Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\super\Desktop\110922-18625-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff803`7d600000 PsLoadedModuleList = 0xfffff803`7e22a270 Debug session time: Wed Nov 9 21:49:06.139 2022 (UTC 8:00) System Uptime: 28 days 10:33:41.544 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ................. Loading User Symbols Loading unloaded module list .................................................. For analysis of this file, run !analyze -v 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8037d824834, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for EasyAntiCheat.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1827 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 3130 Key : Analysis.Init.CPU.mSec Value: 2609 Key : Analysis.Init.Elapsed.mSec Value: 23511 Key : Analysis.Memory.CommitPeak.Mb Value: 92 FILE_IN_CAB: 110922-18625-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8037d824834 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: e90000000d0442c7 -- (.trap 0xe90000000d0442c7) Unable to read trap frame at e9000000`0d0442c7 STACK_TEXT: ffff8d00`898748e8 fffff803`7da3ce15 : 00000000`0000001e ffffffff`c0000005 fffff803`7d824834 00000000`00000000 : nt!KeBugCheckEx ffff8d00`898748f0 fffff803`7d9f9f82 : 0b0842c7`ffed6ea5 ffed6e99`e9000000 e9000000`0d0442c7 0c0842c7`ffed6e8d : nt!KiDispatchException 0x1c6925 ffff8d00`89874fb0 fffff803`7d9f9f50 : fffff803`7da0b1a5 ffffd881`00000000 ffffd881`39f80a20 ffffa386`29bfb5a0 : nt!KxExceptionDispatchOnExceptionStack 0x12 ffff8102`d14f69f8 fffff803`7da0b1a5 : ffffd881`00000000 ffffd881`39f80a20 ffffa386`29bfb5a0 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue ffff8102`d14f6a00 fffff803`7da06ee0 : 00000000`00000000 fffff803`7d80eb2e ffffd881`3ef615d8 ffffd881`483a99e0 : nt!KiExceptionDispatch 0x125 ffff8102`d14f6be0 fffff803`7d824834 : 00000000`00004c10 ffff8102`d14f7150 ffffd881`54681200 00000000`00000000 : nt!KiGeneralProtectionFault 0x320 ffff8102`d14f6d70 fffff803`7d827d5d : 00000000`00004c10 ffff8102`00004c10 ffff8102`d14f6eb1 00000000`63534d43 : nt!RtlpHpVsContextAllocateInternal 0xb4 ffff8102`d14f6dd0 fffff803`7dfb2094 : ffffffff`00000000 ffffd881`54681200 f35d072c`63534d43 ffffffff`7d56aa3a : nt!ExAllocateHeapPool 0x6ed ffff8102`d14f6f10 fffff803`a5cf6b91 : 00000000`00004c00 ffff8102`d14f6fb0 00000000`63534d43 ffffffff`00000000 : nt!ExAllocatePoolWithTag 0x64 ffff8102`d14f6f60 00000000`00004c00 : ffff8102`d14f6fb0 00000000`63534d43 ffffffff`00000000 00000000`00000000 : EasyAntiCheat 0x56b91 ffff8102`d14f6f68 ffff8102`d14f6fb0 : 00000000`63534d43 ffffffff`00000000 00000000`00000000 fffff803`a5cf6a19 : 0x4c00 ffff8102`d14f6f70 00000000`63534d43 : ffffffff`00000000 00000000`00000000 fffff803`a5cf6a19 00000000`00000010 : 0xffff8102`d14f6fb0 ffff8102`d14f6f78 ffffffff`00000000 : 00000000`00000000 fffff803`a5cf6a19 00000000`00000010 00000000`00040082 : 0x63534d43 ffff8102`d14f6f80 00000000`00000000 : fffff803`a5cf6a19 00000000`00000010 00000000`00040082 ffff8102`d14f6fb8 : 0xffffffff`00000000 SYMBOL_NAME: EasyAntiCheat 56b91 MODULE_NAME: EasyAntiCheat IMAGE_NAME: EasyAntiCheat.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 56b91 FAILURE_BUCKET_ID: AV_EasyAntiCheat!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {b4c0fbf5-e9c2-7752-9e19-fdc24f57a9df} Followup: MachineOwner ---------

你好,Jan,我很高兴今天能为你提供帮助。很抱歉你遇到了这个问题。请检查它是否创建了dmp文件并共享最新的dmp文件,以便诊断计算机崩溃/蓝屏的原因。谢谢请找到这个文件夹。C:\Windows\Minidump将文件放在一个zip中将文件上传到OneDrive在此处分享链接。谢谢此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(36) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部