Thanks for your input. However !analyze -v is just giving the basic info of access violation.
0:000> !analyze -v
Failed to request MethodData, not in JIT code range
GetUrlPageData2 (WinHttp) failed: 12002.
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
Timeline: !analyze.Start
Name:
Time: 2019-02-03T15:22:33.728Z
Diff: 0 mSec
Timeline: Dump.Current
Name:
Time: 2018-11-21T06:46:21.0Z
Diff: 0 mSec
Timeline: Process.Start
Name:
Time: 2018-11-21T06:43:55.0Z
Diff: 146000 mSec
Timeline: OS.Boot
Name:
Time: 2018-11-21T06:29:24.0Z
Diff: 1017000 mSec
DUMP_CLASS: 2
DUMP_QUALIFIER: 400
CONTEXT: (.ecxr)
eax=aa893f00 ebx=150b6f00 ecx=153ec728 edx=153fcec0 esi=153fe330 edi=153ec728
eip=aa893f00 esp=008ff080 ebp=008ff09c iopl=0 nv up ei ng nz ac po cy
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210293
aa893f00 ?? ???
Resetting default scope
FAULTING_IP:
+0
aa893f00 ?? ???
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: aa893f00
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: aa893f00
Attempt to execute non-executable address aa893f00
DEFAULT_BUCKET_ID: SOFTWARE_NX_FAULT_NOSOS
FOLLOWUP_IP:
TestExe!TestClass::TestFun+5a [d:\test1.cpp @ 666]
68b18a3a 5f pop edi
EXECUTE_ADDRESS: ffffffffaa893f00
FAILED_INSTRUCTION_ADDRESS:
+0
aa893f00 ?? ???
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 00000008
EXCEPTION_PARAMETER2: aa893f00
WATSON_BKT_PROCSTAMP: 5b200407
WATSON_BKT_PROCVER:
PROCESS_VER_PRODUCT:
WATSON_BKT_MODULE: unknown
WATSON_BKT_MODVER: 0.0.0.0
WATSON_BKT_MODOFFSET: aa893f00
WATSON_BKT_MODSTAMP: bbbbbbb4
BUILD_VERSION_STRING: 16299.637.x86fre.rs3_release_svc.180808-1748
MODLIST_WITH_TSCHKSUM_HASH: 4fa44ef499a598dd3049e7ec1bdff9993cd7e8e5
MODLIST_SHA1_HASH: 35536f12d4499a01b162b44e9f48f11557abf195
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS: 0
PRODUCT_TYPE: 1
SUITE_MASK: 272
DUMP_FLAGS: c07
DUMP_TYPE: 3
PROCESS_NAME: unknown
MISSING_CLR_SYMBOL: 0
ANALYSIS_SESSION_HOST:
ANALYSIS_SESSION_TIME: 02-03-2019 20:52:33.0728
ANALYSIS_VERSION: 10.0.17763.132 x86fre
MANAGED_CODE: 1
MANAGED_ENGINE_MODULE: clr
MANAGED_ANALYSIS_PROVIDER: SOS
THREAD_ATTRIBUTES:
OS_LOCALE: JPN
ADDITIONAL_DEBUG_TEXT: SOS.DLL is not loaded for managed code. Analysis might be incomplete
BUGCHECK_STR: APPLICATION_FAULT_SOFTWARE_NX_FAULT_INVALID_POINTER_INVALID_POINTER_EXECUTE_NOSOS
PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT
PROBLEM_CLASSES:
ID: [0n313]
Type: [@ACCESS_VIOLATION]
Class: Addendum
Scope: BUCKET_ID
Name: Omit
Data: Omit
PID: [Unspecified]
TID: [0x1c44]
Frame: [0] : unknown!unknown
ID: [0n287]
Type: [INVALID_POINTER_EXECUTE]
Class: Primary
Scope: BUCKET_ID
Name: Add
Data: Omit
PID: [Unspecified]
TID: [0x1c44]
Frame: [0] : unknown!unknown
ID: [0n295]
Type: [SOFTWARE_NX_FAULT]
Class: Primary
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x1d2c]
TID: [0x1c44]
Frame: [0] : unknown!unknown
ID: [0n293]
Type: [INVALID_POINTER]
Class: Primary
Scope: BUCKET_ID
Name: Add
Data: Omit
PID: [0x1d2c]
TID: [0x1c44]
Frame: [0] : unknown!unknown
ID: [0n251]
Type: [NOSOS]
Class: Addendum
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [Unspecified]
TID: [Unspecified]
Frame: [0]
IP_ON_HEAP: aa893f00
The fault address in not in any loaded module, please check your build’s rebase
log at \bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.
LAST_CONTROL_TRANSFER: from 68b18a3a to aa893f00
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
008ff07c 68b18a3a 00000006 153fe330 00000000 0xaa893f00
008ff09c 68b09c4b 68cf0960 68ed04f0 d34f3ed9 TestExe!TestClass::TestFun1+0x5a
008ff0d4 68b31a54 00000002 68cf0960 68ed04f0 TestExe!TestClass::TestFun2+0x11b
Here it says the IP_ON_HEAP aa893f00, does that mean it is causing some heap corruption? But in my opinion this should be the function address pointing to next function. 153fe330 this address is on heap which I have checked is fine.
Please have a look, if you could provide more insight on this. Thanks!!!