i7 870 Sistem Mavi Ekran Hatası

İşletim sistemi
Windows 7

ilkeky

Hectopat
Katılım
14 Ekim 2019
Mesajlar
77
Çözümler
1
Öncelikle merhaba,
Bir süredir bilgisayarım açılırken ekran kararık bir şekilde açılma, açılırken donup kalma hatası alıyorum ayrıca açıldıktan sonrada donup kalma ve ani olarak mavi ekran hatası alıyorum. Çoğu kez sistem yeniden yüklemesi işlemi yaptım hiçbir şekilde çözülmedi. Donma olmasa bile bu aralar mavi ekran çok arttı, hatanın sebebinin ne olduğunu öğrenmeme yardımcı olursanız sevınırım.

Intel(r)Core(tm) i7 CPU 870 @2.93 GHz
6 GB RAM
GeForce GT 330

Ayrıca bugün sag altta görüntü sunucusu yanıt vermeyı kesti ve bu durumdan kurtuldu NVIDIA Windows kernel mode driver Version 342.01 görüntü sürücüsü yanıt vermeyı ve başarıyla bu durumdan kurtuldu hatası ile ekranın üstüne de NVIDIA OpenGL DRIVER the NVIDIA OpenGL driver detected a problem with the display drivers and unable to countinie The application must close error code 2 would like to visit -NVIDIA Support site- hatası aldım, emülatordan oyun oynarken aldım hatayı.

MINIDUMP:
 
Son düzenleyen: Moderatör:
Ekran kartında sorun olabilir. Tamir ettirmen gerek.
Sistemde virüs olma ihtimalide var.
Sorun %50 ihtimalle virüs %30 ihtimalle ekran kartından kaynaklı %20 diğer.Net bir şey söylemek zor olduğu için işin uzmanına götür bilgisayarı.
 
Son düzenleme:
Ekran kartında sorun olabilir. Tamir ettirmen gerek.
Sistemde virüs olma ihtimalide var.
Sorun %50 ihtimalle virüs %30 ihtimalle ekran kartından kaynaklı %20 diğer.Net bir şey söylemek zor olduğu için işin uzmanına götür bilgismn

Cevabın için teşekkürler. Minidumpları inceledıniz mi? Bu 2 ihtimal dışında başka bir ihtimal olamaz mı?
 
Windows 7 yerine Windows 8.1 gibi daha güncel alternatifler kullanmanızı öneririm. Yok, ben geçemem derseniz en azından Service Pack 1'e geçin.

Neyse, sorununuza geçelim.
  • MemTest86 yapın.
  • GT330 oldukça eski bir GPU. Artık ömrünü doldurmaya yaklaşmıştır diye düşünüyorum ki bazı mavi ekranlarınız bundan kaynaklı.
  • Komut ekranını yönetici olarak çalıştırın ve sfc /scannow komutunu uygulayın.
    • Tarama bittiğinde sonucun ekran görüntüsünü paylaşın.
  • Klavye ve fare dışındaki bağlı USB cihazlarınızı şimdilik çıkarın.
  • Tencent yazılımlarını ve kullanıyorsanız yüklü emülatörleri kaldırın.
  • Ağ ve ses sürücülerinizi güncelleyin.
    • Acer'in sitesinde paylaşılan ses sürücüsü: Buradan
    • Acer'in sitesinde paylaşılan ağ sürücüsü: Buradan
    • Acer'in sitesinde paylaşılan kablosuz ağ sürücüsü: Buradan
İşlemleri yaptıktan sonra geri dönüş yapmayı unutmayın.

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff800032d39a6, The address that the exception occurred at
Arg3: fffff8800377e5c8, Exception Record Address
Arg4: fffff8800377de30, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3437

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13245

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000096

BUGCHECK_P2: fffff800032d39a6

BUGCHECK_P3: fffff8800377e5c8

BUGCHECK_P4: fffff8800377de30

EXCEPTION_RECORD:  fffff8800377e5c8 -- (.exr 0xfffff8800377e5c8)
ExceptionAddress: fffff800032d39a6 (nt!SwapContext_PatchXSave+0x00000000000000a3)
   ExceptionCode: c0000096
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  fffff8800377de30 -- (.cxr 0xfffff8800377de30)
rax=0000000000000000 rbx=fffff880031d5180 rcx=0000000000000008
rdx=fffffa8006632338 rsi=fffffa80055d1040 rdi=fffff880031e00c0
rip=fffff800032d39a6 rsp=fffff8800377e800 rbp=0000000000000000
r8=fffffa80054eb0d8  r9=0000000000000000 r10=fffffffffffffff7
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=fffffa80054eb050 r15=fffff880031da040
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!SwapContext_PatchXSave+0xa3:
fffff800`032d39a6 0f22da          mov     cr3,rdx
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

ERROR_CODE: (NTSTATUS) 0xc0000096 - { ZEL DURUM}  Ayr cal kl  y nerge.

EXCEPTION_CODE_STR:  c0000096

EXCEPTION_STR:  0xc0000096

STACK_TEXT:
fffff880`0377e800 fffff800`032d35da     : 00000000`00000000 00000000`00000001 fffffa80`054aa9ae 00000000`00000013 : nt!SwapContext_PatchXSave+0xa3
fffff880`0377e840 fffff800`032d4992     : fffffa80`09e2a840 fffffa80`055d1040 fffff8a0`00000000 fffff880`0377ec50 : nt!KiSwapContext+0x7a
fffff880`0377e980 fffff800`032d0d4b     : 00000000`00000013 fffff880`03164180 00000000`00000000 fffffa80`055b0520 : nt!KiCommitThreadWait+0x1d2
fffff880`0377ea10 fffff800`035bf3d2     : fffffa80`00000002 fffff880`0377ed00 00000000`00000001 00000000`00000000 : nt!KeWaitForMultipleObjects+0x271
fffff880`0377ecc0 fffff800`03571c06     : 00000000`00000000 fffffa80`055d1040 00000000`00000080 fffffa80`054eb040 : nt!EtwpLogger+0xf2
fffff880`0377ed40 fffff800`032abc26     : fffff880`009b2180 fffffa80`055d1040 fffffa80`0551bb60 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0377ed80 00000000`00000000     : fffff880`0377f000 fffff880`03779000 fffff880`0377e800 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_NAME:  nt!SwapContext_PatchXSave+a3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .cxr 0xfffff8800377de30 ; kb

FAILURE_BUCKET_ID:  0x7E_nt!SwapContext_PatchXSave+a3

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {2e237204-f538-8b01-5da8-6886821ee0a7}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000005bee1, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000005a6e0, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9936

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 5bee1

BUGCHECK_P3: 2

BUGCHECK_P4: 5a6e0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  discord.exe

STACK_TEXT:
fffff880`042cdf28 fffff800`0330938c     : 00000000`0000004e 00000000`00000099 00000000`0005bee1 00000000`00000002 : nt!KeBugCheckEx
fffff880`042cdf30 fffff800`032eb9ee     : 00000000`00000000 fffff680`000c00a8 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`042cdf70 fffff800`0324dc23     : fffffa80`0b33b7e0 fffff700`00015af8 0000007f`fffffff8 fffff8a0`0426a1c8 : nt! ?? ::FNODOBFM::`string'+0x32235
fffff880`042ce000 fffff800`0324c68a     : fffffa80`0b33b7e0 fffffa80`00000000 fffff8a0`0000d5f2 fffff880`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`042ce8b0 fffff800`0355edcf     : fffff8a0`0b6ec060 fffff880`042cec20 00000000`00000000 fffffa80`0ad03b60 : nt!MmCleanProcessAddressSpace+0x96
fffff880`042ce900 fffff800`03537635     : 00000000`c0000005 00000000`00000001 00000000`fffd8000 fffffa80`065e9060 : nt!PspExitThread+0x92f
fffff880`042ce9c0 fffff800`032561db     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`042ce9f0 fffff800`03256620     : 00000000`00000000 fffff880`042cea70 fffff800`0353774c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`042cea70 fffff800`03278a37     : fffffa80`0ad03b60 00000000`00d3ea18 fffff880`042cebc8 fffff800`035980ab : nt!KiInitiateUserApc+0x70
fffff880`042cebb0 00000000`753c2dd9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`00d3e9f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x753c2dd9


SYMBOL_NAME:  nt!MiBadShareCount+4c

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount+4c

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {bd4c3693-97a2-d6a1-0022-bdd048edc641}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff680001d9728
Arg3: 8e90000050c84867
Arg4: fffffa8006207e40

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8205

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41201

BUGCHECK_P2: fffff680001d9728

BUGCHECK_P3: 8e90000050c84867

BUGCHECK_P4: fffffa8006207e40

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LeagueClientUx

STACK_TEXT:
fffff880`0833c9b8 fffff800`032e6b3e     : 00000000`0000001a 00000000`00041201 fffff680`001d9728 8e900000`50c84867 : nt!KeBugCheckEx
fffff880`0833c9c0 fffff800`03256b6e     : ffffffff`00000000 00000000`00000000 fffffa80`0b535630 8e900000`50c84867 : nt! ?? ::FNODOBFM::`string'+0x13bb2
fffff880`0833ca00 fffff800`0325680a     : fffffa80`06207e40 fffffa80`0b345b30 fffffa80`0b345b30 00000000`3b2e5000 : nt!MiQueryAddressState+0x2ae
fffff880`0833ca50 fffff800`0356fc38     : fffff880`00000004 00000000`3b2e6000 fffffa80`06207e40 fffff680`00000000 : nt!MiQueryAddressSpan+0xaa
fffff880`0833cac0 fffff800`03287993     : 00000000`00000140 fffffa80`0a9edb60 00000000`00000000 00000000`00e4e148 : nt!NtQueryVirtualMemory+0x386
fffff880`0833cbb0 00000000`7705ff8a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00e4e128 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7705ff8a


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+13bb2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {1474ad10-d483-4966-a41d-ea271394ede8}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000121528, page frame number
Arg3: 0000000000000003, current page state
Arg4: 0000000000191fd8, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3577

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15611

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 121528

BUGCHECK_P3: 3

BUGCHECK_P4: 191fd8

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff880`0357daa8 fffff800`0330738c     : 00000000`0000004e 00000000`00000099 00000000`00121528 00000000`00000003 : nt!KeBugCheckEx
fffff880`0357dab0 fffff800`0321037c     : b1100001`21528963 fffffa80`0363f780 00000000`00000000 fffff800`03403b40 : nt!MiBadShareCount+0x4c
fffff880`0357daf0 fffff800`0326cd49     : 00000000`00000000 00000000`0000070f 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x47857
fffff880`0357dc50 fffff800`033a834f     : fffff8a0`00000001 00000000`0000036f 00000000`00001b71 00000000`00000000 : nt!MiFreePagedPoolPages+0x129
fffff880`0357dda0 fffff800`033ac87c     : 00000000`00000000 fffff880`0357df70 fffff880`0357dee0 00000000`00000001 : nt!MiFreePoolPages+0x343
fffff880`0357deb0 fffff800`034fffc4     : 00000000`00000000 00000000`00000007 fffff880`20204d43 00000000`00000001 : nt!ExFreePoolWithTag+0x7cc
fffff880`0357df60 fffff800`034fbb43     : fffff8a0`00002000 fffff880`01b71000 fffff8a0`00000000 00000000`01b71000 : nt!HvpReadFileImageAndBuildMap+0x1b4
fffff880`0357e010 fffff800`034fb772     : 00000000`01b80000 fffff8a0`05eb0000 01d64fe9`f198c4f8 fffff8a0`05ba11f0 : nt!HvLoadHive+0xd7
fffff880`0357e070 fffff800`034f81f2     : 00000000`00000000 00000000`00000002 fffff8a0`05ba1d98 00000000`00000001 : nt!HvInitializeHive+0x262
fffff880`0357e0d0 fffff800`034f8d89     : fffff880`0357e270 fffff880`0357e340 ffffffff`80000934 fffff880`0357e778 : nt!CmpInitializeHive+0x4a6
fffff880`0357e1c0 fffff800`034fbc5a     : 00000000`00000010 fffffa80`00000000 fffff880`0357e528 fffff880`0357e521 : nt!CmpInitHiveFromFile+0x249
fffff880`0357e2e0 fffff800`034fe5d7     : 00000000`00000010 00000000`00000000 00000000`00000000 fffff800`0358d837 : nt!CmpCmdHiveOpen+0x8a
fffff880`0357e4d0 fffff800`034fa32b     : fffff880`03570064 00000000`00000000 00000000`00000000 fffff880`0357eb00 : nt!CmLoadKey+0x1a7
fffff880`0357e6c0 fffff800`03276993     : 00000000`00000001 fffff880`0357ebb0 fffff880`00000010 00000000`00000000 : nt!NtLoadKeyEx+0x4c5
fffff880`0357e920 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13


SYMBOL_NAME:  nt!MiBadShareCount+4c

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount+4c

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {bd4c3693-97a2-d6a1-0022-bdd048edc641}

Followup:     MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800032f9948

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4031

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11187

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: 80050031

BUGCHECK_P3: 6f8

BUGCHECK_P4: fffff800032f9948

TRAP_FRAME:  fffff8800c635f60 -- (.trap 0xfffff8800c635f60)
Unable to read trap frame at fffff880`0c635f60

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_OVERFLOW: Stack Limit: fffff8800c635000. Use (kF) and (!stackusage) to investigate stack usage.

STACK_TEXT:
fffff880`031dbde8 fffff800`032beca9     : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`031dbdf0 fffff800`032bd172     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031dbf30 fffff800`032f9948     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0c634c10 fffff800`032bed82     : fffff880`0c6353d8 fffff880`0c635680 fffff880`0c635480 fffff880`0c635f00 : nt!KiDispatchException+0xc8
fffff880`0c6352a0 fffff800`032bcedf     : fffff880`0c635480 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0c635480 fffff800`03294730     : fffff880`0c635680 00000000`00000001 fffff880`0c635680 fffff880`0c635f00 : nt!KiInvalidOpcodeFault+0x11f
fffff880`0c635610 fffff800`032f9e7f     : fffff880`0c635eb8 00000000`00000000 00000000`000000ea 00000000`00000000 : nt!KiOpDecode+0x78
fffff880`0c635660 fffff800`032f99a6     : fffff880`0c635eb8 fffff880`0c635f60 fffff880`0c635f60 fffff880`0c636200 : nt!KiPreprocessFault+0x53
fffff880`0c6356f0 fffff800`032bed82     : fffff880`0c635eb8 fffff880`0c636160 fffff880`0c635f60 fffff880`0c636a00 : nt!KiDispatchException+0x126
fffff880`0c635d80 fffff800`032bcedf     : fffff880`0c635f60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0c635f60 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f


SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort+b2

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {43e97fc4-2165-caa7-6b75-f11934c98858}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15976

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88003321950 -- (.trap 0xfffff88003321950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008e3c528 rbx=0000000000000000 rcx=fffff880032f9180
rdx=fffffa8008e3c52a rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccd8 rsp=fffff88003321ae0 rbp=0000000000000002
r8=0000000000000100  r9=0000000000000000 r10=fffffa8008e3c52a
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`032dccd8 f0480fba6b4000  lock bts qword ptr [rbx+40h],0 ds:00000000`00000040=????????????????
Resetting default scope

STACK_TEXT:
fffff880`03320998 fffff800`032d046e     : 00000000`00000000 00000000`00000000 fffff880`03321110 fffff800`03305668 : nt!KeBugCheck
fffff880`033209a0 fffff800`032fe40d     : fffff800`034e6b7c fffff800`03420e84 fffff800`03268000 fffff880`033218a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`033209d0 fffff800`03305a90     : fffff800`03427b14 fffff880`03320a48 fffff880`033218a8 fffff800`03268000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`03320a00 fffff800`033129ef     : fffff880`033218a8 fffff880`03321110 fffff880`00000000 fffff880`00000004 : nt!RtlDispatchException+0x410
fffff880`033210e0 fffff800`032d7d82     : fffff880`033218a8 0000ffff`ffff0000 fffff880`03321950 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`03321770 fffff800`032d668a     : 00000000`00000000 fffffa80`0a1fb000 fffffa80`0a1fbb10 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`03321950 fffff800`032dccd8     : fffff880`032fe040 00000000`00000022 00000000`00000000 fffff880`1016451e : nt!KiGeneralProtectionFault+0x10a
fffff880`03321ae0 fffff800`032dcb14     : fffffa80`08e3c520 00000000`00000002 00000000`00000000 fffff880`032f9180 : nt!KiTryUnwaitThread+0x28
fffff880`03321b40 fffff880`10164272     : 00000000`00000000 fffff880`00000000 fffffa80`08e27000 c528ffff`fa8008e3 : nt!KeSetEvent+0x484
fffff880`03321bb0 00000000`00000000     : fffff880`00000000 fffffa80`08e27000 c528ffff`fa8008e3 fffff880`032fe040 : nvlddmkm+0xcf272


SYMBOL_NAME:  nvlddmkm+cf272

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1E_nvlddmkm+cf272

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {c5211243-eafc-e572-33ca-7ee97bbd4b4d}

Followup:     MachineOwner
---------

CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050830
Arg2: fffff8800334d768
Arg3: fffff8800334cfd0
Arg4: fffff800032e0137

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullPtr

    Key  : AV.Fault
    Value: Unknown

    Key  : Analysis.CPU.mSec
    Value: 3374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12760

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  34

BUGCHECK_P1: 50830

BUGCHECK_P2: fffff8800334d768

BUGCHECK_P3: fffff8800334cfd0

BUGCHECK_P4: fffff800032e0137

EXCEPTION_RECORD:  fffff8800334d768 -- (.exr 0xfffff8800334d768)
ExceptionAddress: fffff800032e0137 (nt!CcGetVirtualAddress+0x0000000000000047)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: ffffffffffffffff
   Parameter[1]: 0000000000000000
Attempt to unknown address 0000000000000000

CONTEXT:  fffff8800334cfd0 -- (.cxr 0xfffff8800334cfd0)
rax=0000000000ec0000 rbx=0000000000ec1000 rcx=0000000000001000
rdx=0000000000ec1000 rsi=0000000000000001 rdi=0000000000000000
rip=fffff800032e0137 rsp=fffff8800334d9a0 rbp=0000fffffa800a49
r8=fffff8800334dad0  r9=fffff8800334dae0 r10=fffff80003251000
r11=fffff8800334dac8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000001000
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!CcGetVirtualAddress+0x47:
fffff800`032e0137 8b8598000000    mov     eax,dword ptr [rbp+98h] ss:0018:0000ffff`fa800ae1=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  ffffffffffffffff

EXCEPTION_PARAMETER2:  0000000000000000

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`0334d9a0 fffff800`035260a8     : 00000000`00ec0000 00000000`00ec1000 fffff880`0334dad0 fffff880`0334dae0 : nt!CcGetVirtualAddress+0x47
fffff880`0334da30 fffff800`03273b2c     : 00000000`00000000 00000000`00ec1000 00000000`00ec1000 fffff800`03466501 : nt!CcMapAndCopyFromCache+0x80
fffff880`0334dad0 fffff800`032b5576     : fffffa80`0a49d820 fffffa80`05525000 fffff880`00000005 fffff880`02c03734 : nt!CcPerformReadAhead+0x3b8
fffff880`0334dc00 fffff800`032ce961     : fffffa80`0552b550 fffff880`016d0970 fffff800`034c8150 fffffa80`00000003 : nt!CcWorkerThread+0x21e
fffff880`0334dcb0 fffff800`03565c06     : bfffbfff`fd3dfd3d fffffa80`05525040 00000000`00000080 fffffa80`0550d040 : nt!ExpWorkerThread+0x111
fffff880`0334dd40 fffff800`0329fc26     : fffff880`0316a180 fffffa80`05525040 fffff880`031750c0 58995891`3b5f3b5f : nt!PspSystemThreadStartup+0x5a
fffff880`0334dd80 00000000`00000000     : fffff880`0334e000 fffff880`03348000 fffff880`0334d6e0 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_NAME:  nt!CcGetVirtualAddress+47

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .cxr 0xfffff8800334cfd0 ; kb

FAILURE_BUCKET_ID:  0x34_nt!CcGetVirtualAddress+47

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {f8f5a772-2f9b-1422-cec0-2b5b00e15860}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000001b1da8, page frame number
Arg3: 0000000000000002, current page state
Arg4: 00000000001b1d27, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5400

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 1b1da8

BUGCHECK_P3: 2

BUGCHECK_P4: 1b1d27

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff880`009a8488 fffff800`0335638c     : 00000000`0000004e 00000000`00000099 00000000`001b1da8 00000000`00000002 : nt!KeBugCheckEx
fffff880`009a8490 fffff800`0325f373     : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000e70 : nt!MiBadShareCount+0x4c
fffff880`009a84d0 fffff800`032bbd49     : 00000000`00000000 00000000`00000089 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4784e
fffff880`009a8630 fffff800`033f734f     : fffff8a0`0091eda2 00000000`00000000 fffff8a0`0091eda2 00000000`00000000 : nt!MiFreePagedPoolPages+0x129
fffff880`009a8780 fffff800`033fb87c     : 00000000`00000000 fffff880`009a8950 fffff880`009a88c0 fffff8a0`00000001 : nt!MiFreePoolPages+0x343
fffff880`009a8890 fffff880`00d1d01f     : 00000000`00620000 fffff8a0`0021e5c0 fffff8a0`72634943 fffff8a0`00000001 : nt!ExFreePoolWithTag+0x7cc
fffff880`009a8940 fffff880`00d1a340     : 00000000`00536261 00000000`00120989 00000000`00620000 ffffffff`80000178 : CI!I_LoadCatalogCache+0x43f
fffff880`009a8a20 fffff880`00d189cd     : fffff880`009a8c70 ffffffff`00000001 00000000`00000000 fffff880`00000000 : CI!I_FindFileOrHeaderHashInCatalogs+0x64
fffff880`009a8ac0 fffff880`00d19381     : fffffa80`0655af20 fffff880`009a8c70 00000000`00008004 00000000`00000000 : CI!CipFindFileHash+0xf9
fffff880`009a8b90 fffff880`00d17fbb     : 00000000`00000001 fffff880`009a8e50 fffff880`009a8e50 00000000`00000000 : CI!CipValidateFileHash+0x311
fffff880`009a8d00 fffff800`0353168e     : 00000000`0000002a 00000000`000fffff fffffa80`0655af20 00000000`00000000 : CI!CiValidateImageHeader+0x213
fffff880`009a8de0 fffff800`0353157c     : 00000000`00000001 00000000`01000000 fffffa80`0655fbf0 00000000`00000000 : nt!SeValidateImageHeader+0x2e
fffff880`009a8e20 fffff800`035c1d95     : fffffa80`0655af20 fffffa80`0655fbf0 00000000`00000001 00000000`0000002a : nt!MiValidateImageHeader+0xa4
fffff880`009a8ee0 fffff800`035b7013     : fffff880`009a9140 00000000`00000000 fffff880`009a93f8 00000000`00000001 : nt!MmCreateSection+0x8c9
fffff880`009a90f0 fffff800`032c5993     : fffffa80`05505b60 fffff880`009a9398 fffff880`009a9188 00000000`00000000 : nt!NtCreateSection+0x162
fffff880`009a9170 fffff800`032c1f30     : fffff800`0369f8b6 00000000`00000000 fffff800`035b925b 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x13
fffff880`009a9378 fffff800`0369f8b6     : 00000000`00000000 fffff800`035b925b 00000000`00000001 fffffa80`0558f0a8 : nt!KiServiceLinkage
fffff880`009a9380 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCheckSystemImage+0x96


SYMBOL_NAME:  nt!MiBadShareCount+4c

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount+4c

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {bd4c3693-97a2-d6a1-0022-bdd048edc641}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000848, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000328f891, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3405

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10826

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 848

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000328f891

READ_ADDRESS: fffff80003402030: Unable to get Flags value from nt!KdVersionBlock
fffff80003402030: Unable to get Flags value from nt!KdVersionBlock
fffff80003402030: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034c1280
GetUlongPtrFromAddress: unable to read from fffff800034c1408
0000000000000848

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  wmpnetwk.exe

TRAP_FRAME:  fffff88008e45940 -- (.trap 0xfffff88008e45940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff980073f2800 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000004a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000358f981 rsp=fffff88008e45ad0 rbp=0000000000000000
r8=0000000000000012  r9=0000000000000000 r10=00000000fffffff9
r11=00000000012b2800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!CcMapData+0x111:
fffff800`0358f981 0fb600          movzx   eax,byte ptr [rax] ds:fffff980`073f2800=??
Resetting default scope

STACK_TEXT:
fffff880`08e44ad8 fffff800`03288ca9     : 00000000`0000000a 00000000`00000848 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08e44ae0 fffff800`03287920     : fffffa80`064b98e0 fffff880`0336a180 fffffa80`064b9a30 fffffa80`0af1a760 : nt!KiBugCheckDispatch+0x69
fffff880`08e44c20 fffff800`0328f891     : 00000000`24630160 fffff880`0336a180 fffff880`08e46db0 fffffa80`0ae6f750 : nt!KiPageFault+0x260
fffff880`08e44db0 fffff800`0328f5da     : fffffa80`0ad16500 fffffa80`05536c68 fffffa00`06000000 fffffa80`063d5000 : nt!SwapContext+0x11
fffff880`08e44df0 fffff800`03290992     : 00000000`0000d2b2 fffffa80`0ae6f750 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x7a
fffff880`08e44f30 fffff800`03292cff     : fffff880`08e45400 fffffa80`06663040 00000000`00000000 fffff880`08e45160 : nt!KiCommitThreadWait+0x1d2
fffff880`08e44fc0 fffff880`01466ddf     : fffffa80`09998800 00000000`00000000 fffffa80`0666c900 00000000`00100000 : nt!KeWaitForSingleObject+0x19f
fffff880`08e45060 fffff880`0146a2a6     : fffff880`08e45400 fffffa80`0af1a760 fffffa80`0666c940 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x23f
fffff880`08e45230 fffff880`0146ccf8     : fffff880`08e45400 fffffa80`0af1a760 fffff880`08e45501 fffffa80`0ae5b701 : Ntfs!NtfsCommonRead+0x7a6
fffff880`08e453d0 fffff880`012f623f     : fffffa80`0af1aab8 fffffa80`0af1a760 fffffa80`0ae5b700 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`08e455d0 fffff880`012f46df     : fffffa80`0650b8e0 fffffa80`0af1a760 fffffa80`0650b800 fffffa80`0af1a760 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`08e45660 fffff800`0327b1f2     : fffffa80`0af1a780 fffffa80`064e6d50 00000000`00000043 fffff880`0336a180 : fltmgr!FltpDispatch+0xcf
fffff880`08e456c0 fffff800`0327b4f5     : 00000000`00000000 00000000`00000000 fffff880`08e45780 fffff880`08e45a00 : nt!IoPageRead+0x252
fffff880`08e45750 fffff800`032a45c4     : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff8a0`056c581c : nt!MiIssueHardFault+0x255
fffff880`08e457e0 fffff800`0328782e     : 00000000`00000000 00000000`0000000e fffff880`08e45a00 fffff880`08e35000 : nt!MmAccessFault+0x11c4
fffff880`08e45940 fffff800`0358f981     : 00000000`0d280000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`08e45ad0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcMapData+0x111


SYMBOL_NAME:  nt!SwapContext+11

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_nt!SwapContext+11

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {c6b29b49-93ff-d874-338e-3b9ad6f06c3e}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800035ff6c8, Address of the instruction which caused the bugcheck
Arg3: fffff8800943ed70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9547

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800035ff6c8

BUGCHECK_P3: fffff8800943ed70

BUGCHECK_P4: 0

CONTEXT:  fffff8800943ed70 -- (.cxr 0xfffff8800943ed70)
rax=0000000000000001 rbx=000000000000030c rcx=00000000bad0b0b0
rdx=fffff880096891a0 rsi=fffff8a00ae08c30 rdi=000000000017fffc
rip=fffff800035ff6c8 rsp=fffff8800943f748 rbp=fffff8a005f91a40
r8=fffff8a00ae08c30  r9=fffffa80058ea1a0 r10=0000000000089168
r11=fffff8800943f7d8 r12=0000000000000000 r13=0000000000000000
r14=fffff88009600050 r15=fffff8800943f808
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ObpCaptureHandleInformation+0x68:
fffff800`035ff6c8 8a4128          mov     al,byte ptr [rcx+28h] ds:002b:00000000`bad0b0d8=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

STACK_TEXT:
fffff880`0943f748 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x68


SYMBOL_NAME:  nt!ObpCaptureHandleInformation+68

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .cxr 0xfffff8800943ed70 ; kb

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation+68

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {e9dd6ba9-ffe2-5fbf-fd6a-1397e8d0c970}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88010da6e8b, The address that the exception occurred at
Arg3: fffff88005fdb7f8, Exception Record Address
Arg4: fffff88005fdb060, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 3327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6937

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88010da6e8b

BUGCHECK_P3: fffff88005fdb7f8

BUGCHECK_P4: fffff88005fdb060

EXCEPTION_RECORD:  fffff88005fdb7f8 -- (.exr 0xfffff88005fdb7f8)
ExceptionAddress: fffff88010da6e8b
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 00000000000009a4
Attempt to write to address 00000000000009a4

CONTEXT:  fffff88005fdb060 -- (.cxr 0xfffff88005fdb060)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=fffffa8005525410 rsi=fffff88010cc5a08 rdi=0000000000000000
rip=fffff88010da6e8b rsp=fffff88005fdba30 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000000 r10=0000000300000000
r11=fffffa8009e97b58 r12=fffffa8009e97ab0 r13=0000000000000000
r14=0000000000000000 r15=fffffa8005525410
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
fffff880`10da6e8b 41ff84c6a4090000 inc     dword ptr [r14+rax*8+9A4h] ds:002b:00000000`000009a4=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

WRITE_ADDRESS: fffff80003436030: Unable to get Flags value from nt!KdVersionBlock
fffff80003436030: Unable to get Flags value from nt!KdVersionBlock
fffff80003436030: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034f5280
GetUlongPtrFromAddress: unable to read from fffff800034f5408
00000000000009a4

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  00000000000009a4

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`05fdba30 00000000`00000000     : fffffa80`09e97d50 fffffa80`09e97f60 fffffa80`09e97f70 00000000`00000000 : 0xfffff880`10da6e8b


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7E_ANALYSIS_INCONCLUSIVE

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {bb075b51-72d5-b6eb-6178-dfd463a01bab}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 000000000014de5e, page frame number
Arg3: 0000000000000002, current share count
Arg4: 0000000000000000, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3406

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11658

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 7

BUGCHECK_P2: 14de5e

BUGCHECK_P3: 2

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff880`03554988 fffff800`03303668     : 00000000`0000004e 00000000`00000007 00000000`0014de5e 00000000`00000002 : nt!KeBugCheckEx
fffff880`03554990 fffff800`03235dd4     : fffffa80`0a955010 00000000`00000000 00000000`00000000 fffffa80`05503b60 : nt! ?? ::FNODOBFM::`string'+0x35195
fffff880`03554a70 fffff800`03235b7a     : 00000000`00000000 00000000`00000000 fffff800`034335a0 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x54
fffff880`03554aa0 fffff800`03240ab5     : fffffa80`05503b60 00000000`00850000 00000000`00850000 fffff800`034335a0 : nt!MmWaitForCacheManagerPrefetch+0x1e
fffff880`03554ad0 fffff800`03282576     : fffffa80`0a815070 fffffa80`05503b00 fffff880`00000005 fffff880`00e03734 : nt!CcPerformReadAhead+0x341
fffff880`03554c00 fffff800`0329b961     : fffffa80`05509800 fffff800`03282358 fffff800`03495150 fffffa80`00000002 : nt!CcWorkerThread+0x21e
fffff880`03554cb0 fffff800`03532c06     : 00000000`00000000 fffffa80`05503b60 00000000`00000080 fffffa80`054eb040 : nt!ExpWorkerThread+0x111
fffff880`03554d40 fffff800`0326cc26     : fffff880`0336a180 fffffa80`05503b60 fffff880`033750c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03554d80 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+35195

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x4E_7_nt!_??_::FNODOBFM::_string_+35195

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {38a1ce09-6d18-8c39-ab74-c449b974411c}

Followup:     MachineOwner
---------

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880029cabd8
Arg3: fffff880029ca440
Arg4: fffff880014f3d07

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 3280

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9134

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  24

BUGCHECK_P1: 1904fb

BUGCHECK_P2: fffff880029cabd8

BUGCHECK_P3: fffff880029ca440

BUGCHECK_P4: fffff880014f3d07

EXCEPTION_RECORD:  fffff880029cabd8 -- (.exr 0xfffff880029cabd8)
ExceptionAddress: fffff880014f3d07 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880029ca440 -- (.cxr 0xfffff880029ca440)
rax=fffff8a0002bf000 rbx=54f8fffff8a00291 rcx=00000000000001fe
rdx=0000000000000002 rsi=fffff8a0001f53f0 rdi=fffffa8006665358
rip=fffff880014f3d07 rsp=fffff880029cae10 rbp=0000000000000000
r8=000000002f2f20ff  r9=0000000000000000 r10=0000000000000000
r11=fffff880029cae58 r12=fffff880029cb120 r13=fffff880029cb3c0
r14=00000000000000ff r15=00000000000000ff
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
Ntfs!NtfsFindPrefixHashEntry+0x1fe:
fffff880`014f3d07 44394310        cmp     dword ptr [rbx+10h],r8d ds:002b:54f8ffff`f8a002a1=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

READ_ADDRESS: fffff80003446030: Unable to get Flags value from nt!KdVersionBlock
fffff80003446030: Unable to get Flags value from nt!KdVersionBlock
fffff80003446030: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003505280
GetUlongPtrFromAddress: unable to read from fffff80003505408
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`029cae10 fffff880`014f4dc2     : fffffa80`09e879b0 fffffa80`06665358 fffff8a0`001f53f0 fffff8a0`0058d901 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
fffff880`029caf40 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFindStartingNode+0x452


SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+1fe

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  6.1.7600.16592

STACK_COMMAND:  .cxr 0xfffff880029ca440 ; kb

FAILURE_BUCKET_ID:  0x24_Ntfs!NtfsFindPrefixHashEntry+1fe

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {3acf7f82-c807-3dfd-24ba-b27b5732af94}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: fffffa8004834da0
Arg3: fffffa8000712d70
Arg4: 0000000000000205

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2655

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8358

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 8886

BUGCHECK_P2: fffffa8004834da0

BUGCHECK_P3: fffffa8000712d70

BUGCHECK_P4: 205

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff880`0c341448 fffff800`032998c8     : 00000000`0000001a 00000000`00008886 fffffa80`04834da0 fffffa80`00712d70 : nt!KeBugCheckEx
fffff880`0c341450 fffff800`03295535     : 00000000`00010000 00000001`00000000 fffff880`00010000 fffff880`0c341540 : nt!MiUnlinkPageFromLockedList+0x298
fffff880`0c3414e0 fffff800`032bccae     : fffff980`26f80000 00000000`000c0000 fffff8a0`00000000 fffffa80`0a6184e0 : nt!MmCheckCachedPageStates+0x295
fffff880`0c341690 fffff800`0359595b     : 00000000`06c40000 00000000`06c40000 fffffa80`06043f20 00000000`014a0040 : nt!CcFetchDataForRead+0x10e
fffff880`0c3416f0 fffff880`014e3d28     : fffff880`00000000 00000000`00000005 fffffa80`00040000 fffffa80`00100001 : nt!CcCopyRead+0x16b
fffff880`0c3417b0 fffff880`012fc0c8     : fffffa80`06043f20 fffffa80`0a618478 fffffa80`06043f70 fffffa80`06043f01 : Ntfs!NtfsCopyReadA+0x1a8
fffff880`0c341980 fffff880`012ffc2a     : fffff880`0c341a50 00000000`01460003 00000000`01460000 fffffa80`06043f00 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`0c3419e0 fffff880`0131d5f0     : fffffa80`06043f20 00000000`00000000 fffff880`0c341b40 00000000`00100000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`0c341a20 fffff800`03596289     : fffffa80`06043f20 fffffa80`00000001 fffffa80`055188a0 fffffa80`06043f20 : fltmgr!FltpFastIoRead+0x1d0
fffff880`0c341ac0 fffff800`03277993     : 00000000`0000044e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`0c341bb0 00000000`7766fdba     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0082f348 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7766fdba


SYMBOL_NAME:  nt!MiUnlinkPageFromLockedList+298

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromLockedList+298

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b1b1a587-09e6-2888-4a0d-0520303f2ff3}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff880059f8cb0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004a3345c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4871

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7_gdr

    Key  : WER.OS.Timestamp
    Value: 2010-06-18T16:21:00Z

    Key  : WER.OS.Version
    Value: 7.0.7600.16617


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff880059f8cb0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff88004a3345c

BUGCHECK_P4: 0

READ_ADDRESS: fffff80003404030: Unable to get Flags value from nt!KdVersionBlock
fffff80003404030: Unable to get Flags value from nt!KdVersionBlock
fffff80003404030: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034c3280
GetUlongPtrFromAddress: unable to read from fffff800034c3408
fffff880059f8cb0

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880059f7a70 -- (.trap 0xfffff880059f7a70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800ae6cda0 rbx=0000000000000000 rcx=fffffa800ae6cdf8
rdx=fffffa800ae6ccf0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004a3345c rsp=fffff880059f7c00 rbp=fffffa800a28a070
r8=0000000000000000  r9=0000000000000000 r10=fffffa80062fdf80
r11=fffffa800ae6ce40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffff880`04a3345c 8b8424b0100000  mov     eax,dword ptr [rsp+10B0h] ss:0018:fffff880`059f8cb0=????????
Resetting default scope

STACK_TEXT:
fffff880`059f7908 fffff800`0330bf14     : 00000000`00000050 fffff880`059f8cb0 00000000`00000000 fffff880`059f7a70 : nt!KeBugCheckEx
fffff880`059f7910 fffff800`0328982e     : 00000000`00000000 00000000`000900bb 00000000`00002700 00000000`00000058 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`059f7a70 fffff880`04a3345c     : fffffa80`0ae6ccf0 00000000`000900bb fffffa80`0a28a0a8 00010000`00001946 : nt!KiPageFault+0x16e
fffff880`059f7c00 fffffa80`0ae6ccf0     : 00000000`000900bb fffffa80`0a28a0a8 00010000`00001946 fffff880`059f7c00 : 0xfffff880`04a3345c
fffff880`059f7c08 00000000`000900bb     : fffffa80`0a28a0a8 00010000`00001946 fffff880`059f7c00 00000000`00000000 : 0xfffffa80`0ae6ccf0
fffff880`059f7c10 fffffa80`0a28a0a8     : 00010000`00001946 fffff880`059f7c00 00000000`00000000 00000000`00000000 : 0x900bb
fffff880`059f7c18 00010000`00001946     : fffff880`059f7c00 00000000`00000000 00000000`00000000 fffff880`04a331e0 : 0xfffffa80`0a28a0a8
fffff880`059f7c20 fffff880`059f7c00     : 00000000`00000000 00000000`00000000 fffff880`04a331e0 fffffa80`0ae6cda0 : 0x00010000`00001946
fffff880`059f7c28 00000000`00000000     : 00000000`00000000 fffff880`04a331e0 fffffa80`0ae6cda0 00000000`00000068 : 0xfffff880`059f7c00


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42837

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7600.16617

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x50_nt!_??_::FNODOBFM::_string_+42837

OS_VERSION:  7.0.7600.16617

BUILDLAB_STR:  win7_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {55b723f5-51d9-b6c0-0d49-aefa954aa950}

Followup:     MachineOwner
---------

@Kyraxxx bu kadar çok mavi ekranın zararlı yazılım kaynaklı olma ihtimali çok düşük. Ayrıca bu mavi ekranların kaynağı zararlı yazılım değil; sorunlu GPU, RAM veya her ikisi.
 
Son düzenleme:

Yeni konular

Geri
Yukarı