Jump to content

mailsss

Потребител
  • Брой теми

    2
  • Регистрация

  • Последно посещение

mailsss's Achievements

Новобранец

Новобранец (1/14)

0

Репутация в общността

  1. WOW ... Благодаря за изчерпателните и пълни обяснения! Като направя всичко ще пиша! Понеже съм с Уиндоус 8 - тайно се надявам да е някой счупен драйвер ... Много благодаря!
  2. ПОМОООООООЩ чисто нов лаптоп Packard Bell се рестартира когато му кефне - има моменти по няколко часа работи без проблем и после се появяват едни черти и се рестартира. Ето информацията от Memory.dmp - Моля за съдействие - нищо не разбрах от написаното във файла. ................******************************************************************************** ** Bugcheck Analysis ** ******************************************************************************** Use !analyze -v to get detailed debugging information. BugCheck FC, {fffffa8006f6419a, 8000000218a009e3, fffff800718277e0, 3} Page 20abc5 not present in the dump file. Type ".hh dbgerr004" for detailsProbably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+34580 ) Followup: MachineOwner--------- 0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ******************************************************************************** ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)An attempt was made to execute non-executable memory. The guilty driveris on the stack trace (and is typically the current instruction pointer).When possible, the guilty driver's name (Unicode string) is printed onthe bugcheck screen and saved in KiBugCheckDriver.Arguments:Arg1: fffffa8006f6419a, Virtual address for the attempted execute.Arg2: 8000000218a009e3, PTE contents.Arg3: fffff800718277e0, (reserved)Arg4: 0000000000000003, (reserved) Debugging Details:------------------ Page 20abc5 not present in the dump file. Type ".hh dbgerr004" for details DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xFC PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre DPC_STACK_BASE: FFFFF8007182DFB0 TRAP_FRAME: fffff800718277e0 -- (.trap 0xfffff800718277e0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=6a15a217bc2a27db rbx=0000000000000000 rcx=fffffa8006f6419ardx=085131481131482e rsi=0000000000000000 rdi=0000000000000000rip=fffffa8006f6419a rsp=fffff80071827978 rbp=fffff80071827ab0 r8=0000000000000000 r9=0000000000000000 r10=fffffa8006f6419ar11=00000000f2861bfe r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl nz na po ncfffffa80`06f6419a 2e483111 xor qword ptr cs:[rcx],rdx cs:0010:fffffa80`06f6419a=000000001131482eResetting default scope LAST_CONTROL_TRANSFER: from fffff800725facd6 to fffff80072469240 STACK_TEXT: fffff800`71827618 fffff800`725facd6 : 00000000`000000fc fffffa80`06f6419a 80000002`18a009e3 fffff800`718277e0 : nt!KeBugCheckExfffff800`71827620 fffff800`725fa584 : fffff800`71820000 fffff800`724931dd fffffa80`0a6cc5e0 ffffffff`fffcf2c0 : nt! ?? ::FNODOBFM::`string'+0x34580fffff800`71827660 fffff800`724a3e2b : fffff800`72709f00 fffff800`71827700 fffffa80`0668a99e fffff800`718277e0 : nt! ?? ::FNODOBFM::`string'+0x3334afffff800`718276a0 fffff800`72466cee : 00000000`00000008 fffff800`72709f00 fffff800`71827800 fffff800`718277e0 : nt!MmAccessFault+0xa8bfffff800`718277e0 fffffa80`06f6419a : fffffa80`068031e3 fffff800`726a2bc0 fffff800`7240f000 00000000`00000f44 : nt!KiPageFault+0x16efffff800`71827978 fffffa80`068031e3 : fffff800`726a2bc0 fffff800`7240f000 00000000`00000f44 00000000`00000000 : 0xfffffa80`06f6419afffff800`71827980 fffff800`726a2bc0 : fffff800`7240f000 00000000`00000f44 00000000`00000000 00000000`00000286 : 0xfffffa80`068031e3fffff800`71827988 fffff800`7240f000 : 00000000`00000f44 00000000`00000000 00000000`00000286 fffff800`72491ac1 : nt!EtwpGroupMasksfffff800`71827990 00000000`00000f44 : 00000000`00000000 00000000`00000286 fffff800`72491ac1 08513148`1131482e : nt!`string' <PERF> (nt+0x0)fffff800`71827998 00000000`00000000 : 00000000`00000286 fffff800`72491ac1 08513148`1131482e fffff800`00000002 : 0xf44 STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+34580fffff800`725facd6 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+34580 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 51316195 IMAGE_VERSION: 6.2.9200.16548 BUCKET_ID_FUNC_OFFSET: 34580 FAILURE_BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xfc_nt!_??_::fnodobfm::_string_ FAILURE_ID_HASH: {a715e467-86e4-97ce-e0a9-37223e080980} Followup: MachineOwner---------
×
×
  • Създай ново...