I've been having a lot of blue screens recently. I've gotten rid of most, but there is 2 more remaining that I've seen.
System_service_exception 3b
and
Bugcheck 0x000007e (this one had a filename, Dxgmms1.sys)
At the moment I'm trying to swap hardware piece for piece since I get the feeling it's not drivers causing these problems.
EDIT: It can happen right when booting or 5 hours after I've booted. It's been really random.
I have a fresh install of Windows 7 pro 64bit OEM version (a legal one).
The age of my hardware is a little over 1 month old. I got my parts around 18. December 2010 and it's been working flawless until now. I did reformat a couple of times the last 5 days, but this time I'm not giving up on the pc. I want to really look into my problems this time.
Hardware info is saved in my profile, though I've taken out one of my two memory sticks right now. Everything in the attachment is done with just the one memory stick inserted.
All three caused by your spyware doctor driver PctWfpFilter64.sys
Remove it
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\012111-23727-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02867000 PsLoadedModuleList = 0xfffff800`02aa4e50
Debug session time: Fri Jan 21 11:59:47.651 2011 (GMT-5)
System Uptime: 0 days 0:08:55.477
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff88001a88f40}
Unable to load image \Device\Harddisk0\Partition2\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001a88f40, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0f0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+5704
fffff880`01a88f40 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800607d5d0 -- (.trap 0xfffff8800607d5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a6eab00 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800a6eab01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001a88f40 rsp=fffff8800607d760 rbp=0000000000000000
r8=fffffa800a6eab00 r9=00000000000000d0 r10=fffff880031d5e80
r11=fffffa8008df53c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x5704:
fffff880`01a88f40 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028d8469 to fffff800028d8f00
STACK_TEXT:
fffff880`0607d488 fffff800`028d8469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0607d490 fffff800`028d70e0 : 00000000`00000002 fffffa80`08df8030 fffffa80`089d3000 fffff880`0435b4f8 : nt!KiBugCheckDispatch+0x69
fffff880`0607d5d0 fffff880`01a88f40 : fffffa80`08df8030 fffff880`04030aca fffff880`206c644d fffffa80`0a66ae20 : nt!KiPageFault+0x260
fffff880`0607d760 fffff880`019226a6 : fffffa80`08df8030 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x5704
fffff880`0607d7b0 fffff880`0192035d : 00000000`00000000 fffffa80`0a66ae20 00000000`00000000 00000000`00000001 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`0607d7e0 fffff880`01a3dba6 : 00000000`00000000 fffffa80`07b83c01 00000000`00000020 fffffa80`08df8030 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`0607d860 fffff880`01ac0ffc : fffffa80`0a66ae20 fffff880`01b6d9a0 fffff880`01b6d9a0 00000000`00000000 : tcpip!IppCompleteAndFreePacketList+0xc6
fffff880`0607d890 fffff880`01b36592 : fffffa80`08f14150 00000000`00000000 fffffa80`09b18001 00000000`00000c1c : tcpip! ?? ::FNODOBFM::`string'+0x43e8d
fffff880`0607da90 fffff880`019b2afa : fffffa80`0a64c602 fffffa80`0a64c610 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0607dad0 fffff880`0402971d : fffffa80`0972ab50 fffffa80`09b180a0 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0607db80 fffffa80`0972ab50 : fffffa80`09b180a0 00000000`c0000000 fffff880`00000000 fffffa80`07440002 : PctWfpFilter64+0xd71d
fffff880`0607db88 fffffa80`09b180a0 : 00000000`c0000000 fffff880`00000000 fffffa80`07440002 fffffa80`00000001 : 0xfffffa80`0972ab50
fffff880`0607db90 00000000`c0000000 : fffff880`00000000 fffffa80`07440002 fffffa80`00000001 fffffa80`0000000b : 0xfffffa80`09b180a0
fffff880`0607db98 fffff880`00000000 : fffffa80`07440002 fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 : 0xc0000000
fffff880`0607dba0 fffffa80`07440002 : fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`0607dba8 fffffa80`00000001 : fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 fffff880`04029250 : 0xfffffa80`07440002
fffff880`0607dbb0 fffffa80`0000000b : fffffa80`00000000 fffffa80`00000000 fffff880`04029250 fffffa80`09b180a0 : 0xfffffa80`00000001
fffff880`0607dbb8 fffffa80`00000000 : fffffa80`00000000 fffff880`04029250 fffffa80`09b180a0 00000000`00000002 : 0xfffffa80`0000000b
fffff880`0607dbc0 fffffa80`00000000 : fffff880`04029250 fffffa80`09b180a0 00000000`00000002 fffffa80`0a66ae20 : 0xfffffa80`00000000
fffff880`0607dbc8 fffff880`04029250 : fffffa80`09b180a0 00000000`00000002 fffffa80`0a66ae20 fffff880`04038338 : 0xfffffa80`00000000
fffff880`0607dbd0 fffffa80`09b180a0 : 00000000`00000002 fffffa80`0a66ae20 fffff880`04038338 00000000`00000000 : PctWfpFilter64+0xd250
fffff880`0607dbd8 00000000`00000002 : fffffa80`0a66ae20 fffff880`04038338 00000000`00000000 00000000`00000000 : 0xfffffa80`09b180a0
fffff880`0607dbe0 fffffa80`0a66ae20 : fffff880`04038338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x2
fffff880`0607dbe8 fffff880`04038338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`07920800 : 0xfffffa80`0a66ae20
fffff880`0607dbf0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`07920800 fffff880`0403b128 : PctWfpFilter64+0x1c338
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`019226a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------