Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\Ruby26-x64\bin\ruby.exe -x "C:\Ruby26-x64\bin\irb.cmd" Starting directory: C:\Users\Lucius Riccio ************* Path validation summary ************** Response Time (ms) Location Deferred symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: ModLoad: 00000000`00400000 00000000`00410000 image00000000`00400000 ModLoad: 00007ff9`8d870000 00007ff9`8da51000 ntdll.dll ModLoad: 00007ff9`5d3c0000 00007ff9`5d430000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x4458: page heap enabled with flags 0x183. AVRF: ruby.exe: pid 0x4458: flags 0x81643027: application verifier enabled ModLoad: 00007ff9`84d10000 00007ff9`84d4e000 C:\WINDOWS\SYSTEM32\vrfcore.dll ModLoad: 00007ff9`83600000 00007ff9`8366f000 C:\WINDOWS\SYSTEM32\vfbasics.dll ModLoad: 00007ff9`8b120000 00007ff9`8b1d1000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 00007ff9`8a560000 00007ff9`8a7d3000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 00007ff9`8d7a0000 00007ff9`8d83e000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 00000000`6a440000 00000000`6a77f000 C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll ModLoad: 00007ff9`8d6d0000 00007ff9`8d771000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 00000000`6acc0000 00000000`6ad45000 C:\Ruby26-x64\bin\ruby_builtin_dlls\libgmp-10.dll ModLoad: 00007ff9`8d670000 00007ff9`8d6cb000 C:\WINDOWS\System32\sechost.dll ModLoad: 00007ff9`8b350000 00007ff9`8b474000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 00007ff9`8d780000 00007ff9`8d79d000 C:\WINDOWS\System32\imagehlp.dll ModLoad: 00007ff9`8a910000 00007ff9`8aa08000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 00007ff9`8c010000 00007ff9`8d450000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 00007ff9`88e20000 00007ff9`88e58000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL ModLoad: 00007ff9`89e00000 00007ff9`89e49000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 00007ff9`8bcf0000 00007ff9`8bd99000 C:\WINDOWS\System32\shcore.dll ModLoad: 00007ff9`8adf0000 00007ff9`8b112000 C:\WINDOWS\System32\combase.dll ModLoad: 00007ff9`8a7e0000 00007ff9`8a85a000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 00007ff9`89e50000 00007ff9`8a55d000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 00007ff9`8bc90000 00007ff9`8bce1000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 00007ff9`8d640000 00007ff9`8d668000 C:\WINDOWS\System32\GDI32.dll ModLoad: 00007ff9`89c40000 00007ff9`89dd2000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 00007ff9`8ac60000 00007ff9`8acff000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 00007ff9`8bda0000 00007ff9`8bf30000 C:\WINDOWS\System32\USER32.dll ModLoad: 00007ff9`89de0000 00007ff9`89e00000 C:\WINDOWS\System32\win32u.dll ModLoad: 00007ff9`89be0000 00007ff9`89bf1000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 00007ff9`89c20000 00007ff9`89c3f000 C:\WINDOWS\System32\profapi.dll ModLoad: 00007ff9`89b90000 00007ff9`89bdc000 C:\WINDOWS\System32\powrprof.dll ModLoad: 00007ff9`89b80000 00007ff9`89b8a000 C:\WINDOWS\System32\FLTLIB.DLL ModLoad: 00007ff9`8b280000 00007ff9`8b2ec000 C:\WINDOWS\System32\WS2_32.dll (4458.3ca4): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ff9`8d93c93c cc int 3 0:000> g ModLoad: 00007ff9`8b680000 00007ff9`8b6ad000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 00007ff9`898a0000 00007ff9`898b7000 C:\WINDOWS\SYSTEM32\CRYPTSP.dll ModLoad: 00007ff9`88c80000 00007ff9`88cb3000 C:\WINDOWS\system32\rsaenh.dll ModLoad: 00007ff9`896a0000 00007ff9`896c5000 C:\WINDOWS\SYSTEM32\bcrypt.dll ModLoad: 00007ff9`892a0000 00007ff9`892ab000 C:\WINDOWS\SYSTEM32\CRYPTBASE.dll ModLoad: 00000000`6f280000 00000000`6f28e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\encdb.so ModLoad: 00000000`68080000 00000000`6808e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\transdb.so ModLoad: 00000000`6d0c0000 00000000`6d0cd000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_1252.so ModLoad: 00000000`6d9c0000 00000000`6d9d2000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\stringio.so ModLoad: 00000000`63d80000 00000000`63d99000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\fiddle.so ModLoad: 00000000`6b740000 00000000`6b750000 C:\Ruby26-x64\bin\ruby_builtin_dlls\libffi-6.dll ModLoad: 00000000`6e6c0000 00000000`6e6cd000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\utf_16le.so ModLoad: 00000000`6a400000 00000000`6a40f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\utf_16_32.so ModLoad: 00000000`65900000 00000000`6590f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\euc_jp.so ModLoad: 00000000`64700000 00000000`6470f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_31j.so ModLoad: 00000000`6d100000 00000000`6d10e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\etc.so ModLoad: 00000000`6a340000 00000000`6a365000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\single_byte.so (4458.3ca4): Invalid handle - code c0000008 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. ntdll!KiRaiseUserExceptionDispatcher+0x3a: 00007ff9`8d90e78a 8b8424c0000000 mov eax,dword ptr [rsp+0C0h] ss:00000000`0060c920=c0000008 0:000> gh ======================================= VERIFIER STOP 0000000000000202: pid 0x4458: Freeing heap block containing an active critical section. 0000000007C34E70 : Critical section address. Run !cs -s
to get more information. 000000000076E2E0 : Critical section initialization stack trace. Run dps
to dump the stack trace. 0000000007C34DE0 : Heap block address. 0000000000000220 : Heap block size. ======================================= This verifier stop is continuable. After debugging it use `go' to continue. ======================================= (4458.3ca4): Break instruction exception - code 80000003 (first chance) vrfcore!VerifierStopMessageEx+0x7d9: 00007ff9`84d12639 cc int 3 *** WARNING: Unable to verify timestamp for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll - *** WARNING: Unable to verify timestamp for image00000000`00400000 *** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000 0:000> !cs -s 0000000007C34E70 ----------------------------------------- Critical section = 0x0000000007c34e70 (+0x7C34E70) DebugInfo = 0x000000000a66bfd0 NOT LOCKED LockSemaphore = 0x0 SpinCount = 0x00000000020007d0 Stack trace for DebugInfo = 0x000000000a66bfd0: 0x00007ff98d92b815: ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542E5 0x00007ff98360576c: vfbasics!AVrfpInitializeCriticalSectionCommon+0x11C 0x000000006a6088a2: x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7D2 0x000000006a4f5861: x64_msvcrt_ruby260!rb_call_inits+0xD1 0x000000006a4ccd71: x64_msvcrt_ruby260!ruby_setup+0x171 0x000000006a4ccdd9: x64_msvcrt_ruby260!ruby_init+0x9 0x0000000000402d71: image00000000_00400000+0x2D71 0x00000000004013a5: image00000000_00400000+0x13A5 0x000000000040150b: image00000000_00400000+0x150B 0x00007ff98b134034: KERNEL32!BaseThreadInitThunk+0x14 0x00007ff98d8e3691: ntdll!RtlUserThreadStart+0x21 0:000> dps 000000000076E2E0 00000000`0076e2e0 00000000`006827c0 00000000`0076e2e8 000b00af`00005801 00000000`0076e2f0 00007ff9`8d92b815 ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542e5 00000000`0076e2f8 00007ff9`8360576c vfbasics!AVrfpInitializeCriticalSectionCommon+0x11c 00000000`0076e300 00000000`6a6088a2 x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7d2 00000000`0076e308 00000000`6a4f5861 x64_msvcrt_ruby260!rb_call_inits+0xd1 00000000`0076e310 00000000`6a4ccd71 x64_msvcrt_ruby260!ruby_setup+0x171 00000000`0076e318 00000000`6a4ccdd9 x64_msvcrt_ruby260!ruby_init+0x9 00000000`0076e320 00000000`00402d71 image00000000_00400000+0x2d71 00000000`0076e328 00000000`004013a5 image00000000_00400000+0x13a5 00000000`0076e330 00000000`0040150b image00000000_00400000+0x150b 00000000`0076e338 00007ff9`8b134034 KERNEL32!BaseThreadInitThunk+0x14 00000000`0076e340 00007ff9`8d8e3691 ntdll!RtlUserThreadStart+0x21 00000000`0076e348 00000000`00000000 00000000`0076e350 00000000`00000000 00000000`0076e358 000f0000`00007801 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* APPLICATION_VERIFIER_LOCKS_LOCK_IN_FREED_HEAP (202) Freeing heap block containing an active critical section. This stop is generated if a heap allocation contains a critical section, the allocation is freed and the critical section has not been deleted. To debug this stop use the following debugger commands: $ !cs -s parameter1 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the leaked critical section. $ dps parameter2 - to dump the stack trace for this critical section initialization. $ parameter3 and parameter4 might help understand where this heap block was allocated (the size of the allocation is probably significant). Arguments: Arg1: 0000000007c34e70, Critical section address. Run !cs -s
to get more information. Arg2: 000000000076e2e0, Critical section initialization stack trace. Run dps
to dump the stack trace. Arg3: 0000000007c34de0, Heap block address. Arg4: 0000000000000220, Heap block size. GetUrlPageData2 (WinHttp) failed: 12002. KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 Timeline: !analyze.Start Name: Time: 2019-05-15T20:33:58.750Z Diff: 750 mSec Timeline: Dump.Current Name: Time: 2019-05-15T20:33:58.0Z Diff: 0 mSec Timeline: Process.Start Name: Time: 2019-05-15T20:27:32.0Z Diff: 386000 mSec Timeline: OS.Boot Name: Time: 2019-05-09T19:48:18.0Z Diff: 521140000 mSec DUMP_CLASS: 2 DUMP_QUALIFIER: 0 FAULTING_IP: vrfcore!VerifierStopMessageEx+7d9 00007ff9`84d12639 cc int 3 EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ff984d12639 (vrfcore!VerifierStopMessageEx+0x00000000000007d9) ExceptionCode: 80000003 (Break instruction exception) ExceptionFlags: 00000000 NumberParameters: 1 Parameter[0]: 0000000000000000 FAULTING_THREAD: 00003ca4 BUGCHECK_STR: BREAKPOINT_AVRF DEFAULT_BUCKET_ID: BREAKPOINT_AVRF CRITICAL_SECTION: 0000000007c34e70 -- (!cs -s 0000000007c34e70) ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached. EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid EXCEPTION_CODE_STR: 80000003 EXCEPTION_PARAMETER1: 0000000000000000 WATSON_BKT_PROCSTAMP: 0 WATSON_BKT_PROCVER: 2.6.3.62 PROCESS_VER_PRODUCT: Ruby interpreter 2.6.3p62 [x64-mingw32] WATSON_BKT_MODULE: vrfcore.dll WATSON_BKT_MODSTAMP: ee620e2b WATSON_BKT_MODOFFSET: 2639 WATSON_BKT_MODVER: 10.0.17763.132 MODULE_VER_PRODUCT: Microsoft® Windows® Operating System BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804 MODLIST_WITH_TSCHKSUM_HASH: 3a36178f0f980aa2bf2cd013708689f05e511817 MODLIST_SHA1_HASH: c1a0e368887b68e0efa0bcc0e64665bc2c5a9609 NTGLOBALFLAG: 2000100 PROCESS_BAM_CURRENT_THROTTLED: 0 PROCESS_BAM_PREVIOUS_THROTTLED: 0 APPLICATION_VERIFIER_FLAGS: 81643027 PRODUCT_TYPE: 1 SUITE_MASK: 272 DUMP_TYPE: fe APPLICATION_VERIFIER_LOADED: 1 PROCESS_NAME: unknown ANALYSIS_SESSION_HOST: PK1Y1FE-LJR14 ANALYSIS_SESSION_TIME: 05-15-2019 16:33:58.0750 ANALYSIS_VERSION: 10.0.17763.132 amd64fre THREAD_ATTRIBUTES: OS_LOCALE: ENU PRIMARY_PROBLEM_CLASS: BREAKPOINT PROBLEM_CLASSES: ID: [0n321] Type: [@APPLICATION_FAULT_STRING] Class: Primary Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix) BUCKET_ID Name: Omit Data: Add String: [BREAKPOINT] PID: [Unspecified] TID: [Unspecified] Frame: [0] ID: [0n98] Type: [AVRF] Class: Addendum Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix) BUCKET_ID Name: Add Data: Omit PID: [0x4458] TID: [0x3ca4] Frame: [0] : vrfcore!VerifierStopMessageEx LAST_CONTROL_TRANSFER: from 00007ff9836050d6 to 00007ff984d12639 STACK_TEXT: 00000000`0060f5b0 00007ff9`836050d6 : 00000000`01001002 00000000`07a60000 00000000`07a61000 00007ff9`5d3c26dd : vrfcore!VerifierStopMessageEx+0x7d9 00000000`0060f910 00007ff9`836037a0 : 00000000`00000220 00000000`00000000 00000000`00000000 00000000`00003ca4 : vfbasics!AVrfpFreeMemLockChecks+0xf2 00000000`0060f970 00007ff9`83618948 : 00000000`07c34de0 00000000`07c42de0 00000000`00000220 00000000`07a60000 : vfbasics!AVrfpFreeMemNotify+0x38 00000000`0060f9a0 00007ff9`8d7b98bc : 00000000`07a60000 00007ff9`00000000 00000000`07c34de0 00000000`6a4e7b21 : vfbasics!AVrfpRtlFreeHeap+0x98 00000000`0060fa50 00007ff9`836198fd : 00000000`07c34de0 00000000`07c42de0 00000000`07c42de0 00007ff9`8d7b98a0 : msvcrt!free+0x1c 00000000`0060fa80 00000000`6a4e7b21 : 00000000`07c34de0 00000000`07c34de0 00000000`07c42de0 00000000`07c34de0 : vfbasics!AVrfp_free+0x4d 00000000`0060fab0 00000000`6a64be53 : 00000000`00000001 00000000`00000002 00000000`00000000 00000000`00000000 : x64_msvcrt_ruby260!ruby_xfree+0x31 00000000`0060faf0 00000000`6a4cd41e : 00000000`6a4cd4a0 00000000`00000001 00000000`07c34de0 00000000`07c34de0 : x64_msvcrt_ruby260!ruby_vm_destruct+0x73 00000000`0060fb60 00000000`6a4cd6b0 : 00000000`00000000 00000000`07afcfe0 00000000`07afefe0 00000000`00000002 : x64_msvcrt_ruby260!ruby_cleanup+0x3ae 00000000`0060fde0 00000000`00402d87 : 00000000`00000003 00000000`07b22fa0 00000000`07ac9d20 00000000`07afcfe0 : x64_msvcrt_ruby260!ruby_run_node+0x60 00000000`0060fe20 00000000`004013a5 : 00000000`00000003 00000000`07b22fa0 00000000`00407970 00000000`00000000 : image00000000_00400000+0x2d87 00000000`0060fe60 00000000`0040150b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : image00000000_00400000+0x13a5 00000000`0060ff30 00007ff9`8b134034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : image00000000_00400000+0x150b 00000000`0060ff60 00007ff9`8d8e3691 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14 00000000`0060ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 STACK_COMMAND: ~0s ; .cxr ; kb THREAD_SHA1_HASH_MOD_FUNC: ac94edf8183e983e3bc2f2d4f9dd6e62e1bd719f THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e013a3e3e0f370daf1a25eb9dcf9d08d23027b02 THREAD_SHA1_HASH_MOD: 3462ddc2570f74745c8bf62168ed52450c98a119 FOLLOWUP_IP: x64_msvcrt_ruby260!ruby_vm_destruct+73 00000000`6a64be53 488d8320020000 lea rax,[rbx+220h] FAULT_INSTR_CODE: 20838d48 SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: x64_msvcrt_ruby260!ruby_vm_destruct+73 FOLLOWUP_NAME: MachineOwner MODULE_NAME: x64_msvcrt_ruby260 IMAGE_NAME: x64-msvcrt-ruby260.dll DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: BREAKPOINT_AVRF_x64_msvcrt_ruby260!ruby_vm_destruct+73 FAILURE_EXCEPTION_CODE: 80000003 FAILURE_IMAGE_NAME: x64-msvcrt-ruby260.dll BUCKET_ID_IMAGE_STR: x64-msvcrt-ruby260.dll FAILURE_MODULE_NAME: x64_msvcrt_ruby260 BUCKET_ID_MODULE_STR: x64_msvcrt_ruby260 FAILURE_FUNCTION_NAME: ruby_vm_destruct BUCKET_ID_FUNCTION_STR: ruby_vm_destruct BUCKET_ID_OFFSET: 73 BUCKET_ID_MODTIMEDATESTAMP: 0 BUCKET_ID_MODCHECKSUM: 334137 BUCKET_ID_MODVER_STR: 2.6.3.62 BUCKET_ID_PREFIX_STR: BREAKPOINT_AVRF_ FAILURE_PROBLEM_CLASS: BREAKPOINT FAILURE_SYMBOL_NAME: x64-msvcrt-ruby260.dll!ruby_vm_destruct FAILURE_BUCKET_ID: BREAKPOINT_AVRF_80000003_x64-msvcrt-ruby260.dll!ruby_vm_destruct WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/unknown/2.6.3.62/ 0/vrfcore.dll/10.0.17763.132/ee620e2b/80000003/00002639.htm?Retriage=1 TARGET_TIME: 2019-05-15T20:34:03.000Z OSBUILD: 17134 OSSERVICEPACK: 706 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt SingleUserTS USER_LCID: 0 OSBUILD_TIMESTAMP: 2031-08-18 15:21:13 BUILDDATESTAMP_STR: 180410-1804 BUILDLAB_STR: rs4_release BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804 ANALYSIS_SESSION_ELAPSED_TIME: 63b7 ANALYSIS_SOURCE: UM FAILURE_ID_HASH_STRING: um:breakpoint_avrf_80000003_x64-msvcrt-ruby260.dll!ruby_vm_destruct FAILURE_ID_HASH: {b0223792-0bdb-1b78-fe77-f4d1ecf49007} Followup: MachineOwner ---------