Имя пользователя:
Пароль:  
Помощь | Регистрация | Забыли пароль?  | Правила  

Компьютерный форум OSzone.net » Компьютеры + Интернет » Хочу все знать » EventID - Утечка памяти

Ответить
Настройки темы
EventID - Утечка памяти

Новый участник


Сообщения: 1
Благодарности: 0

Профиль | Отправить PM | Цитировать


Помогите пж, уже больше полугода не могу решить эту проблему, перепробовал все что мог, через день работы программа начинает сильно лагать.
ссылка на dmp - https://disk.yandex.ru/d/_lb7P8JgSQYUIA
Вывод WinDbg под спойлером
Скрытый текст
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true

EnableRedirectToV8JsProvider : false

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.046 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Elvira\Desktop\CounterBot.DMP]
User Mini Dump File with Full Memory: Only application data is available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 18363 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Debug session time: Wed May 29 23:51:17.000 2024 (UTC + 9:00)
System Uptime: 3 days 1:52:12.442
Process Uptime: 0 days 0:00:25.000
................................................................
..................................
For analysis of this file, run !analyze -v
win32u!NtUserMsgWaitForMultipleObjectsEx+0x14:
00007ffd`7e6c9a84 c3 ret
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************

*** WARNING: Unable to verify checksum for System.Management.ni.dll
*** WARNING: Unable to verify checksum for CounterBot.exe
*** WARNING: Unable to verify checksum for System.Windows.Forms.ni.dll

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 30046

Key : Analysis.Elapsed.mSec
Value: 34208

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 1

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 233

Key : Analysis.Init.Elapsed.mSec
Value: 3423

Key : Analysis.Memory.CommitPeak.Mb
Value: 296

Key : CLR.BuiltBy
Value: NET48REL1LAST

Key : CLR.Engine
Value: CLR

Key : CLR.Version
Value: 4.8.4075.0

Key : Failure.Bucket
Value: BREAKPOINT_80000003_win32u.dll!NtUserMsgWaitForMultipleObjectsEx

Key : Failure.Hash
Value: {ab2d2e3e-edb3-a979-68f2-e3be023a5515}

Key : Timeline.OS.Boot.DeltaSec
Value: 265932

Key : Timeline.Process.Start.DeltaSec
Value: 25

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Version
Value: 10.0.18362.1

Key : WER.Process.Version
Value: 1.8.5.0


FILE_IN_CAB: CounterBot.DMP

NTGLOBALFLAG: 0

APPLICATION_VERIFIER_FLAGS: 0

EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 0000000000000000
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 0

FAULTING_THREAD: 000012d8

PROCESS_NAME: CounterBot.exe

ERROR_CODE: (NTSTATUS) 0x80000003 - { } .

EXCEPTION_CODE_STR: 80000003

STACK_TEXT:
000000ce`0517a208 00007ffd`801d1c0d : 0000696c`8d3e0cbd 00007ffd`7f3b5519 00000000`00000000 000000ce`0517a380 : win32u!NtUserMsgWaitForMultipleObjectsEx+0x14
000000ce`0517a210 00007ffd`7f3b5d56 : 000000ce`0517ac10 00000000`00000002 000000ce`0517ac10 00000000`00000002 : user32!RealMsgWaitForMultipleObjectsEx+0x1d
000000ce`0517a250 00007ffd`7f3b5b85 : 0000026b`2a39a8f0 0000025c`4f0cf300 00000000`000003e8 0000025c`4d087d20 : combase!CCliModalLoop::BlockFn+0x186
000000ce`0517a310 00007ffd`7f3cd386 : 0000025c`ffffffff 0000025c`4f0cf300 00000000`00000000 0000025c`4f0cf300 : combase!ClassicSTAThreadWaitForCall+0xb5
000000ce`0517a380 00007ffd`7f3cc9c2 : 00000000`00000002 00000000`00000000 0000025c`32450000 0000025c`4c6ad130 : combase!ThreadSendReceive+0x386
000000ce`0517a9d0 00007ffd`7f3b6593 : 0000025c`4c6ad130 00000000`7f3efc00 00000000`00000000 000000ce`0517b220 : combase!CSyncClientCall::SendReceive2+0x182
000000ce`0517abd0 00007ffd`7f3cef68 : 0000025c`4d087d20 0000025c`4c6ad130 00007ffd`7f5b3c90 0000025c`4c6ad130 : combase!ClassicSTAThreadSendReceive+0xa3
000000ce`0517ad00 00007ffd`7f3b3c54 : 0000025c`4cd04070 00007ffd`7f3a40de 00000000`00000000 00007ffd`70094270 : combase!CSyncClientCall::SendReceive+0x128
000000ce`0517af30 00007ffd`7f43529e : 000000ce`0517b070 000000ce`0517b990 00000000`00000000 00007ffd`70094270 : combase!CClientChannel::SendReceive+0x84
000000ce`0517afa0 00007ffd`7f1d141a : 00000000`00000000 000000ce`00000000 00000000`00000000 00000000`00000000 : combase!NdrExtpProxySendReceive+0x4e
000000ce`0517afd0 00007ffd`7f4331af : 000065bf`a571747c 00000000`00000003 00000000`00000000 00007ffd`70094440 : rpcrt4!NdrpClientCall2+0x40a
000000ce`0517b5e0 00007ffd`7f4ab802 : 00005372`4581ff6b 00000000`ffffffff 00000000`00000001 000000ce`0517ba21 : combase!ObjectStublessClient+0x1df
000000ce`0517b970 00007ffd`701fe583 : 0000025c`4cc4b738 0000025c`32536da0 00000000`ffffffff 00000000`00000001 : combase!ObjectStubless+0x42
000000ce`0517b9c0 00007ffd`634ffc39 : 00000000`00000001 000000ce`00000000 0000025c`3457c258 ffffffff`ffffffff : fastprox!CEnumProxyBuffer::XEnumFacelet::Next+0xd3
000000ce`0517ba80 00007ffd`634ef839 : 00000000`00000000 000000ce`0517c2b0 00007ffd`6341fad0 0000025c`3457c7a0 : System_Management_ni+0xffc39
000000ce`0517bbc0 00007ffd`71a36bd3 : 0000025c`3457c298 00000000`00000001 0000025c`4d1b1918 0000025c`4f2fa4d0 : System_Management_ni!System.Management.ManagementObjectCollection.ManagementObjectEnumerator.MoveNex t+0x139
000000ce`0517bc50 00007ffd`71a36aa0 : 00007ffd`5af52320 00007ffd`5acecef0 0000025c`4c6ee260 00000000`00000000 : clr!CallDescrWorkerInternal+0x83
000000ce`0517bc90 00007ffd`71c04d52 : 0000025c`3457c298 00000000`00000000 000000ce`0517be80 00000000`00000000 : clr!CallDescrWorkerWithHandler+0x4e
000000ce`0517bcd0 00007ffd`71c05205 : 00000000`00000000 00000000`00000000 000000ce`0517bd60 00000000`00000000 : clr!CallDescrWorkerReflectionWrapper+0x1a
000000ce`0517bd20 00007ffd`6efcf27d : 00000000`00030504 0000025c`324c6340 0000025c`3457c298 00007ffd`6efc8b00 : clr!RuntimeMethodHandle::InvokeMethod+0x465
000000ce`0517c340 00007ffd`6ef4a8a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mscorlib_ni!System.Reflection.RuntimeMethodInfo.UnsafeInvokeInternal+0x10d
000000ce`0517c3b0 00007ffd`6ef56462 : 00000000`00000000 00000000`00000000 00000000`00000000 a784935a`00000000 : mscorlib_ni!System.Reflection.RuntimeMethodInfo.Invoke+0x92
000000ce`0517c430 00007ffd`12525a2b : 0000025c`34566408 0000025c`34385090 0000025c`3457c298 000000ce`0517ca08 : mscorlib_ni!System.Reflection.MethodBase.Invoke+0x22
000000ce`0517c470 00007ffd`1252678a : 0000025c`34566408 0000025c`34385090 000000ce`00000001 0000025c`345664d0 : CounterBot!39DA68B2.7B2E1A25+0x1d9b
000000ce`0517ca30 00007ffd`1251ad76 : 0000025c`34566408 0000025c`3456fcf8 00000011`00000012 0000000f`00000010 : CounterBot!39DA68B2.46C8028C+0x40a
000000ce`0517cb30 00007ffd`1251bb86 : 0000025c`34566408 00000000`00000000 00000000`0007e6a5 00000000`00000000 : CounterBot!39DA68B2.69CF16F0+0x156
000000ce`0517cbd0 00007ffd`1251b589 : 0000025c`343c97b0 0000025c`0007e6a5 000000ce`00000000 0000025c`343778e0 : CounterBot!39DA68B2.7F6A2BD1+0x526
000000ce`0517cd90 00007ffd`1251ad76 : 0000025c`343c97b0 0000025c`3445eb10 00000011`00000012 0000000f`00000010 : CounterBot!39DA68B2.5D7F0AF8+0x79
000000ce`0517ce00 00007ffd`1251bb86 : 0000025c`343c97b0 0000025c`343c9778 0000025c`00073357 00000000`00000000 : CounterBot!39DA68B2.69CF16F0+0x156
000000ce`0517cea0 00007ffd`1251b589 : 0000025c`343779c0 0000025c`00073357 000000ce`00000000 0000025c`343778e0 : CounterBot!39DA68B2.7F6A2BD1+0x526
000000ce`0517d060 00007ffd`1251ad76 : 0000025c`343779c0 0000025c`3475dec8 00000011`00000012 0000000f`00000010 : CounterBot!39DA68B2.5D7F0AF8+0x79
000000ce`0517d0d0 00007ffd`1253d06f : 0000025c`343779c0 0000025c`343779a0 0000025c`00079511 0000025c`345be798 : CounterBot!39DA68B2.69CF16F0+0x156
000000ce`0517d170 00007ffd`58837229 : 0000025c`34332b78 0000025c`345be1b0 00000000`00000001 00000000`00000000 : CounterBot!TM_BOT_by_Makc.autform.<load>b__17_0+0x8f
000000ce`0517d1d0 00007ffd`6efbdf60 : 0000025c`347544f8 0000025c`345c2ef8 00000000`00000000 00000000`00000000 : System_Windows_Forms_ni!System.Windows.Forms.Control.InvokeMarshaledCallbackHelper+0x69
000000ce`0517d220 00007ffd`6efbdde5 : 00000000`00000000 00000000`00000000 000000ce`0517d320 00007ffd`71a34ff9 : mscorlib_ni!System.Threading.ExecutionContext.RunInternal+0x170
000000ce`0517d2f0 00007ffd`6efbddb5 : 0000025c`345be798 00007ffd`588201ed 00000000`0000c17d 00007ffd`6ef357eb : mscorlib_ni!System.Threading.ExecutionContext.Run+0x15
000000ce`0517d320 00007ffd`588371ac : 00000000`0000c17d 00007ffd`588201ed 00000000`0000c17d 000000ce`0517d420 : mscorlib_ni!System.Threading.ExecutionContext.Run+0x55
000000ce`0517d370 00007ffd`58836f16 : 0000025c`344e2290 0000025c`345c2f50 0000025c`345c2fcc 0000025c`324c6340 : System_Windows_Forms_ni!System.Windows.Forms.Control.InvokeMarshaledCallback+0xbc
000000ce`0517d3c0 00007ffd`58820d79 : 0000025c`34332b78 0000025c`4cb916fc 00000000`00030504 00000000`80000000 : System_Windows_Forms_ni!System.Windows.Forms.Control.InvokeMarshaledCallbacks+0xe6
000000ce`0517d430 00007ffd`5882ce17 : 000000ce`0517d5e0 00007ffd`58820134 000000ce`0517d660 00007ffd`8089fe14 : System_Windows_Forms_ni!System.Windows.Forms.Control.WndProc+0x509
000000ce`0517d4f0 00007ffd`588200a2 : 00000000`00000000 0000025c`344ee1b0 00000000`00030504 00000000`00000000 : System_Windows_Forms_ni!System.Windows.Forms.Form.WndProc+0x67
000000ce`0517d550 00007ffd`58f54d12 : 0000025c`34334240 ffffffff`ffffffff 00000000`0000c17d 00007ffd`80825013 : System_Windows_Forms_ni!System.Windows.Forms.NativeWindow.Callback+0xc2
000000ce`0517d5f0 00007ffd`71a3224e : 0000025c`4cc07880 00000000`5857a638 00000000`00030504 ffffffff`0000031f : System_Windows_Forms_ni+0x9e4d12
000000ce`0517d660 00007ffd`801c5b6d : 00000000`0000c17d 00007ffd`801d54d0 00000000`00000001 00000000`00000000 : clr!UMThunkStub+0x6e
000000ce`0517d6f0 00007ffd`801c5562 : 0000025c`32d377b0 0000025c`4cb916fc 00000000`00030504 000000ce`0517da20 : user32!UserCallWinProcCheckWow+0x2bd
000000ce`0517d880 00007ffd`588a91b9 : 0000025c`4cb916fc 0000025c`344ef0a0 000000ce`0517da20 00007ffd`588369fa : user32!DispatchMessageWorker+0x1e2
000000ce`0517d900 00007ffd`58836521 : 0000025c`344ef0a0 000000ce`0517da20 00005372`4581ff6b 000000ce`0517d9b0 : System_Windows_Forms_ni+0x3391b9
000000ce`0517d9c0 00007ffd`58835e87 : 0000025c`34375fb8 00000000`00000001 00000000`ffffffff 00000000`00000000 : System_Windows_Forms_ni!System.Windows.Forms.Application.ComponentManager.System.Windows.Forms.Unsaf eNativeMethods.IMsoComponentManager.FPushMessageLoop+0x341
000000ce`0517dab0 00007ffd`58835c82 : 0000025c`34334fa0 00000000`ffffffff 0000025c`343579e8 00000000`00000000 : System_Windows_Forms_ni!System.Windows.Forms.Application.ThreadContext.RunMessageLoopInner+0x1c7
000000ce`0517db50 00007ffd`71a36bd3 : 0000025c`344ef0a0 00000000`ffffffff 0000025c`345933c0 0000025c`324c6340 : System_Windows_Forms_ni!System.Windows.Forms.Application.ThreadContext.RunMessageLoop+0x52
000000ce`0517dbb0 00007ffd`71a36aa0 : 00007ffd`6ea45f88 00007ffd`71b77a77 00007ffd`58604490 00007ffd`6e9a1000 : clr!CallDescrWorkerInternal+0x83
000000ce`0517dbf0 00007ffd`71c04d52 : 00000000`00000000 00000000`00000000 000000ce`0517dde0 00007ffd`58575020 : clr!CallDescrWorkerWithHandler+0x4e
000000ce`0517dc30 00007ffd`71c05205 : 00007ffd`58575020 0000025c`345933b0 00000000`00000000 00007ffd`58604490 : clr!CallDescrWorkerReflectionWrapper+0x1a
000000ce`0517dc80 00007ffd`6efcf1f4 : 00000000`00000000 00000000`00000000 00000000`00000000 0000025c`34593100 : clr!RuntimeMethodHandle::InvokeMethod+0x465
000000ce`0517e2a0 00007ffd`6ef4a8a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mscorlib_ni!System.Reflection.RuntimeMethodInfo.UnsafeInvokeInternal+0x84
000000ce`0517e310 00007ffd`6ef56462 : 00000000`00000000 00007ffd`6eefb27f 00000000`00000000 a784935a`00000000 : mscorlib_ni!System.Reflection.RuntimeMethodInfo.Invoke+0x92
000000ce`0517e390 00007ffd`12525a2b : 0000025c`344d24b8 0000025c`34593180 00000000`00000000 000000ce`0517e968 : mscorlib_ni!System.Reflection.MethodBase.Invoke+0x22
000000ce`0517e3d0 00007ffd`1252362c : 0000025c`34328898 0000025c`343577a8 000000ce`00000000 0000025c`344d24b8 : CounterBot!39DA68B2.7B2E1A25+0x1d9b
000000ce`0517e990 00007ffd`1251ad76 : 0000025c`34328898 00000000`000bc556 00000000`00000049 00007ffd`1240bf08 : CounterBot!39DA68B2.03B16D27+0xcc
000000ce`0517ea10 00007ffd`125384cf : 0000025c`34328898 00000000`00000000 000000ce`00072256 000000ce`0517ee90 : CounterBot!39DA68B2.69CF16F0+0x156
000000ce`0517eab0 00007ffd`71a36bd3 : 00007ffd`71a370b8 00007ffd`12404148 00000000`00000000 00000000`00000000 : CounterBot!csgotm_bot.Program.Main+0x4f
000000ce`0517eaf0 00007ffd`71a36aa0 : 000000ce`0517edd8 00007ffd`71a3755c 00007ffd`71a3e8e0 00000000`060000aa : clr!CallDescrWorkerInternal+0x83
000000ce`0517eb30 00007ffd`71a37130 : 000000ce`0517edd8 000000ce`0517ee68 000000ce`0517ecd8 00000000`00000000 : clr!CallDescrWorkerWithHandler+0x4e
000000ce`0517eb70 00007ffd`71b0f622 : 000000ce`0517ec20 00000000`00000000 00000000`00000000 00007ffd`125bc348 : clr!MethodDescCallSite::CallTargetWorker+0x102
000000ce`0517ec70 00007ffd`71b0ffe7 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : clr!RunMain+0x25f
000000ce`0517ee50 00007ffd`71b0fe9a : 0000025c`324c6340 000000ce`0517f240 0000025c`324c6340 0000025c`4c6ac480 : clr!Assembly::ExecuteMainMethod+0xb7
000000ce`0517f140 00007ffd`71b0f7e3 : 00000000`00000000 0000025c`31eb0000 00000000`00000000 00000000`00000000 : clr!SystemDomain::ExecuteMainMethod+0x643
000000ce`0517f740 00007ffd`71b0f761 : 0000025c`31eb0000 00007ffd`71b10c90 00000000`00000000 00000000`00000000 : clr!ExecuteEXE+0x3f
000000ce`0517f7b0 00007ffd`71b10ca4 : ffffffff`ffffffff 00007ffd`71b10c90 00000000`00000000 00000000`00000000 : clr!_CorExeMainInternal+0xb2
000000ce`0517f840 00007ffd`72868c01 : 00000000`00000000 00007ffd`00000091 00000000`00000000 000000ce`0517f818 : clr!CorExeMain+0x14
000000ce`0517f880 00007ffd`72b0a56c : 00000000`00000000 00007ffd`71b10c90 00000000`00000000 00000000`00000000 : mscoreei!CorExeMain+0x112
000000ce`0517f8e0 00007ffd`7e907bd4 : 00007ffd`72860000 00000000`00000000 00000000`00000000 00000000`00000000 : mscoree!CorExeMain_Exported+0x6c
000000ce`0517f910 00007ffd`8086ced1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
000000ce`0517f940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


STACK_COMMAND: ~0s; .ecxr ; kb

SYMBOL_NAME: win32u!NtUserMsgWaitForMultipleObjectsEx+14

MODULE_NAME: win32u

IMAGE_NAME: win32u.dll

FAILURE_BUCKET_ID: BREAKPOINT_80000003_win32u.dll!NtUserMsgWaitForMultipleObjectsEx

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

IMAGE_VERSION: 10.0.18362.592

FAILURE_ID_HASH: {ab2d2e3e-edb3-a979-68f2-e3be023a5515}

Followup: MachineOwner

Отправлено: 18:31, 29-05-2024

 


Moderator


Сообщения: 53261
Благодарности: 15455

Профиль | Отправить PM | Цитировать


holwkss, попробуйте обратиться к авторам программы.

Отправлено: 19:28, 29-05-2024 | #2



Для отключения данного рекламного блока вам необходимо зарегистрироваться или войти с учетной записью социальной сети.

Если же вы забыли свой пароль на форуме, то воспользуйтесь данной ссылкой для восстановления пароля.



Компьютерный форум OSzone.net » Компьютеры + Интернет » Хочу все знать » EventID - Утечка памяти

Участник сейчас на форуме Участник сейчас на форуме Участник вне форума Участник вне форума Автор темы Автор темы Шапка темы Сообщение прикреплено

Похожие темы
Название темы Автор Информация о форуме Ответов Последнее сообщение
2008 R2 - Утечка памяти an63l Windows Server 2008/2008 R2 10 24-08-2016 18:27
2008 - Утечка памяти Angry Demon Windows Server 2008/2008 R2 11 16-12-2015 10:29
Утечка памяти Zhentos Лечение систем от вредоносных программ 5 17-04-2015 17:56
2008 R2 - Утечка памяти? snap87 Windows Server 2008/2008 R2 0 23-10-2013 20:40
Утечка памяти Negativ Microsoft Windows NT/2000/2003 4 04-10-2010 08:35




 
Переход