Operating system: Windows NT 10.0.19041 CPU: amd64 family 6 model 158 stepping 13 4 CPUs GPU: UNKNOWN No crash Process uptime: 986 seconds Thread 0 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x000000000000067c rbx = 0x0000000000000000 rsi = 0x000000eae98ff388 rdi = 0x000000000000067c rbp = 0x7fffffffffffffff rsp = 0x000000eae98ff358 r8 = 0x0000000000000004 r9 = 0x00001391de280469 r10 = 0x00007ff6d38e1ca0 r11 = 0x0000000000000004 r12 = 0x000000eae98ff420 r13 = 0x00000000ffffffff r14 = 0x000000000000067c r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 000000eae98ff358 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x7fffffffffffffff rsp = 0x000000eae98ff360 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 000000eae98ff360 a8 d8 83 89 a8 02 00 00 6f f4 8f e9 ea 00 00 00 ........o....... 000000eae98ff370 01 00 00 00 00 00 00 00 61 e0 27 d4 f6 7f 00 00 ........a.'..... Possible instruction pointers: *(0x000000eae98ff378) = 0x00007ff6d427e061 [time_win.cc : 432 + 0x6] 2 Code - OSS.exe!base::`anonymous namespace'::RolloverProtectedNow [time_win.cc : 432 + 0x6] rbp = 0x7fffffffffffffff rsp = 0x000000eae98ff380 rip = 0x00007ff6d427e061 Found by: stack scanning Thread 1 0 ntdll.dll + 0x9aeb4 rax = 0x0000000000000009 rdx = 0x000000eae9cffcf0 rcx = 0x0000000000000304 rbx = 0x000000eae9cffce8 rsi = 0x000000eae9cffd30 rdi = 0x000000eae9cffcfc rbp = 0x0000000000000304 rsp = 0x000000eae9cffc08 r8 = 0x0000000000000000 r9 = 0x000002a889800000 r10 = 0x0000000000000000 r11 = 0x000002a88982a9b0 r12 = 0x0000000000000000 r13 = 0x000000eae9cffd18 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe5baaaeb4 Found by: given as instruction pointer in context Stack contents: 000000eae9cffc08 bf e9 52 59 fe 7f 00 00 ..RY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x5e9bf rsp = 0x000000eae9cffc10 rip = 0x00007ffe5952e9bf Found by: stack scanning Stack contents: 000000eae9cffc10 40 fc cf e9 ea 00 00 00 30 fd cf e9 ea 00 00 00 @.......0....... 000000eae9cffc20 30 fd cf e9 ea 00 00 00 0b 00 00 00 00 00 00 00 0............... 000000eae9cffc30 00 00 00 00 00 00 00 00 9b 08 53 59 fe 7f 00 00 ..........SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6089b rsp = 0x000000eae9cffc40 rip = 0x00007ffe5953089b Found by: stack scanning Stack contents: 000000eae9cffc40 18 00 00 00 00 00 00 80 00 70 81 89 a8 02 00 00 .........p...... 000000eae9cffc50 00 00 00 00 00 00 00 00 30 fd cf e9 ea 00 00 00 ........0....... 000000eae9cffc60 00 fd cf e9 ea 00 00 00 8d 82 d4 d4 f6 7f 00 00 ................ Possible instruction pointers: *(0x000000eae9cffc68) = 0x00007ff6d4d4828d [broker_services.cc : 236 + 0x11] 3 Code - OSS.exe!sandbox::BrokerServicesBase::TargetEventsThread(void *) [broker_services.cc : 236 + 0x11] rsp = 0x000000eae9cffc70 rip = 0x00007ff6d4d4828d Found by: stack scanning Stack contents: 000000eae9cffc70 00 70 81 89 a8 02 00 00 00 00 00 00 00 00 00 00 .p.............. 000000eae9cffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffc90 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffcb0 08 03 00 00 00 00 00 00 00 70 81 89 a8 02 00 00 .........p...... 000000eae9cffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffcf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffd00 00 fd cf e9 ea 00 00 00 00 fd cf e9 ea 00 00 00 ................ 000000eae9cffd10 00 00 00 00 00 00 00 00 18 fd cf e9 ea 00 00 00 ................ 000000eae9cffd20 18 fd cf e9 ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffd30 38 fd cf e9 ea 00 00 00 00 00 00 00 00 00 00 00 8............... 000000eae9cffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffd50 00 00 00 00 00 00 00 00 16 f1 b6 f6 5d 7f 00 00 ............]... 000000eae9cffd60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffd80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffd90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffda0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffdb0 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 4 kernel32.dll + 0x16fd4 rsp = 0x000000eae9cffdc0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eae9cffdc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffdd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eae9cffde0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 5 ntdll.dll + 0x4cec1 rsp = 0x000000eae9cffdf0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 2 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000000288 rbx = 0x0000000000000000 rsi = 0x000000eae9dff728 rdi = 0x0000000000000288 rbp = 0x7fffffffffffffff rsp = 0x000000eae9dff6f8 r8 = 0x000000eae9dffac8 r9 = 0x00007ff6d427104c r10 = 0x000000eae9dfd000 r11 = 0x000000eae9dfd000 r12 = 0x000000eae9dff7c0 r13 = 0x0000000000000000 r14 = 0x0000000000000288 r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 000000eae9dff6f8 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x7fffffffffffffff rsp = 0x000000eae9dff700 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 000000eae9dff700 28 bd 84 89 a8 02 00 00 0f f8 df e9 ea 00 00 00 (............... 000000eae9dff710 01 c2 84 89 a8 02 00 00 61 e0 27 d4 f6 7f 00 00 ........a.'..... Possible instruction pointers: *(0x000000eae9dff718) = 0x00007ff6d427e061 [time_win.cc : 432 + 0x6] 2 Code - OSS.exe!base::`anonymous namespace'::RolloverProtectedNow [time_win.cc : 432 + 0x6] rbp = 0x7fffffffffffffff rsp = 0x000000eae9dff720 rip = 0x00007ff6d427e061 Found by: stack scanning Thread 3 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000000360 rbx = 0x0000000000000000 rsi = 0x000000eae9fff548 rdi = 0x0000000000000360 rbp = 0x0000000000000000 rsp = 0x000000eae9fff518 r8 = 0x000002a889846638 r9 = 0x000000007ffe0010 r10 = 0x000000023ad072cc r11 = 0x0000000000000246 r12 = 0x000000eae9fff5e0 r13 = 0x000000eae9fff718 r14 = 0x0000000000000360 r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 000000eae9fff518 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rsp = 0x000000eae9fff520 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 000000eae9fff520 c0 77 84 89 a8 02 00 00 10 a3 84 89 a8 02 00 00 .w.............. 000000eae9fff530 f8 f5 ff e9 ea 00 00 00 61 e0 27 d4 f6 7f 00 00 ........a.'..... Possible instruction pointers: *(0x000000eae9fff538) = 0x00007ff6d427e061 [time_win.cc : 432 + 0x6] 2 Code - OSS.exe!base::`anonymous namespace'::RolloverProtectedNow [time_win.cc : 432 + 0x6] rsp = 0x000000eae9fff540 rip = 0x00007ff6d427e061 Found by: stack scanning Thread 4 0 ntdll.dll + 0x9aeb4 rax = 0x0000000000000009 rdx = 0x000000eaea0ff8b0 rcx = 0x0000000000000378 rbx = 0x000000eaea0ff8a8 rsi = 0x000002a889849870 rdi = 0x000000eaea0ff8a0 rbp = 0x0000000000000001 rsp = 0x000000eaea0ff7f8 r8 = 0x000002a88985a9c8 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x000000eaea0ff918 r13 = 0x0000000000000000 r14 = 0x000000eaea0ff910 r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaaeb4 Found by: given as instruction pointer in context Stack contents: 000000eaea0ff7f8 bf e9 52 59 fe 7f 00 00 ..RY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x5e9bf rsp = 0x000000eaea0ff800 rip = 0x00007ffe5952e9bf Found by: stack scanning Stack contents: 000000eaea0ff800 02 01 00 00 00 00 00 00 41 6f 23 d4 f6 7f 00 00 ........Ao#..... Possible instruction pointers: *(0x000000eaea0ff808) = 0x00007ff6d4236f41 [sequence_manager_impl.cc : 724 + 0x5] 2 Code - OSS.exe!base::sequence_manager::internal::SequenceManagerImpl::HasPendingHighResolutionTasks() [sequence_manager_impl.cc : 724 + 0x5] rsp = 0x000000eaea0ff810 rip = 0x00007ff6d4236f41 Found by: stack scanning Stack contents: 000000eaea0ff810 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 000000eaea0ff820 00 00 00 00 00 00 00 00 c8 d5 84 89 a8 02 00 00 ................ 000000eaea0ff830 18 f9 0f ea ea 00 00 00 10 f9 0f ea ea 00 00 00 ................ 000000eaea0ff840 ff ff ff ff ff ff ff 7f a0 04 8a d4 f6 7f 00 00 ................ Possible instruction pointers: *(0x000000eaea0ff848) = 0x00007ff6d48a04a0 [thread_controller_with_message_pump_impl.cc : 433 + 0xd] 3 Code - OSS.exe!base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoIdleWork() [thread_controller_with_message_pump_impl.cc : 433 + 0xd] rsp = 0x000000eaea0ff850 rip = 0x00007ff6d48a04a0 Found by: call frame info Stack contents: 000000eaea0ff850 00 00 00 00 00 00 00 00 0f d0 26 d4 f6 7f 00 00 ..........&..... 000000eaea0ff860 90 98 84 89 a8 02 00 00 08 00 00 00 00 00 00 00 ................ 000000eaea0ff870 02 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f ................ 000000eaea0ff880 ff ff ff ff f6 7f 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ff8b0 00 00 00 00 00 00 00 00 06 f5 76 f5 5d 7f 00 00 ..........v.]... 000000eaea0ff8c0 ff ff ff ff ff ff ff 7f 00 f9 0f ea ea 00 00 00 ................ 000000eaea0ff8d0 70 98 84 89 a8 02 00 00 c4 ce 26 d4 f6 7f 00 00 p.........&..... Possible instruction pointers: *(0x000000eaea0ff858) = 0x00007ff6d426d00f [message_pump_win.cc : 668 + 0x43] *(0x000000eaea0ff8d8) = 0x00007ff6d426cec4 [message_pump_win.cc : 622 + 0x0] 4 Code - OSS.exe!base::MessagePumpForIO::DoRunLoop() [message_pump_win.cc : 641 + 0x3d] rsp = 0x000000eaea0ff8e0 rip = 0x00007ff6d426cec4 Found by: call frame info Stack contents: 000000eaea0ff8e0 00 00 00 00 00 00 00 00 fd e3 21 d4 f6 7f 00 00 ..........!..... 000000eaea0ff8f0 d0 fa 0f ea ea 00 00 00 00 00 0f ea ea 00 00 00 ................ 000000eaea0ff900 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 000000eaea0ff910 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 000000eaea0ff920 86 f5 76 f5 5d 7f 00 00 ff ff ff ff ff ff ff 7f ..v.]........... 000000eaea0ff930 00 00 00 00 00 00 00 00 70 98 84 89 a8 02 00 00 ........p....... 000000eaea0ff940 00 00 00 00 00 00 00 00 68 fa 0f ea ea 00 00 00 ........h....... 000000eaea0ff950 d0 fa 0f ea ea 00 00 00 0e b4 26 d4 f6 7f 00 00 ..........&..... Possible instruction pointers: *(0x000000eaea0ff8e8) = 0x00007ff6d421e3fd ::emplace_back> [stack : 202 + 0x9d] *(0x000000eaea0ff958) = 0x00007ff6d426b40e [message_pump_win.cc : 76 + 0x0] 5 Code - OSS.exe!base::MessagePumpWin::Run(base::MessagePump::Delegate *) [message_pump_win.cc : 74 + 0x9] rsp = 0x000000eaea0ff960 rip = 0x00007ff6d426b40e Found by: call frame info Stack contents: 000000eaea0ff960 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 000000eaea0ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ff980 c8 d5 84 89 a8 02 00 00 00 fa 0f ea 01 00 00 00 ................ 000000eaea0ff990 06 f4 76 f5 5d 7f 00 00 ff ff ff ff ff ff ff 7f ..v.]........... 000000eaea0ff9a0 d0 d5 84 89 a8 02 00 00 c8 05 8a d4 f6 7f 00 00 ................ Possible instruction pointers: *(0x000000eaea0ff9a8) = 0x00007ff6d48a05c8 [thread_controller_with_message_pump_impl.cc : 471 + 0x0] 6 Code - OSS.exe!base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::Run(bool,base::TimeDelta) [thread_controller_with_message_pump_impl.cc : 463 + 0xa] rsp = 0x000000eaea0ff9b0 rip = 0x00007ff6d48a05c8 Found by: call frame info Stack contents: 000000eaea0ff9b0 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... 000000eaea0ff9c0 00 00 00 00 00 00 00 00 59 53 20 d4 f6 7f 00 00 ........YS ..... 000000eaea0ff9d0 00 00 00 00 00 00 00 00 74 31 24 d4 f6 7f 00 00 ........t1$..... 000000eaea0ff9e0 d6 f4 76 f5 5d 7f 00 00 00 00 00 00 00 00 00 00 ..v.]........... 000000eaea0ff9f0 00 00 00 00 00 00 00 00 b0 63 84 89 a8 02 00 00 .........c...... 000000eaea0ffa00 a0 63 84 89 a8 02 00 00 be cd 21 d4 f6 7f 00 00 .c........!..... Possible instruction pointers: *(0x000000eaea0ff9b8) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] *(0x000000eaea0ff9c8) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x000000eaea0ff9d8) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x000000eaea0ffa08) = 0x00007ff6d421cdbe [run_loop.cc : 158 + 0x0] 7 Code - OSS.exe!base::RunLoop::Run() [run_loop.cc : 156 + 0x10] rsp = 0x000000eaea0ffa10 rip = 0x00007ff6d421cdbe Found by: call frame info Stack contents: 000000eaea0ffa10 86 f4 76 f5 5d 7f 00 00 00 00 00 00 00 00 00 00 ..v.]........... 000000eaea0ffa20 00 00 00 00 00 00 00 00 59 53 20 d4 f6 7f 00 00 ........YS ..... 000000eaea0ffa30 b0 63 84 89 a8 02 00 00 74 31 24 d4 f6 7f 00 00 .c......t1$..... 000000eaea0ffa40 d0 fa 0f ea ea 00 00 00 e7 03 27 d4 f6 7f 00 00 ..........'..... 000000eaea0ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffa60 00 00 00 00 00 00 00 00 90 be 84 89 a8 02 00 00 ................ 000000eaea0ffa70 60 fa 0f ea ea 00 00 00 76 f7 76 f5 5d 7f 00 00 `.......v.v.]... 000000eaea0ffa80 00 00 00 00 00 00 00 00 b0 63 84 89 a8 02 00 00 .........c...... 000000eaea0ffa90 a0 63 84 89 a8 02 00 00 d0 fa 0f ea ea 00 00 00 .c.............. 000000eaea0ffaa0 10 0b a3 5b fe 7f 00 00 a6 28 24 d4 f6 7f 00 00 ...[.....($..... Possible instruction pointers: *(0x000000eaea0ffa28) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x000000eaea0ffa38) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x000000eaea0ffa48) = 0x00007ff6d42703e7 [lock_impl_win.cc : 37 + 0x15] *(0x000000eaea0ffaa8) = 0x00007ff6d42428a6 [thread.cc : 379 + 0x0] 8 Code - OSS.exe!base::Thread::ThreadMain() [thread.cc : 376 + 0xc] rsp = 0x000000eaea0ffab0 rip = 0x00007ff6d42428a6 Found by: call frame info Stack contents: 000000eaea0ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffac0 b0 ab 84 89 a8 02 00 00 a0 63 84 89 a8 02 00 00 .........c...... 000000eaea0ffad0 d0 d5 84 89 a8 02 00 00 00 00 00 00 00 01 00 01 ................ 000000eaea0ffae0 20 10 84 89 a8 02 00 00 d0 be 84 89 a8 02 00 00 ............... 000000eaea0ffaf0 d0 fa 0f ea ea 00 00 00 d6 f7 76 f5 5d 7f 00 00 ..........v.]... 000000eaea0ffb00 ff ff ff ff ff ff ff ff f0 54 c2 59 fe 7f 00 00 .........T.Y.... 000000eaea0ffb10 f0 c2 81 89 a8 02 00 00 a0 63 84 89 a8 02 00 00 .........c...... 000000eaea0ffb20 b0 ab 84 89 a8 02 00 00 7d 10 27 d4 f6 7f 00 00 ........}.'..... Possible instruction pointers: *(0x000000eaea0ffb28) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 9 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x000000eaea0ffb30 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 000000eaea0ffb30 ff ff ff ff ff ff ff ff f0 c2 81 89 a8 02 00 00 ................ 000000eaea0ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffb60 02 00 00 00 00 00 00 00 74 03 00 00 00 00 00 00 ........t....... 000000eaea0ffb70 74 03 00 00 00 00 00 00 56 f6 76 f5 5d 7f 00 00 t.......V.v.]... 000000eaea0ffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffba0 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 10 kernel32.dll + 0x16fd4 rsp = 0x000000eaea0ffbb0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea0ffbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea0ffbd0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 11 ntdll.dll + 0x4cec1 rsp = 0x000000eaea0ffbe0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 5 0 ntdll.dll + 0x9e7e4 rax = 0x00000000000001d3 rdx = 0x000002a8899f5430 rcx = 0x0000000000000390 rbx = 0x0000000000000000 rsi = 0x000002a8899f46a0 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x000000eaea1ff4c8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe5baae7e4 Found by: given as instruction pointer in context Stack contents: 000000eaea1ff4c8 d7 23 a2 5b fe 7f 00 00 .#.[.... Possible instruction pointers: 1 ntdll.dll + 0x123d7 rsp = 0x000000eaea1ff4d0 rip = 0x00007ffe5ba223d7 Found by: stack scanning Thread 6 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x00000000000003c0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000000000003c0 rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff728 r8 = 0x000000eaea2fee80 r9 = 0x00007ff6d431fbf2 r10 = 0x000000eaea2fc000 r11 = 0x000000eaea2fc000 r12 = 0x0000000000000001 r13 = 0x0000000000000000 r14 = 0x00000000000003c0 r15 = 0x000000eaea2ff870 rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 000000eaea2ff728 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff730 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 000000eaea2ff730 b6 fb 56 f5 5d 7f 00 00 c8 67 86 89 a8 02 00 00 ..V.]....g...... 000000eaea2ff740 a0 3c 86 89 a8 02 00 00 80 28 7d d7 f6 7f 00 00 .<.......(}..... Possible instruction pointers: *(0x000000eaea2ff748) = 0x00007ff6d77d2880 [ : 0 + 0x7ff6d77d2880] 2 Code - OSS.exe!RtlUnwindEx + 0x56d820 rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff750 rip = 0x00007ff6d77d2880 Found by: stack scanning Stack contents: 000000eaea2ff750 01 00 00 00 00 00 00 00 56 70 23 d4 f6 7f 00 00 ........Vp#..... Possible instruction pointers: *(0x000000eaea2ff758) = 0x00007ff6d4237056 [sequence_manager_impl.cc : 739 + 0xc] 3 Code - OSS.exe!base::sequence_manager::internal::SequenceManagerImpl::OnSystemIdle() [sequence_manager_impl.cc : 739 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff760 rip = 0x00007ff6d4237056 Found by: stack scanning Stack contents: 000000eaea2ff760 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 000000eaea2ff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ff7a0 00 00 00 00 00 00 00 00 70 63 87 89 a8 02 00 00 ........pc...... 000000eaea2ff7b0 70 63 87 89 a8 02 00 00 f8 6a 86 89 a8 02 00 00 pc.......j...... Possible instruction pointers: 4 0x2a889866af8 rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff7c0 rip = 0x000002a889866af8 Found by: call frame info Stack contents: 000000eaea2ff7c0 70 63 87 89 a8 02 00 00 14 05 27 d4 f6 7f 00 00 pc........'..... Possible instruction pointers: *(0x000000eaea2ff7c8) = 0x00007ff6d4270514 [waitable_event_win.cc : 74 + 0x0] 5 Code - OSS.exe!base::WaitableEvent::Wait() [waitable_event_win.cc : 69 + 0xb] rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff7d0 rip = 0x00007ff6d4270514 Found by: stack scanning Stack contents: 000000eaea2ff7d0 78 f8 2f ea ea 00 00 00 2f cc 21 d7 f6 7f 00 00 x./...../.!..... 000000eaea2ff7e0 00 00 00 00 f6 7f 00 00 c0 03 00 00 00 00 00 00 ................ 000000eaea2ff7f0 00 24 50 d8 f6 7f 00 00 00 00 00 00 00 00 00 00 .$P............. 000000eaea2ff800 00 00 00 00 00 00 00 00 fd e3 21 d4 f6 7f 00 01 ..........!..... 000000eaea2ff810 00 f9 2f ea ea 00 00 00 00 fa 56 f5 5d 7f 00 00 ../.......V.]... 000000eaea2ff820 78 f8 2f ea ea 00 00 00 a6 fa 56 f5 5d 7f 00 00 x./.......V.]... 000000eaea2ff830 b6 fa 56 f5 5d 7f 00 00 f8 6a 86 89 a8 02 00 00 ..V.]....j...... 000000eaea2ff840 60 63 87 89 a8 02 00 00 1f 27 89 d4 f6 7f 00 00 `c.......'...... Possible instruction pointers: *(0x000000eaea2ff7d8) = 0x00007ff6d721cc2f [new_scalar.cpp : 35 + 0x8] *(0x000000eaea2ff7f0) = 0x00007ff6d8502400 [ : 0 + 0x7ff6d8502400] *(0x000000eaea2ff848) = 0x00007ff6d489271f [message_pump_default.cc : 55 + 0x8] 6 Code - OSS.exe!base::MessagePumpDefault::Run(base::MessagePump::Delegate *) [message_pump_default.cc : 55 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff850 rip = 0x00007ff6d489271f Found by: call frame info Stack contents: 000000eaea2ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ff860 e8 63 7d d7 f6 7f 00 00 08 00 00 00 00 00 00 00 .c}............. 000000eaea2ff870 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f ................ 000000eaea2ff880 00 00 00 00 00 00 00 00 36 f5 56 f5 5d 7f 00 00 ........6.V.]... 000000eaea2ff890 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 000000eaea2ff8a0 ff ff ff ff ff ff ff 7f 00 6b 86 89 a8 02 00 00 .........k...... 000000eaea2ff8b0 00 00 00 00 00 00 00 00 88 f9 2f ea ea 00 00 00 ........../..... 000000eaea2ff8c0 f0 f9 2f ea ea 00 00 00 c8 05 8a d4 f6 7f 00 00 ../............. Possible instruction pointers: *(0x000000eaea2ff860) = 0x00007ff6d77d63e8 [ : 0 + 0x7ff6d77d63e8] *(0x000000eaea2ff8c8) = 0x00007ff6d48a05c8 [thread_controller_with_message_pump_impl.cc : 471 + 0x0] 7 Code - OSS.exe!base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::Run(bool,base::TimeDelta) [thread_controller_with_message_pump_impl.cc : 463 + 0xa] rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff8d0 rip = 0x00007ff6d48a05c8 Found by: call frame info Stack contents: 000000eaea2ff8d0 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... 000000eaea2ff8e0 00 00 00 00 00 00 00 00 59 53 20 d4 f6 7f 00 00 ........YS ..... 000000eaea2ff8f0 00 00 00 00 00 00 00 00 74 31 24 d4 f6 7f 00 00 ........t1$..... 000000eaea2ff900 b6 f5 56 f5 5d 7f 00 00 00 00 00 00 00 00 00 00 ..V.]........... 000000eaea2ff910 00 00 00 00 00 00 00 00 20 59 86 89 a8 02 00 00 ........ Y...... 000000eaea2ff920 10 59 86 89 a8 02 00 00 be cd 21 d4 f6 7f 00 00 .Y........!..... Possible instruction pointers: *(0x000000eaea2ff8d8) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] *(0x000000eaea2ff8e8) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x000000eaea2ff8f8) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x000000eaea2ff928) = 0x00007ff6d421cdbe [run_loop.cc : 158 + 0x0] 8 Code - OSS.exe!base::RunLoop::Run() [run_loop.cc : 156 + 0x10] rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff930 rip = 0x00007ff6d421cdbe Found by: call frame info Stack contents: 000000eaea2ff930 66 f4 56 f5 5d 7f 00 00 00 00 00 00 00 00 00 00 f.V.]........... 000000eaea2ff940 00 00 00 00 00 00 00 00 59 53 20 d4 f6 7f 00 00 ........YS ..... 000000eaea2ff950 20 59 86 89 a8 02 00 00 74 31 24 d4 f6 7f 00 00 Y......t1$..... 000000eaea2ff960 f0 f9 2f ea ea 00 00 00 e7 03 27 d4 f6 7f 00 00 ../.......'..... 000000eaea2ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ff980 00 00 00 00 00 00 00 00 c0 6b 85 89 a8 02 00 00 .........k...... 000000eaea2ff990 80 f9 2f ea ea 00 00 00 56 f4 56 f5 5d 7f 00 00 ../.....V.V.]... 000000eaea2ff9a0 00 00 00 00 00 00 00 00 20 59 86 89 a8 02 00 00 ........ Y...... 000000eaea2ff9b0 10 59 86 89 a8 02 00 00 f0 f9 2f ea ea 00 00 00 .Y......../..... 000000eaea2ff9c0 10 0b a3 5b fe 7f 00 00 a6 28 24 d4 f6 7f 00 00 ...[.....($..... Possible instruction pointers: *(0x000000eaea2ff948) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x000000eaea2ff958) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x000000eaea2ff968) = 0x00007ff6d42703e7 [lock_impl_win.cc : 37 + 0x15] *(0x000000eaea2ff9c8) = 0x00007ff6d42428a6 [thread.cc : 379 + 0x0] 9 Code - OSS.exe!base::Thread::ThreadMain() [thread.cc : 376 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ff9d0 rip = 0x00007ff6d42428a6 Found by: call frame info Stack contents: 000000eaea2ff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ff9e0 90 30 86 89 a8 02 00 00 10 59 86 89 a8 02 00 00 .0.......Y...... 000000eaea2ff9f0 00 6b 86 89 a8 02 00 00 00 00 00 00 00 01 00 01 .k.............. 000000eaea2ffa00 40 46 86 89 a8 02 00 00 40 6c 85 89 a8 02 00 00 @F......@l...... 000000eaea2ffa10 f0 f9 2f ea ea 00 00 00 b6 f4 56 f5 5d 7f 00 00 ../.......V.]... 000000eaea2ffa20 ff ff ff ff ff ff ff ff f0 54 c2 59 fe 7f 00 00 .........T.Y.... 000000eaea2ffa30 f0 c2 81 89 a8 02 00 00 10 59 86 89 a8 02 00 00 .........Y...... 000000eaea2ffa40 90 30 86 89 a8 02 00 00 7d 10 27 d4 f6 7f 00 00 .0......}.'..... Possible instruction pointers: *(0x000000eaea2ffa48) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 10 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ffa50 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 000000eaea2ffa50 ff ff ff ff ff ff ff ff f0 c2 81 89 a8 02 00 00 ................ 000000eaea2ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ffa80 02 00 00 00 00 00 00 00 bc 03 00 00 00 00 00 00 ................ 000000eaea2ffa90 bc 03 00 00 00 00 00 00 36 f7 56 f5 5d 7f 00 00 ........6.V.]... 000000eaea2ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ffac0 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 11 kernel32.dll + 0x16fd4 rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ffad0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea2ffad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea2ffaf0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 12 ntdll.dll + 0x4cec1 rbp = 0x7fffffffffffffff rsp = 0x000000eaea2ffb00 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 7 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000000404 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000000404 rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff428 r8 = 0x000000eaea3ff428 r9 = 0x7fffffffffffffff r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000001 r13 = 0x0000000000000000 r14 = 0x0000000000000404 r15 = 0x000000eaea3ff570 rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 000000eaea3ff428 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff430 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 000000eaea3ff430 b6 fe 46 f5 5d 7f 00 00 78 a2 f2 8a a8 02 00 00 ..F.]...x....... 000000eaea3ff440 60 36 86 89 a8 02 00 00 80 28 7d d7 f6 7f 00 00 `6.......(}..... Possible instruction pointers: *(0x000000eaea3ff448) = 0x00007ff6d77d2880 [ : 0 + 0x7ff6d77d2880] 2 Code - OSS.exe!RtlUnwindEx + 0x56d820 rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff450 rip = 0x00007ff6d77d2880 Found by: stack scanning Stack contents: 000000eaea3ff450 01 00 00 00 00 00 00 00 56 70 23 d4 f6 7f 00 00 ........Vp#..... Possible instruction pointers: *(0x000000eaea3ff458) = 0x00007ff6d4237056 [sequence_manager_impl.cc : 739 + 0xc] 3 Code - OSS.exe!base::sequence_manager::internal::SequenceManagerImpl::OnSystemIdle() [sequence_manager_impl.cc : 739 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff460 rip = 0x00007ff6d4237056 Found by: stack scanning Stack contents: 000000eaea3ff460 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 000000eaea3ff470 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff480 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff490 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff4a0 00 00 00 00 00 00 00 00 90 19 84 89 a8 02 00 00 ................ 000000eaea3ff4b0 90 19 84 89 a8 02 00 00 c8 8e 88 89 a8 02 00 00 ................ Possible instruction pointers: 4 0x2a889888ec8 rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff4c0 rip = 0x000002a889888ec8 Found by: call frame info Stack contents: 000000eaea3ff4c0 90 19 84 89 a8 02 00 00 14 05 27 d4 f6 7f 00 00 ..........'..... Possible instruction pointers: *(0x000000eaea3ff4c8) = 0x00007ff6d4270514 [waitable_event_win.cc : 74 + 0x0] 5 Code - OSS.exe!base::WaitableEvent::Wait() [waitable_event_win.cc : 69 + 0xb] rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff4d0 rip = 0x00007ff6d4270514 Found by: stack scanning Stack contents: 000000eaea3ff4d0 78 f5 3f ea ea 00 00 00 00 cc 21 d7 f6 7f 00 00 x.?.......!..... 000000eaea3ff4e0 00 00 00 00 a8 02 00 00 04 04 00 00 00 00 00 00 ................ 000000eaea3ff4f0 00 24 50 d8 f6 7f 00 00 00 00 00 00 00 00 00 00 .$P............. 000000eaea3ff500 00 00 00 00 00 00 00 00 fd e3 21 d4 f6 7f 00 01 ..........!..... 000000eaea3ff510 00 f9 46 f5 5d 7f 00 00 00 f9 46 f5 5d 7f 00 00 ..F.].....F.]... 000000eaea3ff520 78 f5 3f ea ea 00 00 00 a6 f9 46 f5 5d 7f 00 00 x.?.......F.]... 000000eaea3ff530 b6 f9 46 f5 5d 7f 00 00 c8 8e 88 89 a8 02 00 00 ..F.]........... 000000eaea3ff540 80 19 84 89 a8 02 00 00 1f 27 89 d4 f6 7f 00 00 .........'...... Possible instruction pointers: *(0x000000eaea3ff4d8) = 0x00007ff6d721cc00 [atlbase.cpp : 124 + 0x10] *(0x000000eaea3ff4f0) = 0x00007ff6d8502400 [ : 0 + 0x7ff6d8502400] *(0x000000eaea3ff548) = 0x00007ff6d489271f [message_pump_default.cc : 55 + 0x8] 6 Code - OSS.exe!base::MessagePumpDefault::Run(base::MessagePump::Delegate *) [message_pump_default.cc : 55 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff550 rip = 0x00007ff6d489271f Found by: call frame info Stack contents: 000000eaea3ff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff560 e8 63 7d d7 f6 7f 00 00 08 00 00 00 00 00 00 00 .c}............. 000000eaea3ff570 20 8d 34 00 00 00 00 00 ff ff ff ff ff ff ff 7f .4............. 000000eaea3ff580 00 00 00 00 00 00 00 00 36 f8 46 f5 5d 7f 00 00 ........6.F.]... 000000eaea3ff590 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 000000eaea3ff5a0 ff ff ff ff ff ff ff 7f d0 8e 88 89 a8 02 00 00 ................ 000000eaea3ff5b0 00 00 00 00 00 00 00 00 88 f6 3f ea ea 00 00 00 ..........?..... 000000eaea3ff5c0 f0 f6 3f ea ea 00 00 00 c8 05 8a d4 f6 7f 00 00 ..?............. Possible instruction pointers: *(0x000000eaea3ff560) = 0x00007ff6d77d63e8 [ : 0 + 0x7ff6d77d63e8] *(0x000000eaea3ff5c8) = 0x00007ff6d48a05c8 [thread_controller_with_message_pump_impl.cc : 471 + 0x0] 7 Code - OSS.exe!base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::Run(bool,base::TimeDelta) [thread_controller_with_message_pump_impl.cc : 463 + 0xa] rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff5d0 rip = 0x00007ff6d48a05c8 Found by: call frame info Stack contents: 000000eaea3ff5d0 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... 000000eaea3ff5e0 40 09 87 89 a8 02 00 00 59 53 20 d4 f6 7f 00 00 @.......YS ..... 000000eaea3ff5f0 00 00 00 00 00 00 00 00 74 31 24 d4 f6 7f 00 00 ........t1$..... 000000eaea3ff600 b6 f8 46 f5 5d 7f 00 00 40 09 87 89 a8 02 00 00 ..F.]...@....... 000000eaea3ff610 00 00 00 00 00 00 00 00 f0 f6 3f ea ea 00 00 00 ..........?..... 000000eaea3ff620 18 f7 3f ea ea 00 00 00 be cd 21 d4 f6 7f 00 00 ..?.......!..... Possible instruction pointers: *(0x000000eaea3ff5d8) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] *(0x000000eaea3ff5e8) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x000000eaea3ff5f8) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x000000eaea3ff628) = 0x00007ff6d421cdbe [run_loop.cc : 158 + 0x0] 8 Code - OSS.exe!base::RunLoop::Run() [run_loop.cc : 156 + 0x10] rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff630 rip = 0x00007ff6d421cdbe Found by: call frame info Stack contents: 000000eaea3ff630 00 00 00 00 00 00 00 00 78 f6 3f ea ea 00 00 00 ........x.?..... 000000eaea3ff640 00 00 00 00 00 00 00 00 20 63 99 d3 f6 7f 00 00 ........ c...... 000000eaea3ff650 40 7f 84 89 a8 02 00 00 74 31 24 d4 f6 7f 00 00 @.......t1$..... 000000eaea3ff660 50 7f 84 89 a8 02 00 00 18 f7 3f ea ea 00 00 00 P.........?..... 000000eaea3ff670 40 09 87 89 a8 02 00 00 98 80 21 b6 8f 44 00 00 @.........!..D.. 000000eaea3ff680 00 00 00 00 00 00 00 00 f0 bf 84 89 a8 02 00 00 ................ 000000eaea3ff690 80 f6 3f ea ea 00 00 00 56 fb 46 f5 5d 7f 00 00 ..?.....V.F.]... 000000eaea3ff6a0 40 09 87 89 a8 02 00 00 f0 f6 3f ea ea 00 00 00 @.........?..... 000000eaea3ff6b0 18 f7 3f ea ea 00 00 00 00 7d 84 89 a8 02 00 00 ..?......}...... 000000eaea3ff6c0 c0 94 f2 8a a8 02 00 00 62 7b 9b d3 f6 7f 00 00 ........b{...... Possible instruction pointers: *(0x000000eaea3ff648) = 0x00007ff6d3996320 [thread.cc : 36 + 0xd] *(0x000000eaea3ff658) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x000000eaea3ff6c8) = 0x00007ff6d39b7b62 [worker_thread.cc : 170 + 0x0] 9 Code - OSS.exe!blink::scheduler::WorkerThread::SimpleThreadImpl::Run() [worker_thread.cc : 169 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff6d0 rip = 0x00007ff6d39b7b62 Found by: call frame info Stack contents: 000000eaea3ff6d0 40 09 87 89 a8 02 00 00 20 f7 3f ea ea 00 00 00 @....... .?..... 000000eaea3ff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff6f0 d0 8e 88 89 a8 02 00 00 00 00 00 00 00 01 00 01 ................ 000000eaea3ff700 30 1b 84 89 a8 02 00 00 b0 c1 84 89 a8 02 00 00 0............... 000000eaea3ff710 f0 f6 3f ea ea 00 00 00 00 00 00 00 00 00 00 00 ..?............. 000000eaea3ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff730 b6 fb 46 f5 5d 7f 00 00 ff ff ff ff ff ff ff ff ..F.]........... 000000eaea3ff740 f0 54 c2 59 fe 7f 00 00 f0 c2 81 89 a8 02 00 00 .T.Y............ 000000eaea3ff750 00 00 00 00 00 00 00 00 40 09 87 89 a8 02 00 00 ........@....... 000000eaea3ff760 c0 6e f2 8a a8 02 00 00 7d 10 27 d4 f6 7f 00 00 .n......}.'..... Possible instruction pointers: *(0x000000eaea3ff768) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 10 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff770 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 000000eaea3ff770 ff ff ff ff ff ff ff ff f0 c2 81 89 a8 02 00 00 ................ 000000eaea3ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff7a0 02 00 00 00 00 00 00 00 fc 03 00 00 00 00 00 00 ................ 000000eaea3ff7b0 fc 03 00 00 00 00 00 00 16 fa 46 f5 5d 7f 00 00 ..........F.]... 000000eaea3ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff7e0 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 11 kernel32.dll + 0x16fd4 rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff7f0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea3ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea3ff810 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 12 ntdll.dll + 0x4cec1 rbp = 0x7fffffffffffffff rsp = 0x000000eaea3ff820 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 8 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x00000000000003f8 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000000000003f8 rbp = 0x0000000000000000 rsp = 0x000000eaea4ff588 r8 = 0x000000eaea4ff868 r9 = 0x00007ff6d427104c r10 = 0x000000eaea4fd000 r11 = 0x000000eaea4fd000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00000000000003f8 r15 = 0x000002a88af26ec0 rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 000000eaea4ff588 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rsp = 0x000000eaea4ff590 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 000000eaea4ff590 30 87 f5 8a a8 02 00 00 e0 69 f2 8a a8 02 00 00 0........i...... 000000eaea4ff5a0 00 00 b3 87 a8 02 00 00 c0 ab 53 59 fe 7f 00 00 ..........SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6abc0 rsp = 0x000000eaea4ff5b0 rip = 0x00007ffe5953abc0 Found by: stack scanning Stack contents: 000000eaea4ff5b0 80 f6 4f ea ea 00 00 00 70 f6 4f ea ea 00 00 00 ..O.....p.O..... 000000eaea4ff5c0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 000000eaea4ff5d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff5e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff600 00 00 00 00 00 00 00 00 00 00 a9 89 a8 02 00 00 ................ 000000eaea4ff610 a0 12 86 89 a8 02 00 00 d0 12 86 89 a8 02 00 00 ................ 000000eaea4ff620 d0 12 86 89 a8 02 00 00 14 05 27 d4 f6 7f 00 00 ..........'..... Possible instruction pointers: *(0x000000eaea4ff628) = 0x00007ff6d4270514 [waitable_event_win.cc : 74 + 0x0] 3 Code - OSS.exe!base::WaitableEvent::Wait() [waitable_event_win.cc : 69 + 0xb] rsp = 0x000000eaea4ff630 rip = 0x00007ff6d4270514 Found by: stack scanning Stack contents: 000000eaea4ff630 ff ff ff ff ff ff ff ff 58 0a 27 d4 f6 7f 00 00 ........X.'..... 000000eaea4ff640 00 00 00 00 fe 7f 00 00 f8 03 00 00 00 00 00 00 ................ 000000eaea4ff650 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff660 80 8a f2 8a a8 02 00 00 2f 00 00 00 00 00 00 00 ......../....... 000000eaea4ff670 00 94 86 89 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff680 30 00 00 00 00 00 00 80 ff ff ff ff ff ff ff ff 0............... 000000eaea4ff690 56 fb 36 f5 5d 7f 00 00 d0 12 86 89 a8 02 00 00 V.6.]........... 000000eaea4ff6a0 d0 12 86 89 a8 02 00 00 eb 7b e3 d5 f6 7f 00 00 .........{...... Possible instruction pointers: *(0x000000eaea4ff638) = 0x00007ff6d4270a58 ,std::__1::allocator > const &)> [platform_thread_win.cc : 265 + 0x6] *(0x000000eaea4ff6a8) = 0x00007ff6d5e37beb [worker_thread.cc : 33 + 0x8] 4 Code - OSS.exe!base::internal::WorkerThread::Delegate::WaitForWork(base::WaitableEvent *) [worker_thread.cc : 33 + 0x8] rsp = 0x000000eaea4ff6b0 rip = 0x00007ff6d5e37beb Found by: call frame info Stack contents: 000000eaea4ff6b0 00 00 00 00 00 00 00 00 cf 1e 89 d4 f6 7f 00 00 ................ 000000eaea4ff6c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff6d0 ff ff ff ff ff ff ff 7f d6 fb 36 f5 5d 7f 00 00 ..........6.]... 000000eaea4ff6e0 a0 12 86 89 a8 02 00 00 27 84 e3 d5 f6 7f 00 00 ........'....... Possible instruction pointers: *(0x000000eaea4ff6b8) = 0x00007ff6d4891ecf [activity_tracker.cc : 1763 + 0x0] *(0x000000eaea4ff6e8) = 0x00007ff6d5e38427 [worker_thread.cc : 298 + 0x0] 5 Code - OSS.exe!base::internal::WorkerThread::RunWorker() [worker_thread.cc : 297 + 0xd] rsp = 0x000000eaea4ff6f0 rip = 0x00007ff6d5e38427 Found by: call frame info Stack contents: 000000eaea4ff6f0 00 00 00 00 00 00 00 00 18 04 00 00 00 00 00 00 ................ 000000eaea4ff700 e8 63 7d d7 f6 7f 00 00 30 00 00 00 00 00 00 00 .c}.....0....... 000000eaea4ff710 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... 000000eaea4ff720 00 00 00 00 00 00 00 00 f1 95 a2 5b fe 7f 00 00 ...........[.... 000000eaea4ff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff740 30 00 00 00 00 00 00 00 50 84 85 89 a8 02 00 00 0.......P....... 000000eaea4ff750 00 00 00 00 00 00 00 00 2f cc 21 d7 f6 7f 00 00 ......../.!..... 000000eaea4ff760 90 14 f2 8a a8 02 00 00 2f 00 00 00 00 00 00 00 ......../....... 000000eaea4ff770 00 00 00 00 00 00 00 00 90 68 f2 8a a8 02 00 00 .........h...... 000000eaea4ff780 58 84 85 89 a8 02 00 00 96 fb 36 f5 5d 7f 00 00 X.........6.]... 000000eaea4ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff7a0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 000000eaea4ff7b0 00 00 00 00 00 00 00 00 f0 54 c2 59 fe 7f 00 00 .........T.Y.... 000000eaea4ff7c0 f0 c2 81 89 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff7d0 00 00 00 00 00 00 00 00 a0 12 86 89 a8 02 00 00 ................ 000000eaea4ff7e0 c0 6e f2 8a a8 02 00 00 d0 82 e3 d5 f6 7f 00 00 .n.............. Possible instruction pointers: *(0x000000eaea4ff700) = 0x00007ff6d77d63e8 [ : 0 + 0x7ff6d77d63e8] *(0x000000eaea4ff718) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] *(0x000000eaea4ff758) = 0x00007ff6d721cc2f [new_scalar.cpp : 35 + 0x8] *(0x000000eaea4ff7e8) = 0x00007ff6d5e382d0 [worker_thread.cc : 235 + 0x5] 6 Code - OSS.exe!base::internal::WorkerThread::RunSharedWorker() [worker_thread.cc : 235 + 0x5] rsp = 0x000000eaea4ff7f0 rip = 0x00007ff6d5e382d0 Found by: call frame info Stack contents: 000000eaea4ff7f0 00 00 00 00 00 00 00 00 38 80 e3 d5 f6 7f 00 00 ........8....... 000000eaea4ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff810 00 00 00 00 00 00 00 00 a0 12 86 89 ea 00 00 00 ................ 000000eaea4ff820 96 fa 36 f5 5d 7f 00 00 7d 10 27 d4 f6 7f 00 00 ..6.]...}.'..... Possible instruction pointers: *(0x000000eaea4ff7f8) = 0x00007ff6d5e38038 [worker_thread.cc : 200 + 0x6] *(0x000000eaea4ff828) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x000000eaea4ff830 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 000000eaea4ff830 ff ff ff ff ff ff ff ff f0 c2 81 89 a8 02 00 00 ................ 000000eaea4ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff860 02 00 00 00 00 00 00 00 18 04 00 00 00 00 00 00 ................ 000000eaea4ff870 18 04 00 00 00 00 00 00 56 f5 36 f5 5d 7f 00 00 ........V.6.]... 000000eaea4ff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff8a0 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x000000eaea4ff8b0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea4ff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea4ff8d0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x000000eaea4ff8e0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 9 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x000002a88985cdf0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000002a88985cdf0 rbp = 0x000000eaea5ff8d0 rsp = 0x000000eaea5ff878 r8 = 0x0000000000000000 r9 = 0x000000eaea5ff2a0 r10 = 0x0000000000000000 r11 = 0xc000000008040500 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000eaea5ff8a8 r15 = 0x000002a88985cea0 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaea5ff878 71 4f a7 5b fe 7f 00 00 qO.[.... Possible instruction pointers: 1 ntdll.dll + 0x64f71 rbp = 0x000000eaea5ff8d0 rsp = 0x000000eaea5ff880 rip = 0x00007ffe5ba74f71 Found by: stack scanning Stack contents: 000000eaea5ff880 00 00 00 00 a8 02 00 00 23 00 00 00 f6 7f 00 00 ........#....... 000000eaea5ff890 28 16 89 89 a8 02 00 00 b0 84 f2 8a a8 02 00 00 (............... 000000eaea5ff8a0 00 00 00 00 00 00 00 00 a0 f8 5f ea ea 00 00 00 .........._..... 000000eaea5ff8b0 50 f7 6f ea ea 00 00 00 f8 16 00 00 00 00 00 00 P.o............. 000000eaea5ff8c0 00 00 03 00 01 00 00 00 f0 cd 85 89 a8 02 00 00 ................ 000000eaea5ff8d0 30 9a 89 89 a8 02 00 00 f0 cd 85 89 a8 02 00 00 0............... 000000eaea5ff8e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ff8f0 00 00 00 00 00 00 00 00 69 ab 53 59 fe 7f 00 00 ........i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rsp = 0x000000eaea5ff900 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 000000eaea5ff900 c0 cd 85 89 a8 02 00 00 a0 ce 85 89 a8 02 00 00 ................ 000000eaea5ff910 78 16 89 89 a8 02 00 00 2c a9 d4 d5 f6 7f 00 00 x.......,....... Possible instruction pointers: *(0x000000eaea5ff918) = 0x00007ff6d5d4a92c [categorized_worker_pool.cc : 423 + 0xc] 3 Code - OSS.exe!content::CategorizedWorkerPool::ShouldRunTaskForCategoryWithLockAcquired(cc::TaskCategory) [categorized_worker_pool.cc : 423 + 0xc] rsp = 0x000000eaea5ff920 rip = 0x00007ff6d5d4a92c Found by: stack scanning Stack contents: 000000eaea5ff920 00 00 00 00 00 00 00 00 40 6b 88 89 a8 02 00 00 ........@k...... 000000eaea5ff930 c0 cd 85 89 a8 02 00 00 14 03 27 d4 f6 7f 00 00 ..........'..... 000000eaea5ff940 42 6b 88 89 a8 02 00 00 c0 cd 85 89 a8 02 00 00 Bk.............. 000000eaea5ff950 78 16 89 89 a8 02 00 00 c0 cd 85 89 a8 02 00 00 x............... 000000eaea5ff960 18 fc ff ff e7 03 00 00 00 a4 d4 d5 f6 7f 00 00 ................ Possible instruction pointers: *(0x000000eaea5ff938) = 0x00007ff6d4270314 [condition_variable_win.cc : 30 + 0x43] *(0x000000eaea5ff968) = 0x00007ff6d5d4a400 > const &)> [categorized_worker_pool.cc : 385 + 0x4] 4 Code - OSS.exe!content::CategorizedWorkerPool::RunTaskWithLockAcquired(std::__1::vector > const &) [categorized_worker_pool.cc : 385 + 0x4] rsp = 0x000000eaea5ff970 rip = 0x00007ff6d5d4a400 Found by: call frame info Stack contents: 000000eaea5ff970 00 16 89 89 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ff980 c0 cd 85 89 a8 02 00 00 26 f4 26 f5 5d 7f 00 00 ........&.&.]... 000000eaea5ff990 a0 ce 85 89 a8 02 00 00 d0 a3 d4 d5 f6 7f 00 00 ................ 000000eaea5ff9a0 f0 54 c2 59 fe 7f 00 00 20 16 89 89 a8 02 00 00 .T.Y.... ....... Possible instruction pointers: *(0x000000eaea5ff998) = 0x00007ff6d5d4a3d0 > const &,base::ConditionVariable *)> [categorized_worker_pool.cc : 280 + 0x8] 5 0x2a889891620 rsp = 0x000000eaea5ff9b0 rip = 0x000002a889891620 Found by: call frame info Stack contents: 000000eaea5ff9b0 20 16 89 89 a8 02 00 00 ab 1e 24 d4 f6 7f 00 00 .........$..... Possible instruction pointers: *(0x000000eaea5ff9b8) = 0x00007ff6d4241eab [simple_thread.cc : 75 + 0x0] 6 Code - OSS.exe!base::SimpleThread::ThreadMain() [simple_thread.cc : 74 + 0x9] rsp = 0x000000eaea5ff9c0 rip = 0x00007ff6d4241eab Found by: stack scanning Stack contents: 000000eaea5ff9c0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 000000eaea5ff9d0 f0 54 c2 59 fe 7f 00 00 f0 c2 81 89 a8 02 00 00 .T.Y............ 000000eaea5ff9e0 20 16 89 89 a8 02 00 00 7d 10 27 d4 f6 7f 00 00 .......}.'..... Possible instruction pointers: *(0x000000eaea5ff9e8) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x000000eaea5ff9f0 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 000000eaea5ff9f0 ff ff ff ff ff ff ff ff f0 c2 81 89 a8 02 00 00 ................ 000000eaea5ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ffa20 02 00 00 00 00 00 00 00 34 04 00 00 00 00 00 00 ........4....... 000000eaea5ffa30 34 04 00 00 00 00 00 00 96 f4 26 f5 5d 7f 00 00 4.........&.]... 000000eaea5ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ffa60 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x000000eaea5ffa70 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea5ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea5ffa90 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x000000eaea5ffaa0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 10 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x000002a88985cdf0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000002a88985cdf0 rbp = 0x000000eaea6ff780 rsp = 0x000000eaea6ff728 r8 = 0x000000eaea6ff8d8 r9 = 0x00007ff6d427104c r10 = 0x000000eaea6fd000 r11 = 0x000000eaea6fd000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000eaea6ff758 r15 = 0x000002a88985cea0 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaea6ff728 71 4f a7 5b fe 7f 00 00 qO.[.... Possible instruction pointers: 1 ntdll.dll + 0x64f71 rbp = 0x000000eaea6ff780 rsp = 0x000000eaea6ff730 rip = 0x00007ffe5ba74f71 Found by: stack scanning Stack contents: 000000eaea6ff730 00 00 00 00 a8 02 00 00 09 00 00 00 f6 7f 00 00 ................ 000000eaea6ff740 08 15 89 89 a8 02 00 00 c0 9e f5 8a a8 02 00 00 ................ 000000eaea6ff750 a0 f8 5f ea ea 00 00 00 a0 f8 5f ea ea 00 00 00 .._......._..... 000000eaea6ff760 00 00 00 00 00 00 00 00 c0 25 00 00 00 00 00 00 .........%...... 000000eaea6ff770 00 00 03 00 01 00 00 00 f0 cd 85 89 a8 02 00 00 ................ 000000eaea6ff780 50 99 89 89 a8 02 00 00 f0 cd 85 89 a8 02 00 00 P............... 000000eaea6ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff7a0 00 00 00 00 00 00 00 00 69 ab 53 59 fe 7f 00 00 ........i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rsp = 0x000000eaea6ff7b0 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 000000eaea6ff7b0 c0 cd 85 89 a8 02 00 00 a0 ce 85 89 a8 02 00 00 ................ 000000eaea6ff7c0 58 15 89 89 a8 02 00 00 2c a9 d4 d5 f6 7f 00 00 X.......,....... Possible instruction pointers: *(0x000000eaea6ff7c8) = 0x00007ff6d5d4a92c [categorized_worker_pool.cc : 423 + 0xc] 3 Code - OSS.exe!content::CategorizedWorkerPool::ShouldRunTaskForCategoryWithLockAcquired(cc::TaskCategory) [categorized_worker_pool.cc : 423 + 0xc] rsp = 0x000000eaea6ff7d0 rip = 0x00007ff6d5d4a92c Found by: stack scanning Stack contents: 000000eaea6ff7d0 00 00 00 00 00 00 00 00 b0 6c 88 89 a8 02 00 00 .........l...... 000000eaea6ff7e0 c0 cd 85 89 a8 02 00 00 14 03 27 d4 f6 7f 00 00 ..........'..... 000000eaea6ff7f0 b2 6c 88 89 a8 02 00 00 c0 cd 85 89 a8 02 00 00 .l.............. 000000eaea6ff800 58 15 89 89 a8 02 00 00 c0 cd 85 89 a8 02 00 00 X............... 000000eaea6ff810 18 fc ff ff e7 03 00 00 00 a4 d4 d5 f6 7f 00 00 ................ Possible instruction pointers: *(0x000000eaea6ff7e8) = 0x00007ff6d4270314 [condition_variable_win.cc : 30 + 0x43] *(0x000000eaea6ff818) = 0x00007ff6d5d4a400 > const &)> [categorized_worker_pool.cc : 385 + 0x4] 4 Code - OSS.exe!content::CategorizedWorkerPool::RunTaskWithLockAcquired(std::__1::vector > const &) [categorized_worker_pool.cc : 385 + 0x4] rsp = 0x000000eaea6ff820 rip = 0x00007ff6d5d4a400 Found by: call frame info Stack contents: 000000eaea6ff820 00 15 89 89 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff830 c0 cd 85 89 a8 02 00 00 96 fa 16 f5 5d 7f 00 00 ............]... 000000eaea6ff840 a0 ce 85 89 a8 02 00 00 d0 a3 d4 d5 f6 7f 00 00 ................ 000000eaea6ff850 f0 54 c2 59 fe 7f 00 00 00 15 89 89 a8 02 00 00 .T.Y............ Possible instruction pointers: *(0x000000eaea6ff848) = 0x00007ff6d5d4a3d0 > const &,base::ConditionVariable *)> [categorized_worker_pool.cc : 280 + 0x8] 5 0x2a889891500 rsp = 0x000000eaea6ff860 rip = 0x000002a889891500 Found by: call frame info Stack contents: 000000eaea6ff860 00 15 89 89 a8 02 00 00 ab 1e 24 d4 f6 7f 00 00 ..........$..... Possible instruction pointers: *(0x000000eaea6ff868) = 0x00007ff6d4241eab [simple_thread.cc : 75 + 0x0] 6 Code - OSS.exe!base::SimpleThread::ThreadMain() [simple_thread.cc : 74 + 0x9] rsp = 0x000000eaea6ff870 rip = 0x00007ff6d4241eab Found by: stack scanning Stack contents: 000000eaea6ff870 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 000000eaea6ff880 f0 54 c2 59 fe 7f 00 00 f0 c2 81 89 a8 02 00 00 .T.Y............ 000000eaea6ff890 00 15 89 89 a8 02 00 00 7d 10 27 d4 f6 7f 00 00 ........}.'..... Possible instruction pointers: *(0x000000eaea6ff898) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x000000eaea6ff8a0 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 000000eaea6ff8a0 ff ff ff ff ff ff ff ff f0 c2 81 89 a8 02 00 00 ................ 000000eaea6ff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff8d0 02 00 00 00 00 00 00 00 30 04 00 00 00 00 00 00 ........0....... 000000eaea6ff8e0 30 04 00 00 00 00 00 00 c6 f5 16 f5 5d 7f 00 00 0...........]... 000000eaea6ff8f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff910 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x000000eaea6ff920 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea6ff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea6ff940 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x000000eaea6ff950 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 11 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x000002a88985cdf0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000002a88985cdf0 rbp = 0x000000eaea7ff7a0 rsp = 0x000000eaea7ff748 r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x000002a88985cdf0 r11 = 0x000002a88985ceb8 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000eaea7ff770 r15 = 0x000002a88985ceb8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaea7ff748 71 4f a7 5b fe 7f 00 00 qO.[.... Possible instruction pointers: 1 ntdll.dll + 0x64f71 rbp = 0x000000eaea7ff7a0 rsp = 0x000000eaea7ff750 rip = 0x00007ffe5ba74f71 Found by: stack scanning Stack contents: 000000eaea7ff750 50 81 f2 8a a8 02 00 00 07 00 00 00 f6 7f 00 00 P............... 000000eaea7ff760 00 64 88 89 a8 02 00 00 90 fe f5 8a a8 02 00 00 .d.............. 000000eaea7ff770 00 00 00 00 00 00 00 00 70 f7 7f ea ea 00 00 00 ........p....... 000000eaea7ff780 00 00 00 00 00 00 00 00 70 22 00 00 00 00 00 00 ........p"...... 000000eaea7ff790 60 f8 7f ea 01 00 00 00 f0 cd 85 89 a8 02 00 00 `............... 000000eaea7ff7a0 d0 99 89 89 a8 02 00 00 f0 cd 85 89 a8 02 00 00 ................ 000000eaea7ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea7ff7c0 00 00 00 00 00 00 00 00 69 ab 53 59 fe 7f 00 00 ........i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rsp = 0x000000eaea7ff7d0 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 000000eaea7ff7d0 c0 cd 85 89 a8 02 00 00 b8 ce 85 89 a8 02 00 00 ................ 000000eaea7ff7e0 38 14 89 89 a8 02 00 00 2c a9 d4 d5 f6 7f 00 00 8.......,....... Possible instruction pointers: *(0x000000eaea7ff7e8) = 0x00007ff6d5d4a92c [categorized_worker_pool.cc : 423 + 0xc] 3 Code - OSS.exe!content::CategorizedWorkerPool::ShouldRunTaskForCategoryWithLockAcquired(cc::TaskCategory) [categorized_worker_pool.cc : 423 + 0xc] rsp = 0x000000eaea7ff7f0 rip = 0x00007ff6d5d4a92c Found by: stack scanning Stack contents: 000000eaea7ff7f0 f0 cd 85 89 a8 02 00 00 f0 cd 85 89 a8 02 00 00 ................ 000000eaea7ff800 c0 cd 85 89 a8 02 00 00 14 03 27 d4 f6 7f 00 00 ..........'..... 000000eaea7ff810 f0 6b 88 89 a8 02 00 00 c0 cd 85 89 a8 02 00 00 .k.............. 000000eaea7ff820 38 14 89 89 a8 02 00 00 c0 cd 85 89 a8 02 00 00 8............... 000000eaea7ff830 18 fc ff ff e7 03 00 00 00 a4 d4 d5 f6 7f 00 00 ................ Possible instruction pointers: *(0x000000eaea7ff808) = 0x00007ff6d4270314 [condition_variable_win.cc : 30 + 0x43] *(0x000000eaea7ff838) = 0x00007ff6d5d4a400 > const &)> [categorized_worker_pool.cc : 385 + 0x4] 4 Code - OSS.exe!content::CategorizedWorkerPool::RunTaskWithLockAcquired(std::__1::vector > const &) [categorized_worker_pool.cc : 385 + 0x4] rsp = 0x000000eaea7ff840 rip = 0x00007ff6d5d4a400 Found by: call frame info Stack contents: 000000eaea7ff840 00 64 88 89 a8 02 00 00 00 00 00 00 00 00 00 00 .d.............. 000000eaea7ff850 c0 cd 85 89 a8 02 00 00 76 f5 06 f5 5d 7f 00 00 ........v...]... 000000eaea7ff860 b8 ce 85 89 a8 02 00 00 d0 a3 d4 d5 f6 7f 00 00 ................ 000000eaea7ff870 f0 54 c2 59 fe 7f 00 00 e0 13 89 89 a8 02 00 00 .T.Y............ Possible instruction pointers: *(0x000000eaea7ff868) = 0x00007ff6d5d4a3d0 > const &,base::ConditionVariable *)> [categorized_worker_pool.cc : 280 + 0x8] 5 0x2a8898913e0 rsp = 0x000000eaea7ff880 rip = 0x000002a8898913e0 Found by: call frame info Stack contents: 000000eaea7ff880 e0 13 89 89 a8 02 00 00 ab 1e 24 d4 f6 7f 00 00 ..........$..... Possible instruction pointers: *(0x000000eaea7ff888) = 0x00007ff6d4241eab [simple_thread.cc : 75 + 0x0] 6 Code - OSS.exe!base::SimpleThread::ThreadMain() [simple_thread.cc : 74 + 0x9] rsp = 0x000000eaea7ff890 rip = 0x00007ff6d4241eab Found by: stack scanning Stack contents: 000000eaea7ff890 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 000000eaea7ff8a0 f0 54 c2 59 fe 7f 00 00 f0 c2 81 89 a8 02 00 00 .T.Y............ 000000eaea7ff8b0 e0 13 89 89 a8 02 00 00 7d 10 27 d4 f6 7f 00 00 ........}.'..... Possible instruction pointers: *(0x000000eaea7ff8b8) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x000000eaea7ff8c0 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 000000eaea7ff8c0 ff ff ff ff ff ff ff ff f0 c2 81 89 a8 02 00 00 ................ 000000eaea7ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea7ff8e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea7ff8f0 02 00 00 00 00 00 00 00 38 04 00 00 00 00 00 00 ........8....... 000000eaea7ff900 38 04 00 00 00 00 00 00 a6 f5 06 f5 5d 7f 00 00 8...........]... 000000eaea7ff910 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea7ff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea7ff930 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x000000eaea7ff940 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea7ff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea7ff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea7ff960 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x000000eaea7ff970 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 12 0 ntdll.dll + 0x9aeb4 rax = 0x0000000000000009 rdx = 0x000000eaea8ffd30 rcx = 0x00000000000002c8 rbx = 0x000000eaea8ffd28 rsi = 0x000002a88981aa90 rdi = 0x000000eaea8ffd3c rbp = 0x0000000000000000 rsp = 0x000000eaea8ffc98 r8 = 0x000000eaea8ffc88 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe5baaaeb4 Found by: given as instruction pointer in context Stack contents: 000000eaea8ffc98 bf e9 52 59 fe 7f 00 00 ..RY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x5e9bf rsp = 0x000000eaea8ffca0 rip = 0x00007ffe5952e9bf Found by: stack scanning Stack contents: 000000eaea8ffca0 e0 97 81 89 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffcb0 00 00 00 00 5d 7f 00 00 28 fd 8f ea ea 00 00 00 ....]...(....... 000000eaea8ffcc0 00 00 00 00 00 00 00 00 01 00 00 00 f6 7f 00 00 ................ 000000eaea8ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffcf0 28 fd 8f ea ea 00 00 00 25 18 63 d2 f6 7f 00 00 (.......%.c..... Possible instruction pointers: *(0x000000eaea8ffcf8) = 0x00007ff6d2631825 [node_bindings_win.cc : 44 + 0x0] 2 Code - OSS.exe!electron::NodeBindingsWin::PollEvents() [node_bindings_win.cc : 41 + 0x24] rsp = 0x000000eaea8ffd00 rip = 0x00007ff6d2631825 Found by: stack scanning Stack contents: 000000eaea8ffd00 80 11 63 d2 f6 7f 00 00 5f 14 63 d2 f6 7f 00 00 ..c....._.c..... 000000eaea8ffd10 00 00 00 00 00 00 00 00 78 ad 81 89 a8 02 00 00 ........x....... 000000eaea8ffd20 ff ff ff ff a8 02 00 00 92 70 88 d4 f6 7f 00 00 .........p...... 000000eaea8ffd30 80 11 63 d2 f6 7f 00 00 80 11 63 d2 f6 7f 00 00 ..c.......c..... 000000eaea8ffd40 66 f0 f6 f5 5d 7f 00 00 78 ad 81 89 a8 02 00 00 f...]...x....... 000000eaea8ffd50 90 aa 81 89 a8 02 00 00 a7 11 63 d2 f6 7f 00 00 ..........c..... Possible instruction pointers: *(0x000000eaea8ffd00) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x000000eaea8ffd08) = 0x00007ff6d263145f [node_bindings.cc : 434 + 0x21] *(0x000000eaea8ffd28) = 0x00007ff6d4887092 [thread.c : 372 + 0xe] *(0x000000eaea8ffd30) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x000000eaea8ffd38) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x000000eaea8ffd58) = 0x00007ff6d26311a7 [node_bindings.cc : 458 + 0x0] 3 Code - OSS.exe!electron::NodeBindings::EmbedThreadRunner(void *) [node_bindings.cc : 457 + 0x9] rsp = 0x000000eaea8ffd60 rip = 0x00007ff6d26311a7 Found by: call frame info Stack contents: 000000eaea8ffd60 90 6c 88 d4 f6 7f 00 00 00 00 00 00 00 00 00 00 .l.............. 000000eaea8ffd70 00 00 00 00 00 00 00 00 80 11 63 d2 f6 7f 00 00 ..........c..... 000000eaea8ffd80 5c 04 00 00 00 00 00 00 5c 04 00 00 00 00 00 00 \.......\....... 000000eaea8ffd90 90 aa 81 89 a8 02 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x000000eaea8ffd60) = 0x00007ff6d4886c90 [thread.c : 84 + 0x0] *(0x000000eaea8ffd78) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x000000eaea8ffd98) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 4 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x000000eaea8ffda0 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 000000eaea8ffda0 80 11 63 d2 f6 7f 00 00 90 aa 81 89 a8 02 00 00 ..c............. 000000eaea8ffdb0 01 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffdc0 10 45 fb 8a a8 02 00 00 00 00 00 00 00 00 00 00 .E.............. 000000eaea8ffdd0 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x000000eaea8ffda0) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x000000eaea8ffdd8) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 5 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x000000eaea8ffde0 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 000000eaea8ffde0 00 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffe00 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 6 kernel32.dll + 0x16fd4 rsp = 0x000000eaea8ffe10 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaea8ffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffe20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaea8ffe30 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 7 ntdll.dll + 0x4cec1 rsp = 0x000000eaea8ffe40 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 13 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x000000000000046c rbx = 0x0000000000000000 rsi = 0x000000eaea9ff658 rdi = 0x000000000000046c rbp = 0x000002a88af83100 rsp = 0x000000eaea9ff628 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x000000eaea9ff6f0 r13 = 0x000000eaea9ff828 r14 = 0x000000000000046c r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 000000eaea9ff628 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x000002a88af83100 rsp = 0x000000eaea9ff630 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 000000eaea9ff630 00 31 f8 8a a8 02 00 00 e0 8d 84 89 a8 02 00 00 .1.............. 000000eaea9ff640 08 f7 9f ea ea 00 00 00 61 e0 27 d4 f6 7f 00 00 ........a.'..... Possible instruction pointers: *(0x000000eaea9ff648) = 0x00007ff6d427e061 [time_win.cc : 432 + 0x6] 2 Code - OSS.exe!base::`anonymous namespace'::RolloverProtectedNow [time_win.cc : 432 + 0x6] rbp = 0x000002a88af83100 rsp = 0x000000eaea9ff650 rip = 0x00007ff6d427e061 Found by: stack scanning Thread 14 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x000000eaeaaffce8 rdi = 0x0000000000000000 rbp = 0x000000eaeaaffd10 rsp = 0x000000eaeaaffcb8 r8 = 0x0000000000000001 r9 = 0x00007ff6d85640c8 r10 = 0x00007ff6d8564108 r11 = 0x000000eaeaaffd10 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaeaaffcb8 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x000000eaeaaffd10 rsp = 0x000000eaeaaffcc0 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 000000eaeaaffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffcd0 d0 fa bf ea ea 00 00 00 e8 fc af ea ea 00 00 00 ................ 000000eaeaaffce0 d0 fa bf ea ea 00 00 00 10 f7 cf ea ea 00 00 00 ................ 000000eaeaaffcf0 00 00 00 00 00 00 00 00 bc 07 00 00 00 00 00 00 ................ 000000eaeaaffd00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffd10 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeaaffd10) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeaaffd18 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeaaffd18 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x000000eaeaaffd18) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x000000eaeaaffd20 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 000000eaeaaffd20 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x000000eaeaaffd20) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x000000eaeaaffd28 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 000000eaeaaffd28 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x000000eaeaaffd30 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 000000eaeaaffd30 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeaaffd30) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeaaffd38 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeaaffd38 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x000000eaeaaffd38) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x000000eaeaaffd40 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 000000eaeaaffd40 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x000000eaeaaffd40) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x000000eaeaaffd48 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 000000eaeaaffd48 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x000000eaeaaffd50) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeaaffd58 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeaaffd58 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x000000eaeaaffd58) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x000000eaeaaffd60 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 000000eaeaaffd60 08 41 56 d8 f6 7f 00 00 d0 00 00 00 00 00 00 00 .AV............. 000000eaeaaffd70 00 00 00 00 00 00 00 00 c8 40 56 d8 f6 7f 00 00 .........@V..... 000000eaeaaffd80 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x000000eaeaaffd60) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeaaffd78) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] *(0x000000eaeaaffd80) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x000000eaeaaffd88) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x000000eaeaaffd90 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 000000eaeaaffd90 e0 23 3e d5 f6 7f 00 00 40 74 05 8b a8 02 00 00 .#>.....@t...... 000000eaeaaffda0 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 000000eaeaaffdb0 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 000000eaeaaffdc0 00 00 00 00 00 00 00 00 d8 04 00 00 00 00 00 00 ................ 000000eaeaaffdd0 b8 cf 8f e9 ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffdf0 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x000000eaeaaffd90) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeaaffda0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x000000eaeaaffda8) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeaaffdb8) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeaaffdf8) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x000000eaeaaffe00 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 000000eaeaaffe00 e0 23 3e d5 f6 7f 00 00 b8 cf 8f e9 ea 00 00 00 .#>............. 000000eaeaaffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffe20 90 3d 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 .=.............. 000000eaeaaffe30 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x000000eaeaaffe00) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeaaffe38) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x000000eaeaaffe40 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 000000eaeaaffe40 90 3d 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 .=.............. 000000eaeaaffe50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffe60 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x000000eaeaaffe70 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaeaaffe70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaaffe90 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x000000eaeaaffea0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 15 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x000000eaeabffad8 rdi = 0x0000000000000000 rbp = 0x000000eaeabffb00 rsp = 0x000000eaeabffaa8 r8 = 0x00007ff6d8814400 r9 = 0x00007ff6d85165d0 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaeabffaa8 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x000000eaeabffb00 rsp = 0x000000eaeabffab0 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 000000eaeabffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffac0 80 f8 df ea ea 00 00 00 d8 fa bf ea ea 00 00 00 ................ 000000eaeabffad0 80 f8 df ea ea 00 00 00 10 f7 cf ea ea 00 00 00 ................ 000000eaeabffae0 e0 fc af ea ea 00 00 00 bc 2b 00 00 00 00 00 00 .........+...... 000000eaeabffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffb00 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeabffb00) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeabffb08 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeabffb08 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x000000eaeabffb08) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x000000eaeabffb10 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 000000eaeabffb10 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x000000eaeabffb10) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x000000eaeabffb18 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 000000eaeabffb18 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x000000eaeabffb20 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 000000eaeabffb20 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeabffb20) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeabffb28 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeabffb28 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x000000eaeabffb28) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x000000eaeabffb30 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 000000eaeabffb30 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x000000eaeabffb30) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x000000eaeabffb38 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 000000eaeabffb38 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x000000eaeabffb40) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeabffb48 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeabffb48 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x000000eaeabffb48) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x000000eaeabffb50 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 000000eaeabffb50 08 41 56 d8 f6 7f 00 00 d0 00 00 00 00 00 00 00 .AV............. 000000eaeabffb60 30 41 56 d8 f6 7f 00 00 c8 40 56 d8 f6 7f 00 00 0AV......@V..... 000000eaeabffb70 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x000000eaeabffb50) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeabffb60) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x000000eaeabffb68) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] *(0x000000eaeabffb70) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x000000eaeabffb78) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x000000eaeabffb80 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 000000eaeabffb80 e0 23 3e d5 f6 7f 00 00 e0 75 05 8b a8 02 00 00 .#>......u...... 000000eaeabffb90 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 000000eaeabffba0 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 000000eaeabffbb0 00 00 00 00 00 00 00 00 cc 04 00 00 00 00 00 00 ................ 000000eaeabffbc0 b8 cf 8f e9 ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffbe0 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x000000eaeabffb80) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeabffb90) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x000000eaeabffb98) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeabffba8) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeabffbe8) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x000000eaeabffbf0 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 000000eaeabffbf0 e0 23 3e d5 f6 7f 00 00 b8 cf 8f e9 ea 00 00 00 .#>............. 000000eaeabffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffc10 30 43 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 0C.............. 000000eaeabffc20 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x000000eaeabffbf0) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeabffc28) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x000000eaeabffc30 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 000000eaeabffc30 30 43 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 0C.............. 000000eaeabffc40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffc50 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x000000eaeabffc60 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaeabffc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeabffc80 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x000000eaeabffc90 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 16 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x000000eaeacff718 rdi = 0x0000000000000000 rbp = 0x000000eaeacff740 rsp = 0x000000eaeacff6e8 r8 = 0x000002a8879b07e0 r9 = 0x0000000000000004 r10 = 0x0000000000000000 r11 = 0x000000eaeacff740 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaeacff6e8 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x000000eaeacff740 rsp = 0x000000eaeacff6f0 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 000000eaeacff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff700 e0 fc af ea ea 00 00 00 18 f7 cf ea ea 00 00 00 ................ 000000eaeacff710 00 00 00 00 00 00 00 00 e0 fc af ea ea 00 00 00 ................ 000000eaeacff720 80 f8 df ea ea 00 00 00 80 00 00 00 00 00 00 00 ................ 000000eaeacff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff740 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeacff740) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeacff748 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeacff748 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x000000eaeacff748) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x000000eaeacff750 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 000000eaeacff750 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x000000eaeacff750) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x000000eaeacff758 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 000000eaeacff758 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x000000eaeacff760 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 000000eaeacff760 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeacff760) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeacff768 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeacff768 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x000000eaeacff768) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x000000eaeacff770 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 000000eaeacff770 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x000000eaeacff770) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x000000eaeacff778 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 000000eaeacff778 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x000000eaeacff780) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeacff788 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeacff788 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x000000eaeacff788) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x000000eaeacff790 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 000000eaeacff790 08 41 56 d8 f6 7f 00 00 d0 00 00 00 00 00 00 00 .AV............. 000000eaeacff7a0 00 00 00 00 00 00 00 00 c8 40 56 d8 f6 7f 00 00 .........@V..... 000000eaeacff7b0 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x000000eaeacff790) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeacff7a8) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] *(0x000000eaeacff7b0) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x000000eaeacff7b8) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x000000eaeacff7c0 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 000000eaeacff7c0 e0 23 3e d5 f6 7f 00 00 e0 72 05 8b a8 02 00 00 .#>......r...... 000000eaeacff7d0 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 000000eaeacff7e0 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 000000eaeacff7f0 00 00 00 00 00 00 00 00 e0 04 00 00 00 00 00 00 ................ 000000eaeacff800 b8 cf 8f e9 ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff820 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x000000eaeacff7c0) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeacff7d0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x000000eaeacff7d8) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeacff7e8) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeacff828) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x000000eaeacff830 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 000000eaeacff830 e0 23 3e d5 f6 7f 00 00 b8 cf 8f e9 ea 00 00 00 .#>............. 000000eaeacff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff850 c0 3d 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 .=.............. 000000eaeacff860 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x000000eaeacff830) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeacff868) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x000000eaeacff870 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 000000eaeacff870 c0 3d 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 .=.............. 000000eaeacff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff890 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x000000eaeacff8a0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaeacff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeacff8c0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x000000eaeacff8d0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 17 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x000000eaeadff888 rdi = 0x0000000000000000 rbp = 0x000000eaeadff8b0 rsp = 0x000000eaeadff858 r8 = 0x0000000000000001 r9 = 0x00007ff6d85640c8 r10 = 0x00007ff6d85640c8 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaeadff858 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x000000eaeadff8b0 rsp = 0x000000eaeadff860 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 000000eaeadff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadff870 10 f7 cf ea ea 00 00 00 88 f8 df ea ea 00 00 00 ................ 000000eaeadff880 10 f7 cf ea ea 00 00 00 e0 fc af ea ea 00 00 00 ................ 000000eaeadff890 d0 fa bf ea ea 00 00 00 50 0b 00 00 00 00 00 00 ........P....... 000000eaeadff8a0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadff8b0 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeadff8b0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeadff8b8 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeadff8b8 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x000000eaeadff8b8) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x000000eaeadff8c0 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 000000eaeadff8c0 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x000000eaeadff8c0) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x000000eaeadff8c8 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 000000eaeadff8c8 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x000000eaeadff8d0 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 000000eaeadff8d0 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x000000eaeadff8d0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeadff8d8 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeadff8d8 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x000000eaeadff8d8) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x000000eaeadff8e0 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 000000eaeadff8e0 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x000000eaeadff8e0) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x000000eaeadff8e8 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 000000eaeadff8e8 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x000000eaeadff8f0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x000000eaeadff8f8 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 000000eaeadff8f8 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x000000eaeadff8f8) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x000000eaeadff900 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 000000eaeadff900 30 41 56 d8 f6 7f 00 00 70 41 56 d8 f6 7f 00 00 0AV.....pAV..... 000000eaeadff910 50 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 PAV......AV..... 000000eaeadff920 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x000000eaeadff900) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x000000eaeadff908) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] *(0x000000eaeadff910) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x000000eaeadff918) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeadff920) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x000000eaeadff928) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x000000eaeadff930 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 000000eaeadff930 e0 23 3e d5 f6 7f 00 00 c0 78 05 8b a8 02 00 00 .#>......x...... 000000eaeadff940 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 000000eaeadff950 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 000000eaeadff960 00 00 00 00 00 00 00 00 e4 04 00 00 00 00 00 00 ................ 000000eaeadff970 b8 cf 8f e9 ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadff990 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x000000eaeadff930) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeadff940) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x000000eaeadff948) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x000000eaeadff958) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeadff998) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x000000eaeadff9a0 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 000000eaeadff9a0 e0 23 3e d5 f6 7f 00 00 b8 cf 8f e9 ea 00 00 00 .#>............. 000000eaeadff9b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadff9c0 f0 43 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 .C.............. 000000eaeadff9d0 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x000000eaeadff9a0) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x000000eaeadff9d8) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x000000eaeadff9e0 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 000000eaeadff9e0 f0 43 14 8b a8 02 00 00 00 00 00 00 00 00 00 00 .C.............. 000000eaeadff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadffa00 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x000000eaeadffa10 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 000000eaeadffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeadffa30 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x000000eaeadffa40 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 18 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x000000eaeafff780 rcx = 0x000002a889a16010 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000002a889a16010 rbp = 0x000000eaeafff730 rsp = 0x000000eaeafff6d8 r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x000002a889a16010 r11 = 0x000002a889a16058 r12 = 0x000000eaeafff780 r13 = 0x0000000000000000 r14 = 0x000000eaeafff700 r15 = 0x000002a889a16058 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaeafff6d8 71 4f a7 5b fe 7f 00 00 70 f8 ff ea ea 00 00 00 qO.[....p....... 000000eaeafff6e8 50 60 a1 89 a8 02 00 00 00 00 00 00 00 00 00 00 P`.............. 000000eaeafff6f8 08 60 a1 89 a8 02 00 00 00 00 00 00 00 00 00 00 .`.............. 000000eaeafff708 00 f7 ff ea ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafff718 d4 10 00 00 00 00 00 00 00 60 a1 89 01 00 00 00 .........`...... 000000eaeafff728 10 60 a1 89 a8 02 00 00 70 f8 ff ea ea 00 00 00 .`......p....... 000000eaeafff738 50 60 a1 89 a8 02 00 00 P`...... Possible instruction pointers: 1 0x2a889a16050 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff740 rip = 0x000002a889a16050 Found by: previous frame's frame pointer Stack contents: 000000eaeafff740 00 00 00 00 00 00 00 00 08 60 a1 89 a8 02 00 00 .........`...... 000000eaeafff750 00 60 a1 89 a8 02 00 00 69 ab 53 59 fe 7f 00 00 .`......i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff760 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 000000eaeafff760 d0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafff770 00 c7 a5 4d fe 7f 00 00 ...M.... Possible instruction pointers: 3 spdlog.node + 0x8c700 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff778 rip = 0x00007ffe4da5c700 Found by: stack scanning Stack contents: 000000eaeafff778 00 00 00 00 00 00 00 00 00 d3 ce fe ff ff ff ff ................ 000000eaeafff788 00 63 a1 89 a8 02 00 00 d0 07 00 00 00 00 00 00 .c.............. 000000eaeafff798 cc bf 9e 4d fe 7f 00 00 ...M.... Possible instruction pointers: 4 spdlog.node + 0x1bfcc rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff7a0 rip = 0x00007ffe4d9ebfcc Found by: stack scanning Stack contents: 000000eaeafff7a0 d0 07 00 00 00 00 00 00 00 60 a1 89 a8 02 00 00 .........`...... 000000eaeafff7b0 00 00 00 00 00 00 00 00 00 c7 a5 4d fe 7f 00 00 ...........M.... Possible instruction pointers: 5 spdlog.node + 0x8c700 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff7c0 rip = 0x00007ffe4da5c700 Found by: stack scanning Stack contents: 000000eaeafff7c0 f8 5f a1 89 a8 02 00 00 af be 9e 4d fe 7f 00 00 ._.........M.... Possible instruction pointers: 6 spdlog.node + 0x1beaf rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff7d0 rip = 0x00007ffe4d9ebeaf Found by: stack scanning Stack contents: 000000eaeafff7d0 00 00 00 00 00 00 00 00 b0 5f a1 89 a8 02 00 00 ........._...... 000000eaeafff7e0 e0 4f c3 59 fe 7f 00 00 .O.Y.... Possible instruction pointers: 7 kernel32.dll + 0x24fe0 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff7e8 rip = 0x00007ffe59c34fe0 Found by: stack scanning Stack contents: 000000eaeafff7e8 42 36 9f 4d fe 7f 00 00 B6.M.... Possible instruction pointers: 8 spdlog.node + 0x23642 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff7f0 rip = 0x00007ffe4d9f3642 Found by: stack scanning Stack contents: 000000eaeafff7f0 0e c9 f9 5e 00 00 00 00 f8 52 06 09 fe 7f 00 00 ...^.....R...... 000000eaeafff800 e8 f1 d2 47 d1 38 00 00 00 00 00 00 00 00 00 00 ...G.8.......... 000000eaeafff810 00 00 00 00 00 00 00 00 e0 f8 ff ea ea 00 00 00 ................ 000000eaeafff820 00 00 00 00 00 00 00 00 f8 5f a1 89 a8 02 00 00 ........._...... 000000eaeafff830 b0 5f a1 89 a8 02 00 00 c0 f9 ff ea ea 00 00 00 ._.............. 000000eaeafff840 00 00 00 00 00 00 00 00 47 d1 9d 4d fe 7f 00 00 ........G..M.... Possible instruction pointers: 9 spdlog.node + 0xd147 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff850 rip = 0x00007ffe4d9dd147 Found by: stack scanning Stack contents: 000000eaeafff850 00 00 00 00 00 00 00 00 42 36 9f 4d fe 7f 00 00 ........B6.M.... Possible instruction pointers: 10 spdlog.node + 0x23642 rbp = 0x000000eaeafff870 rsp = 0x000000eaeafff860 rip = 0x00007ffe4d9f3642 Found by: stack scanning Stack contents: 000000eaeafff860 00 00 00 00 00 00 00 00 b0 5f a1 89 a8 02 00 00 ........._...... 000000eaeafff870 10 c9 f9 5e 00 00 00 00 a0 50 06 09 a8 02 00 00 ...^.....P...... 000000eaeafff880 68 fe d2 47 d1 38 00 00 ae 2d 9f 4d fe 7f 00 00 h..G.8...-.M.... Possible instruction pointers: 11 spdlog.node + 0x22dae rsp = 0x000000eaeafff890 rip = 0x00007ffe4d9f2dae Found by: stack scanning Stack contents: 000000eaeafff890 c0 f9 ff ea ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafff8a0 00 00 00 00 00 00 00 00 90 b9 a0 89 a8 02 00 00 ................ 000000eaeafff8b0 b0 5f a1 89 a8 02 00 00 20 84 9d 4d fe 7f 00 00 ._...... ..M.... Possible instruction pointers: 12 spdlog.node + 0x8420 rsp = 0x000000eaeafff8c0 rip = 0x00007ffe4d9d8420 Found by: stack scanning Stack contents: 000000eaeafff8c0 5f 55 58 0e 04 4e d6 01 b0 5f a1 89 a8 02 00 00 _UX..N..._...... 000000eaeafff8d0 d0 07 00 00 00 00 00 00 b0 5f a1 89 a8 02 00 00 ........._...... 000000eaeafff8e0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafff8f0 74 20 00 00 00 00 00 00 00 64 a0 89 a8 02 00 00 t .......d...... 000000eaeafff900 c7 17 5f 76 57 fd ff ff 00 00 00 00 00 00 00 00 .._vW........... 000000eaeafff910 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafff920 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 000000eaeafff930 b0 5f a1 89 a8 02 00 00 04 00 00 00 00 00 00 00 ._.............. 000000eaeafff940 99 20 7c ee 22 9c 38 00 74 20 00 00 00 00 00 00 . |.".8.t ...... 000000eaeafff950 b8 2b a7 4d fe 7f 00 00 .+.M.... Possible instruction pointers: 13 spdlog.node + 0xa2bb8 rsp = 0x000000eaeafff958 rip = 0x00007ffe4da72bb8 Found by: stack scanning Stack contents: 000000eaeafff958 60 f9 ff ea ea 00 00 00 50 2a a7 4d fe 7f 00 00 `.......P*.M.... Possible instruction pointers: 14 spdlog.node + 0xa2a50 rsp = 0x000000eaeafff968 rip = 0x00007ffe4da72a50 Found by: stack scanning Stack contents: 000000eaeafff968 80 f9 ff ea ea 00 00 00 7e 00 00 00 00 00 00 00 ........~....... 000000eaeafff978 f4 01 00 00 00 00 00 00 5b 46 69 6c 65 20 57 61 ........[File Wa 000000eaeafff988 74 63 68 65 72 20 28 6e 6f 64 65 2e 6a 73 29 5d tcher (node.js)] 000000eaeafff998 20 45 72 72 6f 72 3a 20 45 4e 4f 45 4e 54 3a 20 Error: ENOENT: 000000eaeafff9a8 6e 6f 20 73 75 63 68 20 66 69 6c 65 20 6f 72 20 no such file or 000000eaeafff9b8 64 69 72 65 63 74 6f 72 79 2c 20 73 74 61 74 20 directory, stat 000000eaeafff9c8 27 63 3a 5c 55 73 65 72 73 5c 62 70 61 73 65 72 'c:\Users\bpaser 000000eaeafff9d8 6f 5c 44 65 73 6b 74 6f 70 5c 63 72 61 73 68 2d o\Desktop\crash- 000000eaeafff9e8 6f 73 73 2d 64 65 76 5c 55 73 65 72 5c 73 6e 69 oss-dev\User\sni 000000eaeafff9f8 70 70 65 74 73 27 00 00 04 00 00 00 00 00 00 00 ppets'.......... 000000eaeafffa08 00 02 00 00 00 00 00 00 50 fa ff ea ea 00 00 00 ........P....... 000000eaeafffa18 0c 51 a4 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 15 ntdll.dll + 0x3510c rsp = 0x000000eaeafffa20 rip = 0x00007ffe5ba4510c Found by: stack scanning Stack contents: 000000eaeafffa20 65 1d 81 d0 00 00 00 00 00 00 00 00 00 00 00 00 e............... 000000eaeafffa30 00 00 00 00 00 00 00 00 43 54 a4 5b fe 7f 00 00 ........CT.[.... Possible instruction pointers: 16 ntdll.dll + 0x35443 rsp = 0x000000eaeafffa40 rip = 0x00007ffe5ba45443 Found by: stack scanning Stack contents: 000000eaeafffa40 00 00 00 00 ea 00 00 00 f8 44 a8 5b fe 7f 00 00 .........D.[.... Possible instruction pointers: 17 ntdll.dll + 0x744f8 rsp = 0x000000eaeafffa50 rip = 0x00007ffe5ba844f8 Found by: stack scanning Stack contents: 000000eaeafffa50 24 00 d8 00 ea 00 00 00 b8 fb ff ea ea 00 00 00 $............... 000000eaeafffa60 10 fd ff ea ea 00 00 00 ec 4d a4 5b fe 7f 00 00 .........M.[.... Possible instruction pointers: 18 ntdll.dll + 0x34dec rsp = 0x000000eaeafffa70 rip = 0x00007ffe5ba44dec Found by: stack scanning Stack contents: 000000eaeafffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffa80 00 00 00 00 00 00 00 00 10 fd ff ea ea 00 00 00 ................ 000000eaeafffa90 00 00 00 00 ea 00 00 00 e8 00 ce 57 fe 7f 00 00 ...........W.... Possible instruction pointers: 19 kernel.appcore.dll + 0xe8 rsp = 0x000000eaeafffaa0 rip = 0x00007ffe57ce00e8 Found by: stack scanning Stack contents: 000000eaeafffaa0 20 fd ff ea ea 00 00 00 6d 4b a4 5b fe 7f 00 00 .......mK.[.... Possible instruction pointers: 20 ntdll.dll + 0x34b6d rsp = 0x000000eaeafffab0 rip = 0x00007ffe5ba44b6d Found by: stack scanning Stack contents: 000000eaeafffab0 01 58 b6 87 a8 02 00 00 98 34 a3 5b fe 7f 00 00 .X.......4.[.... Possible instruction pointers: 21 ntdll.dll + 0x23498 rsp = 0x000000eaeafffac0 rip = 0x00007ffe5ba33498 Found by: stack scanning Stack contents: 000000eaeafffac0 01 00 00 00 ea 00 00 00 80 fb ff ea ea 00 00 00 ................ 000000eaeafffad0 01 00 00 00 00 00 00 00 40 fb ff ea ea 00 00 00 ........@....... 000000eaeafffae0 48 fb ff ea ea 00 00 00 00 00 00 00 00 00 00 00 H............... 000000eaeafffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffb00 01 00 00 00 00 00 00 00 c8 fc ff ea ea 00 00 00 ................ 000000eaeafffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffb20 20 d5 a5 4d fe 7f 00 00 ..M.... Possible instruction pointers: 22 spdlog.node + 0x8d520 rsp = 0x000000eaeafffb28 rip = 0x00007ffe4da5d520 Found by: stack scanning Stack contents: 000000eaeafffb28 40 fc ff ea ea 00 00 00 00 00 00 00 00 00 00 00 @............... 000000eaeafffb38 45 19 a3 5b fe 7f 00 00 E..[.... Possible instruction pointers: 23 ntdll.dll + 0x21945 rsp = 0x000000eaeafffb40 rip = 0x00007ffe5ba31945 Found by: stack scanning Stack contents: 000000eaeafffb40 00 00 ce 57 fe 7f 00 00 ...W.... Possible instruction pointers: 24 0x7ffe57ce0000 rsp = 0x000000eaeafffb48 rip = 0x00007ffe57ce0000 Found by: stack scanning Stack contents: 000000eaeafffb48 00 00 00 00 00 00 00 00 40 58 b6 87 a8 02 00 00 ........@X...... 000000eaeafffb58 40 fc ff ea ea 00 00 00 10 fd ff ea ea 00 00 00 @............... 000000eaeafffb68 78 fb ff ea ea 00 00 00 00 02 00 00 00 00 00 00 x............... 000000eaeafffb78 48 2a a7 4d fe 7f 00 00 H*.M.... Possible instruction pointers: 25 spdlog.node + 0xa2a48 rsp = 0x000000eaeafffb80 rip = 0x00007ffe4da72a48 Found by: stack scanning Stack contents: 000000eaeafffb80 88 fb ff ea ea 00 00 00 50 2a a7 4d fe 7f 00 00 ........P*.M.... Possible instruction pointers: 26 spdlog.node + 0xa2a50 rsp = 0x000000eaeafffb90 rip = 0x00007ffe4da72a50 Found by: stack scanning Stack contents: 000000eaeafffb90 a8 fb ff ea ea 00 00 00 b2 00 00 00 00 00 00 00 ................ 000000eaeafffba0 f4 01 00 00 00 00 00 00 5b 32 30 32 30 2d 30 36 ........[2020-06 000000eaeafffbb0 2d 32 39 20 31 32 3a 34 30 3a 35 33 2e 39 37 33 -29 12:40:53.973 000000eaeafffbc0 5d 20 5b 73 68 61 72 65 64 70 72 6f 63 65 73 73 ] [sharedprocess 000000eaeafffbd0 5d 20 5b 65 72 72 6f 72 5d 20 5b 46 69 6c 65 20 ] [error] [File 000000eaeafffbe0 57 61 74 63 68 65 72 20 28 6e 6f 64 65 2e 6a 73 Watcher (node.js 000000eaeafffbf0 29 5d 20 45 72 72 6f 72 3a 20 45 4e 4f 45 4e 54 )] Error: ENOENT 000000eaeafffc00 3a 20 6e 6f 20 73 75 63 68 20 66 69 6c 65 20 6f : no such file o 000000eaeafffc10 72 20 64 69 72 65 63 74 6f 72 79 2c 20 73 74 61 r directory, sta 000000eaeafffc20 74 20 27 63 3a 5c 55 73 65 72 73 5c 62 70 61 73 t 'c:\Users\bpas 000000eaeafffc30 65 72 6f 5c 44 65 73 6b 74 6f 70 5c 63 72 61 73 ero\Desktop\cras 000000eaeafffc40 68 2d 6f 73 73 2d 64 65 76 5c 55 73 65 72 5c 73 h-oss-dev\User\s 000000eaeafffc50 6e 69 70 70 65 74 73 27 0d 0a a3 5b fe 7f 00 00 nippets'...[.... Possible instruction pointers: 27 ntdll.dll + 0x20a0d rsp = 0x000000eaeafffc60 rip = 0x00007ffe5ba30a0d Found by: stack scanning Stack contents: 000000eaeafffc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffc70 80 d3 b6 87 a8 02 00 00 b0 e7 b6 87 a8 02 00 00 ................ 000000eaeafffc80 00 00 00 00 00 00 00 00 f9 12 a3 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 28 ntdll.dll + 0x212f9 rsp = 0x000000eaeafffc90 rip = 0x00007ffe5ba312f9 Found by: stack scanning Stack contents: 000000eaeafffc90 c8 63 a4 4d fe 7f 00 00 .c.M.... Possible instruction pointers: 29 spdlog.node + 0x763c8 rsp = 0x000000eaeafffc98 rip = 0x00007ffe4da463c8 Found by: stack scanning Stack contents: 000000eaeafffc98 90 fd ff ea ea 00 00 00 80 d3 b6 87 a8 02 00 00 ................ 000000eaeafffca8 00 00 00 00 00 00 00 00 01 00 00 00 ea 00 00 00 ................ 000000eaeafffcb8 c8 fc ff ea ea 00 00 00 00 08 00 00 00 00 00 00 ................ 000000eaeafffcc8 70 34 ce 57 fe 7f 00 00 p4.W.... Possible instruction pointers: 30 kernel.appcore.dll + 0x3470 rsp = 0x000000eaeafffcd0 rip = 0x00007ffe57ce3470 Found by: stack scanning Stack contents: 000000eaeafffcd0 09 00 00 00 01 00 00 00 09 00 00 00 00 00 00 00 ................ 000000eaeafffce0 00 00 00 00 00 00 00 00 c8 63 a4 4d fe 7f 00 00 .........c.M.... Possible instruction pointers: 31 spdlog.node + 0x763c8 rsp = 0x000000eaeafffcf0 rip = 0x00007ffe4da463c8 Found by: stack scanning Stack contents: 000000eaeafffcf0 b0 e7 b6 87 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffd00 00 00 00 00 00 00 00 00 48 fe ff ea ea 00 00 00 ........H....... 000000eaeafffd10 80 d3 b6 87 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffd30 00 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 ................ 000000eaeafffd40 20 b0 a6 4d fe 7f 00 00 ..M.... Possible instruction pointers: 32 spdlog.node + 0x9b020 rsp = 0x000000eaeafffd48 rip = 0x00007ffe4da6b020 Found by: stack scanning Stack contents: 000000eaeafffd48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffd58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffd68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffd78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffd88 00 00 00 00 00 00 00 00 15 91 fe a7 97 a4 00 00 ................ 000000eaeafffd98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffda8 2b 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 +.......0....... 000000eaeafffdb8 20 d5 a5 4d fe 7f 00 00 ..M.... Possible instruction pointers: 33 spdlog.node + 0x8d520 rsp = 0x000000eaeafffdc0 rip = 0x00007ffe4da5d520 Found by: stack scanning Stack contents: 000000eaeafffdc0 f8 fe d2 47 d1 38 00 00 1b 33 9f 4d fe 7f 00 00 ...G.8...3.M.... Possible instruction pointers: 34 spdlog.node + 0x2331b rsp = 0x000000eaeafffdd0 rip = 0x00007ffe4d9f331b Found by: stack scanning Stack contents: 000000eaeafffdd0 00 00 00 00 00 00 00 00 6f 83 9d 4d fe 7f 00 00 ........o..M.... Possible instruction pointers: 35 spdlog.node + 0x836f rsp = 0x000000eaeafffde0 rip = 0x00007ffe4d9d836f Found by: stack scanning Stack contents: 000000eaeafffde0 00 00 00 00 00 00 00 00 b0 5f a1 89 a8 02 00 00 ........._...... 000000eaeafffdf0 00 00 00 00 00 00 00 00 90 b9 a0 89 a8 02 00 00 ................ 000000eaeafffe00 01 bb 8f e9 ea 00 00 00 b0 5f a1 89 a8 02 00 00 ........._...... 000000eaeafffe10 fe ff ff ff ff ff ff ff 60 bf c4 87 a8 02 00 00 ........`....... 000000eaeafffe20 bc c3 9e 4d fe 7f 00 00 ...M.... Possible instruction pointers: 36 spdlog.node + 0x1c3bc rsp = 0x000000eaeafffe28 rip = 0x00007ffe4d9ec3bc Found by: stack scanning Stack contents: 000000eaeafffe28 28 c5 9e 4d fe 7f 00 00 (..M.... Possible instruction pointers: 37 spdlog.node + 0x1c528 rsp = 0x000000eaeafffe30 rip = 0x00007ffe4d9ec528 Found by: stack scanning Stack contents: 000000eaeafffe30 bc c3 9e 4d fe 7f 00 00 ...M.... Possible instruction pointers: 38 spdlog.node + 0x1c3bc rsp = 0x000000eaeafffe38 rip = 0x00007ffe4d9ec3bc Found by: stack scanning Stack contents: 000000eaeafffe38 00 00 00 00 00 00 00 00 d8 fb d2 47 d1 38 00 00 ...........G.8.. 000000eaeafffe48 00 00 00 00 00 00 00 00 40 bd 8f e9 ea 00 00 00 ........@....... 000000eaeafffe58 8f 4e 9e 4d fe 7f 00 00 .N.M.... Possible instruction pointers: 39 spdlog.node + 0x14e8f rsp = 0x000000eaeafffe60 rip = 0x00007ffe4d9e4e8f Found by: stack scanning Stack contents: 000000eaeafffe60 40 bd 8f e9 ea 00 00 00 00 00 00 00 00 00 00 00 @............... 000000eaeafffe70 40 bd 8f e9 ea 00 00 00 00 00 00 00 00 00 00 00 @............... 000000eaeafffe80 a0 4a 9d 4d fe 7f 00 00 .J.M.... Possible instruction pointers: 40 spdlog.node + 0x4aa0 rsp = 0x000000eaeafffe88 rip = 0x00007ffe4d9d4aa0 Found by: stack scanning Stack contents: 000000eaeafffe88 a9 4a 9d 4d fe 7f 00 00 .J.M.... Possible instruction pointers: 41 spdlog.node + 0x4aa9 rsp = 0x000000eaeafffe90 rip = 0x00007ffe4d9d4aa9 Found by: stack scanning Stack contents: 000000eaeafffe90 40 bd 8f e9 ea 00 00 00 00 00 00 00 00 00 00 00 @............... 000000eaeafffea0 70 34 ce 57 fe 7f 00 00 p4.W.... Possible instruction pointers: 42 kernel.appcore.dll + 0x3470 rsp = 0x000000eaeafffea8 rip = 0x00007ffe57ce3470 Found by: stack scanning Stack contents: 000000eaeafffea8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffeb8 01 0c a4 4d fe 7f 00 00 ...M.... Possible instruction pointers: 43 spdlog.node + 0x70c01 rsp = 0x000000eaeafffec0 rip = 0x00007ffe4da40c01 Found by: stack scanning Stack contents: 000000eaeafffec0 00 00 00 00 a8 02 00 00 e0 38 a1 89 a8 02 00 00 .........8...... 000000eaeafffed0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeafffee0 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 44 kernel32.dll + 0x16fd4 rsp = 0x000000eaeafffef0 rip = 0x00007ffe59c26fd4 Found by: stack scanning Stack contents: 000000eaeafffef0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaffff00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeaffff10 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 45 ntdll.dll + 0x4cec1 rsp = 0x000000eaeaffff20 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 19 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x000000eaeb0ff060 rcx = 0x000002a889a17960 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000002a889a17960 rbp = 0x000000eaeb0ff010 rsp = 0x000000eaeb0fefb8 r8 = 0x0000000000000083 r9 = 0x000000007ffef000 r10 = 0x0000000000000006 r11 = 0xfffffffffe8c0517 r12 = 0x000000eaeb0ff060 r13 = 0x0000000000000000 r14 = 0x000000eaeb0fefe0 r15 = 0x000002a889a179a8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaeb0fefb8 71 4f a7 5b fe 7f 00 00 50 f1 0f eb ea 00 00 00 qO.[....P....... 000000eaeb0fefc8 a0 79 a1 89 a8 02 00 00 00 00 00 00 00 00 00 00 .y.............. 000000eaeb0fefd8 58 79 a1 89 a8 02 00 00 00 00 00 00 00 00 00 00 Xy.............. 000000eaeb0fefe8 e0 ef 0f eb ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0feff8 20 2f 00 00 00 00 00 00 50 79 a1 89 01 00 00 00 /......Py...... 000000eaeb0ff008 60 79 a1 89 a8 02 00 00 50 f1 0f eb ea 00 00 00 `y......P....... 000000eaeb0ff018 a0 79 a1 89 a8 02 00 00 .y...... Possible instruction pointers: 1 0x2a889a179a0 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff020 rip = 0x000002a889a179a0 Found by: previous frame's frame pointer Stack contents: 000000eaeb0ff020 00 00 00 00 00 00 00 00 58 79 a1 89 a8 02 00 00 ........Xy...... 000000eaeb0ff030 50 79 a1 89 a8 02 00 00 69 ab 53 59 fe 7f 00 00 Py......i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff040 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 000000eaeb0ff040 d0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff050 00 c7 a5 4d fe 7f 00 00 ...M.... Possible instruction pointers: 3 spdlog.node + 0x8c700 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff058 rip = 0x00007ffe4da5c700 Found by: stack scanning Stack contents: 000000eaeb0ff058 00 00 00 00 00 00 00 00 00 d3 ce fe ff ff ff ff ................ 000000eaeb0ff068 a0 7f a1 89 a8 02 00 00 d0 07 00 00 00 00 00 00 ................ 000000eaeb0ff078 cc bf 9e 4d fe 7f 00 00 ...M.... Possible instruction pointers: 4 spdlog.node + 0x1bfcc rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff080 rip = 0x00007ffe4d9ebfcc Found by: stack scanning Stack contents: 000000eaeb0ff080 d0 07 00 00 00 00 00 00 50 79 a1 89 a8 02 00 00 ........Py...... 000000eaeb0ff090 00 00 00 00 00 00 00 00 00 c7 a5 4d fe 7f 00 00 ...........M.... Possible instruction pointers: 5 spdlog.node + 0x8c700 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff0a0 rip = 0x00007ffe4da5c700 Found by: stack scanning Stack contents: 000000eaeb0ff0a0 48 79 a1 89 a8 02 00 00 af be 9e 4d fe 7f 00 00 Hy.........M.... Possible instruction pointers: 6 spdlog.node + 0x1beaf rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff0b0 rip = 0x00007ffe4d9ebeaf Found by: stack scanning Stack contents: 000000eaeb0ff0b0 00 00 00 00 00 00 00 00 00 79 a1 89 a8 02 00 00 .........y...... 000000eaeb0ff0c0 e0 4f c3 59 fe 7f 00 00 .O.Y.... Possible instruction pointers: 7 kernel32.dll + 0x24fe0 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff0c8 rip = 0x00007ffe59c34fe0 Found by: stack scanning Stack contents: 000000eaeb0ff0c8 42 36 9f 4d fe 7f 00 00 B6.M.... Possible instruction pointers: 8 spdlog.node + 0x23642 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff0d0 rip = 0x00007ffe4d9f3642 Found by: stack scanning Stack contents: 000000eaeb0ff0d0 0e c9 f9 5e 00 00 00 00 70 57 be 0b fe 7f 00 00 ...^....pW...... 000000eaeb0ff0e0 88 f6 22 46 d1 38 00 00 00 00 00 00 00 00 00 00 .."F.8.......... 000000eaeb0ff0f0 00 00 00 00 00 00 00 00 c0 f1 0f eb ea 00 00 00 ................ 000000eaeb0ff100 00 00 00 00 00 00 00 00 48 79 a1 89 a8 02 00 00 ........Hy...... 000000eaeb0ff110 00 79 a1 89 a8 02 00 00 a0 f2 0f eb ea 00 00 00 .y.............. 000000eaeb0ff120 00 00 00 00 00 00 00 00 47 d1 9d 4d fe 7f 00 00 ........G..M.... Possible instruction pointers: 9 spdlog.node + 0xd147 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff130 rip = 0x00007ffe4d9dd147 Found by: stack scanning Stack contents: 000000eaeb0ff130 00 00 00 00 00 00 00 00 42 36 9f 4d fe 7f 00 00 ........B6.M.... Possible instruction pointers: 10 spdlog.node + 0x23642 rbp = 0x000000eaeb0ff150 rsp = 0x000000eaeb0ff140 rip = 0x00007ffe4d9f3642 Found by: stack scanning Stack contents: 000000eaeb0ff140 00 00 00 00 00 00 00 00 00 79 a1 89 a8 02 00 00 .........y...... 000000eaeb0ff150 10 c9 f9 5e 00 00 00 00 0c 57 be 0b a8 02 00 00 ...^.....W...... 000000eaeb0ff160 08 f7 22 46 d1 38 00 00 ae 2d 9f 4d fe 7f 00 00 .."F.8...-.M.... Possible instruction pointers: 11 spdlog.node + 0x22dae rsp = 0x000000eaeb0ff170 rip = 0x00007ffe4d9f2dae Found by: stack scanning Stack contents: 000000eaeb0ff170 a0 f2 0f eb ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff180 00 00 00 00 00 00 00 00 50 c2 a0 89 a8 02 00 00 ........P....... 000000eaeb0ff190 00 79 a1 89 a8 02 00 00 20 84 9d 4d fe 7f 00 00 .y...... ..M.... Possible instruction pointers: 12 spdlog.node + 0x8420 rsp = 0x000000eaeb0ff1a0 rip = 0x00007ffe4d9d8420 Found by: stack scanning Stack contents: 000000eaeb0ff1a0 37 4b 5f 0e 04 4e d6 01 00 79 a1 89 a8 02 00 00 7K_..N...y...... 000000eaeb0ff1b0 d0 07 00 00 00 00 00 00 00 79 a1 89 a8 02 00 00 .........y...... 000000eaeb0ff1c0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff1d0 74 20 00 00 00 00 00 00 00 b7 c4 87 a8 02 00 00 t .............. 000000eaeb0ff1e0 c7 17 5f 76 57 fd ff ff 00 00 00 00 00 00 00 00 .._vW........... 000000eaeb0ff1f0 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff200 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 000000eaeb0ff210 00 79 a1 89 a8 02 00 00 02 00 00 00 00 00 00 00 .y.............. 000000eaeb0ff220 3c 18 7c ee 22 9c 38 00 74 20 00 00 00 00 00 00 <.|.".8.t ...... 000000eaeb0ff230 b8 2b a7 4d fe 7f 00 00 .+.M.... Possible instruction pointers: 13 spdlog.node + 0xa2bb8 rsp = 0x000000eaeb0ff238 rip = 0x00007ffe4da72bb8 Found by: stack scanning Stack contents: 000000eaeb0ff238 40 f2 0f eb ea 00 00 00 50 2a a7 4d fe 7f 00 00 @.......P*.M.... Possible instruction pointers: 14 spdlog.node + 0xa2a50 rsp = 0x000000eaeb0ff248 rip = 0x00007ffe4da72a50 Found by: stack scanning Stack contents: 000000eaeb0ff248 60 f2 0f eb ea 00 00 00 3b 00 00 00 00 00 00 00 `.......;....... 000000eaeb0ff258 f4 01 00 00 00 00 00 00 3d 3d 3d 3d 3d 3d 3d 3d ........======== 000000eaeb0ff268 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d ================ 000000eaeb0ff278 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d ================ 000000eaeb0ff288 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d ================ 000000eaeb0ff298 3d 3d 3d 6f 64 65 20 6f 6e 63 65 20 74 68 65 20 ===ode once the 000000eaeb0ff2a8 6c 6f 67 20 6c 65 76 65 6c 20 69 73 20 73 65 74 log level is set 000000eaeb0ff2b8 20 74 6f 20 74 72 61 63 65 2e 00 00 00 00 00 00 to trace....... 000000eaeb0ff2c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff2d8 00 00 00 00 00 00 00 00 80 f3 0f eb ea 00 00 00 ................ 000000eaeb0ff2e8 00 00 00 00 00 00 00 00 00 00 a1 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 0x7ffe5ba10000 rsp = 0x000000eaeb0ff2f8 rip = 0x00007ffe5ba10000 Found by: stack scanning Stack contents: 000000eaeb0ff2f8 43 45 a8 5b fe 7f 00 00 CE.[.... Possible instruction pointers: 16 ntdll.dll + 0x74543 rsp = 0x000000eaeb0ff300 rip = 0x00007ffe5ba84543 Found by: stack scanning Stack contents: 000000eaeb0ff300 00 00 00 00 00 00 00 00 00 00 a1 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 17 0x7ffe5ba10000 rsp = 0x000000eaeb0ff310 rip = 0x00007ffe5ba10000 Found by: stack scanning Stack contents: 000000eaeb0ff310 00 00 00 00 00 00 00 00 00 b0 73 e9 ea 00 00 00 ..........s..... 000000eaeb0ff320 00 00 00 00 00 00 00 00 f8 44 a8 5b fe 7f 00 00 .........D.[.... Possible instruction pointers: 18 ntdll.dll + 0x744f8 rsp = 0x000000eaeb0ff330 rip = 0x00007ffe5ba844f8 Found by: stack scanning Stack contents: 000000eaeb0ff330 80 f3 0f eb ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff340 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff350 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff360 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff370 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff380 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff390 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff3a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff3b0 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3....... 000000eaeb0ff3c0 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+............. 000000eaeb0ff3d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff3e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff3f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff400 a4 0b a4 4d fe 7f 00 00 ...M.... Possible instruction pointers: 19 spdlog.node + 0x70ba4 rsp = 0x000000eaeb0ff408 rip = 0x00007ffe4da40ba4 Found by: stack scanning Stack contents: 000000eaeb0ff408 e0 04 b7 87 a8 02 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff418 78 f8 0f eb ea 00 00 00 00 00 00 00 00 00 00 00 x............... 000000eaeb0ff428 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff438 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff448 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb0ff458 48 2a a7 4d fe 7f 00 00 H*.M.... Possible instruction pointers: 20 spdlog.node + 0xa2a48 rsp = 0x000000eaeb0ff460 rip = 0x00007ffe4da72a48 Found by: stack scanning Stack contents: 000000eaeb0ff460 68 f4 0f eb ea 00 00 00 50 2a a7 4d fe 7f 00 00 h.......P*.M.... Possible instruction pointers: 21 spdlog.node + 0xa2a50 rsp = 0x000000eaeb0ff470 rip = 0x00007ffe4da72a50 Found by: stack scanning Thread 20 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x000000eaeb1ff300 rcx = 0x000002a889a17cb0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000002a889a17cb0 rbp = 0x000000eaeb1ff2b0 rsp = 0x000000eaeb1ff258 r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x000002a889a17cb0 r11 = 0x000002a889a17cf8 r12 = 0x000000eaeb1ff300 r13 = 0x0000000000000000 r14 = 0x000000eaeb1ff280 r15 = 0x000002a889a17cf8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 000000eaeb1ff258 71 4f a7 5b fe 7f 00 00 f0 f3 1f eb ea 00 00 00 qO.[............ 000000eaeb1ff268 f0 7c a1 89 a8 02 00 00 00 00 00 00 00 00 00 00 .|.............. 000000eaeb1ff278 a8 7c a1 89 a8 02 00 00 00 00 00 00 00 00 00 00 .|.............. 000000eaeb1ff288 80 f2 1f eb ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff298 20 22 00 00 00 00 00 00 a0 7c a1 89 01 00 00 00 ".......|...... 000000eaeb1ff2a8 b0 7c a1 89 a8 02 00 00 f0 f3 1f eb ea 00 00 00 .|.............. 000000eaeb1ff2b8 f0 7c a1 89 a8 02 00 00 .|...... Possible instruction pointers: 1 0x2a889a17cf0 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff2c0 rip = 0x000002a889a17cf0 Found by: previous frame's frame pointer Stack contents: 000000eaeb1ff2c0 00 00 00 00 00 00 00 00 a8 7c a1 89 a8 02 00 00 .........|...... 000000eaeb1ff2d0 a0 7c a1 89 a8 02 00 00 69 ab 53 59 fe 7f 00 00 .|......i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff2e0 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 000000eaeb1ff2e0 d0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff2f0 00 c7 a5 4d fe 7f 00 00 ...M.... Possible instruction pointers: 3 spdlog.node + 0x8c700 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff2f8 rip = 0x00007ffe4da5c700 Found by: stack scanning Stack contents: 000000eaeb1ff2f8 54 0f 8a 58 fe 7f 00 00 T..X.... Possible instruction pointers: 4 mswsock.dll + 0x10f54 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff300 rip = 0x00007ffe588a0f54 Found by: stack scanning Stack contents: 000000eaeb1ff300 00 d3 ce fe ff ff ff ff 97 79 a4 5b fe 7f 00 00 .........y.[.... Possible instruction pointers: 5 ntdll.dll + 0x37997 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff310 rip = 0x00007ffe5ba47997 Found by: stack scanning Stack contents: 000000eaeb1ff310 d0 07 00 00 00 00 00 00 cc bf 9e 4d fe 7f 00 00 ...........M.... Possible instruction pointers: 6 spdlog.node + 0x1bfcc rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff320 rip = 0x00007ffe4d9ebfcc Found by: stack scanning Stack contents: 000000eaeb1ff320 d0 07 00 00 00 00 00 00 a0 7c a1 89 a8 02 00 00 .........|...... 000000eaeb1ff330 00 00 00 00 00 00 00 00 00 c7 a5 4d fe 7f 00 00 ...........M.... Possible instruction pointers: 7 spdlog.node + 0x8c700 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff340 rip = 0x00007ffe4da5c700 Found by: stack scanning Stack contents: 000000eaeb1ff340 98 7c a1 89 a8 02 00 00 af be 9e 4d fe 7f 00 00 .|.........M.... Possible instruction pointers: 8 spdlog.node + 0x1beaf rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff350 rip = 0x00007ffe4d9ebeaf Found by: stack scanning Stack contents: 000000eaeb1ff350 00 00 00 00 00 00 00 00 50 7c a1 89 a8 02 00 00 ........P|...... 000000eaeb1ff360 e0 4f c3 59 fe 7f 00 00 .O.Y.... Possible instruction pointers: 9 kernel32.dll + 0x24fe0 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff368 rip = 0x00007ffe59c34fe0 Found by: stack scanning Stack contents: 000000eaeb1ff368 42 36 9f 4d fe 7f 00 00 B6.M.... Possible instruction pointers: 10 spdlog.node + 0x23642 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff370 rip = 0x00007ffe4d9f3642 Found by: stack scanning Stack contents: 000000eaeb1ff370 0e c9 f9 5e 00 00 00 00 50 d7 bd 0b fe 7f 00 00 ...^....P....... 000000eaeb1ff380 68 f5 32 46 d1 38 00 00 00 00 00 00 00 00 00 00 h.2F.8.......... 000000eaeb1ff390 00 00 00 00 00 00 00 00 60 f4 1f eb ea 00 00 00 ........`....... 000000eaeb1ff3a0 00 00 00 00 00 00 00 00 98 7c a1 89 a8 02 00 00 .........|...... 000000eaeb1ff3b0 50 7c a1 89 a8 02 00 00 40 f5 1f eb ea 00 00 00 P|......@....... 000000eaeb1ff3c0 00 00 00 00 00 00 00 00 47 d1 9d 4d fe 7f 00 00 ........G..M.... Possible instruction pointers: 11 spdlog.node + 0xd147 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff3d0 rip = 0x00007ffe4d9dd147 Found by: stack scanning Stack contents: 000000eaeb1ff3d0 00 00 00 00 00 00 00 00 42 36 9f 4d fe 7f 00 00 ........B6.M.... Possible instruction pointers: 12 spdlog.node + 0x23642 rbp = 0x000000eaeb1ff3f0 rsp = 0x000000eaeb1ff3e0 rip = 0x00007ffe4d9f3642 Found by: stack scanning Stack contents: 000000eaeb1ff3e0 00 00 00 00 00 00 00 00 50 7c a1 89 a8 02 00 00 ........P|...... 000000eaeb1ff3f0 10 c9 f9 5e 00 00 00 00 24 d6 bd 0b a8 02 00 00 ...^....$....... 000000eaeb1ff400 e8 f5 32 46 d1 38 00 00 ae 2d 9f 4d fe 7f 00 00 ..2F.8...-.M.... Possible instruction pointers: 13 spdlog.node + 0x22dae rsp = 0x000000eaeb1ff410 rip = 0x00007ffe4d9f2dae Found by: stack scanning Stack contents: 000000eaeb1ff410 40 f5 1f eb ea 00 00 00 00 00 00 00 00 00 00 00 @............... 000000eaeb1ff420 00 00 00 00 00 00 00 00 b0 c7 a0 89 a8 02 00 00 ................ 000000eaeb1ff430 50 7c a1 89 a8 02 00 00 20 84 9d 4d fe 7f 00 00 P|...... ..M.... Possible instruction pointers: 14 spdlog.node + 0x8420 rsp = 0x000000eaeb1ff440 rip = 0x00007ffe4d9d8420 Found by: stack scanning Stack contents: 000000eaeb1ff440 ed 49 5f 0e 04 4e d6 01 78 1b a1 4d fe 7f 00 00 .I_..N..x..M.... Possible instruction pointers: 15 spdlog.node + 0x41b78 rsp = 0x000000eaeb1ff450 rip = 0x00007ffe4da11b78 Found by: stack scanning Stack contents: 000000eaeb1ff450 d0 07 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 000000eaeb1ff460 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff470 60 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff `............... 000000eaeb1ff480 c7 17 5f 76 57 fd ff ff 00 00 00 00 00 00 00 00 .._vW........... 000000eaeb1ff490 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff4a0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 000000eaeb1ff4b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff4c0 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff p............... 000000eaeb1ff4d0 ff ff ff ff ff ff ff ff 3d 5a a4 5b fe 7f 00 00 ........=Z.[.... Possible instruction pointers: 16 ntdll.dll + 0x35a3d rsp = 0x000000eaeb1ff4e0 rip = 0x00007ffe5ba45a3d Found by: stack scanning Stack contents: 000000eaeb1ff4e0 5d 5a a4 5b fe 7f 00 00 ]Z.[.... Possible instruction pointers: 17 ntdll.dll + 0x35a5d rsp = 0x000000eaeb1ff4e8 rip = 0x00007ffe5ba45a5d Found by: stack scanning Stack contents: 000000eaeb1ff4e8 00 00 00 00 00 00 00 00 00 a0 70 e9 ea 00 00 00 ..........p..... 000000eaeb1ff4f8 02 46 a8 5b fe 7f 00 00 .F.[.... Possible instruction pointers: 18 ntdll.dll + 0x74602 rsp = 0x000000eaeb1ff500 rip = 0x00007ffe5ba84602 Found by: stack scanning Stack contents: 000000eaeb1ff500 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff510 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff530 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff540 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff560 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff570 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff580 20 f6 1f eb ea 00 00 00 00 00 00 00 00 00 00 00 ............... 000000eaeb1ff590 00 00 a1 5b fe 7f 00 00 ...[.... Possible instruction pointers: 19 0x7ffe5ba10000 rsp = 0x000000eaeb1ff598 rip = 0x00007ffe5ba10000 Found by: stack scanning Stack contents: 000000eaeb1ff598 43 45 a8 5b fe 7f 00 00 CE.[.... Possible instruction pointers: 20 ntdll.dll + 0x74543 rsp = 0x000000eaeb1ff5a0 rip = 0x00007ffe5ba84543 Found by: stack scanning Stack contents: 000000eaeb1ff5a0 00 00 00 00 00 00 00 00 00 00 a1 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 21 0x7ffe5ba10000 rsp = 0x000000eaeb1ff5b0 rip = 0x00007ffe5ba10000 Found by: stack scanning Stack contents: 000000eaeb1ff5b0 00 00 00 00 00 00 00 00 00 d0 73 e9 ea 00 00 00 ..........s..... 000000eaeb1ff5c0 00 00 00 00 00 00 00 00 f8 44 a8 5b fe 7f 00 00 .........D.[.... Possible instruction pointers: 22 ntdll.dll + 0x744f8 rsp = 0x000000eaeb1ff5d0 rip = 0x00007ffe5ba844f8 Found by: stack scanning Stack contents: 000000eaeb1ff5d0 20 f6 1f eb ea 00 00 00 00 00 00 00 00 00 00 00 ............... 000000eaeb1ff5e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff600 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff610 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff620 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff630 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff650 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3....... 000000eaeb1ff660 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+............. 000000eaeb1ff670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff690 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff6a0 a4 0b a4 4d fe 7f 00 00 ...M.... Possible instruction pointers: 23 spdlog.node + 0x70ba4 rsp = 0x000000eaeb1ff6a8 rip = 0x00007ffe4da40ba4 Found by: stack scanning Stack contents: 000000eaeb1ff6a8 f0 3a a1 89 a8 02 00 00 00 00 00 00 00 00 00 00 .:.............. 000000eaeb1ff6b8 18 fb 1f eb ea 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff6c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff6d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff6e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff6f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff708 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000eaeb1ff718 a0 ce a5 5b fe 7f 00 00 ...[.... Possible instruction pointers: 24 ntdll.dll + 0x4cea0 rsp = 0x000000eaeb1ff720 rip = 0x00007ffe5ba5cea0 Found by: stack scanning Loaded modules: 0x7ff6d2500000 - 0x7ff6d8bbffff Code - OSS.exe 8.3.3.0 (main) 0x7ffe40550000 - 0x7ffe405b5fff oleacc.dll 7.2.19041.1 0x7ffe449a0000 - 0x7ffe44c91fff UIAutomationCore.DLL 7.2.19041.153 0x7ffe450c0000 - 0x7ffe45359fff comctl32.dll 6.10.19041.1 0x7ffe459e0000 - 0x7ffe45a06fff winmm.dll 6.3.19041.1 0x7ffe471e0000 - 0x7ffe473acfff d3d9.dll 6.3.19041.1 0x7ffe47a10000 - 0x7ffe47c8dfff DWrite.dll 6.3.19041.264 0x7ffe49480000 - 0x7ffe4948bfff secur32.dll 6.3.19041.1 0x7ffe4a9e0000 - 0x7ffe4abccfff urlmon.dll 11.0.19041.117 0x7ffe4ae00000 - 0x7ffe4afe3fff dbghelp.dll 6.3.19041.1 0x7ffe4b4d0000 - 0x7ffe4b55dfff winspool.drv 6.3.19041.1 0x7ffe4c050000 - 0x7ffe4c2fdfff iertutil.dll 11.0.19041.1 0x7ffe4d9d0000 - 0x7ffe4da99fff spdlog.node ??? (WARNING: No symbols, spdlog.pdb, 4252DCE00C014A71B2128818BF40E9F31) 0x7ffe4daa0000 - 0x7ffe4dcdffff ffmpeg.dll ??? 0x7ffe4ef30000 - 0x7ffe4ef39fff version.dll 6.3.19041.1 0x7ffe4f040000 - 0x7ffe4f05cfff dhcpcsvc.dll 6.3.19041.1 0x7ffe51bd0000 - 0x7ffe51ccffff winhttp.dll 6.3.19041.264 0x7ffe53960000 - 0x7ffe53983fff dxva2.dll 6.3.19041.1 0x7ffe548f0000 - 0x7ffe54908fff usp10.dll 6.3.19041.1 0x7ffe549e0000 - 0x7ffe54ad4fff propsys.dll 7.0.19041.1 0x7ffe54b10000 - 0x7ffe54b23fff wtsapi32.dll 6.3.19041.1 0x7ffe54d30000 - 0x7ffe54f92fff d3d11.dll 6.3.19041.1 0x7ffe55bf0000 - 0x7ffe55bf6fff msimg32.dll 6.3.19041.264 0x7ffe56b60000 - 0x7ffe56bfefff uxtheme.dll 6.3.19041.1 0x7ffe56d50000 - 0x7ffe56d7dfff dwmapi.dll 6.3.19041.1 0x7ffe57220000 - 0x7ffe579adfff windows.storage.dll 6.3.19041.329 0x7ffe579b0000 - 0x7ffe579bcfff hid.dll 6.3.19041.1 0x7ffe57ac0000 - 0x7ffe57bb2fff dxgi.dll 6.3.19041.1 0x7ffe57ce0000 - 0x7ffe57cf2fff kernel.appcore.dll 6.3.19041.1 (WARNING: No symbols, Kernel.Appcore.pdb, 23DD865298423ABD445084F1DA29B7381) 0x7ffe58580000 - 0x7ffe585bafff IPHLPAPI.DLL 6.3.19041.1 0x7ffe58890000 - 0x7ffe588f9fff mswsock.dll 6.3.19041.1 (WARNING: No symbols, mswsock.pdb, FB21B58E15E7A4B6AEE64841F858A5FF1) 0x7ffe58a80000 - 0x7ffe58a8bfff CRYPTBASE.DLL 6.3.19041.1 0x7ffe58b10000 - 0x7ffe58b3afff wldp.dll 6.3.19041.1 0x7ffe58b40000 - 0x7ffe58b7afff ntasn1.dll 6.3.19041.1 0x7ffe58b80000 - 0x7ffe58ba6fff ncrypt.dll 6.3.19041.1 0x7ffe58fb0000 - 0x7ffe58fc1fff umpdc.dll ??? 0x7ffe58fd0000 - 0x7ffe5901afff powrprof.dll 6.3.19041.1 0x7ffe59020000 - 0x7ffe59050fff sspicli.dll 6.3.19041.1 0x7ffe59060000 - 0x7ffe5908dfff userenv.dll 6.3.19041.1 0x7ffe59160000 - 0x7ffe592bcfff crypt32.dll 6.3.19041.21 0x7ffe59320000 - 0x7ffe5941ffff ucrtbase.dll 6.3.19041.1 0x7ffe594d0000 - 0x7ffe59796fff KERNELBASE.dll 6.3.19041.292 (WARNING: No symbols, kernelbase.pdb, D6169164FE35DE0ECD89935474AA28D61) 0x7ffe597f0000 - 0x7ffe59811fff win32u.dll 6.3.19041.329 0x7ffe59850000 - 0x7ffe598ecfff msvcp_win.dll 6.3.19041.1 0x7ffe598f0000 - 0x7ffe599f9fff gdi32full.dll 6.3.19041.329 0x7ffe59a00000 - 0x7ffe59a7efff bcryptPrimitives.dll 6.3.19041.264 0x7ffe59a80000 - 0x7ffe59b1dfff msvcrt.dll 7.0.19041.1 0x7ffe59b20000 - 0x7ffe59b49fff gdi32.dll 6.3.19041.1 0x7ffe59b50000 - 0x7ffe59ba4fff shlwapi.dll 6.3.19041.1 0x7ffe59c10000 - 0x7ffe59cccfff kernel32.dll 6.3.19041.292 (WARNING: No symbols, kernel32.pdb, 89C3B9FD1C796A0F430E0CEF0646F0031) 0x7ffe59cd0000 - 0x7ffe59cfffff imm32.dll 6.3.19041.1 0x7ffe59d00000 - 0x7ffe59dd9fff comdlg32.dll 6.3.19041.329 0x7ffe59f00000 - 0x7ffe59fccfff oleaut32.dll 6.3.19041.329 0x7ffe5a4a0000 - 0x7ffe5a63ffff user32.dll 6.3.19041.264 0x7ffe5a6f0000 - 0x7ffe5aa42fff combase.dll 6.3.19041.329 0x7ffe5aab0000 - 0x7ffe5ab4afff sechost.dll 6.3.19041.1 0x7ffe5ac80000 - 0x7ffe5ad29fff advapi32.dll 6.3.19041.1 0x7ffe5af60000 - 0x7ffe5b693fff shell32.dll 6.3.19041.329 0x7ffe5b6a0000 - 0x7ffe5b70afff ws2_32.dll 6.3.19041.1 0x7ffe5b730000 - 0x7ffe5b7ddfff SHCore.dll 6.3.19041.264 0x7ffe5b8a0000 - 0x7ffe5b9c2fff rpcrt4.dll 6.3.19041.1 0x7ffe5ba10000 - 0x7ffe5bc03fff ntdll.dll 6.3.19041.207 (WARNING: No symbols, ntdll.pdb, 63E12347526A46144B98F8CF61CDED791)