Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Bsod


11 Jun 2011   #1

Windows 7 Home Premium x64
 
 
Bsod

Hi Guys , I need help with this bsod problem .
My PC's running on Original OEM Win 7 x64 Home Premium
The PC is 5 months old , I haven't reinstalled the OS .
Thx for any help .

My System SpecsSystem Spec
.

11 Jun 2011   #2

Win 8 Release candidate 8400
 
 

Quote   Quote: Originally Posted by EMPwn View Post
Hi Guys , I need help with this bsod problem .
My PC's running on Original OEM Win 7 x64 Home Premium
The PC is 5 months old , I haven't reinstalled the OS .
Thx for any help .

Virtually identical. These were all caused by PctWfpFilter64.sys (pctools). I wold remove it. Also NETIO.sys blamed. That is often caused by zone alarm. remove if installed.


http://download.zonealarm.com/bin/fr...cpes_clean.exe

Virus, Spyware & Malware Protection | Microsoft Security Essentials

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\K\Desktop\New folder (2)\061111-13681-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`03450000 PsLoadedModuleList = 0xfffff800`03695650
Debug session time: Fri Jun 10 20:01:42.657 2011 (GMT-4)
System Uptime: 0 days 0:37:05.077
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 0, fffff880018f2f92}

Unable to load image \Device\Harddisk0\Partition3\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018f2f92, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ff100
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip! ?? ::FNODOBFM::`string'+5f94
fffff880`018f2f92 488b01          mov     rax,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88006a45390 -- (.trap 0xfffff88006a45390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004529d90 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8004529d91 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018f2f92 rsp=fffff88006a45520 rbp=0000000000000000
 r8=fffffa8004529d90  r9=00000000000000d0 r10=fffff88003165e80
r11=fffffa80071dd2e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x5f94:
fffff880`018f2f92 488b01          mov     rax,qword ptr [rcx] ds:8170:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800034cf2a9 to fffff800034cfd00

STACK_TEXT:  
fffff880`06a45248 fffff800`034cf2a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06a45250 fffff800`034cdf20 : fffffa80`0887f200 fffff880`018e4970 fffffa80`0647c890 fffffa80`0b6c2a50 : nt!KiBugCheckDispatch+0x69
fffff880`06a45390 fffff880`018f2f92 : fffffa80`0b6c2a50 fffff880`0408aaca fffff880`206c644d fffffa80`0c1d4330 : nt!KiPageFault+0x260
fffff880`06a45520 fffff880`0179e336 : fffffa80`0b6c2a50 00000000`018b7caa 00000000`00000000 fffff800`0351f043 : tcpip! ?? ::FNODOBFM::`string'+0x5f94
fffff880`06a45570 fffff880`0179da92 : 00000000`00000000 fffffa80`0c1d4330 00000000`00000000 00000000`00000011 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`06a455a0 fffff880`018b7432 : 00000000`00000000 fffffa80`0c1d4400 fffff880`06a456a0 fffff880`06a456c0 : NETIO!NetioDereferenceNetBufferListChain+0x332
fffff880`06a45670 fffff880`018b4fff : 00000000`0401a8c0 fffffa80`065bc000 fffff880`019cc9a0 00000000`0790e901 : tcpip!IppReceiveHeaderBatch+0x3c3
fffff880`06a45750 fffff880`019891e2 : fffffa80`08d8d560 00000000`00000000 fffffa80`0790e901 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`06a45950 fffff880`01a68af6 : fffffa80`085ca602 fffffa80`085ca680 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`06a45990 fffff880`0408371d : fffffa80`08bcca70 fffffa80`0790e9c0 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`06a45a40 fffffa80`08bcca70 : fffffa80`0790e9c0 00000000`c0000000 fffff880`00000000 fffffa80`0be90002 : PctWfpFilter64+0xd71d
fffff880`06a45a48 fffffa80`0790e9c0 : 00000000`c0000000 fffff880`00000000 fffffa80`0be90002 fffffa80`00000001 : 0xfffffa80`08bcca70
fffff880`06a45a50 00000000`c0000000 : fffff880`00000000 fffffa80`0be90002 fffffa80`00000001 fffffa80`0000000e : 0xfffffa80`0790e9c0
fffff880`06a45a58 fffff880`00000000 : fffffa80`0be90002 fffffa80`00000001 fffffa80`0000000e fffffa80`00000000 : 0xc0000000
fffff880`06a45a60 fffffa80`0be90002 : fffffa80`00000001 fffffa80`0000000e fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`06a45a68 fffffa80`00000001 : fffffa80`0000000e fffffa80`00000000 fffffa80`00000000 fffff880`04083250 : 0xfffffa80`0be90002
fffff880`06a45a70 fffffa80`0000000e : fffffa80`00000000 fffffa80`00000000 fffff880`04083250 fffffa80`0790e9c0 : 0xfffffa80`00000001
fffff880`06a45a78 fffffa80`00000000 : fffffa80`00000000 fffff880`04083250 fffffa80`0790e9c0 00000000`53636670 : 0xfffffa80`0000000e
fffff880`06a45a80 fffffa80`00000000 : fffff880`04083250 fffffa80`0790e9c0 00000000`53636670 fffffa80`0c1d4330 : 0xfffffa80`00000000
fffff880`06a45a88 fffff880`04083250 : fffffa80`0790e9c0 00000000`53636670 fffffa80`0c1d4330 fffff880`04092338 : 0xfffffa80`00000000
fffff880`06a45a90 fffffa80`0790e9c0 : 00000000`53636670 fffffa80`0c1d4330 fffff880`04092338 00000000`00000000 : PctWfpFilter64+0xd250
fffff880`06a45a98 00000000`53636670 : fffffa80`0c1d4330 fffff880`04092338 00000000`00000000 00000000`00000000 : 0xfffffa80`0790e9c0
fffff880`06a45aa0 fffffa80`0c1d4330 : fffff880`04092338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x53636670
fffff880`06a45aa8 fffff880`04092338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`0be87540 : 0xfffffa80`0c1d4330
fffff880`06a45ab0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`0be87540 fffff880`04095128 : PctWfpFilter64+0x1c338


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NetioDereferenceNetBufferList+86
fffff880`0179e336 4885ff          test    rdi,rdi

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferList+86

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

Followup: MachineOwner
---------
My System SpecsSystem Spec
11 Jun 2011   #3

Windows 7 Home Premium x64
 
 

[spoiler=answer]

Virtually identical. These were all caused by PctWfpFilter64.sys (pctools). I wold remove it. Also NETIO.sys blamed. That is often caused by zone alarm. remove if installed.


http://download.zonealarm.com/bin/fr...cpes_clean.exe

Virus, Spyware & Malware Protection | Microsoft Security Essentials

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\K\Desktop\New folder (2)\061111-13681-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`03450000 PsLoadedModuleList = 0xfffff800`03695650
Debug session time: Fri Jun 10 20:01:42.657 2011 (GMT-4)
System Uptime: 0 days 0:37:05.077
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 0, fffff880018f2f92}

Unable to load image \Device\Harddisk0\Partition3\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018f2f92, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ff100
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip! ?? ::FNODOBFM::`string'+5f94
fffff880`018f2f92 488b01          mov     rax,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88006a45390 -- (.trap 0xfffff88006a45390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004529d90 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8004529d91 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018f2f92 rsp=fffff88006a45520 rbp=0000000000000000
 r8=fffffa8004529d90  r9=00000000000000d0 r10=fffff88003165e80
r11=fffffa80071dd2e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x5f94:
fffff880`018f2f92 488b01          mov     rax,qword ptr [rcx] ds:8170:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800034cf2a9 to fffff800034cfd00

STACK_TEXT:  
fffff880`06a45248 fffff800`034cf2a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06a45250 fffff800`034cdf20 : fffffa80`0887f200 fffff880`018e4970 fffffa80`0647c890 fffffa80`0b6c2a50 : nt!KiBugCheckDispatch+0x69
fffff880`06a45390 fffff880`018f2f92 : fffffa80`0b6c2a50 fffff880`0408aaca fffff880`206c644d fffffa80`0c1d4330 : nt!KiPageFault+0x260
fffff880`06a45520 fffff880`0179e336 : fffffa80`0b6c2a50 00000000`018b7caa 00000000`00000000 fffff800`0351f043 : tcpip! ?? ::FNODOBFM::`string'+0x5f94
fffff880`06a45570 fffff880`0179da92 : 00000000`00000000 fffffa80`0c1d4330 00000000`00000000 00000000`00000011 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`06a455a0 fffff880`018b7432 : 00000000`00000000 fffffa80`0c1d4400 fffff880`06a456a0 fffff880`06a456c0 : NETIO!NetioDereferenceNetBufferListChain+0x332
fffff880`06a45670 fffff880`018b4fff : 00000000`0401a8c0 fffffa80`065bc000 fffff880`019cc9a0 00000000`0790e901 : tcpip!IppReceiveHeaderBatch+0x3c3
fffff880`06a45750 fffff880`019891e2 : fffffa80`08d8d560 00000000`00000000 fffffa80`0790e901 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`06a45950 fffff880`01a68af6 : fffffa80`085ca602 fffffa80`085ca680 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`06a45990 fffff880`0408371d : fffffa80`08bcca70 fffffa80`0790e9c0 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`06a45a40 fffffa80`08bcca70 : fffffa80`0790e9c0 00000000`c0000000 fffff880`00000000 fffffa80`0be90002 : PctWfpFilter64+0xd71d
fffff880`06a45a48 fffffa80`0790e9c0 : 00000000`c0000000 fffff880`00000000 fffffa80`0be90002 fffffa80`00000001 : 0xfffffa80`08bcca70
fffff880`06a45a50 00000000`c0000000 : fffff880`00000000 fffffa80`0be90002 fffffa80`00000001 fffffa80`0000000e : 0xfffffa80`0790e9c0
fffff880`06a45a58 fffff880`00000000 : fffffa80`0be90002 fffffa80`00000001 fffffa80`0000000e fffffa80`00000000 : 0xc0000000
fffff880`06a45a60 fffffa80`0be90002 : fffffa80`00000001 fffffa80`0000000e fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`06a45a68 fffffa80`00000001 : fffffa80`0000000e fffffa80`00000000 fffffa80`00000000 fffff880`04083250 : 0xfffffa80`0be90002
fffff880`06a45a70 fffffa80`0000000e : fffffa80`00000000 fffffa80`00000000 fffff880`04083250 fffffa80`0790e9c0 : 0xfffffa80`00000001
fffff880`06a45a78 fffffa80`00000000 : fffffa80`00000000 fffff880`04083250 fffffa80`0790e9c0 00000000`53636670 : 0xfffffa80`0000000e
fffff880`06a45a80 fffffa80`00000000 : fffff880`04083250 fffffa80`0790e9c0 00000000`53636670 fffffa80`0c1d4330 : 0xfffffa80`00000000
fffff880`06a45a88 fffff880`04083250 : fffffa80`0790e9c0 00000000`53636670 fffffa80`0c1d4330 fffff880`04092338 : 0xfffffa80`00000000
fffff880`06a45a90 fffffa80`0790e9c0 : 00000000`53636670 fffffa80`0c1d4330 fffff880`04092338 00000000`00000000 : PctWfpFilter64+0xd250
fffff880`06a45a98 00000000`53636670 : fffffa80`0c1d4330 fffff880`04092338 00000000`00000000 00000000`00000000 : 0xfffffa80`0790e9c0
fffff880`06a45aa0 fffffa80`0c1d4330 : fffff880`04092338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x53636670
fffff880`06a45aa8 fffff880`04092338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`0be87540 : 0xfffffa80`0c1d4330
fffff880`06a45ab0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`0be87540 fffff880`04095128 : PctWfpFilter64+0x1c338


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NetioDereferenceNetBufferList+86
fffff880`0179e336 4885ff          test    rdi,rdi

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferList+86

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

Followup: MachineOwner
---------
[/QUOTE]
[/spoiler]
Thank you sir ! It works !
My System SpecsSystem Spec
.


Reply

 Bsod




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 08:45 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33