Od wczoraj mam problem z komputerem, mianowicie przy (np. włączaniu skype, odpalaniu filmików na YT, czy też graniu w gry) po około 5 minutach lub od razu po włączeniu na monitorze pokazuje mi się niebieski lub szaro-czarny kolor w zależności od aplikacji oraz zapętlający się dźwięk - wtedy trzeba zrestartować kompa. Czytałem już dużo o tym na forach i nareszcie użyłem debugging tools for windows 7 : Spróbujecie pomóc ?

(dodam jeszcze, iż komputer kupiony od miesiąca i problem pojawił się nagle)
Win 7 64 bit
karta graf: MSI Radeon r9 270x
procek: i5 4570
zasilacz: XFX Pro Series Core 550W
Wyniki Debugging Tools for Windows
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff800032d5c3f}
Unable to load image \SystemRoot\System32\Drivers\NISx64\1505000.013\SYMNETS.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for SYMNETS.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMNETS.SYS
Probably caused by : NETIO.SYS ( NETIO!WfpExpireEntryLru+17 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d5c3f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003504100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+4f
fffff800`032d5c3f 488713 xchg rdx,qword ptr [rbx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff880035d2230 -- (.trap 0xfffff880035d2230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8006a00b50 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff880035d2430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d5c3f rsp=fffff880035d23c0 rbp=fffffa8009cd4140
r8=fffff880035d2430 r9=0000000000000000 r10=fffff880035d1c70
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f:
fffff800`032d5c3f 488713 xchg rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032cc169 to fffff800032ccbc0
STACK_TEXT:
fffff880`035d20e8 fffff800`032cc169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`035d20f0 fffff800`032cade0 : 00000000`00000010 fffff880`035d2420 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`035d2230 fffff800`032d5c3f : 00000000`00000003 00000000`00000002 00000000`00000003 00000000`00000002 : nt!KiPageFault+0x260
fffff880`035d23c0 fffff880`01a2b9c7 : fffffa80`09cd4140 fffff880`035d26a0 00000000`00008900 fffff880`01ab643e : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f
fffff880`035d2410 fffff880`01ce508d : fffffa80`0bfc24f0 00000000`00000002 fffffa80`0b72a8a0 fffff880`035d26a0 : NETIO!WfpExpireEntryLru+0x17
fffff880`035d2460 fffff880`01cac7b7 : 00000000`00000004 fffff880`01a00030 fffffa80`0b815e60 fffff800`00000001 : tcpip!WfpAleCloseRemoteEndpointConnection+0x2d
fffff880`035d2490 fffff880`01d24e5b : fffffa80`0bfc24f0 fffffa80`0c0e843a 00000000`00000001 fffffa80`0bfc24f0 : tcpip! ?? ::FNODOBFM::`string'+0x20f72
fffff880`035d25e0 fffff880`01d251e2 : 00000089`00000000 fffffa80`0c0e8370 fffffa80`0a35e870 00000000`00000001 : tcpip!WfpAleHandleSendCompletion+0xeb
fffff880`035d2700 fffff880`01d2f6b2 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`0a363988 : tcpip!WfpAlepAuthorizeSendCompletion+0x32
fffff880`035d2750 fffff880`01badaf2 : fffffa80`00000089 fffff800`00000089 fffffa80`0c3f2510 00000000`00000001 : tcpip!WfpAleCompleteOperation+0x162
fffff880`035d27f0 fffff880`076c77bb : 00000000`00000000 00000000`00000000 fffffa80`06d5b130 00000000`00000030 : fwpkclnt!FwpsCompleteOperation0+0x1e
fffff880`035d2820 00000000`00000000 : 00000000`00000000 fffffa80`06d5b130 00000000`00000030 00000000`00000089 : SYMNETS+0x1e7bb
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!WfpExpireEntryLru+17
fffff880`01a2b9c7 488b4310 mov rax,qword ptr [rbx+10h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!WfpExpireEntryLru+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d
FAILURE_BUCKET_ID: X64_0xA_NETIO!WfpExpireEntryLru+17
BUCKET_ID: X64_0xA_NETIO!WfpExpireEntryLru+17
Followup: MachineOwner
---------