MDUMP file as of 11/7/24: ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.015 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.063 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 42 Microsoft (R) Windows Debugger Version 10.0.27725.1000 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Program Files (x86)\Steam\steamapps\common\GUILTY GEAR Xrd -REVELATOR-\Binaries\Win32\guiltygearxrd_2211_crash_2024_11_7T21_50_40C0.mdmp] Comment: '' User Mini Dump File: Only registers, stack and portions of memory are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Version 19045 MP (16 procs) Free x86 compatible Product: WinNt, suite: SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Debug session time: Thu Nov 7 13:50:41.000 2024 (UTC - 8:00) System Uptime: 10 days 3:57:07.999 Process Uptime: 0 days 3:11:47.000 ................................................................ ................................................................ This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr (3ecc.6c88): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v eax=00000001 ebx=00000000 ecx=00002a58 edx=00002a66 esi=76585f60 edi=12c805e8 eip=77b63f0c esp=0277ce68 ebp=0277ce74 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00200202 ntdll!NtGetContextThread+0xc: 77b63f0c c20800 ret 8 0:000> .ecxr eax=00000006 ebx=00000000 ecx=00002a58 edx=00002a66 esi=4e028f40 edi=00000000 eip=001427ba esp=0277f848 ebp=0277f860 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210202 GuiltyGearXrd!GetOutermost+0x900a: 001427ba 837e20ff cmp dword ptr [esi+20h],0FFFFFFFFh ds:002b:4e028f60=???????? 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 437 Key : Analysis.Elapsed.mSec Value: 790 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 359 Key : Analysis.Init.Elapsed.mSec Value: 7445 Key : Analysis.Memory.CommitPeak.Mb Value: 96 Key : Analysis.Version.DbgEng Value: 10.0.27725.1000 Key : Analysis.Version.Description Value: 10.2408.27.01 x86fre Key : Analysis.Version.Ext Value: 1.2408.27.1 Key : Failure.Bucket Value: INVALID_POINTER_READ_c0000005_GuiltyGearXrd.exe!Unknown Key : Failure.Hash Value: {9c520e2d-c27f-3003-e800-e0924a400453} Key : Timeline.OS.Boot.DeltaSec Value: 878227 Key : Timeline.Process.Start.DeltaSec Value: 11507 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 Key : WER.Process.Version Value: 1.0.10246.0 FILE_IN_CAB: guiltygearxrd_2211_crash_2024_11_7T21_50_40C0.mdmp COMMENT: CONTEXT: (.ecxr) eax=00000006 ebx=00000000 ecx=00002a58 edx=00002a66 esi=4e028f40 edi=00000000 eip=001427ba esp=0277f848 ebp=0277f860 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210202 GuiltyGearXrd!GetOutermost+0x900a: 001427ba 837e20ff cmp dword ptr [esi+20h],0FFFFFFFFh ds:002b:4e028f60=???????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 001427ba (GuiltyGearXrd!GetOutermost+0x0000900a) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 4e028f60 Attempt to read from address 4e028f60 PROCESS_NAME: GuiltyGearXrd.exe READ_ADDRESS: 4e028f60 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 4e028f60 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. 0277f860 0011f870 10fda200 1b697440 00002a66 GuiltyGearXrd!GetOutermost+0x900a 0277f8c0 00a198eb 0587ef9c 5443dac0 00000000 GuiltyGearXrd+0x6f870 0277f8e0 0011fe06 00000d9f d823a6e4 18b4b000 GuiltyGearXrd!Scaleform::Render::Matrix2x4::Prepend+0x176d1b 00000000 00000000 00000000 00000000 00000000 GuiltyGearXrd+0x6fe06 STACK_COMMAND: ~0s; .ecxr ; kb SYMBOL_NAME: GuiltyGearXrd+900a MODULE_NAME: GuiltyGearXrd IMAGE_NAME: GuiltyGearXrd.exe FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_GuiltyGearXrd.exe!Unknown OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x86 OSNAME: Windows 10 IMAGE_VERSION: 1.0.10246.0 FAILURE_ID_HASH: {9c520e2d-c27f-3003-e800-e0924a400453} Followup: MachineOwner ---------