SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) hatası

İşletim sistemi
Windows 8

EgeMen67

Hectopat
Katılım
5 Nisan 2020
Mesajlar
9
Son zamanlarda bilgisayarım çok fazla mavi ekran vermeye başladı. BlueScreenView'dan baktığımda ise çoğu mavi ekran hatasının .sys dosyalarından kaynaklandığını gördüm. Ne yapmalıyım?
 

Dosya Ekleri

  • mini1.png
    mini1.png
    261,7 KB · Görüntüleme: 36
  • mini2.png
    mini2.png
    262,7 KB · Görüntüleme: 40
  • mini3.png
    mini3.png
    263,2 KB · Görüntüleme: 30
Son düzenleyen: Moderatör:
Muhtemelen ekran kartında donanımsal bir sorun var. Kartın marka/modeli neydi?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800493b805, The address that the exception occurred at
Arg3: fffff88006b1fca8, Exception Record Address
Arg4: fffff88006b1f4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3967

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36422

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800493b805

BUGCHECK_P3: fffff88006b1fca8

BUGCHECK_P4: fffff88006b1f4e0

EXCEPTION_RECORD:  fffff88006b1fca8 -- (.exr 0xfffff88006b1fca8)
ExceptionAddress: fffff8800493b805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006b1f4e0 -- (.cxr 0xfffff88006b1f4e0)
rax=0000000000000000 rbx=fffffa800b348440 rcx=af4bf467c96c0000
rdx=8000000000000020 rsi=fffffa800b348440 rdi=0000000000000000
rip=fffff8800493b805 rsp=fffff88006b1fee0 rbp=fffffa8008d81010
 r8=fffff88004436870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c44010 r12=000000000000000f r13=fffff88006b202f8
r14=0000000000000000 r15=fffffa8008acb000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0493b805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff803769d4370
GetUlongPtrFromAddress: unable to read from fffff803769d4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06b1fee0 fffff880`048e0c90     : fffff880`04868ffd fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f : nvlddmkm+0xd2a805
fffff880`06b1fee8 fffff880`04868ffd     : fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 : nvlddmkm+0xccfc90
fffff880`06b1fef0 fffff880`0373ac1d     : fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 fffff880`03845614 : nvlddmkm+0xc57ffd
fffff880`06b1fef8 fffff880`0384f7ac     : fffff880`0385d75f fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 : dxgkrnl+0x8dc1d
fffff880`06b1ff00 fffff880`0385d75f     : fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 fffff880`03865662 : dxgmms1+0x287ac
fffff880`06b1ff08 fffff880`0384c928     : fffff880`03845614 fffff880`03865ba5 fffff880`03865662 00000000`00000001 : dxgmms1+0x3675f
fffff880`06b1ff10 fffff880`03845614     : fffff880`03865ba5 fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c : dxgmms1+0x25928
fffff880`06b1ff18 fffff880`03865ba5     : fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 : dxgmms1+0x1e614
fffff880`06b1ff20 fffff880`03865662     : 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`06b1ff28 00000000`00000001     : ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 : dxgmms1+0x3e662
fffff880`06b1ff30 ffff57cb`f2d6374c     : fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 : 0x1
fffff880`06b1ff38 fffff880`06b1ff98     : 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 : 0xffff57cb`f2d6374c
fffff880`06b1ff40 00000000`00000000     : fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 00000000`0000000f : 0xfffff880`06b1ff98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006b1f4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004c02805, The address that the exception occurred at
Arg3: fffff88003deaca8, Exception Record Address
Arg4: fffff88003dea4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6336

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32290

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004c02805

BUGCHECK_P3: fffff88003deaca8

BUGCHECK_P4: fffff88003dea4e0

EXCEPTION_RECORD:  fffff88003deaca8 -- (.exr 0xfffff88003deaca8)
ExceptionAddress: fffff88004c02805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88003dea4e0 -- (.cxr 0xfffff88003dea4e0)
rax=0000000000000000 rbx=fffffa800c2a36a0 rcx=faa23635bd000000
rdx=8000000000000020 rsi=fffffa800c2a36a0 rdi=0000000000000000
rip=fffff88004c02805 rsp=fffff88003deaee0 rbp=fffffa8008d4eb90
 r8=fffff880046fd870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007be9320 r12=000000000000000f r13=fffff88003deb2f8
r14=0000000000000000 r15=fffffa8008bbd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04c02805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80014568370
GetUlongPtrFromAddress: unable to read from fffff80014568488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`03deaee0 00000002`00000000     : 00000000`00000000 ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 : nvlddmkm+0xd2a805
fffff880`03deaee8 00000000`00000000     : ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88003dea4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003d4c808, The address that the exception occurred at
Arg3: fffff88006ac8c78, Exception Record Address
Arg4: fffff88006ac84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11547

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88003d4c808

BUGCHECK_P3: fffff88006ac8c78

BUGCHECK_P4: fffff88006ac84b0

EXCEPTION_RECORD:  fffff88006ac8c78 -- (.exr 0xfffff88006ac8c78)
ExceptionAddress: fffff88003d4c808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff88006ac84b0 -- (.cxr 0xfffff88006ac84b0)
rax=fffff88006ac8ed8 rbx=0000000000000000 rcx=fffffa800a7edcd0
rdx=0000000000010000 rsi=fffffa800a7edcd0 rdi=0000000000000000
rip=fffff88003d4c808 rsp=fffff88006ac8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000840000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000160000 r13=fffff88006ac92f8
r14=0000000000010000 r15=fffffa8008962000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`03d4c808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8007e16e370
GetUlongPtrFromAddress: unable to read from fffff8007e16e488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06ac8eb0 00000000`00160000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 : nvlddmkm+0x64808
fffff880`06ac8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a : 0x160000
fffff880`06ac8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ac84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a1e805, The address that the exception occurred at
Arg3: fffff88006cb2ca8, Exception Record Address
Arg4: fffff88006cb24e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14208

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a1e805

BUGCHECK_P3: fffff88006cb2ca8

BUGCHECK_P4: fffff88006cb24e0

EXCEPTION_RECORD:  fffff88006cb2ca8 -- (.exr 0xfffff88006cb2ca8)
ExceptionAddress: fffff88004a1e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006cb24e0 -- (.cxr 0xfffff88006cb24e0)
rax=0000000000000000 rbx=fffffa800b736e20 rcx=40ec49b12adf0000
rdx=8000000000000020 rsi=fffffa800b736e20 rdi=0000000000000000
rip=fffff88004a1e805 rsp=fffff88006cb2ee0 rbp=fffffa8008cf7010
 r8=fffff88004519870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007baf360 r12=000000000000000f r13=fffff88006cb32f8
r14=0000000000000000 r15=fffffa80088d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`04a1e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80016d74370
GetUlongPtrFromAddress: unable to read from fffff80016d74488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06cb2ee0 00000002`00000000     : 00000000`00000000 ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 : nvlddmkm+0xd2a805
fffff880`06cb2ee8 00000000`00000000     : ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006cb24e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004935805, The address that the exception occurred at
Arg3: fffff88003595ca8, Exception Record Address
Arg4: fffff880035954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12382

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28185

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004935805

BUGCHECK_P3: fffff88003595ca8

BUGCHECK_P4: fffff880035954e0

EXCEPTION_RECORD:  fffff88003595ca8 -- (.exr 0xfffff88003595ca8)
ExceptionAddress: fffff88004935805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880035954e0 -- (.cxr 0xfffff880035954e0)
rax=0000000000000000 rbx=fffffa800c780cf0 rcx=3acd7e4ab2670000
rdx=8000000000000020 rsi=fffffa800c780cf0 rdi=0000000000000000
rip=fffff88004935805 rsp=fffff88003595ee0 rbp=fffffa8008d92010
 r8=fffff88004430870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c81310 r12=000000000000000f r13=fffff880035962f8
r14=0000000000000000 r15=fffffa80089fa000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04935805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80042559370
GetUlongPtrFromAddress: unable to read from fffff80042559488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`03595ee0 fffff880`048dac90     : fffff880`04862ffd fffff880`038e9c1d fffff880`038287ac fffff880`0383675f : nvlddmkm+0xd2a805
fffff880`03595ee8 fffff880`04862ffd     : fffff880`038e9c1d fffff880`038287ac fffff880`0383675f fffff880`03825928 : nvlddmkm+0xccfc90
fffff880`03595ef0 fffff880`038e9c1d     : fffff880`038287ac fffff880`0383675f fffff880`03825928 fffff880`0381e614 : nvlddmkm+0xc57ffd
fffff880`03595ef8 fffff880`038287ac     : fffff880`0383675f fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 : dxgkrnl+0x8dc1d
fffff880`03595f00 fffff880`0383675f     : fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 : dxgmms1+0x287ac
fffff880`03595f08 fffff880`03825928     : fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03595f10 fffff880`0381e614     : fffff880`0383eba5 fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 : dxgmms1+0x25928
fffff880`03595f18 fffff880`0383eba5     : fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 : dxgmms1+0x1e614
fffff880`03595f20 fffff880`0383e662     : 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03595f28 00000000`00000001     : ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 : dxgmms1+0x3e662
fffff880`03595f30 ffffc24d`7d13ec47     : fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 : 0x1
fffff880`03595f38 fffff880`03595f98     : 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 : 0xffffc24d`7d13ec47
fffff880`03595f40 00000000`00000000     : fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 00000000`0000000f : 0xfffff880`03595f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880035954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004975789, The address that the exception occurred at
Arg3: fffff88006c96ca8, Exception Record Address
Arg4: fffff88006c964e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3548

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36792

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004975789

BUGCHECK_P3: fffff88006c96ca8

BUGCHECK_P4: fffff88006c964e0

EXCEPTION_RECORD:  fffff88006c96ca8 -- (.exr 0xfffff88006c96ca8)
ExceptionAddress: fffff88004975789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006c964e0 -- (.cxr 0xfffff88006c964e0)
rax=0000000000000000 rbx=fffffa800da27390 rcx=5f4c1a54576a0000
rdx=8000000000000020 rsi=fffffa800da27390 rdi=0000000000000000
rip=fffff88004975789 rsp=fffff88006c96ee0 rbp=fffffa8008c827f0
 r8=fffff88004470880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bff310 r12=000000000000000f r13=fffff88006c972f8
r14=0000000000000000 r15=fffffa8008b93000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a789:
fffff880`04975789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80199b73370
GetUlongPtrFromAddress: unable to read from fffff80199b73488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06c96ee0 00000000`00010000     : fffffa80`07215010 ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 : nvlddmkm+0xd2a789
fffff880`06c96ee8 fffffa80`07215010     : ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 : 0x10000
fffff880`06c96ef0 ffffd048`64772013     : 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 : 0xfffffa80`07215010
fffff880`06c96ef8 00000000`00000000     : fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 fffffa80`0992f3e8 : 0xffffd048`64772013


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006c964e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007024805, The address that the exception occurred at
Arg3: fffff88004c6eca8, Exception Record Address
Arg4: fffff88004c6e4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9616

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44057

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88007024805

BUGCHECK_P3: fffff88004c6eca8

BUGCHECK_P4: fffff88004c6e4e0

EXCEPTION_RECORD:  fffff88004c6eca8 -- (.exr 0xfffff88004c6eca8)
ExceptionAddress: fffff88007024805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88004c6e4e0 -- (.cxr 0xfffff88004c6e4e0)
rax=0000000000000000 rbx=fffffa80074ed8f0 rcx=47bfb1cfa9dd0000
rdx=8000000000000020 rsi=fffffa80074ed8f0 rdi=0000000000000000
rip=fffff88007024805 rsp=fffff88004c6eee0 rbp=fffffa8008c10010
 r8=fffff88006b1f870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007aa81e0 r12=000000000000000f r13=fffff88004c6f2f8
r14=0000000000000000 r15=fffffa80088d3000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`07024805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802a0965370
GetUlongPtrFromAddress: unable to read from fffff802a0965488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`04c6eee0 fffff880`06fc9c90     : fffff880`06f51ffd fffff880`0371ac1d fffff880`036397ac fffff880`0364775f : nvlddmkm+0xd2a805
fffff880`04c6eee8 fffff880`06f51ffd     : fffff880`0371ac1d fffff880`036397ac fffff880`0364775f fffff880`03636928 : nvlddmkm+0xccfc90
fffff880`04c6eef0 fffff880`0371ac1d     : fffff880`036397ac fffff880`0364775f fffff880`03636928 fffff880`0362f614 : nvlddmkm+0xc57ffd
fffff880`04c6eef8 fffff880`036397ac     : fffff880`0364775f fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 : dxgkrnl+0x8dc1d
fffff880`04c6ef00 fffff880`0364775f     : fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 : dxgmms1+0x287ac
fffff880`04c6ef08 fffff880`03636928     : fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 00000000`00000001 : dxgmms1+0x3675f
fffff880`04c6ef10 fffff880`0362f614     : fffff880`0364fba5 fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd : dxgmms1+0x25928
fffff880`04c6ef18 fffff880`0364fba5     : fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 : dxgmms1+0x1e614
fffff880`04c6ef20 fffff880`0364f662     : 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`04c6ef28 00000000`00000001     : ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 : dxgmms1+0x3e662
fffff880`04c6ef30 ffffbf3f`b50947fd     : fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 : 0x1
fffff880`04c6ef38 fffff880`04c6ef98     : 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 : 0xffffbf3f`b50947fd
fffff880`04c6ef40 00000000`00000000     : fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 00000000`0000000f : 0xfffff880`04c6ef98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88004c6e4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006ff7789, The address that the exception occurred at
Arg3: fffff880044f8ca8, Exception Record Address
Arg4: fffff880044f84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8734

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30490

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006ff7789

BUGCHECK_P3: fffff880044f8ca8

BUGCHECK_P4: fffff880044f84e0

EXCEPTION_RECORD:  fffff880044f8ca8 -- (.exr 0xfffff880044f8ca8)
ExceptionAddress: fffff88006ff7789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044f84e0 -- (.cxr 0xfffff880044f84e0)
rax=0000000000000000 rbx=fffffa800c13ca70 rcx=3078f1ab8d320000
rdx=8000000000000020 rsi=fffffa800c13ca70 rdi=0000000000000000
rip=fffff88006ff7789 rsp=fffff880044f8ee0 rbp=fffffa8008ce0010
 r8=fffff88006af2880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bbe310 r12=000000000000000f r13=fffff880044f92f8
r14=0000000000000000 r15=fffffa8008b22000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06ff7789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80166bd4370
GetUlongPtrFromAddress: unable to read from fffff80166bd4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`044f8ee0 fffff880`06f9cc4c     : fffff880`06f24ffd fffff880`036fdc1d fffff880`036287ac fffff880`0363675f : nvlddmkm+0xd2a789
fffff880`044f8ee8 fffff880`06f24ffd     : fffff880`036fdc1d fffff880`036287ac fffff880`0363675f fffff880`03625928 : nvlddmkm+0xccfc4c
fffff880`044f8ef0 fffff880`036fdc1d     : fffff880`036287ac fffff880`0363675f fffff880`03625928 fffff880`0361e614 : nvlddmkm+0xc57ffd
fffff880`044f8ef8 fffff880`036287ac     : fffff880`0363675f fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 : dxgkrnl+0x8dc1d
fffff880`044f8f00 fffff880`0363675f     : fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 : dxgmms1+0x287ac
fffff880`044f8f08 fffff880`03625928     : fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`044f8f10 fffff880`0361e614     : fffff880`0363eba5 fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 : dxgmms1+0x25928
fffff880`044f8f18 fffff880`0363eba5     : fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 : dxgmms1+0x1e614
fffff880`044f8f20 fffff880`0363e662     : 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`044f8f28 00000000`00000001     : ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 : dxgmms1+0x3e662
fffff880`044f8f30 ffffc8f8`f5e40312     : fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 : 0x1
fffff880`044f8f38 fffff880`044f8f98     : 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 : 0xffffc8f8`f5e40312
fffff880`044f8f40 00000000`00000000     : fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 00000000`0000000f : 0xfffff880`044f8f98


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044f84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880049d3805, The address that the exception occurred at
Arg3: fffff88006ca5ca8, Exception Record Address
Arg4: fffff88006ca54e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4369

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 35622

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880049d3805

BUGCHECK_P3: fffff88006ca5ca8

BUGCHECK_P4: fffff88006ca54e0

EXCEPTION_RECORD:  fffff88006ca5ca8 -- (.exr 0xfffff88006ca5ca8)
ExceptionAddress: fffff880049d3805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006ca54e0 -- (.cxr 0xfffff88006ca54e0)
rax=0000000000000000 rbx=fffffa800be4b990 rcx=c2717396e1af0000
rdx=8000000000000020 rsi=fffffa800be4b990 rdi=0000000000000000
rip=fffff880049d3805 rsp=fffff88006ca5ee0 rbp=fffffa8008d435e0
 r8=fffff880044ce870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c2d310 r12=000000000000000f r13=fffff88006ca62f8
r14=0000000000000000 r15=fffffa8008a0d000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`049d3805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8016db5b370
GetUlongPtrFromAddress: unable to read from fffff8016db5b488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06ca5ee0 fffff880`04978c90     : fffff880`04900ffd ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 : nvlddmkm+0xd2a805
fffff880`06ca5ee8 fffff880`04900ffd     : ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 : nvlddmkm+0xccfc90
fffff880`06ca5ef0 ffff7f46`273d97e9     : fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06ca5ef8 fffff880`038767ac     : fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 fffffa80`094f0028 : 0xffff7f46`273d97e9
fffff880`06ca5f00 fffffa80`08d3d840     : fffff880`009c0180 00000000`00000000 fffffa80`094f0028 00000000`00000000 : dxgmms1+0x287ac
fffff880`06ca5f08 fffff880`009c0180     : 00000000`00000000 fffffa80`094f0028 00000000`00000000 00000000`00000000 : 0xfffffa80`08d3d840
fffff880`06ca5f10 00000000`00000000     : fffffa80`094f0028 00000000`00000000 00000000`00000000 fffffa80`08d3d700 : 0xfffff880`009c0180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ca54e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006fb9789, The address that the exception occurred at
Arg3: fffff880044abca8, Exception Record Address
Arg4: fffff880044ab4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3711

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006fb9789

BUGCHECK_P3: fffff880044abca8

BUGCHECK_P4: fffff880044ab4e0

EXCEPTION_RECORD:  fffff880044abca8 -- (.exr 0xfffff880044abca8)
ExceptionAddress: fffff88006fb9789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044ab4e0 -- (.cxr 0xfffff880044ab4e0)
rax=0000000000000000 rbx=fffffa800c243510 rcx=213f9e6ed8100000
rdx=8000000000000020 rsi=fffffa800c243510 rdi=0000000000000000
rip=fffff88006fb9789 rsp=fffff880044abee0 rbp=fffffa8008cb1010
 r8=fffff88006ab4880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c24330 r12=000000000000000f r13=fffff880044ac2f8
r14=0000000000000000 r15=fffffa8008969000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06fb9789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8017cfdd370
GetUlongPtrFromAddress: unable to read from fffff8017cfdd488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`044abee0 00000002`00000000     : 00000000`00000000 fffffa80`08aea1a8 00000004`00000000 00000000`00000000 : nvlddmkm+0xd2a789
fffff880`044abee8 00000000`00000000     : fffffa80`08aea1a8 00000004`00000000 00000000`00000000 fffff880`044ac000 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044ab4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800515e805, The address that the exception occurred at
Arg3: fffff88006da8ca8, Exception Record Address
Arg4: fffff88006da84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1842

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13524

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28699

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800515e805

BUGCHECK_P3: fffff88006da8ca8

BUGCHECK_P4: fffff88006da84e0

EXCEPTION_RECORD:  fffff88006da8ca8 -- (.exr 0xfffff88006da8ca8)
ExceptionAddress: fffff8800515e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006da84e0 -- (.cxr 0xfffff88006da84e0)
rax=0000000000000000 rbx=fffffa800c0df500 rcx=3c8edfd421450000
rdx=8000000000000020 rsi=fffffa800c0df500 rdi=0000000000000000
rip=fffff8800515e805 rsp=fffff88006da8ee0 rbp=fffffa800907f010
 r8=fffff88004c59870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007e2e730 r12=000000000000000f r13=fffff88006da92f8
r14=0000000000000000 r15=fffffa8008bfd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`0515e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802f1bc5370
GetUlongPtrFromAddress: unable to read from fffff802f1bc5488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`06da8ee0 fffff880`05103c90     : fffff880`0508bffd ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 : nvlddmkm+0xd2a805
fffff880`06da8ee8 fffff880`0508bffd     : ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 : nvlddmkm+0xccfc90
fffff880`06da8ef0 ffffb2a5`7206a005     : fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06da8ef8 fffff880`03c287ac     : fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 : 0xffffb2a5`7206a005
fffff880`06da8f00 fffffa80`0907a840     : fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 : dxgmms1+0x287ac
fffff880`06da8f08 fffff802`f1b65180     : 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 : 0xfffffa80`0907a840
fffff880`06da8f10 00000000`00000000     : fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 fffffa80`0907a700 : nt!KiInitialPCR+0x180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006da84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006c8a808, The address that the exception occurred at
Arg3: fffff880045b8c78, Exception Record Address
Arg4: fffff880045b84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12490

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27234

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006c8a808

BUGCHECK_P3: fffff880045b8c78

BUGCHECK_P4: fffff880045b84b0

EXCEPTION_RECORD:  fffff880045b8c78 -- (.exr 0xfffff880045b8c78)
ExceptionAddress: fffff88006c8a808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff880045b84b0 -- (.cxr 0xfffff880045b84b0)
rax=fffff880045b8ed8 rbx=0000000000000000 rcx=fffffa800e06a800
rdx=0000000000010000 rsi=fffffa800e06a800 rdi=0000000000000000
rip=fffff88006c8a808 rsp=fffff880045b8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000001200000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000300000 r13=fffff880045b92f8
r14=0000000000010000 r15=fffffa8008e52000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`06c8a808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80341170370
GetUlongPtrFromAddress: unable to read from fffff80341170488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`045b8eb0 00000000`00300000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 : nvlddmkm+0x64808
fffff880`045b8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a : 0x300000
fffff880`045b8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880045b84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80067eba3d0, Address of the instruction which caused the BugCheck
Arg3: fffff8800abd2d10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7541

    Key  : Analysis.Init.CPU.mSec
    Value: 842

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27529

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80067eba3d0

BUGCHECK_P3: fffff8800abd2d10

BUGCHECK_P4: 0

CONTEXT:  fffff8800abd2d10 -- (.cxr 0xfffff8800abd2d10)
rax=00000000c0000034 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800abd3c01 rsi=fffff901000b9750 rdi=ffffffffc0000034
rip=fffff80067eba3d0 rsp=fffff8800abd3718 rbp=fffff8800abd3820
 r8=fffffa80094d1370  r9=fffff8a003b6c580 r10=fffffa8006a2a760
r11=fffff8800abd3700 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!IoGetRelatedDeviceObject:
fffff800`67eba3d0 488b4110        mov     rax,qword ptr [rcx+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
fffff880`0abd3718 fffff960`0009d473     : 00000000`00000000 00000000`00000000 fffff901`000b9750 00000000`00000000 : nt!IoGetRelatedDeviceObject
fffff880`0abd3720 00000000`00000000     : 00000000`00000000 fffff901`000b9750 00000000`00000000 00000000`00000000 : win32k+0x77473


SYMBOL_NAME:  win32k+77473

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .cxr 0xfffff8800abd2d10 ; kb

BUCKET_ID_FUNC_OFFSET:  77473

FAILURE_BUCKET_ID:  0x3B_c0000005_win32k!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {8ffa81ae-e629-24c5-067f-7d1473d12e2c}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800499d805, The address that the exception occurred at
Arg3: fffff88003395ca8, Exception Record Address
Arg4: fffff880033954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9540

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800499d805

BUGCHECK_P3: fffff88003395ca8

BUGCHECK_P4: fffff880033954e0

EXCEPTION_RECORD:  fffff88003395ca8 -- (.exr 0xfffff88003395ca8)
ExceptionAddress: fffff8800499d805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880033954e0 -- (.cxr 0xfffff880033954e0)
rax=0000000000000000 rbx=fffffa80070951d0 rcx=d08e77d4e2230000
rdx=8000000000000020 rsi=fffffa80070951d0 rdi=0000000000000000
rip=fffff8800499d805 rsp=fffff88003395ee0 rbp=fffffa8008db9010
 r8=fffff88004498870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c11310 r12=000000000000000f r13=fffff880033962f8
r14=0000000000000000 r15=fffffa8008b95000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0499d805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80360361370
GetUlongPtrFromAddress: unable to read from fffff80360361488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`03395ee0 fffff880`04942c90     : fffff880`048caffd fffff880`03743c1d fffff880`038587ac fffff880`0386675f : nvlddmkm+0xd2a805
fffff880`03395ee8 fffff880`048caffd     : fffff880`03743c1d fffff880`038587ac fffff880`0386675f fffff880`03855928 : nvlddmkm+0xccfc90
fffff880`03395ef0 fffff880`03743c1d     : fffff880`038587ac fffff880`0386675f fffff880`03855928 fffff880`0384e614 : nvlddmkm+0xc57ffd
fffff880`03395ef8 fffff880`038587ac     : fffff880`0386675f fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 : dxgkrnl+0x8dc1d
fffff880`03395f00 fffff880`0386675f     : fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 : dxgmms1+0x287ac
fffff880`03395f08 fffff880`03855928     : fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03395f10 fffff880`0384e614     : fffff880`0386eba5 fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 : dxgmms1+0x25928
fffff880`03395f18 fffff880`0386eba5     : fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 : dxgmms1+0x1e614
fffff880`03395f20 fffff880`0386e662     : 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03395f28 00000000`00000001     : ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 : dxgmms1+0x3e662
fffff880`03395f30 ffff280e`74edbc03     : fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 : 0x1
fffff880`03395f38 fffff880`03395f98     : 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 : 0xffff280e`74edbc03
fffff880`03395f40 00000000`00000000     : fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 00000000`0000000f : 0xfffff880`03395f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880033954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004996805, The address that the exception occurred at
Arg3: fffff880067a1ca8, Exception Record Address
Arg4: fffff880067a14e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10799

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30714

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004996805

BUGCHECK_P3: fffff880067a1ca8

BUGCHECK_P4: fffff880067a14e0

EXCEPTION_RECORD:  fffff880067a1ca8 -- (.exr 0xfffff880067a1ca8)
ExceptionAddress: fffff88004996805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880067a14e0 -- (.cxr 0xfffff880067a14e0)
rax=0000000000000000 rbx=fffffa800bc16240 rcx=09bba9bc1bf40000
rdx=8000000000000020 rsi=fffffa800bc16240 rdi=0000000000000000
rip=fffff88004996805 rsp=fffff880067a1ee0 rbp=fffffa8008d4c3d0
 r8=fffff88004491870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007ba2010 r12=000000000000000f r13=fffff880067a22f8
r14=0000000000000000 r15=fffffa8008bd4000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04996805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800c07c8370
GetUlongPtrFromAddress: unable to read from fffff800c07c8488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff880`067a1ee0 fffff880`0493bc90     : fffff880`048c3ffd fffff880`036adc1d fffff880`037c27ac fffff880`037d075f : nvlddmkm+0xd2a805
fffff880`067a1ee8 fffff880`048c3ffd     : fffff880`036adc1d fffff880`037c27ac fffff880`037d075f fffff880`037bf928 : nvlddmkm+0xccfc90
fffff880`067a1ef0 fffff880`036adc1d     : fffff880`037c27ac fffff880`037d075f fffff880`037bf928 fffff880`037b8614 : nvlddmkm+0xc57ffd
fffff880`067a1ef8 fffff880`037c27ac     : fffff880`037d075f fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 : dxgkrnl+0x8dc1d
fffff880`067a1f00 fffff880`037d075f     : fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 : dxgmms1+0x287ac
fffff880`067a1f08 fffff880`037bf928     : fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 : dxgmms1+0x3675f
fffff880`067a1f10 fffff880`037b8614     : fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 : dxgmms1+0x25928
fffff880`067a1f18 fffff880`037d8ba5     : fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 : dxgmms1+0x1e614
fffff880`067a1f20 fffff880`037d8662     : 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`067a1f28 00000000`00000001     : fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 : dxgmms1+0x3e662
fffff880`067a1f30 fffff13b`afc605d4     : fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 : 0x1
fffff880`067a1f38 fffff880`067a1f98     : 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 : 0xfffff13b`afc605d4
fffff880`067a1f40 00000000`00000000     : fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 00000000`0000000f : 0xfffff880`067a1f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880067a14e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
 
Muhtemelen ekran kartında donanımsal bir sorun var. Kartın marka/modeli neydi?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800493b805, The address that the exception occurred at
Arg3: fffff88006b1fca8, Exception Record Address
Arg4: fffff88006b1f4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3967

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36422

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800493b805

BUGCHECK_P3: fffff88006b1fca8

BUGCHECK_P4: fffff88006b1f4e0

EXCEPTION_RECORD:  fffff88006b1fca8 -- (.exr 0xfffff88006b1fca8)
ExceptionAddress: fffff8800493b805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006b1f4e0 -- (.cxr 0xfffff88006b1f4e0)
rax=0000000000000000 rbx=fffffa800b348440 rcx=af4bf467c96c0000
rdx=8000000000000020 rsi=fffffa800b348440 rdi=0000000000000000
rip=fffff8800493b805 rsp=fffff88006b1fee0 rbp=fffffa8008d81010
 r8=fffff88004436870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c44010 r12=000000000000000f r13=fffff88006b202f8
r14=0000000000000000 r15=fffffa8008acb000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0493b805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff803769d4370
GetUlongPtrFromAddress: unable to read from fffff803769d4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06b1fee0 fffff880`048e0c90     : fffff880`04868ffd fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f : nvlddmkm+0xd2a805
fffff880`06b1fee8 fffff880`04868ffd     : fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 : nvlddmkm+0xccfc90
fffff880`06b1fef0 fffff880`0373ac1d     : fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 fffff880`03845614 : nvlddmkm+0xc57ffd
fffff880`06b1fef8 fffff880`0384f7ac     : fffff880`0385d75f fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 : dxgkrnl+0x8dc1d
fffff880`06b1ff00 fffff880`0385d75f     : fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 fffff880`03865662 : dxgmms1+0x287ac
fffff880`06b1ff08 fffff880`0384c928     : fffff880`03845614 fffff880`03865ba5 fffff880`03865662 00000000`00000001 : dxgmms1+0x3675f
fffff880`06b1ff10 fffff880`03845614     : fffff880`03865ba5 fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c : dxgmms1+0x25928
fffff880`06b1ff18 fffff880`03865ba5     : fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 : dxgmms1+0x1e614
fffff880`06b1ff20 fffff880`03865662     : 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`06b1ff28 00000000`00000001     : ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 : dxgmms1+0x3e662
fffff880`06b1ff30 ffff57cb`f2d6374c     : fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 : 0x1
fffff880`06b1ff38 fffff880`06b1ff98     : 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 : 0xffff57cb`f2d6374c
fffff880`06b1ff40 00000000`00000000     : fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 00000000`0000000f : 0xfffff880`06b1ff98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006b1f4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004c02805, The address that the exception occurred at
Arg3: fffff88003deaca8, Exception Record Address
Arg4: fffff88003dea4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6336

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32290

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004c02805

BUGCHECK_P3: fffff88003deaca8

BUGCHECK_P4: fffff88003dea4e0

EXCEPTION_RECORD:  fffff88003deaca8 -- (.exr 0xfffff88003deaca8)
ExceptionAddress: fffff88004c02805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88003dea4e0 -- (.cxr 0xfffff88003dea4e0)
rax=0000000000000000 rbx=fffffa800c2a36a0 rcx=faa23635bd000000
rdx=8000000000000020 rsi=fffffa800c2a36a0 rdi=0000000000000000
rip=fffff88004c02805 rsp=fffff88003deaee0 rbp=fffffa8008d4eb90
 r8=fffff880046fd870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007be9320 r12=000000000000000f r13=fffff88003deb2f8
r14=0000000000000000 r15=fffffa8008bbd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04c02805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80014568370
GetUlongPtrFromAddress: unable to read from fffff80014568488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03deaee0 00000002`00000000     : 00000000`00000000 ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 : nvlddmkm+0xd2a805
fffff880`03deaee8 00000000`00000000     : ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88003dea4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003d4c808, The address that the exception occurred at
Arg3: fffff88006ac8c78, Exception Record Address
Arg4: fffff88006ac84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11547

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88003d4c808

BUGCHECK_P3: fffff88006ac8c78

BUGCHECK_P4: fffff88006ac84b0

EXCEPTION_RECORD:  fffff88006ac8c78 -- (.exr 0xfffff88006ac8c78)
ExceptionAddress: fffff88003d4c808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff88006ac84b0 -- (.cxr 0xfffff88006ac84b0)
rax=fffff88006ac8ed8 rbx=0000000000000000 rcx=fffffa800a7edcd0
rdx=0000000000010000 rsi=fffffa800a7edcd0 rdi=0000000000000000
rip=fffff88003d4c808 rsp=fffff88006ac8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000840000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000160000 r13=fffff88006ac92f8
r14=0000000000010000 r15=fffffa8008962000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`03d4c808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8007e16e370
GetUlongPtrFromAddress: unable to read from fffff8007e16e488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ac8eb0 00000000`00160000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 : nvlddmkm+0x64808
fffff880`06ac8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a : 0x160000
fffff880`06ac8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ac84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a1e805, The address that the exception occurred at
Arg3: fffff88006cb2ca8, Exception Record Address
Arg4: fffff88006cb24e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14208

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a1e805

BUGCHECK_P3: fffff88006cb2ca8

BUGCHECK_P4: fffff88006cb24e0

EXCEPTION_RECORD:  fffff88006cb2ca8 -- (.exr 0xfffff88006cb2ca8)
ExceptionAddress: fffff88004a1e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006cb24e0 -- (.cxr 0xfffff88006cb24e0)
rax=0000000000000000 rbx=fffffa800b736e20 rcx=40ec49b12adf0000
rdx=8000000000000020 rsi=fffffa800b736e20 rdi=0000000000000000
rip=fffff88004a1e805 rsp=fffff88006cb2ee0 rbp=fffffa8008cf7010
 r8=fffff88004519870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007baf360 r12=000000000000000f r13=fffff88006cb32f8
r14=0000000000000000 r15=fffffa80088d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`04a1e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80016d74370
GetUlongPtrFromAddress: unable to read from fffff80016d74488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06cb2ee0 00000002`00000000     : 00000000`00000000 ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 : nvlddmkm+0xd2a805
fffff880`06cb2ee8 00000000`00000000     : ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006cb24e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004935805, The address that the exception occurred at
Arg3: fffff88003595ca8, Exception Record Address
Arg4: fffff880035954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12382

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28185

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004935805

BUGCHECK_P3: fffff88003595ca8

BUGCHECK_P4: fffff880035954e0

EXCEPTION_RECORD:  fffff88003595ca8 -- (.exr 0xfffff88003595ca8)
ExceptionAddress: fffff88004935805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880035954e0 -- (.cxr 0xfffff880035954e0)
rax=0000000000000000 rbx=fffffa800c780cf0 rcx=3acd7e4ab2670000
rdx=8000000000000020 rsi=fffffa800c780cf0 rdi=0000000000000000
rip=fffff88004935805 rsp=fffff88003595ee0 rbp=fffffa8008d92010
 r8=fffff88004430870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c81310 r12=000000000000000f r13=fffff880035962f8
r14=0000000000000000 r15=fffffa80089fa000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04935805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80042559370
GetUlongPtrFromAddress: unable to read from fffff80042559488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03595ee0 fffff880`048dac90     : fffff880`04862ffd fffff880`038e9c1d fffff880`038287ac fffff880`0383675f : nvlddmkm+0xd2a805
fffff880`03595ee8 fffff880`04862ffd     : fffff880`038e9c1d fffff880`038287ac fffff880`0383675f fffff880`03825928 : nvlddmkm+0xccfc90
fffff880`03595ef0 fffff880`038e9c1d     : fffff880`038287ac fffff880`0383675f fffff880`03825928 fffff880`0381e614 : nvlddmkm+0xc57ffd
fffff880`03595ef8 fffff880`038287ac     : fffff880`0383675f fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 : dxgkrnl+0x8dc1d
fffff880`03595f00 fffff880`0383675f     : fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 : dxgmms1+0x287ac
fffff880`03595f08 fffff880`03825928     : fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03595f10 fffff880`0381e614     : fffff880`0383eba5 fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 : dxgmms1+0x25928
fffff880`03595f18 fffff880`0383eba5     : fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 : dxgmms1+0x1e614
fffff880`03595f20 fffff880`0383e662     : 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03595f28 00000000`00000001     : ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 : dxgmms1+0x3e662
fffff880`03595f30 ffffc24d`7d13ec47     : fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 : 0x1
fffff880`03595f38 fffff880`03595f98     : 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 : 0xffffc24d`7d13ec47
fffff880`03595f40 00000000`00000000     : fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 00000000`0000000f : 0xfffff880`03595f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880035954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004975789, The address that the exception occurred at
Arg3: fffff88006c96ca8, Exception Record Address
Arg4: fffff88006c964e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3548

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36792

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004975789

BUGCHECK_P3: fffff88006c96ca8

BUGCHECK_P4: fffff88006c964e0

EXCEPTION_RECORD:  fffff88006c96ca8 -- (.exr 0xfffff88006c96ca8)
ExceptionAddress: fffff88004975789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006c964e0 -- (.cxr 0xfffff88006c964e0)
rax=0000000000000000 rbx=fffffa800da27390 rcx=5f4c1a54576a0000
rdx=8000000000000020 rsi=fffffa800da27390 rdi=0000000000000000
rip=fffff88004975789 rsp=fffff88006c96ee0 rbp=fffffa8008c827f0
 r8=fffff88004470880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bff310 r12=000000000000000f r13=fffff88006c972f8
r14=0000000000000000 r15=fffffa8008b93000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a789:
fffff880`04975789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80199b73370
GetUlongPtrFromAddress: unable to read from fffff80199b73488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06c96ee0 00000000`00010000     : fffffa80`07215010 ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 : nvlddmkm+0xd2a789
fffff880`06c96ee8 fffffa80`07215010     : ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 : 0x10000
fffff880`06c96ef0 ffffd048`64772013     : 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 : 0xfffffa80`07215010
fffff880`06c96ef8 00000000`00000000     : fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 fffffa80`0992f3e8 : 0xffffd048`64772013


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006c964e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007024805, The address that the exception occurred at
Arg3: fffff88004c6eca8, Exception Record Address
Arg4: fffff88004c6e4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9616

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44057

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88007024805

BUGCHECK_P3: fffff88004c6eca8

BUGCHECK_P4: fffff88004c6e4e0

EXCEPTION_RECORD:  fffff88004c6eca8 -- (.exr 0xfffff88004c6eca8)
ExceptionAddress: fffff88007024805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88004c6e4e0 -- (.cxr 0xfffff88004c6e4e0)
rax=0000000000000000 rbx=fffffa80074ed8f0 rcx=47bfb1cfa9dd0000
rdx=8000000000000020 rsi=fffffa80074ed8f0 rdi=0000000000000000
rip=fffff88007024805 rsp=fffff88004c6eee0 rbp=fffffa8008c10010
 r8=fffff88006b1f870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007aa81e0 r12=000000000000000f r13=fffff88004c6f2f8
r14=0000000000000000 r15=fffffa80088d3000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`07024805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802a0965370
GetUlongPtrFromAddress: unable to read from fffff802a0965488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`04c6eee0 fffff880`06fc9c90     : fffff880`06f51ffd fffff880`0371ac1d fffff880`036397ac fffff880`0364775f : nvlddmkm+0xd2a805
fffff880`04c6eee8 fffff880`06f51ffd     : fffff880`0371ac1d fffff880`036397ac fffff880`0364775f fffff880`03636928 : nvlddmkm+0xccfc90
fffff880`04c6eef0 fffff880`0371ac1d     : fffff880`036397ac fffff880`0364775f fffff880`03636928 fffff880`0362f614 : nvlddmkm+0xc57ffd
fffff880`04c6eef8 fffff880`036397ac     : fffff880`0364775f fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 : dxgkrnl+0x8dc1d
fffff880`04c6ef00 fffff880`0364775f     : fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 : dxgmms1+0x287ac
fffff880`04c6ef08 fffff880`03636928     : fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 00000000`00000001 : dxgmms1+0x3675f
fffff880`04c6ef10 fffff880`0362f614     : fffff880`0364fba5 fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd : dxgmms1+0x25928
fffff880`04c6ef18 fffff880`0364fba5     : fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 : dxgmms1+0x1e614
fffff880`04c6ef20 fffff880`0364f662     : 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`04c6ef28 00000000`00000001     : ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 : dxgmms1+0x3e662
fffff880`04c6ef30 ffffbf3f`b50947fd     : fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 : 0x1
fffff880`04c6ef38 fffff880`04c6ef98     : 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 : 0xffffbf3f`b50947fd
fffff880`04c6ef40 00000000`00000000     : fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 00000000`0000000f : 0xfffff880`04c6ef98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88004c6e4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006ff7789, The address that the exception occurred at
Arg3: fffff880044f8ca8, Exception Record Address
Arg4: fffff880044f84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8734

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30490

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006ff7789

BUGCHECK_P3: fffff880044f8ca8

BUGCHECK_P4: fffff880044f84e0

EXCEPTION_RECORD:  fffff880044f8ca8 -- (.exr 0xfffff880044f8ca8)
ExceptionAddress: fffff88006ff7789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044f84e0 -- (.cxr 0xfffff880044f84e0)
rax=0000000000000000 rbx=fffffa800c13ca70 rcx=3078f1ab8d320000
rdx=8000000000000020 rsi=fffffa800c13ca70 rdi=0000000000000000
rip=fffff88006ff7789 rsp=fffff880044f8ee0 rbp=fffffa8008ce0010
 r8=fffff88006af2880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bbe310 r12=000000000000000f r13=fffff880044f92f8
r14=0000000000000000 r15=fffffa8008b22000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06ff7789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80166bd4370
GetUlongPtrFromAddress: unable to read from fffff80166bd4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044f8ee0 fffff880`06f9cc4c     : fffff880`06f24ffd fffff880`036fdc1d fffff880`036287ac fffff880`0363675f : nvlddmkm+0xd2a789
fffff880`044f8ee8 fffff880`06f24ffd     : fffff880`036fdc1d fffff880`036287ac fffff880`0363675f fffff880`03625928 : nvlddmkm+0xccfc4c
fffff880`044f8ef0 fffff880`036fdc1d     : fffff880`036287ac fffff880`0363675f fffff880`03625928 fffff880`0361e614 : nvlddmkm+0xc57ffd
fffff880`044f8ef8 fffff880`036287ac     : fffff880`0363675f fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 : dxgkrnl+0x8dc1d
fffff880`044f8f00 fffff880`0363675f     : fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 : dxgmms1+0x287ac
fffff880`044f8f08 fffff880`03625928     : fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`044f8f10 fffff880`0361e614     : fffff880`0363eba5 fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 : dxgmms1+0x25928
fffff880`044f8f18 fffff880`0363eba5     : fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 : dxgmms1+0x1e614
fffff880`044f8f20 fffff880`0363e662     : 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`044f8f28 00000000`00000001     : ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 : dxgmms1+0x3e662
fffff880`044f8f30 ffffc8f8`f5e40312     : fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 : 0x1
fffff880`044f8f38 fffff880`044f8f98     : 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 : 0xffffc8f8`f5e40312
fffff880`044f8f40 00000000`00000000     : fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 00000000`0000000f : 0xfffff880`044f8f98


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044f84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880049d3805, The address that the exception occurred at
Arg3: fffff88006ca5ca8, Exception Record Address
Arg4: fffff88006ca54e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4369

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 35622

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880049d3805

BUGCHECK_P3: fffff88006ca5ca8

BUGCHECK_P4: fffff88006ca54e0

EXCEPTION_RECORD:  fffff88006ca5ca8 -- (.exr 0xfffff88006ca5ca8)
ExceptionAddress: fffff880049d3805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006ca54e0 -- (.cxr 0xfffff88006ca54e0)
rax=0000000000000000 rbx=fffffa800be4b990 rcx=c2717396e1af0000
rdx=8000000000000020 rsi=fffffa800be4b990 rdi=0000000000000000
rip=fffff880049d3805 rsp=fffff88006ca5ee0 rbp=fffffa8008d435e0
 r8=fffff880044ce870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c2d310 r12=000000000000000f r13=fffff88006ca62f8
r14=0000000000000000 r15=fffffa8008a0d000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`049d3805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8016db5b370
GetUlongPtrFromAddress: unable to read from fffff8016db5b488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ca5ee0 fffff880`04978c90     : fffff880`04900ffd ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 : nvlddmkm+0xd2a805
fffff880`06ca5ee8 fffff880`04900ffd     : ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 : nvlddmkm+0xccfc90
fffff880`06ca5ef0 ffff7f46`273d97e9     : fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06ca5ef8 fffff880`038767ac     : fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 fffffa80`094f0028 : 0xffff7f46`273d97e9
fffff880`06ca5f00 fffffa80`08d3d840     : fffff880`009c0180 00000000`00000000 fffffa80`094f0028 00000000`00000000 : dxgmms1+0x287ac
fffff880`06ca5f08 fffff880`009c0180     : 00000000`00000000 fffffa80`094f0028 00000000`00000000 00000000`00000000 : 0xfffffa80`08d3d840
fffff880`06ca5f10 00000000`00000000     : fffffa80`094f0028 00000000`00000000 00000000`00000000 fffffa80`08d3d700 : 0xfffff880`009c0180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ca54e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006fb9789, The address that the exception occurred at
Arg3: fffff880044abca8, Exception Record Address
Arg4: fffff880044ab4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3711

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006fb9789

BUGCHECK_P3: fffff880044abca8

BUGCHECK_P4: fffff880044ab4e0

EXCEPTION_RECORD:  fffff880044abca8 -- (.exr 0xfffff880044abca8)
ExceptionAddress: fffff88006fb9789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044ab4e0 -- (.cxr 0xfffff880044ab4e0)
rax=0000000000000000 rbx=fffffa800c243510 rcx=213f9e6ed8100000
rdx=8000000000000020 rsi=fffffa800c243510 rdi=0000000000000000
rip=fffff88006fb9789 rsp=fffff880044abee0 rbp=fffffa8008cb1010
 r8=fffff88006ab4880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c24330 r12=000000000000000f r13=fffff880044ac2f8
r14=0000000000000000 r15=fffffa8008969000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06fb9789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8017cfdd370
GetUlongPtrFromAddress: unable to read from fffff8017cfdd488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044abee0 00000002`00000000     : 00000000`00000000 fffffa80`08aea1a8 00000004`00000000 00000000`00000000 : nvlddmkm+0xd2a789
fffff880`044abee8 00000000`00000000     : fffffa80`08aea1a8 00000004`00000000 00000000`00000000 fffff880`044ac000 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044ab4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800515e805, The address that the exception occurred at
Arg3: fffff88006da8ca8, Exception Record Address
Arg4: fffff88006da84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1842

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13524

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28699

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800515e805

BUGCHECK_P3: fffff88006da8ca8

BUGCHECK_P4: fffff88006da84e0

EXCEPTION_RECORD:  fffff88006da8ca8 -- (.exr 0xfffff88006da8ca8)
ExceptionAddress: fffff8800515e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006da84e0 -- (.cxr 0xfffff88006da84e0)
rax=0000000000000000 rbx=fffffa800c0df500 rcx=3c8edfd421450000
rdx=8000000000000020 rsi=fffffa800c0df500 rdi=0000000000000000
rip=fffff8800515e805 rsp=fffff88006da8ee0 rbp=fffffa800907f010
 r8=fffff88004c59870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007e2e730 r12=000000000000000f r13=fffff88006da92f8
r14=0000000000000000 r15=fffffa8008bfd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`0515e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802f1bc5370
GetUlongPtrFromAddress: unable to read from fffff802f1bc5488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06da8ee0 fffff880`05103c90     : fffff880`0508bffd ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 : nvlddmkm+0xd2a805
fffff880`06da8ee8 fffff880`0508bffd     : ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 : nvlddmkm+0xccfc90
fffff880`06da8ef0 ffffb2a5`7206a005     : fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06da8ef8 fffff880`03c287ac     : fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 : 0xffffb2a5`7206a005
fffff880`06da8f00 fffffa80`0907a840     : fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 : dxgmms1+0x287ac
fffff880`06da8f08 fffff802`f1b65180     : 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 : 0xfffffa80`0907a840
fffff880`06da8f10 00000000`00000000     : fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 fffffa80`0907a700 : nt!KiInitialPCR+0x180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006da84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006c8a808, The address that the exception occurred at
Arg3: fffff880045b8c78, Exception Record Address
Arg4: fffff880045b84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12490

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27234

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006c8a808

BUGCHECK_P3: fffff880045b8c78

BUGCHECK_P4: fffff880045b84b0

EXCEPTION_RECORD:  fffff880045b8c78 -- (.exr 0xfffff880045b8c78)
ExceptionAddress: fffff88006c8a808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff880045b84b0 -- (.cxr 0xfffff880045b84b0)
rax=fffff880045b8ed8 rbx=0000000000000000 rcx=fffffa800e06a800
rdx=0000000000010000 rsi=fffffa800e06a800 rdi=0000000000000000
rip=fffff88006c8a808 rsp=fffff880045b8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000001200000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000300000 r13=fffff880045b92f8
r14=0000000000010000 r15=fffffa8008e52000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`06c8a808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80341170370
GetUlongPtrFromAddress: unable to read from fffff80341170488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`045b8eb0 00000000`00300000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 : nvlddmkm+0x64808
fffff880`045b8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a : 0x300000
fffff880`045b8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880045b84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80067eba3d0, Address of the instruction which caused the BugCheck
Arg3: fffff8800abd2d10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7541

    Key  : Analysis.Init.CPU.mSec
    Value: 842

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27529

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80067eba3d0

BUGCHECK_P3: fffff8800abd2d10

BUGCHECK_P4: 0

CONTEXT:  fffff8800abd2d10 -- (.cxr 0xfffff8800abd2d10)
rax=00000000c0000034 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800abd3c01 rsi=fffff901000b9750 rdi=ffffffffc0000034
rip=fffff80067eba3d0 rsp=fffff8800abd3718 rbp=fffff8800abd3820
 r8=fffffa80094d1370  r9=fffff8a003b6c580 r10=fffffa8006a2a760
r11=fffff8800abd3700 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!IoGetRelatedDeviceObject:
fffff800`67eba3d0 488b4110        mov     rax,qword ptr [rcx+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
fffff880`0abd3718 fffff960`0009d473     : 00000000`00000000 00000000`00000000 fffff901`000b9750 00000000`00000000 : nt!IoGetRelatedDeviceObject
fffff880`0abd3720 00000000`00000000     : 00000000`00000000 fffff901`000b9750 00000000`00000000 00000000`00000000 : win32k+0x77473


SYMBOL_NAME:  win32k+77473

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .cxr 0xfffff8800abd2d10 ; kb

BUCKET_ID_FUNC_OFFSET:  77473

FAILURE_BUCKET_ID:  0x3B_c0000005_win32k!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {8ffa81ae-e629-24c5-067f-7d1473d12e2c}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800499d805, The address that the exception occurred at
Arg3: fffff88003395ca8, Exception Record Address
Arg4: fffff880033954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9540

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800499d805

BUGCHECK_P3: fffff88003395ca8

BUGCHECK_P4: fffff880033954e0

EXCEPTION_RECORD:  fffff88003395ca8 -- (.exr 0xfffff88003395ca8)
ExceptionAddress: fffff8800499d805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880033954e0 -- (.cxr 0xfffff880033954e0)
rax=0000000000000000 rbx=fffffa80070951d0 rcx=d08e77d4e2230000
rdx=8000000000000020 rsi=fffffa80070951d0 rdi=0000000000000000
rip=fffff8800499d805 rsp=fffff88003395ee0 rbp=fffffa8008db9010
 r8=fffff88004498870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c11310 r12=000000000000000f r13=fffff880033962f8
r14=0000000000000000 r15=fffffa8008b95000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0499d805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80360361370
GetUlongPtrFromAddress: unable to read from fffff80360361488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03395ee0 fffff880`04942c90     : fffff880`048caffd fffff880`03743c1d fffff880`038587ac fffff880`0386675f : nvlddmkm+0xd2a805
fffff880`03395ee8 fffff880`048caffd     : fffff880`03743c1d fffff880`038587ac fffff880`0386675f fffff880`03855928 : nvlddmkm+0xccfc90
fffff880`03395ef0 fffff880`03743c1d     : fffff880`038587ac fffff880`0386675f fffff880`03855928 fffff880`0384e614 : nvlddmkm+0xc57ffd
fffff880`03395ef8 fffff880`038587ac     : fffff880`0386675f fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 : dxgkrnl+0x8dc1d
fffff880`03395f00 fffff880`0386675f     : fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 : dxgmms1+0x287ac
fffff880`03395f08 fffff880`03855928     : fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03395f10 fffff880`0384e614     : fffff880`0386eba5 fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 : dxgmms1+0x25928
fffff880`03395f18 fffff880`0386eba5     : fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 : dxgmms1+0x1e614
fffff880`03395f20 fffff880`0386e662     : 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03395f28 00000000`00000001     : ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 : dxgmms1+0x3e662
fffff880`03395f30 ffff280e`74edbc03     : fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 : 0x1
fffff880`03395f38 fffff880`03395f98     : 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 : 0xffff280e`74edbc03
fffff880`03395f40 00000000`00000000     : fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 00000000`0000000f : 0xfffff880`03395f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880033954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004996805, The address that the exception occurred at
Arg3: fffff880067a1ca8, Exception Record Address
Arg4: fffff880067a14e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10799

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30714

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004996805

BUGCHECK_P3: fffff880067a1ca8

BUGCHECK_P4: fffff880067a14e0

EXCEPTION_RECORD:  fffff880067a1ca8 -- (.exr 0xfffff880067a1ca8)
ExceptionAddress: fffff88004996805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880067a14e0 -- (.cxr 0xfffff880067a14e0)
rax=0000000000000000 rbx=fffffa800bc16240 rcx=09bba9bc1bf40000
rdx=8000000000000020 rsi=fffffa800bc16240 rdi=0000000000000000
rip=fffff88004996805 rsp=fffff880067a1ee0 rbp=fffffa8008d4c3d0
 r8=fffff88004491870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007ba2010 r12=000000000000000f r13=fffff880067a22f8
r14=0000000000000000 r15=fffffa8008bd4000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04996805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800c07c8370
GetUlongPtrFromAddress: unable to read from fffff800c07c8488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`067a1ee0 fffff880`0493bc90     : fffff880`048c3ffd fffff880`036adc1d fffff880`037c27ac fffff880`037d075f : nvlddmkm+0xd2a805
fffff880`067a1ee8 fffff880`048c3ffd     : fffff880`036adc1d fffff880`037c27ac fffff880`037d075f fffff880`037bf928 : nvlddmkm+0xccfc90
fffff880`067a1ef0 fffff880`036adc1d     : fffff880`037c27ac fffff880`037d075f fffff880`037bf928 fffff880`037b8614 : nvlddmkm+0xc57ffd
fffff880`067a1ef8 fffff880`037c27ac     : fffff880`037d075f fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 : dxgkrnl+0x8dc1d
fffff880`067a1f00 fffff880`037d075f     : fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 : dxgmms1+0x287ac
fffff880`067a1f08 fffff880`037bf928     : fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 : dxgmms1+0x3675f
fffff880`067a1f10 fffff880`037b8614     : fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 : dxgmms1+0x25928
fffff880`067a1f18 fffff880`037d8ba5     : fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 : dxgmms1+0x1e614
fffff880`067a1f20 fffff880`037d8662     : 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`067a1f28 00000000`00000001     : fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 : dxgmms1+0x3e662
fffff880`067a1f30 fffff13b`afc605d4     : fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 : 0x1
fffff880`067a1f38 fffff880`067a1f98     : 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 : 0xfffff13b`afc605d4
fffff880`067a1f40 00000000`00000000     : fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 00000000`0000000f : 0xfffff880`067a1f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880067a14e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
Muhtemelen ekran kartında donanımsal bir sorun var. Kartın marka/modeli neydi?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800493b805, The address that the exception occurred at
Arg3: fffff88006b1fca8, Exception Record Address
Arg4: fffff88006b1f4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3967

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36422

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800493b805

BUGCHECK_P3: fffff88006b1fca8

BUGCHECK_P4: fffff88006b1f4e0

EXCEPTION_RECORD:  fffff88006b1fca8 -- (.exr 0xfffff88006b1fca8)
ExceptionAddress: fffff8800493b805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006b1f4e0 -- (.cxr 0xfffff88006b1f4e0)
rax=0000000000000000 rbx=fffffa800b348440 rcx=af4bf467c96c0000
rdx=8000000000000020 rsi=fffffa800b348440 rdi=0000000000000000
rip=fffff8800493b805 rsp=fffff88006b1fee0 rbp=fffffa8008d81010
 r8=fffff88004436870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c44010 r12=000000000000000f r13=fffff88006b202f8
r14=0000000000000000 r15=fffffa8008acb000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0493b805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff803769d4370
GetUlongPtrFromAddress: unable to read from fffff803769d4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06b1fee0 fffff880`048e0c90     : fffff880`04868ffd fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f : nvlddmkm+0xd2a805
fffff880`06b1fee8 fffff880`04868ffd     : fffff880`0373ac1d fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 : nvlddmkm+0xccfc90
fffff880`06b1fef0 fffff880`0373ac1d     : fffff880`0384f7ac fffff880`0385d75f fffff880`0384c928 fffff880`03845614 : nvlddmkm+0xc57ffd
fffff880`06b1fef8 fffff880`0384f7ac     : fffff880`0385d75f fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 : dxgkrnl+0x8dc1d
fffff880`06b1ff00 fffff880`0385d75f     : fffff880`0384c928 fffff880`03845614 fffff880`03865ba5 fffff880`03865662 : dxgmms1+0x287ac
fffff880`06b1ff08 fffff880`0384c928     : fffff880`03845614 fffff880`03865ba5 fffff880`03865662 00000000`00000001 : dxgmms1+0x3675f
fffff880`06b1ff10 fffff880`03845614     : fffff880`03865ba5 fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c : dxgmms1+0x25928
fffff880`06b1ff18 fffff880`03865ba5     : fffff880`03865662 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 : dxgmms1+0x1e614
fffff880`06b1ff20 fffff880`03865662     : 00000000`00000001 ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`06b1ff28 00000000`00000001     : ffff57cb`f2d6374c fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 : dxgmms1+0x3e662
fffff880`06b1ff30 ffff57cb`f2d6374c     : fffff880`06b1ff98 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 : 0x1
fffff880`06b1ff38 fffff880`06b1ff98     : 00000000`00000000 fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 : 0xffff57cb`f2d6374c
fffff880`06b1ff40 00000000`00000000     : fffffa80`0ccc99b8 fffffa80`0ccc9790 fffff880`06b207d0 00000000`0000000f : 0xfffff880`06b1ff98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006b1f4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004c02805, The address that the exception occurred at
Arg3: fffff88003deaca8, Exception Record Address
Arg4: fffff88003dea4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6336

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32290

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004c02805

BUGCHECK_P3: fffff88003deaca8

BUGCHECK_P4: fffff88003dea4e0

EXCEPTION_RECORD:  fffff88003deaca8 -- (.exr 0xfffff88003deaca8)
ExceptionAddress: fffff88004c02805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88003dea4e0 -- (.cxr 0xfffff88003dea4e0)
rax=0000000000000000 rbx=fffffa800c2a36a0 rcx=faa23635bd000000
rdx=8000000000000020 rsi=fffffa800c2a36a0 rdi=0000000000000000
rip=fffff88004c02805 rsp=fffff88003deaee0 rbp=fffffa8008d4eb90
 r8=fffff880046fd870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007be9320 r12=000000000000000f r13=fffff88003deb2f8
r14=0000000000000000 r15=fffffa8008bbd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04c02805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80014568370
GetUlongPtrFromAddress: unable to read from fffff80014568488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03deaee0 00000002`00000000     : 00000000`00000000 ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 : nvlddmkm+0xd2a805
fffff880`03deaee8 00000000`00000000     : ffff6f09`cc393d4d 00000004`00000000 fffffa80`08dc71c0 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88003dea4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003d4c808, The address that the exception occurred at
Arg3: fffff88006ac8c78, Exception Record Address
Arg4: fffff88006ac84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11547

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88003d4c808

BUGCHECK_P3: fffff88006ac8c78

BUGCHECK_P4: fffff88006ac84b0

EXCEPTION_RECORD:  fffff88006ac8c78 -- (.exr 0xfffff88006ac8c78)
ExceptionAddress: fffff88003d4c808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff88006ac84b0 -- (.cxr 0xfffff88006ac84b0)
rax=fffff88006ac8ed8 rbx=0000000000000000 rcx=fffffa800a7edcd0
rdx=0000000000010000 rsi=fffffa800a7edcd0 rdi=0000000000000000
rip=fffff88003d4c808 rsp=fffff88006ac8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000840000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000160000 r13=fffff88006ac92f8
r14=0000000000010000 r15=fffffa8008962000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`03d4c808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8007e16e370
GetUlongPtrFromAddress: unable to read from fffff8007e16e488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ac8eb0 00000000`00160000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 : nvlddmkm+0x64808
fffff880`06ac8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a : 0x160000
fffff880`06ac8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a32c7a0 fffff880`04a12d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ac84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a1e805, The address that the exception occurred at
Arg3: fffff88006cb2ca8, Exception Record Address
Arg4: fffff88006cb24e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14208

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a1e805

BUGCHECK_P3: fffff88006cb2ca8

BUGCHECK_P4: fffff88006cb24e0

EXCEPTION_RECORD:  fffff88006cb2ca8 -- (.exr 0xfffff88006cb2ca8)
ExceptionAddress: fffff88004a1e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006cb24e0 -- (.cxr 0xfffff88006cb24e0)
rax=0000000000000000 rbx=fffffa800b736e20 rcx=40ec49b12adf0000
rdx=8000000000000020 rsi=fffffa800b736e20 rdi=0000000000000000
rip=fffff88004a1e805 rsp=fffff88006cb2ee0 rbp=fffffa8008cf7010
 r8=fffff88004519870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007baf360 r12=000000000000000f r13=fffff88006cb32f8
r14=0000000000000000 r15=fffffa80088d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`04a1e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80016d74370
GetUlongPtrFromAddress: unable to read from fffff80016d74488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06cb2ee0 00000002`00000000     : 00000000`00000000 ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 : nvlddmkm+0xd2a805
fffff880`06cb2ee8 00000000`00000000     : ffff9845`26f6556d 00000004`00000000 fffffa80`08cf2640 fffff880`02a65180 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006cb24e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004935805, The address that the exception occurred at
Arg3: fffff88003595ca8, Exception Record Address
Arg4: fffff880035954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12382

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28185

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004935805

BUGCHECK_P3: fffff88003595ca8

BUGCHECK_P4: fffff880035954e0

EXCEPTION_RECORD:  fffff88003595ca8 -- (.exr 0xfffff88003595ca8)
ExceptionAddress: fffff88004935805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880035954e0 -- (.cxr 0xfffff880035954e0)
rax=0000000000000000 rbx=fffffa800c780cf0 rcx=3acd7e4ab2670000
rdx=8000000000000020 rsi=fffffa800c780cf0 rdi=0000000000000000
rip=fffff88004935805 rsp=fffff88003595ee0 rbp=fffffa8008d92010
 r8=fffff88004430870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c81310 r12=000000000000000f r13=fffff880035962f8
r14=0000000000000000 r15=fffffa80089fa000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04935805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80042559370
GetUlongPtrFromAddress: unable to read from fffff80042559488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03595ee0 fffff880`048dac90     : fffff880`04862ffd fffff880`038e9c1d fffff880`038287ac fffff880`0383675f : nvlddmkm+0xd2a805
fffff880`03595ee8 fffff880`04862ffd     : fffff880`038e9c1d fffff880`038287ac fffff880`0383675f fffff880`03825928 : nvlddmkm+0xccfc90
fffff880`03595ef0 fffff880`038e9c1d     : fffff880`038287ac fffff880`0383675f fffff880`03825928 fffff880`0381e614 : nvlddmkm+0xc57ffd
fffff880`03595ef8 fffff880`038287ac     : fffff880`0383675f fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 : dxgkrnl+0x8dc1d
fffff880`03595f00 fffff880`0383675f     : fffff880`03825928 fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 : dxgmms1+0x287ac
fffff880`03595f08 fffff880`03825928     : fffff880`0381e614 fffff880`0383eba5 fffff880`0383e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03595f10 fffff880`0381e614     : fffff880`0383eba5 fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 : dxgmms1+0x25928
fffff880`03595f18 fffff880`0383eba5     : fffff880`0383e662 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 : dxgmms1+0x1e614
fffff880`03595f20 fffff880`0383e662     : 00000000`00000001 ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03595f28 00000000`00000001     : ffffc24d`7d13ec47 fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 : dxgmms1+0x3e662
fffff880`03595f30 ffffc24d`7d13ec47     : fffff880`03595f98 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 : 0x1
fffff880`03595f38 fffff880`03595f98     : 00000000`00000000 fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 : 0xffffc24d`7d13ec47
fffff880`03595f40 00000000`00000000     : fffffa80`0b2a5408 fffffa80`0b2a51e0 fffff880`035967d0 00000000`0000000f : 0xfffff880`03595f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880035954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004975789, The address that the exception occurred at
Arg3: fffff88006c96ca8, Exception Record Address
Arg4: fffff88006c964e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3548

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36792

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004975789

BUGCHECK_P3: fffff88006c96ca8

BUGCHECK_P4: fffff88006c964e0

EXCEPTION_RECORD:  fffff88006c96ca8 -- (.exr 0xfffff88006c96ca8)
ExceptionAddress: fffff88004975789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006c964e0 -- (.cxr 0xfffff88006c964e0)
rax=0000000000000000 rbx=fffffa800da27390 rcx=5f4c1a54576a0000
rdx=8000000000000020 rsi=fffffa800da27390 rdi=0000000000000000
rip=fffff88004975789 rsp=fffff88006c96ee0 rbp=fffffa8008c827f0
 r8=fffff88004470880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bff310 r12=000000000000000f r13=fffff88006c972f8
r14=0000000000000000 r15=fffffa8008b93000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a789:
fffff880`04975789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80199b73370
GetUlongPtrFromAddress: unable to read from fffff80199b73488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06c96ee0 00000000`00010000     : fffffa80`07215010 ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 : nvlddmkm+0xd2a789
fffff880`06c96ee8 fffffa80`07215010     : ffffd048`64772013 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 : 0x10000
fffff880`06c96ef0 ffffd048`64772013     : 00000000`00000000 fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 : 0xfffffa80`07215010
fffff880`06c96ef8 00000000`00000000     : fffffa80`08cfbc40 fffff880`009c0180 00000000`00000000 fffffa80`0992f3e8 : 0xffffd048`64772013


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006c964e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007024805, The address that the exception occurred at
Arg3: fffff88004c6eca8, Exception Record Address
Arg4: fffff88004c6e4e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9616

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 44057

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88007024805

BUGCHECK_P3: fffff88004c6eca8

BUGCHECK_P4: fffff88004c6e4e0

EXCEPTION_RECORD:  fffff88004c6eca8 -- (.exr 0xfffff88004c6eca8)
ExceptionAddress: fffff88007024805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88004c6e4e0 -- (.cxr 0xfffff88004c6e4e0)
rax=0000000000000000 rbx=fffffa80074ed8f0 rcx=47bfb1cfa9dd0000
rdx=8000000000000020 rsi=fffffa80074ed8f0 rdi=0000000000000000
rip=fffff88007024805 rsp=fffff88004c6eee0 rbp=fffffa8008c10010
 r8=fffff88006b1f870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007aa81e0 r12=000000000000000f r13=fffff88004c6f2f8
r14=0000000000000000 r15=fffffa80088d3000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`07024805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802a0965370
GetUlongPtrFromAddress: unable to read from fffff802a0965488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`04c6eee0 fffff880`06fc9c90     : fffff880`06f51ffd fffff880`0371ac1d fffff880`036397ac fffff880`0364775f : nvlddmkm+0xd2a805
fffff880`04c6eee8 fffff880`06f51ffd     : fffff880`0371ac1d fffff880`036397ac fffff880`0364775f fffff880`03636928 : nvlddmkm+0xccfc90
fffff880`04c6eef0 fffff880`0371ac1d     : fffff880`036397ac fffff880`0364775f fffff880`03636928 fffff880`0362f614 : nvlddmkm+0xc57ffd
fffff880`04c6eef8 fffff880`036397ac     : fffff880`0364775f fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 : dxgkrnl+0x8dc1d
fffff880`04c6ef00 fffff880`0364775f     : fffff880`03636928 fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 : dxgmms1+0x287ac
fffff880`04c6ef08 fffff880`03636928     : fffff880`0362f614 fffff880`0364fba5 fffff880`0364f662 00000000`00000001 : dxgmms1+0x3675f
fffff880`04c6ef10 fffff880`0362f614     : fffff880`0364fba5 fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd : dxgmms1+0x25928
fffff880`04c6ef18 fffff880`0364fba5     : fffff880`0364f662 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 : dxgmms1+0x1e614
fffff880`04c6ef20 fffff880`0364f662     : 00000000`00000001 ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`04c6ef28 00000000`00000001     : ffffbf3f`b50947fd fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 : dxgmms1+0x3e662
fffff880`04c6ef30 ffffbf3f`b50947fd     : fffff880`04c6ef98 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 : 0x1
fffff880`04c6ef38 fffff880`04c6ef98     : 00000000`00000000 fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 : 0xffffbf3f`b50947fd
fffff880`04c6ef40 00000000`00000000     : fffffa80`09ff5568 fffffa80`09ff5340 fffff880`04c6f7d0 00000000`0000000f : 0xfffff880`04c6ef98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88004c6e4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006ff7789, The address that the exception occurred at
Arg3: fffff880044f8ca8, Exception Record Address
Arg4: fffff880044f84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8734

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30490

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006ff7789

BUGCHECK_P3: fffff880044f8ca8

BUGCHECK_P4: fffff880044f84e0

EXCEPTION_RECORD:  fffff880044f8ca8 -- (.exr 0xfffff880044f8ca8)
ExceptionAddress: fffff88006ff7789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044f84e0 -- (.cxr 0xfffff880044f84e0)
rax=0000000000000000 rbx=fffffa800c13ca70 rcx=3078f1ab8d320000
rdx=8000000000000020 rsi=fffffa800c13ca70 rdi=0000000000000000
rip=fffff88006ff7789 rsp=fffff880044f8ee0 rbp=fffffa8008ce0010
 r8=fffff88006af2880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007bbe310 r12=000000000000000f r13=fffff880044f92f8
r14=0000000000000000 r15=fffffa8008b22000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06ff7789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80166bd4370
GetUlongPtrFromAddress: unable to read from fffff80166bd4488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044f8ee0 fffff880`06f9cc4c     : fffff880`06f24ffd fffff880`036fdc1d fffff880`036287ac fffff880`0363675f : nvlddmkm+0xd2a789
fffff880`044f8ee8 fffff880`06f24ffd     : fffff880`036fdc1d fffff880`036287ac fffff880`0363675f fffff880`03625928 : nvlddmkm+0xccfc4c
fffff880`044f8ef0 fffff880`036fdc1d     : fffff880`036287ac fffff880`0363675f fffff880`03625928 fffff880`0361e614 : nvlddmkm+0xc57ffd
fffff880`044f8ef8 fffff880`036287ac     : fffff880`0363675f fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 : dxgkrnl+0x8dc1d
fffff880`044f8f00 fffff880`0363675f     : fffff880`03625928 fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 : dxgmms1+0x287ac
fffff880`044f8f08 fffff880`03625928     : fffff880`0361e614 fffff880`0363eba5 fffff880`0363e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`044f8f10 fffff880`0361e614     : fffff880`0363eba5 fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 : dxgmms1+0x25928
fffff880`044f8f18 fffff880`0363eba5     : fffff880`0363e662 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 : dxgmms1+0x1e614
fffff880`044f8f20 fffff880`0363e662     : 00000000`00000001 ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`044f8f28 00000000`00000001     : ffffc8f8`f5e40312 fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 : dxgmms1+0x3e662
fffff880`044f8f30 ffffc8f8`f5e40312     : fffff880`044f8f98 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 : 0x1
fffff880`044f8f38 fffff880`044f8f98     : 00000000`00000000 fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 : 0xffffc8f8`f5e40312
fffff880`044f8f40 00000000`00000000     : fffffa80`0babe8c8 fffffa80`0babe6a0 fffff880`044f97d0 00000000`0000000f : 0xfffff880`044f8f98


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044f84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880049d3805, The address that the exception occurred at
Arg3: fffff88006ca5ca8, Exception Record Address
Arg4: fffff88006ca54e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4369

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 35622

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880049d3805

BUGCHECK_P3: fffff88006ca5ca8

BUGCHECK_P4: fffff88006ca54e0

EXCEPTION_RECORD:  fffff88006ca5ca8 -- (.exr 0xfffff88006ca5ca8)
ExceptionAddress: fffff880049d3805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006ca54e0 -- (.cxr 0xfffff88006ca54e0)
rax=0000000000000000 rbx=fffffa800be4b990 rcx=c2717396e1af0000
rdx=8000000000000020 rsi=fffffa800be4b990 rdi=0000000000000000
rip=fffff880049d3805 rsp=fffff88006ca5ee0 rbp=fffffa8008d435e0
 r8=fffff880044ce870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c2d310 r12=000000000000000f r13=fffff88006ca62f8
r14=0000000000000000 r15=fffffa8008a0d000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`049d3805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8016db5b370
GetUlongPtrFromAddress: unable to read from fffff8016db5b488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06ca5ee0 fffff880`04978c90     : fffff880`04900ffd ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 : nvlddmkm+0xd2a805
fffff880`06ca5ee8 fffff880`04900ffd     : ffff7f46`273d97e9 fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 : nvlddmkm+0xccfc90
fffff880`06ca5ef0 ffff7f46`273d97e9     : fffff880`038767ac fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06ca5ef8 fffff880`038767ac     : fffffa80`08d3d840 fffff880`009c0180 00000000`00000000 fffffa80`094f0028 : 0xffff7f46`273d97e9
fffff880`06ca5f00 fffffa80`08d3d840     : fffff880`009c0180 00000000`00000000 fffffa80`094f0028 00000000`00000000 : dxgmms1+0x287ac
fffff880`06ca5f08 fffff880`009c0180     : 00000000`00000000 fffffa80`094f0028 00000000`00000000 00000000`00000000 : 0xfffffa80`08d3d840
fffff880`06ca5f10 00000000`00000000     : fffffa80`094f0028 00000000`00000000 00000000`00000000 fffffa80`08d3d700 : 0xfffff880`009c0180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006ca54e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006fb9789, The address that the exception occurred at
Arg3: fffff880044abca8, Exception Record Address
Arg4: fffff880044ab4e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3711

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006fb9789

BUGCHECK_P3: fffff880044abca8

BUGCHECK_P4: fffff880044ab4e0

EXCEPTION_RECORD:  fffff880044abca8 -- (.exr 0xfffff880044abca8)
ExceptionAddress: fffff88006fb9789 (nvlddmkm+0x0000000000d2a789)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880044ab4e0 -- (.cxr 0xfffff880044ab4e0)
rax=0000000000000000 rbx=fffffa800c243510 rcx=213f9e6ed8100000
rdx=8000000000000020 rsi=fffffa800c243510 rdi=0000000000000000
rip=fffff88006fb9789 rsp=fffff880044abee0 rbp=fffffa8008cb1010
 r8=fffff88006ab4880  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c24330 r12=000000000000000f r13=fffff880044ac2f8
r14=0000000000000000 r15=fffffa8008969000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a789:
fffff880`06fb9789 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8017cfdd370
GetUlongPtrFromAddress: unable to read from fffff8017cfdd488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`044abee0 00000002`00000000     : 00000000`00000000 fffffa80`08aea1a8 00000004`00000000 00000000`00000000 : nvlddmkm+0xd2a789
fffff880`044abee8 00000000`00000000     : fffffa80`08aea1a8 00000004`00000000 00000000`00000000 fffff880`044ac000 : 0x00000002`00000000


SYMBOL_NAME:  nvlddmkm+d2a789

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880044ab4e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a789

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800515e805, The address that the exception occurred at
Arg3: fffff88006da8ca8, Exception Record Address
Arg4: fffff88006da84e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1842

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13524

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 28699

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800515e805

BUGCHECK_P3: fffff88006da8ca8

BUGCHECK_P4: fffff88006da84e0

EXCEPTION_RECORD:  fffff88006da8ca8 -- (.exr 0xfffff88006da8ca8)
ExceptionAddress: fffff8800515e805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff88006da84e0 -- (.cxr 0xfffff88006da84e0)
rax=0000000000000000 rbx=fffffa800c0df500 rcx=3c8edfd421450000
rdx=8000000000000020 rsi=fffffa800c0df500 rdi=0000000000000000
rip=fffff8800515e805 rsp=fffff88006da8ee0 rbp=fffffa800907f010
 r8=fffff88004c59870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007e2e730 r12=000000000000000f r13=fffff88006da92f8
r14=0000000000000000 r15=fffffa8008bfd000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`0515e805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff802f1bc5370
GetUlongPtrFromAddress: unable to read from fffff802f1bc5488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`06da8ee0 fffff880`05103c90     : fffff880`0508bffd ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 : nvlddmkm+0xd2a805
fffff880`06da8ee8 fffff880`0508bffd     : ffffb2a5`7206a005 fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 : nvlddmkm+0xccfc90
fffff880`06da8ef0 ffffb2a5`7206a005     : fffff880`03c287ac fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 : nvlddmkm+0xc57ffd
fffff880`06da8ef8 fffff880`03c287ac     : fffffa80`0907a840 fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 : 0xffffb2a5`7206a005
fffff880`06da8f00 fffffa80`0907a840     : fffff802`f1b65180 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 : dxgmms1+0x287ac
fffff880`06da8f08 fffff802`f1b65180     : 00000000`00000000 fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 : 0xfffffa80`0907a840
fffff880`06da8f10 00000000`00000000     : fffffa80`0a86f3e8 00000000`00000000 00000000`00000000 fffffa80`0907a700 : nt!KiInitialPCR+0x180


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff88006da84e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006c8a808, The address that the exception occurred at
Arg3: fffff880045b8c78, Exception Record Address
Arg4: fffff880045b84b0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12490

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27234

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006c8a808

BUGCHECK_P3: fffff880045b8c78

BUGCHECK_P4: fffff880045b84b0

EXCEPTION_RECORD:  fffff880045b8c78 -- (.exr 0xfffff880045b8c78)
ExceptionAddress: fffff88006c8a808 (nvlddmkm+0x0000000000064808)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000000000a0
Attempt to read from address 00000000000000a0

CONTEXT:  fffff880045b84b0 -- (.cxr 0xfffff880045b84b0)
rax=fffff880045b8ed8 rbx=0000000000000000 rcx=fffffa800e06a800
rdx=0000000000010000 rsi=fffffa800e06a800 rdi=0000000000000000
rip=fffff88006c8a808 rsp=fffff880045b8eb0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000001200000 r10=000000007fffffff
r11=0000000020010020 r12=0000000000300000 r13=fffff880045b92f8
r14=0000000000010000 r15=fffffa8008e52000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nvlddmkm+0x64808:
fffff880`06c8a808 8b87a0000000    mov     eax,dword ptr [rdi+0A0h] ds:002b:00000000`000000a0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80341170370
GetUlongPtrFromAddress: unable to read from fffff80341170488
 00000000000000a0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000000000a0

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`045b8eb0 00000000`00300000     : 00000000`00001000 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 : nvlddmkm+0x64808
fffff880`045b8eb8 00000000`00001000     : 00000000`00000000 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a : 0x300000
fffff880`045b8ec0 00000000`00000000     : 00000000`0000000f fffffa80`0a8318d0 fffff880`07950d2a 00000000`00010000 : 0x1000


SYMBOL_NAME:  nvlddmkm+64808

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880045b84b0 ; kb

BUCKET_ID_FUNC_OFFSET:  64808

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80067eba3d0, Address of the instruction which caused the BugCheck
Arg3: fffff8800abd2d10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7541

    Key  : Analysis.Init.CPU.mSec
    Value: 842

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27529

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80067eba3d0

BUGCHECK_P3: fffff8800abd2d10

BUGCHECK_P4: 0

CONTEXT:  fffff8800abd2d10 -- (.cxr 0xfffff8800abd2d10)
rax=00000000c0000034 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800abd3c01 rsi=fffff901000b9750 rdi=ffffffffc0000034
rip=fffff80067eba3d0 rsp=fffff8800abd3718 rbp=fffff8800abd3820
 r8=fffffa80094d1370  r9=fffff8a003b6c580 r10=fffffa8006a2a760
r11=fffff8800abd3700 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!IoGetRelatedDeviceObject:
fffff800`67eba3d0 488b4110        mov     rax,qword ptr [rcx+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
fffff880`0abd3718 fffff960`0009d473     : 00000000`00000000 00000000`00000000 fffff901`000b9750 00000000`00000000 : nt!IoGetRelatedDeviceObject
fffff880`0abd3720 00000000`00000000     : 00000000`00000000 fffff901`000b9750 00000000`00000000 00000000`00000000 : win32k+0x77473


SYMBOL_NAME:  win32k+77473

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .cxr 0xfffff8800abd2d10 ; kb

BUCKET_ID_FUNC_OFFSET:  77473

FAILURE_BUCKET_ID:  0x3B_c0000005_win32k!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {8ffa81ae-e629-24c5-067f-7d1473d12e2c}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800499d805, The address that the exception occurred at
Arg3: fffff88003395ca8, Exception Record Address
Arg4: fffff880033954e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9540

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800499d805

BUGCHECK_P3: fffff88003395ca8

BUGCHECK_P4: fffff880033954e0

EXCEPTION_RECORD:  fffff88003395ca8 -- (.exr 0xfffff88003395ca8)
ExceptionAddress: fffff8800499d805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880033954e0 -- (.cxr 0xfffff880033954e0)
rax=0000000000000000 rbx=fffffa80070951d0 rcx=d08e77d4e2230000
rdx=8000000000000020 rsi=fffffa80070951d0 rdi=0000000000000000
rip=fffff8800499d805 rsp=fffff88003395ee0 rbp=fffffa8008db9010
 r8=fffff88004498870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007c11310 r12=000000000000000f r13=fffff880033962f8
r14=0000000000000000 r15=fffffa8008b95000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0xd2a805:
fffff880`0499d805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80360361370
GetUlongPtrFromAddress: unable to read from fffff80360361488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03395ee0 fffff880`04942c90     : fffff880`048caffd fffff880`03743c1d fffff880`038587ac fffff880`0386675f : nvlddmkm+0xd2a805
fffff880`03395ee8 fffff880`048caffd     : fffff880`03743c1d fffff880`038587ac fffff880`0386675f fffff880`03855928 : nvlddmkm+0xccfc90
fffff880`03395ef0 fffff880`03743c1d     : fffff880`038587ac fffff880`0386675f fffff880`03855928 fffff880`0384e614 : nvlddmkm+0xc57ffd
fffff880`03395ef8 fffff880`038587ac     : fffff880`0386675f fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 : dxgkrnl+0x8dc1d
fffff880`03395f00 fffff880`0386675f     : fffff880`03855928 fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 : dxgmms1+0x287ac
fffff880`03395f08 fffff880`03855928     : fffff880`0384e614 fffff880`0386eba5 fffff880`0386e662 00000000`00000001 : dxgmms1+0x3675f
fffff880`03395f10 fffff880`0384e614     : fffff880`0386eba5 fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 : dxgmms1+0x25928
fffff880`03395f18 fffff880`0386eba5     : fffff880`0386e662 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 : dxgmms1+0x1e614
fffff880`03395f20 fffff880`0386e662     : 00000000`00000001 ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`03395f28 00000000`00000001     : ffff280e`74edbc03 fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 : dxgmms1+0x3e662
fffff880`03395f30 ffff280e`74edbc03     : fffff880`03395f98 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 : 0x1
fffff880`03395f38 fffff880`03395f98     : 00000000`00000000 fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 : 0xffff280e`74edbc03
fffff880`03395f40 00000000`00000000     : fffffa80`0b5a3238 fffffa80`0b5a3010 fffff880`033967d0 00000000`0000000f : 0xfffff880`03395f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880033954e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004996805, The address that the exception occurred at
Arg3: fffff880067a1ca8, Exception Record Address
Arg4: fffff880067a14e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10799

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30714

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: win8_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-04-10T15:05:00Z

    Key  : WER.OS.Version
    Value: 8.0.9200.16581


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004996805

BUGCHECK_P3: fffff880067a1ca8

BUGCHECK_P4: fffff880067a14e0

EXCEPTION_RECORD:  fffff880067a1ca8 -- (.exr 0xfffff880067a1ca8)
ExceptionAddress: fffff88004996805 (nvlddmkm+0x0000000000d2a805)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  fffff880067a14e0 -- (.cxr 0xfffff880067a14e0)
rax=0000000000000000 rbx=fffffa800bc16240 rcx=09bba9bc1bf40000
rdx=8000000000000020 rsi=fffffa800bc16240 rdi=0000000000000000
rip=fffff88004996805 rsp=fffff880067a1ee0 rbp=fffffa8008d4c3d0
 r8=fffff88004491870  r9=0000000000000008 r10=0000000000000000
r11=fffffa8007ba2010 r12=000000000000000f r13=fffff880067a22f8
r14=0000000000000000 r15=fffffa8008bd4000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nvlddmkm+0xd2a805:
fffff880`04996805 498b9e80000000  mov     rbx,qword ptr [r14+80h] ds:002b:00000000`00000080=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800c07c8370
GetUlongPtrFromAddress: unable to read from fffff800c07c8488
 0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`067a1ee0 fffff880`0493bc90     : fffff880`048c3ffd fffff880`036adc1d fffff880`037c27ac fffff880`037d075f : nvlddmkm+0xd2a805
fffff880`067a1ee8 fffff880`048c3ffd     : fffff880`036adc1d fffff880`037c27ac fffff880`037d075f fffff880`037bf928 : nvlddmkm+0xccfc90
fffff880`067a1ef0 fffff880`036adc1d     : fffff880`037c27ac fffff880`037d075f fffff880`037bf928 fffff880`037b8614 : nvlddmkm+0xc57ffd
fffff880`067a1ef8 fffff880`037c27ac     : fffff880`037d075f fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 : dxgkrnl+0x8dc1d
fffff880`067a1f00 fffff880`037d075f     : fffff880`037bf928 fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 : dxgmms1+0x287ac
fffff880`067a1f08 fffff880`037bf928     : fffff880`037b8614 fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 : dxgmms1+0x3675f
fffff880`067a1f10 fffff880`037b8614     : fffff880`037d8ba5 fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 : dxgmms1+0x25928
fffff880`067a1f18 fffff880`037d8ba5     : fffff880`037d8662 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 : dxgmms1+0x1e614
fffff880`067a1f20 fffff880`037d8662     : 00000000`00000001 fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 : dxgmms1+0x3eba5
fffff880`067a1f28 00000000`00000001     : fffff13b`afc605d4 fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 : dxgmms1+0x3e662
fffff880`067a1f30 fffff13b`afc605d4     : fffff880`067a1f98 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 : 0x1
fffff880`067a1f38 fffff880`067a1f98     : 00000000`00000000 fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 : 0xfffff13b`afc605d4
fffff880`067a1f40 00000000`00000000     : fffffa80`097e4e48 fffffa80`097e4c20 fffff880`067a27d0 00000000`0000000f : 0xfffff880`067a1f98


SYMBOL_NAME:  nvlddmkm+d2a805

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff880067a14e0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2a805

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.0.9200.16581

BUILDLAB_STR:  win8_gdr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
NVIDIA GeForce GTX 1050
Aman ekran kartında donanımsal sıkıntı yoktur inşallah. Çok pahalı şimdi her şey zaten.
Abi sürücü çökmüş?

Dediğiniz gibi Easy Anti-Cheat'si kaldırdığımdan beri 1 kere bile çökmedi. Çok tuhaf bu uygulamayı aylardır belki de yıllardır çalıştırmıyordum bile.
 
Son düzenleme:

Yeni konular

Geri
Yukarı