EpsilonSeven
6 days agoRising Newcomer
Re: Access violation - code c0000005 (first/second chance not available)
After playing for a while, the game freezes for about 10 seconds with the last millisecond of sound playing on a loop. Then my PC restarts. This generates a minidump with the following content. My PC specs are:
Intel i7-1400K (With the BIOS update to fix instability)
32GB RAM
NVIDIA RTX 3070
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.172 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 45
Microsoft (R) Windows Debugger Version 10.0.27871.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\(my file path)\080725-12765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (28 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff802`c5200000 PsLoadedModuleList = 0xfffff802`c60f4c40
Debug session time: Thu Aug 7 19:54:37.490 2025 (UTC - 7:00)
System Uptime: 0 days 6:24:59.091
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00222018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`c57005d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbb0d`e6cf6190=000000000000001e
5: kd> !analyze -v
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00222018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8027cdbf589, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for eaanticheat.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1921
Key : Analysis.Elapsed.mSec
Value: 8146
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 718
Key : Analysis.Init.Elapsed.mSec
Value: 155496
Key : Analysis.Memory.CommitPeak.Mb
Value: 108
Key : Analysis.Version.DbgEng
Value: 10.0.27871.1001
Key : Analysis.Version.Description
Value: 10.2505.01.02 amd64fre
Key : Analysis.Version.Ext
Value: 1.2505.1.2
Key : Bugcheck.Code.LegacyAPI
Value: 0x1e
Key : Bugcheck.Code.TargetModel
Value: 0x1e
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_R_eaanticheat!unknown_function
Key : Failure.Exception.IP.Address
Value: 0xfffff8027cdbf589
Key : Failure.Exception.IP.Module
Value: eaanticheat
Key : Failure.Exception.IP.Offset
Value: 0x2d6f589
Key : Failure.Hash
Value: {100f1e0a-abcf-3860-2e0c-3546be52e55a}
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8027cdbf589
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
FILE_IN_CAB: 080725-12765-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffe58bc0cea080
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: fffff802c61c44c0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: bf6event.exe
TRAP_FRAME: ffffaa8535b4b101 -- (.trap 0xffffaa8535b4b101)
Unable to read trap frame at ffffaa85`35b4b101
Resetting default scope
STACK_TEXT:
ffffbb0d`e6cf6188 fffff802`c55c56cb : 00000000`0000001e ffffffff`c0000005 fffff802`7cdbf589 00000000`00000000 : nt!KeBugCheckEx
ffffbb0d`e6cf6190 fffff802`c58b9845 : ffffe58b`9fc0d7a0 ffffaa85`843b9430 ffffaa85`35b4b101 ffffffff`f4143e00 : nt!KiDispatchException+0xb0b
ffffbb0d`e6cf68a0 fffff802`c58b4525 : 00245bab`489e0390 00314910`01b9c090 008dee61`db008b10 009015f2`a4852a90 : nt!KiExceptionDispatch+0x145
ffffbb0d`e6cf6a80 fffff802`7cdbf589 : ffffbb0d`e6cf6ec0 4601ee21`0a099c45 fffff800`fa050000 fffff802`7ae5f6f2 : nt!KiGeneralProtectionFault+0x365
ffffbb0d`e6cf6c10 ffffbb0d`e6cf6ec0 : 4601ee21`0a099c45 fffff800`fa050000 fffff802`7ae5f6f2 00000000`00000000 : eaanticheat+0x2d6f589
ffffbb0d`e6cf6c18 4601ee21`0a099c45 : fffff800`fa050000 fffff802`7ae5f6f2 00000000`00000000 00000000`00000001 : 0xffffbb0d`e6cf6ec0
ffffbb0d`e6cf6c20 fffff800`fa050000 : fffff802`7ae5f6f2 00000000`00000000 00000000`00000001 ffffe58b`c0cea080 : 0x4601ee21`0a099c45
ffffbb0d`e6cf6c28 fffff802`7ae5f6f2 : 00000000`00000000 00000000`00000001 ffffe58b`c0cea080 00000000`00000000 : 0xfffff800`fa050000
ffffbb0d`e6cf6c30 00000000`00000000 : 00000000`00000001 ffffe58b`c0cea080 00000000`00000000 ffffbb0d`e6cf6e90 : eaanticheat+0xe0f6f2
SYMBOL_NAME: eaanticheat+2d6f589
MODULE_NAME: eaanticheat
IMAGE_NAME: eaanticheat.sys
STACK_COMMAND: .process /r /p 0xffffe58bcadea080; .thread 0xffffe58bc0cea080 ; kb
BUCKET_ID_FUNC_OFFSET: 2d6f589
FAILURE_BUCKET_ID: AV_R_eaanticheat!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {100f1e0a-abcf-3860-2e0c-3546be52e55a}
Followup: MachineOwner
---------