Jump to content

Recommended Posts

Posted (edited)

ПРоблема при запуске клиента, показывает ошибка 132, пробовал все методы изложенные на данном сайте, и на оффициальном сайте Близзард. Помогите решите проблему, скриншот ошибки и отчёт её же предоставляю

 

 

==============================================================================

World of WarCraft: Retail Build (build 17688)

 

Exe: D:\ZHEKA\Games\wow\PandaWoW.exe

Time: Apr 5, 2014 7:46:22.000 PM

User: Женя

Computer: ZHENYA

------------------------------------------------------------------------------

 

This application has encountered a critical error:

 

ERROR #132 (0x85100084) Fatal exception!

 

Program: D:\ZHEKA\Games\wow\PandaWoW.exe

ProcessID: 2452

Exception: 0xC0000005 (ACCESS_VIOLATION) at 001B:018B42A5

 

The instruction at "0x018B42A5" referenced memory at "0x00000024".

The memory could not be "read".

 

5.4.2.17688

Retail

10

17688

5.4.2

World of WarCraft

Type: WoW

Executable UUID:

X86

User:

Computer: ZHENYA

Virtual Memory: 84.70 MB

Free Disk Space: 18.90 GB

Exe Built: Sep 23 2013 18:30:35

App Up Time: 0 days, 0 hours, 0 minutes, 1 seconds

System Up Time: 0 days, 2 hours, 23 minutes, 46 seconds

Session Time(hh:mm:ss): 00:00:00

00:00:00 - 00:14:59

Time in World(hh:mm:ss): 00:00:00

00:00:00 - 00:00:00

0

0

Addon resource usage (not including lua memory): 0

No

No

Number of successful WoWConnections: 0

 

CVar Settings:

ruRU

enUS

logon.pandawow.ru

 

----------------------------------------

Installation settings:

----------------------------------------

UID: wow

Expansion Level: 4

PTR: 0

Beta: 0

PatchURL: ''

ProductCode: 'WoW'

 

----------------------------------------

GxInfo

----------------------------------------

No GX Device Created

Desktop Display List:

Device Name: \\.\DISPLAY1

Device String: NVIDIA GeForce GTX 660

State Flags: 0x00000005

Device ID: PCI\VEN_10DE&DEV_11C0&SUBSYS_128119DA&REV_A1

 

Installed DX9 Version:

File Version: 6.1.7601.17514

 

Exception

ERROR #132 (0x85100084) Fatal exception!

The instruction at "0x018B42A5" referenced memory at "0x00000024".

The memory could not be "read".

0xC0000005 (ACCESS_VIOLATION) at 001B:018B42A5

<:inspector.summary>

------------------------------------------------------------------------------

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

<:inspector.assertion>

DBG-OPTIONS

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-OPTIONS

<:inspector.hashblock>

 

----------------------------------------

x86 Registers

----------------------------------------

 

EAX=02CC54EC EBX=029DE038 ECX=00000000 EDX=00000008 ESI=029DE028

EDI=029DE064 EBP=02CC53CC ESP=02CC53CC EIP=018B42A5 FLG=00010202

CS =001B DS =0023 ES =0023 SS =0023 FS =003B GS =0000

 

 

----------------------------------------

Stack Trace (Manual)

----------------------------------------

 

Showing 4/4 threads...

 

--- Thread ID: 4184 [Current Thread] ---

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("kernel32.dll")

DBG-ADDR("kernel32.dll")

 

--- Thread ID: 3328 ---

DBG-ADDR("ntdll.dll")

DBG-ADDR("mswsock.dll")

DBG-ADDR("drwebsp.dll")

 

--- Thread ID: 6080 ---

DBG-ADDR("ntdll.dll")

DBG-ADDR("drwebsp.dll")

DBG-ADDR("kernel32.dll")

DBG-ADDR("ntdll.dll")

DBG-ADDR("ntdll.dll")

 

--- Thread ID: 4280 ---

DBG-ADDR("ntdll.dll")

DBG-ADDR("kernel32.dll")

DBG-ADDR("ntdll.dll")

DBG-ADDR("ntdll.dll")

 

----------------------------------------

Stack Trace (Using DBGHELP.DLL)

----------------------------------------

 

Showing 4/4 threads...

 

--- Thread ID: 4184 [Current Thread] ---

018B42A5 PandaWoW.exe SSyncObject::SSyncObject+18069 (029DE028,02CC54EC,00000000,00000001)

015A6B31 PandaWoW.exe SMemDumpUsage+192 (01CE1D84,FFFFFFFF,029DE038,00000028)

015A70BE PandaWoW.exe SMemDumpUsage+1613 (01CE1D84,FFFFFFFF,02CC5548,013D1029)

015A715B PandaWoW.exe SMemFree+21 (029DE040,01CE1D84,FFFFFFFF,00000000)

013D1029 PandaWoW.exe +0 (029DE040,00000400,029DE040,02CC6CF4)

013EEF41 PandaWoW.exe SGetCurrentProcessId+22709 (00000001,01CE3620,00003F40,00000104)

0140B08A PandaWoW.exe SGetCurrentProcessId+137726 (02CCEEE8,02CC6D08,00003F40,01CE6118)

013E4C6F PandaWoW.exe SFile::MakeFileLocal+581 (02CCEEE8,02CCEBE4,00000BB8,02CCACA4)

013D65DE PandaWoW.exe +0 (01CECBB4,00000BB8,01E9911F,000000E8)

013D84ED PandaWoW.exe +0 (00000000,00000000,00000001,61746144)

013D890A PandaWoW.exe +0 (0032F020,00000001,02CCFA98,013D8E08)

013D8DEB PandaWoW.exe +0 (013DE818,02CCFAD0,75315286,0032F020)

013D8E08 PandaWoW.exe +0 (0032F020,B21BBDE2,00000000,00000000)

75315286 kernel32.dll CreateFiberEx+535 (0032F320,0032F320,00000000,00000000)

7531523E kernel32.dll CreateFiberEx+463 (00000000,00000000,00000000,00000000)

 

--- Thread ID: 3328 ---

76ED70B4 ntdll.dll KiFastSystemCallRet+0 (00002200,000021FC,00000001,00000004)

74A06D30 mswsock.dll +0 (00000001,031CF638,031CF73C,031CF534)

100079FA drwebsp.dll reinstall+23399 (0000220C,4800001C,00000000,00000000)

76B13066 WS2_32.dll WSAIoctl+127 (00144A30,00144A30,76B1306F,4800001C)

76B12FAC WS2_32.dll WahReferenceContextByHandle+140 (00000001,031CFB08,031CF900,031CFA04)

758D3C1E WININET.dll InternetGetConnectedStateExW+952 (76EA4D16,00000024,00000001,00000000)

76EA4CE9 ntdll.dll TpSetPoolMinThreads+836 (00000024,00000001,00000000,00000000)

76EA4D16 ntdll.dll TpSetPoolMinThreads+881 (76EF3832,00000000,00000000,00319D70)

76EF3874 ntdll.dll RtlInitializeExceptionChain+366 (00000000,00000000,00319D70,754217E7)

76EF3832 ntdll.dll RtlInitializeExceptionChain+300 (76ED68F4,76EF364B,7569167C,00000000)

76EF3822 ntdll.dll RtlInitializeExceptionChain+284 (76EF364B,7569167C,00000000,00000000)

76ED68F4 ntdll.dll ZwTestAlert+12 (7569167C,00000000,00000000,76E90000)

76EF364B ntdll.dll RtlAllocateActivationContextStack+298 (76EF366D,031CF9D4,00000001,00000000)

76ED5574 ntdll.dll ZwContinue+12 (031CF9D4,00000001,00000000,00000000)

76EF366D ntdll.dll LdrInitializeThunk+26 (00000001,00000000,00000000,031CF9D4)

031CF9D4 +0 (00000000,00000000,031CF9D4,76E90000)

 

--- Thread ID: 6080 ---

76ED70B4 ntdll.dll KiFastSystemCallRet+0 (000021E4,0321FBEC,0321FBD8,0321FBE0)

10004756 drwebsp.dll reinstall+10435 (035107E0,0321FC30,76EF37F5,035107E0)

75333C45 kernel32.dll BaseThreadInitThunk+18 (035107E0,755413FC,00000000,00000000)

76EF37F5 ntdll.dll RtlInitializeExceptionChain+239 (10004719,035107E0,00000000,00000000)

76EF37C8 ntdll.dll RtlInitializeExceptionChain+194 (10004719,035107E0,00000000,00000000)

 

--- Thread ID: 4280 ---

76ED70B4 ntdll.dll KiFastSystemCallRet+0 (003421D8,0317F8E4,76EF37F5,003421D8)

75333C45 kernel32.dll BaseThreadInitThunk+18 (003421D8,75621728,00000000,00000000)

76EF37F5 ntdll.dll RtlInitializeExceptionChain+239 (76B320F2,003421D8,00000000,00000000)

76EF37C8 ntdll.dll RtlInitializeExceptionChain+194 (76B320F2,003421D8,00000000,00000000)

 

 

 

----------------------------------------

Loaded Modules

----------------------------------------

 

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

<:inspector.debugmodules>

 

----------------------------------------

Memory Dump

----------------------------------------

 

Code: 32 bytes starting at (EIP = 018B42A5 - 10)

 

018B4295: 81 E0 03 00 00 C3 8D 81 E4 03 00 00 C3 55 8B EC .............U..

* = addr ** *

018B42A5: 8B 41 24 83 F8 FF 75 04 33 C0 EB 42 56 8B 75 08 .A$...u.3..BV.u.

 

 

Stack: 1024 bytes starting at (ESP = 02CC53CC - 20)

 

02CC53A0: 60 0C 47 85 94 A1 5B 84 A0 C5 00 C0 00 00 00 00 `.G...[.........

02CC53B0: 04 00 00 00 34 FD FF FF E4 02 00 00 34 FD FF FF ....4.......4...

02CC53C0: CC 02 00 00 18 00 00 00 00 00 00 00 00 55 CC 02 .............U..

* = addr ** *

02CC53C0: CC 02 00 00 18 00 00 00 00 00 00 00 00 55 CC 02 .............U..

02CC53D0: 31 6B 5A 01 28 E0 9D 02 EC 54 CC 02 00 00 00 00 1kZ.(....T......

02CC53E0: 01 00 00 00 08 6D CC 02 00 00 00 00 78 02 00 00 .....m......x...

02CC53F0: C8 77 01 01 2C 53 CC 02 38 54 CC 02 64 54 CC 02 .w..,S..8T..dT..

02CC5400: ED E0 EA 76 54 FA 9B 00 FE FF FF FF 70 65 EE 76 ...vT.......pe.v

02CC5410: A6 65 EE 76 00 00 00 00 58 28 34 00 58 28 34 00 .e.v....X(4.X(4.

02CC5420: 01 00 00 00 00 00 00 00 50 28 34 00 74 54 CC 02 ........P(4.tT..

02CC5430: 76 76 15 75 00 00 30 00 00 00 00 00 8C 76 15 75 vv.u..0......v.u

02CC5440: 52 13 1B B2 01 00 00 00 58 28 34 00 00 00 00 00 R.......X(4.....

02CC5450: 58 28 34 00 64 CA 32 75 40 E0 9D 02 40 54 CC 02 X(4.d.2u@...@T..

02CC5460: 58 28 34 00 C0 FA CC 02 65 E1 16 75 B6 31 C2 C5 X(4.....e..u.1..

02CC5470: FE FF FF FF 8C 76 15 75 19 1B 8C 75 A8 54 CC 02 .....v.u...u.T..

02CC5480: 1C 28 EA 76 00 00 00 00 58 28 34 00 28 28 EA 76 .(.v....X(4.((.v

02CC5490: AC 54 CC 02 2F A7 8D 75 01 00 00 00 38 76 32 00 .T../..u....8v2.

02CC54A0: 20 BB 33 00 64 BB B9 74 B8 54 CC 02 1A 18 8D 75 .3.d..t.T.....u

02CC54B0: 02 00 00 00 FC 54 CC 02 D0 54 CC 02 ED 17 8D 75 .....T...T.....u

02CC54C0: D0 54 CC 02 F4 17 8D 75 02 00 00 00 08 00 CC 00 .T.....u........

02CC54D0: 14 55 CC 02 7D AC 8D 75 FC 54 CC 02 08 6D CC 02 .U..}..u.T...m..

02CC54E0: BC 21 00 00 40 E0 9D 02 1C 55 CC 02 28 E0 9D 02 .!..@....U..(...

02CC54F0: 60 E0 9D 02 00 00 00 00 4C 00 00 00 BC 21 00 00 `.......L....!..

02CC5500: 20 55 CC 02 BE 70 5A 01 84 1D CE 01 FF FF FF FF U...pZ.........

02CC5510: 38 E0 9D 02 28 00 00 00 40 E0 9D 02 7C CA 32 75 8...(...@...|.2u

02CC5520: 30 55 CC 02 5B 71 5A 01 84 1D CE 01 FF FF FF FF 0U..[qZ.........

02CC5530: 48 55 CC 02 29 10 3D 01 40 E0 9D 02 84 1D CE 01 HU..).=.@.......

02CC5540: FF FF FF FF 00 00 00 00 5C 55 CC 02 41 EF 3E 01 ........\U..A.>.

02CC5550: 40 E0 9D 02 00 04 00 00 40 E0 9D 02 F4 6C CC 02 @.......@....l..

02CC5560: 8A B0 40 01 01 00 00 00 20 36 CE 01 40 3F 00 00 ..@..... 6..@?..

02CC5570: 04 01 00 00 2F 70 61 74 63 68 00 00 00 00 00 00 ..../patch......

02CC5580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC55A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC55B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC55C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC55D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC55E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC55F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC56A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC56B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC56C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC56D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC56E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC56F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC5790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC57A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC57B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02CC57C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

 

 

------------------------------------------------------------------------------

Percent memory used: 67

Total physical memory: 2146754560

Free physical memory: 695783424

Page file: 4293509120

Total virtual memory: 2147352576

Free virtual memory: 2054037504

------------------------------------------------------------------------------

 

List of running PandaWoW.exe processes

 

Process: D:\ZHEKA\Games\wow\PandaWoW.exe; pid: 2452

 

List of running Agent.exe processes

 

Edited by Тревор
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Who's Online   0 Members, 0 Anonymous, 589 Guests (See full list)

    • There are no registered users currently online
×
×
  • Create New...