Hello gabby02,
I have checked your dump files and most of the crash related to Network I/O Subsystem.
Bugcheck code = 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL
It seems caused by 3rd driver (Network driver or Antivirus Driver)
Start with remove/uninstall completely McAfee Antivirus, just use MSE and MBAM for virus protection.
Then update your LAN driver (Realtek NIC driver) → click here
After that we'll see how things go.
LOG
Code:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`0305b670
Debug session time: Tue Dec 20 23:53:19.574 2011 (GMT-8)
System Uptime: 0 days 3:51:22.838
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff8800171bb2d}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800171bb2d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c5100
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`0171bb2d 448b5228 mov r10d,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880033ca520 -- (.trap 0xfffff880033ca520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800171bb2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa800421d170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`0171bb2d 448b5228 mov r10d,dword ptr [rdx+28h] ds:0011:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e921e9 to fffff80002e92c40
STACK_TEXT:
fffff880`033ca3d8 fffff800`02e921e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033ca3e0 fffff800`02e90e60 : 00000000`00000001 fffff880`01943dd2 fffff880`01a53800 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`033ca520 fffff880`0171bb2d : ffff0000`0299870f 00000000`00000001 00000000`00000016 fffffa80`079c4f58 : nt!KiPageFault+0x260
fffff880`033ca6b0 fffff880`01982bac : 00000000`00000000 fffff880`01951906 00000000`00000001 fffffa80`097577c0 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`033ca710 fffff880`0194eef3 : fffffa80`0421d170 00000000`00000001 fffffa80`09238220 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
fffff880`033ca780 fffff880`01941d54 : fffff880`033cac38 00000000`00000029 fffffa80`09238220 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
fffff880`033ca930 fffff880`0194067a : fffffa80`064c43a0 fffff880`01938b34 fffffa80`06355178 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`033caae0 fffff880`019422ab : fffffa80`08de2a3e fffffa80`064b1000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
fffff880`033cac30 fffff880`019391c7 : fffffa80`064c43a0 fffffa80`063998f9 fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
fffff880`033cad00 fffff880`01938d3a : 00000000`00000000 fffff880`01a53800 fffff880`033caec0 fffffa80`0471de20 : tcpip!IppDeliverListToProtocol+0x97
fffff880`033cadc0 fffff880`01938339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
fffff880`033cae60 fffff880`019360af : 00000000`00000000 00000000`07410800 fffff880`01a53800 fffff880`01a53800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033caf40 fffff880`019356a2 : fffffa80`0740f6e0 00000000`00000000 fffffa80`07410800 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033cb140 fffff880`019b434a : fffff880`033cb6c0 fffff880`033cb248 fffffa80`07410810 fffff880`01619569 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`033cb220 fffff800`02e9f618 : fffffa80`06fc81a0 00000000`00000000 fffffa80`03b4bb60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
fffff880`033cb270 fffff880`01935202 : fffff880`01934a60 00000000`00000002 fffff880`033cb300 fffff880`033cb301 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033cb350 fffff880`016d60eb : fffffa80`07424240 00000000`00000000 fffffa80`06ec31a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`0171bb2d 448b5228 mov r10d,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
Followup: MachineOwner
---------
2: kd> lmvm NETIO
start end module name
fffff880`0170a000 fffff880`0176a000 NETIO (pdb symbols) c:\symbols\netio.pdb\DD06DDC1DE2F426D85400E127C2DF49A2\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: C:\Symbols\NETIO.SYS\4CE7938160000\NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Sat Nov 20 01:23:13 2010 (4CE79381)
CheckSum: 00066D17
ImageSize: 00060000
File version: 6.1.7601.17514
Product version: 6.1.7601.17514
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.1.7601.17514
FileVersion: 6.1.7601.17514 (win7sp1_rtm.101119-1850)
FileDescription: Network I/O Subsystem
LegalCopyright: © Microsoft Corporation. All rights reserved.
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`03056670
Debug session time: Tue Dec 20 07:29:06.875 2011 (GMT-8)
System Uptime: 0 days 7:40:12.765
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff88001611b2d}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001611b2d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c0100
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`01611b2d 448b5228 mov r10d,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880033ca520 -- (.trap 0xfffff880033ca520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001611b2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa80095f0110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`01611b2d 448b5228 mov r10d,dword ptr [rdx+28h] ds:5e02:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8d1e9 to fffff80002e8dc40
STACK_TEXT:
fffff880`033ca3d8 fffff800`02e8d1e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033ca3e0 fffff800`02e8be60 : fffffa80`078f9948 fffff800`03018348 00000000`00000002 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`033ca520 fffff880`01611b2d : 00000000`0000001a fffff880`018ecfec 00000000`0000000d fffffa80`095071b8 : nt!KiPageFault+0x260
fffff880`033ca6b0 fffff880`01974bac : 00000000`00000000 fffff880`01943906 00000000`00000001 fffffa80`09f75e40 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`033ca710 fffff880`01940ef3 : fffffa80`095f0110 00000000`00000001 fffffa80`09fc9cf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
fffff880`033ca780 fffff880`01933d54 : fffff880`033cac38 00000000`00000029 fffffa80`09fc9cf0 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
fffff880`033ca930 fffff880`0193267a : fffffa80`06388f00 fffff880`0192ab34 fffffa80`06346808 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`033caae0 fffff880`019342ab : fffffa80`07635a3e fffffa80`064a1000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
fffff880`033cac30 fffff880`0192b1c7 : fffffa80`06388f00 fffffa80`0638aef7 fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
fffff880`033cad00 fffff880`0192ad3a : 00000000`00000000 fffff880`01a45800 fffff880`033caec0 fffffa80`09faca10 : tcpip!IppDeliverListToProtocol+0x97
fffff880`033cadc0 fffff880`0192a339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
fffff880`033cae60 fffff880`019280af : 00000000`00000000 00000000`07227000 fffff880`01a45800 fffff880`01a45800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033caf40 fffff880`019276a2 : fffffa80`072210b0 00000000`00000000 fffffa80`07227000 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033cb140 fffff880`019a634a : fffff880`033cb490 00000000`00000000 fffffa80`07227010 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`033cb220 fffff800`02e9a618 : fffffa80`00000001 fffffa80`07736030 fffffa80`03b4bb60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
fffff880`033cb270 fffff880`01927202 : fffff880`01926a60 00000000`00000002 00000000`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033cb350 fffff880`017750eb : fffffa80`07229010 00000000`00000000 fffffa80`06eea1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`01611b2d 448b5228 mov r10d,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
Followup: MachineOwner
---------
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e66000 PsLoadedModuleList = 0xfffff800`030ab670
Debug session time: Sat Jan 7 19:34:03.145 2012 (GMT-8)
System Uptime: 0 days 3:47:02.035
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff8800172bb2d}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800172bb2d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003115100
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`0172bb2d 448b5228 mov r10d,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880033ca520 -- (.trap 0xfffff880033ca520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800172bb2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa800427c7d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`0172bb2d 448b5228 mov r10d,dword ptr [rdx+28h] ds:7f02:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ee21e9 to fffff80002ee2c40
STACK_TEXT:
fffff880`033ca3d8 fffff800`02ee21e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033ca3e0 fffff800`02ee0e60 : 00000000`00000000 fffff880`018c0dd2 ffffffff`ffffff02 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`033ca520 fffff880`0172bb2d : 00000000`000000ca fffff880`01877fec 00000000`0000000d fffffa80`076dfad8 : nt!KiPageFault+0x260
fffff880`033ca6b0 fffff880`018ffbac : 00000000`00000000 fffff880`018ce906 00000000`00000001 fffffa80`04357f40 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`033ca710 fffff880`018cbef3 : fffffa80`0427c7d0 00000000`00000001 fffffa80`0736b250 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
fffff880`033ca780 fffff880`018bed54 : fffff880`033cac38 00000000`00000029 fffffa80`0736b250 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
fffff880`033ca930 fffff880`018bd67a : fffffa80`06374950 fffff880`018b5b34 fffffa80`04a84a60 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`033caae0 fffff880`018bf2ab : fffff880`08d066d2 fffffa80`06491000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
fffff880`033cac30 fffff880`018b61c7 : fffffa80`06374950 fffffa80`06379cff fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
fffff880`033cad00 fffff880`018b5d3a : 00000000`00000000 fffff880`019d0800 fffff880`033caec0 fffffa80`0489de20 : tcpip!IppDeliverListToProtocol+0x97
fffff880`033cadc0 fffff880`018b5339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
fffff880`033cae60 fffff880`018b30af : 00000000`00000000 00000000`07215000 fffff880`019d0800 fffff880`019d0800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033caf40 fffff880`018b26a2 : fffffa80`07219010 00000000`00000000 fffffa80`07215000 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033cb140 fffff880`0193134a : fffff880`033cb490 00000000`00000000 fffffa80`07215010 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`033cb220 fffff800`02eef618 : 00000000`00000000 fffffa80`06d1d1a0 fffffa80`03b5b040 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
fffff880`033cb270 fffff880`018b2202 : fffff880`018b1a60 00000000`00000002 00000000`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033cb350 fffff880`016e60eb : fffffa80`07216780 00000000`00000000 fffffa80`06d1d1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`0172bb2d 448b5228 mov r10d,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
Followup: MachineOwner
---------
2: kd> lmvm NETIO
start end module name
fffff880`0171a000 fffff880`0177a000 NETIO (pdb symbols) c:\symbols\netio.pdb\DD06DDC1DE2F426D85400E127C2DF49A2\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: C:\Symbols\NETIO.SYS\4CE7938160000\NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Sat Nov 20 01:23:13 2010 (4CE79381)
CheckSum: 00066D17
ImageSize: 00060000
File version: 6.1.7601.17514
Product version: 6.1.7601.17514
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.1.7601.17514
FileVersion: 6.1.7601.17514 (win7sp1_rtm.101119-1850)
FileDescription: Network I/O Subsystem
LegalCopyright: © Microsoft Corporation. All rights reserved.