frooggy
Cadet 4th Year
- Registriert
- Apr. 2008
- Beiträge
- 67
Hallo zusammen
Ich habe sporadisch auftretende Bluescreens bei meinem Rechner. Diese treten meist beim Systemstart auf. Ich weiss leider nicht genau, wie ich die Memory Dump interpretieren soll und hoffe, es kann mir hier jemand helfen:
System:
CPU: Ryzen 7 3800X
RAM: Corsair 3200 Mhz 16GB
Board: ROG Strix B450-I Gaming
Graka: RTX 2060 Super
NT: Corsair SF600 Platinum
Windows 10 x64 20H2
Ich hab den Rechner bereits neu aufgesetzt was leider nichts genutzt hat. Ausserdem hab ich einen Durchlauf mit Memtest86+ gemacht. Keine Fehler.
Vielen Dank für eure Hilfe
Ich habe sporadisch auftretende Bluescreens bei meinem Rechner. Diese treten meist beim Systemstart auf. Ich weiss leider nicht genau, wie ich die Memory Dump interpretieren soll und hoffe, es kann mir hier jemand helfen:
System:
CPU: Ryzen 7 3800X
RAM: Corsair 3200 Mhz 16GB
Board: ROG Strix B450-I Gaming
Graka: RTX 2060 Super
NT: Corsair SF600 Platinum
Windows 10 x64 20H2
Ich hab den Rechner bereits neu aufgesetzt was leider nichts genutzt hat. Ausserdem hab ich einen Durchlauf mit Memtest86+ gemacht. Keine Fehler.
Vielen Dank für eure Hilfe
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\sandr\OneDrive\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\symbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\symbols*https://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`4c800000 PsLoadedModuleList = 0xfffff807`4d42a2b0
Debug session time: Sun Dec 27 11:48:46.408 2020 (UTC + 1:00)
System Uptime: 1 days 1:26:40.806
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
14: kd> !analyze -v
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8074ce1ab6c, The address that the exception occurred at
Arg3: ffffb70534147ed8, Exception Record Address
Arg4: ffffb70534147710, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1MVJMT6
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8074ce1ab6c
BUGCHECK_P3: ffffb70534147ed8
BUGCHECK_P4: ffffb70534147710
EXCEPTION_RECORD: ffffb70534147ed8 -- (.exr 0xffffb70534147ed8)
ExceptionAddress: fffff8074ce1ab6c (nt!CmpReportNotifyHelper+0x00000000000000fc)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffb70534147710 -- (.cxr 0xffffb70534147710)
rax=0000000001200000 rbx=ffffcf880e1b2e90 rcx=0000000000000001
rdx=ffff4f8809b4ad10 rsi=0000000000000004 rdi=ffffcf881809b870
rip=fffff8074ce1ab6c rsp=ffffb70534148110 rbp=0000000000000000
r8=ffffcf880aa32860 r9=0000000000000004 r10=7ffffffffffffffc
r11=ffffb70534148188 r12=ffffb70534148290 r13=ffffb70534148250
r14=ffffcf880509a688 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!CmpReportNotifyHelper+0xfc:
fffff807`4ce1ab6c 8b4a08 mov ecx,dword ptr [rdx+8] ds:002b:ffff4f88`09b4ad18=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Registry
READ_ADDRESS: ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb705`34148110 fffff807`4ce1aa21 : ffffcf88`1809b870 00000000`00000004 ffffb705`34148290 ffffcf88`00000000 : nt!CmpReportNotifyHelper+0xfc
ffffb705`34148190 fffff807`4ce19545 : 00000000`ffffffff ffffb705`341482d0 00000000`00000000 ffffcf88`1809b870 : nt!CmpReportNotifyForKcbStack+0x45
ffffb705`341481d0 fffff807`4ce18ea8 : ffffcf88`00000001 ffffb705`34148460 00000000`00000000 00000000`00000001 : nt!CmSetValueKey+0x3e5
ffffb705`34148370 fffff807`4cc071b8 : 00000000`00000000 00000000`00000000 fffff807`4caed580 fffff807`4cae8f00 : nt!NtSetValueKey+0x648
ffffb705`34148550 fffff807`4cbf95e0 : fffff807`57118812 ffffb705`00000000 fffff807`00000002 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
ffffb705`34148758 fffff807`57118812 : ffffb705`00000000 fffff807`00000002 00000000`00000001 ffffffff`80002e38 : nt!KiServiceLinkage
ffffb705`34148760 fffff807`57119ac9 : ffffcf88`16045c20 fffff807`00000000 00000000`00000000 00000003`00000000 : bam!BamUserSettingsAddOrUpdate+0x28e
ffffb705`341488d0 fffff807`57118f8f : 00000000`00000000 ffffcf88`16045c00 fffff807`571154b8 00000000`00000000 : bam!BampCommitThrottledProcessStateChange+0x9e9
ffffb705`34148bd0 fffff807`4cb17e25 : ffffba82`2dc22580 ffffffff`ffae10b3 00000000`00000080 fffff807`57118df0 : bam!BampThrottlingWorker+0x19f
ffffb705`34148c10 fffff807`4cbfcdd8 : ffff8180`24d40180 ffffba82`2dc22580 fffff807`4cb17dd0 ffffcf88`057f758a : nt!PspSystemThreadStartup+0x55
ffffb705`34148c60 00000000`00000000 : ffffb705`34149000 ffffb705`34143000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: bam!BamUserSettingsAddOrUpdate+28e
MODULE_NAME: bam
IMAGE_NAME: bam.sys
STACK_COMMAND: .cxr 0xffffb70534147710 ; kb
BUCKET_ID_FUNC_OFFSET: 28e
FAILURE_BUCKET_ID: AV_bam!BamUserSettingsAddOrUpdate
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f84c22d6-9358-f5ab-5090-1c6d5bd500bb}
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\sandr\OneDrive\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\symbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\symbols*https://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`4c800000 PsLoadedModuleList = 0xfffff807`4d42a2b0
Debug session time: Sun Dec 27 11:48:46.408 2020 (UTC + 1:00)
System Uptime: 1 days 1:26:40.806
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
14: kd> !analyze -v
*******************************************************************************
- *
- Bugcheck Analysis *
- *
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8074ce1ab6c, The address that the exception occurred at
Arg3: ffffb70534147ed8, Exception Record Address
Arg4: ffffb70534147710, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1MVJMT6
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8074ce1ab6c
BUGCHECK_P3: ffffb70534147ed8
BUGCHECK_P4: ffffb70534147710
EXCEPTION_RECORD: ffffb70534147ed8 -- (.exr 0xffffb70534147ed8)
ExceptionAddress: fffff8074ce1ab6c (nt!CmpReportNotifyHelper+0x00000000000000fc)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffb70534147710 -- (.cxr 0xffffb70534147710)
rax=0000000001200000 rbx=ffffcf880e1b2e90 rcx=0000000000000001
rdx=ffff4f8809b4ad10 rsi=0000000000000004 rdi=ffffcf881809b870
rip=fffff8074ce1ab6c rsp=ffffb70534148110 rbp=0000000000000000
r8=ffffcf880aa32860 r9=0000000000000004 r10=7ffffffffffffffc
r11=ffffb70534148188 r12=ffffb70534148290 r13=ffffb70534148250
r14=ffffcf880509a688 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!CmpReportNotifyHelper+0xfc:
fffff807`4ce1ab6c 8b4a08 mov ecx,dword ptr [rdx+8] ds:002b:ffff4f88`09b4ad18=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Registry
READ_ADDRESS: ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb705`34148110 fffff807`4ce1aa21 : ffffcf88`1809b870 00000000`00000004 ffffb705`34148290 ffffcf88`00000000 : nt!CmpReportNotifyHelper+0xfc
ffffb705`34148190 fffff807`4ce19545 : 00000000`ffffffff ffffb705`341482d0 00000000`00000000 ffffcf88`1809b870 : nt!CmpReportNotifyForKcbStack+0x45
ffffb705`341481d0 fffff807`4ce18ea8 : ffffcf88`00000001 ffffb705`34148460 00000000`00000000 00000000`00000001 : nt!CmSetValueKey+0x3e5
ffffb705`34148370 fffff807`4cc071b8 : 00000000`00000000 00000000`00000000 fffff807`4caed580 fffff807`4cae8f00 : nt!NtSetValueKey+0x648
ffffb705`34148550 fffff807`4cbf95e0 : fffff807`57118812 ffffb705`00000000 fffff807`00000002 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
ffffb705`34148758 fffff807`57118812 : ffffb705`00000000 fffff807`00000002 00000000`00000001 ffffffff`80002e38 : nt!KiServiceLinkage
ffffb705`34148760 fffff807`57119ac9 : ffffcf88`16045c20 fffff807`00000000 00000000`00000000 00000003`00000000 : bam!BamUserSettingsAddOrUpdate+0x28e
ffffb705`341488d0 fffff807`57118f8f : 00000000`00000000 ffffcf88`16045c00 fffff807`571154b8 00000000`00000000 : bam!BampCommitThrottledProcessStateChange+0x9e9
ffffb705`34148bd0 fffff807`4cb17e25 : ffffba82`2dc22580 ffffffff`ffae10b3 00000000`00000080 fffff807`57118df0 : bam!BampThrottlingWorker+0x19f
ffffb705`34148c10 fffff807`4cbfcdd8 : ffff8180`24d40180 ffffba82`2dc22580 fffff807`4cb17dd0 ffffcf88`057f758a : nt!PspSystemThreadStartup+0x55
ffffb705`34148c60 00000000`00000000 : ffffb705`34149000 ffffb705`34143000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: bam!BamUserSettingsAddOrUpdate+28e
MODULE_NAME: bam
IMAGE_NAME: bam.sys
STACK_COMMAND: .cxr 0xffffb70534147710 ; kb
BUCKET_ID_FUNC_OFFSET: 28e
FAILURE_BUCKET_ID: AV_bam!BamUserSettingsAddOrUpdate
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f84c22d6-9358-f5ab-5090-1c6d5bd500bb}
Followup: MachineOwner
---------
Zuletzt bearbeitet: