Hallo Forum 
Dies ist mein Erster Beitrag, aber ich hoffe Ihr könnt mir trotzdem helfen... Ich habe schon seit mehreren Wochen ein Problem, dass ich ab und zu einen Bluescreen erhalte. Dies kann pro Tag 2-3 auftauchen, aber auch mehr. Daher habe ich eine Debugging Analyse gemacht, welche sich weiter unten befindet und habe das Problem gegooglet, was mir aber auch leider keine Hilfe zu dem Problem gab
Könnt ihr mir helfen?
Edit: Manchmal bekomme ich auch andere Arten von Bluscreens, die sich auf die Selbe .exe beziehen, aber anders beschrieben sind, diese befinden sich auch unten
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1a, d, 0, fffff800035fd4ca}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000001a, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800035fd4ca, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b1100
GetUlongFromAddress: unable to read from fffff800032b11c0
000000000000001a Nonpaged pool
CURRENT_IRQL: d
FAULTING_IP:
hal!HalpSendFlatIpi+5b
fffff800`035fd4ca 0fb60c08 movzx ecx,byte ptr [rax+rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TAG_NOT_DEFINED_c000000f: FFFFF80000BA2FB0
TRAP_FRAME: 0000000000000001 -- (.trap 0x1)
Unable to read trap frame at 00000000`00000001
EXCEPTION_RECORD: fffff800031f4e80 -- (.exr 0xfffff800031f4e80)
Cannot read Exception record @ fffff800031f4e80
LAST_CONTROL_TRANSFER: from fffff800030791a9 to fffff80003079c00
STACK_TEXT:
fffff800`00b9c788 fffff800`030791a9 : 00000000`0000000a 00000000`0000001a 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c790 fffff800`03077e20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000a : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8d0 fffff800`035fd4ca : 00000000`00000003 fffff800`030a4a90 00000000`00000000 fffff800`00b9cb90 : nt!KiPageFault+0x260
fffff800`00b9ca60 fffff800`035fd57e : fffff780`00000320 00000000`000008d1 00000000`00000000 fffff800`03202cc0 : hal!HalpSendFlatIpi+0x5b
fffff800`00b9ca90 fffff800`030835ea : 00000000`00000000 fffff800`031f4e80 00000000`00000000 fffff800`03060cbb : hal!HalpRequestIpiSpecifyVector+0x6d
fffff800`00b9cac0 fffff800`035f4895 : fffff800`0361a460 fffff800`00b9cc70 fffff800`0361a460 fffffa80`00000000 : nt!KeUpdateSystemTime+0x27a
fffff800`00b9cbc0 fffff800`03076153 : fffff880`018eeb25 fffff800`035155b3 fffff980`0b538f00 00000000`00000000 : hal!HalpHpetClockInterrupt+0x8d
fffff800`00b9cbf0 fffff800`030718e2 : fffff800`031f4e80 fffff800`00000001 00000000`00000001 fffff880`00000000 : nt!KiInterruptDispatchNoLock+0x163
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`03077e20 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80003093ef6}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80003093ef6
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: League of Lege
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800030871a9 to fffff80003087c00
STACK_TEXT:
fffff800`00ba4d28 fffff800`030871a9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`03085672 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`03093ef6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`080d5f10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xd6
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`03085672 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6
FAILURE_BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------

Dies ist mein Erster Beitrag, aber ich hoffe Ihr könnt mir trotzdem helfen... Ich habe schon seit mehreren Wochen ein Problem, dass ich ab und zu einen Bluescreen erhalte. Dies kann pro Tag 2-3 auftauchen, aber auch mehr. Daher habe ich eine Debugging Analyse gemacht, welche sich weiter unten befindet und habe das Problem gegooglet, was mir aber auch leider keine Hilfe zu dem Problem gab

Edit: Manchmal bekomme ich auch andere Arten von Bluscreens, die sich auf die Selbe .exe beziehen, aber anders beschrieben sind, diese befinden sich auch unten

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1a, d, 0, fffff800035fd4ca}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000001a, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800035fd4ca, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b1100
GetUlongFromAddress: unable to read from fffff800032b11c0
000000000000001a Nonpaged pool
CURRENT_IRQL: d
FAULTING_IP:
hal!HalpSendFlatIpi+5b
fffff800`035fd4ca 0fb60c08 movzx ecx,byte ptr [rax+rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TAG_NOT_DEFINED_c000000f: FFFFF80000BA2FB0
TRAP_FRAME: 0000000000000001 -- (.trap 0x1)
Unable to read trap frame at 00000000`00000001
EXCEPTION_RECORD: fffff800031f4e80 -- (.exr 0xfffff800031f4e80)
Cannot read Exception record @ fffff800031f4e80
LAST_CONTROL_TRANSFER: from fffff800030791a9 to fffff80003079c00
STACK_TEXT:
fffff800`00b9c788 fffff800`030791a9 : 00000000`0000000a 00000000`0000001a 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c790 fffff800`03077e20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000a : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8d0 fffff800`035fd4ca : 00000000`00000003 fffff800`030a4a90 00000000`00000000 fffff800`00b9cb90 : nt!KiPageFault+0x260
fffff800`00b9ca60 fffff800`035fd57e : fffff780`00000320 00000000`000008d1 00000000`00000000 fffff800`03202cc0 : hal!HalpSendFlatIpi+0x5b
fffff800`00b9ca90 fffff800`030835ea : 00000000`00000000 fffff800`031f4e80 00000000`00000000 fffff800`03060cbb : hal!HalpRequestIpiSpecifyVector+0x6d
fffff800`00b9cac0 fffff800`035f4895 : fffff800`0361a460 fffff800`00b9cc70 fffff800`0361a460 fffffa80`00000000 : nt!KeUpdateSystemTime+0x27a
fffff800`00b9cbc0 fffff800`03076153 : fffff880`018eeb25 fffff800`035155b3 fffff980`0b538f00 00000000`00000000 : hal!HalpHpetClockInterrupt+0x8d
fffff800`00b9cbf0 fffff800`030718e2 : fffff800`031f4e80 fffff800`00000001 00000000`00000001 fffff880`00000000 : nt!KiInterruptDispatchNoLock+0x163
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`03077e20 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80003093ef6}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80003093ef6
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: League of Lege
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800030871a9 to fffff80003087c00
STACK_TEXT:
fffff800`00ba4d28 fffff800`030871a9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`03085672 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`03093ef6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`080d5f10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xd6
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`03085672 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6
FAILURE_BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Zuletzt bearbeitet: