running a
CyberpowerPC Gamer Ultra 2031 Phenom II X4 965(3.4GHz) 4GB DDR3 1TB ATI Radeon HD 5870 Windows 7 Home Premium 64-Bit
The overall system and computer runs absolutely fine, but when I try to play a particular game with other people online, I'll encounter the described BSOD.
I looked for solutions and ensured that all the drivers(to my knowledge) are up to date. I also ran MemTest and it found no errors in my RAM.
I attempted to find a way to read the minidumps of the crashes myself but wasn't able. I'd appreciate it if these forums could use the attached dumps to locate the problem and hopefully find a solution to the problem.
The particular game this occurs for is Dungeon Fighter Online if that is important at all.
Thank you for your time and assistance!
Two things are contributing to these crashes. PCTools, and Zone alarm.
remove both and replace zone alarm with Microsoft Security Essentials and use the win 7 firewall.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\New folder\102410-16972-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0325c000 PsLoadedModuleList = 0xfffff800`03499e50
Debug session time: Sun Oct 24 07:18:39.361 2010 (GMT-4)
System Uptime: 0 days 0:41:11.047
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff880018897a0}
Unable to load image \Device\Harddisk0\Partition2\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018897a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035040e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`018897a0 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88003849520 -- (.trap 0xfffff88003849520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80076d0010 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80076d0011 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018897a0 rsp=fffff880038496b0 rbp=0000000000000000
r8=fffffa80076d0010 r9=00000000000000d0 r10=fffff88002f63e80
r11=fffffa8005abe580 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`018897a0 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032cbca9 to fffff800032cc740
STACK_TEXT:
fffff880`038493d8 fffff800`032cbca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`038493e0 fffff800`032ca920 : fffffa80`049ac200 fffffa80`0774b6b0 fffffa80`00000000 fffffa80`058a61a0 : nt!KiBugCheckDispatch+0x69
fffff880`03849520 fffff880`018897a0 : fffffa80`0774b6b0 fffff880`02d8ba3a fffff880`206c644d fffffa80`07dc1630 : nt!KiPageFault+0x260
fffff880`038496b0 fffff880`0161d6a6 : fffffa80`0774b6b0 00000000`04995000 00000000`00000000 fffffa80`04995000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`03849700 fffff880`0161b35d : 00000000`00000000 fffffa80`07dc1630 00000000`00000000 fffff880`0196b9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`03849730 fffff880`0185de26 : fffffa80`04995000 fffffa80`07dc1700 00000000`00000011 fffffa80`0774b6b0 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`038497b0 fffff880`0185cb21 : 00000000`00000000 fffffa80`04995000 fffff880`0196b9a0 00000000`07f58601 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`03849890 fffff880`01934542 : fffffa80`05f7ff70 00000000`00000000 fffffa80`07f58601 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`03849a90 fffff880`016adafa : fffffa80`07255202 fffffa80`07255280 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`03849ad0 fffff880`02d8468e : fffffa80`061a7140 fffffa80`07f58690 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`03849b80 fffffa80`061a7140 : fffffa80`07f58690 00000000`c0000000 fffff880`00000000 fffffa80`07db0002 : PctWfpFilter64+0xd68e
fffff880`03849b88 fffffa80`07f58690 : 00000000`c0000000 fffff880`00000000 fffffa80`07db0002 fffffa80`00000001 : 0xfffffa80`061a7140
fffff880`03849b90 00000000`c0000000 : fffff880`00000000 fffffa80`07db0002 fffffa80`00000001 fffffa80`0000000c : 0xfffffa80`07f58690
fffff880`03849b98 fffff880`00000000 : fffffa80`07db0002 fffffa80`00000001 fffffa80`0000000c fffffa80`00000000 : 0xc0000000
fffff880`03849ba0 fffffa80`07db0002 : fffffa80`00000001 fffffa80`0000000c fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`03849ba8 fffffa80`00000001 : fffffa80`0000000c fffffa80`00000000 fffffa80`00000000 fffff880`02d841d0 : 0xfffffa80`07db0002
fffff880`03849bb0 fffffa80`0000000c : fffffa80`00000000 fffffa80`00000000 fffff880`02d841d0 fffffa80`07f58690 : 0xfffffa80`00000001
fffff880`03849bb8 fffffa80`00000000 : fffffa80`00000000 fffff880`02d841d0 fffffa80`07f58690 00000000`53636670 : 0xfffffa80`0000000c
fffff880`03849bc0 fffffa80`00000000 : fffff880`02d841d0 fffffa80`07f58690 00000000`53636670 fffffa80`07dc1630 : 0xfffffa80`00000000
fffff880`03849bc8 fffff880`02d841d0 : fffffa80`07f58690 00000000`53636670 fffffa80`07dc1630 fffff880`02d93338 : 0xfffffa80`00000000
fffff880`03849bd0 fffffa80`07f58690 : 00000000`53636670 fffffa80`07dc1630 fffff880`02d93338 00000000`00000000 : PctWfpFilter64+0xd1d0
fffff880`03849bd8 00000000`53636670 : fffffa80`07dc1630 fffff880`02d93338 00000000`00000000 00000000`00000000 : 0xfffffa80`07f58690
fffff880`03849be0 fffffa80`07dc1630 : fffff880`02d93338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x53636670
fffff880`03849be8 fffff880`02d93338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`03a8bd80 : 0xfffffa80`07dc1630
fffff880`03849bf0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`03a8bd80 fffff880`02d96128 : PctWfpFilter64+0x1c338
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`0161d6a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------
driver needing update
Code:
lirsgt.sys fffff880`0793a000 fffff880`07947000 0x0000d000 0x404a2c1d 3/6/2004 15:53:01
How To Find Drivers:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads