Ecran bleu et pc rebbot sous windows7

simdas -  
 Utilisateur anonyme -


Bonjour, j'aurais besoin de votre aide pour decoder mon fichier minidump. Mon pc atteint un ecran bleu et redemarre. jai lis sur les forum et jai reussi a ouvrir mon fichier minidump. Quelqu'un peu me dire ce qui se passe ou quoi faire avec les infos que j'ai obtenu. Merci a l'avance ;)

voici le rapport:

Loading Dump File [C:\Windows\Minidump\minidump.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\debug\debuggers
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800'02a1b000 PsLoadedModuleList = 0xfffff800'02c58e50
Debug session time: Fri Mar 26 21:00:28.985 2010 (UTC - 4:00)
System Uptime: 2 days 10:59:32.764
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 34, {50830, fffff88002fc4718, fffff88002fc3f70, fffff80002ab0112}

Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceObjectDeferDeleteWithTag+1e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050830
Arg2: fffff88002fc4718
Arg3: fffff88002fc3f70
Arg4: fffff80002ab0112

Debugging Details:
------------------

EXCEPTION_RECORD: fffff88002fc4718 -- (.exr 0xfffff88002fc4718)
ExceptionAddress: fffff80002ab0112 (nt!ObDereferenceObjectDeferDeleteWithTag+0x000000000000001e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff88002fc3f70 -- (.cxr 0xfffff88002fc3f70)
rax=ffffffffffffffff rbx=fffffa8001af6940 rcx=ffff008008237e20
rdx=00000000746c6644 rsi=0000000000000000 rdi=ffff008008237e20
rip=fffff80002ab0112 rsp=fffff88002fc4950 rbp=fffffa8004eb4440
r8=0000000000000000 r9=0000000000000000 r10=0000058000000000
r11=00000000c0000434 r12=0000000000000002 r13=0000000000000000
r14=fffffa80081a5ab0 r15=fffffa800075b670
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ObDereferenceObjectDeferDeleteWithTag+0x1e:
fffff800'02ab0112 f0480fc147d0 lock xadd qword ptr [rdi-30h],rax ds:002b:ffff0080'08237df0=????????????????
Resetting default scope

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc0000005 - L

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc30e0
ffffffffffffffff

FOLLOWUP_IP:
nt!ObDereferenceObjectDeferDeleteWithTag+1e
fffff800'02ab0112 f0480fc147d0 lock xadd qword ptr [rdi-30h],rax

FAULTING_IP:
nt!ObDereferenceObjectDeferDeleteWithTag+1e
fffff800'02ab0112 f0480fc147d0 lock xadd qword ptr [rdi-30h],rax

BUGCHECK_STR: 0x34

LAST_CONTROL_TRANSFER: from fffff80002a7e0f4 to fffff80002ab0112

STACK_TEXT:
fffff880'02fc4950 fffff800'02a7e0f4 : fffffa80'01af6940 fffffa80'00000009 00000000'00000400 fffff800'02c05e00 : nt!ObDereferenceObjectDeferDeleteWithTag+0x1e
fffff880'02fc4990 fffff800'02a32db4 : fffffa80'04eb4440 00000000'00000000 00000000'00000000 fffffa80'03b65680 : nt!MiWaitForInPageComplete+0x4e4
fffff880'02fc4a70 fffff800'02a32b5a : 00000000'00000000 00000000'00000000 fffff800'02c305a0 00000000'00000000 : nt!MiPfCompletePrefetchIos+0x54
fffff880'02fc4aa0 fffff800'02a3dab5 : fffffa80'03b65680 00000000'343c3000 00000000'343c3000 fffff800'02c305a0 : nt!MmWaitForCacheManagerPrefetch+0x1e
fffff880'02fc4ad0 fffff800'02a80db6 : fffffa80'08c36960 fffffa80'03b60000 fffffa80'00000005 fffffa80'042a2050 : nt!CcPerformReadAhead+0x341
fffff880'02fc4c00 fffff800'02a9a161 : fffffa80'03b6e190 fffff800'02a80b98 fffff800'02c92150 00000000'00000002 : nt!CcWorkerThread+0x21e
fffff880'02fc4cb0 fffff800'02d30166 : 00000000'00000000 fffffa80'03b65680 00000000'00000080 fffffa80'03b4f040 : nt!ExpWorkerThread+0x111
fffff880'02fc4d40 fffff800'02a6b486 : fffff880'009e5180 fffffa80'03b65680 fffff880'009eff40 00000000'00000000 : nt!PspSystemThreadStartup+0x5a
fffff880'02fc4d80 00000000'00000000 : fffff880'02fc5000 fffff880'02fbf000 fffff880'02fc46e0 00000000'00000000 : nt!KxStartSystemThread+0x16

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!ObDereferenceObjectDeferDeleteWithTag+1e

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600

STACK_COMMAND: .cxr 0xfffff88002fc3f70 ; kb

FAILURE_BUCKET_ID: X64_0x34_nt!ObDereferenceObjectDeferDeleteWithTag+1e

BUCKET_ID: X64_0x34_nt!ObDereferenceObjectDeferDeleteWithTag+1e

Followup: MachineOwner
---------

0: kd> lmvm nt
start end module name
fffff800'02a1b000 fffff800'02ff8000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\F8E2A8B5C9B74BF4A6E4A48F180099942\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symbols\ntkrnlmp.exe\4A5BC6005dd000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Mon Jul 13 19:40:48 2009 (4A5BC600)
CheckSum: 0054B487
ImageSize: 005DD000
File version: 6.1.7600.16385
Product version: 6.1.7600.16385
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.1.7600.16385
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
A voir également:

1 réponse

Utilisateur anonyme
 
https://forum.zebulon.fr/topic/55305-comment-reparer-lerreur-minidump/
regardes si ca te concerne.

virus ce serait possible ?

peux tu verifier ta ram ?

as tu installé quelque chose ?
0