Загрузка данных


Operating system: Windows NT
                  10.0.19045 2486
CPU: amd64
     family 6 model 30 stepping 5
     4 CPUs

GPU: UNKNOWN

Crash reason:  EXCEPTION_ACCESS_VIOLATION_WRITE
Crash address: 0x0
Crash parameters:
    value: 1	description: 
    value: 0	description: 
Process uptime: 46 seconds

Thread 3 (crashed)
 0  qemu-system-x86_64.exe + 0x25f5437
    rax = 0x0000000000000000   rdx = 0x0000000000000000
    rcx = 0x00007ff6a45eb680   rbx = 0x000002421d3172c0
    rsi = 0x000002421d3177a0   rdi = 0x000002427fa3f950
    rbp = 0x0000009a1abff900   rsp = 0x0000009a1abff850
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x00007ffa7a460000   r11 = 0x00007ffa7a461833
    r12 = 0x00004e94914f0000   r13 = 0x000002420f6aa0d0
    r14 = 0x000000c5bb801764   r15 = 0xb2f4fc0794908cf3
    rip = 0x00007ff6a2e55437
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1abff850 c0 72 31 1d 42 02 00 00 50 f9 a3 7f 42 02 00 00  .r1.B...P...B...
     0000009a1abff860 d0 f8 bf 1a 9a 00 00 00 64 17 80 bb c5 00 00 00  ........d.......
     0000009a1abff870 00 00 00 00 00 00 00 00 12 c3 d9 a0 f6 7f 00 00  ................
    Possible instruction pointers:

 1  qemu-system-x86_64.exe + 0x53c312
    rbp = 0x0000009a1abff900   rsp = 0x0000009a1abff880
    rip = 0x00007ff6a0d9c312
    Found by: stack scanning

    Stack contents:
     0000009a1abff880 20 7f 31 1d 42 02 00 00 00 00 00 00 00 00 00 00   .1.B...........
     0000009a1abff890 47 00 00 00 00 00 00 00 4f 00 00 00 00 00 00 00  G.......O.......
     0000009a1abff8a0 49 05 e9 a2 f6 7f 00 00                          I.......        
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x2630549
    rbp = 0x0000009a1abff900   rsp = 0x0000009a1abff8a8
    rip = 0x00007ff6a2e90549
    Found by: stack scanning

    Stack contents:
     0000009a1abff8a8 04 00 00 00 00 00 00 00 c0 72 31 1d 42 02 00 00  .........r1.B...
     0000009a1abff8b8 47 00 00 00 00 00 00 00 c0 72 31 1d 42 02 00 00  G........r1.B...
     0000009a1abff8c8 47 00 00 00 00 00 00 00 a0 77 31 1d 42 02 00 00  G........w1.B...
     0000009a1abff8d8 00 00 00 00 00 00 00 00 47 00 00 00 00 00 00 00  ........G.......
     0000009a1abff8e8 4f 00 00 00 00 00 00 00 01 f9 bf 1a 9a 00 00 00  O...............
     0000009a1abff8f8 50 f9 a3 7f 42 02 00 00 fe ff ff ff ff ff ff ff  P...B...........
     0000009a1abff908 60 04 c3 21 42 02 00 00 a0 f9 bf 1a 9a 00 00 00  `..!B...........
     0000009a1abff918 78 e1 d9 a0 f6 7f 00 00                          x.......        
    Possible instruction pointers:

 3  qemu-system-x86_64.exe + 0x53e178
    rsp = 0x0000009a1abff920   rip = 0x00007ff6a0d9e178
    Found by: stack scanning

    Stack contents:
     0000009a1abff920 f3 11 23 03 02 00 00 00 00 00 00 00 fa 7f 00 00  ..#.............
     0000009a1abff930 00 96 1e 1d 42 02 00 00 9a 3a 00 00 00 00 00 00  ....B....:......
     0000009a1abff940 80 f9 bf 1a 9a 00 00 00 68 f9 bf 1a 9a 00 00 00  ........h.......
     0000009a1abff950 02 01 00 00 00 00 00 00 c0 72 31 1d 42 02 00 00  .........r1.B...
     0000009a1abff960 47 00 00 00 00 00 00 00 d9 66 e6 a2 f6 7f 00 00  G........f......
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x26066d9
    rsp = 0x0000009a1abff970   rip = 0x00007ff6a2e666d9
    Found by: stack scanning

    Stack contents:
     0000009a1abff970 49 05 e9 a2 f6 7f 00 00                          I.......        
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x2630549
    rsp = 0x0000009a1abff978   rip = 0x00007ff6a2e90549
    Found by: stack scanning

    Stack contents:
     0000009a1abff978 04 00 00 00 00 00 00 00 c0 72 31 1d 42 02 00 00  .........r1.B...
     0000009a1abff988 00 00 00 00 00 00 00 00 47 00 00 00 00 00 00 00  ........G.......
     0000009a1abff998 4f 00 00 00 00 00 00 00 d0 de 72 0f 42 02 00 00  O.........r.B...
     0000009a1abff9a8 fe ff ff ff ff ff ff ff db 34 b6 d7 82 de 1b 43  .........4.....C
     0000009a1abff9b8 40 fa a3 7f 42 02 00 00 50 f9 a3 7f 42 02 00 00  @...B...P...B...
     0000009a1abff9c8 c8 a0 6a 0f 42 02 00 00 60 fa bf 1a 9a 00 00 00  ..j.B...`.......
     0000009a1abff9d8 9b f1 d9 a0 f6 7f 00 00                          ........        
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x53f19b
    rsp = 0x0000009a1abff9e0   rip = 0x00007ff6a0d9f19b
    Found by: stack scanning

    Stack contents:
     0000009a1abff9e0 cd 0d 23 03 02 00 00 00 60 fa bf 1a 9a 00 00 00  ..#.....`.......
     0000009a1abff9f0 50 f9 a3 7f 42 02 00 00 00 00 00 00 00 00 00 00  P...B...........
     0000009a1abffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffa50 00 00 00 00 00 00 00 00 f0 f9 a3 7f 42 02 00 00  ............B...
     0000009a1abffa60 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1abffa70 00 00 00 00 00 00 00 00 88 fa a3 7f 42 02 00 00  ............B...
     0000009a1abffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffa90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffaa0 00 00 00 00 00 00 00 00 9d fa d9 a0 f6 7f 00 00  ................
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x53fa9d
    rsp = 0x0000009a1abffab0   rip = 0x00007ff6a0d9fa9d
    Found by: stack scanning

    Stack contents:
     0000009a1abffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffad0 00 00 00 00 00 00 00 00 f0 8b dc a0 f6 7f 00 00  ................
    Possible instruction pointers:

 8  qemu-system-x86_64.exe + 0x568bf0
    rsp = 0x0000009a1abffae0   rip = 0x00007ff6a0dc8bf0
    Found by: stack scanning

    Stack contents:
     0000009a1abffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffb10 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 9  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1abffb20   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1abffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffb40 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

10  ntdll.dll + 0x526a1
    rsp = 0x0000009a1abffb50   rip = 0x00007ffa86f826a1
    Found by: stack scanning

    Stack contents:
     0000009a1abffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1abffb80 00 00 00 00 57 2a 88 08 00 00 00 00 00 00 00 00  ....W*..........
     0000009a1abffb90 00 00 00 00 00 00 00 00 40 01 da 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

11  KERNELBASE.dll + 0x110140
    rsp = 0x0000009a1abffba0   rip = 0x00007ffa84da0140
    Found by: stack scanning

Thread 0
 0  win32u.dll + 0xa104
    rax = 0x0000000000001486   rdx = 0x0000000000000000
    rcx = 0x0000000000000000   rbx = 0x00000000000000a4
    rsi = 0x0000000000000001   rdi = 0x000002427f9e5f01
    rbp = 0x0000009a1a8fbb40   rsp = 0x0000009a1a8fb9f8
     r8 = 0x0000009a1a8fb6d0    r9 = 0x0000000000007530
    r10 = 0x000002420f7c3430   r11 = 0x00000000000cfc38
    r12 = 0x0000000000000000   r13 = 0x000002427fa436e0
    r14 = 0x000002427fca8cf0   r15 = 0x0000000000000000
    rip = 0x00007ffa84b0a104
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1a8fb9f8 ee 07 0c 85 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  USER32.dll + 0x207ee
    rax = 0x0000000000001486   rdx = 0x0000000000000000
    rcx = 0x0000000000000000   rbx = 0x00000000000000a4
    rsi = 0x0000000000000001   rdi = 0x000002427f9e5f01
    rbp = 0x0000009a1a8fbb40   rsp = 0x0000009a1a8fba00
     r8 = 0x0000009a1a8fb6d0    r9 = 0x0000000000007530
    r10 = 0x000002420f7c3430   r11 = 0x00000000000cfc38
    r12 = 0x0000000000000000   r13 = 0x000002427fa436e0
    r14 = 0x000002427fca8cf0   r15 = 0x0000000000000000
    rip = 0x00007ffa850c07ee
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1a8fba00 00 00 00 00 00 00 00 00 14 15 83 22 fa 7f 00 00  ..........."....
    Possible instruction pointers:

 2  Qt6CoreAndroidEmu.dll + 0xb1514
    rbp = 0x0000009a1a8fbb40   rsp = 0x0000009a1a8fba10
    rip = 0x00007ffa22831514
    Found by: stack scanning

    Stack contents:
     0000009a1a8fba10 f0 8c ca 7f 42 02 00 00 03 00 00 00 42 02 00 00  ....B.......B...
     0000009a1a8fba20 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fba30 01 5f 9e 7f 42 02 00 00 44 2d 95 22 fa 7f 00 00  ._..B...D-."....
    Possible instruction pointers:

 3  Qt6CoreAndroidEmu.dll + 0x1d2d44
    rbp = 0x0000009a1a8fbb40   rsp = 0x0000009a1a8fba40
    rip = 0x00007ffa22952d44
    Found by: stack scanning

    Stack contents:
     0000009a1a8fba40 a4 00 00 00 00 00 00 00 40 bb 8f 1a 9a 00 00 00  ........@.......
     0000009a1a8fba50 01 00 00 00 00 00 00 00 50 0d 8e 7f 42 02 00 00  ........P...B...
     0000009a1a8fba60 06 00 00 00 42 02 00 00 02 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fba70 f0 8c ca 7f 42 02 00 00 66 03 8a 00 00 00 00 00  ....B...f.......
     0000009a1a8fba80 13 01 00 00 00 00 00 00 02 00 00 00 00 00 00 00  ................
     0000009a1a8fba90 00 00 00 00 00 00 00 00 b8 fe 0c 00 5d 05 00 00  ............]...
     0000009a1a8fbaa0 63 02 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  c...............
    Possible instruction pointers:

 4  ntdll.dll + 0x2b3c7
    rbp = 0x0000009a1a8fbb40   rsp = 0x0000009a1a8fbab0
    rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbab0 50 5f 9e 7f 42 02 00 00 a1 5b f5 86 fa 7f 00 00  P_..B....[......
    Possible instruction pointers:

 5  ntdll.dll + 0x25ba1
    rbp = 0x0000009a1a8fbb40   rsp = 0x0000009a1a8fbac0
    rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbac0 00 00 00 00 00 00 00 00 90 1e b6 22 fa 7f 00 00  ..........."....
    Possible instruction pointers:

 6  Qt6CoreAndroidEmu.dll + 0x3e1e90
    rbp = 0x0000009a1a8fbb40   rsp = 0x0000009a1a8fbad0
    rip = 0x00007ffa22b61e90
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbad0 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbaf0 f0 9c 7b 0f 42 02 00 00 35 00 00 00 9a 00 00 00  ..{.B...5.......
     0000009a1a8fbb00 0c 00 00 00 00 00 00 00 d0 f3 c7 12 42 02 00 00  ............B...
     0000009a1a8fbb10 00 00 8e 7f 02 00 00 00 00 00 00 00 fa 7f 00 00  ................
     0000009a1a8fbb20 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbb30 38 bb 8f 1a 9a 00 00 00 66 03 8a 00 00 00 00 00  8.......f.......
     0000009a1a8fbb40 13 01 00 00 00 00 00 00 02 00 00 00 00 00 00 00  ................
     0000009a1a8fbb50 00 00 00 00 00 00 00 00 b8 fe 0c 00 5d 05 00 00  ............]...
     0000009a1a8fbb60 63 02 00 00 00 00 00 00 82 03 05 00 00 00 00 00  c...............
     0000009a1a8fbb70 13 01 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1a8fbb80 00 00 00 00 00 00 00 00 fe ac 0c 00 ec 03 00 00  ................
     0000009a1a8fbb90 61 02 00 00 00 00 00 00 02 00 00 00 00 00 00 00  a...............
     0000009a1a8fbba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbbb0 10 00 00 00 00 00 00 00 4f 1c f5 86 fa 7f 00 00  ........O.......
    Possible instruction pointers:

 7  ntdll.dll + 0x21c4f
    rsp = 0x0000009a1a8fbbc0   rip = 0x00007ffa86f51c4f
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbbc0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbbe0 08 00 00 00 00 00 00 00 4f 1c f5 86 fa 7f 00 00  ........O.......
    Possible instruction pointers:

 8  ntdll.dll + 0x21c4f
    rsp = 0x0000009a1a8fbbf0   rip = 0x00007ffa86f51c4f
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbbf0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbc00 00 98 e5 12 42 02 00 00 b0 fa c7 12 42 02 00 00  ....B.......B...
     0000009a1a8fbc10 00 00 00 00 00 00 00 00 38 b2 f4 86 fa 7f 00 00  ........8.......
    Possible instruction pointers:

 9  ntdll.dll + 0x1b238
    rsp = 0x0000009a1a8fbc20   rip = 0x00007ffa86f4b238
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbc20 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbc30 00 00 00 00 00 00 00 00 a0 f8 c7 12 42 02 00 00  ............B...
     0000009a1a8fbc40 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1a8fbc50 08 00 00 00 00 00 00 00 4c df f5 86 fa 7f 00 00  ........L.......
    Possible instruction pointers:

10  ntdll.dll + 0x2df4c
    rsp = 0x0000009a1a8fbc60   rip = 0x00007ffa86f5df4c
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbc60 00 00 d3 12 42 02 00 00 c0 fa c7 12 42 02 00 00  ....B.......B...
     0000009a1a8fbc70 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1a8fbc80 18 bd 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbc90 00 c0 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbca0 00 00 00 00 00 00 00 00 c0 5b 46 13 42 02 00 00  .........[F.B...
     0000009a1a8fbcb0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1a8fbcc0 b0 5b 46 13 42 02 00 00 00 00 00 00 00 00 00 00  .[F.B...........
     0000009a1a8fbcd0 00 00 00 00 00 00 00 00 13 00 00 00 fa 7f 00 00  ................
     0000009a1a8fbce0 50 01 96 7f 42 02 00 00 08 02 00 00 00 00 00 00  P...B...........
     0000009a1a8fbcf0 00 00 00 00 00 00 00 00 6b b8 f5 86 fa 7f 00 00  ........k.......
    Possible instruction pointers:

11  ntdll.dll + 0x2b86b
    rsp = 0x0000009a1a8fbd00   rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbd00 00 00 00 00 00 00 00 00 0b b9 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

12  ntdll.dll + 0x2b90b
    rsp = 0x0000009a1a8fbd10   rip = 0x00007ffa86f5b90b
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbd10 32 00 17 00 00 00 00 00 61 00 00 00 00 00 00 00  2.......a.......
     0000009a1a8fbd20 d0 67 71 0f 42 02 00 00 00 00 00 00 00 00 00 00  .gq.B...........
     0000009a1a8fbd30 00 00 96 7f 42 02 00 00 2c 38 f5 86 fa 7f 00 00  ....B...,8......
    Possible instruction pointers:

13  ntdll.dll + 0x2382c
    rsp = 0x0000009a1a8fbd40   rip = 0x00007ffa86f5382c
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbd40 00 00 00 00 42 02 00 00 c0 18 8e 7f 42 02 00 00  ....B.......B...
     0000009a1a8fbd50 c0 fa c7 12 42 02 00 00 00 00 8e 7f 42 02 00 00  ....B.......B...
     0000009a1a8fbd60 a4 02 8e 7f 42 02 00 00 2c 38 f5 86 fa 7f 00 00  ....B...,8......
    Possible instruction pointers:

14  ntdll.dll + 0x2382c
    rsp = 0x0000009a1a8fbd70   rip = 0x00007ffa86f5382c
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbd70 10 00 00 00 00 00 00 00 c0 0c 8e 7f 42 02 00 00  ............B...
     0000009a1a8fbd80 1a 00 35 00 00 00 00 00 08 00 00 00 00 00 00 00  ..5.............
     0000009a1a8fbd90 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00  ................
     0000009a1a8fbda0 08 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00  ................
     0000009a1a8fbdb0 00 00 96 7f 42 02 00 00 79 be 8f 1a 9a 00 00 00  ....B...y.......
     0000009a1a8fbdc0 01 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

15  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1a8fbdd0   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbdd0 00 00 8e 7f 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fbde0 08 00 00 00 00 00 00 00 08 00 00 00 42 02 00 00  ............B...
     0000009a1a8fbdf0 27 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  '...............
     0000009a1a8fbe00 00 00 00 00 02 00 00 00 20 00 00 00 00 00 00 00  ........ .......
     0000009a1a8fbe10 10 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................
     0000009a1a8fbe20 00 00 96 7f 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fbe30 02 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

16  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1a8fbe40   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbe40 49 a1 f1 ec 15 7a 00 00 03 00 00 00 00 00 00 00  I....z..........
     0000009a1a8fbe50 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1a8fbe60 c0 fa c7 12 42 02 00 00 b0 bf 8f 1a 9a 00 00 00  ....B...........
     0000009a1a8fbe70 01 00 00 00 00 00 00 00 c0 fa c7 12 42 02 00 00  ............B...
     0000009a1a8fbe80 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbe90 00 00 96 7f 42 02 00 00 bd 36 f5 86 fa 7f 00 00  ....B....6......
    Possible instruction pointers:

17  ntdll.dll + 0x236bd
    rsp = 0x0000009a1a8fbea0   rip = 0x00007ffa86f536bd
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbea0 38 8f 48 0f 42 02 00 00 c0 9a 7f 0f 42 02 00 00  8.H.B.......B...
     0000009a1a8fbeb0 b0 bf 8f 1a 9a 00 00 00 6b 12 00 79 00 00 00 00  ........k..y....
     0000009a1a8fbec0 e0 8e 7f 0f 42 02 00 00 02 00 00 02 42 02 00 00  ....B.......B...
     0000009a1a8fbed0 02 00 00 00 00 00 00 00 d4 08 00 dc fa 7f 00 00  ................
     0000009a1a8fbee0 46 05 00 00 00 00 00 00 50 01 96 7f 42 02 00 00  F.......P...B...
     0000009a1a8fbef0 46 05 00 00 00 00 00 00 46 05 00 00 00 00 00 00  F.......F.......
     0000009a1a8fbf00 46 05 00 00 00 00 00 00 d4 08 00 dc 42 02 00 00  F...........B...
     0000009a1a8fbf10 b0 7d 96 7f 42 02 00 00 49 e2 f4 86 fa 7f 00 00  .}..B...I.......
    Possible instruction pointers:

18  ntdll.dll + 0x1e249
    rsp = 0x0000009a1a8fbf20   rip = 0x00007ffa86f4e249
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbf20 b0 7d 96 7f 42 02 00 00 e0 11 46 0f 42 02 00 00  .}..B.....F.B...
     0000009a1a8fbf30 01 8f 48 0f 42 02 00 00 ff 03 00 00 00 00 00 00  ..H.B...........
     0000009a1a8fbf40 46 05 00 00 00 00 00 00 c0 5b 46 13 42 02 00 00  F........[F.B...
     0000009a1a8fbf50 46 05 00 00 00 00 00 00 d2 ea f4 86 fa 7f 00 00  F...............
    Possible instruction pointers:

19  ntdll.dll + 0x1ead2
    rsp = 0x0000009a1a8fbf60   rip = 0x00007ffa86f4ead2
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbf60 b0 5b 46 13 42 02 00 00 00 00 e6 12 42 02 00 00  .[F.B.......B...
     0000009a1a8fbf70 00 00 96 7f 42 02 00 00 f6 4e b4 12 fa 7f 00 00  ....B....N......
    Possible instruction pointers:

20  libvulkan_lvp.dll + 0x364ef6
    rsp = 0x0000009a1a8fbf80   rip = 0x00007ffa12b44ef6
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbf80 ff 03 00 00 42 02 00 00 46 05 00 00 00 00 00 00  ....B...F.......
     0000009a1a8fbf90 00 00 00 00 00 00 00 00 d4 08 00 dc 00 00 00 00  ................
     0000009a1a8fbfa0 00 e6 e5 12 42 02 00 00 c0 ab 46 13 42 02 00 00  ....B.....F.B...
     0000009a1a8fbfb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fbfc0 46 05 00 00 00 00 00 00 30 e4 f4 86 fa 7f 00 00  F.......0.......
    Possible instruction pointers:

21  ntdll.dll + 0x1e430
    rsp = 0x0000009a1a8fbfd0   rip = 0x00007ffa86f4e430
    Found by: stack scanning

    Stack contents:
     0000009a1a8fbfd0 00 00 96 7f 42 02 00 00 39 c0 8f 1a 9a 00 00 00  ....B...9.......
     0000009a1a8fbfe0 00 00 00 00 00 00 00 00 b0 5b 46 13 42 02 00 00  .........[F.B...
     0000009a1a8fbff0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc000 00 00 00 00 00 00 00 00 6b b8 f5 86 fa 7f 00 00  ........k.......
    Possible instruction pointers:

22  ntdll.dll + 0x2b86b
    rsp = 0x0000009a1a8fc010   rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc010 5e 00 63 00 00 00 00 00 63 00 00 00 00 00 00 00  ^.c.....c.......
     0000009a1a8fc020 40 a2 83 0b 42 02 00 00 00 00 00 00 00 00 00 00  @...B...........
     0000009a1a8fc030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc040 00 00 00 00 00 00 00 00 c0 1e 8e 7f 42 02 00 00  ............B...
     0000009a1a8fc050 00 00 00 00 00 00 00 00 00 00 8e 7f 42 02 00 00  ............B...
     0000009a1a8fc060 a0 e6 e5 12 42 02 00 00 c0 ab 46 13 42 02 00 00  ....B.....F.B...
     0000009a1a8fc070 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1a8fc080 45 00 00 00 00 00 00 00 b0 5b 46 13 42 02 00 00  E........[F.B...
     0000009a1a8fc090 00 00 00 00 00 00 00 00 79 34 f4 86 fa 7f 00 00  ........y4......
    Possible instruction pointers:

23  ntdll.dll + 0x13479
    rsp = 0x0000009a1a8fc0a0   rip = 0x00007ffa86f43479
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc0a0 00 00 96 7f 42 02 00 00 00 00 96 7f 42 02 00 00  ....B.......B...
     0000009a1a8fc0b0 46 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00  F...............
     0000009a1a8fc0c0 00 00 00 00 00 00 00 00 37 2f f4 86 fa 7f 00 00  ........7/......
    Possible instruction pointers:

24  ntdll.dll + 0x12f37
    rsp = 0x0000009a1a8fc0d0   rip = 0x00007ffa86f42f37
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc0d0 00 00 00 00 00 00 00 00 60 c8 8f 1a 9a 00 00 00  ........`.......
     0000009a1a8fc0e0 00 00 00 00 00 00 00 00 00 00 00 00 fa 7f 00 00  ................
     0000009a1a8fc0f0 70 c2 8f 1a 9a 00 00 00 10 00 00 00 00 00 00 00  p...............
     0000009a1a8fc100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc110 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc120 e0 c0 94 0f 00 00 00 00 88 20 05 87 fa 7f 00 00  ......... ......
    Possible instruction pointers:

25  ntdll.dll + 0x122088
    rsp = 0x0000009a1a8fc130   rip = 0x00007ffa87052088
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc130 35 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  5...............
     0000009a1a8fc140 28 c7 94 0f 42 02 00 00 00 00 00 00 00 00 00 00  (...B...........
     0000009a1a8fc150 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc160 04 00 00 00 00 00 00 00 b1 47 f5 86 fa 7f 00 00  .........G......
    Possible instruction pointers:

26  ntdll.dll + 0x247b1
    rsp = 0x0000009a1a8fc170   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc170 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1a8fc180 74 c9 8f 1a 9a 00 00 00 f0 d0 8f 1a 9a 00 00 00  t...............
     0000009a1a8fc190 70 e9 75 13 42 02 00 00 43 cc cb 84 fa 7f 00 00  p.u.B...C.......
    Possible instruction pointers:

27  KERNELBASE.dll + 0x2cc43
    rsp = 0x0000009a1a8fc1a0   rip = 0x00007ffa84cbcc43
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc1a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc1b0 00 00 00 00 00 00 00 00 01 4d 32 13 42 02 00 00  .........M2.B...
     0000009a1a8fc1c0 70 2d 4b 1f fa 7f 00 00                          p-K.....        
    Possible instruction pointers:

28  libgfxstream_backend.dll + 0x152d70
    rsp = 0x0000009a1a8fc1c8   rip = 0x00007ffa1f4b2d70
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc1c8 79 34 f4 86 fa 7f 00 00                          y4......        
    Possible instruction pointers:

29  ntdll.dll + 0x13479
    rsp = 0x0000009a1a8fc1d0   rip = 0x00007ffa86f43479
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc1d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc1e0 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc1f0 00 00 00 00 00 00 00 00 37 2f f4 86 fa 7f 00 00  ........7/......
    Possible instruction pointers:

30  ntdll.dll + 0x12f37
    rsp = 0x0000009a1a8fc200   rip = 0x00007ffa86f42f37
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc200 00 00 00 00 00 00 00 00 90 c9 8f 1a 9a 00 00 00  ................
     0000009a1a8fc210 00 00 00 00 00 00 00 00 49 e2 f4 86 fa 7f 00 00  ........I.......
    Possible instruction pointers:

31  ntdll.dll + 0x1e249
    rsp = 0x0000009a1a8fc220   rip = 0x00007ffa86f4e249
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc220 a0 c3 8f 1a 9a 00 00 00 10 00 00 00 00 00 00 00  ................
     0000009a1a8fc230 00 00 00 00 00 00 00 00 ff 03 00 00 fa 7f 00 00  ................
     0000009a1a8fc240 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc250 00 00 00 00 00 00 00 00 88 20 05 87 fa 7f 00 00  ......... ......
    Possible instruction pointers:

32  ntdll.dll + 0x122088
    rsp = 0x0000009a1a8fc260   rip = 0x00007ffa87052088
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc260 02 00 00 00 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fc270 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc280 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc290 04 00 00 00 00 00 00 00 7f 03 00 00 fa 7f 00 00  ................
     0000009a1a8fc2a0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1a8fc2b0 60 c9 8f 1a 9a 00 00 00 f0 d0 8f 1a 9a 00 00 00  `...............
     0000009a1a8fc2c0 00 00 00 00 00 00 00 00 43 cc cb 84 fa 7f 00 00  ........C.......
    Possible instruction pointers:

33  KERNELBASE.dll + 0x2cc43
    rsp = 0x0000009a1a8fc2d0   rip = 0x00007ffa84cbcc43
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc2d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc2e0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1a8fc2f0 70 1b 79 84 fa 7f 00 00                          p.y.....        
    Possible instruction pointers:

34  ucrtbase.dll + 0x21b70
    rsp = 0x0000009a1a8fc2f8   rip = 0x00007ffa84791b70
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc2f8 a0 da d3 12 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fc308 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc318 00 00 00 00 00 00 00 00 b0 c4 8f 1a 9a 00 00 00  ................
     0000009a1a8fc328 50 01 96 7f 42 02 00 00 90 82 6a 1c 42 02 00 00  P...B.....j.B...
     0000009a1a8fc338 79 34 f4 86 fa 7f 00 00                          y4......        
    Possible instruction pointers:

35  ntdll.dll + 0x13479
    rsp = 0x0000009a1a8fc340   rip = 0x00007ffa86f43479
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc340 d0 c3 8f 1a 9a 00 00 00 6e 12 26 7d fa 7f 00 00  ........n.&}....
    Possible instruction pointers:

36  libandroid-emu-base-logging.dll + 0x126e
    rsp = 0x0000009a1a8fc350   rip = 0x00007ffa7d26126e
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc350 54 7e 96 7f 42 02 00 00 45 03 00 00 00 00 00 00  T~..B...E.......
     0000009a1a8fc360 00 00 00 00 00 00 00 00 37 2f f4 86 fa 7f 00 00  ........7/......
    Possible instruction pointers:

37  ntdll.dll + 0x12f37
    rsp = 0x0000009a1a8fc370   rip = 0x00007ffa86f42f37
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc370 00 00 00 00 00 00 00 00 00 cb 8f 1a 9a 00 00 00  ................
     0000009a1a8fc380 00 00 00 00 00 00 00 00 5c 0a 00 00 00 00 00 00  ........\.......
     0000009a1a8fc390 10 c5 8f 1a 9a 00 00 00 10 00 00 00 00 00 00 00  ................
     0000009a1a8fc3a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc3b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc3c0 00 d0 77 1a 00 00 00 00 88 20 05 87 fa 7f 00 00  ..w...... ......
    Possible instruction pointers:

38  ntdll.dll + 0x122088
    rsp = 0x0000009a1a8fc3d0   rip = 0x00007ffa87052088
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc3d0 00 00 00 00 00 00 00 00 a0 da d3 12 42 02 00 00  ............B...
     0000009a1a8fc3e0 70 1b 79 84 fa 7f 00 00                          p.y.....        
    Possible instruction pointers:

39  ucrtbase.dll + 0x21b70
    rsp = 0x0000009a1a8fc3e8   rip = 0x00007ffa84791b70
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc3e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc3f8 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................
     0000009a1a8fc408 6b 12 00 79 fa 7f 00 00 00 00 00 00 00 00 00 00  k..y............
     0000009a1a8fc418 ff ff ff ff ff ff ff ff d0 ca 8f 1a 9a 00 00 00  ................
     0000009a1a8fc428 f0 d0 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc438 43 cc cb 84 fa 7f 00 00                          C.......        
    Possible instruction pointers:

40  KERNELBASE.dll + 0x2cc43
    rsp = 0x0000009a1a8fc440   rip = 0x00007ffa84cbcc43
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc440 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc450 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1a8fc460 70 1b 79 84 fa 7f 00 00                          p.y.....        
    Possible instruction pointers:

41  ucrtbase.dll + 0x21b70
    rsp = 0x0000009a1a8fc468   rip = 0x00007ffa84791b70
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc468 e0 6d d2 12 42 02 00 00 00 00 00 00 00 00 00 00  .m..B...........
     0000009a1a8fc478 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc488 00 00 00 00 00 00 00 00 20 c6 8f 1a 9a 00 00 00  ........ .......
     0000009a1a8fc498 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc4a8 b4 c4 8f 1a 9a 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1a8fc4b8 03 00 01 00 00 00 00 00 10 00 00 00 00 00 00 00  ................
     0000009a1a8fc4c8 f0 c3 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc4d8 04 00 01 00 00 00 00 00 08 00 00 00 00 00 00 00  ................
     0000009a1a8fc4e8 c0 c3 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc4f8 30 0b 00 00 00 00 00 00 02 00 00 00 42 02 00 00  0...........B...
     0000009a1a8fc508 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc518 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc528 00 00 00 00 42 02 00 00 00 f0 77 1a 9a 00 00 00  ....B.....w.....
     0000009a1a8fc538 6b b8 f5 86 fa 7f 00 00                          k.......        
    Possible instruction pointers:

42  ntdll.dll + 0x2b86b
    rsp = 0x0000009a1a8fc540   rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc540 00 00 00 00 00 00 00 00 e0 6d d2 12 42 02 00 00  .........m..B...
     0000009a1a8fc550 70 1b 79 84 fa 7f 00 00                          p.y.....        
    Possible instruction pointers:

43  ucrtbase.dll + 0x21b70
    rsp = 0x0000009a1a8fc558   rip = 0x00007ffa84791b70
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc558 00 00 00 00 00 00 00 00 7c 1e 00 00 00 00 00 00  ........|.......
     0000009a1a8fc568 7c 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00  |...............
     0000009a1a8fc578 00 12 8e 7f 42 02 00 00 00 20 00 00 00 00 00 00  ....B.... ......
     0000009a1a8fc588 00 00 8e 7f 42 02 00 00 d8 02 8e 7f 42 02 00 00  ....B.......B...
     0000009a1a8fc598 6c a4 f3 86 fa 7f 00 00                          l.......        
    Possible instruction pointers:

44  ntdll.dll + 0xa46c
    rsp = 0x0000009a1a8fc5a0   rip = 0x00007ffa86f3a46c
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc5a0 e0 00 00 00 00 00 00 00 c0 0c 8e 7f 42 02 00 00  ............B...
     0000009a1a8fc5b0 00 00 00 00 cd cc 46 7f 00 00 00 00 00 00 00 00  ......F.........
     0000009a1a8fc5c0 00 00 00 00 00 00 00 00 e0 00 00 00 00 00 00 00  ................
     0000009a1a8fc5d0 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc5e0 40 c6 8f 1a 9a 00 00 00 00 08 f8 86 fa 7f 00 00  @...............
    Possible instruction pointers:

45  ntdll.dll + 0x50800
    rsp = 0x0000009a1a8fc5f0   rip = 0x00007ffa86f80800
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc5f0 00 00 00 00 00 00 00 00 a1 5b f5 86 fa 7f 00 00  .........[......
    Possible instruction pointers:

46  ntdll.dll + 0x25ba1
    rsp = 0x0000009a1a8fc600   rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc600 00 00 8e 7f 42 02 00 00 00 00 00 00 fa 7f 00 00  ....B...........
     0000009a1a8fc610 00 00 00 00 00 00 00 00 10 c6 8f 1a 9a 00 00 00  ................
     0000009a1a8fc620 48 00 00 00 00 00 00 00 03 00 01 00 00 00 00 00  H...............
     0000009a1a8fc630 10 00 00 00 00 00 00 00 60 c5 8f 1a 9a 00 00 00  ........`.......
     0000009a1a8fc640 00 00 00 00 00 00 00 00 04 00 01 00 00 00 00 00  ................
     0000009a1a8fc650 08 00 00 00 00 00 00 00 30 c5 8f 1a 9a 00 00 00  ........0.......
     0000009a1a8fc660 00 00 00 00 00 00 00 00 77 dc cf 84 fa 7f 00 00  ........w.......
    Possible instruction pointers:

47  KERNELBASE.dll + 0x6dc77
    rsp = 0x0000009a1a8fc670   rip = 0x00007ffa84cfdc77
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc670 48 45 1f 13 42 02 00 00 40 45 1f 13 42 02 00 00  HE..B...@E..B...
     0000009a1a8fc680 90 45 1f 13 42 02 00 00 f7 2c 1a 6a fa 7f 00 00  .E..B....,.j....
    Possible instruction pointers:

48  MSVCP140.dll + 0x12cf7
    rsp = 0x0000009a1a8fc690   rip = 0x00007ffa6a1a2cf7
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc690 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................
     0000009a1a8fc6a0 70 df d3 12 42 02 00 00 70 df d3 12 42 02 00 00  p...B...p...B...
     0000009a1a8fc6b0 20 45 1f 13 42 02 00 00 b1 47 f5 86 fa 7f 00 00   E..B....G......
    Possible instruction pointers:

49  ntdll.dll + 0x247b1
    rsp = 0x0000009a1a8fc6c0   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc6c0 fe ff ff ff ff ff ff ff 00 00 96 7f 42 02 00 00  ............B...
     0000009a1a8fc6d0 f0 c7 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc6e0 00 00 00 00 00 00 00 00 1a bb 44 1f fa 7f 00 00  ..........D.....
    Possible instruction pointers:

50  libgfxstream_backend.dll + 0xebb1a
    rsp = 0x0000009a1a8fc6f0   rip = 0x00007ffa1f44bb1a
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc6f0 01 00 00 00 00 00 00 00 5b f0 77 84 fa 7f 00 00  ........[.w.....
    Possible instruction pointers:

51  ucrtbase.dll + 0xf05b
    rsp = 0x0000009a1a8fc700   rip = 0x00007ffa8477f05b
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc700 e8 c8 8f 1a 9a 00 00 00 20 45 1f 13 42 02 00 00  ........ E..B...
     0000009a1a8fc710 e8 c8 8f 1a 9a 00 00 00 20 45 1f 13 42 02 00 00  ........ E..B...
     0000009a1a8fc720 01 00 00 00 00 00 00 00 aa 51 37 1f fa 7f 00 00  .........Q7.....
    Possible instruction pointers:

52  libgfxstream_backend.dll + 0x151aa
    rsp = 0x0000009a1a8fc730   rip = 0x00007ffa1f3751aa
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc730 e8 c8 8f 1a 9a 00 00 00 00 00 00 00 42 02 00 00  ............B...
     0000009a1a8fc740 01 c8 8f 1a 9a 00 00 00 fe ff ff ff ff ff ff ff  ................
     0000009a1a8fc750 20 45 1f 13 42 02 00 00 20 45 1f 13 42 02 00 00   E..B... E..B...
     0000009a1a8fc760 00 00 00 00 00 00 00 00 4c df f5 86 fa 7f 00 00  ........L.......
    Possible instruction pointers:

53  ntdll.dll + 0x2df4c
    rsp = 0x0000009a1a8fc770   rip = 0x00007ffa86f5df4c
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc770 e8 c8 8f 1a 9a 00 00 00 08 00 00 00 00 00 00 00  ................
     0000009a1a8fc780 00 00 96 7f 42 02 00 00 f8 00 1d 1d 42 02 00 00  ....B.......B...
     0000009a1a8fc790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc7a0 00 c2 94 0f 42 02 00 00 67 0a 00 00 00 00 00 00  ....B...g.......
     0000009a1a8fc7b0 00 df d3 12 42 02 00 00 00 01 1d 1d 42 02 00 00  ....B.......B...
     0000009a1a8fc7c0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1a8fc7d0 f0 00 1d 1d 42 02 00 00 7f 03 00 00 00 00 00 00  ....B...........
     0000009a1a8fc7e0 00 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00  ................
     0000009a1a8fc7f0 50 01 96 7f 42 02 00 00 20 45 1f 13 42 02 00 00  P...B... E..B...
     0000009a1a8fc800 7f 03 00 00 00 00 00 00 ff 03 00 00 00 00 00 00  ................
     0000009a1a8fc810 f0 00 1d 1d 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fc820 ff 03 00 00 00 00 00 00 70 df d3 12 42 02 00 00  ........p...B...
     0000009a1a8fc830 c0 c8 8f 1a 9a 00 00 00 46 60 44 1f fa 7f 00 00  ........F`D.....
    Possible instruction pointers:

54  libgfxstream_backend.dll + 0xe6046
    rsp = 0x0000009a1a8fc840   rip = 0x00007ffa1f446046
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc840 e8 c8 8f 1a 9a 00 00 00 0b b9 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

55  ntdll.dll + 0x2b90b
    rsp = 0x0000009a1a8fc850   rip = 0x00007ffa86f5b90b
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc850 48 00 1a 00 00 00 00 00 87 00 00 00 00 00 00 00  H...............
     0000009a1a8fc860 f0 91 71 0f 42 02 00 00 50 01 96 7f 42 02 00 00  ..q.B...P...B...
     0000009a1a8fc870 02 00 00 00 00 00 00 00 ff 03 00 00 00 00 00 00  ................
     0000009a1a8fc880 00 00 00 00 00 00 00 00 80 28 8e 7f 42 02 00 00  .........(..B...
     0000009a1a8fc890 1f 00 0f 00 00 00 00 00 00 00 8e 7f 42 02 00 00  ............B...
     0000009a1a8fc8a0 ac 02 8e 7f 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fc8b0 30 00 00 00 00 00 00 00 20 0d 8e 7f 42 02 00 00  0....... ...B...
     0000009a1a8fc8c0 00 00 00 00 42 02 00 00 08 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fc8d0 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00  ........0.......
     0000009a1a8fc8e0 28 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  (...............
     0000009a1a8fc8f0 00 00 96 7f 42 02 00 00 79 34 f4 86 fa 7f 00 00  ....B...y4......
    Possible instruction pointers:

56  ntdll.dll + 0x13479
    rsp = 0x0000009a1a8fc900   rip = 0x00007ffa86f43479
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc900 03 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

57  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1a8fc910   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc910 00 00 8e 7f 42 02 00 00 02 00 00 00 00 00 00 00  ....B...........
     0000009a1a8fc920 00 00 00 00 00 00 00 00 37 2f f4 86 fa 7f 00 00  ........7/......
    Possible instruction pointers:

58  ntdll.dll + 0x12f37
    rsp = 0x0000009a1a8fc930   rip = 0x00007ffa86f42f37
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc930 00 00 00 00 00 00 00 00 c0 d0 8f 1a 9a 00 00 00  ................
     0000009a1a8fc940 00 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

59  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1a8fc950   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc950 d0 ca 8f 1a 9a 00 00 00 10 00 00 00 00 00 00 00  ................
     0000009a1a8fc960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc970 00 00 00 00 48 0b 00 00 00 00 00 00 00 00 00 00  ....H...........
     0000009a1a8fc980 c0 71 80 0b 00 00 00 00 88 20 05 87 fa 7f 00 00  .q....... ......
    Possible instruction pointers:

60  ntdll.dll + 0x122088
    rsp = 0x0000009a1a8fc990   rip = 0x00007ffa87052088
    Found by: stack scanning

    Stack contents:
     0000009a1a8fc990 e8 d5 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc9a0 00 cb 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc9b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fc9c0 04 00 00 00 00 00 00 00 00 00 00 00 42 02 00 00  ............B...
     0000009a1a8fc9d0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1a8fc9e0 d4 d1 8f 1a 9a 00 00 00 c0 b6 82 0f 42 02 00 00  ............B...
     0000009a1a8fc9f0 d0 b6 82 0f 42 02 00 00 43 cc cb 84 fa 7f 00 00  ....B...C.......
    Possible instruction pointers:

61  KERNELBASE.dll + 0x2cc43
    rsp = 0x0000009a1a8fca00   rip = 0x00007ffa84cbcc43
    Found by: stack scanning

    Stack contents:
     0000009a1a8fca00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fca10 00 00 00 00 00 00 00 00 fb 49 3b 1f fa 7f 00 00  .........I;.....
    Possible instruction pointers:

62  libgfxstream_backend.dll + 0x549fb
    rsp = 0x0000009a1a8fca20   rip = 0x00007ffa1f3b49fb
    Found by: stack scanning

    Stack contents:
     0000009a1a8fca20 70 2d 4b 1f fa 7f 00 00                          p-K.....        
    Possible instruction pointers:

63  libgfxstream_backend.dll + 0x152d70
    rsp = 0x0000009a1a8fca28   rip = 0x00007ffa1f4b2d70
    Found by: stack scanning

    Stack contents:
     0000009a1a8fca28 40 4b 1f 13 42 02 00 00 00 00 00 00 00 00 00 00  @K..B...........
     0000009a1a8fca38 00 00 00 00 00 00 00 00 00 00 20 00 00 00 00 00  .......... .....
     0000009a1a8fca48 b8 52 2c 20 fa 7f 00 00                          .R, ....        
    Possible instruction pointers:

64  libgfxstream_backend.dll + 0xf652b8
    rsp = 0x0000009a1a8fca50   rip = 0x00007ffa202c52b8
    Found by: stack scanning

    Stack contents:
     0000009a1a8fca50 e0 cb 8f 1a 9a 00 00 00 00 00 00 00 42 02 00 00  ............B...
     0000009a1a8fca60 00 00 00 00 00 00 00 00 d0 ca 8f 1a 9a 00 00 00  ................
     0000009a1a8fca70 00 00 00 00 00 00 00 00 97 18 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

65  ucrtbase.dll + 0x21897
    rsp = 0x0000009a1a8fca80   rip = 0x00007ffa84791897
    Found by: stack scanning

    Stack contents:
     0000009a1a8fca80 00 00 00 00 00 00 00 00 c0 ca 8f 1a 9a 00 00 00  ................
     0000009a1a8fca90 20 68 89 20 fa 7f 00 00                           h. ....        
    Possible instruction pointers:

66  libgfxstream_backend.dll + 0x1536820
    rsp = 0x0000009a1a8fca98   rip = 0x00007ffa20896820
    Found by: stack scanning

    Stack contents:
     0000009a1a8fca98 53 46 3b 1f fa 7f 00 00                          SF;.....        
    Possible instruction pointers:

67  libgfxstream_backend.dll + 0x54653
    rsp = 0x0000009a1a8fcaa0   rip = 0x00007ffa1f3b4653
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcaa0 00 00 00 00 9a 00 00 00 d0 ca 8f 1a 9a 00 00 00  ................
     0000009a1a8fcab0 00 00 1d 1d 00 00 00 00 34 0b 00 00 00 00 00 00  ........4.......
     0000009a1a8fcac0 b8 52 2c 20 fa 7f 00 00                          .R, ....        
    Possible instruction pointers:

68  libgfxstream_backend.dll + 0xf652b8
    rsp = 0x0000009a1a8fcac8   rip = 0x00007ffa202c52b8
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcac8 90 cb 8f 1a 9a 00 00 00 d0 cb 8f 1a 9a 00 00 00  ................
     0000009a1a8fcad8 10 cc 8f 1a 9a 00 00 00 50 cc 8f 1a 9a 00 00 00  ........P.......
     0000009a1a8fcae8 90 cc 8f 1a 9a 00 00 00 d0 cc 8f 1a 9a 00 00 00  ................
     0000009a1a8fcaf8 de 08 3b 1f fa 7f 00 00                          ..;.....        
    Possible instruction pointers:

69  libgfxstream_backend.dll + 0x508de
    rsp = 0x0000009a1a8fcb00   rip = 0x00007ffa1f3b08de
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcb00 fe ff ff ff ff ff ff ff 50 c5 2a 0f 42 02 00 00  ........P.*.B...
     0000009a1a8fcb10 f0 e8 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fcb20 00 00 00 00 00 00 00 00 fb 28 4a 1f fa 7f 00 00  .........(J.....
    Possible instruction pointers:

70  libgfxstream_backend.dll + 0x1428fb
    rsp = 0x0000009a1a8fcb30   rip = 0x00007ffa1f4a28fb
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcb30 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  P...............
     0000009a1a8fcb40 40 4f 2b 0f 42 02 00 00 a1 5b f5 86 fa 7f 00 00  @O+.B....[......
    Possible instruction pointers:

71  ntdll.dll + 0x25ba1
    rsp = 0x0000009a1a8fcb50   rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcb50 78 4c 2c 20 fa 7f 00 00                          xL, ....        
    Possible instruction pointers:

72  libgfxstream_backend.dll + 0xf64c78
    rsp = 0x0000009a1a8fcb58   rip = 0x00007ffa202c4c78
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcb58 30 a0 cb 12 42 02 00 00 21 00 00 00 15 7a 00 00  0...B...!....z..
     0000009a1a8fcb68 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fcb78 58 21 2c 20 fa 7f 00 00                          X!, ....        
    Possible instruction pointers:

73  libgfxstream_backend.dll + 0xf62158
    rsp = 0x0000009a1a8fcb80   rip = 0x00007ffa202c2158
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcb80 c0 71 80 0b 42 02 00 00 00 00 00 00 00 00 00 00  .q..B...........
     0000009a1a8fcb90 18 4d 2c 20 fa 7f 00 00                          .M, ....        
    Possible instruction pointers:

74  libgfxstream_backend.dll + 0xf64d18
    rsp = 0x0000009a1a8fcb98   rip = 0x00007ffa202c4d18
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcb98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fcba8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fcbb8 18 22 2c 20 fa 7f 00 00                          .", ....        
    Possible instruction pointers:

75  libgfxstream_backend.dll + 0xf62218
    rsp = 0x0000009a1a8fcbc0   rip = 0x00007ffa202c2218
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcbc0 c0 71 80 0b 42 02 00 00 00 00 00 00 00 00 00 00  .q..B...........
     0000009a1a8fcbd0 b8 4d 2c 20 fa 7f 00 00                          .M, ....        
    Possible instruction pointers:

76  libgfxstream_backend.dll + 0xf64db8
    rsp = 0x0000009a1a8fcbd8   rip = 0x00007ffa202c4db8
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcbd8 60 bb 2a 0f 42 02 00 00 48 00 00 00 00 00 00 00  `.*.B...H.......
     0000009a1a8fcbe8 03 00 01 00 00 00 00 00 10 00 00 00 00 00 00 00  ................
     0000009a1a8fcbf8 20 cb 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00   ...............
     0000009a1a8fcc08 00 00 00 00 00 00 00 00 58 4e 2c 20 fa 7f 00 00  ........XN, ....
    Possible instruction pointers:

77  libgfxstream_backend.dll + 0xf64e58
    rsp = 0x0000009a1a8fcc18   rip = 0x00007ffa202c4e58
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcc18 f0 ca 8f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fcc28 3d 49 29 6a fa 7f 00 00                          =I)j....        
    Possible instruction pointers:

78  libabseil_dll.dll + 0x7493d
    rsp = 0x0000009a1a8fcc30   rip = 0x00007ffa6a29493d
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcc30 00 00 00 00 00 00 00 00 36 51 cc 84 fa 7f 00 00  ........6Q......
    Possible instruction pointers:

79  KERNELBASE.dll + 0x35136
    rsp = 0x0000009a1a8fcc40   rip = 0x00007ffa84cc5136
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcc40 c0 71 80 0b 42 02 00 00 00 00 00 00 00 00 00 00  .q..B...........
     0000009a1a8fcc50 f8 4e 2c 20 fa 7f 00 00                          .N, ....        
    Possible instruction pointers:

80  libgfxstream_backend.dll + 0xf64ef8
    rsp = 0x0000009a1a8fcc58   rip = 0x00007ffa202c4ef8
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcc58 bb 31 29 6a fa 7f 00 00                          .1)j....        
    Possible instruction pointers:

81  libabseil_dll.dll + 0x731bb
    rsp = 0x0000009a1a8fcc60   rip = 0x00007ffa6a2931bb
    Found by: stack scanning

    Stack contents:
     0000009a1a8fcc60 90 cc 8f 1a 9a 00 00 00 f0 cc 8f 1a 9a 00 00 00  ................
     0000009a1a8fcc70 2e 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fcc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a8fcc90 00 00 00 00 00 00 00 00 2e 10 00 00 00 00 00 00  ................
     0000009a1a8fcca0 50 e1 8f 1a 9a 00 00 00 07 9c 78 84 fa 7f 00 00  P.........x.....
    Possible instruction pointers:

82  ucrtbase.dll + 0x19c07
    rsp = 0x0000009a1a8fccb0   rip = 0x00007ffa84789c07
    Found by: stack scanning

Thread 1
 0  ntdll.dll + 0x9d144
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000394   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000394
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffda8
     r8 = 0x000002427f8e4140    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1a9ffd20
    r12 = 0x0000000000000000   r13 = 0x00007ffa72f938c0
    r14 = 0x0000000000000394   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcd144
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1a9ffda8 6e 30 cb 84 fa 7f 00 00                          n0......        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x2306e
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000394   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000394
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffdb0
     r8 = 0x000002427f8e4140    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1a9ffd20
    r12 = 0x0000000000000000   r13 = 0x00007ffa72f938c0
    r14 = 0x0000000000000394   r15 = 0x0000000000000000
    rip = 0x00007ffa84cb306e
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1a9ffdb0 68 fe 9f 1a 9a 00 00 00 00 00 00 00 00 00 00 00  h...............
     0000009a1a9ffdc0 c0 38 f9 72 fa 7f 00 00                          .8.r....        
    Possible instruction pointers:

 2  libglib2_windows_msvc-x86_64.dll + 0x638c0
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffdc8
    rip = 0x00007ffa72f938c0
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffdc8 00 15 f2 23 42 02 00 00 60 79 fe ff ff ff ff ff  ...#B...`y......
     0000009a1a9ffdd8 b1 47 f5 86 fa 7f 00 00                          .G......        
    Possible instruction pointers:

 3  ntdll.dll + 0x247b1
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffde0
    rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffde0 48 00 00 00 00 00 00 00 01 00 00 00 fa 7f 00 00  H...............
     0000009a1a9ffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9ffe00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9ffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9ffe20 00 00 00 00 00 00 00 00 58 fe 5d a4 f6 7f 00 00  ........X.].....
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x3d7fe58
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffe30
    rip = 0x00007ff6a45dfe58
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffe30 00 00 00 00 00 00 00 00 70 fe 9f 1a 9a 00 00 00  ........p.......
     0000009a1a9ffe40 58 fe 5d a4 f6 7f 00 00                          X.].....        
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x3d7fe58
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffe48
    rip = 0x00007ff6a45dfe58
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffe48 3e db c1 a0 f6 7f 00 00                          >.......        
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x3bdb3e
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffe50
    rip = 0x00007ff6a0c1db3e
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffe50 80 61 fe a2 f6 7f 00 00                          .a......        
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x2786180
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffe58
    rip = 0x00007ff6a2fe6180
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffe58 00 00 00 00 f6 7f 00 00 00 00 00 00 9a 00 00 00  ................
     0000009a1a9ffe68 94 03 00 00 00 00 00 00 40 6a 33 13 42 02 00 00  ........@j3.B...
     0000009a1a9ffe78 b0 20 60 01 42 02 00 00 00 00 00 00 00 00 00 00  . `.B...........
     0000009a1a9ffe88 c0 da c1 a0 f6 7f 00 00                          ........        
    Possible instruction pointers:

 8  qemu-system-x86_64.exe + 0x3bdac0
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffe90
    rip = 0x00007ff6a0c1dac0
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9ffea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9ffeb0 00 00 00 00 00 00 00 00 2f 5b c3 a0 f6 7f 00 00  ......../[......
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0x3d5b2f
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffec0
    rip = 0x00007ff6a0c35b2f
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffec0 b0 20 60 01 42 02 00 00 00 00 00 00 00 00 00 00  . `.B...........
     0000009a1a9ffed0 01 00 08 00 ff ff ff ff 00 31 50 82 fa 7f 00 00  .........1P.....
    Possible instruction pointers:

10  kernel.appcore.dll + 0x3100
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffee0
    rip = 0x00007ffa82503100
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffee0 a0 d3 82 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

11  ucrtbase.dll + 0xbd3a0
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9ffee8
    rip = 0x00007ffa8482d3a0
    Found by: stack scanning

    Stack contents:
     0000009a1a9ffee8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9ffef8 b2 1b 79 84 fa 7f 00 00                          ..y.....        
    Possible instruction pointers:

12  ucrtbase.dll + 0x21bb2
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9fff00
    rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1a9fff00 b0 20 60 01 42 02 00 00 00 00 00 00 00 00 00 00  . `.B...........
     0000009a1a9fff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9fff20 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

13  KERNEL32.DLL + 0x17614
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9fff30
    rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1a9fff30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9fff40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1a9fff50 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

14  ntdll.dll + 0x526a1
    rbp = 0x00007ff6a45dfea8   rsp = 0x0000009a1a9fff60
    rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 2
 0  ntdll.dll + 0xa0b14
    rax = 0x00000000000001d3   rdx = 0x000002427fa30dc0
    rcx = 0x0000000000000018   rbx = 0x000002427fa31140
    rsi = 0x000002427f960b50   rdi = 0x000002427fa31140
    rbp = 0x0000000000000000   rsp = 0x0000009a1aaff758
     r8 = 0x0000000000000000    r9 = 0x000002427f960000
    r10 = 0x0000000000000000   r11 = 0x000002427f9d3210
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fd0b14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1aaff758 17 2e f8 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  ntdll.dll + 0x52e17
    rax = 0x00000000000001d3   rdx = 0x000002427fa30dc0
    rcx = 0x0000000000000018   rbx = 0x000002427fa31140
    rsi = 0x000002427f960b50   rdi = 0x000002427fa31140
    rbp = 0x0000000000000000   rsp = 0x0000009a1aaff760
     r8 = 0x0000000000000000    r9 = 0x000002427f960000
    r10 = 0x0000000000000000   r11 = 0x000002427f9d3210
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86f82e17
    Found by: simulating a return from leaf function

Thread 4
 0  ntdll.dll + 0xa0b14
    rax = 0x00000000000001d3   rdx = 0x000002427fa5c9c0
    rcx = 0x0000000000000018   rbx = 0x000002427fa5cd40
    rsi = 0x000002427f960b50   rdi = 0x000002427fa5cd40
    rbp = 0x0000000000000000   rsp = 0x0000009a1adff768
     r8 = 0x0000009a1adff048    r9 = 0x0000009a1adff8e8
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fd0b14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1adff768 17 2e f8 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  ntdll.dll + 0x52e17
    rax = 0x00000000000001d3   rdx = 0x000002427fa5c9c0
    rcx = 0x0000000000000018   rbx = 0x000002427fa5cd40
    rsi = 0x000002427f960b50   rdi = 0x000002427fa5cd40
    rbp = 0x0000000000000000   rsp = 0x0000009a1adff770
     r8 = 0x0000009a1adff048    r9 = 0x0000009a1adff8e8
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86f82e17
    Found by: simulating a return from leaf function

Thread 5
 0  ntdll.dll + 0xa0b14
    rax = 0x00000000000001d3   rdx = 0x00000242015c1930
    rcx = 0x00000000000003f4   rbx = 0x00000242015c1cb0
    rsi = 0x000002427f96bc20   rdi = 0x00000242015c1cb0
    rbp = 0x0000000000000000   rsp = 0x0000009a1acff6b8
     r8 = 0x0000009a1acfeba0    r9 = 0x000002427fa19168
    r10 = 0x00007ffa86917dc0   r11 = 0x000002427fa192c8
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fd0b14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1acff6b8 17 2e f8 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  ntdll.dll + 0x52e17
    rax = 0x00000000000001d3   rdx = 0x00000242015c1930
    rcx = 0x00000000000003f4   rbx = 0x00000242015c1cb0
    rsi = 0x000002427f96bc20   rdi = 0x00000242015c1cb0
    rbp = 0x0000000000000000   rsp = 0x0000009a1acff6c0
     r8 = 0x0000009a1acfeba0    r9 = 0x000002427fa19168
    r10 = 0x00007ffa86917dc0   r11 = 0x000002427fa192c8
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86f82e17
    Found by: simulating a return from leaf function

Thread 6
 0  ntdll.dll + 0xa0b14
    rax = 0x00000000000001d3   rdx = 0x000002427fa14e50
    rcx = 0x00000000000003f4   rbx = 0x000002427fa151d0
    rsi = 0x000002427f96bc20   rdi = 0x000002427fa151d0
    rbp = 0x0000000000000000   rsp = 0x0000009a1aeffa08
     r8 = 0x0000000000000001    r9 = 0x0000009a1aeff6c8
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fd0b14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1aeffa08 17 2e f8 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  ntdll.dll + 0x52e17
    rax = 0x00000000000001d3   rdx = 0x000002427fa14e50
    rcx = 0x00000000000003f4   rbx = 0x000002427fa151d0
    rsi = 0x000002427f96bc20   rdi = 0x000002427fa151d0
    rbp = 0x0000000000000000   rsp = 0x0000009a1aeffa10
     r8 = 0x0000000000000001    r9 = 0x0000009a1aeff6c8
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86f82e17
    Found by: simulating a return from leaf function

Thread 7
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fa00060   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fa00060
    rbp = 0x0000009a1afff0e0   rsp = 0x0000009a1afff088
     r8 = 0x0000000000000000    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1afff0e0
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1afff0b0   r15 = 0x000002427fa00068
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1afff088 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fa00060   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fa00060
    rbp = 0x0000009a1afff0e0   rsp = 0x0000009a1afff090
     r8 = 0x0000000000000000    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1afff0e0
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1afff0b0   r15 = 0x000002427fa00068
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1afff090 48 f2 ff 1a 9a 00 00 00 e0 7e e2 13 42 02 00 00  H........~..B...
     0000009a1afff0a0 d0 d8 e9 22 fa 7f 00 00                          ..."....        
    Possible instruction pointers:

 2  libandroid-emu-metrics.dll + 0x19d8d0
    rbp = 0x0000009a1afff0e0   rsp = 0x0000009a1afff0a8
    rip = 0x00007ffa22e9d8d0
    Found by: stack scanning

    Stack contents:
     0000009a1afff0a8 c8 fa ff 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff0b8 b0 f0 ff 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff0c8 58 1c 00 00 00 00 00 00 50 f1 ff 1a 01 00 00 00  X.......P.......
     0000009a1afff0d8 60 00 a0 7f 42 02 00 00 48 f2 ff 1a 9a 00 00 00  `...B...H.......
     0000009a1afff0e8 40 dc cf 84 fa 7f 00 00                          @.......        
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc40
    rbp = 0x0000009a1afff248   rsp = 0x0000009a1afff0f0
    rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1afff0f0 d0 d8 e9 22 fa 7f 00 00                          ..."....        
    Possible instruction pointers:

 4  libandroid-emu-metrics.dll + 0x19d8d0
    rbp = 0x0000009a1afff248   rsp = 0x0000009a1afff0f8
    rip = 0x00007ffa22e9d8d0
    Found by: stack scanning

    Stack contents:
     0000009a1afff0f8 c8 fa ff 1a 9a 00 00 00 e0 f1 ff 1a 9a 00 00 00  ................
     0000009a1afff108 69 dc cf 84 fa 7f 00 00                          i.......        
    Possible instruction pointers:

 5  KERNELBASE.dll + 0x6dc69
    rbp = 0x0000009a1afff248   rsp = 0x0000009a1afff110
    rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1afff110 68 00 a0 7f 42 02 00 00 40 00 a0 7f 42 02 00 00  h...B...@...B...
     0000009a1afff120 60 00 a0 7f 42 02 00 00 10 a0 34 13 42 02 00 00  `...B.....4.B...
     0000009a1afff130 00 00 00 00 00 00 00 00 40 00 a0 7f 42 02 00 00  ........@...B...
     0000009a1afff140 68 00 a0 7f 42 02 00 00 38 26 fa 22 fa 7f 00 00  h...B...8&."....
    Possible instruction pointers:

 6  libandroid-emu-metrics.dll + 0x2a2638
    rbp = 0x0000009a1afff248   rsp = 0x0000009a1afff150
    rip = 0x00007ffa22fa2638
    Found by: stack scanning

    Stack contents:
     0000009a1afff150 00 00 00 00 9a 00 00 00 48 f2 ff 1a 9a 00 00 00  ........H.......
     0000009a1afff160 30 82 e2 13 42 02 00 00 48 f2 ff 1a 9a 00 00 00  0...B...H.......
     0000009a1afff170 48 f2 ff 1a 9a 00 00 00 80 fa ff 1a 9a 00 00 00  H...............
     0000009a1afff180 40 00 a0 7f 42 02 00 00 40 00 a0 7f 42 02 00 00  @...B...@...B...
     0000009a1afff190 01 00 00 00 00 00 00 00 e2 23 d0 22 fa 7f 00 00  .........#."....
    Possible instruction pointers:

 7  libandroid-emu-metrics.dll + 0x23e2
    rbp = 0x0000009a1afff248   rsp = 0x0000009a1afff1a0
    rip = 0x00007ffa22d023e2
    Found by: stack scanning

    Stack contents:
     0000009a1afff1a0 fe ff ff ff ff ff ff ff 00 00 96 7f 42 02 00 00  ............B...
     0000009a1afff1b0 90 f2 ff 1a 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff1c0 00 00 00 00 00 00 00 00 e4 cd d0 22 fa 7f 00 00  ..........."....
    Possible instruction pointers:

 8  libandroid-emu-metrics.dll + 0xcde4
    rbp = 0x0000009a1afff248   rsp = 0x0000009a1afff1d0
    rip = 0x00007ffa22d0cde4
    Found by: stack scanning

    Stack contents:
     0000009a1afff1d0 40 00 a0 7f 42 02 00 00 fe ff ff ff ff ff ff ff  @...B...........
     0000009a1afff1e0 80 fa ff 1a 9a 00 00 00 40 00 a0 7f 42 02 00 00  ........@...B...
     0000009a1afff1f0 e0 fe 9f 7f 42 02 00 00 01 00 00 00 00 00 00 00  ....B...........
     0000009a1afff200 90 f2 ff 1a 9a 00 00 00 c4 21 d0 22 fa 7f 00 00  .........!."....
    Possible instruction pointers:

 9  libandroid-emu-metrics.dll + 0x21c4
    rbp = 0x0000009a1afff248   rsp = 0x0000009a1afff210
    rip = 0x00007ffa22d021c4
    Found by: stack scanning

    Stack contents:
     0000009a1afff210 d0 03 00 00 00 00 00 00 00 00 00 00 42 02 00 00  ............B...
     0000009a1afff220 08 01 00 00 00 00 00 00 08 00 00 00 00 00 00 00  ................
     0000009a1afff230 00 00 00 00 00 00 00 00 d0 03 00 00 00 00 00 00  ................
     0000009a1afff240 c8 03 00 00 00 00 00 00 48 09 01 23 fa 7f 00 00  ........H..#....
    Possible instruction pointers:

10  libandroid-emu-metrics.dll + 0x310948
    rsp = 0x0000009a1afff250   rip = 0x00007ffa23010948
    Found by: stack scanning

    Stack contents:
     0000009a1afff250 00 00 00 00 00 00 00 00 81 20 00 00 00 00 00 00  ......... ......
     0000009a1afff260 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff270 00 00 00 00 80 00 00 00 b8 00 00 00 00 00 00 00  ................
     0000009a1afff280 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff290 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff2a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff2b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff2c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff2d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff2e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff2f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff300 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff310 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1afff320 62 90 1e 1d 42 02 00 00 e8 28 c4 5c fa 7f 00 00  b...B....(.\....
    Possible instruction pointers:

11  liblibprotobuf.dll + 0x3728e8
    rsp = 0x0000009a1afff330   rip = 0x00007ffa5cc428e8
    Found by: stack scanning

    Stack contents:
     0000009a1afff330 e8 28 c4 5c fa 7f 00 00                          .(.\....        
    Possible instruction pointers:

12  liblibprotobuf.dll + 0x3728e8
    rsp = 0x0000009a1afff338   rip = 0x00007ffa5cc428e8
    Found by: stack scanning

    Stack contents:
     0000009a1afff338 e8 28 c4 5c fa 7f 00 00                          .(.\....        
    Possible instruction pointers:

13  liblibprotobuf.dll + 0x3728e8
    rsp = 0x0000009a1afff340   rip = 0x00007ffa5cc428e8
    Found by: stack scanning

    Stack contents:
     0000009a1afff340 e8 28 c4 5c fa 7f 00 00                          .(.\....        
    Possible instruction pointers:

14  liblibprotobuf.dll + 0x3728e8
    rsp = 0x0000009a1afff348   rip = 0x00007ffa5cc428e8
    Found by: stack scanning

    Stack contents:
     0000009a1afff348 e8 28 c4 5c fa 7f 00 00                          .(.\....        
    Possible instruction pointers:

15  liblibprotobuf.dll + 0x3728e8
    rsp = 0x0000009a1afff350   rip = 0x00007ffa5cc428e8
    Found by: stack scanning

    Stack contents:
     0000009a1afff350 e8 28 c4 5c fa 7f 00 00                          .(.\....        
    Possible instruction pointers:

16  liblibprotobuf.dll + 0x3728e8
    rsp = 0x0000009a1afff358   rip = 0x00007ffa5cc428e8
    Found by: stack scanning

Thread 8
 0  ntdll.dll + 0x9d1e4
    rax = 0x0000000000000009   rdx = 0x0000009a1b0ffa90
    rcx = 0x0000000000000624   rbx = 0x0000000000000000
    rsi = 0x0000000000000001   rdi = 0x00007ffa83de0000
    rbp = 0x0000000000000000   rsp = 0x0000009a1b0ffa28
     r8 = 0x0000009a1b0ffa60    r9 = 0x000002421d3168a0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcd1e4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b0ffa28 ab 10 de 83 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  mswsock.dll + 0x10ab
    rax = 0x0000000000000009   rdx = 0x0000009a1b0ffa90
    rcx = 0x0000000000000624   rbx = 0x0000000000000000
    rsi = 0x0000000000000001   rdi = 0x00007ffa83de0000
    rbp = 0x0000000000000000   rsp = 0x0000009a1b0ffa30
     r8 = 0x0000009a1b0ffa60    r9 = 0x000002421d3168a0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa83de10ab
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b0ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b0ffa40 01 00 00 00 00 00 00 00 00 00 de 83 fa 7f 00 00  ................
     0000009a1b0ffa50 20 5c e3 83 fa 7f 00 00                           \......        
    Possible instruction pointers:

 2  mswsock.dll + 0x55c20
    rsp = 0x0000009a1b0ffa58   rip = 0x00007ffa83e35c20
    Found by: stack scanning

    Stack contents:
     0000009a1b0ffa58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b0ffa68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b0ffa78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b0ffa88 14 76 e4 86 fa 7f 00 00                          .v......        
    Possible instruction pointers:

 3  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b0ffa90   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b0ffa90 20 d6 de 83 fa 7f 00 00                           .......        
    Possible instruction pointers:

 4  mswsock.dll + 0xd620
    rsp = 0x0000009a1b0ffa98   rip = 0x00007ffa83ded620
    Found by: stack scanning

    Stack contents:
     0000009a1b0ffa98 c0 60 31 1d 42 02 00 00 00 00 00 00 00 00 00 00  .`1.B...........
     0000009a1b0ffaa8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b0ffab8 a1 26 f8 86 fa 7f 00 00                          .&......        
    Possible instruction pointers:

 5  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b0ffac0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 9
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x000002427fc15780
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000001   rdi = 0x0000000000000001
    rbp = 0x0000000000000102   rsp = 0x0000009a1b1ff528
     r8 = 0x0000000000000000    r9 = 0x0000000000000001
    r10 = 0x00000000000001c0   r11 = 0xe780219118010009
    r12 = 0x0000000000002710   r13 = 0x000002427fc15780
    r14 = 0x0000009a1b1ff580   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b1ff528 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x000002427fc15780
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000001   rdi = 0x0000000000000001
    rbp = 0x0000000000000102   rsp = 0x0000009a1b1ff530
     r8 = 0x0000000000000000    r9 = 0x0000000000000001
    r10 = 0x00000000000001c0   r11 = 0xe780219118010009
    r12 = 0x0000000000002710   r13 = 0x000002427fc15780
    r14 = 0x0000009a1b1ff580   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b1ff530 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1b1ff540 01 00 00 00 00 00 00 00 02 01 00 00 00 00 00 00  ................
     0000009a1b1ff550 80 f5 1f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff560 00 00 00 00 00 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1b1ff570 01 00 00 00 00 00 00 00 0b b9 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

 2  ntdll.dll + 0x2b90b
    rsp = 0x0000009a1b1ff580   rip = 0x00007ffa86f5b90b
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff580 00 1f 0a fa ff ff ff ff 65 00 00 00 00 00 00 00  ........e.......
     0000009a1b1ff590 48 00 00 00 00 00 00 00 01 00 00 00 42 02 00 00  H...........B...
     0000009a1b1ff5a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff5b0 30 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  0...............
     0000009a1b1ff5c0 ff ff ff ff ff ff ff ff 7c 06 ce 84 fa 7f 00 00  ........|.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x5067c
    rsp = 0x0000009a1b1ff5d0   rip = 0x00007ffa84ce067c
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff5d0 00 00 00 00 00 00 00 00 a0 43 38 08 42 02 00 00  .........C8.B...
     0000009a1b1ff5e0 40 00 00 00 00 00 00 00 50 0d 8e 7f 42 02 00 00  @.......P...B...
     0000009a1b1ff5f0 c0 d5 9f 7f 42 02 00 00 08 00 00 00 00 00 00 00  ....B...........
     0000009a1b1ff600 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00  ........@.......
     0000009a1b1ff610 30 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00  0...............
     0000009a1b1ff620 00 00 96 7f 42 02 00 00 e9 f6 1f 1b 9a 00 00 00  ....B...........
     0000009a1b1ff630 04 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

 4  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1b1ff640   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff640 00 00 8e 7f 42 02 00 00 03 00 00 00 fa 7f 00 00  ....B...........
     0000009a1b1ff650 30 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  0...............
     0000009a1b1ff660 0c 00 00 00 00 00 00 00 a0 6e cd 7f 42 02 00 00  .........n..B...
     0000009a1b1ff670 03 00 00 00 02 00 00 00 d8 6f 02 a1 f6 7f 00 00  .........o......
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x7c6fd8
    rsp = 0x0000009a1b1ff680   rip = 0x00007ff6a1026fd8
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff690 a0 6e cd 7f 42 02 00 00 00 00 00 00 00 00 00 00  .n..B...........
     0000009a1b1ff6a0 00 00 00 00 00 00 00 00 a8 f7 1f 1b 9a 00 00 00  ................
     0000009a1b1ff6b0 00 00 00 00 00 00 00 00 8a 35 f5 86 fa 7f 00 00  .........5......
    Possible instruction pointers:

 6  ntdll.dll + 0x2358a
    rsp = 0x0000009a1b1ff6c0   rip = 0x00007ffa86f5358a
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff6c0 a0 6e cd 7f 42 02 00 00 b8 31 81 a1 f6 7f 00 00  .n..B....1......
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0xfb31b8
    rsp = 0x0000009a1b1ff6d0   rip = 0x00007ff6a18131b8
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff6d0 85 00 00 00 42 02 00 00 fe 00 00 00 f6 7f 00 00  ....B...........
     0000009a1b1ff6e0 b0 5a 9f 7f 42 02 00 00 a1 5b f5 86 fa 7f 00 00  .Z..B....[......
    Possible instruction pointers:

 8  ntdll.dll + 0x25ba1
    rsp = 0x0000009a1b1ff6f0   rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff6f0 01 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  ................
     0000009a1b1ff700 0a 00 00 00 14 00 00 00 ff ff ff ff f6 7f 00 00  ................
     0000009a1b1ff710 01 00 00 00 00 00 00 00 60 f9 1f 1b 9a 00 00 00  ........`.......
     0000009a1b1ff720 a0 09 82 23 42 02 00 00 0a 00 00 00 00 00 00 00  ...#B...........
     0000009a1b1ff730 00 00 00 00 00 00 00 00 b3 cf 48 a1 f6 7f 00 00  ..........H.....
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0xc2cfb3
    rsp = 0x0000009a1b1ff740   rip = 0x00007ff6a148cfb3
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff740 02 01 00 00 00 00 00 00 3e dd 77 84 fa 7f 00 00  ........>.w.....
    Possible instruction pointers:

10  ucrtbase.dll + 0xdd3e
    rsp = 0x0000009a1b1ff750   rip = 0x00007ffa8477dd3e
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff750 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00  ........0.......
     0000009a1b1ff760 30 28 cd 7f 42 02 00 00 60 f9 1f 1b 9a 00 00 00  0(..B...`.......
     0000009a1b1ff770 02 01 00 00 00 00 00 00 00 a2 02 a1 f6 7f 00 00  ................
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x7ca200
    rsp = 0x0000009a1b1ff780   rip = 0x00007ff6a102a200
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff790 01 00 00 00 00 00 00 00 09 a2 02 a1 f6 7f 00 00  ................
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x7ca209
    rsp = 0x0000009a1b1ff7a0   rip = 0x00007ff6a102a209
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff7a0 b0 18 2c 85 fa 7f 00 00                          ..,.....        
    Possible instruction pointers:

13  WS2_32.dll + 0x118b0
    rsp = 0x0000009a1b1ff7a8   rip = 0x00007ffa852c18b0
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff7a8 02 01 00 00 00 00 00 00 60 f9 1f 1b 9a 00 00 00  ........`.......
     0000009a1b1ff7b8 60 f9 1f 1b 9a 00 00 00 e0 6d 5f a4 f6 7f 00 00  `........m_.....
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x3d96de0
    rsp = 0x0000009a1b1ff7c8   rip = 0x00007ff6a45f6de0
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff7c8 5d 1b 49 a1 f6 7f 00 00                          ].I.....        
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0xc31b5d
    rsp = 0x0000009a1b1ff7d0   rip = 0x00007ff6a1491b5d
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff7d0 01 00 00 00 00 00 00 00 b3 cf 48 a1 f6 7f 00 00  ..........H.....
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0xc2cfb3
    rsp = 0x0000009a1b1ff7e0   rip = 0x00007ff6a148cfb3
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff7e0 8e 19 98 ee af 18 00 00 5b f0 77 84 fa 7f 00 00  ........[.w.....
    Possible instruction pointers:

17  ucrtbase.dll + 0xf05b
    rsp = 0x0000009a1b1ff7f0   rip = 0x00007ffa8477f05b
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff7f0 01 00 00 00 00 00 00 00 e0 6d 5f a4 f6 7f 00 00  .........m_.....
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x3d96de0
    rsp = 0x0000009a1b1ff800   rip = 0x00007ff6a45f6de0
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff800 a0 09 82 23 42 02 00 00 10 27 00 00 00 00 00 00  ...#B....'......
     0000009a1b1ff810 70 71 f4 23 42 02 00 00 c4 66 02 a1 f6 7f 00 00  pq.#B....f......
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x7c66c4
    rsp = 0x0000009a1b1ff820   rip = 0x00007ff6a10266c4
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff820 00 00 00 00 00 00 00 00 00 00 00 00 42 02 00 00  ............B...
     0000009a1b1ff830 b0 18 2c 85 fa 7f 00 00                          ..,.....        
    Possible instruction pointers:

20  WS2_32.dll + 0x118b0
    rsp = 0x0000009a1b1ff838   rip = 0x00007ffa852c18b0
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff838 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1b1ff848 00 00 00 00 42 02 00 00 a1 86 fb 69 21 e4 0d 00  ....B......i!...
     0000009a1b1ff858 36 27 00 00 42 02 00 00 00 00 00 00 9a 00 00 00  6'..B...........
     0000009a1b1ff868 00 00 00 00 fa 7f 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff878 e8 0d 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1b1ff888 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff898 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1b1ff8a8 00 00 00 00 00 00 00 00 30 28 cd 7f 42 02 00 00  ........0(..B...
     0000009a1b1ff8b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff8c8 f2 9e 02 a1 f6 7f 00 00                          ........        
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x7c9ef2
    rsp = 0x0000009a1b1ff8d0   rip = 0x00007ff6a1029ef2
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff8e0 30 28 cd 7f 42 02 00 00 00 00 00 00 00 00 00 00  0(..B...........
     0000009a1b1ff8f0 00 00 00 00 00 00 00 00 dd 99 02 a1 f6 7f 00 00  ................
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0x7c99dd
    rsp = 0x0000009a1b1ff900   rip = 0x00007ff6a10299dd
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff910 c0 dd 9f 7f 42 02 00 00 01 00 00 00 00 00 00 00  ....B...........
     0000009a1b1ff920 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1b1ff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff940 b0 5a 9f 7f 00 00 00 00 00 00 00 00 00 00 00 00  .Z..............
     0000009a1b1ff950 40 59 cd 7f 42 02 00 00 eb c2 fd a1 f6 7f 00 00  @Y..B...........
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x177c2eb
    rsp = 0x0000009a1b1ff960   rip = 0x00007ff6a1fdc2eb
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff960 b0 1e 49 a1 f6 7f 00 00                          ..I.....        
    Possible instruction pointers:

24  qemu-system-x86_64.exe + 0xc31eb0
    rsp = 0x0000009a1b1ff968   rip = 0x00007ff6a1491eb0
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff968 b0 6f 49 a1 f6 7f 00 00                          .oI.....        
    Possible instruction pointers:

25  qemu-system-x86_64.exe + 0xc36fb0
    rsp = 0x0000009a1b1ff970   rip = 0x00007ff6a1496fb0
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff980 30 1b 49 a1 f6 7f 00 00                          0.I.....        
    Possible instruction pointers:

26  qemu-system-x86_64.exe + 0xc31b30
    rsp = 0x0000009a1b1ff988   rip = 0x00007ff6a1491b30
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff988 80 9a 02 a1 f6 7f 00 00                          ........        
    Possible instruction pointers:

27  qemu-system-x86_64.exe + 0x7c9a80
    rsp = 0x0000009a1b1ff990   rip = 0x00007ff6a1029a80
    Found by: stack scanning

    Stack contents:
     0000009a1b1ff990 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00  ................
     0000009a1b1ff9a0 a0 f9 1f 1b 9a 00 00 00 a0 f9 1f 1b 9a 00 00 00  ................
     0000009a1b1ff9b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ff9c0 30 58 c1 7f 42 02 00 00 00 00 00 00 00 00 00 00  0X..B...........
     0000009a1b1ff9d0 d0 f9 1f 1b 9a 00 00 00 d0 f9 1f 1b 9a 00 00 00  ................
     0000009a1b1ff9e0 01 00 00 00 00 00 00 00 70 a5 60 01 42 02 00 00  ........p.`.B...
     0000009a1b1ff9f0 fe ff ff ff ff ff ff ff c0 d5 9f 7f 42 02 00 00  ............B...
     0000009a1b1ffa00 c0 fa 1f 1b 9a 00 00 00 40 59 cd 7f 42 02 00 00  ........@Y..B...
     0000009a1b1ffa10 30 a8 5e a4 f6 7f 00 00                          0.^.....        
    Possible instruction pointers:

28  qemu-system-x86_64.exe + 0x3d8a830
    rsp = 0x0000009a1b1ffa18   rip = 0x00007ff6a45ea830
    Found by: stack scanning

    Stack contents:
     0000009a1b1ffa18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffa28 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ...............
     0000009a1b1ffa38 ce 66 d3 a0 f6 7f 00 00                          .f......        
    Possible instruction pointers:

29  qemu-system-x86_64.exe + 0x4d66ce
    rsp = 0x0000009a1b1ffa40   rip = 0x00007ff6a0d366ce
    Found by: stack scanning

    Stack contents:
     0000009a1b1ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffa70 b0 fa 1f 1b 9a 00 00 00 d0 fa 1f 1b 9a 00 00 00  ................
     0000009a1b1ffa80 90 9f 5b 01 42 02 00 00 d0 9f 5b 01 42 02 00 00  ..[.B.....[.B...
     0000009a1b1ffa90 d0 9f 5b 01 42 02 00 00 40 59 cd 7f 42 02 00 00  ..[.B...@Y..B...
     0000009a1b1ffaa0 50 59 cd 7f 42 02 00 00 50 59 cd 7f 42 02 00 00  PY..B...PY..B...
     0000009a1b1ffab0 c0 d5 9f 7f 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1b1ffac0 20 00 00 00 00 00 00 00 2f 00 00 00 00 00 00 00   ......./.......
     0000009a1b1ffad0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffae0 00 00 00 00 00 00 00 00 d0 66 9e 7f 42 02 00 00  .........f..B...
     0000009a1b1ffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffb00 00 00 00 00 00 00 00 00 f0 8b dc a0 f6 7f 00 00  ................
    Possible instruction pointers:

30  qemu-system-x86_64.exe + 0x568bf0
    rsp = 0x0000009a1b1ffb10   rip = 0x00007ff6a0dc8bf0
    Found by: stack scanning

    Stack contents:
     0000009a1b1ffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffb40 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

31  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b1ffb50   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b1ffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b1ffb70 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

32  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b1ffb80   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 10
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1b2ff5a0
    rcx = 0x000002427fa44a48   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fa44a48
    rbp = 0x0000009a1b2ff550   rsp = 0x0000009a1b2ff4f8
     r8 = 0x0000000000000002    r9 = 0x0000009a1b2ff758
    r10 = 0x0000000000000013   r11 = 0x0000000000000000
    r12 = 0x0000009a1b2ff5a0   r13 = 0x0000000000000000
    r14 = 0x0000009a1b2ff520   r15 = 0x000002427fa44a90
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b2ff4f8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1b2ff5a0
    rcx = 0x000002427fa44a48   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fa44a48
    rbp = 0x0000009a1b2ff550   rsp = 0x0000009a1b2ff500
     r8 = 0x0000000000000002    r9 = 0x0000009a1b2ff758
    r10 = 0x0000000000000013   r11 = 0x0000000000000000
    r12 = 0x0000009a1b2ff5a0   r13 = 0x0000000000000000
    r14 = 0x0000009a1b2ff520   r15 = 0x000002427fa44a90
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b2ff500 d8 9b 63 a3 f6 7f 00 00                          ..c.....        
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x2dd9bd8
    rbp = 0x0000009a1b2ff550   rsp = 0x0000009a1b2ff508
    rip = 0x00007ff6a3639bd8
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff508 10 f6 41 a1 f6 7f 00 00                          ..A.....        
    Possible instruction pointers:

 3  qemu-system-x86_64.exe + 0xbbf610
    rbp = 0x0000009a1b2ff550   rsp = 0x0000009a1b2ff510
    rip = 0x00007ff6a141f610
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff510 00 00 00 00 00 00 00 00 cc 11 00 00 00 00 00 00  ................
     0000009a1b2ff520 00 00 00 00 00 00 00 00 20 f5 2f 1b 9a 00 00 00  ........ ./.....
     0000009a1b2ff530 00 00 00 00 00 00 00 00 cc 11 00 00 00 00 00 00  ................
     0000009a1b2ff540 fe ff ff ff 01 00 00 00 48 4a a4 7f 42 02 00 00  ........HJ..B...
     0000009a1b2ff550 88 4a a4 7f 42 02 00 00 0f 27 00 00 00 00 00 00  .J..B....'......
     0000009a1b2ff560 00 00 4f 91 94 4e 00 00 f3 8c 90 94 07 fc f4 b2  ..O..N..........
     0000009a1b2ff570 00 34 b6 d7 82 de 1b 43 69 dc cf 84 fa 7f 00 00  .4.....Ci.......
    Possible instruction pointers:

 4  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1b2ff580   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff590 38 4a a4 7f 42 02 00 00 f3 8c 90 94 07 fc f4 b2  8J..B...........
     0000009a1b2ff5a0 10 46 0a fa ff ff ff ff 10 f6 41 a1 f6 7f 00 00  .F........A.....
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0xbbf610
    rsp = 0x0000009a1b2ff5b0   rip = 0x00007ff6a141f610
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff5b0 00 00 00 00 00 00 00 00 c4 df ff a1 f6 7f 00 00  ................
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x179dfc4
    rsp = 0x0000009a1b2ff5c0   rip = 0x00007ff6a1ffdfc4
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff5c0 10 f7 2f 1b 9a 00 00 00 bf 32 1a 6a fa 7f 00 00  ../......2.j....
    Possible instruction pointers:

 7  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1b2ff5d0   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff5d0 88 4a a4 7f 42 02 00 00 10 f7 2f 1b 9a 00 00 00  .J..B...../.....
     0000009a1b2ff5e0 20 7d 22 c5 ca 00 00 00 80 96 98 00 00 00 00 00   }".............
     0000009a1b2ff5f0 10 f7 2f 1b 9a 00 00 00 ab 28 41 a1 f6 7f 00 00  ../......(A.....
    Possible instruction pointers:

 8  qemu-system-x86_64.exe + 0xbb28ab
    rsp = 0x0000009a1b2ff600   rip = 0x00007ff6a14128ab
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff600 88 4a a4 7f 42 02 00 00 db 34 b6 d7 82 de 1b 43  .J..B....4.....C
     0000009a1b2ff610 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff620 00 00 00 00 00 00 00 00 88 4a a4 7f 42 02 00 00  .........J..B...
     0000009a1b2ff630 f0 f6 2f 1b 9a 00 00 00 38 4a a4 7f 42 02 00 00  ../.....8J..B...
     0000009a1b2ff640 20 4a a4 7f 42 02 00 00 f3 8c 90 94 07 fc f4 b2   J..B...........
     0000009a1b2ff650 00 00 00 00 00 00 00 00 10 f7 2f 1b 9a 00 00 00  ........../.....
     0000009a1b2ff660 d0 f6 2f 1b 9a 00 00 00 33 25 41 a1 f6 7f 00 00  ../.....3%A.....
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0xbb2533
    rsp = 0x0000009a1b2ff670   rip = 0x00007ff6a1412533
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff670 97 a8 21 01 02 00 00 00 00 00 00 00 42 02 00 00  ..!.........B...
     0000009a1b2ff680 88 4a a4 7f 42 02 00 00 00 00 00 00 00 00 00 00  .J..B...........
     0000009a1b2ff690 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff6a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff6c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff6d0 0f 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .'..............
     0000009a1b2ff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff710 38 4a a4 7f 42 02 00 00 01 00 ce 84 fa 7f 00 00  8J..B...........
    Possible instruction pointers:

10  KERNELBASE.dll + 0x50001
    rsp = 0x0000009a1b2ff720   rip = 0x00007ffa84ce0001
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff720 fe ff ff ff ff ff ff ff 90 a0 60 01 42 02 00 00  ..........`.B...
     0000009a1b2ff730 00 00 00 00 00 00 00 00 80 59 c1 7f 42 02 00 00  .........Y..B...
     0000009a1b2ff740 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff760 90 f7 2f 1b 9a 00 00 00 1e 2b 41 a1 f6 7f 00 00  ../......+A.....
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0xbb2b1e
    rsp = 0x0000009a1b2ff770   rip = 0x00007ff6a1412b1e
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff770 70 d0 5e 01 42 02 00 00 36 30 78 84 fa 7f 00 00  p.^.B...60x.....
    Possible instruction pointers:

12  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1b2ff780   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff790 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff7a0 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

13  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1b2ff7b0   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff7b0 90 a0 60 01 42 02 00 00 00 00 00 00 00 00 00 00  ..`.B...........
     0000009a1b2ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff7d0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

14  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b2ff7e0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b2ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b2ff800 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

15  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b2ff810   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 11
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x000002427fcd5f60
    rcx = 0x0000000000000002   rbx = 0x0000000000000002
    rsi = 0x0000000000000000   rdi = 0x0000000000000002
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff208
     r8 = 0x0000000000000002    r9 = 0x0000009a1b3ff738
    r10 = 0x0000000000000013   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x000002427fcd5f60
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b3ff208 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x000002427fcd5f60
    rcx = 0x0000000000000002   rbx = 0x0000000000000002
    rsi = 0x0000000000000000   rdi = 0x0000000000000002
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff210
     r8 = 0x0000000000000002    r9 = 0x0000009a1b3ff738
    r10 = 0x0000000000000013   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x000002427fcd5f60
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b3ff210 70 00 00 00 00 00 00 00 6b b8 f5 86 fa 7f 00 00  p.......k.......
    Possible instruction pointers:

 2  ntdll.dll + 0x2b86b
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff220
    rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff220 23 00 18 00 00 00 00 00 64 00 00 00 00 00 00 00  #.......d.......
     0000009a1b3ff230 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff240 00 60 72 1a 9a 00 00 00 00 60 72 1a 9a 00 00 00  .`r......`r.....
     0000009a1b3ff250 02 00 00 00 00 00 00 00 40 0e 8e 7f 42 02 00 00  ........@...B...
     0000009a1b3ff260 01 00 00 00 00 00 00 00 00 00 8e 7f 42 02 00 00  ............B...
     0000009a1b3ff270 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  H...............
     0000009a1b3ff280 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff290 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff2a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff2b0 00 00 00 00 00 00 00 00 6e 00 00 00 00 00 00 00  ........n.......
     0000009a1b3ff2c0 30 5c 9f 7f 42 02 00 00 89 f3 3f 1b 9a 00 00 00  0\..B.....?.....
     0000009a1b3ff2d0 00 00 00 00 00 00 00 00 40 17 8e 7f 42 02 00 00  ........@...B...
     0000009a1b3ff2e0 00 00 00 00 42 02 00 00 40 17 8e 7f 42 02 00 00  ....B...@...B...
     0000009a1b3ff2f0 a8 02 8e 7f 42 02 00 00 00 00 8e 7f 42 02 00 00  ....B.......B...
     0000009a1b3ff300 a8 02 8e 7f 42 02 00 00 6b b8 f5 86 fa 7f 00 00  ....B...k.......
    Possible instruction pointers:

 3  ntdll.dll + 0x2b86b
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff310
    rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff310 20 00 00 00 00 00 00 00 c0 0c 8e 7f 42 02 00 00   ...........B...
     0000009a1b3ff320 b0 5a 9f 7f 42 02 00 00 00 00 00 00 00 00 00 00  .Z..B...........
     0000009a1b3ff330 00 00 00 00 00 00 00 00 20 00 00 00 00 00 00 00  ........ .......
     0000009a1b3ff340 18 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................
     0000009a1b3ff350 00 00 96 7f 42 02 00 00 19 f4 3f 1b 9a 00 00 00  ....B.....?.....
     0000009a1b3ff360 02 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

 4  ntdll.dll + 0x2b3c7
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff370
    rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff370 00 00 8e 7f 42 02 00 00 00 00 00 00 42 02 00 00  ....B.......B...
     0000009a1b3ff380 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff390 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00  ........@.......
     0000009a1b3ff3a0 30 00 00 00 02 00 00 00 10 00 00 00 00 00 00 00  0...............
     0000009a1b3ff3b0 00 00 96 7f 42 02 00 00 a1 5b f5 86 fa 7f 00 00  ....B....[......
    Possible instruction pointers:

 5  ntdll.dll + 0x25ba1
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff3c0
    rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff3c0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff3d0 00 00 8e 7f 42 02 00 00 a1 5b f5 86 fa 7f 00 00  ....B....[......
    Possible instruction pointers:

 6  ntdll.dll + 0x25ba1
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff3e0
    rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff3e0 30 00 00 00 00 00 00 00 00 00 00 00 42 02 00 00  0...........B...
     0000009a1b3ff3f0 20 d7 97 7f 42 02 00 00 0f 00 00 00 fa 7f 00 00   ...B...........
     0000009a1b3ff400 00 00 8e 7f 02 00 00 00 30 8d 98 7f 42 02 00 00  ........0...B...
     0000009a1b3ff410 30 5c 9f 7f 42 02 00 00 aa 00 00 00 42 02 00 00  0\..B.......B...
     0000009a1b3ff420 00 00 8e 7f 42 02 00 00 90 4e cd 7f 42 02 00 00  ....B....N..B...
     0000009a1b3ff430 e0 f5 3f 1b 9a 00 00 00 08 00 00 00 00 00 00 00  ..?.............
     0000009a1b3ff440 00 00 8e 7f 42 02 00 00 a0 b2 5b 01 42 02 00 00  ....B.....[.B...
     0000009a1b3ff450 80 d8 9f 7f 42 02 00 00 40 64 cd 7f 42 02 00 00  ....B...@d..B...
     0000009a1b3ff460 00 e1 9f 7f 42 02 00 00 d0 f5 3f 1b 9a 00 00 00  ....B.....?.....
     0000009a1b3ff470 80 d8 9f 7f 42 02 00 00 40 64 cd 7f 42 02 00 00  ....B...@d..B...
     0000009a1b3ff480 00 e1 9f 7f 42 02 00 00 d0 f5 3f 1b 9a 00 00 00  ....B.....?.....
     0000009a1b3ff490 40 64 cd 7f 42 02 00 00 b1 47 f5 86 fa 7f 00 00  @d..B....G......
    Possible instruction pointers:

 7  ntdll.dll + 0x247b1
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff4a0
    rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff4a0 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1b3ff4b0 c0 f5 3f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ..?.............
     0000009a1b3ff4c0 ae 1e b8 ee af 18 00 00 a0 9a 98 7f 42 02 00 00  ............B...
     0000009a1b3ff4d0 80 d8 9f 7f 42 02 00 00 40 64 cd 7f 42 02 00 00  ....B...@d..B...
     0000009a1b3ff4e0 c0 ed 9f 7f 42 02 00 00 d0 f5 3f 1b 9a 00 00 00  ....B.....?.....
     0000009a1b3ff4f0 10 b1 5b 01 42 02 00 00 8e 04 ce 84 fa 7f 00 00  ..[.B...........
    Possible instruction pointers:

 8  KERNELBASE.dll + 0x5048e
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff500
    rip = 0x00007ffa84ce048e
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff500 10 b1 5b 01 42 02 00 00 a9 26 01 a1 f6 7f 00 00  ..[.B....&......
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0x7b26a9
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff510
    rip = 0x00007ff6a10126a9
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff510 d8 05 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1b3ff520 00 00 00 00 42 02 00 00 01 00 00 00 00 00 00 00  ....B...........
     0000009a1b3ff530 01 00 00 00 00 00 00 00 26 08 01 a1 f6 7f 00 00  ........&.......
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x7b0826
    rbp = 0x0000009a1b3ff5c0   rsp = 0x0000009a1b3ff540
    rip = 0x00007ff6a1010826
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff540 fc 05 00 00 00 00 00 00 c0 f5 3f 1b 9a 00 00 00  ..........?.....
     0000009a1b3ff550 d8 05 00 00 00 00 00 00 00 00 00 00 9a 00 00 00  ................
     0000009a1b3ff560 80 f5 3f 1b 9a 00 00 00 eb f5 3f 1b 9a 00 00 00  ..?.......?.....
     0000009a1b3ff570 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff580 ec f5 3f 1b 9a 00 00 00 00 ea 9f 7f 42 02 00 00  ..?.........B...
     0000009a1b3ff590 02 00 00 00 00 00 00 00 b0 f6 3f 1b 9a 00 00 00  ..........?.....
     0000009a1b3ff5a0 60 5f cd 7f 42 02 00 00 70 5f cd 7f 42 02 00 00  `_..B...p_..B...
     0000009a1b3ff5b0 70 5f cd 7f 42 02 00 00 b0 f6 3f 1b 9a 00 00 00  p_..B.....?.....
     0000009a1b3ff5c0 80 af 5b 01 42 02 00 00 02 00 00 00 00 00 00 00  ..[.B...........
     0000009a1b3ff5d0 a0 b2 5b 01 42 02 00 00 01 00 00 00 42 02 00 00  ..[.B.......B...
     0000009a1b3ff5e0 38 06 00 00 00 00 00 00 38 00 00 00 d8 05 00 00  8.......8.......
     0000009a1b3ff5f0 fe ff ff ff ff ff ff ff 00 af 60 01 42 02 00 00  ..........`.B...
     0000009a1b3ff600 00 00 00 00 00 00 00 00 30 5a c1 7f 42 02 00 00  ........0Z..B...
     0000009a1b3ff610 b0 f6 3f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ..?.............
     0000009a1b3ff620 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff630 c0 f6 3f 1b 9a 00 00 00 d0 5a 01 a1 f6 7f 00 00  ..?......Z......
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x7b5ad0
    rsp = 0x0000009a1b3ff640   rip = 0x00007ff6a1015ad0
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff650 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff660 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff670 70 59 9e 7f 42 02 00 00 88 59 9e 7f 42 02 00 00  pY..B....Y..B...
     0000009a1b3ff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff690 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff6a0 28 59 9e 7f 42 02 00 00 40 59 9e 7f 42 02 00 00  (Y..B...@Y..B...
     0000009a1b3ff6b0 80 d8 9f 7f 42 02 00 00 02 00 00 00 00 00 00 00  ....B...........
     0000009a1b3ff6c0 00 e1 9f 7f 42 02 00 00 01 00 00 00 00 00 00 00  ....B...........
     0000009a1b3ff6d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff6e0 10 59 9e 7f 42 02 00 00 fe ff ff ff ff ff ff ff  .Y..B...........
     0000009a1b3ff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff700 00 00 00 00 00 00 00 00 00 af 60 01 42 02 00 00  ..........`.B...
     0000009a1b3ff710 00 00 00 00 00 00 00 00 30 5a c1 7f 42 02 00 00  ........0Z..B...
     0000009a1b3ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff740 70 f7 3f 1b 9a 00 00 00 0e 61 01 a1 f6 7f 00 00  p.?......a......
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x7b610e
    rsp = 0x0000009a1b3ff750   rip = 0x00007ff6a101610e
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff750 40 d8 5e 01 42 02 00 00 36 30 78 84 fa 7f 00 00  @.^.B...60x.....
    Possible instruction pointers:

13  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1b3ff760   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff770 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff780 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

14  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1b3ff790   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff790 00 af 60 01 42 02 00 00 00 00 00 00 00 00 00 00  ..`.B...........
     0000009a1b3ff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff7b0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

15  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b3ff7c0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b3ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b3ff7e0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

16  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b3ff7f0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 12
 0  ntdll.dll + 0x9d744
    rax = 0x0000000000000034   rdx = 0x0000009a1b4ffcb0
    rcx = 0x0000000000000000   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000064
    rbp = 0x0000009a1b4ffdb0   rsp = 0x0000009a1b4ffc88
     r8 = 0x0000009a1b4ffc88    r9 = 0x0000009a1b4ffdb0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000009a1b4ffd68
    r14 = 0x0000000000000000   r15 = 0x0000009a1b4ffd60
    rip = 0x00007ffa86fcd744
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b4ffc88 6e b1 cd 84 fa 7f 00 00                          n.......        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x4b16e
    rax = 0x0000000000000034   rdx = 0x0000009a1b4ffcb0
    rcx = 0x0000000000000000   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000064
    rbp = 0x0000009a1b4ffdb0   rsp = 0x0000009a1b4ffc90
     r8 = 0x0000009a1b4ffc88    r9 = 0x0000009a1b4ffdb0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000009a1b4ffd68
    r14 = 0x0000000000000000   r15 = 0x0000009a1b4ffd60
    rip = 0x00007ffa84cdb16e
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b4ffc90 48 fd 4f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  H.O.............
     0000009a1b4ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffcb0 c0 bd f0 ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffcc0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  H...............
     0000009a1b4ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffcf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd10 a8 5b 5e a4 f6 7f 00 00                          .[^.....        
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x3d85ba8
    rbp = 0x0000009a1b4ffdb0   rsp = 0x0000009a1b4ffd18
    rip = 0x00007ff6a45e5ba8
    Found by: stack scanning

    Stack contents:
     0000009a1b4ffd18 b0 58 c1 7f 42 02 00 00 30 10 28 7d fa 7f 00 00  .X..B...0.(}....
    Possible instruction pointers:

 3  libandroid-emu-agents.dll + 0x1030
    rbp = 0x0000009a1b4ffdb0   rsp = 0x0000009a1b4ffd28
    rip = 0x00007ffa7d281030
    Found by: stack scanning

    Stack contents:
     0000009a1b4ffd28 7a c9 d2 a0 f6 7f 00 00                          z.......        
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x4cc97a
    rbp = 0x0000009a1b4ffdb0   rsp = 0x0000009a1b4ffd30
    rip = 0x00007ff6a0d2c97a
    Found by: stack scanning

    Stack contents:
     0000009a1b4ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd40 bb 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffd90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffda0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffdb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffdc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffdd0 00 00 00 00 00 00 00 00 fe ff ff ff ff ff ff ff  ................
     0000009a1b4ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffdf0 00 00 00 00 00 00 00 00 50 b0 60 01 42 02 00 00  ........P.`.B...
     0000009a1b4ffe00 00 00 00 00 00 00 00 00 b0 58 c1 7f 42 02 00 00  .........X..B...
     0000009a1b4ffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffe20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffe30 60 fe 4f 1b 9a 00 00 00 b8 1d c9 a0 f6 7f 00 00  `.O.............
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x431db8
    rsp = 0x0000009a1b4ffe40   rip = 0x00007ff6a0c91db8
    Found by: stack scanning

    Stack contents:
     0000009a1b4ffe40 60 ce c9 7f 42 02 00 00 36 30 78 84 fa 7f 00 00  `...B...60x.....
    Possible instruction pointers:

 6  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1b4ffe50   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1b4ffe50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffe60 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffe70 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

 7  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1b4ffe80   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1b4ffe80 50 b0 60 01 42 02 00 00 00 00 00 00 00 00 00 00  P.`.B...........
     0000009a1b4ffe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffea0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 8  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b4ffeb0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b4ffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffec0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b4ffed0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 9  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b4ffee0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 13
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x000002427fc15820
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff838
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x000002427fc15820
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b5ff838 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x000002427fc15820
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff840
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x000002427fc15820
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b5ff840 00 00 00 00 00 00 00 00 6b b8 f5 86 fa 7f 00 00  ........k.......
    Possible instruction pointers:

 2  ntdll.dll + 0x2b86b
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff850
    rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1b5ff850 1e 00 14 00 00 00 00 00 6f 00 00 00 00 00 00 00  ........o.......
     0000009a1b5ff860 00 00 00 00 00 00 00 00 77 78 f4 86 fa 7f 00 00  ........wx......
    Possible instruction pointers:

 3  ntdll.dll + 0x17877
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff870
    rip = 0x00007ffa86f47877
    Found by: stack scanning

    Stack contents:
     0000009a1b5ff870 aa 78 f4 86 fa 7f 00 00                          .x......        
    Possible instruction pointers:

 4  ntdll.dll + 0x178aa
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff878
    rip = 0x00007ffa86f478aa
    Found by: stack scanning

    Stack contents:
     0000009a1b5ff878 00 60 72 1a 9a 00 00 00 01 00 00 00 00 00 00 00  .`r.............
     0000009a1b5ff888 40 0e 8e 7f 42 02 00 00 00 00 00 00 00 00 00 00  @...B...........
     0000009a1b5ff898 00 00 8e 7f 42 02 00 00 48 00 00 00 00 00 00 00  ....B...H.......
     0000009a1b5ff8a8 01 00 00 00 ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1b5ff8b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b5ff8c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b5ff8d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b5ff8e8 74 00 00 00 00 00 00 00 30 5c 9f 7f 42 02 00 00  t.......0\..B...
     0000009a1b5ff8f8 b9 f9 5f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  .._.............
     0000009a1b5ff908 c0 18 8e 7f 42 02 00 00 00 00 00 00 42 02 00 00  ....B.......B...
     0000009a1b5ff918 40 17 8e 7f 42 02 00 00 a4 02 8e 7f 42 02 00 00  @...B.......B...
     0000009a1b5ff928 00 00 8e 7f 42 02 00 00 a8 02 8e 7f 42 02 00 00  ....B.......B...
     0000009a1b5ff938 6b b8 f5 86 fa 7f 00 00                          k.......        
    Possible instruction pointers:

 5  ntdll.dll + 0x2b86b
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff940
    rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1b5ff940 20 00 00 00 00 00 00 00 c0 0c 8e 7f 42 02 00 00   ...........B...
     0000009a1b5ff950 b0 5a 9f 7f 42 02 00 00 00 00 00 00 00 00 00 00  .Z..B...........
     0000009a1b5ff960 00 00 00 00 00 00 00 00 20 00 00 00 00 00 00 00  ........ .......
     0000009a1b5ff970 18 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................
     0000009a1b5ff980 00 00 96 7f 42 02 00 00 49 fa 5f 1b 9a 00 00 00  ....B...I._.....
     0000009a1b5ff990 02 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

 6  ntdll.dll + 0x2b3c7
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff9a0
    rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1b5ff9a0 00 00 8e 7f 42 02 00 00 00 00 00 00 42 02 00 00  ....B.......B...
     0000009a1b5ff9b0 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b5ff9c0 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00  ........@.......
     0000009a1b5ff9d0 30 00 00 00 02 00 00 00 10 00 00 00 00 00 00 00  0...............
     0000009a1b5ff9e0 00 00 96 7f 42 02 00 00 a1 5b f5 86 fa 7f 00 00  ....B....[......
    Possible instruction pointers:

 7  ntdll.dll + 0x25ba1
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ff9f0
    rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1b5ff9f0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b5ffa00 00 00 8e 7f 42 02 00 00 a1 5b f5 86 fa 7f 00 00  ....B....[......
    Possible instruction pointers:

 8  ntdll.dll + 0x25ba1
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ffa10
    rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1b5ffa10 30 00 00 00 00 00 00 00 00 00 00 00 fa 7f 00 00  0...............
     0000009a1b5ffa20 20 d7 97 7f 42 02 00 00 1d 00 00 00 fa 7f 00 00   ...B...........
     0000009a1b5ffa30 60 fa 5f 1b 02 00 00 00 30 8d 98 7f 42 02 00 00  `._.....0...B...
     0000009a1b5ffa40 30 5c 9f 7f 42 02 00 00 cc 00 00 00 42 02 00 00  0\..B.......B...
     0000009a1b5ffa50 00 00 8e 7f 42 02 00 00 90 4e cd 7f 42 02 00 00  ....B....N..B...
     0000009a1b5ffa60 10 fc 5f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  .._.............
     0000009a1b5ffa70 00 00 8e 7f 42 02 00 00 40 b3 5b 01 42 02 00 00  ....B...@.[.B...
     0000009a1b5ffa80 c0 e6 9f 7f 42 02 00 00 80 68 cd 7f 42 02 00 00  ....B....h..B...
     0000009a1b5ffa90 80 e2 9f 7f 42 02 00 00 00 fc 5f 1b 9a 00 00 00  ....B....._.....
     0000009a1b5ffaa0 c0 e6 9f 7f 42 02 00 00 80 68 cd 7f 42 02 00 00  ....B....h..B...
     0000009a1b5ffab0 80 e2 9f 7f 42 02 00 00 00 fc 5f 1b 9a 00 00 00  ....B....._.....
     0000009a1b5ffac0 80 68 cd 7f 42 02 00 00 b1 47 f5 86 fa 7f 00 00  .h..B....G......
    Possible instruction pointers:

 9  ntdll.dll + 0x247b1
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ffad0
    rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1b5ffad0 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1b5ffae0 f0 fb 5f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  .._.............
     0000009a1b5ffaf0 fe 14 d8 ee af 18 00 00 e0 a6 98 7f 42 02 00 00  ............B...
     0000009a1b5ffb00 c0 e6 9f 7f 42 02 00 00 80 68 cd 7f 42 02 00 00  ....B....h..B...
     0000009a1b5ffb10 80 e2 9f 7f 42 02 00 00 00 fc 5f 1b 9a 00 00 00  ....B....._.....
     0000009a1b5ffb20 30 b9 5b 01 42 02 00 00 8e 04 ce 84 fa 7f 00 00  0.[.B...........
    Possible instruction pointers:

10  KERNELBASE.dll + 0x5048e
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ffb30
    rip = 0x00007ffa84ce048e
    Found by: stack scanning

    Stack contents:
     0000009a1b5ffb30 30 b9 5b 01 42 02 00 00 a9 26 01 a1 f6 7f 00 00  0.[.B....&......
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x7b26a9
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ffb40
    rip = 0x00007ff6a10126a9
    Found by: stack scanning

    Stack contents:
     0000009a1b5ffb40 bc 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b5ffb50 00 00 00 00 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1b5ffb60 00 00 00 00 00 00 00 00 26 08 01 a1 f6 7f 00 00  ........&.......
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x7b0826
    rbp = 0x0000009a1b5ffbf0   rsp = 0x0000009a1b5ffb70
    rip = 0x00007ff6a1010826
    Found by: stack scanning

    Stack contents:
     0000009a1b5ffb70 58 fd 5f 1b 9a 00 00 00 f0 fb 5f 1b 9a 00 00 00  X._......._.....
     0000009a1b5ffb80 bc 05 00 00 00 00 00 00 00 00 00 00 9a 00 00 00  ................
     0000009a1b5ffb90 b0 fb 5f 1b 9a 00 00 00 1b fc 5f 1b 9a 00 00 00  .._......._.....
     0000009a1b5ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b5ffbb0 1c fc 5f 1b 9a 00 00 00 80 e5 9f 7f 42 02 00 00  .._.........B...
     0000009a1b5ffbc0 01 00 00 00 00 00 00 00 00 fd 5f 1b 9a 00 00 00  .........._.....
     0000009a1b5ffbd0 20 58 c1 7f 42 02 00 00 28 58 c1 7f 42 02 00 00   X..B...(X..B...
     0000009a1b5ffbe0 28 58 c1 7f 42 02 00 00 00 fd 5f 1b 9a 00 00 00  (X..B....._.....
     0000009a1b5ffbf0 40 b3 5b 01 42 02 00 00 01 00 00 00 00 00 00 00  @.[.B...........
     0000009a1b5ffc00 40 b3 5b 01 42 02 00 00 00 00 00 00 42 02 00 00  @.[.B.......B...
     0000009a1b5ffc10 70 04 00 00 00 00 00 00 38 00 00 00 bc 05 00 00  p.......8.......
     0000009a1b5ffc20 fe ff ff ff ff ff ff ff 58 fd 5f 1b 9a 00 00 00  ........X._.....
     0000009a1b5ffc30 10 fd 5f 1b 9a 00 00 00 00 fd 5f 1b 9a 00 00 00  .._......._.....
     0000009a1b5ffc40 00 00 00 00 00 00 00 00 c0 fc 5f 1b 9a 00 00 00  .........._.....
     0000009a1b5ffc50 e0 fc 5f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  .._.............
     0000009a1b5ffc60 f0 fc 5f 1b 9a 00 00 00 51 eb d2 a0 f6 7f 00 00  .._.....Q.......
    Possible instruction pointers:

13  qemu-system-x86_64.exe + 0x4ceb51
    rsp = 0x0000009a1b5ffc70   rip = 0x00007ff6a0d2eb51
    Found by: stack scanning

Thread 14
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1b6ffcc0
    rcx = 0x000002427f974b38   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427f974b38
    rbp = 0x0000009a1b6ffc70   rsp = 0x0000009a1b6ffc18
     r8 = 0x00007ff6a300d57c    r9 = 0x0000000000000005
    r10 = 0x0000009a1b6ff747   r11 = 0x00000242234dc074
    r12 = 0x0000009a1b6ffcc0   r13 = 0x0000000000000000
    r14 = 0x0000009a1b6ffc40   r15 = 0x000002427f974ae8
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b6ffc18 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1b6ffcc0
    rcx = 0x000002427f974b38   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427f974b38
    rbp = 0x0000009a1b6ffc70   rsp = 0x0000009a1b6ffc20
     r8 = 0x00007ff6a300d57c    r9 = 0x0000000000000005
    r10 = 0x0000009a1b6ff747   r11 = 0x00000242234dc074
    r12 = 0x0000009a1b6ffcc0   r13 = 0x0000000000000000
    r14 = 0x0000009a1b6ffc40   r15 = 0x000002427f974ae8
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b6ffc20 00 00 00 00 00 00 00 00 f8 fc 6f 1b 9a 00 00 00  ..........o.....
     0000009a1b6ffc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffc40 00 00 00 00 00 00 00 00 40 fc 6f 1b 9a 00 00 00  ........@.o.....
     0000009a1b6ffc50 00 00 00 00 00 00 00 00 a8 27 00 00 00 00 00 00  .........'......
     0000009a1b6ffc60 02 01 00 00 01 00 00 00 38 4b 97 7f 42 02 00 00  ........8K..B...
     0000009a1b6ffc70 e0 4a 97 7f 42 02 00 00 e8 03 00 00 00 00 00 00  .J..B...........
     0000009a1b6ffc80 00 00 4f 91 94 4e 00 00 ff 35 65 c4 ff ff ff 7f  ..O..N...5e.....
     0000009a1b6ffc90 00 34 b6 d7 82 de 1b 43 69 dc cf 84 fa 7f 00 00  .4.....Ci.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1b6ffca0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffcb0 28 4b 97 7f 42 02 00 00 f7 2c 1a 6a fa 7f 00 00  (K..B....,.j....
    Possible instruction pointers:

 3  MSVCP140.dll + 0x12cf7
    rsp = 0x0000009a1b6ffcc0   rip = 0x00007ffa6a1a2cf7
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffcc0 80 69 67 ff ff ff ff ff 00 00 00 00 00 00 00 00  .ig.............
     0000009a1b6ffcd0 00 00 00 00 00 00 00 00 c4 df ff a1 f6 7f 00 00  ................
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x179dfc4
    rsp = 0x0000009a1b6ffce0   rip = 0x00007ff6a1ffdfc4
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffce0 28 4b 97 7f 42 02 00 00 bf 32 1a 6a fa 7f 00 00  (K..B....2.j....
    Possible instruction pointers:

 5  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1b6ffcf0   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffcf0 94 ed 20 66 c9 00 00 00 a5 86 fb 69 2b 75 00 00  .. f.......i+u..
     0000009a1b6ffd00 f3 8c 90 94 07 fc f4 b2 80 96 98 00 00 00 00 00  ................
     0000009a1b6ffd10 28 4b 97 7f 42 02 00 00 eb 33 d3 a0 f6 7f 00 00  (K..B....3......
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x4d33eb
    rsp = 0x0000009a1b6ffd20   rip = 0x00007ff6a0d333eb
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffd20 94 ed 20 66 c9 00 00 00 db 34 b6 d7 82 de 1b 43  .. f.....4.....C
     0000009a1b6ffd30 e0 4a 97 7f 42 02 00 00 5b 00 ce 84 fa 7f 00 00  .J..B...[.......
    Possible instruction pointers:

 7  KERNELBASE.dll + 0x5005b
    rsp = 0x0000009a1b6ffd40   rip = 0x00007ffa84ce005b
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffd40 00 00 00 00 00 00 00 00 e0 bf 60 01 42 02 00 00  ..........`.B...
     0000009a1b6ffd50 b0 fd 6f 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ..o.............
     0000009a1b6ffd60 e0 56 c1 7f 42 02 00 00 00 00 00 00 00 00 00 00  .V..B...........
     0000009a1b6ffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffd80 00 00 00 00 00 00 00 00 7e 3f d3 a0 f6 7f 00 00  ........~?......
    Possible instruction pointers:

 8  qemu-system-x86_64.exe + 0x4d3f7e
    rsp = 0x0000009a1b6ffd90   rip = 0x00007ff6a0d33f7e
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffd90 c0 be c9 7f 42 02 00 00 36 30 78 84 fa 7f 00 00  ....B...60x.....
    Possible instruction pointers:

 9  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1b6ffda0   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffda0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffdb0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffdc0 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

10  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1b6ffdd0   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffdd0 e0 bf 60 01 42 02 00 00 00 00 00 00 00 00 00 00  ..`.B...........
     0000009a1b6ffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffdf0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

11  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b6ffe00   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b6ffe00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b6ffe20 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

12  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b6ffe30   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 15
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242016f2110   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242016f2110
    rbp = 0x0000009a1b8ffbf0   rsp = 0x0000009a1b8ffb98
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242016f2110   r11 = 0x00000242016f2158
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1b8ffbc0   r15 = 0x00000242016f2158
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b8ffb98 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242016f2110   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242016f2110
    rbp = 0x0000009a1b8ffbf0   rsp = 0x0000009a1b8ffba0
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242016f2110   r11 = 0x00000242016f2158
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1b8ffbc0   r15 = 0x00000242016f2158
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b8ffba0 68 13 24 08 42 02 00 00 6c 59 a8 36 fa 7f 00 00  h.$.B...lY.6....
    Possible instruction pointers:

 2  atio6axx.dll + 0xb4596c
    rbp = 0x0000009a1b8ffbf0   rsp = 0x0000009a1b8ffbb0
    rip = 0x00007ffa36a8596c
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffbb0 04 00 00 00 00 00 00 00 d8 21 6f 01 42 02 00 00  .........!o.B...
     0000009a1b8ffbc0 00 00 00 00 00 00 00 00 c0 fb 8f 1b 9a 00 00 00  ................
     0000009a1b8ffbd0 00 00 00 00 00 00 00 00 9c 21 00 00 00 00 00 00  .........!......
     0000009a1b8ffbe0 98 fa 6e 01 01 00 00 00 10 21 6f 01 42 02 00 00  ..n......!o.B...
     0000009a1b8ffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b8ffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b8ffc10 00 00 00 00 00 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1b8ffc20   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffc20 08 21 6f 01 42 02 00 00 00 21 6f 01 42 02 00 00  .!o.B....!o.B...
     0000009a1b8ffc30 50 21 6f 01 42 02 00 00 00 da 6e 01 42 02 00 00  P!o.B.....n.B...
     0000009a1b8ffc40 00 da 6e 01 42 02 00 00 00 21 6f 01 42 02 00 00  ..n.B....!o.B...
     0000009a1b8ffc50 08 21 6f 01 42 02 00 00 d9 39 f6 37 fa 7f 00 00  .!o.B....9.7....
    Possible instruction pointers:

 4  atio6axx.dll + 0x20239d9
    rsp = 0x0000009a1b8ffc60   rip = 0x00007ffa37f639d9
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffc60 00 00 00 00 00 00 00 00 e0 fb 24 08 42 02 00 00  ..........$.B...
     0000009a1b8ffc70 00 21 6f 01 42 02 00 00 01 00 00 00 00 00 00 00  .!o.B...........
     0000009a1b8ffc80 00 00 00 00 01 00 00 00 3e 3c f6 37 fa 7f 00 00  ........><.7....
    Possible instruction pointers:

 5  atio6axx.dll + 0x2023c3e
    rsp = 0x0000009a1b8ffc90   rip = 0x00007ffa37f63c3e
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffc90 4a 19 4a d0 6d a4 00 00 00 08 f8 86 fa 7f 00 00  J.J.m...........
    Possible instruction pointers:

 6  ntdll.dll + 0x50800
    rsp = 0x0000009a1b8ffca0   rip = 0x00007ffa86f80800
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b8ffcb0 00 00 00 00 00 00 00 00 b3 13 aa 36 fa 7f 00 00  ...........6....
    Possible instruction pointers:

 7  atio6axx.dll + 0xb613b3
    rsp = 0x0000009a1b8ffcc0   rip = 0x00007ffa36aa13b3
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffcc0 00 20 6f 01 42 02 00 00 18 7f 98 0c 42 02 00 00  . o.B.......B...
     0000009a1b8ffcd0 00 20 6f 01 42 02 00 00 18 7f 98 0c 42 02 00 00  . o.B.......B...
     0000009a1b8ffce0 00 00 00 00 00 00 00 00 af 31 aa 36 fa 7f 00 00  .........1.6....
    Possible instruction pointers:

 8  atio6axx.dll + 0xb631af
    rsp = 0x0000009a1b8ffcf0   rip = 0x00007ffa36aa31af
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffcf0 80 75 83 0b 42 02 00 00 00 00 00 00 00 00 00 00  .u..B...........
     0000009a1b8ffd00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b8ffd10 d0 cf 58 0b 42 02 00 00 82 29 f6 37 fa 7f 00 00  ..X.B....).7....
    Possible instruction pointers:

 9  atio6axx.dll + 0x2022982
    rsp = 0x0000009a1b8ffd20   rip = 0x00007ffa37f62982
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffd20 d0 cf 58 0b 42 02 00 00 00 00 00 00 00 00 00 00  ..X.B...........
     0000009a1b8ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b8ffd40 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

10  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b8ffd50   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b8ffd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b8ffd60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b8ffd70 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

11  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b8ffd80   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 16
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242016f2038   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242016f2038
    rbp = 0x0000009a1b9ffa50   rsp = 0x0000009a1b9ff9f8
     r8 = 0x00007ffa8230b1f8    r9 = 0x0000000000000010
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1b9ffa20   r15 = 0x00000242016f2080
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b9ff9f8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242016f2038   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242016f2038
    rbp = 0x0000009a1b9ffa50   rsp = 0x0000009a1b9ffa00
     r8 = 0x00007ffa8230b1f8    r9 = 0x0000000000000010
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1b9ffa20   r15 = 0x00000242016f2080
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b9ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffa20 00 00 00 00 00 00 00 00 20 fa 9f 1b 9a 00 00 00  ........ .......
     0000009a1b9ffa30 00 00 00 00 00 00 00 00 c0 24 00 00 00 00 00 00  .........$......
     0000009a1b9ffa40 00 00 00 00 01 00 00 00 38 20 6f 01 42 02 00 00  ........8 o.B...
     0000009a1b9ffa50 00 20 6f 01 42 02 00 00 0a 00 00 00 00 00 00 00  . o.B...........
     0000009a1b9ffa60 38 52 7c 39 fa 7f 00 00                          8R|9....        
    Possible instruction pointers:

 2  atio6axx.dll + 0x3885238
    rsp = 0x0000009a1b9ffa68   rip = 0x00007ffa397c5238
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffa68 c0 20 6f 01 42 02 00 00 90 fb 9f 1b 9a 00 00 00  . o.B...........
     0000009a1b9ffa78 69 dc cf 84 fa 7f 00 00                          i.......        
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1b9ffa80   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffa80 30 20 6f 01 42 02 00 00 28 20 6f 01 42 02 00 00  0 o.B...( o.B...
     0000009a1b9ffa90 78 20 6f 01 42 02 00 00 00 00 00 00 00 00 00 00  x o.B...........
     0000009a1b9ffaa0 00 00 00 00 00 00 00 00 28 20 6f 01 42 02 00 00  ........( o.B...
     0000009a1b9ffab0 30 20 6f 01 42 02 00 00 d9 39 f6 37 fa 7f 00 00  0 o.B....9.7....
    Possible instruction pointers:

 4  atio6axx.dll + 0x20239d9
    rsp = 0x0000009a1b9ffac0   rip = 0x00007ffa37f639d9
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffad0 4a 1d 5a d0 6d a4 00 00 00 00 00 00 00 00 00 00  J.Z.m...........
     0000009a1b9ffae0 00 20 6f 01 42 02 00 00 3e 3c f6 37 fa 7f 00 00  . o.B...><.7....
    Possible instruction pointers:

 5  atio6axx.dll + 0x2023c3e
    rsp = 0x0000009a1b9ffaf0   rip = 0x00007ffa37f63c3e
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffaf0 ea 1f 5a d0 6d a4 00 00 0d 00 00 00 00 00 00 00  ..Z.m...........
     0000009a1b9ffb00 00 20 6f 01 42 02 00 00 0a 00 00 00 00 00 00 00  . o.B...........
     0000009a1b9ffb10 28 20 6f 01 42 02 00 00 ac 0e aa 36 fa 7f 00 00  ( o.B......6....
    Possible instruction pointers:

 6  atio6axx.dll + 0xb60eac
    rsp = 0x0000009a1b9ffb20   rip = 0x00007ffa36aa0eac
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffb20 00 00 00 00 00 00 00 00 48 de 95 0c 42 02 00 00  ........H...B...
     0000009a1b9ffb30 00 00 00 00 00 00 00 00 48 de 95 0c 42 02 00 00  ........H...B...
     0000009a1b9ffb40 28 20 6f 01 42 02 00 00 01 00 00 00 00 00 00 00  ( o.B...........
     0000009a1b9ffb50 0a 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00  ................
     0000009a1b9ffb60 48 de 95 0c 42 02 00 00 48 de 95 0c 42 02 00 00  H...B...H...B...
     0000009a1b9ffb70 68 de 95 0c 42 02 00 00 b0 de 95 0c 42 02 00 00  h...B.......B...
     0000009a1b9ffb80 00 00 00 00 00 00 00 00 38 52 7c 39 fa 7f 00 00  ........8R|9....
    Possible instruction pointers:

 7  atio6axx.dll + 0x3885238
    rsp = 0x0000009a1b9ffb90   rip = 0x00007ffa397c5238
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffbc0 00 00 00 00 00 00 00 00 af 31 aa 36 fa 7f 00 00  .........1.6....
    Possible instruction pointers:

 8  atio6axx.dll + 0xb631af
    rsp = 0x0000009a1b9ffbd0   rip = 0x00007ffa36aa31af
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffbd0 00 20 6f 01 42 02 00 00 38 52 7c 39 fa 7f 00 00  . o.B...8R|9....
    Possible instruction pointers:

 9  atio6axx.dll + 0x3885238
    rsp = 0x0000009a1b9ffbe0   rip = 0x00007ffa397c5238
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffbe0 40 75 83 0b 42 02 00 00 00 00 00 00 00 00 00 00  @u..B...........
     0000009a1b9ffbf0 70 cf 58 0b 42 02 00 00 82 29 f6 37 fa 7f 00 00  p.X.B....).7....
    Possible instruction pointers:

10  atio6axx.dll + 0x2022982
    rsp = 0x0000009a1b9ffc00   rip = 0x00007ffa37f62982
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffc00 70 cf 58 0b 42 02 00 00 00 00 00 00 00 00 00 00  p.X.B...........
     0000009a1b9ffc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffc20 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

11  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b9ffc30   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b9ffc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffc40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b9ffc50 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

12  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b9ffc60   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 17
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420bbd68a0   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002420bbd68a0
    rbp = 0x0000009a1b7ffb70   rsp = 0x0000009a1b7ffb18
     r8 = 0x0000009a1b7ffbd8    r9 = 0x000002420ba96080
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1b7ffb40   r15 = 0x000002420bbd68e8
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1b7ffb18 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420bbd68a0   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002420bbd68a0
    rbp = 0x0000009a1b7ffb70   rsp = 0x0000009a1b7ffb20
     r8 = 0x0000009a1b7ffbd8    r9 = 0x000002420ba96080
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1b7ffb40   r15 = 0x000002420bbd68e8
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1b7ffb20 0d 00 00 00 00 00 00 00 28 20 6f 01 42 02 00 00  ........( o.B...
     0000009a1b7ffb30 28 20 6f 01 42 02 00 00 01 30 5e 08 42 02 00 00  ( o.B....0^.B...
     0000009a1b7ffb40 00 00 00 00 00 00 00 00 40 fb 7f 1b 9a 00 00 00  ........@.......
     0000009a1b7ffb50 00 00 00 00 00 00 00 00 2c 15 00 00 00 00 00 00  ........,.......
     0000009a1b7ffb60 18 7f 98 0c 01 00 00 00 a0 68 bd 0b 42 02 00 00  .........h..B...
     0000009a1b7ffb70 00 00 00 00 00 00 00 00 58 69 bd 0b 42 02 00 00  ........Xi..B...
     0000009a1b7ffb80 40 4e 8d 0c 42 02 00 00 d0 90 4c 0d 42 02 00 00  @N..B.....L.B...
     0000009a1b7ffb90 80 60 a9 0b 42 02 00 00 69 dc cf 84 fa 7f 00 00  .`..B...i.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1b7ffba0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffba0 98 68 bd 0b 42 02 00 00 90 68 bd 0b 42 02 00 00  .h..B....h..B...
     0000009a1b7ffbb0 e0 68 bd 0b 42 02 00 00 fa c7 9e 36 fa 7f 00 00  .h..B......6....
    Possible instruction pointers:

 3  atio6axx.dll + 0xaac7fa
    rsp = 0x0000009a1b7ffbc0   rip = 0x00007ffa369ec7fa
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffbc0 bb 00 00 c0 00 00 00 00 90 68 bd 0b 42 02 00 00  .........h..B...
     0000009a1b7ffbd0 98 68 bd 0b 42 02 00 00 d9 39 f6 37 fa 7f 00 00  .h..B....9.7....
    Possible instruction pointers:

 4  atio6axx.dll + 0x20239d9
    rsp = 0x0000009a1b7ffbe0   rip = 0x00007ffa37f639d9
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffbe0 00 00 00 00 9a 00 00 00 96 47 91 36 fa 7f 00 00  .........G.6....
    Possible instruction pointers:

 5  atio6axx.dll + 0x9d4796
    rsp = 0x0000009a1b7ffbf0   rip = 0x00007ffa36914796
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffbf0 00 29 26 0b 42 02 00 00 60 90 4c 0d 42 02 00 00  .)&.B...`.L.B...
     0000009a1b7ffc00 80 b0 f2 0a 42 02 00 00 3e 3c f6 37 fa 7f 00 00  ....B...><.7....
    Possible instruction pointers:

 6  atio6axx.dll + 0x2023c3e
    rsp = 0x0000009a1b7ffc10   rip = 0x00007ffa37f63c3e
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffc10 ca 1e ba d0 6d a4 00 00 00 00 00 00 00 00 00 00  ....m...........
     0000009a1b7ffc20 00 00 00 00 00 00 00 00 58 69 bd 0b 42 02 00 00  ........Xi..B...
     0000009a1b7ffc30 80 66 bd 0b 42 02 00 00 33 d3 8d 36 fa 7f 00 00  .f..B...3..6....
    Possible instruction pointers:

 7  atio6axx.dll + 0x99d333
    rsp = 0x0000009a1b7ffc40   rip = 0x00007ffa368dd333
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffc40 d0 90 4c 0d 42 02 00 00 00 00 00 00 00 00 00 00  ..L.B...........
     0000009a1b7ffc50 80 66 bd 0b 42 02 00 00 00 00 00 00 00 00 00 00  .f..B...........
     0000009a1b7ffc60 56 dc 7e e9 01 00 00 00 00 08 f8 86 fa 7f 00 00  V.~.............
    Possible instruction pointers:

 8  ntdll.dll + 0x50800
    rsp = 0x0000009a1b7ffc70   rip = 0x00007ffa86f80800
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b7ffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b7ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b7ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b7ffcb0 30 24 8d 0c 42 02 00 00 3f e4 65 36 fa 7f 00 00  0$..B...?.e6....
    Possible instruction pointers:

 9  atio6axx.dll + 0x71e43f
    rsp = 0x0000009a1b7ffcc0   rip = 0x00007ffa3665e43f
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffcc0 00 00 00 00 00 00 00 00 56 dc 7e e9 01 00 00 00  ........V.~.....
     0000009a1b7ffcd0 37 e2 7e e9 01 00 00 00 00 00 00 00 00 00 00 00  7.~.............
     0000009a1b7ffce0 00 41 38 08 42 02 00 00 82 29 f6 37 fa 7f 00 00  .A8.B....).7....
    Possible instruction pointers:

10  atio6axx.dll + 0x2022982
    rsp = 0x0000009a1b7ffcf0   rip = 0x00007ffa37f62982
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffcf0 00 41 38 08 42 02 00 00 00 00 00 00 00 00 00 00  .A8.B...........
     0000009a1b7ffd00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b7ffd10 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

11  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1b7ffd20   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1b7ffd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b7ffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1b7ffd40 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

12  ntdll.dll + 0x526a1
    rsp = 0x0000009a1b7ffd50   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 18
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x0000009a1baff840
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x00000000000006e0   rsp = 0x0000009a1baff4f8
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1baff840
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1baff4f8 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x0000009a1baff840
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x00000000000006e0   rsp = 0x0000009a1baff500
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1baff840
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1baff500 80 92 fd 5c fa 7f 00 00                          ...\....        
    Possible instruction pointers:

 2  qwebpAndroidEmu.dll + 0x69280
    rsp = 0x0000009a1baff508   rip = 0x00007ffa5cfd9280
    Found by: stack scanning

    Stack contents:
     0000009a1baff508 55 79 f4 86 fa 7f 00 00                          Uy......        
    Possible instruction pointers:

 3  ntdll.dll + 0x17955
    rsp = 0x0000009a1baff510   rip = 0x00007ffa86f47955
    Found by: stack scanning

    Stack contents:
     0000009a1baff510 d0 c4 09 87 fa 7f 00 00                          ........        
    Possible instruction pointers:

 4  ntdll.dll + 0x16c4d0
    rsp = 0x0000009a1baff518   rip = 0x00007ffa8709c4d0
    Found by: stack scanning

    Stack contents:
     0000009a1baff518 00 60 72 1a 9a 00 00 00 00 00 00 00 00 00 00 00  .`r.............
     0000009a1baff528 80 92 fd 5c fa 7f 00 00                          ...\....        
    Possible instruction pointers:

 5  qwebpAndroidEmu.dll + 0x69280
    rsp = 0x0000009a1baff530   rip = 0x00007ffa5cfd9280
    Found by: stack scanning

    Stack contents:
     0000009a1baff530 50 2b 29 0f 42 02 00 00 00 60 72 1a 9a 00 00 00  P+).B....`r.....
     0000009a1baff540 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1baff550 00 00 00 00 00 00 00 00 48 02 26 0f 42 02 00 00  ........H.&.B...
     0000009a1baff560 48 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff  H...............
     0000009a1baff570 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff5a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff5b0 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  p...............
     0000009a1baff5c0 ff ff ff ff ff ff ff ff 1d 79 f4 86 fa 7f 00 00  .........y......
    Possible instruction pointers:

 6  ntdll.dll + 0x1791d
    rsp = 0x0000009a1baff5d0   rip = 0x00007ffa86f4791d
    Found by: stack scanning

    Stack contents:
     0000009a1baff5d0 3d 79 f4 86 fa 7f 00 00                          =y......        
    Possible instruction pointers:

 7  ntdll.dll + 0x1793d
    rsp = 0x0000009a1baff5d8   rip = 0x00007ffa86f4793d
    Found by: stack scanning

    Stack contents:
     0000009a1baff5d8 00 00 00 00 00 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1baff5e8 ad 50 fa 86 fa 7f 00 00                          .P......        
    Possible instruction pointers:

 8  ntdll.dll + 0x750ad
    rsp = 0x0000009a1baff5f0   rip = 0x00007ffa86fa50ad
    Found by: stack scanning

    Stack contents:
     0000009a1baff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff600 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff610 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff620 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff630 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff650 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff660 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff670 10 f7 af 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff680 00 00 f3 86 fa 7f 00 00 73 4c fa 86 fa 7f 00 00  ........sL......
    Possible instruction pointers:

 9  ntdll.dll + 0x74c73
    rsp = 0x0000009a1baff690   rip = 0x00007ffa86fa4c73
    Found by: stack scanning

    Stack contents:
     0000009a1baff690 00 00 00 00 00 00 00 00 00 00 f3 86 fa 7f 00 00  ................
     0000009a1baff6a0 00 00 00 00 00 00 00 00 00 50 75 1a 9a 00 00 00  .........Pu.....
     0000009a1baff6b0 00 00 00 00 00 00 00 00 28 4c fa 86 fa 7f 00 00  ........(L......
    Possible instruction pointers:

10  ntdll.dll + 0x74c28
    rsp = 0x0000009a1baff6c0   rip = 0x00007ffa86fa4c28
    Found by: stack scanning

    Stack contents:
     0000009a1baff6c0 10 f7 af 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff6d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff720 00 00 00 00 00 00 00 00 00 08 f8 86 fa 7f 00 00  ................
    Possible instruction pointers:

11  ntdll.dll + 0x50800
    rsp = 0x0000009a1baff730   rip = 0x00007ffa86f80800
    Found by: stack scanning

    Stack contents:
     0000009a1baff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff740 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00  ........3.......
     0000009a1baff750 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00  ..+.............
     0000009a1baff760 39 eb d1 ed 15 7a 00 00 00 00 00 00 00 00 00 00  9....z..........
     0000009a1baff770 00 00 00 00 00 00 00 00 70 6a cf 84 fa 7f 00 00  ........pj......
    Possible instruction pointers:

12  KERNELBASE.dll + 0x66a70
    rsp = 0x0000009a1baff780   rip = 0x00007ffa84cf6a70
    Found by: stack scanning

    Stack contents:
     0000009a1baff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff790 10 30 4a 85 fa 7f 00 00                          .0J.....        
    Possible instruction pointers:

13  combase.dll + 0xa3010
    rsp = 0x0000009a1baff798   rip = 0x00007ffa854a3010
    Found by: stack scanning

    Stack contents:
     0000009a1baff798 70 2f 7c 0f 42 02 00 00 00 ba 3c dc ff ff ff ff  p/|.B.....<.....
     0000009a1baff7a8 00 00 00 00 00 00 00 00 be 19 28 ee af 18 00 00  ..........(.....
     0000009a1baff7b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff7c8 d0 fa af 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff7d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff7e8 26 34 4a 85 fa 7f 00 00                          &4J.....        
    Possible instruction pointers:

14  combase.dll + 0xa3426
    rsp = 0x0000009a1baff7f0   rip = 0x00007ffa854a3426
    Found by: stack scanning

    Stack contents:
     0000009a1baff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff820 a0 0f 00 00 00 00 00 00 80 1f 00 00 ff ff 00 00  ................
     0000009a1baff830 00 ba 3c dc ff ff ff ff 00 00 00 00 00 00 00 00  ..<.............
     0000009a1baff840 e0 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff870 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff8c0 00 00 00 00 00 00 00 00 6b b8 f5 86 fa 7f 00 00  ........k.......
    Possible instruction pointers:

15  ntdll.dll + 0x2b86b
    rsp = 0x0000009a1baff8d0   rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1baff8d0 0f 00 04 00 00 00 00 00 62 00 00 00 00 00 00 00  ........b.......
     0000009a1baff8e0 b0 ba d7 0c 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1baff8f0 00 00 00 00 00 00 00 00 6b b8 f5 86 fa 7f 00 00  ........k.......
    Possible instruction pointers:

16  ntdll.dll + 0x2b86b
    rsp = 0x0000009a1baff900   rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1baff900 00 00 00 00 00 00 00 00 80 19 8e 7f 42 02 00 00  ............B...
     0000009a1baff910 00 d7 90 0c 42 02 00 00 00 00 8e 7f 42 02 00 00  ....B.......B...
     0000009a1baff920 28 03 8e 7f 42 02 00 00 00 00 00 00 00 00 00 00  (...B...........
     0000009a1baff930 20 02 00 00 00 00 00 00 c0 0c 8e 7f 42 02 00 00   ...........B...
     0000009a1baff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff950 00 00 00 00 00 00 00 00 20 02 00 00 00 00 00 00  ........ .......
     0000009a1baff960 10 02 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................
     0000009a1baff970 00 00 96 7f 42 02 00 00 39 fa af 1b 9a 00 00 00  ....B...9.......
     0000009a1baff980 22 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  "...............
    Possible instruction pointers:

17  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1baff990   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1baff990 00 00 8e 7f 42 02 00 00 00 08 f8 86 fa 7f 00 00  ....B...........
    Possible instruction pointers:

18  ntdll.dll + 0x50800
    rsp = 0x0000009a1baff9a0   rip = 0x00007ffa86f80800
    Found by: stack scanning

    Stack contents:
     0000009a1baff9a0 10 02 00 00 00 00 00 00 00 00 00 00 9a 00 00 00  ................
     0000009a1baff9b0 25 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  %...............
    Possible instruction pointers:

19  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1baff9c0   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1baff9c0 00 00 8e 7f 02 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baff9d0 a9 e5 d1 ed 15 7a 00 00 00 00 00 00 00 00 00 00  .....z..........
     0000009a1baff9e0 02 00 10 00 00 00 00 00 0a e4 cb 84 fa 7f 00 00  ................
    Possible instruction pointers:

20  KERNELBASE.dll + 0x2e40a
    rsp = 0x0000009a1baff9f0   rip = 0x00007ffa84cbe40a
    Found by: stack scanning

    Stack contents:
     0000009a1baff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffa20 00 00 00 00 00 00 00 00 e0 06 00 00 00 00 00 00  ................
     0000009a1baffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffa40 82 9e 54 ee 88 55 00 00 00 00 00 00 00 00 00 00  ..T..U..........
     0000009a1baffa50 00 00 00 00 00 00 00 00 00 2f 7c 0f 42 02 00 00  ........./|.B...
     0000009a1baffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffa70 e0 06 00 00 00 00 00 00 a0 32 4a 85 fa 7f 00 00  .........2J.....
    Possible instruction pointers:

21  combase.dll + 0xa32a0
    rsp = 0x0000009a1baffa80   rip = 0x00007ffa854a32a0
    Found by: stack scanning

    Stack contents:
     0000009a1baffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffa90 40 1b 5c 08 42 02 00 00 c1 3c 4a 85 fa 7f 00 00  @.\.B....<J.....
    Possible instruction pointers:

22  combase.dll + 0xa3cc1
    rsp = 0x0000009a1baffaa0   rip = 0x00007ffa854a3cc1
    Found by: stack scanning

    Stack contents:
     0000009a1baffaa0 a0 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffab0 d0 fa af 1b 9a 00 00 00 14 22 00 00 00 00 00 00  ........."......
     0000009a1baffac0 70 2f 7c 0f 42 02 00 00 b0 30 4a 85 fa 7f 00 00  p/|.B....0J.....
    Possible instruction pointers:

23  combase.dll + 0xa30b0
    rsp = 0x0000009a1baffad0   rip = 0x00007ffa854a30b0
    Found by: stack scanning

    Stack contents:
     0000009a1baffad0 ff ff ff ff 42 02 00 00 70 2f 7c 0f 42 02 00 00  ....B...p/|.B...
     0000009a1baffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffaf0 70 2f 7c 0f 42 02 00 00 a6 34 4a 85 fa 7f 00 00  p/|.B....4J.....
    Possible instruction pointers:

24  combase.dll + 0xa34a6
    rsp = 0x0000009a1baffb00   rip = 0x00007ffa854a34a6
    Found by: stack scanning

    Stack contents:
     0000009a1baffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffb10 00 00 00 00 00 00 00 00 70 2f 7c 0f 42 02 00 00  ........p/|.B...
     0000009a1baffb20 00 00 00 00 00 00 00 00 39 30 4a 85 fa 7f 00 00  ........90J.....
    Possible instruction pointers:

25  combase.dll + 0xa3039
    rsp = 0x0000009a1baffb30   rip = 0x00007ffa854a3039
    Found by: stack scanning

    Stack contents:
     0000009a1baffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffb50 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

26  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1baffb60   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1baffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1baffb80 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

27  ntdll.dll + 0x526a1
    rsp = 0x0000009a1baffb90   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 19
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x0000009a1bbffb20
    rcx = 0x0000000000000002   rbx = 0x0000000000000002
    rsi = 0x0000000000000000   rdi = 0x0000000000000002
    rbp = 0x0000000000000000   rsp = 0x0000009a1bbff7c8
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1bbffb20
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1bbff7c8 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x0000009a1bbffb20
    rcx = 0x0000000000000002   rbx = 0x0000000000000002
    rsi = 0x0000000000000000   rdi = 0x0000000000000002
    rbp = 0x0000000000000000   rsp = 0x0000009a1bbff7d0
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1bbffb20
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1bbff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bbff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bbff7f0 00 00 00 00 00 00 00 00 80 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 2  ntdll.dll + 0x52680
    rsp = 0x0000009a1bbff800   rip = 0x00007ffa86f82680
    Found by: stack scanning

Thread 20
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x0000009a1bcff860
    rcx = 0x0000000000000002   rbx = 0x0000000000000002
    rsi = 0x0000000000000000   rdi = 0x0000000000000002
    rbp = 0x0000000000000000   rsp = 0x0000009a1bcff508
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1bcff860
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1bcff508 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x0000009a1bcff860
    rcx = 0x0000000000000002   rbx = 0x0000000000000002
    rsi = 0x0000000000000000   rdi = 0x0000000000000002
    rbp = 0x0000000000000000   rsp = 0x0000009a1bcff510
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1bcff860
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1bcff510 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bcff520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bcff530 00 00 00 00 00 00 00 00 80 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 2  ntdll.dll + 0x52680
    rsp = 0x0000009a1bcff540   rip = 0x00007ffa86f82680
    Found by: stack scanning

Thread 21
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f816318   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002420f816318
    rbp = 0x0000009a1bdff680   rsp = 0x0000009a1bdff628
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1bdff650   r15 = 0x000002420f816360
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1bdff628 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f816318   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002420f816318
    rbp = 0x0000009a1bdff680   rsp = 0x0000009a1bdff630
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1bdff650   r15 = 0x000002420f816360
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1bdff630 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff640 00 00 00 00 00 00 00 00 b0 f7 df 1b 9a 00 00 00  ................
     0000009a1bdff650 00 00 00 00 00 00 00 00 50 f6 df 1b 9a 00 00 00  ........P.......
     0000009a1bdff660 00 00 00 00 00 00 00 00 24 10 00 00 00 00 00 00  ........$.......
     0000009a1bdff670 c0 f7 df 1b 01 00 00 00 18 63 81 0f 42 02 00 00  .........c..B...
     0000009a1bdff680 00 00 00 00 00 00 00 00 b0 f7 df 1b 9a 00 00 00  ................
     0000009a1bdff690 00 00 00 00 00 00 00 00 08 63 81 0f 42 02 00 00  .........c..B...
     0000009a1bdff6a0 c0 f7 df 1b 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1bdff6b0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1bdff6b0 10 63 81 0f 42 02 00 00 08 63 81 0f 42 02 00 00  .c..B....c..B...
     0000009a1bdff6c0 58 63 81 0f 42 02 00 00 00 00 00 00 00 00 00 00  Xc..B...........
     0000009a1bdff6d0 40 c6 2a 0f 42 02 00 00 08 63 81 0f 42 02 00 00  @.*.B....c..B...
     0000009a1bdff6e0 10 63 81 0f 42 02 00 00 49 25 1a 6a fa 7f 00 00  .c..B...I%.j....
    Possible instruction pointers:

 3  MSVCP140.dll + 0x12549
    rsp = 0x0000009a1bdff6f0   rip = 0x00007ffa6a1a2549
    Found by: stack scanning

    Stack contents:
     0000009a1bdff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff710 40 c6 2a 0f 42 02 00 00 da 27 1a 6a fa 7f 00 00  @.*.B....'.j....
    Possible instruction pointers:

 4  MSVCP140.dll + 0x127da
    rsp = 0x0000009a1bdff720   rip = 0x00007ffa6a1a27da
    Found by: stack scanning

    Stack contents:
     0000009a1bdff720 e0 89 72 11 bd ed 00 00 00 00 00 00 00 00 00 00  ..r.............
     0000009a1bdff730 b0 f7 df 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff740 00 00 00 00 00 00 00 00 de ec 46 1f fa 7f 00 00  ..........F.....
    Possible instruction pointers:

 5  libgfxstream_backend.dll + 0x10ecde
    rsp = 0x0000009a1bdff750   rip = 0x00007ffa1f46ecde
    Found by: stack scanning

    Stack contents:
     0000009a1bdff750 58 63 81 0f 42 02 00 00 20 62 81 0f 42 02 00 00  Xc..B... b..B...
     0000009a1bdff760 58 63 81 0f 42 02 00 00 00 00 00 00 00 00 00 00  Xc..B...........
     0000009a1bdff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff780 a0 63 81 0f 42 02 00 00 08 63 81 0f 42 02 00 00  .c..B....c..B...
     0000009a1bdff790 50 3f 81 0b 42 02 00 00 50 3f 81 0b 42 02 00 00  P?..B...P?..B...
     0000009a1bdff7a0 80 41 81 0b 42 02 00 00 00 00 00 00 00 00 00 00  .A..B...........
     0000009a1bdff7b0 0a 00 00 00 00 00 00 00 5b 00 ce 84 fa 7f 00 00  ........[.......
    Possible instruction pointers:

 6  KERNELBASE.dll + 0x5005b
    rsp = 0x0000009a1bdff7c0   rip = 0x00007ffa84ce005b
    Found by: stack scanning

    Stack contents:
     0000009a1bdff7c0 fe ff ff ff ff ff ff ff 40 c6 2a 0f 42 02 00 00  ........@.*.B...
     0000009a1bdff7d0 00 00 00 00 00 00 00 00 90 23 2b 0f 42 02 00 00  .........#+.B...
     0000009a1bdff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff800 30 f8 df 1b 9a 00 00 00 be eb 46 1f fa 7f 00 00  0.........F.....
    Possible instruction pointers:

 7  libgfxstream_backend.dll + 0x10ebbe
    rsp = 0x0000009a1bdff810   rip = 0x00007ffa1f46ebbe
    Found by: stack scanning

    Stack contents:
     0000009a1bdff810 c0 97 81 0f 42 02 00 00 36 30 78 84 fa 7f 00 00  ....B...60x.....
    Possible instruction pointers:

 8  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1bdff820   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1bdff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff830 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1bdff840 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

 9  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1bdff850   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1bdff850 40 c6 2a 0f 42 02 00 00 00 00 00 00 00 00 00 00  @.*.B...........
     0000009a1bdff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff870 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

10  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1bdff880   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1bdff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bdff8a0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

11  ntdll.dll + 0x526a1
    rsp = 0x0000009a1bdff8b0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 22
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420d2ea998   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002420d2ea998
    rbp = 0x0000009a1beff970   rsp = 0x0000009a1beff918
     r8 = 0x0000000000000002    r9 = 0x0000009a1beffaa8
    r10 = 0x0000000000000013   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1beff940   r15 = 0x000002420d2ea9a0
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1beff918 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420d2ea998   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002420d2ea998
    rbp = 0x0000009a1beff970   rsp = 0x0000009a1beff920
     r8 = 0x0000000000000002    r9 = 0x0000009a1beffaa8
    r10 = 0x0000000000000013   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1beff940   r15 = 0x000002420d2ea9a0
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1beff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beff940 00 00 00 00 00 00 00 00 40 f9 ef 1b 9a 00 00 00  ........@.......
     0000009a1beff950 00 00 00 00 00 00 00 00 90 07 00 00 00 00 00 00  ................
     0000009a1beff960 00 00 00 00 01 00 00 00 98 a9 2e 0d 42 02 00 00  ............B...
     0000009a1beff970 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1beff980   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1beff980 00 00 00 00 00 00 00 00 60 a9 2e 0d 42 02 00 00  ........`...B...
     0000009a1beff990 b0 fa ef 1b 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1beff9a0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1beff9a0 a0 a9 2e 0d 42 02 00 00 78 a9 2e 0d 42 02 00 00  ....B...x...B...
     0000009a1beff9b0 98 a9 2e 0d 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1beff9c0 00 00 00 00 00 00 00 00 78 a9 2e 0d 42 02 00 00  ........x...B...
     0000009a1beff9d0 a0 a9 2e 0d 42 02 00 00 d8 e0 44 1f fa 7f 00 00  ....B.....D.....
    Possible instruction pointers:

 4  libgfxstream_backend.dll + 0xee0d8
    rsp = 0x0000009a1beff9e0   rip = 0x00007ffa1f44e0d8
    Found by: stack scanning

    Stack contents:
     0000009a1beff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffa00 00 00 00 00 00 00 00 00 60 bb 2a 0f 42 02 00 00  ........`.*.B...
     0000009a1beffa10 78 a9 2e 0d 42 02 00 00 b0 23 2b 0f 42 02 00 00  x...B....#+.B...
     0000009a1beffa20 00 00 00 00 00 00 00 00 ca a2 59 1f fa 7f 00 00  ..........Y.....
    Possible instruction pointers:

 5  libgfxstream_backend.dll + 0x23a2ca
    rsp = 0x0000009a1beffa30   rip = 0x00007ffa1f59a2ca
    Found by: stack scanning

    Stack contents:
     0000009a1beffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffa60 00 00 00 00 00 00 00 00 5b 00 ce 84 fa 7f 00 00  ........[.......
    Possible instruction pointers:

 6  KERNELBASE.dll + 0x5005b
    rsp = 0x0000009a1beffa70   rip = 0x00007ffa84ce005b
    Found by: stack scanning

    Stack contents:
     0000009a1beffa70 00 00 00 00 00 00 00 00 00 08 f8 86 fa 7f 00 00  ................
    Possible instruction pointers:

 7  ntdll.dll + 0x50800
    rsp = 0x0000009a1beffa80   rip = 0x00007ffa86f80800
    Found by: stack scanning

    Stack contents:
     0000009a1beffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffa90 03 00 00 00 00 00 00 00 fe ff ff ff ff ff ff ff  ................
     0000009a1beffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffab0 89 e6 91 ed 15 7a 00 00 60 bb 2a 0f 42 02 00 00  .....z..`.*.B...
     0000009a1beffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffaf0 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

 8  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1beffb00   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1beffb00 60 bb 2a 0f 42 02 00 00 00 00 00 00 00 00 00 00  `.*.B...........
     0000009a1beffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffb20 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 9  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1beffb30   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1beffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1beffb50 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

10  ntdll.dll + 0x526a1
    rsp = 0x0000009a1beffb60   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 23
 0  ntdll.dll + 0x9d144
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000978   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000978
    rbp = 0x0000000000000000   rsp = 0x0000009a1bfff6d8
     r8 = 0x00007ffa84d28af2    r9 = 0x0000000000000000
    r10 = 0x0000009a1bffda90   r11 = 0x0000000000000001
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000978   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcd144
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1bfff6d8 6e 30 cb 84 fa 7f 00 00                          n0......        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x2306e
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000978   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000978
    rbp = 0x0000000000000000   rsp = 0x0000009a1bfff6e0
     r8 = 0x00007ffa84d28af2    r9 = 0x0000000000000000
    r10 = 0x0000009a1bffda90   r11 = 0x0000000000000001
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000978   r15 = 0x0000000000000000
    rip = 0x00007ffa84cb306e
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1bfff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff710 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  H...............
     0000009a1bfff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff740 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff770 00 00 00 00 00 00 00 00 b8 88 8a 62 fa 7f 00 00  ...........b....
    Possible instruction pointers:

 2  graphics-hook64.dll + 0x88b8
    rsp = 0x0000009a1bfff780   rip = 0x00007ffa628a88b8
    Found by: stack scanning

    Stack contents:
     0000009a1bfff780 40 12 8e 62 fa 7f 00 00                          @..b....        
    Possible instruction pointers:

 3  graphics-hook64.dll + 0x41240
    rsp = 0x0000009a1bfff788   rip = 0x00007ffa628e1240
    Found by: stack scanning

    Stack contents:
     0000009a1bfff788 04 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff798 78 09 00 00 00 00 00 00 40 12 8e 62 fa 7f 00 00  x.......@..b....
    Possible instruction pointers:

 4  graphics-hook64.dll + 0x41240
    rsp = 0x0000009a1bfff7a8   rip = 0x00007ffa628e1240
    Found by: stack scanning

    Stack contents:
     0000009a1bfff7a8 db 96 8a 62 fa 7f 00 00                          ...b....        
    Possible instruction pointers:

 5  graphics-hook64.dll + 0x96db
    rsp = 0x0000009a1bfff7b0   rip = 0x00007ffa628a96db
    Found by: stack scanning

    Stack contents:
     0000009a1bfff7b0 f8 fd 8c 62 fa 7f 00 00                          ...b....        
    Possible instruction pointers:

 6  graphics-hook64.dll + 0x2fdf8
    rsp = 0x0000009a1bfff7b8   rip = 0x00007ffa628cfdf8
    Found by: stack scanning

    Stack contents:
     0000009a1bfff7b8 00 00 00 00 00 00 00 00 c8 ee ff 1b 9a 00 00 00  ................
     0000009a1bfff7c8 f0 ee ff 1b 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff7d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff7e8 14 76 e4 86 fa 7f 00 00                          .v......        
    Possible instruction pointers:

 7  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1bfff7f0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1bfff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1bfff810 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 8  ntdll.dll + 0x526a1
    rsp = 0x0000009a1bfff820   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 24
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f462900   rbx = 0x0000000000000000
    rsi = 0x0000009a1c0ff9f0   rdi = 0x0000000000000000
    rbp = 0x0000009a1c0ffa20   rsp = 0x0000009a1c0ff9c8
     r8 = 0x0000000000000000    r9 = 0x0000024212e60000
    r10 = 0x0000000000000000   r11 = 0x000002421c6a8290
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f462900   r15 = 0x000002420f462928
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c0ff9c8 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f462900   rbx = 0x0000000000000000
    rsi = 0x0000009a1c0ff9f0   rdi = 0x0000000000000000
    rbp = 0x0000009a1c0ffa20   rsp = 0x0000009a1c0ff9d0
     r8 = 0x0000000000000000    r9 = 0x0000024212e60000
    r10 = 0x0000000000000000   r11 = 0x000002421c6a8290
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f462900   r15 = 0x000002420f462928
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c0ff9d0 00 00 8e 7f 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1c0ff9e0 00 00 00 00 00 00 00 00 f0 f9 0f 1c 9a 00 00 00  ................
     0000009a1c0ff9f0 00 00 00 00 00 00 00 00 f0 f9 0f 1c 9a 00 00 00  ................
     0000009a1c0ffa00 00 00 00 00 00 00 00 00 f8 08 00 00 00 00 00 00  ................
     0000009a1c0ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c0ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c0ffa30 38 29 46 0f 42 02 00 00 b9 db cf 84 fa 7f 00 00  8)F.B...........
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c0ffa40   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c0ffa40 90 28 46 0f 42 02 00 00 00 00 00 00 00 00 00 00  .(F.B...........
     0000009a1c0ffa50 38 29 46 0f 42 02 00 00 00 00 00 00 00 00 00 00  8)F.B...........
     0000009a1c0ffa60 90 28 46 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  .(F.B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c0ffa70   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c0ffa70 90 28 46 0f 42 02 00 00 00 00 00 00 00 00 00 00  .(F.B...........
     0000009a1c0ffa80 00 00 00 00 00 00 00 00 38 29 46 0f 42 02 00 00  ........8)F.B...
     0000009a1c0ffa90 90 28 46 0f 42 02 00 00 ac f4 8d 12 fa 7f 00 00  .(F.B...........
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0xff4ac
    rsp = 0x0000009a1c0ffaa0   rip = 0x00007ffa128df4ac
    Found by: stack scanning

    Stack contents:
     0000009a1c0ffaa0 90 28 46 0f 42 02 00 00 38 29 46 0f 42 02 00 00  .(F.B...8)F.B...
     0000009a1c0ffab0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c0ffac0 ff ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1c0ffad0 00 00 00 00 00 00 00 00 47 ec a8 13 fa 7f 00 00  ........G.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c0ffae0   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c0ffae0 70 cb 29 0f 42 02 00 00 00 00 00 00 00 00 00 00  p.).B...........
     0000009a1c0ffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c0ffb00 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 6  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c0ffb10   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c0ffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c0ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c0ffb30 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 7  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c0ffb40   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 25
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807a18   rbx = 0x0000000000000000
    rsi = 0x0000009a1c1ff730   rdi = 0x0000000000000000
    rbp = 0x0000009a1c1ff760   rsp = 0x0000009a1c1ff708
     r8 = 0x0000000000000000    r9 = 0x00007ffa146d4ae4
    r10 = 0x00007ffa127e0000   r11 = 0x0000009a1c1ff1c0
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807a18   r15 = 0x000002420f807a40
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c1ff708 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807a18   rbx = 0x0000000000000000
    rsi = 0x0000009a1c1ff730   rdi = 0x0000000000000000
    rbp = 0x0000009a1c1ff760   rsp = 0x0000009a1c1ff710
     r8 = 0x0000000000000000    r9 = 0x00007ffa146d4ae4
    r10 = 0x00007ffa127e0000   r11 = 0x0000009a1c1ff1c0
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807a18   r15 = 0x000002420f807a40
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c1ff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff720 00 00 00 00 00 00 00 00 30 f7 1f 1c 9a 00 00 00  ........0.......
     0000009a1c1ff730 00 00 00 00 00 00 00 00 30 f7 1f 1c 9a 00 00 00  ........0.......
     0000009a1c1ff740 00 00 00 00 00 00 00 00 c8 23 00 00 00 00 00 00  .........#......
     0000009a1c1ff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff760 00 00 00 00 00 00 00 00 60 79 80 0f 42 02 00 00  ........`y..B...
     0000009a1c1ff770 78 79 80 0f 42 02 00 00 b9 db cf 84 fa 7f 00 00  xy..B...........
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c1ff780   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c1ff780 18 7a 80 0f 42 02 00 00 70 79 80 0f 42 02 00 00  .z..B...py..B...
     0000009a1c1ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff7a0 18 7a 80 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  .z..B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c1ff7b0   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c1ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff7c0 00 00 00 00 00 00 00 00 78 79 80 0f 42 02 00 00  ........xy..B...
     0000009a1c1ff7d0 00 00 00 00 00 00 00 00 4c e5 b3 12 fa 7f 00 00  ........L.......
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x35e54c
    rsp = 0x0000009a1c1ff7e0   rip = 0x00007ffa12b3e54c
    Found by: stack scanning

    Stack contents:
     0000009a1c1ff7e0 c0 9f 00 00 42 02 00 00 28 f9 96 12 fa 7f 00 00  ....B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c1ff7f0   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c1ff7f0 10 ce 29 0f 42 02 00 00 00 00 00 00 00 00 00 00  ..).B...........
     0000009a1c1ff800 6c 6c 76 6d 70 69 70 65 2d 30 00 00 00 00 00 00  llvmpipe-0......
     0000009a1c1ff810 33 de 0e bf cd 68 00 00 78 79 80 0f 42 02 00 00  3....h..xy..B...
     0000009a1c1ff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff840 00 00 00 00 00 00 00 00 47 ec a8 13 fa 7f 00 00  ........G.......
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c1ff850   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c1ff850 00 00 00 00 00 00 00 00 10 ce 29 0f 42 02 00 00  ..........).B...
     0000009a1c1ff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff870 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 7  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c1ff880   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c1ff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c1ff8a0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 8  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c1ff8b0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 26
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807b60   rbx = 0x0000000000000000
    rsi = 0x0000009a1c2ff700   rdi = 0x0000000000000000
    rbp = 0x0000009a1c2ff730   rsp = 0x0000009a1c2ff6d8
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807b60   r15 = 0x000002420f807b88
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c2ff6d8 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807b60   rbx = 0x0000000000000000
    rsi = 0x0000009a1c2ff700   rdi = 0x0000000000000000
    rbp = 0x0000009a1c2ff730   rsp = 0x0000009a1c2ff6e0
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807b60   r15 = 0x000002420f807b88
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c2ff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff6f0 00 00 00 00 00 00 00 00 00 f7 2f 1c 9a 00 00 00  ........../.....
     0000009a1c2ff700 00 00 00 00 00 00 00 00 00 f7 2f 1c 9a 00 00 00  ........../.....
     0000009a1c2ff710 00 00 00 00 00 00 00 00 d0 29 00 00 00 00 00 00  .........)......
     0000009a1c2ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff730 00 00 00 00 00 00 00 00 60 79 80 0f 42 02 00 00  ........`y..B...
     0000009a1c2ff740 c0 7a 80 0f 42 02 00 00 b9 db cf 84 fa 7f 00 00  .z..B...........
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c2ff750   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c2ff750 60 7b 80 0f 42 02 00 00 70 79 80 0f 42 02 00 00  `{..B...py..B...
     0000009a1c2ff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff770 60 7b 80 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  `{..B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c2ff780   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c2ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff790 00 00 00 00 00 00 00 00 c0 7a 80 0f 42 02 00 00  .........z..B...
     0000009a1c2ff7a0 00 00 00 00 00 00 00 00 4c e5 b3 12 fa 7f 00 00  ........L.......
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x35e54c
    rsp = 0x0000009a1c2ff7b0   rip = 0x00007ffa12b3e54c
    Found by: stack scanning

    Stack contents:
     0000009a1c2ff7b0 c0 9f 00 00 42 02 00 00 28 f9 96 12 fa 7f 00 00  ....B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c2ff7c0   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c2ff7c0 90 d5 29 0f 42 02 00 00 01 00 00 00 00 00 00 00  ..).B...........
     0000009a1c2ff7d0 6c 6c 76 6d 70 69 70 65 2d 31 00 00 00 00 00 00  llvmpipe-1......
     0000009a1c2ff7e0 63 de 3e bf cd 68 00 00 c0 7a 80 0f 42 02 00 00  c.>..h...z..B...
     0000009a1c2ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff810 00 00 00 00 00 00 00 00 47 ec a8 13 fa 7f 00 00  ........G.......
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c2ff820   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c2ff820 00 00 00 00 00 00 00 00 90 d5 29 0f 42 02 00 00  ..........).B...
     0000009a1c2ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff840 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 7  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c2ff850   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c2ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c2ff870 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 8  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c2ff880   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 27
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807ca8   rbx = 0x0000000000000000
    rsi = 0x0000009a1c3ffb60   rdi = 0x0000000000000000
    rbp = 0x0000009a1c3ffb90   rsp = 0x0000009a1c3ffb38
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807ca8   r15 = 0x000002420f807cd0
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c3ffb38 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807ca8   rbx = 0x0000000000000000
    rsi = 0x0000009a1c3ffb60   rdi = 0x0000000000000000
    rbp = 0x0000009a1c3ffb90   rsp = 0x0000009a1c3ffb40
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807ca8   r15 = 0x000002420f807cd0
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c3ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffb50 00 00 00 00 00 00 00 00 60 fb 3f 1c 9a 00 00 00  ........`.?.....
     0000009a1c3ffb60 00 00 00 00 00 00 00 00 60 fb 3f 1c 9a 00 00 00  ........`.?.....
     0000009a1c3ffb70 00 00 00 00 00 00 00 00 e8 06 00 00 00 00 00 00  ................
     0000009a1c3ffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffb90 00 00 00 00 00 00 00 00 60 79 80 0f 42 02 00 00  ........`y..B...
     0000009a1c3ffba0 08 7c 80 0f 42 02 00 00 b9 db cf 84 fa 7f 00 00  .|..B...........
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c3ffbb0   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c3ffbb0 a8 7c 80 0f 42 02 00 00 70 79 80 0f 42 02 00 00  .|..B...py..B...
     0000009a1c3ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffbd0 a8 7c 80 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  .|..B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c3ffbe0   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c3ffbe0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffbf0 00 00 00 00 00 00 00 00 08 7c 80 0f 42 02 00 00  .........|..B...
     0000009a1c3ffc00 00 00 00 00 00 00 00 00 4c e5 b3 12 fa 7f 00 00  ........L.......
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x35e54c
    rsp = 0x0000009a1c3ffc10   rip = 0x00007ffa12b3e54c
    Found by: stack scanning

    Stack contents:
     0000009a1c3ffc10 c0 9f 00 00 42 02 00 00 28 f9 96 12 fa 7f 00 00  ....B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c3ffc20   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c3ffc20 80 d0 29 0f 42 02 00 00 02 00 00 00 00 00 00 00  ..).B...........
     0000009a1c3ffc30 6c 6c 76 6d 70 69 70 65 2d 32 00 00 00 00 00 00  llvmpipe-2......
     0000009a1c3ffc40 c3 d5 2e bf cd 68 00 00 08 7c 80 0f 42 02 00 00  .....h...|..B...
     0000009a1c3ffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffc70 00 00 00 00 00 00 00 00 47 ec a8 13 fa 7f 00 00  ........G.......
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c3ffc80   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c3ffc80 00 00 00 00 00 00 00 00 80 d0 29 0f 42 02 00 00  ..........).B...
     0000009a1c3ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffca0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 7  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c3ffcb0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c3ffcb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c3ffcd0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 8  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c3ffce0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 28
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807df0   rbx = 0x0000000000000000
    rsi = 0x0000009a1c4ff740   rdi = 0x0000000000000000
    rbp = 0x0000009a1c4ff770   rsp = 0x0000009a1c4ff718
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807df0   r15 = 0x000002420f807e18
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c4ff718 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f807df0   rbx = 0x0000000000000000
    rsi = 0x0000009a1c4ff740   rdi = 0x0000000000000000
    rbp = 0x0000009a1c4ff770   rsp = 0x0000009a1c4ff720
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f807df0   r15 = 0x000002420f807e18
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c4ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff730 00 00 00 00 00 00 00 00 40 f7 4f 1c 9a 00 00 00  ........@.O.....
     0000009a1c4ff740 00 00 00 00 00 00 00 00 40 f7 4f 1c 9a 00 00 00  ........@.O.....
     0000009a1c4ff750 00 00 00 00 00 00 00 00 8c 10 00 00 00 00 00 00  ................
     0000009a1c4ff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff770 00 00 00 00 00 00 00 00 60 79 80 0f 42 02 00 00  ........`y..B...
     0000009a1c4ff780 50 7d 80 0f 42 02 00 00 b9 db cf 84 fa 7f 00 00  P}..B...........
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c4ff790   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c4ff790 f0 7d 80 0f 42 02 00 00 70 79 80 0f 42 02 00 00  .}..B...py..B...
     0000009a1c4ff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff7b0 f0 7d 80 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  .}..B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c4ff7c0   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c4ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff7d0 00 00 00 00 00 00 00 00 50 7d 80 0f 42 02 00 00  ........P}..B...
     0000009a1c4ff7e0 00 00 00 00 00 00 00 00 4c e5 b3 12 fa 7f 00 00  ........L.......
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x35e54c
    rsp = 0x0000009a1c4ff7f0   rip = 0x00007ffa12b3e54c
    Found by: stack scanning

    Stack contents:
     0000009a1c4ff7f0 c0 9f 00 00 42 02 00 00 28 f9 96 12 fa 7f 00 00  ....B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c4ff800   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c4ff800 00 cf 29 0f 42 02 00 00 03 00 00 00 00 00 00 00  ..).B...........
     0000009a1c4ff810 6c 6c 76 6d 70 69 70 65 2d 33 00 00 00 00 00 00  llvmpipe-3......
     0000009a1c4ff820 23 de 5e bf cd 68 00 00 50 7d 80 0f 42 02 00 00  #.^..h..P}..B...
     0000009a1c4ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff850 00 00 00 00 00 00 00 00 47 ec a8 13 fa 7f 00 00  ........G.......
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c4ff860   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c4ff860 00 00 00 00 00 00 00 00 00 cf 29 0f 42 02 00 00  ..........).B...
     0000009a1c4ff870 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff880 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 7  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c4ff890   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c4ff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c4ff8b0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 8  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c4ff8c0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 29
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c5ffa20   rdi = 0x0000000000000000
    rbp = 0x0000009a1c5ffa50   rsp = 0x0000009a1c5ff9f8
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c5ff9f8 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c5ffa20   rdi = 0x0000000000000000
    rbp = 0x0000009a1c5ffa50   rsp = 0x0000009a1c5ffa00
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c5ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffa10 00 00 00 00 00 00 00 00 20 fa 5f 1c 9a 00 00 00  ........ ._.....
     0000009a1c5ffa20 00 00 00 00 00 00 00 00 20 fa 5f 1c 9a 00 00 00  ........ ._.....
     0000009a1c5ffa30 c0 fa 6f 1c 9a 00 00 00 2c 0b 00 00 00 00 00 00  ..o.....,.......
     0000009a1c5ffa40 70 bd 1e 0f 00 00 00 00 00 00 00 00 00 00 00 00  p...............
     0000009a1c5ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffa60 00 00 00 00 00 00 00 00 b9 db cf 84 fa 7f 00 00  ................
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c5ffa70   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffa70 50 66 51 0f 42 02 00 00 88 67 51 0f 42 02 00 00  PfQ.B....gQ.B...
     0000009a1c5ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffa90 50 66 51 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  PfQ.B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c5ffaa0   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffaa0 00 00 00 00 00 00 00 00 d2 fa a9 13 fa 7f 00 00  ................
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x12bfad2
    rsp = 0x0000009a1c5ffab0   rip = 0x00007ffa13a9fad2
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffab0 c0 d5 29 0f 42 02 00 00 28 f9 96 12 fa 7f 00 00  ..).B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c5ffac0   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffac0 00 00 00 00 00 00 00 00 89 e9 b3 12 fa 7f 00 00  ................
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x35e989
    rsp = 0x0000009a1c5ffad0   rip = 0x00007ffa12b3e989
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffad0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffae0 10 e9 b3 12 fa 7f 00 00                          ........        
    Possible instruction pointers:

 7  libvulkan_lvp.dll + 0x35e910
    rsp = 0x0000009a1c5ffae8   rip = 0x00007ffa12b3e910
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffae8 50 66 51 0f 42 02 00 00 00 00 00 00 00 00 00 00  PfQ.B...........
     0000009a1c5ffaf8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffb08 00 00 00 00 00 00 00 00 c0 d5 29 0f 42 02 00 00  ..........).B...
     0000009a1c5ffb18 47 ec a8 13 fa 7f 00 00                          G.......        
    Possible instruction pointers:

 8  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c5ffb20   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffb40 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 9  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c5ffb50   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c5ffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c5ffb70 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

10  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c5ffb80   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 30
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c6ffac8   rdi = 0x0000000000000000
    rbp = 0x0000009a1c6ffaf0   rsp = 0x0000009a1c6ffa98
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c6ffa98 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c6ffac8   rdi = 0x0000000000000000
    rbp = 0x0000009a1c6ffaf0   rsp = 0x0000009a1c6ffaa0
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c6ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffab0 20 fa 5f 1c 9a 00 00 00 c8 fa 6f 1c 9a 00 00 00   ._.......o.....
     0000009a1c6ffac0 20 fa 5f 1c 9a 00 00 00 20 fa 5f 1c 9a 00 00 00   ._..... ._.....
     0000009a1c6ffad0 60 fd 7f 1c 9a 00 00 00 7c 13 00 00 00 00 00 00  `.......|.......
     0000009a1c6ffae0 30 ba 1e 0f 00 00 00 00 00 00 00 00 00 00 00 00  0...............
     0000009a1c6ffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffb00 00 00 00 00 00 00 00 00 b9 db cf 84 fa 7f 00 00  ................
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c6ffb10   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffb10 50 66 51 0f 42 02 00 00 88 67 51 0f 42 02 00 00  PfQ.B....gQ.B...
     0000009a1c6ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffb30 50 66 51 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  PfQ.B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c6ffb40   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffb40 00 00 00 00 00 00 00 00 d2 fa a9 13 fa 7f 00 00  ................
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x12bfad2
    rsp = 0x0000009a1c6ffb50   rip = 0x00007ffa13a9fad2
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffb50 50 d0 29 0f 42 02 00 00 28 f9 96 12 fa 7f 00 00  P.).B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c6ffb60   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffb60 00 00 00 00 00 00 00 00 89 e9 b3 12 fa 7f 00 00  ................
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x35e989
    rsp = 0x0000009a1c6ffb70   rip = 0x00007ffa12b3e989
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffb70 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffb80 10 e9 b3 12 fa 7f 00 00                          ........        
    Possible instruction pointers:

 7  libvulkan_lvp.dll + 0x35e910
    rsp = 0x0000009a1c6ffb88   rip = 0x00007ffa12b3e910
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffb88 50 66 51 0f 42 02 00 00 00 00 00 00 00 00 00 00  PfQ.B...........
     0000009a1c6ffb98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffba8 00 00 00 00 00 00 00 00 50 d0 29 0f 42 02 00 00  ........P.).B...
     0000009a1c6ffbb8 47 ec a8 13 fa 7f 00 00                          G.......        
    Possible instruction pointers:

 8  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c6ffbc0   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffbe0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 9  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c6ffbf0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c6ffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c6ffc10 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

10  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c6ffc20   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 31
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c7ffd68   rdi = 0x0000000000000000
    rbp = 0x0000009a1c7ffd90   rsp = 0x0000009a1c7ffd38
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c7ffd38 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c7ffd68   rdi = 0x0000000000000000
    rbp = 0x0000009a1c7ffd90   rsp = 0x0000009a1c7ffd40
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c7ffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffd50 c0 fa 6f 1c 9a 00 00 00 68 fd 7f 1c 9a 00 00 00  ..o.....h.......
     0000009a1c7ffd60 c0 fa 6f 1c 9a 00 00 00 20 fa 5f 1c 9a 00 00 00  ..o..... ._.....
     0000009a1c7ffd70 c0 fa 8f 1c 9a 00 00 00 c0 14 00 00 00 00 00 00  ................
     0000009a1c7ffd80 f0 bf 1e 0f 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffd90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffda0 00 00 00 00 00 00 00 00 b9 db cf 84 fa 7f 00 00  ................
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c7ffdb0   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffdb0 50 66 51 0f 42 02 00 00 88 67 51 0f 42 02 00 00  PfQ.B....gQ.B...
     0000009a1c7ffdc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffdd0 50 66 51 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  PfQ.B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c7ffde0   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffde0 00 00 00 00 00 00 00 00 d2 fa a9 13 fa 7f 00 00  ................
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x12bfad2
    rsp = 0x0000009a1c7ffdf0   rip = 0x00007ffa13a9fad2
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffdf0 50 d6 29 0f 42 02 00 00 28 f9 96 12 fa 7f 00 00  P.).B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c7ffe00   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffe00 00 00 00 00 00 00 00 00 89 e9 b3 12 fa 7f 00 00  ................
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x35e989
    rsp = 0x0000009a1c7ffe10   rip = 0x00007ffa12b3e989
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffe10 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffe20 10 e9 b3 12 fa 7f 00 00                          ........        
    Possible instruction pointers:

 7  libvulkan_lvp.dll + 0x35e910
    rsp = 0x0000009a1c7ffe28   rip = 0x00007ffa12b3e910
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffe28 50 66 51 0f 42 02 00 00 00 00 00 00 00 00 00 00  PfQ.B...........
     0000009a1c7ffe38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffe48 00 00 00 00 00 00 00 00 50 d6 29 0f 42 02 00 00  ........P.).B...
     0000009a1c7ffe58 47 ec a8 13 fa 7f 00 00                          G.......        
    Possible instruction pointers:

 8  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c7ffe60   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffe60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffe70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffe80 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 9  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c7ffe90   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c7ffe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c7ffeb0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

10  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c7ffec0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 32
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c8ffac8   rdi = 0x0000000000000000
    rbp = 0x0000009a1c8ffaf0   rsp = 0x0000009a1c8ffa98
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c8ffa98 a5 43 f9 86 fa 7f 00 00                          .C......        
    Possible instruction pointers:

 1  ntdll.dll + 0x643a5
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f516650   rbx = 0x0000000000000000
    rsi = 0x0000009a1c8ffac8   rdi = 0x0000000000000000
    rbp = 0x0000009a1c8ffaf0   rsp = 0x0000009a1c8ffaa0
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x000002420f516650   r15 = 0x000002420f516678
    rip = 0x00007ffa86f943a5
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c8ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffab0 60 fd 7f 1c 9a 00 00 00 c8 fa 8f 1c 9a 00 00 00  `...............
     0000009a1c8ffac0 60 fd 7f 1c 9a 00 00 00 20 fa 5f 1c 9a 00 00 00  `....... ._.....
     0000009a1c8ffad0 00 00 00 00 00 00 00 00 b0 1d 00 00 00 00 00 00  ................
     0000009a1c8ffae0 30 bc 1e 0f 00 00 00 00 00 00 00 00 00 00 00 00  0...............
     0000009a1c8ffaf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffb00 00 00 00 00 00 00 00 00 b9 db cf 84 fa 7f 00 00  ................
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dbb9
    rsp = 0x0000009a1c8ffb10   rip = 0x00007ffa84cfdbb9
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffb10 50 66 51 0f 42 02 00 00 88 67 51 0f 42 02 00 00  PfQ.B....gQ.B...
     0000009a1c8ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffb30 50 66 51 0f 42 02 00 00 40 f8 96 12 fa 7f 00 00  PfQ.B...@.......
    Possible instruction pointers:

 3  libvulkan_lvp.dll + 0x18f840
    rsp = 0x0000009a1c8ffb40   rip = 0x00007ffa1296f840
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffb40 00 00 00 00 00 00 00 00 d2 fa a9 13 fa 7f 00 00  ................
    Possible instruction pointers:

 4  libvulkan_lvp.dll + 0x12bfad2
    rsp = 0x0000009a1c8ffb50   rip = 0x00007ffa13a9fad2
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffb50 d0 d1 29 0f 42 02 00 00 28 f9 96 12 fa 7f 00 00  ..).B...(.......
    Possible instruction pointers:

 5  libvulkan_lvp.dll + 0x18f928
    rsp = 0x0000009a1c8ffb60   rip = 0x00007ffa1296f928
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffb60 00 00 00 00 00 00 00 00 89 e9 b3 12 fa 7f 00 00  ................
    Possible instruction pointers:

 6  libvulkan_lvp.dll + 0x35e989
    rsp = 0x0000009a1c8ffb70   rip = 0x00007ffa12b3e989
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffb70 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffb80 10 e9 b3 12 fa 7f 00 00                          ........        
    Possible instruction pointers:

 7  libvulkan_lvp.dll + 0x35e910
    rsp = 0x0000009a1c8ffb88   rip = 0x00007ffa12b3e910
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffb88 50 66 51 0f 42 02 00 00 00 00 00 00 00 00 00 00  PfQ.B...........
     0000009a1c8ffb98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffba8 00 00 00 00 00 00 00 00 d0 d1 29 0f 42 02 00 00  ..........).B...
     0000009a1c8ffbb8 47 ec a8 13 fa 7f 00 00                          G.......        
    Possible instruction pointers:

 8  libvulkan_lvp.dll + 0x12aec47
    rsp = 0x0000009a1c8ffbc0   rip = 0x00007ffa13a8ec47
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffbe0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 9  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c8ffbf0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c8ffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c8ffc10 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

10  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c8ffc20   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 33
 0  win32u.dll + 0x1104
    rax = 0x0000000000001006   rdx = 0x0000000000000000
    rcx = 0x0000009a1c9ffc70   rbx = 0x0000009a1c9ffc70
    rsi = 0x0000000000000000   rdi = 0x00007ffa628cfb48
    rbp = 0x0000000000000000   rsp = 0x0000009a1c9ffba8
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84b01104
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1c9ffba8 9e 1b 0c 85 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  USER32.dll + 0x21b9e
    rax = 0x0000000000001006   rdx = 0x0000000000000000
    rcx = 0x0000009a1c9ffc70   rbx = 0x0000009a1c9ffc70
    rsi = 0x0000000000000000   rdi = 0x00007ffa628cfb48
    rbp = 0x0000000000000000   rsp = 0x0000009a1c9ffbb0
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa850c1b9e
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1c9ffbb0 01 00 00 00 20 00 00 00 01 00 00 00 fa 7f 00 00  .... ...........
     0000009a1c9ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffbd0 00 00 8a 62 fa 7f 00 00 00 00 00 00 00 00 00 00  ...b............
     0000009a1c9ffbe0 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00  ...........@....
     0000009a1c9ffbf0 00 00 00 00 fa 7f 00 00 00 06 00 00 00 00 00 00  ................
     0000009a1c9ffc00 00 00 00 00 00 00 00 00 97 8f 8a 62 fa 7f 00 00  ...........b....
    Possible instruction pointers:

 2  graphics-hook64.dll + 0x8f97
    rsp = 0x0000009a1c9ffc10   rip = 0x00007ffa628a8f97
    Found by: stack scanning

    Stack contents:
     0000009a1c9ffc10 48 fb 8c 62 fa 7f 00 00                          H..b....        
    Possible instruction pointers:

 3  graphics-hook64.dll + 0x2fb48
    rsp = 0x0000009a1c9ffc18   rip = 0x00007ffa628cfb48
    Found by: stack scanning

    Stack contents:
     0000009a1c9ffc18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffc28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffc38 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1c9ffc48 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffc58 00 00 00 00 00 00 00 00 00 00 8a 62 fa 7f 00 00  ...........b....
     0000009a1c9ffc68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffc78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffc88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffc98 00 00 00 00 00 00 00 00 20 00 00 00 00 00 00 00  ........ .......
     0000009a1c9ffca8 90 cd fc 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 4  ntdll.dll + 0x9cd90
    rsp = 0x0000009a1c9ffcb0   rip = 0x00007ffa86fccd90
    Found by: stack scanning

    Stack contents:
     0000009a1c9ffcb0 00 00 00 00 00 00 00 00 00 00 8a 62 fa 7f 00 00  ...........b....
     0000009a1c9ffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffce0 48 fb 8c 62 fa 7f 00 00                          H..b....        
    Possible instruction pointers:

 5  graphics-hook64.dll + 0x2fb48
    rsp = 0x0000009a1c9ffce8   rip = 0x00007ffa628cfb48
    Found by: stack scanning

    Stack contents:
     0000009a1c9ffce8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffcf8 14 76 e4 86 fa 7f 00 00                          .v......        
    Possible instruction pointers:

 6  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1c9ffd00   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1c9ffd00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffd10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1c9ffd20 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 7  ntdll.dll + 0x526a1
    rsp = 0x0000009a1c9ffd30   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 34
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x0000024213324dc0   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000024213324dc0
    rbp = 0x0000009a1caffd60   rsp = 0x0000009a1caffd08
     r8 = 0x0000024213324d20    r9 = 0x00007ffa1f4b2d70
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1caffd30   r15 = 0x0000024213324dc8
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1caffd08 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x0000024213324dc0   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000024213324dc0
    rbp = 0x0000009a1caffd60   rsp = 0x0000009a1caffd10
     r8 = 0x0000024213324d20    r9 = 0x00007ffa1f4b2d70
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1caffd30   r15 = 0x0000024213324dc8
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1caffd10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffd30 00 00 00 00 00 00 00 00 30 fd af 1c 9a 00 00 00  ........0.......
     0000009a1caffd40 00 00 00 00 00 00 00 00 48 0b 00 00 00 00 00 00  ........H.......
     0000009a1caffd50 00 00 00 00 01 00 00 00 c0 4d 32 13 42 02 00 00  .........M2.B...
     0000009a1caffd60 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1caffd70   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1caffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffd80 00 00 00 00 00 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1caffd90   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1caffd90 c8 4d 32 13 42 02 00 00 20 4d 32 13 42 02 00 00  .M2.B... M2.B...
     0000009a1caffda0 c0 4d 32 13 42 02 00 00 00 00 00 00 00 00 00 00  .M2.B...........
     0000009a1caffdb0 00 00 00 00 00 00 00 00 20 4d 32 13 42 02 00 00  ........ M2.B...
     0000009a1caffdc0 c8 4d 32 13 42 02 00 00 22 85 44 1f fa 7f 00 00  .M2.B...".D.....
    Possible instruction pointers:

 4  libgfxstream_backend.dll + 0xe8522
    rsp = 0x0000009a1caffdd0   rip = 0x00007ffa1f448522
    Found by: stack scanning

    Stack contents:
     0000009a1caffdd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffde0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffe00 00 00 00 00 00 00 00 00 20 4d 32 13 42 02 00 00  ........ M2.B...
     0000009a1caffe10 00 00 00 00 00 00 00 00 80 2d 4b 1f fa 7f 00 00  .........-K.....
    Possible instruction pointers:

 5  libgfxstream_backend.dll + 0x152d80
    rsp = 0x0000009a1caffe20   rip = 0x00007ffa1f4b2d80
    Found by: stack scanning

    Stack contents:
     0000009a1caffe20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffe30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffe40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffe50 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 6  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1caffe60   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1caffe60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffe70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1caffe80 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 7  ntdll.dll + 0x526a1
    rsp = 0x0000009a1caffe90   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 35
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fcbe5f8   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fcbe5f8
    rbp = 0x0000009a1cbff690   rsp = 0x0000009a1cbff638
     r8 = 0x0000000000000000    r9 = 0x0000009a1cbff5c0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1cbff660   r15 = 0x000002427fcbe640
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1cbff638 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fcbe5f8   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fcbe5f8
    rbp = 0x0000009a1cbff690   rsp = 0x0000009a1cbff640
     r8 = 0x0000000000000000    r9 = 0x0000009a1cbff5c0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1cbff660   r15 = 0x000002427fcbe640
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1cbff640 00 00 00 00 00 00 00 00 f0 e1 86 0f 42 02 00 00  ............B...
     0000009a1cbff650 01 00 00 00 00 00 00 00 5b f0 77 84 fa 7f 00 00  ........[.w.....
    Possible instruction pointers:

 2  ucrtbase.dll + 0xf05b
    rbp = 0x0000009a1cbff690   rsp = 0x0000009a1cbff660
    rip = 0x00007ffa8477f05b
    Found by: stack scanning

    Stack contents:
     0000009a1cbff660 00 00 00 00 00 00 00 00 60 f6 bf 1c 9a 00 00 00  ........`.......
     0000009a1cbff670 00 00 00 00 00 00 00 00 9c 22 00 00 00 00 00 00  ........."......
     0000009a1cbff680 01 00 00 00 01 00 00 00 f8 e5 cb 7f 42 02 00 00  ............B...
     0000009a1cbff690 f0 e1 86 0f 42 02 00 00 c0 f7 bf 1c 9a 00 00 00  ....B...........
     0000009a1cbff6a0 00 00 00 00 00 00 00 00 e8 e5 cb 7f 42 02 00 00  ............B...
     0000009a1cbff6b0 d0 f7 bf 1c 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1cbff6c0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1cbff6c0 f0 e5 cb 7f 42 02 00 00 e8 e5 cb 7f 42 02 00 00  ....B.......B...
     0000009a1cbff6d0 38 e6 cb 7f 42 02 00 00 00 00 00 00 fa 7f 00 00  8...B...........
     0000009a1cbff6e0 00 00 00 00 00 00 00 00 e8 e5 cb 7f 42 02 00 00  ............B...
     0000009a1cbff6f0 f0 e5 cb 7f 42 02 00 00 49 25 1a 6a fa 7f 00 00  ....B...I%.j....
    Possible instruction pointers:

 4  MSVCP140.dll + 0x12549
    rsp = 0x0000009a1cbff700   rip = 0x00007ffa6a1a2549
    Found by: stack scanning

    Stack contents:
     0000009a1cbff700 00 00 00 00 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1cbff710 00 ff ff ff ff ff ff ff 00 20 2e 0f 42 02 00 00  ......... ..B...
     0000009a1cbff720 88 e1 86 0f 42 02 00 00 da 27 1a 6a fa 7f 00 00  ....B....'.j....
    Possible instruction pointers:

 5  MSVCP140.dll + 0x127da
    rsp = 0x0000009a1cbff730   rip = 0x00007ffa6a1a27da
    Found by: stack scanning

    Stack contents:
     0000009a1cbff730 10 88 12 16 bd ed 00 00 38 e6 cb 7f 42 02 00 00  ........8...B...
     0000009a1cbff740 c0 f7 bf 1c 9a 00 00 00 f0 e1 86 0f 42 02 00 00  ............B...
     0000009a1cbff750 f0 e1 86 0f 42 02 00 00 de aa 44 1f fa 7f 00 00  ....B.....D.....
    Possible instruction pointers:

 6  libgfxstream_backend.dll + 0xeaade
    rsp = 0x0000009a1cbff760   rip = 0x00007ffa1f44aade
    Found by: stack scanning

    Stack contents:
     0000009a1cbff760 38 e6 cb 7f 42 02 00 00 00 e5 cb 7f 42 02 00 00  8...B.......B...
     0000009a1cbff770 38 e6 cb 7f 42 02 00 00 00 00 00 00 00 00 00 00  8...B...........
     0000009a1cbff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cbff790 80 e6 cb 7f 42 02 00 00 e8 e5 cb 7f 42 02 00 00  ....B.......B...
     0000009a1cbff7a0 20 e1 86 0f 42 02 00 00 20 e1 86 0f 42 02 00 00   ...B... ...B...
     0000009a1cbff7b0 30 e5 86 0f 42 02 00 00 00 00 00 00 00 00 00 00  0...B...........
     0000009a1cbff7c0 a0 42 1f 13 42 02 00 00 01 00 ce 84 fa 7f 00 00  .B..B...........
    Possible instruction pointers:

 7  KERNELBASE.dll + 0x50001
    rsp = 0x0000009a1cbff7d0   rip = 0x00007ffa84ce0001
    Found by: stack scanning

    Stack contents:
     0000009a1cbff7d0 fe ff ff ff ff ff ff ff 20 e2 d3 12 42 02 00 00  ........ ...B...
     0000009a1cbff7e0 00 00 00 00 00 00 00 00 a0 3b 77 0f 42 02 00 00  .........;w.B...
     0000009a1cbff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cbff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cbff810 40 f8 bf 1c 9a 00 00 00 be a9 44 1f fa 7f 00 00  @.........D.....
    Possible instruction pointers:

 8  libgfxstream_backend.dll + 0xea9be
    rsp = 0x0000009a1cbff820   rip = 0x00007ffa1f44a9be
    Found by: stack scanning

    Stack contents:
     0000009a1cbff820 80 78 81 0f 42 02 00 00 36 30 78 84 fa 7f 00 00  .x..B...60x.....
    Possible instruction pointers:

 9  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1cbff830   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1cbff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cbff840 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1cbff850 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

10  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1cbff860   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1cbff860 20 e2 d3 12 42 02 00 00 00 00 00 00 00 00 00 00   ...B...........
     0000009a1cbff870 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cbff880 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

11  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1cbff890   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1cbff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cbff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cbff8b0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

12  ntdll.dll + 0x526a1
    rsp = 0x0000009a1cbff8c0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 36
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fcbdf38   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fcbdf38
    rbp = 0x0000009a1ccff830   rsp = 0x0000009a1ccff7d8
     r8 = 0x0000024213e2def0    r9 = 0x00000000000000f0
    r10 = 0x000002427f8e0cc0   r11 = 0x0000009a1ccfea01
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1ccff800   r15 = 0x000002427fcbdf80
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1ccff7d8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fcbdf38   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fcbdf38
    rbp = 0x0000009a1ccff830   rsp = 0x0000009a1ccff7e0
     r8 = 0x0000024213e2def0    r9 = 0x00000000000000f0
    r10 = 0x000002427f8e0cc0   r11 = 0x0000009a1ccfea01
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1ccff800   r15 = 0x000002427fcbdf80
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1ccff7e0 00 00 00 00 00 00 00 00 98 19 87 0f 42 02 00 00  ............B...
     0000009a1ccff7f0 01 00 00 00 00 00 00 00 5b f0 77 84 fa 7f 00 00  ........[.w.....
    Possible instruction pointers:

 2  ucrtbase.dll + 0xf05b
    rbp = 0x0000009a1ccff830   rsp = 0x0000009a1ccff800
    rip = 0x00007ffa8477f05b
    Found by: stack scanning

    Stack contents:
     0000009a1ccff800 00 00 00 00 00 00 00 00 00 f8 cf 1c 9a 00 00 00  ................
     0000009a1ccff810 00 00 00 00 00 00 00 00 ec 07 00 00 00 00 00 00  ................
     0000009a1ccff820 01 00 00 00 01 00 00 00 38 df cb 7f 42 02 00 00  ........8...B...
     0000009a1ccff830 18 a8 72 0f 42 02 00 00 60 f9 cf 1c 9a 00 00 00  ..r.B...`.......
     0000009a1ccff840 00 00 00 00 00 00 00 00 28 df cb 7f 42 02 00 00  ........(...B...
     0000009a1ccff850 70 f9 cf 1c 9a 00 00 00 69 dc cf 84 fa 7f 00 00  p.......i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1ccff860   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1ccff860 30 df cb 7f 42 02 00 00 28 df cb 7f 42 02 00 00  0...B...(...B...
     0000009a1ccff870 78 df cb 7f 42 02 00 00 00 00 00 00 fa 7f 00 00  x...B...........
     0000009a1ccff880 00 00 00 00 00 00 00 00 28 df cb 7f 42 02 00 00  ........(...B...
     0000009a1ccff890 30 df cb 7f 42 02 00 00 49 25 1a 6a fa 7f 00 00  0...B...I%.j....
    Possible instruction pointers:

 4  MSVCP140.dll + 0x12549
    rsp = 0x0000009a1ccff8a0   rip = 0x00007ffa6a1a2549
    Found by: stack scanning

    Stack contents:
     0000009a1ccff8a0 00 00 00 00 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1ccff8b0 00 ff ff ff ff ff ff ff 00 3d 2e 0f 42 02 00 00  .........=..B...
     0000009a1ccff8c0 b0 a7 72 0f 42 02 00 00 da 27 1a 6a fa 7f 00 00  ..r.B....'.j....
    Possible instruction pointers:

 5  MSVCP140.dll + 0x127da
    rsp = 0x0000009a1ccff8d0   rip = 0x00007ffa6a1a27da
    Found by: stack scanning

    Stack contents:
     0000009a1ccff8d0 b0 87 62 16 bd ed 00 00 78 df cb 7f 42 02 00 00  ..b.....x...B...
     0000009a1ccff8e0 60 f9 cf 1c 9a 00 00 00 18 a8 72 0f 42 02 00 00  `.........r.B...
     0000009a1ccff8f0 18 a8 72 0f 42 02 00 00 de aa 44 1f fa 7f 00 00  ..r.B.....D.....
    Possible instruction pointers:

 6  libgfxstream_backend.dll + 0xeaade
    rsp = 0x0000009a1ccff900   rip = 0x00007ffa1f44aade
    Found by: stack scanning

    Stack contents:
     0000009a1ccff900 78 df cb 7f 42 02 00 00 40 de cb 7f 42 02 00 00  x...B...@...B...
     0000009a1ccff910 78 df cb 7f 42 02 00 00 00 00 00 00 00 00 00 00  x...B...........
     0000009a1ccff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ccff930 c0 df cb 7f 42 02 00 00 28 df cb 7f 42 02 00 00  ....B...(...B...
     0000009a1ccff940 b0 a7 72 0f 42 02 00 00 b0 a7 72 0f 42 02 00 00  ..r.B.....r.B...
     0000009a1ccff950 c0 ab 72 0f 42 02 00 00 00 00 00 00 00 00 00 00  ..r.B...........
     0000009a1ccff960 40 30 1f 13 42 02 00 00 01 00 ce 84 fa 7f 00 00  @0..B...........
    Possible instruction pointers:

 7  KERNELBASE.dll + 0x50001
    rsp = 0x0000009a1ccff970   rip = 0x00007ffa84ce0001
    Found by: stack scanning

    Stack contents:
     0000009a1ccff970 fe ff ff ff ff ff ff ff 20 dc d3 12 42 02 00 00  ........ ...B...
     0000009a1ccff980 00 00 00 00 00 00 00 00 b0 3a 77 0f 42 02 00 00  .........:w.B...
     0000009a1ccff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ccff9a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ccff9b0 e0 f9 cf 1c 9a 00 00 00 be a9 44 1f fa 7f 00 00  ..........D.....
    Possible instruction pointers:

 8  libgfxstream_backend.dll + 0xea9be
    rsp = 0x0000009a1ccff9c0   rip = 0x00007ffa1f44a9be
    Found by: stack scanning

    Stack contents:
     0000009a1ccff9c0 50 80 81 0f 42 02 00 00 36 30 78 84 fa 7f 00 00  P...B...60x.....
    Possible instruction pointers:

 9  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1ccff9d0   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1ccff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ccff9e0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1ccff9f0 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

10  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1ccffa00   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1ccffa00 20 dc d3 12 42 02 00 00 00 00 00 00 00 00 00 00   ...B...........
     0000009a1ccffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ccffa20 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

11  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1ccffa30   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1ccffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ccffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ccffa50 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

12  ntdll.dll + 0x526a1
    rsp = 0x0000009a1ccffa60   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 37
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fcbe7a8   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fcbe7a8
    rbp = 0x0000009a1cdffd10   rsp = 0x0000009a1cdffcb8
     r8 = 0x0000000000000001    r9 = 0x00000000000088f0
    r10 = 0x0000000000000040   r11 = 0x0000009a1cdff858
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1cdffce0   r15 = 0x000002427fcbe7f0
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1cdffcb8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002427fcbe7a8   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002427fcbe7a8
    rbp = 0x0000009a1cdffd10   rsp = 0x0000009a1cdffcc0
     r8 = 0x0000000000000001    r9 = 0x00000000000088f0
    r10 = 0x0000000000000040   r11 = 0x0000009a1cdff858
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1cdffce0   r15 = 0x000002427fcbe7f0
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1cdffcc0 00 00 00 00 00 00 00 00 38 22 87 0f 42 02 00 00  ........8"..B...
     0000009a1cdffcd0 01 00 00 00 00 00 00 00 5b f0 77 84 fa 7f 00 00  ........[.w.....
    Possible instruction pointers:

 2  ucrtbase.dll + 0xf05b
    rbp = 0x0000009a1cdffd10   rsp = 0x0000009a1cdffce0
    rip = 0x00007ffa8477f05b
    Found by: stack scanning

    Stack contents:
     0000009a1cdffce0 00 00 00 00 00 00 00 00 e0 fc df 1c 9a 00 00 00  ................
     0000009a1cdffcf0 00 00 00 00 00 00 00 00 14 12 00 00 00 00 00 00  ................
     0000009a1cdffd00 01 00 00 00 01 00 00 00 a8 e7 cb 7f 42 02 00 00  ............B...
     0000009a1cdffd10 a8 bd 72 0f 42 02 00 00 40 fe df 1c 9a 00 00 00  ..r.B...@.......
     0000009a1cdffd20 00 00 00 00 00 00 00 00 98 e7 cb 7f 42 02 00 00  ............B...
     0000009a1cdffd30 50 fe df 1c 9a 00 00 00 69 dc cf 84 fa 7f 00 00  P.......i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1cdffd40   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1cdffd40 a0 e7 cb 7f 42 02 00 00 98 e7 cb 7f 42 02 00 00  ....B.......B...
     0000009a1cdffd50 e8 e7 cb 7f 42 02 00 00 00 00 00 00 fa 7f 00 00  ....B...........
     0000009a1cdffd60 00 00 00 00 00 00 00 00 98 e7 cb 7f 42 02 00 00  ............B...
     0000009a1cdffd70 a0 e7 cb 7f 42 02 00 00 49 25 1a 6a fa 7f 00 00  ....B...I%.j....
    Possible instruction pointers:

 4  MSVCP140.dll + 0x12549
    rsp = 0x0000009a1cdffd80   rip = 0x00007ffa6a1a2549
    Found by: stack scanning

    Stack contents:
     0000009a1cdffd80 00 00 00 00 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1cdffd90 00 ff ff ff ff ff ff ff 00 3c 2e 0f 42 02 00 00  .........<..B...
     0000009a1cdffda0 40 bd 72 0f 42 02 00 00 da 27 1a 6a fa 7f 00 00  @.r.B....'.j....
    Possible instruction pointers:

 5  MSVCP140.dll + 0x127da
    rsp = 0x0000009a1cdffdb0   rip = 0x00007ffa6a1a27da
    Found by: stack scanning

    Stack contents:
     0000009a1cdffdb0 90 82 72 16 bd ed 00 00 e8 e7 cb 7f 42 02 00 00  ..r.........B...
     0000009a1cdffdc0 40 fe df 1c 9a 00 00 00 a8 bd 72 0f 42 02 00 00  @.........r.B...
     0000009a1cdffdd0 a8 bd 72 0f 42 02 00 00 de aa 44 1f fa 7f 00 00  ..r.B.....D.....
    Possible instruction pointers:

 6  libgfxstream_backend.dll + 0xeaade
    rsp = 0x0000009a1cdffde0   rip = 0x00007ffa1f44aade
    Found by: stack scanning

    Stack contents:
     0000009a1cdffde0 e8 e7 cb 7f 42 02 00 00 b0 e6 cb 7f 42 02 00 00  ....B.......B...
     0000009a1cdffdf0 e8 e7 cb 7f 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1cdffe00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cdffe10 30 e8 cb 7f 42 02 00 00 98 e7 cb 7f 42 02 00 00  0...B.......B...
     0000009a1cdffe20 40 bd 72 0f 42 02 00 00 40 bd 72 0f 42 02 00 00  @.r.B...@.r.B...
     0000009a1cdffe30 50 c1 72 0f 42 02 00 00 00 00 00 00 00 00 00 00  P.r.B...........
     0000009a1cdffe40 40 45 1f 13 42 02 00 00 01 00 ce 84 fa 7f 00 00  @E..B...........
    Possible instruction pointers:

 7  KERNELBASE.dll + 0x50001
    rsp = 0x0000009a1cdffe50   rip = 0x00007ffa84ce0001
    Found by: stack scanning

    Stack contents:
     0000009a1cdffe50 fe ff ff ff ff ff ff ff 00 de d3 12 42 02 00 00  ............B...
     0000009a1cdffe60 00 00 00 00 00 00 00 00 60 3b 77 0f 42 02 00 00  ........`;w.B...
     0000009a1cdffe70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cdffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cdffe90 c0 fe df 1c 9a 00 00 00 be a9 44 1f fa 7f 00 00  ..........D.....
    Possible instruction pointers:

 8  libgfxstream_backend.dll + 0xea9be
    rsp = 0x0000009a1cdffea0   rip = 0x00007ffa1f44a9be
    Found by: stack scanning

    Stack contents:
     0000009a1cdffea0 10 36 73 1c 42 02 00 00 36 30 78 84 fa 7f 00 00  .6s.B...60x.....
    Possible instruction pointers:

 9  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1cdffeb0   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1cdffeb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cdffec0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1cdffed0 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

10  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1cdffee0   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1cdffee0 00 de d3 12 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1cdffef0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cdfff00 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

11  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1cdfff10   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1cdfff10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cdfff20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cdfff30 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

12  ntdll.dll + 0x526a1
    rsp = 0x0000009a1cdfff40   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 38
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x0000024213467148   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000024213467148
    rbp = 0x0000009a1ceffa10   rsp = 0x0000009a1ceff9b8
     r8 = 0x000002421d1cfcf0    r9 = 0x0000000000000350
    r10 = 0x0000000000000000   r11 = 0x000002420f719290
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1ceff9e0   r15 = 0x0000024213467190
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1ceff9b8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x0000024213467148   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000024213467148
    rbp = 0x0000009a1ceffa10   rsp = 0x0000009a1ceff9c0
     r8 = 0x000002421d1cfcf0    r9 = 0x0000000000000350
    r10 = 0x0000000000000000   r11 = 0x000002420f719290
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1ceff9e0   r15 = 0x0000024213467190
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1ceff9c0 00 00 00 00 00 00 00 00 c8 37 87 0f 42 02 00 00  .........7..B...
     0000009a1ceff9d0 01 00 00 00 00 00 00 00 5b f0 77 84 fa 7f 00 00  ........[.w.....
    Possible instruction pointers:

 2  ucrtbase.dll + 0xf05b
    rbp = 0x0000009a1ceffa10   rsp = 0x0000009a1ceff9e0
    rip = 0x00007ffa8477f05b
    Found by: stack scanning

    Stack contents:
     0000009a1ceff9e0 00 00 00 00 00 00 00 00 e0 f9 ef 1c 9a 00 00 00  ................
     0000009a1ceff9f0 00 00 00 00 00 00 00 00 f4 13 00 00 00 00 00 00  ................
     0000009a1ceffa00 01 00 00 00 01 00 00 00 48 71 46 13 42 02 00 00  ........HqF.B...
     0000009a1ceffa10 d8 96 72 0f 42 02 00 00 40 fb ef 1c 9a 00 00 00  ..r.B...@.......
     0000009a1ceffa20 00 00 00 00 00 00 00 00 38 71 46 13 42 02 00 00  ........8qF.B...
     0000009a1ceffa30 50 fb ef 1c 9a 00 00 00 69 dc cf 84 fa 7f 00 00  P.......i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1ceffa40   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1ceffa40 40 71 46 13 42 02 00 00 38 71 46 13 42 02 00 00  @qF.B...8qF.B...
     0000009a1ceffa50 88 71 46 13 42 02 00 00 00 00 00 00 fa 7f 00 00  .qF.B...........
     0000009a1ceffa60 00 00 00 00 00 00 00 00 38 71 46 13 42 02 00 00  ........8qF.B...
     0000009a1ceffa70 40 71 46 13 42 02 00 00 49 25 1a 6a fa 7f 00 00  @qF.B...I%.j....
    Possible instruction pointers:

 4  MSVCP140.dll + 0x12549
    rsp = 0x0000009a1ceffa80   rip = 0x00007ffa6a1a2549
    Found by: stack scanning

    Stack contents:
     0000009a1ceffa80 00 00 00 00 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1ceffa90 00 ff ff ff ff ff ff ff 00 36 2e 0f 42 02 00 00  .........6..B...
     0000009a1ceffaa0 70 96 72 0f 42 02 00 00 da 27 1a 6a fa 7f 00 00  p.r.B....'.j....
    Possible instruction pointers:

 5  MSVCP140.dll + 0x127da
    rsp = 0x0000009a1ceffab0   rip = 0x00007ffa6a1a27da
    Found by: stack scanning

    Stack contents:
     0000009a1ceffab0 90 85 42 16 bd ed 00 00 88 71 46 13 42 02 00 00  ..B......qF.B...
     0000009a1ceffac0 40 fb ef 1c 9a 00 00 00 d8 96 72 0f 42 02 00 00  @.........r.B...
     0000009a1ceffad0 d8 96 72 0f 42 02 00 00 de aa 44 1f fa 7f 00 00  ..r.B.....D.....
    Possible instruction pointers:

 6  libgfxstream_backend.dll + 0xeaade
    rsp = 0x0000009a1ceffae0   rip = 0x00007ffa1f44aade
    Found by: stack scanning

    Stack contents:
     0000009a1ceffae0 88 71 46 13 42 02 00 00 50 70 46 13 42 02 00 00  .qF.B...PpF.B...
     0000009a1ceffaf0 88 71 46 13 42 02 00 00 00 00 00 00 00 00 00 00  .qF.B...........
     0000009a1ceffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ceffb10 d0 71 46 13 42 02 00 00 38 71 46 13 42 02 00 00  .qF.B...8qF.B...
     0000009a1ceffb20 70 96 72 0f 42 02 00 00 70 96 72 0f 42 02 00 00  p.r.B...p.r.B...
     0000009a1ceffb30 80 9a 72 0f 42 02 00 00 00 00 00 00 00 00 00 00  ..r.B...........
     0000009a1ceffb40 40 45 1f 13 42 02 00 00 01 00 ce 84 fa 7f 00 00  @E..B...........
    Possible instruction pointers:

 7  KERNELBASE.dll + 0x50001
    rsp = 0x0000009a1ceffb50   rip = 0x00007ffa84ce0001
    Found by: stack scanning

    Stack contents:
     0000009a1ceffb50 fe ff ff ff ff ff ff ff a0 da d3 12 42 02 00 00  ............B...
     0000009a1ceffb60 00 00 00 00 00 00 00 00 a0 39 77 0f 42 02 00 00  .........9w.B...
     0000009a1ceffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ceffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ceffb90 c0 fb ef 1c 9a 00 00 00 be a9 44 1f fa 7f 00 00  ..........D.....
    Possible instruction pointers:

 8  libgfxstream_backend.dll + 0xea9be
    rsp = 0x0000009a1ceffba0   rip = 0x00007ffa1f44a9be
    Found by: stack scanning

    Stack contents:
     0000009a1ceffba0 60 ff 72 1c 42 02 00 00 36 30 78 84 fa 7f 00 00  `.r.B...60x.....
    Possible instruction pointers:

 9  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1ceffbb0   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1ceffbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ceffbc0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1ceffbd0 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

10  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1ceffbe0   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1ceffbe0 a0 da d3 12 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1ceffbf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ceffc00 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

11  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1ceffc10   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1ceffc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ceffc20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ceffc30 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

12  ntdll.dll + 0x526a1
    rsp = 0x0000009a1ceffc40   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 39
 0  ntdll.dll + 0x9d144
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000b3c   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000b3c
    rbp = 0x0000009a1cfff6f0   rsp = 0x0000009a1cfff578
     r8 = 0x0000009a1cfff578    r9 = 0x0000009a1cfff6f0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x000002421d1d0148   r13 = 0x0000009a1cfff698
    r14 = 0x0000000000000b3c   r15 = 0x000000000000411a
    rip = 0x00007ffa86fcd144
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1cfff578 6e 30 cb 84 fa 7f 00 00                          n0......        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x2306e
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000b3c   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000000000000b3c
    rbp = 0x0000009a1cfff6f0   rsp = 0x0000009a1cfff580
     r8 = 0x0000009a1cfff578    r9 = 0x0000009a1cfff6f0
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x000002421d1d0148   r13 = 0x0000009a1cfff698
    r14 = 0x0000000000000b3c   r15 = 0x000000000000411a
    rip = 0x00007ffa84cb306e
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1cfff580 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff590 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff5a0 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00  ................
     0000009a1cfff5b0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  H...............
     0000009a1cfff5c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff5d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff5e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff600 00 00 00 00 00 00 00 00 d8 f1 1e 13 42 02 00 00  ............B...
     0000009a1cfff610 4e 7a 00 00 00 00 00 00 5d 5a 3b 1f fa 7f 00 00  Nz......]Z;.....
    Possible instruction pointers:

 2  libgfxstream_backend.dll + 0x55a5d
    rbp = 0x0000009a1cfff6f0   rsp = 0x0000009a1cfff620
    rip = 0x00007ffa1f3b5a5d
    Found by: stack scanning

    Stack contents:
     0000009a1cfff620 e8 f6 ff 1c 9a 00 00 00 06 e1 44 1f fa 7f 00 00  ..........D.....
    Possible instruction pointers:

 3  libgfxstream_backend.dll + 0xee106
    rbp = 0x0000009a1cfff6f0   rsp = 0x0000009a1cfff630
    rip = 0x00007ffa1f44e106
    Found by: stack scanning

    Stack contents:
     0000009a1cfff630 00 00 00 00 00 00 00 00 3c 0b 00 00 00 00 00 00  ........<.......
     0000009a1cfff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff650 7a 9c fd ff ff ff ff ff 10 01 1d 1d 42 02 00 00  z...........B...
     0000009a1cfff660 00 01 1d 1d 42 02 00 00 a8 dc 44 1f fa 7f 00 00  ....B.....D.....
    Possible instruction pointers:

 4  libgfxstream_backend.dll + 0xedca8
    rbp = 0x0000009a1cfff6f0   rsp = 0x0000009a1cfff670
    rip = 0x00007ffa1f44dca8
    Found by: stack scanning

    Stack contents:
     0000009a1cfff670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff690 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00  ................
     0000009a1cfff6a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff6c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff6d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff6e0 2a 50 fe 00 00 00 00 00 00 00 00 00 00 00 00 00  *P..............
     0000009a1cfff6f0 00 00 00 00 00 00 00 00 14 c2 83 33 00 00 00 00  ...........3....
     0000009a1cfff700 fe ff ff ff ff ff ff ff e0 6d d2 12 42 02 00 00  .........m..B...
     0000009a1cfff710 00 00 00 00 00 00 00 00 20 3d 77 0f 42 02 00 00  ........ =w.B...
     0000009a1cfff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff740 70 f7 ff 1c 9a 00 00 00 4e de 44 1f fa 7f 00 00  p.......N.D.....
    Possible instruction pointers:

 5  libgfxstream_backend.dll + 0xede4e
    rsp = 0x0000009a1cfff750   rip = 0x00007ffa1f44de4e
    Found by: stack scanning

    Stack contents:
     0000009a1cfff750 00 0f 73 1c 42 02 00 00 36 30 78 84 fa 7f 00 00  ..s.B...60x.....
    Possible instruction pointers:

 6  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1cfff760   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1cfff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff770 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1cfff780 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

 7  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1cfff790   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1cfff790 e0 6d d2 12 42 02 00 00 00 00 00 00 00 00 00 00  .m..B...........
     0000009a1cfff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff7b0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 8  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1cfff7c0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1cfff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1cfff7e0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 9  ntdll.dll + 0x526a1
    rsp = 0x0000009a1cfff7f0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 40
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00007ff6a41baaa8   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00007ff6a41baaa8
    rbp = 0x0000009a1d0ffa90   rsp = 0x0000009a1d0ffa38
     r8 = 0x000002427f8e4680    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1d0ff910
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1d0ffa60   r15 = 0x00007ff6a41dac18
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1d0ffa38 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00007ff6a41baaa8   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00007ff6a41baaa8
    rbp = 0x0000009a1d0ffa90   rsp = 0x0000009a1d0ffa40
     r8 = 0x000002427f8e4680    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1d0ff910
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1d0ffa60   r15 = 0x00007ff6a41dac18
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1d0ffa40 00 00 8e 7f 42 02 00 00 a0 fa 0f 1d 9a 00 00 00  ....B...........
     0000009a1d0ffa50 98 fa 0f 1d 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffa60 00 00 00 00 00 00 00 00 60 fa 0f 1d 9a 00 00 00  ........`.......
     0000009a1d0ffa70 00 00 00 00 00 00 00 00 34 0e 00 00 00 00 00 00  ........4.......
     0000009a1d0ffa80 00 00 00 00 01 00 00 00 a8 aa 1b a4 f6 7f 00 00  ................
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x395aaa8
    rbp = 0x0000009a1d0ffa90   rsp = 0x0000009a1d0ffa90
    rip = 0x00007ff6a41baaa8
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffa90 00 00 00 00 00 00 00 00 08 c6 72 0f 42 02 00 00  ..........r.B...
     0000009a1d0ffaa0 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 00  ................
     0000009a1d0ffab0 01 00 00 00 00 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1d0ffac0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffac0 78 12 fc a2 f6 7f 00 00                          x.......        
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x2761278
    rsp = 0x0000009a1d0ffac8   rip = 0x00007ff6a2fc1278
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffac8 a8 aa 1b a4 f6 7f 00 00                          ........        
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x395aaa8
    rsp = 0x0000009a1d0ffad0   rip = 0x00007ff6a41baaa8
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffad0 18 ac 1d a4 f6 7f 00 00                          ........        
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x397ac18
    rsp = 0x0000009a1d0ffad8   rip = 0x00007ff6a41dac18
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffad8 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffae8 a8 aa 1b a4 f6 7f 00 00                          ........        
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x395aaa8
    rsp = 0x0000009a1d0ffaf0   rip = 0x00007ff6a41baaa8
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffaf0 78 12 fc a2 f6 7f 00 00                          x.......        
    Possible instruction pointers:

 8  qemu-system-x86_64.exe + 0x2761278
    rsp = 0x0000009a1d0ffaf8   rip = 0x00007ff6a2fc1278
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffaf8 f7 35 b4 a0 f6 7f 00 00                          .5......        
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0x2e35f7
    rsp = 0x0000009a1d0ffb00   rip = 0x00007ff6a0b435f7
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb00 00 00 00 00 42 02 00 00 24 ef a3 a0 f6 7f 00 00  ....B...$.......
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x1def24
    rsp = 0x0000009a1d0ffb10   rip = 0x00007ff6a0a3ef24
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb10 a0 19 32 1d 42 02 00 00 00 00 00 00 42 02 00 00  ..2.B.......B...
     0000009a1d0ffb20 50 09 2a 0f 42 02 00 00 f0 30 96 a0 f6 7f 00 00  P.*.B....0......
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x1030f0
    rsp = 0x0000009a1d0ffb30   rip = 0x00007ff6a09630f0
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb30 00 00 00 00 00 00 00 00 00 00 00 a0 f6 7f 00 00  ................
     0000009a1d0ffb40 f7 42 eb a2 f6 7f 00 00                          .B......        
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x26542f7
    rsp = 0x0000009a1d0ffb48   rip = 0x00007ff6a2eb42f7
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb48 e0 38 35 1d 42 02 00 00 d0 15 40 1d 42 02 00 00  .85.B.....@.B...
     0000009a1d0ffb58 d4 6e e7 a2 f6 7f 00 00                          .n......        
    Possible instruction pointers:

13  qemu-system-x86_64.exe + 0x2616ed4
    rsp = 0x0000009a1d0ffb60   rip = 0x00007ff6a2e76ed4
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb60 b0 e4 1f 0d 42 02 00 00 be 38 87 a0 f6 7f 00 00  ....B....8......
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x138be
    rsp = 0x0000009a1d0ffb70   rip = 0x00007ff6a08738be
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb70 f7 42 eb a2 f6 7f 00 00                          .B......        
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x26542f7
    rsp = 0x0000009a1d0ffb78   rip = 0x00007ff6a2eb42f7
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb78 e0 38 35 1d 42 02 00 00 37 71 e7 a2 f6 7f 00 00  .85.B...7q......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x2617137
    rsp = 0x0000009a1d0ffb88   rip = 0x00007ff6a2e77137
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb88 d4 6e e7 a2 f6 7f 00 00                          .n......        
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x2616ed4
    rsp = 0x0000009a1d0ffb90   rip = 0x00007ff6a2e76ed4
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb90 37 71 e7 a2 f6 7f 00 00                          7q......        
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x2617137
    rsp = 0x0000009a1d0ffb98   rip = 0x00007ff6a2e77137
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffb98 94 4a a0 a0 f6 7f 00 00                          .J......        
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x1a4a94
    rsp = 0x0000009a1d0ffba0   rip = 0x00007ff6a0a04a94
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffba0 40 f5 85 84 fa 7f 00 00                          @.......        
    Possible instruction pointers:

20  ucrtbase.dll + 0xef540
    rsp = 0x0000009a1d0ffba8   rip = 0x00007ffa8485f540
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffba8 00 00 00 00 42 02 00 00 70 72 cc 7f 42 02 00 00  ....B...pr..B...
     0000009a1d0ffbb8 40 5b c4 7f 42 02 00 00 d9 66 e6 a2 f6 7f 00 00  @[..B....f......
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x26066d9
    rsp = 0x0000009a1d0ffbc8   rip = 0x00007ff6a2e666d9
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffbc8 04 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1d0ffbd8 f0 fd 72 0f 42 02 00 00 40 b9 34 13 42 02 00 00  ..r.B...@.4.B...
     0000009a1d0ffbe8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffbf8 00 00 00 00 00 00 00 00 d4 5f e7 a2 f6 7f 00 00  ........._......
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0x2615fd4
    rsp = 0x0000009a1d0ffc08   rip = 0x00007ff6a2e75fd4
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffc08 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1d0ffc18 00 00 00 00 00 00 00 00 b0 c1 34 13 42 02 00 00  ..........4.B...
     0000009a1d0ffc28 b0 15 9f a0 f6 7f 00 00                          ........        
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x1915b0
    rsp = 0x0000009a1d0ffc30   rip = 0x00007ff6a09f15b0
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffc30 00 00 00 00 00 00 00 00 20 90 ca 7f 42 02 00 00  ........ ...B...
     0000009a1d0ffc40 40 91 ca 7f 42 02 00 00 00 00 00 00 00 00 00 00  @...B...........
     0000009a1d0ffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffc60 60 9d ca 7f 42 02 00 00 00 00 00 00 00 00 00 00  `...B...........
     0000009a1d0ffc70 00 00 00 00 00 00 00 00 70 fc 0f 1d 9a 00 00 00  ........p.......
     0000009a1d0ffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffcb0 01 00 00 00 00 38 00 00 68 78 24 1d 42 02 00 00  .....8..hx$.B...
     0000009a1d0ffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffcd0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1d0ffce0 20 30 1f 13 42 02 00 00 ba 2a d9 84 fa 7f 00 00   0..B....*......
    Possible instruction pointers:

24  KERNELBASE.dll + 0x102aba
    rsp = 0x0000009a1d0ffcf0   rip = 0x00007ffa84d92aba
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffcf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffd00 08 00 00 00 0b 00 00 00 03 00 00 00 00 00 00 00  ................
     0000009a1d0ffd10 00 34 9e 00 01 00 00 00 98 30 1f 13 42 02 00 00  .4.......0..B...
     0000009a1d0ffd20 20 30 1f 13 42 02 00 00 71 00 00 00 00 00 00 00   0..B...q.......
     0000009a1d0ffd30 00 78 24 1d 42 02 00 00 00 00 00 00 00 00 00 00  .x$.B...........
     0000009a1d0ffd40 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1d0ffd50 00 00 00 00 00 00 00 00 da 09 a0 a0 f6 7f 00 00  ................
    Possible instruction pointers:

25  qemu-system-x86_64.exe + 0x1a09da
    rsp = 0x0000009a1d0ffd60   rip = 0x00007ff6a0a009da
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffd60 50 6d d2 12 42 02 00 00 3b 5b 8d 22 fa 7f 00 00  Pm..B...;[."....
    Possible instruction pointers:

26  Qt6CoreAndroidEmu.dll + 0x155b3b
    rsp = 0x0000009a1d0ffd70   rip = 0x00007ffa228d5b3b
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffd70 98 30 1f 13 42 02 00 00 14 15 83 22 fa 7f 00 00  .0..B......"....
    Possible instruction pointers:

27  Qt6CoreAndroidEmu.dll + 0xb1514
    rsp = 0x0000009a1d0ffd80   rip = 0x00007ffa22831514
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffd80 00 78 24 1d 42 02 00 00 b7 2e 9e a0 f6 7f 00 00  .x$.B...........
    Possible instruction pointers:

28  qemu-system-x86_64.exe + 0x182eb7
    rsp = 0x0000009a1d0ffd90   rip = 0x00007ff6a09e2eb7
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffd90 98 30 1f 13 42 02 00 00 08 82 95 22 fa 7f 00 00  .0..B......"....
    Possible instruction pointers:

29  Qt6CoreAndroidEmu.dll + 0x1d8208
    rsp = 0x0000009a1d0ffda0   rip = 0x00007ffa22958208
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffda0 40 6a 86 0f 42 02 00 00 2f 6b 8d 22 fa 7f 00 00  @j..B.../k."....
    Possible instruction pointers:

30  Qt6CoreAndroidEmu.dll + 0x156b2f
    rsp = 0x0000009a1d0ffdb0   rip = 0x00007ffa228d6b2f
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffdb0 98 30 1f 13 42 02 00 00 20 30 1f 13 42 02 00 00  .0..B... 0..B...
     0000009a1d0ffdc0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1d0ffdd0 40 6a 86 0f 42 02 00 00 40 6a 86 0f 42 02 00 00  @j..B...@j..B...
     0000009a1d0ffde0 50 6d d2 12 42 02 00 00 82 87 95 22 fa 7f 00 00  Pm..B......"....
    Possible instruction pointers:

31  Qt6CoreAndroidEmu.dll + 0x1d8782
    rsp = 0x0000009a1d0ffdf0   rip = 0x00007ffa22958782
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffdf0 00 00 00 00 00 00 00 00 00 6d d2 12 42 02 00 00  .........m..B...
     0000009a1d0ffe00 00 00 00 00 00 00 00 00 98 30 1f 13 42 02 00 00  .........0..B...
     0000009a1d0ffe10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffe20 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

32  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1d0ffe30   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1d0ffe30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffe40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1d0ffe50 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

33  ntdll.dll + 0x526a1
    rsp = 0x0000009a1d0ffe60   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 41
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x0000009a1ddffa30
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1ddff6d8
     r8 = 0x0000000000000011    r9 = 0x000000000000001e
    r10 = 0x0000000000000000   r11 = 0x3c0f800000001d07
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1ddffa30
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1ddff6d8 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x0000009a1ddffa30
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1ddff6e0
     r8 = 0x0000000000000011    r9 = 0x000000000000001e
    r10 = 0x0000000000000000   r11 = 0x3c0f800000001d07
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1ddffa30
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1ddff6e0 d0 c4 09 87 fa 7f 00 00                          ........        
    Possible instruction pointers:

 2  ntdll.dll + 0x16c4d0
    rsp = 0x0000009a1ddff6e8   rip = 0x00007ffa8709c4d0
    Found by: stack scanning

    Stack contents:
     0000009a1ddff6e8 00 60 72 1a 9a 00 00 00 2c 98 70 1e fa 7f 00 00  .`r.....,.p.....
    Possible instruction pointers:

 3  libGLES_CM.dll + 0xd982c
    rsp = 0x0000009a1ddff6f8   rip = 0x00007ffa1e70982c
    Found by: stack scanning

    Stack contents:
     0000009a1ddff6f8 55 79 f4 86 fa 7f 00 00                          Uy......        
    Possible instruction pointers:

 4  ntdll.dll + 0x17955
    rsp = 0x0000009a1ddff700   rip = 0x00007ffa86f47955
    Found by: stack scanning

    Stack contents:
     0000009a1ddff700 00 00 00 00 00 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1ddff710 00 60 72 1a 9a 00 00 00 00 60 72 1a 9a 00 00 00  .`r......`r.....
     0000009a1ddff720 01 00 00 00 00 00 00 00 2c 98 70 1e fa 7f 00 00  ........,.p.....
    Possible instruction pointers:

 5  libGLES_CM.dll + 0xd982c
    rsp = 0x0000009a1ddff730   rip = 0x00007ffa1e70982c
    Found by: stack scanning

    Stack contents:
     0000009a1ddff730 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  H...............
     0000009a1ddff740 48 00 00 00 00 00 00 00 01 00 00 00 42 02 00 00  H...........B...
     0000009a1ddff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff770 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff780 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1ddff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff7a0 70 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  p...............
     0000009a1ddff7b0 ff ff ff ff ff ff ff ff 1d 79 f4 86 fa 7f 00 00  .........y......
    Possible instruction pointers:

 6  ntdll.dll + 0x1791d
    rsp = 0x0000009a1ddff7c0   rip = 0x00007ffa86f4791d
    Found by: stack scanning

    Stack contents:
     0000009a1ddff7c0 3d 79 f4 86 fa 7f 00 00                          =y......        
    Possible instruction pointers:

 7  ntdll.dll + 0x1793d
    rsp = 0x0000009a1ddff7c8   rip = 0x00007ffa86f4793d
    Found by: stack scanning

    Stack contents:
     0000009a1ddff7c8 00 00 00 00 00 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1ddff7d8 ad 50 fa 86 fa 7f 00 00                          .P......        
    Possible instruction pointers:

 8  ntdll.dll + 0x750ad
    rsp = 0x0000009a1ddff7e0   rip = 0x00007ffa86fa50ad
    Found by: stack scanning

    Stack contents:
     0000009a1ddff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff7f0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff860 00 f9 df 1d 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff870 00 00 f3 86 fa 7f 00 00 73 4c fa 86 fa 7f 00 00  ........sL......
    Possible instruction pointers:

 9  ntdll.dll + 0x74c73
    rsp = 0x0000009a1ddff880   rip = 0x00007ffa86fa4c73
    Found by: stack scanning

    Stack contents:
     0000009a1ddff880 00 00 00 00 00 00 00 00 00 00 f3 86 fa 7f 00 00  ................
     0000009a1ddff890 00 00 00 00 00 00 00 00 00 90 78 1a 9a 00 00 00  ..........x.....
     0000009a1ddff8a0 00 00 00 00 00 00 00 00 28 4c fa 86 fa 7f 00 00  ........(L......
    Possible instruction pointers:

10  ntdll.dll + 0x74c28
    rsp = 0x0000009a1ddff8b0   rip = 0x00007ffa86fa4c28
    Found by: stack scanning

    Stack contents:
     0000009a1ddff8b0 00 f9 df 1d 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff8e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff8f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff910 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff930 1b 00 10 00 80 1f 00 00 33 00 00 00 00 00 00 00  ........3.......
     0000009a1ddff940 00 00 2b 00 00 02 00 00 00 00 00 00 00 00 00 00  ..+.............
     0000009a1ddff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddff980 70 1b 79 84 fa 7f 00 00                          p.y.....        
    Possible instruction pointers:

11  ucrtbase.dll + 0x21b70
    rsp = 0x0000009a1ddff988   rip = 0x00007ffa84791b70
    Found by: stack scanning

    Stack contents:
     0000009a1ddff988 6b b8 f5 86 fa 7f 00 00                          k.......        
    Possible instruction pointers:

12  ntdll.dll + 0x2b86b
    rsp = 0x0000009a1ddff990   rip = 0x00007ffa86f5b86b
    Found by: stack scanning

    Stack contents:
     0000009a1ddff990 5e 1a 58 e8 af 18 00 00 1a 00 00 00 00 00 00 00  ^.X.............
     0000009a1ddff9a0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1ddff9b0 30 60 f6 72 fa 7f 00 00                          0`.r....        
    Possible instruction pointers:

13  libglib2_windows_msvc-x86_64.dll + 0x36030
    rsp = 0x0000009a1ddff9b8   rip = 0x00007ffa72f66030
    Found by: stack scanning

    Stack contents:
     0000009a1ddff9b8 e0 98 f6 72 fa 7f 00 00                          ...r....        
    Possible instruction pointers:

14  libglib2_windows_msvc-x86_64.dll + 0x398e0
    rsp = 0x0000009a1ddff9c0   rip = 0x00007ffa72f698e0
    Found by: stack scanning

    Stack contents:
     0000009a1ddff9c0 20 ab 2a 1d 42 02 00 00 8e 04 ce 84 fa 7f 00 00   .*.B...........
    Possible instruction pointers:

15  KERNELBASE.dll + 0x5048e
    rsp = 0x0000009a1ddff9d0   rip = 0x00007ffa84ce048e
    Found by: stack scanning

    Stack contents:
     0000009a1ddff9d0 00 00 00 00 00 00 00 00 7b a8 c1 a0 f6 7f 00 00  ........{.......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x3ba87b
    rsp = 0x0000009a1ddff9e0   rip = 0x00007ff6a0c1a87b
    Found by: stack scanning

    Stack contents:
     0000009a1ddff9e0 01 00 00 00 00 00 00 00 80 aa 2a 1d 42 02 00 00  ..........*.B...
     0000009a1ddff9f0 00 00 00 00 00 00 00 00 20 ab 2a 1d 42 02 00 00  ........ .*.B...
     0000009a1ddffa00 80 aa 2a 1d 42 02 00 00 8a b7 c1 a0 f6 7f 00 00  ..*.B...........
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x3bb78a
    rsp = 0x0000009a1ddffa10   rip = 0x00007ff6a0c1b78a
    Found by: stack scanning

    Stack contents:
     0000009a1ddffa10 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00  ........0.......
     0000009a1ddffa20 00 00 00 00 00 00 00 00 c0 4b 8e 7f 42 02 00 00  .........K..B...
     0000009a1ddffa30 b0 0b 00 00 00 00 00 00 0b b9 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

18  ntdll.dll + 0x2b90b
    rsp = 0x0000009a1ddffa40   rip = 0x00007ffa86f5b90b
    Found by: stack scanning

    Stack contents:
     0000009a1ddffa40 b2 04 4e 03 00 00 00 00 1f 00 00 00 00 00 00 00  ..N.............
     0000009a1ddffa50 90 9f 70 0f 42 02 00 00 1e 00 00 00 00 00 00 00  ..p.B...........
     0000009a1ddffa60 00 92 74 0f 42 02 00 00 00 00 00 00 00 00 00 00  ..t.B...........
     0000009a1ddffa70 00 00 00 00 00 00 00 00 00 18 8e 7f 42 02 00 00  ............B...
     0000009a1ddffa80 00 00 00 00 00 00 00 00 00 00 8e 7f 42 02 00 00  ............B...
     0000009a1ddffa90 b0 02 8e 7f 42 02 00 00 00 00 8e 7f 42 02 00 00  ....B.......B...
     0000009a1ddffaa0 40 00 00 00 00 00 00 00 c0 0c 8e 7f 42 02 00 00  @...........B...
     0000009a1ddffab0 20 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00   ...............
     0000009a1ddffac0 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00  ........@.......
     0000009a1ddffad0 38 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00  8...............
     0000009a1ddffae0 00 00 96 7f 42 02 00 00 a9 fb df 1d 9a 00 00 00  ....B...........
     0000009a1ddffaf0 04 00 00 00 00 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

19  ntdll.dll + 0x2b3c7
    rsp = 0x0000009a1ddffb00   rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1ddffb00 00 00 8e 7f 42 02 00 00 00 00 00 00 fa 7f 00 00  ....B...........
     0000009a1ddffb10 38 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  8...............
     0000009a1ddffb20 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffb30 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffb40 80 00 e9 a0 02 00 00 00 28 00 00 00 00 00 00 00  ........(.......
     0000009a1ddffb50 80 fc df 1d 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffba0 50 9b 35 1d 42 02 00 00 60 92 3f 1d 42 02 00 00  P.5.B...`.?.B...
     0000009a1ddffbb0 80 fc df 1d 9a 00 00 00 e6 fd 77 84 fa 7f 00 00  ..........w.....
    Possible instruction pointers:

20  ucrtbase.dll + 0xfde6
    rsp = 0x0000009a1ddffbc0   rip = 0x00007ffa8477fde6
    Found by: stack scanning

    Stack contents:
     0000009a1ddffbc0 00 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00  ................
     0000009a1ddffbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffbe0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffbf0 60 96 5e 01 42 02 00 00 b0 b5 ed 1c 42 02 00 00  `.^.B.......B...
     0000009a1ddffc00 00 00 00 00 00 00 00 00 74 58 c3 a0 f6 7f 00 00  ........tX......
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x3d5874
    rsp = 0x0000009a1ddffc10   rip = 0x00007ff6a0c35874
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc10 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00  ........8.......
     0000009a1ddffc20 64 db 5e a4 f6 7f 00 00                          d.^.....        
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0x3d8db64
    rsp = 0x0000009a1ddffc28   rip = 0x00007ff6a45edb64
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc28 00 00 ed 1c 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1ddffc38 70 5e f6 72 fa 7f 00 00                          p^.r....        
    Possible instruction pointers:

23  libglib2_windows_msvc-x86_64.dll + 0x35e70
    rsp = 0x0000009a1ddffc40   rip = 0x00007ffa72f65e70
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc40 00 00 00 00 00 00 00 00 10 b6 ed 1c 42 02 00 00  ............B...
     0000009a1ddffc50 b0 b5 ed 1c 42 02 00 00 e0 98 f6 72 fa 7f 00 00  ....B......r....
    Possible instruction pointers:

24  libglib2_windows_msvc-x86_64.dll + 0x398e0
    rsp = 0x0000009a1ddffc60   rip = 0x00007ffa72f698e0
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc60 30 60 f6 72 fa 7f 00 00                          0`.r....        
    Possible instruction pointers:

25  libglib2_windows_msvc-x86_64.dll + 0x36030
    rsp = 0x0000009a1ddffc68   rip = 0x00007ffa72f66030
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc68 c0 97 f6 72 fa 7f 00 00                          ...r....        
    Possible instruction pointers:

26  libglib2_windows_msvc-x86_64.dll + 0x397c0
    rsp = 0x0000009a1ddffc70   rip = 0x00007ffa72f697c0
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc70 50 99 f6 72 fa 7f 00 00                          P..r....        
    Possible instruction pointers:

27  libglib2_windows_msvc-x86_64.dll + 0x39950
    rsp = 0x0000009a1ddffc78   rip = 0x00007ffa72f69950
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc78 44 e7 a6 a0 f6 7f 00 00                          D.......        
    Possible instruction pointers:

28  qemu-system-x86_64.exe + 0x20e744
    rsp = 0x0000009a1ddffc80   rip = 0x00007ff6a0a6e744
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc80 58 03 f1 a2 f6 7f 00 00                          X.......        
    Possible instruction pointers:

29  qemu-system-x86_64.exe + 0x26b0358
    rsp = 0x0000009a1ddffc88   rip = 0x00007ff6a2f10358
    Found by: stack scanning

    Stack contents:
     0000009a1ddffc88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffc98 b0 b5 ed 1c 42 02 00 00 f0 18 30 1d 42 02 00 00  ....B.....0.B...
     0000009a1ddffca8 90 e6 a6 a0 f6 7f 00 00                          ........        
    Possible instruction pointers:

30  qemu-system-x86_64.exe + 0x20e690
    rsp = 0x0000009a1ddffcb0   rip = 0x00007ff6a0a6e690
    Found by: stack scanning

    Stack contents:
     0000009a1ddffcb0 b0 b5 ed 1c 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1ddffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffcd0 00 00 00 00 00 00 00 00 2f 5b c3 a0 f6 7f 00 00  ......../[......
    Possible instruction pointers:

31  qemu-system-x86_64.exe + 0x3d5b2f
    rsp = 0x0000009a1ddffce0   rip = 0x00007ff6a0c35b2f
    Found by: stack scanning

    Stack contents:
     0000009a1ddffce0 f0 18 30 1d 42 02 00 00 b0 b5 ed 1c 42 02 00 00  ..0.B.......B...
     0000009a1ddffcf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffd00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffd10 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

32  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1ddffd20   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1ddffd20 f0 18 30 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..0.B...........
     0000009a1ddffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffd40 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

33  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1ddffd50   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1ddffd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffd60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ddffd70 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

34  ntdll.dll + 0x526a1
    rsp = 0x0000009a1ddffd80   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 42
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00007ff6a41baaa8   rbx = 0x0000000000002800
    rsi = 0x00007ff6a41baaa8   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1deffba8
     r8 = 0xfffffffffd75c9b4    r9 = 0x000000007ffed000
    r10 = 0x00000000546c6148   r11 = 0xfffffffff7a93a41
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000003   r15 = 0x0000009a1deffdd8
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1deffba8 05 92 f5 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  ntdll.dll + 0x29205
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00007ff6a41baaa8   rbx = 0x0000000000002800
    rsi = 0x00007ff6a41baaa8   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1deffbb0
     r8 = 0xfffffffffd75c9b4    r9 = 0x000000007ffed000
    r10 = 0x00000000546c6148   r11 = 0xfffffffff7a93a41
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000003   r15 = 0x0000009a1deffdd8
    rip = 0x00007ffa86f59205
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1deffbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffbc0 80 03 1f 13 42 02 00 00 b1 47 f5 86 fa 7f 00 00  ....B....G......
    Possible instruction pointers:

 2  ntdll.dll + 0x247b1
    rsp = 0x0000009a1deffbd0   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1deffbd0 00 00 00 00 00 00 00 00 d0 fb ef 1d 9a 00 00 00  ................
     0000009a1deffbe0 00 00 00 00 00 00 00 00 68 25 00 00 00 00 00 00  ........h%......
     0000009a1deffbf0 fe ff ff ff 01 00 00 00 1a 02 e1 a0 f6 7f 00 00  ................
    Possible instruction pointers:

 3  qemu-system-x86_64.exe + 0x5b021a
    rsp = 0x0000009a1deffc00   rip = 0x00007ff6a0e1021a
    Found by: stack scanning

    Stack contents:
     0000009a1deffc00 40 a6 29 1d 42 02 00 00 b3 15 00 00 00 00 00 00  @.).B...........
     0000009a1deffc10 d0 fc ef 1d 9a 00 00 00 6d 3c 87 a0 f6 7f 00 00  ........m<......
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x13c6d
    rsp = 0x0000009a1deffc20   rip = 0x00007ff6a0873c6d
    Found by: stack scanning

    Stack contents:
     0000009a1deffc20 00 00 00 00 42 02 00 00 00 15 1f 13 42 02 00 00  ....B.......B...
     0000009a1deffc30 e0 fd ef 1d 9a 00 00 00 70 4e c6 23 42 02 00 00  ........pN.#B...
     0000009a1deffc40 50 fd ef 1d 9a 00 00 00 91 27 c1 a0 f6 7f 00 00  P........'......
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x3b2791
    rsp = 0x0000009a1deffc50   rip = 0x00007ff6a0c12791
    Found by: stack scanning

    Stack contents:
     0000009a1deffc50 fe ff ff ff ff ff ff ff 50 fd ef 1d 9a 00 00 00  ........P.......
     0000009a1deffc60 a0 fc ef 1d 9a 00 00 00 a0 fc ef 1d 9a 00 00 00  ................
     0000009a1deffc70 80 03 1f 13 42 02 00 00 aa 00 e1 a0 f6 7f 00 00  ....B...........
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x5b00aa
    rsp = 0x0000009a1deffc80   rip = 0x00007ff6a0e100aa
    Found by: stack scanning

    Stack contents:
     0000009a1deffc80 50 fd ef 1d 9a 00 00 00 80 03 1f 13 42 02 00 00  P...........B...
     0000009a1deffc90 80 ac 1e 1d 42 02 00 00 e0 fd ef 1d 9a 00 00 00  ....B...........
     0000009a1deffca0 10 15 1f 13 42 02 00 00 00 15 1f 13 42 02 00 00  ....B.......B...
     0000009a1deffcb0 b8 ed 02 a3 f6 7f 00 00                          ........        
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x27cedb8
    rsp = 0x0000009a1deffcb8   rip = 0x00007ff6a302edb8
    Found by: stack scanning

    Stack contents:
     0000009a1deffcb8 d9 66 e6 a2 f6 7f 00 00                          .f......        
    Possible instruction pointers:

 8  qemu-system-x86_64.exe + 0x26066d9
    rsp = 0x0000009a1deffcc0   rip = 0x00007ff6a2e666d9
    Found by: stack scanning

    Stack contents:
     0000009a1deffcc0 01 00 00 00 9a 00 00 00 e8 6d 04 a4 f6 7f 00 00  .........m......
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0x37e6de8
    rsp = 0x0000009a1deffcd0   rip = 0x00007ff6a4046de8
    Found by: stack scanning

    Stack contents:
     0000009a1deffcd0 40 a6 29 1d 42 02 00 00 fe ff ff ff ff ff ff ff  @.).B...........
     0000009a1deffce0 40 ad 1e 1d 42 02 00 00 40 f7 1e 13 42 02 00 00  @...B...@...B...
     0000009a1deffcf0 e0 fd ef 1d 9a 00 00 00 e0 fd ef 1d 9a 00 00 00  ................
     0000009a1deffd00 80 fd ef 1d 9a 00 00 00 90 e4 e0 a0 f6 7f 00 00  ................
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x5ae490
    rsp = 0x0000009a1deffd10   rip = 0x00007ff6a0e0e490
    Found by: stack scanning

    Stack contents:
     0000009a1deffd10 40 ad 1e 1d 42 02 00 00 00 00 00 00 00 00 00 00  @...B...........
     0000009a1deffd20 0c 29 e4 7c c8 00 00 00 bf 32 1a 6a fa 7f 00 00  .).|.....2.j....
    Possible instruction pointers:

11  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1deffd30   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1deffd30 00 00 00 00 00 00 00 00 00 09 39 1d 42 02 00 00  ..........9.B...
     0000009a1deffd40 00 29 e4 7c c8 00 00 00 64 00 00 00 00 00 00 00  .).|....d.......
     0000009a1deffd50 80 03 1f 13 42 02 00 00 00 76 c7 a0 f6 7f 00 00  ....B....v......
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x417600
    rsp = 0x0000009a1deffd60   rip = 0x00007ff6a0c77600
    Found by: stack scanning

    Stack contents:
     0000009a1deffd60 00 dd 3f 01 02 00 00 00 fe ff ff ff ff ff ff ff  ..?.............
     0000009a1deffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffd80 40 ad 1e 1d 42 02 00 00 80 ac 1e 1d 42 02 00 00  @...B.......B...
     0000009a1deffd90 30 09 39 1d 42 02 00 00 e0 fd ef 1d 9a 00 00 00  0.9.B...........
     0000009a1deffda0 20 fe ef 1d 9a 00 00 00 ff d3 e0 a0 f6 7f 00 00   ...............
    Possible instruction pointers:

13  qemu-system-x86_64.exe + 0x5ad3ff
    rsp = 0x0000009a1deffdb0   rip = 0x00007ff6a0e0d3ff
    Found by: stack scanning

    Stack contents:
     0000009a1deffdb0 80 11 1f 13 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1deffdc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffdd0 00 00 00 00 00 00 00 00 f4 01 00 00 00 00 00 00  ................
     0000009a1deffde0 18 e8 02 a3 f6 7f 00 00                          ........        
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x27ce818
    rsp = 0x0000009a1deffde8   rip = 0x00007ff6a302e818
    Found by: stack scanning

    Stack contents:
     0000009a1deffde8 00 00 00 00 00 00 00 00 40 f7 1e 13 42 02 00 00  ........@...B...
     0000009a1deffdf8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffe08 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1deffe18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffe28 80 1c 30 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..0.B...........
     0000009a1deffe38 30 09 39 1d 42 02 00 00 00 00 00 00 00 00 00 00  0.9.B...........
     0000009a1deffe48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffe58 00 00 00 00 00 00 00 00 90 fe ef 1d 9a 00 00 00  ................
     0000009a1deffe68 3c 1b e1 a0 f6 7f 00 00                          <.......        
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x5b1b3c
    rsp = 0x0000009a1deffe70   rip = 0x00007ff6a0e11b3c
    Found by: stack scanning

    Stack contents:
     0000009a1deffe70 80 d0 72 1c 42 02 00 00 36 30 78 84 fa 7f 00 00  ..r.B...60x.....
    Possible instruction pointers:

16  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1deffe80   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1deffe80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffe90 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1deffea0 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

17  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1deffeb0   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1deffeb0 80 1c 30 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..0.B...........
     0000009a1deffec0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffed0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

18  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1deffee0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1deffee0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1deffef0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1defff00 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

19  ntdll.dll + 0x526a1
    rsp = 0x0000009a1defff10   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 43
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002421d1eada0   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002421d1eada0
    rbp = 0x0000009a1dfffcd0   rsp = 0x0000009a1dfffc78
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1dfffca0   r15 = 0x000002421d1eace0
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1dfffc78 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002421d1eada0   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x000002421d1eada0
    rbp = 0x0000009a1dfffcd0   rsp = 0x0000009a1dfffc80
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1dfffca0   r15 = 0x000002421d1eace0
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1dfffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffca0 00 00 00 00 00 00 00 00 a0 fc ff 1d 9a 00 00 00  ................
     0000009a1dfffcb0 00 00 00 00 00 00 00 00 a4 28 00 00 00 00 00 00  .........(......
     0000009a1dfffcc0 00 00 00 00 01 00 00 00 a0 ad 1e 1d 42 02 00 00  ............B...
     0000009a1dfffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffce0 40 ad 1e 1d 42 02 00 00 00 00 00 00 00 00 00 00  @...B...........
     0000009a1dfffcf0 d0 fd ff 1d 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1dfffd00   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1dfffd00 98 ad 1e 1d 42 02 00 00 90 ad 1e 1d 42 02 00 00  ....B.......B...
     0000009a1dfffd10 d8 ac 1e 1d 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1dfffd20 00 00 00 00 00 00 00 00 90 ad 1e 1d 42 02 00 00  ............B...
     0000009a1dfffd30 98 ad 1e 1d 42 02 00 00 49 25 1a 6a fa 7f 00 00  ....B...I%.j....
    Possible instruction pointers:

 3  MSVCP140.dll + 0x12549
    rsp = 0x0000009a1dfffd40   rip = 0x00007ffa6a1a2549
    Found by: stack scanning

    Stack contents:
     0000009a1dfffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffd60 00 00 00 00 00 00 00 00 da 27 1a 6a fa 7f 00 00  .........'.j....
    Possible instruction pointers:

 4  MSVCP140.dll + 0x127da
    rsp = 0x0000009a1dfffd70   rip = 0x00007ffa6a1a27da
    Found by: stack scanning

    Stack contents:
     0000009a1dfffd70 50 82 52 17 bd ed 00 00 00 00 00 00 00 00 00 00  P.R.............
     0000009a1dfffd80 00 00 00 00 00 00 00 00 90 ad 1e 1d 42 02 00 00  ............B...
     0000009a1dfffd90 90 ad 1e 1d 42 02 00 00 3b d6 e0 a0 f6 7f 00 00  ....B...;.......
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x5ad63b
    rsp = 0x0000009a1dfffda0   rip = 0x00007ff6a0e0d63b
    Found by: stack scanning

    Stack contents:
     0000009a1dfffda0 d8 ac 1e 1d 42 02 00 00 80 ac 1e 1d 42 02 00 00  ....B.......B...
     0000009a1dfffdb0 20 13 30 1d 42 02 00 00 00 00 00 00 00 00 00 00   .0.B...........
     0000009a1dfffdc0 00 00 00 00 00 00 00 00 5b 00 ce 84 fa 7f 00 00  ........[.......
    Possible instruction pointers:

 6  KERNELBASE.dll + 0x5005b
    rsp = 0x0000009a1dfffdd0   rip = 0x00007ffa84ce005b
    Found by: stack scanning

    Stack contents:
     0000009a1dfffdd0 fe ff ff ff ff ff ff ff 20 13 30 1d 42 02 00 00  ........ .0.B...
     0000009a1dfffde0 00 00 00 00 00 00 00 00 90 09 39 1d 42 02 00 00  ..........9.B...
     0000009a1dfffdf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffe00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffe10 40 fe ff 1d 9a 00 00 00 3c 1b e1 a0 f6 7f 00 00  @.......<.......
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x5b1b3c
    rsp = 0x0000009a1dfffe20   rip = 0x00007ff6a0e11b3c
    Found by: stack scanning

    Stack contents:
     0000009a1dfffe20 a0 1e 73 1c 42 02 00 00 36 30 78 84 fa 7f 00 00  ..s.B...60x.....
    Possible instruction pointers:

 8  ucrtbase.dll + 0x13036
    rsp = 0x0000009a1dfffe30   rip = 0x00007ffa84783036
    Found by: stack scanning

    Stack contents:
     0000009a1dfffe30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffe40 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1dfffe50 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

 9  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1dfffe60   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1dfffe60 20 13 30 1d 42 02 00 00 00 00 00 00 00 00 00 00   .0.B...........
     0000009a1dfffe70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffe80 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

10  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1dfffe90   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1dfffe90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffea0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1dfffeb0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

11  ntdll.dll + 0x526a1
    rsp = 0x0000009a1dfffec0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 44
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f72dee0   rbx = 0x0000000000002800
    rsi = 0x000002420f72dee0   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1e0ff548
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00007ff6a41dac08   r13 = 0x00007ffa72f6fe30
    r14 = 0x0000000000000003   r15 = 0x00007ff6a41dabe8
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e0ff548 05 92 f5 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  ntdll.dll + 0x29205
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x000002420f72dee0   rbx = 0x0000000000002800
    rsi = 0x000002420f72dee0   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1e0ff550
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x00007ff6a41dac08   r13 = 0x00007ffa72f6fe30
    r14 = 0x0000000000000003   r15 = 0x00007ff6a41dabe8
    rip = 0x00007ffa86f59205
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e0ff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff560 00 00 00 00 00 00 00 00 69 91 f5 86 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 2  ntdll.dll + 0x29169
    rsp = 0x0000009a1e0ff570   rip = 0x00007ffa86f59169
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff570 89 00 00 00 00 00 00 00 70 f5 0f 1e 9a 00 00 00  ........p.......
     0000009a1e0ff580 00 00 00 00 00 00 00 00 3c 18 00 00 00 00 00 00  ........<.......
     0000009a1e0ff590 fe ff ff ff 01 00 00 00 90 f5 0f 1e 9a 00 00 00  ................
     0000009a1e0ff5a0 00 00 00 00 00 00 00 00 d0 de 72 0f 42 02 00 00  ..........r.B...
     0000009a1e0ff5b0 00 00 00 00 00 00 00 00 19 2c 1a 6a fa 7f 00 00  .........,.j....
    Possible instruction pointers:

 3  MSVCP140.dll + 0x12c19
    rsp = 0x0000009a1e0ff5c0   rip = 0x00007ffa6a1a2c19
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff5c0 00 00 00 00 15 7a 00 00 00 00 00 00 00 00 00 00  .....z..........
     0000009a1e0ff5d0 78 12 fc a2 f6 7f 00 00                          x.......        
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x2761278
    rsp = 0x0000009a1e0ff5d8   rip = 0x00007ff6a2fc1278
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff5d8 60 04 c3 21 42 02 00 00 00 00 00 00 00 00 00 00  `..!B...........
     0000009a1e0ff5e8 99 52 e6 a2 f6 7f 00 00                          .R......        
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x2605299
    rsp = 0x0000009a1e0ff5f0   rip = 0x00007ff6a2e65299
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff5f0 d0 8a a2 14 bd ed 00 00 00 b2 cd 84 fa 7f 00 00  ................
    Possible instruction pointers:

 6  KERNELBASE.dll + 0x4b200
    rsp = 0x0000009a1e0ff600   rip = 0x00007ffa84cdb200
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff600 80 8e 1e 1d 42 02 00 00 60 04 c3 21 42 02 00 00  ....B...`..!B...
     0000009a1e0ff610 d0 de 72 0f 42 02 00 00 d6 f9 d9 a0 f6 7f 00 00  ..r.B...........
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x53f9d6
    rsp = 0x0000009a1e0ff620   rip = 0x00007ff6a0d9f9d6
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff620 00 00 00 00 00 00 00 00 fd 59 cc 84 fa 7f 00 00  .........Y......
    Possible instruction pointers:

 8  KERNELBASE.dll + 0x359fd
    rsp = 0x0000009a1e0ff630   rip = 0x00007ffa84cc59fd
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff630 78 12 fc a2 f6 7f 00 00                          x.......        
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0x2761278
    rsp = 0x0000009a1e0ff638   rip = 0x00007ff6a2fc1278
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff638 01 00 00 00 f6 7f 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff648 f0 dc 72 0f 42 02 00 00 d0 62 30 1d 42 02 00 00  ..r.B....b0.B...
     0000009a1e0ff658 4a a8 e8 a0 f6 7f 00 00                          J.......        
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x62a84a
    rsp = 0x0000009a1e0ff660   rip = 0x00007ff6a0e8a84a
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff660 ff ff ff ff ff ff ff ff e2 b1 cd 84 fa 7f 00 00  ................
    Possible instruction pointers:

11  KERNELBASE.dll + 0x4b1e2
    rsp = 0x0000009a1e0ff670   rip = 0x00007ffa84cdb1e2
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff670 00 b2 cd 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

12  KERNELBASE.dll + 0x4b200
    rsp = 0x0000009a1e0ff678   rip = 0x00007ffa84cdb200
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff678 00 00 00 00 00 00 00 00 a8 aa 1b a4 f6 7f 00 00  ................
    Possible instruction pointers:

13  qemu-system-x86_64.exe + 0x395aaa8
    rsp = 0x0000009a1e0ff688   rip = 0x00007ff6a41baaa8
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff688 18 17 40 1d 42 02 00 00 d0 15 40 1d 42 02 00 00  ..@.B.....@.B...
     0000009a1e0ff698 4b 3b b4 a0 f6 7f 00 00                          K;......        
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x2e3b4b
    rsp = 0x0000009a1e0ff6a0   rip = 0x00007ff6a0b43b4b
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff6a0 00 00 00 00 00 00 00 00 01 00 00 00 42 02 00 00  ............B...
     0000009a1e0ff6b0 24 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00  $..@............
     0000009a1e0ff6c0 00 1b 30 1d 42 02 00 00 f0 59 87 a0 f6 7f 00 00  ..0.B....Y......
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x159f0
    rsp = 0x0000009a1e0ff6d0   rip = 0x00007ff6a08759f0
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff6d0 d0 15 40 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..@.B...........
     0000009a1e0ff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff6f0 00 00 00 00 00 00 00 00 e8 5a 87 a0 f6 7f 00 00  .........Z......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x15ae8
    rsp = 0x0000009a1e0ff700   rip = 0x00007ff6a0875ae8
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff700 00 1b 30 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..0.B...........
     0000009a1e0ff710 00 00 00 00 00 00 00 00 00 1b 30 1d 42 02 00 00  ..........0.B...
     0000009a1e0ff720 f0 59 87 a0 f6 7f 00 00                          .Y......        
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x159f0
    rsp = 0x0000009a1e0ff728   rip = 0x00007ff6a08759f0
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff728 d0 15 40 1d 42 02 00 00 d0 15 40 1d 42 02 00 00  ..@.B.....@.B...
     0000009a1e0ff738 2f 5b c3 a0 f6 7f 00 00                          /[......        
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x3d5b2f
    rsp = 0x0000009a1e0ff740   rip = 0x00007ff6a0c35b2f
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff740 00 1b 30 1d 42 02 00 00 d0 15 40 1d 42 02 00 00  ..0.B.....@.B...
     0000009a1e0ff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff770 00 00 00 00 00 00 00 00 b2 1b 79 84 fa 7f 00 00  ..........y.....
    Possible instruction pointers:

19  ucrtbase.dll + 0x21bb2
    rsp = 0x0000009a1e0ff780   rip = 0x00007ffa84791bb2
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff780 00 1b 30 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..0.B...........
     0000009a1e0ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff7a0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

20  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1e0ff7b0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1e0ff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e0ff7d0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

21  ntdll.dll + 0x526a1
    rsp = 0x0000009a1e0ff7e0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 45
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x0000009a1e1ff820
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1e1ff4c8
     r8 = 0x0000009a1e1ff6c0    r9 = 0x000002420f7772d0
    r10 = 0x00000242015c24c0   r11 = 0x00000242015f1030
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1e1ff820
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e1ff4c8 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x0000009a1e1ff820
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000000000000000   rsp = 0x0000009a1e1ff4d0
     r8 = 0x0000009a1e1ff6c0    r9 = 0x000002420f7772d0
    r10 = 0x00000242015c24c0   r11 = 0x00000242015f1030
    r12 = 0x00000000ffffffff   r13 = 0x0000009a1e1ff820
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e1ff4d0 90 f5 1f 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff4e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff4f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff500 00 00 00 00 00 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1e1ff510 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff520 00 00 00 00 00 00 00 00 08 f9 1f 1e 9a 00 00 00  ................
     0000009a1e1ff530 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  H...............
     0000009a1e1ff540 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff560 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff570 00 00 00 00 00 00 00 00 00 30 bb 83 fa 7f 00 00  .........0......
    Possible instruction pointers:

 2  POWRPROF.dll + 0x13000
    rsp = 0x0000009a1e1ff580   rip = 0x00007ffa83bb3000
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff580 90 f5 1f 1e 9a 00 00 00 08 f9 1f 1e 9a 00 00 00  ................
     0000009a1e1ff590 33 05 71 71 00 00 00 00 f0 3e bb 83 fa 7f 00 00  3.qq.....>......
    Possible instruction pointers:

 3  POWRPROF.dll + 0x13ef0
    rsp = 0x0000009a1e1ff5a0   rip = 0x00007ffa83bb3ef0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff5a0 18 4c bb 83 fa 7f 00 00                          .L......        
    Possible instruction pointers:

 4  POWRPROF.dll + 0x14c18
    rsp = 0x0000009a1e1ff5a8   rip = 0x00007ffa83bb4c18
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff5a8 f0 3e bb 83 fa 7f 00 00                          .>......        
    Possible instruction pointers:

 5  POWRPROF.dll + 0x13ef0
    rsp = 0x0000009a1e1ff5b0   rip = 0x00007ffa83bb3ef0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff5b0 08 00 00 00 00 00 00 00 10 3f bb 83 fa 7f 00 00  .........?......
    Possible instruction pointers:

 6  POWRPROF.dll + 0x13f10
    rsp = 0x0000009a1e1ff5c0   rip = 0x00007ffa83bb3f10
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff5c0 08 f9 1f 1e 9a 00 00 00 00 0c 00 00 00 00 00 00  ................
     0000009a1e1ff5d0 00 00 00 00 00 00 00 00 14 4c bb 83 fa 7f 00 00  .........L......
    Possible instruction pointers:

 7  POWRPROF.dll + 0x14c14
    rsp = 0x0000009a1e1ff5e0   rip = 0x00007ffa83bb4c14
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff5e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff5f0 00 00 00 00 00 00 00 00 00 00 00 00 48 00 00 00  ............H...
     0000009a1e1ff600 b0 31 bb 83 fa 7f 00 00                          .1......        
    Possible instruction pointers:

 8  POWRPROF.dll + 0x131b0
    rsp = 0x0000009a1e1ff608   rip = 0x00007ffa83bb31b0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff608 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff618 10 b0 90 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

 9  RPCRT4.dll + 0xdb010
    rsp = 0x0000009a1e1ff620   rip = 0x00007ffa8690b010
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff620 a0 05 91 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

10  RPCRT4.dll + 0xe05a0
    rsp = 0x0000009a1e1ff628   rip = 0x00007ffa869105a0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff628 90 ed 90 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

11  RPCRT4.dll + 0xded90
    rsp = 0x0000009a1e1ff630   rip = 0x00007ffa8690ed90
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff630 e0 b9 90 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

12  RPCRT4.dll + 0xdb9e0
    rsp = 0x0000009a1e1ff638   rip = 0x00007ffa8690b9e0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff638 b0 07 91 86 fa 7f 00 00                          ........        
    Possible instruction pointers:

13  RPCRT4.dll + 0xe07b0
    rsp = 0x0000009a1e1ff640   rip = 0x00007ffa869107b0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff640 50 03 91 86 fa 7f 00 00                          P.......        
    Possible instruction pointers:

14  RPCRT4.dll + 0xe0350
    rsp = 0x0000009a1e1ff648   rip = 0x00007ffa86910350
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff648 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff658 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff668 b0 f6 1f 1e 9a 00 00 00 00 f7 1f 1e 9a 00 00 00  ................
     0000009a1e1ff678 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff688 00 00 00 00 00 00 00 00 b0 f6 1f 1e 9a 00 00 00  ................
     0000009a1e1ff698 98 f6 1f 1e 9a 00 00 00 98 f6 1f 1e 9a 00 00 00  ................
     0000009a1e1ff6a8 00 02 00 00 00 00 00 00 f0 cb 91 86 fa 7f 00 00  ................
    Possible instruction pointers:

15  RPCRT4.dll + 0xecbf0
    rsp = 0x0000009a1e1ff6b8   rip = 0x00007ffa8691cbf0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff6b8 70 f3 1f 1e 9a 00 00 00 90 f5 1f 1e 9a 00 00 00  p...............
     0000009a1e1ff6c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff6d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff6e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff6f8 40 17 8e 7f 42 02 00 00 d0 f6 1f 1e 9a 00 00 00  @...B...........
     0000009a1e1ff708 50 06 ce 84 fa 7f 00 00                          P.......        
    Possible instruction pointers:

16  KERNELBASE.dll + 0x50650
    rsp = 0x0000009a1e1ff710   rip = 0x00007ffa84ce0650
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff710 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff720 20 00 00 00 00 00 00 00 c0 0c 8e 7f 42 02 00 00   ...........B...
     0000009a1e1ff730 60 f7 1f 1e 9a 00 00 00 01 00 00 00 00 00 00 00  `...............
     0000009a1e1ff740 08 f9 1f 1e 9a 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1e1ff750 01 00 00 00 00 00 00 00 02 01 00 00 00 00 00 00  ................
     0000009a1e1ff760 00 00 00 00 00 00 00 00 29 f8 1f 1e 9a 00 00 00  ........).......
     0000009a1e1ff770 48 00 00 00 00 00 00 00 01 00 00 00 fa 7f 00 00  H...............
     0000009a1e1ff780 6e 18 98 eb af 18 00 00 00 00 00 00 00 00 00 00  n...............
     0000009a1e1ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff7a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff7b0 00 00 00 00 00 00 00 00 8e 04 ce 84 fa 7f 00 00  ................
    Possible instruction pointers:

17  KERNELBASE.dll + 0x5048e
    rsp = 0x0000009a1e1ff7c0   rip = 0x00007ffa84ce048e
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff7c0 00 00 00 00 00 00 00 00 c0 75 87 7b fa 7f 00 00  .........u.{....
    Possible instruction pointers:

18  MMDevApi.dll + 0x175c0
    rsp = 0x0000009a1e1ff7d0   rip = 0x00007ffa7b8775c0
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff7d0 b8 10 68 21 42 02 00 00 00 00 00 00 00 00 00 00  ..h!B...........
     0000009a1e1ff7e0 00 00 00 00 42 02 00 00 b1 47 f5 86 fa 7f 00 00  ....B....G......
    Possible instruction pointers:

19  ntdll.dll + 0x247b1
    rsp = 0x0000009a1e1ff7f0   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff7f0 00 00 00 00 00 00 00 00 c3 e5 79 45 fa 7f 00 00  ..........yE....
    Possible instruction pointers:

20  dsound.dll + 0xe5c3
    rsp = 0x0000009a1e1ff800   rip = 0x00007ffa4579e5c3
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff800 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff810 00 00 00 00 00 00 00 00 a1 5b f5 86 fa 7f 00 00  .........[......
    Possible instruction pointers:

21  ntdll.dll + 0x25ba1
    rsp = 0x0000009a1e1ff820   rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff820 80 0c 00 00 00 00 00 00 f9 bd 86 7b fa 7f 00 00  ...........{....
    Possible instruction pointers:

22  MMDevApi.dll + 0xbdf9
    rsp = 0x0000009a1e1ff830   rip = 0x00007ffa7b86bdf9
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff830 08 00 00 00 00 00 00 00 a1 5b f5 86 fa 7f 00 00  .........[......
    Possible instruction pointers:

23  ntdll.dll + 0x25ba1
    rsp = 0x0000009a1e1ff840   rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff840 20 00 00 00 00 00 00 00 18 00 00 00 00 00 00 00   ...............
     0000009a1e1ff850 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00  ................
     0000009a1e1ff860 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff870 50 16 bc 0c 42 02 00 00 e9 00 00 00 00 00 00 00  P...B...........
     0000009a1e1ff880 d9 f9 1f 1e 9a 00 00 00 10 20 1e 0f 42 02 00 00  ......... ..B...
     0000009a1e1ff890 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  ................
     0000009a1e1ff8a0 00 00 8e 7f 42 02 00 00 00 00 35 1d 42 02 00 00  ....B.....5.B...
     0000009a1e1ff8b0 64 5a 07 e8 8e 41 00 00 00 aa 00 38 00 00 00 00  dZ...A.....8....
     0000009a1e1ff8c0 00 00 00 00 00 00 00 00 48 50 7f 45 fa 7f 00 00  ........HP.E....
    Possible instruction pointers:

24  dsound.dll + 0x65048
    rsp = 0x0000009a1e1ff8d0   rip = 0x00007ffa457f5048
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff8e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff8f0 90 3e 1e 0f 42 02 00 00 b1 47 f5 86 fa 7f 00 00  .>..B....G......
    Possible instruction pointers:

25  ntdll.dll + 0x247b1
    rsp = 0x0000009a1e1ff900   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff900 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1e1ff910 d9 f9 1f 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff930 00 00 00 00 00 00 00 00 4f 93 cc 84 fa 7f 00 00  ........O.......
    Possible instruction pointers:

26  KERNELBASE.dll + 0x3934f
    rsp = 0x0000009a1e1ff940   rip = 0x00007ffa84cc934f
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff940 90 3e 1e 0f 42 02 00 00 b8 10 68 21 42 02 00 00  .>..B.....h!B...
     0000009a1e1ff950 00 00 00 00 00 00 00 00 20 63 9d 7f 42 02 00 00  ........ c..B...
     0000009a1e1ff960 00 00 00 00 00 00 00 00 b2 ce 0f 78 cc 1a 00 00  ...........x....
     0000009a1e1ff970 00 00 00 00 00 00 00 00 1a bc 79 45 fa 7f 00 00  ..........yE....
    Possible instruction pointers:

27  dsound.dll + 0xbc1a
    rsp = 0x0000009a1e1ff980   rip = 0x00007ffa4579bc1a
    Found by: stack scanning

    Stack contents:
     0000009a1e1ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff990 b8 10 68 21 42 02 00 00 00 00 77 0f 42 02 00 00  ..h!B.....w.B...
     0000009a1e1ff9a0 00 00 00 00 00 00 00 00 f8 f9 1f 1e 9a 00 00 00  ................
     0000009a1e1ff9b0 c0 f9 1f 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff9c0 ae 1b 98 eb af 18 00 00 d0 72 77 0f 42 02 00 00  .........rw.B...
     0000009a1e1ff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ff9f0 00 00 00 00 00 00 00 00 8e 04 ce 84 fa 7f 00 00  ................
    Possible instruction pointers:

28  KERNELBASE.dll + 0x5048e
    rsp = 0x0000009a1e1ffa00   rip = 0x00007ffa84ce048e
    Found by: stack scanning

    Stack contents:
     0000009a1e1ffa00 96 85 ff 5b b2 60 df 2e ad fe ce 84 fa 7f 00 00  ...[.`..........
    Possible instruction pointers:

29  KERNELBASE.dll + 0x5fead
    rsp = 0x0000009a1e1ffa10   rip = 0x00007ffa84cefead
    Found by: stack scanning

    Stack contents:
     0000009a1e1ffa10 b8 10 68 21 42 02 00 00 00 00 00 00 00 00 00 00  ..h!B...........
     0000009a1e1ffa20 29 79 76 77 b5 6e 00 00 b8 10 68 21 42 02 00 00  )yvw.n....h!B...
     0000009a1e1ffa30 b8 10 68 21 42 02 00 00 8a db 79 45 fa 7f 00 00  ..h!B.....yE....
    Possible instruction pointers:

30  dsound.dll + 0xdb8a
    rsp = 0x0000009a1e1ffa40   rip = 0x00007ffa4579db8a
    Found by: stack scanning

    Stack contents:
     0000009a1e1ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ffa60 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

31  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1e1ffa70   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1e1ffa70 80 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e1ffa90 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

32  ntdll.dll + 0x526a1
    rsp = 0x0000009a1e1ffaa0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 46
 0  ntdll.dll + 0x9dc14
    rax = 0x000000000000005b   rdx = 0x0000009a1e2ffb10
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff768
     r8 = 0x000000000000000c    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000024221680150
    r12 = 0x00000000000001f4   r13 = 0x0000009a1e2ffb10
    r14 = 0x0000009a1e2ff7c0   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcdc14
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e2ff768 90 05 ce 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x50590
    rax = 0x000000000000005b   rdx = 0x0000009a1e2ffb10
    rcx = 0x0000000000000001   rbx = 0x0000000000000001
    rsi = 0x0000000000000000   rdi = 0x0000000000000001
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff770
     r8 = 0x000000000000000c    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000024221680150
    r12 = 0x00000000000001f4   r13 = 0x0000009a1e2ffb10
    r14 = 0x0000009a1e2ff7c0   r15 = 0x0000000000000000
    rip = 0x00007ffa84ce0590
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e2ff770 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff780 00 00 00 00 00 00 00 00 d0 f7 2f 1e 9a 00 00 00  ........../.....
     0000009a1e2ff790 c0 f7 2f 1e 9a 00 00 00 c4 26 68 21 42 02 00 00  ../......&h!B...
     0000009a1e2ff7a0 00 00 00 00 00 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1e2ff7b0 01 00 00 00 00 00 00 00 04 00 00 04 9a 00 00 00  ................
     0000009a1e2ff7c0 c0 b4 b3 ff ff ff ff ff 0b b9 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

 2  ntdll.dll + 0x2b90b
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff7d0
    rip = 0x00007ffa86f5b90b
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff7d0 48 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  H...............
     0000009a1e2ff7e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff810 00 00 00 00 00 00 00 00 02 00 00 02 42 02 00 00  ............B...
     0000009a1e2ff820 ac 02 58 21 42 02 00 00 ef 01 00 ee 00 00 00 00  ..X!B...........
     0000009a1e2ff830 30 00 00 00 00 00 00 00 0e 00 00 0e 42 02 00 00  0...........B...
     0000009a1e2ff840 04 00 00 00 00 00 00 00 0e 00 00 0e 00 00 00 00  ................
     0000009a1e2ff850 00 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00  ........0.......
     0000009a1e2ff860 28 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  (...............
     0000009a1e2ff870 40 fa 2f 1e 9a 00 00 00 e0 e4 68 21 42 02 00 00  @./.......h!B...
     0000009a1e2ff880 f0 e4 68 21 42 02 00 00 a1 5b f5 86 fa 7f 00 00  ..h!B....[......
    Possible instruction pointers:

 3  ntdll.dll + 0x25ba1
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff890
    rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff890 00 00 00 00 00 00 00 00 a1 5b f5 86 fa 7f 00 00  .........[......
    Possible instruction pointers:

 4  ntdll.dll + 0x25ba1
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff8a0
    rip = 0x00007ffa86f55ba1
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff8a0 00 00 68 21 42 02 00 00 00 00 68 21 42 02 00 00  ..h!B.....h!B...
     0000009a1e2ff8b0 00 00 00 00 00 00 00 00 00 00 68 21 42 02 00 00  ..........h!B...
     0000009a1e2ff8c0 a0 d8 68 21 42 02 00 00 08 00 00 00 9a 00 00 00  ..h!B...........
     0000009a1e2ff8d0 00 f9 2f 1e 9a 00 00 00 30 e9 68 21 42 02 00 00  ../.....0.h!B...
     0000009a1e2ff8e0 00 00 00 00 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff8f0 00 00 58 21 42 02 00 00 00 00 9e 0e 42 02 00 00  ..X!B.......B...
     0000009a1e2ff900 ff ff ff ff ff ff ff ff 79 90 86 3f 00 00 00 00  ........y..?....
     0000009a1e2ff910 00 00 00 00 00 00 00 00 00 00 9e 0e 42 02 00 00  ............B...
     0000009a1e2ff920 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff940 00 eb 68 21 42 02 00 00 b1 47 f5 86 fa 7f 00 00  ..h!B....G......
    Possible instruction pointers:

 5  ntdll.dll + 0x247b1
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff950
    rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff950 f0 e4 68 21 42 02 00 00 00 00 68 21 42 02 00 00  ..h!B.....h!B...
     0000009a1e2ff960 00 ff 7e 45 fa 7f 00 00                          ..~E....        
    Possible instruction pointers:

 6  dsound.dll + 0x5ff00
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff968
    rip = 0x00007ffa457eff00
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff968 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ff978 00 00 00 00 00 00 00 00 00 eb 68 21 42 02 00 00  ..........h!B...
     0000009a1e2ff988 c5 cf 79 45 fa 7f 00 00                          ..yE....        
    Possible instruction pointers:

 7  dsound.dll + 0xcfc5
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff990
    rip = 0x00007ffa4579cfc5
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff990 00 eb 68 21 42 02 00 00 00 00 00 00 00 00 00 00  ..h!B...........
     0000009a1e2ff9a0 00 00 00 00 00 00 00 00 f0 e4 68 21 42 02 00 00  ..........h!B...
     0000009a1e2ff9b0 40 fa 2f 1e 9a 00 00 00 28 d3 79 45 fa 7f 00 00  @./.....(.yE....
    Possible instruction pointers:

 8  dsound.dll + 0xd328
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff9c0
    rip = 0x00007ffa4579d328
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff9c0 00 09 68 21 42 02 00 00 5c bd 7a 45 fa 7f 00 00  ..h!B...\.zE....
    Possible instruction pointers:

 9  dsound.dll + 0x1bd5c
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff9d0
    rip = 0x00007ffa457abd5c
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff9d0 00 00 00 00 00 00 00 00 f0 e4 68 21 42 02 00 00  ..........h!B...
     0000009a1e2ff9e0 00 09 68 21 42 02 00 00 5f e1 79 45 fa 7f 00 00  ..h!B..._.yE....
    Possible instruction pointers:

10  dsound.dll + 0xe15f
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ff9f0
    rip = 0x00007ffa4579e15f
    Found by: stack scanning

    Stack contents:
     0000009a1e2ff9f0 40 fa 2f 1e 9a 00 00 00 50 06 ce 84 fa 7f 00 00  @./.....P.......
    Possible instruction pointers:

11  KERNELBASE.dll + 0x50650
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ffa00
    rip = 0x00007ffa84ce0650
    Found by: stack scanning

    Stack contents:
     0000009a1e2ffa00 00 09 68 21 42 02 00 00 00 00 00 00 00 00 00 00  ..h!B...........
     0000009a1e2ffa10 58 0a 68 21 42 02 00 00 19 bb 7a 45 fa 7f 00 00  X.h!B.....zE....
    Possible instruction pointers:

12  dsound.dll + 0x1bb19
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ffa20
    rip = 0x00007ffa457abb19
    Found by: stack scanning

    Stack contents:
     0000009a1e2ffa20 ce 1b a8 eb af 18 00 00 58 0a 68 21 42 02 00 00  ........X.h!B...
     0000009a1e2ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ffa50 f4 01 00 00 00 00 00 00 8e 04 ce 84 fa 7f 00 00  ................
    Possible instruction pointers:

13  KERNELBASE.dll + 0x5048e
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ffa60
    rip = 0x00007ffa84ce048e
    Found by: stack scanning

    Stack contents:
     0000009a1e2ffa60 48 00 00 00 00 00 00 00 01 00 00 00 fa 7f 00 00  H...............
     0000009a1e2ffa70 20 09 68 21 42 02 00 00 00 00 00 00 00 00 00 00   .h!B...........
     0000009a1e2ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e2ffa90 00 00 00 00 00 00 00 00 28 e4 79 45 fa 7f 00 00  ........(.yE....
    Possible instruction pointers:

14  dsound.dll + 0xe428
    rbp = 0x0000009a1e2ffba0   rsp = 0x0000009a1e2ffaa0
    rip = 0x00007ffa4579e428
    Found by: stack scanning

Thread 47
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1e5ffc20
    rcx = 0x0000024221b4cc80   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000024221b4cc80
    rbp = 0x0000009a1e5ffbd0   rsp = 0x0000009a1e5ffb78
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x0000024221b4cc80   r11 = 0x0000024221b4cc70
    r12 = 0x0000009a1e5ffc20   r13 = 0x0000000000000000
    r14 = 0x0000009a1e5ffba0   r15 = 0x0000024221b4cc70
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e5ffb78 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1e5ffc20
    rcx = 0x0000024221b4cc80   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x0000024221b4cc80
    rbp = 0x0000009a1e5ffbd0   rsp = 0x0000009a1e5ffb80
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x0000024221b4cc80   r11 = 0x0000024221b4cc70
    r12 = 0x0000009a1e5ffc20   r13 = 0x0000000000000000
    r14 = 0x0000009a1e5ffba0   r15 = 0x0000024221b4cc70
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e5ffb80 f0 fb 5f 1e 9a 00 00 00 fa fc 39 3b 2a 51 06 00  .._.......9;*Q..
     0000009a1e5ffb90 f0 fb 5f 1e 9a 00 00 00 9f 92 f2 a0 f6 7f 00 00  .._.............
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x6c929f
    rbp = 0x0000009a1e5ffbd0   rsp = 0x0000009a1e5ffba0
    rip = 0x00007ff6a0f2929f
    Found by: stack scanning

    Stack contents:
     0000009a1e5ffba0 00 00 00 00 00 00 00 00 a0 fb 5f 1e 9a 00 00 00  .........._.....
     0000009a1e5ffbb0 00 00 00 00 00 00 00 00 b4 15 00 00 00 00 00 00  ................
     0000009a1e5ffbc0 02 01 00 00 01 00 00 00 80 cc b4 21 42 02 00 00  ...........!B...
     0000009a1e5ffbd0 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1e5ffbe0   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1e5ffbe0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffbf0 70 fc 5f 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  p._.....i.......
    Possible instruction pointers:

 4  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1e5ffc00   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1e5ffc00 3a 3f 49 3b 2a 51 06 00 d0 4b b4 21 42 02 00 00  :?I;*Q...K.!B...
     0000009a1e5ffc10 70 cc b4 21 42 02 00 00 00 04 00 00 00 00 00 00  p..!B...........
     0000009a1e5ffc20 80 69 67 ff ff ff ff ff d0 4b b4 21 42 02 00 00  .ig......K.!B...
     0000009a1e5ffc30 3a 3f 49 3b 2a 51 06 00 cd bb e8 a0 f6 7f 00 00  :?I;*Q..........
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x62bbcd
    rsp = 0x0000009a1e5ffc40   rip = 0x00007ff6a0e8bbcd
    Found by: stack scanning

    Stack contents:
     0000009a1e5ffc40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffc60 80 cc b4 21 42 02 00 00 fe ff ff ff ff ff ff ff  ...!B...........
     0000009a1e5ffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffc80 e0 cb b4 21 42 02 00 00 00 00 00 00 00 00 00 00  ...!B...........
     0000009a1e5ffc90 00 00 00 00 00 00 00 00 1d bb e8 a0 f6 7f 00 00  ................
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x62bb1d
    rsp = 0x0000009a1e5ffca0   rip = 0x00007ff6a0e8bb1d
    Found by: stack scanning

    Stack contents:
     0000009a1e5ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffcb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffcc0 00 00 00 00 00 00 00 00 f0 8b dc a0 f6 7f 00 00  ................
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x568bf0
    rsp = 0x0000009a1e5ffcd0   rip = 0x00007ff6a0dc8bf0
    Found by: stack scanning

    Stack contents:
     0000009a1e5ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffcf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffd00 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

 8  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1e5ffd10   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1e5ffd10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e5ffd30 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

 9  ntdll.dll + 0x526a1
    rsp = 0x0000009a1e5ffd40   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 48
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242227a0140   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0140
    rbp = 0x0000009a1e4ff400   rsp = 0x0000009a1e4ff3a8
     r8 = 0x0000000000000048    r9 = 0x0000000000000002
    r10 = 0x0000000000000010   r11 = 0x000000000000003f
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1e4ff3d0   r15 = 0x00000242227a0148
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e4ff3a8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242227a0140   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0140
    rbp = 0x0000009a1e4ff400   rsp = 0x0000009a1e4ff3b0
     r8 = 0x0000000000000048    r9 = 0x0000000000000002
    r10 = 0x0000000000000010   r11 = 0x000000000000003f
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1e4ff3d0   r15 = 0x00000242227a0148
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e4ff3b0 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 2  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e4ff400   rsp = 0x0000009a1e4ff3b8
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff3b8 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 3  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e4ff400   rsp = 0x0000009a1e4ff3c0
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff3c0 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 4  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e4ff400   rsp = 0x0000009a1e4ff3c8
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff3c8 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 5  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e4ff400   rsp = 0x0000009a1e4ff3d0
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff3d0 00 00 00 00 00 00 00 00 d0 f3 4f 1e 9a 00 00 00  ..........O.....
     0000009a1e4ff3e0 00 00 00 00 00 00 00 00 6c 19 00 00 00 00 00 00  ........l.......
     0000009a1e4ff3f0 48 42 2e 6a 01 00 00 00 40 01 7a 22 42 02 00 00  HB.j....@.z"B...
     0000009a1e4ff400 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 6  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1e4ff410   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff410 00 00 00 00 00 00 00 00 40 01 7a 22 42 02 00 00  ........@.z"B...
     0000009a1e4ff420 b0 f4 4f 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ..O.....i.......
    Possible instruction pointers:

 7  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1e4ff430   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff430 00 00 00 00 00 00 00 00 48 01 7a 22 42 02 00 00  ........H.z"B...
     0000009a1e4ff440 98 f4 4f 1e 9a 00 00 00 00 00 01 00 06 00 05 1e  ..O.............
     0000009a1e4ff450 00 00 00 00 00 00 00 00 98 f4 4f 1e 9a 00 00 00  ..........O.....
     0000009a1e4ff460 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1e4ff470   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff470 00 00 00 00 9a 00 00 00 70 c0 24 0f 42 02 00 00  ........p.$.B...
     0000009a1e4ff480 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1e4ff490 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1e4ff4a0 40 01 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1e4ff4b0 88 c0 24 0f 42 02 00 00 ff ff ff ff ff ff ff ff  ..$.B...........
     0000009a1e4ff4c0 00 01 7a 22 42 02 00 00 ff ff ff ff ff ff ff ff  ..z"B...........
     0000009a1e4ff4d0 68 f5 4f 1e 9a 00 00 00 00 68 2e 6a fa 7f 00 00  h.O......h.j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1e4ff4e0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff4e0 80 f7 4f 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  ..O......p'j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1e4ff4f0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff4f0 80 f7 4f 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ..O.....P"*j....
    Possible instruction pointers:

11  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e4ff500   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff500 70 c0 24 0f 42 02 00 00 ff ff ff ff ff ff ff ff  p.$.B...........
     0000009a1e4ff510 a0 f7 4f 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ..O.....P"*j....
    Possible instruction pointers:

12  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e4ff520   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff520 70 c0 24 0f 42 02 00 00 2e 2f 27 6a fa 7f 00 00  p.$.B..../'j....
    Possible instruction pointers:

13  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1e4ff530   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff530 00 00 00 00 00 00 00 00 80 1f 00 00 ff ff 00 00  ................
     0000009a1e4ff540 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff560 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff570 00 00 00 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

14  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e4ff580   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff580 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1e4ff590 70 c0 24 0f 42 02 00 00 00 01 7a 22 42 02 00 00  p.$.B.....z"B...
     0000009a1e4ff5a0 00 00 00 00 00 00 00 00 95 87 83 c3 05 01 00 00  ................
     0000009a1e4ff5b0 00 00 00 00 00 00 00 00 38 f7 4f 1e 9a 00 00 00  ........8.O.....
     0000009a1e4ff5c0 80 f7 4f 1e 9a 00 00 00 88 c0 24 0f 42 02 00 00  ..O.......$.B...
     0000009a1e4ff5d0 70 c0 24 0f 42 02 00 00 90 c0 24 0f 42 02 00 00  p.$.B.....$.B...
     0000009a1e4ff5e0 a0 f7 4f 1e 9a 00 00 00 c8 f6 4f 1e 9a 00 00 00  ..O.......O.....
     0000009a1e4ff5f0 38 f7 4f 1e 9a 00 00 00 2d e7 0b a1 f6 7f 00 00  8.O.....-.......
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x85e72d
    rsp = 0x0000009a1e4ff600   rip = 0x00007ff6a10be72d
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff600 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff610 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff620 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff630 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff640 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff650 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff660 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff670 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff690 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff6a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff6b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff6c0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f  ................
     0000009a1e4ff6d0 00 00 00 00 00 00 00 00 fe 6d 0e a3 f6 7f 00 00  .........m......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x2886dfe
    rsp = 0x0000009a1e4ff6e0   rip = 0x00007ff6a30e6dfe
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff6e0 88 c0 24 0f 42 02 00 00 70 c0 24 0f 42 02 00 00  ..$.B...p.$.B...
     0000009a1e4ff6f0 00 00 00 00 00 00 00 00 12 7e 11 a1 f6 7f 00 00  .........~......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x8b7e12
    rsp = 0x0000009a1e4ff700   rip = 0x00007ff6a1117e12
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff720 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff730 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f  ................
     0000009a1e4ff740 00 00 00 00 00 00 00 00 f8 1b 01 a3 f6 7f 00 00  ................
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x27b1bf8
    rsp = 0x0000009a1e4ff750   rip = 0x00007ff6a3011bf8
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff770 04 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1e4ff780   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff780 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1e4ff788   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff788 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff798 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff7a8 00 00 00 00 00 00 00 00 70 cc 41 1d 42 02 00 00  ........p.A.B...
     0000009a1e4ff7b8 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff7c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff7d8 00 00 00 00 00 00 00 00 88 cc 41 1d 42 02 00 00  ..........A.B...
     0000009a1e4ff7e8 d0 c9 41 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..A.B...........
     0000009a1e4ff7f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff808 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff818 21 6d 13 a1 f6 7f 00 00                          !m......        
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1e4ff820   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff830 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff860 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

22  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1e4ff870   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1e4ff870 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e4ff890 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

23  ntdll.dll + 0x526a1
    rsp = 0x0000009a1e4ff8a0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 49
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242227a0340   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0340
    rbp = 0x0000009a1e6ff820   rsp = 0x0000009a1e6ff7c8
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1e6ff7f0   r15 = 0x00000242227a0348
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e6ff7c8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242227a0340   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0340
    rbp = 0x0000009a1e6ff820   rsp = 0x0000009a1e6ff7d0
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1e6ff7f0   r15 = 0x00000242227a0348
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e6ff7d0 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 2  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e6ff820   rsp = 0x0000009a1e6ff7d8
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff7d8 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 3  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e6ff820   rsp = 0x0000009a1e6ff7e0
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff7e0 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 4  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e6ff820   rsp = 0x0000009a1e6ff7e8
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff7e8 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 5  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1e6ff820   rsp = 0x0000009a1e6ff7f0
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff7f0 00 00 00 00 00 00 00 00 f0 f7 6f 1e 9a 00 00 00  ..........o.....
     0000009a1e6ff800 00 00 00 00 00 00 00 00 e4 10 00 00 00 00 00 00  ................
     0000009a1e6ff810 48 42 2e 6a 01 00 00 00 40 03 7a 22 42 02 00 00  HB.j....@.z"B...
     0000009a1e6ff820 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 6  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1e6ff830   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff830 00 00 00 00 00 00 00 00 40 03 7a 22 42 02 00 00  ........@.z"B...
     0000009a1e6ff840 d0 f8 6f 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ..o.....i.......
    Possible instruction pointers:

 7  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1e6ff850   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff850 00 00 00 00 00 00 00 00 48 03 7a 22 42 02 00 00  ........H.z"B...
     0000009a1e6ff860 b8 f8 6f 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ..o.............
     0000009a1e6ff870 00 00 00 00 00 00 00 00 b8 f8 6f 1e 9a 00 00 00  ..........o.....
     0000009a1e6ff880 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1e6ff890   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff890 00 00 00 00 9a 00 00 00 b0 cc 24 0f 42 02 00 00  ..........$.B...
     0000009a1e6ff8a0 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1e6ff8b0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1e6ff8c0 40 03 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1e6ff8d0 c8 cc 24 0f 42 02 00 00 ff ff ff ff ff ff ff ff  ..$.B...........
     0000009a1e6ff8e0 00 03 7a 22 42 02 00 00 ff ff ff ff ff ff ff ff  ..z"B...........
     0000009a1e6ff8f0 88 f9 6f 1e 9a 00 00 00 00 68 2e 6a fa 7f 00 00  ..o......h.j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1e6ff900   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff900 a0 fb 6f 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  ..o......p'j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1e6ff910   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff910 a0 fb 6f 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ..o.....P"*j....
    Possible instruction pointers:

11  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e6ff920   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff920 b0 cc 24 0f 42 02 00 00 ff ff ff ff ff ff ff ff  ..$.B...........
     0000009a1e6ff930 c0 fb 6f 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ..o.....P"*j....
    Possible instruction pointers:

12  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e6ff940   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff940 b0 cc 24 0f 42 02 00 00 2e 2f 27 6a fa 7f 00 00  ..$.B..../'j....
    Possible instruction pointers:

13  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1e6ff950   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff950 00 00 00 00 00 00 00 00 80 1f 00 00 ff ff 00 00  ................
     0000009a1e6ff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ff990 00 00 00 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

14  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e6ff9a0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e6ff9a0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1e6ff9b0 b0 cc 24 0f 42 02 00 00 00 03 7a 22 42 02 00 00  ..$.B.....z"B...
     0000009a1e6ff9c0 00 00 00 00 00 00 00 00 12 76 94 c3 05 01 00 00  .........v......
     0000009a1e6ff9d0 00 00 00 00 00 00 00 00 58 fb 6f 1e 9a 00 00 00  ........X.o.....
     0000009a1e6ff9e0 a0 fb 6f 1e 9a 00 00 00 c8 cc 24 0f 42 02 00 00  ..o.......$.B...
     0000009a1e6ff9f0 b0 cc 24 0f 42 02 00 00 d0 cc 24 0f 42 02 00 00  ..$.B.....$.B...
     0000009a1e6ffa00 c0 fb 6f 1e 9a 00 00 00 e8 fa 6f 1e 9a 00 00 00  ..o.......o.....
     0000009a1e6ffa10 58 fb 6f 1e 9a 00 00 00 2d e7 0b a1 f6 7f 00 00  X.o.....-.......
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x85e72d
    rsp = 0x0000009a1e6ffa20   rip = 0x00007ff6a10be72d
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffa90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffab0 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffac0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffae0 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f  ................
     0000009a1e6ffaf0 00 00 00 00 00 00 00 00 fe 6d 0e a3 f6 7f 00 00  .........m......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x2886dfe
    rsp = 0x0000009a1e6ffb00   rip = 0x00007ff6a30e6dfe
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffb00 c8 cc 24 0f 42 02 00 00 b0 cc 24 0f 42 02 00 00  ..$.B.....$.B...
     0000009a1e6ffb10 00 00 00 00 00 00 00 00 12 7e 11 a1 f6 7f 00 00  .........~......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x8b7e12
    rsp = 0x0000009a1e6ffb20   rip = 0x00007ff6a1117e12
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffb20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffb50 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f  ................
     0000009a1e6ffb60 00 00 00 00 00 00 00 00 f8 1b 01 a3 f6 7f 00 00  ................
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x27b1bf8
    rsp = 0x0000009a1e6ffb70   rip = 0x00007ff6a3011bf8
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffb90 04 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1e6ffba0   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffba0 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1e6ffba8   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffba8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffbb8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffbc8 00 00 00 00 00 00 00 00 50 a1 41 1d 42 02 00 00  ........P.A.B...
     0000009a1e6ffbd8 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffbe8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffbf8 00 00 00 00 00 00 00 00 68 a1 41 1d 42 02 00 00  ........h.A.B...
     0000009a1e6ffc08 b0 9e 41 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..A.B...........
     0000009a1e6ffc18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffc28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffc38 21 6d 13 a1 f6 7f 00 00                          !m......        
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1e6ffc40   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffc40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffc80 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

22  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1e6ffc90   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1e6ffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e6ffcb0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

23  ntdll.dll + 0x526a1
    rsp = 0x0000009a1e6ffcc0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 50
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1e7ff350
    rcx = 0x00000242227a0640   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0640
    rbp = 0x0000009a1e7ff300   rsp = 0x0000009a1e7ff2a8
     r8 = 0x0000000000000004    r9 = 0x0000000000000004
    r10 = 0x00000000fffffff2   r11 = 0x0000009a1e7ff300
    r12 = 0x0000009a1e7ff350   r13 = 0x0000000000000000
    r14 = 0x0000009a1e7ff2d0   r15 = 0x00000242227a0648
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e7ff2a8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1e7ff350
    rcx = 0x00000242227a0640   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0640
    rbp = 0x0000009a1e7ff300   rsp = 0x0000009a1e7ff2b0
     r8 = 0x0000000000000004    r9 = 0x0000000000000004
    r10 = 0x00000000fffffff2   r11 = 0x0000009a1e7ff300
    r12 = 0x0000009a1e7ff350   r13 = 0x0000000000000000
    r14 = 0x0000009a1e7ff2d0   r15 = 0x00000242227a0648
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e7ff2b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff2c0 10 f4 7f 1e 9a 00 00 00 a8 f3 7f 1e 9a 00 00 00  ................
     0000009a1e7ff2d0 00 00 00 00 00 00 00 00 d0 f2 7f 1e 9a 00 00 00  ................
     0000009a1e7ff2e0 00 00 00 00 00 00 00 00 fc 0b 00 00 00 00 00 00  ................
     0000009a1e7ff2f0 80 96 98 00 01 00 00 00 40 06 7a 22 42 02 00 00  ........@.z"B...
     0000009a1e7ff300 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1e7ff310   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff310 00 00 00 00 00 00 00 00 40 06 7a 22 42 02 00 00  ........@.z"B...
     0000009a1e7ff320 b0 f3 7f 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1e7ff330   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff330 00 00 00 00 00 00 00 00 48 06 7a 22 42 02 00 00  ........H.z"B...
     0000009a1e7ff340 98 f3 7f 1e 9a 00 00 00 dd 8a 51 15 01 00 00 00  ..........Q.....
     0000009a1e7ff350 a0 99 6c ff ff ff ff ff 98 f3 7f 1e 9a 00 00 00  ..l.............
     0000009a1e7ff360 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 4  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1e7ff370   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff370 00 00 00 00 9a 00 00 00 f0 88 5f a4 f6 7f 00 00  .........._.....
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1e7ff380   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff380 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1e7ff390 00 00 00 00 00 00 00 00 2b b8 5e 82 92 01 00 00  ........+.^.....
     0000009a1e7ff3a0 40 06 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1e7ff3b0 f8 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x3d988f8
    rsp = 0x0000009a1e7ff3b8   rip = 0x00007ff6a45f88f8
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff3b8 2b b8 5e 82 92 01 00 00 00 06 7a 22 42 02 00 00  +.^.......z"B...
     0000009a1e7ff3c8 2b b8 5e 82 92 01 00 00 68 f4 7f 1e 9a 00 00 00  +.^.....h.......
     0000009a1e7ff3d8 00 68 2e 6a fa 7f 00 00                          .h.j....        
    Possible instruction pointers:

 7  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1e7ff3e0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff3e0 80 f6 7f 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  .........p'j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1e7ff3f0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff3f0 80 f6 7f 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e7ff400   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff400 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1e7ff408   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff408 2b b8 5e 82 92 01 00 00 44 00 00 00 00 00 00 00  +.^.....D.......
     0000009a1e7ff418 50 22 2a 6a fa 7f 00 00                          P"*j....        
    Possible instruction pointers:

11  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e7ff420   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff420 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1e7ff428   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff428 2e 2f 27 6a fa 7f 00 00                          ./'j....        
    Possible instruction pointers:

13  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1e7ff430   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff430 01 00 00 00 00 00 00 00 98 f5 7f 1e 9a 00 00 00  ................
     0000009a1e7ff440 a8 f4 7f 1e 9a 00 00 00 fe ff ff ff ff ff ff ff  ................
     0000009a1e7ff450 00 00 00 00 00 00 00 00 13 ab 4e a1 f6 7f 00 00  ..........N.....
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0xc8ab13
    rsp = 0x0000009a1e7ff460   rip = 0x00007ff6a14eab13
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff460 00 1a 7a 22 42 02 00 00 bf 32 1a 6a fa 7f 00 00  ..z"B....2.j....
    Possible instruction pointers:

15  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1e7ff470   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff470 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

16  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1e7ff480   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff480 00 00 00 00 00 00 00 00 2b b8 5e 82 92 01 00 00  ........+.^.....
     0000009a1e7ff490 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1e7ff498   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff498 00 06 7a 22 42 02 00 00 00 00 00 00 00 00 00 00  ..z"B...........
     0000009a1e7ff4a8 ae 51 ce b3 0f 01 00 00 00 00 00 00 00 00 00 00  .Q..............
     0000009a1e7ff4b8 b8 f5 7f 1e 9a 00 00 00 80 f6 7f 1e 9a 00 00 00  ................
     0000009a1e7ff4c8 f8 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x3d988f8
    rsp = 0x0000009a1e7ff4d0   rip = 0x00007ff6a45f88f8
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff4d0 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1e7ff4d8   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff4d8 ff ff ff ff ff ff ff 7f 44 00 00 00 00 00 00 00  ........D.......
     0000009a1e7ff4e8 a8 f5 7f 1e 9a 00 00 00 f0 88 5f a4 f6 7f 00 00  .........._.....
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1e7ff4f8   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff4f8 e3 e7 0b a1 f6 7f 00 00                          ........        
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x85e7e3
    rsp = 0x0000009a1e7ff500   rip = 0x00007ff6a10be7e3
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff500 90 f5 7f 1e 9a 00 00 00 66 5f 55 a1 f6 7f 00 00  ........f_U.....
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0xcf5f66
    rsp = 0x0000009a1e7ff510   rip = 0x00007ff6a1555f66
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff510 bb 79 00 00 00 00 00 00 80 f6 7f 1e 9a 00 00 00  .y..............
     0000009a1e7ff520 00 00 00 00 00 00 00 00 44 65 4b e6 9a 00 00 00  ........DeK.....
     0000009a1e7ff530 00 00 00 00 00 00 00 00 44 65 4b e6 00 00 00 00  ........DeK.....
     0000009a1e7ff540 2b b8 5e 82 92 01 00 00 28 94 10 a1 f6 7f 00 00  +.^.....(.......
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x8a9428
    rsp = 0x0000009a1e7ff550   rip = 0x00007ff6a1109428
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff550 01 d2 c4 21 42 02 00 00 38 f6 7f 1e 9a 00 00 00  ...!B...8.......
     0000009a1e7ff560 c0 f5 7f 1e 9a 00 00 00 95 85 10 a1 f6 7f 00 00  ................
    Possible instruction pointers:

24  qemu-system-x86_64.exe + 0x8a8595
    rsp = 0x0000009a1e7ff570   rip = 0x00007ff6a1108595
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff570 32 00 00 00 00 00 00 00 c0 a3 d0 0c 00 00 00 00  2...............
     0000009a1e7ff580 22 00 00 00 00 00 00 00 c0 a3 d0 0c 03 00 00 00  "...............
     0000009a1e7ff590 32 00 00 00 00 00 00 00 c0 a3 d0 0c 00 00 00 00  2...............
     0000009a1e7ff5a0 10 00 00 00 00 00 00 00 31 00 00 00 00 00 00 00  ........1.......
     0000009a1e7ff5b0 6f 94 d8 0e 00 00 00 00 00 00 00 00 00 00 00 00  o...............
     0000009a1e7ff5c0 51 d9 92 39 03 00 00 00 ff ff ff ff ff ff ff 7f  Q..9............
     0000009a1e7ff5d0 00 00 00 00 00 00 00 00 7a 99 0e a3 f6 7f 00 00  ........z.......
    Possible instruction pointers:

25  qemu-system-x86_64.exe + 0x288997a
    rsp = 0x0000009a1e7ff5e0   rip = 0x00007ff6a30e997a
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff5e0 c0 f6 7f 1e 9a 00 00 00 98 f6 7f 1e 9a 00 00 00  ................
     0000009a1e7ff5f0 a7 85 00 00 00 00 00 00 b5 57 13 a1 f6 7f 00 00  .........W......
    Possible instruction pointers:

26  qemu-system-x86_64.exe + 0x8d57b5
    rsp = 0x0000009a1e7ff600   rip = 0x00007ff6a11357b5
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff600 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff610 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff620 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff630 f8 1b 01 a3 f6 7f 00 00                          ........        
    Possible instruction pointers:

27  qemu-system-x86_64.exe + 0x27b1bf8
    rsp = 0x0000009a1e7ff638   rip = 0x00007ff6a3011bf8
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff638 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff648 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff658 04 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

28  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1e7ff668   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff668 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

29  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1e7ff670   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff670 e1 81 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1e7ff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff690 c0 9f 16 1f 42 02 00 00 32 00 00 00 00 00 00 00  ....B...2.......
     0000009a1e7ff6a0 c0 a3 d0 0c 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff6b0 a7 85 00 00 00 00 00 00 88 a5 41 1d 42 02 00 00  ..........A.B...
     0000009a1e7ff6c0 a7 85 00 00 00 00 00 00 fe ff ff ff ff ff ff ff  ................
     0000009a1e7ff6d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff6e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff6f0 b8 a5 41 1d 42 02 00 00 00 a3 41 1d 42 02 00 00  ..A.B.....A.B...
     0000009a1e7ff700 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff710 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff720 00 00 00 00 00 00 00 00 21 6d 13 a1 f6 7f 00 00  ........!m......
    Possible instruction pointers:

30  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1e7ff730   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff730 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff740 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff750 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff770 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

31  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1e7ff780   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1e7ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e7ff7a0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

32  ntdll.dll + 0x526a1
    rsp = 0x0000009a1e7ff7b0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 51
 0  ntdll.dll + 0x9d144
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000d40   rbx = 0x0000000000000000
    rsi = 0x000002420b746270   rdi = 0x0000000000000001
    rbp = 0x0000000000000001   rsp = 0x0000009a1e8fe4c8
     r8 = 0x0000000000001000    r9 = 0x0000000000000001
    r10 = 0x0000000000000000   r11 = 0x0000009a1e8fe620
    r12 = 0x0000009a1e8ff638   r13 = 0x0000000000000001
    r14 = 0x0000000000000000   r15 = 0x0000000000000d40
    rip = 0x00007ffa86fcd144
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e8fe4c8 68 b4 d4 84 fa 7f 00 00                          h.......        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0xbb468
    rax = 0x0000000000000004   rdx = 0x0000000000000000
    rcx = 0x0000000000000d40   rbx = 0x0000000000000000
    rsi = 0x000002420b746270   rdi = 0x0000000000000001
    rbp = 0x0000000000000001   rsp = 0x0000009a1e8fe4d0
     r8 = 0x0000000000001000    r9 = 0x0000000000000001
    r10 = 0x0000000000000000   r11 = 0x0000009a1e8fe620
    r12 = 0x0000009a1e8ff638   r13 = 0x0000000000000001
    r14 = 0x0000000000000000   r15 = 0x0000000000000d40
    rip = 0x00007ffa84d4b468
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e8fe4d0 00 00 00 00 00 00 00 00 b0 e4 8f 1e 9a 00 00 00  ................
     0000009a1e8fe4e0 40 00 00 00 af 18 00 00 00 00 00 00 00 00 00 00  @...............
     0000009a1e8fe4f0 28 e5 8f 1e 9a 00 00 00 20 e6 8f 1e 9a 00 00 00  (....... .......
     0000009a1e8fe500 00 10 00 00 00 00 00 00 07 00 00 00 00 00 00 00  ................
     0000009a1e8fe510 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1e8fe520 00 00 00 00 00 00 00 00 01 01 30 1d 42 02 00 00  ..........0.B...
     0000009a1e8fe530 ae 08 08 eb af 18 00 00 08 8e dd a0 f6 7f 00 00  ................
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x578e08
    rsp = 0x0000009a1e8fe540   rip = 0x00007ff6a0dd8e08
    Found by: stack scanning

    Stack contents:
     0000009a1e8fe540 70 f6 8f 1e 9a 00 00 00 28 f6 8f 1e 9a 00 00 00  p.......(.......
     0000009a1e8fe550 68 f8 87 a3 f6 7f 00 00                          h.......        
    Possible instruction pointers:

 3  qemu-system-x86_64.exe + 0x301f868
    rsp = 0x0000009a1e8fe558   rip = 0x00007ff6a387f868
    Found by: stack scanning

    Stack contents:
     0000009a1e8fe558 38 f6 8f 1e 9a 00 00 00 20 e6 8f 1e 9a 00 00 00  8....... .......
     0000009a1e8fe568 70 62 74 0b 42 02 00 00 60 e6 8f 1e 9a 00 00 00  pbt.B...`.......
     0000009a1e8fe578 93 8b d0 84 fa 7f 00 00                          ........        
    Possible instruction pointers:

 4  KERNELBASE.dll + 0x78b93
    rsp = 0x0000009a1e8fe580   rip = 0x00007ffa84d08b93
    Found by: stack scanning

    Stack contents:
     0000009a1e8fe580 f8 62 74 0b 42 02 00 00 20 e6 8f 1e 9a 00 00 00  .bt.B... .......
     0000009a1e8fe590 00 10 00 00 00 00 00 00 ad 4b f8 86 fa 7f 00 00  .........K......
    Possible instruction pointers:

 5  ntdll.dll + 0x54bad
    rsp = 0x0000009a1e8fe5a0   rip = 0x00007ffa86f84bad
    Found by: stack scanning

    Stack contents:
     0000009a1e8fe5a0 07 00 00 00 9a 00 00 00 94 f6 8f 1e 9a 00 00 00  ................
     0000009a1e8fe5b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e8fe5c0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e8fe5d0 70 62 74 0b 42 02 00 00 6a d2 a0 a1 f6 7f 00 00  pbt.B...j.......
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x11ad26a
    rsp = 0x0000009a1e8fe5e0   rip = 0x00007ff6a1a0d26a
    Found by: stack scanning

Thread 52
 0  ntdll.dll + 0x9d1e4
    rax = 0x0000000000000009   rdx = 0x0000009a1e9ffab8
    rcx = 0x0000000000000d44   rbx = 0x0000009a1e9ffaa8
    rsi = 0x0000009a1e9ffb10   rdi = 0x0000009a1e9ffab4
    rbp = 0x0000009a1e9ffa80   rsp = 0x0000009a1e9ff998
     r8 = 0x000002427f8e27c0    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1e9ffbd0
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa86fcd1e4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1e9ff998 5f f3 ce 84 fa 7f 00 00                          _.......        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x5f35f
    rax = 0x0000000000000009   rdx = 0x0000009a1e9ffab8
    rcx = 0x0000000000000d44   rbx = 0x0000009a1e9ffaa8
    rsi = 0x0000009a1e9ffb10   rdi = 0x0000009a1e9ffab4
    rbp = 0x0000009a1e9ffa80   rsp = 0x0000009a1e9ff9a0
     r8 = 0x000002427f8e27c0    r9 = 0x0000000000000001
    r10 = 0x0000000000008000   r11 = 0x0000009a1e9ffbd0
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000000000000000   r15 = 0x0000000000000000
    rip = 0x00007ffa84cef35f
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1e9ff9a0 28 3b c6 23 42 02 00 00 00 00 00 00 00 00 00 00  (;.#B...........
     0000009a1e9ff9b0 c0 f9 9f 1e 9a 00 00 00 00 00 8e 7f 42 02 00 00  ............B...
     0000009a1e9ff9c0 d0 f9 9f 1e 9a 00 00 00 70 6f 79 0f 42 02 00 00  ........poy.B...
     0000009a1e9ff9d0 00 ba 3c dc ff ff ff ff 00 58 47 f8 0d 00 00 00  ..<......XG.....
     0000009a1e9ff9e0 28 3b c6 23 42 02 00 00 10 fb 9f 1e 9a 00 00 00  (;.#B...........
     0000009a1e9ff9f0 48 02 2f 1d 42 02 00 00 86 dd cf a1 f6 7f 00 00  H./.B...........
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x149dd86
    rbp = 0x0000009a1e9ffa80   rsp = 0x0000009a1e9ffa00
    rip = 0x00007ff6a1cfdd86
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffa00 00 58 47 f8 0d 00 00 00 20 00 00 00 00 00 00 00  .XG..... .......
     0000009a1e9ffa10 10 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................
     0000009a1e9ffa20 60 ea 00 00 42 02 00 00 e9 fa 9f 1e 9a 00 00 00  `...B...........
     0000009a1e9ffa30 b4 d4 48 e2 94 e3 e6 ca 40 fc 9f 1e 9a 00 00 00  ..H.....@.......
     0000009a1e9ffa40 00 00 00 00 00 00 00 00 f8 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1e9ffa50 00 00 00 00 00 00 00 00 06 42 f2 a1 f6 7f 00 00  .........B......
    Possible instruction pointers:

 3  qemu-system-x86_64.exe + 0x16c4206
    rbp = 0x0000009a1e9ffa80   rsp = 0x0000009a1e9ffa60
    rip = 0x00007ff6a1f24206
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffa60 00 00 96 7f 42 02 00 00 29 fb 9f 1e 9a 00 00 00  ....B...).......
     0000009a1e9ffa70 05 00 00 00 02 00 00 00 c7 b3 f5 86 fa 7f 00 00  ................
    Possible instruction pointers:

 4  ntdll.dll + 0x2b3c7
    rbp = 0x0000009a1e9ffa80   rsp = 0x0000009a1e9ffa80
    rip = 0x00007ffa86f5b3c7
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffa80 00 00 8e 7f 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1e9ffa90 a0 77 29 6a fa 7f 00 00                          .w)j....        
    Possible instruction pointers:

 5  libabseil_dll.dll + 0x777a0
    rsp = 0x0000009a1e9ffa98   rip = 0x00007ffa6a2977a0
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffa98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffaa8 28 3b c6 23 42 02 00 00 00 00 00 00 00 00 00 00  (;.#B...........
     0000009a1e9ffab8 10 3b c6 23 42 02 00 00 fe ff ff ff ff ff ff ff  .;.#B...........
     0000009a1e9ffac8 10 96 41 1d 42 02 00 00 08 9a 41 1d 42 02 00 00  ..A.B.....A.B...
     0000009a1e9ffad8 f8 02 2f 1d 42 02 00 00 30 fb 9f 1e 9a 00 00 00  ../.B...0.......
     0000009a1e9ffae8 a4 64 b5 a1 f6 7f 00 00                          .d......        
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x12f64a4
    rsp = 0x0000009a1e9ffaf0   rip = 0x00007ff6a1b564a4
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffaf0 00 00 00 00 00 00 00 00 43 a5 fb a1 f6 7f 00 00  ........C.......
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x175a543
    rsp = 0x0000009a1e9ffb00   rip = 0x00007ff6a1fba543
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffb10 20 fb 9f 1e 9a 00 00 00 b0 a6 b5 a1 f6 7f 00 00   ...............
    Possible instruction pointers:

 8  qemu-system-x86_64.exe + 0x12fa6b0
    rsp = 0x0000009a1e9ffb20   rip = 0x00007ff6a1b5a6b0
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffb20 f8 02 2f 1d 42 02 00 00 10 96 41 1d 42 02 00 00  ../.B.....A.B...
     0000009a1e9ffb30 fe ff ff ff ff ff ff ff 40 e2 2e 1d 42 02 00 00  ........@...B...
     0000009a1e9ffb40 a0 fb 9f 1e 9a 00 00 00 3d 34 f2 a1 f6 7f 00 00  ........=4......
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0x16c343d
    rsp = 0x0000009a1e9ffb50   rip = 0x00007ff6a1f2343d
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffb50 6c a9 82 ef 01 00 00 00 80 16 c3 21 42 02 00 00  l..........!B...
     0000009a1e9ffb60 18 fc 9f 1e 9a 00 00 00 b2 40 f2 a1 f6 7f 00 00  .........@......
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x16c40b2
    rsp = 0x0000009a1e9ffb70   rip = 0x00007ff6a1f240b2
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffb70 80 16 c3 21 42 02 00 00 eb c2 fd a1 f6 7f 00 00  ...!B...........
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x177c2eb
    rsp = 0x0000009a1e9ffb80   rip = 0x00007ff6a1fdc2eb
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffb80 10 00 00 00 00 00 00 00 10 96 41 1d 42 02 00 00  ..........A.B...
     0000009a1e9ffb90 00 00 00 00 00 00 00 00 a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1e9ffba0 fe ff ff ff ff ff ff ff a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1e9ffbb0 08 9a 41 1d 42 02 00 00 40 e2 2e 1d 42 02 00 00  ..A.B...@...B...
     0000009a1e9ffbc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffbd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffbe0 40 fc 9f 1e 9a 00 00 00 c8 31 f2 a1 f6 7f 00 00  @........1......
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x16c31c8
    rsp = 0x0000009a1e9ffbf0   rip = 0x00007ff6a1f231c8
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffbf0 e0 c8 b9 21 42 02 00 00 b1 47 f5 86 fa 7f 00 00  ...!B....G......
    Possible instruction pointers:

13  ntdll.dll + 0x247b1
    rsp = 0x0000009a1e9ffc00   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffc00 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1e9ffc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffc20 01 00 00 00 00 00 00 00 80 16 c3 21 42 02 00 00  ...........!B...
     0000009a1e9ffc30 01 00 00 00 00 00 00 00 f0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1e9ffc40 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffc50 c8 98 41 1d 42 02 00 00 40 e2 2e 1d 42 02 00 00  ..A.B...@...B...
     0000009a1e9ffc60 00 00 00 00 00 00 00 00 ae 3d f2 a1 f6 7f 00 00  .........=......
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x16c3dae
    rsp = 0x0000009a1e9ffc70   rip = 0x00007ff6a1f23dae
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffc80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffc90 00 00 00 00 00 00 00 00 c8 98 41 1d 42 02 00 00  ..........A.B...
     0000009a1e9ffca0 10 96 41 1d 42 02 00 00 21 6d 13 a1 f6 7f 00 00  ..A.B...!m......
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1e9ffcb0   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffcb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffcc0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffcd0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffcf0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

16  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1e9ffd00   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1e9ffd00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffd10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1e9ffd20 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

17  ntdll.dll + 0x526a1
    rsp = 0x0000009a1e9ffd30   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 53
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1eaff9a0
    rcx = 0x00000242227a0840   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0840
    rbp = 0x0000009a1eaff950   rsp = 0x0000009a1eaff8f8
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a0840   r11 = 0x00000242227a0848
    r12 = 0x0000009a1eaff9a0   r13 = 0x0000000000000000
    r14 = 0x0000009a1eaff920   r15 = 0x00000242227a0848
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1eaff8f8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1eaff9a0
    rcx = 0x00000242227a0840   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0840
    rbp = 0x0000009a1eaff950   rsp = 0x0000009a1eaff900
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a0840   r11 = 0x00000242227a0848
    r12 = 0x0000009a1eaff9a0   r13 = 0x0000000000000000
    r14 = 0x0000009a1eaff920   r15 = 0x00000242227a0848
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1eaff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaff910 78 6f 79 0f 42 02 00 00 01 6e 79 0f 42 02 00 00  xoy.B....ny.B...
     0000009a1eaff920 00 00 00 00 00 00 00 00 20 f9 af 1e 9a 00 00 00  ........ .......
     0000009a1eaff930 00 00 00 00 00 00 00 00 f8 20 00 00 00 00 00 00  ......... ......
     0000009a1eaff940 80 96 98 00 01 00 00 00 40 08 7a 22 42 02 00 00  ........@.z"B...
     0000009a1eaff950 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1eaff960   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1eaff960 00 00 00 00 00 00 00 00 40 08 7a 22 42 02 00 00  ........@.z"B...
     0000009a1eaff970 00 fa af 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1eaff980   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1eaff980 00 00 00 00 00 00 00 00 48 08 7a 22 42 02 00 00  ........H.z"B...
     0000009a1eaff990 e8 f9 af 1e 9a 00 00 00 0b 16 f2 a1 f6 7f 00 00  ................
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x16c160b
    rsp = 0x0000009a1eaff9a0   rip = 0x00007ff6a1f2160b
    Found by: stack scanning

    Stack contents:
     0000009a1eaff9a0 90 b5 4c ff ff ff ff ff e8 f9 af 1e 9a 00 00 00  ..L.............
     0000009a1eaff9b0 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 5  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1eaff9c0   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1eaff9c0 00 00 00 00 9a 00 00 00 70 6f 79 0f 42 02 00 00  ........poy.B...
     0000009a1eaff9d0 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1eaff9e0 00 00 00 00 00 00 00 00 b1 1e 33 e2 92 01 00 00  ..........3.....
     0000009a1eaff9f0 40 08 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1eaffa00 78 6f 79 0f 42 02 00 00 b1 1e 33 e2 92 01 00 00  xoy.B.....3.....
     0000009a1eaffa10 00 08 7a 22 42 02 00 00 b1 1e 33 e2 92 01 00 00  ..z"B.....3.....
     0000009a1eaffa20 b8 fa af 1e 9a 00 00 00 00 68 2e 6a fa 7f 00 00  .........h.j....
    Possible instruction pointers:

 6  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1eaffa30   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1eaffa30 a0 fb af 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  .........p'j....
    Possible instruction pointers:

 7  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1eaffa40   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1eaffa40 a0 fb af 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1eaffa50   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1eaffa50 70 6f 79 0f 42 02 00 00 b1 1e 33 e2 92 01 00 00  poy.B.....3.....
     0000009a1eaffa60 f0 fb af 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1eaffa70   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1eaffa70 70 6f 79 0f 42 02 00 00 2e 2f 27 6a fa 7f 00 00  poy.B..../'j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1eaffa80   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1eaffa80 28 fb af 1e 9a 00 00 00 ad 42 13 a1 f6 7f 00 00  (........B......
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x8d42ad
    rsp = 0x0000009a1eaffa90   rip = 0x00007ff6a11342ad
    Found by: stack scanning

    Stack contents:
     0000009a1eaffa90 21 00 00 00 00 00 00 00 d3 8e 4c 32 03 00 00 00  !.........L2....
     0000009a1eaffaa0 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffab0 00 0d 7a 22 42 02 00 00 bf 32 1a 6a fa 7f 00 00  ..z"B....2.j....
    Possible instruction pointers:

12  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1eaffac0   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1eaffac0 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

13  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1eaffad0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1eaffad0 00 00 00 00 00 00 00 00 b1 1e 33 e2 92 01 00 00  ..........3.....
     0000009a1eaffae0 70 6f 79 0f 42 02 00 00 00 08 7a 22 42 02 00 00  poy.B.....z"B...
     0000009a1eaffaf0 00 00 00 00 00 00 00 00 3c 62 f5 e2 0f 01 00 00  ........<b......
     0000009a1eaffb00 00 00 00 00 00 00 00 00 58 03 2f 1d 42 02 00 00  ........X./.B...
     0000009a1eaffb10 a0 fb af 1e 9a 00 00 00 ff ff ff ff ff ff ff 7f  ................
     0000009a1eaffb20 af 00 00 00 00 00 00 00 a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1eaffb30 f0 fb af 1e 9a 00 00 00 e8 9c 41 1d 42 02 00 00  ..........A.B...
     0000009a1eaffb40 e8 fb af 1e 9a 00 00 00 72 3b f2 a1 f6 7f 00 00  ........r;......
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x16c3b72
    rsp = 0x0000009a1eaffb50   rip = 0x00007ff6a1f23b72
    Found by: stack scanning

    Stack contents:
     0000009a1eaffb50 03 87 4c 32 00 00 00 00 98 fb af 1e 9a 00 00 00  ..L2............
     0000009a1eaffb60 e8 fb af 1e 9a 00 00 00 43 9e 10 a1 f6 7f 00 00  ........C.......
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x8a9e43
    rsp = 0x0000009a1eaffb70   rip = 0x00007ff6a1109e43
    Found by: stack scanning

    Stack contents:
     0000009a1eaffb70 e8 9c 41 1d 42 02 00 00 b1 1e 33 e2 92 01 00 00  ..A.B.....3.....
     0000009a1eaffb80 21 76 00 00 01 00 00 00 00 00 00 00 00 27 b9 29  !v...........'.)
     0000009a1eaffb90 70 6f 79 0f 42 02 00 00 fe ff ff ff ff ff ff ff  poy.B...........
     0000009a1eaffba0 58 03 2f 1d 42 02 00 00 40 03 2f 1d 42 02 00 00  X./.B...@./.B...
     0000009a1eaffbb0 10 fc af 1e 9a 00 00 00 af 36 f2 a1 f6 7f 00 00  .........6......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x16c36af
    rsp = 0x0000009a1eaffbc0   rip = 0x00007ff6a1f236af
    Found by: stack scanning

    Stack contents:
     0000009a1eaffbc0 33 e2 d7 00 02 00 00 00 f0 0f c3 21 42 02 00 00  3..........!B...
     0000009a1eaffbd0 88 fc af 1e 9a 00 00 00 b2 40 f2 a1 f6 7f 00 00  .........@......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x16c40b2
    rsp = 0x0000009a1eaffbe0   rip = 0x00007ff6a1f240b2
    Found by: stack scanning

    Stack contents:
     0000009a1eaffbe0 f0 0f c3 21 42 02 00 00 33 84 00 00 00 00 00 00  ...!B...3.......
     0000009a1eaffbf0 ca 88 00 00 00 00 00 00 60 9a 41 1d 42 02 00 00  ........`.A.B...
     0000009a1eaffc00 d8 6e 79 0f 42 02 00 00 ec 5b 54 54 c8 00 00 00  .ny.B....[TT....
     0000009a1eaffc10 fe ff ff ff ff ff ff ff a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1eaffc20 58 9e 41 1d 42 02 00 00 40 03 2f 1d 42 02 00 00  X.A.B...@./.B...
     0000009a1eaffc30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffc40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffc50 b0 fc af 1e 9a 00 00 00 c8 31 f2 a1 f6 7f 00 00  .........1......
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x16c31c8
    rsp = 0x0000009a1eaffc60   rip = 0x00007ff6a1f231c8
    Found by: stack scanning

    Stack contents:
     0000009a1eaffc60 d0 cf b9 21 42 02 00 00 b1 47 f5 86 fa 7f 00 00  ...!B....G......
    Possible instruction pointers:

19  ntdll.dll + 0x247b1
    rsp = 0x0000009a1eaffc70   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1eaffc70 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1eaffc80 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00  ................
     0000009a1eaffc90 01 00 00 00 00 00 00 00 f0 0f c3 21 42 02 00 00  ...........!B...
     0000009a1eaffca0 01 00 00 00 00 00 00 00 f0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1eaffcb0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1eaffcc0 18 9d 41 1d 42 02 00 00 40 03 2f 1d 42 02 00 00  ..A.B...@./.B...
     0000009a1eaffcd0 00 00 00 00 00 00 00 00 ae 3d f2 a1 f6 7f 00 00  .........=......
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x16c3dae
    rsp = 0x0000009a1eaffce0   rip = 0x00007ff6a1f23dae
    Found by: stack scanning

    Stack contents:
     0000009a1eaffce0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffcf0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffd00 00 00 00 00 00 00 00 00 18 9d 41 1d 42 02 00 00  ..........A.B...
     0000009a1eaffd10 60 9a 41 1d 42 02 00 00 21 6d 13 a1 f6 7f 00 00  `.A.B...!m......
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1eaffd20   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1eaffd20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffd30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffd40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffd50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffd60 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

22  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1eaffd70   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1eaffd70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffd80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eaffd90 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

23  ntdll.dll + 0x526a1
    rsp = 0x0000009a1eaffda0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 54
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1ebff830
    rcx = 0x00000242227a0b40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0b40
    rbp = 0x0000009a1ebff7e0   rsp = 0x0000009a1ebff788
     r8 = 0x0000000000000048    r9 = 0x0000000000000002
    r10 = 0x00000000546c6148   r11 = 0xfffffffff7a93a41
    r12 = 0x0000009a1ebff830   r13 = 0x0000000000000000
    r14 = 0x0000009a1ebff7b0   r15 = 0x00000242227a0b48
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1ebff788 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1ebff830
    rcx = 0x00000242227a0b40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0b40
    rbp = 0x0000009a1ebff7e0   rsp = 0x0000009a1ebff790
     r8 = 0x0000000000000048    r9 = 0x0000000000000002
    r10 = 0x00000000546c6148   r11 = 0xfffffffff7a93a41
    r12 = 0x0000009a1ebff830   r13 = 0x0000000000000000
    r14 = 0x0000009a1ebff7b0   r15 = 0x00000242227a0b48
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1ebff790 08 f8 bf 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebff7a0 00 0d 7a 22 42 02 00 00 70 6f 79 0f 42 02 00 00  ..z"B...poy.B...
     0000009a1ebff7b0 00 00 00 00 00 00 00 00 b0 f7 bf 1e 9a 00 00 00  ................
     0000009a1ebff7c0 00 00 00 00 00 00 00 00 8c 11 00 00 00 00 00 00  ................
     0000009a1ebff7d0 80 96 98 00 01 00 00 00 40 0b 7a 22 42 02 00 00  ........@.z"B...
     0000009a1ebff7e0 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1ebff7f0   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1ebff7f0 00 00 00 00 00 00 00 00 40 0b 7a 22 42 02 00 00  ........@.z"B...
     0000009a1ebff800 90 f8 bf 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1ebff810   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1ebff810 00 00 00 00 00 00 00 00 48 0b 7a 22 42 02 00 00  ........H.z"B...
     0000009a1ebff820 78 f8 bf 1e 9a 00 00 00 f9 66 29 6a fa 7f 00 00  x........f)j....
    Possible instruction pointers:

 4  libabseil_dll.dll + 0x766f9
    rsp = 0x0000009a1ebff830   rip = 0x00007ffa6a2966f9
    Found by: stack scanning

    Stack contents:
     0000009a1ebff830 70 42 67 ff ff ff ff ff 78 f8 bf 1e 9a 00 00 00  pBg.....x.......
     0000009a1ebff840 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 5  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1ebff850   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1ebff850 00 00 00 00 9a 00 00 00 90 02 2f 1d 42 02 00 00  ........../.B...
     0000009a1ebff860 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1ebff870 00 00 00 00 00 00 00 00 a9 bc f4 85 92 01 00 00  ................
     0000009a1ebff880 40 0b 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1ebff890 98 02 2f 1d 42 02 00 00 a9 bc f4 85 92 01 00 00  ../.B...........
     0000009a1ebff8a0 00 0b 7a 22 42 02 00 00 a9 bc f4 85 92 01 00 00  ..z"B...........
     0000009a1ebff8b0 48 f9 bf 1e 9a 00 00 00 00 68 2e 6a fa 7f 00 00  H........h.j....
    Possible instruction pointers:

 6  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1ebff8c0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1ebff8c0 30 fa bf 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  0........p'j....
    Possible instruction pointers:

 7  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1ebff8d0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1ebff8d0 30 fa bf 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  0.......P"*j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1ebff8e0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1ebff8e0 90 02 2f 1d 42 02 00 00 a9 bc f4 85 92 01 00 00  ../.B...........
     0000009a1ebff8f0 00 00 00 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1ebff900   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1ebff900 90 02 2f 1d 42 02 00 00 2e 2f 27 6a fa 7f 00 00  ../.B..../'j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1ebff910   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1ebff910 90 f9 bf 1e 9a 00 00 00 02 15 f2 a1 f6 7f 00 00  ................
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x16c1502
    rsp = 0x0000009a1ebff920   rip = 0x00007ff6a1f21502
    Found by: stack scanning

    Stack contents:
     0000009a1ebff920 40 fa bf 1e 9a 00 00 00 00 00 00 00 00 00 00 00  @...............
     0000009a1ebff930 b8 f9 bf 1e 9a 00 00 00 08 fa bf 1e 9a 00 00 00  ................
     0000009a1ebff940 00 00 00 00 00 00 00 00 bf 32 1a 6a fa 7f 00 00  .........2.j....
    Possible instruction pointers:

12  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1ebff950   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1ebff950 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

13  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1ebff960   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1ebff960 00 00 00 00 00 00 00 00 a9 bc f4 85 92 01 00 00  ................
     0000009a1ebff970 90 02 2f 1d 42 02 00 00 00 0b 7a 22 42 02 00 00  ../.B.....z"B...
     0000009a1ebff980 00 00 00 00 00 00 00 00 05 fa 68 b3 0f 01 00 00  ..........h.....
     0000009a1ebff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebff9a0 30 fa bf 1e 9a 00 00 00 e9 03 00 00 00 00 00 00  0...............
     0000009a1ebff9b0 88 02 2f 1d 42 02 00 00 00 00 00 00 00 00 00 00  ../.B...........
     0000009a1ebff9c0 00 00 00 00 00 00 00 00 10 fa bf 1e 9a 00 00 00  ................
     0000009a1ebff9d0 00 00 00 00 00 00 00 00 98 5d 13 a1 f6 7f 00 00  .........]......
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x8d5d98
    rsp = 0x0000009a1ebff9e0   rip = 0x00007ff6a1135d98
    Found by: stack scanning

    Stack contents:
     0000009a1ebff9e0 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

15  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1ebff9f0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1ebff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffa00 a9 bc f4 85 92 01 00 00 dc 81 00 00 00 00 00 00  ................
     0000009a1ebffa10 01 00 00 00 00 00 00 00 00 09 3d 00 00 00 00 00  ..........=.....
     0000009a1ebffa20 90 02 2f 1d 42 02 00 00 fe ff ff ff ff ff ff ff  ../.B...........
     0000009a1ebffa30 70 8d 41 1d 42 02 00 00 68 91 41 1d 42 02 00 00  p.A.B...h.A.B...
     0000009a1ebffa40 88 02 2f 1d 42 02 00 00 00 00 00 00 00 00 00 00  ../.B...........
     0000009a1ebffa50 90 fa bf 1e 9a 00 00 00 eb 68 13 a1 f6 7f 00 00  .........h......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x8d68eb
    rsp = 0x0000009a1ebffa60   rip = 0x00007ff6a11368eb
    Found by: stack scanning

    Stack contents:
     0000009a1ebffa60 78 ab 09 24 42 02 00 00 50 ab 09 24 42 02 00 00  x..$B...P..$B...
     0000009a1ebffa70 70 8d 41 1d 42 02 00 00 68 91 41 1d 42 02 00 00  p.A.B...h.A.B...
     0000009a1ebffa80 50 ab 09 24 42 02 00 00 43 a5 fb a1 f6 7f 00 00  P..$B...C.......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x175a543
    rsp = 0x0000009a1ebffa90   rip = 0x00007ff6a1fba543
    Found by: stack scanning

    Stack contents:
     0000009a1ebffa90 fe ff ff ff ff ff ff ff 60 aa 09 24 42 02 00 00  ........`..$B...
     0000009a1ebffaa0 30 fb bf 1e 9a 00 00 00 8f a6 b5 a1 f6 7f 00 00  0...............
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x12fa68f
    rsp = 0x0000009a1ebffab0   rip = 0x00007ff6a1b5a68f
    Found by: stack scanning

    Stack contents:
     0000009a1ebffab0 fe ff ff ff ff ff ff ff 70 8d 41 1d 42 02 00 00  ........p.A.B...
     0000009a1ebffac0 68 91 41 1d 42 02 00 00 c0 0a 2f 1d 42 02 00 00  h.A.B...../.B...
     0000009a1ebffad0 c0 0a 2f 1d 42 02 00 00 3d 34 f2 a1 f6 7f 00 00  ../.B...=4......
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x16c343d
    rsp = 0x0000009a1ebffae0   rip = 0x00007ff6a1f2343d
    Found by: stack scanning

    Stack contents:
     0000009a1ebffae0 9b e4 a5 ff 01 00 00 00 70 b8 c2 21 42 02 00 00  ........p..!B...
     0000009a1ebffaf0 a8 fb bf 1e 9a 00 00 00 b2 40 f2 a1 f6 7f 00 00  .........@......
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x16c40b2
    rsp = 0x0000009a1ebffb00   rip = 0x00007ff6a1f240b2
    Found by: stack scanning

    Stack contents:
     0000009a1ebffb00 70 b8 c2 21 42 02 00 00 7d 75 00 00 00 00 00 00  p..!B...}u......
     0000009a1ebffb10 95 77 00 00 00 00 00 00 70 8d 41 1d 42 02 00 00  .w......p.A.B...
     0000009a1ebffb20 02 00 00 00 00 00 00 00 a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1ebffb30 fe ff ff ff ff ff ff ff a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1ebffb40 68 91 41 1d 42 02 00 00 c0 0a 2f 1d 42 02 00 00  h.A.B...../.B...
     0000009a1ebffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffb70 d0 fb bf 1e 9a 00 00 00 c8 31 f2 a1 f6 7f 00 00  .........1......
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x16c31c8
    rsp = 0x0000009a1ebffb80   rip = 0x00007ff6a1f231c8
    Found by: stack scanning

    Stack contents:
     0000009a1ebffb80 d0 c9 b9 21 42 02 00 00 b1 47 f5 86 fa 7f 00 00  ...!B....G......
    Possible instruction pointers:

22  ntdll.dll + 0x247b1
    rsp = 0x0000009a1ebffb90   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1ebffb90 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1ebffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffbb0 01 00 00 00 00 00 00 00 70 b8 c2 21 42 02 00 00  ........p..!B...
     0000009a1ebffbc0 01 00 00 00 00 00 00 00 f0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1ebffbd0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1ebffbe0 28 90 41 1d 42 02 00 00 c0 0a 2f 1d 42 02 00 00  (.A.B...../.B...
     0000009a1ebffbf0 00 00 00 00 00 00 00 00 ae 3d f2 a1 f6 7f 00 00  .........=......
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x16c3dae
    rsp = 0x0000009a1ebffc00   rip = 0x00007ff6a1f23dae
    Found by: stack scanning

    Stack contents:
     0000009a1ebffc00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffc10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffc20 00 00 00 00 00 00 00 00 28 90 41 1d 42 02 00 00  ........(.A.B...
     0000009a1ebffc30 70 8d 41 1d 42 02 00 00 21 6d 13 a1 f6 7f 00 00  p.A.B...!m......
    Possible instruction pointers:

24  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1ebffc40   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1ebffc40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffc50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffc60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffc70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffc80 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

25  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1ebffc90   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1ebffc90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffca0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ebffcb0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

26  ntdll.dll + 0x526a1
    rsp = 0x0000009a1ebffcc0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 55
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1ecff5f0
    rcx = 0x00000242227a0d40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0d40
    rbp = 0x0000009a1ecff5a0   rsp = 0x0000009a1ecff548
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a0d40   r11 = 0x00000242227a0d48
    r12 = 0x0000009a1ecff5f0   r13 = 0x0000000000000000
    r14 = 0x0000009a1ecff570   r15 = 0x00000242227a0d48
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1ecff548 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1ecff5f0
    rcx = 0x00000242227a0d40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a0d40
    rbp = 0x0000009a1ecff5a0   rsp = 0x0000009a1ecff550
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a0d40   r11 = 0x00000242227a0d48
    r12 = 0x0000009a1ecff5f0   r13 = 0x0000000000000000
    r14 = 0x0000009a1ecff570   r15 = 0x00000242227a0d48
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1ecff550 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff560 78 6f 79 0f 42 02 00 00 00 00 00 00 00 00 00 00  xoy.B...........
     0000009a1ecff570 00 00 00 00 00 00 00 00 70 f5 cf 1e 9a 00 00 00  ........p.......
     0000009a1ecff580 00 00 00 00 00 00 00 00 cc 0c 00 00 00 00 00 00  ................
     0000009a1ecff590 80 96 98 00 01 00 00 00 40 0d 7a 22 42 02 00 00  ........@.z"B...
     0000009a1ecff5a0 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1ecff5b0   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1ecff5b0 00 00 00 00 00 00 00 00 40 0d 7a 22 42 02 00 00  ........@.z"B...
     0000009a1ecff5c0 50 f6 cf 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  P.......i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1ecff5d0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1ecff5d0 00 00 00 00 00 00 00 00 48 0d 7a 22 42 02 00 00  ........H.z"B...
     0000009a1ecff5e0 38 f6 cf 1e 9a 00 00 00 0b 16 f2 a1 f6 7f 00 00  8...............
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x16c160b
    rsp = 0x0000009a1ecff5f0   rip = 0x00007ff6a1f2160b
    Found by: stack scanning

    Stack contents:
     0000009a1ecff5f0 90 ff 16 ff ff ff ff ff 38 f6 cf 1e 9a 00 00 00  ........8.......
     0000009a1ecff600 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 5  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1ecff610   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1ecff610 00 00 00 00 9a 00 00 00 70 6f 79 0f 42 02 00 00  ........poy.B...
     0000009a1ecff620 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1ecff630 00 00 00 00 00 00 00 00 71 2e a9 c4 92 01 00 00  ........q.......
     0000009a1ecff640 40 0d 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1ecff650 78 6f 79 0f 42 02 00 00 71 2e a9 c4 92 01 00 00  xoy.B...q.......
     0000009a1ecff660 00 0d 7a 22 42 02 00 00 71 2e a9 c4 92 01 00 00  ..z"B...q.......
     0000009a1ecff670 08 f7 cf 1e 9a 00 00 00 00 68 2e 6a fa 7f 00 00  .........h.j....
    Possible instruction pointers:

 6  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1ecff680   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1ecff680 f0 f7 cf 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  .........p'j....
    Possible instruction pointers:

 7  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1ecff690   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1ecff690 f0 f7 cf 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1ecff6a0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1ecff6a0 70 6f 79 0f 42 02 00 00 71 2e a9 c4 92 01 00 00  poy.B...q.......
     0000009a1ecff6b0 40 f8 cf 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  @.......P"*j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1ecff6c0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1ecff6c0 70 6f 79 0f 42 02 00 00 2e 2f 27 6a fa 7f 00 00  poy.B..../'j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1ecff6d0   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1ecff6d0 78 f7 cf 1e 9a 00 00 00 ad 42 13 a1 f6 7f 00 00  x........B......
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x8d42ad
    rsp = 0x0000009a1ecff6e0   rip = 0x00007ff6a11342ad
    Found by: stack scanning

    Stack contents:
     0000009a1ecff6e0 21 00 00 00 00 00 00 00 63 83 8c 0e 03 00 00 00  !.......c.......
     0000009a1ecff6f0 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff700 00 08 7a 22 42 02 00 00 bf 32 1a 6a fa 7f 00 00  ..z"B....2.j....
    Possible instruction pointers:

12  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1ecff710   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1ecff710 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

13  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1ecff720   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1ecff720 00 00 00 00 00 00 00 00 71 2e a9 c4 92 01 00 00  ........q.......
     0000009a1ecff730 70 6f 79 0f 42 02 00 00 00 0d 7a 22 42 02 00 00  poy.B.....z"B...
     0000009a1ecff740 00 00 00 00 00 00 00 00 96 1a 69 b3 0f 01 00 00  ..........i.....
     0000009a1ecff750 00 00 00 00 00 00 00 00 58 1b 2f 1d 42 02 00 00  ........X./.B...
     0000009a1ecff760 f0 f7 cf 1e 9a 00 00 00 ff ff ff ff ff ff ff 7f  ................
     0000009a1ecff770 0f 02 00 00 00 00 00 00 a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1ecff780 40 f8 cf 1e 9a 00 00 00 d8 ee 41 1d 42 02 00 00  @.........A.B...
     0000009a1ecff790 38 f8 cf 1e 9a 00 00 00 72 3b f2 a1 f6 7f 00 00  8.......r;......
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x16c3b72
    rsp = 0x0000009a1ecff7a0   rip = 0x00007ff6a1f23b72
    Found by: stack scanning

    Stack contents:
     0000009a1ecff7a0 17 7f 8c 0e 00 00 00 00 e8 f7 cf 1e 9a 00 00 00  ................
     0000009a1ecff7b0 38 f8 cf 1e 9a 00 00 00 43 9e 10 a1 f6 7f 00 00  8.......C.......
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x8a9e43
    rsp = 0x0000009a1ecff7c0   rip = 0x00007ff6a1109e43
    Found by: stack scanning

    Stack contents:
     0000009a1ecff7c0 00 00 00 00 00 00 00 00 71 2e a9 c4 92 01 00 00  ........q.......
     0000009a1ecff7d0 38 72 00 00 01 00 00 00 00 00 00 00 00 87 a5 7d  8r.............}
     0000009a1ecff7e0 70 6f 79 0f 42 02 00 00 fe ff ff ff ff ff ff ff  poy.B...........
     0000009a1ecff7f0 58 1b 2f 1d 42 02 00 00 40 1b 2f 1d 42 02 00 00  X./.B...@./.B...
     0000009a1ecff800 60 f8 cf 1e 9a 00 00 00 af 36 f2 a1 f6 7f 00 00  `........6......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x16c36af
    rsp = 0x0000009a1ecff810   rip = 0x00007ff6a1f236af
    Found by: stack scanning

    Stack contents:
     0000009a1ecff810 ca 3d 3f 00 02 00 00 00 50 0f c3 21 42 02 00 00  .=?.....P..!B...
     0000009a1ecff820 d8 f8 cf 1e 9a 00 00 00 b2 40 f2 a1 f6 7f 00 00  .........@......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x16c40b2
    rsp = 0x0000009a1ecff830   rip = 0x00007ff6a1f240b2
    Found by: stack scanning

    Stack contents:
     0000009a1ecff830 50 0f c3 21 42 02 00 00 dc 81 00 00 00 00 00 00  P..!B...........
     0000009a1ecff840 d3 87 00 00 00 00 00 00 50 ec 41 1d 42 02 00 00  ........P.A.B...
     0000009a1ecff850 d8 6e 79 0f 42 02 00 00 e8 22 b4 18 c8 00 00 00  .ny.B...."......
     0000009a1ecff860 fe ff ff ff ff ff ff ff a0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1ecff870 48 f0 41 1d 42 02 00 00 40 1b 2f 1d 42 02 00 00  H.A.B...@./.B...
     0000009a1ecff880 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff8a0 00 f9 cf 1e 9a 00 00 00 c8 31 f2 a1 f6 7f 00 00  .........1......
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x16c31c8
    rsp = 0x0000009a1ecff8b0   rip = 0x00007ff6a1f231c8
    Found by: stack scanning

    Stack contents:
     0000009a1ecff8b0 30 cd b9 21 42 02 00 00 b1 47 f5 86 fa 7f 00 00  0..!B....G......
    Possible instruction pointers:

19  ntdll.dll + 0x247b1
    rsp = 0x0000009a1ecff8c0   rip = 0x00007ffa86f547b1
    Found by: stack scanning

    Stack contents:
     0000009a1ecff8c0 00 00 00 00 00 00 00 00 00 00 96 7f 42 02 00 00  ............B...
     0000009a1ecff8d0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1ecff8e0 01 00 00 00 00 00 00 00 50 0f c3 21 42 02 00 00  ........P..!B...
     0000009a1ecff8f0 01 00 00 00 00 00 00 00 f0 6e 79 0f 42 02 00 00  .........ny.B...
     0000009a1ecff900 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1ecff910 08 ef 41 1d 42 02 00 00 40 1b 2f 1d 42 02 00 00  ..A.B...@./.B...
     0000009a1ecff920 00 00 00 00 00 00 00 00 ae 3d f2 a1 f6 7f 00 00  .........=......
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x16c3dae
    rsp = 0x0000009a1ecff930   rip = 0x00007ff6a1f23dae
    Found by: stack scanning

    Stack contents:
     0000009a1ecff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff950 00 00 00 00 00 00 00 00 08 ef 41 1d 42 02 00 00  ..........A.B...
     0000009a1ecff960 50 ec 41 1d 42 02 00 00 21 6d 13 a1 f6 7f 00 00  P.A.B...!m......
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1ecff970   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1ecff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff9a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff9b0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

22  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1ecff9c0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1ecff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff9d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1ecff9e0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

23  ntdll.dll + 0x526a1
    rsp = 0x0000009a1ecff9f0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 56
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1edff610
    rcx = 0x00000242227a1040   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1040
    rbp = 0x0000009a1edff5c0   rsp = 0x0000009a1edff568
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a1040   r11 = 0x00000242227a1048
    r12 = 0x0000009a1edff610   r13 = 0x0000000000000000
    r14 = 0x0000009a1edff590   r15 = 0x00000242227a1048
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1edff568 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1edff610
    rcx = 0x00000242227a1040   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1040
    rbp = 0x0000009a1edff5c0   rsp = 0x0000009a1edff570
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a1040   r11 = 0x00000242227a1048
    r12 = 0x0000009a1edff610   r13 = 0x0000000000000000
    r14 = 0x0000009a1edff590   r15 = 0x00000242227a1048
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1edff570 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff580 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 2  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1edff5c0   rsp = 0x0000009a1edff588
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1edff588 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 3  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1edff5c0   rsp = 0x0000009a1edff590
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1edff590 00 00 00 00 00 00 00 00 90 f5 df 1e 9a 00 00 00  ................
     0000009a1edff5a0 00 00 00 00 00 00 00 00 ec 1f 00 00 00 00 00 00  ................
     0000009a1edff5b0 80 96 98 00 01 00 00 00 40 10 7a 22 42 02 00 00  ........@.z"B...
     0000009a1edff5c0 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 4  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1edff5d0   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1edff5d0 00 00 00 00 00 00 00 00 40 10 7a 22 42 02 00 00  ........@.z"B...
     0000009a1edff5e0 70 f6 df 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  p.......i.......
    Possible instruction pointers:

 5  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1edff5f0   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1edff5f0 00 00 00 00 00 00 00 00 48 10 7a 22 42 02 00 00  ........H.z"B...
     0000009a1edff600 58 f6 df 1e 9a 00 00 00 00 00 00 00 00 00 00 00  X...............
     0000009a1edff610 80 69 67 ff ff ff ff ff 58 f6 df 1e 9a 00 00 00  .ig.....X.......
     0000009a1edff620 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 6  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1edff630   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1edff630 00 00 00 00 9a 00 00 00 10 fd b4 21 42 02 00 00  ...........!B...
     0000009a1edff640 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1edff650 00 00 00 00 00 00 00 00 39 cb 84 7f 92 01 00 00  ........9.......
     0000009a1edff660 40 10 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1edff670 18 fd b4 21 42 02 00 00 39 cb 84 7f 92 01 00 00  ...!B...9.......
     0000009a1edff680 00 10 7a 22 42 02 00 00 39 cb 84 7f 92 01 00 00  ..z"B...9.......
     0000009a1edff690 28 f7 df 1e 9a 00 00 00 00 68 2e 6a fa 7f 00 00  (........h.j....
    Possible instruction pointers:

 7  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1edff6a0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1edff6a0 40 f8 df 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  @........p'j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1edff6b0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1edff6b0 40 f8 df 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  @.......P"*j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1edff6c0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1edff6c0 10 fd b4 21 42 02 00 00 39 cb 84 7f 92 01 00 00  ...!B...9.......
     0000009a1edff6d0 91 d6 19 5c 00 00 00 00 50 22 2a 6a fa 7f 00 00  ...\....P"*j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1edff6e0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1edff6e0 10 fd b4 21 42 02 00 00 2e 2f 27 6a fa 7f 00 00  ...!B..../'j....
    Possible instruction pointers:

11  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1edff6f0   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1edff6f0 3d 5b 94 e5 38 85 c3 f1 64 92 c0 48 b4 a6 9a ad  =[..8...d..H....
     0000009a1edff700 cc f8 df 1e 9a 00 00 00 cf f7 53 e3 a5 9b c4 20  ..........S.... 
     0000009a1edff710 38 e6 41 1d 42 02 00 00 10 fd b4 21 42 02 00 00  8.A.B......!B...
     0000009a1edff720 00 00 00 00 00 00 00 00 bf 32 1a 6a fa 7f 00 00  .........2.j....
    Possible instruction pointers:

12  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1edff730   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1edff730 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

13  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1edff740   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1edff740 00 00 00 00 00 00 00 00 39 cb 84 7f 92 01 00 00  ........9.......
     0000009a1edff750 10 fd b4 21 42 02 00 00 00 10 7a 22 42 02 00 00  ...!B.....z"B...
     0000009a1edff760 00 00 00 00 00 00 00 00 74 64 35 af 0f 01 00 00  ........td5.....
     0000009a1edff770 00 00 00 00 00 00 00 00 f8 f7 df 1e 9a 00 00 00  ................
     0000009a1edff780 40 f8 df 1e 9a 00 00 00 18 fd b4 21 42 02 00 00  @..........!B...
     0000009a1edff790 01 f8 df 1e 9a 00 00 00 90 d6 19 5c 00 00 00 00  ...........\....
     0000009a1edff7a0 91 d6 19 5c 00 00 00 00 28 f8 df 1e 9a 00 00 00  ...\....(.......
     0000009a1edff7b0 a5 86 fb 69 00 00 00 00 55 2d f2 a1 f6 7f 00 00  ...i....U-......
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x16c2d55
    rsp = 0x0000009a1edff7c0   rip = 0x00007ff6a1f22d55
    Found by: stack scanning

    Stack contents:
     0000009a1edff7c0 48 f8 df 1e 9a 00 00 00 43 9e 10 a1 f6 7f 00 00  H.......C.......
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x8a9e43
    rsp = 0x0000009a1edff7d0   rip = 0x00007ff6a1109e43
    Found by: stack scanning

    Stack contents:
     0000009a1edff7d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff7e0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1edff7f0 00 00 00 00 00 00 00 00 39 cb 84 7f 92 01 00 00  ........9.......
     0000009a1edff800 00 00 00 00 00 00 00 00 a5 86 fb 69 00 00 00 00  ...........i....
     0000009a1edff810 90 d6 19 5c 9a 00 00 00 a4 86 fb 69 00 00 00 00  ...\.......i....
     0000009a1edff820 90 d6 19 5c 00 00 00 00 01 00 00 00 00 00 00 00  ...\............
     0000009a1edff830 00 00 00 00 9a 00 00 00 10 fd b4 21 42 02 00 00  ...........!B...
     0000009a1edff840 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff 7f  ................
     0000009a1edff850 88 6f 79 0f 42 02 00 00 80 6f 79 0f 42 02 00 00  .oy.B....oy.B...
     0000009a1edff860 10 fd b4 21 42 02 00 00 38 e6 41 1d 42 02 00 00  ...!B...8.A.B...
     0000009a1edff870 cf f7 53 e3 a5 9b c4 20 cc f8 df 1e 9a 00 00 00  ..S.... ........
     0000009a1edff880 e0 f8 df 1e 9a 00 00 00 da 2a f2 a1 f6 7f 00 00  .........*......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x16c2ada
    rsp = 0x0000009a1edff890   rip = 0x00007ff6a1f22ada
    Found by: stack scanning

    Stack contents:
     0000009a1edff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff8b0 01 00 00 00 00 00 00 00 a7 81 00 00 00 00 00 00  ................
     0000009a1edff8c0 8f 85 00 00 00 00 00 00 c0 c7 b9 21 01 00 00 00  ...........!....
     0000009a1edff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff8e0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1edff8f0 68 e6 41 1d 42 02 00 00 b0 e3 41 1d 42 02 00 00  h.A.B.....A.B...
     0000009a1edff900 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff910 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff920 00 00 00 00 00 00 00 00 21 6d 13 a1 f6 7f 00 00  ........!m......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1edff930   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1edff930 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff940 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff970 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

18  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1edff980   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1edff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1edff9a0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

19  ntdll.dll + 0x526a1
    rsp = 0x0000009a1edff9b0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 57
 0  ntdll.dll + 0x9d1e4
    rax = 0x0000000000000009   rdx = 0x0000009a1eeff740
    rcx = 0x0000000000000c98   rbx = 0x0000009a1eeff750
    rsi = 0x00000000000003e9   rdi = 0x0000009a1eeff73c
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff6a8
     r8 = 0x0000009a1eeff8f8    r9 = 0x00007ffa86e4b570
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x00007ff6a4875498   r13 = 0x00000000000085b4
    r14 = 0x0000024212e5c400   r15 = 0x00000000000085b4
    rip = 0x00007ffa86fcd1e4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1eeff6a8 5f f3 ce 84 fa 7f 00 00                          _.......        
    Possible instruction pointers:

 1  KERNELBASE.dll + 0x5f35f
    rax = 0x0000000000000009   rdx = 0x0000009a1eeff740
    rcx = 0x0000000000000c98   rbx = 0x0000009a1eeff750
    rsi = 0x00000000000003e9   rdi = 0x0000009a1eeff73c
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff6b0
     r8 = 0x0000009a1eeff8f8    r9 = 0x00007ffa86e4b570
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x00007ff6a4875498   r13 = 0x00000000000085b4
    r14 = 0x0000024212e5c400   r15 = 0x00000000000085b4
    rip = 0x00007ffa84cef35f
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1eeff6b0 f3 65 93 0d 00 00 00 00 20 f9 ef 1e 9a 00 00 00  .e...... .......
     0000009a1eeff6c0 40 f7 ef 1e 9a 00 00 00 9c 8f 10 a1 f6 7f 00 00  @...............
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x8a8f9c
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff6d0
    rip = 0x00007ff6a1108f9c
    Found by: stack scanning

    Stack contents:
     0000009a1eeff6d0 e0 f6 ef 1e 9a 00 00 00 ad 42 13 a1 f6 7f 00 00  .........B......
    Possible instruction pointers:

 3  qemu-system-x86_64.exe + 0x8d42ad
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff6e0
    rip = 0x00007ff6a11342ad
    Found by: stack scanning

    Stack contents:
     0000009a1eeff6e0 70 42 67 ff ff ff ff ff 00 00 00 00 00 00 00 00  pBg.............
     0000009a1eeff6f0 cb 81 00 00 00 00 00 00 00 00 00 00 00 00 00 80  ................
     0000009a1eeff700 e9 03 00 00 00 00 00 00 a4 ce 86 a1 f6 7f 00 00  ................
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x100cea4
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff710
    rip = 0x00007ff6a186cea4
    Found by: stack scanning

    Stack contents:
     0000009a1eeff710 d0 f7 ef 1e 9a 00 00 00 2e 43 13 a1 f6 7f 00 00  .........C......
    Possible instruction pointers:

 5  qemu-system-x86_64.exe + 0x8d432e
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff720
    rip = 0x00007ff6a113432e
    Found by: stack scanning

    Stack contents:
     0000009a1eeff720 21 00 00 00 00 00 00 00 40 59 73 07 03 00 00 00  !.......@Ys.....
     0000009a1eeff730 e9 03 00 00 00 00 00 00 b8 f7 ef 1e 00 00 00 00  ................
     0000009a1eeff740 cb 81 00 00 00 00 00 00 aa 9d d7 a0 00 00 00 00  ................
     0000009a1eeff750 d0 f7 ef 1e 9a 00 00 00 88 c3 e5 12 42 02 00 00  ............B...
     0000009a1eeff760 e8 f7 ef 1e 9a 00 00 00 80 f8 ef 1e 9a 00 00 00  ................
     0000009a1eeff770 01 00 00 00 00 00 00 00 d0 f7 ef 1e 9a 00 00 00  ................
     0000009a1eeff780 20 f9 ef 1e 9a 00 00 00 00 00 00 00 00 00 00 00   ...............
     0000009a1eeff790 d0 f9 ef 1e 9a 00 00 00 da ca 86 a1 f6 7f 00 00  ................
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x100cada
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff7a0
    rip = 0x00007ff6a186cada
    Found by: stack scanning

    Stack contents:
     0000009a1eeff7a0 de ed 18 00 00 00 00 00 44 7a 85 07 03 00 00 00  ........Dz......
     0000009a1eeff7b0 10 00 00 00 00 00 00 00 31 00 00 00 00 00 00 00  ........1.......
     0000009a1eeff7c0 54 56 93 0d 00 00 00 00 10 fa ef 1e 9a 00 00 00  TV..............
     0000009a1eeff7d0 00 00 00 00 00 00 00 00 00 00 00 00 9a 00 00 00  ................
     0000009a1eeff7e0 00 c4 e5 12 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1eeff7f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeff800 00 00 00 00 00 00 00 00 34 90 10 a1 f6 7f 00 00  ........4.......
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x8a9034
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff810
    rip = 0x00007ff6a1109034
    Found by: stack scanning

    Stack contents:
     0000009a1eeff810 b4 85 00 00 00 00 00 00 1a db 7d 84 fa 7f 00 00  ..........}.....
    Possible instruction pointers:

 8  ucrtbase.dll + 0x6db1a
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff820
    rip = 0x00007ffa847ddb1a
    Found by: stack scanning

    Stack contents:
     0000009a1eeff820 80 f8 ef 1e 9a 00 00 00 88 c3 e5 12 42 02 00 00  ............B...
     0000009a1eeff830 20 f9 ef 1e 9a 00 00 00 80 c2 e5 12 42 02 00 00   ...........B...
     0000009a1eeff840 d0 f9 ef 1e 9a 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1eeff850 b4 85 00 00 00 00 00 00 90 c3 e5 12 42 02 00 00  ............B...
     0000009a1eeff860 a8 f9 ef 1e 9a 00 00 00 f2 8c 11 a1 f6 7f 00 00  ................
    Possible instruction pointers:

 9  qemu-system-x86_64.exe + 0x8b8cf2
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff870
    rip = 0x00007ff6a1118cf2
    Found by: stack scanning

    Stack contents:
     0000009a1eeff870 fe ff ff ff ff ff ff ff 88 c3 e5 12 42 02 00 00  ............B...
     0000009a1eeff880 80 c2 e5 12 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1eeff890 00 00 00 00 00 00 00 00 58 32 d7 a0 f6 7f 00 00  ........X2......
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x513258
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff8a0
    rip = 0x00007ff6a0d73258
    Found by: stack scanning

    Stack contents:
     0000009a1eeff8a0 c8 fa ef 1e 9a 00 00 00 28 f9 ef 1e 9a 00 00 00  ........(.......
     0000009a1eeff8b0 00 00 00 00 00 00 00 00 1a db 7d 84 fa 7f 00 00  ..........}.....
    Possible instruction pointers:

11  ucrtbase.dll + 0x6db1a
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff8c0
    rip = 0x00007ffa847ddb1a
    Found by: stack scanning

    Stack contents:
     0000009a1eeff8c0 20 f9 ef 1e 9a 00 00 00 c8 fa ef 1e 9a 00 00 00   ...............
     0000009a1eeff8d0 d8 fa ef 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeff8e0 20 fa ef 1e 9a 00 00 00 b0 76 81 84 fa 7f 00 00   ........v......
    Possible instruction pointers:

12  ucrtbase.dll + 0xa76b0
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff8f0
    rip = 0x00007ffa848176b0
    Found by: stack scanning

    Stack contents:
     0000009a1eeff8f0 18 38 01 a3 f6 7f 00 00                          .8......        
    Possible instruction pointers:

13  qemu-system-x86_64.exe + 0x27b3818
    rbp = 0x0000009a1eeff920   rsp = 0x0000009a1eeff8f8
    rip = 0x00007ff6a3013818
    Found by: stack scanning

    Stack contents:
     0000009a1eeff8f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeff908 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeff918 00 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

14  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1eeff928   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1eeff928 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1eeff930   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1eeff930 cb 81 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1eeff940 00 00 00 00 00 00 00 00 68 f9 ef 1e 9a 00 00 00  ........h.......
     0000009a1eeff950 a5 86 fb 69 00 00 00 00 80 35 27 19 01 00 00 00  ...i.....5'.....
     0000009a1eeff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeff970 80 c2 e5 12 42 02 00 00 b4 85 00 00 00 00 00 00  ....B...........
     0000009a1eeff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeff990 01 fa ef 1e 9a 00 00 00 a9 43 13 a1 f6 7f 00 00  .........C......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x8d43a9
    rsp = 0x0000009a1eeff9a0   rip = 0x00007ff6a11343a9
    Found by: stack scanning

    Stack contents:
     0000009a1eeff9a0 28 ae 41 1d 42 02 00 00 01 00 00 00 00 00 00 00  (.A.B...........
     0000009a1eeff9b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeff9c0 00 00 00 00 00 00 00 00 b4 85 00 00 00 00 00 00  ................
     0000009a1eeff9d0 a4 86 fb 69 00 00 00 00 98 fa ef 1e 9a 00 00 00  ...i............
     0000009a1eeff9e0 fe ff ff ff ff ff ff ff d8 fa ef 1e 9a 00 00 00  ................
     0000009a1eeff9f0 e8 fa ef 1e 9a 00 00 00 98 fa ef 1e 9a 00 00 00  ................
     0000009a1eeffa00 b8 fa ef 1e 9a 00 00 00 a8 fa ef 1e 9a 00 00 00  ................
     0000009a1eeffa10 f8 fa ef 1e 9a 00 00 00 98 fa ef 1e 9a 00 00 00  ................
     0000009a1eeffa20 c8 fa ef 1e 9a 00 00 00 03 22 d7 a0 f6 7f 00 00  ........."......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x512203
    rsp = 0x0000009a1eeffa30   rip = 0x00007ff6a0d72203
    Found by: stack scanning

    Stack contents:
     0000009a1eeffa30 d8 fa ef 1e 9a 00 00 00 2e 43 13 a1 f6 7f 00 00  .........C......
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x8d432e
    rsp = 0x0000009a1eeffa40   rip = 0x00007ff6a113432e
    Found by: stack scanning

    Stack contents:
     0000009a1eeffa40 80 c2 e5 12 42 02 00 00 b8 fa ef 1e 9a 00 00 00  ....B...........
     0000009a1eeffa50 a5 86 fb 69 00 00 00 00 80 35 27 19 01 00 00 00  ...i.....5'.....
     0000009a1eeffa60 80 c2 e5 12 42 02 00 00 25 c8 4f a1 f6 7f 00 00  ....B...%.O.....
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0xc9c825
    rsp = 0x0000009a1eeffa70   rip = 0x00007ff6a14fc825
    Found by: stack scanning

    Stack contents:
     0000009a1eeffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffa90 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1eeffaa0 00 00 00 00 00 00 00 00 a4 86 fb 69 00 00 00 00  ...........i....
     0000009a1eeffab0 40 12 22 13 01 00 00 00 00 00 00 00 00 00 00 00  @.".............
     0000009a1eeffac0 00 e1 f5 05 03 00 00 00 a4 86 fb 69 00 00 00 00  ...........i....
     0000009a1eeffad0 40 f3 17 19 01 00 00 00 a4 86 fb 69 00 00 00 00  @..........i....
     0000009a1eeffae0 80 35 27 19 01 00 00 00 01 00 00 00 00 00 00 00  .5'.............
     0000009a1eeffaf0 00 00 00 00 03 00 00 00 a5 86 fb 69 00 00 00 00  ...........i....
     0000009a1eeffb00 80 35 27 19 01 00 00 00 00 00 00 00 00 00 00 00  .5'.............
     0000009a1eeffb10 00 00 00 00 00 00 00 00 58 ae 41 1d 42 02 00 00  ........X.A.B...
     0000009a1eeffb20 a0 ab 41 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..A.B...........
     0000009a1eeffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffb40 00 00 00 00 00 00 00 00 21 6d 13 a1 f6 7f 00 00  ........!m......
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1eeffb50   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1eeffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffb70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffb90 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

21  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1eeffba0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1eeffba0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffbb0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1eeffbc0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

22  ntdll.dll + 0x526a1
    rsp = 0x0000009a1eeffbd0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 58
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1efff230
    rcx = 0x00000242227a1240   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1240
    rbp = 0x0000009a1efff1e0   rsp = 0x0000009a1efff188
     r8 = 0x0000024212e5c3d8    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000009a1efff230   r13 = 0x0000000000000000
    r14 = 0x0000009a1efff1b0   r15 = 0x00000242227a1248
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1efff188 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1efff230
    rcx = 0x00000242227a1240   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1240
    rbp = 0x0000009a1efff1e0   rsp = 0x0000009a1efff190
     r8 = 0x0000024212e5c3d8    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000246
    r12 = 0x0000009a1efff230   r13 = 0x0000000000000000
    r14 = 0x0000009a1efff1b0   r15 = 0x00000242227a1248
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1efff190 90 f2 ff 1e 9a 00 00 00 ff ff ff ff 00 00 00 00  ................
     0000009a1efff1a0 cd bd aa 97 f7 0c ad 18 3e 34 1a 6a fa 7f 00 00  ........>4.j....
    Possible instruction pointers:

 2  MSVCP140.dll + 0x1343e
    rbp = 0x0000009a1efff1e0   rsp = 0x0000009a1efff1b0
    rip = 0x00007ffa6a1a343e
    Found by: stack scanning

    Stack contents:
     0000009a1efff1b0 00 00 00 00 00 00 00 00 b0 f1 ff 1e 9a 00 00 00  ................
     0000009a1efff1c0 00 00 00 00 00 00 00 00 74 0b 00 00 00 00 00 00  ........t.......
     0000009a1efff1d0 d8 f3 ff 1e 01 00 00 00 40 12 7a 22 42 02 00 00  ........@.z"B...
     0000009a1efff1e0 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1efff1f0   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1efff1f0 00 00 00 00 00 00 00 00 40 12 7a 22 42 02 00 00  ........@.z"B...
     0000009a1efff200 90 f2 ff 1e 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 4  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1efff210   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1efff210 00 00 00 00 00 00 00 00 48 12 7a 22 42 02 00 00  ........H.z"B...
     0000009a1efff220 78 f2 ff 1e 9a 00 00 00 5b 75 86 25 85 dd dc 01  x.......[u.%....
     0000009a1efff230 80 69 67 ff ff ff ff ff 78 f2 ff 1e 9a 00 00 00  .ig.....x.......
     0000009a1efff240 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 5  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1efff250   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1efff250 00 00 00 00 9a 00 00 00 98 54 87 a4 f6 7f 00 00  .........T......
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x4015498
    rsp = 0x0000009a1efff260   rip = 0x00007ff6a4875498
    Found by: stack scanning

    Stack contents:
     0000009a1efff260 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1efff270 00 00 00 00 00 00 00 00 9a 7b 55 2f ef 19 5a 31  .........{U/..Z1
     0000009a1efff280 40 12 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1efff290 10 f5 ff 1e 9a 00 00 00 9a 7b 55 2f ef 19 5a 31  .........{U/..Z1
     0000009a1efff2a0 00 12 7a 22 42 02 00 00 9a 7b 55 2f ef 19 5a 31  ..z"B....{U/..Z1
     0000009a1efff2b0 48 f3 ff 1e 9a 00 00 00 00 68 2e 6a fa 7f 00 00  H........h.j....
    Possible instruction pointers:

 7  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1efff2c0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1efff2c0 60 f6 ff 1e 9a 00 00 00 ba 70 27 6a fa 7f 00 00  `........p'j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1efff2d0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1efff2d0 60 f6 ff 1e 9a 00 00 00 50 22 2a 6a fa 7f 00 00  `.......P"*j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1efff2e0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1efff2e0 98 54 87 a4 f6 7f 00 00                          .T......        
    Possible instruction pointers:

10  qemu-system-x86_64.exe + 0x4015498
    rsp = 0x0000009a1efff2e8   rip = 0x00007ff6a4875498
    Found by: stack scanning

    Stack contents:
     0000009a1efff2e8 9a 7b 55 2f ef 19 5a 31 10 f5 ff 1e 9a 00 00 00  .{U/..Z1........
     0000009a1efff2f8 50 22 2a 6a fa 7f 00 00                          P"*j....        
    Possible instruction pointers:

11  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1efff300   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1efff300 98 54 87 a4 f6 7f 00 00                          .T......        
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0x4015498
    rsp = 0x0000009a1efff308   rip = 0x00007ff6a4875498
    Found by: stack scanning

    Stack contents:
     0000009a1efff308 2e 2f 27 6a fa 7f 00 00                          ./'j....        
    Possible instruction pointers:

13  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1efff310   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1efff310 d8 f3 ff 1e 9a 00 00 00 c0 f4 ff 1e 9a 00 00 00  ................
     0000009a1efff320 a4 86 fb 69 00 00 00 00 00 00 00 00 34 2f aa 64  ...i........4/.d
     0000009a1efff330 a5 86 fb 69 00 00 00 00 00 00 00 00 f6 7f 00 00  ...i............
     0000009a1efff340 00 00 00 00 00 00 00 00 34 2f aa 64 85 dd dc 01  ........4/.d....
     0000009a1efff350 a5 86 fb 69 00 00 00 00 50 22 2a 6a fa 7f 00 00  ...i....P"*j....
    Possible instruction pointers:

14  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1efff360   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1efff360 00 00 00 00 00 00 00 00 9a 7b 55 2f ef 19 5a 31  .........{U/..Z1
     0000009a1efff370 98 54 87 a4 f6 7f 00 00                          .T......        
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x4015498
    rsp = 0x0000009a1efff378   rip = 0x00007ff6a4875498
    Found by: stack scanning

    Stack contents:
     0000009a1efff378 00 12 7a 22 42 02 00 00 00 00 00 00 00 00 00 00  ..z"B...........
     0000009a1efff388 3c 2e 1e b2 0f 01 00 00 00 ff ff ff ff ff ff ff  <...............
     0000009a1efff398 58 f5 ff 1e 9a 00 00 00 60 f6 ff 1e 9a 00 00 00  X.......`.......
     0000009a1efff3a8 10 f5 ff 1e 9a 00 00 00 98 54 87 a4 f6 7f 00 00  .........T......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x4015498
    rsp = 0x0000009a1efff3b8   rip = 0x00007ff6a4875498
    Found by: stack scanning

    Stack contents:
     0000009a1efff3b8 98 54 87 a4 f6 7f 00 00                          .T......        
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x4015498
    rsp = 0x0000009a1efff3c0   rip = 0x00007ff6a4875498
    Found by: stack scanning

    Stack contents:
     0000009a1efff3c0 10 f5 ff 1e 9a 00 00 00 a8 f4 ff 1e 9a 00 00 00  ................
     0000009a1efff3d0 58 f5 ff 1e 9a 00 00 00 e3 e7 0b a1 f6 7f 00 00  X...............
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x85e7e3
    rsp = 0x0000009a1efff3e0   rip = 0x00007ff6a10be7e3
    Found by: stack scanning

    Stack contents:
     0000009a1efff3e0 80 35 27 19 01 00 00 00 30 29 27 6a fa 7f 00 00  .5'.....0)'j....
    Possible instruction pointers:

19  libabseil_dll.dll + 0x52930
    rsp = 0x0000009a1efff3f0   rip = 0x00007ffa6a272930
    Found by: stack scanning

    Stack contents:
     0000009a1efff3f0 02 01 00 00 00 00 00 00 60 f6 ff 1e 9a 00 00 00  ........`.......
     0000009a1efff400 a5 86 fb 69 00 00 00 00 34 2f aa 64 9a 00 00 00  ...i....4/.d....
     0000009a1efff410 9a 7b 55 2f ef 19 5a 31 01 00 00 00 00 00 00 00  .{U/..Z1........
     0000009a1efff420 58 f5 ff 1e 9a 00 00 00 a5 86 fb 69 00 00 00 00  X..........i....
     0000009a1efff430 34 2f aa 64 9a 00 00 00 00 68 2e 6a fa 7f 00 00  4/.d.....h.j....
    Possible instruction pointers:

20  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1efff440   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1efff440 a5 86 fb 69 00 00 00 00 cd 8b 2a 19 01 00 00 00  ...i......*.....
     0000009a1efff450 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff460 22 00 00 00 00 00 00 00 00 01 97 0d 03 00 00 00  "...............
     0000009a1efff470 a5 86 fb 69 00 00 00 00 cd 8b 2a 19 01 00 00 00  ...i......*.....
     0000009a1efff480 83 86 fb 69 00 00 00 00 cd 8a 93 0b 01 00 00 00  ...i............
     0000009a1efff490 10 f5 ff 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff4a0 58 f5 ff 1e 9a 00 00 00 ff ff ff ff ff ff ff 7f  X...............
     0000009a1efff4b0 00 00 00 00 01 00 00 00 10 f5 ff 1e 9a 00 00 00  ................
     0000009a1efff4c0 00 00 00 00 00 00 00 00 10 f7 ff 1e 9a 00 00 00  ................
     0000009a1efff4d0 50 f5 ff 1e 9a 00 00 00 8f ca 86 a1 f6 7f 00 00  P...............
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x100ca8f
    rsp = 0x0000009a1efff4e0   rip = 0x00007ff6a186ca8f
    Found by: stack scanning

    Stack contents:
     0000009a1efff4e0 de ed 18 00 00 00 00 00 77 50 85 07 03 00 00 00  ........wP......
     0000009a1efff4f0 10 00 00 00 00 00 00 00 31 00 00 00 00 00 00 00  ........1.......
     0000009a1efff500 0f a4 93 0d 00 00 00 00 50 f7 ff 1e 9a 00 00 00  ........P.......
     0000009a1efff510 00 12 7a 22 42 02 00 00 00 00 00 00 9a 00 00 00  ..z"B...........
     0000009a1efff520 00 c4 e5 12 42 02 00 00 10 c4 e5 12 42 02 00 00  ....B.......B...
     0000009a1efff530 10 c4 e5 12 42 02 00 00 a8 54 87 a4 f6 7f 00 00  ....B....T......
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0x40154a8
    rsp = 0x0000009a1efff540   rip = 0x00007ff6a48754a8
    Found by: stack scanning

    Stack contents:
     0000009a1efff540 a8 54 87 a4 f6 7f 00 00                          .T......        
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x40154a8
    rsp = 0x0000009a1efff548   rip = 0x00007ff6a48754a8
    Found by: stack scanning

    Stack contents:
     0000009a1efff548 34 90 10 a1 f6 7f 00 00                          4.......        
    Possible instruction pointers:

24  qemu-system-x86_64.exe + 0x8a9034
    rsp = 0x0000009a1efff550   rip = 0x00007ff6a1109034
    Found by: stack scanning

    Stack contents:
     0000009a1efff550 b4 85 00 00 00 00 00 00 a5 86 fb 69 00 00 00 00  ...........i....
     0000009a1efff560 cd 8b 2a 19 01 00 00 00 88 c3 e5 12 42 02 00 00  ..*.........B...
     0000009a1efff570 60 f6 ff 1e 9a 00 00 00 80 c2 e5 12 42 02 00 00  `...........B...
     0000009a1efff580 10 f7 ff 1e 9a 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1efff590 b4 85 00 00 00 00 00 00 90 c3 e5 12 42 02 00 00  ............B...
     0000009a1efff5a0 e8 f6 ff 1e 9a 00 00 00 f2 8c 11 a1 f6 7f 00 00  ................
    Possible instruction pointers:

25  qemu-system-x86_64.exe + 0x8b8cf2
    rsp = 0x0000009a1efff5b0   rip = 0x00007ff6a1118cf2
    Found by: stack scanning

    Stack contents:
     0000009a1efff5b0 fe ff ff ff ff ff ff ff 88 c3 e5 12 42 02 00 00  ............B...
     0000009a1efff5c0 80 c2 e5 12 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1efff5d0 00 00 00 00 00 00 00 00 58 32 d7 a0 f6 7f 00 00  ........X2......
    Possible instruction pointers:

26  qemu-system-x86_64.exe + 0x513258
    rsp = 0x0000009a1efff5e0   rip = 0x00007ff6a0d73258
    Found by: stack scanning

    Stack contents:
     0000009a1efff5e0 08 f8 ff 1e 9a 00 00 00 68 f6 ff 1e 9a 00 00 00  ........h.......
     0000009a1efff5f0 00 00 00 00 00 00 00 00 1a db 7d 84 fa 7f 00 00  ..........}.....
    Possible instruction pointers:

27  ucrtbase.dll + 0x6db1a
    rsp = 0x0000009a1efff600   rip = 0x00007ffa847ddb1a
    Found by: stack scanning

    Stack contents:
     0000009a1efff600 60 f6 ff 1e 9a 00 00 00 08 f8 ff 1e 9a 00 00 00  `...............
     0000009a1efff610 18 f8 ff 1e 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff620 60 f7 ff 1e 9a 00 00 00 b0 76 81 84 fa 7f 00 00  `........v......
    Possible instruction pointers:

28  ucrtbase.dll + 0xa76b0
    rsp = 0x0000009a1efff630   rip = 0x00007ffa848176b0
    Found by: stack scanning

    Stack contents:
     0000009a1efff630 18 38 01 a3 f6 7f 00 00                          .8......        
    Possible instruction pointers:

29  qemu-system-x86_64.exe + 0x27b3818
    rsp = 0x0000009a1efff638   rip = 0x00007ff6a3013818
    Found by: stack scanning

    Stack contents:
     0000009a1efff638 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff648 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff658 00 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

30  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1efff668   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1efff668 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

31  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1efff670   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1efff670 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  H...............
     0000009a1efff680 00 00 00 00 00 00 00 00 a8 f6 ff 1e 9a 00 00 00  ................
     0000009a1efff690 a5 86 fb 69 00 00 00 00 80 35 27 19 01 00 00 00  ...i.....5'.....
     0000009a1efff6a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff6b0 80 c2 e5 12 42 02 00 00 b4 85 00 00 00 00 00 00  ....B...........
     0000009a1efff6c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff6d0 01 f8 ff 1e 9a 00 00 00 a9 43 13 a1 f6 7f 00 00  .........C......
    Possible instruction pointers:

32  qemu-system-x86_64.exe + 0x8d43a9
    rsp = 0x0000009a1efff6e0   rip = 0x00007ff6a11343a9
    Found by: stack scanning

    Stack contents:
     0000009a1efff6e0 78 b2 41 1d 42 02 00 00 01 00 00 00 00 00 00 00  x.A.B...........
     0000009a1efff6f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff700 00 00 00 00 00 00 00 00 b4 85 00 00 00 00 00 00  ................
     0000009a1efff710 a4 86 fb 69 00 00 00 00 d8 f7 ff 1e 9a 00 00 00  ...i............
     0000009a1efff720 fe ff ff ff ff ff ff ff 18 f8 ff 1e 9a 00 00 00  ................
     0000009a1efff730 28 f8 ff 1e 9a 00 00 00 d8 f7 ff 1e 9a 00 00 00  (...............
     0000009a1efff740 f8 f7 ff 1e 9a 00 00 00 e8 f7 ff 1e 9a 00 00 00  ................
     0000009a1efff750 38 f8 ff 1e 9a 00 00 00 d8 f7 ff 1e 9a 00 00 00  8...............
     0000009a1efff760 08 f8 ff 1e 9a 00 00 00 03 22 d7 a0 f6 7f 00 00  ........."......
    Possible instruction pointers:

33  qemu-system-x86_64.exe + 0x512203
    rsp = 0x0000009a1efff770   rip = 0x00007ff6a0d72203
    Found by: stack scanning

    Stack contents:
     0000009a1efff770 18 f8 ff 1e 9a 00 00 00 2e 43 13 a1 f6 7f 00 00  .........C......
    Possible instruction pointers:

34  qemu-system-x86_64.exe + 0x8d432e
    rsp = 0x0000009a1efff780   rip = 0x00007ff6a113432e
    Found by: stack scanning

    Stack contents:
     0000009a1efff780 80 c2 e5 12 42 02 00 00 f8 f7 ff 1e 9a 00 00 00  ....B...........
     0000009a1efff790 a5 86 fb 69 00 00 00 00 80 35 27 19 01 00 00 00  ...i.....5'.....
     0000009a1efff7a0 80 c2 e5 12 42 02 00 00 25 c8 4f a1 f6 7f 00 00  ....B...%.O.....
    Possible instruction pointers:

35  qemu-system-x86_64.exe + 0xc9c825
    rsp = 0x0000009a1efff7b0   rip = 0x00007ff6a14fc825
    Found by: stack scanning

    Stack contents:
     0000009a1efff7b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff7c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff7d0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1efff7e0 00 00 00 00 00 00 00 00 a4 86 fb 69 00 00 00 00  ...........i....
     0000009a1efff7f0 40 12 22 13 01 00 00 00 00 00 00 00 00 00 00 00  @.".............
     0000009a1efff800 00 e1 f5 05 03 00 00 00 a4 86 fb 69 00 00 00 00  ...........i....
     0000009a1efff810 40 f3 17 19 01 00 00 00 a4 86 fb 69 00 00 00 00  @..........i....
     0000009a1efff820 80 35 27 19 01 00 00 00 01 00 00 00 00 00 00 00  .5'.............
     0000009a1efff830 00 00 00 00 03 00 00 00 a5 86 fb 69 00 00 00 00  ...........i....
     0000009a1efff840 80 35 27 19 01 00 00 00 00 00 00 00 00 00 00 00  .5'.............
     0000009a1efff850 00 00 00 00 00 00 00 00 a8 b2 41 1d 42 02 00 00  ..........A.B...
     0000009a1efff860 f0 af 41 1d 42 02 00 00 00 00 00 00 00 00 00 00  ..A.B...........
     0000009a1efff870 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff880 00 00 00 00 00 00 00 00 21 6d 13 a1 f6 7f 00 00  ........!m......
    Possible instruction pointers:

36  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1efff890   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1efff890 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff8a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff8b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff8c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff8d0 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

37  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1efff8e0   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1efff8e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff8f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1efff900 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

38  ntdll.dll + 0x526a1
    rsp = 0x0000009a1efff910   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 59
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1f0ff340
    rcx = 0x00000242227a1540   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1540
    rbp = 0x0000009a1f0ff2f0   rsp = 0x0000009a1f0ff298
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a1540   r11 = 0x00000242227a1548
    r12 = 0x0000009a1f0ff340   r13 = 0x0000000000000000
    r14 = 0x0000009a1f0ff2c0   r15 = 0x00000242227a1548
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1f0ff298 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1f0ff340
    rcx = 0x00000242227a1540   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1540
    rbp = 0x0000009a1f0ff2f0   rsp = 0x0000009a1f0ff2a0
     r8 = 0x0000000000000001    r9 = 0x0000000000000000
    r10 = 0x00000242227a1540   r11 = 0x00000242227a1548
    r12 = 0x0000009a1f0ff340   r13 = 0x0000000000000000
    r14 = 0x0000009a1f0ff2c0   r15 = 0x00000242227a1548
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1f0ff2a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff2b0 3f f5 0f 1f 9a 00 00 00 30 f5 0f 1f 9a 00 00 00  ?.......0.......
     0000009a1f0ff2c0 00 00 00 00 00 00 00 00 c0 f2 0f 1f 9a 00 00 00  ................
     0000009a1f0ff2d0 00 00 00 00 00 00 00 00 18 17 00 00 00 00 00 00  ................
     0000009a1f0ff2e0 80 96 98 00 01 00 00 00 40 15 7a 22 42 02 00 00  ........@.z"B...
     0000009a1f0ff2f0 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 2  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1f0ff300   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff300 00 00 00 00 00 00 00 00 40 15 7a 22 42 02 00 00  ........@.z"B...
     0000009a1f0ff310 a0 f3 0f 1f 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1f0ff320   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff320 00 00 00 00 00 00 00 00 48 15 7a 22 42 02 00 00  ........H.z"B...
     0000009a1f0ff330 88 f3 0f 1f 9a 00 00 00 b4 98 0c a1 f6 7f 00 00  ................
    Possible instruction pointers:

 4  qemu-system-x86_64.exe + 0x8698b4
    rsp = 0x0000009a1f0ff340   rip = 0x00007ff6a10c98b4
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff340 00 1f 0a fa ff ff ff ff 88 f3 0f 1f 9a 00 00 00  ................
     0000009a1f0ff350 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 5  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1f0ff360   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff360 00 00 00 00 9a 00 00 00 00 ba bd 21 42 02 00 00  ...........!B...
     0000009a1f0ff370 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1f0ff380 00 00 00 00 00 00 00 00 1b 89 2e 81 94 01 00 00  ................
     0000009a1f0ff390 40 15 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1f0ff3a0 20 f6 0f 1f 9a 00 00 00 1b 89 2e 81 94 01 00 00   ...............
     0000009a1f0ff3b0 00 15 7a 22 42 02 00 00 1b 89 2e 81 94 01 00 00  ..z"B...........
     0000009a1f0ff3c0 58 f4 0f 1f 9a 00 00 00 00 68 2e 6a fa 7f 00 00  X........h.j....
    Possible instruction pointers:

 6  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1f0ff3d0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff3d0 20 f7 0f 1f 9a 00 00 00 ba 70 27 6a fa 7f 00 00   ........p'j....
    Possible instruction pointers:

 7  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1f0ff3e0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff3e0 20 f7 0f 1f 9a 00 00 00 50 22 2a 6a fa 7f 00 00   .......P"*j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f0ff3f0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff3f0 00 ba bd 21 42 02 00 00 1b 89 2e 81 94 01 00 00  ...!B...........
     0000009a1f0ff400 64 96 00 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  d.......P"*j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f0ff410   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff410 00 ba bd 21 42 02 00 00 2e 2f 27 6a fa 7f 00 00  ...!B..../'j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1f0ff420   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff420 14 00 00 00 00 00 00 00 68 64 ec 23 42 02 00 00  ........hd.#B...
     0000009a1f0ff430 d0 f4 0f 1f 9a 00 00 00 f7 2c 1a 6a fa 7f 00 00  .........,.j....
    Possible instruction pointers:

11  MSVCP140.dll + 0x12cf7
    rsp = 0x0000009a1f0ff440   rip = 0x00007ffa6a1a2cf7
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff440 00 00 00 00 00 00 00 00 13 ab 4e a1 f6 7f 00 00  ..........N.....
    Possible instruction pointers:

12  qemu-system-x86_64.exe + 0xc8ab13
    rsp = 0x0000009a1f0ff450   rip = 0x00007ff6a14eab13
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff450 00 00 00 00 00 00 00 00 bf 32 1a 6a fa 7f 00 00  .........2.j....
    Possible instruction pointers:

13  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1f0ff460   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff460 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

14  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f0ff470   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff470 00 00 00 00 00 00 00 00 1b 89 2e 81 94 01 00 00  ................
     0000009a1f0ff480 00 ba bd 21 42 02 00 00 00 15 7a 22 42 02 00 00  ...!B.....z"B...
     0000009a1f0ff490 00 00 00 00 00 00 00 00 f0 93 51 3b 0e 01 00 00  ..........Q;....
     0000009a1f0ff4a0 00 00 00 00 00 00 00 00 a8 f5 0f 1f 9a 00 00 00  ................
     0000009a1f0ff4b0 20 f7 0f 1f 9a 00 00 00 20 f6 0f 1f 9a 00 00 00   ....... .......
     0000009a1f0ff4c0 00 ba bd 21 42 02 00 00 01 00 00 00 00 00 00 00  ...!B...........
     0000009a1f0ff4d0 64 96 00 00 00 00 00 00 98 f5 0f 1f 9a 00 00 00  d...............
     0000009a1f0ff4e0 d0 f7 0f 1f 9a 00 00 00 e3 e7 0b a1 f6 7f 00 00  ................
    Possible instruction pointers:

15  qemu-system-x86_64.exe + 0x85e7e3
    rsp = 0x0000009a1f0ff4f0   rip = 0x00007ff6a10be7e3
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff4f0 ff ff ff ff ff ff ff 7f 00 00 00 00 01 00 00 00  ................
     0000009a1f0ff500 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00  ................
     0000009a1f0ff510 0a 00 00 00 00 00 00 00 54 d7 05 00 9a 00 00 00  ........T.......
     0000009a1f0ff520 0a 00 00 00 00 00 00 00 54 d7 05 00 00 00 00 00  ........T.......
     0000009a1f0ff530 1b 89 2e 81 94 01 00 00 28 94 10 a1 f6 7f 00 00  ........(.......
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x8a9428
    rsp = 0x0000009a1f0ff540   rip = 0x00007ff6a1109428
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff540 fe ff ff ff ff ff ff ff c0 9d 30 1d 42 02 00 00  ..........0.B...
     0000009a1f0ff550 80 9c 6a 0f 42 02 00 00 88 b9 bd 21 42 02 00 00  ..j.B......!B...
     0000009a1f0ff560 36 00 00 00 00 00 00 00 00 65 cd 1d 00 00 00 00  6........e......
     0000009a1f0ff570 26 00 00 00 00 00 00 00 00 65 cd 1d 03 00 00 00  &........e......
     0000009a1f0ff580 36 00 00 00 00 00 00 00 00 65 cd 1d 00 00 00 00  6........e......
     0000009a1f0ff590 10 00 00 00 00 00 00 00 2c 00 00 00 00 00 00 00  ........,.......
     0000009a1f0ff5a0 2b ef cb 1d 00 00 00 00 0a 00 00 00 00 00 00 00  +...............
     0000009a1f0ff5b0 d5 75 01 00 03 00 00 00 ff ff ff ff ff ff ff 7f  .u..............
     0000009a1f0ff5c0 00 00 00 00 00 00 00 00 20 f6 0f 1f 9a 00 00 00  ........ .......
     0000009a1f0ff5d0 00 ba bd 21 42 02 00 00 00 00 00 00 00 00 00 00  ...!B...........
     0000009a1f0ff5e0 50 f6 0f 1f 9a 00 00 00 26 51 d7 a0 f6 7f 00 00  P.......&Q......
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x515126
    rsp = 0x0000009a1f0ff5f0   rip = 0x00007ff6a0d75126
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff5f0 78 f6 0f 1f 9a 00 00 00 c8 f7 0f 1f 9a 00 00 00  x...............
     0000009a1f0ff600 50 f8 0f 1f 9a 00 00 00 34 90 10 a1 f6 7f 00 00  P.......4.......
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x8a9034
    rsp = 0x0000009a1f0ff610   rip = 0x00007ff6a1109034
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff610 60 3f c4 7f 42 02 00 00 90 40 f2 23 42 02 00 00  `?..B....@.#B...
     0000009a1f0ff620 00 15 7a 22 42 02 00 00 00 f6 0f 1f 9a 00 00 00  ..z"B...........
     0000009a1f0ff630 00 f6 7f 1f 9a 00 00 00 00 f6 7f 1f 9a 00 00 00  ................
     0000009a1f0ff640 10 00 00 00 00 00 00 00 64 96 00 00 00 00 00 00  ........d.......
     0000009a1f0ff650 36 00 00 00 00 00 00 00 00 65 cd 1d 00 00 00 00  6........e......
     0000009a1f0ff660 36 00 00 00 00 00 00 00 00 65 cd 1d 00 00 00 00  6........e......
     0000009a1f0ff670 88 b9 bd 21 42 02 00 00 80 b8 bd 21 42 02 00 00  ...!B......!B...
     0000009a1f0ff680 00 00 00 00 00 00 00 00 90 b9 bd 21 42 02 00 00  ...........!B...
     0000009a1f0ff690 a8 f7 0f 1f 9a 00 00 00 58 32 d7 a0 f6 7f 00 00  ........X2......
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x513258
    rsp = 0x0000009a1f0ff6a0   rip = 0x00007ff6a0d73258
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff6a0 00 00 8e 7f 02 00 00 00 00 f7 0f 1f 9a 00 00 00  ................
     0000009a1f0ff6b0 68 9e fd a2 f6 7f 00 00                          h.......        
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x2779e68
    rsp = 0x0000009a1f0ff6b8   rip = 0x00007ff6a2fd9e68
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff6b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff6c8 10 2b ff 1e 42 02 00 00 00 00 00 00 00 00 00 00  .+..B...........
     0000009a1f0ff6d8 00 00 00 00 42 02 00 00 17 00 00 00 00 00 00 00  ....B...........
     0000009a1f0ff6e8 00 00 00 00 00 00 00 00 18 38 01 a3 f6 7f 00 00  .........8......
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0x27b3818
    rsp = 0x0000009a1f0ff6f8   rip = 0x00007ff6a3013818
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff6f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff708 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff718 00 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1f0ff728   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff728 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1f0ff730   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff730 53 6f 00 00 00 00 00 00 00 00 00 00 00 00 00 00  So..............
     0000009a1f0ff740 00 00 00 00 00 00 00 00 68 f7 0f 1f 9a 00 00 00  ........h.......
     0000009a1f0ff750 36 00 00 00 00 00 00 00 8b ad cb 1d 00 00 00 00  6...............
     0000009a1f0ff760 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1f0ff770 80 b8 bd 21 42 02 00 00 64 96 00 00 00 00 00 00  ...!B...d.......
     0000009a1f0ff780 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff790 01 00 00 00 00 00 00 00 00 00 00 00 42 02 00 00  ............B...
     0000009a1f0ff7a0 48 d9 41 1d 42 02 00 00 01 6f 00 00 00 00 00 00  H.A.B....o......
     0000009a1f0ff7b0 00 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00  ................
     0000009a1f0ff7c0 00 00 00 00 00 00 00 00 64 96 00 00 00 00 00 00  ........d.......
     0000009a1f0ff7d0 01 00 00 00 00 00 00 00 90 f8 0f 1f 9a 00 00 00  ................
     0000009a1f0ff7e0 fe ff ff ff ff ff ff ff a0 f9 0f 1f 9a 00 00 00  ................
     0000009a1f0ff7f0 be f9 0f 1f 9a 00 00 00 90 f8 0f 1f 9a 00 00 00  ................
     0000009a1f0ff800 a0 f8 0f 1f 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff810 e0 b6 c2 21 42 02 00 00 90 f8 0f 1f 9a 00 00 00  ...!B...........
     0000009a1f0ff820 c0 f9 0f 1f 9a 00 00 00 03 22 d7 a0 f6 7f 00 00  ........."......
    Possible instruction pointers:

24  qemu-system-x86_64.exe + 0x512203
    rsp = 0x0000009a1f0ff830   rip = 0x00007ff6a0d72203
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff830 08 f9 0f 1f 9a 00 00 00 c8 40 f2 23 42 02 00 00  .........@.#B...
     0000009a1f0ff840 90 40 f2 23 42 02 00 00 78 45 f2 23 42 02 00 00  .@.#B...xE.#B...
     0000009a1f0ff850 36 00 00 00 00 00 00 00 8b ad cb 1d 00 00 00 00  6...............
     0000009a1f0ff860 10 f9 0f 1f 9a 00 00 00 4a bd 4f a1 f6 7f 00 00  ........J.O.....
    Possible instruction pointers:

25  qemu-system-x86_64.exe + 0xc9bd4a
    rsp = 0x0000009a1f0ff870   rip = 0x00007ff6a14fbd4a
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff870 a0 f9 0f 1f 9a 00 00 00 ad 42 13 a1 f6 7f 00 00  .........B......
    Possible instruction pointers:

26  qemu-system-x86_64.exe + 0x8d42ad
    rsp = 0x0000009a1f0ff880   rip = 0x00007ff6a11342ad
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff880 d0 35 bd 21 42 02 00 00 08 f9 0f 1f 9a 00 00 00  .5.!B...........
     0000009a1f0ff890 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1f0ff8a0 36 00 00 00 00 00 00 00 8b ad cb 1d 00 00 00 00  6...............
     0000009a1f0ff8b0 30 f9 0f 1f 9a 00 00 00 d0 35 bd 21 42 02 00 00  0........5.!B...
     0000009a1f0ff8c0 a0 f9 0f 1f 9a 00 00 00 be f9 0f 1f 9a 00 00 00  ................
     0000009a1f0ff8d0 00 00 00 00 00 00 00 00 40 f9 0f 1f 9a 00 00 00  ........@.......
     0000009a1f0ff8e0 30 f9 0f 1f 9a 00 00 00 bf 92 0c a1 f6 7f 00 00  0...............
    Possible instruction pointers:

27  qemu-system-x86_64.exe + 0x8692bf
    rsp = 0x0000009a1f0ff8f0   rip = 0x00007ff6a10c92bf
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff8f0 27 00 00 00 00 00 00 00 c0 ec 4f 1c 00 00 00 00  '.........O.....
     0000009a1f0ff900 a0 f9 0f 1f 9a 00 00 00 b8 f9 0d a3 f6 7f 00 00  ................
    Possible instruction pointers:

28  qemu-system-x86_64.exe + 0x287f9b8
    rsp = 0x0000009a1f0ff910   rip = 0x00007ff6a30df9b8
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff910 36 00 00 00 00 00 00 00 8b ad cb 1d 00 00 00 00  6...............
     0000009a1f0ff920 36 00 00 00 00 00 00 00 8b ad cb 1d 00 00 00 00  6...............
     0000009a1f0ff930 2c 00 00 00 00 00 00 00 8b ad cb 1d 00 00 00 00  ,...............
     0000009a1f0ff940 0a 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00  ................
     0000009a1f0ff950 be f9 0f 1f 9a 00 00 00 a0 f9 0f 1f 9a 00 00 00  ................
     0000009a1f0ff960 d0 35 bd 21 42 02 00 00 01 00 00 00 00 00 00 00  .5.!B...........
     0000009a1f0ff970 d8 35 bd 21 42 02 00 00 1f ab 4f a1 f6 7f 00 00  .5.!B.....O.....
    Possible instruction pointers:

29  qemu-system-x86_64.exe + 0xc9ab1f
    rsp = 0x0000009a1f0ff980   rip = 0x00007ff6a14fab1f
    Found by: stack scanning

    Stack contents:
     0000009a1f0ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff990 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff9a0 00 00 00 00 00 00 00 00 30 b7 87 23 42 02 00 00  ........0..#B...
     0000009a1f0ff9b0 d8 35 bd 21 42 02 00 00 00 00 00 00 00 00 01 01  .5.!B...........
     0000009a1f0ff9c0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff9d0 78 d9 41 1d 42 02 00 00 20 70 c8 21 42 02 00 00  x.A.B... p.!B...
     0000009a1f0ff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ff9f0 00 00 00 00 00 00 00 00 d0 b8 4f a1 f6 7f 00 00  ..........O.....
    Possible instruction pointers:

30  qemu-system-x86_64.exe + 0xc9b8d0
    rsp = 0x0000009a1f0ffa00   rip = 0x00007ff6a14fb8d0
    Found by: stack scanning

    Stack contents:
     0000009a1f0ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffa20 c0 d6 41 1d 42 02 00 00 21 6d 13 a1 f6 7f 00 00  ..A.B...!m......
    Possible instruction pointers:

31  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1f0ffa30   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1f0ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffa50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffa70 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

32  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1f0ffa80   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1f0ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffa90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f0ffaa0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

33  ntdll.dll + 0x526a1
    rsp = 0x0000009a1f0ffab0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 60
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242227a1a40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1a40
    rbp = 0x0000009a1f6ff700   rsp = 0x0000009a1f6ff6a8
     r8 = 0x0000018bf9a01281    r9 = 0x000000007ffed000
    r10 = 0x00000000546c6148   r11 = 0xfffffffff7a93a41
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1f6ff6d0   r15 = 0x00000242227a1a48
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1f6ff6a8 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000000000000000
    rcx = 0x00000242227a1a40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1a40
    rbp = 0x0000009a1f6ff700   rsp = 0x0000009a1f6ff6b0
     r8 = 0x0000018bf9a01281    r9 = 0x000000007ffed000
    r10 = 0x00000000546c6148   r11 = 0xfffffffff7a93a41
    r12 = 0x0000000000000000   r13 = 0x0000000000000000
    r14 = 0x0000009a1f6ff6d0   r15 = 0x00000242227a1a48
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1f6ff6b0 00 00 00 00 f6 7f 00 00 98 54 87 a4 f6 7f 00 00  .........T......
    Possible instruction pointers:

 2  qemu-system-x86_64.exe + 0x4015498
    rbp = 0x0000009a1f6ff700   rsp = 0x0000009a1f6ff6c0
    rip = 0x00007ff6a4875498
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff6c0 10 f8 6f 1f 9a 00 00 00 a8 f7 6f 1f 9a 00 00 00  ..o.......o.....
     0000009a1f6ff6d0 00 00 00 00 00 00 00 00 d0 f6 6f 1f 9a 00 00 00  ..........o.....
     0000009a1f6ff6e0 00 00 00 00 00 00 00 00 28 27 00 00 00 00 00 00  ........('......
     0000009a1f6ff6f0 00 00 00 00 01 00 00 00 40 1a 7a 22 42 02 00 00  ........@.z"B...
     0000009a1f6ff700 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 3  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1f6ff710   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff710 00 00 00 00 00 00 00 00 40 1a 7a 22 42 02 00 00  ........@.z"B...
     0000009a1f6ff720 b0 f7 6f 1f 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ..o.....i.......
    Possible instruction pointers:

 4  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1f6ff730   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff730 00 00 00 00 00 00 00 00 48 1a 7a 22 42 02 00 00  ........H.z"B...
     0000009a1f6ff740 98 f7 6f 1f 9a 00 00 00 e9 fd 4a 15 01 00 00 00  ..o.......J.....
     0000009a1f6ff750 00 00 00 00 00 00 00 00 98 f7 6f 1f 9a 00 00 00  ..........o.....
     0000009a1f6ff760 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 5  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1f6ff770   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff770 00 00 00 00 9a 00 00 00 f0 88 5f a4 f6 7f 00 00  .........._.....
    Possible instruction pointers:

 6  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1f6ff780   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff780 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1f6ff790 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1f6ff7a0 40 1a 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1f6ff7b0 f8 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

 7  qemu-system-x86_64.exe + 0x3d988f8
    rsp = 0x0000009a1f6ff7b8   rip = 0x00007ff6a45f88f8
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff7b8 ff ff ff ff ff ff ff ff 00 1a 7a 22 42 02 00 00  ..........z"B...
     0000009a1f6ff7c8 ff ff ff ff ff ff ff ff 68 f8 6f 1f 9a 00 00 00  ........h.o.....
     0000009a1f6ff7d8 00 68 2e 6a fa 7f 00 00                          .h.j....        
    Possible instruction pointers:

 8  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1f6ff7e0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff7e0 80 fa 6f 1f 9a 00 00 00 ba 70 27 6a fa 7f 00 00  ..o......p'j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1f6ff7f0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff7f0 80 fa 6f 1f 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ..o.....P"*j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f6ff800   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff800 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

11  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1f6ff808   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff808 ff ff ff ff ff ff ff ff 3d 00 00 00 00 00 00 00  ........=.......
     0000009a1f6ff818 50 22 2a 6a fa 7f 00 00                          P"*j....        
    Possible instruction pointers:

12  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f6ff820   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff820 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

13  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1f6ff828   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff828 2e 2f 27 6a fa 7f 00 00                          ./'j....        
    Possible instruction pointers:

14  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1f6ff830   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff830 2f 00 00 00 00 00 00 00 98 f9 6f 1f 9a 00 00 00  /.........o.....
     0000009a1f6ff840 a8 f8 6f 1f 9a 00 00 00 fe ff ff ff ff ff ff ff  ..o.............
     0000009a1f6ff850 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ff860 00 06 7a 22 42 02 00 00 00 00 00 00 00 00 00 00  ..z"B...........
     0000009a1f6ff870 00 00 00 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

15  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f6ff880   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff880 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff  ................
     0000009a1f6ff890 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1f6ff898   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff898 00 1a 7a 22 42 02 00 00 00 00 00 00 00 00 00 00  ..z"B...........
     0000009a1f6ff8a8 2d 78 76 0e 0f 01 00 00 00 00 00 00 00 00 00 00  -xv.............
     0000009a1f6ff8b8 98 fa 6f 1f 9a 00 00 00 80 fa 6f 1f 9a 00 00 00  ..o.......o.....
     0000009a1f6ff8c8 f8 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

17  qemu-system-x86_64.exe + 0x3d988f8
    rsp = 0x0000009a1f6ff8d0   rip = 0x00007ff6a45f88f8
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff8d0 f0 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

18  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1f6ff8d8   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff8d8 ff ff ff ff ff ff ff 7f 3d 00 00 00 00 00 00 00  ........=.......
     0000009a1f6ff8e8 c8 f9 6f 1f 9a 00 00 00 f0 88 5f a4 f6 7f 00 00  ..o......._.....
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x3d988f0
    rsp = 0x0000009a1f6ff8f8   rip = 0x00007ff6a45f88f0
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff8f8 2d e7 0b a1 f6 7f 00 00                          -.......        
    Possible instruction pointers:

20  qemu-system-x86_64.exe + 0x85e72d
    rsp = 0x0000009a1f6ff900   rip = 0x00007ff6a10be72d
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff900 90 f9 6f 1f 9a 00 00 00 66 5f 55 a1 f6 7f 00 00  ..o.....f_U.....
    Possible instruction pointers:

21  qemu-system-x86_64.exe + 0xcf5f66
    rsp = 0x0000009a1f6ff910   rip = 0x00007ff6a1555f66
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff910 ab 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .R..............
     0000009a1f6ff920 73 10 c0 f5 0b 01 00 00 01 00 00 00 00 00 00 00  s...............
     0000009a1f6ff930 fe ff ff ff ff ff ff ff 98 f9 6f 1f 9a 00 00 00  ..........o.....
     0000009a1f6ff940 a0 f9 6f 1f 9a 00 00 00 30 fa 6f 1f 9a 00 00 00  ..o.....0.o.....
     0000009a1f6ff950 01 d2 c4 21 42 02 00 00 38 fa 6f 1f 9a 00 00 00  ...!B...8.o.....
     0000009a1f6ff960 c0 f9 6f 1f 9a 00 00 00 95 85 10 a1 f6 7f 00 00  ..o.............
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0x8a8595
    rsp = 0x0000009a1f6ff970   rip = 0x00007ff6a1108595
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff970 f8 88 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x3d988f8
    rsp = 0x0000009a1f6ff978   rip = 0x00007ff6a45f88f8
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff978 ff ff ff ff ff ff ff 7f 27 00 00 00 00 00 00 00  ........'.......
     0000009a1f6ff988 aa 52 00 00 00 00 00 00 ff ff ff ff ff ff ff 7f  .R..............
     0000009a1f6ff998 00 00 00 00 00 00 00 00 bb 79 00 00 00 00 00 00  .........y......
     0000009a1f6ff9a8 01 00 00 00 00 00 00 00 7a 99 0e a3 f6 7f 00 00  ........z.......
    Possible instruction pointers:

24  qemu-system-x86_64.exe + 0x288997a
    rsp = 0x0000009a1f6ff9b8   rip = 0x00007ff6a30e997a
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff9b8 c0 fa 6f 1f 9a 00 00 00 98 fa 6f 1f 9a 00 00 00  ..o.......o.....
     0000009a1f6ff9c8 ff ff ff ff ff ff ff 7f 00 00 00 00 00 00 00 00  ................
     0000009a1f6ff9d8 7a 99 0e a3 f6 7f 00 00                          z.......        
    Possible instruction pointers:

25  qemu-system-x86_64.exe + 0x288997a
    rsp = 0x0000009a1f6ff9e0   rip = 0x00007ff6a30e997a
    Found by: stack scanning

    Stack contents:
     0000009a1f6ff9e0 c0 fa 6f 1f 9a 00 00 00 98 fa 6f 1f 9a 00 00 00  ..o.......o.....
     0000009a1f6ff9f0 eb 79 00 00 00 00 00 00 b5 57 13 a1 f6 7f 00 00  .y.......W......
    Possible instruction pointers:

26  qemu-system-x86_64.exe + 0x8d57b5
    rsp = 0x0000009a1f6ffa00   rip = 0x00007ff6a11357b5
    Found by: stack scanning

    Stack contents:
     0000009a1f6ffa00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffa30 f8 1b 01 a3 f6 7f 00 00                          ........        
    Possible instruction pointers:

27  qemu-system-x86_64.exe + 0x27b1bf8
    rsp = 0x0000009a1f6ffa38   rip = 0x00007ff6a3011bf8
    Found by: stack scanning

    Stack contents:
     0000009a1f6ffa38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffa48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffa58 04 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

28  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1f6ffa68   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1f6ffa68 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

29  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1f6ffa70   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1f6ffa70 bb 79 00 00 00 00 00 00 01 00 00 00 00 00 00 00  .y..............
     0000009a1f6ffa80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffa90 e0 f6 a3 0f 42 02 00 00 ff ff ff ff ff ff ff 7f  ....B...........
     0000009a1f6ffaa0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffab0 ff ff ff ff ff ff ff 7f 88 ea 41 1d 42 02 00 00  ..........A.B...
     0000009a1f6ffac0 eb 79 00 00 00 00 00 00 fe ff ff ff ff ff ff ff  .y..............
     0000009a1f6ffad0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffae0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffaf0 b8 ea 41 1d 42 02 00 00 00 e8 41 1d 42 02 00 00  ..A.B.....A.B...
     0000009a1f6ffb00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffb10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffb20 00 00 00 00 00 00 00 00 21 6d 13 a1 f6 7f 00 00  ........!m......
    Possible instruction pointers:

30  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1f6ffb30   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1f6ffb30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffb40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffb50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffb60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffb70 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

31  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1f6ffb80   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1f6ffb80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffb90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f6ffba0 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

32  ntdll.dll + 0x526a1
    rsp = 0x0000009a1f6ffbb0   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Thread 61
 0  ntdll.dll + 0xa0ab4
    rax = 0x00000000000001d0   rdx = 0x0000009a1f7ff320
    rcx = 0x00000242227a1c40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1c40
    rbp = 0x0000009a1f7ff2d0   rsp = 0x0000009a1f7ff278
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000009a1f7ff320   r13 = 0x0000000000000000
    r14 = 0x0000009a1f7ff2a0   r15 = 0x00000242227a1c48
    rip = 0x00007ffa86fd0ab4
    Found by: given as instruction pointer in context

    Stack contents:
     0000009a1f7ff278 31 41 f9 86 fa 7f 00 00                          1A......        
    Possible instruction pointers:

 1  ntdll.dll + 0x64131
    rax = 0x00000000000001d0   rdx = 0x0000009a1f7ff320
    rcx = 0x00000242227a1c40   rbx = 0x0000000000000000
    rsi = 0x0000000000000000   rdi = 0x00000242227a1c40
    rbp = 0x0000009a1f7ff2d0   rsp = 0x0000009a1f7ff280
     r8 = 0x0000000000000000    r9 = 0x0000000000000000
    r10 = 0x0000000000000000   r11 = 0x0000000000000000
    r12 = 0x0000009a1f7ff320   r13 = 0x0000000000000000
    r14 = 0x0000009a1f7ff2a0   r15 = 0x00000242227a1c48
    rip = 0x00007ffa86f94131
    Found by: simulating a return from leaf function

    Stack contents:
     0000009a1f7ff280 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff290 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 2  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1f7ff2d0   rsp = 0x0000009a1f7ff298
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff298 48 42 2e 6a fa 7f 00 00                          HB.j....        
    Possible instruction pointers:

 3  libabseil_dll.dll + 0xc4248
    rbp = 0x0000009a1f7ff2d0   rsp = 0x0000009a1f7ff2a0
    rip = 0x00007ffa6a2e4248
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff2a0 00 00 00 00 00 00 00 00 a0 f2 7f 1f 9a 00 00 00  ................
     0000009a1f7ff2b0 00 00 00 00 00 00 00 00 40 1d 00 00 00 00 00 00  ........@.......
     0000009a1f7ff2c0 80 96 98 00 01 00 00 00 40 1c 7a 22 42 02 00 00  ........@.z"B...
     0000009a1f7ff2d0 00 00 00 00 00 00 00 00 40 dc cf 84 fa 7f 00 00  ........@.......
    Possible instruction pointers:

 4  KERNELBASE.dll + 0x6dc40
    rsp = 0x0000009a1f7ff2e0   rip = 0x00007ffa84cfdc40
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff2e0 00 00 00 00 00 00 00 00 40 1c 7a 22 42 02 00 00  ........@.z"B...
     0000009a1f7ff2f0 80 f3 7f 1f 9a 00 00 00 69 dc cf 84 fa 7f 00 00  ........i.......
    Possible instruction pointers:

 5  KERNELBASE.dll + 0x6dc69
    rsp = 0x0000009a1f7ff300   rip = 0x00007ffa84cfdc69
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff300 00 00 00 00 00 00 00 00 48 1c 7a 22 42 02 00 00  ........H.z"B...
     0000009a1f7ff310 68 f3 7f 1f 9a 00 00 00 26 9a f4 86 fa 7f 00 00  h.......&.......
    Possible instruction pointers:

 6  ntdll.dll + 0x19a26
    rsp = 0x0000009a1f7ff320   rip = 0x00007ffa86f49a26
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff320 f0 f7 09 fa ff ff ff ff 68 f3 7f 1f 9a 00 00 00  ........h.......
     0000009a1f7ff330 00 00 00 00 00 00 00 00 a2 77 27 6a fa 7f 00 00  .........w'j....
    Possible instruction pointers:

 7  libabseil_dll.dll + 0x577a2
    rsp = 0x0000009a1f7ff340   rip = 0x00007ffa6a2777a2
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff340 00 00 00 00 9a 00 00 00 00 ba bd 21 42 02 00 00  ...........!B...
     0000009a1f7ff350 00 00 00 00 00 00 00 00 48 00 00 00 00 00 00 00  ........H.......
     0000009a1f7ff360 00 00 00 00 00 00 00 00 93 0f 8a 81 94 01 00 00  ................
     0000009a1f7ff370 40 1c 7a 22 42 02 00 00 fe ff ff ff ff ff ff ff  @.z"B...........
     0000009a1f7ff380 00 f6 7f 1f 9a 00 00 00 93 0f 8a 81 94 01 00 00  ................
     0000009a1f7ff390 00 1c 7a 22 42 02 00 00 93 0f 8a 81 94 01 00 00  ..z"B...........
     0000009a1f7ff3a0 38 f4 7f 1f 9a 00 00 00 00 68 2e 6a fa 7f 00 00  8........h.j....
    Possible instruction pointers:

 8  libabseil_dll.dll + 0xc6800
    rsp = 0x0000009a1f7ff3b0   rip = 0x00007ffa6a2e6800
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff3b0 00 f7 7f 1f 9a 00 00 00 ba 70 27 6a fa 7f 00 00  .........p'j....
    Possible instruction pointers:

 9  libabseil_dll.dll + 0x570ba
    rsp = 0x0000009a1f7ff3c0   rip = 0x00007ffa6a2770ba
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff3c0 00 f7 7f 1f 9a 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

10  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f7ff3d0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff3d0 00 ba bd 21 42 02 00 00 93 0f 8a 81 94 01 00 00  ...!B...........
     0000009a1f7ff3e0 67 96 00 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  g.......P"*j....
    Possible instruction pointers:

11  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f7ff3f0   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff3f0 00 ba bd 21 42 02 00 00 2e 2f 27 6a fa 7f 00 00  ...!B..../'j....
    Possible instruction pointers:

12  libabseil_dll.dll + 0x52f2e
    rsp = 0x0000009a1f7ff400   rip = 0x00007ffa6a272f2e
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff400 c0 17 b7 24 fa 7f 00 00                          ...$....        
    Possible instruction pointers:

13  midimap.dll + 0x17c0
    rsp = 0x0000009a1f7ff408   rip = 0x00007ffa24b717c0
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff408 55 79 f4 86 fa 7f 00 00                          Uy......        
    Possible instruction pointers:

14  ntdll.dll + 0x17955
    rsp = 0x0000009a1f7ff410   rip = 0x00007ffa86f47955
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff410 d0 c4 09 87 fa 7f 00 00                          ........        
    Possible instruction pointers:

15  ntdll.dll + 0x16c4d0
    rsp = 0x0000009a1f7ff418   rip = 0x00007ffa8709c4d0
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff418 00 60 72 1a 9a 00 00 00 00 60 72 1a 9a 00 00 00  .`r......`r.....
     0000009a1f7ff428 13 ab 4e a1 f6 7f 00 00                          ..N.....        
    Possible instruction pointers:

16  qemu-system-x86_64.exe + 0xc8ab13
    rsp = 0x0000009a1f7ff430   rip = 0x00007ff6a14eab13
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff430 00 00 00 00 00 00 00 00 bf 32 1a 6a fa 7f 00 00  .........2.j....
    Possible instruction pointers:

17  MSVCP140.dll + 0x132bf
    rsp = 0x0000009a1f7ff440   rip = 0x00007ffa6a1a32bf
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff440 80 96 98 00 00 00 00 00 50 22 2a 6a fa 7f 00 00  ........P"*j....
    Possible instruction pointers:

18  libabseil_dll.dll + 0x82250
    rsp = 0x0000009a1f7ff450   rip = 0x00007ffa6a2a2250
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff450 00 00 00 00 00 00 00 00 93 0f 8a 81 94 01 00 00  ................
     0000009a1f7ff460 00 ba bd 21 42 02 00 00 00 1c 7a 22 42 02 00 00  ...!B.....z"B...
     0000009a1f7ff470 00 00 00 00 00 00 00 00 ef 30 8f 3b 0e 01 00 00  .........0.;....
     0000009a1f7ff480 00 00 00 00 00 00 00 00 88 f5 7f 1f 9a 00 00 00  ................
     0000009a1f7ff490 00 f7 7f 1f 9a 00 00 00 00 f6 7f 1f 9a 00 00 00  ................
     0000009a1f7ff4a0 00 ba bd 21 42 02 00 00 01 00 00 00 00 00 00 00  ...!B...........
     0000009a1f7ff4b0 67 96 00 00 00 00 00 00 78 f5 7f 1f 9a 00 00 00  g.......x.......
     0000009a1f7ff4c0 b0 f7 7f 1f 9a 00 00 00 e3 e7 0b a1 f6 7f 00 00  ................
    Possible instruction pointers:

19  qemu-system-x86_64.exe + 0x85e7e3
    rsp = 0x0000009a1f7ff4d0   rip = 0x00007ff6a10be7e3
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff4d0 3d 79 f4 86 fa 7f 00 00                          =y......        
    Possible instruction pointers:

20  ntdll.dll + 0x1793d
    rsp = 0x0000009a1f7ff4d8   rip = 0x00007ffa86f4793d
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff4d8 00 00 00 00 00 00 00 00 00 60 72 1a 9a 00 00 00  .........`r.....
     0000009a1f7ff4e8 ad 50 fa 86 fa 7f 00 00                          .P......        
    Possible instruction pointers:

21  ntdll.dll + 0x750ad
    rsp = 0x0000009a1f7ff4f0   rip = 0x00007ffa86fa50ad
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff4f0 0a 00 00 00 00 00 00 00 84 90 03 00 9a 00 00 00  ................
     0000009a1f7ff500 0a 00 00 00 00 00 00 00 84 90 03 00 00 00 00 00  ................
     0000009a1f7ff510 93 0f 8a 81 94 01 00 00 28 94 10 a1 f6 7f 00 00  ........(.......
    Possible instruction pointers:

22  qemu-system-x86_64.exe + 0x8a9428
    rsp = 0x0000009a1f7ff520   rip = 0x00007ff6a1109428
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff520 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff530 00 00 00 00 00 00 00 00 88 b9 bd 21 42 02 00 00  ...........!B...
     0000009a1f7ff540 36 00 00 00 00 00 00 00 c0 2b fb 1d 00 00 00 00  6........+......
     0000009a1f7ff550 26 00 00 00 00 00 00 00 c0 2b fb 1d 03 00 00 00  &........+......
     0000009a1f7ff560 36 00 00 00 00 00 00 00 c0 2b fb 1d 00 00 00 00  6........+......
     0000009a1f7ff570 10 00 00 00 00 00 00 00 2c 00 00 00 00 00 00 00  ........,.......
     0000009a1f7ff580 9f 47 fa 1d 00 00 00 00 0a 00 00 00 00 00 00 00  .G..............
     0000009a1f7ff590 21 e4 00 00 03 00 00 00 ff ff ff ff ff ff ff 7f  !...............
     0000009a1f7ff5a0 00 00 00 00 00 00 00 00 00 f6 7f 1f 9a 00 00 00  ................
     0000009a1f7ff5b0 00 ba bd 21 42 02 00 00 00 00 00 00 00 00 00 00  ...!B...........
     0000009a1f7ff5c0 30 f6 7f 1f 9a 00 00 00 26 51 d7 a0 f6 7f 00 00  0.......&Q......
    Possible instruction pointers:

23  qemu-system-x86_64.exe + 0x515126
    rsp = 0x0000009a1f7ff5d0   rip = 0x00007ff6a0d75126
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff5d0 58 f6 7f 1f 9a 00 00 00 a8 f7 7f 1f 9a 00 00 00  X...............
     0000009a1f7ff5e0 30 f8 7f 1f 9a 00 00 00 34 90 10 a1 f6 7f 00 00  0.......4.......
    Possible instruction pointers:

24  qemu-system-x86_64.exe + 0x8a9034
    rsp = 0x0000009a1f7ff5f0   rip = 0x00007ff6a1109034
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff5f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff600 00 1c 7a 22 42 02 00 00 00 00 00 00 00 00 00 00  ..z"B...........
     0000009a1f7ff610 20 f6 0f 1f 9a 00 00 00 20 f6 0f 1f 9a 00 00 00   ....... .......
     0000009a1f7ff620 10 00 00 00 00 00 00 00 67 96 00 00 00 00 00 00  ........g.......
     0000009a1f7ff630 36 00 00 00 00 00 00 00 c0 2b fb 1d 00 00 00 00  6........+......
     0000009a1f7ff640 36 00 00 00 00 00 00 00 c0 2b fb 1d 00 00 00 00  6........+......
     0000009a1f7ff650 88 b9 bd 21 42 02 00 00 80 b8 bd 21 42 02 00 00  ...!B......!B...
     0000009a1f7ff660 00 00 00 00 00 00 00 00 90 b9 bd 21 42 02 00 00  ...........!B...
     0000009a1f7ff670 88 f7 7f 1f 9a 00 00 00 58 32 d7 a0 f6 7f 00 00  ........X2......
    Possible instruction pointers:

25  qemu-system-x86_64.exe + 0x513258
    rsp = 0x0000009a1f7ff680   rip = 0x00007ff6a0d73258
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff680 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff690 70 6c 13 a1 f6 7f 00 00                          pl......        
    Possible instruction pointers:

26  qemu-system-x86_64.exe + 0x8d6c70
    rsp = 0x0000009a1f7ff698   rip = 0x00007ff6a1136c70
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff698 f0 99 1e 1d 42 02 00 00 00 00 00 00 00 00 00 00  ....B...........
     0000009a1f7ff6a8 08 fb 7f 1f 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff6b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff6c8 00 00 00 00 00 00 00 00 18 38 01 a3 f6 7f 00 00  .........8......
    Possible instruction pointers:

27  qemu-system-x86_64.exe + 0x27b3818
    rsp = 0x0000009a1f7ff6d8   rip = 0x00007ff6a3013818
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff6d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff6e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff6f8 00 00 00 00 00 00 00 00 68 1c 01 a3 f6 7f 00 00  ........h.......
    Possible instruction pointers:

28  qemu-system-x86_64.exe + 0x27b1c68
    rsp = 0x0000009a1f7ff708   rip = 0x00007ff6a3011c68
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff708 e0 86 5f a4 f6 7f 00 00                          .._.....        
    Possible instruction pointers:

29  qemu-system-x86_64.exe + 0x3d986e0
    rsp = 0x0000009a1f7ff710   rip = 0x00007ff6a45f86e0
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff710 56 6f 00 00 00 00 00 00 00 00 00 00 00 00 00 00  Vo..............
     0000009a1f7ff720 00 00 00 00 00 00 00 00 48 f7 7f 1f 9a 00 00 00  ........H.......
     0000009a1f7ff730 36 00 00 00 00 00 00 00 ef 42 fa 1d 00 00 00 00  6........B......
     0000009a1f7ff740 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
     0000009a1f7ff750 80 b8 bd 21 42 02 00 00 67 96 00 00 00 00 00 00  ...!B...g.......
     0000009a1f7ff760 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff770 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff780 28 f3 41 1d 42 02 00 00 01 6f 00 00 00 00 00 00  (.A.B....o......
     0000009a1f7ff790 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff7a0 00 00 00 00 00 00 00 00 67 96 00 00 00 00 00 00  ........g.......
     0000009a1f7ff7b0 01 00 00 00 00 00 00 00 70 f8 7f 1f 9a 00 00 00  ........p.......
     0000009a1f7ff7c0 fe ff ff ff ff ff ff ff 80 f9 7f 1f 9a 00 00 00  ................
     0000009a1f7ff7d0 9e f9 7f 1f 9a 00 00 00 70 f8 7f 1f 9a 00 00 00  ........p.......
     0000009a1f7ff7e0 80 f8 7f 1f 9a 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff7f0 e0 b6 c2 21 42 02 00 00 70 f8 7f 1f 9a 00 00 00  ...!B...p.......
     0000009a1f7ff800 a0 f9 7f 1f 9a 00 00 00 03 22 d7 a0 f6 7f 00 00  ........."......
    Possible instruction pointers:

30  qemu-system-x86_64.exe + 0x512203
    rsp = 0x0000009a1f7ff810   rip = 0x00007ff6a0d72203
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff830 36 00 00 00 00 00 00 00 ef 42 fa 1d 00 00 00 00  6........B......
     0000009a1f7ff840 f0 f8 7f 1f 9a 00 00 00 4a bd 4f a1 f6 7f 00 00  ........J.O.....
    Possible instruction pointers:

31  qemu-system-x86_64.exe + 0xc9bd4a
    rsp = 0x0000009a1f7ff850   rip = 0x00007ff6a14fbd4a
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff850 80 f9 7f 1f 9a 00 00 00 ad 42 13 a1 f6 7f 00 00  .........B......
    Possible instruction pointers:

32  qemu-system-x86_64.exe + 0x8d42ad
    rsp = 0x0000009a1f7ff860   rip = 0x00007ff6a11342ad
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff860 d0 35 bd 21 42 02 00 00 00 00 00 00 00 00 00 00  .5.!B...........
     0000009a1f7ff870 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff880 36 00 00 00 00 00 00 00 ef 42 fa 1d 00 00 00 00  6........B......
     0000009a1f7ff890 10 f9 7f 1f 9a 00 00 00 d0 35 bd 21 42 02 00 00  .........5.!B...
     0000009a1f7ff8a0 80 f9 7f 1f 9a 00 00 00 9e f9 7f 1f 9a 00 00 00  ................
     0000009a1f7ff8b0 00 00 00 00 00 00 00 00 20 f9 7f 1f 9a 00 00 00  ........ .......
     0000009a1f7ff8c0 10 f9 7f 1f 9a 00 00 00 bf 92 0c a1 f6 7f 00 00  ................
    Possible instruction pointers:

33  qemu-system-x86_64.exe + 0x8692bf
    rsp = 0x0000009a1f7ff8d0   rip = 0x00007ff6a10c92bf
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff8d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff8e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff8f0 36 00 00 00 00 00 00 00 ef 42 fa 1d 00 00 00 00  6........B......
     0000009a1f7ff900 36 00 00 00 00 00 00 00 ef 42 fa 1d 00 00 00 00  6........B......
     0000009a1f7ff910 2c 00 00 00 00 00 00 00 ef 42 fa 1d 00 00 00 00  ,........B......
     0000009a1f7ff920 0a 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00  ................
     0000009a1f7ff930 9e f9 7f 1f 9a 00 00 00 80 f9 7f 1f 9a 00 00 00  ................
     0000009a1f7ff940 d0 35 bd 21 42 02 00 00 01 00 00 00 00 00 00 00  .5.!B...........
     0000009a1f7ff950 d8 35 bd 21 42 02 00 00 1f ab 4f a1 f6 7f 00 00  .5.!B.....O.....
    Possible instruction pointers:

34  qemu-system-x86_64.exe + 0xc9ab1f
    rsp = 0x0000009a1f7ff960   rip = 0x00007ff6a14fab1f
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff960 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff970 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff980 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff990 d8 35 bd 21 42 02 00 00 00 00 00 00 00 00 00 00  .5.!B...........
     0000009a1f7ff9a0 fe ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff9b0 58 f3 41 1d 42 02 00 00 30 b7 87 23 42 02 00 00  X.A.B...0..#B...
     0000009a1f7ff9c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff9d0 00 00 00 00 00 00 00 00 d0 b8 4f a1 f6 7f 00 00  ..........O.....
    Possible instruction pointers:

35  qemu-system-x86_64.exe + 0xc9b8d0
    rsp = 0x0000009a1f7ff9e0   rip = 0x00007ff6a14fb8d0
    Found by: stack scanning

    Stack contents:
     0000009a1f7ff9e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ff9f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ffa00 a0 f0 41 1d 42 02 00 00 21 6d 13 a1 f6 7f 00 00  ..A.B...!m......
    Possible instruction pointers:

36  qemu-system-x86_64.exe + 0x8d6d21
    rsp = 0x0000009a1f7ffa10   rip = 0x00007ff6a1136d21
    Found by: stack scanning

    Stack contents:
     0000009a1f7ffa10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ffa20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ffa30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ffa40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ffa50 00 00 00 00 00 00 00 00 14 76 e4 86 fa 7f 00 00  .........v......
    Possible instruction pointers:

37  KERNEL32.DLL + 0x17614
    rsp = 0x0000009a1f7ffa60   rip = 0x00007ffa86e47614
    Found by: stack scanning

    Stack contents:
     0000009a1f7ffa60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ffa70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     0000009a1f7ffa80 00 00 00 00 00 00 00 00 a1 26 f8 86 fa 7f 00 00  .........&......
    Possible instruction pointers:

38  ntdll.dll + 0x526a1
    rsp = 0x0000009a1f7ffa90   rip = 0x00007ffa86f826a1
    Found by: stack scanning

Loaded modules:
0x74560000 - 0x75486fff  atiumd6a.dll  31.0.12044.3
0x7ff6a0860000 - 0x7ff6a4ffcfff  qemu-system-x86_64.exe  0.0.0.0  (main)  (WARNING: No symbols, qemu-system-x86_64.pdb, 227F42B30BE3FE2B4C4C44205044422E1)
0x7ffa0fe20000 - 0x7ffa127d6fff  amdvlk64.dll  31.0.12044.3
0x7ffa127e0000 - 0x7ffa158c8fff  libvulkan_lvp.dll  0.0.0.0  (WARNING: No symbols, libvulkan_lvp.dll, 000000000000000000000000000000000)
0x7ffa158d0000 - 0x7ffa1ced5fff  Qt6WebEngineCoreAndroidEmu.dll  6.5.3.0
0x7ffa1e630000 - 0x7ffa1ec6bfff  libGLES_CM.dll  4.0.0.1  (WARNING: No symbols, libGLES_CM.pdb, 95C2701FEFCF44F5BACC13544F2EA6171)
0x7ffa1ec70000 - 0x7ffa1f35ffff  libGLESv2.dll  4.0.0.1
0x7ffa1f360000 - 0x7ffa210fafff  libgfxstream_backend.dll  0.0.0.0  (WARNING: No symbols, libgfxstream_backend.pdb, B894D0B54965D6164C4C44205044422E1)
0x7ffa21100000 - 0x7ffa21567fff  Qt6QmlAndroidEmu.dll  6.5.3.0
0x7ffa21570000 - 0x7ffa21a63fff  Qt6QuickAndroidEmu.dll  6.5.3.0
0x7ffa21a70000 - 0x7ffa221b1fff  Qt6GuiAndroidEmu.dll  6.5.3.0
0x7ffa221c0000 - 0x7ffa22770fff  Qt6WidgetsAndroidEmu.dll  6.5.3.0
0x7ffa22780000 - 0x7ffa22cf0fff  Qt6CoreAndroidEmu.dll  6.5.3.0  (WARNING: No symbols, Qt6CoreAndroidEmu.pdb, A846CE1FFFEA486786DAB059FCAB37A21)
0x7ffa22d00000 - 0x7ffa23769fff  libandroid-emu-metrics.dll  0.0.0.0  (WARNING: No symbols, libandroid-emu-metrics.pdb, 5DFDC45735AEC3DF4C4C44205044422E1)
0x7ffa24b70000 - 0x7ffa24b7afff  midimap.dll  10.0.19041.488  (WARNING: No symbols, midimap.pdb, 7CD5318BADDF24FD5AF910EB112B262F1)
0x7ffa24b80000 - 0x7ffa24bc5fff  wdmaud.drv  10.0.19041.1
0x7ffa25e40000 - 0x7ffa26022fff  bdcamvk64.dll  1.1.0.111
0x7ffa34890000 - 0x7ffa355e4fff  atiumd64.dll  31.0.12044.3
0x7ffa35f40000 - 0x7ffa39bcafff  atio6axx.dll  31.0.12044.3  (WARNING: No symbols, atio6axx.pdb, BE1FFF52F1C041BEA29B0D8FEA5934951)
0x7ffa3a5c0000 - 0x7ffa3a5ecfff  atig6pxx.dll  31.0.12044.3
0x7ffa3a850000 - 0x7ffa3a868fff  USP10.dll  10.0.19041.546
0x7ffa442f0000 - 0x7ffa4431bfff  GLU32.dll  10.0.19041.2193
0x7ffa44320000 - 0x7ffa44444fff  opengl32.DLL  10.0.19041.2193
0x7ffa44450000 - 0x7ffa4446dfff  MSACM32.dll  10.0.19041.1
0x7ffa44ff0000 - 0x7ffa451bdfff  d3d9.dll  10.0.19041.2311
0x7ffa45510000 - 0x7ffa45533fff  dxva2.dll  10.0.19041.1
0x7ffa45790000 - 0x7ffa4582bfff  dsound.dll  10.0.19041.1  (WARNING: No symbols, dsound.pdb, 1380FD78F5886F3483654383FE4824051)
0x7ffa5c8d0000 - 0x7ffa5cc64fff  liblibprotobuf.dll  28.4.0.0  (WARNING: No symbols, liblibprotobuf.pdb, 5B00A733A50BDF644C4C44205044422E1)
0x7ffa5cea0000 - 0x7ffa5cf60fff  vulkan-1.dll  1.4.344.0
0x7ffa5cf70000 - 0x7ffa5cff6fff  qwebpAndroidEmu.dll  6.5.3.0  (WARNING: No symbols, qwebpAndroidEmu.pdb, 2F2C74BA4DEE4783B90B53C843932CA91)
0x7ffa5d180000 - 0x7ffa5d355fff  Qt6OpenGLAndroidEmu.dll  6.5.3.0
0x7ffa5d9a0000 - 0x7ffa5da08fff  qtiffAndroidEmu.dll  6.5.3.0
0x7ffa5da10000 - 0x7ffa5daa9fff  qjpegAndroidEmu.dll  6.5.3.0
0x7ffa5dab0000 - 0x7ffa5dbfcfff  Qt6NetworkAndroidEmu.dll  6.5.3.0
0x7ffa60140000 - 0x7ffa60165fff  winmmbase.dll  10.0.19041.1
0x7ffa62570000 - 0x7ffa62641fff  qwindowsAndroidEmu.dll  6.5.3.0
0x7ffa62700000 - 0x7ffa6272ffff  libEGL.dll  4.0.0.1
0x7ffa628a0000 - 0x7ffa628ecfff  graphics-hook64.dll  1.8.3.0  (WARNING: No symbols, graphics-hook64.pdb, 0FA6830329EE036D6BE0BC1E279E7C581)
0x7ffa628f0000 - 0x7ffa628fafff  qwbmpAndroidEmu.dll  6.5.3.0
0x7ffa62900000 - 0x7ffa6290bfff  qtgaAndroidEmu.dll  6.5.3.0
0x7ffa62910000 - 0x7ffa6291bfff  qsvgAndroidEmu.dll  6.5.3.0
0x7ffa63ce0000 - 0x7ffa63d28fff  pdh.dll  10.0.19041.1202
0x7ffa66c60000 - 0x7ffa66de1fff  AUDIOSES.DLL  10.0.19041.2364
0x7ffa681f0000 - 0x7ffa6840ffff  explorerframe.dll  10.0.19041.1949
0x7ffa68410000 - 0x7ffa6844dfff  dataexchange.dll  10.0.19041.1387
0x7ffa687d0000 - 0x7ffa68804fff  dbgcore.DLL  10.0.19041.2311
0x7ffa69b70000 - 0x7ffa69b7dfff  qicoAndroidEmu.dll  6.5.3.0
0x7ffa69be0000 - 0x7ffa69c86fff  Qt6QmlModelsAndroidEmu.dll  6.5.3.0
0x7ffa69ea0000 - 0x7ffa69eaefff  qicnsAndroidEmu.dll  6.5.3.0
0x7ffa69eb0000 - 0x7ffa6a018fff  libandroid-emu-protos.dll  0.0.0.0
0x7ffa6a080000 - 0x7ffa6a08dfff  qgifAndroidEmu.dll  6.5.3.0
0x7ffa6a090000 - 0x7ffa6a0a0fff  qsvgiconAndroidEmu.dll  6.5.3.0
0x7ffa6a0b0000 - 0x7ffa6a124fff  Qt6PositioningAndroidEmu.dll  6.5.3.0
0x7ffa6a130000 - 0x7ffa6a188fff  Qt6SvgAndroidEmu.dll  6.5.3.0
0x7ffa6a190000 - 0x7ffa6a21cfff  MSVCP140.dll  14.28.29914.0  (WARNING: No symbols, msvcp140.amd64.pdb, CB06088434114A61997C4FE549C2FCEC1)
0x7ffa6a220000 - 0x7ffa6a2effff  libabseil_dll.dll  0.0.0.0  (WARNING: No symbols, libabseil_dll.pdb, 79477A37865548EA4C4C44205044422E1)
0x7ffa6d790000 - 0x7ffa6d7acfff  MPR.dll  10.0.19041.1806
0x7ffa6ed60000 - 0x7ffa6ed78fff  NETAPI32.dll  10.0.19041.2130
0x7ffa71200000 - 0x7ffa71499fff  comctl32.dll  6.10.19041.1110
0x7ffa72f10000 - 0x7ffa72f2dfff  Qt6QuickWidgetsAndroidEmu.dll  6.5.3.0
0x7ffa72f30000 - 0x7ffa73054fff  libglib2_windows_msvc-x86_64.dll  0.0.0.0  (WARNING: No symbols, libglib2_windows_msvc-x86_64.pdb, BF270A06AB2A9F754C4C44205044422E1)
0x7ffa73590000 - 0x7ffa735befff  MSVCP140_2.dll  14.28.29914.0
0x7ffa736a0000 - 0x7ffa736ddfff  Qt6WebChannelAndroidEmu.dll  6.5.3.0
0x7ffa73930000 - 0x7ffa73960fff  Qt6WebSocketsAndroidEmu.dll  6.5.3.0
0x7ffa73fe0000 - 0x7ffa74051fff  libandroid-emu-curl.dll  0.0.0.0
0x7ffa74090000 - 0x7ffa7409bfff  WINUSB.DLL  10.0.19041.1
0x7ffa740a0000 - 0x7ffa740c9fff  Qt6WebEngineWidgetsAndroidEmu.dll  6.5.3.0
0x7ffa747e0000 - 0x7ffa74825fff  bthprops.cpl  10.0.19041.388
0x7ffa74cd0000 - 0x7ffa74cd8fff  MSVCP140_1.dll  14.28.29914.0
0x7ffa74ce0000 - 0x7ffa74cebfff  VCRUNTIME140_1.dll  14.28.29914.0
0x7ffa74d90000 - 0x7ffa74d98fff  ksuser.dll  10.0.19041.1
0x7ffa758e0000 - 0x7ffa75b5efff  DWrite.dll  10.0.19041.1566
0x7ffa75b60000 - 0x7ffa75d4cfff  urlmon.dll  11.0.19041.2251
0x7ffa75d50000 - 0x7ffa75e89fff  Windows.UI.Immersive.dll  10.0.19041.1526
0x7ffa75e90000 - 0x7ffa76140fff  iertutil.dll  11.0.19041.2130
0x7ffa79200000 - 0x7ffa7920cfff  msacm32.drv  10.0.19041.488
0x7ffa792d0000 - 0x7ffa792f7fff  srvcli.dll  10.0.19041.1645
0x7ffa79300000 - 0x7ffa79334fff  amdihk64.dll  2.0.0.1788
0x7ffa79380000 - 0x7ffa793a6fff  WINMM.dll  10.0.19041.546
0x7ffa793b0000 - 0x7ffa79501fff  InputHost.dll  10.0.19041.1741
0x7ffa79510000 - 0x7ffa796cafff  aticfx64.dll  31.0.12044.3
0x7ffa796d0000 - 0x7ffa797c8fff  TextInputFramework.dll  10.0.19041.2075
0x7ffa797d0000 - 0x7ffa79910fff  Windows.UI.dll  10.0.19041.746
0x7ffa7a460000 - 0x7ffa7a479fff  VCRUNTIME140.dll  14.28.29914.0
0x7ffa7a790000 - 0x7ffa7a7a4fff  libandroid-emu-tracing.dll  0.0.0.0
0x7ffa7b210000 - 0x7ffa7b21bfff  Secur32.dll  10.0.19041.546
0x7ffa7b860000 - 0x7ffa7b8e4fff  MMDevApi.dll  10.0.19041.1503  (WARNING: No symbols, MMDevAPI.pdb, 7D99781AF0C6C3BB8FD59E4F7C44AF201)
0x7ffa7bbc0000 - 0x7ffa7bbf6fff  BluetoothApis.dll  10.0.19041.546
0x7ffa7bc70000 - 0x7ffa7bd10fff  WindowManagementAPI.dll  0.0.0.0
0x7ffa7cea0000 - 0x7ffa7d09ffff  twinapi.appcore.dll  10.0.19041.1865
0x7ffa7d0a0000 - 0x7ffa7d1abfff  WINHTTP.dll  10.0.19041.2193
0x7ffa7d1b0000 - 0x7ffa7d1e3fff  atiu9p64.dll  31.0.12044.3
0x7ffa7d250000 - 0x7ffa7d25efff  Qt6SvgWidgetsAndroidEmu.dll  6.5.3.0
0x7ffa7d260000 - 0x7ffa7d271fff  libandroid-emu-base-logging.dll  0.0.0.0  (WARNING: No symbols, libandroid-emu-base-logging.pdb, 185D2DF31F6646E34C4C44205044422E1)
0x7ffa7d280000 - 0x7ffa7d288fff  libandroid-emu-agents.dll  0.0.0.0  (WARNING: No symbols, libandroid-emu-agents.pdb, E677606CBBE450464C4C44205044422E1)
0x7ffa7d740000 - 0x7ffa7d7effff  COMCTL32.dll  5.82.19041.1110
0x7ffa7da40000 - 0x7ffa7da49fff  VERSION.dll  10.0.19041.546
0x7ffa7dbd0000 - 0x7ffa7ddb3fff  dbghelp.dll  10.0.19041.867
0x7ffa7e940000 - 0x7ffa7e95cfff  dhcpcsvc.DLL  10.0.19041.2130
0x7ffa7e9d0000 - 0x7ffa7e9d9fff  AVRT.dll  10.0.19041.546
0x7ffa7eaa0000 - 0x7ffa7eab6fff  dhcpcsvc6.DLL  10.0.19041.2130
0x7ffa7eac0000 - 0x7ffa7eaf3fff  RTWorkQ.DLL  10.0.19041.1741
0x7ffa7ebc0000 - 0x7ffa7ebcafff  WINNSI.DLL  10.0.19041.546
0x7ffa7ebd0000 - 0x7ffa7ed8bfff  MFPlat.DLL  10.0.19041.746
0x7ffa7ee40000 - 0x7ffa7ef36fff  AppXDeploymentClient.dll  10.0.19041.2075
0x7ffa80280000 - 0x7ffa804e2fff  d3d11.dll  10.0.19041.2075
0x7ffa80c50000 - 0x7ffa80da3fff  wintypes.dll  10.0.19041.2311
0x7ffa80f90000 - 0x7ffa81085fff  PROPSYS.dll  7.0.19041.1741
0x7ffa81090000 - 0x7ffa81272fff  dcomp.dll  10.0.19041.2075
0x7ffa812e0000 - 0x7ffa812f3fff  WTSAPI32.dll  10.0.19041.546
0x7ffa81680000 - 0x7ffa819ddfff  CoreUIComponents.dll  10.0.19041.546
0x7ffa81b30000 - 0x7ffa81c21fff  CoreMessaging.dll  10.0.19041.2193
0x7ffa82030000 - 0x7ffa820cdfff  UxTheme.dll  10.0.19041.2193
0x7ffa82100000 - 0x7ffa82113fff  resourcepolicyclient.dll  10.0.19041.546
0x7ffa822f0000 - 0x7ffa8231efff  dwmapi.dll  10.0.19041.746
0x7ffa82500000 - 0x7ffa82511fff  kernel.appcore.dll  10.0.19041.546  (WARNING: No symbols, Kernel.Appcore.pdb, 5E49B3157247A4CEBABE3E86C162BF9C1)
0x7ffa82700000 - 0x7ffa82e91fff  windows.storage.dll  10.0.19041.2311
0x7ffa82ea0000 - 0x7ffa82eacfff  HID.DLL  10.0.19041.546
0x7ffa82ee0000 - 0x7ffa82fd2fff  dxgi.dll  10.0.19041.2311
0x7ffa833d0000 - 0x7ffa8341dfff  AUTHZ.dll  10.0.19041.1466
0x7ffa83690000 - 0x7ffa836c3fff  rsaenh.dll  10.0.19041.1052
0x7ffa837d0000 - 0x7ffa83802fff  ntmarta.dll  10.0.19041.546
0x7ffa83a60000 - 0x7ffa83a71fff  UMPDC.dll  0.0.0.0
0x7ffa83a80000 - 0x7ffa83abafff  IPHLPAPI.DLL  10.0.19041.1865
0x7ffa83ac0000 - 0x7ffa83acbfff  netutils.dll  10.0.19041.546
0x7ffa83ad0000 - 0x7ffa83b99fff  DNSAPI.dll  10.0.19041.1865
0x7ffa83ba0000 - 0x7ffa83beafff  POWRPROF.dll  10.0.19041.546  (WARNING: No symbols, powrprof.pdb, 269647D7A816FB97DF6E45324856DC361)
0x7ffa83de0000 - 0x7ffa83e49fff  mswsock.dll  10.0.19041.546  (WARNING: No symbols, mswsock.pdb, BCC0796E6035FC89CE7531FB953FB0721)
0x7ffa83fd0000 - 0x7ffa83fe7fff  CRYPTSP.dll  10.0.19041.546
0x7ffa83ff0000 - 0x7ffa83ffbfff  CRYPTBASE.DLL  10.0.19041.546
0x7ffa84080000 - 0x7ffa840affff  Wldp.dll  10.0.19041.2311
0x7ffa840b0000 - 0x7ffa840eafff  NTASN1.dll  10.0.19041.546
0x7ffa840f0000 - 0x7ffa84116fff  ncrypt.dll  10.0.19041.662
0x7ffa84210000 - 0x7ffa84221fff  MSASN1.dll  10.0.19041.2251
0x7ffa843d0000 - 0x7ffa843fbfff  DEVOBJ.dll  10.0.19041.1620
0x7ffa844e0000 - 0x7ffa8450dfff  USERENV.dll  10.0.19041.572
0x7ffa84510000 - 0x7ffa84541fff  SSPICLI.DLL  10.0.19041.2130
0x7ffa84560000 - 0x7ffa8457efff  profapi.dll  10.0.19041.844
0x7ffa84620000 - 0x7ffa846bcfff  msvcp_win.dll  10.0.19041.789
0x7ffa84770000 - 0x7ffa8486ffff  ucrtbase.dll  10.0.19041.789  (WARNING: No symbols, ucrtbase.pdb, 152B3C4F5E1CE0FE6BC36E9F0F2B10E61)
0x7ffa84870000 - 0x7ffa848d8fff  WINTRUST.dll  10.0.19041.2486
0x7ffa848e0000 - 0x7ffa84906fff  bcrypt.dll  10.0.19041.2486
0x7ffa84910000 - 0x7ffa84a1efff  gdi32full.dll  10.0.19041.2364
0x7ffa84a20000 - 0x7ffa84aa1fff  bcryptPrimitives.dll  10.0.19041.2486
0x7ffa84ab0000 - 0x7ffa84afdfff  cfgmgr32.dll  10.0.19041.1620
0x7ffa84b00000 - 0x7ffa84b21fff  win32u.dll  10.0.19041.2486  (WARNING: No symbols, win32u.pdb, 771C2E28AD611FA7EDEE8227DA66C9351)
0x7ffa84b30000 - 0x7ffa84c85fff  CRYPT32.dll  10.0.19041.2486
0x7ffa84c90000 - 0x7ffa84f61fff  KERNELBASE.dll  10.0.19041.2364  (WARNING: No symbols, kernelbase.pdb, 3A8F1E13C59E59072D268F31DB7E9E231)
0x7ffa84f70000 - 0x7ffa85099fff  ole32.dll  10.0.19041.1202
0x7ffa850a0000 - 0x7ffa85240fff  USER32.dll  10.0.19041.2486  (WARNING: No symbols, user32.pdb, B778230F766999847BC8B8E3441B2C211)
0x7ffa85250000 - 0x7ffa852a5fff  WLDAP32.dll  10.0.19041.2006
0x7ffa852b0000 - 0x7ffa8531afff  WS2_32.dll  10.0.19041.546  (WARNING: No symbols, ws2_32.pdb, 5C73FC6F5404081459A8538913657C761)
0x7ffa85330000 - 0x7ffa853fcfff  OLEAUT32.dll  10.0.19041.985
0x7ffa85400000 - 0x7ffa85754fff  combase.dll  10.0.19041.2311  (WARNING: No symbols, combase.pdb, A0851DDE9F6999237405B219EB1A0CCE1)
0x7ffa85760000 - 0x7ffa85ea3fff  SHELL32.dll  10.0.19041.2486
0x7ffa86060000 - 0x7ffa860fbfff  sechost.dll  10.0.19041.1865
0x7ffa86190000 - 0x7ffa86197fff  Normaliz.dll  10.0.19041.546
0x7ffa861a0000 - 0x7ffa862b4fff  MSCTF.dll  10.0.19041.2193
0x7ffa862c0000 - 0x7ffa8636dfff  ADVAPI32.dll  10.0.19041.2130
0x7ffa863f0000 - 0x7ffa864c9fff  COMDLG32.dll  10.0.19041.1806
0x7ffa864d0000 - 0x7ffa8656dfff  msvcrt.dll  7.0.19041.546
0x7ffa86570000 - 0x7ffa865c4fff  SHLWAPI.dll  10.0.19041.2075
0x7ffa86650000 - 0x7ffa8667afff  GDI32.dll  10.0.19041.2130
0x7ffa86680000 - 0x7ffa866b1fff  IMM32.dll  10.0.19041.2193
0x7ffa866c0000 - 0x7ffa866c7fff  NSI.dll  10.0.19041.610
0x7ffa866d0000 - 0x7ffa8677efff  clbcatq.dll  2001.12.10941.16384
0x7ffa86780000 - 0x7ffa8682cfff  shcore.dll  10.0.19041.1865
0x7ffa86830000 - 0x7ffa86954fff  RPCRT4.dll  10.0.19041.2486  (WARNING: No symbols, rpcrt4.pdb, B41457164CE3EA74F690B758AA4B66B41)
0x7ffa869c0000 - 0x7ffa86e27fff  SETUPAPI.dll  10.0.19041.2193
0x7ffa86e30000 - 0x7ffa86eeefff  KERNEL32.DLL  10.0.19041.2364  (WARNING: No symbols, kernel32.pdb, 852705B866FD67C036EC2C9D81F65DD21)
0x7ffa86f30000 - 0x7ffa87127fff  ntdll.dll  10.0.19041.2130  (WARNING: No symbols, ntdll.pdb, CCC0E36120F424BE044DE630C3BD80C41)
MDRawCrashpadInfo
  version = 1
  report_id = 5d82989b-2a2d-43da-9db6-79a201de4724
  client_id = 0ea9cc4a-11d7-4cfc-8af1-0dfb8eee3eee
  simple_annotations["prod"] = AndroidEmulator
  simple_annotations["ver"] = 36.5.11-15261927
  module_list[0].minidump_module_list_index = 0
  module_list[0].version = 1
  address_mask = 0

thread requested=3