************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.063 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 46
Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\hazar\AppData\Local\Temp\2e8cbade-de76-4eee-81d5-8241c4823916_2025_1122_0147.zip.2025_1122_0147.zip\MiniDump.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 26200 MP (12 procs) Free x64
Product: WinNt, suite: SingleUserTS Personal
Edition build lab: 26100.1.amd64fre.ge_release.240331-1435
Debug session time: Sat Nov 22 01:47:45.000 2025 (UTC + 3:00)
System Uptime: 0 days 10:18:38.713
Process Uptime: 0 days 0:02:05.000
................................................................
................................................................
..............
Loading unloaded module list
.........
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr
(48f0.f60): Access violation - code c0000005 (first/second chance not available)
+------------------------------------------------------------------------+
| This target supports Hardware-enforced Stack Protection. A HW based |
| "Shadow Stack" may be available to assist in debugging and analysis. |
| See aka.ms/userhsp for more info. |
| |
| dps @ssp |
| |
+------------------------------------------------------------------------+
For analysis of this file, run !analyze -v
ntdll!NtWaitForSingleObject+0x14:
00007ffe`2fa21d44 c3 ret
0:044> !analyze -v
................................................................
................................................................
..............
Loading unloaded module list
.........
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1921
Key : Analysis.Elapsed.mSec
Value: 79523
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 95
Key : Analysis.Init.CPU.mSec
Value: 2093
Key : Analysis.Init.Elapsed.mSec
Value: 167187
Key : Analysis.Memory.CommitPeak.Mb
Value: 138
Key : Analysis.Version.DbgEng
Value: 10.0.29457.1000
Key : Analysis.Version.Description
Value: 10.2506.23.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2506.23.1
Key : Failure.Bucket
Value: INVALID_POINTER_READ_c0000005_re4.exe!Unknown
Key : Failure.Exception.Code
Value: 0xc0000005
Key : Failure.Exception.IP.Address
Value: 0x1439e143a
Key : Failure.Exception.IP.Module
Value: re4
Key : Failure.Exception.IP.Offset
Value: 0x39e143a
Key : Failure.Hash
Value: {05d7c589-504e-64cd-a733-6ee8b184b6a6}
Key : Failure.ProblemClass.Primary
Value: INVALID_POINTER_READ
Key : Timeline.OS.Boot.DeltaSec
Value: 37118
Key : Timeline.Process.Start.DeltaSec
Value: 125
Key : WER.OS.Branch
Value: ge_release
Key : WER.OS.Version
Value: 10.0.26100.1
Key : WER.Process.Version
Value: 6.2.26100.7171
FILE_IN_CAB: MiniDump.dmp
NTGLOBALFLAG: 0
CONTEXT: (.ecxr)
rax=000000002744ec30 rbx=0000000000000000 rcx=00000000377261c0
rdx=0000000000000000 rsi=00000000377261c0 rdi=000000002540b960
rip=00000001439e143a rsp=000000013854fd20 rbp=00000001426af130
r8=0000000000000000 r9=0000000000000002 r10=7fffffffffffffff
r11=0204081020408103 r12=0000000000000020 r13=000000002540b960
r14=00000000000004dc r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
re4+0x39e143a:
00000001`439e143a f30f108a84000000 movss xmm1,dword ptr [rdx+84h] ds:00000000`00000084=????????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00000001439e143a (re4+0x00000000039e143a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000084
Attempt to read from address 0000000000000084
PROCESS_NAME: re4.exe
READ_ADDRESS: 0000000000000084
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000084
IP_ON_STACK:
+0
00000001`3854fd50 d09819240000 rcr byte ptr [rax+2419h],1
FRAME_ONE_INVALID: 1
STACK_TEXT:
00000001`3854fd20 00000001`3854fd50 : 00000001`43966c89 00000000`377261c0 00000001`426af130 00000000`377261c0 : re4+0x39e143a
00000001`3854fd28 00000001`43966c89 : 00000000`377261c0 00000001`426af130 00000000`377261c0 00000000`377261c0 : 0x00000001`3854fd50
00000001`3854fd30 00000000`377261c0 : 00000001`426af130 00000000`377261c0 00000000`377261c0 00000000`241998d0 : re4+0x3966c89
00000001`3854fd38 00000001`426af130 : 00000000`377261c0 00000000`377261c0 00000000`241998d0 00000002`00000003 : 0x377261c0
00000001`3854fd40 00000000`377261c0 : 00000000`377261c0 00000000`241998d0 00000002`00000003 00000000`00000000 : re4+0x26af130
00000001`3854fd48 00000000`377261c0 : 00000000`241998d0 00000002`00000003 00000000`00000000 00000000`241998d0 : 0x377261c0
00000001`3854fd50 00000000`241998d0 : 00000002`00000003 00000000`00000000 00000000`241998d0 00000002`00000000 : 0x377261c0
00000001`3854fd58 00000002`00000003 : 00000000`00000000 00000000`241998d0 00000002`00000000 00000000`00000000 : 0x241998d0
00000001`3854fd60 00000000`00000000 : 00000000`241998d0 00000002`00000000 00000000`00000000 00000000`2540b960 : 0x00000002`00000003
SYMBOL_NAME: re4+39e143a
MODULE_NAME: re4
IMAGE_NAME: re4.exe
STACK_COMMAND: dt ntdll!LdrpLastDllInitializer BaseDllName ; dt ntdll!LdrpFailureData ; ~44s; .ecxr ; kb
FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_re4.exe!Unknown
OS_VERSION: 10.0.26100.1
BUILDLAB_STR: ge_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
IMAGE_VERSION: 1.1.1.0
FAILURE_ID_HASH: {05d7c589-504e-64cd-a733-6ee8b184b6a6}
Followup: MachineOwner
---------