Auch was im Hintergrund läuft könnte der Auslöser sein natürlich.Das Programm läuft ja weiter.
PROCESS_NAME: LeagueClient.exe
Kann den Debugger auch nicht so richtig auswerten,bin da auch kein Profi.
So sieht das aus,damit du mal einen Überblick bekommst:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801644eed0b, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.250 (WinBuild.160101.0800)
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P2.20
BIOS_DATE: 08/03/2015
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: H87 Pro4
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801644eed0b
READ_ADDRESS: fffff8016487c358: Unable to get MiVisibleState
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiRetireDpcList+44b
fffff801`644eed0b 48394a08 cmp qword ptr [rdx+8],rcx
CPU_COUNT: 4
CPU_MHZ: c7f
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: LeagueClient.exe
ANALYSIS_SESSION_HOST:
ANALYSIS_SESSION_TIME: 05-06-2017 22:24:30.0796
ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
DPC_STACK_BASE: FFFFDC81D97EDFB0
TRAP_FRAME: ffffdc81d97edc20 -- (.trap 0xffffdc81d97edc20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb68af40f3210
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801644eed0b rsp=ffffdc81d97eddb0 rbp=0000000000015604
r8=fffff80162e4f800 r9=ffffb68af40f31f0 r10=0000000557d08af1
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiRetireDpcList+0x44b:
fffff801`644eed0b 48394a08 cmp qword ptr [rdx+8],rcx ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801646123a9 to fffff80164606fd0
STACK_TEXT:
ffffdc81`d97edad8 fffff801`646123a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffdc81`d97edae0 fffff801`6461097d : 00000000`00000002 ffffb68a`f19e5dc8 00000000`00000f44 00000000`00400a02 : nt!KiBugCheckDispatch+0x69
ffffdc81`d97edc20 fffff801`644eed0b : ffffdc81`d97c0180 00000000`002fab7d fffff801`62e4fb80 00000000`0001560c : nt!KiPageFault+0x23d
ffffdc81`d97eddb0 fffff801`6460c0a5 : 00000000`00000000 ffffdc81`d97c0180 ffffdc81`dab74b80 ffffb68a`f02c4d00 : nt!KiRetireDpcList+0x44b
ffffdc81`d97edfb0 fffff801`6460beb0 : 00000000`0a551720 00000000`0a93062c 00000000`00000000 00000000`004c8000 : nt!KxRetireDpcList+0x5
ffffdc81`dab74ac0 fffff801`6460a905 : 00000000`699f4600 fffff801`64608b31 ffffb68a`fa77f7c0 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffdc81`dab74af0 fffff801`64608b31 : ffffb68a`fa77f7c0 00000000`00000000 ffffdc81`dab74ad8 ffffb68a`f97ac080 : nt!KiDpcInterruptBypass+0x25
ffffdc81`dab74b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: f33f8d204f6179cc85c5c311052827a56bdd9a79
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9a669d52ddd7b4f30c30523db15e579f1c6072b0
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KiRetireDpcList+44b
fffff801`644eed0b 48394a08 cmp qword ptr [rdx+8],rcx
FAULT_INSTR_CODE: 84a3948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiRetireDpcList+44b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 58f6fd47
IMAGE_VERSION: 10.0.15063.250
BUCKET_ID_FUNC_OFFSET: 44b
FAILURE_BUCKET_ID: AV_nt!KiRetireDpcList
BUCKET_ID: AV_nt!KiRetireDpcList
PRIMARY_PROBLEM_CLASS: AV_nt!KiRetireDpcList
TARGET_TIME: 2017-05-06T19:16:21.000Z
OSBUILD: 15063
OSSERVICEPACK: 250
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-04-19 08:01:43
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.250
ANALYSIS_SESSION_ELAPSED_TIME: 8d6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiretiredpclist
FAILURE_ID_HASH: {ed0bb485-7f7e-1f95-20ce-1dac811ad862}
Followup: MachineOwner
---------