Forum Discussion
7 years ago
Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ventu\OneDrive\Documenti\Battlefield V\crash_dumps\CrashDump_2019.10.08_21.16.42.652.mdmp]
Comment: 'Frostbite MiniDump. Address: 0000000141F4326E (In Windbg type: .ecxr)
[EOF]'
User Mini Dump File: Only registers, stack and portions of memory are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: SingleUserTS
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Debug session time: Tue Oct 8 21:16:42.000 2019 (UTC + 2:00)
System Uptime: not available
Process Uptime: 0 days 0:14:29.000
................................................................
................................................................
......
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(384.289c): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!NtGetContextThread+0x14:
00007fff`ec7dde54 c3 ret
0:019> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 82
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KP1KK6Q
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 100
Key : Analysis.Memory.CommitPeak.Mb
Value: 3283
Key : Analysis.System
Value: CreateObject
Key : Timeline.Process.Start.DeltaSec
Value: 869
COMMENT: Frostbite MiniDump. Address: 0000000141F4326E (In Windbg type: .ecxr)
[EOF]
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
CHKIMG_EXTENSION: !chkimg -lo 50 -db !bfv
256 errors : !bfv (141f431ee-141f432ed)
141f431e0 f7 28 38 5e 97 1e 96 b4 d5 5a 90 35 b8 98 *15 *0d .(8^.....Z.5....
141f431f0 *c3 *a5 *01 *e8 *c8 *f9 *64 *fe *e9 *76 *01 *00 *00 *48 *8d *15 ......d..v...H..
141f43200 *4c *c3 *a5 *01 *e8 *b7 *f9 *64 *fe *e9 *65 *01 *00 *00 *8d *87 L......d..e.....
141f43210 *fb *ff *85 *77 *83 *f8 *26 *0f *87 *01 *01 *00 *00 *48 *b9 *07 ...w..&......H..
141f43220 *00 *00 *08 *40 *00 *00 *00 *48 *0f *a3 *c1 *0f *83 *ed *00 *00 ...@...H........
141f43230 *00 *48 *8b *86 *b0 *09 *00 *00 *80 *b8 *11 *01 *00 *00 *00 *0f .H..............
141f43240 *84 *d9 *00 *00 *00 *41 *b8 *00 *04 *00 *00 *48 *8d *95 *f8 *0b .....A.....H....
141f43250 *00 *00 *48 *8d *8d *e0 *0b *00 *00 *e8 *b2 *10 *65 *fe *90 *48 ..H.........e..H
141f43260 *83 *8d *e0 *0b *00 *00 *02 *48 *8b *86 *08 *12 *00 *00 *48 *8b .......H......H.
141f43270 *08 *80 *39 *00 *74 *33 *48 *8d *15 *eb *ae *a5 *01 *48 *8d *8d ..9.t3H......H..
141f43280 *e0 *0b *00 *00 *e8 *37 *f9 *64 *fe *e8 *32 *64 *68 *fe *4c *8b .....7.d..2dh.L.
141f43290 *85 *e0 *0b *00 *00 *49 *83 *e0 *fc *48 *8d *15 *f8 *c2 *a5 *01 .....I...H......
141f432a0 *48 *8b *c8 *e8 *58 *3d *68 *fe *90 *41 *b8 *00 *04 *00 *00 *48 H...X=h..A.....H
141f432b0 *8d *95 *d8 *07 *00 *00 *48 *8d *8d *c0 *07 *00 *00 *e8 *4e *10 ......H.......N.
141f432c0 *65 *fe *90 *48 *83 *8d *c0 *07 *00 *00 *02 *48 *8b *86 *08 *12 e..H.......H....
141f432d0 *00 *00 *48 *8d *95 *c0 *07 *00 *00 *48 *8b *08 *e8 *0f *01 *00 ..H......H......
141f432e0 *00 *84 *c0 *74 *20 *e8 *d6 *63 *68 *fe *4c *8b *85 *c0 a8 64 ...t ..ch.L....d
CONTEXT: (.ecxr)
rax=0000000000000000 rbx=0000000037997470 rcx=000000003422eec0
rdx=000000003422eed8 rsi=00000000379963e0 rdi=00000000887a0005
rip=0000000141f4326e rsp=000000003422e1e0 rbp=000000003422e2e0
r8=000000003422f2d7 r9=000000014432cbd0 r10=000000003422d9b8
r11=000000003422e1d0 r12=00000000000003ff r13=ffff000000000000
r14=0000000000000000 r15=000000014399f180
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
bfv!fb::JsMessageListener::onJSRegister+0x3871de:
00000001`41f4326e 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 0000000141f4326e (bfv!fb::JsMessageListener::onJSRegister+0x00000000003871de)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
PROCESS_NAME: bfv.exe
READ_ADDRESS: 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
DETOURED_IMAGE: 1
ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
STACK_TEXT:
00000000`00000000 00000000`00000000 memory_corruption!bfv+0x0
SYMBOL_NAME: memory_corruption!bfv
STACK_COMMAND: ** Pseudo Context ** ManagedPseudo ** Value: 236023ffb50 ** ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_256_c0000005_memory_corruption!bfv
IMAGE_NAME: memory_corruption
MODULE_NAME: memory_corruption
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d1fd1d9-185c-71f8-8d1e-8f9883946e31}
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ventu\OneDrive\Documenti\Battlefield V\crash_dumps\CrashDump_2019.10.08_21.16.42.652.mdmp]
Comment: 'Frostbite MiniDump. Address: 0000000141F4326E (In Windbg type: .ecxr)
[EOF]'
User Mini Dump File: Only registers, stack and portions of memory are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: SingleUserTS
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Debug session time: Tue Oct 8 21:16:42.000 2019 (UTC + 2:00)
System Uptime: not available
Process Uptime: 0 days 0:14:29.000
................................................................
................................................................
......
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(384.289c): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!NtGetContextThread+0x14:
00007fff`ec7dde54 c3 ret
0:019> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 82
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KP1KK6Q
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 100
Key : Analysis.Memory.CommitPeak.Mb
Value: 3283
Key : Analysis.System
Value: CreateObject
Key : Timeline.Process.Start.DeltaSec
Value: 869
COMMENT: Frostbite MiniDump. Address: 0000000141F4326E (In Windbg type: .ecxr)
[EOF]
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
CHKIMG_EXTENSION: !chkimg -lo 50 -db !bfv
256 errors : !bfv (141f431ee-141f432ed)
141f431e0 f7 28 38 5e 97 1e 96 b4 d5 5a 90 35 b8 98 *15 *0d .(8^.....Z.5....
141f431f0 *c3 *a5 *01 *e8 *c8 *f9 *64 *fe *e9 *76 *01 *00 *00 *48 *8d *15 ......d..v...H..
141f43200 *4c *c3 *a5 *01 *e8 *b7 *f9 *64 *fe *e9 *65 *01 *00 *00 *8d *87 L......d..e.....
141f43210 *fb *ff *85 *77 *83 *f8 *26 *0f *87 *01 *01 *00 *00 *48 *b9 *07 ...w..&......H..
141f43220 *00 *00 *08 *40 *00 *00 *00 *48 *0f *a3 *c1 *0f *83 *ed *00 *00 ...@...H........
141f43230 *00 *48 *8b *86 *b0 *09 *00 *00 *80 *b8 *11 *01 *00 *00 *00 *0f .H..............
141f43240 *84 *d9 *00 *00 *00 *41 *b8 *00 *04 *00 *00 *48 *8d *95 *f8 *0b .....A.....H....
141f43250 *00 *00 *48 *8d *8d *e0 *0b *00 *00 *e8 *b2 *10 *65 *fe *90 *48 ..H.........e..H
141f43260 *83 *8d *e0 *0b *00 *00 *02 *48 *8b *86 *08 *12 *00 *00 *48 *8b .......H......H.
141f43270 *08 *80 *39 *00 *74 *33 *48 *8d *15 *eb *ae *a5 *01 *48 *8d *8d ..9.t3H......H..
141f43280 *e0 *0b *00 *00 *e8 *37 *f9 *64 *fe *e8 *32 *64 *68 *fe *4c *8b .....7.d..2dh.L.
141f43290 *85 *e0 *0b *00 *00 *49 *83 *e0 *fc *48 *8d *15 *f8 *c2 *a5 *01 .....I...H......
141f432a0 *48 *8b *c8 *e8 *58 *3d *68 *fe *90 *41 *b8 *00 *04 *00 *00 *48 H...X=h..A.....H
141f432b0 *8d *95 *d8 *07 *00 *00 *48 *8d *8d *c0 *07 *00 *00 *e8 *4e *10 ......H.......N.
141f432c0 *65 *fe *90 *48 *83 *8d *c0 *07 *00 *00 *02 *48 *8b *86 *08 *12 e..H.......H....
141f432d0 *00 *00 *48 *8d *95 *c0 *07 *00 *00 *48 *8b *08 *e8 *0f *01 *00 ..H......H......
141f432e0 *00 *84 *c0 *74 *20 *e8 *d6 *63 *68 *fe *4c *8b *85 *c0 a8 64 ...t ..ch.L....d
CONTEXT: (.ecxr)
rax=0000000000000000 rbx=0000000037997470 rcx=000000003422eec0
rdx=000000003422eed8 rsi=00000000379963e0 rdi=00000000887a0005
rip=0000000141f4326e rsp=000000003422e1e0 rbp=000000003422e2e0
r8=000000003422f2d7 r9=000000014432cbd0 r10=000000003422d9b8
r11=000000003422e1d0 r12=00000000000003ff r13=ffff000000000000
r14=0000000000000000 r15=000000014399f180
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
bfv!fb::JsMessageListener::onJSRegister+0x3871de:
00000001`41f4326e 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 0000000141f4326e (bfv!fb::JsMessageListener::onJSRegister+0x00000000003871de)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
PROCESS_NAME: bfv.exe
READ_ADDRESS: 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
DETOURED_IMAGE: 1
ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
STACK_TEXT:
00000000`00000000 00000000`00000000 memory_corruption!bfv+0x0
SYMBOL_NAME: memory_corruption!bfv
STACK_COMMAND: ** Pseudo Context ** ManagedPseudo ** Value: 236023ffb50 ** ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_256_c0000005_memory_corruption!bfv
IMAGE_NAME: memory_corruption
MODULE_NAME: memory_corruption
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d1fd1d9-185c-71f8-8d1e-8f9883946e31}
Followup: MachineOwner
---------