Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [REDACTED]
User Mini Dump File: Only registers, stack and portions of memory are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: SingleUserTS Personal
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Debug session time: Fri May 22 17:50:31.000 2020 (UTC + 2:00)
System Uptime: not available
Process Uptime: 0 days 0:56:37.000
................................................................
................................................................
................................................................
...........................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(3170.71c0): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!NtWaitForSingleObject+0x14:
00007ff8`0581c0f4 c3 ret
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** WARNING: Unable to verify timestamp for engine.dll
*** WARNING: Unable to verify timestamp for nvd3dumx.dll
*** WARNING: Unable to verify timestamp for GameAnalytics.dll
*** WARNING: Unable to verify timestamp for bass.dll
*** WARNING: Unable to verify timestamp for gmod.exe
*** WARNING: Unable to verify timestamp for libcef.dll
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Execute
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-NNS9ASN
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 68
Key : Analysis.Memory.CommitPeak.Mb
Value: 133
Key : Analysis.System
Value: CreateObject
Key : Timeline.Process.Start.DeltaSec
Value: 3397
ADDITIONAL_XML: 1
CONTEXT: (.ecxr)
rax=000001046d6bf6f0 rbx=000001046d6bf6f0 rcx=000001046d6bf6f0
rdx=0000000000000053 rsi=0000000000000000 rdi=0000000000000000
rip=000001046d6bf6f0 rsp=00000001d6f7b868 rbp=00000001d6f7b970
r8=0000000000000032 r9=000000000000003d r10=0000000000000000
r11=00000001d6f7b7a0 r12=000001046d6bff90 r13=000001046d6bff90
r14=000001046d67e560 r15=000001046d65a6d0
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
00000104`6d6bf6f0 b0ec mov al,0ECh
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 000001046d6bf6f0
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000008
Parameter[1]: 000001046d6bf6f0
Attempt to execute non-executable address 000001046d6bf6f0
PROCESS_NAME: gmod.exe
EXECUTE_ADDRESS: 1046d6bf6f0
FAILED_INSTRUCTION_ADDRESS:
+0
00000104`6d6bf6f0 b0ec mov al,0ECh
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 000001046d6bf6f0
IP_ON_HEAP: 000001046d6bf6f0
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.
STACK_TEXT:
00000001`d6f7b868 00007fff`ed407fba : 00000000`00000000 00000104`6d660a30 41b00000`00000000 00000000`00000000 : 0x00000104`6d6bf6f0
00000001`d6f7b870 00007ff8`04fbd46f : 00000104`f28dddd0 00000104`f28dddd0 00000000`00000000 00000104`f28dddf8 : TextInputFramework!CTextInputClientFreeThread::EditControlFocusChange+0x16a
00000001`d6f7bb40 00007ff8`04fc2fa7 : 00000000`00000000 00000104`a2c7b6e0 00000104`ad9ff270 00000000`00020274 : msctf!CInputContextAdapter::OnFocusChange+0x24f
00000001`d6f7c220 00007ff8`04fb45f6 : 00000000`00000000 00000104`6a91c610 00000104`6a91c610 00007ff8`057a4e77 : msctf!CInputContext::OnFocusChange+0x83
00000001`d6f7c260 00007ff8`04fb6022 : 00000104`6a91c610 00000000`00000000 00000000`00000000 00000001`d6f7c530 : msctf!CThreadInputMgr::_SetFocus+0x376
00000001`d6f7c3f0 00007ff8`04fb7c0f : 00000104`6a91c610 00000000`00000001 00000001`d6f7c530 00007fff`00000000 : msctf!CThreadInputMgr::AssociateFocus+0x1b2
00000001`d6f7c430 00007ff8`04fb747d : 00000104`6a7f7670 00000104`6a91c610 00000000`00030611 00000000`000000c0 : msctf!CicBridge::SetAssociate+0x6ff
00000001`d6f7c970 00007ff8`04fb720f : 00000104`6a7f7670 00007ff8`05799c42 00000000`00000000 00007ff8`05799c42 : msctf!CicBridge::AssociateFocus+0x20d
00000001`d6f7ca30 00007ff8`03d822a3 : 00000000`00020274 00000103`d6c29180 00000103`d6e5c220 00007fff`aabf0000 : msctf!CtfImeAssociateFocus+0x6f
00000001`d6f7ca80 00007ff8`03d88bb4 : 00000000`00020274 00000000`00030611 00000000`00020274 00000104`7c9afb60 : imm32!ImmSetActiveContext+0x4f3
00000001`d6f7caf0 00007fff`aac855da : 00007fff`aad85070 00000103`d6c1ab20 00000001`d6f7d468 00000000`00000000 : imm32!ImmAssociateContext+0x134
00000001`d6f7cb20 00007fff`aac8763c : 00007fff`aad85070 00000001`d6f7d219 00000001`d6f7d468 00002c35`ff8b2c7c : gameoverlayrenderer64!OverlayHookD3D3+0x1d39a
00000001`d6f7cb70 00007fff`aac867ad : 00007fff`aad85070 00000000`00000000 00000000`00000000 00000000`00000000 : gameoverlayrenderer64!OverlayHookD3D3+0x1f3fc
00000001`d6f7d1c0 00007fff`aac87d91 : 00000000`00000002 00000001`d6f7d468 00000000`00000001 00000000`00000000 : gameoverlayrenderer64!OverlayHookD3D3+0x1e56d
00000001`d6f7d280 00007ff8`03b337b6 : 00000001`d6c19000 00000000`00030000 00000103`d9965a60 00000000`00000000 : gameoverlayrenderer64!OverlayHookD3D3+0x1fb51
00000001`d6f7d2b0 00007ff8`03b320a9 : 00007fff`8b39f5c0 00000000`00000002 00000000`00000002 00007fff`8467fff1 : user32!DispatchHookW+0xa6
00000001`d6f7d340 00007ff8`03b32035 : 00000000`3f800000 00007ff8`0581fc84 00000001`d6f7d498 00000000`00000000 : user32!CallHookWithSEH+0x29
00000001`d6f7d390 00007ff8`0581fde4 : 00000000`00000002 00000000`00000000 00000000`00000001 00000000`00000000 : user32!__fnHkINLPMSG+0x55
00000001`d6f7d3f0 00007ff8`035910c4 : 00007ff8`03b294e2 00000000`00000010 00007fff`aac8a14d 00007fff`aad85070 : ntdll!KiUserCallbackDispatcherContinue
00000001`d6f7d4a8 00007ff8`03b294e2 : 00000000`00000010 00007fff`aac8a14d 00007fff`aad85070 00007fff`9795cfcd : win32u!NtUserPeekMessage+0x14
00000001`d6f7d4b0 00007ff8`03b29ad9 : 00000000`00003dff 00000000`00000000 00000000`00000000 00000000`00000000 : user32!_PeekMessage+0x42
00000001`d6f7d520 00007fff`aac8a6dc : 00000000`000071c0 00000000`00000000 00000000`00000000 00000000`00000000 : user32!PeekMessageA+0x69
00000001`d6f7d590 00007fff`979b44aa : 00000000`00000003 00000001`d6f7d689 00000000`00000001 00000000`00000001 : gameoverlayrenderer64!OverlayHookD3D3+0x2249c
00000001`d6f7d5d0 00000000`00000003 : 00000001`d6f7d689 00000000`00000001 00000000`00000001 000003c0`00000001 : engine+0x2144aa
00000001`d6f7d5d8 00000001`d6f7d689 : 00000000`00000001 00000000`00000001 000003c0`00000001 00000090`00000000 : 0x3
00000001`d6f7d5e0 00000000`00000001 : 00000000`00000001 000003c0`00000001 00000090`00000000 41800000`400ccccd : 0x00000001`d6f7d689
00000001`d6f7d5e8 00000000`00000001 : 000003c0`00000001 00000090`00000000 41800000`400ccccd 40200000`437f0000 : 0x1
00000001`d6f7d5f0 000003c0`00000001 : 00000090`00000000 41800000`400ccccd 40200000`437f0000 00000000`00020274 : 0x1
00000001`d6f7d5f8 00000090`00000000 : 41800000`400ccccd 40200000`437f0000 00000000`00020274 00000000`00000000 : 0x000003c0`00000001
00000001`d6f7d600 41800000`400ccccd : 40200000`437f0000 00000000`00020274 00000000`00000000 00000000`198239ac : 0x00000090`00000000
00000001`d6f7d608 40200000`437f0000 : 00000000`00020274 00000000`00000000 00000000`198239ac 00000000`00000001 : 0x41800000`400ccccd
00000001`d6f7d610 00000000`00020274 : 00000000`00000000 00000000`198239ac 00000000`00000001 00000162`23c0cb5b : 0x40200000`437f0000
00000001`d6f7d618 00000000`00000000 : 00000000`198239ac 00000000`00000001 00000162`23c0cb5b 00000000`00000079 : 0x20274
SYMBOL_NAME: textinputframework!CTextInputClientFreeThread::EditControlFocusChange+16a
MODULE_NAME: TextInputFramework
IMAGE_NAME: TextInputFramework.dll
STACK_COMMAND: ~0s ; .ecxr ; kb
FAILURE_BUCKET_ID: SOFTWARE_NX_FAULT_c0000005_TextInputFramework.dll!CTextInputClientFreeThread::EditControlFocusChange
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {75f199fc-4be0-b446-4379-ffb4ea41a6e6}
Followup: MachineOwner
---------