Troubleshoot Constant Blue Screens (Netio.sys)

TheBlue262

Level 3
Thread author
Verified
Well-known
Dec 24, 2015
128
Yesterday, 6/14/2016, I received an automatic update for windows 10 from microsoft. I chose to update and shutdown and today, 6/15/2016, I received a blue screen while turning on my laptop. I was able to login after restarting my laptop. As I was using my laptop throughout the day, blue screens kept occurring randomly no matter what program I was using. I blue screened once while playing League of Legends and while playing Team Fortress 2 I blue screened multiple times after getting back on. I also blue screened while watching a youtube video later on and in the middle of running a MBAR scan. All of these blue screens were related to Netio.sys and this all happened today after updating my windows 10 last night. There were two updates.

Windows 10 updates :

Update for Windows 10 Version 1511 for x64-based Systems (KB3149135) (I checked to see if I could uninstall this but it was not possible, only the cumulative update below this was able to be uninstalled. I did not perform the uninstall.)

Cumulative Update for Windows 10 Version 1511 for x64-based Systems (KB3163018) (Security update)

Minidump Zip File (There should be 6 files.)
Minidump.zip
 
  • Like
Reactions: _CyberGhosT_
A

Alkajak

Code:
0: kd> lmvm L1C63x64
Browse full module list
start             end                 module name
fffff800`56f50000 fffff800`56f78000   L1C63x64 T (no symbols)          
    Loaded symbol image file: L1C63x64.sys
    Image path: L1C63x64.sys
    Image name: L1C63x64.sys
    Timestamp:        Mon Sep 28 14:54:38 2015 (56098CEE)
    CheckSum:         0002C2CC
    ImageSize:        00028000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4

Your LAN drivers are timestamped Sep 28 2015. The latest release was on December 30th.

DDL: http://cdgenp01.csd.toshiba.com/content/support/downloads/tc50131900d.exe
Toshiba Support: http://support.toshiba.com/support/modelHome?freeText=PSKGGU-00E003
 
Upvote 0

TheBlue262

Level 3
Thread author
Verified
Well-known
Dec 24, 2015
128
Code:
0: kd> lmvm L1C63x64
Browse full module list
start             end                 module name
fffff800`56f50000 fffff800`56f78000   L1C63x64 T (no symbols)        
    Loaded symbol image file: L1C63x64.sys
    Image path: L1C63x64.sys
    Image name: L1C63x64.sys
    Timestamp:        Mon Sep 28 14:54:38 2015 (56098CEE)
    CheckSum:         0002C2CC
    ImageSize:        00028000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4

Your LAN drivers are timestamped Sep 28 2015. The latest release was on December 30th.

DDL: http://cdgenp01.csd.toshiba.com/content/support/downloads/tc50131900d.exe
Toshiba Support: http://support.toshiba.com/support/modelHome?freeText=PSKGGU-00E003
The download you gave me downloaded an older version from 2012 version 2.1.0.6 which is older. Did I do something wrong?

EDIT
I just realized that 2.1.0.6 is the version on the support page. I have 2.1.0.21 from 2013. Should I use the 2.1.06 version?
 
Upvote 0

TheBlue262

Level 3
Thread author
Verified
Well-known
Dec 24, 2015
128
The BSOD is caused by the KB3163018 cumulative update.

Hide both KB3163018 and KB3149135... I bet the BSODs will stop.
I already installed both updates so I can't hide them. I can uninstall KB3163018 but I can't uninstall KB3149135. Should I uninstall KB3163018 alone? Would it help?
 
Upvote 0
H

hjlbx

I already installed both updates so I can't hide them. I can uninstall KB3163018 but I can't uninstall KB3149135. Should I uninstall KB3163018 alone? Would it help?

You can try this to uninstall KB3149135: https://support.microsoft.com/en-us/kb/3073930

If it doesn't work, the only way to uninstall KB3149135 is to clean install Windows 10, download Windows Updates and then run the wushowhide utility and hide KB3149135 BEFORE it is installed... it's what I had to do.

Either way, I would uninstall KB3163018. Right now it isn't ready for all systems.
 
Last edited by a moderator:
Upvote 0

TheBlue262

Level 3
Thread author
Verified
Well-known
Dec 24, 2015
128
You can try this to uninstall KB3149135: https://support.microsoft.com/en-us/kb/3073930

If it doesn't work, the only way to uninstall KB3149135 is to clean install Windows 10, download Windows Updates and then run the wushowhide utility and hide KB3149135... it's what I had to do.

Either way, I would uninstall KB3163018. Right now it isn't ready for all systems.
I'll uninstall KB3163018 right now.
 
Upvote 0

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Either way, I would uninstall KB3163018. Right now it isn't ready for all systems.
Right hjlbx, Blue is not the only one having an issue, it seems MS support threads are popping up.
@TheBlue262
No rollback option then just hide the conflicting updates ?
Do you have an old Restore Point ?
 
Upvote 0

TheBlue262

Level 3
Thread author
Verified
Well-known
Dec 24, 2015
128
Right hjlbx, Blue is not the only one having an issue, it seems MS support threads are popping up.
@TheBlue262
No rollback option then just hide the conflicting updates ?
Do you have an old Restore Point ?
I just checked and it looks like there was a restore point created by windows when the update was occurring. I'll restore it using this one.
 
Upvote 0

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Too bad, likely that bad update must incorporate immediately with the latest drivers around but don't dare to install any beta product for graphics.

That suspected KB should be hidden for the meantime by using the tool provided by Microsoft. :)
 
  • Like
Reactions: TheBlue262
Upvote 0
S

Smith83

Please download MINITOOLBOX and run it.

Checkmark following boxes:



Flush DNS
Reset FF proxy Settings
Reset Ie Proxy Settings
Report IE Proxy Settings
Report FF Proxy Settings
List content of Hosts
List IP configuration
List Winsock Entries
List last 10 Event Viewer log
List Installed Programs
List Users, Partitions and Memory size
List Devices (problems only)



Click Go post the result.




Download Autoruns and Autorunsc Unzip it to your desktop and then double click autoruns.exe
After the scan is finished then click on File>>>>>>>>>>>Save
The default name will be autoruns.arn make sure to save it as Autoruns.txt under the file type option.
in other words make sure it is a .txt file instead of .arn Attach the text in your next reply.



Please upload your minidump files. How to compress and upload Minidump files
 
Upvote 0

TheBlue262

Level 3
Thread author
Verified
Well-known
Dec 24, 2015
128
Please download MINITOOLBOX and run it.

Checkmark following boxes:



Flush DNS
Reset FF proxy Settings
Reset Ie Proxy Settings
Report IE Proxy Settings
Report FF Proxy Settings
List content of Hosts
List IP configuration
List Winsock Entries
List last 10 Event Viewer log
List Installed Programs
List Users, Partitions and Memory size
List Devices (problems only)



Click Go post the result.




Download Autoruns and Autorunsc Unzip it to your desktop and then double click autoruns.exe
After the scan is finished then click on File>>>>>>>>>>>Save
The default name will be autoruns.arn make sure to save it as Autoruns.txt under the file type option.
in other words make sure it is a .txt file instead of .arn Attach the text in your next reply.



Please upload your minidump files. How to compress and upload Minidump files
Here are the files you requested. I also want to let you know that while running autoruns.exe, my laptop blue screened again with bad_pool_header.

Link for minidump files : Minidump.zip
 

Attachments

  • MTB.txt
    48.1 KB · Views: 778
  • Autoruns.txt
    84.4 KB · Views: 1,253
Upvote 0
S

Smith83

Analysis and posting your dumps... Give me a bit to go over the information.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000099, Attempt to free pool with invalid address  (or corruption in pool header)
Arg2: ffffe000ef35e9e8, Address being freed
Arg3: 0000000000000000, 0
Arg4: 0000000000000000, 0

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

FAULTING_IP:
NETIO! ?? ::FNODOBFM::`string'+9bb0
fffff801`5ab54a20 90              nop

BUGCHECK_STR:  0xc2_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

BAD_PAGES_DETECTED: b975

LAST_CONTROL_TRANSFER:  from fffff802e83392c8 to fffff802e7dbc780

STACK_TEXT:
ffffd001`80fefdf8 fffff802`e83392c8 : 00000000`000000c2 00000000`00000099 ffffe000`ef35e9e8 00000000`00000000 : nt!KeBugCheckEx
ffffd001`80fefe00 fffff802`e7e522c1 : 00000000`00000000 fffff801`5b0b0230 ffffe000`e651b860 fffff801`5b0ac000 : nt!VerifierBugCheckIfAppropriate+0x3c
ffffd001`80fefe40 fffff802`e7eabd7d : ffffe000`ef35e9d8 00000000`00000550 00000000`00000000 fffff801`5af701c7 : nt!VerifierFreeTrackedPool+0x41
ffffd001`80fefe80 fffff801`5ab54a20 : fffff801`5b0bc250 fffff801`5b0ac002 00000000`00000000 fffff801`5b0b0230 : nt!ExDeferredFreePool+0x5cd
ffffd001`80feff60 fffff801`5aff5c32 : ffffd001`80ff0100 ffffe000`e98aa1a0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0
ffffd001`80feffb0 fffff801`5ab2128a : 00000000`00000000 00000000`00000002 fffff801`5af6b9c0 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0x8a272
ffffd001`80ff0000 fffff801`5af3c560 : 00000000`00000002 00000000`00000000 ffffe000`e98aa030 ffffd001`80ff0169 : NETIO!NetioDereferenceNetBufferListChain+0xea
ffffd001`80ff00d0 fffff801`5af3d818 : fffff801`5b0ac000 ffffe000`e6598940 00000000`00000002 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x4b0
ffffd001`80ff01d0 fffff801`5af7e1ff : ffffe000`ec5ffaf0 ffffe000`e98aa030 ffffd001`80ff0301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
ffffd001`80ff02f0 fffff801`5af7d85e : 00000000`00000002 ffffd001`00000002 fffff801`5af6b9c0 fffff802`e98aa001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffd001`80ff03d0 fffff802`e7d20e95 : 00000000`00000002 ffffe000`e63fa040 fffff801`5af7d790 ffffd001`80ff0580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
ffffd001`80ff0500 fffff801`5af6bb46 : ffffe000`e6541f00 00000000`00000000 ffffe000`e6541ea0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd001`80ff0550 fffff801`5a5f2d97 : ffffe000`ec5ec2b0 ffffd001`80ff0640 ffffe000`00000002 00000000`00000002 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd001`80ff05d0 fffff801`5a5f2558 : ffffe000`ec5ec2b0 ffffe000`e98aa030 ffffe000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
ffffd001`80ff0680 fffff801`5a5feef5 : ffffe000`e986b1a0 ffffd001`00000001 ffffe000`e986b1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318
ffffd001`80ff0780 fffff801`5a5f3d73 : 00000000`002cd2be ffffd001`80ff08d0 00000000`00000000 ffffe000`e9ce7a00 : ndis!ndisCallReceiveHandler+0x85
ffffd001`80ff07d0 fffff801`5d2a959c : ffffe000`e9915100 ffffe000`0000001f 00000000`00000002 ffffd001`80ff0a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
ffffd001`80ff0950 ffffe000`e9915100 : ffffe000`0000001f 00000000`00000002 ffffd001`80ff0a40 ffffe000`00000001 : L1C63x64+0x959c
ffffd001`80ff0958 ffffe000`0000001f : 00000000`00000002 ffffd001`80ff0a40 ffffe000`00000001 00000000`5d2ad120 : 0xffffe000`e9915100
ffffd001`80ff0960 00000000`00000002 : ffffd001`80ff0a40 ffffe000`00000001 00000000`5d2ad120 00000000`00000002 : 0xffffe000`0000001f
ffffd001`80ff0968 ffffd001`80ff0a40 : ffffe000`00000001 00000000`5d2ad120 00000000`00000002 00000000`00000000 : 0x2
ffffd001`80ff0970 ffffe000`00000001 : 00000000`5d2ad120 00000000`00000002 00000000`00000000 ffffe000`e986b1a0 : 0xffffd001`80ff0a40
ffffd001`80ff0978 00000000`5d2ad120 : 00000000`00000002 00000000`00000000 ffffe000`e986b1a0 00000000`00010000 : 0xffffe000`00000001
ffffd001`80ff0980 00000000`00000002 : 00000000`00000000 ffffe000`e986b1a0 00000000`00010000 00000000`00000000 : 0x5d2ad120
ffffd001`80ff0988 00000000`00000000 : ffffe000`e986b1a0 00000000`00010000 00000000`00000000 ffffd001`80ff0a40 : 0x2


STACK_COMMAND:  kb

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 47477 instance(s) of page corruption, target is likely to have memory corruption.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000126c, (reserved)
Arg3: 00000000cc8531d0, Memory contents of the pool block
Arg4: ffffe001c5a83228, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff801498efb78
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

POOL_ADDRESS:  ffffe001c5a83228

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

BAD_PAGES_DETECTED: ce44

LAST_CONTROL_TRANSFER:  from fffff8014984ccf7 to fffff8014975d780

STACK_TEXT:
ffffd001`fbd07698 fffff801`4984ccf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`cc8531d0 : nt!KeBugCheckEx
ffffd001`fbd076a0 fffff801`46d64a20 : 00000000`00000000 0000bb01`46df0002 00000000`00000006 ffffd001`fd8b6a22 : nt!ExDeferredFreePool+0x547
ffffd001`fbd07780 fffff801`464d5c32 : ffffe001`c358bd80 ffffe001`c6ac6c30 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0
ffffd001`fbd077d0 fffff801`46d31781 : ffffe001`c6ac6ac0 00000000`00000001 ffffe001`c4958000 ffffe001`cc077c81 : tcpip!FlpReturnNetBufferListChain+0x8a272
ffffd001`fbd07820 fffff801`464223d3 : 00000001`00000bc4 ffffe001`c4958000 00000000`00000000 ffffe001`cc077c01 : NETIO!NetioDereferenceNetBufferList+0x161
ffffd001`fbd078a0 fffff801`463eb959 : ffffe001`c35a0f00 ffffe001`c6ac0002 00000000`00000000 ffffd001`fd8b221a : tcpip!InetInspectReceiveTcpDatagram+0x593
ffffd001`fbd079b0 fffff801`4641edc7 : ffffe001`c3198cca ffffd001`fbd07d00 00000000`00000002 00000000`ec821ff5 : tcpip!TcpListenerReceive+0x1e9
ffffd001`fbd07c00 fffff801`4641e475 : 00000000`00000000 00000000`0019464a ffffd001`fd8b2222 00000043`47d7a706 : tcpip!TcpMatchReceive+0x597
ffffd001`fbd07eb0 fffff801`4641d213 : ffffe001`c358bd80 ffffd001`fbd0e7c2 ffffd001`fbd007ba 00000000`00000002 : tcpip!TcpPreValidatedReceive+0x385
ffffd001`fbd07fa0 fffff801`4641cd80 : ffffd001`fbd08078 fffff801`49938180 fffff443`877df253 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73
ffffd001`fbd08060 fffff801`4641c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 ffffd001`fbd08169 : tcpip!IppProcessDeliverList+0x60
ffffd001`fbd080d0 fffff801`4641d818 : fffff801`4658c000 ffffe001`c35cb940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388
ffffd001`fbd081d0 fffff801`4645e1ff : ffffe001`c75dd230 ffffe001`c6ac6ac0 ffffd001`fbd08301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
ffffd001`fbd082f0 fffff801`4645d85e : ffffe001`c69c0002 ffffd001`00000001 fffff801`4644b9c0 ffffd001`c6ac6a01 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffd001`fbd083d0 fffff801`496c1e95 : 00000000`00000002 ffffe001`c351b800 fffff801`4645d790 ffffd001`fbd08580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
ffffd001`fbd08500 fffff801`4644bb46 : ffffe001`c35da8c0 00000000`00000000 ffffe001`c35da860 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd001`fbd08550 fffff801`46c12d97 : ffffe001`c75dbc10 ffffd001`fbd08640 ffffe001`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd001`fbd085d0 fffff801`46c12558 : ffffe001`c75dbc10 ffffe001`c6ac6ac0 ffffe001`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
ffffd001`fbd08680 fffff801`46c1eef5 : ffffe001`c65d91a0 ffffd001`00000001 ffffe001`c65d91a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318
ffffd001`fbd08780 fffff801`46c13d73 : 00000000`001c3833 ffffd001`fbd088d0 00000000`00000000 00000000`00000100 : ndis!ndisCallReceiveHandler+0x85
ffffd001`fbd087d0 fffff801`4cb1959c : 00000002`00000000 00000004`000001bb 00000000`00000000 ffffd001`fbd08a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
ffffd001`fbd08950 00000002`00000000 : 00000004`000001bb 00000000`00000000 ffffd001`fbd08a40 00000000`00000001 : L1C63x64+0x959c
ffffd001`fbd08958 00000004`000001bb : 00000000`00000000 ffffd001`fbd08a40 00000000`00000001 00000000`00000000 : 0x2`00000000
ffffd001`fbd08960 00000000`00000000 : ffffd001`fbd08a40 00000000`00000001 00000000`00000000 00000000`00000002 : 0x4`000001bb


STACK_COMMAND:  kb

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 52804 instance(s) of page corruption, target is likely to have memory corruption.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000126c, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: ffffe001dcf76178, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff802404e5b78
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

POOL_ADDRESS:  ffffe001dcf76178

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

BAD_PAGES_DETECTED: e554

LAST_CONTROL_TRANSFER:  from fffff80240442cf7 to fffff80240353780

STACK_TEXT:
fffff802`4230e418 fffff802`40442cf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00000000 : nt!KeBugCheckEx
fffff802`4230e420 fffff801`ae954a20 : 00000000`00000000 0000bb01`9fd00002 00000000`00000006 00000000`00000000 : nt!ExDeferredFreePool+0x547
fffff802`4230e500 fffff801`aeac5c32 : ffffe001`d73e4000 ffffe001`d732aac0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0
fffff802`4230e550 fffff801`ae921781 : ffffe001`d732a950 00000000`00000001 ffffe001`d5179000 ffffe001`e0eead91 : tcpip!FlpReturnNetBufferListChain+0x8a272
fffff802`4230e5a0 fffff801`aea123d3 : 00000001`00001220 ffffe001`d5179000 00000000`00000000 ffffe001`e0eeae01 : NETIO!NetioDereferenceNetBufferList+0x161
fffff802`4230e620 fffff801`ae9db959 : ffffe001`d24ccf00 ffffe001`d7320002 00000000`00000000 ffffd001`667c861a : tcpip!InetInspectReceiveTcpDatagram+0x593
fffff802`4230e730 fffff801`aea0edc7 : ffffe001`da64b4ea fffff802`4230ea80 00000000`00000002 00000000`a326708e : tcpip!TcpListenerReceive+0x1e9
fffff802`4230e980 fffff801`aea0e475 : 00000000`00000000 00000000`0019464b ffffd001`667c8622 00000021`d79dcfab : tcpip!TcpMatchReceive+0x597
fffff802`4230ec30 fffff801`aea0d213 : ffffe001`d3dbcab0 fffff802`4230e7c2 fffff802`4230c1bf 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x385
fffff802`4230ed20 fffff801`aea0cd80 : fffff802`4230edf8 fffff802`4052e180 ffff7bf4`20897f2e fffff802`402eaa70 : tcpip!IppDeliverListToProtocol+0x73
fffff802`4230ede0 fffff801`aea0c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 fffff802`4230eee9 : tcpip!IppProcessDeliverList+0x60
fffff802`4230ee50 fffff801`aea0d818 : fffff801`aeb7c000 ffffe001`d50d8940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388
fffff802`4230ef50 fffff801`aea4e1ff : ffffe001`daa0a8d0 ffffe001`d732a950 fffff802`4230f101 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
fffff802`4230f070 fffff801`aea4d85e : ffffe001`daac0002 fffff802`00000001 fffff801`aea3b9c0 fffff802`d732a901 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
fffff802`4230f150 fffff802`402b7e95 : 00000000`00000002 fffff802`405a4740 fffff801`aea4d790 fffff802`4230f300 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
fffff802`4230f280 fffff801`aea3bb46 : ffffe001`d3dfd820 00000000`00000000 ffffe001`d3dfcfb0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
fffff802`4230f2d0 fffff801`ae802d97 : ffffe001`d95ef010 fffff802`4230f3c0 ffffe001`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6
fffff802`4230f350 fffff801`ae802558 : ffffe001`d95ef010 ffffe001`d732a950 ffffe001`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
fffff802`4230f400 fffff801`ae80eef5 : ffffe001`d6a5e1a0 fffff802`00000001 ffffe001`d6a5e1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318
fffff802`4230f500 fffff801`ae803d73 : 00000000`000e31c8 fffff802`4230f650 00000000`00000000 ffffd001`6a66c180 : ndis!ndisCallReceiveHandler+0x85
fffff802`4230f550 fffff801`b0d9959c : ffffbecf`85d64f00 fffff802`00000190 ffffe001`d6a62190 fffff802`4230f7b8 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
fffff802`4230f6d0 ffffbecf`85d64f00 : fffff802`00000190 ffffe001`d6a62190 fffff802`4230f7b8 ffffe001`00000001 : L1C63x64+0x959c
fffff802`4230f6d8 fffff802`00000190 : ffffe001`d6a62190 fffff802`4230f7b8 ffffe001`00000001 00000000`00000000 : 0xffffbecf`85d64f00
fffff802`4230f6e0 ffffe001`d6a62190 : fffff802`4230f7b8 ffffe001`00000001 00000000`00000000 00000000`00000000 : 0xfffff802`00000190
fffff802`4230f6e8 fffff802`4230f7b8 : ffffe001`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`d6a62190
fffff802`4230f6f0 ffffe001`00000001 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff802`4230f7b8
fffff802`4230f6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00010000 : 0xffffe001`00000001


STACK_COMMAND:  kb

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 58708 instance(s) of page corruption, target is likely to have memory corruption.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000126c, (reserved)
Arg3: 0000000000001000, Memory contents of the pool block
Arg4: ffffe00056fce088, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff802fa747b78
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

POOL_ADDRESS:  ffffe00056fce088

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

BAD_PAGES_DETECTED: b75c

LAST_CONTROL_TRANSFER:  from fffff802fa6a4cf7 to fffff802fa5b5780

STACK_TEXT:
ffffd000`ab931698 fffff802`fa6a4cf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00001000 : nt!KeBugCheckEx
ffffd000`ab9316a0 fffff801`fb994a20 : ffffe000`52c10d00 ffffe000`56ad9300 ffffe000`584fa580 00000000`00000000 : nt!ExDeferredFreePool+0x547
ffffd000`ab931780 fffff801`fb525c32 : ffffe000`584fa580 ffffe000`52c094d0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0
ffffd000`ab9317d0 fffff801`fb961781 : ffffe000`52c09360 00000000`00000001 ffffe000`50958000 ffffe000`577c2611 : tcpip!FlpReturnNetBufferListChain+0x8a272
ffffd000`ab931820 fffff801`fb4723d3 : 00000001`00002b44 ffffe000`50958000 00000000`00000000 ffffe000`58655a01 : NETIO!NetioDereferenceNetBufferList+0x161
ffffd000`ab9318a0 fffff801`fb43b959 : ffffe000`4dccaf00 ffffe000`52c10002 00000000`00000000 ffffd000`ac6b0a1a : tcpip!InetInspectReceiveTcpDatagram+0x593
ffffd000`ab9319b0 fffff801`fb46edc7 : ffffe000`59a85bca ffffd000`ab931d00 00000000`00000002 00000000`b22ef88b : tcpip!TcpListenerReceive+0x1e9
ffffd000`ab931c00 fffff801`fb46e475 : 00000000`00000000 00000000`0019464d ffffd000`ac6b0a22 000000e6`b331d6c0 : tcpip!TcpMatchReceive+0x597
ffffd000`ab931eb0 fffff801`fb46d213 : ffffe000`508d1200 ffffd000`ab93e7c2 ffffd000`ab93a9bc 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`ab931fa0 fffff801`fb46cd80 : ffffd000`ab932078 fffff802`fa790180 ffff587a`9272e124 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73
ffffd000`ab932060 fffff801`fb46c438 : 00000000`e0000001 00000000`00000000 00000000`00000000 ffffd000`ab932169 : tcpip!IppProcessDeliverList+0x60
ffffd000`ab9320d0 fffff801`fb46d818 : fffff801`fb5dc000 ffffe000`508ad940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388
ffffd000`ab9321d0 fffff801`fb4ae1ff : ffffe000`52bbeb60 ffffe000`52c09360 ffffd000`ab932301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
ffffd000`ab9322f0 fffff801`fb4ad85e : ffffe000`4f520002 ffffd000`00000001 fffff801`fb49b9c0 fffff801`52c09301 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffd000`ab9323d0 fffff802`fa519e95 : 00000000`00000002 ffffe000`4f527040 fffff801`fb4ad790 ffffd000`ab932580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
ffffd000`ab932500 fffff801`fb49bb46 : ffffe000`4f5e2f00 00000000`00000000 ffffe000`4f5e2ea0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd000`ab932550 fffff801`fb842d97 : ffffe000`52bbe6d0 ffffd000`ab932640 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`ab9325d0 fffff801`fb842558 : ffffe000`52bbe6d0 ffffe000`52c09360 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
ffffd000`ab932680 fffff801`fb84eef5 : ffffe000`509af1a0 ffffd000`00000001 ffffe000`509af1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318
ffffd000`ab932780 fffff801`fb843d73 : 00000000`0060c338 ffffd000`ab9328d0 00000000`00000000 ffffe000`52bb9300 : ndis!ndisCallReceiveHandler+0x85
ffffd000`ab9327d0 fffff801`fd43959c : ffffe000`52d5c500 ffffe000`00000106 00000000`00000002 ffffd000`ab932a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
ffffd000`ab932950 ffffe000`52d5c500 : ffffe000`00000106 00000000`00000002 ffffd000`ab932a40 ffffe000`00000001 : L1C63x64+0x959c
ffffd000`ab932958 ffffe000`00000106 : 00000000`00000002 ffffd000`ab932a40 ffffe000`00000001 00000000`fd43d120 : 0xffffe000`52d5c500
ffffd000`ab932960 00000000`00000002 : ffffd000`ab932a40 ffffe000`00000001 00000000`fd43d120 00000000`00000002 : 0xffffe000`00000106
ffffd000`ab932968 ffffd000`ab932a40 : ffffe000`00000001 00000000`fd43d120 00000000`00000002 00000000`00000000 : 0x2
ffffd000`ab932970 ffffe000`00000001 : 00000000`fd43d120 00000000`00000002 00000000`00000000 ffffe000`509af1a0 : 0xffffd000`ab932a40
ffffd000`ab932978 00000000`fd43d120 : 00000000`00000002 00000000`00000000 ffffe000`509af1a0 00000000`00010000 : 0xffffe000`00000001
ffffd000`ab932980 00000000`00000002 : 00000000`00000000 ffffe000`509af1a0 00000000`00010000 00000000`00000000 : 0xfd43d120
ffffd000`ab932988 00000000`00000000 : ffffe000`509af1a0 00000000`00010000 00000000`00000000 ffffd000`ab932a40 : 0x2


STACK_COMMAND:  kb

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 46940 instance(s) of page corruption, target is likely to have memory corruption.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000126c, (reserved)
Arg3: 000000002d8f13b0, Memory contents of the pool block
Arg4: ffffe0002cd93828, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff801a3eefb78
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

POOL_ADDRESS:  ffffe0002cd93828

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  java.exe

CURRENT_IRQL:  2

BAD_PAGES_DETECTED: b73a

LAST_CONTROL_TRANSFER:  from fffff801a3e4ccf7 to fffff801a3d5d780

STACK_TEXT:
fffff801`a5d4c6c8 fffff801`a3e4ccf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`2d8f13b0 : nt!KeBugCheckEx
fffff801`a5d4c6d0 fffff800`5bd84a20 : 0000007f`0000007f 00000000`00000001 ffffffff`00000001 00000000`ffffffff : nt!ExDeferredFreePool+0x547
fffff801`a5d4c7b0 fffff800`5cb35c32 : 00000000`00000000 ffffe000`28a6f1a0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0
fffff801`a5d4c800 fffff800`5bd51781 : ffffe000`28a6f030 00000000`00000001 ffffe000`26915000 ffffe000`24d55911 : tcpip!FlpReturnNetBufferListChain+0x8a272
fffff801`a5d4c850 fffff800`5ca823d3 : 00000000`00000002 ffffe000`26915000 00000000`00000400 ffffe000`2dab2401 : NETIO!NetioDereferenceNetBufferList+0x161
fffff801`a5d4c8d0 fffff800`5ca4b959 : ffffe000`23cd2f00 fffff800`5d9e0002 00000000`00000000 ffffd001`64c47a1a : tcpip!InetInspectReceiveTcpDatagram+0x593
fffff801`a5d4c9e0 fffff800`5ca7edc7 : ffffe000`2479eada fffff801`a5d4cd30 00000000`00000002 00000000`a2c77592 : tcpip!TcpListenerReceive+0x1e9
fffff801`a5d4cc30 fffff800`5ca7e475 : 00000000`00000000 00000000`0019464a ffffd001`64c47a22 00000092`fa2c19f2 : tcpip!TcpMatchReceive+0x597
fffff801`a5d4cee0 fffff800`5ca7d213 : ffffe000`2555aaa0 fffff801`a5d4e7c2 fffff801`a5d4bfe7 ffffe000`293aa000 : tcpip!TcpPreValidatedReceive+0x385
fffff801`a5d4cfd0 fffff800`5ca7cd80 : 00000000`00000000 00000000`00000000 ffff2346`57c8ce3d 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x73
fffff801`a5d4d090 fffff800`5ca7c438 : 00000000`e0000001 00000000`00000000 00000000`00000000 fffff801`a5d4d199 : tcpip!IppProcessDeliverList+0x60
fffff801`a5d4d100 fffff800`5ca7d818 : fffff800`5cbec000 ffffe000`255ec940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388
fffff801`a5d4d200 fffff800`5cabe1ff : ffffe000`23cc8700 ffffe000`28a6f030 fffff801`a5d4d401 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
fffff801`a5d4d320 fffff800`5cabd85e : 00000000`00000002 fffff801`00000001 fffff800`5caab9c0 00000000`28a6f001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
fffff801`a5d4d400 fffff801`a3cc1e95 : 00000000`00000002 ffffe000`2e30a800 fffff800`5cabd790 fffff801`a5d4d5b0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
fffff801`a5d4d530 fffff800`5caabb46 : ffffe000`2553f860 00000000`00000000 ffffe000`2553ee30 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
fffff801`a5d4d580 fffff800`5bc32d97 : ffffe000`2b5b9580 fffff801`a5d4d670 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6
fffff801`a5d4d600 fffff800`5bc32558 : ffffe000`2b5b9580 ffffe000`28a6f030 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
fffff801`a5d4d6b0 fffff800`5bc3eef5 : ffffe000`248ba1a0 fffff801`00000001 ffffe000`248ba1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318
fffff801`a5d4d7b0 fffff800`5bc33d73 : 00000000`003da58f fffff801`a5d4d900 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x85
fffff801`a5d4d800 fffff800`5bf3959c : 00000000`00000000 00000000`000001e1 003f0022`00650000 fffff801`a5d4da70 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
fffff801`a5d4d980 00000000`00000000 : 00000000`000001e1 003f0022`00650000 fffff801`a5d4da70 ffffe000`00000001 : L1C63x64+0x959c


STACK_COMMAND:  kb

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 46906 instance(s) of page corruption, target is likely to have memory corruption.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000126c, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: ffffe000b0eeac08, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff8024d0deb78
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

OVERLAPPED_MODULE: Address regions for 'dxgmms2' and 'dump_storpor' overlap

POOL_ADDRESS:  ffffe000b0eeac08

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

BAD_PAGES_DETECTED: b439

LAST_CONTROL_TRANSFER:  from fffff8024d03bcf7 to fffff8024cf4c780

STACK_TEXT: 
ffffd000`6c923698 fffff802`4d03bcf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00000000 : nt!KeBugCheckEx
ffffd000`6c9236a0 fffff801`de784a20 : 00000000`00000000 0000bb01`13ce0002 00000000`00000006 00000000`00000000 : nt!ExDeferredFreePool+0x547
ffffd000`6c923780 fffff801`de8f5c32 : ffffe000`b0f79c00 ffffe000`adaccf50 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0
ffffd000`6c9237d0 fffff801`de751781 : ffffe000`adaccde0 00000000`00000001 ffffe000`ab915000 ffffe000`a9f2ad91 : tcpip!FlpReturnNetBufferListChain+0x8a272
ffffd000`6c923820 fffff801`de8423d3 : 00000001`00001348 ffffe000`ab915000 00000000`00000000 ffffe000`a9f2ae01 : NETIO!NetioDereferenceNetBufferList+0x161
ffffd000`6c9238a0 fffff801`de80b959 : ffffe000`a8cccf00 ffffe000`adac0002 00000000`00000000 ffffd000`6cfc921a : tcpip!InetInspectReceiveTcpDatagram+0x593
ffffd000`6c9239b0 fffff801`de83edc7 : ffffe000`a927897a ffffd000`6c923d00 00000000`00000002 00000000`a23d0233 : tcpip!TcpListenerReceive+0x1e9
ffffd000`6c923c00 fffff801`de83e475 : 00000000`00000000 00000000`00194649 ffffd000`6cfc9222 0000000c`e362f6e6 : tcpip!TcpMatchReceive+0x597
ffffd000`6c923eb0 fffff801`de83d213 : ffffe000`aa7d6670 ffffd000`6c92e7c2 ffffd000`6c92fadd 00000000`00000003 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`6c923fa0 fffff801`de83cd80 : ffffd000`6c924078 fffff802`4d127180 ffff2240`6950e5de 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73
ffffd000`6c924060 fffff801`de83c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 ffffd000`6c924169 : tcpip!IppProcessDeliverList+0x60
ffffd000`6c9240d0 fffff801`de83d818 : fffff801`de9ac000 ffffe000`aa592940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388
ffffd000`6c9241d0 fffff801`de87e1ff : ffffe000`b0e1ccd0 ffffe000`adaccde0 ffffd000`6c924301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
ffffd000`6c9242f0 fffff801`de87d85e : ffffe000`b0560002 ffffd000`00000001 fffff801`de86b9c0 ffffd000`adaccd01 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffd000`6c9243d0 fffff802`4ceb0e95 : 00000000`00000002 ffffe000`aa3f4040 fffff801`de87d790 ffffd000`6c924580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
ffffd000`6c924500 fffff801`de86bb46 : ffffe000`aa53dc00 00000000`00000000 ffffe000`aa53dba0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd000`6c924550 fffff801`de632d97 : ffffe000`b0fb5c10 ffffd000`6c924640 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`6c9245d0 fffff801`de632558 : ffffe000`b0fb5c10 ffffe000`adaccde0 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
ffffd000`6c924680 fffff801`de63eef5 : ffffe000`ad0de1a0 ffffd000`00000001 ffffe000`ad0de1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318
ffffd000`6c924780 fffff801`de633d73 : 00000000`000567dc ffffd000`6c9248d0 00000000`00000000 00000000`00000100 : ndis!ndisCallReceiveHandler+0x85
ffffd000`6c9247d0 fffff801`e07a959c : 00000000`00000000 fffff801`000000c4 00000000`00000002 ffffd000`6c924a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
ffffd000`6c924950 00000000`00000000 : fffff801`000000c4 00000000`00000002 ffffd000`6c924a40 ffffe000`00000001 : L1C63x64+0x959c


STACK_COMMAND:  kb

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 46137 instance(s) of page corruption, target is likely to have memory corruption.
 
Last edited by a moderator:
  • Like
Reactions: TheBlue262
Upvote 0
S

Smith83

Make sure and create a new restore point prior to performing these steps.


Use the Everything search engine, then copy and paste the update numbers below into the everything search bar. Then delete the updates with Unlocker.

You will need to watch out when installing unlocker, although it is a free program that works very well. It is bundled with crapware.

TMHndNV.png



Code:
KB3149135
KB3163018

After the removal of the updates, then perform a total Tcpip Stack reset....

Download the Net Adapter Repair All In One Please use this direct link

Save the application to your desktop, right click and run as administrator.

Note: Your ethernet cable must be plugged in during this process!!

Click the Advanced repair.

sWXKRBM.png



  • Click OK at the prompt to continue.
  • The program will need to reboot your machine, allow it to do so.
  • Check your issue.
  • If the issue still persist re-open (as administrator) the tool, check all boxes in the picture below.



rgoQl1n.png



Click Run All Selected.

Any prompts like the one below, select All Network Adapters.

LeQsE0q.png


Once you are prompted to restart the do so.

tuD0mCA.png


Check your issue. report back.
 
Upvote 0

TheBlue262

Level 3
Thread author
Verified
Well-known
Dec 24, 2015
128
Make sure and create a new restore point prior to performing these steps.


Use the Everything search engine, then copy and paste the update numbers below into the everything search bar. Then delete the updates with Unlocker.

You will need to watch out when installing unlocker, although it is a free program that works very well. It is bundled with crapware.

TMHndNV.png



Code:
KB3149135
KB3163018

After the removal of the updates, then perform a total Tcpip Stack reset....

Download the Net Adapter Repair All In One Please use this direct link

Save the application to your desktop, right click and run as administrator.

Note: Your ethernet cable must be plugged in during this process!!

Click the Advanced repair.

sWXKRBM.png



  • Click OK at the prompt to continue.
  • The program will need to reboot your machine, allow it to do so.
  • Check your issue.
  • If the issue still persist re-open (as administrator) the tool, check all boxes in the picture below.



rgoQl1n.png



Click Run All Selected.

Any prompts like the one below, select All Network Adapters.

LeQsE0q.png


Once you are prompted to restart the do so.

tuD0mCA.png


Check your issue. report back.
Just to be sure, you want me to delete all the packages for KB3149135 and KB3163018 one by one using unlocker right?

Edit : There are 86 packages found for KB3149135, everytime I delete one, unlocker closes. Am I suppose to reopen it and do the same for the others everytime? Can I delete it through windows explorer or will that cause problems?
 
Upvote 0
S

Smith83

You type the KB number into everything search engine then click edit select all, then right click all highlighted items then delete with unlocker.
 
  • Like
Reactions: TheBlue262
Upvote 0

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top