3 gündür sadece 1 tane mi mavi ekran aldınız?
Kaspersky güncelleyin güncelse kaldırınız.
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız.
Memtest86 ile bellek testi yapınız.
Sürprizbozan: Hata kodu
Kod:Panoya kopyala
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd58a38bb81d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd58a38bb8128, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9781
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 39580
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffd58a38bb81d0
BUGCHECK_P3: ffffd58a38bb8128
BUGCHECK_P4: 0
TRAP_FRAME: ffffd58a38bb81d0 -- (.trap 0xffffd58a38bb81d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffc58f04696dc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044ac67319 rsp=ffffd58a38bb8368 rbp=ffffc58f0e696b88
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=ffffc58f0e696b88 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!RtlRbRemoveNode+0x19df99:
fffff804`4ac67319 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd58a38bb8128 -- (.exr 0xffffd58a38bb8128)
ExceptionAddress: fffff8044ac67319 (nt!RtlRbRemoveNode+0x000000000019df99)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd58a`38bb7ea8 fffff804`4ac06569 : 00000000`00000139 00000000`0000001d ffffd58a`38bb81d0 ffffd58a`38bb8128 : nt!KeBugCheckEx
ffffd58a`38bb7eb0 fffff804`4ac06990 : fffffd90`062d94a0 ffffc58f`1099e690 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd58a`38bb7ff0 fffff804`4ac04d23 : 00000000`0a632aa0 00000000`00000040 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd58a`38bb81d0 fffff804`4ac67319 : ffffc58e`fe010280 ffffc58f`0ecf1dc8 fffff804`4aac7ce5 ffffd58a`38bb83f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd58a`38bb8368 fffff804`4aac7ce5 : ffffd58a`38bb83f8 00000000`00000021 ffffc58f`0ecf1dc0 00000000`00000022 : nt!RtlRbRemoveNode+0x19df99
ffffd58a`38bb8380 fffff804`4aac7aca : 00000000`00000000 ffffa286`02a4b6e8 ffff8c00`00000000 fffff804`4ad18cee : nt!RtlpHpVsChunkSplit+0x45
ffffd58a`38bb8440 fffff804`4aacb048 : 00000000`00000000 00000000`00000200 ffffd58a`38bb8581 00000000`00000200 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffd58a`38bb84a0 fffff804`4b1b1094 : 00000000`00000000 00000000`000001f0 ffffc58f`5246704e ffffc58f`00dd46b0 : nt!ExAllocateHeapPool+0x888
ffffd58a`38bb85e0 fffff804`5d51dc5c : ffffa286`02b7e298 00000000`00000001 00000000`000001f0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffd58a`38bb8630 fffff804`5d51d9c8 : ffffa286`02b7e100 00000001`00000000 00000000`11d7fdc0 00000000`000001f0 : Npfs!NpWriteDataQueue+0x11c
ffffd58a`38bb86a0 fffff804`5d51d80d : ffffc58f`000001f0 00000000`11d7fdc0 ffffc58f`12928d10 ffffc58f`0d50a080 : Npfs!NpCommonWrite+0x138
ffffd58a`38bb8730 fffff804`4aacd805 : ffffc58f`0ce1a010 fffff804`492c4b46 ffffd58a`38bb9000 ffffd58a`38bb3000 : Npfs!NpFsdWrite+0x6d
ffffd58a`38bb87a0 fffff804`492c6ccf : 00000000`0000000f 00000000`00000002 ffffc58f`09583230 ffffc58f`09583230 : nt!IofCallDriver+0x55
ffffd58a`38bb87e0 fffff804`492c48d3 : ffffd58a`38bb8870 ffffc58f`0d3faed0 ffffd58a`37109030 ffffc58f`00dcec80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd58a`38bb8850 fffff804`4aacd805 : ffffc58f`12928d10 00000000`00000000 00000000`00000000 fffffdb6`c5855b8b : FLTMGR!FltpDispatch+0xa3
ffffd58a`38bb88b0 fffff804`4aec2528 : ffffc58f`12928d10 00000000`00000000 ffffc58f`12928d10 00000000`00000000 : nt!IofCallDriver+0x55
ffffd58a`38bb88f0 fffff804`4aeb8e7f : ffffa286`00000000 ffffd58a`38bb8b80 00000000`0a4fdba8 ffffd58a`38bb8b80 : nt!IopSynchronousServiceTail+0x1a8
ffffd58a`38bb8990 fffff804`4ac05fb8 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0edbd470 : nt!NtWriteFile+0x66f
ffffd58a`38bb8a90 00000000`77511cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a1bec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77511cfc
SYMBOL_NAME: Npfs!NpWriteDataQueue+11c
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_Npfs!NpWriteDataQueue
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28cbf4dd-9f0f-d5b8-99e5-1e3eb498266e}
Followup: MachineOwner
---------
8: kd> lmvm Npfs
Browse full module list
start end module name
fffff804`5d510000 fffff804`5d52c000 Npfs # (pdb symbols) C:\ProgramData\Dbg\sym\npfs.pdb\B6BDF22083B39213E8C6DAA6F39837F41\npfs.pdb
Loaded symbol image file: Npfs.SYS
Mapped memory image file: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
Image path: \SystemRoot\System32\Drivers\Npfs.SYS
Image name: Npfs.SYS
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 9E3E4C73 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000192F7
ImageSize: 0001C000
File version: 10.0.19041.1030
Product version: 10.0.19041.1030
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: npfs.sys
OriginalFilename: npfs.sys
ProductVersion: 10.0.19041.1030
FileVersion: 10.0.19041.1030 (WinBuild.160101.0800)
FileDescription: NPFS Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
Anakartınız için yeni bir Bios güncellemesi gelmiş. Ama beta olduğu için şu anlık güncellemenizi istemiyorum. Dediğim şeyleri yaptıktan sonra devam ederse mavi ekran güncellersiniz.