DA
These were Related to Rt630x64.sys 8101E/8168/8169 NDIS 6.30 64-bit Driver from Realtek. I would remove the current driver and install the newest driver available.
Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ken\Desktop\New folder\022215-29093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
WARNING: Whitespace at end of path element
Error: Empty Path.
Symbol search path is:
SRV*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17630.amd64fre.winblue_r7.150109-2022
Machine Name:
Kernel base = 0xfffff800`c4870000 PsLoadedModuleList = 0xfffff800`c4b49250
Debug session time: Sun Feb 22 08:00:53.784 2015 (UTC - 5:00)
System Uptime: 0 days 23:07:30.478
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {110339f0, 2, 0, fffff8015852e704}
*** WARNING: Unable to verify timestamp for Rt630x64.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt630x64.sys
Probably caused by : Rt630x64.sys ( Rt630x64+7d704 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000110339f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8015852e704, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800c4bd3138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000000110339f0
CURRENT_IRQL: 2
FAULTING_IP:
Rt630x64+7d704
fffff801`5852e704 f781f039000000080000 test dword ptr [rcx+39F0h],800h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
TRAP_FRAME: ffffd00068e4e190 -- (.trap 0xffffd00068e4e190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000011030000
rdx=000000000000f8dc rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015852e704 rsp=ffffd00068e4e320 rbp=000000000000be00
r8=000000000000c305 r9=0000000000000000 r10=ffffe00111030000
r11=ffffd00068e4e328 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Rt630x64+0x7d704:
fffff801`5852e704 f781f039000000080000 test dword ptr [rcx+39F0h],800h ds:00000000`110339f0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800c49cc4e9 to fffff800c49c09a0
STACK_TEXT:
ffffd000`68e4e048 fffff800`c49cc4e9 : 00000000`0000000a 00000000`110339f0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`68e4e050 fffff800`c49cad3a : 00000000`00000000 00000000`11030000 fffff800`c4840000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`68e4e190 fffff801`5852e704 : ffffe001`11030000 fffff801`58514c35 ffffe001`11030000 00000000`fe173000 : nt!KiPageFault+0x23a
ffffd000`68e4e320 ffffe001`11030000 : fffff801`58514c35 ffffe001`11030000 00000000`fe173000 00000000`0000e434 : Rt630x64+0x7d704
ffffd000`68e4e328 fffff801`58514c35 : ffffe001`11030000 00000000`fe173000 00000000`0000e434 00000000`0000c602 : 0xffffe001`11030000
ffffd000`68e4e330 ffffe001`11030000 : 00000000`fe173000 00000000`0000e434 00000000`0000c602 ffffe001`11030001 : Rt630x64+0x63c35
ffffd000`68e4e338 00000000`fe173000 : 00000000`0000e434 00000000`0000c602 ffffe001`11030001 fffff801`58535c01 : 0xffffe001`11030000
ffffd000`68e4e340 00000000`0000e434 : 00000000`0000c602 ffffe001`11030001 fffff801`58535c01 ffffe001`11030000 : 0xfe173000
ffffd000`68e4e348 00000000`0000c602 : ffffe001`11030001 fffff801`58535c01 ffffe001`11030000 00000000`0000be00 : 0xe434
ffffd000`68e4e350 ffffe001`11030001 : fffff801`58535c01 ffffe001`11030000 00000000`0000be00 00000000`00000000 : 0xc602
ffffd000`68e4e358 fffff801`58535c01 : ffffe001`11030000 00000000`0000be00 00000000`00000000 ffffe001`11030001 : 0xffffe001`11030001
ffffd000`68e4e360 ffffe001`11030000 : 00000000`0000be00 00000000`00000000 ffffe001`11030001 00000000`00000001 : Rt630x64+0x84c01
ffffd000`68e4e368 00000000`0000be00 : 00000000`00000000 ffffe001`11030001 00000000`00000001 00000000`00000000 : 0xffffe001`11030000
ffffd000`68e4e370 00000000`00000000 : ffffe001`11030001 00000000`00000001 00000000`00000000 00000000`00000004 : 0xbe00
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt630x64+7d704
fffff801`5852e704 f781f039000000080000 test dword ptr [rcx+39F0h],800h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: Rt630x64+7d704
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt630x64
IMAGE_NAME: Rt630x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51f21ecf
FAILURE_BUCKET_ID: AV_Rt630x64+7d704
BUCKET_ID: AV_Rt630x64+7d704
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_rt630x64+7d704
FAILURE_ID_HASH: {ca4dc231-9a24-c2a6-58f1-7cd27bbc69f4}
Followup: MachineOwner
---------