Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Program Files (x86)\Origin Games\Apex\Crashpad\db\ee758610-0fc9-498c-92ef-6c121406d0f7.dmp] User Mini Dump File: Only registers, stack and portions of memory are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Version 22000 MP (20 procs) Free x64 Product: WinNt, suite: SingleUserTS Personal Edition build lab: 22000.1.amd64fre.co_release.210604-1628 Machine Name: Debug session time: Mon Apr 18 22:16:51.000 2022 (UTC + 9:00) System Uptime: not available Process Uptime: 0 days 0:51:54.000 ................................................................ ................................................................ ............................. This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (cf3c.5a80): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v ntdll!NtWaitForSingleObject+0x14: 00007ffc`d9b637d4 c3 ret 0:015> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* KEY_VALUES_STRING: 1 Key : AV.Fault Value: Write Key : Analysis.CPU.mSec Value: 4296 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 10206 Key : Analysis.Init.CPU.mSec Value: 109 Key : Analysis.Init.Elapsed.mSec Value: 8117 Key : Analysis.Memory.CommitPeak.Mb Value: 245 Key : Timeline.Process.Start.DeltaSec Value: 3114 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 Key : WER.Process.Version Value: 1.0.0.0 FILE_IN_CAB: ee758610-0fc9-498c-92ef-6c121406d0f7.dmp CONTEXT: (.ecxr) rax=0000000000000000 rbx=00007ff6ae048720 rcx=0000000000000000 rdx=00007ff6ae048710 rsi=00007ff6ae048718 rdi=ffffffffffffff00 rip=00007ff6a2ae761a rsp=000000bc7905fc10 rbp=0000000000000040 r8=00007ff6a26d0000 r9=ffffffffffffffff r10=0000000000000000 r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000300 r14=00000000ffffffff r15=0000000000000006 iopl=0 nv up ei pl zr na po nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 r5apex+0x41761a: 00007ff6`a2ae761a 488b442430 mov rax,qword ptr [rsp+30h] ss:000000bc`7905fc40=00007ff6ae048710 Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ff6a2ae761a (r5apex+0x000000000041761a) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: ffffffffffffff80 Attempt to write to address ffffffffffffff80 PROCESS_NAME: r5apex.exe WRITE_ADDRESS: ffffffffffffff80 ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p Q B %s B EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: ffffffffffffff80 STACK_TEXT: 000000bc`7905fc10 00007ff6`a2ae7ca5 : 00007ff6`00000000 00000000`00000000 ffffffff`ffffffff ffffffff`ffffffff : r5apex+0x41761a 000000bc`7905fcc0 00007ffc`d88354e0 : 00000000`00000000 00000281`490c87f8 00007ff6`ae048730 00000000`00000006 : r5apex+0x417ca5 000000bc`7905fd60 00007ffc`d9ac485b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x10 000000bc`7905fd90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x2b SYMBOL_NAME: r5apex+41761a MODULE_NAME: r5apex IMAGE_NAME: r5apex.exe STACK_COMMAND: ~15s; .ecxr ; kb FAILURE_BUCKET_ID: INVALID_POINTER_WRITE_c0000005_r5apex.exe!Unknown OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 IMAGE_VERSION: 1.0.0.0 FAILURE_ID_HASH: {cb5de656-2f3c-d18a-ace3-6100430b69f4} Followup: MachineOwner --------- 0:015> .ecxr rax=0000000000000000 rbx=00007ff6ae048720 rcx=0000000000000000 rdx=00007ff6ae048710 rsi=00007ff6ae048718 rdi=ffffffffffffff00 rip=00007ff6a2ae761a rsp=000000bc7905fc10 rbp=0000000000000040 r8=00007ff6a26d0000 r9=ffffffffffffffff r10=0000000000000000 r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000300 r14=00000000ffffffff r15=0000000000000006 iopl=0 nv up ei pl zr na po nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 r5apex+0x41761a: 00007ff6`a2ae761a 488b442430 mov rax,qword ptr [rsp+30h] ss:000000bc`7905fc40=00007ff6ae048710 0:015> .exr -1 ExceptionAddress: 00007ff6a2ae761a (r5apex+0x000000000041761a) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: ffffffffffffff80 Attempt to write to address ffffffffffffff80