Operating system: Windows NT 6.1.7601 17514 CPU: amd64 family 6 model 26 stepping 5 8 CPUs GPU: UNKNOWN Crash reason: EXCEPTION_ACCESS_VIOLATION_READ Crash address: 0xffffffffffffffff Process uptime: 1384 seconds Thread 12 (crashed) 0 lib-mixer.dll + 0x1041b rax = 0x0073005c00730077 rdx = 0x0000000000000800 rcx = 0x0073005c0073007b rbx = 0x000000000a4ff8a0 rsi = 0x0000000000002000 rdi = 0x0000000000000004 rbp = 0x000000000a4ff8b4 rsp = 0x000000000a4ff820 r8 = 0xff8cffa3ff8cff89 r9 = 0xff8cffa40b8f43c9 r10 = 0x0000000000002000 r11 = 0x0000000000000000 r12 = 0x0000000009a94e88 r13 = 0x000000000a4ff890 r14 = 0x000000000c024440 r15 = 0x0000000000000006 rip = 0x000007feeaff041b Found by: given as instruction pointer in context Stack contents: 000000000a4ff820 a0 f8 4f 0a 00 00 00 00 91 cc fe ea fe 07 00 00  øO.....?Ìþêþ... Possible instruction pointers: 1 lib-mixer.dll + 0xcc91 rax = 0x0073005c00730077 rdx = 0x0000000000000800 rcx = 0x0073005c0073007b rbx = 0x000000000a4ff8a0 rsi = 0x0000000000002000 rdi = 0x0000000000000004 rbp = 0x000000000a4ff8b4 rsp = 0x000000000a4ff830 r8 = 0xff8cffa3ff8cff89 r9 = 0xff8cffa40b8f43c9 r10 = 0x0000000000002000 r11 = 0x0000000000000000 r12 = 0x0000000009a94e88 r13 = 0x000000000a4ff890 r14 = 0x000000000c024440 r15 = 0x0000000000000006 rip = 0x000007feeafecc91 Found by: simulating a return from leaf function Stack contents: 000000000a4ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ff840 b0 f8 4f 0a 00 00 00 00 d0 4d a9 09 00 00 00 00 °øO.....ÐM© .... 000000000a4ff850 40 6c be 09 00 00 00 00 7a fd fe ea fe 07 00 00 @l¾ ....zýþêþ... Possible instruction pointers: 2 lib-mixer.dll + 0xfd7a rbp = 0x000000000a4ff8b4 rsp = 0x000000000a4ff860 rip = 0x000007feeafefd7a Found by: stack scanning Stack contents: 000000000a4ff860 01 00 00 00 00 00 00 00 50 03 c8 09 00 00 00 00 ........P.È .... 000000000a4ff870 c0 f8 4f 0a 00 00 00 00 00 00 00 00 00 00 00 00 ÀøO............. 000000000a4ff880 88 4e a9 09 00 00 00 00 00 20 00 00 fe 07 00 00 .N© ..... ..þ... 000000000a4ff890 00 00 80 3f 00 00 80 3f 00 00 80 3f 00 00 80 3f ...?...?...?...? 000000000a4ff8a0 00 00 80 3f 00 00 80 3f 16 92 55 eb fe 07 00 00 ...?...?.?Uëþ... Possible instruction pointers: 3 ucrtbase.DLL + 0x9216 rbp = 0x000000000a4ff8b4 rsp = 0x000000000a4ff8b0 rip = 0x000007feeb559216 Found by: stack scanning Stack contents: 000000000a4ff8b0 00 00 00 00 01 00 00 00 40 00 00 00 00 00 00 00 ........@....... 000000000a4ff8c0 06 00 00 00 00 00 00 00 c0 04 c8 09 00 00 00 00 ........À.È .... 000000000a4ff8d0 00 20 00 00 00 00 00 00 03 00 00 00 fe 07 00 00 . ..........þ... 000000000a4ff8e0 00 20 00 00 00 00 00 00 00 20 00 00 00 00 00 00 . ....... ...... 000000000a4ff8f0 a0 f9 4f 0a 00 00 00 00 88 4e a9 09 00 00 00 00  ùO......N© .... 000000000a4ff900 40 44 02 0c 00 00 00 00 e0 04 c8 09 00 00 00 00 @D......à.È .... 000000000a4ff910 00 20 00 00 00 00 00 00 01 4d a9 09 00 00 00 00 . .......M© .... 000000000a4ff920 38 49 05 cf 86 17 00 00 f2 ff fe ea fe 07 00 00 8I.Ï?...òÿþêþ... Possible instruction pointers: 4 lib-mixer.dll + 0xfff2 rsp = 0x000000000a4ff930 rip = 0x000007feeafefff2 Found by: stack scanning Stack contents: 000000000a4ff930 00 20 00 00 00 00 00 00 00 bb 2c 00 00 00 00 00 . .......»,..... 000000000a4ff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ff950 b8 2b f1 0b 00 00 00 00 1a 08 ff ea fe 07 00 00 ¸+ñ.......ÿêþ... Possible instruction pointers: 5 lib-mixer.dll + 0x1081a rsp = 0x000000000a4ff960 rip = 0x000007feeaff081a Found by: stack scanning Stack contents: 000000000a4ff960 00 d1 af 03 00 00 00 00 c8 2b f1 0b 00 00 00 00 .ѯ.....È+ñ..... 000000000a4ff970 d0 4d a9 09 00 00 00 00 bd 67 da e6 fe 07 00 00 ÐM© ....½gÚæþ... Possible instruction pointers: 6 mod-flac.dll + 0x67bd rsp = 0x000000000a4ff980 rip = 0x000007fee6da67bd Found by: stack scanning Stack contents: 000000000a4ff980 08 53 c4 03 00 00 00 00 08 00 00 00 00 00 00 00 .SÄ............. 000000000a4ff990 d8 52 c4 03 00 00 00 00 00 20 00 00 00 00 00 00 ØRÄ...... ...... 000000000a4ff9a0 4c 14 da e6 fe 07 00 00 L.Úæþ... Possible instruction pointers: 7 mod-flac.dll + 0x144c rsp = 0x000000000a4ff9a8 rip = 0x000007fee6da144c Found by: stack scanning Stack contents: 000000000a4ff9a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ff9b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ff9c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ff9d8 68 bb 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 h»,............. 000000000a4ff9e8 00 00 00 00 00 00 00 00 20 4c a9 09 00 00 00 00 ........ L© .... 000000000a4ff9f8 51 a5 da e6 fe 07 00 00 Q¥Úæþ... Possible instruction pointers: 8 mod-flac.dll + 0xa551 rsp = 0x000000000a4ffa00 rip = 0x000007fee6daa551 Found by: stack scanning Stack contents: 000000000a4ffa00 00 00 00 00 00 00 00 00 00 d1 af 03 00 00 00 00 .........ѯ..... 000000000a4ffa10 00 d1 af 03 00 00 00 00 00 00 00 00 00 00 00 00 .ѯ............. 000000000a4ffa20 00 00 00 00 00 00 00 00 d8 52 c4 03 00 00 00 00 ........ØRÄ..... 000000000a4ffa30 20 fa 4f 0a 00 00 00 00 20 4c a9 09 00 00 00 00 úO..... L© .... 000000000a4ffa40 20 fa 4f 0a 00 00 00 00 20 4c a9 09 00 00 00 00 úO..... L© .... 000000000a4ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffa90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffb10 43 75 78 cf cb 9a 00 00 00 00 00 00 00 00 00 00 CuxÏË?.......... 000000000a4ffb20 00 00 00 00 00 00 00 00 40 b5 f3 0b 00 00 00 00 ........@µó..... 000000000a4ffb30 00 00 00 00 00 00 00 00 79 9e e0 e8 fe 07 00 00 ........y?àèþ... Possible instruction pointers: 9 lib-import-export.dll + 0x9e79 rsp = 0x000000000a4ffb40 rip = 0x000007fee8e09e79 Found by: stack scanning Stack contents: 000000000a4ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffb50 00 d1 af 03 00 00 00 00 00 00 00 00 00 00 00 00 .ѯ............. 000000000a4ffb60 b0 fb 4f 0a 00 00 00 00 08 cd bb 02 00 00 00 00 °ûO......Í»..... 000000000a4ffb70 c8 cd bb 02 00 00 00 00 00 00 00 00 00 00 00 00 ÈÍ»............. 000000000a4ffb80 b0 fb 4f 0a 00 00 00 00 08 cd bb 02 00 00 00 00 °ûO......Í»..... 000000000a4ffb90 c8 cd bb 02 00 00 00 00 00 00 00 00 00 00 00 00 ÈÍ»............. 000000000a4ffba0 00 d1 af 03 00 00 00 00 49 f7 e0 e8 fe 07 00 00 .ѯ.....I÷àèþ... Possible instruction pointers: 10 lib-import-export.dll + 0xf749 rsp = 0x000000000a4ffbb0 rip = 0x000007fee8e0f749 Found by: stack scanning Stack contents: 000000000a4ffbb0 01 00 00 00 00 00 00 00 61 c3 55 eb fe 07 00 00 ........aÃUëþ... Possible instruction pointers: 11 ucrtbase.DLL + 0xc361 rsp = 0x000000000a4ffbc0 rip = 0x000007feeb55c361 Found by: stack scanning Stack contents: 000000000a4ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffbe0 40 b5 f3 0b 00 00 00 00 76 e3 e0 e8 fe 07 00 00 @µó.....vãàèþ... Possible instruction pointers: 12 lib-import-export.dll + 0xe376 rsp = 0x000000000a4ffbf0 rip = 0x000007fee8e0e376 Found by: stack scanning Stack contents: 000000000a4ffbf0 00 d1 af 03 00 00 00 00 00 00 00 00 00 00 00 00 .ѯ............. 000000000a4ffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffc10 50 ba f3 0b 00 00 00 00 a0 f4 56 eb fe 07 00 00 Pºó..... ôVëþ... Possible instruction pointers: 13 ucrtbase.DLL + 0x1f4a0 rsp = 0x000000000a4ffc20 rip = 0x000007feeb56f4a0 Found by: stack scanning Stack contents: 000000000a4ffc20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffc40 00 00 00 00 00 00 00 00 2d 65 1b 77 00 00 00 00 ........-e.w.... Possible instruction pointers: 14 kernel32.dll + 0x1652d rsp = 0x000000000a4ffc50 rip = 0x00000000771b652d Found by: stack scanning Stack contents: 000000000a4ffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffc70 00 00 00 00 00 00 00 00 21 c5 3e 77 00 00 00 00 ........!Å>w.... Possible instruction pointers: 15 ntdll.dll + 0x2c521 rsp = 0x000000000a4ffc80 rip = 0x00000000773ec521 Found by: stack scanning Stack contents: 000000000a4ffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a4ffca0 30 93 23 77 00 00 00 00 0?#w.... Possible instruction pointers: 16 kernel32.dll + 0x99330 rsp = 0x000000000a4ffca8 rip = 0x0000000077239330 Found by: stack scanning Stack contents: 000000000a4ffca8 30 93 23 77 00 00 00 00 0?#w.... Possible instruction pointers: 17 kernel32.dll + 0x99330 rsp = 0x000000000a4ffcb0 rip = 0x0000000077239330 Found by: stack scanning Thread 0 0 ntdll.dll + 0x52c0a rax = 0x00000000000206c0 rdx = 0x000000000000003b rcx = 0x0000000020010348 rbx = 0x0000000000000000 rsi = 0x0000000003afd130 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x00000000002cb808 r8 = 0x00000000070a03be r9 = 0x0000000000000001 r10 = 0x0000000000000003 r11 = 0x00000000772c0000 r12 = 0x0000000003afd178 r13 = 0x00000000002cb8a0 r14 = 0x0000000003afd178 r15 = 0xb2f4fc0794908cf3 rip = 0x0000000077412c0a Found by: given as instruction pointer in context Stack contents: 00000000002cb808 1d 64 48 77 00 00 00 00 .dHw.... Possible instruction pointers: 1 ntdll.dll + 0xc641d rax = 0x00000000000206c0 rdx = 0x000000000000003b rcx = 0x0000000020010348 rbx = 0x0000000000000000 rsi = 0x0000000003afd130 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x00000000002cb810 r8 = 0x00000000070a03be r9 = 0x0000000000000001 r10 = 0x0000000000000003 r11 = 0x00000000772c0000 r12 = 0x0000000003afd178 r13 = 0x00000000002cb8a0 r14 = 0x0000000003afd178 r15 = 0xb2f4fc0794908cf3 rip = 0x000000007748641d Found by: simulating a return from leaf function Stack contents: 00000000002cb810 03 00 00 00 ff 8c 00 00 b0 b8 2c 00 00 00 00 00 ....ÿ?..°¸,..... 00000000002cb820 30 d1 af 03 00 00 00 00 00 00 00 00 00 00 00 00 0ѯ............. 00000000002cb830 00 00 00 00 00 00 00 00 30 b8 2c 00 00 00 00 00 ........0¸,..... 00000000002cb840 00 00 00 00 00 00 00 00 a6 30 1c 77 00 00 00 00 ........¦0.w.... Possible instruction pointers: 2 kernel32.dll + 0x230a6 rsp = 0x00000000002cb850 rip = 0x00000000771c30a6 Found by: stack scanning Stack contents: 00000000002cb850 30 d1 af 03 00 00 00 00 4e 2f 23 ec fe 07 00 00 0ѯ.....N/#ìþ... Possible instruction pointers: 3 MSVCP140.dll + 0x12f4e rsp = 0x00000000002cb860 rip = 0x000007feec232f4e Found by: stack scanning Stack contents: 00000000002cb860 80 e1 2c 00 00 00 00 00 90 56 c7 03 00 00 00 00 .á,......VÇ..... 00000000002cb870 00 00 00 00 00 00 00 00 08 b2 1e 77 00 00 00 00 .........².w.... Possible instruction pointers: 4 kernel32.dll + 0x4b208 rsp = 0x00000000002cb880 rip = 0x00000000771eb208 Found by: stack scanning Stack contents: 00000000002cb880 20 d1 af 03 00 00 00 00 b0 ba 2c 00 00 00 00 00 ѯ.....°º,..... 00000000002cb890 60 b9 2c 00 00 00 00 00 9f 2d 23 ec fe 07 00 00 `¹,.....?-#ìþ... Possible instruction pointers: 5 MSVCP140.dll + 0x12d9f rsp = 0x00000000002cb8a0 rip = 0x000007feec232d9f Found by: stack scanning Stack contents: 00000000002cb8a0 e0 5e f8 ff ff ff ff ff 79 82 3c 13 fe 07 00 00 à^øÿÿÿÿÿy?<.þ... 00000000002cb8b0 20 d1 af 03 00 00 00 00 52 22 23 ec fe 07 00 00 ѯ.....R"#ìþ... Possible instruction pointers: 6 MSVCP140.dll + 0x12252 rsp = 0x00000000002cb8c0 rip = 0x000007feec232252 Found by: stack scanning Stack contents: 00000000002cb8c0 00 00 00 00 00 00 00 00 4e 2f 23 ec fe 07 00 00 ........N/#ìþ... Possible instruction pointers: 7 MSVCP140.dll + 0x12f4e rsp = 0x00000000002cb8d0 rip = 0x000007feec232f4e Found by: stack scanning Stack contents: 00000000002cb8d0 22 1a 79 17 05 d9 da 01 bc 28 23 ec fe 07 00 00 ".y..ÙÚ.¼(#ìþ... Possible instruction pointers: 8 MSVCP140.dll + 0x128bc rsp = 0x00000000002cb8e0 rip = 0x000007feec2328bc Found by: stack scanning Stack contents: 00000000002cb8e0 7d fb 98 66 00 00 00 00 48 93 41 10 00 00 00 00 }û.f....H?A..... 00000000002cb8f0 8d fd 66 c5 60 7e 00 00 85 e4 e0 e8 fe 07 00 00 .ýfÅ`~..?äàèþ... Possible instruction pointers: 9 lib-import-export.dll + 0xe485 rsp = 0x00000000002cb900 rip = 0x000007fee8e0e485 Found by: stack scanning Stack contents: 00000000002cb900 00 d1 af 03 00 00 00 00 58 b9 2c 00 00 00 00 00 .ѯ.....X¹,..... 00000000002cb910 01 00 00 00 00 00 00 00 b0 ba 2c 00 00 00 00 00 ........°º,..... 00000000002cb920 63 95 2d 00 00 00 00 00 81 e6 e0 e8 fe 07 00 00 c?-......æàèþ... Possible instruction pointers: 10 lib-import-export.dll + 0xe681 rsp = 0x00000000002cb930 rip = 0x000007fee8e0e681 Found by: stack scanning Stack contents: 00000000002cb930 63 95 2d 00 00 00 00 00 f8 b9 2c 00 00 00 00 00 c?-.....ø¹,..... 00000000002cb940 b0 ba 2c 00 00 00 00 00 01 00 00 00 00 00 00 00 °º,............. 00000000002cb950 31 ef fa 02 00 00 00 00 17 b2 0f 26 ee 07 00 00 1ïú......².&î... 00000000002cb960 7d fb 98 66 00 00 00 00 79 82 3c 13 fe 07 00 00 }û.f....y?<.þ... 00000000002cb970 92 71 66 c5 3d 3f 00 00 8d 24 23 ec fe 07 00 00 ?qfÅ=?...$#ìþ... Possible instruction pointers: 11 MSVCP140.dll + 0x1248d rsp = 0x00000000002cb980 rip = 0x000007feec23248d Found by: stack scanning Stack contents: 00000000002cb980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cb990 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000000002cb9a0 00 bf 2c 00 00 00 00 00 d5 ed e0 e8 fe 07 00 00 .¿,.....Õíàèþ... Possible instruction pointers: 12 lib-import-export.dll + 0xedd5 rsp = 0x00000000002cb9b0 rip = 0x000007fee8e0edd5 Found by: stack scanning Stack contents: 00000000002cb9b0 00 bf 2c 00 00 00 00 00 00 bf 2c 00 00 00 00 00 .¿,......¿,..... 00000000002cb9c0 b0 ba 2c 00 00 00 00 00 51 00 5c 00 00 00 00 00 °º,.....Q.\..... 00000000002cb9d0 00 00 00 00 00 00 00 00 e8 b9 2c 00 00 00 00 00 ........è¹,..... 00000000002cb9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cb9f0 01 00 00 00 00 00 00 00 32 00 00 00 00 00 00 00 ........2....... 00000000002cba00 6c 05 00 00 00 00 00 00 ec 14 00 00 00 00 00 00 l.......ì....... 00000000002cba10 00 d1 af 03 00 00 00 00 01 00 00 00 00 00 00 00 .ѯ............. 00000000002cba20 00 bf 2c 00 00 00 00 00 22 30 e1 e8 fe 07 00 00 .¿,....."0áèþ... Possible instruction pointers: 13 lib-import-export.dll + 0x13022 rsp = 0x00000000002cba30 rip = 0x000007fee8e13022 Found by: stack scanning Stack contents: 00000000002cba30 f0 00 00 00 00 00 00 00 df 96 2d 77 00 00 00 00 ð.......ß?-w.... Possible instruction pointers: 14 USER32.dll + 0x196df rsp = 0x00000000002cba40 rip = 0x00000000772d96df Found by: stack scanning Stack contents: 00000000002cba40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cba50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cba60 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 ................ 00000000002cba70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cba80 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ 00000000002cba90 03 00 00 00 00 00 00 00 d8 50 c5 09 00 00 00 00 ........ØPÅ .... 00000000002cbaa0 00 09 02 00 00 00 00 00 00 00 c4 09 00 00 00 00 . ........Ä .... 00000000002cbab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cbac0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cbad0 00 00 00 00 00 00 00 00 00 00 6c 00 61 00 63 00 ..........l.a.c. 00000000002cbae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cbaf0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cbb00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 ................ 00000000002cbb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cbb20 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 ................ 00000000002cbb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000002cbb40 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ 00000000002cbb50 03 00 00 00 00 00 00 00 08 5a c5 09 00 00 00 00 .........ZÅ .... 00000000002cbb60 00 00 00 00 00 00 00 00 f8 11 e4 e8 fe 07 00 00 ........ø.äèþ... Possible instruction pointers: 15 lib-import-export.dll + 0x411f8 rsp = 0x00000000002cbb70 rip = 0x000007fee8e411f8 Found by: stack scanning Thread 1 0 ntdll.dll + 0x518ca rax = 0x0000000000000000 rdx = 0x00000000022f36e0 rcx = 0x00000000773daec0 rbx = 0x0000000000000000 rsi = 0x00000000774c4550 rdi = 0x00000000022f36e0 rbp = 0x0000000000000000 rsp = 0x0000000002a5fa68 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x00000000774c4500 r13 = 0x0000000000000000 r14 = 0x00000000774c44e0 r15 = 0x00000000774c4578 rip = 0x00000000774118ca Found by: given as instruction pointer in context Stack contents: 0000000002a5fa68 07 b0 3d 77 00 00 00 00 .°=w.... Possible instruction pointers: 1 ntdll.dll + 0x1b007 rax = 0x0000000000000000 rdx = 0x00000000022f36e0 rcx = 0x00000000773daec0 rbx = 0x0000000000000000 rsi = 0x00000000774c4550 rdi = 0x00000000022f36e0 rbp = 0x0000000000000000 rsp = 0x0000000002a5fa70 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x00000000774c4500 r13 = 0x0000000000000000 r14 = 0x00000000774c44e0 r15 = 0x00000000774c4578 rip = 0x00000000773db007 Found by: simulating a return from leaf function Stack contents: 0000000002a5fa70 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000002a5fa80 50 45 4c 77 00 00 00 00 PELw.... Possible instruction pointers: 2 ntdll.dll + 0x104550 rsp = 0x0000000002a5fa88 rip = 0x00000000774c4550 Found by: stack scanning Stack contents: 0000000002a5fa88 50 45 4c 77 00 00 00 00 PELw.... Possible instruction pointers: 3 ntdll.dll + 0x104550 rsp = 0x0000000002a5fa90 rip = 0x00000000774c4550 Found by: stack scanning Thread 2 0 ntdll.dll + 0x518ca rax = 0x0000000004cc8640 rdx = 0x00000000002f79c4 rcx = 0x0000000004cc8640 rbx = 0x00000000052ef780 rsi = 0x0000000000000000 rdi = 0x0000000000000001 rbp = 0x0000000000000001 rsp = 0x00000000052ef648 r8 = 0x000000000000000c r9 = 0x0000000000000001 r10 = 0x0000000000000000 r11 = 0x0000000004cc8640 r12 = 0x00000000052ef698 r13 = 0x00000000052ef6f0 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00000000774118ca Found by: given as instruction pointer in context Stack contents: 00000000052ef648 20 14 3e fd fe 07 00 00 .>ýþ... Possible instruction pointers: 1 KERNELBASE.dll + 0x1420 rax = 0x0000000004cc8640 rdx = 0x00000000002f79c4 rcx = 0x0000000004cc8640 rbx = 0x00000000052ef780 rsi = 0x0000000000000000 rdi = 0x0000000000000001 rbp = 0x0000000000000001 rsp = 0x00000000052ef650 r8 = 0x000000000000000c r9 = 0x0000000000000001 r10 = 0x0000000000000000 r11 = 0x0000000004cc8640 r12 = 0x00000000052ef698 r13 = 0x00000000052ef6f0 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x000007fefd3e1420 Found by: simulating a return from leaf function Stack contents: 00000000052ef650 98 f9 2e 05 00 00 00 00 00 0c 00 00 00 00 00 00 .ù.............. 00000000052ef660 00 00 00 00 00 00 00 00 94 08 1c fc fe 07 00 00 ........?..üþ... Possible instruction pointers: 2 POWRPROF.dll + 0x10894 rsp = 0x00000000052ef670 rip = 0x000007fefc1c0894 Found by: stack scanning Stack contents: 00000000052ef670 98 f6 2e 05 00 00 00 00 00 00 00 00 00 00 00 00 .ö.............. 00000000052ef680 02 01 00 00 00 00 00 00 f0 f6 2e 05 00 00 00 00 ........ðö...... 00000000052ef690 01 00 00 00 fe 07 00 00 c0 b4 b3 ff ff ff ff ff ....þ...À´³ÿÿÿÿÿ 00000000052ef6a0 48 00 00 00 00 00 00 00 01 00 00 00 fe 07 00 00 H...........þ... 00000000052ef6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef6c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef6d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef6f0 78 02 00 00 00 00 00 00 40 f7 2e 05 00 00 00 00 x.......@÷...... 00000000052ef700 90 f7 2e 05 00 00 00 00 00 00 00 00 00 00 00 00 .÷.............. 00000000052ef710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef720 70 f8 2e 05 00 00 00 00 28 f7 2e 05 00 00 00 00 pø......(÷...... 00000000052ef730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef740 f4 01 00 00 00 00 00 00 20 12 1b 77 00 00 00 00 ô....... ..w.... Possible instruction pointers: 3 kernel32.dll + 0x11220 rsp = 0x00000000052ef750 rip = 0x00000000771b1220 Found by: stack scanning Stack contents: 00000000052ef750 88 f7 2e 05 00 00 00 00 80 f7 2e 05 00 00 00 00 .÷.......÷...... 00000000052ef760 00 00 00 00 00 00 00 00 80 00 cd 04 00 00 00 00 ..........Í..... 00000000052ef770 00 00 00 00 00 00 00 00 78 02 cd 04 00 00 00 00 ........x.Í..... 00000000052ef780 78 02 00 00 00 00 00 00 80 a8 40 00 00 00 00 00 x........¨@..... 00000000052ef790 00 00 00 00 00 00 00 00 80 00 cd 04 00 00 00 00 ..........Í..... 00000000052ef7a0 00 00 00 00 00 00 00 00 74 02 cd 04 00 00 00 00 ........t.Í..... 00000000052ef7b0 10 54 4d 77 00 00 00 00 .TMw.... Possible instruction pointers: 4 ntdll.dll + 0x115410 rsp = 0x00000000052ef7b8 rip = 0x00000000774d5410 Found by: stack scanning Stack contents: 00000000052ef7b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef7c8 00 00 00 00 00 00 00 00 f4 01 00 00 00 00 00 00 ........ô....... 00000000052ef7d8 01 20 84 dd fe 07 00 00 . ?Ýþ... Possible instruction pointers: 5 dsound.dll + 0x2001 rsp = 0x00000000052ef7e0 rip = 0x000007fedd842001 Found by: stack scanning Stack contents: 00000000052ef7e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef7f0 01 00 00 00 00 00 00 00 b0 13 cc 04 00 00 00 00 ........°.Ì..... 00000000052ef800 78 02 00 00 00 00 00 00 70 04 cd 04 00 00 00 00 x.......p.Í..... 00000000052ef810 98 02 cc 04 00 00 00 00 8e 59 41 77 00 00 00 00 ..Ì.....?YAw.... Possible instruction pointers: 6 ntdll.dll + 0x5598e rsp = 0x00000000052ef820 rip = 0x000000007741598e Found by: stack scanning Stack contents: 00000000052ef820 00 00 00 00 9d 00 28 00 10 00 00 00 00 00 00 00 ......(......... 00000000052ef830 3d 00 04 00 f8 0a 00 00 70 04 cd 04 00 00 00 00 =...ø...p.Í..... 00000000052ef840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef850 10 73 cc 04 00 00 00 00 00 00 00 00 00 00 00 00 .sÌ............. 00000000052ef860 ff ff ff ff 00 00 00 00 01 33 3f fd fe 07 00 00 ÿÿÿÿ.....3?ýþ... Possible instruction pointers: 7 KERNELBASE.dll + 0x13301 rsp = 0x00000000052ef870 rip = 0x000007fefd3f3301 Found by: stack scanning Stack contents: 00000000052ef870 a8 f8 2e 05 00 00 00 00 a0 f8 2e 05 00 00 00 00 ¨ø...... ø...... 00000000052ef880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef890 00 00 00 00 00 00 00 00 c0 f8 2e 05 00 00 00 00 ........Àø...... 00000000052ef8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef8b0 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 ................ 00000000052ef8c0 60 68 cc 04 00 00 00 00 e8 14 cc 04 00 00 00 00 `hÌ.....è.Ì..... 00000000052ef8d0 90 08 89 dd fe 07 00 00 ..?Ýþ... Possible instruction pointers: 8 dsound.dll + 0x50890 rsp = 0x00000000052ef8d8 rip = 0x000007fedd890890 Found by: stack scanning Stack contents: 00000000052ef8d8 7a 30 1c 77 00 00 00 00 z0.w.... Possible instruction pointers: 9 kernel32.dll + 0x2307a rsp = 0x00000000052ef8e0 rip = 0x00000000771c307a Found by: stack scanning Stack contents: 00000000052ef8e0 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000000052ef8f0 c0 f9 2e 05 00 00 00 00 fc 10 3e fd fe 07 00 00 Àù......ü.>ýþ... Possible instruction pointers: 10 KERNELBASE.dll + 0x10fc rsp = 0x00000000052ef900 rip = 0x000007fefd3e10fc Found by: stack scanning Stack contents: 00000000052ef900 02 00 00 00 00 00 00 00 20 14 3e fd fe 07 00 00 ........ .>ýþ... Possible instruction pointers: 11 KERNELBASE.dll + 0x1420 rsp = 0x00000000052ef910 rip = 0x000007fefd3e1420 Found by: stack scanning Stack contents: 00000000052ef910 00 00 fc 04 00 00 00 00 0c 00 00 00 00 00 00 00 ..ü............. 00000000052ef920 01 00 00 00 00 00 00 00 6e 25 84 dd fe 07 00 00 ........n%?Ýþ... Possible instruction pointers: 12 dsound.dll + 0x256e rsp = 0x00000000052ef930 rip = 0x000007fedd84256e Found by: stack scanning Stack contents: 00000000052ef930 58 f9 2e 05 00 00 00 00 a2 23 84 dd fe 07 00 00 Xù......¢#?Ýþ... Possible instruction pointers: 13 dsound.dll + 0x23a2 rsp = 0x00000000052ef940 rip = 0x000007fedd8423a2 Found by: stack scanning Stack contents: 00000000052ef940 02 01 00 00 00 00 00 00 b0 f9 2e 05 00 00 00 00 ........°ù...... 00000000052ef950 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef960 48 00 00 00 00 00 00 00 01 00 00 00 fe 07 00 00 H...........þ... 00000000052ef970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef9a0 00 00 00 00 00 00 00 00 c0 f9 2e 05 00 00 00 00 ........Àù...... 00000000052ef9b0 78 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 x............... 00000000052ef9c0 90 08 89 dd fe 07 00 00 ..?Ýþ... Possible instruction pointers: 14 dsound.dll + 0x50890 rsp = 0x00000000052ef9c8 rip = 0x000007fedd890890 Found by: stack scanning Stack contents: 00000000052ef9c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052ef9d8 00 00 00 00 82 00 00 00 5d 00 00 00 1e 05 00 00 ....?...]....... 00000000052ef9e8 27 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 '............... 00000000052ef9f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052efa08 32 21 84 dd fe 07 00 00 2!?Ýþ... Possible instruction pointers: 15 dsound.dll + 0x2132 rsp = 0x00000000052efa10 rip = 0x000007fedd842132 Found by: stack scanning Stack contents: 00000000052efa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052efa20 00 00 00 00 00 00 00 00 b0 13 cc 04 00 00 00 00 ........°.Ì..... 00000000052efa30 00 00 00 00 00 00 00 00 70 fa 2e 05 00 00 00 00 ........pú...... 00000000052efa40 78 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 x............... 00000000052efa50 10 00 00 00 00 00 00 00 a0 2c b2 09 00 00 00 00 ........ ,² .... 00000000052efa60 01 80 ff 00 ff ff ff ff ff ff ff ff fe 07 00 00 ..ÿ.ÿÿÿÿÿÿÿÿþ... 00000000052efa70 da 7f 5e 8c bf e8 96 4a 9a 85 a6 e2 3a 8c 63 5c Ú.^?¿è?J??¦â:?c\ 00000000052efa80 6f 66 7d c0 04 d9 00 00 00 00 00 00 00 00 00 00 of}À.Ù.......... 00000000052efa90 b0 13 cc 04 00 00 00 00 a5 20 84 dd fe 07 00 00 °.Ì.....¥ ?Ýþ... Possible instruction pointers: 16 dsound.dll + 0x20a5 rsp = 0x00000000052efaa0 rip = 0x000007fedd8420a5 Found by: stack scanning Stack contents: 00000000052efaa0 b0 13 cc 04 00 00 00 00 00 00 00 00 00 00 00 00 °.Ì............. 00000000052efab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052efac0 00 00 00 00 00 00 00 00 2d 65 1b 77 00 00 00 00 ........-e.w.... Possible instruction pointers: 17 kernel32.dll + 0x1652d rsp = 0x00000000052efad0 rip = 0x00000000771b652d Found by: stack scanning Stack contents: 00000000052efad0 78 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 x............... 00000000052efae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000052efaf0 00 00 00 00 00 00 00 00 21 c5 3e 77 00 00 00 00 ........!Å>w.... Possible instruction pointers: 18 ntdll.dll + 0x2c521 rsp = 0x00000000052efb00 rip = 0x00000000773ec521 Found by: stack scanning Thread 3 0 ntdll.dll + 0x5165a rax = 0x0000000000000000 rdx = 0x0000000000000000 rcx = 0x0000000004fbfab8 rbx = 0x0000000000000000 rsi = 0x000000000000000a rdi = 0x0000000000000000 rbp = 0x431bde82d7b634db rsp = 0x0000000004fbf9f8 r8 = 0x000000001433b251 r9 = 0x0000000004fbfaa0 r10 = 0x0000000000000000 r11 = 0x0000000004fbfa98 r12 = 0x0000000004fbfa20 r13 = 0x0000000000000001 r14 = 0xb2f4fc0794908cf3 r15 = 0x0000000002be1620 rip = 0x000000007741165a Found by: given as instruction pointer in context Stack contents: 0000000004fbf9f8 03 12 3e fd fe 07 00 00 ..>ýþ... Possible instruction pointers: 1 KERNELBASE.dll + 0x1203 rax = 0x0000000000000000 rdx = 0x0000000000000000 rcx = 0x0000000004fbfab8 rbx = 0x0000000000000000 rsi = 0x000000000000000a rdi = 0x0000000000000000 rbp = 0x431bde82d7b634db rsp = 0x0000000004fbfa00 r8 = 0x000000001433b251 r9 = 0x0000000004fbfaa0 r10 = 0x0000000000000000 r11 = 0x0000000004fbfa98 r12 = 0x0000000004fbfa20 r13 = 0x0000000000000001 r14 = 0xb2f4fc0794908cf3 r15 = 0x0000000002be1620 rip = 0x000007fefd3e1203 Found by: simulating a return from leaf function Stack contents: 0000000004fbfa00 b8 fa fb 04 00 00 00 00 48 fa fb 04 00 00 00 00 ¸úû.....Húû..... 0000000004fbfa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfa20 60 79 fe ff ff ff ff ff 20 fa fb 04 00 00 00 00 `yþÿÿÿÿÿ úû..... 0000000004fbfa30 48 00 00 00 00 00 00 00 01 00 00 00 fe 07 00 00 H...........þ... 0000000004fbfa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfa80 00 00 00 00 00 00 00 00 30 fb fb 04 00 00 00 00 ........0ûû..... 0000000004fbfa90 00 00 4f 91 94 4e 00 00 79 83 a2 e9 fe 07 00 00 ..O??N..y?¢éþ... Possible instruction pointers: 2 lib-audio-io.dll + 0x8379 rbp = 0x431bde82d7b634db rsp = 0x0000000004fbfaa0 rip = 0x000007fee9a28379 Found by: stack scanning Stack contents: 0000000004fbfaa0 63 95 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 c?-............. 0000000004fbfab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfac0 a2 17 be 02 00 00 00 00 06 f5 a2 e9 fe 07 00 00 ¢.¾......õ¢éþ... Possible instruction pointers: 3 lib-audio-io.dll + 0xf506 rbp = 0x431bde82d7b634db rsp = 0x0000000004fbfad0 rip = 0x000007fee9a2f506 Found by: stack scanning Stack contents: 0000000004fbfad0 00 c4 04 24 ee 07 00 00 00 00 00 00 00 00 00 00 .Ä.$î........... 0000000004fbfae0 40 15 be 02 00 00 00 00 03 00 00 00 00 00 00 00 @.¾............. 0000000004fbfaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfb10 60 49 99 03 00 00 00 00 00 00 00 00 00 00 00 00 `I.............. 0000000004fbfb20 f0 82 a4 03 00 00 00 00 7f 6f a2 e9 fe 07 00 00 ð?¤......o¢éþ... Possible instruction pointers: 4 lib-audio-io.dll + 0x6f7f rbp = 0x431bde82d7b634db rsp = 0x0000000004fbfb30 rip = 0x000007fee9a26f7f Found by: stack scanning Stack contents: 0000000004fbfb30 80 5a 9d 24 ee 07 00 00 a0 17 be 02 00 00 00 00 .Z.$î... .¾..... 0000000004fbfb40 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfb50 00 00 00 00 00 00 00 00 a0 f4 56 eb fe 07 00 00 ........ ôVëþ... Possible instruction pointers: 5 ucrtbase.DLL + 0x1f4a0 rbp = 0x431bde82d7b634db rsp = 0x0000000004fbfb60 rip = 0x000007feeb56f4a0 Found by: stack scanning Stack contents: 0000000004fbfb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfb80 00 00 00 00 00 00 00 00 2d 65 1b 77 00 00 00 00 ........-e.w.... Possible instruction pointers: 6 kernel32.dll + 0x1652d rbp = 0x431bde82d7b634db rsp = 0x0000000004fbfb90 rip = 0x00000000771b652d Found by: stack scanning Stack contents: 0000000004fbfb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000004fbfbb0 00 00 00 00 00 00 00 00 21 c5 3e 77 00 00 00 00 ........!Å>w.... Possible instruction pointers: 7 ntdll.dll + 0x2c521 rbp = 0x431bde82d7b634db rsp = 0x0000000004fbfbc0 rip = 0x00000000773ec521 Found by: stack scanning Thread 4 0 ntdll.dll + 0x518ca rax = 0x000007fefabbbae8 rdx = 0x0000000000000000 rcx = 0xd904c5169e030000 rbx = 0x000000000597fa00 rsi = 0x0000000000000000 rdi = 0x0000000000000002 rbp = 0x0000000000000002 rsp = 0x000000000597f8c8 r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x000000000597f600 r12 = 0x0000000000000000 r13 = 0x000000000597f970 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00000000774118ca Found by: given as instruction pointer in context Stack contents: 000000000597f8c8 20 14 3e fd fe 07 00 00 .>ýþ... Possible instruction pointers: 1 KERNELBASE.dll + 0x1420 rax = 0x000007fefabbbae8 rdx = 0x0000000000000000 rcx = 0xd904c5169e030000 rbx = 0x000000000597fa00 rsi = 0x0000000000000000 rdi = 0x0000000000000002 rbp = 0x0000000000000002 rsp = 0x000000000597f8d0 r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x000000000597f600 r12 = 0x0000000000000000 r13 = 0x000000000597f970 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x000007fefd3e1420 Found by: simulating a return from leaf function Stack contents: 000000000597f8d0 33 66 99 00 33 66 cc 00 33 66 ff 00 33 99 00 00 3f..3fÌ.3fÿ.3... 000000000597f8e0 33 99 33 00 33 99 66 00 33 99 99 00 33 99 cc 00 3.3.3.f.3...3.Ì. 000000000597f8f0 00 00 00 00 00 00 00 00 33 cc 33 00 33 cc 66 00 ........3Ì3.3Ìf. 000000000597f900 33 cc 99 00 33 cc cc 00 70 f9 97 05 00 00 00 00 3Ì..3ÌÌ.pù?..... 000000000597f910 02 00 00 00 33 ff 66 00 33 ff 99 00 33 ff cc 00 ....3ÿf.3ÿ..3ÿÌ. 000000000597f920 48 00 00 00 00 00 00 00 01 00 00 00 66 00 66 00 H...........f.f. 000000000597f930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597f940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597f950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597f960 00 00 00 00 00 00 00 00 66 66 ff 00 66 99 00 00 ........ffÿ.f... 000000000597f970 50 03 00 00 00 00 00 00 54 03 00 00 00 00 00 00 P.......T....... 000000000597f980 66 99 ff 00 66 cc 00 00 66 cc 33 00 66 cc 66 00 f.ÿ.fÌ..fÌ3.fÌf. 000000000597f990 66 cc 99 00 66 cc cc 00 66 cc ff 00 66 ff 00 00 fÌ..fÌÌ.fÌÿ.fÿ.. 000000000597f9a0 66 ff 33 00 66 ff 66 00 66 ff 99 00 66 ff cc 00 fÿ3.fÿf.fÿ..fÿÌ. 000000000597f9b0 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 ÿÿÿÿ............ 000000000597f9c0 ff ff ff ff 00 00 00 00 53 2d 1c 77 00 00 00 00 ÿÿÿÿ....S-.w.... Possible instruction pointers: 2 kernel32.dll + 0x22d53 rsp = 0x000000000597f9d0 rip = 0x00000000771c2d53 Found by: stack scanning Stack contents: 000000000597f9d0 10 fa 97 05 00 00 00 00 00 fa 97 05 00 00 00 00 .ú?......ú?..... 000000000597f9e0 00 00 00 00 00 00 00 00 99 66 33 00 99 66 66 00 .........f3..ff. 000000000597f9f0 00 00 00 00 99 66 cc 00 99 66 ff 00 99 99 00 00 .....fÌ..fÿ..... 000000000597fa00 50 03 00 00 00 00 00 00 54 03 00 00 00 00 00 00 P.......T....... 000000000597fa10 99 99 ff 00 99 cc 00 00 99 cc 33 00 99 cc 66 00 ..ÿ..Ì...Ì3..Ìf. 000000000597fa20 99 cc 99 00 99 cc cc 00 99 cc ff 00 99 ff 00 00 .Ì...ÌÌ..Ìÿ..ÿ.. 000000000597fa30 99 ff 33 00 99 ff 66 00 99 ff 99 00 99 ff cc 00 .ÿ3..ÿf..ÿ...ÿÌ. 000000000597fa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fa50 f8 fb 97 05 00 00 00 00 7d 8f 2d 77 00 00 00 00 øû?.....}.-w.... Possible instruction pointers: 3 USER32.dll + 0x18f7d rsp = 0x000000000597fa60 rip = 0x00000000772d8f7d Found by: stack scanning Stack contents: 000000000597fa60 90 fa 97 05 00 00 00 00 ff ff ff ff 00 00 00 00 .ú?.....ÿÿÿÿ.... 000000000597fa70 01 00 00 00 00 00 00 00 54 03 00 00 00 00 00 00 ........T....... 000000000597fa80 00 00 00 00 cc 66 cc 00 cc 66 ff 00 cc 99 00 00 ....ÌfÌ.Ìfÿ.Ì... 000000000597fa90 50 03 00 00 00 00 00 00 54 03 00 00 00 00 00 00 P.......T....... 000000000597faa0 cc 99 ff 00 cc cc 00 00 cc cc 33 00 cc cc 66 00 Ì.ÿ.ÌÌ..ÌÌ3.ÌÌf. 000000000597fab0 cc cc 99 00 cc cc cc 00 cc cc ff 00 cc ff 00 00 ÌÌ..ÌÌÌ.ÌÌÿ.Ìÿ.. 000000000597fac0 cc ff 33 00 cc ff 66 00 cc ff 99 00 cc ff cc 00 Ìÿ3.Ìÿf.Ìÿ..ÌÿÌ. 000000000597fad0 cc ff ff 00 ff 00 00 00 ff 00 33 00 ff 00 66 00 Ìÿÿ.ÿ...ÿ.3.ÿ.f. 000000000597fae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597faf0 00 00 00 00 00 00 00 00 b2 62 2d 77 00 00 00 00 ........²b-w.... Possible instruction pointers: 4 USER32.dll + 0x162b2 rsp = 0x000000000597fb00 rip = 0x00000000772d62b2 Found by: stack scanning Stack contents: 000000000597fb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fb10 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 000000000597fb20 00 00 00 00 ff 99 66 00 ff 99 99 00 ff 99 cc 00 ....ÿ.f.ÿ...ÿ.Ì. 000000000597fb30 ff 99 ff 00 ff cc 00 00 e0 62 2d 77 00 00 00 00 ÿ.ÿ.ÿÌ..àb-w.... Possible instruction pointers: 5 USER32.dll + 0x162e0 rsp = 0x000000000597fb40 rip = 0x00000000772d62e0 Found by: stack scanning Stack contents: 000000000597fb40 ff cc 99 00 ff cc cc 00 ff cc ff 00 ff ff 00 00 ÿÌ..ÿÌÌ.ÿÌÿ.ÿÿ.. 000000000597fb50 ff ff 33 00 ff ff 66 00 ff ff 99 00 ff ff cc 00 ÿÿ3.ÿÿf.ÿÿ..ÿÿÌ. 000000000597fb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fb70 01 00 00 00 00 00 00 00 6c 2c c2 fa fe 07 00 00 ........l,Âúþ... Possible instruction pointers: 6 gdiplus.dll + 0x72c6c rsp = 0x000000000597fb80 rip = 0x000007fefac22c6c Found by: stack scanning Stack contents: 000000000597fb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fba0 ff 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ÿ............... 000000000597fbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fbe0 00 00 00 00 00 00 00 00 d0 2a c2 fa fe 07 00 00 ........Ð*Âúþ... Possible instruction pointers: 7 gdiplus.dll + 0x72ad0 rsp = 0x000000000597fbf0 rip = 0x000007fefac22ad0 Found by: stack scanning Stack contents: 000000000597fbf0 80 41 63 05 00 00 00 00 50 03 00 00 00 00 00 00 .Ac.....P....... 000000000597fc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fc10 00 00 00 00 00 00 00 00 2d 65 1b 77 00 00 00 00 ........-e.w.... Possible instruction pointers: 8 kernel32.dll + 0x1652d rsp = 0x000000000597fc20 rip = 0x00000000771b652d Found by: stack scanning Stack contents: 000000000597fc20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000597fc40 00 00 00 00 00 00 00 00 21 c5 3e 77 00 00 00 00 ........!Å>w.... Possible instruction pointers: 9 ntdll.dll + 0x2c521 rsp = 0x000000000597fc50 rip = 0x00000000773ec521 Found by: stack scanning Thread 5 0 ntdll.dll + 0x52c0a rax = 0x0000000000000000 rdx = 0x0000000000000000 rcx = 0x0000000003cb50b0 rbx = 0x0000000000000000 rsi = 0x0000000002237ce8 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x00000000066af0b8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000002237c98 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000002237d28 rip = 0x0000000077412c0a Found by: given as instruction pointer in context Stack contents: 00000000066af0b8 1d 64 48 77 00 00 00 00 .dHw.... Possible instruction pointers: 1 ntdll.dll + 0xc641d rax = 0x0000000000000000 rdx = 0x0000000000000000 rcx = 0x0000000003cb50b0 rbx = 0x0000000000000000 rsi = 0x0000000002237ce8 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x00000000066af0c0 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000002237c98 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000002237d28 rip = 0x000000007748641d Found by: simulating a return from leaf function Stack contents: 00000000066af0c0 00 00 00 00 00 00 00 00 13 2e eb e8 fe 07 00 00 ..........ëèþ... Possible instruction pointers: 2 sqlite.dll + 0x42e13 rsp = 0x00000000066af0d0 rip = 0x000007fee8eb2e13 Found by: stack scanning Stack contents: 00000000066af0d0 e8 7c 23 02 00 00 00 00 00 00 00 00 00 00 00 00 è|#............. 00000000066af0e0 00 00 00 00 00 00 00 00 e0 f0 6a 06 00 00 00 00 ........àðj..... 00000000066af0f0 00 00 00 00 00 00 00 00 a6 30 1c 77 00 00 00 00 ........¦0.w.... Possible instruction pointers: 3 kernel32.dll + 0x230a6 rsp = 0x00000000066af100 rip = 0x00000000771c30a6 Found by: stack scanning Stack contents: 00000000066af100 e8 7c 23 02 00 00 00 00 43 60 eb e8 fe 07 00 00 è|#.....C`ëèþ... Possible instruction pointers: 4 sqlite.dll + 0x46043 rsp = 0x00000000066af110 rip = 0x000007fee8eb6043 Found by: stack scanning Stack contents: 00000000066af110 d8 7c 23 02 00 00 00 00 60 7c 23 02 00 00 00 00 Ø|#.....`|#..... 00000000066af120 29 7d 23 02 00 00 00 00 08 b2 1e 77 00 00 00 00 )}#......².w.... Possible instruction pointers: 5 kernel32.dll + 0x4b208 rsp = 0x00000000066af130 rip = 0x00000000771eb208 Found by: stack scanning Stack contents: 00000000066af130 d8 7c 23 02 00 00 00 00 a0 f2 6a 06 00 00 00 00 Ø|#..... òj..... 00000000066af140 29 7d 23 02 00 00 00 00 bc 28 23 ec fe 07 00 00 )}#.....¼(#ìþ... Possible instruction pointers: 6 MSVCP140.dll + 0x128bc rsp = 0x00000000066af150 rip = 0x000007feec2328bc Found by: stack scanning Stack contents: 00000000066af150 00 00 00 00 00 00 00 00 00 00 00 00 fe 07 00 00 ............þ... 00000000066af160 d8 7c 23 02 00 00 00 00 c5 22 23 ec fe 07 00 00 Ø|#.....Å"#ìþ... Possible instruction pointers: 7 MSVCP140.dll + 0x122c5 rsp = 0x00000000066af170 rip = 0x000007feec2322c5 Found by: stack scanning Stack contents: 00000000066af170 00 00 00 00 00 00 00 00 70 ca cf 03 00 00 00 00 ........pÊÏ..... 00000000066af180 1d b4 20 c3 60 7e 00 00 93 16 57 fd fe 07 00 00 .´ Ã`~..?.Wýþ... Possible instruction pointers: 8 CRYPT32.dll + 0x1693 rsp = 0x00000000066af190 rip = 0x000007fefd571693 Found by: stack scanning Stack contents: 00000000066af190 90 7c 23 02 00 00 00 00 f3 9a f8 e8 fe 07 00 00 .|#.....ó?øèþ... Possible instruction pointers: 9 lib-project-file-io.dll + 0x9af3 rsp = 0x00000000066af1a0 rip = 0x000007fee8f89af3 Found by: stack scanning Stack contents: 00000000066af1a0 29 7d 23 02 00 00 00 00 29 7d 23 02 00 00 00 00 )}#.....)}#..... 00000000066af1b0 a0 f2 6a 06 00 00 00 00 00 00 00 00 00 00 00 00  òj............. 00000000066af1c0 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 ................ 00000000066af1d0 00 00 57 fd fe 07 00 00 00 00 00 00 00 00 00 00 ..Wýþ........... 00000000066af1e0 00 00 57 fd fe 07 00 00 00 00 00 00 00 00 00 00 ..Wýþ........... 00000000066af1f0 60 7c 23 02 00 00 00 00 9f 10 57 fd fe 07 00 00 `|#.....?.Wýþ... Possible instruction pointers: 10 CRYPT32.dll + 0x109f rsp = 0x00000000066af200 rip = 0x000007fefd57109f Found by: stack scanning Stack contents: 00000000066af200 f8 20 64 fd fe 07 00 00 ø dýþ... Possible instruction pointers: 11 CRYPT32.dll + 0xd20f8 rsp = 0x00000000066af208 rip = 0x000007fefd6420f8 Found by: stack scanning Stack contents: 00000000066af208 90 34 9f 03 00 00 00 00 28 7d 23 02 00 00 00 00 .4?.....(}#..... 00000000066af218 b0 50 cb 03 00 00 00 00 00 00 00 00 00 00 00 00 °PË............. 00000000066af228 04 00 00 00 00 00 00 00 02 00 3c 00 fd 05 00 00 ..........<.ý... 00000000066af238 70 ac 40 00 00 00 00 00 18 0a 40 00 00 00 00 00 p¬@.......@..... 00000000066af248 ba 5b 63 c3 04 d9 00 00 02 00 00 00 00 00 00 00 º[cÃ.Ù.......... 00000000066af258 ac 11 8a fc fe 07 00 00 ¬.?üþ... Possible instruction pointers: 12 rsaenh.dll + 0x11ac rsp = 0x00000000066af260 rip = 0x000007fefc8a11ac Found by: stack scanning Stack contents: 00000000066af260 01 00 00 00 00 00 00 00 60 26 4f 77 00 00 00 00 ........`&Ow.... Possible instruction pointers: 13 ntdll.dll + 0x132660 rsp = 0x00000000066af270 rip = 0x00000000774f2660 Found by: stack scanning Stack contents: 00000000066af270 00 a0 fd ff ff 07 00 00 02 00 00 00 00 00 00 00 . ýÿÿ........... 00000000066af280 01 00 00 00 00 00 00 00 02 11 c9 f8 fe 07 00 00 ..........Éøþ... Possible instruction pointers: 14 CSCAPI.dll + 0x1102 rsp = 0x00000000066af290 rip = 0x000007fef8c91102 Found by: stack scanning Stack contents: 00000000066af290 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af2a0 00 00 ca f8 fe 07 00 00 00 00 00 00 00 00 00 00 ..Êøþ........... 00000000066af2b0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af2c0 80 a2 41 77 00 00 00 00 .¢Aw.... Possible instruction pointers: 15 ntdll.dll + 0x5a280 rsp = 0x00000000066af2c8 rip = 0x000000007741a280 Found by: stack scanning Stack contents: 00000000066af2c8 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 ..........@..... 00000000066af2d8 00 00 00 00 00 00 00 00 39 00 00 00 00 00 00 00 ........9....... 00000000066af2e8 00 80 fa ff ff 07 00 00 80 a2 41 77 00 00 00 00 ..úÿÿ....¢Aw.... Possible instruction pointers: 16 ntdll.dll + 0x5a280 rsp = 0x00000000066af2f8 rip = 0x000000007741a280 Found by: stack scanning Stack contents: 00000000066af2f8 01 00 00 00 00 00 00 00 80 a2 41 77 00 00 00 00 .........¢Aw.... Possible instruction pointers: 17 ntdll.dll + 0x5a280 rsp = 0x00000000066af308 rip = 0x000000007741a280 Found by: stack scanning Stack contents: 00000000066af308 01 00 00 00 00 00 00 00 60 26 4f 77 00 00 00 00 ........`&Ow.... Possible instruction pointers: 18 ntdll.dll + 0x132660 rsp = 0x00000000066af318 rip = 0x00000000774f2660 Found by: stack scanning Stack contents: 00000000066af318 00 a0 fd ff ff 07 00 00 b0 07 cb 03 00 00 00 00 . ýÿÿ...°.Ë..... 00000000066af328 6e d2 8d dd fe 07 00 00 nÒ.Ýþ... Possible instruction pointers: 19 mod-wavpack.dll + 0xd26e rsp = 0x00000000066af330 rip = 0x000007fedd8dd26e Found by: stack scanning Stack contents: 00000000066af330 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 ................ 00000000066af340 00 00 00 00 00 00 00 00 b3 c6 3e 77 00 00 00 00 ........³Æ>w.... Possible instruction pointers: 20 ntdll.dll + 0x2c6b3 rsp = 0x00000000066af350 rip = 0x00000000773ec6b3 Found by: stack scanning Stack contents: 00000000066af350 57 00 00 00 00 00 00 00 d1 d9 8d dd fe 07 00 00 W.......ÑÙ.Ýþ... Possible instruction pointers: 21 mod-wavpack.dll + 0xd9d1 rsp = 0x00000000066af360 rip = 0x000007fedd8dd9d1 Found by: stack scanning Stack contents: 00000000066af360 b0 07 cb 03 00 00 00 00 00 00 00 00 00 00 00 00 °.Ë............. 00000000066af370 c0 32 40 00 00 00 00 00 01 8e 3c 77 00 00 00 00 À2@......?w.... Possible instruction pointers: 27 ntdll.dll + 0x2c622 rsp = 0x00000000066af3f0 rip = 0x00000000773ec622 Found by: stack scanning Stack contents: 00000000066af3f0 60 26 4f 77 00 00 00 00 `&Ow.... Possible instruction pointers: 28 ntdll.dll + 0x132660 rsp = 0x00000000066af3f8 rip = 0x00000000774f2660 Found by: stack scanning Stack contents: 00000000066af3f8 40 10 c9 f8 fe 07 00 00 @.Éøþ... Possible instruction pointers: 29 CSCAPI.dll + 0x1040 rsp = 0x00000000066af400 rip = 0x000007fef8c91040 Found by: stack scanning Stack contents: 00000000066af400 00 a0 fd ff ff 07 00 00 b0 ee b7 02 00 00 00 00 . ýÿÿ...°î·..... 00000000066af410 60 26 4f 77 00 00 00 00 `&Ow.... Possible instruction pointers: 30 ntdll.dll + 0x132660 rsp = 0x00000000066af418 rip = 0x00000000774f2660 Found by: stack scanning Stack contents: 00000000066af418 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00 ........H....... 00000000066af428 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af438 00 00 00 00 00 00 00 00 70 00 00 00 00 00 00 00 ........p....... 00000000066af448 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ 00000000066af458 3b e0 41 77 00 00 00 00 ;àAw.... Possible instruction pointers: 31 ntdll.dll + 0x5e03b rsp = 0x00000000066af460 rip = 0x000000007741e03b Found by: stack scanning Stack contents: 00000000066af460 58 e0 41 77 00 00 00 00 XàAw.... Possible instruction pointers: 32 ntdll.dll + 0x5e058 rsp = 0x00000000066af468 rip = 0x000000007741e058 Found by: stack scanning Stack contents: 00000000066af468 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00 ........H....... 00000000066af478 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af488 00 00 00 00 00 00 00 00 70 00 00 00 00 00 00 00 ........p....... 00000000066af498 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ 00000000066af4a8 4a c7 3e 77 00 00 00 00 JÇ>w.... Possible instruction pointers: 33 ntdll.dll + 0x2c74a rsp = 0x00000000066af4b0 rip = 0x00000000773ec74a Found by: stack scanning Stack contents: 00000000066af4b0 7b c7 3e 77 00 00 00 00 {Ç>w.... Possible instruction pointers: 34 ntdll.dll + 0x2c77b rsp = 0x00000000066af4b8 rip = 0x00000000773ec77b Found by: stack scanning Stack contents: 00000000066af4b8 00 00 00 00 00 00 00 00 40 10 c9 f8 fe 07 00 00 ........@.Éøþ... Possible instruction pointers: 35 CSCAPI.dll + 0x1040 rsp = 0x00000000066af4c8 rip = 0x000007fef8c91040 Found by: stack scanning Stack contents: 00000000066af4c8 70 d6 a7 03 00 00 00 00 00 00 3c 77 00 00 00 00 pÖ§.......w.... Possible instruction pointers: 36 ntdll.dll + 0x2c434 rsp = 0x00000000066af4f0 rip = 0x00000000773ec434 Found by: stack scanning Stack contents: 00000000066af4f0 00 a0 fd ff ff 07 00 00 00 00 00 00 00 00 00 00 . ýÿÿ........... 00000000066af500 00 80 fa ff ff 07 00 00 00 00 00 00 00 00 00 00 ..úÿÿ........... 00000000066af510 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af530 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af540 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af550 00 00 00 00 00 00 00 00 38 c3 3e 77 00 00 00 00 ........8Ã>w.... Possible instruction pointers: 37 ntdll.dll + 0x2c338 rsp = 0x00000000066af560 rip = 0x00000000773ec338 Found by: stack scanning Stack contents: 00000000066af560 b0 f5 6a 06 00 00 00 00 00 00 00 00 00 00 00 00 °õj............. 00000000066af570 00 a0 fd ff ff 07 00 00 00 00 00 00 00 00 00 00 . ýÿÿ........... 00000000066af580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af5a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af5b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af5c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af5d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af5e0 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3....... 00000000066af5f0 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+............. 00000000066af600 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af610 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af620 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af630 60 f4 56 eb fe 07 00 00 `ôVëþ... Possible instruction pointers: 38 ucrtbase.DLL + 0x1f460 rsp = 0x00000000066af638 rip = 0x000007feeb56f460 Found by: stack scanning Stack contents: 00000000066af638 c0 97 c9 03 00 00 00 00 00 00 00 00 00 00 00 00 À?É............. 00000000066af648 88 fa 6a 06 00 00 00 00 00 00 00 00 00 00 00 00 .új............. 00000000066af658 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af668 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af678 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af688 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af698 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000000066af6a8 00 c5 3e 77 00 00 00 00 .Å>w.... Possible instruction pointers: 39 ntdll.dll + 0x2c500 rsp = 0x00000000066af6b0 rip = 0x00000000773ec500 Found by: stack scanning Thread 6 0 ntdll.dll + 0x5165a rax = 0x0000000000000000 rdx = 0x000000000998d3f0 rcx = 0x000007fefe720168 rbx = 0x0000000000000000 rsi = 0x000000000000ea60 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x000000000a03f6c8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x000000000a03f6f0 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x000000007741165a Found by: given as instruction pointer in context Stack contents: 000000000a03f6c8 03 12 3e fd fe 07 00 00 ..>ýþ... Possible instruction pointers: 1 KERNELBASE.dll + 0x1203 rax = 0x0000000000000000 rdx = 0x000000000998d3f0 rcx = 0x000007fefe720168 rbx = 0x0000000000000000 rsi = 0x000000000000ea60 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x000000000a03f6d0 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x000000000a03f6f0 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x000007fefd3e1203 Found by: simulating a return from leaf function Stack contents: 000000000a03f6d0 88 f7 03 0a 00 00 00 00 00 00 00 00 00 00 00 00 .÷.............. 000000000a03f6e0 00 00 00 00 00 00 00 00 10 f6 03 0a 00 00 00 00 .........ö...... 000000000a03f6f0 00 ba 3c dc ff ff ff ff f0 f6 03 0a 00 00 00 00 .º<Üÿÿÿÿðö...... 000000000a03f700 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 000000000a03f710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f740 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f750 00 00 00 00 00 00 00 00 f0 d3 98 09 00 00 00 00 ........ðÓ. .... 000000000a03f760 00 00 00 00 00 00 00 00 d0 01 72 fe fe 07 00 00 ........Ð.rþþ... Possible instruction pointers: 2 ole32.dll + 0x101d0 rsp = 0x000000000a03f770 rip = 0x000007fefe7201d0 Found by: stack scanning Stack contents: 000000000a03f770 f0 d3 98 09 00 00 00 00 00 00 00 00 00 00 00 00 ðÓ. ............ 000000000a03f780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f790 e0 f7 03 0a 00 00 00 00 06 01 72 fe fe 07 00 00 à÷........rþþ... Possible instruction pointers: 3 ole32.dll + 0x10106 rsp = 0x000000000a03f7a0 rip = 0x000007fefe720106 Found by: stack scanning Stack contents: 000000000a03f7a0 f0 d3 98 09 00 00 00 00 3a 46 72 fe fe 07 00 00 ðÓ. ....:Frþþ... Possible instruction pointers: 4 ole32.dll + 0x1463a rsp = 0x000000000a03f7b0 rip = 0x000007fefe72463a Found by: stack scanning Stack contents: 000000000a03f7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f7d0 f0 d3 98 09 00 00 00 00 82 01 72 fe fe 07 00 00 ðÓ. ....?.rþþ... Possible instruction pointers: 5 ole32.dll + 0x10182 rsp = 0x000000000a03f7e0 rip = 0x000007fefe720182 Found by: stack scanning Stack contents: 000000000a03f7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f800 00 00 00 00 00 00 00 00 2d 65 1b 77 00 00 00 00 ........-e.w.... Possible instruction pointers: 6 kernel32.dll + 0x1652d rsp = 0x000000000a03f810 rip = 0x00000000771b652d Found by: stack scanning Stack contents: 000000000a03f810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a03f830 00 00 00 00 00 00 00 00 21 c5 3e 77 00 00 00 00 ........!Å>w.... Possible instruction pointers: 7 ntdll.dll + 0x2c521 rsp = 0x000000000a03f840 rip = 0x00000000773ec521 Found by: stack scanning Thread 7 0 USER32.dll + 0x19e6a rax = 0x00000055210cf3cc rdx = 0x0000000009b540c0 rcx = 0x0000000009b53e9e rbx = 0x0000000007d2fb40 rsi = 0x0000000000000208 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x0000000007d2fae8 r8 = 0x000000000000020f r9 = 0x000000000000000e r10 = 0x0000000000000023 r11 = 0x0000005521097cd1 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00000000772d9e6a Found by: given as instruction pointer in context Stack contents: 0000000007d2fae8 9e 9e 2d 77 00 00 00 00 ??-w.... Possible instruction pointers: 1 USER32.dll + 0x19e9e rax = 0x00000055210cf3cc rdx = 0x0000000009b540c0 rcx = 0x0000000009b53e9e rbx = 0x0000000007d2fb40 rsi = 0x0000000000000208 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x0000000007d2faf0 r8 = 0x000000000000020f r9 = 0x000000000000000e r10 = 0x0000000000000023 r11 = 0x0000005521097cd1 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00000000772d9e9e Found by: simulating a return from leaf function Stack contents: 0000000007d2faf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fb10 00 00 00 00 00 00 00 00 e8 69 8c fd fe 07 00 00 ........èi?ýþ... Possible instruction pointers: 2 SHELL32.dll + 0xa69e8 rsp = 0x0000000007d2fb20 rip = 0x000007fefd8c69e8 Found by: stack scanning Stack contents: 0000000007d2fb20 58 31 c7 fd fe 07 00 00 X1Çýþ... Possible instruction pointers: 3 SHELL32.dll + 0x453158 rsp = 0x0000000007d2fb28 rip = 0x000007fefdc73158 Found by: stack scanning Stack contents: 0000000007d2fb28 00 00 00 00 00 00 00 00 20 69 8c fd fe 07 00 00 ........ i?ýþ... Possible instruction pointers: 4 SHELL32.dll + 0xa6920 rsp = 0x0000000007d2fb38 rip = 0x000007fefd8c6920 Found by: stack scanning Stack contents: 0000000007d2fb38 08 02 00 00 00 00 00 00 20 09 02 00 00 00 00 00 ........ ...... 0000000007d2fb48 13 01 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 0000000007d2fb58 00 00 00 00 00 00 00 00 ca 25 84 00 fa 01 00 00 ........Ê%?.ú... 0000000007d2fb68 c8 01 00 00 00 00 00 00 bb 5c c4 c2 04 d9 00 00 È.......»\ÄÂ.Ù.. 0000000007d2fb78 cb 5c c4 c2 04 d9 00 00 00 00 00 00 00 00 00 00 Ë\ÄÂ.Ù.......... 0000000007d2fb88 1e c7 5b fe fe 07 00 00 .Ç[þþ... Possible instruction pointers: 5 SHLWAPI.dll + 0xc71e rsp = 0x0000000007d2fb90 rip = 0x000007fefe5bc71e Found by: stack scanning Stack contents: 0000000007d2fb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fbc0 c0 69 8c fd fe 07 00 00 Ài?ýþ... Possible instruction pointers: 6 SHELL32.dll + 0xa69c0 rsp = 0x0000000007d2fbc8 rip = 0x000007fefd8c69c0 Found by: stack scanning Stack contents: 0000000007d2fbc8 9c ad 84 fd fe 07 00 00 ?­?ýþ... Possible instruction pointers: 7 SHELL32.dll + 0x2ad9c rsp = 0x0000000007d2fbd0 rip = 0x000007fefd84ad9c Found by: stack scanning Stack contents: 0000000007d2fbd0 0c 06 00 00 00 00 00 00 80 32 2c 00 00 00 00 00 .........2,..... 0000000007d2fbe0 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fbf0 00 00 00 00 00 00 00 00 00 00 82 fd fe 07 00 00 ..........?ýþ... 0000000007d2fc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fc10 09 08 09 08 00 00 00 00 00 00 00 00 00 00 00 00 . ............. 0000000007d2fc20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fc40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fc60 f4 5d c4 c2 04 d9 00 00 00 00 00 00 00 00 00 00 ô]ÄÂ.Ù.......... 0000000007d2fc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fc80 00 00 00 00 00 00 00 00 2d 65 1b 77 00 00 00 00 ........-e.w.... Possible instruction pointers: 8 kernel32.dll + 0x1652d rsp = 0x0000000007d2fc90 rip = 0x00000000771b652d Found by: stack scanning Stack contents: 0000000007d2fc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007d2fcb0 00 00 00 00 00 00 00 00 21 c5 3e 77 00 00 00 00 ........!Å>w.... Possible instruction pointers: 9 ntdll.dll + 0x2c521 rsp = 0x0000000007d2fcc0 rip = 0x00000000773ec521 Found by: stack scanning Thread 8 0 ntdll.dll + 0x52c1a rax = 0x000000000a8cf358 rdx = 0x000007fefc4d4060 rcx = 0x000007fefc4cac7c rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x0000000002bd81b0 rbp = 0x0000000000000000 rsp = 0x000000000a8cf5c8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000009a3b650 r11 = 0x000000000a8cf5e8 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x0000000077412c1a Found by: given as instruction pointer in context Stack contents: 000000000a8cf5c8 0b fe 3d 77 00 00 00 00 .þ=w.... Possible instruction pointers: 1 ntdll.dll + 0x1fe0b rax = 0x000000000a8cf358 rdx = 0x000007fefc4d4060 rcx = 0x000007fefc4cac7c rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x0000000002bd81b0 rbp = 0x0000000000000000 rsp = 0x000000000a8cf5d0 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000009a3b650 r11 = 0x000000000a8cf5e8 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x00000000773dfe0b Found by: simulating a return from leaf function Stack contents: 000000000a8cf5d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a8cf5e0 e8 45 4c 77 00 00 00 00 èELw.... Possible instruction pointers: 2 ntdll.dll + 0x1045e8 rsp = 0x000000000a8cf5e8 rip = 0x00000000774c45e8 Found by: stack scanning Stack contents: 000000000a8cf5e8 68 b6 a3 09 00 00 00 00 00 00 00 00 00 00 00 00 h¶£ ............ 000000000a8cf5f8 00 00 00 00 00 00 00 00 01 01 01 01 00 00 00 00 ................ 000000000a8cf608 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 ................ 000000000a8cf618 01 00 00 00 00 00 00 00 b0 81 bd 02 00 00 00 00 ........°.½..... 000000000a8cf628 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a8cf638 b0 81 bd 02 00 00 00 00 00 00 05 00 00 00 00 00 °.½............. 000000000a8cf648 20 b9 a3 09 00 00 00 00 00 00 00 00 00 00 00 00 ¹£ ............ 000000000a8cf658 50 b6 a3 09 00 00 00 00 00 00 00 00 00 00 00 00 P¶£ ............ 000000000a8cf668 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a8cf678 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000a8cf688 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 ................ 000000000a8cf698 00 00 00 00 00 00 00 00 90 f9 2e 0a 00 00 00 00 .........ù...... 000000000a8cf6a8 b0 24 4f 77 00 00 00 00 °$Ow.... Possible instruction pointers: 3 ntdll.dll + 0x1324b0 rsp = 0x000000000a8cf6b0 rip = 0x00000000774f24b0 Found by: stack scanning Thread 9 0 ntdll.dll + 0x52c1a rax = 0x0000000000000000 rdx = 0x00000000022f1ca0 rcx = 0x00000000773dfbc0 rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x00000000022f1ca0 rbp = 0x0000000000000000 rsp = 0x000000000a2ef8b8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x000000000000ffff r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x0000000077412c1a Found by: given as instruction pointer in context Stack contents: 000000000a2ef8b8 0b fe 3d 77 00 00 00 00 .þ=w.... Possible instruction pointers: 1 ntdll.dll + 0x1fe0b rax = 0x0000000000000000 rdx = 0x00000000022f1ca0 rcx = 0x00000000773dfbc0 rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x00000000022f1ca0 rbp = 0x0000000000000000 rsp = 0x000000000a2ef8c0 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x000000000000ffff r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x00000000773dfe0b Found by: simulating a return from leaf function Stack contents: 000000000a2ef8c0 01 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 ................ 000000000a2ef8d0 e8 45 4c 77 00 00 00 00 èELw.... Possible instruction pointers: 2 ntdll.dll + 0x1045e8 rsp = 0x000000000a2ef8d8 rip = 0x00000000774c45e8 Found by: stack scanning Thread 10 0 ntdll.dll + 0x52c1a rax = 0x0000000000000000 rdx = 0x00000000022f3b40 rcx = 0x00000000773dfbc0 rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x00000000022f3b40 rbp = 0x0000000000000000 rsp = 0x0000000009eef688 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x0000000077412c1a Found by: given as instruction pointer in context Stack contents: 0000000009eef688 0b fe 3d 77 00 00 00 00 .þ=w.... Possible instruction pointers: 1 ntdll.dll + 0x1fe0b rax = 0x0000000000000000 rdx = 0x00000000022f3b40 rcx = 0x00000000773dfbc0 rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x00000000022f3b40 rbp = 0x0000000000000000 rsp = 0x0000000009eef690 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x00000000773dfe0b Found by: simulating a return from leaf function Stack contents: 0000000009eef690 01 3b 2f 02 00 00 00 00 00 00 00 00 00 00 00 00 .;/............. 0000000009eef6a0 e8 45 4c 77 00 00 00 00 èELw.... Possible instruction pointers: 2 ntdll.dll + 0x1045e8 rsp = 0x0000000009eef6a8 rip = 0x00000000774c45e8 Found by: stack scanning Stack contents: 0000000009eef6a8 10 46 4c 77 00 00 00 00 .FLw.... Possible instruction pointers: 3 ntdll.dll + 0x104610 rsp = 0x0000000009eef6b0 rip = 0x00000000774c4610 Found by: stack scanning Thread 11 0 ntdll.dll + 0x52c1a rax = 0x0000000000000000 rdx = 0x00000000022f1ca0 rcx = 0x00000000773dfbc0 rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x00000000022f1ca0 rbp = 0x0000000000000000 rsp = 0x0000000007b3f608 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x0000000077412c1a Found by: given as instruction pointer in context Stack contents: 0000000007b3f608 0b fe 3d 77 00 00 00 00 .þ=w.... Possible instruction pointers: 1 ntdll.dll + 0x1fe0b rax = 0x0000000000000000 rdx = 0x00000000022f1ca0 rcx = 0x00000000773dfbc0 rbx = 0x00000000774c45e8 rsi = 0x00000000774c45c0 rdi = 0x00000000022f1ca0 rbp = 0x0000000000000000 rsp = 0x0000000007b3f610 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000000000000ffff r15 = 0x00000000774c4610 rip = 0x00000000773dfe0b Found by: simulating a return from leaf function Stack contents: 0000000007b3f610 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f620 e8 45 4c 77 00 00 00 00 èELw.... Possible instruction pointers: 2 ntdll.dll + 0x1045e8 rsp = 0x0000000007b3f628 rip = 0x00000000774c45e8 Found by: stack scanning Stack contents: 0000000007b3f628 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f638 00 00 00 00 00 00 00 00 01 01 01 01 00 00 00 00 ................ 0000000007b3f648 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f658 00 00 00 00 00 00 00 00 a0 1c 2f 02 00 00 00 00 ........ ./..... 0000000007b3f668 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f678 a0 1c 2f 02 00 00 00 00 00 00 06 00 00 00 00 00  ./............. 0000000007b3f688 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f698 c0 c6 a1 09 00 00 00 00 00 00 00 00 00 00 00 00 ÀÆ¡ ............ 0000000007b3f6a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f6b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f6c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0000000007b3f6d8 00 00 00 00 00 00 00 00 b0 24 4f 77 00 00 00 00 ........°$Ow.... Possible instruction pointers: 3 ntdll.dll + 0x1324b0 rsp = 0x0000000007b3f6e8 rip = 0x00000000774f24b0 Found by: stack scanning Loaded modules: 0x72040000 - 0x72052fff nvshext.dll 1.2.0.1 0x72060000 - 0x72065fff ksuser.dll 6.1.7600.16385 0x771a0000 - 0x772befff kernel32.dll 6.1.7601.17514 (WARNING: No symbols, kernel32.pdb, 7FBE5C47FC104C35925D71D76A8D46602) 0x772c0000 - 0x773b9fff USER32.dll 6.1.7601.17514 (WARNING: No symbols, user32.pdb, 953B04792B8A48B2883930E36FD22A6A2) 0x773c0000 - 0x77568fff ntdll.dll 6.1.7601.17514 (WARNING: No symbols, ntdll.pdb, 6192BFDB9F04442995FFCB0BE95172E12) 0x77590000 - 0x77596fff PSAPI.DLL 6.1.7600.16385 0x13f870000 - 0x1405ecfff audacity.exe 3.6.0.0 (main) (WARNING: No symbols, Audacity.pdb, FB9CD27209524B6CB813A880E99E3DC11) 0x7fedd840000 - 0x7fedd8c7fff dsound.dll 6.1.7600.16385 (WARNING: No symbols, dsound.pdb, E9E3BE7BF2D947A786C6162ECCFADAFA2) 0x7fedd8d0000 - 0x7fedd8f7fff mod-wavpack.dll 0.0.0.0 (WARNING: No symbols, mod-wavpack.pdb, F39543F0C9A04CC29958A7709B95646F1) 0x7fedd900000 - 0x7fedd937fff mod-pcm.dll 0.0.0.0 0x7fedd940000 - 0x7fedd975fff mod-opus.dll 0.0.0.0 0x7fedd980000 - 0x7fedd995fff vorbisfile.dll 0.0.0.0 0x7fedd9a0000 - 0x7fedda08fff mpg123.dll 0.0.0.0 0x7fedda10000 - 0x7feddab8fff libmp3lame.DLL 0.0.0.0 0x7feddac0000 - 0x7feddb18fff mod-mp3.dll 0.0.0.0 0x7feddb20000 - 0x7feddb7bfff mod-mp2.dll 0.0.0.0 0x7feddb80000 - 0x7feddbc4fff mod-midi-import-export.dll 0.0.0.0 0x7fee6d10000 - 0x7fee6d2ffff mod-ogg.dll 0.0.0.0 0x7fee6d30000 - 0x7fee6d4afff mod-mpg123.dll 0.0.0.0 0x7fee6d50000 - 0x7fee6d68fff mod-lof.dll 0.0.0.0 0x7fee6d70000 - 0x7fee6d98fff FLAC++.dll 0.0.0.0 0x7fee6da0000 - 0x7fee6dd4fff mod-flac.dll 0.0.0.0 (WARNING: No symbols, mod-flac.pdb, 1CB4EC43A68F4A6D84C5FBFC074D7D431) 0x7fee6de0000 - 0x7fee6e48fff lib-ffmpeg-support.dll 0.0.0.0 0x7fee6e50000 - 0x7fee6ec0fff mod-ffmpeg.dll 0.0.0.0 0x7fee6ed0000 - 0x7fee6f0cfff wavpackdll.dll 5.6.0.0 0x7fee6f10000 - 0x7fee6f20fff lib-crypto.dll 0.0.0.0 0x7fee6f30000 - 0x7fee7037fff lib-cloud-audiocom.dll 0.0.0.0 0x7fee7040000 - 0x7fee70fefff mod-cloud-audiocom.dll 0.0.0.0 0x7fee7100000 - 0x7fee7131fff mod-cl.dll 0.0.0.0 0x7fee7140000 - 0x7fee7176fff mod-aup.dll 0.0.0.0 0x7fee7180000 - 0x7fee7192fff lib-file-formats.dll 0.0.0.0 0x7fee71a0000 - 0x7fee71befff lib-tags.dll 0.0.0.0 0x7fee73e0000 - 0x7fee7464fff opus.dll 0.0.0.0 0x7fee7470000 - 0x7fee74cefff FLAC.dll 0.0.0.0 0x7fee74d0000 - 0x7fee74e3fff ogg.dll 0.0.0.0 0x7fee74f0000 - 0x7fee75d9fff vorbis.dll 0.0.0.0 0x7fee75e0000 - 0x7fee768efff vorbisenc.dll 0.0.0.0 0x7fee8d50000 - 0x7fee8dfdfff sndfile.dll 1.0.31.0 0x7fee8e00000 - 0x7fee8e65fff lib-import-export.dll 0.0.0.0 (WARNING: No symbols, lib-import-export.pdb, 5134E0F92737498E9B8026F951296C501) 0x7fee8e70000 - 0x7fee8f48fff sqlite.dll 0.0.0.0 (WARNING: No symbols, sqlite.pdb, 0A224938A5E04D84883CDE300F407C6E1) 0x7fee8f50000 - 0x7fee8f74fff lib-sqlite-helpers.dll 0.0.0.0 0x7fee8f80000 - 0x7fee9000fff lib-project-file-io.dll 0.0.0.0 (WARNING: No symbols, lib-project-file-io.pdb, 6F20337F896F41EB8C3BBDF0AB735B891) 0x7fee9010000 - 0x7fee90f6fff wxmsw313u_aui_vc_x64_custom.dll 3.1.3.0 0x7fee9100000 - 0x7fee911efff wxbase313u_xml_vc_x64_custom.dll 3.1.3.0 0x7fee9120000 - 0x7fee915ffff wxmsw313u_qa_vc_x64_custom.dll 3.1.3.0 0x7fee9160000 - 0x7fee91b9fff lib-crashpad-configurer.dll 0.0.0.0 0x7fee91c0000 - 0x7fee924efff lib-vst3.dll 0.0.0.0 0x7fee9250000 - 0x7fee9276fff lib-ladspa.dll 0.0.0.0 0x7fee9280000 - 0x7fee9306fff lib-lv2.dll 0.0.0.0 0x7fee9310000 - 0x7fee935ffff lib-effects.dll 0.0.0.0 0x7fee9360000 - 0x7fee93a6fff lib-vst.dll 0.0.0.0 0x7fee93b0000 - 0x7fee93f6fff lib-dynamic-range-processor.dll 0.0.0.0 0x7fee9400000 - 0x7fee9422fff lib-preference-pages.dll 0.0.0.0 0x7fee9430000 - 0x7fee947cfff lib-music-information-retrieval.dll 0.0.0.0 0x7fee9480000 - 0x7fee94c1fff lib-time-and-pitch.dll 0.0.0.0 0x7fee94d0000 - 0x7fee94f4fff lib-stretching-sequence.dll 0.0.0.0 0x7fee9660000 - 0x7fee968afff lib-fft.dll 0.0.0.0 0x7fee96d0000 - 0x7fee96e9fff lib-url-schemes.dll 0.0.0.0 0x7fee96f0000 - 0x7fee9703fff lib-sample-track.dll 0.0.0.0 0x7fee9710000 - 0x7fee97c5fff lib-wave-track.dll 0.0.0.0 0x7fee97d0000 - 0x7fee97e6fff lib-graphics.dll 0.0.0.0 0x7fee97f0000 - 0x7fee9815fff lib-wave-track-paint.dll 0.0.0.0 0x7fee9820000 - 0x7fee9868fff lib-numeric-formats.dll 0.0.0.0 0x7fee9870000 - 0x7fee98a3fff lib-snapping.dll 0.0.0.0 0x7fee98b0000 - 0x7fee98dbfff lib-time-frequency-selection.dll 0.0.0.0 0x7fee98e0000 - 0x7fee990dfff lib-track-selection.dll 0.0.0.0 0x7fee9910000 - 0x7fee9933fff lib-viewport.dll 0.0.0.0 0x7fee9940000 - 0x7fee9953fff portmidi.dll 0.0.0.0 0x7fee9960000 - 0x7fee997afff lib-playable-track.dll 0.0.0.0 0x7fee9980000 - 0x7fee99defff lib-module-manager.dll 0.0.0.0 0x7fee99e0000 - 0x7fee9a18fff lib-realtime-effects.dll 0.0.0.0 0x7fee9a20000 - 0x7fee9a77fff lib-audio-io.dll 0.0.0.0 (WARNING: No symbols, lib-audio-io.pdb, 33D819876868414D9975C37924CD2D2B1) 0x7fee9a80000 - 0x7feea51efff wxmsw313u_core_vc_x64_custom.dll 3.1.3.0 0x7feea520000 - 0x7feea8a9fff wxbase313u_vc_x64_custom.dll 3.1.3.0 0x7feea8f0000 - 0x7feea8fefff lib-export-ui.dll 0.0.0.0 0x7feea900000 - 0x7feea914fff lib-ipc.dll 0.0.0.0 0x7feea920000 - 0x7feea978fff lib-note-track.dll 0.0.0.0 0x7feea980000 - 0x7feea9f2fff lib-menus.dll 0.0.0.0 0x7feeaa00000 - 0x7feeaa14fff lib-transactions.dll 0.0.0.0 0x7feeaa20000 - 0x7feeaa40fff lib-project-history.dll 0.0.0.0 0x7feeaa50000 - 0x7feeaa67fff lib-channel.dll 0.0.0.0 0x7feeaa70000 - 0x7feeaabbfff lib-track.dll 0.0.0.0 0x7feeaac0000 - 0x7feeaafafff portaudio_x64.dll 0.0.0.0 0x7feeab00000 - 0x7feeab3efff lib-audio-devices.dll 0.0.0.0 0x7feeab40000 - 0x7feeab63fff lib-registries.dll 0.0.0.0 0x7feeab70000 - 0x7feeab9efff lib-project.dll 0.0.0.0 0x7feeaba0000 - 0x7feeabbcfff lib-project-rate.dll 0.0.0.0 0x7feeabc0000 - 0x7feeac50fff lib-math.dll 0.0.0.0 0x7feeac80000 - 0x7feeacb6fff libexpat.dll 2.5.0.0 0x7feeacc0000 - 0x7feeacedfff lib-xml.dll 0.0.0.0 0x7feeacf0000 - 0x7feead03fff lib-audio-graph.dll 0.0.0.0 0x7feead10000 - 0x7feeadc9fff wxmsw313u_html_vc_x64_custom.dll 3.1.3.0 0x7feeadd0000 - 0x7feeaea6fff SearchFolder.dll 6.1.7601.17514 0x7feeafd0000 - 0x7feeafd2fff api-ms-win-crt-conio-l1-1-0.dll 10.0.14393.2990 0x7feeafe0000 - 0x7feeb012fff lib-mixer.dll 0.0.0.0 (WARNING: No symbols, lib-mixer.pdb, F28A5EDB36A34B5391C59331AB7369091) 0x7feeb020000 - 0x7feeb03dfff lib-time-track.dll 0.0.0.0 0x7feeb040000 - 0x7feeb050fff lib-uuid.dll 0.0.0.0 0x7feeb060000 - 0x7feeb0fefff libcurl.dll 7.82.0.0 0x7feeb100000 - 0x7feeb110fff lib-concurrency.dll 0.0.0.0 0x7feeb120000 - 0x7feeb145fff lib-string-utils.dll 0.0.0.0 0x7feeb150000 - 0x7feeb1cefff lib-wx-wrappers.dll 0.0.0.0 0x7feeb1d0000 - 0x7feeb405fff lib-theme-resources.dll 0.0.0.0 0x7feeb410000 - 0x7feeb451fff lib-network-manager.dll 0.0.0.0 0x7feeb460000 - 0x7feeb4cafff lib-shuttlegui.dll 0.0.0.0 0x7feeb4d0000 - 0x7feeb549fff lib-wx-init.dll 0.0.0.0 0x7feeb550000 - 0x7feeb643fff ucrtbase.DLL 10.0.14393.2990 (WARNING: No symbols, ucrtbase.pdb, C3DD2C823498457082399DB3EC47FBAC1) 0x7feeb950000 - 0x7feeba01fff nvShell.dll 6.14.10.14136 0x7feec090000 - 0x7feec0d3fff lib-sentry-reporting.dll 0.0.0.0 0x7feec100000 - 0x7feec144fff libpng16.dll 0.0.0.0 0x7feec150000 - 0x7feec212fff jpeg8.dll 8.2.2.0 0x7feec220000 - 0x7feec2acfff MSVCP140.dll 14.40.33810.0 (WARNING: No symbols, msvcp140.amd64.pdb, 2E665742B062653BE49F75A3068855241) 0x7feec560000 - 0x7feec566fff MSVCP140_CODECVT_IDS.dll 14.40.33810.0 0x7feec570000 - 0x7feec58ffff lib-components.dll 0.0.0.0 0x7feec590000 - 0x7feec5ccfff lib-preferences.dll 0.0.0.0 0x7feec8c0000 - 0x7feec8d6fff lib-command-parameters.dll 0.0.0.0 0x7feec900000 - 0x7feec90ffff lib-screen-geometry.dll 0.0.0.0 0x7feec910000 - 0x7feec985fff lib-theme.dll 0.0.0.0 0x7feec990000 - 0x7feec9b1fff lib-utility.dll 0.0.0.0 0x7feec9c0000 - 0x7feec9c2fff api-ms-win-crt-utility-l1-1-0.dll 10.0.14393.2990 0x7feec9d0000 - 0x7feec9d4fff api-ms-win-crt-math-l1-1-0.dll 10.0.14393.2990 0x7feec9e0000 - 0x7feec9e2fff api-ms-win-crt-environment-l1-1-0.dll 10.0.14393.2990 0x7feec9f0000 - 0x7feec9f2fff api-ms-win-crt-time-l1-1-0.dll 10.0.14393.2990 0x7feeca00000 - 0x7feeca02fff api-ms-win-crt-locale-l1-1-0.dll 10.0.14393.2990 0x7feeca10000 - 0x7feeca6cfff zipfldr.dll 6.1.7601.17514 0x7feeca70000 - 0x7feeca81fff browcli.dll 6.1.7601.17514 0x7feeccd0000 - 0x7feeccd8fff WSOCK32.dll 6.1.7600.16385 0x7feecce0000 - 0x7feecce2fff api-ms-win-crt-filesystem-l1-1-0.dll 10.0.14393.2990 0x7feeccf0000 - 0x7feeccf3fff api-ms-win-crt-convert-l1-1-0.dll 10.0.14393.2990 0x7feecd00000 - 0x7feecd0bfff VCRUNTIME140_1.dll 14.40.33810.0 (WARNING: No symbols, vcruntime140_1.amd64.pdb, 613A2444FAE1C420D3AFBFF22ABFD5901) 0x7feecd10000 - 0x7feecd13fff api-ms-win-crt-string-l1-1-0.dll 10.0.14393.2990 0x7feed2b0000 - 0x7feed2b3fff api-ms-win-crt-stdio-l1-1-0.dll 10.0.14393.2990 0x7feed2c0000 - 0x7feed2e2fff zlib1.dll 1.2.13.0 0x7feed2f0000 - 0x7feed2f2fff api-ms-win-crt-heap-l1-1-0.dll 10.0.14393.2990 0x7feed300000 - 0x7feed31dfff VCRUNTIME140.dll 14.40.33810.0 0x7feed370000 - 0x7feed39afff lib-files.dll 0.0.0.0 0x7feed3e0000 - 0x7feed3e2fff api-ms-win-core-file-l1-2-0.dll 10.0.14393.2990 0x7feed3f0000 - 0x7feed3f2fff api-ms-win-core-processthreads-l1-1-1.dll 10.0.14393.2990 0x7feed400000 - 0x7feed425fff lib-strings.dll 0.0.0.0 0x7feed4c0000 - 0x7feed4d5fff lib-exceptions.dll 0.0.0.0 0x7feed560000 - 0x7feed585fff cabview.dll 6.1.7601.17514 0x7feed590000 - 0x7feed5a4fff lib-basic-ui.dll 0.0.0.0 0x7feed7d0000 - 0x7feed7e7fff MSACM32.dll 6.1.7600.16385 0x7feed7f0000 - 0x7feed82afff wdmaud.drv 6.1.7601.17514 0x7feed830000 - 0x7feed842fff dfscli.dll 6.1.7600.16385 0x7feed890000 - 0x7feed902fff ieproxy.dll 8.0.7601.17514 0x7feedd70000 - 0x7feedd72fff api-ms-win-core-file-l2-1-0.dll 10.0.14393.2990 0x7feee770000 - 0x7feee772fff api-ms-win-core-localization-l1-2-0.dll 10.0.14393.2990 0x7feee890000 - 0x7feee898fff midimap.dll 6.1.7600.16385 0x7feeed20000 - 0x7feeed29fff msacm32.drv 6.1.7600.16385 0x7feeed30000 - 0x7feeed3afff fdWNet.dll 6.1.7600.16385 0x7feeed40000 - 0x7feeed61fff wcnapi.dll 6.1.7600.16385 0x7feeed70000 - 0x7feeed8cfff fdwcn.dll 6.1.7600.16385 0x7feeed90000 - 0x7feeeda6fff fdproxy.dll 6.1.7601.17514 0x7feeedb0000 - 0x7feeee2afff StructuredQuery.dll 7.0.7601.17514 0x7feeee30000 - 0x7feeee3cfff dtsh.dll 6.1.7600.16385 0x7feeee60000 - 0x7feeee62fff api-ms-win-core-timezone-l1-1-0.dll 10.0.14393.2990 0x7feeee90000 - 0x7feeeeaefff thumbcache.dll 6.1.7601.17514 0x7feeef00000 - 0x7feeef1bfff davclnt.dll 6.1.7601.17514 0x7feef200000 - 0x7feefdb6fff ieframe.DLL 8.0.7601.17514 0x7feefe80000 - 0x7feefe9cfff mssprxy.dll 7.0.7600.16385 0x7fef0850000 - 0x7fef089efff AUDIOSES.DLL 6.1.7601.17514 0x7fef2840000 - 0x7fef29dbfff NetworkExplorer.dll 6.1.7601.17514 0x7fef42a0000 - 0x7fef42a3fff api-ms-win-crt-runtime-l1-1-0.dll 10.0.14393.2990 0x7fef72f0000 - 0x7fef7323fff SHDOCVW.dll 6.1.7601.17514 0x7fef7330000 - 0x7fef736afff msls31.dll 3.10.349.0 0x7fef7770000 - 0x7fef7772fff api-ms-win-core-synch-l1-2-0.dll 10.0.14393.2990 0x7fef7d20000 - 0x7fef7d27fff rasadhlp.dll 6.1.7600.16385 0x7fef8060000 - 0x7fef814dfff actxprxy.dll 6.1.7601.17514 0x7fef8430000 - 0x7fef8462fff FunDisc.dll 6.1.7600.16385 0x7fef8590000 - 0x7fef859bfff npmproxy.dll 6.1.7600.16385 0x7fef8c00000 - 0x7fef8c07fff IconCodecService.dll 6.1.7600.16385 0x7fef8c10000 - 0x7fef8c8ffff ntshrui.dll 6.1.7601.17514 0x7fef8c90000 - 0x7fef8c9efff CSCAPI.dll 6.1.7601.17514 (WARNING: No symbols, cscapi.pdb, 9A2B5950695A4290A2CFA1553C35A6A42) 0x7fef8d30000 - 0x7fef8d64fff EhStorShell.dll 6.1.7600.16385 0x7fef8d70000 - 0x7fef8f39fff explorerframe.dll 6.1.7601.17514 0x7fef9260000 - 0x7fef9277fff MPR.dll 6.1.7600.16385 0x7fef9290000 - 0x7fef929bfff LINKINFO.dll 6.1.7600.16385 0x7fef93a0000 - 0x7fef9410fff WINSPOOL.DRV 6.1.7601.17514 0x7fef9f60000 - 0x7fef9f66fff MSIMG32.dll 6.1.7600.16385 0x7fef9f70000 - 0x7fef9faafff WINMM.dll 6.1.7600.16385 0x7fefa530000 - 0x7fefa583fff OLEACC.dll 7.0.0.0 0x7fefa6f0000 - 0x7fefa703fff samcli.dll 6.1.7601.17514 0x7fefa710000 - 0x7fefa724fff wkscli.dll 6.1.7601.17514 0x7fefa730000 - 0x7fefa73bfff netutils.dll 6.1.7601.17514 0x7fefa880000 - 0x7fefa9a9fff WindowsCodecs.dll 6.1.7601.17514 0x7fefa9b0000 - 0x7fefa9e4fff xmllite.dll 1.3.1000.0 0x7fefa9f0000 - 0x7fefaa07fff dwmapi.dll 6.1.7600.16385 0x7fefaa60000 - 0x7fefaaa2fff DUser.dll 6.1.7600.16385 0x7fefaab0000 - 0x7fefaba1fff DUI70.dll 6.1.7600.16385 0x7fefabb0000 - 0x7fefadc4fff gdiplus.dll 6.1.7601.17514 (WARNING: No symbols, MicrosoftWindowsGdiPlus-1.1.7601.17514-gdiplus.pdb, E92C00158AFD47278CCBBB30011E7D381) 0x7fefadd0000 - 0x7fefae25fff UxTheme.dll 6.1.7600.16385 0x7fefae30000 - 0x7fefae4cfff SAMLIB.dll 6.1.7600.16385 0x7fefae50000 - 0x7fefae71fff ntlanman.dll 6.1.7601.17514 0x7fefae80000 - 0x7fefb073fff COMCTL32.dll 6.10.7601.17514 0x7fefb080000 - 0x7fefb271fff msxml6.dll 6.30.7601.17514 0x7fefb870000 - 0x7fefb887fff dhcpcsvc.DLL 6.1.7600.16385 0x7fefb890000 - 0x7fefb8a0fff dhcpcsvc6.DLL 6.1.7600.16385 0x7fefb960000 - 0x7fefb96afff WINNSI.DLL 6.1.7600.16385 0x7fefb980000 - 0x7fefb9a6fff IPHLPAPI.DLL 6.1.7601.17514 0x7fefbab0000 - 0x7fefbabafff slc.dll 6.1.7600.16385 0x7fefbb00000 - 0x7fefbb18fff ATL.DLL 3.5.2284.0 0x7fefbce0000 - 0x7fefbd0cfff ntmarta.dll 6.1.7600.16385 0x7fefc000000 - 0x7fefc009fff DAVHLPR.dll 6.1.7600.16385 0x7fefc010000 - 0x7fefc019fff drprov.dll 6.1.7600.16385 0x7fefc020000 - 0x7fefc028fff AVRT.dll 6.1.7600.16385 0x7fefc030000 - 0x7fefc15bfff PROPSYS.dll 7.0.7601.17514 0x7fefc160000 - 0x7fefc1aafff MMDevAPI.DLL 6.1.7600.16385 0x7fefc1b0000 - 0x7fefc1dbfff POWRPROF.dll 6.1.7600.16385 (WARNING: No symbols, powrprof.pdb, C39D0C69BF9C4D30B1579F2C269CDD732) 0x7fefc430000 - 0x7fefc4eafff FirewallAPI.dll 6.1.7600.16385 0x7fefc5d0000 - 0x7fefc5dbfff VERSION.dll 6.1.7600.16385 0x7fefc8a0000 - 0x7fefc8e6fff rsaenh.dll 6.1.7600.16385 (WARNING: No symbols, rsaenh.pdb, 2BFA66BBF64F4B12B0B3E7A78AE54C2D2) 0x7fefc9c0000 - 0x7fefca1afff DNSAPI.dll 6.1.7601.17514 0x7fefcb40000 - 0x7fefcb94fff mswsock.dll 6.1.7601.17514 0x7fefcba0000 - 0x7fefcbb6fff CRYPTSP.dll 6.1.7600.16385 0x7fefce40000 - 0x7fefce62fff srvcli.dll 6.1.7601.17514 0x7fefcfb0000 - 0x7fefcfbafff Secur32.dll 6.1.7601.17514 0x7fefd170000 - 0x7fefd194fff SspiCli.dll 6.1.7601.17514 0x7fefd1a0000 - 0x7fefd1f6fff apphelp.dll 6.1.7601.17514 0x7fefd200000 - 0x7fefd23cfff WINSTA.dll 6.1.7601.17514 0x7fefd240000 - 0x7fefd24efff cryptbase.dll 6.1.7600.16385 0x7fefd2f0000 - 0x7fefd303fff RpcRtRemote.dll 6.1.7601.17514 0x7fefd310000 - 0x7fefd31efff profapi.dll 6.1.7600.16385 0x7fefd3b0000 - 0x7fefd3befff MSASN1.dll 6.1.7601.17514 0x7fefd3c0000 - 0x7fefd3d9fff DEVOBJ.dll 6.1.7600.16385 0x7fefd3e0000 - 0x7fefd44afff KERNELBASE.dll 6.1.7601.17514 (WARNING: No symbols, kernelbase.pdb, FF31C2F3216C4621A7F009584AC0D68F2) 0x7fefd4f0000 - 0x7fefd525fff CFGMGR32.dll 6.1.7601.17514 0x7fefd530000 - 0x7fefd569fff WINTRUST.dll 6.1.7601.17514 0x7fefd570000 - 0x7fefd6d6fff CRYPT32.dll 6.1.7601.17514 (WARNING: No symbols, crypt32.pdb, 58E167F13C174DB581F92387E5DD05E62) 0x7fefd6e0000 - 0x7fefd746fff GDI32.dll 6.1.7601.17514 0x7fefd750000 - 0x7fefd818fff USP10.dll 1.626.7601.17514 0x7fefd820000 - 0x7fefe5a7fff SHELL32.dll 6.1.7601.17514 (WARNING: No symbols, shell32.pdb, 1E9FDDC20B504C30921B1185EBB2ED962) 0x7fefe5b0000 - 0x7fefe620fff SHLWAPI.dll 6.1.7601.17514 (WARNING: No symbols, shlwapi.pdb, 0820A0750C1A4E2597E17DEA57D049542) 0x7fefe630000 - 0x7fefe70afff ADVAPI32.dll 6.1.7600.16385 0x7fefe710000 - 0x7fefe912fff ole32.dll 6.1.7601.17514 (WARNING: No symbols, ole32.pdb, EE489189724F4D47AECCFDB5534824352) 0x7fefe920000 - 0x7fefea4cfff RPCRT4.dll 6.1.7601.17514 0x7fefea50000 - 0x7fefeca8fff iertutil.dll 8.0.7601.17514 0x7fefed50000 - 0x7fefed5dfff LPK.dll 6.1.7600.16385 0x7fefed60000 - 0x7fefed67fff NSI.dll 6.1.7600.16385 0x7fefed70000 - 0x7fefef46fff SETUPAPI.dll 6.1.7601.17514 0x7fefef50000 - 0x7fefefeefff msvcrt.dll 7.0.7600.16385 0x7fefeff0000 - 0x7feff041fff WLDAP32.dll 6.1.7601.17514 0x7feff050000 - 0x7feff1c7fff urlmon.dll 8.0.7601.17514 0x7feff1d0000 - 0x7feff1fdfff IMM32.DLL 6.1.7600.16385 0x7feff200000 - 0x7feff329fff WININET.dll 8.0.7601.17514 0x7feff330000 - 0x7feff37cfff WS2_32.dll 6.1.7601.17514 0x7feff380000 - 0x7feff418fff CLBCatQ.DLL 2001.12.8530.16385 0x7feff420000 - 0x7feff43efff sechost.dll 6.1.7600.16385 0x7feff440000 - 0x7feff548fff MSCTF.dll 6.1.7600.16385 0x7feff550000 - 0x7feff5e6fff COMDLG32.dll 6.1.7601.17514 0x7feff5f0000 - 0x7feff6c6fff OLEAUT32.dll 6.1.7601.17514 6.1.7601.17514 0x7fefd3c0000 - 0x7fefd3d9fff DEVOBJ.dll 6.1.7600.16385 0x7fefd3e0000 - 0x7fefd44afff KERNELBASE.dll 6.1.7601.17514 (WARNING: No symbols, kernelbase.pdb, FF31C2F3216C4621A7F009584AC0D68F2) 0x7fefd4f0000 - 0x7fefd525fff CFGMGR32.dll 6.1.7601.17514 0x7fefd530000 - 0x7fefd569fff WINTRUST.dll 6.1.7601.17514 0x7fefd570000 - 0x7fefd6d6fff CRYPT32.dll 6.1.7601.17514 (WARNING: No symbols, crypt32.pdb, 58E167F13C174DB581F92387E5DD05E62) 0x7fefd6e0000 - 0x7fefd746fff GDI32.dll 6.1.7601.17514 0x7fefd750000 - 0x7fefd818fff USP10.dll 1.626.7601.17514 0x7fefd820000 - 0x7fefe5a7fff SHELL32.dll 6.1.7601.17514 (WARNING: No symbols, shell32.pdb, 1E9FDDC20B504C30921B1185EBB2ED962) 0x7fefe5b0000 - 0x7fefe620fff SHLWAPI.dll 6.1.7601.17514 (WARNING: No symbols, shlwapi.pdb, 0820A0750C1A4E2597E17DEA57D049542) 0x7fefe630000 - 0x7fefe70afff ADVAPI32.dll 6.1.7600.16385 0x7fefe710000 - 0x7fefe912fff ole32.dll 6.1.7601.17514 (WARNING: No symbols, ole32.pdb, EE489189724F4D47AECCFDB5534824352) 0x7fefe920000 - 0x7fefea4cfff RPCRT4.dll 6.1.7601.17514 0x7fefea50000 - 0x7fefeca8fff iertutil.dll 8.0.7601.17514 0x7fefed50000 - 0x7fefed5dfff LPK.dll 6.1.7600.16385 0x7fefed60000 - 0x7