ok habe ich gemacht.
jetzt hier nochmal alle Minidumps:
1.
Loading Dump File [C:\Windows\Minidump\022811-16910-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have thread information
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c1d000 PsLoadedModuleList = 0xfffff800`02e5ae50
Debug session time: Mon Feb 28 13:59:58.313 2011 (UTC + 1:00)
System Uptime: 0 days 0:02:21.733
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffd80002ec7800, 2, 1, fffff80002cb8ac6}
Unable to load image \SystemRoot\system32\drivers\mfehidk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mfehidk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys
Unable to read KTHREAD address ffffda80072d4bd0
Probably caused by : mfehidk.sys ( mfehidk+8e75 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd80002ec7800, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cb8ac6, address which referenced memory
Debugging Details:
------------------
Unable to read KTHREAD address ffffda80072d4bd0
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec50e0
ffffd80002ec7800
CURRENT_IRQL: 2
FAULTING_IP:
nt!CcInitializeVolumeCacheMap+72
fffff800`02cb8ac6 49875500 xchg rdx,qword ptr [r13]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
TRAP_FRAME: fffff88007e82ef0 -- (.trap 0xfffff88007e82ef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff88002dd3840
rdx=fffff88002dd3840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cb8ac6 rsp=fffff88007e83080 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffff80002e1c888
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!CcInitializeVolumeCacheMap+0x72:
fffff800`02cb8ac6 49875500 xchg rdx,qword ptr [r13] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c8e469 to fffff80002c8ef00
STACK_TEXT:
fffff880`07e82da8 fffff800`02c8e469 : 00000000`0000000a ffffd800`02ec7800 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`07e82db0 fffff800`02c8d0e0 : fffff6fc`00120181 fffff880`02dd3180 fffff880`00000000 fffffa80`046633e0 : nt!KiBugCheckDispatch+0x69
fffff880`07e82ef0 fffff800`02cb8ac6 : 00000000`00000730 00000000`00000000 fffff880`07e83090 fffff880`07e83090 : nt!KiPageFault+0x260
fffff880`07e83080 fffff800`02cb69b3 : 00000000`00000001 00000000`00000000 00000000`00000000 fffffa80`03cfe4e0 : nt!CcInitializeVolumeCacheMap+0x72
fffff880`07e830e0 fffff880`0122fec8 : fffff8a0`00000000 fffff880`00000000 fffffa80`03cfe400 fffff880`01283088 : nt!CcInitializeCacheMap+0x553
fffff880`07e831c0 fffff880`01234303 : 00000000`00000000 fffff8a0`03e72140 fffff880`07e833f0 fffff880`07e832e8 : Ntfs!NtfsCachedRead+0x88
fffff880`07e83220 fffff880`01236f78 : fffffa80`05925c80 fffffa80`03e03650 fffff880`07e83301 fffffa80`03a56000 : Ntfs!NtfsCommonRead+0x583
fffff880`07e833c0 fffff880`0116723f : fffffa80`03e039f0 fffffa80`03e03650 fffffa80`03a56010 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`07e83470 fffff880`011656df : fffffa80`0514d060 00000000`00000000 fffffa80`0514d000 fffffa80`03e03650 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`07e83500 fffff880`03f5ce75 : fffffa80`03cfe4e0 fffff880`07e835c0 fffff880`07e83690 fffff880`07e83628 : fltmgr!FltpDispatch+0xcf
fffff880`07e83560 fffffa80`03cfe4e0 : fffff880`07e835c0 fffff880`07e83690 fffff880`07e83628 ffffd880`07e835f0 : mfehidk+0x8e75
fffff880`07e83568 fffff880`07e835c0 : fffff880`07e83690 fffff880`07e83628 ffffd880`07e835f0 ffffd880`03f65e36 : 0xfffffa80`03cfe4e0
fffff880`07e83570 fffff880`07e83690 : fffff880`07e83628 ffffd880`07e835f0 ffffd880`03f65e36 00000000`00000000 : 0xfffff880`07e835c0
fffff880`07e83578 fffff880`07e83628 : ffffd880`07e835f0 ffffd880`03f65e36 00000000`00000000 00000000`00000000 : 0xfffff880`07e83690
fffff880`07e83580 ffffd880`07e835f0 : ffffd880`03f65e36 00000000`00000000 00000000`00000000 00000000`06060000 : 0xfffff880`07e83628
fffff880`07e83588 ffffd880`03f65e36 : 00000000`00000000 00000000`00000000 00000000`06060000 fffff880`07e835a8 : 0xffffd880`07e835f0
fffff880`07e83590 00000000`00000000 : 00000000`00000000 00000000`06060000 fffff880`07e835a8 fffff880`07e835a8 : 0xffffd880`03f65e36
STACK_COMMAND: kb
FOLLOWUP_IP:
mfehidk+8e75
fffff880`03f5ce75 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: mfehidk+8e75
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mfehidk
IMAGE_NAME: mfehidk.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a01ad56
FAILURE_BUCKET_ID: X64_0xA_mfehidk+8e75
BUCKET_ID: X64_0xA_mfehidk+8e75
Followup: MachineOwner
Hier die 2.
Loading Dump File [C:\Windows\Minidump\022711-23462-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c56000 PsLoadedModuleList = 0xfffff800`02e93e50
Debug session time: Sun Feb 27 11:41:20.281 2011 (UTC + 1:00)
System Uptime: 0 days 0:03:33.702
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Loading Kernel Symbols
.Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffda80052b4c38, 2, 0, fffff80002cd3d99}
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffda80052b4c38, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cd3d99, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
ffffda80052b4c38
CURRENT_IRQL: 0
FAULTING_IP:
+3736303633633833
fffff800`02cd3d99 483958f8 cmp qword ptr [rax-8],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from fffff80002cd5a3a to fffff88003f757f2
STACK_TEXT:
fffff800`00b9cc98 fffff800`02cd5a3a : 00000000`002b36e3 fffffa80`05178dd8 fffff800`02e4ec40 00000000`00000001 : 0xfffff880`03f757f2
fffff800`00b9cca0 00000000`002b36e3 : fffffa80`05178dd8 fffff800`02e4ec40 00000000`00000001 fffff800`02e40e80 : 0xfffff800`02cd5a3a
fffff800`00b9cca8 fffffa80`05178dd8 : fffff800`02e4ec40 00000000`00000001 fffff800`02e40e80 fffff800`02cd3697 : 0x2b36e3
fffff800`00b9ccb0 fffff800`02e4ec40 : 00000000`00000001 fffff800`02e40e80 fffff800`02cd3697 00000000`2420f511 : 0xfffffa80`05178dd8
fffff800`00b9ccb8 00000000`00000001 : fffff800`02e40e80 fffff800`02cd3697 00000000`2420f511 00000000`2420f50c : 0xfffff800`02e4ec40
fffff800`00b9ccc0 fffff800`02e40e80 : fffff800`02cd3697 00000000`2420f511 00000000`2420f50c 00000000`2420f511 : 0x1
fffff800`00b9ccc8 fffff800`02cd3697 : 00000000`2420f511 00000000`2420f50c 00000000`2420f511 00000000`00000081 : 0xfffff800`02e40e80
fffff800`00b9ccd0 00000000`2420f511 : 00000000`2420f50c 00000000`2420f511 00000000`00000081 fffffa80`05178d40 : 0xfffff800`02cd3697
fffff800`00b9ccd8 00000000`2420f50c : 00000000`2420f511 00000000`00000081 fffffa80`05178d40 400000c2`400000c1 : 0x2420f511
fffff800`00b9cce0 00000000`2420f511 : 00000000`00000081 fffffa80`05178d40 400000c2`400000c1 00000000`400000c3 : 0x2420f50c
fffff800`00b9cce8 00000000`00000081 : fffffa80`05178d40 400000c2`400000c1 00000000`400000c3 00000000`202d3a5e : 0x2420f511
fffff800`00b9ccf0 fffffa80`05178d40 : 400000c2`400000c1 00000000`400000c3 00000000`202d3a5e 00000000`00000010 : 0x81
fffff800`00b9ccf8 400000c2`400000c1 : 00000000`400000c3 00000000`202d3a5e 00000000`00000010 00000000`00000202 : 0xfffffa80`05178d40
fffff800`00b9cd00 00000000`400000c3 : 00000000`202d3a5e 00000000`00000010 00000000`00000202 fffff800`00b9cd38 : 0x400000c2`400000c1
fffff800`00b9cd08 00000000`202d3a5e : 00000000`00000010 00000000`00000202 fffff800`00b9cd38 00000000`00000018 : 0x400000c3
fffff800`00b9cd10 00000000`00000010 : 00000000`00000202 fffff800`00b9cd38 00000000`00000018 fffff800`00b9cd40 : 0x202d3a5e
fffff800`00b9cd18 00000000`00000202 : fffff800`00b9cd38 00000000`00000018 fffff800`00b9cd40 fffff800`02cce1a2 : 0x10
fffff800`00b9cd20 fffff800`00b9cd38 : 00000000`00000018 fffff800`00b9cd40 fffff800`02cce1a2 fffff800`00b96080 : 0x202
fffff800`00b9cd28 00000000`00000018 : fffff800`00b9cd40 fffff800`02cce1a2 fffff800`00b96080 fffffa80`0396cb30 : 0xfffff800`00b9cd38
fffff800`00b9cd30 fffff800`00b9cd40 : fffff800`02cce1a2 fffff800`00b96080 fffffa80`0396cb30 00000000`00000000 : 0x18
fffff800`00b9cd38 fffff800`02cce1a2 : fffff800`00b96080 fffffa80`0396cb30 00000000`00000000 00000000`00000000 : 0xfffff800`00b9cd40
fffff800`00b9cd40 fffff800`00b96080 : fffffa80`0396cb30 00000000`00000000 00000000`00000000 fffffa80`06318950 : 0xfffff800`02cce1a2
fffff800`00b9cd48 fffffa80`0396cb30 : 00000000`00000000 00000000`00000000 fffffa80`06318950 00000000`00000002 : 0xfffff800`00b96080
fffff800`00b9cd50 00000000`00000000 : 00000000`00000000 fffffa80`06318950 00000000`00000002 fffff800`02e4ec40 : 0xfffffa80`0396cb30
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------
und hier die 3.
Loading Dump File [C:\Windows\Minidump\022011-23228-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c1a000 PsLoadedModuleList = 0xfffff800`02e57e50
Debug session time: Sun Feb 20 12:15:42.019 2011 (UTC + 1:00)
System Uptime: 0 days 0:18:11.814
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffda8005f49b40, 0, fffff80002c9b416, 7}
Unable to load image \SystemRoot\system32\drivers\mfehidk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mfehidk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys
Could not read faulting driver name
Probably caused by : mfehidk.sys ( mfehidk+258ef )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffda8005f49b40, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002c9b416, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec20e0
ffffda8005f49b40
FAULTING_IP:
nt!ExAcquireRundownProtectionCacheAwareEx+26
fffff800`02c9b416 498b00 mov rax,qword ptr [r8]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: Videodeluxe.ex
CURRENT_IRQL: 0
TRAP_FRAME: fffff880027d1680 -- (.trap 0xfffff880027d1680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002d63180 rbx=0000000000000000 rcx=fffffa8005eb6900
rdx=0000000000000080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c9b416 rsp=fffff880027d1818 rbp=fffffa8005f2e8c0
r8=ffffda8005f49b40 r9=0000000000000002 r10=fffffa80043bfe80
r11=fffffa8004142f00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ExAcquireRundownProtectionCacheAwareEx+0x26:
fffff800`02c9b416 498b00 mov rax,qword ptr [r8] ds:cff0:ffffda80`05f49b40=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d09b19 to fffff80002c8bf00
STACK_TEXT:
fffff880`027d1518 fffff800`02d09b19 : 00000000`00000050 ffffda80`05f49b40 00000000`00000000 fffff880`027d1680 : nt!KeBugCheckEx
fffff880`027d1520 fffff800`02c89fee : 00000000`00000000 fffffa80`043ad100 fffff8a0`02241700 00000000`00000801 : nt! ?? ::FNODOBFM::`string'+0x40edb
fffff880`027d1680 fffff800`02c9b416 : fffff880`01191e82 fffff880`027d1ad0 00000000`00000000 fffff8a0`06ba1840 : nt!KiPageFault+0x16e
fffff880`027d1818 fffff880`01191e82 : fffff880`027d1ad0 00000000`00000000 fffff8a0`06ba1840 fffff880`03f3a166 : nt!ExAcquireRundownProtectionCacheAwareEx+0x26
fffff880`027d1820 fffff880`01194b9d : 00000000`00000000 fffff880`027d1b11 fffffa80`05a3bb00 fffff880`027d1b00 : fltmgr!FltpPerformPreCallbacks+0x152
fffff880`027d1920 fffff880`011b8dea : fffffa80`044813d0 00000000`00000000 fffff880`027d1b30 fffffa80`06faf4e0 : fltmgr!FltpPassThroughFastIo+0x4d
fffff880`027d1960 fffff880`03f338ef : fffff8a0`00000019 fffff880`027d1a80 fffff8a0`09a108c0 fffff800`02dbf2dd : fltmgr!FltpFastIoUnlockSingle+0x18a
fffff880`027d1a10 fffff8a0`00000019 : fffff880`027d1a80 fffff8a0`09a108c0 fffff800`02dbf2dd fffffa80`00000000 : mfehidk+0x258ef
fffff880`027d1a18 fffff880`027d1a80 : fffff8a0`09a108c0 fffff800`02dbf2dd fffffa80`00000000 fffff880`027d1b58 : 0xfffff8a0`00000019
fffff880`027d1a20 fffff8a0`09a108c0 : fffff800`02dbf2dd fffffa80`00000000 fffff880`027d1b58 fffffa80`044813d0 : 0xfffff880`027d1a80
fffff880`027d1a28 fffff800`02dbf2dd : fffffa80`00000000 fffff880`027d1b58 fffffa80`044813d0 fffff880`027d1a50 : 0xfffff8a0`09a108c0
fffff880`027d1a30 fffff800`02eff320 : fffff8a0`09a10800 00000000`00000000 fffffa80`039f5080 fffffa80`03a11f01 : nt!ExFreePoolWithTag+0x22d
fffff880`027d1ae0 fffff800`02c8b153 : fffffa80`03b59060 00000000`0e0ae808 fffff880`027d1bc8 00000000`74429bac : nt!NtUnlockFile+0x19e
fffff880`027d1bb0 00000000`77c6176a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0e0ae7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c6176a
STACK_COMMAND: kb
FOLLOWUP_IP:
mfehidk+258ef
fffff880`03f338ef ?? ???
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: mfehidk+258ef
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mfehidk
IMAGE_NAME: mfehidk.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a01ad56
FAILURE_BUCKET_ID: X64_0x50_mfehidk+258ef
BUCKET_ID: X64_0x50_mfehidk+258ef
Followup: MachineOwner
---------
ich steig da leider nicht so ganz durch, wäre super, wenn ich hilfe bekommen könnte :/