Hi
I am using avast and suddenly get bsod, with image aswsnx.sys
Here are some log from whocrashedthis and debugging tools for windows
can anyone help me how to get rid of the bsod’s?
Thanks
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
WARNING: Whitespace at start of path element
Symbol search path is: “SRVc:\symbolshttp://msdl.microsoft.com/download/symbols”;srvC:\SYMBOLShttp://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff80003219000 PsLoadedModuleList = 0xfffff800
0345c6d0
Debug session time: Wed Nov 13 20:02:48.197 2013 (UTC + 1:00)
System Uptime: 0 days 1:00:11.149
Loading Kernel Symbols
…
…
…
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffd8018). Type “.hh dbgerr001” for details
Loading unloaded module list
…
-
- Bugcheck Analysis *
-
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003569150, fffff8800d470bf0, 0}
*** ERROR: Module load completed but symbols could not be loaded for aswSnx.sys
Probably caused by : aswSnx.sys ( aswSnx+27ec4 )
Followup: MachineOwner
4: kd> !analyze -v
-
- Bugcheck Analysis *
-
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003569150, Address of the instruction which caused the bugcheck
Arg3: fffff8800d470bf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.
FAULTING_IP:
nt!MiPerformFixups+80
fffff800`03569150 410fb603 movzx eax,byte ptr [r11]
CONTEXT: fffff8800d470bf0 – (.cxr 0xfffff8800d470bf0)
rax=fffff8a01013a000 rbx=fffff8800b842000 rcx=fffff8800b842000
rdx=0000000000000ff8 rsi=0000000008940000 rdi=000000000000000a
rip=fffff80003569150 rsp=fffff8800d4715d0 rbp=fa8003f74ad004c0
r8=0000000000000ffc r9=0000000000000fff r10=fffff8800b842000
r11=fa8003f74ad004c0 r12=00000000006df000 r13=fffff8a01013a000
r14=fffffa800b470d60 r15=00000000100036f8
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!MiPerformFixups+0x80:
fffff80003569150 410fb603 movzx eax,byte ptr [r11] ds:002b:fa8003f7
4ad004c0=??
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003565287 to fffff80003569150
STACK_TEXT:
fffff8800d4715d0 fffff800
03565287 : fffff80000000000 00000000
00000000 00000000020006df fffff8a0
1013a000 : nt!MiPerformFixups+0x80
fffff8800d471630 fffff800
0326fa92 : fffffa8003576cc0 00000000
006de400 fffffa80019a1510 fffff8a0
0f342740 : nt!MiRelocateImagePfn+0xf7
fffff8800d471690 fffff800
035693b1 : fffffa8003f7cdc0 fffff6fc
4002c318 fffff8a000000002 00000000
00000000 : nt!MiValidateImagePages+0x362
fffff8800d471740 fffff800
035694f0 : ffffffffffffffff 00000000
00000001 fffff8a01013a000 00000000
00000127 : nt!MiSwitchBaseAddress+0x61
fffff8800d471770 fffff800
0358bf7f : 0000000000000004 00000000
00000080 0000000001000000 00000000
01000000 : nt!MiRelocateImageAgain+0x100
fffff8800d4717c0 fffff800
03568c2e : fffff8800d471a10 00000000
00000000 0000000000000000 fffff880
0d471a08 : nt!MmCreateSection+0x2df
fffff8800d4719c0 fffff880
086b8ec4 : 0000000000000000 fffff880
0d471b48 0000000000000000 00000000
00000008 : nt!NtCreateSection+0x171
fffff8800d471a40 fffff880
086b9f97 : fffffa8000000013 00000000
099e9fa8 000000000000000f 00000000
00000000 : aswSnx+0x27ec4
fffff8800d471b40 fffff800
0328de53 : fffffa800ac91b50 fffff880
0d471ca0 00000000099e9f68 00000000
00000000 : aswSnx+0x28f97
fffff8800d471bb0 00000000
7757175a : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000099e9f48 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x7757175a
FOLLOWUP_IP:
aswSnx+27ec4
fffff880`086b8ec4 448be8 mov r13d,eax
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: aswSnx+27ec4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSnx
IMAGE_NAME: aswSnx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 527253d2
STACK_COMMAND: .cxr 0xfffff8800d470bf0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_aswSnx+27ec4
BUCKET_ID: X64_0x3B_aswSnx+27ec4