Windows 7 PAGE_FAULT_IN_NONPAGED_AREA mavi ekran hatası

Muhtemel bellek arızası. Test edin.


Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: d86774b4, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 82a9f37f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffd86774b4

BUGCHECK_P2: 0

BUGCHECK_P3: ffffffff82a9f37f

BUGCHECK_P4: 2

READ_ADDRESS: 8297e5c0: Unable to get Flags value from nt!KdVersionBlock
8297e5c0: Unable to get Flags value from nt!KdVersionBlock
8297e5c0: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 829b91f4
GetUlongPtrFromAddress: unable to read from 829b96cc
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
 d86774b4

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  80d86298 -- (.trap 0xffffffff80d86298)
ErrCode = 00000000
eax=d8677480 ebx=00000000 ecx=80d86528 edx=8ac50008 esi=80d8652c edi=80d86528
eip=82a9f37f esp=80d8630c ebp=80d864c7 iopl=0         nv up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0000  fs=0030  gs=0000             efl=00210282
nt!CmpBuildHashStackAndLookupCache+0x37:
82a9f37f 8b4834          mov     ecx,dword ptr [eax+34h] ds:0023:d86774b4=????????
Resetting default scope

STACK_TEXT: 
80d86280 82890038 00000000 d86774b4 00000000 nt!MmAccessFault+0xbd
80d86280 82a9f37f 00000000 d86774b4 00000000 nt!KiTrap0E+0x290
80d864c7 a5b78280 d9433882 d865848a d8650c80 nt!CmpBuildHashStackAndLookupCache+0x37
WARNING: Frame IP not in any known module. Following frames may be wrong.
80d864cb d9433882 d865848a d8650c80 d8654480 0xa5b78280
80d864cf d865848a d8650c80 d8654480 d8655880 0xd9433882
80d864d3 d8650c80 d8654480 d8655880 d8655080 0xd865848a
80d864d7 d8654480 d8655880 d8655080 d8677480 0xd8650c80
80d864db d8655880 d8655080 d8677480 d8656480 0xd8654480
80d864df d8655080 d8677480 d8656480 d865e080 0xd8655880
80d864e3 d8677480 d8656480 d865e080 d8655780 0xd8655080
80d864e7 d8656480 d865e080 d8655780 d8673880 0xd8677480
80d864eb d865e080 d8655780 d8673880 00000080 0xd8656480
80d864ef d8655780 d8673880 00000080 bb599800 0xd865e080
80d864f3 d8673880 00000080 bb599800 759fb485 0xd8655780
80d864f7 00000000 bb599800 759fb485 00009a85 0xd8673880


SYMBOL_NAME:  nt!CmpBuildHashStackAndLookupCache+37

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x50_nt!CmpBuildHashStackAndLookupCache+37

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {82ba50fb-d2c4-11a0-185b-d22298d2b37d}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 86c08264, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8293ec0f, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 2

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffffff86c08264

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffff8293ec0f

READ_ADDRESS: 8297e5c0: Unable to get Flags value from nt!KdVersionBlock
8297e5c0: Unable to get Flags value from nt!KdVersionBlock
8297e5c0: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 829b91f4
GetUlongPtrFromAddress: unable to read from 829b96cc
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
 86c08264

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  mscorsvw.exe

TRAP_FRAME:  995fe960 -- (.trap 0xffffffff995fe960)
ErrCode = 00000000
eax=86c08250 ebx=841699c0 ecx=86c08250 edx=0807819f esi=841699b8 edi=8409a0e8
eip=8293ec0f esp=995fe9d4 ebp=995fea00 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt!MI_GET_PROTECTION_FROM_SOFT_PROTOTYPE_PTE+0x14:
8293ec0f 0fb74014        movzx   eax,word ptr [eax+14h]   ds:0023:86c08264=????
Resetting default scope

STACK_TEXT: 
995fe960 8293ec0f badb0d00 0807819f 828cf222 nt!KiTrap0E+0x367
995fe9d0 828c45d1 8409a0e8 841699b8 841699c0 nt!MI_GET_PROTECTION_FROM_SOFT_PROTOTYPE_PTE+0x14
995fea00 828e1bbe c01613e8 995feae8 00000000 nt!MiPfnShareCountIsZero+0x6d
995feac4 828e170f c01611e0 c0161374 84cbea40 nt!MiDeletePteRun+0x307
995feba8 828f5073 84cbea40 584f9fff 84cbea40 nt!MiDeleteVirtualAddresses+0x333
995fec78 828d22ea 84cbea40 868881a0 84e3ea98 nt!MiRemoveMappedView+0x303
995feca0 82a91825 84e3ea98 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
995fed04 82ab4e1f 84cbea40 58290000 00000000 nt!MiUnmapViewOfSection+0x265
995fed24 8288a520 ffffffff 58290000 001cf050 nt!NtUnmapViewOfSection+0x55
995fed24 77776c04 ffffffff 58290000 001cf050 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
001cf050 00000000 00000000 00000000 00000000 0x77776c04


SYMBOL_NAME:  nt!MI_GET_PROTECTION_FROM_SOFT_PROTOTYPE_PTE+14

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_nt!MI_GET_PROTECTION_FROM_SOFT_PROTOTYPE_PTE+14

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {2388acef-1d0d-149a-9490-20621575a734}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 7eb50882, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 7eb50882, address which referenced memory

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.

*** WARNING: Unable to verify timestamp for Unknown_Module_00460020

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 43

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 7eb50882

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: 7eb50882

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
 7eb50882

CUSTOMER_CRASH_COUNT:  1

FAILED_INSTRUCTION_ADDRESS:
+0
7eb50882 ??              ???

STACK_TEXT: 
WARNING: Frame IP not in any known module. Following frames may be wrong.
8295d890 7eb50882 badb0d00 856bbc18 8280622f 0x8287210f
8295d918 899e977c 856bd0d8 856bbc18 00000002 0x7eb50882
8295d9f8 899e98b3 856bd0d8 856bbc18 861d4990 0x899e977c
8295da18 82865e5d 856bd0d8 856bbc18 856bbc18 0x899e98b3
8295da30 899ed942 80ffdc94 80ffdcd4 01000000 0x82865e5d
8295da44 899e9daa 856bd020 8295da6c 0000e000 0x899ed942
8295da7c 899ecb19 857127e0 0000e000 00000001 0x899e9daa
8295daa4 828910e0 00000000 8295b000 8295e000 0x899ecb19
8295dae8 89a72498 8295db1c 89a72abd 856b9030 0x828910e0
8295daf0 89a72abd 856b9030 856bbc18 00000001 0x89a72498
8295db1c 828910e0 00000000 85735f00 006ea110 0x89a72abd
8295db60 89373da3 856ea1bc 85c5e428 8295db90 0x828910e0
8295db70 89374654 855e20e8 85735f00 856ea1bc 0x89373da3
8295db90 893714bd 855e20e8 85c5e428 848cc0e0 0x89374654
8295dbac 89377486 848cc0e0 85c5e428 85c5e428 0x893714bd
8295dc24 89377689 848cc0e0 85c5e428 80b98a00 0x89377486
8295dc78 828907f6 848cc09c 848cc028 00000000 0x89377689
8295dcd4 82890658 80b97120 829674c0 00000000 0x828907f6
8295dd20 82890478 00000000 0000000e 00000000 0x82890658
8295dd24 00000000 0000000e 00000000 00000000 0x82890478


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0xD1

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {446faaeb-6593-83aa-32c1-41ef60689072}

Followup:     MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  7f

BUGCHECK_P1: d

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
9c88faec 8288f005 badb0d00 00000000 9c88fb0c nt!KiSystemFatalException+0xf
9c88fb64 8288ed66 9c88fbb0 84b7ea60 80dc6120 nt!SwapContext_XRstorBegin
9c88fb78 82895fd5 84b7ea60 80dc9308 80dc6120 nt!KiSwapContext+0x26
9c88fbb0 82894e33 84b7eb20 84b7ea60 84d8bdc0 nt!KiSwapThread+0x266
9c88fbd8 82895b25 84b7ea60 84b7eb20 00000000 nt!KiCommitThreadWait+0x1df
9c88fc38 82a398d3 84d8bdc0 82890401 00000001 nt!KeRemoveQueueEx+0x4f8
9c88fc90 828a0750 84d8bdc0 9c88fcc8 9c88fcf0 nt!IoRemoveIoCompletion+0x2e
9c88fd24 8286b520 00000168 0434f75c 0434f7f8 nt!NtWaitForWorkViaWorkerFactory+0x1a1
9c88fd24 77a06c04 00000168 0434f75c 0434f7f8 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0434f7f8 00000000 00000000 00000000 00000000 0x77a06c04


SYMBOL_NAME:  nt!KiSystemFatalException+f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_d_nt!KiSystemFatalException+f

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {4d1c9c4b-98ab-2b72-0b8f-9c1849150574}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 1380930c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 904ca994, address which referenced memory

Debugging Details:
------------------

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 1380930c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffff904ca994

READ_ADDRESS: 82d3f5c0: Unable to get Flags value from nt!KdVersionBlock
82d3f5c0: Unable to get Flags value from nt!KdVersionBlock
82d3f5c0: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 82d7a1f4
GetUlongPtrFromAddress: unable to read from 82d7a6cc
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
 1380930c

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  8e7be810 -- (.trap 0xffffffff8e7be810)
ErrCode = 00000000
eax=00000000 ebx=86674be0 ecx=8665a000 edx=00000001 esi=8665a000 edi=861af000
eip=904ca994 esp=8e7be884 ebp=8e7be88c iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nvlddmkm+0xc7994:
904ca994 80bc370c03000000 cmp     byte ptr [edi+esi+30Ch],0 ds:0023:0c80930c=??
Resetting default scope

STACK_TEXT: 
8e7be810 904ca994 badb0d00 00000001 00000000 nt!KiTrap0E+0x367
WARNING: Stack unwind information not available. Following frames may be wrong.
8e7be88c 00000000 861af000 86674be0 8665f340 nvlddmkm+0xc7994


SYMBOL_NAME:  nvlddmkm+c7994

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xD1_nvlddmkm+c7994

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {6c8eeb9a-7a5f-4134-378f-9b0b655271e6}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82c85577, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffff82c85577

READ_ADDRESS: 82d405c0: Unable to get Flags value from nt!KdVersionBlock
82d405c0: Unable to get Flags value from nt!KdVersionBlock
82d405c0: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 82d7b1f4
GetUlongPtrFromAddress: unable to read from 82d7b6cc
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
 00000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  audiodg.exe

TRAP_FRAME:  a2263374 -- (.trap 0xffffffffa2263374)
ErrCode = 00000000
eax=84000000 ebx=84000000 ecx=00000000 edx=fffffff8 esi=00001000 edi=87cf1211
eip=82c85577 esp=a22633e8 ebp=a2263410 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!MmCreateKernelStack+0x6f:
82c85577 8b01            mov     eax,dword ptr [ecx]  ds:0023:00000000=????????
Resetting default scope

STACK_TEXT: 
a2263374 82c85577 badb0d00 fffffff8 7ffdc000 nt!KiTrap0E+0x367
a2263410 82f3595a 00000000 87cf1210 865f4ae3 nt!MmCreateKernelStack+0x6f
a2263454 82e30d4c 87cf1210 00000000 82e45a15 nt!KeInitThread+0x12a
a226350c 82e30fae 86695250 87cf143c 00000000 nt!PspAllocateThread+0x507
a22636d4 82e792da a2263c14 001fffff a2263bec nt!PspCreateThread+0x1b7
a2263b08 82c4c520 a2263c14 001fffff a2263bec nt!NtCreateThreadEx+0x20b
a2263b08 82c49dc9 a2263c14 001fffff a2263bec nt!KiSystemServicePostCall
a2263bac 82e735b1 a2263c14 001fffff a2263bec nt!ZwCreateThreadEx+0x11
a2263c44 82cbd7f1 00000001 00040000 00002000 nt!RtlpCreateUserThreadEx+0xa4
a2263c88 82c81a4d 00000001 00000000 00000001 nt!ExpWorkerFactoryCreateThread+0x37
a2263cac 82c81829 a2263cd8 865f4393 000000b0 nt!ExpWorkerFactoryCheckCreate+0x6a
a2263d24 82c4c520 00000000 01d5f838 01d5f8d4 nt!NtWaitForWorkViaWorkerFactory+0x27a
a2263d24 77d96c04 00000000 01d5f838 01d5f8d4 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
01d5f8d4 00000000 00000000 00000000 00000000 0x77d96c04


SYMBOL_NAME:  nt!MmCreateKernelStack+6f

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0xA_nt!MmCreateKernelStack+6f

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {5838125e-e593-df4d-4e2f-e7e9d94367ba}

Followup:     MachineOwner
---------
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82e1934a, The address that the exception occurred at
Arg3: a029fb9c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff82e1934a

BUGCHECK_P3: ffffffffa029fb9c

BUGCHECK_P4: 0

TRAP_FRAME:  a029fb9c -- (.trap 0xffffffffa029fb9c)
ErrCode = 00000002
eax=00000001 ebx=a5d4d008 ecx=00000001 edx=00000002 esi=851ac870 edi=00000000
eip=82e1934a esp=a029fc10 ebp=a029fc88 iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
nt!EtwpQueueNotification:
82e1934a 6a24            push    24h
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
a029fc88 82e1922b 851ac870 00000000 000001ae nt!EtwpQueueNotification
a029fcc0 82eb003b 00000001 844bb72d 00000011 nt!EtwpNotifyGuid+0x14d
a029fd14 82c79520 00000011 01653370 000001ae nt!NtTraceControl+0x300
a029fd14 76f96c04 00000011 01653370 000001ae nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0234f52c 00000000 00000000 00000000 00000000 0x76f96c04


SYMBOL_NAME:  nt!EtwpQueueNotification+0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x8E_nt!EtwpQueueNotification+0

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b3e152f4-247f-11b9-fef8-29e6829e5ec7}

Followup:     MachineOwner
---------

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 00000000, The address that the exception occurred at
Arg3: 8e537a44, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 0

BUGCHECK_P3: ffffffff8e537a44

BUGCHECK_P4: 0

TRAP_FRAME:  8e537a44 -- (.trap 0xffffffff8e537a44)
ErrCode = 00000000
eax=00000000 ebx=87956148 ecx=80b93c00 edx=00000000 esi=84c3c748 edi=82cb0023
eip=00000000 esp=8e537ab8 ebp=879560e8 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
00000000 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LogonUI.exe

IP_IN_FREE_BLOCK: 0

STACK_TEXT: 
WARNING: Frame IP not in any known module. Following frames may be wrong.
8e537ab4 8e537a00 87956258 84c3ccc0 879567e8 0x0
8e537ad0 82eac25d 84c3c748 8e537af8 000003a4 0x8e537a00
8e537b14 82e72435 84c3c748 8b001d30 879560e8 nt!ObpDecrementHandleCount+0x125
8e537b58 82e9d879 8b001d30 8b003748 84c3c748 nt!ObpCloseHandleTableEntry+0x215
8e537b88 82eb03fb 84c3c748 00000000 878f6f88 nt!ObpCloseHandle+0x7f
8e537ba0 82ce5ad7 800003a4 00000000 84cc9838 nt!ObCloseHandle+0x40
8e537bc4 82ea1eb9 878f6f88 878f6f88 878f6f70 nt!ExpDeleteWorkerFactory+0x45
8e537bdc 82cad4ea 00000000 000000c4 878f6f70 nt!ObpRemoveObjectRoutine+0x59
8e537bf0 82cad45a 878f6f88 82e7244f 8f0fa188 nt!ObfDereferenceObjectWithTag+0x88
8e537bf8 82e7244f 8f0fa188 879560e8 8f0fa188 nt!ObfDereferenceObject+0xd
8e537c38 82ec553f 90805960 8f0fa188 87956800 nt!ObpCloseHandleTableEntry+0x22f
8e537c68 82e9d0aa 90805960 8e537c7c 8f0f9030 nt!ExSweepHandleTable+0x5f
8e537c88 82e6a4e6 aa35ceb8 87956800 879560e8 nt!ObKillProcess+0x54
8e537cfc 82e72094 7ffdf000 ffffffff 001ff994 nt!PspExitThread+0x5e4
8e537d24 82c88520 ffffffff 00000000 001ff9a0 nt!NtTerminateProcess+0x12e
8e537d24 779c6c04 ffffffff 00000000 001ff9a0 nt!KiSystemServicePostCall
001ff9a0 00000000 00000000 00000000 00000000 0x779c6c04


SYMBOL_NAME:  nt!ObpDecrementHandleCount+125

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x8E_nt!ObpDecrementHandleCount+125

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {52213ca8-0c02-aeed-8ccb-8c4f92346bbf}

Followup:     MachineOwner
---------

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a538bf, The address that the exception occurred at
Arg3: 9e59fac0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff82a538bf

BUGCHECK_P3: ffffffff9e59fac0

BUGCHECK_P4: 0

TRAP_FRAME:  9e59fac0 -- (.trap 0xffffffff9e59fac0)
ErrCode = 00000000
eax=00000000 ebx=8623a6d0 ecx=86230000 edx=9d90aa68 esi=9e59fc18 edi=9d90aa68
eip=82a538bf esp=9e59fb34 ebp=9e59fb38 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!AlpcpReferenceAndLockTargetPortsAndCommunicationInfo+0x6:
82a538bf 8b5808          mov     ebx,dword ptr [eax+8] ds:0023:00000008=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
9e59fb38 00000000 9e59fb60 9e59fb6c 9e59fbbc nt!AlpcpReferenceAndLockTargetPortsAndCommunicationInfo+0x6


SYMBOL_NAME:  nt!AlpcpReferenceAndLockTargetPortsAndCommunicationInfo+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x8E_nt!AlpcpReferenceAndLockTargetPortsAndCommunicationInfo+6

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {0284c308-c335-159e-ed4e-19eb59f104dd}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0c22ebf5, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82c73301, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 4

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: c22ebf5

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffff82c73301

READ_ADDRESS: 82d2d5c0: Unable to get Flags value from nt!KdVersionBlock
82d2d5c0: Unable to get Flags value from nt!KdVersionBlock
82d2d5c0: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 82d681f4
GetUlongPtrFromAddress: unable to read from 82d686cc
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
 0c22ebf5

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  82d2aa78 -- (.trap 0xffffffff82d2aa78)
ErrCode = 00000000
eax=0c22ebf5 ebx=82c4b9c0 ecx=00000000 edx=00000000 esi=00000000 edi=0000006c
eip=82c73301 esp=82d2aaec ebp=82d2ab20 iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
nt!EtwEventEnabled+0x3:
82c73301 8bec            mov     ebp,esp
Resetting default scope

STACK_TEXT: 
82d2aa78 82c73301 badb0d00 00000000 82d38184 nt!KiTrap0E+0x367
82d2aaec 82cf39d8 0000006c 00000000 82c4b970 nt!EtwEventEnabled+0x3
82d2ab20 82cf42f1 00000001 82d2abac 00000000 nt!PpmEventTracePerfCheck+0x3d
82d2ab38 82c5f5d8 82d38390 00000000 f6afe4f2 nt!PpmCheckStart+0x3e
82d2ab7c 82c5f57b 80b97120 82d2aca8 00000001 nt!KiProcessTimerDpcTable+0x51
82d2ac68 82c5f438 80b97120 82d2aca8 00000000 nt!KiProcessExpiredTimerList+0x101
82d2acdc 82c5d64e 000012a3 861d5618 82d344c0 nt!KiTimerExpiration+0x25c
82d2ad20 82c5d478 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82d2ad24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38


SYMBOL_NAME:  nt!EtwEventEnabled+3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_nt!EtwEventEnabled+3

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {f9c84133-a6f2-39cf-f247-0541e307a740}

Followup:     MachineOwner
---------

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a360cd, The address that the exception occurred at
Arg3: 9b5568e0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff82a360cd

BUGCHECK_P3: ffffffff9b5568e0

BUGCHECK_P4: 0

TRAP_FRAME:  9b5568e0 -- (.trap 0xffffffff9b5568e0)
ErrCode = 00000000
eax=9b556a00 ebx=00000000 ecx=9b556be4 edx=00000000 esi=856bcc10 edi=00000000
eip=82a360cd esp=9b556954 ebp=9b556984 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt!SeOpenObjectAuditAlarmWithTransaction+0x37:
82a360cd 8b4330          mov     eax,dword ptr [ebx+30h] ds:0023:00000030=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
9b556984 82a6969e 9b556a00 856edb48 bf2a864a nt!SeOpenObjectAuditAlarmWithTransaction+0x37
9b5569b8 82a182a6 9b556a00 856edb48 bf2a864a nt!SeOpenObjectAuditAlarm+0x2e
9b556aa0 82a1ba51 856bcc10 c58d4870 84cf9400 nt!IopParseDevice+0x964
9b556b1c 82a5ad7e 00000000 9b556b70 00000040 nt!ObpLookupObjectName+0x510
9b556b78 82a86291 0030ec68 848d4870 00020001 nt!ObOpenObjectByName+0x165
9b556d24 82845520 0030ec68 0030ec30 0030ec98 nt!NtQueryFullAttributesFile+0x145
9b556d24 77cd6c04 0030ec68 0030ec30 0030ec98 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0030ec98 00000000 00000000 00000000 00000000 0x77cd6c04


SYMBOL_NAME:  nt!SeOpenObjectAuditAlarmWithTransaction+37

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x8E_nt!SeOpenObjectAuditAlarmWithTransaction+37

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {0783f5bf-d55a-d549-3393-5c917e295b1e}

Followup:     MachineOwner
---------
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82040000, The address that the exception occurred at
Arg3: 99453ac0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff82040000

BUGCHECK_P3: ffffffff99453ac0

BUGCHECK_P4: 0

TRAP_FRAME:  99453ac0 -- (.trap 0xffffffff99453ac0)
ErrCode = 00000000
eax=fe088178 ebx=00000005 ecx=861e8258 edx=00000135 esi=000003dc edi=00000001
eip=82040000 esp=99453b34 ebp=99453b44 iopl=0         nv up ei pl zr ac pe cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010257
82040000 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RaUI.exe

STACK_TEXT: 
WARNING: Frame IP not in any known module. Following frames may be wrong.
99453b30 930d596f 930e2bc3 00000000 000003dc 0x82040000
99453b34 930e2bc3 00000000 000003dc 99453b64 win32k!GreReleaseSemaphoreInternal+0xa
99453b44 930e2d40 000003dc 00000005 99453c00 win32k!HmgIncProcessHandleCount+0xa7
99453b64 931ab19d fe0ea8e8 00000003 00000005 win32k!HmgInsertObjectInternal+0x30
99453b80 930e3926 fe0ea8e8 00000001 00000000 win32k!HmgInsertObjectHelper::Insert+0x2f
99453be8 93061cfd 00000004 99453d1c 00000000 win32k!SURFMEM::bCreateDIB+0x4ac
99453d20 8286b520 fd72fda8 000000cd 00000000 win32k!NtGdiGetPixel+0x184
99453d20 777a6c04 fd72fda8 000000cd 00000000 nt!KiSystemServicePostCall
0012e580 00000000 00000000 00000000 00000000 0x777a6c04


SYMBOL_NAME:  win32k!GreReleaseSemaphoreInternal+a

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

IMAGE_VERSION:  6.1.7601.24517

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x8E_win32k!GreReleaseSemaphoreInternal+a

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {7949a2cd-7873-73dd-1407-42a1ff26a3da}

Followup:     MachineOwner
---------

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 899d235a, The address that the exception occurred at
Arg3: 998fdc5c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff899d235a

BUGCHECK_P3: ffffffff998fdc5c

BUGCHECK_P4: 0

TRAP_FRAME:  998fdc5c -- (.trap 0xffffffff998fdc5c)
ErrCode = 00000000
eax=00000000 ebx=856bb658 ecx=856e9460 edx=746c6644 esi=84c67268 edi=998fdcf8
eip=899d235a esp=998fdcd0 ebp=998fdcf8 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
volsnap!VolSnapDeviceControl+0x18c:
899d235a e950060000      jmp     volsnap!VolSnapDeviceControl+0x7e1 (899d29af)
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
998fdcf8 82843e5d 84c673f8 84c67268 8feb9760 volsnap!VolSnapDeviceControl+0x18c
998fdd10 89443b51 8feb96c0 998fdd34 82876316 nt!IofCallDriver+0x63
998fdd1c 82876316 8feb9760 00000000 ffffffff Ntfs!NtfsStorageDriverCallout+0x14
998fdd1c 8287640d 8feb9760 00000000 ffffffff nt!KiSwapKernelStackAndExit+0x15a
8feb96d0 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31


SYMBOL_NAME:  volsnap!VolSnapDeviceControl+18c

MODULE_NAME: volsnap

IMAGE_NAME:  volsnap.sys

IMAGE_VERSION:  6.1.7601.17514

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x8E_volsnap!VolSnapDeviceControl+18c

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {d95782a2-ce40-b359-2dd0-08853d266916}

Followup:     MachineOwner
---------

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 93d21a5a, The address that the exception occurred at
Arg3: 8ffe7a54, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff93d21a5a

BUGCHECK_P3: ffffffff8ffe7a54

BUGCHECK_P4: 0

TRAP_FRAME:  8ffe7a54 -- (.trap 0xffffffff8ffe7a54)
ErrCode = 00000002
eax=fe5fc0fc ebx=00000000 ecx=8ffe7bcc edx=fe5fc0fc esi=00000204 edi=00000028
eip=93d21a5a esp=8ffe7ac8 ebp=8ffe7cfc iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
win32k!EXFORMOBJ::bRotationOrMirroring+0x6:
93d21a5a 7413            je      win32k!EXFORMOBJ::bRotationOrMirroring+0x1b (93d21a6f) [br=0]
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LogonUI.exe

STACK_TEXT: 
8ffe7ac4 93d20ed0 2a010754 0016ea14 93d20dbc win32k!EXFORMOBJ::bRotationOrMirroring+0x6
8ffe7cfc 8283e520 2a010754 0000027c 00000186 win32k!NtGdiAlphaBlend+0x114
8ffe7cfc 76f76c04 2a010754 0000027c 00000186 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0016ea24 00000000 00000000 00000000 00000000 0x76f76c04


SYMBOL_NAME:  win32k!EXFORMOBJ::bRotationOrMirroring+6

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

IMAGE_VERSION:  6.1.7601.24517

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x8E_win32k!EXFORMOBJ::bRotationOrMirroring+6

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {9a11dce2-0322-d25b-c583-4f756b7ffb77}

Followup:     MachineOwner
---------
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82885283, The address that the exception occurred at
Arg3: 9cbfaaec, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  8e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffffffff82885283

BUGCHECK_P3: ffffffff9cbfaaec

BUGCHECK_P4: 0

TRAP_FRAME:  9cbfaaec -- (.trap 0xffffffff9cbfaaec)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=84a76ff4 edx=a10ad384 esi=84a764f0 edi=00000002
eip=82885283 esp=9cbfab60 ebp=9cbfabac iopl=0         nv up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
nt!MiEmptyPageAccessLog+0xdc:
82885283 8b481c          mov     ecx,dword ptr [eax+1Ch] ds:0023:0000001c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  mscorsvw.exe

STACK_TEXT: 
9cbfabac 828af17a 84a76000 84bd6d20 84bd6f98 nt!MiEmptyPageAccessLog+0xdc
9cbfac78 8288c2ea 84bd6d20 84bdae38 84be9d48 nt!MiRemoveMappedView+0x40a
9cbfaca0 82a4b825 84be9d48 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
9cbfad04 82a6ee1f 84bd6d20 67780000 00000000 nt!MiUnmapViewOfSection+0x265
9cbfad24 82844520 ffffffff 67780000 0013e958 nt!NtUnmapViewOfSection+0x55
9cbfad24 779c6c04 ffffffff 67780000 0013e958 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0013e958 00000000 00000000 00000000 00000000 0x779c6c04


SYMBOL_NAME:  nt!MiEmptyPageAccessLog+dc

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.24520

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0x8E_nt!MiEmptyPageAccessLog+dc

OS_VERSION:  7.1.7601.24520

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 7

FAILURE_ID_HASH:  {4c7d5a6d-5944-a599-dbd4-c5c6169f22b3}

Followup:     MachineOwner
---------
 
Bilgisayar açılırken DRIVER_IRQL_NOT_LESS hatası alıyorum. Yardım edin lütfen. İkinci baslamada uzun süre almıyorum.

IMG-20191022-WA0000.jpg
 
Son düzenleyen: Moderatör:
Bu tip mavi ekran sorunlarında minidump dosyalarının paylaşılması gerekiyor. Öte yandan RAM 'lerini teker teker kontrol et. Birinin ömrü tükenmiş olabilir.
 
BIOS güncel değil güncelleyin. Bu zaman kadar niye güncellemediysen artık:
BIOS

Fortnite veya Battlefiled yüklüyse güncelleyin veya dosya doğrulama yapın. Kısaca BattlEye servisini hangisi kullanıyorsa o oyunu kontrol edin. Ağ sürücün de güncel değilse güncelleyin. Sisteminiz destekliyorsa Win 10'a geçin.
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı