Wątek zamknięty

[Rozwiązany] Antywirus i bluescreen

 
Demo72
Nowy

Liczba postów: 5
Post: #4

RE: Antywirus i bluescreen


Witam thermalfake
Bardzo dziękuję za Twoje zainteresowanie moim problemem.
Wstrzymaj się jednak z analizą. Znalazłem jeszcze jeden, a właściwie dwa problemy w moim laptopie - sprzętowe.
Wpierw muszę wymienić pamięć, potem "podreperować" HDD.
Wtedy zobaczę co się będzie działo.
RE: Antywirus i bluescreen RE: Antywirus i bluescreen

23:15
Dysk wydaje się jednak OK. Pamięć wymieniam jutro.
RE: Antywirus i bluescreen

Pamięć wymieniłem. Memtest86 pełny cykl - wszystko OK.
Dyski twarde przeleciałem SeeTools i też jest OK.

RE: Antywirus i bluescreen RE: Antywirus i bluescreen

Uruchomiłem Arcabit i wybrałem pełne skanowanie systemu. Znowu BSOD.
Wynik ostatniego dmp - poniżej.


Kod:
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C: \Windows\Minidump\070915-38017-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`02e5e000 PsLoadedModuleList = 0xfffff800`030a5730
Debug session time:  Thu Jul  9 00: 47: 17.059 2015 (UTC + 2: 00)
System Uptime:  0 days 0: 02: 58.776
Loading Kernel Symbols
....................................................................................................​........................................................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002ec9530, fffff88002fd2368, fffff88002fd1bc0}
Probably caused by :  fileinfo.sys ( fileinfo!FIStreamLog+1be )
Followup:  MachineOwner
---------
Po kliknięciu linku !analyze -v pojawiło się to co poniżej.

Kod:
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Windows\Minidump\070915-38017-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`02e5e000 PsLoadedModuleList = 0xfffff800`030a5730
Debug session time:  Thu Jul  9 00: 47: 17.059 2015 (UTC + 2: 00)
System Uptime:  0 days 0: 02: 58.776
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002ec9530, fffff88002fd2368, fffff88002fd1bc0}
Probably caused by :  fileinfo.sys ( fileinfo!FIStreamLog+1be )
Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1:  ffffffffc0000005, The exception code that was not handled
Arg2:  fffff80002ec9530, The address that the exception occurred at
Arg3:  fffff88002fd2368, Exception Record Address
Arg4:  fffff88002fd1bc0, Context Record Address

Debugging Details:
------------------

EXCEPTION_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:  
nt!memcpy+250
fffff800`02ec9530 488b440af8      mov     rax,qword ptr [rdx+rcx-8]

EXCEPTION_RECORD:   fffff88002fd2368 -- (.exr 0xfffff88002fd2368)
ExceptionAddress:  fffff80002ec9530 (nt!memcpy+0x0000000000000250)
   ExceptionCode:  c0000005 (Access violation)
  ExceptionFlags:  00000000
NumberParameters:  2
   Parameter[0]:  0000000000000000
   Parameter[1]:  ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:   fffff88002fd1bc0 -- (.cxr 0xfffff88002fd1bc0)
rax=fffffa8004b76ba0 rbx=fffff88002fd2801 rcx=fffffa8004b76c08
rdx=006505edfbb194b9 rsi=0000000000000001 rdi=0000000000000060
rip=fffff80002ec9530 rsp=fffff88002fd25a8 rbp=0000000000000002
r8=0000000000000060  r9=0000000000000003 r10=0000000000401802
r11=fffffa8004b76ba8 r12=fffffa800472f440 r13=fffffa8004b76ba8
r14=fffff80002e5e000 r15=fffff88002fd2698
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
nt!memcpy+0x250:
fffff800`02ec9530 488b440af8      mov     rax,qword ptr [rdx+rcx-8] ds: 002b: 0065006e`006900b9=???
Resetting default scope

CUSTOMER_CRASH_COUNT:   1
DEFAULT_BUCKET_ID:   WIN7_DRIVER_FAULT
PROCESS_NAME:   System
CURRENT_IRQL:   0
ERROR_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_PARAMETER1:   0000000000000000
EXCEPTION_PARAMETER2:   ffffffffffffffff
READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff8000310f100
GetUlongFromAddress:  unable to read from fffff8000310f1c0
ffffffffffffffff

FOLLOWUP_IP:  
fileinfo!FIStreamLog+1be
fffff880`0106b692 4c8d9c24c0000000 lea     r11,[rsp+0C0h]

BUGCHECK_STR:   0x7E

LAST_CONTROL_TRANSFER:   from fffff80002fbdb24 to fffff80002ec9530

STACK_TEXT:  
fffff880`02fd25a8 fffff800`02fbdb24 :  fffff800`00020000 fffff880`02fd2801 fffff8a0`03424670 fffff880`02fd25e8 :  nt!memcpy+0x250
fffff880`02fd25b0 fffff800`02fd067f :  fffff880`02fd2800 00000000`00000000 fffffa80`00000002 fffff880`02fd2850 :  nt!EtwpLogKernelEvent+0x2a4
fffff880`02fd2650 fffff880`0106b692 :  00000000`00000000 fffffa80`0ab72af0 fffff880`02fd2800 00000000`00000000 :  nt!EtwpTraceFileName+0x15f
fffff880`02fd26e0 fffff880`0106c43b :  fffff8a0`00000030 fffff8a0`03a8d4b0 00000000`00000002 fffffa80`04e14c00 :  fileinfo!FIStreamLog+0x1be
fffff880`02fd27b0 fffff880`01069563 :  fffffa80`0ab72af0 fffffa80`0ab72af0 fffffa80`0ab72a0c fffffa80`0ab72af0 :  fileinfo!FIEnumerate+0x117
fffff880`02fd2830 fffff880`0106960b :  fffff8a0`0e8329d0 fffff880`02fd29c0 00000000`00000000 fffff880`02fd29c0 :  fileinfo!FIControlDispatchSystemControl+0x73
fffff880`02fd2870 fffff800`03168e68 :  fffffa80`047279c0 fffffa80`0ab72a0c fffffa80`0ab72af0 fffffa80`0ab72a0c :  fileinfo!FIControlDispatch+0x4b
fffff880`02fd28b0 fffff800`032a32b6 :  00000000`0000000c 00000000`0000000c 00000000`00000001 fffffa80`0ab72af0 :  nt!WmipForwardWmiIrp+0x16c
fffff880`02fd2930 fffff800`032a3ddb :  fffff880`02fd2a98 fffffa80`0472f601 00000000`0000000c 00000000`00000000 :  nt!WmipSendWmiIrpToTraceDeviceList+0xe6
fffff880`02fd2990 fffff800`032b0c54 :  fffffa80`0472f400 00000000`00000001 fffff8a0`0e8329d0 fffffa80`0472f440 :  nt!WmiTraceRundownNotify+0x6b
fffff880`02fd29e0 fffff800`03323fac :  00000000`00401802 fffffa80`0472f6e8 fffffa80`0472f440 fffff800`02eed832 :  nt!EtwpKernelTraceRundown+0xc4
fffff880`02fd2a10 fffff800`033240af :  fffffa80`0472f440 00000000`00000002 fffff8a0`03e398d0 fffffa80`0472f400 :  nt!EtwpUpdateLoggerGroupMasks+0x22c
fffff880`02fd2b10 fffff800`0312d3d9 :  00000000`00000000 fffff8a0`03e398d0 00000000`00000000 fffff800`02ee68e6 :  nt!EtwpStopLoggerInstance+0x4f
fffff880`02fd2b50 fffff800`03174973 :  00000000`00000000 00000000`00000001 fffffa80`0472f440 ffffffff`88ca6c00 :  nt!EtwpStopTrace+0x129
fffff880`02fd2bc0 fffff800`0334c695 :  ffffffff`ffffffff 00000000`00000001 ffffffff`000000b4 fffff800`030857c8 :  nt!NtTraceControl+0x263
fffff880`02fd2c30 fffff800`02edc4b5 :  fffff800`0307c200 fffff800`0334c4d0 fffff800`0307c2d8 fffffa80`03ce5660 :  nt!PerfDiagpProxyWorker+0x1c5
fffff880`02fd2c70 fffff800`0316c456 :  00000000`00000000 fffffa80`03ce5660 00000000`00000080 fffffa80`03cd2870 :  nt!ExpWorkerThread+0x111
fffff880`02fd2d00 fffff800`02ec42c6 :  fffff880`009e7180 fffffa80`03ce5660 fffff880`009f1f40 00000000`00000000 :  nt!PspSystemThreadStartup+0x5a
fffff880`02fd2d40 00000000`00000000 :  fffff880`02fd3000 fffff880`02fcd000 fffff880`02fd21b0 00000000`00000000 :  nt!KxStartSystemThread+0x16

SYMBOL_STACK_INDEX:   3
SYMBOL_NAME:   fileinfo!FIStreamLog+1be
FOLLOWUP_NAME:   MachineOwner
MODULE_NAME:  fileinfo
IMAGE_NAME:   fileinfo.sys
DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc481
STACK_COMMAND:   .cxr 0xfffff88002fd1bc0 ; kb
FAILURE_BUCKET_ID:   X64_0x7E_fileinfo!FIStreamLog+1be
BUCKET_ID:   X64_0x7E_fileinfo!FIStreamLog+1be
Followup:  MachineOwner
---------
(Ten post był ostatnio modyfikowany: 09.07.2015 00:22 przez Demo72.)

06.07.2015 16:17

Znajdź wszystkie posty użytkownika
Wątek zamknięty


Wiadomości w tym wątku
Antywirus i bluescreen - Demo72 - 02.07.2015, 19:21
RE: Antywirus i bluescreen - Demo72 - 05.07.2015, 16:20
RE: Antywirus i bluescreen - Demo72 - 06.07.2015 16:17
RE: Antywirus i bluescreen - Demo72 - 10.07.2015, 08:34
Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
Windows 7 x64 Bluescreen przy grach skailer213 1 1.234 04.08.2016 14:46
Ostatni post: thermalfake
Windows 7 64-bit Problem z bluescreen'ami soho90 4 2.049 13.02.2016 12:37
Ostatni post: soho90
Rozwiązany -Windows 7 64-bit Problem z bluescreen'ami (BSOD) jacob776 6 3.589 04.12.2015 17:45
Ostatni post: jacob776
bluescreen -czego wina ? ftcrev 2 1.768 01.11.2015 11:37
Ostatni post: thermalfake
Rozwiązany Lenovo G580 bluescreen przy uruchomieniu Dropboxa lewek59 7 3.047 16.09.2015 08:09
Ostatni post: lewek59
BCCode: 6b problem z systemem,bluescreen divisio 1 1.282 03.08.2015 19:05
Ostatni post: thermalfake
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 1 głosów.