Operating system: Windows NT 10.0.19045 CPU: amd64 family 21 model 2 stepping 0 8 CPUs GPU: UNKNOWN Crash reason: EXCEPTION_STACK_OVERFLOW Crash address: 0x7ff9ba90f900 Process uptime: 22 seconds Thread 46 (crashed) 0 Qt6Xml.dll + 0xf900 rax = 0x00007c99b3f1aff8 rdx = 0x00000032b93fd0f0 rcx = 0x000001e83a2571b0 rbx = 0x0000000000000001 rsi = 0x000001e83a258b30 rdi = 0x0000000000000000 rbp = 0x00000032b9303d10 rsp = 0x00000032b9303c10 r8 = 0x0000000000000121 r9 = 0x0000000000000001 r10 = 0x000000000003fff7 r11 = 0x00000032b9304970 r12 = 0x0000000000000001 r13 = 0x0000000000000120 r14 = 0x0000000000000000 r15 = 0x00000032b93fd0f0 rip = 0x00007ff9ba90f900 Found by: given as instruction pointer in context Thread 0 0 win32u.dll + 0xa104 rax = 0x0000000000001486 rdx = 0x0000000000000000 rcx = 0x0000000000000000 rbx = 0x00000000000000a4 rsi = 0x0000000000000001 rdi = 0x000001e81b0b3c01 rbp = 0x00000032b633a940 rsp = 0x00000032b633a7f8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x000001e8342ce620 r11 = 0x00000032b6442800 r12 = 0x0000000000000000 r13 = 0x000001e81b0e0f40 r14 = 0x000001e81b0c9050 r15 = 0x0000000000000000 rip = 0x00007ff9d013a104 Found by: given as instruction pointer in context Stack contents: 00000032b633a7f8 fe 11 84 d1 f9 7f 00 00 ........ Possible instruction pointers: 1 user32.dll + 0x211fe rbp = 0x00000032b633a940 rsp = 0x00000032b633a800 rip = 0x00007ff9d18411fe Found by: stack scanning Stack contents: 00000032b633a800 00 00 00 00 00 00 00 00 24 21 99 69 f9 7f 00 00 ........$!.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xe2124 rbp = 0x00000032b633a940 rsp = 0x00000032b633a810 rip = 0x00007ff969992124 Found by: stack scanning Stack contents: 00000032b633a810 50 90 0c 1b e8 01 00 00 03 00 00 00 e8 01 00 00 P............... 00000032b633a820 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633a830 01 3c 0b 1b e8 01 00 00 ba e6 ad 69 f9 7f 00 00 .<.........i.... Possible instruction pointers: 3 Qt6Core.dll + 0x22e6ba rbp = 0x00000032b633a940 rsp = 0x00000032b633a840 rip = 0x00007ff969ade6ba Found by: stack scanning Stack contents: 00000032b633a840 a4 00 00 00 00 00 00 00 40 a9 33 b6 32 00 00 00 ........@.3.2... 00000032b633a850 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633a860 06 00 00 00 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 .........G...... Possible instruction pointers: 4 ntdll.dll + 0x247b1 rbp = 0x00000032b633a940 rsp = 0x00000032b633a870 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633a870 06 0b 04 00 00 00 00 00 01 04 00 00 00 00 00 00 ................ 00000032b633a880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633a890 25 ad 11 00 51 09 00 00 ea 02 00 00 00 00 00 00 %...Q........... 00000032b633a8a0 50 90 0c 1b e8 01 00 00 b1 47 15 d2 f9 7f 00 00 P........G...... Possible instruction pointers: 5 ntdll.dll + 0x247b1 rbp = 0x00000032b633a940 rsp = 0x00000032b633a8b0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633a8b0 e0 3b 0b 1b e8 01 00 00 00 00 2d 1b e8 01 00 00 .;........-..... 00000032b633a8c0 00 00 00 00 00 00 00 00 80 cc d2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 6 Qt6Core.dll + 0x47cc80 rbp = 0x00000032b633a940 rsp = 0x00000032b633a8d0 rip = 0x00007ff969d2cc80 Found by: stack scanning Stack contents: 00000032b633a8d0 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633a8e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633a8f0 00 00 00 00 00 00 00 00 13 01 00 00 00 00 00 00 ................ 00000032b633a900 c7 7b 00 00 00 00 00 00 b0 4d 2b d0 f9 7f 00 00 .{.......M+..... Possible instruction pointers: 7 msctf.dll + 0x34db0 rbp = 0x00000032b633a940 rsp = 0x00000032b633a910 rip = 0x00007ff9d02b4db0 Found by: stack scanning Stack contents: 00000032b633a910 02 00 00 00 00 00 00 00 79 14 4b bd f9 7f 00 00 ........y.K..... Possible instruction pointers: 8 DWrite.dll + 0x11479 rbp = 0x00000032b633a940 rsp = 0x00000032b633a920 rip = 0x00007ff9bd4b1479 Found by: stack scanning Stack contents: 00000032b633a920 b3 1f 00 00 32 00 00 00 70 cf a6 29 e8 01 00 00 ....2...p..).... 00000032b633a930 10 d3 a1 29 e8 01 00 00 73 6c 6e 74 00 00 00 00 ...)....slnt.... 00000032b633a940 68 d3 a1 29 e8 01 00 00 c0 1e a0 29 e8 01 00 00 h..).......).... 00000032b633a950 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633a960 68 a9 33 b6 32 00 00 00 06 0b 04 00 00 00 00 00 h.3.2........... 00000032b633a970 13 01 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ 00000032b633a980 00 00 00 00 00 00 00 00 1b ac 11 00 51 09 00 00 ............Q... 00000032b633a990 ea 02 00 00 00 00 00 00 f0 0a 04 00 00 00 00 00 ................ 00000032b633a9a0 13 01 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b633a9b0 00 00 00 00 00 00 00 00 8e a6 11 00 51 09 00 00 ............Q... 00000032b633a9c0 ea 02 00 00 00 00 00 00 36 d7 f3 2e e8 01 00 00 ........6....... 00000032b633a9d0 32 00 00 00 00 00 00 00 8e d9 f3 2e e8 01 00 00 2............... 00000032b633a9e0 00 00 00 00 00 00 00 00 fc a8 14 d2 f9 7f 00 00 ................ Possible instruction pointers: 9 ntdll.dll + 0x1a8fc rsp = 0x00000032b633a9f0 rip = 0x00007ff9d214a8fc Found by: stack scanning Stack contents: 00000032b633a9f0 20 ad 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 .3.2........... 00000032b633aa00 b0 aa 33 b6 32 00 00 00 d5 13 15 d2 f9 7f 00 00 ..3.2........... Possible instruction pointers: 10 ntdll.dll + 0x213d5 rsp = 0x00000032b633aa10 rip = 0x00007ff9d21513d5 Found by: stack scanning Stack contents: 00000032b633aa10 f0 0f 05 1b e8 01 00 00 c0 c1 29 d2 f9 7f 00 00 ..........)..... Possible instruction pointers: 11 ntdll.dll + 0x16c1c0 rsp = 0x00000032b633aa20 rip = 0x00007ff9d229c1c0 Found by: stack scanning Stack contents: 00000032b633aa20 60 10 05 1b e8 01 00 00 10 ac 33 b6 32 00 00 00 `.........3.2... 00000032b633aa30 30 cf 04 1b e8 01 00 00 d8 af 33 b6 32 00 00 00 0.........3.2... 00000032b633aa40 03 00 00 00 00 00 00 00 53 19 19 d2 f9 7f 00 00 ........S....... Possible instruction pointers: 12 ntdll.dll + 0x61953 rsp = 0x00000032b633aa50 rip = 0x00007ff9d2191953 Found by: stack scanning Stack contents: 00000032b633aa50 90 aa 33 b6 32 00 00 00 77 98 14 d2 f9 7f 00 00 ..3.2...w....... Possible instruction pointers: 13 ntdll.dll + 0x19877 rsp = 0x00000032b633aa60 rip = 0x00007ff9d2149877 Found by: stack scanning Stack contents: 00000032b633aa60 c8 18 13 7b 00 00 00 00 f0 0f 05 1b e8 01 00 00 ...{............ 00000032b633aa70 30 cf 04 1b e8 01 00 00 f7 f5 14 d2 f9 7f 00 00 0............... Possible instruction pointers: 14 ntdll.dll + 0x1f5f7 rsp = 0x00000032b633aa80 rip = 0x00007ff9d214f5f7 Found by: stack scanning Stack contents: 00000032b633aa80 00 00 00 00 00 00 00 00 f0 0f 05 1b e8 01 00 00 ................ 00000032b633aa90 16 00 d8 00 32 00 00 00 58 ad 33 b6 32 00 00 00 ....2...X.3.2... 00000032b633aaa0 d8 af 33 b6 32 00 00 00 f4 fc 14 d2 f9 7f 00 00 ..3.2........... Possible instruction pointers: 15 ntdll.dll + 0x1fcf4 rsp = 0x00000032b633aab0 rip = 0x00007ff9d214fcf4 Found by: stack scanning Stack contents: 00000032b633aab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633aac0 30 cf 04 1b e8 01 00 00 d8 af 33 b6 32 00 00 00 0.........3.2... 00000032b633aad0 f8 aa 33 b6 32 00 00 00 00 af 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633aae0 c0 ae 33 b6 32 00 00 00 75 fa 14 d2 f9 7f 00 00 ..3.2...u....... Possible instruction pointers: 16 ntdll.dll + 0x1fa75 rsp = 0x00000032b633aaf0 rip = 0x00007ff9d214fa75 Found by: stack scanning Stack contents: 00000032b633aaf0 00 00 00 00 00 00 00 00 09 00 00 00 f9 7f 00 00 ................ 00000032b633ab00 88 74 d2 d0 f9 7f 00 00 .t...... Possible instruction pointers: 17 shell32.dll + 0x6d7488 rsp = 0x00000032b633ab08 rip = 0x00007ff9d0d27488 Found by: stack scanning Stack contents: 00000032b633ab08 20 ad 33 b6 32 00 00 00 01 cf 04 1b e8 01 00 00 .3.2........... 00000032b633ab18 b4 ab 33 b6 32 00 00 00 88 ab 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633ab28 bb 6e 14 d2 f9 7f 00 00 .n...... Possible instruction pointers: 18 ntdll.dll + 0x16ebb rsp = 0x00000032b633ab30 rip = 0x00007ff9d2146ebb Found by: stack scanning Stack contents: 00000032b633ab30 14 06 43 35 8a c5 00 00 00 00 00 00 00 00 00 00 ..C5............ 00000032b633ab40 00 00 00 00 00 00 00 00 d8 af 33 b6 32 00 00 00 ..........3.2... 00000032b633ab50 d0 55 e1 cf f9 7f 00 00 .U...... Possible instruction pointers: 19 KERNELBASE.dll + 0x755d0 rsp = 0x00000032b633ab58 rip = 0x00007ff9cfe155d0 Found by: stack scanning Stack contents: 00000032b633ab58 00 00 00 00 00 00 00 00 88 74 d2 d0 f9 7f 00 00 .........t...... Possible instruction pointers: 20 shell32.dll + 0x6d7488 rsp = 0x00000032b633ab68 rip = 0x00007ff9d0d27488 Found by: stack scanning Stack contents: 00000032b633ab68 ad 6d 14 d2 f9 7f 00 00 .m...... Possible instruction pointers: 21 ntdll.dll + 0x16dad rsp = 0x00000032b633ab70 rip = 0x00007ff9d2146dad Found by: stack scanning Stack contents: 00000032b633ab70 20 ad 33 b6 32 00 00 00 30 cf 04 1b e8 01 00 00 .3.2...0....... 00000032b633ab80 30 cf 04 1b e8 01 00 00 c0 ae 33 b6 32 00 00 00 0.........3.2... 00000032b633ab90 30 cf 04 1b e8 01 00 00 30 cf 04 1b e8 01 00 00 0.......0....... 00000032b633aba0 d8 af 33 b6 32 00 00 00 b0 ab 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633abb0 00 00 00 00 00 02 00 00 54 ac 33 b6 32 00 00 00 ........T.3.2... 00000032b633abc0 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b633abd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633abe0 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff p............... 00000032b633abf0 ff ff ff ff ff ff ff ff df 6c 14 d2 f9 7f 00 00 .........l...... Possible instruction pointers: 22 ntdll.dll + 0x16cdf rsp = 0x00000032b633ac00 rip = 0x00007ff9d2146cdf Found by: stack scanning Stack contents: 00000032b633ac00 4b 6d 14 d2 f9 7f 00 00 Km...... Possible instruction pointers: 23 ntdll.dll + 0x16d4b rsp = 0x00000032b633ac08 rip = 0x00007ff9d2146d4b Found by: stack scanning Stack contents: 00000032b633ac08 ad 6d 14 d2 f9 7f 00 00 .m...... Possible instruction pointers: 24 ntdll.dll + 0x16dad rsp = 0x00000032b633ac10 rip = 0x00007ff9d2146dad Found by: stack scanning Stack contents: 00000032b633ac10 00 00 00 01 32 00 00 00 20 ac 33 b6 32 00 00 00 ....2... .3.2... 00000032b633ac20 00 00 70 00 69 00 2d 00 6d 00 73 00 2d 00 77 00 ..p.i.-.m.s.-.w. 00000032b633ac30 69 00 6e 00 2d 00 63 00 6f 00 72 00 65 00 2d 00 i.n.-.c.o.r.e.-. 00000032b633ac40 63 00 6f 00 6d 00 2d 00 6c 00 31 00 2d 00 31 00 c.o.m.-.l.1.-.1. 00000032b633ac50 2d 00 30 00 2e 00 64 00 6c 00 6c 00 00 00 00 00 -.0...d.l.l..... 00000032b633ac60 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b633ac70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ac80 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff p............... 00000032b633ac90 ff ff ff ff ff ff ff ff df 6c 14 d2 f9 7f 00 00 .........l...... Possible instruction pointers: 25 ntdll.dll + 0x16cdf rsp = 0x00000032b633aca0 rip = 0x00007ff9d2146cdf Found by: stack scanning Stack contents: 00000032b633aca0 4b 6d 14 d2 f9 7f 00 00 Km...... Possible instruction pointers: 26 ntdll.dll + 0x16d4b rsp = 0x00000032b633aca8 rip = 0x00007ff9d2146d4b Found by: stack scanning Stack contents: 00000032b633aca8 00 00 f9 1a e8 01 00 00 00 00 00 01 e8 01 00 00 ................ 00000032b633acb8 c0 ac 33 b6 32 00 00 00 00 00 70 00 69 00 2d 00 ..3.2.....p.i.-. 00000032b633acc8 6d 00 73 00 2d 00 77 00 69 00 6e 00 2d 00 73 00 m.s.-.w.i.n.-.s. 00000032b633acd8 68 00 63 00 6f 00 72 00 65 00 2d 00 70 00 61 00 h.c.o.r.e.-.p.a. 00000032b633ace8 74 00 68 00 2d 00 6c 00 31 00 2d 00 31 00 2d 00 t.h.-.l.1.-.1.-. 00000032b633acf8 30 00 2e 00 64 00 6c 00 6c 00 00 00 e8 01 00 00 0...d.l.l....... 00000032b633ad08 c9 ad 33 b6 32 00 00 00 04 00 00 00 00 00 00 00 ..3.2........... 00000032b633ad18 c7 b3 15 d2 f9 7f 00 00 ........ Possible instruction pointers: 27 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633ad20 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633ad20 3e 00 00 01 e8 01 00 00 30 ad 33 b6 32 00 00 00 >.......0.3.2... 00000032b633ad30 43 00 3a 00 5c 00 57 00 69 00 6e 00 64 00 6f 00 C.:.\.W.i.n.d.o. 00000032b633ad40 77 00 73 00 5c 00 53 00 59 00 53 00 54 00 45 00 w.s.\.S.Y.S.T.E. 00000032b633ad50 4d 00 33 00 32 00 5c 00 63 00 6f 00 6d 00 62 00 M.3.2.\.c.o.m.b. 00000032b633ad60 61 00 73 00 65 00 2e 00 64 00 6c 00 6c 00 00 00 a.s.e...d.l.l... 00000032b633ad70 b0 42 08 00 00 00 00 00 00 00 00 00 00 00 00 00 .B.............. 00000032b633ad80 00 00 2d 1b e8 01 00 00 e9 ad 33 b6 32 00 00 00 ..-.......3.2... 00000032b633ad90 50 0c a4 29 e8 01 00 00 50 0c a4 29 e8 01 00 00 P..)....P..).... 00000032b633ada0 00 00 00 00 00 00 00 00 30 66 14 d2 f9 7f 00 00 ........0f...... Possible instruction pointers: 28 ntdll.dll + 0x16630 rsp = 0x00000032b633adb0 rip = 0x00007ff9d2146630 Found by: stack scanning Stack contents: 00000032b633adb0 ff 03 00 00 00 00 00 00 c0 15 28 1b e8 01 00 00 ..........(..... 00000032b633adc0 7f 00 00 00 00 00 00 00 d3 19 cb cb f9 7f 00 00 ................ Possible instruction pointers: 29 apphelp.dll + 0x19d3 rsp = 0x00000032b633add0 rip = 0x00007ff9cbcb19d3 Found by: stack scanning Stack contents: 00000032b633add0 00 00 00 00 5c 00 57 00 69 00 6e 00 64 00 6f 00 ....\.W.i.n.d.o. 00000032b633ade0 00 00 00 00 00 00 00 00 f9 7f 00 00 00 00 00 00 ................ 00000032b633adf0 4d 00 33 00 32 00 5c 00 73 00 68 00 63 00 6f 00 M.3.2.\.s.h.c.o. 00000032b633ae00 72 00 65 00 2e 00 64 00 6b b8 15 d2 f9 7f 00 00 r.e...d.k....... Possible instruction pointers: 30 ntdll.dll + 0x2b86b rsp = 0x00000032b633ae10 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633ae10 01 00 0c 00 00 00 00 00 e0 69 03 1b e8 01 00 00 .........i...... 00000032b633ae20 c4 01 43 35 8a c5 00 00 e6 fd 7e cf f9 7f 00 00 ..C5......~..... Possible instruction pointers: 31 ucrtbase.dll + 0xfde6 rsp = 0x00000032b633ae30 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b633ae30 04 07 43 35 8a c5 00 00 f0 0f 05 1b e8 01 00 00 ..C5............ 00000032b633ae40 a0 ef a5 d1 f9 7f 00 00 ........ Possible instruction pointers: 32 combase.dll + 0x8efa0 rsp = 0x00000032b633ae48 rip = 0x00007ff9d1a5efa0 Found by: stack scanning Stack contents: 00000032b633ae48 60 b0 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 `.3.2........... 00000032b633ae58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ae68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ae78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ae88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ae98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633aea8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633aeb8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633aec8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633aed8 f1 34 16 d2 f9 7f 00 00 .4...... Possible instruction pointers: 33 ntdll.dll + 0x334f1 rsp = 0x00000032b633aee0 rip = 0x00007ff9d21634f1 Found by: stack scanning Stack contents: 00000032b633aee0 e0 ed 03 1b e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633aef0 00 00 00 00 00 00 00 00 20 b1 33 b6 32 00 00 00 ........ .3.2... 00000032b633af00 30 cf 04 1b e8 01 00 00 fe 41 18 d2 f9 7f 00 00 0........A...... Possible instruction pointers: 34 ntdll.dll + 0x541fe rsp = 0x00000032b633af10 rip = 0x00007ff9d21841fe Found by: stack scanning Stack contents: 00000032b633af10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633af20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633af30 a8 af 33 b6 32 00 00 00 8d 5b 1a d2 f9 7f 00 00 ..3.2....[...... Possible instruction pointers: 35 ntdll.dll + 0x75b8d rsp = 0x00000032b633af40 rip = 0x00007ff9d21a5b8d Found by: stack scanning Stack contents: 00000032b633af40 f4 02 43 35 8a c5 00 00 00 00 00 00 00 00 00 00 ..C5............ 00000032b633af50 27 00 00 00 00 00 00 00 30 cf 04 1b e8 01 00 00 '.......0....... 00000032b633af60 30 dd d9 d0 f9 7f 00 00 0....... Possible instruction pointers: 36 shell32.dll + 0x74dd30 rsp = 0x00000032b633af68 rip = 0x00007ff9d0d9dd30 Found by: stack scanning Stack contents: 00000032b633af68 20 b1 33 b6 32 00 00 00 09 00 00 00 00 00 00 00 .3.2........... 00000032b633af78 03 00 00 00 00 00 00 00 20 b1 33 b6 32 00 00 00 ........ .3.2... 00000032b633af88 9c 21 16 d2 f9 7f 00 00 .!...... Possible instruction pointers: 37 ntdll.dll + 0x3219c rsp = 0x00000032b633af90 rip = 0x00007ff9d216219c Found by: stack scanning Stack contents: 00000032b633af90 f0 0f 05 1b e8 01 00 00 03 00 00 00 00 00 00 00 ................ 00000032b633afa0 09 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 ................ 00000032b633afb0 09 00 00 00 00 00 00 00 6a 00 00 00 00 00 00 00 ........j....... 00000032b633afc0 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b633afd0 00 00 00 00 00 00 00 00 f0 0f 05 1b e8 01 00 00 ................ 00000032b633afe0 27 00 00 00 27 00 00 00 00 00 00 00 00 00 00 00 '...'........... 00000032b633aff0 a0 ef a5 d1 f9 7f 00 00 ........ Possible instruction pointers: 38 combase.dll + 0x8efa0 rsp = 0x00000032b633aff8 rip = 0x00007ff9d1a5efa0 Found by: stack scanning Stack contents: 00000032b633aff8 fc 3c 00 00 00 00 00 00 00 00 00 00 32 00 00 00 .<..........2... 00000032b633b008 88 74 d2 d0 f9 7f 00 00 .t...... Possible instruction pointers: 39 shell32.dll + 0x6d7488 rsp = 0x00000032b633b010 rip = 0x00007ff9d0d27488 Found by: stack scanning Stack contents: 00000032b633b010 20 b1 33 b6 32 00 00 00 78 dd d9 d0 f9 7f 00 00 .3.2...x....... Possible instruction pointers: 40 shell32.dll + 0x74dd78 rsp = 0x00000032b633b020 rip = 0x00007ff9d0d9dd78 Found by: stack scanning Stack contents: 00000032b633b020 30 dd d9 d0 f9 7f 00 00 0....... Possible instruction pointers: 41 shell32.dll + 0x74dd30 rsp = 0x00000032b633b028 rip = 0x00007ff9d0d9dd30 Found by: stack scanning Stack contents: 00000032b633b028 27 00 00 00 00 00 00 00 40 95 a8 d1 f9 7f 00 00 '.......@....... Possible instruction pointers: 42 combase.dll + 0xb9540 rsp = 0x00000032b633b038 rip = 0x00007ff9d1a89540 Found by: stack scanning Stack contents: 00000032b633b038 e4 bb d2 d0 f9 7f 00 00 ........ Possible instruction pointers: 43 shell32.dll + 0x6dbbe4 rsp = 0x00000032b633b040 rip = 0x00007ff9d0d2bbe4 Found by: stack scanning Stack contents: 00000032b633b040 08 01 9d d1 f9 7f 00 00 ........ Possible instruction pointers: 44 combase.dll + 0x108 rsp = 0x00000032b633b048 rip = 0x00007ff9d19d0108 Found by: stack scanning Stack contents: 00000032b633b048 f0 0f 05 1b e8 01 00 00 30 cf 04 1b e8 01 00 00 ........0....... 00000032b633b058 d0 16 cb cb f9 7f 00 00 ........ Possible instruction pointers: 45 apphelp.dll + 0x16d0 rsp = 0x00000032b633b060 rip = 0x00007ff9cbcb16d0 Found by: stack scanning Stack contents: 00000032b633b060 00 00 00 00 00 00 00 00 09 00 00 00 00 00 00 00 ................ 00000032b633b070 50 b2 33 b6 32 00 00 00 d0 55 e1 cf f9 7f 00 00 P.3.2....U...... Possible instruction pointers: 46 KERNELBASE.dll + 0x755d0 rsp = 0x00000032b633b080 rip = 0x00007ff9cfe155d0 Found by: stack scanning Stack contents: 00000032b633b080 00 00 00 00 00 00 00 00 30 00 35 00 2e 00 31 00 ........0.5...1. 00000032b633b090 33 00 2d 00 51 00 74 00 36 00 2e 00 37 00 2e 00 3.-.Q.t.6...7... 00000032b633b0a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b0b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b0c0 d0 ee 03 1b e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b0d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b0e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b0f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b120 60 3c aa d1 f9 7f 00 00 `<...... Possible instruction pointers: 47 combase.dll + 0xd3c60 rsp = 0x00000032b633b128 rip = 0x00007ff9d1aa3c60 Found by: stack scanning Stack contents: 00000032b633b128 0b b9 15 d2 f9 7f 00 00 ........ Possible instruction pointers: 48 ntdll.dll + 0x2b90b rsp = 0x00000032b633b130 rip = 0x00007ff9d215b90b Found by: stack scanning Stack contents: 00000032b633b130 11 00 5e 00 00 00 00 00 45 00 00 00 00 00 00 00 ..^.....E....... 00000032b633b140 c0 6e 6a 23 e8 01 00 00 10 ef a5 d1 f9 7f 00 00 .nj#............ Possible instruction pointers: 49 combase.dll + 0x8ef10 rsp = 0x00000032b633b150 rip = 0x00007ff9d1a5ef10 Found by: stack scanning Stack contents: 00000032b633b150 90 5a aa d1 f9 7f 00 00 .Z...... Possible instruction pointers: 50 combase.dll + 0xd5a90 rsp = 0x00000032b633b158 rip = 0x00007ff9d1aa5a90 Found by: stack scanning Stack contents: 00000032b633b158 d0 f4 a6 d1 f9 7f 00 00 ........ Possible instruction pointers: 51 combase.dll + 0x9f4d0 rsp = 0x00000032b633b160 rip = 0x00007ff9d1a6f4d0 Found by: stack scanning Stack contents: 00000032b633b160 00 00 00 00 f9 7f 00 00 0b b9 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 52 ntdll.dll + 0x2b90b rsp = 0x00000032b633b170 rip = 0x00007ff9d215b90b Found by: stack scanning Stack contents: 00000032b633b170 40 01 62 00 00 00 00 00 47 00 00 00 00 00 00 00 @.b.....G....... 00000032b633b180 20 0d 8b 23 e8 01 00 00 a0 70 a3 d1 f9 7f 00 00 ..#.....p...... Possible instruction pointers: 53 combase.dll + 0x670a0 rsp = 0x00000032b633b190 rip = 0x00007ff9d1a370a0 Found by: stack scanning Stack contents: 00000032b633b190 50 00 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 P............... 00000032b633b1a0 00 00 00 00 f9 7f 00 00 c0 3f f9 1a e8 01 00 00 .........?...... 00000032b633b1b0 00 00 00 00 00 00 00 00 00 00 f9 1a e8 01 00 00 ................ 00000032b633b1c0 ac 02 f9 1a e8 01 00 00 20 00 00 00 00 00 00 00 ........ ....... 00000032b633b1d0 30 00 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 0............... 00000032b633b1e0 05 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b633b1f0 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b633b200 20 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ............... 00000032b633b210 00 00 03 1b e8 01 00 00 d9 b2 33 b6 32 00 00 00 ..........3.2... 00000032b633b220 03 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 54 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633b230 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633b230 00 00 f9 1a e8 01 00 00 07 00 00 00 f9 7f 00 00 ................ 00000032b633b240 20 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ............... 00000032b633b250 a0 ef a5 d1 f9 7f 00 00 ........ Possible instruction pointers: 55 combase.dll + 0x8efa0 rsp = 0x00000032b633b258 rip = 0x00007ff9d1a5efa0 Found by: stack scanning Stack contents: 00000032b633b258 a1 5b 15 d2 f9 7f 00 00 .[...... Possible instruction pointers: 56 ntdll.dll + 0x25ba1 rsp = 0x00000032b633b260 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633b260 00 00 00 00 02 00 00 00 41 2d 50 bd f9 7f 00 00 ........A-P..... Possible instruction pointers: 57 DWrite.dll + 0x62d41 rsp = 0x00000032b633b270 rip = 0x00007ff9bd502d41 Found by: stack scanning Stack contents: 00000032b633b270 94 03 43 35 8a c5 00 00 00 b4 a6 29 e8 01 00 00 ..C5.......).... 00000032b633b280 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b290 80 6c 6a 23 e8 01 00 00 0c 00 00 00 32 00 00 00 .lj#........2... 00000032b633b2a0 00 00 00 00 00 00 00 00 4d 74 9f cd f9 7f 00 00 ........Mt...... Possible instruction pointers: 58 windows.storage.dll + 0x17744d rsp = 0x00000032b633b2b0 rip = 0x00007ff9cd9f744d Found by: stack scanning Stack contents: 00000032b633b2b0 00 00 00 00 00 00 00 00 c3 a9 14 d2 f9 7f 00 00 ................ Possible instruction pointers: 59 ntdll.dll + 0x1a9c3 rsp = 0x00000032b633b2c0 rip = 0x00007ff9d214a9c3 Found by: stack scanning Stack contents: 00000032b633b2c0 00 00 00 00 00 00 00 00 00 08 fd 32 e8 01 00 00 ...........2.... 00000032b633b2d0 70 08 fd 32 e8 01 00 00 61 72 9f cd f9 7f 00 00 p..2....ar...... Possible instruction pointers: 60 windows.storage.dll + 0x177261 rsp = 0x00000032b633b2e0 rip = 0x00007ff9cd9f7261 Found by: stack scanning Stack contents: 00000032b633b2e0 b0 46 0b 1b e8 01 00 00 00 00 00 00 00 00 00 00 .F.............. 00000032b633b2f0 02 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633b300 b0 a2 ea 33 e8 01 00 00 00 00 00 00 00 00 00 00 ...3............ 00000032b633b310 02 00 00 00 00 00 00 00 30 b4 33 b6 32 00 00 00 ........0.3.2... 00000032b633b320 b0 a2 ea 33 e8 01 00 00 30 35 02 d2 f9 7f 00 00 ...3....05...... Possible instruction pointers: 61 kernel32.dll + 0x3530 rsp = 0x00000032b633b330 rip = 0x00007ff9d2023530 Found by: stack scanning Stack contents: 00000032b633b330 02 02 00 00 e8 01 00 00 02 02 00 00 f9 7f 00 00 ................ 00000032b633b340 00 00 00 00 e8 01 00 00 ff 03 00 00 e8 01 00 00 ................ 00000032b633b350 a0 00 fd 32 e8 01 00 00 00 00 0b 1b e8 01 00 00 ...2............ 00000032b633b360 b0 0e fd 32 e8 01 00 00 6b b8 15 d2 f9 7f 00 00 ...2....k....... Possible instruction pointers: 62 ntdll.dll + 0x2b86b rsp = 0x00000032b633b370 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633b370 60 18 07 1b e8 01 00 00 48 00 00 00 00 00 00 00 `.......H....... 00000032b633b380 60 18 07 1b e8 01 00 00 10 84 cd 1c e8 01 00 00 `............... 00000032b633b390 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b3a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b3b0 00 00 00 00 01 00 00 00 00 00 00 00 ff ff ff e7 ................ 00000032b633b3c0 b0 a2 ea 33 e8 01 00 00 b4 a2 ea 33 e8 01 00 00 ...3.......3.... 00000032b633b3d0 00 00 00 10 00 00 00 00 b4 a2 ea 33 e8 01 00 00 ...........3.... 00000032b633b3e0 00 00 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 ................ 00000032b633b3f0 70 b7 33 b6 32 00 00 00 74 b7 33 b6 32 00 00 00 p.3.2...t.3.2... 00000032b633b400 00 00 00 10 00 00 00 00 74 b7 33 b6 32 00 00 00 ........t.3.2... 00000032b633b410 00 00 00 00 ff ff ff ff d9 b4 00 00 00 00 00 00 ................ 00000032b633b420 f5 00 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b633b430 1a de 66 35 fd fa 00 00 07 00 00 00 00 00 00 00 ..f5............ 00000032b633b440 20 0d 8b 23 e8 01 00 00 01 00 00 18 00 00 00 00 ..#............ 00000032b633b450 00 00 00 00 00 00 00 00 e0 3d 1d 34 e8 01 00 00 .........=.4.... 00000032b633b460 b4 a2 ea 33 e8 01 00 00 00 00 00 00 00 00 00 00 ...3............ 00000032b633b470 fa ce ee 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b480 d0 6e 05 d0 f9 7f 00 00 .n...... Possible instruction pointers: 63 KERNELBASE.dll + 0x2b6ed0 rsp = 0x00000032b633b488 rip = 0x00007ff9d0056ed0 Found by: stack scanning Stack contents: 00000032b633b488 25 a0 dc cf f9 7f 00 00 %....... Possible instruction pointers: 64 KERNELBASE.dll + 0x2a025 rsp = 0x00000032b633b490 rip = 0x00007ff9cfdca025 Found by: stack scanning Stack contents: 00000032b633b490 00 00 00 00 00 00 00 00 fa ce ee 1a e8 01 00 00 ................ 00000032b633b4a0 b4 a2 ea 33 e8 01 00 00 d0 6e 05 d0 f9 7f 00 00 ...3.....n...... Possible instruction pointers: 65 KERNELBASE.dll + 0x2b6ed0 rsp = 0x00000032b633b4b0 rip = 0x00007ff9d0056ed0 Found by: stack scanning Stack contents: 00000032b633b4b0 70 b7 33 b6 32 00 00 00 02 00 00 00 00 00 00 00 p.3.2........... 00000032b633b4c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b4d0 00 00 00 00 00 00 00 00 00 00 03 1b e8 01 00 00 ................ 00000032b633b4e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b4f0 70 b7 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 p.3.2........... 00000032b633b500 00 00 00 00 00 00 00 00 88 a2 93 cd f9 7f 00 00 ................ Possible instruction pointers: 66 windows.storage.dll + 0xba288 rsp = 0x00000032b633b510 rip = 0x00007ff9cd93a288 Found by: stack scanning Stack contents: 00000032b633b510 a0 51 1d 34 e8 01 00 00 01 00 00 00 00 00 00 00 .Q.4............ 00000032b633b520 a0 51 1d 34 e8 01 00 00 0b 00 00 00 00 00 00 00 .Q.4............ 00000032b633b530 ff ff ff ff ff ff ff ff dd 67 92 cd f9 7f 00 00 .........g...... Possible instruction pointers: 67 windows.storage.dll + 0xa67dd rsp = 0x00000032b633b540 rip = 0x00007ff9cd9267dd Found by: stack scanning Stack contents: 00000032b633b540 00 00 00 00 00 00 00 00 0a 00 00 00 00 00 00 00 ................ 00000032b633b550 78 dd d9 d0 f9 7f 00 00 x....... Possible instruction pointers: 68 shell32.dll + 0x74dd78 rsp = 0x00000032b633b558 rip = 0x00007ff9d0d9dd78 Found by: stack scanning Stack contents: 00000032b633b558 00 00 14 d2 f9 7f 00 00 ........ Possible instruction pointers: 69 ntdll.dll + 0x10000 rsp = 0x00000032b633b560 rip = 0x00007ff9d2140000 Found by: stack scanning Stack contents: 00000032b633b560 80 b5 33 b6 32 00 00 00 03 00 00 00 00 00 00 00 ..3.2........... 00000032b633b570 00 00 00 00 00 00 00 00 a0 51 1d 34 e8 01 00 00 .........Q.4.... 00000032b633b580 a0 51 1d 34 e8 01 00 00 00 00 00 00 f9 7f 00 00 .Q.4............ 00000032b633b590 0a 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 70 ntdll.dll + 0x25ba1 rsp = 0x00000032b633b5a0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633b5a0 20 00 00 00 00 00 00 00 61 86 d1 67 50 c9 00 00 .......a..gP... 00000032b633b5b0 30 cf 04 1b e8 01 00 00 00 00 00 00 00 00 00 00 0............... 00000032b633b5c0 71 d8 6e 37 b6 f7 00 00 05 00 00 00 00 00 00 00 q.n7............ 00000032b633b5d0 50 0b fe 33 e8 01 00 00 7e 00 00 00 00 00 00 00 P..3....~....... 00000032b633b5e0 b4 a2 ea 33 e8 01 00 00 80 92 ea 33 e8 01 00 00 ...3.......3.... 00000032b633b5f0 00 00 00 00 00 00 00 00 50 d8 d4 d0 f9 7f 00 00 ........P....... Possible instruction pointers: 71 shell32.dll + 0x6fd850 rsp = 0x00000032b633b600 rip = 0x00007ff9d0d4d850 Found by: stack scanning Stack contents: 00000032b633b600 00 00 f9 1a e8 01 00 00 b0 a2 ea 33 e8 01 00 00 ...........3.... 00000032b633b610 00 00 00 00 00 00 00 00 e8 e5 e0 cf f9 7f 00 00 ................ Possible instruction pointers: 72 KERNELBASE.dll + 0x6e5e8 rsp = 0x00000032b633b620 rip = 0x00007ff9cfe0e5e8 Found by: stack scanning Stack contents: 00000032b633b620 e0 dc 0a 1b e8 01 00 00 2b 48 76 d0 f9 7f 00 00 ........+Hv..... Possible instruction pointers: 73 shell32.dll + 0x11482b rsp = 0x00000032b633b630 rip = 0x00007ff9d076482b Found by: stack scanning Stack contents: 00000032b633b630 34 cc 33 b6 32 00 00 00 04 01 00 00 00 00 00 00 4.3.2........... 00000032b633b640 50 d8 d4 d0 f9 7f 00 00 P....... Possible instruction pointers: 74 shell32.dll + 0x6fd850 rsp = 0x00000032b633b648 rip = 0x00007ff9d0d4d850 Found by: stack scanning Stack contents: 00000032b633b648 05 00 00 00 00 00 00 00 b0 a2 ea 33 e8 01 00 00 ...........3.... 00000032b633b658 b1 47 15 d2 f9 7f 00 00 .G...... Possible instruction pointers: 75 ntdll.dll + 0x247b1 rsp = 0x00000032b633b660 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633b660 65 00 73 00 20 00 28 00 00 00 03 1b e8 01 00 00 e.s. .(......... 00000032b633b670 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b680 00 00 00 00 00 00 00 00 04 01 00 00 00 00 00 00 ................ 00000032b633b690 00 00 00 00 00 00 00 00 5a db 70 d0 f9 7f 00 00 ........Z.p..... Possible instruction pointers: 76 shell32.dll + 0xbdb5a rsp = 0x00000032b633b6a0 rip = 0x00007ff9d070db5a Found by: stack scanning Stack contents: 00000032b633b6a0 04 00 00 00 00 00 00 00 70 b7 33 b6 32 00 00 00 ........p.3.2... 00000032b633b6b0 70 b7 33 b6 32 00 00 00 00 23 00 00 00 00 00 00 p.3.2....#...... 00000032b633b6c0 b0 a2 ea 33 e8 01 00 00 0e 3d 76 d0 f9 7f 00 00 ...3.....=v..... Possible instruction pointers: 77 shell32.dll + 0x113d0e rsp = 0x00000032b633b6d0 rip = 0x00007ff9d0763d0e Found by: stack scanning Stack contents: 00000032b633b6d0 00 00 00 00 00 00 00 00 ff 01 00 00 00 00 00 00 ................ 00000032b633b6e0 9c 00 01 00 00 00 00 00 f0 cd 1b d2 f9 7f 00 00 ................ Possible instruction pointers: 78 ntdll.dll + 0x8cdf0 rsp = 0x00000032b633b6f0 rip = 0x00007ff9d21bcdf0 Found by: stack scanning Stack contents: 00000032b633b6f0 34 cc 33 b6 32 00 00 00 ce d9 70 d0 f9 7f 00 00 4.3.2.....p..... Possible instruction pointers: 79 shell32.dll + 0xbd9ce rsp = 0x00000032b633b700 rip = 0x00007ff9d070d9ce Found by: stack scanning Stack contents: 00000032b633b700 2f a8 03 00 00 00 00 00 20 d5 05 d0 f9 7f 00 00 /....... ....... Possible instruction pointers: 80 KERNELBASE.dll + 0x2bd520 rsp = 0x00000032b633b710 rip = 0x00007ff9d005d520 Found by: stack scanning Stack contents: 00000032b633b710 00 00 00 00 00 00 00 00 20 f0 19 d2 f9 7f 00 00 ........ ....... Possible instruction pointers: 81 ntdll.dll + 0x6f020 rsp = 0x00000032b633b720 rip = 0x00007ff9d219f020 Found by: stack scanning Stack contents: 00000032b633b720 74 2b 03 d0 f9 7f 00 00 t+...... Possible instruction pointers: 82 KERNELBASE.dll + 0x292b74 rsp = 0x00000032b633b728 rip = 0x00007ff9d0032b74 Found by: stack scanning Stack contents: 00000032b633b728 f0 bf 33 b6 32 00 00 00 f0 bf 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633b738 10 b8 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633b748 90 cf 33 b6 32 00 00 00 80 bd 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633b758 d2 78 e5 cf f9 7f 00 00 .x...... Possible instruction pointers: 83 KERNELBASE.dll + 0xb78d2 rsp = 0x00000032b633b760 rip = 0x00007ff9cfe578d2 Found by: stack scanning Stack contents: 00000032b633b760 c4 2b 03 d0 f9 7f 00 00 .+...... Possible instruction pointers: 84 KERNELBASE.dll + 0x292bc4 rsp = 0x00000032b633b768 rip = 0x00007ff9d0032bc4 Found by: stack scanning Stack contents: 00000032b633b768 d0 ce 33 b6 32 00 00 00 3f a6 dd cf f9 7f 00 00 ..3.2...?....... Possible instruction pointers: 85 KERNELBASE.dll + 0x3a63f rsp = 0x00000032b633b778 rip = 0x00007ff9cfdda63f Found by: stack scanning Stack contents: 00000032b633b778 33 00 33 b6 32 00 00 00 06 02 00 00 00 00 00 00 3.3.2........... 00000032b633b788 90 cf 33 b6 32 00 00 00 2b 00 33 b6 32 00 00 00 ..3.2...+.3.2... 00000032b633b798 10 bd 33 b6 32 00 00 00 10 b8 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633b7a8 02 00 00 00 00 00 00 00 10 bd 33 b6 32 00 00 00 ..........3.2... 00000032b633b7b8 66 0b 16 d2 f9 7f 00 00 f....... Possible instruction pointers: 86 ntdll.dll + 0x30b66 rsp = 0x00000032b633b7c0 rip = 0x00007ff9d2160b66 Found by: stack scanning Stack contents: 00000032b633b7c0 3a a6 dd cf f9 7f 00 00 :....... Possible instruction pointers: 87 KERNELBASE.dll + 0x3a63a rsp = 0x00000032b633b7c8 rip = 0x00007ff9cfdda63a Found by: stack scanning Stack contents: 00000032b633b7c8 f0 cd 1b d2 f9 7f 00 00 ........ Possible instruction pointers: 88 ntdll.dll + 0x8cdf0 rsp = 0x00000032b633b7d0 rip = 0x00007ff9d21bcdf0 Found by: stack scanning Stack contents: 00000032b633b7d0 3a a6 dd cf f9 7f 00 00 :....... Possible instruction pointers: 89 KERNELBASE.dll + 0x3a63a rsp = 0x00000032b633b7d8 rip = 0x00007ff9cfdda63a Found by: stack scanning Stack contents: 00000032b633b7d8 20 d5 05 d0 f9 7f 00 00 ....... Possible instruction pointers: 90 KERNELBASE.dll + 0x2bd520 rsp = 0x00000032b633b7e0 rip = 0x00007ff9d005d520 Found by: stack scanning Stack contents: 00000032b633b7e0 2f a8 03 00 00 00 00 00 20 d5 05 d0 f9 7f 00 00 /....... ....... Possible instruction pointers: 91 KERNELBASE.dll + 0x2bd520 rsp = 0x00000032b633b7f0 rip = 0x00007ff9d005d520 Found by: stack scanning Stack contents: 00000032b633b7f0 00 00 00 00 00 00 00 00 20 f0 19 d2 f9 7f 00 00 ........ ....... Possible instruction pointers: 92 ntdll.dll + 0x6f020 rsp = 0x00000032b633b800 rip = 0x00007ff9d219f020 Found by: stack scanning Stack contents: 00000032b633b800 74 2b 03 d0 f9 7f 00 00 t+...... Possible instruction pointers: 93 KERNELBASE.dll + 0x292b74 rsp = 0x00000032b633b808 rip = 0x00007ff9d0032b74 Found by: stack scanning Stack contents: 00000032b633b808 d0 c0 33 b6 32 00 00 00 d0 c0 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633b818 f0 b8 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633b828 70 d0 33 b6 32 00 00 00 60 be 33 b6 32 00 00 00 p.3.2...`.3.2... 00000032b633b838 d2 78 e5 cf f9 7f 00 00 .x...... Possible instruction pointers: 94 KERNELBASE.dll + 0xb78d2 rsp = 0x00000032b633b840 rip = 0x00007ff9cfe578d2 Found by: stack scanning Stack contents: 00000032b633b840 c4 2b 03 d0 f9 7f 00 00 .+...... Possible instruction pointers: 95 KERNELBASE.dll + 0x292bc4 rsp = 0x00000032b633b848 rip = 0x00007ff9d0032bc4 Found by: stack scanning Stack contents: 00000032b633b848 b0 cf 33 b6 32 00 00 00 3f a6 dd cf f9 7f 00 00 ..3.2...?....... Possible instruction pointers: 96 KERNELBASE.dll + 0x3a63f rsp = 0x00000032b633b858 rip = 0x00007ff9cfdda63f Found by: stack scanning Stack contents: 00000032b633b858 33 00 33 b6 32 00 00 00 02 02 00 00 00 00 00 00 3.3.2........... 00000032b633b868 70 d0 33 b6 32 00 00 00 2b 00 33 b6 32 00 00 00 p.3.2...+.3.2... 00000032b633b878 f0 bd 33 b6 32 00 00 00 f0 b8 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633b888 02 00 00 00 00 00 00 00 f0 bd 33 b6 32 00 00 00 ..........3.2... 00000032b633b898 66 0b 16 d2 f9 7f 00 00 f....... Possible instruction pointers: 97 ntdll.dll + 0x30b66 rsp = 0x00000032b633b8a0 rip = 0x00007ff9d2160b66 Found by: stack scanning Stack contents: 00000032b633b8a0 3a a6 dd cf f9 7f 00 00 :....... Possible instruction pointers: 98 KERNELBASE.dll + 0x3a63a rsp = 0x00000032b633b8a8 rip = 0x00007ff9cfdda63a Found by: stack scanning Stack contents: 00000032b633b8a8 02 00 00 00 00 00 00 00 3a a6 dd cf f9 7f 00 00 ........:....... Possible instruction pointers: 99 KERNELBASE.dll + 0x3a63a rsp = 0x00000032b633b8b8 rip = 0x00007ff9cfdda63a Found by: stack scanning Stack contents: 00000032b633b8b8 20 d5 05 d0 f9 7f 00 00 ....... Possible instruction pointers: 100 KERNELBASE.dll + 0x2bd520 rsp = 0x00000032b633b8c0 rip = 0x00007ff9d005d520 Found by: stack scanning Stack contents: 00000032b633b8c0 d0 c0 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633b8d0 18 be 33 b6 32 00 00 00 f8 bd 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633b8e0 08 be 33 b6 32 00 00 00 b0 be 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633b8f0 40 c1 cb 69 f9 7f 00 00 @..i.... Possible instruction pointers: 101 Qt6Core.dll + 0x40c140 rsp = 0x00000032b633b8f8 rip = 0x00007ff969cbc140 Found by: stack scanning Stack contents: 00000032b633b8f8 40 fb 12 34 e8 01 00 00 00 00 00 00 00 00 00 00 @..4............ 00000032b633b908 3f a6 dd cf f9 7f 00 00 ?....... Possible instruction pointers: 102 KERNELBASE.dll + 0x3a63f rsp = 0x00000032b633b910 rip = 0x00007ff9cfdda63f Found by: stack scanning Stack contents: 00000032b633b910 7f 02 00 00 00 00 00 00 00 e0 30 b6 32 00 00 00 ..........0.2... 00000032b633b920 0f 00 10 00 b3 1f 00 00 33 00 00 00 ff ff 02 00 ........3....... 00000032b633b930 00 00 2b 00 02 02 00 00 00 00 00 00 00 00 00 00 ..+............. 00000032b633b940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b960 00 00 00 00 00 00 00 00 06 00 01 40 00 00 00 00 ...........@.... 00000032b633b970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b980 00 00 00 00 00 00 00 00 70 d0 33 b6 32 00 00 00 ........p.3.2... 00000032b633b990 29 d4 33 b6 32 00 00 00 80 78 fe 33 e8 01 00 00 ).3.2....x.3.... 00000032b633b9a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b9b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633b9c0 00 00 00 00 00 00 00 00 b0 de e4 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 103 Qt6Core.dll + 0x59deb0 rsp = 0x00000032b633b9d0 rip = 0x00007ff969e4deb0 Found by: stack scanning Stack contents: 00000032b633b9d0 40 c1 cb 69 f9 7f 00 00 @..i.... Possible instruction pointers: 104 Qt6Core.dll + 0x40c140 rsp = 0x00000032b633b9d8 rip = 0x00007ff969cbc140 Found by: stack scanning Stack contents: 00000032b633b9d8 6c 7f c7 35 f6 7f 00 00 00 00 00 00 00 00 00 00 l..5............ 00000032b633b9e8 3f a6 dd cf f9 7f 00 00 ?....... Possible instruction pointers: 105 KERNELBASE.dll + 0x3a63f rsp = 0x00000032b633b9f0 rip = 0x00007ff9cfdda63f Found by: stack scanning Stack contents: 00000032b633b9f0 7f 02 00 00 00 00 00 00 00 e0 30 b6 32 00 00 00 ..........0.2... 00000032b633ba00 c0 ca 33 b6 32 00 00 00 b3 1f 00 00 ff ff 02 00 ..3.2........... 00000032b633ba10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ba90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633baa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bab0 d0 c2 33 b6 32 00 00 00 02 00 00 00 00 00 00 00 ..3.2........... 00000032b633bac0 20 c0 33 b6 32 00 00 00 66 0b 16 d2 f9 7f 00 00 .3.2...f....... Possible instruction pointers: 106 ntdll.dll + 0x30b66 rsp = 0x00000032b633bad0 rip = 0x00007ff9d2160b66 Found by: stack scanning Stack contents: 00000032b633bad0 d7 b7 dd cf f9 7f 00 00 ........ Possible instruction pointers: 107 KERNELBASE.dll + 0x3b7d7 rsp = 0x00000032b633bad8 rip = 0x00007ff9cfddb7d7 Found by: stack scanning Stack contents: 00000032b633bad8 02 00 00 00 00 00 00 00 d7 b7 dd cf f9 7f 00 00 ................ Possible instruction pointers: 108 KERNELBASE.dll + 0x3b7d7 rsp = 0x00000032b633bae8 rip = 0x00007ff9cfddb7d7 Found by: stack scanning Stack contents: 00000032b633bae8 1c d6 05 d0 f9 7f 00 00 ........ Possible instruction pointers: 109 KERNELBASE.dll + 0x2bd61c rsp = 0x00000032b633baf0 rip = 0x00007ff9d005d61c Found by: stack scanning Stack contents: 00000032b633baf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bb90 b0 c3 33 b6 32 00 00 00 02 00 00 00 00 00 00 00 ..3.2........... 00000032b633bba0 00 c1 33 b6 32 00 00 00 66 0b 16 d2 f9 7f 00 00 ..3.2...f....... Possible instruction pointers: 110 ntdll.dll + 0x30b66 rsp = 0x00000032b633bbb0 rip = 0x00007ff9d2160b66 Found by: stack scanning Stack contents: 00000032b633bbb0 d7 b7 dd cf f9 7f 00 00 ........ Possible instruction pointers: 111 KERNELBASE.dll + 0x3b7d7 rsp = 0x00000032b633bbb8 rip = 0x00007ff9cfddb7d7 Found by: stack scanning Stack contents: 00000032b633bbb8 02 00 00 00 00 00 00 00 d7 b7 dd cf f9 7f 00 00 ................ Possible instruction pointers: 112 KERNELBASE.dll + 0x3b7d7 rsp = 0x00000032b633bbc8 rip = 0x00007ff9cfddb7d7 Found by: stack scanning Stack contents: 00000032b633bbc8 1c d6 05 d0 f9 7f 00 00 ........ Possible instruction pointers: 113 KERNELBASE.dll + 0x2bd61c rsp = 0x00000032b633bbd0 rip = 0x00007ff9d005d61c Found by: stack scanning Stack contents: 00000032b633bbd0 00 bc 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633bbe0 28 c1 33 b6 32 00 00 00 08 c1 33 b6 32 00 00 00 (.3.2.....3.2... 00000032b633bbf0 18 c1 33 b6 32 00 00 00 c0 c1 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633bc00 40 c1 cb 69 f9 7f 00 00 @..i.... Possible instruction pointers: 114 Qt6Core.dll + 0x40c140 rsp = 0x00000032b633bc08 rip = 0x00007ff969cbc140 Found by: stack scanning Stack contents: 00000032b633bc08 40 fb 12 34 e8 01 00 00 00 00 00 00 00 00 00 00 @..4............ 00000032b633bc18 6d dd 8d 69 f9 7f 00 00 m..i.... Possible instruction pointers: 115 Qt6Core.dll + 0x2dd6d rsp = 0x00000032b633bc20 rip = 0x00007ff9698ddd6d Found by: stack scanning Stack contents: 00000032b633bc20 7f 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bc30 0f 00 10 00 b3 1f 00 00 33 00 00 00 ff ff 02 00 ........3....... 00000032b633bc40 00 00 2b 00 06 02 00 00 00 00 00 00 00 00 00 00 ..+............. 00000032b633bc50 00 00 00 00 00 00 00 00 23 2e 18 d2 f9 7f 00 00 ........#....... Possible instruction pointers: 116 ntdll.dll + 0x52e23 rsp = 0x00000032b633bc60 rip = 0x00007ff9d2182e23 Found by: stack scanning Stack contents: 00000032b633bc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bc70 00 00 00 00 00 00 00 00 0a 00 01 40 00 00 00 00 ...........@.... 00000032b633bc80 00 00 00 00 00 00 00 00 73 2d 18 d2 f9 7f 00 00 ........s-...... Possible instruction pointers: 117 ntdll.dll + 0x52d73 rsp = 0x00000032b633bc90 rip = 0x00007ff9d2182d73 Found by: stack scanning Stack contents: 00000032b633bc90 c8 d4 33 b6 32 00 00 00 c0 d3 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633bca0 29 d4 33 b6 32 00 00 00 80 78 fe 33 e8 01 00 00 ).3.2....x.3.... 00000032b633bcb0 01 00 00 00 00 00 00 00 56 07 16 d2 f9 7f 00 00 ........V....... Possible instruction pointers: 118 ntdll.dll + 0x30756 rsp = 0x00000032b633bcc0 rip = 0x00007ff9d2160756 Found by: stack scanning Stack contents: 00000032b633bcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bcd0 00 00 00 00 00 00 00 00 b0 de e4 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 119 Qt6Core.dll + 0x59deb0 rsp = 0x00000032b633bce0 rip = 0x00007ff969e4deb0 Found by: stack scanning Stack contents: 00000032b633bce0 40 c1 cb 69 f9 7f 00 00 @..i.... Possible instruction pointers: 120 Qt6Core.dll + 0x40c140 rsp = 0x00000032b633bce8 rip = 0x00007ff969cbc140 Found by: stack scanning Stack contents: 00000032b633bce8 6c 7f c7 35 f6 7f 00 00 00 00 00 00 00 00 00 00 l..5............ 00000032b633bcf8 6d dd 8d 69 f9 7f 00 00 m..i.... Possible instruction pointers: 121 Qt6Core.dll + 0x2dd6d rsp = 0x00000032b633bd00 rip = 0x00007ff9698ddd6d Found by: stack scanning Stack contents: 00000032b633bd00 7f 02 00 00 00 00 00 00 00 00 0a 1b e8 01 00 00 ................ 00000032b633bd10 80 cc 33 b6 32 00 00 00 b3 1f 00 00 ff ff 02 00 ..3.2........... 00000032b633bd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bd30 00 00 00 00 00 00 00 00 23 2e 18 d2 f9 7f 00 00 ........#....... Possible instruction pointers: 122 ntdll.dll + 0x52e23 rsp = 0x00000032b633bd40 rip = 0x00007ff9d2182e23 Found by: stack scanning Stack contents: 00000032b633bd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bd50 00 00 00 00 00 00 00 00 9c 2e 18 d2 f9 7f 00 00 ................ Possible instruction pointers: 123 ntdll.dll + 0x52e9c rsp = 0x00000032b633bd60 rip = 0x00007ff9d2182e9c Found by: stack scanning Stack contents: 00000032b633bd60 00 00 00 00 00 00 00 00 73 2d 18 d2 f9 7f 00 00 ........s-...... Possible instruction pointers: 124 ntdll.dll + 0x52d73 rsp = 0x00000032b633bd70 rip = 0x00007ff9d2182d73 Found by: stack scanning Stack contents: 00000032b633bd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bd80 10 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bd90 0b 00 10 00 00 00 00 00 56 07 16 d2 f9 7f 00 00 ........V....... Possible instruction pointers: 125 ntdll.dll + 0x30756 rsp = 0x00000032b633bda0 rip = 0x00007ff9d2160756 Found by: stack scanning Stack contents: 00000032b633bda0 00 00 00 00 00 00 00 00 10 b8 33 b6 32 00 00 00 ..........3.2... 00000032b633bdb0 68 78 e5 cf f9 7f 00 00 hx...... Possible instruction pointers: 126 KERNELBASE.dll + 0xb7868 rsp = 0x00000032b633bdb8 rip = 0x00007ff9cfe57868 Found by: stack scanning Stack contents: 00000032b633bdb8 d0 04 00 00 f9 7f 00 00 30 fb ff ff e8 04 00 00 ........0....... 00000032b633bdc8 30 fb ff ff d0 04 00 00 19 00 00 00 00 00 00 00 0............... 00000032b633bdd8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bde8 00 00 00 00 00 00 00 00 b3 1f 00 00 00 00 00 00 ................ 00000032b633bdf8 70 d0 33 b6 32 00 00 00 d0 c0 33 b6 32 00 00 00 p.3.2.....3.2... 00000032b633be08 68 78 e5 cf f9 7f 00 00 hx...... Possible instruction pointers: 127 KERNELBASE.dll + 0xb7868 rsp = 0x00000032b633be10 rip = 0x00007ff9cfe57868 Found by: stack scanning Stack contents: 00000032b633be10 00 00 da cf f9 7f 00 00 ........ Possible instruction pointers: 128 0x7ff9cfda0000 rsp = 0x00000032b633be18 rip = 0x00007ff9cfda0000 Found by: stack scanning Stack contents: 00000032b633be18 94 2b 03 d0 f9 7f 00 00 .+...... Possible instruction pointers: 129 KERNELBASE.dll + 0x292b94 rsp = 0x00000032b633be20 rip = 0x00007ff9d0032b94 Found by: stack scanning Stack contents: 00000032b633be20 20 d5 05 d0 f9 7f 00 00 ....... Possible instruction pointers: 130 KERNELBASE.dll + 0x2bd520 rsp = 0x00000032b633be28 rip = 0x00007ff9d005d520 Found by: stack scanning Stack contents: 00000032b633be28 f0 b8 33 b6 32 00 00 00 3a a6 dd cf f9 7f 00 00 ..3.2...:....... Possible instruction pointers: 131 KERNELBASE.dll + 0x3a63a rsp = 0x00000032b633be38 rip = 0x00007ff9cfdda63a Found by: stack scanning Stack contents: 00000032b633be38 70 c6 33 b6 32 00 00 00 00 e0 30 b6 32 00 00 00 p.3.2.....0.2... 00000032b633be48 00 00 34 b6 32 00 00 00 06 00 01 40 00 00 00 00 ..4.2......@.... 00000032b633be58 3f a6 dd cf f9 7f 00 00 ?....... Possible instruction pointers: 132 KERNELBASE.dll + 0x3a63f rsp = 0x00000032b633be60 rip = 0x00007ff9cfdda63f Found by: stack scanning Stack contents: 00000032b633be60 3a a6 dd cf f9 7f 00 00 :....... Possible instruction pointers: 133 KERNELBASE.dll + 0x3a63a rsp = 0x00000032b633be68 rip = 0x00007ff9cfdda63a Found by: stack scanning Stack contents: 00000032b633be68 00 00 da cf f9 7f 00 00 ........ Possible instruction pointers: 134 0x7ff9cfda0000 rsp = 0x00000032b633be70 rip = 0x00007ff9cfda0000 Found by: stack scanning Stack contents: 00000032b633be70 20 d5 05 d0 f9 7f 00 00 ....... Possible instruction pointers: 135 KERNELBASE.dll + 0x2bd520 rsp = 0x00000032b633be78 rip = 0x00007ff9d005d520 Found by: stack scanning Stack contents: 00000032b633be78 70 d0 33 b6 32 00 00 00 3f a6 dd cf f9 7f 00 00 p.3.2...?....... Possible instruction pointers: 136 KERNELBASE.dll + 0x3a63f rsp = 0x00000032b633be88 rip = 0x00007ff9cfdda63f Found by: stack scanning Stack contents: 00000032b633be88 f0 b8 33 b6 32 00 00 00 68 78 e5 cf f9 7f 00 00 ..3.2...hx...... Possible instruction pointers: 137 KERNELBASE.dll + 0xb7868 rsp = 0x00000032b633be98 rip = 0x00007ff9cfe57868 Found by: stack scanning Stack contents: 00000032b633be98 94 2b 03 d0 f9 7f 00 00 .+...... Possible instruction pointers: 138 KERNELBASE.dll + 0x292b94 rsp = 0x00000032b633bea0 rip = 0x00007ff9d0032b94 Found by: stack scanning Stack contents: 00000032b633bea0 70 c6 33 b6 32 00 00 00 00 00 00 00 32 00 00 00 p.3.2.......2... 00000032b633beb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bec0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bed0 3a a6 03 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 :.......k....... Possible instruction pointers: 139 ntdll.dll + 0x2b86b rsp = 0x00000032b633bee0 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633bee0 02 00 02 00 00 00 00 00 f6 00 00 00 00 00 00 00 ................ 00000032b633bef0 10 0a 2d 33 e8 01 00 00 01 00 00 00 00 00 00 00 ..-3............ 00000032b633bf00 f0 bf 33 b6 32 00 00 00 90 c5 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633bf10 00 00 00 00 32 00 00 00 c0 7e f9 1a e8 01 00 00 ....2....~...... 00000032b633bf20 00 c7 33 b6 32 00 00 00 00 00 f9 1a e8 01 00 00 ..3.2........... 00000032b633bf30 e4 02 f9 1a e8 01 00 00 9f 00 00 00 00 00 00 00 ................ 00000032b633bf40 10 01 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 ................ 00000032b633bf50 2f a8 03 00 00 00 00 00 20 d5 05 d0 f9 7f 00 00 /....... ....... Possible instruction pointers: 140 KERNELBASE.dll + 0x2bd520 rsp = 0x00000032b633bf60 rip = 0x00007ff9d005d520 Found by: stack scanning Stack contents: 00000032b633bf60 00 00 00 00 00 00 00 00 00 00 da cf f9 7f 00 00 ................ Possible instruction pointers: 141 0x7ff9cfda0000 rsp = 0x00000032b633bf70 rip = 0x00007ff9cfda0000 Found by: stack scanning Stack contents: 00000032b633bf70 84 11 43 35 8a c5 00 00 6b b8 15 d2 f9 7f 00 00 ..C5....k....... Possible instruction pointers: 142 ntdll.dll + 0x2b86b rsp = 0x00000032b633bf80 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633bf80 02 00 06 00 00 00 00 00 36 00 00 00 00 00 00 00 ........6....... 00000032b633bf90 50 6b 03 33 e8 01 00 00 b0 cf 33 b6 32 00 00 00 Pk.3......3.2... 00000032b633bfa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633bfb0 00 00 00 00 00 00 00 00 40 a4 f9 1a e8 01 00 00 ........@....... 00000032b633bfc0 94 2b 03 d0 f9 7f 00 00 .+...... Possible instruction pointers: 143 KERNELBASE.dll + 0x292b94 rsp = 0x00000032b633bfc8 rip = 0x00007ff9d0032b94 Found by: stack scanning Stack contents: 00000032b633bfc8 00 00 f9 1a e8 01 00 00 c0 02 f9 1a e8 01 00 00 ................ 00000032b633bfd8 01 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 ................ 00000032b633bfe8 10 0e f9 1a e8 01 00 00 b0 cf 33 b6 32 00 00 00 ..........3.2... 00000032b633bff8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c008 80 00 00 00 00 00 00 00 72 00 00 00 00 00 00 00 ........r....... 00000032b633c018 01 00 00 00 00 00 00 00 00 00 03 1b e8 01 00 00 ................ 00000032b633c028 e9 c0 33 b6 32 00 00 00 08 00 00 00 00 00 00 00 ..3.2........... 00000032b633c038 c7 b3 15 d2 f9 7f 00 00 ........ Possible instruction pointers: 144 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633c040 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633c040 00 00 f9 1a e8 01 00 00 07 00 00 00 32 00 00 00 ............2... 00000032b633c050 72 00 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 r............... 00000032b633c060 00 00 00 00 00 00 00 00 d0 c5 33 b6 32 00 00 00 ..........3.2... 00000032b633c070 b0 cf 33 b6 02 00 00 00 00 00 00 00 00 00 00 00 ..3............. 00000032b633c080 20 c6 33 b6 32 00 00 00 54 25 18 d2 f9 7f 00 00 .3.2...T%...... Possible instruction pointers: 145 ntdll.dll + 0x52554 rsp = 0x00000032b633c090 rip = 0x00007ff9d2182554 Found by: stack scanning Stack contents: 00000032b633c090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c0a0 b0 cf 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633c0b0 d0 c0 33 b6 32 00 00 00 f0 c5 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633c0c0 e0 c5 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633c0d0 30 fb ff ff e8 04 00 00 30 fb ff ff d0 04 00 00 0.......0....... 00000032b633c0e0 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c0f0 00 00 f9 1a e8 01 00 00 c0 65 34 33 e8 01 00 00 .........e43.... 00000032b633c100 0f 00 10 00 b3 1f 00 00 33 00 2b 00 2b 00 53 00 ........3.+.+.S. 00000032b633c110 00 00 00 00 00 00 00 00 c2 72 14 d2 f9 7f 00 00 .........r...... Possible instruction pointers: 146 ntdll.dll + 0x172c2 rsp = 0x00000032b633c120 rip = 0x00007ff9d21472c2 Found by: stack scanning Stack contents: 00000032b633c120 80 c5 33 b6 32 00 00 00 00 ce 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633c130 88 c5 33 b6 32 00 00 00 72 00 00 00 00 00 00 00 ..3.2...r....... 00000032b633c140 00 00 00 00 00 00 00 00 be 71 14 d2 f9 7f 00 00 .........q...... Possible instruction pointers: 147 ntdll.dll + 0x171be rsp = 0x00000032b633c150 rip = 0x00007ff9d21471be Found by: stack scanning Stack contents: 00000032b633c150 88 c5 33 b6 32 00 00 00 c0 c4 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633c160 72 00 00 00 00 00 00 00 88 c5 33 b6 32 00 00 00 r.........3.2... 00000032b633c170 68 00 72 00 00 00 00 00 28 6f fb 33 e8 01 00 00 h.r.....(o.3.... 00000032b633c180 01 00 00 00 00 00 00 00 88 c5 33 b6 32 00 00 00 ..........3.2... 00000032b633c190 00 00 00 00 00 00 00 00 38 b2 14 d2 f9 7f 00 00 ........8....... Possible instruction pointers: 148 ntdll.dll + 0x1b238 rsp = 0x00000032b633c1a0 rip = 0x00007ff9d214b238 Found by: stack scanning Stack contents: 00000032b633c1a0 80 c5 33 b6 32 00 00 00 20 c6 33 b6 32 00 00 00 ..3.2... .3.2... 00000032b633c1b0 c0 c4 33 b6 32 00 00 00 10 0e f9 1a e8 01 00 00 ..3.2........... 00000032b633c1c0 80 c5 33 b6 32 00 00 00 a8 c5 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633c1d0 00 00 00 00 02 00 00 00 90 00 00 00 00 00 00 00 ................ 00000032b633c1e0 7a 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 z............... 00000032b633c1f0 00 00 03 1b e8 01 00 00 b9 c2 33 b6 32 00 00 00 ..........3.2... 00000032b633c200 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c210 a8 c5 33 b6 32 00 00 00 07 00 00 00 00 00 00 00 ..3.2........... 00000032b633c220 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 z............... 00000032b633c230 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c240 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c250 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c260 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c270 00 b0 05 d0 f9 7f 00 00 ........ Possible instruction pointers: 149 KERNELBASE.dll + 0x2bb000 rsp = 0x00000032b633c278 rip = 0x00007ff9d005b000 Found by: stack scanning Stack contents: 00000032b633c278 00 00 da cf f9 7f 00 00 ........ Possible instruction pointers: 150 0x7ff9cfda0000 rsp = 0x00000032b633c280 rip = 0x00007ff9cfda0000 Found by: stack scanning Stack contents: 00000032b633c280 00 60 2f 00 38 fa 00 00 00 00 00 00 00 00 00 00 .`/.8........... 00000032b633c290 6e 00 73 00 70 00 65 00 63 00 74 00 6f 00 72 00 n.s.p.e.c.t.o.r. 00000032b633c2a0 d0 ab 15 34 e8 01 00 00 d0 ab 15 34 e8 01 00 00 ...4.......4.... 00000032b633c2b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c2c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c2d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c2e0 b0 c4 33 b6 32 00 00 00 e0 c9 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633c2f0 04 01 00 00 00 00 00 00 6b 3b a3 69 f9 7f 00 00 ........k;.i.... Possible instruction pointers: 151 Qt6Core.dll + 0x183b6b rsp = 0x00000032b633c300 rip = 0x00007ff969a33b6b Found by: stack scanning Stack contents: 00000032b633c300 d0 c3 33 b6 32 00 00 00 ff ff ff ff 00 00 00 00 ..3.2........... 00000032b633c310 19 c4 33 b6 32 00 00 00 e6 fd 7e cf f9 7f 00 00 ..3.2.....~..... Possible instruction pointers: 152 ucrtbase.dll + 0xfde6 rsp = 0x00000032b633c320 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b633c320 b0 c4 33 b6 32 00 00 00 90 67 34 33 e8 01 00 00 ..3.2....g43.... 00000032b633c330 34 00 00 00 00 00 00 00 79 13 a3 69 f9 7f 00 00 4.......y..i.... Possible instruction pointers: 153 Qt6Core.dll + 0x181379 rsp = 0x00000032b633c340 rip = 0x00007ff969a31379 Found by: stack scanning Stack contents: 00000032b633c340 19 c4 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633c350 90 67 34 33 e8 01 00 00 34 1c 20 33 e8 01 00 00 .g43....4. 3.... 00000032b633c360 64 00 00 00 00 00 00 00 b8 c5 33 b6 32 00 00 00 d.........3.2... 00000032b633c370 34 00 00 00 00 00 00 00 b5 fc a1 69 f9 7f 00 00 4..........i.... Possible instruction pointers: 154 Qt6Core.dll + 0x16fcb5 rsp = 0x00000032b633c380 rip = 0x00007ff969a1fcb5 Found by: stack scanning Stack contents: 00000032b633c380 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 z............... 00000032b633c390 80 c5 33 b6 32 00 00 00 64 00 00 00 64 00 00 00 ..3.2...d...d... 00000032b633c3a0 32 00 00 00 22 00 00 00 64 00 08 02 00 00 00 00 2..."...d....... 00000032b633c3b0 80 67 34 33 e8 01 00 00 90 67 34 33 e8 01 00 00 .g43.....g43.... 00000032b633c3c0 34 00 00 00 00 00 00 00 60 13 a3 69 f9 7f 00 00 4.......`..i.... Possible instruction pointers: 155 Qt6Core.dll + 0x181360 rsp = 0x00000032b633c3d0 rip = 0x00007ff969a31360 Found by: stack scanning Stack contents: 00000032b633c3d0 80 67 34 33 e8 01 00 00 00 00 00 00 00 00 00 00 .g43............ 00000032b633c3e0 0f 00 10 00 b3 1f 00 00 33 00 2b 00 2b 00 53 00 ........3.+.+.S. 00000032b633c3f0 2b 00 2b 00 06 02 00 00 00 00 f9 1a 64 00 00 00 +.+.........d... 00000032b633c400 64 00 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 d.......k....... Possible instruction pointers: 156 ntdll.dll + 0x2b86b rsp = 0x00000032b633c410 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633c410 02 00 06 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 157 ntdll.dll + 0x25ba1 rsp = 0x00000032b633c420 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633c420 50 6b 03 33 e8 01 00 00 04 6f 43 35 8a c5 00 00 Pk.3.....oC5.... 00000032b633c430 d4 6d 43 35 8a c5 00 00 e0 c9 33 b6 32 00 00 00 .mC5......3.2... 00000032b633c440 00 00 00 00 32 00 00 00 40 a4 f9 1a e8 01 00 00 ....2...@....... 00000032b633c450 50 6b 03 33 e8 01 00 00 06 00 00 00 00 00 00 00 Pk.3............ 00000032b633c460 30 ce 33 b6 32 00 00 00 90 18 20 33 e8 01 00 00 0.3.2..... 3.... 00000032b633c470 02 00 00 00 00 00 00 00 c3 a9 14 d2 f9 7f 00 00 ................ Possible instruction pointers: 158 ntdll.dll + 0x1a9c3 rsp = 0x00000032b633c480 rip = 0x00007ff9d214a9c3 Found by: stack scanning Stack contents: 00000032b633c480 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c490 00 00 00 00 00 00 00 00 10 19 18 d2 f9 7f 00 00 ................ Possible instruction pointers: 159 ntdll.dll + 0x51910 rsp = 0x00000032b633c4a0 rip = 0x00007ff9d2181910 Found by: stack scanning Stack contents: 00000032b633c4a0 00 00 00 00 00 00 00 00 80 c5 33 b6 32 00 00 00 ..........3.2... 00000032b633c4b0 01 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633c4c0 e0 1b 20 33 e8 01 00 00 00 ce 33 b6 32 00 00 00 .. 3......3.2... 00000032b633c4d0 d4 68 43 35 8a c5 00 00 b1 47 15 d2 f9 7f 00 00 .hC5.....G...... Possible instruction pointers: 160 ntdll.dll + 0x247b1 rsp = 0x00000032b633c4e0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633c4e0 3a 00 00 c0 00 00 00 00 6d 2b dd cf f9 7f 00 00 :.......m+...... Possible instruction pointers: 161 KERNELBASE.dll + 0x32b6d rsp = 0x00000032b633c4f0 rip = 0x00007ff9cfdd2b6d Found by: stack scanning Stack contents: 00000032b633c4f0 03 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b633c500 00 00 00 00 00 00 00 00 20 6f fb 33 e8 01 00 00 ........ o.3.... 00000032b633c510 3a 00 00 c0 00 00 00 00 e3 2f dd cf f9 7f 00 00 :......../...... Possible instruction pointers: 162 KERNELBASE.dll + 0x32fe3 rsp = 0x00000032b633c520 rip = 0x00007ff9cfdd2fe3 Found by: stack scanning Stack contents: 00000032b633c520 34 00 00 c0 00 00 00 00 30 cb 33 b6 32 00 00 00 4.......0.3.2... 00000032b633c530 00 00 00 00 00 00 00 00 fc c5 33 b6 32 00 00 00 ..........3.2... 00000032b633c540 07 00 00 00 32 00 00 00 21 40 00 00 f9 7f 00 00 ....2...!@...... 00000032b633c550 c1 21 18 d2 f9 7f 00 00 .!...... Possible instruction pointers: 163 ntdll.dll + 0x521c1 rsp = 0x00000032b633c558 rip = 0x00007ff9d21821c1 Found by: stack scanning Stack contents: 00000032b633c558 73 2d 18 d2 f9 7f 00 00 s-...... Possible instruction pointers: 164 ntdll.dll + 0x52d73 rsp = 0x00000032b633c560 rip = 0x00007ff9d2182d73 Found by: stack scanning Stack contents: 00000032b633c560 b0 de e4 69 f9 7f 00 00 ...i.... Possible instruction pointers: 165 Qt6Core.dll + 0x59deb0 rsp = 0x00000032b633c568 rip = 0x00007ff969e4deb0 Found by: stack scanning Stack contents: 00000032b633c568 00 00 00 00 32 00 00 00 10 00 00 00 01 00 00 00 ....2........... 00000032b633c578 02 00 02 00 f9 7f 00 00 4e 1c 20 33 e8 01 00 00 ........N. 3.... 00000032b633c588 6e 00 6e 00 00 00 00 00 e0 1b 20 33 e8 01 00 00 n.n....... 3.... 00000032b633c598 70 00 72 00 00 00 00 00 20 6f fb 33 e8 01 00 00 p.r..... o.3.... 00000032b633c5a8 00 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c5b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c5c8 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 n............... 00000032b633c5d8 be 71 14 d2 f9 7f 00 00 .q...... Possible instruction pointers: 166 ntdll.dll + 0x171be rsp = 0x00000032b633c5e0 rip = 0x00007ff9d21471be Found by: stack scanning Stack contents: 00000032b633c5e0 90 c9 33 b6 32 00 00 00 30 00 00 00 32 00 00 00 ..3.2...0...2... 00000032b633c5f0 00 00 00 00 00 00 00 00 88 c5 33 b6 32 00 00 00 ..........3.2... 00000032b633c600 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 @............... 00000032b633c610 00 00 00 00 00 00 00 00 90 c9 33 b6 32 00 00 00 ..........3.2... 00000032b633c620 00 00 00 00 00 00 00 00 38 b2 14 d2 f9 7f 00 00 ........8....... Possible instruction pointers: 167 ntdll.dll + 0x1b238 rsp = 0x00000032b633c630 rip = 0x00007ff9d214b238 Found by: stack scanning Stack contents: 00000032b633c630 a0 c9 33 b6 32 00 00 00 e9 c9 33 b6 32 00 00 00 ..3.2.....3.2... 00000032b633c640 50 c9 33 b6 32 00 00 00 02 00 00 00 00 00 00 00 P.3.2........... 00000032b633c650 00 00 00 00 00 00 00 00 a0 c9 33 b6 32 00 00 00 ..........3.2... 00000032b633c660 09 00 00 00 02 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 168 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633c670 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633c670 00 00 f9 1a e8 01 00 00 07 00 00 00 00 00 00 00 ................ 00000032b633c680 7e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ~............... 00000032b633c690 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c6a0 a0 c9 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633c6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c6c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c6d0 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 169 ntdll.dll + 0x25ba1 rsp = 0x00000032b633c6e0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633c6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c710 90 8a 5b 33 e8 01 00 00 23 00 00 00 f9 7f 00 00 ..[3....#....... 00000032b633c720 e0 7e e2 33 e8 01 00 00 70 53 34 33 e8 01 00 00 .~.3....pS43.... 00000032b633c730 18 c8 33 b6 32 00 00 00 01 00 00 00 00 00 00 00 ..3.2........... 00000032b633c740 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c750 e0 7e e2 33 e8 01 00 00 00 00 00 00 00 00 00 00 .~.3............ 00000032b633c760 18 c8 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633c770 30 64 34 33 e8 01 00 00 04 00 00 00 00 00 00 00 0d43............ 00000032b633c780 e0 7e e2 33 e8 01 00 00 18 e3 ac 69 f9 7f 00 00 .~.3.......i.... Possible instruction pointers: 170 Qt6Core.dll + 0x21e318 rsp = 0x00000032b633c790 rip = 0x00007ff969ace318 Found by: stack scanning Stack contents: 00000032b633c790 80 67 34 33 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 .g43.....G...... Possible instruction pointers: 171 ntdll.dll + 0x247b1 rsp = 0x00000032b633c7a0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633c7a0 18 c8 33 b6 32 00 00 00 00 00 03 1b e8 01 00 00 ..3.2........... 00000032b633c7b0 b9 c8 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633c7c0 00 00 00 00 00 00 00 00 87 d2 a2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 172 Qt6Core.dll + 0x17d287 rsp = 0x00000032b633c7d0 rip = 0x00007ff969a2d287 Found by: stack scanning Stack contents: 00000032b633c7d0 01 00 00 00 00 00 00 00 5b f0 7e cf f9 7f 00 00 ........[.~..... Possible instruction pointers: 173 ucrtbase.dll + 0xf05b rsp = 0x00000032b633c7e0 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b633c7e0 c8 c9 33 b6 32 00 00 00 a1 5b 15 d2 f9 7f 00 00 ..3.2....[...... Possible instruction pointers: 174 ntdll.dll + 0x25ba1 rsp = 0x00000032b633c7f0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633c7f0 78 c8 33 b6 32 00 00 00 48 65 c7 69 f9 7f 00 00 x.3.2...He.i.... Possible instruction pointers: 175 Qt6Core.dll + 0x3c6548 rsp = 0x00000032b633c800 rip = 0x00007ff969c76548 Found by: stack scanning Stack contents: 00000032b633c800 ff ff ff ff 00 00 00 00 46 03 ad 69 f9 7f 00 00 ........F..i.... Possible instruction pointers: 176 Qt6Core.dll + 0x220346 rsp = 0x00000032b633c810 rip = 0x00007ff969ad0346 Found by: stack scanning Stack contents: 00000032b633c810 78 c8 33 b6 32 00 00 00 00 00 00 00 e8 01 00 00 x.3.2........... 00000032b633c820 50 6b 03 33 e8 01 00 00 06 00 00 00 00 00 00 00 Pk.3............ 00000032b633c830 00 4c 1d 34 e8 01 00 00 90 18 20 33 e8 01 00 00 .L.4...... 3.... 00000032b633c840 04 00 00 00 00 00 00 00 80 67 34 33 e8 01 00 00 .........g43.... 00000032b633c850 00 00 f9 1a e8 01 00 00 32 00 00 00 00 00 00 00 ........2....... 00000032b633c860 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 177 ntdll.dll + 0x25ba1 rsp = 0x00000032b633c870 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633c870 00 00 00 00 00 00 00 00 20 64 34 33 e8 01 00 00 ........ d43.... 00000032b633c880 f8 fd f2 33 e8 01 00 00 01 00 00 00 00 00 00 00 ...3............ 00000032b633c890 c1 a9 6e 37 b6 f7 00 00 87 d2 a2 69 f9 7f 00 00 ..n7.......i.... Possible instruction pointers: 178 Qt6Core.dll + 0x17d287 rsp = 0x00000032b633c8a0 rip = 0x00007ff969a2d287 Found by: stack scanning Stack contents: 00000032b633c8a0 08 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b633c8b0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ................ 00000032b633c8c0 08 00 00 00 00 00 00 00 40 98 d4 69 f9 7f 00 00 ........@..i.... Possible instruction pointers: 179 Qt6Core.dll + 0x499840 rsp = 0x00000032b633c8d0 rip = 0x00007ff969d49840 Found by: stack scanning Stack contents: 00000032b633c8d0 20 bb 15 34 e8 01 00 00 fa b5 b6 69 f9 7f 00 00 ..4.......i.... Possible instruction pointers: 180 Qt6Core.dll + 0x2bb5fa rsp = 0x00000032b633c8e0 rip = 0x00007ff969b6b5fa Found by: stack scanning Stack contents: 00000032b633c8e0 00 00 00 00 00 00 00 00 20 bb 15 34 e8 01 00 00 ........ ..4.... 00000032b633c8f0 e0 7e e2 33 e8 01 00 00 00 00 00 00 00 00 00 00 .~.3............ 00000032b633c900 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633c910 01 7e e2 33 00 00 00 00 30 ce 33 b6 32 00 00 00 .~.3....0.3.2... 00000032b633c920 84 64 43 35 8a c5 00 00 b1 47 15 d2 f9 7f 00 00 .dC5.....G...... Possible instruction pointers: 181 ntdll.dll + 0x247b1 rsp = 0x00000032b633c930 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633c930 b0 cb 33 b6 32 00 00 00 6d 2b dd cf f9 7f 00 00 ..3.2...m+...... Possible instruction pointers: 182 KERNELBASE.dll + 0x32b6d rsp = 0x00000032b633c940 rip = 0x00007ff9cfdd2b6d Found by: stack scanning Stack contents: 00000032b633c940 02 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b633c950 00 00 00 00 00 00 00 00 30 64 34 33 e8 01 00 00 ........0d43.... 00000032b633c960 b0 cb 33 b6 32 00 00 00 0f 4f dd cf f9 7f 00 00 ..3.2....O...... Possible instruction pointers: 183 KERNELBASE.dll + 0x34f0f rsp = 0x00000032b633c970 rip = 0x00007ff9cfdd4f0f Found by: stack scanning Stack contents: 00000032b633c970 b0 cb 33 b6 32 00 00 00 e0 1b 20 33 e8 01 00 00 ..3.2..... 3.... 00000032b633c980 1c d6 05 d0 f9 7f 00 00 ........ Possible instruction pointers: 184 KERNELBASE.dll + 0x2bd61c rsp = 0x00000032b633c988 rip = 0x00007ff9d005d61c Found by: stack scanning Stack contents: 00000032b633c988 c1 21 18 d2 f9 7f 00 00 .!...... Possible instruction pointers: 185 ntdll.dll + 0x521c1 rsp = 0x00000032b633c990 rip = 0x00007ff9d21821c1 Found by: stack scanning Stack contents: 00000032b633c990 01 80 00 00 00 00 00 00 87 d2 a2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 186 Qt6Core.dll + 0x17d287 rsp = 0x00000032b633c9a0 rip = 0x00007ff969a2d287 Found by: stack scanning Stack contents: 00000032b633c9a0 07 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 ................ 00000032b633c9b0 70 ca 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 p.3.2........... 00000032b633c9c0 07 00 00 00 00 00 00 00 b0 85 d2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 187 Qt6Core.dll + 0x4785b0 rsp = 0x00000032b633c9d0 rip = 0x00007ff969d285b0 Found by: stack scanning Stack contents: 00000032b633c9d0 00 00 00 00 00 00 00 00 f4 da db cf f9 7f 00 00 ................ Possible instruction pointers: 188 KERNELBASE.dll + 0x1daf4 rsp = 0x00000032b633c9e0 rip = 0x00007ff9cfdbdaf4 Found by: stack scanning Stack contents: 00000032b633c9e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633c9f0 08 00 00 00 00 00 00 00 40 98 d4 69 f9 7f 00 00 ........@..i.... Possible instruction pointers: 189 Qt6Core.dll + 0x499840 rsp = 0x00000032b633ca00 rip = 0x00007ff969d49840 Found by: stack scanning Stack contents: 00000032b633ca00 00 00 00 00 00 00 00 00 b0 85 d2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 190 Qt6Core.dll + 0x4785b0 rsp = 0x00000032b633ca10 rip = 0x00007ff969d285b0 Found by: stack scanning Stack contents: 00000032b633ca10 07 00 00 00 00 00 00 00 aa da db cf f9 7f 00 00 ................ Possible instruction pointers: 191 KERNELBASE.dll + 0x1daaa rsp = 0x00000032b633ca20 rip = 0x00007ff9cfdbdaaa Found by: stack scanning Stack contents: 00000032b633ca20 00 80 00 00 e8 01 00 00 30 64 34 33 e8 01 00 00 ........0d43.... 00000032b633ca30 08 00 00 00 00 00 00 00 40 98 d4 69 f9 7f 00 00 ........@..i.... Possible instruction pointers: 192 Qt6Core.dll + 0x499840 rsp = 0x00000032b633ca40 rip = 0x00007ff969d49840 Found by: stack scanning Stack contents: 00000032b633ca40 30 fe f2 33 e8 01 00 00 86 93 ac 69 f9 7f 00 00 0..3.......i.... Possible instruction pointers: 193 Qt6Core.dll + 0x219386 rsp = 0x00000032b633ca50 rip = 0x00007ff969ac9386 Found by: stack scanning Stack contents: 00000032b633ca50 00 80 00 00 00 00 00 00 00 00 77 0a 00 00 00 00 ..........w..... 00000032b633ca60 00 00 00 00 00 00 00 00 30 fe f2 33 e8 01 00 00 ........0..3.... 00000032b633ca70 60 1a 20 33 e8 01 00 00 70 1a 20 33 e8 01 00 00 `. 3....p. 3.... 00000032b633ca80 32 00 00 00 00 00 00 00 20 64 34 33 e8 01 00 00 2....... d43.... 00000032b633ca90 30 64 34 33 e8 01 00 00 36 00 00 00 00 00 00 00 0d43....6....... 00000032b633caa0 fe ff fe ff 00 00 00 00 48 d1 33 b6 32 00 00 00 ........H.3.2... 00000032b633cab0 40 d1 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 @.3.2........... 00000032b633cac0 28 e9 de 2f e8 01 00 00 60 1a 20 33 e8 01 00 00 (../....`. 3.... 00000032b633cad0 70 1a 20 33 e8 01 00 00 32 00 00 00 00 00 00 00 p. 3....2....... 00000032b633cae0 04 00 00 00 00 00 00 00 b8 85 d2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 194 Qt6Core.dll + 0x4785b8 rsp = 0x00000032b633caf0 rip = 0x00007ff969d285b8 Found by: stack scanning Stack contents: 00000032b633caf0 4f 00 10 00 b3 1f 00 00 33 00 2b 00 2b 00 53 00 O.......3.+.+.S. 00000032b633cb00 04 00 00 00 00 00 00 00 b8 85 d2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 195 Qt6Core.dll + 0x4785b8 rsp = 0x00000032b633cb10 rip = 0x00007ff969d285b8 Found by: stack scanning Stack contents: 00000032b633cb10 20 64 34 33 e8 01 00 00 30 64 34 33 e8 01 00 00 d43....0d43.... 00000032b633cb20 36 00 00 00 00 00 00 00 66 00 00 00 00 00 00 00 6.......f....... 00000032b633cb30 01 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 ................ 00000032b633cb40 20 64 34 33 e8 01 00 00 30 64 34 33 e8 01 00 00 d43....0d43.... 00000032b633cb50 36 00 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 6.......k....... Possible instruction pointers: 196 ntdll.dll + 0x2b86b rsp = 0x00000032b633cb60 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633cb60 07 00 01 00 00 00 00 00 37 00 00 00 00 00 00 00 ........7....... 00000032b633cb70 50 09 2d 33 e8 01 00 00 2c 38 15 d2 f9 7f 00 00 P.-3....,8...... Possible instruction pointers: 197 ntdll.dll + 0x2382c rsp = 0x00000032b633cb80 rip = 0x00007ff9d215382c Found by: stack scanning Stack contents: 00000032b633cb80 00 00 03 1b e8 01 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633cb90 00 00 00 00 e8 01 00 00 80 b8 f9 1a e8 01 00 00 ................ 00000032b633cba0 70 a4 ea 33 e8 01 00 00 00 00 f9 1a e8 01 00 00 p..3............ 00000032b633cbb0 20 03 f9 1a e8 01 00 00 99 b6 dd cf f9 7f 00 00 ............... Possible instruction pointers: 198 KERNELBASE.dll + 0x3b699 rsp = 0x00000032b633cbc0 rip = 0x00007ff9cfddb699 Found by: stack scanning Stack contents: 00000032b633cbc0 00 02 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 ................ 00000032b633cbd0 1a 01 49 00 00 00 00 00 00 00 00 00 00 00 00 00 ..I............. 00000032b633cbe0 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 ................ 00000032b633cbf0 f0 01 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b633cc00 00 00 03 1b e8 01 00 00 c9 cc 33 b6 32 00 00 00 ..........3.2... 00000032b633cc10 20 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ............... Possible instruction pointers: 199 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633cc20 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633cc20 00 00 f9 1a e8 01 00 00 07 00 00 00 00 00 00 00 ................ 00000032b633cc30 f0 01 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b633cc40 a8 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .B.............. 00000032b633cc50 00 00 00 00 02 00 00 00 80 6a f9 1a e8 01 00 00 .........j...... 00000032b633cc60 1c 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 200 ntdll.dll + 0x25ba1 rsp = 0x00000032b633cc70 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633cc70 50 09 2d 33 e8 01 00 00 00 00 00 00 00 00 00 00 P.-3............ 00000032b633cc80 50 00 00 00 00 00 00 00 a0 f1 f2 33 e8 01 00 00 P..........3.... 00000032b633cc90 00 00 f9 1a e8 01 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 201 ntdll.dll + 0x25ba1 rsp = 0x00000032b633cca0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633cca0 00 00 f9 1a e8 01 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633ccb0 3a 00 00 00 00 00 00 00 a0 6c fb 33 e8 01 00 00 :........l.3.... 00000032b633ccc0 00 00 03 1b e8 01 00 00 6b b8 15 d2 f9 7f 00 00 ........k....... Possible instruction pointers: 202 ntdll.dll + 0x2b86b rsp = 0x00000032b633ccd0 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633ccd0 70 7f e2 33 e8 01 00 00 ff ff ff ff ff ff ff ff p..3............ 00000032b633cce0 40 c1 cb 69 f9 7f 00 00 @..i.... Possible instruction pointers: 203 Qt6Core.dll + 0x40c140 rsp = 0x00000032b633cce8 rip = 0x00007ff969cbc140 Found by: stack scanning Stack contents: 00000032b633cce8 00 00 00 00 00 00 00 00 70 7f e2 33 e8 01 00 00 ........p..3.... 00000032b633ccf8 ff ff ff ff ff ff ff ff 40 c1 cb 69 f9 7f 00 00 ........@..i.... Possible instruction pointers: 204 Qt6Core.dll + 0x40c140 rsp = 0x00000032b633cd08 rip = 0x00007ff969cbc140 Found by: stack scanning Stack contents: 00000032b633cd08 00 00 00 00 00 00 00 00 d8 d0 33 b6 32 00 00 00 ..........3.2... 00000032b633cd18 40 7f e2 33 e8 01 00 00 d0 ce 33 b6 32 00 00 00 @..3......3.2... 00000032b633cd28 e6 fd 7e cf f9 7f 00 00 ..~..... Possible instruction pointers: 205 ucrtbase.dll + 0xfde6 rsp = 0x00000032b633cd30 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b633cd30 00 00 00 00 00 00 00 00 89 55 c4 69 f9 7f 00 00 .........U.i.... Possible instruction pointers: 206 Qt6Core.dll + 0x395589 rsp = 0x00000032b633cd40 rip = 0x00007ff969c45589 Found by: stack scanning Stack contents: 00000032b633cd40 f0 f3 f2 33 e8 01 00 00 00 00 00 00 00 00 00 00 ...3............ 00000032b633cd50 d8 d0 33 b6 32 00 00 00 a3 56 c4 69 f9 7f 00 00 ..3.2....V.i.... Possible instruction pointers: 207 Qt6Core.dll + 0x3956a3 rsp = 0x00000032b633cd60 rip = 0x00007ff969c456a3 Found by: stack scanning Stack contents: 00000032b633cd60 01 01 00 00 00 00 00 00 04 00 00 00 00 00 00 00 ................ 00000032b633cd70 70 7f e2 33 e8 01 00 00 ff ff ff ff ff ff ff ff p..3............ 00000032b633cd80 d8 d0 33 b6 32 00 00 00 e9 06 90 69 f9 7f 00 00 ..3.2......i.... Possible instruction pointers: 208 Qt6Core.dll + 0x506e9 rsp = 0x00000032b633cd90 rip = 0x00007ff9699006e9 Found by: stack scanning Stack contents: 00000032b633cd90 c8 01 f3 33 e8 01 00 00 08 00 00 00 00 00 00 00 ...3............ 00000032b633cda0 f0 ff f2 33 e8 01 00 00 80 41 8b 69 f9 7f 00 00 ...3.....A.i.... Possible instruction pointers: 209 Qt6Core.dll + 0x4180 rsp = 0x00000032b633cdb0 rip = 0x00007ff9698b4180 Found by: stack scanning Stack contents: 00000032b633cdb0 f0 0f a4 69 f9 7f 00 00 ...i.... Possible instruction pointers: 210 Qt6Core.dll + 0x190ff0 rsp = 0x00000032b633cdb8 rip = 0x00007ff969a40ff0 Found by: stack scanning Stack contents: 00000032b633cdb8 40 7f e2 33 e8 01 00 00 20 bb 15 34 e8 01 00 00 @..3.... ..4.... 00000032b633cdc8 14 b2 8f 69 f9 7f 00 00 ...i.... Possible instruction pointers: 211 Qt6Core.dll + 0x4b214 rsp = 0x00000032b633cdd0 rip = 0x00007ff9698fb214 Found by: stack scanning Stack contents: 00000032b633cdd0 f0 ff f2 33 e8 01 00 00 e0 7e e2 33 e8 01 00 00 ...3.....~.3.... 00000032b633cde0 d0 ce 33 b6 32 00 00 00 40 7f e2 33 e8 01 00 00 ..3.2...@..3.... 00000032b633cdf0 80 d0 33 b6 32 00 00 00 5c 00 00 00 00 00 00 00 ..3.2...\....... 00000032b633ce00 d0 07 fd 32 02 00 00 00 b1 47 15 d2 f9 7f 00 00 ...2.....G...... Possible instruction pointers: 212 ntdll.dll + 0x247b1 rsp = 0x00000032b633ce10 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633ce10 88 ce 33 b6 32 00 00 00 6b b8 15 d2 f9 7f 00 00 ..3.2...k....... Possible instruction pointers: 213 ntdll.dll + 0x2b86b rsp = 0x00000032b633ce20 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633ce20 0a 00 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 ..\............. 00000032b633ce30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ce40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ce50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ce60 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633ce70 ff ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00 ................ 00000032b633ce80 38 cf 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 8.3.2........... 00000032b633ce90 01 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 214 ucrtbase.dll + 0xfde6 rsp = 0x00000032b633cea0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b633cea0 58 7f e2 33 e8 01 00 00 00 00 00 00 00 00 00 00 X..3............ 00000032b633ceb0 e0 7e e2 33 e8 01 00 00 00 00 00 00 00 00 00 00 .~.3............ 00000032b633cec0 08 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633ced0 01 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 215 ucrtbase.dll + 0xfde6 rsp = 0x00000032b633cee0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b633cee0 00 00 00 00 00 00 00 00 20 00 00 00 00 00 00 00 ........ ....... 00000032b633cef0 38 bb 15 34 e8 01 00 00 00 00 9f 69 f9 7f 00 00 8..4.......i.... Possible instruction pointers: 216 Qt6Core.dll + 0x140000 rsp = 0x00000032b633cf00 rip = 0x00007ff9699f0000 Found by: stack scanning Stack contents: 00000032b633cf00 08 00 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 ........k....... Possible instruction pointers: 217 ntdll.dll + 0x2b86b rsp = 0x00000032b633cf10 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633cf10 02 00 02 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 ........k....... Possible instruction pointers: 218 ntdll.dll + 0x2b86b rsp = 0x00000032b633cf20 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633cf20 1b 00 1d 00 00 00 00 00 3b 00 00 00 00 00 00 00 ........;....... 00000032b633cf30 90 8a 5b 33 e8 01 00 00 2b 50 a5 69 f9 7f 00 00 ..[3....+P.i.... Possible instruction pointers: 219 Qt6Core.dll + 0x1a502b rsp = 0x00000032b633cf40 rip = 0x00007ff969a5502b Found by: stack scanning Stack contents: 00000032b633cf40 00 00 00 00 00 00 00 00 c0 7e f9 1a e8 01 00 00 .........~...... 00000032b633cf50 00 00 00 00 00 00 00 00 00 57 f9 1a e8 01 00 00 .........W...... 00000032b633cf60 e4 02 f9 1a e8 01 00 00 00 00 f9 1a e8 01 00 00 ................ 00000032b633cf70 c4 02 f9 1a e8 01 00 00 10 0e f9 1a e8 01 00 00 ................ 00000032b633cf80 90 00 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 ................ 00000032b633cf90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633cfa0 00 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 ................ 00000032b633cfb0 80 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633cfc0 00 00 03 1b e8 01 00 00 89 d0 33 b6 32 00 00 00 ..........3.2... 00000032b633cfd0 09 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 220 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633cfe0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633cfe0 00 00 f9 1a e8 01 00 00 07 00 00 00 e8 01 00 00 ................ 00000032b633cff0 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d000 e0 7e e2 33 02 00 00 00 00 00 00 00 00 00 00 00 .~.3............ 00000032b633d010 f0 fd f2 33 02 00 00 00 b1 47 15 d2 f9 7f 00 00 ...3.....G...... Possible instruction pointers: 221 ntdll.dll + 0x247b1 rsp = 0x00000032b633d020 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633d020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d030 c0 d1 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633d040 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d050 03 00 00 00 00 00 00 00 5b f0 7e cf f9 7f 00 00 ........[.~..... Possible instruction pointers: 222 ucrtbase.dll + 0xf05b rsp = 0x00000032b633d060 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b633d060 f0 fd f2 33 e8 01 00 00 01 00 00 00 00 00 00 00 ...3............ 00000032b633d070 04 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b633d080 f0 fd f2 33 e8 01 00 00 c5 0d 90 69 f9 7f 00 00 ...3.......i.... Possible instruction pointers: 223 Qt6Core.dll + 0x50dc5 rsp = 0x00000032b633d090 rip = 0x00007ff969900dc5 Found by: stack scanning Stack contents: 00000032b633d090 70 fe f2 33 e8 01 00 00 00 00 00 00 00 00 00 00 p..3............ 00000032b633d0a0 60 d5 33 b6 32 00 00 00 3a 00 00 00 00 00 00 00 `.3.2...:....... 00000032b633d0b0 20 d5 33 b6 32 00 00 00 1c 00 00 00 00 00 00 00 .3.2........... 00000032b633d0c0 10 d5 33 b6 32 00 00 00 1e 00 00 00 00 00 00 00 ..3.2........... 00000032b633d0d0 e8 d1 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633d0e0 f0 d4 33 b6 32 00 00 00 e6 fd 7e cf f9 7f 00 00 ..3.2.....~..... Possible instruction pointers: 224 ucrtbase.dll + 0xfde6 rsp = 0x00000032b633d0f0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b633d0f0 00 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 ................ 00000032b633d100 d8 d1 33 b6 32 00 00 00 76 0f 95 69 f9 7f 00 00 ..3.2...v..i.... Possible instruction pointers: 225 Qt6Core.dll + 0xa0f76 rsp = 0x00000032b633d110 rip = 0x00007ff969950f76 Found by: stack scanning Stack contents: 00000032b633d110 e8 d1 33 b6 32 00 00 00 b1 4f a5 69 f9 7f 00 00 ..3.2....O.i.... Possible instruction pointers: 226 Qt6Core.dll + 0x1a4fb1 rsp = 0x00000032b633d120 rip = 0x00007ff969a54fb1 Found by: stack scanning Stack contents: 00000032b633d120 37 00 00 00 00 00 00 00 20 bb 15 34 e8 01 00 00 7....... ..4.... 00000032b633d130 3a 00 00 00 00 00 00 00 e0 3b 0b 1b e8 01 00 00 :........;...... 00000032b633d140 38 3c 0b 1b e8 01 00 00 01 74 a2 69 f9 7f 00 00 8<.......t.i.... Possible instruction pointers: 227 Qt6Core.dll + 0x177401 rsp = 0x00000032b633d150 rip = 0x00007ff969a27401 Found by: stack scanning Stack contents: 00000032b633d150 39 00 00 00 32 00 00 00 14 00 00 00 00 00 00 00 9...2........... 00000032b633d160 10 d5 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633d170 01 00 00 00 00 00 00 00 30 dd 33 b6 32 00 00 00 ........0.3.2... 00000032b633d180 10 6f fb 33 e8 01 00 00 20 6f fb 33 e8 01 00 00 .o.3.... o.3.... 00000032b633d190 c0 72 34 33 e8 01 00 00 00 00 00 00 00 00 00 00 .r43............ 00000032b633d1a0 00 00 00 00 00 00 00 00 3a 00 00 00 00 00 00 00 ........:....... 00000032b633d1b0 01 01 00 00 00 00 00 00 1c 00 00 00 00 00 00 00 ................ 00000032b633d1c0 01 01 00 00 00 00 00 00 d0 72 34 33 e8 01 00 00 .........r43.... 00000032b633d1d0 01 01 00 00 00 00 00 00 1c 00 00 00 00 00 00 00 ................ 00000032b633d1e0 d0 72 34 33 e8 01 00 00 1c 00 00 00 00 00 00 00 .r43............ 00000032b633d1f0 1c 00 00 00 00 00 00 00 df f7 bc 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 228 Qt6Core.dll + 0x31f7df rsp = 0x00000032b633d200 rip = 0x00007ff969bcf7df Found by: stack scanning Stack contents: 00000032b633d200 00 00 00 00 00 00 00 00 60 1d 20 33 e8 01 00 00 ........`. 3.... 00000032b633d210 00 00 00 00 00 00 00 00 f0 d4 33 b6 32 00 00 00 ..........3.2... 00000032b633d220 1c 00 00 00 00 00 00 00 d5 2f cf a3 f9 7f 00 00 ........./...... Possible instruction pointers: 229 Qt6PrintSupport.dll + 0x32fd5 rsp = 0x00000032b633d230 rip = 0x00007ff9a3cf2fd5 Found by: stack scanning Stack contents: 00000032b633d230 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d240 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d250 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d260 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b633d270 00 00 00 00 e8 01 00 00 80 6a f9 1a e8 01 00 00 .........j...... 00000032b633d280 60 64 30 23 e8 01 00 00 00 00 f9 1a e8 01 00 00 `d0#............ 00000032b633d290 b4 02 f9 1a e8 01 00 00 b1 47 15 d2 f9 7f 00 00 .........G...... Possible instruction pointers: 230 ntdll.dll + 0x247b1 rsp = 0x00000032b633d2a0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633d2a0 50 00 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 P............... 00000032b633d2b0 10 d4 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633d2c0 00 00 00 00 00 00 00 00 50 00 00 00 00 00 00 00 ........P....... 00000032b633d2d0 40 00 00 00 00 00 00 00 20 00 00 00 00 00 00 00 @....... ....... 00000032b633d2e0 00 00 03 1b e8 01 00 00 a9 d3 33 b6 32 00 00 00 ..........3.2... 00000032b633d2f0 05 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 231 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633d300 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633d300 00 00 f9 1a e8 01 00 00 07 00 00 00 f9 7f 00 00 ................ 00000032b633d310 40 00 00 00 00 00 00 00 00 00 00 00 e8 01 00 00 @............... 00000032b633d320 10 d4 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633d330 00 00 00 00 02 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 232 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633d340 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633d340 00 00 f9 1a e8 01 00 00 21 ca a3 69 f9 7f 00 00 ........!..i.... Possible instruction pointers: 233 Qt6Core.dll + 0x18ca21 rsp = 0x00000032b633d350 rip = 0x00007ff969a3ca21 Found by: stack scanning Stack contents: 00000032b633d350 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 x............... 00000032b633d360 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b633d370 90 ee 33 b6 32 00 00 00 a1 5b 15 d2 f9 7f 00 00 ..3.2....[...... Possible instruction pointers: 234 ntdll.dll + 0x25ba1 rsp = 0x00000032b633d380 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633d380 c0 09 f0 22 e8 01 00 00 e0 19 20 33 e8 01 00 00 ..."...... 3.... 00000032b633d390 00 00 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 ........k....... Possible instruction pointers: 235 ntdll.dll + 0x2b86b rsp = 0x00000032b633d3a0 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633d3a0 03 00 03 00 00 00 00 00 38 00 00 00 00 00 00 00 ........8....... 00000032b633d3b0 90 8a 5b 33 e8 01 00 00 37 00 00 00 00 00 00 00 ..[3....7....... 00000032b633d3c0 91 f3 cc 3d cb e0 00 00 70 53 34 33 e8 01 00 00 ...=....pS43.... 00000032b633d3d0 61 f0 cc 3d cb e0 00 00 3a 00 00 00 00 00 00 00 a..=....:....... 00000032b633d3e0 00 00 f9 1a e8 01 00 00 1c 00 00 00 00 00 00 00 ................ 00000032b633d3f0 02 00 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 ........k....... Possible instruction pointers: 236 ntdll.dll + 0x2b86b rsp = 0x00000032b633d400 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633d400 01 00 03 00 00 00 00 00 3c 00 00 00 00 00 00 00 ........<....... 00000032b633d410 80 c1 0a 1e e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d420 b0 0f fd 32 e8 01 00 00 20 07 0a 1b e8 01 00 00 ...2.... ....... 00000032b633d430 00 00 00 00 e8 01 00 00 40 26 f9 1a e8 01 00 00 ........@&...... 00000032b633d440 10 d5 33 b6 32 00 00 00 00 00 f9 1a e8 01 00 00 ..3.2........... 00000032b633d450 a4 03 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d460 10 04 00 00 00 00 00 00 c0 0c f9 1a e8 01 00 00 ................ 00000032b633d470 01 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633d480 00 00 00 00 00 00 00 00 10 04 00 00 00 00 00 00 ................ 00000032b633d490 00 00 00 00 00 00 00 00 8a 35 15 d2 f9 7f 00 00 .........5...... Possible instruction pointers: 237 ntdll.dll + 0x2358a rsp = 0x00000032b633d4a0 rip = 0x00007ff9d215358a Found by: stack scanning Stack contents: 00000032b633d4a0 00 00 03 1b e8 01 00 00 69 d5 33 b6 32 00 00 00 ........i.3.2... 00000032b633d4b0 41 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 A............... Possible instruction pointers: 238 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633d4c0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633d4c0 00 c2 0a 1e e8 01 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 239 ntdll.dll + 0x25ba1 rsp = 0x00000032b633d4d0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b633d4d0 00 04 00 00 00 00 00 00 02 00 00 00 ff ff ff ff ................ 00000032b633d4e0 a8 1d 20 33 e8 01 00 00 90 18 20 33 e8 01 00 00 .. 3...... 3.... 00000032b633d4f0 10 d5 33 b6 02 00 00 00 fd ff ff ff ff ff ff ff ..3............. 00000032b633d500 00 c2 0a 1e e8 01 00 00 0d 00 00 00 f9 7f 00 00 ................ 00000032b633d510 68 d6 33 b6 32 00 00 00 e0 67 b9 1e e8 01 00 00 h.3.2....g...... 00000032b633d520 68 d6 33 b6 32 00 00 00 99 d5 33 b6 32 00 00 00 h.3.2.....3.2... 00000032b633d530 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d540 b0 0f fd 32 e8 01 00 00 20 07 0a 1b e8 01 00 00 ...2.... ....... 00000032b633d550 60 1d 20 33 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 `. 3.....G...... Possible instruction pointers: 240 ntdll.dll + 0x247b1 rsp = 0x00000032b633d560 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633d560 00 00 03 1b e8 01 00 00 00 00 03 1b e8 01 00 00 ................ 00000032b633d570 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 ................ 00000032b633d580 00 83 b9 1e e8 01 00 00 b1 47 15 d2 f9 7f 00 00 .........G...... Possible instruction pointers: 241 ntdll.dll + 0x247b1 rsp = 0x00000032b633d590 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b633d590 00 00 03 1b e8 01 00 00 00 00 03 1b e8 01 00 00 ................ 00000032b633d5a0 00 83 b9 1e e8 01 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633d5b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d5c0 00 02 00 00 00 00 00 00 4f 1c 15 d2 f9 7f 00 00 ........O....... Possible instruction pointers: 242 ntdll.dll + 0x21c4f rsp = 0x00000032b633d5d0 rip = 0x00007ff9d2151c4f Found by: stack scanning Stack contents: 00000032b633d5d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d5e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d5f0 ff ff ff ff 00 00 00 00 d8 52 9b 69 f9 7f 00 00 .........R.i.... Possible instruction pointers: 243 Qt6Core.dll + 0x1052d8 rsp = 0x00000032b633d600 rip = 0x00007ff9699b52d8 Found by: stack scanning Stack contents: 00000032b633d600 00 00 00 00 00 00 00 00 59 d6 33 b6 32 00 00 00 ........Y.3.2... 00000032b633d610 00 00 00 00 e8 01 00 00 f0 82 b9 1e e8 01 00 00 ................ 00000032b633d620 00 00 00 00 00 00 00 00 94 2f cf a3 f9 7f 00 00 ........./...... Possible instruction pointers: 244 Qt6PrintSupport.dll + 0x32f94 rsp = 0x00000032b633d630 rip = 0x00007ff9a3cf2f94 Found by: stack scanning Stack contents: 00000032b633d630 00 02 00 00 00 00 00 00 00 00 00 00 32 00 00 00 ............2... 00000032b633d640 09 00 00 00 00 00 00 00 40 16 1d 23 e8 01 00 00 ........@..#.... 00000032b633d650 00 00 00 00 00 00 00 00 00 00 03 1b e8 01 00 00 ................ 00000032b633d660 09 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b633d670 60 1d 20 33 e8 01 00 00 a0 00 00 00 00 00 00 00 `. 3............ 00000032b633d680 61 f4 cc 3d cb e0 00 00 80 00 00 00 00 00 00 00 a..=............ 00000032b633d690 33 00 00 00 00 00 00 00 68 d8 33 b6 32 00 00 00 3.......h.3.2... 00000032b633d6a0 7e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ~............... 00000032b633d6b0 c0 d7 33 b6 32 00 00 00 ba 8f 9b 69 f9 7f 00 00 ..3.2......i.... Possible instruction pointers: 245 Qt6Core.dll + 0x108fba rsp = 0x00000032b633d6c0 rip = 0x00007ff9699b8fba Found by: stack scanning Stack contents: 00000032b633d6c0 c0 02 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d6d0 80 00 00 00 00 00 00 00 28 07 0a 1b e8 01 00 00 ........(....... 00000032b633d6e0 01 00 00 00 00 00 00 00 33 00 00 00 00 00 00 00 ........3....... 00000032b633d6f0 33 00 00 00 00 00 00 00 b0 0f fd 32 e8 01 00 00 3..........2.... 00000032b633d700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d720 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d730 f0 82 b9 1e e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d740 00 00 03 1b e8 01 00 00 2c 38 15 d2 f9 7f 00 00 ........,8...... Possible instruction pointers: 246 ntdll.dll + 0x2382c rsp = 0x00000032b633d750 rip = 0x00007ff9d215382c Found by: stack scanning Stack contents: 00000032b633d750 00 00 03 1b e8 01 00 00 02 00 00 00 f9 7f 00 00 ................ 00000032b633d760 00 83 b9 1e e8 01 00 00 00 04 00 00 00 00 00 00 ................ 00000032b633d770 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 E............... 00000032b633d780 00 00 03 1b e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d790 05 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 247 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633d7a0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633d7a0 00 00 f9 1a e8 01 00 00 07 00 00 00 00 00 00 00 ................ 00000032b633d7b0 45 00 00 00 00 00 00 00 00 00 00 00 32 00 00 00 E...........2... 00000032b633d7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d7e0 30 dd 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 0.3.2........... 00000032b633d7f0 88 da 33 b6 32 00 00 00 b8 66 63 69 f9 7f 00 00 ..3.2....fci.... Possible instruction pointers: 248 Qt6Gui.dll + 0x6466b8 rsp = 0x00000032b633d800 rip = 0x00007ff9696366b8 Found by: stack scanning Stack contents: 00000032b633d800 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d810 20 d9 33 b6 32 00 00 00 6b b8 15 d2 f9 7f 00 00 .3.2...k....... Possible instruction pointers: 249 ntdll.dll + 0x2b86b rsp = 0x00000032b633d820 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b633d820 1b 00 37 00 00 00 00 00 3d 00 00 00 00 00 00 00 ..7.....=....... 00000032b633d830 90 8a 5b 33 e8 01 00 00 e6 fd 7e cf f9 7f 00 00 ..[3......~..... Possible instruction pointers: 250 ucrtbase.dll + 0xfde6 rsp = 0x00000032b633d840 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b633d840 01 00 00 00 00 00 00 00 76 00 00 00 00 00 00 00 ........v....... 00000032b633d850 00 00 00 00 8a c5 00 00 00 57 f9 1a e8 01 00 00 .........W...... 00000032b633d860 d8 d8 33 b6 32 00 00 00 00 00 f9 1a e8 01 00 00 ..3.2........... 00000032b633d870 c4 02 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d880 90 00 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 ................ 00000032b633d890 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d8a0 00 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 ................ 00000032b633d8b0 88 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b633d8c0 00 00 03 1b e8 01 00 00 89 d9 33 b6 32 00 00 00 ..........3.2... 00000032b633d8d0 09 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 251 ntdll.dll + 0x2b3c7 rsp = 0x00000032b633d8e0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b633d8e0 00 00 f9 1a e8 01 00 00 07 00 00 00 f9 7f 00 00 ................ 00000032b633d8f0 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d900 00 83 b9 1e e8 01 00 00 90 26 7f cf f9 7f 00 00 .........&...... Possible instruction pointers: 252 ucrtbase.dll + 0x12690 rsp = 0x00000032b633d910 rip = 0x00007ff9cf7f2690 Found by: stack scanning Stack contents: 00000032b633d910 00 02 00 00 02 00 00 00 fc 24 7f cf f9 7f 00 00 .........$...... Possible instruction pointers: 253 ucrtbase.dll + 0x124fc rsp = 0x00000032b633d920 rip = 0x00007ff9cf7f24fc Found by: stack scanning Stack contents: 00000032b633d920 00 04 00 00 00 00 00 00 80 00 00 00 00 00 00 00 ................ 00000032b633d930 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d940 80 00 00 00 00 00 00 00 b6 4b ae 69 f9 7f 00 00 .........K.i.... Possible instruction pointers: 254 Qt6Core.dll + 0x234bb6 rsp = 0x00000032b633d950 rip = 0x00007ff969ae4bb6 Found by: stack scanning Stack contents: 00000032b633d950 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 @............... 00000032b633d960 00 83 b9 1e e8 01 00 00 21 8a cc 3d cb e0 00 00 ........!..=.... 00000032b633d970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d9a0 00 00 00 00 00 00 00 00 30 dd 33 b6 32 00 00 00 ........0.3.2... 00000032b633d9b0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b633d9c0 c0 da 33 b6 32 00 00 00 b9 e2 37 69 f9 7f 00 00 ..3.2.....7i.... Possible instruction pointers: 255 Qt6Gui.dll + 0x38e2b9 rsp = 0x00000032b633d9d0 rip = 0x00007ff96937e2b9 Found by: stack scanning Stack contents: 00000032b633d9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b633d9e0 20 6d 34 33 e8 01 00 00 50 90 0c 1b e8 01 00 00 m43....P....... 00000032b633d9f0 80 d8 0a 1b e8 01 00 00 7f 5f 95 69 f9 7f 00 00 ........._.i.... Possible instruction pointers: 256 Qt6Core.dll + 0xa5f7f rsp = 0x00000032b633da00 rip = 0x00007ff969955f7f Found by: stack scanning Stack contents: 00000032b633da00 80 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 ................ 00000032b633da10 20 6d 34 33 e8 01 00 00 80 d8 0a 1b e8 01 00 00 m43............ 00000032b633da20 68 a1 06 1b e8 01 00 00 00 00 00 00 00 00 00 00 h............... 00000032b633da30 20 6d 34 33 e8 01 00 00 20 da 33 b6 32 00 00 00 m43.... .3.2... 00000032b633da40 01 6d 34 33 e8 01 00 00 98 59 95 69 f9 7f 00 00 .m43.....Y.i.... Possible instruction pointers: 257 Qt6Core.dll + 0xa5998 rsp = 0x00000032b633da50 rip = 0x00007ff969955998 Found by: stack scanning Stack contents: 00000032b633da50 c0 da 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..3.2........... 00000032b633da60 e0 3b 0b 1b e8 01 00 00 c0 da 33 b6 32 00 00 00 .;........3.2... 00000032b633da70 00 00 00 00 00 00 00 00 c0 db 33 b6 32 00 00 00 ..........3.2... 00000032b633da80 01 00 00 00 00 00 00 00 70 db 33 b6 32 00 00 00 ........p.3.2... 00000032b633da90 f8 02 c7 69 f9 7f 00 00 ...i.... Possible instruction pointers: 258 Qt6Core.dll + 0x3c02f8 rsp = 0x00000032b633da98 rip = 0x00007ff969c702f8 Found by: stack scanning Stack contents: 00000032b633da98 bd bb 94 69 f9 7f 00 00 ...i.... Possible instruction pointers: 259 Qt6Core.dll + 0x9bbbd rsp = 0x00000032b633daa0 rip = 0x00007ff96994bbbd Found by: stack scanning Stack contents: 00000032b633daa0 c0 da 33 b6 32 00 00 00 e0 3b 0b 1b e8 01 00 00 ..3.2....;...... 00000032b633dab0 e0 3b 0b 1b e8 01 00 00 00 00 00 00 00 00 00 00 .;.............. 00000032b633dac0 00 c5 c7 69 f9 7f 00 00 ...i.... Possible instruction pointers: 260 Qt6Core.dll + 0x3cc500 rsp = 0x00000032b633dac8 rip = 0x00007ff969c7c500 Found by: stack scanning Stack contents: 00000032b633dac8 20 6d 34 33 e8 01 00 00 00 00 00 00 00 00 00 00 m43............ 00000032b633dad8 c0 db 33 b6 32 00 00 00 01 00 00 00 00 00 00 00 ..3.2........... 00000032b633dae8 70 db 33 b6 32 00 00 00 70 db 33 b6 32 00 00 00 p.3.2...p.3.2... 00000032b633daf8 2f ef f3 35 f6 7f 00 00 /..5.... Possible instruction pointers: *(0x00000032b633daf8) = 0x00007ff635f3ef2f
[main.cc : 593 + 0x6] 261 goldendict.exe!main [main.cc : 593 + 0x6] rsp = 0x00000032b633db00 rip = 0x00007ff635f3ef2f Found by: stack scanning Thread 1 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e81b044150 rcx = 0x0000000000000088 rbx = 0x000001e81b0444d0 rsi = 0x000001e81b0435f0 rdi = 0x000001e81b0444d0 rbp = 0x0000000000000000 rsp = 0x00000032b66ff9e8 r8 = 0x00000032b66ff150 r9 = 0x00000000000000ff r10 = 0x000000000000006c r11 = 0x00000032b66fef50 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b66ff9e8 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b66ff9f0 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 2 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e81b04e6b0 rcx = 0x0000000000000088 rbx = 0x000001e81b04ea30 rsi = 0x000001e81b0435f0 rdi = 0x000001e81b04ea30 rbp = 0x0000000000000000 rsp = 0x00000032b67ffad8 r8 = 0x00000032b67ff240 r9 = 0x000001e81b03f04e r10 = 0x000000000000006c r11 = 0x00000032b67ff040 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b67ffad8 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b67ffae0 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 3 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e81b04f0e0 rcx = 0x0000000000000088 rbx = 0x000001e81b04f460 rsi = 0x000001e81b0435f0 rdi = 0x000001e81b04f460 rbp = 0x0000000000000000 rsp = 0x00000032b68ff708 r8 = 0x0000000000000010 r9 = 0x0000000000000040 r10 = 0x0000000000000000 r11 = 0x040000000000000d r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b68ff708 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b68ff710 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 4 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e81b0391c0 rcx = 0x0000000000000014 rbx = 0x000001e81b039540 rsi = 0x000001e81b030b50 rdi = 0x000001e81b039540 rbp = 0x0000000000000000 rsp = 0x00000032b69ff5c8 r8 = 0x00000032b69fee68 r9 = 0x00000032b69ff748 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b69ff5c8 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b69ff5d0 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 5 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e81b0cafc0 rcx = 0x0000000000000014 rbx = 0x000001e81b0cb340 rsi = 0x000001e81b030b50 rdi = 0x000001e81b0cb340 rbp = 0x0000000000000000 rsp = 0x00000032b6aff918 r8 = 0x0000000000000076 r9 = 0x0000000000000040 r10 = 0x0000000000008000 r11 = 0x00000000000000ff r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b6aff918 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b6aff920 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 6 0 ntdll.dll + 0x9f3b4 rax = 0x00000000000000f3 rdx = 0x00000032b6bfde80 rcx = 0x0000000000005928 rbx = 0x000001e838e95f00 rsi = 0x000001e838e95fa8 rdi = 0x000001e838e96010 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfde08 r8 = 0x0000000000000cfc r9 = 0x0000000000005948 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x000001e838e96010 r13 = 0x000001e838e95fa8 r14 = 0x000001e838e95fb8 r15 = 0x0000000000005928 rip = 0x00007ff9d21cf3b4 Found by: given as instruction pointer in context Stack contents: 00000032b6bfde08 00 00 00 00 32 00 00 00 00 01 bf b6 02 00 00 00 ....2........... 00000032b6bfde18 3e 00 00 00 3e 00 00 00 1f 00 00 00 00 00 00 00 >...>........... 00000032b6bfde28 3e 00 08 02 00 00 00 00 70 df bf b6 32 00 00 00 >.......p...2... 00000032b6bfde38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfde48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfde58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfde68 00 00 00 00 00 00 00 00 3c 47 2a d2 f9 7f 00 00 ...............2... 00000032b6bfde88 00 00 00 00 00 00 00 00 04 01 00 00 f9 7f 00 00 ................ 00000032b6bfde98 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 2 kernel32.dll + 0x17374 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfdea8 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b6bfdea8 84 71 cf 35 8a c5 00 00 10 d2 24 d2 f9 7f 00 00 .q.5......$..... Possible instruction pointers: 3 ntdll.dll + 0x11d210 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfdeb8 rip = 0x00007ff9d224d210 Found by: stack scanning Stack contents: 00000032b6bfdeb8 10 e2 bf b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6bfdec8 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 H............... 00000032b6bfded8 08 00 00 00 00 00 00 00 3e 00 00 00 00 00 00 00 ........>....... 00000032b6bfdee8 38 b2 14 d2 f9 7f 00 00 8....... Possible instruction pointers: 4 ntdll.dll + 0x1b238 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfdef0 rip = 0x00007ff9d214b238 Found by: stack scanning Stack contents: 00000032b6bfdef0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfdf00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfdf10 20 df bf b6 32 00 00 00 50 df bf b6 32 00 00 00 ...2...P...2... 00000032b6bfdf20 00 df bf b6 02 00 00 00 70 df bf b6 32 00 00 00 ........p...2... 00000032b6bfdf30 00 00 bf b6 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfdf40 00 00 00 00 32 00 00 00 08 01 2b c6 f9 7f 00 00 ....2.....+..... Possible instruction pointers: 5 dbgcore.dll + 0x108 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfdf50 rip = 0x00007ff9c62b0108 Found by: stack scanning Stack contents: 00000032b6bfdf50 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfdf60 00 00 00 00 00 00 00 00 1e 37 16 d2 f9 7f 00 00 .........7...... Possible instruction pointers: 6 ntdll.dll + 0x3371e rbp = 0xffffffffffffffff rsp = 0x00000032b6bfdf70 rip = 0x00007ff9d216371e Found by: stack scanning Stack contents: 00000032b6bfdf70 00 00 00 00 5c 00 57 00 69 00 6e 00 64 00 6f 00 ....\.W.i.n.d.o. 00000032b6bfdf80 77 00 73 00 5c 00 53 00 08 00 00 00 00 00 00 00 w.s.\.S......... 00000032b6bfdf90 a1 00 00 00 32 00 5c 00 08 01 2b c6 f9 7f 00 00 ....2.\...+..... Possible instruction pointers: 7 dbgcore.dll + 0x108 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfdfa0 rip = 0x00007ff9c62b0108 Found by: stack scanning Stack contents: 00000032b6bfdfa0 ff ff ff ff ff ff ff ff 44 00 4c 00 4c 00 00 00 ........D.L.L... 00000032b6bfdfb0 85 03 fe 7f 00 00 00 00 00 10 00 00 00 00 00 00 ................ 00000032b6bfdfc0 00 00 00 00 00 00 00 00 00 40 03 00 00 00 00 00 .........@...... 00000032b6bfdfd0 00 00 00 00 00 00 00 00 19 82 18 d2 f9 7f 00 00 ................ Possible instruction pointers: 8 ntdll.dll + 0x58219 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfdfe0 rip = 0x00007ff9d2188219 Found by: stack scanning Stack contents: 00000032b6bfdfe0 00 00 00 00 00 00 00 00 84 03 fe 7f 00 00 00 00 ................ 00000032b6bfdff0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe010 00 00 00 00 00 00 00 00 f1 7f 16 d2 f9 7f 00 00 ................ Possible instruction pointers: 9 ntdll.dll + 0x37ff1 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe020 rip = 0x00007ff9d2167ff1 Found by: stack scanning Stack contents: 00000032b6bfe020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe030 84 71 cf 35 8a c5 00 00 ff ff ff ff ff ff ff ff .q.5............ 00000032b6bfe040 00 20 2e c6 f9 7f 00 00 . ...... Possible instruction pointers: 10 dbgcore.dll + 0x32000 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe048 rip = 0x00007ff9c62e2000 Found by: stack scanning Stack contents: 00000032b6bfe048 00 00 2b c6 f9 7f 00 00 ..+..... Possible instruction pointers: 11 0x7ff9c62b0000 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe050 rip = 0x00007ff9c62b0000 Found by: stack scanning Stack contents: 00000032b6bfe050 40 20 2e c6 f9 7f 00 00 @ ...... Possible instruction pointers: 12 dbgcore.dll + 0x32040 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe058 rip = 0x00007ff9c62e2040 Found by: stack scanning Stack contents: 00000032b6bfe058 10 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe068 63 77 18 d2 f9 7f 00 00 cw...... Possible instruction pointers: 13 ntdll.dll + 0x57763 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe070 rip = 0x00007ff9d2187763 Found by: stack scanning Stack contents: 00000032b6bfe070 00 00 00 00 00 00 00 00 08 01 2b c6 f9 7f 00 00 ..........+..... Possible instruction pointers: 14 dbgcore.dll + 0x108 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe080 rip = 0x00007ff9c62b0108 Found by: stack scanning Stack contents: 00000032b6bfe080 54 07 00 00 00 00 00 00 a8 2b 25 d2 f9 7f 00 00 T........+%..... Possible instruction pointers: 15 ntdll.dll + 0x122ba8 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe090 rip = 0x00007ff9d2252ba8 Found by: stack scanning Stack contents: 00000032b6bfe090 00 20 2e c6 f9 7f 00 00 . ...... Possible instruction pointers: 16 dbgcore.dll + 0x32000 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe098 rip = 0x00007ff9c62e2000 Found by: stack scanning Stack contents: 00000032b6bfe098 40 20 2e c6 f9 7f 00 00 @ ...... Possible instruction pointers: 17 dbgcore.dll + 0x32040 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe0a0 rip = 0x00007ff9c62e2040 Found by: stack scanning Stack contents: 00000032b6bfe0a0 10 11 00 00 8a c5 00 00 28 e1 bf b6 32 00 00 00 ........(...2... 00000032b6bfe0b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe0c0 08 24 2e c6 f9 7f 00 00 .$...... Possible instruction pointers: 18 dbgcore.dll + 0x32408 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe0c8 rip = 0x00007ff9c62e2408 Found by: stack scanning Stack contents: 00000032b6bfe0c8 01 03 fe 7f 03 00 00 00 10 11 00 00 00 00 00 00 ................ 00000032b6bfe0d8 00 10 00 00 00 00 00 00 48 20 2e c6 f9 7f 00 00 ........H ...... Possible instruction pointers: 19 dbgcore.dll + 0x32048 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe0e8 rip = 0x00007ff9c62e2048 Found by: stack scanning Stack contents: 00000032b6bfe0e8 03 00 00 00 f9 7f 00 00 09 04 00 00 00 00 00 00 ................ 00000032b6bfe0f8 05 00 25 d2 01 00 00 00 00 20 2e c6 f9 7f 00 00 ..%...... ...... Possible instruction pointers: 20 dbgcore.dll + 0x32000 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe108 rip = 0x00007ff9c62e2000 Found by: stack scanning Stack contents: 00000032b6bfe108 00 00 2b c6 f9 7f 00 00 ..+..... Possible instruction pointers: 21 0x7ff9c62b0000 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe110 rip = 0x00007ff9c62b0000 Found by: stack scanning Stack contents: 00000032b6bfe110 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 .@.............. 00000032b6bfe120 00 00 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b6bfe130 30 20 2e c6 f9 7f 00 00 0 ...... Possible instruction pointers: 22 dbgcore.dll + 0x32030 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe138 rip = 0x00007ff9c62e2030 Found by: stack scanning Stack contents: 00000032b6bfe138 40 20 2e c6 f9 7f 00 00 @ ...... Possible instruction pointers: 23 dbgcore.dll + 0x32040 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe140 rip = 0x00007ff9c62e2040 Found by: stack scanning Stack contents: 00000032b6bfe140 00 00 00 00 00 00 00 00 08 01 2b c6 f9 7f 00 00 ..........+..... Possible instruction pointers: 24 dbgcore.dll + 0x108 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe150 rip = 0x00007ff9c62b0108 Found by: stack scanning Stack contents: 00000032b6bfe150 40 20 2e c6 f9 7f 00 00 @ ...... Possible instruction pointers: 25 dbgcore.dll + 0x32040 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe158 rip = 0x00007ff9c62e2040 Found by: stack scanning Stack contents: 00000032b6bfe158 c0 e7 bf b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6bfe168 80 e3 bf b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6bfe178 00 00 00 00 10 00 00 00 40 20 2e c6 f9 7f 00 00 ........@ ...... Possible instruction pointers: 26 dbgcore.dll + 0x32040 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe188 rip = 0x00007ff9c62e2040 Found by: stack scanning Stack contents: 00000032b6bfe188 c0 e7 bf b6 32 00 00 00 b8 e2 bf b6 32 00 00 00 ....2.......2... 00000032b6bfe198 00 00 00 00 00 00 00 00 50 e8 bf b6 32 00 00 00 ........P...2... 00000032b6bfe1a8 08 00 00 00 00 00 00 00 e0 29 25 d2 f9 7f 00 00 .........)%..... Possible instruction pointers: 27 ntdll.dll + 0x1229e0 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe1b8 rip = 0x00007ff9d22529e0 Found by: stack scanning Stack contents: 00000032b6bfe1b8 88 e8 bf b6 32 00 00 00 52 00 54 00 00 00 00 00 ....2...R.T..... 00000032b6bfe1c8 80 29 25 d2 f9 7f 00 00 .)%..... Possible instruction pointers: 28 ntdll.dll + 0x122980 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe1d0 rip = 0x00007ff9d2252980 Found by: stack scanning Stack contents: 00000032b6bfe1d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe1e0 d8 39 02 00 a0 04 00 00 00 00 00 00 00 00 00 00 .9.............. 00000032b6bfe1f0 04 4c cf 35 8a c5 00 00 00 00 00 00 00 00 00 00 .L.5............ 00000032b6bfe200 10 11 00 00 00 00 00 00 cb 3c 7f cf f9 7f 00 00 .........<...... Possible instruction pointers: 29 ucrtbase.dll + 0x13ccb rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe210 rip = 0x00007ff9cf7f3ccb Found by: stack scanning Stack contents: 00000032b6bfe210 aa 01 62 01 00 00 00 00 05 00 00 00 00 00 00 00 ..b............. 00000032b6bfe220 a0 f1 75 34 e8 01 00 00 00 00 00 00 00 00 00 00 ..u4............ 00000032b6bfe230 00 00 00 00 00 00 00 00 cd bb 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 30 ucrtbase.dll + 0xbbcd rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe240 rip = 0x00007ff9cf7ebbcd Found by: stack scanning Stack contents: 00000032b6bfe240 40 e3 bf b6 32 00 00 00 e0 e3 bf b6 32 00 00 00 @...2.......2... 00000032b6bfe250 00 00 00 00 00 00 00 00 00 00 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 31 0x7ff9cf7e0000 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe260 rip = 0x00007ff9cf7e0000 Found by: stack scanning Stack contents: 00000032b6bfe260 b4 02 f9 1a 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe270 e6 fd 68 28 9a 00 00 00 50 0d f9 1a e8 01 00 00 ..h(....P....... 00000032b6bfe280 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <............... 00000032b6bfe290 61 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aJ.............. 00000032b6bfe2a0 40 e3 bf b6 32 00 00 00 25 b9 7e cf f9 7f 00 00 @...2...%.~..... Possible instruction pointers: 32 ucrtbase.dll + 0xb925 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe2b0 rip = 0x00007ff9cf7eb925 Found by: stack scanning Stack contents: 00000032b6bfe2b0 00 00 03 1b e8 01 00 00 e0 e3 bf b6 32 00 00 00 ............2... 00000032b6bfe2c0 00 00 00 00 00 00 00 00 00 00 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 33 0x7ff9cf7e0000 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe2d0 rip = 0x00007ff9cf7e0000 Found by: stack scanning Stack contents: 00000032b6bfe2d0 28 00 00 00 00 00 00 00 56 bf 7e cf f9 7f 00 00 (.......V.~..... Possible instruction pointers: 34 ucrtbase.dll + 0xbf56 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe2e0 rip = 0x00007ff9cf7ebf56 Found by: stack scanning Stack contents: 00000032b6bfe2e0 58 48 2d c6 f9 7f 00 00 XH-..... Possible instruction pointers: 35 dbgcore.dll + 0x24858 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe2e8 rip = 0x00007ff9c62d4858 Found by: stack scanning Stack contents: 00000032b6bfe2e8 e0 ec bf b6 32 00 00 00 60 e4 bf b6 32 00 00 00 ....2...`...2... 00000032b6bfe2f8 50 e8 bf b6 32 00 00 00 1a ed bf b6 32 00 00 00 P...2.......2... 00000032b6bfe308 28 00 00 00 00 00 00 00 1d 00 00 00 00 00 00 00 (............... 00000032b6bfe318 00 00 00 00 00 00 00 00 60 e4 bf b6 32 00 00 00 ........`...2... 00000032b6bfe328 b0 f0 8c cf f9 7f 00 00 ........ Possible instruction pointers: 36 ucrtbase.dll + 0xef0b0 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe330 rip = 0x00007ff9cf8cf0b0 Found by: stack scanning Stack contents: 00000032b6bfe330 a0 e5 07 1b e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe340 3c 00 00 00 00 00 00 00 28 e3 bf b6 32 00 00 00 <.......(...2... 00000032b6bfe350 00 00 00 00 00 00 00 00 80 48 2d c6 f9 7f 00 00 .........H-..... Possible instruction pointers: 37 dbgcore.dll + 0x24880 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe360 rip = 0x00007ff9c62d4880 Found by: stack scanning Stack contents: 00000032b6bfe360 98 e9 bf b6 32 00 00 00 1d 00 00 00 07 00 00 00 ....2........... 00000032b6bfe370 00 00 00 00 00 00 00 00 fd ff ff ff 00 00 00 00 ................ 00000032b6bfe380 00 00 00 00 00 00 00 00 90 e5 bf b6 32 00 00 00 ............2... 00000032b6bfe390 04 00 00 00 01 00 00 00 94 4e cf 35 8a c5 00 00 .........N.5.... 00000032b6bfe3a0 10 d2 24 d2 f9 7f 00 00 ..$..... Possible instruction pointers: 38 ntdll.dll + 0x11d210 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe3a8 rip = 0x00007ff9d224d210 Found by: stack scanning Stack contents: 00000032b6bfe3a8 a0 e7 bf b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6bfe3b8 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 H............... 00000032b6bfe3c8 08 00 00 00 00 00 00 00 3e 00 00 00 00 00 00 00 ........>....... 00000032b6bfe3d8 38 b2 14 d2 f9 7f 00 00 8....... Possible instruction pointers: 39 ntdll.dll + 0x1b238 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe3e0 rip = 0x00007ff9d214b238 Found by: stack scanning Stack contents: 00000032b6bfe3e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe3f0 00 00 00 00 00 00 00 00 00 00 80 00 00 00 00 00 ................ 00000032b6bfe400 10 e4 bf b6 32 00 00 00 40 e4 bf b6 32 00 00 00 ....2...@...2... 00000032b6bfe410 00 e5 bf b6 02 00 00 00 60 e4 bf b6 32 00 00 00 ........`...2... 00000032b6bfe420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe430 3e 00 08 02 00 00 00 00 60 e4 bf b6 32 00 00 00 >.......`...2... 00000032b6bfe440 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe450 b0 e7 bf b6 32 00 00 00 e0 e4 bf b6 32 00 00 00 ....2.......2... 00000032b6bfe460 43 00 3a 00 5c 00 57 00 69 00 6e 00 64 00 6f 00 C.:.\.W.i.n.d.o. 00000032b6bfe470 77 00 73 00 5c 00 53 00 59 00 53 00 54 00 45 00 w.s.\.S.Y.S.T.E. 00000032b6bfe480 4d 00 33 00 32 00 5c 00 64 00 62 00 67 00 63 00 M.3.2.\.d.b.g.c. 00000032b6bfe490 6f 00 72 00 65 00 2e 00 44 00 4c 00 4c 00 00 00 o.r.e...D.L.L... 00000032b6bfe4a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe4b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe4c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe4d0 00 00 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 ........k....... Possible instruction pointers: 40 ntdll.dll + 0x2b86b rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe4e0 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b6bfe4e0 7b 02 db 02 00 00 00 00 07 00 00 00 00 00 00 00 {............... 00000032b6bfe4f0 60 f2 75 34 e8 01 00 00 00 00 00 00 00 00 00 00 `.u4............ 00000032b6bfe500 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe510 00 00 00 00 00 00 00 00 c0 3c f9 1a e8 01 00 00 .........<...... 00000032b6bfe520 00 00 00 00 00 00 00 00 00 00 f9 1a e8 01 00 00 ................ 00000032b6bfe530 ac 02 f9 1a e8 01 00 00 06 00 00 00 00 00 00 00 ................ 00000032b6bfe540 30 00 00 00 00 00 00 00 50 0d f9 1a e8 01 00 00 0.......P....... 00000032b6bfe550 00 00 00 00 00 00 00 00 00 00 14 00 00 00 00 00 ................ 00000032b6bfe560 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b6bfe570 20 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ............... 00000032b6bfe580 00 00 03 1b e8 01 00 00 49 e6 bf b6 32 00 31 00 ........I...2.1. 00000032b6bfe590 34 00 33 00 35 00 35 00 c7 b3 15 d2 f9 7f 00 00 4.3.5.5......... Possible instruction pointers: 41 ntdll.dll + 0x2b3c7 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe5a0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b6bfe5a0 00 00 f9 1a e8 01 00 00 03 00 00 00 00 00 00 00 ................ 00000032b6bfe5b0 20 00 00 00 00 00 00 00 84 71 dd cf f9 7f 00 00 ........q...... Possible instruction pointers: 42 KERNELBASE.dll + 0x37184 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe5c0 rip = 0x00007ff9cfdd7184 Found by: stack scanning Stack contents: 00000032b6bfe5c0 c0 cf f5 39 e8 01 00 00 91 64 15 d2 f9 7f 00 00 ...9.....d...... Possible instruction pointers: 43 ntdll.dll + 0x26491 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe5d0 rip = 0x00007ff9d2156491 Found by: stack scanning Stack contents: 00000032b6bfe5d0 00 00 03 1b e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe5e0 48 e6 bf b6 32 00 00 00 15 00 00 00 00 00 00 00 H...2........... 00000032b6bfe5f0 19 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe600 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe610 20 e9 bf b6 32 00 00 00 00 00 00 00 00 00 00 00 ...2........... 00000032b6bfe620 50 ea bf b6 32 00 00 00 36 70 dd cf f9 7f 00 00 P...2...6p...... Possible instruction pointers: 44 KERNELBASE.dll + 0x37036 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe630 rip = 0x00007ff9cfdd7036 Found by: stack scanning Stack contents: 00000032b6bfe630 19 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe640 2f 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 /............... 00000032b6bfe650 e0 e6 bf b6 32 00 00 00 01 6f dd cf f9 7f 00 00 ....2....o...... Possible instruction pointers: 45 KERNELBASE.dll + 0x36f01 rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe660 rip = 0x00007ff9cfdd6f01 Found by: stack scanning Stack contents: 00000032b6bfe660 00 00 00 00 00 00 00 00 48 59 00 00 00 00 00 00 ........HY...... 00000032b6bfe670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6bfe680 90 00 00 00 e8 01 00 00 04 e7 bf b6 32 00 00 00 ............2... 00000032b6bfe690 00 00 00 00 00 00 00 00 00 e9 bf b6 32 00 00 00 ............2... 00000032b6bfe6a0 00 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 ................ 00000032b6bfe6b0 50 e7 bf b6 32 00 00 00 5e 56 e5 cf f9 7f 00 00 P...2...^V...... Possible instruction pointers: 46 KERNELBASE.dll + 0xb565e rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe6c0 rip = 0x00007ff9cfe5565e Found by: stack scanning Stack contents: 00000032b6bfe6c0 00 00 00 00 32 00 00 00 c0 e7 bf b6 32 00 00 00 ....2.......2... 00000032b6bfe6d0 98 e8 bf b6 32 00 00 00 68 e8 bf b6 32 00 00 00 ....2...h...2... 00000032b6bfe6e0 90 00 00 00 00 00 00 00 04 e7 bf b6 32 00 00 00 ............2... 00000032b6bfe6f0 00 00 00 00 00 00 00 00 6f e2 16 d2 f9 7f 00 00 ........o....... Possible instruction pointers: 47 ntdll.dll + 0x3e26f rbp = 0xffffffffffffffff rsp = 0x00000032b6bfe700 rip = 0x00007ff9d216e26f Found by: stack scanning Thread 7 0 ntdll.dll + 0xa0f94 rax = 0x00000000000001d2 rdx = 0x0000000000000000 rcx = 0x00000032b6cffc98 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000032b6cffb08 rbp = 0x00000032b64413a0 rsp = 0x00000032b6cffa88 r8 = 0x0000000000000000 r9 = 0x0000000000002800 r10 = 0x0000000000000000 r11 = 0x0000000000000001 r12 = 0x0000000000000000 r13 = 0x0000000000000008 r14 = 0x00000032b6cffae0 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0f94 Found by: given as instruction pointer in context Stack contents: 00000032b6cffa88 7d 4d 19 d2 f9 7f 00 00 }M...... Possible instruction pointers: 1 ntdll.dll + 0x64d7d rsp = 0x00000032b6cffa90 rip = 0x00007ff9d2194d7d Found by: stack scanning Stack contents: 00000032b6cffa90 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b6cffaa0 78 15 18 23 e8 01 00 00 b7 b0 ae 69 f9 7f 00 00 x..#.......i.... Possible instruction pointers: 2 Qt6Core.dll + 0x23b0b7 rsp = 0x00000032b6cffab0 rip = 0x00007ff969aeb0b7 Found by: stack scanning Stack contents: 00000032b6cffab0 a0 13 44 b6 32 00 00 00 32 4c 19 d2 f9 7f 00 00 ..D.2...2L...... Possible instruction pointers: 3 ntdll.dll + 0x64c32 rsp = 0x00000032b6cffac0 rip = 0x00007ff9d2194c32 Found by: stack scanning Stack contents: 00000032b6cffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffad0 f0 fb cf b6 32 00 00 00 98 fc cf b6 32 00 00 00 ....2.......2... 00000032b6cffae0 98 fc cf b6 32 00 00 00 14 48 00 00 00 00 00 00 ....2....H...... 00000032b6cffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffb00 e0 fa cf b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6cffb10 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b6cffb20 01 00 00 00 00 00 00 00 43 49 19 d2 f9 7f 00 00 ........CI...... Possible instruction pointers: 4 ntdll.dll + 0x64943 rsp = 0x00000032b6cffb30 rip = 0x00007ff9d2194943 Found by: stack scanning Stack contents: 00000032b6cffb30 98 fc cf b6 32 00 00 00 00 00 00 80 00 00 00 00 ....2........... 00000032b6cffb40 c0 37 bf 23 e8 01 00 00 30 fc cf b6 32 00 00 00 .7.#....0...2... 00000032b6cffb50 00 28 00 00 e8 01 00 00 20 fc cf b6 32 00 00 00 .(...... ...2... 00000032b6cffb60 0c 00 00 00 00 00 00 00 cf 32 e1 cf f9 7f 00 00 .........2...... Possible instruction pointers: 5 KERNELBASE.dll + 0x732cf rsp = 0x00000032b6cffb70 rip = 0x00007ff9cfe132cf Found by: stack scanning Stack contents: 00000032b6cffb70 98 fc cf b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6cffb80 20 fc cf b6 32 00 00 00 c0 37 bf 23 e8 01 00 00 ...2....7.#.... 00000032b6cffb90 f0 a7 06 1b e8 01 00 00 e4 0a f0 35 f6 7f 00 00 ...........5.... Possible instruction pointers: *(0x00000032b6cffb98) = 0x00007ff635f00ae4 QtConcurrent::run<`FTS::Indexing::run'::`13':: >(class FTS::Indexing::run::__l13:: *)> [qtconcurrentrun.h : 66 + 0x0] 6 goldendict.exe!static class QFuture QtConcurrent::run<`FTS::Indexing::run'::`13':: >(class FTS::Indexing::run::__l13:: *) [qtconcurrentrun.h : 64 + 0x14] rsp = 0x00000032b6cffba0 rip = 0x00007ff635f00ae4 Found by: stack scanning Stack contents: 00000032b6cffba0 98 fc cf b6 32 00 00 00 84 7a ae 69 f9 7f 00 00 ....2....z.i.... 00000032b6cffbb0 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffbc0 b0 29 99 23 e8 01 00 00 c0 37 bf 23 e8 01 00 00 .).#.....7.#.... 00000032b6cffbd0 b0 29 99 23 e8 01 00 00 2f 7b f0 35 f6 7f 00 00 .).#..../{.5.... 00000032b6cffbe0 f0 a7 06 1b e8 01 00 00 20 10 bf 23 e8 01 00 00 ........ ..#.... 00000032b6cffbf0 00 00 00 80 00 00 00 00 c0 37 bf 23 e8 01 00 00 .........7.#.... 00000032b6cffc00 08 00 00 00 00 00 00 00 e8 a2 c7 69 f9 7f 00 00 ...........i.... 00000032b6cffc10 00 00 00 00 00 00 00 00 b1 47 15 d2 f9 7f 00 00 .........G...... 00000032b6cffc20 e8 a2 c7 69 f9 7f 00 00 00 98 2b 30 e8 01 00 00 ...i......+0.... 00000032b6cffc30 a0 29 99 23 e8 01 00 00 98 fc cf b6 32 00 00 00 .).#........2... 00000032b6cffc40 10 10 bf 23 e8 01 00 00 f8 02 c7 69 f9 7f 00 00 ...#.......i.... 00000032b6cffc50 60 bc 90 23 e8 01 00 00 70 bc 90 23 e8 01 00 00 `..#....p..#.... 00000032b6cffc60 2a 01 00 00 00 00 00 00 00 15 18 23 e8 01 00 00 *..........#.... 00000032b6cffc70 b0 29 99 23 e8 01 00 00 70 f2 3a 23 e8 01 00 00 .).#....p.:#.... 00000032b6cffc80 01 00 00 00 00 00 00 00 1c a3 ae 69 f9 7f 00 00 ...........i.... 00000032b6cffc90 b0 29 99 23 e8 01 00 00 00 00 00 80 00 00 00 00 .).#............ 00000032b6cffca0 08 fc cf b6 32 00 00 00 68 15 18 23 e8 01 00 00 ....2...h..#.... 00000032b6cffcb0 f0 14 18 23 e8 01 00 00 30 38 18 23 e8 01 00 00 ...#....08.#.... 00000032b6cffcc0 68 15 18 23 e8 01 00 00 00 c5 a3 69 f9 7f 00 00 h..#.......i.... 00000032b6cffcd0 d4 d2 d2 5b 10 01 00 00 00 00 00 00 01 00 00 00 ...[............ 00000032b6cffce0 d4 d2 d2 5b 10 01 00 00 00 00 00 00 01 00 00 00 ...[............ 00000032b6cffcf0 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... 00000032b6cffd00 30 38 18 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 08.#.......i.... 00000032b6cffd10 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b6cffd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffd30 30 38 18 23 e8 01 00 00 70 f2 3a 23 e8 01 00 00 08.#....p.:#.... 00000032b6cffd40 68 a8 06 1b e8 01 00 00 e9 5d ae 69 f9 7f 00 00 h........].i.... 00000032b6cffd50 70 f2 3a 23 e8 01 00 00 01 00 00 00 e8 01 00 00 p.:#............ 00000032b6cffd60 01 00 00 00 00 00 00 00 70 f2 3a 23 e8 01 00 00 ........p.:#.... 00000032b6cffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffd80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffd90 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: *(0x00000032b6cffbd8) = 0x00007ff635f07b2f [fulltextsearch.cc : 32 + 0x0] 7 kernel32.dll + 0x17374 rsp = 0x00000032b6cffda0 rip = 0x00007ff9d2037374 Found by: call frame info Stack contents: 00000032b6cffda0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6cffdc0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 8 ntdll.dll + 0x4cc91 rsp = 0x00000032b6cffdd0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 8 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e82334b0e0 rcx = 0x00000000000029a4 rbx = 0x0000000000000000 rsi = 0x000001e82316b940 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x00000032b6fff5b8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b6fff5b8 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b6fff5c0 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 9 0 ntdll.dll + 0x9d684 rax = 0x0000000000000009 rdx = 0x00000032b6dff8b8 rcx = 0x00000000000029e0 rbx = 0x00000032b6dff8b0 rsi = 0x0000000000000018 rdi = 0x00000032b6dff8a0 rbp = 0x00000032b6dff8d9 rsp = 0x00000032b6dff808 r8 = 0x0000000000047dba r9 = 0x0000000000000000 r10 = 0x00007ff913ce5000 r11 = 0x0000000000047dba r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000001e833f9e3a0 r15 = 0x000001e82325a410 rip = 0x00007ff9d21cd684 Found by: given as instruction pointer in context Stack contents: 00000032b6dff808 3f 68 e0 cf f9 7f 00 00 ?h...... Possible instruction pointers: 1 KERNELBASE.dll + 0x6683f rbp = 0x00000032b6dff8d9 rsp = 0x00000032b6dff810 rip = 0x00007ff9cfe0683f Found by: stack scanning Stack contents: 00000032b6dff810 00 00 00 00 00 00 00 00 18 00 00 00 00 00 00 00 ................ 00000032b6dff820 e8 f8 df b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6dff830 00 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x6e7bc6f rbp = 0x00000032b6dff8d9 rsp = 0x00000032b6dff840 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b6dff840 18 00 00 00 00 00 00 00 a0 3c 00 00 00 00 00 00 .........<...... 00000032b6dff850 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 ................ 00000032b6dff860 02 00 00 00 00 00 00 00 03 7d e1 0f f9 7f 00 00 .........}...... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x4bd7d03 rbp = 0x00000032b6dff8d9 rsp = 0x00000032b6dff870 rip = 0x00007ff90fe17d03 Found by: stack scanning Stack contents: 00000032b6dff870 b0 65 24 23 e8 01 00 00 0f 00 00 00 00 00 00 00 .e$#............ 00000032b6dff880 b0 65 24 23 e8 01 00 00 00 00 00 00 00 00 00 00 .e$#............ 00000032b6dff890 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6dff8a0 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b6dff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6dff8c0 00 00 00 00 00 00 00 00 b0 65 24 23 e8 01 00 00 .........e$#.... 00000032b6dff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6dff8e0 00 00 00 00 00 00 00 00 42 72 6f 6b 65 72 45 76 ........BrokerEv 00000032b6dff8f0 65 6e 74 00 00 00 00 00 0b 00 00 00 00 00 00 00 ent............. 00000032b6dff900 0f 00 00 00 00 00 00 00 a9 18 6a 26 04 d2 00 00 ..........j&.... 00000032b6dff910 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6dff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6dff930 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 4 kernel32.dll + 0x17374 rsp = 0x00000032b6dff940 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b6dff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6dff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6dff960 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 5 ntdll.dll + 0x4cc91 rsp = 0x00000032b6dff970 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 10 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002a60 rbx = 0x0000000000000000 rsi = 0x00000032b6eff5b8 rdi = 0x0000000000002a60 rbp = 0x00000000ffffffff rsp = 0x00000032b6eff588 r8 = 0x00000032b6eff588 r9 = 0x00000000ffffffff r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002a60 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b6eff588 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b6eff590 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b6eff590 00 00 00 00 00 00 00 00 18 f8 ef b6 32 00 00 00 ............2... 00000032b6eff5a0 28 47 a0 13 f9 7f 00 00 (G...... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b6eff5a8 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b6eff5a8 01 00 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b6eff5b8 80 69 67 ff ff ff ff ff 48 00 00 00 00 00 00 00 .ig.....H....... 00000032b6eff5c8 01 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff5d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff5e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff5f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff608 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f ................ 00000032b6eff618 4d 5a 12 45 00 00 00 00 a0 f6 18 23 e8 01 00 00 MZ.E.......#.... 00000032b6eff628 e6 c2 71 0e f9 7f 00 00 ..q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b6eff630 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b6eff630 0d 42 0f 00 00 00 00 00 bc ee 7a 0e f9 7f 00 00 .B........z..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x356eebc rsp = 0x00000032b6eff640 rip = 0x00007ff90e7aeebc Found by: stack scanning Stack contents: 00000032b6eff640 00 00 00 00 e8 01 00 00 60 2a 00 00 00 00 00 00 ........`*...... 00000032b6eff650 00 00 00 00 00 00 00 00 90 f7 ef b6 32 00 00 00 ............2... 00000032b6eff660 00 00 00 00 00 00 00 80 ff ff ff ff ff ff ff 7f ................ 00000032b6eff670 a0 f6 18 23 e8 01 00 00 90 f6 18 23 e8 01 00 00 ...#.......#.... 00000032b6eff680 0d 42 0f 00 00 00 00 00 e6 f0 72 0e f9 7f 00 00 .B........r..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b6eff690 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b6eff690 98 f6 18 23 e8 01 00 00 00 01 03 45 00 00 00 00 ...#.......E.... 00000032b6eff6a0 01 00 00 00 00 00 00 00 b1 e4 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x34fe4b1 rsp = 0x00000032b6eff6b0 rip = 0x00007ff90e73e4b1 Found by: stack scanning Stack contents: 00000032b6eff6b0 38 bc 28 23 e8 01 00 00 01 00 00 00 00 00 00 00 8.(#............ 00000032b6eff6c0 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b6eff6d0 f8 bc 28 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..(#............ 00000032b6eff6e0 f8 bc 28 23 e8 01 00 00 2a c2 73 0e f9 7f 00 00 ..(#....*.s..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34fc22a rsp = 0x00000032b6eff6f0 rip = 0x00007ff90e73c22a Found by: stack scanning Stack contents: 00000032b6eff6f0 d0 f7 ef b6 32 00 00 00 f8 bc 28 23 e8 01 00 00 ....2.....(#.... 00000032b6eff700 00 00 00 00 00 00 00 00 19 cd 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x34fcd19 rsp = 0x00000032b6eff710 rip = 0x00007ff90e73cd19 Found by: stack scanning Stack contents: 00000032b6eff710 01 a7 2b 23 e8 01 00 00 4b 5a 12 45 00 00 00 00 ..+#....KZ.E.... 00000032b6eff720 38 f7 ef b6 32 00 00 00 08 00 00 00 00 00 00 00 8...2........... 00000032b6eff730 3e 18 03 45 00 00 00 00 01 00 00 00 00 00 00 00 >..E............ 00000032b6eff740 00 18 03 45 00 00 00 00 00 00 00 00 00 00 00 00 ...E............ 00000032b6eff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff790 ff ff ff ff ff ff ff 7f 98 f6 18 23 e8 01 00 00 ...........#.... 00000032b6eff7a0 01 00 00 00 00 00 00 00 94 98 70 0e f9 7f 00 00 ..........p..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34c9894 rsp = 0x00000032b6eff7b0 rip = 0x00007ff90e709894 Found by: stack scanning Stack contents: 00000032b6eff7b0 90 f6 18 23 e8 01 00 00 f8 bc 28 23 e8 01 00 00 ...#......(#.... 00000032b6eff7c0 98 f6 18 23 e8 01 00 00 3e 18 03 45 00 00 00 00 ...#....>..E.... 00000032b6eff7d0 4b 5a 12 45 00 00 00 00 3e 18 03 45 00 00 00 00 KZ.E....>..E.... 00000032b6eff7e0 00 bc 28 23 e8 01 00 00 20 be 28 23 e8 01 00 00 ..(#.... .(#.... 00000032b6eff7f0 a0 bd 28 23 e8 01 00 00 a0 09 16 23 e8 01 00 00 ..(#.......#.... 00000032b6eff800 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b6eff810 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b6eff810 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b6eff820 00 bd 28 23 e8 01 00 00 01 00 00 00 00 00 00 00 ..(#............ 00000032b6eff830 00 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b6eff840 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b6eff850 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b6eff850 b8 43 96 12 f9 7f 00 00 .C...... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x77243b8 rsp = 0x00000032b6eff858 rip = 0x00007ff9129643b8 Found by: stack scanning Stack contents: 00000032b6eff858 a8 f8 ef b6 32 00 00 00 e8 f8 ef b6 32 00 00 00 ....2.......2... 00000032b6eff868 e6 7c 70 0e f9 7f 00 00 .|p..... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b6eff870 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b6eff870 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b6eff880 d0 fa ef b6 32 00 00 00 a0 f9 ef b6 32 00 00 00 ....2.......2... 00000032b6eff890 d0 fa ef b6 32 00 00 00 85 69 76 0e f9 7f 00 00 ....2....iv..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b6eff8a0 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b6eff8a0 d0 fa ef b6 32 00 00 00 a0 09 16 23 e8 01 00 00 ....2......#.... 00000032b6eff8b0 50 fa ef b6 32 00 00 00 a0 63 25 23 e8 01 00 00 P...2....c%#.... 00000032b6eff8c0 00 00 03 1b e8 01 00 00 89 f9 ef b6 32 00 00 00 ............2... 00000032b6eff8d0 01 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 15 ntdll.dll + 0x2b3c7 rsp = 0x00000032b6eff8e0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b6eff8e0 00 00 00 00 00 00 00 00 f0 54 05 1e e8 01 00 00 .........T...... 00000032b6eff8f0 e0 f8 ef b6 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b6eff900 b8 15 3b 23 e8 01 00 00 20 bc 28 23 e8 01 00 00 ..;#.... .(#.... 00000032b6eff910 20 fa ef b6 02 00 00 00 20 bd 28 23 e8 01 00 00 ....... .(#.... 00000032b6eff920 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b6eff930 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff940 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 16 ucrtbase.dll + 0xfde6 rsp = 0x00000032b6eff950 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b6eff950 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b6eff960 78 bd 28 23 e8 01 00 00 00 00 28 23 e8 01 00 00 x.(#......(#.... 00000032b6eff970 01 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b6eff980 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b6eff980 08 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b6eff990 20 bc 28 23 e8 01 00 00 48 be 28 23 e8 01 00 00 .(#....H.(#.... 00000032b6eff9a0 70 55 05 1e e8 01 00 00 bb 95 4d 0b f9 7f 00 00 pU........M..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x2995bb rsp = 0x00000032b6eff9b0 rip = 0x00007ff90b4d95bb Found by: stack scanning Stack contents: 00000032b6eff9b0 80 86 46 23 e8 01 00 00 a0 09 16 23 e8 01 00 00 ..F#.......#.... 00000032b6eff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6eff9d0 a0 63 25 23 e8 01 00 00 d0 fa ef b6 32 00 00 00 .c%#........2... 00000032b6eff9e0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 19 ucrtbase.dll + 0xfde6 rsp = 0x00000032b6eff9f0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b6eff9f0 a0 09 16 23 e8 01 00 00 08 00 00 00 00 00 00 00 ...#............ 00000032b6effa00 a0 63 25 23 e8 01 00 00 80 86 46 23 e8 01 00 00 .c%#......F#.... 00000032b6effa10 00 00 00 00 00 00 00 00 80 86 46 23 e8 01 00 00 ..........F#.... 00000032b6effa20 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b6effa30 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b6effa30 d0 fa ef b6 32 00 00 00 a0 09 16 23 e8 01 00 00 ....2......#.... 00000032b6effa40 f0 fa ef b6 32 00 00 00 e6 7c 70 0e f9 7f 00 00 ....2....|p..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b6effa50 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b6effa50 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 22 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b6effa58 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b6effa58 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b6effa60 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b6effa60 51 01 00 00 e8 01 00 00 77 18 71 0e f9 7f 00 00 Q.......w.q..... Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b6effa70 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b6effa70 00 00 00 00 00 00 00 00 99 2b 7c 0e f9 7f 00 00 .........+|..... Possible instruction pointers: 25 Qt6WebEngineCore.dll + 0x3582b99 rsp = 0x00000032b6effa80 rip = 0x00007ff90e7c2b99 Found by: stack scanning Stack contents: 00000032b6effa80 d0 fa ef b6 32 00 00 00 80 86 46 23 e8 01 00 00 ....2.....F#.... 00000032b6effa90 99 1a 5a 26 04 d2 00 00 a0 63 25 23 e8 01 00 00 ..Z&.....c%#.... 00000032b6effaa0 00 00 00 00 00 00 00 00 95 24 71 0e f9 7f 00 00 .........$q..... Possible instruction pointers: 26 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b6effab0 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b6effab0 00 0e 3b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..;#............ 00000032b6effac0 58 2a 00 00 00 00 00 00 b1 47 15 d2 f9 7f 00 00 X*.......G...... Possible instruction pointers: 27 ntdll.dll + 0x247b1 rsp = 0x00000032b6effad0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b6effad0 00 bd 28 23 e8 01 00 00 00 00 00 00 00 01 00 00 ..(#............ 00000032b6effae0 01 00 00 00 00 00 00 00 b0 15 3b 23 e8 01 00 00 ..........;#.... 00000032b6effaf0 80 55 05 1e e8 01 00 00 d0 fa ef b6 32 00 00 00 .U..........2... 00000032b6effb00 40 e7 28 23 e8 01 00 00 5b f0 7e cf f9 7f 00 00 @.(#....[.~..... Possible instruction pointers: 28 ucrtbase.dll + 0xf05b rsp = 0x00000032b6effb10 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b6effb10 17 00 00 00 00 00 00 00 1f 00 00 00 00 00 00 00 ................ 00000032b6effb20 69 1a 5a 26 04 d2 00 00 00 00 00 00 00 00 00 00 i.Z&............ 00000032b6effb30 00 00 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 29 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b6effb40 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b6effb40 00 00 00 00 00 00 00 00 58 2a 00 00 00 00 00 00 ........X*...... 00000032b6effb50 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b6effb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6effb70 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6effb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6effb90 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 30 kernel32.dll + 0x17374 rsp = 0x00000032b6effba0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b6effba0 58 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 X*.............. 00000032b6effbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b6effbc0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 31 ntdll.dll + 0x4cc91 rsp = 0x00000032b6effbd0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 11 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002a4c rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002a4c rbp = 0x00000000ffffffff rsp = 0x00000032b70ff798 r8 = 0x00000032b70fef98 r9 = 0x00000032b70fefe9 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002a4c r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b70ff798 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b70ff7a0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b70ff7a0 90 a0 2b 23 e8 01 00 00 40 fa 0f b7 32 00 00 00 ..+#....@...2... 00000032b70ff7b0 00 00 00 00 00 00 00 00 a8 72 b9 1e e8 01 00 00 .........r...... 00000032b70ff7c0 00 00 00 00 00 00 00 00 68 dd 76 0e f9 7f 00 00 ........h.v..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x352dd68 rsp = 0x00000032b70ff7d0 rip = 0x00007ff90e76dd68 Found by: stack scanning Stack contents: 00000032b70ff7d0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b70ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff820 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b70ff830 b0 54 27 23 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 .T'#......q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b70ff840 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b70ff840 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b70ff850 00 00 00 00 00 00 00 00 4c 2a 00 00 00 00 00 00 ........L*...... 00000032b70ff860 ff ff ff ff 00 00 00 00 a0 f9 0f b7 32 00 00 00 ............2... 00000032b70ff870 01 00 00 00 00 00 00 00 80 54 27 23 e8 01 00 00 .........T'#.... 00000032b70ff880 b0 54 27 23 e8 01 00 00 b0 54 27 23 e8 01 00 00 .T'#.....T'#.... 00000032b70ff890 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b70ff8a0 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b70ff8a0 a8 72 b9 1e e8 01 00 00 00 00 00 00 00 00 00 00 .r.............. 00000032b70ff8b0 00 00 00 00 00 00 00 00 c0 cf da 12 f9 7f 00 00 ................ Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x7b6cfc0 rsp = 0x00000032b70ff8c0 rip = 0x00007ff912dacfc0 Found by: stack scanning Stack contents: 00000032b70ff8c0 55 d0 da 12 f9 7f 00 00 U....... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x7b6d055 rsp = 0x00000032b70ff8c8 rip = 0x00007ff912dad055 Found by: stack scanning Stack contents: 00000032b70ff8c8 4e 00 00 00 00 00 00 00 c3 03 76 0e f9 7f 00 00 N.........v..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x35203c3 rsp = 0x00000032b70ff8d8 rip = 0x00007ff90e7603c3 Found by: stack scanning Stack contents: 00000032b70ff8d8 28 d5 f3 44 00 00 00 00 68 17 03 45 00 00 00 00 (..D....h..E.... 00000032b70ff8e8 80 3e 00 00 00 00 00 00 00 00 00 00 e8 01 00 00 .>.............. 00000032b70ff8f8 c3 03 76 0e f9 7f 00 00 ..v..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x35203c3 rsp = 0x00000032b70ff900 rip = 0x00007ff90e7603c3 Found by: stack scanning Stack contents: 00000032b70ff900 c3 03 76 0e f9 7f 00 00 ..v..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x35203c3 rsp = 0x00000032b70ff908 rip = 0x00007ff90e7603c3 Found by: stack scanning Stack contents: 00000032b70ff908 c3 03 76 0e f9 7f 00 00 ..v..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x35203c3 rsp = 0x00000032b70ff910 rip = 0x00007ff90e7603c3 Found by: stack scanning Stack contents: 00000032b70ff910 c3 03 76 0e f9 7f 00 00 ..v..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x35203c3 rsp = 0x00000032b70ff918 rip = 0x00007ff90e7603c3 Found by: stack scanning Stack contents: 00000032b70ff918 00 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff928 39 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 9............... 00000032b70ff938 c0 cf da 12 f9 7f 00 00 ........ Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x7b6cfc0 rsp = 0x00000032b70ff940 rip = 0x00007ff912dacfc0 Found by: stack scanning Stack contents: 00000032b70ff940 55 d0 da 12 f9 7f 00 00 U....... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x7b6d055 rsp = 0x00000032b70ff948 rip = 0x00007ff912dad055 Found by: stack scanning Stack contents: 00000032b70ff948 4e 00 00 00 00 00 00 00 00 03 76 0e f9 7f 00 00 N.........v..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x3520300 rsp = 0x00000032b70ff958 rip = 0x00007ff90e760300 Found by: stack scanning Stack contents: 00000032b70ff958 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff968 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff978 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff988 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff998 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ff9a8 03 00 00 00 00 00 00 00 f0 fa 0f b7 32 00 00 00 ............2... 00000032b70ff9b8 01 3d 77 0e f9 7f 00 00 .=w..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b70ff9c0 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b70ff9c0 b0 54 27 23 e8 01 00 00 b0 54 27 23 e8 01 00 00 .T'#.....T'#.... 00000032b70ff9d0 00 00 00 00 00 00 00 00 b0 54 27 23 e8 01 00 00 .........T'#.... 00000032b70ff9e0 03 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x3531284 rsp = 0x00000032b70ff9f0 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b70ff9f0 ff ff ff ff ff ff ff 7f 40 fa 0f b7 32 00 00 00 ........@...2... 00000032b70ffa00 80 54 27 23 e8 01 00 00 02 01 00 00 00 01 00 00 .T'#............ 00000032b70ffa10 00 00 03 1b 02 00 00 00 d9 fa 0f b7 32 00 00 00 ............2... 00000032b70ffa20 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 17 ntdll.dll + 0x2b3c7 rsp = 0x00000032b70ffa30 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b70ffa30 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffa90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffab0 00 00 00 00 00 00 00 00 80 09 16 23 e8 01 00 00 ...........#.... 00000032b70ffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffad0 c8 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b70ffae0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 18 ucrtbase.dll + 0xfde6 rsp = 0x00000032b70ffaf0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b70ffaf0 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b70ffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffb10 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b70ffb20 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b70ffb20 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b70ffb30 40 ef 07 1b e8 01 00 00 42 01 00 00 f9 7f 00 00 @.......B....... 00000032b70ffb40 c0 93 24 23 e8 01 00 00 70 e0 15 23 e8 01 00 00 ..$#....p..#.... 00000032b70ffb50 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b70ffb60 00 00 f9 1a e8 01 00 00 d0 fb 0f b7 32 00 00 00 ............2... 00000032b70ffb70 e0 e2 28 23 e8 01 00 00 01 00 00 00 00 00 00 00 ..(#............ 00000032b70ffb80 b0 9e 2b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..+#............ 00000032b70ffb90 80 54 27 23 e8 01 00 00 80 09 16 23 e8 01 00 00 .T'#.......#.... 00000032b70ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffbb0 80 09 16 23 e8 01 00 00 00 00 00 00 00 00 00 00 ...#............ 00000032b70ffbc0 80 54 27 23 e8 01 00 00 80 09 16 23 e8 01 00 00 .T'#.......#.... 00000032b70ffbd0 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b70ffbe0 00 00 00 00 00 00 00 00 bc 29 00 00 00 00 00 00 .........)...... 00000032b70ffbf0 00 00 00 00 00 00 00 00 59 09 77 0e f9 7f 00 00 ........Y.w..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3530959 rsp = 0x00000032b70ffc00 rip = 0x00007ff90e770959 Found by: stack scanning Stack contents: 00000032b70ffc00 01 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .).............. 00000032b70ffc10 a0 63 25 23 e8 01 00 00 80 41 09 23 e8 01 00 00 .c%#.....A.#.... 00000032b70ffc20 bc 29 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 .)......U.q..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b70ffc30 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b70ffc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffc40 bc 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .).............. 00000032b70ffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffc60 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffc80 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 22 kernel32.dll + 0x17374 rsp = 0x00000032b70ffc90 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b70ffc90 bc 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .).............. 00000032b70ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b70ffcb0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 23 ntdll.dll + 0x4cc91 rsp = 0x00000032b70ffcc0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 12 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002a54 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002a54 rbp = 0x00000000ffffffff rsp = 0x00000032b71ff6b8 r8 = 0x00000032b71ff350 r9 = 0x000001e8347c9840 r10 = 0x00007ff993320000 r11 = 0x00000032b71ff348 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002a54 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b71ff6b8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b71ff6c0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b71ff6c0 d0 a6 2b 23 e8 01 00 00 60 f9 1f b7 32 00 00 00 ..+#....`...2... 00000032b71ff6d0 00 00 00 00 00 00 00 00 c8 76 b9 1e e8 01 00 00 .........v...... 00000032b71ff6e0 00 00 00 00 00 00 00 00 68 dd 76 0e f9 7f 00 00 ........h.v..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x352dd68 rsp = 0x00000032b71ff6f0 rip = 0x00007ff90e76dd68 Found by: stack scanning Stack contents: 00000032b71ff6f0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b71ff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff740 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b71ff750 50 5a 27 23 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 PZ'#......q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b71ff760 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b71ff760 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b71ff770 00 00 00 00 00 00 00 00 54 2a 00 00 00 00 00 00 ........T*...... 00000032b71ff780 ff ff ff ff 00 00 00 00 c0 f8 1f b7 32 00 00 00 ............2... 00000032b71ff790 01 00 00 00 00 00 00 00 20 5a 27 23 e8 01 00 00 ........ Z'#.... 00000032b71ff7a0 50 5a 27 23 e8 01 00 00 50 5a 27 23 e8 01 00 00 PZ'#....PZ'#.... 00000032b71ff7b0 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b71ff7c0 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b71ff7c0 c8 76 b9 1e e8 01 00 00 00 00 00 00 00 00 00 00 .v.............. 00000032b71ff7d0 00 00 00 00 00 00 00 00 18 6d 91 12 f9 7f 00 00 .........m...... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x76d6d18 rsp = 0x00000032b71ff7e0 rip = 0x00007ff912916d18 Found by: stack scanning Stack contents: 00000032b71ff7e0 95 2e 8d 12 f9 7f 00 00 ........ Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x7692e95 rsp = 0x00000032b71ff7e8 rip = 0x00007ff9128d2e95 Found by: stack scanning Stack contents: 00000032b71ff7e8 64 00 00 00 00 00 00 00 c5 24 d7 0d f9 7f 00 00 d........$...... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x2b324c5 rsp = 0x00000032b71ff7f8 rip = 0x00007ff90dd724c5 Found by: stack scanning Stack contents: 00000032b71ff7f8 eb 70 f5 44 00 00 00 00 00 00 00 00 00 00 00 00 .p.D............ 00000032b71ff808 80 3e 00 00 00 00 00 00 00 00 00 00 e8 01 00 00 .>.............. 00000032b71ff818 0f 59 67 0d f9 7f 00 00 .Yg..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x243590f rsp = 0x00000032b71ff820 rip = 0x00007ff90d67590f Found by: stack scanning Stack contents: 00000032b71ff820 3a 2c aa 0d f9 7f 00 00 :,...... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x2862c3a rsp = 0x00000032b71ff828 rip = 0x00007ff90daa2c3a Found by: stack scanning Stack contents: 00000032b71ff828 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff838 00 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff848 48 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 H............... 00000032b71ff858 18 6d 91 12 f9 7f 00 00 .m...... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x76d6d18 rsp = 0x00000032b71ff860 rip = 0x00007ff912916d18 Found by: stack scanning Stack contents: 00000032b71ff860 95 2e 8d 12 f9 7f 00 00 ........ Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x7692e95 rsp = 0x00000032b71ff868 rip = 0x00007ff9128d2e95 Found by: stack scanning Stack contents: 00000032b71ff868 64 00 00 00 00 00 00 00 00 24 d7 0d f9 7f 00 00 d........$...... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x2b32400 rsp = 0x00000032b71ff878 rip = 0x00007ff90dd72400 Found by: stack scanning Stack contents: 00000032b71ff878 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff888 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff898 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff8a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff8b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff8c8 00 00 00 00 00 00 00 00 10 fa 1f b7 32 00 00 00 ............2... 00000032b71ff8d8 01 3d 77 0e f9 7f 00 00 .=w..... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b71ff8e0 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b71ff8e0 50 5a 27 23 e8 01 00 00 50 5a 27 23 e8 01 00 00 PZ'#....PZ'#.... 00000032b71ff8f0 00 00 00 00 00 00 00 00 50 5a 27 23 e8 01 00 00 ........PZ'#.... 00000032b71ff900 00 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x3531284 rsp = 0x00000032b71ff910 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b71ff910 ff ff ff ff ff ff ff 7f 60 f9 1f b7 32 00 00 00 ........`...2... 00000032b71ff920 20 5a 27 23 e8 01 00 00 00 01 00 01 00 00 00 00 Z'#............ 00000032b71ff930 00 00 03 1b 02 00 00 00 f9 f9 1f b7 32 00 00 00 ............2... 00000032b71ff940 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 15 ntdll.dll + 0x2b3c7 rsp = 0x00000032b71ff950 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b71ff950 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff990 20 5a 27 23 e8 01 00 00 00 00 00 00 00 00 00 00 Z'#............ 00000032b71ff9a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff9b0 fe ff ff ff ff ff ff ff e0 fa 1f b7 32 00 00 00 ............2... 00000032b71ff9c0 00 00 00 00 00 00 00 00 2b c6 e0 cf f9 7f 00 00 ........+....... Possible instruction pointers: 16 KERNELBASE.dll + 0x6c62b rsp = 0x00000032b71ff9d0 rip = 0x00007ff9cfe0c62b Found by: stack scanning Stack contents: 00000032b71ff9d0 00 00 00 00 00 00 00 00 60 0e 16 23 e8 01 00 00 ........`..#.... 00000032b71ff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ff9f0 c8 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b71ffa00 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 17 ucrtbase.dll + 0xfde6 rsp = 0x00000032b71ffa10 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b71ffa10 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b71ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffa30 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b71ffa40 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b71ffa40 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b71ffa50 40 ef 07 1b e8 01 00 00 69 01 00 00 f9 7f 00 00 @.......i....... 00000032b71ffa60 c0 93 24 23 e8 01 00 00 70 e0 15 23 e8 01 00 00 ..$#....p..#.... 00000032b71ffa70 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b71ffa80 00 00 f9 1a e8 01 00 00 f0 fa 1f b7 32 00 00 00 ............2... 00000032b71ffa90 b0 a9 24 23 e8 01 00 00 01 00 00 00 f9 7f 00 00 ..$#............ 00000032b71ffaa0 b0 9e 2b 23 e8 01 00 00 24 14 00 00 00 00 00 00 ..+#....$....... 00000032b71ffab0 20 5a 27 23 e8 01 00 00 60 0e 16 23 e8 01 00 00 Z'#....`..#.... 00000032b71ffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffad0 60 0e 16 23 e8 01 00 00 00 00 00 00 00 00 00 00 `..#............ 00000032b71ffae0 20 5a 27 23 e8 01 00 00 60 0e 16 23 e8 01 00 00 Z'#....`..#.... 00000032b71ffaf0 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b71ffb00 00 00 00 00 00 00 00 00 2c 1e 00 00 00 00 00 00 ........,....... 00000032b71ffb10 00 00 00 00 00 00 00 00 59 07 77 0e f9 7f 00 00 ........Y.w..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x3530759 rsp = 0x00000032b71ffb20 rip = 0x00007ff90e770759 Found by: stack scanning Stack contents: 00000032b71ffb20 01 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffb30 a0 63 25 23 e8 01 00 00 40 98 7c 34 e8 01 00 00 .c%#....@.|4.... 00000032b71ffb40 2c 1e 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ,.......U.q..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b71ffb50 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b71ffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffb60 2c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ,............... 00000032b71ffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffb80 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffba0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 21 kernel32.dll + 0x17374 rsp = 0x00000032b71ffbb0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b71ffbb0 2c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ,............... 00000032b71ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b71ffbd0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 22 ntdll.dll + 0x4cc91 rsp = 0x00000032b71ffbe0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 13 0 ntdll.dll + 0x9d684 rax = 0x0000000000000009 rdx = 0x00000032b72ff280 rcx = 0x00000000000029cc rbx = 0x00000032b72ff278 rsi = 0x000001e82334cee0 rdi = 0x00000032b72ff320 rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff1c8 r8 = 0x00000032b72fe028 r9 = 0x0000000000040b06 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000001e8231611a0 r15 = 0x000001e82334cf80 rip = 0x00007ff9d21cd684 Found by: given as instruction pointer in context Stack contents: 00000032b72ff1c8 3f 68 e0 cf f9 7f 00 00 ?h...... Possible instruction pointers: 1 KERNELBASE.dll + 0x6683f rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff1d0 rip = 0x00007ff9cfe0683f Found by: stack scanning Stack contents: 00000032b72ff1d0 90 33 5f b2 02 00 00 00 00 00 00 00 00 00 00 00 .3_............. 00000032b72ff1e0 c4 5d 5f 34 8a c5 00 00 25 85 09 45 00 00 00 00 .]_4....%..E.... 00000032b72ff1f0 00 00 00 00 00 00 00 00 54 e3 72 0e f9 7f 00 00 ........T.r..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x34ee354 rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff200 rip = 0x00007ff90e72e354 Found by: stack scanning Stack contents: 00000032b72ff200 02 01 00 00 e8 01 00 00 bc ee 7a 0e f9 7f 00 00 ..........z..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x356eebc rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff210 rip = 0x00007ff90e7aeebc Found by: stack scanning Stack contents: 00000032b72ff210 80 cf 34 23 e8 01 00 00 a0 11 16 23 e8 01 00 00 ..4#.......#.... 00000032b72ff220 00 00 00 00 00 00 00 00 e2 4d 71 0e f9 7f 00 00 .........Mq..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34d4de2 rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff230 rip = 0x00007ff90e714de2 Found by: stack scanning Stack contents: 00000032b72ff230 f0 90 11 23 e8 01 00 00 a9 00 72 0e f9 7f 00 00 ...#......r..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34e00a9 rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff240 rip = 0x00007ff90e7200a9 Found by: stack scanning Stack contents: 00000032b72ff240 d0 f2 2f b7 32 00 00 00 00 00 00 00 00 00 00 00 ../.2........... 00000032b72ff250 ff ff ff ff 00 00 00 00 41 64 7b 0e f9 7f 00 00 ........Ad{..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x3576441 rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff260 rip = 0x00007ff90e7b6441 Found by: stack scanning Stack contents: 00000032b72ff260 d0 f2 2f b7 32 00 00 00 75 10 71 0e f9 7f 00 00 ../.2...u.q..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34d1075 rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff270 rip = 0x00007ff90e711075 Found by: stack scanning Stack contents: 00000032b72ff270 96 33 5f b2 02 00 00 00 00 00 00 00 00 00 00 00 .3_............. 00000032b72ff280 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b72ff290 50 f3 2f b7 32 00 00 00 54 e3 72 0e f9 7f 00 00 P./.2...T.r..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x34ee354 rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff2a0 rip = 0x00007ff90e72e354 Found by: stack scanning Stack contents: 00000032b72ff2a0 d8 ce 34 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..4#............ 00000032b72ff2b0 80 cf 34 23 e8 01 00 00 a0 11 16 23 e8 01 00 00 ..4#.......#.... 00000032b72ff2c0 00 00 00 00 00 00 00 00 3a f0 73 0e f9 7f 00 00 ........:.s..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34ff03a rbp = 0x00000032b72ff2e9 rsp = 0x00000032b72ff2d0 rip = 0x00007ff90e73f03a Found by: stack scanning Stack contents: 00000032b72ff2d0 50 f3 2f b7 32 00 00 00 06 00 00 00 00 00 00 00 P./.2........... 00000032b72ff2e0 01 f4 2f b7 32 00 00 00 18 ce 34 23 e8 01 00 00 ../.2.....4#.... 00000032b72ff2f0 08 f3 2f b7 32 00 00 00 01 00 00 00 00 00 00 00 ../.2........... 00000032b72ff300 00 00 00 00 00 00 00 00 e0 ce 34 23 e8 01 00 00 ..........4#.... 00000032b72ff310 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff320 00 00 00 00 00 00 00 00 e9 12 9a 27 04 d2 00 00 ...........'.... 00000032b72ff330 00 00 00 00 00 00 00 00 f0 90 11 23 e8 01 00 00 ...........#.... 00000032b72ff340 01 00 00 00 00 00 00 00 d2 4f 71 0e f9 7f 00 00 .........Oq..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x34d4fd2 rsp = 0x00000032b72ff350 rip = 0x00007ff90e714fd2 Found by: stack scanning Stack contents: 00000032b72ff350 01 ce 34 23 e8 01 00 00 f0 90 11 23 e8 01 00 00 ..4#.......#.... 00000032b72ff360 a0 11 16 23 e8 01 00 00 28 47 a0 13 f9 7f 00 00 ...#....(G...... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b72ff370 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b72ff370 f0 90 11 23 e8 01 00 00 55 33 71 0e f9 7f 00 00 ...#....U3q..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x34d3355 rsp = 0x00000032b72ff380 rip = 0x00007ff90e713355 Found by: stack scanning Stack contents: 00000032b72ff380 e8 ce 34 23 e8 01 00 00 ff ff ff ff e8 01 00 00 ..4#............ 00000032b72ff390 01 00 00 00 00 00 00 00 a0 11 16 23 e8 01 00 00 ...........#.... 00000032b72ff3a0 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b72ff3b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff3c0 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b72ff3d0 00 00 00 00 00 00 00 00 18 ce 34 23 e8 01 00 00 ..........4#.... 00000032b72ff3e0 00 00 00 00 00 00 00 00 98 4a 71 0e f9 7f 00 00 .........Jq..... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x34d4a98 rsp = 0x00000032b72ff3f0 rip = 0x00007ff90e714a98 Found by: stack scanning Stack contents: 00000032b72ff3f0 f0 90 11 23 e8 01 00 00 1e 99 73 0e f9 7f 00 00 ...#......s..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x34f991e rsp = 0x00000032b72ff400 rip = 0x00007ff90e73991e Found by: stack scanning Stack contents: 00000032b72ff400 b8 ce 34 23 e8 01 00 00 00 d0 34 23 e8 01 00 00 ..4#......4#.... 00000032b72ff410 d8 ce 34 23 e8 01 00 00 00 00 34 23 e8 01 00 00 ..4#......4#.... 00000032b72ff420 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b72ff430 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b72ff430 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b72ff440 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b72ff450 00 63 45 23 e8 01 00 00 00 00 00 00 00 00 00 00 .cE#............ 00000032b72ff460 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b72ff470 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b72ff470 38 5d 25 23 e8 01 00 00 e6 fd 7e cf f9 7f 00 00 8]%#......~..... Possible instruction pointers: 17 ucrtbase.dll + 0xfde6 rsp = 0x00000032b72ff480 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b72ff480 08 f5 2f b7 32 00 00 00 e6 7c 70 0e f9 7f 00 00 ../.2....|p..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b72ff490 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b72ff490 00 00 00 00 00 00 00 00 80 63 45 23 e8 01 00 00 .........cE#.... 00000032b72ff4a0 00 f7 2f b7 32 00 00 00 c0 f5 2f b7 32 00 00 00 ../.2...../.2... 00000032b72ff4b0 00 f7 2f b7 32 00 00 00 85 69 76 0e f9 7f 00 00 ../.2....iv..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b72ff4c0 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b72ff4c0 00 f7 2f b7 32 00 00 00 a0 11 16 23 e8 01 00 00 ../.2......#.... 00000032b72ff4d0 70 f6 2f b7 32 00 00 00 80 63 45 23 e8 01 00 00 p./.2....cE#.... 00000032b72ff4e0 08 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00000032b72ff4f0 00 00 03 1b e8 01 00 00 b9 f5 2f b7 32 00 00 00 ........../.2... 00000032b72ff500 00 00 00 00 00 00 00 00 f0 04 34 23 e8 01 00 00 ..........4#.... 00000032b72ff510 00 f5 2f b7 32 00 00 00 02 00 00 00 e8 01 00 00 ../.2........... 00000032b72ff520 08 00 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b72ff530 c0 08 3b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..;#............ 00000032b72ff540 c8 08 3b 23 02 00 00 00 00 ce 34 23 e8 01 00 00 ..;#......4#.... 00000032b72ff550 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b72ff560 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff570 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 20 ucrtbase.dll + 0xfde6 rsp = 0x00000032b72ff580 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b72ff580 20 91 11 23 e8 01 00 00 01 f6 2f b7 32 00 00 00 ..#....../.2... 00000032b72ff590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff5a0 58 cf 34 23 e8 01 00 00 00 ce 34 23 e8 01 00 00 X.4#......4#.... 00000032b72ff5b0 ff ff ff ff 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 21 ucrtbase.dll + 0xfde6 rsp = 0x00000032b72ff5c0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b72ff5c0 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b72ff5d0 70 04 34 23 e8 01 00 00 80 63 45 23 e8 01 00 00 p.4#.....cE#.... 00000032b72ff5e0 80 63 45 23 e8 01 00 00 a0 11 16 23 e8 01 00 00 .cE#.......#.... 00000032b72ff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff600 a0 63 25 23 e8 01 00 00 00 f7 2f b7 32 00 00 00 .c%#....../.2... 00000032b72ff610 a0 11 16 23 e8 01 00 00 e6 fd 7e cf f9 7f 00 00 ...#......~..... Possible instruction pointers: 22 ucrtbase.dll + 0xfde6 rsp = 0x00000032b72ff620 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b72ff620 80 63 45 23 e8 01 00 00 80 63 45 23 e8 01 00 00 .cE#.....cE#.... 00000032b72ff630 00 00 00 00 00 00 00 00 80 63 45 23 e8 01 00 00 .........cE#.... 00000032b72ff640 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b72ff650 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b72ff650 00 f7 2f b7 32 00 00 00 e0 f6 2f b7 32 00 00 00 ../.2...../.2... 00000032b72ff660 00 00 00 00 00 00 00 00 80 63 45 23 e8 01 00 00 .........cE#.... 00000032b72ff670 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b72ff678 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b72ff678 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 25 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b72ff680 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b72ff680 51 01 00 00 32 00 00 00 77 18 71 0e f9 7f 00 00 Q...2...w.q..... Possible instruction pointers: 26 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b72ff690 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b72ff690 00 f7 2f b7 32 00 00 00 51 21 60 0d f9 7f 00 00 ../.2...Q!`..... Possible instruction pointers: 27 Qt6WebEngineCore.dll + 0x23c2151 rsp = 0x00000032b72ff6a0 rip = 0x00007ff90d602151 Found by: stack scanning Stack contents: 00000032b72ff6a0 a0 63 25 23 e8 01 00 00 96 3f 76 0e f9 7f 00 00 .c%#.....?v..... Possible instruction pointers: 28 Qt6WebEngineCore.dll + 0x3523f96 rsp = 0x00000032b72ff6b0 rip = 0x00007ff90e763f96 Found by: stack scanning Stack contents: 00000032b72ff6b0 00 f7 2f b7 32 00 00 00 80 63 45 23 e8 01 00 00 ../.2....cE#.... 00000032b72ff6c0 a9 16 9a 27 04 d2 00 00 a0 63 25 23 e8 01 00 00 ...'.....c%#.... 00000032b72ff6d0 a0 63 25 23 e8 01 00 00 95 24 71 0e f9 7f 00 00 .c%#.....$q..... Possible instruction pointers: 29 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b72ff6e0 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b72ff6e0 00 00 00 00 00 00 00 00 c8 29 00 00 00 00 00 00 .........)...... 00000032b72ff6f0 80 63 45 23 e8 01 00 00 00 00 00 00 00 00 00 00 .cE#............ 00000032b72ff700 e0 ce 34 23 e8 01 00 00 00 00 00 00 00 01 00 00 ..4#............ 00000032b72ff710 01 00 00 00 00 00 00 00 c0 08 3b 23 e8 01 00 00 ..........;#.... 00000032b72ff720 b0 04 34 23 e8 01 00 00 00 f7 2f b7 32 00 00 00 ..4#....../.2... 00000032b72ff730 43 68 72 6f 6d 65 5f 49 4f 54 68 72 65 61 64 00 Chrome_IOThread. 00000032b72ff740 0f 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 ................ 00000032b72ff750 39 16 9a 27 04 d2 00 00 91 01 00 00 00 00 00 00 9..'............ 00000032b72ff760 91 01 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 30 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b72ff770 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b72ff770 91 01 00 00 00 00 00 00 c8 29 00 00 00 00 00 00 .........)...... 00000032b72ff780 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b72ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff7a0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff7c0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 31 kernel32.dll + 0x17374 rsp = 0x00000032b72ff7d0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b72ff7d0 c8 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .).............. 00000032b72ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b72ff7f0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 32 ntdll.dll + 0x4cc91 rsp = 0x00000032b72ff800 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 14 0 win32u.dll + 0xa104 rax = 0x0000000000001486 rdx = 0x00000032b73ffc28 rcx = 0x0000000000000001 rbx = 0x000001e823274e80 rsi = 0x000001e823274e80 rdi = 0x0000000000000000 rbp = 0x00000032b73ffd20 rsp = 0x00000032b73ffb98 r8 = 0x000001e8232d4c38 r9 = 0x0000000000000001 r10 = 0x0000000000008000 r11 = 0x00000032b73ff7b0 r12 = 0x00000000ffffffff r13 = 0x0000000000000000 r14 = 0x000001e823274e50 r15 = 0x0000000000000001 rip = 0x00007ff9d013a104 Found by: given as instruction pointer in context Stack contents: 00000032b73ffb98 fe 11 84 d1 f9 7f 00 00 ........ Possible instruction pointers: 1 user32.dll + 0x211fe rbp = 0x00000032b73ffd20 rsp = 0x00000032b73ffba0 rip = 0x00007ff9d18411fe Found by: stack scanning Stack contents: 00000032b73ffba0 00 00 00 00 ce 8b 00 00 03 00 00 00 00 00 00 00 ................ 00000032b73ffbb0 80 4e 27 23 e8 01 00 00 80 4e 27 23 e8 01 00 00 .N'#.....N'#.... 00000032b73ffbc0 00 00 00 00 e8 01 00 00 ed 0f 7c 0e f9 7f 00 00 ..........|..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x3580fed rbp = 0x00000032b73ffd20 rsp = 0x00000032b73ffbd0 rip = 0x00007ff90e7c0fed Found by: stack scanning Stack contents: 00000032b73ffbd0 00 00 00 00 00 00 00 00 af 36 7c 0e f9 7f 00 00 .........6|..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x35836af rbp = 0x00000032b73ffd20 rsp = 0x00000032b73ffbe0 rip = 0x00007ff90e7c36af Found by: stack scanning Stack contents: 00000032b73ffbe0 20 6d 3e 23 e8 01 00 00 80 4e 27 23 e8 01 00 00 m>#.....N'#.... 00000032b73ffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffc10 03 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x3531284 rbp = 0x00000032b73ffd20 rsp = 0x00000032b73ffc20 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b73ffc20 ff ff ff ff ff ff ff 7f 7c 2a 00 00 00 00 00 00 ........|*...... 00000032b73ffc30 03 00 00 00 00 00 00 00 20 fd 3f b7 32 00 00 00 ........ .?.2... 00000032b73ffc40 00 00 03 1b 02 00 00 00 09 fd 3f b7 32 00 00 00 ..........?.2... 00000032b73ffc50 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 5 ntdll.dll + 0x2b3c7 rbp = 0x00000032b73ffd20 rsp = 0x00000032b73ffc60 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b73ffc60 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffcb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffce0 00 00 00 00 00 00 00 00 40 1e 16 23 e8 01 00 00 ........@..#.... 00000032b73ffcf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffd00 c8 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b73ffd10 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 6 ucrtbase.dll + 0xfde6 rbp = 0x00000032b73ffd20 rsp = 0x00000032b73ffd20 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b73ffd20 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b73ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffd40 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b73ffd50 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b73ffd50 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b73ffd60 40 ef 07 1b e8 01 00 00 e8 01 00 00 f9 7f 00 00 @............... 00000032b73ffd70 c0 93 24 23 e8 01 00 00 70 e0 15 23 e8 01 00 00 ..$#....p..#.... 00000032b73ffd80 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b73ffd90 00 00 f9 1a e8 01 00 00 00 fe 3f b7 32 00 00 00 ..........?.2... 00000032b73ffda0 e0 e2 28 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..(#............ 00000032b73ffdb0 b0 9e 2b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..+#............ 00000032b73ffdc0 50 4e 27 23 e8 01 00 00 40 1e 16 23 e8 01 00 00 PN'#....@..#.... 00000032b73ffdd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffde0 40 1e 16 23 e8 01 00 00 00 00 00 00 00 00 00 00 @..#............ 00000032b73ffdf0 50 4e 27 23 e8 01 00 00 40 1e 16 23 e8 01 00 00 PN'#....@..#.... 00000032b73ffe00 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b73ffe10 00 00 00 00 00 00 00 00 84 2a 00 00 00 00 00 00 .........*...... 00000032b73ffe20 00 00 00 00 00 00 00 00 79 09 77 0e f9 7f 00 00 ........y.w..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x3530979 rsp = 0x00000032b73ffe30 rip = 0x00007ff90e770979 Found by: stack scanning Stack contents: 00000032b73ffe30 01 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b73ffe40 a0 63 25 23 e8 01 00 00 f0 43 09 23 e8 01 00 00 .c%#.....C.#.... 00000032b73ffe50 84 2a 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 .*......U.q..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b73ffe60 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b73ffe60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffe70 84 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b73ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffe90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffeb0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 10 kernel32.dll + 0x17374 rsp = 0x00000032b73ffec0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b73ffec0 84 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b73ffed0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b73ffee0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 11 ntdll.dll + 0x4cc91 rsp = 0x00000032b73ffef0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 15 0 ntdll.dll + 0x9e0b4 rax = 0x000000000000005b rdx = 0x00000032b74ff900 rcx = 0x0000000000000001 rbx = 0x0000000000000001 rsi = 0x0000000000000000 rdi = 0x0000000000000001 rbp = 0x0000000000002abc rsp = 0x00000032b74ff5b8 r8 = 0x000001e8232d5430 r9 = 0x00007ff9d1a9cf30 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x00000000ffffffff r13 = 0x00000032b74ff900 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21ce0b4 Found by: given as instruction pointer in context Stack contents: 00000032b74ff5b8 30 40 e0 cf f9 7f 00 00 0@...... Possible instruction pointers: 1 KERNELBASE.dll + 0x64030 rsp = 0x00000032b74ff5c0 rip = 0x00007ff9cfe04030 Found by: stack scanning Stack contents: 00000032b74ff5c0 a4 f0 bd 66 f9 7f 00 00 ...f.... Possible instruction pointers: 2 libcrypto-3-x64.dll + 0x34f0a4 rsp = 0x00000032b74ff5c8 rip = 0x00007ff966bdf0a4 Found by: stack scanning Stack contents: 00000032b74ff5c8 55 79 14 d2 f9 7f 00 00 Uy...... Possible instruction pointers: 3 ntdll.dll + 0x17955 rsp = 0x00000032b74ff5d0 rip = 0x00007ff9d2147955 Found by: stack scanning Stack contents: 00000032b74ff5d0 d0 c4 29 d2 f9 7f 00 00 ..)..... Possible instruction pointers: 4 ntdll.dll + 0x16c4d0 rsp = 0x00000032b74ff5d8 rip = 0x00007ff9d229c4d0 Found by: stack scanning Stack contents: 00000032b74ff5d8 00 10 44 b6 32 00 00 00 00 00 00 00 00 00 00 00 ..D.2........... 00000032b74ff5e8 a4 f0 bd 66 f9 7f 00 00 ...f.... Possible instruction pointers: 5 libcrypto-3-x64.dll + 0x34f0a4 rsp = 0x00000032b74ff5f0 rip = 0x00007ff966bdf0a4 Found by: stack scanning Stack contents: 00000032b74ff5f0 00 fc 2a 23 e8 01 00 00 00 10 44 b6 32 00 00 00 ..*#......D.2... 00000032b74ff600 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b74ff610 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff620 48 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff H............... 00000032b74ff630 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff650 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff660 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff670 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff p............... 00000032b74ff680 ff ff ff ff ff ff ff ff 1d 79 14 d2 f9 7f 00 00 .........y...... Possible instruction pointers: 6 ntdll.dll + 0x1791d rsp = 0x00000032b74ff690 rip = 0x00007ff9d214791d Found by: stack scanning Stack contents: 00000032b74ff690 3d 79 14 d2 f9 7f 00 00 =y...... Possible instruction pointers: 7 ntdll.dll + 0x1793d rsp = 0x00000032b74ff698 rip = 0x00007ff9d214793d Found by: stack scanning Stack contents: 00000032b74ff698 00 00 00 00 00 00 00 00 00 10 44 b6 32 00 00 00 ..........D.2... 00000032b74ff6a8 bd 60 1a d2 f9 7f 00 00 .`...... Possible instruction pointers: 8 ntdll.dll + 0x760bd rsp = 0x00000032b74ff6b0 rip = 0x00007ff9d21a60bd Found by: stack scanning Stack contents: 00000032b74ff6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff6c0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff6d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff730 d0 f7 4f b7 32 00 00 00 00 00 00 00 00 00 00 00 ..O.2........... 00000032b74ff740 00 00 13 d2 f9 7f 00 00 ........ Possible instruction pointers: 9 0x7ff9d2130000 rsp = 0x00000032b74ff748 rip = 0x00007ff9d2130000 Found by: stack scanning Stack contents: 00000032b74ff748 83 5c 1a d2 f9 7f 00 00 .\...... Possible instruction pointers: 10 ntdll.dll + 0x75c83 rsp = 0x00000032b74ff750 rip = 0x00007ff9d21a5c83 Found by: stack scanning Stack contents: 00000032b74ff750 00 00 00 00 00 00 00 00 00 00 13 d2 f9 7f 00 00 ................ Possible instruction pointers: 11 0x7ff9d2130000 rsp = 0x00000032b74ff760 rip = 0x00007ff9d2130000 Found by: stack scanning Stack contents: 00000032b74ff760 00 00 00 00 00 00 00 00 00 60 46 b6 32 00 00 00 .........`F.2... 00000032b74ff770 00 00 00 00 00 00 00 00 38 5c 1a d2 f9 7f 00 00 ........8\...... Possible instruction pointers: 12 ntdll.dll + 0x75c38 rsp = 0x00000032b74ff780 rip = 0x00007ff9d21a5c38 Found by: stack scanning Stack contents: 00000032b74ff780 d0 f7 4f b7 32 00 00 00 00 00 00 00 00 00 00 00 ..O.2........... 00000032b74ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff7e0 00 00 00 00 00 00 00 00 10 19 18 d2 f9 7f 00 00 ................ Possible instruction pointers: 13 ntdll.dll + 0x51910 rsp = 0x00000032b74ff7f0 rip = 0x00007ff9d2181910 Found by: stack scanning Stack contents: 00000032b74ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff800 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00 ........3....... 00000032b74ff810 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00 ..+............. 00000032b74ff820 84 5b 3f 34 8a c5 00 00 00 00 00 00 00 00 00 00 .[?4............ 00000032b74ff830 00 00 00 00 00 00 00 00 40 c0 e0 cf f9 7f 00 00 ........@....... Possible instruction pointers: 14 KERNELBASE.dll + 0x6c040 rsp = 0x00000032b74ff840 rip = 0x00007ff9cfe0c040 Found by: stack scanning Stack contents: 00000032b74ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff850 30 cf a9 d1 f9 7f 00 00 0....... Possible instruction pointers: 15 combase.dll + 0xccf30 rsp = 0x00000032b74ff858 rip = 0x00007ff9d1a9cf30 Found by: stack scanning Stack contents: 00000032b74ff858 30 54 2d 23 e8 01 00 00 00 ba 3c dc ff ff ff ff 0T-#......<..... 00000032b74ff868 00 00 00 00 00 00 00 00 21 99 12 36 b6 f7 00 00 ........!..6.... 00000032b74ff878 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff888 90 fb 4f b7 32 00 00 00 00 00 00 00 00 00 00 00 ..O.2........... 00000032b74ff898 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff8a8 46 d3 a9 d1 f9 7f 00 00 F....... Possible instruction pointers: 16 combase.dll + 0xcd346 rsp = 0x00000032b74ff8b0 rip = 0x00007ff9d1a9d346 Found by: stack scanning Stack contents: 00000032b74ff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff8e0 a0 0f 00 00 00 00 00 00 80 1f 00 00 ff ff 02 00 ................ 00000032b74ff8f0 00 ba 3c dc ff ff ff ff 6c a4 13 d2 f9 7f 00 00 ..<.....l....... Possible instruction pointers: 17 ntdll.dll + 0xa46c rsp = 0x00000032b74ff900 rip = 0x00007ff9d213a46c Found by: stack scanning Stack contents: 00000032b74ff900 bc 2a 00 00 00 00 00 00 40 a5 29 d2 f9 7f 00 00 .*......@.)..... Possible instruction pointers: 18 ntdll.dll + 0x16a540 rsp = 0x00000032b74ff910 rip = 0x00007ff9d229a540 Found by: stack scanning Stack contents: 00000032b74ff910 00 00 00 00 f7 b5 5a 18 00 00 00 00 00 00 00 00 ......Z......... 00000032b74ff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff930 00 00 00 00 f7 b5 5a 18 6f a3 13 d2 f9 7f 00 00 ......Z.o....... Possible instruction pointers: 19 ntdll.dll + 0xa36f rsp = 0x00000032b74ff940 rip = 0x00007ff9d213a36f Found by: stack scanning Stack contents: 00000032b74ff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff960 80 01 f9 1a e8 01 00 00 ae 0a 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 20 ntdll.dll + 0x20aae rsp = 0x00000032b74ff970 rip = 0x00007ff9d2150aae Found by: stack scanning Stack contents: 00000032b74ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ff980 25 00 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 %.......k....... Possible instruction pointers: 21 ntdll.dll + 0x2b86b rsp = 0x00000032b74ff990 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b74ff990 1b 00 06 00 00 00 00 00 2b 00 00 00 00 00 00 00 ........+....... 00000032b74ff9a0 40 88 24 23 e8 01 00 00 f0 7c 2f 23 e8 01 00 00 @.$#.....|/#.... 00000032b74ff9b0 00 10 00 00 00 00 00 00 6b b8 15 d2 f9 7f 00 00 ........k....... Possible instruction pointers: 22 ntdll.dll + 0x2b86b rsp = 0x00000032b74ff9c0 rip = 0x00007ff9d215b86b Found by: stack scanning Stack contents: 00000032b74ff9c0 00 00 00 00 00 00 00 00 c0 15 f9 1a e8 01 00 00 ................ 00000032b74ff9d0 40 89 24 23 e8 01 00 00 00 00 f9 1a e8 01 00 00 @.$#............ 00000032b74ff9e0 28 03 f9 1a e8 01 00 00 34 03 f9 1a e8 01 00 00 (.......4....... 00000032b74ff9f0 20 02 00 00 00 00 00 00 c0 0c f9 1a e8 01 00 00 ............... 00000032b74ffa00 24 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 $............... 00000032b74ffa10 00 00 00 00 00 00 00 00 20 02 00 00 00 00 00 00 ........ ....... 00000032b74ffa20 10 02 00 00 00 00 00 00 04 00 00 00 00 00 00 00 ................ 00000032b74ffa30 00 00 03 1b e8 01 00 00 f9 fa 4f b7 32 00 00 00 ..........O.2... 00000032b74ffa40 22 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 "............... Possible instruction pointers: 23 ntdll.dll + 0x2b3c7 rsp = 0x00000032b74ffa50 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b74ffa50 00 00 f9 1a e8 01 00 00 10 19 18 d2 f9 7f 00 00 ................ Possible instruction pointers: 24 ntdll.dll + 0x51910 rsp = 0x00000032b74ffa60 rip = 0x00007ff9d2181910 Found by: stack scanning Stack contents: 00000032b74ffa60 10 02 00 00 00 00 00 00 00 00 00 00 32 00 00 00 ............2... 00000032b74ffa70 25 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 %............... Possible instruction pointers: 25 ntdll.dll + 0x2b3c7 rsp = 0x00000032b74ffa80 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b74ffa80 00 00 f9 1a 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffa90 14 56 3f 34 8a c5 00 00 00 00 00 00 00 00 00 00 .V?4............ 00000032b74ffaa0 02 00 10 00 00 00 00 00 9a 9f dd cf f9 7f 00 00 ................ Possible instruction pointers: 26 KERNELBASE.dll + 0x39f9a rsp = 0x00000032b74ffab0 rip = 0x00007ff9cfdd9f9a Found by: stack scanning Stack contents: 00000032b74ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffae0 00 00 00 00 00 00 00 00 bc 2a 00 00 00 00 00 00 .........*...... 00000032b74ffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffb00 0e 69 e9 c6 ce 8b 00 00 00 00 00 00 00 00 00 00 .i.............. 00000032b74ffb10 00 00 00 00 00 00 00 00 00 54 2d 23 e8 01 00 00 .........T-#.... 00000032b74ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffb30 bc 2a 00 00 00 00 00 00 c0 d1 a9 d1 f9 7f 00 00 .*.............. Possible instruction pointers: 27 combase.dll + 0xcd1c0 rsp = 0x00000032b74ffb40 rip = 0x00007ff9d1a9d1c0 Found by: stack scanning Stack contents: 00000032b74ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffb50 90 7f 2f 23 e8 01 00 00 5d 19 9f d1 f9 7f 00 00 ../#....]....... Possible instruction pointers: 28 combase.dll + 0x2195d rsp = 0x00000032b74ffb60 rip = 0x00007ff9d19f195d Found by: stack scanning Stack contents: 00000032b74ffb60 a0 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffb70 90 fb 4f b7 32 00 00 00 d0 1b 00 00 00 00 00 00 ..O.2........... 00000032b74ffb80 30 54 2d 23 e8 01 00 00 d0 cf a9 d1 f9 7f 00 00 0T-#............ Possible instruction pointers: 29 combase.dll + 0xccfd0 rsp = 0x00000032b74ffb90 rip = 0x00007ff9d1a9cfd0 Found by: stack scanning Stack contents: 00000032b74ffb90 ff ff ff ff e8 01 00 00 30 54 2d 23 e8 01 00 00 ........0T-#.... 00000032b74ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffbb0 30 54 2d 23 e8 01 00 00 c6 d3 a9 d1 f9 7f 00 00 0T-#............ Possible instruction pointers: 30 combase.dll + 0xcd3c6 rsp = 0x00000032b74ffbc0 rip = 0x00007ff9d1a9d3c6 Found by: stack scanning Stack contents: 00000032b74ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffbd0 00 00 00 00 00 00 00 00 30 54 2d 23 e8 01 00 00 ........0T-#.... 00000032b74ffbe0 00 00 00 00 00 00 00 00 59 cf a9 d1 f9 7f 00 00 ........Y....... Possible instruction pointers: 31 combase.dll + 0xccf59 rsp = 0x00000032b74ffbf0 rip = 0x00007ff9d1a9cf59 Found by: stack scanning Stack contents: 00000032b74ffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffc10 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 32 kernel32.dll + 0x17374 rsp = 0x00000032b74ffc20 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b74ffc20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b74ffc40 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 33 ntdll.dll + 0x4cc91 rsp = 0x00000032b74ffc50 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 16 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e823303320 rcx = 0x00000000000004cc rbx = 0x000001e8233036a0 rsi = 0x000001e81e0dbd80 rdi = 0x000001e8233036a0 rbp = 0x0000000000000000 rsp = 0x00000032b75ff8e8 r8 = 0x00000032b75ff688 r9 = 0x00000032b75ff790 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b75ff8e8 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b75ff8f0 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 17 0 ntdll.dll + 0xa0ff4 rax = 0x00000000000001d5 rdx = 0x000001e823309460 rcx = 0x00000000000004cc rbx = 0x0000000000000000 rsi = 0x000001e81e0dbd80 rdi = 0x0000000000000000 rbp = 0x0000000000000000 rsp = 0x00000032b76ff828 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21d0ff4 Found by: given as instruction pointer in context Stack contents: 00000032b76ff828 07 d4 17 d2 f9 7f 00 00 ........ Possible instruction pointers: 1 ntdll.dll + 0x4d407 rsp = 0x00000032b76ff830 rip = 0x00007ff9d217d407 Found by: stack scanning Thread 18 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002ad0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002ad0 rbp = 0x00000000ffffffff rsp = 0x00000032b77ff7b8 r8 = 0x0000000000000084 r9 = 0x0000000000000001 r10 = 0x000001e83394c468 r11 = 0x000001e828318000 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002ad0 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b77ff7b8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b77ff7c0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b77ff7c0 00 e0 2b 23 e8 01 00 00 60 fa 7f b7 32 00 00 00 ..+#....`...2... 00000032b77ff7d0 00 00 00 00 00 00 00 00 a8 72 b9 1e e8 01 00 00 .........r...... 00000032b77ff7e0 00 00 00 00 00 00 00 00 68 dd 76 0e f9 7f 00 00 ........h.v..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x352dd68 rsp = 0x00000032b77ff7f0 rip = 0x00007ff90e76dd68 Found by: stack scanning Stack contents: 00000032b77ff7f0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b77ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff840 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b77ff850 b0 e8 25 23 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 ..%#......q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b77ff860 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b77ff860 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b77ff870 00 00 00 00 00 00 00 00 d0 2a 00 00 00 00 00 00 .........*...... 00000032b77ff880 ff ff ff ff 00 00 00 00 c0 f9 7f b7 32 00 00 00 ............2... 00000032b77ff890 01 00 00 00 00 00 00 00 80 e8 25 23 e8 01 00 00 ..........%#.... 00000032b77ff8a0 b0 e8 25 23 e8 01 00 00 b0 e8 25 23 e8 01 00 00 ..%#......%#.... 00000032b77ff8b0 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b77ff8c0 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b77ff8c0 a8 72 b9 1e e8 01 00 00 00 00 00 00 00 00 00 00 .r.............. 00000032b77ff8d0 00 00 00 00 00 00 00 00 10 d9 e6 12 f9 7f 00 00 ................ Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x7c2d910 rsp = 0x00000032b77ff8e0 rip = 0x00007ff912e6d910 Found by: stack scanning Stack contents: 00000032b77ff8e0 c5 d8 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x7c2d8c5 rsp = 0x00000032b77ff8e8 rip = 0x00007ff912e6d8c5 Found by: stack scanning Stack contents: 00000032b77ff8e8 88 00 00 00 00 00 00 00 42 f7 cc 0e f9 7f 00 00 ........B....... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x3a8f742 rsp = 0x00000032b77ff8f8 rip = 0x00007ff90eccf742 Found by: stack scanning Stack contents: 00000032b77ff8f8 3a 39 fc 44 00 00 00 00 00 00 00 00 00 00 00 00 :9.D............ 00000032b77ff908 80 3e 00 00 00 00 00 00 00 00 00 00 e8 01 00 00 .>.............. 00000032b77ff918 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b77ff920 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b77ff920 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b77ff928 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b77ff928 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b77ff930 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b77ff930 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b77ff938 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b77ff938 00 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff948 6d 00 00 00 01 01 00 00 00 00 00 00 00 00 00 00 m............... 00000032b77ff958 10 d9 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x7c2d910 rsp = 0x00000032b77ff960 rip = 0x00007ff912e6d910 Found by: stack scanning Stack contents: 00000032b77ff960 c5 d8 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x7c2d8c5 rsp = 0x00000032b77ff968 rip = 0x00007ff912e6d8c5 Found by: stack scanning Stack contents: 00000032b77ff968 88 00 00 00 00 00 00 00 00 f7 cc 0e f9 7f 00 00 ................ Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x3a8f700 rsp = 0x00000032b77ff978 rip = 0x00007ff90eccf700 Found by: stack scanning Stack contents: 00000032b77ff978 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff988 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff998 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff9a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff9b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ff9c8 03 00 00 00 00 00 00 00 10 fb 7f b7 32 00 00 00 ............2... 00000032b77ff9d8 01 3d 77 0e f9 7f 00 00 .=w..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b77ff9e0 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b77ff9e0 b0 e8 25 23 e8 01 00 00 b0 e8 25 23 e8 01 00 00 ..%#......%#.... 00000032b77ff9f0 00 00 00 00 00 00 00 00 b0 e8 25 23 e8 01 00 00 ..........%#.... 00000032b77ffa00 03 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x3531284 rsp = 0x00000032b77ffa10 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b77ffa10 ff ff ff ff ff ff ff 7f 60 fa 7f b7 32 00 00 00 ........`...2... 00000032b77ffa20 80 e8 25 23 e8 01 00 00 01 01 00 00 00 00 00 00 ..%#............ 00000032b77ffa30 00 00 03 1b 02 00 00 00 f9 fa 7f b7 32 00 00 00 ............2... 00000032b77ffa40 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 17 ntdll.dll + 0x2b3c7 rsp = 0x00000032b77ffa50 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b77ffa50 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffa90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffad0 00 00 00 00 00 00 00 00 c0 e3 25 23 e8 01 00 00 ..........%#.... 00000032b77ffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffaf0 c8 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b77ffb00 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 18 ucrtbase.dll + 0xfde6 rsp = 0x00000032b77ffb10 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b77ffb10 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b77ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffb30 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b77ffb40 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b77ffb40 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b77ffb50 e0 bb 2c 23 e8 01 00 00 1a 00 00 00 f9 7f 00 00 ..,#............ 00000032b77ffb60 c0 93 24 23 e8 01 00 00 30 e0 25 23 e8 01 00 00 ..$#....0.%#.... 00000032b77ffb70 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b77ffb80 00 00 f9 1a e8 01 00 00 f0 fb 7f b7 32 00 00 00 ............2... 00000032b77ffb90 00 91 24 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..$#............ 00000032b77ffba0 b0 9e 2b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..+#............ 00000032b77ffbb0 80 e8 25 23 e8 01 00 00 c0 e3 25 23 e8 01 00 00 ..%#......%#.... 00000032b77ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffbd0 c0 e3 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..%#............ 00000032b77ffbe0 80 e8 25 23 e8 01 00 00 c0 e3 25 23 e8 01 00 00 ..%#......%#.... 00000032b77ffbf0 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b77ffc00 00 00 00 00 00 00 00 00 e4 2a 00 00 00 00 00 00 .........*...... 00000032b77ffc10 00 00 00 00 00 00 00 00 59 09 77 0e f9 7f 00 00 ........Y.w..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3530959 rsp = 0x00000032b77ffc20 rip = 0x00007ff90e770959 Found by: stack scanning Stack contents: 00000032b77ffc20 01 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b77ffc30 a0 63 25 23 e8 01 00 00 00 ec 74 34 e8 01 00 00 .c%#......t4.... 00000032b77ffc40 e4 2a 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 .*......U.q..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b77ffc50 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b77ffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffc60 e4 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b77ffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffc80 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffca0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 22 kernel32.dll + 0x17374 rsp = 0x00000032b77ffcb0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b77ffcb0 e4 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b77ffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b77ffcd0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 23 ntdll.dll + 0x4cc91 rsp = 0x00000032b77ffce0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 19 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002ab4 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002ab4 rbp = 0x00000000ffffffff rsp = 0x00000032b78ff538 r8 = 0x000001e8333cc5a0 r9 = 0x0000000000000000 r10 = 0x0000000000000040 r11 = 0xfffffbfffffffdff r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002ab4 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b78ff538 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b78ff540 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b78ff540 c0 d9 2b 23 e8 01 00 00 e0 f7 8f b7 32 00 00 00 ..+#........2... 00000032b78ff550 00 00 00 00 00 00 00 00 a8 72 b9 1e e8 01 00 00 .........r...... 00000032b78ff560 00 00 00 00 00 00 00 00 68 dd 76 0e f9 7f 00 00 ........h.v..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x352dd68 rsp = 0x00000032b78ff570 rip = 0x00007ff90e76dd68 Found by: stack scanning Stack contents: 00000032b78ff570 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b78ff580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff5a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff5b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff5c0 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b78ff5d0 10 f3 30 23 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 ..0#......q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b78ff5e0 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b78ff5e0 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b78ff5f0 00 00 00 00 00 00 00 00 b4 2a 00 00 00 00 00 00 .........*...... 00000032b78ff600 ff ff ff ff 00 00 00 00 40 f7 8f b7 32 00 00 00 ........@...2... 00000032b78ff610 01 00 00 00 00 00 00 00 e0 f2 30 23 e8 01 00 00 ..........0#.... 00000032b78ff620 10 f3 30 23 e8 01 00 00 10 f3 30 23 e8 01 00 00 ..0#......0#.... 00000032b78ff630 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b78ff640 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b78ff640 a8 72 b9 1e e8 01 00 00 00 00 00 00 00 00 00 00 .r.............. 00000032b78ff650 00 00 00 00 00 00 00 00 10 d9 e6 12 f9 7f 00 00 ................ Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x7c2d910 rsp = 0x00000032b78ff660 rip = 0x00007ff912e6d910 Found by: stack scanning Stack contents: 00000032b78ff660 c5 d8 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x7c2d8c5 rsp = 0x00000032b78ff668 rip = 0x00007ff912e6d8c5 Found by: stack scanning Stack contents: 00000032b78ff668 88 00 00 00 00 00 00 00 42 f7 cc 0e f9 7f 00 00 ........B....... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x3a8f742 rsp = 0x00000032b78ff678 rip = 0x00007ff90eccf742 Found by: stack scanning Stack contents: 00000032b78ff678 3f 39 fc 44 00 00 00 00 00 00 00 00 00 00 00 00 ?9.D............ 00000032b78ff688 80 3e 00 00 00 00 00 00 00 00 00 00 32 00 00 00 .>..........2... 00000032b78ff698 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b78ff6a0 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b78ff6a0 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b78ff6a8 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b78ff6a8 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b78ff6b0 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b78ff6b0 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b78ff6b8 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b78ff6b8 00 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff6c8 6e 00 00 00 01 01 00 00 00 00 00 00 00 00 00 00 n............... 00000032b78ff6d8 10 d9 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x7c2d910 rsp = 0x00000032b78ff6e0 rip = 0x00007ff912e6d910 Found by: stack scanning Stack contents: 00000032b78ff6e0 c5 d8 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x7c2d8c5 rsp = 0x00000032b78ff6e8 rip = 0x00007ff912e6d8c5 Found by: stack scanning Stack contents: 00000032b78ff6e8 88 00 00 00 f9 7f 00 00 00 f7 cc 0e f9 7f 00 00 ................ Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x3a8f700 rsp = 0x00000032b78ff6f8 rip = 0x00007ff90eccf700 Found by: stack scanning Stack contents: 00000032b78ff6f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff708 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff718 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff728 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff738 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff748 03 00 00 00 00 00 00 00 90 f8 8f b7 32 00 00 00 ............2... 00000032b78ff758 01 3d 77 0e f9 7f 00 00 .=w..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b78ff760 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b78ff760 10 f3 30 23 e8 01 00 00 10 f3 30 23 e8 01 00 00 ..0#......0#.... 00000032b78ff770 00 00 00 00 00 00 00 00 10 f3 30 23 e8 01 00 00 ..........0#.... 00000032b78ff780 03 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x3531284 rsp = 0x00000032b78ff790 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b78ff790 ff ff ff ff ff ff ff 7f e0 f7 8f b7 32 00 00 00 ............2... 00000032b78ff7a0 e0 f2 30 23 e8 01 00 00 01 01 00 00 00 00 00 00 ..0#............ 00000032b78ff7b0 00 00 03 1b 02 00 00 00 79 f8 8f b7 32 00 00 00 ........y...2... 00000032b78ff7c0 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 17 ntdll.dll + 0x2b3c7 rsp = 0x00000032b78ff7d0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b78ff7d0 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff850 00 00 00 00 00 00 00 00 a0 0c 31 23 e8 01 00 00 ..........1#.... 00000032b78ff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff870 c8 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b78ff880 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 18 ucrtbase.dll + 0xfde6 rsp = 0x00000032b78ff890 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b78ff890 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b78ff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff8b0 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b78ff8c0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b78ff8c0 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b78ff8d0 10 08 31 23 e8 01 00 00 05 00 00 00 f9 7f 00 00 ..1#............ 00000032b78ff8e0 c0 93 24 23 e8 01 00 00 b0 0b 31 23 e8 01 00 00 ..$#......1#.... 00000032b78ff8f0 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b78ff900 00 00 f9 1a e8 01 00 00 70 f9 8f b7 32 00 00 00 ........p...2... 00000032b78ff910 b0 5e 2d 23 e8 01 00 00 00 00 00 00 00 00 00 00 .^-#............ 00000032b78ff920 b0 9e 2b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..+#............ 00000032b78ff930 e0 f2 30 23 e8 01 00 00 a0 0c 31 23 e8 01 00 00 ..0#......1#.... 00000032b78ff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff950 a0 0c 31 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..1#............ 00000032b78ff960 e0 f2 30 23 e8 01 00 00 a0 0c 31 23 e8 01 00 00 ..0#......1#.... 00000032b78ff970 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b78ff980 00 00 00 00 00 00 00 00 f0 2a 00 00 00 00 00 00 .........*...... 00000032b78ff990 00 00 00 00 00 00 00 00 59 09 77 0e f9 7f 00 00 ........Y.w..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3530959 rsp = 0x00000032b78ff9a0 rip = 0x00007ff90e770959 Found by: stack scanning Stack contents: 00000032b78ff9a0 01 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b78ff9b0 a0 63 25 23 e8 01 00 00 d0 ec 74 34 e8 01 00 00 .c%#......t4.... 00000032b78ff9c0 f0 2a 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 .*......U.q..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b78ff9d0 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b78ff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ff9e0 f0 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b78ff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ffa00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ffa20 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 22 kernel32.dll + 0x17374 rsp = 0x00000032b78ffa30 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b78ffa30 f0 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .*.............. 00000032b78ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b78ffa50 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 23 ntdll.dll + 0x4cc91 rsp = 0x00000032b78ffa60 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 20 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002ab8 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002ab8 rbp = 0x00000000ffffffff rsp = 0x00000032b79ff268 r8 = 0x00000032b79ff488 r9 = 0x00000032b79ff5c0 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002ab8 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b79ff268 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b79ff270 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b79ff270 60 e9 2b 23 e8 01 00 00 10 f5 9f b7 32 00 00 00 `.+#........2... 00000032b79ff280 00 00 00 00 00 00 00 00 a8 72 b9 1e e8 01 00 00 .........r...... 00000032b79ff290 00 00 00 00 00 00 00 00 68 dd 76 0e f9 7f 00 00 ........h.v..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x352dd68 rsp = 0x00000032b79ff2a0 rip = 0x00007ff90e76dd68 Found by: stack scanning Stack contents: 00000032b79ff2a0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b79ff2b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff2c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff2d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff2e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff2f0 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b79ff300 30 f4 30 23 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 0.0#......q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b79ff310 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b79ff310 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b79ff320 00 00 00 00 00 00 00 00 b8 2a 00 00 00 00 00 00 .........*...... 00000032b79ff330 ff ff ff ff 00 00 00 00 70 f4 9f b7 32 00 00 00 ........p...2... 00000032b79ff340 01 00 00 00 00 00 00 00 00 f4 30 23 e8 01 00 00 ..........0#.... 00000032b79ff350 30 f4 30 23 e8 01 00 00 30 f4 30 23 e8 01 00 00 0.0#....0.0#.... 00000032b79ff360 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b79ff370 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b79ff370 a8 72 b9 1e e8 01 00 00 00 00 00 00 00 00 00 00 .r.............. 00000032b79ff380 00 00 00 00 00 00 00 00 10 d9 e6 12 f9 7f 00 00 ................ Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x7c2d910 rsp = 0x00000032b79ff390 rip = 0x00007ff912e6d910 Found by: stack scanning Stack contents: 00000032b79ff390 c5 d8 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x7c2d8c5 rsp = 0x00000032b79ff398 rip = 0x00007ff912e6d8c5 Found by: stack scanning Stack contents: 00000032b79ff398 88 00 00 00 00 00 00 00 42 f7 cc 0e f9 7f 00 00 ........B....... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x3a8f742 rsp = 0x00000032b79ff3a8 rip = 0x00007ff90eccf742 Found by: stack scanning Stack contents: 00000032b79ff3a8 da 7e f9 44 00 00 00 00 00 00 00 00 00 00 00 00 .~.D............ 00000032b79ff3b8 80 3e 00 00 00 00 00 00 00 00 00 00 32 00 00 00 .>..........2... 00000032b79ff3c8 56 a0 8f 0f f9 7f 00 00 V....... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x46ba056 rsp = 0x00000032b79ff3d0 rip = 0x00007ff90f8fa056 Found by: stack scanning Stack contents: 00000032b79ff3d0 36 a8 8f 0f f9 7f 00 00 6....... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x46ba836 rsp = 0x00000032b79ff3d8 rip = 0x00007ff90f8fa836 Found by: stack scanning Stack contents: 00000032b79ff3d8 46 04 25 10 f9 7f 00 00 F.%..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x5010446 rsp = 0x00000032b79ff3e0 rip = 0x00007ff910250446 Found by: stack scanning Stack contents: 00000032b79ff3e0 b4 e1 de 0e f9 7f 00 00 ........ Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x3bae1b4 rsp = 0x00000032b79ff3e8 rip = 0x00007ff90edee1b4 Found by: stack scanning Stack contents: 00000032b79ff3e8 00 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff3f8 55 00 00 00 01 01 00 00 00 00 00 00 00 00 00 00 U............... 00000032b79ff408 10 d9 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x7c2d910 rsp = 0x00000032b79ff410 rip = 0x00007ff912e6d910 Found by: stack scanning Stack contents: 00000032b79ff410 c5 d8 e6 12 f9 7f 00 00 ........ Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x7c2d8c5 rsp = 0x00000032b79ff418 rip = 0x00007ff912e6d8c5 Found by: stack scanning Stack contents: 00000032b79ff418 88 00 00 00 f9 7f 00 00 00 f7 cc 0e f9 7f 00 00 ................ Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x3a8f700 rsp = 0x00000032b79ff428 rip = 0x00007ff90eccf700 Found by: stack scanning Stack contents: 00000032b79ff428 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff438 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff448 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff458 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff468 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff478 03 00 00 00 00 00 00 00 c0 f5 9f b7 32 00 00 00 ............2... 00000032b79ff488 01 3d 77 0e f9 7f 00 00 .=w..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b79ff490 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b79ff490 30 f4 30 23 e8 01 00 00 30 f4 30 23 e8 01 00 00 0.0#....0.0#.... 00000032b79ff4a0 00 00 00 00 00 00 00 00 30 f4 30 23 e8 01 00 00 ........0.0#.... 00000032b79ff4b0 03 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x3531284 rsp = 0x00000032b79ff4c0 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b79ff4c0 ff ff ff ff ff ff ff 7f 10 f5 9f b7 32 00 00 00 ............2... 00000032b79ff4d0 00 f4 30 23 e8 01 00 00 01 01 00 00 00 00 00 00 ..0#............ 00000032b79ff4e0 00 00 03 1b 02 00 00 00 a9 f5 9f b7 32 00 00 00 ............2... 00000032b79ff4f0 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 17 ntdll.dll + 0x2b3c7 rsp = 0x00000032b79ff500 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b79ff500 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff510 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff530 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff540 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff560 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff570 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff580 00 00 00 00 00 00 00 00 40 0d 31 23 e8 01 00 00 ........@.1#.... 00000032b79ff590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff5a0 c8 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b79ff5b0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 18 ucrtbase.dll + 0xfde6 rsp = 0x00000032b79ff5c0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b79ff5c0 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b79ff5d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff5e0 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b79ff5f0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b79ff5f0 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b79ff600 10 08 31 23 e8 01 00 00 0a 00 00 00 f9 7f 00 00 ..1#............ 00000032b79ff610 c0 93 24 23 e8 01 00 00 b0 0b 31 23 e8 01 00 00 ..$#......1#.... 00000032b79ff620 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b79ff630 00 00 f9 1a e8 01 00 00 a0 f6 9f b7 32 00 00 00 ............2... 00000032b79ff640 e0 23 31 23 e8 01 00 00 00 00 00 00 00 00 00 00 .#1#............ 00000032b79ff650 b0 9e 2b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..+#............ 00000032b79ff660 00 f4 30 23 e8 01 00 00 40 0d 31 23 e8 01 00 00 ..0#....@.1#.... 00000032b79ff670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff680 40 0d 31 23 e8 01 00 00 00 00 00 00 00 00 00 00 @.1#............ 00000032b79ff690 00 f4 30 23 e8 01 00 00 40 0d 31 23 e8 01 00 00 ..0#....@.1#.... 00000032b79ff6a0 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b79ff6b0 00 00 00 00 00 00 00 00 40 2b 00 00 00 00 00 00 ........@+...... 00000032b79ff6c0 00 00 00 00 00 00 00 00 59 09 77 0e f9 7f 00 00 ........Y.w..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3530959 rsp = 0x00000032b79ff6d0 rip = 0x00007ff90e770959 Found by: stack scanning Stack contents: 00000032b79ff6d0 01 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .+.............. 00000032b79ff6e0 a0 63 25 23 e8 01 00 00 a0 a3 7c 34 e8 01 00 00 .c%#......|4.... 00000032b79ff6f0 40 2b 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 @+......U.q..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b79ff700 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b79ff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff710 40 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 @+.............. 00000032b79ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff730 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff740 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff750 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 22 kernel32.dll + 0x17374 rsp = 0x00000032b79ff760 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b79ff760 40 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 @+.............. 00000032b79ff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b79ff780 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 23 ntdll.dll + 0x4cc91 rsp = 0x00000032b79ff790 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 21 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002ae8 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002ae8 rbp = 0x00000000ffffffff rsp = 0x00000032b7aff388 r8 = 0x00000032b7aff0f8 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002ae8 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b7aff388 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b7aff390 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b7aff390 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff3a0 00 0d b0 13 f9 7f 00 00 ........ Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x88c0d00 rsp = 0x00000032b7aff3a8 rip = 0x00007ff913b00d00 Found by: stack scanning Stack contents: 00000032b7aff3a8 00 f5 af b7 32 00 00 00 00 00 00 00 e8 01 00 00 ....2........... 00000032b7aff3b8 98 87 74 0e f9 7f 00 00 ..t..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x3508798 rsp = 0x00000032b7aff3c0 rip = 0x00007ff90e748798 Found by: stack scanning Stack contents: 00000032b7aff3c0 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b7aff3d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff3e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff3f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff400 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 4 ntdll.dll + 0x25ba1 rsp = 0x00000032b7aff410 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b7aff410 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b7aff420 50 c8 48 23 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 P.H#......q..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b7aff430 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b7aff430 ff ff ff ff ff ff ff 7f c1 7c 75 0e f9 7f 00 00 .........|u..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x3517cc1 rsp = 0x00000032b7aff440 rip = 0x00007ff90e757cc1 Found by: stack scanning Stack contents: 00000032b7aff440 00 00 00 00 e8 01 00 00 e8 2a 00 00 00 00 00 00 .........*...... 00000032b7aff450 ff ff ff ff 00 00 00 00 90 f5 af b7 32 00 00 00 ............2... 00000032b7aff460 00 c8 48 23 e8 01 00 00 20 c8 48 23 e8 01 00 00 ..H#.... .H#.... 00000032b7aff470 50 c8 48 23 e8 01 00 00 50 c8 48 23 e8 01 00 00 P.H#....P.H#.... 00000032b7aff480 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b7aff490 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b7aff490 c0 8c 24 23 e8 01 00 00 2f 00 00 00 00 00 00 00 ..$#..../....... 00000032b7aff4a0 00 c8 48 23 e8 01 00 00 20 c8 48 23 e8 01 00 00 ..H#.... .H#.... 00000032b7aff4b0 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 00000032b7aff4c0 c0 8c 24 23 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 ..$#.....G...... Possible instruction pointers: 8 ntdll.dll + 0x247b1 rsp = 0x00000032b7aff4d0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b7aff4d0 01 00 00 00 00 00 00 00 00 00 03 1b e8 01 00 00 ................ 00000032b7aff4e0 79 f5 af b7 32 00 00 00 00 00 00 00 00 00 00 00 y...2........... 00000032b7aff4f0 00 00 00 00 00 00 00 00 47 41 4a 0b f9 7f 00 00 ........GAJ..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x264147 rsp = 0x00000032b7aff500 rip = 0x00007ff90b4a4147 Found by: stack scanning Stack contents: 00000032b7aff500 a0 65 3e 23 e8 01 00 00 5b f0 7e cf f9 7f 00 00 .e>#....[.~..... Possible instruction pointers: 10 ucrtbase.dll + 0xf05b rsp = 0x00000032b7aff510 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b7aff510 00 00 00 00 00 00 00 00 50 c8 48 23 e8 01 00 00 ........P.H#.... 00000032b7aff520 01 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b7aff530 50 c8 48 23 e8 01 00 00 56 00 77 0e f9 7f 00 00 P.H#....V.w..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x3530056 rsp = 0x00000032b7aff540 rip = 0x00007ff90e770056 Found by: stack scanning Stack contents: 00000032b7aff540 00 c8 48 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..H#............ 00000032b7aff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff560 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff570 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff590 00 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 ................ 00000032b7aff5a0 e0 f6 af b7 32 00 00 00 01 3d 77 0e f9 7f 00 00 ....2....=w..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b7aff5b0 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b7aff5b0 50 c8 48 23 e8 01 00 00 50 c8 48 23 e8 01 00 00 P.H#....P.H#.... 00000032b7aff5c0 00 00 00 00 00 00 00 00 99 15 1a 27 04 d2 00 00 ...........'.... 00000032b7aff5d0 03 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x3531284 rsp = 0x00000032b7aff5e0 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b7aff5e0 ff ff ff ff ff ff ff 7f 03 00 00 00 00 00 00 00 ................ 00000032b7aff5f0 20 c8 48 23 e8 01 00 00 10 00 00 00 00 00 00 00 .H#............ 00000032b7aff600 00 00 03 1b 02 00 00 00 c9 f6 af b7 32 00 00 00 ............2... 00000032b7aff610 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 14 ntdll.dll + 0x2b3c7 rsp = 0x00000032b7aff620 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b7aff620 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff630 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff650 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff660 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff690 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff6a0 00 00 00 00 00 00 00 00 00 40 16 23 e8 01 00 00 .........@.#.... 00000032b7aff6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff6c0 c8 63 25 23 e8 01 00 00 b0 f7 af b7 32 00 00 00 .c%#........2... 00000032b7aff6d0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 15 ucrtbase.dll + 0xfde6 rsp = 0x00000032b7aff6e0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b7aff6e0 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 16 ntdll.dll + 0x25ba1 rsp = 0x00000032b7aff6f0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b7aff6f0 00 00 00 00 00 00 00 00 00 00 16 23 e8 01 00 00 ...........#.... 00000032b7aff700 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b7aff710 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b7aff710 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b7aff720 40 ef 07 1b e8 01 00 00 f6 02 00 00 f9 7f 00 00 @............... 00000032b7aff730 c0 93 24 23 e8 01 00 00 70 e0 15 23 e8 01 00 00 ..$#....p..#.... 00000032b7aff740 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b7aff750 00 00 f9 1a e8 01 00 00 c0 f7 af b7 32 00 00 00 ............2... 00000032b7aff760 f0 7b 31 23 e8 01 00 00 00 00 00 00 00 00 00 00 .{1#............ 00000032b7aff770 b0 9e 2b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..+#............ 00000032b7aff780 20 c8 48 23 e8 01 00 00 00 40 16 23 e8 01 00 00 .H#.....@.#.... 00000032b7aff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff7a0 00 40 16 23 e8 01 00 00 00 00 00 00 00 00 00 00 .@.#............ 00000032b7aff7b0 20 c8 48 23 e8 01 00 00 00 40 16 23 e8 01 00 00 .H#.....@.#.... 00000032b7aff7c0 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b7aff7d0 00 00 00 00 00 00 00 00 44 2b 00 00 00 00 00 00 ........D+...... 00000032b7aff7e0 00 00 00 00 00 00 00 00 59 09 77 0e f9 7f 00 00 ........Y.w..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x3530959 rsp = 0x00000032b7aff7f0 rip = 0x00007ff90e770959 Found by: stack scanning Stack contents: 00000032b7aff7f0 44 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D+.............. 00000032b7aff800 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b7aff810 44 2b 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 D+......U.q..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b7aff820 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b7aff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff830 44 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D+.............. 00000032b7aff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff850 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff870 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 20 kernel32.dll + 0x17374 rsp = 0x00000032b7aff880 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b7aff880 44 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D+.............. 00000032b7aff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7aff8a0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 21 ntdll.dll + 0x4cc91 rsp = 0x00000032b7aff8b0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 22 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002b90 rbx = 0x0000000000000000 rsi = 0x00000032b7bff7b8 rdi = 0x0000000000002b90 rbp = 0x00000000ffffffff rsp = 0x00000032b7bff788 r8 = 0xffffffffffffc540 r9 = 0x00000032b7bff8a8 r10 = 0x000000004508cd31 r11 = 0x00000032b7bff9a0 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002b90 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b7bff788 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b7bff790 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b7bff790 00 00 00 00 00 00 00 00 18 fa bf b7 32 00 00 00 ............2... 00000032b7bff7a0 28 47 a0 13 f9 7f 00 00 (G...... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b7bff7a8 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7bff7a8 01 00 00 00 00 00 00 00 02 01 00 00 f9 7f 00 00 ................ 00000032b7bff7b8 80 69 67 ff ff ff ff ff 48 00 00 00 00 00 00 00 .ig.....H....... 00000032b7bff7c8 01 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff7d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff7e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff7f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff808 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f ................ 00000032b7bff818 c9 0f 18 45 00 00 00 00 20 20 32 23 e8 01 00 00 ...E.... 2#.... 00000032b7bff828 e6 c2 71 0e f9 7f 00 00 ..q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b7bff830 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b7bff830 36 42 0f 00 00 00 00 00 bc ee 7a 0e f9 7f 00 00 6B........z..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x356eebc rsp = 0x00000032b7bff840 rip = 0x00007ff90e7aeebc Found by: stack scanning Stack contents: 00000032b7bff840 00 00 00 00 e8 01 00 00 90 2b 00 00 00 00 00 00 .........+...... 00000032b7bff850 00 00 00 00 00 00 00 00 90 f9 bf b7 32 00 00 00 ............2... 00000032b7bff860 00 00 00 00 00 00 00 80 ff ff ff ff ff ff ff 7f ................ 00000032b7bff870 20 20 32 23 e8 01 00 00 10 20 32 23 e8 01 00 00 2#..... 2#.... 00000032b7bff880 36 42 0f 00 00 00 00 00 e6 f0 72 0e f9 7f 00 00 6B........r..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b7bff890 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b7bff890 18 20 32 23 e8 01 00 00 00 01 08 45 00 00 00 00 . 2#.......E.... 00000032b7bff8a0 01 00 00 00 00 00 00 00 b1 e4 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x34fe4b1 rsp = 0x00000032b7bff8b0 rip = 0x00007ff90e73e4b1 Found by: stack scanning Stack contents: 00000032b7bff8b0 b8 08 37 23 e8 01 00 00 01 00 00 00 00 00 00 00 ..7#............ 00000032b7bff8c0 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b7bff8d0 78 09 37 23 e8 01 00 00 00 00 00 00 00 00 00 00 x.7#............ 00000032b7bff8e0 78 09 37 23 e8 01 00 00 2a c2 73 0e f9 7f 00 00 x.7#....*.s..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34fc22a rsp = 0x00000032b7bff8f0 rip = 0x00007ff90e73c22a Found by: stack scanning Stack contents: 00000032b7bff8f0 d0 f9 bf b7 32 00 00 00 78 09 37 23 e8 01 00 00 ....2...x.7#.... 00000032b7bff900 00 00 00 00 00 00 00 00 19 cd 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x34fcd19 rsp = 0x00000032b7bff910 rip = 0x00007ff90e73cd19 Found by: stack scanning Stack contents: 00000032b7bff910 01 ce 5e 23 e8 01 00 00 c6 0f 18 45 00 00 00 00 ..^#.......E.... 00000032b7bff920 38 f9 bf b7 32 00 00 00 08 00 00 00 00 00 00 00 8...2........... 00000032b7bff930 90 cd 08 45 00 00 00 00 01 00 00 00 00 00 00 00 ...E............ 00000032b7bff940 00 cd 08 45 00 00 00 00 00 00 00 00 00 00 00 00 ...E............ 00000032b7bff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bff990 ff ff ff ff ff ff ff 7f 18 20 32 23 e8 01 00 00 ......... 2#.... 00000032b7bff9a0 01 00 00 00 00 00 00 00 94 98 70 0e f9 7f 00 00 ..........p..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34c9894 rsp = 0x00000032b7bff9b0 rip = 0x00007ff90e709894 Found by: stack scanning Stack contents: 00000032b7bff9b0 10 20 32 23 e8 01 00 00 78 09 37 23 e8 01 00 00 . 2#....x.7#.... 00000032b7bff9c0 18 20 32 23 e8 01 00 00 90 cd 08 45 00 00 00 00 . 2#.......E.... 00000032b7bff9d0 c6 0f 18 45 00 00 00 00 90 cd 08 45 00 00 00 00 ...E.......E.... 00000032b7bff9e0 00 09 37 23 e8 01 00 00 a0 0a 37 23 e8 01 00 00 ..7#......7#.... 00000032b7bff9f0 20 0a 37 23 e8 01 00 00 70 62 11 23 e8 01 00 00 .7#....pb.#.... 00000032b7bffa00 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b7bffa10 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b7bffa10 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b7bffa20 80 09 37 23 e8 01 00 00 01 00 00 00 00 00 00 00 ..7#............ 00000032b7bffa30 00 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b7bffa40 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b7bffa50 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7bffa50 10 00 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 ................ 00000032b7bffa60 e8 fa bf b7 32 00 00 00 e6 7c 70 0e f9 7f 00 00 ....2....|p..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b7bffa70 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b7bffa70 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b7bffa80 a0 fc bf b7 32 00 00 00 a0 fb bf b7 32 00 00 00 ....2.......2... 00000032b7bffa90 a0 fc bf b7 32 00 00 00 85 69 76 0e f9 7f 00 00 ....2....iv..... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b7bffaa0 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b7bffaa0 a0 fc bf b7 32 00 00 00 70 62 11 23 e8 01 00 00 ....2...pb.#.... 00000032b7bffab0 50 fc bf b7 32 00 00 00 a0 63 25 23 e8 01 00 00 P...2....c%#.... 00000032b7bffac0 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bffad0 a0 82 36 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 ..6#....o....... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b7bffae0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b7bffae0 00 00 00 00 00 00 00 00 c0 99 5c 23 e8 01 00 00 ..........\#.... 00000032b7bffaf0 e0 fa bf b7 32 00 00 00 c0 fa 30 23 e8 01 00 00 ....2.....0#.... 00000032b7bffb00 88 85 36 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..6#............ 00000032b7bffb10 c0 fa 30 23 e8 01 00 00 70 62 11 23 e8 01 00 00 ..0#....pb.#.... 00000032b7bffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bffb30 50 fc bf b7 32 00 00 00 c0 fa 30 23 e8 01 00 00 P...2.....0#.... 00000032b7bffb40 00 00 00 00 00 00 00 00 10 fc bf b7 32 00 00 00 ............2... 00000032b7bffb50 70 62 11 23 e8 01 00 00 00 00 00 00 00 00 00 00 pb.#............ 00000032b7bffb60 40 8f 5c 23 e8 01 00 00 30 fc bf b7 32 00 00 00 @.\#....0...2... 00000032b7bffb70 d0 ba 2b 23 e8 01 00 00 e9 74 6d 0e f9 7f 00 00 ..+#.....tm..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x34974e9 rsp = 0x00000032b7bffb80 rip = 0x00007ff90e6d74e9 Found by: stack scanning Stack contents: 00000032b7bffb80 c0 fa 30 23 e8 01 00 00 70 62 11 23 e8 01 00 00 ..0#....pb.#.... 00000032b7bffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bffba0 a0 63 25 23 e8 01 00 00 a0 fc bf b7 32 00 00 00 .c%#........2... 00000032b7bffbb0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 16 ucrtbase.dll + 0xfde6 rsp = 0x00000032b7bffbc0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b7bffbc0 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b7bffbd0 80 fc bf b7 32 00 00 00 00 00 1c 10 f9 7f 00 00 ....2........... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x4f80000 rsp = 0x00000032b7bffbe0 rip = 0x00007ff9101c0000 Found by: stack scanning Stack contents: 00000032b7bffbe0 a0 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b7bffbf0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b7bffbf0 70 62 11 23 e8 01 00 00 01 01 00 00 00 00 00 00 pb.#............ 00000032b7bffc00 a0 63 25 23 e8 01 00 00 c0 fa 30 23 e8 01 00 00 .c%#......0#.... 00000032b7bffc10 00 00 00 00 00 00 00 00 c0 fa 30 23 e8 01 00 00 ..........0#.... 00000032b7bffc20 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b7bffc30 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b7bffc30 a0 fc bf b7 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b7bffc40 a0 63 25 23 e8 01 00 00 96 3f 76 0e f9 7f 00 00 .c%#.....?v..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3523f96 rsp = 0x00000032b7bffc50 rip = 0x00007ff90e763f96 Found by: stack scanning Stack contents: 00000032b7bffc50 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b7bffc58 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b7bffc58 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 22 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b7bffc60 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b7bffc60 51 01 00 00 00 00 00 00 77 18 71 0e f9 7f 00 00 Q.......w.q..... Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b7bffc70 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b7bffc70 00 00 00 00 00 00 00 00 95 24 71 0e f9 7f 00 00 .........$q..... Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b7bffc80 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b7bffc80 c8 6f f1 43 00 00 00 00 00 00 00 00 00 00 00 00 .o.C............ 00000032b7bffc90 00 00 00 00 00 00 00 00 c0 fa 30 23 e8 01 00 00 ..........0#.... 00000032b7bffca0 80 09 37 23 e8 01 00 00 00 00 00 00 00 01 00 00 ..7#............ 00000032b7bffcb0 01 00 00 00 00 00 00 00 70 8f 11 23 e8 01 00 00 ........p..#.... 00000032b7bffcc0 20 9a 5c 23 e8 01 00 00 a0 fc bf b7 32 00 00 00 .\#........2... 00000032b7bffcd0 10 20 32 23 e8 01 00 00 5b f0 7e cf f9 7f 00 00 . 2#....[.~..... Possible instruction pointers: 25 ucrtbase.dll + 0xf05b rsp = 0x00000032b7bffce0 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b7bffce0 16 00 00 00 00 00 00 00 1f 00 00 00 00 00 00 00 ................ 00000032b7bffcf0 59 1c 0a 27 04 d2 00 00 91 01 00 00 00 00 00 00 Y..'............ 00000032b7bffd00 91 01 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 26 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b7bffd10 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b7bffd10 91 01 00 00 00 00 00 00 8c 2b 00 00 00 00 00 00 .........+...... 00000032b7bffd20 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b7bffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bffd40 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bffd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bffd60 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 27 kernel32.dll + 0x17374 rsp = 0x00000032b7bffd70 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b7bffd70 8c 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .+.............. 00000032b7bffd80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7bffd90 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 28 ntdll.dll + 0x4cc91 rsp = 0x00000032b7bffda0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 23 0 ntdll.dll + 0x9d684 rax = 0x0000000000000009 rdx = 0x00000032b7cff3d0 rcx = 0x0000000000002bbc rbx = 0x00000032b7cff3c8 rsi = 0x000001e823392ac0 rdi = 0x00000032b7cff470 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff318 r8 = 0x0000000000000064 r9 = 0x0000000000000000 r10 = 0x0000000000008000 r11 = 0x00000000000000ff r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000001e823322620 r15 = 0x000001e823392b60 rip = 0x00007ff9d21cd684 Found by: given as instruction pointer in context Stack contents: 00000032b7cff318 3f 68 e0 cf f9 7f 00 00 ?h...... Possible instruction pointers: 1 KERNELBASE.dll + 0x6683f rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff320 rip = 0x00007ff9cfe0683f Found by: stack scanning Stack contents: 00000032b7cff320 00 00 00 00 00 00 00 00 3d f2 7a 0e f9 7f 00 00 ........=.z..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x356f23d rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff330 rip = 0x00007ff90e7af23d Found by: stack scanning Stack contents: 00000032b7cff330 74 5f bf 34 8a c5 00 00 00 00 00 00 00 00 00 00 t_.4............ 00000032b7cff340 00 00 00 00 00 00 00 00 a5 68 e0 cf f9 7f 00 00 .........h...... Possible instruction pointers: 3 KERNELBASE.dll + 0x668a5 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff350 rip = 0x00007ff9cfe068a5 Found by: stack scanning Stack contents: 00000032b7cff350 02 01 00 00 00 00 00 00 bc ee 7a 0e f9 7f 00 00 ..........z..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x356eebc rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff360 rip = 0x00007ff90e7aeebc Found by: stack scanning Stack contents: 00000032b7cff360 00 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x87c4728 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff370 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7cff370 00 00 00 00 00 00 00 00 e2 4d 71 0e f9 7f 00 00 .........Mq..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x34d4de2 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff380 rip = 0x00007ff90e714de2 Found by: stack scanning Stack contents: 00000032b7cff380 20 42 38 23 e8 01 00 00 28 47 a0 13 f9 7f 00 00 B8#....(G...... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x87c4728 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff390 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7cff390 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff3a0 ff ff ff ff 00 00 00 00 41 64 7b 0e f9 7f 00 00 ........Ad{..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x3576441 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff3b0 rip = 0x00007ff90e7b6441 Found by: stack scanning Stack contents: 00000032b7cff3b0 00 00 00 00 00 00 00 00 c0 2a 39 23 e8 01 00 00 .........*9#.... 00000032b7cff3c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff3d0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b7cff3e0 20 26 32 23 e8 01 00 00 20 26 32 23 e8 01 00 00 &2#.... &2#.... 00000032b7cff3f0 b8 2a 39 23 e8 01 00 00 00 00 00 00 00 00 00 00 .*9#............ 00000032b7cff400 20 42 38 23 e8 01 00 00 2a c2 73 0e f9 7f 00 00 B8#....*.s..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34fc22a rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff410 rip = 0x00007ff90e73c22a Found by: stack scanning Stack contents: 00000032b7cff410 f0 f4 cf b7 32 00 00 00 e8 ef 73 0e f9 7f 00 00 ....2.....s..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x34fefe8 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff420 rip = 0x00007ff90e73efe8 Found by: stack scanning Stack contents: 00000032b7cff420 00 00 00 00 00 00 00 00 82 cb 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x34fcb82 rbp = 0x00000032b7cff439 rsp = 0x00000032b7cff430 rip = 0x00007ff90e73cb82 Found by: stack scanning Stack contents: 00000032b7cff430 01 f5 cf b7 32 00 00 00 78 f4 cf b7 32 00 00 00 ....2...x...2... 00000032b7cff440 58 f4 cf b7 32 00 00 00 01 00 00 00 00 00 00 00 X...2........... 00000032b7cff450 00 00 00 00 00 00 00 00 c0 2a 39 23 e8 01 00 00 .........*9#.... 00000032b7cff460 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff470 00 00 00 00 00 00 00 00 59 13 7a 27 04 d2 00 00 ........Y.z'.... 00000032b7cff480 00 00 00 00 00 00 00 00 20 42 38 23 e8 01 00 00 ........ B8#.... 00000032b7cff490 01 00 00 00 00 00 00 00 d2 4f 71 0e f9 7f 00 00 .........Oq..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x34d4fd2 rsp = 0x00000032b7cff4a0 rip = 0x00007ff90e714fd2 Found by: stack scanning Stack contents: 00000032b7cff4a0 00 29 39 23 e8 01 00 00 20 42 38 23 e8 01 00 00 .)9#.... B8#.... 00000032b7cff4b0 20 26 32 23 e8 01 00 00 28 47 a0 13 f9 7f 00 00 &2#....(G...... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b7cff4c0 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7cff4c0 20 42 38 23 e8 01 00 00 55 33 71 0e f9 7f 00 00 B8#....U3q..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x34d3355 rsp = 0x00000032b7cff4d0 rip = 0x00007ff90e713355 Found by: stack scanning Stack contents: 00000032b7cff4d0 c8 2a 39 23 e8 01 00 00 ff ff ff ff e8 01 00 00 .*9#............ 00000032b7cff4e0 01 00 00 00 00 00 00 00 98 2a 39 23 e8 01 00 00 .........*9#.... 00000032b7cff4f0 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b7cff500 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff510 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b7cff520 00 00 00 00 00 00 00 00 f8 29 39 23 e8 01 00 00 .........)9#.... 00000032b7cff530 00 00 00 00 00 00 00 00 98 4a 71 0e f9 7f 00 00 .........Jq..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x34d4a98 rsp = 0x00000032b7cff540 rip = 0x00007ff90e714a98 Found by: stack scanning Stack contents: 00000032b7cff540 20 42 38 23 e8 01 00 00 1e 99 73 0e f9 7f 00 00 B8#......s..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x34f991e rsp = 0x00000032b7cff550 rip = 0x00007ff90e73991e Found by: stack scanning Stack contents: 00000032b7cff550 98 2a 39 23 e8 01 00 00 e0 2b 39 23 e8 01 00 00 .*9#.....+9#.... 00000032b7cff560 b8 2a 39 23 e8 01 00 00 00 00 39 23 e8 01 00 00 .*9#......9#.... 00000032b7cff570 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b7cff580 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b7cff580 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b7cff590 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b7cff5a0 00 24 39 23 e8 01 00 00 00 00 00 00 00 00 00 00 .$9#............ 00000032b7cff5b0 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b7cff5c0 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7cff5c0 00 00 00 00 00 00 00 00 40 62 f9 1a e8 01 00 00 ........@b...... 00000032b7cff5d0 58 f6 cf b7 32 00 00 00 e6 7c 70 0e f9 7f 00 00 X...2....|p..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b7cff5e0 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b7cff5e0 00 00 00 00 00 00 00 00 d0 24 39 23 e8 01 00 00 .........$9#.... 00000032b7cff5f0 40 f8 cf b7 32 00 00 00 10 f7 cf b7 32 00 00 00 @...2.......2... 00000032b7cff600 40 f8 cf b7 32 00 00 00 85 69 76 0e f9 7f 00 00 @...2....iv..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b7cff610 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b7cff610 40 f8 cf b7 32 00 00 00 20 26 32 23 e8 01 00 00 @...2... &2#.... 00000032b7cff620 c0 f7 cf b7 32 00 00 00 d0 24 39 23 e8 01 00 00 ....2....$9#.... 00000032b7cff630 00 00 03 1b e8 01 00 00 f9 f6 cf b7 32 00 00 00 ............2... 00000032b7cff640 01 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 21 ntdll.dll + 0x2b3c7 rsp = 0x00000032b7cff650 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b7cff650 00 00 00 00 00 00 00 00 a0 32 38 23 e8 01 00 00 .........28#.... 00000032b7cff660 50 f6 cf b7 32 00 00 00 00 00 00 00 00 00 00 00 P...2........... 00000032b7cff670 e8 2e 39 23 e8 01 00 00 e0 29 39 23 e8 01 00 00 ..9#.....)9#.... 00000032b7cff680 90 f7 cf b7 02 00 00 00 e0 2a 39 23 e8 01 00 00 .........*9#.... 00000032b7cff690 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b7cff6a0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff6b0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 22 ucrtbase.dll + 0xfde6 rsp = 0x00000032b7cff6c0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b7cff6c0 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b7cff6d0 38 2b 39 23 e8 01 00 00 00 00 39 23 e8 01 00 00 8+9#......9#.... 00000032b7cff6e0 01 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b7cff6f0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b7cff6f0 08 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b7cff700 e0 29 39 23 e8 01 00 00 08 2c 39 23 e8 01 00 00 .)9#.....,9#.... 00000032b7cff710 c0 31 38 23 e8 01 00 00 bb 95 4d 0b f9 7f 00 00 .18#......M..... Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x2995bb rsp = 0x00000032b7cff720 rip = 0x00007ff90b4d95bb Found by: stack scanning Stack contents: 00000032b7cff720 d0 24 39 23 e8 01 00 00 20 26 32 23 e8 01 00 00 .$9#.... &2#.... 00000032b7cff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff740 a0 63 25 23 e8 01 00 00 40 f8 cf b7 32 00 00 00 .c%#....@...2... 00000032b7cff750 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 25 ucrtbase.dll + 0xfde6 rsp = 0x00000032b7cff760 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b7cff760 20 26 32 23 e8 01 00 00 08 00 00 00 00 00 00 00 &2#............ 00000032b7cff770 d0 24 39 23 e8 01 00 00 d0 24 39 23 e8 01 00 00 .$9#.....$9#.... 00000032b7cff780 00 00 00 00 00 00 00 00 d0 24 39 23 e8 01 00 00 .........$9#.... 00000032b7cff790 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 26 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b7cff7a0 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b7cff7a0 40 f8 cf b7 32 00 00 00 20 26 32 23 e8 01 00 00 @...2... &2#.... 00000032b7cff7b0 60 f8 cf b7 32 00 00 00 e6 7c 70 0e f9 7f 00 00 `...2....|p..... Possible instruction pointers: 27 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b7cff7c0 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b7cff7c0 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 28 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b7cff7c8 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b7cff7c8 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 29 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b7cff7d0 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b7cff7d0 51 01 00 00 e8 01 00 00 77 18 71 0e f9 7f 00 00 Q.......w.q..... Possible instruction pointers: 30 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b7cff7e0 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b7cff7e0 40 f8 cf b7 32 00 00 00 31 5d 0a 10 f9 7f 00 00 @...2...1]...... Possible instruction pointers: 31 Qt6WebEngineCore.dll + 0x4e65d31 rsp = 0x00000032b7cff7f0 rip = 0x00007ff9100a5d31 Found by: stack scanning Stack contents: 00000032b7cff7f0 40 f8 cf b7 32 00 00 00 d0 24 39 23 e8 01 00 00 @...2....$9#.... 00000032b7cff800 69 17 7a 27 04 d2 00 00 a0 63 25 23 e8 01 00 00 i.z'.....c%#.... 00000032b7cff810 a0 63 25 23 e8 01 00 00 95 24 71 0e f9 7f 00 00 .c%#.....$q..... Possible instruction pointers: 32 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b7cff820 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b7cff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff830 00 00 00 00 00 00 00 00 b1 47 15 d2 f9 7f 00 00 .........G...... Possible instruction pointers: 33 ntdll.dll + 0x247b1 rsp = 0x00000032b7cff840 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b7cff840 c0 2a 39 23 e8 01 00 00 00 00 00 00 00 01 00 00 .*9#............ 00000032b7cff850 01 00 00 00 00 00 00 00 e0 2e 39 23 e8 01 00 00 ..........9#.... 00000032b7cff860 e0 31 38 23 e8 01 00 00 40 f8 cf b7 32 00 00 00 .18#....@...2... 00000032b7cff870 b0 3f 38 23 e8 01 00 00 5b f0 7e cf f9 7f 00 00 .?8#....[.~..... Possible instruction pointers: 34 ucrtbase.dll + 0xf05b rsp = 0x00000032b7cff880 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b7cff880 14 00 00 00 00 00 00 00 1f 00 00 00 00 00 00 00 ................ 00000032b7cff890 f9 18 7a 27 04 d2 00 00 00 00 00 00 00 00 00 00 ..z'............ 00000032b7cff8a0 00 00 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 35 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b7cff8b0 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b7cff8b0 00 00 00 00 00 00 00 00 b8 2b 00 00 00 00 00 00 .........+...... 00000032b7cff8c0 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b7cff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff8e0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff8f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff900 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 36 kernel32.dll + 0x17374 rsp = 0x00000032b7cff910 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b7cff910 b8 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .+.............. 00000032b7cff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7cff930 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 37 ntdll.dll + 0x4cc91 rsp = 0x00000032b7cff940 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 24 0 ntdll.dll + 0xa0f94 rax = 0x00000000000001d2 rdx = 0x0000000000000000 rcx = 0x000001e8232c48f8 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x000001e8232c48f8 rbp = 0x00000032b7dffcf0 rsp = 0x00000032b7dffc98 r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x000001e8232c48f8 r11 = 0x000001e8232c4930 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00000032b7dffcc0 r15 = 0x000001e8232c4930 rip = 0x00007ff9d21d0f94 Found by: given as instruction pointer in context Stack contents: 00000032b7dffc98 01 56 19 d2 f9 7f 00 00 .V...... Possible instruction pointers: 1 ntdll.dll + 0x65601 rbp = 0x00000032b7dffcf0 rsp = 0x00000032b7dffca0 rip = 0x00007ff9d2195601 Found by: stack scanning Stack contents: 00000032b7dffca0 00 00 03 00 e8 01 00 00 0c 00 00 00 f9 7f 00 00 ................ 00000032b7dffcb0 30 e9 08 13 f9 7f 00 00 0....... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x7e4e930 rbp = 0x00000032b7dffcf0 rsp = 0x00000032b7dffcb8 rip = 0x00007ff91308e930 Found by: stack scanning Stack contents: 00000032b7dffcb8 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffcc8 c0 fc df b7 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b7dffcd8 8c 33 00 00 00 00 00 00 00 00 02 00 01 00 00 00 .3.............. 00000032b7dffce8 f8 48 2c 23 e8 01 00 00 e0 8b 25 23 e8 01 00 00 .H,#......%#.... 00000032b7dffcf8 50 62 11 23 e8 01 00 00 00 00 00 00 00 00 00 00 Pb.#............ 00000032b7dffd08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffd18 19 33 e1 cf f9 7f 00 00 .3...... Possible instruction pointers: 3 KERNELBASE.dll + 0x73319 rsp = 0x00000032b7dffd20 rip = 0x00007ff9cfe13319 Found by: stack scanning Stack contents: 00000032b7dffd20 30 49 2c 23 e8 01 00 00 00 00 00 00 00 00 00 00 0I,#............ 00000032b7dffd30 e8 48 2c 23 e8 01 00 00 00 00 03 1b e8 01 00 00 .H,#............ 00000032b7dffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffd50 30 49 2c 23 e8 01 00 00 2e c4 71 0e f9 7f 00 00 0I,#......q..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34dc42e rsp = 0x00000032b7dffd60 rip = 0x00007ff90e71c42e Found by: stack scanning Stack contents: 00000032b7dffd60 00 00 03 00 e8 01 00 00 5b f0 7e cf f9 7f 00 00 ........[.~..... Possible instruction pointers: 5 ucrtbase.dll + 0xf05b rsp = 0x00000032b7dffd70 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b7dffd70 e8 8b 25 23 e8 01 00 00 70 33 e1 cf f9 7f 00 00 ..%#....p3...... Possible instruction pointers: 6 KERNELBASE.dll + 0x73370 rsp = 0x00000032b7dffd80 rip = 0x00007ff9cfe13370 Found by: stack scanning Stack contents: 00000032b7dffd80 2a 00 2c 00 00 00 00 00 d0 3d 32 23 e8 01 00 00 *.,......=2#.... 00000032b7dffd90 e8 8b 25 23 e8 01 00 00 e0 68 b2 36 e8 01 00 00 ..%#.....h.6.... 00000032b7dffda0 00 2a 44 37 e8 01 00 00 00 00 00 00 00 00 00 00 .*D7............ 00000032b7dffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffdc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffdd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffdf0 00 00 00 00 00 00 00 00 c0 2b 00 00 00 00 00 00 .........+...... 00000032b7dffe00 00 00 00 00 00 00 00 00 1a 0e 6a 0f f9 7f 00 00 ..........j..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x4460e1a rsp = 0x00000032b7dffe10 rip = 0x00007ff90f6a0e1a Found by: stack scanning Stack contents: 00000032b7dffe10 00 01 00 00 00 00 00 00 c0 2b 00 00 00 00 00 00 .........+...... 00000032b7dffe20 50 62 11 23 e8 01 00 00 e0 8b 25 23 e8 01 00 00 Pb.#......%#.... 00000032b7dffe30 a0 63 25 23 e8 01 00 00 55 c1 71 0e f9 7f 00 00 .c%#....U.q..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b7dffe40 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b7dffe40 c0 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .+.............. 00000032b7dffe50 c0 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .+.............. 00000032b7dffe60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffe70 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffe90 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b7dffea0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b7dffea0 c0 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .+.............. 00000032b7dffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7dffec0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b7dffed0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 25 0 win32u.dll + 0xa104 rax = 0x0000000000001486 rdx = 0x0000000000000000 rcx = 0x0000000000000000 rbx = 0x0000000000000000 rsi = 0x000001e8233687b0 rdi = 0x0000000000000000 rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff578 r8 = 0x000000000000000f r9 = 0x000000000000001b r10 = 0x0000000000000000 r11 = 0xb4180000000001c1 r12 = 0x0000000000000000 r13 = 0x000001e8233920e0 r14 = 0x000001e8231167b0 r15 = 0x000001e823368800 rip = 0x00007ff9d013a104 Found by: given as instruction pointer in context Stack contents: 00000032b7eff578 fe 11 84 d1 f9 7f 00 00 ........ Possible instruction pointers: 1 user32.dll + 0x211fe rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff580 rip = 0x00007ff9d18411fe Found by: stack scanning Stack contents: 00000032b7eff580 00 00 00 00 00 00 00 00 ca e3 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x34fe3ca rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff590 rip = 0x00007ff90e73e3ca Found by: stack scanning Stack contents: 00000032b7eff590 00 8f 32 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..2#............ 00000032b7eff5a0 04 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x87c4728 rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff5b0 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7eff5b0 00 00 00 00 00 00 00 00 9e 50 71 0e f9 7f 00 00 .........Pq..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34d509e rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff5c0 rip = 0x00007ff90e71509e Found by: stack scanning Stack contents: 00000032b7eff5c0 e0 20 39 23 e8 01 00 00 e0 20 39 23 e8 01 00 00 . 9#..... 9#.... 00000032b7eff5d0 00 00 00 00 00 00 00 00 e8 ef 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34fefe8 rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff5e0 rip = 0x00007ff90e73efe8 Found by: stack scanning Stack contents: 00000032b7eff5e0 04 00 00 00 9c 45 00 00 00 00 00 00 00 00 00 00 .....E.......... 00000032b7eff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7eff600 01 00 00 00 00 00 00 00 41 64 7b 0e f9 7f 00 00 ........Ad{..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x3576441 rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff610 rip = 0x00007ff90e7b6441 Found by: stack scanning Stack contents: 00000032b7eff610 00 00 00 00 00 00 00 00 b0 87 36 23 e8 01 00 00 ..........6#.... 00000032b7eff620 00 00 00 00 00 00 00 00 b1 e4 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34fe4b1 rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff630 rip = 0x00007ff90e73e4b1 Found by: stack scanning Stack contents: 00000032b7eff630 e8 86 36 23 e8 01 00 00 01 00 00 00 00 00 00 00 ..6#............ 00000032b7eff640 b0 67 11 23 e8 01 00 00 b0 67 11 23 e8 01 00 00 .g.#.....g.#.... 00000032b7eff650 a8 87 36 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..6#............ 00000032b7eff660 e0 20 39 23 e8 01 00 00 2a c2 73 0e f9 7f 00 00 . 9#....*.s..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x34fc22a rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff670 rip = 0x00007ff90e73c22a Found by: stack scanning Stack contents: 00000032b7eff670 50 f7 ef b7 32 00 00 00 e0 20 39 23 e8 01 00 00 P...2.... 9#.... 00000032b7eff680 00 00 00 00 00 00 00 00 82 cb 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34fcb82 rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff690 rip = 0x00007ff90e73cb82 Found by: stack scanning Stack contents: 00000032b7eff690 e8 f7 ef b7 32 00 00 00 d8 f6 ef b7 32 00 00 00 ....2.......2... 00000032b7eff6a0 b8 f6 ef b7 32 00 00 00 01 00 00 00 00 00 00 00 ....2........... 00000032b7eff6b0 00 00 00 00 00 00 00 00 00 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 10 ucrtbase.dll + 0xfd00 rbp = 0x00000032b7eff6c0 rsp = 0x00000032b7eff6c0 rip = 0x00007ff9cf7efd00 Found by: stack scanning Stack contents: 00000032b7eff6c0 00 00 00 00 00 00 00 00 17 00 00 00 00 00 00 00 ................ 00000032b7eff6d0 28 47 a0 13 f9 7f 00 00 (G...... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b7eff6d8 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7eff6d8 01 9d 73 0e f9 7f 00 00 ..s..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x34f9d01 rsp = 0x00000032b7eff6e0 rip = 0x00007ff90e739d01 Found by: stack scanning Stack contents: 00000032b7eff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7eff6f0 b0 67 11 23 e8 01 00 00 00 00 00 00 00 00 00 00 .g.#............ 00000032b7eff700 00 00 00 00 00 00 00 00 b0 87 36 23 e8 01 00 00 ..........6#.... 00000032b7eff710 50 88 36 23 e8 01 00 00 00 00 00 00 00 00 00 00 P.6#............ 00000032b7eff720 01 00 00 00 00 00 00 00 23 34 71 0e f9 7f 00 00 ........#4q..... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x34d3423 rsp = 0x00000032b7eff730 rip = 0x00007ff90e713423 Found by: stack scanning Stack contents: 00000032b7eff730 e0 20 39 23 e8 01 00 00 70 f7 ef b7 32 00 00 00 . 9#....p...2... 00000032b7eff740 04 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 00000032b7eff750 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b7eff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7eff770 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b7eff780 00 00 00 00 00 00 00 00 e8 86 36 23 e8 01 00 00 ..........6#.... 00000032b7eff790 00 00 00 00 00 00 00 00 98 4a 71 0e f9 7f 00 00 .........Jq..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x34d4a98 rsp = 0x00000032b7eff7a0 rip = 0x00007ff90e714a98 Found by: stack scanning Stack contents: 00000032b7eff7a0 e0 20 39 23 e8 01 00 00 1e 99 73 0e f9 7f 00 00 . 9#......s..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x34f991e rsp = 0x00000032b7eff7b0 rip = 0x00007ff90e73991e Found by: stack scanning Stack contents: 00000032b7eff7b0 88 87 36 23 e8 01 00 00 d0 88 36 23 e8 01 00 00 ..6#......6#.... 00000032b7eff7c0 a8 87 36 23 e8 01 00 00 00 00 36 23 e8 01 00 00 ..6#......6#.... 00000032b7eff7d0 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b7eff7e0 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b7eff7e0 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b7eff7f0 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b7eff800 00 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b7eff810 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b7eff820 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b7eff820 10 00 00 00 00 00 00 00 80 0d f9 1a e8 01 00 00 ................ 00000032b7eff830 b8 f8 ef b7 32 00 00 00 e6 7c 70 0e f9 7f 00 00 ....2....|p..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b7eff840 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b7eff840 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b7eff850 70 fa ef b7 32 00 00 00 70 f9 ef b7 32 00 00 00 p...2...p...2... 00000032b7eff860 70 fa ef b7 32 00 00 00 85 69 76 0e f9 7f 00 00 p...2....iv..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b7eff870 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b7eff870 70 fa ef b7 32 00 00 00 b0 67 11 23 e8 01 00 00 p...2....g.#.... 00000032b7eff880 20 fa ef b7 32 00 00 00 a0 63 25 23 e8 01 00 00 ...2....c%#.... 00000032b7eff890 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7eff8a0 00 00 00 00 00 00 00 00 20 00 00 00 00 00 00 00 ........ ....... 00000032b7eff8b0 00 00 00 00 00 00 00 00 e0 05 31 23 e8 01 00 00 ..........1#.... 00000032b7eff8c0 b0 f8 ef b7 32 00 00 00 89 f9 ef b7 32 00 00 00 ....2.......2... 00000032b7eff8d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7eff8e0 00 00 f9 1a e8 01 00 00 04 00 00 00 f9 7f 00 00 ................ 00000032b7eff8f0 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7eff900 28 88 36 23 e8 01 00 00 00 00 36 23 e8 01 00 00 (.6#......6#.... 00000032b7eff910 01 00 00 00 02 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b7eff920 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b7eff920 08 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b7eff930 d0 86 36 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..6#............ 00000032b7eff940 70 05 31 23 e8 01 00 00 bb 95 4d 0b f9 7f 00 00 p.1#......M..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x2995bb rsp = 0x00000032b7eff950 rip = 0x00007ff90b4d95bb Found by: stack scanning Stack contents: 00000032b7eff950 68 56 ae 1e e8 01 00 00 b0 67 11 23 e8 01 00 00 hV.......g.#.... 00000032b7eff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7eff970 a0 63 25 23 e8 01 00 00 70 fa ef b7 32 00 00 00 .c%#....p...2... 00000032b7eff980 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 22 ucrtbase.dll + 0xfde6 rsp = 0x00000032b7eff990 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b7eff990 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b7eff9a0 68 56 ae 1e e8 01 00 00 00 00 ef b7 32 00 00 00 hV..........2... 00000032b7eff9b0 a0 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b7eff9c0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b7eff9c0 b0 67 11 23 e8 01 00 00 00 00 00 00 00 00 00 00 .g.#............ 00000032b7eff9d0 a0 63 25 23 e8 01 00 00 68 56 ae 1e e8 01 00 00 .c%#....hV...... 00000032b7eff9e0 00 00 00 00 00 00 00 00 68 56 ae 1e e8 01 00 00 ........hV...... 00000032b7eff9f0 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b7effa00 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b7effa00 70 fa ef b7 32 00 00 00 00 00 00 00 00 00 00 00 p...2........... 00000032b7effa10 a0 63 25 23 e8 01 00 00 96 3f 76 0e f9 7f 00 00 .c%#.....?v..... Possible instruction pointers: 25 Qt6WebEngineCore.dll + 0x3523f96 rsp = 0x00000032b7effa20 rip = 0x00007ff90e763f96 Found by: stack scanning Stack contents: 00000032b7effa20 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 26 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b7effa28 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b7effa28 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 27 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b7effa30 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b7effa30 51 01 00 00 00 00 00 00 77 18 71 0e f9 7f 00 00 Q.......w.q..... Possible instruction pointers: 28 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b7effa40 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b7effa40 f0 55 36 23 e8 01 00 00 95 24 71 0e f9 7f 00 00 .U6#.....$q..... Possible instruction pointers: 29 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b7effa50 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b7effa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7effa60 e4 2b 00 00 00 00 00 00 b1 47 15 d2 f9 7f 00 00 .+.......G...... Possible instruction pointers: 30 ntdll.dll + 0x247b1 rsp = 0x00000032b7effa70 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b7effa70 b0 87 36 23 e8 01 00 00 00 00 00 00 00 01 00 00 ..6#............ 00000032b7effa80 01 00 00 00 00 00 00 00 80 9a 11 23 e8 01 00 00 ...........#.... 00000032b7effa90 a0 06 31 23 e8 01 00 00 70 fa ef b7 32 00 00 00 ..1#....p...2... 00000032b7effaa0 30 59 36 23 e8 01 00 00 5b f0 7e cf f9 7f 00 00 0Y6#....[.~..... Possible instruction pointers: 31 ucrtbase.dll + 0xf05b rsp = 0x00000032b7effab0 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b7effab0 12 00 00 00 00 00 00 00 1f 00 00 00 00 00 00 00 ................ 00000032b7effac0 89 1a 5a 27 04 d2 00 00 00 00 00 00 00 00 00 00 ..Z'............ 00000032b7effad0 00 00 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 32 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b7effae0 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b7effae0 00 00 00 00 00 00 00 00 e4 2b 00 00 00 00 00 00 .........+...... 00000032b7effaf0 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b7effb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7effb10 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7effb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7effb30 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 33 kernel32.dll + 0x17374 rsp = 0x00000032b7effb40 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b7effb40 e4 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .+.............. 00000032b7effb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7effb60 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 34 ntdll.dll + 0x4cc91 rsp = 0x00000032b7effb70 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 26 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002c24 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002c24 rbp = 0x0000000000000000 rsp = 0x00000032b7fff758 r8 = 0x00000032b7fff758 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000002c24 r15 = 0x0000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b7fff758 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b7fff760 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b7fff760 a8 99 9d 2c e8 01 00 00 08 01 00 00 00 00 00 00 ...,............ 00000032b7fff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff790 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b7fff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff7d0 00 00 00 00 00 00 00 00 84 86 9d 2c e8 01 00 00 ...........,.... 00000032b7fff7e0 84 86 9d 2c e8 01 00 00 b8 96 9d 2c e8 01 00 00 ...,.......,.... 00000032b7fff7f0 00 00 00 00 00 00 00 00 72 78 47 c4 f9 7f 00 00 ........rxG..... Possible instruction pointers: 2 atidxx64.dll + 0x7872 rsp = 0x00000032b7fff800 rip = 0x00007ff9c4477872 Found by: stack scanning Stack contents: 00000032b7fff800 60 86 9d 2c e8 01 00 00 00 00 00 00 00 00 00 00 `..,............ 00000032b7fff810 00 00 00 00 00 00 00 00 24 2c 00 00 00 00 00 00 ........$,...... 00000032b7fff820 f0 52 55 23 e8 01 00 00 b9 74 47 c4 f9 7f 00 00 .RU#.....tG..... Possible instruction pointers: 3 atidxx64.dll + 0x74b9 rsp = 0x00000032b7fff830 rip = 0x00007ff9c44774b9 Found by: stack scanning Stack contents: 00000032b7fff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff850 f0 52 55 23 e8 01 00 00 b4 bf d2 c4 f9 7f 00 00 .RU#............ Possible instruction pointers: 4 atidxx64.dll + 0x8bbfb4 rsp = 0x00000032b7fff860 rip = 0x00007ff9c4d2bfb4 Found by: stack scanning Stack contents: 00000032b7fff860 00 00 00 00 e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff870 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff880 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 5 kernel32.dll + 0x17374 rsp = 0x00000032b7fff890 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b7fff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b7fff8b0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 6 ntdll.dll + 0x4cc91 rsp = 0x00000032b7fff8c0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 27 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002c38 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002c38 rbp = 0x0000000000000000 rsp = 0x00000032b80ffd88 r8 = 0x000000000000000b r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x000001e82ca5d630 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000002c38 r15 = 0x0000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b80ffd88 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b80ffd90 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b80ffd90 b0 4d a1 2c e8 01 00 00 40 c9 93 33 e8 01 00 00 .M.,....@..3.... 00000032b80ffda0 01 00 00 00 e8 01 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b80ffdb0 00 00 00 00 ff 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffdc0 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b80ffdd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffe00 00 00 00 00 00 00 00 00 5e 1e bd c4 f9 7f 00 00 ........^....... Possible instruction pointers: 2 atidxx64.dll + 0x761e5e rsp = 0x00000032b80ffe10 rip = 0x00007ff9c4bd1e5e Found by: stack scanning Stack contents: 00000032b80ffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffe20 00 00 00 00 00 00 00 00 41 d9 b9 c4 f9 7f 00 00 ........A....... Possible instruction pointers: 3 atidxx64.dll + 0x72d941 rsp = 0x00000032b80ffe30 rip = 0x00007ff9c4b9d941 Found by: stack scanning Stack contents: 00000032b80ffe30 c0 f4 9d 2c e8 01 00 00 05 00 00 00 00 00 00 00 ...,............ 00000032b80ffe40 00 00 00 00 e8 01 00 00 38 2c 00 00 00 00 00 00 ........8,...... 00000032b80ffe50 c0 f4 9d 2c e8 01 00 00 18 d8 b9 c4 f9 7f 00 00 ...,............ Possible instruction pointers: 4 atidxx64.dll + 0x72d818 rsp = 0x00000032b80ffe60 rip = 0x00007ff9c4b9d818 Found by: stack scanning Stack contents: 00000032b80ffe60 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 ................ 00000032b80ffe70 c0 f4 9d 2c e8 01 00 00 00 00 00 00 00 00 00 00 ...,............ 00000032b80ffe80 c0 f4 9d 2c e8 01 00 00 af da b9 c4 f9 7f 00 00 ...,............ Possible instruction pointers: 5 atidxx64.dll + 0x72daaf rsp = 0x00000032b80ffe90 rip = 0x00007ff9c4b9daaf Found by: stack scanning Stack contents: 00000032b80ffe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffeb0 20 53 55 23 e8 01 00 00 39 22 b9 c4 f9 7f 00 00 SU#....9"...... Possible instruction pointers: 6 atidxx64.dll + 0x722239 rsp = 0x00000032b80ffec0 rip = 0x00007ff9c4b92239 Found by: stack scanning Stack contents: 00000032b80ffec0 00 00 00 00 00 00 00 00 f0 e7 39 23 e8 01 00 00 ..........9#.... 00000032b80ffed0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80ffee0 20 53 55 23 e8 01 00 00 b4 bf d2 c4 f9 7f 00 00 SU#............ Possible instruction pointers: 7 atidxx64.dll + 0x8bbfb4 rsp = 0x00000032b80ffef0 rip = 0x00007ff9c4d2bfb4 Found by: stack scanning Stack contents: 00000032b80ffef0 20 53 55 23 e8 01 00 00 00 00 00 00 00 00 00 00 SU#............ 00000032b80fff00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80fff10 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 8 kernel32.dll + 0x17374 rsp = 0x00000032b80fff20 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b80fff20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b80fff40 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 9 ntdll.dll + 0x4cc91 rsp = 0x00000032b80fff50 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 28 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002cb0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000002cb0 rbp = 0x00000000ffffffff rsp = 0x00000032b81ff218 r8 = 0x00007ff913a04728 r9 = 0x0000000000000001 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000002cb0 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b81ff218 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b81ff220 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b81ff220 00 00 00 00 00 00 00 00 e1 a7 0b 12 f9 7f 00 00 ................ Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x6e7a7e1 rsp = 0x00000032b81ff230 rip = 0x00007ff9120ba7e1 Found by: stack scanning Stack contents: 00000032b81ff230 28 47 a0 13 f9 7f 00 00 (G...... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b81ff238 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b81ff238 40 10 5b c5 f9 7f 00 00 @.[..... Possible instruction pointers: 4 winmm.dll + 0x1040 rsp = 0x00000032b81ff240 rip = 0x00007ff9c55b1040 Found by: stack scanning Stack contents: 00000032b81ff240 02 01 00 00 32 00 00 00 00 8f fd ff ff ff ff ff ....2........... 00000032b81ff250 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b81ff260 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff270 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff280 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff290 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff2a0 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b81ff2b0 b0 45 29 23 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 .E)#......q..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b81ff2c0 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b81ff2c0 ff ff ff ff ff ff ff 7f bc ee 7a 0e f9 7f 00 00 ..........z..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x356eebc rsp = 0x00000032b81ff2d0 rip = 0x00007ff90e7aeebc Found by: stack scanning Stack contents: 00000032b81ff2d0 00 00 00 00 ff ff ff 7f b0 2c 00 00 00 00 00 00 .........,...... 00000032b81ff2e0 00 00 00 00 00 00 00 00 20 f4 1f b8 32 00 00 00 ........ ...2... 00000032b81ff2f0 00 00 00 00 00 00 00 80 ff ff ff ff ff ff ff 7f ................ 00000032b81ff300 a8 45 29 23 e8 01 00 00 ff ff ff ff ff ff ff 7f .E)#............ 00000032b81ff310 b0 45 29 23 e8 01 00 00 ea f7 72 0e f9 7f 00 00 .E)#......r..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34ef7ea rsp = 0x00000032b81ff320 rip = 0x00007ff90e72f7ea Found by: stack scanning Stack contents: 00000032b81ff320 a8 45 29 23 e8 01 00 00 a0 45 29 23 e8 01 00 00 .E)#.....E)#.... 00000032b81ff330 00 00 00 00 00 00 00 00 b1 e4 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x34fe4b1 rsp = 0x00000032b81ff340 rip = 0x00007ff90e73e4b1 Found by: stack scanning Stack contents: 00000032b81ff340 88 bd 5d 23 e8 01 00 00 01 00 00 00 00 00 00 00 ..]#............ 00000032b81ff350 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b81ff360 48 be 5d 23 e8 01 00 00 00 00 00 00 00 00 00 00 H.]#............ 00000032b81ff370 48 be 5d 23 e8 01 00 00 2a c2 73 0e f9 7f 00 00 H.]#....*.s..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34fc22a rsp = 0x00000032b81ff380 rip = 0x00007ff90e73c22a Found by: stack scanning Stack contents: 00000032b81ff380 60 f4 1f b8 32 00 00 00 48 be 5d 23 e8 01 00 00 `...2...H.]#.... 00000032b81ff390 00 00 00 00 00 00 00 00 82 cb 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x34fcb82 rsp = 0x00000032b81ff3a0 rip = 0x00007ff90e73cb82 Found by: stack scanning Stack contents: 00000032b81ff3a0 01 be 5d 23 e8 01 00 00 e8 f3 1f b8 32 00 00 00 ..]#........2... 00000032b81ff3b0 c8 f3 1f b8 32 00 00 00 08 00 00 00 00 00 00 00 ....2........... 00000032b81ff3c0 de 99 fc 44 00 00 00 00 00 00 00 00 00 00 00 00 ...D............ 00000032b81ff3d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff3e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff3f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff400 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff410 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff420 ff ff ff ff ff ff ff 7f a8 45 29 23 e8 01 00 00 .........E)#.... 00000032b81ff430 01 00 00 00 00 00 00 00 45 98 70 0e f9 7f 00 00 ........E.p..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x34c9845 rsp = 0x00000032b81ff440 rip = 0x00007ff90e709845 Found by: stack scanning Stack contents: 00000032b81ff440 48 be 5d 23 e8 01 00 00 a0 45 29 23 e8 01 00 00 H.]#.....E)#.... 00000032b81ff450 a8 45 29 23 e8 01 00 00 de 99 fc 44 00 00 00 00 .E)#.......D.... 00000032b81ff460 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b81ff470 00 be 5d 23 e8 01 00 00 70 bf 5d 23 e8 01 00 00 ..]#....p.]#.... 00000032b81ff480 f0 be 5d 23 e8 01 00 00 80 f4 5d 23 e8 01 00 00 ..]#......]#.... 00000032b81ff490 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b81ff4a0 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b81ff4a0 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b81ff4b0 50 be 5d 23 e8 01 00 00 01 00 00 00 00 00 00 00 P.]#............ 00000032b81ff4c0 00 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b81ff4d0 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b81ff4e0 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b81ff4e0 10 00 00 00 00 00 00 00 c0 0c f9 1a e8 01 00 00 ................ 00000032b81ff4f0 78 f5 1f b8 32 00 00 00 e6 7c 70 0e f9 7f 00 00 x...2....|p..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b81ff500 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b81ff500 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b81ff510 30 f7 1f b8 32 00 00 00 30 f6 1f b8 32 00 00 00 0...2...0...2... 00000032b81ff520 30 f7 1f b8 32 00 00 00 85 69 76 0e f9 7f 00 00 0...2....iv..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b81ff530 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b81ff530 30 f7 1f b8 32 00 00 00 80 f4 5d 23 e8 01 00 00 0...2.....]#.... 00000032b81ff540 e0 f6 1f b8 32 00 00 00 a0 63 25 23 e8 01 00 00 ....2....c%#.... 00000032b81ff550 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff560 48 2c 5c 23 e8 01 00 00 70 bd 5d 23 e8 01 00 00 H,\#....p.]#.... 00000032b81ff570 00 00 00 00 00 00 00 00 60 c8 22 23 e8 01 00 00 ........`."#.... 00000032b81ff580 70 f5 1f b8 32 00 00 00 01 00 00 00 00 00 00 00 p...2........... 00000032b81ff590 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff5a0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 16 ucrtbase.dll + 0xfde6 rsp = 0x00000032b81ff5b0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b81ff5b0 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b81ff5c0 c8 be 5d 23 e8 01 00 00 00 00 5d 23 e8 01 00 00 ..]#......]#.... 00000032b81ff5d0 01 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b81ff5e0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b81ff5e0 08 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b81ff5f0 70 bd 5d 23 e8 01 00 00 98 bf 5d 23 e8 01 00 00 p.]#......]#.... 00000032b81ff600 a0 c9 22 23 e8 01 00 00 bb 95 4d 0b f9 7f 00 00 .."#......M..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x2995bb rsp = 0x00000032b81ff610 rip = 0x00007ff90b4d95bb Found by: stack scanning Stack contents: 00000032b81ff610 b0 29 5a 23 e8 01 00 00 80 f4 5d 23 e8 01 00 00 .)Z#......]#.... 00000032b81ff620 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff630 a0 63 25 23 e8 01 00 00 30 f7 1f b8 32 00 00 00 .c%#....0...2... 00000032b81ff640 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 19 ucrtbase.dll + 0xfde6 rsp = 0x00000032b81ff650 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b81ff650 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b81ff660 b0 29 5a 23 e8 01 00 00 00 00 1f b8 32 00 00 00 .)Z#........2... 00000032b81ff670 a0 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b81ff680 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b81ff680 80 f4 5d 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..]#............ 00000032b81ff690 a0 63 25 23 e8 01 00 00 b0 29 5a 23 e8 01 00 00 .c%#.....)Z#.... 00000032b81ff6a0 00 00 00 00 00 00 00 00 b0 29 5a 23 e8 01 00 00 .........)Z#.... 00000032b81ff6b0 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b81ff6c0 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b81ff6c0 30 f7 1f b8 32 00 00 00 13 00 00 00 00 00 00 00 0...2........... 00000032b81ff6d0 a0 63 25 23 e8 01 00 00 96 3f 76 0e f9 7f 00 00 .c%#.....?v..... Possible instruction pointers: 22 Qt6WebEngineCore.dll + 0x3523f96 rsp = 0x00000032b81ff6e0 rip = 0x00007ff90e763f96 Found by: stack scanning Stack contents: 00000032b81ff6e0 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b81ff6e8 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b81ff6e8 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b81ff6f0 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b81ff6f0 51 01 00 00 04 d2 00 00 77 18 71 0e f9 7f 00 00 Q.......w.q..... Possible instruction pointers: 25 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b81ff700 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b81ff700 00 00 00 00 00 00 00 00 95 24 71 0e f9 7f 00 00 .........$q..... Possible instruction pointers: 26 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b81ff710 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b81ff710 e0 25 5c 23 e8 01 00 00 00 00 00 00 00 00 00 00 .%\#............ 00000032b81ff720 ac 2c 00 00 00 00 00 00 b1 47 15 d2 f9 7f 00 00 .,.......G...... Possible instruction pointers: 27 ntdll.dll + 0x247b1 rsp = 0x00000032b81ff730 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b81ff730 50 be 5d 23 e8 01 00 00 00 00 00 00 00 01 00 00 P.]#............ 00000032b81ff740 01 00 00 00 00 00 00 00 40 2c 5c 23 e8 01 00 00 ........@,\#.... 00000032b81ff750 90 c9 22 23 e8 01 00 00 30 f7 1f b8 32 00 00 00 .."#....0...2... 00000032b81ff760 f0 4c 29 23 e8 01 00 00 5b f0 7e cf f9 7f 00 00 .L)#....[.~..... Possible instruction pointers: 28 ucrtbase.dll + 0xf05b rsp = 0x00000032b81ff770 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b81ff770 13 00 00 00 00 00 00 00 1f 00 00 00 00 00 00 00 ................ 00000032b81ff780 c9 17 aa 28 04 d2 00 00 91 01 00 00 00 00 00 00 ...(............ 00000032b81ff790 91 01 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 29 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b81ff7a0 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b81ff7a0 91 01 00 00 00 00 00 00 ac 2c 00 00 00 00 00 00 .........,...... 00000032b81ff7b0 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b81ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff7d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff7f0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 30 kernel32.dll + 0x17374 rsp = 0x00000032b81ff800 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b81ff800 ac 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .,.............. 00000032b81ff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b81ff820 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 31 ntdll.dll + 0x4cc91 rsp = 0x00000032b81ff830 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 29 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d18 rbx = 0x0000000000000000 rsi = 0x00000032b82ffb88 rdi = 0x0000000000002d18 rbp = 0x00000000fffffffe rsp = 0x00000032b82ffb58 r8 = 0x00000032b82ffd28 r9 = 0x000001e82332d830 r10 = 0x000001e82332d848 r11 = 0x000001e823641c20 r12 = 0xda9814690eeb93c7 r13 = 0x0000000000000008 r14 = 0x0000000000002d18 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b82ffb58 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b82ffb60 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b82ffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffb70 00 00 00 00 00 00 00 00 02 00 00 00 f9 7f 00 00 ................ 00000032b82ffb80 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b82ffb90 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b82ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffbd0 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xa536f rsp = 0x00000032b82ffbe0 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b82ffbe0 70 1b 64 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 p.d#....(..#.... 00000032b82ffbf0 20 a8 64 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 .d#....mj.i.... Possible instruction pointers: 3 Qt6Core.dll + 0x216a6d rsp = 0x00000032b82ffc00 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b82ffc00 ff ff ff ff ff ff ff 7f e0 29 ae 1e e8 01 00 00 .........)...... 00000032b82ffc10 00 00 00 00 e8 01 00 00 18 2d 00 00 00 00 00 00 .........-...... 00000032b82ffc20 78 fc 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 x.E............. 00000032b82ffc30 88 c4 5b 23 e8 01 00 00 60 1b 64 23 e8 01 00 00 ..[#....`.d#.... 00000032b82ffc40 fb ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x23a609 rsp = 0x00000032b82ffc50 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b82ffc50 e0 29 ae 1e e8 01 00 00 03 00 00 00 00 00 00 00 .).............. 00000032b82ffc60 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b82ffc70 b0 88 1f 23 e8 01 00 00 40 c8 5b 23 e8 01 00 00 ...#....@.[#.... 00000032b82ffc80 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 5 Qt6Core.dll + 0x18c501 rsp = 0x00000032b82ffc90 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b82ffc90 78 fc 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 x.E............. 00000032b82ffca0 78 fc 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 x.E............. 00000032b82ffcb0 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 6 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b82ffcc0 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b82ffcc0 40 c8 5b 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 @.[#.......i.... Possible instruction pointers: 7 Qt6Core.dll + 0x18d5af rsp = 0x00000032b82ffcd0 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b82ffcd0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b82ffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffcf0 40 c8 5b 23 e8 01 00 00 60 1b 64 23 e8 01 00 00 @.[#....`.d#.... 00000032b82ffd00 58 2a ae 1e e8 01 00 00 e9 5d ae 69 f9 7f 00 00 X*.......].i.... Possible instruction pointers: 8 Qt6Core.dll + 0x235de9 rsp = 0x00000032b82ffd10 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b82ffd10 60 1b 64 23 e8 01 00 00 01 00 00 00 e8 01 00 00 `.d#............ 00000032b82ffd20 01 00 00 00 00 00 00 00 60 1b 64 23 e8 01 00 00 ........`.d#.... 00000032b82ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffd50 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b82ffd60 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b82ffd60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b82ffd80 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b82ffd90 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 30 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d1c rbx = 0x0000000000000000 rsi = 0x00000032b83ff958 rdi = 0x0000000000002d1c rbp = 0x00000000fffffffe rsp = 0x00000032b83ff928 r8 = 0x0000000000000000 r9 = 0x0000000000002800 r10 = 0x0000000000000000 r11 = 0x0000000000000001 r12 = 0xe54a88a4554f60f7 r13 = 0x0000000000000008 r14 = 0x0000000000002d1c r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b83ff928 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b83ff930 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b83ff930 70 9e 5d 23 e8 01 00 00 90 eb ff 32 e8 01 00 00 p.]#.......2.... 00000032b83ff940 00 00 00 00 00 00 00 00 2b 88 e0 cf f9 7f 00 00 ........+....... Possible instruction pointers: 2 KERNELBASE.dll + 0x6882b rsp = 0x00000032b83ff950 rip = 0x00007ff9cfe0882b Found by: stack scanning Stack contents: 00000032b83ff950 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b83ff960 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b83ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ff9a0 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 3 Qt6Core.dll + 0xa536f rsp = 0x00000032b83ff9b0 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b83ff9b0 c0 1c 64 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 ..d#....(..#.... 00000032b83ff9c0 70 9e 5d 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 p.]#....mj.i.... Possible instruction pointers: 4 Qt6Core.dll + 0x216a6d rsp = 0x00000032b83ff9d0 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b83ff9d0 ff ff ff ff ff ff ff 7f c0 2a ae 1e e8 01 00 00 .........*...... 00000032b83ff9e0 00 00 00 00 e8 01 00 00 1c 2d 00 00 00 00 00 00 .........-...... 00000032b83ff9f0 30 8b 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 0.E............. 00000032b83ffa00 88 c4 5b 23 e8 01 00 00 b0 1c 64 23 e8 01 00 00 ..[#......d#.... 00000032b83ffa10 fc ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 5 Qt6Core.dll + 0x23a609 rsp = 0x00000032b83ffa20 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b83ffa20 c0 2a ae 1e e8 01 00 00 b0 1c 64 23 e8 01 00 00 .*........d#.... 00000032b83ffa30 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b83ffa40 b0 88 1f 23 e8 01 00 00 a0 c7 5b 23 e8 01 00 00 ...#......[#.... 00000032b83ffa50 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 6 Qt6Core.dll + 0x18c501 rsp = 0x00000032b83ffa60 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b83ffa60 30 8b 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 0.E............. 00000032b83ffa70 30 8b 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 0.E............. 00000032b83ffa80 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 7 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b83ffa90 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b83ffa90 a0 c7 5b 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 ..[#.......i.... Possible instruction pointers: 8 Qt6Core.dll + 0x18d5af rsp = 0x00000032b83ffaa0 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b83ffaa0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b83ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ffac0 a0 c7 5b 23 e8 01 00 00 b0 1c 64 23 e8 01 00 00 ..[#......d#.... 00000032b83ffad0 38 2b ae 1e e8 01 00 00 e9 5d ae 69 f9 7f 00 00 8+.......].i.... Possible instruction pointers: 9 Qt6Core.dll + 0x235de9 rsp = 0x00000032b83ffae0 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b83ffae0 b0 1c 64 23 e8 01 00 00 01 00 00 00 e8 01 00 00 ..d#............ 00000032b83ffaf0 01 00 00 00 00 00 00 00 b0 1c 64 23 e8 01 00 00 ..........d#.... 00000032b83ffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ffb20 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 10 kernel32.dll + 0x17374 rsp = 0x00000032b83ffb30 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b83ffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b83ffb50 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 11 ntdll.dll + 0x4cc91 rsp = 0x00000032b83ffb60 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 31 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d28 rbx = 0x0000000000000000 rsi = 0x00000032b84ffd58 rdi = 0x0000000000002d28 rbp = 0x00000000fffffffe rsp = 0x00000032b84ffd28 r8 = 0x00000032b84ffd28 r9 = 0x00000000fffffffe r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0xe16e0e9629684a5f r13 = 0x0000000000000008 r14 = 0x0000000000002d28 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b84ffd28 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b84ffd30 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b84ffd30 00 00 00 00 00 00 00 00 50 6d 33 b6 32 00 00 00 ........Pm3.2... 00000032b84ffd40 00 00 00 00 00 00 00 00 02 00 00 00 f9 7f 00 00 ................ 00000032b84ffd50 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b84ffd60 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b84ffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84ffd80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84ffd90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84ffda0 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xa536f rsp = 0x00000032b84ffdb0 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b84ffdb0 00 40 5c 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 .@\#....(..#.... 00000032b84ffdc0 d0 dd 5d 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 ..]#....mj.i.... Possible instruction pointers: 3 Qt6Core.dll + 0x216a6d rsp = 0x00000032b84ffdd0 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b84ffdd0 ff ff ff ff ff ff ff 7f 70 80 55 23 e8 01 00 00 ........p.U#.... 00000032b84ffde0 00 00 00 00 e8 01 00 00 28 2d 00 00 00 00 00 00 ........(-...... 00000032b84ffdf0 d8 56 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 .VE............. 00000032b84ffe00 88 c4 5b 23 e8 01 00 00 f0 3f 5c 23 e8 01 00 00 ..[#.....?\#.... 00000032b84ffe10 fc ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x23a609 rsp = 0x00000032b84ffe20 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b84ffe20 70 80 55 23 e8 01 00 00 03 00 00 00 00 00 00 00 p.U#............ 00000032b84ffe30 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b84ffe40 b0 88 1f 23 e8 01 00 00 80 09 5e 23 e8 01 00 00 ...#......^#.... 00000032b84ffe50 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 5 Qt6Core.dll + 0x18c501 rsp = 0x00000032b84ffe60 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b84ffe60 d8 56 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 .VE............. 00000032b84ffe70 d8 56 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 .VE............. 00000032b84ffe80 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 6 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b84ffe90 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b84ffe90 80 09 5e 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 ..^#.......i.... Possible instruction pointers: 7 Qt6Core.dll + 0x18d5af rsp = 0x00000032b84ffea0 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b84ffea0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b84ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84ffec0 80 09 5e 23 e8 01 00 00 f0 3f 5c 23 e8 01 00 00 ..^#.....?\#.... 00000032b84ffed0 e8 80 55 23 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 ..U#.....].i.... Possible instruction pointers: 8 Qt6Core.dll + 0x235de9 rsp = 0x00000032b84ffee0 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b84ffee0 f0 3f 5c 23 e8 01 00 00 01 00 00 00 e8 01 00 00 .?\#............ 00000032b84ffef0 01 00 00 00 00 00 00 00 f0 3f 5c 23 e8 01 00 00 .........?\#.... 00000032b84fff00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84fff20 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b84fff30 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b84fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b84fff50 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b84fff60 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 32 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d20 rbx = 0x0000000000000000 rsi = 0x00000032b85ffa18 rdi = 0x0000000000002d20 rbp = 0x00000000fffffffe rsp = 0x00000032b85ff9e8 r8 = 0x00000032b85ff9e8 r9 = 0x00000000fffffffe r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x407146cfb54bdbb8 r13 = 0x0000000000000008 r14 = 0x0000000000002d20 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b85ff9e8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b85ff9f0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b85ff9f0 00 00 00 00 00 00 00 00 f0 6d 33 b6 32 00 00 00 .........m3.2... 00000032b85ffa00 00 00 00 00 00 00 00 00 02 00 00 00 f9 7f 00 00 ................ 00000032b85ffa10 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b85ffa20 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b85ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffa60 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xa536f rsp = 0x00000032b85ffa70 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b85ffa70 60 40 5c 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 `@\#....(..#.... 00000032b85ffa80 40 f9 5d 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 @.]#....mj.i.... Possible instruction pointers: 3 Qt6Core.dll + 0x216a6d rsp = 0x00000032b85ffa90 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b85ffa90 ff ff ff ff ff ff ff 7f 30 7b 55 23 e8 01 00 00 ........0{U#.... 00000032b85ffaa0 00 00 00 00 e8 01 00 00 20 2d 00 00 00 00 00 00 ........ -...... 00000032b85ffab0 54 9e 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 T.E............. 00000032b85ffac0 88 c4 5b 23 e8 01 00 00 50 40 5c 23 e8 01 00 00 ..[#....P@\#.... 00000032b85ffad0 fa ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x23a609 rsp = 0x00000032b85ffae0 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b85ffae0 30 7b 55 23 e8 01 00 00 fa ff ff ff 00 00 00 00 0{U#............ 00000032b85ffaf0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b85ffb00 b0 88 1f 23 e8 01 00 00 a0 fd 5d 23 e8 01 00 00 ...#......]#.... 00000032b85ffb10 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 5 Qt6Core.dll + 0x18c501 rsp = 0x00000032b85ffb20 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b85ffb20 54 9e 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 T.E............. 00000032b85ffb30 54 9e 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 T.E............. 00000032b85ffb40 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 6 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b85ffb50 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b85ffb50 a0 fd 5d 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 ..]#.......i.... Possible instruction pointers: 7 Qt6Core.dll + 0x18d5af rsp = 0x00000032b85ffb60 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b85ffb60 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b85ffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffb80 a0 fd 5d 23 e8 01 00 00 50 40 5c 23 e8 01 00 00 ..]#....P@\#.... 00000032b85ffb90 a8 7b 55 23 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 .{U#.....].i.... Possible instruction pointers: 8 Qt6Core.dll + 0x235de9 rsp = 0x00000032b85ffba0 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b85ffba0 50 40 5c 23 e8 01 00 00 01 00 00 00 e8 01 00 00 P@\#............ 00000032b85ffbb0 01 00 00 00 00 00 00 00 50 40 5c 23 e8 01 00 00 ........P@\#.... 00000032b85ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffbe0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b85ffbf0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b85ffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b85ffc10 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b85ffc20 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 33 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d34 rbx = 0x0000000000000000 rsi = 0x00000032b86ff868 rdi = 0x0000000000002d34 rbp = 0x00000000fffffffe rsp = 0x00000032b86ff838 r8 = 0x0000000000000000 r9 = 0x000000000000002c r10 = 0x000001e8231f88b0 r11 = 0x000001e8235bc488 r12 = 0xd2279c99f1a3f5ff r13 = 0x0000000000000008 r14 = 0x0000000000002d34 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b86ff838 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b86ff840 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b86ff840 00 00 00 00 00 00 00 00 e0 f9 5f b8 32 00 00 00 .........._.2... 00000032b86ff850 00 00 00 00 00 00 00 00 02 00 00 00 f9 7f 00 00 ................ 00000032b86ff860 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b86ff870 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b86ff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ff8b0 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xa536f rsp = 0x00000032b86ff8c0 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b86ff8c0 20 3e 5c 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 >\#....(..#.... 00000032b86ff8d0 40 a8 64 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 @.d#....mj.i.... Possible instruction pointers: 3 Qt6Core.dll + 0x216a6d rsp = 0x00000032b86ff8e0 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b86ff8e0 ff ff ff ff ff ff ff 7f 10 7c 55 23 e8 01 00 00 .........|U#.... 00000032b86ff8f0 00 00 00 00 e8 01 00 00 34 2d 00 00 00 00 00 00 ........4-...... 00000032b86ff900 20 96 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 .E............. 00000032b86ff910 88 c4 5b 23 e8 01 00 00 10 3e 5c 23 e8 01 00 00 ..[#.....>\#.... 00000032b86ff920 fb ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x23a609 rsp = 0x00000032b86ff930 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b86ff930 10 7c 55 23 e8 01 00 00 03 00 00 00 00 00 00 00 .|U#............ 00000032b86ff940 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b86ff950 b0 88 1f 23 e8 01 00 00 00 07 5e 23 e8 01 00 00 ...#......^#.... 00000032b86ff960 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 5 Qt6Core.dll + 0x18c501 rsp = 0x00000032b86ff970 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b86ff970 20 96 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 .E............. 00000032b86ff980 20 96 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 .E............. 00000032b86ff990 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 6 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b86ff9a0 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b86ff9a0 00 07 5e 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 ..^#.......i.... Possible instruction pointers: 7 Qt6Core.dll + 0x18d5af rsp = 0x00000032b86ff9b0 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b86ff9b0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b86ff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ff9d0 00 07 5e 23 e8 01 00 00 10 3e 5c 23 e8 01 00 00 ..^#.....>\#.... 00000032b86ff9e0 88 7c 55 23 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 .|U#.....].i.... Possible instruction pointers: 8 Qt6Core.dll + 0x235de9 rsp = 0x00000032b86ff9f0 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b86ff9f0 10 3e 5c 23 e8 01 00 00 01 00 00 00 e8 01 00 00 .>\#............ 00000032b86ffa00 01 00 00 00 00 00 00 00 10 3e 5c 23 e8 01 00 00 .........>\#.... 00000032b86ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ffa30 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b86ffa40 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b86ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b86ffa60 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b86ffa70 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 34 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d2c rbx = 0x0000000000000000 rsi = 0x00000032b87ff958 rdi = 0x0000000000002d2c rbp = 0x00000000fffffffe rsp = 0x00000032b87ff928 r8 = 0x00000032b87ff928 r9 = 0x00000000fffffffe r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x73d4ca0a2ff693cd r13 = 0x0000000000000008 r14 = 0x0000000000002d2c r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b87ff928 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b87ff930 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b87ff930 00 00 00 00 00 00 00 00 50 fb 2f b8 32 00 00 00 ........P./.2... 00000032b87ff940 00 00 00 00 00 00 00 00 02 00 00 00 f9 7f 00 00 ................ 00000032b87ff950 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b87ff960 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b87ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ff9a0 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xa536f rsp = 0x00000032b87ff9b0 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b87ff9b0 b0 3e 5c 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 .>\#....(..#.... 00000032b87ff9c0 20 9a 5b 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 .[#....mj.i.... Possible instruction pointers: 3 Qt6Core.dll + 0x216a6d rsp = 0x00000032b87ff9d0 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b87ff9d0 ff ff ff ff ff ff ff 7f b0 85 55 23 e8 01 00 00 ..........U#.... 00000032b87ff9e0 00 00 00 00 e8 01 00 00 2c 2d 00 00 00 00 00 00 ........,-...... 00000032b87ff9f0 7c f3 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 |.E............. 00000032b87ffa00 88 c4 5b 23 e8 01 00 00 a0 3e 5c 23 e8 01 00 00 ..[#.....>\#.... 00000032b87ffa10 fc ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x23a609 rsp = 0x00000032b87ffa20 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b87ffa20 b0 85 55 23 e8 01 00 00 03 00 00 00 00 00 00 00 ..U#............ 00000032b87ffa30 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b87ffa40 b0 88 1f 23 e8 01 00 00 60 fc 5d 23 e8 01 00 00 ...#....`.]#.... 00000032b87ffa50 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 5 Qt6Core.dll + 0x18c501 rsp = 0x00000032b87ffa60 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b87ffa60 7c f3 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 |.E............. 00000032b87ffa70 7c f3 45 a8 14 01 00 00 00 00 00 00 01 00 00 00 |.E............. 00000032b87ffa80 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 6 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b87ffa90 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b87ffa90 60 fc 5d 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 `.]#.......i.... Possible instruction pointers: 7 Qt6Core.dll + 0x18d5af rsp = 0x00000032b87ffaa0 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b87ffaa0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b87ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ffac0 60 fc 5d 23 e8 01 00 00 a0 3e 5c 23 e8 01 00 00 `.]#.....>\#.... 00000032b87ffad0 28 86 55 23 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 (.U#.....].i.... Possible instruction pointers: 8 Qt6Core.dll + 0x235de9 rsp = 0x00000032b87ffae0 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b87ffae0 a0 3e 5c 23 e8 01 00 00 01 00 00 00 e8 01 00 00 .>\#............ 00000032b87ffaf0 01 00 00 00 00 00 00 00 a0 3e 5c 23 e8 01 00 00 .........>\#.... 00000032b87ffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ffb20 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b87ffb30 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b87ffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b87ffb50 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b87ffb60 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 35 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d30 rbx = 0x0000000000000000 rsi = 0x00000032b88ff888 rdi = 0x0000000000002d30 rbp = 0x00000000fffffffe rsp = 0x00000032b88ff858 r8 = 0x00000032b88ff858 r9 = 0x00000000fffffffe r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x1aceba38fc2b3b95 r13 = 0x0000000000000008 r14 = 0x0000000000002d30 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b88ff858 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b88ff860 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b88ff860 00 00 00 00 00 00 00 00 90 eb ff 32 e8 01 00 00 ...........2.... 00000032b88ff870 00 00 00 00 00 00 00 00 5b f0 7e cf f9 7f 00 00 ........[.~..... Possible instruction pointers: 2 ucrtbase.dll + 0xf05b rsp = 0x00000032b88ff880 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b88ff880 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b88ff890 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b88ff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ff8d0 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 3 Qt6Core.dll + 0xa536f rsp = 0x00000032b88ff8e0 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b88ff8e0 70 18 5c 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 p.\#....(..#.... 00000032b88ff8f0 90 9e 5d 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 ..]#....mj.i.... Possible instruction pointers: 4 Qt6Core.dll + 0x216a6d rsp = 0x00000032b88ff900 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b88ff900 ff ff ff ff ff ff ff 7f 90 f9 8f b8 32 00 00 00 ............2... 00000032b88ff910 00 00 00 00 e8 01 00 00 30 2d 00 00 00 00 00 00 ........0-...... 00000032b88ff920 04 07 46 a8 14 01 00 00 00 00 00 00 01 00 00 00 ..F............. 00000032b88ff930 88 c4 5b 23 e8 01 00 00 60 18 5c 23 e8 01 00 00 ..[#....`.\#.... 00000032b88ff940 fa ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 5 Qt6Core.dll + 0x23a609 rsp = 0x00000032b88ff950 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b88ff950 f0 7c 55 23 e8 01 00 00 fa ff ff ff 00 00 00 00 .|U#............ 00000032b88ff960 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b88ff970 b0 88 1f 23 e8 01 00 00 40 08 5e 23 e8 01 00 00 ...#....@.^#.... 00000032b88ff980 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 6 Qt6Core.dll + 0x18c501 rsp = 0x00000032b88ff990 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b88ff990 04 07 46 a8 14 01 00 00 00 00 00 00 01 00 00 00 ..F............. 00000032b88ff9a0 04 07 46 a8 14 01 00 00 00 00 00 00 01 00 00 00 ..F............. 00000032b88ff9b0 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 7 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b88ff9c0 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b88ff9c0 40 08 5e 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 @.^#.......i.... Possible instruction pointers: 8 Qt6Core.dll + 0x18d5af rsp = 0x00000032b88ff9d0 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b88ff9d0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b88ff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ff9f0 40 08 5e 23 e8 01 00 00 60 18 5c 23 e8 01 00 00 @.^#....`.\#.... 00000032b88ffa00 68 7d 55 23 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 h}U#.....].i.... Possible instruction pointers: 9 Qt6Core.dll + 0x235de9 rsp = 0x00000032b88ffa10 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b88ffa10 60 18 5c 23 e8 01 00 00 01 00 00 00 e8 01 00 00 `.\#............ 00000032b88ffa20 01 00 00 00 00 00 00 00 60 18 5c 23 e8 01 00 00 ........`.\#.... 00000032b88ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ffa50 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 10 kernel32.dll + 0x17374 rsp = 0x00000032b88ffa60 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b88ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b88ffa80 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 11 ntdll.dll + 0x4cc91 rsp = 0x00000032b88ffa90 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 36 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000002d24 rbx = 0x0000000000000000 rsi = 0x00000032b89ff818 rdi = 0x0000000000002d24 rbp = 0x00000000fffffffe rsp = 0x00000032b89ff7e8 r8 = 0x00000032b89ff7e8 r9 = 0x00000000fffffffe r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x983d1ca55ba5a92a r13 = 0x0000000000000008 r14 = 0x0000000000002d24 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b89ff7e8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b89ff7f0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b89ff7f0 80 32 31 23 e8 01 00 00 20 f9 3f b8 32 00 00 00 .21#.... .?.2... 00000032b89ff800 00 00 00 00 00 00 00 00 2b 88 e0 cf f9 7f 00 00 ........+....... Possible instruction pointers: 2 KERNELBASE.dll + 0x6882b rsp = 0x00000032b89ff810 rip = 0x00007ff9cfe0882b Found by: stack scanning Stack contents: 00000032b89ff810 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b89ff820 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b89ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ff860 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 3 Qt6Core.dll + 0xa536f rsp = 0x00000032b89ff870 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b89ff870 10 15 5c 23 e8 01 00 00 28 89 1f 23 e8 01 00 00 ..\#....(..#.... 00000032b89ff880 80 32 31 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 .21#....mj.i.... Possible instruction pointers: 4 Qt6Core.dll + 0x216a6d rsp = 0x00000032b89ff890 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b89ff890 ff ff ff ff ff ff ff 7f 20 f9 9f b8 32 00 00 00 ........ ...2... 00000032b89ff8a0 00 00 00 00 e8 01 00 00 24 2d 00 00 00 00 00 00 ........$-...... 00000032b89ff8b0 e0 25 46 a8 14 01 00 00 00 00 00 00 01 00 00 00 .%F............. 00000032b89ff8c0 88 c4 5b 23 e8 01 00 00 00 15 5c 23 e8 01 00 00 ..[#......\#.... 00000032b89ff8d0 f9 ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 5 Qt6Core.dll + 0x23a609 rsp = 0x00000032b89ff8e0 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b89ff8e0 b0 7e 55 23 e8 01 00 00 f9 ff ff ff 00 00 00 00 .~U#............ 00000032b89ff8f0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b89ff900 b0 88 1f 23 e8 01 00 00 20 fb 5d 23 e8 01 00 00 ...#.... .]#.... 00000032b89ff910 28 89 1f 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 (..#.......i.... Possible instruction pointers: 6 Qt6Core.dll + 0x18c501 rsp = 0x00000032b89ff920 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b89ff920 e0 25 46 a8 14 01 00 00 00 00 00 00 01 00 00 00 .%F............. 00000032b89ff930 e0 25 46 a8 14 01 00 00 00 00 00 00 01 00 00 00 .%F............. 00000032b89ff940 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 7 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b89ff950 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b89ff950 20 fb 5d 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 .]#.......i.... Possible instruction pointers: 8 Qt6Core.dll + 0x18d5af rsp = 0x00000032b89ff960 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b89ff960 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b89ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ff980 20 fb 5d 23 e8 01 00 00 00 15 5c 23 e8 01 00 00 .]#......\#.... 00000032b89ff990 28 7f 55 23 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 (.U#.....].i.... Possible instruction pointers: 9 Qt6Core.dll + 0x235de9 rsp = 0x00000032b89ff9a0 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b89ff9a0 00 15 5c 23 e8 01 00 00 01 00 00 00 e8 01 00 00 ..\#............ 00000032b89ff9b0 01 00 00 00 00 00 00 00 00 15 5c 23 e8 01 00 00 ..........\#.... 00000032b89ff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ff9e0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 10 kernel32.dll + 0x17374 rsp = 0x00000032b89ff9f0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b89ff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b89ffa10 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 11 ntdll.dll + 0x4cc91 rsp = 0x00000032b89ffa20 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 37 0 ntdll.dll + 0x9e0b4 rax = 0x000000000000005b rdx = 0x00000032b8affe40 rcx = 0x0000000000000001 rbx = 0x0000000000000001 rsi = 0x00000000000007a0 rdi = 0x000000007ffe0010 rbp = 0x00007ff9c55ccf40 rsp = 0x00000032b8affd88 r8 = 0x00000032b8affd88 r9 = 0x00007ff9c55ccf40 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x000000007ffe000c r13 = 0x000000007ffe0008 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21ce0b4 Found by: given as instruction pointer in context Stack contents: 00000032b8affd88 51 27 5b c5 f9 7f 00 00 Q'[..... Possible instruction pointers: 1 winmm.dll + 0x2751 rbp = 0x00007ff9c55ccf40 rsp = 0x00000032b8affd90 rip = 0x00007ff9c55b2751 Found by: stack scanning Thread 38 0 ntdll.dll + 0x9e0b4 rax = 0x000000000000005b rdx = 0x00000032b8cffb30 rcx = 0x0000000000000002 rbx = 0x0000000000000002 rsi = 0x0000000000000000 rdi = 0x0000000000000002 rbp = 0x0000000000000000 rsp = 0x00000032b8cff7d8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x00000000ffffffff r13 = 0x00000032b8cffb30 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21ce0b4 Found by: given as instruction pointer in context Stack contents: 00000032b8cff7d8 30 40 e0 cf f9 7f 00 00 0@...... Possible instruction pointers: 1 KERNELBASE.dll + 0x64030 rsp = 0x00000032b8cff7e0 rip = 0x00007ff9cfe04030 Found by: stack scanning Stack contents: 00000032b8cff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8cff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8cff800 00 00 00 00 00 00 00 00 70 cc 17 d2 f9 7f 00 00 ........p....... Possible instruction pointers: 2 ntdll.dll + 0x4cc70 rsp = 0x00000032b8cff810 rip = 0x00007ff9d217cc70 Found by: stack scanning Thread 39 0 ntdll.dll + 0x9e0b4 rax = 0x000000000000005b rdx = 0x00000032b8dffe70 rcx = 0x0000000000000002 rbx = 0x0000000000000002 rsi = 0x0000000000000000 rdi = 0x0000000000000002 rbp = 0x0000000000000000 rsp = 0x00000032b8dffb18 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x00000000ffffffff r13 = 0x00000032b8dffe70 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21ce0b4 Found by: given as instruction pointer in context Stack contents: 00000032b8dffb18 30 40 e0 cf f9 7f 00 00 0@...... Possible instruction pointers: 1 KERNELBASE.dll + 0x64030 rsp = 0x00000032b8dffb20 rip = 0x00007ff9cfe04030 Found by: stack scanning Stack contents: 00000032b8dffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8dffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8dffb40 00 00 00 00 00 00 00 00 70 cc 17 d2 f9 7f 00 00 ........p....... Possible instruction pointers: 2 ntdll.dll + 0x4cc70 rsp = 0x00000032b8dffb50 rip = 0x00007ff9d217cc70 Found by: stack scanning Thread 40 0 ntdll.dll + 0x9e6d4 rax = 0x000000000000008c rdx = 0x0000000000020000 rcx = 0x0000000000002a90 rbx = 0x000001e81e09d780 rsi = 0x000001e81de96f20 rdi = 0x000001e8230938d0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcc68 r8 = 0x00000000014e0040 r9 = 0x00000032b8bfd4f0 r10 = 0x0000000000000006 r11 = 0x0000000000000000 r12 = 0x00007ff9d05b3644 r13 = 0x0000000000000004 r14 = 0x00000032b8bfcec0 r15 = 0x0000000000000000 rip = 0x00007ff9d21ce6d4 Found by: given as instruction pointer in context Stack contents: 00000032b8bfcc68 4f 1b 50 d0 f9 7f 00 00 O.P..... Possible instruction pointers: 1 rpcrt4.dll + 0x41b4f rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcc70 rip = 0x00007ff9d0501b4f Found by: stack scanning Stack contents: 00000032b8bfcc70 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcc80 01 75 22 23 e8 01 00 00 c0 ce bf b8 32 00 00 00 .u"#........2... 00000032b8bfcc90 20 6f e9 1d e8 01 00 00 b8 cc bf b8 32 00 00 00 o..........2... 00000032b8bfcca0 a8 d8 09 1e e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfccb0 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 ................ 00000032b8bfccc0 80 d7 09 1e e8 01 00 00 73 cd 50 d0 f9 7f 00 00 ........s.P..... Possible instruction pointers: 2 rpcrt4.dll + 0x4cd73 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfccd0 rip = 0x00007ff9d050cd73 Found by: stack scanning Stack contents: 00000032b8bfccd0 68 d1 bf b8 32 00 00 00 00 00 00 00 00 00 00 00 h...2........... 00000032b8bfcce0 88 6f e9 1d e8 01 00 00 86 d6 59 d0 f9 7f 00 00 .o........Y..... Possible instruction pointers: 3 rpcrt4.dll + 0xdd686 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfccf0 rip = 0x00007ff9d059d686 Found by: stack scanning Stack contents: 00000032b8bfccf0 f0 65 cd ce f9 7f 00 00 .e...... Possible instruction pointers: 4 dnsapi.dll + 0x965f0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfccf8 rip = 0x00007ff9cecd65f0 Found by: stack scanning Stack contents: 00000032b8bfccf8 20 cf bf b8 32 00 00 00 b1 d2 b8 39 8c 15 00 00 ...2......9.... 00000032b8bfcd08 1c 87 a5 30 e8 01 00 00 20 cf bf b8 32 00 00 00 ...0.... ...2... 00000032b8bfcd18 00 00 00 00 00 00 00 00 01 75 22 23 e8 01 00 00 .........u"#.... 00000032b8bfcd28 c0 ce bf b8 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b8bfcd38 9f ac 51 d0 f9 7f 00 00 ..Q..... Possible instruction pointers: 5 rpcrt4.dll + 0x5ac9f rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcd40 rip = 0x00007ff9d051ac9f Found by: stack scanning Stack contents: 00000032b8bfcd40 80 5f cd ce f9 7f 00 00 ._...... Possible instruction pointers: 6 dnsapi.dll + 0x95f80 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcd48 rip = 0x00007ff9cecd5f80 Found by: stack scanning Stack contents: 00000032b8bfcd48 b8 d4 bf b8 32 00 00 00 a0 00 b8 30 e8 01 00 00 ....2......0.... 00000032b8bfcd58 04 00 00 00 00 00 00 00 c0 ce bf b8 32 00 00 00 ............2... 00000032b8bfcd68 66 9d 53 d0 f9 7f 00 00 f.S..... Possible instruction pointers: 7 rpcrt4.dll + 0x79d66 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcd70 rip = 0x00007ff9d0539d66 Found by: stack scanning Stack contents: 00000032b8bfcd70 20 cf bf b8 32 00 00 00 90 30 cd ce f9 7f 00 00 ...2....0...... Possible instruction pointers: 8 dnsapi.dll + 0x93090 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcd80 rip = 0x00007ff9cecd3090 Found by: stack scanning Stack contents: 00000032b8bfcd80 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 ................ 00000032b8bfcd90 90 30 cd ce f9 7f 00 00 .0...... Possible instruction pointers: 9 dnsapi.dll + 0x93090 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcd98 rip = 0x00007ff9cecd3090 Found by: stack scanning Stack contents: 00000032b8bfcd98 d2 ac 59 d0 f9 7f 00 00 ..Y..... Possible instruction pointers: 10 rpcrt4.dll + 0xdacd2 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcda0 rip = 0x00007ff9d059acd2 Found by: stack scanning Stack contents: 00000032b8bfcda0 40 d1 bf b8 32 00 00 00 09 00 00 00 00 00 00 00 @...2........... 00000032b8bfcdb0 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 ................ 00000032b8bfcdc0 01 00 00 00 00 00 00 00 f8 cd bf b8 32 00 00 00 ............2... 00000032b8bfcdd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcde0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b8bfcdf0 c8 00 00 00 00 00 00 00 02 00 00 00 f9 7f 00 00 ................ 00000032b8bfce00 04 00 00 00 00 00 00 00 e0 75 22 23 e8 01 00 00 .........u"#.... 00000032b8bfce10 00 00 00 00 32 00 00 00 04 00 00 00 00 00 00 00 ....2........... 00000032b8bfce20 60 ce bf b8 32 00 00 00 01 00 00 00 00 00 00 00 `...2........... 00000032b8bfce30 40 d1 bf b8 32 00 00 00 20 cf bf b8 32 00 00 00 @...2... ...2... 00000032b8bfce40 90 30 cd ce f9 7f 00 00 .0...... Possible instruction pointers: 11 dnsapi.dll + 0x93090 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfce48 rip = 0x00007ff9cecd3090 Found by: stack scanning Stack contents: 00000032b8bfce48 c0 ce bf b8 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b8bfce58 30 00 00 00 f9 7f 00 00 00 00 00 00 00 00 00 00 0............... 00000032b8bfce68 b8 d4 bf b8 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b8bfce78 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfce88 60 06 4e d0 f9 7f 00 00 `.N..... Possible instruction pointers: 12 rpcrt4.dll + 0x20660 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfce90 rip = 0x00007ff9d04e0660 Found by: stack scanning Stack contents: 00000032b8bfce90 19 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcea0 00 00 00 00 00 00 00 00 90 30 cd ce f9 7f 00 00 .........0...... Possible instruction pointers: 13 dnsapi.dll + 0x93090 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfceb0 rip = 0x00007ff9cecd3090 Found by: stack scanning Stack contents: 00000032b8bfceb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcec0 80 d7 09 1e e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfced0 88 6f e9 1d e8 01 00 00 48 00 00 00 04 00 00 00 .o......H....... 00000032b8bfcee0 28 c9 1f 23 e8 01 00 00 e0 56 cd ce f9 7f 00 00 (..#.....V...... Possible instruction pointers: 14 dnsapi.dll + 0x956e0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcef0 rip = 0x00007ff9cecd56e0 Found by: stack scanning Stack contents: 00000032b8bfcef0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcf00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcf10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcf20 c0 ce bf b8 32 00 00 00 d0 6f e9 1d e8 01 00 00 ....2....o...... 00000032b8bfcf30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcf40 00 00 00 00 00 00 00 00 7a 00 00 00 00 00 00 00 ........z....... 00000032b8bfcf50 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b8bfcf60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcf70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcf80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcf90 00 00 00 00 09 00 00 00 80 00 c6 ce f9 7f 00 00 ................ Possible instruction pointers: 15 dnsapi.dll + 0x20080 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcfa0 rip = 0x00007ff9cec60080 Found by: stack scanning Stack contents: 00000032b8bfcfa0 e0 1a cc ce f9 7f 00 00 ........ Possible instruction pointers: 16 dnsapi.dll + 0x81ae0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcfa8 rip = 0x00007ff9cecc1ae0 Found by: stack scanning Stack contents: 00000032b8bfcfa8 b8 d4 bf b8 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b8bfcfb8 00 00 00 00 00 00 00 00 e0 75 22 23 e8 01 00 00 .........u"#.... 00000032b8bfcfc8 80 38 cd ce f9 7f 00 00 .8...... Possible instruction pointers: 17 dnsapi.dll + 0x93880 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfcfd0 rip = 0x00007ff9cecd3880 Found by: stack scanning Stack contents: 00000032b8bfcfd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfcfe0 40 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 @............... 00000032b8bfcff0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd030 00 00 00 00 00 00 00 00 08 a1 bf b8 32 00 00 00 ............2... 00000032b8bfd040 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd050 b8 d4 bf b8 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b8bfd060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd070 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd080 40 d1 bf b8 32 00 00 00 00 00 00 00 00 00 00 00 @...2........... 00000032b8bfd090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd0a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd0b0 00 00 00 00 00 00 00 00 c1 bc e2 39 b6 f7 00 00 ...........9.... 00000032b8bfd0c0 61 d3 b8 39 8c 15 00 00 00 00 00 00 00 00 00 00 a..9............ 00000032b8bfd0d0 00 00 00 00 00 00 00 00 b8 d4 bf b8 32 00 00 00 ............2... 00000032b8bfd0e0 1c 00 00 00 00 00 00 00 1c 87 a5 30 e8 01 00 00 ...........0.... 00000032b8bfd0f0 90 30 cd ce f9 7f 00 00 .0...... Possible instruction pointers: 18 dnsapi.dll + 0x93090 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd0f8 rip = 0x00007ff9cecd3090 Found by: stack scanning Stack contents: 00000032b8bfd0f8 00 00 00 00 00 00 00 00 e0 37 cd ce f9 7f 00 00 .........7...... Possible instruction pointers: 19 dnsapi.dll + 0x937e0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd108 rip = 0x00007ff9cecd37e0 Found by: stack scanning Stack contents: 00000032b8bfd108 70 dc 59 d0 f9 7f 00 00 p.Y..... Possible instruction pointers: 20 rpcrt4.dll + 0xddc70 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd110 rip = 0x00007ff9d059dc70 Found by: stack scanning Stack contents: 00000032b8bfd110 e0 37 cd ce f9 7f 00 00 .7...... Possible instruction pointers: 21 dnsapi.dll + 0x937e0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd118 rip = 0x00007ff9cecd37e0 Found by: stack scanning Stack contents: 00000032b8bfd118 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd128 90 30 cd ce f9 7f 00 00 .0...... Possible instruction pointers: 22 dnsapi.dll + 0x93090 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd130 rip = 0x00007ff9cecd3090 Found by: stack scanning Stack contents: 00000032b8bfd130 40 d1 bf b8 32 00 00 00 b8 d4 bf b8 32 00 00 00 @...2.......2... 00000032b8bfd140 33 05 71 71 00 00 00 00 60 5f cd ce f9 7f 00 00 3.qq....`_...... Possible instruction pointers: 23 dnsapi.dll + 0x95f60 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd150 rip = 0x00007ff9cecd5f60 Found by: stack scanning Stack contents: 00000032b8bfd150 ce e1 cd ce f9 7f 00 00 ........ Possible instruction pointers: 24 dnsapi.dll + 0x9e1ce rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd158 rip = 0x00007ff9cecde1ce Found by: stack scanning Stack contents: 00000032b8bfd158 60 5f cd ce f9 7f 00 00 `_...... Possible instruction pointers: 25 dnsapi.dll + 0x95f60 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd160 rip = 0x00007ff9cecd5f60 Found by: stack scanning Stack contents: 00000032b8bfd160 09 00 00 00 00 00 00 00 80 5f cd ce f9 7f 00 00 ........._...... Possible instruction pointers: 26 dnsapi.dll + 0x95f80 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd170 rip = 0x00007ff9cecd5f80 Found by: stack scanning Stack contents: 00000032b8bfd170 b8 d4 bf b8 32 00 00 00 00 02 00 00 00 00 00 00 ....2........... 00000032b8bfd180 00 00 00 00 00 00 00 00 ca e1 cd ce f9 7f 00 00 ................ Possible instruction pointers: 27 dnsapi.dll + 0x9e1ca rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd190 rip = 0x00007ff9cecde1ca Found by: stack scanning Stack contents: 00000032b8bfd190 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd1a0 00 00 00 00 00 00 00 00 00 00 00 00 50 00 00 00 ............P... 00000032b8bfd1b0 30 38 cd ce f9 7f 00 00 08...... Possible instruction pointers: 28 dnsapi.dll + 0x93830 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd1b8 rip = 0x00007ff9cecd3830 Found by: stack scanning Stack contents: 00000032b8bfd1b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd1c8 f0 e3 59 d0 f9 7f 00 00 ..Y..... Possible instruction pointers: 29 rpcrt4.dll + 0xde3f0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd1d0 rip = 0x00007ff9d059e3f0 Found by: stack scanning Stack contents: 00000032b8bfd1d0 10 a0 59 d0 f9 7f 00 00 ..Y..... Possible instruction pointers: 30 rpcrt4.dll + 0xda010 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd1d8 rip = 0x00007ff9d059a010 Found by: stack scanning Stack contents: 00000032b8bfd1d8 20 d5 59 d0 f9 7f 00 00 .Y..... Possible instruction pointers: 31 rpcrt4.dll + 0xdd520 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd1e0 rip = 0x00007ff9d059d520 Found by: stack scanning Stack contents: 00000032b8bfd1e0 50 a1 59 d0 f9 7f 00 00 P.Y..... Possible instruction pointers: 32 rpcrt4.dll + 0xda150 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd1e8 rip = 0x00007ff9d059a150 Found by: stack scanning Stack contents: 00000032b8bfd1e8 30 f6 59 d0 f9 7f 00 00 0.Y..... Possible instruction pointers: 33 rpcrt4.dll + 0xdf630 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd1f0 rip = 0x00007ff9d059f630 Found by: stack scanning Stack contents: 00000032b8bfd1f0 50 f2 59 d0 f9 7f 00 00 P.Y..... Possible instruction pointers: 34 rpcrt4.dll + 0xdf250 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd1f8 rip = 0x00007ff9d059f250 Found by: stack scanning Stack contents: 00000032b8bfd1f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd208 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd218 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd228 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd238 00 00 00 00 00 00 00 00 60 d2 bf b8 32 00 00 00 ........`...2... 00000032b8bfd248 48 d2 bf b8 32 00 00 00 48 d2 bf b8 32 00 00 00 H...2...H...2... 00000032b8bfd258 00 02 00 00 00 00 00 00 70 d5 bf b8 32 00 00 00 ........p...2... 00000032b8bfd268 01 6f dd cf f9 7f 00 00 .o...... Possible instruction pointers: 35 KERNELBASE.dll + 0x36f01 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd270 rip = 0x00007ff9cfdd6f01 Found by: stack scanning Stack contents: 00000032b8bfd270 90 d2 bf b8 32 00 00 00 98 d2 bf b8 32 00 00 00 ....2.......2... 00000032b8bfd280 a0 d2 bf b8 32 00 00 00 40 00 00 00 00 00 00 00 ....2...@....... 00000032b8bfd290 2c 00 00 00 01 00 00 00 14 d3 bf b8 32 00 00 00 ,...........2... 00000032b8bfd2a0 00 00 00 00 00 00 00 00 10 d5 bf b8 32 00 00 00 ............2... 00000032b8bfd2b0 00 00 00 00 00 00 00 00 2c 00 00 00 00 00 00 00 ........,....... 00000032b8bfd2c0 60 d3 bf b8 32 00 00 00 5e 56 e5 cf f9 7f 00 00 `...2...^V...... Possible instruction pointers: 36 KERNELBASE.dll + 0xb565e rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd2d0 rip = 0x00007ff9cfe5565e Found by: stack scanning Stack contents: 00000032b8bfd2d0 00 00 00 00 32 00 00 00 d0 d3 bf b8 32 00 00 00 ....2.......2... 00000032b8bfd2e0 a8 d4 bf b8 32 00 00 00 76 00 69 00 63 00 65 00 ....2...v.i.c.e. 00000032b8bfd2f0 2c 00 00 00 44 00 6e 00 14 d3 bf b8 32 00 00 00 ,...D.n.....2... 00000032b8bfd300 68 00 65 00 5c 00 50 00 6f e2 16 d2 f9 7f 00 00 h.e.\.P.o....... Possible instruction pointers: 37 ntdll.dll + 0x3e26f rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd310 rip = 0x00007ff9d216e26f Found by: stack scanning Stack contents: 00000032b8bfd310 02 00 00 00 2c 00 00 00 04 4c 00 00 00 00 00 00 ....,....L...... 00000032b8bfd320 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd330 b0 fb 63 23 e8 01 00 00 84 d4 bf b8 32 00 00 00 ..c#........2... 00000032b8bfd340 00 00 bf b8 00 00 00 00 10 d5 bf b8 32 00 00 00 ............2... 00000032b8bfd350 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd360 00 00 00 00 01 00 00 00 20 00 00 00 44 00 45 00 ........ ...D.E. 00000032b8bfd370 53 00 4b 00 54 00 4f 00 50 00 2d 00 30 00 54 00 S.K.T.O.P.-.0.T. 00000032b8bfd380 49 00 33 00 33 00 51 00 33 00 00 00 00 00 00 00 I.3.3.Q.3....... 00000032b8bfd390 30 00 00 00 00 00 00 00 20 0d f9 1a e8 01 00 00 0....... ....... 00000032b8bfd3a0 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b8bfd3b0 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b8bfd3c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd3d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd3e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd3f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd400 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd410 58 d5 bf b8 32 00 00 00 78 91 c4 ce f9 7f 00 00 X...2...x....... Possible instruction pointers: 38 dnsapi.dll + 0x9178 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd420 rip = 0x00007ff9cec49178 Found by: stack scanning Stack contents: 00000032b8bfd420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd430 00 00 00 00 00 00 00 00 48 d5 bf b8 32 00 00 00 ........H...2... 00000032b8bfd440 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd450 a0 5f cf ce f9 7f 00 00 ._...... Possible instruction pointers: 39 dnsapi.dll + 0xb5fa0 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd458 rip = 0x00007ff9cecf5fa0 Found by: stack scanning Stack contents: 00000032b8bfd458 00 00 00 00 00 00 00 00 d1 cf b8 39 8c 15 00 00 ...........9.... 00000032b8bfd468 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8bfd478 00 00 00 00 00 00 00 00 f0 d6 bf b8 32 00 00 00 ............2... 00000032b8bfd488 48 e2 bf b8 32 00 00 00 00 00 00 00 00 00 00 00 H...2........... 00000032b8bfd498 81 8f c4 ce f9 7f 00 00 ........ Possible instruction pointers: 40 dnsapi.dll + 0x8f81 rbp = 0x000001e81e09d8a8 rsp = 0x00000032b8bfd4a0 rip = 0x00007ff9cec48f81 Found by: stack scanning Thread 41 0 win32u.dll + 0xa104 rax = 0x0000000000001486 rdx = 0x0000000000000000 rcx = 0x0000000000000000 rbx = 0x0000000000000024 rsi = 0x0000000000000001 rdi = 0x000001e823260001 rbp = 0x00000032b8efcbf0 rsp = 0x00000032b8efcaa8 r8 = 0x00000032b8efc0e0 r9 = 0x00000032b8efc0e0 r10 = 0x000000000011ac38 r11 = 0xfffffffff4d08fad r12 = 0x0000000000000000 r13 = 0x000001e82fd02a90 r14 = 0x000001e82364ba60 r15 = 0x0000000000000000 rip = 0x00007ff9d013a104 Found by: given as instruction pointer in context Stack contents: 00000032b8efcaa8 fe 11 84 d1 f9 7f 00 00 ........ Possible instruction pointers: 1 user32.dll + 0x211fe rbp = 0x00000032b8efcbf0 rsp = 0x00000032b8efcab0 rip = 0x00007ff9d18411fe Found by: stack scanning Stack contents: 00000032b8efcab0 00 00 00 00 00 00 00 00 24 21 99 69 f9 7f 00 00 ........$!.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xe2124 rbp = 0x00000032b8efcbf0 rsp = 0x00000032b8efcac0 rip = 0x00007ff969992124 Found by: stack scanning Stack contents: 00000032b8efcac0 60 ba 64 23 e8 01 00 00 03 00 00 00 e8 01 00 00 `.d#............ 00000032b8efcad0 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8efcae0 01 00 26 23 e8 01 00 00 ba e6 ad 69 f9 7f 00 00 ..&#.......i.... Possible instruction pointers: 3 Qt6Core.dll + 0x22e6ba rbp = 0x00000032b8efcbf0 rsp = 0x00000032b8efcaf0 rip = 0x00007ff969ade6ba Found by: stack scanning Stack contents: 00000032b8efcaf0 24 00 00 00 00 00 00 00 f0 cb ef b8 32 00 00 00 $...........2... 00000032b8efcb00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8efcb10 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8efcb20 8a 00 04 00 00 00 00 00 13 01 00 00 00 00 00 00 ................ 00000032b8efcb30 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8efcb40 9e ab 11 00 51 09 00 00 ea 02 00 00 00 00 00 00 ....Q........... 00000032b8efcb50 60 ba 64 23 e8 01 00 00 00 00 00 00 00 00 00 00 `.d#............ 00000032b8efcb60 b0 ff 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..%#............ 00000032b8efcb70 00 00 00 00 00 00 00 00 80 cc d2 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x47cc80 rbp = 0x00000032b8efcbf0 rsp = 0x00000032b8efcb80 rip = 0x00007ff969d2cc80 Found by: stack scanning Thread 42 0 zlib1.dll + 0xb7b3 rax = 0x0000000000000002 rdx = 0x0000000000000009 rcx = 0x000001e83a26a653 rbx = 0x0000000000001761 rsi = 0x0000000000000760 rdi = 0x000001e834ece7af rbp = 0x0000000000000001 rsp = 0x00000032b8fff210 r8 = 0x000001e83a26adb3 r9 = 0x000001e839730da4 r10 = 0x000000000000000d r11 = 0x0000000000000005 r12 = 0x000001e839730310 r13 = 0x000001e839730ce0 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9af06b7b3 Found by: given as instruction pointer in context Stack contents: 00000032b8fff210 ff 01 00 00 00 00 00 00 37 f6 26 3a e8 01 00 00 ........7.&:.... 00000032b8fff220 c0 fd 72 39 e8 01 00 00 03 14 ed 34 e8 01 00 00 ..r9.......4.... 00000032b8fff230 c0 10 26 3a e8 01 00 00 18 00 18 00 18 00 18 00 ..&:............ 00000032b8fff240 76 38 93 84 61 d1 00 00 00 00 00 00 00 00 00 00 v8..a........... 00000032b8fff250 00 00 00 00 00 00 00 00 c0 fd 72 39 e8 01 00 00 ..........r9.... 00000032b8fff260 60 f3 ff b8 32 00 00 00 70 f3 ff b8 32 00 00 00 `...2...p...2... 00000032b8fff270 0d 3a 00 00 00 00 00 00 fb d9 ec 34 e8 01 00 00 .:.........4.... 00000032b8fff280 06 00 00 00 00 00 00 00 f8 86 06 af f9 7f 00 00 ................ Possible instruction pointers: 1 zlib1.dll + 0x86f8 rsp = 0x00000032b8fff290 rip = 0x00007ff9af0686f8 Found by: stack scanning Stack contents: 00000032b8fff290 60 f3 ff b8 32 00 00 00 3f 00 00 00 00 00 00 00 `...2...?....... 00000032b8fff2a0 00 00 00 00 32 00 00 00 00 00 00 00 32 00 00 00 ....2.......2... 00000032b8fff2b0 34 fe 72 39 e8 01 00 00 d0 00 73 39 e8 01 00 00 4.r9......s9.... 00000032b8fff2c0 00 00 00 00 00 05 06 00 62 8d 00 00 f9 7f 00 00 ........b....... 00000032b8fff2d0 1b 97 26 3a e8 01 00 00 70 f3 ff b8 32 00 00 00 ..&:....p...2... 00000032b8fff2e0 00 00 01 00 00 00 00 00 c0 10 26 3a e8 01 00 00 ..........&:.... 00000032b8fff2f0 01 00 00 00 00 00 00 00 38 f4 ff b8 32 00 00 00 ........8...2... 00000032b8fff300 28 f5 ff b8 32 00 00 00 00 00 00 00 00 00 00 00 (...2........... 00000032b8fff310 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 00000032b8fff320 9e 86 ec 34 e8 01 00 00 61 d6 06 af f9 7f 00 00 ...4....a....... Possible instruction pointers: 2 zlib1.dll + 0xd661 rsp = 0x00000032b8fff330 rip = 0x00007ff9af06d661 Found by: stack scanning Stack contents: 00000032b8fff330 78 e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 x............... 00000032b8fff340 00 00 00 00 e8 01 00 00 1d 60 00 00 e8 01 00 00 .........`...... 00000032b8fff350 62 8d 00 00 00 00 00 00 40 75 55 30 e8 01 00 00 b.......@uU0.... 00000032b8fff360 fb d9 ec 34 e8 01 00 00 0d 3a 00 00 00 00 00 00 ...4.....:...... 00000032b8fff370 1b 97 26 3a e8 01 00 00 1d 60 00 00 00 00 00 00 ..&:.....`...... 00000032b8fff380 00 00 00 00 00 00 00 00 c0 fd 72 39 e8 01 00 00 ..........r9.... 00000032b8fff390 30 d7 06 af f9 7f 00 00 0....... Possible instruction pointers: 3 zlib1.dll + 0xd730 rsp = 0x00000032b8fff398 rip = 0x00007ff9af06d730 Found by: stack scanning Stack contents: 00000032b8fff398 40 d7 06 af f9 7f 00 00 @....... Possible instruction pointers: 4 zlib1.dll + 0xd740 rsp = 0x00000032b8fff3a0 rip = 0x00007ff9af06d740 Found by: stack scanning Stack contents: 00000032b8fff3a0 00 00 00 00 00 00 00 00 62 8d 00 00 01 00 00 00 ........b....... 00000032b8fff3b0 00 00 00 00 e8 01 00 00 00 ff 90 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 5 Qt6Core.dll + 0x5ff00 rsp = 0x00000032b8fff3c0 rip = 0x00007ff96990ff00 Found by: stack scanning Stack contents: 00000032b8fff3c0 01 8c 39 30 e8 01 00 00 20 8d 39 30 e8 01 00 00 ..90.... .90.... 00000032b8fff3d0 24 00 00 00 00 00 00 00 70 53 09 00 00 00 00 00 $.......pS...... 00000032b8fff3e0 68 f5 ff b8 32 00 00 00 93 d5 06 af f9 7f 00 00 h...2........... Possible instruction pointers: 6 zlib1.dll + 0xd593 rsp = 0x00000032b8fff3f0 rip = 0x00007ff9af06d593 Found by: stack scanning Stack contents: 00000032b8fff3f0 9e 86 ec 34 e8 01 00 00 a9 f4 ff b8 32 00 00 00 ...4........2... 00000032b8fff400 d0 bd 14 23 e8 01 00 00 68 f5 ff b8 32 00 00 00 ...#....h...2... 00000032b8fff410 20 8d 39 30 e8 01 00 00 e5 4f d1 35 f6 7f 00 00 .90.....O.5.... Possible instruction pointers: *(0x00000032b8fff418) = 0x00007ff635d14fe5 > &)> [chunkedstorage.cc : 169 + 0x11] 7 goldendict.exe!ChunkedStorage::Reader::getBlock(unsigned int,std::vector > &) [chunkedstorage.cc : 169 + 0x11] rsp = 0x00000032b8fff420 rip = 0x00007ff635d14fe5 Found by: stack scanning Stack contents: 00000032b8fff420 9e 86 ec 34 e8 01 00 00 a9 f4 ff b8 32 00 00 00 ...4........2... 00000032b8fff430 d0 bd 14 23 e8 01 00 00 62 8d 00 00 32 00 00 00 ...#....b...2... 00000032b8fff440 d0 bd 14 23 e8 01 00 00 78 f4 ff b8 32 00 00 00 ...#....x...2... 00000032b8fff450 80 3b 04 33 e8 01 00 00 78 e6 00 00 e8 01 00 00 .;.3....x....... Possible instruction pointers: 8 0x1e80000e678 rsp = 0x00000032b8fff460 rip = 0x000001e80000e678 Found by: call frame info Stack contents: 00000032b8fff460 d0 bd 14 23 e8 01 00 00 78 f4 ff b8 32 00 00 00 ...#....x...2... 00000032b8fff470 01 f0 00 00 32 00 00 00 a6 86 ec 34 e8 01 00 00 ....2......4.... 00000032b8fff480 20 8d 39 30 e8 01 00 00 01 00 00 00 00 00 00 00 .90............ 00000032b8fff490 00 00 00 00 00 00 00 00 9e 86 ec 34 e8 01 00 00 ...........4.... 00000032b8fff4a0 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff4b0 70 e1 2b 33 e8 01 00 00 01 01 04 33 01 00 00 00 p.+3.......3.... 00000032b8fff4c0 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff4d0 00 8c 39 30 e8 01 00 00 00 00 00 00 00 00 00 00 ..90............ 00000032b8fff4e0 4a 4f 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 JO.............. 00000032b8fff4f0 08 8d 39 30 e8 01 00 00 70 53 09 00 00 00 00 00 ..90....pS...... 00000032b8fff500 60 1c 69 30 e8 01 00 00 84 7c dc 35 f6 7f 00 00 `.i0.....|.5.... Possible instruction pointers: *(0x00000032b8fff508) = 0x00007ff635dc7c84 [dsl.cc : 1113 + 0x13] 9 goldendict.exe!static void Dsl::`anonymous namespace'::DslDictionary::getArticleText(unsigned int, class QString & const, class QString & const) [dsl.cc : 1113 + 0x13] rsp = 0x00000032b8fff510 rip = 0x00007ff635dc7c84 Found by: stack scanning Stack contents: 00000032b8fff510 62 8d 00 00 6f 6e 69 6f 00 00 00 00 00 00 00 00 b...onio........ 00000032b8fff520 01 f9 ff b8 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b8fff530 01 00 00 00 01 00 00 00 00 0c 23 3a e8 01 00 00 ..........#:.... Possible instruction pointers: 10 0x1e83a230c00 rsp = 0x00000032b8fff540 rip = 0x000001e83a230c00 Found by: call frame info Stack contents: 00000032b8fff540 00 00 00 00 00 00 00 00 88 f9 ff b8 32 00 00 00 ............2... 00000032b8fff550 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff560 60 f9 ff b8 32 00 00 00 c0 10 26 3a e8 01 00 00 `...2.....&:.... 00000032b8fff570 38 f7 26 3a e8 01 00 00 38 f7 26 3a e8 01 00 00 8.&:....8.&:.... 00000032b8fff580 00 8c 39 30 e8 01 00 00 00 00 00 00 00 00 00 00 ..90............ 00000032b8fff590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff5a0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff5b0 00 00 00 00 00 00 00 00 e5 80 e2 68 f9 7f 00 00 ...........h.... Possible instruction pointers: 11 xapian-30.dll + 0x1180e5 rsp = 0x00000032b8fff5c0 rip = 0x00007ff968e280e5 Found by: stack scanning Stack contents: 00000032b8fff5c0 31 6f 18 ed 4c 26 00 00 20 00 00 00 00 00 00 00 1o..L&.. ....... 00000032b8fff5d0 08 8d 39 30 e8 01 00 00 01 00 00 00 00 00 00 00 ..90............ 00000032b8fff5e0 41 6e 18 ed 4c 26 00 00 36 41 e2 68 f9 7f 00 00 An..L&..6A.h.... Possible instruction pointers: 12 xapian-30.dll + 0x114136 rsp = 0x00000032b8fff5f0 rip = 0x00007ff968e24136 Found by: stack scanning Stack contents: 00000032b8fff5f0 00 00 00 00 00 00 00 00 b8 b5 04 00 00 00 00 00 ................ 00000032b8fff600 49 4f 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 IO.............. 00000032b8fff610 f0 f8 ff b8 32 00 00 00 0f 00 00 00 00 00 00 00 ....2........... 00000032b8fff620 01 00 00 00 00 00 00 00 b4 72 d9 68 f9 7f 00 00 .........r.h.... Possible instruction pointers: 13 xapian-30.dll + 0x872b4 rsp = 0x00000032b8fff630 rip = 0x00007ff968d972b4 Found by: stack scanning Stack contents: 00000032b8fff630 e8 0b 2a 3a e8 01 00 00 f3 0b 2a 3a e8 01 00 00 ..*:......*:.... 00000032b8fff640 01 00 00 00 00 00 00 00 f0 0b 2a 3a e8 01 00 00 ..........*:.... 00000032b8fff650 f3 0b 2a 3a e8 01 00 00 01 00 00 00 00 00 00 00 ..*:............ 00000032b8fff660 60 f7 ff b8 32 00 00 00 60 f7 ff b8 32 00 00 00 `...2...`...2... 00000032b8fff670 64 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de.............. 00000032b8fff680 02 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 ................ 00000032b8fff690 48 f7 ff b8 32 00 00 00 a1 5b 15 d2 f9 7f 00 00 H...2....[...... Possible instruction pointers: 14 ntdll.dll + 0x25ba1 rsp = 0x00000032b8fff6a0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b8fff6a0 60 1c 69 30 e8 01 00 00 e6 fd 7e cf f9 7f 00 00 `.i0......~..... Possible instruction pointers: 15 ucrtbase.dll + 0xfde6 rsp = 0x00000032b8fff6b0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b8fff6b0 00 00 00 00 00 00 00 00 a5 00 00 00 00 00 00 00 ................ 00000032b8fff6c0 e0 2c 4d 33 e8 01 00 00 b8 b5 04 00 00 00 00 00 .,M3............ 00000032b8fff6d0 f1 6f 18 ed 4c 26 00 00 13 00 00 00 00 00 00 00 .o..L&.......... 00000032b8fff6e0 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 16 ntdll.dll + 0x25ba1 rsp = 0x00000032b8fff6f0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b8fff6f0 49 4f 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 IO.............. 00000032b8fff700 31 6c 18 ed 4c 26 00 00 f0 f7 ff b8 32 00 00 00 1l..L&......2... 00000032b8fff710 c8 f9 ff b8 32 00 00 00 6e ed d1 68 f9 7f 00 00 ....2...n..h.... Possible instruction pointers: 17 xapian-30.dll + 0xed6e rsp = 0x00000032b8fff720 rip = 0x00007ff968d1ed6e Found by: stack scanning Stack contents: 00000032b8fff720 90 8b dc 33 e8 01 00 00 01 00 00 00 f6 7f 00 00 ...3............ 00000032b8fff730 f0 f7 ff b8 32 00 00 00 80 00 0d 34 e8 01 00 00 ....2......4.... 00000032b8fff740 00 00 00 00 00 00 00 00 f3 0b 2a 3a e8 01 00 00 ..........*:.... 00000032b8fff750 00 00 f9 1a e8 01 00 00 b1 47 15 d2 f9 7f 00 00 .........G...... Possible instruction pointers: 18 ntdll.dll + 0x247b1 rsp = 0x00000032b8fff760 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b8fff760 80 e7 01 33 e8 01 00 00 00 00 00 00 e8 01 00 00 ...3............ 00000032b8fff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff780 00 00 00 00 00 00 00 00 b8 b5 04 00 00 00 00 00 ................ 00000032b8fff790 49 4f 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 IO.............. 00000032b8fff7a0 40 01 0d 34 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 @..4.....G...... Possible instruction pointers: 19 ntdll.dll + 0x247b1 rsp = 0x00000032b8fff7b0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b8fff7b0 b8 b5 04 00 00 00 00 00 00 00 03 1b e8 01 00 00 ................ 00000032b8fff7c0 60 1c 69 30 e8 01 00 00 00 00 00 00 00 00 00 00 `.i0............ 00000032b8fff7d0 8c 17 98 df bd ea 00 00 1c c0 24 34 e8 01 00 00 ..........$4.... 00000032b8fff7e0 00 00 00 00 00 00 00 00 b8 b5 04 00 00 00 00 00 ................ 00000032b8fff7f0 4a 4f 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 JO.............. 00000032b8fff800 1c c0 24 34 e8 01 00 00 0f 00 00 00 00 00 00 00 ..$4............ 00000032b8fff810 04 0a 21 34 e8 01 00 00 23 9b ef 35 f6 7f 00 00 ..!4....#..5.... Possible instruction pointers: *(0x00000032b8fff818) = 0x00007ff635ef9b23 [ftshelpers.cc : 134 + 0x0] 20 goldendict.exe!FtsHelpers::makeFTSIndex(BtreeIndexing::BtreeDictionary *,QAtomicInt &) [ftshelpers.cc : 132 + 0x20] rsp = 0x00000032b8fff820 rip = 0x00007ff635ef9b23 Found by: stack scanning Stack contents: 00000032b8fff820 00 0a 21 34 e8 01 00 00 00 00 00 00 e8 01 00 00 ..!4............ 00000032b8fff830 60 1c 69 30 e8 01 00 00 d0 03 51 33 e8 01 00 00 `.i0......Q3.... 00000032b8fff840 28 f7 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 (.3.2........... 00000032b8fff850 00 72 bb 30 e8 01 00 00 00 00 00 00 00 00 00 00 .r.0............ 00000032b8fff860 b0 01 0d 34 e8 01 00 00 d0 cc 1f 34 e8 01 00 00 ...4.......4.... 00000032b8fff870 e0 cc 1f 34 e8 01 00 00 cf 3c 01 00 00 00 00 00 ...4.....<...... 00000032b8fff880 00 8c 39 30 e8 01 00 00 0f 00 00 00 00 00 00 00 ..90............ 00000032b8fff890 80 e7 01 33 e8 01 00 00 28 f7 33 b6 32 00 00 00 ...3....(.3.2... 00000032b8fff8a0 c0 0b 2a 3a e8 01 00 00 f3 0b 2a 3a e8 01 00 00 ..*:......*:.... 00000032b8fff8b0 00 00 00 00 00 00 00 00 28 f7 33 b6 32 00 00 00 ........(.3.2... 00000032b8fff8c0 20 12 53 33 e8 01 00 00 00 00 00 00 00 00 00 00 .S3............ 00000032b8fff8d0 e0 8c 39 30 e8 01 00 00 01 47 15 d2 f9 7f 00 00 ..90.....G...... Possible instruction pointers: 21 ntdll.dll + 0x24701 rsp = 0x00000032b8fff8e0 rip = 0x00007ff9d2154701 Found by: call frame info Stack contents: 00000032b8fff8e0 28 f7 33 b6 32 00 00 00 a1 5b 15 d2 f9 7f 00 00 (.3.2....[...... Possible instruction pointers: 22 ntdll.dll + 0x25ba1 rsp = 0x00000032b8fff8f0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b8fff8f0 d8 a6 e3 68 f9 7f 00 00 ...h.... Possible instruction pointers: 23 xapian-30.dll + 0x12a6d8 rsp = 0x00000032b8fff8f8 rip = 0x00007ff968e3a6d8 Found by: stack scanning Stack contents: 00000032b8fff8f8 20 ab 88 30 e8 01 00 00 28 ab 88 30 e8 01 00 00 ..0....(..0.... 00000032b8fff908 28 ab 88 30 e8 01 00 00 00 8c 39 30 e8 01 00 00 (..0......90.... 00000032b8fff918 5b f0 7e cf f9 7f 00 00 [.~..... Possible instruction pointers: 24 ucrtbase.dll + 0xf05b rsp = 0x00000032b8fff920 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b8fff920 20 71 bb 30 e8 01 00 00 00 00 00 00 00 00 00 00 q.0............ 00000032b8fff930 60 1c 69 30 e8 01 00 00 e0 b8 c6 33 e8 01 00 00 `.i0.......3.... 00000032b8fff940 20 0f 53 33 e8 01 00 00 4a 9b 8e 69 f9 7f 00 00 .S3....J..i.... Possible instruction pointers: 25 Qt6Core.dll + 0x39b4a rsp = 0x00000032b8fff950 rip = 0x00007ff9698e9b4a Found by: stack scanning Stack contents: 00000032b8fff950 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff970 00 00 00 00 00 00 00 00 6d 90 d2 35 f6 7f 00 00 ........m..5.... Possible instruction pointers: *(0x00000032b8fff978) = 0x00007ff635d2906d [gddebug.cc : 33 + 0x0] 26 goldendict.exe!gdDebug(char const *,...) [gddebug.cc : 30 + 0x7d] rsp = 0x00000032b8fff980 rip = 0x00007ff635d2906d Found by: stack scanning Stack contents: 00000032b8fff980 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff9a0 0f 00 00 00 00 00 00 00 31 32 37 38 37 32 00 00 ........127872.. 00000032b8fff9b0 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 ................ 00000032b8fff9c0 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fff9e0 0f 00 00 00 00 00 00 00 bc 1a 98 df bd ea 00 00 ................ 00000032b8fff9f0 01 00 00 00 00 00 00 00 28 f7 33 b6 32 00 00 00 ........(.3.2... 00000032b8fffa00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b8fffa10 98 fc cf b6 32 00 00 00 23 16 dd 35 f6 7f 00 00 ....2...#..5.... Possible instruction pointers: *(0x00000032b8fffa18) = 0x00007ff635dd1623 [dsl.cc : 1093 + 0x0] 27 goldendict.exe!static void Dsl::`anonymous namespace'::DslDictionary::makeFTSIndex(class QAtomicInt & const, bool) [dsl.cc : 1092 + 0xb] rsp = 0x00000032b8fffa20 rip = 0x00007ff635dd1623 Found by: stack scanning Thread 43 0 zlib1.dll + 0xb524 rax = 0x00000000003feea0 rdx = 0x0000000000000010 rcx = 0x0000000000000003 rbx = 0x000000000007fdd4 rsi = 0x000000000000003f rdi = 0x000001e834f4c1be rbp = 0x0000000000000001 rsp = 0x00000032b90fed60 r8 = 0x000001e83a1f41c1 r9 = 0x000001e832a94120 r10 = 0x0000000000000014 r11 = 0x0000000000000003 r12 = 0x000001e832a93ea0 r13 = 0x000001e832a946b0 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9af06b524 Found by: given as instruction pointer in context Stack contents: 00000032b90fed60 ff 01 00 00 00 00 00 00 1f 09 20 3a e8 01 00 00 .......... :.... 00000032b90fed70 50 39 a9 32 e8 01 00 00 2c 2f f5 34 e8 01 00 00 P9.2....,/.4.... 00000032b90fed80 20 0a 1f 3a e8 01 00 00 18 00 18 00 18 00 18 00 ..:............ 00000032b90fed90 06 25 63 85 61 d1 00 00 00 00 00 00 00 00 00 00 .%c.a........... 00000032b90feda0 27 00 00 00 00 00 00 00 50 39 a9 32 e8 01 00 00 '.......P9.2.... 00000032b90fedb0 b0 ee 0f b9 32 00 00 00 c0 ee 0f b9 32 00 00 00 ....2.......2... 00000032b90fedc0 60 8b 00 00 00 00 00 00 d1 a3 f4 34 e8 01 00 00 `..........4.... 00000032b90fedd0 06 00 00 00 00 00 00 00 f8 86 06 af f9 7f 00 00 ................ Possible instruction pointers: 1 zlib1.dll + 0x86f8 rsp = 0x00000032b90fede0 rip = 0x00007ff9af0686f8 Found by: stack scanning Stack contents: 00000032b90fede0 b0 ee 0f b9 32 00 00 00 3f 00 00 00 00 00 00 00 ....2...?....... 00000032b90fedf0 00 00 00 00 32 00 00 00 00 00 00 00 32 00 00 00 ....2.......2... 00000032b90fee00 c4 39 a9 32 e8 01 00 00 60 3c a9 32 e8 01 00 00 .9.2....`<.2.... 00000032b90fee10 00 00 00 00 00 03 08 00 9d 8b 00 00 f9 7f 00 00 ................ 00000032b90fee20 20 0a 1f 3a e8 01 00 00 c0 ee 0f b9 32 00 00 00 ..:........2... 00000032b90fee30 00 00 01 00 00 00 00 00 20 0a 1f 3a e8 01 00 00 ........ ..:.... 00000032b90fee40 01 00 00 00 00 00 00 00 88 ef 0f b9 32 00 00 00 ............2... 00000032b90fee50 78 f0 0f b9 32 00 00 00 00 00 00 00 00 00 00 00 x...2........... 00000032b90fee60 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 00000032b90fee70 8c a3 f4 34 e8 01 00 00 61 d6 06 af f9 7f 00 00 ...4....a....... Possible instruction pointers: 2 zlib1.dll + 0xd661 rsp = 0x00000032b90fee80 rip = 0x00007ff9af06d661 Found by: stack scanning Stack contents: 00000032b90fee80 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90fee90 00 00 00 00 e8 01 00 00 00 00 01 00 e8 01 00 00 ................ 00000032b90feea0 9d 8b 00 00 00 00 00 00 10 f0 98 23 e8 01 00 00 ...........#.... 00000032b90feeb0 d1 a3 f4 34 e8 01 00 00 60 8b 00 00 00 00 00 00 ...4....`....... 00000032b90feec0 20 0a 1f 3a e8 01 00 00 00 00 01 00 00 00 00 00 ..:............ 00000032b90feed0 00 00 00 00 00 00 00 00 50 39 a9 32 e8 01 00 00 ........P9.2.... 00000032b90feee0 30 d7 06 af f9 7f 00 00 0....... Possible instruction pointers: 3 zlib1.dll + 0xd730 rsp = 0x00000032b90feee8 rip = 0x00007ff9af06d730 Found by: stack scanning Stack contents: 00000032b90feee8 40 d7 06 af f9 7f 00 00 @....... Possible instruction pointers: 4 zlib1.dll + 0xd740 rsp = 0x00000032b90feef0 rip = 0x00007ff9af06d740 Found by: stack scanning Stack contents: 00000032b90feef0 00 00 00 00 00 00 00 00 9d 8b 00 00 01 00 00 00 ................ 00000032b90fef00 00 00 00 00 e8 01 00 00 00 ff 90 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 5 Qt6Core.dll + 0x5ff00 rsp = 0x00000032b90fef10 rip = 0x00007ff96990ff00 Found by: stack scanning Stack contents: 00000032b90fef10 01 01 9a 23 e8 01 00 00 80 02 9a 23 e8 01 00 00 ...#.......#.... 00000032b90fef20 38 00 00 00 00 00 00 00 10 b1 0e 00 00 00 00 00 8............... 00000032b90fef30 b8 f0 0f b9 32 00 00 00 93 d5 06 af f9 7f 00 00 ....2........... Possible instruction pointers: 6 zlib1.dll + 0xd593 rsp = 0x00000032b90fef40 rip = 0x00007ff9af06d593 Found by: stack scanning Stack contents: 00000032b90fef40 8c a3 f4 34 e8 01 00 00 f9 ef 0f b9 32 00 00 00 ...4........2... 00000032b90fef50 50 6e 14 23 e8 01 00 00 b8 f0 0f b9 32 00 00 00 Pn.#........2... 00000032b90fef60 80 02 9a 23 e8 01 00 00 e5 4f d1 35 f6 7f 00 00 ...#.....O.5.... Possible instruction pointers: *(0x00000032b90fef68) = 0x00007ff635d14fe5 > &)> [chunkedstorage.cc : 169 + 0x11] 7 goldendict.exe!ChunkedStorage::Reader::getBlock(unsigned int,std::vector > &) [chunkedstorage.cc : 169 + 0x11] rsp = 0x00000032b90fef70 rip = 0x00007ff635d14fe5 Found by: stack scanning Stack contents: 00000032b90fef70 8c a3 f4 34 e8 01 00 00 f9 ef 0f b9 32 00 00 00 ...4........2... 00000032b90fef80 50 6e 14 23 e8 01 00 00 9d 8b 00 00 32 00 00 00 Pn.#........2... 00000032b90fef90 50 6e 14 23 e8 01 00 00 c8 ef 0f b9 32 00 00 00 Pn.#........2... 00000032b90fefa0 10 4b 04 33 e8 01 00 00 00 00 01 00 e8 01 00 00 .K.3............ Possible instruction pointers: 8 0x1e800010000 rsp = 0x00000032b90fefb0 rip = 0x000001e800010000 Found by: call frame info Stack contents: 00000032b90fefb0 50 6e 14 23 e8 01 00 00 c8 ef 0f b9 32 00 00 00 Pn.#........2... 00000032b90fefc0 01 3d 02 00 32 00 00 00 94 a3 f4 34 e8 01 00 00 .=..2......4.... 00000032b90fefd0 80 02 9a 23 e8 01 00 00 01 00 00 00 00 00 00 00 ...#............ 00000032b90fefe0 00 00 00 00 00 00 00 00 8c a3 f4 34 e8 01 00 00 ...........4.... 00000032b90feff0 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff000 60 a9 c3 30 e8 01 00 00 01 01 04 33 01 00 00 00 `..0.......3.... 00000032b90ff010 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff020 60 01 9a 23 e8 01 00 00 00 00 00 00 00 00 00 00 `..#............ 00000032b90ff030 33 67 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 3g.............. 00000032b90ff040 68 02 9a 23 e8 01 00 00 10 b1 0e 00 00 00 00 00 h..#............ 00000032b90ff050 80 22 69 30 e8 01 00 00 84 7c dc 35 f6 7f 00 00 ."i0.....|.5.... Possible instruction pointers: *(0x00000032b90ff058) = 0x00007ff635dc7c84 [dsl.cc : 1113 + 0x13] 9 goldendict.exe!static void Dsl::`anonymous namespace'::DslDictionary::getArticleText(unsigned int, class QString & const, class QString & const) [dsl.cc : 1113 + 0x13] rsp = 0x00000032b90ff060 rip = 0x00007ff635dc7c84 Found by: stack scanning Stack contents: 00000032b90ff060 9d 8b 00 00 69 74 69 6f 6e 00 00 00 00 00 00 00 ....ition....... 00000032b90ff070 01 f4 0f b9 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b90ff080 01 00 00 00 01 00 00 00 00 87 2e 3a e8 01 00 00 ...........:.... Possible instruction pointers: 10 0x1e83a2e8700 rsp = 0x00000032b90ff090 rip = 0x000001e83a2e8700 Found by: call frame info Stack contents: 00000032b90ff090 00 00 00 00 00 00 00 00 d8 f4 0f b9 32 00 00 00 ............2... 00000032b90ff0a0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff0b0 b0 f4 0f b9 32 00 00 00 20 0a 1f 3a e8 01 00 00 ....2... ..:.... 00000032b90ff0c0 20 0a 20 3a e8 01 00 00 20 0a 20 3a e8 01 00 00 . :.... . :.... 00000032b90ff0d0 60 01 9a 23 e8 01 00 00 00 00 00 00 00 00 00 00 `..#............ 00000032b90ff0e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff0f0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff100 e0 f1 0f b9 32 00 00 00 e5 80 e2 68 f9 7f 00 00 ....2......h.... Possible instruction pointers: 11 xapian-30.dll + 0x1180e5 rsp = 0x00000032b90ff110 rip = 0x00007ff968e280e5 Found by: stack scanning Stack contents: 00000032b90ff110 81 6a e8 ec 4c 26 00 00 e3 81 8f 00 00 00 00 00 .j..L&.......... 00000032b90ff120 68 02 9a 23 e8 01 00 00 01 00 00 00 00 00 00 00 h..#............ 00000032b90ff130 91 75 e8 ec 4c 26 00 00 36 41 e2 68 f9 7f 00 00 .u..L&..6A.h.... Possible instruction pointers: 12 xapian-30.dll + 0x114136 rsp = 0x00000032b90ff140 rip = 0x00007ff968e24136 Found by: stack scanning Stack contents: 00000032b90ff140 00 00 00 00 00 00 00 00 90 5f 08 00 00 00 00 00 ........._...... 00000032b90ff150 32 67 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 2g.............. 00000032b90ff160 40 f4 0f b9 32 00 00 00 0f 00 00 00 00 00 00 00 @...2........... 00000032b90ff170 01 00 00 00 00 00 00 00 b4 72 d9 68 f9 7f 00 00 .........r.h.... Possible instruction pointers: 13 xapian-30.dll + 0x872b4 rsp = 0x00000032b90ff180 rip = 0x00007ff968d972b4 Found by: stack scanning Stack contents: 00000032b90ff180 e5 a7 2b 3a e8 01 00 00 18 a8 2b 3a e8 01 00 00 ..+:......+:.... 00000032b90ff190 01 00 00 00 00 00 00 00 16 a8 2b 3a e8 01 00 00 ..........+:.... 00000032b90ff1a0 18 a8 2b 3a e8 01 00 00 01 00 00 00 00 00 00 00 ..+:............ 00000032b90ff1b0 b0 f2 0f b9 32 00 00 00 b0 f2 0f b9 32 00 00 00 ....2.......2... 00000032b90ff1c0 63 61 62 69 6e 65 74 00 00 00 00 00 00 00 00 00 cabinet......... 00000032b90ff1d0 07 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 ................ 00000032b90ff1e0 02 a8 2b 3a e8 01 00 00 18 a8 2b 3a e8 01 00 00 ..+:......+:.... 00000032b90ff1f0 01 00 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b90ff200 00 81 8f 00 81 8f 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff210 00 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 ................ 00000032b90ff220 41 6b e8 ec 4c 26 00 00 ab 00 00 00 00 00 00 00 Ak..L&.......... 00000032b90ff230 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 14 ntdll.dll + 0x25ba1 rsp = 0x00000032b90ff240 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b90ff240 32 67 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 2g.............. 00000032b90ff250 81 6b e8 ec 4c 26 00 00 40 f3 0f b9 32 00 00 00 .k..L&..@...2... 00000032b90ff260 18 f5 0f b9 32 00 00 00 6e ed d1 68 f9 7f 00 00 ....2...n..h.... Possible instruction pointers: 15 xapian-30.dll + 0xed6e rsp = 0x00000032b90ff270 rip = 0x00007ff968d1ed6e Found by: stack scanning Stack contents: 00000032b90ff270 e0 5f f5 1d e8 01 00 00 ee 01 00 00 f6 7f 00 00 ._.............. 00000032b90ff280 40 f3 0f b9 32 00 00 00 80 80 0e 34 e8 01 00 00 @...2......4.... 00000032b90ff290 00 00 00 00 00 00 00 00 18 a8 2b 3a e8 01 00 00 ..........+:.... 00000032b90ff2a0 00 00 f9 1a e8 01 00 00 b1 47 15 d2 f9 7f 00 00 .........G...... Possible instruction pointers: 16 ntdll.dll + 0x247b1 rsp = 0x00000032b90ff2b0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b90ff2b0 a0 bc 04 33 e8 01 00 00 00 00 00 00 e8 01 00 00 ...3............ 00000032b90ff2c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff2d0 00 00 00 00 00 00 00 00 90 5f 08 00 00 00 00 00 ........._...... 00000032b90ff2e0 32 67 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 2g.............. 00000032b90ff2f0 30 59 0f 34 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 0Y.4.....G...... Possible instruction pointers: 17 ntdll.dll + 0x247b1 rsp = 0x00000032b90ff300 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b90ff300 90 5f 08 00 00 00 00 00 00 00 03 1b e8 01 00 00 ._.............. 00000032b90ff310 80 22 69 30 e8 01 00 00 00 00 00 00 00 00 00 00 ."i0............ 00000032b90ff320 fc 12 68 de bd ea 00 00 a8 dd af 34 e8 01 00 00 ..h........4.... 00000032b90ff330 00 00 00 00 00 00 00 00 90 5f 08 00 00 00 00 00 ........._...... 00000032b90ff340 33 67 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 3g.............. 00000032b90ff350 a8 dd af 34 e8 01 00 00 0f 00 00 00 00 00 00 00 ...4............ 00000032b90ff360 18 fd a4 34 e8 01 00 00 23 9b ef 35 f6 7f 00 00 ...4....#..5.... Possible instruction pointers: *(0x00000032b90ff368) = 0x00007ff635ef9b23 [ftshelpers.cc : 134 + 0x0] 18 goldendict.exe!FtsHelpers::makeFTSIndex(BtreeIndexing::BtreeDictionary *,QAtomicInt &) [ftshelpers.cc : 132 + 0x20] rsp = 0x00000032b90ff370 rip = 0x00007ff635ef9b23 Found by: stack scanning Stack contents: 00000032b90ff370 14 fd a4 34 e8 01 00 00 00 00 00 00 e8 01 00 00 ...4............ 00000032b90ff380 80 22 69 30 e8 01 00 00 e0 4d d7 32 e8 01 00 00 ."i0.....M.2.... 00000032b90ff390 28 f7 33 b6 32 00 00 00 00 00 00 00 00 00 00 00 (.3.2........... 00000032b90ff3a0 00 f5 32 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..2#............ 00000032b90ff3b0 a0 52 0f 34 e8 01 00 00 40 60 a3 34 e8 01 00 00 .R.4....@`.4.... 00000032b90ff3c0 50 60 a3 34 e8 01 00 00 56 1f 03 00 00 00 00 00 P`.4....V....... 00000032b90ff3d0 60 01 9a 23 e8 01 00 00 0f 00 00 00 00 00 00 00 `..#............ 00000032b90ff3e0 a0 bc 04 33 e8 01 00 00 28 f7 33 b6 32 00 00 00 ...3....(.3.2... 00000032b90ff3f0 e0 a7 2b 3a e8 01 00 00 18 a8 2b 3a e8 01 00 00 ..+:......+:.... 00000032b90ff400 00 00 00 00 00 00 00 00 28 f7 33 b6 32 00 00 00 ........(.3.2... 00000032b90ff410 00 d4 ff 32 e8 01 00 00 00 00 00 00 00 00 00 00 ...2............ 00000032b90ff420 40 02 9a 23 e8 01 00 00 01 47 15 d2 f9 7f 00 00 @..#.....G...... Possible instruction pointers: 19 ntdll.dll + 0x24701 rsp = 0x00000032b90ff430 rip = 0x00007ff9d2154701 Found by: call frame info Stack contents: 00000032b90ff430 28 f7 33 b6 32 00 00 00 a1 5b 15 d2 f9 7f 00 00 (.3.2....[...... Possible instruction pointers: 20 ntdll.dll + 0x25ba1 rsp = 0x00000032b90ff440 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b90ff440 d8 a6 e3 68 f9 7f 00 00 ...h.... Possible instruction pointers: 21 xapian-30.dll + 0x12a6d8 rsp = 0x00000032b90ff448 rip = 0x00007ff968e3a6d8 Found by: stack scanning Stack contents: 00000032b90ff448 00 a2 63 23 e8 01 00 00 08 a2 63 23 e8 01 00 00 ..c#......c#.... 00000032b90ff458 08 a2 63 23 e8 01 00 00 60 01 9a 23 e8 01 00 00 ..c#....`..#.... 00000032b90ff468 5b f0 7e cf f9 7f 00 00 [.~..... Possible instruction pointers: 22 ucrtbase.dll + 0xf05b rsp = 0x00000032b90ff470 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b90ff470 f0 a5 32 23 e8 01 00 00 0e 00 00 00 00 00 00 00 ..2#............ 00000032b90ff480 80 22 69 30 e8 01 00 00 10 9c b7 23 e8 01 00 00 ."i0.......#.... 00000032b90ff490 a0 22 9a 23 e8 01 00 00 4a 9b 8e 69 f9 7f 00 00 .".#....J..i.... Possible instruction pointers: 23 Qt6Core.dll + 0x39b4a rsp = 0x00000032b90ff4a0 rip = 0x00007ff9698e9b4a Found by: stack scanning Stack contents: 00000032b90ff4a0 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff4b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff4c0 00 00 00 00 00 00 00 00 6d 90 d2 35 f6 7f 00 00 ........m..5.... Possible instruction pointers: *(0x00000032b90ff4c8) = 0x00007ff635d2906d [gddebug.cc : 33 + 0x0] 24 goldendict.exe!gdDebug(char const *,...) [gddebug.cc : 30 + 0x7d] rsp = 0x00000032b90ff4d0 rip = 0x00007ff635d2906d Found by: stack scanning Stack contents: 00000032b90ff4d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff4e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff4f0 0f 00 00 00 00 00 00 00 31 36 31 31 33 38 34 00 ........1611384. 00000032b90ff500 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 ................ 00000032b90ff510 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff530 0f 00 00 00 00 00 00 00 ec 11 68 de bd ea 00 00 ..........h..... 00000032b90ff540 01 00 00 00 00 00 00 00 28 f7 33 b6 32 00 00 00 ........(.3.2... 00000032b90ff550 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b90ff560 98 fc cf b6 32 00 00 00 23 16 dd 35 f6 7f 00 00 ....2...#..5.... Possible instruction pointers: *(0x00000032b90ff568) = 0x00007ff635dd1623 [dsl.cc : 1093 + 0x0] 25 goldendict.exe!static void Dsl::`anonymous namespace'::DslDictionary::makeFTSIndex(class QAtomicInt & const, bool) [dsl.cc : 1092 + 0xb] rsp = 0x00000032b90ff570 rip = 0x00007ff635dd1623 Found by: stack scanning Thread 44 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x00000000000053c0 rbx = 0x0000000000000000 rsi = 0x00000032b91ff7d8 rdi = 0x00000000000053c0 rbp = 0x00000000fffffffe rsp = 0x00000032b91ff7a8 r8 = 0x000001e833340c80 r9 = 0x000000000000005c r10 = 0x0000000000000000 r11 = 0x0000000000000003 r12 = 0x476e35e4bc6f60ba r13 = 0x0000000000000008 r14 = 0x00000000000053c0 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b91ff7a8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b91ff7b0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b91ff7b0 00 72 2b 30 e8 01 00 00 01 00 00 00 00 00 00 00 .r+0............ 00000032b91ff7c0 00 00 00 00 00 00 00 00 b4 00 00 00 01 00 00 00 ................ 00000032b91ff7d0 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b91ff7e0 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b91ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff820 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xa536f rsp = 0x00000032b91ff830 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b91ff830 00 5e 15 23 e8 01 00 00 68 15 18 23 e8 01 00 00 .^.#....h..#.... 00000032b91ff840 20 81 74 23 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 .t#....mj.i.... Possible instruction pointers: 3 Qt6Core.dll + 0x216a6d rsp = 0x00000032b91ff850 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b91ff850 ff ff ff ff ff ff ff 7f e0 f8 1f b9 32 00 00 00 ............2... 00000032b91ff860 00 00 00 00 e8 01 00 00 c0 53 00 00 00 00 00 00 .........S...... 00000032b91ff870 fc f6 21 44 14 01 00 00 00 00 00 00 01 00 00 00 ..!D............ 00000032b91ff880 b8 44 18 23 e8 01 00 00 f0 5d 15 23 e8 01 00 00 .D.#.....].#.... 00000032b91ff890 fe ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x23a609 rsp = 0x00000032b91ff8a0 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b91ff8a0 20 25 69 30 e8 01 00 00 20 25 69 30 e8 01 00 00 %i0.... %i0.... 00000032b91ff8b0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b91ff8c0 f0 14 18 23 e8 01 00 00 f0 05 26 23 e8 01 00 00 ...#......&#.... 00000032b91ff8d0 68 15 18 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 h..#.......i.... Possible instruction pointers: 5 Qt6Core.dll + 0x18c501 rsp = 0x00000032b91ff8e0 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b91ff8e0 fc f6 21 44 14 01 00 00 00 00 00 00 01 00 00 00 ..!D............ 00000032b91ff8f0 fc f6 21 44 14 01 00 00 00 00 00 00 01 00 00 00 ..!D............ 00000032b91ff900 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 6 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b91ff910 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b91ff910 f0 05 26 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 ..&#.......i.... Possible instruction pointers: 7 Qt6Core.dll + 0x18d5af rsp = 0x00000032b91ff920 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b91ff920 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b91ff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff940 f0 05 26 23 e8 01 00 00 f0 5d 15 23 e8 01 00 00 ..&#.....].#.... 00000032b91ff950 98 25 69 30 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 .%i0.....].i.... Possible instruction pointers: 8 Qt6Core.dll + 0x235de9 rsp = 0x00000032b91ff960 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b91ff960 f0 5d 15 23 e8 01 00 00 01 00 00 00 e8 01 00 00 .].#............ 00000032b91ff970 01 00 00 00 00 00 00 00 f0 5d 15 23 e8 01 00 00 .........].#.... 00000032b91ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff9a0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b91ff9b0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b91ff9b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b91ff9d0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b91ff9e0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 45 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000005414 rbx = 0x0000000000000000 rsi = 0x00000032b92ff868 rdi = 0x0000000000005414 rbp = 0x00000000fffffffe rsp = 0x00000032b92ff838 r8 = 0x0000000000000001 r9 = 0x00000032b92ff248 r10 = 0x0000000000000012 r11 = 0x1845c8a0ce512957 r12 = 0x8c0793ba08da9201 r13 = 0x0000000000000008 r14 = 0x0000000000005414 r15 = 0x0000000000000001 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b92ff838 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b92ff840 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b92ff840 00 8b 2b 30 e8 01 00 00 01 00 00 00 00 00 00 00 ..+0............ 00000032b92ff850 00 00 00 00 00 00 00 00 b4 00 00 00 01 00 00 00 ................ 00000032b92ff860 03 01 00 00 00 00 00 00 00 5d 1e ee ff ff ff ff .........]...... 00000032b92ff870 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b92ff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ff8b0 00 00 00 00 00 00 00 00 6f 53 95 69 f9 7f 00 00 ........oS.i.... Possible instruction pointers: 2 Qt6Core.dll + 0xa536f rsp = 0x00000032b92ff8c0 rip = 0x00007ff96995536f Found by: stack scanning Stack contents: 00000032b92ff8c0 f0 5e 15 23 e8 01 00 00 68 15 18 23 e8 01 00 00 .^.#....h..#.... 00000032b92ff8d0 00 8f c3 30 e8 01 00 00 6d 6a ac 69 f9 7f 00 00 ...0....mj.i.... Possible instruction pointers: 3 Qt6Core.dll + 0x216a6d rsp = 0x00000032b92ff8e0 rip = 0x00007ff969ac6a6d Found by: stack scanning Stack contents: 00000032b92ff8e0 ff ff ff ff ff ff ff 7f 70 f9 2f b9 32 00 00 00 ........p./.2... 00000032b92ff8f0 00 00 00 00 e8 01 00 00 14 54 00 00 00 00 00 00 .........T...... 00000032b92ff900 1c a9 09 44 14 01 00 00 00 00 00 00 01 00 00 00 ...D............ 00000032b92ff910 b8 44 18 23 e8 01 00 00 e0 5e 15 23 e8 01 00 00 .D.#.....^.#.... 00000032b92ff920 fe ff ff ff 00 00 00 00 09 a6 ae 69 f9 7f 00 00 ...........i.... Possible instruction pointers: 4 Qt6Core.dll + 0x23a609 rsp = 0x00000032b92ff930 rip = 0x00007ff969aea609 Found by: stack scanning Stack contents: 00000032b92ff930 20 1e 69 30 e8 01 00 00 68 15 18 23 e8 01 00 00 .i0....h..#.... 00000032b92ff940 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b92ff950 f0 14 18 23 e8 01 00 00 30 07 26 23 e8 01 00 00 ...#....0.&#.... 00000032b92ff960 68 15 18 23 e8 01 00 00 01 c5 a3 69 f9 7f 00 00 h..#.......i.... Possible instruction pointers: 5 Qt6Core.dll + 0x18c501 rsp = 0x00000032b92ff970 rip = 0x00007ff969a3c501 Found by: stack scanning Stack contents: 00000032b92ff970 1c a9 09 44 14 01 00 00 00 00 00 00 01 00 00 00 ...D............ 00000032b92ff980 1c a9 09 44 14 01 00 00 00 00 00 00 01 00 00 00 ...D............ 00000032b92ff990 03 00 00 00 00 00 00 00 d8 57 ae 69 f9 7f 00 00 .........W.i.... Possible instruction pointers: 6 Qt6Core.dll + 0x2357d8 rsp = 0x00000032b92ff9a0 rip = 0x00007ff969ae57d8 Found by: stack scanning Stack contents: 00000032b92ff9a0 30 07 26 23 e8 01 00 00 af d5 a3 69 f9 7f 00 00 0.&#.......i.... Possible instruction pointers: 7 Qt6Core.dll + 0x18d5af rsp = 0x00000032b92ff9b0 rip = 0x00007ff969a3d5af Found by: stack scanning Stack contents: 00000032b92ff9b0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b92ff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ff9d0 30 07 26 23 e8 01 00 00 e0 5e 15 23 e8 01 00 00 0.&#.....^.#.... 00000032b92ff9e0 98 1e 69 30 e8 01 00 00 e9 5d ae 69 f9 7f 00 00 ..i0.....].i.... Possible instruction pointers: 8 Qt6Core.dll + 0x235de9 rsp = 0x00000032b92ff9f0 rip = 0x00007ff969ae5de9 Found by: stack scanning Stack contents: 00000032b92ff9f0 e0 5e 15 23 e8 01 00 00 01 00 00 00 e8 01 00 00 .^.#............ 00000032b92ffa00 01 00 00 00 00 00 00 00 e0 5e 15 23 e8 01 00 00 .........^.#.... 00000032b92ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ffa30 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 9 kernel32.dll + 0x17374 rsp = 0x00000032b92ffa40 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b92ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b92ffa60 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 10 ntdll.dll + 0x4cc91 rsp = 0x00000032b92ffa70 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 47 0 ntdll.dll + 0x9d684 rax = 0x0000000000000009 rdx = 0x00000032b94ff480 rcx = 0x000000000000542c rbx = 0x00000032b94ff478 rsi = 0x000001e823754c50 rdi = 0x00000032b94ff520 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff3c8 r8 = 0x00007ff913a04728 r9 = 0x00000032b94ff4e9 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x000001e82364c2a0 r15 = 0x000001e823754cf0 rip = 0x00007ff9d21cd684 Found by: given as instruction pointer in context Stack contents: 00000032b94ff3c8 3f 68 e0 cf f9 7f 00 00 ?h...... Possible instruction pointers: 1 KERNELBASE.dll + 0x6683f rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff3d0 rip = 0x00007ff9cfe0683f Found by: stack scanning Stack contents: 00000032b94ff3d0 00 00 00 00 00 00 00 00 3d f2 7a 0e f9 7f 00 00 ........=.z..... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x356f23d rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff3e0 rip = 0x00007ff90e7af23d Found by: stack scanning Stack contents: 00000032b94ff3e0 c4 5f 3f 3a 8a c5 00 00 92 c2 f9 44 00 00 00 00 ._?:.......D.... 00000032b94ff3f0 00 f4 4f b9 32 00 00 00 a5 68 e0 cf f9 7f 00 00 ..O.2....h...... Possible instruction pointers: 3 KERNELBASE.dll + 0x668a5 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff400 rip = 0x00007ff9cfe068a5 Found by: stack scanning Stack contents: 00000032b94ff400 a0 33 89 fd ff ff ff ff bc ee 7a 0e f9 7f 00 00 .3........z..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x356eebc rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff410 rip = 0x00007ff90e7aeebc Found by: stack scanning Stack contents: 00000032b94ff410 00 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x87c4728 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff420 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b94ff420 00 00 00 00 00 00 00 00 e2 4d 71 0e f9 7f 00 00 .........Mq..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x34d4de2 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff430 rip = 0x00007ff90e714de2 Found by: stack scanning Stack contents: 00000032b94ff430 80 c4 3c 33 e8 01 00 00 28 47 a0 13 f9 7f 00 00 ..<3....(G...... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x87c4728 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff440 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b94ff440 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff450 26 10 00 00 00 00 00 00 41 64 7b 0e f9 7f 00 00 &.......Ad{..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x3576441 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff460 rip = 0x00007ff90e7b6441 Found by: stack scanning Stack contents: 00000032b94ff460 00 00 00 00 00 00 00 00 50 4c 75 23 e8 01 00 00 ........PLu#.... 00000032b94ff470 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff480 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000032b94ff490 a0 c2 64 23 e8 01 00 00 a0 c2 64 23 e8 01 00 00 ..d#......d#.... 00000032b94ff4a0 48 4c 75 23 e8 01 00 00 00 00 00 00 00 00 00 00 HLu#............ 00000032b94ff4b0 80 c4 3c 33 e8 01 00 00 2a c2 73 0e f9 7f 00 00 ..<3....*.s..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34fc22a rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff4c0 rip = 0x00007ff90e73c22a Found by: stack scanning Stack contents: 00000032b94ff4c0 a0 f5 4f b9 32 00 00 00 e8 ef 73 0e f9 7f 00 00 ..O.2.....s..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x34fefe8 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff4d0 rip = 0x00007ff90e73efe8 Found by: stack scanning Stack contents: 00000032b94ff4d0 00 00 00 00 00 00 00 00 19 cd 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x34fcd19 rbp = 0x00000032b94ff4e9 rsp = 0x00000032b94ff4e0 rip = 0x00007ff90e73cd19 Found by: stack scanning Stack contents: 00000032b94ff4e0 01 f6 4f b9 32 00 00 00 1b d7 38 45 00 00 00 00 ..O.2.....8E.... 00000032b94ff4f0 08 f5 4f b9 32 00 00 00 01 00 00 00 00 00 00 00 ..O.2........... 00000032b94ff500 00 00 00 00 00 00 00 00 50 4c 75 23 e8 01 00 00 ........PLu#.... 00000032b94ff510 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff520 00 00 00 00 00 00 00 00 e9 14 fa 29 04 d2 00 00 ...........).... 00000032b94ff530 00 00 00 00 00 00 00 00 80 c4 3c 33 e8 01 00 00 ..........<3.... 00000032b94ff540 01 00 00 00 00 00 00 00 d2 4f 71 0e f9 7f 00 00 .........Oq..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x34d4fd2 rsp = 0x00000032b94ff550 rip = 0x00007ff90e714fd2 Found by: stack scanning Stack contents: 00000032b94ff550 01 00 75 23 e8 01 00 00 80 c4 3c 33 e8 01 00 00 ..u#......<3.... 00000032b94ff560 a0 c2 64 23 e8 01 00 00 28 47 a0 13 f9 7f 00 00 ..d#....(G...... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b94ff570 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b94ff570 80 c4 3c 33 e8 01 00 00 55 33 71 0e f9 7f 00 00 ..<3....U3q..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x34d3355 rsp = 0x00000032b94ff580 rip = 0x00007ff90e713355 Found by: stack scanning Stack contents: 00000032b94ff580 58 4c 75 23 e8 01 00 00 26 10 00 00 e8 01 00 00 XLu#....&....... 00000032b94ff590 01 00 00 00 00 00 00 00 b5 c2 f9 44 00 00 00 00 ...........D.... 00000032b94ff5a0 1b d7 38 45 00 00 00 00 b5 c2 f9 44 00 00 00 00 ..8E.......D.... 00000032b94ff5b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff5c0 1b d7 38 45 00 00 00 00 b5 c2 f9 44 00 00 00 00 ..8E.......D.... 00000032b94ff5d0 00 00 00 00 00 00 00 00 88 4b 75 23 e8 01 00 00 .........Ku#.... 00000032b94ff5e0 00 00 00 00 00 00 00 00 98 4a 71 0e f9 7f 00 00 .........Jq..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x34d4a98 rsp = 0x00000032b94ff5f0 rip = 0x00007ff90e714a98 Found by: stack scanning Stack contents: 00000032b94ff5f0 80 c4 3c 33 e8 01 00 00 1e 99 73 0e f9 7f 00 00 ..<3......s..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x34f991e rsp = 0x00000032b94ff600 rip = 0x00007ff90e73991e Found by: stack scanning Stack contents: 00000032b94ff600 28 4c 75 23 e8 01 00 00 70 4d 75 23 e8 01 00 00 (Lu#....pMu#.... 00000032b94ff610 48 4c 75 23 e8 01 00 00 00 00 75 23 e8 01 00 00 HLu#......u#.... 00000032b94ff620 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b94ff630 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b94ff630 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b94ff640 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b94ff650 00 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b94ff660 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b94ff670 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b94ff670 10 00 00 00 00 00 00 00 10 0e f9 1a e8 01 00 00 ................ 00000032b94ff680 08 f7 4f b9 32 00 00 00 e6 7c 70 0e f9 7f 00 00 ..O.2....|p..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b94ff690 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b94ff690 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b94ff6a0 c0 f8 4f b9 32 00 00 00 c0 f7 4f b9 32 00 00 00 ..O.2.....O.2... 00000032b94ff6b0 c0 f8 4f b9 32 00 00 00 85 69 76 0e f9 7f 00 00 ..O.2....iv..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b94ff6c0 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b94ff6c0 c0 f8 4f b9 32 00 00 00 a0 c2 64 23 e8 01 00 00 ..O.2.....d#.... 00000032b94ff6d0 70 f8 4f b9 32 00 00 00 a0 63 25 23 e8 01 00 00 p.O.2....c%#.... 00000032b94ff6e0 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff6f0 a8 fc 63 23 e8 01 00 00 70 4b 75 23 e8 01 00 00 ..c#....pKu#.... 00000032b94ff700 00 00 00 00 00 00 00 00 40 85 33 33 e8 01 00 00 ........@.33.... 00000032b94ff710 00 f7 4f b9 32 00 00 00 01 00 00 00 00 00 00 00 ..O.2........... 00000032b94ff720 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff730 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 21 ucrtbase.dll + 0xfde6 rsp = 0x00000032b94ff740 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b94ff740 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b94ff750 c8 4c 75 23 e8 01 00 00 00 00 e1 cf f9 7f 00 00 .Lu#............ Possible instruction pointers: 22 KERNELBASE.dll + 0x70000 rsp = 0x00000032b94ff760 rip = 0x00007ff9cfe10000 Found by: stack scanning Stack contents: 00000032b94ff760 01 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b94ff770 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b94ff770 08 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b94ff780 00 00 00 00 00 00 00 00 98 4d 75 23 e8 01 00 00 .........Mu#.... 00000032b94ff790 00 85 33 33 e8 01 00 00 bb 95 4d 0b f9 7f 00 00 ..33......M..... Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x2995bb rsp = 0x00000032b94ff7a0 rip = 0x00007ff90b4d95bb Found by: stack scanning Stack contents: 00000032b94ff7a0 58 ee ad 13 f9 7f 00 00 X....... Possible instruction pointers: 25 Qt6WebEngineCore.dll + 0x889ee58 rsp = 0x00000032b94ff7a8 rip = 0x00007ff913adee58 Found by: stack scanning Stack contents: 00000032b94ff7a8 a0 c2 64 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..d#............ 00000032b94ff7b8 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b94ff7c8 c0 f8 4f b9 32 00 00 00 00 00 00 00 00 00 00 00 ..O.2........... 00000032b94ff7d8 e6 fd 7e cf f9 7f 00 00 ..~..... Possible instruction pointers: 26 ucrtbase.dll + 0xfde6 rsp = 0x00000032b94ff7e0 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b94ff7e0 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b94ff7f0 58 ee ad 13 f9 7f 00 00 X....... Possible instruction pointers: 27 Qt6WebEngineCore.dll + 0x889ee58 rsp = 0x00000032b94ff7f8 rip = 0x00007ff913adee58 Found by: stack scanning Stack contents: 00000032b94ff7f8 00 00 4f b9 32 00 00 00 a0 63 25 23 e8 01 00 00 ..O.2....c%#.... 00000032b94ff808 6f bc 0b 12 f9 7f 00 00 o....... Possible instruction pointers: 28 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b94ff810 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b94ff810 a0 c2 64 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..d#............ 00000032b94ff820 a0 63 25 23 e8 01 00 00 58 ee ad 13 f9 7f 00 00 .c%#....X....... Possible instruction pointers: 29 Qt6WebEngineCore.dll + 0x889ee58 rsp = 0x00000032b94ff830 rip = 0x00007ff913adee58 Found by: stack scanning Stack contents: 00000032b94ff830 00 00 00 00 00 00 00 00 58 ee ad 13 f9 7f 00 00 ........X....... Possible instruction pointers: 30 Qt6WebEngineCore.dll + 0x889ee58 rsp = 0x00000032b94ff840 rip = 0x00007ff913adee58 Found by: stack scanning Stack contents: 00000032b94ff840 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 31 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b94ff850 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b94ff850 c0 f8 4f b9 32 00 00 00 0e 00 00 00 00 00 00 00 ..O.2........... 00000032b94ff860 a0 63 25 23 e8 01 00 00 96 3f 76 0e f9 7f 00 00 .c%#.....?v..... Possible instruction pointers: 32 Qt6WebEngineCore.dll + 0x3523f96 rsp = 0x00000032b94ff870 rip = 0x00007ff90e763f96 Found by: stack scanning Stack contents: 00000032b94ff870 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 33 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b94ff878 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b94ff878 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 34 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b94ff880 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b94ff880 51 01 00 00 04 d2 00 00 77 18 71 0e f9 7f 00 00 Q.......w.q..... Possible instruction pointers: 35 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b94ff890 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b94ff890 00 00 00 00 00 00 00 00 95 24 71 0e f9 7f 00 00 .........$q..... Possible instruction pointers: 36 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b94ff8a0 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b94ff8a0 90 03 64 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..d#............ 00000032b94ff8b0 28 54 00 00 00 00 00 00 b1 47 15 d2 f9 7f 00 00 (T.......G...... Possible instruction pointers: 37 ntdll.dll + 0x247b1 rsp = 0x00000032b94ff8c0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b94ff8c0 50 4c 75 23 e8 01 00 00 00 00 00 00 00 01 00 00 PLu#............ 00000032b94ff8d0 01 00 00 00 00 00 00 00 a0 fc 63 23 e8 01 00 00 ..........c#.... 00000032b94ff8e0 80 86 33 33 e8 01 00 00 c0 f8 4f b9 32 00 00 00 ..33......O.2... 00000032b94ff8f0 4e 65 74 77 6f 72 6b 53 65 72 76 69 63 65 00 00 NetworkService.. 00000032b94ff900 0e 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 ................ 00000032b94ff910 79 18 fa 29 04 d2 00 00 00 00 00 00 00 00 00 00 y..)............ 00000032b94ff920 00 00 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 38 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b94ff930 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b94ff930 00 00 00 00 00 00 00 00 28 54 00 00 00 00 00 00 ........(T...... 00000032b94ff940 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b94ff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff960 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff980 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 39 kernel32.dll + 0x17374 rsp = 0x00000032b94ff990 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b94ff990 28 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (T.............. 00000032b94ff9a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b94ff9b0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 40 ntdll.dll + 0x4cc91 rsp = 0x00000032b94ff9c0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 48 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000005470 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000005470 rbp = 0x00000000ffffffff rsp = 0x00000032b95ff9a8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000012 r11 = 0x0000030008010010 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000005470 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b95ff9a8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b95ff9b0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b95ff9b0 ff ff ff ff 00 00 00 00 00 00 5f b9 32 00 00 00 .........._.2... 00000032b95ff9c0 1f 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b95ff9d0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b95ff9d0 40 00 00 00 00 00 00 00 21 82 a0 d1 f9 7f 00 00 @.......!....... Possible instruction pointers: 3 combase.dll + 0x38221 rsp = 0x00000032b95ff9e0 rip = 0x00007ff9d1a08221 Found by: stack scanning Stack contents: 00000032b95ff9e0 48 00 00 00 00 00 00 00 01 00 00 00 32 00 00 00 H...........2... 00000032b95ff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffa20 00 00 00 00 00 00 00 00 e0 30 2b 33 e8 01 00 00 .........0+3.... 00000032b95ffa30 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b95ffa40 10 31 2b 33 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 .1+3......q..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b95ffa50 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b95ffa50 ff ff ff ff ff ff ff 7f 5a 4b 29 23 e8 01 00 00 ........ZK)#.... 00000032b95ffa60 00 00 00 00 e8 01 00 00 70 54 00 00 00 00 00 00 ........pT...... 00000032b95ffa70 00 00 00 00 00 00 00 00 b0 fb 5f b9 32 00 00 00 .........._.2... 00000032b95ffa80 e0 30 2b 33 e8 01 00 00 e0 30 2b 33 e8 01 00 00 .0+3.....0+3.... 00000032b95ffa90 10 31 2b 33 e8 01 00 00 10 31 2b 33 e8 01 00 00 .1+3.....1+3.... 00000032b95ffaa0 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b95ffab0 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b95ffab0 f0 29 99 23 e8 01 00 00 60 34 29 23 e8 01 00 00 .).#....`4)#.... 00000032b95ffac0 99 1a ea 29 04 d2 00 00 00 00 03 1b e8 01 00 00 ...)............ 00000032b95ffad0 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffae0 00 00 00 00 00 00 00 00 a7 33 e1 cf f9 7f 00 00 .........3...... Possible instruction pointers: 6 KERNELBASE.dll + 0x733a7 rsp = 0x00000032b95ffaf0 rip = 0x00007ff9cfe133a7 Found by: stack scanning Stack contents: 00000032b95ffaf0 e0 30 2b 33 e8 01 00 00 5b f0 7e cf f9 7f 00 00 .0+3....[.~..... Possible instruction pointers: 7 ucrtbase.dll + 0xf05b rsp = 0x00000032b95ffb00 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b95ffb00 e0 30 2b 33 e8 01 00 00 e0 30 2b 33 e8 01 00 00 .0+3.....0+3.... 00000032b95ffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffb20 40 4b 29 23 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 @K)#.....G...... Possible instruction pointers: 8 ntdll.dll + 0x247b1 rsp = 0x00000032b95ffb30 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b95ffb30 c8 fb 5f b9 32 00 00 00 00 00 03 1b e8 01 00 00 .._.2........... 00000032b95ffb40 00 fd 5f b9 32 00 00 00 00 00 00 00 00 00 00 00 .._.2........... 00000032b95ffb50 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 ................ 00000032b95ffb60 00 30 2b 33 e8 01 00 00 00 00 00 00 00 00 00 00 .0+3............ 00000032b95ffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffbb0 00 ea 39 33 e8 01 00 00 20 9c c5 d1 f9 7f 00 00 ..93.... ....... Possible instruction pointers: 9 combase.dll + 0x289c20 rsp = 0x00000032b95ffbc0 rip = 0x00007ff9d1c59c20 Found by: stack scanning Stack contents: 00000032b95ffbc0 00 fd 5f b9 32 00 00 00 01 3d 77 0e f9 7f 00 00 .._.2....=w..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b95ffbd0 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b95ffbd0 10 31 2b 33 e8 01 00 00 10 31 2b 33 e8 01 00 00 .1+3.....1+3.... 00000032b95ffbe0 00 00 00 00 00 00 00 00 79 1b ea 29 04 d2 00 00 ........y..).... 00000032b95ffbf0 c4 53 00 00 00 00 00 00 e4 0f 77 0e f9 7f 00 00 .S........w..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x3530fe4 rsp = 0x00000032b95ffc00 rip = 0x00007ff90e770fe4 Found by: stack scanning Stack contents: 00000032b95ffc00 ff ff ff ff ff ff ff 7f c4 53 00 00 00 00 00 00 .........S...... 00000032b95ffc10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ 00000032b95ffc20 00 00 03 1b 02 00 00 00 e9 fc 5f b9 32 00 00 00 .........._.2... 00000032b95ffc30 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 12 ntdll.dll + 0x2b3c7 rsp = 0x00000032b95ffc40 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b95ffc40 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffc50 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... 00000032b95ffc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffc70 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffc80 e0 30 2b 33 e8 01 00 00 db c6 e0 cf f9 7f 00 00 .0+3............ Possible instruction pointers: 13 KERNELBASE.dll + 0x6c6db rsp = 0x00000032b95ffc90 rip = 0x00007ff9cfe0c6db Found by: stack scanning Stack contents: 00000032b95ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffca0 fe ff ff ff ff ff ff ff d0 fd 5f b9 32 00 00 00 .........._.2... 00000032b95ffcb0 00 00 00 00 00 00 00 00 2b c6 e0 cf f9 7f 00 00 ........+....... Possible instruction pointers: 14 KERNELBASE.dll + 0x6c62b rsp = 0x00000032b95ffcc0 rip = 0x00007ff9cfe0c62b Found by: stack scanning Stack contents: 00000032b95ffcc0 00 00 00 00 00 00 00 00 00 4a 34 33 e8 01 00 00 .........J43.... 00000032b95ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffce0 c8 63 25 23 e8 01 00 00 d0 fd 5f b9 32 00 00 00 .c%#......_.2... 00000032b95ffcf0 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 15 ucrtbase.dll + 0xfde6 rsp = 0x00000032b95ffd00 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b95ffd00 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 16 ntdll.dll + 0x25ba1 rsp = 0x00000032b95ffd10 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b95ffd10 00 00 00 00 00 00 00 00 00 00 34 33 e8 01 00 00 ..........43.... 00000032b95ffd20 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b95ffd30 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b95ffd30 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b95ffd40 d0 6b 03 33 e8 01 00 00 be 00 00 00 f9 7f 00 00 .k.3............ 00000032b95ffd50 c0 93 24 23 e8 01 00 00 d0 31 34 33 e8 01 00 00 ..$#.....143.... 00000032b95ffd60 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b95ffd70 00 00 f9 1a e8 01 00 00 e0 fd 5f b9 32 00 00 00 .........._.2... 00000032b95ffd80 e0 ad 33 33 e8 01 00 00 01 00 00 00 f9 7f 00 00 ..33............ 00000032b95ffd90 b0 9e 2b 23 e8 01 00 00 b8 07 00 00 00 00 00 00 ..+#............ 00000032b95ffda0 e0 30 2b 33 e8 01 00 00 00 4a 34 33 e8 01 00 00 .0+3.....J43.... 00000032b95ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffdc0 00 4a 34 33 e8 01 00 00 00 00 00 00 00 00 00 00 .J43............ 00000032b95ffdd0 e0 30 2b 33 e8 01 00 00 00 4a 34 33 e8 01 00 00 .0+3.....J43.... 00000032b95ffde0 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b95ffdf0 00 00 00 00 00 00 00 00 c4 53 00 00 00 00 00 00 .........S...... 00000032b95ffe00 00 00 00 00 00 00 00 00 59 07 77 0e f9 7f 00 00 ........Y.w..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x3530759 rsp = 0x00000032b95ffe10 rip = 0x00007ff90e770759 Found by: stack scanning Stack contents: 00000032b95ffe10 c4 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .S.............. 00000032b95ffe20 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b95ffe30 c4 53 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 .S......U.q..... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b95ffe40 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b95ffe40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffe50 c4 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .S.............. 00000032b95ffe60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffe70 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffe90 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 20 kernel32.dll + 0x17374 rsp = 0x00000032b95ffea0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b95ffea0 c4 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .S.............. 00000032b95ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b95ffec0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 21 ntdll.dll + 0x4cc91 rsp = 0x00000032b95ffed0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 49 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x00000000000054d4 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000000000054d4 rbp = 0x00000000ffffffff rsp = 0x00000032b96ff4c8 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x00007ff90b701bd0 r11 = 0x00000032b96fec00 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x00000000000054d4 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b96ff4c8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b96ff4d0 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b96ff4d0 00 00 f9 1a 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff4e0 a0 cb ad 12 f9 7f 00 00 ........ Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x789cba0 rsp = 0x00000032b96ff4e8 rip = 0x00007ff912adcba0 Found by: stack scanning Stack contents: 00000032b96ff4e8 b5 cb ad 12 f9 7f 00 00 ........ Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x789cbb5 rsp = 0x00000032b96ff4f0 rip = 0x00007ff912adcbb5 Found by: stack scanning Stack contents: 00000032b96ff4f0 9c 00 00 00 00 00 00 00 bd 09 65 0d f9 7f 00 00 ..........e..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x24109bd rsp = 0x00000032b96ff500 rip = 0x00007ff90d6509bd Found by: stack scanning Stack contents: 00000032b96ff500 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b96ff510 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff530 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff540 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff550 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b96ff560 10 7f 4b 33 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 ..K3......q..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b96ff570 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b96ff570 ff ff ff ff ff ff ff 7f a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 6 ntdll.dll + 0x25ba1 rsp = 0x00000032b96ff580 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b96ff580 00 00 00 00 00 00 00 00 d4 54 00 00 00 00 00 00 .........T...... 00000032b96ff590 ff ff ff ff 00 00 00 00 d0 f6 6f b9 32 00 00 00 ..........o.2... 00000032b96ff5a0 01 00 00 00 00 00 00 00 e0 7e 4b 33 e8 01 00 00 .........~K3.... 00000032b96ff5b0 10 7f 4b 33 e8 01 00 00 10 7f 4b 33 e8 01 00 00 ..K3......K3.... 00000032b96ff5c0 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b96ff5d0 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b96ff5d0 a9 3b 2d 33 e8 01 00 00 a9 3b 2d 33 e8 01 00 00 .;-3.....;-3.... 00000032b96ff5e0 00 00 00 00 00 00 00 00 a0 cb ad 12 f9 7f 00 00 ................ Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x789cba0 rsp = 0x00000032b96ff5f0 rip = 0x00007ff912adcba0 Found by: stack scanning Stack contents: 00000032b96ff5f0 b5 cb ad 12 f9 7f 00 00 ........ Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x789cbb5 rsp = 0x00000032b96ff5f8 rip = 0x00007ff912adcbb5 Found by: stack scanning Stack contents: 00000032b96ff5f8 9c 00 00 00 e8 01 00 00 bd 09 65 0d f9 7f 00 00 ..........e..... Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x24109bd rsp = 0x00000032b96ff608 rip = 0x00007ff90d6509bd Found by: stack scanning Stack contents: 00000032b96ff608 40 5b f5 44 00 00 00 00 00 00 00 00 00 00 00 00 @[.D............ 00000032b96ff618 80 3e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .>.............. 00000032b96ff628 1e 16 65 0d f9 7f 00 00 ..e..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x241161e rsp = 0x00000032b96ff630 rip = 0x00007ff90d65161e Found by: stack scanning Stack contents: 00000032b96ff630 a4 18 65 0d f9 7f 00 00 ..e..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x24118a4 rsp = 0x00000032b96ff638 rip = 0x00007ff90d6518a4 Found by: stack scanning Stack contents: 00000032b96ff638 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff648 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff658 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D............... 00000032b96ff668 a0 cb ad 12 f9 7f 00 00 ........ Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x789cba0 rsp = 0x00000032b96ff670 rip = 0x00007ff912adcba0 Found by: stack scanning Stack contents: 00000032b96ff670 b5 cb ad 12 f9 7f 00 00 ........ Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x789cbb5 rsp = 0x00000032b96ff678 rip = 0x00007ff912adcbb5 Found by: stack scanning Stack contents: 00000032b96ff678 9c 00 00 00 00 00 00 00 00 09 65 0d f9 7f 00 00 ..........e..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x2410900 rsp = 0x00000032b96ff688 rip = 0x00007ff90d650900 Found by: stack scanning Stack contents: 00000032b96ff688 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff698 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff6a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff6b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff6c8 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b96ff6d8 ea 10 7c 0e f9 7f 00 00 ..|..... Possible instruction pointers: 16 Qt6WebEngineCore.dll + 0x35810ea rsp = 0x00000032b96ff6e0 rip = 0x00007ff90e7c10ea Found by: stack scanning Stack contents: 00000032b96ff6e0 20 f8 6f b9 32 00 00 00 01 3d 77 0e f9 7f 00 00 .o.2....=w..... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b96ff6f0 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b96ff6f0 10 7f 4b 33 e8 01 00 00 10 7f 4b 33 e8 01 00 00 ..K3......K3.... 00000032b96ff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff710 03 00 00 00 00 00 00 00 84 12 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x3531284 rsp = 0x00000032b96ff720 rip = 0x00007ff90e771284 Found by: stack scanning Stack contents: 00000032b96ff720 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b96ff730 03 00 00 00 00 00 00 00 20 f8 6f b9 32 00 00 00 ........ .o.2... 00000032b96ff740 00 00 03 1b 02 00 00 00 09 f8 6f b9 32 00 00 00 ..........o.2... 00000032b96ff750 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 19 ntdll.dll + 0x2b3c7 rsp = 0x00000032b96ff760 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b96ff760 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff7e0 00 00 00 00 00 00 00 00 90 bd 2b 33 e8 01 00 00 ..........+3.... 00000032b96ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff800 c8 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b96ff810 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 20 ucrtbase.dll + 0xfde6 rsp = 0x00000032b96ff820 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b96ff820 00 00 00 00 00 00 00 00 a0 65 3e 23 e8 01 00 00 .........e>#.... 00000032b96ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff840 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b96ff850 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b96ff850 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b96ff860 50 ae 42 33 e8 01 00 00 6f 00 00 00 f9 7f 00 00 P.B3....o....... 00000032b96ff870 c0 93 24 23 e8 01 00 00 20 af 2b 33 e8 01 00 00 ..$#.... .+3.... 00000032b96ff880 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b96ff890 00 00 f9 1a e8 01 00 00 00 f9 6f b9 32 00 00 00 ..........o.2... 00000032b96ff8a0 e0 ad 33 33 e8 01 00 00 00 00 00 00 00 00 00 00 ..33............ 00000032b96ff8b0 b0 9e 2b 23 e8 01 00 00 00 00 00 00 00 00 00 00 ..+#............ 00000032b96ff8c0 e0 7e 4b 33 e8 01 00 00 90 bd 2b 33 e8 01 00 00 .~K3......+3.... 00000032b96ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff8e0 90 bd 2b 33 e8 01 00 00 00 00 00 00 00 00 00 00 ..+3............ 00000032b96ff8f0 e0 7e 4b 33 e8 01 00 00 90 bd 2b 33 e8 01 00 00 .~K3......+3.... 00000032b96ff900 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b96ff910 00 00 00 00 00 00 00 00 dc 54 00 00 00 00 00 00 .........T...... 00000032b96ff920 00 00 00 00 00 00 00 00 b9 08 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 22 Qt6WebEngineCore.dll + 0x35308b9 rsp = 0x00000032b96ff930 rip = 0x00007ff90e7708b9 Found by: stack scanning Stack contents: 00000032b96ff930 01 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .T.............. 00000032b96ff940 a0 63 25 23 e8 01 00 00 f0 e1 2c 33 e8 01 00 00 .c%#......,3.... 00000032b96ff950 dc 54 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 .T......U.q..... Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b96ff960 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b96ff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff970 dc 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .T.............. 00000032b96ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff990 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff9a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff9b0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 24 kernel32.dll + 0x17374 rsp = 0x00000032b96ff9c0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b96ff9c0 dc 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .T.............. 00000032b96ff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b96ff9e0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 25 ntdll.dll + 0x4cc91 rsp = 0x00000032b96ff9f0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 50 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x00000000000054a0 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x00000000000054a0 rbp = 0x0000000000000000 rsp = 0x00000032b97ffc58 r8 = 0x0000000000000002 r9 = 0x00000032b97ffbe0 r10 = 0x0000000000000000 r11 = 0x0000000000000246 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x00000000000054a0 r15 = 0x0000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b97ffc58 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b97ffc60 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b97ffc60 90 26 aa 2c e8 01 00 00 08 01 00 00 01 00 00 00 .&.,............ 00000032b97ffc70 00 1b 01 80 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffc90 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b97ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffcb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffcd0 00 00 00 00 00 00 00 00 78 07 aa 2c e8 01 00 00 ........x..,.... 00000032b97ffce0 78 07 aa 2c e8 01 00 00 a0 23 aa 2c e8 01 00 00 x..,.....#.,.... 00000032b97ffcf0 00 00 00 00 00 00 00 00 72 78 47 c4 f9 7f 00 00 ........rxG..... Possible instruction pointers: 2 atidxx64.dll + 0x7872 rsp = 0x00000032b97ffd00 rip = 0x00007ff9c4477872 Found by: stack scanning Stack contents: 00000032b97ffd00 60 07 aa 2c e8 01 00 00 00 00 00 00 00 00 00 00 `..,............ 00000032b97ffd10 00 00 00 00 00 00 00 00 a0 54 00 00 00 00 00 00 .........T...... 00000032b97ffd20 e0 df 3c 33 e8 01 00 00 b9 74 47 c4 f9 7f 00 00 ..<3.....tG..... Possible instruction pointers: 3 atidxx64.dll + 0x74b9 rsp = 0x00000032b97ffd30 rip = 0x00007ff9c44774b9 Found by: stack scanning Stack contents: 00000032b97ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffd50 e0 df 3c 33 e8 01 00 00 b4 bf d2 c4 f9 7f 00 00 ..<3............ Possible instruction pointers: 4 atidxx64.dll + 0x8bbfb4 rsp = 0x00000032b97ffd60 rip = 0x00007ff9c4d2bfb4 Found by: stack scanning Stack contents: 00000032b97ffd60 e0 df 3c 33 e8 01 00 00 00 00 00 00 00 00 00 00 ..<3............ 00000032b97ffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffd80 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 5 kernel32.dll + 0x17374 rsp = 0x00000032b97ffd90 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b97ffd90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffda0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b97ffdb0 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 6 ntdll.dll + 0x4cc91 rsp = 0x00000032b97ffdc0 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 51 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000005540 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000005540 rbp = 0x0000000000000000 rsp = 0x00000032b98ff758 r8 = 0x000001e8338800d0 r9 = 0x00000000c0048100 r10 = 0x0000000000001050 r11 = 0x0000000000000004 r12 = 0x0000000000000000 r13 = 0x0000000000000000 r14 = 0x0000000000005540 r15 = 0x0000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b98ff758 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b98ff760 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b98ff760 c0 4d 8f 33 e8 01 00 00 8a 33 4a c4 f9 7f 00 00 .M.3.....3J..... Possible instruction pointers: 2 atidxx64.dll + 0x3338a rsp = 0x00000032b98ff770 rip = 0x00007ff9c44a338a Found by: stack scanning Stack contents: 00000032b98ff770 00 00 00 00 00 00 00 00 00 81 ab 2c e8 01 00 00 ...........,.... 00000032b98ff780 00 00 00 00 e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff790 48 00 00 00 00 00 00 00 01 00 00 00 f9 7f 00 00 H............... 00000032b98ff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff7f0 00 00 00 00 00 00 00 00 41 d9 b9 c4 f9 7f 00 00 ........A....... Possible instruction pointers: 3 atidxx64.dll + 0x72d941 rsp = 0x00000032b98ff800 rip = 0x00007ff9c4b9d941 Found by: stack scanning Stack contents: 00000032b98ff800 c0 75 aa 2c e8 01 00 00 05 00 00 00 00 00 00 00 .u.,............ 00000032b98ff810 00 00 00 00 e8 01 00 00 40 55 00 00 00 00 00 00 ........@U...... 00000032b98ff820 c0 75 aa 2c e8 01 00 00 18 d8 b9 c4 f9 7f 00 00 .u.,............ Possible instruction pointers: 4 atidxx64.dll + 0x72d818 rsp = 0x00000032b98ff830 rip = 0x00007ff9c4b9d818 Found by: stack scanning Stack contents: 00000032b98ff830 00 00 00 00 00 00 00 00 46 00 00 00 00 00 00 00 ........F....... 00000032b98ff840 c0 75 aa 2c e8 01 00 00 00 00 00 00 00 00 00 00 .u.,............ 00000032b98ff850 c0 75 aa 2c e8 01 00 00 af da b9 c4 f9 7f 00 00 .u.,............ Possible instruction pointers: 5 atidxx64.dll + 0x72daaf rsp = 0x00000032b98ff860 rip = 0x00007ff9c4b9daaf Found by: stack scanning Stack contents: 00000032b98ff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff870 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff880 50 e8 3c 33 e8 01 00 00 39 22 b9 c4 f9 7f 00 00 P.<3....9"...... Possible instruction pointers: 6 atidxx64.dll + 0x722239 rsp = 0x00000032b98ff890 rip = 0x00007ff9c4b92239 Found by: stack scanning Stack contents: 00000032b98ff890 00 00 00 00 00 00 00 00 50 06 50 33 e8 01 00 00 ........P.P3.... 00000032b98ff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff8b0 50 e8 3c 33 e8 01 00 00 b4 bf d2 c4 f9 7f 00 00 P.<3............ Possible instruction pointers: 7 atidxx64.dll + 0x8bbfb4 rsp = 0x00000032b98ff8c0 rip = 0x00007ff9c4d2bfb4 Found by: stack scanning Stack contents: 00000032b98ff8c0 50 e8 3c 33 e8 01 00 00 00 00 00 00 00 00 00 00 P.<3............ 00000032b98ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff8e0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 8 kernel32.dll + 0x17374 rsp = 0x00000032b98ff8f0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b98ff8f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b98ff910 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 9 ntdll.dll + 0x4cc91 rsp = 0x00000032b98ff920 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 52 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000005888 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000005888 rbp = 0x00000000ffffffff rsp = 0x00000032b99ff5f8 r8 = 0x00007ff90b4ce670 r9 = 0x0000000000000040 r10 = 0x0000000000000040 r11 = 0x0000000010818000 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000005888 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b99ff5f8 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b99ff600 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b99ff600 00 00 00 00 00 00 00 00 88 f8 9f b9 32 00 00 00 ............2... 00000032b99ff610 28 47 a0 13 f9 7f 00 00 (G...... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b99ff618 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b99ff618 01 00 00 00 00 00 00 00 00 00 00 00 f9 7f 00 00 ................ 00000032b99ff628 3d f2 7a 0e f9 7f 00 00 =.z..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x356f23d rsp = 0x00000032b99ff630 rip = 0x00007ff90e7af23d Found by: stack scanning Stack contents: 00000032b99ff630 48 00 00 00 00 00 00 00 01 00 00 00 32 00 00 00 H...........2... 00000032b99ff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff650 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff660 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff670 00 00 00 00 00 00 00 00 a6 85 85 a4 45 b9 b2 c6 ............E... 00000032b99ff680 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b99ff690 70 ec 6c 34 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 p.l4......q..... Possible instruction pointers: 4 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b99ff6a0 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b99ff6a0 ff ff ff ff ff ff ff 7f bc ee 7a 0e f9 7f 00 00 ..........z..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x356eebc rsp = 0x00000032b99ff6b0 rip = 0x00007ff90e7aeebc Found by: stack scanning Stack contents: 00000032b99ff6b0 00 00 00 00 e8 01 00 00 88 58 00 00 00 00 00 00 .........X...... 00000032b99ff6c0 00 00 00 00 00 00 00 00 00 f8 9f b9 32 00 00 00 ............2... 00000032b99ff6d0 00 00 00 00 00 00 00 80 ff ff ff ff ff ff ff 7f ................ 00000032b99ff6e0 68 ec 6c 34 e8 01 00 00 ff ff ff ff ff ff ff 7f h.l4............ 00000032b99ff6f0 70 ec 6c 34 e8 01 00 00 ea f7 72 0e f9 7f 00 00 p.l4......r..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x34ef7ea rsp = 0x00000032b99ff700 rip = 0x00007ff90e72f7ea Found by: stack scanning Stack contents: 00000032b99ff700 68 ec 6c 34 e8 01 00 00 60 ec 6c 34 e8 01 00 00 h.l4....`.l4.... 00000032b99ff710 00 00 00 00 00 00 00 00 b1 e4 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x34fe4b1 rsp = 0x00000032b99ff720 rip = 0x00007ff90e73e4b1 Found by: stack scanning Stack contents: 00000032b99ff720 28 56 47 33 e8 01 00 00 01 00 00 00 00 00 00 00 (VG3............ 00000032b99ff730 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b99ff740 e8 56 47 33 e8 01 00 00 00 00 00 00 00 00 00 00 .VG3............ 00000032b99ff750 e8 56 47 33 e8 01 00 00 2a c2 73 0e f9 7f 00 00 .VG3....*.s..... Possible instruction pointers: 8 Qt6WebEngineCore.dll + 0x34fc22a rsp = 0x00000032b99ff760 rip = 0x00007ff90e73c22a Found by: stack scanning Stack contents: 00000032b99ff760 40 f8 9f b9 32 00 00 00 e8 56 47 33 e8 01 00 00 @...2....VG3.... 00000032b99ff770 00 00 00 00 00 00 00 00 82 cb 73 0e f9 7f 00 00 ..........s..... Possible instruction pointers: 9 Qt6WebEngineCore.dll + 0x34fcb82 rsp = 0x00000032b99ff780 rip = 0x00007ff90e73cb82 Found by: stack scanning Stack contents: 00000032b99ff780 01 94 75 34 e8 01 00 00 c8 f7 9f b9 32 00 00 00 ..u4........2... 00000032b99ff790 a8 f7 9f b9 32 00 00 00 08 00 00 00 00 00 00 00 ....2........... 00000032b99ff7a0 18 af da 12 f9 7f 00 00 ........ Possible instruction pointers: 10 Qt6WebEngineCore.dll + 0x7b6af18 rsp = 0x00000032b99ff7a8 rip = 0x00007ff912daaf18 Found by: stack scanning Stack contents: 00000032b99ff7a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff7b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff7c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff7d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff7e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff7f8 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f ................ 00000032b99ff808 68 ec 6c 34 e8 01 00 00 01 00 00 00 00 00 00 00 h.l4............ 00000032b99ff818 45 98 70 0e f9 7f 00 00 E.p..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x34c9845 rsp = 0x00000032b99ff820 rip = 0x00007ff90e709845 Found by: stack scanning Stack contents: 00000032b99ff820 e8 56 47 33 e8 01 00 00 60 ec 6c 34 e8 01 00 00 .VG3....`.l4.... 00000032b99ff830 68 ec 6c 34 e8 01 00 00 a0 d3 7b 34 e8 01 00 00 h.l4......{4.... 00000032b99ff840 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b99ff850 00 56 47 33 e8 01 00 00 10 58 47 33 e8 01 00 00 .VG3.....XG3.... 00000032b99ff860 90 57 47 33 e8 01 00 00 a0 d3 7b 34 e8 01 00 00 .WG3......{4.... 00000032b99ff870 ff ff ff ff ff ff ff 7f 74 f9 73 0e f9 7f 00 00 ........t.s..... Possible instruction pointers: 12 Qt6WebEngineCore.dll + 0x34ff974 rsp = 0x00000032b99ff880 rip = 0x00007ff90e73f974 Found by: stack scanning Stack contents: 00000032b99ff880 ff ff ff ff ff ff ff 7f 01 00 00 00 00 00 00 00 ................ 00000032b99ff890 f0 56 47 33 e8 01 00 00 01 00 00 00 00 00 00 00 .VG3............ 00000032b99ff8a0 00 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b99ff8b0 08 00 00 00 00 00 00 00 28 47 a0 13 f9 7f 00 00 ........(G...... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x87c4728 rsp = 0x00000032b99ff8c0 rip = 0x00007ff913a04728 Found by: stack scanning Stack contents: 00000032b99ff8c0 10 00 00 00 00 00 00 00 50 0d f9 1a e8 01 00 00 ........P....... 00000032b99ff8d0 58 f9 9f b9 32 00 00 00 e6 7c 70 0e f9 7f 00 00 X...2....|p..... Possible instruction pointers: 14 Qt6WebEngineCore.dll + 0x34c7ce6 rsp = 0x00000032b99ff8e0 rip = 0x00007ff90e707ce6 Found by: stack scanning Stack contents: 00000032b99ff8e0 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b99ff8f0 10 fb 9f b9 32 00 00 00 10 fa 9f b9 32 00 00 00 ....2.......2... 00000032b99ff900 10 fb 9f b9 32 00 00 00 85 69 76 0e f9 7f 00 00 ....2....iv..... Possible instruction pointers: 15 Qt6WebEngineCore.dll + 0x3526985 rsp = 0x00000032b99ff910 rip = 0x00007ff90e766985 Found by: stack scanning Stack contents: 00000032b99ff910 10 fb 9f b9 32 00 00 00 a0 d3 7b 34 e8 01 00 00 ....2.....{4.... 00000032b99ff920 c0 fa 9f b9 32 00 00 00 a0 63 25 23 e8 01 00 00 ....2....c%#.... 00000032b99ff930 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff940 28 57 48 34 e8 01 00 00 10 56 47 33 e8 01 00 00 (WH4.....VG3.... 00000032b99ff950 00 00 00 00 00 00 00 00 60 4a 61 34 e8 01 00 00 ........`Ja4.... 00000032b99ff960 50 f9 9f b9 32 00 00 00 01 00 00 00 00 00 00 00 P...2........... 00000032b99ff970 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ff980 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 16 ucrtbase.dll + 0xfde6 rsp = 0x00000032b99ff990 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b99ff990 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b99ff9a0 68 57 47 33 e8 01 00 00 00 00 47 33 e8 01 00 00 hWG3......G3.... 00000032b99ff9b0 01 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 17 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b99ff9c0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b99ff9c0 08 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 ........0....... 00000032b99ff9d0 10 56 47 33 e8 01 00 00 38 58 47 33 e8 01 00 00 .VG3....8XG3.... 00000032b99ff9e0 30 4b 61 34 e8 01 00 00 bb 95 4d 0b f9 7f 00 00 0Ka4......M..... Possible instruction pointers: 18 Qt6WebEngineCore.dll + 0x2995bb rsp = 0x00000032b99ff9f0 rip = 0x00007ff90b4d95bb Found by: stack scanning Stack contents: 00000032b99ff9f0 70 52 76 34 e8 01 00 00 a0 d3 7b 34 e8 01 00 00 pRv4......{4.... 00000032b99ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ffa10 a0 63 25 23 e8 01 00 00 10 fb 9f b9 32 00 00 00 .c%#........2... 00000032b99ffa20 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 19 ucrtbase.dll + 0xfde6 rsp = 0x00000032b99ffa30 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b99ffa30 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 ................ 00000032b99ffa40 70 52 76 34 e8 01 00 00 00 00 9f b9 32 00 00 00 pRv4........2... 00000032b99ffa50 a0 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b99ffa60 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b99ffa60 a0 d3 7b 34 e8 01 00 00 00 00 00 00 00 00 00 00 ..{4............ 00000032b99ffa70 a0 63 25 23 e8 01 00 00 70 52 76 34 e8 01 00 00 .c%#....pRv4.... 00000032b99ffa80 00 00 00 00 00 00 00 00 70 52 76 34 e8 01 00 00 ........pRv4.... 00000032b99ffa90 00 00 00 00 00 00 00 00 82 18 71 0e f9 7f 00 00 ..........q..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34d1882 rsp = 0x00000032b99ffaa0 rip = 0x00007ff90e711882 Found by: stack scanning Stack contents: 00000032b99ffaa0 10 fb 9f b9 32 00 00 00 0b 00 00 00 00 00 00 00 ....2........... 00000032b99ffab0 a0 63 25 23 e8 01 00 00 96 3f 76 0e f9 7f 00 00 .c%#.....?v..... Possible instruction pointers: 22 Qt6WebEngineCore.dll + 0x3523f96 rsp = 0x00000032b99ffac0 rip = 0x00007ff90e763f96 Found by: stack scanning Stack contents: 00000032b99ffac0 a0 b2 8c 12 f9 7f 00 00 ........ Possible instruction pointers: 23 Qt6WebEngineCore.dll + 0x768b2a0 rsp = 0x00000032b99ffac8 rip = 0x00007ff9128cb2a0 Found by: stack scanning Stack contents: 00000032b99ffac8 c5 7c da 12 f9 7f 00 00 .|...... Possible instruction pointers: 24 Qt6WebEngineCore.dll + 0x7b67cc5 rsp = 0x00000032b99ffad0 rip = 0x00007ff912da7cc5 Found by: stack scanning Stack contents: 00000032b99ffad0 51 01 00 00 04 d2 00 00 77 18 71 0e f9 7f 00 00 Q.......w.q..... Possible instruction pointers: 25 Qt6WebEngineCore.dll + 0x34d1877 rsp = 0x00000032b99ffae0 rip = 0x00007ff90e711877 Found by: stack scanning Stack contents: 00000032b99ffae0 00 00 00 00 00 00 00 00 95 24 71 0e f9 7f 00 00 .........$q..... Possible instruction pointers: 26 Qt6WebEngineCore.dll + 0x34d2495 rsp = 0x00000032b99ffaf0 rip = 0x00007ff90e712495 Found by: stack scanning Stack contents: 00000032b99ffaf0 30 4a 48 34 e8 01 00 00 00 00 00 00 00 00 00 00 0JH4............ 00000032b99ffb00 78 58 00 00 00 00 00 00 b1 47 15 d2 f9 7f 00 00 xX.......G...... Possible instruction pointers: 27 ntdll.dll + 0x247b1 rsp = 0x00000032b99ffb10 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b99ffb10 f0 56 47 33 e8 01 00 00 00 00 00 00 00 01 00 00 .VG3............ 00000032b99ffb20 01 00 00 00 00 00 00 00 20 57 48 34 e8 01 00 00 ........ WH4.... 00000032b99ffb30 50 4b 61 34 e8 01 00 00 10 fb 9f b9 32 00 00 00 PKa4........2... 00000032b99ffb40 4d 65 6d 6f 72 79 49 6e 66 72 61 00 f9 7f 00 00 MemoryInfra..... 00000032b99ffb50 0b 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 ................ 00000032b99ffb60 29 1a 2a 29 04 d2 00 00 00 00 00 00 00 00 00 00 ).*)............ 00000032b99ffb70 00 00 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 ........U.q..... Possible instruction pointers: 28 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b99ffb80 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b99ffb80 00 00 00 00 00 00 00 00 78 58 00 00 00 00 00 00 ........xX...... 00000032b99ffb90 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b99ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ffbb0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ffbd0 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 29 kernel32.dll + 0x17374 rsp = 0x00000032b99ffbe0 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b99ffbe0 78 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 xX.............. 00000032b99ffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b99ffc00 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 30 ntdll.dll + 0x4cc91 rsp = 0x00000032b99ffc10 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 53 0 ntdll.dll + 0x9d5e4 rax = 0x0000000000000004 rdx = 0x0000000000000000 rcx = 0x0000000000005880 rbx = 0x0000000000000000 rsi = 0x0000000000000000 rdi = 0x0000000000005880 rbp = 0x00000000ffffffff rsp = 0x00000032b9aff528 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x20c49ba5e353f7cf r13 = 0x0000000000000000 r14 = 0x0000000000005880 r15 = 0x8000000000000000 rip = 0x00007ff9d21cd5e4 Found by: given as instruction pointer in context Stack contents: 00000032b9aff528 0e 92 dc cf f9 7f 00 00 ........ Possible instruction pointers: 1 KERNELBASE.dll + 0x2920e rsp = 0x00000032b9aff530 rip = 0x00007ff9cfdc920e Found by: stack scanning Stack contents: 00000032b9aff530 00 00 f9 1a 02 00 00 00 06 00 00 00 00 00 00 00 ................ 00000032b9aff540 f0 4d 76 34 e8 01 00 00 2f 00 00 00 00 00 00 00 .Mv4..../....... 00000032b9aff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff560 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 H............... 00000032b9aff570 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff5a0 00 00 00 00 00 00 00 00 6f bc 0b 12 f9 7f 00 00 ........o....... Possible instruction pointers: 2 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b9aff5b0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b9aff5b0 ff ff ff ff ff ff ff 7f ff ff ff ff ff ff ff 7f ................ 00000032b9aff5c0 20 4e 76 34 e8 01 00 00 e6 c2 71 0e f9 7f 00 00 Nv4......q..... Possible instruction pointers: 3 Qt6WebEngineCore.dll + 0x34dc2e6 rsp = 0x00000032b9aff5d0 rip = 0x00007ff90e71c2e6 Found by: stack scanning Stack contents: 00000032b9aff5d0 ff ff ff ff ff ff ff 7f a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 4 ntdll.dll + 0x25ba1 rsp = 0x00000032b9aff5e0 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b9aff5e0 00 00 00 00 00 00 00 00 80 58 00 00 00 00 00 00 .........X...... 00000032b9aff5f0 00 00 00 00 00 00 00 00 30 f7 af b9 32 00 00 00 ........0...2... 00000032b9aff600 f0 4d 76 34 e8 01 00 00 f0 4d 76 34 e8 01 00 00 .Mv4.....Mv4.... 00000032b9aff610 20 4e 76 34 e8 01 00 00 20 4e 76 34 e8 01 00 00 Nv4.... Nv4.... 00000032b9aff620 ff ff ff ff ff ff ff 7f e6 f0 72 0e f9 7f 00 00 ..........r..... Possible instruction pointers: 5 Qt6WebEngineCore.dll + 0x34ef0e6 rsp = 0x00000032b9aff630 rip = 0x00007ff90e72f0e6 Found by: stack scanning Stack contents: 00000032b9aff630 1f f1 73 34 e8 01 00 00 1f f1 73 34 e8 01 00 00 ..s4......s4.... 00000032b9aff640 00 00 f9 1a e8 01 00 00 48 00 00 00 00 00 00 00 ........H....... 00000032b9aff650 90 c0 71 0e f9 7f 00 00 ..q..... Possible instruction pointers: 6 Qt6WebEngineCore.dll + 0x34dc090 rsp = 0x00000032b9aff658 rip = 0x00007ff90e71c090 Found by: stack scanning Stack contents: 00000032b9aff658 00 00 7b 34 e8 01 00 00 00 00 00 00 00 00 00 00 ..{4............ 00000032b9aff668 db 1d 7c 0e f9 7f 00 00 ..|..... Possible instruction pointers: 7 Qt6WebEngineCore.dll + 0x3581ddb rsp = 0x00000032b9aff670 rip = 0x00007ff90e7c1ddb Found by: stack scanning Stack contents: 00000032b9aff670 f0 4d 76 34 e8 01 00 00 f0 4d 76 34 e8 01 00 00 .Mv4.....Mv4.... 00000032b9aff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff690 e0 7f 1b 34 e8 01 00 00 b1 47 15 d2 f9 7f 00 00 ...4.....G...... Possible instruction pointers: 8 ntdll.dll + 0x247b1 rsp = 0x00000032b9aff6a0 rip = 0x00007ff9d21547b1 Found by: stack scanning Stack contents: 00000032b9aff6a0 f9 16 1a 29 04 d2 00 00 00 00 03 1b e8 01 00 00 ...)............ 00000032b9aff6b0 80 f8 af b9 32 00 00 00 00 00 00 00 00 00 00 00 ....2........... 00000032b9aff6c0 00 00 00 00 00 00 00 00 a7 33 e1 cf f9 7f 00 00 .........3...... Possible instruction pointers: 9 KERNELBASE.dll + 0x733a7 rsp = 0x00000032b9aff6d0 rip = 0x00007ff9cfe133a7 Found by: stack scanning Stack contents: 00000032b9aff6d0 00 00 00 00 00 00 00 00 5b f0 7e cf f9 7f 00 00 ........[.~..... Possible instruction pointers: 10 ucrtbase.dll + 0xf05b rsp = 0x00000032b9aff6e0 rip = 0x00007ff9cf7ef05b Found by: stack scanning Stack contents: 00000032b9aff6e0 00 4a bd 23 e8 01 00 00 00 00 00 00 00 00 00 00 .J.#............ 00000032b9aff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff730 f0 f0 73 34 e8 01 00 00 2f 00 00 00 00 00 00 00 ..s4..../....... 00000032b9aff740 80 f8 af b9 32 00 00 00 01 3d 77 0e f9 7f 00 00 ....2....=w..... Possible instruction pointers: 11 Qt6WebEngineCore.dll + 0x3533d01 rsp = 0x00000032b9aff750 rip = 0x00007ff90e773d01 Found by: stack scanning Stack contents: 00000032b9aff750 20 4e 76 34 e8 01 00 00 20 4e 76 34 e8 01 00 00 Nv4.... Nv4.... 00000032b9aff760 00 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 12 ntdll.dll + 0x2b3c7 rsp = 0x00000032b9aff770 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b9aff770 54 58 00 00 00 00 00 00 e4 0f 77 0e f9 7f 00 00 TX........w..... Possible instruction pointers: 13 Qt6WebEngineCore.dll + 0x3530fe4 rsp = 0x00000032b9aff780 rip = 0x00007ff90e770fe4 Found by: stack scanning Stack contents: 00000032b9aff780 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00 ................ 00000032b9aff790 54 58 00 00 00 00 00 00 10 00 00 00 00 00 00 00 TX.............. 00000032b9aff7a0 00 00 03 1b 02 00 00 00 69 f8 af b9 32 00 00 00 ........i...2... 00000032b9aff7b0 04 00 00 00 00 00 00 00 c7 b3 15 d2 f9 7f 00 00 ................ Possible instruction pointers: 14 ntdll.dll + 0x2b3c7 rsp = 0x00000032b9aff7c0 rip = 0x00007ff9d215b3c7 Found by: stack scanning Stack contents: 00000032b9aff7c0 00 00 f9 1a e8 01 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff7d0 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... 00000032b9aff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff7f0 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff800 f0 4d 76 34 e8 01 00 00 db c6 e0 cf f9 7f 00 00 .Mv4............ Possible instruction pointers: 15 KERNELBASE.dll + 0x6c6db rsp = 0x00000032b9aff810 rip = 0x00007ff9cfe0c6db Found by: stack scanning Stack contents: 00000032b9aff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff820 fe ff ff ff ff ff ff ff 50 f9 af b9 32 00 00 00 ........P...2... 00000032b9aff830 00 00 00 00 00 00 00 00 2b c6 e0 cf f9 7f 00 00 ........+....... Possible instruction pointers: 16 KERNELBASE.dll + 0x6c62b rsp = 0x00000032b9aff840 rip = 0x00007ff9cfe0c62b Found by: stack scanning Stack contents: 00000032b9aff840 00 00 00 00 00 00 00 00 60 d1 7b 34 e8 01 00 00 ........`.{4.... 00000032b9aff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff860 c8 63 25 23 e8 01 00 00 50 f9 af b9 32 00 00 00 .c%#....P...2... 00000032b9aff870 00 00 00 00 00 00 00 00 e6 fd 7e cf f9 7f 00 00 ..........~..... Possible instruction pointers: 17 ucrtbase.dll + 0xfde6 rsp = 0x00000032b9aff880 rip = 0x00007ff9cf7efde6 Found by: stack scanning Stack contents: 00000032b9aff880 00 00 00 00 00 00 00 00 a1 5b 15 d2 f9 7f 00 00 .........[...... Possible instruction pointers: 18 ntdll.dll + 0x25ba1 rsp = 0x00000032b9aff890 rip = 0x00007ff9d2155ba1 Found by: stack scanning Stack contents: 00000032b9aff890 00 00 00 00 00 00 00 00 00 00 7b 34 e8 01 00 00 ..........{4.... 00000032b9aff8a0 c8 63 25 23 e8 01 00 00 6f bc 0b 12 f9 7f 00 00 .c%#....o....... Possible instruction pointers: 19 Qt6WebEngineCore.dll + 0x6e7bc6f rsp = 0x00000032b9aff8b0 rip = 0x00007ff9120bbc6f Found by: stack scanning Stack contents: 00000032b9aff8b0 30 00 00 00 00 00 00 00 00 8e 24 23 e8 01 00 00 0.........$#.... 00000032b9aff8c0 20 ca 67 34 e8 01 00 00 4b 00 00 00 f9 7f 00 00 .g4....K....... 00000032b9aff8d0 c0 93 24 23 e8 01 00 00 a0 c7 7b 34 e8 01 00 00 ..$#......{4.... 00000032b9aff8e0 c0 93 24 23 e8 01 00 00 c8 63 25 23 e8 01 00 00 ..$#.....c%#.... 00000032b9aff8f0 00 00 f9 1a e8 01 00 00 60 f9 af b9 32 00 00 00 ........`...2... 00000032b9aff900 e0 68 54 33 e8 01 00 00 01 00 00 00 f9 7f 00 00 .hT3............ 00000032b9aff910 b0 9e 2b 23 e8 01 00 00 e0 12 00 00 00 00 00 00 ..+#............ 00000032b9aff920 f0 4d 76 34 e8 01 00 00 60 d1 7b 34 e8 01 00 00 .Mv4....`.{4.... 00000032b9aff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff940 60 d1 7b 34 e8 01 00 00 00 00 00 00 00 00 00 00 `.{4............ 00000032b9aff950 f0 4d 76 34 e8 01 00 00 60 d1 7b 34 e8 01 00 00 .Mv4....`.{4.... 00000032b9aff960 00 00 00 00 00 00 00 00 a0 63 25 23 e8 01 00 00 .........c%#.... 00000032b9aff970 00 00 00 00 00 00 00 00 54 58 00 00 00 00 00 00 ........TX...... 00000032b9aff980 00 00 00 00 00 00 00 00 99 07 77 0e f9 7f 00 00 ..........w..... Possible instruction pointers: 20 Qt6WebEngineCore.dll + 0x3530799 rsp = 0x00000032b9aff990 rip = 0x00007ff90e770799 Found by: stack scanning Stack contents: 00000032b9aff990 54 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 TX.............. 00000032b9aff9a0 a0 63 25 23 e8 01 00 00 00 00 00 00 00 00 00 00 .c%#............ 00000032b9aff9b0 54 58 00 00 00 00 00 00 55 c1 71 0e f9 7f 00 00 TX......U.q..... Possible instruction pointers: 21 Qt6WebEngineCore.dll + 0x34dc155 rsp = 0x00000032b9aff9c0 rip = 0x00007ff90e71c155 Found by: stack scanning Stack contents: 00000032b9aff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff9d0 54 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 TX.............. 00000032b9aff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9aff9f0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9affa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9affa10 00 00 00 00 00 00 00 00 74 73 03 d2 f9 7f 00 00 ........ts...... Possible instruction pointers: 22 kernel32.dll + 0x17374 rsp = 0x00000032b9affa20 rip = 0x00007ff9d2037374 Found by: stack scanning Stack contents: 00000032b9affa20 54 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 TX.............. 00000032b9affa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9affa40 00 00 00 00 00 00 00 00 91 cc 17 d2 f9 7f 00 00 ................ Possible instruction pointers: 23 ntdll.dll + 0x4cc91 rsp = 0x00000032b9affa50 rip = 0x00007ff9d217cc91 Found by: stack scanning Thread 54 0 ntdll.dll + 0x9e0b4 rax = 0x000000000000005b rdx = 0x000001e83475a750 rcx = 0x0000000000000002 rbx = 0x0000000000000002 rsi = 0x0000000000000000 rdi = 0x0000000000000002 rbp = 0x00000032b9bffdf0 rsp = 0x00000032b9bffa48 r8 = 0x0000000000000000 r9 = 0x0000000000000000 r10 = 0x0000000000000000 r11 = 0x0000000000000000 r12 = 0x00000000ffffffff r13 = 0x000001e83475a750 r14 = 0x0000000000000000 r15 = 0x0000000000000000 rip = 0x00007ff9d21ce0b4 Found by: given as instruction pointer in context Stack contents: 00000032b9bffa48 30 40 e0 cf f9 7f 00 00 0@...... Possible instruction pointers: 1 KERNELBASE.dll + 0x64030 rbp = 0x00000032b9bffdf0 rsp = 0x00000032b9bffa50 rip = 0x00007ff9cfe04030 Found by: stack scanning Stack contents: 00000032b9bffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000032b9bffa60 20 4f ae 69 f9 7f 00 00 O.i.... Possible instruction pointers: 2 Qt6Core.dll + 0x234f20 rbp = 0x00000032b9bffdf0 rsp = 0x00000032b9bffa68 rip = 0x00007ff969ae4f20 Found by: stack scanning Loaded modules: 0x7ff635c60000 - 0x7ff636486fff goldendict.exe ??? (main) 0x7ff90b240000 - 0x7ff914334fff Qt6WebEngineCore.dll 6.7.2.0 (WARNING: No symbols, Qt6WebEngineCore.pdb, 49CE690F2081410E985EC558393C809F1) 0x7ff9497d0000 - 0x7ff94987ffff comctl32.dll 5.82.19041.4355 0x7ff960d00000 - 0x7ff961e91fff avcodec-60.dll 60.31.102.0 0x7ff962da0000 - 0x7ff962dbdfff msacm32.dll 6.2.19041.1 0x7ff963190000 - 0x7ff963198fff ksuser.dll 6.2.19041.1 0x7ff9631a0000 - 0x7ff96362dfff mfcore.dll 6.2.19041.4648 0x7ff963f40000 - 0x7ff965061fff avutil-58.dll 58.29.100.0 0x7ff966890000 - 0x7ff966d12fff libcrypto-3-x64.dll 3.3.1.0 (WARNING: No symbols, libcrypto-3-x64.pdb, ED826E4C09174336868157A9DBC558E81) 0x7ff966d20000 - 0x7ff967201fff Qt6Qml.dll 6.7.2.0 0x7ff967a50000 - 0x7ff967b1cfff libssl-3-x64.DLL 3.3.1.0 0x7ff967c50000 - 0x7ff967c91fff qschannelbackend.dll 6.7.2.0 0x7ff967ca0000 - 0x7ff967cf0fff qopensslbackend.dll 6.7.2.0 0x7ff967d00000 - 0x7ff967f61fff avformat-60.dll 60.16.100.0 0x7ff9680c0000 - 0x7ff968177fff swscale-7.dll 7.5.100.0 0x7ff968180000 - 0x7ff9681f5fff ffmpegmediaplugin.dll 6.7.2.0 0x7ff968200000 - 0x7ff968288fff qwebp.dll 6.7.2.0 0x7ff968290000 - 0x7ff9682fbfff qtiff.dll 6.7.2.0 0x7ff968300000 - 0x7ff96838bfff qjpeg.dll 6.7.2.0 0x7ff968390000 - 0x7ff968473fff qwindows.dll 6.7.2.0 0x7ff9684d0000 - 0x7ff9686b1fff Qt6OpenGL.dll 6.7.2.0 0x7ff9686c0000 - 0x7ff968774fff Qt6QmlModels.dll 6.7.2.0 0x7ff968780000 - 0x7ff968d03fff Qt6Quick.dll 6.7.2.0 0x7ff968d10000 - 0x7ff968ed5fff xapian-30.dll ??? (WARNING: No symbols, xapian-30.pdb, 99DDC72A59484348B2FB969EF16E8F211) 0x7ff968ee0000 - 0x7ff968feafff iconv-2.dll 1.17.0.0 0x7ff968ff0000 - 0x7ff9698a1fff Qt6Gui.dll 6.7.2.0 (WARNING: No symbols, Qt6Gui.pdb, 0AACAD8031F94D14B683E383A76F72381) 0x7ff9698b0000 - 0x7ff969ecffff Qt6Core.dll 6.7.2.0 (WARNING: No symbols, Qt6Core.pdb, 80FA453D1D954395A6DD8A62DBDDDC071) 0x7ff969ed0000 - 0x7ff96a516fff Qt6Widgets.dll 6.7.2.0 0x7ff96a730000 - 0x7ff96a7e3fff vorbis.dll ??? 0x7ff96a7f0000 - 0x7ff96a99bfff Qt6Network.dll 6.7.2.0 0x7ff96e8d0000 - 0x7ff96e995fff hunspell-1.7-0.dll ??? 0x7ff96ed50000 - 0x7ff96ed8dfff swresample-4.dll 4.12.100.0 0x7ff96ed90000 - 0x7ff96ee63fff Qt6Multimedia.dll 6.7.2.0 0x7ff96f0e0000 - 0x7ff96f183fff zstd.dll 1.5.6.0 0x7ff96f780000 - 0x7ff96f7fcfff Qt6Svg.dll 6.7.2.0 0x7ff96fbc0000 - 0x7ff96fc00fff MSVCP140_2.dll 14.40.33810.0 0x7ff9707e0000 - 0x7ff9708b6fff Qt6Core5Compat.dll 6.7.2.0 0x7ff978d20000 - 0x7ff978d58fff atig6txx.dll 26.20.12028.2 0x7ff978d60000 - 0x7ff97bdb4fff atio6axx.dll 26.20.12028.2 0x7ff97bdc0000 - 0x7ff97bde7fff atig6pxx.dll 26.20.12028.2 0x7ff97c1b0000 - 0x7ff97c1e0fff qmodernwindowsstyle.dll 6.7.2.0 0x7ff97c1f0000 - 0x7ff97c2f9fff MFReadWrite.dll 6.2.19041.3636 0x7ff97e220000 - 0x7ff97e3c7fff atiadlxx.dll 26.20.12028.2 0x7ff97e430000 - 0x7ff97e45bfff glu32.dll 6.2.19041.3636 0x7ff97e490000 - 0x7ff97e5b7fff opengl32.dll 6.2.19041.4597 0x7ff986b10000 - 0x7ff986b8ffff Qt6Positioning.dll 6.7.2.0 0x7ff98a120000 - 0x7ff98a128fff MSVCP140_1.dll 14.40.33810.0 0x7ff993310000 - 0x7ff99331bfff VCRUNTIME140_1.dll 14.40.33810.0 0x7ff993320000 - 0x7ff99333dfff VCRUNTIME140.dll 14.40.33810.0 0x7ff993340000 - 0x7ff9933ccfff msvcp140.dll 14.40.33810.0 0x7ff993400000 - 0x7ff993423fff dxva2.dll 6.2.19041.1 0x7ff993430000 - 0x7ff9934b4fff mf.dll 6.2.19041.4597 0x7ff99ced0000 - 0x7ff99d09ffff d3d9.dll 6.2.19041.4597 0x7ff99dbf0000 - 0x7ff99dc14fff D3D12.dll 6.2.19041.4355 0x7ff9a3340000 - 0x7ff9a3395fff opencc.dll ??? 0x7ff9a33a0000 - 0x7ff9a33eefff zim-9.dll ??? 0x7ff9a3c20000 - 0x7ff9a3c3afff qcertonlybackend.dll 6.7.2.0 0x7ff9a3ca0000 - 0x7ff9a3cb2fff qsvgicon.dll 6.7.2.0 0x7ff9a3cc0000 - 0x7ff9a3d22fff Qt6PrintSupport.dll 6.7.2.0 (WARNING: No symbols, Qt6PrintSupport.pdb, 32300C93439D416EA4685721F62A74ED1) 0x7ff9a40c0000 - 0x7ff9a40ddfff Qt6QuickWidgets.dll 6.7.2.0 0x7ff9a42a0000 - 0x7ff9a42e3fff eb.dll ??? 0x7ff9a4600000 - 0x7ff9a4620fff lzo2.dll ??? 0x7ff9a8530000 - 0x7ff9a853bfff qwbmp.dll 6.7.2.0 0x7ff9a8540000 - 0x7ff9a857dfff Qt6WebChannel.dll 6.7.2.0 0x7ff9aa160000 - 0x7ff9aa1a5fff bthprops.cpl 6.2.19041.4355 0x7ff9aca00000 - 0x7ff9acbbbfff mfplat.dll 6.2.19041.4597 0x7ff9aec20000 - 0x7ff9aec2bfff qtga.dll 6.7.2.0 0x7ff9aed70000 - 0x7ff9aed7bfff qsvg.dll 6.7.2.0 0x7ff9aed80000 - 0x7ff9aedb1fff liblzma.dll 5.6.2.0 0x7ff9af060000 - 0x7ff9af079fff zlib1.dll 1.3.1.0 (WARNING: No symbols, zlib.pdb, 846169196DB845D8A05A444CC9B4D56D1) 0x7ff9b6070000 - 0x7ff9b6088fff netapi32.dll 6.2.19041.3636 0x7ff9b8360000 - 0x7ff9b8377fff bz2.dll ??? 0x7ff9b87c0000 - 0x7ff9b8812fff pdh.dll 6.2.19041.4648 0x7ff9ba0e0000 - 0x7ff9ba805fff Windows.Media.dll 6.2.19041.4355 0x7ff9ba8f0000 - 0x7ff9ba8fdfff qico.dll 6.7.2.0 0x7ff9ba900000 - 0x7ff9ba926fff Qt6Xml.dll 6.7.2.0 (WARNING: No symbols, Qt6Xml.pdb, 477A33668CDD4BE5BEBE7D22C33545331) 0x7ff9ba950000 - 0x7ff9ba97dfff Qt6WebEngineWidgets.dll 6.7.2.0 0x7ff9baa00000 - 0x7ff9baa0bfff secur32.dll 6.2.19041.3636 0x7ff9baa10000 - 0x7ff9baa1ffff qicns.dll 6.7.2.0 0x7ff9bb400000 - 0x7ff9bb40dfff qgif.dll 6.7.2.0 0x7ff9bb8f0000 - 0x7ff9bb92dfff dataexchange.dll 6.2.19041.4355 0x7ff9bbb60000 - 0x7ff9bbb6bfff winusb.dll 6.2.19041.1 0x7ff9bd4a0000 - 0x7ff9bd71efff DWrite.dll 6.2.19041.4355 (WARNING: No symbols, DWrite.pdb, 819BEB088A55495A827D925FF8D128941) 0x7ff9bd8e0000 - 0x7ff9bda17fff Windows.UI.Immersive.dll 6.2.19041.4355 0x7ff9bdab0000 - 0x7ff9bdd49fff comctl32.dll 6.10.19041.4355 0x7ff9bf200000 - 0x7ff9bf235fff RTWorkQ.dll 6.2.19041.4355 0x7ff9bf3e0000 - 0x7ff9bf3ecfff ogg.dll ??? 0x7ff9c0410000 - 0x7ff9c0561fff InputHost.dll 6.2.19041.4355 0x7ff9c0570000 - 0x7ff9c0668fff TextInputFramework.dll 6.2.19041.4651 0x7ff9c0670000 - 0x7ff9c07aefff Windows.UI.dll 6.2.19041.4355 0x7ff9c0b40000 - 0x7ff9c0b4cfff vorbisfile.dll ??? 0x7ff9c1500000 - 0x7ff9c1525fff winmmbase.dll 6.2.19041.1 0x7ff9c1700000 - 0x7ff9c17a3fff winspool.drv 6.2.19041.4597 0x7ff9c4310000 - 0x7ff9c432cfff mpr.dll 6.2.19041.3636 0x7ff9c4330000 - 0x7ff9c435afff D3DSCache.dll 6.2.19041.4355 0x7ff9c4360000 - 0x7ff9c438afff amdihk64.dll 1.0.0.0 0x7ff9c4470000 - 0x7ff9c556efff atidxx64.dll 26.20.12028.2 (WARNING: No symbols, atidxx64.pdb, DCE6CE83AB024058BD2BA57204AAE3481) 0x7ff9c5570000 - 0x7ff9c55a4fff atiuxp64.dll 26.20.12028.2 0x7ff9c55b0000 - 0x7ff9c55d6fff winmm.dll 6.2.19041.3636 (WARNING: No symbols, winmm.pdb, 8D40E7A52F1C62DF7F80732B0CD76AD81) 0x7ff9c55e0000 - 0x7ff9c57bcfff aticfx64.dll 26.20.12028.2 0x7ff9c5850000 - 0x7ff9c588afff DXCore.dll 6.2.19041.4474 0x7ff9c62b0000 - 0x7ff9c62e3fff dbgcore.dll 6.2.19041.4355 (WARNING: No symbols, dbgcore.pdb, 6A072AD6B41EC0723DC8D38FDB3BAE921) 0x7ff9c62f0000 - 0x7ff9c64d3fff dbghelp.dll 6.2.19041.3636 0x7ff9c65d0000 - 0x7ff9c688dfff iertutil.dll 11.0.19041.4648 0x7ff9c6890000 - 0x7ff9c68b7fff srvcli.dll 6.2.19041.3636 0x7ff9c68c0000 - 0x7ff9c6aabfff urlmon.dll 11.0.19041.4597 0x7ff9c7eb0000 - 0x7ff9c7ec0fff ColorAdapterClient.dll 6.2.19041.4648 0x7ff9c7f30000 - 0x7ff9c7fddfff mscms.dll 6.2.19041.4648 0x7ff9c83a0000 - 0x7ff9c85a2fff twinapi.appcore.dll 6.2.19041.4597 0x7ff9c8610000 - 0x7ff9c86b0fff WindowManagementAPI.dll ??? 0x7ff9c86c0000 - 0x7ff9c86c9fff rasadhlp.dll 6.2.19041.3636 0x7ff9c86f0000 - 0x7ff9c8774fff MMDevAPI.dll 6.2.19041.4355 0x7ff9c8840000 - 0x7ff9c89c0fff AudioSes.dll 6.2.19041.4355 0x7ff9c8ca0000 - 0x7ff9c8ca9fff avrt.dll 6.2.19041.3636 0x7ff9c9fd0000 - 0x7ff9ca42cfff D3DCompiler_47.DLL 6.2.19041.3636 0x7ff9ca9f0000 - 0x7ff9cac52fff d3d11.dll 6.2.19041.4355 0x7ff9cadb0000 - 0x7ff9caf06fff WinTypes.dll 6.2.19041.4355 0x7ff9caf10000 - 0x7ff9cb0f3fff dcomp.dll 6.2.19041.4597 0x7ff9cb480000 - 0x7ff9cb7dafff CoreUIComponents.dll 6.2.19041.3636 0x7ff9cb8e0000 - 0x7ff9cb9d1fff CoreMessaging.dll 6.2.19041.4355 0x7ff9cbcb0000 - 0x7ff9cbd43fff apphelp.dll 6.2.19041.4597 (WARNING: No symbols, apphelp.pdb, 4EB80FF62031340C1B77E242EAB9A83B1) 0x7ff9cbd50000 - 0x7ff9cbe45fff propsys.dll 7.0.19041.4597 0x7ff9cbf30000 - 0x7ff9cbf4cfff dhcpcsvc.dll 6.2.19041.3636 0x7ff9cbf70000 - 0x7ff9cbf83fff wtsapi32.dll 6.2.19041.3636 0x7ff9cc060000 - 0x7ff9cc076fff dhcpcsvc6.DLL 6.2.19041.3636 0x7ff9cc1c0000 - 0x7ff9cc2c2fff AppXDeploymentClient.dll 6.2.19041.4597 0x7ff9cc5d0000 - 0x7ff9cc5ecfff nlaapi.dll 6.2.19041.4123 0x7ff9cc640000 - 0x7ff9cc64afff midimap.dll 6.2.19041.3636 0x7ff9cc650000 - 0x7ff9cc65cfff msacm32.drv 6.2.19041.3636 0x7ff9cc660000 - 0x7ff9cc6a5fff wdmaud.drv 6.2.19041.4355 0x7ff9cc740000 - 0x7ff9cc849fff winhttp.dll 6.2.19041.4355 0x7ff9cc9f0000 - 0x7ff9cc9f9fff version.dll 6.2.19041.3636 0x7ff9cd100000 - 0x7ff9cd19dfff uxtheme.dll 6.2.19041.4529 0x7ff9cd290000 - 0x7ff9cd2a3fff resourcepolicyclient.dll 6.2.19041.4355 0x7ff9cd390000 - 0x7ff9cd3befff dwmapi.dll 6.2.19041.4355 0x7ff9cd680000 - 0x7ff9cd691fff kernel.appcore.dll 6.2.19041.3758 0x7ff9cd880000 - 0x7ff9ce01dfff windows.storage.dll 6.2.19041.4648 (WARNING: No symbols, Windows.Storage.pdb, B492B975B133BCD8F3DBB38A59842CA91) 0x7ff9ce020000 - 0x7ff9ce02cfff hid.dll 6.2.19041.3636 0x7ff9ce030000 - 0x7ff9ce052fff gpapi.dll 6.2.19041.4355 0x7ff9ce060000 - 0x7ff9ce154fff dxgi.dll 6.2.19041.4597 0x7ff9ce490000 - 0x7ff9ce4eafff winsta.dll 6.2.19041.3636 0x7ff9ce530000 - 0x7ff9ce57efff authz.dll 6.2.19041.3996 0x7ff9ce810000 - 0x7ff9ce843fff rsaenh.dll 6.2.19041.3636 0x7ff9ce950000 - 0x7ff9ce982fff ntmarta.dll 6.2.19041.3636 0x7ff9cebd0000 - 0x7ff9cebe1fff umpdc.dll ??? 0x7ff9cebf0000 - 0x7ff9cec2afff IPHLPAPI.DLL 6.2.19041.3636 0x7ff9cec30000 - 0x7ff9cec3bfff netutils.dll 6.2.19041.3636 0x7ff9cec40000 - 0x7ff9ced09fff dnsapi.dll 6.2.19041.4474 (WARNING: No symbols, dnsapi.pdb, 88005B40A97C55EFCC6FEEA740CC81E51) 0x7ff9ced60000 - 0x7ff9cedaafff powrprof.dll 6.2.19041.3636 0x7ff9cef60000 - 0x7ff9cefc9fff mswsock.dll 6.2.19041.3636 0x7ff9cf150000 - 0x7ff9cf15bfff CRYPTBASE.DLL 6.2.19041.3636 0x7ff9cf160000 - 0x7ff9cf177fff cryptsp.dll 6.2.19041.3636 0x7ff9cf200000 - 0x7ff9cf22dfff wldp.dll 6.2.19041.4597 0x7ff9cf230000 - 0x7ff9cf26afff ntasn1.dll 6.2.19041.3636 0x7ff9cf270000 - 0x7ff9cf298fff ncrypt.dll 6.2.19041.4412 0x7ff9cf390000 - 0x7ff9cf3a1fff msasn1.dll 6.2.19041.3636 0x7ff9cf560000 - 0x7ff9cf592fff devobj.dll 6.2.19041.4355 0x7ff9cf680000 - 0x7ff9cf6b1fff sspicli.dll 6.2.19041.4239 0x7ff9cf6c0000 - 0x7ff9cf6edfff userenv.dll 6.2.19041.4355 0x7ff9cf710000 - 0x7ff9cf733fff profapi.dll 6.2.19041.4355 0x7ff9cf7e0000 - 0x7ff9cf8dffff ucrtbase.dll 6.2.19041.3636 (WARNING: No symbols, ucrtbase.pdb, 5C4F64BF99F5FDEC7295CAB05A30010D1) 0x7ff9cf8e0000 - 0x7ff9cf97cfff msvcp_win.dll 6.2.19041.3636 0x7ff9cf980000 - 0x7ff9cf9a6fff bcrypt.dll 6.2.19041.3636 0x7ff9cf9b0000 - 0x7ff9cf9fdfff cfgmgr32.dll 6.2.19041.3996 0x7ff9cfa00000 - 0x7ff9cfb16fff gdi32full.dll 6.2.19041.4474 0x7ff9cfb20000 - 0x7ff9cfb88fff wintrust.dll 6.2.19041.4597 0x7ff9cfc40000 - 0x7ff9cfd9dfff crypt32.dll 6.2.19041.4597 0x7ff9cfda0000 - 0x7ff9d0095fff KERNELBASE.dll 6.2.19041.4648 (WARNING: No symbols, kernelbase.pdb, FD00366E659CCAC64FA32290CA0C38AA1) 0x7ff9d00a0000 - 0x7ff9d0121fff bcryptPrimitives.dll 6.2.19041.3636 0x7ff9d0130000 - 0x7ff9d0151fff win32u.dll 6.2.19041.4648 (WARNING: No symbols, win32u.pdb, 81FA8AA54C62B940172A87110CE2238A1) 0x7ff9d01e0000 - 0x7ff9d027dfff msvcrt.dll 7.0.19041.3636 0x7ff9d0280000 - 0x7ff9d0393fff msctf.dll 6.2.19041.4597 (WARNING: No symbols, msctf.pdb, AEB43A8194CEF45010F716CEC85410F41) 0x7ff9d0460000 - 0x7ff9d04b4fff shlwapi.dll 6.2.19041.4355 0x7ff9d04c0000 - 0x7ff9d05e2fff rpcrt4.dll 6.2.19041.4597 (WARNING: No symbols, rpcrt4.pdb, 2DBFD9784C0C5801E00B9ED7344C98641) 0x7ff9d0650000 - 0x7ff9d0dbbfff shell32.dll 6.2.19041.4648 (WARNING: No symbols, shell32.pdb, ABBFE137589A2D177F733DFB4D120DAC1) 0x7ff9d0dc0000 - 0x7ff9d0e5ffff sechost.dll 6.2.19041.4597 0x7ff9d0e60000 - 0x7ff9d0f0cfff SHCore.dll 6.2.19041.4522 0x7ff9d0f10000 - 0x7ff9d137dfff setupapi.dll 6.2.19041.4355 0x7ff9d15c0000 - 0x7ff9d1699fff comdlg32.dll 6.2.19041.4355 0x7ff9d16a0000 - 0x7ff9d16cafff gdi32.dll 6.2.19041.4474 0x7ff9d16d0000 - 0x7ff9d177ffff advapi32.dll 6.2.19041.4597 0x7ff9d1780000 - 0x7ff9d17eafff ws2_32.dll 6.2.19041.3636 0x7ff9d1820000 - 0x7ff9d19befff user32.dll 6.2.19041.4474 (WARNING: No symbols, user32.pdb, 6A873A25D8694F8ABBCFAC114793DAAE1) 0x7ff9d19c0000 - 0x7ff9d19c7fff nsi.dll 6.2.19041.3636 0x7ff9d19d0000 - 0x7ff9d1d22fff combase.dll 6.2.19041.4355 (WARNING: No symbols, combase.pdb, 6C146F310D333559974D1D5D3FA2E4DA1) 0x7ff9d1d30000 - 0x7ff9d1d37fff psapi.dll 6.2.19041.3636 0x7ff9d1d40000 - 0x7ff9d1e6afff ole32.dll 6.2.19041.4355 0x7ff9d1e70000 - 0x7ff9d1f18fff clbcatq.dll 2001.12.10941.16384 0x7ff9d1f20000 - 0x7ff9d1fecfff oleaut32.dll 6.2.19041.3636 0x7ff9d1ff0000 - 0x7ff9d201efff imm32.dll 6.2.19041.4474 0x7ff9d2020000 - 0x7ff9d20e0fff kernel32.dll 6.2.19041.4597 (WARNING: No symbols, kernel32.pdb, 396B53214FBEC11DC2AC82E86F6D8DAA1) 0x7ff9d2130000 - 0x7ff9d2327fff ntdll.dll 6.2.19041.4522 (WARNING: No symbols, ntdll.pdb, 4C328D42D0B9A2B218FB85860DECF27C1)