RASSTLESNAKE-Steve Austin Posted April 5, 2014 Posted April 5, 2014 (edited) ПРоблема при запуске клиента, показывает ошибка 132, пробовал все методы изложенные на данном сайте, и на оффициальном сайте Близзард. Помогите решите проблему, скриншот ошибки и отчёт её же предоставляю ============================================================================== World of WarCraft: Retail Build (build 17688) Exe: D:\ZHEKA\Games\wow\PandaWoW.exe Time: Apr 5, 2014 7:46:22.000 PM User: Женя Computer: ZHENYA ------------------------------------------------------------------------------ This application has encountered a critical error: ERROR #132 (0x85100084) Fatal exception! Program: D:\ZHEKA\Games\wow\PandaWoW.exe ProcessID: 2452 Exception: 0xC0000005 (ACCESS_VIOLATION) at 001B:018B42A5 The instruction at "0x018B42A5" referenced memory at "0x00000024". The memory could not be "read". 5.4.2.17688 Retail 10 17688 5.4.2 World of WarCraft Type: WoW Executable UUID: X86 User: Computer: ZHENYA Virtual Memory: 84.70 MB Free Disk Space: 18.90 GB Exe Built: Sep 23 2013 18:30:35 App Up Time: 0 days, 0 hours, 0 minutes, 1 seconds System Up Time: 0 days, 2 hours, 23 minutes, 46 seconds Session Time(hh:mm:ss): 00:00:00 00:00:00 - 00:14:59 Time in World(hh:mm:ss): 00:00:00 00:00:00 - 00:00:00 0 0 Addon resource usage (not including lua memory): 0 No No Number of successful WoWConnections: 0 CVar Settings: ruRU enUS logon.pandawow.ru ---------------------------------------- Installation settings: ---------------------------------------- UID: wow Expansion Level: 4 PTR: 0 Beta: 0 PatchURL: '' ProductCode: 'WoW' ---------------------------------------- GxInfo ---------------------------------------- No GX Device Created Desktop Display List: Device Name: \\.\DISPLAY1 Device String: NVIDIA GeForce GTX 660 State Flags: 0x00000005 Device ID: PCI\VEN_10DE&DEV_11C0&SUBSYS_128119DA&REV_A1 Installed DX9 Version: File Version: 6.1.7601.17514 Exception ERROR #132 (0x85100084) Fatal exception! The instruction at "0x018B42A5" referenced memory at "0x00000024". The memory could not be "read". 0xC0000005 (ACCESS_VIOLATION) at 001B:018B42A5 <:inspector.summary> ------------------------------------------------------------------------------ DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") <:inspector.assertion> DBG-OPTIONS DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-OPTIONS <:inspector.hashblock> ---------------------------------------- x86 Registers ---------------------------------------- EAX=02CC54EC EBX=029DE038 ECX=00000000 EDX=00000008 ESI=029DE028 EDI=029DE064 EBP=02CC53CC ESP=02CC53CC EIP=018B42A5 FLG=00010202 CS =001B DS =0023 ES =0023 SS =0023 FS =003B GS =0000 ---------------------------------------- Stack Trace (Manual) ---------------------------------------- Showing 4/4 threads... --- Thread ID: 4184 [Current Thread] --- DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") --- Thread ID: 3328 --- DBG-ADDR("ntdll.dll") DBG-ADDR("mswsock.dll") DBG-ADDR("drwebsp.dll") --- Thread ID: 6080 --- DBG-ADDR("ntdll.dll") DBG-ADDR("drwebsp.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 4280 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") ---------------------------------------- Stack Trace (Using DBGHELP.DLL) ---------------------------------------- Showing 4/4 threads... --- Thread ID: 4184 [Current Thread] --- 018B42A5 PandaWoW.exe SSyncObject::SSyncObject+18069 (029DE028,02CC54EC,00000000,00000001) 015A6B31 PandaWoW.exe SMemDumpUsage+192 (01CE1D84,FFFFFFFF,029DE038,00000028) 015A70BE PandaWoW.exe SMemDumpUsage+1613 (01CE1D84,FFFFFFFF,02CC5548,013D1029) 015A715B PandaWoW.exe SMemFree+21 (029DE040,01CE1D84,FFFFFFFF,00000000) 013D1029 PandaWoW.exe +0 (029DE040,00000400,029DE040,02CC6CF4) 013EEF41 PandaWoW.exe SGetCurrentProcessId+22709 (00000001,01CE3620,00003F40,00000104) 0140B08A PandaWoW.exe SGetCurrentProcessId+137726 (02CCEEE8,02CC6D08,00003F40,01CE6118) 013E4C6F PandaWoW.exe SFile::MakeFileLocal+581 (02CCEEE8,02CCEBE4,00000BB8,02CCACA4) 013D65DE PandaWoW.exe +0 (01CECBB4,00000BB8,01E9911F,000000E8) 013D84ED PandaWoW.exe +0 (00000000,00000000,00000001,61746144) 013D890A PandaWoW.exe +0 (0032F020,00000001,02CCFA98,013D8E08) 013D8DEB PandaWoW.exe +0 (013DE818,02CCFAD0,75315286,0032F020) 013D8E08 PandaWoW.exe +0 (0032F020,B21BBDE2,00000000,00000000) 75315286 kernel32.dll CreateFiberEx+535 (0032F320,0032F320,00000000,00000000) 7531523E kernel32.dll CreateFiberEx+463 (00000000,00000000,00000000,00000000) --- Thread ID: 3328 --- 76ED70B4 ntdll.dll KiFastSystemCallRet+0 (00002200,000021FC,00000001,00000004) 74A06D30 mswsock.dll +0 (00000001,031CF638,031CF73C,031CF534) 100079FA drwebsp.dll reinstall+23399 (0000220C,4800001C,00000000,00000000) 76B13066 WS2_32.dll WSAIoctl+127 (00144A30,00144A30,76B1306F,4800001C) 76B12FAC WS2_32.dll WahReferenceContextByHandle+140 (00000001,031CFB08,031CF900,031CFA04) 758D3C1E WININET.dll InternetGetConnectedStateExW+952 (76EA4D16,00000024,00000001,00000000) 76EA4CE9 ntdll.dll TpSetPoolMinThreads+836 (00000024,00000001,00000000,00000000) 76EA4D16 ntdll.dll TpSetPoolMinThreads+881 (76EF3832,00000000,00000000,00319D70) 76EF3874 ntdll.dll RtlInitializeExceptionChain+366 (00000000,00000000,00319D70,754217E7) 76EF3832 ntdll.dll RtlInitializeExceptionChain+300 (76ED68F4,76EF364B,7569167C,00000000) 76EF3822 ntdll.dll RtlInitializeExceptionChain+284 (76EF364B,7569167C,00000000,00000000) 76ED68F4 ntdll.dll ZwTestAlert+12 (7569167C,00000000,00000000,76E90000) 76EF364B ntdll.dll RtlAllocateActivationContextStack+298 (76EF366D,031CF9D4,00000001,00000000) 76ED5574 ntdll.dll ZwContinue+12 (031CF9D4,00000001,00000000,00000000) 76EF366D ntdll.dll LdrInitializeThunk+26 (00000001,00000000,00000000,031CF9D4) 031CF9D4 +0 (00000000,00000000,031CF9D4,76E90000) --- Thread ID: 6080 --- 76ED70B4 ntdll.dll KiFastSystemCallRet+0 (000021E4,0321FBEC,0321FBD8,0321FBE0) 10004756 drwebsp.dll reinstall+10435 (035107E0,0321FC30,76EF37F5,035107E0) 75333C45 kernel32.dll BaseThreadInitThunk+18 (035107E0,755413FC,00000000,00000000) 76EF37F5 ntdll.dll RtlInitializeExceptionChain+239 (10004719,035107E0,00000000,00000000) 76EF37C8 ntdll.dll RtlInitializeExceptionChain+194 (10004719,035107E0,00000000,00000000) --- Thread ID: 4280 --- 76ED70B4 ntdll.dll KiFastSystemCallRet+0 (003421D8,0317F8E4,76EF37F5,003421D8) 75333C45 kernel32.dll BaseThreadInitThunk+18 (003421D8,75621728,00000000,00000000) 76EF37F5 ntdll.dll RtlInitializeExceptionChain+239 (76B320F2,003421D8,00000000,00000000) 76EF37C8 ntdll.dll RtlInitializeExceptionChain+194 (76B320F2,003421D8,00000000,00000000) ---------------------------------------- Loaded Modules ---------------------------------------- DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE <:inspector.debugmodules> ---------------------------------------- Memory Dump ---------------------------------------- Code: 32 bytes starting at (EIP = 018B42A5 - 10) 018B4295: 81 E0 03 00 00 C3 8D 81 E4 03 00 00 C3 55 8B EC .............U.. * = addr ** * 018B42A5: 8B 41 24 83 F8 FF 75 04 33 C0 EB 42 56 8B 75 08 .A$...u.3..BV.u. Stack: 1024 bytes starting at (ESP = 02CC53CC - 20) 02CC53A0: 60 0C 47 85 94 A1 5B 84 A0 C5 00 C0 00 00 00 00 `.G...[......... 02CC53B0: 04 00 00 00 34 FD FF FF E4 02 00 00 34 FD FF FF ....4.......4... 02CC53C0: CC 02 00 00 18 00 00 00 00 00 00 00 00 55 CC 02 .............U.. * = addr ** * 02CC53C0: CC 02 00 00 18 00 00 00 00 00 00 00 00 55 CC 02 .............U.. 02CC53D0: 31 6B 5A 01 28 E0 9D 02 EC 54 CC 02 00 00 00 00 1kZ.(....T...... 02CC53E0: 01 00 00 00 08 6D CC 02 00 00 00 00 78 02 00 00 .....m......x... 02CC53F0: C8 77 01 01 2C 53 CC 02 38 54 CC 02 64 54 CC 02 .w..,S..8T..dT.. 02CC5400: ED E0 EA 76 54 FA 9B 00 FE FF FF FF 70 65 EE 76 ...vT.......pe.v 02CC5410: A6 65 EE 76 00 00 00 00 58 28 34 00 58 28 34 00 .e.v....X(4.X(4. 02CC5420: 01 00 00 00 00 00 00 00 50 28 34 00 74 54 CC 02 ........P(4.tT.. 02CC5430: 76 76 15 75 00 00 30 00 00 00 00 00 8C 76 15 75 vv.u..0......v.u 02CC5440: 52 13 1B B2 01 00 00 00 58 28 34 00 00 00 00 00 R.......X(4..... 02CC5450: 58 28 34 00 64 CA 32 75 40 E0 9D 02 40 54 CC 02 X(4.d.2u@...@T.. 02CC5460: 58 28 34 00 C0 FA CC 02 65 E1 16 75 B6 31 C2 C5 X(4.....e..u.1.. 02CC5470: FE FF FF FF 8C 76 15 75 19 1B 8C 75 A8 54 CC 02 .....v.u...u.T.. 02CC5480: 1C 28 EA 76 00 00 00 00 58 28 34 00 28 28 EA 76 .(.v....X(4.((.v 02CC5490: AC 54 CC 02 2F A7 8D 75 01 00 00 00 38 76 32 00 .T../..u....8v2. 02CC54A0: 20 BB 33 00 64 BB B9 74 B8 54 CC 02 1A 18 8D 75 .3.d..t.T.....u 02CC54B0: 02 00 00 00 FC 54 CC 02 D0 54 CC 02 ED 17 8D 75 .....T...T.....u 02CC54C0: D0 54 CC 02 F4 17 8D 75 02 00 00 00 08 00 CC 00 .T.....u........ 02CC54D0: 14 55 CC 02 7D AC 8D 75 FC 54 CC 02 08 6D CC 02 .U..}..u.T...m.. 02CC54E0: BC 21 00 00 40 E0 9D 02 1C 55 CC 02 28 E0 9D 02 .!..@....U..(... 02CC54F0: 60 E0 9D 02 00 00 00 00 4C 00 00 00 BC 21 00 00 `.......L....!.. 02CC5500: 20 55 CC 02 BE 70 5A 01 84 1D CE 01 FF FF FF FF U...pZ......... 02CC5510: 38 E0 9D 02 28 00 00 00 40 E0 9D 02 7C CA 32 75 8...(...@...|.2u 02CC5520: 30 55 CC 02 5B 71 5A 01 84 1D CE 01 FF FF FF FF 0U..[qZ......... 02CC5530: 48 55 CC 02 29 10 3D 01 40 E0 9D 02 84 1D CE 01 HU..).=.@....... 02CC5540: FF FF FF FF 00 00 00 00 5C 55 CC 02 41 EF 3E 01 ........\U..A.>. 02CC5550: 40 E0 9D 02 00 04 00 00 40 E0 9D 02 F4 6C CC 02 @.......@....l.. 02CC5560: 8A B0 40 01 01 00 00 00 20 36 CE 01 40 3F 00 00 ..@..... 6..@?.. 02CC5570: 04 01 00 00 2F 70 61 74 63 68 00 00 00 00 00 00 ..../patch...... 02CC5580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC55A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC55B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC55C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC55D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC55E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC55F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC56A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC56B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC56C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC56D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC56E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC56F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC5790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC57A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC57B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02CC57C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ------------------------------------------------------------------------------ Percent memory used: 67 Total physical memory: 2146754560 Free physical memory: 695783424 Page file: 4293509120 Total virtual memory: 2147352576 Free virtual memory: 2054037504 ------------------------------------------------------------------------------ List of running PandaWoW.exe processes Process: D:\ZHEKA\Games\wow\PandaWoW.exe; pid: 2452 List of running Agent.exe processes Edited April 5, 2014 by Тревор
Тревор Posted April 5, 2014 Posted April 5, 2014 Качайте новый клиент, затем настраиваете для нашего сервера.
Recommended Posts