Details

Id:  Breakpoint 2e5.efc
Description:  Break instruction exception (code 0x80000003)
Location:  microsoftedgecp.exe!edgehtml.dll!Abandonment::CheckHRESULTStrict
Security impact:  None

Stack

Disassembly

00007ffc`8d40a189 894c2420        mov     dword ptr [rsp+20h],ecx
00007ffc`8d40a18d 89542424        mov     dword ptr [rsp+24h],edx
00007ffc`8d40a191 4889442430      mov     qword ptr [rsp+30h],rax
00007ffc`8d40a196 4d85c9          test    r9,r9
00007ffc`8d40a199 7445            je      KERNELBASE!RaiseException+0x80 (00007ffc`8d40a1e0)
00007ffc`8d40a19b b80f000000      mov     eax,0Fh
00007ffc`8d40a1a0 488d4c2440      lea     rcx,[rsp+40h]
00007ffc`8d40a1a5 443bc0          cmp     r8d,eax
00007ffc`8d40a1a8 498bd1          mov     rdx,r9
00007ffc`8d40a1ab 440f47c0        cmova   r8d,eax
00007ffc`8d40a1af 4489442438      mov     dword ptr [rsp+38h],r8d
00007ffc`8d40a1b4 49c1e003        shl     r8,3
00007ffc`8d40a1b8 e85feb0400      call    KERNELBASE!memcpy (00007ffc`8d458d1c)
00007ffc`8d40a1bd 488d4c2420      lea     rcx,[rsp+20h]
00007ffc`8d40a1c2 ff1518050a00    call    qword ptr [KERNELBASE!_imp_RtlRaiseException (00007ffc`8d4aa6e0)]
KERNELBASE!RaiseException+0x67:
00007ffc`8d40a1c7 00488b          add     byte ptr [rax-75h],cl                  ⇐ instruction pointer
00007ffc`8d40a1ca 8c24c0          mov     word ptr [rax+rax*8],fs
00007ffc`8d40a1cd 0000            add     byte ptr [rax],al
00007ffc`8d40a1cf 004833          add     byte ptr [rax+33h],cl
00007ffc`8d40a1d2 cc              int     3
00007ffc`8d40a1d3 e838b40400      call    KERNELBASE!_security_check_cookie (00007ffc`8d455610)
00007ffc`8d40a1d8 4881c4d8000000  add     rsp,0D8h
00007ffc`8d40a1df c3              ret
00007ffc`8d40a1e0 8364243800      and     dword ptr [rsp+38h],0
00007ffc`8d40a1e5 ebd6            jmp     KERNELBASE!RaiseException+0x5d (00007ffc`8d40a1bd)
00007ffc`8d40a1e7 cc              int     3
00007ffc`8d40a1e8 cc              int     3
00007ffc`8d40a1e9 cc              int     3
00007ffc`8d40a1ea cc              int     3
00007ffc`8d40a1eb cc              int     3
00007ffc`8d40a1ec cc              int     3
00007ffc`8d40a1ed cc              int     3
00007ffc`8d40a1ee cc              int     3

Registers

rax=000000f45b067fc0 rbx=00007ffc906a1eee rcx=00000001e06d7363
rdx=0000000000000000 rsi=00007ffc907afc64 rdi=000000f454b93fa0
rip=00007ffc8d40a1c7 rsp=000000f454b93f80 rbp=000000f45cf1a8f0
 r8=00007ffc7bd90000  r9=000000ec4f15b6c0 r10=000000f45b067fc0
r11=000000ec4f15b6c0 r12=00007ffc7d1d30f0 r13=0000000000001018
r14=0000000000000078 r15=000000f472378fa0
iopl=0         nv up ei pl nz na po nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000204
fpcw=027F    fpsw=0000    fptw=0000
st0=-0.000076193774342561060e-0713  st1=-0.000223717438833617300e+0252
st2=-1.189731495357231764960e+4932  st3= 0.000000548965837955410e-0352
st4= 0.000000029381170837930e-4933  st5= 0.000000000000000000000e+0000
st6= 0.000000000354118814970e-0357  st7= 0.000512961201644510030e-4933
mm0=0000dc9a11fab7f6  mm1=00007ffc7c417b90
mm2=fffffffffffffffe  mm3=000000ec4f15b6c0
mm4=00000001e06d7363  mm5=0000000000000000
mm6=0000000019930520  mm7=00007ffc7c417b90
xmm0=4.59121e-041 2.51377e+036 3.41917e-043 6.36454e+012
xmm1=3.41917e-043 3.78573e+016 4.59121e-041 2.25346e+036
xmm2=0 1.4013e-045 3.30706e-043 2.51178e+009
xmm3=3.41917e-043 3.7555e+016 0 0
xmm4=0 0 4.59121e-041 4.0336e+036
xmm5=4.59121e-041 2.50793e+036 3.41917e-043 3.65922e+016
xmm6=0 0 0 0
xmm7=0 0 0 0
xmm8=0 0 0 0
xmm9=0 0 0 0
xmm10=0 0 0 0
xmm11=0 0 0 0
xmm12=0 0 0 0
xmm13=0 0 0 0
xmm14=0 0 0 0
xmm15=0 0 0 0
dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000
dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000
KERNELBASE!RaiseException+0x67:
00007ffc`8d40a1c7 00488b          add     byte ptr [rax-75h],cl ds:000000f4`5b067f4b=5b

Referenced memory

Memory around address 0xF45B067F4B:

000000f4`5b067ecb  00000000`00000000
000000f4`5b067ed3  00000000`00000000
000000f4`5b067edb  00000000`00000000
000000f4`5b067ee3  00000000`00000000
000000f4`5b067eeb  00000000`00000000
000000f4`5b067ef3  00000000`00000000
000000f4`5b067efb  067ec100`00000000
000000f4`5b067f03  00000000`0000f45b
000000f4`5b067f0b  00000000`00000000
000000f4`5b067f13  00000000`00000000
000000f4`5b067f1b  00000000`00000000
000000f4`5b067f23  00000000`00000000
000000f4`5b067f2b  00000000`00000000
000000f4`5b067f33  00000000`00000000
000000f4`5b067f3b  00001a00`00000000
000000f4`5b067f43  04dc0000`00000000
000000f4`5b067f4b  7d370000`0000f45b
000000f4`5b067f53  165bb000`0000f45b
000000f4`5b067f5b  00000000`007ffc7c
000000f4`5b067f63  0255c000`00000000
000000f4`5b067f6b  00000000`0000f45b
000000f4`5b067f73  00000000`00000000
000000f4`5b067f7b  0006c300`00000000
000000f4`5b067f83  423498ff`ffffff00
000000f4`5b067f8b  01072300`007ffc7c
000000f4`5b067f93  422390ff`ffffff00
000000f4`5b067f9b  02079300`007ffc7c
000000f4`5b067fa3  423658ff`ffffff00
000000f4`5b067fab  ff070100`007ffc7c
000000f4`5b067fb3  00000000`000000ff
000000f4`5b067fbb  2e274800`00000000
000000f4`5b067fc3  067f4000`007ffc7c

Binary information

EDGEHTML.dll

    Loaded symbol image file: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image path: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image name: EDGEHTML.dll
    Timestamp:        Tue Feb 23 11:48:08 2016 (56CC38E8)
    CheckSum:         014DD388
    ImageSize:        014EF000
    File version:     11.0.10240.16724
    Product version:  11.0.10240.16724
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Internet Explorer
    InternalName:     EDGEHTML
    OriginalFilename: EDGEHTML.DLL
    ProductVersion:   11.00.10240.16724
    FileVersion:      11.00.10240.16724 (th1_st1.160222-1812)
    FileDescription:  Microsoft (R) HTML Viewer
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

microsoftedgecp.exe

    Image path: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
    Image name: microsoftedgecp.exe
    Timestamp:        Wed Nov 25 05:17:08 2015 (56553644)
    CheckSum:         0004DF0B
    ImageSize:        0004D000
    File version:     11.0.10240.16603
    Product version:  11.0.10240.16603
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft Edge
    InternalName:     MicrosoftEdgeCP
    OriginalFilename: MicrosoftEdgeCP.exe
    ProductVersion:   11.00.10240.16603
    FileVersion:      11.00.10240.16603 (th1_st1.151124-1750)
    FileDescription:  Microsoft Edge Content Process
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

Debugger IO


Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff6`a5060000 00007ff6`a5076000   C:\Windows\System32\RuntimeBroker.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`80680000 00007ffc`806ed000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\System32\bcryptPrimitives.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8fc70000 00007ffc`8fd15000   C:\Windows\system32\clbcatq.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\System32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\System32\CRYPTBASE.dll
ModLoad: 00007ffc`857f0000 00007ffc`85815000   C:\Windows\System32\Windows.ApplicationModel.Core.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000   C:\Windows\SYSTEM32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000   C:\Windows\System32\USERENV.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000   C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000   C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\system32\SspiCli.dll
ModLoad: 00007ffc`82f60000 00007ffc`82f76000   C:\Windows\SYSTEM32\capauthz.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000   C:\Windows\system32\apphelp.dll
(784.1160): Break instruction exception - code 80000003 (first chance)
ntdll!DbgBreakPoint:
00007ffc`907253e0 cc              int     3

Create process 1924 breakpoint.
0:008> g
*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff7`d6770000 00007ff7`d677a000   C:\Windows\system32\browser_broker.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`80680000 00007ffc`806ed000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\user32.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\system32\bcryptPrimitives.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000   C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8a550000 00007ffc`8a568000   C:\Windows\SYSTEM32\browserbroker.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000   C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`905d0000 00007ffc`9068e000   C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8d210000 00007ffc`8d3d1000   C:\Windows\system32\CRYPT32.dll
ModLoad: 00007ffc`8d140000 00007ffc`8d151000   C:\Windows\system32\MSASN1.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000   C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000   C:\Windows\system32\advapi32.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000   C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000   C:\Windows\system32\shlwapi.dll
ModLoad: 00007ffc`8c300000 00007ffc`8c31c000   C:\Windows\SYSTEM32\MPR.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000   C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000   C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8c4e0000 00007ffc`8c4ea000   C:\Windows\SYSTEM32\DPAPI.DLL
ModLoad: 00007ffc`8fc70000 00007ffc`8fd15000   C:\Windows\system32\clbcatq.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\system32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000   C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000   C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000   C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
(1358.8a0): Break instruction exception - code 80000003 (first chance)

Create process 4952 breakpoint.
1:018> g
*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff6`efb70000 00007ff6`f016e000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`80680000 00007ffc`806ed000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000   C:\Windows\system32\apphelp.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000   C:\Windows\system32\ADVAPI32.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8a400000 00007ffc`8a46a000   C:\Windows\SYSTEM32\wincorlib.DLL
ModLoad: 00007ffc`905d0000 00007ffc`9068e000   C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\SYSTEM32\bcryptPrimitives.dll
ModLoad: 00007ffc`89250000 00007ffc`8a246000   C:\Windows\System32\Windows.UI.Xaml.dll
ModLoad: 00007ffc`89110000 00007ffc`89241000   C:\Windows\SYSTEM32\wintypes.dll
ModLoad: 00007ffc`8b130000 00007ffc`8b1f8000   C:\Windows\SYSTEM32\CoreMessaging.dll
ModLoad: 00007ffc`8b260000 00007ffc`8b2c6000   C:\Windows\SYSTEM32\Bcp47Langs.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000   C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000   C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`8b0d0000 00007ffc`8b12c000   C:\Windows\SYSTEM32\NInput.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\SYSTEM32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000   C:\Windows\System32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000   C:\Windows\SYSTEM32\USERENV.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8a580000 00007ffc`8a598000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EShims.dll
ModLoad: 00007ffc`782b0000 00007ffc`78806000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eModel.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000   C:\Windows\system32\SHLWAPI.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000   C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000   C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8dd10000 00007ffc`8dd54000   C:\Windows\system32\cfgmgr32.dll
ModLoad: 00007ffc`8bd30000 00007ffc`8bdb2000   C:\Windows\SYSTEM32\firewallapi.dll
ModLoad: 00007ffc`8bcf0000 00007ffc`8bd22000   C:\Windows\SYSTEM32\fwbase.dll
ModLoad: 00007ffc`83610000 00007ffc`83a7a000   C:\Windows\System32\ActXPrxy.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000   C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`83b80000 00007ffc`83de1000   C:\Windows\system32\CoreUIComponents.dll
ModLoad: 00007ffc`8aed0000 00007ffc`8aef2000   C:\Windows\SYSTEM32\dwmapi.dll
ModLoad: 00007ffc`8ab80000 00007ffc`8ac1c000   C:\Windows\SYSTEM32\dxgi.dll
ModLoad: 00007ffc`8ac20000 00007ffc`8aec3000   C:\Windows\SYSTEM32\d3d11.dll
ModLoad: 00007ffc`8a910000 00007ffc`8ab7e000   C:\Windows\SYSTEM32\d3d10warp.dll
ModLoad: 00007ffc`7ef90000 00007ffc`7efc4000   C:\Windows\System32\Windows.ApplicationModel.dll
ModLoad: 00007ffc`884d0000 00007ffc`88a15000   C:\Windows\SYSTEM32\d2d1.dll
ModLoad: 00007ffc`79fa0000 00007ffc`7a323000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eView.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000   C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`8b2d0000 00007ffc`8b3a1000   C:\Windows\System32\dcomp.dll
ModLoad: 00007ffc`8a2f0000 00007ffc`8a3ff000   C:\Windows\System32\MrmCoreR.dll
ModLoad: 00007ffc`8a250000 00007ffc`8a2ee000   C:\Windows\System32\Windows.UI.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000   C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000   C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000   C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`827b0000 00007ffc`827f6000   C:\Windows\system32\DataExchange.dll
ModLoad: 00007ffc`8af20000 00007ffc`8b0a3000   C:\Windows\SYSTEM32\PROPSYS.dll
ModLoad: 00007ffc`8df70000 00007ffc`8dfd9000   C:\Windows\system32\WS2_32.dll
ModLoad: 00007ffc`8f790000 00007ffc`8f798000   C:\Windows\system32\NSI.dll
ModLoad: 00007ffc`850a0000 00007ffc`850b5000   C:\Windows\SYSTEM32\ondemandconnroutehelper.dll
ModLoad: 00007ffc`88a60000 00007ffc`88a98000   C:\Windows\SYSTEM32\IPHLPAPI.DLL
ModLoad: 00007ffc`88a50000 00007ffc`88a5b000   C:\Windows\SYSTEM32\WINNSI.DLL
ModLoad: 00007ffc`87870000 00007ffc`87946000   C:\Windows\SYSTEM32\winhttp.dll
ModLoad: 00007ffc`8c8d0000 00007ffc`8c92d000   C:\Windows\system32\mswsock.dll
ModLoad: 00007ffc`83b40000 00007ffc`83b52000   C:\Windows\System32\Windows.Shell.ServiceHostBuilder.dll
ModLoad: 00007ffc`83150000 00007ffc`83165000   C:\Windows\system32\execmodelproxy.dll
ModLoad: 00007ffc`86570000 00007ffc`865a9000   C:\Windows\SYSTEM32\policymanager.dll
ModLoad: 00007ffc`864d0000 00007ffc`86562000   C:\Windows\SYSTEM32\msvcp110_win.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000   C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`7c8d0000 00007ffc`7ca72000   C:\Windows\SYSTEM32\ieapfltr.dll
ModLoad: 00007ffc`85ea0000 00007ffc`86026000   C:\Windows\System32\Windows.Globalization.dll
ModLoad: 00007ffc`835d0000 00007ffc`8360f000   C:\Windows\System32\netprofm.dll
ModLoad: 00007ffc`830b0000 00007ffc`830be000   C:\Windows\System32\npmproxy.dll
ModLoad: 00007ffc`8f720000 00007ffc`8f78f000   C:\Windows\system32\coml2.dll
ModLoad: 00007ffc`86060000 00007ffc`862b9000   C:\Windows\SYSTEM32\dwrite.dll
ModLoad: 00007ffc`8c6d0000 00007ffc`8c778000   C:\Windows\SYSTEM32\DNSAPI.dll
ModLoad: 00007ffc`8b6e0000 00007ffc`8b706000   C:\Windows\SYSTEM32\SLC.dll
ModLoad: 00007ffc`8b680000 00007ffc`8b6a5000   C:\Windows\SYSTEM32\sppc.dll
ModLoad: 00007ffc`86700000 00007ffc`8670a000   C:\Windows\System32\rasadhlp.dll
ModLoad: 00007ffc`87030000 00007ffc`87098000   C:\Windows\System32\fwpuclnt.dll
ModLoad: 00007ffc`83370000 00007ffc`833b3000   C:\Windows\System32\execmodelclient.dll
ModLoad: 00007ffc`874d0000 00007ffc`87542000   C:\Windows\SYSTEM32\MMDevAPI.DLL
ModLoad: 00007ffc`8b990000 00007ffc`8b9b7000   C:\Windows\SYSTEM32\DEVOBJ.dll
ModLoad: 00007ffc`8bdc0000 00007ffc`8bde8000   C:\Windows\System32\rmclient.dll
ModLoad: 00007ffc`7f8f0000 00007ffc`7f94a000   C:\Windows\System32\Windows.Graphics.dll
ModLoad: 00007ffc`857f0000 00007ffc`85815000   C:\Windows\System32\Windows.ApplicationModel.Core.dll
ModLoad: 00007ffc`84730000 00007ffc`84a50000   C:\Windows\SYSTEM32\msftedit.dll
ModLoad: 00007ffc`84700000 00007ffc`8472e000   C:\Windows\SYSTEM32\globinputhost.dll
ModLoad: 00007ffc`85e80000 00007ffc`85e98000   C:\Windows\System32\Windows.Globalization.Fontgroups.dll
ModLoad: 00007ffc`85e70000 00007ffc`85e7a000   C:\Windows\SYSTEM32\fontgroupsoverride.dll
ModLoad: 00007ffc`857c0000 00007ffc`857e6000   C:\Windows\System32\Windows.System.Profile.RetailInfo.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000   C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`82960000 00007ffc`82a1a000   C:\Windows\system32\twinapi.dll
ModLoad: 00007ffc`7f950000 00007ffc`7f9a3000   C:\Windows\System32\Windows.Storage.ApplicationData.dll
ModLoad: 00007ffc`85de0000 00007ffc`85e69000   C:\Windows\system32\directmanipulation.dll
(1038.c68): Break instruction exception - code 80000003 (first chance)

Create process 4152 breakpoint.
2:056> g
*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff7`6f000000 00007ff7`6f04d000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`80680000 00007ffc`806ed000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000   C:\Windows\system32\apphelp.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000   C:\Windows\system32\ADVAPI32.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000   C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000   C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`84be0000 00007ffc`84e54000   C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10240.16384_none_f41f7b285750ef43\Comctl32.dll
ModLoad: 00007ffc`782b0000 00007ffc`78806000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EMODEL.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000   C:\Windows\system32\SHLWAPI.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000   C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000   C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`905d0000 00007ffc`9068e000   C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8dd10000 00007ffc`8dd54000   C:\Windows\system32\cfgmgr32.dll
ModLoad: 00007ffc`8bd30000 00007ffc`8bdb2000   C:\Windows\SYSTEM32\firewallapi.dll
ModLoad: 00007ffc`8bcf0000 00007ffc`8bd22000   C:\Windows\SYSTEM32\fwbase.dll
ModLoad: 00007ffc`8a580000 00007ffc`8a598000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EShims.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\SYSTEM32\bcryptPrimitives.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000   C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\SYSTEM32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000   C:\Windows\SYSTEM32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000   C:\Windows\SYSTEM32\USERENV.dll
ModLoad: 00007ffc`7cc90000 00007ffc`7e17f000   C:\Windows\SYSTEM32\EDGEHTML.dll
ModLoad: 00007ffc`7bd90000 00007ffc`7c4c8000   C:\Windows\SYSTEM32\chakra.dll
ModLoad: 00007ffc`7cc50000 00007ffc`7cc8d000   C:\Windows\SYSTEM32\MLANG.dll
ModLoad: 00007ffc`89110000 00007ffc`89241000   C:\Windows\System32\WinTypes.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000   C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`8df70000 00007ffc`8dfd9000   C:\Windows\system32\WS2_32.dll
ModLoad: 00007ffc`8f790000 00007ffc`8f798000   C:\Windows\system32\NSI.dll
ModLoad: 00007ffc`850a0000 00007ffc`850b5000   C:\Windows\SYSTEM32\ondemandconnroutehelper.dll
ModLoad: 00007ffc`88a60000 00007ffc`88a98000   C:\Windows\SYSTEM32\IPHLPAPI.DLL
ModLoad: 00007ffc`88a50000 00007ffc`88a5b000   C:\Windows\SYSTEM32\WINNSI.DLL
ModLoad: 00007ffc`87870000 00007ffc`87946000   C:\Windows\SYSTEM32\winhttp.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000   C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000   C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`8c8d0000 00007ffc`8c92d000   C:\Windows\system32\mswsock.dll
ModLoad: 00007ffc`8aed0000 00007ffc`8aef2000   C:\Windows\SYSTEM32\dwmapi.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000   C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`7c8d0000 00007ffc`7ca72000   C:\Windows\SYSTEM32\ieapfltr.dll
ModLoad: 00007ffc`86570000 00007ffc`865a9000   C:\Windows\SYSTEM32\policymanager.dll
ModLoad: 00007ffc`864d0000 00007ffc`86562000   C:\Windows\SYSTEM32\msvcp110_win.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000   C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`8c6d0000 00007ffc`8c778000   C:\Windows\SYSTEM32\DNSAPI.dll
ModLoad: 00007ffc`827b0000 00007ffc`827f6000   C:\Windows\system32\dataexchange.dll
ModLoad: 00007ffc`884d0000 00007ffc`88a15000   C:\Windows\SYSTEM32\d2d1.dll
ModLoad: 00007ffc`8ac20000 00007ffc`8aec3000   C:\Windows\SYSTEM32\d3d11.dll
ModLoad: 00007ffc`8b2d0000 00007ffc`8b3a1000   C:\Windows\SYSTEM32\dcomp.dll
ModLoad: 00007ffc`8ab80000 00007ffc`8ac1c000   C:\Windows\SYSTEM32\dxgi.dll
ModLoad: 00007ffc`82960000 00007ffc`82a1a000   C:\Windows\system32\twinapi.dll
ModLoad: 00007ffc`8b0d0000 00007ffc`8b12c000   C:\Windows\SYSTEM32\ninput.dll
ModLoad: 00007ffc`86060000 00007ffc`862b9000   C:\Windows\SYSTEM32\DWrite.dll
ModLoad: 00007ffc`8a910000 00007ffc`8ab7e000   C:\Windows\SYSTEM32\d3d10warp.dll
ModLoad: 00007ffc`8a250000 00007ffc`8a2ee000   C:\Windows\System32\Windows.UI.dll
ModLoad: 00007ffc`7ca80000 00007ffc`7ca90000   C:\Windows\system32\msimtf.dll
ModLoad: 00007ffc`85de0000 00007ffc`85e69000   C:\Windows\system32\directmanipulation.dll
ModLoad: 00007ffc`8a2f0000 00007ffc`8a3ff000   C:\Windows\System32\MrmCoreR.dll
ModLoad: 00007ffc`8b260000 00007ffc`8b2c6000   C:\Windows\SYSTEM32\Bcp47Langs.dll
ModLoad: 00007ffc`85ea0000 00007ffc`86026000   C:\Windows\SYSTEM32\windows.globalization.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000   C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`87030000 00007ffc`87098000   C:\Windows\System32\fwpuclnt.dll
ModLoad: 00007ffc`86700000 00007ffc`8670a000   C:\Windows\System32\rasadhlp.dll
ModLoad: 00007ffc`8bdc0000 00007ffc`8bde8000   C:\Windows\System32\rmclient.dll
(fe0.e00): Break instruction exception - code 80000003 (first chance)

Create process 4064 breakpoint.
3:078> g
(1038.1380): Windows Runtime Originate Error - code 40080201 (first chance)
(1038.1380): Windows Runtime Originate Error - code 40080201 (first chance)
(1038.1380): Windows Runtime Originate Error - code 40080201 (first chance)
(fe0.3f4): Break instruction exception - code 80000003 (first chance)

3:066> .lastevent
Last event: fe0.3f4: Break instruction exception - code 80000003 (first chance)
  debugger time: Tue Mar 15 22:15:22.202 2016 (UTC + 1:00)

3:066> |.
.  3 id: fe0 attach name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe

3:066> .exr -1
ExceptionAddress: 00007ffc8d40a1c8 (KERNELBASE!RaiseException+0x0000000000000068)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000001
NumberParameters: 0

3:066> lm on
start             end                 module name
00007ff7`6f000000 00007ff7`6f04d000   microsoftedgecp microsoftedgecp.exe
00007ffc`782b0000 00007ffc`78806000   EMODEL   EMODEL.dll  
00007ffc`7ac60000 00007ffc`7ad08000   ieproxy  ieproxy.dll 
00007ffc`7bd90000 00007ffc`7c4c8000   chakra   chakra.dll  
00007ffc`7c8d0000 00007ffc`7ca72000   ieapfltr ieapfltr.dll
00007ffc`7ca80000 00007ffc`7ca90000   msimtf   msimtf.dll  
00007ffc`7cc50000 00007ffc`7cc8d000   MLANG    MLANG.dll   
00007ffc`7cc90000 00007ffc`7e17f000   EDGEHTML EDGEHTML.dll
00007ffc`80680000 00007ffc`806ed000   verifier verifier.dll
00007ffc`827b0000 00007ffc`827f6000   dataexchange dataexchange.dll
00007ffc`82960000 00007ffc`82a1a000   twinapi  twinapi.dll 
00007ffc`82fa0000 00007ffc`82fb5000   profext  profext.dll 
00007ffc`83df0000 00007ffc`840b1000   WININET  WININET.dll 
00007ffc`84be0000 00007ffc`84e54000   Comctl32 Comctl32.dll
00007ffc`850a0000 00007ffc`850b5000   ondemandconnroutehelper ondemandconnroutehelper.dll
00007ffc`854a0000 00007ffc`85636000   urlmon   urlmon.dll  
00007ffc`85de0000 00007ffc`85e69000   directmanipulation directmanipulation.dll
00007ffc`85ea0000 00007ffc`86026000   windows_globalization windows.globalization.dll
00007ffc`86060000 00007ffc`862b9000   DWrite   DWrite.dll  
00007ffc`864d0000 00007ffc`86562000   msvcp110_win msvcp110_win.dll
00007ffc`86570000 00007ffc`865a9000   policymanager policymanager.dll
00007ffc`86700000 00007ffc`8670a000   rasadhlp rasadhlp.dll
00007ffc`87030000 00007ffc`87098000   fwpuclnt fwpuclnt.dll
00007ffc`87870000 00007ffc`87946000   winhttp  winhttp.dll 
00007ffc`881c0000 00007ffc`881f6000   XmlLite  XmlLite.dll 
00007ffc`884d0000 00007ffc`88a15000   d2d1     d2d1.dll    
00007ffc`88a50000 00007ffc`88a5b000   WINNSI   WINNSI.DLL  
00007ffc`88a60000 00007ffc`88a98000   IPHLPAPI IPHLPAPI.DLL
00007ffc`88d90000 00007ffc`89106000   iertutil iertutil.dll
00007ffc`89110000 00007ffc`89241000   WinTypes WinTypes.dll
00007ffc`8a250000 00007ffc`8a2ee000   Windows_UI Windows.UI.dll
00007ffc`8a2f0000 00007ffc`8a3ff000   MrmCoreR MrmCoreR.dll
00007ffc`8a580000 00007ffc`8a598000   EShims   EShims.dll  
00007ffc`8a910000 00007ffc`8ab7e000   d3d10warp d3d10warp.dll
00007ffc`8ab80000 00007ffc`8ac1c000   dxgi     dxgi.dll    
00007ffc`8ac20000 00007ffc`8aec3000   d3d11    d3d11.dll   
00007ffc`8aed0000 00007ffc`8aef2000   dwmapi   dwmapi.dll  
00007ffc`8af20000 00007ffc`8b0a3000   PROPSYS  PROPSYS.dll 
00007ffc`8b0d0000 00007ffc`8b12c000   ninput   ninput.dll  
00007ffc`8b260000 00007ffc`8b2c6000   Bcp47Langs Bcp47Langs.dll
00007ffc`8b2d0000 00007ffc`8b3a1000   dcomp    dcomp.dll   
00007ffc`8b810000 00007ffc`8b888000   apphelp  apphelp.dll 
00007ffc`8b9c0000 00007ffc`8ba56000   uxtheme  uxtheme.dll 
00007ffc`8ba80000 00007ffc`8bb6e000   twinapi_appcore twinapi.appcore.dll
00007ffc`8bcf0000 00007ffc`8bd22000   fwbase   fwbase.dll  
00007ffc`8bd30000 00007ffc`8bdb2000   firewallapi firewallapi.dll
00007ffc`8bdc0000 00007ffc`8bde8000   rmclient rmclient.dll
00007ffc`8c400000 00007ffc`8c432000   ntmarta  ntmarta.dll 
00007ffc`8c580000 00007ffc`8c5b3000   rsaenh   rsaenh.dll  
00007ffc`8c670000 00007ffc`8c68f000   USERENV  USERENV.dll 
00007ffc`8c6d0000 00007ffc`8c778000   DNSAPI   DNSAPI.dll  
00007ffc`8c8d0000 00007ffc`8c92d000   mswsock  mswsock.dll 
00007ffc`8c930000 00007ffc`8c947000   cryptsp  cryptsp.dll 
00007ffc`8caa0000 00007ffc`8caab000   CRYPTBASE CRYPTBASE.dll
00007ffc`8cca0000 00007ffc`8cccc000   SspiCli  SspiCli.dll 
00007ffc`8ce70000 00007ffc`8cedb000   bcryptPrimitives bcryptPrimitives.dll
00007ffc`8cff0000 00007ffc`8d018000   bcrypt   bcrypt.dll  
00007ffc`8d0c0000 00007ffc`8d0cf000   kernel_appcore kernel.appcore.dll
00007ffc`8d0d0000 00007ffc`8d11a000   powrprof powrprof.dll
00007ffc`8d120000 00007ffc`8d133000   profapi  profapi.dll 
00007ffc`8d3e0000 00007ffc`8d5bd000   KERNELBASE KERNELBASE.dll
00007ffc`8d620000 00007ffc`8dc48000   windows_storage windows.storage.dll
00007ffc`8dc50000 00007ffc`8dd03000   shcore   shcore.dll  
00007ffc`8dd10000 00007ffc`8dd54000   cfgmgr32 cfgmgr32.dll
00007ffc`8dd60000 00007ffc`8ddb1000   SHLWAPI  SHLWAPI.dll 
00007ffc`8df70000 00007ffc`8dfd9000   WS2_32   WS2_32.dll  
00007ffc`8dfe0000 00007ffc`8f502000   SHELL32  SHELL32.dll 
00007ffc`8f6e0000 00007ffc`8f716000   IMM32    IMM32.DLL   
00007ffc`8f790000 00007ffc`8f798000   NSI      NSI.dll     
00007ffc`8f8e0000 00007ffc`8fa06000   RPCRT4   RPCRT4.dll  
00007ffc`8fa10000 00007ffc`8fb96000   GDI32    GDI32.dll   
00007ffc`8fba0000 00007ffc`8fc4d000   KERNEL32 KERNEL32.DLL
00007ffc`8fd20000 00007ffc`8fe7c000   MSCTF    MSCTF.dll   
00007ffc`8fe80000 00007ffc`900fc000   combase  combase.dll 
00007ffc`90100000 00007ffc`90241000   ole32    ole32.dll   
00007ffc`90250000 00007ffc`902ed000   msvcrt   msvcrt.dll  
00007ffc`90300000 00007ffc`9044e000   USER32   USER32.dll  
00007ffc`904b0000 00007ffc`9050b000   sechost  sechost.dll 
00007ffc`90510000 00007ffc`905b6000   ADVAPI32 ADVAPI32.dll
00007ffc`905d0000 00007ffc`9068e000   OLEAUT32 OLEAUT32.dll
00007ffc`90690000 00007ffc`90852000   ntdll    ntdll.dll   

3:066> kn 0x64
 # Child-SP          RetAddr           Call Site
00 000000f4`54b93f80 00007ffc`7d1cee17 KERNELBASE!RaiseException+0x67
01 000000f4`54b94060 00007ffc`7d29e4a0 EDGEHTML!Abandonment::InduceAbandonment+0x1f
02 000000f4`54b94090 00007ffc`7d139283 EDGEHTML!Abandonment::CheckHRESULTStrict+0x360b90
03 000000f4`54b940c0 00007ffc`7cf7353c EDGEHTML!CJScript9Holder::GetPrototype+0x9b
04 000000f4`54b94160 00007ffc`7cf0d6d3 EDGEHTML!CJScript9Holder::CBaseToVar+0x57c
05 000000f4`54b941d0 00007ffc`7cf0bcd1 EDGEHTML!CJScript9Holder::EnsurePinRoot+0x1f
06 000000f4`54b94200 00007ffc`7cd37d35 EDGEHTML!CDOMEvent::InitRelationshipBase+0xad
07 000000f4`54b94230 00007ffc`7d13d82f EDGEHTML!CDOMGamepadEvent::InitRelationships+0x15
08 000000f4`54b94260 00007ffc`7cf733b3 EDGEHTML!CDOMEvent::JSBind_Root+0x4f
09 000000f4`54b94290 00007ffc`7cf0c7bd EDGEHTML!CJScript9Holder::CBaseToVar+0x3f3
0a 000000f4`54b94300 00007ffc`7cf0c435 EDGEHTML!CEventMgr::_InvokeListeners+0x34d
0b 000000f4`54b94440 00007ffc`7cf0b76c EDGEHTML!CEventMgr::_DispatchCapturePhase+0x51
0c 000000f4`54b94470 00007ffc`7d075a8f EDGEHTML!CEventMgr::Dispatch+0x2ec
0d 000000f4`54b94720 00007ffc`7d073ec9 EDGEHTML!CEventMgr::DispatchDOMMutationEvent+0x93
0e 000000f4`54b94770 00007ffc`7ce83892 EDGEHTML!CSpliceTreeEngine::HandleRemovalMutations+0x381
0f 000000f4`54b94a90 00007ffc`7cf45c4b EDGEHTML!CSpliceTreeEngine::RemoveSplice+0x282
10 000000f4`54b94f20 00007ffc`7cf40471 EDGEHTML!Tree::TreeWriter::SpliceTreeInternal+0x10b
11 000000f4`54b95160 00007ffc`7cf9cefa EDGEHTML!Tree::TreeWriter::CutCopyMoveLegacy+0x5a1
12 000000f4`54b95350 00007ffc`7cd02a39 EDGEHTML!Tree::STextRange::Remove+0x11e
13 000000f4`54b954f0 00007ffc`7d07468e EDGEHTML!CElement::MoveToSeparateMarkup+0x23d
14 000000f4`54b95900 00007ffc`7d0745e0 EDGEHTML!CElement::PutTextContentHelper+0x7e
15 000000f4`54b95940 00007ffc`7d074570 EDGEHTML!CElement::put_textContent+0x50
16 000000f4`54b959a0 00007ffc`7d0744f1 EDGEHTML!CDOMNode::Var_set_textContent+0x60
17 000000f4`54b95a10 00007ffc`7bfdc703 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x71
18 000000f4`54b95a80 00007ffc`7be08e72 chakra!amd64_CallFunction+0x93
19 000000f4`54b95ad0 00007ffc`7be01b7e chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x172
1a 000000f4`54b95b70 00007ffc`7bebccf7 chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0xba
1b 000000f4`54b95bb0 00007ffc`7be0c705 chakra!Js::JavascriptOperators::CallSetter+0xaf
1c 000000f4`54b95c50 00007ffc`7be0e258 chakra!Js::CacheOperators::TrySetProperty<1,1,1,1,1,1,0,1>+0x2f5
1d 000000f4`54b95cd0 00007ffc`7be151cc chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x118
1e 000000f4`54b95da0 00007ffc`7be12fc2 chakra!Js::InterpreterStackFrame::ProcessProfiled+0x44c
1f 000000f4`54b95e20 00007ffc`7bf5a155 chakra!Js::InterpreterStackFrame::Process+0xd2
20 000000f4`54b95e80 00007ffc`7bf5c07d chakra!BailOutRecord::BailOutHelper+0x2b5
21 000000f4`54b96190 00007ffc`7bfad172 chakra!BailOutRecord::BailOutCommonNoCodeGen+0x91
22 000000f4`54b96210 00007ffc`7bfbd50d chakra!BailOutRecord::BailOutCommon+0x8e
23 000000f4`54b96300 000000f4`613505b1 chakra!BailOutRecord::BailOut+0x3d
24 000000f4`54b96350 00007ffc`7bfdc703 0x000000f4`613505b1
25 000000f4`54b963d0 00007ffc`7bf0bfb3 chakra!amd64_CallFunction+0x93
26 000000f4`54b96420 00007ffc`7bf0b6ea chakra!Js::JavascriptFunction::CallFunction<1>+0x83
27 000000f4`54b96480 00007ffc`7bf0b28b chakra!Js::JavascriptFunction::CallRootFunctionInternal+0x11a
28 000000f4`54b96580 00007ffc`7bf2c72a chakra!Js::JavascriptFunction::CallRootFunction+0x33
29 000000f4`54b96720 00007ffc`7bf053c4 chakra!ScriptSite::CallRootFunction+0xaa
2a 000000f4`54b967c0 00007ffc`7bf094fc chakra!ScriptSite::Execute+0x134
2b 000000f4`54b96850 00007ffc`7ce26194 chakra!ScriptEngineBase::Execute+0xcc
2c 000000f4`54b968f0 00007ffc`7ce25f12 EDGEHTML!CListenerDispatch::InvokeVar+0x264
2d 000000f4`54b96a70 00007ffc`7cf0c80c EDGEHTML!CListenerDispatch::Invoke+0x92
2e 000000f4`54b96ac0 00007ffc`7cf0c435 EDGEHTML!CEventMgr::_InvokeListeners+0x39c
2f 000000f4`54b96c00 00007ffc`7cf0b76c EDGEHTML!CEventMgr::_DispatchCapturePhase+0x51
30 000000f4`54b96c30 00007ffc`7d075a8f EDGEHTML!CEventMgr::Dispatch+0x2ec
31 000000f4`54b96ee0 00007ffc`7d073ec9 EDGEHTML!CEventMgr::DispatchDOMMutationEvent+0x93
32 000000f4`54b96f30 00007ffc`7ce83892 EDGEHTML!CSpliceTreeEngine::HandleRemovalMutations+0x381
33 000000f4`54b97250 00007ffc`7cf45c4b EDGEHTML!CSpliceTreeEngine::RemoveSplice+0x282
34 000000f4`54b976e0 00007ffc`7cf403b0 EDGEHTML!Tree::TreeWriter::SpliceTreeInternal+0x10b
35 000000f4`54b97920 00007ffc`7cf3d7a3 EDGEHTML!Tree::TreeWriter::CutCopyMoveLegacy+0x4e0
36 000000f4`54b97b10 00007ffc`7cfa070c EDGEHTML!Tree::TreeWriter::MoveNodeLegacy+0x193
37 000000f4`54b97da0 00007ffc`7d21afda EDGEHTML!Tree::TreeWriter::PrependChild+0x3c
38 000000f4`54b97dd0 00007ffc`7d07468e EDGEHTML!CElement::MoveToSeparateMarkup+0x5187de
39 000000f4`54b981e0 00007ffc`7d0745e0 EDGEHTML!CElement::PutTextContentHelper+0x7e
3a 000000f4`54b98220 00007ffc`7d074570 EDGEHTML!CElement::put_textContent+0x50
3b 000000f4`54b98280 00007ffc`7d0744f1 EDGEHTML!CDOMNode::Var_set_textContent+0x60
3c 000000f4`54b982f0 00007ffc`7bfdc703 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x71
3d 000000f4`54b98360 00007ffc`7be08e72 chakra!amd64_CallFunction+0x93
3e 000000f4`54b983b0 00007ffc`7be01b7e chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x172
3f 000000f4`54b98450 00007ffc`7bebccf7 chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0xba
40 000000f4`54b98490 00007ffc`7be0c705 chakra!Js::JavascriptOperators::CallSetter+0xaf
41 000000f4`54b98530 00007ffc`7be0e258 chakra!Js::CacheOperators::TrySetProperty<1,1,1,1,1,1,0,1>+0x2f5
42 000000f4`54b985b0 00007ffc`7be151cc chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x118
43 000000f4`54b98680 00007ffc`7be12fc2 chakra!Js::InterpreterStackFrame::ProcessProfiled+0x44c
44 000000f4`54b98700 00007ffc`7bf5a155 chakra!Js::InterpreterStackFrame::Process+0xd2
45 000000f4`54b98760 00007ffc`7bf5c07d chakra!BailOutRecord::BailOutHelper+0x2b5
46 000000f4`54b98a70 00007ffc`7bfad172 chakra!BailOutRecord::BailOutCommonNoCodeGen+0x91
47 000000f4`54b98af0 00007ffc`7bfbd50d chakra!BailOutRecord::BailOutCommon+0x8e
48 000000f4`54b98be0 000000f4`613505b1 chakra!BailOutRecord::BailOut+0x3d
49 000000f4`54b98c30 00007ffc`7bfdc703 0x000000f4`613505b1
4a 000000f4`54b98cb0 00007ffc`7bf0bfb3 chakra!amd64_CallFunction+0x93
4b 000000f4`54b98d00 00007ffc`7bf0b6ea chakra!Js::JavascriptFunction::CallFunction<1>+0x83
4c 000000f4`54b98d60 00007ffc`7bf0b28b chakra!Js::JavascriptFunction::CallRootFunctionInternal+0x11a
4d 000000f4`54b98e60 00007ffc`7bf2c72a chakra!Js::JavascriptFunction::CallRootFunction+0x33
4e 000000f4`54b99000 00007ffc`7bf053c4 chakra!ScriptSite::CallRootFunction+0xaa
4f 000000f4`54b990a0 00007ffc`7bf094fc chakra!ScriptSite::Execute+0x134
50 000000f4`54b99130 00007ffc`7ce26194 chakra!ScriptEngineBase::Execute+0xcc
51 000000f4`54b991d0 00007ffc`7ce25f12 EDGEHTML!CListenerDispatch::InvokeVar+0x264
52 000000f4`54b99350 00007ffc`7cf0c80c EDGEHTML!CListenerDispatch::Invoke+0x92
53 000000f4`54b993a0 00007ffc`7cf0c435 EDGEHTML!CEventMgr::_InvokeListeners+0x39c
54 000000f4`54b994e0 00007ffc`7cf0b76c EDGEHTML!CEventMgr::_DispatchCapturePhase+0x51
55 000000f4`54b99510 00007ffc`7d075a8f EDGEHTML!CEventMgr::Dispatch+0x2ec
56 000000f4`54b997c0 00007ffc`7d073ec9 EDGEHTML!CEventMgr::DispatchDOMMutationEvent+0x93
57 000000f4`54b99810 00007ffc`7ce83892 EDGEHTML!CSpliceTreeEngine::HandleRemovalMutations+0x381
58 000000f4`54b99b30 00007ffc`7cf45c4b EDGEHTML!CSpliceTreeEngine::RemoveSplice+0x282
59 000000f4`54b99fc0 00007ffc`7cf403b0 EDGEHTML!Tree::TreeWriter::SpliceTreeInternal+0x10b
5a 000000f4`54b9a200 00007ffc`7cf3d7a3 EDGEHTML!Tree::TreeWriter::CutCopyMoveLegacy+0x4e0
5b 000000f4`54b9a3f0 00007ffc`7cfa070c EDGEHTML!Tree::TreeWriter::MoveNodeLegacy+0x193
5c 000000f4`54b9a680 00007ffc`7d21afda EDGEHTML!Tree::TreeWriter::PrependChild+0x3c
5d 000000f4`54b9a6b0 00007ffc`7d07468e EDGEHTML!CElement::MoveToSeparateMarkup+0x5187de
5e 000000f4`54b9aac0 00007ffc`7d0745e0 EDGEHTML!CElement::PutTextContentHelper+0x7e
5f 000000f4`54b9ab00 00007ffc`7d074570 EDGEHTML!CElement::put_textContent+0x50
60 000000f4`54b9ab60 00007ffc`7d0744f1 EDGEHTML!CDOMNode::Var_set_textContent+0x60
61 000000f4`54b9abd0 00007ffc`7bfdc703 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x71
62 000000f4`54b9ac40 00007ffc`7be08e72 chakra!amd64_CallFunction+0x93
63 000000f4`54b9ac90 00007ffc`7be01b7e chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x172

3:066> .if ($vvalid(@$scopeip - 40, 40)) { u @$scopeip - 40 @$scopeip - 1; };
KERNELBASE!RaiseException+0x27:
00007ffc`8d40a187 e201            loop    KERNELBASE!RaiseException+0x2a (00007ffc`8d40a18a)
00007ffc`8d40a189 894c2420        mov     dword ptr [rsp+20h],ecx
00007ffc`8d40a18d 89542424        mov     dword ptr [rsp+24h],edx
00007ffc`8d40a191 4889442430      mov     qword ptr [rsp+30h],rax
00007ffc`8d40a196 4d85c9          test    r9,r9
00007ffc`8d40a199 7445            je      KERNELBASE!RaiseException+0x80 (00007ffc`8d40a1e0)
00007ffc`8d40a19b b80f000000      mov     eax,0Fh
00007ffc`8d40a1a0 488d4c2440      lea     rcx,[rsp+40h]
00007ffc`8d40a1a5 443bc0          cmp     r8d,eax
00007ffc`8d40a1a8 498bd1          mov     rdx,r9
00007ffc`8d40a1ab 440f47c0        cmova   r8d,eax
00007ffc`8d40a1af 4489442438      mov     dword ptr [rsp+38h],r8d
00007ffc`8d40a1b4 49c1e003        shl     r8,3
00007ffc`8d40a1b8 e85feb0400      call    KERNELBASE!memcpy (00007ffc`8d458d1c)
00007ffc`8d40a1bd 488d4c2420      lea     rcx,[rsp+20h]
00007ffc`8d40a1c2 ff1518050a00    call    qword ptr [KERNELBASE!_imp_RtlRaiseException (00007ffc`8d4aa6e0)]

3:066> .if ($vvalid(@$scopeip, 40)) { u @$scopeip @$scopeip + 39; };
KERNELBASE!RaiseException+0x67:
00007ffc`8d40a1c7 00488b          add     byte ptr [rax-75h],cl
00007ffc`8d40a1ca 8c24c0          mov     word ptr [rax+rax*8],fs
00007ffc`8d40a1cd 0000            add     byte ptr [rax],al
00007ffc`8d40a1cf 004833          add     byte ptr [rax+33h],cl
00007ffc`8d40a1d2 cc              int     3
00007ffc`8d40a1d3 e838b40400      call    KERNELBASE!_security_check_cookie (00007ffc`8d455610)
00007ffc`8d40a1d8 4881c4d8000000  add     rsp,0D8h
00007ffc`8d40a1df c3              ret
00007ffc`8d40a1e0 8364243800      and     dword ptr [rsp+38h],0
00007ffc`8d40a1e5 ebd6            jmp     KERNELBASE!RaiseException+0x5d (00007ffc`8d40a1bd)
00007ffc`8d40a1e7 cc              int     3
00007ffc`8d40a1e8 cc              int     3
00007ffc`8d40a1e9 cc              int     3
00007ffc`8d40a1ea cc              int     3
00007ffc`8d40a1eb cc              int     3
00007ffc`8d40a1ec cc              int     3
00007ffc`8d40a1ed cc              int     3
00007ffc`8d40a1ee cc              int     3
00007ffc`8d40a1ef cc              int     3
KERNELBASE!BasepCreateProcessParameters:
00007ffc`8d40a1f0 488bc4          mov     rax,rsp
00007ffc`8d40a1f3 48895808        mov     qword ptr [rax+8],rbx
00007ffc`8d40a1f7 48897018        mov     qword ptr [rax+18h],rsi
00007ffc`8d40a1fb 48897820        mov     qword ptr [rax+20h],rdi
00007ffc`8d40a1ff 48895010        mov     qword ptr [rax+10h],rdx

3:066> rM 0x7D
rax=000000f45b067fc0 rbx=00007ffc906a1eee rcx=00000001e06d7363
rdx=0000000000000000 rsi=00007ffc907afc64 rdi=000000f454b93fa0
rip=00007ffc8d40a1c7 rsp=000000f454b93f80 rbp=000000f45cf1a8f0
 r8=00007ffc7bd90000  r9=000000ec4f15b6c0 r10=000000f45b067fc0
r11=000000ec4f15b6c0 r12=00007ffc7d1d30f0 r13=0000000000001018
r14=0000000000000078 r15=000000f472378fa0
iopl=0         nv up ei pl nz na po nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000204
fpcw=027F    fpsw=0000    fptw=0000
st0=-0.000076193774342561060e-0713  st1=-0.000223717438833617300e+0252
st2=-1.189731495357231764960e+4932  st3= 0.000000548965837955410e-0352
st4= 0.000000029381170837930e-4933  st5= 0.000000000000000000000e+0000
st6= 0.000000000354118814970e-0357  st7= 0.000512961201644510030e-4933
mm0=0000dc9a11fab7f6  mm1=00007ffc7c417b90
mm2=fffffffffffffffe  mm3=000000ec4f15b6c0
mm4=00000001e06d7363  mm5=0000000000000000
mm6=0000000019930520  mm7=00007ffc7c417b90
xmm0=4.59121e-041 2.51377e+036 3.41917e-043 6.36454e+012
xmm1=3.41917e-043 3.78573e+016 4.59121e-041 2.25346e+036
xmm2=0 1.4013e-045 3.30706e-043 2.51178e+009
xmm3=3.41917e-043 3.7555e+016 0 0
xmm4=0 0 4.59121e-041 4.0336e+036
xmm5=4.59121e-041 2.50793e+036 3.41917e-043 3.65922e+016
xmm6=0 0 0 0
xmm7=0 0 0 0
xmm8=0 0 0 0
xmm9=0 0 0 0
xmm10=0 0 0 0
xmm11=0 0 0 0
xmm12=0 0 0 0
xmm13=0 0 0 0
xmm14=0 0 0 0
xmm15=0 0 0 0
dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000
dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000
KERNELBASE!RaiseException+0x67:
00007ffc`8d40a1c7 00488b          add     byte ptr [rax-75h],cl ds:000000f4`5b067f4b=5b

3:066> dpp @$ea - 10*$ptrsize L10;
000000f4`5b067ecb  00000000`00000000
000000f4`5b067ed3  00000000`00000000
000000f4`5b067edb  00000000`00000000
000000f4`5b067ee3  00000000`00000000
000000f4`5b067eeb  00000000`00000000
000000f4`5b067ef3  00000000`00000000
000000f4`5b067efb  067ec100`00000000
000000f4`5b067f03  00000000`0000f45b
000000f4`5b067f0b  00000000`00000000
000000f4`5b067f13  00000000`00000000
000000f4`5b067f1b  00000000`00000000
000000f4`5b067f23  00000000`00000000
000000f4`5b067f2b  00000000`00000000
000000f4`5b067f33  00000000`00000000
000000f4`5b067f3b  00001a00`00000000
000000f4`5b067f43  04dc0000`00000000

3:066> dpp @$ea L10;
000000f4`5b067f4b  7d370000`0000f45b
000000f4`5b067f53  165bb000`0000f45b
000000f4`5b067f5b  00000000`007ffc7c
000000f4`5b067f63  0255c000`00000000
000000f4`5b067f6b  00000000`0000f45b
000000f4`5b067f73  00000000`00000000
000000f4`5b067f7b  0006c300`00000000
000000f4`5b067f83  423498ff`ffffff00
000000f4`5b067f8b  01072300`007ffc7c
000000f4`5b067f93  422390ff`ffffff00
000000f4`5b067f9b  02079300`007ffc7c
000000f4`5b067fa3  423658ff`ffffff00
000000f4`5b067fab  ff070100`007ffc7c
000000f4`5b067fb3  00000000`000000ff
000000f4`5b067fbb  2e274800`00000000
000000f4`5b067fc3  067f4000`007ffc7c

3:066> dpp @$ea2 - 10*$ptrsize L10;
Bad register error at '@$ea2 - 10*$ptrsize '

3:066> lm M *microsoftedgecp.exe
start             end                 module name
00007ff7`6f000000 00007ff7`6f04d000   microsoftedgecp   (deferred)             

3:066> lmv m *EDGEHTML
start             end                 module name
00007ffc`7cc90000 00007ffc`7e17f000   EDGEHTML   (pdb symbols)          c:\symbols\edgehtml.pdb\F9526BA119114822A01B413255AFCF0F1\edgehtml.pdb
    Loaded symbol image file: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image path: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image name: EDGEHTML.dll
    Timestamp:        Tue Feb 23 11:48:08 2016 (56CC38E8)
    CheckSum:         014DD388
    ImageSize:        014EF000
    File version:     11.0.10240.16724
    Product version:  11.0.10240.16724
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Internet Explorer
    InternalName:     EDGEHTML
    OriginalFilename: EDGEHTML.DLL
    ProductVersion:   11.00.10240.16724
    FileVersion:      11.00.10240.16724 (th1_st1.160222-1812)
    FileDescription:  Microsoft (R) HTML Viewer
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

3:066> lmv m *microsoftedgecp
start             end                 module name
00007ff7`6f000000 00007ff7`6f04d000   microsoftedgecp   (deferred)             
    Image path: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
    Image name: microsoftedgecp.exe
    Timestamp:        Wed Nov 25 05:17:08 2015 (56553644)
    CheckSum:         0004DF0B
    ImageSize:        0004D000
    File version:     11.0.10240.16603
    Product version:  11.0.10240.16603
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft Edge
    InternalName:     MicrosoftEdgeCP
    OriginalFilename: MicrosoftEdgeCP.exe
    ProductVersion:   11.00.10240.16603
    FileVersion:      11.00.10240.16603 (th1_st1.151124-1750)
    FileDescription:  Microsoft Edge Content Process
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

3:066>