I have lurked here for reference material for quite some time. Went to make my first post for help and realized after submitting I did not read the procedures. Ok, so here is the correct information.
My system is about 4-5 months old. I purchased everything from my vendor we use at work. Windows 7 OEM, had a crash last week so this is a fresh install. Had a hard drive go out and it is removed presently waiting for the RMA replacement.
Attached are the files generated. Thank you in advance for your help.
2 of three were caused by Kaspersky, the other inconclusive. I would remove and replace it with Microsoft Security Essentials
http://support.kaspersky.com/downloa...vremover10.zip
http://www.microsoft.com/security_essentials/
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\041911-38750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
Debug session time: Tue Apr 19 20:10:30.609 2011 (GMT-4)
System Uptime: 1 days 15:33:49.591
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {a78, 2, 8, a78}
Unable to load image kl1.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for kl1.sys
*** ERROR: Module load completed but symbols could not be loaded for kl1.sys
Probably caused by : kl1.sys ( kl1+1cd94c )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000a78, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000a78, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc70e0
0000000000000a78
CURRENT_IRQL: 2
FAULTING_IP:
+5c73952f02dedad4
00000000`00000a78 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffff880039842a0 -- (.trap 0xfffff880039842a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8009df3540 rbx=0000000000000000 rcx=fffff880039844a0
rdx=0000000000100000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000a78 rsp=fffff88003984438 rbp=0000000000000000
r8=fffff880039844d8 r9=fffff880039844c8 r10=fffffa80095701d0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz na pe nc
00000000`00000a78 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8eca9 to fffff80002a8f740
FAILED_INSTRUCTION_ADDRESS:
+5c73952f02dedad4
00000000`00000a78 ?? ???
STACK_TEXT:
fffff880`03984158 fffff800`02a8eca9 : 00000000`0000000a 00000000`00000a78 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff880`03984160 fffff800`02a8d920 : fffffa80`0b6a4030 fffffa80`09df3554 fffff880`03984301 fffff880`00000028 : nt!KiBugCheckDispatch+0x69
fffff880`039842a0 00000000`00000a78 : fffff880`01a1694c 00000000`00000000 00000000`00000000 fffffa80`09df3530 : nt!KiPageFault+0x260
fffff880`03984438 fffff880`01a1694c : 00000000`00000000 00000000`00000000 fffffa80`09df3530 fffffa80`09df3554 : 0xa78
fffff880`03984440 00000000`00000000 : 00000000`00000000 fffffa80`09df3530 fffffa80`09df3554 00000000`00000000 : kl1+0x1cd94c
STACK_COMMAND: kb
FOLLOWUP_IP:
kl1+1cd94c
fffff880`01a1694c ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: kl1+1cd94c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: kl1
IMAGE_NAME: kl1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c0f985b
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_kl1+1cd94c
BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_kl1+1cd94c
Followup: MachineOwner
---------
4: kd> lmvm kl1
start end module name
fffff880`01849000 fffff880`01fa8000 kl1 T (no symbols)
Loaded symbol image file: kl1.sys
Image path: kl1.sys
Image name: kl1.sys
Timestamp: Wed Jun 09 09:34:19 2010 (4C0F985B)
CheckSum: 0007B053
ImageSize: 0075F000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4