Thanks for taking a look into this @EA_Blueberry
Wanted to add a comment here to maybe get more information from anyone else following this thread as well.
Hi folks - I've been trying to get to the bottom of the bad_module_info crashes, which are the crashes where the game randomly quits with no error as if you pressed alt+F4. If you were to go into Event Viewer and check the Application events you will find a bad_module_info error logged at the precise moment the game crashed.
Anyways I just discovered that every single bad_module_info log in Event Viewer is preceded by two Microsoft Windows security auditing events (Event ID: 4624 and Event ID: 4672) that happen exactly 1 second before the game crashes.
Can someone else experiencing the bad_module_info errors check to see if they have the same security events showing up? This event will be logged under Event Viewer > Windows Logs > Security and will show up as Event ID: 4624 and Event ID: 4672 and the timestamp should be a second before the bad_module_info error
In my case it looks like there is a Logon Process: Advapi (which is a Windows OS dll file) that is occurring exactly one second before the bad_module_info game crash, so my theory is that whatever windows service that is accessing the Advanced API dll file is what is causing the crash.
Here is an example:
Application Event ID: 1000
(bad_module_info) at 08:38:42 PM (earlier tonight)
Faulting application name: bad_module_info, version: 0.0.0.0, time stamp: 0x00000000
Faulting module name: unknown, version: 0.0.0.0, time stamp: 0x00000000
Exception code: 0x00000000
Fault offset: 0x0000000000000000
Faulting process id: 0x17dc
Faulting application start time: 0x01d4d49b2c80ebd5
Faulting application path: bad_module_info
Faulting module path: unknown
Report Id: e7279b90-d0f2-48b5-8487-f5262b628f2d
Faulting package full name:
Faulting package-relative application ID:
Security Event ID: 4672
at 08:38:41 PM (1 second before the crash logged above)
An account was successfully logged on.
Subject:
Security ID: SYSTEM
Account Name: LUNCHBOX$
Account Domain: WORKGROUP
Logon ID: 0x3E7
Logon Information:
Logon Type: 5
Restricted Admin Mode: -
Virtual Account: No
Elevated Token: Yes
Impersonation Level: Impersonation
New Logon:
Security ID: SYSTEM
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3E7
Linked Logon ID: 0x0
Network Account Name: -
Network Account Domain: -
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x378
Process Name: C:\Windows\System32\services.exe
Network Information:
Workstation Name: -
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0