Thank you for your posts, Zbook. I'm not sure if I understand properly what you're asking me to do, but here are the results when I ran the windows debugger tool on the .mdmp file generated after my most recent install attempt:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Panther\NewOs\Panther\mnd6F32.diagerr.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 22000 MP (24 procs) Free x64
Product: WinNt, suite: SingleUserTS Personal
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Debug session time: Mon Apr 11 15:11:39.000 2022 (UTC - 4:00)
System Uptime: not available
Process Uptime: 0 days 0:01:22.000
................................................................
..........................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(7e0.7e4): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!NtGetContextThread+0x14:
00007ffc`97125234 c3 ret
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
Failed to request MethodData, not in JIT code range
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Write
Key : Analysis.CPU.mSec
Value: 12296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12298
Key : Analysis.Init.CPU.mSec
Value: 124
Key : Analysis.Init.Elapsed.mSec
Value: 54271
Key : Analysis.Memory.CommitPeak.Mb
Value: 247
Key : CLR.BuiltBy
Value: NET48REL1LAST_C
Key : CLR.Engine
Value: CLR
Key : CLR.Version
Value: 4.8.4400.0
Key : Timeline.Process.Start.DeltaSec
Value: 82
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
Key : WER.Process.Version
Value: 1.66.22000.1
FILE_IN_CAB: mnd6F32.diagerr.mdmp
CONTEXT: (.ecxr)
rax=00000000ffffffff rbx=00000164b4fa3498 rcx=68977829cf440000
rdx=0000000000000001 rsi=00000164bd1b12a0 rdi=0000000000000000
rip=00007ffc79a9b93e rsp=000000267327a1b0 rbp=000000267327a520
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000246 r12=00000164b4ef1800 r13=0000000000000000
r14=00000164b4ef17f0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
MdmDiagnostics!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::AddRedirectedOrGroupPolicyValues+0x652:
00007ffc`79a9b93e 66893c43 mov word ptr [rbx+rax*2],di ds:00000166`b4fa3496=????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ffc79a9b93e (MdmDiagnostics!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::AddRedirectedOrGroupPolicyValues+0x0000000000000652)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 00000166b4fa3496
Attempt to write to address 00000166b4fa3496
PROCESS_NAME: SetupPlatform.exe
WRITE_ADDRESS: 00000166b4fa3496
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000166b4fa3496
STACK_TEXT:
00000026`7327a1b0 00007ffc`79a9bc3b : 00000164`bd1b12a0 00000164`bd1b12a0 00000164`bd9c4cb8 00000164`bd9c4cb8 : MdmDiagnostics!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::AddRedirectedOrGroupPolicyValues+0x652
00000026`7327a4a0 00007ffc`79a9bf50 : 00000000`00000000 00000026`0000000f 00000164`b58f5010 00000164`be9cd738 : MdmDiagnostics!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::RetrieveRedirectedRegKeyData+0xeb
00000026`7327a4e0 00007ffc`79a9c188 : 00000164`b66fa370 00000164`bd1b12a0 00000000`00000000 00000164`bd1b3f88 : MdmDiagnostics!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::InsertRedirectedRegKeyData+0x218
00000026`7327a540 00007ffc`79a88180 : 00007ffc`79a9a4c0 00000000`00000001 00007ffc`79a9c090 00000000`00000001 : MdmDiagnostics!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::GetDiagnosticData+0xf8
00000026`7327a5e0 00007ffc`79a8c43c : 00000026`7327a8e0 00000026`7327a8e0 00000000`00000000 00000164`bde4c4d0 : MdmDiagnostics!CreateMdmEnterpriseDiagnosticReport+0x3b30
00000026`7327a810 00007ffc`79a8d36f : 006f0072`00630069 00740066`006f0073 00610069`0044005c 0073006f`006e0067 : MdmDiagnostics!CreateLogOnAreaInternal+0xa5c
00000026`7327ab80 00007ffc`883c0ff8 : 00007ffc`883e8110 00000164`b80361c0 ffffffff`ffffffff 00000000`00000000 : MdmDiagnostics!CreateLogCabOnArea+0xf
00000026`7327abb0 00007ffc`883c0f1f : 00000026`7327ace8 00000026`7327ac40 00000000`00000000 00000000`00000000 : provops!ProvOperations:

ublishDeviceProvisioningLogs+0x18
00000026`7327abe0 00007ffc`883c0cf6 : 00000164`b3880f00 00000164`b3880f00 00000000`000000b7 00007ffc`883e53a0 : provops!<lambda_efbde755ed85fba1fb214dc514d534cb>:

perator()+0xe7
00000026`7327ac50 00007ffc`88fc5380 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : provops!ProvOperations::ApplyKnownPackages+0xa46
00000026`7327b210 00007ffc`89ee33b2 : 00000164`ba6e6658 00000164`b1e2f6d8 00000026`7327b570 00000164`b1e2f6d8 : ProvMigrate!ProvMigration+0x290
00000026`7327b2d0 00007ffc`8a037e93 : 00000164`ba6e6658 00000164`b1e2f6d8 00000000`00000006 00000000`00000000 : SetupPlatform!CProvisioningMigration:

oExecute+0x252
00000026`7327b370 00007ffc`8a042596 : 00000164`b1e2f6d8 00000021`0000000a 01d84db6`8000ffff 01d8f1a5`013b7000 : SetupPlatform!COperation::Execute+0x1ab
00000026`7327b470 00007ffc`8a04519b : 00000164`b1da6d88 00000164`be6f2548 00007ffc`0000000a 00000000`00000002 : SetupPlatform!COperationQueue::ExecuteOperationsInternal+0x1d12
00000026`7327b7a0 00007ffc`89f0d6c9 : 00000000`00000000 00000026`7327b8d0 00000164`be6f2548 00000000`00000000 : SetupPlatform!COperationQueue::ExecuteOperations+0x1ef
00000026`7327b850 00007ffc`89f16c97 : 00000164`b1de9ab8 00000000`00000000 00000164`b1de9ba8 00000000`00000000 : SetupPlatform!pExecutePostBootOperations+0x2e1
00000026`7327b930 00007ff6`ea0d3bec : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : SetupPlatform!CSetupPlatformPrivate::Execute+0x6857
00000026`7327c770 00007ff6`ea0da74d : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : SetupPlatform_exe!wWinMain+0x229c
00000026`7327fe50 00007ffc`959a54e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : SetupPlatform_exe!__wmainCRTStartup+0x1dd
00000026`7327ff10 00007ffc`9708485b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x10
00000026`7327ff40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x2b
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_NAME: MdmDiagnostics!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::AddRedirectedOrGroupPolicyValues+652
MODULE_NAME: MdmDiagnostics
IMAGE_NAME: MdmDiagnostics.dll
FAILURE_BUCKET_ID: INVALID_POINTER_WRITE_c0000005_MdmDiagnostics.dll!Microsoft::Windows::Mdm::MdmDiagnosticSource:

olicyDiagDataSource::AddRedirectedOrGroupPolicyValues
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
IMAGE_VERSION: 10.0.22000.282
FAILURE_ID_HASH: {f0714e23-f780-a684-be3f-2566c47d2ccd}
Followup: MachineOwner