Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting log
- GPxPatch version: 4.43
- GPx version detected: decrypted GP4 v1.02
- Date/time: 19-01-2016 20:10
- [20:10:43.905] Verbosity level is 2
- [20:10:43.905] OS version info: Windows 8 build 9200
- [20:10:43.905] Total physical memory: 2047 MB (free: 2047 MB)
- [20:10:43.905] Debugging GP4.exe
- [20:10:43.905] Process created:
- Process ID = 0x0000a0f4
- Process handle = 0x00000284
- Main thread ID = 0x000060a4
- Main thread handle = 0x00000288
- Process will run on CPU 0 only
- [20:10:43.905] Waiting for debug events...
- [20:10:43.905] Debug event: CREATE_PROCESS_DEBUG_EVENT
- [20:10:43.905] Thread ID = 0x000060a4
- [20:10:43.905] Entry point = 0x005ddec6
- [20:10:43.905] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.905] Thread ID = 0x000060a4
- [20:10:43.905] path
- base 0x77690000
- size 1540768
- [20:10:43.968] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:43.968] Thread ID = 0x000060a4
- [20:10:43.968] base 0x00bc0000
- [20:10:43.968] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:43.968] Thread ID = 0x000060a4
- [20:10:43.968] base 0x75230000
- [20:10:43.968] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] base 0x00bc0000
- [20:10:43.983] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] base 0x00bc0000
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\SysWOW64\KERNEL32.DLL
- base 0x75230000
- size 620176
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\SysWOW64\KERNELBASE.dll
- base 0x76ed0000
- size 1557768
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\SysWOW64\apphelp.dll
- base 0x71500000
- size 581632
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\AppPatch\AcGenral.DLL
- base 0x64fb0000
- size 2478592
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\SysWOW64\msvcrt.dll
- base 0x759b0000
- size 773168
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\SysWOW64\sechost.dll
- base 0x770a0000
- size 269616
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\SysWOW64\RPCRT4.dll
- base 0x74400000
- size 707600
- [20:10:43.983] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.983] Thread ID = 0x000060a4
- [20:10:43.983] path C:\WINDOWS\SysWOW64\SspiCli.dll
- base 0x743c0000
- size 116216
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\CRYPTBASE.dll
- base 0x743b0000
- size 31528
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\bcryptPrimitives.dll
- base 0x75720000
- size 360480
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\SHLWAPI.dll
- base 0x75960000
- size 276336
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\combase.dll
- base 0x75460000
- size 1824264
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\GDI32.dll
- base 0x772d0000
- size 1371792
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\USER32.dll
- base 0x75310000
- size 1337240
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\ole32.dll
- base 0x74550000
- size 957608
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\OLEAUT32.dll
- base 0x77220000
- size 589856
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\SHELL32.dll
- base 0x75a70000
- size 21125408
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\cfgmgr32.dll
- base 0x751d0000
- size 217976
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\windows.storage.dll
- base 0x746e0000
- size 5237336
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\advapi32.dll
- base 0x771a0000
- size 499432
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\kernel.appcore.dll
- base 0x772c0000
- size 39792
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\shcore.dll
- base 0x74650000
- size 569744
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\powrprof.dll
- base 0x77150000
- size 270672
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\profapi.dll
- base 0x75220000
- size 54752
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\UxTheme.dll
- base 0x72510000
- size 458752
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\WINMM.dll
- base 0x6da60000
- size 134352
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\samcli.dll
- base 0x73eb0000
- size 67072
- [20:10:43.999] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:43.999] Thread ID = 0x000060a4
- [20:10:43.999] path C:\WINDOWS\SysWOW64\MSACM32.dll
- base 0x654b0000
- size 90912
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\VERSION.dll
- base 0x73f10000
- size 27360
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\USERENV.dll
- base 0x73ef0000
- size 92480
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\dwmapi.dll
- base 0x726f0000
- size 94208
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\urlmon.dll
- base 0x72b60000
- size 1505280
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\WINSPOOL.DRV
- base 0x6d390000
- size 400896
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\MPR.dll
- base 0x73f20000
- size 85720
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\WINMMBASE.dll
- base 0x6d9e0000
- size 132744
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\iertutil.dll
- base 0x72180000
- size 2919320
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\bcrypt.dll
- base 0x73e50000
- size 107408
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\AppPatch\AcLayers.dll
- base 0x64940000
- size 335360
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\SETUPAPI.dll
- base 0x74dc0000
- size 4268360
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\sfc.dll
- base 0x66680000
- size 3072
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path C:\WINDOWS\SysWOW64\sfc_os.DLL
- base 0x71870000
- size 41984
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path
- base 0x00fb0000
- size 6275072
- [20:10:44.015] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] base 0x00fb0000
- [20:10:44.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] path
- base 0x00fb0000
- size 6275072
- [20:10:44.015] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:44.015] Thread ID = 0x000060a4
- [20:10:44.015] base 0x00fb0000
- [20:10:44.015] >> FTH: (41204): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
- [20:10:44.030] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.030] Thread ID = 0x000060a4
- [20:10:44.030] path C:\WINDOWS\SysWOW64\SortServer2003Compat.dll
- base 0x654a0000
- size 40448
- [20:10:44.030] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.030] Thread ID = 0x000060a4
- [20:10:44.030] path C:\WINDOWS\SysWOW64\IMM32.DLL
- base 0x75800000
- size 169928
- [20:10:44.030] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.030] Thread ID = 0x000060a4
- [20:10:44.030] path C:\WINDOWS\SysWOW64\d3d8.dll
- base 0x64700000
- size 1072128
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path C:\WINDOWS\SysWOW64\dinput8.dll
- base 0x64c00000
- size 172032
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path C:\WINDOWS\SysWOW64\dsound.dll
- base 0x64670000
- size 527360
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path E:\Grand Prix 4\binkw32.dll
- base 0x30000000
- size 357939
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path C:\WINDOWS\SysWOW64\wsock32.dll
- base 0x743a0000
- size 16384
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path C:\WINDOWS\SysWOW64\WS2_32.dll
- base 0x74d60000
- size 388896
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path C:\WINDOWS\SysWOW64\d3d8thk.dll
- base 0x65490000
- size 12800
- [20:10:44.046] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] First chance exception
- [20:10:44.046] Exception address: 0x7773cd6c
- [20:10:44.046] Module name: '' (base 0x77690000, size 1540768)
- [20:10:44.046] Exception flags: 0x00000000
- [20:10:44.046] Exception code: EXCEPTION_BREAKPOINT
- [20:10:44.046] Setting breakpoint on entry point (0x005ddec6)
- [20:10:44.046] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] First chance exception
- [20:10:44.046] Exception address: 0x005ddec6
- [20:10:44.046] Exception flags: 0x00000000
- [20:10:44.046] Exception code: EXCEPTION_BREAKPOINT
- [20:10:44.046] Removing breakpoint on entry point
- [20:10:44.046] Injecting DLL loading code...
- [20:10:44.046] Copying code to target at address 0x00b60000...
- [20:10:44.046] Injection succesful
- [20:10:44.046] Setting instruction pointer to injected code (0x00b60000)
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path E:\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
- base 0x09a00000
- size 27648
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path E:\Grand Prix 4\GPxPSup.dll
- base 0x09900000
- size 40960
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path C:\WINDOWS\SysWOW64\imagehlp.dll
- base 0x75780000
- size 99176
- [20:10:44.046] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] base 0x75780000
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] path C:\WINDOWS\SysWOW64\imagehlp.dll
- base 0x75780000
- size 99176
- [20:10:44.046] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x000060a4
- [20:10:44.046] base 0x75780000
- [20:10:44.046] >> D3D Constructor!
- [20:10:44.046] >> Starting WinMain
- [20:10:44.046] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x0000a11c
- [20:10:44.046] Thread handle = 0x00000390
- Start address = 0x776d9fa0
- Thread local base = 0x00360000
- [20:10:44.046] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x00008dcc
- [20:10:44.046] Thread handle = 0x00000394
- Start address = 0x6496c710
- Thread local base = 0x00363000
- [20:10:44.046] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x0000869c
- [20:10:44.046] Thread handle = 0x00000398
- Start address = 0x776d9fa0
- Thread local base = 0x00366000
- [20:10:44.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.046] Thread ID = 0x00008dcc
- [20:10:44.046] path C:\WINDOWS\SysWOW64\MSCTF.dll
- base 0x75840000
- size 1174008
- [20:10:44.155] >> WM_ACTIVATE (active)(not minimized)
- [20:10:44.155] >> Game thread into win95_startup(0)
- [20:10:44.155] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:44.155] Thread ID = 0x0000a204
- [20:10:44.155] Thread handle = 0x000003a0
- Start address = 0x6da633e0
- Thread local base = 0x00369000
- [20:10:44.155] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.155] Thread ID = 0x000060a4
- [20:10:44.155] path C:\WINDOWS\SysWOW64\clbcatq.dll
- base 0x744b0000
- size 526304
- [20:10:44.155] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.155] Thread ID = 0x000060a4
- [20:10:44.155] path C:\WINDOWS\SysWOW64\dplayx.dll
- base 0x64630000
- size 220160
- [20:10:44.155] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.155] Thread ID = 0x000060a4
- [20:10:44.155] path C:\WINDOWS\SysWOW64\dpmodemx.dll
- base 0x65480000
- size 25088
- [20:10:44.155] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.155] Thread ID = 0x000060a4
- [20:10:44.155] path C:\WINDOWS\SysWOW64\TAPI32.dll
- base 0x645f0000
- size 196608
- [20:10:44.171] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.171] Thread ID = 0x000060a4
- [20:10:44.171] path C:\WINDOWS\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10586.0_none_d3c2e4e965da4528\comctl32.dll
- base 0x73a10000
- size 2142048
- [20:10:44.171] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:44.171] Thread ID = 0x00009674
- [20:10:44.171] Thread handle = 0x000003c0
- Start address = 0x6465a880
- Thread local base = 0x0036c000
- [20:10:44.171] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:44.171] Thread ID = 0x000060a4
- [20:10:44.171] base 0x645f0000
- [20:10:44.171] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:44.171] Thread ID = 0x000060a4
- [20:10:44.171] base 0x65480000
- [20:10:44.171] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.171] Thread ID = 0x000060a4
- [20:10:44.171] path C:\WINDOWS\SysWOW64\dpmodemx.dll
- base 0x65480000
- size 25088
- [20:10:44.171] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.171] Thread ID = 0x000060a4
- [20:10:44.171] path C:\WINDOWS\SysWOW64\TAPI32.dll
- base 0x645f0000
- size 196608
- [20:10:44.171] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:44.171] Thread ID = 0x000060a4
- [20:10:44.171] path C:\WINDOWS\SysWOW64\rtutils.dll
- base 0x64fa0000
- size 51712
- [20:10:45.202] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x00006354
- [20:10:45.202] Thread handle = 0x000003c8
- Start address = 0x645f74d0
- Thread local base = 0x0036f000
- [20:10:45.202] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x000060a4
- [20:10:45.202] base 0x65480000
- [20:10:45.202] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x00006354
- [20:10:45.202] base 0x64fa0000
- [20:10:45.202] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x00006354
- [20:10:45.202] base 0x645f0000
- [20:10:45.202] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x00006354
- [20:10:45.202] Thread exit code = 0
- [20:10:45.202] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x000060a4
- [20:10:45.202] path C:\WINDOWS\SysWOW64\dpwsockx.dll
- base 0x65480000
- size 47104
- [20:10:45.202] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x000060a4
- [20:10:45.202] path C:\WINDOWS\SysWOW64\mswsock.dll
- base 0x74060000
- size 312160
- [20:10:45.202] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x000060a4
- [20:10:45.202] path C:\WINDOWS\SysWOW64\dpnathlp.dll
- base 0x64f90000
- size 61952
- [20:10:45.202] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x000060a4
- [20:10:45.202] path C:\WINDOWS\SysWOW64\CRYPTSP.dll
- base 0x73e10000
- size 69232
- [20:10:45.202] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.202] Thread ID = 0x000060a4
- [20:10:45.202] path C:\WINDOWS\SysWOW64\rsaenh.dll
- base 0x73de0000
- size 183896
- [20:10:45.218] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.218] Thread ID = 0x000060a4
- [20:10:45.218] path C:\WINDOWS\SysWOW64\iphlpapi.dll
- base 0x73f40000
- size 187488
- [20:10:45.218] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.218] Thread ID = 0x000060a4
- [20:10:45.218] path C:\WINDOWS\SysWOW64\rasapi32.dll
- base 0x64d20000
- size 653312
- [20:10:45.218] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.218] Thread ID = 0x000060a4
- [20:10:45.218] path C:\WINDOWS\SysWOW64\rasman.dll
- base 0x65450000
- size 123392
- [20:10:45.218] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.218] Thread ID = 0x000060a4
- [20:10:45.218] path C:\WINDOWS\SysWOW64\NSI.dll
- base 0x74540000
- size 20152
- [20:10:45.218] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.218] Thread ID = 0x000060a4
- [20:10:45.218] path C:\WINDOWS\SysWOW64\dhcpcsvc.DLL
- base 0x73d40000
- size 64000
- [20:10:45.249] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:45.249] Thread ID = 0x0000a364
- [20:10:45.249] Thread handle = 0x000003f0
- Start address = 0x74079e70
- Thread local base = 0x00372000
- [20:10:45.358] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x0000a0e4
- [20:10:45.358] Thread handle = 0x000003f4
- Start address = 0x65484b70
- Thread local base = 0x00375000
- [20:10:45.358] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x000060a4
- [20:10:45.358] base 0x65450000
- [20:10:45.358] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x000060a4
- [20:10:45.358] base 0x64d20000
- [20:10:45.358] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x000060a4
- [20:10:45.358] base 0x64f90000
- [20:10:45.358] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x0000a0e4
- [20:10:45.358] Thread exit code = 0
- [20:10:45.358] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x0000a364
- [20:10:45.358] Thread exit code = 0
- [20:10:45.358] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x000060a4
- [20:10:45.358] base 0x65480000
- [20:10:45.358] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:45.358] Thread ID = 0x00009674
- [20:10:45.358] Thread exit code = 0
- [20:10:45.390] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.390] Thread ID = 0x000060a4
- [20:10:45.390] path C:\WINDOWS\SysWOW64\napinsp.dll
- base 0x74340000
- size 55808
- [20:10:45.390] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.390] Thread ID = 0x000060a4
- [20:10:45.390] path C:\WINDOWS\SysWOW64\pnrpnsp.dll
- base 0x74320000
- size 70656
- [20:10:45.390] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.390] Thread ID = 0x000060a4
- [20:10:45.390] path C:\WINDOWS\SysWOW64\NLAapi.dll
- base 0x74300000
- size 65024
- [20:10:45.390] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.390] Thread ID = 0x000060a4
- [20:10:45.390] path C:\WINDOWS\SysWOW64\DNSAPI.dll
- base 0x73fd0000
- size 535088
- [20:10:45.390] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.390] Thread ID = 0x000060a4
- [20:10:45.390] path C:\WINDOWS\SysWOW64\winrnr.dll
- base 0x73fc0000
- size 23552
- [20:10:45.390] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.390] Thread ID = 0x000060a4
- [20:10:45.390] path C:\WINDOWS\SysWOW64\wshbth.dll
- base 0x73fa0000
- size 51712
- [20:10:45.405] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] path C:\Program Files (x86)\Bonjour\mdnsNSP.dll
- base 0x73f70000
- size 121704
- [20:10:45.405] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] path C:\WINDOWS\SysWOW64\fwpuclnt.dll
- base 0x73d80000
- size 269824
- [20:10:45.405] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] path C:\Windows\SysWOW64\rasadhlp.dll
- base 0x73dd0000
- size 13312
- [20:10:45.405] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] base 0x74340000
- [20:10:45.405] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] base 0x74320000
- [20:10:45.405] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] base 0x74300000
- [20:10:45.405] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] base 0x73fc0000
- [20:10:45.405] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] base 0x73fa0000
- [20:10:45.405] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] base 0x73f70000
- [20:10:45.405] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] base 0x73d80000
- [20:10:45.405] >> MMX Enabled
- [20:10:45.405] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.405] Thread ID = 0x000060a4
- [20:10:45.405] path C:\WINDOWS\SysWOW64\ntmarta.dll
- base 0x73440000
- size 150840
- [20:10:45.421] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:45.421] Thread ID = 0x000060a4
- [20:10:45.421] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x638c0000
- size 14103608
- [20:10:45.421] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:45.421] Thread ID = 0x00009478
- [20:10:45.421] Thread handle = 0x00000410
- Start address = 0x638c9d10
- Thread local base = 0x00378000
- [20:10:45.437] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:45.437] Thread ID = 0x00009478
- [20:10:45.437] Thread exit code = 0
- [20:10:46.108] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:46.108] Thread ID = 0x000060a4
- [20:10:46.108] base 0x638c0000
- [20:10:46.108] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:46.108] Thread ID = 0x000060a4
- [20:10:46.108] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x638c0000
- size 14103608
- [20:10:46.108] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:46.108] Thread ID = 0x0000a53c
- [20:10:46.108] Thread handle = 0x00000420
- Start address = 0x638c9d10
- Thread local base = 0x0037b000
- [20:10:46.108] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:46.108] Thread ID = 0x0000a53c
- [20:10:46.108] Thread exit code = 0
- [20:10:46.608] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:46.608] Thread ID = 0x000060a4
- [20:10:46.608] base 0x638c0000
- [20:10:46.608] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:46.608] Thread ID = 0x000060a4
- [20:10:46.608] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x638c0000
- size 14103608
- [20:10:46.608] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:46.608] Thread ID = 0x0000a0a0
- [20:10:46.608] Thread handle = 0x00000410
- Start address = 0x638c9d10
- Thread local base = 0x0037e000
- [20:10:46.608] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:46.608] Thread ID = 0x0000a0a0
- [20:10:46.608] Thread exit code = 0
- [20:10:48.249] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:48.249] Thread ID = 0x000060a4
- [20:10:48.249] base 0x638c0000
- [20:10:48.249] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.249] Thread ID = 0x000060a4
- [20:10:48.249] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x65480000
- size 11776
- [20:10:48.249] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.249] Thread ID = 0x000060a4
- [20:10:48.249] path C:\WINDOWS\SysWOW64\WINTRUST.dll
- base 0x77050000
- size 268040
- [20:10:48.249] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.249] Thread ID = 0x000060a4
- [20:10:48.249] path C:\WINDOWS\SysWOW64\MSASN1.dll
- base 0x74640000
- size 49592
- [20:10:48.249] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.249] Thread ID = 0x000060a4
- [20:10:48.249] path C:\WINDOWS\SysWOW64\CRYPT32.dll
- base 0x74be0000
- size 1535024
- [20:10:48.358] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:48.358] Thread ID = 0x000082ac
- [20:10:48.358] Thread handle = 0x00000438
- Start address = 0x74c105d0
- Thread local base = 0x00381000
- [20:10:48.358] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:48.358] Thread ID = 0x00009fe4
- [20:10:48.358] Thread handle = 0x00000440
- Start address = 0x776d9fa0
- Thread local base = 0x00384000
- [20:10:48.358] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.358] Thread ID = 0x000060a4
- [20:10:48.358] path C:\WINDOWS\SysWOW64\gpapi.dll
- base 0x71050000
- size 111608
- [20:10:48.608] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.608] Thread ID = 0x000060a4
- [20:10:48.608] path C:\WINDOWS\SysWOW64\cryptnet.dll
- base 0x65ef0000
- size 136704
- [20:10:48.624] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.624] Thread ID = 0x000060a4
- [20:10:48.624] path C:\WINDOWS\SysWOW64\WINNSI.DLL
- base 0x718b0000
- size 26848
- [20:10:48.624] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:48.624] Thread ID = 0x00009558
- [20:10:48.624] Thread handle = 0x00000450
- Start address = 0x776d9fa0
- Thread local base = 0x00387000
- [20:10:48.624] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:48.624] Thread ID = 0x0000a254
- [20:10:48.624] Thread handle = 0x00000454
- Start address = 0x776d9fa0
- Thread local base = 0x0038a000
- [20:10:48.749] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:48.749] Thread ID = 0x000060a4
- [20:10:48.749] base 0x65480000
- [20:10:48.749] >> nvd3dum.dll
- [20:10:48.749] >>
- [20:10:48.749] >> NVIDIA GeForce GTX 970
- [20:10:48.749] >>
- [20:10:48.765] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:48.765] Thread ID = 0x000060a4
- [20:10:48.765] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x65480000
- size 11776
- [20:10:49.015] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:49.015] Thread ID = 0x000060a4
- [20:10:49.015] base 0x65480000
- [20:10:49.015] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.015] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.015] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.015] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.015] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.015] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.015] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.015] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.015] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.015] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.015] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.015] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:49.015] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:49.015] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:49.015] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:49.015] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:49.015] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:49.015] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:49.015] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:49.015] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:49.015] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:49.015] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:49.015] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:49.015] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:49.015] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:49.015] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:49.015] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:49.015] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:49.015] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:49.015] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:49.015] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.015] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.015] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.015] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.015] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.015] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.015] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.015] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.015] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.015] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.015] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.015] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.015] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.015] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:49.015] Thread ID = 0x000060a4
- [20:10:49.015] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x638c0000
- size 14103608
- [20:10:49.015] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:49.015] Thread ID = 0x0000a0b0
- [20:10:49.015] Thread handle = 0x00000434
- Start address = 0x638c9d10
- Thread local base = 0x0038d000
- [20:10:49.030] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:49.030] Thread ID = 0x0000a0b0
- [20:10:49.030] Thread exit code = 0
- [20:10:49.030] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:49.030] Thread ID = 0x000060a4
- [20:10:49.030] base 0x638c0000
- [20:10:49.030] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:49.030] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:49.030] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:49.030] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:49.030] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:49.030] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:49.030] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:49.030] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:49.030] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:49.030] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:49.030] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:49.030] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.030] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.030] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.030] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.030] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.030] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.030] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.030] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.030] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.030] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.030] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.030] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:49.030] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:49.030] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:49.030] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:49.030] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:49.030] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:49.030] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:49.030] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:49.030] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:49.030] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:49.030] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:49.030] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:49.030] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:49.030] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.030] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.030] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.030] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.030] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.030] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.030] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.030] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.030] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.030] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.030] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.030] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.030] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.046] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:49.046] Thread ID = 0x000060a4
- [20:10:49.046] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x65480000
- size 11776
- [20:10:49.483] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:49.483] Thread ID = 0x000060a4
- [20:10:49.483] base 0x65480000
- [20:10:49.483] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:49.483] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:49.483] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:49.483] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:49.483] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:49.483] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:49.483] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:49.483] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:49.483] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:49.483] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:49.483] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:49.483] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.483] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.483] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.483] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.483] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.483] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.483] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.483] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.483] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.483] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.483] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.483] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:49.483] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:49.483] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:49.483] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:49.483] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:49.483] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:49.483] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:49.483] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:49.483] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:49.483] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:49.483] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:49.483] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:49.483] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:49.483] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.483] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.483] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.483] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.483] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.483] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.483] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.483] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.483] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.483] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.483] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.483] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.483] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.483] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:49.483] Thread ID = 0x000060a4
- [20:10:49.483] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x638c0000
- size 14103608
- [20:10:49.483] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:49.483] Thread ID = 0x00006f2c
- [20:10:49.483] Thread handle = 0x0000043c
- Start address = 0x638c9d10
- Thread local base = 0x00390000
- [20:10:49.483] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:49.483] Thread ID = 0x00006f2c
- [20:10:49.483] Thread exit code = 0
- [20:10:49.499] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:49.499] Thread ID = 0x000060a4
- [20:10:49.499] base 0x638c0000
- [20:10:49.499] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:49.515] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:49.515] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:49.515] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:49.515] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:49.515] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:49.515] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:49.515] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:49.515] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:49.515] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:49.515] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:49.515] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.515] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.515] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.515] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.515] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.515] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.515] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.515] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.515] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.515] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.515] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.515] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:49.515] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:49.515] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:49.515] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:49.515] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:49.515] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:49.515] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:49.515] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:49.515] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:49.515] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:49.515] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:49.515] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:49.515] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:49.515] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:49.515] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:49.515] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:49.515] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:49.515] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:49.515] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:49.515] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:49.515] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:49.515] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:49.515] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:49.515] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:49.515] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:49.515] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:49.515] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:49.515] Thread ID = 0x000060a4
- [20:10:49.515] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x65480000
- size 11776
- [20:10:50.265] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:50.265] Thread ID = 0x000060a4
- [20:10:50.265] base 0x65480000
- [20:10:50.265] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:50.265] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:50.265] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:50.265] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:50.265] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:50.265] >> Device mode 1176 x 664 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:50.265] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:50.265] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:50.265] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:50.265] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:50.265] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:50.265] >> Device mode 1768 x 992 (format 23) confirmed
- [20:10:50.265] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:50.265] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:50.265] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:50.265] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:50.265] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:50.265] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:50.265] >> Device mode 1176 x 664 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:50.265] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:50.265] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:50.265] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:50.265] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:50.265] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:50.265] >> Device mode 1768 x 992 (format 22) confirmed
- [20:10:50.265] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:50.265] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:50.265] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:50.265] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:50.265] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:50.265] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:50.265] >> Device mode 1176 x 664 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:50.265] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:50.265] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:50.265] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:50.265] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:50.265] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:50.265] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:50.265] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:50.265] >> Device mode 1768 x 992 (format 23) confirmed
- [20:10:50.265] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:50.265] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:50.265] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:50.265] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:50.265] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:50.265] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:50.265] >> Device mode 1176 x 664 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:50.265] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:50.265] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:50.265] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:50.265] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:50.265] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:50.265] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:50.265] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:50.265] >> Device mode 1768 x 992 (format 22) confirmed
- [20:10:50.265] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:50.265] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:50.265] Thread ID = 0x000060a4
- [20:10:50.265] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x638c0000
- size 14103608
- [20:10:50.265] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:50.265] Thread ID = 0x00007004
- [20:10:50.265] Thread handle = 0x00000434
- Start address = 0x638c9d10
- Thread local base = 0x00393000
- [20:10:50.280] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:50.280] Thread ID = 0x00007004
- [20:10:50.280] Thread exit code = 0
- [20:10:50.296] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [20:10:50.296] Thread ID = 0x000060a4
- [20:10:50.296] base 0x638c0000
- [20:10:50.296] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:50.296] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:50.296] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:50.296] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:50.296] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:50.296] >> Device mode 1176 x 664 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:50.296] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:50.296] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:50.296] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:50.296] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:50.296] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:50.296] >> Device mode 1768 x 992 (format 23) confirmed
- [20:10:50.296] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:50.296] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:50.296] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:50.296] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:50.296] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:50.296] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:50.296] >> Device mode 1176 x 664 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:50.296] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:50.296] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:50.296] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:50.296] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:50.296] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:50.296] >> Device mode 1768 x 992 (format 22) confirmed
- [20:10:50.296] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:50.296] >> Device mode 640 x 480 (format 23) confirmed
- [20:10:50.296] >> Device mode 720 x 480 (format 23) confirmed
- [20:10:50.296] >> Device mode 720 x 576 (format 23) confirmed
- [20:10:50.296] >> Device mode 800 x 600 (format 23) confirmed
- [20:10:50.296] >> Device mode 1024 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1152 x 864 (format 23) confirmed
- [20:10:50.296] >> Device mode 1176 x 664 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 720 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 800 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 960 (format 23) confirmed
- [20:10:50.296] >> Device mode 1280 x 1024 (format 23) confirmed
- [20:10:50.296] >> Device mode 1360 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1366 x 768 (format 23) confirmed
- [20:10:50.296] >> Device mode 1440 x 480 (format 23) confirmed
- [20:10:50.296] >> Device mode 1440 x 900 (format 23) confirmed
- [20:10:50.296] >> Device mode 1600 x 900 (format 23) confirmed
- [20:10:50.296] >> Device mode 1600 x 1024 (format 23) confirmed
- [20:10:50.296] >> Device mode 1680 x 1050 (format 23) confirmed
- [20:10:50.296] >> Device mode 1768 x 992 (format 23) confirmed
- [20:10:50.296] >> Device mode 1920 x 1080 (format 23) confirmed
- [20:10:50.296] >> Device mode 640 x 480 (format 22) confirmed
- [20:10:50.296] >> Device mode 720 x 480 (format 22) confirmed
- [20:10:50.296] >> Device mode 720 x 576 (format 22) confirmed
- [20:10:50.296] >> Device mode 800 x 600 (format 22) confirmed
- [20:10:50.296] >> Device mode 1024 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1152 x 864 (format 22) confirmed
- [20:10:50.296] >> Device mode 1176 x 664 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 720 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 800 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 960 (format 22) confirmed
- [20:10:50.296] >> Device mode 1280 x 1024 (format 22) confirmed
- [20:10:50.296] >> Device mode 1360 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1366 x 768 (format 22) confirmed
- [20:10:50.296] >> Device mode 1440 x 480 (format 22) confirmed
- [20:10:50.296] >> Device mode 1440 x 900 (format 22) confirmed
- [20:10:50.296] >> Device mode 1600 x 900 (format 22) confirmed
- [20:10:50.296] >> Device mode 1600 x 1024 (format 22) confirmed
- [20:10:50.296] >> Device mode 1680 x 1050 (format 22) confirmed
- [20:10:50.296] >> Device mode 1768 x 992 (format 22) confirmed
- [20:10:50.296] >> Device mode 1920 x 1080 (format 22) confirmed
- [20:10:50.296] >>
- Win95_Startup : 1920 x 1080
- [20:10:50.296] >>
- win95_initialiseD3D : 1920 x 1080
- [20:10:50.296] >> Initialize3DEnvironment(1920 x 1080 TNL:1)
- [20:10:50.296] >> Initialize3DEnvironment() - Requested width x height x format found in mode list
- [20:10:50.296] >> Adapter or MultiSampleType parameters are invalid.
- [20:10:50.296] >> Adapter or MultiSampleType parameters are invalid.
- [20:10:50.296] >> Adapter or MultiSampleType parameters are invalid.
- [20:10:50.296] >> Adapter or MultiSampleType parameters are invalid.
- [20:10:50.296] >> Puredevice set
- [20:10:50.296] Debug event: LOAD_DLL_DEBUG_EVENT
- [20:10:50.296] Thread ID = 0x000060a4
- [20:10:50.296] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x638c0000
- size 14103608
- [20:10:50.296] Debug event: CREATE_THREAD_DEBUG_EVENT
- [20:10:50.296] Thread ID = 0x0000a664
- [20:10:50.296] Thread handle = 0x0000046c
- Start address = 0x638c9d10
- Thread local base = 0x00396000
- [20:10:50.312] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:50.312] Thread ID = 0x0000a664
- [20:10:50.312] Thread exit code = 0
- [20:10:50.312] >> D3DDevice created =
- [20:10:50.312] >> HAL (hw vp): NVIDIA GeForce GTX 970
- [20:10:50.312] >>
- [20:10:50.312] >>
- GP_win95 :: Running gfx at 32/24 bit
- [20:10:50.312] >> win95_startup() - Initialize3DEnvironment ok
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x0054cf4f
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to write to virtual address 0x00b4a000
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.327] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.327] Thread ID = 0x000060a4
- [20:10:50.327] First chance exception
- [20:10:50.327] Exception address: 0x776c2bee
- [20:10:50.327] Module name: '' (base 0x77690000, size 1540768)
- [20:10:50.327] Exception flags: 0x00000000
- [20:10:50.327] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.327] Process tried to read from virtual address 0x5807008b
- [20:10:50.343] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.343] Thread ID = 0x0000a204
- [20:10:50.343] First chance exception
- [20:10:50.343] Exception address: 0x00509fbd
- [20:10:50.343] Exception flags: 0x00000000
- [20:10:50.343] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.343] Process tried to read from virtual address 0x58070083
- [20:10:50.343] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:50.343] Thread ID = 0x0000a204
- [20:10:50.343] Unhandled exception
- [20:10:50.343] Exception address: 0x00509fbd
- [20:10:50.343] Exception flags: 0x00000000
- [20:10:50.343] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:50.343] Process tried to read from virtual address 0x58070083
- [20:10:50.343] Stack trace:
- 00509FBD: Grand Prix 4\GPxPatch.exe! <no symbol>
- 752438F4: WINDOWS\SYSTEM32\KERNEL32.DLL! BaseThreadInitThunk + 36 bytes
- 776F56C3: WINDOWS\SYSTEM32\ntdll.dll! RtlUnicodeStringToInteger + 595 bytes
- 776F568E: WINDOWS\SYSTEM32\ntdll.dll! RtlUnicodeStringToInteger + 542 bytes
- [20:10:50.343] Registers:
- EAX=58070083 ECX=58070083 ESI=6DA77640
- EBX=0050A190 EDX=00000000 EDI=00000010
- CS:EIP=0023:00509FBD
- SS:ESP=002B:049BFE90 EBP=049BFF80
- DS=002B ES=002B FS=0053 GS=002B
- Flags=00010202
- Stack dump:
- 049bfe90: 0054e75d 00000010 6da77640 049bff80 '].T.....@v.m....'
- 049bfea0: 049bfeb4 0050a190 00000000 0050a190 '......P.......P.'
- 049bfeb0: 00000000 0050a195 6da634e6 00000010 '......P..4.m....'
- 049bfec0: 00000000 006509b8 00000000 00000000 '......e.........'
- 049bfed0: 6da633e0 6da633e0 00000000 00000000 '.3.m.3.m........'
- 049bfee0: 006509b8 00000000 ffff5f1e ffffffff '..e......_......'
- 049bfef0: 00000002 00000000 00000010 00000021 '............!...'
- 049bff00: 00000000 00000000 00000000 00000000 '................'
- 049bff10: 00000000 00000000 00000000 00000000 '................'
- 049bff20: 00000000 00000000 00000000 00000000 '................'
- 049bff30: 00000000 00000000 0000027c 00000288 '........|.......'
- 049bff40: 000002cc 00000000 00000000 00000000 '................'
- 049bff50: 00000000 00000000 00000000 00000000 '................'
- 049bff60: 00000000 00000000 00000000 00000000 '................'
- 049bff70: 00000000 00000000 00000000 3cefe804 '...............<'
- 049bff80: 049bff94 752438f4 00000000 752438d0 '.....8$u.....8$u'
- 049bff90: 2469dc03 049bffdc 776f56c3 00000000 '..i$.....Vow....'
- 049bffa0: 2601ce00 00000000 00000000 00000000 '...&............'
- 049bffb0: c0000005 7700f2f0 00000000 049bf8a4 '.......w........'
- 049bffc0: 2601ce00 049bffa0 049bf8a4 049bffe4 '...&............'
- 049bffd0: 7770ec80 55e21dbc 00000000 049bffec '..pw...U........'
- 049bffe0: 776f568e ffffffff 7771b6fe 00000000 '.Vow......qw....'
- 049bfff0: 00000000 6da633e0 00000000 00000000 '.....3.m........'
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x0000a204
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x0000a254
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x00009558
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x00009fe4
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x000082ac
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x0000869c
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x00008dcc
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXIT_THREAD_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x0000a11c
- [20:10:52.594] Thread exit code = -1073741819
- [20:10:52.594] Debug event: EXCEPTION_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x000060a4
- [20:10:52.594] First chance exception
- [20:10:52.594] Exception address: 0x776c2bee
- [20:10:52.594] Module name: '' (base 0x77690000, size 1540768)
- [20:10:52.594] Exception flags: 0x00000000
- [20:10:52.594] Exception code: EXCEPTION_ACCESS_VIOLATION
- [20:10:52.594] Process tried to read from virtual address 0x5807008b
- [20:10:52.594] Debug event: EXIT_PROCESS_DEBUG_EVENT
- [20:10:52.594] Thread ID = 0x000060a4
- [20:10:52.594] Process exit code = -1073741819
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement