Hello r4vemaster.
Uninstall the Huawei Mobile connect software. Then update driver and firmware from Support - Downloads - Huawei Consumer BG.
Also, you need to uninstall your VPN Cliants.
Let us know the results.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffff800038626c0, fffff80003862f20, 58626c0}
*** WARNING: Unable to verify timestamp for ewusbnet.sys
*** ERROR: Module load completed but symbols could not be loaded for ewusbnet.sys
Probably caused by : ewusbnet.sys ( ewusbnet+24b5 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff800038626c0, The pool entry we were looking for within the page.
Arg3: fffff80003862f20, The next pool entry.
Arg4: 00000000058626c0, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff8000390a100
GetUlongFromAddress: unable to read from fffff8000390a1c0
fffff800038626c0 Nonpaged pool
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003805cae to fffff800036dafc0
STACK_TEXT:
fffff880`042857e8 fffff800`03805cae : 00000000`00000019 00000000`00000020 fffff800`038626c0 fffff800`03862f20 : nt!KeBugCheckEx
fffff880`042857f0 fffff880`01c38845 : 00000000`00000000 fffffa80`0aa4ce01 00000000`7ffff800 00000000`00000000 : nt!ExDeferredFreePool+0x12da
fffff880`042858a0 fffff880`04e9a4b5 : fffffa80`05c57810 00000000`00000001 fffffa80`05c57810 fffffa80`0aa4a000 : ndis!NdisFreeMemory+0x15
fffff880`042858d0 fffffa80`05c57810 : 00000000`00000001 fffffa80`05c57810 fffffa80`0aa4a000 fffffa80`05c57810 : ewusbnet+0x24b5
fffff880`042858d8 00000000`00000001 : fffffa80`05c57810 fffffa80`0aa4a000 fffffa80`05c57810 fffff800`036de9c1 : 0xfffffa80`05c57810
fffff880`042858e0 fffffa80`05c57810 : fffffa80`0aa4a000 fffffa80`05c57810 fffff800`036de9c1 fffffa80`05c57b23 : 0x1
fffff880`042858e8 fffffa80`0aa4a000 : fffffa80`05c57810 fffff800`036de9c1 fffffa80`05c57b23 00000000`00000000 : 0xfffffa80`05c57810
fffff880`042858f0 fffffa80`05c57810 : fffff800`036de9c1 fffffa80`05c57b23 00000000`00000000 fffffa80`0aa4ce02 : 0xfffffa80`0aa4a000
fffff880`042858f8 fffff800`036de9c1 : fffffa80`05c57b23 00000000`00000000 fffffa80`0aa4ce02 fffff880`04eb17ba : 0xfffffa80`05c57810
fffff880`04285900 fffff880`04eadc03 : 00000000`4d4f4351 fffffa80`05c57800 fffffa80`05c57b20 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`042859f0 00000000`4d4f4351 : fffffa80`05c57800 fffffa80`05c57b20 00000000`00000000 00000000`00000020 : ewusbnet+0x15c03
fffff880`042859f8 fffffa80`05c57800 : fffffa80`05c57b20 00000000`00000000 00000000`00000020 fffff880`04e9a375 : 0x4d4f4351
fffff880`04285a00 fffffa80`05c57b20 : 00000000`00000000 00000000`00000020 fffff880`04e9a375 fffffa80`0b99d140 : 0xfffffa80`05c57800
fffff880`04285a08 00000000`00000000 : 00000000`00000020 fffff880`04e9a375 fffffa80`0b99d140 00000000`00000001 : 0xfffffa80`05c57b20
STACK_COMMAND: kb
FOLLOWUP_IP:
ewusbnet+24b5
fffff880`04e9a4b5 ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ewusbnet+24b5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ewusbnet
IMAGE_NAME: ewusbnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bdabd9c
FAILURE_BUCKET_ID: X64_0x19_20_ewusbnet+24b5
BUCKET_ID: X64_0x19_20_ewusbnet+24b5
Followup: MachineOwner
---------
2: kd> lmvm ewusbnet
start end module name
fffff880`04e98000 fffff880`04eda000 ewusbnet T (no symbols)
Loaded symbol image file: ewusbnet.sys
Image path: \SystemRoot\system32\DRIVERS\ewusbnet.sys
Image name: ewusbnet.sys
Timestamp: Fri Apr 30 16:53:08 2010 (4BDABD9C)
CheckSum: 0004BAF2
ImageSize: 00042000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 9F, {3, fffffa8005225e30, fffff800053113d8, fffffa80053a5a50}
Unable to load image \SystemRoot\system32\DRIVERS\Neo_0062.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Neo_0062.sys
*** ERROR: Module load completed but symbols could not be loaded for Neo_0062.sys
Probably caused by : ntkrnlmp
Followup: MachineOwner
---------
0: kd> lmvm Neo_0062
start end module name
fffff880`059ea000 fffff880`059ef500 Neo_0062 T (no symbols)
Loaded symbol image file: Neo_0062.sys
Image path: \SystemRoot\system32\DRIVERS\Neo_0062.sys
Image name: Neo_0062.sys
Timestamp: Mon Sep 16 09:18:00 2013 (52367F70)
CheckSum: 000095E7
ImageSize: 00005500
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4