Operating system: Windows NT 10.0.19043 CPU: amd64 family 23 model 8 stepping 2 16 CPUs GPU: UNKNOWN Crash reason: EXCEPTION_ACCESS_VIOLATION_READ Crash address: 0x70 Process uptime: 24 seconds Thread 0 (crashed) 0 Audacity.exe + 0x510fa7 rax = 0x0000000000000000 rdx = 0x00007ffe3b57fe04 rcx = 0x00007ffe3b570000 rbx = 0x00000044e4315020 rsi = 0x000000000000000d rdi = 0x0000000000060660 rbp = 0x0000000000000019 rsp = 0x00000044e4314bc0 r8 = 0x0000000000000000 r9 = 0x00000000000002a4 r10 = 0x00007ffe3b6245f0 r11 = 0x0000000000000246 r12 = 0x0000000000060660 r13 = 0x0000000000060660 r14 = 0x000000000000000d r15 = 0x0000000000000001 rip = 0x00007ff6cc820fa7 Found by: given as instruction pointer in context Stack contents: 00000044e4314bc0 20 50 31 e4 44 00 00 00 0d 00 00 00 00 00 00 00 P1äD........... 00000044e4314bd0 30 29 00 80 01 00 00 00 0)...... Possible instruction pointers: 1 HcDLL2_30_x64.dll + 0x2930 rsp = 0x00000044e4314bd8 rip = 0x0000000180002930 Found by: stack scanning Stack contents: 00000044e4314bd8 48 4c 31 e4 44 00 00 00 00 00 00 00 00 00 00 00 HL1äD........... 00000044e4314be8 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000044e4314bf8 b0 28 58 3b fe 7f 00 00 °(X;þ... Possible instruction pointers: 2 user32.dll + 0x128b0 rsp = 0x00000044e4314c00 rip = 0x00007ffe3b5828b0 Found by: stack scanning Stack contents: 00000044e4314c00 01 00 00 00 00 00 00 00 58 4d 31 e4 44 00 00 00 ........XM1äD... 00000044e4314c10 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ........ÿÿÿÿÿÿÿÿ 00000044e4314c20 ff ff ff ff ff ff ff ff 93 e6 57 3b fe 7f 00 00 ÿÿÿÿÿÿÿÿ?æW;þ... Possible instruction pointers: 3 user32.dll + 0xe693 rsp = 0x00000044e4314c30 rip = 0x00007ffe3b57e693 Found by: stack scanning Stack contents: 00000044e4314c30 26 eb 57 3b fe 7f 00 00 &ëW;þ... Possible instruction pointers: 4 user32.dll + 0xeb26 rsp = 0x00000044e4314c38 rip = 0x00007ffe3b57eb26 Found by: stack scanning Stack contents: 00000044e4314c38 68 8e ad ad 0b 11 00 00 00 00 00 00 00 00 00 00 h?­­............ 00000044e4314c48 00 00 00 00 10 60 00 00 00 00 00 00 00 00 00 00 .....`.......... 00000044e4314c58 00 00 00 00 00 00 00 00 70 0f 82 cc f6 7f 00 00 ........p.?Ìö... Possible instruction pointers: 5 Audacity.exe + 0x510f70 rsp = 0x00000044e4314c68 rip = 0x00007ff6cc820f70 Found by: stack scanning Stack contents: 00000044e4314c68 00 00 00 80 00 00 00 00 48 00 00 00 00 00 00 00 ........H....... 00000044e4314c78 01 00 00 00 fe 7f 00 00 00 00 00 00 00 00 00 00 ....þ........... 00000044e4314c88 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000044e4314c98 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ 00000044e4314ca8 22 28 58 3b fe 7f 00 00 "(X;þ... Possible instruction pointers: 6 user32.dll + 0x12822 rsp = 0x00000044e4314cb0 rip = 0x00007ffe3b582822 Found by: stack scanning Stack contents: 00000044e4314cb0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000044e4314cc0 01 00 00 00 00 00 00 00 20 50 31 e4 44 00 00 00 ........ P1äD... 00000044e4314cd0 19 00 00 00 00 00 00 00 52 20 58 3b fe 7f 00 00 ........R X;þ... Possible instruction pointers: 7 user32.dll + 0x12052 rsp = 0x00000044e4314ce0 rip = 0x00007ffe3b582052 Found by: stack scanning Stack contents: 00000044e4314ce0 00 00 00 00 00 00 00 00 70 0f 82 cc f6 7f 00 00 ........p.?Ìö... Possible instruction pointers: 8 Audacity.exe + 0x510f70 rsp = 0x00000044e4314cf0 rip = 0x00007ff6cc820f70 Found by: stack scanning Stack contents: 00000044e4314cf0 0d 00 00 00 00 00 00 00 70 83 03 df 58 01 00 00 ........p?.ßX... 00000044e4314d00 19 00 00 00 00 00 00 00 20 50 31 e4 44 00 00 00 ........ P1äD... 00000044e4314d10 01 00 00 00 00 00 00 00 30 4d 31 e4 44 00 00 00 ........0M1äD... 00000044e4314d20 00 00 00 00 00 00 00 00 20 50 31 e4 44 00 00 00 ........ P1äD... 00000044e4314d30 00 00 00 00 00 00 00 00 b1 02 00 00 64 00 65 00 ........±...d.e. 00000044e4314d40 58 89 ad ad 0b 11 00 00 68 00 72 00 65 00 72 00 X?­­....h.r.e.r. 00000044e4314d50 65 00 20 00 44 00 61 00 00 00 00 00 00 00 00 00 e. .D.a......... 00000044e4314d60 00 00 00 00 00 00 00 00 0d 00 00 00 00 00 00 00 ................ 00000044e4314d70 00 00 00 00 00 00 00 00 19 00 00 00 00 00 00 00 ................ 00000044e4314d80 0d 00 00 00 00 00 00 00 20 50 31 e4 44 00 00 00 ........ P1äD... 00000044e4314d90 70 59 31 e4 44 00 00 00 66 1f 58 3b fe 7f 00 00 pY1äD...f.X;þ... Possible instruction pointers: 9 user32.dll + 0x11f66 rsp = 0x00000044e4314da0 rip = 0x00007ffe3b581f66 Found by: stack scanning Stack contents: 00000044e4314da0 00 00 00 00 00 00 00 00 84 03 01 80 01 00 00 00 ........?....... Possible instruction pointers: 10 HcDLL2_30_x64.dll + 0x10384 rsp = 0x00000044e4314db0 rip = 0x0000000180010384 Found by: stack scanning Stack contents: 00000044e4314db0 00 00 00 00 00 00 00 00 3e b3 0a 3c fe 7f 00 00 ........>³.<þ... Possible instruction pointers: 11 kernel32.dll + 0x1b33e rsp = 0x00000044e4314dc0 rip = 0x00007ffe3c0ab33e Found by: stack scanning Stack contents: 00000044e4314dc0 00 00 00 00 7d cb 00 00 70 83 03 df 58 01 00 00 ....}Ë..p?.ßX... 00000044e4314dd0 10 60 00 00 00 00 00 00 e8 e7 57 3b fe 7f 00 00 .`......èçW;þ... Possible instruction pointers: 12 user32.dll + 0xe7e8 rsp = 0x00000044e4314de0 rip = 0x00007ffe3b57e7e8 Found by: stack scanning Stack contents: 00000044e4314de0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314df0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314e00 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314e10 06 00 00 00 00 00 00 00 a0 4f 31 e4 44 00 00 00 ........ O1äD... 00000044e4314e20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314e30 00 00 00 00 10 60 00 00 00 00 00 00 00 00 00 00 .....`.......... 00000044e4314e40 00 00 00 00 00 00 00 00 92 0d 58 3b 00 00 00 00 ........?.X;.... 00000044e4314e50 00 00 00 00 00 00 00 00 77 98 1a 3c fe 7f 00 00 ........w..<þ... Possible instruction pointers: 13 ntdll.dll + 0x19877 rsp = 0x00000044e4314e60 rip = 0x00007ffe3c1a9877 Found by: stack scanning Stack contents: 00000044e4314e60 f0 ff ff ff 00 00 00 00 bf 20 57 3b fe 7f 00 00 ðÿÿÿ....¿ W;þ... Possible instruction pointers: 14 user32.dll + 0x20bf rsp = 0x00000044e4314e70 rip = 0x00007ffe3b5720bf Found by: stack scanning Stack contents: 00000044e4314e70 00 00 00 00 00 00 00 00 55 7d d8 90 dd c9 00 00 ........U}Ø.ÝÉ.. 00000044e4314e80 a0 4f 31 e4 44 00 00 00 90 2b 00 80 01 00 00 00  O1äD....+...... Possible instruction pointers: 15 HcDLL2_30_x64.dll + 0x2b90 rsp = 0x00000044e4314e90 rip = 0x0000000180002b90 Found by: stack scanning Stack contents: 00000044e4314e90 00 00 00 00 00 00 00 00 ab 02 00 00 44 00 00 00 ........«...D... 00000044e4314ea0 01 00 00 00 00 00 00 00 a0 4f 31 e4 44 00 00 00 ........ O1äD... 00000044e4314eb0 00 00 00 00 00 00 00 00 59 c0 5f 3b fe 7f 00 00 ........YÀ_;þ... Possible instruction pointers: 16 user32.dll + 0x8c059 rsp = 0x00000044e4314ec0 rip = 0x00007ffe3b5fc059 Found by: stack scanning Stack contents: 00000044e4314ec0 30 29 00 80 01 00 00 00 0)...... Possible instruction pointers: 17 HcDLL2_30_x64.dll + 0x2930 rsp = 0x00000044e4314ec8 rip = 0x0000000180002930 Found by: stack scanning Stack contents: 00000044e4314ec8 38 4f 31 e4 44 00 00 00 00 cb 22 3c fe 7f 00 00 8O1äD....Ë"<þ... Possible instruction pointers: 18 ntdll.dll + 0x9cb00 rsp = 0x00000044e4314ed8 rip = 0x00007ffe3c22cb00 Found by: stack scanning Stack contents: 00000044e4314ed8 a0 4f 31 e4 44 00 00 00 48 00 00 00 00 00 00 00  O1äD...H....... 00000044e4314ee8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314ef8 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000044e4314f08 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ 00000044e4314f18 93 e6 57 3b fe 7f 00 00 ?æW;þ... Possible instruction pointers: 19 user32.dll + 0xe693 rsp = 0x00000044e4314f20 rip = 0x00007ffe3b57e693 Found by: stack scanning Stack contents: 00000044e4314f20 00 00 00 00 00 00 00 00 78 8b ad ad 0b 11 00 00 ........x?­­.... 00000044e4314f30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314f40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314f50 00 00 00 40 00 00 00 00 00 00 00 80 00 00 00 00 ...@............ 00000044e4314f60 88 03 00 c0 00 00 00 00 6c e3 57 3b fe 7f 00 00 ...À....lãW;þ... Possible instruction pointers: 20 user32.dll + 0xe36c rsp = 0x00000044e4314f70 rip = 0x00007ffe3b57e36c Found by: stack scanning Stack contents: 00000044e4314f70 70 59 31 e4 44 00 00 00 00 cb 22 3c fe 7f 00 00 pY1äD....Ë"<þ... Possible instruction pointers: 21 ntdll.dll + 0x9cb00 rsp = 0x00000044e4314f80 rip = 0x00007ffe3c22cb00 Found by: stack scanning Stack contents: 00000044e4314f80 60 06 06 00 00 00 00 00 0d 00 00 00 44 00 00 00 `...........D... 00000044e4314f90 19 00 00 00 00 00 00 00 20 50 31 e4 44 00 00 00 ........ P1äD... 00000044e4314fa0 01 00 00 00 44 00 00 00 01 00 00 00 00 00 00 00 ....D........... 00000044e4314fb0 00 00 00 00 00 00 00 00 60 06 06 00 00 00 00 00 ........`....... 00000044e4314fc0 00 00 00 00 00 00 00 00 54 2d 59 3b fe 7f 00 00 ........T-Y;þ... Possible instruction pointers: 22 user32.dll + 0x22d54 rsp = 0x00000044e4314fd0 rip = 0x00007ffe3b592d54 Found by: stack scanning Stack contents: 00000044e4314fd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314fe0 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4314ff0 00 cb 22 3c fe 7f 00 00 .Ë"<þ... Possible instruction pointers: 23 ntdll.dll + 0x9cb00 rsp = 0x00000044e4314ff8 rip = 0x00007ffe3c22cb00 Found by: stack scanning Stack contents: 00000044e4314ff8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4315008 36 00 00 00 00 00 00 00 20 50 31 e4 44 00 00 00 6....... P1äD... 00000044e4315018 00 00 00 00 00 00 00 00 00 ff ff ff 00 00 00 00 .........ÿÿÿ.... 00000044e4315028 40 51 31 e4 44 00 00 00 80 52 31 e4 44 00 00 00 @Q1äD....R1äD... 00000044e4315038 30 35 09 3c fe 7f 00 00 05 <þ... Possible instruction pointers: 24 kernel32.dll + 0x3530 rsp = 0x00000044e4315040 rip = 0x00007ffe3c093530 Found by: stack scanning Stack contents: 00000044e4315040 02 02 00 00 00 00 00 00 02 02 00 00 00 00 00 00 ................ 00000044e4315050 00 00 00 00 00 00 00 00 ff 03 00 00 00 00 00 00 ........ÿ....... 00000044e4315060 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff e7 ............ÿÿÿç 00000044e4315070 f0 e0 a3 de 58 01 00 00 00 00 00 00 00 00 00 00 ðà£ÞX........... 00000044e4315080 f0 e0 a3 de 58 01 00 00 00 00 00 00 00 00 00 00 ðà£ÞX........... 00000044e4315090 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 ÿÿÿÿ............ 00000044e43150a0 ff ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00 ÿÿÿÿÿÿÿÿ........ 00000044e43150b0 ff ff ff ff 00 00 00 00 d0 51 31 e4 44 00 00 00 ÿÿÿÿ....ÐQ1äD... 00000044e43150c0 10 53 31 e4 44 00 00 00 30 35 09 3c fe 7f 00 00 .S1äD...05 <þ... Possible instruction pointers: 25 kernel32.dll + 0x3530 rsp = 0x00000044e43150d0 rip = 0x00007ffe3c093530 Found by: stack scanning Thread 1 0 ntdll.dll + 0xa07c4 rax = 0x00000000000001d3 rdx = 0x00000158de9577f0 rcx = 0x000000000000005c rbx = 0x00000158de957b70 rsi = 0x00000158de952ea0 rdi = 0x00000158de957b70 rbp = 0x0000000000000000 rsp = 0x00000044e46ff698 r8 = 0x0000000000000008 r9 = 0x0000000000000040 r10 = 0x0000000000000040 r11 = 0x0000000000000002 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c2307c4 Found by: given as instruction pointer in context Stack contents: 00000044e46ff698 c7 2d 1e 3c fe 7f 00 00 Ç-.<þ... Possible instruction pointers: 1 ntdll.dll + 0x52dc7 rsp = 0x00000044e46ff6a0 rip = 0x00007ffe3c1e2dc7 Found by: stack scanning Thread 2 0 ntdll.dll + 0xa07c4 rax = 0x00000000000001d3 rdx = 0x00000158de958840 rcx = 0x000000000000005c rbx = 0x00000158de958bc0 rsi = 0x00000158de952ea0 rdi = 0x00000158de958bc0 rbp = 0x0000000000000000 rsp = 0x00000044e47ff5f8 r8 = 0x00000000000000e8 r9 = 0x00000044e47ff528 r10 = 0x00007ffe384000e8 r11 = 0x00007ffe3841d3f8 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c2307c4 Found by: given as instruction pointer in context Stack contents: 00000044e47ff5f8 c7 2d 1e 3c fe 7f 00 00 Ç-.<þ... Possible instruction pointers: 1 ntdll.dll + 0x52dc7 rsp = 0x00000044e47ff600 rip = 0x00007ffe3c1e2dc7 Found by: stack scanning Thread 3 0 ntdll.dll + 0xa07c4 rax = 0x00000000000001d3 rdx = 0x00000158de9584a0 rcx = 0x000000000000005c rbx = 0x00000158de958820 rsi = 0x00000158de952ea0 rdi = 0x00000158de958820 rbp = 0x0000000000000000 rsp = 0x00000044e48ff638 r8 = 0x00000044e48feda0 r9 = 0x00000000000000ff r10 = 0x000000000000006c r11 = 0x00000044e48feba0 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c2307c4 Found by: given as instruction pointer in context Stack contents: 00000044e48ff638 c7 2d 1e 3c fe 7f 00 00 Ç-.<þ... Possible instruction pointers: 1 ntdll.dll + 0x52dc7 rsp = 0x00000044e48ff640 rip = 0x00007ffe3c1e2dc7 Found by: stack scanning Thread 4 0 ntdll.dll + 0x9eba4 rax = 0x00000000000000f2 rdx = 0x00000044e49fd8c0 rcx = 0x0000000000000518 rbx = 0x00000158e2cce200 rsi = 0x00000158e2cce2a8 rdi = 0x00000158e2cce310 rbp = 0xffffffffffffffff rsp = 0x00000044e49fd848 r8 = 0x00000000000007b4 r9 = 0x0000000000000528 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x00000158e2cce310 r13 = 0x00000158e2cce2a8 r14 = 0x00000158e2cce2b8 r15 = 0x0000000000000518 rip = 0x00007ffe3c22eba4 Found by: given as instruction pointer in context Stack contents: 00000044e49fd848 00 00 00 00 44 00 00 00 00 01 9f e4 02 00 00 00 ....D.....?ä.... 00000044e49fd858 3e 00 00 00 3e 00 00 00 1f 00 00 00 00 00 00 00 >...>........... 00000044e49fd868 3e 00 08 02 00 00 00 00 b0 d9 9f e4 44 00 00 00 >.......°Ù?äD... 00000044e49fd878 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fd888 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fd898 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fd8a8 00 00 00 00 00 00 00 00 00 73 b9 e0 58 01 00 00 .........s¹àX... 00000044e49fd8b8 b1 47 1b 3c 3e 00 00 00 04 01 00 00 44 00 00 00 ±G.<>.......D... 00000044e49fd8c8 00 00 00 00 00 00 00 00 04 01 00 00 00 00 00 00 ................ 00000044e49fd8d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fd8e8 78 f6 48 34 7d cb 00 00 38 c2 2a 3c fe 7f 00 00 xöH4}Ë..8Â*<þ... Possible instruction pointers: 1 ntdll.dll + 0x11c238 rbp = 0xffffffffffffffff rsp = 0x00000044e49fd8f8 rip = 0x00007ffe3c2ac238 Found by: stack scanning Stack contents: 00000044e49fd8f8 50 dc 9f e4 44 00 00 00 00 00 00 00 00 00 00 00 PÜ?äD........... 00000044e49fd908 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 H............... 00000044e49fd918 08 00 00 00 00 00 00 00 3e 00 00 00 00 00 00 00 ........>....... 00000044e49fd928 38 b2 1a 3c fe 7f 00 00 8².<þ... Possible instruction pointers: 2 ntdll.dll + 0x1b238 rbp = 0xffffffffffffffff rsp = 0x00000044e49fd930 rip = 0x00007ffe3c1ab238 Found by: stack scanning Stack contents: 00000044e49fd930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fd940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fd950 60 d9 9f e4 44 00 00 00 90 d9 9f e4 44 00 00 00 `Ù?äD....Ù?äD... 00000044e49fd960 00 d9 9f e4 02 00 00 00 b0 d9 9f e4 44 00 00 00 .Ù?ä....°Ù?äD... 00000044e49fd970 00 00 20 e3 02 00 00 00 00 00 00 00 00 00 00 00 .. ã............ 00000044e49fd980 00 00 00 00 44 00 00 00 00 01 c7 27 fe 7f 00 00 ....D.....Ç'þ... Possible instruction pointers: 3 dbgcore.dll + 0x100 rbp = 0xffffffffffffffff rsp = 0x00000044e49fd990 rip = 0x00007ffe27c70100 Found by: stack scanning Stack contents: 00000044e49fd990 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fd9a0 00 00 00 00 00 00 00 00 1e 37 1c 3c fe 7f 00 00 .........7.<þ... Possible instruction pointers: 4 ntdll.dll + 0x3371e rbp = 0xffffffffffffffff rsp = 0x00000044e49fd9b0 rip = 0x00007ffe3c1c371e Found by: stack scanning Stack contents: 00000044e49fd9b0 00 00 00 00 5c 00 57 00 49 00 4e 00 44 00 4f 00 ....\.W.I.N.D.O. 00000044e49fd9c0 57 00 53 00 5c 00 53 00 08 00 00 00 00 00 00 00 W.S.\.S......... 00000044e49fd9d0 44 00 00 00 32 00 5c 00 00 01 c7 27 fe 7f 00 00 D...2.\...Ç'þ... Possible instruction pointers: 5 dbgcore.dll + 0x100 rbp = 0xffffffffffffffff rsp = 0x00000044e49fd9e0 rip = 0x00007ffe27c70100 Found by: stack scanning Stack contents: 00000044e49fd9e0 ff ff ff ff ff ff ff ff 44 00 4c 00 4c 00 00 00 ÿÿÿÿÿÿÿÿD.L.L... 00000044e49fd9f0 85 03 fe 7f 00 00 00 00 00 10 00 00 00 00 00 00 ?.þ............. 00000044e49fda00 00 00 00 00 00 00 00 00 00 c0 02 00 00 00 00 00 .........À...... 00000044e49fda10 00 00 00 00 00 00 00 00 49 b4 1d 3c fe 7f 00 00 ........I´.<þ... Possible instruction pointers: 6 ntdll.dll + 0x4b449 rbp = 0xffffffffffffffff rsp = 0x00000044e49fda20 rip = 0x00007ffe3c1db449 Found by: stack scanning Stack contents: 00000044e49fda20 00 00 00 00 00 00 00 00 84 03 fe 7f 00 00 00 00 ........?.þ..... 00000044e49fda30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fda40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fda50 00 00 00 00 00 00 00 00 f1 7f 1c 3c fe 7f 00 00 ........ñ..<þ... Possible instruction pointers: 7 ntdll.dll + 0x37ff1 rbp = 0xffffffffffffffff rsp = 0x00000044e49fda60 rip = 0x00007ffe3c1c7ff1 Found by: stack scanning Stack contents: 00000044e49fda60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fda70 78 f6 48 34 7d cb 00 00 ff ff ff ff ff ff ff ff xöH4}Ë..ÿÿÿÿÿÿÿÿ 00000044e49fda80 00 a0 c9 27 fe 7f 00 00 . É'þ... Possible instruction pointers: 8 dbgcore.dll + 0x2a000 rbp = 0xffffffffffffffff rsp = 0x00000044e49fda88 rip = 0x00007ffe27c9a000 Found by: stack scanning Stack contents: 00000044e49fda88 00 00 c7 27 fe 7f 00 00 40 a0 c9 27 fe 7f 00 00 ..Ç'þ...@ É'þ... Possible instruction pointers: 9 dbgcore.dll + 0x2a040 rbp = 0xffffffffffffffff rsp = 0x00000044e49fda98 rip = 0x00007ffe27c9a040 Found by: stack scanning Stack contents: 00000044e49fda98 10 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fdaa8 73 aa 1d 3c fe 7f 00 00 sª.<þ... Possible instruction pointers: 10 ntdll.dll + 0x4aa73 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdab0 rip = 0x00007ffe3c1daa73 Found by: stack scanning Stack contents: 00000044e49fdab0 00 00 00 00 00 00 00 00 00 01 c7 27 fe 7f 00 00 ..........Ç'þ... Possible instruction pointers: 11 dbgcore.dll + 0x100 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdac0 rip = 0x00007ffe27c70100 Found by: stack scanning Stack contents: 00000044e49fdac0 4c 07 00 00 00 00 00 00 f8 17 2b 3c fe 7f 00 00 L.......ø.+<þ... Possible instruction pointers: 12 ntdll.dll + 0x1217f8 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdad0 rip = 0x00007ffe3c2b17f8 Found by: stack scanning Stack contents: 00000044e49fdad0 00 a0 c9 27 fe 7f 00 00 . É'þ... Possible instruction pointers: 13 dbgcore.dll + 0x2a000 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdad8 rip = 0x00007ffe27c9a000 Found by: stack scanning Stack contents: 00000044e49fdad8 40 a0 c9 27 fe 7f 00 00 @ É'þ... Possible instruction pointers: 14 dbgcore.dll + 0x2a040 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdae0 rip = 0x00007ffe27c9a040 Found by: stack scanning Stack contents: 00000044e49fdae0 10 11 00 00 7d cb 00 00 68 db 9f e4 44 00 00 00 ....}Ë..hÛ?äD... 00000044e49fdaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fdb00 04 a4 c9 27 fe 7f 00 00 .¤É'þ... Possible instruction pointers: 15 dbgcore.dll + 0x2a404 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdb08 rip = 0x00007ffe27c9a404 Found by: stack scanning Stack contents: 00000044e49fdb08 01 03 fe 7f 03 00 00 00 10 11 00 00 00 00 00 00 ..þ............. 00000044e49fdb18 00 10 00 00 00 00 00 00 48 a0 c9 27 fe 7f 00 00 ........H É'þ... Possible instruction pointers: 16 dbgcore.dll + 0x2a048 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdb28 rip = 0x00007ffe27c9a048 Found by: stack scanning Stack contents: 00000044e49fdb28 03 00 00 00 fe 7f 00 00 09 04 00 00 00 00 00 00 ....þ... ....... 00000044e49fdb38 05 00 2b 3c 01 00 00 00 00 a0 c9 27 fe 7f 00 00 ..+<..... É'þ... Possible instruction pointers: 17 dbgcore.dll + 0x2a000 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdb48 rip = 0x00007ffe27c9a000 Found by: stack scanning Stack contents: 00000044e49fdb48 00 00 c7 27 fe 7f 00 00 00 c0 02 00 00 00 00 00 ..Ç'þ....À...... 00000044e49fdb58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fdb68 00 00 00 00 fe 7f 00 00 30 a0 c9 27 fe 7f 00 00 ....þ...0 É'þ... Possible instruction pointers: 18 dbgcore.dll + 0x2a030 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdb78 rip = 0x00007ffe27c9a030 Found by: stack scanning Stack contents: 00000044e49fdb78 40 a0 c9 27 fe 7f 00 00 @ É'þ... Possible instruction pointers: 19 dbgcore.dll + 0x2a040 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdb80 rip = 0x00007ffe27c9a040 Found by: stack scanning Stack contents: 00000044e49fdb80 00 00 00 00 00 00 00 00 00 01 c7 27 fe 7f 00 00 ..........Ç'þ... Possible instruction pointers: 20 dbgcore.dll + 0x100 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdb90 rip = 0x00007ffe27c70100 Found by: stack scanning Stack contents: 00000044e49fdb90 40 a0 c9 27 fe 7f 00 00 @ É'þ... Possible instruction pointers: 21 dbgcore.dll + 0x2a040 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdb98 rip = 0x00007ffe27c9a040 Found by: stack scanning Stack contents: 00000044e49fdb98 00 e2 9f e4 44 00 00 00 00 00 00 00 00 00 00 00 .â?äD........... 00000044e49fdba8 c0 dd 9f e4 44 00 00 00 00 00 00 00 00 00 00 00 ÀÝ?äD........... 00000044e49fdbb8 00 00 00 00 10 00 00 00 40 a0 c9 27 fe 7f 00 00 ........@ É'þ... Possible instruction pointers: 22 dbgcore.dll + 0x2a040 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdbc8 rip = 0x00007ffe27c9a040 Found by: stack scanning Stack contents: 00000044e49fdbc8 00 e2 9f e4 44 00 00 00 f8 dc 9f e4 44 00 00 00 .â?äD...øÜ?äD... 00000044e49fdbd8 00 00 00 00 00 00 00 00 90 e2 9f e4 44 00 00 00 .........â?äD... 00000044e49fdbe8 08 00 00 00 00 00 00 00 c0 15 2b 3c fe 7f 00 00 ........À.+<þ... Possible instruction pointers: 23 ntdll.dll + 0x1215c0 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdbf8 rip = 0x00007ffe3c2b15c0 Found by: stack scanning Stack contents: 00000044e49fdbf8 c8 e2 9f e4 44 00 00 00 52 00 54 00 00 00 00 00 Èâ?äD...R.T..... 00000044e49fdc08 60 15 2b 3c fe 7f 00 00 `.+<þ... Possible instruction pointers: 24 ntdll.dll + 0x121560 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdc10 rip = 0x00007ffe3c2b1560 Found by: stack scanning Stack contents: 00000044e49fdc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fdc20 88 d9 01 00 a8 03 00 00 00 00 00 00 00 00 00 00 .Ù..¨........... 00000044e49fdc30 f8 f4 48 34 7d cb 00 00 b0 07 1e 3c fe 7f 00 00 øôH4}Ë..°..<þ... Possible instruction pointers: 25 ntdll.dll + 0x507b0 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdc40 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e49fdc40 10 11 00 00 00 00 00 00 cb 3c a4 39 fe 7f 00 00 ........Ë<¤9þ... Possible instruction pointers: 26 ucrtbase.dll + 0x13ccb rbp = 0xffffffffffffffff rsp = 0x00000044e49fdc50 rip = 0x00007ffe39a43ccb Found by: stack scanning Stack contents: 00000044e49fdc50 e2 00 f8 00 00 00 00 00 bb 98 bc 39 fe 7f 00 00 â.ø.....».¼9þ... Possible instruction pointers: 27 KERNELBASE.dll + 0x498bb rbp = 0xffffffffffffffff rsp = 0x00000044e49fdc60 rip = 0x00007ffe39bc98bb Found by: stack scanning Stack contents: 00000044e49fdc60 10 a7 ae e0 58 01 00 00 b0 07 1e 3c fe 7f 00 00 .§®àX...°..<þ... Possible instruction pointers: 28 ntdll.dll + 0x507b0 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdc70 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e49fdc70 00 00 00 00 00 00 00 00 cd bb a3 39 fe 7f 00 00 ........Í»£9þ... Possible instruction pointers: 29 ucrtbase.dll + 0xbbcd rbp = 0xffffffffffffffff rsp = 0x00000044e49fdc80 rip = 0x00007ffe39a3bbcd Found by: stack scanning Stack contents: 00000044e49fdc80 80 dd 9f e4 44 00 00 00 20 de 9f e4 44 00 00 00 .Ý?äD... Þ?äD... 00000044e49fdc90 00 00 00 00 00 00 00 00 00 00 a3 39 fe 7f 00 00 ..........£9þ... 00000044e49fdca0 38 f2 48 34 00 00 00 00 00 00 00 00 00 00 00 00 8òH4............ 00000044e49fdcb0 a0 be 25 24 09 72 00 00 39 75 a4 39 fe 7f 00 00  ¾%$ r..9u¤9þ... Possible instruction pointers: 30 ucrtbase.dll + 0x17539 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdcc0 rip = 0x00007ffe39a47539 Found by: stack scanning Stack contents: 00000044e49fdcc0 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <............... 00000044e49fdcd0 61 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aJ.............. 00000044e49fdce0 80 dd 9f e4 44 00 00 00 25 b9 a3 39 fe 7f 00 00 .Ý?äD...%¹£9þ... Possible instruction pointers: 31 ucrtbase.dll + 0xb925 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdcf0 rip = 0x00007ffe39a3b925 Found by: stack scanning Stack contents: 00000044e49fdcf0 60 dd 9f e4 44 00 00 00 20 de 9f e4 44 00 00 00 `Ý?äD... Þ?äD... 00000044e49fdd00 00 00 00 00 00 00 00 00 00 00 a3 39 fe 7f 00 00 ..........£9þ... 00000044e49fdd10 28 00 00 00 00 00 00 00 56 bf a3 39 fe 7f 00 00 (.......V¿£9þ... Possible instruction pointers: 32 ucrtbase.dll + 0xbf56 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdd20 rip = 0x00007ffe39a3bf56 Found by: stack scanning Stack contents: 00000044e49fdd20 58 e6 c8 27 fe 7f 00 00 XæÈ'þ... Possible instruction pointers: 33 dbgcore.dll + 0x1e658 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdd28 rip = 0x00007ffe27c8e658 Found by: stack scanning Stack contents: 00000044e49fdd28 20 e7 9f e4 44 00 00 00 a0 de 9f e4 44 00 00 00 ç?äD... Þ?äD... 00000044e49fdd38 90 e2 9f e4 44 00 00 00 58 e7 9f e4 44 00 00 00 .â?äD...Xç?äD... 00000044e49fdd48 28 00 00 00 00 00 00 00 1c 00 00 00 00 00 00 00 (............... 00000044e49fdd58 00 00 00 00 00 00 00 00 18 96 52 e0 58 01 00 00 .........?RàX... 00000044e49fdd68 90 77 97 de 58 01 00 00 00 5a 97 de 58 01 00 00 .w?ÞX....Z?ÞX... 00000044e49fdd78 01 00 00 00 00 00 00 00 3c 00 00 00 00 00 00 00 ........<....... 00000044e49fdd88 68 dd 9f e4 44 00 00 00 00 00 00 00 00 00 00 00 hÝ?äD........... 00000044e49fdd98 80 e6 c8 27 fe 7f 00 00 .æÈ'þ... Possible instruction pointers: 34 dbgcore.dll + 0x1e680 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdda0 rip = 0x00007ffe27c8e680 Found by: stack scanning Stack contents: 00000044e49fdda0 d8 e3 9f e4 44 00 00 00 1c 00 00 00 07 00 00 00 Øã?äD........... 00000044e49fddb0 00 00 00 00 00 00 00 00 fe ff ff ff 00 00 00 00 ........þÿÿÿ.... 00000044e49fddc0 00 00 00 00 00 00 00 00 d2 df 9f e4 44 00 00 00 ........Òß?äD... 00000044e49fddd0 03 00 00 00 01 00 00 00 68 f3 48 34 7d cb 00 00 ........hóH4}Ë.. 00000044e49fdde0 38 c2 2a 3c fe 7f 00 00 8Â*<þ... Possible instruction pointers: 35 ntdll.dll + 0x11c238 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdde8 rip = 0x00007ffe3c2ac238 Found by: stack scanning Stack contents: 00000044e49fdde8 e0 e1 9f e4 44 00 00 00 00 00 00 00 00 00 00 00 àá?äD........... 00000044e49fddf8 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 H............... 00000044e49fde08 08 00 00 00 00 00 00 00 3e 00 00 00 00 00 00 00 ........>....... 00000044e49fde18 38 b2 1a 3c fe 7f 00 00 8².<þ... Possible instruction pointers: 36 ntdll.dll + 0x1b238 rbp = 0xffffffffffffffff rsp = 0x00000044e49fde20 rip = 0x00007ffe3c1ab238 Found by: stack scanning Stack contents: 00000044e49fde20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fde30 00 00 00 00 00 00 00 00 00 00 80 00 00 00 00 00 ................ 00000044e49fde40 50 de 9f e4 44 00 00 00 80 de 9f e4 44 00 00 00 PÞ?äD....Þ?äD... 00000044e49fde50 00 df 9f e4 02 00 00 00 a0 de 9f e4 44 00 00 00 .ß?ä.... Þ?äD... 00000044e49fde60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fde70 3e 00 08 02 00 00 00 00 a0 de 9f e4 44 00 00 00 >....... Þ?äD... 00000044e49fde80 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fde90 f0 e1 9f e4 44 00 00 00 20 df 9f e4 44 00 00 00 ðá?äD... ß?äD... 00000044e49fdea0 43 00 3a 00 5c 00 57 00 49 00 4e 00 44 00 4f 00 C.:.\.W.I.N.D.O. 00000044e49fdeb0 57 00 53 00 5c 00 53 00 34 fd ba 39 fe 7f 00 00 W.S.\.S.4ýº9þ... Possible instruction pointers: 37 KERNELBASE.dll + 0x2fd34 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdec0 rip = 0x00007ffe39bafd34 Found by: stack scanning Stack contents: 00000044e49fdec0 4d 00 33 00 32 00 5c 00 64 00 62 00 67 00 63 00 M.3.2.\.d.b.g.c. 00000044e49fded0 6f 00 72 00 65 00 2e 00 44 00 4c 00 4c 00 00 00 o.r.e...D.L.L... 00000044e49fdee0 48 df 9f e4 44 00 00 00 00 00 00 00 00 00 00 00 Hß?äD........... 00000044e49fdef0 60 e3 9f e4 44 00 00 00 c8 00 00 00 00 00 00 00 `ã?äD...È....... 00000044e49fdf00 19 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fdf10 a8 e2 9f e4 44 00 00 00 00 00 00 00 00 00 00 00 ¨â?äD........... 00000044e49fdf20 00 00 00 00 00 00 00 00 01 fa ba 39 fe 7f 00 00 .........úº9þ... Possible instruction pointers: 38 KERNELBASE.dll + 0x2fa01 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdf30 rip = 0x00007ffe39bafa01 Found by: stack scanning Stack contents: 00000044e49fdf30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e49fdf40 e8 e2 9f e4 44 00 00 00 13 f5 ba 39 fe 7f 00 00 èâ?äD....õº9þ... Possible instruction pointers: 39 KERNELBASE.dll + 0x2f513 rbp = 0xffffffffffffffff rsp = 0x00000044e49fdf50 rip = 0x00007ffe39baf513 Found by: stack scanning Thread 5 0 ntdll.dll + 0x9d8c4 rax = 0x000000000000005b rdx = 0x00000044e4affc90 rcx = 0x0000000000000001 rbx = 0x0000000000000001 rsi = 0x0000000000000000 rdi = 0x0000000000000001 rbp = 0x00000044e4affd20 rsp = 0x00000044e4aff8e8 r8 = 0x000000000000000c r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0xffffff000000001f r12 = 0x00000000000001f4 r13 = 0x00000044e4affc90 r14 = 0x00000044e4aff940 r15 = 0x0000000000000000 rip = 0x00007ffe3c22d8c4 Found by: given as instruction pointer in context Stack contents: 00000044e4aff8e8 70 cb bc 39 fe 7f 00 00 p˼9þ... Possible instruction pointers: 1 KERNELBASE.dll + 0x4cb70 rbp = 0x00000044e4affd20 rsp = 0x00000044e4aff8f0 rip = 0x00007ffe39bccb70 Found by: stack scanning Stack contents: 00000044e4aff8f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4aff900 00 00 00 00 00 00 00 00 50 f9 af e4 44 00 00 00 ........Pù¯äD... 00000044e4aff910 40 f9 af e4 44 00 00 00 0b b9 1b 3c fe 7f 00 00 @ù¯äD....¹.<þ... Possible instruction pointers: 2 ntdll.dll + 0x2b90b rbp = 0x00000044e4affd20 rsp = 0x00000044e4aff920 rip = 0x00007ffe3c1bb90b Found by: stack scanning Stack contents: 00000044e4aff920 1d 00 18 00 00 00 00 00 00 c0 58 e4 44 00 00 00 .........ÀXäD... 00000044e4aff930 01 00 00 00 00 00 00 00 02 01 00 00 44 00 00 00 ............D... 00000044e4aff940 c0 b4 b3 ff ff ff ff ff 0b b9 1b 3c fe 7f 00 00 À´³ÿÿÿÿÿ.¹.<þ... Possible instruction pointers: 3 ntdll.dll + 0x2b90b rbp = 0x00000044e4affd20 rsp = 0x00000044e4aff950 rip = 0x00007ffe3c1bb90b Found by: stack scanning Stack contents: 00000044e4aff950 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000044e4aff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4aff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4aff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4aff990 00 00 00 00 00 00 00 00 00 00 4d e2 58 01 00 00 ..........MâX... 00000044e4aff9a0 ac 02 4d e2 58 01 00 00 20 00 00 00 00 00 00 00 ¬.MâX... ....... 00000044e4aff9b0 30 00 00 00 00 00 00 00 c0 0c 4d e2 58 01 00 00 0.......À.MâX... 00000044e4aff9c0 00 00 5c e2 58 01 00 00 08 00 00 00 00 00 00 00 ..\âX........... 00000044e4aff9d0 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000044e4aff9e0 28 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 (............... 00000044e4aff9f0 00 00 5c e2 58 01 00 00 b9 fa af e4 44 00 00 00 ..\âX...¹ú¯äD... 00000044e4affa00 03 00 00 00 00 00 00 00 a1 5b 1b 3c fe 7f 00 00 ........¡[.<þ... Possible instruction pointers: 4 ntdll.dll + 0x25ba1 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affa10 rip = 0x00007ffe3c1b5ba1 Found by: stack scanning Stack contents: 00000044e4affa10 00 00 4d e2 58 01 00 00 a1 5b 1b 3c fe 7f 00 00 ..MâX...¡[.<þ... Possible instruction pointers: 5 ntdll.dll + 0x25ba1 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affa20 rip = 0x00007ffe3c1b5ba1 Found by: stack scanning Stack contents: 00000044e4affa20 28 00 00 00 00 00 00 00 08 00 00 00 58 01 00 00 (...........X... 00000044e4affa30 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4affa40 d0 d2 5c e2 58 01 00 00 05 00 00 00 44 00 00 00 ÐÒ\âX.......D... 00000044e4affa50 10 d3 5c e2 58 01 00 00 90 11 5c e2 58 01 00 00 .Ó\âX.....\âX... 00000044e4affa60 00 00 00 00 44 00 00 00 70 d6 5c e2 58 01 00 00 ....D...pÖ\âX... 00000044e4affa70 00 00 4d e2 58 01 00 00 00 00 b5 e2 58 01 00 00 ..MâX.....µâX... 00000044e4affa80 00 00 4d e2 58 01 00 00 00 00 00 00 00 00 00 00 ..MâX........... 00000044e4affa90 00 00 00 00 00 00 00 00 6e 46 be 39 fe 7f 00 00 ........nF¾9þ... Possible instruction pointers: 6 KERNELBASE.dll + 0x6466e rbp = 0x00000044e4affd20 rsp = 0x00000044e4affaa0 rip = 0x00007ffe39be466e Found by: stack scanning Stack contents: 00000044e4affaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4affab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4affac0 d0 12 5c e2 58 01 00 00 b1 47 1b 3c fe 7f 00 00 Ð.\âX...±G.<þ... Possible instruction pointers: 7 ntdll.dll + 0x247b1 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affad0 rip = 0x00007ffe3c1b47b1 Found by: stack scanning Stack contents: 00000044e4affad0 c0 d9 5c e2 58 01 00 00 00 00 5c e2 58 01 00 00 ÀÙ\âX.....\âX... 00000044e4affae0 00 ff b2 1c fe 7f 00 00 .ÿ².þ... Possible instruction pointers: 8 dsound.dll + 0x5ff00 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affae8 rip = 0x00007ffe1cb2ff00 Found by: stack scanning Stack contents: 00000044e4affae8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4affaf8 00 00 00 00 00 00 00 00 d0 12 5c e2 58 01 00 00 ........Ð.\âX... 00000044e4affb08 c5 cf ad 1c fe 7f 00 00 ÅÏ­.þ... Possible instruction pointers: 9 dsound.dll + 0xcfc5 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affb10 rip = 0x00007ffe1cadcfc5 Found by: stack scanning Stack contents: 00000044e4affb10 d0 12 5c e2 58 01 00 00 00 00 00 00 00 00 00 00 Ð.\âX........... 00000044e4affb20 00 00 00 00 00 00 00 00 c0 d9 5c e2 58 01 00 00 ........ÀÙ\âX... 00000044e4affb30 c0 fb af e4 44 00 00 00 28 d3 ad 1c fe 7f 00 00 Àû¯äD...(Ó­.þ... Possible instruction pointers: 10 dsound.dll + 0xd328 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affb40 rip = 0x00007ffe1cadd328 Found by: stack scanning Stack contents: 00000044e4affb40 00 09 5c e2 58 01 00 00 5c bd ae 1c fe 7f 00 00 . \âX...\½®.þ... Possible instruction pointers: 11 dsound.dll + 0x1bd5c rbp = 0x00000044e4affd20 rsp = 0x00000044e4affb50 rip = 0x00007ffe1caebd5c Found by: stack scanning Stack contents: 00000044e4affb50 00 00 00 00 00 00 00 00 c0 d9 5c e2 58 01 00 00 ........ÀÙ\âX... 00000044e4affb60 00 09 5c e2 58 01 00 00 5f e1 ad 1c fe 7f 00 00 . \âX..._á­.þ... Possible instruction pointers: 12 dsound.dll + 0xe15f rbp = 0x00000044e4affd20 rsp = 0x00000044e4affb70 rip = 0x00007ffe1cade15f Found by: stack scanning Stack contents: 00000044e4affb70 c0 fb af e4 44 00 00 00 30 cc bc 39 fe 7f 00 00 Àû¯äD...0̼9þ... Possible instruction pointers: 13 KERNELBASE.dll + 0x4cc30 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affb80 rip = 0x00007ffe39bccc30 Found by: stack scanning Stack contents: 00000044e4affb80 00 09 5c e2 58 01 00 00 00 00 00 00 00 00 00 00 . \âX........... 00000044e4affb90 58 0a 5c e2 58 01 00 00 19 bb ae 1c fe 7f 00 00 X.\âX....»®.þ... Possible instruction pointers: 14 dsound.dll + 0x1bb19 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affba0 rip = 0x00007ffe1caebb19 Found by: stack scanning Stack contents: 00000044e4affba0 6e c4 94 47 00 0d 00 00 58 0a 5c e2 58 01 00 00 nÄ?G....X.\âX... 00000044e4affbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4affbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4affbd0 f4 01 00 00 00 00 00 00 6e ca bc 39 fe 7f 00 00 ô.......nʼ9þ... Possible instruction pointers: 15 KERNELBASE.dll + 0x4ca6e rbp = 0x00000044e4affd20 rsp = 0x00000044e4affbe0 rip = 0x00007ffe39bcca6e Found by: stack scanning Stack contents: 00000044e4affbe0 48 00 00 00 00 00 00 00 01 00 00 00 fe 7f 00 00 H...........þ... 00000044e4affbf0 20 09 5c e2 58 01 00 00 00 00 00 00 00 00 00 00 \âX........... 00000044e4affc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4affc10 00 00 00 00 00 00 00 00 28 e4 ad 1c fe 7f 00 00 ........(ä­.þ... Possible instruction pointers: 16 dsound.dll + 0xe428 rbp = 0x00000044e4affd20 rsp = 0x00000044e4affc20 rip = 0x00007ffe1cade428 Found by: stack scanning Thread 6 0 ntdll.dll + 0xa07c4 rax = 0x00000000000001d3 rdx = 0x00000158de959320 rcx = 0x0000000000000014 rbx = 0x00000158de9596a0 rsi = 0x00000158de950b50 rdi = 0x00000158de9596a0 rbp = 0x0000000000000000 rsp = 0x00000044e4cff488 r8 = 0x00000044e4cfed58 r9 = 0x00000044e4cfee60 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c2307c4 Found by: given as instruction pointer in context Stack contents: 00000044e4cff488 c7 2d 1e 3c fe 7f 00 00 Ç-.<þ... Possible instruction pointers: 1 ntdll.dll + 0x52dc7 rsp = 0x00000044e4cff490 rip = 0x00007ffe3c1e2dc7 Found by: stack scanning Thread 7 0 ntdll.dll + 0x9d3f4 rax = 0x0000000000000034 rdx = 0x00000044e4bff640 rcx = 0x0000000000000000 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000000000000000a rbp = 0x0000000000000000 rsp = 0x00000044e4bff618 r8 = 0x00000044e4bff618 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000001 r15 = 0x0000000000000000 rip = 0x00007ffe3c22d3f4 Found by: given as instruction pointer in context Stack contents: 00000044e4bff618 7e 96 bc 39 fe 7f 00 00 ~?¼9þ... Possible instruction pointers: 1 KERNELBASE.dll + 0x4967e rsp = 0x00000044e4bff620 rip = 0x00007ffe39bc967e Found by: stack scanning Stack contents: 00000044e4bff620 d8 f6 bf e4 44 00 00 00 49 00 4e 00 44 00 4f 00 Øö¿äD...I.N.D.O. 00000044e4bff630 00 00 53 00 00 00 00 00 e0 97 96 de 58 01 00 00 ..S.....à??ÞX... 00000044e4bff640 60 79 fe ff ff ff ff ff 80 d6 95 de 58 01 00 00 `yþÿÿÿÿÿ.Ö?ÞX... 00000044e4bff650 48 00 00 00 00 00 00 00 01 00 00 00 63 00 6f 00 H...........c.o. 00000044e4bff660 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff690 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff6a0 f0 3e b3 e0 58 01 00 00 00 00 00 00 00 00 00 00 ð>³àX........... 00000044e4bff6b0 90 89 bc e0 58 01 00 00 ab 3e 3e cc f6 7f 00 00 .?¼àX...«>>Ìö... Possible instruction pointers: 2 Audacity.exe + 0xd3eab rsp = 0x00000044e4bff6c0 rip = 0x00007ff6cc3e3eab Found by: stack scanning Stack contents: 00000044e4bff6c0 90 89 bc e0 58 01 00 00 00 00 00 00 00 00 00 00 .?¼àX........... 00000044e4bff6d0 bb 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 »..À............ 00000044e4bff6e0 00 00 00 00 00 00 00 00 8d 1f 39 1c fe 7f 00 00 ..........9.þ... Possible instruction pointers: 3 wxbase313u_vc_x64_custom.dll + 0x1d1f8d rsp = 0x00000044e4bff6f0 rip = 0x00007ffe1c391f8d Found by: stack scanning Stack contents: 00000044e4bff6f0 f0 3e b3 e0 58 01 00 00 00 00 00 00 00 00 00 00 ð>³àX........... 00000044e4bff700 00 00 00 00 00 00 00 00 09 00 00 00 00 00 00 00 ........ ....... 00000044e4bff710 00 d4 ae 39 fe 7f 00 00 .Ô®9þ... Possible instruction pointers: 4 ucrtbase.dll + 0xbd400 rsp = 0x00000044e4bff718 rip = 0x00007ffe39aed400 Found by: stack scanning Stack contents: 00000044e4bff718 e7 be 1c 1c fe 7f 00 00 ç¾..þ... Possible instruction pointers: 5 wxbase313u_vc_x64_custom.dll + 0xbee7 rsp = 0x00000044e4bff720 rip = 0x00007ffe1c1cbee7 Found by: stack scanning Stack contents: 00000044e4bff720 f0 3e b3 e0 58 01 00 00 6f 2a 39 1c fe 7f 00 00 ð>³àX...o*9.þ... Possible instruction pointers: 6 wxbase313u_vc_x64_custom.dll + 0x1d2a6f rsp = 0x00000044e4bff730 rip = 0x00007ffe1c392a6f Found by: stack scanning Stack contents: 00000044e4bff730 f0 3e b3 e0 58 01 00 00 00 00 00 00 00 00 00 00 ð>³àX........... 00000044e4bff740 00 00 00 00 00 00 00 00 c9 02 1c 3c fe 7f 00 00 ........É..<þ... Possible instruction pointers: 7 ntdll.dll + 0x302c9 rsp = 0x00000044e4bff750 rip = 0x00007ffe3c1c02c9 Found by: stack scanning Stack contents: 00000044e4bff750 ff ff ff ff fe 7f 00 00 00 f8 bf e4 44 00 00 00 ÿÿÿÿþ....ø¿äD... 00000044e4bff760 b4 24 1c 1c fe 7f 00 00 ´$..þ... Possible instruction pointers: 8 wxbase313u_vc_x64_custom.dll + 0x24b4 rsp = 0x00000044e4bff768 rip = 0x00007ffe1c1c24b4 Found by: stack scanning Stack contents: 00000044e4bff768 f0 3e b3 e0 58 01 00 00 01 00 00 00 00 00 00 00 ð>³àX........... 00000044e4bff778 88 f7 bf e4 44 00 00 00 00 08 00 00 00 00 00 00 .÷¿äD........... 00000044e4bff788 00 31 7d 37 fe 7f 00 00 .1}7þ... Possible instruction pointers: 9 kernel.appcore.dll + 0x3100 rsp = 0x00000044e4bff790 rip = 0x00007ffe377d3100 Found by: stack scanning Stack contents: 00000044e4bff790 09 00 00 00 01 00 00 00 09 00 00 00 00 00 00 00 ....... ....... 00000044e4bff7a0 e0 97 96 de 58 01 00 00 94 35 a5 39 fe 7f 00 00 à??ÞX...?5¥9þ... Possible instruction pointers: 10 ucrtbase.dll + 0x23594 rsp = 0x00000044e4bff7b0 rip = 0x00007ffe39a53594 Found by: stack scanning Stack contents: 00000044e4bff7b0 80 d6 95 de 58 01 00 00 00 00 00 00 00 00 00 00 .Ö?ÞX........... 00000044e4bff7c0 00 00 00 00 00 00 00 00 08 f9 bf e4 44 00 00 00 .........ù¿äD... 00000044e4bff7d0 f0 a8 af 39 fe 7f 00 00 ð¨¯9þ... Possible instruction pointers: 11 ucrtbase.dll + 0xca8f0 rsp = 0x00000044e4bff7d8 rip = 0x00007ffe39afa8f0 Found by: stack scanning Stack contents: 00000044e4bff7d8 00 00 00 00 00 00 00 00 28 da 68 34 7d cb 00 00 ........(Úh4}Ë.. 00000044e4bff7e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff7f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff808 b0 07 1e 3c fe 7f 00 00 °..<þ... Possible instruction pointers: 12 ntdll.dll + 0x507b0 rsp = 0x00000044e4bff810 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e4bff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff820 00 00 00 00 00 00 00 00 bb 98 bc 39 fe 7f 00 00 ........».¼9þ... Possible instruction pointers: 13 KERNELBASE.dll + 0x498bb rsp = 0x00000044e4bff830 rip = 0x00007ffe39bc98bb Found by: stack scanning Stack contents: 00000044e4bff830 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff840 58 d6 68 34 7d cb 00 00 00 00 00 00 00 00 00 00 XÖh4}Ë.......... 00000044e4bff850 00 00 00 00 00 00 00 00 da 67 c0 32 fe 7f 00 00 ........ÚgÀ2þ... Possible instruction pointers: 14 VCRUNTIME140.dll + 0x67da rsp = 0x00000044e4bff860 rip = 0x00007ffe32c067da Found by: stack scanning Stack contents: 00000044e4bff860 00 00 00 00 44 00 00 00 c0 ed b0 e0 58 01 00 00 ....D...Àí°àX... 00000044e4bff870 ff ff ff ff ff ff ff ff 68 6b bf 39 fe 7f 00 00 ÿÿÿÿÿÿÿÿhk¿9þ... Possible instruction pointers: 15 KERNELBASE.dll + 0x76b68 rsp = 0x00000044e4bff880 rip = 0x00007ffe39bf6b68 Found by: stack scanning Stack contents: 00000044e4bff880 10 5a 1c 1c fe 7f 00 00 .Z..þ... Possible instruction pointers: 16 wxbase313u_vc_x64_custom.dll + 0x5a10 rsp = 0x00000044e4bff888 rip = 0x00007ffe1c1c5a10 Found by: stack scanning Stack contents: 00000044e4bff888 19 67 c0 32 fe 7f 00 00 .gÀ2þ... Possible instruction pointers: 17 VCRUNTIME140.dll + 0x6719 rsp = 0x00000044e4bff890 rip = 0x00007ffe32c06719 Found by: stack scanning Stack contents: 00000044e4bff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff8a0 e8 f8 bf e4 44 00 00 00 41 07 bc 39 fe 7f 00 00 èø¿äD...A.¼9þ... Possible instruction pointers: 18 KERNELBASE.dll + 0x40741 rsp = 0x00000044e4bff8b0 rip = 0x00007ffe39bc0741 Found by: stack scanning Stack contents: 00000044e4bff8b0 00 00 00 00 00 00 00 00 6b 65 c0 32 fe 7f 00 00 ........keÀ2þ... Possible instruction pointers: 19 VCRUNTIME140.dll + 0x656b rsp = 0x00000044e4bff8c0 rip = 0x00007ffe32c0656b Found by: stack scanning Stack contents: 00000044e4bff8c0 00 00 00 00 00 00 00 00 45 6a bf 39 fe 7f 00 00 ........Ej¿9þ... Possible instruction pointers: 20 KERNELBASE.dll + 0x76a45 rsp = 0x00000044e4bff8d0 rip = 0x00007ffe39bf6a45 Found by: stack scanning Stack contents: 00000044e4bff8d0 96 e0 58 03 11 eb 00 00 94 35 a5 39 fe 7f 00 00 ?àX..ë..?5¥9þ... Possible instruction pointers: 21 ucrtbase.dll + 0x23594 rsp = 0x00000044e4bff8e0 rip = 0x00007ffe39a53594 Found by: stack scanning Stack contents: 00000044e4bff8e0 00 00 00 00 00 00 00 00 4c a8 39 1c fe 7f 00 00 ........L¨9.þ... Possible instruction pointers: 22 wxbase313u_vc_x64_custom.dll + 0x1da84c rsp = 0x00000044e4bff8f0 rip = 0x00007ffe1c39a84c Found by: stack scanning Stack contents: 00000044e4bff8f0 f0 3e b3 e0 58 01 00 00 f0 3e b3 e0 58 01 00 00 ð>³àX...ð>³àX... 00000044e4bff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff910 ff ff ff ff fe 7f 00 00 00 00 00 00 00 00 00 00 ÿÿÿÿþ........... 00000044e4bff920 00 00 00 00 00 00 00 00 b2 1b a5 39 fe 7f 00 00 ........².¥9þ... Possible instruction pointers: 23 ucrtbase.dll + 0x21bb2 rsp = 0x00000044e4bff930 rip = 0x00007ffe39a51bb2 Found by: stack scanning Stack contents: 00000044e4bff930 00 af b6 e0 58 01 00 00 00 00 00 00 00 00 00 00 .¯¶àX........... 00000044e4bff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff950 00 00 00 00 00 00 00 00 34 70 0a 3c fe 7f 00 00 ........4p.<þ... Possible instruction pointers: 24 kernel32.dll + 0x17034 rsp = 0x00000044e4bff960 rip = 0x00007ffe3c0a7034 Found by: stack scanning Stack contents: 00000044e4bff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4bff980 00 00 00 00 00 00 00 00 51 26 1e 3c fe 7f 00 00 ........Q&.<þ... Possible instruction pointers: 25 ntdll.dll + 0x52651 rsp = 0x00000044e4bff990 rip = 0x00007ffe3c1e2651 Found by: stack scanning Thread 8 0 ntdll.dll + 0x9d3f4 rax = 0x0000000000000034 rdx = 0x00000044e4dff500 rcx = 0x0000000000000000 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000000000000000a rbp = 0x0000000000000000 rsp = 0x00000044e4dff4d8 r8 = 0x00000044e4dff4d8 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000001 r15 = 0x0000000000000000 rip = 0x00007ffe3c22d3f4 Found by: given as instruction pointer in context Stack contents: 00000044e4dff4d8 7e 96 bc 39 fe 7f 00 00 ~?¼9þ... Possible instruction pointers: 1 KERNELBASE.dll + 0x4967e rsp = 0x00000044e4dff4e0 rip = 0x00007ffe39bc967e Found by: stack scanning Stack contents: 00000044e4dff4e0 98 f5 df e4 44 00 00 00 80 1f 00 00 ff ff 02 00 .õßäD.......ÿÿ.. 00000044e4dff4f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff500 60 79 fe ff ff ff ff ff 00 00 00 00 00 00 00 00 `yþÿÿÿÿÿ........ 00000044e4dff510 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000044e4dff520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff530 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff540 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff560 90 89 bc e0 58 01 00 00 a0 34 b3 e0 58 01 00 00 .?¼àX... 4³àX... 00000044e4dff570 a4 52 f8 b8 85 04 00 00 08 3e 3e cc f6 7f 00 00 ¤Rø¸?....>>Ìö... Possible instruction pointers: 2 Audacity.exe + 0xd3e08 rsp = 0x00000044e4dff580 rip = 0x00007ff6cc3e3e08 Found by: stack scanning Stack contents: 00000044e4dff580 11 0b c5 93 0b 00 00 00 00 00 00 00 00 00 00 00 ..Å?............ 00000044e4dff590 bb 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 »..À............ 00000044e4dff5a0 00 00 00 00 00 00 00 00 8d 1f 39 1c fe 7f 00 00 ..........9.þ... Possible instruction pointers: 3 wxbase313u_vc_x64_custom.dll + 0x1d1f8d rsp = 0x00000044e4dff5b0 rip = 0x00007ffe1c391f8d Found by: stack scanning Stack contents: 00000044e4dff5b0 00 00 00 00 00 00 00 00 a0 34 b3 e0 58 01 00 00 ........ 4³àX... 00000044e4dff5c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff5d0 00 00 00 00 00 00 00 00 e7 be 1c 1c fe 7f 00 00 ........ç¾..þ... Possible instruction pointers: 4 wxbase313u_vc_x64_custom.dll + 0xbee7 rsp = 0x00000044e4dff5e0 rip = 0x00007ffe1c1cbee7 Found by: stack scanning Stack contents: 00000044e4dff5e0 a0 34 b3 e0 58 01 00 00 6f 2a 39 1c fe 7f 00 00  4³àX...o*9.þ... Possible instruction pointers: 5 wxbase313u_vc_x64_custom.dll + 0x1d2a6f rsp = 0x00000044e4dff5f0 rip = 0x00007ffe1c392a6f Found by: stack scanning Stack contents: 00000044e4dff5f0 a0 34 b3 e0 58 01 00 00 00 00 00 00 00 00 00 00  4³àX........... 00000044e4dff600 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff610 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 ÿÿÿÿ............ 00000044e4dff620 b4 24 1c 1c fe 7f 00 00 ´$..þ... Possible instruction pointers: 6 wxbase313u_vc_x64_custom.dll + 0x24b4 rsp = 0x00000044e4dff628 rip = 0x00007ffe1c1c24b4 Found by: stack scanning Stack contents: 00000044e4dff628 a0 34 b3 e0 58 01 00 00 00 00 00 00 00 00 00 00  4³àX........... 00000044e4dff638 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff648 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff658 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff668 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff678 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff688 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff698 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff6a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff6b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff6c8 b0 07 1e 3c fe 7f 00 00 °..<þ... Possible instruction pointers: 7 ntdll.dll + 0x507b0 rsp = 0x00000044e4dff6d0 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e4dff6d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff6e0 00 00 00 00 00 00 00 00 bb 98 bc 39 fe 7f 00 00 ........».¼9þ... Possible instruction pointers: 8 KERNELBASE.dll + 0x498bb rsp = 0x00000044e4dff6f0 rip = 0x00007ffe39bc98bb Found by: stack scanning Stack contents: 00000044e4dff6f0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff700 98 d8 08 34 7d cb 00 00 00 00 00 00 00 00 00 00 .Ø.4}Ë.......... 00000044e4dff710 00 00 00 00 00 00 00 00 da 67 c0 32 fe 7f 00 00 ........ÚgÀ2þ... Possible instruction pointers: 9 VCRUNTIME140.dll + 0x67da rsp = 0x00000044e4dff720 rip = 0x00007ffe32c067da Found by: stack scanning Stack contents: 00000044e4dff720 00 00 00 00 00 00 00 00 00 f9 b0 e0 58 01 00 00 .........ù°àX... 00000044e4dff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff740 10 5a 1c 1c fe 7f 00 00 .Z..þ... Possible instruction pointers: 10 wxbase313u_vc_x64_custom.dll + 0x5a10 rsp = 0x00000044e4dff748 rip = 0x00007ffe1c1c5a10 Found by: stack scanning Stack contents: 00000044e4dff748 19 67 c0 32 fe 7f 00 00 .gÀ2þ... Possible instruction pointers: 11 VCRUNTIME140.dll + 0x6719 rsp = 0x00000044e4dff750 rip = 0x00007ffe32c06719 Found by: stack scanning Stack contents: 00000044e4dff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff760 00 00 00 00 00 00 00 00 b0 07 1e 3c fe 7f 00 00 ........°..<þ... Possible instruction pointers: 12 ntdll.dll + 0x507b0 rsp = 0x00000044e4dff770 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e4dff770 00 00 00 00 00 00 00 00 6b 65 c0 32 fe 7f 00 00 ........keÀ2þ... Possible instruction pointers: 13 VCRUNTIME140.dll + 0x656b rsp = 0x00000044e4dff780 rip = 0x00007ffe32c0656b Found by: stack scanning Stack contents: 00000044e4dff780 02 00 00 00 00 00 00 00 81 3a a4 39 fe 7f 00 00 .........:¤9þ... Possible instruction pointers: 14 ucrtbase.dll + 0x13a81 rsp = 0x00000044e4dff790 rip = 0x00007ffe39a43a81 Found by: stack scanning Stack contents: 00000044e4dff790 56 e2 38 03 11 eb 00 00 00 00 00 00 00 00 00 00 Vâ8..ë.......... 00000044e4dff7a0 00 00 00 00 00 00 00 00 4c a8 39 1c fe 7f 00 00 ........L¨9.þ... Possible instruction pointers: 15 wxbase313u_vc_x64_custom.dll + 0x1da84c rsp = 0x00000044e4dff7b0 rip = 0x00007ffe1c39a84c Found by: stack scanning Stack contents: 00000044e4dff7b0 a0 34 b3 e0 58 01 00 00 a0 34 b3 e0 58 01 00 00  4³àX... 4³àX... 00000044e4dff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff7d0 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 ÿÿÿÿ............ 00000044e4dff7e0 00 00 00 00 00 00 00 00 b2 1b a5 39 fe 7f 00 00 ........².¥9þ... Possible instruction pointers: 16 ucrtbase.dll + 0x21bb2 rsp = 0x00000044e4dff7f0 rip = 0x00007ffe39a51bb2 Found by: stack scanning Stack contents: 00000044e4dff7f0 b0 ad b6 e0 58 01 00 00 00 00 00 00 00 00 00 00 °­¶àX........... 00000044e4dff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff810 00 00 00 00 00 00 00 00 34 70 0a 3c fe 7f 00 00 ........4p.<þ... Possible instruction pointers: 17 kernel32.dll + 0x17034 rsp = 0x00000044e4dff820 rip = 0x00007ffe3c0a7034 Found by: stack scanning Stack contents: 00000044e4dff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4dff840 00 00 00 00 00 00 00 00 51 26 1e 3c fe 7f 00 00 ........Q&.<þ... Possible instruction pointers: 18 ntdll.dll + 0x52651 rsp = 0x00000044e4dff850 rip = 0x00007ffe3c1e2651 Found by: stack scanning Thread 9 0 ntdll.dll + 0xa07c4 rax = 0x00000000000001d3 rdx = 0x00000158de959e00 rcx = 0x0000000000000014 rbx = 0x00000158de95a180 rsi = 0x00000158de950b50 rdi = 0x00000158de95a180 rbp = 0x0000000000000000 rsp = 0x00000044e4fff8e8 r8 = 0x00007ffe380e2dc8 r9 = 0x0000000000000000 r10 = 0x0000000000000002 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c2307c4 Found by: given as instruction pointer in context Stack contents: 00000044e4fff8e8 c7 2d 1e 3c fe 7f 00 00 Ç-.<þ... Possible instruction pointers: 1 ntdll.dll + 0x52dc7 rsp = 0x00000044e4fff8f0 rip = 0x00007ffe3c1e2dc7 Found by: stack scanning Thread 10 0 ntdll.dll + 0xa0764 rax = 0x00000000000001d0 rdx = 0x0000000000000000 rcx = 0x00000158e05eedd8 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000158e05eedd8 rbp = 0x00000044e4eff5c0 rsp = 0x00000044e4eff568 r8 = 0x00000158e0b34c70 r9 = 0x00000044e4effdd8 r10 = 0x0000000000000012 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00000044e4eff590 r15 = 0x00000158e05eed88 rip = 0x00007ffe3c230764 Found by: given as instruction pointer in context Stack contents: 00000044e4eff568 21 40 1f 3c fe 7f 00 00 !@.<þ... Possible instruction pointers: 1 ntdll.dll + 0x64021 rbp = 0x00000044e4eff5c0 rsp = 0x00000044e4eff570 rip = 0x00007ffe3c1f4021 Found by: stack scanning Stack contents: 00000044e4eff570 01 00 00 00 00 00 00 00 18 ee 5e e0 58 01 00 00 .........î^àX... 00000044e4eff580 20 59 60 e1 58 01 00 00 08 00 00 00 00 00 00 00 Y`áX........... 00000044e4eff590 00 00 00 00 00 00 00 00 90 f5 ef e4 44 00 00 00 .........õïäD... 00000044e4eff5a0 00 00 00 00 00 00 00 00 68 3e 00 00 00 00 00 00 ........h>...... 00000044e4eff5b0 00 00 00 00 01 00 00 00 d8 ed 5e e0 58 01 00 00 ........Øí^àX... 00000044e4eff5c0 50 bd 64 e1 58 01 00 00 50 ed 5e e0 58 01 00 00 P½dáX...Pí^àX... 00000044e4eff5d0 c8 ed 5e e0 58 01 00 00 18 ee 5e e0 58 01 00 00 Èí^àX....î^àX... 00000044e4eff5e0 90 f7 ef e4 44 00 00 00 e9 ce be 39 fe 7f 00 00 .÷ïäD...éξ9þ... Possible instruction pointers: 2 KERNELBASE.dll + 0x6cee9 rsp = 0x00000044e4eff5f0 rip = 0x00007ffe39becee9 Found by: stack scanning Stack contents: 00000044e4eff5f0 d0 ed 5e e0 58 01 00 00 c8 ed 5e e0 58 01 00 00 Ðí^àX...Èí^àX... 00000044e4eff600 80 ed 5e e0 58 01 00 00 01 00 00 00 00 00 00 00 .í^àX........... 00000044e4eff610 00 00 00 00 00 00 00 00 c8 ed 5e e0 58 01 00 00 ........Èí^àX... 00000044e4eff620 d0 ed 5e e0 58 01 00 00 59 29 ae 26 fe 7f 00 00 Ðí^àX...Y)®&þ... Possible instruction pointers: 3 msvcp140.dll + 0x12959 rsp = 0x00000044e4eff630 rip = 0x00007ffe26ae2959 Found by: stack scanning Stack contents: 00000044e4eff630 00 00 00 00 58 01 00 00 18 ee 5e e0 58 01 00 00 ....X....î^àX... 00000044e4eff640 00 00 00 00 00 00 00 00 80 1a 8f cc f6 7f 00 00 ...........Ìö... Possible instruction pointers: 4 Audacity.exe + 0x5e1a80 rsp = 0x00000044e4eff650 rip = 0x00007ff6cc8f1a80 Found by: stack scanning Stack contents: 00000044e4eff650 50 bd 64 e1 58 01 00 00 ea 2b ae 26 fe 7f 00 00 P½dáX...ê+®&þ... Possible instruction pointers: 5 msvcp140.dll + 0x12bea rsp = 0x00000044e4eff660 rip = 0x00007ffe26ae2bea Found by: stack scanning Stack contents: 00000044e4eff660 1b 25 9d 61 d2 5b 00 00 00 00 00 00 00 00 00 00 .%.aÒ[.......... 00000044e4eff670 50 ed 5e e0 58 01 00 00 1a ee 5e e0 58 01 00 00 Pí^àX....î^àX... 00000044e4eff680 18 ee 5e e0 58 01 00 00 74 e7 41 cc f6 7f 00 00 .î^àX...tçAÌö... Possible instruction pointers: 6 Audacity.exe + 0x10e774 rsp = 0x00000044e4eff690 rip = 0x00007ff6cc41e774 Found by: stack scanning Stack contents: 00000044e4eff690 19 ee 5e e0 58 01 00 00 00 00 00 00 00 00 00 00 .î^àX........... 00000044e4eff6a0 00 00 00 00 00 00 00 00 1a ee 5e e0 58 01 00 00 .........î^àX... 00000044e4eff6b0 00 00 00 00 00 00 00 00 6a 67 00 80 01 00 00 00 ........jg...... Possible instruction pointers: 7 HcDLL2_30_x64.dll + 0x676a rsp = 0x00000044e4eff6c0 rip = 0x000000018000676a Found by: stack scanning Stack contents: 00000044e4eff6c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff6d0 00 00 00 00 00 00 00 00 56 40 70 39 fe 7f 00 00 ........V@p9þ... Possible instruction pointers: 8 umpdc.dll + 0x4056 rsp = 0x00000044e4eff6e0 rip = 0x00007ffe39704056 Found by: stack scanning Stack contents: 00000044e4eff6e0 10 fa ef e4 00 00 00 00 00 00 ff 39 fe 7f 00 00 .úïä......ÿ9þ... 00000044e4eff6f0 70 4c b3 e0 58 01 00 00 77 98 1a 3c fe 7f 00 00 pL³àX...w..<þ... Possible instruction pointers: 9 ntdll.dll + 0x19877 rsp = 0x00000044e4eff700 rip = 0x00007ffe3c1a9877 Found by: stack scanning Stack contents: 00000044e4eff700 d0 56 4f e0 58 01 00 00 1d 3b 70 39 fe 7f 00 00 ÐVOàX....;p9þ... Possible instruction pointers: 10 umpdc.dll + 0x3b1d rsp = 0x00000044e4eff710 rip = 0x00007ffe39703b1d Found by: stack scanning Stack contents: 00000044e4eff710 d0 56 4f e0 58 01 00 00 00 00 00 00 00 00 00 00 ÐVOàX........... 00000044e4eff720 84 03 fe 7f 00 00 00 00 93 99 1a 3c fe 7f 00 00 ?.þ.....?..<þ... Possible instruction pointers: 11 ntdll.dll + 0x19993 rsp = 0x00000044e4eff730 rip = 0x00007ffe3c1a9993 Found by: stack scanning Stack contents: 00000044e4eff730 50 bd 64 e1 58 01 00 00 c8 ed 5e e0 58 01 00 00 P½dáX...Èí^àX... 00000044e4eff740 50 ed 5e e0 58 01 00 00 19 ee 5e e0 58 01 00 00 Pí^àX....î^àX... 00000044e4eff750 18 ee 5e e0 58 01 00 00 f4 37 00 80 01 00 00 00 .î^àX...ô7...... Possible instruction pointers: 12 HcDLL2_30_x64.dll + 0x37f4 rsp = 0x00000044e4eff760 rip = 0x00000001800037f4 Found by: stack scanning Stack contents: 00000044e4eff760 04 00 00 00 00 00 00 00 22 fb c0 32 fe 7f 00 00 ........"ûÀ2þ... Possible instruction pointers: 13 VCRUNTIME140.dll + 0xfb22 rsp = 0x00000044e4eff770 rip = 0x00007ffe32c0fb22 Found by: stack scanning Stack contents: 00000044e4eff770 01 00 00 00 fe 7f 00 00 10 fa ef e4 44 00 00 00 ....þ....úïäD... 00000044e4eff780 c0 17 ac 33 fe 7f 00 00 À.¬3þ... Possible instruction pointers: 14 midimap.dll + 0x17c0 rsp = 0x00000044e4eff788 rip = 0x00007ffe33ac17c0 Found by: stack scanning Stack contents: 00000044e4eff788 ae 9a 1a 3c fe 7f 00 00 ®?.<þ... Possible instruction pointers: 15 ntdll.dll + 0x19aae rsp = 0x00000044e4eff790 rip = 0x00007ffe3c1a9aae Found by: stack scanning Stack contents: 00000044e4eff790 00 00 00 00 00 00 00 00 26 9a 1a 3c fe 7f 00 00 ........&?.<þ... Possible instruction pointers: 16 ntdll.dll + 0x19a26 rsp = 0x00000044e4eff7a0 rip = 0x00007ffe3c1a9a26 Found by: stack scanning Stack contents: 00000044e4eff7a0 00 00 ac 33 fe 7f 00 00 30 27 95 de 58 01 00 00 ..¬3þ...0'?ÞX... 00000044e4eff7b0 00 00 00 00 00 00 00 00 85 03 fe 7f 00 00 00 00 ........?.þ..... 00000044e4eff7c0 15 00 00 00 00 00 00 00 83 e6 1c 3c fe 7f 00 00 ........?æ.<þ... Possible instruction pointers: 17 ntdll.dll + 0x3e683 rsp = 0x00000044e4eff7d0 rip = 0x00007ffe3c1ce683 Found by: stack scanning Stack contents: 00000044e4eff7d0 c0 17 ac 33 fe 7f 00 00 À.¬3þ... Possible instruction pointers: 18 midimap.dll + 0x17c0 rsp = 0x00000044e4eff7d8 rip = 0x00007ffe33ac17c0 Found by: stack scanning Stack contents: 00000044e4eff7d8 64 d9 1e 3c fe 7f 00 00 dÙ.<þ... Possible instruction pointers: 19 ntdll.dll + 0x5d964 rsp = 0x00000044e4eff7e0 rip = 0x00007ffe3c1ed964 Found by: stack scanning Stack contents: 00000044e4eff7e0 00 00 00 00 00 00 00 00 00 c0 58 e4 44 00 00 00 .........ÀXäD... 00000044e4eff7f0 d0 a4 2f 3c fe 7f 00 00 Ф/<þ... Possible instruction pointers: 20 ntdll.dll + 0x16a4d0 rsp = 0x00000044e4eff7f8 rip = 0x00007ffe3c2fa4d0 Found by: stack scanning Stack contents: 00000044e4eff7f8 00 c0 58 e4 44 00 00 00 c0 17 ac 33 fe 7f 00 00 .ÀXäD...À.¬3þ... Possible instruction pointers: 21 midimap.dll + 0x17c0 rsp = 0x00000044e4eff808 rip = 0x00007ffe33ac17c0 Found by: stack scanning Stack contents: 00000044e4eff808 55 79 1a 3c fe 7f 00 00 Uy.<þ... Possible instruction pointers: 22 ntdll.dll + 0x17955 rsp = 0x00000044e4eff810 rip = 0x00007ffe3c1a7955 Found by: stack scanning Stack contents: 00000044e4eff810 d0 a4 2f 3c fe 7f 00 00 Ф/<þ... Possible instruction pointers: 23 ntdll.dll + 0x16a4d0 rsp = 0x00000044e4eff818 rip = 0x00007ffe3c2fa4d0 Found by: stack scanning Stack contents: 00000044e4eff818 00 c0 58 e4 44 00 00 00 00 c0 58 e4 44 00 00 00 .ÀXäD....ÀXäD... 00000044e4eff828 c0 17 ac 33 fe 7f 00 00 À.¬3þ... Possible instruction pointers: 24 midimap.dll + 0x17c0 rsp = 0x00000044e4eff830 rip = 0x00007ffe33ac17c0 Found by: stack scanning Stack contents: 00000044e4eff830 70 85 b8 e0 58 01 00 00 c0 17 ac 33 fe 7f 00 00 p?¸àX...À.¬3þ... Possible instruction pointers: 25 midimap.dll + 0x17c0 rsp = 0x00000044e4eff840 rip = 0x00007ffe33ac17c0 Found by: stack scanning Stack contents: 00000044e4eff840 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000044e4eff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff860 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff p.......ÿÿÿÿÿÿÿÿ 00000044e4eff870 ff ff ff ff ff ff ff ff 77 78 1a 3c fe 7f 00 00 ÿÿÿÿÿÿÿÿwx.<þ... Possible instruction pointers: 26 ntdll.dll + 0x17877 rsp = 0x00000044e4eff880 rip = 0x00007ffe3c1a7877 Found by: stack scanning Stack contents: 00000044e4eff880 aa 78 1a 3c fe 7f 00 00 ªx.<þ... Possible instruction pointers: 27 ntdll.dll + 0x178aa rsp = 0x00000044e4eff888 rip = 0x00007ffe3c1a78aa Found by: stack scanning Stack contents: 00000044e4eff888 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00 ........H....... 00000044e4eff898 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff8a8 00 00 00 00 00 00 00 00 70 00 00 00 00 00 00 00 ........p....... 00000044e4eff8b8 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ 00000044e4eff8c8 1d 79 1a 3c fe 7f 00 00 .y.<þ... Possible instruction pointers: 28 ntdll.dll + 0x1791d rsp = 0x00000044e4eff8d0 rip = 0x00007ffe3c1a791d Found by: stack scanning Stack contents: 00000044e4eff8d0 3d 79 1a 3c fe 7f 00 00 =y.<þ... Possible instruction pointers: 29 ntdll.dll + 0x1793d rsp = 0x00000044e4eff8d8 rip = 0x00007ffe3c1a793d Found by: stack scanning Stack contents: 00000044e4eff8d8 00 00 00 00 00 00 00 00 00 c0 58 e4 44 00 00 00 .........ÀXäD... 00000044e4eff8e8 9d 4f 20 3c fe 7f 00 00 .O <þ... Possible instruction pointers: 30 ntdll.dll + 0x74f9d rsp = 0x00000044e4eff8f0 rip = 0x00007ffe3c204f9d Found by: stack scanning Stack contents: 00000044e4eff8f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff900 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff910 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff970 10 fa ef e4 44 00 00 00 00 00 00 00 00 00 00 00 .úïäD........... 00000044e4eff980 00 00 19 3c fe 7f 00 00 63 4b 20 3c fe 7f 00 00 ...<þ...cK <þ... Possible instruction pointers: 31 ntdll.dll + 0x74b63 rsp = 0x00000044e4eff990 rip = 0x00007ffe3c204b63 Found by: stack scanning Stack contents: 00000044e4eff990 00 00 00 00 00 00 00 00 00 00 19 3c fe 7f 00 00 ...........<þ... 00000044e4eff9a0 00 00 00 00 00 00 00 00 00 f0 5a e4 44 00 00 00 .........ðZäD... 00000044e4eff9b0 00 00 00 00 00 00 00 00 18 4b 20 3c fe 7f 00 00 .........K <þ... Possible instruction pointers: 32 ntdll.dll + 0x74b18 rsp = 0x00000044e4eff9c0 rip = 0x00007ffe3c204b18 Found by: stack scanning Stack contents: 00000044e4eff9c0 10 fa ef e4 44 00 00 00 00 00 00 00 00 00 00 00 .úïäD........... 00000044e4eff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4eff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa40 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3....... 00000044e4effa50 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+............. 00000044e4effa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effa90 70 1b a5 39 fe 7f 00 00 p.¥9þ... Possible instruction pointers: 33 ucrtbase.dll + 0x21b70 rsp = 0x00000044e4effa98 rip = 0x00007ffe39a51b70 Found by: stack scanning Stack contents: 00000044e4effa98 80 56 68 e1 58 01 00 00 00 00 00 00 00 00 00 00 .VháX........... 00000044e4effaa8 08 ff ef e4 44 00 00 00 00 00 00 00 00 00 00 00 .ÿïäD........... 00000044e4effab8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effac8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effad8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effae8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effaf8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e4effb08 30 26 1e 3c fe 7f 00 00 0&.<þ... Possible instruction pointers: 34 ntdll.dll + 0x52630 rsp = 0x00000044e4effb10 rip = 0x00007ffe3c1e2630 Found by: stack scanning Thread 11 0 ntdll.dll + 0x9d8c4 rax = 0x000000000000005b rdx = 0x00000044e50ff450 rcx = 0x0000000000000001 rbx = 0x0000000000000001 rsi = 0x0000000000000000 rdi = 0x0000000000000001 rbp = 0x0000000000000480 rsp = 0x00000044e50ff108 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x00000000ffffffff r13 = 0x00000044e50ff450 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c22d8c4 Found by: given as instruction pointer in context Stack contents: 00000044e50ff108 70 cb bc 39 fe 7f 00 00 p˼9þ... Possible instruction pointers: 1 KERNELBASE.dll + 0x4cb70 rsp = 0x00000044e50ff110 rip = 0x00007ffe39bccb70 Found by: stack scanning Stack contents: 00000044e50ff110 c0 57 78 e1 58 01 00 00 55 79 1a 3c fe 7f 00 00 ÀWxáX...Uy.<þ... Possible instruction pointers: 2 ntdll.dll + 0x17955 rsp = 0x00000044e50ff120 rip = 0x00007ffe3c1a7955 Found by: stack scanning Stack contents: 00000044e50ff120 00 00 00 00 00 00 00 00 7f 03 00 00 44 00 00 00 ............D... 00000044e50ff130 00 00 00 00 00 00 00 00 c0 17 ac 33 fe 7f 00 00 ........À.¬3þ... Possible instruction pointers: 3 midimap.dll + 0x17c0 rsp = 0x00000044e50ff140 rip = 0x00007ffe33ac17c0 Found by: stack scanning Stack contents: 00000044e50ff140 00 00 00 00 00 00 00 00 00 c0 58 e4 44 00 00 00 .........ÀXäD... 00000044e50ff150 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000044e50ff160 00 00 95 de 58 01 00 00 38 95 73 e1 58 01 00 00 ..?ÞX...8?sáX... 00000044e50ff170 48 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff H...........ÿÿÿÿ 00000044e50ff180 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff190 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff1a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff1b0 00 00 00 00 00 00 00 00 6a 00 00 00 00 00 00 00 ........j....... 00000044e50ff1c0 00 00 00 00 00 00 00 00 2b 00 00 00 ff ff ff ff ........+...ÿÿÿÿ 00000044e50ff1d0 50 01 95 de 58 01 00 00 ff 01 00 00 00 00 00 00 P.?ÞX...ÿ....... 00000044e50ff1e0 2a 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 *............... 00000044e50ff1f0 30 95 73 e1 58 01 00 00 9d 4f 20 3c fe 7f 00 00 0?sáX....O <þ... Possible instruction pointers: 4 ntdll.dll + 0x74f9d rsp = 0x00000044e50ff200 rip = 0x00007ffe3c204f9d Found by: stack scanning Stack contents: 00000044e50ff200 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 *............... 00000044e50ff210 01 00 00 00 00 00 00 00 10 40 00 00 00 00 00 00 .........@...... 00000044e50ff220 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@....... 00000044e50ff230 d0 0c 72 e1 58 01 00 00 2a 00 00 00 00 00 00 00 Ð.ráX...*....... 00000044e50ff240 2c 03 95 de 58 01 00 00 50 01 95 de 58 01 00 00 ,.?ÞX...P.?ÞX... 00000044e50ff250 00 00 00 00 00 00 00 00 6a 00 00 00 00 00 00 00 ........j....... 00000044e50ff260 00 00 00 00 00 00 00 00 00 06 00 06 00 00 00 00 ................ 00000044e50ff270 24 03 95 de 58 01 00 00 2a 00 00 00 00 00 00 00 $.?ÞX...*....... 00000044e50ff280 20 f3 0f e5 44 00 00 00 0a 0f 00 05 00 00 00 00 ó.åD........... 00000044e50ff290 00 00 19 3c fe 7f 00 00 02 00 00 02 fe 7f 00 00 ...<þ.......þ... 00000044e50ff2a0 00 00 00 00 00 00 00 00 00 00 19 3c fe 7f 00 00 ...........<þ... 00000044e50ff2b0 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 ................ 00000044e50ff2c0 01 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff2d0 2b 00 00 2b 00 00 00 00 17 00 00 00 00 00 00 00 +..+............ 00000044e50ff2e0 01 00 00 00 00 00 00 00 0a 0f 00 05 58 01 00 00 ............X... 00000044e50ff2f0 01 04 00 00 00 00 00 00 02 00 00 02 fe 7f 00 00 ............þ... 00000044e50ff300 00 00 95 de 58 01 00 00 03 00 80 00 00 00 00 00 ..?ÞX........... 00000044e50ff310 00 40 00 00 00 00 00 00 82 00 00 82 00 00 00 00 .@......?..?.... 00000044e50ff320 00 00 00 00 00 00 00 00 0a 0f 00 05 44 00 00 00 ............D... 00000044e50ff330 00 00 00 00 03 00 00 00 b0 07 1e 3c fe 7f 00 00 ........°..<þ... Possible instruction pointers: 5 ntdll.dll + 0x507b0 rsp = 0x00000044e50ff340 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e50ff340 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff350 1b 00 10 00 80 1f 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff360 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff370 08 dd d8 35 7d cb 00 00 f0 03 00 00 00 00 00 00 .ÝØ5}Ë..ð....... 00000044e50ff380 01 00 00 00 00 00 00 00 d0 45 be 39 fe 7f 00 00 ........ÐE¾9þ... Possible instruction pointers: 6 KERNELBASE.dll + 0x645d0 rsp = 0x00000044e50ff390 rip = 0x00007ffe39be45d0 Found by: stack scanning Stack contents: 00000044e50ff390 00 00 00 00 00 00 00 00 4d b4 1b 3c fe 7f 00 00 ........M´.<þ... Possible instruction pointers: 7 ntdll.dll + 0x2b44d rsp = 0x00000044e50ff3a0 rip = 0x00007ffe3c1bb44d Found by: stack scanning Stack contents: 00000044e50ff3a0 00 00 95 de 58 01 00 00 02 00 80 00 58 01 00 00 ..?ÞX.......X... 00000044e50ff3b0 00 ba 3c dc ff ff ff ff 00 00 00 00 00 00 00 00 .º<Üÿÿÿÿ........ 00000044e50ff3c0 8e cd 34 46 00 0d 00 00 00 00 00 00 00 00 00 00 ?Í4F............ 00000044e50ff3d0 00 00 00 00 00 00 00 00 e0 f6 0f e5 44 00 00 00 ........àö.åD... 00000044e50ff3e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff3f0 00 00 00 00 00 00 00 00 c6 b1 8c 3b fe 7f 00 00 ........Ʊ?;þ... Possible instruction pointers: 8 combase.dll + 0xcb1c6 rsp = 0x00000044e50ff400 rip = 0x00007ffe3b8cb1c6 Found by: stack scanning Stack contents: 00000044e50ff400 00 00 00 00 00 00 00 00 7e f4 1a 3c fe 7f 00 00 ........~ô.<þ... Possible instruction pointers: 9 ntdll.dll + 0x1f47e rsp = 0x00000044e50ff410 rip = 0x00007ffe3c1af47e Found by: stack scanning Stack contents: 00000044e50ff410 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff430 a0 0f 00 00 e7 17 a8 ab 80 1f 00 00 ff ff 02 00  ...ç.¨«....ÿÿ.. 00000044e50ff440 00 ba 3c dc ff ff ff ff 00 00 00 00 00 00 00 00 .º<Üÿÿÿÿ........ 00000044e50ff450 80 04 00 00 00 00 00 00 6f a3 19 3c fe 7f 00 00 ........o£.<þ... Possible instruction pointers: 10 ntdll.dll + 0xa36f rsp = 0x00000044e50ff460 rip = 0x00007ffe3c19a36f Found by: stack scanning Stack contents: 00000044e50ff460 00 00 00 00 00 00 00 00 25 b1 71 e2 00 00 00 00 ........%±qâ.... 00000044e50ff470 28 03 8b de 58 01 00 00 00 00 00 00 00 00 00 00 (.?ÞX........... 00000044e50ff480 80 16 8b de 58 01 00 00 6b b8 1b 3c fe 7f 00 00 ..?ÞX...k¸.<þ... Possible instruction pointers: 11 ntdll.dll + 0x2b86b rsp = 0x00000044e50ff490 rip = 0x00007ffe3c1bb86b Found by: stack scanning Stack contents: 00000044e50ff490 ff 01 a5 02 00 00 00 00 99 00 00 00 00 00 00 00 ÿ.¥............. 00000044e50ff4a0 20 c7 71 e1 58 01 00 00 40 00 00 00 00 00 00 00 ÇqáX...@....... 00000044e50ff4b0 28 03 8b de 58 01 00 00 00 00 8b de 58 01 00 00 (.?ÞX.....?ÞX... 00000044e50ff4c0 00 00 00 00 58 01 00 00 c0 18 8b de 58 01 00 00 ....X...À.?ÞX... 00000044e50ff4d0 40 f9 af e0 58 01 00 00 00 00 8b de 58 01 00 00 @ù¯àX.....?ÞX... 00000044e50ff4e0 b0 02 8b de 58 01 00 00 98 00 00 00 00 00 00 00 °.?ÞX........... 00000044e50ff4f0 40 00 00 00 00 00 00 00 c0 0c 8b de 58 01 00 00 @.......À.?ÞX... 00000044e50ff500 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@.............. 00000044e50ff510 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@....... 00000044e50ff520 30 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 0............... 00000044e50ff530 00 00 95 de 58 01 00 00 f9 f5 0f e5 44 00 00 00 ..?ÞX...ùõ.åD... 00000044e50ff540 04 00 00 00 00 00 00 00 c7 b3 1b 3c fe 7f 00 00 ........dz.<þ... Possible instruction pointers: 12 ntdll.dll + 0x2b3c7 rsp = 0x00000044e50ff550 rip = 0x00007ffe3c1bb3c7 Found by: stack scanning Stack contents: 00000044e50ff550 00 00 8b de 58 01 00 00 00 00 00 00 00 00 00 00 ..?ÞX........... 00000044e50ff560 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... 00000044e50ff570 10 02 00 00 00 00 00 00 b0 07 1e 3c fe 7f 00 00 ........°..<þ... Possible instruction pointers: 13 ntdll.dll + 0x507b0 rsp = 0x00000044e50ff580 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e50ff580 00 00 95 de 02 00 00 00 49 f6 0f e5 44 00 00 00 ..?Þ....Iö.åD... 00000044e50ff590 22 00 00 00 00 00 00 00 c7 b3 1b 3c fe 7f 00 00 ".......dz.<þ... Possible instruction pointers: 14 ntdll.dll + 0x2b3c7 rsp = 0x00000044e50ff5a0 rip = 0x00007ffe3c1bb3c7 Found by: stack scanning Stack contents: 00000044e50ff5a0 00 00 8b de 58 01 00 00 b0 07 1e 3c fe 7f 00 00 ..?ÞX...°..<þ... Possible instruction pointers: 15 ntdll.dll + 0x507b0 rsp = 0x00000044e50ff5b0 rip = 0x00007ffe3c1e07b0 Found by: stack scanning Stack contents: 00000044e50ff5b0 c8 db d8 35 7d cb 00 00 00 00 00 00 44 00 00 00 ÈÛØ5}Ë......D... 00000044e50ff5c0 25 00 00 00 00 00 00 00 6c 29 be 39 fe 7f 00 00 %.......l)¾9þ... Possible instruction pointers: 16 KERNELBASE.dll + 0x6296c rsp = 0x00000044e50ff5d0 rip = 0x00007ffe39be296c Found by: stack scanning Stack contents: 00000044e50ff5d0 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff5e0 f8 db d8 35 7d cb 00 00 00 00 00 00 00 00 00 00 øÛØ5}Ë.......... 00000044e50ff5f0 02 00 10 00 00 00 00 00 9a 33 bb 39 fe 7f 00 00 ........?3»9þ... Possible instruction pointers: 17 KERNELBASE.dll + 0x3339a rsp = 0x00000044e50ff600 rip = 0x00007ffe39bb339a Found by: stack scanning Stack contents: 00000044e50ff600 00 00 00 00 00 00 00 00 9c 04 00 00 00 00 00 00 ........?....... 00000044e50ff610 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff620 00 00 00 ff ff ff ff ff ff ff ff 00 00 00 00 00 ...ÿÿÿÿÿÿÿÿ..... 00000044e50ff630 00 00 00 00 00 00 00 00 80 04 00 00 00 00 00 00 ................ 00000044e50ff640 14 05 00 00 00 00 00 00 9c 04 00 00 00 00 00 00 ........?....... 00000044e50ff650 1e e0 f7 ba ca 9e 00 00 08 92 8c 3b fe 7f 00 00 .à÷ºÊ?...??;þ... Possible instruction pointers: 18 combase.dll + 0xc9208 rsp = 0x00000044e50ff660 rip = 0x00007ffe3b8c9208 Found by: stack scanning Stack contents: 00000044e50ff660 00 00 00 00 00 00 00 00 00 45 74 e1 58 01 00 00 .........EtáX... 00000044e50ff670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff680 80 04 00 00 00 00 00 00 40 b0 8c 3b fe 7f 00 00 ........@°?;þ... Possible instruction pointers: 19 combase.dll + 0xcb040 rsp = 0x00000044e50ff690 rip = 0x00007ffe3b8cb040 Found by: stack scanning Stack contents: 00000044e50ff690 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff6a0 50 41 78 e1 58 01 00 00 e5 58 86 3b fe 7f 00 00 PAxáX...åX?;þ... Possible instruction pointers: 20 combase.dll + 0x658e5 rsp = 0x00000044e50ff6b0 rip = 0x00007ffe3b8658e5 Found by: stack scanning Stack contents: 00000044e50ff6b0 a0 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ............... 00000044e50ff6c0 e0 f6 0f e5 44 00 00 00 e8 3c 00 00 00 00 00 00 àö.åD...è<...... 00000044e50ff6d0 f0 45 74 e1 58 01 00 00 50 ae 8c 3b fe 7f 00 00 ðEtáX...P®?;þ... Possible instruction pointers: 21 combase.dll + 0xcae50 rsp = 0x00000044e50ff6e0 rip = 0x00007ffe3b8cae50 Found by: stack scanning Stack contents: 00000044e50ff6e0 ff ff ff ff 58 01 00 00 f0 45 74 e1 58 01 00 00 ÿÿÿÿX...ðEtáX... 00000044e50ff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff700 f0 45 74 e1 58 01 00 00 46 b2 8c 3b fe 7f 00 00 ðEtáX...F²?;þ... Possible instruction pointers: 22 combase.dll + 0xcb246 rsp = 0x00000044e50ff710 rip = 0x00007ffe3b8cb246 Found by: stack scanning Stack contents: 00000044e50ff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff720 00 00 00 00 00 00 00 00 f0 45 74 e1 58 01 00 00 ........ðEtáX... 00000044e50ff730 00 00 00 00 00 00 00 00 d9 ad 8c 3b fe 7f 00 00 ........Ù­?;þ... Possible instruction pointers: 23 combase.dll + 0xcadd9 rsp = 0x00000044e50ff740 rip = 0x00007ffe3b8cadd9 Found by: stack scanning Stack contents: 00000044e50ff740 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff760 00 00 00 00 00 00 00 00 34 70 0a 3c fe 7f 00 00 ........4p.<þ... Possible instruction pointers: 24 kernel32.dll + 0x17034 rsp = 0x00000044e50ff770 rip = 0x00007ffe3c0a7034 Found by: stack scanning Stack contents: 00000044e50ff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000044e50ff790 00 00 00 00 00 00 00 00 51 26 1e 3c fe 7f 00 00 ........Q&.<þ... Possible instruction pointers: 25 ntdll.dll + 0x52651 rsp = 0x00000044e50ff7a0 rip = 0x00007ffe3c1e2651 Found by: stack scanning Thread 12 0 ntdll.dll + 0xa07c4 rax = 0x00000000000001d3 rdx = 0x00000158de958be0 rcx = 0x000000000000029c rbx = 0x00000158de958f60 rsi = 0x00000158e0b1c4f0 rdi = 0x00000158de958f60 rbp = 0x0000000000000000 rsp = 0x00000044e51ff6e8 r8 = 0x0000000000000000 r9 = 0x0000000000000040 r10 = 0x0000000000000280 r11 = 0xbefe766d3cdff076 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c2307c4 Found by: given as instruction pointer in context Stack contents: 00000044e51ff6e8 c7 2d 1e 3c fe 7f 00 00 Ç-.<þ... Possible instruction pointers: 1 ntdll.dll + 0x52dc7 rsp = 0x00000044e51ff6f0 rip = 0x00007ffe3c1e2dc7 Found by: stack scanning Thread 13 0 ntdll.dll + 0xa07c4 rax = 0x00000000000001d3 rdx = 0x00000158de958f80 rcx = 0x000000000000029c rbx = 0x00000158de959300 rsi = 0x00000158e0b1c4f0 rdi = 0x00000158de959300 rbp = 0x0000000000000000 rsp = 0x00000044e52ff4b8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ffe3c2307c4 Found by: given as instruction pointer in context Stack contents: 00000044e52ff4b8 c7 2d 1e 3c fe 7f 00 00 Ç-.<þ... Possible instruction pointers: 1 ntdll.dll + 0x52dc7 rsp = 0x00000044e52ff4c0 rip = 0x00007ffe3c1e2dc7 Found by: stack scanning Thread 14 0 win32u.dll + 0xa104 rax = 0x0000000000001486 rdx = 0x00000044e54ff778 rcx = 0x0000000000000001 rbx = 0x0000000000007530 rsi = 0x00000158e2357fb0 rdi = 0x00000000004c4302 rbp = 0x00000044e54ff7c0 rsp = 0x00000044e54ff678 r8 = 0x00000158e0bbf840 r9 = 0x00000158e17ea6e0 r10 = 0x0000000000000100 r11 = 0x80000428bfe00001 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00007ffe3bd8c200 r15 = 0x0000000000000000 rip = 0x00007ffe3995a104 Found by: given as instruction pointer in context Stack contents: 00000044e54ff678 5e 0b 59 3b fe 7f 00 00 ^.Y;þ... Possible instruction pointers: 1 user32.dll + 0x20b5e rbp = 0x00000044e54ff7c0 rsp = 0x00000044e54ff680 rip = 0x00007ffe3b590b5e Found by: stack scanning Stack contents: 00000044e54ff680 00 00 00 00 00 00 00 00 19 67 b0 37 fe 7f 00 00 .........g°7þ... Possible instruction pointers: 2 windows.storage.dll + 0x136719 rbp = 0x00000044e54ff7c0 rsp = 0x00000044e54ff690 rip = 0x00007ffe37b06719 Found by: stack scanning Stack contents: 00000044e54ff690 00 00 9d 37 fe 7f 00 00 09 00 00 00 00 00 00 00 ...7þ... ....... 00000044e54ff6a0 06 00 00 00 7d cb 00 00 b0 7f 35 e2 58 01 00 00 ....}Ë..°.5âX... 00000044e54ff6b0 c0 f7 4f e5 44 00 00 00 81 7c d0 3b fe 7f 00 00 À÷OåD....|Ð;þ... Possible instruction pointers: 3 SHCore.dll + 0x17c81 rbp = 0x00000044e54ff7c0 rsp = 0x00000044e54ff6c0 rip = 0x00007ffe3bd07c81 Found by: stack scanning Loaded modules: 0x180000000 - 0x180013fff HcDLL2_30_x64.dll ??? (WARNING: No symbols, , ) 0x7ff6cc310000 - 0x7ff6cd3d1fff Audacity.exe 3.0.5.0 (main) (WARNING: No symbols, Audacity.pdb, 38B850C983CF44D782753102E7E929322) 0x7ffdf89c0000 - 0x7ffdf94f4fff wxmsw313u_core_vc_x64_custom.dll 3.1.3.0 0x7ffe0d320000 - 0x7ffe0d3c8fff tiptsf.dll 6.2.19041.746 0x7ffe1a810000 - 0x7ffe1a81cfff atlthunk.dll 6.2.19041.546 0x7ffe1b070000 - 0x7ffe1b0b1fff mlang.dll 6.2.19041.746 0x7ffe1c1c0000 - 0x7ffe1c55dfff wxbase313u_vc_x64_custom.dll 3.1.3.0 (WARNING: No symbols, wxbase313u_vc_x64_custom.pdb, 15E0BF773B4C4F75805F645C69448EF61) 0x7ffe1cad0000 - 0x7ffe1cb6bfff dsound.dll 6.2.19041.1 (WARNING: No symbols, dsound.pdb, 1380FD78F5886F3483654383FE4824051) 0x7ffe1cb70000 - 0x7ffe1cc54fff wxmsw313u_aui_vc_x64_custom.dll 3.1.3.0 0x7ffe1e980000 - 0x7ffe1e9cbfff Windows.UI.AppDefaults.dll 6.2.19041.1151 0x7ffe1f7c0000 - 0x7ffe1f854fff duser.dll 6.2.19041.546 0x7ffe1fb00000 - 0x7ffe1fb23fff edputil.dll 6.2.19041.546 0x7ffe212e0000 - 0x7ffe2131dfff dataexchange.dll 6.2.19041.1151 0x7ffe22c40000 - 0x7ffe22cd7fff libcurl.dll 7.75.0.0 0x7ffe22e40000 - 0x7ffe22e9bfff Bcp47Langs.dll 6.2.19041.1266 0x7ffe22eb0000 - 0x7ffe22f3ffff appresolver.dll 6.2.19041.1202 0x7ffe240d0000 - 0x7ffe24115fff wdmaud.drv 6.2.19041.1 0x7ffe245a0000 - 0x7ffe24698fff textinputframework.dll 6.2.19041.1266 0x7ffe246a0000 - 0x7ffe247e5fff Windows.StateRepositoryPS.dll 6.2.19041.844 0x7ffe25300000 - 0x7ffe2537cfff OneCoreCommonProxyStub.dll 6.2.19041.1081 0x7ffe259a0000 - 0x7ffe25a4bfff TextShaping.dll ??? 0x7ffe25f00000 - 0x7ffe25f1cfff Windows.Shell.ServiceHostBuilder.dll 6.2.19041.746 0x7ffe26ab0000 - 0x7ffe26acdfff msacm32.dll 6.2.19041.1 0x7ffe26ad0000 - 0x7ffe26b5cfff msvcp140.dll 14.29.30133.0 (WARNING: No symbols, msvcp140.amd64.pdb, 8E11BCB6404141DA9406136DF78BDCA11) 0x7ffe26c70000 - 0x7ffe26d29fff wxmsw313u_html_vc_x64_custom.dll 3.1.3.0 0x7ffe27c70000 - 0x7ffe27c9bfff dbgcore.dll 6.2.19041.789 (WARNING: No symbols, dbgcore.pdb, 1B644FB951EC7CD809F243D23F98703B1) 0x7ffe27f00000 - 0x7ffe280e3fff dbghelp.dll 6.2.19041.867 0x7ffe284b0000 - 0x7ffe28630fff AudioSes.dll 6.2.19041.1023 0x7ffe28840000 - 0x7ffe28850fff lib-uuid.dll ??? 0x7ffe28e40000 - 0x7ffe28e4bfff secur32.dll 6.2.19041.546 0x7ffe296a0000 - 0x7ffe2994ffff iertutil.dll 11.0.19041.1266 0x7ffe299b0000 - 0x7ffe299d7fff srvcli.dll 6.2.19041.546 0x7ffe29a10000 - 0x7ffe29a2efff wxbase313u_xml_vc_x64_custom.dll 3.1.3.0 0x7ffe29b50000 - 0x7ffe29d3afff urlmon.dll 11.0.19041.1237 0x7ffe2a220000 - 0x7ffe2a6effff wininet.dll 11.0.19041.1202 0x7ffe2aba0000 - 0x7ffe2abc5fff winmmbase.dll 6.2.19041.1 0x7ffe2c830000 - 0x7ffe2cac9fff comctl32.dll 6.10.19041.1110 0x7ffe2eec0000 - 0x7ffe2ef25fff oleacc.dll 7.2.19041.746 0x7ffe2ef30000 - 0x7ffe2efc4fff winspool.drv 6.2.19041.1288 0x7ffe2f230000 - 0x7ffe2f256fff winmm.dll 6.2.19041.546 0x7ffe2f350000 - 0x7ffe2fae7fff OneCoreUAPCommonProxyStub.dll 6.2.19041.1266 0x7ffe30ed0000 - 0x7ffe30ed6fff msimg32.dll 6.2.19041.546 0x7ffe317b0000 - 0x7ffe317e2fff libexpat.dll ??? 0x7ffe31aa0000 - 0x7ffe31c53fff WindowsCodecs.dll 6.2.19041.1151 0x7ffe31cc0000 - 0x7ffe31ec0fff twinapi.appcore.dll 6.2.19041.964 0x7ffe32100000 - 0x7ffe32109fff version.dll 6.2.19041.546 0x7ffe32190000 - 0x7ffe32214fff MMDevAPI.dll 6.2.19041.1023 0x7ffe327c0000 - 0x7ffe327fffff wxmsw313u_qa_vc_x64_custom.dll 3.1.3.0 0x7ffe329a0000 - 0x7ffe329b5fff lib-string-utils.dll ??? 0x7ffe32af0000 - 0x7ffe32b1efff lib-network-manager.dll ??? 0x7ffe32b20000 - 0x7ffe32b54fff lib-sentry-reporting.dll ??? 0x7ffe32c00000 - 0x7ffe32c1afff VCRUNTIME140.dll 14.29.30133.0 (WARNING: No symbols, vcruntime140.amd64.pdb, 57F84FF4868E4512925A510A912948061) 0x7ffe33ac0000 - 0x7ffe33acafff midimap.dll 6.2.19041.488 (WARNING: No symbols, midimap.pdb, 7CD5318BADDF24FD5AF910EB112B262F1) 0x7ffe33ea0000 - 0x7ffe33ea9fff avrt.dll 6.2.19041.546 0x7ffe34430000 - 0x7ffe344cffff policymanager.dll 6.2.19041.1266 0x7ffe344d0000 - 0x7ffe344f3fff zlib1.dll 1.2.11.0 0x7ffe34cc0000 - 0x7ffe34cccfff msacm32.drv 6.2.19041.488 0x7ffe34f10000 - 0x7ffe35005fff propsys.dll 7.0.19041.1023 0x7ffe35010000 - 0x7ffe35018fff ksuser.dll 6.2.19041.1 0x7ffe355e0000 - 0x7ffe355ebfff VCRUNTIME140_1.dll 14.29.30133.0 0x7ffe35640000 - 0x7ffe35666fff lib-strings.dll ??? 0x7ffe35810000 - 0x7ffe35a73fff d3d11.dll 6.2.19041.1202 0x7ffe364a0000 - 0x7ffe365f3fff WinTypes.dll 6.2.19041.1202 0x7ffe36600000 - 0x7ffe367e4fff dcomp.dll 6.2.19041.1266 0x7ffe36b70000 - 0x7ffe36ecdfff CoreUIComponents.dll 6.2.19041.546 0x7ffe36ed0000 - 0x7ffe36fc1fff CoreMessaging.dll 6.2.19041.746 0x7ffe372f0000 - 0x7ffe3738dfff uxtheme.dll 6.2.19041.1266 0x7ffe373c0000 - 0x7ffe373d3fff resourcepolicyclient.dll 6.2.19041.546 0x7ffe375f0000 - 0x7ffe3761efff dwmapi.dll 6.2.19041.746 0x7ffe377d0000 - 0x7ffe377e1fff kernel.appcore.dll 6.2.19041.546 (WARNING: No symbols, Kernel.Appcore.pdb, 5E49B3157247A4CEBABE3E86C162BF9C1) 0x7ffe379d0000 - 0x7ffe3815ffff windows.storage.dll 6.2.19041.1266 (WARNING: No symbols, Windows.Storage.pdb, 8C7FCE8F75287D9DB0EDD4A6914538481) 0x7ffe381a0000 - 0x7ffe38293fff dxgi.dll 6.2.19041.1266 0x7ffe38400000 - 0x7ffe38424fff sppc.dll 6.2.19041.546 0x7ffe38430000 - 0x7ffe38458fff slc.dll 6.2.19041.546 0x7ffe385a0000 - 0x7ffe385d2fff ntmarta.dll 6.2.19041.546 0x7ffe389a0000 - 0x7ffe38a29fff msvcp110_win.dll 6.2.19041.546 0x7ffe38d90000 - 0x7ffe38d9bfff netutils.dll 6.2.19041.546 0x7ffe39230000 - 0x7ffe3925bfff wldp.dll 6.2.19041.662 0x7ffe39580000 - 0x7ffe395b3fff devobj.dll 6.2.19041.1151 0x7ffe39700000 - 0x7ffe39711fff umpdc.dll ??? (WARNING: No symbols, UMPDC.pdb, 705066911372169E08BCB22260F64CC21) 0x7ffe39720000 - 0x7ffe3976afff powrprof.dll 6.2.19041.546 0x7ffe39770000 - 0x7ffe3979dfff userenv.dll 6.2.19041.572 0x7ffe397a0000 - 0x7ffe397d0fff sspicli.dll 6.2.19041.1266 0x7ffe397f0000 - 0x7ffe3980efff profapi.dll 6.2.19041.844 0x7ffe398b0000 - 0x7ffe3994cfff msvcp_win.dll 6.2.19041.789 0x7ffe39950000 - 0x7ffe39971fff win32u.dll 6.2.19041.1288 (WARNING: No symbols, win32u.pdb, 771C2E28AD611FA7EDEE8227DA66C9351) 0x7ffe39a30000 - 0x7ffe39b2ffff ucrtbase.dll 6.2.19041.789 (WARNING: No symbols, ucrtbase.pdb, 152B3C4F5E1CE0FE6BC36E9F0F2B10E61) 0x7ffe39b30000 - 0x7ffe39b7dfff cfgmgr32.dll 6.2.19041.1151 0x7ffe39b80000 - 0x7ffe39e48fff KERNELBASE.dll 6.2.19041.1202 (WARNING: No symbols, kernelbase.pdb, 1331B83FEA0169B4C83904E0D987265A1) 0x7ffe39eb0000 - 0x7ffe39ed6fff bcrypt.dll 6.2.19041.1023 0x7ffe39ee0000 - 0x7ffe39feafff gdi32full.dll 6.2.19041.1110 0x7ffe39ff0000 - 0x7ffe3a145fff crypt32.dll 6.2.19041.1202 0x7ffe3a150000 - 0x7ffe3a1d2fff bcryptPrimitives.dll 6.2.19041.1202 0x7ffe3a240000 - 0x7ffe3a26afff gdi32.dll 6.2.19041.1202 0x7ffe3a2f0000 - 0x7ffe3aa2efff shell32.dll 6.2.19041.1266 0x7ffe3aa30000 - 0x7ffe3aa84fff shlwapi.dll 6.2.19041.1023 0x7ffe3aa90000 - 0x7ffe3ab3bfff advapi32.dll 6.2.19041.1052 0x7ffe3b020000 - 0x7ffe3b08afff ws2_32.dll 6.2.19041.546 0x7ffe3b090000 - 0x7ffe3b1b9fff ole32.dll 6.2.19041.1202 0x7ffe3b1c0000 - 0x7ffe3b2e9fff rpcrt4.dll 6.2.19041.1288 0x7ffe3b310000 - 0x7ffe3b424fff msctf.dll 6.2.19041.1202 0x7ffe3b440000 - 0x7ffe3b46ffff imm32.dll 6.2.19041.546 0x7ffe3b560000 - 0x7ffe3b567fff psapi.dll 6.2.19041.546 0x7ffe3b570000 - 0x7ffe3b710fff user32.dll 6.2.19041.1202 (WARNING: No symbols, user32.pdb, 665EA74ECC4387676DEBA2013AD2154D1) 0x7ffe3b720000 - 0x7ffe3b7f9fff comdlg32.dll 6.2.19041.906 0x7ffe3b800000 - 0x7ffe3bb54fff combase.dll 6.2.19041.1288 (WARNING: No symbols, combase.pdb, 70DFEEACE6971F03217F2531A96E51AB1) 0x7ffe3bb60000 - 0x7ffe3bc08fff clbcatq.dll 2001.12.10941.16384 0x7ffe3bc20000 - 0x7ffe3bcecfff oleaut32.dll 6.2.19041.985 0x7ffe3bcf0000 - 0x7ffe3bd9cfff SHCore.dll 6.2.19041.1266 (WARNING: No symbols, shcore.pdb, A7B45AFC0AB4AEE8F481EEB1FAC1B43D1) 0x7ffe3bda0000 - 0x7ffe3be3afff sechost.dll 6.2.19041.906 0x7ffe3be40000 - 0x7ffe3beddfff msvcrt.dll 7.0.19041.546 0x7ffe3c090000 - 0x7ffe3c14dfff kernel32.dll 6.2.19041.1202 (WARNING: No symbols, kernel32.pdb, 1DEB36EBC19F93893E14684776D19DB31) 0x7ffe3c190000 - 0x7ffe3c384fff ntdll.dll 6.2.19041.1288 (WARNING: No symbols, ntdll.pdb, 96EF4ED537402DAAA51D4A4212EA4B2C1) .pdb, 96EF4ED537402DAAA51D4A4212EA4B2C1)