Mavi Ekran Hatası Acil Yardım....

Fernando Sucre
22-04-2014, 18:28   |  #1  
OP Taze Üye
Teşekkür Sayısı: 0
1 mesaj
Kayıt Tarihi:Kayıt: Nis 2014

 

Sistem özelliklerini, memory ve minidump crash WinDbg sonuçlarını aşağı yazıyorum. Mavi ekran hatasını herhangi bir işlem üzerine değil tamamen random olarak bazen günde 4-5 sefer bazen 2günde 1 kez alıyorum. Bu sorundan dolayı sistem formatladım bi süre olmadı ama yeniden başladı.. Yardımlarınızı bekliyorum.

___________________________________

Intel i7-3770K CPU @ 3.50GHz

Asus p8z77-v deluxe

Corsair carbide 400r kasa

NVIDIA GeForce GTX 660 2gb 192bit

2x Gskill 8gb ripjawsx ddr3 1333mhz

Corsair h60 sıvı soğutma

Corsair CX750 psu
___________________________________

Memory


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`032456d0
Debug session time: Sun Apr 20 17:32:16.387 2014 (UTC + 3:00)
System Uptime: 0 days 3:56:15.215
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`fffdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {8, 2, 0, fffff88001d45a1d}

Probably caused by : NETIO.SYS ( NETIO!CalloutStreamDataInit+1d )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001d45a1d, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: 0000000000000008

CURRENT_IRQL: 2

FAULTING_IP:
NETIO!CalloutStreamDataInit+1d
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: firefox.exe

TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780
rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990
r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000
r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
NETIO!CalloutStreamDataInit+0x1d:
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0

STACK_TEXT:
fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69
fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260
fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d
fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54
fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48
fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8
fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2
fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238
fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934
fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109
fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249
fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c
fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34
fffff880`0ed26170 fffff880`01e6834b : 00000000`00000000 fffffa80`910a6191 00000000`00004800 c2646641`14ecc960 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42
fffff880`0ed26220 fffff800`03083878 : 00000000`00000000 00000000`00000001 fffffa80`0cd3dc80 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`0ed26250 fffff880`01e6920a : fffff880`01e68330 00000000`00003030 00000000`00002d00 fffff880`04b0f601 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0ed26330 fffff880`04b279cb : fffffa80`15c3d340 fffff880`0ed26b60 00000000`00002dcc fffffa80`15cabdd0 : tcpip!TcpTlConnectionSend+0x7a
fffff880`0ed263a0 fffff880`04b0e469 : 00000000`00000246 00000000`000007ff fffff880`009b3180 fffffa80`122b9201 : afd!AfdFastConnectionSend+0x38b
fffff880`0ed26560 fffff800`03394113 : 00000000`00002dcc fffffa80`0cd97070 00000000`069dfba4 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459
fffff880`0ed268d0 fffff800`03394c06 : 00000000`0000c2a2 00000000`00000248 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
fffff880`0ed26a00 fffff800`03076e53 : 00000000`0000c2a2 fffff960`00122b5a 00000000`00000000 00000000`00b15a90 : nt!NtDeviceIoControlFile+0x56
fffff880`0ed26a70 00000000`75072e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04ffeee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75072e09


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CalloutStreamDataInit+1d
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d

FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001d45a1d, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: 0000000000000008

CURRENT_IRQL: 2

FAULTING_IP:
NETIO!CalloutStreamDataInit+1d
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: firefox.exe

TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780
rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990
r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000
r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
NETIO!CalloutStreamDataInit+0x1d:
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0

STACK_TEXT:
fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69
fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260
fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d
fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54
fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48
fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8
fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2
fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238
fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934
fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109
fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249
fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c
fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34
fffff880`0ed26170 fffff880`01e6834b : 00000000`00000000 fffffa80`910a6191 00000000`00004800 c2646641`14ecc960 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42
fffff880`0ed26220 fffff800`03083878 : 00000000`00000000 00000000`00000001 fffffa80`0cd3dc80 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`0ed26250 fffff880`01e6920a : fffff880`01e68330 00000000`00003030 00000000`00002d00 fffff880`04b0f601 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0ed26330 fffff880`04b279cb : fffffa80`15c3d340 fffff880`0ed26b60 00000000`00002dcc fffffa80`15cabdd0 : tcpip!TcpTlConnectionSend+0x7a
fffff880`0ed263a0 fffff880`04b0e469 : 00000000`00000246 00000000`000007ff fffff880`009b3180 fffffa80`122b9201 : afd!AfdFastConnectionSend+0x38b
fffff880`0ed26560 fffff800`03394113 : 00000000`00002dcc fffffa80`0cd97070 00000000`069dfba4 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459
fffff880`0ed268d0 fffff800`03394c06 : 00000000`0000c2a2 00000000`00000248 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
fffff880`0ed26a00 fffff800`03076e53 : 00000000`0000c2a2 fffff960`00122b5a 00000000`00000000 00000000`00b15a90 : nt!NtDeviceIoControlFile+0x56
fffff880`0ed26a70 00000000`75072e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04ffeee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75072e09


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CalloutStreamDataInit+1d
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d

FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

Followup: MachineOwner
---------

______________________________________________________________________________________________________

Minidump

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\042014-24289-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`032456d0
Debug session time: Sun Apr 20 17:32:16.387 2014 (UTC + 3:00)
System Uptime: 0 days 3:56:15.215
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {8, 2, 0, fffff88001d45a1d}

Probably caused by : NETIO.SYS ( NETIO!CalloutStreamDataInit+1d )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001d45a1d, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032af100
0000000000000008

CURRENT_IRQL: 2

FAULTING_IP:
NETIO!CalloutStreamDataInit+1d
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: firefox.exe

TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780
rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990
r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000
r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
NETIO!CalloutStreamDataInit+0x1d:
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0

STACK_TEXT:
fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69
fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260
fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d
fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54
fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48
fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8
fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2
fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238
fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934
fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109
fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249
fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c
fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34
fffff880`0ed26170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CalloutStreamDataInit+1d
fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d

FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d

Followup: MachineOwner
---------

Not :

Kullandığım programlar :

- Eset NOD32 antivirüs
- Advanced System Care 7.2 Pro
- Auslogics BoostSpeed
- CCleaner
- Adwcleaner
- IObit Malware Fighter
- Driver Booster
- Smart Defrag 3

- Tüm Programlar, Driverlar ve Bios günceldir.

- Memtest ram testi temiz.

okankurubas
27-04-2014, 09:59   |  #2  
okankurubas avatarı
Yıllanmış Üye
Teşekkür Sayısı: 118
1,390 mesaj
Kayıt Tarihi:Kayıt: Nis 2013

Bilgisayar/C:/Windows/Minidump klasörünü rarlayıp buraya upload edin.

okankurubas bu faydalı yanıtı için aşağıdaki 1 kişiden teşekkür aldı... [ Göster ]
murat5038
27-04-2014, 17:47   |  #3  
murat5038 avatarı
Yıllanmış Üye
Teşekkür Sayısı: 680
6,682 mesaj
Kayıt Tarihi:Kayıt: Eki 2012

Okan'a ek olarak Windows 8.1'e geçin, o sistemle win7 kullanmak akılsızcadır. 8.1 yükledikten sonra ethernet driverini güncel olanı yükle ve firefox yerine chrome kullan.

murat5038 bu faydalı yanıtı için aşağıdaki 1 kişiden teşekkür aldı... [ Göster ]