Sure will do mate - Here it is
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(1178.358): Access violation - code c0000005 (first/second chance not available)
eax=00000000 ebx=43a3ee88 ecx=000000ea edx=1865b9d8 esi=00000000 edi=43a3ee88
eip=770cd4bc esp=43a3ee48 ebp=43a3eeac iopl=0 nv up ei pl nz na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206
ntdll!NtDelayExecution+0xc:
770cd4bc c20800 ret 8
0:001> analyze -v
Couldn't resolve error at 'nalyze -v'
0:001> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** WARNING: Unable to verify timestamp for nvwgf2um.dll
*** ERROR: Module load completed but symbols could not be loaded for nvwgf2um.dll
*** WARNING: Unable to verify timestamp for XAudio2_7.dll
FAULTING_IP:
EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+12fe40
00d3b8b0 8b09 mov ecx,dword ptr [ecx]
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 00d3b8b0 (EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0x0012fe40)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 000000ea
Attempt to read from address 000000ea
CONTEXT: 00000000 -- (.cxr 0x0;r)
eax=00000000 ebx=43a3ee88 ecx=000000ea edx=1865b9d8 esi=00000000 edi=43a3ee88
eip=770cd4bc esp=43a3ee48 ebp=43a3eeac iopl=0 nv up ei pl nz na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206
ntdll!NtDelayExecution+0xc:
770cd4bc c20800 ret 8
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_READ
PROCESS_NAME: EliteDangerous.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 000000ea
READ_ADDRESS: 000000ea
FOLLOWUP_IP:
EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+12fe40
00d3b8b0 8b09 mov ecx,dword ptr [ecx]
APPLICATION_VERIFIER_FLAGS: 0
APP: elitedangerous.exe
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
FAULTING_THREAD: 00000358
PRIMARY_PROBLEM_CLASS: NULL_CLASS_PTR_READ
BUGCHECK_STR: APPLICATION_FAULT_NULL_CLASS_PTR_READ
LAST_CONTROL_TRANSFER: from 00d2a1a8 to 00d3b8b0
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
43a3f598 00d2a1a8 43a3f608 07a1a409 00000000 EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0x12fe40
43a3f630 00d08b39 00000008 43a3f600 3f800000 EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0x11e738
43a3f64c 00d283b2 195315c4 43a3f66c 13cfd8c0 EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0xfd0c9
43a3f67c 00d08b39 00000003 0000008b 00000000 EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0x11c942
43a3f694 00d27b39 13cfd8c0 040c2200 0376d820 EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0xfd0c9
43a3f6ac 00d32b18 43a3f6d8 43a3f600 0376d820 EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0x11c0c9
00000000 00000000 00000000 00000000 00000000 EliteDangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+0x1270a8
STACK_COMMAND: ~1s; .ecxr ; kb
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: elitedangerous!Scaleform::Render::Matrix4x4<float>::SetIdentity+12fe40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: EliteDangerous
IMAGE_NAME: EliteDangerous.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53db828b
FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_EliteDangerous.exe!Scaleform::Render::Matrix4x4_float_::SetIdentity
BUCKET_ID: APPLICATION_FAULT_NULL_CLASS_PTR_READ_elitedangerous!Scaleform::Render::Matrix4x4_float_::SetIdentity+12fe40
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:null_class_ptr_read_c0000005_elitedangerous.exe!scaleform::render::matrix4x4_float_::setidentity
FAILURE_ID_HASH: {78961d98-b0f6-fac7-0231-f15e401d87b5}
Followup: MachineOwner