*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 249
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11224
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 2630
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Timeline.OS.Boot.DeltaSec
Value: 88348
Key : Timeline.Process.Start.DeltaSec
Value: 2
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: ACValhalla (2).DMP
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS: 0
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 0000000000000000
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 0
FAULTING_THREAD: 00003eec
PROCESS_NAME: ACValhalla.exe
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
EXCEPTION_CODE_STR: 80000003
STACK_TEXT:
00000000`0014b658 00007ffb`d68e7226 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtProtectVirtualMemory+0x14
00000000`0014b660 00000000`1301ffb3 : 00000000`19fd8000 00000001`47108000 00000000`02550000 00000000`005aa7d0 : KERNELBASE!VirtualProtect+0x36
00000000`0014b6b0 00000000`19fd8000 : 00000001`47108000 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 : EMP!EMP+0x1efa3
00000000`0014b6b8 00000001`47108000 : 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 : 0x19fd8000
00000000`0014b6c0 00000000`02550000 : 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd : ACValhalla!AK::IAkStreamMgr::m_pStreamMgr+0x46fb98
00000000`0014b6c8 00000000`005aa7d0 : 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 : 0x2550000
00000000`0014b6d0 00000000`0014b6d8 : 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 : 0x5aa7d0
00000000`0014b6d8 00000000`00000000 : 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 00000000`1301fac0 : 0x14b6d8
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_NAME: emp+1efa3
MODULE_NAME: EMP
IMAGE_NAME: EMP.dll
FAILURE_BUCKET_ID: BREAKPOINT_80000003_EMP.dll!Unknown
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f3f98350-74ad-4eaa-fd47-553ee2a12331}
Followup: MachineOwner
---------
start end module name
00000000`13000000 00000000`13235000 EMP (export symbols) EMP.dll
00000001`40000000 00000001`61ebb000 ACValhalla (export symbols) ACValhalla.exe
00007ffb`3cb60000 00007ffb`3d1b7000 tobii_gameintegration_x64 (deferred)
00007ffb`5efc0000 00007ffb`5f41c000 d3dcompiler_47 (deferred)
00007ffb`a3d90000 00007ffb`a3e9a000 mfreadwrite (deferred)
00007ffb`a43b0000 00007ffb`a44ed000 gfsdk_aftermath_lib_x64 (deferred)
00007ffb`a9200000 00007ffb`a9249000 pdh (deferred)
00007ffb`abd60000 00007ffb`abd80000 D3D12 (deferred)
00007ffb`add40000 00007ffb`add4c000 VCRUNTIME140_1 (deferred)
00007ffb`add50000 00007ffb`add6b000 VCRUNTIME140 (deferred)
00007ffb`add70000 00007ffb`addfe000 msvcp140 (deferred)
00007ffb`b8490000 00007ffb`b872a000 comctl32 (deferred)
00007ffb`b87a0000 00007ffb`b8945000 GdiPlus (deferred)
00007ffb`bc310000 00007ffb`bc4de000 d3d9 (deferred)
00007ffb`c4b80000 00007ffb`c4bae000 uplay_r2_loader64 (deferred)
00007ffb`c4cf0000 00007ffb`c4d17000 winmm (deferred)
00007ffb`c6e50000 00007ffb`c6e75000 amd_ags_x64 (deferred)
00007ffb`cc180000 00007ffb`cc18a000 version (deferred)
00007ffb`cd430000 00007ffb`cd464000 RTWorkQ (deferred)
00007ffb`cd470000 00007ffb`cd62c000 mfplat (deferred)
00007ffb`ce050000 00007ffb`ce064000 wtsapi32 (deferred)
00007ffb`cf890000 00007ffb`cf897000 xinput9_1_0 (deferred)
00007ffb`d11e0000 00007ffb`d1271000 apphelp (deferred)
00007ffb`d4150000 00007ffb`d417f000 dwmapi (deferred)
00007ffb`d4720000 00007ffb`d4eb2000 windows_storage (deferred)
00007ffb`d4ec0000 00007ffb`d4ecd000 hid (deferred)
00007ffb`d4ed0000 00007ffb`d4ee2000 kernel_appcore (deferred)
00007ffb`d4f40000 00007ffb`d5033000 dxgi (deferred)
00007ffb`d56f0000 00007ffb`d5724000 rsaenh (deferred)
00007ffb`d5ae0000 00007ffb`d5b1b000 IPHLPAPI (deferred)
00007ffb`d6030000 00007ffb`d6048000 cryptsp (deferred)
00007ffb`d6050000 00007ffb`d605c000 CRYPTBASE (deferred)
00007ffb`d60e0000 00007ffb`d6110000 wldp (deferred)
00007ffb`d6270000 00007ffb`d6282000 msasn1 (deferred)
00007ffb`d6540000 00007ffb`d6572000 sspicli (deferred)
00007ffb`d6580000 00007ffb`d65ae000 userenv (deferred)
00007ffb`d65c0000 00007ffb`d65df000 profapi (deferred)
00007ffb`d6680000 00007ffb`d671d000 msvcp_win (deferred)
00007ffb`d6720000 00007ffb`d6876000 crypt32 (deferred)
00007ffb`d6880000 00007ffb`d6b52000 KERNELBASE (pdb symbols) C:\ProgramData\Dbg\sym\kernelbase.pdb\3A8F1E13C59E59072D268F31DB7E9E231\kernelbase.pdb
00007ffb`d6c10000 00007ffb`d6c92000 bcryptPrimitives (deferred)
00007ffb`d6ca0000 00007ffb`d6daf000 gdi32full (deferred)
00007ffb`d6db0000 00007ffb`d6dd7000 bcrypt (deferred)
00007ffb`d6de0000 00007ffb`d6e2e000 cfgmgr32 (deferred)
00007ffb`d6e30000 00007ffb`d6e52000 win32u (deferred)
00007ffb`d6e60000 00007ffb`d6ec9000 wintrust (deferred)
00007ffb`d6ed0000 00007ffb`d6fd0000 ucrtbase (deferred)
00007ffb`d6fd0000 00007ffb`d709d000 oleaut32 (deferred)
00007ffb`d70b0000 00007ffb`d714c000 sechost (deferred)
00007ffb`d7150000 00007ffb`d74a5000 combase (deferred)
00007ffb`d74d0000 00007ffb`d7502000 imm32 (deferred)
00007ffb`d7510000 00007ffb`d75ae000 msvcrt (deferred)
00007ffb`d76f0000 00007ffb`d779e000 advapi32 (deferred)
00007ffb`d78c0000 00007ffb`d79e5000 rpcrt4 (deferred)
00007ffb`d79f0000 00007ffb`d7a0d000 imagehlp (deferred)
00007ffb`d7aa0000 00007ffb`d7b4d000 SHCore (deferred)
00007ffb`d7d00000 00007ffb`d7ea1000 user32 (pdb symbols) C:\ProgramData\Dbg\sym\user32.pdb\B778230F766999847BC8B8E3441B2C211\user32.pdb
00007ffb`d7f90000 00007ffb`d83f8000 setupapi (deferred)
00007ffb`d8400000 00007ffb`d84bf000 kernel32 (pdb symbols) C:\ProgramData\Dbg\sym\kernel32.pdb\852705B866FD67C036EC2C9D81F65DD21\kernel32.pdb
00007ffb`d84c0000 00007ffb`d85ea000 ole32 (private pdb symbols) C:\ProgramData\Dbg\sym\ole32.pdb\DBF2992B2E0D91DB414EEE95383B84181\ole32.pdb
00007ffb`d85f0000 00007ffb`d865b000 ws2_32 (deferred)
00007ffb`d8660000 00007ffb`d86b5000 shlwapi (deferred)
00007ffb`d8720000 00007ffb`d8e64000 shell32 (deferred)
00007ffb`d8e70000 00007ffb`d8e9b000 gdi32 (deferred)
00007ffb`d8f90000 00007ffb`d9188000 ntdll (pdb symbols) C:\ProgramData\Dbg\sym\ntdll.pdb\CCC0E36120F424BE044DE630C3BD80C41\ntdll.pdb
# Child-SP RetAddr : Args to Child : Call Site
00 00000000`0014b658 00007ffb`d68e7226 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtProtectVirtualMemory+0x14
01 00000000`0014b660 00000000`1301ffb3 : 00000000`19fd8000 00000001`47108000 00000000`02550000 00000000`005aa7d0 : KERNELBASE!VirtualProtect+0x36
02 00000000`0014b6b0 00000000`19fd8000 : 00000001`47108000 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 : EMP!EMP+0x1efa3
03 00000000`0014b6b8 00000001`47108000 : 00000000`02550000 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 : 0x19fd8000
04 00000000`0014b6c0 00000000`02550000 : 00000000`005aa7d0 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd : ACValhalla!AK::IAkStreamMgr::m_pStreamMgr+0x46fb98
05 00000000`0014b6c8 00000000`005aa7d0 : 00000000`0014b6d8 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 : 0x2550000
06 00000000`0014b6d0 00000000`0014b6d8 : 00000000`00000000 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 : 0x5aa7d0
07 00000000`0014b6d8 00000000`00000000 : 00000000`c5e156bd 00000000`0014b7d0 00000000`1301fac0 00000000`1301fac0 : 0x14b6d8
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
Could not get address of nt!KdVersionBlock.
Could not get address of nt!KdVersionBlock.
unable to get nt!MmUserProbeAddress
0000000000305000 is not a thread object, interpreting as stack value...
Unable to get address of PsActiveProcessHead
TYPE mismatch for thread object at 0000000000305000
0:000> lmvm EMP
Browse full module list
start end module name
00000000`13000000 00000000`13235000 EMP (export symbols) EMP.dll
Loaded symbol image file: EMP.dll
Image path: C:\Program Files (x86)\Assassins Creed Valhalla\EMP.dll
Image name: EMP.dll
Browse all global symbols functions data
Timestamp: Sat Jul 18 16:47:30 2020 (5F12FD72)
CheckSum: 0023C895
ImageSize: 00235000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
0:000> .exr -1
ExceptionAddress: 0000000000000000
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 0
0:000> dps @ssp
00000000`00000000 ????????`????????
00000000`00000008 ????????`????????
00000000`00000010 ????????`????????
00000000`00000018 ????????`????????
00000000`00000020 ????????`????????
00000000`00000028 ????????`????????
00000000`00000030 ????????`????????
00000000`00000038 ????????`????????
00000000`00000040 ????????`????????
00000000`00000048 ????????`????????
00000000`00000050 ????????`????????
00000000`00000058 ????????`????????
00000000`00000060 ????????`????????
00000000`00000068 ????????`????????
00000000`00000070 ????????`????????
00000000`00000078 ????????`????????