Hallo,
ich habe:
i5 9600k
16Gb Corsair Vengeance RGB Ram
1000GB Crucial SSD
RTX 2070S
ASRock Phantom Gaming 4 B365
Ich habe bereits Netzteil ausgetauscht und Festplatte ausgetauscht. Aktuell habe ich einen der Ram-Riegel rausgenommen um zu checken, ob es was damit zu tun hat. Sonst weiß ich echt nichtmehr weiter. Falls mir jemand helfen kann, wäre super nett.
sfc/scan hab ich bereits gemacht (manchmal findet er was und behebt das dann)
Memtest hab ich bereits gemacht (3Stunden, nichts gefunden)
OS mehrfach neu installiert
Treiber updates gemacht
BIOS update gemacht
Nach einem der letzten Fehler war das die Analyse, womit ich aber leider nicht viel selber anfangen kann:
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804370b743a, Address of the instruction which caused the bugcheck
Arg3: ffffa3038102e490, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0RLS0G1
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 7
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff804370b743a
BUGCHECK_P3: ffffa3038102e490
BUGCHECK_P4: 0
CONTEXT: ffffa3038102e490 -- (.cxr 0xffffa3038102e490)
rax=ffffa4829c50b000 rbx=00000000bdb2ed7f rcx=0000000000000852
rdx=ffffa4829c50f290 rsi=ffffa482a5fbf850 rdi=00000000754046c6
rip=fffff804370b743a rsp=ffffa3038102ee80 rbp=0000000000004000
r8=ffffa3038102ee88 r9=0000000000000001 r10=ffffa482a8e8c2fc
r11=ffffa3038102eeb0 r12=ffffa4829c48d000 r13=0000000000000000
r14=ffffa3038102f0f0 r15=ffffa3038102f110
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!CmpPerformCompleteKcbCacheLookup+0x15a:
fffff804`370b743a 395d00 cmp dword ptr [rbp],ebx ss:0018:00000000`00004000=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffa303`8102ee80 fffff804`370bb290 : ffffa482`a5fbf850 ffffa303`00000000 ffffa303`00000001 ffffa303`8102f0f0 : nt!CmpPerformCompleteKcbCacheLookup+0x15a
ffffa303`8102ef50 fffff804`370b8684 : ffffa303`0000001c ffffa303`8102f2a0 ffffa303`8102f268 00000000`00000000 : nt!CmpDoParseKey+0x670
ffffa303`8102f1f0 fffff804`370b656f : ffffc486`0c9dd6d0 ffffa482`a4115c01 00000000`00000000 ffff561e`1e74bf01 : nt!CmpParseKey+0x274
ffffa303`8102f410 fffff804`370b49d1 : ffffc486`0c9dd600 ffffa303`8102f658 ffffc486`00000040 ffffc485`fecf36c0 : nt!ObpLookupObjectName+0x78f
ffffa303`8102f5d0 fffff804`370bdeec : 00000000`00000001 00000000`00000000 00000000`00000000 ffffc485`fecf36c0 : nt!ObOpenObjectByNameEx+0x201
ffffa303`8102f710 fffff804`370bdd6d : 00000093`8b67cee0 ffffa303`8102fa80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffffa303`8102f760 fffff804`370bfd8f : 00000093`8b67d368 00000000`000000bc 00000000`00020119 00000000`00000000 : nt!CmOpenKey+0x29d
ffffa303`8102f9c0 fffff804`36bd3c15 : ffffc486`09e0e080 00000093`00000000 ffffa303`8102fa80 00000093`8b67def0 : nt!NtOpenKeyEx+0xf
ffffa303`8102fa00 00007ffe`e3f3e414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000093`8b67ce08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e3f3e414
SYMBOL_NAME: nt!CmpPerformCompleteKcbCacheLookup+15a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xffffa3038102e490 ; kb
BUCKET_ID_FUNC_OFFSET: 15a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CmpPerformCompleteKcbCacheLookup
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3df4caed-9f95-78dd-d2de-48862f739011}
Followup: MachineOwner
---------
ich habe:
i5 9600k
16Gb Corsair Vengeance RGB Ram
1000GB Crucial SSD
RTX 2070S
ASRock Phantom Gaming 4 B365
Ich habe bereits Netzteil ausgetauscht und Festplatte ausgetauscht. Aktuell habe ich einen der Ram-Riegel rausgenommen um zu checken, ob es was damit zu tun hat. Sonst weiß ich echt nichtmehr weiter. Falls mir jemand helfen kann, wäre super nett.
sfc/scan hab ich bereits gemacht (manchmal findet er was und behebt das dann)
Memtest hab ich bereits gemacht (3Stunden, nichts gefunden)
OS mehrfach neu installiert
Treiber updates gemacht
BIOS update gemacht
Nach einem der letzten Fehler war das die Analyse, womit ich aber leider nicht viel selber anfangen kann:
*******************************************************************************
- *
- Bugcheck Analysis *
- *
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804370b743a, Address of the instruction which caused the bugcheck
Arg3: ffffa3038102e490, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0RLS0G1
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 7
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff804370b743a
BUGCHECK_P3: ffffa3038102e490
BUGCHECK_P4: 0
CONTEXT: ffffa3038102e490 -- (.cxr 0xffffa3038102e490)
rax=ffffa4829c50b000 rbx=00000000bdb2ed7f rcx=0000000000000852
rdx=ffffa4829c50f290 rsi=ffffa482a5fbf850 rdi=00000000754046c6
rip=fffff804370b743a rsp=ffffa3038102ee80 rbp=0000000000004000
r8=ffffa3038102ee88 r9=0000000000000001 r10=ffffa482a8e8c2fc
r11=ffffa3038102eeb0 r12=ffffa4829c48d000 r13=0000000000000000
r14=ffffa3038102f0f0 r15=ffffa3038102f110
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!CmpPerformCompleteKcbCacheLookup+0x15a:
fffff804`370b743a 395d00 cmp dword ptr [rbp],ebx ss:0018:00000000`00004000=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffa303`8102ee80 fffff804`370bb290 : ffffa482`a5fbf850 ffffa303`00000000 ffffa303`00000001 ffffa303`8102f0f0 : nt!CmpPerformCompleteKcbCacheLookup+0x15a
ffffa303`8102ef50 fffff804`370b8684 : ffffa303`0000001c ffffa303`8102f2a0 ffffa303`8102f268 00000000`00000000 : nt!CmpDoParseKey+0x670
ffffa303`8102f1f0 fffff804`370b656f : ffffc486`0c9dd6d0 ffffa482`a4115c01 00000000`00000000 ffff561e`1e74bf01 : nt!CmpParseKey+0x274
ffffa303`8102f410 fffff804`370b49d1 : ffffc486`0c9dd600 ffffa303`8102f658 ffffc486`00000040 ffffc485`fecf36c0 : nt!ObpLookupObjectName+0x78f
ffffa303`8102f5d0 fffff804`370bdeec : 00000000`00000001 00000000`00000000 00000000`00000000 ffffc485`fecf36c0 : nt!ObOpenObjectByNameEx+0x201
ffffa303`8102f710 fffff804`370bdd6d : 00000093`8b67cee0 ffffa303`8102fa80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffffa303`8102f760 fffff804`370bfd8f : 00000093`8b67d368 00000000`000000bc 00000000`00020119 00000000`00000000 : nt!CmOpenKey+0x29d
ffffa303`8102f9c0 fffff804`36bd3c15 : ffffc486`09e0e080 00000093`00000000 ffffa303`8102fa80 00000093`8b67def0 : nt!NtOpenKeyEx+0xf
ffffa303`8102fa00 00007ffe`e3f3e414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000093`8b67ce08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e3f3e414
SYMBOL_NAME: nt!CmpPerformCompleteKcbCacheLookup+15a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xffffa3038102e490 ; kb
BUCKET_ID_FUNC_OFFSET: 15a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CmpPerformCompleteKcbCacheLookup
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3df4caed-9f95-78dd-d2de-48862f739011}
Followup: MachineOwner
---------