Windows 10 Mavi ekran hatası

MemTest86 ile belleklerde tarama yapın.

Ayrıca bir yazıcı kullanıyorsanız şimdilik çıkartın, yazdırma servisi veya yazıcıyla ilgili herhangi bir program kullanıyorsanız şimdilik yazılımı kaldırın.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa781f0f21fd4, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8060d38b542, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3054

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffa781f0f21fd4

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8060d38b542

READ_ADDRESS: fffff8060dafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8060da0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8060da0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa781f0f21fd4

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffffb80e0d46eeb0 -- (.trap 0xffffb80e0d46eeb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000041a1 rbx=0000000000000000 rcx=ffffa781e0f241a1
rdx=ffffa781f0f21fd4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060d38b542 rsp=ffffb80e0d46f040 rbp=ffffa781e0f14220
r8=ffffa781e0f30000  r9=ffffa781e0f24220 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na po nc
nt!RtlCompressBufferXpressHuffMax+0x33e:
fffff806`0d38b542 443b3a          cmp     r15d,dword ptr [rdx] ds:ffffa781`f0f21fd4=????????
Resetting default scope

STACK_TEXT:
ffffb80e`0d46ed68 fffff806`0d205e69     : 00000000`0000000a ffffa781`f0f21fd4 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffb80e`0d46ed70 fffff806`0d202169     : 00000000`00000000 00000000`00000006 00000001`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb80e`0d46eeb0 fffff806`0d38b542     : ffffb80e`0d46f240 ffffa781`e0f30000 00000003`00000000 00000000`00000014 : nt!KiPageFault+0x469
ffffb80e`0d46f040 fffff806`0d28f3cf     : ffffa781`e0f241a1 ffffdc83`f4de9000 ffffdc83`f4de9000 00000000`0000000c : nt!RtlCompressBufferXpressHuffMax+0x33e
ffffb80e`0d46f110 fffff806`0d7916d5     : 00000211`e32b07ae 00000000`00000003 00000000`00000000 fffff806`00000000 : nt!RtlCompressBufferProgress+0x10f83f
ffffb80e`0d46f170 fffff806`0d7915fa     : ffffdc83`f3400300 ffffb80e`00000000 00000000`00015400 ffffdc83`e63dfc70 : nt!PopAddPagesToCompressedPageSet+0xb1
ffffb80e`0d46f1f0 fffff806`0d7a0dce     : 0000020e`e56c3602 ffffa781`dec00180 ffffb80e`0d46f4c0 ffffdc83`e63dfc70 : nt!PopCompressHiberBlocks+0x9e
ffffb80e`0d46f3a0 fffff806`0d1fbc05     : 000000b3`333739be ffffd618`8e2f2664 00000000`002fce0c 00000000`00000000 : nt!PopSaveHiberContext+0x103fe
ffffb80e`0d46f680 fffff806`0d181f16     : ffffdc83`e679e280 fffff806`0d108480 00000000`00000000 00000000`00000000 : nt!PopSaveHiberContextWrapper+0x35
ffffb80e`0d46f6b0 fffff806`0d7905a0     : 00000000`00000000 00000000`0000b7ee ffffa781`dec00180 00000000`00000006 : nt!HaliAcpiSleep+0x1c6
ffffb80e`0d46f740 fffff806`0d790383     : fffff806`0da50460 ffffb80e`0d46f960 ffffb80e`0d46fb20 ffffdc83`e6dfeb50 : nt!PopHandleNextState+0x1f0
ffffb80e`0d46f790 fffff806`0d0e9a3e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PopInvokeStateHandlerTargetProcessor+0x53
ffffb80e`0d46f860 fffff806`0d0e8d24     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffb80e`0d46f9d0 fffff806`0d1f7a0e     : ffffffff`00000000 ffffa781`dec00180 00000000`00000000 ffffa781`dec0b240 : nt!KiRetireDpcList+0x1f4
ffffb80e`0d46fc60 00000000`00000000     : ffffb80e`0d470000 ffffb80e`0d46a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!RtlCompressBufferXpressHuffMax+33e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  33e

FAILURE_BUCKET_ID:  AV_nt!RtlCompressBufferXpressHuffMax

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {67a31654-b3be-59aa-868e-726eaa6a0b3a}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff823ffa780b88
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10728

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff823ffa780b88

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  mscorsvw.exe

STACK_TEXT:
fffffd83`f7122f88 fffff805`5a32abba     : 00000000`0000001a 00000000`00041792 ffff823f`fa780b88 00000000`10000000 : nt!KeBugCheckEx
fffffd83`f7122f90 fffff805`5a2edc06     : 00000000`00000000 00000000`00000000 00000000`0000086d ffff823f`fa780b88 : nt!MiDeleteVa+0x153a
fffffd83`f7123090 fffff805`5a2edd1b     : ffff8241`1ffd3c00 ffff9f0f`5e287700 fffffd83`00000000 fffffd83`f7123500 : nt!MiWalkPageTablesRecursively+0x776
fffffd83`f7123130 fffff805`5a2edd1b     : ffff8241`00000000 ffff9f0f`5e287700 fffffd83`00000001 fffffd83`f7123510 : nt!MiWalkPageTablesRecursively+0x88b
fffffd83`f71231d0 fffff805`5a2edd1b     : ffff8241`00000000 ffff9f0f`5e287700 fffffd83`00000002 fffffd83`f7123520 : nt!MiWalkPageTablesRecursively+0x88b
fffffd83`f7123270 fffff805`5a2dcbfb     : 00000000`00000000 ffff9f0f`5e287700 00000000`00000003 fffffd83`f7123530 : nt!MiWalkPageTablesRecursively+0x88b
fffffd83`f7123310 fffff805`5a329451     : fffffd83`f71234b0 ffff9f0f`00000000 ffff823e`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffd83`f7123410 fffff805`5a301670     : 00000000`00000001 fffffd83`00000000 ffff9f0f`5e287550 ffff9f0f`5c352080 : nt!MiDeletePagablePteRange+0x4f1
fffffd83`f7123720 fffff805`5a6999e9     : ffff9f0f`5af11800 00000000`00000000 ffff9f0f`00000000 ffff9f0f`00000000 : nt!MiDeleteVad+0x360
fffffd83`f7123830 fffff805`5a69938c     : ffff9f0f`5af11800 ffff9f0f`5b981770 ffff9f0f`5c352080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffd83`f7123860 fffff805`5a6e4dd3     : ffff9f0f`5af111c0 ffff9f0f`5af111c0 ffff9f0f`5af11800 ffff9f0f`5e287080 : nt!MiCleanVad+0x30
fffffd83`f7123890 fffff805`5a681f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9f0f`5e287080 : nt!MmCleanProcessAddressSpace+0x137
fffffd83`f7123910 fffff805`5a69ea8a     : ffff9f0f`5e287080 ffffb489`6a2f5900 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffffd83`f7123990 fffff805`5a5f3eae     : ffff9f0f`00000000 00000000`00000001 00000000`00000000 000000a0`c6800000 : nt!PspExitThread+0x5f6
fffffd83`f7123a90 fffff805`5a405df1     : ffff9f0f`5e287080 ffff9f0f`5c352080 fffffd83`f7123b80 ffffffff`ffffffff : nt!NtTerminateProcess+0xde
fffffd83`f7123b00 00007ff9`e554c344     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000a0`c6aff678 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e554c344


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffff00000a1008
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6530

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffff00000a1008

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
ffffce0b`fa592df8 fffff802`0bb2abba     : 00000000`0000001a 00000000`00041792 ffffff00`000a1008 00000000`10000000 : nt!KeBugCheckEx
ffffce0b`fa592e00 fffff802`0baedc06     : 00000000`00000000 00000000`00000000 00000000`0000020e ffffff00`000a1008 : nt!MiDeleteVa+0x153a
ffffce0b`fa592f00 fffff802`0baedd1b     : ffffff7f`80000508 ffffbc83`d1caa700 ffffce0b`00000000 ffffce0b`fa593370 : nt!MiWalkPageTablesRecursively+0x776
ffffce0b`fa592fa0 fffff802`0baedd1b     : ffffff7f`bfc00000 ffffbc83`d1caa700 ffffce0b`00000001 ffffce0b`fa593380 : nt!MiWalkPageTablesRecursively+0x88b
ffffce0b`fa593040 fffff802`0baedd1b     : ffffff7f`bfc00000 ffffbc83`d1caa700 ffffce0b`00000002 ffffce0b`fa593390 : nt!MiWalkPageTablesRecursively+0x88b
ffffce0b`fa5930e0 fffff802`0badcbfb     : 00000000`00000000 ffffbc83`d1caa700 00000000`00000003 ffffce0b`fa5933a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffce0b`fa593180 fffff802`0bb29451     : ffffce0b`fa593320 ffffbc83`00000000 ffffff00`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffce0b`fa593280 fffff802`0bb01670     : 00000000`00000001 ffffce0b`00000000 ffffbc83`d1caa550 ffffbc83`d3a8c080 : nt!MiDeletePagablePteRange+0x4f1
ffffce0b`fa593590 fffff802`0be9939f     : ffffbc83`d3a8c080 00000000`00000000 ffffbc83`00000000 ffffbc83`00000000 : nt!MiDeleteVad+0x360
ffffce0b`fa5936a0 fffff802`0bee4dd3     : ffffbc83`d19d6790 ffffbc83`d19d6790 ffffbc83`d3612850 ffffbc83`d1caa080 : nt!MiCleanVad+0x43
ffffce0b`fa5936d0 fffff802`0be81f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffbc83`d1caa080 : nt!MmCleanProcessAddressSpace+0x137
ffffce0b`fa593750 fffff802`0be9ea8a     : ffffbc83`d1caa080 ffff9289`eac81320 ffffce0b`fa593990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffce0b`fa5937d0 fffff802`0bdf4558     : fffff7cc`c0000005 00000000`00000001 ffffce0b`fa5939e0 00000000`09a5d000 : nt!PspExitThread+0x5f6
ffffce0b`fa5938d0 fffff802`0bae6ca7     : ffffbc83`c7aca610 ffffbc83`c7afa000 00000000`00000000 00000000`00501802 : nt!KiSchedulerApcTerminate+0x38
ffffce0b`fa593910 fffff802`0bbf8440     : 00000000`00000000 ffffce0b`fa5939c0 ffffbc83`c7afa388 ffffbc83`00000000 : nt!KiDeliverApc+0x487
ffffce0b`fa5939c0 fffff802`0bc0595f     : ffffbc83`d3a8c080 ffffbc83`d39d2c60 ffffce0b`fa593b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffce0b`fa593b00 00000000`770a1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`12d7eb98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770a1cfc


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 

Geri
Yukarı