Operating system: Windows NT 10.0.19041 CPU: amd64 family 6 model 158 stepping 13 4 CPUs GPU: UNKNOWN No crash Process uptime: 855 seconds Thread 0 0 ntdll.dll + 0x9b8e4 rax = 0x000000000000005b rdx = 0x0000009ab5bfbaf0 rcx = 0x0000000000000003 rbx = 0x0000000000000003 rsi = 0x0000000000000000 rdi = 0x0000000000000003 rbp = 0x000001c151cc74f8 rsp = 0x0000009ab5bfb768 r8 = 0x0000009ab5bfbda0 r9 = 0x000001c151cbebf8 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x00000000ffffffff r13 = 0x0000009ab5bfbaf0 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe5baab8e4 Found by: given as instruction pointer in context Stack contents: 0000009ab5bfb768 10 89 51 59 fe 7f 00 00 ..QY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x48910 rbp = 0x000001c151cc74f8 rsp = 0x0000009ab5bfb770 rip = 0x00007ffe59518910 Found by: stack scanning Stack contents: 0000009ab5bfb770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab5bfb780 00 00 00 00 00 00 00 00 37 b1 e2 36 60 dd 00 00 ........7..6`... 0000009ab5bfb790 00 00 00 00 00 00 00 00 b8 31 24 d4 f6 7f 00 00 .........1$..... Possible instruction pointers: *(0x0000009ab5bfb798) = 0x00007ff6d42431b8 [thread_local_storage.cc : 442 + 0x0] 2 Code - OSS.exe!base::ThreadLocalStorage::Slot::Set(void *) [thread_local_storage.cc : 439 + 0xc] rbp = 0x000001c151cc74f8 rsp = 0x0000009ab5bfb7a0 rip = 0x00007ff6d42431b8 Found by: stack scanning Stack contents: 0000009ab5bfb7a0 20 b9 bf b5 9a 00 00 00 00 a0 d6 b5 9a 00 00 00 ............... 0000009ab5bfb7b0 03 00 00 00 00 00 00 00 cf 1e 89 d4 f6 7f 00 00 ................ 0000009ab5bfb7c0 e8 ba bf b5 9a 00 00 00 01 00 00 00 00 00 00 00 ................ 0000009ab5bfb7d0 48 00 00 00 00 00 00 00 01 00 00 00 f6 7f 00 00 H............... Possible instruction pointers: *(0x0000009ab5bfb7b8) = 0x00007ff6d4891ecf [activity_tracker.cc : 1763 + 0x0] 3 0x7ff600000001 rbp = 0x000001c151cc74f8 rsp = 0x0000009ab5bfb7e0 rip = 0x00007ff600000001 Found by: call frame info Stack contents: 0000009ab5bfb7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab5bfb7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab5bfb800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab5bfb810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab5bfb820 48 bb bf b5 9a 00 00 00 01 00 00 00 00 00 00 00 H............... 0000009ab5bfb830 58 ba bf b5 9a 00 00 00 6b 78 a2 5b fe 7f 00 00 X.......kx.[.... Possible instruction pointers: 4 ntdll.dll + 0x1786b rbp = 0x000001c151cc74f8 rsp = 0x0000009ab5bfb840 rip = 0x00007ffe5ba2786b Found by: stack scanning Stack contents: 0000009ab5bfb840 1d 00 17 00 00 00 00 00 d3 00 00 00 00 00 00 00 ................ 0000009ab5bfb850 90 82 8c 54 c1 01 00 00 00 00 00 00 00 00 00 00 ...T............ 0000009ab5bfb860 50 b9 bf b5 9a 00 00 00 00 00 00 00 00 00 00 00 P............... 0000009ab5bfb870 00 00 00 00 60 dd 00 00 00 1e 2b 50 c1 01 00 00 ....`.....+P.... 0000009ab5bfb880 50 b9 bf b5 9a 00 00 00 00 00 2b 50 c1 01 00 00 P.........+P.... 0000009ab5bfb890 d8 02 2b 50 c1 01 00 00 cf 1e 89 d4 f6 7f 00 00 ..+P............ Possible instruction pointers: *(0x0000009ab5bfb898) = 0x00007ff6d4891ecf [activity_tracker.cc : 1763 + 0x0] 5 Code - OSS.exe!base::debug::ScopedLockAcquireActivity::ScopedLockAcquireActivity(void const *,base::internal::LockImpl const *) [activity_tracker.cc : 1763 + 0xbf] rbp = 0x000001c151cc74f8 rsp = 0x0000009ab5bfb8a0 rip = 0x00007ff6d4891ecf Found by: stack scanning Thread 1 0 ntdll.dll + 0x9aeb4 rax = 0x0000000000000009 rdx = 0x0000009ab61ffe50 rcx = 0x00000000000002f8 rbx = 0x0000009ab61ffe48 rsi = 0x0000009ab61ffe90 rdi = 0x0000009ab61ffe5c rbp = 0x00000000000002f8 rsp = 0x0000009ab61ffd68 r8 = 0x000001c1502b0f00 r9 = 0x0000000000000001 r10 = 0x0000000000008000 r11 = 0x0000009ab61ffcf0 r12 = 0x0000000000000000 r13 = 0x0000009ab61ffe78 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe5baaaeb4 Found by: given as instruction pointer in context Stack contents: 0000009ab61ffd68 bf e9 52 59 fe 7f 00 00 ..RY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x5e9bf rsp = 0x0000009ab61ffd70 rip = 0x00007ffe5952e9bf Found by: stack scanning Stack contents: 0000009ab61ffd70 a0 fd 1f b6 9a 00 00 00 90 fe 1f b6 9a 00 00 00 ................ 0000009ab61ffd80 90 fe 1f b6 9a 00 00 00 0b 00 00 00 00 00 00 00 ................ 0000009ab61ffd90 00 00 00 00 00 00 00 00 9b 08 53 59 fe 7f 00 00 ..........SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6089b rsp = 0x0000009ab61ffda0 rip = 0x00007ffe5953089b Found by: stack scanning Stack contents: 0000009ab61ffda0 18 00 00 00 00 00 00 80 c0 71 c8 51 c1 01 00 00 .........q.Q.... 0000009ab61ffdb0 00 00 00 00 00 00 00 00 90 fe 1f b6 9a 00 00 00 ................ 0000009ab61ffdc0 60 fe 1f b6 9a 00 00 00 8d 82 d4 d4 f6 7f 00 00 `............... Possible instruction pointers: *(0x0000009ab61ffdc8) = 0x00007ff6d4d4828d [broker_services.cc : 236 + 0x11] 3 Code - OSS.exe!sandbox::BrokerServicesBase::TargetEventsThread(void *) [broker_services.cc : 236 + 0x11] rsp = 0x0000009ab61ffdd0 rip = 0x00007ff6d4d4828d Found by: stack scanning Stack contents: 0000009ab61ffdd0 c0 71 c8 51 c1 01 00 00 00 00 00 00 00 00 00 00 .q.Q............ 0000009ab61ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffdf0 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffe00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffe10 fc 02 00 00 00 00 00 00 c0 71 c8 51 c1 01 00 00 .........q.Q.... 0000009ab61ffe20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffe30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffe40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffe50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffe60 60 fe 1f b6 9a 00 00 00 60 fe 1f b6 9a 00 00 00 `.......`....... 0000009ab61ffe70 00 00 00 00 00 00 00 00 78 fe 1f b6 9a 00 00 00 ........x....... 0000009ab61ffe80 78 fe 1f b6 9a 00 00 00 00 00 00 00 00 00 00 00 x............... 0000009ab61ffe90 98 fe 1f b6 9a 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffeb0 00 00 00 00 00 00 00 00 a7 fb 42 35 60 dd 00 00 ..........B5`... 0000009ab61ffec0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffed0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61ffef0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61fff00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61fff10 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 4 kernel32.dll + 0x16fd4 rsp = 0x0000009ab61fff20 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab61fff20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab61fff40 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 5 ntdll.dll + 0x4cec1 rsp = 0x0000009ab61fff50 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 2 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x000000000000035c rbx = 0x0000000000000000 rsi = 0x0000009ab62ff358 rdi = 0x000000000000035c rbp = 0x7fffffffffffffff rsp = 0x0000009ab62ff328 r8 = 0x0000000000000000 r9 = 0x000001c151c70000 r10 = 0x0000000000000000 r11 = 0x0000009ab62fe001 r12 = 0x0000009ab62ff3f0 r13 = 0x0000000000000000 r14 = 0x000000000000035c r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 0000009ab62ff328 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x7fffffffffffffff rsp = 0x0000009ab62ff330 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 0000009ab62ff330 28 bd cb 51 c1 01 00 00 3f f4 2f b6 9a 00 00 00 (..Q....?./..... 0000009ab62ff340 01 c2 cb 51 c1 01 00 00 61 e0 27 d4 f6 7f 00 00 ...Q....a.'..... Possible instruction pointers: *(0x0000009ab62ff348) = 0x00007ff6d427e061 [time_win.cc : 432 + 0x6] 2 Code - OSS.exe!base::`anonymous namespace'::RolloverProtectedNow [time_win.cc : 432 + 0x6] rbp = 0x7fffffffffffffff rsp = 0x0000009ab62ff350 rip = 0x00007ff6d427e061 Found by: stack scanning Thread 3 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000000358 rbx = 0x0000000000000000 rsi = 0x0000009ab64ff9c8 rdi = 0x0000000000000358 rbp = 0x0000000000000000 rsp = 0x0000009ab64ff998 r8 = 0x0000009ab64ff998 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000009ab64ffa60 r13 = 0x0000009ab64ffb98 r14 = 0x0000000000000358 r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 0000009ab64ff998 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rsp = 0x0000009ab64ff9a0 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 0000009ab64ff9a0 20 8a cb 51 c1 01 00 00 10 a3 cb 51 c1 01 00 00 ..Q.......Q.... 0000009ab64ff9b0 78 fa 4f b6 9a 00 00 00 61 e0 27 d4 f6 7f 00 00 x.O.....a.'..... Possible instruction pointers: *(0x0000009ab64ff9b8) = 0x00007ff6d427e061 [time_win.cc : 432 + 0x6] 2 Code - OSS.exe!base::`anonymous namespace'::RolloverProtectedNow [time_win.cc : 432 + 0x6] rsp = 0x0000009ab64ff9c0 rip = 0x00007ff6d427e061 Found by: stack scanning Thread 4 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00003ee320a4c038 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000009ab65fe598 rbp = 0x0000009ab5d6a3a0 rsp = 0x0000009ab65fe518 r8 = 0x0000009ab65ff888 r9 = 0x0000000000000001 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x00007ffe5bb734f8 r14 = 0x0000009ab65fe570 r15 = 0x0000000000000000 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab65fe518 9d 61 a5 5b fe 7f 00 00 .a.[.... Possible instruction pointers: 1 ntdll.dll + 0x4619d rsp = 0x0000009ab65fe520 rip = 0x00007ffe5ba5619d Found by: stack scanning Stack contents: 0000009ab65fe520 00 00 00 00 00 00 00 00 01 54 04 52 c1 01 00 00 .........T.R.... 0000009ab65fe530 90 05 00 00 00 00 00 00 b3 2e 8a d4 f6 7f 00 00 ................ Possible instruction pointers: *(0x0000009ab65fe538) = 0x00007ff6d48a2eb3 [scoped_defer_task_posting.cc : 46 + 0x30] 2 Code - OSS.exe!base::ScopedDeferTaskPosting::Set(base::ScopedDeferTaskPosting *) [scoped_defer_task_posting.cc : 46 + 0x30] rsp = 0x0000009ab65fe540 rip = 0x00007ff6d48a2eb3 Found by: stack scanning Stack contents: 0000009ab65fe540 a0 a3 d6 b5 9a 00 00 00 52 60 a5 5b fe 7f 00 00 ........R`.[.... 0000009ab65fe550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab65fe560 08 e6 5f b6 9a 00 00 00 38 c0 a4 20 e3 3e 00 00 .._.....8.. .>.. Possible instruction pointers: 3 0x3ee320a4c038 rsp = 0x0000009ab65fe570 rip = 0x00003ee320a4c038 Found by: call frame info Stack contents: 0000009ab65fe570 38 c0 a4 20 e3 3e 00 00 58 23 00 00 00 00 00 00 8.. .>..X#...... 0000009ab65fe580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab65fe590 70 e5 5f b6 9a 00 00 00 00 00 00 00 f6 7f 00 00 p._............. 0000009ab65fe5a0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 0000009ab65fe5b0 00 00 00 00 00 00 00 00 6d 5e a5 5b fe 7f 00 00 ........m^.[.... Possible instruction pointers: 4 ntdll.dll + 0x45e6d rsp = 0x0000009ab65fe5c0 rip = 0x00007ffe5ba55e6d Found by: stack scanning Stack contents: 0000009ab65fe5c0 30 c0 a4 20 e3 3e 00 00 22 17 00 00 00 00 00 00 0.. .>.."....... 0000009ab65fe5d0 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... Possible instruction pointers: *(0x0000009ab65fe5d8) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] 5 Code - OSS.exe!malloc [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] rsp = 0x0000009ab65fe5e0 rip = 0x00007ff6d4279d3b Found by: stack scanning Stack contents: 0000009ab65fe5e0 00 00 00 00 60 dd 00 00 15 00 00 00 00 00 00 00 ....`........... 0000009ab65fe5f0 4d 00 00 00 00 00 00 00 b0 e6 5f b6 9a 00 00 00 M........._..... 0000009ab65fe600 00 00 00 00 00 00 00 00 fa ff ff ff 00 00 00 00 ................ 0000009ab65fe610 00 b0 d7 b5 9a 00 00 00 a8 e6 5f b6 9a 00 00 00 .........._..... Possible instruction pointers: 6 0x9ab65fe6a8 rsp = 0x0000009ab65fe620 rip = 0x0000009ab65fe6a8 Found by: call frame info Stack contents: 0000009ab65fe620 b0 e6 5f b6 9a 00 00 00 2d 15 68 d4 f6 7f 00 00 .._.....-.h..... Possible instruction pointers: *(0x0000009ab65fe628) = 0x00007ff6d468152d [string_impl.cc : 116 + 0x0] 7 Code - OSS.exe!WTF::StringImpl::CreateUninitialized(unsigned int,unsigned char * &) [string_impl.cc : 113 + 0xc] rsp = 0x0000009ab65fe630 rip = 0x00007ff6d468152d Found by: stack scanning Thread 5 0 ntdll.dll + 0x9e7e4 rax = 0x00000000000001d3 rdx = 0x000001c152745220 rcx = 0x0000000000000390 rbx = 0x0000000000000000 rsi = 0x000001c1527440c0 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x0000009ab66ffa78 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe5baae7e4 Found by: given as instruction pointer in context Stack contents: 0000009ab66ffa78 d7 23 a2 5b fe 7f 00 00 .#.[.... Possible instruction pointers: 1 ntdll.dll + 0x123d7 rsp = 0x0000009ab66ffa80 rip = 0x00007ffe5ba223d7 Found by: stack scanning Thread 6 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x00000000000003c0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000000000003c0 rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff588 r8 = 0x0000000000000026 r9 = 0x0000000000000000 r10 = 0x0000009ab67ff064 r11 = 0x000001c1549e4cb0 r12 = 0x0000000000000001 r13 = 0x0000000000000000 r14 = 0x00000000000003c0 r15 = 0x0000009ab67ff6d0 rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 0000009ab67ff588 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff590 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 0000009ab67ff590 47 f3 22 35 60 dd 00 00 08 a9 cd 51 c1 01 00 00 G."5`......Q.... 0000009ab67ff5a0 c0 3f cd 51 c1 01 00 00 80 28 7d d7 f6 7f 00 00 .?.Q.....(}..... Possible instruction pointers: *(0x0000009ab67ff5a8) = 0x00007ff6d77d2880 [ : 0 + 0x7ff6d77d2880] 2 Code - OSS.exe!RtlUnwindEx + 0x56d820 rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff5b0 rip = 0x00007ff6d77d2880 Found by: stack scanning Stack contents: 0000009ab67ff5b0 01 00 00 00 00 00 00 00 56 70 23 d4 f6 7f 00 00 ........Vp#..... Possible instruction pointers: *(0x0000009ab67ff5b8) = 0x00007ff6d4237056 [sequence_manager_impl.cc : 739 + 0xc] 3 Code - OSS.exe!base::sequence_manager::internal::SequenceManagerImpl::OnSystemIdle() [sequence_manager_impl.cc : 739 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff5c0 rip = 0x00007ff6d4237056 Found by: stack scanning Stack contents: 0000009ab67ff5c0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 0000009ab67ff5d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff5e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff600 00 00 00 00 00 00 00 00 c0 e9 cc 51 c1 01 00 00 ...........Q.... 0000009ab67ff610 c0 e9 cc 51 c1 01 00 00 28 aa cd 51 c1 01 00 00 ...Q....(..Q.... Possible instruction pointers: 4 0x1c151cdaa28 rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff620 rip = 0x000001c151cdaa28 Found by: call frame info Stack contents: 0000009ab67ff620 c0 e9 cc 51 c1 01 00 00 14 05 27 d4 f6 7f 00 00 ...Q......'..... Possible instruction pointers: *(0x0000009ab67ff628) = 0x00007ff6d4270514 [waitable_event_win.cc : 74 + 0x0] 5 Code - OSS.exe!base::WaitableEvent::Wait() [waitable_event_win.cc : 69 + 0xb] rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff630 rip = 0x00007ff6d4270514 Found by: stack scanning Stack contents: 0000009ab67ff630 d8 f6 7f b6 9a 00 00 00 2f cc 21 d7 f6 7f 00 00 ......../.!..... 0000009ab67ff640 00 00 00 00 f6 7f 00 00 c0 03 00 00 00 00 00 00 ................ 0000009ab67ff650 00 24 50 d8 f6 7f 00 00 00 00 00 00 00 00 00 00 .$P............. 0000009ab67ff660 00 00 00 00 00 00 00 00 fd e3 21 d4 f6 7f 00 01 ..........!..... 0000009ab67ff670 00 f8 7f b6 9a 00 00 00 00 f0 22 35 60 dd 00 00 .........."5`... 0000009ab67ff680 d8 f6 7f b6 9a 00 00 00 57 f0 22 35 60 dd 00 00 ........W."5`... 0000009ab67ff690 47 f0 22 35 60 dd 00 00 28 aa cd 51 c1 01 00 00 G."5`...(..Q.... 0000009ab67ff6a0 b0 e9 cc 51 c1 01 00 00 1f 27 89 d4 f6 7f 00 00 ...Q.....'...... Possible instruction pointers: *(0x0000009ab67ff638) = 0x00007ff6d721cc2f [new_scalar.cpp : 35 + 0x8] *(0x0000009ab67ff650) = 0x00007ff6d8502400 [ : 0 + 0x7ff6d8502400] *(0x0000009ab67ff6a8) = 0x00007ff6d489271f [message_pump_default.cc : 55 + 0x8] 6 Code - OSS.exe!base::MessagePumpDefault::Run(base::MessagePump::Delegate *) [message_pump_default.cc : 55 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff6b0 rip = 0x00007ff6d489271f Found by: call frame info Stack contents: 0000009ab67ff6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff6c0 e8 63 7d d7 f6 7f 00 00 08 00 00 00 00 00 00 00 .c}............. 0000009ab67ff6d0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f ................ 0000009ab67ff6e0 00 00 00 00 00 00 00 00 c7 f0 22 35 60 dd 00 00 .........."5`... 0000009ab67ff6f0 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 0000009ab67ff700 ff ff ff ff ff ff ff 7f 30 aa cd 51 c1 01 00 00 ........0..Q.... 0000009ab67ff710 00 00 00 00 00 00 00 00 e8 f7 7f b6 9a 00 00 00 ................ 0000009ab67ff720 50 f8 7f b6 9a 00 00 00 c8 05 8a d4 f6 7f 00 00 P............... Possible instruction pointers: *(0x0000009ab67ff6c0) = 0x00007ff6d77d63e8 [ : 0 + 0x7ff6d77d63e8] *(0x0000009ab67ff728) = 0x00007ff6d48a05c8 [thread_controller_with_message_pump_impl.cc : 471 + 0x0] 7 Code - OSS.exe!base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::Run(bool,base::TimeDelta) [thread_controller_with_message_pump_impl.cc : 463 + 0xa] rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff730 rip = 0x00007ff6d48a05c8 Found by: call frame info Stack contents: 0000009ab67ff730 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... 0000009ab67ff740 00 00 00 00 00 00 00 00 59 53 20 d4 f6 7f 00 00 ........YS ..... 0000009ab67ff750 00 00 00 00 00 00 00 00 74 31 24 d4 f6 7f 00 00 ........t1$..... 0000009ab67ff760 47 f1 22 35 60 dd 00 00 00 00 00 00 00 00 00 00 G."5`........... 0000009ab67ff770 00 00 00 00 00 00 00 00 40 78 cd 51 c1 01 00 00 ........@x.Q.... 0000009ab67ff780 30 78 cd 51 c1 01 00 00 be cd 21 d4 f6 7f 00 00 0x.Q......!..... Possible instruction pointers: *(0x0000009ab67ff738) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] *(0x0000009ab67ff748) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x0000009ab67ff758) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x0000009ab67ff788) = 0x00007ff6d421cdbe [run_loop.cc : 158 + 0x0] 8 Code - OSS.exe!base::RunLoop::Run() [run_loop.cc : 156 + 0x10] rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff790 rip = 0x00007ff6d421cdbe Found by: call frame info Stack contents: 0000009ab67ff790 17 f1 22 35 60 dd 00 00 00 00 00 00 00 00 00 00 .."5`........... 0000009ab67ff7a0 00 00 00 00 00 00 00 00 59 53 20 d4 f6 7f 00 00 ........YS ..... 0000009ab67ff7b0 40 78 cd 51 c1 01 00 00 74 31 24 d4 f6 7f 00 00 @x.Q....t1$..... 0000009ab67ff7c0 50 f8 7f b6 9a 00 00 00 e7 03 27 d4 f6 7f 00 00 P.........'..... 0000009ab67ff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff7e0 00 00 00 00 00 00 00 00 30 c1 cb 51 c1 01 00 00 ........0..Q.... 0000009ab67ff7f0 e0 f7 7f b6 9a 00 00 00 e7 f1 22 35 60 dd 00 00 .........."5`... 0000009ab67ff800 00 00 00 00 00 00 00 00 40 78 cd 51 c1 01 00 00 ........@x.Q.... 0000009ab67ff810 30 78 cd 51 c1 01 00 00 50 f8 7f b6 9a 00 00 00 0x.Q....P....... 0000009ab67ff820 10 0b a3 5b fe 7f 00 00 a6 28 24 d4 f6 7f 00 00 ...[.....($..... Possible instruction pointers: *(0x0000009ab67ff7a8) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x0000009ab67ff7b8) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x0000009ab67ff7c8) = 0x00007ff6d42703e7 [lock_impl_win.cc : 37 + 0x15] *(0x0000009ab67ff828) = 0x00007ff6d42428a6 [thread.cc : 379 + 0x0] 9 Code - OSS.exe!base::Thread::ThreadMain() [thread.cc : 376 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff830 rip = 0x00007ff6d42428a6 Found by: call frame info Stack contents: 0000009ab67ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff840 d0 32 cd 51 c1 01 00 00 30 78 cd 51 c1 01 00 00 .2.Q....0x.Q.... 0000009ab67ff850 30 aa cd 51 c1 01 00 00 00 00 00 00 00 01 00 01 0..Q............ 0000009ab67ff860 50 ec cc 51 c1 01 00 00 f0 c0 cb 51 c1 01 00 00 P..Q.......Q.... 0000009ab67ff870 50 f8 7f b6 9a 00 00 00 47 fe 22 35 60 dd 00 00 P.......G."5`... 0000009ab67ff880 ff ff ff ff ff ff ff ff f0 54 c2 59 fe 7f 00 00 .........T.Y.... 0000009ab67ff890 30 c2 c8 51 c1 01 00 00 30 78 cd 51 c1 01 00 00 0..Q....0x.Q.... 0000009ab67ff8a0 d0 32 cd 51 c1 01 00 00 7d 10 27 d4 f6 7f 00 00 .2.Q....}.'..... Possible instruction pointers: *(0x0000009ab67ff8a8) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 10 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff8b0 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 0000009ab67ff8b0 ff ff ff ff ff ff ff ff 30 c2 c8 51 c1 01 00 00 ........0..Q.... 0000009ab67ff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff8e0 02 00 00 00 00 00 00 00 bc 03 00 00 00 00 00 00 ................ 0000009ab67ff8f0 bc 03 00 00 00 00 00 00 c7 fe 22 35 60 dd 00 00 .........."5`... 0000009ab67ff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff910 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff920 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 11 kernel32.dll + 0x16fd4 rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff930 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab67ff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab67ff950 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 12 ntdll.dll + 0x4cec1 rbp = 0x7fffffffffffffff rsp = 0x0000009ab67ff960 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 7 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000000404 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000000404 rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff6c8 r8 = 0x0000000000000004 r9 = 0x0000000000000007 r10 = 0x0000000000000000 r11 = 0xf000000000000007 r12 = 0x0000000000000001 r13 = 0x0000000000000000 r14 = 0x0000000000000404 r15 = 0x0000009ab68ff810 rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 0000009ab68ff6c8 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff6d0 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 0000009ab68ff6d0 07 f0 d2 35 60 dd 00 00 28 f8 03 52 c1 01 00 00 ...5`...(..R.... 0000009ab68ff6e0 70 70 03 52 c1 01 00 00 80 28 7d d7 f6 7f 00 00 pp.R.....(}..... Possible instruction pointers: *(0x0000009ab68ff6e8) = 0x00007ff6d77d2880 [ : 0 + 0x7ff6d77d2880] 2 Code - OSS.exe!RtlUnwindEx + 0x56d820 rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff6f0 rip = 0x00007ff6d77d2880 Found by: stack scanning Stack contents: 0000009ab68ff6f0 01 00 00 00 00 00 00 00 56 70 23 d4 f6 7f 00 00 ........Vp#..... Possible instruction pointers: *(0x0000009ab68ff6f8) = 0x00007ff6d4237056 [sequence_manager_impl.cc : 739 + 0xc] 3 Code - OSS.exe!base::sequence_manager::internal::SequenceManagerImpl::OnSystemIdle() [sequence_manager_impl.cc : 739 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff700 rip = 0x00007ff6d4237056 Found by: stack scanning Stack contents: 0000009ab68ff700 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 0000009ab68ff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ff740 00 00 00 00 00 00 00 00 d0 f1 cc 51 c1 01 00 00 ...........Q.... 0000009ab68ff750 d0 f1 cc 51 c1 01 00 00 f8 ba ce 51 c1 01 00 00 ...Q.......Q.... Possible instruction pointers: 4 0x1c151cebaf8 rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff760 rip = 0x000001c151cebaf8 Found by: call frame info Stack contents: 0000009ab68ff760 d0 f1 cc 51 c1 01 00 00 14 05 27 d4 f6 7f 00 00 ...Q......'..... Possible instruction pointers: *(0x0000009ab68ff768) = 0x00007ff6d4270514 [waitable_event_win.cc : 74 + 0x0] 5 Code - OSS.exe!base::WaitableEvent::Wait() [waitable_event_win.cc : 69 + 0xb] rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff770 rip = 0x00007ff6d4270514 Found by: stack scanning Stack contents: 0000009ab68ff770 18 f8 8f b6 9a 00 00 00 00 cc 21 d7 f6 7f 00 00 ..........!..... 0000009ab68ff780 00 00 00 00 c1 01 00 00 04 04 00 00 00 00 00 00 ................ 0000009ab68ff790 00 24 50 d8 f6 7f 00 00 00 00 00 00 00 00 00 00 .$P............. 0000009ab68ff7a0 00 00 00 00 00 00 00 00 fd e3 21 d4 f6 7f 00 01 ..........!..... 0000009ab68ff7b0 00 f1 d2 35 60 dd 00 00 00 f1 d2 35 60 dd 00 00 ...5`......5`... 0000009ab68ff7c0 18 f8 8f b6 9a 00 00 00 17 f1 d2 35 60 dd 00 00 ...........5`... 0000009ab68ff7d0 07 f1 d2 35 60 dd 00 00 f8 ba ce 51 c1 01 00 00 ...5`......Q.... 0000009ab68ff7e0 c0 f1 cc 51 c1 01 00 00 1f 27 89 d4 f6 7f 00 00 ...Q.....'...... Possible instruction pointers: *(0x0000009ab68ff778) = 0x00007ff6d721cc00 [atlbase.cpp : 124 + 0x10] *(0x0000009ab68ff790) = 0x00007ff6d8502400 [ : 0 + 0x7ff6d8502400] *(0x0000009ab68ff7e8) = 0x00007ff6d489271f [message_pump_default.cc : 55 + 0x8] 6 Code - OSS.exe!base::MessagePumpDefault::Run(base::MessagePump::Delegate *) [message_pump_default.cc : 55 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff7f0 rip = 0x00007ff6d489271f Found by: call frame info Stack contents: 0000009ab68ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ff800 e8 63 7d d7 f6 7f 00 00 08 00 00 00 00 00 00 00 .c}............. 0000009ab68ff810 30 01 3d 00 00 00 00 00 ff ff ff ff ff ff ff 7f 0.=............. 0000009ab68ff820 00 00 00 00 00 00 00 00 87 f1 d2 35 60 dd 00 00 ...........5`... 0000009ab68ff830 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 0000009ab68ff840 ff ff ff ff ff ff ff 7f 00 bb ce 51 c1 01 00 00 ...........Q.... 0000009ab68ff850 00 00 00 00 00 00 00 00 28 f9 8f b6 9a 00 00 00 ........(....... 0000009ab68ff860 90 f9 8f b6 9a 00 00 00 c8 05 8a d4 f6 7f 00 00 ................ Possible instruction pointers: *(0x0000009ab68ff800) = 0x00007ff6d77d63e8 [ : 0 + 0x7ff6d77d63e8] *(0x0000009ab68ff868) = 0x00007ff6d48a05c8 [thread_controller_with_message_pump_impl.cc : 471 + 0x0] 7 Code - OSS.exe!base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::Run(bool,base::TimeDelta) [thread_controller_with_message_pump_impl.cc : 463 + 0xa] rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff870 rip = 0x00007ff6d48a05c8 Found by: call frame info Stack contents: 0000009ab68ff870 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... 0000009ab68ff880 60 78 cc 51 c1 01 00 00 59 53 20 d4 f6 7f 00 00 `x.Q....YS ..... 0000009ab68ff890 00 00 00 00 00 00 00 00 74 31 24 d4 f6 7f 00 00 ........t1$..... 0000009ab68ff8a0 07 fe d2 35 60 dd 00 00 60 78 cc 51 c1 01 00 00 ...5`...`x.Q.... 0000009ab68ff8b0 00 00 00 00 00 00 00 00 90 f9 8f b6 9a 00 00 00 ................ 0000009ab68ff8c0 b8 f9 8f b6 9a 00 00 00 be cd 21 d4 f6 7f 00 00 ..........!..... Possible instruction pointers: *(0x0000009ab68ff878) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] *(0x0000009ab68ff888) = 0x00007ff6d4205359 [weak_ptr.cc : 90 + 0x29] *(0x0000009ab68ff898) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x0000009ab68ff8c8) = 0x00007ff6d421cdbe [run_loop.cc : 158 + 0x0] 8 Code - OSS.exe!base::RunLoop::Run() [run_loop.cc : 156 + 0x10] rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff8d0 rip = 0x00007ff6d421cdbe Found by: call frame info Stack contents: 0000009ab68ff8d0 00 00 00 00 00 00 00 00 18 f9 8f b6 9a 00 00 00 ................ 0000009ab68ff8e0 00 00 00 00 00 00 00 00 20 63 99 d3 f6 7f 00 00 ........ c...... 0000009ab68ff8f0 20 78 cb 51 c1 01 00 00 74 31 24 d4 f6 7f 00 00 x.Q....t1$..... 0000009ab68ff900 30 78 cb 51 c1 01 00 00 b8 f9 8f b6 9a 00 00 00 0x.Q............ 0000009ab68ff910 60 78 cc 51 c1 01 00 00 98 80 a1 20 e3 3e 00 00 `x.Q....... .>.. 0000009ab68ff920 00 00 00 00 00 00 00 00 c0 bf cb 51 c1 01 00 00 ...........Q.... 0000009ab68ff930 20 f9 8f b6 9a 00 00 00 a7 fe d2 35 60 dd 00 00 ..........5`... 0000009ab68ff940 60 78 cc 51 c1 01 00 00 90 f9 8f b6 9a 00 00 00 `x.Q............ 0000009ab68ff950 b8 f9 8f b6 9a 00 00 00 80 6c cb 51 c1 01 00 00 .........l.Q.... 0000009ab68ff960 70 ea 03 52 c1 01 00 00 62 7b 9b d3 f6 7f 00 00 p..R....b{...... Possible instruction pointers: *(0x0000009ab68ff8e8) = 0x00007ff6d3996320 [thread.cc : 36 + 0xd] *(0x0000009ab68ff8f8) = 0x00007ff6d4243174 [thread_local_storage.cc : 427 + 0x0] *(0x0000009ab68ff968) = 0x00007ff6d39b7b62 [worker_thread.cc : 170 + 0x0] 9 Code - OSS.exe!blink::scheduler::WorkerThread::SimpleThreadImpl::Run() [worker_thread.cc : 169 + 0xc] rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ff970 rip = 0x00007ff6d39b7b62 Found by: call frame info Stack contents: 0000009ab68ff970 60 78 cc 51 c1 01 00 00 c0 f9 8f b6 9a 00 00 00 `x.Q............ 0000009ab68ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ff990 00 bb ce 51 c1 01 00 00 00 00 00 00 00 01 00 01 ...Q............ 0000009ab68ff9a0 40 ed cc 51 c1 01 00 00 e0 c1 cb 51 c1 01 00 00 @..Q.......Q.... 0000009ab68ff9b0 90 f9 8f b6 9a 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ff9d0 07 ff d2 35 60 dd 00 00 ff ff ff ff ff ff ff ff ...5`........... 0000009ab68ff9e0 f0 54 c2 59 fe 7f 00 00 30 c2 c8 51 c1 01 00 00 .T.Y....0..Q.... 0000009ab68ff9f0 00 00 00 00 00 00 00 00 60 78 cc 51 c1 01 00 00 ........`x.Q.... 0000009ab68ffa00 d0 87 03 52 c1 01 00 00 7d 10 27 d4 f6 7f 00 00 ...R....}.'..... Possible instruction pointers: *(0x0000009ab68ffa08) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 10 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ffa10 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 0000009ab68ffa10 ff ff ff ff ff ff ff ff 30 c2 c8 51 c1 01 00 00 ........0..Q.... 0000009ab68ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ffa40 02 00 00 00 00 00 00 00 fc 03 00 00 00 00 00 00 ................ 0000009ab68ffa50 fc 03 00 00 00 00 00 00 67 fc d2 35 60 dd 00 00 ........g..5`... 0000009ab68ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ffa80 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 11 kernel32.dll + 0x16fd4 rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ffa90 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab68ffa90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab68ffab0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 12 ntdll.dll + 0x4cec1 rbp = 0x7fffffffffffffff rsp = 0x0000009ab68ffac0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 8 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x00000000000003f8 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000000000003f8 rbp = 0x0000000000000000 rsp = 0x0000009ab69ffa18 r8 = 0x0000000000001000 r9 = 0x0000000000000008 r10 = 0x0000009ab69fe9f0 r11 = 0x000001c152003000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00000000000003f8 r15 = 0x000001c152038930 rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 0000009ab69ffa18 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rsp = 0x0000009ab69ffa20 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 0000009ab69ffa20 a0 28 02 52 c1 01 00 00 b0 89 03 52 c1 01 00 00 .(.R.......R.... 0000009ab69ffa30 00 00 2b 50 c1 01 00 00 c0 ab 53 59 fe 7f 00 00 ..+P......SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6abc0 rsp = 0x0000009ab69ffa40 rip = 0x00007ffe5953abc0 Found by: stack scanning Stack contents: 0000009ab69ffa40 10 fb 9f b6 9a 00 00 00 00 fb 9f b6 9a 00 00 00 ................ 0000009ab69ffa50 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 0000009ab69ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffa90 00 00 00 00 00 00 00 00 00 00 e6 51 c1 01 00 00 ...........Q.... 0000009ab69ffaa0 80 1d cd 51 c1 01 00 00 b0 1d cd 51 c1 01 00 00 ...Q.......Q.... 0000009ab69ffab0 b0 1d cd 51 c1 01 00 00 14 05 27 d4 f6 7f 00 00 ...Q......'..... Possible instruction pointers: *(0x0000009ab69ffab8) = 0x00007ff6d4270514 [waitable_event_win.cc : 74 + 0x0] 3 Code - OSS.exe!base::WaitableEvent::Wait() [waitable_event_win.cc : 69 + 0xb] rsp = 0x0000009ab69ffac0 rip = 0x00007ff6d4270514 Found by: stack scanning Stack contents: 0000009ab69ffac0 ff ff ff ff ff ff ff ff 58 0a 27 d4 f6 7f 00 00 ........X.'..... 0000009ab69ffad0 00 00 00 00 fe 7f 00 00 f8 03 00 00 00 00 00 00 ................ 0000009ab69ffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffaf0 50 9c 03 52 c1 01 00 00 2f 00 00 00 00 00 00 00 P..R..../....... 0000009ab69ffb00 00 86 cd 51 c1 01 00 00 00 00 00 00 00 00 00 00 ...Q............ 0000009ab69ffb10 30 00 00 00 00 00 00 80 ff ff ff ff ff ff ff ff 0............... 0000009ab69ffb20 b7 fc c2 35 60 dd 00 00 b0 1d cd 51 c1 01 00 00 ...5`......Q.... 0000009ab69ffb30 b0 1d cd 51 c1 01 00 00 eb 7b e3 d5 f6 7f 00 00 ...Q.....{...... Possible instruction pointers: *(0x0000009ab69ffac8) = 0x00007ff6d4270a58 ,std::__1::allocator > const &)> [platform_thread_win.cc : 265 + 0x6] *(0x0000009ab69ffb38) = 0x00007ff6d5e37beb [worker_thread.cc : 33 + 0x8] 4 Code - OSS.exe!base::internal::WorkerThread::Delegate::WaitForWork(base::WaitableEvent *) [worker_thread.cc : 33 + 0x8] rsp = 0x0000009ab69ffb40 rip = 0x00007ff6d5e37beb Found by: call frame info Stack contents: 0000009ab69ffb40 00 00 00 00 00 00 00 00 cf 1e 89 d4 f6 7f 00 00 ................ 0000009ab69ffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffb60 ff ff ff ff ff ff ff 7f 37 fd c2 35 60 dd 00 00 ........7..5`... 0000009ab69ffb70 80 1d cd 51 c1 01 00 00 27 84 e3 d5 f6 7f 00 00 ...Q....'....... Possible instruction pointers: *(0x0000009ab69ffb48) = 0x00007ff6d4891ecf [activity_tracker.cc : 1763 + 0x0] *(0x0000009ab69ffb78) = 0x00007ff6d5e38427 [worker_thread.cc : 298 + 0x0] 5 Code - OSS.exe!base::internal::WorkerThread::RunWorker() [worker_thread.cc : 297 + 0xd] rsp = 0x0000009ab69ffb80 rip = 0x00007ff6d5e38427 Found by: call frame info Stack contents: 0000009ab69ffb80 00 00 00 00 00 00 00 00 14 04 00 00 00 00 00 00 ................ 0000009ab69ffb90 e8 63 7d d7 f6 7f 00 00 30 00 00 00 00 00 00 00 .c}.....0....... 0000009ab69ffba0 00 00 00 00 00 00 00 00 3b 9d 27 d4 f6 7f 00 00 ........;.'..... 0000009ab69ffbb0 00 00 00 00 00 00 00 00 f1 95 a2 5b fe 7f 00 00 ...........[.... 0000009ab69ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffbd0 30 00 00 00 00 00 00 00 e0 ec cd 51 c1 01 00 00 0..........Q.... 0000009ab69ffbe0 00 00 00 00 00 00 00 00 2f cc 21 d7 f6 7f 00 00 ......../.!..... 0000009ab69ffbf0 30 ce d6 51 c1 01 00 00 51 00 00 00 00 00 00 00 0..Q....Q....... 0000009ab69ffc00 00 00 00 00 00 00 00 00 b0 7e 03 52 c1 01 00 00 .........~.R.... 0000009ab69ffc10 e8 ec cd 51 c1 01 00 00 f7 fd c2 35 60 dd 00 00 ...Q.......5`... 0000009ab69ffc20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffc30 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 0000009ab69ffc40 00 00 00 00 00 00 00 00 f0 54 c2 59 fe 7f 00 00 .........T.Y.... 0000009ab69ffc50 30 c2 c8 51 c1 01 00 00 00 00 00 00 00 00 00 00 0..Q............ 0000009ab69ffc60 00 00 00 00 00 00 00 00 80 1d cd 51 c1 01 00 00 ...........Q.... 0000009ab69ffc70 30 89 03 52 c1 01 00 00 d0 82 e3 d5 f6 7f 00 00 0..R............ Possible instruction pointers: *(0x0000009ab69ffb90) = 0x00007ff6d77d63e8 [ : 0 + 0x7ff6d77d63e8] *(0x0000009ab69ffba8) = 0x00007ff6d4279d3b [allocator_shim_override_ucrt_symbols_win.h : 53 + 0x21] *(0x0000009ab69ffbe8) = 0x00007ff6d721cc2f [new_scalar.cpp : 35 + 0x8] *(0x0000009ab69ffc78) = 0x00007ff6d5e382d0 [worker_thread.cc : 235 + 0x5] 6 Code - OSS.exe!base::internal::WorkerThread::RunSharedWorker() [worker_thread.cc : 235 + 0x5] rsp = 0x0000009ab69ffc80 rip = 0x00007ff6d5e382d0 Found by: call frame info Stack contents: 0000009ab69ffc80 00 00 00 00 00 00 00 00 38 80 e3 d5 f6 7f 00 00 ........8....... 0000009ab69ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffca0 00 00 00 00 00 00 00 00 80 1d cd 51 ea 00 00 00 ...........Q.... 0000009ab69ffcb0 f7 fa c2 35 60 dd 00 00 7d 10 27 d4 f6 7f 00 00 ...5`...}.'..... Possible instruction pointers: *(0x0000009ab69ffc88) = 0x00007ff6d5e38038 [worker_thread.cc : 200 + 0x6] *(0x0000009ab69ffcb8) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x0000009ab69ffcc0 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 0000009ab69ffcc0 ff ff ff ff ff ff ff ff 30 c2 c8 51 c1 01 00 00 ........0..Q.... 0000009ab69ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffcf0 02 00 00 00 00 00 00 00 14 04 00 00 00 00 00 00 ................ 0000009ab69ffd00 14 04 00 00 00 00 00 00 b7 fa c2 35 60 dd 00 00 ...........5`... 0000009ab69ffd10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffd30 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x0000009ab69ffd40 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab69ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab69ffd60 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x0000009ab69ffd70 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 9 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x000001c151cd5080 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000001c151cd5080 rbp = 0x0000009ab6affc00 rsp = 0x0000009ab6affba8 r8 = 0x0000000000000008 r9 = 0x0000000000000000 r10 = 0x0000000000008000 r11 = 0x00000000000000ff r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000009ab6affbd8 r15 = 0x000001c151cd5130 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab6affba8 71 4f a7 5b fe 7f 00 00 qO.[.... Possible instruction pointers: 1 ntdll.dll + 0x64f71 rbp = 0x0000009ab6affc00 rsp = 0x0000009ab6affbb0 rip = 0x00007ffe5ba74f71 Found by: stack scanning Stack contents: 0000009ab6affbb0 00 00 00 00 c1 01 00 00 08 00 00 00 f6 7f 00 00 ................ 0000009ab6affbc0 58 22 d0 51 c1 01 00 00 20 8c 04 52 c1 01 00 00 X".Q.... ..R.... 0000009ab6affbd0 40 f6 bf b6 9a 00 00 00 40 f6 bf b6 9a 00 00 00 @.......@....... 0000009ab6affbe0 00 00 00 00 00 00 00 00 84 1a 00 00 00 00 00 00 ................ 0000009ab6affbf0 00 00 03 00 01 00 00 00 80 50 cd 51 c1 01 00 00 .........P.Q.... 0000009ab6affc00 70 8d 03 52 c1 01 00 00 80 50 cd 51 c1 01 00 00 p..R.....P.Q.... 0000009ab6affc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6affc20 00 00 00 00 00 00 00 00 69 ab 53 59 fe 7f 00 00 ........i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rsp = 0x0000009ab6affc30 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 0000009ab6affc30 50 50 cd 51 c1 01 00 00 30 51 cd 51 c1 01 00 00 PP.Q....0Q.Q.... 0000009ab6affc40 a8 22 d0 51 c1 01 00 00 2c a9 d4 d5 f6 7f 00 00 .".Q....,....... Possible instruction pointers: *(0x0000009ab6affc48) = 0x00007ff6d5d4a92c [categorized_worker_pool.cc : 423 + 0xc] 3 Code - OSS.exe!content::CategorizedWorkerPool::ShouldRunTaskForCategoryWithLockAcquired(cc::TaskCategory) [categorized_worker_pool.cc : 423 + 0xc] rsp = 0x0000009ab6affc50 rip = 0x00007ff6d5d4a92c Found by: stack scanning Stack contents: 0000009ab6affc50 00 00 00 00 00 00 00 00 b0 61 ce 51 c1 01 00 00 .........a.Q.... 0000009ab6affc60 50 50 cd 51 c1 01 00 00 14 03 27 d4 f6 7f 00 00 PP.Q......'..... 0000009ab6affc70 b2 61 ce 51 c1 01 00 00 50 50 cd 51 c1 01 00 00 .a.Q....PP.Q.... 0000009ab6affc80 a8 22 d0 51 c1 01 00 00 50 50 cd 51 c1 01 00 00 .".Q....PP.Q.... 0000009ab6affc90 18 fc ff ff e7 03 00 00 00 a4 d4 d5 f6 7f 00 00 ................ Possible instruction pointers: *(0x0000009ab6affc68) = 0x00007ff6d4270314 [condition_variable_win.cc : 30 + 0x43] *(0x0000009ab6affc98) = 0x00007ff6d5d4a400 > const &)> [categorized_worker_pool.cc : 385 + 0x4] 4 Code - OSS.exe!content::CategorizedWorkerPool::RunTaskWithLockAcquired(std::__1::vector > const &) [categorized_worker_pool.cc : 385 + 0x4] rsp = 0x0000009ab6affca0 rip = 0x00007ff6d5d4a400 Found by: call frame info Stack contents: 0000009ab6affca0 00 22 d0 51 c1 01 00 00 00 00 00 00 00 00 00 00 .".Q............ 0000009ab6affcb0 50 50 cd 51 c1 01 00 00 07 fa f2 35 60 dd 00 00 PP.Q.......5`... 0000009ab6affcc0 30 51 cd 51 c1 01 00 00 d0 a3 d4 d5 f6 7f 00 00 0Q.Q............ 0000009ab6affcd0 f0 54 c2 59 fe 7f 00 00 50 22 d0 51 c1 01 00 00 .T.Y....P".Q.... Possible instruction pointers: *(0x0000009ab6affcc8) = 0x00007ff6d5d4a3d0 > const &,base::ConditionVariable *)> [categorized_worker_pool.cc : 280 + 0x8] 5 0x1c151d02250 rsp = 0x0000009ab6affce0 rip = 0x000001c151d02250 Found by: call frame info Stack contents: 0000009ab6affce0 50 22 d0 51 c1 01 00 00 ab 1e 24 d4 f6 7f 00 00 P".Q......$..... Possible instruction pointers: *(0x0000009ab6affce8) = 0x00007ff6d4241eab [simple_thread.cc : 75 + 0x0] 6 Code - OSS.exe!base::SimpleThread::ThreadMain() [simple_thread.cc : 74 + 0x9] rsp = 0x0000009ab6affcf0 rip = 0x00007ff6d4241eab Found by: stack scanning Stack contents: 0000009ab6affcf0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 0000009ab6affd00 f0 54 c2 59 fe 7f 00 00 30 c2 c8 51 c1 01 00 00 .T.Y....0..Q.... 0000009ab6affd10 50 22 d0 51 c1 01 00 00 7d 10 27 d4 f6 7f 00 00 P".Q....}.'..... Possible instruction pointers: *(0x0000009ab6affd18) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x0000009ab6affd20 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 0000009ab6affd20 ff ff ff ff ff ff ff ff 30 c2 c8 51 c1 01 00 00 ........0..Q.... 0000009ab6affd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6affd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6affd50 02 00 00 00 00 00 00 00 2c 04 00 00 00 00 00 00 ........,....... 0000009ab6affd60 2c 04 00 00 00 00 00 00 57 fb f2 35 60 dd 00 00 ,.......W..5`... 0000009ab6affd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6affd80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6affd90 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x0000009ab6affda0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab6affda0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6affdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6affdc0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x0000009ab6affdd0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 10 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x000001c151cd5080 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000001c151cd5080 rbp = 0x0000009ab6bff670 rsp = 0x0000009ab6bff618 r8 = 0x0000000000000017 r9 = 0x0000000000000400 r10 = 0x0000000000000007 r11 = 0x000000000000000f r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000009ab6bff648 r15 = 0x000001c151cd5130 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab6bff618 71 4f a7 5b fe 7f 00 00 qO.[.... Possible instruction pointers: 1 ntdll.dll + 0x64f71 rbp = 0x0000009ab6bff670 rsp = 0x0000009ab6bff620 rip = 0x00007ffe5ba74f71 Found by: stack scanning Stack contents: 0000009ab6bff620 00 00 00 00 c1 01 00 00 04 00 00 00 f6 7f 00 00 ................ 0000009ab6bff630 08 24 d0 51 c1 01 00 00 20 8c 04 52 c1 01 00 00 .$.Q.... ..R.... 0000009ab6bff640 00 00 00 00 00 00 00 00 40 f6 bf b6 9a 00 00 00 ........@....... 0000009ab6bff650 d0 fb af b6 9a 00 00 00 54 28 00 00 00 00 00 00 ........T(...... 0000009ab6bff660 00 00 03 00 01 00 00 00 80 50 cd 51 c1 01 00 00 .........P.Q.... 0000009ab6bff670 b0 8c 03 52 c1 01 00 00 80 50 cd 51 c1 01 00 00 ...R.....P.Q.... 0000009ab6bff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6bff690 00 00 00 00 00 00 00 00 69 ab 53 59 fe 7f 00 00 ........i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rsp = 0x0000009ab6bff6a0 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 0000009ab6bff6a0 50 50 cd 51 c1 01 00 00 30 51 cd 51 c1 01 00 00 PP.Q....0Q.Q.... 0000009ab6bff6b0 58 24 d0 51 c1 01 00 00 2c a9 d4 d5 f6 7f 00 00 X$.Q....,....... Possible instruction pointers: *(0x0000009ab6bff6b8) = 0x00007ff6d5d4a92c [categorized_worker_pool.cc : 423 + 0xc] 3 Code - OSS.exe!content::CategorizedWorkerPool::ShouldRunTaskForCategoryWithLockAcquired(cc::TaskCategory) [categorized_worker_pool.cc : 423 + 0xc] rsp = 0x0000009ab6bff6c0 rip = 0x00007ff6d5d4a92c Found by: stack scanning Stack contents: 0000009ab6bff6c0 00 00 00 00 00 00 00 00 90 60 ce 51 c1 01 00 00 .........`.Q.... 0000009ab6bff6d0 50 50 cd 51 c1 01 00 00 14 03 27 d4 f6 7f 00 00 PP.Q......'..... 0000009ab6bff6e0 92 60 ce 51 c1 01 00 00 50 50 cd 51 c1 01 00 00 .`.Q....PP.Q.... 0000009ab6bff6f0 58 24 d0 51 c1 01 00 00 50 50 cd 51 c1 01 00 00 X$.Q....PP.Q.... 0000009ab6bff700 18 fc ff ff e7 03 00 00 00 a4 d4 d5 f6 7f 00 00 ................ Possible instruction pointers: *(0x0000009ab6bff6d8) = 0x00007ff6d4270314 [condition_variable_win.cc : 30 + 0x43] *(0x0000009ab6bff708) = 0x00007ff6d5d4a400 > const &)> [categorized_worker_pool.cc : 385 + 0x4] 4 Code - OSS.exe!content::CategorizedWorkerPool::RunTaskWithLockAcquired(std::__1::vector > const &) [categorized_worker_pool.cc : 385 + 0x4] rsp = 0x0000009ab6bff710 rip = 0x00007ff6d5d4a400 Found by: call frame info Stack contents: 0000009ab6bff710 00 24 d0 51 c1 01 00 00 00 00 00 00 00 00 00 00 .$.Q............ 0000009ab6bff720 50 50 cd 51 c1 01 00 00 97 f0 e2 35 60 dd 00 00 PP.Q.......5`... 0000009ab6bff730 30 51 cd 51 c1 01 00 00 d0 a3 d4 d5 f6 7f 00 00 0Q.Q............ 0000009ab6bff740 f0 54 c2 59 fe 7f 00 00 00 24 d0 51 c1 01 00 00 .T.Y.....$.Q.... Possible instruction pointers: *(0x0000009ab6bff738) = 0x00007ff6d5d4a3d0 > const &,base::ConditionVariable *)> [categorized_worker_pool.cc : 280 + 0x8] 5 0x1c151d02400 rsp = 0x0000009ab6bff750 rip = 0x000001c151d02400 Found by: call frame info Stack contents: 0000009ab6bff750 00 24 d0 51 c1 01 00 00 ab 1e 24 d4 f6 7f 00 00 .$.Q......$..... Possible instruction pointers: *(0x0000009ab6bff758) = 0x00007ff6d4241eab [simple_thread.cc : 75 + 0x0] 6 Code - OSS.exe!base::SimpleThread::ThreadMain() [simple_thread.cc : 74 + 0x9] rsp = 0x0000009ab6bff760 rip = 0x00007ff6d4241eab Found by: stack scanning Stack contents: 0000009ab6bff760 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 0000009ab6bff770 f0 54 c2 59 fe 7f 00 00 30 c2 c8 51 c1 01 00 00 .T.Y....0..Q.... 0000009ab6bff780 00 24 d0 51 c1 01 00 00 7d 10 27 d4 f6 7f 00 00 .$.Q....}.'..... Possible instruction pointers: *(0x0000009ab6bff788) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x0000009ab6bff790 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 0000009ab6bff790 ff ff ff ff ff ff ff ff 30 c2 c8 51 c1 01 00 00 ........0..Q.... 0000009ab6bff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6bff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6bff7c0 02 00 00 00 00 00 00 00 34 04 00 00 00 00 00 00 ........4....... 0000009ab6bff7d0 34 04 00 00 00 00 00 00 e7 f1 e2 35 60 dd 00 00 4..........5`... 0000009ab6bff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6bff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6bff800 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x0000009ab6bff810 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab6bff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6bff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6bff830 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x0000009ab6bff840 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 11 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x000001c151cd5080 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000001c151cd5080 rbp = 0x0000009ab6cff990 rsp = 0x0000009ab6cff938 r8 = 0x0000009ab6cffae8 r9 = 0x00007ff6d427104c r10 = 0x0000009ab6cfd000 r11 = 0x0000009ab6cfd000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000009ab6cff960 r15 = 0x000001c151cd5148 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab6cff938 71 4f a7 5b fe 7f 00 00 qO.[.... Possible instruction pointers: 1 ntdll.dll + 0x64f71 rbp = 0x0000009ab6cff990 rsp = 0x0000009ab6cff940 rip = 0x00007ffe5ba74f71 Found by: stack scanning Stack contents: 0000009ab6cff940 c0 ac 01 52 c1 01 00 00 12 00 00 00 f6 7f 00 00 ...R............ 0000009ab6cff950 90 d2 d0 51 c1 01 00 00 f0 23 02 52 c1 01 00 00 ...Q.....#.R.... 0000009ab6cff960 00 00 00 00 00 00 00 00 60 f9 cf b6 9a 00 00 00 ........`....... 0000009ab6cff970 00 00 00 00 00 00 00 00 b0 23 00 00 00 00 00 00 .........#...... 0000009ab6cff980 50 fa cf b6 01 00 00 00 80 50 cd 51 c1 01 00 00 P........P.Q.... 0000009ab6cff990 50 8a 03 52 c1 01 00 00 80 50 cd 51 c1 01 00 00 P..R.....P.Q.... 0000009ab6cff9a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6cff9b0 00 00 00 00 00 00 00 00 69 ab 53 59 fe 7f 00 00 ........i.SY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x6ab69 rsp = 0x0000009ab6cff9c0 rip = 0x00007ffe5953ab69 Found by: stack scanning Stack contents: 0000009ab6cff9c0 50 50 cd 51 c1 01 00 00 48 51 cd 51 c1 01 00 00 PP.Q....HQ.Q.... 0000009ab6cff9d0 e8 24 d0 51 c1 01 00 00 2c a9 d4 d5 f6 7f 00 00 .$.Q....,....... Possible instruction pointers: *(0x0000009ab6cff9d8) = 0x00007ff6d5d4a92c [categorized_worker_pool.cc : 423 + 0xc] 3 Code - OSS.exe!content::CategorizedWorkerPool::ShouldRunTaskForCategoryWithLockAcquired(cc::TaskCategory) [categorized_worker_pool.cc : 423 + 0xc] rsp = 0x0000009ab6cff9e0 rip = 0x00007ff6d5d4a92c Found by: stack scanning Stack contents: 0000009ab6cff9e0 80 50 cd 51 c1 01 00 00 80 50 cd 51 c1 01 00 00 .P.Q.....P.Q.... 0000009ab6cff9f0 50 50 cd 51 c1 01 00 00 14 03 27 d4 f6 7f 00 00 PP.Q......'..... 0000009ab6cffa00 a0 60 ce 51 c1 01 00 00 50 50 cd 51 c1 01 00 00 .`.Q....PP.Q.... 0000009ab6cffa10 e8 24 d0 51 c1 01 00 00 50 50 cd 51 c1 01 00 00 .$.Q....PP.Q.... 0000009ab6cffa20 18 fc ff ff e7 03 00 00 00 a4 d4 d5 f6 7f 00 00 ................ Possible instruction pointers: *(0x0000009ab6cff9f8) = 0x00007ff6d4270314 [condition_variable_win.cc : 30 + 0x43] *(0x0000009ab6cffa28) = 0x00007ff6d5d4a400 > const &)> [categorized_worker_pool.cc : 385 + 0x4] 4 Code - OSS.exe!content::CategorizedWorkerPool::RunTaskWithLockAcquired(std::__1::vector > const &) [categorized_worker_pool.cc : 385 + 0x4] rsp = 0x0000009ab6cffa30 rip = 0x00007ff6d5d4a400 Found by: call frame info Stack contents: 0000009ab6cffa30 00 d2 d0 51 c1 01 00 00 00 00 00 00 00 00 00 00 ...Q............ 0000009ab6cffa40 50 50 cd 51 c1 01 00 00 77 fc 92 35 60 dd 00 00 PP.Q....w..5`... 0000009ab6cffa50 48 51 cd 51 c1 01 00 00 d0 a3 d4 d5 f6 7f 00 00 HQ.Q............ 0000009ab6cffa60 f0 54 c2 59 fe 7f 00 00 90 24 d0 51 c1 01 00 00 .T.Y.....$.Q.... Possible instruction pointers: *(0x0000009ab6cffa58) = 0x00007ff6d5d4a3d0 > const &,base::ConditionVariable *)> [categorized_worker_pool.cc : 280 + 0x8] 5 0x1c151d02490 rsp = 0x0000009ab6cffa70 rip = 0x000001c151d02490 Found by: call frame info Stack contents: 0000009ab6cffa70 90 24 d0 51 c1 01 00 00 ab 1e 24 d4 f6 7f 00 00 .$.Q......$..... Possible instruction pointers: *(0x0000009ab6cffa78) = 0x00007ff6d4241eab [simple_thread.cc : 75 + 0x0] 6 Code - OSS.exe!base::SimpleThread::ThreadMain() [simple_thread.cc : 74 + 0x9] rsp = 0x0000009ab6cffa80 rip = 0x00007ff6d4241eab Found by: stack scanning Stack contents: 0000009ab6cffa80 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 0000009ab6cffa90 f0 54 c2 59 fe 7f 00 00 30 c2 c8 51 c1 01 00 00 .T.Y....0..Q.... 0000009ab6cffaa0 90 24 d0 51 c1 01 00 00 7d 10 27 d4 f6 7f 00 00 .$.Q....}.'..... Possible instruction pointers: *(0x0000009ab6cffaa8) = 0x00007ff6d427107d [platform_thread_win.cc : 109 + 0x0] 7 Code - OSS.exe!base::`anonymous namespace'::ThreadFunc [platform_thread_win.cc : 106 + 0x8] rsp = 0x0000009ab6cffab0 rip = 0x00007ff6d427107d Found by: call frame info Stack contents: 0000009ab6cffab0 ff ff ff ff ff ff ff ff 30 c2 c8 51 c1 01 00 00 ........0..Q.... 0000009ab6cffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6cffad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6cffae0 02 00 00 00 00 00 00 00 38 04 00 00 00 00 00 00 ........8....... 0000009ab6cffaf0 38 04 00 00 00 00 00 00 c7 fc 92 35 60 dd 00 00 8..........5`... 0000009ab6cffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6cffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6cffb20 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 8 kernel32.dll + 0x16fd4 rsp = 0x0000009ab6cffb30 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab6cffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6cffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6cffb50 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 9 ntdll.dll + 0x4cec1 rsp = 0x0000009ab6cffb60 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 12 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000000454 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000000454 rbp = 0x0000000000000000 rsp = 0x0000009ab6dff738 r8 = 0x000001c151cada90 r9 = 0x0000009ab6dff690 r10 = 0x0000000000000080 r11 = 0x0205803002916020 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000454 r15 = 0x0000000000000000 rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 0000009ab6dff738 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rsp = 0x0000009ab6dff740 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 0000009ab6dff740 c0 cf 09 52 c1 01 00 00 25 ea 52 59 fe 7f 00 00 ...R....%.RY.... Possible instruction pointers: 2 KERNELBASE.dll + 0x5ea25 rsp = 0x0000009ab6dff750 rip = 0x00007ffe5952ea25 Found by: stack scanning Stack contents: 0000009ab6dff750 50 8b c8 51 c1 01 00 00 00 00 00 00 00 00 00 00 P..Q............ 0000009ab6dff760 47 f1 82 35 60 dd 00 00 d8 f7 df b6 9a 00 00 00 G..5`........... 0000009ab6dff770 48 00 00 00 00 00 00 00 01 00 00 00 f6 7f 00 00 H............... 0000009ab6dff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff7b0 00 00 00 00 00 00 00 00 5f 14 63 d2 f6 7f 00 00 ........_.c..... Possible instruction pointers: *(0x0000009ab6dff7b8) = 0x00007ff6d263145f [node_bindings.cc : 434 + 0x21] 3 Code - OSS.exe!electron::NodeBindings::WakeupMainThread() [node_bindings.cc : 434 + 0x21] rsp = 0x0000009ab6dff7c0 rip = 0x00007ff6d263145f Found by: stack scanning Stack contents: 0000009ab6dff7c0 00 00 00 00 00 00 00 00 28 ad c8 51 c1 01 00 00 ........(..Q.... 0000009ab6dff7d0 40 aa c8 51 c1 01 00 00 92 70 88 d4 f6 7f 00 00 @..Q.....p...... 0000009ab6dff7e0 80 11 63 d2 f6 7f 00 00 80 11 63 d2 f6 7f 00 00 ..c.......c..... 0000009ab6dff7f0 00 00 00 00 c1 01 00 00 54 04 00 00 00 00 00 00 ........T....... 0000009ab6dff800 00 00 00 00 00 00 00 00 98 11 63 d2 f6 7f 00 00 ..........c..... 0000009ab6dff810 90 6c 88 d4 f6 7f 00 00 00 00 00 00 00 00 00 00 .l.............. 0000009ab6dff820 00 00 00 00 00 00 00 00 80 11 63 d2 f6 7f 00 00 ..........c..... 0000009ab6dff830 58 04 00 00 00 00 00 00 58 04 00 00 00 00 00 00 X.......X....... 0000009ab6dff840 40 aa c8 51 c1 01 00 00 42 6c 88 d4 f6 7f 00 00 @..Q....Bl...... Possible instruction pointers: *(0x0000009ab6dff7d8) = 0x00007ff6d4887092 [thread.c : 372 + 0xe] *(0x0000009ab6dff7e0) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x0000009ab6dff7e8) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x0000009ab6dff808) = 0x00007ff6d2631198 [node_bindings.cc : 449 + 0x0] *(0x0000009ab6dff810) = 0x00007ff6d4886c90 [thread.c : 84 + 0x0] *(0x0000009ab6dff828) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x0000009ab6dff848) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 4 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x0000009ab6dff850 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 0000009ab6dff850 80 11 63 d2 f6 7f 00 00 40 aa c8 51 c1 01 00 00 ..c.....@..Q.... 0000009ab6dff860 01 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff870 90 e5 08 52 c1 01 00 00 00 00 00 00 00 00 00 00 ...R............ 0000009ab6dff880 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x0000009ab6dff850) = 0x00007ff6d2631180 [node_bindings.cc : 443 + 0x0] *(0x0000009ab6dff888) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 5 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x0000009ab6dff890 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 0000009ab6dff890 00 00 00 00 c1 01 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff8b0 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 6 kernel32.dll + 0x16fd4 rsp = 0x0000009ab6dff8c0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab6dff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab6dff8e0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 7 ntdll.dll + 0x4cec1 rsp = 0x0000009ab6dff8f0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 13 0 ntdll.dll + 0x9ae14 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000000468 rbx = 0x0000000000000000 rsi = 0x0000009ab6eff9c8 rdi = 0x0000000000000468 rbp = 0x000001c1520902c0 rsp = 0x0000009ab6eff998 r8 = 0x000001c151cb6638 r9 = 0x000000007ffe0010 r10 = 0x00000001dc9f68e6 r11 = 0x0000000000000246 r12 = 0x0000009ab6effa60 r13 = 0x0000009ab6effb98 r14 = 0x0000000000000468 r15 = 0x7fffffffffffffff rip = 0x00007ffe5baaae14 Found by: given as instruction pointer in context Stack contents: 0000009ab6eff998 ee 26 4f 59 fe 7f 00 00 .&OY.... Possible instruction pointers: 1 KERNELBASE.dll + 0x226ee rbp = 0x000001c1520902c0 rsp = 0x0000009ab6eff9a0 rip = 0x00007ffe594f26ee Found by: stack scanning Stack contents: 0000009ab6eff9a0 c0 02 09 52 c1 01 00 00 e0 8d cb 51 c1 01 00 00 ...R.......Q.... 0000009ab6eff9b0 78 fa ef b6 9a 00 00 00 61 e0 27 d4 f6 7f 00 00 x.......a.'..... Possible instruction pointers: *(0x0000009ab6eff9b8) = 0x00007ff6d427e061 [time_win.cc : 432 + 0x6] 2 Code - OSS.exe!base::`anonymous namespace'::RolloverProtectedNow [time_win.cc : 432 + 0x6] rbp = 0x000001c1520902c0 rsp = 0x0000009ab6eff9c0 rip = 0x00007ff6d427e061 Found by: stack scanning Thread 14 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x0000009ab70ff6b8 rdi = 0x0000000000000000 rbp = 0x0000009ab70ff6e0 rsp = 0x0000009ab70ff688 r8 = 0x0000000000000001 r9 = 0x00007ff6d85640c8 r10 = 0x00007ff6d85640c8 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab70ff688 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x0000009ab70ff6e0 rsp = 0x0000009ab70ff690 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 0000009ab70ff690 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff6a0 00 fa 1f b7 9a 00 00 00 b8 f6 0f b7 9a 00 00 00 ................ 0000009ab70ff6b0 00 00 00 00 00 00 00 00 10 fd 3f b7 9a 00 00 00 ..........?..... 0000009ab70ff6c0 b0 f6 2f b7 9a 00 00 00 80 05 00 00 00 00 00 00 ../............. 0000009ab70ff6d0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff6e0 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab70ff6e0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab70ff6e8 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab70ff6e8 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x0000009ab70ff6e8) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x0000009ab70ff6f0 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 0000009ab70ff6f0 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x0000009ab70ff6f0) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x0000009ab70ff6f8 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 0000009ab70ff6f8 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x0000009ab70ff700 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 0000009ab70ff700 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab70ff700) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab70ff708 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab70ff708 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x0000009ab70ff708) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x0000009ab70ff710 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 0000009ab70ff710 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x0000009ab70ff710) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x0000009ab70ff718 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 0000009ab70ff718 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x0000009ab70ff720) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab70ff728 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab70ff728 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x0000009ab70ff728) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x0000009ab70ff730 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 0000009ab70ff730 30 41 56 d8 f6 7f 00 00 70 41 56 d8 f6 7f 00 00 0AV.....pAV..... 0000009ab70ff740 50 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 PAV......AV..... 0000009ab70ff750 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x0000009ab70ff730) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab70ff738) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] *(0x0000009ab70ff740) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab70ff748) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab70ff750) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab70ff758) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x0000009ab70ff760 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 0000009ab70ff760 e0 23 3e d5 f6 7f 00 00 a0 e6 0e 52 c1 01 00 00 .#>........R.... 0000009ab70ff770 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 0000009ab70ff780 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 0000009ab70ff790 00 00 00 00 00 00 00 00 b8 04 00 00 00 00 00 00 ................ 0000009ab70ff7a0 f8 ce bf b5 9a 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff7c0 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x0000009ab70ff760) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab70ff770) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab70ff778) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab70ff788) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab70ff7c8) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x0000009ab70ff7d0 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 0000009ab70ff7d0 e0 23 3e d5 f6 7f 00 00 f8 ce bf b5 9a 00 00 00 .#>............. 0000009ab70ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff7f0 80 2d 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 .-"R............ 0000009ab70ff800 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x0000009ab70ff7d0) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab70ff808) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x0000009ab70ff810 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 0000009ab70ff810 80 2d 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 .-"R............ 0000009ab70ff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff830 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x0000009ab70ff840 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab70ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab70ff860 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x0000009ab70ff870 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 15 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x0000009ab71ffa08 rdi = 0x0000000000000000 rbp = 0x0000009ab71ffa30 rsp = 0x0000009ab71ff9d8 r8 = 0x0000009ab71ff9d8 r9 = 0x0000009ab71ffa30 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab71ff9d8 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x0000009ab71ffa30 rsp = 0x0000009ab71ff9e0 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 0000009ab71ff9e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ff9f0 10 fd 3f b7 9a 00 00 00 08 fa 1f b7 9a 00 00 00 ..?............. 0000009ab71ffa00 10 fd 3f b7 9a 00 00 00 b0 f6 0f b7 9a 00 00 00 ..?............. 0000009ab71ffa10 00 00 00 00 00 00 00 00 e0 23 00 00 00 00 00 00 .........#...... 0000009ab71ffa20 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ffa30 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab71ffa30) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab71ffa38 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab71ffa38 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x0000009ab71ffa38) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x0000009ab71ffa40 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 0000009ab71ffa40 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x0000009ab71ffa40) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x0000009ab71ffa48 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 0000009ab71ffa48 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x0000009ab71ffa50 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 0000009ab71ffa50 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab71ffa50) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab71ffa58 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab71ffa58 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x0000009ab71ffa58) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x0000009ab71ffa60 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 0000009ab71ffa60 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x0000009ab71ffa60) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x0000009ab71ffa68 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 0000009ab71ffa68 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x0000009ab71ffa70) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab71ffa78 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab71ffa78 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x0000009ab71ffa78) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x0000009ab71ffa80 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 0000009ab71ffa80 30 41 56 d8 f6 7f 00 00 70 41 56 d8 f6 7f 00 00 0AV.....pAV..... 0000009ab71ffa90 50 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 PAV......AV..... 0000009ab71ffaa0 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x0000009ab71ffa80) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab71ffa88) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] *(0x0000009ab71ffa90) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab71ffa98) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab71ffaa0) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab71ffaa8) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x0000009ab71ffab0 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 0000009ab71ffab0 e0 23 3e d5 f6 7f 00 00 c0 e1 0e 52 c1 01 00 00 .#>........R.... 0000009ab71ffac0 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 0000009ab71ffad0 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 0000009ab71ffae0 00 00 00 00 00 00 00 00 bc 04 00 00 00 00 00 00 ................ 0000009ab71ffaf0 f8 ce bf b5 9a 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ffb10 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x0000009ab71ffab0) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab71ffac0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab71ffac8) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab71ffad8) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab71ffb18) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x0000009ab71ffb20 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 0000009ab71ffb20 e0 23 3e d5 f6 7f 00 00 f8 ce bf b5 9a 00 00 00 .#>............. 0000009ab71ffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ffb40 e0 24 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 .$"R............ 0000009ab71ffb50 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x0000009ab71ffb20) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab71ffb58) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x0000009ab71ffb60 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 0000009ab71ffb60 e0 24 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 .$"R............ 0000009ab71ffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ffb80 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x0000009ab71ffb90 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab71ffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab71ffbb0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x0000009ab71ffbc0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 16 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x0000009ab72ff6b8 rdi = 0x0000000000000000 rbp = 0x0000009ab72ff6e0 rsp = 0x0000009ab72ff688 r8 = 0x0000000000000000 r9 = 0x00007ff6d8564110 r10 = 0x0000000000000000 r11 = 0x0000009ab72ff6e0 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab72ff688 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x0000009ab72ff6e0 rsp = 0x0000009ab72ff690 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 0000009ab72ff690 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff6a0 b0 f6 0f b7 9a 00 00 00 b8 f6 2f b7 9a 00 00 00 ........../..... 0000009ab72ff6b0 b0 f6 0f b7 9a 00 00 00 00 fa 1f b7 9a 00 00 00 ................ 0000009ab72ff6c0 10 fd 3f b7 9a 00 00 00 04 1b 00 00 00 00 00 00 ..?............. 0000009ab72ff6d0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff6e0 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab72ff6e0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab72ff6e8 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab72ff6e8 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x0000009ab72ff6e8) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x0000009ab72ff6f0 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 0000009ab72ff6f0 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x0000009ab72ff6f0) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x0000009ab72ff6f8 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 0000009ab72ff6f8 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x0000009ab72ff700 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 0000009ab72ff700 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab72ff700) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab72ff708 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab72ff708 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x0000009ab72ff708) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x0000009ab72ff710 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 0000009ab72ff710 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x0000009ab72ff710) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x0000009ab72ff718 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 0000009ab72ff718 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x0000009ab72ff720) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab72ff728 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab72ff728 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x0000009ab72ff728) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x0000009ab72ff730 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 0000009ab72ff730 30 41 56 d8 f6 7f 00 00 70 41 56 d8 f6 7f 00 00 0AV.....pAV..... 0000009ab72ff740 50 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 PAV......AV..... 0000009ab72ff750 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x0000009ab72ff730) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab72ff738) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] *(0x0000009ab72ff740) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab72ff748) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab72ff750) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab72ff758) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x0000009ab72ff760 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 0000009ab72ff760 e0 23 3e d5 f6 7f 00 00 80 df 0e 52 c1 01 00 00 .#>........R.... 0000009ab72ff770 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 0000009ab72ff780 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 0000009ab72ff790 00 00 00 00 00 00 00 00 c0 04 00 00 00 00 00 00 ................ 0000009ab72ff7a0 f8 ce bf b5 9a 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff7c0 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x0000009ab72ff760) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab72ff770) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab72ff778) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab72ff788) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab72ff7c8) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x0000009ab72ff7d0 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 0000009ab72ff7d0 e0 23 3e d5 f6 7f 00 00 f8 ce bf b5 9a 00 00 00 .#>............. 0000009ab72ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff7f0 70 2e 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 p."R............ 0000009ab72ff800 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x0000009ab72ff7d0) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab72ff808) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x0000009ab72ff810 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 0000009ab72ff810 70 2e 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 p."R............ 0000009ab72ff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff830 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x0000009ab72ff840 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab72ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab72ff860 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x0000009ab72ff870 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Thread 17 0 ntdll.dll + 0x9e784 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00007ff6d8564108 rbx = 0x0000000000000000 rsi = 0x0000009ab73ffd18 rdi = 0x0000000000000000 rbp = 0x0000009ab73ffd40 rsp = 0x0000009ab73ffce8 r8 = 0x0000000000000000 r9 = 0x00007ff6d8564110 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ff6d8564108 r15 = 0x00007ff6d85640c8 rip = 0x00007ffe5baae784 Found by: given as instruction pointer in context Stack contents: 0000009ab73ffce8 e5 51 a7 5b fe 7f 00 00 .Q.[.... Possible instruction pointers: 1 ntdll.dll + 0x651e5 rbp = 0x0000009ab73ffd40 rsp = 0x0000009ab73ffcf0 rip = 0x00007ffe5ba751e5 Found by: stack scanning Stack contents: 0000009ab73ffcf0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffd00 b0 f6 2f b7 9a 00 00 00 18 fd 3f b7 9a 00 00 00 ../.......?..... 0000009ab73ffd10 b0 f6 2f b7 9a 00 00 00 b0 f6 0f b7 9a 00 00 00 ../............. 0000009ab73ffd20 00 fa 1f b7 9a 00 00 00 f0 0c 00 00 00 00 00 00 ................ 0000009ab73ffd30 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffd40 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab73ffd40) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 2 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab73ffd48 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab73ffd48 c8 40 56 d8 f6 7f 00 00 .@V..... Possible instruction pointers: *(0x0000009ab73ffd48) = 0x00007ff6d85640c8 [ : 0 + 0x7ff6d85640c8] 3 Code - OSS.exe!RtlUnwindEx + 0x12ff068 rsp = 0x0000009ab73ffd50 rip = 0x00007ff6d85640c8 Found by: stack scanning Stack contents: 0000009ab73ffd50 70 41 56 d8 f6 7f 00 00 pAV..... Possible instruction pointers: *(0x0000009ab73ffd50) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] 4 Code - OSS.exe!RtlUnwindEx + 0x12ff110 rsp = 0x0000009ab73ffd58 rip = 0x00007ff6d8564170 Found by: stack scanning Stack contents: 0000009ab73ffd58 b9 aa 53 59 fe 7f 00 00 ..SY.... Possible instruction pointers: 5 KERNELBASE.dll + 0x6aab9 rsp = 0x0000009ab73ffd60 rip = 0x00007ffe5953aab9 Found by: stack scanning Stack contents: 0000009ab73ffd60 30 41 56 d8 f6 7f 00 00 0AV..... Possible instruction pointers: *(0x0000009ab73ffd60) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 6 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab73ffd68 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab73ffd68 08 41 56 d8 f6 7f 00 00 .AV..... Possible instruction pointers: *(0x0000009ab73ffd68) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] 7 Code - OSS.exe!RtlUnwindEx + 0x12ff0a8 rsp = 0x0000009ab73ffd70 rip = 0x00007ff6d8564108 Found by: stack scanning Stack contents: 0000009ab73ffd70 50 41 56 d8 f6 7f 00 00 PAV..... Possible instruction pointers: *(0x0000009ab73ffd70) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] 8 Code - OSS.exe!RtlUnwindEx + 0x12ff0f0 rsp = 0x0000009ab73ffd78 rip = 0x00007ff6d8564150 Found by: stack scanning Stack contents: 0000009ab73ffd78 d0 00 00 00 00 00 00 00 30 41 56 d8 f6 7f 00 00 ........0AV..... Possible instruction pointers: *(0x0000009ab73ffd80) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] 9 Code - OSS.exe!RtlUnwindEx + 0x12ff0d0 rsp = 0x0000009ab73ffd88 rip = 0x00007ff6d8564130 Found by: stack scanning Stack contents: 0000009ab73ffd88 10 71 88 d4 f6 7f 00 00 .q...... Possible instruction pointers: *(0x0000009ab73ffd88) = 0x00007ff6d4887110 [thread.c : 414 + 0xc] 10 Code - OSS.exe!uv_cond_wait [thread.c : 414 + 0xc] rsp = 0x0000009ab73ffd90 rip = 0x00007ff6d4887110 Found by: stack scanning Stack contents: 0000009ab73ffd90 30 41 56 d8 f6 7f 00 00 70 41 56 d8 f6 7f 00 00 0AV.....pAV..... 0000009ab73ffda0 50 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 PAV......AV..... 0000009ab73ffdb0 50 41 56 d8 f6 7f 00 00 6d 24 3e d5 f6 7f 00 00 PAV.....m$>..... Possible instruction pointers: *(0x0000009ab73ffd90) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab73ffd98) = 0x00007ff6d8564170 [ : 0 + 0x7ff6d8564170] *(0x0000009ab73ffda0) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab73ffda8) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab73ffdb0) = 0x00007ff6d8564150 [ : 0 + 0x7ff6d8564150] *(0x0000009ab73ffdb8) = 0x00007ff6d53e246d [threadpool.c : 77 + 0x0] 11 Code - OSS.exe!worker [threadpool.c : 76 + 0xb] rsp = 0x0000009ab73ffdc0 rip = 0x00007ff6d53e246d Found by: call frame info Stack contents: 0000009ab73ffdc0 e0 23 3e d5 f6 7f 00 00 60 e5 0e 52 c1 01 00 00 .#>.....`..R.... 0000009ab73ffdd0 30 41 56 d8 f6 7f 00 00 08 41 56 d8 f6 7f 00 00 0AV......AV..... 0000009ab73ffde0 00 00 00 00 00 00 00 00 e0 23 3e d5 f6 7f 00 00 .........#>..... 0000009ab73ffdf0 00 00 00 00 00 00 00 00 c4 04 00 00 00 00 00 00 ................ 0000009ab73ffe00 f8 ce bf b5 9a 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffe20 00 00 00 00 00 00 00 00 42 6c 88 d4 f6 7f 00 00 ........Bl...... Possible instruction pointers: *(0x0000009ab73ffdc0) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab73ffdd0) = 0x00007ff6d8564130 [ : 0 + 0x7ff6d8564130] *(0x0000009ab73ffdd8) = 0x00007ff6d8564108 [ : 0 + 0x7ff6d8564108] *(0x0000009ab73ffde8) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab73ffe28) = 0x00007ff6d4886c42 [thread.c : 110 + 0x0] 12 Code - OSS.exe!uv__thread_start [thread.c : 108 + 0x5] rsp = 0x0000009ab73ffe30 rip = 0x00007ff6d4886c42 Found by: call frame info Stack contents: 0000009ab73ffe30 e0 23 3e d5 f6 7f 00 00 f8 ce bf b5 9a 00 00 00 .#>............. 0000009ab73ffe40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffe50 10 2b 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 .+"R............ 0000009ab73ffe60 00 00 00 00 00 00 00 00 40 ba 22 d7 f6 7f 00 00 ........@."..... Possible instruction pointers: *(0x0000009ab73ffe30) = 0x00007ff6d53e23e0 [threadpool.c : 57 + 0x0] *(0x0000009ab73ffe68) = 0x00007ff6d722ba40 > [thread.cpp : 97 + 0xd] 13 Code - OSS.exe!thread_start [thread.cpp : 97 + 0xd] rsp = 0x0000009ab73ffe70 rip = 0x00007ff6d722ba40 Found by: call frame info Stack contents: 0000009ab73ffe70 10 2b 22 52 c1 01 00 00 00 00 00 00 00 00 00 00 .+"R............ 0000009ab73ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffe90 00 00 00 00 00 00 00 00 d4 6f c2 59 fe 7f 00 00 .........o.Y.... Possible instruction pointers: 14 kernel32.dll + 0x16fd4 rsp = 0x0000009ab73ffea0 rip = 0x00007ffe59c26fd4 Found by: call frame info Stack contents: 0000009ab73ffea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000009ab73ffec0 00 00 00 00 00 00 00 00 c1 ce a5 5b fe 7f 00 00 ...........[.... Possible instruction pointers: 15 ntdll.dll + 0x4cec1 rsp = 0x0000009ab73ffed0 rip = 0x00007ffe5ba5cec1 Found by: stack scanning Loaded modules: 0x7ff6d2500000 - 0x7ff6d8bbffff Code - OSS.exe 8.3.3.0 (main) 0x7ffe40550000 - 0x7ffe405b5fff oleacc.dll 7.2.19041.1 0x7ffe449a0000 - 0x7ffe44c91fff UIAutomationCore.DLL 7.2.19041.153 0x7ffe450c0000 - 0x7ffe45359fff comctl32.dll 6.10.19041.1 0x7ffe459e0000 - 0x7ffe45a06fff winmm.dll 6.3.19041.1 0x7ffe471e0000 - 0x7ffe473acfff d3d9.dll 6.3.19041.1 0x7ffe47a10000 - 0x7ffe47c8dfff DWrite.dll 6.3.19041.264 0x7ffe49480000 - 0x7ffe4948bfff secur32.dll 6.3.19041.1 0x7ffe4a9e0000 - 0x7ffe4abccfff urlmon.dll 11.0.19041.117 0x7ffe4ae00000 - 0x7ffe4afe3fff dbghelp.dll 6.3.19041.1 0x7ffe4b4d0000 - 0x7ffe4b55dfff winspool.drv 6.3.19041.1 0x7ffe4c050000 - 0x7ffe4c2fdfff iertutil.dll 11.0.19041.1 0x7ffe4daa0000 - 0x7ffe4dcdffff ffmpeg.dll ??? 0x7ffe4ef30000 - 0x7ffe4ef39fff version.dll 6.3.19041.1 0x7ffe4f040000 - 0x7ffe4f05cfff dhcpcsvc.dll 6.3.19041.1 0x7ffe51bd0000 - 0x7ffe51ccffff winhttp.dll 6.3.19041.264 0x7ffe53960000 - 0x7ffe53983fff dxva2.dll 6.3.19041.1 0x7ffe548f0000 - 0x7ffe54908fff usp10.dll 6.3.19041.1 0x7ffe549e0000 - 0x7ffe54ad4fff propsys.dll 7.0.19041.1 0x7ffe54b10000 - 0x7ffe54b23fff wtsapi32.dll 6.3.19041.1 0x7ffe54d30000 - 0x7ffe54f92fff d3d11.dll 6.3.19041.1 0x7ffe55bf0000 - 0x7ffe55bf6fff msimg32.dll 6.3.19041.264 0x7ffe56b60000 - 0x7ffe56bfefff uxtheme.dll 6.3.19041.1 0x7ffe56d50000 - 0x7ffe56d7dfff dwmapi.dll 6.3.19041.1 0x7ffe57220000 - 0x7ffe579adfff windows.storage.dll 6.3.19041.329 0x7ffe579b0000 - 0x7ffe579bcfff hid.dll 6.3.19041.1 0x7ffe57ac0000 - 0x7ffe57bb2fff dxgi.dll 6.3.19041.1 0x7ffe57ce0000 - 0x7ffe57cf2fff kernel.appcore.dll 6.3.19041.1 0x7ffe58580000 - 0x7ffe585bafff IPHLPAPI.DLL 6.3.19041.1 0x7ffe58890000 - 0x7ffe588f9fff mswsock.dll 6.3.19041.1 0x7ffe58a80000 - 0x7ffe58a8bfff CRYPTBASE.DLL 6.3.19041.1 0x7ffe58b10000 - 0x7ffe58b3afff wldp.dll 6.3.19041.1 0x7ffe58b40000 - 0x7ffe58b7afff ntasn1.dll 6.3.19041.1 0x7ffe58b80000 - 0x7ffe58ba6fff ncrypt.dll 6.3.19041.1 0x7ffe58fb0000 - 0x7ffe58fc1fff umpdc.dll ??? 0x7ffe58fd0000 - 0x7ffe5901afff powrprof.dll 6.3.19041.1 0x7ffe59020000 - 0x7ffe59050fff sspicli.dll 6.3.19041.1 0x7ffe59060000 - 0x7ffe5908dfff userenv.dll 6.3.19041.1 0x7ffe59160000 - 0x7ffe592bcfff crypt32.dll 6.3.19041.21 0x7ffe59320000 - 0x7ffe5941ffff ucrtbase.dll 6.3.19041.1 0x7ffe594d0000 - 0x7ffe59796fff KERNELBASE.dll 6.3.19041.292 (WARNING: No symbols, kernelbase.pdb, D6169164FE35DE0ECD89935474AA28D61) 0x7ffe597f0000 - 0x7ffe59811fff win32u.dll 6.3.19041.329 0x7ffe59850000 - 0x7ffe598ecfff msvcp_win.dll 6.3.19041.1 0x7ffe598f0000 - 0x7ffe599f9fff gdi32full.dll 6.3.19041.329 0x7ffe59a00000 - 0x7ffe59a7efff bcryptPrimitives.dll 6.3.19041.264 0x7ffe59a80000 - 0x7ffe59b1dfff msvcrt.dll 7.0.19041.1 0x7ffe59b20000 - 0x7ffe59b49fff gdi32.dll 6.3.19041.1 0x7ffe59b50000 - 0x7ffe59ba4fff shlwapi.dll 6.3.19041.1 0x7ffe59c10000 - 0x7ffe59cccfff kernel32.dll 6.3.19041.292 (WARNING: No symbols, kernel32.pdb, 89C3B9FD1C796A0F430E0CEF0646F0031) 0x7ffe59cd0000 - 0x7ffe59cfffff imm32.dll 6.3.19041.1 0x7ffe59d00000 - 0x7ffe59dd9fff comdlg32.dll 6.3.19041.329 0x7ffe59f00000 - 0x7ffe59fccfff oleaut32.dll 6.3.19041.329 0x7ffe5a4a0000 - 0x7ffe5a63ffff user32.dll 6.3.19041.264 0x7ffe5a6f0000 - 0x7ffe5aa42fff combase.dll 6.3.19041.329 0x7ffe5aab0000 - 0x7ffe5ab4afff sechost.dll 6.3.19041.1 0x7ffe5ac80000 - 0x7ffe5ad29fff advapi32.dll 6.3.19041.1 0x7ffe5af60000 - 0x7ffe5b693fff shell32.dll 6.3.19041.329 0x7ffe5b6a0000 - 0x7ffe5b70afff ws2_32.dll 6.3.19041.1 0x7ffe5b730000 - 0x7ffe5b7ddfff SHCore.dll 6.3.19041.264 0x7ffe5b8a0000 - 0x7ffe5b9c2fff rpcrt4.dll 6.3.19041.1 0x7ffe5ba10000 - 0x7ffe5bc03fff ntdll.dll 6.3.19041.207 (WARNING: No symbols, ntdll.pdb, 63E12347526A46144B98F8CF61CDED791)