Поделиться через

Файл дампа

Анонимные
2024-04-15T15:32:06+00:00

Вылетает синий экран только в одной игре после некоторого времени. Виндовс переустановил 1 день назад, но проблема не пропала

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true

   EnableRedirectToV8JsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\041424-8453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff806`55c00000 PsLoadedModuleList = 0xfffff806`5682a770
Debug session time: Sun Apr 14 22:23:37.031 2024 (UTC + 3:00)
System Uptime: 0 days 3:22:07.911
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols

Loading unloaded module list
.....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`55ffd5b0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff886`0ab5ed30=0000000000000050
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd10ae8a6cb78, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80655eae6e3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 3046

    Key  : Analysis.Elapsed.mSec
    Value: 9155

    Key  : Analysis.IO.Other.Mb
    Value: 21

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 22

    Key  : Analysis.Init.CPU.mSec
    Value: 671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 36586

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 96

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Bugcheck.Code.TargetModel
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_EasyAntiCheat_EOS!unknown_function

    Key  : Failure.Hash
    Value: {45dd0642-eada-f8ea-b49a-7d037a621134}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffd10ae8a6cb78

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80655eae6e3

BUGCHECK_P4: 2

FILE_IN_CAB:  041424-8453-01.dmp

READ_ADDRESS: fffff806568fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffd10ae8a6cb78 

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8860ab5efd0 -- (.trap 0xfffff8860ab5efd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000072de rbx=0000000000000000 rcx=000000000001cb84
rdx=000000000000264b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80655eae6e3 rsp=fffff8860ab5f160 rbp=0000000000000000
 r8=ffffd10ae8800000  r9=0000000000000001 r10=ffffd10ae8acd000
r11=fffff80656a00028 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlLookupFunctionEntry+0x253:
fffff806`55eae6e3 448b1c86        mov     r11d,dword ptr [rsi+rax*4] ds:00000000`0001cb78=????????
Resetting default scope

STACK_TEXT:  
fffff886`0ab5ed28 fffff806`5603ba7d     : 00000000`00000050 ffffd10a`e8a6cb78 00000000`00000000 fffff886`0ab5efd0 : nt!KeBugCheckEx
fffff886`0ab5ed30 fffff806`55e24660     : ffffc08a`00000000 00000000`00000000 fffff886`0ab5f050 00000000`00000000 : nt!MiSystemFault+0x1d851d
fffff886`0ab5ee30 fffff806`5600d358     : fffff806`55c00000 00000000`33314d43 00000000`00002010 fffff806`55e37140 : nt!MmAccessFault+0x400
fffff886`0ab5efd0 fffff806`55eae6e3     : ffffd10a`e884f8eb fffff886`0ab5f200 fffff886`00000001 fffff808`00000000 : nt!KiPageFault+0x358
fffff886`0ab5f160 fffff808`eb33801e     : fffff886`0ab5f340 00000000`00000001 ffffd10a`e884f8eb fffff806`55c00000 : nt!RtlLookupFunctionEntry+0x253
fffff886`0ab5f1b0 fffff886`0ab5f340     : 00000000`00000001 ffffd10a`e884f8eb fffff806`55c00000 ffffc08a`15495020 : EasyAntiCheat_EOS+0x5801e
fffff886`0ab5f1b8 00000000`00000001     : ffffd10a`e884f8eb fffff806`55c00000 ffffc08a`15495020 fffff886`0ab5f208 : 0xfffff886`0ab5f340
fffff886`0ab5f1c0 ffffd10a`e884f8eb     : fffff806`55c00000 ffffc08a`15495020 fffff886`0ab5f208 fffff886`0ab5f200 : 0x1
fffff886`0ab5f1c8 ffffc08a`1a435520     : fffff808`eb34a74c 00000000`00000024 ffffc089`ff7f0010 00000000`00000000 : win32kbase!EnterCritAvoidingDitHitTestHazard+0x23
fffff886`0ab5f208 fffff808`eb34a74c     : 00000000`00000024 ffffc089`ff7f0010 00000000`00000000 00000000`00001000 : 0xffffc08a`1a435520
fffff886`0ab5f210 00000000`00000024     : ffffc089`ff7f0010 00000000`00000000 00000000`00001000 fffff806`55ec45b0 : EasyAntiCheat_EOS+0x6a74c
fffff886`0ab5f218 ffffc089`ff7f0010     : 00000000`00000000 00000000`00001000 fffff806`55ec45b0 fffff808`ec2a4fc1 : 0x24
fffff886`0ab5f220 00000000`00000000     : 00000000`00001000 fffff806`55ec45b0 fffff808`ec2a4fc1 fffff806`55e00001 : 0xffffc089`ff7f0010

SYMBOL_NAME:  EasyAntiCheat_EOS+5801e

MODULE_NAME: EasyAntiCheat_EOS

IMAGE_NAME:  EasyAntiCheat_EOS.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  5801e

FAILURE_BUCKET_ID:  AV_R_(null)_EasyAntiCheat_EOS!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {45dd0642-eada-f8ea-b49a-7d037a621134}

Followup:     MachineOwner
---------

10: kd> lmvm EasyAntiCheat_EOS
Browse full module list
start             end                 module name
fffff808`eb2e0000 fffff808`ec53d000   EasyAntiCheat_EOS T (no symbols)           
    Loaded symbol image file: EasyAntiCheat_EOS.sys
    Image path: \??\C:\Program Files (x86)\EasyAntiCheat_EOS\EasyAntiCheat_EOS.sys
    Image name: EasyAntiCheat_EOS.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Apr 12 07:25:33 2024 (6618B7BD)
    CheckSum:         011FFADC
    ImageSize:        0125D000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Windows для дома | Windows 10 | Снижение производительности и системные сбои

Заблокированный вопрос. Этот вопрос был перенесен из сообщества службы поддержки Майкрософт. Вы можете проголосовать о его полезности, но не можете добавлять комментарии или ответы, а также подписаться на этот вопрос.

Комментариев: 0 Без комментариев
Голосов: {count}