Bluescreen

PresiBoy

Kabelverknoter(in)
Huhu,
habe seit mehreren Tagen das Problem, dass mein Pc von selbst aus geht oder sich aufhängt.
Heute hatte ich zum ersten mal einen Bluescreen, war aber leider zu langsam um den Text mir merken zu können.

Nun habe ich die Dump Datei mal ausgewertet, kann aber mit memory_corruption nicht soviel anfangen.

Kann mir jemand vllt weiter helfen was zu tun ist?

Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\071017-6843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\symbols*Symbol information
Symbol search path is: SRV*C:\symbols*Symbol information
Executable search path is:
Windows 10 Kernel Version 15063 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`9108e000 PsLoadedModuleList = 0xfffff800`913da5a0
Debug session time: Mon Jul 10 16:54:59.743 2017 (UTC + 2:00)
System Uptime: 3 days 23:30:45.951
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
.........................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck FC, {ffffae8177662268, 8a0000010840a963, ffffae8177661830, 2}

Probably caused by : memory_corruption

Followup: memory_corruption
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffae8177662268, Virtual address for the attempted execute.
Arg2: 8a0000010840a963, PTE contents.
Arg3: ffffae8177661830, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.413 (WinBuild.160101.0800)

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P2.10

BIOS_DATE: 07/09/2014

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: H87 Pro4

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: ffffae8177662268

BUGCHECK_P2: 8a0000010840a963

BUGCHECK_P3: ffffae8177661830

BUGCHECK_P4: 2

CPU_COUNT: 4

CPU_MHZ: d47

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xFC

PROCESS_NAME: ts3client_win64.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-IP8HNVE

ANALYSIS_SESSION_TIME: 07-10-2017 17:49:52.0298

ANALYSIS_VERSION: 10.0.14321.1024 x86fre

TRAP_FRAME: ffffae8177661830 -- (.trap 0xffffae8177661830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff9400db6c0cf7
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffae8177662268 rsp=ffffae81776619c8 rbp=ffffae8177661f00
r8=ffffae81776619e0 r9=0000000000000000 r10=ffff9400db6c0cf0
r11=fffff80091324660 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffae81`77662268 050000c000 add eax,0C00000h
Resetting default scope

EXCEPTION_RECORD: ffffae8177662280 -- (.exr 0xffffae8177662280)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000002
ExceptionFlags: 00000000
NumberParameters: -444411776
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000000
Parameter[4]: 0000000000000000
Parameter[5]: 0000000000000000
Parameter[6]: 0000000000000000
Parameter[7]: 0000000000000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000000000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: 0000000000000000
Parameter[13]: fffff80091203d57
Parameter[14]: 0000000000000000

LAST_CONTROL_TRANSFER: from fffff80091254970 to fffff800911fa3f0

STACK_TEXT:
ffffae81`77661558 fffff800`91254970 : 00000000`000000fc ffffae81`77662268 8a000001`0840a963 ffffae81`77661830 : nt!KeBugCheckEx
ffffae81`77661560 fffff800`91119ada : 00000000`00000000 fffff800`913f81d8 ffff9400`db605ea0 00000000`001f0003 : nt!MiCheckSystemNxFault+0xb2154
ffffae81`776615a0 fffff800`9111b246 : 00000000`00000011 ffffae81`77662268 ffffae81`77661830 ffff9400`e582d080 : nt!MiSystemFault+0xa3a
ffffae81`77661640 fffff800`91203c72 : 00f4000f`00000ef4 ffff9400`db638450 00000000`001f0003 00f8002d`00000ef4 : nt!MmAccessFault+0xae6
ffffae81`77661830 ffffae81`77662268 : fffff800`910b90e0 ffff9400`db6c0dd0 00000000`00000889 01400030`00000e00 : nt!KiPageFault+0x132
ffffae81`776619c8 fffff800`910b90e0 : ffff9400`db6c0dd0 00000000`00000889 01400030`00000e00 ffff9400`db6c0cf0 : 0xffffae81`77662268
ffffae81`776619d0 fffff800`910b8af5 : ffffae81`77662268 ffffae81`77661fb0 ffffae81`77661ab0 ffffae81`77662268 : nt!KiPreprocessFault+0xb8
ffffae81`77661a80 fffff800`9120588e : ffffae81`77662280 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b5
ffffae81`77662130 fffff800`91203d57 : 00000000`00000000 00000000`00000001 00000000`00000004 ffffae81`77662590 : nt!KiExceptionDispatch+0xce
ffffae81`77662310 fffff800`9120690b : fffff800`910b7e52 00000000`00000000 00000000`00000000 fffff800`91526d6f : nt!KiPageFault+0x217
ffffae81`776624a0 fffff800`910b7e52 : 00000000`00000000 00000000`00000000 fffff800`91526d6f 00000000`00000000 : nt!memset+0xcb
ffffae81`776624a8 ffffae81`77662da8 : fffff800`910b90e0 00000000`00000000 fffff800`9111e7a6 00000000`00000000 : nt!KiOpDecode+0x2e
ffffae81`77662508 fffff800`910b90e0 : 00000000`00000000 fffff800`9111e7a6 00000000`00000000 00000000`00000000 : 0xffffae81`77662da8
ffffae81`77662510 fffff800`910b8af5 : ffffae81`77662da8 ffffae81`77662af0 ffffae81`776625f0 ffffae81`77662da8 : nt!KiPreprocessFault+0xb8
ffffae81`776625c0 fffff800`9120588e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b5
ffffae81`77662c70 fffff800`91203b34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
ffffae81`77662e50 fffff800`912068ca : fffff800`910b7e52 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
ffffae81`77662fe0 fffff800`910b7e52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0x8a
ffffae81`77662fe8 ffffae81`77663a58 : fffff800`910b90e0 fffff800`8fe01180 fffff800`910c2208 00000000`00000000 : nt!KiOpDecode+0x2e
ffffae81`77663048 fffff800`910b90e0 : fffff800`8fe01180 fffff800`910c2208 00000000`00000000 247d8fe7`ffffffff : 0xffffae81`77663a58
ffffae81`77663050 fffff800`910b8af5 : ffffae81`77663a58 ffffae81`776637a0 ffffae81`77663130 ffffae81`77663a58 : nt!KiPreprocessFault+0xb8
ffffae81`77663100 fffff800`9120588e : 00000000`00000000 000000dc`62f5ef78 00000000`00000000 ffffd400`0037fe5c : nt!KiDispatchException+0x1b5
ffffae81`77663920 fffff800`91203b34 : ffff9400`e4db8080 00000000`00000000 00000000`00000000 ffff9400`e76204b0 : nt!KiExceptionDispatch+0xce
ffffae81`77663b00 00007ffe`867b96e6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
000000dc`62f5f098 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`867b96e6


STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
5 errors : !nt (fffff8009111b31f-fffff800911204d8)
fffff8009111b310 00 00 00 41 ba 01 00 00 00 49 bb 00 00 00 00 *00 ...A.....I......
...
fffff800911204c0 00 48 bd 00 00 00 00 *00 *fe ff ff 41 bf 00 00 00 .H.........A....
fffff800911204d0 00 49 b9 00 00 00 00 80 *a4 ff ff 48 bf 00 00 00 .I.........H....

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE

TARGET_TIME: 2017-07-10T14:54:59.000Z

OSBUILD: 15063

OSSERVICEPACK: 413

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-06-03 10:53:36

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.413

ANALYSIS_SESSION_ELAPSED_TIME: 1f1d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_stride

FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup: memory_corruption
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffae8177662268, Virtual address for the attempted execute.
Arg2: 8a0000010840a963, PTE contents.
Arg3: ffffae8177661830, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.413 (WinBuild.160101.0800)

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P2.10

BIOS_DATE: 07/09/2014

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: H87 Pro4

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: ffffae8177662268

BUGCHECK_P2: 8a0000010840a963

BUGCHECK_P3: ffffae8177661830

BUGCHECK_P4: 2

CPU_COUNT: 4

CPU_MHZ: d47

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xFC

PROCESS_NAME: ts3client_win64.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-IP8HNVE

ANALYSIS_SESSION_TIME: 07-10-2017 17:50:03.0824

ANALYSIS_VERSION: 10.0.14321.1024 x86fre

TRAP_FRAME: ffffae8177661830 -- (.trap 0xffffae8177661830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff9400db6c0cf7
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffae8177662268 rsp=ffffae81776619c8 rbp=ffffae8177661f00
r8=ffffae81776619e0 r9=0000000000000000 r10=ffff9400db6c0cf0
r11=fffff80091324660 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffae81`77662268 050000c000 add eax,0C00000h
Resetting default scope

EXCEPTION_RECORD: ffffae8177662280 -- (.exr 0xffffae8177662280)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000002
ExceptionFlags: 00000000
NumberParameters: -444411776
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000000
Parameter[4]: 0000000000000000
Parameter[5]: 0000000000000000
Parameter[6]: 0000000000000000
Parameter[7]: 0000000000000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000000000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: 0000000000000000
Parameter[13]: fffff80091203d57
Parameter[14]: 0000000000000000

LAST_CONTROL_TRANSFER: from fffff80091254970 to fffff800911fa3f0

STACK_TEXT:
ffffae81`77661558 fffff800`91254970 : 00000000`000000fc ffffae81`77662268 8a000001`0840a963 ffffae81`77661830 : nt!KeBugCheckEx
ffffae81`77661560 fffff800`91119ada : 00000000`00000000 fffff800`913f81d8 ffff9400`db605ea0 00000000`001f0003 : nt!MiCheckSystemNxFault+0xb2154
ffffae81`776615a0 fffff800`9111b246 : 00000000`00000011 ffffae81`77662268 ffffae81`77661830 ffff9400`e582d080 : nt!MiSystemFault+0xa3a
ffffae81`77661640 fffff800`91203c72 : 00f4000f`00000ef4 ffff9400`db638450 00000000`001f0003 00f8002d`00000ef4 : nt!MmAccessFault+0xae6
ffffae81`77661830 ffffae81`77662268 : fffff800`910b90e0 ffff9400`db6c0dd0 00000000`00000889 01400030`00000e00 : nt!KiPageFault+0x132
ffffae81`776619c8 fffff800`910b90e0 : ffff9400`db6c0dd0 00000000`00000889 01400030`00000e00 ffff9400`db6c0cf0 : 0xffffae81`77662268
ffffae81`776619d0 fffff800`910b8af5 : ffffae81`77662268 ffffae81`77661fb0 ffffae81`77661ab0 ffffae81`77662268 : nt!KiPreprocessFault+0xb8
ffffae81`77661a80 fffff800`9120588e : ffffae81`77662280 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b5
ffffae81`77662130 fffff800`91203d57 : 00000000`00000000 00000000`00000001 00000000`00000004 ffffae81`77662590 : nt!KiExceptionDispatch+0xce
ffffae81`77662310 fffff800`9120690b : fffff800`910b7e52 00000000`00000000 00000000`00000000 fffff800`91526d6f : nt!KiPageFault+0x217
ffffae81`776624a0 fffff800`910b7e52 : 00000000`00000000 00000000`00000000 fffff800`91526d6f 00000000`00000000 : nt!memset+0xcb
ffffae81`776624a8 ffffae81`77662da8 : fffff800`910b90e0 00000000`00000000 fffff800`9111e7a6 00000000`00000000 : nt!KiOpDecode+0x2e
ffffae81`77662508 fffff800`910b90e0 : 00000000`00000000 fffff800`9111e7a6 00000000`00000000 00000000`00000000 : 0xffffae81`77662da8
ffffae81`77662510 fffff800`910b8af5 : ffffae81`77662da8 ffffae81`77662af0 ffffae81`776625f0 ffffae81`77662da8 : nt!KiPreprocessFault+0xb8
ffffae81`776625c0 fffff800`9120588e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b5
ffffae81`77662c70 fffff800`91203b34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
ffffae81`77662e50 fffff800`912068ca : fffff800`910b7e52 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
ffffae81`77662fe0 fffff800`910b7e52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0x8a
ffffae81`77662fe8 ffffae81`77663a58 : fffff800`910b90e0 fffff800`8fe01180 fffff800`910c2208 00000000`00000000 : nt!KiOpDecode+0x2e
ffffae81`77663048 fffff800`910b90e0 : fffff800`8fe01180 fffff800`910c2208 00000000`00000000 247d8fe7`ffffffff : 0xffffae81`77663a58
ffffae81`77663050 fffff800`910b8af5 : ffffae81`77663a58 ffffae81`776637a0 ffffae81`77663130 ffffae81`77663a58 : nt!KiPreprocessFault+0xb8
ffffae81`77663100 fffff800`9120588e : 00000000`00000000 000000dc`62f5ef78 00000000`00000000 ffffd400`0037fe5c : nt!KiDispatchException+0x1b5
ffffae81`77663920 fffff800`91203b34 : ffff9400`e4db8080 00000000`00000000 00000000`00000000 ffff9400`e76204b0 : nt!KiExceptionDispatch+0xce
ffffae81`77663b00 00007ffe`867b96e6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
000000dc`62f5f098 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`867b96e6


STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
5 errors : !nt (fffff8009111b31f-fffff800911204d8)
fffff8009111b310 00 00 00 41 ba 01 00 00 00 49 bb 00 00 00 00 *00 ...A.....I......
...
fffff800911204c0 00 48 bd 00 00 00 00 *00 *fe ff ff 41 bf 00 00 00 .H.........A....
fffff800911204d0 00 49 b9 00 00 00 00 80 *a4 ff ff 48 bf 00 00 00 .I.........H....

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE

TARGET_TIME: 2017-07-10T14:54:59.000Z

OSBUILD: 15063

OSSERVICEPACK: 413

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-06-03 10:53:36

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.413

ANALYSIS_SESSION_ELAPSED_TIME: 203d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_stride

FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup: memory_corruption
---------

Grüße
Marcel
 

Anhänge

  • CPU_GPU.jpg
    CPU_GPU.jpg
    292 KB · Aufrufe: 36
Eigentlich nicht. Der PC ist seit nehm Jahr genau so im Betrieb gewesen ohne große Probleme..
Sind aber mehrere Riegel drin, davon 2 etwas älter..
Kann ich rausfinden welcher von denen kaputt ist?
 
Zurück