Maanden heb ik geen problemen meer gehad met mijn pc maar ik kreeg vandaag een BSOD.
Ik begrijp uit mijn eigen analyse dat het probleem werd veroorzaakt door teatimer.exe van Spybot S&D.
Dit vind ik vreemd omdat ik de afgelopen 5 dagen niet geüpdate heb en geen problemen whatsoever hiervoor heb ervaren. Dus is dit een simpel probleem veroorzaakt door Spybot of is het mogelijk dat het door een virus komt? Ik heb geen idee.
Hier volgt een beschrijving: (van het probleemrapport)
BCCode: 50
BCP1: A12E2000
BCP2: 00000001
BCP3: 820B1033
BCP4: 00000000
OS Version: 6_0_6002
Service Pack: 2_0
Product: 768_1
(minidump)
*******************************************************************************
Bugcheck Analysis
Use !analyze -v to get detailed debugging information.
BugCheck 50, {a12e2000, 1, 820b1033, 0}
Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+dc )
Followup: MachineOwner
---------
2: kd> !analyze -v
Bugcheck Analysis
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: a12e2000, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 820b1033, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8213f868
Unable to read MiSystemVaType memory at 8211f420
a12e2000
FAULTING_IP:
nt!memcpy+33
820b1033 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: TeaTimer.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9f839b04 -- (.trap 0xffffffff9f839b04)
ErrCode = 00000002
eax=92854064 ebx=a1248f44 ecx=3fffc30f edx=00000000 esi=92863428 edi=a12e2000
eip=820b1033 esp=9f839b78 ebp=9f839b80 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!memcpy+0x33:
820b1033 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope
LAST_CONTROL_TRANSFER: from 82055db4 to 820a036d
STACK_TEXT:
9f839aec 82055db4 00000001 a12e2000 00000000 nt!MmAccessFault+0x10a
9f839aec 820b1033 00000001 a12e2000 00000000 nt!KiTrap0E+0xdc
9f839b80 82224c5d a12d2c40 92854068 fffffffc nt!memcpy+0x33
9f839bb0 82224e93 9a6af008 9f839c60 fffffffc nt!CmpGetValueKeyFromCache+0x119
9f839c1c 8222528f 9f839cac 9f839c60 9f839c54 nt!CmpFindValueByNameFromCache+0xa0
9f839c90 822257d8 a190c948 00000002 0a45fd68 nt!CmQueryValueKey+0x311
9f839d44 82052c7a 00000204 0a45fe34 00000002 nt!NtQueryValueKey+0x2e5
9f839d44 771d5e74 00000204 0a45fe34 00000002 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0a45fdfc 00000000 00000000 00000000 00000000 0x771d5e74
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
82055db4 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a77feb3
FAILURE_BUCKET_ID: 0x50_nt!KiTrap0E+dc
BUCKET_ID: 0x50_nt!KiTrap0E+dc
Followup: MachineOwner
Ik begrijp uit mijn eigen analyse dat het probleem werd veroorzaakt door teatimer.exe van Spybot S&D.
Dit vind ik vreemd omdat ik de afgelopen 5 dagen niet geüpdate heb en geen problemen whatsoever hiervoor heb ervaren. Dus is dit een simpel probleem veroorzaakt door Spybot of is het mogelijk dat het door een virus komt? Ik heb geen idee.
Hier volgt een beschrijving: (van het probleemrapport)
BCCode: 50
BCP1: A12E2000
BCP2: 00000001
BCP3: 820B1033
BCP4: 00000000
OS Version: 6_0_6002
Service Pack: 2_0
Product: 768_1
(minidump)
*******************************************************************************
Bugcheck Analysis
Use !analyze -v to get detailed debugging information.
BugCheck 50, {a12e2000, 1, 820b1033, 0}
Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+dc )
Followup: MachineOwner
---------
2: kd> !analyze -v
Bugcheck Analysis
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: a12e2000, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 820b1033, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8213f868
Unable to read MiSystemVaType memory at 8211f420
a12e2000
FAULTING_IP:
nt!memcpy+33
820b1033 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: TeaTimer.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9f839b04 -- (.trap 0xffffffff9f839b04)
ErrCode = 00000002
eax=92854064 ebx=a1248f44 ecx=3fffc30f edx=00000000 esi=92863428 edi=a12e2000
eip=820b1033 esp=9f839b78 ebp=9f839b80 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!memcpy+0x33:
820b1033 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope
LAST_CONTROL_TRANSFER: from 82055db4 to 820a036d
STACK_TEXT:
9f839aec 82055db4 00000001 a12e2000 00000000 nt!MmAccessFault+0x10a
9f839aec 820b1033 00000001 a12e2000 00000000 nt!KiTrap0E+0xdc
9f839b80 82224c5d a12d2c40 92854068 fffffffc nt!memcpy+0x33
9f839bb0 82224e93 9a6af008 9f839c60 fffffffc nt!CmpGetValueKeyFromCache+0x119
9f839c1c 8222528f 9f839cac 9f839c60 9f839c54 nt!CmpFindValueByNameFromCache+0xa0
9f839c90 822257d8 a190c948 00000002 0a45fd68 nt!CmQueryValueKey+0x311
9f839d44 82052c7a 00000204 0a45fe34 00000002 nt!NtQueryValueKey+0x2e5
9f839d44 771d5e74 00000204 0a45fe34 00000002 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0a45fdfc 00000000 00000000 00000000 00000000 0x771d5e74
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
82055db4 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a77feb3
FAILURE_BUCKET_ID: 0x50_nt!KiTrap0E+dc
BUCKET_ID: 0x50_nt!KiTrap0E+dc
Followup: MachineOwner