Minecraft ce coupe et pc plante
Résolu
madman71
-
madman71 -
madman71 -
Bonjour,
depuis quelques jours mon minecraft s'éteint et mon pc plante, écran bleu et tout et redémarre.
De plus un fichier bloc note ce crée avec:
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x686cb55a, pid=3384, tid=4796
#
# JRE version: 7.0_05-b05
# Java VM: Java HotSpot(TM) Client VM (23.1-b03 mixed mode windows-x86 )
# Problematic frame:
# V [jvm.dll+0x2b55a]
#
# Failed to write core dump. Minidumps are not enabled by default on client versions of Windows
#
# If you would like to submit a bug report, please visit:
# http://bugreport.sun.com/bugreport/crash.jsp
#
--------------- T H R E A D ---------------
Current thread (0x4b826000): JavaThread "Minecraft main thread" daemon [_thread_in_vm, id=4796, stack(0x4b2b0000,0x4b300000)]
siginfo: ExceptionCode=0xc0000005, writing address 0x00000000
Registers:
EAX=0x00000000, EBX=0x68c3feb0, ECX=0x00000000, EDX=0x00000001
ESP=0x4b2fe354, EBP=0x4b2fe448, ESI=0x4a4dcb58, EDI=0x4b826000
EIP=0x686cb55a, EFLAGS=0x00010246
Top of Stack: (sp=0x4b2fe354)
0x4b2fe354: 4a4dcb58 0000002f 4a4dcb58 0000002f
0x4b2fe364: 4b826000 4b810ab0 4a4dcf98 4b826000
0x4b2fe374: 4a4dcf98 00000003 00000001 4b810ab0
0x4b2fe384: 4a4dcb40 4a4dcb58 4a4dcf34 4b2fe401
0x4b2fe394: 6881886a 4a56df48 4a4dcfb4 4a56df48
0x4b2fe3a4: 00310001 4b2f0000 4a56df48 00000000
0x4b2fe3b4: 00000000 00000000 ffffffff 298200ff
0x4b2fe3c4: 51415141 22411a39 f95ab100 4b2fe300
Instructions: (pc=0x686cb55a)
0x686cb53a: ff 89 85 44 ff ff ff e8 3a 63 07 00 8b f0 6a 2f
0x686cb54a: 56 ff 15 74 e2 90 68 8b 1d 88 e2 90 68 6a 2f 56
0x686cb55a: c6 00 00 ff d3 83 c4 10 85 c0 74 0f 6a 2f 56 c6
0x686cb56a: 00 2e ff d3 83 c4 08 85 c0 75 f1 8b c6 8d 50 01
Register to memory mapping:
EAX=0x00000000 is an unknown value
EBX=0x68c3feb0 is an unknown value
ECX=0x00000000 is an unknown value
EDX=0x00000001 is an unknown value
ESP=0x4b2fe354 is pointing into the stack for thread: 0x4b826000
EBP=0x4b2fe448 is pointing into the stack for thread: 0x4b826000
ESI=0x4a4dcb58 is an unknown value
EDI=0x4b826000 is a thread
Stack: [0x4b2b0000,0x4b300000], sp=0x4b2fe354, free space=312k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
V [jvm.dll+0x2b55a]
V [jvm.dll+0xd8bc0]
V [jvm.dll+0xd8daa]
C [java.dll+0x1632] Java_java_lang_ClassLoader_defineClass1+0x126
C 0x00000001
Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)
j java.lang.ClassLoader.defineClass1(Ljava/lang/String;[BIILjava/security/ProtectionDomain;Ljava/lang/String;)Ljava/lang/Class;+0
j java.lang.ClassLoader.defineClass(Ljava/lang/String;[BIILjava/security/ProtectionDomain;)Ljava/lang/Class;+30
j java.security.SecureClassLoader.defineClass(Ljava/lang/String;[BIILjava/security/CodeSource;)Ljava/lang/Class;+12
j java.net.URLClassLoader.defineClass(Ljava/lang/String;Lsun/misc/Resource;)Ljava/lang/Class;+220
J java.net.URLClassLoader$1.run()Ljava/lang/Class;
J java.net.URLClassLoader$1.run()Ljava/lang/Object;
v ~StubRoutines::call_stub
J java.security.AccessController.doPrivileged(Ljava/security/PrivilegedExceptionAction;Ljava/security/AccessControlContext;)Ljava/lang/Object;
J java.net.URLClassLoader.findClass(Ljava/lang/String;)Ljava/lang/Class;
J java.lang.ClassLoader.loadClass(Ljava/lang/String;Z)Ljava/lang/Class;
j java.lang.ClassLoader.loadClass(Ljava/lang/String;)Ljava/lang/Class;+3
v ~StubRoutines::call_stub
j acq.<init>(Lxd;)V+298
j yw.<init>(Lxd;)V+2
j vq.<init>(Lnet/minecraft/client/Minecraft;Lxd;Lfc;I)V+2
j ahv.<init>(Lnet/minecraft/client/Minecraft;Lxd;Lfc;Ladl;)V+5
j rk.b(Lxd;)Lyw;+20
j net.minecraft.client.Minecraft.a(Lxd;Ljava/lang/String;Lyw;)V+177
j net.minecraft.client.Minecraft.a(Lxd;Ljava/lang/String;)V+4
j net.minecraft.client.Minecraft.a(Lxd;)V+4
j adl.a(Laec;)V+87
j aec.a(Loe;)V+2
j lg.b()V+108
j adl.b()V+11
j ajy.a()V+11
j net.minecraft.client.Minecraft.k()V+359
j net.minecraft.client.Minecraft.x()V+131
j net.minecraft.client.Minecraft.run()V+40
j java.lang.Thread.run()V+11
v ~StubRoutines::call_stub
--------------- P R O C E S S ---------------
Java Threads: ( => current thread )
0x4b828400 JavaThread "Client write thread" daemon [_thread_blocked, id=5520, stack(0x5bf70000,0x5bfc0000)]
0x4b827800 JavaThread "Client read thread" daemon [_thread_blocked, id=6056, stack(0x515a0000,0x515f0000)]
0x4b826c00 JavaThread "Thread-14" daemon [_thread_blocked, id=5652, stack(0x50d50000,0x50da0000)]
0x4b827400 JavaThread "Thread-13" daemon [_thread_blocked, id=6368, stack(0x510c0000,0x51110000)]
0x4b826400 JavaThread "Thread-12" daemon [_thread_in_native, id=6740, stack(0x50c80000,0x50cd0000)]
=>0x4b826000 JavaThread "Minecraft main thread" daemon [_thread_in_vm, id=4796, stack(0x4b2b0000,0x4b300000)]
0x4b825800 JavaThread "Timer hack thread" daemon [_thread_blocked, id=6068, stack(0x4b000000,0x4b050000)]
0x4b7eb800 JavaThread "Keep-Alive-Timer" daemon [_thread_blocked, id=2884, stack(0x4b0b0000,0x4b100000)]
0x0028a800 JavaThread "DestroyJavaVM" [_thread_blocked, id=6616, stack(0x00a60000,0x00ab0000)]
0x4a512800 JavaThread "TimerQueue" daemon [_thread_blocked, id=5232, stack(0x4ae80000,0x4aed0000)]
0x4a512400 JavaThread "SwingWorker-pool-1-thread-1" daemon [_thread_blocked, id=1352, stack(0x4c350000,0x4c3a0000)]
0x4b5b3c00 JavaThread "AWT-EventQueue-0" [_thread_blocked, id=1536, stack(0x4bee0000,0x4bf30000)]
0x4b5b3000 JavaThread "AWT-Shutdown" [_thread_blocked, id=3180, stack(0x4c160000,0x4c1b0000)]
0x4a632000 JavaThread "AWT-Windows" daemon [_thread_in_native, id=2476, stack(0x4ad00000,0x4ad50000)]
0x4a5d5c00 JavaThread "Java2D Disposer" daemon [_thread_blocked, id=3028, stack(0x4ac50000,0x4aca0000)]
0x4a4d4c00 JavaThread "Service Thread" daemon [_thread_blocked, id=1940, stack(0x4a940000,0x4a990000)]
0x4a4c9c00 JavaThread "C1 CompilerThread0" daemon [_thread_blocked, id=6880, stack(0x4a8e0000,0x4a930000)]
0x4a4c8c00 JavaThread "Attach Listener" daemon [_thread_blocked, id=5892, stack(0x4a6d0000,0x4a720000)]
0x4a4c7800 JavaThread "Signal Dispatcher" daemon [_thread_blocked, id=7020, stack(0x4a810000,0x4a860000)]
0x00bae800 JavaThread "Finalizer" daemon [_thread_blocked, id=1420, stack(0x004a0000,0x004f0000)]
0x00bad000 JavaThread "Reference Handler" daemon [_thread_blocked, id=6384, stack(0x4a420000,0x4a470000)]
Other Threads:
0x00ba7400 VMThread [stack: 0x4a350000,0x4a3a0000] [id=6400]
0x4a4f5400 WatcherThread [stack: 0x4a1f0000,0x4a240000] [id=6712]
VM state:not at safepoint (normal execution)
VM Mutex/Monitor currently owned by a thread: None
Heap
def new generation total 157376K, used 7387K [0x04280000, 0x0ed40000, 0x197d0000)
eden space 139904K, 5% used [0x04280000, 0x049b6c90, 0x0cb20000)
from space 17472K, 0% used [0x0cb20000, 0x0cb20000, 0x0dc30000)
to space 17472K, 0% used [0x0dc30000, 0x0dc30000, 0x0ed40000)
tenured generation total 349568K, used 32186K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 9% used [0x197d0000, 0x1b73e948, 0x1b73ea00, 0x2ed30000)
compacting perm gen total 15360K, used 15291K [0x44280000, 0x45180000, 0x48280000)
the space 15360K, 99% used [0x44280000, 0x4516efe8, 0x4516f000, 0x45180000)
No shared spaces configured.
Code Cache [0x02280000, 0x02550000, 0x04280000)
total_blobs=1640 nmethods=1300 adapters=273 free_code_cache=29898Kb largest_free_block=30614784
Compilation events (10 events):
Event: 47.015 Thread 0x4a4c9c00 1304 java.net.AbstractPlainSocketImpl::getTimeout (5 bytes)
Event: 47.015 Thread 0x4a4c9c00 nmethod 1304 0x0254bd08 code [0x0254be00, 0x0254be80]
Event: 47.016 Thread 0x4a4c9c00 1305 java.net.SocketInputStream::read (44 bytes)
Event: 47.016 Thread 0x4a4c9c00 nmethod 1305 0x0254bec8 code [0x0254bfe0, 0x0254c1a8]
Event: 47.071 Thread 0x4a4c9c00 1306 java.lang.reflect.Constructor::getModifiers (5 bytes)
Event: 47.072 Thread 0x4a4c9c00 nmethod 1306 0x0254c808 code [0x0254c900, 0x0254c980]
Event: 47.114 Thread 0x4a4c9c00 1307 java.lang.ClassLoader::compareCerts (149 bytes)
Event: 47.115 Thread 0x4a4c9c00 nmethod 1307 0x0254cb08 code [0x0254cc40, 0x0254cee8]
Event: 47.191 Thread 0x4a4c9c00 1308 java.io.FilterInputStream::<init> (10 bytes)
Event: 47.191 Thread 0x4a4c9c00 nmethod 1308 0x0254d188 code [0x0254d280, 0x0254d320]
GC Heap History (4 events):
Event: 40.617 GC heap before
{Heap before GC invocations=0 (full 0):
def new generation total 157248K, used 139776K [0x04280000, 0x0ed20000, 0x197d0000)
eden space 139776K, 100% used [0x04280000, 0x0cb00000, 0x0cb00000)
from space 17472K, 0% used [0x0cb00000, 0x0cb00000, 0x0dc10000)
to space 17472K, 0% used [0x0dc10000, 0x0dc10000, 0x0ed20000)
tenured generation total 349568K, used 0K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 0% used [0x197d0000, 0x197d0000, 0x197d0200, 0x2ed30000)
compacting perm gen total 14592K, used 14420K [0x44280000, 0x450c0000, 0x48280000)
the space 14592K, 98% used [0x44280000, 0x45095018, 0x45095200, 0x450c0000)
No shared spaces configured.
Event: 40.783 GC heap after
Heap after GC invocations=1 (full 0):
def new generation total 157248K, used 17472K [0x04280000, 0x0ed20000, 0x197d0000)
eden space 139776K, 0% used [0x04280000, 0x04280000, 0x0cb00000)
from space 17472K, 100% used [0x0dc10000, 0x0ed20000, 0x0ed20000)
to space 17472K, 0% used [0x0cb00000, 0x0cb00000, 0x0dc10000)
tenured generation total 349568K, used 14180K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 4% used [0x197d0000, 0x1a5a91c0, 0x1a5a9200, 0x2ed30000)
compacting perm gen total 14592K, used 14420K [0x44280000, 0x450c0000, 0x48280000)
the space 14592K, 98% used [0x44280000, 0x45095018, 0x45095200, 0x450c0000)
No shared spaces configured.
}
Event: 46.128 GC heap before
{Heap before GC invocations=1 (full 0):
def new generation total 157248K, used 42785K [0x04280000, 0x0ed20000, 0x197d0000)
eden space 139776K, 18% used [0x04280000, 0x05b38480, 0x0cb00000)
from space 17472K, 100% used [0x0dc10000, 0x0ed20000, 0x0ed20000)
to space 17472K, 0% used [0x0cb00000, 0x0cb00000, 0x0dc10000)
tenured generation total 349568K, used 14180K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 4% used [0x197d0000, 0x1a5a91c0, 0x1a5a9200, 0x2ed30000)
compacting perm gen total 15104K, used 14885K [0x44280000, 0x45140000, 0x48280000)
the space 15104K, 98% used [0x44280000, 0x45109408, 0x45109600, 0x45140000)
No shared spaces configured.
Event: 46.332 GC heap after
Heap after GC invocations=2 (full 1):
def new generation total 157376K, used 0K [0x04280000, 0x0ed40000, 0x197d0000)
eden space 139904K, 0% used [0x04280000, 0x04280000, 0x0cb20000)
from space 17472K, 0% used [0x0cb20000, 0x0cb20000, 0x0dc30000)
to space 17472K, 0% used [0x0dc30000, 0x0dc30000, 0x0ed40000)
tenured generation total 349568K, used 32186K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 9% used [0x197d0000, 0x1b73e948, 0x1b73ea00, 0x2ed30000)
compacting perm gen total 15104K, used 14885K [0x44280000, 0x45140000, 0x48280000)
the space 15104K, 98% used [0x44280000, 0x45109408, 0x45109600, 0x45140000)
No shared spaces configured.
}
Deoptimization events (0 events):
No events
Internal exceptions (10 events):
Event: 47.266 Thread 0x4b826000 Threw 0x043787c8 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.266 Thread 0x4b826000 Threw 0x04378aa0 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.267 Thread 0x4b826000 Threw 0x0437aa60 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.267 Thread 0x4b826000 Threw 0x0437ad38 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.271 Thread 0x4b826000 Threw 0x0437f9e0 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.271 Thread 0x4b826000 Threw 0x0437fcb8 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.274 Thread 0x4b826000 Threw 0x04382170 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.274 Thread 0x4b826000 Threw 0x04382448 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.276 Thread 0x4b826000 Threw 0x04384660 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.276 Thread 0x4b826000 Threw 0x04384938 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Events (10 events):
Event: 47.266 loading class 0x4b6eae78
Event: 47.266 loading class 0x4b6eae78 done
Event: 47.267 loading class 0x4b743208
Event: 47.267 loading class 0x4b743208 done
Event: 47.271 loading class 0x4a5bd210
Event: 47.271 loading class 0x4a5bd210 done
Event: 47.274 loading class 0x4b6e5bc0
Event: 47.274 loading class 0x4b6e5bc0 done
Event: 47.276 loading class 0x4a56df48
Event: 47.276 loading class 0x4a56df48 done
Dynamic libraries:
0x00e50000 - 0x00e7f000 C:\Program Files (x86)\Java\jre7\bin\javaw.exe
0x76f10000 - 0x77090000 C:\Windows\SysWOW64\ntdll.dll
0x750a0000 - 0x751a0000 C:\Windows\syswow64\kernel32.dll
0x747e0000 - 0x74826000 C:\Windows\syswow64\KERNELBASE.dll
0x728f0000 - 0x72965000 C:\Program Files\Bitdefender\Bitdefender 2012\Active Virus Control\Avc3_00149_003\avcuf32.dll
0x74d00000 - 0x74da0000 C:\Windows\syswow64\ADVAPI32.dll
0x763e0000 - 0x7648c000 C:\Windows\syswow64\msvcrt.dll
0x755b0000 - 0x755c9000 C:\Windows\SysWOW64\sechost.dll
0x74da0000 - 0x74e90000 C:\Windows\syswow64\RPCRT4.dll
0x74600000 - 0x74660000 C:\Windows\syswow64\SspiCli.dll
0x745f0000 - 0x745fc000 C:\Windows\syswow64\CRYPTBASE.dll
0x746e0000 - 0x747e0000 C:\Windows\syswow64\USER32.dll
0x756d0000 - 0x75760000 C:\Windows\syswow64\GDI32.dll
0x75620000 - 0x7562a000 C:\Windows\syswow64\LPK.dll
0x75630000 - 0x756cd000 C:\Windows\syswow64\USP10.dll
0x71c90000 - 0x71e2e000 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd\COMCTL32.dll
0x76490000 - 0x764e7000 C:\Windows\syswow64\SHLWAPI.dll
0x765f0000 - 0x76650000 C:\Windows\system32\IMM32.DLL
0x751c0000 - 0x7528c000 C:\Windows\syswow64\MSCTF.dll
0x68c30000 - 0x68cee000 C:\Program Files (x86)\Java\jre7\bin\msvcr100.dll
0x686a0000 - 0x689ea000 C:\Program Files (x86)\Java\jre7\bin\client\jvm.dll
0x73fb0000 - 0x73fb7000 C:\Windows\system32\WSOCK32.dll
0x764f0000 - 0x76525000 C:\Windows\syswow64\WS2_32.dll
0x75430000 - 0x75436000 C:\Windows\syswow64\NSI.dll
0x73f40000 - 0x73f72000 C:\Windows\system32\WINMM.dll
0x75610000 - 0x75615000 C:\Windows\syswow64\PSAPI.DLL
0x6d6f0000 - 0x6d6fc000 C:\Program Files (x86)\Java\jre7\bin\verify.dll
0x68c10000 - 0x68c30000 C:\Program Files (x86)\Java\jre7\bin\java.dll
0x68bf0000 - 0x68c03000 C:\Program Files (x86)\Java\jre7\bin\zip.dll
0x68aa0000 - 0x68be2000 C:\Program Files (x86)\Java\jre7\bin\awt.dll
0x74830000 - 0x748bf000 C:\Windows\syswow64\OLEAUT32.dll
0x748c0000 - 0x74a1c000 C:\Windows\syswow64\ole32.dll
0x70e80000 - 0x70f00000 C:\Windows\system32\uxtheme.dll
0x68490000 - 0x684b3000 C:\Program Files (x86)\Mumble\mumble_ol.dll
0x70e60000 - 0x70e73000 C:\Windows\system32\dwmapi.dll
0x75760000 - 0x763a9000 C:\Windows\syswow64\SHELL32.dll
0x68670000 - 0x6869a000 C:\Program Files (x86)\Java\jre7\bin\fontmanager.dll
0x68a80000 - 0x68a94000 C:\Program Files (x86)\Java\jre7\bin\net.dll
0x71c50000 - 0x71c8c000 C:\Windows\system32\mswsock.dll
0x71ef0000 - 0x71ef6000 C:\Windows\System32\wship6.dll
0x68660000 - 0x6866f000 C:\Program Files (x86)\Java\jre7\bin\nio.dll
0x71c40000 - 0x71c45000 C:\Windows\System32\wshtcpip.dll
0x70600000 - 0x70644000 C:\Windows\system32\DNSAPI.dll
0x71ec0000 - 0x71ee1000 C:\Program Files (x86)\Bonjour\mdnsNSP.dll
0x729c0000 - 0x729dc000 C:\Windows\system32\Iphlpapi.DLL
0x729b0000 - 0x729b7000 C:\Windows\system32\WINNSI.DLL
0x71e50000 - 0x71e77000 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
0x71eb0000 - 0x71eb6000 C:\Windows\system32\rasadhlp.dll
0x705c0000 - 0x705f8000 C:\Windows\System32\fwpuclnt.dll
0x71190000 - 0x711a6000 C:\Windows\system32\CRYPTSP.dll
0x71150000 - 0x7118b000 C:\Windows\system32\rsaenh.dll
0x728d0000 - 0x728e7000 C:\Windows\system32\USERENV.dll
0x728c0000 - 0x728cb000 C:\Windows\system32\profapi.dll
0x6e430000 - 0x6e440000 C:\Windows\system32\NLAapi.dll
0x6e420000 - 0x6e428000 C:\Windows\System32\winrnr.dll
0x6e410000 - 0x6e420000 C:\Windows\system32\napinsp.dll
0x6e3c0000 - 0x6e3d2000 C:\Windows\system32\pnrpnsp.dll
0x68640000 - 0x68660000 C:\Program Files (x86)\Java\jre7\bin\sunec.dll
0x68600000 - 0x68631000 C:\Program Files (x86)\Java\jre7\bin\t2k.dll
0x74e90000 - 0x74f13000 C:\Windows\syswow64\CLBCatQ.DLL
0x6dac0000 - 0x6dbbb000 C:\Windows\system32\WindowsCodecs.dll
0x70b50000 - 0x70b9b000 C:\Windows\system32\apphelp.dll
0x00e20000 - 0x00e44000 C:\Program Files (x86)\ASUS\ASUS Data Security Manager\ShlExt\x86\OverlayIconShlExt.dll
0x4a3e0000 - 0x4a403000 C:\Program Files (x86)\ASUS\ASUS Data Security Manager\ShlExt\x86\OverlayIconShlExt1.dll
0x68580000 - 0x685b1000 C:\Windows\system32\EhStorShell.dll
0x75290000 - 0x7542d000 C:\Windows\syswow64\SETUPAPI.dll
0x765c0000 - 0x765e7000 C:\Windows\syswow64\CFGMGR32.dll
0x751a0000 - 0x751b2000 C:\Windows\syswow64\DEVOBJ.dll
0x70790000 - 0x70885000 C:\Windows\system32\PROPSYS.dll
0x716f0000 - 0x7175f000 C:\Windows\system32\ntshrui.dll
0x71e30000 - 0x71e49000 C:\Windows\system32\srvcli.dll
0x704c0000 - 0x704cb000 C:\Windows\system32\cscapi.dll
0x6d1c0000 - 0x6d1ca000 C:\Windows\system32\slc.dll
0x685f0000 - 0x685f9000 C:\Program Files (x86)\Java\jre7\bin\sunmscapi.dll
0x74f80000 - 0x7509e000 C:\Windows\syswow64\CRYPT32.dll
0x75600000 - 0x7560c000 C:\Windows\syswow64\MSASN1.dll
0x4af80000 - 0x4afeb000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\lwjgl.dll
0x6d8e0000 - 0x6d9a8000 C:\Windows\system32\OPENGL32.dll
0x716c0000 - 0x716e2000 C:\Windows\system32\GLU32.dll
0x6a650000 - 0x6a737000 C:\Windows\system32\DDRAW.dll
0x716b0000 - 0x716b6000 C:\Windows\system32\DCIMAN32.dll
0x743b0000 - 0x743b9000 C:\Windows\system32\VERSION.dll
0x685e0000 - 0x685e6000 C:\Program Files (x86)\Java\jre7\bin\jawt.dll
0x4dd80000 - 0x4e352000 C:\Windows\system32\ig4icd32.dll
0x4e500000 - 0x4e8be000 C:\Windows\system32\ig4dev32.dll
0x4b280000 - 0x4b293000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\jinput-dx8.dll
0x71680000 - 0x716b0000 C:\Windows\system32\DINPUT8.dll
0x6ee20000 - 0x6ee29000 C:\Windows\system32\HID.DLL
0x763b0000 - 0x763dd000 C:\Windows\syswow64\WINTRUST.dll
0x4b4c0000 - 0x4b4d2000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\jinput-raw.dll
0x63e80000 - 0x63fa9000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\OpenAL32.dll
0x6d390000 - 0x6d402000 C:\Windows\system32\dsound.dll
0x6eed0000 - 0x6eef5000 C:\Windows\system32\POWRPROF.dll
0x70890000 - 0x708c9000 C:\Windows\System32\MMDevApi.dll
0x6e610000 - 0x6e640000 C:\Windows\system32\wdmaud.drv
0x6e8a0000 - 0x6e8a4000 C:\Windows\system32\ksuser.dll
0x72b70000 - 0x72b77000 C:\Windows\system32\AVRT.dll
0x70750000 - 0x70786000 C:\Windows\system32\AUDIOSES.DLL
0x6e5e0000 - 0x6e5e8000 C:\Windows\system32\msacm32.drv
0x4c260000 - 0x4c274000 C:\Windows\system32\MSACM32.dll
0x6e450000 - 0x6e457000 C:\Windows\system32\midimap.dll
0x703d0000 - 0x704bb000 C:\Windows\system32\dbghelp.dll
VM Arguments:
jvm_args: -Xms512m -Xmx1024m
java_command: C:\Users\anthony\Desktop\Minecraft.exe
Launcher Type: SUN_STANDARD
Environment Variables:
PATH=C:\Program Files\Common Files\Microsoft Shared\Windows Live;C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\Windows Live\Shared;C:\Program Files (x86)\Java\jre7\bin
USERNAME=anthony
OS=Windows_NT
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 23 Stepping 10, GenuineIntel
--------------- S Y S T E M ---------------
OS: Windows 7 , 64 bit Build 7600
CPU:total 2 (2 cores per cpu, 1 threads per core) family 6 model 23 stepping 10, cmov, cx8, fxsr, mmx, sse, sse2, sse3, ssse3, tsc
Memory: 4k page, physical 3109976k(1146040k free), swap 6218052k(3204496k free)
vm_info: Java HotSpot(TM) Client VM (23.1-b03) for windows-x86 JRE (1.7.0_05-b05), built on May 15 2012 18:11:27 by "java_re" with unknown MS VC++:1600
time: Fri Jul 06 18:28:23 2012
elapsed time: 47 seconds
Quelqu'un sais le pourquoi du comment?
depuis quelques jours mon minecraft s'éteint et mon pc plante, écran bleu et tout et redémarre.
De plus un fichier bloc note ce crée avec:
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x686cb55a, pid=3384, tid=4796
#
# JRE version: 7.0_05-b05
# Java VM: Java HotSpot(TM) Client VM (23.1-b03 mixed mode windows-x86 )
# Problematic frame:
# V [jvm.dll+0x2b55a]
#
# Failed to write core dump. Minidumps are not enabled by default on client versions of Windows
#
# If you would like to submit a bug report, please visit:
# http://bugreport.sun.com/bugreport/crash.jsp
#
--------------- T H R E A D ---------------
Current thread (0x4b826000): JavaThread "Minecraft main thread" daemon [_thread_in_vm, id=4796, stack(0x4b2b0000,0x4b300000)]
siginfo: ExceptionCode=0xc0000005, writing address 0x00000000
Registers:
EAX=0x00000000, EBX=0x68c3feb0, ECX=0x00000000, EDX=0x00000001
ESP=0x4b2fe354, EBP=0x4b2fe448, ESI=0x4a4dcb58, EDI=0x4b826000
EIP=0x686cb55a, EFLAGS=0x00010246
Top of Stack: (sp=0x4b2fe354)
0x4b2fe354: 4a4dcb58 0000002f 4a4dcb58 0000002f
0x4b2fe364: 4b826000 4b810ab0 4a4dcf98 4b826000
0x4b2fe374: 4a4dcf98 00000003 00000001 4b810ab0
0x4b2fe384: 4a4dcb40 4a4dcb58 4a4dcf34 4b2fe401
0x4b2fe394: 6881886a 4a56df48 4a4dcfb4 4a56df48
0x4b2fe3a4: 00310001 4b2f0000 4a56df48 00000000
0x4b2fe3b4: 00000000 00000000 ffffffff 298200ff
0x4b2fe3c4: 51415141 22411a39 f95ab100 4b2fe300
Instructions: (pc=0x686cb55a)
0x686cb53a: ff 89 85 44 ff ff ff e8 3a 63 07 00 8b f0 6a 2f
0x686cb54a: 56 ff 15 74 e2 90 68 8b 1d 88 e2 90 68 6a 2f 56
0x686cb55a: c6 00 00 ff d3 83 c4 10 85 c0 74 0f 6a 2f 56 c6
0x686cb56a: 00 2e ff d3 83 c4 08 85 c0 75 f1 8b c6 8d 50 01
Register to memory mapping:
EAX=0x00000000 is an unknown value
EBX=0x68c3feb0 is an unknown value
ECX=0x00000000 is an unknown value
EDX=0x00000001 is an unknown value
ESP=0x4b2fe354 is pointing into the stack for thread: 0x4b826000
EBP=0x4b2fe448 is pointing into the stack for thread: 0x4b826000
ESI=0x4a4dcb58 is an unknown value
EDI=0x4b826000 is a thread
Stack: [0x4b2b0000,0x4b300000], sp=0x4b2fe354, free space=312k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
V [jvm.dll+0x2b55a]
V [jvm.dll+0xd8bc0]
V [jvm.dll+0xd8daa]
C [java.dll+0x1632] Java_java_lang_ClassLoader_defineClass1+0x126
C 0x00000001
Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)
j java.lang.ClassLoader.defineClass1(Ljava/lang/String;[BIILjava/security/ProtectionDomain;Ljava/lang/String;)Ljava/lang/Class;+0
j java.lang.ClassLoader.defineClass(Ljava/lang/String;[BIILjava/security/ProtectionDomain;)Ljava/lang/Class;+30
j java.security.SecureClassLoader.defineClass(Ljava/lang/String;[BIILjava/security/CodeSource;)Ljava/lang/Class;+12
j java.net.URLClassLoader.defineClass(Ljava/lang/String;Lsun/misc/Resource;)Ljava/lang/Class;+220
J java.net.URLClassLoader$1.run()Ljava/lang/Class;
J java.net.URLClassLoader$1.run()Ljava/lang/Object;
v ~StubRoutines::call_stub
J java.security.AccessController.doPrivileged(Ljava/security/PrivilegedExceptionAction;Ljava/security/AccessControlContext;)Ljava/lang/Object;
J java.net.URLClassLoader.findClass(Ljava/lang/String;)Ljava/lang/Class;
J java.lang.ClassLoader.loadClass(Ljava/lang/String;Z)Ljava/lang/Class;
j java.lang.ClassLoader.loadClass(Ljava/lang/String;)Ljava/lang/Class;+3
v ~StubRoutines::call_stub
j acq.<init>(Lxd;)V+298
j yw.<init>(Lxd;)V+2
j vq.<init>(Lnet/minecraft/client/Minecraft;Lxd;Lfc;I)V+2
j ahv.<init>(Lnet/minecraft/client/Minecraft;Lxd;Lfc;Ladl;)V+5
j rk.b(Lxd;)Lyw;+20
j net.minecraft.client.Minecraft.a(Lxd;Ljava/lang/String;Lyw;)V+177
j net.minecraft.client.Minecraft.a(Lxd;Ljava/lang/String;)V+4
j net.minecraft.client.Minecraft.a(Lxd;)V+4
j adl.a(Laec;)V+87
j aec.a(Loe;)V+2
j lg.b()V+108
j adl.b()V+11
j ajy.a()V+11
j net.minecraft.client.Minecraft.k()V+359
j net.minecraft.client.Minecraft.x()V+131
j net.minecraft.client.Minecraft.run()V+40
j java.lang.Thread.run()V+11
v ~StubRoutines::call_stub
--------------- P R O C E S S ---------------
Java Threads: ( => current thread )
0x4b828400 JavaThread "Client write thread" daemon [_thread_blocked, id=5520, stack(0x5bf70000,0x5bfc0000)]
0x4b827800 JavaThread "Client read thread" daemon [_thread_blocked, id=6056, stack(0x515a0000,0x515f0000)]
0x4b826c00 JavaThread "Thread-14" daemon [_thread_blocked, id=5652, stack(0x50d50000,0x50da0000)]
0x4b827400 JavaThread "Thread-13" daemon [_thread_blocked, id=6368, stack(0x510c0000,0x51110000)]
0x4b826400 JavaThread "Thread-12" daemon [_thread_in_native, id=6740, stack(0x50c80000,0x50cd0000)]
=>0x4b826000 JavaThread "Minecraft main thread" daemon [_thread_in_vm, id=4796, stack(0x4b2b0000,0x4b300000)]
0x4b825800 JavaThread "Timer hack thread" daemon [_thread_blocked, id=6068, stack(0x4b000000,0x4b050000)]
0x4b7eb800 JavaThread "Keep-Alive-Timer" daemon [_thread_blocked, id=2884, stack(0x4b0b0000,0x4b100000)]
0x0028a800 JavaThread "DestroyJavaVM" [_thread_blocked, id=6616, stack(0x00a60000,0x00ab0000)]
0x4a512800 JavaThread "TimerQueue" daemon [_thread_blocked, id=5232, stack(0x4ae80000,0x4aed0000)]
0x4a512400 JavaThread "SwingWorker-pool-1-thread-1" daemon [_thread_blocked, id=1352, stack(0x4c350000,0x4c3a0000)]
0x4b5b3c00 JavaThread "AWT-EventQueue-0" [_thread_blocked, id=1536, stack(0x4bee0000,0x4bf30000)]
0x4b5b3000 JavaThread "AWT-Shutdown" [_thread_blocked, id=3180, stack(0x4c160000,0x4c1b0000)]
0x4a632000 JavaThread "AWT-Windows" daemon [_thread_in_native, id=2476, stack(0x4ad00000,0x4ad50000)]
0x4a5d5c00 JavaThread "Java2D Disposer" daemon [_thread_blocked, id=3028, stack(0x4ac50000,0x4aca0000)]
0x4a4d4c00 JavaThread "Service Thread" daemon [_thread_blocked, id=1940, stack(0x4a940000,0x4a990000)]
0x4a4c9c00 JavaThread "C1 CompilerThread0" daemon [_thread_blocked, id=6880, stack(0x4a8e0000,0x4a930000)]
0x4a4c8c00 JavaThread "Attach Listener" daemon [_thread_blocked, id=5892, stack(0x4a6d0000,0x4a720000)]
0x4a4c7800 JavaThread "Signal Dispatcher" daemon [_thread_blocked, id=7020, stack(0x4a810000,0x4a860000)]
0x00bae800 JavaThread "Finalizer" daemon [_thread_blocked, id=1420, stack(0x004a0000,0x004f0000)]
0x00bad000 JavaThread "Reference Handler" daemon [_thread_blocked, id=6384, stack(0x4a420000,0x4a470000)]
Other Threads:
0x00ba7400 VMThread [stack: 0x4a350000,0x4a3a0000] [id=6400]
0x4a4f5400 WatcherThread [stack: 0x4a1f0000,0x4a240000] [id=6712]
VM state:not at safepoint (normal execution)
VM Mutex/Monitor currently owned by a thread: None
Heap
def new generation total 157376K, used 7387K [0x04280000, 0x0ed40000, 0x197d0000)
eden space 139904K, 5% used [0x04280000, 0x049b6c90, 0x0cb20000)
from space 17472K, 0% used [0x0cb20000, 0x0cb20000, 0x0dc30000)
to space 17472K, 0% used [0x0dc30000, 0x0dc30000, 0x0ed40000)
tenured generation total 349568K, used 32186K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 9% used [0x197d0000, 0x1b73e948, 0x1b73ea00, 0x2ed30000)
compacting perm gen total 15360K, used 15291K [0x44280000, 0x45180000, 0x48280000)
the space 15360K, 99% used [0x44280000, 0x4516efe8, 0x4516f000, 0x45180000)
No shared spaces configured.
Code Cache [0x02280000, 0x02550000, 0x04280000)
total_blobs=1640 nmethods=1300 adapters=273 free_code_cache=29898Kb largest_free_block=30614784
Compilation events (10 events):
Event: 47.015 Thread 0x4a4c9c00 1304 java.net.AbstractPlainSocketImpl::getTimeout (5 bytes)
Event: 47.015 Thread 0x4a4c9c00 nmethod 1304 0x0254bd08 code [0x0254be00, 0x0254be80]
Event: 47.016 Thread 0x4a4c9c00 1305 java.net.SocketInputStream::read (44 bytes)
Event: 47.016 Thread 0x4a4c9c00 nmethod 1305 0x0254bec8 code [0x0254bfe0, 0x0254c1a8]
Event: 47.071 Thread 0x4a4c9c00 1306 java.lang.reflect.Constructor::getModifiers (5 bytes)
Event: 47.072 Thread 0x4a4c9c00 nmethod 1306 0x0254c808 code [0x0254c900, 0x0254c980]
Event: 47.114 Thread 0x4a4c9c00 1307 java.lang.ClassLoader::compareCerts (149 bytes)
Event: 47.115 Thread 0x4a4c9c00 nmethod 1307 0x0254cb08 code [0x0254cc40, 0x0254cee8]
Event: 47.191 Thread 0x4a4c9c00 1308 java.io.FilterInputStream::<init> (10 bytes)
Event: 47.191 Thread 0x4a4c9c00 nmethod 1308 0x0254d188 code [0x0254d280, 0x0254d320]
GC Heap History (4 events):
Event: 40.617 GC heap before
{Heap before GC invocations=0 (full 0):
def new generation total 157248K, used 139776K [0x04280000, 0x0ed20000, 0x197d0000)
eden space 139776K, 100% used [0x04280000, 0x0cb00000, 0x0cb00000)
from space 17472K, 0% used [0x0cb00000, 0x0cb00000, 0x0dc10000)
to space 17472K, 0% used [0x0dc10000, 0x0dc10000, 0x0ed20000)
tenured generation total 349568K, used 0K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 0% used [0x197d0000, 0x197d0000, 0x197d0200, 0x2ed30000)
compacting perm gen total 14592K, used 14420K [0x44280000, 0x450c0000, 0x48280000)
the space 14592K, 98% used [0x44280000, 0x45095018, 0x45095200, 0x450c0000)
No shared spaces configured.
Event: 40.783 GC heap after
Heap after GC invocations=1 (full 0):
def new generation total 157248K, used 17472K [0x04280000, 0x0ed20000, 0x197d0000)
eden space 139776K, 0% used [0x04280000, 0x04280000, 0x0cb00000)
from space 17472K, 100% used [0x0dc10000, 0x0ed20000, 0x0ed20000)
to space 17472K, 0% used [0x0cb00000, 0x0cb00000, 0x0dc10000)
tenured generation total 349568K, used 14180K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 4% used [0x197d0000, 0x1a5a91c0, 0x1a5a9200, 0x2ed30000)
compacting perm gen total 14592K, used 14420K [0x44280000, 0x450c0000, 0x48280000)
the space 14592K, 98% used [0x44280000, 0x45095018, 0x45095200, 0x450c0000)
No shared spaces configured.
}
Event: 46.128 GC heap before
{Heap before GC invocations=1 (full 0):
def new generation total 157248K, used 42785K [0x04280000, 0x0ed20000, 0x197d0000)
eden space 139776K, 18% used [0x04280000, 0x05b38480, 0x0cb00000)
from space 17472K, 100% used [0x0dc10000, 0x0ed20000, 0x0ed20000)
to space 17472K, 0% used [0x0cb00000, 0x0cb00000, 0x0dc10000)
tenured generation total 349568K, used 14180K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 4% used [0x197d0000, 0x1a5a91c0, 0x1a5a9200, 0x2ed30000)
compacting perm gen total 15104K, used 14885K [0x44280000, 0x45140000, 0x48280000)
the space 15104K, 98% used [0x44280000, 0x45109408, 0x45109600, 0x45140000)
No shared spaces configured.
Event: 46.332 GC heap after
Heap after GC invocations=2 (full 1):
def new generation total 157376K, used 0K [0x04280000, 0x0ed40000, 0x197d0000)
eden space 139904K, 0% used [0x04280000, 0x04280000, 0x0cb20000)
from space 17472K, 0% used [0x0cb20000, 0x0cb20000, 0x0dc30000)
to space 17472K, 0% used [0x0dc30000, 0x0dc30000, 0x0ed40000)
tenured generation total 349568K, used 32186K [0x197d0000, 0x2ed30000, 0x44280000)
the space 349568K, 9% used [0x197d0000, 0x1b73e948, 0x1b73ea00, 0x2ed30000)
compacting perm gen total 15104K, used 14885K [0x44280000, 0x45140000, 0x48280000)
the space 15104K, 98% used [0x44280000, 0x45109408, 0x45109600, 0x45140000)
No shared spaces configured.
}
Deoptimization events (0 events):
No events
Internal exceptions (10 events):
Event: 47.266 Thread 0x4b826000 Threw 0x043787c8 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.266 Thread 0x4b826000 Threw 0x04378aa0 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.267 Thread 0x4b826000 Threw 0x0437aa60 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.267 Thread 0x4b826000 Threw 0x0437ad38 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.271 Thread 0x4b826000 Threw 0x0437f9e0 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.271 Thread 0x4b826000 Threw 0x0437fcb8 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.274 Thread 0x4b826000 Threw 0x04382170 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.274 Thread 0x4b826000 Threw 0x04382448 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.276 Thread 0x4b826000 Threw 0x04384660 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Event: 47.276 Thread 0x4b826000 Threw 0x04384938 at C:\jdk7u5_32P\jdk7u5\hotspot\src\share\vm\prims\jvm.cpp:1166
Events (10 events):
Event: 47.266 loading class 0x4b6eae78
Event: 47.266 loading class 0x4b6eae78 done
Event: 47.267 loading class 0x4b743208
Event: 47.267 loading class 0x4b743208 done
Event: 47.271 loading class 0x4a5bd210
Event: 47.271 loading class 0x4a5bd210 done
Event: 47.274 loading class 0x4b6e5bc0
Event: 47.274 loading class 0x4b6e5bc0 done
Event: 47.276 loading class 0x4a56df48
Event: 47.276 loading class 0x4a56df48 done
Dynamic libraries:
0x00e50000 - 0x00e7f000 C:\Program Files (x86)\Java\jre7\bin\javaw.exe
0x76f10000 - 0x77090000 C:\Windows\SysWOW64\ntdll.dll
0x750a0000 - 0x751a0000 C:\Windows\syswow64\kernel32.dll
0x747e0000 - 0x74826000 C:\Windows\syswow64\KERNELBASE.dll
0x728f0000 - 0x72965000 C:\Program Files\Bitdefender\Bitdefender 2012\Active Virus Control\Avc3_00149_003\avcuf32.dll
0x74d00000 - 0x74da0000 C:\Windows\syswow64\ADVAPI32.dll
0x763e0000 - 0x7648c000 C:\Windows\syswow64\msvcrt.dll
0x755b0000 - 0x755c9000 C:\Windows\SysWOW64\sechost.dll
0x74da0000 - 0x74e90000 C:\Windows\syswow64\RPCRT4.dll
0x74600000 - 0x74660000 C:\Windows\syswow64\SspiCli.dll
0x745f0000 - 0x745fc000 C:\Windows\syswow64\CRYPTBASE.dll
0x746e0000 - 0x747e0000 C:\Windows\syswow64\USER32.dll
0x756d0000 - 0x75760000 C:\Windows\syswow64\GDI32.dll
0x75620000 - 0x7562a000 C:\Windows\syswow64\LPK.dll
0x75630000 - 0x756cd000 C:\Windows\syswow64\USP10.dll
0x71c90000 - 0x71e2e000 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd\COMCTL32.dll
0x76490000 - 0x764e7000 C:\Windows\syswow64\SHLWAPI.dll
0x765f0000 - 0x76650000 C:\Windows\system32\IMM32.DLL
0x751c0000 - 0x7528c000 C:\Windows\syswow64\MSCTF.dll
0x68c30000 - 0x68cee000 C:\Program Files (x86)\Java\jre7\bin\msvcr100.dll
0x686a0000 - 0x689ea000 C:\Program Files (x86)\Java\jre7\bin\client\jvm.dll
0x73fb0000 - 0x73fb7000 C:\Windows\system32\WSOCK32.dll
0x764f0000 - 0x76525000 C:\Windows\syswow64\WS2_32.dll
0x75430000 - 0x75436000 C:\Windows\syswow64\NSI.dll
0x73f40000 - 0x73f72000 C:\Windows\system32\WINMM.dll
0x75610000 - 0x75615000 C:\Windows\syswow64\PSAPI.DLL
0x6d6f0000 - 0x6d6fc000 C:\Program Files (x86)\Java\jre7\bin\verify.dll
0x68c10000 - 0x68c30000 C:\Program Files (x86)\Java\jre7\bin\java.dll
0x68bf0000 - 0x68c03000 C:\Program Files (x86)\Java\jre7\bin\zip.dll
0x68aa0000 - 0x68be2000 C:\Program Files (x86)\Java\jre7\bin\awt.dll
0x74830000 - 0x748bf000 C:\Windows\syswow64\OLEAUT32.dll
0x748c0000 - 0x74a1c000 C:\Windows\syswow64\ole32.dll
0x70e80000 - 0x70f00000 C:\Windows\system32\uxtheme.dll
0x68490000 - 0x684b3000 C:\Program Files (x86)\Mumble\mumble_ol.dll
0x70e60000 - 0x70e73000 C:\Windows\system32\dwmapi.dll
0x75760000 - 0x763a9000 C:\Windows\syswow64\SHELL32.dll
0x68670000 - 0x6869a000 C:\Program Files (x86)\Java\jre7\bin\fontmanager.dll
0x68a80000 - 0x68a94000 C:\Program Files (x86)\Java\jre7\bin\net.dll
0x71c50000 - 0x71c8c000 C:\Windows\system32\mswsock.dll
0x71ef0000 - 0x71ef6000 C:\Windows\System32\wship6.dll
0x68660000 - 0x6866f000 C:\Program Files (x86)\Java\jre7\bin\nio.dll
0x71c40000 - 0x71c45000 C:\Windows\System32\wshtcpip.dll
0x70600000 - 0x70644000 C:\Windows\system32\DNSAPI.dll
0x71ec0000 - 0x71ee1000 C:\Program Files (x86)\Bonjour\mdnsNSP.dll
0x729c0000 - 0x729dc000 C:\Windows\system32\Iphlpapi.DLL
0x729b0000 - 0x729b7000 C:\Windows\system32\WINNSI.DLL
0x71e50000 - 0x71e77000 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
0x71eb0000 - 0x71eb6000 C:\Windows\system32\rasadhlp.dll
0x705c0000 - 0x705f8000 C:\Windows\System32\fwpuclnt.dll
0x71190000 - 0x711a6000 C:\Windows\system32\CRYPTSP.dll
0x71150000 - 0x7118b000 C:\Windows\system32\rsaenh.dll
0x728d0000 - 0x728e7000 C:\Windows\system32\USERENV.dll
0x728c0000 - 0x728cb000 C:\Windows\system32\profapi.dll
0x6e430000 - 0x6e440000 C:\Windows\system32\NLAapi.dll
0x6e420000 - 0x6e428000 C:\Windows\System32\winrnr.dll
0x6e410000 - 0x6e420000 C:\Windows\system32\napinsp.dll
0x6e3c0000 - 0x6e3d2000 C:\Windows\system32\pnrpnsp.dll
0x68640000 - 0x68660000 C:\Program Files (x86)\Java\jre7\bin\sunec.dll
0x68600000 - 0x68631000 C:\Program Files (x86)\Java\jre7\bin\t2k.dll
0x74e90000 - 0x74f13000 C:\Windows\syswow64\CLBCatQ.DLL
0x6dac0000 - 0x6dbbb000 C:\Windows\system32\WindowsCodecs.dll
0x70b50000 - 0x70b9b000 C:\Windows\system32\apphelp.dll
0x00e20000 - 0x00e44000 C:\Program Files (x86)\ASUS\ASUS Data Security Manager\ShlExt\x86\OverlayIconShlExt.dll
0x4a3e0000 - 0x4a403000 C:\Program Files (x86)\ASUS\ASUS Data Security Manager\ShlExt\x86\OverlayIconShlExt1.dll
0x68580000 - 0x685b1000 C:\Windows\system32\EhStorShell.dll
0x75290000 - 0x7542d000 C:\Windows\syswow64\SETUPAPI.dll
0x765c0000 - 0x765e7000 C:\Windows\syswow64\CFGMGR32.dll
0x751a0000 - 0x751b2000 C:\Windows\syswow64\DEVOBJ.dll
0x70790000 - 0x70885000 C:\Windows\system32\PROPSYS.dll
0x716f0000 - 0x7175f000 C:\Windows\system32\ntshrui.dll
0x71e30000 - 0x71e49000 C:\Windows\system32\srvcli.dll
0x704c0000 - 0x704cb000 C:\Windows\system32\cscapi.dll
0x6d1c0000 - 0x6d1ca000 C:\Windows\system32\slc.dll
0x685f0000 - 0x685f9000 C:\Program Files (x86)\Java\jre7\bin\sunmscapi.dll
0x74f80000 - 0x7509e000 C:\Windows\syswow64\CRYPT32.dll
0x75600000 - 0x7560c000 C:\Windows\syswow64\MSASN1.dll
0x4af80000 - 0x4afeb000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\lwjgl.dll
0x6d8e0000 - 0x6d9a8000 C:\Windows\system32\OPENGL32.dll
0x716c0000 - 0x716e2000 C:\Windows\system32\GLU32.dll
0x6a650000 - 0x6a737000 C:\Windows\system32\DDRAW.dll
0x716b0000 - 0x716b6000 C:\Windows\system32\DCIMAN32.dll
0x743b0000 - 0x743b9000 C:\Windows\system32\VERSION.dll
0x685e0000 - 0x685e6000 C:\Program Files (x86)\Java\jre7\bin\jawt.dll
0x4dd80000 - 0x4e352000 C:\Windows\system32\ig4icd32.dll
0x4e500000 - 0x4e8be000 C:\Windows\system32\ig4dev32.dll
0x4b280000 - 0x4b293000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\jinput-dx8.dll
0x71680000 - 0x716b0000 C:\Windows\system32\DINPUT8.dll
0x6ee20000 - 0x6ee29000 C:\Windows\system32\HID.DLL
0x763b0000 - 0x763dd000 C:\Windows\syswow64\WINTRUST.dll
0x4b4c0000 - 0x4b4d2000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\jinput-raw.dll
0x63e80000 - 0x63fa9000 C:\Users\anthony\AppData\Roaming\.minecraft\bin\natives\OpenAL32.dll
0x6d390000 - 0x6d402000 C:\Windows\system32\dsound.dll
0x6eed0000 - 0x6eef5000 C:\Windows\system32\POWRPROF.dll
0x70890000 - 0x708c9000 C:\Windows\System32\MMDevApi.dll
0x6e610000 - 0x6e640000 C:\Windows\system32\wdmaud.drv
0x6e8a0000 - 0x6e8a4000 C:\Windows\system32\ksuser.dll
0x72b70000 - 0x72b77000 C:\Windows\system32\AVRT.dll
0x70750000 - 0x70786000 C:\Windows\system32\AUDIOSES.DLL
0x6e5e0000 - 0x6e5e8000 C:\Windows\system32\msacm32.drv
0x4c260000 - 0x4c274000 C:\Windows\system32\MSACM32.dll
0x6e450000 - 0x6e457000 C:\Windows\system32\midimap.dll
0x703d0000 - 0x704bb000 C:\Windows\system32\dbghelp.dll
VM Arguments:
jvm_args: -Xms512m -Xmx1024m
java_command: C:\Users\anthony\Desktop\Minecraft.exe
Launcher Type: SUN_STANDARD
Environment Variables:
PATH=C:\Program Files\Common Files\Microsoft Shared\Windows Live;C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\Windows Live\Shared;C:\Program Files (x86)\Java\jre7\bin
USERNAME=anthony
OS=Windows_NT
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 23 Stepping 10, GenuineIntel
--------------- S Y S T E M ---------------
OS: Windows 7 , 64 bit Build 7600
CPU:total 2 (2 cores per cpu, 1 threads per core) family 6 model 23 stepping 10, cmov, cx8, fxsr, mmx, sse, sse2, sse3, ssse3, tsc
Memory: 4k page, physical 3109976k(1146040k free), swap 6218052k(3204496k free)
vm_info: Java HotSpot(TM) Client VM (23.1-b03) for windows-x86 JRE (1.7.0_05-b05), built on May 15 2012 18:11:27 by "java_re" with unknown MS VC++:1600
time: Fri Jul 06 18:28:23 2012
elapsed time: 47 seconds
Quelqu'un sais le pourquoi du comment?
A voir également:
- Minecraft ce coupe et pc plante
- Reinitialiser pc - Guide
- Test performance pc - Guide
- Pc lent - Guide
- Downloader for pc - Télécharger - Téléchargement & Transfert
- Minecraft gratuit pc - Télécharger - Stratégie
14 réponses
Bonjour,
Utilise WhoCrashed et poste le diagnostic ici.
https://forum.malekal.com/viewtopic.php?t=16793&start=
Utilise WhoCrashed et poste le diagnostic ici.
https://forum.malekal.com/viewtopic.php?t=16793&start=
up
Personne ne sais???
Car c'est un peu lourd la, d'ailleurs plusieurs autres jeux plantent, comme league of legend et S4 league
Personne ne sais???
Car c'est un peu lourd la, d'ailleurs plusieurs autres jeux plantent, comme league of legend et S4 league
Merci, voila la liste :s
On Sat 07/07/2012 18:21:12 GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: win32k.sys (win32k+0xCCC45)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF9600012CC45, 0xFFFFF88008959F00, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\win32k.sys
product: Système d'exploitation Microsoft® Windows®
company: Microsoft Corporation
description: Pilote Win32 multi-utilisateurs
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
On Fri 06/07/2012 15:11:22 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070612-18376-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x50 (0xFFFFF100112F1758, 0x1, 0xFFFFF80002CB917E, 0x7)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Thu 05/07/2012 18:36:33 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070512-51246-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xC5 (0xFFFFFA8002BBC018, 0x2, 0x1, 0xFFFFF80002DF190D)
Error: DRIVER_CORRUPTED_EXPOOL
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that the system attempted to access invalid memory at a process IRQL that was too high.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Thu 05/07/2012 08:13:41 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070512-61230-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xBE (0xFFFFF680003FFF00, 0x50D000003E86B025, 0xFFFFF88003324760, 0xB)
Error: ATTEMPTED_WRITE_TO_READONLY_MEMORY
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This is issued if a driver attempts to write to a read-only memory segment.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Wed 04/07/2012 15:39:04 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070412-28844-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF80002CDA638, 0xFFFFF8800753ACD0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Wed 04/07/2012 08:39:22 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070412-26036-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xC5 (0x8, 0x2, 0x0, 0xFFFFF80002DB70BF)
Error: DRIVER_CORRUPTED_EXPOOL
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that the system attempted to access invalid memory at a process IRQL that was too high.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Wed 04/07/2012 08:34:31 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070412-33446-01.dmp
This was probably caused by the following module: afd.sys (afd+0x2580)
Bugcheck code: 0xD1 (0x5708245F, 0x2, 0x1, 0xFFFFF88003EEB580)
Error: DRIVER_IRQL_NOT_LESS_OR_EQUAL
file path: C:\Windows\system32\drivers\afd.sys
product: Système d'exploitation Microsoft® Windows®
company: Microsoft Corporation
description: Ancillary Function Driver for WinSock
Bug check description: This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
On Sun 01/07/2012 14:02:25 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070112-29998-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x19 (0x20, 0xFFFFF8A00F979680, 0xFFFFF8A00F979720, 0x50A0203)
Error: BAD_POOL_HEADER
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a pool header is corrupt.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Thu 28/06/2012 10:59:08 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062812-27534-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x4A (0x7756F72A, 0x2, 0x0, 0xFFFFF88006B1AC60)
Error: IRQL_GT_ZERO_AT_SYSTEM_SERVICE
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a thread is returning to user mode from a system call when its IRQL is still above PASSIVE_LEVEL.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Sun 24/06/2012 11:31:12 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062412-18454-01.dmp
This was probably caused by the following module: dxgkrnl.sys (dxgkrnl+0x220D)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF8800480220D, 0xFFFFF8800792D130, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\drivers\dxgkrnl.sys
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: DirectX Graphics Kernel
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
On Sun 24/06/2012 11:01:49 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062412-29343-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x50 (0x240000, 0x0, 0xFFFFF88000CFBE63, 0x8)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Sun 24/06/2012 10:59:45 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062412-30841-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xBE (0xFFFFFA800B040028, 0x29000000A6912121, 0xFFFFF88007C36060, 0xB)
Error: ATTEMPTED_WRITE_TO_READONLY_MEMORY
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This is issued if a driver attempts to write to a read-only memory segment.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
The following dump files were found but could not be read. These files may be corrupt:
C:\Windows\Minidump\070712-23930-01.dmp
Apparament : C:\Windows\Minidump\062412-29343-01.dmp
Ce serais souvent ce fichier qui bug, après comment régler le soucis :s
On Sat 07/07/2012 18:21:12 GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: win32k.sys (win32k+0xCCC45)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF9600012CC45, 0xFFFFF88008959F00, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\win32k.sys
product: Système d'exploitation Microsoft® Windows®
company: Microsoft Corporation
description: Pilote Win32 multi-utilisateurs
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
On Fri 06/07/2012 15:11:22 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070612-18376-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x50 (0xFFFFF100112F1758, 0x1, 0xFFFFF80002CB917E, 0x7)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Thu 05/07/2012 18:36:33 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070512-51246-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xC5 (0xFFFFFA8002BBC018, 0x2, 0x1, 0xFFFFF80002DF190D)
Error: DRIVER_CORRUPTED_EXPOOL
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that the system attempted to access invalid memory at a process IRQL that was too high.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Thu 05/07/2012 08:13:41 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070512-61230-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xBE (0xFFFFF680003FFF00, 0x50D000003E86B025, 0xFFFFF88003324760, 0xB)
Error: ATTEMPTED_WRITE_TO_READONLY_MEMORY
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This is issued if a driver attempts to write to a read-only memory segment.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Wed 04/07/2012 15:39:04 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070412-28844-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF80002CDA638, 0xFFFFF8800753ACD0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Wed 04/07/2012 08:39:22 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070412-26036-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xC5 (0x8, 0x2, 0x0, 0xFFFFF80002DB70BF)
Error: DRIVER_CORRUPTED_EXPOOL
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that the system attempted to access invalid memory at a process IRQL that was too high.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Wed 04/07/2012 08:34:31 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070412-33446-01.dmp
This was probably caused by the following module: afd.sys (afd+0x2580)
Bugcheck code: 0xD1 (0x5708245F, 0x2, 0x1, 0xFFFFF88003EEB580)
Error: DRIVER_IRQL_NOT_LESS_OR_EQUAL
file path: C:\Windows\system32\drivers\afd.sys
product: Système d'exploitation Microsoft® Windows®
company: Microsoft Corporation
description: Ancillary Function Driver for WinSock
Bug check description: This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
On Sun 01/07/2012 14:02:25 GMT your computer crashed
crash dump file: C:\Windows\Minidump\070112-29998-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x19 (0x20, 0xFFFFF8A00F979680, 0xFFFFF8A00F979720, 0x50A0203)
Error: BAD_POOL_HEADER
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a pool header is corrupt.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Thu 28/06/2012 10:59:08 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062812-27534-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x4A (0x7756F72A, 0x2, 0x0, 0xFFFFF88006B1AC60)
Error: IRQL_GT_ZERO_AT_SYSTEM_SERVICE
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a thread is returning to user mode from a system call when its IRQL is still above PASSIVE_LEVEL.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Sun 24/06/2012 11:31:12 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062412-18454-01.dmp
This was probably caused by the following module: dxgkrnl.sys (dxgkrnl+0x220D)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF8800480220D, 0xFFFFF8800792D130, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\drivers\dxgkrnl.sys
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: DirectX Graphics Kernel
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
On Sun 24/06/2012 11:01:49 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062412-29343-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0x50 (0x240000, 0x0, 0xFFFFF88000CFBE63, 0x8)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
On Sun 24/06/2012 10:59:45 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062412-30841-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70040)
Bugcheck code: 0xBE (0xFFFFFA800B040028, 0x29000000A6912121, 0xFFFFF88007C36060, 0xB)
Error: ATTEMPTED_WRITE_TO_READONLY_MEMORY
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This is issued if a driver attempts to write to a read-only memory segment.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
The following dump files were found but could not be read. These files may be corrupt:
C:\Windows\Minidump\070712-23930-01.dmp
Apparament : C:\Windows\Minidump\062412-29343-01.dmp
Ce serais souvent ce fichier qui bug, après comment régler le soucis :s
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Est-ce que Windows est à jour (Windows Update) ?
Est-ce que tu as mis le pilote de ta carte graphique à jour ?
As-tu essayé de jouer en désactivant temporairement l'antivirus ?
Est-ce que tu as mis le pilote de ta carte graphique à jour ?
As-tu essayé de jouer en désactivant temporairement l'antivirus ?
La carte graphique oui elle est à jour, je l'ai fait après les premiers plantage.
Et j'ai 2 mises à jours importantes mais elles ne ce font pas, ça bug :s
Et j'ai 2 mises à jours importantes mais elles ne ce font pas, ça bug :s
J'ai tout installer et mis à jour
Apparemment cela ne plante plus, pour le moment en tout cas.
Merci pour ton aide
Apparemment cela ne plante plus, pour le moment en tout cas.
Merci pour ton aide