Jump to content

Recommended Posts

Posted

I wanted to make a quick bomb training mission with the A-10C.

I open mission editor and place a few containers and 1 A-10C in the air.

Save the mission with a name, then hit fly. The sim crashes soon after starting to load the mission.

I have tried different names, loadouts and aircraft but it seems any mission I create with ME will crash on loading.

 

See crash logs for the attempts I made:

# -------------- 20140901-083425 --------------

# C0000005 ACCESS_VIOLATION at E341E5B9 00:00000000
00000000 00000000 0000:00000000 
E341E5B9 0023EC20 0000:00000000  ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9
E3C6ECF7 0023EC60 0000:00000000  ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97
3F5B419C 0023ECA0 0000:00000000 
3F5A4262 0023EDB0 0000:00000000 
3F5A601C 0023F0D0 0000:00000000 
3F5A1049 0023F390 0000:00000000 
E400DE6A 0023F3C0 0000:00000000  ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A
E400D038 0023F400 0000:00000000  ?enterToState_@FSM@Common@@AEAAXI@Z()+C8
E400D906 0023F430 0000:00000000  ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6
3F5A400F 0023F490 0000:00000000 
3F5BAE44 0023F4C0 0000:00000000 
3F5BB06B 0023F4F0 0000:00000000 
3F65E4DB 0023F560 0000:00000000 
3F65ED36 0023FB80 0000:00000000 
3F661D90 0023FBC0 0000:00000000 
77A759ED 0023FBF0 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D
77CAC541 0023FC40 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

# -------------- 20140901-083339 --------------

# C0000005 ACCESS_VIOLATION at E33AE5B9 00:00000000
00000000 00000000 0000:00000000 
E33AE5B9 002DEDF0 0000:00000000  ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9
E3C6ECF7 002DEE30 0000:00000000  ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97
3FFE419C 002DEE70 0000:00000000 
3FFD4262 002DEF80 0000:00000000 
3FFD601C 002DF2A0 0000:00000000 
3FFD1049 002DF560 0000:00000000 
E400DE6A 002DF590 0000:00000000  ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A
E400D038 002DF5D0 0000:00000000  ?enterToState_@FSM@Common@@AEAAXI@Z()+C8
E400D906 002DF600 0000:00000000  ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6
3FFD400F 002DF660 0000:00000000 
3FFEAE44 002DF690 0000:00000000 
3FFEB06B 002DF6C0 0000:00000000 
4008E4DB 002DF730 0000:00000000 
4008ED36 002DFD50 0000:00000000 
40091D90 002DFD90 0000:00000000 
77A759ED 002DFDC0 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D
77CAC541 002DFE10 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

# -------------- 20140901-083305 --------------

 

# C0000005 ACCESS_VIOLATION at E341E5B9 00:00000000

00000000 00000000 0000:00000000

E341E5B9 0026E940 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9

E3C6ECF7 0026E980 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97

3FEE419C 0026E9C0 0000:00000000

3FED4262 0026EAD0 0000:00000000

3FED601C 0026EDF0 0000:00000000

3FED1049 0026F0B0 0000:00000000

E400DE6A 0026F0E0 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A

E400D038 0026F120 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8

E400D906 0026F150 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6

3FED400F 0026F1B0 0000:00000000

3FEEAE44 0026F1E0 0000:00000000

3FEEB06B 0026F210 0000:00000000

3FF8E4DB 0026F280 0000:00000000

3FF8ED36 0026F8A0 0000:00000000

3FF91D90 0026F8E0 0000:00000000

77A759ED 0026F910 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D

77CAC541 0026F960 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

# -------------- 20140901-083226 --------------

 

# C0000005 ACCESS_VIOLATION at E360E5B9 00:00000000

00000000 00000000 0000:00000000

E360E5B9 002CEB90 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9

E3C6ECF7 002CEBD0 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97

3F6E419C 002CEC10 0000:00000000

3F6D4262 002CED20 0000:00000000

3F6D601C 002CF040 0000:00000000

3F6D1049 002CF300 0000:00000000

E400DE6A 002CF330 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A

E400D038 002CF370 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8

E400D906 002CF3A0 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6

3F6D400F 002CF400 0000:00000000

3F6EAE44 002CF430 0000:00000000

3F6EB06B 002CF460 0000:00000000

3F78E4DB 002CF4D0 0000:00000000

3F78ED36 002CFAF0 0000:00000000

3F791D90 002CFB30 0000:00000000

77A759ED 002CFB60 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D

77CAC541 002CFBB0 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

# -------------- 20140901-083115 --------------

 

# C0000005 ACCESS_VIOLATION at E341E5B9 00:00000000

00000000 00000000 0000:00000000

E341E5B9 0031E7C0 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9

E3C6ECF7 0031E800 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97

3FC5419C 0031E840 0000:00000000

3FC44262 0031E950 0000:00000000

3FC4601C 0031EC70 0000:00000000

3FC41049 0031EF30 0000:00000000

E400DE6A 0031EF60 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A

E400D038 0031EFA0 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8

E400D906 0031EFD0 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6

3FC4400F 0031F030 0000:00000000

3FC5AE44 0031F060 0000:00000000

3FC5B06B 0031F090 0000:00000000

3FCFE4DB 0031F100 0000:00000000

3FCFED36 0031F720 0000:00000000

3FD01D90 0031F760 0000:00000000

77A759ED 0031F790 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D

77CAC541 0031F7E0 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

# -------------- 20140901-082922 --------------

 

# C0000005 ACCESS_VIOLATION at E360E5B9 00:00000000

00000000 00000000 0000:00000000

E360E5B9 0023EA80 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9

E3C6ECF7 0023EAC0 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97

4013419C 0023EB00 0000:00000000

40124262 0023EC10 0000:00000000

4012601C 0023EF30 0000:00000000

40121049 0023F1F0 0000:00000000

E400DE6A 0023F220 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A

E400D038 0023F260 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8

E400D906 0023F290 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6

4012400F 0023F2F0 0000:00000000

4013AE44 0023F320 0000:00000000

4013B06B 0023F350 0000:00000000

401DE4DB 0023F3C0 0000:00000000

401DED36 0023F9E0 0000:00000000

401E1D90 0023FA20 0000:00000000

77A759ED 0023FA50 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D

77CAC541 0023FAA0 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

# -------------- 20140901-082458 --------------

 

# C0000005 ACCESS_VIOLATION at E1BDE5B9 00:00000000

00000000 00000000 0000:00000000

E1BDE5B9 0024EC60 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9

E46DECF7 0024ECA0 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97

3F5D419C 0024ECE0 0000:00000000

3F5C4262 0024EDF0 0000:00000000

3F5C601C 0024F110 0000:00000000

3F5C1049 0024F3D0 0000:00000000

E400DE6A 0024F400 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A

E400D038 0024F440 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8

E400D906 0024F470 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6

3F5C400F 0024F4D0 0000:00000000

3F5DAE44 0024F500 0000:00000000

3F5DB06B 0024F530 0000:00000000

3F67E4DB 0024F5A0 0000:00000000

3F67ED36 0024FBC0 0000:00000000

3F681D90 0024FC00 0000:00000000

77A759ED 0024FC30 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D

77CAC541 0024FC80 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

# -------------- 20140901-082347 --------------

 

# C0000005 ACCESS_VIOLATION at E1BCE5B9 00:00000000

00000000 00000000 0000:00000000

E1BCE5B9 001FEDE0 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9

E46DECF7 001FEE20 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97

4010419C 001FEE60 0000:00000000

400F4262 001FEF70 0000:00000000

400F601C 001FF290 0000:00000000

400F1049 001FF550 0000:00000000

E400DE6A 001FF580 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A

E400D038 001FF5C0 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8

E400D906 001FF5F0 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6

400F400F 001FF650 0000:00000000

4010AE44 001FF680 0000:00000000

4010B06B 001FF6B0 0000:00000000

401AE4DB 001FF720 0000:00000000

401AED36 001FFD40 0000:00000000

401B1D90 001FFD80 0000:00000000

77A759ED 001FFDB0 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D

77CAC541 001FFE00 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21

 

Windows 10 - Intel i7 7700K 4.2 Ghz (no OC) - Asus Strix GTX 1080 8Gb - 16GB DDR4 (3000 MHz) - SSD 500GB + WD Black FZEX 1TB 6Gb/s

Posted

Have U tried to repair?

 

There were several users complaining about Access Violation errors of late hope it isn't a bug.

This was a Boutique Builder iBuypower rig. Until I got the tinker bug again i7 920 @3.6Mhz 12Gig Corsair XMS3 ram 1600 Nvidia 760 SLi w/4Gig DDR5 Ram Intel 310 SSD HDD 160 Gb + Western Digital 4Terabyte HDD Creative SB X-Fi HD Audio Logitech X-530 5.1 Surround Speaker System Dual Acer 32"Monitors. PSU 1200 w Thermaltake Win10 64Bit.

Posted

Ok, so, tried a repair but the situation is still the same...

Windows 10 - Intel i7 7700K 4.2 Ghz (no OC) - Asus Strix GTX 1080 8Gb - 16GB DDR4 (3000 MHz) - SSD 500GB + WD Black FZEX 1TB 6Gb/s

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...