SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) hatası

İşletim sistemi
Windows 8

EgeMen67

Hectopat
Katılım
5 Nisan 2020
Mesajlar
9
Son zamanlarda bilgisayarım çok fazla mavi ekran vermeye başladı. BlueScreenView'dan baktığımda ise çoğu mavi ekran hatasının .sys dosyalarından kaynaklandığını gördüm. Ne yapmalıyım?
 

Dosya Ekleri

  • mini1.png
    mini1.png
    261,7 KB · Görüntüleme: 60
  • mini2.png
    mini2.png
    262,7 KB · Görüntüleme: 63
  • mini3.png
    mini3.png
    263,2 KB · Görüntüleme: 49
Son düzenleyen: Moderatör:
Muhtemelen ekran kartında donanımsal bir sorun var. Kartın marka/modeli neydi?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800493b805, The address that the exception occurred at
Arg3: fffff88006b1fca8, Exception Record Address
Arg4: fffff88006b1f4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3967

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36422

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800493b805

BUGCHECK_P3: fffff88006b1fca8

BUGCHECK_P4: fffff88006b1f4e0

EXCEPTION_RECORD:  fffff88006b1fca8 -- (.exr 0xfffff88006b1fca8)
ExceptionAddress: fffff8800493b805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006b1f4e0 -- (.cxr 0xfffff88006b1f4e0)
rax=0000000000000000 rbx=fffffa800b348440 rcx=af4bf467c96c0000
rdx=8000000000000020 rsi=fffffa800b348440 rdi=0000000000000000
rip=fffff8800493b805 rsp=fffff88006b1fee0 rbp=fffffa8008d81010
 r8=fffff88004436870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c44010 r12=000000000000000f r13=fffff88006b202f8
r14=0000000000000000 r15=fffffa8008acb000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0493b805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff803769d4370
GetUlongPtrFromAddress: unable to read from fffff803769d4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06b1fee0 fffff880`048e0c90     : fffff880`04868ffd fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f : nvlddmkm+0xd2a805
fffff880`06b1fee8 fffff880`04868ffd     : fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 : nvlddmkm+0xccfc90
fffff880`06b1fef0 fffff880`0373ac1d     : fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 fffff880`03845614 : nvlddmkm+0xc57ffd
fffff880`06b1fef8 fffff880`0384f7ac     : fffff880`0385d75f fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 : dxgkrnl+0x8dc1d
fffff880`06b1ff00 fffff880`0385d75f     : fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 fffff880`03865662 : dxgmms1+0x287ac
fffff880`06b1ff08 fffff880`0384c928     : fffff880`03845614 fffff880`03865ba5 fffff880`03865662 00000000`00000001 : dxgmms1+0x3675f
fffff880`06b1ff10 fffff880`03845614     : fffff880`03865ba5 fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c : dxgmms1+0x25928
fffff880`06b1ff18 fffff880`03865ba5     : fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 : dxgmms1+0x1e614
fffff880`06b1ff20 fffff880`03865662     : 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`06b1ff28 00000000`00000001     : ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 : dxgmms1+0x3e662
fffff880`06b1ff30 ffff57cb`f2d6374c     : fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 : 0x1
fffff880`06b1ff38 fffff880`06b1ff98     : 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 : 0xffff57cb`f2d6374c
fffff880`06b1ff40 00000000`00000000     : fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 00000000`0000000f : 0xfffff880`06b1ff98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006b1f4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004c02805, The address that the exception occurred at
Arg3: fffff88003deaca8, Exception Record Address
Arg4: fffff88003dea4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6336

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32290

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004c02805

BUGCHECK_P3: fffff88003deaca8

BUGCHECK_P4: fffff88003dea4e0

EXCEPTION_RECORD:  fffff88003deaca8 -- (.exr 0xfffff88003deaca8)
ExceptionAddress: fffff88004c02805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88003dea4e0 -- (.cxr 0xfffff88003dea4e0)
rax=0000000000000000 rbx=fffffa800c2a36a0 rcx=faa23635bd000000
rdx=8000000000000020 rsi=fffffa800c2a36a0 rdi=0000000000000000
rip=fffff88004c02805 rsp=fffff88003deaee0 rbp=fffffa8008d4eb90
 r8=fffff880046fd870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007be9320 r12=000000000000000f r13=fffff88003deb2f8
r14=0000000000000000 r15=fffffa8008bbd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04c02805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80014568370
GetUlongPtrFromAddress: unable to read from fffff80014568488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`03deaee0 00000002`00000000     : 00000000`00000000 ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 : nvlddmkm+0xd2a805
fffff880`03deaee8 00000000`00000000     : ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88003dea4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003d4c808, The address that the exception occurred at
Arg3: fffff88006ac8c78, Exception Record Address
Arg4: fffff88006ac84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11547

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88003d4c808

BUGCHECK_P3: fffff88006ac8c78

BUGCHECK_P4: fffff88006ac84b0

EXCEPTION_RECORD:  fffff88006ac8c78 -- (.exr 0xfffff88006ac8c78)
ExceptionAddress: fffff88003d4c808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff88006ac84b0 -- (.cxr 0xfffff88006ac84b0)
rax=fffff88006ac8ed8 rbx=0000000000000000 rcx=fffffa800a7edcd0
rdx=0000000000010000 rsi=fffffa800a7edcd0 rdi=0000000000000000
rip=fffff88003d4c808 rsp=fffff88006ac8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000840000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000160000 r13=fffff88006ac92f8
r14=0000000000010000 r15=fffffa8008962000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`03d4c808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8007e16e370
GetUlongPtrFromAddress: unable to read from fffff8007e16e488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06ac8eb0 00000000`00160000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 : nvlddmkm+0x64808
fffff880`06ac8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a : 0x160000
fffff880`06ac8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ac84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a1e805, The address that the exception occurred at
Arg3: fffff88006cb2ca8, Exception Record Address
Arg4: fffff88006cb24e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14208

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a1e805

BUGCHECK_P3: fffff88006cb2ca8

BUGCHECK_P4: fffff88006cb24e0

EXCEPTION_RECORD:  fffff88006cb2ca8 -- (.exr 0xfffff88006cb2ca8)
ExceptionAddress: fffff88004a1e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006cb24e0 -- (.cxr 0xfffff88006cb24e0)
rax=0000000000000000 rbx=fffffa800b736e20 rcx=40ec49b12adf0000
rdx=8000000000000020 rsi=fffffa800b736e20 rdi=0000000000000000
rip=fffff88004a1e805 rsp=fffff88006cb2ee0 rbp=fffffa8008cf7010
 r8=fffff88004519870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007baf360 r12=000000000000000f r13=fffff88006cb32f8
r14=0000000000000000 r15=fffffa80088d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`04a1e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80016d74370
GetUlongPtrFromAddress: unable to read from fffff80016d74488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06cb2ee0 00000002`00000000     : 00000000`00000000 ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 : nvlddmkm+0xd2a805
fffff880`06cb2ee8 00000000`00000000     : ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006cb24e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004935805, The address that the exception occurred at
Arg3: fffff88003595ca8, Exception Record Address
Arg4: fffff880035954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12382

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28185

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004935805

BUGCHECK_P3: fffff88003595ca8

BUGCHECK_P4: fffff880035954e0

EXCEPTION_RECORD:  fffff88003595ca8 -- (.exr 0xfffff88003595ca8)
ExceptionAddress: fffff88004935805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880035954e0 -- (.cxr 0xfffff880035954e0)
rax=0000000000000000 rbx=fffffa800c780cf0 rcx=3acd7e4ab2670000
rdx=8000000000000020 rsi=fffffa800c780cf0 rdi=0000000000000000
rip=fffff88004935805 rsp=fffff88003595ee0 rbp=fffffa8008d92010
 r8=fffff88004430870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c81310 r12=000000000000000f r13=fffff880035962f8
r14=0000000000000000 r15=fffffa80089fa000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04935805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80042559370
GetUlongPtrFromAddress: unable to read from fffff80042559488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`03595ee0 fffff880`048dac90     : fffff880`04862ffd fffff880`038e9c1d fffff880`038287ac fffff880`0383675f : nvlddmkm+0xd2a805
fffff880`03595ee8 fffff880`04862ffd     : fffff880`038e9c1d fffff880`038287ac fffff880`0383675f fffff880`03825928 : nvlddmkm+0xccfc90
fffff880`03595ef0 fffff880`038e9c1d     : fffff880`038287ac fffff880`0383675f fffff880`03825928 fffff880`0381e614 : nvlddmkm+0xc57ffd
fffff880`03595ef8 fffff880`038287ac     : fffff880`0383675f fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 : dxgkrnl+0x8dc1d
fffff880`03595f00 fffff880`0383675f     : fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 : dxgmms1+0x287ac
fffff880`03595f08 fffff880`03825928     : fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03595f10 fffff880`0381e614     : fffff880`0383eba5 fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 : dxgmms1+0x25928
fffff880`03595f18 fffff880`0383eba5     : fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 : dxgmms1+0x1e614
fffff880`03595f20 fffff880`0383e662     : 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03595f28 00000000`00000001     : ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 : dxgmms1+0x3e662
fffff880`03595f30 ffffc24d`7d13ec47     : fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 : 0x1
fffff880`03595f38 fffff880`03595f98     : 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 : 0xffffc24d`7d13ec47
fffff880`03595f40 00000000`00000000     : fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 00000000`0000000f : 0xfffff880`03595f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880035954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004975789, The address that the exception occurred at
Arg3: fffff88006c96ca8, Exception Record Address
Arg4: fffff88006c964e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3548

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36792

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004975789

BUGCHECK_P3: fffff88006c96ca8

BUGCHECK_P4: fffff88006c964e0

EXCEPTION_RECORD:  fffff88006c96ca8 -- (.exr 0xfffff88006c96ca8)
ExceptionAddress: fffff88004975789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006c964e0 -- (.cxr 0xfffff88006c964e0)
rax=0000000000000000 rbx=fffffa800da27390 rcx=5f4c1a54576a0000
rdx=8000000000000020 rsi=fffffa800da27390 rdi=0000000000000000
rip=fffff88004975789 rsp=fffff88006c96ee0 rbp=fffffa8008c827f0
 r8=fffff88004470880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bff310 r12=000000000000000f r13=fffff88006c972f8
r14=0000000000000000 r15=fffffa8008b93000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a789:
fffff880`04975789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80199b73370
GetUlongPtrFromAddress: unable to read from fffff80199b73488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06c96ee0 00000000`00010000     : fffffa80`07215010 ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 : nvlddmkm+0xd2a789
fffff880`06c96ee8 fffffa80`07215010     : ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 : 0x10000
fffff880`06c96ef0 ffffd048`64772013     : 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 : 0xfffffa80`07215010
fffff880`06c96ef8 00000000`00000000     : fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 fffffa80`0992f3e8 : 0xffffd048`64772013


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006c964e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007024805, The address that the exception occurred at
Arg3: fffff88004c6eca8, Exception Record Address
Arg4: fffff88004c6e4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9616

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44057

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88007024805

BUGCHECK_P3: fffff88004c6eca8

BUGCHECK_P4: fffff88004c6e4e0

EXCEPTION_RECORD:  fffff88004c6eca8 -- (.exr 0xfffff88004c6eca8)
ExceptionAddress: fffff88007024805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88004c6e4e0 -- (.cxr 0xfffff88004c6e4e0)
rax=0000000000000000 rbx=fffffa80074ed8f0 rcx=47bfb1cfa9dd0000
rdx=8000000000000020 rsi=fffffa80074ed8f0 rdi=0000000000000000
rip=fffff88007024805 rsp=fffff88004c6eee0 rbp=fffffa8008c10010
 r8=fffff88006b1f870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007aa81e0 r12=000000000000000f r13=fffff88004c6f2f8
r14=0000000000000000 r15=fffffa80088d3000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`07024805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802a0965370
GetUlongPtrFromAddress: unable to read from fffff802a0965488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`04c6eee0 fffff880`06fc9c90     : fffff880`06f51ffd fffff880`0371ac1d fffff880`036397ac fffff880`0364775f : nvlddmkm+0xd2a805
fffff880`04c6eee8 fffff880`06f51ffd     : fffff880`0371ac1d fffff880`036397ac fffff880`0364775f fffff880`03636928 : nvlddmkm+0xccfc90
fffff880`04c6eef0 fffff880`0371ac1d     : fffff880`036397ac fffff880`0364775f fffff880`03636928 fffff880`0362f614 : nvlddmkm+0xc57ffd
fffff880`04c6eef8 fffff880`036397ac     : fffff880`0364775f fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 : dxgkrnl+0x8dc1d
fffff880`04c6ef00 fffff880`0364775f     : fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 : dxgmms1+0x287ac
fffff880`04c6ef08 fffff880`03636928     : fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 00000000`00000001 : dxgmms1+0x3675f
fffff880`04c6ef10 fffff880`0362f614     : fffff880`0364fba5 fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd : dxgmms1+0x25928
fffff880`04c6ef18 fffff880`0364fba5     : fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 : dxgmms1+0x1e614
fffff880`04c6ef20 fffff880`0364f662     : 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`04c6ef28 00000000`00000001     : ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 : dxgmms1+0x3e662
fffff880`04c6ef30 ffffbf3f`b50947fd     : fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 : 0x1
fffff880`04c6ef38 fffff880`04c6ef98     : 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 : 0xffffbf3f`b50947fd
fffff880`04c6ef40 00000000`00000000     : fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 00000000`0000000f : 0xfffff880`04c6ef98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88004c6e4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006ff7789, The address that the exception occurred at
Arg3: fffff880044f8ca8, Exception Record Address
Arg4: fffff880044f84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8734

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30490

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006ff7789

BUGCHECK_P3: fffff880044f8ca8

BUGCHECK_P4: fffff880044f84e0

EXCEPTION_RECORD:  fffff880044f8ca8 -- (.exr 0xfffff880044f8ca8)
ExceptionAddress: fffff88006ff7789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044f84e0 -- (.cxr 0xfffff880044f84e0)
rax=0000000000000000 rbx=fffffa800c13ca70 rcx=3078f1ab8d320000
rdx=8000000000000020 rsi=fffffa800c13ca70 rdi=0000000000000000
rip=fffff88006ff7789 rsp=fffff880044f8ee0 rbp=fffffa8008ce0010
 r8=fffff88006af2880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bbe310 r12=000000000000000f r13=fffff880044f92f8
r14=0000000000000000 r15=fffffa8008b22000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06ff7789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80166bd4370
GetUlongPtrFromAddress: unable to read from fffff80166bd4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`044f8ee0 fffff880`06f9cc4c     : fffff880`06f24ffd fffff880`036fdc1d fffff880`036287ac fffff880`0363675f : nvlddmkm+0xd2a789
fffff880`044f8ee8 fffff880`06f24ffd     : fffff880`036fdc1d fffff880`036287ac fffff880`0363675f fffff880`03625928 : nvlddmkm+0xccfc4c
fffff880`044f8ef0 fffff880`036fdc1d     : fffff880`036287ac fffff880`0363675f fffff880`03625928 fffff880`0361e614 : nvlddmkm+0xc57ffd
fffff880`044f8ef8 fffff880`036287ac     : fffff880`0363675f fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 : dxgkrnl+0x8dc1d
fffff880`044f8f00 fffff880`0363675f     : fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 : dxgmms1+0x287ac
fffff880`044f8f08 fffff880`03625928     : fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`044f8f10 fffff880`0361e614     : fffff880`0363eba5 fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 : dxgmms1+0x25928
fffff880`044f8f18 fffff880`0363eba5     : fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 : dxgmms1+0x1e614
fffff880`044f8f20 fffff880`0363e662     : 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`044f8f28 00000000`00000001     : ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 : dxgmms1+0x3e662
fffff880`044f8f30 ffffc8f8`f5e40312     : fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 : 0x1
fffff880`044f8f38 fffff880`044f8f98     : 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 : 0xffffc8f8`f5e40312
fffff880`044f8f40 00000000`00000000     : fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 00000000`0000000f : 0xfffff880`044f8f98


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044f84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880049d3805, The address that the exception occurred at
Arg3: fffff88006ca5ca8, Exception Record Address
Arg4: fffff88006ca54e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4369

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 35622

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880049d3805

BUGCHECK_P3: fffff88006ca5ca8

BUGCHECK_P4: fffff88006ca54e0

EXCEPTION_RECORD:  fffff88006ca5ca8 -- (.exr 0xfffff88006ca5ca8)
ExceptionAddress: fffff880049d3805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006ca54e0 -- (.cxr 0xfffff88006ca54e0)
rax=0000000000000000 rbx=fffffa800be4b990 rcx=c2717396e1af0000
rdx=8000000000000020 rsi=fffffa800be4b990 rdi=0000000000000000
rip=fffff880049d3805 rsp=fffff88006ca5ee0 rbp=fffffa8008d435e0
 r8=fffff880044ce870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c2d310 r12=000000000000000f r13=fffff88006ca62f8
r14=0000000000000000 r15=fffffa8008a0d000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`049d3805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8016db5b370
GetUlongPtrFromAddress: unable to read from fffff8016db5b488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06ca5ee0 fffff880`04978c90     : fffff880`04900ffd ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 : nvlddmkm+0xd2a805
fffff880`06ca5ee8 fffff880`04900ffd     : ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 : nvlddmkm+0xccfc90
fffff880`06ca5ef0 ffff7f46`273d97e9     : fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06ca5ef8 fffff880`038767ac     : fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 fffffa80`094f0028 : 0xffff7f46`273d97e9
fffff880`06ca5f00 fffffa80`08d3d840     : fffff880`009c0180 00000000`00000000 fffffa80`094f0028 00000000`00000000 : dxgmms1+0x287ac
fffff880`06ca5f08 fffff880`009c0180     : 00000000`00000000 fffffa80`094f0028 00000000`00000000 00000000`00000000 : 0xfffffa80`08d3d840
fffff880`06ca5f10 00000000`00000000     : fffffa80`094f0028 00000000`00000000 00000000`00000000 fffffa80`08d3d700 : 0xfffff880`009c0180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ca54e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006fb9789, The address that the exception occurred at
Arg3: fffff880044abca8, Exception Record Address
Arg4: fffff880044ab4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3711

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006fb9789

BUGCHECK_P3: fffff880044abca8

BUGCHECK_P4: fffff880044ab4e0

EXCEPTION_RECORD:  fffff880044abca8 -- (.exr 0xfffff880044abca8)
ExceptionAddress: fffff88006fb9789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044ab4e0 -- (.cxr 0xfffff880044ab4e0)
rax=0000000000000000 rbx=fffffa800c243510 rcx=213f9e6ed8100000
rdx=8000000000000020 rsi=fffffa800c243510 rdi=0000000000000000
rip=fffff88006fb9789 rsp=fffff880044abee0 rbp=fffffa8008cb1010
 r8=fffff88006ab4880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c24330 r12=000000000000000f r13=fffff880044ac2f8
r14=0000000000000000 r15=fffffa8008969000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06fb9789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8017cfdd370
GetUlongPtrFromAddress: unable to read from fffff8017cfdd488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`044abee0 00000002`00000000     : 00000000`00000000 fffffa80`08aea1a8 00000004`00000000 00000000`00000000 : nvlddmkm+0xd2a789
fffff880`044abee8 00000000`00000000     : fffffa80`08aea1a8 00000004`00000000 00000000`00000000 fffff880`044ac000 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044ab4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800515e805, The address that the exception occurred at
Arg3: fffff88006da8ca8, Exception Record Address
Arg4: fffff88006da84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1842

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13524

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28699

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800515e805

BUGCHECK_P3: fffff88006da8ca8

BUGCHECK_P4: fffff88006da84e0

EXCEPTION_RECORD:  fffff88006da8ca8 -- (.exr 0xfffff88006da8ca8)
ExceptionAddress: fffff8800515e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006da84e0 -- (.cxr 0xfffff88006da84e0)
rax=0000000000000000 rbx=fffffa800c0df500 rcx=3c8edfd421450000
rdx=8000000000000020 rsi=fffffa800c0df500 rdi=0000000000000000
rip=fffff8800515e805 rsp=fffff88006da8ee0 rbp=fffffa800907f010
 r8=fffff88004c59870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007e2e730 r12=000000000000000f r13=fffff88006da92f8
r14=0000000000000000 r15=fffffa8008bfd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`0515e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802f1bc5370
GetUlongPtrFromAddress: unable to read from fffff802f1bc5488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06da8ee0 fffff880`05103c90     : fffff880`0508bffd ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 : nvlddmkm+0xd2a805
fffff880`06da8ee8 fffff880`0508bffd     : ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 : nvlddmkm+0xccfc90
fffff880`06da8ef0 ffffb2a5`7206a005     : fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06da8ef8 fffff880`03c287ac     : fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 : 0xffffb2a5`7206a005
fffff880`06da8f00 fffffa80`0907a840     : fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 : dxgmms1+0x287ac
fffff880`06da8f08 fffff802`f1b65180     : 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 : 0xfffffa80`0907a840
fffff880`06da8f10 00000000`00000000     : fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 fffffa80`0907a700 : nt!KiInitialPCR+0x180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006da84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006c8a808, The address that the exception occurred at
Arg3: fffff880045b8c78, Exception Record Address
Arg4: fffff880045b84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12490

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27234

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006c8a808

BUGCHECK_P3: fffff880045b8c78

BUGCHECK_P4: fffff880045b84b0

EXCEPTION_RECORD:  fffff880045b8c78 -- (.exr 0xfffff880045b8c78)
ExceptionAddress: fffff88006c8a808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff880045b84b0 -- (.cxr 0xfffff880045b84b0)
rax=fffff880045b8ed8 rbx=0000000000000000 rcx=fffffa800e06a800
rdx=0000000000010000 rsi=fffffa800e06a800 rdi=0000000000000000
rip=fffff88006c8a808 rsp=fffff880045b8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000001200000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000300000 r13=fffff880045b92f8
r14=0000000000010000 r15=fffffa8008e52000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`06c8a808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80341170370
GetUlongPtrFromAddress: unable to read from fffff80341170488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`045b8eb0 00000000`00300000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 : nvlddmkm+0x64808
fffff880`045b8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a : 0x300000
fffff880`045b8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880045b84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80067eba3d0, Address of the instruction which caused the BugCheck
Arg3: fffff8800abd2d10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7541

    Key  : Analysis.Init.CPU.mSec
    Value: 842

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27529

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80067eba3d0

BUGCHECK_P3: fffff8800abd2d10

BUGCHECK_P4: 0

CONTEXT:  fffff8800abd2d10 -- (.cxr 0xfffff8800abd2d10)
rax=00000000c0000034 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800abd3c01 rsi=fffff901000b9750 rdi=ffffffffc0000034
rip=fffff80067eba3d0 rsp=fffff8800abd3718 rbp=fffff8800abd3820
 r8=fffffa80094d1370  r9=fffff8a003b6c580 r10=fffffa8006a2a760
r11=fffff8800abd3700 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!IoGetRelatedDeviceObject:
fffff800`67eba3d0 488b4110        mov     rax,qword ptr [rcx+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
fffff880`0abd3718 fffff960`0009d473     : 00000000`00000000 00000000`00000000 fffff901`000b9750 00000000`00000000 : nt!IoGetRelatedDeviceObject
fffff880`0abd3720 00000000`00000000     : 00000000`00000000 fffff901`000b9750 00000000`00000000 00000000`00000000 : win32k+0x77473


SYMBOL_NAME:  win32k+77473

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .cxr 0xfffff8800abd2d10 ; kb

BUCKET_ID_FUNC_OFFSET:  77473

FAILURE_BUCKET_ID:  0x3B_c0000005_win32k!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {8ffa81ae-e629-24c5-067f-7d1473d12e2c}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800499d805, The address that the exception occurred at
Arg3: fffff88003395ca8, Exception Record Address
Arg4: fffff880033954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9540

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800499d805

BUGCHECK_P3: fffff88003395ca8

BUGCHECK_P4: fffff880033954e0

EXCEPTION_RECORD:  fffff88003395ca8 -- (.exr 0xfffff88003395ca8)
ExceptionAddress: fffff8800499d805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880033954e0 -- (.cxr 0xfffff880033954e0)
rax=0000000000000000 rbx=fffffa80070951d0 rcx=d08e77d4e2230000
rdx=8000000000000020 rsi=fffffa80070951d0 rdi=0000000000000000
rip=fffff8800499d805 rsp=fffff88003395ee0 rbp=fffffa8008db9010
 r8=fffff88004498870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c11310 r12=000000000000000f r13=fffff880033962f8
r14=0000000000000000 r15=fffffa8008b95000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0499d805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80360361370
GetUlongPtrFromAddress: unable to read from fffff80360361488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`03395ee0 fffff880`04942c90     : fffff880`048caffd fffff880`03743c1d fffff880`038587ac fffff880`0386675f : nvlddmkm+0xd2a805
fffff880`03395ee8 fffff880`048caffd     : fffff880`03743c1d fffff880`038587ac fffff880`0386675f fffff880`03855928 : nvlddmkm+0xccfc90
fffff880`03395ef0 fffff880`03743c1d     : fffff880`038587ac fffff880`0386675f fffff880`03855928 fffff880`0384e614 : nvlddmkm+0xc57ffd
fffff880`03395ef8 fffff880`038587ac     : fffff880`0386675f fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 : dxgkrnl+0x8dc1d
fffff880`03395f00 fffff880`0386675f     : fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 : dxgmms1+0x287ac
fffff880`03395f08 fffff880`03855928     : fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03395f10 fffff880`0384e614     : fffff880`0386eba5 fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 : dxgmms1+0x25928
fffff880`03395f18 fffff880`0386eba5     : fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 : dxgmms1+0x1e614
fffff880`03395f20 fffff880`0386e662     : 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03395f28 00000000`00000001     : ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 : dxgmms1+0x3e662
fffff880`03395f30 ffff280e`74edbc03     : fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 : 0x1
fffff880`03395f38 fffff880`03395f98     : 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 : 0xffff280e`74edbc03
fffff880`03395f40 00000000`00000000     : fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 00000000`0000000f : 0xfffff880`03395f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880033954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004996805, The address that the exception occurred at
Arg3: fffff880067a1ca8, Exception Record Address
Arg4: fffff880067a14e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10799

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30714

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004996805

BUGCHECK_P3: fffff880067a1ca8

BUGCHECK_P4: fffff880067a14e0

EXCEPTION_RECORD:  fffff880067a1ca8 -- (.exr 0xfffff880067a1ca8)
ExceptionAddress: fffff88004996805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880067a14e0 -- (.cxr 0xfffff880067a14e0)
rax=0000000000000000 rbx=fffffa800bc16240 rcx=09bba9bc1bf40000
rdx=8000000000000020 rsi=fffffa800bc16240 rdi=0000000000000000
rip=fffff88004996805 rsp=fffff880067a1ee0 rbp=fffffa8008d4c3d0
 r8=fffff88004491870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007ba2010 r12=000000000000000f r13=fffff880067a22f8
r14=0000000000000000 r15=fffffa8008bd4000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04996805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800c07c8370
GetUlongPtrFromAddress: unable to read from fffff800c07c8488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`067a1ee0 fffff880`0493bc90     : fffff880`048c3ffd fffff880`036adc1d fffff880`037c27ac fffff880`037d075f : nvlddmkm+0xd2a805
fffff880`067a1ee8 fffff880`048c3ffd     : fffff880`036adc1d fffff880`037c27ac fffff880`037d075f fffff880`037bf928 : nvlddmkm+0xccfc90
fffff880`067a1ef0 fffff880`036adc1d     : fffff880`037c27ac fffff880`037d075f fffff880`037bf928 fffff880`037b8614 : nvlddmkm+0xc57ffd
fffff880`067a1ef8 fffff880`037c27ac     : fffff880`037d075f fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 : dxgkrnl+0x8dc1d
fffff880`067a1f00 fffff880`037d075f     : fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 : dxgmms1+0x287ac
fffff880`067a1f08 fffff880`037bf928     : fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 : dxgmms1+0x3675f
fffff880`067a1f10 fffff880`037b8614     : fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 : dxgmms1+0x25928
fffff880`067a1f18 fffff880`037d8ba5     : fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 : dxgmms1+0x1e614
fffff880`067a1f20 fffff880`037d8662     : 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`067a1f28 00000000`00000001     : fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 : dxgmms1+0x3e662
fffff880`067a1f30 fffff13b`afc605d4     : fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 : 0x1
fffff880`067a1f38 fffff880`067a1f98     : 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 : 0xfffff13b`afc605d4
fffff880`067a1f40 00000000`00000000     : fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 00000000`0000000f : 0xfffff880`067a1f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880067a14e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
 
Muhtemelen ekran kartında donanımsal bir sorun var. Kartın marka/modeli neydi?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800493b805, The address that the exception occurred at
Arg3: fffff88006b1fca8, Exception Record Address
Arg4: fffff88006b1f4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3967

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36422

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800493b805

BUGCHECK_P3: fffff88006b1fca8

BUGCHECK_P4: fffff88006b1f4e0

EXCEPTION_RECORD:  fffff88006b1fca8 -- (.exr 0xfffff88006b1fca8)
ExceptionAddress: fffff8800493b805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006b1f4e0 -- (.cxr 0xfffff88006b1f4e0)
rax=0000000000000000 rbx=fffffa800b348440 rcx=af4bf467c96c0000
rdx=8000000000000020 rsi=fffffa800b348440 rdi=0000000000000000
rip=fffff8800493b805 rsp=fffff88006b1fee0 rbp=fffffa8008d81010
 r8=fffff88004436870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c44010 r12=000000000000000f r13=fffff88006b202f8
r14=0000000000000000 r15=fffffa8008acb000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0493b805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff803769d4370
GetUlongPtrFromAddress: unable to read from fffff803769d4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06b1fee0 fffff880`048e0c90     : fffff880`04868ffd fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f : nvlddmkm+0xd2a805
fffff880`06b1fee8 fffff880`04868ffd     : fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 : nvlddmkm+0xccfc90
fffff880`06b1fef0 fffff880`0373ac1d     : fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 fffff880`03845614 : nvlddmkm+0xc57ffd
fffff880`06b1fef8 fffff880`0384f7ac     : fffff880`0385d75f fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 : dxgkrnl+0x8dc1d
fffff880`06b1ff00 fffff880`0385d75f     : fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 fffff880`03865662 : dxgmms1+0x287ac
fffff880`06b1ff08 fffff880`0384c928     : fffff880`03845614 fffff880`03865ba5 fffff880`03865662 00000000`00000001 : dxgmms1+0x3675f
fffff880`06b1ff10 fffff880`03845614     : fffff880`03865ba5 fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c : dxgmms1+0x25928
fffff880`06b1ff18 fffff880`03865ba5     : fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 : dxgmms1+0x1e614
fffff880`06b1ff20 fffff880`03865662     : 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`06b1ff28 00000000`00000001     : ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 : dxgmms1+0x3e662
fffff880`06b1ff30 ffff57cb`f2d6374c     : fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 : 0x1
fffff880`06b1ff38 fffff880`06b1ff98     : 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 : 0xffff57cb`f2d6374c
fffff880`06b1ff40 00000000`00000000     : fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 00000000`0000000f : 0xfffff880`06b1ff98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006b1f4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004c02805, The address that the exception occurred at
Arg3: fffff88003deaca8, Exception Record Address
Arg4: fffff88003dea4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6336

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32290

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004c02805

BUGCHECK_P3: fffff88003deaca8

BUGCHECK_P4: fffff88003dea4e0

EXCEPTION_RECORD:  fffff88003deaca8 -- (.exr 0xfffff88003deaca8)
ExceptionAddress: fffff88004c02805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88003dea4e0 -- (.cxr 0xfffff88003dea4e0)
rax=0000000000000000 rbx=fffffa800c2a36a0 rcx=faa23635bd000000
rdx=8000000000000020 rsi=fffffa800c2a36a0 rdi=0000000000000000
rip=fffff88004c02805 rsp=fffff88003deaee0 rbp=fffffa8008d4eb90
 r8=fffff880046fd870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007be9320 r12=000000000000000f r13=fffff88003deb2f8
r14=0000000000000000 r15=fffffa8008bbd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04c02805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80014568370
GetUlongPtrFromAddress: unable to read from fffff80014568488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03deaee0 00000002`00000000     : 00000000`00000000 ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 : nvlddmkm+0xd2a805
fffff880`03deaee8 00000000`00000000     : ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88003dea4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003d4c808, The address that the exception occurred at
Arg3: fffff88006ac8c78, Exception Record Address
Arg4: fffff88006ac84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11547

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88003d4c808

BUGCHECK_P3: fffff88006ac8c78

BUGCHECK_P4: fffff88006ac84b0

EXCEPTION_RECORD:  fffff88006ac8c78 -- (.exr 0xfffff88006ac8c78)
ExceptionAddress: fffff88003d4c808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff88006ac84b0 -- (.cxr 0xfffff88006ac84b0)
rax=fffff88006ac8ed8 rbx=0000000000000000 rcx=fffffa800a7edcd0
rdx=0000000000010000 rsi=fffffa800a7edcd0 rdi=0000000000000000
rip=fffff88003d4c808 rsp=fffff88006ac8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000840000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000160000 r13=fffff88006ac92f8
r14=0000000000010000 r15=fffffa8008962000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`03d4c808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8007e16e370
GetUlongPtrFromAddress: unable to read from fffff8007e16e488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ac8eb0 00000000`00160000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 : nvlddmkm+0x64808
fffff880`06ac8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a : 0x160000
fffff880`06ac8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ac84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a1e805, The address that the exception occurred at
Arg3: fffff88006cb2ca8, Exception Record Address
Arg4: fffff88006cb24e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14208

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a1e805

BUGCHECK_P3: fffff88006cb2ca8

BUGCHECK_P4: fffff88006cb24e0

EXCEPTION_RECORD:  fffff88006cb2ca8 -- (.exr 0xfffff88006cb2ca8)
ExceptionAddress: fffff88004a1e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006cb24e0 -- (.cxr 0xfffff88006cb24e0)
rax=0000000000000000 rbx=fffffa800b736e20 rcx=40ec49b12adf0000
rdx=8000000000000020 rsi=fffffa800b736e20 rdi=0000000000000000
rip=fffff88004a1e805 rsp=fffff88006cb2ee0 rbp=fffffa8008cf7010
 r8=fffff88004519870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007baf360 r12=000000000000000f r13=fffff88006cb32f8
r14=0000000000000000 r15=fffffa80088d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`04a1e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80016d74370
GetUlongPtrFromAddress: unable to read from fffff80016d74488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06cb2ee0 00000002`00000000     : 00000000`00000000 ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 : nvlddmkm+0xd2a805
fffff880`06cb2ee8 00000000`00000000     : ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006cb24e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004935805, The address that the exception occurred at
Arg3: fffff88003595ca8, Exception Record Address
Arg4: fffff880035954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12382

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28185

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004935805

BUGCHECK_P3: fffff88003595ca8

BUGCHECK_P4: fffff880035954e0

EXCEPTION_RECORD:  fffff88003595ca8 -- (.exr 0xfffff88003595ca8)
ExceptionAddress: fffff88004935805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880035954e0 -- (.cxr 0xfffff880035954e0)
rax=0000000000000000 rbx=fffffa800c780cf0 rcx=3acd7e4ab2670000
rdx=8000000000000020 rsi=fffffa800c780cf0 rdi=0000000000000000
rip=fffff88004935805 rsp=fffff88003595ee0 rbp=fffffa8008d92010
 r8=fffff88004430870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c81310 r12=000000000000000f r13=fffff880035962f8
r14=0000000000000000 r15=fffffa80089fa000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04935805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80042559370
GetUlongPtrFromAddress: unable to read from fffff80042559488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03595ee0 fffff880`048dac90     : fffff880`04862ffd fffff880`038e9c1d fffff880`038287ac fffff880`0383675f : nvlddmkm+0xd2a805
fffff880`03595ee8 fffff880`04862ffd     : fffff880`038e9c1d fffff880`038287ac fffff880`0383675f fffff880`03825928 : nvlddmkm+0xccfc90
fffff880`03595ef0 fffff880`038e9c1d     : fffff880`038287ac fffff880`0383675f fffff880`03825928 fffff880`0381e614 : nvlddmkm+0xc57ffd
fffff880`03595ef8 fffff880`038287ac     : fffff880`0383675f fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 : dxgkrnl+0x8dc1d
fffff880`03595f00 fffff880`0383675f     : fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 : dxgmms1+0x287ac
fffff880`03595f08 fffff880`03825928     : fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03595f10 fffff880`0381e614     : fffff880`0383eba5 fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 : dxgmms1+0x25928
fffff880`03595f18 fffff880`0383eba5     : fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 : dxgmms1+0x1e614
fffff880`03595f20 fffff880`0383e662     : 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03595f28 00000000`00000001     : ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 : dxgmms1+0x3e662
fffff880`03595f30 ffffc24d`7d13ec47     : fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 : 0x1
fffff880`03595f38 fffff880`03595f98     : 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 : 0xffffc24d`7d13ec47
fffff880`03595f40 00000000`00000000     : fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 00000000`0000000f : 0xfffff880`03595f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880035954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004975789, The address that the exception occurred at
Arg3: fffff88006c96ca8, Exception Record Address
Arg4: fffff88006c964e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3548

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36792

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004975789

BUGCHECK_P3: fffff88006c96ca8

BUGCHECK_P4: fffff88006c964e0

EXCEPTION_RECORD:  fffff88006c96ca8 -- (.exr 0xfffff88006c96ca8)
ExceptionAddress: fffff88004975789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006c964e0 -- (.cxr 0xfffff88006c964e0)
rax=0000000000000000 rbx=fffffa800da27390 rcx=5f4c1a54576a0000
rdx=8000000000000020 rsi=fffffa800da27390 rdi=0000000000000000
rip=fffff88004975789 rsp=fffff88006c96ee0 rbp=fffffa8008c827f0
 r8=fffff88004470880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bff310 r12=000000000000000f r13=fffff88006c972f8
r14=0000000000000000 r15=fffffa8008b93000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a789:
fffff880`04975789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80199b73370
GetUlongPtrFromAddress: unable to read from fffff80199b73488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06c96ee0 00000000`00010000     : fffffa80`07215010 ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 : nvlddmkm+0xd2a789
fffff880`06c96ee8 fffffa80`07215010     : ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 : 0x10000
fffff880`06c96ef0 ffffd048`64772013     : 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 : 0xfffffa80`07215010
fffff880`06c96ef8 00000000`00000000     : fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 fffffa80`0992f3e8 : 0xffffd048`64772013


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006c964e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007024805, The address that the exception occurred at
Arg3: fffff88004c6eca8, Exception Record Address
Arg4: fffff88004c6e4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9616

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44057

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88007024805

BUGCHECK_P3: fffff88004c6eca8

BUGCHECK_P4: fffff88004c6e4e0

EXCEPTION_RECORD:  fffff88004c6eca8 -- (.exr 0xfffff88004c6eca8)
ExceptionAddress: fffff88007024805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88004c6e4e0 -- (.cxr 0xfffff88004c6e4e0)
rax=0000000000000000 rbx=fffffa80074ed8f0 rcx=47bfb1cfa9dd0000
rdx=8000000000000020 rsi=fffffa80074ed8f0 rdi=0000000000000000
rip=fffff88007024805 rsp=fffff88004c6eee0 rbp=fffffa8008c10010
 r8=fffff88006b1f870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007aa81e0 r12=000000000000000f r13=fffff88004c6f2f8
r14=0000000000000000 r15=fffffa80088d3000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`07024805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802a0965370
GetUlongPtrFromAddress: unable to read from fffff802a0965488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`04c6eee0 fffff880`06fc9c90     : fffff880`06f51ffd fffff880`0371ac1d fffff880`036397ac fffff880`0364775f : nvlddmkm+0xd2a805
fffff880`04c6eee8 fffff880`06f51ffd     : fffff880`0371ac1d fffff880`036397ac fffff880`0364775f fffff880`03636928 : nvlddmkm+0xccfc90
fffff880`04c6eef0 fffff880`0371ac1d     : fffff880`036397ac fffff880`0364775f fffff880`03636928 fffff880`0362f614 : nvlddmkm+0xc57ffd
fffff880`04c6eef8 fffff880`036397ac     : fffff880`0364775f fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 : dxgkrnl+0x8dc1d
fffff880`04c6ef00 fffff880`0364775f     : fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 : dxgmms1+0x287ac
fffff880`04c6ef08 fffff880`03636928     : fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 00000000`00000001 : dxgmms1+0x3675f
fffff880`04c6ef10 fffff880`0362f614     : fffff880`0364fba5 fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd : dxgmms1+0x25928
fffff880`04c6ef18 fffff880`0364fba5     : fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 : dxgmms1+0x1e614
fffff880`04c6ef20 fffff880`0364f662     : 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`04c6ef28 00000000`00000001     : ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 : dxgmms1+0x3e662
fffff880`04c6ef30 ffffbf3f`b50947fd     : fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 : 0x1
fffff880`04c6ef38 fffff880`04c6ef98     : 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 : 0xffffbf3f`b50947fd
fffff880`04c6ef40 00000000`00000000     : fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 00000000`0000000f : 0xfffff880`04c6ef98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88004c6e4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006ff7789, The address that the exception occurred at
Arg3: fffff880044f8ca8, Exception Record Address
Arg4: fffff880044f84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8734

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30490

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006ff7789

BUGCHECK_P3: fffff880044f8ca8

BUGCHECK_P4: fffff880044f84e0

EXCEPTION_RECORD:  fffff880044f8ca8 -- (.exr 0xfffff880044f8ca8)
ExceptionAddress: fffff88006ff7789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044f84e0 -- (.cxr 0xfffff880044f84e0)
rax=0000000000000000 rbx=fffffa800c13ca70 rcx=3078f1ab8d320000
rdx=8000000000000020 rsi=fffffa800c13ca70 rdi=0000000000000000
rip=fffff88006ff7789 rsp=fffff880044f8ee0 rbp=fffffa8008ce0010
 r8=fffff88006af2880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bbe310 r12=000000000000000f r13=fffff880044f92f8
r14=0000000000000000 r15=fffffa8008b22000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06ff7789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80166bd4370
GetUlongPtrFromAddress: unable to read from fffff80166bd4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044f8ee0 fffff880`06f9cc4c     : fffff880`06f24ffd fffff880`036fdc1d fffff880`036287ac fffff880`0363675f : nvlddmkm+0xd2a789
fffff880`044f8ee8 fffff880`06f24ffd     : fffff880`036fdc1d fffff880`036287ac fffff880`0363675f fffff880`03625928 : nvlddmkm+0xccfc4c
fffff880`044f8ef0 fffff880`036fdc1d     : fffff880`036287ac fffff880`0363675f fffff880`03625928 fffff880`0361e614 : nvlddmkm+0xc57ffd
fffff880`044f8ef8 fffff880`036287ac     : fffff880`0363675f fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 : dxgkrnl+0x8dc1d
fffff880`044f8f00 fffff880`0363675f     : fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 : dxgmms1+0x287ac
fffff880`044f8f08 fffff880`03625928     : fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`044f8f10 fffff880`0361e614     : fffff880`0363eba5 fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 : dxgmms1+0x25928
fffff880`044f8f18 fffff880`0363eba5     : fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 : dxgmms1+0x1e614
fffff880`044f8f20 fffff880`0363e662     : 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`044f8f28 00000000`00000001     : ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 : dxgmms1+0x3e662
fffff880`044f8f30 ffffc8f8`f5e40312     : fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 : 0x1
fffff880`044f8f38 fffff880`044f8f98     : 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 : 0xffffc8f8`f5e40312
fffff880`044f8f40 00000000`00000000     : fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 00000000`0000000f : 0xfffff880`044f8f98


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044f84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880049d3805, The address that the exception occurred at
Arg3: fffff88006ca5ca8, Exception Record Address
Arg4: fffff88006ca54e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4369

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 35622

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880049d3805

BUGCHECK_P3: fffff88006ca5ca8

BUGCHECK_P4: fffff88006ca54e0

EXCEPTION_RECORD:  fffff88006ca5ca8 -- (.exr 0xfffff88006ca5ca8)
ExceptionAddress: fffff880049d3805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006ca54e0 -- (.cxr 0xfffff88006ca54e0)
rax=0000000000000000 rbx=fffffa800be4b990 rcx=c2717396e1af0000
rdx=8000000000000020 rsi=fffffa800be4b990 rdi=0000000000000000
rip=fffff880049d3805 rsp=fffff88006ca5ee0 rbp=fffffa8008d435e0
 r8=fffff880044ce870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c2d310 r12=000000000000000f r13=fffff88006ca62f8
r14=0000000000000000 r15=fffffa8008a0d000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`049d3805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8016db5b370
GetUlongPtrFromAddress: unable to read from fffff8016db5b488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ca5ee0 fffff880`04978c90     : fffff880`04900ffd ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 : nvlddmkm+0xd2a805
fffff880`06ca5ee8 fffff880`04900ffd     : ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 : nvlddmkm+0xccfc90
fffff880`06ca5ef0 ffff7f46`273d97e9     : fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06ca5ef8 fffff880`038767ac     : fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 fffffa80`094f0028 : 0xffff7f46`273d97e9
fffff880`06ca5f00 fffffa80`08d3d840     : fffff880`009c0180 00000000`00000000 fffffa80`094f0028 00000000`00000000 : dxgmms1+0x287ac
fffff880`06ca5f08 fffff880`009c0180     : 00000000`00000000 fffffa80`094f0028 00000000`00000000 00000000`00000000 : 0xfffffa80`08d3d840
fffff880`06ca5f10 00000000`00000000     : fffffa80`094f0028 00000000`00000000 00000000`00000000 fffffa80`08d3d700 : 0xfffff880`009c0180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ca54e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006fb9789, The address that the exception occurred at
Arg3: fffff880044abca8, Exception Record Address
Arg4: fffff880044ab4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3711

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006fb9789

BUGCHECK_P3: fffff880044abca8

BUGCHECK_P4: fffff880044ab4e0

EXCEPTION_RECORD:  fffff880044abca8 -- (.exr 0xfffff880044abca8)
ExceptionAddress: fffff88006fb9789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044ab4e0 -- (.cxr 0xfffff880044ab4e0)
rax=0000000000000000 rbx=fffffa800c243510 rcx=213f9e6ed8100000
rdx=8000000000000020 rsi=fffffa800c243510 rdi=0000000000000000
rip=fffff88006fb9789 rsp=fffff880044abee0 rbp=fffffa8008cb1010
 r8=fffff88006ab4880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c24330 r12=000000000000000f r13=fffff880044ac2f8
r14=0000000000000000 r15=fffffa8008969000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06fb9789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8017cfdd370
GetUlongPtrFromAddress: unable to read from fffff8017cfdd488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044abee0 00000002`00000000     : 00000000`00000000 fffffa80`08aea1a8 00000004`00000000 00000000`00000000 : nvlddmkm+0xd2a789
fffff880`044abee8 00000000`00000000     : fffffa80`08aea1a8 00000004`00000000 00000000`00000000 fffff880`044ac000 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044ab4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800515e805, The address that the exception occurred at
Arg3: fffff88006da8ca8, Exception Record Address
Arg4: fffff88006da84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1842

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13524

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28699

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800515e805

BUGCHECK_P3: fffff88006da8ca8

BUGCHECK_P4: fffff88006da84e0

EXCEPTION_RECORD:  fffff88006da8ca8 -- (.exr 0xfffff88006da8ca8)
ExceptionAddress: fffff8800515e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006da84e0 -- (.cxr 0xfffff88006da84e0)
rax=0000000000000000 rbx=fffffa800c0df500 rcx=3c8edfd421450000
rdx=8000000000000020 rsi=fffffa800c0df500 rdi=0000000000000000
rip=fffff8800515e805 rsp=fffff88006da8ee0 rbp=fffffa800907f010
 r8=fffff88004c59870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007e2e730 r12=000000000000000f r13=fffff88006da92f8
r14=0000000000000000 r15=fffffa8008bfd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`0515e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802f1bc5370
GetUlongPtrFromAddress: unable to read from fffff802f1bc5488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06da8ee0 fffff880`05103c90     : fffff880`0508bffd ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 : nvlddmkm+0xd2a805
fffff880`06da8ee8 fffff880`0508bffd     : ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 : nvlddmkm+0xccfc90
fffff880`06da8ef0 ffffb2a5`7206a005     : fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06da8ef8 fffff880`03c287ac     : fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 : 0xffffb2a5`7206a005
fffff880`06da8f00 fffffa80`0907a840     : fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 : dxgmms1+0x287ac
fffff880`06da8f08 fffff802`f1b65180     : 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 : 0xfffffa80`0907a840
fffff880`06da8f10 00000000`00000000     : fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 fffffa80`0907a700 : nt!KiInitialPCR+0x180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006da84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006c8a808, The address that the exception occurred at
Arg3: fffff880045b8c78, Exception Record Address
Arg4: fffff880045b84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12490

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27234

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006c8a808

BUGCHECK_P3: fffff880045b8c78

BUGCHECK_P4: fffff880045b84b0

EXCEPTION_RECORD:  fffff880045b8c78 -- (.exr 0xfffff880045b8c78)
ExceptionAddress: fffff88006c8a808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff880045b84b0 -- (.cxr 0xfffff880045b84b0)
rax=fffff880045b8ed8 rbx=0000000000000000 rcx=fffffa800e06a800
rdx=0000000000010000 rsi=fffffa800e06a800 rdi=0000000000000000
rip=fffff88006c8a808 rsp=fffff880045b8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000001200000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000300000 r13=fffff880045b92f8
r14=0000000000010000 r15=fffffa8008e52000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`06c8a808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80341170370
GetUlongPtrFromAddress: unable to read from fffff80341170488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`045b8eb0 00000000`00300000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 : nvlddmkm+0x64808
fffff880`045b8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a : 0x300000
fffff880`045b8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880045b84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80067eba3d0, Address of the instruction which caused the BugCheck
Arg3: fffff8800abd2d10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7541

    Key  : Analysis.Init.CPU.mSec
    Value: 842

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27529

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80067eba3d0

BUGCHECK_P3: fffff8800abd2d10

BUGCHECK_P4: 0

CONTEXT:  fffff8800abd2d10 -- (.cxr 0xfffff8800abd2d10)
rax=00000000c0000034 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800abd3c01 rsi=fffff901000b9750 rdi=ffffffffc0000034
rip=fffff80067eba3d0 rsp=fffff8800abd3718 rbp=fffff8800abd3820
 r8=fffffa80094d1370  r9=fffff8a003b6c580 r10=fffffa8006a2a760
r11=fffff8800abd3700 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!IoGetRelatedDeviceObject:
fffff800`67eba3d0 488b4110        mov     rax,qword ptr [rcx+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
fffff880`0abd3718 fffff960`0009d473     : 00000000`00000000 00000000`00000000 fffff901`000b9750 00000000`00000000 : nt!IoGetRelatedDeviceObject
fffff880`0abd3720 00000000`00000000     : 00000000`00000000 fffff901`000b9750 00000000`00000000 00000000`00000000 : win32k+0x77473


SYMBOL_NAME:  win32k+77473

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .cxr 0xfffff8800abd2d10 ; kb

BUCKET_ID_FUNC_OFFSET:  77473

FAILURE_BUCKET_ID:  0x3B_c0000005_win32k!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {8ffa81ae-e629-24c5-067f-7d1473d12e2c}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800499d805, The address that the exception occurred at
Arg3: fffff88003395ca8, Exception Record Address
Arg4: fffff880033954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9540

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800499d805

BUGCHECK_P3: fffff88003395ca8

BUGCHECK_P4: fffff880033954e0

EXCEPTION_RECORD:  fffff88003395ca8 -- (.exr 0xfffff88003395ca8)
ExceptionAddress: fffff8800499d805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880033954e0 -- (.cxr 0xfffff880033954e0)
rax=0000000000000000 rbx=fffffa80070951d0 rcx=d08e77d4e2230000
rdx=8000000000000020 rsi=fffffa80070951d0 rdi=0000000000000000
rip=fffff8800499d805 rsp=fffff88003395ee0 rbp=fffffa8008db9010
 r8=fffff88004498870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c11310 r12=000000000000000f r13=fffff880033962f8
r14=0000000000000000 r15=fffffa8008b95000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0499d805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80360361370
GetUlongPtrFromAddress: unable to read from fffff80360361488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03395ee0 fffff880`04942c90     : fffff880`048caffd fffff880`03743c1d fffff880`038587ac fffff880`0386675f : nvlddmkm+0xd2a805
fffff880`03395ee8 fffff880`048caffd     : fffff880`03743c1d fffff880`038587ac fffff880`0386675f fffff880`03855928 : nvlddmkm+0xccfc90
fffff880`03395ef0 fffff880`03743c1d     : fffff880`038587ac fffff880`0386675f fffff880`03855928 fffff880`0384e614 : nvlddmkm+0xc57ffd
fffff880`03395ef8 fffff880`038587ac     : fffff880`0386675f fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 : dxgkrnl+0x8dc1d
fffff880`03395f00 fffff880`0386675f     : fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 : dxgmms1+0x287ac
fffff880`03395f08 fffff880`03855928     : fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03395f10 fffff880`0384e614     : fffff880`0386eba5 fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 : dxgmms1+0x25928
fffff880`03395f18 fffff880`0386eba5     : fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 : dxgmms1+0x1e614
fffff880`03395f20 fffff880`0386e662     : 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03395f28 00000000`00000001     : ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 : dxgmms1+0x3e662
fffff880`03395f30 ffff280e`74edbc03     : fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 : 0x1
fffff880`03395f38 fffff880`03395f98     : 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 : 0xffff280e`74edbc03
fffff880`03395f40 00000000`00000000     : fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 00000000`0000000f : 0xfffff880`03395f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880033954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004996805, The address that the exception occurred at
Arg3: fffff880067a1ca8, Exception Record Address
Arg4: fffff880067a14e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10799

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30714

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004996805

BUGCHECK_P3: fffff880067a1ca8

BUGCHECK_P4: fffff880067a14e0

EXCEPTION_RECORD:  fffff880067a1ca8 -- (.exr 0xfffff880067a1ca8)
ExceptionAddress: fffff88004996805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880067a14e0 -- (.cxr 0xfffff880067a14e0)
rax=0000000000000000 rbx=fffffa800bc16240 rcx=09bba9bc1bf40000
rdx=8000000000000020 rsi=fffffa800bc16240 rdi=0000000000000000
rip=fffff88004996805 rsp=fffff880067a1ee0 rbp=fffffa8008d4c3d0
 r8=fffff88004491870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007ba2010 r12=000000000000000f r13=fffff880067a22f8
r14=0000000000000000 r15=fffffa8008bd4000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04996805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800c07c8370
GetUlongPtrFromAddress: unable to read from fffff800c07c8488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`067a1ee0 fffff880`0493bc90     : fffff880`048c3ffd fffff880`036adc1d fffff880`037c27ac fffff880`037d075f : nvlddmkm+0xd2a805
fffff880`067a1ee8 fffff880`048c3ffd     : fffff880`036adc1d fffff880`037c27ac fffff880`037d075f fffff880`037bf928 : nvlddmkm+0xccfc90
fffff880`067a1ef0 fffff880`036adc1d     : fffff880`037c27ac fffff880`037d075f fffff880`037bf928 fffff880`037b8614 : nvlddmkm+0xc57ffd
fffff880`067a1ef8 fffff880`037c27ac     : fffff880`037d075f fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 : dxgkrnl+0x8dc1d
fffff880`067a1f00 fffff880`037d075f     : fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 : dxgmms1+0x287ac
fffff880`067a1f08 fffff880`037bf928     : fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 : dxgmms1+0x3675f
fffff880`067a1f10 fffff880`037b8614     : fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 : dxgmms1+0x25928
fffff880`067a1f18 fffff880`037d8ba5     : fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 : dxgmms1+0x1e614
fffff880`067a1f20 fffff880`037d8662     : 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`067a1f28 00000000`00000001     : fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 : dxgmms1+0x3e662
fffff880`067a1f30 fffff13b`afc605d4     : fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 : 0x1
fffff880`067a1f38 fffff880`067a1f98     : 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 : 0xfffff13b`afc605d4
fffff880`067a1f40 00000000`00000000     : fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 00000000`0000000f : 0xfffff880`067a1f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880067a14e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
Muhtemelen ekran kartında donanımsal bir sorun var. Kartın marka/modeli neydi?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800493b805, The address that the exception occurred at
Arg3: fffff88006b1fca8, Exception Record Address
Arg4: fffff88006b1f4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3967

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36422

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800493b805

BUGCHECK_P3: fffff88006b1fca8

BUGCHECK_P4: fffff88006b1f4e0

EXCEPTION_RECORD:  fffff88006b1fca8 -- (.exr 0xfffff88006b1fca8)
ExceptionAddress: fffff8800493b805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006b1f4e0 -- (.cxr 0xfffff88006b1f4e0)
rax=0000000000000000 rbx=fffffa800b348440 rcx=af4bf467c96c0000
rdx=8000000000000020 rsi=fffffa800b348440 rdi=0000000000000000
rip=fffff8800493b805 rsp=fffff88006b1fee0 rbp=fffffa8008d81010
 r8=fffff88004436870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c44010 r12=000000000000000f r13=fffff88006b202f8
r14=0000000000000000 r15=fffffa8008acb000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0493b805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff803769d4370
GetUlongPtrFromAddress: unable to read from fffff803769d4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06b1fee0 fffff880`048e0c90     : fffff880`04868ffd fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f : nvlddmkm+0xd2a805
fffff880`06b1fee8 fffff880`04868ffd     : fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 : nvlddmkm+0xccfc90
fffff880`06b1fef0 fffff880`0373ac1d     : fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 fffff880`03845614 : nvlddmkm+0xc57ffd
fffff880`06b1fef8 fffff880`0384f7ac     : fffff880`0385d75f fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 : dxgkrnl+0x8dc1d
fffff880`06b1ff00 fffff880`0385d75f     : fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 fffff880`03865662 : dxgmms1+0x287ac
fffff880`06b1ff08 fffff880`0384c928     : fffff880`03845614 fffff880`03865ba5 fffff880`03865662 00000000`00000001 : dxgmms1+0x3675f
fffff880`06b1ff10 fffff880`03845614     : fffff880`03865ba5 fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c : dxgmms1+0x25928
fffff880`06b1ff18 fffff880`03865ba5     : fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 : dxgmms1+0x1e614
fffff880`06b1ff20 fffff880`03865662     : 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`06b1ff28 00000000`00000001     : ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 : dxgmms1+0x3e662
fffff880`06b1ff30 ffff57cb`f2d6374c     : fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 : 0x1
fffff880`06b1ff38 fffff880`06b1ff98     : 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 : 0xffff57cb`f2d6374c
fffff880`06b1ff40 00000000`00000000     : fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 00000000`0000000f : 0xfffff880`06b1ff98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006b1f4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004c02805, The address that the exception occurred at
Arg3: fffff88003deaca8, Exception Record Address
Arg4: fffff88003dea4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6336

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32290

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004c02805

BUGCHECK_P3: fffff88003deaca8

BUGCHECK_P4: fffff88003dea4e0

EXCEPTION_RECORD:  fffff88003deaca8 -- (.exr 0xfffff88003deaca8)
ExceptionAddress: fffff88004c02805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88003dea4e0 -- (.cxr 0xfffff88003dea4e0)
rax=0000000000000000 rbx=fffffa800c2a36a0 rcx=faa23635bd000000
rdx=8000000000000020 rsi=fffffa800c2a36a0 rdi=0000000000000000
rip=fffff88004c02805 rsp=fffff88003deaee0 rbp=fffffa8008d4eb90
 r8=fffff880046fd870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007be9320 r12=000000000000000f r13=fffff88003deb2f8
r14=0000000000000000 r15=fffffa8008bbd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04c02805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80014568370
GetUlongPtrFromAddress: unable to read from fffff80014568488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03deaee0 00000002`00000000     : 00000000`00000000 ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 : nvlddmkm+0xd2a805
fffff880`03deaee8 00000000`00000000     : ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88003dea4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003d4c808, The address that the exception occurred at
Arg3: fffff88006ac8c78, Exception Record Address
Arg4: fffff88006ac84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11547

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88003d4c808

BUGCHECK_P3: fffff88006ac8c78

BUGCHECK_P4: fffff88006ac84b0

EXCEPTION_RECORD:  fffff88006ac8c78 -- (.exr 0xfffff88006ac8c78)
ExceptionAddress: fffff88003d4c808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff88006ac84b0 -- (.cxr 0xfffff88006ac84b0)
rax=fffff88006ac8ed8 rbx=0000000000000000 rcx=fffffa800a7edcd0
rdx=0000000000010000 rsi=fffffa800a7edcd0 rdi=0000000000000000
rip=fffff88003d4c808 rsp=fffff88006ac8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000840000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000160000 r13=fffff88006ac92f8
r14=0000000000010000 r15=fffffa8008962000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`03d4c808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8007e16e370
GetUlongPtrFromAddress: unable to read from fffff8007e16e488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ac8eb0 00000000`00160000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 : nvlddmkm+0x64808
fffff880`06ac8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a : 0x160000
fffff880`06ac8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ac84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a1e805, The address that the exception occurred at
Arg3: fffff88006cb2ca8, Exception Record Address
Arg4: fffff88006cb24e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14208

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a1e805

BUGCHECK_P3: fffff88006cb2ca8

BUGCHECK_P4: fffff88006cb24e0

EXCEPTION_RECORD:  fffff88006cb2ca8 -- (.exr 0xfffff88006cb2ca8)
ExceptionAddress: fffff88004a1e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006cb24e0 -- (.cxr 0xfffff88006cb24e0)
rax=0000000000000000 rbx=fffffa800b736e20 rcx=40ec49b12adf0000
rdx=8000000000000020 rsi=fffffa800b736e20 rdi=0000000000000000
rip=fffff88004a1e805 rsp=fffff88006cb2ee0 rbp=fffffa8008cf7010
 r8=fffff88004519870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007baf360 r12=000000000000000f r13=fffff88006cb32f8
r14=0000000000000000 r15=fffffa80088d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`04a1e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80016d74370
GetUlongPtrFromAddress: unable to read from fffff80016d74488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06cb2ee0 00000002`00000000     : 00000000`00000000 ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 : nvlddmkm+0xd2a805
fffff880`06cb2ee8 00000000`00000000     : ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006cb24e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004935805, The address that the exception occurred at
Arg3: fffff88003595ca8, Exception Record Address
Arg4: fffff880035954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12382

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28185

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004935805

BUGCHECK_P3: fffff88003595ca8

BUGCHECK_P4: fffff880035954e0

EXCEPTION_RECORD:  fffff88003595ca8 -- (.exr 0xfffff88003595ca8)
ExceptionAddress: fffff88004935805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880035954e0 -- (.cxr 0xfffff880035954e0)
rax=0000000000000000 rbx=fffffa800c780cf0 rcx=3acd7e4ab2670000
rdx=8000000000000020 rsi=fffffa800c780cf0 rdi=0000000000000000
rip=fffff88004935805 rsp=fffff88003595ee0 rbp=fffffa8008d92010
 r8=fffff88004430870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c81310 r12=000000000000000f r13=fffff880035962f8
r14=0000000000000000 r15=fffffa80089fa000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04935805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80042559370
GetUlongPtrFromAddress: unable to read from fffff80042559488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03595ee0 fffff880`048dac90     : fffff880`04862ffd fffff880`038e9c1d fffff880`038287ac fffff880`0383675f : nvlddmkm+0xd2a805
fffff880`03595ee8 fffff880`04862ffd     : fffff880`038e9c1d fffff880`038287ac fffff880`0383675f fffff880`03825928 : nvlddmkm+0xccfc90
fffff880`03595ef0 fffff880`038e9c1d     : fffff880`038287ac fffff880`0383675f fffff880`03825928 fffff880`0381e614 : nvlddmkm+0xc57ffd
fffff880`03595ef8 fffff880`038287ac     : fffff880`0383675f fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 : dxgkrnl+0x8dc1d
fffff880`03595f00 fffff880`0383675f     : fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 : dxgmms1+0x287ac
fffff880`03595f08 fffff880`03825928     : fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03595f10 fffff880`0381e614     : fffff880`0383eba5 fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 : dxgmms1+0x25928
fffff880`03595f18 fffff880`0383eba5     : fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 : dxgmms1+0x1e614
fffff880`03595f20 fffff880`0383e662     : 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03595f28 00000000`00000001     : ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 : dxgmms1+0x3e662
fffff880`03595f30 ffffc24d`7d13ec47     : fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 : 0x1
fffff880`03595f38 fffff880`03595f98     : 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 : 0xffffc24d`7d13ec47
fffff880`03595f40 00000000`00000000     : fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 00000000`0000000f : 0xfffff880`03595f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880035954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004975789, The address that the exception occurred at
Arg3: fffff88006c96ca8, Exception Record Address
Arg4: fffff88006c964e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3548

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36792

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004975789

BUGCHECK_P3: fffff88006c96ca8

BUGCHECK_P4: fffff88006c964e0

EXCEPTION_RECORD:  fffff88006c96ca8 -- (.exr 0xfffff88006c96ca8)
ExceptionAddress: fffff88004975789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006c964e0 -- (.cxr 0xfffff88006c964e0)
rax=0000000000000000 rbx=fffffa800da27390 rcx=5f4c1a54576a0000
rdx=8000000000000020 rsi=fffffa800da27390 rdi=0000000000000000
rip=fffff88004975789 rsp=fffff88006c96ee0 rbp=fffffa8008c827f0
 r8=fffff88004470880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bff310 r12=000000000000000f r13=fffff88006c972f8
r14=0000000000000000 r15=fffffa8008b93000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a789:
fffff880`04975789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80199b73370
GetUlongPtrFromAddress: unable to read from fffff80199b73488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06c96ee0 00000000`00010000     : fffffa80`07215010 ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 : nvlddmkm+0xd2a789
fffff880`06c96ee8 fffffa80`07215010     : ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 : 0x10000
fffff880`06c96ef0 ffffd048`64772013     : 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 : 0xfffffa80`07215010
fffff880`06c96ef8 00000000`00000000     : fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 fffffa80`0992f3e8 : 0xffffd048`64772013


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006c964e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007024805, The address that the exception occurred at
Arg3: fffff88004c6eca8, Exception Record Address
Arg4: fffff88004c6e4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9616

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44057

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88007024805

BUGCHECK_P3: fffff88004c6eca8

BUGCHECK_P4: fffff88004c6e4e0

EXCEPTION_RECORD:  fffff88004c6eca8 -- (.exr 0xfffff88004c6eca8)
ExceptionAddress: fffff88007024805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88004c6e4e0 -- (.cxr 0xfffff88004c6e4e0)
rax=0000000000000000 rbx=fffffa80074ed8f0 rcx=47bfb1cfa9dd0000
rdx=8000000000000020 rsi=fffffa80074ed8f0 rdi=0000000000000000
rip=fffff88007024805 rsp=fffff88004c6eee0 rbp=fffffa8008c10010
 r8=fffff88006b1f870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007aa81e0 r12=000000000000000f r13=fffff88004c6f2f8
r14=0000000000000000 r15=fffffa80088d3000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`07024805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802a0965370
GetUlongPtrFromAddress: unable to read from fffff802a0965488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`04c6eee0 fffff880`06fc9c90     : fffff880`06f51ffd fffff880`0371ac1d fffff880`036397ac fffff880`0364775f : nvlddmkm+0xd2a805
fffff880`04c6eee8 fffff880`06f51ffd     : fffff880`0371ac1d fffff880`036397ac fffff880`0364775f fffff880`03636928 : nvlddmkm+0xccfc90
fffff880`04c6eef0 fffff880`0371ac1d     : fffff880`036397ac fffff880`0364775f fffff880`03636928 fffff880`0362f614 : nvlddmkm+0xc57ffd
fffff880`04c6eef8 fffff880`036397ac     : fffff880`0364775f fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 : dxgkrnl+0x8dc1d
fffff880`04c6ef00 fffff880`0364775f     : fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 : dxgmms1+0x287ac
fffff880`04c6ef08 fffff880`03636928     : fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 00000000`00000001 : dxgmms1+0x3675f
fffff880`04c6ef10 fffff880`0362f614     : fffff880`0364fba5 fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd : dxgmms1+0x25928
fffff880`04c6ef18 fffff880`0364fba5     : fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 : dxgmms1+0x1e614
fffff880`04c6ef20 fffff880`0364f662     : 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`04c6ef28 00000000`00000001     : ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 : dxgmms1+0x3e662
fffff880`04c6ef30 ffffbf3f`b50947fd     : fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 : 0x1
fffff880`04c6ef38 fffff880`04c6ef98     : 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 : 0xffffbf3f`b50947fd
fffff880`04c6ef40 00000000`00000000     : fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 00000000`0000000f : 0xfffff880`04c6ef98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88004c6e4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006ff7789, The address that the exception occurred at
Arg3: fffff880044f8ca8, Exception Record Address
Arg4: fffff880044f84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8734

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30490

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006ff7789

BUGCHECK_P3: fffff880044f8ca8

BUGCHECK_P4: fffff880044f84e0

EXCEPTION_RECORD:  fffff880044f8ca8 -- (.exr 0xfffff880044f8ca8)
ExceptionAddress: fffff88006ff7789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044f84e0 -- (.cxr 0xfffff880044f84e0)
rax=0000000000000000 rbx=fffffa800c13ca70 rcx=3078f1ab8d320000
rdx=8000000000000020 rsi=fffffa800c13ca70 rdi=0000000000000000
rip=fffff88006ff7789 rsp=fffff880044f8ee0 rbp=fffffa8008ce0010
 r8=fffff88006af2880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bbe310 r12=000000000000000f r13=fffff880044f92f8
r14=0000000000000000 r15=fffffa8008b22000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06ff7789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80166bd4370
GetUlongPtrFromAddress: unable to read from fffff80166bd4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044f8ee0 fffff880`06f9cc4c     : fffff880`06f24ffd fffff880`036fdc1d fffff880`036287ac fffff880`0363675f : nvlddmkm+0xd2a789
fffff880`044f8ee8 fffff880`06f24ffd     : fffff880`036fdc1d fffff880`036287ac fffff880`0363675f fffff880`03625928 : nvlddmkm+0xccfc4c
fffff880`044f8ef0 fffff880`036fdc1d     : fffff880`036287ac fffff880`0363675f fffff880`03625928 fffff880`0361e614 : nvlddmkm+0xc57ffd
fffff880`044f8ef8 fffff880`036287ac     : fffff880`0363675f fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 : dxgkrnl+0x8dc1d
fffff880`044f8f00 fffff880`0363675f     : fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 : dxgmms1+0x287ac
fffff880`044f8f08 fffff880`03625928     : fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`044f8f10 fffff880`0361e614     : fffff880`0363eba5 fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 : dxgmms1+0x25928
fffff880`044f8f18 fffff880`0363eba5     : fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 : dxgmms1+0x1e614
fffff880`044f8f20 fffff880`0363e662     : 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`044f8f28 00000000`00000001     : ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 : dxgmms1+0x3e662
fffff880`044f8f30 ffffc8f8`f5e40312     : fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 : 0x1
fffff880`044f8f38 fffff880`044f8f98     : 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 : 0xffffc8f8`f5e40312
fffff880`044f8f40 00000000`00000000     : fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 00000000`0000000f : 0xfffff880`044f8f98


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044f84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880049d3805, The address that the exception occurred at
Arg3: fffff88006ca5ca8, Exception Record Address
Arg4: fffff88006ca54e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4369

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 35622

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880049d3805

BUGCHECK_P3: fffff88006ca5ca8

BUGCHECK_P4: fffff88006ca54e0

EXCEPTION_RECORD:  fffff88006ca5ca8 -- (.exr 0xfffff88006ca5ca8)
ExceptionAddress: fffff880049d3805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006ca54e0 -- (.cxr 0xfffff88006ca54e0)
rax=0000000000000000 rbx=fffffa800be4b990 rcx=c2717396e1af0000
rdx=8000000000000020 rsi=fffffa800be4b990 rdi=0000000000000000
rip=fffff880049d3805 rsp=fffff88006ca5ee0 rbp=fffffa8008d435e0
 r8=fffff880044ce870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c2d310 r12=000000000000000f r13=fffff88006ca62f8
r14=0000000000000000 r15=fffffa8008a0d000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`049d3805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8016db5b370
GetUlongPtrFromAddress: unable to read from fffff8016db5b488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ca5ee0 fffff880`04978c90     : fffff880`04900ffd ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 : nvlddmkm+0xd2a805
fffff880`06ca5ee8 fffff880`04900ffd     : ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 : nvlddmkm+0xccfc90
fffff880`06ca5ef0 ffff7f46`273d97e9     : fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06ca5ef8 fffff880`038767ac     : fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 fffffa80`094f0028 : 0xffff7f46`273d97e9
fffff880`06ca5f00 fffffa80`08d3d840     : fffff880`009c0180 00000000`00000000 fffffa80`094f0028 00000000`00000000 : dxgmms1+0x287ac
fffff880`06ca5f08 fffff880`009c0180     : 00000000`00000000 fffffa80`094f0028 00000000`00000000 00000000`00000000 : 0xfffffa80`08d3d840
fffff880`06ca5f10 00000000`00000000     : fffffa80`094f0028 00000000`00000000 00000000`00000000 fffffa80`08d3d700 : 0xfffff880`009c0180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ca54e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006fb9789, The address that the exception occurred at
Arg3: fffff880044abca8, Exception Record Address
Arg4: fffff880044ab4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3711

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006fb9789

BUGCHECK_P3: fffff880044abca8

BUGCHECK_P4: fffff880044ab4e0

EXCEPTION_RECORD:  fffff880044abca8 -- (.exr 0xfffff880044abca8)
ExceptionAddress: fffff88006fb9789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044ab4e0 -- (.cxr 0xfffff880044ab4e0)
rax=0000000000000000 rbx=fffffa800c243510 rcx=213f9e6ed8100000
rdx=8000000000000020 rsi=fffffa800c243510 rdi=0000000000000000
rip=fffff88006fb9789 rsp=fffff880044abee0 rbp=fffffa8008cb1010
 r8=fffff88006ab4880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c24330 r12=000000000000000f r13=fffff880044ac2f8
r14=0000000000000000 r15=fffffa8008969000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06fb9789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8017cfdd370
GetUlongPtrFromAddress: unable to read from fffff8017cfdd488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044abee0 00000002`00000000     : 00000000`00000000 fffffa80`08aea1a8 00000004`00000000 00000000`00000000 : nvlddmkm+0xd2a789
fffff880`044abee8 00000000`00000000     : fffffa80`08aea1a8 00000004`00000000 00000000`00000000 fffff880`044ac000 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044ab4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800515e805, The address that the exception occurred at
Arg3: fffff88006da8ca8, Exception Record Address
Arg4: fffff88006da84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1842

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13524

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28699

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800515e805

BUGCHECK_P3: fffff88006da8ca8

BUGCHECK_P4: fffff88006da84e0

EXCEPTION_RECORD:  fffff88006da8ca8 -- (.exr 0xfffff88006da8ca8)
ExceptionAddress: fffff8800515e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006da84e0 -- (.cxr 0xfffff88006da84e0)
rax=0000000000000000 rbx=fffffa800c0df500 rcx=3c8edfd421450000
rdx=8000000000000020 rsi=fffffa800c0df500 rdi=0000000000000000
rip=fffff8800515e805 rsp=fffff88006da8ee0 rbp=fffffa800907f010
 r8=fffff88004c59870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007e2e730 r12=000000000000000f r13=fffff88006da92f8
r14=0000000000000000 r15=fffffa8008bfd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`0515e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802f1bc5370
GetUlongPtrFromAddress: unable to read from fffff802f1bc5488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06da8ee0 fffff880`05103c90     : fffff880`0508bffd ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 : nvlddmkm+0xd2a805
fffff880`06da8ee8 fffff880`0508bffd     : ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 : nvlddmkm+0xccfc90
fffff880`06da8ef0 ffffb2a5`7206a005     : fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06da8ef8 fffff880`03c287ac     : fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 : 0xffffb2a5`7206a005
fffff880`06da8f00 fffffa80`0907a840     : fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 : dxgmms1+0x287ac
fffff880`06da8f08 fffff802`f1b65180     : 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 : 0xfffffa80`0907a840
fffff880`06da8f10 00000000`00000000     : fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 fffffa80`0907a700 : nt!KiInitialPCR+0x180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006da84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006c8a808, The address that the exception occurred at
Arg3: fffff880045b8c78, Exception Record Address
Arg4: fffff880045b84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12490

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27234

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006c8a808

BUGCHECK_P3: fffff880045b8c78

BUGCHECK_P4: fffff880045b84b0

EXCEPTION_RECORD:  fffff880045b8c78 -- (.exr 0xfffff880045b8c78)
ExceptionAddress: fffff88006c8a808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff880045b84b0 -- (.cxr 0xfffff880045b84b0)
rax=fffff880045b8ed8 rbx=0000000000000000 rcx=fffffa800e06a800
rdx=0000000000010000 rsi=fffffa800e06a800 rdi=0000000000000000
rip=fffff88006c8a808 rsp=fffff880045b8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000001200000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000300000 r13=fffff880045b92f8
r14=0000000000010000 r15=fffffa8008e52000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`06c8a808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80341170370
GetUlongPtrFromAddress: unable to read from fffff80341170488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`045b8eb0 00000000`00300000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 : nvlddmkm+0x64808
fffff880`045b8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a : 0x300000
fffff880`045b8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880045b84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80067eba3d0, Address of the instruction which caused the BugCheck
Arg3: fffff8800abd2d10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7541

    Key  : Analysis.Init.CPU.mSec
    Value: 842

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27529

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80067eba3d0

BUGCHECK_P3: fffff8800abd2d10

BUGCHECK_P4: 0

CONTEXT:  fffff8800abd2d10 -- (.cxr 0xfffff8800abd2d10)
rax=00000000c0000034 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800abd3c01 rsi=fffff901000b9750 rdi=ffffffffc0000034
rip=fffff80067eba3d0 rsp=fffff8800abd3718 rbp=fffff8800abd3820
 r8=fffffa80094d1370  r9=fffff8a003b6c580 r10=fffffa8006a2a760
r11=fffff8800abd3700 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!IoGetRelatedDeviceObject:
fffff800`67eba3d0 488b4110        mov     rax,qword ptr [rcx+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
fffff880`0abd3718 fffff960`0009d473     : 00000000`00000000 00000000`00000000 fffff901`000b9750 00000000`00000000 : nt!IoGetRelatedDeviceObject
fffff880`0abd3720 00000000`00000000     : 00000000`00000000 fffff901`000b9750 00000000`00000000 00000000`00000000 : win32k+0x77473


SYMBOL_NAME:  win32k+77473

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .cxr 0xfffff8800abd2d10 ; kb

BUCKET_ID_FUNC_OFFSET:  77473

FAILURE_BUCKET_ID:  0x3B_c0000005_win32k!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {8ffa81ae-e629-24c5-067f-7d1473d12e2c}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800499d805, The address that the exception occurred at
Arg3: fffff88003395ca8, Exception Record Address
Arg4: fffff880033954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9540

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800499d805

BUGCHECK_P3: fffff88003395ca8

BUGCHECK_P4: fffff880033954e0

EXCEPTION_RECORD:  fffff88003395ca8 -- (.exr 0xfffff88003395ca8)
ExceptionAddress: fffff8800499d805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880033954e0 -- (.cxr 0xfffff880033954e0)
rax=0000000000000000 rbx=fffffa80070951d0 rcx=d08e77d4e2230000
rdx=8000000000000020 rsi=fffffa80070951d0 rdi=0000000000000000
rip=fffff8800499d805 rsp=fffff88003395ee0 rbp=fffffa8008db9010
 r8=fffff88004498870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c11310 r12=000000000000000f r13=fffff880033962f8
r14=0000000000000000 r15=fffffa8008b95000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0499d805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80360361370
GetUlongPtrFromAddress: unable to read from fffff80360361488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03395ee0 fffff880`04942c90     : fffff880`048caffd fffff880`03743c1d fffff880`038587ac fffff880`0386675f : nvlddmkm+0xd2a805
fffff880`03395ee8 fffff880`048caffd     : fffff880`03743c1d fffff880`038587ac fffff880`0386675f fffff880`03855928 : nvlddmkm+0xccfc90
fffff880`03395ef0 fffff880`03743c1d     : fffff880`038587ac fffff880`0386675f fffff880`03855928 fffff880`0384e614 : nvlddmkm+0xc57ffd
fffff880`03395ef8 fffff880`038587ac     : fffff880`0386675f fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 : dxgkrnl+0x8dc1d
fffff880`03395f00 fffff880`0386675f     : fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 : dxgmms1+0x287ac
fffff880`03395f08 fffff880`03855928     : fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03395f10 fffff880`0384e614     : fffff880`0386eba5 fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 : dxgmms1+0x25928
fffff880`03395f18 fffff880`0386eba5     : fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 : dxgmms1+0x1e614
fffff880`03395f20 fffff880`0386e662     : 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03395f28 00000000`00000001     : ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 : dxgmms1+0x3e662
fffff880`03395f30 ffff280e`74edbc03     : fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 : 0x1
fffff880`03395f38 fffff880`03395f98     : 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 : 0xffff280e`74edbc03
fffff880`03395f40 00000000`00000000     : fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 00000000`0000000f : 0xfffff880`03395f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880033954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004996805, The address that the exception occurred at
Arg3: fffff880067a1ca8, Exception Record Address
Arg4: fffff880067a14e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10799

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30714

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004996805

BUGCHECK_P3: fffff880067a1ca8

BUGCHECK_P4: fffff880067a14e0

EXCEPTION_RECORD:  fffff880067a1ca8 -- (.exr 0xfffff880067a1ca8)
ExceptionAddress: fffff88004996805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880067a14e0 -- (.cxr 0xfffff880067a14e0)
rax=0000000000000000 rbx=fffffa800bc16240 rcx=09bba9bc1bf40000
rdx=8000000000000020 rsi=fffffa800bc16240 rdi=0000000000000000
rip=fffff88004996805 rsp=fffff880067a1ee0 rbp=fffffa8008d4c3d0
 r8=fffff88004491870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007ba2010 r12=000000000000000f r13=fffff880067a22f8
r14=0000000000000000 r15=fffffa8008bd4000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04996805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800c07c8370
GetUlongPtrFromAddress: unable to read from fffff800c07c8488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`067a1ee0 fffff880`0493bc90     : fffff880`048c3ffd fffff880`036adc1d fffff880`037c27ac fffff880`037d075f : nvlddmkm+0xd2a805
fffff880`067a1ee8 fffff880`048c3ffd     : fffff880`036adc1d fffff880`037c27ac fffff880`037d075f fffff880`037bf928 : nvlddmkm+0xccfc90
fffff880`067a1ef0 fffff880`036adc1d     : fffff880`037c27ac fffff880`037d075f fffff880`037bf928 fffff880`037b8614 : nvlddmkm+0xc57ffd
fffff880`067a1ef8 fffff880`037c27ac     : fffff880`037d075f fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 : dxgkrnl+0x8dc1d
fffff880`067a1f00 fffff880`037d075f     : fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 : dxgmms1+0x287ac
fffff880`067a1f08 fffff880`037bf928     : fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 : dxgmms1+0x3675f
fffff880`067a1f10 fffff880`037b8614     : fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 : dxgmms1+0x25928
fffff880`067a1f18 fffff880`037d8ba5     : fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 : dxgmms1+0x1e614
fffff880`067a1f20 fffff880`037d8662     : 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`067a1f28 00000000`00000001     : fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 : dxgmms1+0x3e662
fffff880`067a1f30 fffff13b`afc605d4     : fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 : 0x1
fffff880`067a1f38 fffff880`067a1f98     : 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 : 0xfffff13b`afc605d4
fffff880`067a1f40 00000000`00000000     : fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 00000000`0000000f : 0xfffff880`067a1f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880067a14e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
NVIDIA GeForce GTX 1050
Aman ekran kartında donanımsal sıkıntı yoktur inşallah. Çok pahalı şimdi her şey zaten.
Abi sürücü çökmüş?

Dediğiniz gibi Easy Anti-Cheat'si kaldırdığımdan beri 1 kere bile çökmedi. Çok tuhaf bu uygulamayı aylardır belki de yıllardır çalıştırmıyordum bile.
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı