Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [E:\Crashes\dev-sync\b49cf481-c907-44eb-aea8-295e7eff8c83.dmp] User Mini Dump File: Only registers, stack and portions of memory are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols Symbol search path is: srv* Executable search path is: Windows 10 Version 17134 MP (12 procs) Free x64 Product: WinNt, suite: SingleUserTS 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Debug session time: Sat Jun 8 19:49:24.000 2019 (UTC + 7:00) System Uptime: not available Process Uptime: 0 days 0:01:31.000 ................................................................ ........ This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (5060.127c): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v SYMSRV: BYINDEX: 0x1 C:\ProgramData\Dbg\sym ntdll.dll 74BED8B01e1000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll - OK DBGENG: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll - Mapped image memory SYMSRV: BYINDEX: 0x2 C:\ProgramData\Dbg\sym ntdll.pdb 95927C40B68E505CD22742795247114C1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ntdll - public symbols C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: BYINDEX: 0x3 C:\ProgramData\Dbg\sym msvcp_win.dll 4E1047529f000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll - OK DBGENG: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll - Mapped image memory SYMSRV: BYINDEX: 0x4 C:\ProgramData\Dbg\sym KERNELBASE.dll CDFE5B92273000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll - OK DBGENG: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll - Mapped image memory SYMSRV: BYINDEX: 0x5 C:\ProgramData\Dbg\sym kernelbase.pdb D175C2B0021A106FCD5D74A1C20EB4651 SYMSRV: PATH: C:\ProgramData\Dbg\sym\kernelbase.pdb\D175C2B0021A106FCD5D74A1C20EB4651\kernelbase.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: KERNELBASE - public symbols C:\ProgramData\Dbg\sym\kernelbase.pdb\D175C2B0021A106FCD5D74A1C20EB4651\kernelbase.pdb ntdll!NtWaitForSingleObject+0x14: 00007ffa`6c4caa24 c3 ret Loading Dump File [E:\Crashes\dev-sync\b49cf481-c907-44eb-aea8-295e7eff8c83.dmp] User Mini Dump File: Only registers, stack and portions of memory are available Can't set dump file contexts MachineInfo::SetContext failed - Thread: 000002691C39F1F0 Handle: 1b Id: 127c - Error == 0x8000FFFF ************* Path validation summary ************** Response Time (ms) Location Deferred srv* DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols SYMSRV: BYINDEX: 0x6 C:\ProgramData\Dbg\sym ntdll.pdb 95927C40B68E505CD22742795247114C1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ntdll - public symbols C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols Symbol search path is: srv* Executable search path is: Windows 10 Version 17134 MP (12 procs) Free x64 Product: WinNt, suite: SingleUserTS 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Debug session time: Sat Jun 8 19:49:24.000 2019 (UTC + 7:00) System Uptime: not available Process Uptime: 0 days 0:01:31.000 ................................................................ ........ This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (5060.127c): Access violation - code c0000005 (first/second chance not available) SYMSRV: BYINDEX: 0x7 C:\ProgramData\Dbg\sym ntdll.dll 74BED8B01e1000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll - OK DBGENG: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll - Mapped image memory SYMSRV: BYINDEX: 0x8 C:\ProgramData\Dbg\sym ntdll.pdb 95927C40B68E505CD22742795247114C1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ntdll - public symbols C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: BYINDEX: 0x9 C:\ProgramData\Dbg\sym msvcp_win.dll 4E1047529f000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll - OK DBGENG: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll - Mapped image memory SYMSRV: BYINDEX: 0xA C:\ProgramData\Dbg\sym KERNELBASE.dll CDFE5B92273000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll - OK DBGENG: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll - Mapped image memory SYMSRV: BYINDEX: 0xB C:\ProgramData\Dbg\sym kernelbase.pdb D175C2B0021A106FCD5D74A1C20EB4651 SYMSRV: PATH: C:\ProgramData\Dbg\sym\kernelbase.pdb\D175C2B0021A106FCD5D74A1C20EB4651\kernelbase.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: KERNELBASE - public symbols C:\ProgramData\Dbg\sym\kernelbase.pdb\D175C2B0021A106FCD5D74A1C20EB4651\kernelbase.pdb ntdll!NtWaitForSingleObject+0x14: 00007ffa`6c4caa24 c3 ret Loading Dump File [E:\Crashes\dev-sync\b49cf481-c907-44eb-aea8-295e7eff8c83.dmp] User Mini Dump File: Only registers, stack and portions of memory are available Can't set dump file contexts MachineInfo::SetContext failed - Thread: 000002691D4AE480 Handle: 1b Id: 127c - Error == 0x8000FFFF ************* Path validation summary ************** Response Time (ms) Location Deferred srv* DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols SYMSRV: BYINDEX: 0xC C:\ProgramData\Dbg\sym ntdll.pdb 95927C40B68E505CD22742795247114C1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ntdll - public symbols C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols SYMSRV: BYINDEX: 0xD C:\ProgramData\Dbg\sym ntdll.pdb 95927C40B68E505CD22742795247114C1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ntdll - public symbols C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols Symbol search path is: srv* Executable search path is: Windows 10 Version 17134 MP (12 procs) Free x64 Product: WinNt, suite: SingleUserTS 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Debug session time: Sat Jun 8 19:49:24.000 2019 (UTC + 7:00) System Uptime: not available Process Uptime: 0 days 0:01:31.000 ................................................................ ........ This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (5060.127c): Access violation - code c0000005 (first/second chance not available) SYMSRV: BYINDEX: 0xE C:\ProgramData\Dbg\sym ntdll.dll 74BED8B01e1000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll - OK DBGENG: C:\ProgramData\Dbg\sym\ntdll.dll\74BED8B01e1000\ntdll.dll - Mapped image memory SYMSRV: BYINDEX: 0xF C:\ProgramData\Dbg\sym ntdll.pdb 95927C40B68E505CD22742795247114C1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ntdll - public symbols C:\ProgramData\Dbg\sym\ntdll.pdb\95927C40B68E505CD22742795247114C1\ntdll.pdb SYMSRV: BYINDEX: 0x10 C:\ProgramData\Dbg\sym msvcp_win.dll 4E1047529f000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll - OK DBGENG: C:\ProgramData\Dbg\sym\msvcp_win.dll\4E1047529f000\msvcp_win.dll - Mapped image memory SYMSRV: BYINDEX: 0x11 C:\ProgramData\Dbg\sym KERNELBASE.dll CDFE5B92273000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll - OK DBGENG: C:\ProgramData\Dbg\sym\KERNELBASE.dll\CDFE5B92273000\KERNELBASE.dll - Mapped image memory SYMSRV: BYINDEX: 0x12 C:\ProgramData\Dbg\sym kernelbase.pdb D175C2B0021A106FCD5D74A1C20EB4651 SYMSRV: PATH: C:\ProgramData\Dbg\sym\kernelbase.pdb\D175C2B0021A106FCD5D74A1C20EB4651\kernelbase.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: KERNELBASE - public symbols C:\ProgramData\Dbg\sym\kernelbase.pdb\D175C2B0021A106FCD5D74A1C20EB4651\kernelbase.pdb ntdll!NtWaitForSingleObject+0x14: 00007ffa`6c4caa24 c3 ret ||2:2:084> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* SYMSRV: BYINDEX: 0x20 C:\ProgramData\Dbg\sym win32u.dll B8EB0E3220000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32u.dll\B8EB0E3220000\win32u.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\win32u.dll\B8EB0E3220000\win32u.dll - OK DBGENG: C:\ProgramData\Dbg\sym\win32u.dll\B8EB0E3220000\win32u.dll - Mapped image memory SYMSRV: BYINDEX: 0x21 C:\ProgramData\Dbg\sym win32u.pdb E7B63B3D79E4637F1D13D11EDAFB4C151 SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32u.pdb\E7B63B3D79E4637F1D13D11EDAFB4C151\win32u.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: win32u - public symbols C:\ProgramData\Dbg\sym\win32u.pdb\E7B63B3D79E4637F1D13D11EDAFB4C151\win32u.pdb SYMSRV: BYINDEX: 0x22 C:\ProgramData\Dbg\sym sechost.dll CA1794CE5b000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\sechost.dll\CA1794CE5b000\sechost.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\sechost.dll\CA1794CE5b000\sechost.dll - OK DBGENG: C:\ProgramData\Dbg\sym\sechost.dll\CA1794CE5b000\sechost.dll - Mapped image memory SYMSRV: BYINDEX: 0x23 C:\ProgramData\Dbg\sym sechost.pdb DD59C601DC7724C916F011C5053A3C9B1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\sechost.pdb\DD59C601DC7724C916F011C5053A3C9B1\sechost.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: sechost - public symbols C:\ProgramData\Dbg\sym\sechost.pdb\DD59C601DC7724C916F011C5053A3C9B1\sechost.pdb SYMSRV: BYINDEX: 0x24 C:\ProgramData\Dbg\sym ole32.dll 42EF027D151000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ole32.dll\42EF027D151000\ole32.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\ole32.dll\42EF027D151000\ole32.dll - OK DBGENG: C:\ProgramData\Dbg\sym\ole32.dll\42EF027D151000\ole32.dll - Mapped image memory SYMSRV: BYINDEX: 0x25 C:\ProgramData\Dbg\sym ole32.pdb D29B4181E496249C2B7D3EF57B95573F1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ole32.pdb\D29B4181E496249C2B7D3EF57B95573F1\ole32.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ole32 - private symbols & lines C:\ProgramData\Dbg\sym\ole32.pdb\D29B4181E496249C2B7D3EF57B95573F1\ole32.pdb SYMSRV: BYINDEX: 0x26 C:\ProgramData\Dbg\sym combase.dll A54CE84E322000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\combase.dll\A54CE84E322000\combase.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\combase.dll\A54CE84E322000\combase.dll - OK DBGENG: C:\ProgramData\Dbg\sym\combase.dll\A54CE84E322000\combase.dll - Mapped image memory SYMSRV: BYINDEX: 0x27 C:\ProgramData\Dbg\sym combase.pdb AA3A99D90EE78224206B6B074E4BF9821 SYMSRV: PATH: C:\ProgramData\Dbg\sym\combase.pdb\AA3A99D90EE78224206B6B074E4BF9821\combase.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: combase - private symbols & lines C:\ProgramData\Dbg\sym\combase.pdb\AA3A99D90EE78224206B6B074E4BF9821\combase.pdb SYMSRV: BYINDEX: 0x28 C:\ProgramData\Dbg\sym MSVCP140D.dll 5A39FEEBf0000 SYMSRV: UNC: C:\ProgramData\Dbg\sym\MSVCP140D.dll\5A39FEEBf0000\MSVCP140D.dll - path not found SYMSRV: UNC: C:\ProgramData\Dbg\sym\MSVCP140D.dll\5A39FEEBf0000\MSVCP140D.dl_ - path not found SYMSRV: UNC: C:\ProgramData\Dbg\sym\MSVCP140D.dll\5A39FEEBf0000\file.ptr - path not found SYMSRV: RESULT: 0x80070003 SYMSRV: BYINDEX: 0x29 C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols MSVCP140D.dll 5A39FEEBf0000 SYMSRV: UNC: C:\ProgramData\Dbg\sym\MSVCP140D.dll\5A39FEEBf0000\MSVCP140D.dll - path not found SYMSRV: UNC: C:\ProgramData\Dbg\sym\MSVCP140D.dll\5A39FEEBf0000\MSVCP140D.dl_ - path not found SYMSRV: UNC: C:\ProgramData\Dbg\sym\MSVCP140D.dll\5A39FEEBf0000\file.ptr - path not found SYMSRV: HTTPGET: /download/symbols/index2.txt SYMSRV: HttpQueryInfo: 80190190 - HTTP_STATUS_BAD_REQUEST SYMSRV: HTTPGET: /download/symbols/MSVCP140D.dll/5A39FEEBf0000/MSVCP140D.dll SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND SYMSRV: HTTPGET: /download/symbols/MSVCP140D.dll/5A39FEEBf0000/MSVCP140D.dl_ SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND SYMSRV: HTTPGET: /download/symbols/MSVCP140D.dll/5A39FEEBf0000/file.ptr SYMSRV: HttpQueryInfo: 80190194 - HTTP_STATUS_NOT_FOUND SYMSRV: RESULT: 0x80190194 DBGHELP: C:\WINDOWS\System32\MSVCP140D.dll - OK DBGHELP: C:\WINDOWS\System32\MSVCP140D.dll - OK DBGHELP: C:\WINDOWS\System32\MSVCP140D.dll - OK DBGENG: C:\WINDOWS\System32\MSVCP140D.dll - Mapped image memory SYMSRV: BYINDEX: 0x2A C:\ProgramData\Dbg\sym msvcp140d.amd64.pdb 82639A2373FF48D5B7BCE547C7E088EE1 SYMSRV: PATH: C:\ProgramData\Dbg\sym\msvcp140d.amd64.pdb\82639A2373FF48D5B7BCE547C7E088EE1\msvcp140d.amd64.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: MSVCP140D - private symbols & lines C:\ProgramData\Dbg\sym\msvcp140d.amd64.pdb\82639A2373FF48D5B7BCE547C7E088EE1\msvcp140d.amd64.pdb SYMSRV: BYINDEX: 0x2B C:\ProgramData\Dbg\sym ucrtbased.dll 70841E451ba000 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ucrtbased.dll\70841E451ba000\ucrtbased.dll SYMSRV: RESULT: 0x00000000 DBGHELP: C:\ProgramData\Dbg\sym\ucrtbased.dll\70841E451ba000\ucrtbased.dll - OK DBGENG: C:\ProgramData\Dbg\sym\ucrtbased.dll\70841E451ba000\ucrtbased.dll - Mapped image memory SYMSRV: BYINDEX: 0x2C C:\ProgramData\Dbg\sym ucrtbased.pdb 1E033DF27C483F75C3EE152D9BB0B8B32 SYMSRV: PATH: C:\ProgramData\Dbg\sym\ucrtbased.pdb\1E033DF27C483F75C3EE152D9BB0B8B32\ucrtbased.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: ucrtbased - private symbols & lines C:\ProgramData\Dbg\sym\ucrtbased.pdb\1E033DF27C483F75C3EE152D9BB0B8B32\ucrtbased.pdb DBGHELP: Qt5Cored is not source indexed KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 3 Key : Analysis.Memory.CommitPeak.Mb Value: 383 Key : Timeline.Process.Start.DeltaSec Value: 91 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 Timeline: !analyze.Start Name: Time: 2019-06-24T09:50:51.741Z Diff: 1371687741 mSec Timeline: Dump.Current Name: Time: 2019-06-08T12:49:24.0Z Diff: 0 mSec Timeline: Process.Start Name: Time: 2019-06-08T12:47:53.0Z Diff: 91000 mSec DUMP_CLASS: 2 DUMP_QUALIFIER: 400 MODLIST_WITH_TSCHKSUM_HASH: 7cba07a3c0eeac0a62205c70bd260e2d796c63ca MODLIST_SHA1_HASH: f9f3fdc42ad6e39ba3ec8203ef19bc2a55505994 DUMP_FLAGS: 0 DUMP_TYPE: 2 CONTEXT: (.ecxr) rax=dddddddddddddddd rbx=0000000000000000 rcx=0000017099c3c4d0 rdx=00000032d39fbc78 rsi=0000000000000000 rdi=00000032d39fc809 rip=00007ffa10cc117d rsp=00000032d39fb9e8 rbp=0000000000000000 r8=0000000000000005 r9=00007ffa1c1a7e28 r10=0000017099c38f70 r11=0000017099c3c4d0 r12=0000000000000000 r13=0000000000000401 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 Qt5Cored!QLocalePrivate::languageId+0xd: 00007ffa`10cc117d 0fb700 movzx eax,word ptr [rax] ds:dddddddd`dddddddd=???? Resetting default scope FAULTING_IP: Qt5Cored!QLocalePrivate::languageId+d [c:\users\qt\work\qt\qtbase\src\corelib\tools\qlocale_p.h @ 347] 00007ffa`10cc117d 0fb700 movzx eax,word ptr [rax] EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ffa10cc117d (Qt5Cored!QLocalePrivate::languageId+0x000000000000000d) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff DEFAULT_BUCKET_ID: INVALID_POINTER_READ PROCESS_NAME: CortexSync.exe FOLLOWUP_IP: Qt5Cored!QLocalePrivate::languageId+d [c:\users\qt\work\qt\qtbase\src\corelib\tools\qlocale_p.h @ 347] 00007ffa`10cc117d 0fb700 movzx eax,word ptr [rax] READ_ADDRESS: ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff WATSON_BKT_PROCSTAMP: 5cfa1fb8 WATSON_BKT_MODULE: Qt5Cored.dll WATSON_BKT_MODSTAMP: 5c0513ac WATSON_BKT_MODOFFSET: d117d WATSON_BKT_MODVER: 5.12.0.0 MODULE_VER_PRODUCT: Qt5 BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804 ANALYSIS_SESSION_HOST: DESKTOP-ICB5G90 ANALYSIS_SESSION_TIME: 06-24-2019 16:50:51.0741 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre THREAD_ATTRIBUTES: BUGCHECK_STR: APPLICATION_FAULT_INVALID_POINTER_READ PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT PROBLEM_CLASSES: ID: [0n313] Type: [@ACCESS_VIOLATION] Class: Addendum Scope: BUCKET_ID Name: Omit Data: Omit PID: [Unspecified] TID: [0x127c] Frame: [0] : Qt5Cored!QLocalePrivate::languageId ID: [0n285] Type: [INVALID_POINTER_READ] Class: Primary Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix) BUCKET_ID Name: Add Data: Omit PID: [Unspecified] TID: [0x127c] Frame: [0] : Qt5Cored!QLocalePrivate::languageId LAST_CONTROL_TRANSFER: from 00007ffa10dfee6e to 00007ffa10cc117d STACK_TEXT: 00000032`d39fb9e8 00007ffa`10dfee6e : 00000170`99c3c4d0 00007ffa`00000000 ffffffff`00000001 00007ffa`00000000 : Qt5Cored!QLocalePrivate::languageId+0xd 00000032`d39fb9f0 00007ffa`10dfef08 : 00000032`d39fbc80 00007ffa`10c6b7e6 00000170`99c3c7f8 00007ffa`1095c1a0 : Qt5Cored!QLocale::language+0x1e 00000032`d39fba20 00007ffa`109447de : 00000032`d39fbc80 00000032`d39fbc78 00000032`d39fbbc8 00000032`d39fbc60 : Qt5Cored!QLocale::name+0x28 00000032`d39fbb00 00007ffa`109441e9 : 00000170`99b109e0 00000032`d39fbe40 00000170`99bf2ef0 00000000`00000050 : Qt5Networkd!QHttpNetworkConnectionPrivate::prepareRequest+0x5be 00000032`d39fbe00 00007ffa`1094751e : 00000170`99b109e0 00000000`00000000 00000032`d39fc809 00007ffa`10967b62 : Qt5Networkd!QHttpNetworkConnectionPrivate::dequeueRequest+0x109 00000032`d39fbe70 00007ffa`10941d49 : 00000170`99b109e0 00000170`99c39be0 00007ffa`115cef00 00007ffa`10c9a448 : Qt5Networkd!QHttpNetworkConnectionPrivate::_q_hostLookupFinished+0x62e 00000032`d39fc200 00007ffa`1110d351 : 00000170`99b4c620 00007ffa`00000000 00000032`00000001 00000170`99c39e10 : Qt5Networkd!QHttpNetworkConnection::qt_static_metacall+0x89 00000032`d39fc250 00007ffa`11105c3f : 00000170`99bfa210 00000170`99b4c620 00000170`99bf2fa0 00007ffa`00000003 : Qt5Cored!QMetaCallEvent::placeMetaCall+0xa1 00000032`d39fc290 00007ffa`110adc0e : 00000170`99b4c620 00000170`99bfa210 00000170`99b4c628 00000032`d39fc568 : Qt5Cored!QObject::event+0x12f 00000032`d39fc500 00007ffa`110af478 : 00000170`99b4c620 00000170`99bfa210 00000170`00000000 00007ffa`10caba74 : Qt5Cored!QCoreApplicationPrivate::notify_helper+0x9e 00000032`d39fc540 00007ffa`110ab1e1 : 00000170`99b4c620 00000170`99bfa210 ffffffff`fffffffe 00000032`d39fc630 : Qt5Cored!doNotify+0x78 00000032`d39fc5a0 00007ffa`110acc56 : 00000032`d22fee40 00000170`99b4c620 00000170`99bfa210 00007ffa`10cda4d3 : Qt5Cored!QCoreApplication::notify+0x31 00000032`d39fc5d0 00007ffa`110aa992 : 00000170`99b4c620 00000170`99bfa210 00007ffa`11900c30 00007ffa`00000000 : Qt5Cored!QCoreApplication::notifyInternal2+0x116 00000032`d39fc650 00007ffa`110ae60d : 00000170`99b4c620 00000170`99bfa210 00007ffa`00000000 00000170`99b95260 : Qt5Cored!QCoreApplication::sendEvent+0x42 00000032`d39fc680 00007ffa`1116fa8a : 00000000`00000000 00007ffa`00000000 00000170`99b95260 00007ffa`110b9312 : Qt5Cored!QCoreApplicationPrivate::sendPostedEvents+0x47d 00000032`d39fc790 00007ffa`1116d878 : 00000170`99b89230 00000000`00000000 00000032`d39fc809 00000032`d39fc850 : Qt5Cored!QEventDispatcherWin32::sendPostedEvents+0x2a 00000032`d39fc7d0 00007ffa`6b516d41 : 00000000`000b009a 00000000`00000401 00000000`00000000 00000000`00000000 : Qt5Cored!qt_internal_proc+0x668 00000032`d39fc950 00007ffa`6b516713 : 00000170`99b58f50 00007ffa`10c0622a 00000000`000b009a 00007ffa`00000401 : user32!UserCallWinProcCheckWow+0x2c1 00000032`d39fcae0 00007ffa`1116e168 : 00000032`d39fcbd8 00000032`00000000 00000032`d39fcbd8 00000000`00000000 : user32!DispatchMessageWorker+0x1c3 00000032`d39fcb70 00007ffa`110a6e83 : 00000170`99b89230 00007ffa`00000024 00000170`99b96354 00000170`99b962e0 : Qt5Cored!QEventDispatcherWin32::processEvents+0x558 00000032`d39ffd00 00007ffa`110a70be : 00000032`d39ffe38 00000032`00000024 00000032`00000020 00000032`d39ffda0 : Qt5Cored!QEventLoop::processEvents+0x63 00000032`d39ffd40 00007ffa`10cd741f : 00000032`d39ffe38 00000000`00000000 00000170`99b95298 00007ffa`10ca2673 : Qt5Cored!QEventLoop::exec+0x18e 00000032`d39ffdf0 00007ffa`10cd7353 : 00000170`99b89500 00000170`99b89500 00000170`99b3d170 00000032`d39ffe98 : Qt5Cored!QThread::exec+0xbf 00000032`d39ffe60 00007ffa`10cdbc6b : 00000170`99b89500 00000170`99b6bc00 00000000`00000000 00000000`00000000 : Qt5Cored!QThread::run+0x13 00000032`d39ffe90 00007ffa`6a004034 : 00000170`99b89500 00000000`00000000 00000000`00000000 00000000`00000000 : Qt5Cored!QThreadPrivate::start+0x15b 00000032`d39fff10 00007ffa`6c4a3691 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14 00000032`d39fff40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 THREAD_SHA1_HASH_MOD_FUNC: 5e207a2efb6d666bf317d353d2f6559173acd62a THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bc8bcfe598f564fba68ba4813ee92b68672b7188 THREAD_SHA1_HASH_MOD: 6d27c8e741b619bcfafbd16c98aff85977fc0c86 FAULT_INSTR_CODE: c300b70f FAULTING_SOURCE_LINE: c:\users\qt\work\qt\qtbase\src\corelib\tools\qlocale_p.h FAULTING_SOURCE_FILE: c:\users\qt\work\qt\qtbase\src\corelib\tools\qlocale_p.h FAULTING_SOURCE_LINE_NUMBER: 347 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: Qt5Cored!QLocalePrivate::languageId+d FOLLOWUP_NAME: MachineOwner MODULE_NAME: Qt5Cored IMAGE_NAME: Qt5Cored.dll DEBUG_FLR_IMAGE_TIMESTAMP: 5c0513ac STACK_COMMAND: ~84s ; .ecxr ; kb FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_Qt5Cored.dll!QLocalePrivate::languageId BUCKET_ID: APPLICATION_FAULT_INVALID_POINTER_READ_Qt5Cored!QLocalePrivate::languageId+d FAILURE_EXCEPTION_CODE: c0000005 FAILURE_IMAGE_NAME: Qt5Cored.dll BUCKET_ID_IMAGE_STR: Qt5Cored.dll FAILURE_MODULE_NAME: Qt5Cored BUCKET_ID_MODULE_STR: Qt5Cored FAILURE_FUNCTION_NAME: QLocalePrivate::languageId BUCKET_ID_FUNCTION_STR: QLocalePrivate::languageId BUCKET_ID_OFFSET: d BUCKET_ID_MODTIMEDATESTAMP: 5c0513ac BUCKET_ID_MODCHECKSUM: 0 BUCKET_ID_MODVER_STR: 5.12.0.0 BUCKET_ID_PREFIX_STR: APPLICATION_FAULT_INVALID_POINTER_READ_ FAILURE_PROBLEM_CLASS: APPLICATION_FAULT FAILURE_SYMBOL_NAME: Qt5Cored.dll!QLocalePrivate::languageId TARGET_TIME: 2019-06-08T12:49:24.000Z OSBUILD: 17134 OSSERVICEPACK: 753 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 256 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 180410-1804 BUILDLAB_STR: rs4_release BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804 ANALYSIS_SESSION_ELAPSED_TIME: f19 ANALYSIS_SOURCE: UM FAILURE_ID_HASH_STRING: um:invalid_pointer_read_c0000005_qt5cored.dll!qlocaleprivate::languageid FAILURE_ID_HASH: {9b7c08e4-9d0d-8b61-cbeb-fa0f8eff204f} Followup: MachineOwner ---------