Bluscreenproblemchen

qwertzz

Schraubenverwechsler(in)
Ich habe mir gestern einen neuen Rechner zusammengebaut (ich hoffe hier bin ich einigermaßen richtig), heute dann Windows 7 drauf und ihn dann ausgiebig getestet. In unregelmäßigen Abständen kriege ich immer wieder den selben Bluescreen, ich kanns mir nicht erklären:huh:

Kann mir jemand helfen??

Die Daten:
AMD Phenom II x4 955 BE
MSI 870-C45
8Gb Ram Corsair XMS
Zotac Geforce GTX 560ti AMP
http://img88.imageshack.us/img88/7440/photo6a8bdb6ece32537188.jpg

http://img98.imageshack.us/img98/7023/photo4690f734a457a4f7f7.jpg
 
Poste bitte mal CPU-Z-Screenshots (Reiter CPU, Board, Memory, SPD)

Hast Du eine SSD? Befinden sich im Ordner c:\Windows\Minidump Dateien?

Sind alle Treiber, BIOS, Windows-Update auf dem neuesten Stand?
 
Die Latenzen des RAM würde ich gemäß dem XMP-Profil mit 9-9-9-24-41-2T einstellen. Wie hoch ist die RAM Spannung im BIOS eingestellt? Rest sieht soweit ok aus.
 
Die Latenzen des RAM würde ich gemäß dem XMP-Profil mit 9-9-9-24-41-2T einstellen. Wie hoch ist die RAM Spannung im BIOS eingestellt?
Und das stelle ich wo ein? (ich komm mir grad ein bisschen wie ein Hinterwäldler vor :redface:)
Bios muss ich nachschauen

Der Debugger ist fertig:
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80002fb8617, address which referenced memory

Debugging Details:
------------------


BUGCHECK_STR: 0xC5_2

CURRENT_IRQL: 2

FAULTING_IP:
nt!ExAllocatePoolWithTag+537
fffff800`02fb8617 48895808 mov qword ptr [rax+8],rbx

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

TRAP_FRAME: fffff880031a0e80 -- (.trap 0xfffff880031a0e80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80088800d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002fb8617 rsp=fffff880031a1010 rbp=0000000000001000
r8=0000000000000000 r9=fffff800030148c0 r10=fffff800030146c8
r11=fffff880031a12d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExAllocatePoolWithTag+0x537:
fffff800`02fb8617 48895808 mov qword ptr [rax+8],rbx ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002e8cbe9 to fffff80002e8d640

STACK_TEXT:
fffff880`031a0d38 fffff800`02e8cbe9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`031a0d40 fffff800`02e8b860 : 00000000`00000000 fffffa80`07597900 00000000`00000001 fffff800`030148c0 : nt!KiBugCheckDispatch+0x69
fffff880`031a0e80 fffff800`02fb8617 : fffff880`031a1050 fffff880`0124239e fffff880`031a1050 fffffa80`0775e990 : nt!KiPageFault+0x260
fffff880`031a1010 fffff800`02ea8748 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff800`00000000 : nt!ExAllocatePoolWithTag+0x537
fffff880`031a1100 fffff880`0123e2a6 : fffffa80`0705b920 fffffa80`06f2bb60 00000000`00001000 fffffa80`06f29010 : nt!IoAllocateMdl+0x108
fffff880`031a1150 fffff880`0123e0ea : fffffa80`0705b920 fffffa80`06f29010 fffff880`031a1278 fffffa80`0705b920 : Ntfs!NtfsLockUserBuffer+0x52
fffff880`031a11a0 fffff880`0123d37c : fffffa80`06f29010 fffffa80`07597d80 fffff880`031a1270 00000000`00000000 : Ntfs!NtfsPrepareBuffers+0x6a
fffff880`031a1220 fffff880`012415f4 : fffffa80`0705b920 fffffa80`06f29010 00000000`00000000 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x1bc
fffff880`031a13a0 fffff880`012421a3 : fffffa80`0705b920 fffffa80`06f29010 fffff880`031a1500 fffff880`00001000 : Ntfs!NtfsCommonWrite+0x2d91
fffff880`031a1550 fffff880`0102cbcf : fffffa80`06f293b0 fffffa80`06f29010 fffffa80`06e46d30 00000000`00000001 : Ntfs!NtfsFsdWrite+0x1c3
fffff880`031a1610 fffff880`0102b6df : fffffa80`0758ede0 00000000`00000000 fffffa80`0758ed00 fffffa80`06f29010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`031a16a0 fffff800`0319571b : 00000000`00000001 fffffa80`09ea68d0 00000000`00000000 fffffa80`06f29010 : fltmgr!FltpDispatch+0xcf
fffff880`031a1700 fffff800`031a0183 : fffffa80`06f293f8 fffffa80`09a574e0 fffffa80`09ea68d0 fffff880`02f64180 : nt!IopSynchronousServiceTail+0xfb
fffff880`031a1770 fffff800`02e8c8d3 : 00000000`00000000 ffffffff`80000984 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x7e2
fffff880`031a1870 fffff800`02e88e70 : fffff800`0312cde3 fffffa80`0776a000 00000000`00001000 00000000`20204d43 : nt!KiSystemServiceCopyEnd+0x13
fffff880`031a1a78 fffff800`0312cde3 : fffffa80`0776a000 00000000`00001000 00000000`20204d43 fffffa80`09a574e0 : nt!KiServiceLinkage
fffff880`031a1a80 fffff800`0312ded3 : ffffffff`800006dc fffff8a0`0271e200 00000000`00000200 fffff880`031a1be0 : nt!CmpDoFileWrite+0x1f3
fffff880`031a1b40 fffff800`0312d469 : fffff880`00000000 00000000`00000084 00000000`00000420 fffff8a0`0210c000 : nt!CmpFileWrite+0x2f
fffff880`031a1b70 fffff800`0312d672 : 00000000`0007d000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HvWriteDirtyDataToHive+0x161
fffff880`031a1be0 fffff800`0311d6f7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`0338fdc0 : nt!HvOptimizedSyncHive+0x32
fffff880`031a1c10 fffff800`0311d859 : fffffa80`07516800 fffff880`031a1cb8 fffff800`0311d700 00000000`00000001 : nt!CmpDoFlushNextHive+0x197
fffff880`031a1c70 fffff800`02e97a21 : fffff800`0311d7b4 fffff800`03183f00 fffffa80`00000000 fffff800`0302a658 : nt!CmpLazyFlushWorker+0xa5
fffff880`031a1cb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpWorkerThread+0x111


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+537
fffff800`02fb8617 48895808 mov qword ptr [rax+8],rbx

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!ExAllocatePoolWithTag+537

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a

FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExAllocatePoolWithTag+537

BUCKET_ID: X64_0xC5_2_nt!ExAllocatePoolWithTag+537

Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002f086ad, The address that the exception occurred at
Arg3: fffff880033168c8, Exception Record Address
Arg4: fffff88003316120, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
nt! ?? ::FNODOBFM::`string'+4d8b5
fffff800`02f086ad 488b00 mov rax,qword ptr [rax]

EXCEPTION_RECORD: fffff880033168c8 -- (.exr 0xfffff880033168c8)
ExceptionAddress: fffff80002f086ad (nt! ?? ::FNODOBFM::`string'+0x000000000004d8b5)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff88003316120 -- (.cxr 0xfffff88003316120)
rax=310102d93100af7e rbx=0000000000000000 rcx=310102d93100af7e
rdx=fffffa8009e5f000 rsi=fffff88002f647f0 rdi=fffffa800a1b63f8
rip=fffff80002f086ad rsp=fffff88003316b00 rbp=0000000000000002
r8=fffff80002ffdca0 r9=fffffa800a1b63f8 r10=fffff880033168d0
r11=fffff80002e9ef20 r12=0000000000000001 r13=fffff88003316ba0
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt! ?? ::FNODOBFM::`string'+0x4d8b5:
fffff800`02f086ad 488b00 mov rax,qword ptr [rax] ds:002b:310102d9`3100af7e=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c00e8
ffffffffffffffff

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4d8b5
fffff800`02f086ad 488b00 mov rax,qword ptr [rax]

BUGCHECK_STR: 0x7E

LAST_CONTROL_TRANSFER: from fffff80002e7a206 to fffff80002f086ad

STACK_TEXT:
fffff880`03316b00 fffff800`02e7a206 : 00000000`00000072 00000000`00000000 fffffa80`00000000 00000000`00000008 : nt! ?? ::FNODOBFM::`string'+0x4d8b5
fffff880`03316b80 fffff800`02e7a6c3 : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03316bd0 fffff800`0312ccce : fffffa80`06b86680 00000000`00000080 fffffa80`06a979e0 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03316d40 fffff800`02e80fe6 : fffff880`02f64180 fffffa80`06b86680 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03316d80 00000000`00000000 : fffff880`03317000 fffff880`03311000 fffff880`03316700 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4d8b5

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a

STACK_COMMAND: .cxr 0xfffff88003316120 ; kb

FAILURE_BUCKET_ID: X64_0x7E_nt!_??_::FNODOBFM::_string_+4d8b5

BUCKET_ID: X64_0x7E_nt!_??_::FNODOBFM::_string_+4d8b5

Followup: MachineOwner
---------
 
Also, das Problem scheint sich von selbst gelöst zu haben. Seit ich die Latenzen manuell eingestellt habe ist alles stabil!
Danke für die Hilfe!:daumen:
 
Zurück