Forum Discussion

FFFFFF13's avatar
FFFFFF13
Newcomer
11 hours ago

bug in EA AntiCheat (eaanticheat.sys)

i had BSOD (bugcheck 0x18 REFERENCE_BY_POINTER) is almost certainly caused by a bug in EA AntiCheat (eaanticheat.sys), the kernel-mode driver that EA uses in games Battlefield 6, which continuously crashes my PC to death.

The crash happens in the System process, but the call stack clearly shows the faulting code is inside eaanticheat + 0x59970d → nt!ObfDereferenceObject → nt!KeBugCheckEx. This is a classic over-dereference (the driver decrements the reference count on a kernel object one time too many).

This exact pattern (0x18 caused by eaanticheat.sys) has been widely reported on this forums.

I already tried Uninstall/repair/update the EA AntiCheat, don't try to fool me by telling me the Standard Customer service script. 

My Memory integrity also already been tuned off, also with the newest version of Dell BIOS.

Tell ur engineers to fix it asap

P.S. Here is one of the minidump analysis logs:

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 46

Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\112025-38687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 26100 MP (80 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff803`9ce00000 PsLoadedModuleList = 0xfffff803`9dcf5030
Debug session time: Thu Nov 20 10:50:12.900 2025 (UTC + 8:00)
System Uptime: 0 days 2:23:08.730
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
..........
Loading User Symbols

Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`9d2f6880 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffbc8e`9265e390=0000000000000018
16: kd> !analyze -v
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
..........
Loading User Symbols

Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: ffffe48ba9da8f58, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: ffffffffffffffff, Reserved
	The reference count of an object is illegal for the current state of the object.
	Each time a driver uses a pointer to an object the driver calls a kernel routine
	to increment the reference count of the object. When the driver is done with the
	pointer the driver calls another kernel routine to decrement the reference count.
	Drivers must match calls to the increment and decrement routines. This BugCheck
	can occur because an object's reference count goes to zero while there are still
	open handles to the object, in which case the fourth parameter indicates the number
	of opened handles. It may also occur when the object's reference count drops below zero
	whether or not there are open handles to the object, and in that case the fourth parameter
	contains the actual value of the pointer references count.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for eaanticheat.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1937

    Key  : Analysis.Elapsed.mSec
    Value: 10735

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 4

    Key  : Analysis.Init.CPU.mSec
    Value: 1500

    Key  : Analysis.Init.Elapsed.mSec
    Value: 145750

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 107

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29457.1000

    Key  : Analysis.Version.Description
    Value: 10.2506.23.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2506.23.1

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x18

    Key  : Bugcheck.Code.TargetModel
    Value: 0x18

    Key  : Dump.Attributes.AsUlong
    Value: 0x21008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0x0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: 0x18_OVER_DEREFERENCE_eaanticheat!unknown_function

    Key  : Failure.Hash
    Value: {d34621e2-c642-27ce-cc1e-ae03b2ecef67}

    Key  : WER.System.BIOSRevision
    Value: 2.46.0.0


BUGCHECK_CODE:  18

BUGCHECK_P1: 0

BUGCHECK_P2: ffffe48ba9da8f58

BUGCHECK_P3: 2

BUGCHECK_P4: ffffffffffffffff

FILE_IN_CAB:  112025-38687-01.dmp

DUMP_FILE_ATTRIBUTES: 0x21008
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffffd4828b4b4480

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
ffffbc8e`9265e388 fffff803`9d141d2d     : 00000000`00000018 00000000`00000000 ffffe48b`a9da8f58 00000000`00000002 : nt!KeBugCheckEx
ffffbc8e`9265e390 fffff803`514e970d     : 00007fff`ffffffff ffffe48b`a9da8f58 00000000`00000010 00007fff`ffffffff : nt!ObfDereferenceObject+0x7d
ffffbc8e`9265e3d0 00007fff`ffffffff     : ffffe48b`a9da8f58 00000000`00000010 00007fff`ffffffff ffffbc8e`9265e4e0 : eaanticheat+0x59970d
ffffbc8e`9265e3d8 ffffe48b`a9da8f58     : 00000000`00000010 00007fff`ffffffff ffffbc8e`9265e4e0 fffffffd`7fffff00 : 0x00007fff`ffffffff
ffffbc8e`9265e3e0 00000000`00000010     : 00007fff`ffffffff ffffbc8e`9265e4e0 fffffffd`7fffff00 00000000`00000000 : 0xffffe48b`a9da8f58
ffffbc8e`9265e3e8 00007fff`ffffffff     : ffffbc8e`9265e4e0 fffffffd`7fffff00 00000000`00000000 ffffbc8e`9265e418 : 0x10
ffffbc8e`9265e3f0 ffffbc8e`9265e4e0     : fffffffd`7fffff00 00000000`00000000 ffffbc8e`9265e418 ffbc8e92`65e70100 : 0x00007fff`ffffffff
ffffbc8e`9265e3f8 fffffffd`7fffff00     : 00000000`00000000 ffffbc8e`9265e418 ffbc8e92`65e70100 ffffdc86`dd6cedd0 : 0xffffbc8e`9265e4e0
ffffbc8e`9265e400 00000000`00000000     : ffffbc8e`9265e418 ffbc8e92`65e70100 ffffdc86`dd6cedd0 00000138`9d00104e : 0xfffffffd`7fffff00


SYMBOL_NAME:  eaanticheat+59970d

MODULE_NAME: eaanticheat

IMAGE_NAME:  eaanticheat.sys

STACK_COMMAND: .process /r /p 0xffffd4825fae1040; .thread 0xffffd4828b4b4480 ; kb

BUCKET_ID_FUNC_OFFSET:  59970d

FAILURE_BUCKET_ID:  0x18_OVER_DEREFERENCE_eaanticheat!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d34621e2-c642-27ce-cc1e-ae03b2ecef67}

Followup:     MachineOwner
---------

16: kd> !object ffffe48ba9da8f58
Could not read ObjectType address

and here is another crash minidump log:

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 46

Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\112025-38109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 26100 MP (80 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff803`a7a00000 PsLoadedModuleList = 0xfffff803`a88f5030
Debug session time: Thu Nov 20 08:25:41.264 2025 (UTC + 8:00)
System Uptime: 0 days 0:15:28.090
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
..........
Loading User Symbols

Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`a7ef6880 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff602`d22bdfa0=0000000000000050
56: kd> !analyze -v
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
..........
Loading User Symbols

Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffff0000ffcf, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
	bit 1 is set if the fault was due to a write, clear if a read.
	bit 3 is set if the processor decided the fault was due to a corrupted PTE.
	bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
	- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
	bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff803a7d41cea, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for eaanticheat.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 1859

    Key  : Analysis.Elapsed.mSec
    Value: 4925

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 1453

    Key  : Analysis.Init.Elapsed.mSec
    Value: 39917

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 107

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29457.1000

    Key  : Analysis.Version.Description
    Value: 10.2506.23.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2506.23.1

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Bugcheck.Code.TargetModel
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 0x21008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0x0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_W_(null)_eaanticheat!unknown_function

    Key  : Failure.Exception.IP.Address
    Value: 0xfffff803a7d41cea

    Key  : Failure.Exception.IP.Module
    Value: nt

    Key  : Failure.Exception.IP.Offset
    Value: 0x341cea

    Key  : Failure.Hash
    Value: {3b72c825-0ff2-cb62-709d-7e1f175da344}

    Key  : WER.System.BIOSRevision
    Value: 2.46.0.0


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffff0000ffcf

BUGCHECK_P2: 2

BUGCHECK_P3: fffff803a7d41cea

BUGCHECK_P4: 2

FILE_IN_CAB:  112025-38109-01.dmp

DUMP_FILE_ATTRIBUTES: 0x21008
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffffaf8b396dd080

READ_ADDRESS: fffff803a89c44c0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffff0000ffcf 

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
fffff602`d22bdf98 fffff803`a7dd1a0c     : 00000000`00000050 ffffffff`0000ffcf 00000000`00000002 fffff602`d22be200 : nt!KeBugCheckEx
fffff602`d22bdfa0 fffff803`a7c40510     : fffff602`d22be1e0 ffff8000`00000000 ffffffff`0000ffcf 0000007f`fffffff8 : nt!MiSystemFault+0x7a0
fffff602`d22be090 fffff803`a80addcb     : 00000000`00040246 00000000`00000000 ffffffff`0000ffcf fffff602`d22be9b8 : nt!MmAccessFault+0x630
fffff602`d22be200 fffff803`a7d41cea     : fffff801`db3f0000 cded4ce9`d4814d3d 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x38b
fffff602`d22be390 fffff803`5b98970d     : 00007fff`ffffffff ffffffff`0000ffff 00000000`00000010 00007fff`ffffffff : nt!ObfDereferenceObject+0x3a
fffff602`d22be3d0 00007fff`ffffffff     : ffffffff`0000ffff 00000000`00000010 00007fff`ffffffff fffff602`d22be4e0 : eaanticheat+0x59970d
fffff602`d22be3d8 ffffffff`0000ffff     : 00000000`00000010 00007fff`ffffffff fffff602`d22be4e0 fffffffd`7fffff00 : 0x00007fff`ffffffff
fffff602`d22be3e0 00000000`00000010     : 00007fff`ffffffff fffff602`d22be4e0 fffffffd`7fffff00 00000000`00000000 : 0xffffffff`0000ffff
fffff602`d22be3e8 00007fff`ffffffff     : fffff602`d22be4e0 fffffffd`7fffff00 00000000`00000000 fffff602`d22be418 : 0x10
fffff602`d22be3f0 fffff602`d22be4e0     : fffffffd`7fffff00 00000000`00000000 fffff602`d22be418 00000000`00000000 : 0x00007fff`ffffffff
fffff602`d22be3f8 fffffffd`7fffff00     : 00000000`00000000 fffff602`d22be418 00000000`00000000 ffffaf8b`2e646c30 : 0xfffff602`d22be4e0
fffff602`d22be400 00000000`00000000     : fffff602`d22be418 00000000`00000000 ffffaf8b`2e646c30 00000138`0000104e : 0xfffffffd`7fffff00


SYMBOL_NAME:  eaanticheat+59970d

MODULE_NAME: eaanticheat

IMAGE_NAME:  eaanticheat.sys

STACK_COMMAND: .process /r /p 0xffffa7851dac8040; .thread 0xffffaf8b396dd080 ; kb

BUCKET_ID_FUNC_OFFSET:  59970d

FAILURE_BUCKET_ID:  AV_W_(null)_eaanticheat!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3b72c825-0ff2-cb62-709d-7e1f175da344}

Followup:     MachineOwner
---------

 

No RepliesBe the first to reply

About Battlefield 6 Technical Issues

Having issues with Battlefield 6? Join here to find help with connectivity, performance issues, crashes and more.4,480 PostsLatest Activity: 21 minutes ago