 : 00000000`00000004 ffff8185`e9c2eff8 00000000`00000008 ffff8185`e9c2f000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
ffff8185`e9c2ef50 fffff804`27ae83f5 : 00000000`00000780 000036f3`799a1700 ffffc90c`868d4330 ffffc90c`8c545cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb1
ffff8185`e9c2efb0 fffff804`27ae80cc : 00000000`00000002 00000000`00000000 000036f3`81809328 00000000`00000001 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffff8185`e9c2f0b0 fffff804`125a38f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffff8185`e9c2f0e0 fffff804`1063a69e : ffffa001`5d9e3240 00000000`00000000 ffff8185`e9c2f3e0 fffff804`27a8870b : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
ffff8185`e9c2f120 fffff804`10639984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffff8185`e9c2f290 fffff804`107e158e : ffffffff`00000000 ffffa001`5d9e0180 ffffa001`5d9eb640 ffffc90c`944c0080 : nt!KiRetireDpcList+0x1f4
ffff8185`e9c2f520 00000000`00000000 : ffff8185`e9c30000 ffff8185`e9c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


THREAD_SHA1_HASH_MOD_FUNC:  931af43e969acb28bfcd3c2b381f80f78cc4f846

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e2d89e4c50aad9703c19b45d03b5c6c0c8c6111b

THREAD_SHA1_HASH_MOD:  d578d3c817ef1357b91cc3984614fa81edbcc04f

FOLLOWUP_IP:
mouclass!MouseClassDequeueRead+51
fffff804`289244ed cd29            int     29h

FAULT_INSTR_CODE:  cccc29cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  mouclass!MouseClassDequeueRead+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mouclass

IMAGE_NAME:  mouclass.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  3e1aa9cc

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead

TARGET_TIME:  2020-06-12T21:59:14.000Z

OSBUILD:  19041

OSSERVICEPACK:  329

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  7275

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_mouclass!mouseclassdequeueread

FAILURE_ID_HASH:  {6b5843fa-650f-1f9f-d95b-388440977a32}

Followup:     MachineOwner
---------
 

Ben zaten hwinfo64 yazılımını kullanıyorum.Tüm donanımım şu anda sorunsuz gözüküyor.
 

Dosya Ekleri

  • Screenshot_71.jpg
    178,8 KB · Görüntüleme: 47
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…