BSOD 3b, 7e


  1. Posts : 2
    Windows 7 pro 64bit OEM
       #1

    BSOD 3b, 7e


    I've been having a lot of blue screens recently. I've gotten rid of most, but there is 2 more remaining that I've seen.

    System_service_exception 3b

    and

    Bugcheck 0x000007e (this one had a filename, Dxgmms1.sys)

    At the moment I'm trying to swap hardware piece for piece since I get the feeling it's not drivers causing these problems.

    EDIT: It can happen right when booting or 5 hours after I've booted. It's been really random.
    I have a fresh install of Windows 7 pro 64bit OEM version (a legal one).
    The age of my hardware is a little over 1 month old. I got my parts around 18. December 2010 and it's been working flawless until now. I did reformat a couple of times the last 5 days, but this time I'm not giving up on the pc. I want to really look into my problems this time.

    Hardware info is saved in my profile, though I've taken out one of my two memory sticks right now. Everything in the attachment is done with just the one memory stick inserted.
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    Tarjei said:
    I've been having a lot of blue screens recently. I've gotten rid of most, but there is 2 more remaining that I've seen.

    System_service_exception 3b

    and

    Bugcheck 0x000007e (this one had a filename, Dxgmms1.sys)

    At the moment I'm trying to swap hardware piece for piece since I get the feeling it's not drivers causing these problems.

    EDIT: It can happen right when booting or 5 hours after I've booted. It's been really random.
    I have a fresh install of Windows 7 pro 64bit OEM version (a legal one).
    The age of my hardware is a little over 1 month old. I got my parts around 18. December 2010 and it's been working flawless until now. I did reformat a couple of times the last 5 days, but this time I'm not giving up on the pc. I want to really look into my problems this time.

    Hardware info is saved in my profile, though I've taken out one of my two memory sticks right now. Everything in the attachment is done with just the one memory stick inserted.
    All three caused by your spyware doctor driver PctWfpFilter64.sys

    Remove it

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\012111-23727-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
    *http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02867000 PsLoadedModuleList = 0xfffff800`02aa4e50
    Debug session time: Fri Jan 21 11:59:47.651 2011 (GMT-5)
    System Uptime: 0 days 0:08:55.477
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 0, fffff88001a88f40}
    
    Unable to load image \Device\Harddisk0\Partition2\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
    *** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001a88f40, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0f0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip! ?? ::FNODOBFM::`string'+5704
    fffff880`01a88f40 488b01          mov     rax,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff8800607d5d0 -- (.trap 0xfffff8800607d5d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa800a6eab00 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa800a6eab01 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001a88f40 rsp=fffff8800607d760 rbp=0000000000000000
     r8=fffffa800a6eab00  r9=00000000000000d0 r10=fffff880031d5e80
    r11=fffffa8008df53c0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    tcpip! ?? ::FNODOBFM::`string'+0x5704:
    fffff880`01a88f40 488b01          mov     rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800028d8469 to fffff800028d8f00
    
    STACK_TEXT:  
    fffff880`0607d488 fffff800`028d8469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0607d490 fffff800`028d70e0 : 00000000`00000002 fffffa80`08df8030 fffffa80`089d3000 fffff880`0435b4f8 : nt!KiBugCheckDispatch+0x69
    fffff880`0607d5d0 fffff880`01a88f40 : fffffa80`08df8030 fffff880`04030aca fffff880`206c644d fffffa80`0a66ae20 : nt!KiPageFault+0x260
    fffff880`0607d760 fffff880`019226a6 : fffffa80`08df8030 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x5704
    fffff880`0607d7b0 fffff880`0192035d : 00000000`00000000 fffffa80`0a66ae20 00000000`00000000 00000000`00000001 : NETIO!NetioDereferenceNetBufferList+0x86
    fffff880`0607d7e0 fffff880`01a3dba6 : 00000000`00000000 fffffa80`07b83c01 00000000`00000020 fffffa80`08df8030 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
    fffff880`0607d860 fffff880`01ac0ffc : fffffa80`0a66ae20 fffff880`01b6d9a0 fffff880`01b6d9a0 00000000`00000000 : tcpip!IppCompleteAndFreePacketList+0xc6
    fffff880`0607d890 fffff880`01b36592 : fffffa80`08f14150 00000000`00000000 fffffa80`09b18001 00000000`00000c1c : tcpip! ?? ::FNODOBFM::`string'+0x43e8d
    fffff880`0607da90 fffff880`019b2afa : fffffa80`0a64c602 fffffa80`0a64c610 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
    fffff880`0607dad0 fffff880`0402971d : fffffa80`0972ab50 fffffa80`09b180a0 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
    fffff880`0607db80 fffffa80`0972ab50 : fffffa80`09b180a0 00000000`c0000000 fffff880`00000000 fffffa80`07440002 : PctWfpFilter64+0xd71d
    fffff880`0607db88 fffffa80`09b180a0 : 00000000`c0000000 fffff880`00000000 fffffa80`07440002 fffffa80`00000001 : 0xfffffa80`0972ab50
    fffff880`0607db90 00000000`c0000000 : fffff880`00000000 fffffa80`07440002 fffffa80`00000001 fffffa80`0000000b : 0xfffffa80`09b180a0
    fffff880`0607db98 fffff880`00000000 : fffffa80`07440002 fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 : 0xc0000000
    fffff880`0607dba0 fffffa80`07440002 : fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
    fffff880`0607dba8 fffffa80`00000001 : fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 fffff880`04029250 : 0xfffffa80`07440002
    fffff880`0607dbb0 fffffa80`0000000b : fffffa80`00000000 fffffa80`00000000 fffff880`04029250 fffffa80`09b180a0 : 0xfffffa80`00000001
    fffff880`0607dbb8 fffffa80`00000000 : fffffa80`00000000 fffff880`04029250 fffffa80`09b180a0 00000000`00000002 : 0xfffffa80`0000000b
    fffff880`0607dbc0 fffffa80`00000000 : fffff880`04029250 fffffa80`09b180a0 00000000`00000002 fffffa80`0a66ae20 : 0xfffffa80`00000000
    fffff880`0607dbc8 fffff880`04029250 : fffffa80`09b180a0 00000000`00000002 fffffa80`0a66ae20 fffff880`04038338 : 0xfffffa80`00000000
    fffff880`0607dbd0 fffffa80`09b180a0 : 00000000`00000002 fffffa80`0a66ae20 fffff880`04038338 00000000`00000000 : PctWfpFilter64+0xd250
    fffff880`0607dbd8 00000000`00000002 : fffffa80`0a66ae20 fffff880`04038338 00000000`00000000 00000000`00000000 : 0xfffffa80`09b180a0
    fffff880`0607dbe0 fffffa80`0a66ae20 : fffff880`04038338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x2
    fffff880`0607dbe8 fffff880`04038338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`07920800 : 0xfffffa80`0a66ae20
    fffff880`0607dbf0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`07920800 fffff880`0403b128 : PctWfpFilter64+0x1c338
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioDereferenceNetBufferList+86
    fffff880`019226a6 4885ff          test    rdi,rdi
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferList+86
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
    
    BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 2
    Windows 7 pro 64bit OEM
    Thread Starter
       #3

    I can't remember installing any spyware doctor or pc tools. Can this come together with windows update or AVG(or any other program)?
      My Computer


 

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 09:03.
Find Us