Our company is using program called visualizer
.
It doesn't work at some computer and It seems It can't get the dll files.
Below is log which I extract with Windbg
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed,
duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.046
seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27725.1000 X86
Copyright (c) Microsoft Corporation. All rights reserved.
CommandLine: C:\Users\scanner\Desktop\Visualizer\Release\Visualizer.exe
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
ModLoad: 00c20000 0117b000 Visualizer.exe
ModLoad: 77a30000 77bd4000 ntdll.dll
ModLoad: 77240000 77330000 C:\windows\SysWOW64\KERNEL32.DLL
ModLoad: 758a0000 75ae0000 C:\windows\SysWOW64\KERNELBASE.dll
ModLoad: 68170000 681b3000 C:\Program Files (x86)\CheckPoint\Endpoint
Security\EFR\wow64\SBA_ISWWH.dll
ModLoad: 68090000 680e1000 C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnt32.dll
ModLoad: 77540000 776dc000 C:\windows\SysWOW64\USER32.dll
ModLoad: 75ae0000 75af8000 C:\windows\SysWOW64\win32u.dll
ModLoad: 77180000 771a3000 C:\windows\SysWOW64\GDI32.dll
ModLoad: 76440000 76525000 C:\windows\SysWOW64\gdi32full.dll
ModLoad: 77890000 7790b000 C:\windows\SysWOW64\msvcp_win.dll
ModLoad: 77420000 77540000 C:\windows\SysWOW64\ucrtbase.dll
ModLoad: 76fb0000 7702e000 C:\windows\SysWOW64\ADVAPI32.dll
ModLoad: 76c20000 76cdf000 C:\windows\SysWOW64\msvcrt.dll
ModLoad: 76d70000 76de7000 C:\windows\SysWOW64\sechost.dll
ModLoad: 76df0000 76eac000 C:\windows\SysWOW64\RPCRT4.dll
ModLoad: 779f0000 77a09000 C:\windows\SysWOW64\bcrypt.dll
ModLoad: 75e60000 7643a000 C:\windows\SysWOW64\SHELL32.dll
ModLoad: 776e0000 77725000 C:\windows\SysWOW64\SHLWAPI.dll
ModLoad: 77330000 77413000 C:\windows\SysWOW64\ole32.dll
ModLoad: 75bd0000 75e51000 C:\windows\SysWOW64\combase.dll
ModLoad: 76530000 765c6000 C:\windows\SysWOW64\OLEAUT32.dll
ModLoad: 771c0000 77223000 C:\windows\SysWOW64\WS2_32.dll
ModLoad: 779c0000 779e5000 C:\windows\SysWOW64\IMM32.dll
ModLoad: 5f660000 5fae3000 C:\Users\scanner\Desktop\Visualizer\Release\cpprest140_2_9.dll
ModLoad: 77730000 7782e000 C:\windows\SysWOW64\CRYPT32.dll
ModLoad: 75500000 75508000 C:\windows\SysWOW64\VERSION.dll
ModLoad: 67f90000 67f96000 C:\windows\SysWOW64\MSIMG32.dll
ModLoad: 6d450000 6d4cd000 C:\windows\SysWOW64\WINSPOOL.DRV
ModLoad: 77090000 77117000 C:\windows\SysWOW64\shcore.dll
ModLoad: 717a0000 719b0000 C:\windows\WinSxS\x86_microsoft.windowsmon-
controls_6595b64144ccf1df_6.0.19041.4355_none_a865f0c28672571c\COMCTL32.dll
ModLoad: 71720000 71794000 C:\windows\SysWOW64\UxTheme.dll
ModLoad: 67430000 6745c000 C:\windows\SysWOW64\oledlg.dll
ModLoad: 6c3e0000 6c548000
C:\windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.5369_none_d9518ab7e104
4dec\gdiplus.dll
ModLoad: 673d0000 67423000 C:\windows\SysWOW64\OLEACC.dll
ModLoad: 748b0000 74d06000 C:\windows\SysWOW64\WININET.dll
ModLoad: 735c0000 735e8000 C:\windows\SysWOW64\WINMM.dll
ModLoad: 74d50000 74e1b000 C:\windows\SysWOW64\WINHTTP.dll
ModLoad: 67b30000 67b3b000 C:\windows\SysWOW64\HTTPAPI.dll
ModLoad: 75020000 7508d000 C:\windows\SysWOW64\MSVCP140.dll
ModLoad: 67390000 673ce000 C:\windows\SysWOW64\CONCRT140.dll
ModLoad: 74d10000 74d25000 C:\windows\SysWOW64\VCRUNTIME140.dll
ModLoad: 73330000 7333a000 C:\windows\SysWOW64\CRYPTBASE.DLL
ModLoad: 745e0000 745e8000 C:\windows\SysWOW64\DPAPI.DLL
(3f1c.14cc): Break instruction exception - code 80000003 (first chance)
eax=00000000 ebx=00000000 ecx=e3f90000 edx=00000000 esi=77a36998 edi=77a3691c
eip=77ae1b02 esp=008ff78c ebp=008ff7b8 iopl=0 nv up ei pl zr na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246
ntdll!LdrpDoDebuggerBreak+0x2b:
77ae1b02 cc int 3
0:000> g
ModLoad: 67fa0000 67ff8000 C:\Program Files (x86)\Manufacturer\Endpoint Agent\prntm.dll
ModLoad: 75510000 7551a000 C:\windows\SysWOW64\Secur32.dll
ModLoad: 6c9d0000 6cabe000 C:\windows\SysWOW64\MSVCR120.dll
ModLoad: 6c950000 6c9c1000 C:\windows\SysWOW64\MSVCP120.dll
ModLoad: 745f0000 74611000 C:\windows\SysWOW64\SSPICLI.DLL
ModLoad: 6a080000 6a09e000 C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphusr32.dll
ModLoad: 77830000 7788f000 C:\windows\SysWOW64\bcryptPrimitives.dll
ModLoad: 76ed0000 76fa4000 C:\windows\SysWOW64\MSCTF.dll
ModLoad: 63460000 634f7000 C:\windows\SysWOW64\TextShaping.dll
ModLoad: 73c30000 73c3f000 C:\windows\SysWOW64\kernel.appcore.dll
ModLoad: 67a70000 67b29000 C:\windows\SysWOW64\textinputframework.dll
ModLoad: 658e0000 65b5f000 C:\windows\SysWOW64\CoreUIComponents.dll
ModLoad: 679d0000 67a6b000 C:\windows\SysWOW64\CoreMessaging.dll
ModLoad: 74580000 745a9000 C:\windows\SysWOW64\ntmarta.dll
ModLoad: 69030000 6910d000 C:\windows\SysWOW64\wintypes.dll
ModLoad: 75b00000 75b7e000 C:\windows\SysWOW64\clbcatq.dll
ModLoad: 66fe0000 6709a000 C:\Windows\SysWOW64\IME\IMEKR\imkrtip.dll
ModLoad: 6e600000 6e6c2000 C:\windows\SysWOW64\PROPSYS.dll
ModLoad: 66a30000 66b3a000 C:\Windows\SysWOW64\IME\shared\imetip.dll
ModLoad: 5eab0000 5ec0f000 C:\windows\SysWOW64\DUI70.dll
ModLoad: 67910000 67942000 C:\Windows\SysWOW64\IME\IMEKR\imkrapi.dll
ModLoad: 66480000 66503000 C:\windows\SysWOW64\policymanager.dll
ModLoad: 66540000 665a5000 C:\windows\SysWOW64\msvcp110_win.dll
ModLoad: 66c30000 66c64000 C:\Windows\SysWOW64\IME\shared\imjkapi.dll
(3f1c.1264): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000000 ebx=0133057c ecx=01330568 edx=0187f57c esi=00000000 edi=0187f5c8
eip=00dc79aa esp=0187f4a4 ebp=0187f4c8 iopl=0 nv up ei ng nz na po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010282
Visualizer+0x1a79aa:
00dc79aa 8b30 mov esi,dword ptr [eax] ds:002b:00000000=????????
0:001> g
(3f1c.1264): Access violation - code c0000005 (!!! second chance !!!)
eax=00000000 ebx=0133057c ecx=01330568 edx=0187f57c esi=00000000 edi=0187f5c8
eip=00dc79aa esp=0187f4a4 ebp=0187f4c8 iopl=0 nv up ei ng nz na po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010282
Visualizer+0x1a79aa:
00dc79aa 8b30 mov esi,dword ptr [eax] ds:002b:00000000=????????
0:001> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 812
Key : Analysis.Elapsed.mSec
Value: 1830
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 33329
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 x86fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Failure.Bucket
Value: NULL_POINTER_READ_c0000005_Visualizer.exe!Unknown
Key : Failure.Hash
Value: {22b1ab51-e642-1320-e621-1780ff300e90}
Key : Timeline.OS.Boot.DeltaSec
Value: 166235
Key : Timeline.Process.Start.DeltaSec
Value: 33
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
Key : WER.Process.Version
Value: 1.0.0.1
NTGLOBALFLAG: 70
APPLICATION_VERIFIER_FLAGS: 0
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00dc79aa (Visualizer+0x001a79aa)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000000
Attempt to read from address 00000000
FAULTING_THREAD: 00001264
PROCESS_NAME: Visualizer.exe
READ_ADDRESS: 00000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p . %s .
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000000
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
0187f4c8 00dc7b9d 0133057c 00000000 0187f51c Visualizer+0x1a79aa
0187f4d8 00c58028 0133057c f0712385 0187f5c8 Visualizer+0x1a7b9d
0187f51c 00c3cdc8 01330bc8 f07123c1 ffffffff Visualizer+0x38028
0187f558 00c3cb64 0187f62c 0187f57c 01330bc8 Visualizer+0x1cdc8
0187f608 00c3bc33 0187f62c 0187f634 0132cc68 Visualizer+0x1cb64
0187f648 00c3abc3 f07120e9 0132d0f8 0132d2e8 Visualizer+0x1bc33
0187f670 00c37543 f0712031 00dc740e 0132d2e8 Visualizer+0x1abc3
0187f6a8 00c5b137 f071205d 01328a78 0187f6e0 Visualizer+0x17543
0187f6c4 00c5b02e 0132d2e8 f0712075 00c5aff0 Visualizer+0x3b137
0187f6ec 00dc7424 01328a78 0132d348 0187f730 Visualizer+0x3b02e
0187f6fc 77a66d64 0187f810 01328a78 0132d348 Visualizer+0x1a7424
0187f730 77a65e02 0187f810 0132d3c0 e18d4cc2 ntdll!TppWorkpExecuteCallback+0x144
0187f8e4 7725fcc9 012807f0 7725fcb0 0187f950 ntdll!TppWorkerThread+0x472
0187f8f4 77a9809e 012807f0 e18d4d76 00000000 KERNEL32!BaseThreadInitThunk+0x19
0187f950 77a9806e ffffffff 77ab913e 00000000 ntdll!__RtlUserThreadStart+0x2f
0187f960 00000000 77a65990 012807f0 00000000 ntdll!_RtlUserThreadStart+0x1b
STACK_COMMAND: ~1s ; .cxr ; kb
SYMBOL_NAME: Visualizer+1a79aa
MODULE_NAME: Visualizer
IMAGE_NAME: Visualizer.exe
FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_Visualizer.exe!Unknown
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x86
OSNAME: Windows 10
IMAGE_VERSION: 1.0.0.1
FAILURE_ID_HASH: {22b1ab51-e642-1320-e621-1780ff300e90}
Followup: MachineOwner
---------
0:001> .exr -1
ExceptionAddress: 00dc79aa (Visualizer+0x001a79aa)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000000
Attempt to read from address 00000000
And when I reset the window, that program worked well. But it's impossible every moment that program doesn't work, reset the OS.
Please give me the advice for it. Thank you.