Steps: load dump file using dbgeng version 10.0.14321.1024 (outside WinDbg)
Result:
```
0:000> k
# Child-SP RetAddr Call Site
00 00000000`0030c5c0 000007fe`e1cb7b56 pykd!kdlib::DebugManager::GetInterestMask+0x10 [~\kdlibcpp\source\win\dbgmgr.h @ 97]
01 00000000`0030c5d0 000007fe`e1cb7c76 dbgeng!SendOutput+0x23a
02 00000000`0030c670 000007fe`e1cb89ed dbgeng!SplitSendOutput+0xaa
03 00000000`0030c7f0 000007fe`e1da124b dbgeng!MaskOutStringRaw+0x115
04 00000000`0030c830 000007fe`e1da1177 dbgeng!CrtPrintHandler::OnString+0x2b
05 00000000`0030c870 000007fe`e1cb8b2d dbgeng!PrintHandler::Print+0xff3
06 00000000`0030ce50 000007fe`e1cb8d38 dbgeng!TryAnyMaskOutVa+0xe9
07 00000000`0030cee0 000007fe`e1d574b4 dbgeng!AnyMaskOutVa+0xb4
08 00000000`0030d370 000007fe`e1829a4f dbgeng!ExtOutput64+0x44
09 00000000`0030d3c0 000007fe`e1861469 ext!DebugFailureAnalysis::Output+0x4af
0a 00000000`0030d820 000007fe`e1824f71 ext!AnalyzeBugCheck+0x2a1
0b 00000000`0030d8f0 000007fe`e1d5d87b ext!analyze+0x561
0c 00000000`0030dab0 000007fe`e1d5da49 dbgeng!ExtensionInfo::CallA+0x287
0d 00000000`0030db70 000007fe`e1d5db51 dbgeng!ExtensionInfo::Call+0x121
0e 00000000`0030dd70 000007fe`e1d972df dbgeng!ExtensionInfo::CallAny+0x9d
0f 00000000`0030ddb0 000007fe`e1d4c86e dbgeng!CallBugCheckExtension+0xa7
10 00000000`0030de60 000007fe`e1cb3eaf dbgeng!PrepareForCalls+0x3f2
11 00000000`0030def0 000007fe`e1cb4bb9 dbgeng!SendEvent+0x8f
12 00000000`0030df50 000007fe`e1d52776 dbgeng!NotifyExceptionEvent+0x6e5
13 00000000`0030ea80 000007fe`e1cd3b65 dbgeng!DumpTargetInfo::WaitForEvent+0x106
14 00000000`0030ead0 000007fe`e1cd40e5 dbgeng!RawWaitForEvent+0x3cd
15 00000000`0030eb90 000007fe`e123c344 dbgeng!DebugClient::WaitForEvent+0xa5
16 00000000`0030ebd0 000007fe`e11431cc pykd!kdlib::loadDump+0x144 [~\kdlibcpp\source\win\dbgeng.cpp @ 336]
17 00000000`0030ed20 000007fe`e1061fbb pykd!pykd::loadDump+0x3c [~\pykd\pydbgeng.h @ 60]
18 00000000`0030ed70 000007fe`e10ecc08 pykd!boost::python::detail::invoke<boost::python::to_python_value<unsigned long const & __ptr64>,unsigned long (__cdecl*)(std::basic_string<wchar_t,std::char_traits<wchar_t>,std::allocator<wchar_t> > const & __ptr64),boost::python::arg_from_python<std::basic_string<wchar_t,std::char_traits<wchar_t>,std::allocator<wchar_t> > const & __ptr64> >+0x3b [~\packages\boost.1.57.0.0\lib\native\include\boost\python\detail\invoke.hpp @ 75]
```
```
0:000> r
rax=0000000000000001 rbx=000000000030c6a0 rcx=000000000056ed00
rdx=0000000000000001 rsi=0000000000000001 rdi=000000000346ac60
rip=000007fee12ca860 rsp=000000000030c5c0 rbp=000000000030c770
r8=000000000030cf38 r9=0000000000000001 r10=000007fee1fa06e0
r11=000000000030d3b0 r12=0000000000000001 r13=0000000000000000
r14=0000000000000001 r15=000000000030c6c0
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
pykd!kdlib::DebugManager::GetInterestMask+0x10:
000007fe`e12ca860 c70000000000 mov dword ptr [rax],0 ds:00000000`00000001=????????
0:000> dU @r8
00000000`0030cf38 "Probably caused by : "
```
```
0:000> lm vm dbgeng
Browse full module list
start end module name
000007fe`e1c50000 000007fe`e2278000 dbgeng (pdb symbols) ~\symbols\dbgeng.pdb\9778C914F4E34889AE3C24D694B132141\dbgeng.pdb
Loaded symbol image file: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\dbgeng.dll
Image path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\dbgeng.dll
Image name: dbgeng.dll
Browse all global symbols functions data
Timestamp: Sat Jul 16 05:15:14 2016 (578998B2)
CheckSum: 005FD1B5
ImageSize: 00628000
File version: 10.0.14321.1024
Product version: 10.0.14321.1024
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft
ProductName: Microsoft® Windows® Operating System
InternalName: DbgEng.Dll
OriginalFilename: DbgEng.Dll
ProductVersion: 10.0.14321.1024
FileVersion: 10.0.14321.1024 (debuggers(dbg).160715-1616)
FileDescription: Windows Symbolic Debugger Engine
LegalCopyright: © Microsoft Corporation. All rights reserved.
0:000> lm vm ext
Browse full module list
start end module name
000007fe`e1790000 000007fe`e1c44000 ext (pdb symbols) ~\symbols\ext.pdb\29F4CE8EBA2849AF859DB8E8DFF8DEA21\ext.pdb
Loaded symbol image file: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\winext\ext.dll
Image path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\winext\ext.dll
Image name: ext.dll
Browse all global symbols functions data
Timestamp: Sat Jul 16 05:11:44 2016 (578997E0)
CheckSum: 0049A01F
ImageSize: 004B4000
File version: 10.0.14321.1024
Product version: 10.0.14321.1024
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft
ProductName: Microsoft® Windows® Operating System
InternalName: ext.DLL
OriginalFilename: ext.DLL
ProductVersion: 10.0.14321.1024
FileVersion: 10.0.14321.1024 (debuggers(dbg).160715-1616)
FileDescription: Debugger Extensions
LegalCopyright: © Microsoft Corporation. All rights reserved.
```
On dbgeng version 6.1.7601.17514 do not reproduced
Comments: ** Comment from web user: EreTIk **
Result:
```
0:000> k
# Child-SP RetAddr Call Site
00 00000000`0030c5c0 000007fe`e1cb7b56 pykd!kdlib::DebugManager::GetInterestMask+0x10 [~\kdlibcpp\source\win\dbgmgr.h @ 97]
01 00000000`0030c5d0 000007fe`e1cb7c76 dbgeng!SendOutput+0x23a
02 00000000`0030c670 000007fe`e1cb89ed dbgeng!SplitSendOutput+0xaa
03 00000000`0030c7f0 000007fe`e1da124b dbgeng!MaskOutStringRaw+0x115
04 00000000`0030c830 000007fe`e1da1177 dbgeng!CrtPrintHandler::OnString+0x2b
05 00000000`0030c870 000007fe`e1cb8b2d dbgeng!PrintHandler::Print+0xff3
06 00000000`0030ce50 000007fe`e1cb8d38 dbgeng!TryAnyMaskOutVa+0xe9
07 00000000`0030cee0 000007fe`e1d574b4 dbgeng!AnyMaskOutVa+0xb4
08 00000000`0030d370 000007fe`e1829a4f dbgeng!ExtOutput64+0x44
09 00000000`0030d3c0 000007fe`e1861469 ext!DebugFailureAnalysis::Output+0x4af
0a 00000000`0030d820 000007fe`e1824f71 ext!AnalyzeBugCheck+0x2a1
0b 00000000`0030d8f0 000007fe`e1d5d87b ext!analyze+0x561
0c 00000000`0030dab0 000007fe`e1d5da49 dbgeng!ExtensionInfo::CallA+0x287
0d 00000000`0030db70 000007fe`e1d5db51 dbgeng!ExtensionInfo::Call+0x121
0e 00000000`0030dd70 000007fe`e1d972df dbgeng!ExtensionInfo::CallAny+0x9d
0f 00000000`0030ddb0 000007fe`e1d4c86e dbgeng!CallBugCheckExtension+0xa7
10 00000000`0030de60 000007fe`e1cb3eaf dbgeng!PrepareForCalls+0x3f2
11 00000000`0030def0 000007fe`e1cb4bb9 dbgeng!SendEvent+0x8f
12 00000000`0030df50 000007fe`e1d52776 dbgeng!NotifyExceptionEvent+0x6e5
13 00000000`0030ea80 000007fe`e1cd3b65 dbgeng!DumpTargetInfo::WaitForEvent+0x106
14 00000000`0030ead0 000007fe`e1cd40e5 dbgeng!RawWaitForEvent+0x3cd
15 00000000`0030eb90 000007fe`e123c344 dbgeng!DebugClient::WaitForEvent+0xa5
16 00000000`0030ebd0 000007fe`e11431cc pykd!kdlib::loadDump+0x144 [~\kdlibcpp\source\win\dbgeng.cpp @ 336]
17 00000000`0030ed20 000007fe`e1061fbb pykd!pykd::loadDump+0x3c [~\pykd\pydbgeng.h @ 60]
18 00000000`0030ed70 000007fe`e10ecc08 pykd!boost::python::detail::invoke<boost::python::to_python_value<unsigned long const & __ptr64>,unsigned long (__cdecl*)(std::basic_string<wchar_t,std::char_traits<wchar_t>,std::allocator<wchar_t> > const & __ptr64),boost::python::arg_from_python<std::basic_string<wchar_t,std::char_traits<wchar_t>,std::allocator<wchar_t> > const & __ptr64> >+0x3b [~\packages\boost.1.57.0.0\lib\native\include\boost\python\detail\invoke.hpp @ 75]
```
```
0:000> r
rax=0000000000000001 rbx=000000000030c6a0 rcx=000000000056ed00
rdx=0000000000000001 rsi=0000000000000001 rdi=000000000346ac60
rip=000007fee12ca860 rsp=000000000030c5c0 rbp=000000000030c770
r8=000000000030cf38 r9=0000000000000001 r10=000007fee1fa06e0
r11=000000000030d3b0 r12=0000000000000001 r13=0000000000000000
r14=0000000000000001 r15=000000000030c6c0
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
pykd!kdlib::DebugManager::GetInterestMask+0x10:
000007fe`e12ca860 c70000000000 mov dword ptr [rax],0 ds:00000000`00000001=????????
0:000> dU @r8
00000000`0030cf38 "Probably caused by : "
```
```
0:000> lm vm dbgeng
Browse full module list
start end module name
000007fe`e1c50000 000007fe`e2278000 dbgeng (pdb symbols) ~\symbols\dbgeng.pdb\9778C914F4E34889AE3C24D694B132141\dbgeng.pdb
Loaded symbol image file: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\dbgeng.dll
Image path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\dbgeng.dll
Image name: dbgeng.dll
Browse all global symbols functions data
Timestamp: Sat Jul 16 05:15:14 2016 (578998B2)
CheckSum: 005FD1B5
ImageSize: 00628000
File version: 10.0.14321.1024
Product version: 10.0.14321.1024
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft
ProductName: Microsoft® Windows® Operating System
InternalName: DbgEng.Dll
OriginalFilename: DbgEng.Dll
ProductVersion: 10.0.14321.1024
FileVersion: 10.0.14321.1024 (debuggers(dbg).160715-1616)
FileDescription: Windows Symbolic Debugger Engine
LegalCopyright: © Microsoft Corporation. All rights reserved.
0:000> lm vm ext
Browse full module list
start end module name
000007fe`e1790000 000007fe`e1c44000 ext (pdb symbols) ~\symbols\ext.pdb\29F4CE8EBA2849AF859DB8E8DFF8DEA21\ext.pdb
Loaded symbol image file: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\winext\ext.dll
Image path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\winext\ext.dll
Image name: ext.dll
Browse all global symbols functions data
Timestamp: Sat Jul 16 05:11:44 2016 (578997E0)
CheckSum: 0049A01F
ImageSize: 004B4000
File version: 10.0.14321.1024
Product version: 10.0.14321.1024
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft
ProductName: Microsoft® Windows® Operating System
InternalName: ext.DLL
OriginalFilename: ext.DLL
ProductVersion: 10.0.14321.1024
FileVersion: 10.0.14321.1024 (debuggers(dbg).160715-1616)
FileDescription: Debugger Extensions
LegalCopyright: © Microsoft Corporation. All rights reserved.
```
On dbgeng version 6.1.7601.17514 do not reproduced
Comments: ** Comment from web user: EreTIk **
Fixed interfaces type casting in kdlib::DebugManager::QueryInterface
Changeset 91058