Forum Discussion

AK_CA_AE's avatar
1 year ago

Anticheat BSOD when launching Game

BSOD when launching Game (STOP CODE : SYSTEM SERVICE EXCEPTION)

Using 

MSI Raider GE78hx 13v

Windows 11

Installed game through Steam

Tried

Updating BIOS, Drivers and Windows

Reinstalling the Game, Update and repair Anticheat

when launching the game its crashes the windows every time. anticheat launcher runs and it crashes the windows when its completes loading. then the windows restarts so not able to play even for a single time on my Laptop and the error is the same every time. Checked the Dump file and it shows -


************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true

EnableRedirectToV8JsProvider : false

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.422 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Primary dump contents written successfully


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Kernel base = 0xfffff803`1ae17000 PsLoadedModuleList = 0xfffff803`1ba2a080
Debug session time: Sun Jun 2 12:16:22.688 2024 (UTC + 4:00)
System Uptime: 0 days 0:22:19.690
Loading Kernel Symbols
...............................................................
........Page 8b4b87 not present in the dump file. Type ".hh dbgerr004" for details
.......Page 12c35c not present in the dump file. Type ".hh dbgerr004" for details
.................................................
................................................................
..........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`006eb018). Type ".hh dbgerr001" for details
Loading unloaded module list
...............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`1b230fe0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef05`f4b7d950=000000000000003b
20: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff8031b23b408, Address of the instruction which caused the BugCheck
Arg3: ffffef05f4b7e2a0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

Page 200066 not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 218

Key : Analysis.Elapsed.mSec
Value: 2537

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 1

Key : Analysis.Init.CPU.mSec
Value: 187

Key : Analysis.Init.Elapsed.mSec
Value: 14124

Key : Analysis.Memory.CommitPeak.Mb
Value: 101

Key : Bugcheck.Code.KiBugCheckData
Value: 0x3b

Key : Bugcheck.Code.LegacyAPI
Value: 0x3b

Key : Bugcheck.Code.TargetModel
Value: 0x3b

Key : Dump.Attributes.AsUlong
Value: 1800

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 100

Key : Failure.Bucket
Value: 0x3B_80000003_VRF_nt!DebugPromptAfterInt3

Key : Failure.Hash
Value: {3f6f74f4-1405-f2f3-097d-d8d7868a9bb3}

Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 1

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1

Key : Hypervisor.Flags.Phase0InitDone
Value: 1

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 1

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 21631230

Key : Hypervisor.Flags.ValueHex
Value: 14a10fe

Key : Hypervisor.Flags.VpAssistPage
Value: 1

Key : Hypervisor.Flags.VsmAvailable
Value: 1

Key : Hypervisor.RootFlags.AccessStats
Value: 1

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 1

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1

Key : Hypervisor.RootFlags.MceEnlightened
Value: 1

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1

Key : Hypervisor.RootFlags.Value
Value: 1015

Key : Hypervisor.RootFlags.ValueHex
Value: 3f7

Key : SecureKernel.HalpHvciEnabled
Value: 1

Key : WER.OS.Branch
Value: ni_release

Key : WER.OS.Version
Value: 10.0.22621.1


BUGCHECK_CODE: 3b

BUGCHECK_P1: 80000003

BUGCHECK_P2: fffff8031b23b408

BUGCHECK_P3: ffffef05f4b7e2a0

BUGCHECK_P4: 0

FILE_IN_CAB: MEMORY.DMP

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1800

CONTEXT: ffffef05f4b7e2a0 -- (.cxr 0xffffef05f4b7e2a0)
rax=0000000000000002 rbx=00000000000000a0 rcx=fffff8031a456580
rdx=ffffef05f4b7001f rsi=fffff8031a45e010 rdi=000000000000002f
rip=fffff8031b23b407 rsp=ffffef05f4b7ecc8 rbp=ffffef05f4b7ee20
r8=ffffef05f4b7ed50 r9=0000000000000002 r10=0000000000000007
r11=0000000000000000 r12=ffff98883e2a0b00 r13=ffff988879f5ef98
r14=0000000000000000 r15=ffff988887efab80
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
nt!DebugPrompt+0x17:
fffff803`1b23b407 cc int 3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: MSI_TraceFPS.exe

STACK_TEXT:
ffffef05`f4b7ecc8 fffff803`1b3bc8c4 : 00000000`000000a0 fffff803`1a45e010 00000000`0000002f fffff803`1a44dae2 : nt!DebugPrompt+0x17
ffffef05`f4b7ecd0 fffff803`1a490a43 : 00000000`000000a0 fffff803`1a45e010 fffff803`1a45657c 00000000`00000007 : nt!DbgPrompt+0x44
ffffef05`f4b7ed20 fffff803`1a44d9a5 : fffff166`00000050 ffff9888`87a08cd0 ffff9888`897c8ff0 00000000`00000000 : FLTMGR!FltpvPrintErrors+0x167
ffffef05`f4b7efa0 fffff803`1a492ff8 : ffff9888`3e2a0916 ffff9887`eaabd4e0 ffffef05`f4b7f098 fffff803`1b8ed3e9 : FLTMGR!FltpvValidateVerifierState+0x85
ffffef05`f4b7efd0 fffff803`1a438cd5 : ffff9888`3e2a09f0 ffff9888`00080009 00000000`00000000 ffff9888`3e2a09f0 : FLTMGR!FltvPostOperation+0x48
ffffef05`f4b7f060 fffff803`1a4385e0 : ffff9888`3e2a0900 ffff9888`8674cf28 ffff9888`5c935100 00000000`00000000 : FLTMGR!FltpPerformPostCallbacksWorker+0x345
ffffef05`f4b7f130 fffff803`1a43a293 : ffffef05`f4b79000 ffffef05`f4b80000 ffff9888`3e2a09f0 fffff803`1a4390c1 : FLTMGR!FltpPassThroughCompletionWorker+0x120
ffffef05`f4b7f1e0 fffff803`1a472003 : ffffef05`f4b7f290 ffffef05`f4b79000 ffff9887`f6ce9d00 fffff803`1b4c195e : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1f3
ffffef05`f4b7f250 fffff803`1b130707 : ffff9888`8674cf00 ffff9888`8674cab0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x323
ffffef05`f4b7f300 fffff803`1b8d5400 : ffff9888`8674cab0 ffff9887`f6ce9da0 00000000`00000030 00000000`00000000 : nt!IopfCallDriver+0x53
ffffef05`f4b7f340 fffff803`1b25a3f5 : ffff9887`f59e2b30 ffffef05`f4b7f690 ffff9888`8674cf70 ffff9888`8554f020 : nt!IovCallDriver+0x230
ffffef05`f4b7f380 fffff803`1b4c195e : ffff9887`f59e2b30 ffffef05`f4b7f690 ffff9888`8674cab0 ffff9888`869a8ae0 : nt!IofCallDriver+0x1f9945
ffffef05`f4b7f3c0 fffff803`1b4e71c1 : ffffef05`f4b7f7b8 ffffcf8c`a6209210 ffffef05`f4b7f6f0 ffffef05`f4b7f7b0 : nt!IopParseDevice+0x8be
ffffef05`f4b7f590 fffff803`1b4e6492 : ffff9888`19ecfa01 ffffef05`f4b7f7b0 00000000`00000040 ffff9887`eae9bbc0 : nt!ObpLookupObjectName+0x7e1
ffffef05`f4b7f720 fffff803`1b4cd5d7 : 00000000`00000000 ffff9888`1ed39ac0 00000000`011fec70 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1f2
ffffef05`f4b7f850 fffff803`1b587c88 : 00000000`011fe418 ffff9888`80100000 00000000`011fec70 00000000`011fe3b8 : nt!IopCreateFile+0xb17
ffffef05`f4b7f920 fffff803`1b246605 : 00000000`77314770 00000000`011ffda0 00000000`02cbf814 00000000`00000000 : nt!NtOpenFile+0x58
ffffef05`f4b7f9b0 00007ffe`ca7f00e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`011fe378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ca7f00e4


SYMBOL_NAME: nt!DebugPromptAfterInt3+0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .cxr 0xffffef05f4b7e2a0 ; kb

BUCKET_ID_FUNC_OFFSET: 0

FAILURE_BUCKET_ID: 0x3B_80000003_VRF_nt!DebugPromptAfterInt3

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3f6f74f4-1405-f2f3-097d-d8d7868a9bb3}

Followup: MachineOwner
---------

20: kd> lmvm nt
Browse full module list
start end module name
fffff803`1ae17000 fffff803`1be5e000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\BC9E67554B228F3E5C46B0D1622B6E321\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\CE6B5AD21047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: CE6B5AD2 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00B88F22
ImageSize: 01047000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

2 Replies

  • dragoonx008's avatar
    dragoonx008
    New Adventurer
    1 year ago

    make sure you have  Windows Security > Device Security > Core Isolation > Turn on Memory Integrity(Toggle off/on if already on). and then try it if not then this is a new BSOD

Featured Places