*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 249
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 11224
    Key  : Analysis.IO.Other.Mb
    Value: 1
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 1
    Key  : Analysis.Init.CPU.mSec
    Value: 93
    Key  : Analysis.Init.Elapsed.mSec
    Value: 2630
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85
    Key  : Timeline.OS.Boot.DeltaSec
    Value: 88348
    Key  : Timeline.Process.Start.DeltaSec
    Value: 2
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
FILE_IN_CAB:  ACValhalla (2).DMP
NTGLOBALFLAG:  0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS:  0
EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 0000000000000000
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 0
FAULTING_THREAD:  00003eec
PROCESS_NAME:  ACValhalla.exe
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION}  Breakpoint  A breakpoint has been reached.
EXCEPTION_CODE_STR:  80000003
STACK_TEXT: 
00000000`0014b658 00007ffb`d68e7226     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtProtectVirtualMemory+0x14
00000000`0014b660 00000000`1301ffb3     : 00000000`19fd8000 00000001`47108000 00000000`02550000 00000000`005aa7d0 : KERNELBASE!VirtualProtect+0x36
00000000`0014b6b0 00000000`19fd8000     : 00000001`47108000 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 : EMP!EMP+0x1efa3
00000000`0014b6b8 00000001`47108000     : 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 : 0x19fd8000
00000000`0014b6c0 00000000`02550000     : 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd : ACValhalla!AK::IAkStreamMgr::m_pStreamMgr+0x46fb98
00000000`0014b6c8 00000000`005aa7d0     : 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 : 0x2550000
00000000`0014b6d0 00000000`0014b6d8     : 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 : 0x5aa7d0
00000000`0014b6d8 00000000`00000000     : 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 00000000`1301fac0 : 0x14b6d8
STACK_COMMAND:  ~0s; .ecxr ; kb
SYMBOL_NAME:  emp+1efa3
MODULE_NAME: EMP
IMAGE_NAME:  EMP.dll
FAILURE_BUCKET_ID:  BREAKPOINT_80000003_EMP.dll!Unknown
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f3f98350-74ad-4eaa-fd47-553ee2a12331}
Followup:     MachineOwner
---------
start             end                 module name
00000000`13000000 00000000`13235000   EMP        (export symbols)       EMP.dll
00000001`40000000 00000001`61ebb000   ACValhalla   (export symbols)       ACValhalla.exe
00007ffb`3cb60000 00007ffb`3d1b7000   tobii_gameintegration_x64   (deferred)             
00007ffb`5efc0000 00007ffb`5f41c000   d3dcompiler_47   (deferred)             
00007ffb`a3d90000 00007ffb`a3e9a000   mfreadwrite   (deferred)             
00007ffb`a43b0000 00007ffb`a44ed000   gfsdk_aftermath_lib_x64   (deferred)             
00007ffb`a9200000 00007ffb`a9249000   pdh        (deferred)             
00007ffb`abd60000 00007ffb`abd80000   D3D12      (deferred)             
00007ffb`add40000 00007ffb`add4c000   VCRUNTIME140_1   (deferred)             
00007ffb`add50000 00007ffb`add6b000   VCRUNTIME140   (deferred)             
00007ffb`add70000 00007ffb`addfe000   msvcp140   (deferred)             
00007ffb`b8490000 00007ffb`b872a000   comctl32   (deferred)             
00007ffb`b87a0000 00007ffb`b8945000   GdiPlus    (deferred)             
00007ffb`bc310000 00007ffb`bc4de000   d3d9       (deferred)             
00007ffb`c4b80000 00007ffb`c4bae000   uplay_r2_loader64   (deferred)             
00007ffb`c4cf0000 00007ffb`c4d17000   winmm      (deferred)             
00007ffb`c6e50000 00007ffb`c6e75000   amd_ags_x64   (deferred)             
00007ffb`cc180000 00007ffb`cc18a000   version    (deferred)             
00007ffb`cd430000 00007ffb`cd464000   RTWorkQ    (deferred)             
00007ffb`cd470000 00007ffb`cd62c000   mfplat     (deferred)             
00007ffb`ce050000 00007ffb`ce064000   wtsapi32   (deferred)             
00007ffb`cf890000 00007ffb`cf897000   xinput9_1_0   (deferred)             
00007ffb`d11e0000 00007ffb`d1271000   apphelp    (deferred)             
00007ffb`d4150000 00007ffb`d417f000   dwmapi     (deferred)             
00007ffb`d4720000 00007ffb`d4eb2000   windows_storage   (deferred)             
00007ffb`d4ec0000 00007ffb`d4ecd000   hid        (deferred)             
00007ffb`d4ed0000 00007ffb`d4ee2000   kernel_appcore   (deferred)             
00007ffb`d4f40000 00007ffb`d5033000   dxgi       (deferred)             
00007ffb`d56f0000 00007ffb`d5724000   rsaenh     (deferred)             
00007ffb`d5ae0000 00007ffb`d5b1b000   IPHLPAPI   (deferred)             
00007ffb`d6030000 00007ffb`d6048000   cryptsp    (deferred)             
00007ffb`d6050000 00007ffb`d605c000   CRYPTBASE   (deferred)             
00007ffb`d60e0000 00007ffb`d6110000   wldp       (deferred)             
00007ffb`d6270000 00007ffb`d6282000   msasn1     (deferred)             
00007ffb`d6540000 00007ffb`d6572000   sspicli    (deferred)             
00007ffb`d6580000 00007ffb`d65ae000   userenv    (deferred)             
00007ffb`d65c0000 00007ffb`d65df000   profapi    (deferred)             
00007ffb`d6680000 00007ffb`d671d000   msvcp_win   (deferred)             
00007ffb`d6720000 00007ffb`d6876000   crypt32    (deferred)             
00007ffb`d6880000 00007ffb`d6b52000   KERNELBASE   (pdb symbols)          C:\ProgramData\Dbg\sym\kernelbase.pdb\3A8F1E13C59E59072D268F31DB7E9E231\kernelbase.pdb
00007ffb`d6c10000 00007ffb`d6c92000   bcryptPrimitives   (deferred)             
00007ffb`d6ca0000 00007ffb`d6daf000   gdi32full   (deferred)             
00007ffb`d6db0000 00007ffb`d6dd7000   bcrypt     (deferred)             
00007ffb`d6de0000 00007ffb`d6e2e000   cfgmgr32   (deferred)             
00007ffb`d6e30000 00007ffb`d6e52000   win32u     (deferred)             
00007ffb`d6e60000 00007ffb`d6ec9000   wintrust   (deferred)             
00007ffb`d6ed0000 00007ffb`d6fd0000   ucrtbase   (deferred)             
00007ffb`d6fd0000 00007ffb`d709d000   oleaut32   (deferred)             
00007ffb`d70b0000 00007ffb`d714c000   sechost    (deferred)             
00007ffb`d7150000 00007ffb`d74a5000   combase    (deferred)             
00007ffb`d74d0000 00007ffb`d7502000   imm32      (deferred)             
00007ffb`d7510000 00007ffb`d75ae000   msvcrt     (deferred)             
00007ffb`d76f0000 00007ffb`d779e000   advapi32   (deferred)             
00007ffb`d78c0000 00007ffb`d79e5000   rpcrt4     (deferred)             
00007ffb`d79f0000 00007ffb`d7a0d000   imagehlp   (deferred)             
00007ffb`d7aa0000 00007ffb`d7b4d000   SHCore     (deferred)             
00007ffb`d7d00000 00007ffb`d7ea1000   user32     (pdb symbols)          C:\ProgramData\Dbg\sym\user32.pdb\B778230F766999847BC8B8E3441B2C211\user32.pdb
00007ffb`d7f90000 00007ffb`d83f8000   setupapi   (deferred)             
00007ffb`d8400000 00007ffb`d84bf000   kernel32   (pdb symbols)          C:\ProgramData\Dbg\sym\kernel32.pdb\852705B866FD67C036EC2C9D81F65DD21\kernel32.pdb
00007ffb`d84c0000 00007ffb`d85ea000   ole32      (private pdb symbols)  C:\ProgramData\Dbg\sym\ole32.pdb\DBF2992B2E0D91DB414EEE95383B84181\ole32.pdb
00007ffb`d85f0000 00007ffb`d865b000   ws2_32     (deferred)             
00007ffb`d8660000 00007ffb`d86b5000   shlwapi    (deferred)             
00007ffb`d8720000 00007ffb`d8e64000   shell32    (deferred)             
00007ffb`d8e70000 00007ffb`d8e9b000   gdi32      (deferred)             
00007ffb`d8f90000 00007ffb`d9188000   ntdll      (pdb symbols)          C:\ProgramData\Dbg\sym\ntdll.pdb\CCC0E36120F424BE044DE630C3BD80C41\ntdll.pdb
 # Child-SP          RetAddr               : Args to Child                                                           : Call Site
00 00000000`0014b658 00007ffb`d68e7226     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtProtectVirtualMemory+0x14
01 00000000`0014b660 00000000`1301ffb3     : 00000000`19fd8000 00000001`47108000 00000000`02550000 00000000`005aa7d0 : KERNELBASE!VirtualProtect+0x36
02 00000000`0014b6b0 00000000`19fd8000     : 00000001`47108000 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 : EMP!EMP+0x1efa3
03 00000000`0014b6b8 00000001`47108000     : 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 : 0x19fd8000
04 00000000`0014b6c0 00000000`02550000     : 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd : ACValhalla!AK::IAkStreamMgr::m_pStreamMgr+0x46fb98
05 00000000`0014b6c8 00000000`005aa7d0     : 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 : 0x2550000
06 00000000`0014b6d0 00000000`0014b6d8     : 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 : 0x5aa7d0
07 00000000`0014b6d8 00000000`00000000     : 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 00000000`1301fac0 : 0x14b6d8
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
Could not get address of nt!KdVersionBlock.
Could not get address of nt!KdVersionBlock.
unable to get nt!MmUserProbeAddress
0000000000305000 is not a thread object, interpreting as stack value...
Unable to get address of PsActiveProcessHead
TYPE mismatch for thread object at 0000000000305000
0:000> lmvm EMP
Browse full module list
start             end                 module name
00000000`13000000 00000000`13235000   EMP        (export symbols)       EMP.dll
    Loaded symbol image file: EMP.dll
    Image path: C:\Program Files (x86)\Assassins Creed Valhalla\EMP.dll
    Image name: EMP.dll
    Browse all global symbols  functions  data
    Timestamp:        Sat Jul 18 16:47:30 2020 (5F12FD72)
    CheckSum:         0023C895
    ImageSize:        00235000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
0:000> .exr -1
ExceptionAddress: 0000000000000000
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 0
0:000> dps @ssp
00000000`00000000  ????????`????????
00000000`00000008  ????????`????????
00000000`00000010  ????????`????????
00000000`00000018  ????????`????????
00000000`00000020  ????????`????????
00000000`00000028  ????????`????????
00000000`00000030  ????????`????????
00000000`00000038  ????????`????????
00000000`00000040  ????????`????????
00000000`00000048  ????????`????????
00000000`00000050  ????????`????????
00000000`00000058  ????????`????????
00000000`00000060  ????????`????????
00000000`00000068  ????????`????????
00000000`00000070  ????????`????????
00000000`00000078  ????????`????????