I ran the debugger and here is what the bug analysis says.. Not sure which drivers might be bad.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8c2bdbd2, address which referenced memory
Debugging Details:
------------------
Unable to load image nm3.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nm3.sys
*** ERROR: Module load completed but symbols could not be loaded for nm3.sys
READ_ADDRESS: GetPointerFromAddress: unable to read from 8356e84c
Unable to read MiSystemVaType memory at 8354de20
00000014
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1c
8c2bdbd2 394614 cmp dword ptr [esi+14h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from 8c47df8a to 8c2bdbd2
STACK_TEXT:
8e12752c 8c47df8a 8b533690 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
8e12755c 8c4cce8d 8b1bb0f0 8e1275ac 8e1275a8 tcpip!TcpTcbReassemblyRetrieveSegments+0xad
8e1275f0 8c4cb4a8 86d7b628 8b1bb0f0 8e127618 tcpip!TcpTcbCarefulDatagram+0x16bb
8e12765c 8c4aea28 86d7b628 8b1bb0f0 001276d0 tcpip!TcpTcbReceive+0x228
8e1276c4 8c4af25a 86d668f0 86d82000 00000000 tcpip!TcpMatchReceive+0x237
8e127714 8c4af29b 86d7b628 86d82000 000063ca tcpip!TcpPreValidatedReceive+0x293
8e127730 8c4a95c5 86d7b628 86d82000 8e12776c tcpip!TcpReceive+0x2d
8e127740 8c4b17fb 8e127754 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
8e12776c 8c4b1146 8c52e198 8e1277c0 c000023e tcpip!IppDeliverListToProtocol+0x49
8e12778c 8c4af508 8c52dfa8 00000006 8e1277c0 tcpip!IppProcessDeliverList+0x2a
8e1277e4 8c4b0fef 8c52dfa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
8e127878 8c4bf451 87c9ae00 00000000 86d81400 tcpip!IpFlcReceivePackets+0xbe5
8e1278f4 8c4b9a5d 87c98ae8 dcbd5448 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
8e127928 8348dac3 dcbd5448 aa0e672a 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
8e127990 8c4b9bcb 8c4b993f 8e1279b8 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
8e1279cc 8c26818d 87c98a00 dcbd5401 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
8e127a04 8c2565be 87c9caa8 dcbd5448 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
8e127a2c 8c2564b2 00000000 dcbd5448 87c9bbe8 ndis!ndisIndicateSortedNetBufferLists+0x4a
8e127ba8 8c201c2d 877bf0e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
8e127bc4 8c23259a 877bf0e0 dcbd5448 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
8e127be0 8c232534 87c98df8 dcbd5448 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
8e127bfc 91f27553 87c98df8 dcbd5448 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
WARNING: Stack unwind information not available. Following frames may be wrong.
8e127c68 8c256553 87c9bbe8 dcbd5448 00000000 nm3+0x5553
8e127c90 8c201c88 877bf0e0 dcbd5448 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
8e127cb8 9412f6b7 877bf0e0 dcbd5448 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
8e127cd8 9412a730 87c90e18 dcbd5448 87c90e18 tunnel!TeredoWfpIndicationWorker+0xa9
8e127cec 83619613 87c90e18 9413bbf0 85fd3c80 tunnel!LwWorker+0x12
8e127d00 8348214b 89d27100 00000000 85fd3c80 nt!IopProcessWorkItem+0x23
8e127d50 8360e12b 00000001 aa0e632a 00000000 nt!ExpWorkerThread+0x10d
8e127d90 834b5559 8348203e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1c
8c2bdbd2 394614 cmp dword ptr [esi+14h],eax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5034f1ea
FAILURE_BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
Followup: MachineOwner
Help Pleaseeeeeeeeeeeeeeeee....
Sam
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8c2bdbd2, address which referenced memory
Debugging Details:
------------------
Unable to load image nm3.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nm3.sys
*** ERROR: Module load completed but symbols could not be loaded for nm3.sys
READ_ADDRESS: GetPointerFromAddress: unable to read from 8356e84c
Unable to read MiSystemVaType memory at 8354de20
00000014
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1c
8c2bdbd2 394614 cmp dword ptr [esi+14h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from 8c47df8a to 8c2bdbd2
STACK_TEXT:
8e12752c 8c47df8a 8b533690 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
8e12755c 8c4cce8d 8b1bb0f0 8e1275ac 8e1275a8 tcpip!TcpTcbReassemblyRetrieveSegments+0xad
8e1275f0 8c4cb4a8 86d7b628 8b1bb0f0 8e127618 tcpip!TcpTcbCarefulDatagram+0x16bb
8e12765c 8c4aea28 86d7b628 8b1bb0f0 001276d0 tcpip!TcpTcbReceive+0x228
8e1276c4 8c4af25a 86d668f0 86d82000 00000000 tcpip!TcpMatchReceive+0x237
8e127714 8c4af29b 86d7b628 86d82000 000063ca tcpip!TcpPreValidatedReceive+0x293
8e127730 8c4a95c5 86d7b628 86d82000 8e12776c tcpip!TcpReceive+0x2d
8e127740 8c4b17fb 8e127754 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
8e12776c 8c4b1146 8c52e198 8e1277c0 c000023e tcpip!IppDeliverListToProtocol+0x49
8e12778c 8c4af508 8c52dfa8 00000006 8e1277c0 tcpip!IppProcessDeliverList+0x2a
8e1277e4 8c4b0fef 8c52dfa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
8e127878 8c4bf451 87c9ae00 00000000 86d81400 tcpip!IpFlcReceivePackets+0xbe5
8e1278f4 8c4b9a5d 87c98ae8 dcbd5448 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
8e127928 8348dac3 dcbd5448 aa0e672a 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
8e127990 8c4b9bcb 8c4b993f 8e1279b8 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
8e1279cc 8c26818d 87c98a00 dcbd5401 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
8e127a04 8c2565be 87c9caa8 dcbd5448 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
8e127a2c 8c2564b2 00000000 dcbd5448 87c9bbe8 ndis!ndisIndicateSortedNetBufferLists+0x4a
8e127ba8 8c201c2d 877bf0e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
8e127bc4 8c23259a 877bf0e0 dcbd5448 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
8e127be0 8c232534 87c98df8 dcbd5448 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
8e127bfc 91f27553 87c98df8 dcbd5448 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
WARNING: Stack unwind information not available. Following frames may be wrong.
8e127c68 8c256553 87c9bbe8 dcbd5448 00000000 nm3+0x5553
8e127c90 8c201c88 877bf0e0 dcbd5448 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
8e127cb8 9412f6b7 877bf0e0 dcbd5448 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
8e127cd8 9412a730 87c90e18 dcbd5448 87c90e18 tunnel!TeredoWfpIndicationWorker+0xa9
8e127cec 83619613 87c90e18 9413bbf0 85fd3c80 tunnel!LwWorker+0x12
8e127d00 8348214b 89d27100 00000000 85fd3c80 nt!IopProcessWorkItem+0x23
8e127d50 8360e12b 00000001 aa0e632a 00000000 nt!ExpWorkerThread+0x10d
8e127d90 834b5559 8348203e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1c
8c2bdbd2 394614 cmp dword ptr [esi+14h],eax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5034f1ea
FAILURE_BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
Followup: MachineOwner
Help Pleaseeeeeeeeeeeeeeeee....
Sam
My Computer
System One
-
- OS
- Windows 7 Ultimate
- Computer type
- Laptop
- System Manufacturer/Model
- HP
- CPU
- Core 2 Duo
- Memory
- 4 GB
- Antivirus
- Microsoft Essentials