Results 1 to 6 of 6

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Registered User
    Join Date: Mar:2006
    Location: Sofia
    Posts: 40

    Soft èëè Hard ïðîáëåì çà ñèí åêðàí íà Win7?

    Íàñòîëíà ìàøèíà íèùî íåâåðîÿòíî. 4 ãîäèíè ðàáîòè áåç îòêàçàíî è íèêàêâè ÿäîâå. Êà÷èõ Ìàêñ Ïåéí 3 è çàïî÷íà äà ìè äàâà ñèí åêðàí êîãàòî ñè ïîèñêà ñ ïîâîä è áåç ïîâîä. Èçëèçà ìè ñëåä êàòî çàáèå è ðåñòàðòèðà ïðîçîðåö â êîéòî ìè êàçâà äà ïîãëåäíà DMB file è å äàäåí êîé å. Êàòî ãî îòâîðÿ òîâà ñå èçïèñâà.


    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Users\Hacko\Desktop\071912-18735-01.dmp
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
    Debug session time: Thu Jul 19 08:42:16.917 2012 (UTC + 3:00)
    System Uptime: 0 days 0:06:16.790
    Loading Kernel Symbols
    ........................................ .......................
    ........................................ ........................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    **************************************** ***************************************
    * *
    * Bugcheck Analysis *
    * *
    **************************************** ***************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 50, {fffff8a00a1db000, 0, fffff80002f47079, 0}


    Could not read faulting driver name
    Probably caused by : memory_corruption ( nt!MiCompressRelocations+70 )

    Followup: MachineOwner
    ---------


    Êîãàòî äàì íà "Use !analyze -v to get detailed debugging information." ìè èçëèçà åòî òîâà:


    0: kd> !analyze -v
    **************************************** ***************************************
    * *
    * Bugcheck Analysis *
    * *
    **************************************** ***************************************

    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced. This cannot be protected by try-except,
    it must be protected by a Probe. Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a00a1db000, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff80002f47079, If non-zero, the instruction address which referenced the bad memory
    address.
    Arg4: 0000000000000000, (reserved)

    Debugging Details:
    ------------------


    Could not read faulting driver name

    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
    fffff8a00a1db000

    FAULTING_IP:
    nt!MiCompressRelocations+70
    fffff800`02f47079 410fb701 movzx eax,word ptr [r9]

    MM_INTERNAL_CODE: 0

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0x50

    PROCESS_NAME: mbamservice.ex

    CURRENT_IRQL: 0

    TRAP_FRAME: fffff8800a0345d0 -- (.trap 0xfffff8800a0345d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f47079 rsp=fffff8800a034760 rbp=000000000008fc28
    r8=000000007ffff960 r9=fffff8a00a1db000 r10=000000000006ed2c
    r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl nz na po nc
    nt!MiCompressRelocations+0x70:
    fffff800`02f47079 410fb701 movzx eax,word ptr [r9] ds:fffff8a0`0a1db000=????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80002d021e4 to fffff80002c82f00

    STACK_TEXT:
    fffff880`0a034468 fffff800`02d021e4 : 00000000`00000050 fffff8a0`0a1db000 00000000`00000000 fffff880`0a0345d0 : nt!KeBugCheckEx
    fffff880`0a034470 fffff800`02c80fee : 00000000`00000000 00000000`00000003 00000000`0004b900 fffff8a0`0a150554 : nt! ?? ::FNODOBFM::`string'+0x42907
    fffff880`0a0345d0 fffff800`02f47079 : 00000000`01000000 fffff800`02f47461 fffffa80`03db0300 fffff800`02f475a4 : nt!KiPageFault+0x16e
    fffff880`0a034760 fffff800`02f45932 : 00000000`000d56a0 00000000`01000000 00000000`00000001 00000000`00000004 : nt!MiCompressRelocations+0x70
    fffff880`0a0347b0 fffff800`02f7b5d1 : fffff8a0`04625000 fffff880`0a0349c0 00000000`00000095 00000000`00000000 : nt!MiRelocateImage+0x4a2
    fffff880`0a034920 fffff800`02f70893 : fffff880`0a034b80 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmCreateSection+0x825
    fffff880`0a034b30 fffff800`02c82153 : fffffa80`03d4fb60 00000000`00cbe298 fffff880`0a034bc8 00000000`00000000 : nt!NtCreateSection+0x162
    fffff880`0a034bb0 00000000`76fa035a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`00cbe278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fa035a


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!MiCompressRelocations+70
    fffff800`02f47079 410fb701 movzx eax,word ptr [r9]

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: nt!MiCompressRelocations+70

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600

    IMAGE_NAME: memory_corruption

    FAILURE_BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70

    BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70

    Followup: MachineOwner
    ---------

    Äî êîëêîòî óñïÿâàì äà ñå îðèåíòèðàì èëè èìà ïðîáëåì ñ äðàéâåðèòå íåùî èëè õàðäà è ðìà ñà òðúãíàëè äà ñè õîäÿò. Õàðäà ìè å îáà÷å ÷èñòî íîâ íà ãîäèíà áëèçî. Ïóñêàõ âñÿêàêâè òåñòîâå çà hdd i ram è íèùî âñè÷êî å 6 èçïèñâà è äî òàì. Èçâàäèõ åäíàòà ïðú÷êà ñ ðàì, ïàê ãî ïðàâè ñåãà èçâàäèõ äðóãàòà è ÷àêàì äà âèäÿ.

    Äàéòå èäåÿ? Êàêâî ñå ñëó÷âà?
    Last edited by Bombera; 13th September 2012 at 16:55. Reason: Êîôòè ôîðìàòèðàíå

  2. #2
    Registered User [Rado]'s Avatar
    Join Date: May:2006
    Location: :
    Posts: 2,662
    Ïðîáâà ëè äà restore-íåø ìàøèíàòà äî ïðåäè èíñòàëèðàíåòî íà Max Payne?
    .

  3. #3
    Registered User
    Join Date: Mar:2006
    Location: Sofia
    Posts: 40
    Quote Originally Posted by [Rado] View Post
    Ïðîáâà ëè äà restore-íåø ìàøèíàòà äî ïðåäè èíñòàëèðàíåòî íà Max Payne?
    Àìè íÿìà çàïàìåòåí ïîéò ïðåäè òîâà, áåøå ìíîãî îòäàâíà.

  4. #4
    Registered User
    Join Date: Oct:2009
    Location: Varna
    Posts: 193
    "PROCESS_NAME: mbamservice.ex"
    Ïðåäïîëàãàì å ïðîöåñ íà Malwarebytes Anti-Malware, ïðîáâàé áåç íåãî.

  5. #5
    Registered User
    Join Date: Jul:2008
    Location: Áúëãàðèÿ
    Posts: 161
    êàêâî å ðàçâèòèåòî ïî ñëóàÿ? Àç ñúì íà åäíî ìíåíèå ñ j.arkov .

  6. #6
    Registered User
    Join Date: Mar:2006
    Location: Sofia
    Posts: 40
    Format C: è âñè÷êî ñè å êàòî ïðåäè, äàæå ìàëêî ïî äîáðå

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Copyright © 1999-2011 Õàðäóåð ÁÃ. Âúçìîæíî å ñúäúðæàíèåòî íà òàçè ñòðàíèöà äà å îáåêò íà àâòîðñêè ïðàâà.
iskamPC.com | mobility.BG | Bloody's Techblog | Êðèïòîâàëóòè è ìàéíèíã | 3D Vision Blog | Ìàãàçèí çà åëåêòðîííè öèãàðè