Avast WEBforum

Non-English Zone => Русский => Topic started by: yura1981 on February 02, 2015, 02:04:19 PM

Title: Компьютер перезагрузился во время сканирования.
Post by: yura1981 on February 02, 2015, 02:04:19 PM
Анализ файла minidump на сайте  http://www.osronline.com указывает, что вылетел процесс: AvastSvc.exe .
В чём может быть проблема ?

Code: [Select]
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18700.amd64fre.win7sp1_gdr.141211-1742
Machine Name:
Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`03054890
Debug session time: Mon Feb  2 07:19:10.523 2015 (UTC - 5:00)
System Uptime: 0 days 14:37:47.059
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000000c08a5
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x24

PROCESS_NAME:  AvastSvc.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff88001457bd5 to fffff80002e87e80

STACK_TEXT: 
fffff880`09e81e28 fffff880`01457bd5 : 00000000`00000024 00000000`000c08a5 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`09e81e30 fffff880`0147c008 : 00000001`00000000 00000000`00000000 00000000`00000000 00000fa8`007c0000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`09e81f30 fffff880`01002bcf : fffffa80`0385ed40 fffffa80`0385e9a0 fffffa80`07fec010 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x71b9
fffff880`09e81fe0 fffff880`010016df : fffffa80`045a5de0 fffffa80`081b4000 fffffa80`045a5d00 fffffa80`0385e9a0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`09e82070 fffff800`02eaf105 : fffffa80`0385e9c0 fffffa80`0498e470 fffffa80`086380d0 fffff880`009ef180 : fltmgr!FltpDispatch+0xcf
fffff880`09e820d0 fffff800`02eaebd9 : 00000000`00064000 00000000`00064000 fffffa80`08638010 fffffa80`08638010 : nt!IoPageRead+0x255
fffff880`09e82160 fffff800`02e954a9 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`09e82230 fffff800`02e9dc80 : 00000000`00000000 fffff980`4098f000 fffff880`09e82400 fffffa80`081b4060 : nt!MmAccessFault+0x1399
fffff880`09e82390 fffff800`02e761fe : fffff980`40980000 00000000`00000000 00000000`00000000 00000000`00000080 : nt!MmCheckCachedPageStates+0x910
fffff880`09e82540 fffff800`03171290 : 00000000`00000000 00000000`00080000 fffffa80`081ded00 00000000`02260000 : nt!CcFetchDataForRead+0x10e
fffff880`09e825a0 fffff880`014ef01f : fffff880`00000001 00000000`00000005 fffffa80`00040000 fffffa80`081ded01 : nt!CcCopyRead+0x180
fffff880`09e82660 fffff880`01001098 : fffffa80`081ded00 fffffa80`04654628 fffffa80`035b2708 fffffa80`081ded01 : Ntfs!NtfsCopyReadA+0x18f
fffff880`09e82840 fffff880`010048ba : fffff880`09e82910 00000000`02260003 00000000`02260000 fffffa80`081ded00 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`09e828a0 fffff880`01022630 : fffffa80`081ded00 00000000`00000000 fffff880`09e82a00 00000000`00020000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`09e828e0 fffff800`03170dc9 : fffffa80`081ded00 fffff880`00000001 fffffa80`036f38a0 fffffa80`081ded00 : fltmgr!FltpFastIoRead+0x1d0
fffff880`09e82980 fffff800`02e87113 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`09e82a70 00000000`74842e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0a71eaa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74842e09


STACK_COMMAND:  kb

FOLLOWUP_IP:
Ntfs!NtfsPagingFileIo+155
fffff880`01457bd5 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsPagingFileIo+155

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  52e1be8a

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155

BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155