game crash as of 10/29/2024: ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.063 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 42 Microsoft (R) Windows Debugger Version 10.0.27704.1001 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Program Files (x86)\Steam\steamapps\common\GUILTY GEAR Xrd -REVELATOR-\Binaries\Win32\guiltygearxrd_2211_crash_2024_10_29T21_2_23C0.mdmp] Comment: '' User Mini Dump File: Only registers, stack and portions of memory are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Version 19045 MP (16 procs) Free x86 compatible Product: WinNt, suite: SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Debug session time: Tue Oct 29 14:02:23.000 2024 (UTC - 7:00) System Uptime: 1 days 3:08:46.320 Process Uptime: 0 days 3:40:06.000 ................................................................ ................................................................ This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr (4d94.4808): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v eax=00000001 ebx=00000000 ecx=00002a58 edx=00013a94 esi=76585f60 edi=05ae05e8 eip=77b63f0c esp=02efcda8 ebp=02efcdb4 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00200202 ntdll!NtGetContextThread+0xc: 77b63f0c c20800 ret 8 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 843 Key : Analysis.Elapsed.mSec Value: 3618 Key : Analysis.IO.Other.Mb Value: 4 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 15 Key : Analysis.Init.CPU.mSec Value: 281 Key : Analysis.Init.Elapsed.mSec Value: 46866 Key : Analysis.Memory.CommitPeak.Mb Value: 149 Key : Analysis.Version.DbgEng Value: 10.0.27704.1001 Key : Analysis.Version.Description Value: 10.2408.27.01 x86fre Key : Analysis.Version.Ext Value: 1.2408.27.1 Key : Failure.Bucket Value: INVALID_POINTER_READ_c0000005_GuiltyGearXrd.exe!Unknown Key : Failure.Hash Value: {9c520e2d-c27f-3003-e800-e0924a400453} Key : Timeline.OS.Boot.DeltaSec Value: 97726 Key : Timeline.Process.Start.DeltaSec Value: 13206 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 Key : WER.Process.Version Value: 1.0.10246.0 FILE_IN_CAB: guiltygearxrd_2211_crash_2024_10_29T21_2_23C0.mdmp COMMENT: CONTEXT: (.ecxr) eax=0000000a ebx=00000000 ecx=00002a58 edx=00013a94 esi=54d4ff00 edi=00000000 eip=007f27ba esp=02eff788 ebp=02eff7a0 iopl=0 nv up ei pl nz na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206 GuiltyGearXrd!GetOutermost+0x900a: 007f27ba 837e20ff cmp dword ptr [esi+20h],0FFFFFFFFh ds:002b:54d4ff20=???????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 007f27ba (GuiltyGearXrd!GetOutermost+0x0000900a) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 54d4ff20 Attempt to read from address 54d4ff20 PROCESS_NAME: GuiltyGearXrd.exe READ_ADDRESS: 54d4ff20 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 54d4ff20 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. 02eff7a0 007cf870 115fda00 55817800 00013a94 GuiltyGearXrd!GetOutermost+0x900a 02eff848 007cfe06 00001851 6e7727fd 18fc6800 GuiltyGearXrd+0x6f870 00000000 00000000 00000000 00000000 00000000 GuiltyGearXrd+0x6fe06 STACK_COMMAND: ~0s; .ecxr ; kb SYMBOL_NAME: GuiltyGearXrd+900a MODULE_NAME: GuiltyGearXrd IMAGE_NAME: GuiltyGearXrd.exe FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_GuiltyGearXrd.exe!Unknown OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x86 OSNAME: Windows 10 IMAGE_VERSION: 1.0.10246.0 FAILURE_ID_HASH: {9c520e2d-c27f-3003-e800-e0924a400453} Followup: MachineOwner --------- 0:000> .ecxr eax=0000000a ebx=00000000 ecx=00002a58 edx=00013a94 esi=54d4ff00 edi=00000000 eip=007f27ba esp=02eff788 ebp=02eff7a0 iopl=0 nv up ei pl nz na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206 GuiltyGearXrd!GetOutermost+0x900a: 007f27ba 837e20ff cmp dword ptr [esi+20h],0FFFFFFFFh ds:002b:54d4ff20=????????