New
#11
Here is the latest minidump. This is before the uninstall of AVG.
Here is the latest minidump. This is before the uninstall of AVG.
This one was caused by your tcpip stack.
If if were you I would
Re-install your wifi/lan driver.
run a system file check. ( type sfc /scannow)
If you are overclocking stop
if you are running a raid update your driver
Let us know your results
Ken
Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\K\Desktop\042510-25225-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16481.x86fre.win7_gdr.091207-1941 Machine Name: Kernel base = 0x82c48000 PsLoadedModuleList = 0x82d90810 Debug session time: Sun Apr 25 22:10:26.508 2010 (GMT-4) System Uptime: 0 days 6:16:14.050 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 100000D1, {3000a1e8, 2, 1, 8c02c1e2} *** WARNING: Unable to verify timestamp for cmdhlp.sys *** ERROR: Module load completed but symbols could not be loaded for cmdhlp.sys Probably caused by : NETIO.SYS ( NETIO!KfdClassify+ed ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 3000a1e8, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, value 0 = read operation, 1 = write operation Arg4: 8c02c1e2, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82db0718 Unable to read MiSystemVaType memory at 82d90160 3000a1e8 CURRENT_IRQL: 2 FAULTING_IP: NETIO!KfdClassify+ed 8c02c1e2 f00fc108 lock xadd dword ptr [eax],ecx CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System LAST_CONTROL_TRANSFER: from 8c0f4d7c to 8c02c1e2 STACK_TEXT: 8fbdf4fc 8c0f4d7c 00000004 8fbdf598 8fbdf5ac NETIO!KfdClassify+0xed 8fbdf708 8c0fdbc3 86756020 87735444 86755dc0 tcpip!ShimIpPacketOutV4+0x1bd 8fbdf73c 8c0cf560 00000000 86756020 87735444 tcpip!IppInspectLocalPacketsOut+0x5c 8fbdf790 8c0f3363 8fbdf7bc 8c173d98 00000001 tcpip!IppLoopbackEnqueue+0xa6 8fbdf7d0 8c0fb273 8c173d98 8673a5f4 8673a690 tcpip!IppDispatchSendPacketHelper+0xf6 8fbdf870 8c10130e 0073a5f4 00000000 88e9f658 tcpip!IppPacketizeDatagrams+0x8d6 8fbdf8f0 8c101595 00000000 00000004 8c173d98 tcpip!IppSendDatagramsCommon+0x652 8fbdf910 8c0fcdfa 86738098 8fbdf99c 00000000 tcpip!IpNlpSendDatagrams+0x4b 8fbdfaec 8c0feb31 00000000 00000001 875ef488 tcpip!UdpSendMessagesOnPathCreation+0x7c0 8fbdfbf0 8c0fe37a 86738008 00bdfcc8 00000000 tcpip!UdpSendMessages+0x595 8fbdfc04 82cd808a 8fbdfc94 bedc8de6 00000000 tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x13 8fbdfc6c 8c0fe170 8c0fe367 8fbdfc94 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132 8fbdfcac 90cf1f56 875ef488 8fbdfcc8 876f47f0 tcpip!UdpTlProviderSendMessages+0x67 8fbdfcf0 90cfa237 875ecde0 876f47f0 876f48a8 tdx!TdxSendTransportAddress+0x148 8fbdfd0c 82c844ac 86904f00 876f47f0 90d16178 tdx!TdxTdiDispatchInternalDeviceControl+0x69 8fbdfd24 90d134fa 8fbdfd50 90d13759 861ca480 nt!IofCallDriver+0x63 WARNING: Stack unwind information not available. Following frames may be wrong. 8fbdfd2c 90d13759 861ca480 00000000 8690c020 cmdhlp+0x34fa 8fbdfd50 82e5666d 00000000 bedc8c1a 00000000 cmdhlp+0x3759 8fbdfd90 82d081d9 90d136b6 00000000 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!KfdClassify+ed 8c02c1e2 f00fc108 lock xadd dword ptr [eax],ecx SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: NETIO!KfdClassify+ed FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf63 FAILURE_BUCKET_ID: 0xD1_NETIO!KfdClassify+ed BUCKET_ID: 0xD1_NETIO!KfdClassify+ed Followup: MachineOwner ---------
The test was using memtest86+. I checked Gigabyte's website (N650SLI_DS4) and didn't find any network driver updates for Win 7. The latest dirvers from Nvidia's website are 15.51 and haven't been updated since Oct 2009. I'll try going down the upgrade route for MS Security Essentials but I must have a driver conflict in Win 7.
I really like Zone Alarm over the MS firewall because it tells me when any request goes outbound, I get notified. Sometimes this doesn't happen with the MS one.