Bluescreen Win7 HomePremium 64Bit

rensda

Cadet 1st Year
Registriert
Sep. 2011
Beiträge
8
AB und zu tritt bei mir dieser Bluescreen auf....
Hat da jemand eine Idee was das sein kann?


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {100060080, 2, 0, fffff80002ad1d75}

TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2
Probably caused by : ntkrnlmp.exe ( nt!KeSetEvent+1e3 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000100060080, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ad1d75, address which referenced memory

Debugging Details:
------------------

TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d00100
GetUlongFromAddress: unable to read from fffff80002d001c0
0000000100060080 Nonpaged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!KeSetEvent+1e3
fffff800`02ad1d75 488b00 mov rax,qword ptr [rax]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: OUTLOOK.EXE

TRAP_FRAME: fffff88002932750 -- (.trap 0xfffff88002932750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000100060080 rbx=0000000000000000 rcx=fffff80002c55bf8
rdx=fffff80002c55bf0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ad1d75 rsp=fffff880029328e0 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=0000000100060080
r11=fffffa8003827000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KeSetEvent+0x1e3:
fffff800`02ad1d75 488b00 mov rax,qword ptr [rax] ds:00000001`00060080=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002acd1e9 to fffff80002acdc40

STACK_TEXT:
fffff880`02932608 fffff800`02acd1e9 : 00000000`0000000a 00000001`00060080 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02932610 fffff800`02acbe60 : 00000014`00000000 fffff680`0001c000 fffff6fb`82200148 fffff800`02c55bf0 : nt!KiBugCheckDispatch+0x69
fffff880`02932750 fffff800`02ad1d75 : fffff800`02c55bf0 00000000`00000000 00000000`00000000 fffff800`02c43e80 : nt!KiPageFault+0x260
fffff880`029328e0 fffff800`02bce8a2 : fffffa80`00000000 fffff800`00000000 00000000`00000a00 fffffa80`04c45b60 : nt!KeSetEvent+0x1e3
fffff880`02932950 fffff800`02bcecc1 : 00000000`00000410 00000000`00450001 00000000`00000000 00000000`00000000 : nt!MiQueuePageAccessLog+0xb2
fffff880`02932980 fffff800`02b424d5 : fffffa80`02410b30 00000003`00000000 00000000`0045f001 fffffa80`031719a0 : nt!MiEmptyPageAccessLog+0x271
fffff880`029329f0 fffff800`02de5221 : fffffa80`02ed3550 00000000`00000001 fffffa80`031719a0 fffffa80`031719a0 : nt! ?? ::FNODOBFM::`string'+0x3b9a6
fffff880`02932b10 fffff800`02de5623 : fffff880`00000000 00000000`03c60000 fffffa80`00000001 fffff880`02932c01 : nt!MiUnmapViewOfSection+0x1b1
fffff880`02932bd0 fffff800`02acced3 : fffffa80`026a0060 00000000`0000056c fffffa80`02410b30 fffffa80`0261b520 : nt!NtUnmapViewOfSection+0x5f
fffff880`02932c20 00000000`777515ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0009dd48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777515ba


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!KeSetEvent+1e3
fffff800`02ad1d75 488b00 mov rax,qword ptr [rax]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KeSetEvent+1e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3

FAILURE_BUCKET_ID: X64_0xA_nt!KeSetEvent+1e3

BUCKET_ID: X64_0xA_nt!KeSetEvent+1e3

Followup: MachineOwner
---------
 
Zurück
Oben