Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD when norton internet security attemps to finish installing

29 May 2013   #11
koolkat77

Microsoft Community Contributor Award Recipient

Windows 10 Home 64Bit
 
 

Quote   Quote: Originally Posted by daynedelano View Post
could we atleast take a shot at the 2 dump files I had, dispite it being bloatware, im still invested in it. can you guys take a peek at the dump files and see if it has something to do with Norton? im on their forums as we speak(chat) but there not as responsive as you guys are. 1 bird 2 stones?
much appreciated
I checked the files when I first posted that's how I came to the conclusion that Norton and Avast! were a problem.

These are the unloaded drivers from Norton:
Code:
BHDrvx64.sys         Fri Oct 19 10:40:41 2012 (5080D9C9)
IDSVia64.sys         Wed Aug 29 08:48:40 2012 (503D8308)
SRTSPX64.SYS         Sat Jan 26 03:30:05 2013 (5102F95D)
SYMDS64.SYS          Thu Jan 17 07:56:45 2013 (50F75A5D)
SYMEFA64.SYS         Sat Jan 19 06:31:37 2013 (50F9E969)
SYMEVENT64x86.SYS    Thu May 24 06:52:24 2012 (4FBD8648)
SYMNETS.SYS          Sat Jul 21 08:07:07 2012 (500A0ECB)
By the looks of it remnants of PC Tools Internet Security drivers are also creating a conflict.
Code:
PCTCore64.sys        Mon Apr 23 08:32:06 2012 (4F94BF26)
pctDS64.sys          Tue Feb 28 06:40:33 2012 (4F4C2281)
pctEFA64.sys         Tue Feb 28 06:42:31 2012 (4F4C22F7)
pctgntdi64.sys       Fri Jun 22 11:15:50 2012 (4FE3FF86)
PCTSD64.sys          Fri Jun 22 10:39:48 2012 (4FE3F714)
PctWfpFilter64.sys   Fri Jun 22 11:21:51 2012 (4FE400EF)
The output of your dump:
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 1, fffff80002cddc2f}

Probably caused by : NETIO.SYS ( NETIO!WfpExpireEntryLru+17 )

Followup: MachineOwner
---------

2: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cddc2f, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0c100
GetUlongFromAddress: unable to read from fffff80002f0c1c0
 0000000000000000 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+4f
fffff800`02cddc2f 488713          xchg    rdx,qword ptr [rbx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  iexplore.exe

TRAP_FRAME:  fffff88009d5bbd0 -- (.trap 0xfffff88009d5bbd0)
.trap 0xfffff88009d5bbd0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800383c060 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff88009d5bdd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cddc2f rsp=fffff88009d5bd60 rbp=0000000000000004
 r8=fffff88009d5bdd0  r9=fffff88001b8acb0 r10=0000000000000000
r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f:
fffff800`02cddc2f 488713          xchg    rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
.trap
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cd41a9 to fffff80002cd4c00
STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!WfpExpireEntryLru+17
fffff880`0196f9a7 488b4310        mov     rax,qword ptr [rbx+10h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!WfpExpireEntryLru+17

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  5034f6a0

FAILURE_BUCKET_ID:  X64_0xA_NETIO!WfpExpireEntryLru+17

BUCKET_ID:  X64_0xA_NETIO!WfpExpireEntryLru+17

Followup: MachineOwner
---------
The amount of network trash on the stack text:
Code:
STACK_TEXT:  
fffff880`09d5ba88 fffff800`02cd41a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`09d5ba90 fffff800`02cd2e20 : 00000000`00000010 fffff880`09d5bdc0 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`09d5bbd0 fffff800`02cddc2f : 00000000`00000003 00000000`00000002 00000000`00000003 00000000`00000002 : nt!KiPageFault+0x260
fffff880`09d5bd60 fffff880`0196f9a7 : 00000000`00000004 fffff880`09d5c040 00000000`00008900 fffffa80`046647c8 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f
fffff880`09d5bdb0 fffff880`01ae641d : fffffa80`03837e10 fffffa80`08b72c60 fffff880`09d5c040 00000000`00008900 : NETIO!WfpExpireEntryLru+0x17
fffff880`09d5be00 fffff880`01aaaba7 : 00000000`00020004 00000000`00000030 00000000`00000000 00000000`00000000 : tcpip!WfpAleCloseRemoteEndpointConnection+0x2d
fffff880`09d5be30 fffff880`01b261eb : fffffa80`03837e10 fffffa80`07f1f0da fffffa80`0887d660 fffffa80`03837e10 : tcpip! ?? ::FNODOBFM::`string'+0x22302
fffff880`09d5bf80 fffff880`01ab3207 : fffffa80`03837e68 00000000`00000001 fffff880`09d5c7a0 fffffa80`0887d660 : tcpip!WfpAleHandleSendCompletion+0xeb
fffff880`09d5c0a0 fffff880`01a46e66 : 00000000`00000000 00000000`00000001 00000000`00000011 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x2ae71
fffff880`09d5c370 fffff880`01a7e2ce : 00000000`00000000 fffff880`09d5c7a8 fffff880`09d5c7a0 00000000`00000003 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`09d5c460 fffff880`01a42b54 : fffffa80`03844173 00000000`00000000 fffffa80`08b72c60 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x5fe
fffff880`09d5c6d0 fffff880`01a89d44 : fffffa80`038d2cd0 00000000`00000001 00000000`00008900 fffff880`01a78900 : tcpip!WfpProcessOutTransportStackIndication+0x334
fffff880`09d5c890 fffff880`01a5d3ff : fffffa80`04525858 fffffa80`0452590c fffff880`09d5cd20 00000000`00000004 : tcpip!IppInspectLocalDatagramsOut+0x264
fffff880`09d5c970 fffff880`01a5fdae : 00000000`00000000 fffff880`01946f04 00000000`00000011 fffffa80`08b72c60 : tcpip!IppSendDatagramsCommon+0x7ef
fffff880`09d5cb10 fffff880`01a3d568 : fffffa80`08b72c60 fffffa80`038d2cd0 fffffa80`038d2cd0 fffffa80`08898160 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`09d5cb50 fffff880`01a3d7ce : fffffa80`03835180 fffff880`01b30840 fffff880`09d5d4a0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`09d5ced0 fffff880`01a3dd15 : fffff880`09d5d400 fffff880`011a8900 fffff880`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x1ee
fffff880`09d5d2c0 fffff800`02ce0878 : 00000000`00000000 fffff880`09d5d5d0 00000000`00020019 fffff800`02ce64b8 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`09d5d2f0 fffff880`01a3dda8 : fffff880`01a3dd00 fffff880`09d5d498 fffff880`09d5d400 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`09d5d3d0 fffff880`04003675 : fffffa80`044e8630 fffffa80`0830e0f0 fffffa80`08b81ba0 fffffa80`0885d1fe : tcpip!UdpTlProviderSendMessages+0x78
fffff880`09d5d450 fffff880`040038c2 : 00000000`00000000 fffffa80`03bcac60 fffffa80`06209bc0 fffff800`02ce5b91 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`09d5d530 fffff880`044c4c06 : fffffa80`0885d010 fffffa80`08b81f20 00000000`00000000 fffffa80`06209a60 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`09d5d5b0 fffff880`044c4141 : fffffa80`0885d1c8 fffffa80`0885d1c8 fffffa80`0885d010 fffff880`09d5d6b0 : netbt!TdiSendDatagram+0x187
fffff880`09d5d620 fffff880`044c45fa : fffffa80`089d0860 fffffa80`089d0860 fffffa80`08882710 00000000`c0a801ff : netbt!UdpSendDatagram+0x1b1
fffff880`09d5d6b0 fffff880`044c3f6f : fffffa80`07f75100 00000000`00000001 fffffa80`047b8700 fffff880`044c2154 : netbt!SendNameServiceRequest+0x38b
fffff880`09d5d750 fffff880`044c3c51 : fffffa80`03b74cc8 fffffa80`04f17150 00000000`c0000001 fffffa80`08d7d110 : netbt!QueryNameOnNet+0x47d
fffff880`09d5d800 fffff880`044f3520 : 00000000`c0000120 fffffa80`03b74cc8 fffff880`044c52d0 fffffa80`095e2c00 : netbt!FindNameOrQuery+0x550
fffff880`09d5d880 fffff880`044f35d3 : 00000000`c0000001 00000000`00210096 fffffa80`095e2dc0 fffffa80`095e2c60 : netbt!NbtQueryFindName+0x12a
fffff880`09d5d930 fffff880`044f31ce : fffffa80`095e2c60 fffffa80`095e2dc0 00000000`00000001 fffffa80`095e2dc0 : netbt!DispatchIoctls+0x28e
fffff880`09d5d9e0 fffff800`02ff2f37 : fffffa80`09632880 fffff880`09d5dca0 fffffa80`09632880 fffffa80`095e2c60 : netbt!NbtDispatchDevCtrl+0xc5
fffff880`09d5da10 fffff800`02ff3796 : 00000000`03f9dde8 00000000`00000780 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`09d5db40 fffff800`02cd3e93 : fffffa80`0383c060 00000000`03f9ddc8 fffff880`09d5dbc8 00000000`00000003 : nt!NtDeviceIoControlFile+0x56
fffff880`09d5dbb0 00000000`7743138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03f9df28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7743138a
Seeing these if it were my laptop/PC I wouldn't hesitate to perform the steps Greg recommended.


My System SpecsSystem Spec
.
29 May 2013   #12
daynedelano

windows 7 64 bit
 
 

Quote   Quote: Originally Posted by koolkat77 View Post
Quote   Quote: Originally Posted by daynedelano View Post
could we atleast take a shot at the 2 dump files I had, dispite it being bloatware, im still invested in it. can you guys take a peek at the dump files and see if it has something to do with Norton? im on their forums as we speak(chat) but there not as responsive as you guys are. 1 bird 2 stones?
much appreciated
I checked the files when I first posted that's how I came to the conclusion that Norton and Avast! were a problem.

These are the unloaded drivers from Norton:
Code:
BHDrvx64.sys         Fri Oct 19 10:40:41 2012 (5080D9C9)
IDSVia64.sys         Wed Aug 29 08:48:40 2012 (503D8308)
SRTSPX64.SYS         Sat Jan 26 03:30:05 2013 (5102F95D)
SYMDS64.SYS          Thu Jan 17 07:56:45 2013 (50F75A5D)
SYMEFA64.SYS         Sat Jan 19 06:31:37 2013 (50F9E969)
SYMEVENT64x86.SYS    Thu May 24 06:52:24 2012 (4FBD8648)
SYMNETS.SYS          Sat Jul 21 08:07:07 2012 (500A0ECB)
By the looks of it remnants of PC Tools Internet Security drivers are also creating a conflict.
Code:
PCTCore64.sys        Mon Apr 23 08:32:06 2012 (4F94BF26)
pctDS64.sys          Tue Feb 28 06:40:33 2012 (4F4C2281)
pctEFA64.sys         Tue Feb 28 06:42:31 2012 (4F4C22F7)
pctgntdi64.sys       Fri Jun 22 11:15:50 2012 (4FE3FF86)
PCTSD64.sys          Fri Jun 22 10:39:48 2012 (4FE3F714)
PctWfpFilter64.sys   Fri Jun 22 11:21:51 2012 (4FE400EF)
The output of your dump:
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
Use !analyze -v to get detailed debugging information.
 
BugCheck A, {0, 2, 1, fffff80002cddc2f}
 
Probably caused by : NETIO.SYS ( NETIO!WfpExpireEntryLru+17 )
 
Followup: MachineOwner
---------
 
2: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cddc2f, address which referenced memory
 
Debugging Details:
------------------
 
 
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0c100
GetUlongFromAddress: unable to read from fffff80002f0c1c0
0000000000000000 Nonpaged pool
 
CURRENT_IRQL:  2
 
FAULTING_IP: 
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+4f
fffff800`02cddc2f 488713          xchg    rdx,qword ptr [rbx]
 
CUSTOMER_CRASH_COUNT:  1
 
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
 
BUGCHECK_STR:  0xA
 
PROCESS_NAME:  iexplore.exe
 
TRAP_FRAME:  fffff88009d5bbd0 -- (.trap 0xfffff88009d5bbd0)
.trap 0xfffff88009d5bbd0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800383c060 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff88009d5bdd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cddc2f rsp=fffff88009d5bd60 rbp=0000000000000004
r8=fffff88009d5bdd0  r9=fffff88001b8acb0 r10=0000000000000000
r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f:
fffff800`02cddc2f 488713          xchg    rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
.trap
Resetting default scope
 
LAST_CONTROL_TRANSFER:  from fffff80002cd41a9 to fffff80002cd4c00
STACK_COMMAND:  kb
 
FOLLOWUP_IP: 
NETIO!WfpExpireEntryLru+17
fffff880`0196f9a7 488b4310        mov     rax,qword ptr [rbx+10h]
 
SYMBOL_STACK_INDEX:  4
 
SYMBOL_NAME:  NETIO!WfpExpireEntryLru+17
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: NETIO
 
IMAGE_NAME:  NETIO.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  5034f6a0
 
FAILURE_BUCKET_ID:  X64_0xA_NETIO!WfpExpireEntryLru+17
 
BUCKET_ID:  X64_0xA_NETIO!WfpExpireEntryLru+17
 
Followup: MachineOwner
---------
The amount of network trash on the stack text:
Code:
STACK_TEXT:  
fffff880`09d5ba88 fffff800`02cd41a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`09d5ba90 fffff800`02cd2e20 : 00000000`00000010 fffff880`09d5bdc0 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`09d5bbd0 fffff800`02cddc2f : 00000000`00000003 00000000`00000002 00000000`00000003 00000000`00000002 : nt!KiPageFault+0x260
fffff880`09d5bd60 fffff880`0196f9a7 : 00000000`00000004 fffff880`09d5c040 00000000`00008900 fffffa80`046647c8 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f
fffff880`09d5bdb0 fffff880`01ae641d : fffffa80`03837e10 fffffa80`08b72c60 fffff880`09d5c040 00000000`00008900 : NETIO!WfpExpireEntryLru+0x17
fffff880`09d5be00 fffff880`01aaaba7 : 00000000`00020004 00000000`00000030 00000000`00000000 00000000`00000000 : tcpip!WfpAleCloseRemoteEndpointConnection+0x2d
fffff880`09d5be30 fffff880`01b261eb : fffffa80`03837e10 fffffa80`07f1f0da fffffa80`0887d660 fffffa80`03837e10 : tcpip! ?? ::FNODOBFM::`string'+0x22302
fffff880`09d5bf80 fffff880`01ab3207 : fffffa80`03837e68 00000000`00000001 fffff880`09d5c7a0 fffffa80`0887d660 : tcpip!WfpAleHandleSendCompletion+0xeb
fffff880`09d5c0a0 fffff880`01a46e66 : 00000000`00000000 00000000`00000001 00000000`00000011 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x2ae71
fffff880`09d5c370 fffff880`01a7e2ce : 00000000`00000000 fffff880`09d5c7a8 fffff880`09d5c7a0 00000000`00000003 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`09d5c460 fffff880`01a42b54 : fffffa80`03844173 00000000`00000000 fffffa80`08b72c60 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x5fe
fffff880`09d5c6d0 fffff880`01a89d44 : fffffa80`038d2cd0 00000000`00000001 00000000`00008900 fffff880`01a78900 : tcpip!WfpProcessOutTransportStackIndication+0x334
fffff880`09d5c890 fffff880`01a5d3ff : fffffa80`04525858 fffffa80`0452590c fffff880`09d5cd20 00000000`00000004 : tcpip!IppInspectLocalDatagramsOut+0x264
fffff880`09d5c970 fffff880`01a5fdae : 00000000`00000000 fffff880`01946f04 00000000`00000011 fffffa80`08b72c60 : tcpip!IppSendDatagramsCommon+0x7ef
fffff880`09d5cb10 fffff880`01a3d568 : fffffa80`08b72c60 fffffa80`038d2cd0 fffffa80`038d2cd0 fffffa80`08898160 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`09d5cb50 fffff880`01a3d7ce : fffffa80`03835180 fffff880`01b30840 fffff880`09d5d4a0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`09d5ced0 fffff880`01a3dd15 : fffff880`09d5d400 fffff880`011a8900 fffff880`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x1ee
fffff880`09d5d2c0 fffff800`02ce0878 : 00000000`00000000 fffff880`09d5d5d0 00000000`00020019 fffff800`02ce64b8 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`09d5d2f0 fffff880`01a3dda8 : fffff880`01a3dd00 fffff880`09d5d498 fffff880`09d5d400 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`09d5d3d0 fffff880`04003675 : fffffa80`044e8630 fffffa80`0830e0f0 fffffa80`08b81ba0 fffffa80`0885d1fe : tcpip!UdpTlProviderSendMessages+0x78
fffff880`09d5d450 fffff880`040038c2 : 00000000`00000000 fffffa80`03bcac60 fffffa80`06209bc0 fffff800`02ce5b91 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`09d5d530 fffff880`044c4c06 : fffffa80`0885d010 fffffa80`08b81f20 00000000`00000000 fffffa80`06209a60 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`09d5d5b0 fffff880`044c4141 : fffffa80`0885d1c8 fffffa80`0885d1c8 fffffa80`0885d010 fffff880`09d5d6b0 : netbt!TdiSendDatagram+0x187
fffff880`09d5d620 fffff880`044c45fa : fffffa80`089d0860 fffffa80`089d0860 fffffa80`08882710 00000000`c0a801ff : netbt!UdpSendDatagram+0x1b1
fffff880`09d5d6b0 fffff880`044c3f6f : fffffa80`07f75100 00000000`00000001 fffffa80`047b8700 fffff880`044c2154 : netbt!SendNameServiceRequest+0x38b
fffff880`09d5d750 fffff880`044c3c51 : fffffa80`03b74cc8 fffffa80`04f17150 00000000`c0000001 fffffa80`08d7d110 : netbt!QueryNameOnNet+0x47d
fffff880`09d5d800 fffff880`044f3520 : 00000000`c0000120 fffffa80`03b74cc8 fffff880`044c52d0 fffffa80`095e2c00 : netbt!FindNameOrQuery+0x550
fffff880`09d5d880 fffff880`044f35d3 : 00000000`c0000001 00000000`00210096 fffffa80`095e2dc0 fffffa80`095e2c60 : netbt!NbtQueryFindName+0x12a
fffff880`09d5d930 fffff880`044f31ce : fffffa80`095e2c60 fffffa80`095e2dc0 00000000`00000001 fffffa80`095e2dc0 : netbt!DispatchIoctls+0x28e
fffff880`09d5d9e0 fffff800`02ff2f37 : fffffa80`09632880 fffff880`09d5dca0 fffffa80`09632880 fffffa80`095e2c60 : netbt!NbtDispatchDevCtrl+0xc5
fffff880`09d5da10 fffff800`02ff3796 : 00000000`03f9dde8 00000000`00000780 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`09d5db40 fffff800`02cd3e93 : fffffa80`0383c060 00000000`03f9ddc8 fffff880`09d5dbc8 00000000`00000003 : nt!NtDeviceIoControlFile+0x56
fffff880`09d5dbb0 00000000`7743138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03f9df28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7743138a
Seeing these if it were my laptop/PC I wouldn't hesitate to perform the steps Greg recommended.
thanks for your analysis, I think I will attempt the clean windows 7 install.
My System SpecsSystem Spec
29 May 2013   #13
koolkat77

Microsoft Community Contributor Award Recipient

Windows 10 Home 64Bit
 
 

Good luck and see you soon!
My System SpecsSystem Spec
.

30 May 2013   #14
daynedelano

windows 7 64 bit
 
 

Quote   Quote: Originally Posted by koolkat77 View Post
Good luck and see you soon!
I downloaded windows 7, I have no dvds, & no flash stick. would it work on an external usb hard drive?
My System SpecsSystem Spec
30 May 2013   #15
gregrocker

 

DVD's are 5 for $2 on the wall rack at Walgreens.

You need a bootable installer for install and kept for repairs. External DVD's are too cumbersome to make bootable.
My System SpecsSystem Spec
Reply

 BSOD when norton internet security attemps to finish installing




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
BSOD running Norton Internet Security full system scan
Hello, everytime I am running the full system scan of Norton Internet Security the system runs into a BSOD. This happens shorty after the start of the scan. The system says goodbye within 1..2 seconds after starting the scan. Message: BCCode: 124 BCP1: 0000000000000000 BCP2: ...
BSOD Help and Support
BSOD after restart after installing Norton Internet Security 2013
So this is what happened exactly: I've re-installed windows 7 several times. Usually I install windows 7 > run windows update until there's nothing to update > install latest audio/graphics drivers > install Anti Virus I always restart after installing Norton Internet Security 2013 since...
BSOD Help and Support
Norton Internet Security
For those who use NIS as I do - does NIS 2013 offer any significant advantage over NIS 2012? (I know there is MSE etc.)
System Security
Is Norton internet security all i need?
I just got Norton Internet Security 2011 Now should i be using any other scanners like SAS are MWB SAS use to removed tracking cookies but Norton does tha . Thank u in advance for any help.
System Security
norton internet security
I have the latest version of norton internet security. what could I use as a spyware, etc. to help further secure my windows 7 home premium laptop??
System Security


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 13:50.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App