Unregelmäßige Bluescreens mit diversen Fehlermeldungen

ThomasC

Newbie
Registriert
Jan. 2014
Beiträge
5
Moin moin,
ich bin am Verzweifeln mit meinem PC, es gibt immer mal wieder Bluescreens. Mit dem Problem schlage ich mich schon ein paar Monate herum und habe die offensichtlichen Fehlerquellen beseitigt.

Treiber, Bios und Firmware sind aktuell
Memtest86 über Nacht laufen lassen -> keine Fehler
Windows 7 neu installiert
neue Grafikkarte gekauft
sämtliche nicht benötigte Peripherie abgenommen


Ich bin mir nicht sicher welche Infos benötigt werden, falls etwas fehlt bitte melden

cpuz1.JPGcpuz2.JPGcpuz3.JPG

Eine Auswahl meiner Dumpfiles findet sich hier

Anhang anzeigen Dumpfiles.7z

Und hier die Analysierten, letzten beiden Dumpfiles:

Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Thomas\Desktop\Dumpfiles\010214-18064-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03209000 PsLoadedModuleList = 0xfffff800`0344c6d0
Debug session time: Thu Jan 2 11:05:13.829 2014 (GMT+1)
System Uptime: 0 days 1:22:42.781
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {c08a5, 0, 0, 0}

Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000c08a5
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x24

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff88001a0df15 to fffff8000327ebc0

STACK_TEXT:
fffff880`0b3b66b8 fffff880`01a0df15 : 00000000`00000024 00000000`000c08a5 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b3b66c0 fffff880`01a0db68 : 00000001`00000000 00000000`00000000 00000000`00000000 00000800`00000000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`0b3b67c0 fffff880`01602bcf : fffffa80`0d338790 fffffa80`0d3383f0 fffffa80`0dc94010 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x7d59
fffff880`0b3b6870 fffff880`016016df : fffffa80`07b28de0 fffffa80`072ad001 fffffa80`07b28d00 fffffa80`0d3383f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0b3b6900 fffff800`032a5e15 : fffffa80`0d338410 fffffa80`0afad8b0 fffffa80`0b06bdf0 fffff800`033f9e80 : fltmgr!FltpDispatch+0xcf
fffff880`0b3b6960 fffff800`032a58e9 : 00000000`00000001 00000000`00000001 fffffa80`0b06bd30 fffffa80`0b06bd30 : nt!IoPageRead+0x255
fffff880`0b3b69f0 fffff800`0328c28a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`000392a0 : nt!MiIssueHardFault+0x255
fffff880`0b3b6ac0 fffff800`0327ccee : 00000000`00000001 00000000`07255000 00000000`00178d01 00000000`07130c30 : nt!MmAccessFault+0x146a
fffff880`0b3b6c20 00000000`771f67ae : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`011be8c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771f67ae


STACK_COMMAND: kb

FOLLOWUP_IP:
Ntfs!NtfsPagingFileIo+155
fffff880`01a0df15 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: Ntfs!NtfsPagingFileIo+155

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5167f5fc

FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155

BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155

Followup: MachineOwner
---------


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007b47960, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
+0
fffff880`07b47960 8888b40780f8 mov byte ptr [rax-77FF84Ch],cl

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003504100
0000000000000000

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x1E

PROCESS_NAME: System

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff88007b48888 -- (.exr 0xfffff88007b48888)
ExceptionAddress: fffff88001e4e439 (tcpip!TcpDereferenceTcb+0x0000000000000009)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME: fffff88007b48930 -- (.trap 0xfffff88007b48930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800b8105b0 rbx=0000000000000000 rcx=7ffffa8006cea260
rdx=fffffa800b87ab71 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001e4e439 rsp=fffff88007b48ac0 rbp=0000000000000000
r8=fffffa800b87ab70 r9=0000000000000040 r10=fffff880037d5b20
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!TcpDereferenceTcb+0x9:
fffff880`01e4e439 f00fc15908 lock xadd dword ptr [rcx+8],ebx ds:bfe8:7ffffa80`06cea268=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8000335e1bb to fffff800032ccbc0

STACK_TEXT:
fffff880`07b48ac0 fffff880`01e4d9a9 : 00000000`000006de 00000000`00000494 00000000`00000000 fffffa80`072a6b30 : tcpip!TcpDereferenceTcb+0x9
fffff880`07b48af0 fffff880`01e62728 : 00000000`00000000 fffff880`07b48d88 00000000`00000000 fffff880`00030000 : tcpip!TcpCompleteTcbSend+0x49
fffff880`07b48b20 fffff880`01e6197a : fffffa80`06cea260 fffff880`01e5a800 fffffa80`07a5d400 fffff880`01e70672 : tcpip!TcpTcbReceive+0x3ec
fffff880`07b48c30 fffff880`01e62aeb : fffffa80`0709e124 00000000`00000000 00000000`00000000 fffff880`07b49000 : tcpip!TcpMatchReceive+0x1fa
fffff880`07b48d80 fffff880`01e5af17 : fffffa80`07bc9490 fffffa80`07a8bb01 fffffa80`00003cc5 00000000`00003cc5 : tcpip!TcpPreValidatedReceive+0x36b
fffff880`07b48e50 fffff880`01e5aa8a : 00000000`00000000 fffff880`01f6d9a0 fffff880`07b49010 fffff880`009eb300 : tcpip!IppDeliverListToProtocol+0x97
fffff880`07b48f10 fffff880`01e5a089 : fffffa80`0a834d28 fffff800`032d5bda 00000000`00000010 fffff880`07b49000 : tcpip!IppProcessDeliverList+0x5a
fffff880`07b48fb0 fffff880`01e57d2f : 00000000`37db1332 fffff880`01f6d9a0 fffff880`01f6d9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`07b49090 fffff880`01e57302 : fffffa80`0bc10800 00000000`00000000 fffffa80`0bd97a01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`07b49290 fffff880`01e5672a : fffffa80`0bd97a10 fffff880`07b493c0 fffffa80`0bd97a10 fffffa80`0c3a0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`07b49370 fffff800`032d8878 : fffffa80`076411d0 00000000`00004800 fffffa80`0bd69b50 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`07b493c0 fffff880`01e56e22 : fffff880`01e56650 fffffa80`0bc2d030 fffffa80`10cc6202 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`07b494a0 fffff880`01d7f0eb : fffffa80`0b9ff010 00000000`00000000 fffffa80`0a7c61a0 fffffa80`0a7c61a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`07b49510 fffff880`01d48ad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`07b49580 fffff880`01ccb5d4 : fffffa80`0a7c61a0 00000000`00000002 00000000`00000001 fffffa80`076411d0 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`07b49a00 fffff880`01ccb549 : 00000000`00000000 00000000`00000000 fffffa80`0ba15810 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`07b49a40 fffff880`01ccb4e0 : fffff880`079e25c0 fffffa80`0c103010 fffffa80`0ba15810 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`07b49a80 fffff880`079ab7ee : fffffa80`0c103010 00000000`00000000 fffffa80`076411d0 fffff880`079e25c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`07b49ac0 fffff880`01ccb549 : fffffa80`0bd85c80 00000000`00000000 00000000`00000001 fffff880`06e28750 : nwifi!Pt6Receive+0x296
fffff880`07b49b20 fffff880`01ccb4e0 : fffffa80`0c0fd028 fffff880`04a300c7 fffff880`04a31340 ffff0000`00000000 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`07b49b60 fffff880`04a2c9c0 : fffff880`04a33110 00000000`00000000 00000000`00000001 fffffa80`0c0fda78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`07b49ba0 fffff880`01ce40a7 : fffffa80`0a7c61a0 fffffa80`0c773700 fffffa80`0c773700 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158
fffff880`07b49c00 fffff880`06e45476 : fffffa80`0bd69b50 00000000`00000080 fffffa80`0b62ee28 fffffa80`0bc2d030 : ndis! ?? ::FNODOBFM::`string'+0xcd8f
fffff880`07b49c50 fffffa80`0bd69b50 : 00000000`00000080 fffffa80`0b62ee28 fffffa80`0bc2d030 ffff0000`00000000 : athurx+0x24476
fffff880`07b49c58 00000000`00000080 : fffffa80`0b62ee28 fffffa80`0bc2d030 ffff0000`00000000 fffff880`06e277f3 : 0xfffffa80`0bd69b50
fffff880`07b49c60 fffffa80`0b62ee28 : fffffa80`0bc2d030 ffff0000`00000000 fffff880`06e277f3 00000000`00000000 : 0x80
fffff880`07b49c68 fffffa80`0bc2d030 : ffff0000`00000000 fffff880`06e277f3 00000000`00000000 00000000`00000000 : 0xfffffa80`0b62ee28
fffff880`07b49c70 ffff0000`00000000 : fffff880`06e277f3 00000000`00000000 00000000`00000000 fffffa80`0c773700 : 0xfffffa80`0bc2d030
fffff880`07b49c78 fffff880`06e277f3 : 00000000`00000000 00000000`00000000 fffffa80`0c773700 00000001`00000001 : 0xffff0000`00000000
fffff880`07b49c80 00000000`00000000 : 00000000`00000000 fffffa80`0c773700 00000001`00000001 fffffa80`0bc2d030 : athurx+0x67f3


STACK_COMMAND: .trap 0xfffff88007b48930 ; kb

FOLLOWUP_IP:
nwifi!Pt6Receive+296
fffff880`079ab7ee 83a3e010000000 and dword ptr [rbx+10E0h],0

SYMBOL_STACK_INDEX: 12

SYMBOL_NAME: nwifi!Pt6Receive+296

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nwifi

IMAGE_NAME: nwifi.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b

FAILURE_BUCKET_ID: X64_0x1E_nwifi!Pt6Receive+296

BUCKET_ID: X64_0x1E_nwifi!Pt6Receive+296

Followup: MachineOwner
---------


Leider gibt es noch diverse anderen Fehlermeldungen, so dass ich total im Dunkel tappe. Kann mir jemand weiterhelfen?

Vielen Dank schon mal
 
Fehler bei NTFS und WIFI.

Welche Controllertreiber sind installiert für den Festplattencontroller und Wifi-Controller?
Welche Hardware ist verbaut?

lg
fire
 
Mein WLan-Stick ist ein TL-WN821N von TP-Link, dafür hab ich die original Treiber installiert. Die Festplatte ist eine Samsung HD103SJ mit 1000 GB, das Mainboard ist ein MSI P55-GD65 (MS-7583). Als Festplattenkontroller habe ich die Software von der MSI Seite installiert und soweit möglich anschließend geupdatet. Ich würde gerne genauere Infos geben, allerdings bin ich mir nicht sich wo ich diese finden kann. Außerdem hab ich noch die Intel Rapid Storage-Technologie installiert (Version 12.8.0.1016).


Komisch mit der CPU, ich habe es mir gerade noch mal angeschaut und da war mit dem Core Speed alles in Ordnung. Ich würde vermuten das einfach ein Kern hochgetacktet wurde, lass mich aber gerne eines besseren belehren.

Ich habe doch noch folgendes gefunden:
Intel Chipsätze (Chipsatz-INF)
Intel® 6, 5, 4, 3, 900 Series Chipsets - Version installiert 9.4.0.1026

und für das WLan findet Das Intel® Utility für die Treiberaktualisierung allerdings etwas komisches. Da wird folgendes angegeben:
Produkt erkannt Realtek PCIe GBE Family Controller
Aktueller Treiber installiert 7.75.827.2013
das ist allerdings der Treiber fürs LAN?


Und noch zwei frische Bluescreens von heute abend.

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800a94b990, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
+0
fffff880`0a94b990 b8c8940a80 mov eax,800A94C8h

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000000

READ_ADDRESS: 0000000000000000

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x1E

PROCESS_NAME: System

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff8800a94c8b8 -- (.exr 0xfffff8800a94c8b8)
ExceptionAddress: fffff88001e4d99d (tcpip!TcpCompleteTcbSend+0x000000000000003d)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME: fffff8800a94c960 -- (.trap 0xfffff8800a94c960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80116f8370 rbx=0000000000000000 rcx=fffffa800e9dbe20
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001e4d99d rsp=fffff8800a94caf0 rbp=0000000000000000
r8=000000000000024a r9=0000000000000040 r10=fffffa800c0c1020
r11=fffffa800c0c1aa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpCompleteTcbSend+0x3d:
fffff880`01e4d99d ff5608 call qword ptr [rsi+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8000330c1bb to fffff8000327abc0

STACK_TEXT:
fffff880`0a94caf0 fffff880`01e62728 : 00000000`00000000 fffff880`0a94cd88 00000000`00000000 fffff880`00010000 : tcpip!TcpCompleteTcbSend+0x3d
fffff880`0a94cb20 fffff880`01e6197a : fffffa80`0ffe6cf0 fffff880`01e5a800 fffffa80`07a5d800 fffff880`0a94ce60 : tcpip!TcpTcbReceive+0x3ec
fffff880`0a94cc30 fffff880`01e62aeb : fffffa80`0f128124 00000000`00000000 00000000`00000000 fffff880`0a94d000 : tcpip!TcpMatchReceive+0x1fa
fffff880`0a94cd80 fffff880`01e5af17 : fffffa80`07a89f00 fffffa80`07a8bb01 fffffa80`000089c2 00000000`000089c2 : tcpip!TcpPreValidatedReceive+0x36b
fffff880`0a94ce50 fffff880`01e5aa8a : 00000000`00000000 fffff880`01f6d9a0 fffff880`0a94d010 fffff880`009eb300 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0a94cf10 fffff880`01e5a089 : fffffa80`0a730d28 fffff800`03283bda 00000000`00000010 fffff880`0a94d000 : tcpip!IppProcessDeliverList+0x5a
fffff880`0a94cfb0 fffff880`01e57d2f : 00000000`67da1517 fffff880`01f6d9a0 fffff880`01f6d9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0a94d090 fffff880`01e57302 : fffffa80`09e753f0 00000000`00000000 fffffa80`0a112b01 fffffa80`00000002 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0a94d290 fffff880`01e5672a : fffffa80`0a112ba0 fffff880`0a94d3c0 fffffa80`0a112ba0 fffffa80`07d40000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0a94d370 fffff800`03286878 : fffffa80`107ac330 00000000`00004800 fffffa80`0a42b540 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0a94d3c0 fffff880`01e56e22 : fffff880`01e56650 fffffa80`0c8b6030 fffffa80`11530802 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0a94d4a0 fffff880`01d8a0eb : fffffa80`0785b410 00000000`00000000 fffffa80`0756a1a0 fffffa80`0756a1a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0a94d510 fffff880`01d53ad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0a94d580 fffff880`01cd65d4 : fffffa80`0756a1a0 00000000`00000002 00000000`00000002 fffffa80`06c7b130 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0a94da00 fffff880`01cd6549 : 00000000`00000000 00000000`00000000 fffffa80`0a286170 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`0a94da40 fffff880`01cd64e0 : fffff880`074995c0 fffffa80`0a111010 fffffa80`0a286170 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`0a94da80 fffff880`074627ee : fffffa80`0a111010 00000000`00000000 fffffa80`107ac330 fffff880`074995c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`0a94dac0 fffff880`01cd6549 : fffffa80`0722c010 00000000`00000000 00000000`00000002 fffff880`0aa17750 : nwifi!Pt6Receive+0x296
fffff880`0a94db20 fffff880`01cd64e0 : fffffa80`0a10e328 fffff880`0204f0c7 fffff880`02050340 ffff0000`00000000 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`0a94db60 fffff880`0204b9c0 : fffff880`02052110 00000000`00000000 00000000`00000002 fffffa80`0a10ed78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`0a94dba0 fffff880`01cef0a7 : fffffa80`0756a1a0 fffffa80`06cefed0 fffffa80`06cefed0 00000000`00000002 : vwififlt!FilterReceiveNetBufferLists+0x158
fffff880`0a94dc00 fffff880`0aa34476 : fffffa80`0a42b540 00000000`00000080 fffffa80`06d8eba8 fffffa80`0c8b6030 : ndis! ?? ::FNODOBFM::`string'+0xcd8f
fffff880`0a94dc50 fffffa80`0a42b540 : 00000000`00000080 fffffa80`06d8eba8 fffffa80`0c8b6030 ffff0000`00000000 : athurx+0x24476
fffff880`0a94dc58 00000000`00000080 : fffffa80`06d8eba8 fffffa80`0c8b6030 ffff0000`00000000 fffff880`0aa167f3 : 0xfffffa80`0a42b540
fffff880`0a94dc60 fffffa80`06d8eba8 : fffffa80`0c8b6030 ffff0000`00000000 fffff880`0aa167f3 00000000`00000000 : 0x80
fffff880`0a94dc68 fffffa80`0c8b6030 : ffff0000`00000000 fffff880`0aa167f3 00000000`00000000 00000000`00000000 : 0xfffffa80`06d8eba8
fffff880`0a94dc70 ffff0000`00000000 : fffff880`0aa167f3 00000000`00000000 00000000`00000000 fffffa80`06cefed0 : 0xfffffa80`0c8b6030
fffff880`0a94dc78 fffff880`0aa167f3 : 00000000`00000000 00000000`00000000 fffffa80`06cefed0 00000001`00000002 : 0xffff0000`00000000
fffff880`0a94dc80 00000000`00000000 : 00000000`00000000 fffffa80`06cefed0 00000001`00000002 fffffa80`06d8ecd0 : athurx+0x67f3


STACK_COMMAND: .trap 0xfffff8800a94c960 ; kb

FOLLOWUP_IP:
nwifi!Pt6Receive+296
fffff880`074627ee 83a3e010000000 and dword ptr [rbx+10E0h],0

SYMBOL_STACK_INDEX: 11

SYMBOL_NAME: nwifi!Pt6Receive+296

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nwifi

IMAGE_NAME: nwifi.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b

FAILURE_BUCKET_ID: X64_0x1E_nwifi!Pt6Receive+296

BUCKET_ID: X64_0x1E_nwifi!Pt6Receive+296

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004f425b0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
+0
fffff880`04f425b0 d834f4 fdiv dword ptr [rsp+rsi*8]

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000000

READ_ADDRESS: 0000000000000000

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x1E

PROCESS_NAME: System

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff88004f434d8 -- (.exr 0xfffff88004f434d8)
ExceptionAddress: fffff88001e5bfef (tcpip!tcpxsum+0x000000000000004f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME: fffff88004f43580 -- (.trap 0xfffff88004f43580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000083
rdx=7ffff88011036794 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001e5bfef rsp=fffff88004f43710 rbp=00000000000005b4
r8=0000000000000106 r9=fffff88001e5c082 r10=7ffff88011036794
r11=7ffff88011036794 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!tcpxsum+0x4f:
fffff880`01e5bfef 66410302 add ax,word ptr [r10] ds:7ffff880`11036794=????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800033621bb to fffff800032d0bc0

STACK_TEXT:
fffff880`04f424f8 fffff800`033621bb : 00000000`0000001e ffffffff`c0000005 fffff880`04f425b0 00000000`00000000 : nt!KeBugCheckEx
fffff880`04f42500 fffff800`03323d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
fffff880`04f42540 fffff800`032fbcdc : 00000000`00000003 fffff880`04f42b60 fffff880`04f42708 fffffa80`0be488a0 : nt! ?? ::FNODOBFM::`string'+0x83d
fffff880`04f42580 fffff800`032fb75d : fffff800`0341cd74 fffff880`04f443c0 00000000`00000000 fffff800`0325b000 : nt!_C_specific_handler+0x8c
fffff880`04f425f0 fffff800`032fa535 : fffff800`0341cd74 fffff880`04f42668 fffff880`04f434d8 fffff800`0325b000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`04f42620 fffff800`0330b4c1 : fffff880`04f434d8 fffff880`04f42d30 fffff880`00000000 fffffa80`00000005 : nt!RtlDispatchException+0x415
fffff880`04f42d00 fffff800`032d0242 : fffff880`04f434d8 00000000`00000000 fffff880`04f43580 00000000`0002390e : nt!KiDispatchException+0x135
fffff880`04f433a0 fffff800`032ceb4a : 00000000`00000002 fffffa80`0796e010 fffffa80`06bc61d0 fffff880`01e431ce : nt!KiExceptionDispatch+0xc2
fffff880`04f43580 fffff880`01e5bfef : 00000000`00000106 fffff880`01e45708 fffffa80`07bb1200 fffffa80`079ab938 : nt!KiGeneralProtectionFault+0x10a
fffff880`04f43710 fffff880`01e45708 : fffffa80`07bb1200 fffffa80`079ab938 fffffa80`079ab90c 00000000`00000006 : tcpip!tcpxsum+0x4f
fffff880`04f43720 fffff880`01e8dce6 : fffffa80`07bb1200 fffffa80`0c3f2e60 00000000`00000010 fffffa80`0ba2a010 : tcpip!IppChecksumDatagram+0x98
fffff880`04f43780 fffff880`01e8dc42 : fffffa80`0c3f2d30 fffff880`01f6e9a0 fffffa80`0ba8b2a0 fffff880`01f6e9a0 : tcpip!IppChecksumNetBufferList+0x86
fffff880`04f43800 fffff880`01e5de56 : fffffa80`079ab90c fffff880`04f43b10 00000000`00000000 fffffa80`079ab858 : tcpip!IppPreparePacketChecksum+0x182
fffff880`04f43840 fffff880`01e6077e : 00000000`00000000 00000000`00004007 00000000`1213abd2 fffffa80`06bc61d0 : tcpip!IppSendDatagramsCommon+0x876
fffff880`04f439e0 fffff880`01e68a8d : fffffa80`00000014 fffff880`01e76802 fffffa80`0e10f820 00000000`00000d1d : tcpip!IpNlpSendDatagrams+0x3e
fffff880`04f43a20 fffff880`01e887c6 : 00000000`00000000 fffffa80`06cd6001 fffff880`01f68128 00000000`00000000 : tcpip!TcpTcbSend+0x6ad
fffff880`04f43ca0 fffff880`01e63b65 : fffffa80`0bdec000 00000000`00000000 00000000`00000000 fffff880`04f44000 : tcpip!TcpFlushDelay+0x316
fffff880`04f43d80 fffff880`01e5bf17 : fffffa80`07ba96f0 fffffa80`079bbb01 fffffa80`000057c0 00000000`000057c0 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`04f43e50 fffff880`01e5ba8a : 00000000`00000000 fffff880`01f6e9a0 fffff880`04f44010 fffff880`03766300 : tcpip!IppDeliverListToProtocol+0x97
fffff880`04f43f10 fffff880`01e5b089 : fffffa80`0a797d28 fffff800`032d9bda 00000000`00000010 fffff880`04f44000 : tcpip!IppProcessDeliverList+0x5a
fffff880`04f43fb0 fffff880`01e58d2f : 00000000`54f5166b fffff880`01f6e9a0 fffff880`01f6e9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`04f44090 fffff880`01e58302 : fffffa80`0b9dac50 00000000`00000000 fffffa80`0ba1ab01 00000000`00000002 : tcpip!IpFlcReceivePackets+0x64f
fffff880`04f44290 fffff880`01e5772a : fffffa80`0ba1aba0 fffff880`04f443c0 fffffa80`0ba1aba0 fffffa80`0bc40000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`04f44370 fffff800`032dc878 : fffffa80`0bcd9490 00000000`00004800 fffffa80`0b4dbb50 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`04f443c0 fffff880`01e57e22 : fffff880`01e57650 fffffa80`0b3ad030 fffffa80`0bf02802 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`04f444a0 fffff880`01d650eb : fffffa80`0ba29010 00000000`00000000 fffffa80`0b38d1a0 fffffa80`0b38d1a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`04f44510 fffff880`01d2ead6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`04f44580 fffff880`01cb15d4 : fffffa80`0b38d1a0 00000000`00000002 00000000`00000002 fffffa80`0bc64030 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`04f44a00 fffff880`01cb1549 : 00000000`00000000 00000000`00000000 fffffa80`0ba03020 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`04f44a40 fffff880`01cb14e0 : fffff880`059e45c0 fffffa80`0b914010 fffffa80`0ba03020 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`04f44a80 fffff880`059ad7ee : fffffa80`0b914010 00000000`00000000 fffffa80`0bcd9490 fffff880`059e45c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`04f44ac0 fffff880`01cb1549 : fffffa80`0b44ac80 00000000`00000000 00000000`00000002 fffff880`05c24750 : nwifi!Pt6Receive+0x296
fffff880`04f44b20 fffff880`01cb14e0 : fffffa80`0b7d0328 fffff880`0516a0c7 fffff880`0516b340 ffff0000`00000000 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`04f44b60 fffff880`051669c0 : fffff880`0516d110 00000000`00000000 00000000`00000002 fffffa80`0b7d0d78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`04f44ba0 fffff880`01cca0a7 : fffffa80`0b38d1a0 fffffa80`075a8270 fffffa80`075a8270 00000000`00000002 : vwififlt!FilterReceiveNetBufferLists+0x158
fffff880`04f44c00 fffff880`05c41476 : fffffa80`0b4dbb50 00000000`00000080 fffffa80`0b3ab468 fffffa80`0b3ad030 : ndis! ?? ::FNODOBFM::`string'+0xcd8f
fffff880`04f44c50 fffffa80`0b4dbb50 : 00000000`00000080 fffffa80`0b3ab468 fffffa80`0b3ad030 ffff0000`00000000 : athurx+0x24476
fffff880`04f44c58 00000000`00000080 : fffffa80`0b3ab468 fffffa80`0b3ad030 ffff0000`00000000 fffff880`05c237f3 : 0xfffffa80`0b4dbb50
fffff880`04f44c60 fffffa80`0b3ab468 : fffffa80`0b3ad030 ffff0000`00000000 fffff880`05c237f3 00000000`00000000 : 0x80
fffff880`04f44c68 fffffa80`0b3ad030 : ffff0000`00000000 fffff880`05c237f3 00000000`00000000 00000000`00000000 : 0xfffffa80`0b3ab468
fffff880`04f44c70 ffff0000`00000000 : fffff880`05c237f3 00000000`00000000 00000000`00000000 fffffa80`075a8270 : 0xfffffa80`0b3ad030
fffff880`04f44c78 fffff880`05c237f3 : 00000000`00000000 00000000`00000000 fffffa80`075a8270 00000001`00000002 : 0xffff0000`00000000
fffff880`04f44c80 00000000`00000000 : 00000000`00000000 fffffa80`075a8270 00000001`00000002 fffffa80`0b3ad030 : athurx+0x67f3


STACK_COMMAND: kb

FOLLOWUP_IP:
tcpip!tcpxsum+4f
fffff880`01e5bfef 66410302 add ax,word ptr [r10]

SYMBOL_STACK_INDEX: 9

SYMBOL_NAME: tcpip!tcpxsum+4f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME: tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 522bced8

FAILURE_BUCKET_ID: X64_0x1E_tcpip!tcpxsum+4f

BUCKET_ID: X64_0x1E_tcpip!tcpxsum+4f

Followup: MachineOwner
---------
 
Zuletzt bearbeitet:
CrystalDiskInfo:
Zustand Gut, keine Änderung der Parameter in den letzten Monaten und weit weg vom Grenzwert

Und noch ein einer

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003719300, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
+0
fffff880`03719300 28a2710380f8 sub byte ptr [rdx-77FFC8Fh],ah

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000000

READ_ADDRESS: 0000000000000000

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x1E

PROCESS_NAME: System

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff8800371a228 -- (.exr 0xfffff8800371a228)
ExceptionAddress: fffff88001e4f439 (tcpip!TcpDereferenceTcb+0x0000000000000009)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME: fffff8800371a2d0 -- (.trap 0xfffff8800371a2d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80133ecc50 rbx=0000000000000000 rcx=7ffffa80122a3cf0
rdx=fffff880009e9180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001e4f439 rsp=fffff8800371a460 rbp=0000000000000000
r8=0000000000000528 r9=0000000000000040 r10=fffff8000325d000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!TcpDereferenceTcb+0x9:
fffff880`01e4f439 f00fc15908 lock xadd dword ptr [rcx+8],ebx ds:ffb8:7ffffa80`122a3cf8=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800033641bb to fffff800032d2bc0

STACK_TEXT:
fffff880`03719248 fffff800`033641bb : 00000000`0000001e ffffffff`c0000005 fffff880`03719300 00000000`00000000 : nt!KeBugCheckEx
fffff880`03719250 fffff800`03325d18 : fffffa80`0de518d0 fffff880`00d5d7a7 fffffa80`11297c00 fffffa80`0b0d3e40 : nt!KipFatalFilter+0x1b
fffff880`03719290 fffff800`032fdcdc : fffffa80`101e3210 00000000`00000000 fffff880`0513b110 fffff880`0464b2b0 : nt! ?? ::FNODOBFM::`string'+0x83d
fffff880`037192d0 fffff800`032fd75d : fffff800`0341ed74 fffff880`0371ad60 00000000`00000000 fffff800`0325d000 : nt!_C_specific_handler+0x8c
fffff880`03719340 fffff800`032fc535 : fffff800`0341ed74 fffff880`037193b8 fffff880`0371a228 fffff800`0325d000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`03719370 fffff800`0330d4c1 : fffff880`0371a228 fffff880`03719a80 fffff880`00000000 fffffa80`00000005 : nt!RtlDispatchException+0x415
fffff880`03719a50 fffff800`032d2242 : fffff880`0371a228 00000000`ffffffff fffff880`0371a2d0 fffffa80`09eab620 : nt!KiDispatchException+0x135
fffff880`0371a0f0 fffff800`032d0b4a : fffffa80`0799ff00 fffffa80`0c3e59b0 fffffa80`0c3e5a38 fffffa80`133ecc50 : nt!KiExceptionDispatch+0xc2
fffff880`0371a2d0 fffff880`01e4f439 : fffffa80`00000014 fffffa80`0f4101c0 00000000`00000000 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`0371a460 fffff880`01e4e9a9 : 00000000`00000928 00000000`000006de 00000000`00000000 fffffa80`09eab590 : tcpip!TcpDereferenceTcb+0x9
fffff880`0371a490 fffff880`01e63728 : 00000000`00000000 fffff880`0371a728 00000000`00000000 fffff880`00010000 : tcpip!TcpCompleteTcbSend+0x49
fffff880`0371a4c0 fffff880`01e6297a : fffffa80`122a3cf0 fffff880`01e5b800 fffffa80`07980800 fffff880`01e71672 : tcpip!TcpTcbReceive+0x3ec
fffff880`0371a5d0 fffff880`01e63aeb : fffffa80`0da1d414 00000000`00000000 00000000`00000000 fffff880`0371a900 : tcpip!TcpMatchReceive+0x1fa
fffff880`0371a720 fffff880`01e5bf17 : fffffa80`079a78d0 fffffa80`079abb01 fffffa80`0000ddc4 00000000`0000ddc4 : tcpip!TcpPreValidatedReceive+0x36b
fffff880`0371a7f0 fffff880`01e5ba8a : 00000000`00000000 fffff880`01f6e9a0 fffff880`0371a9b0 00000000`00000001 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0371a8b0 fffff880`01e5b089 : fffffa80`0b1d1ab0 fffff880`01e57e70 fffffa80`07ba1000 fffff880`0371a9a0 : tcpip!IppProcessDeliverList+0x5a
fffff880`0371a950 fffff880`01e58d2f : 00000000`45dc1517 fffff880`01f6e9a0 fffff880`01f6e9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0371aa30 fffff880`01e58302 : fffffa80`0bf9f3d0 00000000`00000000 fffffa80`12537001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0371ac30 fffff880`01e5772a : fffffa80`12537010 fffff880`0371ad60 fffffa80`12537010 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0371ad10 fffff800`032de878 : fffffa80`0b1d1ab0 00000000`00004800 fffff880`009f3fc0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0371ad60 fffff880`01e57e22 : fffff880`01e57650 fffff880`035b7478 fffff880`0371ae02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0371ae40 fffff880`01d560eb : fffffa80`0de518d0 00000000`00000000 fffffa80`06a961a0 fffffa80`06a961a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0371aeb0 fffff880`01d1fad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0371af20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6


STACK_COMMAND: kb

FOLLOWUP_IP:
tcpip!TcpDereferenceTcb+9
fffff880`01e4f439 f00fc15908 lock xadd dword ptr [rcx+8],ebx

SYMBOL_STACK_INDEX: 9

SYMBOL_NAME: tcpip!TcpDereferenceTcb+9

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME: tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 522bced8

FAILURE_BUCKET_ID: X64_0x1E_tcpip!TcpDereferenceTcb+9

BUCKET_ID: X64_0x1E_tcpip!TcpDereferenceTcb+9

Followup: MachineOwner
---------
 
Zuletzt bearbeitet:
Wegen Crossposting → Nachdem es offensichtlich hier weiter geht;

Hallo Thomas!

Ersteinmal ein herzliches „Willkommen im Forum“ und dann ein Danke für die nützliche Vorarbeit, ist leider nicht immer selbstverständlich. augen15x18.gif

Was TP-Link betrifft, sind diese nicht gerade für herausragende Softwarequalität in Bezug auf Treiber bekannt …
Ist also durchaus wahrscheinlich, daß es am besagten Stick liegt.

  1. Trat das Problem jemals bei einer Ethernet-Verbindung bei gleichzeitiger Abwesenheit des WLan-Sticks auf?
  2. Was für eine Hardware-Variante ist Dein Stick?
    Die Version V1 hat offiziell glaube ich gar keine explizit finale Windows 7-Unterstützung sondern lediglich Beta-Charakter.
    Damit ging es erst ab Revision V2 los.
  3. Was für ein Anti-Viren-Programm nutzt Du? Nicht zufällig Kaspersky oder AVG?
  4. Und zu guter Letzt, tritt das Problem häufiger auf, wenn Flash-Inhalte zu diesem Zeitpunkt aktiv sind (Youtube et cetera)?


In diesem Sinne

Smartcom
 
Zuletzt bearbeitet:
1-2: Den WLan-Stick hatte ich auch schon in verdacht, es ist zwar die Version 2, aber so richtig beeindruckt war ich von der Software nicht. Ich habe ihn dann mal gegen einen alten noname Stick ausgetauscht (Treiber für Win 7 64 bit vorhanden) und die Bluescreens haben nicht aufgehört. Ich betreibe meinen Computer nicht ohne WLan, nur Ethernet habe ich noch nicht probiert.
3: Ich nutze AVast, habe aber auch schon AntiVir gehabt, Bluescreens treten bei beiden auf.
4: Jein, gefühlt ja, aber zum Teil auch ohne aktiven Browser. Wobei es mir so vorkommt, als ob viele TAbs (20-30) mit Flash zu häufigen BSOD führen.

Ich habe seit dem letzten Bluesreen im Bios meinen Firewire Port deaktiviert und zusätzlich die Auslagerungsdatei einmal entfernt und dann wieder neue erstellen lassen. Keine Ahnung warum, aber den Tipp hatte ich irgendwo gelesen.
Den Driver Verifier habe ich auch aktiviert, aber seit den genannten Änderungen habe ich keinen BSOD mehr. Zufall oder gibt es eine Erklärung dafür?
 
Zurück
Oben