January 25, 2023 at 1:40 pm
Subscriber
Since you cannot download the file, i attach the text from the debugger.
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\dleonett\OneDrive - TU Eindhoven\Desktop\AnsysWBDumpFile.dmp] User Mini Dump File: Only registers, stack and portions of memory are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Version 19045 MP (8 procs) Free x64 Product: WinNt, suite: SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Debug session time: Tue Jan 24 13:51:58.000 2023 (UTC + 1:00) System Uptime: not available Process Uptime: 0 days 0:00:54.000 ................................................................ ................................................................ .......................... Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ...................................... ................................................................ ................................................................ ................................................................ ................................................................ ......................................................... This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (1e44.1ddc): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v ---------------------------------------------------------------------------- The user dump currently examined is a minidump. Consequently, only a subset of sos.dll functionality will be available. If needed, attaching to the live process or debugging a full dump will allow access to sos.dll's full feature set. To create a full user dump use the command: .dump /ma---------------------------------------------------------------------------- ntdll!NtGetContextThread+0x14: 00007ffe`c23ceef4 c3 ret 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* Failed to request MethodData, not in JIT code range KEY_VALUES_STRING: 1 Key : AV.Dereference Value: NullClassPtr Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 16249 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 22729 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 1 Key : Analysis.Init.CPU.mSec Value: 1312 Key : Analysis.Init.Elapsed.mSec Value: 646396 Key : Analysis.Memory.CommitPeak.Mb Value: 1046 Key : CLR.BuiltBy Value: NET48REL1LAST_C Key : CLR.Engine Value: CLR Key : CLR.Version Value: 4.8.4515.0 Key : Timeline.Process.Start.DeltaSec Value: 54 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 Key : WER.Process.Version Value: 22.2021.334.1 FILE_IN_CAB: AnsysWBDumpFile.dmp CONTEXT: (.ecxr) rax=00007ffe76e84bb0 rbx=00000000005eec80 rcx=0000000000000000 rdx=00000000005eec80 rsi=0000000041cb9e10 rdi=0000000000000000 rip=00007ffe76d41447 rsp=00000000005eec00 rbp=0000000000000000 r8=0000000000000060 r9=0000000038e557c8 r10=0000000000ad0000 r11=00000000005ee9a0 r12=00000000005eed10 r13=0000000000000001 r14=0000000000000051 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 CommandBars!png_write_sig+0x39217: 00007ffe 76d41447 8b91dc000000 mov edx,dword ptr [rcx+0DCh] ds:00000000
000000dc=???????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ffe76d41447 (CommandBars!png_write_sig+0x0000000000039217) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 00000000000000dc Attempt to read from address 00000000000000dc PROCESS_NAME: AnsysWBU.exe READ_ADDRESS: 00000000000000dc ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 00000000000000dc STACK_TEXT: 00000000005eec00 00007ffe
76d3f8d9 : 0000000000000004 00000000
41cb9e10 0000000000000004 00007ffe
76d495fc : CommandBars!png_write_sig+0x39217 00000000005eec50 00007ffe
76d4287c : 0000000000000051 00000000
00000027 000000000000000f 00000000
00000000 : CommandBars!png_write_sig+0x376a9 00000000005eece0 00007ffe
76d38c25 : 0000000038e557c8 00000000
3da24970 ffffffff00000774 00000000
3048bb08 : CommandBars!png_write_sig+0x3a64c 00000000005eed60 00007ffe
76d38057 : 0000000038e554f0 00000000
00000003 0000000000000003 00000000
005eeee0 : CommandBars!png_write_sig+0x309f5 00000000005eede0 00007ffe
76d3088c : 0000000000000001 00000000
00000001 0000000000000058 00007ffe
76bf70db : CommandBars!png_write_sig+0x2fe27 00000000005eefb0 00007ffe
76bf7b65 : 0000000000000000 00000000
00000001 0000000000000000 00000000
005ef278 : CommandBars!png_write_sig+0x2865c 00000000005ef030 00007ffe
76bf5454 : 00000000005ef350 00000000
00000001 0000000000000000 00007ffe
bfa5fde6 : CommandBars+0x97b65 00000000005ef170 00007ffe
76bf5a74 : 0000000004192ae0 00000000
00000002 0000000000000000 00000000
00000780 : CommandBars+0x95454 00000000005ef230 00007ffe
76bf6c59 : 00007ffe76bf6b90 00000000
005efaf0 0000000000000000 00000000
00002000 : CommandBars+0x95a74 00000000005ef320 00007ffe
5153ae20 : 0000000000000111 00007ffe
76bf6b90 0000000000000333 00000000
005ef4a0 : CommandBars+0x96c59 00000000005ef3a0 00007ffe
51539f8f : 0000000004192ae0 00000000
00000000 00000000005efaf0 00000000
00000000 : mfc140u!CWnd::OnWndMsg+0xe50 00000000005ef520 00007ffe
5153782e : 0000000000000000 00000000
0449b428 0000000000000000 00000000
00000361 : mfc140u!CWnd::WindowProc+0x3f 00000000005ef560 00007ffe
51537bf4 : 0000000000000361 00000000
00fc0f78 00000000005ef6b8 0000e116
48e9b0e5 : mfc140u!AfxCallWndProc+0x11e 00000000005ef650 00007ffe
76deb3ee : 00000000005efaf0 00000000
00fc0f78 0000000000000361 00007ffe
c1b17108 : mfc140u!AfxWndProc+0x54 00000000005ef690 00007ffe
c1afe7e8 : 0000000000000001 00000000
005efa20 0000000000000000 00000000
00000000 : CommandBars!DllUnregisterServer+0x197ee 00000000005ef6e0 00007ffe
c1afe36c : 0000000000fc0f78 00007ffe
76deb3a0 0000000000fc0f78 0000e116
00000361 : user32!UserCallWinProcCheckWow+0x2f8 00000000005ef870 00007ffe
c1b170f0 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : user32!DispatchClientMessage+0x9c 00000000005ef8d0 00007ffe
c23d0ef4 : 0000000000000000 00000000
5b114410 0000000000000000 00000000
00000004 : user32!_fnEMPTY+0x30 00000000005ef930 00007ffe
bfa21124 : 00007ffec1afdec3 00000000
00000000 0000000000001aad 00000000
00000000 : ntdll!KiUserCallbackDispatcherContinue 00000000005ef9b8 00007ffe
c1afdec3 : 0000000000000000 00000000
00001aad 0000000000000000 00000000
00000004 : win32u!NtUserMessageCall+0x14 00000000005ef9c0 00007ffe
c1afd61a : 0000000000fc0f78 00007ffe
40000000 0000000000000000 00000000
00000361 : user32!SendMessageWorker+0x823 00000000005efa60 00007ffe
76ddc4cc : 0000000000fc0f78 00000000
00000000 0000000000000000 00007ffe
76ddcb1c : user32!SendMessageW+0xda 00000000005efab0 00007ffe
76ddc0ea : 0000000003519558 00000000
03519558 0000000000000000 00000000
38e554f0 : CommandBars!DllUnregisterServer+0xa8cc 00000000005efb40 00007ffe
76bd11a3 : 00000000302e0e10 00000000
02d2a6b0 00000000005efe00 00000000
03519360 : CommandBars!DllUnregisterServer+0xa4ea 00000000005efbb0 00007ffe
76c2e5ad : 00007ffe76e1e120 00000000
38e554f0 0000000000000000 00000000
00000000 : CommandBars+0x711a3 00000000005efc00 00007ffe
76bc8268 : 0000000000000001 00000000
03519360 0000000000000000 00000000
38e554f0 : CommandBars+0xce5ad 00000000005efc70 00007ffe
76ddcef4 : 0000000003519360 00000000
00000000 0000000003519360 00000000
00000000 : CommandBars+0x68268 00000000005efca0 00007ffe
76ddb2a7 : 0000000003519360 00000000
00000000 0000000000000000 00000000
00000000 : CommandBars!DllUnregisterServer+0xb2f4 00000000005efcd0 00007ffe
5153a682 : 00000000000001f3 00000000
00000000 00000000000005d9 00000000
00000000 : CommandBars!DllUnregisterServer+0x96a7 00000000005efd00 00007ffe
76bff0d6 : 0000000003519360 00000000
00000000 0000000000000000 00000000
00000000 : mfc140u!CWnd::OnWndMsg+0x6b2 00000000005efe80 00007ffe
76ddba91 : 0000000000000113 00000000
00000000 0000000000001aad 00000000
03519360 : CommandBars+0x9f0d6 00000000005efed0 00007ffe
51539f8f : 0000000000000000 00000000
03519360 0000000000000113 00007ffe
5166f830 : CommandBars!DllUnregisterServer+0x9e91 00000000005eff90 00007ffe
5153782e : 0000000000000000 00000000
0449b428 0000000000001aad 00000000
00000113 : mfc140u!CWnd::WindowProc+0x3f 00000000005effd0 00007ffe
51537bf4 : 0000000000000113 00000000
00170af4 00000000005f0128 00000000
00f69bf0 : mfc140u!AfxCallWndProc+0x11e 00000000005f00c0 00007ffe
76deb3ee : 0000000000000000 00000000
00170af4 0000000000000113 00007ffe
c1b10e96 : mfc140u!AfxWndProc+0x54 00000000005f0100 00007ffe
c1afe7e8 : 0000000000000001 00000000
00001aad 0000000000000000 00000000
00000000 : CommandBars!DllUnregisterServer+0x197ee 00000000005f0150 00007ffe
c1afe47e : 0000000041045710 00007ffe
76deb3a0 0000000000170af4 00000000
00000113 : user32!UserCallWinProcCheckWow+0x2f8 00000000005f02e0 00007ffe
76c64208 : 000000000449b428 00000000
005f03b0 0000000000000113 00000000
00000000 : user32!CallWindowProcW+0x8e 00000000005f0330 00007ffe
c1afe7e8 : 0000000000000000 00000000
00000001 0000000000001aad 00000000
00000000 : CommandBars+0x104208 00000000005f03e0 00007ffe
c1afe229 : 00007ffec23ccf30 00007ffe
76c640c0 0000000000170af4 00000002
00000113 : user32!UserCallWinProcCheckWow+0x2f8 00000000005f0570 00007ffe
c1b1d931 : 00007ffe76c640c0 00000000
000000e5 0000000000290e60 00007ffe
c1af0000 : user32!DispatchMessageWorker+0x249 00000000005f05f0 00007ffe
c1b1d5a1 : 0000e11600000100 00000000
00010003 0000000000000000 00000000
00000000 : user32!DialogBox2+0x361 00000000005f0690 00007ffe
c1b6d22b : 0000000000010003 00000000
005f07f0 00000000005f0a10 00000000
3f250170 : user32!InternalDialogBox+0x12d 00000000005f06f0 00007ffe
c1b6bb45 : 0000000000000000 00000000
0000008f 00007ffe000002f0 00007ffe
00000000 : user32!SoftModalMessageBox+0x85b 00000000005f0840 00007ffe
c1b6c937 : 00007ffec249d070 00000000
00000012 000000000000000e 00000000
00000800 : user32!MessageBoxWorker+0x341 00000000005f09f0 00007ffe
c1b6c9be : 000000000000004a 00000000
3e30c420 00000000007e0420 00000000
005f0d01 : user32!MessageBoxTimeoutW+0x1a7 00000000005f0af0 00000000
07d560f6 : 0000000000001e44 00007ffe
a4e96c50 0000000000002edc 00000000
07d55de0 : user32!MessageBoxW+0x4e 00000000005f0b30 00007ffe
a4cda1c4 : 00000000000aa000 00000000
00000000 00000000005f1380 00000000
ffffffff : Ans_Common_WBCOM!DllUnregisterServer+0x2b136 00000000005f11f0 00007ffe
c01a0327 : 0000000000000000 00000000
005f1440 00007ffea4cda180 00000000
00000002 : mscoreei!InternalUnhandledExceptionFilter+0x41 00000000005f1220 00007ffe
c23ff608 : 0000000000000000 00007ffe
c01a0140 00000000005f1c00 00007ffe
a37762a0 : KERNELBASE!UnhandledExceptionFilter+0x1e7 00000000005f1340 00007ffe
c23d0e60 : 00000000005f20f0 00007ffe
c24a99a4 0000000000000000 00000000
00000000 : ntdll!LdrpLogFatalUserCallbackException+0x98 00000000005f1480 00007ffe
c23d241f : 00007ffec23d0e40 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!KiUserCallbackDispatcherHandler+0x20 00000000005f14c0 00007ffe
c23814a4 : 0000000000000000 00000000
005f1a30 00000000005f20f0 00000000
00000000 : ntdll!RtlpExecuteHandlerForException+0xf 00000000005f14f0 00007ffe
c23d0f4e : 0000000000000000 00000000
00000000 0000000041cb9e10 00000000
42992920 : ntdll!RtlDispatchException+0x244 00000000005f1c00 00007ffe
76d3ea43 : 0000001a0000003f 00000032
0000069a ffc00001ffc00001 00007ffe
76d4f1df : ntdll!KiUserExceptionDispatch+0x2e 00000000005f2390 00007ffe
76d32ea6 : 0000000041cb9e10 00013401
00001e44 000000004dba02c0 00000000
41cb9e10 : CommandBars!png_write_sig+0x36813 00000000005f2430 00007ffe
76bcbac6 : 00000000420e2080 00000000
00000000 0000000000000000 00000000
420e2080 : CommandBars!png_write_sig+0x2ac76 00000000005f2510 00007ffe
76bc8e26 : 00000000005f2670 00000000
00000000 0000000038e554f0 00000000
00000000 : CommandBars+0x6bac6 00000000005f2640 00007ffe
5153a63b : 000000000000012f 00000000
00000001 000000000000038d 00000000
00000000 : CommandBars+0x68e26 00000000005f2700 00007ffe
51539f8f : 0000000038e554f0 00000000
00000000 0000000000000000 00000000
00000000 : mfc140u!CWnd::OnWndMsg+0x66b 00000000005f2880 00007ffe
5153782e : 0000000000000000 00000000
0449b428 0000000000000000 00000000
0000000f : mfc140u!CWnd::WindowProc+0x3f 00000000005f28c0 00007ffe
51537bf4 : 000000000000000f 00000000
00130302 00000000005f2a18 00000000
0000000f : mfc140u!AfxCallWndProc+0x11e 00000000005f29b0 00007ffe
76deb3ee : 0000000000000000 00000000
00130302 000000000000000f 00000000
00000000 : mfc140u!AfxWndProc+0x54 00000000005f29f0 00007ffe
c1afe7e8 : 0000000000000001 00000000
005f2ec0 0000000000000000 00000000
00000000 : CommandBars!DllUnregisterServer+0x197ee 00000000005f2a40 00007ffe
c1afe36c : 0000000000000000 00007ffe
76deb3a0 0000000000130302 00000000
0000000f : user32!UserCallWinProcCheckWow+0x2f8 00000000005f2bd0 00007ffe
c1b10c23 : 0000000000000000 00000000
00000000 0000000000000000 00007ffe
c1afa553 : user32!DispatchClientMessage+0x9c 00000000005f2c30 00007ffe
c23d0ef4 : 0000fc17fc45fb9c 00007ffe
815f49fd 0000000000000003 00000000
00000000 : user32!_fnDWORD+0x33 00000000005f2c90 00007ffe
bfa21704 : 00007ffec1afe27a 00000000
005f34e0 00007ffec1d620f7 00000000
005f2de0 : ntdll!KiUserCallbackDispatcherContinue 00000000005f2d18 00007ffe
c1afe27a : 00000000005f34e0 00007ffe
c1d620f7 00000000005f2de0 00000000
005f2ec0 : win32u!NtUserDispatchMessage+0x14 00000000005f2d20 00007ffe
c1d61d5f : 00007ffe76deb3a0 00000000
005f34e0 00000000003a0000 00000000
0000000f : user32!DispatchMessageWorker+0x29a 00000000005f2da0 00007ffe
c1d24cda : 00000000005f0020 00000000
0000003a 0000000000843e70 00000000
00000000 : combase!CCliModalLoop::HandleWakeForMsg+0x1c3 00000000005f2e40 00007ffe
c1d5c27f : 00000026ece7f6d9 00000000
005f2f30 0000000000ff19f8 00000000
00843e70 : combase!CCliModalLoop::BlockFn+0x2de 00000000005f2f00 00007ffe
c1d5c022 : ffffffffffffffff 00000000
30244720 0000000030244720 00000000
00000000 : combase!ModalLoop+0xa3 00000000005f2f70 00007ffe
c1d2a74e : 0000000000843e70 00000000
005f3010 0000000000001e44 00007ffe
c238169a : combase!ClassicSTAThreadDispatchCrossApartmentCall+0x62 00000000005f2fb0 00007ffe
c1d25a73 : 0000000000843e70 00007ffe
c1edc478 0000000000000000 00000000
00843e70 : combase!CSyncClientCall::SendReceive2+0x78e 00000000005f34b0 00007ffe
c1d292fb : 0000000000000003 00000000
57b5c690 0000000000843e70 00007ffe
c1d09a14 : combase!ClassicSTAThreadSendReceive+0xa3 00000000005f35e0 00007ffe
c1d24614 : 000000005603f6b8 00000000
00000005 0000000000000001 00000000
00000001 : combase!CSyncClientCall::SendReceive+0x18b 00000000005f3810 00007ffe
c1d5633e : 00000000005f3a30 00000000
005f3fd0 00000000005f8fb0 00000000
005f3fd0 : combase!CClientChannel::SendReceive+0x84 00000000005f3880 00007ffe
c210c334 : 00000000005f3c60 00000000
00000000 00000000005f8fb0 00000000
005f3fd0 : combase!NdrExtpProxySendReceive+0x4e 00000000005f38b0 00007ffe
c1d50c28 : 00007ffec1f03308 00000000
005f4000 0000000000000000 00000000
00000000 : rpcrt4!NdrpClientCall3+0x3a4 00000000005f3c20 00007ffe
c1dcfd72 : 0000000000000000 00000000
00843e70 00000000005f4100 00000000
005f4100 : combase!ObjectStublessClient+0x138 00000000005f3fb0 00007ffe
c1d23fe6 : 000000005603f6b8 00000000
00000001 0000000042992920 00000000
00000000 : combase!ObjectStubless+0x42 STACK_COMMAND: ~0s; .ecxr ; kb SYMBOL_NAME: CommandBars+39217 MODULE_NAME: CommandBars IMAGE_NAME: CommandBars.ocx FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_CommandBars.ocx!Unknown OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 IMAGE_VERSION: 18.3.0.0 FAILURE_ID_HASH: {b2b5678f-ce4b-679d-9243-60d5b971c000} Followup: MachineOwner ---------