Skocz do zawartości

BSOD w różnych momentach + wolne działanie systemu


Macieeek

Rekomendowane odpowiedzi

==================================================
Dump File         : 121918-29078-01.dmp
Crash Time        : 2018-12-19 18:04:55
Bug Check String  : DRIVER_IRQL_NOT_LESS_OR_EQUAL
Bug Check Code    : 0x000000d1
Parameter 1       : 00000000`0000002c
Parameter 2       : 00000000`00000002
Parameter 3       : 00000000`00000001
Parameter 4       : fffff880`05aad7fe
Caused By Driver  : NETwNs64.sys
Caused By Address : NETwNs64.sys+2177fe
File Description  : Intel® Wireless WiFi Link Driver
Product Name      : Intel® Wireless WiFi Link Adapter
Company           : Intel Corporation
File Version      : 14.1.1.3
Processor         : x64
Crash Address     : ntoskrnl.exe+939a0
Stack Address 1   : 
Stack Address 2   : 
Stack Address 3   : 
Computer Name     : 
Full Path         : C:\windows\Minidump\121918-29078-01.dmp
Processors Count  : 4
Major Version     : 15
Minor Version     : 7601
Dump File Size    : 262 144
Dump File Time    : 2018-12-19 18:05:51
==================================================


Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429
Machine Name:
Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`03294c90
Debug session time: Wed Dec 19 18:04:55.271 2018 (UTC + 1:00)
System Uptime: 0 days 0:18:14.692
Loading Kernel Symbols
............................Page 200003eb8 too large to be in the dump file.
....Page 200003fb7 too large to be in the dump file.
......Page 200004382 too large to be in the dump file.
..................Page 20009e9c0 too large to be in the dump file.
.......
..Page 20009db80 too large to be in the dump file.
..............................................................
....................................................
Loading User Symbols

Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {2c, 2, 1, fffff88005aad7fe}

*** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys
Probably caused by : NETwNs64.sys ( NETwNs64+2177fe )

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000002c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88005aad7fe, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

SYSTEM_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

SYSTEM_PRODUCT_NAME:  300E4A/300E5A/300E7A

SYSTEM_SKU:  System SKUNumber

SYSTEM_VERSION:  0.1

BIOS_VENDOR:  Phoenix Technologies Ltd.

BIOS_VERSION:  01QA

BIOS_DATE:  09/05/2011

BASEBOARD_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

BASEBOARD_PRODUCT:  300E4A/300E5A/300E7A

BASEBOARD_VERSION:  FAB1

DUMP_TYPE:  1

BUGCHECK_P1: 2c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff88005aad7fe

WRITE_ADDRESS:  000000000000002c 

CURRENT_IRQL:  2

FAULTING_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

CPU_COUNT: 4

CPU_MHZ: 893

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 1A'00000000 (cache) 1A'00000000 (init)

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  EWUSKA-KOMPUTER

ANALYSIS_SESSION_TIME:  12-19-2018 18:54:25.0682

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

TRAP_FRAME:  fffff8800d195200 -- (.trap 0xfffff8800d195200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0
rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88
 r8=0000000000000000  r9=0000000000000000 r10=0020004e002d0073
r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETwNs64+0x2177fe:
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi ds:00000000`0000002c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030fcd69 to fffff800030ee9a0

STACK_TEXT:  
fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448
fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe
fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e
fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f
fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384
fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f
fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7
fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4
fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad
fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d
fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1
fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c
fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2
fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2
fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2
fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd
fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd
fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  0647087028e6e71cd75256c30a872296373cae94

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0b5285fc44d8d2a3bec8bf3d60533adf037b5d05

THREAD_SHA1_HASH_MOD:  a65722aa938c7de6f2cd751638764549477dc160

FOLLOWUP_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

FAULT_INSTR_CODE:  f2c7389

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETwNs64+2177fe

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETwNs64

IMAGE_NAME:  NETwNs64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4dbdd18d

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

PRIMARY_PROBLEM_CLASS:  X64_0xD1_NETwNs64+2177fe

TARGET_TIME:  2018-12-19T17:04:55.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2018-11-11 01:44:59

BUILDDATESTAMP_STR:  181110-1429

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

ANALYSIS_SESSION_ELAPSED_TIME:  23fc

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xd1_netwns64+2177fe

FAILURE_ID_HASH:  {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000002c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88005aad7fe, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

SYSTEM_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

SYSTEM_PRODUCT_NAME:  300E4A/300E5A/300E7A

SYSTEM_SKU:  System SKUNumber

SYSTEM_VERSION:  0.1

BIOS_VENDOR:  Phoenix Technologies Ltd.

BIOS_VERSION:  01QA

BIOS_DATE:  09/05/2011

BASEBOARD_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

BASEBOARD_PRODUCT:  300E4A/300E5A/300E7A

BASEBOARD_VERSION:  FAB1

DUMP_TYPE:  1

BUGCHECK_P1: 2c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff88005aad7fe

WRITE_ADDRESS:  000000000000002c 

CURRENT_IRQL:  2

FAULTING_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

CPU_COUNT: 4

CPU_MHZ: 893

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 1A'00000000 (cache) 1A'00000000 (init)

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  EWUSKA-KOMPUTER

ANALYSIS_SESSION_TIME:  12-19-2018 18:54:36.0688

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

TRAP_FRAME:  fffff8800d195200 -- (.trap 0xfffff8800d195200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0
rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88
 r8=0000000000000000  r9=0000000000000000 r10=0020004e002d0073
r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETwNs64+0x2177fe:
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi ds:00000000`0000002c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030fcd69 to fffff800030ee9a0

STACK_TEXT:  
fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448
fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe
fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e
fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f
fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384
fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f
fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7
fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4
fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad
fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d
fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1
fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c
fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2
fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2
fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2
fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd
fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd
fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  0647087028e6e71cd75256c30a872296373cae94

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0b5285fc44d8d2a3bec8bf3d60533adf037b5d05

THREAD_SHA1_HASH_MOD:  a65722aa938c7de6f2cd751638764549477dc160

FOLLOWUP_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

FAULT_INSTR_CODE:  f2c7389

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETwNs64+2177fe

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETwNs64

IMAGE_NAME:  NETwNs64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4dbdd18d

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

PRIMARY_PROBLEM_CLASS:  X64_0xD1_NETwNs64+2177fe

TARGET_TIME:  2018-12-19T17:04:55.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2018-11-11 01:44:59

BUILDDATESTAMP_STR:  181110-1429

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

ANALYSIS_SESSION_ELAPSED_TIME:  247c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xd1_netwns64+2177fe

FAILURE_ID_HASH:  {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000002c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88005aad7fe, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

SYSTEM_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

SYSTEM_PRODUCT_NAME:  300E4A/300E5A/300E7A

SYSTEM_SKU:  System SKUNumber

SYSTEM_VERSION:  0.1

BIOS_VENDOR:  Phoenix Technologies Ltd.

BIOS_VERSION:  01QA

BIOS_DATE:  09/05/2011

BASEBOARD_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

BASEBOARD_PRODUCT:  300E4A/300E5A/300E7A

BASEBOARD_VERSION:  FAB1

DUMP_TYPE:  1

BUGCHECK_P1: 2c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff88005aad7fe

WRITE_ADDRESS:  000000000000002c 

CURRENT_IRQL:  2

FAULTING_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

CPU_COUNT: 4

CPU_MHZ: 893

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 1A'00000000 (cache) 1A'00000000 (init)

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  EWUSKA-KOMPUTER

ANALYSIS_SESSION_TIME:  12-19-2018 18:54:46.0034

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

TRAP_FRAME:  fffff8800d195200 -- (.trap 0xfffff8800d195200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0
rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88
 r8=0000000000000000  r9=0000000000000000 r10=0020004e002d0073
r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETwNs64+0x2177fe:
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi ds:00000000`0000002c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030fcd69 to fffff800030ee9a0

STACK_TEXT:  
fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448
fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe
fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e
fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f
fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384
fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f
fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7
fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4
fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad
fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d
fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1
fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c
fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2
fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2
fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2
fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd
fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd
fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  0647087028e6e71cd75256c30a872296373cae94

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0b5285fc44d8d2a3bec8bf3d60533adf037b5d05

THREAD_SHA1_HASH_MOD:  a65722aa938c7de6f2cd751638764549477dc160

FOLLOWUP_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

FAULT_INSTR_CODE:  f2c7389

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETwNs64+2177fe

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETwNs64

IMAGE_NAME:  NETwNs64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4dbdd18d

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

PRIMARY_PROBLEM_CLASS:  X64_0xD1_NETwNs64+2177fe

TARGET_TIME:  2018-12-19T17:04:55.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2018-11-11 01:44:59

BUILDDATESTAMP_STR:  181110-1429

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

ANALYSIS_SESSION_ELAPSED_TIME:  240d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xd1_netwns64+2177fe

FAILURE_ID_HASH:  {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000002c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88005aad7fe, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

SYSTEM_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

SYSTEM_PRODUCT_NAME:  300E4A/300E5A/300E7A

SYSTEM_SKU:  System SKUNumber

SYSTEM_VERSION:  0.1

BIOS_VENDOR:  Phoenix Technologies Ltd.

BIOS_VERSION:  01QA

BIOS_DATE:  09/05/2011

BASEBOARD_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

BASEBOARD_PRODUCT:  300E4A/300E5A/300E7A

BASEBOARD_VERSION:  FAB1

DUMP_TYPE:  1

BUGCHECK_P1: 2c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff88005aad7fe

WRITE_ADDRESS:  000000000000002c 

CURRENT_IRQL:  2

FAULTING_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

CPU_COUNT: 4

CPU_MHZ: 893

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 1A'00000000 (cache) 1A'00000000 (init)

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  EWUSKA-KOMPUTER

ANALYSIS_SESSION_TIME:  12-19-2018 18:54:55.0268

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

TRAP_FRAME:  fffff8800d195200 -- (.trap 0xfffff8800d195200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880016ef110 rbx=0000000000000000 rcx=fffff880016f2ec0
rdx=fffff800032cbf90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005aad7fe rsp=fffff8800d195390 rbp=fffffa80073f2c88
 r8=0000000000000000  r9=0000000000000000 r10=0020004e002d0073
r11=fffffa80042413d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETwNs64+0x2177fe:
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi ds:00000000`0000002c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030fcd69 to fffff800030ee9a0

STACK_TEXT:  
fffff880`0d1950b8 fffff800`030fcd69 : 00000000`0000000a 00000000`0000002c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0d1950c0 fffff800`030fab88 : 00000000`00000001 00000000`0000002c fffff800`03255a00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0d195200 fffff880`05aad7fe : 00000000`00000000 fffffa80`073f2c88 fffffa80`00000002 00000000`000000c0 : nt!KiPageFault+0x448
fffff880`0d195390 fffff880`05aab24e : fffffa80`078595c0 00000000`80000000 fffffa80`073f2c88 00000000`00000000 : NETwNs64+0x2177fe
fffff880`0d1953d0 fffff880`05aa1d4f : fffffa80`00000000 fffffa80`07858000 fffffa80`0c035090 fffffa80`0492ef30 : NETwNs64+0x21524e
fffff880`0d195430 fffff880`058ac384 : fffffa80`00000001 fffff880`05aa18c0 fffffa80`073f2c88 fffffa80`073f2c88 : NETwNs64+0x20bd4f
fffff880`0d1954f0 fffff880`058a9a9f : 00000000`00000018 fffffa80`0492efe0 fffffa80`0447b340 fffffa80`07386770 : NETwNs64+0x16384
fffff880`0d195550 fffff880`05a6fea7 : fffffa80`0ba4d170 00000000`00000000 fffff880`060a5540 fffffa80`07127d60 : NETwNs64+0x13a9f
fffff880`0d1955a0 fffff880`05a6ebb4 : 00000000`00000004 00000000`00000000 fffff880`060a5540 fffffa80`07ad5900 : NETwNs64+0x1d9ea7
fffff880`0d195600 fffff880`05a6a9ad : fffff880`00000000 fffff880`06a0608c 00000000`00000000 fffffa80`07ad5910 : NETwNs64+0x1d8bb4
fffff880`0d195690 fffff880`05a69e2d : fffffa80`07a57d60 00000000`00000000 00000000`0000020c fffffa80`0ba4d170 : NETwNs64+0x1d49ad
fffff880`0d1956f0 fffff880`058d9bd1 : 00000000`00000059 fffffa80`077fe110 00000000`000000ff fffffa80`07a57d60 : NETwNs64+0x1d3e2d
fffff880`0d195890 fffff880`058d953c : fffffa80`07a30900 00000000`8be7cddf fffffa80`077fe110 00000000`8be7cdff : NETwNs64+0x43bd1
fffff880`0d195920 fffff880`058ce6a2 : fffffa80`07a30901 fffffa80`06c5e101 fffff880`0d1959f0 fffffa80`06c5e101 : NETwNs64+0x4353c
fffff880`0d1959c0 fffff880`05bf7ba2 : fffffa80`0483a200 fffffa80`06c5e1a0 fffffa80`06c5e1a0 fffffa80`0483a160 : NETwNs64+0x386a2
fffff880`0d195a30 fffff880`01717792 : fffff880`016ef110 00000000`00000000 fffffa80`06c5e1a0 fffffa80`06c5ef68 : NETwNs64+0x361ba2
fffff880`0d195a60 fffff880`016a07ad : 00000000`00000002 00000000`0000000a 00000000`00000000 00000000`00000000 : ndis!ndisMiniportDpc+0xe2
fffff880`0d195ad0 fffff880`016c66bd : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`07a6aeb8 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd
fffff880`0d195b70 fffff800`0339cd10 : fffffa80`00000000 fffff800`0323f180 00000000`00000080 fffff880`00000001 : ndis!ndisReceiveWorkerThread+0x1bd
fffff880`0d195c00 fffff800`030f49a6 : fffff800`0323f180 fffffa80`0483a160 fffffa80`04affb50 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`0d195c40 00000000`00000000 : fffff880`0d196000 fffff880`0d190000 fffff880`0d1958c0 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  0647087028e6e71cd75256c30a872296373cae94

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0b5285fc44d8d2a3bec8bf3d60533adf037b5d05

THREAD_SHA1_HASH_MOD:  a65722aa938c7de6f2cd751638764549477dc160

FOLLOWUP_IP: 
NETwNs64+2177fe
fffff880`05aad7fe 89732c          mov     dword ptr [rbx+2Ch],esi

FAULT_INSTR_CODE:  f2c7389

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETwNs64+2177fe

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETwNs64

IMAGE_NAME:  NETwNs64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4dbdd18d

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

BUCKET_ID:  X64_0xD1_NETwNs64+2177fe

PRIMARY_PROBLEM_CLASS:  X64_0xD1_NETwNs64+2177fe

TARGET_TIME:  2018-12-19T17:04:55.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2018-11-11 01:44:59

BUILDDATESTAMP_STR:  181110-1429

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24291.amd64fre.win7sp1_ldr_escrow.181110-1429

ANALYSIS_SESSION_ELAPSED_TIME:  2450

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xd1_netwns64+2177fe

FAILURE_ID_HASH:  {ddc7bf63-c01f-b70a-adf6-6eafbdb49df4}

Followup:     MachineOwner
---------




Podpis problemu:
  Nazwa zdarzenia problemu:	BlueScreen
  Wersja systemu operacyjnego:	6.1.7601.2.1.0.768.3
  Identyfikator ustawie� regionalnych:	1045

Dodatkowe informacje o problemie:
  BCCode:	d1
  BCP1:	000000000000002C
  BCP2:	0000000000000002
  BCP3:	0000000000000001
  BCP4:	FFFFF88005AAD7FE
  OS Version:	6_1_7601
  Service Pack:	1_0
  Product:	768_1

Pliki pomagaj�ce opisa� problem:
  C:\Windows\Minidump\121918-29078-01.dmp
  C:\Users\ewu�ka\AppData\Local\Temp\WER-143552-0.sysdata.xml

Przeczytaj w trybie online nasze zasady zachowania poufno�ci informacji:
  http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0415

Je�li zasady zachowania poufno�ci informacji w trybie online nie s� dost�pne, przeczytaj nasze zasady zachowania poufno�ci informacji w trybie offline:
  C:\windows\system32\pl-PL\erofflps.txt

Cześć,

mam problem z BSOD wyskakującym niezbyt zależnie od tego co robię, tak mi się wydaję. Najczęściej pojawia się podczas korzystania z internetu. Pojawił się też gdy skanowałem adwcleanerem czy też gdy odpaliłem GMERa(wyłączyłem zaporę i avasta). 

Co ciekawe problem ten nie występuje gdy jestem w Niemczech i korzystam z tamtejszego internetu. Bluescreen wyskakuje tylko w Polsce.

W spoilerze zamieściłem diagnozę z poradnika.

 

Proszę i z góry dziękuję za pomoc

 

Addition.txt

FRST.txt

Shortcut.txt

Odnośnik do komentarza
Pomoc jest darmowa, ale proszę rozważ przekazanie dotacji na utrzymanie serwisu: klik.

W logach FRST nie widzę żadnej infekcji.

 

Tylko kosmetyka:

Uruchom FRST. Na klawiaturze naciśnij jednocześnie CTRL+Y.
Otworzy się Notatnik - wklej do niego:

Spoiler

Toolbar: HKU\S-1-5-21-1480235242-2075340924-4091109271-1001 -> Brak nazwy - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} -  Brak pliku
HKLM-x32\...\Run: [] => [X]
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender: Ograniczenia <==== UWAGA
HKU\S-1-5-21-1480235242-2075340924-4091109271-1001\...\Run: [BingSvc] => C:\Users\ewuśka\AppData\Local\Microsoft\BingSvc\BingSvc.exe [144008 2015-11-05] (© 2015 Microsoft Corporation)
HKU\S-1-5-18\...\Run: [Norton Download Manager{NIS2250215-SHPD-FSD51083}] => C:\Users\Public\Downloads\Norton\{NIS2250215-SHPD-FSD51083}\FSDUI_Custom.exe [1110856 2015-09-07] (Symantec Corporation)
SearchScopes: HKU\S-1-5-21-1480235242-2075340924-4091109271-1001 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
FF Plugin-x32: @adobe.com/ShockwavePlayer -> C:\windows\system32\Adobe\Director\np32dsw.dll [Brak pliku]
Task: {BB9A67E9-7418-4209-AF9B-4F5D4EAC9250} - System32\Tasks\Remediation\AntimalwareMigrationTask => C:\Program Files\Common Files\AV\Norton Internet Security\Upgrade.exe [2015-08-06] (Symantec Corporation)
EmptyTemp:

Na klawiaturze naciśnij jednocześnie CTRL+S. W FRST kliknij na Fix (NAPRAW).

 

===========

 

Spoiler

0x000000d1

Patrzyłam w necie, szukając rozwiązań mających ten sam błąd, co u Ciebie.

Rozwiązań jest tak dużo, że trudno wybrać coś pasującego do Twego komputera.

Ja stawiam na problem z routerem, lub z wi-fi.

Ale to tylko moje domysły, nie jestem fachowcem w sprawach sprzętowych.

 

jessi

Odnośnik do komentarza

Jeśli chcesz dodać odpowiedź, zaloguj się lub zarejestruj nowe konto

Jedynie zarejestrowani użytkownicy mogą komentować zawartość tej strony.

Zarejestruj nowe konto

Załóż nowe konto. To bardzo proste!

Zarejestruj się

Zaloguj się

Posiadasz już konto? Zaloguj się poniżej.

Zaloguj się
  • Ostatnio przeglądający   0 użytkowników

    • Brak zarejestrowanych użytkowników przeglądających tę stronę.
×
×
  • Dodaj nową pozycję...