DMP Analysis Failed to request MethodData, not in JIT code range MethodDesc: 08b018e0 Method Name: DomainBoundILStubClass.IL_STUB_PInvoke(Int32, PatcherYRpp.CoordStruct ByRef, Int32, IntPtr, IntPtr, PatcherYRpp.Bool, IntPtr) Class: 08906904 MethodTable: 08906958 mdToken: 06000000 Module: 089040d4 IsJitted: yes CodeAddr: 08b19b38 Transparency: Critical MethodDesc: 08b5c824 Method Name: PatcherYRpp.MapClass.DamageArea(PatcherYRpp.CoordStruct, Int32, PatcherYRpp.Pointer`1, PatcherYRpp.Pointer`1, Boolean, PatcherYRpp.Pointer`1) Class: 08b3f604 MethodTable: 08b5c8a4 mdToken: 060002e8 Module: 0ef1c9cc IsJitted: yes CodeAddr: 08b19a10 Transparency: Critical *** WARNING: Unable to verify checksum for PatcherYRpp.dll MethodDesc: 08b590d4 Method Name: Extension.Ext.AnimExt.Explosion_Damage(Boolean, Boolean) Class: 08b3aadc MethodTable: 08b591d0 mdToken: 06000122 Module: 0f338bf8 IsJitted: yes CodeAddr: 08b190d8 Transparency: Critical *** WARNING: Unable to verify checksum for Extension.dll MethodDesc: 08b59164 Method Name: Extension.Ext.AnimExt.OnDamage() Class: 08b3aadc MethodTable: 08b591d0 mdToken: 0600012e Module: 0f338bf8 IsJitted: yes CodeAddr: 08b19098 Transparency: Critical MethodDesc: 0f337364 Method Name: ExtensionHooks.AnimExtHooks.AnimClass_Update_Explosion(DynamicPatcher.REGISTERS*) Class: 0f26df3c MethodTable: 0f337414 mdToken: 06000007 Module: 0ef14618 IsJitted: yes CodeAddr: 08b18fa0 Transparency: Critical *** WARNING: Unable to verify checksum for AnimExt.tmp MethodDesc: 0ef1ef5c Method Name: DynamicPatcher.HookInfo+<>c__DisplayClass37_0.b__0(IntPtr) Class: 0f267484 MethodTable: 0ef1ef74 mdToken: 06000143 Module: 089040d4 IsJitted: yes CodeAddr: 0f324380 Transparency: Critical Failed to request MethodData, not in JIT code range Failed to request MethodData, not in JIT code range MethodDesc: 0ef1ef5c Method Name: DynamicPatcher.HookInfo+<>c__DisplayClass37_0.b__0(IntPtr) Class: 0f267484 MethodTable: 0ef1ef74 mdToken: 06000143 Module: 089040d4 IsJitted: yes CodeAddr: 0f324380 Transparency: Critical Failed to request MethodData, not in JIT code range Failed to request MethodData, not in JIT code range KEY_VALUES_STRING: 1 Key : AV.Dereference Value: NullPtr Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 7093 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 9560 Key : Analysis.Init.CPU.mSec Value: 671 Key : Analysis.Init.Elapsed.mSec Value: 24623 Key : Analysis.Memory.CommitPeak.Mb Value: 111 Key : CLR.BuiltBy Value: NET48REL1LAST_C Key : CLR.Engine Value: CLR Key : CLR.Version Value: 4.8.4515.0 Key : Timeline.OS.Boot.DeltaSec Value: 1431 Key : Timeline.Process.Start.DeltaSec Value: 257 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 Key : WER.Process.Version Value: 1.0.1.1 FILE_IN_CAB: extcrashdump.dmp NTGLOBALFLAG: 0 PROCESS_BAM_CURRENT_THROTTLED: 0 PROCESS_BAM_PREVIOUS_THROTTLED: 0 APPLICATION_VERIFIER_FLAGS: 0 CONTEXT: (.ecxr) eax=0019cd60 ebx=16ee4220 ecx=000050dc edx=0019cd60 esi=24e7beb0 edi=00000000 eip=00442832 esp=0019ccf8 ebp=1be6c3b0 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210202 gamemd+0x42832: 00442832 8b17 mov edx,dword ptr [edi] ds:002b:00000000=???????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00442832 (gamemd+0x00042832) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000000 Attempt to read from address 00000000 PROCESS_NAME: gamemd.exe READ_ADDRESS: 00000000 ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000000 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. 1be6c3b0 6358b846 17507940 0019cea8 63568373 gamemd+0x42832 0019cd78 63568373 17507940 0019cf64 0019cf64 Ares!Game_DialogFunc_Subtext_Propagate+0xf16 0019cea8 08b19ba3 00000000 16ee4220 00000001 Ares!DamageArea_CellSpread3+0x113 0019cef0 08b19ad0 1bb6bdf0 00000001 16ee4220 0x8b19ba3 0019cf50 08b1968e 1bb6bdf0 00000001 16ee4220 0x8b19ad0 0019d0fc 08b190bb 00000000 200f3150 0019d15c 0x8b1968e 0019d10c 08b19048 00000000 200f3150 00000000 0x8b190bb 0019d15c 0f3243a6 08d8ac20 00000000 00000000 0x8b19048 0019d180 0890d84e 0ee4ebb0 08bf7a38 0019fed8 0xf3243a6 0019d1a8 0f340014 0019d1b8 0019d1b8 00424538 0x890d84e ffffffff 0f3243a6 08d8aa94 00000000 00000000 0xf340014 0814d450 0890d84e 0ee4ebb0 00005042 0000aea8 0xf3243a6 0019d238 0ee703bb 0019d248 00000000 00423ac0 0x890d84e 08201448 0055b613 00000000 00000002 0019f0a8 0xee703bb 08201448 0055dca3 00000001 00000004 0019f0a8 gamemd+0x15b613 0000000a 756ffa00 000002b0 00000000 0019d2e8 gamemd+0x15dca3 00000000 00000000 00000000 00000000 00000000 KERNELBASE!ReleaseMutex+0x10 STACK_COMMAND: ~0s; .ecxr ; kb SYMBOL_NAME: gamemd+42832 MODULE_NAME: gamemd IMAGE_NAME: gamemd.exe FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_gamemd.exe!Unknown OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x86 OSNAME: Windows 10 IMAGE_VERSION: 1.0.1.1 FAILURE_ID_HASH: {b3acfea6-6eb6-cc9e-abb0-96150d313caa} Followup: MachineOwner ---------