Advertisement
Sweetening

Audacity Buffer Overflow PoC

Oct 10th, 2024
30
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 156.55 KB | None | 0 0
  1. Operating system: Windows NT
  2. 10.0.18362 1256
  3. CPU: amd64
  4. family 6 model 158 stepping 10
  5. 12 CPUs
  6.  
  7. GPU: UNKNOWN
  8.  
  9. Crash reason: EXCEPTION_ACCESS_VIOLATION_READ
  10. Crash address: 0x0
  11. Process uptime: 351 seconds
  12.  
  13. Thread 0 (crashed)
  14. 0 Audacity.exe + 0x2e5af7
  15. rax = 0x000000000014ce58 rdx = 0x0000000000000000
  16. rcx = 0x0000000000000000 rbx = 0x0000000000000000
  17. rsi = 0x0000000000000000 rdi = 0x0000000000000000
  18. rbp = 0x000000000014ce89 rsp = 0x000000000014cdd0
  19. r8 = 0x0000000000000000 r9 = 0x0000000000000058
  20. r10 = 0x0000000000008000 r11 = 0x000000000014cd90
  21. r12 = 0x00000000002b2186 r13 = 0x000000000d9a4150
  22. r14 = 0x000000000dba29b0 r15 = 0x000000000d9a3eb0
  23. rip = 0x00007ff6b22c5af7
  24. Found by: given as instruction pointer in context
  25.  
  26. Stack contents:
  27. 000000000014cdd0 87 25 2b 00 00 00 00 00 b0 29 ba 0d 00 00 00 00 ‡%+.....°)º.....
  28. 000000000014cde0 40 b0 11 0c 00 00 00 00 00 00 00 00 00 00 00 00 @°..............
  29. 000000000014cdf0 e0 d0 95 0a 00 00 00 00 08 85 5d 0a 00 00 00 00 àЕ......…].....
  30. 000000000014ce00 e0 d0 95 0a 00 00 00 00 08 85 5d 0a 00 00 00 00 àЕ......…].....
  31. 000000000014ce10 00 00 00 00 00 00 00 00 08 85 5d 0a 00 00 00 00 .........…].....
  32. 000000000014ce20 86 21 2b 00 00 00 00 00 00 00 5c 00 00 00 00 00 †!+.......\.....
  33. 000000000014ce30 a5 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ¥...............
  34. 000000000014ce40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  35. 000000000014ce50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  36. 000000000014ce60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  37. 000000000014ce70 00 00 00 00 c3 90 45 41 00 00 00 00 00 00 00 00 ....Ã.EA........
  38. 000000000014ce80 00 00 00 00 00 00 e0 3f 00 00 00 00 00 00 00 00 ......à?........
  39. 000000000014ce90 00 00 00 00 00 00 f0 3f 00 00 00 00 00 00 00 00 ......ð?........
  40. 000000000014cea0 00 00 00 00 00 00 00 00 40 80 00 0c 00 00 00 00 ........@.......
  41. 000000000014ceb0 b0 3e 9a 0d 00 00 00 00 00 00 00 00 00 00 00 00 °>š.............
  42. 000000000014cec0 86 21 2b 00 00 00 00 00 40 30 2d 0e 00 00 00 00 †!+.....@0-.....
  43. 000000000014ced0 40 b0 11 0c 00 00 00 00 b0 29 ba 0d 00 00 00 00 @°......°)º.....
  44. 000000000014cee0 f0 cf 14 00 00 00 00 00 33 6a 2c b2 f6 7f 00 00 ðÏ......3j,²ö...
  45. Possible instruction pointers:
  46.  
  47. 1 Audacity.exe + 0x2e6a33
  48. rsp = 0x000000000014cef0 rip = 0x00007ff6b22c6a33
  49. Found by: stack scanning
  50.  
  51. Stack contents:
  52. 000000000014cef0 87 25 2b 00 00 00 00 00 50 41 9a 0d 00 00 00 00 ‡%+.....PAš.....
  53. 000000000014cf00 b0 3e 9a 0d 00 00 00 00 40 db 14 00 00 00 00 00 °>š.....@Û......
  54. 000000000014cf10 88 40 9a 0d 00 00 00 00 86 21 03 00 00 00 00 00 .@š.....†!......
  55. 000000000014cf20 00 85 8c 0d 00 00 00 00 00 00 00 00 00 00 00 00 .…Œ.............
  56. 000000000014cf30 01 06 08 19 fb 7f 00 00 ....û...
  57. Possible instruction pointers:
  58.  
  59. 2 lib-track.dll + 0x30601
  60. rsp = 0x000000000014cf38 rip = 0x00007ffb19080601
  61. Found by: stack scanning
  62.  
  63. Thread 1
  64. 0 ntdll.dll + 0x9d244
  65. rax = 0x000000000000005b rdx = 0x0000000004bdfce0
  66. rcx = 0x0000000000000001 rbx = 0x0000000000000001
  67. rsi = 0x0000000000000000 rdi = 0x0000000000000001
  68. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdf928
  69. r8 = 0x000000000000000c r9 = 0x0000000000000001
  70. r10 = 0x0000000000000000 r11 = 0x0000000004bfdd40
  71. r12 = 0x00000000000001f4 r13 = 0x0000000004bdfce0
  72. r14 = 0x0000000004bdf980 r15 = 0x0000000000000000
  73. rip = 0x00007ffb7469d244
  74. Found by: given as instruction pointer in context
  75.  
  76. Stack contents:
  77. 0000000004bdf928 e7 2a 62 71 fb 7f 00 00 ç*bqû...
  78. Possible instruction pointers:
  79.  
  80. 1 KERNELBASE.dll + 0x52ae7
  81. rax = 0x000000000000005b rdx = 0x0000000004bdfce0
  82. rcx = 0x0000000000000001 rbx = 0x0000000000000001
  83. rsi = 0x0000000000000000 rdi = 0x0000000000000001
  84. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdf930
  85. r8 = 0x000000000000000c r9 = 0x0000000000000001
  86. r10 = 0x0000000000000000 r11 = 0x0000000004bfdd40
  87. r12 = 0x00000000000001f4 r13 = 0x0000000004bdfce0
  88. r14 = 0x0000000004bdf980 r15 = 0x0000000000000000
  89. rip = 0x00007ffb71622ae7
  90. Found by: simulating a return from leaf function
  91.  
  92. Stack contents:
  93. 0000000004bdf930 70 78 ed 72 fb 7f 00 00 pxírû...
  94. Possible instruction pointers:
  95.  
  96. 2 RPCRT4.dll + 0xd7870
  97. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdf938
  98. rip = 0x00007ffb72ed7870
  99. Found by: stack scanning
  100.  
  101. Stack contents:
  102. 0000000004bdf938 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  103. 0000000004bdf948 00 00 00 00 00 00 00 00 80 f9 bd 04 00 00 00 00 .........ù½.....
  104. 0000000004bdf958 a0 f9 bd 04 00 00 00 00 f0 f9 bd 04 00 00 00 00  ù½.....ðù½.....
  105. 0000000004bdf968 00 10 26 00 00 00 00 00 01 00 00 00 00 00 00 00 ..&.............
  106. 0000000004bdf978 20 00 00 00 00 00 00 00 c0 b4 b3 ff ff ff ff ff .......À´³ÿÿÿÿÿ
  107. 0000000004bdf988 88 f9 bd 04 00 00 00 00 48 00 00 00 00 00 00 00 .ù½.....H.......
  108. 0000000004bdf998 01 00 00 00 fb 7f 00 00 00 00 00 00 00 00 00 00 ....û...........
  109. 0000000004bdf9a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  110. 0000000004bdf9b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  111. 0000000004bdf9c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  112. 0000000004bdf9d8 40 11 e0 04 00 00 00 00 00 00 00 00 00 00 00 00 @.à.............
  113. 0000000004bdf9e8 00 00 e0 04 00 00 00 00 ac 02 e0 04 00 00 00 00 ..à.....¬.à.....
  114. 0000000004bdf9f8 20 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 .......0.......
  115. 0000000004bdfa08 c0 0c e0 04 00 00 00 00 00 00 bf 04 00 00 00 00 À.à.......¿.....
  116. 0000000004bdfa18 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  117. 0000000004bdfa28 30 00 00 00 00 00 00 00 28 00 00 00 00 00 00 00 0.......(.......
  118. 0000000004bdfa38 08 00 00 00 00 00 00 00 00 00 bf 04 00 00 00 00 ..........¿.....
  119. 0000000004bdfa48 09 fb bd 04 00 00 00 00 03 00 00 00 00 00 00 00 û½.............
  120. 0000000004bdfa58 34 b4 63 74 fb 7f 00 00 4´ctû...
  121. Possible instruction pointers:
  122.  
  123. 3 ntdll.dll + 0x3b434
  124. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfa60
  125. rip = 0x00007ffb7463b434
  126. Found by: stack scanning
  127.  
  128. Stack contents:
  129. 0000000004bdfa60 00 00 e0 04 00 00 00 00 0d 13 64 74 fb 7f 00 00 ..à.......dtû...
  130. Possible instruction pointers:
  131.  
  132. 4 ntdll.dll + 0x4130d
  133. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfa70
  134. rip = 0x00007ffb7464130d
  135. Found by: stack scanning
  136.  
  137. Stack contents:
  138. 0000000004bdfa70 28 00 00 00 00 00 00 00 0d 13 64 74 fb 7f 00 00 (.........dtû...
  139. Possible instruction pointers:
  140.  
  141. 5 ntdll.dll + 0x4130d
  142. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfa80
  143. rip = 0x00007ffb7464130d
  144. Found by: stack scanning
  145.  
  146. Stack contents:
  147. 0000000004bdfa80 10 00 00 00 00 00 00 00 08 00 14 00 00 00 00 00 ................
  148. 0000000004bdfa90 02 00 00 00 00 00 00 00 00 0e bf 04 00 00 00 00 ..........¿.....
  149. 0000000004bdfaa0 20 ce bf 04 00 00 00 00 00 00 00 00 0a 00 00 00 ο.............
  150. 0000000004bdfab0 60 ce bf 04 00 00 00 00 10 c7 bf 04 00 00 00 00 `ο......ǿ.....
  151. 0000000004bdfac0 00 00 00 00 00 00 00 00 d0 d9 bf 04 00 00 00 00 ........ÐÙ¿.....
  152. 0000000004bdfad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  153. 0000000004bdfae0 00 00 00 00 00 00 00 00 10 fb bd 04 00 00 00 00 .........û½.....
  154. 0000000004bdfaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  155. 0000000004bdfb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  156. 0000000004bdfb10 40 c9 bf 04 00 00 00 00 e1 06 64 74 fb 7f 00 00 @É¿.....á.dtû...
  157. Possible instruction pointers:
  158.  
  159. 6 ntdll.dll + 0x406e1
  160. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb20
  161. rip = 0x00007ffb746406e1
  162. Found by: stack scanning
  163.  
  164. Stack contents:
  165. 0000000004bdfb20 40 dd bf 04 00 00 00 00 00 00 bf 04 00 00 00 00 @Ý¿.......¿.....
  166. 0000000004bdfb30 00 cf e4 17 fb 7f 00 00 .Ïä.û...
  167. Possible instruction pointers:
  168.  
  169. 7 dsound.dll + 0x5cf00
  170. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb38
  171. rip = 0x00007ffb17e4cf00
  172. Found by: stack scanning
  173.  
  174. Stack contents:
  175. 0000000004bdfb38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  176. 0000000004bdfb48 00 00 00 00 00 00 00 00 40 c9 bf 04 00 00 00 00 ........@É¿.....
  177. 0000000004bdfb58 94 c7 df 17 fb 7f 00 00 ”Çß.û...
  178. Possible instruction pointers:
  179.  
  180. 8 dsound.dll + 0xc794
  181. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb60
  182. rip = 0x00007ffb17dfc794
  183. Found by: stack scanning
  184.  
  185. Stack contents:
  186. 0000000004bdfb60 40 c9 bf 04 00 00 00 00 00 00 00 00 00 00 00 00 @É¿.............
  187. 0000000004bdfb70 00 00 00 00 00 00 00 00 40 dd bf 04 00 00 00 00 ........@Ý¿.....
  188. 0000000004bdfb80 10 fc bd 04 00 00 00 00 f8 ca df 17 fb 7f 00 00 .ü½.....øÊß.û...
  189. Possible instruction pointers:
  190.  
  191. 9 dsound.dll + 0xcaf8
  192. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb90
  193. rip = 0x00007ffb17dfcaf8
  194. Found by: stack scanning
  195.  
  196. Stack contents:
  197. 0000000004bdfb90 00 09 bf 04 00 00 00 00 e3 af e0 17 fb 7f 00 00 . ¿.....ã¯à.û...
  198. Possible instruction pointers:
  199.  
  200. 10 dsound.dll + 0x1afe3
  201. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfba0
  202. rip = 0x00007ffb17e0afe3
  203. Found by: stack scanning
  204.  
  205. Stack contents:
  206. 0000000004bdfba0 00 00 00 00 00 00 00 00 40 dd bf 04 00 00 00 00 ........@Ý¿.....
  207. 0000000004bdfbb0 00 09 bf 04 00 00 00 00 ad 2b 62 71 fb 7f 00 00 . ¿.....­+bqû...
  208. Possible instruction pointers:
  209.  
  210. 11 KERNELBASE.dll + 0x52bad
  211. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfbc0
  212. rip = 0x00007ffb71622bad
  213. Found by: stack scanning
  214.  
  215. Stack contents:
  216. 0000000004bdfbc0 10 fc bd 04 00 00 00 00 00 00 00 00 00 00 00 00 .ü½.............
  217. 0000000004bdfbd0 00 09 bf 04 00 00 00 00 00 00 00 00 00 00 00 00 . ¿.............
  218. 0000000004bdfbe0 10 fc bd 04 00 00 00 00 75 ad e0 17 fb 7f 00 00 .ü½.....u­à.û...
  219. Possible instruction pointers:
  220.  
  221. 12 dsound.dll + 0x1ad75
  222. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfbf0
  223. rip = 0x00007ffb17e0ad75
  224. Found by: stack scanning
  225.  
  226. Stack contents:
  227. 0000000004bdfbf0 52 cd 0b ef 97 26 00 00 00 10 26 00 00 00 00 00 RÍ.ï—&....&.....
  228. 0000000004bdfc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  229. 0000000004bdfc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  230. 0000000004bdfc20 f4 01 00 00 00 00 00 00 ce 29 62 71 fb 7f 00 00 ô.......Î)bqû...
  231. Possible instruction pointers:
  232.  
  233. 13 KERNELBASE.dll + 0x529ce
  234. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfc30
  235. rip = 0x00007ffb716229ce
  236. Found by: stack scanning
  237.  
  238. Stack contents:
  239. 0000000004bdfc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  240. 0000000004bdfc40 20 09 bf 04 00 00 00 00 00 00 00 00 00 00 00 00 ¿.............
  241. 0000000004bdfc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  242. 0000000004bdfc60 00 00 00 00 00 00 00 00 e1 da df 17 fb 7f 00 00 ........áÚß.û...
  243. Possible instruction pointers:
  244.  
  245. 14 dsound.dll + 0xdae1
  246. rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfc70
  247. rip = 0x00007ffb17dfdae1
  248. Found by: stack scanning
  249.  
  250. Thread 2
  251. 0 ntdll.dll + 0xa0084
  252. rax = 0x00000000000001cd rdx = 0x0000000002d56cc0
  253. rcx = 0x0000000000000014 rbx = 0x0000000002d57040
  254. rsi = 0x00000000005c0b50 rdi = 0x0000000002d57040
  255. rbp = 0x0000000000000000 rsp = 0x0000000004dffb68
  256. r8 = 0x0000000004dff948 r9 = 0x0000000004dff9b8
  257. r10 = 0x0000000004dff9e0 r11 = 0x0000000002d06da0
  258. r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
  259. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  260. rip = 0x00007ffb746a0084
  261. Found by: given as instruction pointer in context
  262.  
  263. Stack contents:
  264. 0000000004dffb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
  265. Possible instruction pointers:
  266.  
  267. 1 ntdll.dll + 0x33fe0
  268. rax = 0x00000000000001cd rdx = 0x0000000002d56cc0
  269. rcx = 0x0000000000000014 rbx = 0x0000000002d57040
  270. rsi = 0x00000000005c0b50 rdi = 0x0000000002d57040
  271. rbp = 0x0000000000000000 rsp = 0x0000000004dffb70
  272. r8 = 0x0000000004dff948 r9 = 0x0000000004dff9b8
  273. r10 = 0x0000000004dff9e0 r11 = 0x0000000002d06da0
  274. r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
  275. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  276. rip = 0x00007ffb74633fe0
  277. Found by: simulating a return from leaf function
  278.  
  279. Thread 3
  280. 0 ntdll.dll + 0xa0084
  281. rax = 0x00000000000001cd rdx = 0x0000000002dc1b70
  282. rcx = 0x0000000000000014 rbx = 0x0000000002dc1ef0
  283. rsi = 0x00000000005c0b50 rdi = 0x0000000002dc1ef0
  284. rbp = 0x0000000000000000 rsp = 0x000000000506fb68
  285. r8 = 0x000000000506e4c8 r9 = 0x000000000506e4c0
  286. r10 = 0x0000000000000000 r11 = 0x000000000506e480
  287. r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
  288. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  289. rip = 0x00007ffb746a0084
  290. Found by: given as instruction pointer in context
  291.  
  292. Stack contents:
  293. 000000000506fb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
  294. Possible instruction pointers:
  295.  
  296. 1 ntdll.dll + 0x33fe0
  297. rax = 0x00000000000001cd rdx = 0x0000000002dc1b70
  298. rcx = 0x0000000000000014 rbx = 0x0000000002dc1ef0
  299. rsi = 0x00000000005c0b50 rdi = 0x0000000002dc1ef0
  300. rbp = 0x0000000000000000 rsp = 0x000000000506fb70
  301. r8 = 0x000000000506e4c8 r9 = 0x000000000506e4c0
  302. r10 = 0x0000000000000000 r11 = 0x000000000506e480
  303. r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
  304. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  305. rip = 0x00007ffb74633fe0
  306. Found by: simulating a return from leaf function
  307.  
  308. Thread 4
  309. 0 ntdll.dll + 0x9cd74
  310. rax = 0x0000000000000034 rdx = 0x0000000004f6fd20
  311. rcx = 0x0000000000000000 rbx = 0x0000000000000000
  312. rsi = 0x0000000000000000 rdi = 0x000000000000000a
  313. rbp = 0x0000000000000000 rsp = 0x0000000004f6fcf8
  314. r8 = 0x0000000004f6fcf8 r9 = 0x0000000000000000
  315. r10 = 0x0000000000000000 r11 = 0x0000000000000246
  316. r12 = 0x0000000000000000 r13 = 0x0000000000000001
  317. r14 = 0x0000000002d61ac2 r15 = 0x0000000002d61960
  318. rip = 0x00007ffb7469cd74
  319. Found by: given as instruction pointer in context
  320.  
  321. Stack contents:
  322. 0000000004f6fcf8 21 fc 61 71 fb 7f 00 00 !üaqû...
  323. Possible instruction pointers:
  324.  
  325. 1 KERNELBASE.dll + 0x4fc21
  326. rax = 0x0000000000000034 rdx = 0x0000000004f6fd20
  327. rcx = 0x0000000000000000 rbx = 0x0000000000000000
  328. rsi = 0x0000000000000000 rdi = 0x000000000000000a
  329. rbp = 0x0000000000000000 rsp = 0x0000000004f6fd00
  330. r8 = 0x0000000004f6fcf8 r9 = 0x0000000000000000
  331. r10 = 0x0000000000000000 r11 = 0x0000000000000246
  332. r12 = 0x0000000000000000 r13 = 0x0000000000000001
  333. r14 = 0x0000000002d61ac2 r15 = 0x0000000002d61960
  334. rip = 0x00007ffb7161fc21
  335. Found by: simulating a return from leaf function
  336.  
  337. Stack contents:
  338. 0000000004f6fd00 b8 fd f6 04 00 00 00 00 c0 3f 63 71 fb 7f 00 00 ¸ýö.....À?cqû...
  339. Possible instruction pointers:
  340.  
  341. 2 KERNELBASE.dll + 0x63fc0
  342. rsp = 0x0000000004f6fd10 rip = 0x00007ffb71633fc0
  343. Found by: stack scanning
  344.  
  345. Stack contents:
  346. 0000000004f6fd10 e4 a3 cc 00 c3 00 00 00 70 fd f6 04 00 00 00 00 ä£Ì.Ã...pýö.....
  347. 0000000004f6fd20 60 79 fe ff ff ff ff ff 80 18 d6 02 00 00 00 00 `yþÿÿÿÿÿ..Ö.....
  348. 0000000004f6fd30 48 00 00 00 00 00 00 00 01 00 00 00 fb 7f 00 00 H...........û...
  349. 0000000004f6fd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  350. 0000000004f6fd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  351. 0000000004f6fd60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  352. 0000000004f6fd70 00 00 00 00 00 00 00 00 80 18 d6 02 00 00 00 00 ..........Ö.....
  353. 0000000004f6fd80 78 fe f6 04 00 00 00 00 80 18 d6 02 00 00 00 00 xþö.......Ö.....
  354. 0000000004f6fd90 18 fe f6 04 00 00 00 00 1c 2e 64 11 fb 7f 00 00 .þö.......d.û...
  355. Possible instruction pointers:
  356.  
  357. 3 MSVCP140.dll + 0x12e1c
  358. rsp = 0x0000000004f6fda0 rip = 0x00007ffb11642e1c
  359. Found by: stack scanning
  360.  
  361. Stack contents:
  362. 0000000004f6fda0 18 fe f6 04 00 00 00 00 00 00 00 00 00 00 00 00 .þö.............
  363. 0000000004f6fdb0 bb 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 »..À............
  364. 0000000004f6fdc0 e8 af 08 67 00 00 00 00 ac fd 54 15 00 00 00 00 è¯.g....¬ýT.....
  365. 0000000004f6fdd0 ec 2f 92 70 6c 32 00 00 82 82 32 48 fb 7f 00 00 ì/’pl2..‚‚2Hû...
  366. Possible instruction pointers:
  367.  
  368. 4 lib-audio-io.dll + 0x28282
  369. rsp = 0x0000000004f6fde0 rip = 0x00007ffb48328282
  370. Found by: stack scanning
  371.  
  372. Stack contents:
  373. 0000000004f6fde0 80 96 98 00 00 00 00 00 f3 7c 30 48 fb 7f 00 00 .–......ó|0Hû...
  374. Possible instruction pointers:
  375.  
  376. 5 lib-audio-io.dll + 0x7cf3
  377. rsp = 0x0000000004f6fdf0 rip = 0x00007ffb48307cf3
  378. Found by: stack scanning
  379.  
  380. Stack contents:
  381. 0000000004f6fdf0 80 96 98 00 00 00 00 00 03 00 00 00 00 00 00 00 .–..............
  382. 0000000004f6fe00 03 00 00 00 00 00 00 00 d5 ac 31 48 fb 7f 00 00 ........Õ¬1Hû...
  383. Possible instruction pointers:
  384.  
  385. 6 lib-audio-io.dll + 0x1acd5
  386. rsp = 0x0000000004f6fe10 rip = 0x00007ffb4831acd5
  387. Found by: stack scanning
  388.  
  389. Stack contents:
  390. 0000000004f6fe10 54 95 98 00 00 00 00 00 e8 af 08 67 00 00 00 00 T•......è¯.g....
  391. 0000000004f6fe20 9c 92 ed 15 00 00 00 00 e1 67 5c e4 73 f0 00 00 œ’í.....ág\äsð..
  392. 0000000004f6fe30 03 00 00 00 00 00 00 00 f3 f8 30 48 fb 7f 00 00 ........óø0Hû...
  393. Possible instruction pointers:
  394.  
  395. 7 lib-audio-io.dll + 0xf8f3
  396. rsp = 0x0000000004f6fe40 rip = 0x00007ffb4830f8f3
  397. Found by: stack scanning
  398.  
  399. Stack contents:
  400. 0000000004f6fe40 80 03 f0 4f 2c 4c 00 00 80 18 d6 02 00 00 00 00 ..ðO,L....Ö.....
  401. 0000000004f6fe50 30 ff f6 04 00 00 00 00 00 00 00 00 00 00 00 00 0ÿö.............
  402. 0000000004f6fe60 02 00 00 00 00 00 00 00 c0 1a d6 02 00 00 00 00 ........À.Ö.....
  403. 0000000004f6fe70 0a 00 00 00 00 00 00 00 00 9a 88 50 2c 4c 00 00 .........š.P,L..
  404. 0000000004f6fe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  405. 0000000004f6fe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  406. 0000000004f6fea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  407. 0000000004f6feb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  408. 0000000004f6fec0 e0 76 d5 02 00 00 00 00 8f 6c 30 48 fb 7f 00 00 àvÕ......l0Hû...
  409. Possible instruction pointers:
  410.  
  411. 8 lib-audio-io.dll + 0x6c8f
  412. rsp = 0x0000000004f6fed0 rip = 0x00007ffb48306c8f
  413. Found by: stack scanning
  414.  
  415. Stack contents:
  416. 0000000004f6fed0 01 00 08 00 ff ff ff ff 00 2f 4b 71 fb 7f 00 00 ....ÿÿÿÿ./Kqû...
  417. Possible instruction pointers:
  418.  
  419. 9 kernel.appcore.dll + 0x2f00
  420. rsp = 0x0000000004f6fee0 rip = 0x00007ffb714b2f00
  421. Found by: stack scanning
  422.  
  423. Stack contents:
  424. 0000000004f6fee0 00 9b 95 71 fb 7f 00 00 .›•qû...
  425. Possible instruction pointers:
  426.  
  427. 10 ucrtbase.dll + 0xb9b00
  428. rsp = 0x0000000004f6fee8 rip = 0x00007ffb71959b00
  429. Found by: stack scanning
  430.  
  431. Stack contents:
  432. 0000000004f6fee8 01 00 00 00 00 00 00 00 60 da d7 02 00 00 00 00 ........`Ú×.....
  433. 0000000004f6fef8 b2 10 8c 71 fb 7f 00 00 ².Œqû...
  434. Possible instruction pointers:
  435.  
  436. 11 ucrtbase.dll + 0x210b2
  437. rsp = 0x0000000004f6ff00 rip = 0x00007ffb718c10b2
  438. Found by: stack scanning
  439.  
  440. Stack contents:
  441. 0000000004f6ff00 60 da d7 02 00 00 00 00 00 00 00 00 00 00 00 00 `Ú×.............
  442. 0000000004f6ff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  443. 0000000004f6ff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  444. Possible instruction pointers:
  445.  
  446. 12 KERNEL32.DLL + 0x17c24
  447. rsp = 0x0000000004f6ff30 rip = 0x00007ffb73557c24
  448. Found by: stack scanning
  449.  
  450. Stack contents:
  451. 0000000004f6ff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  452. 0000000004f6ff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  453. 0000000004f6ff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  454. Possible instruction pointers:
  455.  
  456. 13 ntdll.dll + 0x6d4d1
  457. rsp = 0x0000000004f6ff60 rip = 0x00007ffb7466d4d1
  458. Found by: stack scanning
  459.  
  460. Thread 5
  461. 0 win32u.dll + 0x9a84
  462. rax = 0x0000000000001452 rdx = 0x00000000076fff08
  463. rcx = 0x0000000000000001 rbx = 0x00000000076fff08
  464. rsi = 0x00000000035c1ef0 rdi = 0x0000000000000001
  465. rbp = 0x0000000000000000 rsp = 0x00000000076ffe08
  466. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  467. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  468. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  469. r14 = 0x0000000000000000 r15 = 0x0000000000000000
  470. rip = 0x00007ffb72479a84
  471. Found by: given as instruction pointer in context
  472.  
  473. Stack contents:
  474. 00000000076ffe08 bd 1c c8 72 fb 7f 00 00 ½.Èrû...
  475. Possible instruction pointers:
  476.  
  477. 1 USER32.dll + 0x21cbd
  478. rax = 0x0000000000001452 rdx = 0x00000000076fff08
  479. rcx = 0x0000000000000001 rbx = 0x00000000076fff08
  480. rsi = 0x00000000035c1ef0 rdi = 0x0000000000000001
  481. rbp = 0x0000000000000000 rsp = 0x00000000076ffe10
  482. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  483. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  484. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  485. r14 = 0x0000000000000000 r15 = 0x0000000000000000
  486. rip = 0x00007ffb72c81cbd
  487. Found by: simulating a return from leaf function
  488.  
  489. Stack contents:
  490. 00000000076ffe10 ff 3d 00 00 00 00 00 00 59 94 c7 72 fb 7f 00 00 ÿ=......Y”Çrû...
  491. Possible instruction pointers:
  492.  
  493. 2 USER32.dll + 0x19459
  494. rsp = 0x00000000076ffe20 rip = 0x00007ffb72c79459
  495. Found by: stack scanning
  496.  
  497. Stack contents:
  498. 00000000076ffe20 00 00 00 00 00 00 00 00 c0 ac 1e 01 00 00 00 00 ........À¬......
  499. 00000000076ffe30 00 00 00 00 00 00 00 00 ff cc 33 00 ff cc 66 00 ........ÿÌ3.ÿÌf.
  500. 00000000076ffe40 01 00 00 00 ff cc cc 00 a3 1b c8 72 fb 7f 00 00 ....ÿÌÌ.£.Èrû...
  501. Possible instruction pointers:
  502.  
  503. 3 USER32.dll + 0x21ba3
  504. rsp = 0x00000000076ffe50 rip = 0x00007ffb72c81ba3
  505. Found by: stack scanning
  506.  
  507. Stack contents:
  508. 00000000076ffe50 00 00 00 00 ff ff 66 00 ff ff 99 00 ff ff cc 00 ....ÿÿf.ÿÿ..ÿÿÌ.
  509. 00000000076ffe60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  510. 00000000076ffe70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  511. 00000000076ffe80 01 00 00 00 00 00 00 00 13 37 2b 56 fb 7f 00 00 .........7+Vû...
  512. Possible instruction pointers:
  513.  
  514. 4 gdiplus.dll + 0x3713
  515. rsp = 0x00000000076ffe90 rip = 0x00007ffb562b3713
  516. Found by: stack scanning
  517.  
  518. Stack contents:
  519. 00000000076ffe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  520. 00000000076ffea0 f0 1e 5c 03 00 00 00 00 f0 1e 5c 03 00 00 00 00 ð.\.....ð.\.....
  521. 00000000076ffeb0 ff 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ÿ...............
  522. 00000000076ffec0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  523. 00000000076ffed0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  524. 00000000076ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  525. 00000000076ffef0 00 00 00 00 00 00 00 00 8f 36 2b 56 fb 7f 00 00 .........6+Vû...
  526. Possible instruction pointers:
  527.  
  528. 5 gdiplus.dll + 0x368f
  529. rsp = 0x00000000076fff00 rip = 0x00007ffb562b368f
  530. Found by: stack scanning
  531.  
  532. Stack contents:
  533. 00000000076fff00 00 00 00 00 00 00 00 00 f8 05 00 00 00 00 00 00 ........ø.......
  534. 00000000076fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  535. 00000000076fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  536. Possible instruction pointers:
  537.  
  538. 6 KERNEL32.DLL + 0x17c24
  539. rsp = 0x00000000076fff30 rip = 0x00007ffb73557c24
  540. Found by: stack scanning
  541.  
  542. Stack contents:
  543. 00000000076fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  544. 00000000076fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  545. 00000000076fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  546. Possible instruction pointers:
  547.  
  548. 7 ntdll.dll + 0x6d4d1
  549. rsp = 0x00000000076fff60 rip = 0x00007ffb7466d4d1
  550. Found by: stack scanning
  551.  
  552. Thread 6
  553. 0 ntdll.dll + 0xa0024
  554. rax = 0x00000000000001ca rdx = 0x0000000000000000
  555. rcx = 0x0000000002c13f18 rbx = 0x0000000000000000
  556. rsi = 0x0000000000000000 rdi = 0x0000000002c13ec0
  557. rbp = 0x0000000002c13f18 rsp = 0x0000000007ccf458
  558. r8 = 0x0000000007ccf3e0 r9 = 0x0000000000000000
  559. r10 = 0x0000000005420000 r11 = 0x0000000000000246
  560. r12 = 0x0000000002c13e90 r13 = 0x0000000002c13f08
  561. r14 = 0x0000000002c13ec8 r15 = 0x0000000000000000
  562. rip = 0x00007ffb746a0024
  563. Found by: given as instruction pointer in context
  564.  
  565. Stack contents:
  566. 0000000007ccf458 10 0c 66 74 fb 7f 00 00 ..ftû...
  567. Possible instruction pointers:
  568.  
  569. 1 ntdll.dll + 0x60c10
  570. rax = 0x00000000000001ca rdx = 0x0000000000000000
  571. rcx = 0x0000000002c13f18 rbx = 0x0000000000000000
  572. rsi = 0x0000000000000000 rdi = 0x0000000002c13ec0
  573. rbp = 0x0000000002c13f18 rsp = 0x0000000007ccf460
  574. r8 = 0x0000000007ccf3e0 r9 = 0x0000000000000000
  575. r10 = 0x0000000005420000 r11 = 0x0000000000000246
  576. r12 = 0x0000000002c13e90 r13 = 0x0000000002c13f08
  577. r14 = 0x0000000002c13ec8 r15 = 0x0000000000000000
  578. rip = 0x00007ffb74660c10
  579. Found by: simulating a return from leaf function
  580.  
  581. Stack contents:
  582. 0000000007ccf460 20 2f d2 03 00 00 00 00 08 00 00 00 00 00 00 00 /Ò.............
  583. 0000000007ccf470 00 00 01 00 00 00 00 00 00 09 d3 03 00 00 00 00 ......... Ó.....
  584. 0000000007ccf480 00 00 00 00 00 00 00 00 80 f4 cc 07 00 00 00 00 .........ôÌ.....
  585. 0000000007ccf490 00 00 00 00 00 00 00 00 38 94 08 00 00 00 00 00 ........8”......
  586. 0000000007ccf4a0 00 00 00 00 01 00 00 00 18 3f c1 02 00 00 00 00 .........?Á.....
  587. 0000000007ccf4b0 58 3f c1 02 00 00 00 00 00 00 00 00 00 00 00 00 X?Á.............
  588. 0000000007ccf4c0 08 3f c1 02 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .?Á......ì_qû...
  589. Possible instruction pointers:
  590.  
  591. 2 KERNELBASE.dll + 0x2ec8d
  592. rsp = 0x0000000007ccf4d0 rip = 0x00007ffb715fec8d
  593. Found by: stack scanning
  594.  
  595. Stack contents:
  596. 0000000007ccf4d0 10 3f c1 02 00 00 00 00 c0 3e c1 02 00 00 00 00 .?Á.....À>Á.....
  597. 0000000007ccf4e0 70 f6 cc 07 00 00 00 00 69 f7 cc 07 00 00 00 00 pöÌ.....i÷Ì.....
  598. 0000000007ccf4f0 00 00 54 02 00 00 00 00 08 3f c1 02 00 00 00 00 ..T......?Á.....
  599. 0000000007ccf500 10 3f c1 02 00 00 00 00 39 29 64 11 fb 7f 00 00 .?Á.....9)d.û...
  600. Possible instruction pointers:
  601.  
  602. 3 MSVCP140.dll + 0x12939
  603. rsp = 0x0000000007ccf510 rip = 0x00007ffb11642939
  604. Found by: stack scanning
  605.  
  606. Stack contents:
  607. 0000000007ccf510 00 00 00 00 00 00 00 00 60 b8 d0 03 00 00 00 00 ........`¸Ð.....
  608. 0000000007ccf520 00 00 00 00 00 00 00 00 20 b6 5a 58 fb 7f 00 00 ........ ¶ZXû...
  609. Possible instruction pointers:
  610.  
  611. 4 lib-project-file-io.dll + 0x3b620
  612. rsp = 0x0000000007ccf530 rip = 0x00007ffb585ab620
  613. Found by: stack scanning
  614.  
  615. Stack contents:
  616. 0000000007ccf530 60 b8 d0 03 00 00 00 00 7a 2b 64 11 fb 7f 00 00 `¸Ð.....z+d.û...
  617. Possible instruction pointers:
  618.  
  619. 5 MSVCP140.dll + 0x12b7a
  620. rsp = 0x0000000007ccf540 rip = 0x00007ffb11642b7a
  621. Found by: stack scanning
  622.  
  623. Stack contents:
  624. 0000000007ccf540 5c 27 a8 73 6c 32 00 00 00 00 00 00 00 00 00 00 \'¨sl2..........
  625. 0000000007ccf550 58 3f c1 02 00 00 00 00 00 00 00 00 00 00 00 00 X?Á.............
  626. 0000000007ccf560 59 3f c1 02 00 00 00 00 b3 a6 57 58 fb 7f 00 00 Y?Á.....³¦WXû...
  627. Possible instruction pointers:
  628.  
  629. 6 lib-project-file-io.dll + 0xa6b3
  630. rsp = 0x0000000007ccf570 rip = 0x00007ffb5857a6b3
  631. Found by: stack scanning
  632.  
  633. Stack contents:
  634. 0000000007ccf570 c0 3e c1 02 00 00 00 00 59 3f c1 02 00 00 00 00 À>Á.....Y?Á.....
  635. 0000000007ccf580 59 3f c1 02 00 00 00 00 00 00 00 00 00 00 00 00 Y?Á.............
  636. 0000000007ccf590 00 00 00 00 00 00 00 00 d0 04 00 00 00 00 00 00 ........Ð.......
  637. 0000000007ccf5a0 00 09 d4 03 00 00 00 00 00 00 00 00 00 00 00 00 . Ô.............
  638. 0000000007ccf5b0 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
  639. 0000000007ccf5c0 c2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Â...............
  640. 0000000007ccf5d0 90 3e c1 02 00 00 00 00 be b9 63 74 fb 7f 00 00 .>Á.....¾¹ctû...
  641. Possible instruction pointers:
  642.  
  643. 7 ntdll.dll + 0x3b9be
  644. rsp = 0x0000000007ccf5e0 rip = 0x00007ffb7463b9be
  645. Found by: stack scanning
  646.  
  647. Stack contents:
  648. 0000000007ccf5e0 37 00 04 00 00 00 00 00 30 9e d8 02 00 00 00 00 7.......0žØ.....
  649. 0000000007ccf5f0 58 3f c1 02 00 00 00 00 60 b8 d0 03 00 00 00 00 X?Á.....`¸Ð.....
  650. 0000000007ccf600 e0 02 00 00 00 00 00 00 90 00 00 00 00 00 00 00 à...............
  651. 0000000007ccf610 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
  652. 0000000007ccf620 01 00 00 00 00 00 00 00 00 00 18 00 00 00 00 00 ................
  653. 0000000007ccf630 c4 02 18 00 00 00 00 00 34 b4 63 74 fb 7f 00 00 Ä.......4´ctû...
  654. Possible instruction pointers:
  655.  
  656. 8 ntdll.dll + 0x3b434
  657. rsp = 0x0000000007ccf640 rip = 0x00007ffb7463b434
  658. Found by: stack scanning
  659.  
  660. Stack contents:
  661. 0000000007ccf640 90 00 00 00 00 00 00 00 c0 0c 18 00 00 00 00 00 ........À.......
  662. 0000000007ccf650 02 00 00 02 00 00 00 00 08 00 00 00 00 00 00 00 ................
  663. 0000000007ccf660 00 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 ................
  664. 0000000007ccf670 80 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
  665. 0000000007ccf680 00 00 5c 00 00 00 00 00 66 64 c5 68 fb 7f 00 00 ..\.....fdÅhû...
  666. Possible instruction pointers:
  667.  
  668. 9 WindowsCodecs.dll + 0x96466
  669. rsp = 0x0000000007ccf690 rip = 0x00007ffb68c56466
  670. Found by: stack scanning
  671.  
  672. Stack contents:
  673. 0000000007ccf690 09 00 00 00 00 00 00 00 34 b4 63 74 fb 7f 00 00 .......4´ctû...
  674. Possible instruction pointers:
  675.  
  676. 10 ntdll.dll + 0x3b434
  677. rsp = 0x0000000007ccf6a0 rip = 0x00007ffb7463b434
  678. Found by: stack scanning
  679.  
  680. Stack contents:
  681. 0000000007ccf6a0 00 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  682. 0000000007ccf6b0 80 00 00 00 00 00 00 00 08 00 00 00 fb 7f 00 00 ............û...
  683. 0000000007ccf6c0 02 00 00 00 00 00 00 00 4f 49 a4 59 fb 7f 00 00 ........OI¤Yû...
  684. Possible instruction pointers:
  685.  
  686. 11 MSACM32.dll + 0x494f
  687. rsp = 0x0000000007ccf6d0 rip = 0x00007ffb59a4494f
  688. Found by: stack scanning
  689.  
  690. Stack contents:
  691. 0000000007ccf6d0 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
  692. 0000000007ccf6e0 a9 57 b1 8f 86 36 00 00 00 00 bc 68 fb 7f 00 00 ©W±.†6....¼hû...
  693. 0000000007ccf6f0 01 00 00 00 00 00 00 00 0f b1 c4 68 fb 7f 00 00 .........±Ähû...
  694. Possible instruction pointers:
  695.  
  696. 12 WindowsCodecs.dll + 0x8b10f
  697. rsp = 0x0000000007ccf700 rip = 0x00007ffb68c4b10f
  698. Found by: stack scanning
  699.  
  700. Stack contents:
  701. 0000000007ccf700 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  702. 0000000007ccf710 01 00 00 00 00 00 00 00 a0 07 00 00 00 00 00 00 ........ .......
  703. 0000000007ccf720 01 00 00 00 00 00 00 00 30 f7 cc 07 00 00 00 00 ........0÷Ì.....
  704. 0000000007ccf730 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  705. 0000000007ccf740 00 a0 28 00 00 00 00 00 9c 49 65 74 fb 7f 00 00 . (.....œIetû...
  706. Possible instruction pointers:
  707.  
  708. 13 ntdll.dll + 0x5499c
  709. rsp = 0x0000000007ccf750 rip = 0x00007ffb7465499c
  710. Found by: stack scanning
  711.  
  712. Stack contents:
  713. 0000000007ccf750 a0 f2 b8 03 00 00 00 00 15 00 00 00 00 00 00 00  ò¸.............
  714. 0000000007ccf760 00 00 00 00 00 00 00 00 d8 c1 8a 71 fb 7f 00 00 ........ØÁŠqû...
  715. Possible instruction pointers:
  716.  
  717. 14 ucrtbase.dll + 0xc1d8
  718. rsp = 0x0000000007ccf770 rip = 0x00007ffb718ac1d8
  719. Found by: stack scanning
  720.  
  721. Stack contents:
  722. 0000000007ccf770 05 00 00 00 00 00 00 00 20 be 14 6f fb 7f 00 00 ........ ¾.oû...
  723. Possible instruction pointers:
  724.  
  725. 15 dcomp.dll + 0x6be20
  726. rsp = 0x0000000007ccf780 rip = 0x00007ffb6f14be20
  727. Found by: stack scanning
  728.  
  729. Stack contents:
  730. 0000000007ccf780 a0 38 b3 03 00 00 00 00 d0 3b 65 74 fb 7f 00 00  8³.....Ð;etû...
  731. Possible instruction pointers:
  732.  
  733. 16 ntdll.dll + 0x53bd0
  734. rsp = 0x0000000007ccf790 rip = 0x00007ffb74653bd0
  735. Found by: stack scanning
  736.  
  737. Stack contents:
  738. 0000000007ccf790 00 00 00 00 00 00 00 00 90 ff 10 18 fb 7f 00 00 .........ÿ..û...
  739. Possible instruction pointers:
  740.  
  741. 17 VCRUNTIME140.dll + 0xff90
  742. rsp = 0x0000000007ccf7a0 rip = 0x00007ffb1810ff90
  743. Found by: stack scanning
  744.  
  745. Stack contents:
  746. 0000000007ccf7a0 00 00 00 00 00 00 00 00 fe cf 74 6f fb 7f 00 00 ........þÏtoû...
  747. Possible instruction pointers:
  748.  
  749. 18 twinapi.appcore.dll + 0x6cffe
  750. rsp = 0x0000000007ccf7b0 rip = 0x00007ffb6f74cffe
  751. Found by: stack scanning
  752.  
  753. Stack contents:
  754. 0000000007ccf7b0 e0 fa cc 07 00 00 00 00 00 00 4a 72 fb 7f 00 00 àúÌ.......Jrû...
  755. 0000000007ccf7c0 10 00 00 00 00 00 00 00 77 4e 62 74 fb 7f 00 00 ........wNbtû...
  756. Possible instruction pointers:
  757.  
  758. 19 ntdll.dll + 0x24e77
  759. rsp = 0x0000000007ccf7d0 rip = 0x00007ffb74624e77
  760. Found by: stack scanning
  761.  
  762. Stack contents:
  763. 0000000007ccf7d0 28 ae 8a 6f fb 7f 00 00 (®Šoû...
  764. Possible instruction pointers:
  765.  
  766. 20 twinapi.appcore.dll + 0x1cae28
  767. rsp = 0x0000000007ccf7d8 rip = 0x00007ffb6f8aae28
  768. Found by: stack scanning
  769.  
  770. Stack contents:
  771. 0000000007ccf7d8 8d c5 74 6f fb 7f 00 00 .Åtoû...
  772. Possible instruction pointers:
  773.  
  774. 21 twinapi.appcore.dll + 0x6c58d
  775. rsp = 0x0000000007ccf7e0 rip = 0x00007ffb6f74c58d
  776. Found by: stack scanning
  777.  
  778. Stack contents:
  779. 0000000007ccf7e0 00 00 6e 6f fb 7f 00 00 2a 50 62 74 fb 7f 00 00 ..noû...*Pbtû...
  780. Possible instruction pointers:
  781.  
  782. 22 ntdll.dll + 0x2502a
  783. rsp = 0x0000000007ccf7f0 rip = 0x00007ffb7462502a
  784. Found by: stack scanning
  785.  
  786. Stack contents:
  787. 0000000007ccf7f0 85 03 fe 7f 00 00 00 00 93 4f 62 74 fb 7f 00 00 ….þ.....“Obtû...
  788. Possible instruction pointers:
  789.  
  790. 23 ntdll.dll + 0x24f93
  791. rsp = 0x0000000007ccf800 rip = 0x00007ffb74624f93
  792. Found by: stack scanning
  793.  
  794. Stack contents:
  795. 0000000007ccf800 02 00 00 00 00 00 00 00 fb c7 74 6f fb 7f 00 00 ........ûÇtoû...
  796. Possible instruction pointers:
  797.  
  798. 24 twinapi.appcore.dll + 0x6c7fb
  799. rsp = 0x0000000007ccf810 rip = 0x00007ffb6f74c7fb
  800. Found by: stack scanning
  801.  
  802. Stack contents:
  803. 0000000007ccf810 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  804. 0000000007ccf820 e8 00 0e 6f fb 7f 00 00 è..oû...
  805. Possible instruction pointers:
  806.  
  807. 25 dcomp.dll + 0xe8
  808. rsp = 0x0000000007ccf828 rip = 0x00007ffb6f0e00e8
  809. Found by: stack scanning
  810.  
  811. Stack contents:
  812. 0000000007ccf828 84 03 fe 7f 00 00 00 00 00 a0 28 00 00 00 00 00 „.þ...... (.....
  813. 0000000007ccf838 02 00 00 00 00 00 00 00 d0 af c4 68 fb 7f 00 00 ........ЯÄhû...
  814. Possible instruction pointers:
  815.  
  816. 26 WindowsCodecs.dll + 0x8afd0
  817. rsp = 0x0000000007ccf848 rip = 0x00007ffb68c4afd0
  818. Found by: stack scanning
  819.  
  820. Stack contents:
  821. 0000000007ccf848 90 2f 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 ./\.............
  822. 0000000007ccf858 b2 50 62 74 fb 7f 00 00 ²Pbtû...
  823. Possible instruction pointers:
  824.  
  825. 27 ntdll.dll + 0x250b2
  826. rsp = 0x0000000007ccf860 rip = 0x00007ffb746250b2
  827. Found by: stack scanning
  828.  
  829. Stack contents:
  830. 0000000007ccf860 00 00 00 00 00 00 00 00 2a 50 62 74 fb 7f 00 00 ........*Pbtû...
  831. Possible instruction pointers:
  832.  
  833. 28 ntdll.dll + 0x2502a
  834. rsp = 0x0000000007ccf870 rip = 0x00007ffb7462502a
  835. Found by: stack scanning
  836.  
  837. Stack contents:
  838. 0000000007ccf870 00 00 bc 68 fb 7f 00 00 02 00 00 00 00 00 00 00 ..¼hû...........
  839. 0000000007ccf880 00 00 00 00 00 00 00 00 85 03 fe 7f 00 00 00 00 ........….þ.....
  840. 0000000007ccf890 15 00 00 00 00 00 00 00 8b d7 62 74 fb 7f 00 00 ........‹×btû...
  841. Possible instruction pointers:
  842.  
  843. 29 ntdll.dll + 0x2d78b
  844. rsp = 0x0000000007ccf8a0 rip = 0x00007ffb7462d78b
  845. Found by: stack scanning
  846.  
  847. Stack contents:
  848. 0000000007ccf8a0 d0 af c4 68 fb 7f 00 00 ЯÄhû...
  849. Possible instruction pointers:
  850.  
  851. 30 WindowsCodecs.dll + 0x8afd0
  852. rsp = 0x0000000007ccf8a8 rip = 0x00007ffb68c4afd0
  853. Found by: stack scanning
  854.  
  855. Stack contents:
  856. 0000000007ccf8a8 54 3e 67 74 fb 7f 00 00 T>gtû...
  857. Possible instruction pointers:
  858.  
  859. 31 ntdll.dll + 0x73e54
  860. rsp = 0x0000000007ccf8b0 rip = 0x00007ffb74673e54
  861. Found by: stack scanning
  862.  
  863. Stack contents:
  864. 0000000007ccf8b0 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
  865. 0000000007ccf8c0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
  866. 0000000007ccf8d0 d0 af c4 68 fb 7f 00 00 ЯÄhû...
  867. Possible instruction pointers:
  868.  
  869. 32 WindowsCodecs.dll + 0x8afd0
  870. rsp = 0x0000000007ccf8d8 rip = 0x00007ffb68c4afd0
  871. Found by: stack scanning
  872.  
  873. Stack contents:
  874. 0000000007ccf8d8 e2 2e 62 74 fb 7f 00 00 â.btû...
  875. Possible instruction pointers:
  876.  
  877. 33 ntdll.dll + 0x22ee2
  878. rsp = 0x0000000007ccf8e0 rip = 0x00007ffb74622ee2
  879. Found by: stack scanning
  880.  
  881. Stack contents:
  882. 0000000007ccf8e0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
  883. 0000000007ccf8f0 00 10 26 00 00 00 00 00 d0 af c4 68 fb 7f 00 00 ..&.....ЯÄhû...
  884. Possible instruction pointers:
  885.  
  886. 34 WindowsCodecs.dll + 0x8afd0
  887. rsp = 0x0000000007ccf900 rip = 0x00007ffb68c4afd0
  888. Found by: stack scanning
  889.  
  890. Stack contents:
  891. 0000000007ccf900 c0 6d b6 03 00 00 00 00 d0 af c4 68 fb 7f 00 00 Àm¶.....ЯÄhû...
  892. Possible instruction pointers:
  893.  
  894. 35 WindowsCodecs.dll + 0x8afd0
  895. rsp = 0x0000000007ccf910 rip = 0x00007ffb68c4afd0
  896. Found by: stack scanning
  897.  
  898. Stack contents:
  899. 0000000007ccf910 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H...............
  900. 0000000007ccf920 00 00 00 00 00 00 00 00 b8 83 60 00 00 00 00 00 ........¸ƒ`.....
  901. 0000000007ccf930 60 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff `.......ÿÿÿÿÿÿÿÿ
  902. 0000000007ccf940 47 7c 9f ff ff ff ff ff 1a 2e 62 74 fb 7f 00 00 G|Ÿÿÿÿÿÿ..btû...
  903. Possible instruction pointers:
  904.  
  905. 36 ntdll.dll + 0x22e1a
  906. rsp = 0x0000000007ccf950 rip = 0x00007ffb74622e1a
  907. Found by: stack scanning
  908.  
  909. Stack contents:
  910. 0000000007ccf950 4d 2e 62 74 fb 7f 00 00 M.btû...
  911. Possible instruction pointers:
  912.  
  913. 37 ntdll.dll + 0x22e4d
  914. rsp = 0x0000000007ccf958 rip = 0x00007ffb74622e4d
  915. Found by: stack scanning
  916.  
  917. Stack contents:
  918. 0000000007ccf958 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00 ........H.......
  919. 0000000007ccf968 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  920. 0000000007ccf978 00 00 00 00 00 00 00 00 70 00 00 00 00 00 00 00 ........p.......
  921. 0000000007ccf988 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
  922. 0000000007ccf998 aa 2e 62 74 fb 7f 00 00 ª.btû...
  923. Possible instruction pointers:
  924.  
  925. 38 ntdll.dll + 0x22eaa
  926. rsp = 0x0000000007ccf9a0 rip = 0x00007ffb74622eaa
  927. Found by: stack scanning
  928.  
  929. Stack contents:
  930. 0000000007ccf9a0 ca 2e 62 74 fb 7f 00 00 Ê.btû...
  931. Possible instruction pointers:
  932.  
  933. 39 ntdll.dll + 0x22eca
  934. rsp = 0x0000000007ccf9a8 rip = 0x00007ffb74622eca
  935. Found by: stack scanning
  936.  
  937. Stack contents:
  938. 0000000007ccf9a8 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
  939. 0000000007ccf9b8 12 1f 67 74 fb 7f 00 00 ..gtû...
  940. Possible instruction pointers:
  941.  
  942. 40 ntdll.dll + 0x71f12
  943. rsp = 0x0000000007ccf9c0 rip = 0x00007ffb74671f12
  944. Found by: stack scanning
  945.  
  946. Stack contents:
  947. 0000000007ccf9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  948. 0000000007ccf9d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  949. 0000000007ccf9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  950. 0000000007ccf9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  951. 0000000007ccfa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  952. 0000000007ccfa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  953. 0000000007ccfa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  954. 0000000007ccfa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  955. 0000000007ccfa40 e0 fa cc 07 00 00 00 00 00 00 00 00 00 00 00 00 àúÌ.............
  956. 0000000007ccfa50 00 00 60 74 fb 7f 00 00 53 1e 67 74 fb 7f 00 00 ..`tû...S.gtû...
  957. Possible instruction pointers:
  958.  
  959. 41 ntdll.dll + 0x71e53
  960. rsp = 0x0000000007ccfa60 rip = 0x00007ffb74671e53
  961. Found by: stack scanning
  962.  
  963. Stack contents:
  964. 0000000007ccfa60 00 00 00 00 00 00 00 00 00 00 60 74 fb 7f 00 00 ..........`tû...
  965. 0000000007ccfa70 00 00 00 00 00 00 00 00 00 a0 28 00 00 00 00 00 ......... (.....
  966. 0000000007ccfa80 00 00 00 00 00 00 00 00 08 1e 67 74 fb 7f 00 00 ..........gtû...
  967. Possible instruction pointers:
  968.  
  969. 42 ntdll.dll + 0x71e08
  970. rsp = 0x0000000007ccfa90 rip = 0x00007ffb74671e08
  971. Found by: stack scanning
  972.  
  973. Stack contents:
  974. 0000000007ccfa90 e0 fa cc 07 00 00 00 00 00 00 00 00 00 00 00 00 àúÌ.............
  975. 0000000007ccfaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  976. 0000000007ccfab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  977. 0000000007ccfac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  978. 0000000007ccfad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  979. 0000000007ccfae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  980. 0000000007ccfaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  981. 0000000007ccfb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  982. 0000000007ccfb10 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3.......
  983. 0000000007ccfb20 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+.............
  984. 0000000007ccfb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  985. 0000000007ccfb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  986. 0000000007ccfb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  987. 0000000007ccfb60 70 10 8c 71 fb 7f 00 00 p.Œqû...
  988. Possible instruction pointers:
  989.  
  990. 43 ucrtbase.dll + 0x21070
  991. rsp = 0x0000000007ccfb68 rip = 0x00007ffb718c1070
  992. Found by: stack scanning
  993.  
  994. Stack contents:
  995. 0000000007ccfb68 20 a4 bc 03 00 00 00 00 00 00 00 00 00 00 00 00 ¤¼.............
  996. 0000000007ccfb78 d8 ff cc 07 00 00 00 00 00 00 00 00 00 00 00 00 ØÿÌ.............
  997. 0000000007ccfb88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  998. 0000000007ccfb98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  999. 0000000007ccfba8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1000. 0000000007ccfbb8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1001. 0000000007ccfbc8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1002. 0000000007ccfbd8 b0 d4 66 74 fb 7f 00 00 °Ôftû...
  1003. Possible instruction pointers:
  1004.  
  1005. 44 ntdll.dll + 0x6d4b0
  1006. rsp = 0x0000000007ccfbe0 rip = 0x00007ffb7466d4b0
  1007. Found by: stack scanning
  1008.  
  1009. Thread 7
  1010. 0 ntdll.dll + 0xa0024
  1011. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1012. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1013. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1014. rbp = 0x0000000003b617b0 rsp = 0x00000000083cfd28
  1015. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1016. r10 = 0x0000000000000003 r11 = 0x0000000003c90e50
  1017. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1018. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1019. rip = 0x00007ffb746a0024
  1020. Found by: given as instruction pointer in context
  1021.  
  1022. Stack contents:
  1023. 00000000083cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1024. Possible instruction pointers:
  1025.  
  1026. 1 ntdll.dll + 0x60c10
  1027. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1028. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1029. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1030. rbp = 0x0000000003b617b0 rsp = 0x00000000083cfd30
  1031. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1032. r10 = 0x0000000000000003 r11 = 0x0000000003c90e50
  1033. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1034. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1035. rip = 0x00007ffb74660c10
  1036. Found by: simulating a return from leaf function
  1037.  
  1038. Stack contents:
  1039. 00000000083cfd30 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
  1040. 00000000083cfd40 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
  1041. 00000000083cfd50 50 fd 7c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý|.....Pý......
  1042. 00000000083cfd60 00 00 00 00 00 00 00 00 74 94 08 00 00 00 00 00 ........t”......
  1043. 00000000083cfd70 c0 59 5a 0a 01 00 00 00 b0 17 b6 03 00 00 00 00 ÀYZ.....°.¶.....
  1044. 00000000083cfd80 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
  1045. 00000000083cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1046. Possible instruction pointers:
  1047.  
  1048. 2 KERNELBASE.dll + 0x2ec8d
  1049. rsp = 0x00000000083cfda0 rip = 0x00007ffb715fec8d
  1050. Found by: stack scanning
  1051.  
  1052. Stack contents:
  1053. 00000000083cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  1054. 00000000083cfdb0 00 00 00 00 00 00 00 00 60 fe 3c 08 00 00 00 00 ........`þ<.....
  1055. 00000000083cfdc0 0f 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  1056. 00000000083cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  1057. Possible instruction pointers:
  1058.  
  1059. 3 MSVCP140.dll + 0x12939
  1060. rsp = 0x00000000083cfde0 rip = 0x00007ffb11642939
  1061. Found by: stack scanning
  1062.  
  1063. Stack contents:
  1064. 00000000083cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1065. 00000000083cfdf0 20 0d d2 03 00 00 00 00 07 49 13 15 fb 7f 00 00 .Ò......I..û...
  1066. Possible instruction pointers:
  1067.  
  1068. 4 lib-network-manager.dll + 0x14907
  1069. rsp = 0x00000000083cfe00 rip = 0x00007ffb15134907
  1070. Found by: stack scanning
  1071.  
  1072. Stack contents:
  1073. 00000000083cfe00 20 ab 60 02 00 00 00 00 7a 2b 64 11 fb 7f 00 00 «`.....z+d.û...
  1074. Possible instruction pointers:
  1075.  
  1076. 5 MSVCP140.dll + 0x12b7a
  1077. rsp = 0x00000000083cfe10 rip = 0x00007ffb11642b7a
  1078. Found by: stack scanning
  1079.  
  1080. Stack contents:
  1081. 00000000083cfe10 ac 2f 58 7c 6c 32 00 00 60 fe 3c 08 00 00 00 00 ¬/X|l2..`þ<.....
  1082. 00000000083cfe20 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
  1083. 00000000083cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  1084. Possible instruction pointers:
  1085.  
  1086. 6 lib-network-manager.dll + 0x141bf
  1087. rsp = 0x00000000083cfe40 rip = 0x00007ffb151341bf
  1088. Found by: stack scanning
  1089.  
  1090. Stack contents:
  1091. 00000000083cfe40 60 17 b6 03 00 00 00 00 60 12 c0 02 00 00 00 00 `.¶.....`.À.....
  1092. 00000000083cfe50 a0 17 b6 03 00 00 00 00 60 12 c0 02 00 00 00 00  .¶.....`.À.....
  1093. 00000000083cfe60 80 36 14 15 fb 7f 00 00 .6..û...
  1094. Possible instruction pointers:
  1095.  
  1096. 7 lib-network-manager.dll + 0x23680
  1097. rsp = 0x00000000083cfe68 rip = 0x00007ffb15143680
  1098. Found by: stack scanning
  1099.  
  1100. Stack contents:
  1101. 00000000083cfe68 30 ab 60 02 00 00 00 00 20 ab 60 02 00 00 00 00 0«`..... «`.....
  1102. 00000000083cfe78 d0 3b 65 74 fb 7f 00 00 Ð;etû...
  1103. Possible instruction pointers:
  1104.  
  1105. 8 ntdll.dll + 0x53bd0
  1106. rsp = 0x00000000083cfe80 rip = 0x00007ffb74653bd0
  1107. Found by: stack scanning
  1108.  
  1109. Stack contents:
  1110. 00000000083cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1111. 00000000083cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1112. 00000000083cfea0 9d ca 6c 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Êlž&›..........
  1113. 00000000083cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1114. 00000000083cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  1115. Possible instruction pointers:
  1116.  
  1117. 9 lib-network-manager.dll + 0x128be
  1118. rsp = 0x00000000083cfed0 rip = 0x00007ffb151328be
  1119. Found by: stack scanning
  1120.  
  1121. Stack contents:
  1122. 00000000083cfed0 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
  1123. 00000000083cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1124. 00000000083cfef0 a0 1c d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00  .×.....².Œqû...
  1125. Possible instruction pointers:
  1126.  
  1127. 10 ucrtbase.dll + 0x210b2
  1128. rsp = 0x00000000083cff00 rip = 0x00007ffb718c10b2
  1129. Found by: stack scanning
  1130.  
  1131. Stack contents:
  1132. 00000000083cff00 00 00 00 00 00 00 00 00 a0 1c d7 02 00 00 00 00 ........ .×.....
  1133. 00000000083cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1134. 00000000083cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  1135. Possible instruction pointers:
  1136.  
  1137. 11 KERNEL32.DLL + 0x17c24
  1138. rsp = 0x00000000083cff30 rip = 0x00007ffb73557c24
  1139. Found by: stack scanning
  1140.  
  1141. Stack contents:
  1142. 00000000083cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1143. 00000000083cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1144. 00000000083cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  1145. Possible instruction pointers:
  1146.  
  1147. 12 ntdll.dll + 0x6d4d1
  1148. rsp = 0x00000000083cff60 rip = 0x00007ffb7466d4d1
  1149. Found by: stack scanning
  1150.  
  1151. Thread 8
  1152. 0 ntdll.dll + 0xa0024
  1153. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1154. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1155. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1156. rbp = 0x0000000003b617b0 rsp = 0x00000000085ffd28
  1157. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1158. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1159. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1160. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1161. rip = 0x00007ffb746a0024
  1162. Found by: given as instruction pointer in context
  1163.  
  1164. Stack contents:
  1165. 00000000085ffd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1166. Possible instruction pointers:
  1167.  
  1168. 1 ntdll.dll + 0x60c10
  1169. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1170. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1171. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1172. rbp = 0x0000000003b617b0 rsp = 0x00000000085ffd30
  1173. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1174. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1175. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1176. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1177. rip = 0x00007ffb74660c10
  1178. Found by: simulating a return from leaf function
  1179.  
  1180. Stack contents:
  1181. 00000000085ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1182. 00000000085ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1183. 00000000085ffd50 50 fd 6c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pýl.....Pý......
  1184. 00000000085ffd60 50 fd 2c 0b 00 00 00 00 88 94 08 00 00 00 00 00 Pý,......”......
  1185. 00000000085ffd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  1186. 00000000085ffd80 00 00 00 00 00 00 00 00 e0 0e d2 03 00 00 00 00 ........à.Ò.....
  1187. 00000000085ffd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1188. Possible instruction pointers:
  1189.  
  1190. 2 KERNELBASE.dll + 0x2ec8d
  1191. rsp = 0x00000000085ffda0 rip = 0x00007ffb715fec8d
  1192. Found by: stack scanning
  1193.  
  1194. Stack contents:
  1195. 00000000085ffda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  1196. 00000000085ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1197. 00000000085ffdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  1198. 00000000085ffdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  1199. Possible instruction pointers:
  1200.  
  1201. 3 MSVCP140.dll + 0x12939
  1202. rsp = 0x00000000085ffde0 rip = 0x00007ffb11642939
  1203. Found by: stack scanning
  1204.  
  1205. Stack contents:
  1206. 00000000085ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1207. 00000000085ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1208. 00000000085ffe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  1209. Possible instruction pointers:
  1210.  
  1211. 4 MSVCP140.dll + 0x12b7a
  1212. rsp = 0x00000000085ffe10 rip = 0x00007ffb11642b7a
  1213. Found by: stack scanning
  1214.  
  1215. Stack contents:
  1216. 00000000085ffe10 ac 2f 3b 7c 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/;|l2..........
  1217. 00000000085ffe20 00 00 00 00 00 00 00 00 e0 0e d2 03 00 00 00 00 ........à.Ò.....
  1218. 00000000085ffe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  1219. Possible instruction pointers:
  1220.  
  1221. 5 lib-network-manager.dll + 0x141bf
  1222. rsp = 0x00000000085ffe40 rip = 0x00007ffb151341bf
  1223. Found by: stack scanning
  1224.  
  1225. Stack contents:
  1226. 00000000085ffe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  1227. 00000000085ffe50 e0 0e d2 03 00 00 00 00 00 00 00 00 00 00 00 00 à.Ò.............
  1228. 00000000085ffe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  1229. Possible instruction pointers:
  1230.  
  1231. 6 KERNELBASE.dll + 0x2b1cb
  1232. rsp = 0x00000000085ffe70 rip = 0x00007ffb715fb1cb
  1233. Found by: stack scanning
  1234.  
  1235. Stack contents:
  1236. 00000000085ffe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  1237. Possible instruction pointers:
  1238.  
  1239. 7 ntdll.dll + 0x53bd0
  1240. rsp = 0x00000000085ffe80 rip = 0x00007ffb74653bd0
  1241. Found by: stack scanning
  1242.  
  1243. Stack contents:
  1244. 00000000085ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1245. 00000000085ffe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1246. 00000000085ffea0 9d ca 0f 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê.ž&›..........
  1247. 00000000085ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1248. 00000000085ffec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  1249. Possible instruction pointers:
  1250.  
  1251. 8 lib-network-manager.dll + 0x128be
  1252. rsp = 0x00000000085ffed0 rip = 0x00007ffb151328be
  1253. Found by: stack scanning
  1254.  
  1255. Stack contents:
  1256. 00000000085ffed0 00 00 00 00 00 00 00 00 e0 0e d2 03 00 00 00 00 ........à.Ò.....
  1257. 00000000085ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1258. 00000000085ffef0 70 16 d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 p.×.....².Œqû...
  1259. Possible instruction pointers:
  1260.  
  1261. 9 ucrtbase.dll + 0x210b2
  1262. rsp = 0x00000000085fff00 rip = 0x00007ffb718c10b2
  1263. Found by: stack scanning
  1264.  
  1265. Stack contents:
  1266. 00000000085fff00 00 00 00 00 00 00 00 00 70 16 d7 02 00 00 00 00 ........p.×.....
  1267. 00000000085fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1268. 00000000085fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  1269. Possible instruction pointers:
  1270.  
  1271. 10 KERNEL32.DLL + 0x17c24
  1272. rsp = 0x00000000085fff30 rip = 0x00007ffb73557c24
  1273. Found by: stack scanning
  1274.  
  1275. Stack contents:
  1276. 00000000085fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1277. 00000000085fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1278. 00000000085fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  1279. Possible instruction pointers:
  1280.  
  1281. 11 ntdll.dll + 0x6d4d1
  1282. rsp = 0x00000000085fff60 rip = 0x00007ffb7466d4d1
  1283. Found by: stack scanning
  1284.  
  1285. Thread 9
  1286. 0 ntdll.dll + 0xa0024
  1287. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1288. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1289. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1290. rbp = 0x0000000003b617b0 rsp = 0x00000000086ffd28
  1291. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1292. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1293. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1294. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1295. rip = 0x00007ffb746a0024
  1296. Found by: given as instruction pointer in context
  1297.  
  1298. Stack contents:
  1299. 00000000086ffd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1300. Possible instruction pointers:
  1301.  
  1302. 1 ntdll.dll + 0x60c10
  1303. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1304. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1305. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1306. rbp = 0x0000000003b617b0 rsp = 0x00000000086ffd30
  1307. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1308. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1309. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1310. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1311. rip = 0x00007ffb74660c10
  1312. Found by: simulating a return from leaf function
  1313.  
  1314. Stack contents:
  1315. 00000000086ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1316. 00000000086ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1317. 00000000086ffd50 50 fd 2c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý,.....Pý......
  1318. 00000000086ffd60 50 fd 4c 0b 00 00 00 00 60 94 08 00 00 00 00 00 PýL.....`”......
  1319. 00000000086ffd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  1320. 00000000086ffd80 00 00 00 00 00 00 00 00 a0 0e d2 03 00 00 00 00 ........ .Ò.....
  1321. 00000000086ffd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1322. Possible instruction pointers:
  1323.  
  1324. 2 KERNELBASE.dll + 0x2ec8d
  1325. rsp = 0x00000000086ffda0 rip = 0x00007ffb715fec8d
  1326. Found by: stack scanning
  1327.  
  1328. Stack contents:
  1329. 00000000086ffda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  1330. 00000000086ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1331. 00000000086ffdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  1332. 00000000086ffdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  1333. Possible instruction pointers:
  1334.  
  1335. 3 MSVCP140.dll + 0x12939
  1336. rsp = 0x00000000086ffde0 rip = 0x00007ffb11642939
  1337. Found by: stack scanning
  1338.  
  1339. Stack contents:
  1340. 00000000086ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1341. 00000000086ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1342. 00000000086ffe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  1343. Possible instruction pointers:
  1344.  
  1345. 4 MSVCP140.dll + 0x12b7a
  1346. rsp = 0x00000000086ffe10 rip = 0x00007ffb11642b7a
  1347. Found by: stack scanning
  1348.  
  1349. Stack contents:
  1350. 00000000086ffe10 ac 2f 0b 7c 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/.|l2..........
  1351. 00000000086ffe20 00 00 00 00 00 00 00 00 a0 0e d2 03 00 00 00 00 ........ .Ò.....
  1352. 00000000086ffe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  1353. Possible instruction pointers:
  1354.  
  1355. 5 lib-network-manager.dll + 0x141bf
  1356. rsp = 0x00000000086ffe40 rip = 0x00007ffb151341bf
  1357. Found by: stack scanning
  1358.  
  1359. Stack contents:
  1360. 00000000086ffe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  1361. 00000000086ffe50 a0 0e d2 03 00 00 00 00 00 00 00 00 00 00 00 00  .Ò.............
  1362. 00000000086ffe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  1363. Possible instruction pointers:
  1364.  
  1365. 6 KERNELBASE.dll + 0x2b1cb
  1366. rsp = 0x00000000086ffe70 rip = 0x00007ffb715fb1cb
  1367. Found by: stack scanning
  1368.  
  1369. Stack contents:
  1370. 00000000086ffe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  1371. Possible instruction pointers:
  1372.  
  1373. 7 ntdll.dll + 0x53bd0
  1374. rsp = 0x00000000086ffe80 rip = 0x00007ffb74653bd0
  1375. Found by: stack scanning
  1376.  
  1377. Stack contents:
  1378. 00000000086ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1379. 00000000086ffe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1380. 00000000086ffea0 9d ca 3f 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê?ž&›..........
  1381. 00000000086ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1382. 00000000086ffec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  1383. Possible instruction pointers:
  1384.  
  1385. 8 lib-network-manager.dll + 0x128be
  1386. rsp = 0x00000000086ffed0 rip = 0x00007ffb151328be
  1387. Found by: stack scanning
  1388.  
  1389. Stack contents:
  1390. 00000000086ffed0 00 00 00 00 00 00 00 00 a0 0e d2 03 00 00 00 00 ........ .Ò.....
  1391. 00000000086ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1392. 00000000086ffef0 80 1e d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 ..×.....².Œqû...
  1393. Possible instruction pointers:
  1394.  
  1395. 9 ucrtbase.dll + 0x210b2
  1396. rsp = 0x00000000086fff00 rip = 0x00007ffb718c10b2
  1397. Found by: stack scanning
  1398.  
  1399. Stack contents:
  1400. 00000000086fff00 00 00 00 00 00 00 00 00 80 1e d7 02 00 00 00 00 ..........×.....
  1401. 00000000086fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1402. 00000000086fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  1403. Possible instruction pointers:
  1404.  
  1405. 10 KERNEL32.DLL + 0x17c24
  1406. rsp = 0x00000000086fff30 rip = 0x00007ffb73557c24
  1407. Found by: stack scanning
  1408.  
  1409. Stack contents:
  1410. 00000000086fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1411. 00000000086fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1412. 00000000086fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  1413. Possible instruction pointers:
  1414.  
  1415. 11 ntdll.dll + 0x6d4d1
  1416. rsp = 0x00000000086fff60 rip = 0x00007ffb7466d4d1
  1417. Found by: stack scanning
  1418.  
  1419. Thread 10
  1420. 0 ntdll.dll + 0xa0024
  1421. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1422. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1423. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1424. rbp = 0x0000000003b617b0 rsp = 0x00000000087ffd28
  1425. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1426. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1427. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1428. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1429. rip = 0x00007ffb746a0024
  1430. Found by: given as instruction pointer in context
  1431.  
  1432. Stack contents:
  1433. 00000000087ffd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1434. Possible instruction pointers:
  1435.  
  1436. 1 ntdll.dll + 0x60c10
  1437. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1438. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1439. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1440. rbp = 0x0000000003b617b0 rsp = 0x00000000087ffd30
  1441. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1442. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1443. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1444. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1445. rip = 0x00007ffb74660c10
  1446. Found by: simulating a return from leaf function
  1447.  
  1448. Stack contents:
  1449. 00000000087ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1450. 00000000087ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1451. 00000000087ffd50 50 fd 3c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý<.....Pý......
  1452. 00000000087ffd60 50 fd 6c 0b 00 00 00 00 e4 94 08 00 00 00 00 00 Pýl.....ä”......
  1453. 00000000087ffd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  1454. 00000000087ffd80 00 00 00 00 00 00 00 00 90 0f d2 03 00 00 00 00 ..........Ò.....
  1455. 00000000087ffd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1456. Possible instruction pointers:
  1457.  
  1458. 2 KERNELBASE.dll + 0x2ec8d
  1459. rsp = 0x00000000087ffda0 rip = 0x00007ffb715fec8d
  1460. Found by: stack scanning
  1461.  
  1462. Stack contents:
  1463. 00000000087ffda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  1464. 00000000087ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1465. 00000000087ffdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  1466. 00000000087ffdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  1467. Possible instruction pointers:
  1468.  
  1469. 3 MSVCP140.dll + 0x12939
  1470. rsp = 0x00000000087ffde0 rip = 0x00007ffb11642939
  1471. Found by: stack scanning
  1472.  
  1473. Stack contents:
  1474. 00000000087ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1475. 00000000087ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1476. 00000000087ffe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  1477. Possible instruction pointers:
  1478.  
  1479. 4 MSVCP140.dll + 0x12b7a
  1480. rsp = 0x00000000087ffe10 rip = 0x00007ffb11642b7a
  1481. Found by: stack scanning
  1482.  
  1483. Stack contents:
  1484. 00000000087ffe10 ac 2f 1b 7c 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/.|l2..........
  1485. 00000000087ffe20 00 00 00 00 00 00 00 00 90 0f d2 03 00 00 00 00 ..........Ò.....
  1486. 00000000087ffe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  1487. Possible instruction pointers:
  1488.  
  1489. 5 lib-network-manager.dll + 0x141bf
  1490. rsp = 0x00000000087ffe40 rip = 0x00007ffb151341bf
  1491. Found by: stack scanning
  1492.  
  1493. Stack contents:
  1494. 00000000087ffe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  1495. 00000000087ffe50 90 0f d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ..Ò.............
  1496. 00000000087ffe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  1497. Possible instruction pointers:
  1498.  
  1499. 6 KERNELBASE.dll + 0x2b1cb
  1500. rsp = 0x00000000087ffe70 rip = 0x00007ffb715fb1cb
  1501. Found by: stack scanning
  1502.  
  1503. Stack contents:
  1504. 00000000087ffe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  1505. Possible instruction pointers:
  1506.  
  1507. 7 ntdll.dll + 0x53bd0
  1508. rsp = 0x00000000087ffe80 rip = 0x00007ffb74653bd0
  1509. Found by: stack scanning
  1510.  
  1511. Stack contents:
  1512. 00000000087ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1513. 00000000087ffe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1514. 00000000087ffea0 9d ca 2f 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê/ž&›..........
  1515. 00000000087ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1516. 00000000087ffec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  1517. Possible instruction pointers:
  1518.  
  1519. 8 lib-network-manager.dll + 0x128be
  1520. rsp = 0x00000000087ffed0 rip = 0x00007ffb151328be
  1521. Found by: stack scanning
  1522.  
  1523. Stack contents:
  1524. 00000000087ffed0 00 00 00 00 00 00 00 00 90 0f d2 03 00 00 00 00 ..........Ò.....
  1525. 00000000087ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1526. 00000000087ffef0 60 17 d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 `.×.....².Œqû...
  1527. Possible instruction pointers:
  1528.  
  1529. 9 ucrtbase.dll + 0x210b2
  1530. rsp = 0x00000000087fff00 rip = 0x00007ffb718c10b2
  1531. Found by: stack scanning
  1532.  
  1533. Stack contents:
  1534. 00000000087fff00 00 00 00 00 00 00 00 00 60 17 d7 02 00 00 00 00 ........`.×.....
  1535. 00000000087fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1536. 00000000087fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  1537. Possible instruction pointers:
  1538.  
  1539. 10 KERNEL32.DLL + 0x17c24
  1540. rsp = 0x00000000087fff30 rip = 0x00007ffb73557c24
  1541. Found by: stack scanning
  1542.  
  1543. Stack contents:
  1544. 00000000087fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1545. 00000000087fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1546. 00000000087fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  1547. Possible instruction pointers:
  1548.  
  1549. 11 ntdll.dll + 0x6d4d1
  1550. rsp = 0x00000000087fff60 rip = 0x00007ffb7466d4d1
  1551. Found by: stack scanning
  1552.  
  1553. Thread 11
  1554. 0 ntdll.dll + 0xa0024
  1555. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1556. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1557. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1558. rbp = 0x0000000003b617b0 rsp = 0x000000000b0cfd28
  1559. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1560. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1561. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1562. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1563. rip = 0x00007ffb746a0024
  1564. Found by: given as instruction pointer in context
  1565.  
  1566. Stack contents:
  1567. 000000000b0cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1568. Possible instruction pointers:
  1569.  
  1570. 1 ntdll.dll + 0x60c10
  1571. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1572. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1573. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1574. rbp = 0x0000000003b617b0 rsp = 0x000000000b0cfd30
  1575. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1576. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1577. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1578. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1579. rip = 0x00007ffb74660c10
  1580. Found by: simulating a return from leaf function
  1581.  
  1582. Stack contents:
  1583. 000000000b0cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1584. 000000000b0cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1585. 000000000b0cfd50 50 fd 5c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý\.....Pý......
  1586. 000000000b0cfd60 50 fd 7c 0b 00 00 00 00 7c 94 08 00 00 00 00 00 Pý|.....|”......
  1587. 000000000b0cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  1588. 000000000b0cfd80 00 00 00 00 00 00 00 00 d0 0d d2 03 00 00 00 00 ........Ð.Ò.....
  1589. 000000000b0cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1590. Possible instruction pointers:
  1591.  
  1592. 2 KERNELBASE.dll + 0x2ec8d
  1593. rsp = 0x000000000b0cfda0 rip = 0x00007ffb715fec8d
  1594. Found by: stack scanning
  1595.  
  1596. Stack contents:
  1597. 000000000b0cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  1598. 000000000b0cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1599. 000000000b0cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  1600. 000000000b0cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  1601. Possible instruction pointers:
  1602.  
  1603. 3 MSVCP140.dll + 0x12939
  1604. rsp = 0x000000000b0cfde0 rip = 0x00007ffb11642939
  1605. Found by: stack scanning
  1606.  
  1607. Stack contents:
  1608. 000000000b0cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1609. 000000000b0cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1610. 000000000b0cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  1611. Possible instruction pointers:
  1612.  
  1613. 4 MSVCP140.dll + 0x12b7a
  1614. rsp = 0x000000000b0cfe10 rip = 0x00007ffb11642b7a
  1615. Found by: stack scanning
  1616.  
  1617. Stack contents:
  1618. 000000000b0cfe10 ac 2f 68 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/h.l2..........
  1619. 000000000b0cfe20 00 00 00 00 00 00 00 00 d0 0d d2 03 00 00 00 00 ........Ð.Ò.....
  1620. 000000000b0cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  1621. Possible instruction pointers:
  1622.  
  1623. 5 lib-network-manager.dll + 0x141bf
  1624. rsp = 0x000000000b0cfe40 rip = 0x00007ffb151341bf
  1625. Found by: stack scanning
  1626.  
  1627. Stack contents:
  1628. 000000000b0cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  1629. 000000000b0cfe50 d0 0d d2 03 00 00 00 00 00 00 00 00 00 00 00 00 Ð.Ò.............
  1630. 000000000b0cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  1631. Possible instruction pointers:
  1632.  
  1633. 6 KERNELBASE.dll + 0x2b1cb
  1634. rsp = 0x000000000b0cfe70 rip = 0x00007ffb715fb1cb
  1635. Found by: stack scanning
  1636.  
  1637. Stack contents:
  1638. 000000000b0cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  1639. Possible instruction pointers:
  1640.  
  1641. 7 ntdll.dll + 0x53bd0
  1642. rsp = 0x000000000b0cfe80 rip = 0x00007ffb74653bd0
  1643. Found by: stack scanning
  1644.  
  1645. Stack contents:
  1646. 000000000b0cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1647. 000000000b0cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1648. 000000000b0cfea0 9d ca 5c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê\.&›..........
  1649. 000000000b0cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1650. 000000000b0cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  1651. Possible instruction pointers:
  1652.  
  1653. 8 lib-network-manager.dll + 0x128be
  1654. rsp = 0x000000000b0cfed0 rip = 0x00007ffb151328be
  1655. Found by: stack scanning
  1656.  
  1657. Stack contents:
  1658. 000000000b0cfed0 00 00 00 00 00 00 00 00 d0 0d d2 03 00 00 00 00 ........Ð.Ò.....
  1659. 000000000b0cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1660. 000000000b0cfef0 40 fd b0 03 00 00 00 00 b2 10 8c 71 fb 7f 00 00 @ý°.....².Œqû...
  1661. Possible instruction pointers:
  1662.  
  1663. 9 ucrtbase.dll + 0x210b2
  1664. rsp = 0x000000000b0cff00 rip = 0x00007ffb718c10b2
  1665. Found by: stack scanning
  1666.  
  1667. Stack contents:
  1668. 000000000b0cff00 00 00 00 00 00 00 00 00 40 fd b0 03 00 00 00 00 ........@ý°.....
  1669. 000000000b0cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1670. 000000000b0cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  1671. Possible instruction pointers:
  1672.  
  1673. 10 KERNEL32.DLL + 0x17c24
  1674. rsp = 0x000000000b0cff30 rip = 0x00007ffb73557c24
  1675. Found by: stack scanning
  1676.  
  1677. Stack contents:
  1678. 000000000b0cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1679. 000000000b0cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1680. 000000000b0cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  1681. Possible instruction pointers:
  1682.  
  1683. 11 ntdll.dll + 0x6d4d1
  1684. rsp = 0x000000000b0cff60 rip = 0x00007ffb7466d4d1
  1685. Found by: stack scanning
  1686.  
  1687. Thread 12
  1688. 0 ntdll.dll + 0xa0024
  1689. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1690. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1691. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1692. rbp = 0x0000000003b617b0 rsp = 0x000000000b1cfd28
  1693. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1694. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1695. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1696. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1697. rip = 0x00007ffb746a0024
  1698. Found by: given as instruction pointer in context
  1699.  
  1700. Stack contents:
  1701. 000000000b1cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1702. Possible instruction pointers:
  1703.  
  1704. 1 ntdll.dll + 0x60c10
  1705. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1706. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1707. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1708. rbp = 0x0000000003b617b0 rsp = 0x000000000b1cfd30
  1709. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1710. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1711. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1712. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1713. rip = 0x00007ffb74660c10
  1714. Found by: simulating a return from leaf function
  1715.  
  1716. Stack contents:
  1717. 000000000b1cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1718. 000000000b1cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1719. 000000000b1cfd50 00 00 00 00 00 00 00 00 50 fd 3c 08 00 00 00 00 ........Pý<.....
  1720. 000000000b1cfd60 50 fd 3c 0b 00 00 00 00 a4 94 08 00 00 00 00 00 Pý<.....¤”......
  1721. 000000000b1cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  1722. 000000000b1cfd80 00 00 00 00 00 00 00 00 f0 0e d2 03 00 00 00 00 ........ð.Ò.....
  1723. 000000000b1cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1724. Possible instruction pointers:
  1725.  
  1726. 2 KERNELBASE.dll + 0x2ec8d
  1727. rsp = 0x000000000b1cfda0 rip = 0x00007ffb715fec8d
  1728. Found by: stack scanning
  1729.  
  1730. Stack contents:
  1731. 000000000b1cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  1732. 000000000b1cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1733. 000000000b1cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  1734. 000000000b1cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  1735. Possible instruction pointers:
  1736.  
  1737. 3 MSVCP140.dll + 0x12939
  1738. rsp = 0x000000000b1cfde0 rip = 0x00007ffb11642939
  1739. Found by: stack scanning
  1740.  
  1741. Stack contents:
  1742. 000000000b1cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1743. 000000000b1cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1744. 000000000b1cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  1745. Possible instruction pointers:
  1746.  
  1747. 4 MSVCP140.dll + 0x12b7a
  1748. rsp = 0x000000000b1cfe10 rip = 0x00007ffb11642b7a
  1749. Found by: stack scanning
  1750.  
  1751. Stack contents:
  1752. 000000000b1cfe10 ac 2f 78 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/x.l2..........
  1753. 000000000b1cfe20 00 00 00 00 00 00 00 00 f0 0e d2 03 00 00 00 00 ........ð.Ò.....
  1754. 000000000b1cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  1755. Possible instruction pointers:
  1756.  
  1757. 5 lib-network-manager.dll + 0x141bf
  1758. rsp = 0x000000000b1cfe40 rip = 0x00007ffb151341bf
  1759. Found by: stack scanning
  1760.  
  1761. Stack contents:
  1762. 000000000b1cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  1763. 000000000b1cfe50 f0 0e d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ð.Ò.............
  1764. 000000000b1cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  1765. Possible instruction pointers:
  1766.  
  1767. 6 KERNELBASE.dll + 0x2b1cb
  1768. rsp = 0x000000000b1cfe70 rip = 0x00007ffb715fb1cb
  1769. Found by: stack scanning
  1770.  
  1771. Stack contents:
  1772. 000000000b1cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  1773. Possible instruction pointers:
  1774.  
  1775. 7 ntdll.dll + 0x53bd0
  1776. rsp = 0x000000000b1cfe80 rip = 0x00007ffb74653bd0
  1777. Found by: stack scanning
  1778.  
  1779. Stack contents:
  1780. 000000000b1cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1781. 000000000b1cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1782. 000000000b1cfea0 9d ca 4c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .ÊL.&›..........
  1783. 000000000b1cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1784. 000000000b1cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  1785. Possible instruction pointers:
  1786.  
  1787. 8 lib-network-manager.dll + 0x128be
  1788. rsp = 0x000000000b1cfed0 rip = 0x00007ffb151328be
  1789. Found by: stack scanning
  1790.  
  1791. Stack contents:
  1792. 000000000b1cfed0 00 00 00 00 00 00 00 00 f0 0e d2 03 00 00 00 00 ........ð.Ò.....
  1793. 000000000b1cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1794. 000000000b1cfef0 d0 a9 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 Щ`.....².Œqû...
  1795. Possible instruction pointers:
  1796.  
  1797. 9 ucrtbase.dll + 0x210b2
  1798. rsp = 0x000000000b1cff00 rip = 0x00007ffb718c10b2
  1799. Found by: stack scanning
  1800.  
  1801. Stack contents:
  1802. 000000000b1cff00 00 00 00 00 00 00 00 00 d0 a9 60 02 00 00 00 00 ........Щ`.....
  1803. 000000000b1cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1804. 000000000b1cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  1805. Possible instruction pointers:
  1806.  
  1807. 10 KERNEL32.DLL + 0x17c24
  1808. rsp = 0x000000000b1cff30 rip = 0x00007ffb73557c24
  1809. Found by: stack scanning
  1810.  
  1811. Stack contents:
  1812. 000000000b1cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1813. 000000000b1cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1814. 000000000b1cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  1815. Possible instruction pointers:
  1816.  
  1817. 11 ntdll.dll + 0x6d4d1
  1818. rsp = 0x000000000b1cff60 rip = 0x00007ffb7466d4d1
  1819. Found by: stack scanning
  1820.  
  1821. Thread 13
  1822. 0 ntdll.dll + 0xa0024
  1823. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1824. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1825. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1826. rbp = 0x0000000003b617b0 rsp = 0x000000000b2cfd28
  1827. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1828. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1829. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1830. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1831. rip = 0x00007ffb746a0024
  1832. Found by: given as instruction pointer in context
  1833.  
  1834. Stack contents:
  1835. 000000000b2cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1836. Possible instruction pointers:
  1837.  
  1838. 1 ntdll.dll + 0x60c10
  1839. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1840. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1841. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1842. rbp = 0x0000000003b617b0 rsp = 0x000000000b2cfd30
  1843. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1844. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1845. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1846. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1847. rip = 0x00007ffb74660c10
  1848. Found by: simulating a return from leaf function
  1849.  
  1850. Stack contents:
  1851. 000000000b2cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1852. 000000000b2cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1853. 000000000b2cfd50 50 fd 5f 08 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý_.....Pý......
  1854. 000000000b2cfd60 50 fd 6f 08 00 00 00 00 50 94 08 00 00 00 00 00 Pýo.....P”......
  1855. 000000000b2cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  1856. 000000000b2cfd80 00 00 00 00 00 00 00 00 20 0f d2 03 00 00 00 00 ........ .Ò.....
  1857. 000000000b2cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1858. Possible instruction pointers:
  1859.  
  1860. 2 KERNELBASE.dll + 0x2ec8d
  1861. rsp = 0x000000000b2cfda0 rip = 0x00007ffb715fec8d
  1862. Found by: stack scanning
  1863.  
  1864. Stack contents:
  1865. 000000000b2cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  1866. 000000000b2cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1867. 000000000b2cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  1868. 000000000b2cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  1869. Possible instruction pointers:
  1870.  
  1871. 3 MSVCP140.dll + 0x12939
  1872. rsp = 0x000000000b2cfde0 rip = 0x00007ffb11642939
  1873. Found by: stack scanning
  1874.  
  1875. Stack contents:
  1876. 000000000b2cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1877. 000000000b2cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1878. 000000000b2cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  1879. Possible instruction pointers:
  1880.  
  1881. 4 MSVCP140.dll + 0x12b7a
  1882. rsp = 0x000000000b2cfe10 rip = 0x00007ffb11642b7a
  1883. Found by: stack scanning
  1884.  
  1885. Stack contents:
  1886. 000000000b2cfe10 ac 2f 48 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/H.l2..........
  1887. 000000000b2cfe20 00 00 00 00 00 00 00 00 20 0f d2 03 00 00 00 00 ........ .Ò.....
  1888. 000000000b2cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  1889. Possible instruction pointers:
  1890.  
  1891. 5 lib-network-manager.dll + 0x141bf
  1892. rsp = 0x000000000b2cfe40 rip = 0x00007ffb151341bf
  1893. Found by: stack scanning
  1894.  
  1895. Stack contents:
  1896. 000000000b2cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  1897. 000000000b2cfe50 20 0f d2 03 00 00 00 00 00 00 00 00 00 00 00 00 .Ò.............
  1898. 000000000b2cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  1899. Possible instruction pointers:
  1900.  
  1901. 6 KERNELBASE.dll + 0x2b1cb
  1902. rsp = 0x000000000b2cfe70 rip = 0x00007ffb715fb1cb
  1903. Found by: stack scanning
  1904.  
  1905. Stack contents:
  1906. 000000000b2cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  1907. Possible instruction pointers:
  1908.  
  1909. 7 ntdll.dll + 0x53bd0
  1910. rsp = 0x000000000b2cfe80 rip = 0x00007ffb74653bd0
  1911. Found by: stack scanning
  1912.  
  1913. Stack contents:
  1914. 000000000b2cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1915. 000000000b2cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1916. 000000000b2cfea0 9d ca 7c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê|.&›..........
  1917. 000000000b2cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1918. 000000000b2cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  1919. Possible instruction pointers:
  1920.  
  1921. 8 lib-network-manager.dll + 0x128be
  1922. rsp = 0x000000000b2cfed0 rip = 0x00007ffb151328be
  1923. Found by: stack scanning
  1924.  
  1925. Stack contents:
  1926. 000000000b2cfed0 00 00 00 00 00 00 00 00 20 0f d2 03 00 00 00 00 ........ .Ò.....
  1927. 000000000b2cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1928. 000000000b2cfef0 30 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 0ª`.....².Œqû...
  1929. Possible instruction pointers:
  1930.  
  1931. 9 ucrtbase.dll + 0x210b2
  1932. rsp = 0x000000000b2cff00 rip = 0x00007ffb718c10b2
  1933. Found by: stack scanning
  1934.  
  1935. Stack contents:
  1936. 000000000b2cff00 00 00 00 00 00 00 00 00 30 aa 60 02 00 00 00 00 ........0ª`.....
  1937. 000000000b2cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1938. 000000000b2cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  1939. Possible instruction pointers:
  1940.  
  1941. 10 KERNEL32.DLL + 0x17c24
  1942. rsp = 0x000000000b2cff30 rip = 0x00007ffb73557c24
  1943. Found by: stack scanning
  1944.  
  1945. Stack contents:
  1946. 000000000b2cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1947. 000000000b2cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1948. 000000000b2cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  1949. Possible instruction pointers:
  1950.  
  1951. 11 ntdll.dll + 0x6d4d1
  1952. rsp = 0x000000000b2cff60 rip = 0x00007ffb7466d4d1
  1953. Found by: stack scanning
  1954.  
  1955. Thread 14
  1956. 0 ntdll.dll + 0xa0024
  1957. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1958. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1959. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1960. rbp = 0x0000000003b617b0 rsp = 0x000000000b3cfd28
  1961. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1962. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1963. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1964. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1965. rip = 0x00007ffb746a0024
  1966. Found by: given as instruction pointer in context
  1967.  
  1968. Stack contents:
  1969. 000000000b3cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  1970. Possible instruction pointers:
  1971.  
  1972. 1 ntdll.dll + 0x60c10
  1973. rax = 0x00000000000001ca rdx = 0x0000000000000000
  1974. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  1975. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  1976. rbp = 0x0000000003b617b0 rsp = 0x000000000b3cfd30
  1977. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  1978. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  1979. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  1980. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  1981. rip = 0x00007ffb74660c10
  1982. Found by: simulating a return from leaf function
  1983.  
  1984. Stack contents:
  1985. 000000000b3cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1986. 000000000b3cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  1987. 000000000b3cfd50 50 fd 1c 0b 00 00 00 00 50 fd 3c 08 00 00 00 00 Pý......Pý<.....
  1988. 000000000b3cfd60 50 fd 7f 08 00 00 00 00 38 95 08 00 00 00 00 00 Pý......8•......
  1989. 000000000b3cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  1990. 000000000b3cfd80 00 00 00 00 00 00 00 00 10 06 d2 03 00 00 00 00 ..........Ò.....
  1991. 000000000b3cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  1992. Possible instruction pointers:
  1993.  
  1994. 2 KERNELBASE.dll + 0x2ec8d
  1995. rsp = 0x000000000b3cfda0 rip = 0x00007ffb715fec8d
  1996. Found by: stack scanning
  1997.  
  1998. Stack contents:
  1999. 000000000b3cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  2000. 000000000b3cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2001. 000000000b3cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  2002. 000000000b3cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  2003. Possible instruction pointers:
  2004.  
  2005. 3 MSVCP140.dll + 0x12939
  2006. rsp = 0x000000000b3cfde0 rip = 0x00007ffb11642939
  2007. Found by: stack scanning
  2008.  
  2009. Stack contents:
  2010. 000000000b3cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2011. 000000000b3cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2012. 000000000b3cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  2013. Possible instruction pointers:
  2014.  
  2015. 4 MSVCP140.dll + 0x12b7a
  2016. rsp = 0x000000000b3cfe10 rip = 0x00007ffb11642b7a
  2017. Found by: stack scanning
  2018.  
  2019. Stack contents:
  2020. 000000000b3cfe10 ac 2f 58 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/X.l2..........
  2021. 000000000b3cfe20 00 00 00 00 00 00 00 00 10 06 d2 03 00 00 00 00 ..........Ò.....
  2022. 000000000b3cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  2023. Possible instruction pointers:
  2024.  
  2025. 5 lib-network-manager.dll + 0x141bf
  2026. rsp = 0x000000000b3cfe40 rip = 0x00007ffb151341bf
  2027. Found by: stack scanning
  2028.  
  2029. Stack contents:
  2030. 000000000b3cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  2031. 000000000b3cfe50 10 06 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ..Ò.............
  2032. 000000000b3cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  2033. Possible instruction pointers:
  2034.  
  2035. 6 KERNELBASE.dll + 0x2b1cb
  2036. rsp = 0x000000000b3cfe70 rip = 0x00007ffb715fb1cb
  2037. Found by: stack scanning
  2038.  
  2039. Stack contents:
  2040. 000000000b3cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  2041. Possible instruction pointers:
  2042.  
  2043. 7 ntdll.dll + 0x53bd0
  2044. rsp = 0x000000000b3cfe80 rip = 0x00007ffb74653bd0
  2045. Found by: stack scanning
  2046.  
  2047. Stack contents:
  2048. 000000000b3cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2049. 000000000b3cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2050. 000000000b3cfea0 9d ca 6c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Êl.&›..........
  2051. 000000000b3cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2052. 000000000b3cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  2053. Possible instruction pointers:
  2054.  
  2055. 8 lib-network-manager.dll + 0x128be
  2056. rsp = 0x000000000b3cfed0 rip = 0x00007ffb151328be
  2057. Found by: stack scanning
  2058.  
  2059. Stack contents:
  2060. 000000000b3cfed0 00 00 00 00 00 00 00 00 10 06 d2 03 00 00 00 00 ..........Ò.....
  2061. 000000000b3cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2062. 000000000b3cfef0 90 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 .ª`.....².Œqû...
  2063. Possible instruction pointers:
  2064.  
  2065. 9 ucrtbase.dll + 0x210b2
  2066. rsp = 0x000000000b3cff00 rip = 0x00007ffb718c10b2
  2067. Found by: stack scanning
  2068.  
  2069. Stack contents:
  2070. 000000000b3cff00 00 00 00 00 00 00 00 00 90 aa 60 02 00 00 00 00 .........ª`.....
  2071. 000000000b3cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2072. 000000000b3cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  2073. Possible instruction pointers:
  2074.  
  2075. 10 KERNEL32.DLL + 0x17c24
  2076. rsp = 0x000000000b3cff30 rip = 0x00007ffb73557c24
  2077. Found by: stack scanning
  2078.  
  2079. Stack contents:
  2080. 000000000b3cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2081. 000000000b3cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2082. 000000000b3cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  2083. Possible instruction pointers:
  2084.  
  2085. 11 ntdll.dll + 0x6d4d1
  2086. rsp = 0x000000000b3cff60 rip = 0x00007ffb7466d4d1
  2087. Found by: stack scanning
  2088.  
  2089. Thread 15
  2090. 0 ntdll.dll + 0xa0024
  2091. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2092. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2093. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2094. rbp = 0x0000000003b617b0 rsp = 0x000000000b4cfd28
  2095. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2096. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2097. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2098. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2099. rip = 0x00007ffb746a0024
  2100. Found by: given as instruction pointer in context
  2101.  
  2102. Stack contents:
  2103. 000000000b4cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  2104. Possible instruction pointers:
  2105.  
  2106. 1 ntdll.dll + 0x60c10
  2107. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2108. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2109. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2110. rbp = 0x0000000003b617b0 rsp = 0x000000000b4cfd30
  2111. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2112. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2113. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2114. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2115. rip = 0x00007ffb74660c10
  2116. Found by: simulating a return from leaf function
  2117.  
  2118. Stack contents:
  2119. 000000000b4cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2120. 000000000b4cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2121. 000000000b4cfd50 50 fd 6f 08 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pýo.....Pý......
  2122. 000000000b4cfd60 50 fd 5c 0b 00 00 00 00 6c 94 08 00 00 00 00 00 Pý\.....l”......
  2123. 000000000b4cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  2124. 000000000b4cfd80 00 00 00 00 00 00 00 00 e0 06 d2 03 00 00 00 00 ........à.Ò.....
  2125. 000000000b4cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  2126. Possible instruction pointers:
  2127.  
  2128. 2 KERNELBASE.dll + 0x2ec8d
  2129. rsp = 0x000000000b4cfda0 rip = 0x00007ffb715fec8d
  2130. Found by: stack scanning
  2131.  
  2132. Stack contents:
  2133. 000000000b4cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  2134. 000000000b4cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2135. 000000000b4cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  2136. 000000000b4cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  2137. Possible instruction pointers:
  2138.  
  2139. 3 MSVCP140.dll + 0x12939
  2140. rsp = 0x000000000b4cfde0 rip = 0x00007ffb11642939
  2141. Found by: stack scanning
  2142.  
  2143. Stack contents:
  2144. 000000000b4cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2145. 000000000b4cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2146. 000000000b4cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  2147. Possible instruction pointers:
  2148.  
  2149. 4 MSVCP140.dll + 0x12b7a
  2150. rsp = 0x000000000b4cfe10 rip = 0x00007ffb11642b7a
  2151. Found by: stack scanning
  2152.  
  2153. Stack contents:
  2154. 000000000b4cfe10 ac 2f 28 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/(.l2..........
  2155. 000000000b4cfe20 00 00 00 00 00 00 00 00 e0 06 d2 03 00 00 00 00 ........à.Ò.....
  2156. 000000000b4cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  2157. Possible instruction pointers:
  2158.  
  2159. 5 lib-network-manager.dll + 0x141bf
  2160. rsp = 0x000000000b4cfe40 rip = 0x00007ffb151341bf
  2161. Found by: stack scanning
  2162.  
  2163. Stack contents:
  2164. 000000000b4cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  2165. 000000000b4cfe50 e0 06 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 à.Ò.............
  2166. 000000000b4cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  2167. Possible instruction pointers:
  2168.  
  2169. 6 KERNELBASE.dll + 0x2b1cb
  2170. rsp = 0x000000000b4cfe70 rip = 0x00007ffb715fb1cb
  2171. Found by: stack scanning
  2172.  
  2173. Stack contents:
  2174. 000000000b4cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  2175. Possible instruction pointers:
  2176.  
  2177. 7 ntdll.dll + 0x53bd0
  2178. rsp = 0x000000000b4cfe80 rip = 0x00007ffb74653bd0
  2179. Found by: stack scanning
  2180.  
  2181. Stack contents:
  2182. 000000000b4cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2183. 000000000b4cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2184. 000000000b4cfea0 9d ca 1c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê..&›..........
  2185. 000000000b4cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2186. 000000000b4cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  2187. Possible instruction pointers:
  2188.  
  2189. 8 lib-network-manager.dll + 0x128be
  2190. rsp = 0x000000000b4cfed0 rip = 0x00007ffb151328be
  2191. Found by: stack scanning
  2192.  
  2193. Stack contents:
  2194. 000000000b4cfed0 00 00 00 00 00 00 00 00 e0 06 d2 03 00 00 00 00 ........à.Ò.....
  2195. 000000000b4cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2196. 000000000b4cfef0 00 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 .ª`.....².Œqû...
  2197. Possible instruction pointers:
  2198.  
  2199. 9 ucrtbase.dll + 0x210b2
  2200. rsp = 0x000000000b4cff00 rip = 0x00007ffb718c10b2
  2201. Found by: stack scanning
  2202.  
  2203. Stack contents:
  2204. 000000000b4cff00 00 00 00 00 00 00 00 00 00 aa 60 02 00 00 00 00 .........ª`.....
  2205. 000000000b4cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2206. 000000000b4cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  2207. Possible instruction pointers:
  2208.  
  2209. 10 KERNEL32.DLL + 0x17c24
  2210. rsp = 0x000000000b4cff30 rip = 0x00007ffb73557c24
  2211. Found by: stack scanning
  2212.  
  2213. Stack contents:
  2214. 000000000b4cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2215. 000000000b4cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2216. 000000000b4cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  2217. Possible instruction pointers:
  2218.  
  2219. 11 ntdll.dll + 0x6d4d1
  2220. rsp = 0x000000000b4cff60 rip = 0x00007ffb7466d4d1
  2221. Found by: stack scanning
  2222.  
  2223. Thread 16
  2224. 0 ntdll.dll + 0xa0024
  2225. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2226. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2227. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2228. rbp = 0x0000000003b617b0 rsp = 0x000000000b5cfd28
  2229. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2230. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2231. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2232. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2233. rip = 0x00007ffb746a0024
  2234. Found by: given as instruction pointer in context
  2235.  
  2236. Stack contents:
  2237. 000000000b5cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  2238. Possible instruction pointers:
  2239.  
  2240. 1 ntdll.dll + 0x60c10
  2241. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2242. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2243. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2244. rbp = 0x0000000003b617b0 rsp = 0x000000000b5cfd30
  2245. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2246. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2247. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2248. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2249. rip = 0x00007ffb74660c10
  2250. Found by: simulating a return from leaf function
  2251.  
  2252. Stack contents:
  2253. 000000000b5cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2254. 000000000b5cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2255. 000000000b5cfd50 50 fd 4c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 PýL.....Pý......
  2256. 000000000b5cfd60 50 fd 0c 0b 00 00 00 00 54 94 08 00 00 00 00 00 Pý......T”......
  2257. 000000000b5cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  2258. 000000000b5cfd80 00 00 00 00 00 00 00 00 f0 06 d2 03 00 00 00 00 ........ð.Ò.....
  2259. 000000000b5cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  2260. Possible instruction pointers:
  2261.  
  2262. 2 KERNELBASE.dll + 0x2ec8d
  2263. rsp = 0x000000000b5cfda0 rip = 0x00007ffb715fec8d
  2264. Found by: stack scanning
  2265.  
  2266. Stack contents:
  2267. 000000000b5cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  2268. 000000000b5cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2269. 000000000b5cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  2270. 000000000b5cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  2271. Possible instruction pointers:
  2272.  
  2273. 3 MSVCP140.dll + 0x12939
  2274. rsp = 0x000000000b5cfde0 rip = 0x00007ffb11642939
  2275. Found by: stack scanning
  2276.  
  2277. Stack contents:
  2278. 000000000b5cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2279. 000000000b5cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2280. 000000000b5cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  2281. Possible instruction pointers:
  2282.  
  2283. 4 MSVCP140.dll + 0x12b7a
  2284. rsp = 0x000000000b5cfe10 rip = 0x00007ffb11642b7a
  2285. Found by: stack scanning
  2286.  
  2287. Stack contents:
  2288. 000000000b5cfe10 ac 2f 38 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/8.l2..........
  2289. 000000000b5cfe20 00 00 00 00 00 00 00 00 f0 06 d2 03 00 00 00 00 ........ð.Ò.....
  2290. 000000000b5cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  2291. Possible instruction pointers:
  2292.  
  2293. 5 lib-network-manager.dll + 0x141bf
  2294. rsp = 0x000000000b5cfe40 rip = 0x00007ffb151341bf
  2295. Found by: stack scanning
  2296.  
  2297. Stack contents:
  2298. 000000000b5cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  2299. 000000000b5cfe50 f0 06 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ð.Ò.............
  2300. 000000000b5cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  2301. Possible instruction pointers:
  2302.  
  2303. 6 KERNELBASE.dll + 0x2b1cb
  2304. rsp = 0x000000000b5cfe70 rip = 0x00007ffb715fb1cb
  2305. Found by: stack scanning
  2306.  
  2307. Stack contents:
  2308. 000000000b5cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  2309. Possible instruction pointers:
  2310.  
  2311. 7 ntdll.dll + 0x53bd0
  2312. rsp = 0x000000000b5cfe80 rip = 0x00007ffb74653bd0
  2313. Found by: stack scanning
  2314.  
  2315. Stack contents:
  2316. 000000000b5cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2317. 000000000b5cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2318. 000000000b5cfea0 9d ca 0c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê..&›..........
  2319. 000000000b5cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2320. 000000000b5cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  2321. Possible instruction pointers:
  2322.  
  2323. 8 lib-network-manager.dll + 0x128be
  2324. rsp = 0x000000000b5cfed0 rip = 0x00007ffb151328be
  2325. Found by: stack scanning
  2326.  
  2327. Stack contents:
  2328. 000000000b5cfed0 00 00 00 00 00 00 00 00 f0 06 d2 03 00 00 00 00 ........ð.Ò.....
  2329. 000000000b5cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2330. 000000000b5cfef0 c0 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 Àª`.....².Œqû...
  2331. Possible instruction pointers:
  2332.  
  2333. 9 ucrtbase.dll + 0x210b2
  2334. rsp = 0x000000000b5cff00 rip = 0x00007ffb718c10b2
  2335. Found by: stack scanning
  2336.  
  2337. Stack contents:
  2338. 000000000b5cff00 00 00 00 00 00 00 00 00 c0 aa 60 02 00 00 00 00 ........˻`.....
  2339. 000000000b5cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2340. 000000000b5cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  2341. Possible instruction pointers:
  2342.  
  2343. 10 KERNEL32.DLL + 0x17c24
  2344. rsp = 0x000000000b5cff30 rip = 0x00007ffb73557c24
  2345. Found by: stack scanning
  2346.  
  2347. Stack contents:
  2348. 000000000b5cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2349. 000000000b5cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2350. 000000000b5cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  2351. Possible instruction pointers:
  2352.  
  2353. 11 ntdll.dll + 0x6d4d1
  2354. rsp = 0x000000000b5cff60 rip = 0x00007ffb7466d4d1
  2355. Found by: stack scanning
  2356.  
  2357. Thread 17
  2358. 0 ntdll.dll + 0xa0024
  2359. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2360. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2361. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2362. rbp = 0x0000000003b617b0 rsp = 0x000000000b6cfd28
  2363. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2364. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2365. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2366. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2367. rip = 0x00007ffb746a0024
  2368. Found by: given as instruction pointer in context
  2369.  
  2370. Stack contents:
  2371. 000000000b6cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  2372. Possible instruction pointers:
  2373.  
  2374. 1 ntdll.dll + 0x60c10
  2375. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2376. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2377. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2378. rbp = 0x0000000003b617b0 rsp = 0x000000000b6cfd30
  2379. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2380. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2381. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2382. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2383. rip = 0x00007ffb74660c10
  2384. Found by: simulating a return from leaf function
  2385.  
  2386. Stack contents:
  2387. 000000000b6cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2388. 000000000b6cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2389. 000000000b6cfd50 50 fd 7f 08 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý......Pý......
  2390. 000000000b6cfd60 50 fd 5f 08 00 00 00 00 5c 94 08 00 00 00 00 00 Pý_.....\”......
  2391. 000000000b6cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  2392. 000000000b6cfd80 00 00 00 00 00 00 00 00 30 05 d2 03 00 00 00 00 ........0.Ò.....
  2393. 000000000b6cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  2394. Possible instruction pointers:
  2395.  
  2396. 2 KERNELBASE.dll + 0x2ec8d
  2397. rsp = 0x000000000b6cfda0 rip = 0x00007ffb715fec8d
  2398. Found by: stack scanning
  2399.  
  2400. Stack contents:
  2401. 000000000b6cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  2402. 000000000b6cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2403. 000000000b6cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  2404. 000000000b6cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  2405. Possible instruction pointers:
  2406.  
  2407. 3 MSVCP140.dll + 0x12939
  2408. rsp = 0x000000000b6cfde0 rip = 0x00007ffb11642939
  2409. Found by: stack scanning
  2410.  
  2411. Stack contents:
  2412. 000000000b6cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2413. 000000000b6cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2414. 000000000b6cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  2415. Possible instruction pointers:
  2416.  
  2417. 4 MSVCP140.dll + 0x12b7a
  2418. rsp = 0x000000000b6cfe10 rip = 0x00007ffb11642b7a
  2419. Found by: stack scanning
  2420.  
  2421. Stack contents:
  2422. 000000000b6cfe10 ac 2f 08 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/..l2..........
  2423. 000000000b6cfe20 00 00 00 00 00 00 00 00 30 05 d2 03 00 00 00 00 ........0.Ò.....
  2424. 000000000b6cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  2425. Possible instruction pointers:
  2426.  
  2427. 5 lib-network-manager.dll + 0x141bf
  2428. rsp = 0x000000000b6cfe40 rip = 0x00007ffb151341bf
  2429. Found by: stack scanning
  2430.  
  2431. Stack contents:
  2432. 000000000b6cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  2433. 000000000b6cfe50 30 05 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 0.Ò.............
  2434. 000000000b6cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  2435. Possible instruction pointers:
  2436.  
  2437. 6 KERNELBASE.dll + 0x2b1cb
  2438. rsp = 0x000000000b6cfe70 rip = 0x00007ffb715fb1cb
  2439. Found by: stack scanning
  2440.  
  2441. Stack contents:
  2442. 000000000b6cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  2443. Possible instruction pointers:
  2444.  
  2445. 7 ntdll.dll + 0x53bd0
  2446. rsp = 0x000000000b6cfe80 rip = 0x00007ffb74653bd0
  2447. Found by: stack scanning
  2448.  
  2449. Stack contents:
  2450. 000000000b6cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2451. 000000000b6cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2452. 000000000b6cfea0 9d ca 3c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê<.&›..........
  2453. 000000000b6cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2454. 000000000b6cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  2455. Possible instruction pointers:
  2456.  
  2457. 8 lib-network-manager.dll + 0x128be
  2458. rsp = 0x000000000b6cfed0 rip = 0x00007ffb151328be
  2459. Found by: stack scanning
  2460.  
  2461. Stack contents:
  2462. 000000000b6cfed0 00 00 00 00 00 00 00 00 30 05 d2 03 00 00 00 00 ........0.Ò.....
  2463. 000000000b6cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2464. 000000000b6cfef0 60 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 `ª`.....².Œqû...
  2465. Possible instruction pointers:
  2466.  
  2467. 9 ucrtbase.dll + 0x210b2
  2468. rsp = 0x000000000b6cff00 rip = 0x00007ffb718c10b2
  2469. Found by: stack scanning
  2470.  
  2471. Stack contents:
  2472. 000000000b6cff00 00 00 00 00 00 00 00 00 60 aa 60 02 00 00 00 00 ........`ª`.....
  2473. 000000000b6cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2474. 000000000b6cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  2475. Possible instruction pointers:
  2476.  
  2477. 10 KERNEL32.DLL + 0x17c24
  2478. rsp = 0x000000000b6cff30 rip = 0x00007ffb73557c24
  2479. Found by: stack scanning
  2480.  
  2481. Stack contents:
  2482. 000000000b6cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2483. 000000000b6cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2484. 000000000b6cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  2485. Possible instruction pointers:
  2486.  
  2487. 11 ntdll.dll + 0x6d4d1
  2488. rsp = 0x000000000b6cff60 rip = 0x00007ffb7466d4d1
  2489. Found by: stack scanning
  2490.  
  2491. Thread 18
  2492. 0 ntdll.dll + 0xa0024
  2493. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2494. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2495. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2496. rbp = 0x0000000003b617b0 rsp = 0x000000000b7cfd28
  2497. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2498. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2499. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2500. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2501. rip = 0x00007ffb746a0024
  2502. Found by: given as instruction pointer in context
  2503.  
  2504. Stack contents:
  2505. 000000000b7cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
  2506. Possible instruction pointers:
  2507.  
  2508. 1 ntdll.dll + 0x60c10
  2509. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2510. rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
  2511. rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
  2512. rbp = 0x0000000003b617b0 rsp = 0x000000000b7cfd30
  2513. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  2514. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  2515. r12 = 0x0000000000000000 r13 = 0x0000000000000000
  2516. r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
  2517. rip = 0x00007ffb74660c10
  2518. Found by: simulating a return from leaf function
  2519.  
  2520. Stack contents:
  2521. 000000000b7cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2522. 000000000b7cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2523. 000000000b7cfd50 50 fd 0c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý......Pý......
  2524. 000000000b7cfd60 50 fd 3c 08 00 00 00 00 78 94 08 00 00 00 00 00 Pý<.....x”......
  2525. 000000000b7cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
  2526. 000000000b7cfd80 00 00 00 00 00 00 00 00 40 07 d2 03 00 00 00 00 ........@.Ò.....
  2527. 000000000b7cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00  .¶......ì_qû...
  2528. Possible instruction pointers:
  2529.  
  2530. 2 KERNELBASE.dll + 0x2ec8d
  2531. rsp = 0x000000000b7cfda0 rip = 0x00007ffb715fec8d
  2532. Found by: stack scanning
  2533.  
  2534. Stack contents:
  2535. 000000000b7cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
  2536. 000000000b7cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2537. 000000000b7cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
  2538. 000000000b7cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
  2539. Possible instruction pointers:
  2540.  
  2541. 3 MSVCP140.dll + 0x12939
  2542. rsp = 0x000000000b7cfde0 rip = 0x00007ffb11642939
  2543. Found by: stack scanning
  2544.  
  2545. Stack contents:
  2546. 000000000b7cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2547. 000000000b7cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2548. 000000000b7cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
  2549. Possible instruction pointers:
  2550.  
  2551. 4 MSVCP140.dll + 0x12b7a
  2552. rsp = 0x000000000b7cfe10 rip = 0x00007ffb11642b7a
  2553. Found by: stack scanning
  2554.  
  2555. Stack contents:
  2556. 000000000b7cfe10 ac 2f 18 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/..l2..........
  2557. 000000000b7cfe20 00 00 00 00 00 00 00 00 40 07 d2 03 00 00 00 00 ........@.Ò.....
  2558. 000000000b7cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00  .¶.....¿A..û...
  2559. Possible instruction pointers:
  2560.  
  2561. 5 lib-network-manager.dll + 0x141bf
  2562. rsp = 0x000000000b7cfe40 rip = 0x00007ffb151341bf
  2563. Found by: stack scanning
  2564.  
  2565. Stack contents:
  2566. 000000000b7cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
  2567. 000000000b7cfe50 40 07 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 @.Ò.............
  2568. 000000000b7cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
  2569. Possible instruction pointers:
  2570.  
  2571. 6 KERNELBASE.dll + 0x2b1cb
  2572. rsp = 0x000000000b7cfe70 rip = 0x00007ffb715fb1cb
  2573. Found by: stack scanning
  2574.  
  2575. Stack contents:
  2576. 000000000b7cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
  2577. Possible instruction pointers:
  2578.  
  2579. 7 ntdll.dll + 0x53bd0
  2580. rsp = 0x000000000b7cfe80 rip = 0x00007ffb74653bd0
  2581. Found by: stack scanning
  2582.  
  2583. Stack contents:
  2584. 000000000b7cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2585. 000000000b7cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2586. 000000000b7cfea0 9d ca 2c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê,.&›..........
  2587. 000000000b7cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2588. 000000000b7cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
  2589. Possible instruction pointers:
  2590.  
  2591. 8 lib-network-manager.dll + 0x128be
  2592. rsp = 0x000000000b7cfed0 rip = 0x00007ffb151328be
  2593. Found by: stack scanning
  2594.  
  2595. Stack contents:
  2596. 000000000b7cfed0 00 00 00 00 00 00 00 00 40 07 d2 03 00 00 00 00 ........@.Ò.....
  2597. 000000000b7cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2598. 000000000b7cfef0 f0 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 ðª`.....².Œqû...
  2599. Possible instruction pointers:
  2600.  
  2601. 9 ucrtbase.dll + 0x210b2
  2602. rsp = 0x000000000b7cff00 rip = 0x00007ffb718c10b2
  2603. Found by: stack scanning
  2604.  
  2605. Stack contents:
  2606. 000000000b7cff00 00 00 00 00 00 00 00 00 f0 aa 60 02 00 00 00 00 ........ðª`.....
  2607. 000000000b7cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2608. 000000000b7cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
  2609. Possible instruction pointers:
  2610.  
  2611. 10 KERNEL32.DLL + 0x17c24
  2612. rsp = 0x000000000b7cff30 rip = 0x00007ffb73557c24
  2613. Found by: stack scanning
  2614.  
  2615. Stack contents:
  2616. 000000000b7cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2617. 000000000b7cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2618. 000000000b7cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
  2619. Possible instruction pointers:
  2620.  
  2621. 11 ntdll.dll + 0x6d4d1
  2622. rsp = 0x000000000b7cff60 rip = 0x00007ffb7466d4d1
  2623. Found by: stack scanning
  2624.  
  2625. Thread 19
  2626. 0 ntdll.dll + 0xa0084
  2627. rax = 0x00000000000001cd rdx = 0x000000000a4e8180
  2628. rcx = 0x0000000000000260 rbx = 0x000000000a4e8500
  2629. rsi = 0x00000000025e2b80 rdi = 0x000000000a4e8500
  2630. rbp = 0x0000000000000000 rsp = 0x000000000badfb68
  2631. r8 = 0x000000000dcdae60 r9 = 0x000000000000a9db
  2632. r10 = 0x0000000000002010 r11 = 0x000000000badf801
  2633. r12 = 0x0000000000000000 r13 = 0x00000000026514f8
  2634. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  2635. rip = 0x00007ffb746a0084
  2636. Found by: given as instruction pointer in context
  2637.  
  2638. Stack contents:
  2639. 000000000badfb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
  2640. Possible instruction pointers:
  2641.  
  2642. 1 ntdll.dll + 0x33fe0
  2643. rax = 0x00000000000001cd rdx = 0x000000000a4e8180
  2644. rcx = 0x0000000000000260 rbx = 0x000000000a4e8500
  2645. rsi = 0x00000000025e2b80 rdi = 0x000000000a4e8500
  2646. rbp = 0x0000000000000000 rsp = 0x000000000badfb70
  2647. r8 = 0x000000000dcdae60 r9 = 0x000000000000a9db
  2648. r10 = 0x0000000000002010 r11 = 0x000000000badf801
  2649. r12 = 0x0000000000000000 r13 = 0x00000000026514f8
  2650. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  2651. rip = 0x00007ffb74633fe0
  2652. Found by: simulating a return from leaf function
  2653.  
  2654. Thread 20
  2655. 0 ntdll.dll + 0xa0024
  2656. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2657. rcx = 0x0000000002c14a08 rbx = 0x0000000000000000
  2658. rsi = 0x0000000000000000 rdi = 0x0000000002c149b0
  2659. rbp = 0x0000000002c14a08 rsp = 0x000000000b9cf458
  2660. r8 = 0x0000000000000000 r9 = 0x0000000002c14a08
  2661. r10 = 0x0000000000000000 r11 = 0x0000000000000246
  2662. r12 = 0x0000000002c14980 r13 = 0x0000000002c149f8
  2663. r14 = 0x0000000002c149b8 r15 = 0x0000000000000000
  2664. rip = 0x00007ffb746a0024
  2665. Found by: given as instruction pointer in context
  2666.  
  2667. Stack contents:
  2668. 000000000b9cf458 10 0c 66 74 fb 7f 00 00 ..ftû...
  2669. Possible instruction pointers:
  2670.  
  2671. 1 ntdll.dll + 0x60c10
  2672. rax = 0x00000000000001ca rdx = 0x0000000000000000
  2673. rcx = 0x0000000002c14a08 rbx = 0x0000000000000000
  2674. rsi = 0x0000000000000000 rdi = 0x0000000002c149b0
  2675. rbp = 0x0000000002c14a08 rsp = 0x000000000b9cf460
  2676. r8 = 0x0000000000000000 r9 = 0x0000000002c14a08
  2677. r10 = 0x0000000000000000 r11 = 0x0000000000000246
  2678. r12 = 0x0000000002c14980 r13 = 0x0000000002c149f8
  2679. r14 = 0x0000000002c149b8 r15 = 0x0000000000000000
  2680. rip = 0x00007ffb74660c10
  2681. Found by: simulating a return from leaf function
  2682.  
  2683. Stack contents:
  2684. 000000000b9cf460 10 a0 8e 0a 00 00 00 00 08 00 00 00 00 00 00 00 . Ž.............
  2685. 000000000b9cf470 00 00 01 00 00 00 00 00 b0 8b 6e 0a 00 00 00 00 ........°‹n.....
  2686. 000000000b9cf480 00 00 00 00 00 00 00 00 80 f4 9c 0b 00 00 00 00 .........ôœ.....
  2687. 000000000b9cf490 00 00 00 00 00 00 00 00 88 99 08 00 00 00 00 00 ................
  2688. 000000000b9cf4a0 00 00 00 00 01 00 00 00 08 4a c1 02 00 00 00 00 .........JÁ.....
  2689. 000000000b9cf4b0 48 4a c1 02 00 00 00 00 00 00 00 00 00 00 00 00 HJÁ.............
  2690. 000000000b9cf4c0 f8 49 c1 02 00 00 00 00 8d ec 5f 71 fb 7f 00 00 øIÁ......ì_qû...
  2691. Possible instruction pointers:
  2692.  
  2693. 2 KERNELBASE.dll + 0x2ec8d
  2694. rsp = 0x000000000b9cf4d0 rip = 0x00007ffb715fec8d
  2695. Found by: stack scanning
  2696.  
  2697. Stack contents:
  2698. 000000000b9cf4d0 00 4a c1 02 00 00 00 00 b0 49 c1 02 00 00 00 00 .JÁ.....°IÁ.....
  2699. 000000000b9cf4e0 70 f6 9c 0b 00 00 00 00 60 00 00 00 00 00 00 00 pöœ.....`.......
  2700. 000000000b9cf4f0 00 04 00 00 00 00 00 00 f8 49 c1 02 00 00 00 00 ........øIÁ.....
  2701. 000000000b9cf500 00 4a c1 02 00 00 00 00 39 29 64 11 fb 7f 00 00 .JÁ.....9)d.û...
  2702. Possible instruction pointers:
  2703.  
  2704. 3 MSVCP140.dll + 0x12939
  2705. rsp = 0x000000000b9cf510 rip = 0x00007ffb11642939
  2706. Found by: stack scanning
  2707.  
  2708. Stack contents:
  2709. 000000000b9cf510 00 00 00 00 00 00 00 00 10 ed 5f 0a 00 00 00 00 .........í_.....
  2710. 000000000b9cf520 00 00 00 00 00 00 00 00 20 b6 5a 58 fb 7f 00 00 ........ ¶ZXû...
  2711. Possible instruction pointers:
  2712.  
  2713. 4 lib-project-file-io.dll + 0x3b620
  2714. rsp = 0x000000000b9cf530 rip = 0x00007ffb585ab620
  2715. Found by: stack scanning
  2716.  
  2717. Stack contents:
  2718. 000000000b9cf530 10 ed 5f 0a 00 00 00 00 7a 2b 64 11 fb 7f 00 00 .í_.....z+d.û...
  2719. Possible instruction pointers:
  2720.  
  2721. 5 MSVCP140.dll + 0x12b7a
  2722. rsp = 0x000000000b9cf540 rip = 0x00007ffb11642b7a
  2723. Found by: stack scanning
  2724.  
  2725. Stack contents:
  2726. 000000000b9cf540 5c 27 f8 7f 6c 32 00 00 00 00 00 00 00 00 00 00 \'ø.l2..........
  2727. 000000000b9cf550 48 4a c1 02 00 00 00 00 00 00 00 00 00 00 00 00 HJÁ.............
  2728. 000000000b9cf560 49 4a c1 02 00 00 00 00 b3 a6 57 58 fb 7f 00 00 IJÁ.....³¦WXû...
  2729. Possible instruction pointers:
  2730.  
  2731. 6 lib-project-file-io.dll + 0xa6b3
  2732. rsp = 0x000000000b9cf570 rip = 0x00007ffb5857a6b3
  2733. Found by: stack scanning
  2734.  
  2735. Stack contents:
  2736. 000000000b9cf570 b0 49 c1 02 00 00 00 00 49 4a c1 02 00 00 00 00 °IÁ.....IJÁ.....
  2737. 000000000b9cf580 49 4a c1 02 00 00 00 00 00 00 00 00 00 00 00 00 IJÁ.............
  2738. 000000000b9cf590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2739. 000000000b9cf5a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2740. 000000000b9cf5b0 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
  2741. 000000000b9cf5c0 00 78 18 00 00 00 00 00 00 00 00 00 00 00 00 00 .x..............
  2742. 000000000b9cf5d0 80 49 c1 02 00 00 00 00 be b9 63 74 fb 7f 00 00 .IÁ.....¾¹ctû...
  2743. Possible instruction pointers:
  2744.  
  2745. 7 ntdll.dll + 0x3b9be
  2746. rsp = 0x000000000b9cf5e0 rip = 0x00007ffb7463b9be
  2747. Found by: stack scanning
  2748.  
  2749. Stack contents:
  2750. 000000000b9cf5e0 26 00 06 00 00 00 00 00 10 01 96 0a 00 00 00 00 &.........–.....
  2751. 000000000b9cf5f0 48 4a c1 02 00 00 00 00 10 ed 5f 0a 00 00 00 00 HJÁ......í_.....
  2752. 000000000b9cf600 04 00 05 00 00 00 00 00 e0 02 00 00 00 00 00 00 ........à.......
  2753. 000000000b9cf610 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
  2754. 000000000b9cf620 00 00 5c 00 00 00 00 00 00 00 18 00 00 00 00 00 ..\.............
  2755. 000000000b9cf630 c4 02 18 00 00 00 00 00 c0 12 55 02 00 00 00 00 Ä.......À.U.....
  2756. 000000000b9cf640 90 00 00 00 00 00 00 00 c0 0c 18 00 00 00 00 00 ........À.......
  2757. 000000000b9cf650 58 03 55 02 00 00 00 00 08 00 00 00 00 00 00 00 X.U.............
  2758. 000000000b9cf660 00 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 ................
  2759. 000000000b9cf670 80 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
  2760. 000000000b9cf680 00 00 5c 00 00 00 00 00 66 64 c5 68 fb 7f 00 00 ..\.....fdÅhû...
  2761. Possible instruction pointers:
  2762.  
  2763. 8 WindowsCodecs.dll + 0x96466
  2764. rsp = 0x000000000b9cf690 rip = 0x00007ffb68c56466
  2765. Found by: stack scanning
  2766.  
  2767. Stack contents:
  2768. 000000000b9cf690 09 00 00 00 00 00 00 00 34 b4 63 74 fb 7f 00 00 .......4´ctû...
  2769. Possible instruction pointers:
  2770.  
  2771. 9 ntdll.dll + 0x3b434
  2772. rsp = 0x000000000b9cf6a0 rip = 0x00007ffb7463b434
  2773. Found by: stack scanning
  2774.  
  2775. Stack contents:
  2776. 000000000b9cf6a0 00 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2777. 000000000b9cf6b0 80 00 00 00 00 00 00 00 08 00 00 00 fb 7f 00 00 ............û...
  2778. 000000000b9cf6c0 02 00 00 00 00 00 00 00 4f 49 a4 59 fb 7f 00 00 ........OI¤Yû...
  2779. Possible instruction pointers:
  2780.  
  2781. 10 MSACM32.dll + 0x494f
  2782. rsp = 0x000000000b9cf6d0 rip = 0x00007ffb59a4494f
  2783. Found by: stack scanning
  2784.  
  2785. Stack contents:
  2786. 000000000b9cf6d0 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
  2787. 000000000b9cf6e0 00 00 00 00 00 00 00 00 00 00 d7 68 fb 7f 00 00 ..........×hû...
  2788. 000000000b9cf6f0 02 00 00 00 00 00 00 00 df f4 d9 68 fb 7f 00 00 ........ßôÙhû...
  2789. Possible instruction pointers:
  2790.  
  2791. 11 Windows.UI.dll + 0x2f4df
  2792. rsp = 0x000000000b9cf700 rip = 0x00007ffb68d9f4df
  2793. Found by: stack scanning
  2794.  
  2795. Stack contents:
  2796. 000000000b9cf700 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2797. 000000000b9cf710 01 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................
  2798. 000000000b9cf720 01 00 00 00 00 00 00 00 d0 b2 8a 71 fb 7f 00 00 ........вŠqû...
  2799. Possible instruction pointers:
  2800.  
  2801. 12 ucrtbase.dll + 0xb2d0
  2802. rsp = 0x000000000b9cf730 rip = 0x00007ffb718ab2d0
  2803. Found by: stack scanning
  2804.  
  2805. Stack contents:
  2806. 000000000b9cf730 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2807. 000000000b9cf740 00 c0 2c 00 00 00 00 00 9c 49 65 74 fb 7f 00 00 .À,.....œIetû...
  2808. Possible instruction pointers:
  2809.  
  2810. 13 ntdll.dll + 0x5499c
  2811. rsp = 0x000000000b9cf750 rip = 0x00007ffb7465499c
  2812. Found by: stack scanning
  2813.  
  2814. Stack contents:
  2815. 000000000b9cf750 60 88 95 0a 00 00 00 00 15 00 00 00 00 00 00 00 `.•.............
  2816. 000000000b9cf760 00 00 00 00 00 00 00 00 d8 c1 8a 71 fb 7f 00 00 ........ØÁŠqû...
  2817. Possible instruction pointers:
  2818.  
  2819. 14 ucrtbase.dll + 0xc1d8
  2820. rsp = 0x000000000b9cf770 rip = 0x00007ffb718ac1d8
  2821. Found by: stack scanning
  2822.  
  2823. Stack contents:
  2824. 000000000b9cf770 05 00 00 00 00 00 00 00 20 be 14 6f fb 7f 00 00 ........ ¾.oû...
  2825. Possible instruction pointers:
  2826.  
  2827. 15 dcomp.dll + 0x6be20
  2828. rsp = 0x000000000b9cf780 rip = 0x00007ffb6f14be20
  2829. Found by: stack scanning
  2830.  
  2831. Stack contents:
  2832. 000000000b9cf780 f0 bb 6c 0a 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ð»l.....Ð;etû...
  2833. Possible instruction pointers:
  2834.  
  2835. 16 ntdll.dll + 0x53bd0
  2836. rsp = 0x000000000b9cf790 rip = 0x00007ffb74653bd0
  2837. Found by: stack scanning
  2838.  
  2839. Stack contents:
  2840. 000000000b9cf790 00 00 00 00 00 00 00 00 90 ff 10 18 fb 7f 00 00 .........ÿ..û...
  2841. Possible instruction pointers:
  2842.  
  2843. 17 VCRUNTIME140.dll + 0xff90
  2844. rsp = 0x000000000b9cf7a0 rip = 0x00007ffb1810ff90
  2845. Found by: stack scanning
  2846.  
  2847. Stack contents:
  2848. 000000000b9cf7a0 00 00 a0 68 fb 7f 00 00 4e ac ab 68 fb 7f 00 00 .. hû...N¬«hû...
  2849. Possible instruction pointers:
  2850.  
  2851. 18 InputHost.dll + 0xbac4e
  2852. rsp = 0x000000000b9cf7b0 rip = 0x00007ffb68abac4e
  2853. Found by: stack scanning
  2854.  
  2855. Stack contents:
  2856. 000000000b9cf7b0 08 72 ad 68 fb 7f 00 00 .r­hû...
  2857. Possible instruction pointers:
  2858.  
  2859. 19 InputHost.dll + 0xd7208
  2860. rsp = 0x000000000b9cf7b8 rip = 0x00007ffb68ad7208
  2861. Found by: stack scanning
  2862.  
  2863. Stack contents:
  2864. 000000000b9cf7b8 02 00 00 00 00 00 00 00 84 03 fe 7f 00 00 00 00 ........„.þ.....
  2865. 000000000b9cf7c8 77 4e 62 74 fb 7f 00 00 wNbtû...
  2866. Possible instruction pointers:
  2867.  
  2868. 20 ntdll.dll + 0x24e77
  2869. rsp = 0x000000000b9cf7d0 rip = 0x00007ffb74624e77
  2870. Found by: stack scanning
  2871.  
  2872. Stack contents:
  2873. 000000000b9cf7d0 10 72 ad 68 fb 7f 00 00 .r­hû...
  2874. Possible instruction pointers:
  2875.  
  2876. 21 InputHost.dll + 0xd7210
  2877. rsp = 0x000000000b9cf7d8 rip = 0x00007ffb68ad7210
  2878. Found by: stack scanning
  2879.  
  2880. Stack contents:
  2881. 000000000b9cf7d8 4d a6 ab 68 fb 7f 00 00 M¦«hû...
  2882. Possible instruction pointers:
  2883.  
  2884. 22 InputHost.dll + 0xba64d
  2885. rsp = 0x000000000b9cf7e0 rip = 0x00007ffb68aba64d
  2886. Found by: stack scanning
  2887.  
  2888. Stack contents:
  2889. 000000000b9cf7e0 00 00 a0 68 fb 7f 00 00 2a 50 62 74 fb 7f 00 00 .. hû...*Pbtû...
  2890. Possible instruction pointers:
  2891.  
  2892. 23 ntdll.dll + 0x2502a
  2893. rsp = 0x000000000b9cf7f0 rip = 0x00007ffb7462502a
  2894. Found by: stack scanning
  2895.  
  2896. Stack contents:
  2897. 000000000b9cf7f0 85 03 fe 7f 00 00 00 00 93 4f 62 74 fb 7f 00 00 ….þ.....“Obtû...
  2898. Possible instruction pointers:
  2899.  
  2900. 24 ntdll.dll + 0x24f93
  2901. rsp = 0x000000000b9cf800 rip = 0x00007ffb74624f93
  2902. Found by: stack scanning
  2903.  
  2904. Stack contents:
  2905. 000000000b9cf800 02 00 00 00 00 00 00 00 bb a8 ab 68 fb 7f 00 00 ........»¨«hû...
  2906. Possible instruction pointers:
  2907.  
  2908. 25 InputHost.dll + 0xba8bb
  2909. rsp = 0x000000000b9cf810 rip = 0x00007ffb68aba8bb
  2910. Found by: stack scanning
  2911.  
  2912. Stack contents:
  2913. 000000000b9cf810 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  2914. 000000000b9cf820 e8 00 0e 6f fb 7f 00 00 è..oû...
  2915. Possible instruction pointers:
  2916.  
  2917. 26 dcomp.dll + 0xe8
  2918. rsp = 0x000000000b9cf828 rip = 0x00007ffb6f0e00e8
  2919. Found by: stack scanning
  2920.  
  2921. Stack contents:
  2922. 000000000b9cf828 84 03 fe 7f 00 00 00 00 00 c0 2c 00 00 00 00 00 „.þ......À,.....
  2923. 000000000b9cf838 02 00 00 00 00 00 00 00 70 a9 ab 68 fb 7f 00 00 ........p©«hû...
  2924. Possible instruction pointers:
  2925.  
  2926. 27 InputHost.dll + 0xba970
  2927. rsp = 0x000000000b9cf848 rip = 0x00007ffb68aba970
  2928. Found by: stack scanning
  2929.  
  2930. Stack contents:
  2931. 000000000b9cf848 90 2f 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 ./\.............
  2932. 000000000b9cf858 b2 50 62 74 fb 7f 00 00 ²Pbtû...
  2933. Possible instruction pointers:
  2934.  
  2935. 28 ntdll.dll + 0x250b2
  2936. rsp = 0x000000000b9cf860 rip = 0x00007ffb746250b2
  2937. Found by: stack scanning
  2938.  
  2939. Stack contents:
  2940. 000000000b9cf860 00 00 00 00 00 00 00 00 2a 50 62 74 fb 7f 00 00 ........*Pbtû...
  2941. Possible instruction pointers:
  2942.  
  2943. 29 ntdll.dll + 0x2502a
  2944. rsp = 0x000000000b9cf870 rip = 0x00007ffb7462502a
  2945. Found by: stack scanning
  2946.  
  2947. Stack contents:
  2948. 000000000b9cf870 00 00 a0 68 fb 7f 00 00 02 00 00 00 00 00 00 00 .. hû...........
  2949. 000000000b9cf880 00 00 00 00 00 00 00 00 85 03 fe 7f 00 00 00 00 ........….þ.....
  2950. 000000000b9cf890 15 00 00 00 00 00 00 00 8b d7 62 74 fb 7f 00 00 ........‹×btû...
  2951. Possible instruction pointers:
  2952.  
  2953. 30 ntdll.dll + 0x2d78b
  2954. rsp = 0x000000000b9cf8a0 rip = 0x00007ffb7462d78b
  2955. Found by: stack scanning
  2956.  
  2957. Stack contents:
  2958. 000000000b9cf8a0 70 a9 ab 68 fb 7f 00 00 p©«hû...
  2959. Possible instruction pointers:
  2960.  
  2961. 31 InputHost.dll + 0xba970
  2962. rsp = 0x000000000b9cf8a8 rip = 0x00007ffb68aba970
  2963. Found by: stack scanning
  2964.  
  2965. Stack contents:
  2966. 000000000b9cf8a8 54 3e 67 74 fb 7f 00 00 T>gtû...
  2967. Possible instruction pointers:
  2968.  
  2969. 32 ntdll.dll + 0x73e54
  2970. rsp = 0x000000000b9cf8b0 rip = 0x00007ffb74673e54
  2971. Found by: stack scanning
  2972.  
  2973. Stack contents:
  2974. 000000000b9cf8b0 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
  2975. 000000000b9cf8c0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
  2976. 000000000b9cf8d0 70 a9 ab 68 fb 7f 00 00 p©«hû...
  2977. Possible instruction pointers:
  2978.  
  2979. 33 InputHost.dll + 0xba970
  2980. rsp = 0x000000000b9cf8d8 rip = 0x00007ffb68aba970
  2981. Found by: stack scanning
  2982.  
  2983. Stack contents:
  2984. 000000000b9cf8d8 e2 2e 62 74 fb 7f 00 00 â.btû...
  2985. Possible instruction pointers:
  2986.  
  2987. 34 ntdll.dll + 0x22ee2
  2988. rsp = 0x000000000b9cf8e0 rip = 0x00007ffb74622ee2
  2989. Found by: stack scanning
  2990.  
  2991. Stack contents:
  2992. 000000000b9cf8e0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
  2993. 000000000b9cf8f0 00 10 26 00 00 00 00 00 70 a9 ab 68 fb 7f 00 00 ..&.....p©«hû...
  2994. Possible instruction pointers:
  2995.  
  2996. 35 InputHost.dll + 0xba970
  2997. rsp = 0x000000000b9cf900 rip = 0x00007ffb68aba970
  2998. Found by: stack scanning
  2999.  
  3000. Stack contents:
  3001. 000000000b9cf900 d0 71 63 00 00 00 00 00 70 a9 ab 68 fb 7f 00 00 Ðqc.....p©«hû...
  3002. Possible instruction pointers:
  3003.  
  3004. 36 InputHost.dll + 0xba970
  3005. rsp = 0x000000000b9cf910 rip = 0x00007ffb68aba970
  3006. Found by: stack scanning
  3007.  
  3008. Stack contents:
  3009. 000000000b9cf910 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H...............
  3010. 000000000b9cf920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3011. 000000000b9cf930 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff p.......ÿÿÿÿÿÿÿÿ
  3012. 000000000b9cf940 ff ff ff ff ff ff ff ff 1a 2e 62 74 fb 7f 00 00 ÿÿÿÿÿÿÿÿ..btû...
  3013. Possible instruction pointers:
  3014.  
  3015. 37 ntdll.dll + 0x22e1a
  3016. rsp = 0x000000000b9cf950 rip = 0x00007ffb74622e1a
  3017. Found by: stack scanning
  3018.  
  3019. Stack contents:
  3020. 000000000b9cf950 4d 2e 62 74 fb 7f 00 00 M.btû...
  3021. Possible instruction pointers:
  3022.  
  3023. 38 ntdll.dll + 0x22e4d
  3024. rsp = 0x000000000b9cf958 rip = 0x00007ffb74622e4d
  3025. Found by: stack scanning
  3026.  
  3027. Stack contents:
  3028. 000000000b9cf958 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00 ........H.......
  3029. 000000000b9cf968 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3030. 000000000b9cf978 00 00 00 00 00 00 00 00 70 00 00 00 00 00 00 00 ........p.......
  3031. 000000000b9cf988 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
  3032. 000000000b9cf998 aa 2e 62 74 fb 7f 00 00 ª.btû...
  3033. Possible instruction pointers:
  3034.  
  3035. 39 ntdll.dll + 0x22eaa
  3036. rsp = 0x000000000b9cf9a0 rip = 0x00007ffb74622eaa
  3037. Found by: stack scanning
  3038.  
  3039. Stack contents:
  3040. 000000000b9cf9a0 ca 2e 62 74 fb 7f 00 00 Ê.btû...
  3041. Possible instruction pointers:
  3042.  
  3043. 40 ntdll.dll + 0x22eca
  3044. rsp = 0x000000000b9cf9a8 rip = 0x00007ffb74622eca
  3045. Found by: stack scanning
  3046.  
  3047. Stack contents:
  3048. 000000000b9cf9a8 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
  3049. 000000000b9cf9b8 12 1f 67 74 fb 7f 00 00 ..gtû...
  3050. Possible instruction pointers:
  3051.  
  3052. 41 ntdll.dll + 0x71f12
  3053. rsp = 0x000000000b9cf9c0 rip = 0x00007ffb74671f12
  3054. Found by: stack scanning
  3055.  
  3056. Stack contents:
  3057. 000000000b9cf9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3058. 000000000b9cf9d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3059. 000000000b9cf9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3060. 000000000b9cf9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3061. 000000000b9cfa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3062. 000000000b9cfa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3063. 000000000b9cfa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3064. 000000000b9cfa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3065. 000000000b9cfa40 e0 fa 9c 0b 00 00 00 00 00 00 00 00 00 00 00 00 àúœ.............
  3066. 000000000b9cfa50 00 00 60 74 fb 7f 00 00 53 1e 67 74 fb 7f 00 00 ..`tû...S.gtû...
  3067. Possible instruction pointers:
  3068.  
  3069. 42 ntdll.dll + 0x71e53
  3070. rsp = 0x000000000b9cfa60 rip = 0x00007ffb74671e53
  3071. Found by: stack scanning
  3072.  
  3073. Stack contents:
  3074. 000000000b9cfa60 00 00 00 00 00 00 00 00 00 00 60 74 fb 7f 00 00 ..........`tû...
  3075. 000000000b9cfa70 00 00 00 00 00 00 00 00 00 c0 2c 00 00 00 00 00 .........À,.....
  3076. 000000000b9cfa80 00 00 00 00 00 00 00 00 08 1e 67 74 fb 7f 00 00 ..........gtû...
  3077. Possible instruction pointers:
  3078.  
  3079. 43 ntdll.dll + 0x71e08
  3080. rsp = 0x000000000b9cfa90 rip = 0x00007ffb74671e08
  3081. Found by: stack scanning
  3082.  
  3083. Stack contents:
  3084. 000000000b9cfa90 e0 fa 9c 0b 00 00 00 00 00 00 00 00 00 00 00 00 àúœ.............
  3085. 000000000b9cfaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3086. 000000000b9cfab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3087. 000000000b9cfac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3088. 000000000b9cfad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3089. 000000000b9cfae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3090. 000000000b9cfaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3091. 000000000b9cfb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3092. 000000000b9cfb10 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3.......
  3093. 000000000b9cfb20 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+.............
  3094. 000000000b9cfb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3095. 000000000b9cfb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3096. 000000000b9cfb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3097. 000000000b9cfb60 70 10 8c 71 fb 7f 00 00 p.Œqû...
  3098. Possible instruction pointers:
  3099.  
  3100. 44 ucrtbase.dll + 0x21070
  3101. rsp = 0x000000000b9cfb68 rip = 0x00007ffb718c1070
  3102. Found by: stack scanning
  3103.  
  3104. Stack contents:
  3105. 000000000b9cfb68 b0 8f 6d 0a 00 00 00 00 00 00 00 00 00 00 00 00 °.m.............
  3106. 000000000b9cfb78 d8 ff 9c 0b 00 00 00 00 00 00 00 00 00 00 00 00 Øÿœ.............
  3107. 000000000b9cfb88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3108. 000000000b9cfb98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3109. 000000000b9cfba8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3110. 000000000b9cfbb8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3111. 000000000b9cfbc8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
  3112. 000000000b9cfbd8 b0 d4 66 74 fb 7f 00 00 °Ôftû...
  3113. Possible instruction pointers:
  3114.  
  3115. 45 ntdll.dll + 0x6d4b0
  3116. rsp = 0x000000000b9cfbe0 rip = 0x00007ffb7466d4b0
  3117. Found by: stack scanning
  3118.  
  3119. Thread 21
  3120. 0 ntdll.dll + 0xa0084
  3121. rax = 0x00000000000001cd rdx = 0x0000000002d57840
  3122. rcx = 0x0000000000000260 rbx = 0x0000000002d57bc0
  3123. rsi = 0x00000000025e2b80 rdi = 0x0000000002d57bc0
  3124. rbp = 0x0000000000000000 rsp = 0x00000000052cfb68
  3125. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  3126. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  3127. r12 = 0x0000000000000000 r13 = 0x00000000026514f8
  3128. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  3129. rip = 0x00007ffb746a0084
  3130. Found by: given as instruction pointer in context
  3131.  
  3132. Stack contents:
  3133. 00000000052cfb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
  3134. Possible instruction pointers:
  3135.  
  3136. 1 ntdll.dll + 0x33fe0
  3137. rax = 0x00000000000001cd rdx = 0x0000000002d57840
  3138. rcx = 0x0000000000000260 rbx = 0x0000000002d57bc0
  3139. rsi = 0x00000000025e2b80 rdi = 0x0000000002d57bc0
  3140. rbp = 0x0000000000000000 rsp = 0x00000000052cfb70
  3141. r8 = 0x0000000000000000 r9 = 0x0000000000000000
  3142. r10 = 0x0000000000000000 r11 = 0x0000000000000000
  3143. r12 = 0x0000000000000000 r13 = 0x00000000026514f8
  3144. r14 = 0x0000000000000001 r15 = 0x0000000000000000
  3145. rip = 0x00007ffb74633fe0
  3146. Found by: simulating a return from leaf function
  3147.  
  3148. Loaded modules:
  3149. 0x7ff6b1fe0000 - 0x7ff6b2da4fff Audacity.exe 3.4.2.0 (main) (WARNING: No symbols, Audacity.pdb, 03D07AE88FE54D35BB529B57190F6CD71)
  3150. 0x7ffb10ab0000 - 0x7ffb10aecfff wavpackdll.dll 5.6.0.0
  3151. 0x7ffb10af0000 - 0x7ffb10b18fff mod-wavpack.dll 0.0.0.0
  3152. 0x7ffb10b20000 - 0x7ffb10b57fff mod-pcm.dll 0.0.0.0
  3153. 0x7ffb10b60000 - 0x7ffb10b97fff mod-opus.dll 0.0.0.0
  3154. 0x7ffb10ba0000 - 0x7ffb10bb5fff vorbisfile.dll 0.0.0.0
  3155. 0x7ffb10bc0000 - 0x7ffb10bdffff mod-ogg.dll 0.0.0.0
  3156. 0x7ffb10be0000 - 0x7ffb10c48fff mpg123.dll 0.0.0.0
  3157. 0x7ffb10c50000 - 0x7ffb10c69fff mod-mpg123.dll 0.0.0.0
  3158. 0x7ffb10c70000 - 0x7ffb10d18fff libmp3lame.DLL 0.0.0.0
  3159. 0x7ffb10d20000 - 0x7ffb10d71fff mod-mp3.dll 0.0.0.0
  3160. 0x7ffb10d80000 - 0x7ffb10ddbfff mod-mp2.dll 0.0.0.0
  3161. 0x7ffb10de0000 - 0x7ffb10df9fff mod-lof.dll 0.0.0.0
  3162. 0x7ffb10e00000 - 0x7ffb10e28fff FLAC++.dll 0.0.0.0
  3163. 0x7ffb10e30000 - 0x7ffb10e64fff mod-flac.dll 0.0.0.0
  3164. 0x7ffb10e70000 - 0x7ffb10ecafff lib-ffmpeg-support.dll 0.0.0.0
  3165. 0x7ffb10ed0000 - 0x7ffb10f40fff mod-ffmpeg.dll 0.0.0.0
  3166. 0x7ffb10f50000 - 0x7ffb10f81fff mod-cl.dll 0.0.0.0
  3167. 0x7ffb10f90000 - 0x7ffb10fc6fff mod-aup.dll 0.0.0.0
  3168. 0x7ffb10fd0000 - 0x7ffb11092fff jpeg8.dll 8.2.2.0
  3169. 0x7ffb110a0000 - 0x7ffb11124fff opus.dll 0.0.0.0
  3170. 0x7ffb11130000 - 0x7ffb11143fff ogg.dll 0.0.0.0
  3171. 0x7ffb11150000 - 0x7ffb111aefff FLAC.dll 0.0.0.0
  3172. 0x7ffb111b0000 - 0x7ffb1124efff libcurl.dll 7.82.0.0
  3173. 0x7ffb11250000 - 0x7ffb11339fff vorbis.dll 0.0.0.0
  3174. 0x7ffb11340000 - 0x7ffb113eefff vorbisenc.dll 0.0.0.0
  3175. 0x7ffb113f0000 - 0x7ffb11400fff lib-uuid.dll 0.0.0.0
  3176. 0x7ffb11410000 - 0x7ffb11432fff zlib1.dll 1.2.13.0
  3177. 0x7ffb11440000 - 0x7ffb1145efff wxbase313u_xml_vc_x64_custom.dll 3.1.3.0
  3178. 0x7ffb11460000 - 0x7ffb11496fff libexpat.dll 2.5.0.0
  3179. 0x7ffb114a0000 - 0x7ffb114b4fff lib-ipc.dll 0.0.0.0
  3180. 0x7ffb114c0000 - 0x7ffb11504fff libpng16.dll 0.0.0.0
  3181. 0x7ffb11510000 - 0x7ffb11531fff lib-project.dll 0.0.0.0
  3182. 0x7ffb11540000 - 0x7ffb1157afff portaudio_x64.dll 0.0.0.0
  3183. 0x7ffb11580000 - 0x7ffb1162dfff sndfile.dll 1.0.31.0
  3184. 0x7ffb11630000 - 0x7ffb116bdfff MSVCP140.dll 14.36.32532.0 (WARNING: No symbols, msvcp140.amd64.pdb, E5D1EEDADA9A5DC5A36FAAB872E21A871)
  3185. 0x7ffb116c0000 - 0x7ffb116fcfff lib-sentry-reporting.dll 0.0.0.0
  3186. 0x7ffb11700000 - 0x7ffb11a89fff wxbase313u_vc_x64_custom.dll 3.1.3.0
  3187. 0x7ffb11a90000 - 0x7ffb11ab6fff lib-strings.dll 0.0.0.0
  3188. 0x7ffb11ac0000 - 0x7ffb11af4fff lib-preferences.dll 0.0.0.0
  3189. 0x7ffb11b00000 - 0x7ffb11b99fff lib-math.dll 0.0.0.0
  3190. 0x7ffb11ba0000 - 0x7ffb11c43fff lib-wave-track.dll 0.0.0.0
  3191. 0x7ffb11c50000 - 0x7ffb126eefff wxmsw313u_core_vc_x64_custom.dll 3.1.3.0
  3192. 0x7ffb12bf0000 - 0x7ffb12c1afff lib-files.dll 0.0.0.0
  3193. 0x7ffb12c20000 - 0x7ffb12e61fff lib-theme-resources.dll 0.0.0.0
  3194. 0x7ffb13130000 - 0x7ffb13152fff lib-string-utils.dll 0.0.0.0
  3195. 0x7ffb14d60000 - 0x7ffb14d73fff lib-audio-graph.dll 0.0.0.0
  3196. 0x7ffb15120000 - 0x7ffb1515afff lib-network-manager.dll 0.0.0.0 (WARNING: No symbols, lib-network-manager.pdb, 5872B7A963A8428DB52332AA2722993A1)
  3197. 0x7ffb15df0000 - 0x7ffb15e46fff lib-module-manager.dll 0.0.0.0
  3198. 0x7ffb17800000 - 0x7ffb1782dfff lib-xml.dll 0.0.0.0
  3199. 0x7ffb17830000 - 0x7ffb178e9fff wxmsw313u_html_vc_x64_custom.dll 3.1.3.0
  3200. 0x7ffb178f0000 - 0x7ffb179d6fff wxmsw313u_aui_vc_x64_custom.dll 3.1.3.0
  3201. 0x7ffb17ab0000 - 0x7ffb17ae9fff lib-realtime-effects.dll 0.0.0.0
  3202. 0x7ffb17cd0000 - 0x7ffb17d13fff wdmaud.drv 10.0.18362.1
  3203. 0x7ffb17df0000 - 0x7ffb17e88fff dsound.dll 10.0.18362.1 (WARNING: No symbols, dsound.pdb, D7FF4FA83A419091673D2843AF11A8421)
  3204. 0x7ffb17ee0000 - 0x7ffb17f04fff lib-registries.dll 0.0.0.0
  3205. 0x7ffb18030000 - 0x7ffb18043fff portmidi.dll 0.0.0.0
  3206. 0x7ffb18100000 - 0x7ffb1811afff VCRUNTIME140.dll 14.36.32532.0 (WARNING: No symbols, vcruntime140.amd64.pdb, 38DD49151CC8F884F457AEB14C69A0F01)
  3207. 0x7ffb18380000 - 0x7ffb183c7fff lib-numeric-formats.dll 0.0.0.0
  3208. 0x7ffb18a20000 - 0x7ffb18a59fff lib-audio-devices.dll 0.0.0.0
  3209. 0x7ffb18f90000 - 0x7ffb18faffff lib-components.dll 0.0.0.0
  3210. 0x7ffb19050000 - 0x7ffb190a0fff lib-track.dll 0.0.0.0 (WARNING: No symbols, lib-track.pdb, EEF554FE6B7F4F25B09E3E1B1AD28A7B1)
  3211. 0x7ffb19380000 - 0x7ffb19394fff lib-transactions.dll 0.0.0.0
  3212. 0x7ffb19410000 - 0x7ffb19425fff lib-exceptions.dll 0.0.0.0
  3213. 0x7ffb2ae30000 - 0x7ffb2ae50fff lib-project-history.dll 0.0.0.0
  3214. 0x7ffb2f890000 - 0x7ffb2f8acfff lib-utility.dll 0.0.0.0
  3215. 0x7ffb2f8b0000 - 0x7ffb2f8d6fff lib-time-frequency-selection.dll 0.0.0.0
  3216. 0x7ffb2f960000 - 0x7ffb2f9d7fff lib-wx-wrappers.dll 0.0.0.0
  3217. 0x7ffb2f9e0000 - 0x7ffb2fa51fff lib-theme.dll 0.0.0.0
  3218. 0x7ffb2ff50000 - 0x7ffb2ff64fff lib-basic-ui.dll 0.0.0.0
  3219. 0x7ffb32470000 - 0x7ffb32488fff lib-channel.dll 0.0.0.0
  3220. 0x7ffb34b30000 - 0x7ffb34b59fff lib-track-selection.dll 0.0.0.0
  3221. 0x7ffb34b60000 - 0x7ffb34b92fff lib-mixer.dll 0.0.0.0
  3222. 0x7ffb36ab0000 - 0x7ffb36accfff lib-project-rate.dll 0.0.0.0
  3223. 0x7ffb36b60000 - 0x7ffb36b75fff lib-command-parameters.dll 0.0.0.0
  3224. 0x7ffb36b80000 - 0x7ffb36b99fff lib-playable-track.dll 0.0.0.0
  3225. 0x7ffb42580000 - 0x7ffb425b9fff dataexchange.dll 10.0.18362.836
  3226. 0x7ffb47020000 - 0x7ffb4717cfff AUDIOSES.DLL 10.0.18362.1256
  3227. 0x7ffb471b0000 - 0x7ffb471f9fff lib-effects.dll 0.0.0.0
  3228. 0x7ffb47200000 - 0x7ffb47263fff lib-shuttlegui.dll 0.0.0.0
  3229. 0x7ffb47270000 - 0x7ffb472c3fff lib-crashpad-configurer.dll 0.0.0.0
  3230. 0x7ffb472d0000 - 0x7ffb47358fff lib-vst3.dll 0.0.0.0
  3231. 0x7ffb47400000 - 0x7ffb4742efff lib-time-and-pitch.dll 0.0.0.0
  3232. 0x7ffb47580000 - 0x7ffb47593fff lib-sample-track.dll 0.0.0.0
  3233. 0x7ffb475a0000 - 0x7ffb47620fff lib-lv2.dll 0.0.0.0
  3234. 0x7ffb47730000 - 0x7ffb4776ffff wxmsw313u_qa_vc_x64_custom.dll 3.1.3.0
  3235. 0x7ffb47a80000 - 0x7ffb47ac5fff lib-cloud-audiocom.dll 0.0.0.0
  3236. 0x7ffb47ad0000 - 0x7ffb47b2afff lib-import-export.dll 0.0.0.0
  3237. 0x7ffb47d80000 - 0x7ffb47d9bfff lib-stretching-sequence.dll 0.0.0.0
  3238. 0x7ffb482c0000 - 0x7ffb482fffff lib-vst.dll 0.0.0.0
  3239. 0x7ffb48300000 - 0x7ffb4834ffff lib-audio-io.dll 0.0.0.0 (WARNING: No symbols, lib-audio-io.pdb, 94392AC466F7471594D5C17C639835931)
  3240. 0x7ffb48350000 - 0x7ffb483c9fff lib-wx-init.dll 0.0.0.0
  3241. 0x7ffb49f60000 - 0x7ffb49f7efff lib-tags.dll 0.0.0.0
  3242. 0x7ffb4c570000 - 0x7ffb4c589fff lib-url-schemes.dll 0.0.0.0
  3243. 0x7ffb4d1a0000 - 0x7ffb4d1c6fff lib-ladspa.dll 0.0.0.0
  3244. 0x7ffb4d520000 - 0x7ffb4d536fff lib-graphics.dll 0.0.0.0
  3245. 0x7ffb55390000 - 0x7ffb553a2fff lib-file-formats.dll 0.0.0.0
  3246. 0x7ffb55d40000 - 0x7ffb55d49fff midimap.dll 10.0.18362.1
  3247. 0x7ffb55d50000 - 0x7ffb55d5cfff msacm32.drv 10.0.18362.1
  3248. 0x7ffb55d60000 - 0x7ffb55d68fff ksuser.dll 10.0.18362.1
  3249. 0x7ffb562b0000 - 0x7ffb56452fff gdiplus.dll 10.0.18362.1256 (WARNING: No symbols, gdiplus.pdb, 8BACB1F11B77CFC0CF9757B401DCC1101)
  3250. 0x7ffb579b0000 - 0x7ffb57c33fff COMCTL32.dll 6.10.18362.1256
  3251. 0x7ffb58570000 - 0x7ffb586aefff lib-project-file-io.dll 0.0.0.0 (WARNING: No symbols, lib-project-file-io.pdb, 5309DAD6EBE743A28B26C4522F8479FD1)
  3252. 0x7ffb58eb0000 - 0x7ffb58eb6fff MSIMG32.dll 10.0.18362.1082
  3253. 0x7ffb58ec0000 - 0x7ffb58ec8fff WSOCK32.dll 10.0.18362.1
  3254. 0x7ffb58fa0000 - 0x7ffb59028fff WINSPOOL.DRV 10.0.18362.693
  3255. 0x7ffb59a40000 - 0x7ffb59a5bfff MSACM32.dll 10.0.18362.1 (WARNING: No symbols, msacm32.pdb, 335B3E15849C3F15F5C6BFF1B56377831)
  3256. 0x7ffb5a420000 - 0x7ffb5a484fff OLEACC.dll 7.2.18362.1
  3257. 0x7ffb5a490000 - 0x7ffb5a49dfff lib-export-ui.dll 0.0.0.0
  3258. 0x7ffb5ecb0000 - 0x7ffb5ecbbfff secur32.dll 10.0.18362.1
  3259. 0x7ffb5f030000 - 0x7ffb5f044fff mskeyprotect.dll 10.0.18362.1
  3260. 0x7ffb65240000 - 0x7ffb65264fff ncryptsslp.dll 10.0.18362.1
  3261. 0x7ffb65ae0000 - 0x7ffb65d86fff iertutil.dll 11.0.18362.1198
  3262. 0x7ffb68a00000 - 0x7ffb68b1afff InputHost.dll 10.0.18362.1237 (WARNING: No symbols, InputHost.pdb, F68B35317567C9BFD7429FA8EE64C67B1)
  3263. 0x7ffb68b20000 - 0x7ffb68bbdfff TextInputFramework.dll 10.0.18362.1171
  3264. 0x7ffb68bc0000 - 0x7ffb68d6efff WindowsCodecs.dll 10.0.18362.959 (WARNING: No symbols, WindowsCodecs.pdb, 570B70AB3AD272157A57BC8F3A9F6AC61)
  3265. 0x7ffb68d70000 - 0x7ffb68ec0fff Windows.UI.dll 10.0.18362.1171 (WARNING: No symbols, Windows.UI.pdb, 4649F321C93164BBA825FE8639AF32F31)
  3266. 0x7ffb69720000 - 0x7ffb69a49fff CoreUIComponents.dll 10.0.18362.1110
  3267. 0x7ffb6a1b0000 - 0x7ffb6a1b9fff AVRT.dll 10.0.18362.1
  3268. 0x7ffb6b270000 - 0x7ffb6b2e1fff MMDevAPI.DLL 10.0.18362.387
  3269. 0x7ffb6b870000 - 0x7ffb6b89ffff lib-snapping.dll 0.0.0.0
  3270. 0x7ffb6b8a0000 - 0x7ffb6b8bcfff lib-time-track.dll 0.0.0.0
  3271. 0x7ffb6bd90000 - 0x7ffb6bd96fff MSVCP140_CODECVT_IDS.dll 14.36.32532.0
  3272. 0x7ffb6be60000 - 0x7ffb6be69fff rasadhlp.dll 10.0.18362.1
  3273. 0x7ffb6c830000 - 0x7ffb6c8a6fff fwpuclnt.dll 10.0.18362.1110
  3274. 0x7ffb6ce90000 - 0x7ffb6cfe2fff wintypes.dll 10.0.18362.1237
  3275. 0x7ffb6d340000 - 0x7ffb6d34bfff VCRUNTIME140_1.dll 14.36.32532.0
  3276. 0x7ffb6db50000 - 0x7ffb6db5ffff lib-screen-geometry.dll 0.0.0.0
  3277. 0x7ffb6dc80000 - 0x7ffb6dd6ffff PROPSYS.dll 7.0.18362.815
  3278. 0x7ffb6df70000 - 0x7ffb6df9cfff WINMMBASE.dll 10.0.18362.1
  3279. 0x7ffb6dfa0000 - 0x7ffb6dfc3fff WINMM.dll 10.0.18362.1
  3280. 0x7ffb6e6b0000 - 0x7ffb6e90afff d3d11.dll 10.0.18362.1171
  3281. 0x7ffb6f0e0000 - 0x7ffb6f2bcfff dcomp.dll 10.0.18362.1237 (WARNING: No symbols, dcomp.pdb, 5AA5ED23F8F7BF6D91F488F7F19C9F291)
  3282. 0x7ffb6f310000 - 0x7ffb6f3e3fff CoreMessaging.dll 10.0.18362.1049
  3283. 0x7ffb6f620000 - 0x7ffb6f6b8fff UxTheme.dll 10.0.18362.449
  3284. 0x7ffb6f6e0000 - 0x7ffb6f941fff twinapi.appcore.dll 10.0.18362.1171 (WARNING: No symbols, twinapi.appcore.pdb, B84561313B3AA91F20E96B4B641D51941)
  3285. 0x7ffb6f950000 - 0x7ffb6f963fff resourcepolicyclient.dll 10.0.18362.959
  3286. 0x7ffb6fa50000 - 0x7ffb6fa78fff RMCLIENT.dll 10.0.18362.267
  3287. 0x7ffb6ff20000 - 0x7ffb6ff3ffff dxcore.dll 10.0.18362.1
  3288. 0x7ffb6ff40000 - 0x7ffb7002afff dxgi.dll 10.0.18362.1049
  3289. 0x7ffb70230000 - 0x7ffb70239fff VERSION.dll 10.0.18362.1
  3290. 0x7ffb704c0000 - 0x7ffb704f0fff ntmarta.dll 10.0.18362.1
  3291. 0x7ffb70730000 - 0x7ffb707b7fff schannel.DLL 10.0.18362.1082
  3292. 0x7ffb709a0000 - 0x7ffb709d9fff IPHLPAPI.DLL 10.0.18362.1
  3293. 0x7ffb709f0000 - 0x7ffb70abafff DNSAPI.dll 10.0.18362.1171
  3294. 0x7ffb70c90000 - 0x7ffb70cf6fff mswsock.dll 10.0.18362.815
  3295. 0x7ffb70e60000 - 0x7ffb70e6bfff CRYPTBASE.DLL 10.0.18362.1
  3296. 0x7ffb70f20000 - 0x7ffb70f5afff NTASN1.dll 10.0.18362.1
  3297. 0x7ffb70f60000 - 0x7ffb70f85fff ncrypt.dll 10.0.18362.1
  3298. 0x7ffb710a0000 - 0x7ffb710c9fff DEVOBJ.dll 10.0.18362.387
  3299. 0x7ffb71380000 - 0x7ffb713b6fff SspiCli.dll 10.0.18362.1049
  3300. 0x7ffb714a0000 - 0x7ffb714affff UMPDC.dll 0.0.0.0
  3301. 0x7ffb714b0000 - 0x7ffb714c0fff kernel.appcore.dll 10.0.18362.1171 (WARNING: No symbols, Kernel.Appcore.pdb, 8C6D84D1948C795F1FF8AC296A73365F1)
  3302. 0x7ffb714d0000 - 0x7ffb714f2fff profapi.dll 10.0.18362.693
  3303. 0x7ffb71500000 - 0x7ffb71511fff MSASN1.dll 10.0.18362.1
  3304. 0x7ffb71520000 - 0x7ffb71569fff powrprof.dll 10.0.18362.1
  3305. 0x7ffb715d0000 - 0x7ffb71874fff KERNELBASE.dll 10.0.18362.1237 (WARNING: No symbols, kernelbase.pdb, 96411710FE9C59DD37F94DA68AD9864F1)
  3306. 0x7ffb71880000 - 0x7ffb71896fff cryptsp.dll 10.0.18362.1
  3307. 0x7ffb718a0000 - 0x7ffb71999fff ucrtbase.dll 10.0.18362.1110 (WARNING: No symbols, ucrtbase.pdb, E2955775A9DDACFAD2742EB16FBCAA391)
  3308. 0x7ffb719a0000 - 0x7ffb71a3dfff msvcp_win.dll 10.0.18362.1110
  3309. 0x7ffb71af0000 - 0x7ffb71b39fff cfgmgr32.dll 10.0.18362.387
  3310. 0x7ffb71b40000 - 0x7ffb71cd5fff gdi32full.dll 10.0.18362.1256
  3311. 0x7ffb71ce0000 - 0x7ffb72460fff windows.storage.dll 10.0.18362.1171
  3312. 0x7ffb72470000 - 0x7ffb72490fff win32u.dll 10.0.18362.1237 (WARNING: No symbols, win32u.pdb, BC2E49ABE46D2E93B278B4DECFCA62A81)
  3313. 0x7ffb724a0000 - 0x7ffb725e8fff CRYPT32.dll 10.0.18362.592
  3314. 0x7ffb725f0000 - 0x7ffb72670fff bcryptPrimitives.dll 10.0.18362.1237
  3315. 0x7ffb72680000 - 0x7ffb726a5fff bcrypt.dll 10.0.18362.1237
  3316. 0x7ffb726d0000 - 0x7ffb7276dfff msvcrt.dll 7.0.18362.1
  3317. 0x7ffb72a60000 - 0x7ffb72b2ffff COMDLG32.dll 10.0.18362.1237
  3318. 0x7ffb72b30000 - 0x7ffb72bd8fff shcore.dll 10.0.18362.1237
  3319. 0x7ffb72c60000 - 0x7ffb72df3fff USER32.dll 10.0.18362.1256 (WARNING: No symbols, user32.pdb, C3BCEF9551728E30409F99C7BAB301611)
  3320. 0x7ffb72e00000 - 0x7ffb72f1ffff RPCRT4.dll 10.0.18362.1237 (WARNING: No symbols, rpcrt4.pdb, CBC61C669DAC619F21A16401D2AD7E651)
  3321. 0x7ffb72f30000 - 0x7ffb72f37fff NSI.dll 10.0.18362.1171
  3322. 0x7ffb72f40000 - 0x7ffb72fe1fff clbcatq.dll 2001.12.10941.16384
  3323. 0x7ffb72ff0000 - 0x7ffb7305efff WS2_32.dll 10.0.18362.387
  3324. 0x7ffb73540000 - 0x7ffb735f1fff KERNEL32.DLL 10.0.18362.1110 (WARNING: No symbols, kernel32.pdb, F0AE52559529DA200447BEC418DFE9621)
  3325. 0x7ffb73600000 - 0x7ffb73651fff shlwapi.dll 10.0.18362.1
  3326. 0x7ffb73660000 - 0x7ffb73995fff combase.dll 10.0.18362.1237
  3327. 0x7ffb739a0000 - 0x7ffb73a36fff sechost.dll 10.0.18362.1237
  3328. 0x7ffb73a40000 - 0x7ffb73b74fff MSCTF.dll 10.0.18362.1198
  3329. 0x7ffb73b80000 - 0x7ffb73cd6fff ole32.dll 10.0.18362.1082
  3330. 0x7ffb73ce0000 - 0x7ffb73d05fff GDI32.dll 10.0.18362.1256
  3331. 0x7ffb73d10000 - 0x7ffb73d3dfff IMM32.DLL 10.0.18362.387
  3332. 0x7ffb73d50000 - 0x7ffb74436fff SHELL32.dll 10.0.18362.1237
  3333. 0x7ffb74440000 - 0x7ffb74504fff OLEAUT32.dll 10.0.18362.1110
  3334. 0x7ffb74510000 - 0x7ffb745b2fff advapi32.dll 10.0.18362.752
  3335. 0x7ffb74600000 - 0x7ffb747effff ntdll.dll 10.0.18362.1171 (WARNING: No symbols, ntdll.pdb, BB6DA4D5E1B4C65C0E5B855F1E9F9C391)
  3336. 55F1E9F9C391)
  3337. 0x7ffb709a0000 - 0x7ffb709d9fff IPHLPAPI.DLL 10.0.18362.1
  3338. 0x7ffb709f0000 - 0x7ffb70abafff DNSAPI.dll 10.0.18362.1171
  3339. 0x7ffb70c90000 - 0x7ffb70cf6fff mswsock.dll 10.0.18362.815
  3340. 0x7ffb70e60000 - 0x7ffb70e6bfff CRYPTBASE.DLL 10.0.18362.1
  3341. 0x7ffb70f20000 - 0x7ffb70f5afff NTASN1.dll 10.0.18362.1
  3342. 0x7ffb70f60000 - 0x7ffb70f85fff ncrypt.dll 10.0.18362.1
  3343. 0x7ffb710a0000 - 0x7ffb710c9fff DEVOBJ.dll 10.0.18362.387
  3344. 0x7ffb71380000 - 0x7ffb713b6fff SspiCli.dll 10.0.18362.1049
  3345. 0x7ffb714a0000 - 0x7ffb714affff UMPDC.dll 0.0.0.0
  3346. 0x7ffb714b0000 - 0x7ffb714c0fff kernel.appcore.dll 10.0.18362.1171 (WARNING: No symbols, Kernel.Appcore.pdb, 8C6D84D1948C795F1FF8AC296A73365F1)
  3347. 0x7ffb714d0000 - 0x7ffb714f2fff profapi.dll 10.0.18362.693
  3348. 0x7ffb71500000 - 0x7ffb71511fff MSASN1.dll 10.0.18362.1
  3349. 0x7ffb71520000 - 0x7ffb71569fff powrprof.dll 10.0.18362.1
  3350. 0x7ffb715d0000 - 0x7ffb71874fff KERNELBASE.dll 10.0.18362.1237 (WARNING: No symbols, kernelbase.pdb, 96411710FE9C59DD37F94DA68AD9864F1)
  3351. 0x7ffb71880000 - 0x7ffb71896fff cryptsp.dll 10.0.18362.1
  3352. 0x7ffb718a0000 - 0x7ffb71999fff ucrtbase.dll 10.0.18362.1110 (WARNING: No symbols, ucrtbase.pdb, E2955775A9DDACFAD2742EB16FBCAA391)
  3353. 0x7ffb719a0000 - 0x7ffb71a3dfff msvcp_win.dll 10.0.18362.1110
  3354. 0x7ffb71af0000 - 0x7ffb71b39fff cfgmgr32.dll 10.0.18362.387
  3355. 0x7ffb71b40000 - 0x7ffb71cd5fff gdi32full.dll 10.0.18362.1256
  3356. 0x7ffb71ce0000 - 0x7ffb72460fff windows.storage.dll 10.0.18362.1171
  3357. 0x7ffb72470000 - 0x7ffb72490fff win32u.dll 10.0.18362.1237 (WARNING: No symbols, win32u.pdb, BC2E49ABE46D2E93B278B4DECFCA62A81)
  3358. 0x7ffb724a0000 - 0x7ffb725e8fff CRYPT32.dll 10.0.18362.592
  3359. 0x7ffb725f0000 - 0x7ffb72670fff bcryptPrimitives.dll 10.0.18362.1237
  3360. 0x7ffb72680000 - 0x7ffb726a5fff bcrypt.dll 10.0.18362.1237
  3361. 0x7ffb726d0000 - 0x7ffb7276dfff msvcrt.dll 7.0.18362.1
  3362. 0x7ffb72a60000 - 0x7ffb72b2ffff COMDLG32.dll 10.0.18362.1237
  3363. 0x7ffb72b30000 - 0x7ffb72bd8fff shcore.dll 10.0.18362.1237
  3364. 0x7ffb72c60000 - 0x7ffb72df3fff USER32.dll 10.0.18362.1256 (WARNING: No symbols, user32.pdb, C3BCEF9551728E30409F99C7BAB301611)
  3365. 0x7ffb72e00000 - 0x7ffb72f1ffff RPCRT4.dll 10.0.18362.1237 (WARNING: No symbols, rpcrt4.pdb, CBC61C669DAC619F21A16401D2AD7E651)
  3366. 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement