Resident Evil 4 menüde crash veriyor

İşletim sistemi
Windows 11
Eski orijinal sürüm ise kullanıcı adında Türkçe harfler varsa ş ğ ı ç gibi sorun yaşatabiliyor nadir de olsa. Mesela korsan RE Village Türkçe harf varsa açılmıyordu en son şuan ki durumunu bilmiyorum.

Remake olansa driver uyumsuzluğu yüzünden olabilir ben sorunsuz bitirdim oyunu GPU sürücü güncelle güncelse 1 eski sürüme geri dön.
 
Hatanın adı bile açıkçası dökümde görünmüyor, çok ilginç 😄 Muhtemelen STATUS_ACCESS_VIOLATION şeklinde çıkıyor ama kesin şekilde adı belirtilmemiş.

Merhaba.
Sorun direkt Resident Evil 4 kaynaklı oluşmuş.


Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.063 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 46

Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\hazar\AppData\Local\Temp\2e8cbade-de76-4eee-81d5-8241c4823916_2025_1122_0147.zip.2025_1122_0147.zip\MiniDump.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 26200 MP (12 procs) Free x64
Product: WinNt, suite: SingleUserTS Personal
Edition build lab: 26100.1.amd64fre.ge_release.240331-1435
Debug session time: Sat Nov 22 01:47:45.000 2025 (UTC + 3:00)
System Uptime: 0 days 10:18:38.713
Process Uptime: 0 days 0:02:05.000
................................................................
................................................................
..............
Loading unloaded module list
.........
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr
(48f0.f60): Access violation - code c0000005 (first/second chance not available)

+------------------------------------------------------------------------+
| This target supports Hardware-enforced Stack Protection. A HW based    |
| "Shadow Stack" may be available to assist in debugging and analysis.   |
| See aka.ms/userhsp for more info.                                      |
|                                                                        |
| dps @ssp                                                               |
|                                                                        |
+------------------------------------------------------------------------+

For analysis of this file, run !analyze -v
ntdll!NtWaitForSingleObject+0x14:
00007ffe`2fa21d44 c3              ret
0:044> !analyze -v
................................................................
................................................................
..............
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1921

    Key  : Analysis.Elapsed.mSec
    Value: 79523

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 95

    Key  : Analysis.Init.CPU.mSec
    Value: 2093

    Key  : Analysis.Init.Elapsed.mSec
    Value: 167187

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 138

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29457.1000

    Key  : Analysis.Version.Description
    Value: 10.2506.23.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2506.23.1

    Key  : Failure.Bucket
    Value: INVALID_POINTER_READ_c0000005_re4.exe!Unknown

    Key  : Failure.Exception.Code
    Value: 0xc0000005

    Key  : Failure.Exception.IP.Address
    Value: 0x1439e143a

    Key  : Failure.Exception.IP.Module
    Value: re4

    Key  : Failure.Exception.IP.Offset
    Value: 0x39e143a

    Key  : Failure.Hash
    Value: {05d7c589-504e-64cd-a733-6ee8b184b6a6}

    Key  : Failure.ProblemClass.Primary
    Value: INVALID_POINTER_READ

    Key  : Timeline.OS.Boot.DeltaSec
    Value: 37118

    Key  : Timeline.Process.Start.DeltaSec
    Value: 125

    Key  : WER.OS.Branch
    Value: ge_release

    Key  : WER.OS.Version
    Value: 10.0.26100.1

    Key  : WER.Process.Version
    Value: 6.2.26100.7171


FILE_IN_CAB:  MiniDump.dmp

NTGLOBALFLAG:  0

CONTEXT:  (.ecxr)
rax=000000002744ec30 rbx=0000000000000000 rcx=00000000377261c0
rdx=0000000000000000 rsi=00000000377261c0 rdi=000000002540b960
rip=00000001439e143a rsp=000000013854fd20 rbp=00000001426af130
 r8=0000000000000000  r9=0000000000000002 r10=7fffffffffffffff
r11=0204081020408103 r12=0000000000000020 r13=000000002540b960
r14=00000000000004dc r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
re4+0x39e143a:
00000001`439e143a f30f108a84000000 movss   xmm1,dword ptr [rdx+84h] ds:00000000`00000084=????????
Resetting default scope

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00000001439e143a (re4+0x00000000039e143a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000084
Attempt to read from address 0000000000000084

PROCESS_NAME:  re4.exe

READ_ADDRESS:  0000000000000084

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000084

IP_ON_STACK:
+0
00000001`3854fd50 d09819240000    rcr     byte ptr [rax+2419h],1

FRAME_ONE_INVALID: 1

STACK_TEXT:
00000001`3854fd20 00000001`3854fd50     : 00000001`43966c89 00000000`377261c0 00000001`426af130 00000000`377261c0 : re4+0x39e143a
00000001`3854fd28 00000001`43966c89     : 00000000`377261c0 00000001`426af130 00000000`377261c0 00000000`377261c0 : 0x00000001`3854fd50
00000001`3854fd30 00000000`377261c0     : 00000001`426af130 00000000`377261c0 00000000`377261c0 00000000`241998d0 : re4+0x3966c89
00000001`3854fd38 00000001`426af130     : 00000000`377261c0 00000000`377261c0 00000000`241998d0 00000002`00000003 : 0x377261c0
00000001`3854fd40 00000000`377261c0     : 00000000`377261c0 00000000`241998d0 00000002`00000003 00000000`00000000 : re4+0x26af130
00000001`3854fd48 00000000`377261c0     : 00000000`241998d0 00000002`00000003 00000000`00000000 00000000`241998d0 : 0x377261c0
00000001`3854fd50 00000000`241998d0     : 00000002`00000003 00000000`00000000 00000000`241998d0 00000002`00000000 : 0x377261c0
00000001`3854fd58 00000002`00000003     : 00000000`00000000 00000000`241998d0 00000002`00000000 00000000`00000000 : 0x241998d0
00000001`3854fd60 00000000`00000000     : 00000000`241998d0 00000002`00000000 00000000`00000000 00000000`2540b960 : 0x00000002`00000003


SYMBOL_NAME:  re4+39e143a

MODULE_NAME: re4

IMAGE_NAME:  re4.exe

STACK_COMMAND: dt ntdll!LdrpLastDllInitializer BaseDllName ; dt ntdll!LdrpFailureData ; ~44s; .ecxr ; kb

FAILURE_BUCKET_ID:  INVALID_POINTER_READ_c0000005_re4.exe!Unknown

OS_VERSION:  10.0.26100.1

BUILDLAB_STR:  ge_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

IMAGE_VERSION:  1.1.1.0

FAILURE_ID_HASH:  {05d7c589-504e-64cd-a733-6ee8b184b6a6}

Followup:     MachineOwner
---------

Çekirdek düzeyinde çalışan DLL'ler hataya dair işaret veriyor.

NVIDIA sürücüsüne at DLL'ler gördüm. Potansiyel olarak bundan kaynaklı bir sorun olabilir.

Kod:
Unloaded modules:
00007ffe`17850000 00007ffe`1789c000   steam_api64.dll
00007ffe`2a340000 00007ffe`2a354000   resourcepolicyclient.dll
00007ffe`18630000 00007ffe`1de65000   nvwgf2umx.dll
00007ffe`163c0000 00007ffe`16723000   NvMessageBus.dll
00007ffe`21e60000 00007ffe`25bf4000   nvgpucomp64.dll
00007ffe`21340000 00007ffe`2141e000   NvMemMapStoragex.dll
00007ffe`261f0000 00007ffe`262b4000   nvldumdx.dll
00007ffd`e21a0000 00007ffd`e2304000   dxilconv.dll
00007ffe`27070000 00007ffe`2707b000   avrt.dll

Halihazırda kurulu sürüm nedir?

Not: WinDbg ile açılabildiği için (.dmp) mavi/siyah ekran konusu var diye açıkçası giriştim. Process Monitor (.pml uzantılı) dosyalarının analizini bilmiyorum.
 

Technopat Haberler

Yeni konular

Geri
Yukarı