Hi,
we have A CRM application having some customer related scenarios, like create customer, accounts,address etc.
while, when we browse through the Create Customer scenario from lets say, page1 to page2 the browser is getting crashed.
the same scenario is working fine in all earlier versions of IE and other browsers like chorome.
below is the Crash dump analysis and Event viewer logs. appreciate the help provided
Event Viewer:
-----------
Faulting application name: IEXPLORE.EXE, version: 11.0.9600.17207, time stamp: 0x53a20c50
Faulting module name: MSHTML.dll, version: 11.0.9600.17207, time stamp: 0x53a22b71
Exception code: 0xc0000005
Fault offset: 0x000b4642
Faulting process id: 0x2140
Faulting application start time: 0x01cfd3d7a8a61dfc
Faulting application path: C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
Faulting module path: C:\windows\system32\MSHTML.dll
Report Id: 177f4288-3fcb-11e4-9783-d4bed98dc920
Crash Dump:
------------
0:005:x86> !analyze -v
*******************************************************************************
*
*
* Exception Analysis
*
*
*
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for IPSBHO.DLL -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for Scxpx86.DLL -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for jvm.dll -
*** WARNING: Unable to verify checksum for atidxx32.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for atidxx32.dll -
FAULTING_IP:
wow64cpu!CpupReturnFromSimulatedCode+0
7536271e 6744 inc esp
EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000000007536271e (wow64cpu!CpupReturnFromSimulatedCode)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: 0000000000000000 -- (.cxr 0x0;r)
eax=00000000 ebx=0331dd60 ecx=0e6bfa30 edx=132d7f38 esi=fffffffe edi=00000000
eip=66d94642 esp=0400b0d8 ebp=0400b394 iopl=0 nv up ei pl nz na po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
MSHTML!CElement::ComputeFormatsVirtual+0x13d:
66d94642 f7809c01000000080000 test dword ptr [eax+19Ch],800h ds:002b:0000019c=????????
FAULTING_THREAD: 0000000000002e38
PROCESS_NAME: IEXPLORE.EXE
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: 0000000000000000
FOLLOWUP_IP:
wow64cpu!CpupReturnFromSimulatedCode+0
7536271e 6744 inc esp
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
CHKIMG_EXTENSION: !chkimg -lo 50 -d !KERNEL32
76fc3490-76fc3496 7 bytes - KERNEL32!FreeLibraryStub+8
[ 90 90 90 90 90 8b ff:e9 95 cc 69 8d eb f9 ]
7 errors : !KERNEL32 (76fc3490-76fc3496)
APP: iexplore.exe
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from 0000000067369b63 to 0000000066d94642
ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
BUGCHECK_STR: APPLICATION_FAULT_MEMORY_CORRUPTION_NULL_POINTER_READ_ZEROED_STACK_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
DEFAULT_BUCKET_ID: MEMORY_CORRUPTION_LARGE
STACK_TEXT:
00000000`00000000 00000000`00000000 memory_corruption!KERNEL32+0x0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: memory_corruption!KERNEL32
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: ** Pseudo Context ** ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_c0000005_memory_corruption!KERNEL32
BUCKET_ID: X64_APPLICATION_FAULT_MEMORY_CORRUPTION_NULL_POINTER_READ_ZEROED_STACK_LARGE_memory_corruption!KERNEL32
IMAGE_NAME: memory_corruption
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:memory_corruption_large_c0000005_memory_corruption!kernel32
FAILURE_ID_HASH: {a0ab76e6-7b43-6c55-901f-3d438fac77d6}
Followup: MachineOwner
thanks