KERNEL_SECURITY_CHECK_FAILURE Mavi Ekran Hatası

3 gündür sadece 1 tane mi mavi ekran aldınız?

Kaspersky güncelleyin güncelse kaldırınız.
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız.
Memtest86 ile bellek testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd58a38bb81d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd58a38bb8128, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9781

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 39580

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffd58a38bb81d0

BUGCHECK_P3: ffffd58a38bb8128

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd58a38bb81d0 -- (.trap 0xffffd58a38bb81d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffc58f04696dc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044ac67319 rsp=ffffd58a38bb8368 rbp=ffffc58f0e696b88
r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=ffffc58f0e696b88 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!RtlRbRemoveNode+0x19df99:
fffff804`4ac67319 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd58a38bb8128 -- (.exr 0xffffd58a38bb8128)
ExceptionAddress: fffff8044ac67319 (nt!RtlRbRemoveNode+0x000000000019df99)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffd58a`38bb7ea8 fffff804`4ac06569     : 00000000`00000139 00000000`0000001d ffffd58a`38bb81d0 ffffd58a`38bb8128 : nt!KeBugCheckEx
ffffd58a`38bb7eb0 fffff804`4ac06990     : fffffd90`062d94a0 ffffc58f`1099e690 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd58a`38bb7ff0 fffff804`4ac04d23     : 00000000`0a632aa0 00000000`00000040 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd58a`38bb81d0 fffff804`4ac67319     : ffffc58e`fe010280 ffffc58f`0ecf1dc8 fffff804`4aac7ce5 ffffd58a`38bb83f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd58a`38bb8368 fffff804`4aac7ce5     : ffffd58a`38bb83f8 00000000`00000021 ffffc58f`0ecf1dc0 00000000`00000022 : nt!RtlRbRemoveNode+0x19df99
ffffd58a`38bb8380 fffff804`4aac7aca     : 00000000`00000000 ffffa286`02a4b6e8 ffff8c00`00000000 fffff804`4ad18cee : nt!RtlpHpVsChunkSplit+0x45
ffffd58a`38bb8440 fffff804`4aacb048     : 00000000`00000000 00000000`00000200 ffffd58a`38bb8581 00000000`00000200 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffd58a`38bb84a0 fffff804`4b1b1094     : 00000000`00000000 00000000`000001f0 ffffc58f`5246704e ffffc58f`00dd46b0 : nt!ExAllocateHeapPool+0x888
ffffd58a`38bb85e0 fffff804`5d51dc5c     : ffffa286`02b7e298 00000000`00000001 00000000`000001f0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffd58a`38bb8630 fffff804`5d51d9c8     : ffffa286`02b7e100 00000001`00000000 00000000`11d7fdc0 00000000`000001f0 : Npfs!NpWriteDataQueue+0x11c
ffffd58a`38bb86a0 fffff804`5d51d80d     : ffffc58f`000001f0 00000000`11d7fdc0 ffffc58f`12928d10 ffffc58f`0d50a080 : Npfs!NpCommonWrite+0x138
ffffd58a`38bb8730 fffff804`4aacd805     : ffffc58f`0ce1a010 fffff804`492c4b46 ffffd58a`38bb9000 ffffd58a`38bb3000 : Npfs!NpFsdWrite+0x6d
ffffd58a`38bb87a0 fffff804`492c6ccf     : 00000000`0000000f 00000000`00000002 ffffc58f`09583230 ffffc58f`09583230 : nt!IofCallDriver+0x55
ffffd58a`38bb87e0 fffff804`492c48d3     : ffffd58a`38bb8870 ffffc58f`0d3faed0 ffffd58a`37109030 ffffc58f`00dcec80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd58a`38bb8850 fffff804`4aacd805     : ffffc58f`12928d10 00000000`00000000 00000000`00000000 fffffdb6`c5855b8b : FLTMGR!FltpDispatch+0xa3
ffffd58a`38bb88b0 fffff804`4aec2528     : ffffc58f`12928d10 00000000`00000000 ffffc58f`12928d10 00000000`00000000 : nt!IofCallDriver+0x55
ffffd58a`38bb88f0 fffff804`4aeb8e7f     : ffffa286`00000000 ffffd58a`38bb8b80 00000000`0a4fdba8 ffffd58a`38bb8b80 : nt!IopSynchronousServiceTail+0x1a8
ffffd58a`38bb8990 fffff804`4ac05fb8     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0edbd470 : nt!NtWriteFile+0x66f
ffffd58a`38bb8a90 00000000`77511cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a1bec88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77511cfc


SYMBOL_NAME:  Npfs!NpWriteDataQueue+11c

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11c

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_Npfs!NpWriteDataQueue

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28cbf4dd-9f0f-d5b8-99e5-1e3eb498266e}

Followup:     MachineOwner
---------

8: kd> lmvm Npfs
Browse full module list
start             end                 module name
fffff804`5d510000 fffff804`5d52c000   Npfs     # (pdb symbols)          C:\ProgramData\Dbg\sym\npfs.pdb\B6BDF22083B39213E8C6DAA6F39837F41\npfs.pdb
    Loaded symbol image file: Npfs.SYS
    Mapped memory image file: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
    Image path: \SystemRoot\System32\Drivers\Npfs.SYS
    Image name: Npfs.SYS
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        9E3E4C73 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000192F7
    ImageSize:        0001C000
    File version:     10.0.19041.1030
    Product version:  10.0.19041.1030
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     npfs.sys
        OriginalFilename: npfs.sys
        ProductVersion:   10.0.19041.1030
        FileVersion:      10.0.19041.1030 (WinBuild.160101.0800)
        FileDescription:  NPFS Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
Anakartınız için yeni bir Bios güncellemesi gelmiş. Ama beta olduğu için şu anlık güncellemenizi istemiyorum. Dediğim şeyleri yaptıktan sonra devam ederse mavi ekran güncellersiniz.
 
Son düzenleme:
3 gündür sadece 1 tane mi mavi ekran aldınız?

Kaspersky güncelleyin güncelse kaldırınız.
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız.
Memtest86 ile bellek testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd58a38bb81d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd58a38bb8128, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9781

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 39580

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffd58a38bb81d0

BUGCHECK_P3: ffffd58a38bb8128

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd58a38bb81d0 -- (.trap 0xffffd58a38bb81d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffc58f04696dc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044ac67319 rsp=ffffd58a38bb8368 rbp=ffffc58f0e696b88
r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=ffffc58f0e696b88 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!RtlRbRemoveNode+0x19df99:
fffff804`4ac67319 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd58a38bb8128 -- (.exr 0xffffd58a38bb8128)
ExceptionAddress: fffff8044ac67319 (nt!RtlRbRemoveNode+0x000000000019df99)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffd58a`38bb7ea8 fffff804`4ac06569     : 00000000`00000139 00000000`0000001d ffffd58a`38bb81d0 ffffd58a`38bb8128 : nt!KeBugCheckEx
ffffd58a`38bb7eb0 fffff804`4ac06990     : fffffd90`062d94a0 ffffc58f`1099e690 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd58a`38bb7ff0 fffff804`4ac04d23     : 00000000`0a632aa0 00000000`00000040 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd58a`38bb81d0 fffff804`4ac67319     : ffffc58e`fe010280 ffffc58f`0ecf1dc8 fffff804`4aac7ce5 ffffd58a`38bb83f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd58a`38bb8368 fffff804`4aac7ce5     : ffffd58a`38bb83f8 00000000`00000021 ffffc58f`0ecf1dc0 00000000`00000022 : nt!RtlRbRemoveNode+0x19df99
ffffd58a`38bb8380 fffff804`4aac7aca     : 00000000`00000000 ffffa286`02a4b6e8 ffff8c00`00000000 fffff804`4ad18cee : nt!RtlpHpVsChunkSplit+0x45
ffffd58a`38bb8440 fffff804`4aacb048     : 00000000`00000000 00000000`00000200 ffffd58a`38bb8581 00000000`00000200 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffd58a`38bb84a0 fffff804`4b1b1094     : 00000000`00000000 00000000`000001f0 ffffc58f`5246704e ffffc58f`00dd46b0 : nt!ExAllocateHeapPool+0x888
ffffd58a`38bb85e0 fffff804`5d51dc5c     : ffffa286`02b7e298 00000000`00000001 00000000`000001f0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffd58a`38bb8630 fffff804`5d51d9c8     : ffffa286`02b7e100 00000001`00000000 00000000`11d7fdc0 00000000`000001f0 : Npfs!NpWriteDataQueue+0x11c
ffffd58a`38bb86a0 fffff804`5d51d80d     : ffffc58f`000001f0 00000000`11d7fdc0 ffffc58f`12928d10 ffffc58f`0d50a080 : Npfs!NpCommonWrite+0x138
ffffd58a`38bb8730 fffff804`4aacd805     : ffffc58f`0ce1a010 fffff804`492c4b46 ffffd58a`38bb9000 ffffd58a`38bb3000 : Npfs!NpFsdWrite+0x6d
ffffd58a`38bb87a0 fffff804`492c6ccf     : 00000000`0000000f 00000000`00000002 ffffc58f`09583230 ffffc58f`09583230 : nt!IofCallDriver+0x55
ffffd58a`38bb87e0 fffff804`492c48d3     : ffffd58a`38bb8870 ffffc58f`0d3faed0 ffffd58a`37109030 ffffc58f`00dcec80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd58a`38bb8850 fffff804`4aacd805     : ffffc58f`12928d10 00000000`00000000 00000000`00000000 fffffdb6`c5855b8b : FLTMGR!FltpDispatch+0xa3
ffffd58a`38bb88b0 fffff804`4aec2528     : ffffc58f`12928d10 00000000`00000000 ffffc58f`12928d10 00000000`00000000 : nt!IofCallDriver+0x55
ffffd58a`38bb88f0 fffff804`4aeb8e7f     : ffffa286`00000000 ffffd58a`38bb8b80 00000000`0a4fdba8 ffffd58a`38bb8b80 : nt!IopSynchronousServiceTail+0x1a8
ffffd58a`38bb8990 fffff804`4ac05fb8     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0edbd470 : nt!NtWriteFile+0x66f
ffffd58a`38bb8a90 00000000`77511cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a1bec88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77511cfc


SYMBOL_NAME:  Npfs!NpWriteDataQueue+11c

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11c

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_Npfs!NpWriteDataQueue

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28cbf4dd-9f0f-d5b8-99e5-1e3eb498266e}

Followup:     MachineOwner
---------

8: kd> lmvm Npfs
Browse full module list
start             end                 module name
fffff804`5d510000 fffff804`5d52c000   Npfs     # (pdb symbols)          C:\ProgramData\Dbg\sym\npfs.pdb\B6BDF22083B39213E8C6DAA6F39837F41\npfs.pdb
    Loaded symbol image file: Npfs.SYS
    Mapped memory image file: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
    Image path: \SystemRoot\System32\Drivers\Npfs.SYS
    Image name: Npfs.SYS
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        9E3E4C73 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000192F7
    ImageSize:        0001C000
    File version:     10.0.19041.1030
    Product version:  10.0.19041.1030
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     npfs.sys
        OriginalFilename: npfs.sys
        ProductVersion:   10.0.19041.1030
        FileVersion:      10.0.19041.1030 (WinBuild.160101.0800)
        FileDescription:  NPFS Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
Anakartınız için yeni bir Bios güncellemesi gelmiş. Ama beta olduğu için şu anlık güncellemenizi istemiyorum. Dediğim şeyleri yaptıktan sonra devam ederse mavi ekran güncellersiniz.
3 gunde 2 kere aldım aynı hatayı.
 
Discord güncel değilse güncelle ayarlarını kurcaladıysanız normal ayara çekin. RyzenMaster kaldır. Yukarıda söylenenleri uygula.
3 gunde 2 kere aldım aynı hatayı.
Aynı hatayı alsan da farklı dosya çıkar. Ne kadar dosya çıkarsa paylaş.
 

Yeni konular

Geri
Yukarı