Single Player only will not load after black screen
I can play multiplayer but not the campaign. I was actually able to play one time, but never again. I have done literally every single tip given in every forum I can find. It always crashes on loading Single Player and goes back to the EA app to start the game again.
Here is the error as it shows in the dump files:
******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* KEY_VALUES_STRING: 1 Key : AV.Type Value: Write Key : Analysis.CPU.mSec Value: 421 Key : Analysis.Elapsed.mSec Value: 1262 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 312 Key : Analysis.Init.Elapsed.mSec Value: 6517 Key : Analysis.Memory.CommitPeak.Mb Value: 257 Key : Analysis.Version.DbgEng Value: 10.0.29457.1000 Key : Analysis.Version.Description Value: 10.2506.23.01 amd64fre Key : Analysis.Version.Ext Value: 1.2506.23.1 Key : Failure.Bucket Value: INVALID_POINTER_WRITE_c0000005_bf6.exe!Unknown Key : Failure.Exception.Code Value: 0xc0000005 Key : Failure.Exception.IP.Address Value: 0x7ffc6068aa83 Key : Failure.Exception.IP.Module Value: ntdll Key : Failure.Exception.IP.Offset Value: 0xaa83 Key : Failure.Hash Value: {2e3dbfa5-45db-9d81-cb14-a0e213654b79} Key : Failure.ProblemClass.Primary Value: INVALID_POINTER_WRITE Key : Timeline.OS.Boot.DeltaSec Value: 5691 Key : Timeline.Process.Start.DeltaSec Value: 9 Key : WER.OS.Branch Value: ge_release Key : WER.OS.Version Value: 10.0.26100.1 Key : WER.Process.Version Value: 1.0.388.5459 FILE_IN_CAB: CrashDump_2025.10.25_15.16.11.307.mdmp COMMENT: Frostbite MiniDump. Address: 7ffc6068aa83 (In Windbg type: .ecxr) [EOF] NTGLOBALFLAG: 0 CONTEXT: (.ecxr) rax=0000000000000000 rbx=0000000000000000 rcx=00000000377e1c40 rdx=00000000fffffffa rsi=0000000000000000 rdi=00000000377e1c40 rip=00007ffc6068aa83 rsp=000000007a7cf360 rbp=000000007a7cf3f9 r8=0000000000000000 r9=00000000377e1c48 r10=0000000000000001 r11=0000000000000001 r12=000013b9ee1f3de6 r13=0000000000000000 r14=00000000fffffffa r15=000013b9ee1f3c90 iopl=0 nv up ei pl nz ac pe cy cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010213 ntdll!RtlpWaitOnCriticalSection+0xb3: 00007ffc`6068aa83 ff4024 inc dword ptr [rax+24h] ds:00000000`00000024=???????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ffc6068aa83 (ntdll!RtlpWaitOnCriticalSection+0x00000000000000b3) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: 0000000000000024 Attempt to write to address 0000000000000024 PROCESS_NAME: bf6.exe WRITE_ADDRESS: 0000000000000024 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 0000000000000024 STACK_TEXT: 00000000`7a7cf360 00007ffc`6068c5ff : 00000000`00000030 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlpWaitOnCriticalSection+0xb3 00000000`7a7cf460 00007ffc`6068d872 : 00000000`377e1c40 00000000`00010500 00000000`37ad5300 00000000`375e1790 : ntdll!RtlpEnterCriticalSectionContended+0x1ef 00000000`7a7cf4e0 00000001`44bd88c8 : 00000000`00000000 00000000`6b84bda0 00000000`0d103ed0 00000001`40c47c52 : ntdll!RtlEnterCriticalSection+0xf2 00000000`7a7cf520 00000000`00000000 : 00000000`6b84bda0 00000000`0d103ed0 00000001`40c47c52 00000000`6b9c9de0 : bf6!ffxFsr2ResourceIsNull+0x23d55d8 SYMBOL_NAME: bf6+4bd88c8 MODULE_NAME: bf6 IMAGE_NAME: bf6.exe STACK_COMMAND: ~20s; .ecxr ; kb FAILURE_BUCKET_ID: INVALID_POINTER_WRITE_c0000005_bf6.exe!Unknown OS_VERSION: 10.0.26100.1 BUILDLAB_STR: ge_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 IMAGE_VERSION: 1.0.388.5459 FAILURE_ID_HASH: {2e3dbfa5-45db-9d81-cb14-a0e213654b79} Followup: MachineOwner --------- 0:020> ~20s; .ecxr ; kb ntdll!NtGetContextThread+0x14: 00007ffc`607e3b44 c3 ret rax=0000000000000000 rbx=0000000000000000 rcx=00000000377e1c40 rdx=00000000fffffffa rsi=0000000000000000 rdi=00000000377e1c40 rip=00007ffc6068aa83 rsp=000000007a7cf360 rbp=000000007a7cf3f9 r8=0000000000000000 r9=00000000377e1c48 r10=0000000000000001 r11=0000000000000001 r12=000013b9ee1f3de6 r13=0000000000000000 r14=00000000fffffffa r15=000013b9ee1f3c90 iopl=0 nv up ei pl nz ac pe cy cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010213 ntdll!RtlpWaitOnCriticalSection+0xb3: 00007ffc`6068aa83 ff4024 inc dword ptr [rax+24h] ds:00000000`00000024=???????? *** Stack trace for last set context - .thread/.cxr resets it # RetAddr : Args to Child : Call Site 00 00007ffc`6068c5ff : 00000000`00000030 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlpWaitOnCriticalSection+0xb3 01 00007ffc`6068d872 : 00000000`377e1c40 00000000`00010500 00000000`37ad5300 00000000`375e1790 : ntdll!RtlpEnterCriticalSectionContended+0x1ef 02 00000001`44bd88c8 : 00000000`00000000 00000000`6b84bda0 00000000`0d103ed0 00000001`40c47c52 : ntdll!RtlEnterCriticalSection+0xf2 03 00000000`00000000 : 00000000`6b84bda0 00000000`0d103ed0 00000001`40c47c52 00000000`6b9c9de0 : bf6!ffxFsr2ResourceIsNull+0x23d55d8