Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\temp\crash_aladin_window_close.dmp] User Mini Dump File with Full Memory: Only application data is available Symbol search path is: srv* Executable search path is: Windows 10 Version 14393 MP (4 procs) Free x64 Product: WinNt, suite: SingleUserTS 10.0.14393.2097 (rs1_release_1.180212-1105) Machine Name: Debug session time: Tue May 22 15:31:26.000 2018 (UTC + 2:00) System Uptime: 1 days 20:19:46.662 Process Uptime: 0 days 0:25:39.000 ................................................................ ................................................................ ................................................................ ................................................................ ............................ This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (328c.2584): Unknown exception - code c0000374 (first/second chance not available) ntdll!RtlReportCriticalFailure+0x97: 00007ffc`9cf08363 eb00 jmp ntdll!RtlReportCriticalFailure+0x99 (00007ffc`9cf08365) 0:032> .symfix+ c:\symbols 0:032> .reload ................................................................ ................................................................ ................................................................ ................................................................ ............................ 0:032> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** WARNING: Unable to verify checksum for etree.pyd *** ERROR: Symbol file could not be found. Defaulted to export symbols for omnithread40_vc14_rt.dll - *** ERROR: Symbol file could not be found. Defaulted to export symbols for _omnipy.pyd - *** ERROR: Symbol file could not be found. Defaulted to export symbols for omniORB421_vc14_rt.dll - KEY_VALUES_STRING: 1 TIMELINE_ANALYSIS: 1 Timeline: !analyze.Start Name: Time: 2018-05-28T08:27:34.90Z Diff: 500168090 mSec Timeline: Dump.Current Name: Time: 2018-05-22T13:31:26.0Z Diff: 0 mSec Timeline: Process.Start Name: Time: 2018-05-22T13:05:47.0Z Diff: 1539000 mSec Timeline: OS.Boot Name: Time: 2018-05-20T17:11:40.0Z Diff: 159586000 mSec DUMP_CLASS: 2 DUMP_QUALIFIER: 400 CONTEXT: (.ecxr) rax=0000000000000000 rbx=000000004a80ee30 rcx=0000000000000003 rdx=00007ffc9ce58244 rsi=000000004a80e7d0 rdi=000000004a80e7d0 rip=00007ffc9cf08363 rsp=000000004a80ede0 rbp=0000000000000000 r8=0000000000000000 r9=000000004a80e8d0 r10=0000000058d49726 r11=0000000210ded300 r12=0000000058f247c0 r13=0000000058d62b40 r14=00000000014d0000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 efl=00000200 ntdll!RtlReportCriticalFailure+0x97: 00007ffc`9cf08363 eb00 jmp ntdll!RtlReportCriticalFailure+0x99 (00007ffc`9cf08365) Resetting default scope FAULTING_IP: ntdll!RtlReportCriticalFailure+97 00007ffc`9cf08363 eb00 jmp ntdll!RtlReportCriticalFailure+0x99 (00007ffc`9cf08365) EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ffc9cf08363 (ntdll!RtlReportCriticalFailure+0x0000000000000097) ExceptionCode: c0000374 ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 00007ffc9cf606b0 PROCESS_NAME: python.exe ERROR_CODE: (NTSTATUS) 0xc0000374 - A heap has been corrupted. EXCEPTION_CODE: (NTSTATUS) 0xc0000374 - A heap has been corrupted. EXCEPTION_CODE_STR: c0000374 EXCEPTION_PARAMETER1: 00007ffc9cf606b0 WATSON_BKT_PROCSTAMP: 56634c02 WATSON_BKT_MODULE: ntdll.dll WATSON_BKT_MODSTAMP: 59b0d03e WATSON_BKT_MODOFFSET: f8363 WATSON_BKT_MODVER: 10.0.14393.1715 MODULE_VER_PRODUCT: Microsoft® Windows® Operating System BUILD_VERSION_STRING: 10.0.14393.2097 (rs1_release_1.180212-1105) MODLIST_WITH_TSCHKSUM_HASH: 010a927f1b16e5dd00963939b761d151fac62bf5 MODLIST_SHA1_HASH: b5d47d366e231f7f9438c0d6d3215c5529958c8f NTGLOBALFLAG: 0 APPLICATION_VERIFIER_FLAGS: 0 PRODUCT_TYPE: 1 SUITE_MASK: 272 DUMP_FLAGS: c07 DUMP_TYPE: 3 ANALYSIS_SESSION_HOST: DESKTOP-KKGPK58 ANALYSIS_SESSION_TIME: 05-28-2018 10:27:34.0090 ANALYSIS_VERSION: 10.0.17134.12 amd64fre THREAD_ATTRIBUTES: ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD] LAST_CONTROL_TRANSFER: from 00007ffc9cf08cba to 00007ffc9cf08363 FAULTING_THREAD: ffffffff THREAD_SHA1_HASH_MOD_FUNC: 3ff17611322eddf459835c166ca0546b51067611 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c1673f21742cea9bbdd8b8cf718c4a7ae6795d18 OS_LOCALE: DEU PROBLEM_CLASSES: ID: [0n258] Type: [HEAP_CORRUPTION] Class: Primary Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix) BUCKET_ID Name: Add Data: Omit PID: [Unspecified] TID: [0x2584] Frame: [0] : ntdll!RtlReportCriticalFailure ID: [0n257] Type: [ACTIONABLE] Class: Addendum Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix) BUCKET_ID Name: Add Data: Omit PID: [0x328c] TID: [0x2584] Frame: [3] : ntdll!RtlFreeHeap ID: [0n157] Type: [BIASED_HEAP_BLOCK] Class: Addendum Scope: BUCKET_ID Name: Add Data: Omit PID: [0x328c] TID: [0x2584] Frame: [3] : ntdll!RtlFreeHeap BUGCHECK_STR: HEAP_CORRUPTION_ACTIONABLE_BIASED_HEAP_BLOCK DEFAULT_BUCKET_ID: HEAP_CORRUPTION_ACTIONABLE PRIMARY_PROBLEM_CLASS: HEAP_CORRUPTION STACK_TEXT: 00007ffc`9cf60718 00007ffc`9ce4c8d3 ntdll!RtlFreeHeap+0x143 00007ffc`9cf60720 00000000`59cfcabc msvcr90!free+0x1c 00007ffc`9cf60728 00000001`8016b2f5 etree!xmlFreeNodeList+0x155 00007ffc`9cf60730 00000001`8016b240 etree!xmlFreeNodeList+0xa0 00007ffc`9cf60738 00000001`8016b240 etree!xmlFreeNodeList+0xa0 00007ffc`9cf60740 00000001`8016b240 etree!xmlFreeNodeList+0xa0 00007ffc`9cf60748 00000001`8016b240 etree!xmlFreeNodeList+0xa0 00007ffc`9cf60750 00000001`8016b240 etree!xmlFreeNodeList+0xa0 00007ffc`9cf60758 00000001`8016b240 etree!xmlFreeNodeList+0xa0 00007ffc`9cf60760 00000001`8016ae54 etree!xmlFreeDoc+0xd4 00007ffc`9cf60768 00000001`8005c634 etree!__pyx_tp_dealloc_4lxml_5etree__Document+0x34 00007ffc`9cf60770 00000001`800dc425 etree!__pyx_tp_dealloc_4lxml_5etree__Element+0x65 00007ffc`9cf60778 00000000`58d1eedb python27!dict_dealloc+0xdb 00007ffc`9cf60780 00000000`58d62e30 python27!subtype_dealloc+0x2f0 00007ffc`9cf60788 00000000`58d1eedb python27!dict_dealloc+0xdb 00007ffc`9cf60790 00000000`58d62b10 python27!subtype_clear+0x130 00007ffc`9cf60798 00000000`58c9c76b python27!delete_garbage+0x9b 00007ffc`9cf607a0 00000000`58c9cd6e python27!collect+0x4be 00007ffc`9cf607a8 00000000`58c9d23d python27!gc_collect+0x6d 00007ffc`9cf607b0 00000000`58d469e6 python27!PyCFunction_Call+0x76 00007ffc`9cf607b8 00000000`58dab817 python27!call_function+0x327 00007ffc`9cf607c0 00000000`58da8d0b python27!PyEval_EvalFrameEx+0x39eb 00007ffc`9cf607c8 00000000`58dab9e8 python27!fast_function+0xc8 00007ffc`9cf607d0 00000000`58dab8a7 python27!call_function+0x3b7 00007ffc`9cf607d8 00000000`58da8d0b python27!PyEval_EvalFrameEx+0x39eb 00007ffc`9cf607e0 00000000`58dab9e8 python27!fast_function+0xc8 00007ffc`9cf607e8 00000000`58dab8a7 python27!call_function+0x3b7 00007ffc`9cf607f0 00000000`58da8d0b python27!PyEval_EvalFrameEx+0x39eb 00007ffc`9cf607f8 00000000`58daa281 python27!PyEval_EvalCodeEx+0x911 00007ffc`9cf60800 00000000`58d34b68 python27!function_call+0x178 00007ffc`9cf60808 00000000`58d00f13 python27!PyObject_Call+0x83 00007ffc`9cf60810 00000000`58d156f9 python27!instancemethod_call+0x219 STACK_COMMAND: !heap ; ** Pseudo Context ** HeapPseudo ** Value: 16440092450 ** ; kb THREAD_SHA1_HASH_MOD: 64ca86097c9cce41a6214b6e090868cb596968c7 FOLLOWUP_IP: etree!xmlFreeNodeList+155 [c:\temp\libxml2-win-binaries\libxml2\tree.c @ 3720] 00000001`8016b2f5 488bcb mov rcx,rbx FAULT_INSTR_CODE: ffcb8b48 FAULTING_SOURCE_LINE: c:\temp\libxml2-win-binaries\libxml2\tree.c FAULTING_SOURCE_FILE: c:\temp\libxml2-win-binaries\libxml2\tree.c FAULTING_SOURCE_LINE_NUMBER: 3720 FAULTING_SOURCE_CODE: 3716: if ((cur->name != NULL) && 3717: (cur->type != XML_TEXT_NODE) && 3718: (cur->type != XML_COMMENT_NODE)) 3719: DICT_FREE(cur->name) > 3720: xmlFree(cur); 3721: } 3722: cur = next; 3723: } 3724: } 3725: SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: etree!xmlFreeNodeList+155 FOLLOWUP_NAME: MachineOwner MODULE_NAME: etree IMAGE_NAME: etree.pyd DEBUG_FLR_IMAGE_TIMESTAMP: 5b0408d9 FAILURE_BUCKET_ID: HEAP_CORRUPTION_ACTIONABLE_c0000374_etree.pyd!xmlFreeNodeList BUCKET_ID: HEAP_CORRUPTION_ACTIONABLE_BIASED_HEAP_BLOCK_etree!xmlFreeNodeList+155 FAILURE_EXCEPTION_CODE: c0000374 FAILURE_IMAGE_NAME: etree.pyd BUCKET_ID_IMAGE_STR: etree.pyd FAILURE_MODULE_NAME: etree BUCKET_ID_MODULE_STR: etree FAILURE_FUNCTION_NAME: xmlFreeNodeList BUCKET_ID_FUNCTION_STR: xmlFreeNodeList BUCKET_ID_OFFSET: 155 BUCKET_ID_MODTIMEDATESTAMP: 5b0408d9 BUCKET_ID_MODCHECKSUM: 0 BUCKET_ID_MODVER_STR: 0.0.0.0 BUCKET_ID_PREFIX_STR: HEAP_CORRUPTION_ACTIONABLE_BIASED_HEAP_BLOCK_ FAILURE_PROBLEM_CLASS: HEAP_CORRUPTION FAILURE_SYMBOL_NAME: etree.pyd!xmlFreeNodeList TARGET_TIME: 2018-05-22T13:31:26.000Z OSBUILD: 14393 OSSERVICEPACK: 2189 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt SingleUserTS USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-03-30 05:32:56 BUILDDATESTAMP_STR: 180212-1105 BUILDLAB_STR: rs1_release_1 BUILDOSVER_STR: 10.0.14393.2097 ANALYSIS_SESSION_ELAPSED_TIME: 1e84d ANALYSIS_SOURCE: UM FAILURE_ID_HASH_STRING: um:heap_corruption_actionable_c0000374_etree.pyd!xmlfreenodelist FAILURE_ID_HASH: {6268c00b-5d58-c1a4-4027-2c993f25fba4} Followup: MachineOwner --------- 0:032> !heap ************************************************************** * * * HEAP ERROR DETECTED * * * ************************************************************** Details: Heap address: 00000000014d0000 Error address: 000000000e756fdc Error type: HEAP_FAILURE_INVALID_ARGUMENT Details: The caller tried to a free a block at an invalid (unaligned) address. Follow-up: Check the error's stack trace to find the culprit. Stack trace: 00007ffc9ce4c8d3: ntdll!RtlFreeHeap+0x0000000000000143 0000000059cfcabc: msvcr90!free+0x000000000000001c 000000018016b2f5: etree!xmlFreeNodeList+0x0000000000000155 000000018016b240: etree!xmlFreeNodeList+0x00000000000000a0 000000018016b240: etree!xmlFreeNodeList+0x00000000000000a0 000000018016b240: etree!xmlFreeNodeList+0x00000000000000a0 000000018016b240: etree!xmlFreeNodeList+0x00000000000000a0 000000018016b240: etree!xmlFreeNodeList+0x00000000000000a0 000000018016b240: etree!xmlFreeNodeList+0x00000000000000a0 000000018016ae54: etree!xmlFreeDoc+0x00000000000000d4 000000018005c634: etree!__pyx_tp_dealloc_4lxml_5etree__Document+0x0000000000000034 00000001800dc425: etree!__pyx_tp_dealloc_4lxml_5etree__Element+0x0000000000000065 0000000058d1eedb: python27!dict_dealloc+0x00000000000000db 0000000058d62e30: python27!subtype_dealloc+0x00000000000002f0 0000000058d1eedb: python27!dict_dealloc+0x00000000000000db 0000000058d62b10: python27!subtype_clear+0x0000000000000130 Heap Address NT/Segment Heap 1510000 NT Heap f30000 NT Heap 33e0000 NT Heap 14d0000 NT Heap c7c0000 NT Heap c740000 NT Heap 1e070000 NT Heap