DMP Analysis Failed to request MethodData, not in JIT code range MethodDesc: 08b018e0 Method Name: DomainBoundILStubClass.IL_STUB_PInvoke(Int32, PatcherYRpp.CoordStruct ByRef, Int32, IntPtr, IntPtr, PatcherYRpp.Bool, IntPtr) Class: 08906904 MethodTable: 08906958 mdToken: 06000000 Module: 089040d4 IsJitted: yes CodeAddr: 08b19b38 Transparency: Critical MethodDesc: 08b5c824 Method Name: PatcherYRpp.MapClass.DamageArea(PatcherYRpp.CoordStruct, Int32, PatcherYRpp.Pointer`1<PatcherYRpp.TechnoClass>, PatcherYRpp.Pointer`1<PatcherYRpp.WarheadTypeClass>, Boolean, PatcherYRpp.Pointer`1<PatcherYRpp.HouseClass>) Class: 08b3f604 MethodTable: 08b5c8a4 mdToken: 060002e8 Module: 0ef1c9cc IsJitted: yes CodeAddr: 08b19a10 Transparency: Critical *** WARNING: Unable to verify checksum for PatcherYRpp.dll MethodDesc: 08b590d4 Method Name: Extension.Ext.AnimExt.Explosion_Damage(Boolean, Boolean) Class: 08b3aadc MethodTable: 08b591d0 mdToken: 06000122 Module: 0f338bf8 IsJitted: yes CodeAddr: 08b190d8 Transparency: Critical *** WARNING: Unable to verify checksum for Extension.dll MethodDesc: 08b59164 Method Name: Extension.Ext.AnimExt.OnDamage() Class: 08b3aadc MethodTable: 08b591d0 mdToken: 0600012e Module: 0f338bf8 IsJitted: yes CodeAddr: 08b19098 Transparency: Critical MethodDesc: 0f337364 Method Name: ExtensionHooks.AnimExtHooks.AnimClass_Update_Explosion(DynamicPatcher.REGISTERS*) Class: 0f26df3c MethodTable: 0f337414 mdToken: 06000007 Module: 0ef14618 IsJitted: yes CodeAddr: 08b18fa0 Transparency: Critical *** WARNING: Unable to verify checksum for AnimExt.tmp MethodDesc: 0ef1ef5c Method Name: DynamicPatcher.HookInfo+<>c__DisplayClass37_0.<GetCallableDlg>b__0(IntPtr) Class: 0f267484 MethodTable: 0ef1ef74 mdToken: 06000143 Module: 089040d4 IsJitted: yes CodeAddr: 0f324380 Transparency: Critical Failed to request MethodData, not in JIT code range Failed to request MethodData, not in JIT code range MethodDesc: 0ef1ef5c Method Name: DynamicPatcher.HookInfo+<>c__DisplayClass37_0.<GetCallableDlg>b__0(IntPtr) Class: 0f267484 MethodTable: 0ef1ef74 mdToken: 06000143 Module: 089040d4 IsJitted: yes CodeAddr: 0f324380 Transparency: Critical Failed to request MethodData, not in JIT code range Failed to request MethodData, not in JIT code range
KEY_VALUES_STRING: 1
Key : AV.Dereference Value: NullPtr
Key : AV.Fault Value: Read
Key : Analysis.CPU.mSec Value: 7093
Key : Analysis.DebugAnalysisManager Value: Create
Key : Analysis.Elapsed.mSec Value: 9560
Key : Analysis.Init.CPU.mSec Value: 671
Key : Analysis.Init.Elapsed.mSec Value: 24623
Key : Analysis.Memory.CommitPeak.Mb Value: 111
Key : CLR.BuiltBy Value: NET48REL1LAST_C
Key : CLR.Engine Value: CLR
Key : CLR.Version Value: 4.8.4515.0
Key : Timeline.OS.Boot.DeltaSec Value: 1431
Key : Timeline.Process.Start.DeltaSec Value: 257
Key : WER.OS.Branch Value: co_release
Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version Value: 10.0.22000.1
Key : WER.Process.Version Value: 1.0.1.1
FILE_IN_CAB: extcrashdump.dmp
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS: 0
CONTEXT: (.ecxr) eax=0019cd60 ebx=16ee4220 ecx=000050dc edx=0019cd60 esi=24e7beb0 edi=00000000 eip=00442832 esp=0019ccf8 ebp=1be6c3b0 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210202 gamemd+0x42832: 00442832 8b17 mov edx,dword ptr [edi] ds:002b:00000000=???????? Resetting default scope
EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00442832 (gamemd+0x00042832) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000000 Attempt to read from address 00000000
PROCESS_NAME: gamemd.exe
READ_ADDRESS: 00000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000000
STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. 1be6c3b0 6358b846 17507940 0019cea8 63568373 gamemd+0x42832 0019cd78 63568373 17507940 0019cf64 0019cf64 Ares!Game_DialogFunc_Subtext_Propagate+0xf16 0019cea8 08b19ba3 00000000 16ee4220 00000001 Ares!DamageArea_CellSpread3+0x113 0019cef0 08b19ad0 1bb6bdf0 00000001 16ee4220 0x8b19ba3 0019cf50 08b1968e 1bb6bdf0 00000001 16ee4220 0x8b19ad0 0019d0fc 08b190bb 00000000 200f3150 0019d15c 0x8b1968e 0019d10c 08b19048 00000000 200f3150 00000000 0x8b190bb 0019d15c 0f3243a6 08d8ac20 00000000 00000000 0x8b19048 0019d180 0890d84e 0ee4ebb0 08bf7a38 0019fed8 0xf3243a6 0019d1a8 0f340014 0019d1b8 0019d1b8 00424538 0x890d84e ffffffff 0f3243a6 08d8aa94 00000000 00000000 0xf340014 0814d450 0890d84e 0ee4ebb0 00005042 0000aea8 0xf3243a6 0019d238 0ee703bb 0019d248 00000000 00423ac0 0x890d84e 08201448 0055b613 00000000 00000002 0019f0a8 0xee703bb 08201448 0055dca3 00000001 00000004 0019f0a8 gamemd+0x15b613 0000000a 756ffa00 000002b0 00000000 0019d2e8 gamemd+0x15dca3 00000000 00000000 00000000 00000000 00000000 KERNELBASE!ReleaseMutex+0x10
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_NAME: gamemd+42832
MODULE_NAME: gamemd
IMAGE_NAME: gamemd.exe
FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_gamemd.exe!Unknown
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x86
OSNAME: Windows 10
IMAGE_VERSION: 1.0.1.1
FAILURE_ID_HASH: {b3acfea6-6eb6-cc9e-abb0-96150d313caa}
Followup: MachineOwner ---------
DMP Analysis ubClass. IL_STUB_ PInvoke( Int32, PatcherYRpp. CoordStruct ByRef, Int32, IntPtr, IntPtr, PatcherYRpp.Bool, IntPtr) MapClass. DamageArea( PatcherYRpp. CoordStruct, Int32, PatcherYRpp. Pointer` 1<PatcherYRpp. TechnoClass> , PatcherYRpp. Pointer` 1<PatcherYRpp. WarheadTypeClas s>, Boolean, PatcherYRpp. Pointer` 1<PatcherYRpp. HouseClass> ) Ext.AnimExt. Explosion_ Damage( Boolean, Boolean) Ext.AnimExt. OnDamage( ) AnimExtHooks. AnimClass_ Update_ Explosion( DynamicPatcher. REGISTERS* ) HookInfo+ <>c__DisplayCla ss37_0. <GetCallableDlg >b__0(IntPtr) HookInfo+ <>c__DisplayCla ss37_0. <GetCallableDlg >b__0(IntPtr)
Failed to request MethodData, not in JIT code range
MethodDesc: 08b018e0
Method Name: DomainBoundILSt
Class: 08906904
MethodTable: 08906958
mdToken: 06000000
Module: 089040d4
IsJitted: yes
CodeAddr: 08b19b38
Transparency: Critical
MethodDesc: 08b5c824
Method Name: PatcherYRpp.
Class: 08b3f604
MethodTable: 08b5c8a4
mdToken: 060002e8
Module: 0ef1c9cc
IsJitted: yes
CodeAddr: 08b19a10
Transparency: Critical
*** WARNING: Unable to verify checksum for PatcherYRpp.dll
MethodDesc: 08b590d4
Method Name: Extension.
Class: 08b3aadc
MethodTable: 08b591d0
mdToken: 06000122
Module: 0f338bf8
IsJitted: yes
CodeAddr: 08b190d8
Transparency: Critical
*** WARNING: Unable to verify checksum for Extension.dll
MethodDesc: 08b59164
Method Name: Extension.
Class: 08b3aadc
MethodTable: 08b591d0
mdToken: 0600012e
Module: 0f338bf8
IsJitted: yes
CodeAddr: 08b19098
Transparency: Critical
MethodDesc: 0f337364
Method Name: ExtensionHooks.
Class: 0f26df3c
MethodTable: 0f337414
mdToken: 06000007
Module: 0ef14618
IsJitted: yes
CodeAddr: 08b18fa0
Transparency: Critical
*** WARNING: Unable to verify checksum for AnimExt.tmp
MethodDesc: 0ef1ef5c
Method Name: DynamicPatcher.
Class: 0f267484
MethodTable: 0ef1ef74
mdToken: 06000143
Module: 089040d4
IsJitted: yes
CodeAddr: 0f324380
Transparency: Critical
Failed to request MethodData, not in JIT code range
Failed to request MethodData, not in JIT code range
MethodDesc: 0ef1ef5c
Method Name: DynamicPatcher.
Class: 0f267484
MethodTable: 0ef1ef74
mdToken: 06000143
Module: 089040d4
IsJitted: yes
CodeAddr: 0f324380
Transparency: Critical
Failed to request MethodData, not in JIT code range
Failed to request MethodData, not in JIT code range
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 7093
Key : Analysis. DebugAnalysisMa nager
Value: Create
Key : Analysis. Elapsed. mSec
Value: 9560
Key : Analysis. Init.CPU. mSec
Value: 671
Key : Analysis. Init.Elapsed. mSec
Value: 24623
Key : Analysis. Memory. CommitPeak. Mb
Value: 111
Key : CLR.BuiltBy
Value: NET48REL1LAST_C
Key : CLR.Engine
Value: CLR
Key : CLR.Version
Value: 4.8.4515.0
Key : Timeline. OS.Boot. DeltaSec
Value: 1431
Key : Timeline. Process. Start.DeltaSec
Value: 257
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp 04T16:28: 00Z
Value: 2021-06-
Key : WER.OS.Version
Value: 10.0.22000.1
Key : WER.Process.Version
Value: 1.0.1.1
FILE_IN_CAB: extcrashdump.dmp
NTGLOBALFLAG: 0
PROCESS_ BAM_CURRENT_ THROTTLED: 0
PROCESS_ BAM_PREVIOUS_ THROTTLED: 0
APPLICATION_ VERIFIER_ FLAGS: 0
CONTEXT: (.ecxr) 00000000= ??????? ?
eax=0019cd60 ebx=16ee4220 ecx=000050dc edx=0019cd60 esi=24e7beb0 edi=00000000
eip=00442832 esp=0019ccf8 ebp=1be6c3b0 iopl=0 nv up ei pl nz na po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210202
gamemd+0x42832:
00442832 8b17 mov edx,dword ptr [edi] ds:002b:
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00442832 (gamemd+0x00042832)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000000
Attempt to read from address 00000000
PROCESS_NAME: gamemd.exe
READ_ADDRESS: 00000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_ PARAMETER1: 00000000
EXCEPTION_ PARAMETER2: 00000000
STACK_TEXT: DialogFunc_ Subtext_ Propagate+ 0xf16 _CellSpread3+ 0x113 ReleaseMutex+ 0x10
WARNING: Stack unwind information not available. Following frames may be wrong.
1be6c3b0 6358b846 17507940 0019cea8 63568373 gamemd+0x42832
0019cd78 63568373 17507940 0019cf64 0019cf64 Ares!Game_
0019cea8 08b19ba3 00000000 16ee4220 00000001 Ares!DamageArea
0019cef0 08b19ad0 1bb6bdf0 00000001 16ee4220 0x8b19ba3
0019cf50 08b1968e 1bb6bdf0 00000001 16ee4220 0x8b19ad0
0019d0fc 08b190bb 00000000 200f3150 0019d15c 0x8b1968e
0019d10c 08b19048 00000000 200f3150 00000000 0x8b190bb
0019d15c 0f3243a6 08d8ac20 00000000 00000000 0x8b19048
0019d180 0890d84e 0ee4ebb0 08bf7a38 0019fed8 0xf3243a6
0019d1a8 0f340014 0019d1b8 0019d1b8 00424538 0x890d84e
ffffffff 0f3243a6 08d8aa94 00000000 00000000 0xf340014
0814d450 0890d84e 0ee4ebb0 00005042 0000aea8 0xf3243a6
0019d238 0ee703bb 0019d248 00000000 00423ac0 0x890d84e
08201448 0055b613 00000000 00000002 0019f0a8 0xee703bb
08201448 0055dca3 00000001 00000004 0019f0a8 gamemd+0x15b613
0000000a 756ffa00 000002b0 00000000 0019d2e8 gamemd+0x15dca3
00000000 00000000 00000000 00000000 00000000 KERNELBASE!
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_NAME: gamemd+42832
MODULE_NAME: gamemd
IMAGE_NAME: gamemd.exe
FAILURE_BUCKET_ID: NULL_POINTER_ READ_c0000005_ gamemd. exe!Unknown
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x86
OSNAME: Windows 10
IMAGE_VERSION: 1.0.1.1
FAILURE_ID_HASH: {b3acfea6- 6eb6-cc9e- abb0-96150d313c aa}
Followup: MachineOwner
---------