*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd58a38bb81d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd58a38bb8128, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9781
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 39580
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffd58a38bb81d0
BUGCHECK_P3: ffffd58a38bb8128
BUGCHECK_P4: 0
TRAP_FRAME: ffffd58a38bb81d0 -- (.trap 0xffffd58a38bb81d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffc58f04696dc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044ac67319 rsp=ffffd58a38bb8368 rbp=ffffc58f0e696b88
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=ffffc58f0e696b88 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!RtlRbRemoveNode+0x19df99:
fffff804`4ac67319 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd58a38bb8128 -- (.exr 0xffffd58a38bb8128)
ExceptionAddress: fffff8044ac67319 (nt!RtlRbRemoveNode+0x000000000019df99)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd58a`38bb7ea8 fffff804`4ac06569 : 00000000`00000139 00000000`0000001d ffffd58a`38bb81d0 ffffd58a`38bb8128 : nt!KeBugCheckEx
ffffd58a`38bb7eb0 fffff804`4ac06990 : fffffd90`062d94a0 ffffc58f`1099e690 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd58a`38bb7ff0 fffff804`4ac04d23 : 00000000`0a632aa0 00000000`00000040 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd58a`38bb81d0 fffff804`4ac67319 : ffffc58e`fe010280 ffffc58f`0ecf1dc8 fffff804`4aac7ce5 ffffd58a`38bb83f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd58a`38bb8368 fffff804`4aac7ce5 : ffffd58a`38bb83f8 00000000`00000021 ffffc58f`0ecf1dc0 00000000`00000022 : nt!RtlRbRemoveNode+0x19df99
ffffd58a`38bb8380 fffff804`4aac7aca : 00000000`00000000 ffffa286`02a4b6e8 ffff8c00`00000000 fffff804`4ad18cee : nt!RtlpHpVsChunkSplit+0x45
ffffd58a`38bb8440 fffff804`4aacb048 : 00000000`00000000 00000000`00000200 ffffd58a`38bb8581 00000000`00000200 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffd58a`38bb84a0 fffff804`4b1b1094 : 00000000`00000000 00000000`000001f0 ffffc58f`5246704e ffffc58f`00dd46b0 : nt!ExAllocateHeapPool+0x888
ffffd58a`38bb85e0 fffff804`5d51dc5c : ffffa286`02b7e298 00000000`00000001 00000000`000001f0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffd58a`38bb8630 fffff804`5d51d9c8 : ffffa286`02b7e100 00000001`00000000 00000000`11d7fdc0 00000000`000001f0 : Npfs!NpWriteDataQueue+0x11c
ffffd58a`38bb86a0 fffff804`5d51d80d : ffffc58f`000001f0 00000000`11d7fdc0 ffffc58f`12928d10 ffffc58f`0d50a080 : Npfs!NpCommonWrite+0x138
ffffd58a`38bb8730 fffff804`4aacd805 : ffffc58f`0ce1a010 fffff804`492c4b46 ffffd58a`38bb9000 ffffd58a`38bb3000 : Npfs!NpFsdWrite+0x6d
ffffd58a`38bb87a0 fffff804`492c6ccf : 00000000`0000000f 00000000`00000002 ffffc58f`09583230 ffffc58f`09583230 : nt!IofCallDriver+0x55
ffffd58a`38bb87e0 fffff804`492c48d3 : ffffd58a`38bb8870 ffffc58f`0d3faed0 ffffd58a`37109030 ffffc58f`00dcec80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd58a`38bb8850 fffff804`4aacd805 : ffffc58f`12928d10 00000000`00000000 00000000`00000000 fffffdb6`c5855b8b : FLTMGR!FltpDispatch+0xa3
ffffd58a`38bb88b0 fffff804`4aec2528 : ffffc58f`12928d10 00000000`00000000 ffffc58f`12928d10 00000000`00000000 : nt!IofCallDriver+0x55
ffffd58a`38bb88f0 fffff804`4aeb8e7f : ffffa286`00000000 ffffd58a`38bb8b80 00000000`0a4fdba8 ffffd58a`38bb8b80 : nt!IopSynchronousServiceTail+0x1a8
ffffd58a`38bb8990 fffff804`4ac05fb8 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0edbd470 : nt!NtWriteFile+0x66f
ffffd58a`38bb8a90 00000000`77511cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a1bec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77511cfc
SYMBOL_NAME: Npfs!NpWriteDataQueue+11c
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_Npfs!NpWriteDataQueue
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28cbf4dd-9f0f-d5b8-99e5-1e3eb498266e}
Followup: MachineOwner
---------
8: kd> lmvm Npfs
Browse full module list
start end module name
fffff804`5d510000 fffff804`5d52c000 Npfs # (pdb symbols) C:\ProgramData\Dbg\sym\npfs.pdb\B6BDF22083B39213E8C6DAA6F39837F41\npfs.pdb
Loaded symbol image file: Npfs.SYS
Mapped memory image file: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
Image path: \SystemRoot\System32\Drivers\Npfs.SYS
Image name: Npfs.SYS
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 9E3E4C73 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000192F7
ImageSize: 0001C000
File version: 10.0.19041.1030
Product version: 10.0.19041.1030
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: npfs.sys
OriginalFilename: npfs.sys
ProductVersion: 10.0.19041.1030
FileVersion: 10.0.19041.1030 (WinBuild.160101.0800)
FileDescription: NPFS Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
3 gunde 2 kere aldım aynı hatayı.3 gündür sadece 1 tane mi mavi ekran aldınız?
Kaspersky güncelleyin güncelse kaldırınız.
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız.
Memtest86 ile bellek testi yapınız.
Anakartınız için yeni bir Bios güncellemesi gelmiş. Ama beta olduğu için şu anlık güncellemenizi istemiyorum. Dediğim şeyleri yaptıktan sonra devam ederse mavi ekran güncellersiniz.Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001d, Type of memory safety violation Arg2: ffffd58a38bb81d0, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffd58a38bb8128, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 9781 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-J7A11VA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 39580 Key : Analysis.Memory.CommitPeak.Mb Value: 78 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 1d BUGCHECK_P2: ffffd58a38bb81d0 BUGCHECK_P3: ffffd58a38bb8128 BUGCHECK_P4: 0 TRAP_FRAME: ffffd58a38bb81d0 -- (.trap 0xffffd58a38bb81d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d rdx=ffffc58f04696dc8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8044ac67319 rsp=ffffd58a38bb8368 rbp=ffffc58f0e696b88 r8=0000000000000000 r9=0000000000000000 r10=0000000000000001 r11=ffffc58f0e696b88 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe cy nt!RtlRbRemoveNode+0x19df99: fffff804`4ac67319 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffd58a38bb8128 -- (.exr 0xffffd58a38bb8128) ExceptionAddress: fffff8044ac67319 (nt!RtlRbRemoveNode+0x000000000019df99) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000001d Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Discord.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000001d EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffd58a`38bb7ea8 fffff804`4ac06569 : 00000000`00000139 00000000`0000001d ffffd58a`38bb81d0 ffffd58a`38bb8128 : nt!KeBugCheckEx ffffd58a`38bb7eb0 fffff804`4ac06990 : fffffd90`062d94a0 ffffc58f`1099e690 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffd58a`38bb7ff0 fffff804`4ac04d23 : 00000000`0a632aa0 00000000`00000040 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffffd58a`38bb81d0 fffff804`4ac67319 : ffffc58e`fe010280 ffffc58f`0ecf1dc8 fffff804`4aac7ce5 ffffd58a`38bb83f8 : nt!KiRaiseSecurityCheckFailure+0x323 ffffd58a`38bb8368 fffff804`4aac7ce5 : ffffd58a`38bb83f8 00000000`00000021 ffffc58f`0ecf1dc0 00000000`00000022 : nt!RtlRbRemoveNode+0x19df99 ffffd58a`38bb8380 fffff804`4aac7aca : 00000000`00000000 ffffa286`02a4b6e8 ffff8c00`00000000 fffff804`4ad18cee : nt!RtlpHpVsChunkSplit+0x45 ffffd58a`38bb8440 fffff804`4aacb048 : 00000000`00000000 00000000`00000200 ffffd58a`38bb8581 00000000`00000200 : nt!RtlpHpVsContextAllocateInternal+0x1fa ffffd58a`38bb84a0 fffff804`4b1b1094 : 00000000`00000000 00000000`000001f0 ffffc58f`5246704e ffffc58f`00dd46b0 : nt!ExAllocateHeapPool+0x888 ffffd58a`38bb85e0 fffff804`5d51dc5c : ffffa286`02b7e298 00000000`00000001 00000000`000001f0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64 ffffd58a`38bb8630 fffff804`5d51d9c8 : ffffa286`02b7e100 00000001`00000000 00000000`11d7fdc0 00000000`000001f0 : Npfs!NpWriteDataQueue+0x11c ffffd58a`38bb86a0 fffff804`5d51d80d : ffffc58f`000001f0 00000000`11d7fdc0 ffffc58f`12928d10 ffffc58f`0d50a080 : Npfs!NpCommonWrite+0x138 ffffd58a`38bb8730 fffff804`4aacd805 : ffffc58f`0ce1a010 fffff804`492c4b46 ffffd58a`38bb9000 ffffd58a`38bb3000 : Npfs!NpFsdWrite+0x6d ffffd58a`38bb87a0 fffff804`492c6ccf : 00000000`0000000f 00000000`00000002 ffffc58f`09583230 ffffc58f`09583230 : nt!IofCallDriver+0x55 ffffd58a`38bb87e0 fffff804`492c48d3 : ffffd58a`38bb8870 ffffc58f`0d3faed0 ffffd58a`37109030 ffffc58f`00dcec80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f ffffd58a`38bb8850 fffff804`4aacd805 : ffffc58f`12928d10 00000000`00000000 00000000`00000000 fffffdb6`c5855b8b : FLTMGR!FltpDispatch+0xa3 ffffd58a`38bb88b0 fffff804`4aec2528 : ffffc58f`12928d10 00000000`00000000 ffffc58f`12928d10 00000000`00000000 : nt!IofCallDriver+0x55 ffffd58a`38bb88f0 fffff804`4aeb8e7f : ffffa286`00000000 ffffd58a`38bb8b80 00000000`0a4fdba8 ffffd58a`38bb8b80 : nt!IopSynchronousServiceTail+0x1a8 ffffd58a`38bb8990 fffff804`4ac05fb8 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0edbd470 : nt!NtWriteFile+0x66f ffffd58a`38bb8a90 00000000`77511cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0a1bec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77511cfc SYMBOL_NAME: Npfs!NpWriteDataQueue+11c MODULE_NAME: Npfs IMAGE_NAME: Npfs.SYS IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 11c FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_Npfs!NpWriteDataQueue OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {28cbf4dd-9f0f-d5b8-99e5-1e3eb498266e} Followup: MachineOwner --------- 8: kd> lmvm Npfs Browse full module list start end module name fffff804`5d510000 fffff804`5d52c000 Npfs # (pdb symbols) C:\ProgramData\Dbg\sym\npfs.pdb\B6BDF22083B39213E8C6DAA6F39837F41\npfs.pdb Loaded symbol image file: Npfs.SYS Mapped memory image file: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS Image path: \SystemRoot\System32\Drivers\Npfs.SYS Image name: Npfs.SYS Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 9E3E4C73 (This is a reproducible build file hash, not a timestamp) CheckSum: 000192F7 ImageSize: 0001C000 File version: 10.0.19041.1030 Product version: 10.0.19041.1030 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: npfs.sys OriginalFilename: npfs.sys ProductVersion: 10.0.19041.1030 FileVersion: 10.0.19041.1030 (WinBuild.160101.0800) FileDescription: NPFS Driver LegalCopyright: © Microsoft Corporation. All rights reserved.
bu bugun olan dosya 11inde de oldu ayın.Ama 1 tane dosya göndermişsiniz. Diğeri oluşmadı mı?
Aynı hatayı alsan da farklı dosya çıkar. Ne kadar dosya çıkarsa paylaş.3 gunde 2 kere aldım aynı hatayı.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.