New
#11
Please uninstall Sunbelt Personal Firewall driver/Sunbelt Software with Revo as instructed.
Code:Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\USER\Downloads\slicksax\SF_09-08-2013\080913-102430-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.17273.amd64fre.win7_gdr.130318-1532 Machine Name: Kernel base = 0xfffff800`03404000 PsLoadedModuleList = 0xfffff800`03640e70 Debug session time: Fri Aug 9 20:38:52.252 2013 (UTC + 6:00) System Uptime: 0 days 0:05:33.469 Loading Kernel Symbols ............................................................... ................................................................ ......................................... Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {0, 2, 8, 0} *** WARNING: Unable to verify timestamp for SbFw.sys *** ERROR: Module load completed but symbols could not be loaded for SbFw.sys Probably caused by : SbFw.sys ( SbFw+a7b1 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ab0e0 GetUlongFromAddress: unable to read from fffff800036ab198 0000000000000000 Nonpaged pool CURRENT_IRQL: 2 FAULTING_IP: +0 00000000`00000000 ?? ??? PROCESS_NAME: networx.exe CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xD1 TAG_NOT_DEFINED_c000000f: FFFFF80000BA2FB0 TRAP_FRAME: fffff80000ba2b50 -- (.trap 0xfffff80000ba2b50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffa800bfbf6a0 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=fffff80000ba2ce8 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=fffff800035eeca0 r11=0000000000000002 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc 00000000`00000000 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003472de9 to fffff80003473880 FAILED_INSTRUCTION_ADDRESS: +0 00000000`00000000 ?? ??? STACK_TEXT: fffff800`00ba2ce8 fffff880`03f3c7b1 : fffffa80`0bfb9b00 ffffffff`ffffffff 00000000`00000004 00000000`00000004 : 0x0 fffff800`00ba2cf0 fffffa80`0bfb9b00 : ffffffff`ffffffff 00000000`00000004 00000000`00000004 fffffa80`00000000 : SbFw+0xa7b1 fffff800`00ba2cf8 ffffffff`ffffffff : 00000000`00000004 00000000`00000004 fffffa80`00000000 00000000`00000000 : 0xfffffa80`0bfb9b00 fffff800`00ba2d00 00000000`00000004 : 00000000`00000004 fffffa80`00000000 00000000`00000000 fffffa80`00000004 : 0xffffffff`ffffffff fffff800`00ba2d08 00000000`00000004 : fffffa80`00000000 00000000`00000000 fffffa80`00000004 00000000`00000000 : 0x4 fffff800`00ba2d10 fffffa80`00000000 : 00000000`00000000 fffffa80`00000004 00000000`00000000 fffff880`03f3c6f0 : 0x4 fffff800`00ba2d18 00000000`00000000 : fffffa80`00000004 00000000`00000000 fffff880`03f3c6f0 00000000`00000004 : 0xfffffa80`00000000 STACK_COMMAND: .trap 0xfffff80000ba2b50 ; kb FOLLOWUP_IP: SbFw+a7b1 fffff880`03f3c7b1 ?? ??? SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: SbFw+a7b1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: SbFw IMAGE_NAME: SbFw.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4eef215b FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_SbFw+a7b1 BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_SbFw+a7b1 Followup: MachineOwner --------- 0: kd> lmvm SbFw start end module name fffff880`03f32000 fffff880`03f98000 SbFw T (no symbols) Loaded symbol image file: SbFw.sys Image path: \SystemRoot\system32\drivers\SbFw.sys Image name: SbFw.sys Timestamp: Mon Dec 19 17:34:51 2011 (4EEF215B) CheckSum: 0004A1AD ImageSize: 00066000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4