Şimdi Ara

MAVİ EKRAN HATASI NETIO.SYS YARDIM.. [ÇÖZÜLDÜ]

Daha Fazla
Bu Konudaki Kullanıcılar: Daha Az
2 Misafir - 2 Masaüstü
5 sn
2
Cevap
1
Favori
622
Tıklama
Daha Fazla
İstatistik
  • Konu İstatistikleri Yükleniyor
0 oy
Öne Çıkar
Sayfa: 1
Giriş
Mesaj
  • Advanced System care ve tüm iobit ürünlerini kaldırınca düzeldi

    Sistem özelliklerini, memory ve minidump crash WinDbg sonuçlarını aşağı yazıyorum. Mavi ekran hatasını herhangi bir işlem üzerine değil tamamen random olarak 1günde, 2günde 1 kez alıyorum. Bu sorundan dolayı sistem formatladım bi süre olmadı ama yeniden başladı.. Yardımlarınızı bekliyorum.

    ___________________________________

    Intel i7-3770K CPU @ 3.50GHz

    Asus p8z77-v deluxe

    Corsair carbide 400r kasa

    NVIDIA GeForce GTX 660 2gb 192bit

    2x Gskill 8gb ripjawsx ddr3 1333mhz

    Corsair h60 sıvı soğutma

    Corsair CX750 psu
    ___________________________________

    Memory


    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
    Machine Name:
    Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`032456d0
    Debug session time: Sun Apr 20 17:32:16.387 2014 (UTC + 3:00)
    System Uptime: 0 days 3:56:15.215
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00000000`fffdf018). Type ".hh dbgerr001" for details
    Loading unloaded module list
    ......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {8, 2, 0, fffff88001d45a1d}

    Probably caused by : NETIO.SYS ( NETIO!CalloutStreamDataInit+1d )

    Followup: MachineOwner
    ---------

    4: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001d45a1d, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 0000000000000008

    CURRENT_IRQL: 2

    FAULTING_IP:
    NETIO!CalloutStreamDataInit+1d
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0xD1

    PROCESS_NAME: firefox.exe

    TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780
    rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990
    r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000
    r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei ng nz na pe nc
    NETIO!CalloutStreamDataInit+0x1d:
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0

    STACK_TEXT:
    fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69
    fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260
    fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d
    fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54
    fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48
    fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1
    fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8
    fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2
    fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238
    fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934
    fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109
    fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249
    fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c
    fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34
    fffff880`0ed26170 fffff880`01e6834b : 00000000`00000000 fffffa80`910a6191 00000000`00004800 c2646641`14ecc960 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42
    fffff880`0ed26220 fffff800`03083878 : 00000000`00000000 00000000`00000001 fffffa80`0cd3dc80 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
    fffff880`0ed26250 fffff880`01e6920a : fffff880`01e68330 00000000`00003030 00000000`00002d00 fffff880`04b0f601 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`0ed26330 fffff880`04b279cb : fffffa80`15c3d340 fffff880`0ed26b60 00000000`00002dcc fffffa80`15cabdd0 : tcpip!TcpTlConnectionSend+0x7a
    fffff880`0ed263a0 fffff880`04b0e469 : 00000000`00000246 00000000`000007ff fffff880`009b3180 fffffa80`122b9201 : afd!AfdFastConnectionSend+0x38b
    fffff880`0ed26560 fffff800`03394113 : 00000000`00002dcc fffffa80`0cd97070 00000000`069dfba4 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459
    fffff880`0ed268d0 fffff800`03394c06 : 00000000`0000c2a2 00000000`00000248 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
    fffff880`0ed26a00 fffff800`03076e53 : 00000000`0000c2a2 fffff960`00122b5a 00000000`00000000 00000000`00b15a90 : nt!NtDeviceIoControlFile+0x56
    fffff880`0ed26a70 00000000`75072e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`04ffeee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75072e09


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NETIO!CalloutStreamDataInit+1d
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME: NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d

    FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

    BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

    Followup: MachineOwner
    ---------

    4: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001d45a1d, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 0000000000000008

    CURRENT_IRQL: 2

    FAULTING_IP:
    NETIO!CalloutStreamDataInit+1d
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0xD1

    PROCESS_NAME: firefox.exe

    TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780
    rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990
    r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000
    r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei ng nz na pe nc
    NETIO!CalloutStreamDataInit+0x1d:
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0

    STACK_TEXT:
    fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69
    fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260
    fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d
    fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54
    fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48
    fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1
    fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8
    fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2
    fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238
    fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934
    fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109
    fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249
    fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c
    fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34
    fffff880`0ed26170 fffff880`01e6834b : 00000000`00000000 fffffa80`910a6191 00000000`00004800 c2646641`14ecc960 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42
    fffff880`0ed26220 fffff800`03083878 : 00000000`00000000 00000000`00000001 fffffa80`0cd3dc80 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
    fffff880`0ed26250 fffff880`01e6920a : fffff880`01e68330 00000000`00003030 00000000`00002d00 fffff880`04b0f601 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`0ed26330 fffff880`04b279cb : fffffa80`15c3d340 fffff880`0ed26b60 00000000`00002dcc fffffa80`15cabdd0 : tcpip!TcpTlConnectionSend+0x7a
    fffff880`0ed263a0 fffff880`04b0e469 : 00000000`00000246 00000000`000007ff fffff880`009b3180 fffffa80`122b9201 : afd!AfdFastConnectionSend+0x38b
    fffff880`0ed26560 fffff800`03394113 : 00000000`00002dcc fffffa80`0cd97070 00000000`069dfba4 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459
    fffff880`0ed268d0 fffff800`03394c06 : 00000000`0000c2a2 00000000`00000248 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
    fffff880`0ed26a00 fffff800`03076e53 : 00000000`0000c2a2 fffff960`00122b5a 00000000`00000000 00000000`00b15a90 : nt!NtDeviceIoControlFile+0x56
    fffff880`0ed26a70 00000000`75072e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`04ffeee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75072e09


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NETIO!CalloutStreamDataInit+1d
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME: NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d

    FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

    BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

    Followup: MachineOwner
    ---------

    ______________________________________________________________________________________________________

    Minidump

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\042014-24289-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
    Machine Name:
    Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`032456d0
    Debug session time: Sun Apr 20 17:32:16.387 2014 (UTC + 3:00)
    System Uptime: 0 days 3:56:15.215
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {8, 2, 0, fffff88001d45a1d}

    Probably caused by : NETIO.SYS ( NETIO!CalloutStreamDataInit+1d )

    Followup: MachineOwner
    ---------

    4: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001d45a1d, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032af100
    0000000000000008

    CURRENT_IRQL: 2

    FAULTING_IP:
    NETIO!CalloutStreamDataInit+1d
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0xD1

    PROCESS_NAME: firefox.exe

    TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780
    rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990
    r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000
    r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei ng nz na pe nc
    NETIO!CalloutStreamDataInit+0x1d:
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0

    STACK_TEXT:
    fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69
    fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260
    fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d
    fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54
    fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48
    fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1
    fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8
    fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2
    fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238
    fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934
    fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109
    fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249
    fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c
    fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34
    fffff880`0ed26170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NETIO!CalloutStreamDataInit+1d
    fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME: NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d

    FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

    BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

    Followup: MachineOwner
    ---------

    Not :

    Kullandığım programlar :

    - Eset NOD32 antivirüs
    - Advanced System Care 7.2 Pro
    - Auslogics BoostSpeed
    - CCleaner
    - Adwcleaner
    - IObit Malware Fighter
    - Driver Booster
    - Smart Defrag 3

    - Tüm Programlar, Driverlar ve Bios günceldir.

    - Memtest ram testi temiz.



    < Bu mesaj bu kişi tarafından değiştirildi Hyakutaro Ichimonji -- 4 Eylül 2014; 23:39:46 >







  • upupupupupuppupu
  • 
Sayfa: 1
- x
Bildirim
mesajınız kopyalandı (ctrl+v) yapıştırmak istediğiniz yere yapıştırabilirsiniz.