avast bringt win 8 x64 MCE in den bluescreen
hier die minidump meldung
Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Brennen\111412-17253-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is:
http://msdl.microsoft.com/download/symbols;SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\Windows\System32
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16424.amd64fre.win8_gdr.120926-1855
Machine Name:
Kernel base = 0xfffff802`ab885000 PsLoadedModuleList = 0xfffff802`abb4fa60
Debug session time: Wed Nov 14 07:46:27.869 2012 (UTC + 1:00)
System Uptime: 0 days 0:02:44.587
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {38, 2, 0, fffff880064923aa}
*** ERROR: Module load completed but symbols could not be loaded for aswnet.sys
Probably caused by : aswnet.sys ( aswnet+313aa )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880064923aa, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff802abbdb168
GetUlongFromAddress: unable to read from fffff802abbdb1f8
0000000000000038 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
aswnet+313aa
fffff880`064923aa 483b7038 cmp rsi,qword ptr [rax+38h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AvastSvc.exe
TRAP_FRAME: fffff8800dfd44f0 -- (.trap 0xfffff8800dfd44f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80072184a0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880064923aa rsp=fffff8800dfd4680 rbp=fffff880064924a8
r8=0000000000000006 r9=fffffa800a650910 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
aswnet+0x313aa:
fffff880`064923aa 483b7038 cmp rsi,qword ptr [rax+38h] ds:00000000`00000038=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802ab8ff069 to fffff802ab8ffd40
STACK_TEXT:
fffff880`0dfd43a8 fffff802`ab8ff069 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0dfd43b0 fffff802`ab8fd8e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0dfd44f0 : nt!KiBugCheckDispatch+0x69
fffff880`0dfd44f0 fffff880`064923aa : 00000000`00000000 fffff880`064924a8 fffffa80`090adaf0 fffff880`06494601 : nt!KiPageFault+0x260
fffff880`0dfd4680 fffff880`0648e2ae : fffffa80`0a6651a0 fffffa80`0633da01 00000000`00000011 fffffa80`08e8c430 : aswnet+0x313aa
fffff880`0dfd4720 fffff880`0648f903 : fffffa80`0a6651a0 fffffa80`0633da70 fffff880`0dfd4810 fffffa80`08f800a0 : aswnet+0x2d2ae
fffff880`0dfd4770 fffff880`0648c8d1 : fffffa80`0633db50 fffffa80`0a635940 00000000`00000000 00000000`00000000 : aswnet+0x2e903
fffff880`0dfd47d0 fffff880`0648c391 : fffffa80`0633da70 00000000`00000000 00000000`00000028 fffffa80`08f61930 : aswnet+0x2b8d1
fffff880`0dfd4860 fffff880`0648c1d3 : fffffa80`0998b9e0 fffffa80`0998bab0 00000000`00000001 fffffa80`0a079550 : aswnet+0x2b391
fffff880`0dfd48d0 fffff880`0648b5f5 : fffff680`0000f8c0 00000000`00000000 fffffa80`0a079520 00000000`00000001 : aswnet+0x2b1d3
fffff880`0dfd4900 fffff880`06463f2a : fffffa80`0612f4c0 e6300001`391da867 00000000`001391da 00000000`00000000 : aswnet+0x2a5f5
fffff880`0dfd4930 fffff880`06463c34 : fffffa80`0998b9e0 fffff880`0dfd4c80 00000000`00000001 00000000`00000001 : aswnet+0x2f2a
fffff880`0dfd4960 fffff802`abce42ff : fffffa80`0998b9e0 00000000`00000000 fffffa80`0998b9e0 fffffa80`0998baf8 : aswnet+0x2c34
fffff880`0dfd4990 fffff802`abce4c86 : 00000000`00000000 00000000`77d62300 00000000`00000001 00000000`01f17f94 : nt!IopXxxControlFile+0x7dd
fffff880`0dfd4b20 fffff802`ab8fed53 : 00000000`746c6644 fffff880`0dfd4c08 00000000`00000000 00000000`0a97e300 : nt!NtDeviceIoControlFile+0x56
fffff880`0dfd4b90 00000000`77d62ad2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0a97ec58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d62ad2
STACK_COMMAND: kb
FOLLOWUP_IP:
aswnet+313aa
fffff880`064923aa 483b7038 cmp rsi,qword ptr [rax+38h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswnet+313aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswnet
IMAGE_NAME: aswnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 508e9a7f
FAILURE_BUCKET_ID: AV_aswnet+313aa
BUCKET_ID: AV_aswnet+313aa
Followup: MachineOwner
---------