Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Operating system: Windows NT
- 10.0.18362 1256
- CPU: amd64
- family 6 model 158 stepping 10
- 12 CPUs
- GPU: UNKNOWN
- Crash reason: EXCEPTION_ACCESS_VIOLATION_READ
- Crash address: 0x0
- Process uptime: 351 seconds
- Thread 0 (crashed)
- 0 Audacity.exe + 0x2e5af7
- rax = 0x000000000014ce58 rdx = 0x0000000000000000
- rcx = 0x0000000000000000 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000000000000
- rbp = 0x000000000014ce89 rsp = 0x000000000014cdd0
- r8 = 0x0000000000000000 r9 = 0x0000000000000058
- r10 = 0x0000000000008000 r11 = 0x000000000014cd90
- r12 = 0x00000000002b2186 r13 = 0x000000000d9a4150
- r14 = 0x000000000dba29b0 r15 = 0x000000000d9a3eb0
- rip = 0x00007ff6b22c5af7
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000014cdd0 87 25 2b 00 00 00 00 00 b0 29 ba 0d 00 00 00 00 %+.....°)º.....
- 000000000014cde0 40 b0 11 0c 00 00 00 00 00 00 00 00 00 00 00 00 @°..............
- 000000000014cdf0 e0 d0 95 0a 00 00 00 00 08 85 5d 0a 00 00 00 00 àÐ...... ].....
- 000000000014ce00 e0 d0 95 0a 00 00 00 00 08 85 5d 0a 00 00 00 00 àÐ...... ].....
- 000000000014ce10 00 00 00 00 00 00 00 00 08 85 5d 0a 00 00 00 00 ......... ].....
- 000000000014ce20 86 21 2b 00 00 00 00 00 00 00 5c 00 00 00 00 00 !+.......\.....
- 000000000014ce30 a5 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ¥...............
- 000000000014ce40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000014ce50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000014ce60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000014ce70 00 00 00 00 c3 90 45 41 00 00 00 00 00 00 00 00 ....Ã.EA........
- 000000000014ce80 00 00 00 00 00 00 e0 3f 00 00 00 00 00 00 00 00 ......à?........
- 000000000014ce90 00 00 00 00 00 00 f0 3f 00 00 00 00 00 00 00 00 ......ð?........
- 000000000014cea0 00 00 00 00 00 00 00 00 40 80 00 0c 00 00 00 00 ........@.......
- 000000000014ceb0 b0 3e 9a 0d 00 00 00 00 00 00 00 00 00 00 00 00 °>.............
- 000000000014cec0 86 21 2b 00 00 00 00 00 40 30 2d 0e 00 00 00 00 !+.....@0-.....
- 000000000014ced0 40 b0 11 0c 00 00 00 00 b0 29 ba 0d 00 00 00 00 @°......°)º.....
- 000000000014cee0 f0 cf 14 00 00 00 00 00 33 6a 2c b2 f6 7f 00 00 ðÏ......3j,²ö...
- Possible instruction pointers:
- 1 Audacity.exe + 0x2e6a33
- rsp = 0x000000000014cef0 rip = 0x00007ff6b22c6a33
- Found by: stack scanning
- Stack contents:
- 000000000014cef0 87 25 2b 00 00 00 00 00 50 41 9a 0d 00 00 00 00 %+.....PA.....
- 000000000014cf00 b0 3e 9a 0d 00 00 00 00 40 db 14 00 00 00 00 00 °>.....@Û......
- 000000000014cf10 88 40 9a 0d 00 00 00 00 86 21 03 00 00 00 00 00 .@.....!......
- 000000000014cf20 00 85 8c 0d 00 00 00 00 00 00 00 00 00 00 00 00 . .............
- 000000000014cf30 01 06 08 19 fb 7f 00 00 ....û...
- Possible instruction pointers:
- 2 lib-track.dll + 0x30601
- rsp = 0x000000000014cf38 rip = 0x00007ffb19080601
- Found by: stack scanning
- Thread 1
- 0 ntdll.dll + 0x9d244
- rax = 0x000000000000005b rdx = 0x0000000004bdfce0
- rcx = 0x0000000000000001 rbx = 0x0000000000000001
- rsi = 0x0000000000000000 rdi = 0x0000000000000001
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdf928
- r8 = 0x000000000000000c r9 = 0x0000000000000001
- r10 = 0x0000000000000000 r11 = 0x0000000004bfdd40
- r12 = 0x00000000000001f4 r13 = 0x0000000004bdfce0
- r14 = 0x0000000004bdf980 r15 = 0x0000000000000000
- rip = 0x00007ffb7469d244
- Found by: given as instruction pointer in context
- Stack contents:
- 0000000004bdf928 e7 2a 62 71 fb 7f 00 00 ç*bqû...
- Possible instruction pointers:
- 1 KERNELBASE.dll + 0x52ae7
- rax = 0x000000000000005b rdx = 0x0000000004bdfce0
- rcx = 0x0000000000000001 rbx = 0x0000000000000001
- rsi = 0x0000000000000000 rdi = 0x0000000000000001
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdf930
- r8 = 0x000000000000000c r9 = 0x0000000000000001
- r10 = 0x0000000000000000 r11 = 0x0000000004bfdd40
- r12 = 0x00000000000001f4 r13 = 0x0000000004bdfce0
- r14 = 0x0000000004bdf980 r15 = 0x0000000000000000
- rip = 0x00007ffb71622ae7
- Found by: simulating a return from leaf function
- Stack contents:
- 0000000004bdf930 70 78 ed 72 fb 7f 00 00 pxírû...
- Possible instruction pointers:
- 2 RPCRT4.dll + 0xd7870
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdf938
- rip = 0x00007ffb72ed7870
- Found by: stack scanning
- Stack contents:
- 0000000004bdf938 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdf948 00 00 00 00 00 00 00 00 80 f9 bd 04 00 00 00 00 .........ù½.....
- 0000000004bdf958 a0 f9 bd 04 00 00 00 00 f0 f9 bd 04 00 00 00 00 ù½.....ðù½.....
- 0000000004bdf968 00 10 26 00 00 00 00 00 01 00 00 00 00 00 00 00 ..&.............
- 0000000004bdf978 20 00 00 00 00 00 00 00 c0 b4 b3 ff ff ff ff ff .......À´³ÿÿÿÿÿ
- 0000000004bdf988 88 f9 bd 04 00 00 00 00 48 00 00 00 00 00 00 00 .ù½.....H.......
- 0000000004bdf998 01 00 00 00 fb 7f 00 00 00 00 00 00 00 00 00 00 ....û...........
- 0000000004bdf9a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdf9b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdf9c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdf9d8 40 11 e0 04 00 00 00 00 00 00 00 00 00 00 00 00 @.à.............
- 0000000004bdf9e8 00 00 e0 04 00 00 00 00 ac 02 e0 04 00 00 00 00 ..à.....¬.à.....
- 0000000004bdf9f8 20 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 .......0.......
- 0000000004bdfa08 c0 0c e0 04 00 00 00 00 00 00 bf 04 00 00 00 00 À.à.......¿.....
- 0000000004bdfa18 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfa28 30 00 00 00 00 00 00 00 28 00 00 00 00 00 00 00 0.......(.......
- 0000000004bdfa38 08 00 00 00 00 00 00 00 00 00 bf 04 00 00 00 00 ..........¿.....
- 0000000004bdfa48 09 fb bd 04 00 00 00 00 03 00 00 00 00 00 00 00 û½.............
- 0000000004bdfa58 34 b4 63 74 fb 7f 00 00 4´ctû...
- Possible instruction pointers:
- 3 ntdll.dll + 0x3b434
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfa60
- rip = 0x00007ffb7463b434
- Found by: stack scanning
- Stack contents:
- 0000000004bdfa60 00 00 e0 04 00 00 00 00 0d 13 64 74 fb 7f 00 00 ..à.......dtû...
- Possible instruction pointers:
- 4 ntdll.dll + 0x4130d
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfa70
- rip = 0x00007ffb7464130d
- Found by: stack scanning
- Stack contents:
- 0000000004bdfa70 28 00 00 00 00 00 00 00 0d 13 64 74 fb 7f 00 00 (.........dtû...
- Possible instruction pointers:
- 5 ntdll.dll + 0x4130d
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfa80
- rip = 0x00007ffb7464130d
- Found by: stack scanning
- Stack contents:
- 0000000004bdfa80 10 00 00 00 00 00 00 00 08 00 14 00 00 00 00 00 ................
- 0000000004bdfa90 02 00 00 00 00 00 00 00 00 0e bf 04 00 00 00 00 ..........¿.....
- 0000000004bdfaa0 20 ce bf 04 00 00 00 00 00 00 00 00 0a 00 00 00 ο.............
- 0000000004bdfab0 60 ce bf 04 00 00 00 00 10 c7 bf 04 00 00 00 00 `ο......ǿ.....
- 0000000004bdfac0 00 00 00 00 00 00 00 00 d0 d9 bf 04 00 00 00 00 ........ÐÙ¿.....
- 0000000004bdfad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfae0 00 00 00 00 00 00 00 00 10 fb bd 04 00 00 00 00 .........û½.....
- 0000000004bdfaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfb10 40 c9 bf 04 00 00 00 00 e1 06 64 74 fb 7f 00 00 @É¿.....á.dtû...
- Possible instruction pointers:
- 6 ntdll.dll + 0x406e1
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb20
- rip = 0x00007ffb746406e1
- Found by: stack scanning
- Stack contents:
- 0000000004bdfb20 40 dd bf 04 00 00 00 00 00 00 bf 04 00 00 00 00 @Ý¿.......¿.....
- 0000000004bdfb30 00 cf e4 17 fb 7f 00 00 .Ïä.û...
- Possible instruction pointers:
- 7 dsound.dll + 0x5cf00
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb38
- rip = 0x00007ffb17e4cf00
- Found by: stack scanning
- Stack contents:
- 0000000004bdfb38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfb48 00 00 00 00 00 00 00 00 40 c9 bf 04 00 00 00 00 ........@É¿.....
- 0000000004bdfb58 94 c7 df 17 fb 7f 00 00 Çß.û...
- Possible instruction pointers:
- 8 dsound.dll + 0xc794
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb60
- rip = 0x00007ffb17dfc794
- Found by: stack scanning
- Stack contents:
- 0000000004bdfb60 40 c9 bf 04 00 00 00 00 00 00 00 00 00 00 00 00 @É¿.............
- 0000000004bdfb70 00 00 00 00 00 00 00 00 40 dd bf 04 00 00 00 00 ........@Ý¿.....
- 0000000004bdfb80 10 fc bd 04 00 00 00 00 f8 ca df 17 fb 7f 00 00 .ü½.....øÊß.û...
- Possible instruction pointers:
- 9 dsound.dll + 0xcaf8
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfb90
- rip = 0x00007ffb17dfcaf8
- Found by: stack scanning
- Stack contents:
- 0000000004bdfb90 00 09 bf 04 00 00 00 00 e3 af e0 17 fb 7f 00 00 . ¿.....ã¯à.û...
- Possible instruction pointers:
- 10 dsound.dll + 0x1afe3
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfba0
- rip = 0x00007ffb17e0afe3
- Found by: stack scanning
- Stack contents:
- 0000000004bdfba0 00 00 00 00 00 00 00 00 40 dd bf 04 00 00 00 00 ........@Ý¿.....
- 0000000004bdfbb0 00 09 bf 04 00 00 00 00 ad 2b 62 71 fb 7f 00 00 . ¿.....+bqû...
- Possible instruction pointers:
- 11 KERNELBASE.dll + 0x52bad
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfbc0
- rip = 0x00007ffb71622bad
- Found by: stack scanning
- Stack contents:
- 0000000004bdfbc0 10 fc bd 04 00 00 00 00 00 00 00 00 00 00 00 00 .ü½.............
- 0000000004bdfbd0 00 09 bf 04 00 00 00 00 00 00 00 00 00 00 00 00 . ¿.............
- 0000000004bdfbe0 10 fc bd 04 00 00 00 00 75 ad e0 17 fb 7f 00 00 .ü½.....uà.û...
- Possible instruction pointers:
- 12 dsound.dll + 0x1ad75
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfbf0
- rip = 0x00007ffb17e0ad75
- Found by: stack scanning
- Stack contents:
- 0000000004bdfbf0 52 cd 0b ef 97 26 00 00 00 10 26 00 00 00 00 00 RÍ.ï&....&.....
- 0000000004bdfc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfc20 f4 01 00 00 00 00 00 00 ce 29 62 71 fb 7f 00 00 ô.......Î)bqû...
- Possible instruction pointers:
- 13 KERNELBASE.dll + 0x529ce
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfc30
- rip = 0x00007ffb716229ce
- Found by: stack scanning
- Stack contents:
- 0000000004bdfc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfc40 20 09 bf 04 00 00 00 00 00 00 00 00 00 00 00 00 ¿.............
- 0000000004bdfc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004bdfc60 00 00 00 00 00 00 00 00 e1 da df 17 fb 7f 00 00 ........áÚß.û...
- Possible instruction pointers:
- 14 dsound.dll + 0xdae1
- rbp = 0x0000000004bdfd70 rsp = 0x0000000004bdfc70
- rip = 0x00007ffb17dfdae1
- Found by: stack scanning
- Thread 2
- 0 ntdll.dll + 0xa0084
- rax = 0x00000000000001cd rdx = 0x0000000002d56cc0
- rcx = 0x0000000000000014 rbx = 0x0000000002d57040
- rsi = 0x00000000005c0b50 rdi = 0x0000000002d57040
- rbp = 0x0000000000000000 rsp = 0x0000000004dffb68
- r8 = 0x0000000004dff948 r9 = 0x0000000004dff9b8
- r10 = 0x0000000004dff9e0 r11 = 0x0000000002d06da0
- r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0084
- Found by: given as instruction pointer in context
- Stack contents:
- 0000000004dffb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x33fe0
- rax = 0x00000000000001cd rdx = 0x0000000002d56cc0
- rcx = 0x0000000000000014 rbx = 0x0000000002d57040
- rsi = 0x00000000005c0b50 rdi = 0x0000000002d57040
- rbp = 0x0000000000000000 rsp = 0x0000000004dffb70
- r8 = 0x0000000004dff948 r9 = 0x0000000004dff9b8
- r10 = 0x0000000004dff9e0 r11 = 0x0000000002d06da0
- r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb74633fe0
- Found by: simulating a return from leaf function
- Thread 3
- 0 ntdll.dll + 0xa0084
- rax = 0x00000000000001cd rdx = 0x0000000002dc1b70
- rcx = 0x0000000000000014 rbx = 0x0000000002dc1ef0
- rsi = 0x00000000005c0b50 rdi = 0x0000000002dc1ef0
- rbp = 0x0000000000000000 rsp = 0x000000000506fb68
- r8 = 0x000000000506e4c8 r9 = 0x000000000506e4c0
- r10 = 0x0000000000000000 r11 = 0x000000000506e480
- r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0084
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000506fb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x33fe0
- rax = 0x00000000000001cd rdx = 0x0000000002dc1b70
- rcx = 0x0000000000000014 rbx = 0x0000000002dc1ef0
- rsi = 0x00000000005c0b50 rdi = 0x0000000002dc1ef0
- rbp = 0x0000000000000000 rsp = 0x000000000506fb70
- r8 = 0x000000000506e4c8 r9 = 0x000000000506e4c0
- r10 = 0x0000000000000000 r11 = 0x000000000506e480
- r12 = 0x0000000000000000 r13 = 0x00000000005c0d48
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb74633fe0
- Found by: simulating a return from leaf function
- Thread 4
- 0 ntdll.dll + 0x9cd74
- rax = 0x0000000000000034 rdx = 0x0000000004f6fd20
- rcx = 0x0000000000000000 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x000000000000000a
- rbp = 0x0000000000000000 rsp = 0x0000000004f6fcf8
- r8 = 0x0000000004f6fcf8 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000246
- r12 = 0x0000000000000000 r13 = 0x0000000000000001
- r14 = 0x0000000002d61ac2 r15 = 0x0000000002d61960
- rip = 0x00007ffb7469cd74
- Found by: given as instruction pointer in context
- Stack contents:
- 0000000004f6fcf8 21 fc 61 71 fb 7f 00 00 !üaqû...
- Possible instruction pointers:
- 1 KERNELBASE.dll + 0x4fc21
- rax = 0x0000000000000034 rdx = 0x0000000004f6fd20
- rcx = 0x0000000000000000 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x000000000000000a
- rbp = 0x0000000000000000 rsp = 0x0000000004f6fd00
- r8 = 0x0000000004f6fcf8 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000246
- r12 = 0x0000000000000000 r13 = 0x0000000000000001
- r14 = 0x0000000002d61ac2 r15 = 0x0000000002d61960
- rip = 0x00007ffb7161fc21
- Found by: simulating a return from leaf function
- Stack contents:
- 0000000004f6fd00 b8 fd f6 04 00 00 00 00 c0 3f 63 71 fb 7f 00 00 ¸ýö.....À?cqû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x63fc0
- rsp = 0x0000000004f6fd10 rip = 0x00007ffb71633fc0
- Found by: stack scanning
- Stack contents:
- 0000000004f6fd10 e4 a3 cc 00 c3 00 00 00 70 fd f6 04 00 00 00 00 ä£Ì.Ã...pýö.....
- 0000000004f6fd20 60 79 fe ff ff ff ff ff 80 18 d6 02 00 00 00 00 `yþÿÿÿÿÿ..Ö.....
- 0000000004f6fd30 48 00 00 00 00 00 00 00 01 00 00 00 fb 7f 00 00 H...........û...
- 0000000004f6fd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6fd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6fd60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6fd70 00 00 00 00 00 00 00 00 80 18 d6 02 00 00 00 00 ..........Ö.....
- 0000000004f6fd80 78 fe f6 04 00 00 00 00 80 18 d6 02 00 00 00 00 xþö.......Ö.....
- 0000000004f6fd90 18 fe f6 04 00 00 00 00 1c 2e 64 11 fb 7f 00 00 .þö.......d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12e1c
- rsp = 0x0000000004f6fda0 rip = 0x00007ffb11642e1c
- Found by: stack scanning
- Stack contents:
- 0000000004f6fda0 18 fe f6 04 00 00 00 00 00 00 00 00 00 00 00 00 .þö.............
- 0000000004f6fdb0 bb 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 »..À............
- 0000000004f6fdc0 e8 af 08 67 00 00 00 00 ac fd 54 15 00 00 00 00 è¯.g....¬ýT.....
- 0000000004f6fdd0 ec 2f 92 70 6c 32 00 00 82 82 32 48 fb 7f 00 00 ì/pl2..2Hû...
- Possible instruction pointers:
- 4 lib-audio-io.dll + 0x28282
- rsp = 0x0000000004f6fde0 rip = 0x00007ffb48328282
- Found by: stack scanning
- Stack contents:
- 0000000004f6fde0 80 96 98 00 00 00 00 00 f3 7c 30 48 fb 7f 00 00 .......ó|0Hû...
- Possible instruction pointers:
- 5 lib-audio-io.dll + 0x7cf3
- rsp = 0x0000000004f6fdf0 rip = 0x00007ffb48307cf3
- Found by: stack scanning
- Stack contents:
- 0000000004f6fdf0 80 96 98 00 00 00 00 00 03 00 00 00 00 00 00 00 ...............
- 0000000004f6fe00 03 00 00 00 00 00 00 00 d5 ac 31 48 fb 7f 00 00 ........Õ¬1Hû...
- Possible instruction pointers:
- 6 lib-audio-io.dll + 0x1acd5
- rsp = 0x0000000004f6fe10 rip = 0x00007ffb4831acd5
- Found by: stack scanning
- Stack contents:
- 0000000004f6fe10 54 95 98 00 00 00 00 00 e8 af 08 67 00 00 00 00 T......è¯.g....
- 0000000004f6fe20 9c 92 ed 15 00 00 00 00 e1 67 5c e4 73 f0 00 00 í.....ág\äsð..
- 0000000004f6fe30 03 00 00 00 00 00 00 00 f3 f8 30 48 fb 7f 00 00 ........óø0Hû...
- Possible instruction pointers:
- 7 lib-audio-io.dll + 0xf8f3
- rsp = 0x0000000004f6fe40 rip = 0x00007ffb4830f8f3
- Found by: stack scanning
- Stack contents:
- 0000000004f6fe40 80 03 f0 4f 2c 4c 00 00 80 18 d6 02 00 00 00 00 ..ðO,L....Ö.....
- 0000000004f6fe50 30 ff f6 04 00 00 00 00 00 00 00 00 00 00 00 00 0ÿö.............
- 0000000004f6fe60 02 00 00 00 00 00 00 00 c0 1a d6 02 00 00 00 00 ........À.Ö.....
- 0000000004f6fe70 0a 00 00 00 00 00 00 00 00 9a 88 50 2c 4c 00 00 ..........P,L..
- 0000000004f6fe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6fe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6fea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6feb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6fec0 e0 76 d5 02 00 00 00 00 8f 6c 30 48 fb 7f 00 00 àvÕ......l0Hû...
- Possible instruction pointers:
- 8 lib-audio-io.dll + 0x6c8f
- rsp = 0x0000000004f6fed0 rip = 0x00007ffb48306c8f
- Found by: stack scanning
- Stack contents:
- 0000000004f6fed0 01 00 08 00 ff ff ff ff 00 2f 4b 71 fb 7f 00 00 ....ÿÿÿÿ./Kqû...
- Possible instruction pointers:
- 9 kernel.appcore.dll + 0x2f00
- rsp = 0x0000000004f6fee0 rip = 0x00007ffb714b2f00
- Found by: stack scanning
- Stack contents:
- 0000000004f6fee0 00 9b 95 71 fb 7f 00 00 .qû...
- Possible instruction pointers:
- 10 ucrtbase.dll + 0xb9b00
- rsp = 0x0000000004f6fee8 rip = 0x00007ffb71959b00
- Found by: stack scanning
- Stack contents:
- 0000000004f6fee8 01 00 00 00 00 00 00 00 60 da d7 02 00 00 00 00 ........`Ú×.....
- 0000000004f6fef8 b2 10 8c 71 fb 7f 00 00 ².qû...
- Possible instruction pointers:
- 11 ucrtbase.dll + 0x210b2
- rsp = 0x0000000004f6ff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 0000000004f6ff00 60 da d7 02 00 00 00 00 00 00 00 00 00 00 00 00 `Ú×.............
- 0000000004f6ff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6ff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 12 KERNEL32.DLL + 0x17c24
- rsp = 0x0000000004f6ff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 0000000004f6ff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6ff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000004f6ff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 13 ntdll.dll + 0x6d4d1
- rsp = 0x0000000004f6ff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 5
- 0 win32u.dll + 0x9a84
- rax = 0x0000000000001452 rdx = 0x00000000076fff08
- rcx = 0x0000000000000001 rbx = 0x00000000076fff08
- rsi = 0x00000000035c1ef0 rdi = 0x0000000000000001
- rbp = 0x0000000000000000 rsp = 0x00000000076ffe08
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000000000000 r15 = 0x0000000000000000
- rip = 0x00007ffb72479a84
- Found by: given as instruction pointer in context
- Stack contents:
- 00000000076ffe08 bd 1c c8 72 fb 7f 00 00 ½.Èrû...
- Possible instruction pointers:
- 1 USER32.dll + 0x21cbd
- rax = 0x0000000000001452 rdx = 0x00000000076fff08
- rcx = 0x0000000000000001 rbx = 0x00000000076fff08
- rsi = 0x00000000035c1ef0 rdi = 0x0000000000000001
- rbp = 0x0000000000000000 rsp = 0x00000000076ffe10
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000000000000 r15 = 0x0000000000000000
- rip = 0x00007ffb72c81cbd
- Found by: simulating a return from leaf function
- Stack contents:
- 00000000076ffe10 ff 3d 00 00 00 00 00 00 59 94 c7 72 fb 7f 00 00 ÿ=......YÇrû...
- Possible instruction pointers:
- 2 USER32.dll + 0x19459
- rsp = 0x00000000076ffe20 rip = 0x00007ffb72c79459
- Found by: stack scanning
- Stack contents:
- 00000000076ffe20 00 00 00 00 00 00 00 00 c0 ac 1e 01 00 00 00 00 ........À¬......
- 00000000076ffe30 00 00 00 00 00 00 00 00 ff cc 33 00 ff cc 66 00 ........ÿÌ3.ÿÌf.
- 00000000076ffe40 01 00 00 00 ff cc cc 00 a3 1b c8 72 fb 7f 00 00 ....ÿÌÌ.£.Èrû...
- Possible instruction pointers:
- 3 USER32.dll + 0x21ba3
- rsp = 0x00000000076ffe50 rip = 0x00007ffb72c81ba3
- Found by: stack scanning
- Stack contents:
- 00000000076ffe50 00 00 00 00 ff ff 66 00 ff ff 99 00 ff ff cc 00 ....ÿÿf.ÿÿ..ÿÿÌ.
- 00000000076ffe60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076ffe70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076ffe80 01 00 00 00 00 00 00 00 13 37 2b 56 fb 7f 00 00 .........7+Vû...
- Possible instruction pointers:
- 4 gdiplus.dll + 0x3713
- rsp = 0x00000000076ffe90 rip = 0x00007ffb562b3713
- Found by: stack scanning
- Stack contents:
- 00000000076ffe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076ffea0 f0 1e 5c 03 00 00 00 00 f0 1e 5c 03 00 00 00 00 ð.\.....ð.\.....
- 00000000076ffeb0 ff 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ÿ...............
- 00000000076ffec0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076ffed0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076ffef0 00 00 00 00 00 00 00 00 8f 36 2b 56 fb 7f 00 00 .........6+Vû...
- Possible instruction pointers:
- 5 gdiplus.dll + 0x368f
- rsp = 0x00000000076fff00 rip = 0x00007ffb562b368f
- Found by: stack scanning
- Stack contents:
- 00000000076fff00 00 00 00 00 00 00 00 00 f8 05 00 00 00 00 00 00 ........ø.......
- 00000000076fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 6 KERNEL32.DLL + 0x17c24
- rsp = 0x00000000076fff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 00000000076fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000076fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x6d4d1
- rsp = 0x00000000076fff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 6
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000002c13f18 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000002c13ec0
- rbp = 0x0000000002c13f18 rsp = 0x0000000007ccf458
- r8 = 0x0000000007ccf3e0 r9 = 0x0000000000000000
- r10 = 0x0000000005420000 r11 = 0x0000000000000246
- r12 = 0x0000000002c13e90 r13 = 0x0000000002c13f08
- r14 = 0x0000000002c13ec8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 0000000007ccf458 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000002c13f18 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000002c13ec0
- rbp = 0x0000000002c13f18 rsp = 0x0000000007ccf460
- r8 = 0x0000000007ccf3e0 r9 = 0x0000000000000000
- r10 = 0x0000000005420000 r11 = 0x0000000000000246
- r12 = 0x0000000002c13e90 r13 = 0x0000000002c13f08
- r14 = 0x0000000002c13ec8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 0000000007ccf460 20 2f d2 03 00 00 00 00 08 00 00 00 00 00 00 00 /Ò.............
- 0000000007ccf470 00 00 01 00 00 00 00 00 00 09 d3 03 00 00 00 00 ......... Ó.....
- 0000000007ccf480 00 00 00 00 00 00 00 00 80 f4 cc 07 00 00 00 00 .........ôÌ.....
- 0000000007ccf490 00 00 00 00 00 00 00 00 38 94 08 00 00 00 00 00 ........8......
- 0000000007ccf4a0 00 00 00 00 01 00 00 00 18 3f c1 02 00 00 00 00 .........?Á.....
- 0000000007ccf4b0 58 3f c1 02 00 00 00 00 00 00 00 00 00 00 00 00 X?Á.............
- 0000000007ccf4c0 08 3f c1 02 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .?Á......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x0000000007ccf4d0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 0000000007ccf4d0 10 3f c1 02 00 00 00 00 c0 3e c1 02 00 00 00 00 .?Á.....À>Á.....
- 0000000007ccf4e0 70 f6 cc 07 00 00 00 00 69 f7 cc 07 00 00 00 00 pöÌ.....i÷Ì.....
- 0000000007ccf4f0 00 00 54 02 00 00 00 00 08 3f c1 02 00 00 00 00 ..T......?Á.....
- 0000000007ccf500 10 3f c1 02 00 00 00 00 39 29 64 11 fb 7f 00 00 .?Á.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x0000000007ccf510 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 0000000007ccf510 00 00 00 00 00 00 00 00 60 b8 d0 03 00 00 00 00 ........`¸Ð.....
- 0000000007ccf520 00 00 00 00 00 00 00 00 20 b6 5a 58 fb 7f 00 00 ........ ¶ZXû...
- Possible instruction pointers:
- 4 lib-project-file-io.dll + 0x3b620
- rsp = 0x0000000007ccf530 rip = 0x00007ffb585ab620
- Found by: stack scanning
- Stack contents:
- 0000000007ccf530 60 b8 d0 03 00 00 00 00 7a 2b 64 11 fb 7f 00 00 `¸Ð.....z+d.û...
- Possible instruction pointers:
- 5 MSVCP140.dll + 0x12b7a
- rsp = 0x0000000007ccf540 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 0000000007ccf540 5c 27 a8 73 6c 32 00 00 00 00 00 00 00 00 00 00 \'¨sl2..........
- 0000000007ccf550 58 3f c1 02 00 00 00 00 00 00 00 00 00 00 00 00 X?Á.............
- 0000000007ccf560 59 3f c1 02 00 00 00 00 b3 a6 57 58 fb 7f 00 00 Y?Á.....³¦WXû...
- Possible instruction pointers:
- 6 lib-project-file-io.dll + 0xa6b3
- rsp = 0x0000000007ccf570 rip = 0x00007ffb5857a6b3
- Found by: stack scanning
- Stack contents:
- 0000000007ccf570 c0 3e c1 02 00 00 00 00 59 3f c1 02 00 00 00 00 À>Á.....Y?Á.....
- 0000000007ccf580 59 3f c1 02 00 00 00 00 00 00 00 00 00 00 00 00 Y?Á.............
- 0000000007ccf590 00 00 00 00 00 00 00 00 d0 04 00 00 00 00 00 00 ........Ð.......
- 0000000007ccf5a0 00 09 d4 03 00 00 00 00 00 00 00 00 00 00 00 00 . Ô.............
- 0000000007ccf5b0 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
- 0000000007ccf5c0 c2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Â...............
- 0000000007ccf5d0 90 3e c1 02 00 00 00 00 be b9 63 74 fb 7f 00 00 .>Á.....¾¹ctû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x3b9be
- rsp = 0x0000000007ccf5e0 rip = 0x00007ffb7463b9be
- Found by: stack scanning
- Stack contents:
- 0000000007ccf5e0 37 00 04 00 00 00 00 00 30 9e d8 02 00 00 00 00 7.......0Ø.....
- 0000000007ccf5f0 58 3f c1 02 00 00 00 00 60 b8 d0 03 00 00 00 00 X?Á.....`¸Ð.....
- 0000000007ccf600 e0 02 00 00 00 00 00 00 90 00 00 00 00 00 00 00 à...............
- 0000000007ccf610 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
- 0000000007ccf620 01 00 00 00 00 00 00 00 00 00 18 00 00 00 00 00 ................
- 0000000007ccf630 c4 02 18 00 00 00 00 00 34 b4 63 74 fb 7f 00 00 Ä.......4´ctû...
- Possible instruction pointers:
- 8 ntdll.dll + 0x3b434
- rsp = 0x0000000007ccf640 rip = 0x00007ffb7463b434
- Found by: stack scanning
- Stack contents:
- 0000000007ccf640 90 00 00 00 00 00 00 00 c0 0c 18 00 00 00 00 00 ........À.......
- 0000000007ccf650 02 00 00 02 00 00 00 00 08 00 00 00 00 00 00 00 ................
- 0000000007ccf660 00 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 ................
- 0000000007ccf670 80 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
- 0000000007ccf680 00 00 5c 00 00 00 00 00 66 64 c5 68 fb 7f 00 00 ..\.....fdÅhû...
- Possible instruction pointers:
- 9 WindowsCodecs.dll + 0x96466
- rsp = 0x0000000007ccf690 rip = 0x00007ffb68c56466
- Found by: stack scanning
- Stack contents:
- 0000000007ccf690 09 00 00 00 00 00 00 00 34 b4 63 74 fb 7f 00 00 .......4´ctû...
- Possible instruction pointers:
- 10 ntdll.dll + 0x3b434
- rsp = 0x0000000007ccf6a0 rip = 0x00007ffb7463b434
- Found by: stack scanning
- Stack contents:
- 0000000007ccf6a0 00 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf6b0 80 00 00 00 00 00 00 00 08 00 00 00 fb 7f 00 00 ............û...
- 0000000007ccf6c0 02 00 00 00 00 00 00 00 4f 49 a4 59 fb 7f 00 00 ........OI¤Yû...
- Possible instruction pointers:
- 11 MSACM32.dll + 0x494f
- rsp = 0x0000000007ccf6d0 rip = 0x00007ffb59a4494f
- Found by: stack scanning
- Stack contents:
- 0000000007ccf6d0 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
- 0000000007ccf6e0 a9 57 b1 8f 86 36 00 00 00 00 bc 68 fb 7f 00 00 ©W±.6....¼hû...
- 0000000007ccf6f0 01 00 00 00 00 00 00 00 0f b1 c4 68 fb 7f 00 00 .........±Ähû...
- Possible instruction pointers:
- 12 WindowsCodecs.dll + 0x8b10f
- rsp = 0x0000000007ccf700 rip = 0x00007ffb68c4b10f
- Found by: stack scanning
- Stack contents:
- 0000000007ccf700 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf710 01 00 00 00 00 00 00 00 a0 07 00 00 00 00 00 00 ........ .......
- 0000000007ccf720 01 00 00 00 00 00 00 00 30 f7 cc 07 00 00 00 00 ........0÷Ì.....
- 0000000007ccf730 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf740 00 a0 28 00 00 00 00 00 9c 49 65 74 fb 7f 00 00 . (.....Ietû...
- Possible instruction pointers:
- 13 ntdll.dll + 0x5499c
- rsp = 0x0000000007ccf750 rip = 0x00007ffb7465499c
- Found by: stack scanning
- Stack contents:
- 0000000007ccf750 a0 f2 b8 03 00 00 00 00 15 00 00 00 00 00 00 00 ò¸.............
- 0000000007ccf760 00 00 00 00 00 00 00 00 d8 c1 8a 71 fb 7f 00 00 ........ØÁqû...
- Possible instruction pointers:
- 14 ucrtbase.dll + 0xc1d8
- rsp = 0x0000000007ccf770 rip = 0x00007ffb718ac1d8
- Found by: stack scanning
- Stack contents:
- 0000000007ccf770 05 00 00 00 00 00 00 00 20 be 14 6f fb 7f 00 00 ........ ¾.oû...
- Possible instruction pointers:
- 15 dcomp.dll + 0x6be20
- rsp = 0x0000000007ccf780 rip = 0x00007ffb6f14be20
- Found by: stack scanning
- Stack contents:
- 0000000007ccf780 a0 38 b3 03 00 00 00 00 d0 3b 65 74 fb 7f 00 00 8³.....Ð;etû...
- Possible instruction pointers:
- 16 ntdll.dll + 0x53bd0
- rsp = 0x0000000007ccf790 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 0000000007ccf790 00 00 00 00 00 00 00 00 90 ff 10 18 fb 7f 00 00 .........ÿ..û...
- Possible instruction pointers:
- 17 VCRUNTIME140.dll + 0xff90
- rsp = 0x0000000007ccf7a0 rip = 0x00007ffb1810ff90
- Found by: stack scanning
- Stack contents:
- 0000000007ccf7a0 00 00 00 00 00 00 00 00 fe cf 74 6f fb 7f 00 00 ........þÏtoû...
- Possible instruction pointers:
- 18 twinapi.appcore.dll + 0x6cffe
- rsp = 0x0000000007ccf7b0 rip = 0x00007ffb6f74cffe
- Found by: stack scanning
- Stack contents:
- 0000000007ccf7b0 e0 fa cc 07 00 00 00 00 00 00 4a 72 fb 7f 00 00 àúÌ.......Jrû...
- 0000000007ccf7c0 10 00 00 00 00 00 00 00 77 4e 62 74 fb 7f 00 00 ........wNbtû...
- Possible instruction pointers:
- 19 ntdll.dll + 0x24e77
- rsp = 0x0000000007ccf7d0 rip = 0x00007ffb74624e77
- Found by: stack scanning
- Stack contents:
- 0000000007ccf7d0 28 ae 8a 6f fb 7f 00 00 (®oû...
- Possible instruction pointers:
- 20 twinapi.appcore.dll + 0x1cae28
- rsp = 0x0000000007ccf7d8 rip = 0x00007ffb6f8aae28
- Found by: stack scanning
- Stack contents:
- 0000000007ccf7d8 8d c5 74 6f fb 7f 00 00 .Åtoû...
- Possible instruction pointers:
- 21 twinapi.appcore.dll + 0x6c58d
- rsp = 0x0000000007ccf7e0 rip = 0x00007ffb6f74c58d
- Found by: stack scanning
- Stack contents:
- 0000000007ccf7e0 00 00 6e 6f fb 7f 00 00 2a 50 62 74 fb 7f 00 00 ..noû...*Pbtû...
- Possible instruction pointers:
- 22 ntdll.dll + 0x2502a
- rsp = 0x0000000007ccf7f0 rip = 0x00007ffb7462502a
- Found by: stack scanning
- Stack contents:
- 0000000007ccf7f0 85 03 fe 7f 00 00 00 00 93 4f 62 74 fb 7f 00 00 .þ.....Obtû...
- Possible instruction pointers:
- 23 ntdll.dll + 0x24f93
- rsp = 0x0000000007ccf800 rip = 0x00007ffb74624f93
- Found by: stack scanning
- Stack contents:
- 0000000007ccf800 02 00 00 00 00 00 00 00 fb c7 74 6f fb 7f 00 00 ........ûÇtoû...
- Possible instruction pointers:
- 24 twinapi.appcore.dll + 0x6c7fb
- rsp = 0x0000000007ccf810 rip = 0x00007ffb6f74c7fb
- Found by: stack scanning
- Stack contents:
- 0000000007ccf810 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf820 e8 00 0e 6f fb 7f 00 00 è..oû...
- Possible instruction pointers:
- 25 dcomp.dll + 0xe8
- rsp = 0x0000000007ccf828 rip = 0x00007ffb6f0e00e8
- Found by: stack scanning
- Stack contents:
- 0000000007ccf828 84 03 fe 7f 00 00 00 00 00 a0 28 00 00 00 00 00 .þ...... (.....
- 0000000007ccf838 02 00 00 00 00 00 00 00 d0 af c4 68 fb 7f 00 00 ........ЯÄhû...
- Possible instruction pointers:
- 26 WindowsCodecs.dll + 0x8afd0
- rsp = 0x0000000007ccf848 rip = 0x00007ffb68c4afd0
- Found by: stack scanning
- Stack contents:
- 0000000007ccf848 90 2f 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 ./\.............
- 0000000007ccf858 b2 50 62 74 fb 7f 00 00 ²Pbtû...
- Possible instruction pointers:
- 27 ntdll.dll + 0x250b2
- rsp = 0x0000000007ccf860 rip = 0x00007ffb746250b2
- Found by: stack scanning
- Stack contents:
- 0000000007ccf860 00 00 00 00 00 00 00 00 2a 50 62 74 fb 7f 00 00 ........*Pbtû...
- Possible instruction pointers:
- 28 ntdll.dll + 0x2502a
- rsp = 0x0000000007ccf870 rip = 0x00007ffb7462502a
- Found by: stack scanning
- Stack contents:
- 0000000007ccf870 00 00 bc 68 fb 7f 00 00 02 00 00 00 00 00 00 00 ..¼hû...........
- 0000000007ccf880 00 00 00 00 00 00 00 00 85 03 fe 7f 00 00 00 00 ........ .þ.....
- 0000000007ccf890 15 00 00 00 00 00 00 00 8b d7 62 74 fb 7f 00 00 ........×btû...
- Possible instruction pointers:
- 29 ntdll.dll + 0x2d78b
- rsp = 0x0000000007ccf8a0 rip = 0x00007ffb7462d78b
- Found by: stack scanning
- Stack contents:
- 0000000007ccf8a0 d0 af c4 68 fb 7f 00 00 ЯÄhû...
- Possible instruction pointers:
- 30 WindowsCodecs.dll + 0x8afd0
- rsp = 0x0000000007ccf8a8 rip = 0x00007ffb68c4afd0
- Found by: stack scanning
- Stack contents:
- 0000000007ccf8a8 54 3e 67 74 fb 7f 00 00 T>gtû...
- Possible instruction pointers:
- 31 ntdll.dll + 0x73e54
- rsp = 0x0000000007ccf8b0 rip = 0x00007ffb74673e54
- Found by: stack scanning
- Stack contents:
- 0000000007ccf8b0 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
- 0000000007ccf8c0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
- 0000000007ccf8d0 d0 af c4 68 fb 7f 00 00 ЯÄhû...
- Possible instruction pointers:
- 32 WindowsCodecs.dll + 0x8afd0
- rsp = 0x0000000007ccf8d8 rip = 0x00007ffb68c4afd0
- Found by: stack scanning
- Stack contents:
- 0000000007ccf8d8 e2 2e 62 74 fb 7f 00 00 â.btû...
- Possible instruction pointers:
- 33 ntdll.dll + 0x22ee2
- rsp = 0x0000000007ccf8e0 rip = 0x00007ffb74622ee2
- Found by: stack scanning
- Stack contents:
- 0000000007ccf8e0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
- 0000000007ccf8f0 00 10 26 00 00 00 00 00 d0 af c4 68 fb 7f 00 00 ..&.....ЯÄhû...
- Possible instruction pointers:
- 34 WindowsCodecs.dll + 0x8afd0
- rsp = 0x0000000007ccf900 rip = 0x00007ffb68c4afd0
- Found by: stack scanning
- Stack contents:
- 0000000007ccf900 c0 6d b6 03 00 00 00 00 d0 af c4 68 fb 7f 00 00 Àm¶.....ЯÄhû...
- Possible instruction pointers:
- 35 WindowsCodecs.dll + 0x8afd0
- rsp = 0x0000000007ccf910 rip = 0x00007ffb68c4afd0
- Found by: stack scanning
- Stack contents:
- 0000000007ccf910 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H...............
- 0000000007ccf920 00 00 00 00 00 00 00 00 b8 83 60 00 00 00 00 00 ........¸`.....
- 0000000007ccf930 60 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff `.......ÿÿÿÿÿÿÿÿ
- 0000000007ccf940 47 7c 9f ff ff ff ff ff 1a 2e 62 74 fb 7f 00 00 G|ÿÿÿÿÿ..btû...
- Possible instruction pointers:
- 36 ntdll.dll + 0x22e1a
- rsp = 0x0000000007ccf950 rip = 0x00007ffb74622e1a
- Found by: stack scanning
- Stack contents:
- 0000000007ccf950 4d 2e 62 74 fb 7f 00 00 M.btû...
- Possible instruction pointers:
- 37 ntdll.dll + 0x22e4d
- rsp = 0x0000000007ccf958 rip = 0x00007ffb74622e4d
- Found by: stack scanning
- Stack contents:
- 0000000007ccf958 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00 ........H.......
- 0000000007ccf968 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf978 00 00 00 00 00 00 00 00 70 00 00 00 00 00 00 00 ........p.......
- 0000000007ccf988 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
- 0000000007ccf998 aa 2e 62 74 fb 7f 00 00 ª.btû...
- Possible instruction pointers:
- 38 ntdll.dll + 0x22eaa
- rsp = 0x0000000007ccf9a0 rip = 0x00007ffb74622eaa
- Found by: stack scanning
- Stack contents:
- 0000000007ccf9a0 ca 2e 62 74 fb 7f 00 00 Ê.btû...
- Possible instruction pointers:
- 39 ntdll.dll + 0x22eca
- rsp = 0x0000000007ccf9a8 rip = 0x00007ffb74622eca
- Found by: stack scanning
- Stack contents:
- 0000000007ccf9a8 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
- 0000000007ccf9b8 12 1f 67 74 fb 7f 00 00 ..gtû...
- Possible instruction pointers:
- 40 ntdll.dll + 0x71f12
- rsp = 0x0000000007ccf9c0 rip = 0x00007ffb74671f12
- Found by: stack scanning
- Stack contents:
- 0000000007ccf9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf9d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccf9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfa40 e0 fa cc 07 00 00 00 00 00 00 00 00 00 00 00 00 àúÌ.............
- 0000000007ccfa50 00 00 60 74 fb 7f 00 00 53 1e 67 74 fb 7f 00 00 ..`tû...S.gtû...
- Possible instruction pointers:
- 41 ntdll.dll + 0x71e53
- rsp = 0x0000000007ccfa60 rip = 0x00007ffb74671e53
- Found by: stack scanning
- Stack contents:
- 0000000007ccfa60 00 00 00 00 00 00 00 00 00 00 60 74 fb 7f 00 00 ..........`tû...
- 0000000007ccfa70 00 00 00 00 00 00 00 00 00 a0 28 00 00 00 00 00 ......... (.....
- 0000000007ccfa80 00 00 00 00 00 00 00 00 08 1e 67 74 fb 7f 00 00 ..........gtû...
- Possible instruction pointers:
- 42 ntdll.dll + 0x71e08
- rsp = 0x0000000007ccfa90 rip = 0x00007ffb74671e08
- Found by: stack scanning
- Stack contents:
- 0000000007ccfa90 e0 fa cc 07 00 00 00 00 00 00 00 00 00 00 00 00 àúÌ.............
- 0000000007ccfaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfb10 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3.......
- 0000000007ccfb20 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+.............
- 0000000007ccfb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfb60 70 10 8c 71 fb 7f 00 00 p.qû...
- Possible instruction pointers:
- 43 ucrtbase.dll + 0x21070
- rsp = 0x0000000007ccfb68 rip = 0x00007ffb718c1070
- Found by: stack scanning
- Stack contents:
- 0000000007ccfb68 20 a4 bc 03 00 00 00 00 00 00 00 00 00 00 00 00 ¤¼.............
- 0000000007ccfb78 d8 ff cc 07 00 00 00 00 00 00 00 00 00 00 00 00 ØÿÌ.............
- 0000000007ccfb88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfb98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfba8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfbb8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfbc8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 0000000007ccfbd8 b0 d4 66 74 fb 7f 00 00 °Ôftû...
- Possible instruction pointers:
- 44 ntdll.dll + 0x6d4b0
- rsp = 0x0000000007ccfbe0 rip = 0x00007ffb7466d4b0
- Found by: stack scanning
- Thread 7
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000083cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000003 r11 = 0x0000000003c90e50
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 00000000083cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000083cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000003 r11 = 0x0000000003c90e50
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 00000000083cfd30 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
- 00000000083cfd40 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
- 00000000083cfd50 50 fd 7c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý|.....Pý......
- 00000000083cfd60 00 00 00 00 00 00 00 00 74 94 08 00 00 00 00 00 ........t......
- 00000000083cfd70 c0 59 5a 0a 01 00 00 00 b0 17 b6 03 00 00 00 00 ÀYZ.....°.¶.....
- 00000000083cfd80 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
- 00000000083cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x00000000083cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 00000000083cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 00000000083cfdb0 00 00 00 00 00 00 00 00 60 fe 3c 08 00 00 00 00 ........`þ<.....
- 00000000083cfdc0 0f 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 00000000083cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x00000000083cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 00000000083cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cfdf0 20 0d d2 03 00 00 00 00 07 49 13 15 fb 7f 00 00 .Ò......I..û...
- Possible instruction pointers:
- 4 lib-network-manager.dll + 0x14907
- rsp = 0x00000000083cfe00 rip = 0x00007ffb15134907
- Found by: stack scanning
- Stack contents:
- 00000000083cfe00 20 ab 60 02 00 00 00 00 7a 2b 64 11 fb 7f 00 00 «`.....z+d.û...
- Possible instruction pointers:
- 5 MSVCP140.dll + 0x12b7a
- rsp = 0x00000000083cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 00000000083cfe10 ac 2f 58 7c 6c 32 00 00 60 fe 3c 08 00 00 00 00 ¬/X|l2..`þ<.....
- 00000000083cfe20 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
- 00000000083cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 6 lib-network-manager.dll + 0x141bf
- rsp = 0x00000000083cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 00000000083cfe40 60 17 b6 03 00 00 00 00 60 12 c0 02 00 00 00 00 `.¶.....`.À.....
- 00000000083cfe50 a0 17 b6 03 00 00 00 00 60 12 c0 02 00 00 00 00 .¶.....`.À.....
- 00000000083cfe60 80 36 14 15 fb 7f 00 00 .6..û...
- Possible instruction pointers:
- 7 lib-network-manager.dll + 0x23680
- rsp = 0x00000000083cfe68 rip = 0x00007ffb15143680
- Found by: stack scanning
- Stack contents:
- 00000000083cfe68 30 ab 60 02 00 00 00 00 20 ab 60 02 00 00 00 00 0«`..... «`.....
- 00000000083cfe78 d0 3b 65 74 fb 7f 00 00 Ð;etû...
- Possible instruction pointers:
- 8 ntdll.dll + 0x53bd0
- rsp = 0x00000000083cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 00000000083cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cfea0 9d ca 6c 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Êl&..........
- 00000000083cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 9 lib-network-manager.dll + 0x128be
- rsp = 0x00000000083cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 00000000083cfed0 00 00 00 00 00 00 00 00 20 0d d2 03 00 00 00 00 ........ .Ò.....
- 00000000083cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cfef0 a0 1c d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 .×.....².qû...
- Possible instruction pointers:
- 10 ucrtbase.dll + 0x210b2
- rsp = 0x00000000083cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 00000000083cff00 00 00 00 00 00 00 00 00 a0 1c d7 02 00 00 00 00 ........ .×.....
- 00000000083cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 11 KERNEL32.DLL + 0x17c24
- rsp = 0x00000000083cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 00000000083cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000083cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 12 ntdll.dll + 0x6d4d1
- rsp = 0x00000000083cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 8
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000085ffd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 00000000085ffd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000085ffd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 00000000085ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffd50 50 fd 6c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pýl.....Pý......
- 00000000085ffd60 50 fd 2c 0b 00 00 00 00 88 94 08 00 00 00 00 00 Pý,............
- 00000000085ffd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 00000000085ffd80 00 00 00 00 00 00 00 00 e0 0e d2 03 00 00 00 00 ........à.Ò.....
- 00000000085ffd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x00000000085ffda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 00000000085ffda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 00000000085ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 00000000085ffdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x00000000085ffde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 00000000085ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x00000000085ffe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 00000000085ffe10 ac 2f 3b 7c 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/;|l2..........
- 00000000085ffe20 00 00 00 00 00 00 00 00 e0 0e d2 03 00 00 00 00 ........à.Ò.....
- 00000000085ffe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x00000000085ffe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 00000000085ffe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 00000000085ffe50 e0 0e d2 03 00 00 00 00 00 00 00 00 00 00 00 00 à.Ò.............
- 00000000085ffe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x00000000085ffe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 00000000085ffe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x00000000085ffe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 00000000085ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffea0 9d ca 0f 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê.&..........
- 00000000085ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x00000000085ffed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 00000000085ffed0 00 00 00 00 00 00 00 00 e0 0e d2 03 00 00 00 00 ........à.Ò.....
- 00000000085ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085ffef0 70 16 d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 p.×.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x00000000085fff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 00000000085fff00 00 00 00 00 00 00 00 00 70 16 d7 02 00 00 00 00 ........p.×.....
- 00000000085fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x00000000085fff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 00000000085fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000085fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x00000000085fff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 9
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000086ffd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 00000000086ffd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000086ffd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 00000000086ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffd50 50 fd 2c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý,.....Pý......
- 00000000086ffd60 50 fd 4c 0b 00 00 00 00 60 94 08 00 00 00 00 00 PýL.....`......
- 00000000086ffd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 00000000086ffd80 00 00 00 00 00 00 00 00 a0 0e d2 03 00 00 00 00 ........ .Ò.....
- 00000000086ffd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x00000000086ffda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 00000000086ffda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 00000000086ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 00000000086ffdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x00000000086ffde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 00000000086ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x00000000086ffe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 00000000086ffe10 ac 2f 0b 7c 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/.|l2..........
- 00000000086ffe20 00 00 00 00 00 00 00 00 a0 0e d2 03 00 00 00 00 ........ .Ò.....
- 00000000086ffe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x00000000086ffe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 00000000086ffe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 00000000086ffe50 a0 0e d2 03 00 00 00 00 00 00 00 00 00 00 00 00 .Ò.............
- 00000000086ffe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x00000000086ffe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 00000000086ffe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x00000000086ffe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 00000000086ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffea0 9d ca 3f 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê?&..........
- 00000000086ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x00000000086ffed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 00000000086ffed0 00 00 00 00 00 00 00 00 a0 0e d2 03 00 00 00 00 ........ .Ò.....
- 00000000086ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086ffef0 80 1e d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 ..×.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x00000000086fff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 00000000086fff00 00 00 00 00 00 00 00 00 80 1e d7 02 00 00 00 00 ..........×.....
- 00000000086fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x00000000086fff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 00000000086fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000086fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x00000000086fff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 10
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000087ffd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 00000000087ffd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x00000000087ffd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 00000000087ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffd50 50 fd 3c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý<.....Pý......
- 00000000087ffd60 50 fd 6c 0b 00 00 00 00 e4 94 08 00 00 00 00 00 Pýl.....ä......
- 00000000087ffd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 00000000087ffd80 00 00 00 00 00 00 00 00 90 0f d2 03 00 00 00 00 ..........Ò.....
- 00000000087ffd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x00000000087ffda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 00000000087ffda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 00000000087ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 00000000087ffdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x00000000087ffde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 00000000087ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x00000000087ffe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 00000000087ffe10 ac 2f 1b 7c 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/.|l2..........
- 00000000087ffe20 00 00 00 00 00 00 00 00 90 0f d2 03 00 00 00 00 ..........Ò.....
- 00000000087ffe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x00000000087ffe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 00000000087ffe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 00000000087ffe50 90 0f d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ..Ò.............
- 00000000087ffe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x00000000087ffe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 00000000087ffe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x00000000087ffe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 00000000087ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffea0 9d ca 2f 9e 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê/&..........
- 00000000087ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x00000000087ffed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 00000000087ffed0 00 00 00 00 00 00 00 00 90 0f d2 03 00 00 00 00 ..........Ò.....
- 00000000087ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087ffef0 60 17 d7 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 `.×.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x00000000087fff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 00000000087fff00 00 00 00 00 00 00 00 00 60 17 d7 02 00 00 00 00 ........`.×.....
- 00000000087fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087fff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x00000000087fff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 00000000087fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 00000000087fff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x00000000087fff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 11
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b0cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b0cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b0cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b0cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfd50 50 fd 5c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý\.....Pý......
- 000000000b0cfd60 50 fd 7c 0b 00 00 00 00 7c 94 08 00 00 00 00 00 Pý|.....|......
- 000000000b0cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b0cfd80 00 00 00 00 00 00 00 00 d0 0d d2 03 00 00 00 00 ........Ð.Ò.....
- 000000000b0cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b0cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b0cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b0cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b0cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b0cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b0cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b0cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b0cfe10 ac 2f 68 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/h.l2..........
- 000000000b0cfe20 00 00 00 00 00 00 00 00 d0 0d d2 03 00 00 00 00 ........Ð.Ò.....
- 000000000b0cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b0cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b0cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b0cfe50 d0 0d d2 03 00 00 00 00 00 00 00 00 00 00 00 00 Ð.Ò.............
- 000000000b0cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b0cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b0cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b0cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b0cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfea0 9d ca 5c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê\.&..........
- 000000000b0cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b0cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b0cfed0 00 00 00 00 00 00 00 00 d0 0d d2 03 00 00 00 00 ........Ð.Ò.....
- 000000000b0cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cfef0 40 fd b0 03 00 00 00 00 b2 10 8c 71 fb 7f 00 00 @ý°.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b0cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b0cff00 00 00 00 00 00 00 00 00 40 fd b0 03 00 00 00 00 ........@ý°.....
- 000000000b0cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b0cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b0cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b0cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b0cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 12
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b1cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b1cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b1cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b1cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfd50 00 00 00 00 00 00 00 00 50 fd 3c 08 00 00 00 00 ........Pý<.....
- 000000000b1cfd60 50 fd 3c 0b 00 00 00 00 a4 94 08 00 00 00 00 00 Pý<.....¤......
- 000000000b1cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b1cfd80 00 00 00 00 00 00 00 00 f0 0e d2 03 00 00 00 00 ........ð.Ò.....
- 000000000b1cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b1cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b1cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b1cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b1cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b1cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b1cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b1cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b1cfe10 ac 2f 78 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/x.l2..........
- 000000000b1cfe20 00 00 00 00 00 00 00 00 f0 0e d2 03 00 00 00 00 ........ð.Ò.....
- 000000000b1cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b1cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b1cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b1cfe50 f0 0e d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ð.Ò.............
- 000000000b1cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b1cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b1cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b1cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b1cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfea0 9d ca 4c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .ÊL.&..........
- 000000000b1cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b1cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b1cfed0 00 00 00 00 00 00 00 00 f0 0e d2 03 00 00 00 00 ........ð.Ò.....
- 000000000b1cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cfef0 d0 a9 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 Щ`.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b1cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b1cff00 00 00 00 00 00 00 00 00 d0 a9 60 02 00 00 00 00 ........Щ`.....
- 000000000b1cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b1cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b1cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b1cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b1cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 13
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b2cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b2cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b2cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b2cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfd50 50 fd 5f 08 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý_.....Pý......
- 000000000b2cfd60 50 fd 6f 08 00 00 00 00 50 94 08 00 00 00 00 00 Pýo.....P......
- 000000000b2cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b2cfd80 00 00 00 00 00 00 00 00 20 0f d2 03 00 00 00 00 ........ .Ò.....
- 000000000b2cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b2cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b2cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b2cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b2cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b2cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b2cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b2cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b2cfe10 ac 2f 48 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/H.l2..........
- 000000000b2cfe20 00 00 00 00 00 00 00 00 20 0f d2 03 00 00 00 00 ........ .Ò.....
- 000000000b2cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b2cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b2cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b2cfe50 20 0f d2 03 00 00 00 00 00 00 00 00 00 00 00 00 .Ò.............
- 000000000b2cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b2cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b2cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b2cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b2cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfea0 9d ca 7c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê|.&..........
- 000000000b2cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b2cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b2cfed0 00 00 00 00 00 00 00 00 20 0f d2 03 00 00 00 00 ........ .Ò.....
- 000000000b2cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cfef0 30 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 0ª`.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b2cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b2cff00 00 00 00 00 00 00 00 00 30 aa 60 02 00 00 00 00 ........0ª`.....
- 000000000b2cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b2cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b2cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b2cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b2cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 14
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b3cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b3cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b3cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b3cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfd50 50 fd 1c 0b 00 00 00 00 50 fd 3c 08 00 00 00 00 Pý......Pý<.....
- 000000000b3cfd60 50 fd 7f 08 00 00 00 00 38 95 08 00 00 00 00 00 Pý......8......
- 000000000b3cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b3cfd80 00 00 00 00 00 00 00 00 10 06 d2 03 00 00 00 00 ..........Ò.....
- 000000000b3cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b3cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b3cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b3cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b3cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b3cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b3cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b3cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b3cfe10 ac 2f 58 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/X.l2..........
- 000000000b3cfe20 00 00 00 00 00 00 00 00 10 06 d2 03 00 00 00 00 ..........Ò.....
- 000000000b3cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b3cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b3cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b3cfe50 10 06 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ..Ò.............
- 000000000b3cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b3cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b3cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b3cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b3cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfea0 9d ca 6c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Êl.&..........
- 000000000b3cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b3cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b3cfed0 00 00 00 00 00 00 00 00 10 06 d2 03 00 00 00 00 ..........Ò.....
- 000000000b3cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cfef0 90 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 .ª`.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b3cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b3cff00 00 00 00 00 00 00 00 00 90 aa 60 02 00 00 00 00 .........ª`.....
- 000000000b3cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b3cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b3cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b3cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b3cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 15
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b4cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b4cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b4cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b4cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfd50 50 fd 6f 08 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pýo.....Pý......
- 000000000b4cfd60 50 fd 5c 0b 00 00 00 00 6c 94 08 00 00 00 00 00 Pý\.....l......
- 000000000b4cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b4cfd80 00 00 00 00 00 00 00 00 e0 06 d2 03 00 00 00 00 ........à.Ò.....
- 000000000b4cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b4cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b4cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b4cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b4cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b4cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b4cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b4cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b4cfe10 ac 2f 28 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/(.l2..........
- 000000000b4cfe20 00 00 00 00 00 00 00 00 e0 06 d2 03 00 00 00 00 ........à.Ò.....
- 000000000b4cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b4cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b4cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b4cfe50 e0 06 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 à.Ò.............
- 000000000b4cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b4cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b4cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b4cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b4cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfea0 9d ca 1c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê..&..........
- 000000000b4cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b4cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b4cfed0 00 00 00 00 00 00 00 00 e0 06 d2 03 00 00 00 00 ........à.Ò.....
- 000000000b4cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cfef0 00 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 .ª`.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b4cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b4cff00 00 00 00 00 00 00 00 00 00 aa 60 02 00 00 00 00 .........ª`.....
- 000000000b4cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b4cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b4cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b4cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b4cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 16
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b5cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b5cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b5cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b5cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfd50 50 fd 4c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 PýL.....Pý......
- 000000000b5cfd60 50 fd 0c 0b 00 00 00 00 54 94 08 00 00 00 00 00 Pý......T......
- 000000000b5cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b5cfd80 00 00 00 00 00 00 00 00 f0 06 d2 03 00 00 00 00 ........ð.Ò.....
- 000000000b5cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b5cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b5cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b5cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b5cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b5cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b5cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b5cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b5cfe10 ac 2f 38 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/8.l2..........
- 000000000b5cfe20 00 00 00 00 00 00 00 00 f0 06 d2 03 00 00 00 00 ........ð.Ò.....
- 000000000b5cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b5cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b5cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b5cfe50 f0 06 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 ð.Ò.............
- 000000000b5cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b5cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b5cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b5cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b5cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfea0 9d ca 0c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê..&..........
- 000000000b5cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b5cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b5cfed0 00 00 00 00 00 00 00 00 f0 06 d2 03 00 00 00 00 ........ð.Ò.....
- 000000000b5cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cfef0 c0 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 Àª`.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b5cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b5cff00 00 00 00 00 00 00 00 00 c0 aa 60 02 00 00 00 00 ........˻`.....
- 000000000b5cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b5cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b5cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b5cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b5cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 17
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b6cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b6cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b6cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b6cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfd50 50 fd 7f 08 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý......Pý......
- 000000000b6cfd60 50 fd 5f 08 00 00 00 00 5c 94 08 00 00 00 00 00 Pý_.....\......
- 000000000b6cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b6cfd80 00 00 00 00 00 00 00 00 30 05 d2 03 00 00 00 00 ........0.Ò.....
- 000000000b6cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b6cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b6cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b6cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b6cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b6cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b6cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b6cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b6cfe10 ac 2f 08 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/..l2..........
- 000000000b6cfe20 00 00 00 00 00 00 00 00 30 05 d2 03 00 00 00 00 ........0.Ò.....
- 000000000b6cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b6cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b6cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b6cfe50 30 05 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 0.Ò.............
- 000000000b6cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b6cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b6cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b6cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b6cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfea0 9d ca 3c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê<.&..........
- 000000000b6cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b6cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b6cfed0 00 00 00 00 00 00 00 00 30 05 d2 03 00 00 00 00 ........0.Ò.....
- 000000000b6cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cfef0 60 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 `ª`.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b6cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b6cff00 00 00 00 00 00 00 00 00 60 aa 60 02 00 00 00 00 ........`ª`.....
- 000000000b6cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b6cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b6cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b6cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b6cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 18
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b7cfd28
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b7cfd28 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000003b617b0 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000003b617f0
- rbp = 0x0000000003b617b0 rsp = 0x000000000b7cfd30
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x0000000000000000
- r14 = 0x0000000003b617f8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b7cfd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfd50 50 fd 0c 0b 00 00 00 00 50 fd 1c 0b 00 00 00 00 Pý......Pý......
- 000000000b7cfd60 50 fd 3c 08 00 00 00 00 78 94 08 00 00 00 00 00 Pý<.....x......
- 000000000b7cfd70 00 00 00 00 01 00 00 00 b0 17 b6 03 00 00 00 00 ........°.¶.....
- 000000000b7cfd80 00 00 00 00 00 00 00 00 40 07 d2 03 00 00 00 00 ........@.Ò.....
- 000000000b7cfd90 a0 17 b6 03 00 00 00 00 8d ec 5f 71 fb 7f 00 00 .¶......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b7cfda0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b7cfda0 a8 17 b6 03 00 00 00 00 f0 17 b6 03 00 00 00 00 ¨.¶.....ð.¶.....
- 000000000b7cfdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfdc0 00 00 00 00 00 00 00 00 a0 17 b6 03 00 00 00 00 ........ .¶.....
- 000000000b7cfdd0 a8 17 b6 03 00 00 00 00 39 29 64 11 fb 7f 00 00 ¨.¶.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b7cfde0 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b7cfde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfe00 00 00 00 00 00 00 00 00 7a 2b 64 11 fb 7f 00 00 ........z+d.û...
- Possible instruction pointers:
- 4 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b7cfe10 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b7cfe10 ac 2f 18 7f 6c 32 00 00 00 00 00 00 00 00 00 00 ¬/..l2..........
- 000000000b7cfe20 00 00 00 00 00 00 00 00 40 07 d2 03 00 00 00 00 ........@.Ò.....
- 000000000b7cfe30 a0 17 b6 03 00 00 00 00 bf 41 13 15 fb 7f 00 00 .¶.....¿A..û...
- Possible instruction pointers:
- 5 lib-network-manager.dll + 0x141bf
- rsp = 0x000000000b7cfe40 rip = 0x00007ffb151341bf
- Found by: stack scanning
- Stack contents:
- 000000000b7cfe40 60 17 b6 03 00 00 00 00 00 00 00 00 00 00 00 00 `.¶.............
- 000000000b7cfe50 40 07 d2 03 00 00 00 00 00 00 00 00 00 00 00 00 @.Ò.............
- 000000000b7cfe60 00 00 00 00 00 00 00 00 cb b1 5f 71 fb 7f 00 00 ........˱_qû...
- Possible instruction pointers:
- 6 KERNELBASE.dll + 0x2b1cb
- rsp = 0x000000000b7cfe70 rip = 0x00007ffb715fb1cb
- Found by: stack scanning
- Stack contents:
- 000000000b7cfe70 00 00 00 00 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ........Ð;etû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x53bd0
- rsp = 0x000000000b7cfe80 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b7cfe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfea0 9d ca 2c 9d 26 9b 00 00 00 00 00 00 00 00 00 00 .Ê,.&..........
- 000000000b7cfeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfec0 00 00 00 00 00 00 00 00 be 28 13 15 fb 7f 00 00 ........¾(..û...
- Possible instruction pointers:
- 8 lib-network-manager.dll + 0x128be
- rsp = 0x000000000b7cfed0 rip = 0x00007ffb151328be
- Found by: stack scanning
- Stack contents:
- 000000000b7cfed0 00 00 00 00 00 00 00 00 40 07 d2 03 00 00 00 00 ........@.Ò.....
- 000000000b7cfee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cfef0 f0 aa 60 02 00 00 00 00 b2 10 8c 71 fb 7f 00 00 ðª`.....².qû...
- Possible instruction pointers:
- 9 ucrtbase.dll + 0x210b2
- rsp = 0x000000000b7cff00 rip = 0x00007ffb718c10b2
- Found by: stack scanning
- Stack contents:
- 000000000b7cff00 00 00 00 00 00 00 00 00 f0 aa 60 02 00 00 00 00 ........ðª`.....
- 000000000b7cff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cff20 00 00 00 00 00 00 00 00 24 7c 55 73 fb 7f 00 00 ........$|Usû...
- Possible instruction pointers:
- 10 KERNEL32.DLL + 0x17c24
- rsp = 0x000000000b7cff30 rip = 0x00007ffb73557c24
- Found by: stack scanning
- Stack contents:
- 000000000b7cff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b7cff50 00 00 00 00 00 00 00 00 d1 d4 66 74 fb 7f 00 00 ........ÑÔftû...
- Possible instruction pointers:
- 11 ntdll.dll + 0x6d4d1
- rsp = 0x000000000b7cff60 rip = 0x00007ffb7466d4d1
- Found by: stack scanning
- Thread 19
- 0 ntdll.dll + 0xa0084
- rax = 0x00000000000001cd rdx = 0x000000000a4e8180
- rcx = 0x0000000000000260 rbx = 0x000000000a4e8500
- rsi = 0x00000000025e2b80 rdi = 0x000000000a4e8500
- rbp = 0x0000000000000000 rsp = 0x000000000badfb68
- r8 = 0x000000000dcdae60 r9 = 0x000000000000a9db
- r10 = 0x0000000000002010 r11 = 0x000000000badf801
- r12 = 0x0000000000000000 r13 = 0x00000000026514f8
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0084
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000badfb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x33fe0
- rax = 0x00000000000001cd rdx = 0x000000000a4e8180
- rcx = 0x0000000000000260 rbx = 0x000000000a4e8500
- rsi = 0x00000000025e2b80 rdi = 0x000000000a4e8500
- rbp = 0x0000000000000000 rsp = 0x000000000badfb70
- r8 = 0x000000000dcdae60 r9 = 0x000000000000a9db
- r10 = 0x0000000000002010 r11 = 0x000000000badf801
- r12 = 0x0000000000000000 r13 = 0x00000000026514f8
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb74633fe0
- Found by: simulating a return from leaf function
- Thread 20
- 0 ntdll.dll + 0xa0024
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000002c14a08 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000002c149b0
- rbp = 0x0000000002c14a08 rsp = 0x000000000b9cf458
- r8 = 0x0000000000000000 r9 = 0x0000000002c14a08
- r10 = 0x0000000000000000 r11 = 0x0000000000000246
- r12 = 0x0000000002c14980 r13 = 0x0000000002c149f8
- r14 = 0x0000000002c149b8 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0024
- Found by: given as instruction pointer in context
- Stack contents:
- 000000000b9cf458 10 0c 66 74 fb 7f 00 00 ..ftû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x60c10
- rax = 0x00000000000001ca rdx = 0x0000000000000000
- rcx = 0x0000000002c14a08 rbx = 0x0000000000000000
- rsi = 0x0000000000000000 rdi = 0x0000000002c149b0
- rbp = 0x0000000002c14a08 rsp = 0x000000000b9cf460
- r8 = 0x0000000000000000 r9 = 0x0000000002c14a08
- r10 = 0x0000000000000000 r11 = 0x0000000000000246
- r12 = 0x0000000002c14980 r13 = 0x0000000002c149f8
- r14 = 0x0000000002c149b8 r15 = 0x0000000000000000
- rip = 0x00007ffb74660c10
- Found by: simulating a return from leaf function
- Stack contents:
- 000000000b9cf460 10 a0 8e 0a 00 00 00 00 08 00 00 00 00 00 00 00 . .............
- 000000000b9cf470 00 00 01 00 00 00 00 00 b0 8b 6e 0a 00 00 00 00 ........°n.....
- 000000000b9cf480 00 00 00 00 00 00 00 00 80 f4 9c 0b 00 00 00 00 .........ô.....
- 000000000b9cf490 00 00 00 00 00 00 00 00 88 99 08 00 00 00 00 00 ................
- 000000000b9cf4a0 00 00 00 00 01 00 00 00 08 4a c1 02 00 00 00 00 .........JÁ.....
- 000000000b9cf4b0 48 4a c1 02 00 00 00 00 00 00 00 00 00 00 00 00 HJÁ.............
- 000000000b9cf4c0 f8 49 c1 02 00 00 00 00 8d ec 5f 71 fb 7f 00 00 øIÁ......ì_qû...
- Possible instruction pointers:
- 2 KERNELBASE.dll + 0x2ec8d
- rsp = 0x000000000b9cf4d0 rip = 0x00007ffb715fec8d
- Found by: stack scanning
- Stack contents:
- 000000000b9cf4d0 00 4a c1 02 00 00 00 00 b0 49 c1 02 00 00 00 00 .JÁ.....°IÁ.....
- 000000000b9cf4e0 70 f6 9c 0b 00 00 00 00 60 00 00 00 00 00 00 00 pö.....`.......
- 000000000b9cf4f0 00 04 00 00 00 00 00 00 f8 49 c1 02 00 00 00 00 ........øIÁ.....
- 000000000b9cf500 00 4a c1 02 00 00 00 00 39 29 64 11 fb 7f 00 00 .JÁ.....9)d.û...
- Possible instruction pointers:
- 3 MSVCP140.dll + 0x12939
- rsp = 0x000000000b9cf510 rip = 0x00007ffb11642939
- Found by: stack scanning
- Stack contents:
- 000000000b9cf510 00 00 00 00 00 00 00 00 10 ed 5f 0a 00 00 00 00 .........í_.....
- 000000000b9cf520 00 00 00 00 00 00 00 00 20 b6 5a 58 fb 7f 00 00 ........ ¶ZXû...
- Possible instruction pointers:
- 4 lib-project-file-io.dll + 0x3b620
- rsp = 0x000000000b9cf530 rip = 0x00007ffb585ab620
- Found by: stack scanning
- Stack contents:
- 000000000b9cf530 10 ed 5f 0a 00 00 00 00 7a 2b 64 11 fb 7f 00 00 .í_.....z+d.û...
- Possible instruction pointers:
- 5 MSVCP140.dll + 0x12b7a
- rsp = 0x000000000b9cf540 rip = 0x00007ffb11642b7a
- Found by: stack scanning
- Stack contents:
- 000000000b9cf540 5c 27 f8 7f 6c 32 00 00 00 00 00 00 00 00 00 00 \'ø.l2..........
- 000000000b9cf550 48 4a c1 02 00 00 00 00 00 00 00 00 00 00 00 00 HJÁ.............
- 000000000b9cf560 49 4a c1 02 00 00 00 00 b3 a6 57 58 fb 7f 00 00 IJÁ.....³¦WXû...
- Possible instruction pointers:
- 6 lib-project-file-io.dll + 0xa6b3
- rsp = 0x000000000b9cf570 rip = 0x00007ffb5857a6b3
- Found by: stack scanning
- Stack contents:
- 000000000b9cf570 b0 49 c1 02 00 00 00 00 49 4a c1 02 00 00 00 00 °IÁ.....IJÁ.....
- 000000000b9cf580 49 4a c1 02 00 00 00 00 00 00 00 00 00 00 00 00 IJÁ.............
- 000000000b9cf590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf5a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf5b0 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
- 000000000b9cf5c0 00 78 18 00 00 00 00 00 00 00 00 00 00 00 00 00 .x..............
- 000000000b9cf5d0 80 49 c1 02 00 00 00 00 be b9 63 74 fb 7f 00 00 .IÁ.....¾¹ctû...
- Possible instruction pointers:
- 7 ntdll.dll + 0x3b9be
- rsp = 0x000000000b9cf5e0 rip = 0x00007ffb7463b9be
- Found by: stack scanning
- Stack contents:
- 000000000b9cf5e0 26 00 06 00 00 00 00 00 10 01 96 0a 00 00 00 00 &..............
- 000000000b9cf5f0 48 4a c1 02 00 00 00 00 10 ed 5f 0a 00 00 00 00 HJÁ......í_.....
- 000000000b9cf600 04 00 05 00 00 00 00 00 e0 02 00 00 00 00 00 00 ........à.......
- 000000000b9cf610 00 00 00 00 00 00 00 00 00 33 18 00 00 00 00 00 .........3......
- 000000000b9cf620 00 00 5c 00 00 00 00 00 00 00 18 00 00 00 00 00 ..\.............
- 000000000b9cf630 c4 02 18 00 00 00 00 00 c0 12 55 02 00 00 00 00 Ä.......À.U.....
- 000000000b9cf640 90 00 00 00 00 00 00 00 c0 0c 18 00 00 00 00 00 ........À.......
- 000000000b9cf650 58 03 55 02 00 00 00 00 08 00 00 00 00 00 00 00 X.U.............
- 000000000b9cf660 00 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 ................
- 000000000b9cf670 80 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
- 000000000b9cf680 00 00 5c 00 00 00 00 00 66 64 c5 68 fb 7f 00 00 ..\.....fdÅhû...
- Possible instruction pointers:
- 8 WindowsCodecs.dll + 0x96466
- rsp = 0x000000000b9cf690 rip = 0x00007ffb68c56466
- Found by: stack scanning
- Stack contents:
- 000000000b9cf690 09 00 00 00 00 00 00 00 34 b4 63 74 fb 7f 00 00 .......4´ctû...
- Possible instruction pointers:
- 9 ntdll.dll + 0x3b434
- rsp = 0x000000000b9cf6a0 rip = 0x00007ffb7463b434
- Found by: stack scanning
- Stack contents:
- 000000000b9cf6a0 00 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf6b0 80 00 00 00 00 00 00 00 08 00 00 00 fb 7f 00 00 ............û...
- 000000000b9cf6c0 02 00 00 00 00 00 00 00 4f 49 a4 59 fb 7f 00 00 ........OI¤Yû...
- Possible instruction pointers:
- 10 MSACM32.dll + 0x494f
- rsp = 0x000000000b9cf6d0 rip = 0x00007ffb59a4494f
- Found by: stack scanning
- Stack contents:
- 000000000b9cf6d0 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
- 000000000b9cf6e0 00 00 00 00 00 00 00 00 00 00 d7 68 fb 7f 00 00 ..........×hû...
- 000000000b9cf6f0 02 00 00 00 00 00 00 00 df f4 d9 68 fb 7f 00 00 ........ßôÙhû...
- Possible instruction pointers:
- 11 Windows.UI.dll + 0x2f4df
- rsp = 0x000000000b9cf700 rip = 0x00007ffb68d9f4df
- Found by: stack scanning
- Stack contents:
- 000000000b9cf700 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf710 01 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................
- 000000000b9cf720 01 00 00 00 00 00 00 00 d0 b2 8a 71 fb 7f 00 00 ........вqû...
- Possible instruction pointers:
- 12 ucrtbase.dll + 0xb2d0
- rsp = 0x000000000b9cf730 rip = 0x00007ffb718ab2d0
- Found by: stack scanning
- Stack contents:
- 000000000b9cf730 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf740 00 c0 2c 00 00 00 00 00 9c 49 65 74 fb 7f 00 00 .À,.....Ietû...
- Possible instruction pointers:
- 13 ntdll.dll + 0x5499c
- rsp = 0x000000000b9cf750 rip = 0x00007ffb7465499c
- Found by: stack scanning
- Stack contents:
- 000000000b9cf750 60 88 95 0a 00 00 00 00 15 00 00 00 00 00 00 00 `..............
- 000000000b9cf760 00 00 00 00 00 00 00 00 d8 c1 8a 71 fb 7f 00 00 ........ØÁqû...
- Possible instruction pointers:
- 14 ucrtbase.dll + 0xc1d8
- rsp = 0x000000000b9cf770 rip = 0x00007ffb718ac1d8
- Found by: stack scanning
- Stack contents:
- 000000000b9cf770 05 00 00 00 00 00 00 00 20 be 14 6f fb 7f 00 00 ........ ¾.oû...
- Possible instruction pointers:
- 15 dcomp.dll + 0x6be20
- rsp = 0x000000000b9cf780 rip = 0x00007ffb6f14be20
- Found by: stack scanning
- Stack contents:
- 000000000b9cf780 f0 bb 6c 0a 00 00 00 00 d0 3b 65 74 fb 7f 00 00 ð»l.....Ð;etû...
- Possible instruction pointers:
- 16 ntdll.dll + 0x53bd0
- rsp = 0x000000000b9cf790 rip = 0x00007ffb74653bd0
- Found by: stack scanning
- Stack contents:
- 000000000b9cf790 00 00 00 00 00 00 00 00 90 ff 10 18 fb 7f 00 00 .........ÿ..û...
- Possible instruction pointers:
- 17 VCRUNTIME140.dll + 0xff90
- rsp = 0x000000000b9cf7a0 rip = 0x00007ffb1810ff90
- Found by: stack scanning
- Stack contents:
- 000000000b9cf7a0 00 00 a0 68 fb 7f 00 00 4e ac ab 68 fb 7f 00 00 .. hû...N¬«hû...
- Possible instruction pointers:
- 18 InputHost.dll + 0xbac4e
- rsp = 0x000000000b9cf7b0 rip = 0x00007ffb68abac4e
- Found by: stack scanning
- Stack contents:
- 000000000b9cf7b0 08 72 ad 68 fb 7f 00 00 .rhû...
- Possible instruction pointers:
- 19 InputHost.dll + 0xd7208
- rsp = 0x000000000b9cf7b8 rip = 0x00007ffb68ad7208
- Found by: stack scanning
- Stack contents:
- 000000000b9cf7b8 02 00 00 00 00 00 00 00 84 03 fe 7f 00 00 00 00 .........þ.....
- 000000000b9cf7c8 77 4e 62 74 fb 7f 00 00 wNbtû...
- Possible instruction pointers:
- 20 ntdll.dll + 0x24e77
- rsp = 0x000000000b9cf7d0 rip = 0x00007ffb74624e77
- Found by: stack scanning
- Stack contents:
- 000000000b9cf7d0 10 72 ad 68 fb 7f 00 00 .rhû...
- Possible instruction pointers:
- 21 InputHost.dll + 0xd7210
- rsp = 0x000000000b9cf7d8 rip = 0x00007ffb68ad7210
- Found by: stack scanning
- Stack contents:
- 000000000b9cf7d8 4d a6 ab 68 fb 7f 00 00 M¦«hû...
- Possible instruction pointers:
- 22 InputHost.dll + 0xba64d
- rsp = 0x000000000b9cf7e0 rip = 0x00007ffb68aba64d
- Found by: stack scanning
- Stack contents:
- 000000000b9cf7e0 00 00 a0 68 fb 7f 00 00 2a 50 62 74 fb 7f 00 00 .. hû...*Pbtû...
- Possible instruction pointers:
- 23 ntdll.dll + 0x2502a
- rsp = 0x000000000b9cf7f0 rip = 0x00007ffb7462502a
- Found by: stack scanning
- Stack contents:
- 000000000b9cf7f0 85 03 fe 7f 00 00 00 00 93 4f 62 74 fb 7f 00 00 .þ.....Obtû...
- Possible instruction pointers:
- 24 ntdll.dll + 0x24f93
- rsp = 0x000000000b9cf800 rip = 0x00007ffb74624f93
- Found by: stack scanning
- Stack contents:
- 000000000b9cf800 02 00 00 00 00 00 00 00 bb a8 ab 68 fb 7f 00 00 ........»¨«hû...
- Possible instruction pointers:
- 25 InputHost.dll + 0xba8bb
- rsp = 0x000000000b9cf810 rip = 0x00007ffb68aba8bb
- Found by: stack scanning
- Stack contents:
- 000000000b9cf810 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf820 e8 00 0e 6f fb 7f 00 00 è..oû...
- Possible instruction pointers:
- 26 dcomp.dll + 0xe8
- rsp = 0x000000000b9cf828 rip = 0x00007ffb6f0e00e8
- Found by: stack scanning
- Stack contents:
- 000000000b9cf828 84 03 fe 7f 00 00 00 00 00 c0 2c 00 00 00 00 00 .þ......À,.....
- 000000000b9cf838 02 00 00 00 00 00 00 00 70 a9 ab 68 fb 7f 00 00 ........p©«hû...
- Possible instruction pointers:
- 27 InputHost.dll + 0xba970
- rsp = 0x000000000b9cf848 rip = 0x00007ffb68aba970
- Found by: stack scanning
- Stack contents:
- 000000000b9cf848 90 2f 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 ./\.............
- 000000000b9cf858 b2 50 62 74 fb 7f 00 00 ²Pbtû...
- Possible instruction pointers:
- 28 ntdll.dll + 0x250b2
- rsp = 0x000000000b9cf860 rip = 0x00007ffb746250b2
- Found by: stack scanning
- Stack contents:
- 000000000b9cf860 00 00 00 00 00 00 00 00 2a 50 62 74 fb 7f 00 00 ........*Pbtû...
- Possible instruction pointers:
- 29 ntdll.dll + 0x2502a
- rsp = 0x000000000b9cf870 rip = 0x00007ffb7462502a
- Found by: stack scanning
- Stack contents:
- 000000000b9cf870 00 00 a0 68 fb 7f 00 00 02 00 00 00 00 00 00 00 .. hû...........
- 000000000b9cf880 00 00 00 00 00 00 00 00 85 03 fe 7f 00 00 00 00 ........ .þ.....
- 000000000b9cf890 15 00 00 00 00 00 00 00 8b d7 62 74 fb 7f 00 00 ........×btû...
- Possible instruction pointers:
- 30 ntdll.dll + 0x2d78b
- rsp = 0x000000000b9cf8a0 rip = 0x00007ffb7462d78b
- Found by: stack scanning
- Stack contents:
- 000000000b9cf8a0 70 a9 ab 68 fb 7f 00 00 p©«hû...
- Possible instruction pointers:
- 31 InputHost.dll + 0xba970
- rsp = 0x000000000b9cf8a8 rip = 0x00007ffb68aba970
- Found by: stack scanning
- Stack contents:
- 000000000b9cf8a8 54 3e 67 74 fb 7f 00 00 T>gtû...
- Possible instruction pointers:
- 32 ntdll.dll + 0x73e54
- rsp = 0x000000000b9cf8b0 rip = 0x00007ffb74673e54
- Found by: stack scanning
- Stack contents:
- 000000000b9cf8b0 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
- 000000000b9cf8c0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
- 000000000b9cf8d0 70 a9 ab 68 fb 7f 00 00 p©«hû...
- Possible instruction pointers:
- 33 InputHost.dll + 0xba970
- rsp = 0x000000000b9cf8d8 rip = 0x00007ffb68aba970
- Found by: stack scanning
- Stack contents:
- 000000000b9cf8d8 e2 2e 62 74 fb 7f 00 00 â.btû...
- Possible instruction pointers:
- 34 ntdll.dll + 0x22ee2
- rsp = 0x000000000b9cf8e0 rip = 0x00007ffb74622ee2
- Found by: stack scanning
- Stack contents:
- 000000000b9cf8e0 90 2f 5c 00 00 00 00 00 00 10 26 00 00 00 00 00 ./\.......&.....
- 000000000b9cf8f0 00 10 26 00 00 00 00 00 70 a9 ab 68 fb 7f 00 00 ..&.....p©«hû...
- Possible instruction pointers:
- 35 InputHost.dll + 0xba970
- rsp = 0x000000000b9cf900 rip = 0x00007ffb68aba970
- Found by: stack scanning
- Stack contents:
- 000000000b9cf900 d0 71 63 00 00 00 00 00 70 a9 ab 68 fb 7f 00 00 Ðqc.....p©«hû...
- Possible instruction pointers:
- 36 InputHost.dll + 0xba970
- rsp = 0x000000000b9cf910 rip = 0x00007ffb68aba970
- Found by: stack scanning
- Stack contents:
- 000000000b9cf910 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H...............
- 000000000b9cf920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf930 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff p.......ÿÿÿÿÿÿÿÿ
- 000000000b9cf940 ff ff ff ff ff ff ff ff 1a 2e 62 74 fb 7f 00 00 ÿÿÿÿÿÿÿÿ..btû...
- Possible instruction pointers:
- 37 ntdll.dll + 0x22e1a
- rsp = 0x000000000b9cf950 rip = 0x00007ffb74622e1a
- Found by: stack scanning
- Stack contents:
- 000000000b9cf950 4d 2e 62 74 fb 7f 00 00 M.btû...
- Possible instruction pointers:
- 38 ntdll.dll + 0x22e4d
- rsp = 0x000000000b9cf958 rip = 0x00007ffb74622e4d
- Found by: stack scanning
- Stack contents:
- 000000000b9cf958 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00 ........H.......
- 000000000b9cf968 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf978 00 00 00 00 00 00 00 00 70 00 00 00 00 00 00 00 ........p.......
- 000000000b9cf988 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
- 000000000b9cf998 aa 2e 62 74 fb 7f 00 00 ª.btû...
- Possible instruction pointers:
- 39 ntdll.dll + 0x22eaa
- rsp = 0x000000000b9cf9a0 rip = 0x00007ffb74622eaa
- Found by: stack scanning
- Stack contents:
- 000000000b9cf9a0 ca 2e 62 74 fb 7f 00 00 Ê.btû...
- Possible instruction pointers:
- 40 ntdll.dll + 0x22eca
- rsp = 0x000000000b9cf9a8 rip = 0x00007ffb74622eca
- Found by: stack scanning
- Stack contents:
- 000000000b9cf9a8 00 00 00 00 00 00 00 00 00 10 26 00 00 00 00 00 ..........&.....
- 000000000b9cf9b8 12 1f 67 74 fb 7f 00 00 ..gtû...
- Possible instruction pointers:
- 41 ntdll.dll + 0x71f12
- rsp = 0x000000000b9cf9c0 rip = 0x00007ffb74671f12
- Found by: stack scanning
- Stack contents:
- 000000000b9cf9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf9d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cf9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfa40 e0 fa 9c 0b 00 00 00 00 00 00 00 00 00 00 00 00 àú.............
- 000000000b9cfa50 00 00 60 74 fb 7f 00 00 53 1e 67 74 fb 7f 00 00 ..`tû...S.gtû...
- Possible instruction pointers:
- 42 ntdll.dll + 0x71e53
- rsp = 0x000000000b9cfa60 rip = 0x00007ffb74671e53
- Found by: stack scanning
- Stack contents:
- 000000000b9cfa60 00 00 00 00 00 00 00 00 00 00 60 74 fb 7f 00 00 ..........`tû...
- 000000000b9cfa70 00 00 00 00 00 00 00 00 00 c0 2c 00 00 00 00 00 .........À,.....
- 000000000b9cfa80 00 00 00 00 00 00 00 00 08 1e 67 74 fb 7f 00 00 ..........gtû...
- Possible instruction pointers:
- 43 ntdll.dll + 0x71e08
- rsp = 0x000000000b9cfa90 rip = 0x00007ffb74671e08
- Found by: stack scanning
- Stack contents:
- 000000000b9cfa90 e0 fa 9c 0b 00 00 00 00 00 00 00 00 00 00 00 00 àú.............
- 000000000b9cfaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfb10 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3.......
- 000000000b9cfb20 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+.............
- 000000000b9cfb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfb60 70 10 8c 71 fb 7f 00 00 p.qû...
- Possible instruction pointers:
- 44 ucrtbase.dll + 0x21070
- rsp = 0x000000000b9cfb68 rip = 0x00007ffb718c1070
- Found by: stack scanning
- Stack contents:
- 000000000b9cfb68 b0 8f 6d 0a 00 00 00 00 00 00 00 00 00 00 00 00 °.m.............
- 000000000b9cfb78 d8 ff 9c 0b 00 00 00 00 00 00 00 00 00 00 00 00 Øÿ.............
- 000000000b9cfb88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfb98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfba8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfbb8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfbc8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
- 000000000b9cfbd8 b0 d4 66 74 fb 7f 00 00 °Ôftû...
- Possible instruction pointers:
- 45 ntdll.dll + 0x6d4b0
- rsp = 0x000000000b9cfbe0 rip = 0x00007ffb7466d4b0
- Found by: stack scanning
- Thread 21
- 0 ntdll.dll + 0xa0084
- rax = 0x00000000000001cd rdx = 0x0000000002d57840
- rcx = 0x0000000000000260 rbx = 0x0000000002d57bc0
- rsi = 0x00000000025e2b80 rdi = 0x0000000002d57bc0
- rbp = 0x0000000000000000 rsp = 0x00000000052cfb68
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x00000000026514f8
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb746a0084
- Found by: given as instruction pointer in context
- Stack contents:
- 00000000052cfb68 e0 3f 63 74 fb 7f 00 00 à?ctû...
- Possible instruction pointers:
- 1 ntdll.dll + 0x33fe0
- rax = 0x00000000000001cd rdx = 0x0000000002d57840
- rcx = 0x0000000000000260 rbx = 0x0000000002d57bc0
- rsi = 0x00000000025e2b80 rdi = 0x0000000002d57bc0
- rbp = 0x0000000000000000 rsp = 0x00000000052cfb70
- r8 = 0x0000000000000000 r9 = 0x0000000000000000
- r10 = 0x0000000000000000 r11 = 0x0000000000000000
- r12 = 0x0000000000000000 r13 = 0x00000000026514f8
- r14 = 0x0000000000000001 r15 = 0x0000000000000000
- rip = 0x00007ffb74633fe0
- Found by: simulating a return from leaf function
- Loaded modules:
- 0x7ff6b1fe0000 - 0x7ff6b2da4fff Audacity.exe 3.4.2.0 (main) (WARNING: No symbols, Audacity.pdb, 03D07AE88FE54D35BB529B57190F6CD71)
- 0x7ffb10ab0000 - 0x7ffb10aecfff wavpackdll.dll 5.6.0.0
- 0x7ffb10af0000 - 0x7ffb10b18fff mod-wavpack.dll 0.0.0.0
- 0x7ffb10b20000 - 0x7ffb10b57fff mod-pcm.dll 0.0.0.0
- 0x7ffb10b60000 - 0x7ffb10b97fff mod-opus.dll 0.0.0.0
- 0x7ffb10ba0000 - 0x7ffb10bb5fff vorbisfile.dll 0.0.0.0
- 0x7ffb10bc0000 - 0x7ffb10bdffff mod-ogg.dll 0.0.0.0
- 0x7ffb10be0000 - 0x7ffb10c48fff mpg123.dll 0.0.0.0
- 0x7ffb10c50000 - 0x7ffb10c69fff mod-mpg123.dll 0.0.0.0
- 0x7ffb10c70000 - 0x7ffb10d18fff libmp3lame.DLL 0.0.0.0
- 0x7ffb10d20000 - 0x7ffb10d71fff mod-mp3.dll 0.0.0.0
- 0x7ffb10d80000 - 0x7ffb10ddbfff mod-mp2.dll 0.0.0.0
- 0x7ffb10de0000 - 0x7ffb10df9fff mod-lof.dll 0.0.0.0
- 0x7ffb10e00000 - 0x7ffb10e28fff FLAC++.dll 0.0.0.0
- 0x7ffb10e30000 - 0x7ffb10e64fff mod-flac.dll 0.0.0.0
- 0x7ffb10e70000 - 0x7ffb10ecafff lib-ffmpeg-support.dll 0.0.0.0
- 0x7ffb10ed0000 - 0x7ffb10f40fff mod-ffmpeg.dll 0.0.0.0
- 0x7ffb10f50000 - 0x7ffb10f81fff mod-cl.dll 0.0.0.0
- 0x7ffb10f90000 - 0x7ffb10fc6fff mod-aup.dll 0.0.0.0
- 0x7ffb10fd0000 - 0x7ffb11092fff jpeg8.dll 8.2.2.0
- 0x7ffb110a0000 - 0x7ffb11124fff opus.dll 0.0.0.0
- 0x7ffb11130000 - 0x7ffb11143fff ogg.dll 0.0.0.0
- 0x7ffb11150000 - 0x7ffb111aefff FLAC.dll 0.0.0.0
- 0x7ffb111b0000 - 0x7ffb1124efff libcurl.dll 7.82.0.0
- 0x7ffb11250000 - 0x7ffb11339fff vorbis.dll 0.0.0.0
- 0x7ffb11340000 - 0x7ffb113eefff vorbisenc.dll 0.0.0.0
- 0x7ffb113f0000 - 0x7ffb11400fff lib-uuid.dll 0.0.0.0
- 0x7ffb11410000 - 0x7ffb11432fff zlib1.dll 1.2.13.0
- 0x7ffb11440000 - 0x7ffb1145efff wxbase313u_xml_vc_x64_custom.dll 3.1.3.0
- 0x7ffb11460000 - 0x7ffb11496fff libexpat.dll 2.5.0.0
- 0x7ffb114a0000 - 0x7ffb114b4fff lib-ipc.dll 0.0.0.0
- 0x7ffb114c0000 - 0x7ffb11504fff libpng16.dll 0.0.0.0
- 0x7ffb11510000 - 0x7ffb11531fff lib-project.dll 0.0.0.0
- 0x7ffb11540000 - 0x7ffb1157afff portaudio_x64.dll 0.0.0.0
- 0x7ffb11580000 - 0x7ffb1162dfff sndfile.dll 1.0.31.0
- 0x7ffb11630000 - 0x7ffb116bdfff MSVCP140.dll 14.36.32532.0 (WARNING: No symbols, msvcp140.amd64.pdb, E5D1EEDADA9A5DC5A36FAAB872E21A871)
- 0x7ffb116c0000 - 0x7ffb116fcfff lib-sentry-reporting.dll 0.0.0.0
- 0x7ffb11700000 - 0x7ffb11a89fff wxbase313u_vc_x64_custom.dll 3.1.3.0
- 0x7ffb11a90000 - 0x7ffb11ab6fff lib-strings.dll 0.0.0.0
- 0x7ffb11ac0000 - 0x7ffb11af4fff lib-preferences.dll 0.0.0.0
- 0x7ffb11b00000 - 0x7ffb11b99fff lib-math.dll 0.0.0.0
- 0x7ffb11ba0000 - 0x7ffb11c43fff lib-wave-track.dll 0.0.0.0
- 0x7ffb11c50000 - 0x7ffb126eefff wxmsw313u_core_vc_x64_custom.dll 3.1.3.0
- 0x7ffb12bf0000 - 0x7ffb12c1afff lib-files.dll 0.0.0.0
- 0x7ffb12c20000 - 0x7ffb12e61fff lib-theme-resources.dll 0.0.0.0
- 0x7ffb13130000 - 0x7ffb13152fff lib-string-utils.dll 0.0.0.0
- 0x7ffb14d60000 - 0x7ffb14d73fff lib-audio-graph.dll 0.0.0.0
- 0x7ffb15120000 - 0x7ffb1515afff lib-network-manager.dll 0.0.0.0 (WARNING: No symbols, lib-network-manager.pdb, 5872B7A963A8428DB52332AA2722993A1)
- 0x7ffb15df0000 - 0x7ffb15e46fff lib-module-manager.dll 0.0.0.0
- 0x7ffb17800000 - 0x7ffb1782dfff lib-xml.dll 0.0.0.0
- 0x7ffb17830000 - 0x7ffb178e9fff wxmsw313u_html_vc_x64_custom.dll 3.1.3.0
- 0x7ffb178f0000 - 0x7ffb179d6fff wxmsw313u_aui_vc_x64_custom.dll 3.1.3.0
- 0x7ffb17ab0000 - 0x7ffb17ae9fff lib-realtime-effects.dll 0.0.0.0
- 0x7ffb17cd0000 - 0x7ffb17d13fff wdmaud.drv 10.0.18362.1
- 0x7ffb17df0000 - 0x7ffb17e88fff dsound.dll 10.0.18362.1 (WARNING: No symbols, dsound.pdb, D7FF4FA83A419091673D2843AF11A8421)
- 0x7ffb17ee0000 - 0x7ffb17f04fff lib-registries.dll 0.0.0.0
- 0x7ffb18030000 - 0x7ffb18043fff portmidi.dll 0.0.0.0
- 0x7ffb18100000 - 0x7ffb1811afff VCRUNTIME140.dll 14.36.32532.0 (WARNING: No symbols, vcruntime140.amd64.pdb, 38DD49151CC8F884F457AEB14C69A0F01)
- 0x7ffb18380000 - 0x7ffb183c7fff lib-numeric-formats.dll 0.0.0.0
- 0x7ffb18a20000 - 0x7ffb18a59fff lib-audio-devices.dll 0.0.0.0
- 0x7ffb18f90000 - 0x7ffb18faffff lib-components.dll 0.0.0.0
- 0x7ffb19050000 - 0x7ffb190a0fff lib-track.dll 0.0.0.0 (WARNING: No symbols, lib-track.pdb, EEF554FE6B7F4F25B09E3E1B1AD28A7B1)
- 0x7ffb19380000 - 0x7ffb19394fff lib-transactions.dll 0.0.0.0
- 0x7ffb19410000 - 0x7ffb19425fff lib-exceptions.dll 0.0.0.0
- 0x7ffb2ae30000 - 0x7ffb2ae50fff lib-project-history.dll 0.0.0.0
- 0x7ffb2f890000 - 0x7ffb2f8acfff lib-utility.dll 0.0.0.0
- 0x7ffb2f8b0000 - 0x7ffb2f8d6fff lib-time-frequency-selection.dll 0.0.0.0
- 0x7ffb2f960000 - 0x7ffb2f9d7fff lib-wx-wrappers.dll 0.0.0.0
- 0x7ffb2f9e0000 - 0x7ffb2fa51fff lib-theme.dll 0.0.0.0
- 0x7ffb2ff50000 - 0x7ffb2ff64fff lib-basic-ui.dll 0.0.0.0
- 0x7ffb32470000 - 0x7ffb32488fff lib-channel.dll 0.0.0.0
- 0x7ffb34b30000 - 0x7ffb34b59fff lib-track-selection.dll 0.0.0.0
- 0x7ffb34b60000 - 0x7ffb34b92fff lib-mixer.dll 0.0.0.0
- 0x7ffb36ab0000 - 0x7ffb36accfff lib-project-rate.dll 0.0.0.0
- 0x7ffb36b60000 - 0x7ffb36b75fff lib-command-parameters.dll 0.0.0.0
- 0x7ffb36b80000 - 0x7ffb36b99fff lib-playable-track.dll 0.0.0.0
- 0x7ffb42580000 - 0x7ffb425b9fff dataexchange.dll 10.0.18362.836
- 0x7ffb47020000 - 0x7ffb4717cfff AUDIOSES.DLL 10.0.18362.1256
- 0x7ffb471b0000 - 0x7ffb471f9fff lib-effects.dll 0.0.0.0
- 0x7ffb47200000 - 0x7ffb47263fff lib-shuttlegui.dll 0.0.0.0
- 0x7ffb47270000 - 0x7ffb472c3fff lib-crashpad-configurer.dll 0.0.0.0
- 0x7ffb472d0000 - 0x7ffb47358fff lib-vst3.dll 0.0.0.0
- 0x7ffb47400000 - 0x7ffb4742efff lib-time-and-pitch.dll 0.0.0.0
- 0x7ffb47580000 - 0x7ffb47593fff lib-sample-track.dll 0.0.0.0
- 0x7ffb475a0000 - 0x7ffb47620fff lib-lv2.dll 0.0.0.0
- 0x7ffb47730000 - 0x7ffb4776ffff wxmsw313u_qa_vc_x64_custom.dll 3.1.3.0
- 0x7ffb47a80000 - 0x7ffb47ac5fff lib-cloud-audiocom.dll 0.0.0.0
- 0x7ffb47ad0000 - 0x7ffb47b2afff lib-import-export.dll 0.0.0.0
- 0x7ffb47d80000 - 0x7ffb47d9bfff lib-stretching-sequence.dll 0.0.0.0
- 0x7ffb482c0000 - 0x7ffb482fffff lib-vst.dll 0.0.0.0
- 0x7ffb48300000 - 0x7ffb4834ffff lib-audio-io.dll 0.0.0.0 (WARNING: No symbols, lib-audio-io.pdb, 94392AC466F7471594D5C17C639835931)
- 0x7ffb48350000 - 0x7ffb483c9fff lib-wx-init.dll 0.0.0.0
- 0x7ffb49f60000 - 0x7ffb49f7efff lib-tags.dll 0.0.0.0
- 0x7ffb4c570000 - 0x7ffb4c589fff lib-url-schemes.dll 0.0.0.0
- 0x7ffb4d1a0000 - 0x7ffb4d1c6fff lib-ladspa.dll 0.0.0.0
- 0x7ffb4d520000 - 0x7ffb4d536fff lib-graphics.dll 0.0.0.0
- 0x7ffb55390000 - 0x7ffb553a2fff lib-file-formats.dll 0.0.0.0
- 0x7ffb55d40000 - 0x7ffb55d49fff midimap.dll 10.0.18362.1
- 0x7ffb55d50000 - 0x7ffb55d5cfff msacm32.drv 10.0.18362.1
- 0x7ffb55d60000 - 0x7ffb55d68fff ksuser.dll 10.0.18362.1
- 0x7ffb562b0000 - 0x7ffb56452fff gdiplus.dll 10.0.18362.1256 (WARNING: No symbols, gdiplus.pdb, 8BACB1F11B77CFC0CF9757B401DCC1101)
- 0x7ffb579b0000 - 0x7ffb57c33fff COMCTL32.dll 6.10.18362.1256
- 0x7ffb58570000 - 0x7ffb586aefff lib-project-file-io.dll 0.0.0.0 (WARNING: No symbols, lib-project-file-io.pdb, 5309DAD6EBE743A28B26C4522F8479FD1)
- 0x7ffb58eb0000 - 0x7ffb58eb6fff MSIMG32.dll 10.0.18362.1082
- 0x7ffb58ec0000 - 0x7ffb58ec8fff WSOCK32.dll 10.0.18362.1
- 0x7ffb58fa0000 - 0x7ffb59028fff WINSPOOL.DRV 10.0.18362.693
- 0x7ffb59a40000 - 0x7ffb59a5bfff MSACM32.dll 10.0.18362.1 (WARNING: No symbols, msacm32.pdb, 335B3E15849C3F15F5C6BFF1B56377831)
- 0x7ffb5a420000 - 0x7ffb5a484fff OLEACC.dll 7.2.18362.1
- 0x7ffb5a490000 - 0x7ffb5a49dfff lib-export-ui.dll 0.0.0.0
- 0x7ffb5ecb0000 - 0x7ffb5ecbbfff secur32.dll 10.0.18362.1
- 0x7ffb5f030000 - 0x7ffb5f044fff mskeyprotect.dll 10.0.18362.1
- 0x7ffb65240000 - 0x7ffb65264fff ncryptsslp.dll 10.0.18362.1
- 0x7ffb65ae0000 - 0x7ffb65d86fff iertutil.dll 11.0.18362.1198
- 0x7ffb68a00000 - 0x7ffb68b1afff InputHost.dll 10.0.18362.1237 (WARNING: No symbols, InputHost.pdb, F68B35317567C9BFD7429FA8EE64C67B1)
- 0x7ffb68b20000 - 0x7ffb68bbdfff TextInputFramework.dll 10.0.18362.1171
- 0x7ffb68bc0000 - 0x7ffb68d6efff WindowsCodecs.dll 10.0.18362.959 (WARNING: No symbols, WindowsCodecs.pdb, 570B70AB3AD272157A57BC8F3A9F6AC61)
- 0x7ffb68d70000 - 0x7ffb68ec0fff Windows.UI.dll 10.0.18362.1171 (WARNING: No symbols, Windows.UI.pdb, 4649F321C93164BBA825FE8639AF32F31)
- 0x7ffb69720000 - 0x7ffb69a49fff CoreUIComponents.dll 10.0.18362.1110
- 0x7ffb6a1b0000 - 0x7ffb6a1b9fff AVRT.dll 10.0.18362.1
- 0x7ffb6b270000 - 0x7ffb6b2e1fff MMDevAPI.DLL 10.0.18362.387
- 0x7ffb6b870000 - 0x7ffb6b89ffff lib-snapping.dll 0.0.0.0
- 0x7ffb6b8a0000 - 0x7ffb6b8bcfff lib-time-track.dll 0.0.0.0
- 0x7ffb6bd90000 - 0x7ffb6bd96fff MSVCP140_CODECVT_IDS.dll 14.36.32532.0
- 0x7ffb6be60000 - 0x7ffb6be69fff rasadhlp.dll 10.0.18362.1
- 0x7ffb6c830000 - 0x7ffb6c8a6fff fwpuclnt.dll 10.0.18362.1110
- 0x7ffb6ce90000 - 0x7ffb6cfe2fff wintypes.dll 10.0.18362.1237
- 0x7ffb6d340000 - 0x7ffb6d34bfff VCRUNTIME140_1.dll 14.36.32532.0
- 0x7ffb6db50000 - 0x7ffb6db5ffff lib-screen-geometry.dll 0.0.0.0
- 0x7ffb6dc80000 - 0x7ffb6dd6ffff PROPSYS.dll 7.0.18362.815
- 0x7ffb6df70000 - 0x7ffb6df9cfff WINMMBASE.dll 10.0.18362.1
- 0x7ffb6dfa0000 - 0x7ffb6dfc3fff WINMM.dll 10.0.18362.1
- 0x7ffb6e6b0000 - 0x7ffb6e90afff d3d11.dll 10.0.18362.1171
- 0x7ffb6f0e0000 - 0x7ffb6f2bcfff dcomp.dll 10.0.18362.1237 (WARNING: No symbols, dcomp.pdb, 5AA5ED23F8F7BF6D91F488F7F19C9F291)
- 0x7ffb6f310000 - 0x7ffb6f3e3fff CoreMessaging.dll 10.0.18362.1049
- 0x7ffb6f620000 - 0x7ffb6f6b8fff UxTheme.dll 10.0.18362.449
- 0x7ffb6f6e0000 - 0x7ffb6f941fff twinapi.appcore.dll 10.0.18362.1171 (WARNING: No symbols, twinapi.appcore.pdb, B84561313B3AA91F20E96B4B641D51941)
- 0x7ffb6f950000 - 0x7ffb6f963fff resourcepolicyclient.dll 10.0.18362.959
- 0x7ffb6fa50000 - 0x7ffb6fa78fff RMCLIENT.dll 10.0.18362.267
- 0x7ffb6ff20000 - 0x7ffb6ff3ffff dxcore.dll 10.0.18362.1
- 0x7ffb6ff40000 - 0x7ffb7002afff dxgi.dll 10.0.18362.1049
- 0x7ffb70230000 - 0x7ffb70239fff VERSION.dll 10.0.18362.1
- 0x7ffb704c0000 - 0x7ffb704f0fff ntmarta.dll 10.0.18362.1
- 0x7ffb70730000 - 0x7ffb707b7fff schannel.DLL 10.0.18362.1082
- 0x7ffb709a0000 - 0x7ffb709d9fff IPHLPAPI.DLL 10.0.18362.1
- 0x7ffb709f0000 - 0x7ffb70abafff DNSAPI.dll 10.0.18362.1171
- 0x7ffb70c90000 - 0x7ffb70cf6fff mswsock.dll 10.0.18362.815
- 0x7ffb70e60000 - 0x7ffb70e6bfff CRYPTBASE.DLL 10.0.18362.1
- 0x7ffb70f20000 - 0x7ffb70f5afff NTASN1.dll 10.0.18362.1
- 0x7ffb70f60000 - 0x7ffb70f85fff ncrypt.dll 10.0.18362.1
- 0x7ffb710a0000 - 0x7ffb710c9fff DEVOBJ.dll 10.0.18362.387
- 0x7ffb71380000 - 0x7ffb713b6fff SspiCli.dll 10.0.18362.1049
- 0x7ffb714a0000 - 0x7ffb714affff UMPDC.dll 0.0.0.0
- 0x7ffb714b0000 - 0x7ffb714c0fff kernel.appcore.dll 10.0.18362.1171 (WARNING: No symbols, Kernel.Appcore.pdb, 8C6D84D1948C795F1FF8AC296A73365F1)
- 0x7ffb714d0000 - 0x7ffb714f2fff profapi.dll 10.0.18362.693
- 0x7ffb71500000 - 0x7ffb71511fff MSASN1.dll 10.0.18362.1
- 0x7ffb71520000 - 0x7ffb71569fff powrprof.dll 10.0.18362.1
- 0x7ffb715d0000 - 0x7ffb71874fff KERNELBASE.dll 10.0.18362.1237 (WARNING: No symbols, kernelbase.pdb, 96411710FE9C59DD37F94DA68AD9864F1)
- 0x7ffb71880000 - 0x7ffb71896fff cryptsp.dll 10.0.18362.1
- 0x7ffb718a0000 - 0x7ffb71999fff ucrtbase.dll 10.0.18362.1110 (WARNING: No symbols, ucrtbase.pdb, E2955775A9DDACFAD2742EB16FBCAA391)
- 0x7ffb719a0000 - 0x7ffb71a3dfff msvcp_win.dll 10.0.18362.1110
- 0x7ffb71af0000 - 0x7ffb71b39fff cfgmgr32.dll 10.0.18362.387
- 0x7ffb71b40000 - 0x7ffb71cd5fff gdi32full.dll 10.0.18362.1256
- 0x7ffb71ce0000 - 0x7ffb72460fff windows.storage.dll 10.0.18362.1171
- 0x7ffb72470000 - 0x7ffb72490fff win32u.dll 10.0.18362.1237 (WARNING: No symbols, win32u.pdb, BC2E49ABE46D2E93B278B4DECFCA62A81)
- 0x7ffb724a0000 - 0x7ffb725e8fff CRYPT32.dll 10.0.18362.592
- 0x7ffb725f0000 - 0x7ffb72670fff bcryptPrimitives.dll 10.0.18362.1237
- 0x7ffb72680000 - 0x7ffb726a5fff bcrypt.dll 10.0.18362.1237
- 0x7ffb726d0000 - 0x7ffb7276dfff msvcrt.dll 7.0.18362.1
- 0x7ffb72a60000 - 0x7ffb72b2ffff COMDLG32.dll 10.0.18362.1237
- 0x7ffb72b30000 - 0x7ffb72bd8fff shcore.dll 10.0.18362.1237
- 0x7ffb72c60000 - 0x7ffb72df3fff USER32.dll 10.0.18362.1256 (WARNING: No symbols, user32.pdb, C3BCEF9551728E30409F99C7BAB301611)
- 0x7ffb72e00000 - 0x7ffb72f1ffff RPCRT4.dll 10.0.18362.1237 (WARNING: No symbols, rpcrt4.pdb, CBC61C669DAC619F21A16401D2AD7E651)
- 0x7ffb72f30000 - 0x7ffb72f37fff NSI.dll 10.0.18362.1171
- 0x7ffb72f40000 - 0x7ffb72fe1fff clbcatq.dll 2001.12.10941.16384
- 0x7ffb72ff0000 - 0x7ffb7305efff WS2_32.dll 10.0.18362.387
- 0x7ffb73540000 - 0x7ffb735f1fff KERNEL32.DLL 10.0.18362.1110 (WARNING: No symbols, kernel32.pdb, F0AE52559529DA200447BEC418DFE9621)
- 0x7ffb73600000 - 0x7ffb73651fff shlwapi.dll 10.0.18362.1
- 0x7ffb73660000 - 0x7ffb73995fff combase.dll 10.0.18362.1237
- 0x7ffb739a0000 - 0x7ffb73a36fff sechost.dll 10.0.18362.1237
- 0x7ffb73a40000 - 0x7ffb73b74fff MSCTF.dll 10.0.18362.1198
- 0x7ffb73b80000 - 0x7ffb73cd6fff ole32.dll 10.0.18362.1082
- 0x7ffb73ce0000 - 0x7ffb73d05fff GDI32.dll 10.0.18362.1256
- 0x7ffb73d10000 - 0x7ffb73d3dfff IMM32.DLL 10.0.18362.387
- 0x7ffb73d50000 - 0x7ffb74436fff SHELL32.dll 10.0.18362.1237
- 0x7ffb74440000 - 0x7ffb74504fff OLEAUT32.dll 10.0.18362.1110
- 0x7ffb74510000 - 0x7ffb745b2fff advapi32.dll 10.0.18362.752
- 0x7ffb74600000 - 0x7ffb747effff ntdll.dll 10.0.18362.1171 (WARNING: No symbols, ntdll.pdb, BB6DA4D5E1B4C65C0E5B855F1E9F9C391)
- 55F1E9F9C391)
- 0x7ffb709a0000 - 0x7ffb709d9fff IPHLPAPI.DLL 10.0.18362.1
- 0x7ffb709f0000 - 0x7ffb70abafff DNSAPI.dll 10.0.18362.1171
- 0x7ffb70c90000 - 0x7ffb70cf6fff mswsock.dll 10.0.18362.815
- 0x7ffb70e60000 - 0x7ffb70e6bfff CRYPTBASE.DLL 10.0.18362.1
- 0x7ffb70f20000 - 0x7ffb70f5afff NTASN1.dll 10.0.18362.1
- 0x7ffb70f60000 - 0x7ffb70f85fff ncrypt.dll 10.0.18362.1
- 0x7ffb710a0000 - 0x7ffb710c9fff DEVOBJ.dll 10.0.18362.387
- 0x7ffb71380000 - 0x7ffb713b6fff SspiCli.dll 10.0.18362.1049
- 0x7ffb714a0000 - 0x7ffb714affff UMPDC.dll 0.0.0.0
- 0x7ffb714b0000 - 0x7ffb714c0fff kernel.appcore.dll 10.0.18362.1171 (WARNING: No symbols, Kernel.Appcore.pdb, 8C6D84D1948C795F1FF8AC296A73365F1)
- 0x7ffb714d0000 - 0x7ffb714f2fff profapi.dll 10.0.18362.693
- 0x7ffb71500000 - 0x7ffb71511fff MSASN1.dll 10.0.18362.1
- 0x7ffb71520000 - 0x7ffb71569fff powrprof.dll 10.0.18362.1
- 0x7ffb715d0000 - 0x7ffb71874fff KERNELBASE.dll 10.0.18362.1237 (WARNING: No symbols, kernelbase.pdb, 96411710FE9C59DD37F94DA68AD9864F1)
- 0x7ffb71880000 - 0x7ffb71896fff cryptsp.dll 10.0.18362.1
- 0x7ffb718a0000 - 0x7ffb71999fff ucrtbase.dll 10.0.18362.1110 (WARNING: No symbols, ucrtbase.pdb, E2955775A9DDACFAD2742EB16FBCAA391)
- 0x7ffb719a0000 - 0x7ffb71a3dfff msvcp_win.dll 10.0.18362.1110
- 0x7ffb71af0000 - 0x7ffb71b39fff cfgmgr32.dll 10.0.18362.387
- 0x7ffb71b40000 - 0x7ffb71cd5fff gdi32full.dll 10.0.18362.1256
- 0x7ffb71ce0000 - 0x7ffb72460fff windows.storage.dll 10.0.18362.1171
- 0x7ffb72470000 - 0x7ffb72490fff win32u.dll 10.0.18362.1237 (WARNING: No symbols, win32u.pdb, BC2E49ABE46D2E93B278B4DECFCA62A81)
- 0x7ffb724a0000 - 0x7ffb725e8fff CRYPT32.dll 10.0.18362.592
- 0x7ffb725f0000 - 0x7ffb72670fff bcryptPrimitives.dll 10.0.18362.1237
- 0x7ffb72680000 - 0x7ffb726a5fff bcrypt.dll 10.0.18362.1237
- 0x7ffb726d0000 - 0x7ffb7276dfff msvcrt.dll 7.0.18362.1
- 0x7ffb72a60000 - 0x7ffb72b2ffff COMDLG32.dll 10.0.18362.1237
- 0x7ffb72b30000 - 0x7ffb72bd8fff shcore.dll 10.0.18362.1237
- 0x7ffb72c60000 - 0x7ffb72df3fff USER32.dll 10.0.18362.1256 (WARNING: No symbols, user32.pdb, C3BCEF9551728E30409F99C7BAB301611)
- 0x7ffb72e00000 - 0x7ffb72f1ffff RPCRT4.dll 10.0.18362.1237 (WARNING: No symbols, rpcrt4.pdb, CBC61C669DAC619F21A16401D2AD7E651)
- 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement