Sistem özelliklerini, memory ve minidump crash WinDbg sonuçlarını aşağı yazıyorum. Mavi ekran hatasını herhangi bir işlem üzerine değil tamamen random olarak bazen günde 4-5 sefer bazen 2günde 1 kez alıyorum. Bu sorundan dolayı sistem formatladım bi süre olmadı ama yeniden başladı.. Yardımlarınızı bekliyorum. 
 
 ___________________________________ 
 
 Intel i7-3770K CPU @ 3.50GHz 
 
 Asus p8z77-v deluxe 
 
 Corsair carbide 400r kasa 
 
 NVIDIA GeForce GTX 660 2gb 192bit 
 
 2x Gskill 8gb ripjawsx ddr3 1333mhz 
 
 Corsair h60 sıvı soğutma 
 
 Corsair CX750 psu 
 ___________________________________ 
 
 Memory 
 
 
 Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 
 Copyright (c) Microsoft Corporation. All rights reserved. 
 
 
 Loading Dump File [C:\Windows\MEMORY.DMP] 
 Kernel Summary Dump File: Only kernel address space is available 
 
 Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols 
 Executable search path is: 
 Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 
 Product: WinNt, suite: TerminalServer SingleUserTS 
 Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532 
 Machine Name: 
 Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`032456d0 
 Debug session time: Sun Apr 20 17:32:16.387 2014 (UTC + 3:00) 
 System Uptime: 0 days 3:56:15.215 
 Loading Kernel Symbols 
 ............................................................... 
 ................................................................ 
 ........................................... 
 Loading User Symbols 
 PEB is paged out (Peb.Ldr = 00000000`fffdf018). Type ".hh dbgerr001" for details 
 Loading unloaded module list 
 ...... 
 ******************************************************************************* 
 * * 
 * Bugcheck Analysis * 
 * * 
 ******************************************************************************* 
 
 Use !analyze -v to get detailed debugging information. 
 
 BugCheck D1, {8, 2, 0, fffff88001d45a1d} 
 
 Probably caused by : NETIO.SYS ( NETIO!CalloutStreamDataInit+1d ) 
 
 Followup: MachineOwner 
 --------- 
 
 4: kd> !analyze -v 
 ******************************************************************************* 
 * * 
 * Bugcheck Analysis * 
 * * 
 ******************************************************************************* 
 
 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) 
 An attempt was made to access a pageable (or completely invalid) address at an 
 interrupt request level (IRQL) that is too high. This is usually 
 caused by drivers using improper addresses. 
 If kernel debugger is available get stack backtrace. 
 Arguments: 
 Arg1: 0000000000000008, memory referenced 
 Arg2: 0000000000000002, IRQL 
 Arg3: 0000000000000000, value 0 = read operation, 1 = write operation 
 Arg4: fffff88001d45a1d, address which referenced memory 
 
 Debugging Details: 
 ------------------ 
 
 
 READ_ADDRESS: 0000000000000008 
 
 CURRENT_IRQL: 2 
 
 FAULTING_IP: 
 NETIO!CalloutStreamDataInit+1d 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] 
 
 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT 
 
 BUGCHECK_STR: 0xD1 
 
 PROCESS_NAME: firefox.exe 
 
 TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320) 
 NOTE: The trap frame does not contain all registers. 
 Some register values may be zeroed or incorrect. 
 rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780 
 rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000 
 rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990 
 r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000 
 r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000 
 r14=0000000000000000 r15=0000000000000000 
 iopl=0 nv up ei ng nz na pe nc 
 NETIO!CalloutStreamDataInit+0x1d: 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=???????????????? 
 Resetting default scope 
 
 LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0 
 
 STACK_TEXT: 
 fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 
 fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69 
 fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260 
 fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d 
 fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54 
 fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48 
 fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1 
 fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8 
 fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2 
 fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238 
 fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934 
 fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109 
 fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249 
 fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c 
 fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34 
 fffff880`0ed26170 fffff880`01e6834b : 00000000`00000000 fffffa80`910a6191 00000000`00004800 c2646641`14ecc960 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42 
 fffff880`0ed26220 fffff800`03083878 : 00000000`00000000 00000000`00000001 fffffa80`0cd3dc80 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b 
 fffff880`0ed26250 fffff880`01e6920a : fffff880`01e68330 00000000`00003030 00000000`00002d00 fffff880`04b0f601 : nt!KeExpandKernelStackAndCalloutEx+0xd8 
 fffff880`0ed26330 fffff880`04b279cb : fffffa80`15c3d340 fffff880`0ed26b60 00000000`00002dcc fffffa80`15cabdd0 : tcpip!TcpTlConnectionSend+0x7a 
 fffff880`0ed263a0 fffff880`04b0e469 : 00000000`00000246 00000000`000007ff fffff880`009b3180 fffffa80`122b9201 : afd!AfdFastConnectionSend+0x38b 
 fffff880`0ed26560 fffff800`03394113 : 00000000`00002dcc fffffa80`0cd97070 00000000`069dfba4 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459 
 fffff880`0ed268d0 fffff800`03394c06 : 00000000`0000c2a2 00000000`00000248 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373 
 fffff880`0ed26a00 fffff800`03076e53 : 00000000`0000c2a2 fffff960`00122b5a 00000000`00000000 00000000`00b15a90 : nt!NtDeviceIoControlFile+0x56 
 fffff880`0ed26a70 00000000`75072e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 
 00000000`04ffeee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75072e09 
 
 
 STACK_COMMAND: kb 
 
 FOLLOWUP_IP: 
 NETIO!CalloutStreamDataInit+1d 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] 
 
 SYMBOL_STACK_INDEX: 3 
 
 SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d 
 
 FOLLOWUP_NAME: MachineOwner 
 
 MODULE_NAME: NETIO 
 
 IMAGE_NAME: NETIO.SYS 
 
 DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d 
 
 FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d 
 
 BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d 
 
 Followup: MachineOwner 
 --------- 
 
 4: kd> !analyze -v 
 ******************************************************************************* 
 * * 
 * Bugcheck Analysis * 
 * * 
 ******************************************************************************* 
 
 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) 
 An attempt was made to access a pageable (or completely invalid) address at an 
 interrupt request level (IRQL) that is too high. This is usually 
 caused by drivers using improper addresses. 
 If kernel debugger is available get stack backtrace. 
 Arguments: 
 Arg1: 0000000000000008, memory referenced 
 Arg2: 0000000000000002, IRQL 
 Arg3: 0000000000000000, value 0 = read operation, 1 = write operation 
 Arg4: fffff88001d45a1d, address which referenced memory 
 
 Debugging Details: 
 ------------------ 
 
 
 READ_ADDRESS: 0000000000000008 
 
 CURRENT_IRQL: 2 
 
 FAULTING_IP: 
 NETIO!CalloutStreamDataInit+1d 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] 
 
 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT 
 
 BUGCHECK_STR: 0xD1 
 
 PROCESS_NAME: firefox.exe 
 
 TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320) 
 NOTE: The trap frame does not contain all registers. 
 Some register values may be zeroed or incorrect. 
 rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780 
 rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000 
 rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990 
 r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000 
 r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000 
 r14=0000000000000000 r15=0000000000000000 
 iopl=0 nv up ei ng nz na pe nc 
 NETIO!CalloutStreamDataInit+0x1d: 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=???????????????? 
 Resetting default scope 
 
 LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0 
 
 STACK_TEXT: 
 fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 
 fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69 
 fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260 
 fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d 
 fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54 
 fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48 
 fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1 
 fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8 
 fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2 
 fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238 
 fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934 
 fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109 
 fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249 
 fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c 
 fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34 
 fffff880`0ed26170 fffff880`01e6834b : 00000000`00000000 fffffa80`910a6191 00000000`00004800 c2646641`14ecc960 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42 
 fffff880`0ed26220 fffff800`03083878 : 00000000`00000000 00000000`00000001 fffffa80`0cd3dc80 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b 
 fffff880`0ed26250 fffff880`01e6920a : fffff880`01e68330 00000000`00003030 00000000`00002d00 fffff880`04b0f601 : nt!KeExpandKernelStackAndCalloutEx+0xd8 
 fffff880`0ed26330 fffff880`04b279cb : fffffa80`15c3d340 fffff880`0ed26b60 00000000`00002dcc fffffa80`15cabdd0 : tcpip!TcpTlConnectionSend+0x7a 
 fffff880`0ed263a0 fffff880`04b0e469 : 00000000`00000246 00000000`000007ff fffff880`009b3180 fffffa80`122b9201 : afd!AfdFastConnectionSend+0x38b 
 fffff880`0ed26560 fffff800`03394113 : 00000000`00002dcc fffffa80`0cd97070 00000000`069dfba4 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459 
 fffff880`0ed268d0 fffff800`03394c06 : 00000000`0000c2a2 00000000`00000248 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373 
 fffff880`0ed26a00 fffff800`03076e53 : 00000000`0000c2a2 fffff960`00122b5a 00000000`00000000 00000000`00b15a90 : nt!NtDeviceIoControlFile+0x56 
 fffff880`0ed26a70 00000000`75072e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 
 00000000`04ffeee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75072e09 
 
 
 STACK_COMMAND: kb 
 
 FOLLOWUP_IP: 
 NETIO!CalloutStreamDataInit+1d 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] 
 
 SYMBOL_STACK_INDEX: 3 
 
 SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d 
 
 FOLLOWUP_NAME: MachineOwner 
 
 MODULE_NAME: NETIO 
 
 IMAGE_NAME: NETIO.SYS 
 
 DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d 
 
 FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d 
 
 BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d 
 
 Followup: MachineOwner 
 --------- 
 
 ______________________________________________________________________________________________________ 
 
 Minidump 
 
 Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 
 Copyright (c) Microsoft Corporation. All rights reserved. 
 
 
 Loading Dump File [C:\Windows\Minidump\042014-24289-01.dmp] 
 Mini Kernel Dump File: Only registers and stack trace are available 
 
 Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols 
 Executable search path is: 
 Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 
 Product: WinNt, suite: TerminalServer SingleUserTS 
 Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532 
 Machine Name: 
 Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`032456d0 
 Debug session time: Sun Apr 20 17:32:16.387 2014 (UTC + 3:00) 
 System Uptime: 0 days 3:56:15.215 
 Loading Kernel Symbols 
 ............................................................... 
 ................................................................ 
 ........................................... 
 Loading User Symbols 
 Loading unloaded module list 
 ...... 
 ******************************************************************************* 
 * * 
 * Bugcheck Analysis * 
 * * 
 ******************************************************************************* 
 
 Use !analyze -v to get detailed debugging information. 
 
 BugCheck D1, {8, 2, 0, fffff88001d45a1d} 
 
 Probably caused by : NETIO.SYS ( NETIO!CalloutStreamDataInit+1d ) 
 
 Followup: MachineOwner 
 --------- 
 
 4: kd> !analyze -v 
 ******************************************************************************* 
 * * 
 * Bugcheck Analysis * 
 * * 
 ******************************************************************************* 
 
 DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) 
 An attempt was made to access a pageable (or completely invalid) address at an 
 interrupt request level (IRQL) that is too high. This is usually 
 caused by drivers using improper addresses. 
 If kernel debugger is available get stack backtrace. 
 Arguments: 
 Arg1: 0000000000000008, memory referenced 
 Arg2: 0000000000000002, IRQL 
 Arg3: 0000000000000000, value 0 = read operation, 1 = write operation 
 Arg4: fffff88001d45a1d, address which referenced memory 
 
 Debugging Details: 
 ------------------ 
 
 
 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032af100 
 0000000000000008 
 
 CURRENT_IRQL: 2 
 
 FAULTING_IP: 
 NETIO!CalloutStreamDataInit+1d 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] 
 
 CUSTOMER_CRASH_COUNT: 1 
 
 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT 
 
 BUGCHECK_STR: 0xD1 
 
 PROCESS_NAME: firefox.exe 
 
 TRAP_FRAME: fffff8800ed25320 -- (.trap 0xfffff8800ed25320) 
 NOTE: The trap frame does not contain all registers. 
 Some register values may be zeroed or incorrect. 
 rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800cf13780 
 rdx=fffffa8012f0c9c0 rsi=0000000000000000 rdi=0000000000000000 
 rip=fffff88001d45a1d rsp=fffff8800ed254b0 rbp=fffffa8012f0c990 
 r8=fffff8800ed25530 r9=0000000000000000 r10=0000000000000000 
 r11=ffffffffffffd8be r12=0000000000000000 r13=0000000000000000 
 r14=0000000000000000 r15=0000000000000000 
 iopl=0 nv up ei ng nz na pe nc 
 NETIO!CalloutStreamDataInit+0x1d: 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=???????????????? 
 Resetting default scope 
 
 LAST_CONTROL_TRANSFER: from fffff80003077169 to fffff80003077bc0 
 
 STACK_TEXT: 
 fffff880`0ed251d8 fffff800`03077169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 
 fffff880`0ed251e0 fffff800`03075de0 : fffff880`03890180 fffff800`0307d22a fffff880`0ed25400 fffff880`0ed256d0 : nt!KiBugCheckDispatch+0x69 
 fffff880`0ed25320 fffff880`01d45a1d : fffffa80`0cf13818 fffffa80`0cf13810 fffff880`0ed258d0 fffff880`01d4a33e : nt!KiPageFault+0x260 
 fffff880`0ed254b0 fffff880`01d4f0d4 : fffff880`0ed256d0 fffff880`0ed256d0 fffff880`0ed258d0 fffffa80`15a398f0 : NETIO!CalloutStreamDataInit+0x1d 
 fffff880`0ed254f0 fffff880`01d5ae98 : 00000000`00000000 fffff880`0ed258d0 fffff880`0ed25680 fffff880`0ed25708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54 
 fffff880`0ed25590 fffff880`01d5be91 : fffffa80`12f0c990 fffff880`0ed258d0 fffff880`0ed256d0 fffff880`0ed25d30 : NETIO!StreamCalloutProcessData+0x48 
 fffff880`0ed255e0 fffff880`01d5cee8 : fffff880`0ed256d0 fffff880`0ed25d30 fffff880`0ed25801 fffffa80`12f0c990 : NETIO!StreamCalloutProcessingLoop+0xa1 
 fffff880`0ed25670 fffff880`01d3da2a : fffff880`0ed258d0 fffff880`06aa626c 00000000`00000000 fffff880`0ed20014 : NETIO!StreamProcessCallout+0x1e8 
 fffff880`0ed25760 fffff880`01d24f58 : 00000000`00000014 fffff880`0ed25e30 fffffa80`15a39948 fffff880`0ed25d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2 
 fffff880`0ed25880 fffff880`01d265d2 : fffff880`0ed20014 fffff880`0ed25e30 fffff880`0ed25ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238 
 fffff880`0ed25950 fffff880`01d5ff09 : fffff880`0ed26100 fffff880`0ed25e30 fffffa80`00000001 fffff880`0ed25d30 : NETIO!KfdClassify+0x934 
 fffff880`0ed25cc0 fffff880`01d603c9 : fffffa80`15a398f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109 
 fffff880`0ed25de0 fffff880`01d60b0c : fffffa80`1508fe20 fffffa80`15bd2520 fffffa80`15a7ec00 fffffa80`1253d230 : NETIO!StreamCommonInspect+0x249 
 fffff880`0ed260c0 fffff880`01f09ea4 : fffffa80`15a398f0 fffffa80`15a7ecf0 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c 
 fffff880`0ed26140 fffff880`01ec2373 : fffff880`0ed26470 00000000`00000000 fffff880`0ed26360 fffff880`0ed26470 : tcpip!InetInspectSend+0x34 
 fffff880`0ed26170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dc42 
 
 
 STACK_COMMAND: kb 
 
 FOLLOWUP_IP: 
 NETIO!CalloutStreamDataInit+1d 
 fffff880`01d45a1d 488b5808 mov rbx,qword ptr [rax+8] 
 
 SYMBOL_STACK_INDEX: 3 
 
 SYMBOL_NAME: NETIO!CalloutStreamDataInit+1d 
 
 FOLLOWUP_NAME: MachineOwner 
 
 MODULE_NAME: NETIO 
 
 IMAGE_NAME: NETIO.SYS 
 
 DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d 
 
 FAILURE_BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d 
 
 BUCKET_ID: X64_0xD1_NETIO!CalloutStreamDataInit+1d 
 
 Followup: MachineOwner 
 --------- 
 
 Not : 
 
 Kullandığım programlar : 
 
 - Eset NOD32 antivirüs 
 - Advanced System Care 7.2 Pro 
 - Auslogics BoostSpeed 
 - CCleaner 
 - Adwcleaner 
 - IObit Malware Fighter 
 - Driver Booster 
 - Smart Defrag 3 
 
 - Tüm Programlar, Driverlar ve Bios günceldir. 
 
 - Memtest ram testi temiz.
Mavi Ekran Hatası Acil Yardım....
OP Taze Üye
					
						Teşekkür Sayısı: 0
						
							
						
					
					
					1 mesaj
					Kayıt Tarihi:Kayıt: Nis 2014