i5 10400 sistemde mavi ekran hatası

Reshadxan

Hectopat
Katılım
29 Mayıs 2019
Mesajlar
58
Mavi ekran hatası aldım. Sorunun ne olduğunu anlayamadım. Yardım ederseniz sevinirim.

Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\010622-12750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`34200000 PsLoadedModuleList = 0xfffff801`34e2a1b0
Debug session time: Thu Jan 6 23:54:25.265 2022 (UTC + 4:00)
System Uptime: 0 days 10:12:58.977
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`345f70d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff848b`ae6aef30=0000000000000139
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, An RTL_BALANCED_NODE RBTree entry has been corrupted.
Arg2: ffff848bae6af250, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff848bae6af1a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2577

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 89599

Key : Analysis.Init.CPU.mSec
Value: 327

Key : Analysis.Init.Elapsed.mSec
Value: 102837

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : FailFast.Name
Value: INVALID_BALANCED_TREE

Key : FailFast.Type
Value: 29

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 010622-12750-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffff848bae6af250

BUGCHECK_P3: ffff848bae6af1a8

BUGCHECK_P4: 0

TRAP_FRAME: ffff848bae6af250 -- (.trap 0xffff848bae6af250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa902faa3d1a0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffcc84ffe8a038 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013463d7df rsp=ffff848bae6af3e8 rbp=ffffcc84ffe8a038
r8=ffffcc8506091500 r9=ffffcc850c33d038 r10=0000000000000000
r11=ffffcc8506091588 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!RtlRbRemoveNode+0x1b246f:
fffff801`3463d7df cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff848bae6af1a8 -- (.exr 0xffff848bae6af1a8)
ExceptionAddress: fffff8013463d7df (nt!RtlRbRemoveNode+0x00000000001b246f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 000000000000001d

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff848b`ae6aef28 fffff801`34609069 : 00000000`00000139 00000000`0000001d ffff848b`ae6af250 ffff848b`ae6af1a8 : nt!KeBugCheckEx
ffff848b`ae6aef30 fffff801`34609490 : ffffcc84`fd004f00 ffffcc85`00000030 ffffcc85`00000000 00000000`00000100 : nt!KiBugCheckDispatch+0x69
ffff848b`ae6af070 fffff801`34607823 : 00000090`00000090 00000000`00000000 ffffa902`00000042 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff848b`ae6af250 fffff801`3463d7df : ffffcc84`fd000280 ffffcc84`ffe8a038 fffff801`34489cd5 ffff848b`ae6af478 : nt!KiRaiseSecurityCheckFailure+0x323
ffff848b`ae6af3e8 fffff801`34489cd5 : ffff848b`ae6af478 00000000`00000071 ffffcc84`ffe8a030 00000000`00000081 : nt!RtlRbRemoveNode+0x1b246f
ffff848b`ae6af400 fffff801`34489aba : ffffa902`f4d02000 fffff801`3448d559 ffffffff`ffffffff ffff848b`0000000e : nt!RtlpHpVsChunkSplit+0x45
ffff848b`ae6af4c0 fffff801`3448d038 : 00000000`00000000 00000000`00000700 ffff848b`ae6af601 00000000`00000700 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffff848b`ae6af520 fffff801`34bb11c4 : ffffa902`00000000 00000000`00000050 00000000`656b6f54 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffff848b`ae6af660 fffff801`348738e9 : ffffa902`e46c5220 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff848b`ae6af6b0 fffff801`3487a0ec : ffffa902`00000008 ffffa902`e46bf200 00000000`00000000 ffff848b`ae6af770 : nt!ObpAllocateObject+0x199
ffff848b`ae6af730 fffff801`34879766 : ffffcc85`060d55f0 ffffa902`f4d18510 00000000`00000000 00000000`00000000 : nt!ObCreateObjectEx+0xfc
ffff848b`ae6af7b0 fffff801`34866cd4 : ffff848b`ae6afa80 ffff848b`ae6af930 ffff848b`ae6afa00 00000021`00000670 : nt!SepDuplicateToken+0x1a6
ffff848b`ae6af8a0 fffff801`34866891 : ffffa902`f0097440 00000021`00000008 00000000`00000001 00000021`c40fef58 : nt!NtOpenThreadTokenEx+0x434
ffff848b`ae6af9c0 fffff801`34608ab5 : ffffa902`f0097440 ffffa902`f007f9d0 000001c5`e26f0b40 00000000`00000c50 : nt!NtOpenThreadToken+0x11
ffff848b`ae6afa00 00007ffc`55b8d1f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000021`c40fe778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`55b8d1f4


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1415

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}

Followup: MachineOwner
---------



MSI Z490-A Pro, i5 10400, MSI GTX 1060, 16GB 3000MHz RAM
Yardım edecek kimse yok mu?
 
Son düzenleme:
Minidump dosyanızı atın. Buraya yazmakla olmaz.
Buradan anladığım kadarıyla bir veri bozulması var.
 
Son düzenleme:

Geri
Yukarı