Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\Ruby26-x64\bin\ruby.exe -x "C:\Ruby26-x64\bin\irb.cmd" Starting directory: C:\Users\Lucius Riccio ************* Path validation summary ************** Response Time (ms) Location Deferred symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: ModLoad: 00000000`00400000 00000000`00410000 image00000000`00400000 ModLoad: 00007ff9`8d870000 00007ff9`8da51000 ntdll.dll ModLoad: 00007ff9`5d3c0000 00007ff9`5d430000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x4458: page heap enabled with flags 0x183. AVRF: ruby.exe: pid 0x4458: flags 0x81643027: application verifier enabled ModLoad: 00007ff9`84d10000 00007ff9`84d4e000 C:\WINDOWS\SYSTEM32\vrfcore.dll ModLoad: 00007ff9`83600000 00007ff9`8366f000 C:\WINDOWS\SYSTEM32\vfbasics.dll ModLoad: 00007ff9`8b120000 00007ff9`8b1d1000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 00007ff9`8a560000 00007ff9`8a7d3000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 00007ff9`8d7a0000 00007ff9`8d83e000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 00000000`6a440000 00000000`6a77f000 C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll ModLoad: 00007ff9`8d6d0000 00007ff9`8d771000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 00000000`6acc0000 00000000`6ad45000 C:\Ruby26-x64\bin\ruby_builtin_dlls\libgmp-10.dll ModLoad: 00007ff9`8d670000 00007ff9`8d6cb000 C:\WINDOWS\System32\sechost.dll ModLoad: 00007ff9`8b350000 00007ff9`8b474000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 00007ff9`8d780000 00007ff9`8d79d000 C:\WINDOWS\System32\imagehlp.dll ModLoad: 00007ff9`8a910000 00007ff9`8aa08000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 00007ff9`8c010000 00007ff9`8d450000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 00007ff9`88e20000 00007ff9`88e58000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL ModLoad: 00007ff9`89e00000 00007ff9`89e49000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 00007ff9`8bcf0000 00007ff9`8bd99000 C:\WINDOWS\System32\shcore.dll ModLoad: 00007ff9`8adf0000 00007ff9`8b112000 C:\WINDOWS\System32\combase.dll ModLoad: 00007ff9`8a7e0000 00007ff9`8a85a000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 00007ff9`89e50000 00007ff9`8a55d000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 00007ff9`8bc90000 00007ff9`8bce1000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 00007ff9`8d640000 00007ff9`8d668000 C:\WINDOWS\System32\GDI32.dll ModLoad: 00007ff9`89c40000 00007ff9`89dd2000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 00007ff9`8ac60000 00007ff9`8acff000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 00007ff9`8bda0000 00007ff9`8bf30000 C:\WINDOWS\System32\USER32.dll ModLoad: 00007ff9`89de0000 00007ff9`89e00000 C:\WINDOWS\System32\win32u.dll ModLoad: 00007ff9`89be0000 00007ff9`89bf1000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 00007ff9`89c20000 00007ff9`89c3f000 C:\WINDOWS\System32\profapi.dll ModLoad: 00007ff9`89b90000 00007ff9`89bdc000 C:\WINDOWS\System32\powrprof.dll ModLoad: 00007ff9`89b80000 00007ff9`89b8a000 C:\WINDOWS\System32\FLTLIB.DLL ModLoad: 00007ff9`8b280000 00007ff9`8b2ec000 C:\WINDOWS\System32\WS2_32.dll (4458.3ca4): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ff9`8d93c93c cc int 3 0:000> g ModLoad: 00007ff9`8b680000 00007ff9`8b6ad000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 00007ff9`898a0000 00007ff9`898b7000 C:\WINDOWS\SYSTEM32\CRYPTSP.dll ModLoad: 00007ff9`88c80000 00007ff9`88cb3000 C:\WINDOWS\system32\rsaenh.dll ModLoad: 00007ff9`896a0000 00007ff9`896c5000 C:\WINDOWS\SYSTEM32\bcrypt.dll ModLoad: 00007ff9`892a0000 00007ff9`892ab000 C:\WINDOWS\SYSTEM32\CRYPTBASE.dll ModLoad: 00000000`6f280000 00000000`6f28e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\encdb.so ModLoad: 00000000`68080000 00000000`6808e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\transdb.so ModLoad: 00000000`6d0c0000 00000000`6d0cd000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_1252.so ModLoad: 00000000`6d9c0000 00000000`6d9d2000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\stringio.so ModLoad: 00000000`63d80000 00000000`63d99000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\fiddle.so ModLoad: 00000000`6b740000 00000000`6b750000 C:\Ruby26-x64\bin\ruby_builtin_dlls\libffi-6.dll ModLoad: 00000000`6e6c0000 00000000`6e6cd000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\utf_16le.so ModLoad: 00000000`6a400000 00000000`6a40f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\utf_16_32.so ModLoad: 00000000`65900000 00000000`6590f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\euc_jp.so ModLoad: 00000000`64700000 00000000`6470f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_31j.so ModLoad: 00000000`6d100000 00000000`6d10e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\etc.so ModLoad: 00000000`6a340000 00000000`6a365000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\single_byte.so (4458.3ca4): Invalid handle - code c0000008 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. ntdll!KiRaiseUserExceptionDispatcher+0x3a: 00007ff9`8d90e78a 8b8424c0000000 mov eax,dword ptr [rsp+0C0h] ss:00000000`0060c920=c0000008 0:000> gh ======================================= VERIFIER STOP 0000000000000202: pid 0x4458: Freeing heap block containing an active critical section. 0000000007C34E70 : Critical section address. Run !cs -s
to get more information. 000000000076E2E0 : Critical section initialization stack trace. Run dps to dump the stack trace. 0000000007C34DE0 : Heap block address. 0000000000000220 : Heap block size. ======================================= This verifier stop is continuable. After debugging it use `go' to continue. ======================================= (4458.3ca4): Break instruction exception - code 80000003 (first chance) vrfcore!VerifierStopMessageEx+0x7d9: 00007ff9`84d12639 cc int 3 *** WARNING: Unable to verify timestamp for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll - *** WARNING: Unable to verify timestamp for image00000000`00400000 *** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000 0:000> !cs -s 0000000007C34E70 ----------------------------------------- Critical section = 0x0000000007c34e70 (+0x7C34E70) DebugInfo = 0x000000000a66bfd0 NOT LOCKED LockSemaphore = 0x0 SpinCount = 0x00000000020007d0 Stack trace for DebugInfo = 0x000000000a66bfd0: 0x00007ff98d92b815: ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542E5 0x00007ff98360576c: vfbasics!AVrfpInitializeCriticalSectionCommon+0x11C 0x000000006a6088a2: x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7D2 0x000000006a4f5861: x64_msvcrt_ruby260!rb_call_inits+0xD1 0x000000006a4ccd71: x64_msvcrt_ruby260!ruby_setup+0x171 0x000000006a4ccdd9: x64_msvcrt_ruby260!ruby_init+0x9 0x0000000000402d71: image00000000_00400000+0x2D71 0x00000000004013a5: image00000000_00400000+0x13A5 0x000000000040150b: image00000000_00400000+0x150B 0x00007ff98b134034: KERNEL32!BaseThreadInitThunk+0x14 0x00007ff98d8e3691: ntdll!RtlUserThreadStart+0x21 0:000> dps 000000000076E2E0 00000000`0076e2e0 00000000`006827c0 00000000`0076e2e8 000b00af`00005801 00000000`0076e2f0 00007ff9`8d92b815 ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542e5 00000000`0076e2f8 00007ff9`8360576c vfbasics!AVrfpInitializeCriticalSectionCommon+0x11c 00000000`0076e300 00000000`6a6088a2 x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7d2 00000000`0076e308 00000000`6a4f5861 x64_msvcrt_ruby260!rb_call_inits+0xd1 00000000`0076e310 00000000`6a4ccd71 x64_msvcrt_ruby260!ruby_setup+0x171 00000000`0076e318 00000000`6a4ccdd9 x64_msvcrt_ruby260!ruby_init+0x9 00000000`0076e320 00000000`00402d71 image00000000_00400000+0x2d71 00000000`0076e328 00000000`004013a5 image00000000_00400000+0x13a5 00000000`0076e330 00000000`0040150b image00000000_00400000+0x150b 00000000`0076e338 00007ff9`8b134034 KERNEL32!BaseThreadInitThunk+0x14 00000000`0076e340 00007ff9`8d8e3691 ntdll!RtlUserThreadStart+0x21 00000000`0076e348 00000000`00000000 00000000`0076e350 00000000`00000000 00000000`0076e358 000f0000`00007801 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* APPLICATION_VERIFIER_LOCKS_LOCK_IN_FREED_HEAP (202) Freeing heap block containing an active critical section. This stop is generated if a heap allocation contains a critical section, the allocation is freed and the critical section has not been deleted. To debug this stop use the following debugger commands: $ !cs -s parameter1 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the leaked critical section. $ dps parameter2 - to dump the stack trace for this critical section initialization. $ parameter3 and parameter4 might help understand where this heap block was allocated (the size of the allocation is probably significant). Arguments: Arg1: 0000000007c34e70, Critical section address. Run !cs -s to get more information. Arg2: 000000000076e2e0, Critical section initialization stack trace. Run dps to dump the stack trace. Arg3: 0000000007c34de0, Heap block address. Arg4: 0000000000000220, Heap block size. GetUrlPageData2 (WinHttp) failed: 12002. KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 Timeline: !analyze.Start Name: