Re: Analize crash Dump
Hi @EA_Kent, I already tried the clean boot, and so far, it worked for a while until it crashed just now while I was playing. I will be sending the crashdump again. Could I ask when I post this, while you pinpoint what is causing the CTDs? This will be the 3rd time ill be sending the crashdump, so maybe there is an explanation why this is happening.
Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\MADZAK\Documents\Battlefield V\crash_dumps\CrashDump_2019.12.14_20.41.26.354.mdmp] Comment: 'Frostbite MiniDump. Address: 0000000140565625 (In Windbg type: .ecxr) [EOF]' User Mini Dump File: Only registers, stack and portions of memory are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Version 18363 MP (8 procs) Free x64 Product: WinNt, suite: SingleUserTS 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Debug session time: Sat Dec 14 20:41:26.000 2019 (UTC + 8:00) System Uptime: not available Process Uptime: 0 days 0:48:46.000 ................................................................ ................................................................ ........... This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (2e58.1df8): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -vntdll!NtGetContextThread+0x14: 00007ffe`b4c3de54 c3 ret 0:022> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.Sec Value: 179 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on MADZAK Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 192 Key : Analysis.Memory.CommitPeak.Mb Value: 7215 Key : Analysis.System Value: CreateObject Key : Timeline.Process.Start.DeltaSec Value: 2926 ADDITIONAL_XML: 1 COMMENT: Frostbite MiniDump. Address: 0000000140565625 (In Windbg type: .ecxr) [EOF] NTGLOBALFLAG: 0 PROCESS_BAM_CURRENT_THROTTLED: 0 PROCESS_BAM_PREVIOUS_THROTTLED: 0 CHKIMG_EXTENSION: !chkimg -lo 50 -db !bfv 256 errors : !bfv (1405655a5-1405656a4) 1405655a0 3d 43 0a f3 e7 *33 *c9 *66 *0f *1f *84 *00 *00 *00 *00 *00 =C...3.f........ 1405655b0 *ff *c2 *8b *c2 *48 *0f *af *c5 *48 *03 *c6 *48 *0f *af *cd *48 ....H...H..H...H 1405655c0 *89 *04 *31 *8b *ca *49 *3b *c8 *72 *e6 *4c *0f *af *c5 *49 *c7 ..1..I;.r.L...I. 1405655d0 *04 *30 *00 *00 *00 *00 *48 *85 *db *74 *11 *48 *8b *cb *e8 *bd .0....H..t.H.... 1405655e0 *5d *04 *00 *48 *c7 *44 *24 *68 *00 *00 *00 *00 *48 *85 *f6 *75 ]..H.D$h....H..u 1405655f0 *04 *33 *c0 *eb *37 *49 *89 *76 *30 *49 *8b *46 *30 *41 *8b *4e .3..7I.v0I.F0A.N 140565600 *38 *f0 *0f *c1 *8f *08 *05 *00 *00 *8b *97 *0c *05 *00 *00 *8b 8............... 140565610 *8f *08 *05 *00 *00 *3b *ca *76 *0c *8b *8f *08 *05 *00 *00 *89 .....;.v........ 140565620 *8f *0c *05 *00 *00 *48 *8b *08 *49 *89 *4e *30 *48 *8b *5c *24 .....H..I.N0H.\$ 140565630 *60 *48 *8b *6c *24 *70 *48 *83 *c4 *40 *41 *5e *5f *5e *c3 *cc `H.l$pH..@A^_^.. 140565640 *e9 *eb *33 *4a *05 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ..3J............ 140565650 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................ 140565660 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................ 140565670 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................ 140565680 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ................ 140565690 *e9 *8b *35 *4a *05 *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc *cc ..5J............ 1405656a0 *e9 *2b *36 *4a *05 23 19 c5 ea bd 3e b5 97 f1 0a df .+6J.#....>..... CONTEXT: (.ecxr)rax=000100009a8b1dd0 rbx=000000009ad864b0 rcx=00000000049070f8 rdx=0000000004f57120 rsi=0000000000000027 rdi=00000001442b2d50 rip=0000000140565625 rsp=0000000034f9f710 rbp=00000001442b2de0 r8=0000000000000018 r9=00000000303bb8f8 r10=0000000000000000 r11=0000000034f9fb18 r12=0000000000000018 r13=00000000303bb8f8 r14=00000001442b2de0 r15=00000001442b2d50 iopl=0 nv up ei ng nz na po cy cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010287 bfv!IsGameRuntime+0x23ac5: 00000001`40565625 488b08 mov rcx,qword ptr [rax] ds:00010000`9a8b1dd0=???????????????? Resetting default scope EXCEPTION_RECORD: (.exr -1)ExceptionAddress: 0000000140565625 (bfv!IsGameRuntime+0x0000000000023ac5) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff PROCESS_NAME: bfv.exe READ_ADDRESS: ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff DETOURED_IMAGE: 1 ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD] STACK_TEXT: 00000000`00000000 00000000`00000000 memory_corruption!bfv+0x0 SYMBOL_NAME: memory_corruption!bfv STACK_COMMAND: ** Pseudo Context ** ManagedPseudo ** Value: 1f74f3f9c10 ** ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_256_c0000005_memory_corruption!bfv IMAGE_NAME: memory_corruption MODULE_NAME: memory_corruption OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {4d1fd1d9-185c-71f8-8d1e-8f9883946e31} Followup: MachineOwner ---------