Loading Dump File [C:\Users\slaye\Desktop\pcsx2-v1.7.3043-windows-64bit-AVX2-Qt\crash-2022-07-10-02-41-23-213.dmp] User Mini Dump File: Only registers, stack and portions of memory are available Symbol search path is: srv* Executable search path is: Windows 10 Version 19044 MP (16 procs) Free x64 Product: WinNt, suite: SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Debug session time: Sun Jul 10 02:41:23.000 2022 (UTC - 5:00) System Uptime: not available Process Uptime: 0 days 0:01:25.000 ................................................................ ................................................................ .......... This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (2bc0.d34): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v ntdll!NtGetContextThread+0x14: 00007ffb`6e4aeb74 c3 ret 0:004> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 3999 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 5606 Key : Analysis.Init.CPU.mSec Value: 1875 Key : Analysis.Init.Elapsed.mSec Value: 8031 Key : Analysis.Memory.CommitPeak.Mb Value: 225 Key : Timeline.Process.Start.DeltaSec Value: 85 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 Key : WER.Process.Version Value: 1.7.3064.0 NTGLOBALFLAG: 0 PROCESS_BAM_CURRENT_THROTTLED: 0 PROCESS_BAM_PREVIOUS_THROTTLED: 0 CONTEXT: (.ecxr) rax=0000000000000000 rbx=000000000008a604 rcx=000000000000000d rdx=00000000000dc33b rsi=0000000000000010 rdi=0000000000000001 rip=00007ff6940c9f77 rsp=00000055bdeff9c0 rbp=00000055bdeffc80 r8=000000000000000d r9=00007ff6d40d0000 r10=00000000000dc33b r11=00000000000dc254 r12=0000000000000000 r13=0000000000000200 r14=000000000ba171c0 r15=0000000000000001 iopl=0 nv up ei pl nz na po nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 pcsx2_qtx64_avx2+0x2f9f77: 00007ff6`940c9f77 4883c438 add rsp,38h Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ff6940c9f77 (pcsx2_qtx64_avx2+0x00000000002f9f77) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff PROCESS_NAME: pcsx2-qtx64-avx2.exe READ_ADDRESS: ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff IP_ON_HEAP: 00007ff6e4025e2b The fault address in not in any loaded module, please check your build's rebase log at \bin\build_logs\timebuild\ntrebase.log for module which may contain the address if it were loaded. FRAME_ONE_INVALID: 1 STACK_TEXT: 00000055`bdeff9c0 00007ff6`e4025e2b : 00000000`000dc254 00000000`00000010 00000000`000dc254 00000000`00000001 : pcsx2_qtx64_avx2+0x2f9f77 00000055`bdeffa00 00000000`000dc254 : 00000000`00000010 00000000`000dc254 00000000`00000001 00000000`00000010 : 0x00007ff6`e4025e2b 00000055`bdeffa08 00000000`00000010 : 00000000`000dc254 00000000`00000001 00000000`00000010 00000000`00000001 : 0xdc254 00000055`bdeffa10 00000000`000dc254 : 00000000`00000001 00000000`00000010 00000000`00000001 00000000`00000001 : 0x10 00000055`bdeffa18 00000000`00000001 : 00000000`00000010 00000000`00000001 00000000`00000001 00000000`0ba171c0 : 0xdc254 00000055`bdeffa20 00000000`00000010 : 00000000`00000001 00000000`00000001 00000000`0ba171c0 00000000`00000200 : 0x1 00000055`bdeffa28 00000000`00000001 : 00000000`00000001 00000000`0ba171c0 00000000`00000200 00000000`00000000 : 0x10 00000055`bdeffa30 00000000`00000001 : 00000000`0ba171c0 00000000`00000200 00000000`00000000 00007ff6`94c200c0 : 0x1 00000055`bdeffa38 00000000`0ba171c0 : 00000000`00000200 00000000`00000000 00007ff6`94c200c0 00007ff6`940e02ba : 0x1 00000055`bdeffa40 00000000`00000200 : 00000000`00000000 00007ff6`94c200c0 00007ff6`940e02ba 00000000`00000001 : 0xba171c0 00000055`bdeffa48 00000000`00000000 : 00007ff6`94c200c0 00007ff6`940e02ba 00000000`00000001 00000000`0ba103ec : 0x200 SYMBOL_NAME: pcsx2_qtx64_avx2+2f9f77 MODULE_NAME: pcsx2_qtx64_avx2 IMAGE_NAME: pcsx2-qtx64-avx2.exe STACK_COMMAND: ~4s ; .ecxr ; kb FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_pcsx2-qtx64-avx2.exe!Unknown OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 IMAGE_VERSION: 1.7.3064.0 FAILURE_ID_HASH: {0a56656b-6499-8374-5e0e-89558ae2cd49} Followup: MachineOwner ---------