BSOD while surfing the net


  1. Posts : 25
    Windows 7 Home Premium 64bit
       #1

    BSOD while surfing the net


    While i was surfing the net,my computer encountered a BSOD,however,it auto restarts and i could not get a glimpse of the BSOD error.I had a past BSOD error 1E before but i ignored it.
    Ill upload my files.I'm no computer expert,so just explain the problem in simple english,thank you very much.
      My Computer


  2. Posts : 15,026
    Windows 10 Home 64Bit
       #2

    Welcome to SevenForums.

    A driver from Norton is causing it: Driver Reference Table - IDSvia64.sys
    Code:
    fffff880`098372b8  fffff880`06b2bf3fUnable to load image IDSvia64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for IDSvia64.sys
    *** ERROR: Module load completed but symbols could not be loaded for IDSvia64.sys
     IDSvia64+0x37f3f
    Norton tends to cause BSOD-s. I would recommend uninstalling it with the Norton Removal Tool and replace with Microsoft Security Essentials To Test. Please remove this software as well:
    Code:
    Start Menu\Programs\IObit Malware Fighter	Public:Start Menu\Programs\IObit Malware Fighter	Public

    Microsoft Security Essentials.

    Recommended from a strict BSOD perspective, compatibility & stability compared to other antiviruses/internet security software. It is free and lightweight:-
       Warning
    Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.

    Run a full scan with both (separately) once downloaded, installed and updated.
    Perform a System File Check:
    1. Click on the start
    2. Type CMD on Search
    3. Left click and Run as Administrator
    4. Type SFC /scannow

    Full tutorial here:

    Disk Check on your hard drive for file system errors and bad sectors on it:

    Reduce items at start-up. Nothing except anti-virus is required plus improves the time for logging in windows.

    Let us know the results.

    BSOD BUGCHECK SUMMARY

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {8, 2, 0, fffff88001767a1d}
    
    Probably caused by : NETIO.SYS ( NETIO!CalloutStreamDataInit+1d )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001767a1d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310c100
    GetUlongFromAddress: unable to read from fffff8000310c1c0
     0000000000000008 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!CalloutStreamDataInit+1d
    fffff880`01767a1d 488b5808        mov     rbx,qword ptr [rax+8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  firefox.exe
    
    TRAP_FRAME:  fffff88009837320 -- (.trap 0xfffff88009837320)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80070c2b80
    rdx=fffffa800a109a10 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001767a1d rsp=fffff880098374b0 rbp=fffffa800a1099e0
     r8=fffff88009837530  r9=0000000000000000 r10=0000000000000163
    r11=0000000000000160 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    NETIO!CalloutStreamDataInit+0x1d:
    fffff880`01767a1d 488b5808        mov     rbx,qword ptr [rax+8] ds:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002edc569 to fffff80002edcfc0
    
    STACK_TEXT:  
    fffff880`098371d8 fffff800`02edc569 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`098371e0 fffff800`02edb1e0 : fffff880`09837398 00000000`00000000 00000000`00000000 fffff880`098376d0 : nt!KiBugCheckDispatch+0x69
    fffff880`09837320 fffff880`01767a1d : fffffa80`070c2c18 fffffa80`070c2c10 00000000`00000001 fffff880`0177b863 : nt!KiPageFault+0x260
    fffff880`098374b0 fffff880`017710b4 : fffff880`098376d0 fffff880`098376d0 fffff880`098378d0 fffff880`0176f77d : NETIO!CalloutStreamDataInit+0x1d
    fffff880`098374f0 fffff880`0177ce78 : 00000000`00000000 fffff880`098378d0 fffff880`09837680 fffff880`09837708 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x54
    fffff880`09837590 fffff880`0177de71 : fffffa80`0a1099e0 fffff880`098378d0 fffff880`098376d0 fffff880`09837d30 : NETIO!StreamCalloutProcessData+0x48
    fffff880`098375e0 fffff880`0177eec8 : fffff880`098376d0 fffff880`09837d30 fffff880`09837801 fffffa80`0a1099e0 : NETIO!StreamCalloutProcessingLoop+0xa1
    fffff880`09837670 fffff880`0175fa2a : fffff880`098378d0 fffff880`06b0dc30 00000000`00000000 fffff880`09830014 : NETIO!StreamProcessCallout+0x1e8
    fffff880`09837760 fffff880`01746f58 : fffff880`09830014 fffff880`09837e30 fffffa80`099a2e08 fffff880`09837d30 : NETIO! ?? ::FNODOBFM::`string'+0x71f2
    fffff880`09837880 fffff880`017485d2 : fffff880`09830014 fffff880`09837e30 fffff880`09837ec0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x238
    fffff880`09837950 fffff880`01781ee9 : fffff880`09838100 fffff880`09837e30 fffffa80`00000001 fffff880`09837d30 : NETIO!KfdClassify+0x934
    fffff880`09837cc0 fffff880`017823a9 : fffffa80`099a2db0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x109
    fffff880`09837de0 fffff880`01782aec : fffffa80`070d3730 fffffa80`07114920 fffffa80`0a0ab000 fffffa80`0918d740 : NETIO!StreamCommonInspect+0x249
    fffff880`098380c0 fffff880`0194a0c4 : fffffa80`099a2db0 fffffa80`0a0ab010 00000000`00000000 00000000`00000014 : NETIO!WfpStreamInspectSend+0x11c
    fffff880`09838140 fffff880`019023d6 : fffff880`09838470 00000000`00000000 fffff880`09838360 fffff880`09838470 : tcpip!InetInspectSend+0x34
    fffff880`09838170 fffff880`018a76ab : 00000000`00000000 fffff800`03064588 00000000`00004800 00000000`00000801 : tcpip! ?? ::FNODOBFM::`string'+0x43782
    fffff880`09838220 fffff800`02ee8c48 : fffff800`0304fe80 00000000`00000201 fffff800`03064f10 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
    fffff880`09838250 fffff880`018a856a : fffff880`018a7690 fffffa80`072c42d0 fffffa80`090d2b00 fffff880`02eb8601 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`09838330 fffff880`02ed2b2b : fffffa80`06d9a5c0 fffff880`09838b60 00000000`00000163 fffffa80`0a1617e0 : tcpip!TcpTlConnectionSend+0x7a
    fffff880`098383a0 fffff880`02eb7469 : fffff880`00000001 00000000`000007ff 00000000`00000000 00000000`c00000a3 : afd!AfdFastConnectionSend+0x38b
    fffff880`09838560 fffff800`031f33f3 : 00000000`00000163 fffffa80`0a0e9ca0 00000000`042cf6c4 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459
    fffff880`098388d0 fffff800`031f3ee6 : 00000000`0000c08e 00000000`0000022c 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
    fffff880`09838a00 fffff800`02edc253 : 00000000`0000c08e fffff960`000f282a 00000000`00000000 00000000`00f8ae20 : nt!NtDeviceIoControlFile+0x56
    fffff880`09838a70 00000000`74d32e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`00eceef8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74d32e09
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!CalloutStreamDataInit+1d
    fffff880`01767a1d 488b5808        mov     rbx,qword ptr [rax+8]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!CalloutStreamDataInit+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5034f6a0
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!CalloutStreamDataInit+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!CalloutStreamDataInit+1d
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 25
    Windows 7 Home Premium 64bit
    Thread Starter
       #3

    Thank you for the response.
    After conducting both scans,no malware or spyware was found and that there was no violation of integrity after executing the sfc /scannow command.
    I have used the good and free security combination instead of norton,however,it was such a bummer that i paid 50 dollars for a product that cause problem with my computer.I have a hunch that norton might have created previous
    BSOD before,but Im not so sure. Thanks again
      My Computer


  4. Posts : 15,026
    Windows 10 Home 64Bit
       #4

    You're welcome. Just post if you have problems again.

    Good luck. :)
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 20:19.
Find Us