I wonder if Avira is causing the issue. Please remove it with this tool: http://www.avira.com/en/documents/ut...ninstXPeng.zip
Replace it with Microsoft Security Essentials: www.microsoft.com/Security_Essentials/
Also be sure to update your Realtek network driver:
Code:
Rt86win7.sys Thu Feb 26 04:04:22 2009
Go to the computer manufacturer's site and download the latest version.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\JK\Desktop\Dump files\Dump files\072810-25053-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82a3f000 PsLoadedModuleList = 0x82b87810
Debug session time: Thu Jul 29 01:51:50.899 2010 (GMT-4)
System Uptime: 0 days 1:56:51.866
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 8ae57ccc, 96090930, 0}
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+ea )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8ae57ccc, The address that the exception occurred at
Arg3: 96090930, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
tcpip!TcpDelayedDeliveryCompletionRoutine+32
8ae57ccc 8b36 mov esi,dword ptr [esi]
TRAP_FRAME: 96090930 -- (.trap 0xffffffff96090930)
ErrCode = 00000000
eax=00600000 ebx=00000001 ecx=00000004 edx=00000003 esi=00600000 edi=00000001
eip=8ae57ccc esp=960909a4 ebp=960909b8 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
tcpip!TcpDelayedDeliveryCompletionRoutine+0x32:
8ae57ccc 8b36 mov esi,dword ptr [esi] ds:0023:00600000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 8acc069a to 8ae57ccc
STACK_TEXT:
960909b8 8acc069a 00000000 00000001 00000000 tcpip!TcpDelayedDeliveryCompletionRoutine+0x32
960909e8 8ae736c9 00000000 00000000 96090a18 NETIO!NetioDereferenceNetBufferListChain+0xea
960909f8 904354a3 85f99ed8 86a06010 96090c6c tcpip!TcpReleaseIndicationList+0x9b
96090a18 904520de 8604f2e8 86a060b0 96090c6c afd!AfdTLReleaseIndications+0x30
96090a40 90456571 8500a208 84fff030 064d283f afd!AfdReturnBuffer+0xd9
96090ab8 90443850 85440d28 96090ba4 00001000 afd!AfdFastConnectionReceive+0x328
96090c28 82c99937 86f8cc01 00000001 0337f954 afd!AfdFastIoDeviceControl+0x84b
96090cd0 82c9c4ec 85fdacd0 00000210 00000000 nt!IopXxxControlFile+0x2d0
96090d04 82a8244a 000005a4 00000210 00000000 nt!NtDeviceIoControlFile+0x2a
96090d04 77d264f4 000005a4 00000210 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0337f9a8 00000000 00000000 00000000 00000000 0x77d264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferListChain+ea
8acc069a 5b pop ebx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+ea
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf63
FAILURE_BUCKET_ID: 0x8E_NETIO!NetioDereferenceNetBufferListChain+ea
BUCKET_ID: 0x8E_NETIO!NetioDereferenceNetBufferListChain+ea
Followup: MachineOwner
---------
0: kd> lmsmn
start end module name
8a831000 8a879000 ACPI ACPI.sys
90431000 9048b000 afd afd.sys
9096f000 90981000 AgileVpn AgileVpn.sys
918c3000 919c9000 AGRSM AGRSM.sys
90844000 90856000 amdk8 amdk8.sys
8a995000 8a99e000 amdxata amdxata.sys
8a969000 8a972000 atapi atapi.sys
8a972000 8a995000 ataport ataport.SYS
90620000 9074d000 athr athr.sys
91007000 915ef000 atikmdag atikmdag.sys
96967000 9697c000 avgntflt avgntflt.sys
8a600000 8a622000 avipbb avipbb.sys
8a8d8000 8a8e3000 BATTC BATTC.SYS
8ac00000 8ac07000 Beep Beep.SYS
90418000 90426000 blbdrive blbdrive.sys
8a656000 8a65e000 BOOTVID BOOTVID.dll
98a99000 98ab2000 bowser bowser.sys
98970000 9898e000 cdd cdd.dll
8add8000 8adf7000 cdrom cdrom.sys
8a6a0000 8a74b000 CI CI.dll
8ad81000 8ada6000 CLASSPNP CLASSPNP.SYS
8a65e000 8a6a0000 CLFS CLFS.SYS
90856000 90859700 CmBatt CmBatt.sys
8ab70000 8abcd000 cng cng.sys
8a8d0000 8a8d8000 compbatt compbatt.sys
915ef000 915fc000 CompositeBus CompositeBus.sys
968bd000 968ca000 crashdmp crashdmp.sys
9058c000 905f0000 csc csc.sys
90400000 90418000 dfsc dfsc.sys
90580000 9058c000 discache discache.sys
8ae18000 8ae29000 disk disk.sys
9689a000 968b3000 drmk drmk.sys
968d5000 968de000 dump_atapi dump_atapi.sys
968ca000 968d5000 dump_dumpata dump_dumpata.sys
968de000 968ef000 dump_dumpfve dump_dumpfve.sys
968b3000 968bd000 Dxapi Dxapi.sys
9085a000 90911000 dxgkrnl dxgkrnl.sys
90911000 9094a000 dxgmms1 dxgmms1.sys
8a9d2000 8a9e3000 fileinfo fileinfo.sys
8a99e000 8a9d2000 fltmgr fltmgr.sys
8abdb000 8abe4000 Fs_Rec Fs_Rec.sys
8ad4f000 8ad81000 fvevol fvevol.sys
9083c000 90844000 FwLnk FwLnk.sys
8af75000 8afa6000 fwpkclnt fwpkclnt.sys
907bb000 907c2000 GEARAspiWDM GEARAspiWDM.sys
82a08000 82a3f000 hal halmacpi.dll
907c2000 907e1000 HDAudBus HDAudBus.sys
9681b000 9686b000 HdAudio HdAudio.sys
98a14000 98a99000 HTTP HTTP.sys
8ae10000 8ae18000 hwpolicy hwpolicy.sys
907e1000 907f9000 i8042prt i8042prt.sys
90600000 9060d000 kbdclass kbdclass.sys
80bd5000 80bdd000 kdcom kdcom.dll
9182c000 91860000 ks ks.sys
8ab5d000 8ab70000 ksecdd ksecdd.sys
8acfd000 8ad22000 ksecpkg ksecpkg.sys
96996000 969a6000 lltdio lltdio.sys
9694c000 96967000 luafv luafv.sys
8a63a000 8a645000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll
919cb000 919d8000 modem modem.sys
96941000 9694c000 monitor monitor.sys
9060d000 9061a000 mouclass mouclass.sys
8a953000 8a969000 mountmgr mountmgr.sys
98ab2000 98ac4000 mpsdrv mpsdrv.sys
98ac4000 98ae7000 mrxsmb mrxsmb.sys
98ae7000 98b22000 mrxsmb10 mrxsmb10.sys
98b22000 98b3d000 mrxsmb20 mrxsmb20.sys
8a9eb000 8a9f6000 Msfs Msfs.SYS
8a882000 8a88a000 msisadrv msisadrv.sys
8ab32000 8ab5d000 msrpc msrpc.sys
90576000 90580000 mssmbios mssmbios.sys
8ae00000 8ae10000 mup mup.sys
8ac08000 8acbf000 ndis ndis.sys
90999000 909a4000 ndistapi ndistapi.sys
969ec000 969fc000 ndisuio ndisuio.sys
909a4000 909c6000 ndiswan ndiswan.sys
918b2000 918c3000 NDProxy NDProxy.SYS
904f4000 90502000 netbios netbios.sys
9048b000 904bd000 netbt netbt.sys
8acbf000 8acfd000 NETIO NETIO.SYS
8a7ca000 8a7d8000 Npfs Npfs.SYS
9056c000 90576000 nsiproxy nsiproxy.sys
82a3f000 82e4f000 nt ntkrpamp.exe
8aa03000 8ab32000 Ntfs Ntfs.sys
8adf7000 8adfe000 Null Null.SYS
969a6000 969ec000 nwifi nwifi.sys
904c4000 904e3000 pacer pacer.sys
8a8bf000 8a8d0000 partmgr partmgr.sys
8a88a000 8a8b4000 pci pci.sys
8a93e000 8a945000 pciide pciide.sys
8a945000 8a953000 PCIIDEX PCIIDEX.SYS
8abcd000 8abdb000 pcw pcw.sys
98b55000 98bec000 peauth peauth.sys
9686b000 9689a000 portcls portcls.sys
8a645000 8a656000 PSHED PSHED.dll
90981000 90999000 rasl2tp rasl2tp.sys
909c6000 909de000 raspppoe raspppoe.sys
909de000 909f5000 raspptp raspptp.sys
90800000 90817000 rassstp rassstp.sys
9052b000 9056c000 rdbss rdbss.sys
909f5000 909ff000 rdpbus rdpbus.sys
8a821000 8a829000 RDPCDD RDPCDD.sys
8a829000 8a831000 rdpencdd rdpencdd.sys
8a9e3000 8a9eb000 rdprefmp rdprefmp.sys
8ad22000 8ad4f000 rdyboost rdyboost.sys
96800000 96813000 rspndr rspndr.sys
9094a000 9096f000 Rt86win7 Rt86win7.sys
98bec000 98bf6000 secdrv secdrv.SYS
8aff3000 8affb000 spldr spldr.sys
99ee9000 99f3a000 srv srv.sys
99e9a000 99ee9000 srv2 srv2.sys
919d8000 919f9000 srvnet srvnet.sys
90525000 9052aa00 ssmdrv ssmdrv.sys
9061a000 9061b380 swenum swenum.sys
8ae2c000 8af75000 tcpip tcpip.sys
98a00000 98a0d000 tcpipreg tcpipreg.sys
8a7ef000 8a7fa000 TDI TDI.SYS
8a7d8000 8a7ef000 tdx tdx.sys
90515000 90525000 termdd termdd.sys
98940000 98949000 TSDDD TSDDD.dll
9081b000 9083c000 tunnel tunnel.sys
8afee000 8aff2180 TVALZ_O TVALZ_O.SYS
91860000 9186e000 umbus umbus.sys
99f5b000 99f72000 usbccgp usbccgp.sys
919c9000 919ca700 USBD USBD.SYS
907ac000 907bb000 usbehci usbehci.sys
9186e000 918b2000 usbhub usbhub.sys
90757000 90761000 usbohci usbohci.sys
90761000 907ac000 USBPORT USBPORT.SYS
9692a000 96941000 USBSTOR USBSTOR.SYS
99f72000 99f95b00 usbvideo usbvideo.sys
8a8b4000 8a8bf000 vdrvroot vdrvroot.sys
8abe4000 8abf0000 vga vga.sys
8a800000 8a821000 VIDEOPRT VIDEOPRT.SYS
8afa6000 8afae380 vmstorfl vmstorfl.sys
8a8e3000 8a8f3000 volmgr volmgr.sys
8a8f3000 8a93e000 volmgrx volmgrx.sys
8afaf000 8afee000 volsnap volsnap.sys
9074d000 90757000 vwifibus vwifibus.sys
904e3000 904f4000 vwififlt vwififlt.sys
90502000 90515000 wanarp wanarp.sys
8abf0000 8abfd000 watchdog watchdog.sys
8a74b000 8a7bc000 Wdf01000 Wdf01000.sys
8a7bc000 8a7ca000 WDFLDR WDFLDR.SYS
904bd000 904c4000 wfplwf wfplwf.sys
986e0000 9892a000 win32k win32k.sys
8a879000 8a882000 WMILIB WMILIB.SYS
9697c000 96996000 WudfPf WudfPf.sys
99f3a000 99f5a480 WUDFRd WUDFRd.sys
Unloaded modules:
968ef000 96906000 usbccgp.sys
96906000 9692a000 usbvideo.sys
99e30000 99e9a000 spsys.sys
98b3d000 98b55000 parport.sys
8ada6000 8adb3000 crashdmp.sys
8adb3000 8adbe000 dump_ataport
8adbe000 8adc7000 dump_atapi.s
8adc7000 8add8000 dump_dumpfve