bkthunder Posted September 1, 2014 Posted September 1, 2014 I wanted to make a quick bomb training mission with the A-10C. I open mission editor and place a few containers and 1 A-10C in the air. Save the mission with a name, then hit fly. The sim crashes soon after starting to load the mission. I have tried different names, loadouts and aircraft but it seems any mission I create with ME will crash on loading. See crash logs for the attempts I made: # -------------- 20140901-083425 -------------- # C0000005 ACCESS_VIOLATION at E341E5B9 00:00000000 00000000 00000000 0000:00000000 E341E5B9 0023EC20 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E3C6ECF7 0023EC60 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 3F5B419C 0023ECA0 0000:00000000 3F5A4262 0023EDB0 0000:00000000 3F5A601C 0023F0D0 0000:00000000 3F5A1049 0023F390 0000:00000000 E400DE6A 0023F3C0 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 0023F400 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 0023F430 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 3F5A400F 0023F490 0000:00000000 3F5BAE44 0023F4C0 0000:00000000 3F5BB06B 0023F4F0 0000:00000000 3F65E4DB 0023F560 0000:00000000 3F65ED36 0023FB80 0000:00000000 3F661D90 0023FBC0 0000:00000000 77A759ED 0023FBF0 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 0023FC40 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 # -------------- 20140901-083339 -------------- # C0000005 ACCESS_VIOLATION at E33AE5B9 00:00000000 00000000 00000000 0000:00000000 E33AE5B9 002DEDF0 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E3C6ECF7 002DEE30 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 3FFE419C 002DEE70 0000:00000000 3FFD4262 002DEF80 0000:00000000 3FFD601C 002DF2A0 0000:00000000 3FFD1049 002DF560 0000:00000000 E400DE6A 002DF590 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 002DF5D0 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 002DF600 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 3FFD400F 002DF660 0000:00000000 3FFEAE44 002DF690 0000:00000000 3FFEB06B 002DF6C0 0000:00000000 4008E4DB 002DF730 0000:00000000 4008ED36 002DFD50 0000:00000000 40091D90 002DFD90 0000:00000000 77A759ED 002DFDC0 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 002DFE10 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 # -------------- 20140901-083305 -------------- # C0000005 ACCESS_VIOLATION at E341E5B9 00:00000000 00000000 00000000 0000:00000000 E341E5B9 0026E940 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E3C6ECF7 0026E980 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 3FEE419C 0026E9C0 0000:00000000 3FED4262 0026EAD0 0000:00000000 3FED601C 0026EDF0 0000:00000000 3FED1049 0026F0B0 0000:00000000 E400DE6A 0026F0E0 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 0026F120 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 0026F150 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 3FED400F 0026F1B0 0000:00000000 3FEEAE44 0026F1E0 0000:00000000 3FEEB06B 0026F210 0000:00000000 3FF8E4DB 0026F280 0000:00000000 3FF8ED36 0026F8A0 0000:00000000 3FF91D90 0026F8E0 0000:00000000 77A759ED 0026F910 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 0026F960 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 # -------------- 20140901-083226 -------------- # C0000005 ACCESS_VIOLATION at E360E5B9 00:00000000 00000000 00000000 0000:00000000 E360E5B9 002CEB90 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E3C6ECF7 002CEBD0 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 3F6E419C 002CEC10 0000:00000000 3F6D4262 002CED20 0000:00000000 3F6D601C 002CF040 0000:00000000 3F6D1049 002CF300 0000:00000000 E400DE6A 002CF330 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 002CF370 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 002CF3A0 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 3F6D400F 002CF400 0000:00000000 3F6EAE44 002CF430 0000:00000000 3F6EB06B 002CF460 0000:00000000 3F78E4DB 002CF4D0 0000:00000000 3F78ED36 002CFAF0 0000:00000000 3F791D90 002CFB30 0000:00000000 77A759ED 002CFB60 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 002CFBB0 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 # -------------- 20140901-083115 -------------- # C0000005 ACCESS_VIOLATION at E341E5B9 00:00000000 00000000 00000000 0000:00000000 E341E5B9 0031E7C0 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E3C6ECF7 0031E800 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 3FC5419C 0031E840 0000:00000000 3FC44262 0031E950 0000:00000000 3FC4601C 0031EC70 0000:00000000 3FC41049 0031EF30 0000:00000000 E400DE6A 0031EF60 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 0031EFA0 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 0031EFD0 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 3FC4400F 0031F030 0000:00000000 3FC5AE44 0031F060 0000:00000000 3FC5B06B 0031F090 0000:00000000 3FCFE4DB 0031F100 0000:00000000 3FCFED36 0031F720 0000:00000000 3FD01D90 0031F760 0000:00000000 77A759ED 0031F790 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 0031F7E0 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 # -------------- 20140901-082922 -------------- # C0000005 ACCESS_VIOLATION at E360E5B9 00:00000000 00000000 00000000 0000:00000000 E360E5B9 0023EA80 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E3C6ECF7 0023EAC0 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 4013419C 0023EB00 0000:00000000 40124262 0023EC10 0000:00000000 4012601C 0023EF30 0000:00000000 40121049 0023F1F0 0000:00000000 E400DE6A 0023F220 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 0023F260 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 0023F290 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 4012400F 0023F2F0 0000:00000000 4013AE44 0023F320 0000:00000000 4013B06B 0023F350 0000:00000000 401DE4DB 0023F3C0 0000:00000000 401DED36 0023F9E0 0000:00000000 401E1D90 0023FA20 0000:00000000 77A759ED 0023FA50 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 0023FAA0 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 # -------------- 20140901-082458 -------------- # C0000005 ACCESS_VIOLATION at E1BDE5B9 00:00000000 00000000 00000000 0000:00000000 E1BDE5B9 0024EC60 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E46DECF7 0024ECA0 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 3F5D419C 0024ECE0 0000:00000000 3F5C4262 0024EDF0 0000:00000000 3F5C601C 0024F110 0000:00000000 3F5C1049 0024F3D0 0000:00000000 E400DE6A 0024F400 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 0024F440 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 0024F470 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 3F5C400F 0024F4D0 0000:00000000 3F5DAE44 0024F500 0000:00000000 3F5DB06B 0024F530 0000:00000000 3F67E4DB 0024F5A0 0000:00000000 3F67ED36 0024FBC0 0000:00000000 3F681D90 0024FC00 0000:00000000 77A759ED 0024FC30 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 0024FC80 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 # -------------- 20140901-082347 -------------- # C0000005 ACCESS_VIOLATION at E1BCE5B9 00:00000000 00000000 00000000 0000:00000000 E1BCE5B9 001FEDE0 0000:00000000 ?onWorldSpawnComplete@woATC@@QEAAXXZ()+9 E46DECF7 001FEE20 0000:00000000 ?evoke@?$Evoker@VwListener@@V?$Link@VwListener@@@@@@QEAAXP8wListener@@EAAXXZ@Z()+97 4010419C 001FEE60 0000:00000000 400F4262 001FEF70 0000:00000000 400F601C 001FF290 0000:00000000 400F1049 001FF550 0000:00000000 E400DE6A 001FF580 0000:00000000 ?sendOutputSymbol_@FSM@Common@@AEAAXI@Z()+2A E400D038 001FF5C0 0000:00000000 ?enterToState_@FSM@Common@@AEAAXI@Z()+C8 E400D906 001FF5F0 0000:00000000 ?onSymbol_@FSM@Common@@AEAAXI@Z()+1B6 400F400F 001FF650 0000:00000000 4010AE44 001FF680 0000:00000000 4010B06B 001FF6B0 0000:00000000 401AE4DB 001FF720 0000:00000000 401AED36 001FFD40 0000:00000000 401B1D90 001FFD80 0000:00000000 77A759ED 001FFDB0 0001:000149ED C:\Windows\system32\kernel32.dll BaseThreadInitThunk()+D 77CAC541 001FFE00 0001:0002B541 C:\Windows\SYSTEM32\ntdll.dll RtlUserThreadStart()+21 Windows 10 - Intel i7 7700K 4.2 Ghz (no OC) - Asus Strix GTX 1080 8Gb - 16GB DDR4 (3000 MHz) - SSD 500GB + WD Black FZEX 1TB 6Gb/s
AtaliaA1 Posted September 2, 2014 Posted September 2, 2014 Have U tried to repair? There were several users complaining about Access Violation errors of late hope it isn't a bug. This was a Boutique Builder iBuypower rig. Until I got the tinker bug again i7 920 @3.6Mhz 12Gig Corsair XMS3 ram 1600 Nvidia 760 SLi w/4Gig DDR5 Ram Intel 310 SSD HDD 160 Gb + Western Digital 4Terabyte HDD Creative SB X-Fi HD Audio Logitech X-530 5.1 Surround Speaker System Dual Acer 32"Monitors. PSU 1200 w Thermaltake Win10 64Bit.
bkthunder Posted September 5, 2014 Author Posted September 5, 2014 Ok, so, tried a repair but the situation is still the same... Windows 10 - Intel i7 7700K 4.2 Ghz (no OC) - Asus Strix GTX 1080 8Gb - 16GB DDR4 (3000 MHz) - SSD 500GB + WD Black FZEX 1TB 6Gb/s
Flagrum Posted September 5, 2014 Posted September 5, 2014 What about the mission - if you upload it, we probably could investigate it a bit easier. :o)
Recommended Posts