Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD Unable to Do it myself

25 Jan 2011   #1
TonyTiger2004

Windows 7 Ultimate x64
 
 
BSOD Unable to Do it myself

Hello fellas, Im currently having a BSOD i do believe its caused from a driver for Google Earth, as it happened after installing it and while that application was running. Currently working on getting windbg working as of right now its giving me issues, so maybe one of you can confirm Google Earth being the culprit, i do believe there is more going on.

Just let me know what you found, attached is the dumps performance report wouldn't load, included Screen shot.

Currently removing Google earth, and trying to figure out whats going on with windbg, may be of relation unsure.

Thanks in Advance. - Tony

NOTE: new DUMP is in separate folder, can ignore the others.
Again i would do this myself, but unable to run WinDbg



My System SpecsSystem Spec
.
26 Jan 2011   #2
fimble

windows 7 ultimate
 
 

'Twas ZoneAlarm!!


Your .dmp file give a stop error of 0x7F. Its a stop error that ZoneAlarm firewall gives frequently. You have two(?) options:

ZoneAlarm firewall is known to be a cause of BSOD's on many Windows 7 systems. Download the ZoneAlarm Remover. Boot to safe mode and run the ZoneAlarm Remover. Reboot. Make sure that Windows Firewall is enabled.
Alternatively
Try this Microsoft hotfix if you wish to keep ZoneAlarm: Stop Error 0x07F when you run applications that transfer data using the UDP protocol in Win Server 2008 R2/Win 7" which I can neither verify or discount. It may work, it may not.
My System SpecsSystem Spec
26 Jan 2011   #3
TonyTiger2004

Windows 7 Ultimate x64
 
 

Hmm back when i come on these boards it was zone alarm and i believe i installed that hotfix.. but i can try again. Just now got windbg running im looking over the dump now.

Thanks Fimble :-p

- Tony

UPDATE: I think you viewed an old dump, as i see no error 0x7F

the error im getting on this new dump (included in .rar)
HTML Code:
................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {50, 2, 0, fffff8800154ae10}

Unable to load image vsdatant.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for vsdatant.sys
*** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
Unable to load image Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+1d0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800038f90e0
 0000000000000050 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
 r8=0000000000000120  r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800036c0ca9 to fffff800036c1740

STACK_TEXT:  
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000050 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
 r8=0000000000000120  r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800036c0ca9 to fffff800036c1740

STACK_TEXT:  
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000050 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
 r8=0000000000000120  r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800036c0ca9 to fffff800036c1740

STACK_TEXT:  
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000050 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
 r8=0000000000000120  r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800036c0ca9 to fffff800036c1740

STACK_TEXT:  
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

Followup: MachineOwner
My System SpecsSystem Spec
.

26 Jan 2011   #4
fimble

windows 7 ultimate
 
 

Bugchek Analysis
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000050 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
 r8=0000000000000120  r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800036c0ca9 to fffff800036c1740

STACK_TEXT:  
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003      cmp     dword ptr [r11+50h],3

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

BUCKET_ID:  X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0

Followup: MachineOwner
Drivers:

Code:
fffff880`03f85000 fffff880`03fc3000   1394ohci 1394ohci.sys Tue Jul 14 01:07:12 2009 (4A5BCC30)
fffff880`00ede000 fffff880`00f35000   ACPI     ACPI.sys     Tue Jul 14 00:19:34 2009 (4A5BC106)
fffff880`02a00000 fffff880`02a8a000   afd      afd.sys      Tue Jul 14 00:21:40 2009 (4A5BC184)
fffff880`04360000 fffff880`04376000   AgileVpn AgileVpn.sys Tue Jul 14 01:10:24 2009 (4A5BCCF0)
fffff880`03e2f000 fffff880`03e43000   amdiox64 amdiox64.sys Thu Feb 18 15:17:53 2010 (4B7D5A21)
fffff880`03f24000 fffff880`03f39000   amdppm   amdppm.sys   Tue Jul 14 00:19:25 2009 (4A5BC0FD)
fffff880`00ec0000 fffff880`00ecb000   amdxata  amdxata.sys  Tue May 19 18:56:59 2009 (4A12F2EB)
fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`00e96000 fffff880`00ec0000   ataport  ataport.SYS  Tue Jul 14 00:19:52 2009 (4A5BC118)
fffff880`066a2000 fffff880`066c2000   AtihdW76 AtihdW76.sys Wed Nov 17 12:02:04 2010 (4CE3C43C)
fffff880`04667000 fffff880`04e78000   atikmdag atikmdag.sys Fri Nov 26 02:46:44 2010 (4CEF1F94)
fffff880`03f39000 fffff880`03f85000   atikmpag atikmpag.sys Fri Nov 26 02:16:47 2010 (4CEF188F)
fffff880`0124b000 fffff880`01253000   AtiPcie  AtiPcie.sys  Tue May 05 16:00:22 2009 (4A005486)
fffff960`00850000 fffff960`008b1000   ATMFD    ATMFD.DLL    Wed Oct 20 04:05:45 2010 (4CBE5C89)
fffff880`02afb000 fffff880`02b02000   Beep     Beep.SYS     Tue Jul 14 01:00:13 2009 (4A5BCA8D)
fffff880`03eed000 fffff880`03efe000   blbdrive blbdrive.sys Tue Jul 14 00:35:59 2009 (4A5BC4DF)
fffff880`0616f000 fffff880`0618d000   bowser   bowser.sys   Tue Jul 14 00:23:50 2009 (4A5BC206)
fffff960`00640000 fffff960`00667000   cdd      cdd.dll      Tue Nov 02 04:59:22 2010 (4CCF9AAA)
fffff880`02ac8000 fffff880`02af2000   cdrom    cdrom.sys    Tue Jul 14 00:19:54 2009 (4A5BC11A)
fffff880`00d25000 fffff880`00de5000   CI       CI.dll       Tue Jul 14 02:32:13 2009 (4A5BE01D)
fffff880`011ce000 fffff880`011fe000   CLASSPNP CLASSPNP.SYS Tue Jul 14 00:19:58 2009 (4A5BC11E)
fffff880`00cc7000 fffff880`00d25000   CLFS     CLFS.SYS     Tue Jul 14 00:19:57 2009 (4A5BC11D)
fffff880`0115b000 fffff880`011ce000   cng      cng.sys      Tue Jul 14 00:49:40 2009 (4A5BC814)
fffff880`0428f000 fffff880`0429f000   CompositeBus CompositeBus.sys Tue Jul 14 01:00:33 2009 (4A5BCAA1)
fffff880`06071000 fffff880`06079000   cpuz132_x64 cpuz132_x64.sys Thu Mar 26 23:17:23 2009 (49CC0D03)
fffff880`06079000 fffff880`06082000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 13:33:36 2010 (4CD94DB0)
fffff880`07000000 fffff880`0700e000   crashdmp crashdmp.sys Tue Jul 14 01:01:01 2009 (4A5BCABD)
fffff880`03e4c000 fffff880`03ecf000   csc      csc.sys      Tue Jul 14 00:24:26 2009 (4A5BC22A)
fffff880`03ecf000 fffff880`03eed000   dfsc     dfsc.sys     Tue Jul 14 00:23:44 2009 (4A5BC200)
fffff880`03cbf000 fffff880`03cce000   discache discache.sys Tue Jul 14 00:37:18 2009 (4A5BC52E)
fffff880`01235000 fffff880`0124b000   disk     disk.sys     Tue Jul 14 00:19:57 2009 (4A5BC11D)
fffff880`042f5000 fffff880`04317000   drmk     drmk.sys     Tue Jul 14 02:01:25 2009 (4A5BD8E5)
fffff880`0701a000 fffff880`07023000   dump_atapi dump_atapi.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`0700e000 fffff880`0701a000   dump_ataport dump_ataport.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`066d1000 fffff880`066e4000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
fffff880`07023000 fffff880`0702f000   Dxapi    Dxapi.sys    Tue Jul 14 00:38:28 2009 (4A5BC574)
fffff880`04e78000 fffff880`04f6c000   dxgkrnl  dxgkrnl.sys  Tue Nov 02 02:51:31 2010 (4CCF7CB3)
fffff880`04f6c000 fffff880`04fb2000   dxgmms1  dxgmms1.sys  Tue Nov 02 02:50:56 2010 (4CCF7C90)
fffff880`0245d000 fffff880`0252f000   eamon    eamon.sys    Tue Sep 29 11:51:47 2009 (4AC1E6C3)
fffff880`02b02000 fffff880`02b25000   ehdrv    ehdrv.sys    Tue Sep 29 11:52:21 2009 (4AC1E6E5)
fffff880`03cb4000 fffff880`03cbf000   ElbyCDIO ElbyCDIO.sys Thu Dec 17 22:25:16 2009 (4B2AAFCC)
fffff880`06082000 fffff880`060a2000   epfwwfpr epfwwfpr.sys Tue Sep 29 11:47:10 2009 (4AC1E5AE)
fffff880`010e9000 fffff880`010fd000   fileinfo fileinfo.sys Tue Jul 14 00:34:25 2009 (4A5BC481)
fffff880`00fb2000 fffff880`00ffe000   fltmgr   fltmgr.sys   Tue Jul 14 00:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 00:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Sat Sep 26 03:34:26 2009 (4ABD7DB2)
fffff880`015a7000 fffff880`015f1000   fwpkclnt fwpkclnt.sys Tue Jul 14 00:21:08 2009 (4A5BC164)
fffff800`03608000 fffff800`03651000   hal      hal.dll      Tue Jul 14 02:27:36 2009 (4A5BDF08)
fffff880`04fb2000 fffff880`04fd6000   HDAudBus HDAudBus.sys Tue Jul 14 01:06:13 2009 (4A5BCBF5)
fffff880`0670f000 fffff880`06728000   HIDCLASS HIDCLASS.SYS Tue Jul 14 01:06:21 2009 (4A5BCBFD)
fffff880`071f3000 fffff880`071fb080   HIDPARSE HIDPARSE.SYS Tue Jul 14 01:06:17 2009 (4A5BCBF9)
fffff880`06701000 fffff880`0670f000   hidusb   hidusb.sys   Tue Jul 14 01:06:22 2009 (4A5BCBFE)
fffff880`060a7000 fffff880`0616f000   HTTP     HTTP.sys     Tue Jul 14 00:22:16 2009 (4A5BC1A8)
fffff880`015f1000 fffff880`015fa000   hwpolicy hwpolicy.sys Tue Jul 14 00:19:22 2009 (4A5BC0FA)
fffff880`04200000 fffff880`0420f000   kbdclass kbdclass.sys Tue Jul 14 00:19:50 2009 (4A5BC116)
fffff880`06728000 fffff880`06736000   kbdhid   kbdhid.sys   Tue Jul 14 01:00:20 2009 (4A5BCA94)
fffff800`00b96000 fffff800`00ba0000   kdcom    kdcom.dll    Tue Jul 14 02:31:07 2009 (4A5BDFDB)
fffff880`04317000 fffff880`0435a000   ks       ks.sys       Thu Mar 04 04:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Tue Jul 14 00:20:54 2009 (4A5BC156)
fffff880`0157c000 fffff880`015a7000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:03:32 2009 (4B21E0B4)
fffff880`0435a000 fffff880`0435f200   ksthunk  ksthunk.sys  Tue Jul 14 01:00:19 2009 (4A5BCA93)
fffff880`02550000 fffff880`02565000   lltdio   lltdio.sys   Tue Jul 14 01:08:50 2009 (4A5BCC92)
fffff880`06751000 fffff880`06774000   luafv    luafv.sys    Tue Jul 14 00:26:13 2009 (4A5BC295)
fffff880`00ca6000 fffff880`00cb3000   mcupdate mcupdate.dll Tue Jul 14 02:29:09 2009 (4A5BDF65)
fffff880`06743000 fffff880`06751000   monitor  monitor.sys  Tue Jul 14 00:38:52 2009 (4A5BC58C)
fffff880`0429f000 fffff880`042ae000   mouclass mouclass.sys Tue Jul 14 00:19:50 2009 (4A5BC116)
fffff880`06736000 fffff880`06743000   mouhid   mouhid.sys   Tue Jul 14 01:00:20 2009 (4A5BCA94)
fffff880`00e73000 fffff880`00e8d000   mountmgr mountmgr.sys Tue Jul 14 00:19:54 2009 (4A5BC11A)
fffff880`0618d000 fffff880`061a5000   mpsdrv   mpsdrv.sys   Tue Jul 14 01:08:25 2009 (4A5BCC79)
fffff880`061a5000 fffff880`061d2000   mrxsmb   mrxsmb.sys   Sat Feb 27 07:52:19 2010 (4B88CF33)
fffff880`06000000 fffff880`0604e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 07:52:28 2010 (4B88CF3C)
fffff880`0604e000 fffff880`06071000   mrxsmb20 mrxsmb20.sys Sat Feb 27 07:52:26 2010 (4B88CF3A)
fffff880`02b83000 fffff880`02b8e000   Msfs     Msfs.SYS     Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`00f3e000 fffff880`00f48000   msisadrv msisadrv.sys Tue Jul 14 00:19:26 2009 (4A5BC0FE)
fffff880`010fd000 fffff880`0115b000   msrpc    msrpc.sys    Tue Jul 14 00:21:32 2009 (4A5BC17C)
fffff880`03ca9000 fffff880`03cb4000   mssmbios mssmbios.sys Tue Jul 14 00:31:10 2009 (4A5BC3BE)
fffff880`01418000 fffff880`0142a000   mup      mup.sys      Tue Jul 14 00:23:45 2009 (4A5BC201)
fffff880`0142a000 fffff880`0151c000   ndis     ndis.sys     Tue Jul 14 00:21:40 2009 (4A5BC184)
fffff880`0439a000 fffff880`043a6000   ndistapi ndistapi.sys Tue Jul 14 01:10:00 2009 (4A5BCCD8)
fffff880`043a6000 fffff880`043d5000   ndiswan  ndiswan.sys  Tue Jul 14 01:10:11 2009 (4A5BCCE3)
fffff880`0667e000 fffff880`06693000   NDProxy  NDProxy.SYS  Tue Jul 14 01:10:05 2009 (4A5BCCDD)
fffff880`03dec000 fffff880`03dfb000   netbios  netbios.sys  Tue Jul 14 01:09:26 2009 (4A5BCCB6)
fffff880`03ce3000 fffff880`03d28000   netbt    netbt.sys    Tue Jul 14 00:21:28 2009 (4A5BC178)
fffff880`0151c000 fffff880`0157c000   NETIO    NETIO.SYS    Fri Apr 09 03:43:59 2010 (4BBE946F)
fffff880`08e1f000 fffff880`08e64000   nfsrdr   nfsrdr.sys   Tue Jul 14 00:24:22 2009 (4A5BC226)
fffff880`02b8e000 fffff880`02b9f000   Npfs     Npfs.SYS     Tue Jul 14 00:19:48 2009 (4A5BC114)
fffff880`03c9d000 fffff880`03ca9000   nsiproxy nsiproxy.sys Tue Jul 14 00:21:02 2009 (4A5BC15E)
fffff800`03651000 fffff800`03c2d000   nt       ntkrnlmp.exe Sat Jun 19 05:16:41 2010 (4C1C44A9)
fffff880`01259000 fffff880`013fc000   Ntfs     Ntfs.sys     Tue Jul 14 00:20:47 2009 (4A5BC14F)
fffff880`02af2000 fffff880`02afb000   Null     Null.SYS     Tue Jul 14 00:19:37 2009 (4A5BC109)
fffff880`03dc6000 fffff880`03dec000   pacer    pacer.sys    Tue Jul 14 01:09:41 2009 (4A5BCCC5)
fffff880`00f88000 fffff880`00f9d000   partmgr  partmgr.sys  Tue Jul 14 00:19:58 2009 (4A5BC11E)
fffff880`00f48000 fffff880`00f7b000   pci      pci.sys      Tue Jul 14 00:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Tue Jul 14 00:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 00:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Tue Jul 14 00:19:27 2009 (4A5BC0FF)
fffff880`086f2000 fffff880`08798000   peauth   peauth.sys   Tue Jul 14 02:01:19 2009 (4A5BD8DF)
fffff880`042b8000 fffff880`042f5000   portcls  portcls.sys  Tue Jul 14 01:06:27 2009 (4A5BCC03)
fffff880`00cb3000 fffff880`00cc7000   PSHED    PSHED.dll    Tue Jul 14 02:32:23 2009 (4A5BE027)
fffff880`08f7f000 fffff880`08f88000   rasacd   rasacd.sys   Tue Jul 14 01:10:09 2009 (4A5BCCE1)
fffff880`04376000 fffff880`0439a000   rasl2tp  rasl2tp.sys  Tue Jul 14 01:10:11 2009 (4A5BCCE3)
fffff880`043d5000 fffff880`043f0000   raspppoe raspppoe.sys Tue Jul 14 01:10:17 2009 (4A5BCCE9)
fffff880`04fd6000 fffff880`04ff7000   raspptp  raspptp.sys  Tue Jul 14 01:10:18 2009 (4A5BCCEA)
fffff880`03fc3000 fffff880`03fdd000   rassstp  rassstp.sys  Tue Jul 14 01:10:25 2009 (4A5BCCF1)
fffff880`03c4c000 fffff880`03c9d000   rdbss    rdbss.sys    Tue Jul 14 00:24:09 2009 (4A5BC219)
fffff880`043f0000 fffff880`043fb000   rdpbus   rdpbus.sys   Tue Jul 14 01:17:46 2009 (4A5BCEAA)
fffff880`02b68000 fffff880`02b71000   RDPCDD   RDPCDD.sys   Tue Jul 14 01:16:34 2009 (4A5BCE62)
fffff880`08eff000 fffff880`08f2d000   rdpdr    rdpdr.sys    Tue Jul 14 01:18:02 2009 (4A5BCEBA)
fffff880`02b71000 fffff880`02b7a000   rdpencdd rdpencdd.sys Tue Jul 14 01:16:34 2009 (4A5BCE62)
fffff880`02b7a000 fffff880`02b83000   rdprefmp rdprefmp.sys Tue Jul 14 01:16:35 2009 (4A5BCE63)
fffff880`08f47000 fffff880`08f7f000   RDPWD    RDPWD.SYS    Tue Jul 14 01:16:47 2009 (4A5BCE6F)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Tue Jul 14 00:34:34 2009 (4A5BC48A)
fffff880`08e00000 fffff880`08e1f000   rpcxdr   rpcxdr.sys   Tue Jul 14 00:24:45 2009 (4A5BC23D)
fffff880`02565000 fffff880`0257d000   rspndr   rspndr.sys   Tue Jul 14 01:08:50 2009 (4A5BCC92)
fffff880`04600000 fffff880`04656000   Rt64win7 Rt64win7.sys Wed Jun 23 10:10:45 2010 (4C21CF95)
fffff880`07035000 fffff880`071f2a00   RTKVHD64 RTKVHD64.sys Mon Jul 20 11:52:29 2009 (4A644C6D)
fffff880`03e00000 fffff880`03e2f000   SCSIPORT SCSIPORT.SYS Tue Jul 14 01:01:04 2009 (4A5BCAC0)
fffff880`08798000 fffff880`087a3000   secdrv   secdrv.SYS   Wed Sep 13 14:18:38 2006 (4508052E)
fffff880`0427a000 fffff880`04286000   serenum  serenum.sys  Tue Jul 14 01:00:33 2009 (4A5BCAA1)
fffff880`03c00000 fffff880`03c1d000   serial   serial.sys   Tue Jul 14 01:00:40 2009 (4A5BCAA8)
fffff880`01410000 fffff880`01418000   spldr    spldr.sys    Mon May 11 17:56:27 2009 (4A0858BB)
fffff880`08e69000 fffff880`08eff000   srv      srv.sys      Fri Aug 27 04:38:00 2010 (4C773318)
fffff880`0257d000 fffff880`025e4000   srv2     srv2.sys     Fri Aug 27 04:37:46 2010 (4C77330A)
fffff880`087a3000 fffff880`087d0000   srvnet   srvnet.sys   Fri Aug 27 04:37:24 2010 (4C7732F4)
fffff880`043fb000 fffff880`043fc480   swenum   swenum.sys   Tue Jul 14 01:00:18 2009 (4A5BCA92)
fffff880`01604000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jun 14 04:40:39 2010 (4C15A4B7)
fffff880`08671000 fffff880`08683000   tcpipreg tcpipreg.sys Tue Jul 14 01:09:49 2009 (4A5BCCCD)
fffff880`02bbd000 fffff880`02bca000   TDI      TDI.SYS      Tue Jul 14 00:21:18 2009 (4A5BC16E)
fffff880`08f2d000 fffff880`08f38000   tdtcp    tdtcp.sys    Tue Jul 14 01:16:32 2009 (4A5BCE60)
fffff880`02b9f000 fffff880`02bbd000   tdx      tdx.sys      Tue Jul 14 00:21:15 2009 (4A5BC16B)
fffff880`03c38000 fffff880`03c4c000   termdd   termdd.sys   Tue Jul 14 01:16:36 2009 (4A5BCE64)
fffff960`00540000 fffff960`0054a000   TSDDD    TSDDD.dll    Tue Jul 14 01:16:34 2009 (4A5BCE62)
fffff880`08f38000 fffff880`08f47000   tssecsrv tssecsrv.sys Tue Jul 14 01:16:41 2009 (4A5BCE69)
fffff880`03efe000 fffff880`03f24000   tunnel   tunnel.sys   Tue Jul 14 01:09:37 2009 (4A5BCCC1)
fffff880`03fec000 fffff880`03ffe000   umbus    umbus.sys    Tue Jul 14 01:06:56 2009 (4A5BCC20)
fffff880`066e4000 fffff880`06701000   usbccgp  usbccgp.sys  Tue Jul 14 01:06:45 2009 (4A5BCC15)
fffff880`0702f000 fffff880`07030f00   USBD     USBD.SYS     Tue Jul 14 01:06:23 2009 (4A5BCBFF)
fffff880`04269000 fffff880`0427a000   usbehci  usbehci.sys  Tue Jul 14 01:06:30 2009 (4A5BCC06)
fffff880`06624000 fffff880`0667e000   usbhub   usbhub.sys   Tue Jul 14 01:07:09 2009 (4A5BCC2D)
fffff880`04656000 fffff880`04661000   usbohci  usbohci.sys  Tue Jul 14 01:06:30 2009 (4A5BCC06)
fffff880`04213000 fffff880`04269000   USBPORT  USBPORT.SYS  Tue Jul 14 01:06:31 2009 (4A5BCC07)
fffff880`03fdd000 fffff880`03fec000   VClone   VClone.sys   Sun Aug 09 22:25:45 2009 (4A7F3ED9)
fffff880`042ae000 fffff880`042b8000   vcsvad   vcsvad.sys   Sun Nov 16 09:51:18 2008 (491FED16)
fffff880`00f7b000 fffff880`00f88000   vdrvroot vdrvroot.sys Tue Jul 14 01:01:31 2009 (4A5BCADB)
fffff880`02b25000 fffff880`02b33000   vga      vga.sys      Tue Jul 14 00:38:47 2009 (4A5BC587)
fffff880`02b33000 fffff880`02b58000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:38:51 2009 (4A5BC58B)
fffff880`01400000 fffff880`01410000   vmstorfl vmstorfl.sys Tue Jul 14 00:42:54 2009 (4A5BC67E)
fffff880`00f9d000 fffff880`00fb2000   volmgr   volmgr.sys   Tue Jul 14 00:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Tue Jul 14 00:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Tue Jul 14 00:20:08 2009 (4A5BC128)
fffff880`03d28000 fffff880`03dbd000   vsdatant vsdatant.sys Sun May 09 17:28:58 2010 (4BE6E2CA)
fffff880`03c1d000 fffff880`03c38000   wanarp   wanarp.sys   Tue Jul 14 01:10:21 2009 (4A5BCCED)
fffff880`02b58000 fffff880`02b68000   watchdog watchdog.sys Tue Jul 14 00:37:35 2009 (4A5BC53F)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Tue Jul 14 00:22:07 2009 (4A5BC19F)
fffff880`00de5000 fffff880`00df4000   WDFLDR   WDFLDR.SYS   Tue Jul 14 00:19:54 2009 (4A5BC11A)
fffff880`03dbd000 fffff880`03dc6000   wfplwf   wfplwf.sys   Tue Jul 14 01:09:26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`00330000   win32k   win32k.sys   Wed Oct 20 04:08:46 2010 (4CBE5D3E)
fffff880`08683000 fffff880`0868c000   WinFLdrv WinFLdrv.sys Wed Nov 18 13:05:58 2009 (4B03F136)
fffff880`04286000 fffff880`0428f000   wmiacpi  wmiacpi.sys  Tue Jul 14 00:31:02 2009 (4A5BC3B6)
fffff880`00f35000 fffff880`00f3e000   WMILIB   WMILIB.SYS   Tue Jul 14 00:19:51 2009 (4A5BC117)
fffff880`0252f000 fffff880`02550000   WudfPf   WudfPf.sys   Tue Jul 14 01:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`08f2d000 fffff880`08f38000   tdtcp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`08f38000 fffff880`08f47000   tssecsrv.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000F000
fffff880`08f47000 fffff880`08f7f000   RDPWD.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00038000
fffff880`08f88000 fffff880`08ff9000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`08f88000 fffff880`08ff9000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`08600000 fffff880`08671000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`010c0000 fffff880`010ce000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`010ce000 fffff880`010da000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`010da000 fffff880`010e3000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`00ecb000 fffff880`00ede000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`066cf000 fffff880`066d1000   USBD.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`066c2000 fffff880`066cf000   LVUSBS64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`066a0000 fffff880`066a2000   USBD.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`06693000 fffff880`066a0000   LVUSBS64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`042ac000 fffff880`042ae000   USBD.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`0429f000 fffff880`042ac000   LVUSBS64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
My System SpecsSystem Spec
Reply

 BSOD Unable to Do it myself




Thread Tools




Similar help and support threads
Thread Forum
Disk unallocated, unable to initialise, unable to assign drive letter
After online researching, I ended up into this forum >> https://www.sevenforums.com/hardware-devices/288692-disk-1-unknown-not-initialized-unallocated-11.html I downloaded the Partition Wizard from Jumanji's link, installed, and followed instructions until the end. After assigning drive...
Hardware & Devices
Unable to move file from desktop - Security Tab - Unable to Display
I had a folder on my Desktop that just won't delete. I tried deleting it and moving it to another location. It deleted everything within the folder, yet the folder still remained. I've been having the problem of my Desktop not updating when files/folders are deleted, so I have to manually...
General Discussion
BSOD - Unable to isolate cause
Hi All, Been getting BSODs over the last month. Bought a new SSD and clean installed Win 7 x64 Ultimate on to it. This didn't help the issue. Up to this point the computer had been running fine for a long time! I even thought Win 7 was bullet proof. Unfortunately this isn't the case. Good...
BSOD Help and Support
Windows Firewall Service unable to activate, SFC scan unable to work
Well I got a big problem. A couple days ago I noticed network connectivity issues. Random connection drops, overall bad connection, etc. I recently had some really bad malware and I removed it, so I suspected leftover malware from the start. I went to check Windows Update to see if I missed a...
System Security
BSOD. Unable to launch normally.
Hi, I have been getting the BSOD 0x00000050. I run a windows 7 64 bit operating system. I'm not the greatest with computer bugs and would love to get some help. It has be doing this for awhile now every time i restart but this time I can't start even after trying repeatedly. I looked into it as...
BSOD Help and Support
Not a BSOD - Unable to get into Sleep
Hello all, I am new here and i do apologize if this is not the correct location for this error. I couldn t find another section in the forums where this issue could be reported, however, feel free to move it wherever you consider it more appropriate. My major question is to identify what...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 02:59.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App