Bitte mal folgende Analyse durchführen und das Ergebniss von "!analyze -v" hier posten
http://www.winfaq.de/faq_html/Content/tip1500/onlinefaq.php?h=tip1999.htm
Hier das Ergebnis, nach 3 Blue screens innerhalb von 10 min.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000001, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: unable to get MiSystemVaType - probably bad symbols
0000000000000001
CURRENT_IRQL: 2
FAULTING_IP:
+1
00000000`00000001 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from fffff80002c90e69 to fffff80002c918c0
STACK_TEXT:
fffff800`00ba0358 fffff800`02c90e69 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`00ba0360 fffff800`02c8fae0 : 00000000`00000000 fffff880`04018235 fffffa80`04ccf078 fffff800`02e10e80 : nt!KiBugCheckDispatch+0x69
fffff800`00ba04a0 00000000`00000001 : fffff800`02d87648 00000000`04a01944 fffff800`02e10e80 fffffa80`04715f50 : nt!KiPageFault+0x260
fffff800`00ba0638 fffff800`02d87648 : 00000000`04a01944 fffff800`02e10e80 fffffa80`04715f50 fffffa80`04715f08 : 0x1
fffff800`00ba0640 fffff800`02d879ab : fffffa80`00000000 00000000`00000000 00000000`04a01944 00000000`0117f101 : nt!PpmPerfRecordUtility+0xc8
fffff800`00ba06b0 fffff800`02d4b8bc : 00000000`00000000 00000000`00000000 fffff800`02e10e80 fffff800`00ba0830 : nt!PpmCheckRecordAllUtility+0xfb
fffff800`00ba0740 fffff800`02d88400 : 00000000`00000000 fffff800`00ba0830 00000000`00000000 fffff800`02c97e4a : nt!PpmCheckRun+0x8c
fffff800`00ba0770 fffff800`02c9d72c : 00000000`00000000 fffffa80`00000000 fffffa80`40032a00 00000000`00000000 : nt!PpmCheckStart+0x40
fffff800`00ba07a0 fffff800`02c9d5c6 : fffffa80`046eec58 fffffa80`046eec58 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x6c
fffff800`00ba0810 fffff800`02c9d4ae : 00000000`1557307e fffff800`00ba0e88 00000000`000008f7 fffff800`02e15168 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00ba0e60 fffff800`02c9d297 : fffff800`02e10ec5 fffffa80`000008f7 fffffa80`03dbb050 00000000`000000f7 : nt!KiTimerExpiration+0x1be
fffff800`00ba0f00 fffff800`02c94335 : 00000000`00000000 fffffa80`06934b50 00000000`00000000 fffff880`01092f78 : nt!KiRetireDpcList+0x277
fffff800`00ba0fb0 fffff800`02c9414c : 00000000`027f027c fffff800`03213895 fffff800`032393c0 fffff880`0633aca0 : nt!KxRetireDpcList+0x5
fffff880`0633abe0 fffff800`02cdc853 : fffff800`02c8de40 fffff800`02c8deac 00000000`0bd10040 fffff880`0633ac01 : nt!KiDispatchInterruptContinue
fffff880`0633ac10 fffff800`02c8deac : 00000000`0bd10040 fffff880`0633ac01 fffffa80`058a4c00 00000000`0012f601 : nt!KiDpcInterruptBypass+0x13
fffff880`0633ac20 00000000`0bad033f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLock+0x1fc
00000000`019fc8f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbad033f
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02c8fae0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiPageFault+260
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 556356e8
STACK_COMMAND: kb
FAILURE_BUCKET_ID: X64_0xD1_W_nt!KiPageFault+260
BUCKET_ID: X64_0xD1_W_nt!KiPageFault+260
Followup: MachineOwner
---------