First, you have 30 startup items, which is bad. Free up the startup. Windows does not need any other program to auto start with it, but the auto start programs often conflicts and causes various problems including BSODs.
- Click on the Start button
- Type “msconfig (without quotes), click the resulting link. It will open the System Configuration window.
- Select the “Startup” tab.
- Deselect all items other than the antivirus.
- Apply > OK
- Accept then restart.
As they all are installed in your computer, you can call them anytime, from Start > All Programs. No need to keep them always running in the background.
Second, Update the Intel ethernet driver from Motherboards | Z87-PRO(V EDITION) | ASUS Global
Third, did you have any Symantec or Norton software installed, that you have uninstalled latter? Leftovers of Symantec are remaining there, which is contributing to BSODs.
____________________________________________________________
Code:
BugCheck D1, {0, 2, 1, fffff88001a4fba0}
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : vpcnfltr.sys ( vpcnfltr!FilterReceiveNetBufferLists+60d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001a4fba0, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003314100
GetUlongFromAddress: unable to read from fffff800033141c0
0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
ndis!NdisAllocatePacket+90
fffff880`01a4fba0 488937 mov qword ptr [rdi],rsi
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
TRAP_FRAME: fffff880078f0fd0 -- (.trap 0xfffff880078f0fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000f06 rbx=0000000000000000 rcx=fffffa800c9e0580
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001a4fba0 rsp=fffff880078f1160 rbp=0000000000000000
r8=fffffa800c9e0500 r9=0000000000000000 r10=fffffa8013bf8020
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ndis!NdisAllocatePacket+0x90:
fffff880`01a4fba0 488937 mov qword ptr [rdi],rsi ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030dd429 to fffff800030dde80
STACK_TEXT:
fffff880`078f0e88 fffff800`030dd429 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`078f0e90 fffff800`030dc0a0 : 00000000`00000000 00000000`00000006 fffffa80`0cb89000 fffffa80`10387870 : nt!KiBugCheckDispatch+0x69
fffff880`078f0fd0 fffff880`01a4fba0 : 00000000`00000000 fffff880`01c58de2 fffff880`078f1258 fffffa80`0c9e0588 : nt!KiPageFault+0x260
fffff880`078f1160 fffff880`01a4ff5b : fffffa80`10387870 fffff880`078f1258 fffffa80`10789802 00000000`00000000 : ndis!NdisAllocatePacket+0x90
fffff880`078f11e0 fffff880`01acdbde : fffffa80`0cb89640 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisXlateRecvNetBufferListsToPacketArray+0x8b
fffff880`078f1250 fffff880`01a505d4 : fffffa80`0fed71a0 fffff800`00040001 00000000`00000007 fffffa80`10443e60 : ndis!ndisMDispatchReceiveNetBufferLists+0x2de
fffff880`078f16d0 fffff880`01a50549 : fffffa80`103e0000 00000000`00000000 00000000`00000401 fffffa80`10387870 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`078f1710 fffff880`01a504e0 : 00000000`00000000 fffff880`01a514d0 00000000`00000000 00000000`00000028 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`078f1750 fffff880`031ea505 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000007 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`078f1790 fffff880`01a690a7 : 00000000`0000017a fffffa80`0fed71a0 fffffa80`00000000 fffff880`01aa9110 : vpcnfltr!FilterReceiveNetBufferLists+0x60d
fffff880`078f1830 fffff880`04c26833 : fffffa80`1064b000 00000000`00000007 fffffa80`10387870 fffffa80`1064be00 : ndis! ?? ::FNODOBFM::`string'+0xcd8f
fffff880`078f1880 fffffa80`1064b000 : 00000000`00000007 fffffa80`10387870 fffffa80`1064be00 00000000`00000801 : e1q62x64+0x26833
fffff880`078f1888 00000000`00000007 : fffffa80`10387870 fffffa80`1064be00 00000000`00000801 00000000`00000007 : 0xfffffa80`1064b000
fffff880`078f1890 fffffa80`10387870 : fffffa80`1064be00 00000000`00000801 00000000`00000007 00000000`00000007 : 0x7
fffff880`078f1898 fffffa80`1064be00 : 00000000`00000801 00000000`00000007 00000000`00000007 fffff880`04c26a01 : 0xfffffa80`10387870
fffff880`078f18a0 00000000`00000801 : 00000000`00000007 00000000`00000007 fffff880`04c26a01 00000000`00000001 : 0xfffffa80`1064be00
fffff880`078f18a8 00000000`00000007 : 00000000`00000007 fffff880`04c26a01 00000000`00000001 fffffa80`10387870 : 0x801
fffff880`078f18b0 00000000`00000007 : fffff880`04c26a01 00000000`00000001 fffffa80`10387870 fffffa80`10465e20 : 0x7
fffff880`078f18b8 fffff880`04c26a01 : 00000000`00000001 fffffa80`10387870 fffffa80`10465e20 fffffa80`1064b000 : 0x7
fffff880`078f18c0 00000000`00000001 : fffffa80`10387870 fffffa80`10465e20 fffffa80`1064b000 fffffa80`00000000 : e1q62x64+0x26a01
fffff880`078f18c8 fffffa80`10387870 : fffffa80`10465e20 fffffa80`1064b000 fffffa80`00000000 fffffa80`1064b000 : 0x1
fffff880`078f18d0 fffffa80`10465e20 : fffffa80`1064b000 fffffa80`00000000 fffffa80`1064b000 0000000a`00000201 : 0xfffffa80`10387870
fffff880`078f18d8 fffffa80`1064b000 : fffffa80`00000000 fffffa80`1064b000 0000000a`00000201 00000000`00000000 : 0xfffffa80`10465e20
fffff880`078f18e0 fffffa80`00000000 : fffffa80`1064b000 0000000a`00000201 00000000`00000000 fffff880`078f1ad8 : 0xfffffa80`1064b000
fffff880`078f18e8 fffffa80`1064b000 : 0000000a`00000201 00000000`00000000 fffff880`078f1ad8 fffff880`078f1a00 : 0xfffffa80`00000000
fffff880`078f18f0 0000000a`00000201 : 00000000`00000000 fffff880`078f1ad8 fffff880`078f1a00 00000000`00000010 : 0xfffffa80`1064b000
fffff880`078f18f8 00000000`00000000 : fffff880`078f1ad8 fffff880`078f1a00 00000000`00000010 00000000`00000000 : 0x0000000a`00000201
STACK_COMMAND: kb
FOLLOWUP_IP:
vpcnfltr!FilterReceiveNetBufferLists+60d
fffff880`031ea505 83c8ff or eax,0FFFFFFFFh
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: vpcnfltr!FilterReceiveNetBufferLists+60d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vpcnfltr
IMAGE_NAME: vpcnfltr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7b278
IMAGE_VERSION: 6.1.7601.17514
FAILURE_BUCKET_ID: X64_0xD1_vpcnfltr!FilterReceiveNetBufferLists+60d
BUCKET_ID: X64_0xD1_vpcnfltr!FilterReceiveNetBufferLists+60d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_vpcnfltr!filterreceivenetbufferlists+60d
FAILURE_ID_HASH: {fd549d6c-d639-f6fa-8ef2-df6e3fc2320c}
Followup: MachineOwner
---------
Code:
BugCheck 1E, {ffffffffc0000005, c, 0, 1}
*** WARNING: Unable to verify timestamp for PGPfsfd.sys
*** ERROR: Module load completed but symbols could not be loaded for PGPfsfd.sys
*** WARNING: Unable to verify timestamp for MpFilter.sys
*** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys
Probably caused by : PGPfsfd.sys ( PGPfsfd+1f077 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000000000000c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000001, Parameter 1 of the exception
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b4100
GetUlongFromAddress: unable to read from fffff800032b41c0
0000000000000000 Nonpaged pool
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
+1
00000000`0000000c ?? ???
BUGCHECK_STR: 0x1E_c0000005_R
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: Dropbox.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
TRAP_FRAME: fffff8800aad96e0 -- (.trap 0xfffff8800aad96e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000096196d10002 rbx=0000000000000000 rcx=fffffa800c9590c0
rdx=fffffa800f6becb1 rsi=0000000000000000 rdi=0000000000000000
rip=000000000000000c rsp=fffff8800aad9870 rbp=fffffa800ce13010
r8=0000000000000001 r9=0000000000000000 r10=fffffa800c9590c0
r11=fffffa800ce13400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
00000000`0000000c ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030c8a18 to fffff8000307de80
STACK_TEXT:
fffff880`0aad8e58 fffff800`030c8a18 : 00000000`0000001e ffffffff`c0000005 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffff880`0aad8e60 fffff800`0307d502 : fffff880`0aad9638 fffff880`0aad9920 fffff880`0aad96e0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x487ed
fffff880`0aad9500 fffff800`0307c07a : 00000000`00000000 00000000`00000001 fffffa80`1493d400 fffff880`0aad9920 : nt!KiExceptionDispatch+0xc2
fffff880`0aad96e0 00000000`0000000c : fffff880`0aad9920 fffff880`010ec471 fffffa80`0fc09860 fffff880`0aad9b98 : nt!KiPageFault+0x23a
fffff880`0aad9870 fffff880`0aad9920 : fffff880`010ec471 fffffa80`0fc09860 fffff880`0aad9b98 fffff880`0aad9a60 : 0xc
fffff880`0aad9878 fffff880`010ec471 : fffffa80`0fc09860 fffff880`0aad9b98 fffff880`0aad9a60 fffffa80`142abbf0 : 0xfffff880`0aad9920
fffff880`0aad9880 fffff880`010ea6c7 : fffffa80`0ce13010 fffffa80`0c9590c0 fffffa80`0f601040 fffffa80`0fc07de0 : fltmgr!FltpPassThrough+0x421
fffff880`0aad9900 fffff880`01168077 : fffffa80`0fbe7590 fffff880`010f8dca fffff880`0aad9b98 fffffa80`129dae60 : fltmgr!FltpDispatch+0xb7
fffff880`0aad9960 fffffa80`0fbe7590 : fffff880`010f8dca fffff880`0aad9b98 fffffa80`129dae60 00000000`00000042 : PGPfsfd+0x1f077
fffff880`0aad9968 fffff880`010f8dca : fffff880`0aad9b98 fffffa80`129dae60 00000000`00000042 00000000`00000000 : 0xfffffa80`0fbe7590
fffff880`0aad9970 fffff880`011a554d : 00000000`00000000 fffff880`01188000 fffffa80`0ce13010 fffffa80`0f601d80 : fltmgr!FltGetStreamContext+0x4a
fffff880`0aad99a0 00000000`00000000 : fffff880`01188000 fffffa80`0ce13010 fffffa80`0f601d80 fffffa80`0ce13010 : MpFilter+0x2854d
STACK_COMMAND: kb
FOLLOWUP_IP:
PGPfsfd+1f077
fffff880`01168077 ?? ???
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: PGPfsfd+1f077
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: PGPfsfd
IMAGE_NAME: PGPfsfd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 503d1ea1
FAILURE_BUCKET_ID: X64_0x1E_c0000005_R_PGPfsfd+1f077
BUCKET_ID: X64_0x1E_c0000005_R_PGPfsfd+1f077
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1e_c0000005_r_pgpfsfd+1f077
FAILURE_ID_HASH: {ac7eafd6-21e9-7322-5a0c-1097f997af89}
Followup: MachineOwner
---------
0: kd> lmvm PGPfsfd
start end module name
fffff880`01149000 fffff880`0117d000 PGPfsfd T (no symbols)
Loaded symbol image file: PGPfsfd.sys
Image path: \SystemRoot\System32\Drivers\PGPfsfd.sys
Image name: PGPfsfd.sys
Timestamp: Wed Aug 29 01:10:17 2012 (503D1EA1)
CheckSum: 0003160D
ImageSize: 00034000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4