il send the crash dump down below
i71300k RX7900XT 32RAM6000Mhz
The game crashes entiere pc due to anticheat???
************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.015 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.297 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 46 Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\102625-13265-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (24 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Kernel base = 0xfffff800`c4e00000 PsLoadedModuleList = 0xfffff800`c5cf4f10 Debug session time: Sun Oct 26 16:58:12.820 2025 (UTC + 1:00) System Uptime: 0 days 3:58:04.422 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ...................................... Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`003d9018). Type ".hh dbgerr001" for details Loading unloaded module list ............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`c52f6430 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb181`5b4d5dd0=000000000000000a 9: kd> !analyze -v Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ...................................... Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`003d9018). Type ".hh dbgerr001" for details Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00007fffffff0000, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 00000000000000ed, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800c507736c, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for eaanticheat.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2437 Key : Analysis.Elapsed.mSec Value: 11644 Key : Analysis.IO.Other.Mb Value: 1 Key : Analysis.IO.Read.Mb Value: 19 Key : Analysis.IO.Write.Mb Value: 24 Key : Analysis.Init.CPU.mSec Value: 4031 Key : Analysis.Init.Elapsed.mSec Value: 36651 Key : Analysis.Memory.CommitPeak.Mb Value: 108 Key : Analysis.Version.DbgEng Value: 10.0.29457.1000 Key : Analysis.Version.Description Value: 10.2506.23.01 amd64fre Key : Analysis.Version.Ext Value: 1.2506.23.1 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x21008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_eaanticheat!unknown_function Key : Failure.Exception.IP.Address Value: 0xfffff800c507736c Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x27736c Key : Failure.Hash Value: {d544cf09-4735-e698-77c3-5df5924e5448} Key : Stack.Pointer Value: PRCBException Key : WER.System.BIOSRevision Value: 18.20.0.0 BUGCHECK_CODE: a BUGCHECK_P1: 7fffffff0000 BUGCHECK_P2: ff BUGCHECK_P3: ed BUGCHECK_P4: fffff800c507736c FILE_IN_CAB: 102625-13265-01.dmp DUMP_FILE_ATTRIBUTES: 0x21008 Kernel Generated Triage Dump FAULTING_THREAD: ffffc2882b6680c0 WRITE_ADDRESS: fffff800c5dc44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 00007fffffff0000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 (!blackboxwinlogon) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: bf6.exe TRAP_FRAME: e4d058660eb7eff2 -- (.trap 0xe4d058660eb7eff2) Unable to read trap frame at e4d05866`0eb7eff2 Resetting default scope STACK_TEXT: ffffb181`5b4d5dc8 fffff800`c54b1de9 : 00000000`0000000a 00007fff`ffff0000 00000000`000000ff 00000000`000000ed : nt!KeBugCheckEx ffffb181`5b4d5dd0 fffff800`c54ad0a8 : 00000000`00000000 fffff800`c4ebf518 ffffb181`5b4d6790 fffff800`c5039b2b : nt!KiBugCheckDispatch+0x69 ffffb181`5b4d5f10 fffff800`c507736c : fffff800`7fc90000 fffff800`831416d5 ffff9a85`4afd6c60 fffff800`80991410 : nt!KiPageFault+0x468 ffffb181`5b4d60a0 fffff800`c507ac5b : 00000000`00000000 fffff800`7fc90000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x55c ffffb181`5b4d6160 fffff800`c51c354f : ffffb181`5b4d68f0 ffffb181`5b4d6df0 ffffb181`5b4d68f0 ffff9a85`4afd68f0 : nt!RtlDispatchException+0x1fb ffffb181`5b4d68c0 fffff800`c549e082 : 6de863e3`8b958878 391d003b`fed5cbe9 e4d05866`0eb7eff2 0a4b75eb`f87277a6 : nt!KiDispatchException+0x35f ffffb181`5b4d6fb0 fffff800`c549e050 : fffff800`c54b1f3e 00000060`00000000 ffffc287`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffff9a85`4afd68e8 fffff800`c54b1f3e : 00000060`00000000 ffffc287`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue ffff9a85`4afd68f0 fffff800`c54acc25 : ff6e1f9b`cc4bcb70 006e98bb`45cee360 ff975975`5557c408 ff942d9f`ad432710 : nt!KiExceptionDispatch+0x13e ffff9a85`4afd6ad0 fffff800`831416d5 : ffff9a85`4afd6f10 ffffd50a`feb37be8 ffff9a85`4afd7368 fffff800`c50cbf59 : nt!KiGeneralProtectionFault+0x365 ffff9a85`4afd6c60 ffff9a85`4afd6f10 : ffffd50a`feb37be8 ffff9a85`4afd7368 fffff800`c50cbf59 00000000`0015a000 : eaanticheat+0x34b16d5 ffff9a85`4afd6c68 ffffd50a`feb37be8 : ffff9a85`4afd7368 fffff800`c50cbf59 00000000`0015a000 fffff800`7ba8899b : 0xffff9a85`4afd6f10 ffff9a85`4afd6c70 ffff9a85`4afd7368 : fffff800`c50cbf59 00000000`0015a000 fffff800`7ba8899b 00000000`000000c0 : 0xffffd50a`feb37be8 ffff9a85`4afd6c78 fffff800`c50cbf59 : 00000000`0015a000 fffff800`7ba8899b 00000000`000000c0 00000000`2b668001 : 0xffff9a85`4afd7368 ffff9a85`4afd6c80 00000000`0000000c : 7fffffff`fffffffc ffff9a85`4afd74e0 00000000`00849741 ffff9a85`4afd6f10 : nt!KeLeaveCriticalRegionThread+0x9 ffff9a85`4afd6cb0 7fffffff`fffffffc : ffff9a85`4afd74e0 00000000`00849741 ffff9a85`4afd6f10 00000000`00000f00 : 0xc ffff9a85`4afd6cb8 ffff9a85`4afd74e0 : 00000000`00849741 ffff9a85`4afd6f10 00000000`00000f00 fffff800`81172756 : 0x7fffffff`fffffffc ffff9a85`4afd6cc0 00000000`00849741 : ffff9a85`4afd6f10 00000000`00000f00 fffff800`81172756 00000000`00010000 : 0xffff9a85`4afd74e0 ffff9a85`4afd6cc8 ffff9a85`4afd6f10 : 00000000`00000f00 fffff800`81172756 00000000`00010000 00000000`00000000 : 0x849741 ffff9a85`4afd6cd0 00000000`00000f00 : fffff800`81172756 00000000`00010000 00000000`00000000 ffffc288`2b6680c0 : 0xffff9a85`4afd6f10 ffff9a85`4afd6cd8 fffff800`81172756 : 00000000`00010000 00000000`00000000 ffffc288`2b6680c0 fffff800`c5c28c80 : 0xf00 ffff9a85`4afd6ce0 00000000`00010000 : 00000000`00000000 ffffc288`2b6680c0 fffff800`c5c28c80 00000000`00000f00 : eaanticheat+0x14e2756 ffff9a85`4afd6ce8 00000000`00000000 : ffffc288`2b6680c0 fffff800`c5c28c80 00000000`00000f00 ffff9a85`4afd6f10 : 0x10000 SYMBOL_NAME: eaanticheat+34b16d5 MODULE_NAME: eaanticheat IMAGE_NAME: eaanticheat.sys STACK_COMMAND: .process /r /p 0xffffc28820a73080; .thread 0xffffc2882b6680c0 ; kb BUCKET_ID_FUNC_OFFSET: 34b16d5 FAILURE_BUCKET_ID: AV_eaanticheat!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {d544cf09-4735-e698-77c3-5df5924e5448} Followup: MachineOwner ---------