Hi @EA_Kent, I already tried the clean boot, and so far, it worked for a while until it crashed just now while I was playing. I will be sending the crashdump again. Could I ask when I post this, while you pinpoint what is causing the CTDs? This will be the 3rd time ill be sending the crashdump, so maybe there is an explanation why this is happening.
Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\MADZAK\Documents\Battlefield V\crash_dumps\CrashDump_2019.12.14_20.41.26.354.mdmp]
Comment: 'Frostbite MiniDump. Address: 0000000140565625 (In Windbg type: .ecxr)
[EOF]'
User Mini Dump File: Only registers, stack and portions of memory are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 18363 MP (8 procs) Free x64
Product: WinNt, suite: SingleUserTS
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Debug session time: Sat Dec 14 20:41:26.000 2019 (UTC + 8:00)
System Uptime: not available
Process Uptime: 0 days 0:48:46.000
................................................................
................................................................
...........
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(2e58.1df8): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -vntdll!NtGetContextThread+0x14:
00007ffe`b4c3de54 c3 ret
0:022> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 179
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on MADZAK
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 192
Key : Analysis.Memory.CommitPeak.Mb
Value: 7215
Key : Analysis.System
Value: CreateObject
Key : Timeline.Process.Start.DeltaSec
Value: 2926
ADDITIONAL_XML: 1
COMMENT: Frostbite MiniDump. Address: 0000000140565625 (In Windbg type: .ecxr)
[EOF]
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
CHKIMG_EXTENSION: !chkimg -lo 50 -db !bfv
256 errors : !bfv (1405655a5-1405656a4)
1405655a0 3d 43 0a f3 e7 *33 *c9 *66 *0f *1f *84 *00 *00 *00 *00 *00 =C...3.f........
1405655b0 *ff *c2 *8b *c2 *48 *0f *af *c5 *48 *03 *c6 *48 *0f *af *cd *48 ....H...H..H...H
1405655c0 *89 *04 *31 *8b *ca *49 *3b *c8 *72 *e6 *4c *0f *af *c5 *49 *c7 ..1..I;.r.L...I.
1405655d0 *04 *30 *00 *00 *00 *00 *48 *85 *db *74 *11 *48 *8b *cb *e8 *bd .0....H..t.H....
1405655e0 *5d *04 *00 *48 *c7 *44 *24 *68 *00 *00 *00 *00 *48 *85 *f6 *75 ]..H.D$h....H..u
1405655f0 *04 *33 *c0 *eb *37 *49 *89 *76 *30 *49 *8b *46 *30 *41 *8b *4e .3..7I.v0I.F0A.N
140565600 *38 *f0 *0f *c1 *8f *08 *05 *00 *00 *8b *97 *0c *05 *00 *00 *8b 8...............
140565610 *8f *08 *05 *00 *00 *3b *ca *76 *0c *8b *8f *08 *05 *00 *00 *89 .....;.v........
140565620 *8f *0c *05 *00 *00 *48 *8b *08 *49 *89 *4e *30 *48 *8b *5c *24 .....H..I.N0H.\$
140565630 *60 *48 *8b *6c *24 *70 *48 *83 *c4 *40 *41 *5e *5f *5e *c3 *cc `H.l$pH..@A^_^..
140565640 *e9 *eb *33 *4a *05 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ..3J............
140565650 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................
140565660 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................
140565670 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................
140565680 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................
140565690 *e9 *8b *35 *4a *05 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ..5J............
1405656a0 *e9 *2b *36 *4a *05 23 19 c5 ea bd 3e b5 97 f1 0a df .+6J.#....>.....
CONTEXT: (.ecxr)rax=000100009a8b1dd0 rbx=000000009ad864b0 rcx=00000000049070f8
rdx=0000000004f57120 rsi=0000000000000027 rdi=00000001442b2d50
rip=0000000140565625 rsp=0000000034f9f710 rbp=00000001442b2de0
r8=0000000000000018 r9=00000000303bb8f8 r10=0000000000000000
r11=0000000034f9fb18 r12=0000000000000018 r13=00000000303bb8f8
r14=00000001442b2de0 r15=00000001442b2d50
iopl=0 nv up ei ng nz na po cy
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010287
bfv!IsGameRuntime+0x23ac5:
00000001`40565625 488b08 mov rcx,qword ptr [rax] ds:00010000`9a8b1dd0=????????????????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)ExceptionAddress: 0000000140565625 (bfv!IsGameRuntime+0x0000000000023ac5)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
PROCESS_NAME: bfv.exe
READ_ADDRESS: ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
DETOURED_IMAGE: 1
ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
STACK_TEXT:
00000000`00000000 00000000`00000000 memory_corruption!bfv+0x0
SYMBOL_NAME: memory_corruption!bfv
STACK_COMMAND: ** Pseudo Context ** ManagedPseudo ** Value: 1f74f3f9c10 ** ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_256_c0000005_memory_corruption!bfv
IMAGE_NAME: memory_corruption
MODULE_NAME: memory_corruption
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d1fd1d9-185c-71f8-8d1e-8f9883946e31}
Followup: MachineOwner
---------