tcpip.sys Driver_IRQL_NOT_LESS_OR_EQUAL blue screen error
Interesting. Being it is always the same file, I would assume a corrupt driver--which it still may be. Nonetheless, one thing we will want to rule out is bad memory. A lot of BSODs can be traced to bad memory sticks. Windows 7 has a built-in rudimentary memory checker. Boot with a Windows 7 DVD. At the first screen, hit <SHIFT>+<F10>. You will see that you are at x:\Sources>. CD into Recovery (cd recovery). Type RecEnv.exe, click Next. Select the top radio button that reads, "Use recovery tools . . . ." Select Windows Memory Diagnostic and chose the restart now option. However, for a more thorough check, head over to http://www.memtest.org/ and download the latest version. Burn the ISO to a disk or make a bootable USB drive. Boot and follow the on-screen instructions. A not-so-nice screen of failed memory.
January 26th, 2012 3:04am

I have an HP Pavilion dv7 Notebook PC; 64-bit, Windows 7; Intel Core i7 CPU Q720@1.60GHz I am regularly getting blue screen DRIVER_IRQL_NOT_LESS_OR_EQUAL with tcpip.sys mention. Please see Minidump.zips here: https://skydrive.live.com/#cid=42B07EA20D0FCE3B&id=42B07EA20D0FCE3B%21107 I tried to open/view these dmp files, but I am unable. Any idea what might be causing this issue? Recent software updates: Pentaho PDI (Kettle ETL), PC Tools Spyware/Antivirus/Firewall, WinSCP, ToirtoiseSVN, regular Windows updates, HP Wireless Printer (drivers)
Free Windows Admin Tool Kit Click here and download it now
January 26th, 2012 11:45am

With it being the same file each time, check to make sure it is the proper Microsoft version. The file and product version from a fully updated Windows 7 Enterprise SP1 64bit is 6.1.7601.17697.
January 26th, 2012 12:11pm

Thank you, Darien, for the quick response. You mention to check that "it is the proper Microsoft version." What do you refer to as "it"? I am not sure what to check or how to check it. Thanks!
Free Windows Admin Tool Kit Click here and download it now
January 26th, 2012 1:40pm

MiniDump files: https://skydrive.live.com/#cid=42B07EA20D0FCE3B&id=42B07EA20D0FCE3B%21107&sc=documents
January 26th, 2012 2:26pm

Navigate to c:\windows\system32\drivers. Right-click the TCPIP.SYS file and look at the details tab. The image below shows one from the Windows 8 DevPreview. The version you want to see is 6.1.7601.17697.
Free Windows Admin Tool Kit Click here and download it now
January 26th, 2012 3:40pm

Looks like I have the correct/latest file version: 6.1.7601.17697 Any other ideas/recommendations? Thanks!
January 26th, 2012 3:53pm

Interesting. Being it is always the same file, I would assume a corrupt driver--which it still may be. Nonetheless, one thing we will want to rule out is bad memory. A lot of BSODs can be traced to bad memory sticks. Windows 7 has a built-in rudimentary memory checker. Boot with a Windows 7 DVD. At the first screen, hit <SHIFT>+<F10>. You will see that you are at x:\Sources>. CD into Recovery (cd recovery). Type RecEnv.exe, click Next. Select the top radio button that reads, "Use recovery tools . . . ." Select Windows Memory Diagnostic and chose the restart now option. However, for a more thorough check, head over to http://www.memtest.org/ and download the latest version. Burn the ISO to a disk or make a bootable USB drive. Boot and follow the on-screen instructions. A not-so-nice screen of failed memory.
Free Windows Admin Tool Kit Click here and download it now
January 26th, 2012 6:47pm

My computer passed 100% on the Memory Test - no memory failing. What should I try next? Is there an easy way to read/interpret the minidump files? Thanks~
February 6th, 2012 5:54pm

My computer passed 100% on the Memory Test - no memory failing. What should I try next? Thanks~
Free Windows Admin Tool Kit Click here and download it now
February 9th, 2012 9:41am

This problem continues to persist. Every 1-2 days, I crash with the same error. I have verified it is not a memory issue. But I do not know what to check next. Can anyone point me in the right direction? What should I try next?
February 17th, 2012 12:40pm

******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000001c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88001cae87e, address which referenced memory Debugging Details: ------------------ Unable to load image pctNdis64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pctNdis64.sys *** ERROR: Module load completed but symbols could not be loaded for pctNdis64.sys Unable to load image NETwNs64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for NETwNs64.sys *** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003112100 000000000000001c CURRENT_IRQL: 2 FAULTING_IP: tcpip!TcpBeginTcbSend+33e fffff880`01cae87e f083401c01 lock add dword ptr [rax+1Ch],1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff8800358aaa0 -- (.trap 0xfffff8800358aaa0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80111e0aa0 rdx=fffffa80111e0b58 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001cae87e rsp=fffff8800358ac30 rbp=fffff8800358ad40 r8=fffffa80111e0a90 r9=fffffa80111e0aa0 r10=fffffa80111e09d0 r11=fffff8800358ae20 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc tcpip!TcpBeginTcbSend+0x33e: fffff880`01cae87e f083401c01 lock add dword ptr [rax+1Ch],1 ds:0002:00000000`0000001c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002edf1e9 to fffff80002edfc40 STACK_TEXT: fffff880`0358a958 fffff800`02edf1e9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`0358a960 fffff800`02edde60 : fffff880`0358ab40 fffffa80`0a7df5d0 fffffa80`0d03aa10 00000000`00000001 : nt!KiBugCheckDispatch+0x69 fffff880`0358aaa0 fffff880`01cae87e : 00000000`00000001 fffffa80`157dd4e0 fffffa80`00000000 fffffa80`111e0b58 : nt!KiPageFault+0x260 fffff880`0358ac30 fffff880`01cb2b29 : ffff0000`02834cde ffff0000`02834cee fffffa80`16470000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e fffff880`0358aeb0 fffff880`01cced66 : 00000000`00000000 fffffa80`157dd401 fffff880`01dbe128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9 fffff880`0358b130 fffff880`01cae325 : fffff880`06c3f000 00000000`00000000 00000000`00000000 fffff880`0358b400 : tcpip!TcpFlushDelay+0x316 fffff880`0358b210 fffff880`01ca51c7 : fffffa80`07c70980 fffffa80`07dc29c1 fffffa80`00008b00 00000000`00008b00 : tcpip!TcpPreValidatedReceive+0x3e5 fffff880`0358b2e0 fffff880`01ca4d3a : 00000000`00000000 fffff880`01dc49a0 fffff880`0358b4a0 fffffa80`1377d990 : tcpip!IppDeliverListToProtocol+0x97 fffff880`0358b3a0 fffff880`01ca4339 : fffff880`01dc49a0 fffffa80`148e1900 fffff880`0358b4a0 fffff880`0358b490 : tcpip!IppProcessDeliverList+0x5a fffff880`0358b440 fffff880`01ca20af : 00000000`ff01a8c0 fffffa80`07d9e000 fffff880`01dc49a0 00000000`11088701 : tcpip!IppReceiveHeaderBatch+0x23a fffff880`0358b520 fffff880`01ca16a2 : fffffa80`15d542c0 00000000`00000000 fffffa80`11088701 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f fffff880`0358b720 fffff880`01ca0b3a : fffffa80`11088700 fffff880`0358b850 fffffa80`11088700 fffff880`10010000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2 fffff880`0358b800 fffff800`02eec618 : fffffa80`148e1880 00000000`00004800 fffff880`0356f0c0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda fffff880`0358b850 fffff880`01ca1202 : fffff880`01ca0a60 fffff880`01dc0000 fffff880`0358b902 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8 fffff880`0358b930 fffff880`01b460eb : fffffa80`0c1268d0 00000000`00000000 fffffa80`0aafe1a0 fffffa80`0aafe1a0 : tcpip!FlReceiveNetBufferListChain+0xb2 fffff880`0358b9a0 fffff880`01b0fad6 : fffff880`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb fffff880`0358ba10 fffff880`01a919c4 : fffffa80`0aafe1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6 fffff880`0358be90 fffff880`01b46bb5 : 00000000`00000001 fffffa80`00000000 fffffa80`0aafe1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24 fffff880`0358bed0 fffff880`00c99c5e : fffffa80`138d4b00 fffffa80`0ac000c0 fffff880`00000001 00000000`00000001 : ndis!ndisMIndicatePacketsToNetBufferLists+0x105 fffff880`0358bf70 fffffa80`138d4b00 : fffffa80`0ac000c0 fffff880`00000001 00000000`00000001 fffffa80`1208a8d0 : pctNdis64+0xcc5e fffff880`0358bf78 fffffa80`0ac000c0 : fffff880`00000001 00000000`00000001 fffffa80`1208a8d0 fffff880`01b4fafc : 0xfffffa80`138d4b00 fffff880`0358bf80 fffff880`00000001 : 00000000`00000001 fffffa80`1208a8d0 fffff880`01b4fafc fffff880`00000000 : 0xfffffa80`0ac000c0 fffff880`0358bf88 00000000`00000001 : fffffa80`1208a8d0 fffff880`01b4fafc fffff880`00000000 fffffa80`138d4ba0 : 0xfffff880`00000001 fffff880`0358bf90 fffffa80`1208a8d0 : fffff880`01b4fafc fffff880`00000000 fffffa80`138d4ba0 fffffa80`1208a010 : 0x1 fffff880`0358bf98 fffff880`01b4fafc : fffff880`00000000 fffffa80`138d4ba0 fffffa80`1208a010 fffffa80`1667dcb0 : 0xfffffa80`1208a8d0 fffff880`0358bfa0 fffff880`01b0fbfb : fffffa80`0a9ed1a0 fffff880`0358c3b0 00000000`00000001 00000000`00000000 : ndis! ?? ::DELBPBOK::`string'+0x404 fffff880`0358c070 fffff880`01a919c4 : fffffa80`0a9ed1a0 fffffa80`0c46d000 00000000`00000001 fffffa80`0c46d030 : ndis!ndisMDispatchReceiveNetBufferLists+0x2fb fffff880`0358c4f0 fffff880`01a91939 : 00000000`00000000 00000000`00000000 fffffa80`0c0da020 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24 fffff880`0358c530 fffff880`01a918d0 : fffff880`04d6b5c0 fffffa80`0be9f010 fffffa80`0c0da020 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff880`0358c570 fffff880`04d347ee : fffffa80`0be9f010 00000000`00000000 fffffa80`0c46d030 fffff880`04d6b5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff880`0358c5b0 fffff880`01a91939 : fffffa80`0b1e6080 00000000`00000000 00000000`00000001 fffffa80`0ab7ead0 : nwifi!Pt6Receive+0x296 fffff880`0358c610 fffff880`01a918d0 : 00000000`00000001 fffff880`045f00bc fffffa80`0b4d0328 fffff880`05c8840f : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff880`0358c650 fffff880`045ec9c0 : fffff880`045f3110 00000000`00000001 00000000`00000001 fffffa80`0b4d0d78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff880`0358c690 fffff880`01aaa4f7 : fffffa80`0a9ed1a0 fffffa80`0c6b5630 fffffa80`0c6b5630 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158 fffff880`0358c6f0 fffff880`05c7ccdf : fffffa80`0ab69010 00000000`00000001 fffffa80`0c6b5630 00000000`00000001 : ndis! ?? ::FNODOBFM::`string'+0xcf1f fffff880`0358c740 fffffa80`0ab69010 : 00000000`00000001 fffffa80`0c6b5630 00000000`00000001 fffff880`00000001 : NETwNs64+0xccdf fffff880`0358c748 00000000`00000001 : fffffa80`0c6b5630 00000000`00000001 fffff880`00000001 00000000`0000001a : 0xfffffa80`0ab69010 fffff880`0358c750 fffffa80`0c6b5630 : 00000000`00000001 fffff880`00000001 00000000`0000001a fffffa80`00000001 : 0x1 fffff880`0358c758 00000000`00000001 : fffff880`00000001 00000000`0000001a fffffa80`00000001 fffffa80`0aa93870 : 0xfffffa80`0c6b5630 fffff880`0358c760 fffff880`00000001 : 00000000`0000001a fffffa80`00000001 fffffa80`0aa93870 fffffa80`1254b638 : 0x1 fffff880`0358c768 00000000`0000001a : fffffa80`00000001 fffffa80`0aa93870 fffffa80`1254b638 fffffa80`1254b520 : 0xfffff880`00000001 fffff880`0358c770 fffffa80`00000001 : fffffa80`0aa93870 fffffa80`1254b638 fffffa80`1254b520 00000000`00000000 : 0x1a fffff880`0358c778 fffffa80`0aa93870 : fffffa80`1254b638 fffffa80`1254b520 00000000`00000000 fffff880`05e65a08 : 0xfffffa80`00000001 fffff880`0358c780 fffffa80`1254b638 : fffffa80`1254b520 00000000`00000000 fffff880`05e65a08 fffffa80`0c6b5630 : 0xfffffa80`0aa93870 fffff880`0358c788 fffffa80`1254b520 : 00000000`00000000 fffff880`05e65a08 fffffa80`0c6b5630 00000000`00000001 : 0xfffffa80`1254b638 fffff880`0358c790 00000000`00000000 : fffff880`05e65a08 fffffa80`0c6b5630 00000000`00000001 00000000`00000000 : 0xfffffa80`1254b520 STACK_COMMAND: kb FOLLOWUP_IP: pctNdis64+cc5e fffff880`00c99c5e ?? ??? SYMBOL_STACK_INDEX: 13 SYMBOL_NAME: pctNdis64+cc5e FOLLOWUP_NAME: MachineOwner MODULE_NAME: pctNdis64 IMAGE_NAME: pctNdis64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4c34f39a FAILURE_BUCKET_ID: X64_0xD1_pctNdis64+cc5e BUCKET_ID: X64_0xD1_pctNdis64+cc5e Followup: MachineOwner --------- 2: kd> lmvm pctNdis64 start end module name fffff880`00c8d000 fffff880`00ca3000 pctNdis64 T (no symbols) Loaded symbol image file: pctNdis64.sys Image path: pctNdis64.sys Image name: pctNdis64.sys Timestamp: Wed Jul 07 22:37:30 2010 (4C34F39A) CheckSum: 0001D422 ImageSize: 00016000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 ----------------------------------------------------------------------------- Bug Check Code 0xD1: http://msdn.microsoft.com/en-us/library/windows/hardware/ff560244%28v=vs.85%29.aspx Your BSOD was caused by pctNdis64.sys driver. Please update it and check results. If this does not help then disable all security softwares you have and check results. This posting is provided "AS IS" with no warranties or guarantees , and confers no rights. Microsoft Student Partner 2010 / 2011 Microsoft Certified Professional Microsoft Certified Systems Administrator: Security Microsoft Certified Systems Engineer: Security Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows 7, Configuring Microsoft Certified Technology Specialist: Designing and Providing Volume Licensing Solutions to Large Organizations Microsoft Certified IT Professional: Enterprise Administrator Microsoft Certified IT Professional: Server Administrator Microsoft Certified Trainer
Free Windows Admin Tool Kit Click here and download it now
February 18th, 2012 2:45pm

******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000001c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88001cae87e, address which referenced memory Debugging Details: ------------------ Unable to load image pctNdis64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pctNdis64.sys *** ERROR: Module load completed but symbols could not be loaded for pctNdis64.sys Unable to load image NETwNs64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for NETwNs64.sys *** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003112100 000000000000001c CURRENT_IRQL: 2 FAULTING_IP: tcpip!TcpBeginTcbSend+33e fffff880`01cae87e f083401c01 lock add dword ptr [rax+1Ch],1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff8800358aaa0 -- (.trap 0xfffff8800358aaa0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80111e0aa0 rdx=fffffa80111e0b58 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001cae87e rsp=fffff8800358ac30 rbp=fffff8800358ad40 r8=fffffa80111e0a90 r9=fffffa80111e0aa0 r10=fffffa80111e09d0 r11=fffff8800358ae20 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc tcpip!TcpBeginTcbSend+0x33e: fffff880`01cae87e f083401c01 lock add dword ptr [rax+1Ch],1 ds:0002:00000000`0000001c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002edf1e9 to fffff80002edfc40 STACK_TEXT: fffff880`0358a958 fffff800`02edf1e9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`0358a960 fffff800`02edde60 : fffff880`0358ab40 fffffa80`0a7df5d0 fffffa80`0d03aa10 00000000`00000001 : nt!KiBugCheckDispatch+0x69 fffff880`0358aaa0 fffff880`01cae87e : 00000000`00000001 fffffa80`157dd4e0 fffffa80`00000000 fffffa80`111e0b58 : nt!KiPageFault+0x260 fffff880`0358ac30 fffff880`01cb2b29 : ffff0000`02834cde ffff0000`02834cee fffffa80`16470000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e fffff880`0358aeb0 fffff880`01cced66 : 00000000`00000000 fffffa80`157dd401 fffff880`01dbe128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9 fffff880`0358b130 fffff880`01cae325 : fffff880`06c3f000 00000000`00000000 00000000`00000000 fffff880`0358b400 : tcpip!TcpFlushDelay+0x316 fffff880`0358b210 fffff880`01ca51c7 : fffffa80`07c70980 fffffa80`07dc29c1 fffffa80`00008b00 00000000`00008b00 : tcpip!TcpPreValidatedReceive+0x3e5 fffff880`0358b2e0 fffff880`01ca4d3a : 00000000`00000000 fffff880`01dc49a0 fffff880`0358b4a0 fffffa80`1377d990 : tcpip!IppDeliverListToProtocol+0x97 fffff880`0358b3a0 fffff880`01ca4339 : fffff880`01dc49a0 fffffa80`148e1900 fffff880`0358b4a0 fffff880`0358b490 : tcpip!IppProcessDeliverList+0x5a fffff880`0358b440 fffff880`01ca20af : 00000000`ff01a8c0 fffffa80`07d9e000 fffff880`01dc49a0 00000000`11088701 : tcpip!IppReceiveHeaderBatch+0x23a fffff880`0358b520 fffff880`01ca16a2 : fffffa80`15d542c0 00000000`00000000 fffffa80`11088701 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f fffff880`0358b720 fffff880`01ca0b3a : fffffa80`11088700 fffff880`0358b850 fffffa80`11088700 fffff880`10010000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2 fffff880`0358b800 fffff800`02eec618 : fffffa80`148e1880 00000000`00004800 fffff880`0356f0c0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda fffff880`0358b850 fffff880`01ca1202 : fffff880`01ca0a60 fffff880`01dc0000 fffff880`0358b902 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8 fffff880`0358b930 fffff880`01b460eb : fffffa80`0c1268d0 00000000`00000000 fffffa80`0aafe1a0 fffffa80`0aafe1a0 : tcpip!FlReceiveNetBufferListChain+0xb2 fffff880`0358b9a0 fffff880`01b0fad6 : fffff880`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb fffff880`0358ba10 fffff880`01a919c4 : fffffa80`0aafe1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6 fffff880`0358be90 fffff880`01b46bb5 : 00000000`00000001 fffffa80`00000000 fffffa80`0aafe1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24 fffff880`0358bed0 fffff880`00c99c5e : fffffa80`138d4b00 fffffa80`0ac000c0 fffff880`00000001 00000000`00000001 : ndis!ndisMIndicatePacketsToNetBufferLists+0x105 fffff880`0358bf70 fffffa80`138d4b00 : fffffa80`0ac000c0 fffff880`00000001 00000000`00000001 fffffa80`1208a8d0 : pctNdis64+0xcc5e fffff880`0358bf78 fffffa80`0ac000c0 : fffff880`00000001 00000000`00000001 fffffa80`1208a8d0 fffff880`01b4fafc : 0xfffffa80`138d4b00 fffff880`0358bf80 fffff880`00000001 : 00000000`00000001 fffffa80`1208a8d0 fffff880`01b4fafc fffff880`00000000 : 0xfffffa80`0ac000c0 fffff880`0358bf88 00000000`00000001 : fffffa80`1208a8d0 fffff880`01b4fafc fffff880`00000000 fffffa80`138d4ba0 : 0xfffff880`00000001 fffff880`0358bf90 fffffa80`1208a8d0 : fffff880`01b4fafc fffff880`00000000 fffffa80`138d4ba0 fffffa80`1208a010 : 0x1 fffff880`0358bf98 fffff880`01b4fafc : fffff880`00000000 fffffa80`138d4ba0 fffffa80`1208a010 fffffa80`1667dcb0 : 0xfffffa80`1208a8d0 fffff880`0358bfa0 fffff880`01b0fbfb : fffffa80`0a9ed1a0 fffff880`0358c3b0 00000000`00000001 00000000`00000000 : ndis! ?? ::DELBPBOK::`string'+0x404 fffff880`0358c070 fffff880`01a919c4 : fffffa80`0a9ed1a0 fffffa80`0c46d000 00000000`00000001 fffffa80`0c46d030 : ndis!ndisMDispatchReceiveNetBufferLists+0x2fb fffff880`0358c4f0 fffff880`01a91939 : 00000000`00000000 00000000`00000000 fffffa80`0c0da020 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24 fffff880`0358c530 fffff880`01a918d0 : fffff880`04d6b5c0 fffffa80`0be9f010 fffffa80`0c0da020 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff880`0358c570 fffff880`04d347ee : fffffa80`0be9f010 00000000`00000000 fffffa80`0c46d030 fffff880`04d6b5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff880`0358c5b0 fffff880`01a91939 : fffffa80`0b1e6080 00000000`00000000 00000000`00000001 fffffa80`0ab7ead0 : nwifi!Pt6Receive+0x296 fffff880`0358c610 fffff880`01a918d0 : 00000000`00000001 fffff880`045f00bc fffffa80`0b4d0328 fffff880`05c8840f : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff880`0358c650 fffff880`045ec9c0 : fffff880`045f3110 00000000`00000001 00000000`00000001 fffffa80`0b4d0d78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff880`0358c690 fffff880`01aaa4f7 : fffffa80`0a9ed1a0 fffffa80`0c6b5630 fffffa80`0c6b5630 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158 fffff880`0358c6f0 fffff880`05c7ccdf : fffffa80`0ab69010 00000000`00000001 fffffa80`0c6b5630 00000000`00000001 : ndis! ?? ::FNODOBFM::`string'+0xcf1f fffff880`0358c740 fffffa80`0ab69010 : 00000000`00000001 fffffa80`0c6b5630 00000000`00000001 fffff880`00000001 : NETwNs64+0xccdf fffff880`0358c748 00000000`00000001 : fffffa80`0c6b5630 00000000`00000001 fffff880`00000001 00000000`0000001a : 0xfffffa80`0ab69010 fffff880`0358c750 fffffa80`0c6b5630 : 00000000`00000001 fffff880`00000001 00000000`0000001a fffffa80`00000001 : 0x1 fffff880`0358c758 00000000`00000001 : fffff880`00000001 00000000`0000001a fffffa80`00000001 fffffa80`0aa93870 : 0xfffffa80`0c6b5630 fffff880`0358c760 fffff880`00000001 : 00000000`0000001a fffffa80`00000001 fffffa80`0aa93870 fffffa80`1254b638 : 0x1 fffff880`0358c768 00000000`0000001a : fffffa80`00000001 fffffa80`0aa93870 fffffa80`1254b638 fffffa80`1254b520 : 0xfffff880`00000001 fffff880`0358c770 fffffa80`00000001 : fffffa80`0aa93870 fffffa80`1254b638 fffffa80`1254b520 00000000`00000000 : 0x1a fffff880`0358c778 fffffa80`0aa93870 : fffffa80`1254b638 fffffa80`1254b520 00000000`00000000 fffff880`05e65a08 : 0xfffffa80`00000001 fffff880`0358c780 fffffa80`1254b638 : fffffa80`1254b520 00000000`00000000 fffff880`05e65a08 fffffa80`0c6b5630 : 0xfffffa80`0aa93870 fffff880`0358c788 fffffa80`1254b520 : 00000000`00000000 fffff880`05e65a08 fffffa80`0c6b5630 00000000`00000001 : 0xfffffa80`1254b638 fffff880`0358c790 00000000`00000000 : fffff880`05e65a08 fffffa80`0c6b5630 00000000`00000001 00000000`00000000 : 0xfffffa80`1254b520 STACK_COMMAND: kb FOLLOWUP_IP: pctNdis64+cc5e fffff880`00c99c5e ?? ??? SYMBOL_STACK_INDEX: 13 SYMBOL_NAME: pctNdis64+cc5e FOLLOWUP_NAME: MachineOwner MODULE_NAME: pctNdis64 IMAGE_NAME: pctNdis64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4c34f39a FAILURE_BUCKET_ID: X64_0xD1_pctNdis64+cc5e BUCKET_ID: X64_0xD1_pctNdis64+cc5e Followup: MachineOwner --------- 2: kd> lmvm pctNdis64 start end module name fffff880`00c8d000 fffff880`00ca3000 pctNdis64 T (no symbols) Loaded symbol image file: pctNdis64.sys Image path: pctNdis64.sys Image name: pctNdis64.sys Timestamp: Wed Jul 07 22:37:30 2010 (4C34F39A) CheckSum: 0001D422 ImageSize: 00016000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 ----------------------------------------------------------------------------- Bug Check Code 0xD1: Your BSOD was caused by pctNdis64.sys driver. Please update it and check results. If this does not help then disable all security softwares you have and check results. This posting is provided "AS IS" with no warranties or guarantees , and confers no rights. Microsoft Student Partner 2010 / 2011 Microsoft Certified Professional Microsoft Certified Systems Administrator: Security Microsoft Certified Systems Engineer: Security Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows 7, Configuring Microsoft Certified Technology Specialist: Designing and Providing Volume Licensing Solutions to Large Organizations Microsoft Certified IT Professional: Enterprise Administrator Microsoft Certified IT Professional: Server Administrator Microsoft Certified Trainer
February 19th, 2012 6:34am

Mr X said: "Uninstall PC Tools Internet Security" ;)
Free Windows Admin Tool Kit Click here and download it now
February 19th, 2012 7:16pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics