It does look an awful lot like your network adapter drivers are the cause.
Try looking for an updated driver for your card. If you are already using the latest one, try to find an older one.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Jonathan\Desktop\Minidump contents\040610-35459-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
Debug session time: Mon Apr 5 20:53:17.510 2010 (GMT-4)
System Uptime: 0 days 0:55:07.196
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff880014bc4f0}
Unable to load image \SystemRoot\system32\DRIVERS\WN111x.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for WN111x.sys
*** ERROR: Module load completed but symbols could not be loaded for WN111x.sys
Probably caused by : nwifi.sys ( nwifi!Pt6Receive+296 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880014bc4f0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ab0e0
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
ndis!ndisParseReceivedNBL+40
fffff880`014bc4f0 8b7928 mov edi,dword ptr [rcx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9bb70 -- (.trap 0xfffff80000b9bb70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8006f28e60 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80046a2ce0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880014bc4f0 rsp=fffff80000b9bd00 rbp=0000000000000000
r8=fffff80000b9bdd8 r9=fffff80000b9bdd0 r10=0000000000000000
r11=fffff80000b9bdc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ndis!ndisParseReceivedNBL+0x40:
fffff880`014bc4f0 8b7928 mov edi,dword ptr [rcx+28h] ds:bce0:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e74469 to fffff80002e74f00
STACK_TEXT:
fffff800`00b9ba28 fffff800`02e74469 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9ba30 fffff800`02e730e0 : ffff0080`01cfeb8c fffff800`00b9be00 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00b9bb70 fffff880`014bc4f0 : fffff880`06040280 00000000`00000002 fffffa80`058b3050 fffff880`06008630 : nt!KiPageFault+0x260
fffff800`00b9bd00 fffff880`014bc242 : fffffa80`058b0000 fffff800`00b9be50 00000000`00000000 fffffa80`046a2ce0 : ndis!ndisParseReceivedNBL+0x40
fffff800`00b9bd50 fffff880`014bbeb5 : fffffa80`04209100 fffffa80`04010000 00000000`00000000 00000000`00000000 : ndis!ndisSortNetBufferLists+0xc2
fffff800`00b9bdd0 fffff880`0143ea24 : fffffa80`042091a0 fffffa80`046a2ce0 00000000`00000001 fffffa80`046a2ce0 : ndis!ndisMDispatchReceiveNetBufferLists+0xc5
fffff800`00b9c250 fffff880`0143e9e9 : 00000000`00000000 00000000`00000000 fffffa80`063ee810 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff800`00b9c290 fffff880`0143e980 : fffff880`060405c0 fffffa80`04165010 fffffa80`063ee810 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff800`00b9c2d0 fffff880`060097ee : fffffa80`04165010 00000000`00000000 fffffa80`046a2ce0 fffff880`060405c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff800`00b9c310 fffff880`014562b7 : fffffa80`042091a0 fffffa80`03baf670 00000000`00000001 00000000`0000000f : nwifi!Pt6Receive+0x296
fffff800`00b9c370 fffff880`06fa5a0f : fffffa80`04b99a08 fffffa80`04b11000 00000000`00000001 fffffa80`06b2a5a0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff800`00b9c3c0 fffffa80`04b99a08 : fffffa80`04b11000 00000000`00000001 fffffa80`06b2a5a0 00000000`00000001 : WN111x+0x1a0f
fffff800`00b9c3c8 fffffa80`04b11000 : 00000000`00000001 fffffa80`06b2a5a0 00000000`00000001 fffff880`06fc1ebc : 0xfffffa80`04b99a08
fffff800`00b9c3d0 00000000`00000001 : fffffa80`06b2a5a0 00000000`00000001 fffff880`06fc1ebc 00000000`00300180 : 0xfffffa80`04b11000
fffff800`00b9c3d8 fffffa80`06b2a5a0 : 00000000`00000001 fffff880`06fc1ebc 00000000`00300180 00000985`00000000 : 0x1
fffff800`00b9c3e0 00000000`00000001 : fffff880`06fc1ebc 00000000`00300180 00000985`00000000 ffffffb2`04cb0001 : 0xfffffa80`06b2a5a0
fffff800`00b9c3e8 fffff880`06fc1ebc : 00000000`00300180 00000985`00000000 ffffffb2`04cb0001 00000000`fb348c6c : 0x1
fffff800`00b9c3f0 00000000`00300180 : 00000985`00000000 ffffffb2`04cb0001 00000000`fb348c6c 00000000`00000000 : WN111x+0x1debc
fffff800`00b9c3f8 00000985`00000000 : ffffffb2`04cb0001 00000000`fb348c6c 00000000`00000000 00000000`00000000 : 0x300180
fffff800`00b9c400 ffffffb2`04cb0001 : 00000000`fb348c6c 00000000`00000000 00000000`00000000 fffffa80`04bf1000 : 0x985`00000000
fffff800`00b9c408 00000000`fb348c6c : 00000000`00000000 00000000`00000000 fffffa80`04bf1000 fffff800`00b9cc58 : 0xffffffb2`04cb0001
fffff800`00b9c410 00000000`00000000 : 00000000`00000000 fffffa80`04bf1000 fffff800`00b9cc58 fffffa80`04cb7314 : 0xfb348c6c
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Pt6Receive+296
fffff880`060097ee 83a3e010000000 and dword ptr [rbx+10E0h],0
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: nwifi!Pt6Receive+296
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0xD1_nwifi!Pt6Receive+296
BUCKET_ID: X64_0xD1_nwifi!Pt6Receive+296
Followup: MachineOwner
---------