Файл дампа
Анонимные
Вылетает синий экран только в одной игре после некоторого времени. Виндовс переустановил 1 день назад, но проблема не пропала
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\041424-8453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff806`55c00000 PsLoadedModuleList = 0xfffff806`5682a770
Debug session time: Sun Apr 14 22:23:37.031 2024 (UTC + 3:00)
System Uptime: 0 days 3:22:07.911
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`55ffd5b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff886`0ab5ed30=0000000000000050
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd10ae8a6cb78, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80655eae6e3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 3046
Key : Analysis.Elapsed.mSec
Value: 9155
Key : Analysis.IO.Other.Mb
Value: 21
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 22
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 36586
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Bugcheck.Code.TargetModel
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_EasyAntiCheat_EOS!unknown_function
Key : Failure.Hash
Value: {45dd0642-eada-f8ea-b49a-7d037a621134}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd10ae8a6cb78
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80655eae6e3
BUGCHECK_P4: 2
FILE_IN_CAB: 041424-8453-01.dmp
READ_ADDRESS: fffff806568fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd10ae8a6cb78
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8860ab5efd0 -- (.trap 0xfffff8860ab5efd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000072de rbx=0000000000000000 rcx=000000000001cb84
rdx=000000000000264b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80655eae6e3 rsp=fffff8860ab5f160 rbp=0000000000000000
r8=ffffd10ae8800000 r9=0000000000000001 r10=ffffd10ae8acd000
r11=fffff80656a00028 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlLookupFunctionEntry+0x253:
fffff806`55eae6e3 448b1c86 mov r11d,dword ptr [rsi+rax*4] ds:00000000`0001cb78=????????
Resetting default scope
STACK_TEXT:
fffff886`0ab5ed28 fffff806`5603ba7d : 00000000`00000050 ffffd10a`e8a6cb78 00000000`00000000 fffff886`0ab5efd0 : nt!KeBugCheckEx
fffff886`0ab5ed30 fffff806`55e24660 : ffffc08a`00000000 00000000`00000000 fffff886`0ab5f050 00000000`00000000 : nt!MiSystemFault+0x1d851d
fffff886`0ab5ee30 fffff806`5600d358 : fffff806`55c00000 00000000`33314d43 00000000`00002010 fffff806`55e37140 : nt!MmAccessFault+0x400
fffff886`0ab5efd0 fffff806`55eae6e3 : ffffd10a`e884f8eb fffff886`0ab5f200 fffff886`00000001 fffff808`00000000 : nt!KiPageFault+0x358
fffff886`0ab5f160 fffff808`eb33801e : fffff886`0ab5f340 00000000`00000001 ffffd10a`e884f8eb fffff806`55c00000 : nt!RtlLookupFunctionEntry+0x253
fffff886`0ab5f1b0 fffff886`0ab5f340 : 00000000`00000001 ffffd10a`e884f8eb fffff806`55c00000 ffffc08a`15495020 : EasyAntiCheat_EOS+0x5801e
fffff886`0ab5f1b8 00000000`00000001 : ffffd10a`e884f8eb fffff806`55c00000 ffffc08a`15495020 fffff886`0ab5f208 : 0xfffff886`0ab5f340
fffff886`0ab5f1c0 ffffd10a`e884f8eb : fffff806`55c00000 ffffc08a`15495020 fffff886`0ab5f208 fffff886`0ab5f200 : 0x1
fffff886`0ab5f1c8 ffffc08a`1a435520 : fffff808`eb34a74c 00000000`00000024 ffffc089`ff7f0010 00000000`00000000 : win32kbase!EnterCritAvoidingDitHitTestHazard+0x23
fffff886`0ab5f208 fffff808`eb34a74c : 00000000`00000024 ffffc089`ff7f0010 00000000`00000000 00000000`00001000 : 0xffffc08a`1a435520
fffff886`0ab5f210 00000000`00000024 : ffffc089`ff7f0010 00000000`00000000 00000000`00001000 fffff806`55ec45b0 : EasyAntiCheat_EOS+0x6a74c
fffff886`0ab5f218 ffffc089`ff7f0010 : 00000000`00000000 00000000`00001000 fffff806`55ec45b0 fffff808`ec2a4fc1 : 0x24
fffff886`0ab5f220 00000000`00000000 : 00000000`00001000 fffff806`55ec45b0 fffff808`ec2a4fc1 fffff806`55e00001 : 0xffffc089`ff7f0010
SYMBOL_NAME: EasyAntiCheat_EOS+5801e
MODULE_NAME: EasyAntiCheat_EOS
IMAGE_NAME: EasyAntiCheat_EOS.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5801e
FAILURE_BUCKET_ID: AV_R_(null)_EasyAntiCheat_EOS!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {45dd0642-eada-f8ea-b49a-7d037a621134}
Followup: MachineOwner
---------
10: kd> lmvm EasyAntiCheat_EOS
Browse full module list
start end module name
fffff808`eb2e0000 fffff808`ec53d000 EasyAntiCheat_EOS T (no symbols)
Loaded symbol image file: EasyAntiCheat_EOS.sys
Image path: \??\C:\Program Files (x86)\EasyAntiCheat_EOS\EasyAntiCheat_EOS.sys
Image name: EasyAntiCheat_EOS.sys
Browse all global symbols functions data
Timestamp: Fri Apr 12 07:25:33 2024 (6618B7BD)
CheckSum: 011FFADC
ImageSize: 0125D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Windows для дома | Windows 10 | Снижение производительности и системные сбои
Заблокированный вопрос. Этот вопрос был перенесен из сообщества службы поддержки Майкрософт. Вы можете проголосовать о его полезности, но не можете добавлять комментарии или ответы, а также подписаться на этот вопрос.
Голосов: {count}