I have run Driver Verifier, which caused it to crash, and it came up with this. Does anybody know how to update tcpipreg.sys?
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {0, 0, 0, 0}
Probably caused by : tcpipreg.sys ( tcpipreg!InterfaceAddressRegKeyChangeHandler+109 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000000000, caller is trying to allocate zero bytes
Arg2: 0000000000000000, current IRQL
Arg3: 0000000000000000, pool type
Arg4: 0000000000000000, number of bytes
Debugging Details:
------------------
BUGCHECK_STR: 0xc4_0
CURRENT_IRQL: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff80003d134ec to fffff8000387f400
STACK_TEXT:
fffff880`08430488 fffff800`03d134ec : 00000000`000000c4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`08430490 fffff800`03d13f2b : fffffa80`0acc1500 fffff800`038ab54c 00000000`00000202 fffff800`0388571a : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`084304d0 fffff800`03d24a58 : 00000000`6547654c 00000000`00000080 00000000`00000010 00000000`0000003f : nt!ExAllocatePoolSanityChecks+0xcb
fffff880`08430510 fffff800`03d24cc7 : 00000000`00000000 00000000`00000000 fffff980`6547654c fffff980`1e624fec : nt!VeAllocatePoolWithTagPriority+0x88
fffff880`08430580 fffff880`0c3635a1 : 00000000`00000000 00000000`00000000 fffff980`1e624fd0 fffff800`03d2020c : nt!VerifierExAllocatePoolWithTagPriority+0x17
fffff880`084305c0 fffff880`0c3627bb : fffff880`0c369c20 fffff980`1e624fd0 fffff980`164d4f90 fffff980`1e624fd0 : tcpipreg!InterfaceAddressRegKeyChangeHandler+0x109
fffff880`084306f0 fffff880`0c361a59 : fffff880`00000001 00000000`00000103 fffff980`164d4f70 00000000`00000001 : tcpipreg!TcpipRegQueryAndUpdateKeyValue+0x363
fffff880`08430780 fffff880`01d60754 : fffff880`0c367a60 00000000`00000004 00000000`00000000 fffff880`0c36a318 : tcpipreg!TcpipRegStartRegistryKeyNotification+0xbd
fffff880`084307d0 fffff880`0c362293 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0c36d073 : NETIO!RtlInvokeStartRoutines+0x34
fffff880`08430810 fffff800`03c7d476 : 00000000`00000006 fffffa80`19bdd920 fffffa80`19cab000 00000000`00000001 : tcpipreg!DriverEntry+0x257
fffff880`08430860 fffff800`03c7d875 : fffff880`01a6f2b8 00000000`00000000 00000000`00000001 00000000`00000001 : nt!IopLoadDriver+0xa06
fffff880`08430b30 fffff800`03889749 : fffff880`00000000 ffffffff`80000698 fffff800`03c7d820 00000000`0000055a : nt!IopLoadUnloadDriver+0x55
fffff880`08430b70 fffff800`03b17bc6 : 00000000`050f6d6a fffffa80`17fcdb50 00000000`00000080 fffffa80`0cda3040 : nt!ExpWorkerThread+0x111
fffff880`08430c00 fffff800`038716a6 : fffff880`03917180 fffffa80`17fcdb50 fffff880`039221c0 fffff980`09470900 : nt!PspSystemThreadStartup+0x5a
fffff880`08430c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpipreg!InterfaceAddressRegKeyChangeHandler+109
fffff880`0c3635a1 4c8be0 mov r12,rax
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: tcpipreg!InterfaceAddressRegKeyChangeHandler+109
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpipreg
IMAGE_NAME: tcpipreg.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 506c62be
IMAGE_VERSION: 6.1.7601.17964
FAILURE_BUCKET_ID: X64_0xc4_0_VRF_tcpipreg!InterfaceAddressRegKeyChangeHandler+109
BUCKET_ID: X64_0xc4_0_VRF_tcpipreg!InterfaceAddressRegKeyChangeHandler+109
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xc4_0_vrf_tcpipreg!interfaceaddressregkeychangehandler+109
FAILURE_ID_HASH: {45cf6425-6374-4552-149c-70174323fa61}
Followup: MachineOwner
---------
6: kd> lmvm tcpipreg
start end module name
fffff880`0c35f000 fffff880`0c371000 tcpipreg (pdb symbols) c:\windows\symbol_cache\tcpipreg.pdb\2E2DF5F7FC39481BBAF303EBD91BB0721\tcpipreg.pdb
Loaded symbol image file: tcpipreg.sys
Mapped memory image file: c:\windows\symbol_cache\tcpipreg.sys\506C62BE12000\tcpipreg.sys
Image path: \SystemRoot\System32\drivers\tcpipreg.sys
Image name: tcpipreg.sys
Timestamp: Wed Oct 03 09:07:26 2012 (506C62BE)
CheckSum: 00010902
ImageSize: 00012000
File version: 6.1.7601.17964
Product version: 6.1.7601.17964
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: tcpipreg.sys
OriginalFilename: tcpipreg.sys
ProductVersion: 6.1.7601.17964
FileVersion: 6.1.7601.17964 (win7sp1_gdr.121003-0333)
FileDescription: TCP/IP Registry Compatibility Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.