Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works

Blue screen shutdown (tcpip.sys problem)...

  • Please log in to reply



    New Member

  • Member
  • Pip
  • 1 posts
Dear All,

My Asus laptop is giving blue screens. I am receiving it 2 times in 12 hours. Tcpip.sys is being shown as the problem on the blue screen.

Attached are the dump files in zip. Can you please help me to solve the problem?

Thanks very much in advance


Attached Files

  • Attached File  Dump.rar   42.13KB   93 downloads

  • 0




    New Member

  • Member
  • Pip
  • 7 posts
Window new framework update.
  • 0



    Certified monkey.

  • Member
  • PipPipPipPipPip
  • 2,773 posts
Open Command prompt.
Type Tasklist
Hit enter.
Right click the CMD
Select All
Paste results here in next reply.

Download Autoruns

Unzip it to your desktop and then double click autoruns.exe.
After the scan is finished then click on File>>>>>>>>>>>Save The default name will be autoruns.arn make sure to save it as Autoruns.txt under the file type option.
In other words make sure it is a .txt file instead of .arn Attach the text in your next reply.

Please download
Minitoolbox and run it.

Checkmark following boxes:

  • Flush DNS
  • Reset FF proxy Settings
  • Reset Ie Proxy Settings
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
  • List Devices (problems only)

Click Go and post the result.

Please upload all of your dump files as well.

*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *

An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001c92572, address which referenced memory

Debugging Details:

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

OVERLAPPED_MODULE: Address regions for 'EX64' and 'ENG64.SYS' overlap

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030af100
GetUlongFromAddress: unable to read from fffff800030af1c0
 0000000000000000 Nonpaged pool


tcpip! ?? ::FNODOBFM::`string'+5924
fffff880`01c92572 488b01          mov     rax,qword ptr [rcx]





TRAP_FRAME:  fffff88007349420 -- (.trap 0xfffff88007349420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001c92572 rsp=fffff880073495b0 rbp=0000000000000000
 r8=0000000000000000  r9=00000000000000d0 r10=fffff80002ff3b80
r11=fffffa8008494f40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
tcpip! ?? ::FNODOBFM::`string'+0x5924:
fffff880`01c92572 488b01          mov     rax,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e77129 to fffff80002e77b80

fffff880`073492d8 fffff800`02e77129 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`073492e0 fffff800`02e75da0 : fffff880`01d6e9a0 fffff880`01c5af57 fffff880`01d6e9a0 fffffa80`0801b550 : nt!KiBugCheckDispatch+0x69
fffff880`07349420 fffff880`01c92572 : fffffa80`0801b550 fffff880`0963c633 00000000`206c644d fffffa80`06c71000 : nt!KiPageFault+0x260
fffff880`073495b0 fffff880`01b4c316 : fffffa80`0801b550 00000000`00000005 00000000`00000001 fffffa80`50000001 : tcpip! ?? ::FNODOBFM::`string'+0x5924
fffff880`07349600 fffff880`01b4ba72 : 00000000`00000000 fffffa80`0b0bf1e0 00000000`00000000 fffffa80`0b0bf1e0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`07349630 fffff880`01c485b6 : 00000000`00000000 fffffa80`06c71001 fffff880`07349620 fffffa80`06b59900 : NETIO!NetioDereferenceNetBufferListChain+0x332
fffff880`07349700 fffff880`01cc5257 : fffffa80`0b0bf1e0 fffff880`01d6e9a0 fffff880`01d6e9a0 00000000`00000000 : tcpip!IppCompleteAndFreePacketList+0xc6
fffff880`07349730 fffff880`01d375a2 : fffffa80`08231950 00000000`00000000 fffffa80`07d92b01 fffffa80`0801b550 : tcpip! ?? ::FNODOBFM::`string'+0x43b24
fffff880`07349930 fffff880`01a09afa : fffffa80`0d475402 fffffa80`0d475450 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`07349970 fffff880`0963c5a2 : fffffa80`0d160160 fffffa80`080b8c68 fffff880`07349b00 00000000`00000801 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`07349a20 fffffa80`0d160160 : fffffa80`080b8c68 fffff880`07349b00 00000000`00000801 00000000`00000002 : nldrv+0xf5a2
fffff880`07349a28 fffffa80`080b8c68 : fffff880`07349b00 00000000`00000801 00000000`00000002 6c6d656d`00000001 : 0xfffffa80`0d160160
fffff880`07349a30 fffff880`07349b00 : 00000000`00000801 00000000`00000002 6c6d656d`00000001 fffffa80`0000000a : 0xfffffa80`080b8c68
fffff880`07349a38 00000000`00000801 : 00000000`00000002 6c6d656d`00000001 fffffa80`0000000a fffffa80`00000000 : 0xfffff880`07349b00
fffff880`07349a40 00000000`00000002 : 6c6d656d`00000001 fffffa80`0000000a fffffa80`00000000 fffffa80`00000000 : 0x801
fffff880`07349a48 6c6d656d`00000001 : fffffa80`0000000a fffffa80`00000000 fffffa80`00000000 fffff880`0963c620 : 0x2
fffff880`07349a50 fffffa80`0000000a : fffffa80`00000000 fffffa80`00000000 fffff880`0963c620 fffffa80`07d92b00 : 0x6c6d656d`00000001
fffff880`07349a58 fffffa80`00000000 : fffffa80`00000000 fffff880`0963c620 fffffa80`07d92b00 fffff880`01a0686d : 0xfffffa80`0000000a
fffff880`07349a60 fffffa80`00000000 : fffff880`0963c620 fffffa80`07d92b00 fffff880`01a0686d fffffa80`0b0bf1e0 : 0xfffffa80`00000000
fffff880`07349a68 fffff880`0963c620 : fffffa80`07d92b00 fffff880`01a0686d fffffa80`0b0bf1e0 fffffa80`0d475450 : 0xfffffa80`00000000
fffff880`07349a70 fffffa80`07d92b00 : fffff880`01a0686d fffffa80`0b0bf1e0 fffffa80`0d475450 fffffa80`0d475450 : nldrv+0xf620
fffff880`07349a78 fffff880`01a0686d : fffffa80`0b0bf1e0 fffffa80`0d475450 fffffa80`0d475450 00000000`00000000 : 0xfffffa80`07d92b00
fffff880`07349a80 fffff880`0963d0d1 : fffffa80`07d92b00 fffff880`07349b50 fffff880`07349b50 fffffa80`0cfcf220 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x20d
fffff880`07349ae0 fffffa80`07d92b00 : fffff880`07349b50 fffff880`07349b50 fffffa80`0cfcf220 fffffa80`07d92b00 : nldrv+0x100d1
fffff880`07349ae8 fffff880`07349b50 : fffff880`07349b50 fffffa80`0cfcf220 fffffa80`07d92b00 00000000`00000000 : 0xfffffa80`07d92b00
fffff880`07349af0 fffff880`07349b50 : fffffa80`0cfcf220 fffffa80`07d92b00 00000000`00000000 00000000`00000000 : 0xfffff880`07349b50
fffff880`07349af8 fffffa80`0cfcf220 : fffffa80`07d92b00 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`07349b50
fffff880`07349b00 fffffa80`07d92b00 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0d161198 : 0xfffffa80`0cfcf220
fffff880`07349b08 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`0d161198 00000000`00000000 : 0xfffffa80`07d92b00


fffff880`01b4c316 4885ff          test    rdi,rdi


SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferList+86

FOLLOWUP_NAME:  MachineOwner




FAILURE_BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

Followup: MachineOwner

  • 0

Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP