Wątek zamknięty

Komputer nie chce się wyłączyć + BSODy

 
SenseiMewka
Nowy
Liczba postów: 1
Post: #1

Komputer nie chce się wyłączyć + BSODy


Witam
Przez około pół roku posiadam komputer z Windowsem 7 HP 64bit. Od pewnego czasu pojawiają się blue screeny. Czasami BSOD wyskakuje kilka minut po starcie systemu. Dodatkowo dość często komputer nie chce się wyłączyć - po naciśnięciu przycisku zamknij system pozostaje na ekranie z napisem trwa zamykanie. Pomaga wtedy reset i ponowne wyłączenie komputera z ekranu logowania. Chciałbym się dowiedzieć co powoduje te błędy i jak je usunąć. Z góry dziękuję za pomoc.
Link do plików .dmp: https://www.mediafire.com/?oawyh719c1o86m5

15.04.2014 18:37

Znajdź wszystkie posty użytkownika
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #2

RE: Komputer nie chce się wyłączyć + BSODy


http://www.sevenforums.com/crash-lockup-...oting.html
http://captaindbg.com/bug-check-0x116-vi...ting-tips/

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`03657000 PsLoadedModuleList = 0xfffff800`0389a6d0
Debug session time:  Wed Feb 19 16: 13: 16.149 2014 (UTC + 2: 00)
System Uptime:  0 days 0: 16: 12.164
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 116, {fffffa800b589010, fffff8800f5a1bbc, 0, d}

*** WARNING:  Unable to verify timestamp for nvlddmkm.sys
*** ERROR:  Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by :  nvlddmkm.sys ( nvlddmkm+153bbc )

Followup:  MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:  
Arg1:  fffffa800b589010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2:  fffff8800f5a1bbc, The pointer into responsible device driver module (e.g. owner tag).
Arg3:  0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4:  000000000000000d, Optional internal context dependent data.

Debugging Details:  
------------------


FAULTING_IP:  
nvlddmkm+153bbc
fffff880`0f5a1bbc 803d86de730000  cmp     byte ptr [nvlddmkm+0x891a49 (fffff880`0fcdfa49)],0

DEFAULT_BUCKET_ID:   GRAPHICS_DRIVER_TDR_FAULT

CUSTOMER_CRASH_COUNT:   1

BUGCHECK_STR:   0x116

PROCESS_NAME:   System

CURRENT_IRQL:   0

STACK_TEXT:    
fffff880`08bd14f8 fffff880`100f4140 :  00000000`00000116 fffffa80`0b589010 fffff880`0f5a1bbc 00000000`00000000 :  nt!KeBugCheckEx
fffff880`08bd1500 fffff880`100f3ec7 :  fffff880`0f5a1bbc fffffa80`0b589010 fffffa80`0adc1ab0 fffffa80`0b120410 :  dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`08bd1540 fffff880`1019af13 :  fffffa80`0b589010 00000000`00000000 fffffa80`0adc1ab0 fffffa80`0b120410 :  dxgkrnl!TdrIsRecoveryRequired+0x21f
fffff880`08bd1570 fffff880`101c8ed6 :  fffffa80`ffffffff 00000000`0000f2d9 fffff880`08bd16c0 00000000`00000006 :  dxgmms1!VidSchiReportHwHang+0x40b
fffff880`08bd1650 fffff880`101aece9 :  fffffa80`0b200000 ffffffff`feced300 00000000`00000006 fffffa80`0b200000 :  dxgmms1!VidSchWaitForCompletionEvent+0x196
fffff880`08bd1690 fffff880`101ac184 :  00000000`00002ebb fffff8a0`04ddce50 fffffa80`0b200000 00000000`00000001 :  dxgmms1!VIDMM_GLOBAL: xWaitForAllEngines+0x1e9
fffff880`08bd1790 fffff880`101a99d3 :  00000000`00000000 fffffa80`0bb1b0b0 00000000`0000001c fffffa80`0c243218 :  dxgmms1!VIDMM_GLOBAL: ReferenceAllocationForSubmission+0xfc
fffff880`08bd17d0 fffff880`101c37d9 :  00000000`00000000 fffff8a0`0faf86f0 fffffa80`00000001 fffffa80`07dcef10 :  dxgmms1!VIDMM_GLOBAL: PrepareDmaBuffer+0xe1b
fffff880`08bd19a0 fffff880`101c3514 :  fffff880`033dbf40 fffff880`101c2f00 fffffa80`00000000 fffffa80`00000000 :  dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`08bd1b90 fffff880`101c3012 :  00000000`00000000 fffffa80`0b971010 00000000`00000080 fffffa80`0b120410 :  dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`08bd1bc0 fffff800`039692ea :  00000000`fffffc32 fffffa80`0adc5b50 fffffa80`06987b30 fffffa80`0adc5b50 :  dxgmms1!VidSchiWorkerThread+0xd6
fffff880`08bd1c00 fffff800`036bd8e6 :  fffff880`033d7180 fffffa80`0adc5b50 fffff880`033e1fc0 00000000`00000000 :  nt!PspSystemThreadStartup+0x5a
fffff880`08bd1c40 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiStartSystemThread+0x16


STACK_COMMAND:   .bugcheck ; kb

FOLLOWUP_IP:  
nvlddmkm+153bbc
fffff880`0f5a1bbc 803d86de730000  cmp     byte ptr [nvlddmkm+0x891a49 (fffff880`0fcdfa49)],0

SYMBOL_NAME:   nvlddmkm+153bbc

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nvlddmkm

IMAGE_NAME:   nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   52b326bc

FAILURE_BUCKET_ID:   X64_0x116_IMAGE_nvlddmkm.sys

BUCKET_ID:   X64_0x116_IMAGE_nvlddmkm.sys

Followup:  MachineOwner
---------

CPUID:         "Intel(R) Core(TM) i3-4130 CPU @ 3.40GHz"
MaxSpeed:      3400
CurrentSpeed:  3392
[SMBIOS Data Tables v2.7]
[DMI Version - 39]
[2.0 Calling Convention - No]
[Table Size - 3083 bytes]

[BIOS Information (Type 0) - Length 24 - Handle 0000h]
  Vendor                        American Megatrends Inc.
  BIOS Version                  F2
  BIOS Starting Address Segment f000
  BIOS Release Date             08/05/2013
  BIOS ROM Size                 800000
  BIOS Characteristics
       07:  - PCI Supported
       11:  - Upgradeable FLASH BIOS
       12:  - BIOS Shadowing Supported
       15:  - CD-Boot Supported
       16:  - Selectable Boot Supported
       17:  - BIOS ROM Socketed
       19:  - EDD Supported
       23:  - 1.2MB Floppy Supported
       24:  - 720KB Floppy Supported
       25:  - 2.88MB Floppy Supported
       26:  - Print Screen Device Supported
       27:  - Keyboard Services Supported
       28:  - Serial Services Supported
       29:  - Printer Services Supported
       32:  - BIOS Vendor Reserved
  BIOS Characteristic Extensions
       00:  - ACPI Supported
       01:  - USB Legacy Supported
       08:  - BIOS Boot Specification Supported
       10:  - Specification Reserved
       11:  - Specification Reserved
  BIOS Major Revision           4
  BIOS Minor Revision           6
  EC Firmware Major Revision    255
  EC Firmware Minor Revision    255
[System Information (Type 1) - Length 27 - Handle 0001h]
  Manufacturer                  Gigabyte Technology Co., Ltd.
  Product Name                  H81-D3
  Version                       To be filled by O.E.M.
  Serial Number                                        
  UUID                          00000000-0000-0000-0000-000000000000
  Wakeup Type                   Power Switch
  SKUNumber                     To be filled by O.E.M.
  Family                        To be filled by O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  Manufacturer                  Gigabyte Technology Co., Ltd.
  Product                       H81-D3
  Version                       x.x
  Serial Number                                        
  Asset Tag                                            
  Feature Flags                 09h
       255016308:  - eA3
       255016268:  - eA3
  Location                      To be filled by O.E.M.
  Chassis Handle                0003h
  Board Type                    0ah - Processor/Memory Module
  Number of Child Handles       0
[System Enclosure (Type 3) - Length 22 - Handle 0003h]
  Manufacturer                  Gigabyte Technology Co., Ltd.
  Chassis Type                  Desktop
  Version                       To Be Filled By O.E.M.
  Serial Number                                        
  Asset Tag Number                                    
  Bootup State                  Safe
  Power Supply State            Safe
  Thermal State                 Safe
  Security Status               None
  OEM Defined                   0
  Height                        0U
  Number of Power Cords         1
  Number of Contained Elements  0
  Contained Element Size        0
[Cache Information (Type 7) - Length 19 - Handle 0004h]
  Socket Designation            CPU Internal L1
  Cache Configuration           0180h - WB Enabled Int NonSocketed L1
  Maximum Cache Size            0080h - 128K
  Installed Size                0080h - 128K
  Supported SRAM Type           0002h - Unknown  
  Current SRAM Type             0002h - Unknown  
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Other
  Associativity                 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0005h]
  Socket Designation            CPU Internal L2
  Cache Configuration           0181h - WB Enabled Int NonSocketed L2
  Maximum Cache Size            0200h - 512K
  Installed Size                0200h - 512K
  Supported SRAM Type           0002h - Unknown  
  Current SRAM Type             0002h - Unknown  
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Unified
  Associativity                 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
  Socket Designation            CPU Internal L3
  Cache Configuration           0182h - WB Enabled Int NonSocketed L3
  Maximum Cache Size            0c00h - 3072K
  Installed Size                0c00h - 3072K
  Supported SRAM Type           0002h - Unknown  
  Current SRAM Type             0002h - Unknown  
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Unified
  Associativity                 Specification Reserved
[Physical Memory Array (Type 16) - Length 23 - Handle 0007h]
  Location                      03h - SystemBoard/Motherboard
  Use                           03h - System Memory
  Memory Error Correction       03h - None
  Maximum Capacity              33554432KB
  Memory Error Inf Handle       [Not Provided]
  Number of Memory Devices      2
[Onboard Devices Information (Type 10) - Length 6 - Handle 0026h]
  Number of Devices             1
  01:  Type                      Video [enabled]
  01:  Description                  To Be Filled By O.E.M.
[OEM Strings (Type 11) - Length 5 - Handle 0027h]
  Number of Strings             5
   1                            To Be Filled By O.E.M.
   2                            To Be Filled By O.E.M.
   3                            To Be Filled By O.E.M.
   4                            To Be Filled By O.E.M.
   5                            To Be Filled By O.E.M.
[System Configuration Options (Type 12) - Length 5 - Handle 0028h]
[Processor Information (Type 4) - Length 42 - Handle 0040h]
  Socket Designation            SOCKET 0
  Processor Type                Central Processor
  Processor Family              c6h - Specification Reserved
  Processor Manufacturer        Intel
  Processor ID                  c3060300fffbebbf
  Processor Version             Intel(R) Core(TM) i3-4130 CPU @ 3.40GHz
  Processor Voltage             8bh - 1.1V
  External Clock                100MHz
  Max Speed                     7000MHz
  Current Speed                 3400MHz
  Status                        Enabled Populated
  Processor Upgrade             Other
  L1 Cache Handle               0004h
  L2 Cache Handle               0005h
  L3 Cache Handle               0006h
  Serial Number                 [String Not Specified]
  Asset Tag Number                          
  Part Number                   Fill By OEM
[Memory Device (Type 17) - Length 34 - Handle 0041h]
  Physical Memory Array Handle  0007h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                ChannelA-DIMM0
  Bank Locator                  BANK 0
  Memory Type                   18h - Specification Reserved
  Type Detail                   0080h - Synchronous
  Speed                         1333MHz
  Manufacturer                  Kingston
  Serial Number                          
  Asset Tag Number                        
  Part Number                   KHX1600C10D3/8GX  
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 0042h]
  Starting Address              00000000h
  Ending Address                007fffffh
  Memory Device Handle          0041h
  Mem Array Mapped Adr Handle   0046h
  Partition Row Position        [Unknown]
  Interleave Position           [Unknown]
  Interleave Data Depth         [Unknown]
[Memory Device (Type 17) - Length 34 - Handle 0043h]
  Physical Memory Array Handle  0007h
  Memory Error Info Handle      [Not Provided]
  Total Width                   0 bits
  Data Width                    0 bits
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                ChannelA-DIMM1
  Bank Locator                  BANK 1
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  [Empty]
  Serial Number                        
  Asset Tag Number                        
  Part Number                   [Empty]
[Memory Device (Type 17) - Length 34 - Handle 0044h]
  Physical Memory Array Handle  0007h
  Memory Error Info Handle      [Not Provided]
  Total Width                   0 bits
  Data Width                    0 bits
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                ChannelB-DIMM0
  Bank Locator                  BANK 2
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  [Empty]
  Serial Number                        
  Asset Tag Number                        
  Part Number                   [Empty]
[Memory Device (Type 17) - Length 34 - Handle 0045h]
  Physical Memory Array Handle  0007h
  Memory Error Info Handle      [Not Provided]
  Total Width                   0 bits
  Data Width                    0 bits
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                ChannelB-DIMM1
  Bank Locator                  BANK 3
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  [Empty]
  Serial Number                        
  Asset Tag Number                        
  Part Number                   [Empty]
[Memory Array Mapped Address (Type 19) - Length 31 - Handle 0046h]
  Starting Address              00000000h
  Ending Address                007fffffh
  Memory Array Handle           0007h
  Partition Width               04
start             end                 module name
fffff880`00e00000 fffff880`00e57000   ACPI     ACPI.sys     Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`030aa000 fffff880`03133000   afd      afd.sys      Sat Sep 28 03: 09: 07 2013 (52462C33)
fffff880`0778c000 fffff880`077a2000   AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`0158e000 fffff880`01599000   amdxata  amdxata.sys  Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`01d96000 fffff880`01d9e000   AppleCharger AppleCharger.sys Tue Feb 19 05: 17: 09 2013 (5122FCC5)
fffff880`0c985000 fffff880`0c990000   asyncmac asyncmac.sys Tue Jul 14 02: 10: 13 2009 (4A5BCCE5)
fffff880`010d8000 fffff880`010e1000   atapi    atapi.sys    Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`010e1000 fffff880`0110b000   ataport  ataport.SYS  Mon Aug 05 03: 02: 45 2013 (51FEF9B5)
fffff880`04786000 fffff880`0478d000   Beep     Beep.SYS     Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`031ee000 fffff880`031ff000   blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`074da000 fffff880`074f8000   bowser   bowser.sys   Wed Feb 23 05: 55: 04 2011 (4D649328)
fffff960`00610000 fffff960`00637000   cdd      cdd.dll      unavailable (00000000)
fffff880`0b3db000 fffff880`0b3f8000   cdfs     cdfs.sys     Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`04753000 fffff880`0477d000   cdrom    cdrom.sys    Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`01c40000 fffff880`01c70000   CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`00d4f000 fffff880`00dad000   CLFS     CLFS.SYS     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01184000 fffff880`011f6000   cng      cng.sys      Wed Aug 01 17: 48: 07 2012 (50194FB7)
fffff880`0777c000 fffff880`0778c000   CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`09238000 fffff880`09246000   crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`0308b000 fffff880`030a9000   dfsc     dfsc.sys     Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`0307c000 fffff880`0308b000   discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`0103a000 fffff880`01050000   disk     disk.sys     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`07800000 fffff880`07822000   drmk     drmk.sys     Fri Oct 04 04: 16: 30 2013 (524E24FE)
fffff880`0470b000 fffff880`04753000   dtsoftbus01 dtsoftbus01.sys Thu Jun 20 09: 22: 51 2013 (51C2ADCB)
fffff880`09246000 fffff880`09250000   dump_diskdump dump_diskdump.sys Fri Apr 22 22: 04: 32 2011 (4DB1DF50)
fffff880`09250000 fffff880`09263000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`04426000 fffff880`046f7000   dump_iaStorA dump_iaStorA.sys Mon Apr 22 21: 38: 05 2013 (5175919D)
fffff880`09263000 fffff880`0926f000   Dxapi    Dxapi.sys    Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`10097000 fffff880`1018b000   dxgkrnl  dxgkrnl.sys  Thu Aug 01 09: 58: 53 2013 (51FA153D)
fffff880`1018b000 fffff880`101d1000   dxgmms1  dxgmms1.sys  Wed Apr 10 05: 27: 15 2013 (5164DC13)
fffff880`01c88000 fffff880`01d56000   eamonm   eamonm.sys   Thu Aug 15 16: 53: 50 2013 (520CEB7E)
fffff880`0478d000 fffff880`047ba000   ehdrv    ehdrv.sys    Thu Aug 15 16: 54: 11 2013 (520CEB93)
fffffa80`09ded000 fffffa80`09e34000   em006_64 em006_64.dat Mon Nov 25 16: 40: 14 2013 (52936F5E)
fffffa80`09e5e000 fffffa80`09ec2000   em018_64 em018_64.dat Thu Feb 06 10: 11: 02 2014 (52F351A6)
fffff880`075af000 fffff880`075d9000   epfwwfpr epfwwfpr.sys Thu Aug 15 16: 55: 17 2013 (520CEBD5)
fffff880`015e5000 fffff880`015f9000   fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`01599000 fffff880`015e5000   fltmgr   fltmgr.sys   Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`017e4000 fffff880`017ee000   Fs_Rec   Fs_Rec.sys   Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`00dad000 fffff880`00de7000   fvevol   fvevol.sys   Thu Jan 24 04: 11: 24 2013 (5100A65C)
fffff880`0188b000 fffff880`018d4000   fwpkclnt fwpkclnt.sys Thu Jan 03 04: 06: 48 2013 (50E4F5C8)
fffff800`0360e000 fffff800`03657000   hal      hal.dll      Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`077ec000 fffff880`077f7000   hamachi  hamachi.sys  Thu Feb 19 11: 36: 41 2009 (499D3639)
fffff880`101d1000 fffff880`101f5000   HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`07d37000 fffff880`07d4a000   HECIx64  HECIx64.sys  Mon Dec 17 20: 32: 21 2012 (50CF7345)
fffff880`095c8000 fffff880`095e1000   HIDCLASS HIDCLASS.SYS Wed Jul 03 06: 05: 05 2013 (51D3A2F1)
fffff880`095e1000 fffff880`095e9080   HIDPARSE HIDPARSE.SYS Wed Jul 03 06: 05: 04 2013 (51D3A2F0)
fffff880`095ba000 fffff880`095c8000   hidusb   hidusb.sys   Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`07411000 fffff880`074da000   HTTP     HTTP.sys     Sat Nov 20 10: 24: 30 2010 (4CE793CE)
fffff880`01600000 fffff880`01609000   hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`0125a000 fffff880`0152b000   iaStorA  iaStorA.sys  Mon Apr 22 21: 38: 05 2013 (5175919D)
fffff880`017ee000 fffff880`017f9000   iaStorF  iaStorF.sys  Mon Apr 22 21: 38: 07 2013 (5175919F)
fffff880`081d7000 fffff880`08200000   idmwfp   idmwfp.sys   Mon Apr 23 15: 14: 15 2012 (4F9555A7)
fffff880`07837000 fffff880`07c71720   igdkmd64 igdkmd64.sys Fri May 17 22: 15: 07 2013 (51968FCB)
fffff880`080ca000 fffff880`0813d000   IntcDAud IntcDAud.sys Fri Jan 11 14: 55: 16 2013 (50F019C4)
fffff880`07766000 fffff880`0777c000   intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`00eaa000 fffff880`00eb4000   iusb3hcs iusb3hcs.sys Fri Mar 29 13: 37: 59 2013 (51558B27)
fffff880`0813d000 fffff880`0819c000   iusb3hub iusb3hub.sys Fri Mar 29 13: 36: 15 2013 (51558ABF)
fffff880`07c72000 fffff880`07d35000   iusb3xhc iusb3xhc.sys Fri Mar 29 13: 36: 19 2013 (51558AC3)
fffff880`07db2000 fffff880`07dc1000   kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`0922a000 fffff880`09238000   kbdhid   kbdhid.sys   Sat Nov 20 11: 33: 25 2010 (4CE7A3F5)
fffff800`00bc2000 fffff800`00bcc000   kdcom    kdcom.dll    Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff880`0f400000 fffff880`0f443000   ks       ks.sys       Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`017b8000 fffff880`017d3000   ksecdd   ksecdd.sys   Wed Sep 25 03: 03: 28 2013 (52423660)
fffff880`01860000 fffff880`0188b000   ksecpkg  ksecpkg.sys  Wed Sep 25 03: 20: 07 2013 (52423A47)
fffff880`07678000 fffff880`0767d200   ksthunk  ksthunk.sys  Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`095ea000 fffff880`095ff000   lltdio   lltdio.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`0819c000 fffff880`081bf000   luafv    luafv.sys    Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`00cec000 fffff880`00d3b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 14: 03: 51 2010 (4CE7C737)
fffff880`0926f000 fffff880`0927d000   monitor  monitor.sys  Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`07dc1000 fffff880`07dd0000   mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`0921d000 fffff880`0922a000   mouhid   mouhid.sys   Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`010be000 fffff880`010d8000   mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`074f8000 fffff880`07510000   mpsdrv   mpsdrv.sys   Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`07510000 fffff880`0753d000   mrxsmb   mrxsmb.sys   Wed Apr 27 04: 40: 38 2011 (4DB78226)
fffff880`0753d000 fffff880`0758b000   mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 46: 28 2011 (4E17C104)
fffff880`0758b000 fffff880`075af000   mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 39: 37 2011 (4DB781E9)
fffff880`0110b000 fffff880`01116000   msahci   msahci.sys   Sat Nov 20 11: 33: 58 2010 (4CE7A416)
fffff880`0441b000 fffff880`04426000   Msfs     Msfs.SYS     Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00e60000 fffff880`00e6a000   msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`01126000 fffff880`01184000   msrpc    msrpc.sys    Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`03071000 fffff880`0307c000   mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`019e9000 fffff880`019fb000   mup      mup.sys      Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`018d8000 fffff880`019ca000   ndis     ndis.sys     Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`077c6000 fffff880`077d2000   ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`07600000 fffff880`0762f000   ndiswan  ndiswan.sys  Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`08081000 fffff880`08096000   NDProxy  NDProxy.SYS  Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`031a7000 fffff880`031b6000   netbios  netbios.sys  Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`03133000 fffff880`03178000   netbt    netbt.sys    Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`01800000 fffff880`01860000   NETIO    NETIO.SYS    Tue Nov 26 11: 21: 01 2013 (5294760D)
fffff880`01d56000 fffff880`01d67000   Npfs     Npfs.SYS     Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`03065000 fffff880`03071000   nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff800`03657000 fffff800`03c3c000   nt       ntkrnlmp.exe Thu Aug 29 03: 13: 25 2013 (521EA035)
fffff880`01616000 fffff880`017b8000   Ntfs     Ntfs.sys     Fri Apr 12 13: 54: 36 2013 (5167F5FC)
fffff880`0477d000 fffff880`04786000   Null     Null.SYS     Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`08096000 fffff880`080ca000   nvhda64v nvhda64v.sys Thu Nov 28 14: 38: 09 2013 (52974741)
fffff880`0f44e000 fffff880`10097000   nvlddmkm nvlddmkm.sys Thu Dec 19 18: 02: 52 2013 (52B326BC)
fffff880`07de4000 fffff880`07df1000   nvvad64v nvvad64v.sys Thu Dec 05 00: 10: 01 2013 (529FB649)
fffff880`03181000 fffff880`031a7000   pacer    pacer.sys    Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`07749000 fffff880`07766000   parport  parport.sys  Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`00eb4000 fffff880`00ec9000   partmgr  partmgr.sys  Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00e6a000 fffff880`00e9d000   pci      pci.sys      Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`01116000 fffff880`01126000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`017d3000 fffff880`017e4000   pcw      pcw.sys      Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`019d2000 fffff880`019e9000   pe3arjjb pe3arjjb.sys Wed Apr 16 11: 01: 37 2008 (4805C071)
fffff880`0b27e000 fffff880`0b324000   peauth   peauth.sys   Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`01c00000 fffff880`01c3d000   portcls  portcls.sys  Fri Oct 04 03: 36: 02 2013 (524E1B82)
fffff880`00ec9000 fffff880`00ee7000   ps7arjjb ps7arjjb.sys Wed Apr 16 11: 00: 56 2008 (4805C048)
fffff880`00d3b000 fffff880`00d4f000   PSHED    PSHED.dll    Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`077a2000 fffff880`077c6000   rasl2tp  rasl2tp.sys  Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`0762f000 fffff880`0764a000   raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`0764a000 fffff880`0766b000   raspptp  raspptp.sys  Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`077d2000 fffff880`077ec000   rassstp  rassstp.sys  Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`03014000 fffff880`03065000   rdbss    rdbss.sys    Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`04400000 fffff880`04409000   RDPCDD   RDPCDD.sys   Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`04409000 fffff880`04412000   rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`04412000 fffff880`0441b000   rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`081bf000 fffff880`081d7000   rspndr   rspndr.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`0767f000 fffff880`0773d000   Rt64win7 Rt64win7.sys Thu Oct 25 11: 20: 09 2012 (50890449)
fffff880`0928d000 fffff880`095b9180   RTKVHD64 RTKVHD64.sys Tue Feb 26 13: 38: 48 2013 (512CACD8)
fffff880`0b324000 fffff880`0b32f000   secdrv   secdrv.SYS   Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`0773d000 fffff880`07749000   serenum  serenum.sys  Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`031b6000 fffff880`031d3000   serial   serial.sys   Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`077f7000 fffff880`077ff000   serscan  serscan.sys  Tue Jul 14 02: 35: 32 2009 (4A5BD2D4)
fffff880`019ca000 fffff880`019d2000   spldr    spldr.sys    Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`0c87c000 fffff880`0c914000   srv      srv.sys      Fri Apr 29 05: 06: 06 2011 (4DBA2B1E)
fffff880`0b372000 fffff880`0b3db000   srv2     srv2.sys     Fri Apr 29 05: 05: 46 2011 (4DBA2B0A)
fffff880`0b32f000 fffff880`0b360000   srvnet   srvnet.sys   Fri Apr 29 05: 05: 35 2011 (4DBA2AFF)
fffff880`0152b000 fffff880`0158e000   storport storport.sys Fri Mar 11 05: 30: 23 2011 (4D79A55F)
fffff880`07dd0000 fffff880`07dd1480   swenum   swenum.sys   Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`0766b000 fffff880`07678000   tap0901  tap0901.sys  Wed Nov 19 19: 22: 35 2008 (4924596B)
fffff880`01a00000 fffff880`01bff000   tcpip    tcpip.sys    Sun Sep 08 03: 11: 52 2013 (522BCED8)
fffff880`0b360000 fffff880`0b372000   tcpipreg tcpipreg.sys Wed Oct 03 18: 07: 26 2012 (506C62BE)
fffff880`01d89000 fffff880`01d96000   TDI      TDI.SYS      Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`01d67000 fffff880`01d89000   tdx      tdx.sys      Sat Nov 20 10: 21: 54 2010 (4CE79332)
fffff880`03000000 fffff880`03014000   termdd   termdd.sys   Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`01d9e000 fffff880`01dc4000   tunnel   tunnel.sys   Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`07dd2000 fffff880`07de4000   umbus    umbus.sys    Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`09200000 fffff880`0921d000   usbccgp  usbccgp.sys  Wed Nov 27 02: 41: 15 2013 (52954DBB)
fffff880`07d35000 fffff880`07d36e80   USBD     USBD.SYS     Wed Nov 27 02: 41: 03 2013 (52954DAF)
fffff880`07d4a000 fffff880`07d5c000   usbehci  usbehci.sys  Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`08027000 fffff880`08081000   usbhub   usbhub.sys   Wed Nov 27 02: 41: 36 2013 (52954DD0)
fffff880`07d5c000 fffff880`07db2000   USBPORT  USBPORT.SYS  Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`00e9d000 fffff880`00eaa000   vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`047ba000 fffff880`047c8000   vga      vga.sys      Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`047c8000 fffff880`047ed000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`00fc7000 fffff880`00fdc000   volmgr   volmgr.sys   Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`01062000 fffff880`010be000   volmgrx  volmgrx.sys  Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`01200000 fffff880`0124c000   volsnap  volsnap.sys  Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`031d3000 fffff880`031ee000   wanarp   wanarp.sys   Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`047ed000 fffff880`047fd000   watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`00ef5000 fffff880`00fb7000   Wdf01000 Wdf01000.sys Sat Jun 22 05: 13: 05 2013 (51C51641)
fffff880`00fb7000 fffff880`00fc7000   WDFLDR   WDFLDR.SYS   Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`03178000 fffff880`03181000   wfplwf   wfplwf.sys   Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`00337000   win32k   win32k.sys   unavailable (00000000)
fffff880`00e57000 fffff880`00e60000   WMILIB   WMILIB.SYS   Tue Jul 14 01: 19: 51 2009 (4A5BC117)

Unloaded modules:  
fffff880`0c914000 fffff880`0c985000   spsys.sys
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00071000
fffff880`01c70000 fffff880`01c7e000   crashdmp.sys
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000E000
fffff880`01c7e000 fffff880`01c88000   dump_storpor
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000A000
fffff880`04427000 fffff880`046f8000   dump_iaStorA
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   002D1000
fffff880`046f8000 fffff880`0470b000   dump_dumpfve
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00013000
fffff880`031ee000 fffff880`031f6000   UsbCharger.s
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00008000

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c: \Users\user\SysnativeBSODApps\031014-22152-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`03606000 PsLoadedModuleList = 0xfffff800`038496d0
Debug session time:  Mon Mar 10 16: 50: 23.982 2014 (UTC + 2: 00)
System Uptime:  0 days 0: 13: 06.997
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 124, {0, fffffa8007a6c028, be000000, 1001152}

Probably caused by :  hardware

Followup:  MachineOwner
---------

1:  kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:  
Arg1:  0000000000000000, Machine Check Exception
Arg2:  fffffa8007a6c028, Address of the WHEA_ERROR_RECORD structure.
Arg3:  00000000be000000, High order 32-bits of the MCi_STATUS value.
Arg4:  0000000001001152, Low order 32-bits of the MCi_STATUS value.

Debugging Details:  
------------------


BUGCHECK_STR:   0x124_GenuineIntel

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   System

CURRENT_IRQL:   f

STACK_TEXT:    
fffff880`009f6a58 fffff800`03bfda3b :  00000000`00000124 00000000`00000000 fffffa80`07a6c028 00000000`be000000 :  nt!KeBugCheckEx
fffff880`009f6a60 fffff800`03792463 :  00000000`00000001 fffffa80`07705c90 00000000`00000000 fffffa80`07705ce0 :  hal!HalBugCheckSystem+0x1e3
fffff880`009f6aa0 fffff800`03bfd700 :  00000000`00000728 fffffa80`07705c90 fffff880`009f6e30 fffff880`009f6e00 :  nt!WheaReportHwError+0x263
fffff880`009f6b00 fffff800`03bfd052 :  fffffa80`07705c90 fffff880`009f6e30 fffffa80`07705c90 00000000`00000000 :  hal!HalpMcaReportError+0x4c
fffff880`009f6c50 fffff800`03bfcf0d :  00000000`00000004 00000000`00000001 fffff880`009f6eb0 00000000`00000000 :  hal!HalpMceHandler+0x9e
fffff880`009f6c90 fffff800`03bf0e88 :  00000000`00000001 fffff880`009ee180 00000000`00000000 00000000`00000000 :  hal!HalpMceHandlerWithRendezvous+0x55
fffff880`009f6cc0 fffff800`0367a4ac :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  hal!HalHandleMcheck+0x40
fffff880`009f6cf0 fffff800`0367a313 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KxMcheckAbort+0x6c
fffff880`009f6e30 fffff880`0795cc61 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiMcheckAbort+0x153
fffff880`0331bb58 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  intelppm!MWaitIdle+0x19


STACK_COMMAND:   kb

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  hardware

IMAGE_NAME:   hardware

DEBUG_FLR_IMAGE_TIMESTAMP:   0

FAILURE_BUCKET_ID:   X64_0x124_GenuineIntel_PROCESSOR_CACHE

BUCKET_ID:   X64_0x124_GenuineIntel_PROCESSOR_CACHE

Followup:  MachineOwner
---------

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`0365e000 PsLoadedModuleList = 0xfffff800`038a16d0
Debug session time:  Fri Mar 21 15: 06: 03.274 2014 (UTC + 2: 00)
System Uptime:  0 days 0: 15: 25.663
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff8800e025090, 0, 0}

Probably caused by :  afd.sys ( afd!AfdReceiveDatagramEventCommonHandler+399 )

Followup:  MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:  
Arg1:  ffffffffc0000005, The exception code that was not handled
Arg2:  fffff8800e025090, The address that the exception occurred at
Arg3:  0000000000000000, Parameter 0 of the exception
Arg4:  0000000000000000, Parameter 1 of the exception

Debugging Details:  
------------------


EXCEPTION_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:  
+4502faf0011d990
fffff880`0e025090 b85f020e80      mov     eax,800E025Fh

EXCEPTION_PARAMETER1:   0000000000000000

EXCEPTION_PARAMETER2:   0000000000000000

READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff8000390b100
0000000000000000  

ERROR_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

BUGCHECK_STR:   0x1E_c0000005

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   svchost.exe

CURRENT_IRQL:   2

EXCEPTION_RECORD:   fffff8800e025fb8 -- (.exr 0xfffff8800e025fb8)
.exr 0xfffff8800e025fb8
ExceptionAddress:  fffff800036d746c (nt!IopfCompleteRequest+0x00000000000001dc)
   ExceptionCode:  c0000005 (Access violation)
  ExceptionFlags:  00000000
NumberParameters:  2
   Parameter[0]:  0000000000000000
   Parameter[1]:  ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:   fffff8800e026060 -- (.trap 0xfffff8800e026060)
.trap 0xfffff8800e026060
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffa800bb5f460ff rbx=0000000000000000 rcx=fffffa800cd087d0
rdx=fffff8800e026270 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036d746c rsp=fffff8800e0261f0 rbp=00000000a000000c
r8=0000058000000000  r9=0000000000000000 r10=fffffa800cc76730
r11=000000000000008b r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!IopfCompleteRequest+0x1dc:  
fffff800`036d746c 488b18          mov     rbx,qword ptr [rax] ds: 0001: fffa800b`b5f460ff=?
.trap
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff800037651bb to fffff800036d3bc0

STACK_TEXT:    
fffff880`0e024fd8 fffff800`037651bb :  00000000`0000001e ffffffff`c0000005 fffff880`0e025090 00000000`00000000 :  nt!KeBugCheckEx
fffff880`0e024fe0 fffff800`03726d18 :  0000174c`000007a0 0458f068`0458f038 0000174c`776fe971 000007a0`00001eec :  nt!KipFatalFilter+0x1b
fffff880`0e025020 fffff800`036fecdc :  00000000`00060ae8 776fe9f6`0458f098 c0150008`0005174c 0458f100`00000000 :  nt! ? : FNODOBFM: `string'+0x83d
fffff880`0e025060 fffff800`036fe75d :  fffff800`0381fd74 fffff880`0e026930 00000000`00000000 fffff800`0365e000 :  nt!_C_specific_handler+0x8c
fffff880`0e0250d0 fffff800`036fd535 :  fffff800`0381fd74 fffff880`0e025148 fffff880`0e025fb8 fffff800`0365e000 :  nt!RtlpExecuteHandlerForException+0xd
fffff880`0e025100 fffff800`0370e4c1 :  fffff880`0e025fb8 fffff880`0e025810 fffff880`00000000 fffffa80`00000005 :  nt!RtlDispatchException+0x415
fffff880`0e0257e0 fffff800`036d3242 :  fffff880`0e025fb8 fffffa80`0ce9ec0f fffff880`0e026060 00000000`00000000 :  nt!KiDispatchException+0x135
fffff880`0e025e80 fffff800`036d1b4a :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiExceptionDispatch+0xc2
fffff880`0e026060 fffff800`036d746c :  00000000`a000000c 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiGeneralProtectionFault+0x10a
fffff880`0e0261f0 fffff880`03091889 :  00000000`00000000 00000000`00000002 fffffa80`000004c0 00000000`00000000 :  nt!IopfCompleteRequest+0x1dc
fffff880`0e0262e0 fffff880`030d5699 :  00000000`00000000 00000000`00000001 fffffa80`0a1c6080 00000000`00000000 :  afd!AfdReceiveDatagramEventCommonHandler+0x399
fffff880`0e026380 fffff880`01a84ca5 :  fffffa80`000004c0 fffffa80`075fb820 00000000`00000000 fffff880`0e026480 :  afd!AfdTLDgramReceiveEventHandler+0xe9
fffff880`0e026410 fffff880`01a7f21b :  00000000`00000028 fffffa80`0c680230 fffffa80`00000000 fffff880`0e026650 :  tcpip!UdpDeliverDatagrams+0x155
fffff880`0e0265a0 fffff880`01a5af77 :  00000000`00000000 00000000`00000000 c303c804`d40dd40d fffffa80`0c0ef0c0 :  tcpip!UdpReceiveDatagrams+0x21b
fffff880`0e026640 fffff880`01a5aa8a :  00000000`00000000 fffff880`01b68800 fffff880`0e026800 fffff880`01a4bcb5 :  tcpip!IppDeliverListToProtocol+0xf7
fffff880`0e026700 fffff880`01a5a089 :  00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0e0267f0 :  tcpip!IppProcessDeliverList+0x5a
fffff880`0e0267a0 fffff880`01a3d26f :  fffffa80`0b8296c0 fffff800`00000000 00000000`00000000 00000000`00000000 :  tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0e026880 fffff800`036df878 :  fffff880`01b68800 00000000`00000d11 00000000`00000004 fffffa80`0a16bca0 :  tcpip!IppLoopbackTransmit+0x38f
fffff880`0e026930 fffff880`01a3d90f :  fffff880`01a906cc fffffa80`0a16bc90 fffff880`0e026b02 00000000`00000000 :  nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0e026a10 fffff880`01a5c4aa :  fffffa80`0b8296c0 00000000`00000000 fffffa80`0a16bc00 fffffa80`0cdc37a0 :  tcpip!IppLoopbackEnqueue+0x22f
fffff880`0e026ac0 fffff880`01a5dbd5 :  00000000`00000000 fffffa80`0da78100 fffffa80`00000000 00000000`000004a4 :  tcpip!IppDispatchSendPacketHelper+0x38a
fffff880`0e026b80 fffff880`01a5ce5e :  fffffa80`075ecc11 fffff880`0e027000 00000000`00000028 fffffa80`00000000 :  tcpip!IppPacketizeDatagrams+0x2d5
fffff880`0e026ca0 fffff880`01a5f77e :  00000000`00000000 fffff880`01802f04 fffff8a0`00000001 fffffa80`0cdc37a0 :  tcpip!IppSendDatagramsCommon+0x87e
fffff880`0e026e40 fffff880`01a3bef1 :  fffff880`0e0277d0 fffffa80`0b7eab80 fffffa80`0b7eab80 fffffa80`0c680230 :  tcpip!IpNlpSendDatagrams+0x3e
fffff880`0e026e80 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  tcpip!UdpSendMessagesOnPathCreation+0x6d1


STACK_COMMAND:   kb

FOLLOWUP_IP:  
afd!AfdReceiveDatagramEventCommonHandler+399
fffff880`03091889 e926fdffff      jmp     afd!AfdReceiveDatagramEventCommonHandler+0xc4 (fffff880`030915b4)

SYMBOL_STACK_INDEX:   a

SYMBOL_NAME:   afd!AfdReceiveDatagramEventCommonHandler+399

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  afd

IMAGE_NAME:   afd.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   52462c33

FAILURE_BUCKET_ID:   X64_0x1E_c0000005_afd!AfdReceiveDatagramEventCommonHandler+399

BUCKET_ID:   X64_0x1E_c0000005_afd!AfdReceiveDatagramEventCommonHandler+399

Followup:  MachineOwner

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`0361e000 PsLoadedModuleList = 0xfffff800`038616d0
Debug session time:  Sun Apr 13 09: 42: 55.992 2014 (UTC + 2: 00)
System Uptime:  0 days 0: 01: 18.381
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {9a, 150c9e, 0, 0}

Unable to load image \?\C: \Windows\system32\drivers\MiniIcpt.sys, Win32 error 0n2
*** WARNING:  Unable to verify timestamp for MiniIcpt.sys
*** ERROR:  Module load completed but symbols could not be loaded for MiniIcpt.sys
Probably caused by :  memory_corruption ( nt!MiBadRefCount+4f )

Followup:  MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie:  calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:  
Arg1:  000000000000009a,  
Arg2:  0000000000150c9e
Arg3:  0000000000000000
Arg4:  0000000000000000

Debugging Details:  
------------------


BUGCHECK_STR:   0x4E_9a

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   firefox.exe

CURRENT_IRQL:   2

LAST_CONTROL_TRANSFER:   from fffff800037229ef to fffff80003693bc0

STACK_TEXT:    
fffff880`0274be48 fffff800`037229ef :  00000000`0000004e 00000000`0000009a 00000000`00150c9e 00000000`00000000 :  nt!KeBugCheckEx
fffff880`0274be50 fffff800`03706d49 :  00000000`00000002 fffffa80`03f3e9a0 00000000`001514de 00000000`00000002 :  nt!MiBadRefCount+0x4f
fffff880`0274be90 fffff800`03681fb3 :  fffffa80`0c9779a0 00000000`00000000 00000000`00000000 00000000`00000000 :  nt! ? : FNODOBFM: `string'+0x372b4
fffff880`0274bf70 fffff800`0397d100 :  00000000`00000000 00000000`00000000 fffffa80`0be0b240 fffffa80`06aff000 :  nt!CcFetchDataForRead+0x1c3
fffff880`0274bfd0 fffff880`0161f4f0 :  fffff8a0`00000000 00000000`00000001 fffffa80`00040000 fffff880`01673001 :  nt!CcCopyRead+0x180
fffff880`0274c090 fffff880`01620fd3 :  fffffa80`0cb308b0 fffff8a0`044ef103 fffff880`0274c290 fffff8a0`03fb7c08 :  Ntfs!NtfsCachedRead+0x180
fffff880`0274c0f0 fffff880`01621398 :  fffffa80`0b5b6410 fffffa80`0cb308b0 fffff880`0274c201 fffffa80`0c506c00 :  Ntfs!NtfsCommonRead+0x19ea
fffff880`0274c260 fffff880`0129abcf :  fffffa80`0cb30c50 fffffa80`0cb308b0 fffffa80`0c506c30 00000000`00000000 :  Ntfs!NtfsFsdRead+0x1b8
fffff880`0274c310 fffff880`0129daea :  00000000`00000000 00000000`00000000 fffffa80`076dac00 fffffa80`0c506c30 :  fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0274c3a0 fffff880`012aa274 :  fffffa80`0b4fa020 00000000`00000019 fffffa80`07835010 00000000`00000000 :  fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`0274c440 fffff880`04433d63 :  fffffa80`09ede810 fffff880`0274d000 00000000`00130a00 fffffa80`0c9b7c30 :  fltmgr!FltReadFile+0x334
fffff880`0274c520 fffffa80`09ede810 :  fffff880`0274d000 00000000`00130a00 fffffa80`0c9b7c30 fffffa80`06aff000 :  MiniIcpt+0x9d63
fffff880`0274c528 fffff880`0274d000 :  00000000`00130a00 fffffa80`0c9b7c30 fffffa80`06aff000 00000000`00000004 :  0xfffffa80`09ede810
fffff880`0274c530 00000000`00130a00 :  fffffa80`0c9b7c30 fffffa80`06aff000 00000000`00000004 fffff880`0274c5c0 :  0xfffff880`0274d000
fffff880`0274c538 fffffa80`0c9b7c30 :  fffffa80`06aff000 00000000`00000004 fffff880`0274c5c0 00000000`00000000 :  0x130a00
fffff880`0274c540 fffffa80`06aff000 :  00000000`00000004 fffff880`0274c5c0 00000000`00000000 00000000`00000000 :  0xfffffa80`0c9b7c30
fffff880`0274c548 00000000`00000004 :  fffff880`0274c5c0 00000000`00000000 00000000`00000000 fffff880`0274c728 :  0xfffffa80`06aff000
fffff880`0274c550 fffff880`0274c5c0 :  00000000`00000000 00000000`00000000 fffff880`0274c728 00000000`00000000 :  0x4
fffff880`0274c558 00000000`00000000 :  00000000`00000000 fffff880`0274c728 00000000`00000000 00000000`00000000 :  0xfffff880`0274c5c0


STACK_COMMAND:   kb

FOLLOWUP_IP:  
nt!MiBadRefCount+4f
fffff800`037229ef cc              int     3

SYMBOL_STACK_INDEX:   1

SYMBOL_NAME:   nt!MiBadRefCount+4f

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nt

DEBUG_FLR_IMAGE_TIMESTAMP:   521ea035

IMAGE_NAME:   memory_corruption

FAILURE_BUCKET_ID:   X64_0x4E_9a_nt!MiBadRefCount+4f

BUCKET_ID:   X64_0x4E_9a_nt!MiBadRefCount+4f

Followup:  MachineOwner

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`03616000 PsLoadedModuleList = 0xfffff800`038596d0
Debug session time:  Tue Apr 15 19: 15: 02.334 2014 (UTC + 2: 00)
System Uptime:  0 days 0: 03: 14.723
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960000c5f96, fffff8800a8d4f00, 0}

Probably caused by :  win32k.sys ( win32k!GdiThreadCallout+3a )

Followup:  MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:  
Arg1:  00000000c0000005, Exception code that caused the bugcheck
Arg2:  fffff960000c5f96, Address of the instruction which caused the bugcheck
Arg3:  fffff8800a8d4f00, Address of the context record for the exception that caused the bugcheck
Arg4:  0000000000000000, zero.

Debugging Details:  
------------------


EXCEPTION_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:  
win32k!GdiThreadCallout+3a
fffff960`000c5f96 488b4818        mov     rcx,qword ptr [rax+18h]

CONTEXT:   fffff8800a8d4f00 -- (.cxr 0xfffff8800a8d4f00)
.cxr 0xfffff8800a8d4f00
rax=00000000ffffffff rbx=fffffa800c138580 rcx=fffffa800c138580
rdx=0000000000000001 rsi=fffffa800c138580 rdi=0000000000000001
rip=fffff960000c5f96 rsp=fffff8800a8d58e0 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff8800a8d58d8 r12=fffffa800ca61060 r13=fffffa800b393090
r14=0000000000000001 r15=fffffa800ca611c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
win32k!GdiThreadCallout+0x3a:  
fffff960`000c5f96 488b4818        mov     rcx,qword ptr [rax+18h] ds: 002b: 00000001`00000017=?
.cxr
Resetting default scope

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0x3B

PROCESS_NAME:   IDMan.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from 0000000000000000 to fffff960000c5f96

STACK_TEXT:    
fffff880`0a8d58e0 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  win32k!GdiThreadCallout+0x3a


FOLLOWUP_IP:  
win32k!GdiThreadCallout+3a
fffff960`000c5f96 488b4818        mov     rcx,qword ptr [rax+18h]

SYMBOL_STACK_INDEX:   0

SYMBOL_NAME:   win32k!GdiThreadCallout+3a

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  win32k

IMAGE_NAME:   win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   52f4357b

STACK_COMMAND:   .cxr 0xfffff8800a8d4f00 ; kb

FAILURE_BUCKET_ID:   X64_0x3B_win32k!GdiThreadCallout+3a

BUCKET_ID:   X64_0x3B_win32k!GdiThreadCallout+3a

Followup:  MachineOwner

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 03.05.2014 22:08 przez thermalfake.)

03.05.2014 22:06

Znajdź wszystkie posty użytkownika
Wątek zamknięty

Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
Windows media player 12 jak wyłączyć proces wmpnscfg.exe zpfd 4 2.217 01.02.2017 22:18
Ostatni post: zpfd
Jak wyłączyć autostart programów podczas uruchamiania systemu? - poradnik Mistrzowsky 0 2.375 15.02.2016 13:33
Ostatni post: Mistrzowsky
Jak wyłączyć opcje Shadowing or Cache w BIOS (RAM) jacekm460 2 2.421 05.09.2015 22:17
Ostatni post: jacekm460
Acer Aspire AM3400 - BSODy ntoskrln.exe lufa9999 0 867 12.07.2015 23:31
Ostatni post: lufa9999
Komputer nie chce sie uruchomić !(Blue screen) 0x00000007b Rafaelll554 2 2.307 09.06.2015 23:02
Ostatni post: thermalfake
Jak wyłączyć programy z tray'a darkqq 3 2.757 05.04.2015 12:58
Ostatni post: thermalfake
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 1 głosów.