TH
It is NEVER a good idea to have more than one malware app. You have 2. I would remove BOTH McAfee and Avast and use the built in defender. They are your problem
Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ken\Desktop\012215-34687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17328.amd64fre.winblue_r3.140827-1500
Machine Name:
Kernel base = 0xfffff802`7a402000 PsLoadedModuleList = 0xfffff802`7a6d8370
Debug session time: Thu Jan 22 13:02:12.927 2015 (UTC - 5:00)
System Uptime: 1 days 23:51:09.823
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
...............................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 1200, 202082, ffffe00100348008}
GetPointerFromAddress: unable to read from fffff8027a762138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000000202082, Memory contents of the pool block
Arg4: ffffe00100348008, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: ffffe00100348008
FREED_POOL_TAG: Mdl
BUGCHECK_STR: 0xc2_7_Mdl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff8027a6a408a to fffff8027a5511a0
STACK_TEXT:
ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff800`35f8791f 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO!NetioFreeMdl+20d7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
IMAGE_VERSION: 6.3.9600.17337
BUCKET_ID_FUNC_OFFSET: 20d7f
FAILURE_BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_7_mdl__netio!netiofreemdl
FAILURE_ID_HASH: {f2c46e80-d936-89a0-13f9-f9b302dc640b}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000000202082, Memory contents of the pool block
Arg4: ffffe00100348008, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: ffffe00100348008
FREED_POOL_TAG: Mdl
BUGCHECK_STR: 0xc2_7_Mdl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff8027a6a408a to fffff8027a5511a0
STACK_TEXT:
ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff800`35f8791f 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO!NetioFreeMdl+20d7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
IMAGE_VERSION: 6.3.9600.17337
BUCKET_ID_FUNC_OFFSET: 20d7f
FAILURE_BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_7_mdl__netio!netiofreemdl
FAILURE_ID_HASH: {f2c46e80-d936-89a0-13f9-f9b302dc640b}
Followup: MachineOwner
---------