Bonjour à tous!
voici la seule piste que j'ai pour comprendre d’où vient le problème sauf que cela m'est incompréhensible :
Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\****\AppData\Local\CrashDumps\ModernWarfare.exe.2032.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Debug session time: Fri Sep 17 11:02:15.000 2021 (UTC - 4:00)
System Uptime: not available
Process Uptime: 0 days 0:00:14.000
.............................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(7f0.25ac): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!RtlAllocateHeap+0x20:
00007ffe`81406ca0 817b10eeddeedd cmp dword ptr [rbx+10h],0DDEEDDEEh ds:00000000`00000010=????????
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
DEBUG_FLR_EXCEPTION_CODE(c0000374) and the ".exr -1" ExceptionCode(c0000005) don't match
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 936
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12491
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 52504
Key : Analysis.Memory.CommitPeak.Mb
Value: 339
Key : Timeline.Process.Start.DeltaSec
Value: 14
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
Key : WER.Process.Version
Value: 1.0.0.0
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS: 0
CONTEXT: (.ecxr)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000013
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000018
rip=00007ffe81406ca0 rsp=000000d98938ee90 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=000000000000000e
r11=000000d98938efe8 r12=0000000000000000 r13=000001f090a35590
r14=000001f090a014b0 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010204
ntdll!RtlAllocateHeap+0x20:
00007ffe`81406ca0 817b10eeddeedd cmp dword ptr [rbx+10h],0DDEEDDEEh ds:00000000`00000010=????????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ffe81406ca0 (ntdll!RtlAllocateHeap+0x0000000000000020)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
PROCESS_NAME: ModernWarfare.exe
READ_ADDRESS: 0000000000000010
ERROR_CODE: (NTSTATUS) 0xc0000005 - L'instruction 0x%p emploie l'adresse m moire 0x%p. L' tat de la m moire ne peut pas tre %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
ADDITIONAL_DEBUG_TEXT: Enable Pageheap/AutoVerifer ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
FAULTING_THREAD: 000025ac
STACK_TEXT:
00000000`00000000 00000000`00000000 heap_corruption!ModernWarfare.exe+0x0
STACK_COMMAND: ** Pseudo Context ** ManagedPseudo ** Value: ffffffff ** ; kb
SYMBOL_NAME: heap_corruption!ModernWarfare.exe
MODULE_NAME: heap_corruption
IMAGE_NAME: heap_corruption
FAILURE_BUCKET_ID: HEAP_CORRUPTION_c0000005_heap_corruption!ModernWarfare.exe
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b159f6c9-5b68-f749-20eb-3d94afbd085f}
Followup: MachineOwner
---------
y a t'il quelqu'un pour m'aider? svp!
|