the zip is also
greetings
Giani.V.W
Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!
Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Tom\AppData\Local\Temp\7zO4D9BB68D\090813-14788-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.18113.amd64fre.win7sp1_gdr.130318-1533 Machine Name: Kernel base = 0xfffff800`02c5f000 PsLoadedModuleList = 0xfffff800`02ea2670 Debug session time: Sun Sep 8 22:19:24.978 2013 (UTC + 1:00) System Uptime: 0 days 0:03:24.991 Loading Kernel Symbols ............................................................... ................................................................ ................ Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {8, 2, 0, fffff880016446a3} *** WARNING: Unable to verify timestamp for e1q62x64.sys *** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys Probably caused by : e1q62x64.sys ( e1q62x64+239e9 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000008, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff880016446a3, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0c100 GetUlongFromAddress: unable to read from fffff80002f0c1c0 0000000000000008 Nonpaged pool CURRENT_IRQL: 2 FAULTING_IP: tcpip!IpFlcReceivePreValidatedPackets+2d3 fffff880`016446a3 440fb62c01 movzx r13d,byte ptr [rcx+rax] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: TrustedInstall TRAP_FRAME: fffff80000ba1a50 -- (.trap 0xfffff80000ba1a50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008 rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000 rip=fffff880016446a3 rsp=fffff80000ba1be0 rbp=fffffa800eeed140 r8=0000000000000006 r9=0000000000000003 r10=0000000000000003 r11=0000000000000014 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc tcpip!IpFlcReceivePreValidatedPackets+0x2d3: fffff880`016446a3 440fb62c01 movzx r13d,byte ptr [rcx+rax] ds:00000000`00000008=?? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002cd41a9 to fffff80002cd4c00 STACK_TEXT: fffff800`00ba1908 fffff800`02cd41a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1910 fffff800`02cd2e20 : 00000000`000003b8 fffffa80`0de58101 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`00ba1a50 fffff880`016446a3 : 00000000`00000000 fffffa80`0c966950 fffff800`00ba1dc8 fffff800`00ba1f00 : nt!KiPageFault+0x260 fffff800`00ba1be0 fffff880`016554a2 : fffffa80`0e329e50 fffffa80`0e316010 00000000`00000006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x2d3 fffff800`00ba1d40 fffff800`02ce0878 : 00000000`00000000 00000000`00004800 fffffa80`0ca42060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2 fffff800`00ba1d90 fffff880`01655bd2 : fffff880`01655400 fffffa80`0e2c5030 00000000`00000002 fffff880`01663600 : nt!KeExpandKernelStackAndCalloutEx+0xd8 fffff800`00ba1e70 fffff880`015350eb : fffffa80`0e328010 00000000`00000000 fffffa80`0de581a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2 fffff800`00ba1ee0 fffff880`014fead6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb fffff800`00ba1f50 fffff880`01477cc1 : fffffa80`0de581a0 00000000`00000002 00000000`00000004 fffff880`0164498c : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6 fffff800`00ba23d0 fffff880`03c499e9 : fffffa80`0e1bd000 fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1 fffff800`00ba2420 fffffa80`0e1bd000 : fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 : e1q62x64+0x239e9 fffff800`00ba2428 fffffa80`0e2c0030 : fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 00000000`00000004 : 0xfffffa80`0e1bd000 fffff800`00ba2430 fffffa80`0e2bf9e0 : 00000000`00000004 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 : 0xfffffa80`0e2c0030 fffff800`00ba2438 00000000`00000004 : 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 : 0xfffffa80`0e2bf9e0 fffff800`00ba2440 00000000`00000801 : 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 : 0x4 fffff800`00ba2448 00000000`00000004 : fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 : 0x801 fffff800`00ba2450 fffffa80`0e1bfb00 : fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 : 0x4 fffff800`00ba2458 fffff880`03c49b84 : 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 : 0xfffffa80`0e1bfb00 fffff800`00ba2460 00000000`00000001 : fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 : e1q62x64+0x23b84 fffff800`00ba2468 fffffa80`0e2c0030 : fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 00000000`00000000 : 0x1 fffff800`00ba2470 fffffa80`0e2dd470 : 00000000`00000004 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 : 0xfffffa80`0e2c0030 fffff800`00ba2478 00000000`00000004 : 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 : 0xfffffa80`0e2dd470 fffff800`00ba2480 0000000a`00000001 : 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 : 0x4 fffff800`00ba2488 00000000`00000000 : fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 fffffa80`0de5a820 : 0x0000000a`00000001 STACK_COMMAND: kb FOLLOWUP_IP: e1q62x64+239e9 fffff880`03c499e9 ?? ??? SYMBOL_STACK_INDEX: a SYMBOL_NAME: e1q62x64+239e9 FOLLOWUP_NAME: MachineOwner MODULE_NAME: e1q62x64 IMAGE_NAME: e1q62x64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4c364c04 FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+239e9 BUCKET_ID: X64_0xD1_e1q62x64+239e9 Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000008, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff880016446a3, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 0000000000000008 Nonpaged pool CURRENT_IRQL: 2 FAULTING_IP: tcpip!IpFlcReceivePreValidatedPackets+2d3 fffff880`016446a3 440fb62c01 movzx r13d,byte ptr [rcx+rax] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: TrustedInstall TRAP_FRAME: fffff80000ba1a50 -- (.trap 0xfffff80000ba1a50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008 rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000 rip=fffff880016446a3 rsp=fffff80000ba1be0 rbp=fffffa800eeed140 r8=0000000000000006 r9=0000000000000003 r10=0000000000000003 r11=0000000000000014 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc tcpip!IpFlcReceivePreValidatedPackets+0x2d3: fffff880`016446a3 440fb62c01 movzx r13d,byte ptr [rcx+rax] ds:00000000`00000008=?? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002cd41a9 to fffff80002cd4c00 STACK_TEXT: fffff800`00ba1908 fffff800`02cd41a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1910 fffff800`02cd2e20 : 00000000`000003b8 fffffa80`0de58101 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`00ba1a50 fffff880`016446a3 : 00000000`00000000 fffffa80`0c966950 fffff800`00ba1dc8 fffff800`00ba1f00 : nt!KiPageFault+0x260 fffff800`00ba1be0 fffff880`016554a2 : fffffa80`0e329e50 fffffa80`0e316010 00000000`00000006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x2d3 fffff800`00ba1d40 fffff800`02ce0878 : 00000000`00000000 00000000`00004800 fffffa80`0ca42060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2 fffff800`00ba1d90 fffff880`01655bd2 : fffff880`01655400 fffffa80`0e2c5030 00000000`00000002 fffff880`01663600 : nt!KeExpandKernelStackAndCalloutEx+0xd8 fffff800`00ba1e70 fffff880`015350eb : fffffa80`0e328010 00000000`00000000 fffffa80`0de581a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2 fffff800`00ba1ee0 fffff880`014fead6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb fffff800`00ba1f50 fffff880`01477cc1 : fffffa80`0de581a0 00000000`00000002 00000000`00000004 fffff880`0164498c : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6 fffff800`00ba23d0 fffff880`03c499e9 : fffffa80`0e1bd000 fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1 fffff800`00ba2420 fffffa80`0e1bd000 : fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 : e1q62x64+0x239e9 fffff800`00ba2428 fffffa80`0e2c0030 : fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 00000000`00000004 : 0xfffffa80`0e1bd000 fffff800`00ba2430 fffffa80`0e2bf9e0 : 00000000`00000004 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 : 0xfffffa80`0e2c0030 fffff800`00ba2438 00000000`00000004 : 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 : 0xfffffa80`0e2bf9e0 fffff800`00ba2440 00000000`00000801 : 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 : 0x4 fffff800`00ba2448 00000000`00000004 : fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 : 0x801 fffff800`00ba2450 fffffa80`0e1bfb00 : fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 : 0x4 fffff800`00ba2458 fffff880`03c49b84 : 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 : 0xfffffa80`0e1bfb00 fffff800`00ba2460 00000000`00000001 : fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 : e1q62x64+0x23b84 fffff800`00ba2468 fffffa80`0e2c0030 : fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 00000000`00000000 : 0x1 fffff800`00ba2470 fffffa80`0e2dd470 : 00000000`00000004 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 : 0xfffffa80`0e2c0030 fffff800`00ba2478 00000000`00000004 : 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 : 0xfffffa80`0e2dd470 fffff800`00ba2480 0000000a`00000001 : 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 : 0x4 fffff800`00ba2488 00000000`00000000 : fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 fffffa80`0de5a820 : 0x0000000a`00000001 STACK_COMMAND: kb FOLLOWUP_IP: e1q62x64+239e9 fffff880`03c499e9 ?? ??? SYMBOL_STACK_INDEX: a SYMBOL_NAME: e1q62x64+239e9 FOLLOWUP_NAME: MachineOwner MODULE_NAME: e1q62x64 IMAGE_NAME: e1q62x64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4c364c04 FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+239e9 BUCKET_ID: X64_0xD1_e1q62x64+239e9 Followup: MachineOwner ---------
0 members, 0 guests, 0 anonymous users
Community Forum Software by IP.Board
Licensed to: Geeks to Go, Inc.