Easy your Kaspersky remove it and use the built in defender
Microsoft (R) Windows Debugger Version 10.0.10075.9 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\zigza\Desktop\New folder\060815-14937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17736.amd64fre.winblue_r9.150322-1500
Machine Name:
Kernel base = 0xfffff802`e9e1a000 PsLoadedModuleList = 0xfffff802`ea0f3850
Debug session time: Mon Jun 8 15:39:30.286 2015 (UTC - 4:00)
System Uptime: 0 days 2:12:17.201
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
.............
No .natvis files found at C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 8, 0}
*** WARNING: Unable to verify timestamp for klim6.sys
*** ERROR: Module load completed but symbols could not be loaded for klim6.sys
Probably caused by : vwififlt.sys ( vwififlt!FilterCancelSendNetBufferLists+54 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
SYSTEM_SKU: L7A41EA#A2N
SYSTEM_VERSION: 0977120000405F00000410180
BIOS_DATE: 11/13/2014
BASEBOARD_PRODUCT: 2341
BASEBOARD_VERSION: 07.08
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 0
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff802ea17d138
GetUlongPtrFromAddress: unable to read from fffff802ea17d298
GetUlongPtrFromAddress: unable to read from fffff802ea17d520
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+0
00000000`00000000 ?? ???
PROCESS_NAME: System
CPU_COUNT: 4
CPU_MHZ: 893
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3d
CPU_STEPPING: 4
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
ANALYSIS_VERSION: 10.0.10075.9 amd64fre
TRAP_FRAME: ffffd0015156cef0 -- (.trap 0xffffd0015156cef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe001973ee7e0
rdx=0700000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffd0015156d088 rbp=ffffd0015156d6d0
r8=ffffd0015156d140 r9=0000000000000001 r10=0000000000000002
r11=000000000000002b r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
LAST_CONTROL_TRANSFER: from fffff802e9f767e9 to fffff802e9f6aca0
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???
STACK_TEXT:
ffffd001`5156d088 fffff800`02ed86b0 : ffffe001`97265830 ffffe001`972657d0 ffffd001`5156d140 fffff802`e9edc8a2 : 0x0
ffffd001`5156d090 fffff800`02edd0ea : ffffe001`973ec730 fffff800`02ee1060 ffffe001`97265830 fffff800`02e550ee : vwififlt!FilterCancelSendNetBufferLists+0x54
ffffd001`5156d0c0 fffff800`01f23fac : ffffe001`9740c1a0 ffffd001`51568000 ffffe001`998c89d8 ffffd001`5156d201 : vwififlt!FExCancelSendNetBufferLists+0xae
ffffd001`5156d100 fffff802`e9e8c703 : ffffe001`975ad002 ffffe001`974928d8 ffffe001`974928f0 ffffe001`974928f0 : ndis!ndisMCancelSendNetBufferListsOnMiniport+0x48
ffffd001`5156d140 fffff800`01ee2d99 : fffff800`01f29104 ffffd001`5156d290 00000000`00000002 00000000`0000002b : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd001`5156d230 fffff800`01f290ff : fffff800`021c9300 fffff800`04951143 00000000`00000008 fffff800`049c485e : ndis!ndisExpandStack+0x19
ffffd001`5156d270 fffff800`04960c9f : ffffe001`975ad010 fffff800`01f71eb1 ffffffff`fff85ee0 07000000`00000000 : ndis!ndisFilterCancelSendNetBufferLists+0x1f
ffffd001`5156d2d0 fffff802`e9e8c703 : 00000000`0000ff02 ffffe001`97466a00 ffffd001`51568000 fffff800`01fa9b46 : nwifi!FilterCancelSendNetBufferLists+0xd7
ffffd001`5156d300 fffff800`01ee2d99 : fffff800`01f29104 ffffd001`5156d450 ffffe001`9757d400 fffff800`02eafd4a : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd001`5156d3f0 fffff800`01f290ff : 00000000`00000001 fffff802`e9e6e926 ffffe001`9740d600 00000000`00000008 : ndis!ndisExpandStack+0x19
ffffd001`5156d430 fffff800`02eeabc9 : ffffe001`9740d558 ffffe001`9740d5e8 ffffe001`00000008 ffffe001`9740c1a0 : ndis!ndisFilterCancelSendNetBufferLists+0x1f
ffffd001`5156d490 ffffe001`9740d558 : ffffe001`9740d5e8 ffffe001`00000008 ffffe001`9740c1a0 00000000`00000000 : klim6+0x1bc9
ffffd001`5156d498 ffffe001`9740d5e8 : ffffe001`00000008 ffffe001`9740c1a0 00000000`00000000 fffff800`01f7bf03 : 0xffffe001`9740d558
ffffd001`5156d4a0 ffffe001`00000008 : ffffe001`9740c1a0 00000000`00000000 fffff800`01f7bf03 ffffe001`97466a50 : 0xffffe001`9740d5e8
ffffd001`5156d4a8 ffffe001`9740c1a0 : 00000000`00000000 fffff800`01f7bf03 ffffe001`97466a50 ffffd001`5156d6d0 : 0xffffe001`00000008
ffffd001`5156d4b0 00000000`00000000 : fffff800`01f7bf03 ffffe001`97466a50 ffffd001`5156d6d0 ffffe001`95e69c90 : 0xffffe001`9740c1a0
STACK_COMMAND: .trap 0xffffd0015156cef0 ; kb
FOLLOWUP_IP:
vwififlt!FilterCancelSendNetBufferLists+54
fffff800`02ed86b0 488b0da9890000 mov rcx,qword ptr [vwififlt!WPP_GLOBAL_Control (fffff800`02ee1060)]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: vwififlt!FilterCancelSendNetBufferLists+54
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vwififlt
IMAGE_NAME: vwififlt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53609ba2
IMAGE_VERSION: 6.3.9600.17111
BUCKET_ID_FUNC_OFFSET: 54
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_vwififlt!FilterCancelSendNetBufferLists
BUCKET_ID: AV_CODE_AV_NULL_IP_vwififlt!FilterCancelSendNetBufferLists
PRIMARY_PROBLEM_CLASS: AV_CODE_AV_NULL_IP_vwififlt!FilterCancelSendNetBufferLists
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_null_ip_vwififlt!filtercancelsendnetbufferlists
FAILURE_ID_HASH: {9f285504-b22f-8bfe-f46c-2d70aa2e5963}
Followup: MachineOwner
---------
0: kd> lmvm vwififlt
Browse full module list
start end module name
fffff800`02ed1000 fffff800`02ee9000 vwififlt (pdb symbols) d:\symbols\vwififlt.pdb\F71A4C46A0C0485B845CC47DD1F2ADFC1\vwififlt.pdb
Loaded symbol image file: vwififlt.sys
Mapped memory image file: d:\symbols\vwififlt.sys\53609BA218000\vwififlt.sys
Image path: \SystemRoot\system32\DRIVERS\vwififlt.sys
Image name: vwififlt.sys
Browse all global symbols functions data
Timestamp: Wed Apr 30 02:43:46 2014 (53609BA2)
CheckSum: 0001F37F
ImageSize: 00018000
File version: 6.3.9600.17111
Product version: 6.3.9600.17111
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0000.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft Windows Operating System
InternalName: vwififlt.sys
OriginalFilename: vwififlt.sys
ProductVersion: 6.3.9600.17111
FileVersion: 6.3.9600.17111 (winblue_gdr.140429-1523)
FileDescription: Virtual WiFi Filter Driver
LegalCopyright: Microsoft Corporation. All rights reserved.