Wątek zamknięty

[Rozwiązany] BSOD: spowodowany prawdopodobnie anteną WiFi

 
tomjar
Nowy
Liczba postów: 5
Post: #1
Lightbulb 

BSOD: spowodowany prawdopodobnie anteną WiFi


Witam. Wczoraj formatowałem komputer i od tego momentu co chwile wyskakuje mi bluescreen. Podejrzewam że to przez sterowniki od anteny WIFi Sparklan AD-600z (sterowniki które mam to Atheros AR5007UG Wifi). Wstawię kody błędu. Jeżeli to faktycznie przez te sterowniki/antenę pomógłby mi ktoś z znalezieniem odpowiednich do tej anteny?


Z góry dziękuję za pomoc.
(Ten post był ostatnio modyfikowany: 11.09.2013 21:14 przez tomjar.)

11.09.2013 20:04

Znajdź wszystkie posty użytkownika
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #2

RE: Bluescreen spowodowany prawdopodobnie anteną WiFi- Win 7


Pousuwaj ten śmietnik w poście, w folderze c:\windows\minidump są pliki dmp zrzutów pamięci. Podrzuć spakowane archiwum to sobie przelecę debugerem i powyciągam co potrzebuję.

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.

11.09.2013 20:51

Znajdź wszystkie posty użytkownika
tomjar
Nowy
Liczba postów: 5
Post: #3

RE: Bluescreen spowodowany prawdopodobnie anteną WiFi- Win 7


http://www.sendspace.pl/file/73c27386eedeee6ff551f54

Proszę. Pojawiły się nowe z innymi błędami.
Więc jest ktoś w stanie mi pomóc?

11.09.2013 21:14

Znajdź wszystkie posty użytkownika
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #4

RE: Bluescreen spowodowany prawdopodobnie anteną WiFi- Win 7


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
Do sprawdzenia ndis.sys - nie musi być bezpośrednią przyczyną.

Już na pierwszy rzut oka widać brak Service Pack 1. Być może sterownik dla wlan zachowuje się niepoprawnie dla systemu x64 gdyż sterownik na stronie jest opisany dla x86.
Sterownik dla karty sieciowej z odkręcaną anteną - pierwszy link
http://www.sparklan.com/download.php?prod_id=37
Można tez sprawdzić identyfikator urządzenia w managerze urządzeń i poszukać na stronie atheros.cz. PPM na Atheros w managerze, właściwości, zakładka szczegóły.

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\66\090913-16203-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a62000 PsLoadedModuleList = 0xfffff800`02c9fe50
Debug session time:  Mon Sep  9 22: 58: 09.360 2013 (UTC + 2: 00)
System Uptime:  0 days 0: 05: 03.000
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff880017031e0, fffff88003185678, fffff88003184ed0}

Probably caused by :  ndis.sys ( ndis!memcpy+250 )

Followup:  MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1:  ffffffffc0000005, The exception code that was not handled
Arg2:  fffff880017031e0, The address that the exception occurred at
Arg3:  fffff88003185678, Exception Record Address
Arg4:  fffff88003184ed0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:  
ndis!memcpy+250
fffff880`017031e0 488b440af8      mov     rax,qword ptr [rdx+rcx-8]

EXCEPTION_RECORD:   fffff88003185678 -- (.exr 0xfffff88003185678)
ExceptionAddress:  fffff880017031e0 (ndis!memcpy+0x0000000000000250)
   ExceptionCode:  c0000005 (Access violation)
  ExceptionFlags:  00000000
NumberParameters:  2
   Parameter[0]:  0000000000000000
   Parameter[1]:  ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:   fffff88003184ed0 -- (.cxr 0xfffff88003184ed0)
rax=000000000000b19d rbx=fffffa8006aa5c90 rcx=fffff88003185c38
rdx=a989d2500f2f09cb rsi=0000000000000208 rdi=0000000000000006
rip=fffff880017031e0 rsp=fffff880031858b8 rbp=fffffa8006aa1a20
r8=0000000000000208  r9=0000000000000010 r10=0000000000000000
r11=fffff88003185a30 r12=0000000000000014 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010283
ndis!memcpy+0x250:
fffff880`017031e0 488b440af8      mov     rax,qword ptr [rdx+rcx-8] ds: 002b: a989cad0`124765fb=?
Resetting default scope

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   System

CURRENT_IRQL:   2

ERROR_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_PARAMETER1:   0000000000000000

EXCEPTION_PARAMETER2:   ffffffffffffffff

READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff80002d0a0e0
ffffffffffffffff

FOLLOWUP_IP:  
ndis!memcpy+250
fffff880`017031e0 488b440af8      mov     rax,qword ptr [rdx+rcx-8]

BUGCHECK_STR:   0x7E

LAST_CONTROL_TRANSFER:   from fffff8800171085e to fffff880017031e0

STACK_TEXT:  
fffff880`031858b8 fffff880`0171085e :  fffffa80`00001812 fffff880`00000003 fffffa80`06737810 00000000`0000000b :  ndis!memcpy+0x250
fffff880`031858c0 fffff880`01710efc :  fffffa80`06aa5c90 00000000`00000001 00000000`00000000 00000000`00000000 :  ndis!ndisSqmLogDriverVersion+0xae
fffff880`03185c70 fffff800`02ae1161 :  fffff880`01710e40 fffff800`02c775f8 fffffa80`04f36040 00000000`00000000 :  ndis!ndisSqmTimerWorkerRoutine+0xbc
fffff880`03185cb0 fffff800`02d77166 :  89894c00`0000c881 fffffa80`04f36040 00000000`00000080 fffffa80`04f225f0 :  nt!ExpWorkerThread+0x111
fffff880`03185d40 fffff800`02ab2486 :  fffff880`02f63180 fffffa80`04f36040 fffff880`02f6df80 00000130`89894c00 :  nt!PspSystemThreadStartup+0x5a
fffff880`03185d80 00000000`00000000 :  fffff880`03186000 fffff880`03180000 fffff880`03185930 00000000`00000000 :  nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:   0

SYMBOL_NAME:   ndis!memcpy+250

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  ndis

IMAGE_NAME:   ndis.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc184

STACK_COMMAND:   .cxr 0xfffff88003184ed0 ; kb

FAILURE_BUCKET_ID:   X64_0x7E_ndis!memcpy+250

BUCKET_ID:   X64_0x7E_ndis!memcpy+250

Followup:  MachineOwner
---------

rax=000000000000b19d rbx=fffffa8006aa5c90 rcx=fffff88003185c38
rdx=a989d2500f2f09cb rsi=0000000000000208 rdi=0000000000000006
rip=fffff880017031e0 rsp=fffff880031858b8 rbp=fffffa8006aa1a20
r8=0000000000000208  r9=0000000000000010 r10=0000000000000000
r11=fffff88003185a30 r12=0000000000000014 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010283
ndis!memcpy+0x250:
fffff880`017031e0 488b440af8      mov     rax,qword ptr [rdx+rcx-8] ds: 002b: a989cad0`124765fb=?
Child-SP          RetAddr           :  Args to Child                                                           :  Call Site
fffff880`031858b8 fffff880`0171085e :  fffffa80`00001812 fffff880`00000003 fffffa80`06737810 00000000`0000000b :  ndis!memcpy+0x250
fffff880`031858c0 fffff880`01710efc :  fffffa80`06aa5c90 00000000`00000001 00000000`00000000 00000000`00000000 :  ndis!ndisSqmLogDriverVersion+0xae
fffff880`03185c70 fffff800`02ae1161 :  fffff880`01710e40 fffff800`02c775f8 fffffa80`04f36040 00000000`00000000 :  ndis!ndisSqmTimerWorkerRoutine+0xbc
fffff880`03185cb0 fffff800`02d77166 :  89894c00`0000c881 fffffa80`04f36040 00000000`00000080 fffffa80`04f225f0 :  nt!ExpWorkerThread+0x111
fffff880`03185d40 fffff800`02ab2486 :  fffff880`02f63180 fffffa80`04f36040 fffff880`02f6df80 00000130`89894c00 :  nt!PspSystemThreadStartup+0x5a
fffff880`03185d80 00000000`00000000 :  fffff880`03186000 fffff880`03180000 fffff880`03185930 00000000`00000000 :  nt!KxStartSystemThread+0x16
start             end                 module name
fffff800`00bc0000 fffff800`00bca000   kdcom    kdcom.dll    Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff800`02a19000 fffff800`02a62000   hal      hal.dll      Tue Jul 14 03: 27: 36 2009 (4A5BDF08)
fffff800`02a62000 fffff800`0303f000   nt       ntkrnlmp.exe Tue Jul 14 01: 40: 48 2009 (4A5BC600)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00ca4000 fffff880`00cb3000   WDFLDR   WDFLDR.SYS   Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00cbf000 fffff880`00ccc000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 03: 29: 09 2009 (4A5BDF65)
fffff880`00ccc000 fffff880`00ce0000   PSHED    PSHED.dll    Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00ce0000 fffff880`00d3e000   CLFS     CLFS.SYS     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00d3e000 fffff880`00dfe000   CI       CI.dll       Tue Jul 14 03: 32: 13 2009 (4A5BE01D)
fffff880`00e31000 fffff880`00e88000   ACPI     ACPI.sys     Tue Jul 14 01: 19: 34 2009 (4A5BC106)
fffff880`00e88000 fffff880`00e91000   WMILIB   WMILIB.SYS   Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00e91000 fffff880`00e9b000   msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00e9b000 fffff880`00ece000   pci      pci.sys      Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00ece000 fffff880`00edb000   vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00edb000 fffff880`00ef0000   partmgr  partmgr.sys  Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`00ef0000 fffff880`00f05000   volmgr   volmgr.sys   Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00f05000 fffff880`00f61000   volmgrx  volmgrx.sys  Tue Jul 14 01: 20: 33 2009 (4A5BC141)
fffff880`00f61000 fffff880`00f68000   pciide   pciide.sys   Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00f68000 fffff880`00f78000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00f78000 fffff880`00f92000   mountmgr mountmgr.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00f92000 fffff880`00f9b000   atapi    atapi.sys    Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00f9b000 fffff880`00fc5000   ataport  ataport.SYS  Tue Jul 14 01: 19: 52 2009 (4A5BC118)
fffff880`00fc5000 fffff880`00ff0000   nvstor   nvstor.sys   Wed May 20 08: 45: 37 2009 (4A13A711)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Tue Jul 14 01: 21: 32 2009 (4A5BC17C)
fffff880`010b9000 fffff880`0111b000   storport storport.sys Tue Jul 14 02: 01: 18 2009 (4A5BCACE)
fffff880`0111b000 fffff880`0115a000   nvstor64 nvstor64.sys Fri Apr 09 11: 22: 41 2010 (4BBEF1E1)
fffff880`0115a000 fffff880`01165000   amdxata  amdxata.sys  Tue May 19 19: 56: 59 2009 (4A12F2EB)
fffff880`01165000 fffff880`011b1000   fltmgr   fltmgr.sys   Tue Jul 14 01: 19: 59 2009 (4A5BC11F)
fffff880`011b1000 fffff880`011c5000   fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`0122f000 fffff880`013d2000   Ntfs     Ntfs.sys     Tue Jul 14 01: 20: 47 2009 (4A5BC14F)
fffff880`013d2000 fffff880`013ec000   ksecdd   ksecdd.sys   Tue Jul 14 01: 20: 54 2009 (4A5BC156)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Tue Jul 14 01: 22: 15 2009 (4A5BC1A7)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`014ab000 fffff880`0151e000   cng      cng.sys      Tue Jul 14 01: 49: 40 2009 (4A5BC814)
fffff880`0151e000 fffff880`0152f000   pcw      pcw.sys      Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`0152f000 fffff880`01539000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 01: 19: 45 2009 (4A5BC111)
fffff880`01539000 fffff880`01585000   volsnap  volsnap.sys  Tue Jul 14 01: 20: 08 2009 (4A5BC128)
fffff880`01585000 fffff880`015bf000   rdyboost rdyboost.sys Tue Jul 14 01: 34: 34 2009 (4A5BC48A)
fffff880`015bf000 fffff880`015d1000   mup      mup.sys      Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`015d1000 fffff880`015da000   hwpolicy hwpolicy.sys Tue Jul 14 01: 19: 22 2009 (4A5BC0FA)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Tue Jul 14 01: 21: 46 2009 (4A5BC18A)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Tue Jul 14 01: 50: 34 2009 (4A5BC84A)
fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Tue Jul 14 01: 21: 08 2009 (4A5BC164)
fffff880`016d5000 fffff880`016ea000   epfwwfp  epfwwfp.sys  Tue Jun 28 09: 30: 08 2011 (4E098300)
fffff880`016ea000 fffff880`016fa000   vmstorfl vmstorfl.sys Tue Jul 14 01: 42: 54 2009 (4A5BC67E)
fffff880`016ff000 fffff880`017f1000   ndis     ndis.sys     Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`017f1000 fffff880`017f9000   spldr    spldr.sys    Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Tue Jul 14 01: 25: 34 2009 (4A5BC26E)
fffff880`03800000 fffff880`03815000   lltdio   lltdio.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`03815000 fffff880`03868000   nwifi    nwifi.sys    Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`03868000 fffff880`0387b000   ndisuio  ndisuio.sys  Tue Jul 14 02: 09: 25 2009 (4A5BCCB5)
fffff880`0387b000 fffff880`03893000   rspndr   rspndr.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`038ea000 fffff880`039cc000   eamonm   eamonm.sys   Tue Aug 02 11: 33: 29 2011 (4E37C469)
fffff880`039cc000 fffff880`039fd000   epfw     epfw.sys     Tue Jun 28 09: 30: 10 2011 (4E098302)
fffff880`03e00000 fffff880`03e11000   Npfs     Npfs.SYS     Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`03e11000 fffff880`03e2f000   tdx      tdx.sys      Tue Jul 14 01: 21: 15 2009 (4A5BC16B)
fffff880`03e2f000 fffff880`03e3c000   TDI      TDI.SYS      Tue Jul 14 01: 21: 18 2009 (4A5BC16E)
fffff880`03e3c000 fffff880`03ec6000   afd      afd.sys      Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`03eda000 fffff880`03f20000   dtsoftbus01 dtsoftbus01.sys Mon Mar 14 14: 15: 36 2011 (4D7E14F8)
fffff880`03f20000 fffff880`03f4a000   cdrom    cdrom.sys    Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`03f4a000 fffff880`03f53000   Null     Null.SYS     Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`03f53000 fffff880`03f5a000   Beep     Beep.SYS     Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`03f5a000 fffff880`03f81000   ehdrv    ehdrv.sys    Tue Jun 28 09: 34: 38 2011 (4E09840E)
fffff880`03f81000 fffff880`03f90000   avgtpx64 avgtpx64.sys Tue May 28 16: 57: 10 2013 (51A4C5C6)
fffff880`03f90000 fffff880`03f9e000   vga      vga.sys      Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`03f9e000 fffff880`03fc3000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`03fc3000 fffff880`03fd3000   watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`03fd3000 fffff880`03fdc000   RDPCDD   RDPCDD.sys   Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`03fdc000 fffff880`03fe5000   rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`03fe5000 fffff880`03fee000   rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`03fee000 fffff880`03ff9000   Msfs     Msfs.SYS     Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`05400000 fffff880`0544d000   mrxsmb10 mrxsmb10.sys Tue Jul 14 01: 24: 08 2009 (4A5BC218)
fffff880`0544d000 fffff880`05470000   mrxsmb20 mrxsmb20.sys Tue Jul 14 01: 24: 05 2009 (4A5BC215)
fffff880`05470000 fffff880`054a1000   AODDriver2 AODDriver2.sys Wed Jun 15 10: 38: 35 2011 (4DF86F8B)
fffff880`054c5000 fffff880`0558d000   HTTP     HTTP.sys     Tue Jul 14 01: 22: 16 2009 (4A5BC1A8)
fffff880`0558d000 fffff880`055ab000   bowser   bowser.sys   Tue Jul 14 01: 23: 50 2009 (4A5BC206)
fffff880`055ab000 fffff880`055c3000   mpsdrv   mpsdrv.sys   Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`055c3000 fffff880`055ef000   mrxsmb   mrxsmb.sys   Tue Jul 14 01: 23: 59 2009 (4A5BC20F)
fffff880`06a00000 fffff880`06a51000   rdbss    rdbss.sys    Tue Jul 14 01: 24: 09 2009 (4A5BC219)
fffff880`06a51000 fffff880`06a5d000   nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`06a5d000 fffff880`06a68000   mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`06a68000 fffff880`06a77000   discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`06a77000 fffff880`06acc000   atikmpag atikmpag.sys Tue Dec 06 03: 12: 14 2011 (4EDD79FE)
fffff880`06af4000 fffff880`06b39000   netbt    netbt.sys    Tue Jul 14 01: 21: 28 2009 (4A5BC178)
fffff880`06b39000 fffff880`06b42000   wfplwf   wfplwf.sys   Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06b42000 fffff880`06b68000   pacer    pacer.sys    Tue Jul 14 02: 09: 41 2009 (4A5BCCC5)
fffff880`06b68000 fffff880`06b75000   EpfwLWF  EpfwLWF.sys  Mon Jul 11 18: 19: 38 2011 (4E1B229A)
fffff880`06b75000 fffff880`06b84000   netbios  netbios.sys  Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06b84000 fffff880`06ba1000   serial   serial.sys   Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`06ba1000 fffff880`06bbc000   wanarp   wanarp.sys   Tue Jul 14 02: 10: 21 2009 (4A5BCCED)
fffff880`06bbc000 fffff880`06bd0000   termdd   termdd.sys   Tue Jul 14 02: 16: 36 2009 (4A5BCE64)
fffff880`06c00000 fffff880`06c0e000   kbdhid   kbdhid.sys   Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`06c2a000 fffff880`06cad000   csc      csc.sys      Tue Jul 14 01: 24: 26 2009 (4A5BC22A)
fffff880`06cad000 fffff880`06ccb000   dfsc     dfsc.sys     Tue Jul 14 01: 23: 44 2009 (4A5BC200)
fffff880`06ccb000 fffff880`06cdc000   blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`06cdc000 fffff880`06d02000   tunnel   tunnel.sys   Tue Jul 14 02: 09: 37 2009 (4A5BCCC1)
fffff880`06d02000 fffff880`06d17000   amdppm   amdppm.sys   Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`06d17000 fffff880`06d34000   parport  parport.sys  Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`06d34000 fffff880`06d40000   serenum  serenum.sys  Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`06d40000 fffff880`06d4b000   usbohci  usbohci.sys  Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`06d4b000 fffff880`06da1000   USBPORT  USBPORT.SYS  Tue Jul 14 02: 06: 31 2009 (4A5BCC07)
fffff880`06da1000 fffff880`06db2000   usbehci  usbehci.sys  Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`06db2000 fffff880`06dd6000   HDAudBus HDAudBus.sys Tue Jul 14 02: 06: 13 2009 (4A5BCBF5)
fffff880`06dd6000 fffff880`06de4000   hidusb   hidusb.sys   Tue Jul 14 02: 06: 22 2009 (4A5BCBFE)
fffff880`06de4000 fffff880`06dfd000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02: 06: 21 2009 (4A5BCBFD)
fffff880`06e00000 fffff880`06e24000   rasl2tp  rasl2tp.sys  Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`06e24000 fffff880`06e30000   ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`06e30000 fffff880`06e5f000   ndiswan  ndiswan.sys  Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`06e5f000 fffff880`06e7a000   raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`06e7a000 fffff880`06e9b000   raspptp  raspptp.sys  Tue Jul 14 02: 10: 18 2009 (4A5BCCEA)
fffff880`06e9c000 fffff880`06f90000   dxgkrnl  dxgkrnl.sys  Tue Jul 14 01: 38: 56 2009 (4A5BC590)
fffff880`06f90000 fffff880`06fd6000   dxgmms1  dxgmms1.sys  Tue Jul 14 01: 38: 32 2009 (4A5BC578)
fffff880`06fd6000 fffff880`06fe6000   CompositeBus CompositeBus.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`06fe6000 fffff880`06ffc000   AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`06ffc000 fffff880`06ffd480   swenum   swenum.sys   Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`07200000 fffff880`0725a000   usbhub   usbhub.sys   Tue Jul 14 02: 07: 09 2009 (4A5BCC2D)
fffff880`0725a000 fffff880`0726f000   NDProxy  NDProxy.SYS  Tue Jul 14 02: 10: 05 2009 (4A5BCCDD)
fffff880`0726f000 fffff880`07291000   drmk     drmk.sys     Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`07292000 fffff880`07d1d000   atikmdag atikmdag.sys Tue Dec 06 03: 52: 23 2011 (4EDD8367)
fffff880`07d1d000 fffff880`07d37000   rassstp  rassstp.sys  Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`07d37000 fffff880`07d42000   rdpbus   rdpbus.sys   Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`07d42000 fffff880`07d51000   kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`07d51000 fffff880`07d60000   mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`07d60000 fffff880`07da3000   ks       ks.sys       Tue Jul 14 02: 00: 31 2009 (4A5BCA9F)
fffff880`07da3000 fffff880`07db7000   amdiox64 amdiox64.sys Thu Feb 18 16: 17: 53 2010 (4B7D5A21)
fffff880`07db7000 fffff880`07dc9000   umbus    umbus.sys    Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`07dc9000 fffff880`07de3000   AtihdW76 AtihdW76.sys Tue Oct 18 09: 09: 49 2011 (4E9D263D)
fffff880`07de3000 fffff880`07e00000   usbccgp  usbccgp.sys  Tue Jul 14 02: 06: 45 2009 (4A5BCC15)
fffff880`08200000 fffff880`0823d000   portcls  portcls.sys  Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`08241000 fffff880`083eb000   viahduaa viahduaa.sys Wed Nov 25 14: 06: 00 2009 (4B0D2BB8)
fffff880`083eb000 fffff880`083f0200   ksthunk  ksthunk.sys  Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`083f1000 fffff880`083f2f00   USBD     USBD.SYS     Tue Jul 14 02: 06: 23 2009 (4A5BCBFF)
fffff880`083f3000 fffff880`083fb080   HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`08465000 fffff880`084f6000   athrxusb athrxusb.sys Fri Dec 22 13: 05: 49 2006 (458BCA1D)
fffff880`084f6000 fffff880`08503000   mouhid   mouhid.sys   Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`08503000 fffff880`0850f000   Dxapi    Dxapi.sys    Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`0850f000 fffff880`0852c000   cdfs     cdfs.sys     Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`0852c000 fffff880`0853a000   crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`0853a000 fffff880`08544000   dump_diskdump dump_diskdump.sys Tue Jul 14 02: 01: 00 2009 (4A5BCABC)
fffff880`08544000 fffff880`08583000   dump_nvstor64 dump_nvstor64.sys Fri Apr 09 11: 22: 41 2010 (4BBEF1E1)
fffff880`08583000 fffff880`08596000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`08596000 fffff880`085a4000   monitor  monitor.sys  Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`085a4000 fffff880`085c7000   luafv    luafv.sys    Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`09600000 fffff880`09669000   srv2     srv2.sys     Tue Jul 14 01: 25: 02 2009 (4A5BC24E)
fffff880`096e4000 fffff880`0978a000   peauth   peauth.sys   Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`0978a000 fffff880`09795000   secdrv   secdrv.SYS   Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`09795000 fffff880`097c2000   srvnet   srvnet.sys   Tue Jul 14 01: 24: 58 2009 (4A5BC24A)
fffff880`097c2000 fffff880`097d4000   tcpipreg tcpipreg.sys Tue Jul 14 02: 09: 49 2009 (4A5BCCCD)
fffff880`09894000 fffff880`0992c000   srv      srv.sys      Tue Jul 14 01: 25: 11 2009 (4A5BC257)
fffff880`0992c000 fffff880`0999d000   spsys    spsys.sys    Mon May 11 19: 20: 58 2009 (4A085E7A)
fffff960`000f0000 fffff960`003ff000   win32k   win32k.sys   unavailable (00000000)
fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00770000 fffff960`00797000   cdd      cdd.dll      unavailable (00000000)

Unloaded modules:
fffff880`01480000 fffff880`0148e000   crashdmp.sys
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000E000
fffff880`0148e000 fffff880`01498000   dump_storpor
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000A000
fffff880`0105e000 fffff880`0109d000   dump_nvstor6
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0003F000
fffff880`01498000 fffff880`014ab000   dump_dumpfve
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00013000
Bugcheck code 1000007E
Arguments ffffffff`c0000005 fffff880`017031e0 fffff880`03185678 fffff880`03184ed0
[CPU Information]
~MHz = REG_DWORD 3114
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 16 Model 5 Stepping 3
ProcessorNameString = REG_SZ AMD Athlon(tm) II X3 445 Processor
VendorIdentifier = REG_SZ AuthenticAMD
Machine ID Information [From Smbios 2.4, DMIVersion 0, Size=1127]
BiosMajorRelease = 8
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = P1.10
BiosReleaseDate = 04/12/2010
SystemManufacturer = To Be Filled By O.E.M.
SystemProductName = To Be Filled By O.E.M.
SystemFamily = To Be Filled By O.E.M.
SystemVersion = To Be Filled By O.E.M.
SystemSKU = To Be Filled By O.E.M.
BaseBoardManufacturer = ASRock
BaseBoardProduct = N68C-S UCC
BaseBoardVersion =                      
sysinfo:  unknown error 80004005
[SMBIOS Data Tables v2.4]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 1127 bytes]

[BIOS Information (Type 0) - Length 24 - Handle 0000h]
  Vendor                        American Megatrends Inc.
  BIOS Version                  P1.10
  BIOS Starting Address Segment f000
  BIOS Release Date             04/12/2010
  BIOS ROM Size                 100000
  BIOS Characteristics
       07:  - PCI Supported
       11:  - Upgradeable FLASH BIOS
       12:  - BIOS Shadowing Supported
       15:  - CD-Boot Supported
       16:  - Selectable Boot Supported
       17:  - BIOS ROM Socketed
       19:  - EDD Supported
       23:  - 1.2MB Floppy Supported
       24:  - 720KB Floppy Supported
       25:  - 2.88MB Floppy Supported
       26:  - Print Screen Device Supported
       27:  - Keyboard Services Supported
       28:  - Serial Services Supported
       29:  - Printer Services Supported
       30:  - CGA/Mono Services Supported
       32:  - BIOS Vendor Reserved
  BIOS Characteristic Extensions
       00:  - ACPI Supported
       01:  - USB Legacy Supported
       04:  - LS120-Boot Supported
       05:  - ATAPI ZIP-Boot Supported
       08:  - BIOS Boot Specification Supported
       09:  - Fn-Key NET-Boot Supported
       10:  - Specification Reserved
  BIOS Major Revision           8
  BIOS Minor Revision           14
  EC Firmware Major Revision    255
  EC Firmware Minor Revision    255
[System Information (Type 1) - Length 27 - Handle 0001h]
  Manufacturer                  To Be Filled By O.E.M.
  Product Name                  To Be Filled By O.E.M.
  Version                       To Be Filled By O.E.M.
  Serial Number                                      
  UUID                          00000000-0000-0000-0000-000000000000
  Wakeup Type                   Power Switch
  SKUNumber                     To Be Filled By O.E.M.
  Family                        To Be Filled By O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  Manufacturer                  ASRock
  Product                       N68C-S UCC
  Version                                            
  Serial Number                                      
  Asset Tag                                          
  Feature Flags                 09h
       1423261044:  - ˆÃ)
       1423261004:  - ˆÃ)
  Location                                            
  Chassis Handle                0003h
  Board Type                    0ah - Processor/Memory Module
  Number of Child Handles       0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
  Manufacturer                  To Be Filled By O.E.M.
  Chassis Type                  Desktop
  Version                       To Be Filled By O.E.M.
  Serial Number                                      
  Asset Tag Number                                    
  Bootup State                  Safe
  Power Supply State            Safe
  Thermal State                 Safe
  Security Status               None
  OEM Defined                   0
  Height                        0U
  Number of Power Cords         1
  Number of Contained Elements  0
  Contained Element Size        0
[Processor Information (Type 4) - Length 35 - Handle 0004h]
  Socket Designation            CPUSocket
  Processor Type                Central Processor
  Processor Family              edh - Specification Reserved
  Processor Manufacturer        AMD              
  Processor ID                  530f1000fffb8b17
  Processor Version             AMD Athlon(tm) II X3 445 Processor                  
  Processor Voltage             8fh - 1.5V
  External Clock                200MHz
  Max Speed                     3100MHz
  Current Speed                 3100MHz
  Status                        Enabled Populated
  Processor Upgrade             Socket 940
  L1 Cache Handle               0005h
  L2 Cache Handle               0006h
  L3 Cache Handle               [Not Present]
  Serial Number                                      
  Asset Tag Number                                    
  Part Number                   To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
  Socket Designation            L1-Cache
  Cache Configuration           0280h - Varies Enabled Int NonSocketed L1
  Maximum Cache Size            0180h - 384K
  Installed Size                0180h - 384K
  Supported SRAM Type           0010h - Pipeline-Burst
  Current SRAM Type             0010h - Pipeline-Burst
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Data
  Associativity                 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
  Socket Designation            L2-Cache
  Cache Configuration           0281h - Varies Enabled Int NonSocketed L2
  Maximum Cache Size            0600h - 1536K
  Installed Size                0600h - 1536K
  Supported SRAM Type           0010h - Pipeline-Burst
  Current SRAM Type             0010h - Pipeline-Burst
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Unified
  Associativity                 4-way Set-Associative
[Memory Controller Information (Type 5) - Length 20 - Handle 0007h]
  Error Detecting Method        06h - 64-bit ECC
  Error Correcting Capability   04h - None
  Supported Interleave          03h - One Way Interleave
  Current Interleave            03h - One Way Interleave
  Maximum Memory Module Size    0bh - 2048MB
  Supported Speeds              000ch - 70ns 60ns
  Supported Memory Types        0500h - DIMM SDRAM
  Memory Module Voltage         3.3V
  Number of Memory Slots        2
  Memory Slot Handle            0008h
  Memory Slot Handle            0009h
  Enabled Err Correcting Caps   04h - None
[Memory Module Information (Type 6) - Length 12 - Handle 0008h]
  Socket Designation            DIMM0
  Bank Connections              07h - 7 0
  Current Speed                 7ns
  Current Memory Type           0140h - ECC DIMM
  Installed Size                8ch - 4096 [double bank]
  Enabled Size                  8ch - 4096 [double bank]
  Error Status                  00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0009h]
  Socket Designation            DIMM1
  Bank Connections              07h - 7 0
  Current Speed                 7ns
  Current Memory Type           0140h - ECC DIMM
  Installed Size                0bh - 2048 [single bank]
  Enabled Size                  0bh - 2048 [single bank]
  Error Status                  00h - [No Errors]
[Physical Memory Array (Type 16) - Length 15 - Handle 000eh]
  Location                      03h - SystemBoard/Motherboard
  Use                           03h - System Memory
  Memory Error Correction       03h - None
  Maximum Capacity              8388608KB
  Memory Error Inf Handle       [Not Provided]
  Number of Memory Devices      2
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 000fh]
  Starting Address              00000000h
  Ending Address                0067ffffh
  Memory Array Handle           000eh
  Partition Width               01
[Memory Device (Type 17) - Length 27 - Handle 0010h]
  Physical Memory Array Handle  000eh
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          4096MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM0
  Bank Locator                  BANK0
  Memory Type                   01h - Other
  Type Detail                   0080h - Synchronous
  Speed                         400MHz
  Manufacturer                  Manufacturer0
  Serial Number                        
  Asset Tag Number                          
  Part Number                   PartNum0
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0011h]
  Starting Address              00000000h
  Ending Address                003fffffh
  Memory Device Handle          0010h
  Mem Array Mapped Adr Handle   000fh
  Partition Row Position        01
  Interleave Position           [None]
  Interleave Data Depth         [None]
[Memory Device (Type 17) - Length 27 - Handle 0012h]
  Physical Memory Array Handle  000eh
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          2048MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM1
  Bank Locator                  BANK1
  Memory Type                   01h - Other
  Type Detail                   0080h - Synchronous
  Speed                         400MHz
  Manufacturer                  Manufacturer1
  Serial Number                        
  Asset Tag Number                          
  Part Number                   PartNum1
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0013h]
  Starting Address              00400000h
  Ending Address                005fffffh
  Memory Device Handle          0012h
  Mem Array Mapped Adr Handle   000fh
  Partition Row Position        01
  Interleave Position           [None]
  Interleave Data Depth         [None]

Sprzęt

AMD Athlon™ II X3 445 Processor
ASRock N68C-S UCC
4GB RAM

Sterowniki

Kod:
athrxusb.sys Fri Dec 22 13: 05: 49 2006 (458BCA1D)
Atheros Wireless LAN USB device driver  - zbyt stary nieaktualizowany sterownik urządzenia o którym pisałeś

amdxata.sys Tue May 19 19: 56: 59 2009 (4A12F2EB)
AMD storage controller driver

nvstor.sys Wed May 20 08: 45: 37 2009 (4A13A711)
nVidia Storage Drivers

viahduaa.sys Wed Nov 25 14: 06: 00 2009 (4B0D2BB8)
VIA High Definition Audio Function Driver

amdiox64.sys Thu Feb 18 16: 17: 53 2010 (4B7D5A21)
AMD IO Driver

nvstor64.sys Fri Apr 9 11: 22: 41 2010 (4BBEF1E1)
nVidia Storage Driver (nForce chipset driver)

dtsoftbus01.sys Mon Mar 14 14: 15: 36 2011 (4D7E14F8)
Daemon Tools driver

AODDriver2.sys Wed Jun 15 10: 38: 35 2011 (4DF86F8B)
AMD Overdrive do testowania sprzetu

epfwwfp.sys Tue Jun 28 09: 30: 08 2011 (4E098300)
ESET Personal Firewall Driver

epfw.sys Tue Jun 28 09: 30: 10 2011 (4E098302)
ESET

ehdrv.sys Tue Jun 28 09: 34: 38 2011 (4E09840E)
ESET

EpfwLWF.sys Mon Jul 11 18: 19: 38 2011 (4E1B229A)
ESET ESS/NOD32 driver

eamonm.sys Tue Aug 2 11: 33: 29 2011 (4E37C469)
ESET Amon driver

AtihdW76.sys Tue Oct 18 09: 09: 49 2011 (4E9D263D)
ATI Function Driver for HD Audio Service

atikmpag.sys Tue Dec 6 03: 12: 14 2011 (4EDD79FE)
ATI Video driver - nieaktualne

atikmdag.sys Tue Dec 6 03: 52: 23 2011 (4EDD8367)
ATI Video driver - nieaktualne

avgtpx64.sys Tue May 28 16: 57: 10 2013 (51A4C5C6)
Driver for AVG Secure Search - jakieś pozostałości

Kolejne bsody będę sprawdzał w trakcie.

Tu już ewidentnie sterownik tej karty sieciowej - zd1211Bu.sys

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\66\090913-17796-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
Debug session time:  Mon Sep  9 21: 54: 19.100 2013 (UTC + 2: 00)
System Uptime:  0 days 0: 07: 31.741
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {70633939, 2, 0, fffff88009f0cfa7}

Unable to load image \SystemRoot\system32\DRIVERS\zd1211Bu.sys, Win32 error 0n2
*** WARNING:  Unable to verify timestamp for zd1211Bu.sys
*** ERROR:  Module load completed but symbols could not be loaded for zd1211Bu.sys
Probably caused by :  zd1211Bu.sys ( zd1211Bu+10fa7 )

Followup:  MachineOwner
---------

2:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1:  0000000070633939, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, value 0 = read operation, 1 = write operation
Arg4:  fffff88009f0cfa7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff80002cb70e0
0000000070633939

CURRENT_IRQL:   2

FAULTING_IP:  
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xD1

PROCESS_NAME:   System

TRAP_FRAME:   fffff88002f8b860 -- (.trap 0xfffff88002f8b860)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000070627375 rbx=0000000000000000 rcx=0000000070627375
rdx=fffffa800725f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88009f0cfa7 rsp=fffff88002f8b9f8 rbp=0000000000000000
r8=fffffa8007b23510  r9=0000000000000050 r10=fffff88002f63b80
r11=fffff88002f8bb18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
zd1211Bu+0x10fa7:
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h] ds: 00000000`70633939=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80469 to fffff80002a80f00

STACK_TEXT:  
fffff880`02f8b718 fffff800`02a80469 :  00000000`0000000a 00000000`70633939 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`02f8b720 fffff800`02a7f0e0 :  00000000`00000001 fffffa80`0725f1bb 00000000`00000000 fffff880`02f6df80 :  nt!KiBugCheckDispatch+0x69
fffff880`02f8b860 fffff880`09f0cfa7 :  fffff800`02bb42dd fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 :  nt!KiPageFault+0x260
fffff880`02f8b9f8 fffff800`02bb42dd :  fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 fffff800`70627375 :  zd1211Bu+0x10fa7
fffff880`02f8ba00 fffffa80`05441170 :  fffffa80`05441102 fffff880`041985a6 00000000`54627255 00000000`000003ed :  nt!ExFreePoolWithTag+0x22d
fffff880`02f8bab0 fffffa80`05441102 :  fffff880`041985a6 00000000`54627255 00000000`000003ed fffffa80`70627375 :  0xfffffa80`05441170
fffff880`02f8bab8 fffff880`041985a6 :  00000000`54627255 00000000`000003ed fffffa80`70627375 00000000`00000000 :  0xfffffa80`05441102
fffff880`02f8bac0 fffff880`041835d9 :  fffffa80`061bf050 fffffa80`0543a900 ffffffff`c0010000 00000000`00000000 :  USBPORT!USBPORT_DereferenceDeviceHandle+0x14e
fffff880`02f8bb20 fffff880`04183ab7 :  fffffa80`06f3c702 fffffa80`0725f010 00000000`ffffffff fffffa80`061bfea8 :  USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bc00 fffff880`0418164f :  fffffa80`061bfea8 fffffa80`061bf1a0 fffffa80`061c0040 00000000`00000000 :  USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc60 fffff880`04172f89 :  fffffa80`061bf050 00000000`00000000 fffffa80`061bfe02 fffffa80`061bfea8 :  USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bca0 fffff800`02a8c5dc :  fffff880`02f63180 fffffa80`061bfea8 fffffa80`061bfec0 00000000`00000000 :  USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bcd0 fffff800`02a896fa :  fffff880`02f63180 fffff880`02f6df80 00000000`00000000 fffff880`04172db0 :  nt!KiRetireDpcList+0x1bc
fffff880`02f8bd80 00000000`00000000 :  fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 :  nt!KiIdleLoop+0x5a


STACK_COMMAND:   kb

FOLLOWUP_IP:  
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   zd1211Bu+10fa7

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  zd1211Bu

IMAGE_NAME:   zd1211Bu.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   44ed3c9b

FAILURE_BUCKET_ID:   X64_0xD1_zd1211Bu+10fa7

BUCKET_ID:   X64_0xD1_zd1211Bu+10fa7

Followup:  MachineOwner
---------

2:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1:  0000000070633939, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, value 0 = read operation, 1 = write operation
Arg4:  fffff88009f0cfa7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:   0000000070633939

CURRENT_IRQL:   2

FAULTING_IP:  
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xD1

PROCESS_NAME:   System

TRAP_FRAME:   fffff88002f8b860 -- (.trap 0xfffff88002f8b860)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000070627375 rbx=0000000000000000 rcx=0000000070627375
rdx=fffffa800725f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88009f0cfa7 rsp=fffff88002f8b9f8 rbp=0000000000000000
r8=fffffa8007b23510  r9=0000000000000050 r10=fffff88002f63b80
r11=fffff88002f8bb18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
zd1211Bu+0x10fa7:
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h] ds: 00000000`70633939=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80469 to fffff80002a80f00

STACK_TEXT:  
fffff880`02f8b718 fffff800`02a80469 :  00000000`0000000a 00000000`70633939 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`02f8b720 fffff800`02a7f0e0 :  00000000`00000001 fffffa80`0725f1bb 00000000`00000000 fffff880`02f6df80 :  nt!KiBugCheckDispatch+0x69
fffff880`02f8b860 fffff880`09f0cfa7 :  fffff800`02bb42dd fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 :  nt!KiPageFault+0x260
fffff880`02f8b9f8 fffff800`02bb42dd :  fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 fffff800`70627375 :  zd1211Bu+0x10fa7
fffff880`02f8ba00 fffffa80`05441170 :  fffffa80`05441102 fffff880`041985a6 00000000`54627255 00000000`000003ed :  nt!ExFreePoolWithTag+0x22d
fffff880`02f8bab0 fffffa80`05441102 :  fffff880`041985a6 00000000`54627255 00000000`000003ed fffffa80`70627375 :  0xfffffa80`05441170
fffff880`02f8bab8 fffff880`041985a6 :  00000000`54627255 00000000`000003ed fffffa80`70627375 00000000`00000000 :  0xfffffa80`05441102
fffff880`02f8bac0 fffff880`041835d9 :  fffffa80`061bf050 fffffa80`0543a900 ffffffff`c0010000 00000000`00000000 :  USBPORT!USBPORT_DereferenceDeviceHandle+0x14e
fffff880`02f8bb20 fffff880`04183ab7 :  fffffa80`06f3c702 fffffa80`0725f010 00000000`ffffffff fffffa80`061bfea8 :  USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bc00 fffff880`0418164f :  fffffa80`061bfea8 fffffa80`061bf1a0 fffffa80`061c0040 00000000`00000000 :  USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc60 fffff880`04172f89 :  fffffa80`061bf050 00000000`00000000 fffffa80`061bfe02 fffffa80`061bfea8 :  USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bca0 fffff800`02a8c5dc :  fffff880`02f63180 fffffa80`061bfea8 fffffa80`061bfec0 00000000`00000000 :  USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bcd0 fffff800`02a896fa :  fffff880`02f63180 fffff880`02f6df80 00000000`00000000 fffff880`04172db0 :  nt!KiRetireDpcList+0x1bc
fffff880`02f8bd80 00000000`00000000 :  fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 :  nt!KiIdleLoop+0x5a


STACK_COMMAND:   kb

FOLLOWUP_IP:  
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   zd1211Bu+10fa7

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  zd1211Bu

IMAGE_NAME:   zd1211Bu.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   44ed3c9b

FAILURE_BUCKET_ID:   X64_0xD1_zd1211Bu+10fa7

BUCKET_ID:   X64_0xD1_zd1211Bu+10fa7

Followup:  MachineOwner
---------

2:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1:  0000000070633939, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, value 0 = read operation, 1 = write operation
Arg4:  fffff88009f0cfa7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:   0000000070633939

CURRENT_IRQL:   2

FAULTING_IP:  
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xD1

PROCESS_NAME:   System

TRAP_FRAME:   fffff88002f8b860 -- (.trap 0xfffff88002f8b860)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000070627375 rbx=0000000000000000 rcx=0000000070627375
rdx=fffffa800725f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88009f0cfa7 rsp=fffff88002f8b9f8 rbp=0000000000000000
r8=fffffa8007b23510  r9=0000000000000050 r10=fffff88002f63b80
r11=fffff88002f8bb18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
zd1211Bu+0x10fa7:
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h] ds: 00000000`70633939=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80469 to fffff80002a80f00

STACK_TEXT:  
fffff880`02f8b718 fffff800`02a80469 :  00000000`0000000a 00000000`70633939 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`02f8b720 fffff800`02a7f0e0 :  00000000`00000001 fffffa80`0725f1bb 00000000`00000000 fffff880`02f6df80 :  nt!KiBugCheckDispatch+0x69
fffff880`02f8b860 fffff880`09f0cfa7 :  fffff800`02bb42dd fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 :  nt!KiPageFault+0x260
fffff880`02f8b9f8 fffff800`02bb42dd :  fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 fffff800`70627375 :  zd1211Bu+0x10fa7
fffff880`02f8ba00 fffffa80`05441170 :  fffffa80`05441102 fffff880`041985a6 00000000`54627255 00000000`000003ed :  nt!ExFreePoolWithTag+0x22d
fffff880`02f8bab0 fffffa80`05441102 :  fffff880`041985a6 00000000`54627255 00000000`000003ed fffffa80`70627375 :  0xfffffa80`05441170
fffff880`02f8bab8 fffff880`041985a6 :  00000000`54627255 00000000`000003ed fffffa80`70627375 00000000`00000000 :  0xfffffa80`05441102
fffff880`02f8bac0 fffff880`041835d9 :  fffffa80`061bf050 fffffa80`0543a900 ffffffff`c0010000 00000000`00000000 :  USBPORT!USBPORT_DereferenceDeviceHandle+0x14e
fffff880`02f8bb20 fffff880`04183ab7 :  fffffa80`06f3c702 fffffa80`0725f010 00000000`ffffffff fffffa80`061bfea8 :  USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bc00 fffff880`0418164f :  fffffa80`061bfea8 fffffa80`061bf1a0 fffffa80`061c0040 00000000`00000000 :  USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc60 fffff880`04172f89 :  fffffa80`061bf050 00000000`00000000 fffffa80`061bfe02 fffffa80`061bfea8 :  USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bca0 fffff800`02a8c5dc :  fffff880`02f63180 fffffa80`061bfea8 fffffa80`061bfec0 00000000`00000000 :  USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bcd0 fffff800`02a896fa :  fffff880`02f63180 fffff880`02f6df80 00000000`00000000 fffff880`04172db0 :  nt!KiRetireDpcList+0x1bc
fffff880`02f8bd80 00000000`00000000 :  fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 :  nt!KiIdleLoop+0x5a


STACK_COMMAND:   kb

FOLLOWUP_IP:  
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000  movzx   eax,byte ptr [rax+0C5C4h]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   zd1211Bu+10fa7

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  zd1211Bu

IMAGE_NAME:   zd1211Bu.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   44ed3c9b

FAILURE_BUCKET_ID:   X64_0xD1_zd1211Bu+10fa7

BUCKET_ID:   X64_0xD1_zd1211Bu+10fa7

Followup:  MachineOwner
---------

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\66\091013-15250-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time:  Tue Sep 10 08: 45: 53.912 2013 (UTC + 2: 00)
System Uptime:  0 days 0: 01: 39.505
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING:  Unable to verify timestamp for athrxusb.sys
*** ERROR:  Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by :  nwifi.sys ( nwifi!Pt6RepackRecvNBL+fa )

Followup:  MachineOwner
---------

2:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1:  0000000000000000, The exception code that was not handled
Arg2:  0000000000000000, The address that the exception occurred at
Arg3:  0000000000000000, Parameter 0 of the exception
Arg4:  0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE:  (Win32) 0 (0) - Operacja uko czona pomy lnie.

FAULTING_IP:  
+50502faf0375d854
00000000`00000000 ?              ?

EXCEPTION_PARAMETER1:   0000000000000000

EXCEPTION_PARAMETER2:   0000000000000000

ERROR_CODE:  (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:   0x1E_0

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   System

CURRENT_IRQL:   2

EXCEPTION_RECORD:   fffff88002f8b4b8 -- (.exr 0xfffff88002f8b4b8)
ExceptionAddress:  fffff88003b3775e (nwifi!Pt6RepackRecvNBL+0x00000000000000fa)
   ExceptionCode:  c0000005 (Access violation)
  ExceptionFlags:  00000000
NumberParameters:  2
   Parameter[0]:  0000000000000000
   Parameter[1]:  ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:   fffff88002f8b560 -- (.trap 0xfffff88002f8b560)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800690f9d0 rbx=0000000000000000 rcx=fffff88003b6f6e0
rdx=cddff0c95f1916b2 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003b3775e rsp=fffff88002f8b6f0 rbp=0000000000000000
r8=0000000000000000  r9=000000001cf2122a r10=fffff88003b6d110
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nwifi!Pt6RepackRecvNBL+0xfa:
fffff880`03b3775e 4c034a18        add     r9,qword ptr [rdx+18h] ds: 21a0: cddff0c9`5f1916ca=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a87c2e to fffff80002a8fed0

STACK_TEXT:  
fffff880`02f8a598 fffff800`02a87c2e :  fffff880`03b6f280 00000000`00000002 fffff880`02f8ad10 fffff800`02abce28 :  nt!KeBugCheck
fffff880`02f8a5a0 fffff800`02ab5bed :  fffff800`02c9cc24 fffff800`02bd5a3c fffff800`02a1e000 fffff880`02f8b4b8 :  nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8a5d0 fffff800`02abd250 :  fffff800`02bddb5c fffff880`02f8a648 fffff880`02f8b4b8 fffff800`02a1e000 :  nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8a600 fffff800`02aca1b5 :  fffff880`02f8b4b8 fffff880`02f8ad10 fffff880`00000000 fffffa80`0691ae50 :  nt!RtlDispatchException+0x410
fffff880`02f8ace0 fffff800`02a8f542 :  fffff880`02f8b4b8 00000000`00000000 fffff880`02f8b560 fffffa80`06f56010 :  nt!KiDispatchException+0x135
fffff880`02f8b380 fffff800`02a8de4a :  fffffa80`06ee3ef0 fffffa80`075a3510 00000000`00000000 00000000`00000001 :  nt!KiExceptionDispatch+0xc2
fffff880`02f8b560 fffff880`03b3775e :  00000000`00000000 00000000`00000000 fffffa80`06f56010 fffff880`084a5772 :  nt!KiGeneralProtectionFault+0x10a
fffff880`02f8b6f0 fffff880`03b386c8 :  fffffa80`06eacb1b fffff880`084c9fd8 fffffa80`068a9030 fffffa80`06f56010 :  nwifi!Pt6RepackRecvNBL+0xfa
fffff880`02f8b7f0 fffff880`014a52b7 :  fffffa80`0615d1a0 fffffa80`0691ae50 00000000`00000001 0000000f`06caa54a :  nwifi!Pt6Receive+0x170
fffff880`02f8b850 fffff880`08486c40 :  fffffa80`06eacb1b 00000000`00000000 00000000`00000000 fffffa80`060eb700 :  ndis! ? : FNODOBFM: `string'+0xccef
fffff880`02f8b8a0 fffffa80`06eacb1b :  00000000`00000000 00000000`00000000 fffffa80`060eb700 fffffa80`00000001 :  athrxusb+0xec40
fffff880`02f8b8a8 00000000`00000000 :  00000000`00000000 fffffa80`060eb700 fffffa80`00000001 00000000`00000000 :  0xfffffa80`06eacb1b


STACK_COMMAND:   kb

FOLLOWUP_IP:  
nwifi!Pt6RepackRecvNBL+fa
fffff880`03b3775e 4c034a18        add     r9,qword ptr [rdx+18h]

SYMBOL_STACK_INDEX:   7

SYMBOL_NAME:   nwifi!Pt6RepackRecvNBL+fa

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nwifi

IMAGE_NAME:   nwifi.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bcc3b

FAILURE_BUCKET_ID:   X64_0x1E_0_nwifi!Pt6RepackRecvNBL+fa

BUCKET_ID:   X64_0x1E_0_nwifi!Pt6RepackRecvNBL+fa

Followup:  MachineOwner
---------

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\66\091013-16796-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c4ae50
Debug session time:  Tue Sep 10 12: 52: 26.410 2013 (UTC + 2: 00)
System Uptime:  0 days 0: 01: 14.035
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {99, fffffa8006906960, 0, 0}

Probably caused by :  rdyboost.sys ( rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59 )

Followup:  MachineOwner
---------

0:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1:  0000000000000099, Attempt to free pool with invalid address  (or corruption in pool header)
Arg2:  fffffa8006906960, Address being freed
Arg3:  0000000000000000, 0
Arg4:  0000000000000000, 0

Debugging Details:
------------------


FAULTING_IP:  
rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59
fffff880`015a6f4d 4c892cf7        mov     qword ptr [rdi+rsi*8],r13

BUGCHECK_STR:   0xc2_99

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   svchost.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from fffff80002f083dc to fffff80002a7ef00

STACK_TEXT:  
fffff880`0aa0d6e8 fffff800`02f083dc :  00000000`000000c2 00000000`00000099 fffffa80`06906960 00000000`00000000 :  nt!KeBugCheckEx
fffff880`0aa0d6f0 fffff800`02b34161 :  00000000`00000000 00000000`00000000 00000000`00189aa6 fffff800`02aa4a96 :  nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`0aa0d730 fffff800`02bb0698 :  fffffa80`06906950 00000000`00000420 00000000`0000004e fffff800`02b45830 :  nt!VerifierFreeTrackedPool+0x41
fffff880`0aa0d770 fffff880`015a6f4d :  00000000`00000200 fffffa80`059fa078 00000000`00000200 fffff880`015a799a :  nt!ExFreePool+0xd69
fffff880`0aa0d820 fffff880`015a686f :  fffffa80`059fa078 00000000`00000000 fffffa80`05e73ff4 00000000`00000000 :  rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+0x59
fffff880`0aa0d880 fffff880`015a555e :  fffffa80`059fa010 00000000`00000001 fffffa80`059fa010 00000000`00000001 :  rdyboost!ST_STORE<SMD_TRAITS>: StDmCleanup+0x183
fffff880`0aa0d8c0 fffff880`015a4a23 :  fffffa80`059fa010 00000000`00000001 fffffa80`059fa010 fffff880`0aa0dca0 :  rdyboost!SMKM_STORE<SMD_TRAITS>: SmStCleanup+0x7a
fffff880`0aa0d900 fffff880`015a4986 :  fffff880`015c78f0 00000000`00000008 fffffa80`059fa010 fffff880`015c7870 :  rdyboost!SMKM_STORE_MGR<SMD_TRAITS>: SmStoreMgrCallback+0x4b
fffff880`0aa0d940 fffff880`015cb4b8 :  fffff880`015c7870 fffff880`0aa0dca0 00000000`00000000 fffffa80`07d69480 :  rdyboost!SMKM_STORE_MGR<SMD_TRAITS>: SmCleanup+0x9a
fffff880`0aa0d970 fffff880`015acb9e :  fffffa80`07d69480 fffffa80`07d69480 fffffa80`07d29bf0 00000000`00000000 :  rdyboost!SmdRBContextShutdown+0x94
fffff880`0aa0d9b0 fffff800`02d973a7 :  00000000`00000000 fffffa80`07b2d7e0 fffffa80`07b2d8f8 fffffa80`07d69480 :  rdyboost!SmdDispatchDeviceControl+0x3ce
fffff880`0aa0da10 fffff800`02d97c06 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!IopXxxControlFile+0x607
fffff880`0aa0db40 fffff800`02a7e153 :  fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`000006d8 :  nt!NtDeviceIoControlFile+0x56
fffff880`0aa0dbb0 00000000`76d3ff2a :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiSystemServiceCopyEnd+0x13
00000000`0216ed08 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  0x76d3ff2a


STACK_COMMAND:   kb

FOLLOWUP_IP:  
rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59
fffff880`015a6f4d 4c892cf7        mov     qword ptr [rdi+rsi*8],r13

SYMBOL_STACK_INDEX:   4

SYMBOL_NAME:   rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  rdyboost

IMAGE_NAME:   rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc48a

FAILURE_BUCKET_ID:   X64_0xc2_99_rdyboost!ST_STORE_SMD_TRAITS_: StReleaseRegion+59

BUCKET_ID:   X64_0xc2_99_rdyboost!ST_STORE_SMD_TRAITS_: StReleaseRegion+59

Followup:  MachineOwner
---------

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 14.09.2013 17:21 przez thermalfake.)

14.09.2013 17:08

Róża Podziękowania od: tomjar
Znajdź wszystkie posty użytkownika
tomjar
Nowy
Liczba postów: 5
Post: #5

RE: Bluescreen spowodowany prawdopodobnie anteną WiFi- Win 7


Dzięki za informacje. dzisiaj porobię to o czym wspomniałeś i powiem jak się sprawuje. Jeszcze raz dzięki

16.09.2013 18:29

Znajdź wszystkie posty użytkownika
tomjar
Nowy
Liczba postów: 5
Post: #6

RE: BSOD: spowodowany prawdopodobnie anteną WiFi


Zainstalowałem service packa, reinstalowałem eseta, odinstalowałem sterki od wifi( i o dziwo windows sam później zainstalował) i na razie brak bsodów

18.09.2013 20:46

Znajdź wszystkie posty użytkownika
peciaq
VIP

Liczba postów: 5.100
Post: #7

RE: BSOD: spowodowany prawdopodobnie anteną WiFi


To póki co zamykam, jak powrócą to napisz do mnie PW i wątek otworzymy.

Wątek rozwiązany.

[Obrazek: havensygn.jpg]
(Ten post był ostatnio modyfikowany: 19.09.2013 16:56 przez peciaq.)

19.09.2013 16:56

Znajdź wszystkie posty użytkownika
Wątek zamknięty

Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
BSOD Moloch4 0 674 05.07.2019 11:29
Ostatni post: Moloch4
BSOD Windows 7 luzbluzoner 0 1.164 17.12.2016 20:25
Ostatni post: luzbluzoner
Częsty ekrad BSOD kubajed 0 1.137 03.10.2016 17:46
Ostatni post: kubajed
Nowa instalacja, 3 BSOD avocado 0 1.258 20.11.2015 09:46
Ostatni post: avocado
BSOD restling 1 1.514 04.09.2015 21:11
Ostatni post: thermalfake
Bsod win32k.sys fffff000 lynx666 0 1.081 17.08.2015 16:34
Ostatni post: lynx666
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 3 głosów.