(1358.138c): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!NtGetContextThread+0xa:
00007ff9`26d1151a c3 ret
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: kernelbase!gpServerNlsUserInfo ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 249
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17759
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 30
Key : Analysis.Init.CPU.mSec
Value: 92
Key : Analysis.Init.Elapsed.mSec
Value: 12365
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Timeline.Process.Start.DeltaSec
Value: 20
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2016-01-24T00:53:00Z
Key : WER.OS.Version
Value: 6.3.9600.18217
Key : WER.Process.Version
Value: 3.4.27.90
FILE_IN_CAB: minidump.dmp
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS: 0
CONTEXT: (.ecxr)
rax=0000000000000000 rbx=000000be52105100 rcx=000000be52105130
rdx=0000000000000000 rsi=000000be4f75ce80 rdi=000000be3ed70da0
rip=00007ff7188655e6 rsp=000000be3343d8f0 rbp=0000000000000000
r8=0000f7fcb22f66e8 r9=000000be3ed70da0 r10=00007ff926c857d0
r11=0000000000000000 r12=0000000000000001 r13=000000be34f7e600
r14=000000be52105050 r15=000000be3ed70da0
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
eu4+0xb955e6:
00007ff7`188655e6 8b9000010000 mov edx,dword ptr [rax+100h] ds:00000000`00000100=????????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ff7188655e6 (eu4+0x0000000000b955e6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000100
Attempt to read from address 0000000000000100
PROCESS_NAME: eu4.exe
READ_ADDRESS: 0000000000000100
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000100
IP_ON_HEAP: 000000000023ae24
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.
IP_IN_FREE_BLOCK: 23ae24
FRAME_ONE_INVALID: 1
STACK_TEXT:
000000be`3343d8f0 00000000`0023ae24 : 00007ff7`193910d3 000000be`34f7e600 000000be`335a47e0 ffffffff`fffffffe : eu4+0xb955e6
000000be`3343d8f8 00007ff7`193910d3 : 000000be`34f7e600 000000be`335a47e0 ffffffff`fffffffe 00000000`00000bb0 : 0x23ae24
000000be`3343d900 000000be`34f7e600 : 000000be`335a47e0 ffffffff`fffffffe 00000000`00000bb0 00000000`0023ae24 : eu4+0x16c10d3
000000be`3343d908 000000be`335a47e0 : ffffffff`fffffffe 00000000`00000bb0 00000000`0023ae24 00007ff7`182e1842 : 0x000000be`34f7e600
000000be`3343d910 ffffffff`fffffffe : 00000000`00000bb0 00000000`0023ae24 00007ff7`182e1842 000000be`52105100 : 0x000000be`335a47e0
000000be`3343d918 00000000`00000bb0 : 00000000`0023ae24 00007ff7`182e1842 000000be`52105100 00000000`00000002 : 0xffffffff`fffffffe
000000be`3343d920 00000000`0023ae24 : 00007ff7`182e1842 000000be`52105100 00000000`00000002 00000000`00000ba8 : 0xbb0
000000be`3343d928 00007ff7`182e1842 : 000000be`52105100 00000000`00000002 00000000`00000ba8 00000000`00000bb0 : 0x23ae24
000000be`3343d930 000000be`52105100 : 00000000`00000002 00000000`00000ba8 00000000`00000bb0 ffffffff`fffffffe : eu4+0x611842
000000be`3343d938 00000000`00000002 : 00000000`00000ba8 00000000`00000bb0 ffffffff`fffffffe 000000be`3343da48 : 0x000000be`52105100
000000be`3343d940 00000000`00000ba8 : 00000000`00000bb0 ffffffff`fffffffe 000000be`3343da48 00000000`00000000 : 0x2
000000be`3343d948 00000000`00000bb0 : ffffffff`fffffffe 000000be`3343da48 00000000`00000000 000000be`52105050 : 0xba8
000000be`3343d950 ffffffff`fffffffe : 000000be`3343da48 00000000`00000000 000000be`52105050 000000be`3343db40 : 0xbb0
000000be`3343d958 000000be`3343da48 : 00000000`00000000 000000be`52105050 000000be`3343db40 00007ff7`18b58f71 : 0xffffffff`fffffffe
000000be`3343d960 00000000`00000000 : 000000be`52105050 000000be`3343db40 00007ff7`18b58f71 000000be`52105050 : 0x000000be`3343da48
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_NAME: eu4+b955e6
MODULE_NAME: eu4
IMAGE_NAME: eu4.exe
FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_eu4.exe!Unknown
OS_VERSION: 6.3.9600.18217
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
IMAGE_VERSION: 1.0.0.0
FAILURE_ID_HASH: {d9950c93-bd9c-be90-3ef2-ad1b064d726c}
Followup: MachineOwner
---------