Hallo und gutes neues Jahr allerseits!
Ich habe ein frisch installiertes Windows 10 Pro auf einem Intel Core i7 - 4770 (64Bit) PC.
NVIDIA Grafikkarte
Samsung SSD120 GB
Hatte heute einen Blue Screen.
Die DMP Datei habe ich mit Windows Driver Kit 10 über Open Crash DUMP geöffnet
Kann aber den Fehler nicht genau erkennen und bitte deswegen um Hilfe!
Bin für Unterstützung dakbar
mfg
Thomas
Hier der DUMP:
---------------------------------------------------------------------------------------------------------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ehman\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Executable search path is:
Windows 10 Kernel Version 14393 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.576.amd64fre.rs1_release_inmarket.161208-2252
Machine Name:
Kernel base = 0xfffff800`7e20a000 PsLoadedModuleList = 0xfffff800`7e50f060
Debug session time: Thu Jan 5 12:49:25.177 2017 (UTC + 1:00)
System Uptime: 1 days 14:38:25.340
Loading Kernel Symbols
...............................................................
.............................................................Page 104a43 not present in the dump file. Type ".hh dbgerr004" for details
...
......................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000008e`1d61d018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Page 104a43 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3538a )
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8007e398f1a, Address of the instruction which caused the bugcheck
Arg3: ffffc4804ab3bea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
------------------
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
Page 1000 not present in the dump file. Type ".hh dbgerr004" for details
nt! ?? ::FNODOBFM::`string'+3538a
fffff800`7e398f1a 488b5208 mov rdx,qword ptr [rdx+8]
rax=0000000000000000 rbx=ffff838133e27040 rcx=ffff838133e27040
rdx=0000000000000040 rsi=0000000000000000 rdi=ffff838133e27040
rip=fffff8007e398f1a rsp=ffffc4804ab3c8b0 rbp=ffffc4804ab3c980
r8=0000000000000001 r9=0000000000000000 r10=7fff83812f9bd500
r11=ffffc4803c480180 r12=0000000000008000 r13=ffffffffffffffff
r14=ffff8381306e2080 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt! ?? ::FNODOBFM::`string'+0x3538a:
fffff800`7e398f1a 488b5208 mov rdx,qword ptr [rdx+8] ds:002b:00000000`00000048=????????????????
Resetting default scope
ffffc480`4ab3c8b0 fffff800`7e6c63b0 : ffff8381`33e27628 00000000`00000000 0000008e`1d6fc000 ffff8381`33e27040 : nt! ?? ::FNODOBFM::`string'+0x3538a
ffffc480`4ab3c940 fffff800`7e6c16be : 00000000`00000000 ffff8381`33e27040 00000000`00000000 ffff8381`306e2080 : nt!PspExitThread+0x328
ffffc480`4ab3ca80 fffff800`7e6462a0 : ffff8381`33e27040 00000000`00000000 ffff8381`33e27040 00000000`00000000 : nt!PspTerminateThreadByPointer+0x96
ffffc480`4ab3cac0 fffff800`7e35f393 : ffff8381`33e27040 ffffc480`4ab3cb80 00000000`00000010 ffff8381`2cf5c130 : nt!NtTerminateThread+0x44
ffffc480`4ab3cb00 00007fff`0e6b6b34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000008e`246ff798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0e6b6b34
THREAD_SHA1_HASH_MOD_FUNC: ae9a019bd67f035486f0e8ec73779782813a4f11
nt! ?? ::FNODOBFM::`string'+3538a
fffff800`7e398f1a 488b5208 mov rdx,qword ptr [rdx+8]
---------