We need the DMP files to analyze your crashes and determine a fix, please upload them to your onedrive or another file sharing program and post the link here. If your account is not verified and will not let you post a link, replace HTTP with HXXP and post. If you need instructions on how to retrieve the DMP files, see here.
https://onedrive.live.com/redir?resid=C1777078CB8441A5!107&authkey=!AHcr4SLsReNYvNU&ithint=file%2czip
sorry for the late-ish reply.
shortened link
http://1drv.ms/1MfizqC
- Edited by LaVee DaEagle 12 hours 42 minutes ago
Your crash is caused by klwfp.sys which is a Kaspersky driver. I would suggest removing Kaspersky completely and use the built in Windows Defender.
.
.
.
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 1200, 75043960, ffffe000df331588}
*** WARNING: Unable to verify timestamp for klwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
fffff80124f38240: Unable to get special pool info
fffff80124f38240: Unable to get special pool info
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000075043960, Memory contents of the pool block
Arg4: ffffe000df331588, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: ffffe000df331588
FREED_POOL_TAG: NDnd
BUGCHECK_STR: 0xc2_7_NDnd
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80124f15ff2 to fffff80124dc1ca0
STACK_TEXT:
ffffd000`fda0d058 fffff801`24f15ff2 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`75043960 : nt!KeBugCheckEx
ffffd000`fda0d060 fffff801`2934b91f : 00000000`00000000 00000000`00000000 ffffe000`dfa955d0 ffffe000`00000004 : nt!ExAllocatePoolWithTag+0x1102
ffffd000`fda0d150 fffff801`29561824 : 00000000`00000000 fffff801`2970f200 ffffe000`de838002 fffff801`296ea48d : NETIO!NetioFreeMdl+0x20d7f
ffffd000`fda0d1a0 fffff801`2931d8c1 : ffffe000`da8367c0 00000000`00000001 00000000`00000000 fffff801`293367b0 : tcpip!FlpReturnNetBufferListChain+0x87094
ffffd000`fda0d1f0 fffff801`2931d402 : ffffe000`dfa955d0 ffffe000`da8367c0 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferList+0xc1
ffffd000`fda0d270 fffff801`294dd61d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2e2
ffffd000`fda0d310 fffff801`294db900 : 00000000`00000001 ffffd000`fda0d540 fffff801`29632370 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x32d
ffffd000`fda0d440 fffff801`295cff74 : ffffe000`e04a8f70 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
ffffd000`fda0d7c0 fffff801`296dc301 : ffffe000`da9a3402 ffffe000`da9a4310 ffffd000`fda0da99 ffffd000`fda08000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`fda0d820 fffff801`24ce3703 : ffffe000`da8367c0 00000000`00000201 ffffe000`de8380e0 ffffe000`de8380e0 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`fda0d8b0 fffff801`296ed7be : fffff801`296dc21c ffffd000`fda0da20 00000000`00000010 ffffe000`de8380e0 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd000`fda0d9a0 fffff801`2a0fd037 : ffffe000`de8380e0 ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`fda0dae0 ffffe000`de8380e0 : ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 : klwfp+0x5037
ffffd000`fda0dae8 ffffe000`e0684e80 : ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 : 0xffffe000`de8380e0
ffffd000`fda0daf0 ffffe000`e06be800 : ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 : 0xffffe000`e0684e80
ffffd000`fda0daf8 ffffe000`e0684e80 : ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 ffffe000`00000000 : 0xffffe000`e06be800
ffffd000`fda0db00 ffffe000`dff20017 : fffff801`00000001 ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 : 0xffffe000`e0684e80
ffffd000`fda0db08 fffff801`00000001 : ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 : 0xffffe000`dff20017
ffffd000`fda0db10 ffffe000`00000007 : ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 : 0xfffff801`00000001
ffffd000`fda0db18 ffffe000`00000000 : ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 : 0xffffe000`00000007
ffffd000`fda0db20 ffffe000`dfa955d0 : fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 00000000`00000000 : 0xffffe000`00000000
ffffd000`fda0db28 fffff801`2a0fce98 : ffffe000`e0684e80 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 : 0xffffe000`dfa955d0
ffffd000`fda0db30 ffffe000`e0684e80 : 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 : klwfp+0x4e98
ffffd000`fda0db38 00000000`00000000 : 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 ffffe000`e0684e80 : 0xffffe000`e0684e80
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff801`2934b91f 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO!NetioFreeMdl+20d7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
BUCKET_ID_FUNC_OFFSET: 20d7f
FAILURE_BUCKET_ID: 0xc2_7_NDnd_NETIO!NetioFreeMdl
BUCKET_ID: 0xc2_7_NDnd_NETIO!NetioFreeMdl
Followup: MachineOwner
- Edited by Acreed02 12 hours 34 minutes ago
- Proposed as answer by ZigZag3143xMVP, Moderator 11 hours 13 minutes ago
https://onedrive.live.com/redir?resid=C1777078CB8441A5!107&authkey=!AHcr4SLsReNYvNU&ithint=file%2czip
sorry for the late-ish reply.
shortened link
http://1drv.ms/1MfizqC
- Edited by LaVee DaEagle Wednesday, July 08, 2015 6:42 PM
Your crash is caused by klwfp.sys which is a Kaspersky driver. I would suggest removing Kaspersky completely and use the built in Windows Defender.
.
.
.
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 1200, 75043960, ffffe000df331588}
*** WARNING: Unable to verify timestamp for klwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
fffff80124f38240: Unable to get special pool info
fffff80124f38240: Unable to get special pool info
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000075043960, Memory contents of the pool block
Arg4: ffffe000df331588, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: ffffe000df331588
FREED_POOL_TAG: NDnd
BUGCHECK_STR: 0xc2_7_NDnd
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80124f15ff2 to fffff80124dc1ca0
STACK_TEXT:
ffffd000`fda0d058 fffff801`24f15ff2 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`75043960 : nt!KeBugCheckEx
ffffd000`fda0d060 fffff801`2934b91f : 00000000`00000000 00000000`00000000 ffffe000`dfa955d0 ffffe000`00000004 : nt!ExAllocatePoolWithTag+0x1102
ffffd000`fda0d150 fffff801`29561824 : 00000000`00000000 fffff801`2970f200 ffffe000`de838002 fffff801`296ea48d : NETIO!NetioFreeMdl+0x20d7f
ffffd000`fda0d1a0 fffff801`2931d8c1 : ffffe000`da8367c0 00000000`00000001 00000000`00000000 fffff801`293367b0 : tcpip!FlpReturnNetBufferListChain+0x87094
ffffd000`fda0d1f0 fffff801`2931d402 : ffffe000`dfa955d0 ffffe000`da8367c0 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferList+0xc1
ffffd000`fda0d270 fffff801`294dd61d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2e2
ffffd000`fda0d310 fffff801`294db900 : 00000000`00000001 ffffd000`fda0d540 fffff801`29632370 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x32d
ffffd000`fda0d440 fffff801`295cff74 : ffffe000`e04a8f70 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
ffffd000`fda0d7c0 fffff801`296dc301 : ffffe000`da9a3402 ffffe000`da9a4310 ffffd000`fda0da99 ffffd000`fda08000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`fda0d820 fffff801`24ce3703 : ffffe000`da8367c0 00000000`00000201 ffffe000`de8380e0 ffffe000`de8380e0 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`fda0d8b0 fffff801`296ed7be : fffff801`296dc21c ffffd000`fda0da20 00000000`00000010 ffffe000`de8380e0 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd000`fda0d9a0 fffff801`2a0fd037 : ffffe000`de8380e0 ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`fda0dae0 ffffe000`de8380e0 : ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 : klwfp+0x5037
ffffd000`fda0dae8 ffffe000`e0684e80 : ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 : 0xffffe000`de8380e0
ffffd000`fda0daf0 ffffe000`e06be800 : ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 : 0xffffe000`e0684e80
ffffd000`fda0daf8 ffffe000`e0684e80 : ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 ffffe000`00000000 : 0xffffe000`e06be800
ffffd000`fda0db00 ffffe000`dff20017 : fffff801`00000001 ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 : 0xffffe000`e0684e80
ffffd000`fda0db08 fffff801`00000001 : ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 : 0xffffe000`dff20017
ffffd000`fda0db10 ffffe000`00000007 : ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 : 0xfffff801`00000001
ffffd000`fda0db18 ffffe000`00000000 : ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 : 0xffffe000`00000007
ffffd000`fda0db20 ffffe000`dfa955d0 : fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 00000000`00000000 : 0xffffe000`00000000
ffffd000`fda0db28 fffff801`2a0fce98 : ffffe000`e0684e80 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 : 0xffffe000`dfa955d0
ffffd000`fda0db30 ffffe000`e0684e80 : 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 : klwfp+0x4e98
ffffd000`fda0db38 00000000`00000000 : 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 ffffe000`e0684e80 : 0xffffe000`e0684e80
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff801`2934b91f 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO!NetioFreeMdl+20d7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
BUCKET_ID_FUNC_OFFSET: 20d7f
FAILURE_BUCKET_ID: 0xc2_7_NDnd_NETIO!NetioFreeMdl
BUCKET_ID: 0xc2_7_NDnd_NETIO!NetioFreeMdl
Followup: MachineOwner
- Edited by Acreed02 Wednesday, July 08, 2015 6:50 PM
- Proposed as answer by ZigZag3143xMVP, Moderator Wednesday, July 08, 2015 8:11 PM