Ik blijf maar bsod's krijgen. En ook telkens verschillende meldingen. Ik heb de dumpfiles geopend met WDK. Hierin staat van alles, maar kom er ook met de hulp van Google niet echt uit. Kan iemand mij uit de brand helpen?
Dumpfile 1:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffc00006a0aea, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ece73b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c8100
GetUlongFromAddress: unable to read from fffff800030c81c0
fffffc00006a0aea Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiMapPageInHyperSpaceWorker+1b
fffff800`02ece73b 458a481a mov r9b,byte ptr [r8+1Ah]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: msiexec.exe
TRAP_FRAME: fffff88009b06010 -- (.trap 0xfffff88009b06010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000058000000000 rbx=0000000000000000 rcx=000000080002358f
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ece73b rsp=fffff88009b061a8 rbp=0000000000000001
r8=fffffc00006a0ad0 r9=ffffffffffffffff r10=0000000000000002
r11=fffff88009b06290 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiMapPageInHyperSpaceWorker+0x1b:
fffff800`02ece73b 458a481a mov r9b,byte ptr [r8+1Ah] ds:fffffc00`006a0aea=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e98769 to fffff80002e991c0
STACK_TEXT:
fffff880`09b05ec8 fffff800`02e98769 : 00000000`0000000a fffffc00`006a0aea 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09b05ed0 fffff800`02e973e0 : 00000000`00000000 fffffa80`07692c60 00000000`00000000 fffffa80`0061fcb0 : nt!KiBugCheckDispatch+0x69
fffff880`09b06010 fffff800`02ece73b : fffff800`02e80e6b fffffa80`00639480 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`09b061a8 fffff800`02e80e6b : fffffa80`00639480 00000000`00000001 00000000`00000000 00000000`00000080 : nt!MiMapPageInHyperSpaceWorker+0x1b
fffff880`09b061b0 fffff800`02f4face : 00000000`00000000 fffff880`00000001 fffffa80`0061fcb0 fffff800`030cbd68 : nt!MiRestoreTransitionPte+0x7b
fffff880`09b06240 fffff800`02ec52ec : 00000000`00000000 fffff880`09b06300 ffffffff`ffffffff 00000000`00000074 : nt!MiRemoveLowestPriorityStandbyPage+0x21e
fffff880`09b062c0 fffff800`02ec176e : fffff980`11f57000 00000000`019242d8 fffff880`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0xe50
fffff880`09b064b0 fffff800`02ec1d24 : fffffa80`06f0b010 00000000`019242d8 fffff880`09b065f0 fffff880`00000000 : nt!CcMapAndCopyInToCache+0x20e
fffff880`09b065a0 fffff880`012abc18 : 00000000`002dc958 fffffa80`0712a300 fffff880`09b06690 fffffa80`00008000 : nt!CcCopyWrite+0x194
fffff880`09b06630 fffff880`010c6102 : fffffa80`0712a380 fffff880`010c94f2 00000000`00008000 00000000`00008001 : Ntfs!NtfsCopyWriteA+0x208
fffff880`09b06830 fffff880`010c98ba : fffff880`09b06900 fffffa80`070d1e78 00000000`01921c00 00000000`00008000 : fltmgr!FltpPerformFastIoCall+0xf2
fffff880`09b06890 fffff880`010e783e : 00000000`00008000 00000000`00000000 fffffa80`0712a380 fffff880`09b06a00 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`09b068d0 fffff800`031a76de : fffffa80`0712a3f4 fffff800`0317e5fc fffff880`09b06b60 fffffa80`0712a3f4 : fltmgr!FltpFastIoWrite+0x1ce
fffff880`09b06970 fffff800`02e98453 : ffffffff`ffffff01 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x5ad
fffff880`09b06a70 00000000`77a9139a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`029ef848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a9139a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiMapPageInHyperSpaceWorker+1b
fffff800`02ece73b 458a481a mov r9b,byte ptr [r8+1Ah]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiMapPageInHyperSpaceWorker+1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b
BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b
Followup: MachineOwner
---------
Dumpfile 2:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002f20ea5, Address of the instruction which caused the bugcheck
Arg3: fffff88007791b40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`02f20ea5 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff88007791b40 -- (.cxr 0xfffff88007791b40)
rax=000ffff7fffffffd rbx=000fffffffffffff rcx=02fff8ffffffff70
rdx=fffffff5557d30c8 rsi=fffffa80065d4000 rdi=0000058000000000
rip=fffff80002f20ea5 rsp=fffff88007792528 rbp=0000000000000000
r8=fffffe0007792560 r9=000ffff7fffffffd r10=fffff880077925d8
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`02f20ea5 4c8b4928 mov r9,qword ptr [rcx+28h] ds:002b:02fff8ff`ffffff98=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002f20ea5
STACK_TEXT:
fffff880`07792528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`02f20ea5 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
STACK_COMMAND: .cxr 0xfffff88007791b40 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
Dumpfile 3:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffc00011fb15a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002efd73b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f7100
GetUlongFromAddress: unable to read from fffff800030f71c0
fffffc00011fb15a Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiMapPageInHyperSpaceWorker+1b
fffff800`02efd73b 458a481a mov r9b,byte ptr [r8+1Ah]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88003185520 -- (.trap 0xfffff88003185520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000058000000000 rbx=0000000000000000 rcx=000000080005fe5c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002efd73b rsp=fffff880031856b8 rbp=0000000000000001
r8=fffffc00011fb140 r9=fffff800030fadc0 r10=0000000000000002
r11=fffff880031857a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiMapPageInHyperSpaceWorker+0x1b:
fffff800`02efd73b 458a481a mov r9b,byte ptr [r8+1Ah] ds:fffffc00`011fb15a=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ec7769 to fffff80002ec81c0
STACK_TEXT:
fffff880`031853d8 fffff800`02ec7769 : 00000000`0000000a fffffc00`011fb15a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031853e0 fffff800`02ec63e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`01c3fcb0 : nt!KiBugCheckDispatch+0x69
fffff880`03185520 fffff800`02efd73b : fffff800`02eafe6b fffffa80`02488c80 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`031856b8 fffff800`02eafe6b : fffffa80`02488c80 00000000`00000001 00000000`00000000 00000000`00000080 : nt!MiMapPageInHyperSpaceWorker+0x1b
fffff880`031856c0 fffff800`02f7eace : 00000000`00000002 fffff880`00000001 fffffa80`01c3fcb0 fffff800`030fad68 : nt!MiRestoreTransitionPte+0x7b
fffff880`03185750 fffff800`02e878ff : fa800858`bb3004c0 fffff880`03185840 00000000`00000038 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x21e
fffff880`031857d0 fffff800`0316039a : fffffa80`06ae1980 fffffa80`00000001 fffffa80`06ae1980 00000000`00000005 : nt!MiPfPutPagesInTransition+0x826
fffff880`03185940 fffff800`02e70887 : fffffa80`06ae1980 00000000`07005000 00000000`07005000 fffff800`03065280 : nt!MmPrefetchForCacheManager+0x8e
fffff880`03185990 fffff800`02f0d1ae : fffffa80`08c533a0 fffff880`03185b00 fffffa80`00000005 fffffa80`07c149c0 : nt!CcPerformReadAhead+0x2f3
fffff880`03185ac0 fffff800`02ed1841 : fffffa80`06786190 fffff800`031ba601 fffff800`030c68d0 00000000`00000002 : nt!CcWorkerThread+0x21e
fffff880`03185b70 fffff800`0315ee6a : 00000000`00000000 fffffa80`06794040 00000000`00000080 fffffa80`066f19e0 : nt!ExpWorkerThread+0x111
fffff880`03185c00 fffff800`02eb8ec6 : fffff880`02f65180 fffffa80`06794040 fffff880`02f6ffc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03185c40 00000000`00000000 : fffff880`03186000 fffff880`03180000 fffff880`031855a0 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiMapPageInHyperSpaceWorker+1b
fffff800`02efd73b 458a481a mov r9b,byte ptr [r8+1Ah]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiMapPageInHyperSpaceWorker+1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b
BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b
Followup: MachineOwner
---------
zo zijn er nog meer, maar het gebeurt telkens bij installeren van iets, of het verplaatsen van grote bestanden of gewoon bij het opstarten van de PC.