MEMORY_MANAGEMENT Mavi Ekran Hatası

İşletim sistemi
Windows 10

Onur SAYGI

Hectopat
Katılım
4 Aralık 2020
Mesajlar
71
Daha fazla  
Cinsiyet
Erkek
Merhabalar, arkadaşım Casper G900 model bilgisayarında ara sıra mavi ekran sorunları yaşıyordu ancak son zamanlarda iyice artmış. Saat başı mavi ekran yiyormuş. Mavi ekran yemeden önce genelde tarayıcısı çöküyormuş. Kendisinden minidump dosyalarını istedim ve Memtest yapmasını istedim. Sonuçları buraya atıyorum yorumlarsanız sevinirim. Teşekkürler.

➡️Dump Dosyaları⬅️

Memtest86 Sonucu

1620842291526.jpeg
 
Belleklerin durumu oldukça kötü, zaten döküm dosyaları da bellekleri gösteriyor. En kısa zamanda bellekleri değiştirsin.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd2bfff44d100
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7999

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8645

    Key  : Analysis.Init.CPU.mSec
    Value: 1062

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4557

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : MemoryManagement.PFN
    Value: 10000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffd2bfff44d100

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT:
ffffe90f`fa92ed78 fffff807`7ec9d0fa     : 00000000`0000001a 00000000`00041792 ffffd2bf`ff44d100 00000000`10000000 : nt!KeBugCheckEx
ffffe90f`fa92ed80 fffff807`7ec0b9e6     : 00000000`00000000 00000000`00000000 00000000`00000087 ffffd2bf`ff44d100 : nt!MiDeleteVa+0x153a
ffffe90f`fa92ee80 fffff807`7ec0bafb     : ffffd2e9`5fffa268 ffff9809`211969c0 ffffe90f`00000000 ffffe90f`fa92f2f0 : nt!MiWalkPageTablesRecursively+0x776
ffffe90f`fa92ef20 fffff807`7ec0bafb     : ffffd2e9`74afffd0 ffff9809`211969c0 ffffe90f`00000001 ffffe90f`fa92f300 : nt!MiWalkPageTablesRecursively+0x88b
ffffe90f`fa92efc0 fffff807`7ec0bafb     : ffffd2e9`74aff000 ffff9809`211969c0 ffffe90f`00000002 ffffe90f`fa92f310 : nt!MiWalkPageTablesRecursively+0x88b
ffffe90f`fa92f060 fffff807`7ec5de6b     : 00000000`00000000 ffff9809`211969c0 00000000`00000003 ffffe90f`fa92f320 : nt!MiWalkPageTablesRecursively+0x88b
ffffe90f`fa92f100 fffff807`7ec9b991     : ffffe90f`fa92f2a0 ffff9809`00000000 ffffd2bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffe90f`fa92f200 fffff807`7ec6baf0     : 00000000`00000001 ffffe90f`00000000 ffff9809`21196810 ffff9809`1a6c9080 : nt!MiDeletePagablePteRange+0x4f1
ffffe90f`fa92f510 fffff807`7f036189     : ffff9809`20e41c80 00000000`00000000 ffff9809`00000000 ffff9809`00000000 : nt!MiDeleteVad+0x360
ffffe90f`fa92f620 fffff807`7f035820     : ffff9809`20e41c80 ffff9809`1de90ca0 ffff9809`1a6c9080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe90f`fa92f650 fffff807`7f033aef     : ffff9809`20e40c40 ffff9809`20e40c40 ffff9809`20e41c80 ffff9809`21196340 : nt!MiCleanVad+0x30
ffffe90f`fa92f680 fffff807`7f05dbd4     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9809`21196340 : nt!MmCleanProcessAddressSpace+0x137
ffffe90f`fa92f700 fffff807`7f106a96     : ffff9809`21196340 ffffd901`e66b5060 ffffe90f`fa92f950 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffe90f`fa92f790 fffff807`7f0d2918     : 00000000`00000000 ffff9809`21196301 00000000`00000001 000000ab`e352a000 : nt!PspExitThread+0x5f6
ffffe90f`fa92f890 fffff807`7ec67fb7     : 00000000`00000000 fffff807`7ec65b77 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffe90f`fa92f8d0 fffff807`7edfa3e0     : 00000000`00000000 ffffe90f`fa92f980 ffff9809`00000007 00000000`00000000 : nt!KiDeliverApc+0x487
ffffe90f`fa92f980 fffff807`7ee0785f     : 00000000`000021a4 00000000`00000000 00000000`00000000 ffff9809`00000000 : nt!KiInitiateUserApc+0x70
ffffe90f`fa92fac0 00007ffe`a0430714     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000ab`e53ff5c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a0430714


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff200cc6d4398
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14553

    Key  : Analysis.Init.CPU.mSec
    Value: 1046

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7306

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : MemoryManagement.PFN
    Value: 10000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff200cc6d4398

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WUDFHost.exe

STACK_TEXT:
ffffc08a`a7347008 fffff806`2cc9d0fa     : 00000000`0000001a 00000000`00041792 fffff200`cc6d4398 00000000`10000000 : nt!KeBugCheckEx
ffffc08a`a7347010 fffff806`2cc0b9e6     : 00000000`00000000 ffff9808`901058c0 00000000`0000001d fffff200`cc6d4398 : nt!MiDeleteVa+0x153a
ffffc08a`a7347110 fffff806`2cc0bafb     : fffff279`006636a0 ffff9808`901058c0 ffffc08a`00000000 ffffc08a`a7347580 : nt!MiWalkPageTablesRecursively+0x776
ffffc08a`a73471b0 fffff806`2cc0bafb     : fffff279`00000000 ffff9808`901058c0 ffffc08a`00000001 ffffc08a`a7347590 : nt!MiWalkPageTablesRecursively+0x88b
ffffc08a`a7347250 fffff806`2cc0bafb     : fffff279`3c803000 ffff9808`901058c0 ffffc08a`00000002 ffffc08a`a73475a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc08a`a73472f0 fffff806`2cc5de6b     : ffff9808`00000000 ffff9808`901058c0 00000000`00000003 ffffc08a`a73475b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc08a`a7347390 fffff806`2cc9b991     : ffffc08a`a7347530 ffff9808`00000000 ffffc08a`00000002 ffff9808`00000000 : nt!MiWalkPageTables+0x36b
ffffc08a`a7347490 fffff806`2cc6baf0     : 00000000`00000001 ffffc08a`00000000 ffff9808`90105710 ffff9808`93a09040 : nt!MiDeletePagablePteRange+0x4f1
ffffc08a`a73477a0 fffff806`2ccab137     : 00000000`198da8a6 00000000`00000000 ffff9808`00000000 fffff806`00000000 : nt!MiDeleteVad+0x360
ffffc08a`a73478b0 fffff806`2d02e6ac     : ffffc08a`00000000 00000000`00000000 ffffc08a`a7347a10 00000198`d8fb0000 : nt!MiFreeVadRange+0xa3
ffffc08a`a7347910 fffff806`2d02e185     : 00000017`77f7e598 ffffc08a`a7347a68 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x4ec
ffffc08a`a7347a60 fffff806`2ce077b8     : ffff9808`93a09040 ffff9808`9041ffe0 ffffc08a`a7347ad8 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffffc08a`a7347ac0 00007ffc`6e1cd0e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000017`77f7e338 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6e1cd0e4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000032b04c, page frame number
Arg3: 0000000000000002, current page state
Arg4: 040002b0002bdb4b, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7953

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17001

    Key  : Analysis.Init.CPU.mSec
    Value: 1187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8954

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 32b04c

BUGCHECK_P3: 2

BUGCHECK_P4: 40002b0002bdb4b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  obs-browser-page.exe

STACK_TEXT:
ffff968f`1aeaebf8 fffff807`4e3ed97f     : 00000000`0000004e 00000000`00000099 00000000`0032b04c 00000000`00000002 : nt!KeBugCheckEx
ffff968f`1aeaec00 fffff807`4e29a598     : 00000000`001fc047 fffff807`4ec50c80 00000000`00000001 ffff968f`00000047 : nt!MiBadShareCount+0x5b
ffff968f`1aeaec40 fffff807`4e29ad6e     : 00000000`00000000 ffff968f`1aeaf380 fffffc81`3004b560 ffff968f`1aeaf2d0 : nt!MiDeletePteRun+0x1798
ffff968f`1aeaee50 fffff807`4e2fc1f1     : 00000000`00000000 00000000`00000001 ffff968f`1aeaf2d0 ffff968f`1aeaf320 : nt!MiDeleteVaTail+0x6e
ffff968f`1aeaee80 fffff807`4e20b821     : 00000000`00000004 00000000`00000000 00000000`0000008f fffffc81`3004b558 : nt!MiYieldPageTableWalk+0x31
ffff968f`1aeaeeb0 fffff807`4e20bafb     : fffffcfe`00000000 ffffc201`d1a09700 ffff968f`00000000 ffff968f`1aeaf320 : nt!MiWalkPageTablesRecursively+0x5b1
ffff968f`1aeaef50 fffff807`4e20bafb     : fffffcfe`7f204c00 ffffc201`d1a09700 ffff968f`00000001 ffff968f`1aeaf330 : nt!MiWalkPageTablesRecursively+0x88b
ffff968f`1aeaeff0 fffff807`4e20bafb     : fffffcfe`7f204000 ffffc201`d1a09700 ffff968f`00000002 ffff968f`1aeaf340 : nt!MiWalkPageTablesRecursively+0x88b
ffff968f`1aeaf090 fffff807`4e25de6b     : fffffcfe`7f3f9fc8 ffffc201`d1a09700 00000260`00000003 ffff968f`1aeaf350 : nt!MiWalkPageTablesRecursively+0x88b
ffff968f`1aeaf130 fffff807`4e29b991     : ffff968f`1aeaf2d0 ffffc201`00000000 00000260`00000002 01d000f0`00000000 : nt!MiWalkPageTables+0x36b
ffff968f`1aeaf230 fffff807`4e26baf0     : 00000000`00000001 ffff968f`00000000 ffffc201`d1a09550 ffffc201`d0b49080 : nt!MiDeletePagablePteRange+0x4f1
ffff968f`1aeaf540 fffff807`4e635833     : ffffc201`d0b49080 00000000`00000000 ffffc201`00000000 ffffc201`00000000 : nt!MiDeleteVad+0x360
ffff968f`1aeaf650 fffff807`4e633aef     : ffffc201`cd246a90 ffffc201`cd246a90 ffffc201`d2e9ef60 ffffc201`d1a09080 : nt!MiCleanVad+0x43
ffff968f`1aeaf680 fffff807`4e65dbd4     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc201`d1a09080 : nt!MmCleanProcessAddressSpace+0x137
ffff968f`1aeaf700 fffff807`4e706a96     : ffffc201`d1a09080 ffffd209`da818060 ffff968f`1aeaf950 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff968f`1aeaf790 fffff807`4e6d2918     : ffffc201`c0000374 00000000`00000001 ffff968f`1aeaf9a0 000000a0`8fbc6000 : nt!PspExitThread+0x5f6
ffff968f`1aeaf890 fffff807`4e267fb7     : 00000000`40bf0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff968f`1aeaf8d0 fffff807`4e3fa3e0     : 000000a0`904ffbb8 ffff968f`1aeaf980 ffff968f`1aeafb40 000000a0`00000000 : nt!KiDeliverApc+0x487
ffff968f`1aeaf980 fffff807`4e40785f     : ffffc201`d0b49080 00000000`00000000 ffff968f`1aeafad8 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff968f`1aeafac0 00007ffd`d0f4cda4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a0`904ffb88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d0f4cda4


SYMBOL_NAME:  nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  5b

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff80898841f854, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff801542681ed, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 36439

    Key  : Analysis.Init.CPU.mSec
    Value: 983

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11151

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffff80898841f854

BUGCHECK_P2: 2

BUGCHECK_P3: fffff801542681ed

BUGCHECK_P4: 2

READ_ADDRESS: fffff80154cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff80898841f854

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8089c841f550 -- (.trap 0xffff8089c841f550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff80898841f854
rdx=ffffba81ceb48150 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801542681ed rsp=ffff8089c841f6e0 rbp=ffff8089c841fa40
 r8=ffffba81ceb48150  r9=0000000000000000 r10=fffff80154cee700
r11=ffffba81ceb52150 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!IoRemoveIoCompletion+0x19d:
fffff801`542681ed 448931          mov     dword ptr [rcx],r14d ds:ffff8089`8841f854=????????
Resetting default scope

STACK_TEXT:
ffff8089`c841f2a8 fffff801`5441ecf1     : 00000000`00000050 ffff8089`8841f854 00000000`00000002 ffff8089`c841f550 : nt!KeBugCheckEx
ffff8089`c841f2b0 fffff801`5420c960     : 00000000`00000000 00000000`00000002 ffff8089`c841f5d0 00000000`00000000 : nt!MiSystemFault+0x1f44e1
ffff8089`c841f3b0 fffff801`54403f5e     : 00000000`00000000 00000000`00000000 ffffba81`c4b9a1c0 00000000`00000000 : nt!MmAccessFault+0x400
ffff8089`c841f550 fffff801`542681ed     : 00000000`00000000 00000000`00000000 ffff8089`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff8089`c841f6e0 fffff801`5462ce0e     : 00000000`00000000 00000000`00000000 ffffca8e`45800100 fffff801`5424caf2 : nt!IoRemoveIoCompletion+0x19d
ffff8089`c841f810 fffff801`544077b8     : 00000000`00000000 ffffca8e`5231c0e0 00000000`c000000d 00000000`00040086 : nt!NtRemoveIoCompletionEx+0xfe
ffff8089`c841f950 fffff801`543f9ca0     : fffff801`505ffba1 fffff801`54d27600 ffffba81`b75ec000 ffffba81`b75ec000 : nt!KiSystemServiceCopyEnd+0x28
ffff8089`c841fb58 fffff801`505ffba1     : fffff801`54d27600 ffffba81`b75ec000 ffffba81`b75ec000 00000000`00000000 : nt!KiServiceLinkage
ffff8089`c841fb60 fffff801`54317e85     : ffffba81`c4b9a080 fffff801`00000001 00000000`00000000 000fe067`b4bbbdff : msrpc!LrpcKernelBaseRoutine+0x51
ffff8089`c841fbd0 fffff801`543fd498     : fffff801`4f319180 ffffba81`c4b9a080 fffff801`54317e30 bf211031`90c1e05e : nt!PspSystemThreadStartup+0x55
ffff8089`c841fc20 00000000`00000000     : ffff8089`c8420000 ffff8089`c8419000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  msrpc!LrpcKernelBaseRoutine+51

MODULE_NAME: msrpc

IMAGE_NAME:  msrpc.sys

IMAGE_VERSION:  10.0.19041.985

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  AV_INVALID_msrpc!LrpcKernelBaseRoutine

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {40ccdb3e-a4e1-837e-10f4-4b425c8656c7}

Followup:     MachineOwner
---------

Ek olarak, sistemin Casper G900 olduğunu söylediniz fakat döküm dosyalarında anakart TUF B450M-Pro Gaming, işlemci R5 5600X olarak görünüyor. Bu nasıl olabiliyor?

Kod:
Machine ID Information [From Smbios 3.3, DMIVersion 0, Size=2641]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends Inc.
BiosVersion = 2602
BiosReleaseDate = 01/05/2021
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = TUF B450M-PRO GAMING
BaseBoardVersion = Rev X.0x

[CPU Information]
~MHz = REG_DWORD 3693
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 25 Model 33 Stepping 0
ProcessorNameString = REG_SZ AMD Ryzen 5 5600X 6-Core Processor           
Update Status = REG_DWORD 1
VendorIdentifier = REG_SZ AuthenticAMD
 
Belleklerin durumu oldukça kötü, zaten döküm dosyaları da bellekleri gösteriyor. En kısa zamanda bellekleri değiştirsin.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd2bfff44d100
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7999

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8645

    Key  : Analysis.Init.CPU.mSec
    Value: 1062

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4557

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : MemoryManagement.PFN
    Value: 10000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffd2bfff44d100

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT:
ffffe90f`fa92ed78 fffff807`7ec9d0fa     : 00000000`0000001a 00000000`00041792 ffffd2bf`ff44d100 00000000`10000000 : nt!KeBugCheckEx
ffffe90f`fa92ed80 fffff807`7ec0b9e6     : 00000000`00000000 00000000`00000000 00000000`00000087 ffffd2bf`ff44d100 : nt!MiDeleteVa+0x153a
ffffe90f`fa92ee80 fffff807`7ec0bafb     : ffffd2e9`5fffa268 ffff9809`211969c0 ffffe90f`00000000 ffffe90f`fa92f2f0 : nt!MiWalkPageTablesRecursively+0x776
ffffe90f`fa92ef20 fffff807`7ec0bafb     : ffffd2e9`74afffd0 ffff9809`211969c0 ffffe90f`00000001 ffffe90f`fa92f300 : nt!MiWalkPageTablesRecursively+0x88b
ffffe90f`fa92efc0 fffff807`7ec0bafb     : ffffd2e9`74aff000 ffff9809`211969c0 ffffe90f`00000002 ffffe90f`fa92f310 : nt!MiWalkPageTablesRecursively+0x88b
ffffe90f`fa92f060 fffff807`7ec5de6b     : 00000000`00000000 ffff9809`211969c0 00000000`00000003 ffffe90f`fa92f320 : nt!MiWalkPageTablesRecursively+0x88b
ffffe90f`fa92f100 fffff807`7ec9b991     : ffffe90f`fa92f2a0 ffff9809`00000000 ffffd2bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffe90f`fa92f200 fffff807`7ec6baf0     : 00000000`00000001 ffffe90f`00000000 ffff9809`21196810 ffff9809`1a6c9080 : nt!MiDeletePagablePteRange+0x4f1
ffffe90f`fa92f510 fffff807`7f036189     : ffff9809`20e41c80 00000000`00000000 ffff9809`00000000 ffff9809`00000000 : nt!MiDeleteVad+0x360
ffffe90f`fa92f620 fffff807`7f035820     : ffff9809`20e41c80 ffff9809`1de90ca0 ffff9809`1a6c9080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe90f`fa92f650 fffff807`7f033aef     : ffff9809`20e40c40 ffff9809`20e40c40 ffff9809`20e41c80 ffff9809`21196340 : nt!MiCleanVad+0x30
ffffe90f`fa92f680 fffff807`7f05dbd4     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9809`21196340 : nt!MmCleanProcessAddressSpace+0x137
ffffe90f`fa92f700 fffff807`7f106a96     : ffff9809`21196340 ffffd901`e66b5060 ffffe90f`fa92f950 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffe90f`fa92f790 fffff807`7f0d2918     : 00000000`00000000 ffff9809`21196301 00000000`00000001 000000ab`e352a000 : nt!PspExitThread+0x5f6
ffffe90f`fa92f890 fffff807`7ec67fb7     : 00000000`00000000 fffff807`7ec65b77 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffe90f`fa92f8d0 fffff807`7edfa3e0     : 00000000`00000000 ffffe90f`fa92f980 ffff9809`00000007 00000000`00000000 : nt!KiDeliverApc+0x487
ffffe90f`fa92f980 fffff807`7ee0785f     : 00000000`000021a4 00000000`00000000 00000000`00000000 ffff9809`00000000 : nt!KiInitiateUserApc+0x70
ffffe90f`fa92fac0 00007ffe`a0430714     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000ab`e53ff5c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a0430714


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff200cc6d4398
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14553

    Key  : Analysis.Init.CPU.mSec
    Value: 1046

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7306

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : MemoryManagement.PFN
    Value: 10000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff200cc6d4398

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WUDFHost.exe

STACK_TEXT:
ffffc08a`a7347008 fffff806`2cc9d0fa     : 00000000`0000001a 00000000`00041792 fffff200`cc6d4398 00000000`10000000 : nt!KeBugCheckEx
ffffc08a`a7347010 fffff806`2cc0b9e6     : 00000000`00000000 ffff9808`901058c0 00000000`0000001d fffff200`cc6d4398 : nt!MiDeleteVa+0x153a
ffffc08a`a7347110 fffff806`2cc0bafb     : fffff279`006636a0 ffff9808`901058c0 ffffc08a`00000000 ffffc08a`a7347580 : nt!MiWalkPageTablesRecursively+0x776
ffffc08a`a73471b0 fffff806`2cc0bafb     : fffff279`00000000 ffff9808`901058c0 ffffc08a`00000001 ffffc08a`a7347590 : nt!MiWalkPageTablesRecursively+0x88b
ffffc08a`a7347250 fffff806`2cc0bafb     : fffff279`3c803000 ffff9808`901058c0 ffffc08a`00000002 ffffc08a`a73475a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc08a`a73472f0 fffff806`2cc5de6b     : ffff9808`00000000 ffff9808`901058c0 00000000`00000003 ffffc08a`a73475b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc08a`a7347390 fffff806`2cc9b991     : ffffc08a`a7347530 ffff9808`00000000 ffffc08a`00000002 ffff9808`00000000 : nt!MiWalkPageTables+0x36b
ffffc08a`a7347490 fffff806`2cc6baf0     : 00000000`00000001 ffffc08a`00000000 ffff9808`90105710 ffff9808`93a09040 : nt!MiDeletePagablePteRange+0x4f1
ffffc08a`a73477a0 fffff806`2ccab137     : 00000000`198da8a6 00000000`00000000 ffff9808`00000000 fffff806`00000000 : nt!MiDeleteVad+0x360
ffffc08a`a73478b0 fffff806`2d02e6ac     : ffffc08a`00000000 00000000`00000000 ffffc08a`a7347a10 00000198`d8fb0000 : nt!MiFreeVadRange+0xa3
ffffc08a`a7347910 fffff806`2d02e185     : 00000017`77f7e598 ffffc08a`a7347a68 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x4ec
ffffc08a`a7347a60 fffff806`2ce077b8     : ffff9808`93a09040 ffff9808`9041ffe0 ffffc08a`a7347ad8 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffffc08a`a7347ac0 00007ffc`6e1cd0e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000017`77f7e338 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6e1cd0e4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000032b04c, page frame number
Arg3: 0000000000000002, current page state
Arg4: 040002b0002bdb4b, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7953

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17001

    Key  : Analysis.Init.CPU.mSec
    Value: 1187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8954

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 32b04c

BUGCHECK_P3: 2

BUGCHECK_P4: 40002b0002bdb4b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  obs-browser-page.exe

STACK_TEXT:
ffff968f`1aeaebf8 fffff807`4e3ed97f     : 00000000`0000004e 00000000`00000099 00000000`0032b04c 00000000`00000002 : nt!KeBugCheckEx
ffff968f`1aeaec00 fffff807`4e29a598     : 00000000`001fc047 fffff807`4ec50c80 00000000`00000001 ffff968f`00000047 : nt!MiBadShareCount+0x5b
ffff968f`1aeaec40 fffff807`4e29ad6e     : 00000000`00000000 ffff968f`1aeaf380 fffffc81`3004b560 ffff968f`1aeaf2d0 : nt!MiDeletePteRun+0x1798
ffff968f`1aeaee50 fffff807`4e2fc1f1     : 00000000`00000000 00000000`00000001 ffff968f`1aeaf2d0 ffff968f`1aeaf320 : nt!MiDeleteVaTail+0x6e
ffff968f`1aeaee80 fffff807`4e20b821     : 00000000`00000004 00000000`00000000 00000000`0000008f fffffc81`3004b558 : nt!MiYieldPageTableWalk+0x31
ffff968f`1aeaeeb0 fffff807`4e20bafb     : fffffcfe`00000000 ffffc201`d1a09700 ffff968f`00000000 ffff968f`1aeaf320 : nt!MiWalkPageTablesRecursively+0x5b1
ffff968f`1aeaef50 fffff807`4e20bafb     : fffffcfe`7f204c00 ffffc201`d1a09700 ffff968f`00000001 ffff968f`1aeaf330 : nt!MiWalkPageTablesRecursively+0x88b
ffff968f`1aeaeff0 fffff807`4e20bafb     : fffffcfe`7f204000 ffffc201`d1a09700 ffff968f`00000002 ffff968f`1aeaf340 : nt!MiWalkPageTablesRecursively+0x88b
ffff968f`1aeaf090 fffff807`4e25de6b     : fffffcfe`7f3f9fc8 ffffc201`d1a09700 00000260`00000003 ffff968f`1aeaf350 : nt!MiWalkPageTablesRecursively+0x88b
ffff968f`1aeaf130 fffff807`4e29b991     : ffff968f`1aeaf2d0 ffffc201`00000000 00000260`00000002 01d000f0`00000000 : nt!MiWalkPageTables+0x36b
ffff968f`1aeaf230 fffff807`4e26baf0     : 00000000`00000001 ffff968f`00000000 ffffc201`d1a09550 ffffc201`d0b49080 : nt!MiDeletePagablePteRange+0x4f1
ffff968f`1aeaf540 fffff807`4e635833     : ffffc201`d0b49080 00000000`00000000 ffffc201`00000000 ffffc201`00000000 : nt!MiDeleteVad+0x360
ffff968f`1aeaf650 fffff807`4e633aef     : ffffc201`cd246a90 ffffc201`cd246a90 ffffc201`d2e9ef60 ffffc201`d1a09080 : nt!MiCleanVad+0x43
ffff968f`1aeaf680 fffff807`4e65dbd4     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc201`d1a09080 : nt!MmCleanProcessAddressSpace+0x137
ffff968f`1aeaf700 fffff807`4e706a96     : ffffc201`d1a09080 ffffd209`da818060 ffff968f`1aeaf950 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff968f`1aeaf790 fffff807`4e6d2918     : ffffc201`c0000374 00000000`00000001 ffff968f`1aeaf9a0 000000a0`8fbc6000 : nt!PspExitThread+0x5f6
ffff968f`1aeaf890 fffff807`4e267fb7     : 00000000`40bf0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff968f`1aeaf8d0 fffff807`4e3fa3e0     : 000000a0`904ffbb8 ffff968f`1aeaf980 ffff968f`1aeafb40 000000a0`00000000 : nt!KiDeliverApc+0x487
ffff968f`1aeaf980 fffff807`4e40785f     : ffffc201`d0b49080 00000000`00000000 ffff968f`1aeafad8 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff968f`1aeafac0 00007ffd`d0f4cda4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a0`904ffb88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d0f4cda4


SYMBOL_NAME:  nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  5b

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff80898841f854, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff801542681ed, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 36439

    Key  : Analysis.Init.CPU.mSec
    Value: 983

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11151

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffff80898841f854

BUGCHECK_P2: 2

BUGCHECK_P3: fffff801542681ed

BUGCHECK_P4: 2

READ_ADDRESS: fffff80154cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff80898841f854

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8089c841f550 -- (.trap 0xffff8089c841f550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff80898841f854
rdx=ffffba81ceb48150 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801542681ed rsp=ffff8089c841f6e0 rbp=ffff8089c841fa40
 r8=ffffba81ceb48150  r9=0000000000000000 r10=fffff80154cee700
r11=ffffba81ceb52150 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!IoRemoveIoCompletion+0x19d:
fffff801`542681ed 448931          mov     dword ptr [rcx],r14d ds:ffff8089`8841f854=????????
Resetting default scope

STACK_TEXT:
ffff8089`c841f2a8 fffff801`5441ecf1     : 00000000`00000050 ffff8089`8841f854 00000000`00000002 ffff8089`c841f550 : nt!KeBugCheckEx
ffff8089`c841f2b0 fffff801`5420c960     : 00000000`00000000 00000000`00000002 ffff8089`c841f5d0 00000000`00000000 : nt!MiSystemFault+0x1f44e1
ffff8089`c841f3b0 fffff801`54403f5e     : 00000000`00000000 00000000`00000000 ffffba81`c4b9a1c0 00000000`00000000 : nt!MmAccessFault+0x400
ffff8089`c841f550 fffff801`542681ed     : 00000000`00000000 00000000`00000000 ffff8089`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff8089`c841f6e0 fffff801`5462ce0e     : 00000000`00000000 00000000`00000000 ffffca8e`45800100 fffff801`5424caf2 : nt!IoRemoveIoCompletion+0x19d
ffff8089`c841f810 fffff801`544077b8     : 00000000`00000000 ffffca8e`5231c0e0 00000000`c000000d 00000000`00040086 : nt!NtRemoveIoCompletionEx+0xfe
ffff8089`c841f950 fffff801`543f9ca0     : fffff801`505ffba1 fffff801`54d27600 ffffba81`b75ec000 ffffba81`b75ec000 : nt!KiSystemServiceCopyEnd+0x28
ffff8089`c841fb58 fffff801`505ffba1     : fffff801`54d27600 ffffba81`b75ec000 ffffba81`b75ec000 00000000`00000000 : nt!KiServiceLinkage
ffff8089`c841fb60 fffff801`54317e85     : ffffba81`c4b9a080 fffff801`00000001 00000000`00000000 000fe067`b4bbbdff : msrpc!LrpcKernelBaseRoutine+0x51
ffff8089`c841fbd0 fffff801`543fd498     : fffff801`4f319180 ffffba81`c4b9a080 fffff801`54317e30 bf211031`90c1e05e : nt!PspSystemThreadStartup+0x55
ffff8089`c841fc20 00000000`00000000     : ffff8089`c8420000 ffff8089`c8419000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  msrpc!LrpcKernelBaseRoutine+51

MODULE_NAME: msrpc

IMAGE_NAME:  msrpc.sys

IMAGE_VERSION:  10.0.19041.985

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  AV_INVALID_msrpc!LrpcKernelBaseRoutine

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {40ccdb3e-a4e1-837e-10f4-4b425c8656c7}

Followup:     MachineOwner
---------

Ek olarak, sistemin Casper G900 olduğunu söylediniz fakat döküm dosyalarında anakart TUF B450M-Pro Gaming, işlemci R5 5600X olarak görünüyor. Bu nasıl olabiliyor?

Kod:
Machine ID Information [From Smbios 3.3, DMIVersion 0, Size=2641]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends Inc.
BiosVersion = 2602
BiosReleaseDate = 01/05/2021
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = TUF B450M-PRO GAMING
BaseBoardVersion = Rev X.0x

[CPU Information]
~MHz = REG_DWORD 3693
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 25 Model 33 Stepping 0
ProcessorNameString = REG_SZ AMD Ryzen 5 5600X 6-Core Processor          
Update Status = REG_DWORD 1
VendorIdentifier = REG_SZ AuthenticAMD
Gerçekten ben de anlamadım neden öyle gözüktüğünü. Casper şaşırtmıyor :D
 

Geri
Yukarı