UNEXPECTED_KERNEL_MODE_TRAP_M mavi ekran hatası

LEGOLAS K

Hectopat
Katılım
2 Aralık 2020
Mesajlar
152
Bugün bilgisayarı açtım 1, 2 saat sonra hata verdi. Normal, ara sıra oluyor diye bir şey yapmadım. Ama açıldığında tekrar mavi ekran verdi. Bu hataların sebebi virüsten olabilir mi diye soracağım. Ve bilgisayara bugün CS 1.6 indirdim ondan olabilir mi?
 
Olabilir. Minidump dosyalarını paylaşmanızı öneririm.
 
Minidump dosyalarımı paylaşmamı istemiştiniz.
Kimse yok mu?
Hocam dosyaları inceledim. Görünüşe göre ekran kartından kaynaklı bir hata almışsınız.

- Ekran kartı sürücünüzü DDU ile kaldırıp en son sürümü yükleyin. DDU ile Sürücü Kaldırma Rehberi
- MSI Afterburner yazılımı var ise kaldırın.
- ''SFC /scannow'' komutunu uygulayın. SFC /scannow komutu nedir? Ne işe yarar?
- Bir antivirüs programıyla virüs taraması yapın.
 
Ekran kartınızın sürücülerini DDU ile kaldırıp sitesinden güncelleyin. Kamerayı çıkarın.

BattlEye'ı kaldırın ve Memtest yapın. RAM'lerde sorun çıkarsa değiştirmeniz gerekecek, şimdiden belirteyim.

Ayrıca gördüğüm kadarıyla sisteminiz çok eski. Donanımsal bir sorun olabilir. Sistem bileşenlerinizi belirtin.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 8ed03750
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for BEDaisy.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1750

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19065

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-03-18T15:33:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.18113


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffffff8ed03750

BUGCHECK_P3: 0

BUGCHECK_P4: 0

STACK_OVERFLOW: Stack Limit: 8ed81000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xffffffff8a07db06 was blamed for the stack overflow. It is using 5736 bytes of stack.

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

SYMBOL_NAME:  BEDaisy+5ab06

MODULE_NAME: BEDaisy

IMAGE_NAME:  BEDaisy.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_BEDaisy+5ab06

OS_VERSION:  7.1.7601.18113

BUILDLAB_STR:  win7sp1_gdr

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {581f6757-f956-5396-4f31-3b43621b3570}

Followup:     MachineOwner
---------



UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 8ed03750
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for BEDaisy.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18299

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-03-18T15:33:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.18113


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffffff8ed03750

BUGCHECK_P3: 0

BUGCHECK_P4: 0

STACK_OVERFLOW: Stack Limit: 8ed8d000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xffffffffad05bb06 was blamed for the stack overflow. It is using 5736 bytes of stack.

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
8ed8d014 954fbea5     86fa4350 8ed8d094 8ed8d03c dxgmms1!VidSchDdiNotifyInterrupt+0x76
8ed8d024 954fbf0e     86aaefd0 86fa4350 8ed8d094 dxgkrnl!VIDSCH_EXPORT::VidSchDdiNotifyInterrupt+0x14
8ed8d03c 95a7ea08     86fa4350 8ed8d094 8ed8d094 dxgkrnl!DxgNotifyInterruptCB+0x60
WARNING: Stack unwind information not available. Following frames may be wrong.
8ed8d058 95a7ec20     8ed8d094 8705e000 87ab61e0 nvlddmkm+0x59a08
8ed8d07c 95ab730d     00000000 0005bf5a 8706206c nvlddmkm+0x59c20
8ed8d118 95ab88dc     00000000 00000000 00000000 nvlddmkm+0x9230d
8ed8d130 95a7ee0b     8705e000 00000000 00000000 nvlddmkm+0x938dc
8ed8d180 95a7f045     00000000 8705e000 8668a284 nvlddmkm+0x59e0b
8ed8d1a8 95ad194f     95a2fb75 00000000 8ed8d1c8 nvlddmkm+0x5a045
8ed8d1b8 954fbb14     8705e000 00000000 8ed8d1dc nvlddmkm+0xac94f
8ed8d1c8 9550bd59     87492c80 86fa4350 00000000 dxgkrnl!DpiFdoMessageInterruptRoutine+0x17
8ed8d1dc 8324abec     87492c80 86fa4350 00000000 dxgkrnl!DpiFdoLineInterruptRoutine+0x12
8ed8d208 8324ab39     8c7cdf02 00000061 8ed8d298 nt!KiChainedDispatch2ndLvl+0x60
8ed8d208 836298ea (T) 8c7cdf02 00000061 8ed8d298 nt!KiChainedDispatch+0x29
8ed8d298 83629b29 (T) 8ed00002 8ed8d2cc c6e90b0c hal!HalpDispatchSoftwareInterrupt+0x24
8ed8d2b0 83629cc3     86606d28 8ed8d2cc 8324ab83 hal!HalpCheckForSoftwareInterrupt+0x83
8ed8d2bc 8324ab83     87505300 000000a2 8ed8d7a4 hal!HalEndSystemInterrupt+0x67
8ed8d2bc 832b9ea8 (T) 87505300 000000a2 8ed8d7a4 nt!KiChainedDispatch+0x73
8ed8d7a4 832434f9 (T) 8ed8d7c8 8c93f62c 00000000 nt!_woutput_l+0x819
8ed8d7e8 832ba0ae     8ed8d850 00000063 8c93f5fc nt!_vsnwprintf_l+0x7b
8ed8d804 8c935160     8ed8d850 00000063 8c93f5fc nt!_vsnwprintf+0x18
8ed8d828 8c93bfac     8ed8d850 000000c8 8c93f5fc volmgr!RtlStringCbPrintfW+0x3a
8ed8d91c 8c9358ab     86b670e8 87c7e978 00004000 volmgr!VmpQueryDeviceName+0x46
8ed8d940 83247c29     86b67030 87c7eb2c 86b68cb8 volmgr!VmDeviceControl+0x2f1
8ed8d958 8d03a854     8ed8d9a0 8d03b74d 86b68c00 nt!IofCallDriver+0x63
8ed8d960 8d03b74d     86b68c00 87c7e978 86b690f0 fvevol!FveFilterSkip+0x1e
8ed8d9a0 83247c29     86b68c00 87c7e978 86b690d8 fvevol!FveFilterDeviceControl+0x16f
8ed8d9b8 8ce0708f     8ed8da58 87c7e978 8ed8da10 nt!IofCallDriver+0x63
8ed8d9c8 8ce0f6f6     86b69020 87c7e978 02396b3f rdyboost!SmdDispatchPassthrough+0x6d
8ed8da10 83247c29     86b69020 87c7e978 87c7e978 rdyboost!SmdDispatchDeviceControl+0x68
8ed8da28 8cfe7217     83331005 86b692a0 41746e4d nt!IofCallDriver+0x63
8ed8da58 83247c29     87c7eb2c 87c7e978 00000000 volsnap!VolSnapDeviceControl+0x49
8ed8da70 8c9ac03c     824031a8 00040000 00000000 nt!IofCallDriver+0x63
8ed8da94 8c9ac523     86b692a0 004d0008 00000000 mountmgr!MountMgrSendDeviceControl+0x54
8ed8dad4 8c9acb51     8663fa38 00000000 8ed8db08 mountmgr!QueryDeviceInformation+0x171
8ed8db14 8c9aeffa     8663fa38 8ed8db3c 00000000 mountmgr!FindDeviceInfo+0x3f
8ed8db5c 8c9b45f0     8663fa38 87b88100 00000000 mountmgr!MountMgrQueryDosVolumePath+0x100
8ed8db78 83247c29     8663fa54 006d0030 00000200 mountmgr!MountMgrDeviceControl+0xe4
8ed8db90 83407c1b     000000c8 c12e44f8 880ee028 nt!IofCallDriver+0x63
8ed8e3f0 83453f02     86b67030 c12e44f8 a7bd5a24 nt!IoVolumeDeviceToDosName+0x1bf
8ed8e440 8340cdf4     880ee028 00000001 be70d130 nt!IopQueryNameInternal+0xb2
8ed8e470 ad05bb06     880ee028 8ed8e58c 861a1000 nt!IoQueryFileDosDeviceName+0x2e
8ed8fad8 833d43a0     860f26a8 861a1000 00000000 BEDaisy+0x5ab06
8ed8fcbc 833d7e52     00000001 00000000 8ed8fce4 nt!IopLoadDriver+0x7ed
8ed8fd00 8328df0b     b118fcd0 00000000 85d1ea70 nt!IopLoadUnloadDriver+0x70
8ed8fd50 8341a12f     00000001 a7bd43f4 00000000 nt!ExpWorkerThread+0x10d
8ed8fd90 832c1549     8328ddfe 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000     00000000 00000000 00000000 nt!KiThreadStartup+0x19


SYMBOL_NAME:  BEDaisy+5ab06

MODULE_NAME: BEDaisy

IMAGE_NAME:  BEDaisy.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_BEDaisy+5ab06

OS_VERSION:  7.1.7601.18113

BUILDLAB_STR:  win7sp1_gdr

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {581f6757-f956-5396-4f31-3b43621b3570}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c0802090
Arg3: 0000ffff
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1437

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6768

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-03-18T15:33:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.18113


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffffffc0802090

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ac973ba8 832a6626     04790002 04b72fff 86c062a0 nt!MiDeleteVirtualAddresses+0x41a
ac973c78 832a62db     86c062a0 87d8c1c0 85dde680 nt!MiRemoveMappedView+0x325
ac973ca0 8344e4f6     85dde680 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
ac973d04 8346c9ff     86c062a0 04790000 00000000 nt!MiUnmapViewOfSection+0x265
ac973d24 832448ba     ffffffff 04790000 001ae3e8 nt!NtUnmapViewOfSection+0x55
ac973d24 771f7094 (T) ffffffff 04790000 001ae3e8 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
001ae3e8 00000000 (T) 00000000 00000000 00000000 0x771f7094


SYMBOL_NAME:  nt!MiDeleteVirtualAddresses+41a

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.18113

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrpamp.exe

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeleteVirtualAddresses+41a

OS_VERSION:  7.1.7601.18113

BUILDLAB_STR:  win7sp1_gdr

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {74f59fbc-68cc-18a4-f2dd-4d332b50b356}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c08024ba
Arg3: 0000ffff
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 2263

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_gdr

    Key  : WER.OS.Timestamp
    Value: 2013-03-18T15:33:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.18113


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffffffc08024ba

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  zula.exe

STACK_TEXT: 
b0913ba8 832f1626     47210002 4761ffff 87d49030 nt!MiDeleteVirtualAddresses+0x41a
b0913c78 832f12db     87d49030 878ff588 87dba658 nt!MiRemoveMappedView+0x325
b0913ca0 834994f6     87dba658 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
b0913d04 834b79ff     87d49030 47210000 00000000 nt!MiUnmapViewOfSection+0x265
b0913d24 8328f8ba     ffffffff 47210000 1a9df854 nt!NtUnmapViewOfSection+0x55
b0913d24 77847094 (T) ffffffff 47210000 1a9df854 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
1a9df854 00000000 (T) 00000000 00000000 00000000 0x77847094


SYMBOL_NAME:  nt!MiDeleteVirtualAddresses+41a

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.18113

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrpamp.exe

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeleteVirtualAddresses+41a

OS_VERSION:  7.1.7601.18113

BUILDLAB_STR:  win7sp1_gdr

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {74f59fbc-68cc-18a4-f2dd-4d332b50b356}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c08026f8
Arg3: 0000ffff
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1421

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2353

Key : Analysis.Memory.CommitPeak.Mb
Value: 68

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z

Key : WER.OS.Version
Value: 7.1.7601.18113


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffffffc08026f8

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

STACK_TEXT:
a429bba8 832bd626 6b1c0002 6b1ddfff 86eecc70 nt!MiDeleteVirtualAddresses+0x41a
a429bc78 832bd2db 86eecc70 87c0e970 883be030 nt!MiRemoveMappedView+0x325
a429bca0 834654f6 883be030 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
a429bd04 834839ff 86eecc70 6b1c0000 00000000 nt!MiUnmapViewOfSection+0x265
a429bd24 8325b8ba ffffffff 6b1c0000 0312f5cc nt!NtUnmapViewOfSection+0x55
a429bd24 77037094 (T) ffffffff 6b1c0000 0312f5cc nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0312f5cc 00000000 (T) 00000000 00000000 00000000 0x77037094


SYMBOL_NAME: nt!MiDeleteVirtualAddresses+41a

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.18113

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrpamp.exe

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+41a

OS_VERSION: 7.1.7601.18113

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x86

OSNAME: Windows 7

FAILURE_ID_HASH: {74f59fbc-68cc-18a4-f2dd-4d332b50b356}

Followup: MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8d046648, The address that the exception occurred at
Arg3: b9fd9b5c, Exception Record Address
Arg4: b9fd9740, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullPtr

Key : AV.Fault
Value: Write

Key : Analysis.CPU.mSec
Value: 1359

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5404

Key : Analysis.Memory.CommitPeak.Mb
Value: 69

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: win7sp1_gdr

Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z

Key : WER.OS.Version
Value: 7.1.7601.18113


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff8d046648

BUGCHECK_P3: ffffffffb9fd9b5c

BUGCHECK_P4: ffffffffb9fd9740

EXCEPTION_RECORD:  b9fd9b5c -- (.exr 0xffffffffb9fd9b5c)
ExceptionAddress: 8d046648 (volsnap!VspCollectLazyOffsetsPass+0x0000015c)
   ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 00000000
Attempt to write to address 00000000

CONTEXT:  b9fd9740 -- (.cxr 0xffffffffb9fd9740)
eax=00000000 ebx=00000001 ecx=00000018 edx=00000000 esi=00000001 edi=b9fd9cac
eip=8d046648 esp=b9fd9c24 ebp=b9fd9c60 iopl=0         nv up ei ng nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010297
volsnap!VspCollectLazyOffsetsPass+0x15c:
8d046648 890c90 mov dword ptr [eax+edx*4],ecx ds:0023:00000000=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

WRITE_ADDRESS: 83331c00: Unable to get Flags value from nt!KdVersionBlock
83331c00: Unable to get Flags value from nt!KdVersionBlock
83331c00: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 83371208
GetUlongPtrFromAddress: unable to read from 833716e0
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
00000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 00000001

EXCEPTION_PARAMETER2: 00000000

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
b9fd9c60 8d057b38 00000002 b9fd9c90 b9fd9cd0 volsnap!VspCollectLazyOffsetsPass+0x15c
b9fd9d18 8d05fecd 0000afae 8847e020 b9fd9d58 volsnap!VspPopulateFreeBlocksBitmap+0x4a0
b9fd9d50 8341112f 00000000 90a9a4d7 00000000 volsnap!VspLazyPreCopyOnWriteWorker+0xa9
b9fd9d90 832b8549 8d05fe24 8847e008 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


SYMBOL_NAME: volsnap!VspCollectLazyOffsetsPass+15c

MODULE_NAME: volsnap

IMAGE_NAME:  volsnap.sys

IMAGE_VERSION: 6.1.7601.17514

STACK_COMMAND: .cxr 0xffffffffb9fd9740 ; kb

FAILURE_BUCKET_ID: 0x7E_volsnap!VspCollectLazyOffsetsPass+15c

OS_VERSION: 7.1.7601.18113

BUILDLAB_STR: win7sp1_gdr

OSPLATFORM_TYPE: x86

OSNAME: Windows 7

FAILURE_ID_HASH: {3bea71b2-42c2-4274-cd21-1d524a344053}

Followup: MachineOwner
---------



VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: 861b3138, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: 944cea80, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 00000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 00000002, Optional internal context dependent data.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1374

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 7738

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: win7_gdr

Key : WER.OS.Timestamp
Value: 2013-03-18T15:32:00Z

Key : WER.OS.Version
Value: 7.0.7600.17273


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 116

BUGCHECK_P1: ffffffff861b3138

BUGCHECK_P2: ffffffff944cea80

BUGCHECK_P3: 0

BUGCHECK_P4: 2

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
8e2dcb74 95ac0c26 00000116 861b3138 944cea80 nt!KeBugCheckEx+0x1e
8e2dcb98 95ac1a45 944cea80 00000000 00000002 dxgkrnl!TdrBugcheckOnTimeout+0x8d
8e2dcbbc 95af192c 00000000 00000102 86c92008 dxgkrnl!TdrIsRecoveryRequired+0xb8
WARNING: Stack unwind information not available. Following frames may be wrong.
8e2dcc34 95b1b944 fffffcfb 0017570e 00000000 dxgmms1+0x692c
8e2dcc5c 95b1c065 00000000 00000000 00000000 dxgmms1+0x30944
8e2dcc98 95af88f0 8e2dcc90 86a60d58 8798a620 dxgmms1+0x31065
8e2dcd28 95b1d3c9 86c92008 82c3c6b1 86c92008 dxgmms1+0xd8f0
8e2dcd3c 95b1d485 86c92008 00000000 86cc2610 dxgmms1+0x323c9
8e2dcd50 82e0fb6f 86c92008 a75175fd 00000000 dxgmms1+0x32485
8e2dcd90 82cc1299 95b1d406 86c92008 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


SYMBOL_NAME: nvlddmkm+aca80

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x116_IMAGE_nvlddmkm.sys

OS_VERSION: 7.0.7600.17273

BUILDLAB_STR: win7_gdr

OSPLATFORM_TYPE: x86

OSNAME: Windows 7

FAILURE_ID_HASH: {c89bfe8c-ed39-f658-ef27-f2898997fdbd}

Followup: MachineOwner
---------
 
Şimdilik öyle bir şey görmedim. Öneri ve isteklerimi belirttim. Yapın, devam ederse bakarız bir çaresine.
 
Tamam teşekkür ederim.

Sistem bileşenlerin eski ise donanımsal bir sorun olabilir.

Bilgisayar çok eski dediğiniz gibi 11 yıllık :)

Ekran kartınızın sürücülerini DDU ile kaldırıp sitesinden güncelleyin. Kamerayı çıkarın.

BattlEye'ı kaldırın ve Memtest yapın. RAM'lerde sorun çıkarsa değiştirmeniz gerekecek, şimdiden belirteyim.

Ayrıca gördüğüm kadarıyla sisteminiz çok eski. Donanımsal bir sorun olabilir. Sistem bileşenlerinizi belirtin.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT.
Arg2: 8ed03750.
Arg3: 00000000.
Arg4: 00000000.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys.
*** WARNING: Unable to verify timestamp for BEDaisy.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 1750.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 19065.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: win7sp1_gdr.

Key : WER.OS.Timestamp.
Value: 2013-03-18T15:33:00Z.

Key : WER.OS.Version.
Value: 7.1.7601.18113.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7f.

BUGCHECK_P1: 8.

BUGCHECK_P2: ffffffff8ed03750.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

STACK_OVERFLOW: Stack Limit: 8ed81000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xffffffff8a07db06 was blamed for the stack overflow. It is using 5736 bytes of stack.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

SYMBOL_NAME: BEDaisy+5ab06.

MODULE_NAME: BEDaisy.

IMAGE_NAME: BEDaisy.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_BEDaisy+5ab06.

OS_VERSION: 7.1.7601.18113.

BUILDLAB_STR: win7sp1_gdr.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 7.

FAILURE_ID_HASH: {581f6757-f956-5396-4f31-3b43621b3570}

Followup: MachineOwner.
---------

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT.
Arg2: 8ed03750.
Arg3: 00000000.
Arg4: 00000000.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys.
*** WARNING: Unable to verify timestamp for BEDaisy.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 1718.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 18299.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: win7sp1_gdr.

Key : WER.OS.Timestamp.
Value: 2013-03-18T15:33:00Z.

Key : WER.OS.Version.
Value: 7.1.7601.18113.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7f.

BUGCHECK_P1: 8.

BUGCHECK_P2: ffffffff8ed03750.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

STACK_OVERFLOW: Stack Limit: 8ed8d000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xffffffffad05bb06 was blamed for the stack overflow. It is using 5736 bytes of stack.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
8ed8d014 954fbea5 86fa4350 8ed8d094 8ed8d03c dxgmms1!VidSchDdiNotifyInterrupt+0x76.
8ed8d024 954fbf0e 86aaefd0 86fa4350 8ed8d094 dxgkrnl!VIDSCH_EXPORT::VidSchDdiNotifyInterrupt+0x14.
8ed8d03c 95a7ea08 86fa4350 8ed8d094 8ed8d094 dxgkrnl!DxgNotifyInterruptCB+0x60.
WARNING: Stack unwind information not available. Following frames may be wrong.
8ed8d058 95a7ec20 8ed8d094 8705e000 87ab61e0 nvlddmkm+0x59a08.
8ed8d07c 95ab730d 00000000 0005bf5a 8706206c nvlddmkm+0x59c20.
8ed8d118 95ab88dc 00000000 00000000 00000000 nvlddmkm+0x9230d.
8ed8d130 95a7ee0b 8705e000 00000000 00000000 nvlddmkm+0x938dc.
8ed8d180 95a7f045 00000000 8705e000 8668a284 nvlddmkm+0x59e0b.
8ed8d1a8 95ad194f 95a2fb75 00000000 8ed8d1c8 nvlddmkm+0x5a045.
8ed8d1b8 954fbb14 8705e000 00000000 8ed8d1dc nvlddmkm+0xac94f.
8ed8d1c8 9550bd59 87492c80 86fa4350 00000000 dxgkrnl!DpiFdoMessageInterruptRoutine+0x17.
8ed8d1dc 8324abec 87492c80 86fa4350 00000000 dxgkrnl!DpiFdoLineInterruptRoutine+0x12.
8ed8d208 8324ab39 8c7cdf02 00000061 8ed8d298 nt!KiChainedDispatch2ndLvl+0x60.
8ed8d208 836298ea (T) 8c7cdf02 00000061 8ed8d298 nt!KiChainedDispatch+0x29.
8ed8d298 83629b29 (T) 8ed00002 8ed8d2cc c6e90b0c hal!HalpDispatchSoftwareInterrupt+0x24.
8ed8d2b0 83629cc3 86606d28 8ed8d2cc 8324ab83 hal!HalpCheckForSoftwareInterrupt+0x83.
8ed8d2bc 8324ab83 87505300 000000a2 8ed8d7a4 hal!HalEndSystemInterrupt+0x67.
8ed8d2bc 832b9ea8 (T) 87505300 000000a2 8ed8d7a4 nt!KiChainedDispatch+0x73.
8ed8d7a4 832434f9 (T) 8ed8d7c8 8c93f62c 00000000 nt!_woutput_l+0x819.
8ed8d7e8 832ba0ae 8ed8d850 00000063 8c93f5fc nt!_vsnwprintf_l+0x7b.
8ed8d804 8c935160 8ed8d850 00000063 8c93f5fc nt!_vsnwprintf+0x18.
8ed8d828 8c93bfac 8ed8d850 000000c8 8c93f5fc volmgr!RtlStringCbPrintfW+0x3a.
8ed8d91c 8c9358ab 86b670e8 87c7e978 00004000 volmgr!VmpQueryDeviceName+0x46.
8ed8d940 83247c29 86b67030 87c7eb2c 86b68cb8 volmgr!VmDeviceControl+0x2f1.
8ed8d958 8d03a854 8ed8d9a0 8d03b74d 86b68c00 nt!IofCallDriver+0x63.
8ed8d960 8d03b74d 86b68c00 87c7e978 86b690f0 fvevol!FveFilterSkip+0x1e.
8ed8d9a0 83247c29 86b68c00 87c7e978 86b690d8 fvevol!FveFilterDeviceControl+0x16f.
8ed8d9b8 8ce0708f 8ed8da58 87c7e978 8ed8da10 nt!IofCallDriver+0x63.
8ed8d9c8 8ce0f6f6 86b69020 87c7e978 02396b3f rdyboost!SmdDispatchPassthrough+0x6d.
8ed8da10 83247c29 86b69020 87c7e978 87c7e978 rdyboost!SmdDispatchDeviceControl+0x68.
8ed8da28 8cfe7217 83331005 86b692a0 41746e4d nt!IofCallDriver+0x63.
8ed8da58 83247c29 87c7eb2c 87c7e978 00000000 volsnap!VolSnapDeviceControl+0x49.
8ed8da70 8c9ac03c 824031a8 00040000 00000000 nt!IofCallDriver+0x63.
8ed8da94 8c9ac523 86b692a0 004d0008 00000000 mountmgr!MountMgrSendDeviceControl+0x54.
8ed8dad4 8c9acb51 8663fa38 00000000 8ed8db08 mountmgr!QueryDeviceInformation+0x171.
8ed8db14 8c9aeffa 8663fa38 8ed8db3c 00000000 mountmgr!FindDeviceInfo+0x3f.
8ed8db5c 8c9b45f0 8663fa38 87b88100 00000000 mountmgr!MountMgrQueryDosVolumePath+0x100.
8ed8db78 83247c29 8663fa54 006d0030 00000200 mountmgr!MountMgrDeviceControl+0xe4.
8ed8db90 83407c1b 000000c8 c12e44f8 880ee028 nt!IofCallDriver+0x63.
8ed8e3f0 83453f02 86b67030 c12e44f8 a7bd5a24 nt!IoVolumeDeviceToDosName+0x1bf.
8ed8e440 8340cdf4 880ee028 00000001 be70d130 nt!IopQueryNameInternal+0xb2.
8ed8e470 ad05bb06 880ee028 8ed8e58c 861a1000 nt!IoQueryFileDosDeviceName+0x2e.
8ed8fad8 833d43a0 860f26a8 861a1000 00000000 BEDaisy+0x5ab06.
8ed8fcbc 833d7e52 00000001 00000000 8ed8fce4 nt!IopLoadDriver+0x7ed.
8ed8fd00 8328df0b b118fcd0 00000000 85d1ea70 nt!IopLoadUnloadDriver+0x70.
8ed8fd50 8341a12f 00000001 a7bd43f4 00000000 nt!ExpWorkerThread+0x10d.
8ed8fd90 832c1549 8328ddfe 00000001 00000000 nt!PspSystemThreadStartup+0x9e.
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19.

SYMBOL_NAME: BEDaisy+5ab06.

MODULE_NAME: BEDaisy.

IMAGE_NAME: BEDaisy.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_BEDaisy+5ab06.

OS_VERSION: 7.1.7601.18113.

BUILDLAB_STR: win7sp1_gdr.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 7.

FAILURE_ID_HASH: {581f6757-f956-5396-4f31-3b43621b3570}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2.
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used.
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c0802090.
Arg3: 0000ffff.
Arg4: 00000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 1437.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 6768.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: win7sp1_gdr.

Key : WER.OS.Timestamp.
Value: 2013-03-18T15:33:00Z.

Key : WER.OS.Version.
Value: 7.1.7601.18113.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41790.

BUGCHECK_P2: ffffffffc0802090.

BUGCHECK_P3: ffff.

BUGCHECK_P4: 0.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
ac973ba8 832a6626 04790002 04b72fff 86c062a0 nt!MiDeleteVirtualAddresses+0x41a.
ac973c78 832a62db 86c062a0 87d8c1c0 85dde680 nt!MiRemoveMappedView+0x325.
ac973ca0 8344e4f6 85dde680 00000000 ffffffff nt!MiRemoveVadAndView+0xe5.
ac973d04 8346c9ff 86c062a0 04790000 00000000 nt!MiUnmapViewOfSection+0x265.
ac973d24 832448ba ffffffff 04790000 001ae3e8 nt!NtUnmapViewOfSection+0x55.
ac973d24 771f7094 (T) ffffffff 04790000 001ae3e8 nt!KiFastCallEntry+0x12a.
WARNING: Frame IP not in any known module. Following frames may be wrong.
001ae3e8 00000000 (T) 00000000 00000000 00000000 0x771f7094.

SYMBOL_NAME: nt!MiDeleteVirtualAddresses+41a.

MODULE_NAME: nt.

IMAGE_VERSION: 6.1.7601.18113.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrpamp.exe.

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+41a.

OS_VERSION: 7.1.7601.18113.

BUILDLAB_STR: win7sp1_gdr.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 7.

FAILURE_ID_HASH: {74f59fbc-68cc-18a4-f2dd-4d332b50b356}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2.
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used.
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c08024ba.
Arg3: 0000ffff.
Arg4: 00000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 1327.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 2263.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 68.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: win7sp1_gdr.

Key : WER.OS.Timestamp.
Value: 2013-03-18T15:33:00Z.

Key : WER.OS.Version.
Value: 7.1.7601.18113.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41790.

BUGCHECK_P2: ffffffffc08024ba.

BUGCHECK_P3: ffff.

BUGCHECK_P4: 0.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: zula.exe.

STACK_TEXT:
b0913ba8 832f1626 47210002 4761ffff 87d49030 nt!MiDeleteVirtualAddresses+0x41a.
b0913c78 832f12db 87d49030 878ff588 87dba658 nt!MiRemoveMappedView+0x325.
b0913ca0 834994f6 87dba658 00000000 ffffffff nt!MiRemoveVadAndView+0xe5.
b0913d04 834b79ff 87d49030 47210000 00000000 nt!MiUnmapViewOfSection+0x265.
b0913d24 8328f8ba ffffffff 47210000 1a9df854 nt!NtUnmapViewOfSection+0x55.
b0913d24 77847094 (T) ffffffff 47210000 1a9df854 nt!KiFastCallEntry+0x12a.
WARNING: Frame IP not in any known module. Following frames may be wrong.
1a9df854 00000000 (T) 00000000 00000000 00000000 0x77847094.

SYMBOL_NAME: nt!MiDeleteVirtualAddresses+41a.

MODULE_NAME: nt.

IMAGE_VERSION: 6.1.7601.18113.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrpamp.exe.

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+41a.

OS_VERSION: 7.1.7601.18113.

BUILDLAB_STR: win7sp1_gdr.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 7.

FAILURE_ID_HASH: {74f59fbc-68cc-18a4-f2dd-4d332b50b356}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2.
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used.
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c08026f8.
Arg3: 0000ffff.
Arg4: 00000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 1421.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 2353.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 68.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: win7sp1_gdr.

Key : WER.OS.Timestamp.
Value: 2013-03-18T15:33:00Z.

Key : WER.OS.Version.
Value: 7.1.7601.18113.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41790.

BUGCHECK_P2: ffffffffc08026f8.

BUGCHECK_P3: ffff.

BUGCHECK_P4: 0.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: explorer.exe.

STACK_TEXT:
a429bba8 832bd626 6b1c0002 6b1ddfff 86eecc70 nt!MiDeleteVirtualAddresses+0x41a.
a429bc78 832bd2db 86eecc70 87c0e970 883be030 nt!MiRemoveMappedView+0x325.
a429bca0 834654f6 883be030 00000000 ffffffff nt!MiRemoveVadAndView+0xe5.
a429bd04 834839ff 86eecc70 6b1c0000 00000000 nt!MiUnmapViewOfSection+0x265.
a429bd24 8325b8ba ffffffff 6b1c0000 0312f5cc nt!NtUnmapViewOfSection+0x55.
a429bd24 77037094 (T) ffffffff 6b1c0000 0312f5cc nt!KiFastCallEntry+0x12a.
WARNING: Frame IP not in any known module. Following frames may be wrong.
0312f5cc 00000000 (T) 00000000 00000000 00000000 0x77037094.

SYMBOL_NAME: nt!MiDeleteVirtualAddresses+41a.

MODULE_NAME: nt.

IMAGE_VERSION: 6.1.7601.18113.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrpamp.exe.

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+41a.

OS_VERSION: 7.1.7601.18113.

BUILDLAB_STR: win7sp1_gdr.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 7.

FAILURE_ID_HASH: {74f59fbc-68cc-18a4-f2dd-4d332b50b356}

Followup: MachineOwner.
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled.
Arg2: 8d046648, The address that the exception occurred at.
Arg3: b9fd9b5c, Exception Record Address.
Arg4: b9fd9740, Context Record Address.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : AV.Dereference.
Value: NullPtr.

Key : AV.Fault.
Value: Write.

Key : Analysis.CPU.mSec.
Value: 1359.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 5404.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: win7sp1_gdr.

Key : WER.OS.Timestamp.
Value: 2013-03-18T15:33:00Z.

Key : WER.OS.Version.
Value: 7.1.7601.18113.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: ffffffff8d046648.

BUGCHECK_P3: ffffffffb9fd9b5c.

BUGCHECK_P4: ffffffffb9fd9740.

EXCEPTION_RECORD: b9fd9b5c -- (.exr 0xffffffffb9fd9b5c)
ExceptionAddress: 8d046648 (volsnap!VspCollectLazyOffsetsPass+0x0000015c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2.
Parameter[0]: 00000001.
Parameter[1]: 00000000.
Attempt to write to address 00000000.

CONTEXT: b9fd9740 -- (.cxr 0xffffffffb9fd9740)
eax=00000000 ebx=00000001 ecx=00000018 edx=00000000 esi=00000001 edi=b9fd9cac.
eip=8d046648 esp=b9fd9c24 ebp=b9fd9c60 iopl=0 nv up ei ng nz ac pe cy.
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010297.
volsnap!VspCollectLazyOffsetsPass+0x15c:
8d046648 890c90 mov dword ptr [eax+edx*4],ecx ds:0023:00000000=????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

WRITE_ADDRESS: 83331c00: Unable to get Flags value from nt!KdVersionBlock.
83331c00: Unable to get Flags value from nt!KdVersionBlock.
83331c00: Unable to get Flags value from nt!KdVersionBlock.
Unable to get MmSystemRangeStart.
GetUlongPtrFromAddress: unable to read from 83371208.
GetUlongPtrFromAddress: unable to read from 833716e0.
Unable to get NonPagedPoolStart.
Unable to get PagedPoolStart.
00000000.

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005.

EXCEPTION_PARAMETER1: 00000001.

EXCEPTION_PARAMETER2: 00000000.

EXCEPTION_STR: 0xc0000005.

STACK_TEXT:
b9fd9c60 8d057b38 00000002 b9fd9c90 b9fd9cd0 volsnap!VspCollectLazyOffsetsPass+0x15c.
b9fd9d18 8d05fecd 0000afae 8847e020 b9fd9d58 volsnap!VspPopulateFreeBlocksBitmap+0x4a0.
b9fd9d50 8341112f 00000000 90a9a4d7 00000000 volsnap!VspLazyPreCopyOnWriteWorker+0xa9.
b9fd9d90 832b8549 8d05fe24 8847e008 00000000 nt!PspSystemThreadStartup+0x9e.
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19.

SYMBOL_NAME: volsnap!VspCollectLazyOffsetsPass+15c.

MODULE_NAME: volsnap.

IMAGE_NAME: volsnap.sys.

IMAGE_VERSION: 6.1.7601.17514.

STACK_COMMAND: .cxr 0xffffffffb9fd9740 ; kb.

FAILURE_BUCKET_ID: 0x7E_volsnap!VspCollectLazyOffsetsPass+15c.

OS_VERSION: 7.1.7601.18113.

BUILDLAB_STR: win7sp1_gdr.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 7.

FAILURE_ID_HASH: {3bea71b2-42c2-4274-cd21-1d524a344053}

Followup: MachineOwner.
---------

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: 861b3138, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: 944cea80, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 00000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 00000002, Optional internal context dependent data.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 1374.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 7738.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 73.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: win7_gdr.

Key : WER.OS.Timestamp.
Value: 2013-03-18T15:32:00Z.

Key : WER.OS.Version.
Value: 7.0.7600.17273.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 116.

BUGCHECK_P1: ffffffff861b3138.

BUGCHECK_P2: ffffffff944cea80.

BUGCHECK_P3: 0.

BUGCHECK_P4: 2.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
8e2dcb74 95ac0c26 00000116 861b3138 944cea80 nt!KeBugCheckEx+0x1e.
8e2dcb98 95ac1a45 944cea80 00000000 00000002 dxgkrnl!TdrBugcheckOnTimeout+0x8d.
8e2dcbbc 95af192c 00000000 00000102 86c92008 dxgkrnl!TdrIsRecoveryRequired+0xb8.
WARNING: Stack unwind information not available. Following frames may be wrong.
8e2dcc34 95b1b944 fffffcfb 0017570e 00000000 dxgmms1+0x692c.
8e2dcc5c 95b1c065 00000000 00000000 00000000 dxgmms1+0x30944.
8e2dcc98 95af88f0 8e2dcc90 86a60d58 8798a620 dxgmms1+0x31065.
8e2dcd28 95b1d3c9 86c92008 82c3c6b1 86c92008 dxgmms1+0xd8f0.
8e2dcd3c 95b1d485 86c92008 00000000 86cc2610 dxgmms1+0x323c9.
8e2dcd50 82e0fb6f 86c92008 a75175fd 00000000 dxgmms1+0x32485.
8e2dcd90 82cc1299 95b1d406 86c92008 00000000 nt!PspSystemThreadStartup+0x9e.
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19.

SYMBOL_NAME: nvlddmkm+aca80.

MODULE_NAME: nvlddmkm.

IMAGE_NAME: nvlddmkm.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0x116_IMAGE_nvlddmkm.sys.

OS_VERSION: 7.0.7600.17273.

BUILDLAB_STR: win7_gdr.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 7.

FAILURE_ID_HASH: {c89bfe8c-ed39-f658-ef27-f2898997fdbd}

Followup: MachineOwner.
---------

Sürücüyü kaldırırsam bir daha yükleyememe gibi bir ihtimal var. Birkaç kez güncellemeye çalıştığımda bilgisayar kapanıyordu ve sistem geri yükleme falan yapıp hallediyordum.
 

Yeni konular

Geri
Yukarı