Hallo mein PC fährt seit heute auch immer ganz unerwartet runter und startet sich dann wieder neu!
Könnt Ihr mir da weiter helfen?
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\073014-28657-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`0324b000 PsLoadedModuleList = 0xfffff800`0348e890
Debug session time: Wed Jul 30 20:22:11.861 2014 (UTC + 2:00)
System Uptime: 0 days 0:08:38.359
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa80064d3700, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+35148 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80064d3700
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: ngen.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003331e18 to fffff800032c0bc0
STACK_TEXT:
fffff880`09956198 fffff800`03331e18 : 00000000`0000001a 00000000`00041790 fffffa80`064d3700 00000000`0000ffff : nt!KeBugCheckEx
fffff880`099561a0 fffff800`03291892 : fffffa80`072e1b30 fffffa80`00000008 fffff8a0`000000bb 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x35148
fffff880`09956a50 fffff800`0359605a : fffff8a0`101058f0 00000000`00000001 00000000`00000000 fffffa80`072f6750 : nt!MmCleanProcessAddressSpace+0x96
fffff880`09956aa0 fffff800`03578f48 : 00000000`00000000 00000000`00000001 00000000`fffdb000 00000000`00000000 : nt!PspExitThread+0x56a
fffff880`09956ba0 fffff800`032bfe53 : fffffa80`072e1b30 00000000`00000000 fffffa80`072f6750 00000000`00000000 : nt!NtTerminateProcess+0x138
fffff880`09956c20 00000000`774c157a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0026dd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774c157a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+35148
fffff800`03331e18 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35148
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35148
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35148
Followup: MachineOwner
---------