Welcome to SF.
Code:
Start Menu\Programs\PC Tools Security Public:Start Menu\Programs\PC Tools Security Public
Your BSOD was caused by Pc tools internet security so hopefully uninstalling this av should solve the problem.
Code:
fffff880`039c3f48 fffff880`03480d97*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
PctWfpFilter64+0x1dd97
fffff880`039c3d38 fffff880`0343ee1aUnable to load image \??\C:\Windows\System32\drivers\pctgntdi64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for pctgntdi64.sys
*** ERROR: Module load completed but symbols could not be loaded for pctgntdi64.sys
pctgntdi64+0x35e1a
Tip
Uninstall using Revo Uninstaller Free. Use Advanced Mode to uninstall so you can remove registry leftover of the software.
Microsoft Security Essentials.
Recommended from a strict BSOD perspective, compatibility & stability compared to other antiviruses/internet security software. It is free and lightweight:
Warning
Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.
Run a full scan with both (separately) once downloaded, installed and updated.
Perform a System File Check to check the integrity of all protected Windows 7 :
- Click on the start
- Type CMD on Search
- Left click and Run as Administrator
- Type
Full tutorial here:
Disk Check on your hard drive for file system errors and bad sectors on it.
Number down items at start-up. Keep only your anti-virus, this also improves the time for logging into windows.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff88001c106fd}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001c106fd, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'nvlddmkm' and 'nvlddmkm.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310e100
GetUlongFromAddress: unable to read from fffff8000310e1c0
0000000000000028 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`01c106fd 448b5228 mov r10d,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880039c36f0 -- (.trap 0xfffff880039c36f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880039c3910 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001c106fd rsp=fffff880039c3880 rbp=fffff880039c39b0
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa800eb042c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`01c106fd 448b5228 mov r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ed51e9 to fffff80002ed5c40
STACK_TEXT:
fffff880`039c35a8 fffff800`02ed51e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`039c35b0 fffff800`02ed3e60 : 00000000`00007539 fffff880`039c31e2 00000000`00000000 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`039c36f0 fffff880`01c106fd : 00000000`00000000 00000000`000038d6 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`039c3880 fffff880`01ea591c : 00000000`00000002 fffff880`01e73f06 00000000`00000000 fffff880`0400600f : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`039c38e0 fffff880`01e71a23 : fffffa80`0eb042c0 00000000`00000000 fffffa80`16502500 00000000`59ba23ed : tcpip! ?? ::FNODOBFM::`string'+0x1ceef
fffff880`039c3950 fffff880`01e62b44 : fffffa80`00000006 00000000`00000017 00000000`00007539 00000000`000031e2 : tcpip!TcpTcbCarefulDatagram+0x1aa3
fffff880`039c3b00 fffff880`01e61fda : fffffa80`0a4d4900 fffff880`01e5aeb4 fffffa80`0a4b7538 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`039c3cb0 fffff880`01e6357b : fffffa80`0f2880a6 fffffa80`0a616000 00000000`00000000 fffff880`039c4000 : tcpip!TcpMatchReceive+0x1fa
fffff880`039c3e00 fffff880`01e5b547 : fffffa80`0a4d4900 fffffa80`0a4931e2 fffffa80`00007539 00000000`00007539 : tcpip!TcpPreValidatedReceive+0x36b
fffff880`039c3ed0 fffff880`01e5b0ba : 00000000`00000000 fffff880`01f69800 fffff880`039c4090 fffff880`03485aa4 : tcpip!IppDeliverListToProtocol+0x97
fffff880`039c3f90 fffff880`01e5a6b9 : fffff880`039c4158 00000000`00000000 fffff880`039c4058 fffff880`039c4080 : tcpip!IppProcessDeliverList+0x5a
fffff880`039c4030 fffff880`01e5835f : 00000000`00000000 00000000`0d183b00 fffff880`01f69800 fffff880`01f69800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`039c4110 fffff880`01e57952 : fffffa80`0d1856b0 00000000`00000000 fffffa80`0d183b00 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`039c4310 fffff880`01ecad8a : fffffa80`00000000 fffffa80`14d21880 fffffa80`0d183b10 fffff880`039c4400 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`039c43f0 fffff800`02ee1968 : fffffa80`14d21880 fffffa80`0a4ebcec fffffa80`09d57b50 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x4f472
fffff880`039c4440 fffff880`01e574b2 : fffff880`01e56d10 00000000`0000afd0 00000000`00000000 80000004`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`039c4520 fffff880`01d740eb : fffffa80`0d1858d0 00000000`00000000 fffffa80`0caf61a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`039c4590 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`01c106fd 448b5228 mov r10d,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
Followup: MachineOwner
---------
Let us know the results.