Id: | AVR:Free 41b.646 |
Description: | Access violation while reading freed memory at 0x6F084FBF50 |
Location: | microsoftedgecp.exe!edgehtml.dll!Tree::ANode::IsInTree |
Security impact: | Potentially exploitable security issue |
- EDGEHTML.dll!Tree::ANode::IsInTree + 0xE (41b in id)
- EDGEHTML.dll!Tree::TreeWriter::Notify_BeforeRemoveNode + 0x285B29 (this may not be correct) (646 in id)
- EDGEHTML.dll!Tree::TreeWriter::RemoveNode + 0x171
- EDGEHTML.dll!CElement::MoveToSeparateMarkup + 0x5187F3 (this may not be correct)
- EDGEHTML.dll!CElement::PutTextContentHelper + 0x7E
- EDGEHTML.dll!CElement::put_textContent + 0x50
- EDGEHTML.dll!CDOMNode::Var_set_textContent + 0x60
- EDGEHTML.dll!CFastDOM::CNode::Trampoline_Set_textContent + 0x71
- chakra.dll!amd64_CallFunction + 0x93
- chakra.dll!Js::JavascriptExternalFunction::ExternalFunctionThunk + 0x172
- chakra.dll!<lambda_2bce0de19d44809631fc237adaea42bb>::operator() + 0xBA
- chakra.dll!Js::JavascriptOperators::CallSetter + 0xAF
- chakra.dll!Js::JavascriptOperators::SetProperty_Internal<0> + 0xC9C
- chakra.dll!Js::JavascriptOperators::OP_SetProperty + 0x8F
- chakra.dll!Js::JavascriptOperators::PatchPutValueNoFastPath + 0x82
- chakra.dll!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0> + 0x1E5
- chakra.dll!Js::InterpreterStackFrame::ProcessProfiled + 0x44C
- chakra.dll!Js::InterpreterStackFrame::Process + 0xD2
- chakra.dll!Js::InterpreterStackFrame::InterpreterHelper + 0x368
- chakra.dll!Js::InterpreterStackFrame::InterpreterThunk + 0x55
- 0x6F142A0FBA
- chakra.dll!amd64_CallFunction + 0x93
- chakra.dll!Js::JavascriptFunction::CallFunction<1> + 0x83
- chakra.dll!Js::JavascriptFunction::CallRootFunctionInternal + 0x11A
- chakra.dll!Js::JavascriptFunction::CallRootFunction + 0x33
- chakra.dll!ScriptSite::CallRootFunction + 0xAA
- chakra.dll!ScriptSite::Execute + 0x134
- chakra.dll!ScriptEngineBase::Execute + 0xCC
- EDGEHTML.dll!CListenerDispatch::InvokeVar + 0x264
- EDGEHTML.dll!CListenerDispatch::Invoke + 0x92
- EDGEHTML.dll!CEventMgr::_InvokeListeners + 0x39C
- EDGEHTML.dll!CEventMgr::_InvokeListenersOnWindow + 0x5D
- EDGEHTML.dll!CEventMgr::Dispatch + 0x357
- EDGEHTML.dll!CEventMgr::DispatchEvent + 0x6A
- EDGEHTML.dll!COmWindowProxy::Fire_onload + 0x13C
- EDGEHTML.dll!CMarkup::OnLoadStatusDone + 0x3BA
- EDGEHTML.dll!CMarkup::OnLoadStatus + 0xE5
- EDGEHTML.dll!CProgSink::DoUpdate + 0x380
- EDGEHTML.dll!GlobalWndOnMethodCall + 0x2BD
- EDGEHTML.dll!GlobalWndProc + 0x108
- USER32.dll!UserCallWinProcCheckWow + 0x1FC
- USER32.dll!DispatchMessageWorker + 0x1A7
- EMODEL.dll!CTabWindow::_TabWindowThreadProc + 0x5B8
- EMODEL.dll!LCIETab_ThreadProc + 0x2BB
- iertutil.dll!_IsoThreadProc_WrapperToReleaseScope + 0x1F
- KERNEL32.DLL!BaseThreadInitThunk + 0x22
- ntdll.dll!RtlUserThreadStart + 0x34
address 0000006f084fbf50 found in
_DPH_HEAP_ROOT @ 6f08441000
in free-ed allocation ( DPH_HEAP_BLOCK: VirtAddr VirtSize)
6f08442068: 6f084fb000 2000
00007ffc9077cc13 ntdll!RtlDebugFreeHeap+0x0000000000000047
00007ffc907353d9 ntdll!RtlpFreeHeap+0x0000000000079519
00007ffc906baa16 ntdll!RtlFreeHeap+0x0000000000000106
00007ffc7d1f366c EDGEHTML!MemoryProtection::HeapFree+0x00000000003736dc
00007ffc7cf45807 EDGEHTML!CTreeNode::NodeRelease+0x0000000000000057
00007ffc7ce848a4 EDGEHTML!CSpliceTreeEngine::RemoveSplice+0x0000000000001294
00007ffc7cf45c4b EDGEHTML!Tree::TreeWriter::SpliceTreeInternal+0x000000000000010b
00007ffc7cf403b0 EDGEHTML!Tree::TreeWriter::CutCopyMoveLegacy+0x00000000000004e0
00007ffc7cf3d7a3 EDGEHTML!Tree::TreeWriter::MoveNodeLegacy+0x0000000000000193
00007ffc7cfa070c EDGEHTML!Tree::TreeWriter::PrependChild+0x000000000000003c
00007ffc7d21afda EDGEHTML!CElement::MoveToSeparateMarkup+0x00000000005187de
00007ffc7d07468e EDGEHTML!CElement::PutTextContentHelper+0x000000000000007e
00007ffc7d0745e0 EDGEHTML!CElement::put_textContent+0x0000000000000050
00007ffc7d074570 EDGEHTML!CDOMNode::Var_set_textContent+0x0000000000000060
00007ffc7d0744f1 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x0000000000000071
00007ffc7bfdc703 chakra!amd64_CallFunction+0x0000000000000093
00007ffc7be08e72 chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x0000000000000172
00007ffc7be01b7e chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0x00000000000000ba
00007ffc7bebccf7 chakra!Js::JavascriptOperators::CallSetter+0x00000000000000af
00007ffc7beca7fc chakra!Js::JavascriptOperators::SetProperty_Internal<0>+0x0000000000000c9c
00007ffc7bf29fff chakra!Js::JavascriptOperators::OP_SetProperty+0x000000000000008f
00007ffc7bf29f1a chakra!Js::JavascriptOperators::PatchPutValueNoFastPath+0x0000000000000082
00007ffc7be0e325 chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x00000000000001e5
00007ffc7be151cc chakra!Js::InterpreterStackFrame::ProcessProfiled+0x000000000000044c
00007ffc7be12fc2 chakra!Js::InterpreterStackFrame::Process+0x00000000000000d2
00007ffc7bf57be8 chakra!Js::InterpreterStackFrame::InterpreterHelper+0x0000000000000368
00007ffc7bf57875 chakra!Js::InterpreterStackFrame::InterpreterThunk+0x0000000000000055
0000006f142a0fb2 +0x0000006f142a0fb2
00007ffc`7ce85dee 4883c420 add rsp,20h
00007ffc`7ce85df2 5b pop rbx
00007ffc`7ce85df3 e920f0f3ff jmp EDGEHTML!Tree::ElementNode::GetSubordinateBridge (00007ffc`7cdc4e18)
00007ffc`7ce85df8 cc int 3
00007ffc`7ce85df9 cc int 3
00007ffc`7ce85dfa cc int 3
00007ffc`7ce85dfb cc int 3
00007ffc`7ce85dfc cc int 3
00007ffc`7ce85dfd cc int 3
00007ffc`7ce85dfe cc int 3
00007ffc`7ce85dff cc int 3
EDGEHTML!Tree::ANode::IsInTree:
00007ffc`7ce85e00 48894c2408 mov qword ptr [rsp+8],rcx
00007ffc`7ce85e05 4883ec28 sub rsp,28h
00007ffc`7ce85e09 488b442430 mov rax,qword ptr [rsp+30h]
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10 mov edx,dword ptr [rax] ⇐ instruction pointer
00007ffc`7ce85e10 f6c204 test dl,4
00007ffc`7ce85e13 7525 jne EDGEHTML!Tree::ANode::IsInTree+0x3a (00007ffc`7ce85e3a)
00007ffc`7ce85e15 f6406202 test byte ptr [rax+62h],2
00007ffc`7ce85e19 741b je EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e1b 488b4810 mov rcx,qword ptr [rax+10h]
00007ffc`7ce85e1f 480b4808 or rcx,qword ptr [rax+8]
00007ffc`7ce85e23 7411 je EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e25 488b4838 mov rcx,qword ptr [rax+38h]
00007ffc`7ce85e29 480b4830 or rcx,qword ptr [rax+30h]
00007ffc`7ce85e2d 7407 je EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e2f b001 mov al,1
00007ffc`7ce85e31 4883c428 add rsp,28h
00007ffc`7ce85e35 c3 ret
00007ffc`7ce85e36 32c0 xor al,al
00007ffc`7ce85e38 ebf7 jmp EDGEHTML!Tree::ANode::IsInTree+0x31 (00007ffc`7ce85e31)
00007ffc`7ce85e3a 488b4810 mov rcx,qword ptr [rax+10h]
00007ffc`7ce85e3e 480b4808 or rcx,qword ptr [rax+8]
rax=0000006f084fbf50 rbx=0000006f0a22b220 rcx=0000006f084fbf50
rdx=0000006f0a22ac98 rsi=0000006f084fbf50 rdi=0000000000000001
rip=00007ffc7ce85e0e rsp=0000006f0a22aee0 rbp=0000006f0a22b010
r8=0000006f0fccfa20 r9=0000006f03fa9b90 r10=00007ffc7cfe3ac0
r11=00007ffc7cf78290 r12=0000000000000000 r13=0000006f084fbf50
r14=0000006f084d9950 r15=0000006f084fbf50
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
fpcw=027F fpsw=0000 fptw=0000
st0= 0.000000000000000000000e+0000 st1= 0.000000000000000000000e+0000
st2= 0.000000000000000000000e+0000 st3= 0.000000000000000000000e+0000
st4= 0.000000000000000000000e+0000 st5= 0.000000000000000000000e+0000
st6= 0.000000000000000000000e+0000 st7= 0.000000000000000000000e+0000
mm0=0000000000000000 mm1=0000000000000000
mm2=0000000000000000 mm3=0000000000000000
mm4=0000000000000000 mm5=0000000000000000
mm6=0000000000000000 mm7=0000000000000000
xmm0=0 0 0 0
xmm1=0 0 0 0
xmm2=0 0 0 0
xmm3=0 0 0 0
xmm4=0 0 0 0
xmm5=0 0 0 0
xmm6=0 0 0 0
xmm7=0 0 0 0
xmm8=0 0 0 0
xmm9=0 0 0 0
xmm10=0 0 0 0
xmm11=0 0 0 0
xmm12=0 0 0 0
xmm13=0 0 0 0
xmm14=0 0 0 0
xmm15=0 0 0 0
dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000
dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10 mov edx,dword ptr [rax] ds:0000006f`084fbf50=????????
0000006f`084fbed0 ????????`????????
0000006f`084fbed8 ????????`????????
0000006f`084fbee0 ????????`????????
0000006f`084fbee8 ????????`????????
0000006f`084fbef0 ????????`????????
0000006f`084fbef8 ????????`????????
0000006f`084fbf00 ????????`????????
0000006f`084fbf08 ????????`????????
0000006f`084fbf10 ????????`????????
0000006f`084fbf18 ????????`????????
0000006f`084fbf20 ????????`????????
0000006f`084fbf28 ????????`????????
0000006f`084fbf30 ????????`????????
0000006f`084fbf38 ????????`????????
0000006f`084fbf40 ????????`????????
0000006f`084fbf48 ????????`????????
0000006f`084fbf50 ????????`????????
0000006f`084fbf58 ????????`????????
0000006f`084fbf60 ????????`????????
0000006f`084fbf68 ????????`????????
0000006f`084fbf70 ????????`????????
0000006f`084fbf78 ????????`????????
0000006f`084fbf80 ????????`????????
0000006f`084fbf88 ????????`????????
0000006f`084fbf90 ????????`????????
0000006f`084fbf98 ????????`????????
0000006f`084fbfa0 ????????`????????
0000006f`084fbfa8 ????????`????????
0000006f`084fbfb0 ????????`????????
0000006f`084fbfb8 ????????`????????
0000006f`084fbfc0 ????????`????????
0000006f`084fbfc8 ????????`????????
Loaded symbol image file: C:\Windows\SYSTEM32\EDGEHTML.dll
Image path: C:\Windows\SYSTEM32\EDGEHTML.dll
Image name: EDGEHTML.dll
Timestamp: Tue Feb 23 11:48:08 2016 (56CC38E8)
CheckSum: 014DD388
ImageSize: 014EF000
File version: 11.0.10240.16724
Product version: 11.0.10240.16724
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Internet Explorer
InternalName: EDGEHTML
OriginalFilename: EDGEHTML.DLL
ProductVersion: 11.00.10240.16724
FileVersion: 11.00.10240.16724 (th1_st1.160222-1812)
FileDescription: Microsoft (R) HTML Viewer
LegalCopyright: � Microsoft Corporation. All rights reserved.
Image path: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
Image name: microsoftedgecp.exe
Timestamp: Wed Nov 25 05:17:08 2015 (56553644)
CheckSum: 0004DF0B
ImageSize: 0004D000
File version: 11.0.10240.16603
Product version: 11.0.10240.16603
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft Edge
InternalName: MicrosoftEdgeCP
OriginalFilename: MicrosoftEdgeCP.exe
ProductVersion: 11.00.10240.16603
FileVersion: 11.00.10240.16603 (th1_st1.151124-1750)
FileDescription: Microsoft Edge Content Process
LegalCopyright: � Microsoft Corporation. All rights reserved.
Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
*** wait with pending attach
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*http://msdl.microsoft.com/download/symbols
Deferred cache*C:\Symbols
Deferred cache*\\server\Symbols
Deferred srv*http://symbols.mozilla.org/firefox
Deferred srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is:
ModLoad: 00007ff6`a5060000 00007ff6`a5076000 C:\Windows\System32\RuntimeBroker.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000 C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000 C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000 C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000 C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000 C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000 C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000 C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000 C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000 C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000 C:\Windows\System32\bcryptPrimitives.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000 C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000 C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000 C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000 C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000 C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000 C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8fc70000 00007ffc`8fd15000 C:\Windows\system32\clbcatq.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000 C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000 C:\Windows\System32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000 C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000 C:\Windows\System32\CRYPTBASE.dll
ModLoad: 00007ffc`857f0000 00007ffc`85815000 C:\Windows\System32\Windows.ApplicationModel.Core.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000 C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000 C:\Windows\SYSTEM32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000 C:\Windows\System32\USERENV.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000 C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000 C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000 C:\Windows\system32\SspiCli.dll
ModLoad: 00007ffc`82f60000 00007ffc`82f76000 C:\Windows\SYSTEM32\capauthz.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000 C:\Windows\system32\apphelp.dll
(764.1090): Break instruction exception - code 80000003 (first chance)
ntdll!DbgBreakPoint:
00007ffc`907253e0 cc int 3
Create process 1892 breakpoint.
0:007> g
*** wait with pending attach
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*http://msdl.microsoft.com/download/symbols
Deferred cache*C:\Symbols
Deferred cache*\\server\Symbols
Deferred srv*http://symbols.mozilla.org/firefox
Deferred srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is:
ModLoad: 00007ff7`d6770000 00007ff7`d677a000 C:\Windows\system32\browser_broker.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000 C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000 C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000 C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000 C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000 C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000 C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000 C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000 C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000 C:\Windows\system32\user32.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000 C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000 C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000 C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000 C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000 C:\Windows\system32\bcryptPrimitives.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000 C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8a550000 00007ffc`8a568000 C:\Windows\SYSTEM32\browserbroker.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000 C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`905d0000 00007ffc`9068e000 C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8d210000 00007ffc`8d3d1000 C:\Windows\system32\CRYPT32.dll
ModLoad: 00007ffc`8d140000 00007ffc`8d151000 C:\Windows\system32\MSASN1.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000 C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000 C:\Windows\system32\advapi32.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000 C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000 C:\Windows\system32\shlwapi.dll
ModLoad: 00007ffc`8c300000 00007ffc`8c31c000 C:\Windows\SYSTEM32\MPR.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000 C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000 C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000 C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8c4e0000 00007ffc`8c4ea000 C:\Windows\SYSTEM32\DPAPI.DLL
ModLoad: 00007ffc`8fc70000 00007ffc`8fd15000 C:\Windows\system32\clbcatq.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000 C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000 C:\Windows\system32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000 C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000 C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000 C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000 C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000 C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000 C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000 C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000 C:\Windows\system32\profapi.dll
(1244.594): Break instruction exception - code 80000003 (first chance)
Create process 4676 breakpoint.
1:017> g
*** wait with pending attach
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*http://msdl.microsoft.com/download/symbols
Deferred cache*C:\Symbols
Deferred cache*\\server\Symbols
Deferred srv*http://symbols.mozilla.org/firefox
Deferred srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is:
ModLoad: 00007ff6`efb70000 00007ff6`f016e000 C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000 C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000 C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000 C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000 C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000 C:\Windows\system32\apphelp.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000 C:\Windows\system32\ADVAPI32.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000 C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000 C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000 C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000 C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000 C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000 C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000 C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8a400000 00007ffc`8a46a000 C:\Windows\SYSTEM32\wincorlib.DLL
ModLoad: 00007ffc`905d0000 00007ffc`9068e000 C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000 C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000 C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000 C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000 C:\Windows\SYSTEM32\bcryptPrimitives.dll
ModLoad: 00007ffc`89250000 00007ffc`8a246000 C:\Windows\System32\Windows.UI.Xaml.dll
ModLoad: 00007ffc`89110000 00007ffc`89241000 C:\Windows\SYSTEM32\wintypes.dll
ModLoad: 00007ffc`8b130000 00007ffc`8b1f8000 C:\Windows\SYSTEM32\CoreMessaging.dll
ModLoad: 00007ffc`8b260000 00007ffc`8b2c6000 C:\Windows\SYSTEM32\Bcp47Langs.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000 C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000 C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`8b0d0000 00007ffc`8b12c000 C:\Windows\SYSTEM32\NInput.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000 C:\Windows\System32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000 C:\Windows\SYSTEM32\USERENV.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000 C:\Windows\SYSTEM32\bcrypt.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000 C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000 C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000 C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000 C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8b210000 00007ffc`8b228000 C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EShims.dll
ModLoad: 00007ffc`782b0000 00007ffc`78806000 C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eModel.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000 C:\Windows\system32\SHLWAPI.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000 C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000 C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000 C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8dd10000 00007ffc`8dd54000 C:\Windows\system32\cfgmgr32.dll
ModLoad: 00007ffc`8bd30000 00007ffc`8bdb2000 C:\Windows\SYSTEM32\firewallapi.dll
ModLoad: 00007ffc`8bcf0000 00007ffc`8bd22000 C:\Windows\SYSTEM32\fwbase.dll
ModLoad: 00007ffc`83610000 00007ffc`83a7a000 C:\Windows\System32\ActXPrxy.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000 C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8aed0000 00007ffc`8aef2000 C:\Windows\SYSTEM32\dwmapi.dll
ModLoad: 00007ffc`83b80000 00007ffc`83de1000 C:\Windows\system32\CoreUIComponents.dll
ModLoad: 00007ffc`8ab80000 00007ffc`8ac1c000 C:\Windows\SYSTEM32\dxgi.dll
ModLoad: 00007ffc`8ac20000 00007ffc`8aec3000 C:\Windows\SYSTEM32\d3d11.dll
ModLoad: 00007ffc`8a910000 00007ffc`8ab7e000 C:\Windows\SYSTEM32\d3d10warp.dll
ModLoad: 00007ffc`7ef90000 00007ffc`7efc4000 C:\Windows\System32\Windows.ApplicationModel.dll
ModLoad: 00007ffc`884d0000 00007ffc`88a15000 C:\Windows\SYSTEM32\d2d1.dll
ModLoad: 00007ffc`79fa0000 00007ffc`7a323000 C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eView.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000 C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`8b2d0000 00007ffc`8b3a1000 C:\Windows\System32\dcomp.dll
ModLoad: 00007ffc`8a2f0000 00007ffc`8a3ff000 C:\Windows\System32\MrmCoreR.dll
ModLoad: 00007ffc`8a250000 00007ffc`8a2ee000 C:\Windows\System32\Windows.UI.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000 C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000 C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000 C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000 C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`827b0000 00007ffc`827f6000 C:\Windows\system32\DataExchange.dll
ModLoad: 00007ffc`8df70000 00007ffc`8dfd9000 C:\Windows\system32\WS2_32.dll
ModLoad: 00007ffc`8f790000 00007ffc`8f798000 C:\Windows\system32\NSI.dll
ModLoad: 00007ffc`8af20000 00007ffc`8b0a3000 C:\Windows\SYSTEM32\PROPSYS.dll
ModLoad: 00007ffc`850a0000 00007ffc`850b5000 C:\Windows\SYSTEM32\ondemandconnroutehelper.dll
ModLoad: 00007ffc`88a60000 00007ffc`88a98000 C:\Windows\SYSTEM32\IPHLPAPI.DLL
ModLoad: 00007ffc`88a50000 00007ffc`88a5b000 C:\Windows\SYSTEM32\WINNSI.DLL
ModLoad: 00007ffc`87870000 00007ffc`87946000 C:\Windows\SYSTEM32\winhttp.dll
ModLoad: 00007ffc`8c8d0000 00007ffc`8c92d000 C:\Windows\system32\mswsock.dll
ModLoad: 00007ffc`86570000 00007ffc`865a9000 C:\Windows\SYSTEM32\policymanager.dll
ModLoad: 00007ffc`864d0000 00007ffc`86562000 C:\Windows\SYSTEM32\msvcp110_win.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000 C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`83b40000 00007ffc`83b52000 C:\Windows\System32\Windows.Shell.ServiceHostBuilder.dll
ModLoad: 00007ffc`83150000 00007ffc`83165000 C:\Windows\system32\execmodelproxy.dll
ModLoad: 00007ffc`7c8d0000 00007ffc`7ca72000 C:\Windows\SYSTEM32\ieapfltr.dll
ModLoad: 00007ffc`85ea0000 00007ffc`86026000 C:\Windows\System32\Windows.Globalization.dll
ModLoad: 00007ffc`835d0000 00007ffc`8360f000 C:\Windows\System32\netprofm.dll
ModLoad: 00007ffc`830b0000 00007ffc`830be000 C:\Windows\System32\npmproxy.dll
ModLoad: 00007ffc`8c6d0000 00007ffc`8c778000 C:\Windows\SYSTEM32\DNSAPI.dll
ModLoad: 00007ffc`86060000 00007ffc`862b9000 C:\Windows\SYSTEM32\dwrite.dll
ModLoad: 00007ffc`8f720000 00007ffc`8f78f000 C:\Windows\system32\coml2.dll
ModLoad: 00007ffc`8b6e0000 00007ffc`8b706000 C:\Windows\SYSTEM32\SLC.dll
ModLoad: 00007ffc`8b680000 00007ffc`8b6a5000 C:\Windows\SYSTEM32\sppc.dll
ModLoad: 00007ffc`83370000 00007ffc`833b3000 C:\Windows\System32\execmodelclient.dll
ModLoad: 00007ffc`874d0000 00007ffc`87542000 C:\Windows\SYSTEM32\MMDevAPI.DLL
ModLoad: 00007ffc`8b990000 00007ffc`8b9b7000 C:\Windows\SYSTEM32\DEVOBJ.dll
ModLoad: 00007ffc`86700000 00007ffc`8670a000 C:\Windows\System32\rasadhlp.dll
ModLoad: 00007ffc`87030000 00007ffc`87098000 C:\Windows\System32\fwpuclnt.dll
ModLoad: 00007ffc`7f8f0000 00007ffc`7f94a000 C:\Windows\System32\Windows.Graphics.dll
ModLoad: 00007ffc`8bdc0000 00007ffc`8bde8000 C:\Windows\System32\rmclient.dll
ModLoad: 00007ffc`857f0000 00007ffc`85815000 C:\Windows\System32\Windows.ApplicationModel.Core.dll
ModLoad: 00007ffc`84730000 00007ffc`84a50000 C:\Windows\SYSTEM32\msftedit.dll
ModLoad: 00007ffc`84700000 00007ffc`8472e000 C:\Windows\SYSTEM32\globinputhost.dll
ModLoad: 00007ffc`85e80000 00007ffc`85e98000 C:\Windows\System32\Windows.Globalization.Fontgroups.dll
ModLoad: 00007ffc`85e70000 00007ffc`85e7a000 C:\Windows\SYSTEM32\fontgroupsoverride.dll
ModLoad: 00007ffc`857c0000 00007ffc`857e6000 C:\Windows\System32\Windows.System.Profile.RetailInfo.dll
ModLoad: 00007ffc`82960000 00007ffc`82a1a000 C:\Windows\system32\twinapi.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000 C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`7f950000 00007ffc`7f9a3000 C:\Windows\System32\Windows.Storage.ApplicationData.dll
ModLoad: 00007ffc`85de0000 00007ffc`85e69000 C:\Windows\system32\directmanipulation.dll
(774.2cc): Break instruction exception - code 80000003 (first chance)
Create process 1908 breakpoint.
2:057> g
*** wait with pending attach
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*http://msdl.microsoft.com/download/symbols
Deferred cache*C:\Symbols
Deferred cache*\\server\Symbols
Deferred srv*http://symbols.mozilla.org/firefox
Deferred srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is:
ModLoad: 00007ff6`78150000 00007ff6`7819d000 C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000 C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000 C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000 C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000 C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000 C:\Windows\system32\apphelp.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000 C:\Windows\system32\ADVAPI32.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000 C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000 C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000 C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000 C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000 C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000 C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000 C:\Windows\system32\combase.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000 C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000 C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000 C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`84be0000 00007ffc`84e54000 C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10240.16384_none_f41f7b285750ef43\Comctl32.dll
ModLoad: 00007ffc`782b0000 00007ffc`78806000 C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EMODEL.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000 C:\Windows\system32\SHLWAPI.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000 C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000 C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000 C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000 C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000 C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000 C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`905d0000 00007ffc`9068e000 C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8dd10000 00007ffc`8dd54000 C:\Windows\system32\cfgmgr32.dll
ModLoad: 00007ffc`8bd30000 00007ffc`8bdb2000 C:\Windows\SYSTEM32\firewallapi.dll
ModLoad: 00007ffc`8bcf0000 00007ffc`8bd22000 C:\Windows\SYSTEM32\fwbase.dll
ModLoad: 00007ffc`8b210000 00007ffc`8b228000 C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EShims.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000 C:\Windows\SYSTEM32\bcryptPrimitives.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000 C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000 C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000 C:\Windows\SYSTEM32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000 C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000 C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000 C:\Windows\SYSTEM32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000 C:\Windows\SYSTEM32\USERENV.dll
ModLoad: 00007ffc`7cc90000 00007ffc`7e17f000 C:\Windows\SYSTEM32\EDGEHTML.dll
ModLoad: 00007ffc`7bd90000 00007ffc`7c4c8000 C:\Windows\SYSTEM32\chakra.dll
ModLoad: 00007ffc`7cc50000 00007ffc`7cc8d000 C:\Windows\SYSTEM32\MLANG.dll
ModLoad: 00007ffc`89110000 00007ffc`89241000 C:\Windows\System32\WinTypes.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000 C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000 C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`8df70000 00007ffc`8dfd9000 C:\Windows\system32\WS2_32.dll
ModLoad: 00007ffc`8f790000 00007ffc`8f798000 C:\Windows\system32\NSI.dll
ModLoad: 00007ffc`850a0000 00007ffc`850b5000 C:\Windows\SYSTEM32\ondemandconnroutehelper.dll
ModLoad: 00007ffc`88a60000 00007ffc`88a98000 C:\Windows\SYSTEM32\IPHLPAPI.DLL
ModLoad: 00007ffc`88a50000 00007ffc`88a5b000 C:\Windows\SYSTEM32\WINNSI.DLL
ModLoad: 00007ffc`87870000 00007ffc`87946000 C:\Windows\SYSTEM32\winhttp.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000 C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000 C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`8c8d0000 00007ffc`8c92d000 C:\Windows\system32\mswsock.dll
ModLoad: 00007ffc`8aed0000 00007ffc`8aef2000 C:\Windows\SYSTEM32\dwmapi.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000 C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`7c8d0000 00007ffc`7ca72000 C:\Windows\SYSTEM32\ieapfltr.dll
ModLoad: 00007ffc`86570000 00007ffc`865a9000 C:\Windows\SYSTEM32\policymanager.dll
ModLoad: 00007ffc`864d0000 00007ffc`86562000 C:\Windows\SYSTEM32\msvcp110_win.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000 C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`8c6d0000 00007ffc`8c778000 C:\Windows\SYSTEM32\DNSAPI.dll
ModLoad: 00007ffc`827b0000 00007ffc`827f6000 C:\Windows\system32\dataexchange.dll
ModLoad: 00007ffc`884d0000 00007ffc`88a15000 C:\Windows\SYSTEM32\d2d1.dll
ModLoad: 00007ffc`8ac20000 00007ffc`8aec3000 C:\Windows\SYSTEM32\d3d11.dll
ModLoad: 00007ffc`8b2d0000 00007ffc`8b3a1000 C:\Windows\SYSTEM32\dcomp.dll
ModLoad: 00007ffc`8ab80000 00007ffc`8ac1c000 C:\Windows\SYSTEM32\dxgi.dll
ModLoad: 00007ffc`82960000 00007ffc`82a1a000 C:\Windows\system32\twinapi.dll
ModLoad: 00007ffc`8b0d0000 00007ffc`8b12c000 C:\Windows\SYSTEM32\ninput.dll
ModLoad: 00007ffc`86060000 00007ffc`862b9000 C:\Windows\SYSTEM32\DWrite.dll
ModLoad: 00007ffc`8a910000 00007ffc`8ab7e000 C:\Windows\SYSTEM32\d3d10warp.dll
ModLoad: 00007ffc`8a250000 00007ffc`8a2ee000 C:\Windows\System32\Windows.UI.dll
ModLoad: 00007ffc`7ca80000 00007ffc`7ca90000 C:\Windows\system32\msimtf.dll
ModLoad: 00007ffc`85de0000 00007ffc`85e69000 C:\Windows\system32\directmanipulation.dll
ModLoad: 00007ffc`8a2f0000 00007ffc`8a3ff000 C:\Windows\System32\MrmCoreR.dll
ModLoad: 00007ffc`8b260000 00007ffc`8b2c6000 C:\Windows\SYSTEM32\Bcp47Langs.dll
ModLoad: 00007ffc`85ea0000 00007ffc`86026000 C:\Windows\SYSTEM32\windows.globalization.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000 C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`87030000 00007ffc`87098000 C:\Windows\System32\fwpuclnt.dll
ModLoad: 00007ffc`86700000 00007ffc`8670a000 C:\Windows\System32\rasadhlp.dll
ModLoad: 00007ffc`8bdc0000 00007ffc`8bde8000 C:\Windows\System32\rmclient.dll
(12f0.122c): Break instruction exception - code 80000003 (first chance)
Create process 4848 breakpoint.
3:079> g
(12f0.a14): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
3:067> .lastevent
Last event: 12f0.a14: Access violation - code c0000005 (first chance)
debugger time: Tue Mar 15 19:59:22.047 2016 (UTC + 1:00)
3:067> |.
. 3 id: 12f0 attach name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
3:067> .exr -1
ExceptionAddress: 00007ffc7ce85e0e (EDGEHTML!Tree::ANode::IsInTree+0x000000000000000e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000006f084fbf50
Attempt to read from address 0000006f084fbf50
3:067> lm on
start end module name
00007ff6`78150000 00007ff6`7819d000 microsoftedgecp microsoftedgecp.exe
00007ffc`782b0000 00007ffc`78806000 EMODEL EMODEL.dll
00007ffc`7ac60000 00007ffc`7ad08000 ieproxy ieproxy.dll
00007ffc`7bd90000 00007ffc`7c4c8000 chakra chakra.dll
00007ffc`7c8d0000 00007ffc`7ca72000 ieapfltr ieapfltr.dll
00007ffc`7ca80000 00007ffc`7ca90000 msimtf msimtf.dll
00007ffc`7cc50000 00007ffc`7cc8d000 MLANG MLANG.dll
00007ffc`7cc90000 00007ffc`7e17f000 EDGEHTML EDGEHTML.dll
00007ffc`827b0000 00007ffc`827f6000 dataexchange dataexchange.dll
00007ffc`82960000 00007ffc`82a1a000 twinapi twinapi.dll
00007ffc`82fa0000 00007ffc`82fb5000 profext profext.dll
00007ffc`83df0000 00007ffc`840b1000 WININET WININET.dll
00007ffc`84be0000 00007ffc`84e54000 Comctl32 Comctl32.dll
00007ffc`850a0000 00007ffc`850b5000 ondemandconnroutehelper ondemandconnroutehelper.dll
00007ffc`854a0000 00007ffc`85636000 urlmon urlmon.dll
00007ffc`85de0000 00007ffc`85e69000 directmanipulation directmanipulation.dll
00007ffc`85ea0000 00007ffc`86026000 windows_globalization windows.globalization.dll
00007ffc`86060000 00007ffc`862b9000 DWrite DWrite.dll
00007ffc`864d0000 00007ffc`86562000 msvcp110_win msvcp110_win.dll
00007ffc`86570000 00007ffc`865a9000 policymanager policymanager.dll
00007ffc`86700000 00007ffc`8670a000 rasadhlp rasadhlp.dll
00007ffc`87030000 00007ffc`87098000 fwpuclnt fwpuclnt.dll
00007ffc`87870000 00007ffc`87946000 winhttp winhttp.dll
00007ffc`881c0000 00007ffc`881f6000 XmlLite XmlLite.dll
00007ffc`884d0000 00007ffc`88a15000 d2d1 d2d1.dll
00007ffc`88a50000 00007ffc`88a5b000 WINNSI WINNSI.DLL
00007ffc`88a60000 00007ffc`88a98000 IPHLPAPI IPHLPAPI.DLL
00007ffc`88d90000 00007ffc`89106000 iertutil iertutil.dll
00007ffc`89110000 00007ffc`89241000 WinTypes WinTypes.dll
00007ffc`8a250000 00007ffc`8a2ee000 Windows_UI Windows.UI.dll
00007ffc`8a2f0000 00007ffc`8a3ff000 MrmCoreR MrmCoreR.dll
00007ffc`8a590000 00007ffc`8a5fd000 verifier verifier.dll
00007ffc`8a910000 00007ffc`8ab7e000 d3d10warp d3d10warp.dll
00007ffc`8ab80000 00007ffc`8ac1c000 dxgi dxgi.dll
00007ffc`8ac20000 00007ffc`8aec3000 d3d11 d3d11.dll
00007ffc`8aed0000 00007ffc`8aef2000 dwmapi dwmapi.dll
00007ffc`8af20000 00007ffc`8b0a3000 PROPSYS PROPSYS.dll
00007ffc`8b0d0000 00007ffc`8b12c000 ninput ninput.dll
00007ffc`8b210000 00007ffc`8b228000 EShims EShims.dll
00007ffc`8b260000 00007ffc`8b2c6000 Bcp47Langs Bcp47Langs.dll
00007ffc`8b2d0000 00007ffc`8b3a1000 dcomp dcomp.dll
00007ffc`8b810000 00007ffc`8b888000 apphelp apphelp.dll
00007ffc`8b9c0000 00007ffc`8ba56000 uxtheme uxtheme.dll
00007ffc`8ba80000 00007ffc`8bb6e000 twinapi_appcore twinapi.appcore.dll
00007ffc`8bcf0000 00007ffc`8bd22000 fwbase fwbase.dll
00007ffc`8bd30000 00007ffc`8bdb2000 firewallapi firewallapi.dll
00007ffc`8bdc0000 00007ffc`8bde8000 rmclient rmclient.dll
00007ffc`8c400000 00007ffc`8c432000 ntmarta ntmarta.dll
00007ffc`8c580000 00007ffc`8c5b3000 rsaenh rsaenh.dll
00007ffc`8c670000 00007ffc`8c68f000 USERENV USERENV.dll
00007ffc`8c6d0000 00007ffc`8c778000 DNSAPI DNSAPI.dll
00007ffc`8c8d0000 00007ffc`8c92d000 mswsock mswsock.dll
00007ffc`8c930000 00007ffc`8c947000 cryptsp cryptsp.dll
00007ffc`8caa0000 00007ffc`8caab000 CRYPTBASE CRYPTBASE.dll
00007ffc`8cca0000 00007ffc`8cccc000 SspiCli SspiCli.dll
00007ffc`8ce70000 00007ffc`8cedb000 bcryptPrimitives bcryptPrimitives.dll
00007ffc`8cff0000 00007ffc`8d018000 bcrypt bcrypt.dll
00007ffc`8d0c0000 00007ffc`8d0cf000 kernel_appcore kernel.appcore.dll
00007ffc`8d0d0000 00007ffc`8d11a000 powrprof powrprof.dll
00007ffc`8d120000 00007ffc`8d133000 profapi profapi.dll
00007ffc`8d3e0000 00007ffc`8d5bd000 KERNELBASE KERNELBASE.dll
00007ffc`8d620000 00007ffc`8dc48000 windows_storage windows.storage.dll
00007ffc`8dc50000 00007ffc`8dd03000 shcore shcore.dll
00007ffc`8dd10000 00007ffc`8dd54000 cfgmgr32 cfgmgr32.dll
00007ffc`8dd60000 00007ffc`8ddb1000 SHLWAPI SHLWAPI.dll
00007ffc`8df70000 00007ffc`8dfd9000 WS2_32 WS2_32.dll
00007ffc`8dfe0000 00007ffc`8f502000 SHELL32 SHELL32.dll
00007ffc`8f6e0000 00007ffc`8f716000 IMM32 IMM32.DLL
00007ffc`8f790000 00007ffc`8f798000 NSI NSI.dll
00007ffc`8f8e0000 00007ffc`8fa06000 RPCRT4 RPCRT4.dll
00007ffc`8fa10000 00007ffc`8fb96000 GDI32 GDI32.dll
00007ffc`8fba0000 00007ffc`8fc4d000 KERNEL32 KERNEL32.DLL
00007ffc`8fd20000 00007ffc`8fe7c000 MSCTF MSCTF.dll
00007ffc`8fe80000 00007ffc`900fc000 combase combase.dll
00007ffc`90100000 00007ffc`90241000 ole32 ole32.dll
00007ffc`90250000 00007ffc`902ed000 msvcrt msvcrt.dll
00007ffc`90300000 00007ffc`9044e000 USER32 USER32.dll
00007ffc`904b0000 00007ffc`9050b000 sechost sechost.dll
00007ffc`90510000 00007ffc`905b6000 ADVAPI32 ADVAPI32.dll
00007ffc`905d0000 00007ffc`9068e000 OLEAUT32 OLEAUT32.dll
00007ffc`90690000 00007ffc`90852000 ntdll ntdll.dll
3:067> kn 0x64
# Child-SP RetAddr Call Site
00 0000006f`0a22aee0 00007ffc`7d2f8ed5 EDGEHTML!Tree::ANode::IsInTree+0xe
01 0000006f`0a22af10 00007ffc`7d073295 EDGEHTML!Tree::TreeWriter::Notify_BeforeRemoveNode+0x285b29
02 0000006f`0a22b1d0 00007ffc`7d21afef EDGEHTML!Tree::TreeWriter::RemoveNode+0x171
03 0000006f`0a22b5e0 00007ffc`7d07468e EDGEHTML!CElement::MoveToSeparateMarkup+0x5187f3
04 0000006f`0a22b9f0 00007ffc`7d0745e0 EDGEHTML!CElement::PutTextContentHelper+0x7e
05 0000006f`0a22ba30 00007ffc`7d074570 EDGEHTML!CElement::put_textContent+0x50
06 0000006f`0a22ba90 00007ffc`7d0744f1 EDGEHTML!CDOMNode::Var_set_textContent+0x60
07 0000006f`0a22bb00 00007ffc`7bfdc703 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x71
08 0000006f`0a22bb70 00007ffc`7be08e72 chakra!amd64_CallFunction+0x93
09 0000006f`0a22bbc0 00007ffc`7be01b7e chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x172
0a 0000006f`0a22bc60 00007ffc`7bebccf7 chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0xba
0b 0000006f`0a22bca0 00007ffc`7beca7fc chakra!Js::JavascriptOperators::CallSetter+0xaf
0c 0000006f`0a22bd40 00007ffc`7bf29fff chakra!Js::JavascriptOperators::SetProperty_Internal<0>+0xc9c
0d 0000006f`0a22be10 00007ffc`7bf29f1a chakra!Js::JavascriptOperators::OP_SetProperty+0x8f
0e 0000006f`0a22be60 00007ffc`7be0e325 chakra!Js::JavascriptOperators::PatchPutValueNoFastPath+0x82
0f 0000006f`0a22bee0 00007ffc`7be151cc chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x1e5
10 0000006f`0a22bfb0 00007ffc`7be12fc2 chakra!Js::InterpreterStackFrame::ProcessProfiled+0x44c
11 0000006f`0a22c030 00007ffc`7bf57be8 chakra!Js::InterpreterStackFrame::Process+0xd2
12 0000006f`0a22c090 00007ffc`7bf57875 chakra!Js::InterpreterStackFrame::InterpreterHelper+0x368
13 0000006f`0a22c390 0000006f`142a0fba chakra!Js::InterpreterStackFrame::InterpreterThunk+0x55
14 0000006f`0a22c3e0 00007ffc`7bfdc703 0x0000006f`142a0fba
15 0000006f`0a22c410 00007ffc`7bf0bfb3 chakra!amd64_CallFunction+0x93
16 0000006f`0a22c460 00007ffc`7bf0b6ea chakra!Js::JavascriptFunction::CallFunction<1>+0x83
17 0000006f`0a22c4c0 00007ffc`7bf0b28b chakra!Js::JavascriptFunction::CallRootFunctionInternal+0x11a
18 0000006f`0a22c5c0 00007ffc`7bf2c72a chakra!Js::JavascriptFunction::CallRootFunction+0x33
19 0000006f`0a22c760 00007ffc`7bf053c4 chakra!ScriptSite::CallRootFunction+0xaa
1a 0000006f`0a22c800 00007ffc`7bf094fc chakra!ScriptSite::Execute+0x134
1b 0000006f`0a22c890 00007ffc`7ce26194 chakra!ScriptEngineBase::Execute+0xcc
1c 0000006f`0a22c930 00007ffc`7ce25f12 EDGEHTML!CListenerDispatch::InvokeVar+0x264
1d 0000006f`0a22cab0 00007ffc`7cf0c80c EDGEHTML!CListenerDispatch::Invoke+0x92
1e 0000006f`0a22cb00 00007ffc`7cf0fbcd EDGEHTML!CEventMgr::_InvokeListeners+0x39c
1f 0000006f`0a22cc40 00007ffc`7cf0b7d7 EDGEHTML!CEventMgr::_InvokeListenersOnWindow+0x5d
20 0000006f`0a22cc70 00007ffc`7cf0f342 EDGEHTML!CEventMgr::Dispatch+0x357
21 0000006f`0a22cf20 00007ffc`7d02ce9c EDGEHTML!CEventMgr::DispatchEvent+0x6a
22 0000006f`0a22cf60 00007ffc`7d01dc1e EDGEHTML!COmWindowProxy::Fire_onload+0x13c
23 0000006f`0a22d060 00007ffc`7d016d01 EDGEHTML!CMarkup::OnLoadStatusDone+0x3ba
24 0000006f`0a22d120 00007ffc`7d016620 EDGEHTML!CMarkup::OnLoadStatus+0xe5
25 0000006f`0a22d150 00007ffc`7cef7cdd EDGEHTML!CProgSink::DoUpdate+0x380
26 0000006f`0a22d5e0 00007ffc`7cde3fa8 EDGEHTML!GlobalWndOnMethodCall+0x2bd
27 0000006f`0a22d690 00007ffc`903100dc EDGEHTML!GlobalWndProc+0x108
28 0000006f`0a22d710 00007ffc`9030fc07 USER32!UserCallWinProcCheckWow+0x1fc
29 0000006f`0a22d800 00007ffc`782f0988 USER32!DispatchMessageWorker+0x1a7
2a 0000006f`0a22d880 00007ffc`7834f25b EMODEL!CTabWindow::_TabWindowThreadProc+0x5b8
2b 0000006f`0a22fae0 00007ffc`88dc7faf EMODEL!LCIETab_ThreadProc+0x2bb
2c 0000006f`0a22fc10 00007ffc`8fbb2d92 iertutil!_IsoThreadProc_WrapperToReleaseScope+0x1f
2d 0000006f`0a22fc40 00007ffc`90699f64 KERNEL32!BaseThreadInitThunk+0x22
2e 0000006f`0a22fc70 00000000`00000000 ntdll!RtlUserThreadStart+0x34
3:067> ~s
00007ffc`7ce85e0e 8b10 mov edx,dword ptr [rax] ds:0000006f`084fbf50=????????
3:067> !heap -p -a 0x6F084FBF50
ReadMemory error for address 0000006f7f63ffe8
Use `!address 0000006f7f63ffe8' to check validity of the address.
ReadMemory error for address 0000006f7f91ffe8
Use `!address 0000006f7f91ffe8' to check validity of the address.
ReadMemory error for address 0000006f7f9dffe8
Use `!address 0000006f7f9dffe8' to check validity of the address.
ReadMemory error for address 0000006f0712ffe8
Use `!address 0000006f0712ffe8' to check validity of the address.
address 0000006f084fbf50 found in
_DPH_HEAP_ROOT @ 6f08441000
in free-ed allocation ( DPH_HEAP_BLOCK: VirtAddr VirtSize)
6f08442068: 6f084fb000 2000
00007ffc9077cc13 ntdll!RtlDebugFreeHeap+0x0000000000000047
00007ffc907353d9 ntdll!RtlpFreeHeap+0x0000000000079519
00007ffc906baa16 ntdll!RtlFreeHeap+0x0000000000000106
00007ffc7d1f366c EDGEHTML!MemoryProtection::HeapFree+0x00000000003736dc
00007ffc7cf45807 EDGEHTML!CTreeNode::NodeRelease+0x0000000000000057
00007ffc7ce848a4 EDGEHTML!CSpliceTreeEngine::RemoveSplice+0x0000000000001294
00007ffc7cf45c4b EDGEHTML!Tree::TreeWriter::SpliceTreeInternal+0x000000000000010b
00007ffc7cf403b0 EDGEHTML!Tree::TreeWriter::CutCopyMoveLegacy+0x00000000000004e0
00007ffc7cf3d7a3 EDGEHTML!Tree::TreeWriter::MoveNodeLegacy+0x0000000000000193
00007ffc7cfa070c EDGEHTML!Tree::TreeWriter::PrependChild+0x000000000000003c
00007ffc7d21afda EDGEHTML!CElement::MoveToSeparateMarkup+0x00000000005187de
00007ffc7d07468e EDGEHTML!CElement::PutTextContentHelper+0x000000000000007e
00007ffc7d0745e0 EDGEHTML!CElement::put_textContent+0x0000000000000050
00007ffc7d074570 EDGEHTML!CDOMNode::Var_set_textContent+0x0000000000000060
00007ffc7d0744f1 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x0000000000000071
00007ffc7bfdc703 chakra!amd64_CallFunction+0x0000000000000093
00007ffc7be08e72 chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x0000000000000172
00007ffc7be01b7e chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0x00000000000000ba
00007ffc7bebccf7 chakra!Js::JavascriptOperators::CallSetter+0x00000000000000af
00007ffc7beca7fc chakra!Js::JavascriptOperators::SetProperty_Internal<0>+0x0000000000000c9c
00007ffc7bf29fff chakra!Js::JavascriptOperators::OP_SetProperty+0x000000000000008f
00007ffc7bf29f1a chakra!Js::JavascriptOperators::PatchPutValueNoFastPath+0x0000000000000082
00007ffc7be0e325 chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x00000000000001e5
00007ffc7be151cc chakra!Js::InterpreterStackFrame::ProcessProfiled+0x000000000000044c
00007ffc7be12fc2 chakra!Js::InterpreterStackFrame::Process+0x00000000000000d2
00007ffc7bf57be8 chakra!Js::InterpreterStackFrame::InterpreterHelper+0x0000000000000368
00007ffc7bf57875 chakra!Js::InterpreterStackFrame::InterpreterThunk+0x0000000000000055
0000006f142a0fb2 +0x0000006f142a0fb2
3:067> .if ($vvalid(@$scopeip - 40, 40)) { u @$scopeip - 40 @$scopeip - 1; };
EDGEHTML!Tree::TreeReader::GetParentCrossComponent+0x6e:
00007ffc`7ce85dce ce ???
00007ffc`7ce85dcf 64 ???
00007ffc`7ce85dd0 07 ???
00007ffc`7ce85dd1 0084c074d6488b add byte ptr [rax+rax*8-74B7298Ch],al
00007ffc`7ce85dd8 cb retf
00007ffc`7ce85dd9 4883c420 add rsp,20h
00007ffc`7ce85ddd 5b pop rbx
00007ffc`7ce85dde e935f0f3ff jmp EDGEHTML!Tree::ElementNode::GetSubordinateBridge (00007ffc`7cdc4e18)
00007ffc`7ce85de3 488bcb mov rcx,rbx
00007ffc`7ce85de6 e8d5c20e00 call EDGEHTML!Tree::ANode::GetAsElementNode (00007ffc`7cf720c0)
00007ffc`7ce85deb 488bc8 mov rcx,rax
00007ffc`7ce85dee 4883c420 add rsp,20h
00007ffc`7ce85df2 5b pop rbx
00007ffc`7ce85df3 e920f0f3ff jmp EDGEHTML!Tree::ElementNode::GetSubordinateBridge (00007ffc`7cdc4e18)
00007ffc`7ce85df8 cc int 3
00007ffc`7ce85df9 cc int 3
00007ffc`7ce85dfa cc int 3
00007ffc`7ce85dfb cc int 3
00007ffc`7ce85dfc cc int 3
00007ffc`7ce85dfd cc int 3
00007ffc`7ce85dfe cc int 3
00007ffc`7ce85dff cc int 3
EDGEHTML!Tree::ANode::IsInTree:
00007ffc`7ce85e00 48894c2408 mov qword ptr [rsp+8],rcx
00007ffc`7ce85e05 4883ec28 sub rsp,28h
00007ffc`7ce85e09 488b442430 mov rax,qword ptr [rsp+30h]
3:067> .if ($vvalid(@$scopeip, 40)) { u @$scopeip @$scopeip + 39; };
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10 mov edx,dword ptr [rax]
00007ffc`7ce85e10 f6c204 test dl,4
00007ffc`7ce85e13 7525 jne EDGEHTML!Tree::ANode::IsInTree+0x3a (00007ffc`7ce85e3a)
00007ffc`7ce85e15 f6406202 test byte ptr [rax+62h],2
00007ffc`7ce85e19 741b je EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e1b 488b4810 mov rcx,qword ptr [rax+10h]
00007ffc`7ce85e1f 480b4808 or rcx,qword ptr [rax+8]
00007ffc`7ce85e23 7411 je EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e25 488b4838 mov rcx,qword ptr [rax+38h]
00007ffc`7ce85e29 480b4830 or rcx,qword ptr [rax+30h]
00007ffc`7ce85e2d 7407 je EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e2f b001 mov al,1
00007ffc`7ce85e31 4883c428 add rsp,28h
00007ffc`7ce85e35 c3 ret
00007ffc`7ce85e36 32c0 xor al,al
00007ffc`7ce85e38 ebf7 jmp EDGEHTML!Tree::ANode::IsInTree+0x31 (00007ffc`7ce85e31)
00007ffc`7ce85e3a 488b4810 mov rcx,qword ptr [rax+10h]
00007ffc`7ce85e3e 480b4808 or rcx,qword ptr [rax+8]
00007ffc`7ce85e42 74f2 je EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e44 f6c203 test dl,3
00007ffc`7ce85e47 0f85fb653e00 jne EDGEHTML!Tree::ANode::IsInTree+0x3e6648 (00007ffc`7d26c448)
3:067> rM 0x7D
rax=0000006f084fbf50 rbx=0000006f0a22b220 rcx=0000006f084fbf50
rdx=0000006f0a22ac98 rsi=0000006f084fbf50 rdi=0000000000000001
rip=00007ffc7ce85e0e rsp=0000006f0a22aee0 rbp=0000006f0a22b010
r8=0000006f0fccfa20 r9=0000006f03fa9b90 r10=00007ffc7cfe3ac0
r11=00007ffc7cf78290 r12=0000000000000000 r13=0000006f084fbf50
r14=0000006f084d9950 r15=0000006f084fbf50
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
fpcw=027F fpsw=0000 fptw=0000
st0= 0.000000000000000000000e+0000 st1= 0.000000000000000000000e+0000
st2= 0.000000000000000000000e+0000 st3= 0.000000000000000000000e+0000
st4= 0.000000000000000000000e+0000 st5= 0.000000000000000000000e+0000
st6= 0.000000000000000000000e+0000 st7= 0.000000000000000000000e+0000
mm0=0000000000000000 mm1=0000000000000000
mm2=0000000000000000 mm3=0000000000000000
mm4=0000000000000000 mm5=0000000000000000
mm6=0000000000000000 mm7=0000000000000000
xmm0=0 0 0 0
xmm1=0 0 0 0
xmm2=0 0 0 0
xmm3=0 0 0 0
xmm4=0 0 0 0
xmm5=0 0 0 0
xmm6=0 0 0 0
xmm7=0 0 0 0
xmm8=0 0 0 0
xmm9=0 0 0 0
xmm10=0 0 0 0
xmm11=0 0 0 0
xmm12=0 0 0 0
xmm13=0 0 0 0
xmm14=0 0 0 0
xmm15=0 0 0 0
dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000
dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10 mov edx,dword ptr [rax] ds:0000006f`084fbf50=????????
3:067> dpp @$ea - 10*$ptrsize L10;
0000006f`084fbed0 ????????`????????
0000006f`084fbed8 ????????`????????
0000006f`084fbee0 ????????`????????
0000006f`084fbee8 ????????`????????
0000006f`084fbef0 ????????`????????
0000006f`084fbef8 ????????`????????
0000006f`084fbf00 ????????`????????
0000006f`084fbf08 ????????`????????
0000006f`084fbf10 ????????`????????
0000006f`084fbf18 ????????`????????
0000006f`084fbf20 ????????`????????
0000006f`084fbf28 ????????`????????
0000006f`084fbf30 ????????`????????
0000006f`084fbf38 ????????`????????
0000006f`084fbf40 ????????`????????
0000006f`084fbf48 ????????`????????
3:067> dpp @$ea L10;
0000006f`084fbf50 ????????`????????
0000006f`084fbf58 ????????`????????
0000006f`084fbf60 ????????`????????
0000006f`084fbf68 ????????`????????
0000006f`084fbf70 ????????`????????
0000006f`084fbf78 ????????`????????
0000006f`084fbf80 ????????`????????
0000006f`084fbf88 ????????`????????
0000006f`084fbf90 ????????`????????
0000006f`084fbf98 ????????`????????
0000006f`084fbfa0 ????????`????????
0000006f`084fbfa8 ????????`????????
0000006f`084fbfb0 ????????`????????
0000006f`084fbfb8 ????????`????????
0000006f`084fbfc0 ????????`????????
0000006f`084fbfc8 ????????`????????
3:067> dpp @$ea2 - 10*$ptrsize L10;
Bad register error at '@$ea2 - 10*$ptrsize '
3:067> lm M *microsoftedgecp.exe
start end module name
00007ff6`78150000 00007ff6`7819d000 microsoftedgecp (deferred)
3:067> lmv m *EDGEHTML
start end module name
00007ffc`7cc90000 00007ffc`7e17f000 EDGEHTML (pdb symbols) c:\symbols\edgehtml.pdb\F9526BA119114822A01B413255AFCF0F1\edgehtml.pdb
Loaded symbol image file: C:\Windows\SYSTEM32\EDGEHTML.dll
Image path: C:\Windows\SYSTEM32\EDGEHTML.dll
Image name: EDGEHTML.dll
Timestamp: Tue Feb 23 11:48:08 2016 (56CC38E8)
CheckSum: 014DD388
ImageSize: 014EF000
File version: 11.0.10240.16724
Product version: 11.0.10240.16724
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Internet Explorer
InternalName: EDGEHTML
OriginalFilename: EDGEHTML.DLL
ProductVersion: 11.00.10240.16724
FileVersion: 11.00.10240.16724 (th1_st1.160222-1812)
FileDescription: Microsoft (R) HTML Viewer
LegalCopyright: � Microsoft Corporation. All rights reserved.
3:067> lmv m *microsoftedgecp
start end module name
00007ff6`78150000 00007ff6`7819d000 microsoftedgecp (deferred)
Image path: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
Image name: microsoftedgecp.exe
Timestamp: Wed Nov 25 05:17:08 2015 (56553644)
CheckSum: 0004DF0B
ImageSize: 0004D000
File version: 11.0.10240.16603
Product version: 11.0.10240.16603
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft Edge
InternalName: MicrosoftEdgeCP
OriginalFilename: MicrosoftEdgeCP.exe
ProductVersion: 11.00.10240.16603
FileVersion: 11.00.10240.16603 (th1_st1.151124-1750)
FileDescription: Microsoft Edge Content Process
LegalCopyright: � Microsoft Corporation. All rights reserved.
3:067>