Lan12
1. Welcome to Geeks to Go
2. Sorry your post was missed, this very occasionally happens, due to the vast amount of requests we receive. I apologise
3. As the file is a mini dump and not a memory.dmp some debug analysis is not available - however, in case you have not found the problem,
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16384.amd64fre.win8_rtm.120725-1247
Machine Name:
Kernel base = 0xfffff803`41216000 PsLoadedModuleList = 0xfffff803`414e0a60
Debug session time: Sat Jan 26 18:39:49.372 2013 (UTC - 5:00)
System Uptime: 0 days 0:09:50.034
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880034793aa, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8034156c168
GetUlongFromAddress: unable to read from fffff8034156c1f8
0000000000000038 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
aswnet+313aa
fffff880`034793aa 483b7038 cmp rsi,qword ptr [rax+38h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AvastSvc.exe
TRAP_FRAME: fffff8800b53a530 -- (.trap 0xfffff8800b53a530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8005e28930
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880034793aa rsp=fffff8800b53a6c0 rbp=fffff880034794a8
r8=0000000000000006 r9=fffffa80067ebf70 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
aswnet+0x313aa:
fffff880`034793aa 483b7038 cmp rsi,qword ptr [rax+38h] ds:00000000`00000038=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80341290369 to fffff80341291040
STACK_TEXT:
fffff880`0b53a3e8 fffff803`41290369 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b53a3f0 fffff803`4128ebe0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0b53a530 : nt!KiBugCheckDispatch+0x69
fffff880`0b53a530 fffff880`034793aa : 00000000`00000000 fffff880`034794a8 fffffa80`071c08d0 fffff880`0347b601 : nt!KiPageFault+0x260
fffff880`0b53a6c0 00000000`00000000 : fffff880`034794a8 fffffa80`071c08d0 fffff880`0347b601 fffffa80`00000110 : aswnet+0x313aa
STACK_COMMAND: kb
FOLLOWUP_IP:
aswnet+313aa
fffff880`034793aa 483b7038 cmp rsi,qword ptr [rax+38h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswnet+313aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME
: aswnet
IMAGE_NAME: aswnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 508e9a7f
FAILURE_BUCKET_ID: X64_AV_aswnet+313aa
BUCKET_ID: X64_AV_aswnet+313aa
Above is the results of the crash dump analysis and I would look first at your AVAST - ensure you have the right version and the updated one.
You may also, providing you can reinstall, if the update to it does not solve the problem try uninstalling and use Windows Defender provided with 8 and the replacement on 8 for Microsoft Security Essentials
This I see as your first approach
Edited by Macboatmaster, 11 February 2013 - 04:35 PM.