Blue screen of death

Colapsar
X
 
  • Filtrar
  • Tiempo
  • Mostrar
Limpiar Todo
nuevos mensajes

  • Blue screen of death

    Ultimamente me aparece la dichosa pantallita azul todo el tiempo o no me arranca el portatil y se queda la pantalla en negro. Ha empezado a pasarme hace unos dias, sin haber instalado ningun programa, driver o hardware.
    Gracias ha que tengo configurado el ordenador para hacer dumps de lo sucedido, he conseguido la siguiente informacion:

    Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\Minidump\Mini012613-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/s...wnload/symbols
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp.080413-2111
    Machine Name:
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
    Debug session time: Sat Jan 26 18:42:15.787 2013 (UTC + 0:00)
    System Uptime: 0 days 1:33:51.357
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........
    Loading User Symbols
    Loading unloaded module list
    .............
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 100000BE, {b877dd24, 32406121, b8775c94, b}

    Probably caused by : memory_corruption

    Followup: memory_corruption
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
    An attempt was made to write to readonly memory. The guilty driver is on the
    stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: b877dd24, Virtual address for the attempted write.
    Arg2: 32406121, PTE contents.
    Arg3: b8775c94, (reserved)
    Arg4: 0000000b, (reserved)

    Debugging Details:
    ------------------


    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: CODE_CORRUPTION

    BUGCHECK_STR: 0xBE

    PROCESS_NAME: winamp.exe

    LAST_CONTROL_TRANSFER: from 68107536 to 80566212

    STACK_TEXT:
    b877dd50 68107536 000002d0 77dc0c68 bbe850b8 nt!NtWaitForSingleObject+0x9c
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    b877dd60 3bfffff4 5fdf75f7 c2c95b5e cccc0004 0x68107536
    b877dd64 5fdf75f7 c2c95b5e cccc0004 cccccccc 0x3bfffff4
    b877dd68 c2c95b5e cccc0004 cccccccc 8b55ff8b 0x5fdf75f7
    b877dd6c cccc0004 cccccccc 8b55ff8b 575653ec 0xc2c95b5e
    b877dd70 cccccccc 8b55ff8b 575653ec 0ad415ff 0xcccc0004
    b877dd74 8b55ff8b 575653ec 0ad415ff 053bb878 0xcccccccc
    b877dd78 575653ec 0ad415ff 053bb878 b8782ac4 0x8b55ff8b
    b877dd7c 0ad415ff 053bb878 b8782ac4 00d7850f 0x575653ec
    b877dd80 053bb878 b8782ac4 00d7850f 15ff0000 0xad415ff
    b877dd84 b8782ac4 00d7850f 15ff0000 b8780a0c 0x53bb878
    b877dd88 00d7850f 15ff0000 b8780a0c 850fc084 mrxdav!RxDispatcher+0x4
    b877dd8c 15ff0000 b8780a0c 850fc084 000000c9 0xd7850f
    b877dd90 b8780a0c 850fc084 000000c9 8d08758b 0x15ff0000
    b877dd94 850fc084 000000c9 8d08758b cb8b045e mrxdav!_imp__KeGetCurrentIrql
    b8780a0c 00029088 00029072 00000000 000290c0 0x850fc084
    b8780a10 00029072 00000000 000290c0 000290a6 0x29088
    b8780a14 00000000 000290c0 000290a6 00000000 0x29072


    STACK_COMMAND: kb

    CHKIMG_EXTENSION: !chkimg -lo 50 -d !mrxdav
    b877dd05 - mrxdav!RxTearDownWorkQueue+cf
    [ e8:68 ]
    1 error : !mrxdav (b877dd05)

    MODULE_NAME: memory_corruption

    IMAGE_NAME: memory_corruption

    FOLLOWUP_NAME: memory_corruption

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    MEMORY_CORRUPTOR: ONE_BIT

    FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

    BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

    Followup: memory_corruption
    ---------





    Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\Minidump\Mini012813-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp.080413-2111
    Machine Name:
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
    Debug session time: Mon Jan 28 16:32:21.979 2013 (UTC + 0:00)
    System Uptime: 0 days 0:05:33.550
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........
    Loading User Symbols
    Loading unloaded module list
    .............
    Unable to load image aswSnx.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for aswSnx.SYS
    *** ERROR: Module load completed but symbols could not be loaded for aswSnx.SYS
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000008E, {c0000005, b9fbc663, b7aca748, 0}

    Unable to load image aswFsBlk.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for aswFsBlk.SYS
    *** ERROR: Module load completed but symbols could not be loaded for aswFsBlk.SYS
    *** WARNING: Unable to verify timestamp for aswMon2.SYS
    *** ERROR: Module load completed but symbols could not be loaded for aswMon2.SYS
    Probably caused by : aswSnx.SYS ( aswSnx+9663 )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003. This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG. This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG. This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: b9fbc663, The address that the exception occurred at
    Arg3: b7aca748, Trap Frame
    Arg4: 00000000

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

    FAULTING_IP:
    aswSnx+9663
    b9fbc663 8b4828 mov ecx,dword ptr [eax+28h]

    TRAP_FRAME: b7aca748 -- (.trap 0xffffffffb7aca74
    ErrCode = 00000000
    eax=000000a9 ebx=00000000 ecx=49bb000e edx=49ba000d esi=8536d5c8 edi=00000000
    eip=b9fbc663 esp=b7aca7bc ebp=b7aca7ec iopl=0 ov up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010a46
    aswSnx+0x9663:
    b9fbc663 8b4828 mov ecx,dword ptr [eax+28h] ds:0023:000000d1=????????
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x8E

    PROCESS_NAME: firefox.exe

    LAST_CONTROL_TRANSFER: from f7687c3f to b9fbc663

    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    b7aca7ec f7687c3f 8653b178 85395160 85c8169c aswSnx+0x9663
    b7aca81c f768a18e 8536d5c8 00000000 8536d5c8 fltMgr!FltpCallOpenedFileNameHandler+0x45
    b7aca838 f768a76b 8536d5c8 00000000 000000fe fltMgr!FltpGetNormalizedFileNameWorker+0xc4
    b7aca850 f76882a2 8536d5c8 00000000 8536d5c8 fltMgr!FltpGetNormalizedFileName+0x19
    b7aca868 f7680365 80552000 8536d5c8 b7aca8a4 fltMgr!FltpCreateFileNameInformation+0x84
    b7aca878 f7678e0a 8536d5c8 85c8169c 00000000 fltMgr!FltEnumerateInstances+0x99
    b7aca8a4 f7679366 8536d5c8 b7aca8f4 b7aca938 fltMgr!FltpGetFileNameInformation+0xaa
    b7aca8cc b7f58b40 00c8169c 00000101 b7aca8f0 fltMgr!FltGetFileNameInformation+0x114
    b7aca914 b7f5875b b7aca964 85c8169c b7aca938 aswFsBlk+0x1b40
    b7aca944 f7674888 00120196 b7aca964 b7aca994 aswFsBlk+0x175b
    b7aca9a4 f76762a0 00aca9e8 85c81640 8661bfb4 fltMgr!FltpPerformPreCallbacks+0x2d4
    b7aca9b8 f7683217 b7aca9e8 f76816aa 00000000 fltMgr!FltpPassThroughInternal+0x32
    b7aca9d0 f7683742 b7aca9e8 856a9008 8661bfd8 fltMgr!FltpCreateInternal+0x63
    b7acaa04 804e37f7 865b7020 8661be00 8661bffc fltMgr!FltpCreate+0x258
    b7acaa14 b7bb6777 00000000 862e84f8 85395160 nt!IopfCallDriver+0x31
    b7acaa38 b7bafac7 86258560 8661be00 8661be10 aswMon2+0x7777
    b7acaa4c 804e37f7 86258560 8661be00 8661be00 aswMon2+0xac7
    b7acaa5c 8056c712 866d6578 85306804 b7acac04 nt!IopfCallDriver+0x31
    b7acab3c 80563fec 866d6590 00000000 85306760 nt!IopParseDevice+0xa12
    b7acabc4 805684da 00000000 b7acac04 00000040 nt!ObpLookupObjectName+0x56a
    b7acac18 8056cbeb 00000000 00000000 00000001 nt!ObOpenObjectByName+0xeb
    b7acac94 8056ccba 027ffeac 40100080 027ffe4c nt!IopCreateFile+0x407
    b7acacf0 8056cdf0 027ffeac 40100080 027ffe4c nt!IoCreateFile+0x8e
    b7acad30 804de7ec 027ffeac 40100080 027ffe4c nt!NtCreateFile+0x30
    b7acad30 7c90e4f4 027ffeac 40100080 027ffe4c nt!KiFastCallEntry+0xf8
    027ffea4 00000000 00000000 00000000 00000000 0x7c90e4f4


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    aswSnx+9663
    b9fbc663 8b4828 mov ecx,dword ptr [eax+28h]

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: aswSnx+9663

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: aswSnx

    IMAGE_NAME: aswSnx.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 5090582a

    FAILURE_BUCKET_ID: 0x8E_aswSnx+9663

    BUCKET_ID: 0x8E_aswSnx+9663

    Followup: MachineOwner
    ---------




    Loading Dump File [C:\WINDOWS\Minidump\Mini020413-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp.080413-2111
    Machine Name:
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
    Debug session time: Mon Feb 4 13:20:34.075 2013 (UTC + 0:00)
    System Uptime: 0 days 0:02:43.645
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........
    Loading User Symbols
    Loading unloaded module list
    .............
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 10000050, {b7b7ecc0, 0, 804e4090, 3}


    Could not read faulting driver name
    Probably caused by : ntoskrnl.exe ( nt!KeRemoveQueue+308 )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced. This cannot be protected by try-except,
    it must be protected by a Probe. Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: b7b7ecc0, memory referenced.
    Arg2: 00000000, value 0 = read operation, 1 = write operation.
    Arg3: 804e4090, If non-zero, the instruction address which referenced the bad memory
    address.
    Arg4: 00000003, (reserved)

    Debugging Details:
    ------------------


    Could not read faulting driver name

    READ_ADDRESS: b7b7ecc0

    FAULTING_IP:
    nt!KeRemoveQueue+308
    804e4090 c9 leave

    MM_INTERNAL_CODE: 3

    CUSTOMER_CRASH_COUNT: 2

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x50

    PROCESS_NAME: AvastSvc.exe

    LAST_CONTROL_TRANSFER: from 00000000 to 804e4090

    STACK_TEXT:
    b7b7ecc0 00000000 00000000 00000000 00000000 nt!KeRemoveQueue+0x308


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!KeRemoveQueue+308
    804e4090 c9 leave

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!KeRemoveQueue+308

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntoskrnl.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 48025eab

    FAILURE_BUCKET_ID: 0x50_nt!KeRemoveQueue+308

    BUCKET_ID: 0x50_nt!KeRemoveQueue+308

    Followup: MachineOwner
    ---------

    La cosa es que no entiendo bien la informacion y no se como arreglarlo. Sabe alguien que es lo que pasa y como arreglarlo?

    Saludos
Trabajando...
X