Ik krijg ongeveer per dag 1 bsod. Soms 2 dagen niet. Dan ineens 2 in 5 min. Het verschilt nogal. Ik dacht eerst dat het aan de hardware lag. Ik heb memtest86+ 12 uur gedraaid en geen errors
. Verder heb ik geen rare drivers of iets geïnstalleerd wat dit kan veroorzaken. Kan iemand mij helpen?
Mijn hardware:
Beetje lang bericht.
Als er nog meer informatie nodig is?
Mijn hardware:
Code:
Veld Waarde
CPU-Eigenschappen
CPU Type DualCore Intel Core 2 Duo E7400
CPU Aanduiding Wolfdale-3M
CPU stepping R0
Engineering Sample Nee
CPUID CPU Naam Intel(R) Core(TM)2 Duo CPU E7400 @ 2.80GHz
CPUID Revisie 0001067Ah
CPU VID 1.2875 V
CPU snelheid
CPU Klok 2802.7 MHz (origineel: 2800 MHz)
CPU Multiplier 10.5x
CPU FSB 266.9 MHz (origineel: 266 MHz)
Geheugenbus 400.4 MHz
DRAM:FSB verhouding 12:8
CPU Cache
L1 Code Cache 32 KB per core
L1 Data cache 32 KB per core
L2 Cache 3 MB (On-Die, ECC, ASC, Full-Speed)
Moederbordeigenschappen
Moederbord ID 64-0100-000001-00101111-111108-Bearlake$0AAAA000_A7360IMS V1.10 111108
Moederbordnaam MSI P35 Neo (MS-7360) (2 PCI, 3 PCI-E x1, 1 PCI-E x16, 4 DDR2 DIMM, Audio, Gigabit LAN)
Chipseteigenschappen
Moederbord Chipset Intel Bearlake P35
Geheugeninstellingen 5-5-5-18 (CL-RCD-RP-RAS)
Command Rate (CR) 2T
DIMM2: Kingston " 2 GB DDR2-800 DDR2 SDRAM (5-5-5-18 @ 400 Mhz) (4-4-4-12 @ 266 Mhz) (3-3-3-9 @ 200 Mhz)
DIMM4: Kingston " 2 GB DDR2-800 DDR2 SDRAM (5-5-5-18 @ 400 Mhz) (4-4-4-12 @ 266 Mhz) (3-3-3-9 @ 200 Mhz)
BIOS Eigenschappen
Datum Systeem BIOS 11/11/08
Datum Video BIOS 01/09/08
DMI BIOS Versie V1.10
Grafische Processor Eigenschappen
Video kaart nVIDIA GeForce 8800 GT
GPU Codenaam G92GT (PCI Express 2.0 x16 10DE / 0611, Rev A2)
GPU Klok (Geometric Domain) 602 Mhz (origineel: 600 MHz)
GPU Klok (Shader Domain) 1512 Mhz (origineel: 1500 MHz)
Geheugenklok 900 Mhz (origineel: 900 MHz)
bron: everest ultimate edition.
Verder heb ik hier de 5 recenste minidumps:
mindump1/////////////////////////////////////////////////////////////////////////////////
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\111810-16843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*your local folder for symbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0b000 PsLoadedModuleList = 0xfffff800`02c48e50
Debug session time: Thu Nov 18 16:47:08.989 2010 (UTC + 1:00)
System Uptime: 0 days 2:07:07.629
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa801dbe5c80, 5, 1, fffff88004100197}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : sptd.sys ( sptd+41192 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa801dbe5c80, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88004100197, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb30e0
fffffa801dbe5c80
CURRENT_IRQL: 5
FAULTING_IP:
+3061613762363632
fffff880`04100197 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f1b860 -- (.trap 0xfffff88002f1b860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a2128901 rbx=0000000000000000 rcx=fffffa8004b55780
rdx=fffffa80047b5050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004100197 rsp=fffff88002f1b9f0 rbp=fffff88003d8f254
r8=fffff88002f1ba68 r9=0000000000000000 r10=00000000000048f0
r11=fffff880084c5a90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff880`04100197 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a7aca9 to fffff80002a7b740
STACK_TEXT:
fffff880`02f1b718 fffff800`02a7aca9 : 00000000`0000000a fffffa80`1dbe5c80 00000000`00000005 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f1b720 fffff800`02a79920 : 00000000`00000002 fffffa80`04f84000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b860 fffff880`04100197 : fffff880`03d8f259 fffff880`01108192 fffffa80`046a6000 fffff880`00db0b34 : nt!KiPageFault+0x260
fffff880`02f1b9f0 fffff880`03d8f259 : fffff880`01108192 fffffa80`046a6000 fffff880`00db0b34 fffff880`02f1ba68 : 0xfffff880`04100197
fffff880`02f1b9f8 fffff880`01108192 : fffffa80`046a6000 fffff880`00db0b34 fffff880`02f1ba68 00000000`00000000 : USBPORT!USBPORT_InterruptService+0x5
fffff880`02f1ba00 fffffa80`046a6000 : fffff880`00db0b34 fffff880`02f1ba68 00000000`00000000 fffffa80`05155200 : sptd+0x41192
fffff880`02f1ba08 fffff880`00db0b34 : fffff880`02f1ba68 00000000`00000000 fffffa80`05155200 fffffa80`04b55780 : 0xfffffa80`046a6000
fffff880`02f1ba10 fffff880`02f1ba68 : 00000000`00000000 fffffa80`05155200 fffffa80`04b55780 00000000`00000000 : ataport!IdePortInterrupt
fffff880`02f1ba18 00000000`00000000 : fffffa80`05155200 fffffa80`04b55780 00000000`00000000 fffffa80`04f8b5d3 : 0xfffff880`02f1ba68
STACK_COMMAND: kb
FOLLOWUP_IP:
sptd+41192
fffff880`01108192 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: sptd+41192
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: sptd
IMAGE_NAME: sptd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ad24632
FAILURE_BUCKET_ID: X64_0xD1_sptd+41192
BUCKET_ID: X64_0xD1_sptd+41192
Followup: MachineOwner
---------
Minidump2////////////////////////////////////////////////////////////////
Loading Dump File [C:\Windows\Minidump\111810-15953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*your local folder for symbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a15000 PsLoadedModuleList = 0xfffff800`02c52e50
Debug session time: Wed Nov 17 23:51:56.978 2010 (UTC + 1:00)
System Uptime: 0 days 2:24:44.619
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff9600022eb40, fffff8800a31dcc0, 0}
Probably caused by : win32k.sys ( win32k!GreDrawStream+178 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff9600022eb40, Address of the instruction which caused the bugcheck
Arg3: fffff8800a31dcc0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!GreDrawStream+178
fffff960`0022eb40 837f1400 cmp dword ptr [rdi+14h],0
CONTEXT: fffff8800a31dcc0 -- (.cxr 0xfffff8800a31dcc0)
rax=0000000000000008 rbx=000000000000003c rcx=000000000000003c
rdx=0000000000000000 rsi=fffff900c1b2dbe0 rdi=fffff8800a31e8d4
rip=fffff9600022eb40 rsp=fffff8800a31e690 rbp=fffff900c0000de0
r8=fffff900c200fc90 r9=0000000000000000 r10=0000000000000001
r11=0000000000000006 r12=fffff900c1b2df20 r13=fffff900c200fc90
r14=fffff900c0000de0 r15=fffff900c0000750
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210282
win32k!GreDrawStream+0x178:
fffff960`0022eb40 837f1400 cmp dword ptr [rdi+14h],0 ds:002b:fffff880`0a31e8e8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Game_Maker.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff9600022eb40
STACK_TEXT:
fffff880`0a31e690 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!GreDrawStream+0x178
FOLLOWUP_IP:
win32k!GreDrawStream+178
fffff960`0022eb40 837f1400 cmp dword ptr [rdi+14h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!GreDrawStream+178
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c
STACK_COMMAND: .cxr 0xfffff8800a31dcc0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!GreDrawStream+178
BUCKET_ID: X64_0x3B_win32k!GreDrawStream+178
Followup: MachineOwner
---------
mindump3/////////////////////////////////////////////////////////////////////////////////////
Loading Dump File [C:\Windows\Minidump\111710-18640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*your local folder for symbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Wed Nov 17 18:13:04.355 2010 (UTC + 1:00)
System Uptime: 0 days 0:46:23.011
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c000001d, fffff96000152762, fffff88009c8acc0, 0}
Probably caused by : hardware ( win32k!CalcVisRgn+2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff96000152762, Address of the instruction which caused the bugcheck
Arg3: fffff88009c8acc0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
win32k!CalcVisRgn+2
fffff960`00152762 5c pop rsp
CONTEXT: fffff88009c8acc0 -- (.cxr 0xfffff88009c8acc0)
rax=fffff900c06064b0 rbx=fffff900c06064b0 rcx=fffff900c1d3d1e0
rdx=fffff900c06064b0 rsi=fffff900c1d3d1e0 rdi=00000000ffffffff
rip=fffff96000152762 rsp=fffff88009c8b698 rbp=fffff900c00c0010
r8=fffff900c06064b0 r9=0000000000004411 r10=fffff900c202ba70
r11=fffff900c1d3d140 r12=0000000000000001 r13=fffff900c01ef3a0
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210282
win32k!CalcVisRgn+0x2:
fffff960`00152762 5c pop rsp
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Game_Maker.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
win32k!CalcVisRgn+2
fffff960`00152762 5c pop rsp
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff96000152762
STACK_TEXT:
fffff880`09c8b698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!CalcVisRgn+0x2
FOLLOWUP_IP:
win32k!CalcVisRgn+2
fffff960`00152762 5c pop rsp
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!CalcVisRgn+2
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff88009c8acc0 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
minidump 4/////////////////////////////////////////////////////////////
Probably caused by : hardware ( win32k!CalcVisRgn+2 )
Followup: MachineOwner
---------
Loading Dump File [C:\Windows\Minidump\111710-18156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*your local folder for symbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Wed Nov 17 17:25:22.355 2010 (UTC + 1:00)
System Uptime: 0 days 0:52:10.011
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 406f8, fffffa80049e1040}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffffa80049e1040
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002a72ca9 to fffff80002a73740
STACK_TEXT:
fffff800`04136d28 fffff800`02a72ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`04136d30 fffff800`02a71172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04136e70 fffffa80`049e1040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff800`0413e3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`049e1040
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02a71172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
Minidump5/////////////////////////////////////////////////////////////////////////////////////
Loading Dump File [C:\Windows\Minidump\111510-17937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*your local folder for symbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a57000 PsLoadedModuleList = 0xfffff800`02c94e50
Debug session time: Mon Nov 15 22:25:43.726 2010 (UTC + 1:00)
System Uptime: 0 days 0:27:21.367
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff8001bda4fb1, d, 1, fffff80002a21f60}
Unable to load image \SystemRoot\system32\DRIVERS\intelppm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for intelppm.sys
*** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8001bda4fb1, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a21f60, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cff0e0
fffff8001bda4fb1
CURRENT_IRQL: d
FAULTING_IP:
hal!HalpRtcClockInterrupt+0
fffff800`02a21f60 48895c2408 mov qword ptr [rsp+8],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80004133920 -- (.trap 0xfffff80004133920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80004133ac0 rbx=0000000000000000 rcx=fffff80002a3d3c0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a21f60 rsp=fffff80004133ab8 rbp=fffff80004133b40
r8=fffff80002c4fc40 r9=00000000f008072b r10=0000000000016181
r11=fffff80002c41e00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalpRtcClockInterrupt:
fffff800`02a21f60 48895c2408 mov qword ptr [rsp+8],rbx ss:0018:fffff800`04133ac0=fffffa8005065480
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac6ca9 to fffff80002ac7740
STACK_TEXT:
fffff800`041337d8 fffff800`02ac6ca9 : 00000000`0000000a fffff800`1bda4fb1 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
fffff800`041337e0 fffff800`02ac5920 : 00000000`00000057 00000000`00000000 fffffa80`04e4c9f0 fffff880`04d082dc : nt!KiBugCheckDispatch+0x69
fffff800`04133920 fffff800`02a21f60 : fffff800`02ac3c33 fffffa80`05065480 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff800`04133ab8 fffff800`02ac3c33 : fffffa80`05065480 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalpRtcClockInterrupt
fffff800`04133ac0 fffff880`03bd69c2 : fffff800`02ad524a 00000000`0029c3d5 fffffa80`051f3598 fffff800`02c4fc40 : nt!KiInterruptDispatchNoLock+0x163
fffff800`04133c58 fffff800`02ad524a : 00000000`0029c3d5 fffffa80`051f3598 fffff800`02c4fc40 00000000`00000001 : intelppm+0x39c2
fffff800`04133c60 fffff800`02acfebc : fffff800`02c41e80 fffff800`00000000 00000000`00000000 fffff880`0481fef8 : nt!PoIdle+0x53a
fffff800`04133d40 00000000`00000000 : fffff800`04134000 fffff800`0412e000 fffff800`04133d00 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ac5920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
////////////////////////////////////////////////////////////////////////////////////////////////
Als er nog meer informatie nodig is?
Laatst bewerkt door een moderator: