Ih8mypc
Your Kaspersky is killing netio.sys. I would remove it and use the built in defender in its place
*** WARNING: Unable to verify timestamp for klwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
*** WARNING: Unable to verify timestamp for kneps.sys
*** ERROR: Module load completed but symbols could not be loaded for kneps.sys
GetPointerFromAddress: unable to read from fffff801ba7c9150
GetUlongFromAddress: unable to read from fffff801ba7c9208
Probably caused by : NETIO.SYS ( NETIO! ?? ::FNODOBFM::`string'+797c )
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001205, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: ffffe00006af8b58, Address of the block of pool being deallocated
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap
POOL_ADDRESS: ffffe00006af8b58 Nonpaged pool
FREED_POOL_TAG: NDnd
BUGCHECK_STR: 0xc2_7_NDnd
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff801ba70e3ca to fffff801ba5c9ca0
STACK_TEXT:
ffffd000`20850008 fffff801`ba70e3ca : 00000000`000000c2 00000000`00000007 00000000`00001205 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20850010 fffff800`01635f67 : ffffe000`07a9a1f0 ffffe000`0153f030 ffffe000`01607801 fffff800`01cb4646 : nt!ExFreePoolWithTag+0x10fa
ffffd000`208500e0 fffff800`01b3b4a4 : ffffe000`04533702 ffffe000`0a02bdb0 00000000`00000001 fffff800`01cb51c5 : NETIO! ?? ::FNODOBFM::`string'+0x797c
ffffd000`20850130 fffff800`01604501 : ffffe000`01607830 00000000`00000001 00000000`00000000 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd7504
ffffd000`20850180 fffff800`016013e7 : ffffe000`0153f030 00000000`00000000 00000000`00000000 ffffe000`01607830 : NETIO!NetioDereferenceNetBufferList+0xb1
ffffd000`208501f0 fffff800`01a6849b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2a7
ffffd000`208502b0 fffff800`01a653da : ffffe000`0153f030 00000000`019e7001 ffffe000`01be6000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x55b
ffffd000`208503e0 fffff800`01b9ac94 : ffffe000`05796880 00000000`00000000 ffffe000`019e7001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`20850760 fffff800`01ca76d5 : ffffe000`098d0402 ffffe000`0039f110 ffffd000`20850a99 ffffd000`2084b000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`208507c0 fffff801`ba5343f9 : ffffd000`208509ba fffff800`0140532e ffffe000`04533750 ffffe000`04533750 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`20850850 fffff800`01cb86b6 : fffff800`01ca75f0 ffffd000`20850a20 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`208509a0 fffff800`029ca5b3 : ffffe000`04533750 ffffe000`0a02bd10 fffff800`01422400 ffffe000`0a02bd10 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`20850ae0 ffffe000`04533750 : ffffe000`0a02bd10 fffff800`01422400 ffffe000`0a02bd10 ffffd000`20850017 : klwfp+0x45b3
ffffd000`20850ae8 ffffe000`0a02bd10 : fffff800`01422400 ffffe000`0a02bd10 ffffd000`20850017 00000000`00000001 : 0xffffe000`04533750
ffffd000`20850af0 fffff800`01422400 : ffffe000`0a02bd10 ffffd000`20850017 00000000`00000001 fffff800`00000004 : 0xffffe000`0a02bd10
ffffd000`20850af8 ffffe000`0a02bd10 : ffffd000`20850017 00000000`00000001 fffff800`00000004 fffff800`00000000 : kneps+0x22400
ffffd000`20850b00 ffffd000`20850017 : 00000000`00000001 fffff800`00000004 fffff800`00000000 ffffe000`0153f030 : 0xffffe000`0a02bd10
ffffd000`20850b08 00000000`00000001 : fffff800`00000004 fffff800`00000000 ffffe000`0153f030 fffff800`029ca414 : 0xffffd000`20850017
ffffd000`20850b10 fffff800`00000004 : fffff800`00000000 ffffe000`0153f030 fffff800`029ca414 ffffe000`0a02bd10 : 0x1
ffffd000`20850b18 fffff800`00000000 : ffffe000`0153f030 fffff800`029ca414 ffffe000`0a02bd10 ffffe000`096a7b30 : 0xfffff800`00000004
ffffd000`20850b20 ffffe000`0153f030 : fffff800`029ca414 ffffe000`0a02bd10 ffffe000`096a7b30 fffff800`014224f0 : 0xfffff800`00000000
ffffd000`20850b28 fffff800`029ca414 : ffffe000`0a02bd10 ffffe000`096a7b30 fffff800`014224f0 fffff800`029ca76e : 0xffffe000`0153f030
ffffd000`20850b30 ffffe000`0a02bd10 : ffffe000`096a7b30 fffff800`014224f0 fffff800`029ca76e 00000000`00000000 : klwfp+0x4414
ffffd000`20850b38 ffffe000`096a7b30 : fffff800`014224f0 fffff800`029ca76e 00000000`00000000 ffffe000`0a02bd10 : 0xffffe000`0a02bd10
ffffd000`20850b40 fffff800`014224f0 : fffff800`029ca76e 00000000`00000000 ffffe000`0a02bd10 00000000`00000080 : 0xffffe000`096a7b30
ffffd000`20850b48 fffff800`029ca76e : 00000000`00000000 ffffe000`0a02bd10 00000000`00000080 ffffe000`096a7b30 : kneps+0x224f0
ffffd000`20850b50 00000000`00000000 : ffffe000`0a02bd10 00000000`00000080 ffffe000`096a7b30 ffffe000`04f0b440 : klwfp+0x476e
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO! ?? ::FNODOBFM::`string'+797c
fffff800`01635f67 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO! ?? ::FNODOBFM::`string'+797c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f7e4
IMAGE_VERSION: 6.3.9600.16384
BUCKET_ID_FUNC_OFFSET: 797c
FAILURE_BUCKET_ID: 0xc2_7_NDnd_NETIO!_??_::FNODOBFM::_string_
BUCKET_ID: 0xc2_7_NDnd_NETIO!_??_::FNODOBFM::_string_
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_7_ndnd_netio!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {fc6e9aa1-b899-d40c-eb82-38a4130ba536}
Followup: MachineOwner
---------