@Silver Server
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\dammy\AppData\Local\Temp\Rar$DIa10800.42532\062321-6156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`11800000 PsLoadedModuleList = 0xfffff806`1242a290
Debug session time: Wed Jun 23 23:17:32.154 2021 (UTC + 2:00)
System Uptime: 0 days 0:35:20.804
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`11bf6b90 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe186`92261420=000000000000000a
5: kd> !analyze -v
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000003134, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80611a18b6a, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2968
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7806
Key : Analysis.Init.CPU.mSec
Value: 328
Key : Analysis.Init.Elapsed.mSec
Value: 22458
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 3134
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80611a18b6a
READ_ADDRESS: fffff806124fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000003134
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe18692261560 -- (.trap 0xffffe18692261560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff78000000320 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80611a18b6a rsp=ffffe186922616f0 rbp=0000000000000000
r8=0000000000021233 r9=0000000000000000 r10=0000fffff80611ac
r11=ffff977ff3c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x177a:
fffff806`11a18b6a 418b9534310000 mov edx,dword ptr [r13+3134h] ds:00000000`00003134=????????
Resetting default scope
STACK_TEXT:
ffffe186`92261418 fffff806`11c08b69 : 00000000`0000000a 00000000`00003134 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffe186`92261420 fffff806`11c04e69 : fffff806`11b62cb0 fffff806`11ae260b fffff806`11b62c90 fffff806`11ada397 : nt!KiBugCheckDispatch+0x69
ffffe186`92261560 fffff806`11a18b6a : 00000701`8ec4a3b8 00000000`00000001 00000004`f03cde6a 00000000`00000000 : nt!KiPageFault+0x469
ffffe186`922616f0 fffff806`11a17274 : 00000000`00000000 00001f80`002600c0 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x177a
ffffe186`92261af0 fffff806`11bfa6b4 : ffffffff`00000000 ffffa781`e4f77340 ffff8f8a`9cedb080 00000000`00000900 : nt!PoIdle+0x374
ffffe186`92261c60 00000000`00000000 : ffffe186`92262000 ffffe186`9225c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdleExecuteTransition+177a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1081
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 177a
FAILURE_BUCKET_ID: AV_nt!PpmIdleExecuteTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0ced0187-972d-f83e-de87-663d75806c32}
Followup: MachineOwner
---------
Also der Arbeitsspeicher selber ist es zumindest nicht, dennoch kann es ja der RAM Slot am Mainboard oder ähnliches sein :/
Hab jetzt mit DDU den AMD Treiber runter und werde berichten ob Blue Screens kommen. Was soll ich aber machen wenn wirklich der Treiber verantwortlich ist?
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\dammy\AppData\Local\Temp\Rar$DIa10800.42532\062321-6156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`11800000 PsLoadedModuleList = 0xfffff806`1242a290
Debug session time: Wed Jun 23 23:17:32.154 2021 (UTC + 2:00)
System Uptime: 0 days 0:35:20.804
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`11bf6b90 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe186`92261420=000000000000000a
5: kd> !analyze -v
*******************************************************************************
- *
- Bugcheck Analysis *
- *
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000003134, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80611a18b6a, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2968
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7806
Key : Analysis.Init.CPU.mSec
Value: 328
Key : Analysis.Init.Elapsed.mSec
Value: 22458
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 3134
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80611a18b6a
READ_ADDRESS: fffff806124fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000003134
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe18692261560 -- (.trap 0xffffe18692261560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff78000000320 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80611a18b6a rsp=ffffe186922616f0 rbp=0000000000000000
r8=0000000000021233 r9=0000000000000000 r10=0000fffff80611ac
r11=ffff977ff3c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x177a:
fffff806`11a18b6a 418b9534310000 mov edx,dword ptr [r13+3134h] ds:00000000`00003134=????????
Resetting default scope
STACK_TEXT:
ffffe186`92261418 fffff806`11c08b69 : 00000000`0000000a 00000000`00003134 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffe186`92261420 fffff806`11c04e69 : fffff806`11b62cb0 fffff806`11ae260b fffff806`11b62c90 fffff806`11ada397 : nt!KiBugCheckDispatch+0x69
ffffe186`92261560 fffff806`11a18b6a : 00000701`8ec4a3b8 00000000`00000001 00000004`f03cde6a 00000000`00000000 : nt!KiPageFault+0x469
ffffe186`922616f0 fffff806`11a17274 : 00000000`00000000 00001f80`002600c0 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x177a
ffffe186`92261af0 fffff806`11bfa6b4 : ffffffff`00000000 ffffa781`e4f77340 ffff8f8a`9cedb080 00000000`00000900 : nt!PoIdle+0x374
ffffe186`92261c60 00000000`00000000 : ffffe186`92262000 ffffe186`9225c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdleExecuteTransition+177a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1081
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 177a
FAILURE_BUCKET_ID: AV_nt!PpmIdleExecuteTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0ced0187-972d-f83e-de87-663d75806c32}
Followup: MachineOwner
---------
Also der Arbeitsspeicher selber ist es zumindest nicht, dennoch kann es ja der RAM Slot am Mainboard oder ähnliches sein :/
Hab jetzt mit DDU den AMD Treiber runter und werde berichten ob Blue Screens kommen. Was soll ich aber machen wenn wirklich der Treiber verantwortlich ist?