avast bringt win 8 x64 MCE in den bluescreen
hier die minidump meldung
Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Brennen\111412-17253-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols;SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\Windows\System32
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16424.amd64fre.win8_gdr.120926-1855
Machine Name:
Kernel base = 0xfffff802ab885000 PsLoadedModuleList = 0xfffff802abb4fa60
Debug session time: Wed Nov 14 07:46:27.869 2012 (UTC + 1:00)
System Uptime: 0 days 0:02:44.587
Loading Kernel Symbols
…
…
…
Loading User Symbols
Loading unloaded module list
…
-
* -
Bugcheck Analysis * -
*
Use !analyze -v to get detailed debugging information.
BugCheck D1, {38, 2, 0, fffff880064923aa}
*** ERROR: Module load completed but symbols could not be loaded for aswnet.sys
Probably caused by : aswnet.sys ( aswnet+313aa )
Followup: MachineOwner
0: kd> !analyze -v
-
* -
Bugcheck Analysis * -
*
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880064923aa, address which referenced memory
Debugging Details:
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff802abbdb168
GetUlongFromAddress: unable to read from fffff802abbdb1f8
0000000000000038 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
aswnet+313aa
fffff880`064923aa 483b7038 cmp rsi,qword ptr [rax+38h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AvastSvc.exe
TRAP_FRAME: fffff8800dfd44f0 – (.trap 0xfffff8800dfd44f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80072184a0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880064923aa rsp=fffff8800dfd4680 rbp=fffff880064924a8
r8=0000000000000006 r9=fffffa800a650910 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
aswnet+0x313aa:
fffff880064923aa 483b7038 cmp rsi,qword ptr [rax+38h] ds:0000000000000038=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802ab8ff069 to fffff802ab8ffd40
STACK_TEXT:
fffff8800dfd43a8 fffff802ab8ff069 : 000000000000000a 0000000000000038 0000000000000002 0000000000000000 : nt!KeBugCheckEx
fffff8800dfd43b0 fffff802ab8fd8e0 : 0000000000000000 0000000000000000 0000000000000000 fffff8800dfd44f0 : nt!KiBugCheckDispatch+0x69
fffff8800dfd44f0 fffff880064923aa : 0000000000000000 fffff880064924a8 fffffa80090adaf0 fffff88006494601 : nt!KiPageFault+0x260
fffff8800dfd4680 fffff8800648e2ae : fffffa800a6651a0 fffffa800633da01 0000000000000011 fffffa8008e8c430 : aswnet+0x313aa
fffff8800dfd4720 fffff8800648f903 : fffffa800a6651a0 fffffa800633da70 fffff8800dfd4810 fffffa8008f800a0 : aswnet+0x2d2ae
fffff8800dfd4770 fffff8800648c8d1 : fffffa800633db50 fffffa800a635940 0000000000000000 0000000000000000 : aswnet+0x2e903
fffff8800dfd47d0 fffff8800648c391 : fffffa800633da70 0000000000000000 0000000000000028 fffffa8008f61930 : aswnet+0x2b8d1
fffff8800dfd4860 fffff8800648c1d3 : fffffa800998b9e0 fffffa800998bab0 0000000000000001 fffffa800a079550 : aswnet+0x2b391
fffff8800dfd48d0 fffff8800648b5f5 : fffff6800000f8c0 0000000000000000 fffffa800a079520 0000000000000001 : aswnet+0x2b1d3
fffff8800dfd4900 fffff88006463f2a : fffffa800612f4c0 e6300001391da867 00000000001391da 0000000000000000 : aswnet+0x2a5f5
fffff8800dfd4930 fffff88006463c34 : fffffa800998b9e0 fffff8800dfd4c80 0000000000000001 0000000000000001 : aswnet+0x2f2a
fffff8800dfd4960 fffff802abce42ff : fffffa800998b9e0 0000000000000000 fffffa800998b9e0 fffffa800998baf8 : aswnet+0x2c34
fffff8800dfd4990 fffff802abce4c86 : 0000000000000000 0000000077d62300 0000000000000001 0000000001f17f94 : nt!IopXxxControlFile+0x7dd
fffff8800dfd4b20 fffff802ab8fed53 : 00000000746c6644 fffff8800dfd4c08 0000000000000000 000000000a97e300 : nt!NtDeviceIoControlFile+0x56
fffff8800dfd4b90 0000000077d62ad2 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x13
000000000a97ec58 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x77d62ad2
STACK_COMMAND: kb
FOLLOWUP_IP:
aswnet+313aa
fffff880`064923aa 483b7038 cmp rsi,qword ptr [rax+38h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswnet+313aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswnet
IMAGE_NAME: aswnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 508e9a7f
FAILURE_BUCKET_ID: AV_aswnet+313aa
BUCKET_ID: AV_aswnet+313aa