Details

Id:  AVR:Free 41b.646
Description:  Access violation while reading freed memory at 0x6F084FBF50
Location:  microsoftedgecp.exe!edgehtml.dll!Tree::ANode::IsInTree
Security impact:  Potentially exploitable security issue

Stack

Page heap

Page heap report for address 0x6F084FBF50:

    address 0000006f084fbf50 found in
    _DPH_HEAP_ROOT @ 6f08441000
    in free-ed allocation (  DPH_HEAP_BLOCK:         VirtAddr         VirtSize)
                                 6f08442068:       6f084fb000             2000
    00007ffc9077cc13 ntdll!RtlDebugFreeHeap+0x0000000000000047
    00007ffc907353d9 ntdll!RtlpFreeHeap+0x0000000000079519
    00007ffc906baa16 ntdll!RtlFreeHeap+0x0000000000000106
    00007ffc7d1f366c EDGEHTML!MemoryProtection::HeapFree+0x00000000003736dc
    00007ffc7cf45807 EDGEHTML!CTreeNode::NodeRelease+0x0000000000000057
    00007ffc7ce848a4 EDGEHTML!CSpliceTreeEngine::RemoveSplice+0x0000000000001294
    00007ffc7cf45c4b EDGEHTML!Tree::TreeWriter::SpliceTreeInternal+0x000000000000010b
    00007ffc7cf403b0 EDGEHTML!Tree::TreeWriter::CutCopyMoveLegacy+0x00000000000004e0
    00007ffc7cf3d7a3 EDGEHTML!Tree::TreeWriter::MoveNodeLegacy+0x0000000000000193
    00007ffc7cfa070c EDGEHTML!Tree::TreeWriter::PrependChild+0x000000000000003c
    00007ffc7d21afda EDGEHTML!CElement::MoveToSeparateMarkup+0x00000000005187de
    00007ffc7d07468e EDGEHTML!CElement::PutTextContentHelper+0x000000000000007e
    00007ffc7d0745e0 EDGEHTML!CElement::put_textContent+0x0000000000000050
    00007ffc7d074570 EDGEHTML!CDOMNode::Var_set_textContent+0x0000000000000060
    00007ffc7d0744f1 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x0000000000000071
    00007ffc7bfdc703 chakra!amd64_CallFunction+0x0000000000000093
    00007ffc7be08e72 chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x0000000000000172
    00007ffc7be01b7e chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0x00000000000000ba
    00007ffc7bebccf7 chakra!Js::JavascriptOperators::CallSetter+0x00000000000000af
    00007ffc7beca7fc chakra!Js::JavascriptOperators::SetProperty_Internal<0>+0x0000000000000c9c
    00007ffc7bf29fff chakra!Js::JavascriptOperators::OP_SetProperty+0x000000000000008f
    00007ffc7bf29f1a chakra!Js::JavascriptOperators::PatchPutValueNoFastPath+0x0000000000000082
    00007ffc7be0e325 chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x00000000000001e5
    00007ffc7be151cc chakra!Js::InterpreterStackFrame::ProcessProfiled+0x000000000000044c
    00007ffc7be12fc2 chakra!Js::InterpreterStackFrame::Process+0x00000000000000d2
    00007ffc7bf57be8 chakra!Js::InterpreterStackFrame::InterpreterHelper+0x0000000000000368
    00007ffc7bf57875 chakra!Js::InterpreterStackFrame::InterpreterThunk+0x0000000000000055
    0000006f142a0fb2 +0x0000006f142a0fb2

 

Disassembly

00007ffc`7ce85dee 4883c420        add     rsp,20h
00007ffc`7ce85df2 5b              pop     rbx
00007ffc`7ce85df3 e920f0f3ff      jmp     EDGEHTML!Tree::ElementNode::GetSubordinateBridge (00007ffc`7cdc4e18)
00007ffc`7ce85df8 cc              int     3
00007ffc`7ce85df9 cc              int     3
00007ffc`7ce85dfa cc              int     3
00007ffc`7ce85dfb cc              int     3
00007ffc`7ce85dfc cc              int     3
00007ffc`7ce85dfd cc              int     3
00007ffc`7ce85dfe cc              int     3
00007ffc`7ce85dff cc              int     3
EDGEHTML!Tree::ANode::IsInTree:
00007ffc`7ce85e00 48894c2408      mov     qword ptr [rsp+8],rcx
00007ffc`7ce85e05 4883ec28        sub     rsp,28h
00007ffc`7ce85e09 488b442430      mov     rax,qword ptr [rsp+30h]
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10            mov     edx,dword ptr [rax]                    ⇐ instruction pointer
00007ffc`7ce85e10 f6c204          test    dl,4
00007ffc`7ce85e13 7525            jne     EDGEHTML!Tree::ANode::IsInTree+0x3a (00007ffc`7ce85e3a)
00007ffc`7ce85e15 f6406202        test    byte ptr [rax+62h],2
00007ffc`7ce85e19 741b            je      EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e1b 488b4810        mov     rcx,qword ptr [rax+10h]
00007ffc`7ce85e1f 480b4808        or      rcx,qword ptr [rax+8]
00007ffc`7ce85e23 7411            je      EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e25 488b4838        mov     rcx,qword ptr [rax+38h]
00007ffc`7ce85e29 480b4830        or      rcx,qword ptr [rax+30h]
00007ffc`7ce85e2d 7407            je      EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e2f b001            mov     al,1
00007ffc`7ce85e31 4883c428        add     rsp,28h
00007ffc`7ce85e35 c3              ret
00007ffc`7ce85e36 32c0            xor     al,al
00007ffc`7ce85e38 ebf7            jmp     EDGEHTML!Tree::ANode::IsInTree+0x31 (00007ffc`7ce85e31)
00007ffc`7ce85e3a 488b4810        mov     rcx,qword ptr [rax+10h]
00007ffc`7ce85e3e 480b4808        or      rcx,qword ptr [rax+8]

Registers

rax=0000006f084fbf50 rbx=0000006f0a22b220 rcx=0000006f084fbf50
rdx=0000006f0a22ac98 rsi=0000006f084fbf50 rdi=0000000000000001
rip=00007ffc7ce85e0e rsp=0000006f0a22aee0 rbp=0000006f0a22b010
 r8=0000006f0fccfa20  r9=0000006f03fa9b90 r10=00007ffc7cfe3ac0
r11=00007ffc7cf78290 r12=0000000000000000 r13=0000006f084fbf50
r14=0000006f084d9950 r15=0000006f084fbf50
iopl=0         nv up ei pl nz na pe nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
fpcw=027F    fpsw=0000    fptw=0000
st0= 0.000000000000000000000e+0000  st1= 0.000000000000000000000e+0000
st2= 0.000000000000000000000e+0000  st3= 0.000000000000000000000e+0000
st4= 0.000000000000000000000e+0000  st5= 0.000000000000000000000e+0000
st6= 0.000000000000000000000e+0000  st7= 0.000000000000000000000e+0000
mm0=0000000000000000  mm1=0000000000000000
mm2=0000000000000000  mm3=0000000000000000
mm4=0000000000000000  mm5=0000000000000000
mm6=0000000000000000  mm7=0000000000000000
xmm0=0 0 0 0
xmm1=0 0 0 0
xmm2=0 0 0 0
xmm3=0 0 0 0
xmm4=0 0 0 0
xmm5=0 0 0 0
xmm6=0 0 0 0
xmm7=0 0 0 0
xmm8=0 0 0 0
xmm9=0 0 0 0
xmm10=0 0 0 0
xmm11=0 0 0 0
xmm12=0 0 0 0
xmm13=0 0 0 0
xmm14=0 0 0 0
xmm15=0 0 0 0
dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000
dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10            mov     edx,dword ptr [rax] ds:0000006f`084fbf50=????????

Referenced memory

Memory around address 0x6F084FBF50:

0000006f`084fbed0  ????????`????????
0000006f`084fbed8  ????????`????????
0000006f`084fbee0  ????????`????????
0000006f`084fbee8  ????????`????????
0000006f`084fbef0  ????????`????????
0000006f`084fbef8  ????????`????????
0000006f`084fbf00  ????????`????????
0000006f`084fbf08  ????????`????????
0000006f`084fbf10  ????????`????????
0000006f`084fbf18  ????????`????????
0000006f`084fbf20  ????????`????????
0000006f`084fbf28  ????????`????????
0000006f`084fbf30  ????????`????????
0000006f`084fbf38  ????????`????????
0000006f`084fbf40  ????????`????????
0000006f`084fbf48  ????????`????????
0000006f`084fbf50  ????????`????????
0000006f`084fbf58  ????????`????????
0000006f`084fbf60  ????????`????????
0000006f`084fbf68  ????????`????????
0000006f`084fbf70  ????????`????????
0000006f`084fbf78  ????????`????????
0000006f`084fbf80  ????????`????????
0000006f`084fbf88  ????????`????????
0000006f`084fbf90  ????????`????????
0000006f`084fbf98  ????????`????????
0000006f`084fbfa0  ????????`????????
0000006f`084fbfa8  ????????`????????
0000006f`084fbfb0  ????????`????????
0000006f`084fbfb8  ????????`????????
0000006f`084fbfc0  ????????`????????
0000006f`084fbfc8  ????????`????????

Binary information

EDGEHTML.dll

    Loaded symbol image file: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image path: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image name: EDGEHTML.dll
    Timestamp:        Tue Feb 23 11:48:08 2016 (56CC38E8)
    CheckSum:         014DD388
    ImageSize:        014EF000
    File version:     11.0.10240.16724
    Product version:  11.0.10240.16724
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Internet Explorer
    InternalName:     EDGEHTML
    OriginalFilename: EDGEHTML.DLL
    ProductVersion:   11.00.10240.16724
    FileVersion:      11.00.10240.16724 (th1_st1.160222-1812)
    FileDescription:  Microsoft (R) HTML Viewer
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

microsoftedgecp.exe

    Image path: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
    Image name: microsoftedgecp.exe
    Timestamp:        Wed Nov 25 05:17:08 2015 (56553644)
    CheckSum:         0004DF0B
    ImageSize:        0004D000
    File version:     11.0.10240.16603
    Product version:  11.0.10240.16603
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft Edge
    InternalName:     MicrosoftEdgeCP
    OriginalFilename: MicrosoftEdgeCP.exe
    ProductVersion:   11.00.10240.16603
    FileVersion:      11.00.10240.16603 (th1_st1.151124-1750)
    FileDescription:  Microsoft Edge Content Process
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

Debugger IO


Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff6`a5060000 00007ff6`a5076000   C:\Windows\System32\RuntimeBroker.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\System32\bcryptPrimitives.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8fc70000 00007ffc`8fd15000   C:\Windows\system32\clbcatq.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\System32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\System32\CRYPTBASE.dll
ModLoad: 00007ffc`857f0000 00007ffc`85815000   C:\Windows\System32\Windows.ApplicationModel.Core.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000   C:\Windows\SYSTEM32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000   C:\Windows\System32\USERENV.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000   C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000   C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\system32\SspiCli.dll
ModLoad: 00007ffc`82f60000 00007ffc`82f76000   C:\Windows\SYSTEM32\capauthz.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000   C:\Windows\system32\apphelp.dll
(764.1090): Break instruction exception - code 80000003 (first chance)
ntdll!DbgBreakPoint:
00007ffc`907253e0 cc              int     3

Create process 1892 breakpoint.
0:007> g
*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff7`d6770000 00007ff7`d677a000   C:\Windows\system32\browser_broker.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\user32.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\system32\bcryptPrimitives.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000   C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8a550000 00007ffc`8a568000   C:\Windows\SYSTEM32\browserbroker.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000   C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`905d0000 00007ffc`9068e000   C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8d210000 00007ffc`8d3d1000   C:\Windows\system32\CRYPT32.dll
ModLoad: 00007ffc`8d140000 00007ffc`8d151000   C:\Windows\system32\MSASN1.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000   C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000   C:\Windows\system32\advapi32.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000   C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000   C:\Windows\system32\shlwapi.dll
ModLoad: 00007ffc`8c300000 00007ffc`8c31c000   C:\Windows\SYSTEM32\MPR.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000   C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000   C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8c4e0000 00007ffc`8c4ea000   C:\Windows\SYSTEM32\DPAPI.DLL
ModLoad: 00007ffc`8fc70000 00007ffc`8fd15000   C:\Windows\system32\clbcatq.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\system32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000   C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000   C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000   C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
(1244.594): Break instruction exception - code 80000003 (first chance)

Create process 4676 breakpoint.
1:017> g
*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff6`efb70000 00007ff6`f016e000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000   C:\Windows\system32\apphelp.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000   C:\Windows\system32\ADVAPI32.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8a400000 00007ffc`8a46a000   C:\Windows\SYSTEM32\wincorlib.DLL
ModLoad: 00007ffc`905d0000 00007ffc`9068e000   C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\SYSTEM32\bcryptPrimitives.dll
ModLoad: 00007ffc`89250000 00007ffc`8a246000   C:\Windows\System32\Windows.UI.Xaml.dll
ModLoad: 00007ffc`89110000 00007ffc`89241000   C:\Windows\SYSTEM32\wintypes.dll
ModLoad: 00007ffc`8b130000 00007ffc`8b1f8000   C:\Windows\SYSTEM32\CoreMessaging.dll
ModLoad: 00007ffc`8b260000 00007ffc`8b2c6000   C:\Windows\SYSTEM32\Bcp47Langs.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000   C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000   C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`8b0d0000 00007ffc`8b12c000   C:\Windows\SYSTEM32\NInput.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000   C:\Windows\System32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000   C:\Windows\SYSTEM32\USERENV.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\SYSTEM32\bcrypt.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8b210000 00007ffc`8b228000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EShims.dll
ModLoad: 00007ffc`782b0000 00007ffc`78806000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eModel.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000   C:\Windows\system32\SHLWAPI.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000   C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000   C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8dd10000 00007ffc`8dd54000   C:\Windows\system32\cfgmgr32.dll
ModLoad: 00007ffc`8bd30000 00007ffc`8bdb2000   C:\Windows\SYSTEM32\firewallapi.dll
ModLoad: 00007ffc`8bcf0000 00007ffc`8bd22000   C:\Windows\SYSTEM32\fwbase.dll
ModLoad: 00007ffc`83610000 00007ffc`83a7a000   C:\Windows\System32\ActXPrxy.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000   C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8aed0000 00007ffc`8aef2000   C:\Windows\SYSTEM32\dwmapi.dll
ModLoad: 00007ffc`83b80000 00007ffc`83de1000   C:\Windows\system32\CoreUIComponents.dll
ModLoad: 00007ffc`8ab80000 00007ffc`8ac1c000   C:\Windows\SYSTEM32\dxgi.dll
ModLoad: 00007ffc`8ac20000 00007ffc`8aec3000   C:\Windows\SYSTEM32\d3d11.dll
ModLoad: 00007ffc`8a910000 00007ffc`8ab7e000   C:\Windows\SYSTEM32\d3d10warp.dll
ModLoad: 00007ffc`7ef90000 00007ffc`7efc4000   C:\Windows\System32\Windows.ApplicationModel.dll
ModLoad: 00007ffc`884d0000 00007ffc`88a15000   C:\Windows\SYSTEM32\d2d1.dll
ModLoad: 00007ffc`79fa0000 00007ffc`7a323000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eView.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000   C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`8b2d0000 00007ffc`8b3a1000   C:\Windows\System32\dcomp.dll
ModLoad: 00007ffc`8a2f0000 00007ffc`8a3ff000   C:\Windows\System32\MrmCoreR.dll
ModLoad: 00007ffc`8a250000 00007ffc`8a2ee000   C:\Windows\System32\Windows.UI.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000   C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000   C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000   C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`827b0000 00007ffc`827f6000   C:\Windows\system32\DataExchange.dll
ModLoad: 00007ffc`8df70000 00007ffc`8dfd9000   C:\Windows\system32\WS2_32.dll
ModLoad: 00007ffc`8f790000 00007ffc`8f798000   C:\Windows\system32\NSI.dll
ModLoad: 00007ffc`8af20000 00007ffc`8b0a3000   C:\Windows\SYSTEM32\PROPSYS.dll
ModLoad: 00007ffc`850a0000 00007ffc`850b5000   C:\Windows\SYSTEM32\ondemandconnroutehelper.dll
ModLoad: 00007ffc`88a60000 00007ffc`88a98000   C:\Windows\SYSTEM32\IPHLPAPI.DLL
ModLoad: 00007ffc`88a50000 00007ffc`88a5b000   C:\Windows\SYSTEM32\WINNSI.DLL
ModLoad: 00007ffc`87870000 00007ffc`87946000   C:\Windows\SYSTEM32\winhttp.dll
ModLoad: 00007ffc`8c8d0000 00007ffc`8c92d000   C:\Windows\system32\mswsock.dll
ModLoad: 00007ffc`86570000 00007ffc`865a9000   C:\Windows\SYSTEM32\policymanager.dll
ModLoad: 00007ffc`864d0000 00007ffc`86562000   C:\Windows\SYSTEM32\msvcp110_win.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000   C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`83b40000 00007ffc`83b52000   C:\Windows\System32\Windows.Shell.ServiceHostBuilder.dll
ModLoad: 00007ffc`83150000 00007ffc`83165000   C:\Windows\system32\execmodelproxy.dll
ModLoad: 00007ffc`7c8d0000 00007ffc`7ca72000   C:\Windows\SYSTEM32\ieapfltr.dll
ModLoad: 00007ffc`85ea0000 00007ffc`86026000   C:\Windows\System32\Windows.Globalization.dll
ModLoad: 00007ffc`835d0000 00007ffc`8360f000   C:\Windows\System32\netprofm.dll
ModLoad: 00007ffc`830b0000 00007ffc`830be000   C:\Windows\System32\npmproxy.dll
ModLoad: 00007ffc`8c6d0000 00007ffc`8c778000   C:\Windows\SYSTEM32\DNSAPI.dll
ModLoad: 00007ffc`86060000 00007ffc`862b9000   C:\Windows\SYSTEM32\dwrite.dll
ModLoad: 00007ffc`8f720000 00007ffc`8f78f000   C:\Windows\system32\coml2.dll
ModLoad: 00007ffc`8b6e0000 00007ffc`8b706000   C:\Windows\SYSTEM32\SLC.dll
ModLoad: 00007ffc`8b680000 00007ffc`8b6a5000   C:\Windows\SYSTEM32\sppc.dll
ModLoad: 00007ffc`83370000 00007ffc`833b3000   C:\Windows\System32\execmodelclient.dll
ModLoad: 00007ffc`874d0000 00007ffc`87542000   C:\Windows\SYSTEM32\MMDevAPI.DLL
ModLoad: 00007ffc`8b990000 00007ffc`8b9b7000   C:\Windows\SYSTEM32\DEVOBJ.dll
ModLoad: 00007ffc`86700000 00007ffc`8670a000   C:\Windows\System32\rasadhlp.dll
ModLoad: 00007ffc`87030000 00007ffc`87098000   C:\Windows\System32\fwpuclnt.dll
ModLoad: 00007ffc`7f8f0000 00007ffc`7f94a000   C:\Windows\System32\Windows.Graphics.dll
ModLoad: 00007ffc`8bdc0000 00007ffc`8bde8000   C:\Windows\System32\rmclient.dll
ModLoad: 00007ffc`857f0000 00007ffc`85815000   C:\Windows\System32\Windows.ApplicationModel.Core.dll
ModLoad: 00007ffc`84730000 00007ffc`84a50000   C:\Windows\SYSTEM32\msftedit.dll
ModLoad: 00007ffc`84700000 00007ffc`8472e000   C:\Windows\SYSTEM32\globinputhost.dll
ModLoad: 00007ffc`85e80000 00007ffc`85e98000   C:\Windows\System32\Windows.Globalization.Fontgroups.dll
ModLoad: 00007ffc`85e70000 00007ffc`85e7a000   C:\Windows\SYSTEM32\fontgroupsoverride.dll
ModLoad: 00007ffc`857c0000 00007ffc`857e6000   C:\Windows\System32\Windows.System.Profile.RetailInfo.dll
ModLoad: 00007ffc`82960000 00007ffc`82a1a000   C:\Windows\system32\twinapi.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000   C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`7f950000 00007ffc`7f9a3000   C:\Windows\System32\Windows.Storage.ApplicationData.dll
ModLoad: 00007ffc`85de0000 00007ffc`85e69000   C:\Windows\system32\directmanipulation.dll
(774.2cc): Break instruction exception - code 80000003 (first chance)

Create process 1908 breakpoint.
2:057> g
*** wait with pending attach

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*http://msdl.microsoft.com/download/symbols
Deferred                                       cache*C:\Symbols
Deferred                                       cache*\\server\Symbols
Deferred                                       srv*http://symbols.mozilla.org/firefox
Deferred                                       srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols;cache*C:\Symbols;cache*\\server\Symbols;srv*http://symbols.mozilla.org/firefox;srv*http://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
ModLoad: 00007ff6`78150000 00007ff6`7819d000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
ModLoad: 00007ffc`90690000 00007ffc`90852000   C:\Windows\SYSTEM32\ntdll.dll
ModLoad: 00007ffc`8a590000 00007ffc`8a5fd000   C:\Windows\system32\verifier.dll
ModLoad: 00007ffc`8fba0000 00007ffc`8fc4d000   C:\Windows\system32\KERNEL32.DLL
ModLoad: 00007ffc`8d3e0000 00007ffc`8d5bd000   C:\Windows\system32\KERNELBASE.dll
ModLoad: 00007ffc`8b810000 00007ffc`8b888000   C:\Windows\system32\apphelp.dll
ModLoad: 00007ffc`90510000 00007ffc`905b6000   C:\Windows\system32\ADVAPI32.dll
ModLoad: 00007ffc`90250000 00007ffc`902ed000   C:\Windows\system32\msvcrt.dll
ModLoad: 00007ffc`904b0000 00007ffc`9050b000   C:\Windows\system32\sechost.dll
ModLoad: 00007ffc`8f8e0000 00007ffc`8fa06000   C:\Windows\system32\RPCRT4.dll
ModLoad: 00007ffc`90300000 00007ffc`9044e000   C:\Windows\system32\USER32.dll
ModLoad: 00007ffc`8fa10000 00007ffc`8fb96000   C:\Windows\system32\GDI32.dll
ModLoad: 00007ffc`8dc50000 00007ffc`8dd03000   C:\Windows\system32\shcore.dll
ModLoad: 00007ffc`8fe80000 00007ffc`900fc000   C:\Windows\system32\combase.dll
ModLoad: 00007ffc`88d90000 00007ffc`89106000   C:\Windows\SYSTEM32\iertutil.dll
ModLoad: 00007ffc`8f6e0000 00007ffc`8f716000   C:\Windows\system32\IMM32.DLL
ModLoad: 00007ffc`8fd20000 00007ffc`8fe7c000   C:\Windows\system32\MSCTF.dll
ModLoad: 00007ffc`84be0000 00007ffc`84e54000   C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10240.16384_none_f41f7b285750ef43\Comctl32.dll
ModLoad: 00007ffc`782b0000 00007ffc`78806000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EMODEL.dll
ModLoad: 00007ffc`8dd60000 00007ffc`8ddb1000   C:\Windows\system32\SHLWAPI.dll
ModLoad: 00007ffc`8dfe0000 00007ffc`8f502000   C:\Windows\system32\SHELL32.dll
ModLoad: 00007ffc`8d620000 00007ffc`8dc48000   C:\Windows\system32\windows.storage.dll
ModLoad: 00007ffc`8d0c0000 00007ffc`8d0cf000   C:\Windows\system32\kernel.appcore.dll
ModLoad: 00007ffc`8d0d0000 00007ffc`8d11a000   C:\Windows\system32\powrprof.dll
ModLoad: 00007ffc`8d120000 00007ffc`8d133000   C:\Windows\system32\profapi.dll
ModLoad: 00007ffc`90100000 00007ffc`90241000   C:\Windows\system32\ole32.dll
ModLoad: 00007ffc`905d0000 00007ffc`9068e000   C:\Windows\system32\OLEAUT32.dll
ModLoad: 00007ffc`8dd10000 00007ffc`8dd54000   C:\Windows\system32\cfgmgr32.dll
ModLoad: 00007ffc`8bd30000 00007ffc`8bdb2000   C:\Windows\SYSTEM32\firewallapi.dll
ModLoad: 00007ffc`8bcf0000 00007ffc`8bd22000   C:\Windows\SYSTEM32\fwbase.dll
ModLoad: 00007ffc`8b210000 00007ffc`8b228000   C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EShims.dll
ModLoad: 00007ffc`8ce70000 00007ffc`8cedb000   C:\Windows\SYSTEM32\bcryptPrimitives.dll
ModLoad: 00007ffc`8b9c0000 00007ffc`8ba56000   C:\Windows\system32\uxtheme.dll
ModLoad: 00007ffc`8c930000 00007ffc`8c947000   C:\Windows\SYSTEM32\cryptsp.dll
ModLoad: 00007ffc`8cff0000 00007ffc`8d018000   C:\Windows\SYSTEM32\bcrypt.dll
ModLoad: 00007ffc`8c580000 00007ffc`8c5b3000   C:\Windows\system32\rsaenh.dll
ModLoad: 00007ffc`8caa0000 00007ffc`8caab000   C:\Windows\SYSTEM32\CRYPTBASE.dll
ModLoad: 00007ffc`8ba80000 00007ffc`8bb6e000   C:\Windows\SYSTEM32\twinapi.appcore.dll
ModLoad: 00007ffc`8c670000 00007ffc`8c68f000   C:\Windows\SYSTEM32\USERENV.dll
ModLoad: 00007ffc`7cc90000 00007ffc`7e17f000   C:\Windows\SYSTEM32\EDGEHTML.dll
ModLoad: 00007ffc`7bd90000 00007ffc`7c4c8000   C:\Windows\SYSTEM32\chakra.dll
ModLoad: 00007ffc`7cc50000 00007ffc`7cc8d000   C:\Windows\SYSTEM32\MLANG.dll
ModLoad: 00007ffc`89110000 00007ffc`89241000   C:\Windows\System32\WinTypes.dll
ModLoad: 00007ffc`83df0000 00007ffc`840b1000   C:\Windows\SYSTEM32\WININET.dll
ModLoad: 00007ffc`8cca0000 00007ffc`8cccc000   C:\Windows\SYSTEM32\SspiCli.dll
ModLoad: 00007ffc`8df70000 00007ffc`8dfd9000   C:\Windows\system32\WS2_32.dll
ModLoad: 00007ffc`8f790000 00007ffc`8f798000   C:\Windows\system32\NSI.dll
ModLoad: 00007ffc`850a0000 00007ffc`850b5000   C:\Windows\SYSTEM32\ondemandconnroutehelper.dll
ModLoad: 00007ffc`88a60000 00007ffc`88a98000   C:\Windows\SYSTEM32\IPHLPAPI.DLL
ModLoad: 00007ffc`88a50000 00007ffc`88a5b000   C:\Windows\SYSTEM32\WINNSI.DLL
ModLoad: 00007ffc`87870000 00007ffc`87946000   C:\Windows\SYSTEM32\winhttp.dll
ModLoad: 00007ffc`82fa0000 00007ffc`82fb5000   C:\Windows\SYSTEM32\profext.dll
ModLoad: 00007ffc`8c400000 00007ffc`8c432000   C:\Windows\SYSTEM32\ntmarta.dll
ModLoad: 00007ffc`8c8d0000 00007ffc`8c92d000   C:\Windows\system32\mswsock.dll
ModLoad: 00007ffc`8aed0000 00007ffc`8aef2000   C:\Windows\SYSTEM32\dwmapi.dll
ModLoad: 00007ffc`854a0000 00007ffc`85636000   C:\Windows\SYSTEM32\urlmon.dll
ModLoad: 00007ffc`7c8d0000 00007ffc`7ca72000   C:\Windows\SYSTEM32\ieapfltr.dll
ModLoad: 00007ffc`86570000 00007ffc`865a9000   C:\Windows\SYSTEM32\policymanager.dll
ModLoad: 00007ffc`864d0000 00007ffc`86562000   C:\Windows\SYSTEM32\msvcp110_win.dll
ModLoad: 00007ffc`881c0000 00007ffc`881f6000   C:\Windows\SYSTEM32\XmlLite.dll
ModLoad: 00007ffc`8c6d0000 00007ffc`8c778000   C:\Windows\SYSTEM32\DNSAPI.dll
ModLoad: 00007ffc`827b0000 00007ffc`827f6000   C:\Windows\system32\dataexchange.dll
ModLoad: 00007ffc`884d0000 00007ffc`88a15000   C:\Windows\SYSTEM32\d2d1.dll
ModLoad: 00007ffc`8ac20000 00007ffc`8aec3000   C:\Windows\SYSTEM32\d3d11.dll
ModLoad: 00007ffc`8b2d0000 00007ffc`8b3a1000   C:\Windows\SYSTEM32\dcomp.dll
ModLoad: 00007ffc`8ab80000 00007ffc`8ac1c000   C:\Windows\SYSTEM32\dxgi.dll
ModLoad: 00007ffc`82960000 00007ffc`82a1a000   C:\Windows\system32\twinapi.dll
ModLoad: 00007ffc`8b0d0000 00007ffc`8b12c000   C:\Windows\SYSTEM32\ninput.dll
ModLoad: 00007ffc`86060000 00007ffc`862b9000   C:\Windows\SYSTEM32\DWrite.dll
ModLoad: 00007ffc`8a910000 00007ffc`8ab7e000   C:\Windows\SYSTEM32\d3d10warp.dll
ModLoad: 00007ffc`8a250000 00007ffc`8a2ee000   C:\Windows\System32\Windows.UI.dll
ModLoad: 00007ffc`7ca80000 00007ffc`7ca90000   C:\Windows\system32\msimtf.dll
ModLoad: 00007ffc`85de0000 00007ffc`85e69000   C:\Windows\system32\directmanipulation.dll
ModLoad: 00007ffc`8a2f0000 00007ffc`8a3ff000   C:\Windows\System32\MrmCoreR.dll
ModLoad: 00007ffc`8b260000 00007ffc`8b2c6000   C:\Windows\SYSTEM32\Bcp47Langs.dll
ModLoad: 00007ffc`85ea0000 00007ffc`86026000   C:\Windows\SYSTEM32\windows.globalization.dll
ModLoad: 00007ffc`7ac60000 00007ffc`7ad08000   C:\Windows\System32\ieproxy.dll
ModLoad: 00007ffc`87030000 00007ffc`87098000   C:\Windows\System32\fwpuclnt.dll
ModLoad: 00007ffc`86700000 00007ffc`8670a000   C:\Windows\System32\rasadhlp.dll
ModLoad: 00007ffc`8bdc0000 00007ffc`8bde8000   C:\Windows\System32\rmclient.dll
(12f0.122c): Break instruction exception - code 80000003 (first chance)

Create process 4848 breakpoint.
3:079> g
(12f0.a14): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.

3:067> .lastevent
Last event: 12f0.a14: Access violation - code c0000005 (first chance)
  debugger time: Tue Mar 15 19:59:22.047 2016 (UTC + 1:00)

3:067> |.
.  3 id: 12f0 attach name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe

3:067> .exr -1
ExceptionAddress: 00007ffc7ce85e0e (EDGEHTML!Tree::ANode::IsInTree+0x000000000000000e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000006f084fbf50
Attempt to read from address 0000006f084fbf50

3:067> lm on
start             end                 module name
00007ff6`78150000 00007ff6`7819d000   microsoftedgecp microsoftedgecp.exe
00007ffc`782b0000 00007ffc`78806000   EMODEL   EMODEL.dll  
00007ffc`7ac60000 00007ffc`7ad08000   ieproxy  ieproxy.dll 
00007ffc`7bd90000 00007ffc`7c4c8000   chakra   chakra.dll  
00007ffc`7c8d0000 00007ffc`7ca72000   ieapfltr ieapfltr.dll
00007ffc`7ca80000 00007ffc`7ca90000   msimtf   msimtf.dll  
00007ffc`7cc50000 00007ffc`7cc8d000   MLANG    MLANG.dll   
00007ffc`7cc90000 00007ffc`7e17f000   EDGEHTML EDGEHTML.dll
00007ffc`827b0000 00007ffc`827f6000   dataexchange dataexchange.dll
00007ffc`82960000 00007ffc`82a1a000   twinapi  twinapi.dll 
00007ffc`82fa0000 00007ffc`82fb5000   profext  profext.dll 
00007ffc`83df0000 00007ffc`840b1000   WININET  WININET.dll 
00007ffc`84be0000 00007ffc`84e54000   Comctl32 Comctl32.dll
00007ffc`850a0000 00007ffc`850b5000   ondemandconnroutehelper ondemandconnroutehelper.dll
00007ffc`854a0000 00007ffc`85636000   urlmon   urlmon.dll  
00007ffc`85de0000 00007ffc`85e69000   directmanipulation directmanipulation.dll
00007ffc`85ea0000 00007ffc`86026000   windows_globalization windows.globalization.dll
00007ffc`86060000 00007ffc`862b9000   DWrite   DWrite.dll  
00007ffc`864d0000 00007ffc`86562000   msvcp110_win msvcp110_win.dll
00007ffc`86570000 00007ffc`865a9000   policymanager policymanager.dll
00007ffc`86700000 00007ffc`8670a000   rasadhlp rasadhlp.dll
00007ffc`87030000 00007ffc`87098000   fwpuclnt fwpuclnt.dll
00007ffc`87870000 00007ffc`87946000   winhttp  winhttp.dll 
00007ffc`881c0000 00007ffc`881f6000   XmlLite  XmlLite.dll 
00007ffc`884d0000 00007ffc`88a15000   d2d1     d2d1.dll    
00007ffc`88a50000 00007ffc`88a5b000   WINNSI   WINNSI.DLL  
00007ffc`88a60000 00007ffc`88a98000   IPHLPAPI IPHLPAPI.DLL
00007ffc`88d90000 00007ffc`89106000   iertutil iertutil.dll
00007ffc`89110000 00007ffc`89241000   WinTypes WinTypes.dll
00007ffc`8a250000 00007ffc`8a2ee000   Windows_UI Windows.UI.dll
00007ffc`8a2f0000 00007ffc`8a3ff000   MrmCoreR MrmCoreR.dll
00007ffc`8a590000 00007ffc`8a5fd000   verifier verifier.dll
00007ffc`8a910000 00007ffc`8ab7e000   d3d10warp d3d10warp.dll
00007ffc`8ab80000 00007ffc`8ac1c000   dxgi     dxgi.dll    
00007ffc`8ac20000 00007ffc`8aec3000   d3d11    d3d11.dll   
00007ffc`8aed0000 00007ffc`8aef2000   dwmapi   dwmapi.dll  
00007ffc`8af20000 00007ffc`8b0a3000   PROPSYS  PROPSYS.dll 
00007ffc`8b0d0000 00007ffc`8b12c000   ninput   ninput.dll  
00007ffc`8b210000 00007ffc`8b228000   EShims   EShims.dll  
00007ffc`8b260000 00007ffc`8b2c6000   Bcp47Langs Bcp47Langs.dll
00007ffc`8b2d0000 00007ffc`8b3a1000   dcomp    dcomp.dll   
00007ffc`8b810000 00007ffc`8b888000   apphelp  apphelp.dll 
00007ffc`8b9c0000 00007ffc`8ba56000   uxtheme  uxtheme.dll 
00007ffc`8ba80000 00007ffc`8bb6e000   twinapi_appcore twinapi.appcore.dll
00007ffc`8bcf0000 00007ffc`8bd22000   fwbase   fwbase.dll  
00007ffc`8bd30000 00007ffc`8bdb2000   firewallapi firewallapi.dll
00007ffc`8bdc0000 00007ffc`8bde8000   rmclient rmclient.dll
00007ffc`8c400000 00007ffc`8c432000   ntmarta  ntmarta.dll 
00007ffc`8c580000 00007ffc`8c5b3000   rsaenh   rsaenh.dll  
00007ffc`8c670000 00007ffc`8c68f000   USERENV  USERENV.dll 
00007ffc`8c6d0000 00007ffc`8c778000   DNSAPI   DNSAPI.dll  
00007ffc`8c8d0000 00007ffc`8c92d000   mswsock  mswsock.dll 
00007ffc`8c930000 00007ffc`8c947000   cryptsp  cryptsp.dll 
00007ffc`8caa0000 00007ffc`8caab000   CRYPTBASE CRYPTBASE.dll
00007ffc`8cca0000 00007ffc`8cccc000   SspiCli  SspiCli.dll 
00007ffc`8ce70000 00007ffc`8cedb000   bcryptPrimitives bcryptPrimitives.dll
00007ffc`8cff0000 00007ffc`8d018000   bcrypt   bcrypt.dll  
00007ffc`8d0c0000 00007ffc`8d0cf000   kernel_appcore kernel.appcore.dll
00007ffc`8d0d0000 00007ffc`8d11a000   powrprof powrprof.dll
00007ffc`8d120000 00007ffc`8d133000   profapi  profapi.dll 
00007ffc`8d3e0000 00007ffc`8d5bd000   KERNELBASE KERNELBASE.dll
00007ffc`8d620000 00007ffc`8dc48000   windows_storage windows.storage.dll
00007ffc`8dc50000 00007ffc`8dd03000   shcore   shcore.dll  
00007ffc`8dd10000 00007ffc`8dd54000   cfgmgr32 cfgmgr32.dll
00007ffc`8dd60000 00007ffc`8ddb1000   SHLWAPI  SHLWAPI.dll 
00007ffc`8df70000 00007ffc`8dfd9000   WS2_32   WS2_32.dll  
00007ffc`8dfe0000 00007ffc`8f502000   SHELL32  SHELL32.dll 
00007ffc`8f6e0000 00007ffc`8f716000   IMM32    IMM32.DLL   
00007ffc`8f790000 00007ffc`8f798000   NSI      NSI.dll     
00007ffc`8f8e0000 00007ffc`8fa06000   RPCRT4   RPCRT4.dll  
00007ffc`8fa10000 00007ffc`8fb96000   GDI32    GDI32.dll   
00007ffc`8fba0000 00007ffc`8fc4d000   KERNEL32 KERNEL32.DLL
00007ffc`8fd20000 00007ffc`8fe7c000   MSCTF    MSCTF.dll   
00007ffc`8fe80000 00007ffc`900fc000   combase  combase.dll 
00007ffc`90100000 00007ffc`90241000   ole32    ole32.dll   
00007ffc`90250000 00007ffc`902ed000   msvcrt   msvcrt.dll  
00007ffc`90300000 00007ffc`9044e000   USER32   USER32.dll  
00007ffc`904b0000 00007ffc`9050b000   sechost  sechost.dll 
00007ffc`90510000 00007ffc`905b6000   ADVAPI32 ADVAPI32.dll
00007ffc`905d0000 00007ffc`9068e000   OLEAUT32 OLEAUT32.dll
00007ffc`90690000 00007ffc`90852000   ntdll    ntdll.dll   

3:067> kn 0x64
 # Child-SP          RetAddr           Call Site
00 0000006f`0a22aee0 00007ffc`7d2f8ed5 EDGEHTML!Tree::ANode::IsInTree+0xe
01 0000006f`0a22af10 00007ffc`7d073295 EDGEHTML!Tree::TreeWriter::Notify_BeforeRemoveNode+0x285b29
02 0000006f`0a22b1d0 00007ffc`7d21afef EDGEHTML!Tree::TreeWriter::RemoveNode+0x171
03 0000006f`0a22b5e0 00007ffc`7d07468e EDGEHTML!CElement::MoveToSeparateMarkup+0x5187f3
04 0000006f`0a22b9f0 00007ffc`7d0745e0 EDGEHTML!CElement::PutTextContentHelper+0x7e
05 0000006f`0a22ba30 00007ffc`7d074570 EDGEHTML!CElement::put_textContent+0x50
06 0000006f`0a22ba90 00007ffc`7d0744f1 EDGEHTML!CDOMNode::Var_set_textContent+0x60
07 0000006f`0a22bb00 00007ffc`7bfdc703 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x71
08 0000006f`0a22bb70 00007ffc`7be08e72 chakra!amd64_CallFunction+0x93
09 0000006f`0a22bbc0 00007ffc`7be01b7e chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x172
0a 0000006f`0a22bc60 00007ffc`7bebccf7 chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0xba
0b 0000006f`0a22bca0 00007ffc`7beca7fc chakra!Js::JavascriptOperators::CallSetter+0xaf
0c 0000006f`0a22bd40 00007ffc`7bf29fff chakra!Js::JavascriptOperators::SetProperty_Internal<0>+0xc9c
0d 0000006f`0a22be10 00007ffc`7bf29f1a chakra!Js::JavascriptOperators::OP_SetProperty+0x8f
0e 0000006f`0a22be60 00007ffc`7be0e325 chakra!Js::JavascriptOperators::PatchPutValueNoFastPath+0x82
0f 0000006f`0a22bee0 00007ffc`7be151cc chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x1e5
10 0000006f`0a22bfb0 00007ffc`7be12fc2 chakra!Js::InterpreterStackFrame::ProcessProfiled+0x44c
11 0000006f`0a22c030 00007ffc`7bf57be8 chakra!Js::InterpreterStackFrame::Process+0xd2
12 0000006f`0a22c090 00007ffc`7bf57875 chakra!Js::InterpreterStackFrame::InterpreterHelper+0x368
13 0000006f`0a22c390 0000006f`142a0fba chakra!Js::InterpreterStackFrame::InterpreterThunk+0x55
14 0000006f`0a22c3e0 00007ffc`7bfdc703 0x0000006f`142a0fba
15 0000006f`0a22c410 00007ffc`7bf0bfb3 chakra!amd64_CallFunction+0x93
16 0000006f`0a22c460 00007ffc`7bf0b6ea chakra!Js::JavascriptFunction::CallFunction<1>+0x83
17 0000006f`0a22c4c0 00007ffc`7bf0b28b chakra!Js::JavascriptFunction::CallRootFunctionInternal+0x11a
18 0000006f`0a22c5c0 00007ffc`7bf2c72a chakra!Js::JavascriptFunction::CallRootFunction+0x33
19 0000006f`0a22c760 00007ffc`7bf053c4 chakra!ScriptSite::CallRootFunction+0xaa
1a 0000006f`0a22c800 00007ffc`7bf094fc chakra!ScriptSite::Execute+0x134
1b 0000006f`0a22c890 00007ffc`7ce26194 chakra!ScriptEngineBase::Execute+0xcc
1c 0000006f`0a22c930 00007ffc`7ce25f12 EDGEHTML!CListenerDispatch::InvokeVar+0x264
1d 0000006f`0a22cab0 00007ffc`7cf0c80c EDGEHTML!CListenerDispatch::Invoke+0x92
1e 0000006f`0a22cb00 00007ffc`7cf0fbcd EDGEHTML!CEventMgr::_InvokeListeners+0x39c
1f 0000006f`0a22cc40 00007ffc`7cf0b7d7 EDGEHTML!CEventMgr::_InvokeListenersOnWindow+0x5d
20 0000006f`0a22cc70 00007ffc`7cf0f342 EDGEHTML!CEventMgr::Dispatch+0x357
21 0000006f`0a22cf20 00007ffc`7d02ce9c EDGEHTML!CEventMgr::DispatchEvent+0x6a
22 0000006f`0a22cf60 00007ffc`7d01dc1e EDGEHTML!COmWindowProxy::Fire_onload+0x13c
23 0000006f`0a22d060 00007ffc`7d016d01 EDGEHTML!CMarkup::OnLoadStatusDone+0x3ba
24 0000006f`0a22d120 00007ffc`7d016620 EDGEHTML!CMarkup::OnLoadStatus+0xe5
25 0000006f`0a22d150 00007ffc`7cef7cdd EDGEHTML!CProgSink::DoUpdate+0x380
26 0000006f`0a22d5e0 00007ffc`7cde3fa8 EDGEHTML!GlobalWndOnMethodCall+0x2bd
27 0000006f`0a22d690 00007ffc`903100dc EDGEHTML!GlobalWndProc+0x108
28 0000006f`0a22d710 00007ffc`9030fc07 USER32!UserCallWinProcCheckWow+0x1fc
29 0000006f`0a22d800 00007ffc`782f0988 USER32!DispatchMessageWorker+0x1a7
2a 0000006f`0a22d880 00007ffc`7834f25b EMODEL!CTabWindow::_TabWindowThreadProc+0x5b8
2b 0000006f`0a22fae0 00007ffc`88dc7faf EMODEL!LCIETab_ThreadProc+0x2bb
2c 0000006f`0a22fc10 00007ffc`8fbb2d92 iertutil!_IsoThreadProc_WrapperToReleaseScope+0x1f
2d 0000006f`0a22fc40 00007ffc`90699f64 KERNEL32!BaseThreadInitThunk+0x22
2e 0000006f`0a22fc70 00000000`00000000 ntdll!RtlUserThreadStart+0x34

3:067> ~s
00007ffc`7ce85e0e 8b10            mov     edx,dword ptr [rax] ds:0000006f`084fbf50=????????

3:067> !heap -p -a 0x6F084FBF50
ReadMemory error for address 0000006f7f63ffe8
Use `!address 0000006f7f63ffe8' to check validity of the address.
ReadMemory error for address 0000006f7f91ffe8
Use `!address 0000006f7f91ffe8' to check validity of the address.
ReadMemory error for address 0000006f7f9dffe8
Use `!address 0000006f7f9dffe8' to check validity of the address.
ReadMemory error for address 0000006f0712ffe8
Use `!address 0000006f0712ffe8' to check validity of the address.
    address 0000006f084fbf50 found in
    _DPH_HEAP_ROOT @ 6f08441000
    in free-ed allocation (  DPH_HEAP_BLOCK:         VirtAddr         VirtSize)
                                 6f08442068:       6f084fb000             2000
    00007ffc9077cc13 ntdll!RtlDebugFreeHeap+0x0000000000000047
    00007ffc907353d9 ntdll!RtlpFreeHeap+0x0000000000079519
    00007ffc906baa16 ntdll!RtlFreeHeap+0x0000000000000106
    00007ffc7d1f366c EDGEHTML!MemoryProtection::HeapFree+0x00000000003736dc
    00007ffc7cf45807 EDGEHTML!CTreeNode::NodeRelease+0x0000000000000057
    00007ffc7ce848a4 EDGEHTML!CSpliceTreeEngine::RemoveSplice+0x0000000000001294
    00007ffc7cf45c4b EDGEHTML!Tree::TreeWriter::SpliceTreeInternal+0x000000000000010b
    00007ffc7cf403b0 EDGEHTML!Tree::TreeWriter::CutCopyMoveLegacy+0x00000000000004e0
    00007ffc7cf3d7a3 EDGEHTML!Tree::TreeWriter::MoveNodeLegacy+0x0000000000000193
    00007ffc7cfa070c EDGEHTML!Tree::TreeWriter::PrependChild+0x000000000000003c
    00007ffc7d21afda EDGEHTML!CElement::MoveToSeparateMarkup+0x00000000005187de
    00007ffc7d07468e EDGEHTML!CElement::PutTextContentHelper+0x000000000000007e
    00007ffc7d0745e0 EDGEHTML!CElement::put_textContent+0x0000000000000050
    00007ffc7d074570 EDGEHTML!CDOMNode::Var_set_textContent+0x0000000000000060
    00007ffc7d0744f1 EDGEHTML!CFastDOM::CNode::Trampoline_Set_textContent+0x0000000000000071
    00007ffc7bfdc703 chakra!amd64_CallFunction+0x0000000000000093
    00007ffc7be08e72 chakra!Js::JavascriptExternalFunction::ExternalFunctionThunk+0x0000000000000172
    00007ffc7be01b7e chakra!<lambda_2bce0de19d44809631fc237adaea42bb>::operator()+0x00000000000000ba
    00007ffc7bebccf7 chakra!Js::JavascriptOperators::CallSetter+0x00000000000000af
    00007ffc7beca7fc chakra!Js::JavascriptOperators::SetProperty_Internal<0>+0x0000000000000c9c
    00007ffc7bf29fff chakra!Js::JavascriptOperators::OP_SetProperty+0x000000000000008f
    00007ffc7bf29f1a chakra!Js::JavascriptOperators::PatchPutValueNoFastPath+0x0000000000000082
    00007ffc7be0e325 chakra!Js::InterpreterStackFrame::ProfiledSetProperty<Js::OpLayoutT_ElementCP<Js::LayoutSizePolicy<0> > const ,0>+0x00000000000001e5
    00007ffc7be151cc chakra!Js::InterpreterStackFrame::ProcessProfiled+0x000000000000044c
    00007ffc7be12fc2 chakra!Js::InterpreterStackFrame::Process+0x00000000000000d2
    00007ffc7bf57be8 chakra!Js::InterpreterStackFrame::InterpreterHelper+0x0000000000000368
    00007ffc7bf57875 chakra!Js::InterpreterStackFrame::InterpreterThunk+0x0000000000000055
    0000006f142a0fb2 +0x0000006f142a0fb2

 

3:067> .if ($vvalid(@$scopeip - 40, 40)) { u @$scopeip - 40 @$scopeip - 1; };
EDGEHTML!Tree::TreeReader::GetParentCrossComponent+0x6e:
00007ffc`7ce85dce ce              ???
00007ffc`7ce85dcf 64              ???
00007ffc`7ce85dd0 07              ???
00007ffc`7ce85dd1 0084c074d6488b  add     byte ptr [rax+rax*8-74B7298Ch],al
00007ffc`7ce85dd8 cb              retf
00007ffc`7ce85dd9 4883c420        add     rsp,20h
00007ffc`7ce85ddd 5b              pop     rbx
00007ffc`7ce85dde e935f0f3ff      jmp     EDGEHTML!Tree::ElementNode::GetSubordinateBridge (00007ffc`7cdc4e18)
00007ffc`7ce85de3 488bcb          mov     rcx,rbx
00007ffc`7ce85de6 e8d5c20e00      call    EDGEHTML!Tree::ANode::GetAsElementNode (00007ffc`7cf720c0)
00007ffc`7ce85deb 488bc8          mov     rcx,rax
00007ffc`7ce85dee 4883c420        add     rsp,20h
00007ffc`7ce85df2 5b              pop     rbx
00007ffc`7ce85df3 e920f0f3ff      jmp     EDGEHTML!Tree::ElementNode::GetSubordinateBridge (00007ffc`7cdc4e18)
00007ffc`7ce85df8 cc              int     3
00007ffc`7ce85df9 cc              int     3
00007ffc`7ce85dfa cc              int     3
00007ffc`7ce85dfb cc              int     3
00007ffc`7ce85dfc cc              int     3
00007ffc`7ce85dfd cc              int     3
00007ffc`7ce85dfe cc              int     3
00007ffc`7ce85dff cc              int     3
EDGEHTML!Tree::ANode::IsInTree:
00007ffc`7ce85e00 48894c2408      mov     qword ptr [rsp+8],rcx
00007ffc`7ce85e05 4883ec28        sub     rsp,28h
00007ffc`7ce85e09 488b442430      mov     rax,qword ptr [rsp+30h]

3:067> .if ($vvalid(@$scopeip, 40)) { u @$scopeip @$scopeip + 39; };
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10            mov     edx,dword ptr [rax]
00007ffc`7ce85e10 f6c204          test    dl,4
00007ffc`7ce85e13 7525            jne     EDGEHTML!Tree::ANode::IsInTree+0x3a (00007ffc`7ce85e3a)
00007ffc`7ce85e15 f6406202        test    byte ptr [rax+62h],2
00007ffc`7ce85e19 741b            je      EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e1b 488b4810        mov     rcx,qword ptr [rax+10h]
00007ffc`7ce85e1f 480b4808        or      rcx,qword ptr [rax+8]
00007ffc`7ce85e23 7411            je      EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e25 488b4838        mov     rcx,qword ptr [rax+38h]
00007ffc`7ce85e29 480b4830        or      rcx,qword ptr [rax+30h]
00007ffc`7ce85e2d 7407            je      EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e2f b001            mov     al,1
00007ffc`7ce85e31 4883c428        add     rsp,28h
00007ffc`7ce85e35 c3              ret
00007ffc`7ce85e36 32c0            xor     al,al
00007ffc`7ce85e38 ebf7            jmp     EDGEHTML!Tree::ANode::IsInTree+0x31 (00007ffc`7ce85e31)
00007ffc`7ce85e3a 488b4810        mov     rcx,qword ptr [rax+10h]
00007ffc`7ce85e3e 480b4808        or      rcx,qword ptr [rax+8]
00007ffc`7ce85e42 74f2            je      EDGEHTML!Tree::ANode::IsInTree+0x36 (00007ffc`7ce85e36)
00007ffc`7ce85e44 f6c203          test    dl,3
00007ffc`7ce85e47 0f85fb653e00    jne     EDGEHTML!Tree::ANode::IsInTree+0x3e6648 (00007ffc`7d26c448)

3:067> rM 0x7D
rax=0000006f084fbf50 rbx=0000006f0a22b220 rcx=0000006f084fbf50
rdx=0000006f0a22ac98 rsi=0000006f084fbf50 rdi=0000000000000001
rip=00007ffc7ce85e0e rsp=0000006f0a22aee0 rbp=0000006f0a22b010
 r8=0000006f0fccfa20  r9=0000006f03fa9b90 r10=00007ffc7cfe3ac0
r11=00007ffc7cf78290 r12=0000000000000000 r13=0000006f084fbf50
r14=0000006f084d9950 r15=0000006f084fbf50
iopl=0         nv up ei pl nz na pe nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
fpcw=027F    fpsw=0000    fptw=0000
st0= 0.000000000000000000000e+0000  st1= 0.000000000000000000000e+0000
st2= 0.000000000000000000000e+0000  st3= 0.000000000000000000000e+0000
st4= 0.000000000000000000000e+0000  st5= 0.000000000000000000000e+0000
st6= 0.000000000000000000000e+0000  st7= 0.000000000000000000000e+0000
mm0=0000000000000000  mm1=0000000000000000
mm2=0000000000000000  mm3=0000000000000000
mm4=0000000000000000  mm5=0000000000000000
mm6=0000000000000000  mm7=0000000000000000
xmm0=0 0 0 0
xmm1=0 0 0 0
xmm2=0 0 0 0
xmm3=0 0 0 0
xmm4=0 0 0 0
xmm5=0 0 0 0
xmm6=0 0 0 0
xmm7=0 0 0 0
xmm8=0 0 0 0
xmm9=0 0 0 0
xmm10=0 0 0 0
xmm11=0 0 0 0
xmm12=0 0 0 0
xmm13=0 0 0 0
xmm14=0 0 0 0
xmm15=0 0 0 0
dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000
dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000
EDGEHTML!Tree::ANode::IsInTree+0xe:
00007ffc`7ce85e0e 8b10            mov     edx,dword ptr [rax] ds:0000006f`084fbf50=????????

3:067> dpp @$ea - 10*$ptrsize L10;
0000006f`084fbed0  ????????`????????
0000006f`084fbed8  ????????`????????
0000006f`084fbee0  ????????`????????
0000006f`084fbee8  ????????`????????
0000006f`084fbef0  ????????`????????
0000006f`084fbef8  ????????`????????
0000006f`084fbf00  ????????`????????
0000006f`084fbf08  ????????`????????
0000006f`084fbf10  ????????`????????
0000006f`084fbf18  ????????`????????
0000006f`084fbf20  ????????`????????
0000006f`084fbf28  ????????`????????
0000006f`084fbf30  ????????`????????
0000006f`084fbf38  ????????`????????
0000006f`084fbf40  ????????`????????
0000006f`084fbf48  ????????`????????

3:067> dpp @$ea L10;
0000006f`084fbf50  ????????`????????
0000006f`084fbf58  ????????`????????
0000006f`084fbf60  ????????`????????
0000006f`084fbf68  ????????`????????
0000006f`084fbf70  ????????`????????
0000006f`084fbf78  ????????`????????
0000006f`084fbf80  ????????`????????
0000006f`084fbf88  ????????`????????
0000006f`084fbf90  ????????`????????
0000006f`084fbf98  ????????`????????
0000006f`084fbfa0  ????????`????????
0000006f`084fbfa8  ????????`????????
0000006f`084fbfb0  ????????`????????
0000006f`084fbfb8  ????????`????????
0000006f`084fbfc0  ????????`????????
0000006f`084fbfc8  ????????`????????

3:067> dpp @$ea2 - 10*$ptrsize L10;
Bad register error at '@$ea2 - 10*$ptrsize '

3:067> lm M *microsoftedgecp.exe
start             end                 module name
00007ff6`78150000 00007ff6`7819d000   microsoftedgecp   (deferred)             

3:067> lmv m *EDGEHTML
start             end                 module name
00007ffc`7cc90000 00007ffc`7e17f000   EDGEHTML   (pdb symbols)          c:\symbols\edgehtml.pdb\F9526BA119114822A01B413255AFCF0F1\edgehtml.pdb
    Loaded symbol image file: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image path: C:\Windows\SYSTEM32\EDGEHTML.dll
    Image name: EDGEHTML.dll
    Timestamp:        Tue Feb 23 11:48:08 2016 (56CC38E8)
    CheckSum:         014DD388
    ImageSize:        014EF000
    File version:     11.0.10240.16724
    Product version:  11.0.10240.16724
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Internet Explorer
    InternalName:     EDGEHTML
    OriginalFilename: EDGEHTML.DLL
    ProductVersion:   11.00.10240.16724
    FileVersion:      11.00.10240.16724 (th1_st1.160222-1812)
    FileDescription:  Microsoft (R) HTML Viewer
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

3:067> lmv m *microsoftedgecp
start             end                 module name
00007ff6`78150000 00007ff6`7819d000   microsoftedgecp   (deferred)             
    Image path: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\microsoftedgecp.exe
    Image name: microsoftedgecp.exe
    Timestamp:        Wed Nov 25 05:17:08 2015 (56553644)
    CheckSum:         0004DF0B
    ImageSize:        0004D000
    File version:     11.0.10240.16603
    Product version:  11.0.10240.16603
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft Edge
    InternalName:     MicrosoftEdgeCP
    OriginalFilename: MicrosoftEdgeCP.exe
    ProductVersion:   11.00.10240.16603
    FileVersion:      11.00.10240.16603 (th1_st1.151124-1750)
    FileDescription:  Microsoft Edge Content Process
    LegalCopyright:   � Microsoft Corporation. All rights reserved.

3:067>