final123
Enthusiast
Thread Starter
- Mitglied seit
- 15.01.2011
- Beiträge
- 184
- Details zu meinem Desktop
- Prozessor
- i5-12400F
- Mainboard
- Gigabyte Aorus Pro Z690
- Kühler
- Be Quiet Dark Rock 4
- Speicher
- 32GB Corsair Vengeance DDR5
- Grafikprozessor
- RTX 3070 Aorus Master
- Display
- 2x Dell S2721DGFA
- SSD
- 1TB WD Black SN850
- Gehäuse
- Fractal Design Define 7 Compact
- Netzteil
- Corsair AX 760
Hallo,
habe seit gestern Bluescreens bekommen. Vorhin den dritten.
Der erste kam während des Betriebes, der zweite kam beim hochfahren und der dritte wieder während des Betriebes. Mitlerweile vermute ich, dass es am RAM liegt. Einen MemTest habe ich schon laufen lassen. Dieser ergab 0 Fehler.
MemTest86 funktioniert nicht. Er bootet von der CD, dann aber passiert nichts.
Die Dumpfiles habe ich bereits debugged aber mir helfen sie nicht großartig weiter, da mir das wissen dafür fehlt. Vielleicht könnt ihr mir helfen. Habe den Rechner die Tage erst aufgerüstet mit einem Gigabyte ga-z68x-ud3p-b3, einem Intel Core i5 2500k und Corsair Vengeance 8GB 1866Mhz (dieser läuft aber momentan nur auf 1300mhz). Dementsprechend kann ich das 14 tägige Rückgaberecht noch nutzen, falls etwas defekt ist. Ich poste euch mal die Dumpfiles. (In der richtigen Reihenfolge: 1. Gestern [während des Betriebes], 2. Heute [Beim booten], 3. Heute [Während des Betriebes])
NUMMER 1
NUMMER 2
NUMMER 3
Danke schonmal im voraus. Vielleicht hat ja jemand eine Idee.
Final
---------- Beitrag hinzugefügt um 19:49 ---------- Vorheriger Beitrag war um 18:42 ----------
Mitlerweile 3 verschiedene Tests durchgeführt:
MemTest
memtest (Memory Diagnostic) (memTest Application Stadard)
Windows Speicherdiagnose
Alle ergeben 0 Fehler....
habe seit gestern Bluescreens bekommen. Vorhin den dritten.
Der erste kam während des Betriebes, der zweite kam beim hochfahren und der dritte wieder während des Betriebes. Mitlerweile vermute ich, dass es am RAM liegt. Einen MemTest habe ich schon laufen lassen. Dieser ergab 0 Fehler.
MemTest86 funktioniert nicht. Er bootet von der CD, dann aber passiert nichts.
Die Dumpfiles habe ich bereits debugged aber mir helfen sie nicht großartig weiter, da mir das wissen dafür fehlt. Vielleicht könnt ihr mir helfen. Habe den Rechner die Tage erst aufgerüstet mit einem Gigabyte ga-z68x-ud3p-b3, einem Intel Core i5 2500k und Corsair Vengeance 8GB 1866Mhz (dieser läuft aber momentan nur auf 1300mhz). Dementsprechend kann ich das 14 tägige Rückgaberecht noch nutzen, falls etwas defekt ist. Ich poste euch mal die Dumpfiles. (In der richtigen Reihenfolge: 1. Gestern [während des Betriebes], 2. Heute [Beim booten], 3. Heute [Während des Betriebes])
NUMMER 1
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: fffff900c1d503e0, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from fffff8000327a1b0
POOL_ADDRESS: fffff900c1d503e0
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000320760e to fffff800030d45c0
STACK_TEXT:
fffff880`079b1fc8 fffff800`0320760e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00000000 : nt!KeBugCheckEx
fffff880`079b1fd0 fffff960`00154fec : fffff900`c380b010 00000000`00000000 00000017`00000000 fffff960`000afb5d : nt!ExDeferredFreePool+0x11eb
fffff880`079b2080 fffff960`0011bf38 : fffff880`079b21c8 fffff900`c0207620 fffff900`c0207620 00000000`00000001 : win32k!FreeObject+0x40
fffff880`079b20b0 fffff960`00117263 : fffff900`c1a64900 00000000`00000001 00000000`00000da8 fffff900`c0207620 : win32k!RGNOBJ::vDeleteRGNOBJ+0x24
fffff880`079b20e0 fffff960`00116a37 : 00000000`00000001 fffff880`079b2280 fffff900`c1a64900 fffff880`079b22a0 : win32k!DC::bCompute+0x153
fffff880`079b2220 fffff960`00103031 : fffff900`c0131010 fffff880`079b23bc 00000000`00000001 00000000`00000001 : win32k!DEVLOCKOBJ::bLock+0x2e7
fffff880`079b2260 fffff960`000d57ab : fffff900`c06262a0 fffff880`079b24a0 00000000`00000001 ffffffff`840410ce : win32k!GreGetClipBox+0x6d
fffff880`079b22f0 fffff960`0016d414 : 00000000`00000000 fffff880`079b24a0 00000000`00000000 00000000`028af200 : win32k!xxxBeginPaint+0x1af
fffff880`079b2350 fffff800`030d3813 : fffffa80`0cdc8b60 fffff800`033d46a4 fffffa80`0cdc8b60 fffff800`033d3f90 : win32k!NtUserBeginPaint+0x8c
fffff880`079b2420 00000000`7768b3aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`028aed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7768b3aa
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!FreeObject+40
fffff960`00154fec eb16 jmp win32k!FreeObject+0x58 (fffff960`00155004)
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!FreeObject+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4df2d94e
FAILURE_BUCKET_ID: X64_0xc2_7_win32k!FreeObject+40
BUCKET_ID: X64_0xc2_7_win32k!FreeObject+40
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: fffff900c1d503e0, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from fffff8000327a1b0
POOL_ADDRESS: fffff900c1d503e0
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000320760e to fffff800030d45c0
STACK_TEXT:
fffff880`079b1fc8 fffff800`0320760e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00000000 : nt!KeBugCheckEx
fffff880`079b1fd0 fffff960`00154fec : fffff900`c380b010 00000000`00000000 00000017`00000000 fffff960`000afb5d : nt!ExDeferredFreePool+0x11eb
fffff880`079b2080 fffff960`0011bf38 : fffff880`079b21c8 fffff900`c0207620 fffff900`c0207620 00000000`00000001 : win32k!FreeObject+0x40
fffff880`079b20b0 fffff960`00117263 : fffff900`c1a64900 00000000`00000001 00000000`00000da8 fffff900`c0207620 : win32k!RGNOBJ::vDeleteRGNOBJ+0x24
fffff880`079b20e0 fffff960`00116a37 : 00000000`00000001 fffff880`079b2280 fffff900`c1a64900 fffff880`079b22a0 : win32k!DC::bCompute+0x153
fffff880`079b2220 fffff960`00103031 : fffff900`c0131010 fffff880`079b23bc 00000000`00000001 00000000`00000001 : win32k!DEVLOCKOBJ::bLock+0x2e7
fffff880`079b2260 fffff960`000d57ab : fffff900`c06262a0 fffff880`079b24a0 00000000`00000001 ffffffff`840410ce : win32k!GreGetClipBox+0x6d
fffff880`079b22f0 fffff960`0016d414 : 00000000`00000000 fffff880`079b24a0 00000000`00000000 00000000`028af200 : win32k!xxxBeginPaint+0x1af
fffff880`079b2350 fffff800`030d3813 : fffffa80`0cdc8b60 fffff800`033d46a4 fffffa80`0cdc8b60 fffff800`033d3f90 : win32k!NtUserBeginPaint+0x8c
fffff880`079b2420 00000000`7768b3aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`028aed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7768b3aa
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!FreeObject+40
fffff960`00154fec eb16 jmp win32k!FreeObject+0x58 (fffff960`00155004)
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!FreeObject+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4df2d94e
FAILURE_BUCKET_ID: X64_0xc2_7_win32k!FreeObject+40
BUCKET_ID: X64_0xc2_7_win32k!FreeObject+40
Followup: MachineOwner
---------
NUMMER 2
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa800b7af02f, Address of the instruction which caused the bugcheck
Arg3: fffff88004ac0e90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
+0
fffffa80`0b7af02f ff03 inc dword ptr [rbx]
CONTEXT: fffff88004ac0e90 -- (.cxr 0xfffff88004ac0e90)
rax=fffffa800b7af020 rbx=01cc67e82381fb96 rcx=fffffa800b7af020
rdx=0000000080000020 rsi=0000000000000006 rdi=fffff8a001a11948
rip=fffffa800b7af02f rsp=fffff88004ac1868 rbp=fffff88004ac1c60
r8=0000000000000006 r9=0000000001638380 r10=0000000000000065
r11=fffff8000336bd5a r12=0000000000000000 r13=fffff88004ac1a98
r14=0000000001638380 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010217
fffffa80`0b7af02f ff03 inc dword ptr [rbx] ds:002b:01cc67e8`2381fb96=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffffa800b7af02f
STACK_TEXT:
fffff880`04ac05c8 fffff800`03079b29 : 00000000`0000003b 00000000`c0000005 fffffa80`0b7af02f fffff880`04ac0e90 : nt!KeBugCheckEx
fffff880`04ac05d0 fffff800`0307947c : fffff880`04ac1628 fffff880`04ac0e90 00000000`00000000 fffff800`030a8b50 : nt!KiBugCheckDispatch+0x69
fffff880`04ac0710 fffff800`030a02dd : fffff800`03299784 00000000`00000000 fffff800`0300a000 fffff880`04ac1628 : nt!KiSystemServiceHandler+0x7c
fffff880`04ac0750 fffff800`030a7950 : fffff800`031ca198 fffff880`04ac07c8 fffff880`04ac1628 fffff800`0300a000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`04ac0780 fffff800`030b48cf : fffff880`04ac1628 fffff880`04ac0e90 fffff880`00000000 fffff8a0`00000004 : nt!RtlDispatchException+0x410
fffff880`04ac0e60 fffff800`03079c02 : fffff880`04ac1628 01cc67e8`2381fb96 fffff880`04ac16d0 00000000`00000006 : nt!KiDispatchException+0x16f
fffff880`04ac14f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`0307947c b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa800b7af02f, Address of the instruction which caused the bugcheck
Arg3: fffff88004ac0e90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
+0
fffffa80`0b7af02f ff03 inc dword ptr [rbx]
CONTEXT: fffff88004ac0e90 -- (.cxr 0xfffff88004ac0e90)
rax=fffffa800b7af020 rbx=01cc67e82381fb96 rcx=fffffa800b7af020
rdx=0000000080000020 rsi=0000000000000006 rdi=fffff8a001a11948
rip=fffffa800b7af02f rsp=fffff88004ac1868 rbp=fffff88004ac1c60
r8=0000000000000006 r9=0000000001638380 r10=0000000000000065
r11=fffff8000336bd5a r12=0000000000000000 r13=fffff88004ac1a98
r14=0000000001638380 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010217
fffffa80`0b7af02f ff03 inc dword ptr [rbx] ds:002b:01cc67e8`2381fb96=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffffa800b7af02f
STACK_TEXT:
fffff880`04ac05c8 fffff800`03079b29 : 00000000`0000003b 00000000`c0000005 fffffa80`0b7af02f fffff880`04ac0e90 : nt!KeBugCheckEx
fffff880`04ac05d0 fffff800`0307947c : fffff880`04ac1628 fffff880`04ac0e90 00000000`00000000 fffff800`030a8b50 : nt!KiBugCheckDispatch+0x69
fffff880`04ac0710 fffff800`030a02dd : fffff800`03299784 00000000`00000000 fffff800`0300a000 fffff880`04ac1628 : nt!KiSystemServiceHandler+0x7c
fffff880`04ac0750 fffff800`030a7950 : fffff800`031ca198 fffff880`04ac07c8 fffff880`04ac1628 fffff800`0300a000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`04ac0780 fffff800`030b48cf : fffff880`04ac1628 fffff880`04ac0e90 fffff880`00000000 fffff8a0`00000004 : nt!RtlDispatchException+0x410
fffff880`04ac0e60 fffff800`03079c02 : fffff880`04ac1628 01cc67e8`2381fb96 fffff880`04ac16d0 00000000`00000006 : nt!KiDispatchException+0x16f
fffff880`04ac14f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`0307947c b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
NUMMER 3
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffda800ef16138, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030e101d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330c0e0
ffffda800ef16138
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertTimerTable+18d
fffff800`030e101d 4c3b7df8 cmp r15,qword ptr [rbp-8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: firefox.exe
TRAP_FRAME: fffff8800b11b850 -- (.trap 0xfffff8800b11b850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000009858 rbx=0000000000000000 rcx=00000000a6a17b0c
rdx=fffffa800ef16140 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e101d rsp=fffff8800b11b9e0 rbp=ffffda800ef16140
r8=ffffffffffffffff r9=000000000000007c r10=fffff88003364180
r11=fffff88003364100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiInsertTimerTable+0x18d:
fffff800`030e101d 4c3b7df8 cmp r15,qword ptr [rbp-8] ss:0018:ffffda80`0ef16138=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d3b29 to fffff800030d45c0
STACK_TEXT:
fffff880`0b11b708 fffff800`030d3b29 : 00000000`0000000a ffffda80`0ef16138 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b11b710 fffff800`030d27a0 : fffffa80`06726b60 fffffa80`0caba9c0 00000980`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0b11b850 fffff800`030e101d : fffffa80`0cabe900 fffff800`032092dd fffffa80`0cabe910 fffffa80`0cabe930 : nt!KiPageFault+0x260
fffff880`0b11b9e0 fffff800`030db842 : fffffa80`0caba900 00000000`00000150 fffffa80`0cabea50 fffff880`00000002 : nt!KiInsertTimerTable+0x18d
fffff880`0b11ba40 fffff800`030ddb9f : 00000000`000008c0 fffffa80`09c3b240 fffffa80`0000007c fffff8a0`112812d0 : nt!KiCommitThreadWait+0x332
fffff880`0b11bad0 fffff800`033cbf02 : fffffa80`09c3b200 00000000`00000006 00000000`00000001 fffff800`033e7200 : nt!KeWaitForSingleObject+0x19f
fffff880`0b11bb70 fffff800`030d3813 : fffffa80`0caba900 00000000`000008c0 fffff880`0b11bbb8 fffffa80`0bd4f300 : nt!NtWaitForSingleObject+0xb2
fffff880`0b11bbe0 00000000`74fa2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0af2eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74fa2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInsertTimerTable+18d
fffff800`030e101d 4c3b7df8 cmp r15,qword ptr [rbp-8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiInsertTimerTable+18d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+18d
BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+18d
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffda800ef16138, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030e101d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330c0e0
ffffda800ef16138
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertTimerTable+18d
fffff800`030e101d 4c3b7df8 cmp r15,qword ptr [rbp-8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: firefox.exe
TRAP_FRAME: fffff8800b11b850 -- (.trap 0xfffff8800b11b850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000009858 rbx=0000000000000000 rcx=00000000a6a17b0c
rdx=fffffa800ef16140 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e101d rsp=fffff8800b11b9e0 rbp=ffffda800ef16140
r8=ffffffffffffffff r9=000000000000007c r10=fffff88003364180
r11=fffff88003364100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiInsertTimerTable+0x18d:
fffff800`030e101d 4c3b7df8 cmp r15,qword ptr [rbp-8] ss:0018:ffffda80`0ef16138=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d3b29 to fffff800030d45c0
STACK_TEXT:
fffff880`0b11b708 fffff800`030d3b29 : 00000000`0000000a ffffda80`0ef16138 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b11b710 fffff800`030d27a0 : fffffa80`06726b60 fffffa80`0caba9c0 00000980`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0b11b850 fffff800`030e101d : fffffa80`0cabe900 fffff800`032092dd fffffa80`0cabe910 fffffa80`0cabe930 : nt!KiPageFault+0x260
fffff880`0b11b9e0 fffff800`030db842 : fffffa80`0caba900 00000000`00000150 fffffa80`0cabea50 fffff880`00000002 : nt!KiInsertTimerTable+0x18d
fffff880`0b11ba40 fffff800`030ddb9f : 00000000`000008c0 fffffa80`09c3b240 fffffa80`0000007c fffff8a0`112812d0 : nt!KiCommitThreadWait+0x332
fffff880`0b11bad0 fffff800`033cbf02 : fffffa80`09c3b200 00000000`00000006 00000000`00000001 fffff800`033e7200 : nt!KeWaitForSingleObject+0x19f
fffff880`0b11bb70 fffff800`030d3813 : fffffa80`0caba900 00000000`000008c0 fffff880`0b11bbb8 fffffa80`0bd4f300 : nt!NtWaitForSingleObject+0xb2
fffff880`0b11bbe0 00000000`74fa2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0af2eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74fa2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInsertTimerTable+18d
fffff800`030e101d 4c3b7df8 cmp r15,qword ptr [rbp-8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiInsertTimerTable+18d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+18d
BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+18d
Followup: MachineOwner
---------
Danke schonmal im voraus. Vielleicht hat ja jemand eine Idee.
Final
---------- Beitrag hinzugefügt um 19:49 ---------- Vorheriger Beitrag war um 18:42 ----------
Mitlerweile 3 verschiedene Tests durchgeführt:
MemTest
memtest (Memory Diagnostic) (memTest Application Stadard)
Windows Speicherdiagnose
Alle ergeben 0 Fehler....
Zuletzt bearbeitet: