Windows 7 Blue Screen Error and Laptop Restart


  1. Posts : 1
    Windows 7 Home Premium 64 bit
       #1

    Windows 7 Blue Screen Error and Laptop Restart


    Hi All,

    I am a new member to this forum and need experts help on resolving the Windows 7 Home Premium Blue Screen Error that I am facing while downloading Games/Any files via the Bit Torrent software. My Laptop is a brand New Dell Inspiron 15R Intel core i5 system and I am facing this restart from last 3 weeks. I am completely clueless as to what is the reason behind this.

    I am attaching the Mini Dmp file that Windows has created for analysis below:

    Problem signature:
    Problem Event Name: BlueScreen
    OS Version: 6.1.7601.2.1.0.768.3
    Locale ID: 1033
    Additional information about the problem:
    BCCode: d1
    BCP1: 0000000000000028
    BCP2: 0000000000000002
    BCP3: 0000000000000000
    BCP4: FFFFF88001811B2D
    OS Version: 6_1_7601
    Service Pack: 1_0
    Product: 768_1
    Files that help describe the problem:
    C:\Windows\Minidump\073111-20950-01.dmp
    C:\Users\murali\AppData\Local\Temp\WER-58999-0.sysdata.xml
    Read our privacy statement online:
    Windows 7 Privacy Statement - Microsoft Windows
    If the online privacy statement is not available, please read our privacy statement offline:
    C:\Windows\system32\en-US\erofflps.txt
    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    7-Aug-2010
    Problem signature:
    Problem Event Name: BlueScreen
    OS Version: 6.1.7601.2.1.0.768.3
    Locale ID: 1033
    Additional information about the problem:
    BCCode: d1
    BCP1: 0000000000000028
    BCP2: 0000000000000002
    BCP3: 0000000000000000
    BCP4: FFFFF8800199AB2D
    OS Version: 6_1_7601
    Service Pack: 1_0
    Product: 768_1
    Files that help describe the problem:
    C:\Windows\Minidump\080711-20670-01.dmp
    C:\Users\murali\AppData\Local\Temp\WER-2919199-0.sysdata.xml
    Read our privacy statement online:
    Windows 7 Privacy Statement - Microsoft Windows
    If the online privacy statement is not available, please read our privacy statement offline:
    C:\Windows\system32\en-US\erofflps.txt


    +++++++++++++++++++++++++++++++++

    My System Specification is:

    Model - Dell Inspiron 15 R (N5010) Laptop
    OS- Windows 7 Home Premium that came pre-installed from Dell.
    RAM- 4GB
    Motherboard - Intel chipset
    Graphics -Intel Graphics Card

    +++++++++++++++++++++++++++++++++

    I am really in need of dire help from the experts of this forum and I appreciate your valuable guidance in bringing my issue to resolution.

    Thanking in advance
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

    The cause it your McAfee Software, you should remove it and use MSE instead

    Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads
    You can use MagicDisc as an alternative.

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800199ab2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003503100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0199ab2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880035c3660 -- (.trap 0xfffff880035c3660)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880035c3880 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800199ab2d rsp=fffff880035c37f0 rbp=fffff880035c3920
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa8009204560 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`0199ab2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:99a0:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032d32a9 to fffff800032d3d00
    
    STACK_TEXT:  
    fffff880`035c3518 fffff800`032d32a9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`035c3520 fffff800`032d1f20 : c000000d`00000000 fffff880`06906af4 00000000`04fa5900 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`035c3660 fffff880`0199ab2d : 00000000`00000038 fffff880`01a2afec 00000000`0000000a fffffa80`043dcd58 : nt!KiPageFault+0x260
    fffff880`035c37f0 fffff880`01ab166c : 00000000`00000000 fffff880`01a802d6 00000000`00000001 fffffa80`03f74ea0 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`035c3850 fffff880`01a7d8c3 : fffffa80`09204560 00000000`00000001 fffffa80`046aacf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d74f
    fffff880`035c38c0 fffff880`01a70724 : fffff880`035c3d78 00000000`00000029 fffffa80`046aacf0 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`035c3a70 fffff880`01a6f04a : fffffa80`04b13e00 fffff880`01a67504 fffffa80`04ad4010 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`035c3c20 fffff880`01a70c7b : fffff880`062fb012 fffffa80`04c33000 00000000`00000000 fffff880`035c3f00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`035c3d70 fffff880`01a67b97 : fffffa80`04b13e00 fffffa80`04b012ce fffffa80`0000d4aa 00000000`0000d4aa : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`035c3e40 fffff880`01a6770a : 00000000`00000000 fffff880`01b83800 fffff880`035c4000 00001f80`01016860 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`035c3f00 fffff880`01a66d09 : fffff880`035c4030 fffff800`032d1f3d 00000000`00000001 fffff880`035c3ff0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`035c3fa0 fffff880`01a64a7f : fffff880`01b83800 fffff880`062fb002 fffff880`01b83800 fffff880`01b83800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`035c4080 fffff880`01a64072 : fffffa80`07300570 00000000`00000000 fffffa80`07304400 fffff800`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`035c4280 fffff880`01ae43da : 001e6b90`000975ca 08474636`00133f4f fffffa80`07304400 043e36fd`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`035c4360 fffff800`032e0668 : 00000000`00000000 ffffffff`ffffffff fffffa80`03ba7680 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x568e2
    fffff880`035c43b0 fffff880`01a63bd2 : fffff880`01a63430 fffff880`00000040 0000000d`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`035c4490 fffff880`019550eb : fffffa80`07301010 00000000`00000000 fffffa80`0702c1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`035c4500 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0199ab2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800199ab2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0199ab2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880035c3660 -- (.trap 0xfffff880035c3660)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880035c3880 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800199ab2d rsp=fffff880035c37f0 rbp=fffff880035c3920
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa8009204560 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`0199ab2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:99a0:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032d32a9 to fffff800032d3d00
    
    STACK_TEXT:  
    fffff880`035c3518 fffff800`032d32a9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`035c3520 fffff800`032d1f20 : c000000d`00000000 fffff880`06906af4 00000000`04fa5900 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`035c3660 fffff880`0199ab2d : 00000000`00000038 fffff880`01a2afec 00000000`0000000a fffffa80`043dcd58 : nt!KiPageFault+0x260
    fffff880`035c37f0 fffff880`01ab166c : 00000000`00000000 fffff880`01a802d6 00000000`00000001 fffffa80`03f74ea0 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`035c3850 fffff880`01a7d8c3 : fffffa80`09204560 00000000`00000001 fffffa80`046aacf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d74f
    fffff880`035c38c0 fffff880`01a70724 : fffff880`035c3d78 00000000`00000029 fffffa80`046aacf0 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`035c3a70 fffff880`01a6f04a : fffffa80`04b13e00 fffff880`01a67504 fffffa80`04ad4010 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`035c3c20 fffff880`01a70c7b : fffff880`062fb012 fffffa80`04c33000 00000000`00000000 fffff880`035c3f00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`035c3d70 fffff880`01a67b97 : fffffa80`04b13e00 fffffa80`04b012ce fffffa80`0000d4aa 00000000`0000d4aa : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`035c3e40 fffff880`01a6770a : 00000000`00000000 fffff880`01b83800 fffff880`035c4000 00001f80`01016860 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`035c3f00 fffff880`01a66d09 : fffff880`035c4030 fffff800`032d1f3d 00000000`00000001 fffff880`035c3ff0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`035c3fa0 fffff880`01a64a7f : fffff880`01b83800 fffff880`062fb002 fffff880`01b83800 fffff880`01b83800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`035c4080 fffff880`01a64072 : fffffa80`07300570 00000000`00000000 fffffa80`07304400 fffff800`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`035c4280 fffff880`01ae43da : 001e6b90`000975ca 08474636`00133f4f fffffa80`07304400 043e36fd`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`035c4360 fffff800`032e0668 : 00000000`00000000 ffffffff`ffffffff fffffa80`03ba7680 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x568e2
    fffff880`035c43b0 fffff880`01a63bd2 : fffff880`01a63430 fffff880`00000040 0000000d`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`035c4490 fffff880`019550eb : fffffa80`07301010 00000000`00000000 fffffa80`0702c1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`035c4500 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0199ab2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 22:23.
Find Us