avast bringt win 8 x64 MCE in den bluescreen
hier die minidump meldung
Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Brennen\111412-17253-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols;SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\Windows\System32
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16424.amd64fre.win8_gdr.120926-1855
Machine Name:
Kernel base = 0xfffff802ab885000 PsLoadedModuleList = 0xfffff802
abb4fa60
Debug session time: Wed Nov 14 07:46:27.869 2012 (UTC + 1:00)
System Uptime: 0 days 0:02:44.587
Loading Kernel Symbols
…
…
…
Loading User Symbols
Loading unloaded module list
…
-
*
-
Bugcheck Analysis *
-
*
Use !analyze -v to get detailed debugging information.
BugCheck D1, {38, 2, 0, fffff880064923aa}
*** ERROR: Module load completed but symbols could not be loaded for aswnet.sys
Probably caused by : aswnet.sys ( aswnet+313aa )
Followup: MachineOwner
0: kd> !analyze -v
-
*
-
Bugcheck Analysis *
-
*
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880064923aa, address which referenced memory
Debugging Details:
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff802abbdb168
GetUlongFromAddress: unable to read from fffff802abbdb1f8
0000000000000038 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
aswnet+313aa
fffff880`064923aa 483b7038 cmp rsi,qword ptr [rax+38h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AvastSvc.exe
TRAP_FRAME: fffff8800dfd44f0 – (.trap 0xfffff8800dfd44f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80072184a0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880064923aa rsp=fffff8800dfd4680 rbp=fffff880064924a8
r8=0000000000000006 r9=fffffa800a650910 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
aswnet+0x313aa:
fffff880064923aa 483b7038 cmp rsi,qword ptr [rax+38h] ds:00000000
00000038=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802ab8ff069 to fffff802ab8ffd40
STACK_TEXT:
fffff8800dfd43a8 fffff802
ab8ff069 : 000000000000000a 00000000
00000038 0000000000000002 00000000
00000000 : nt!KeBugCheckEx
fffff8800dfd43b0 fffff802
ab8fd8e0 : 0000000000000000 00000000
00000000 0000000000000000 fffff880
0dfd44f0 : nt!KiBugCheckDispatch+0x69
fffff8800dfd44f0 fffff880
064923aa : 0000000000000000 fffff880
064924a8 fffffa80090adaf0 fffff880
06494601 : nt!KiPageFault+0x260
fffff8800dfd4680 fffff880
0648e2ae : fffffa800a6651a0 fffffa80
0633da01 0000000000000011 fffffa80
08e8c430 : aswnet+0x313aa
fffff8800dfd4720 fffff880
0648f903 : fffffa800a6651a0 fffffa80
0633da70 fffff8800dfd4810 fffffa80
08f800a0 : aswnet+0x2d2ae
fffff8800dfd4770 fffff880
0648c8d1 : fffffa800633db50 fffffa80
0a635940 0000000000000000 00000000
00000000 : aswnet+0x2e903
fffff8800dfd47d0 fffff880
0648c391 : fffffa800633da70 00000000
00000000 0000000000000028 fffffa80
08f61930 : aswnet+0x2b8d1
fffff8800dfd4860 fffff880
0648c1d3 : fffffa800998b9e0 fffffa80
0998bab0 0000000000000001 fffffa80
0a079550 : aswnet+0x2b391
fffff8800dfd48d0 fffff880
0648b5f5 : fffff6800000f8c0 00000000
00000000 fffffa800a079520 00000000
00000001 : aswnet+0x2b1d3
fffff8800dfd4900 fffff880
06463f2a : fffffa800612f4c0 e6300001
391da867 00000000001391da 00000000
00000000 : aswnet+0x2a5f5
fffff8800dfd4930 fffff880
06463c34 : fffffa800998b9e0 fffff880
0dfd4c80 0000000000000001 00000000
00000001 : aswnet+0x2f2a
fffff8800dfd4960 fffff802
abce42ff : fffffa800998b9e0 00000000
00000000 fffffa800998b9e0 fffffa80
0998baf8 : aswnet+0x2c34
fffff8800dfd4990 fffff802
abce4c86 : 0000000000000000 00000000
77d62300 0000000000000001 00000000
01f17f94 : nt!IopXxxControlFile+0x7dd
fffff8800dfd4b20 fffff802
ab8fed53 : 00000000746c6644 fffff880
0dfd4c08 0000000000000000 00000000
0a97e300 : nt!NtDeviceIoControlFile+0x56
fffff8800dfd4b90 00000000
77d62ad2 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x13
000000000a97ec58 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x77d62ad2
STACK_COMMAND: kb
FOLLOWUP_IP:
aswnet+313aa
fffff880`064923aa 483b7038 cmp rsi,qword ptr [rax+38h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswnet+313aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswnet
IMAGE_NAME: aswnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 508e9a7f
FAILURE_BUCKET_ID: AV_aswnet+313aa
BUCKET_ID: AV_aswnet+313aa