Problematic software:
Microsoft Security Essentials.
Recommended from a strict BSOD perspective, compatibility & stability compared to other antiviruses/internet security software. It is free and lightweight:-
Warning
Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.
Run a full scan with both (separately) once downloaded, installed and updated.
Drivers:
Please update or reinstall this driver:
Link & Description:
Driver Reference Table - Rt64win7.sys
Code:
lmvm Rt64win7
start end module name
fffff880`05541000 fffff880`055e8000 Rt64win7 T (no symbols)
Loaded symbol image file: Rt64win7.sys
Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
Image name: Rt64win7.sys
Timestamp: Thu Feb 16 11:39:50 2012 (4F3C96A6)
CheckSum: 000AE838
ImageSize: 000A7000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Sometimes drivers remain, not completely uninstalled. Follow this tutorial for complete removal of drivers of the particular program:
Perform a System File Check to check the integrity of all protected
Windows 7 :
- Click on the start
- Type CMD on Search
- Left click and Run as Administrator
- Type SFC /scannow
Full tutorial here:
Disk Check on your hard drive for file system errors and bad sectors on it.
Reduce items at start-up. Nothing except anti-virus is required plus improves the time for logging in windows.
BUG CHECK SUMMARY
Code:
**************[WarguySevenForums\SF_11-02-2013\020913-16489-01.dmp]**************
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff880017366fd}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880017366fd, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efc100
GetUlongFromAddress: unable to read from fffff80002efc1c0
0000000000000028 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`017366fd 448b5228 mov r10d,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880033a06f0 -- (.trap 0xfffff880033a06f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880033a0910 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880017366fd rsp=fffff880033a0880 rbp=fffff880033a09b0
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa800755c4f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`017366fd 448b5228 mov r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ccc569 to fffff80002cccfc0
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`017366fd 448b5228 mov r10d,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
Followup: MachineOwner
---------
Code:
kd> K
Child-SP RetAddr Call Site
fffff880`033a05a8 fffff800`02ccc569 nt!KeBugCheckEx
fffff880`033a05b0 fffff800`02ccb1e0 nt!KiBugCheckDispatch+0x69
fffff880`033a06f0 fffff880`017366fd nt!KiPageFault+0x260
fffff880`033a0880 fffff880`019460fc NETIO!RtlCopyBufferToMdl+0x1d
fffff880`033a08e0 fffff880`019122e8 tcpip! ?? ::FNODOBFM::`string'+0x1d0ff
fffff880`033a0950 fffff880`01903b34 tcpip!TcpTcbCarefulDatagram+0x1a98
fffff880`033a0b00 fffff880`01902aea tcpip!TcpTcbReceive+0x694
fffff880`033a0cb0 fffff880`0190408b tcpip!TcpMatchReceive+0x1fa
fffff880`033a0e00 fffff880`018fc067 tcpip!TcpPreValidatedReceive+0x36b
fffff880`033a0ed0 fffff880`018fbbda tcpip!IppDeliverListToProtocol+0x97
fffff880`033a0f90 fffff880`018fb1d9 tcpip!IppProcessDeliverList+0x5a
fffff880`033a1030 fffff880`018f8f3f tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033a1110 fffff880`018f8532 tcpip!IpFlcReceivePackets+0x64f
fffff880`033a1310 fffff880`0196beaa tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`033a13f0 fffff800`02cd8c48 tcpip! ?? ::FNODOBFM::`string'+0x4ff22
fffff880`033a1440 fffff880`018f8092 nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033a1520 fffff880`016f20eb tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`033a1590 00000000`00000000 ndis!ndisMIndicateNetBufferListsToOpen+0xdb
Let us know the results with further BSOD reports if any.