Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.

Windows 7: BSOD error 0x0000003B and 0x000000C1 caused by ntoskrnl.exe

10 Aug 2019   #1

Windows 7 Ultimate x64
BSOD error 0x0000003B and 0x000000C1 caused by ntoskrnl.exe

Hello All,

I'll start from the beginning. A few months ago I replaced one of two hard drives in my desktop and made separate system and data partitions on it (this is my windows drive, the other has ubuntu on it but I digress...). During the first 2 weeks I had about 5 blue screens, most of them during virus scans (I use MSE and Malwarebytes free version - it's happened during both). So I reformatted and just made one partition spanning the whole drive, thinking maybe the separate partitioning played a role. Well, that didn't help as I started getting stop errors again within a couple days. Similar to before, they happen during or shortly after virus scans. I should mention that many of the crashes are system freezes that happen too fast for a bsod to appear and a minidump to be recorded, but those that have been logged always seem to be one of the two bug check codes mentioned in the thread title.

Anyway, the crashes are still happening so I looked around SF for a solution, but haven't found anything quite similar enough. I have, however, done most (I think) of the troubleshooting that's usually recommended to start. I enabled the driver verifier for the 4 up-to-date nvidia drivers that I suspected (selected standard settings, force pending i/o requests, irp logging; unchecked windows and unknowns) and it does cause the freeze/bsod very soon after booting and logging into my account. At first I wasn't getting any minidumps but they finally started recording. But verifying with only other non-microsoft drivers (except unknowns) also caused quick crashes...

Next, I did the on-board system diagnostic with no memory errors found. I then booted up with memtest via usb and no errors were found in a full pass. So maybe it's not a memory issue.

Even though the problem started shortly after installing the new hard disk, it just seems like I'd have more widespread problems than this if it were a bad drive. Plus I ran chkdsk with no issues found, but please advise if there's anything else to try drive-wise.

So that's where I'm at now. Attached is the required .zip file, hope I'm not missing anything. Thanks in advance for any help.

Attached Files
File Type: zip (2.27 MB, 1 views)
My System SpecsSystem Spec
11 Aug 2019   #2

Windows 8.1 Enterprise x64

The SYSTEM_SERVICE_EXCEPTION bug check has a value of 0x0000003B. This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
1st parameter = 0xc17 - {Not Enough Quota} Not enough virtual memory or paging file quota is available to complete the specified operation.
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [F:\080919-27565-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*
Symbol search path is: SRV*
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.24499.amd64fre.win7sp1_ldr.190612-0600
Machine Name:
Kernel base = 0xfffff800`03213000 PsLoadedModuleList = 0xfffff800`0344cc90
Debug session time: Fri Aug  9 20:46:35.194 2019 (UTC + 2:00)
System Uptime: 1 days 0:25:28.110
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
For analysis of this file, run !analyze -v
0: kd> !analyze
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000017, fffff8000326c58c, fffff8800c30b0d0, 0}

*** WARNING: Unable to verify timestamp for gdrv2.sys
GetUlongPtrFromAddress: unable to read from fffff800034b0300
Probably caused by : gdrv2.sys ( gdrv2+73c0 )

Followup:     MachineOwner

0: kd> !analyze -v
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *

An exception happened while executing a system service routine.
Arg1: 00000000c0000017, Exception code that caused the bugcheck
Arg2: fffff8000326c58c, Address of the instruction which caused the bugcheck
Arg3: fffff8800c30b0d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:








BUILD_VERSION_STRING:  7601.24499.amd64fre.win7sp1_ldr.190612-0600


BUGCHECK_P1: c0000017

BUGCHECK_P2: fffff8000326c58c

BUGCHECK_P3: fffff8800c30b0d0


EXCEPTION_CODE: (NTSTATUS) 0xc0000017 - {Not Enough Quota}  Not enough virtual memory or paging file quota is available to complete the specified operation.

fffff800`0326c58c 488b8424b8010000 mov     rax,qword ptr [rsp+1B8h]

CONTEXT:  fffff8800c30b0d0 -- (.cxr 0xfffff8800c30b0d0)
rax=0000000000000000 rbx=00000000c0000017 rcx=fffff8800c30b0d0
rdx=0000000000000001 rsi=00000000c0000017 rdi=fffffa80093dc950
rip=fffff8000326c58c rsp=fffff8800c30b010 rbp=fffffa8009ae5be8
 r8=0000000000000000  r9=0000000000000060 r10=fffff800033f7be0
r11=fffffa8008f3e530 r12=fffffa800a7e1c40 r13=0000000000000010
r14=fffffa8009ae59d0 r15=0000000000001000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000282
fffff800`0326c58c 488b8424b8010000 mov     rax,qword ptr [rsp+1B8h] ss:0018:fffff880`0c30b1c8=fffff8000326c58c
Resetting default scope

BUGCHECK_STR:  0x3B_c0000017


CPU_MHZ: bb0

CPU_VENDOR:  GenuineIntel









ANALYSIS_SESSION_TIME:  08-11-2019 13:05:33.0949

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80003609639 to fffff8000326c58c

fffff880`0c30b010 fffff800`03609639 : fffffa80`0a7e1c40 00000000`00000fff fffffa80`76706d4d 00000000`00000001 : nt!RtlRaiseStatus+0x18
fffff880`0c30b5b0 fffff880`09bfc3c0 : fffffa80`0ad522d0 00000000`00000001 0000057f`00000000 00000000`00000000 : nt!MiMapLockedPagesInUserSpace+0x549
fffff880`0c30b640 fffffa80`0ad522d0 : 00000000`00000001 0000057f`00000000 00000000`00000000 00000000`00000000 : gdrv2+0x73c0
fffff880`0c30b648 00000000`00000001 : 0000057f`00000000 00000000`00000000 00000000`00000000 fffff880`00000010 : 0xfffffa80`0ad522d0
fffff880`0c30b650 0000057f`00000000 : 00000000`00000000 00000000`00000000 fffff880`00000010 fffffa80`0ad40d40 : 0x1
fffff880`0c30b658 00000000`00000000 : 00000000`00000000 fffff880`00000010 fffffa80`0ad40d40 fffff880`00c099da : 0x0000057f`00000000

THREAD_SHA1_HASH_MOD_FUNC:  0ef12db70d855d6e4ae4fb6da279084d076dde54

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0acccb534ac5bd5495bf35e4bb26da15f586eb4f

THREAD_SHA1_HASH_MOD:  2f9077ce7622db1db416a2eccb040b7e8498fb68

fffff880`09bfc3c0 ??              ???


SYMBOL_NAME:  gdrv2+73c0

FOLLOWUP_NAME:  MachineOwner


IMAGE_NAME:  gdrv2.sys


STACK_COMMAND:  .cxr 0xfffff8800c30b0d0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_c0000017_gdrv2+73c0

BUCKET_ID:  X64_0x3B_c0000017_gdrv2+73c0

PRIMARY_PROBLEM_CLASS:  X64_0x3B_c0000017_gdrv2+73c0

TARGET_TIME:  2019-08-09T18:46:35.000Z

OSBUILD:  7601







OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS



OSBUILD_TIMESTAMP:  2019-06-12 16:36:12


BUILDLAB_STR:  win7sp1_ldr

BUILDOSVER_STR:  6.1.7601.24499.amd64fre.win7sp1_ldr.190612-0600



FAILURE_ID_HASH_STRING:  km:x64_0x3b_c0000017_gdrv2+73c0

FAILURE_ID_HASH:  {169ed98e-cbac-b1b6-0bf8-ebac2ad1f10d}

Followup:     MachineOwner

0: kd> .load pde
 PDE v11.3 - Copyright 2017 Andrew Richards
0: kd> !dpx
Start memory scan  : 0xfffff8800c30a778 ($csp)
End memory scan    : 0xfffff8800c30c000 (Kernel Stack Base)

               rsp : 0xfffff8800c30a778 : 0xfffff800032b50e9 : nt!KiBugCheckDispatch+0x69
                r9 : 0xfffff8800c30b0d0 : 0xfffff800036c2340 : nt!CmpParseKey
               r11 : 0xfffff8800c30a978 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30a778 : 0xfffff800032b50e9 : nt!KiBugCheckDispatch+0x69
0xfffff8800c30a790 : 0xfffff8000326c58c : nt!RtlRaiseStatus+0x18
0xfffff8800c30a798 : 0xfffff8800c30b0d0 : 0xfffff800036c2340 : nt!CmpParseKey
0xfffff8800c30a858 : 0xfffff8800c30a920 : 0xfffff8800c30a9c0 : 0xfffff800032b4d53 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800c30a890 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30a898 : 0xfffff800032b4d53 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800c30a8a0 : 0xfffff8000348e02c : "nt!BBTBuffer <PERF> (nt+0x27b02c)"
0xfffff8800c30a8a8 : 0xfffff800032b4780 : nt!KiSystemServiceHandler
0xfffff8800c30a8b8 : 0xfffff800032b47fc : nt!KiSystemServiceHandler+0x7c
0xfffff8800c30a8c8 : 0xfffff8800c30b0d0 : 0xfffff800036c2340 : nt!CmpParseKey
0xfffff8800c30a8d8 : 0xfffff8000329517c : nt!_C_specific_handler
0xfffff8800c30a8e0 : 0xfffff800034aa904 : "nt!BBTBuffer <PERF> (nt+0x297904)"
0xfffff8800c30a8e8 : 0xfffff800036cc451 : nt!IopXxxControlFile+0xc51
0xfffff8800c30a8f8 : 0xfffff800032adffd : nt!RtlpExecuteHandlerForException+0xd
0xfffff8800c30a900 : 0xfffff8000349d458 : "nt!BBTBuffer <PERF> (nt+0x28a458)"
0xfffff8800c30a910 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30a920 : 0xfffff8800c30a9c0 : 0xfffff800032b4d53 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800c30a928 : 0xfffff8000326d925 : nt!RtlDispatchException+0x415
0xfffff8800c30a938 : 0xfffff8800c30a978 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30a948 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30a968 : 0xfffff8800c30ab18 : 0xfffff8000350d941 : nt!ObOpenObjectByName+0x531
0xfffff8800c30a978 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30a998 : 0xfffff8000348e02c : "nt!BBTBuffer <PERF> (nt+0x27b02c)"
0xfffff8800c30a9c0 : 0xfffff800032b4d53 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800c30a9c8 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30a9d0 : 0xfffff8000348e02c : "nt!BBTBuffer <PERF> (nt+0x27b02c)"
*** WARNING: Unable to verify timestamp for gdrv2.sys
0xfffff8800c30a9f0 : 0xfffff800032b4780 : nt!KiSystemServiceHandler
0xfffff8800c30aa98 : 0xfffff800037032d0 : nt!IopFileMapping
0xfffff8800c30ab18 : 0xfffff8000350d941 : nt!ObOpenObjectByName+0x531
0xfffff8800c30abd8 : 0xfffff800033f7180 : nt!KiInitialPCR+0x180
0xfffff8800c30abe8 : 0xfffff800033eceed : nt!ExFreePoolWithTag+0x22d
0xfffff8800c30ace8 : 0xfffff800035f3f91 : nt!CmpCallbackFillObjectContext+0xc1
0xfffff8800c30acf0 : 0xfffff8800c30af70 : 0xfffff88000cad228 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad228)"
0xfffff8800c30ad18 : 0xfffff800035f42fe : nt!CmpCallCallBacks+0x29e
0xfffff8800c30ad48 : 0xfffff8800c30af70 : 0xfffff88000cad228 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad228)"
0xfffff8800c30ad60 : 0xfffff8800c30af38 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30ad98 : 0xfffff8800c30af38 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30adb0 : 0xfffff8800c30af70 : 0xfffff88000cad228 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad228)"
0xfffff8800c30ae10 : 0xfffff8800c30af38 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30ae38 : 0xfffff8800c30af28 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30ae70 : 0xfffff8800c30af30 : 0xfffff88000cad0cc : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad0cc)"
0xfffff8800c30aee8 : 0xfffff8000350e0a0 : nt!IopSynchronousServiceTail
0xfffff8800c30aef8 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30af00 : 0xfffff800034a55e8 : "nt!BBTBuffer <PERF> (nt+0x2925e8)"
0xfffff8800c30af08 : 0xfffff88009bf5000 : gdrv2
0xfffff8800c30af18 : 0xfffff88009bf5000 : gdrv2
0xfffff8800c30af28 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30af30 : 0xfffff88000cad0cc : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad0cc)"
0xfffff8800c30af38 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30af40 : 0xfffff88000cad090 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad090)"
0xfffff8800c30af48 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30af50 : 0xfffff88000cad564 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad564)"
0xfffff8800c30af58 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30af60 : 0xfffff88000cad258 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad258)"
0xfffff8800c30af68 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30af70 : 0xfffff88000cad228 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad228)"
0xfffff8800c30af78 : 0xfffff88000c00000 : Wdf01000!_osfile
0xfffff8800c30af80 : 0xfffff88000cad234 : "Wdf01000!gbl_errno <PERF> (Wdf01000+0xad234)"
0xfffff8800c30af88 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30af90 : 0xfffff8000349a50c : "nt!BBTBuffer <PERF> (nt+0x28750c)"
0xfffff8800c30af98 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30afa0 : 0xfffff800034aa904 : "nt!BBTBuffer <PERF> (nt+0x297904)"
0xfffff8800c30afa8 : 0xfffff80003213000 : "nt!_imp_CiInitialize <PERF> (nt+0x0)"
0xfffff8800c30afb0 : 0xfffff8000349d458 : "nt!BBTBuffer <PERF> (nt+0x28a458)"
0xfffff8800c30b008 : 0xfffff8000326c5c2 : nt!RtlRaiseStatus+0x4e
0xfffff8800c30b018 : 0xfffff8800c30b0d0 : 0xfffff800036c2340 : nt!CmpParseKey
0xfffff8800c30b040 : 0xfffff8000326c58c : nt!RtlRaiseStatus+0x18
0xfffff8800c30b088 : 0xfffff80003509ce0 : nt!ObpLookupDirectoryEntry+0x150
0xfffff8800c30b0b8 : 0xfffff800036c2340 : nt!CmpParseKey
0xfffff8800c30b0d0 : 0xfffff800036c2340 : nt!CmpParseKey
0xfffff8800c30b0d8 : 0xfffff80003620a2f : nt!ObpLookupObjectName+0x79f
0xfffff8800c30b0f8 : 0xfffff880010fb900 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x310
0xfffff8800c30b150 : 0xfffff8800c30b0d0 : 0xfffff800036c2340 : nt!CmpParseKey
0xfffff8800c30b198 : 0xfffff800033f7be0 : nt!KiInitialPCR+0xbe0
0xfffff8800c30b1c8 : 0xfffff8000326c58c : nt!RtlRaiseStatus+0x18
0xfffff8800c30b1d8 : 0xfffff8000350d941 : nt!ObOpenObjectByName+0x531
0xfffff8800c30b3a8 : 0xfffff800033ec10e : nt!ExAllocatePoolWithTag+0xfe
0xfffff8800c30b3b8 : 0xfffff880011011d8 : fltmgr!FltpCompleteCompletionNode+0x48
0xfffff8800c30b3c8 : 0xfffff8000323f4fe : nt!SepNormalAccessCheck+0x18e
0xfffff8800c30b430 : 0xfffff8800c30b508 : 0xfffff800035c5a91 : nt!MiFindEmptyAddressRangeInTree+0xa1
0xfffff8800c30b458 : 0xfffff8000323f984 : nt!SepAccessCheck+0x274
0xfffff8800c30b498 : 0xfffff800032849eb : nt!MiInsertIoSpaceMap+0x2d7
0xfffff8800c30b4a8 : 0xfffff80003436750 : nt!MmUnusedIoHeader
0xfffff8800c30b4b8 : 0xfffff800033ec10e : nt!ExAllocatePoolWithTag+0xfe
0xfffff8800c30b4f8 : 0xfffff800033eceed : nt!ExFreePoolWithTag+0x22d
0xfffff8800c30b508 : 0xfffff800035c5a91 : nt!MiFindEmptyAddressRangeInTree+0xa1
0xfffff8800c30b5a8 : 0xfffff80003609639 : nt!MiMapLockedPagesInUserSpace+0x549
0xfffff8800c30b678 : 0xfffff88000c099da : Wdf01000!FxDevice::Dispatch+0x19a
0xfffff8800c30b6e8 : 0xfffff88000c05f98 : Wdf01000!FxIoQueue::DispatchRequestToDriver+0x488
0xfffff8800c30b728 : 0xfffff88000c08556 : Wdf01000!FxIoQueue::CanThreadDispatchEventsLocked+0x8a
0xfffff8800c30b748 : 0xfffff88000c98d40 : Wdf01000!WPP_FxIoQueue_cpp_Traceguids
0xfffff8800c30b768 : 0xfffff88000c0544f : Wdf01000!FxIoQueue::DispatchEvents+0x66f
0xfffff8800c30b798 : 0xfffff88000c0d6e3 : Wdf01000!FxRequest::FxRequest+0x33
0xfffff8800c30b7e8 : 0xfffff88000c1100b : Wdf01000!FxIoQueue::QueueRequest+0x2ab
0xfffff8800c30b858 : 0xfffff88000c0a30a : Wdf01000!FxPkgIo::Dispatch+0x4da
0xfffff8800c30b8c8 : 0xfffff88000c099da : Wdf01000!FxDevice::Dispatch+0x19a
0xfffff8800c30b908 : 0xfffff88000c09aa6 : Wdf01000!FxDevice::DispatchWithLock+0xa6
0xfffff8800c30b948 : 0xfffff8000350e19a : nt!IopSynchronousServiceTail+0xfa
0xfffff8800c30b9b8 : 0xfffff800036cc451 : nt!IopXxxControlFile+0xc51
0xfffff8800c30b9d8 : 0xfffff800033f7180 : nt!KiInitialPCR+0x180
0xfffff8800c30baf8 : 0xfffff8000355d4c6 : nt!NtDeviceIoControlFile+0x56
0xfffff8800c30bb68 : 0xfffff800032b4d53 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800c30bbd8 : 0xfffff800032b4d53 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800c30bbe0 : 0xfffffa80093dc950 :  Trap @ fffff8800c30bbe0

0: kd> lmvm gdrv2
Browse full module list
start             end                 module name
fffff880`09bf5000 fffff880`09c00000   gdrv2    T (no symbols)           
    Loaded symbol image file: gdrv2.sys
    Image path: \??\C:\Windows\gdrv2.sys
    Image name: gdrv2.sys
    Browse all global symbols  functions  data
    Timestamp:        Sun Feb 24 22:35:46 2019 (5C738CC2)
    CheckSum:         0001503C
    ImageSize:        0000B000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Gigabyte aorus engine (part of RGB Fusion so check updates in program or visit Utility | Service / Support - GIGABYTE Global)
1. PPM for computer
2. Select "properties"
3. Select "advanced system settings"
4. Under "performance" select "settings"
5. Go to the "advanced" tab and select "change"
6. Check there the first option at the top "automatically manage swap file"
7. Accept the changes and restart the computer
My System SpecsSystem Spec
12 Aug 2019   #3

Windows 7 Ultimate x64

Done and done. Thank you much and I'll report back...
My System SpecsSystem Spec

4 Weeks Ago   #4

Windows 7 Ultimate x64

I performed the 2 suggested fixes and haven't had an error since. The issue appears resolved. Thanks for your help MrPepka!
My System SpecsSystem Spec

 BSOD error 0x0000003B and 0x000000C1 caused by ntoskrnl.exe

Thread Tools

Similar help and support threads
Thread Forum
How do I fix this BSOD? 0x0000001a /0x0000003b caused by ntoskrnl.exe
I am getting this on a daily occurence basis. This only happens once upon cold booting per day usually And also caused by dxgkrnl.sys, error MEMORY_MANAGEMENT This looks like a video related issue to me ? What should I do ? I am using a Gigabyte ATI Radeon 5870 and pretty sure drivers...
BSOD Help and Support
BSOD randomly, error 0x0000003b ntoskrnl.exe+71f00
Hey there, Thanks in advance for the read and the support but for the life of me I cant find out what's causing this. I recebtly built a custom rig and everything ran fine until I installed assassins creed V. The only thing I can think of is maybe Direct x11 is causing this? I've...
BSOD Help and Support
ntoskrnl.exe BSOD error 0x0000003b when gaming
Hello, I have been having this BSOD for about half a year now and I don't know why it is happening. It always happens when I'm gaming, not any other time, it recently happened during Deus Ex and before that a varied amount of times with games like Jagged Alliance 2 and Dark Messiah. The good...
BSOD Help and Support
Random BSOD error 0x0000003B ntoskrnl.exe
Hello :) I am having random BSOD issues, just recently i download blue screen view and at the top of the list it has ntoskrnl.exe that seemed to be causing the issue. I will upload the minidump file if that makes things easier, besides that i don't know much else to report on, help is...
BSOD Help and Support
BSOD(ntoskrnl.exe+70600) error 0x0000003b
I've had 2 BSODs within 20 minutes of eachother so I decided to fix this right away, the error is SYSTEM_SERVICE_EXCEPTION 0x0000003b ntoskrnl.exe+70600 If there is any additional info i need to post I'll try to get it I've neve rhad one of these, im currently running in safe mode though...
BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 21:36.
Twitter Facebook