Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting log
- GPxPatch version: 4.44
- GPx version detected: decrypted GP4 v1.02
- Date/time: 25-01-2016 23:45
- [23:45:40.795] Verbosity level is 2
- [23:45:40.795] OS version info: Windows 8 build 9200
- [23:45:40.795] Total physical memory: 2047 MB (free: 2047 MB)
- [23:45:40.795] Debugging gp4.exe
- [23:45:40.800] Process created:
- Process ID = 0x00002134
- Process handle = 0x00000288
- Main thread ID = 0x00002348
- Main thread handle = 0x00000284
- Process will run on CPU 1 only
- [23:45:40.800] Waiting for debug events...
- [23:45:40.800] Debug event: CREATE_PROCESS_DEBUG_EVENT
- [23:45:40.800] Thread ID = 0x00002348
- [23:45:40.800] Entry point = 0x005ddec6
- [23:45:40.805] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.805] Thread ID = 0x00002348
- [23:45:40.805] path
- base 0x77d20000
- size 1532984
- [23:45:40.805] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:40.805] Thread ID = 0x00002348
- [23:45:40.805] base 0x00260000
- [23:45:40.805] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:40.805] Thread ID = 0x00002348
- [23:45:40.805] base 0x75a90000
- [23:45:40.805] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:40.805] Thread ID = 0x00002348
- [23:45:40.805] base 0x00260000
- [23:45:40.805] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:40.805] Thread ID = 0x00002348
- [23:45:40.805] base 0x00260000
- [23:45:40.810] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.810] Thread ID = 0x00002348
- [23:45:40.810] path C:\Windows\SysWOW64\KERNEL32.DLL
- base 0x75a90000
- size 624312
- [23:45:40.810] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.810] Thread ID = 0x00002348
- [23:45:40.810] path C:\Windows\SysWOW64\KERNELBASE.dll
- base 0x74fd0000
- size 1531376
- [23:45:40.810] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.810] Thread ID = 0x00002348
- [23:45:40.810] path C:\Windows\SysWOW64\apphelp.dll
- base 0x74d20000
- size 576000
- [23:45:40.880] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.880] Thread ID = 0x00002348
- [23:45:40.880] path C:\Windows\AppPatch\AcGenral.DLL
- base 0x64de0000
- size 2478592
- [23:45:40.880] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.880] Thread ID = 0x00002348
- [23:45:40.880] path C:\Windows\SysWOW64\msvcrt.dll
- base 0x75190000
- size 773168
- [23:45:40.880] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.880] Thread ID = 0x00002348
- [23:45:40.880] path C:\Windows\SysWOW64\sechost.dll
- base 0x753c0000
- size 263432
- [23:45:40.880] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.880] Thread ID = 0x00002348
- [23:45:40.880] path C:\Windows\SysWOW64\RPCRT4.dll
- base 0x76490000
- size 705520
- [23:45:40.880] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.880] Thread ID = 0x00002348
- [23:45:40.880] path C:\Windows\SysWOW64\SspiCli.dll
- base 0x74e30000
- size 116216
- [23:45:40.880] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.880] Thread ID = 0x00002348
- [23:45:40.880] path C:\Windows\SysWOW64\CRYPTBASE.dll
- base 0x74e20000
- size 31528
- [23:45:40.880] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.880] Thread ID = 0x00002348
- [23:45:40.880] path C:\Windows\SysWOW64\bcryptPrimitives.dll
- base 0x74dc0000
- size 365128
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\SHLWAPI.dll
- base 0x75410000
- size 274768
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\combase.dll
- base 0x76650000
- size 1811360
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\GDI32.dll
- base 0x76810000
- size 1365576
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\USER32.dll
- base 0x75860000
- size 1310880
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\ole32.dll
- base 0x754f0000
- size 952968
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\OLEAUT32.dll
- base 0x75c90000
- size 591912
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\SHELL32.dll
- base 0x76960000
- size 20858360
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\windows.storage.dll
- base 0x75d30000
- size 5120056
- [23:45:40.885] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.885] Thread ID = 0x00002348
- [23:45:40.885] path C:\Windows\SysWOW64\advapi32.dll
- base 0x76560000
- size 497896
- [23:45:40.890] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.890] Thread ID = 0x00002348
- [23:45:40.890] path C:\Windows\SysWOW64\kernel.appcore.dll
- base 0x75150000
- size 39792
- [23:45:40.890] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.890] Thread ID = 0x00002348
- [23:45:40.890] path C:\Windows\SysWOW64\shcore.dll
- base 0x759a0000
- size 565656
- [23:45:40.890] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.890] Thread ID = 0x00002348
- [23:45:40.890] path C:\Windows\SysWOW64\powrprof.dll
- base 0x75460000
- size 269648
- [23:45:40.890] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.890] Thread ID = 0x00002348
- [23:45:40.890] path C:\Windows\SysWOW64\profapi.dll
- base 0x76640000
- size 53728
- [23:45:40.890] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.890] Thread ID = 0x00002348
- [23:45:40.890] path C:\Windows\SysWOW64\UxTheme.dll
- base 0x72550000
- size 458752
- [23:45:40.895] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.895] Thread ID = 0x00002348
- [23:45:40.895] path C:\Windows\SysWOW64\WINMM.dll
- base 0x74cb0000
- size 134352
- [23:45:40.895] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.895] Thread ID = 0x00002348
- [23:45:40.895] path C:\Windows\SysWOW64\samcli.dll
- base 0x72600000
- size 65024
- [23:45:40.895] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.895] Thread ID = 0x00002348
- [23:45:40.895] path C:\Windows\SysWOW64\MSACM32.dll
- base 0x6b200000
- size 90912
- [23:45:40.895] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.895] Thread ID = 0x00002348
- [23:45:40.895] path C:\Windows\SysWOW64\VERSION.dll
- base 0x74ce0000
- size 27360
- [23:45:40.895] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.895] Thread ID = 0x00002348
- [23:45:40.895] path C:\Windows\SysWOW64\USERENV.dll
- base 0x74c90000
- size 92992
- [23:45:40.900] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.900] Thread ID = 0x00002348
- [23:45:40.900] path C:\Windows\SysWOW64\dwmapi.dll
- base 0x72340000
- size 93696
- [23:45:40.900] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.900] Thread ID = 0x00002348
- [23:45:40.900] path C:\Windows\SysWOW64\urlmon.dll
- base 0x72f10000
- size 1380864
- [23:45:40.900] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.900] Thread ID = 0x00002348
- [23:45:40.900] path C:\Windows\SysWOW64\WINSPOOL.DRV
- base 0x73230000
- size 400384
- [23:45:40.900] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.900] Thread ID = 0x00002348
- [23:45:40.900] path C:\Windows\SysWOW64\MPR.dll
- base 0x6b220000
- size 88320
- [23:45:40.900] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.900] Thread ID = 0x00002348
- [23:45:40.900] path C:\Windows\SysWOW64\WINMMBASE.dll
- base 0x74c50000
- size 132744
- [23:45:40.900] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.900] Thread ID = 0x00002348
- [23:45:40.900] path C:\Windows\SysWOW64\cfgmgr32.dll
- base 0x754b0000
- size 214360
- [23:45:40.905] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.905] Thread ID = 0x00002348
- [23:45:40.905] path C:\Windows\SysWOW64\iertutil.dll
- base 0x72c40000
- size 2879024
- [23:45:40.906] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.906] Thread ID = 0x00002348
- [23:45:40.906] path C:\Windows\SysWOW64\bcrypt.dll
- base 0x72620000
- size 106896
- [23:45:40.906] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.906] Thread ID = 0x00002348
- [23:45:40.906] path C:\Windows\SysWOW64\DEVOBJ.dll
- base 0x74c20000
- size 127592
- [23:45:40.906] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.906] Thread ID = 0x00002348
- [23:45:40.906] path C:\Windows\AppPatch\AcLayers.dll
- base 0x64b60000
- size 335360
- [23:45:40.906] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.906] Thread ID = 0x00002348
- [23:45:40.906] path C:\Windows\SysWOW64\SETUPAPI.dll
- base 0x762d0000
- size 1733880
- [23:45:40.906] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.906] Thread ID = 0x00002348
- [23:45:40.906] path C:\Windows\SysWOW64\sfc.dll
- base 0x66680000
- size 3072
- [23:45:40.911] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.911] Thread ID = 0x00002348
- [23:45:40.911] path C:\Windows\SysWOW64\sfc_os.DLL
- base 0x6d500000
- size 40960
- [23:45:40.911] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.911] Thread ID = 0x00002348
- [23:45:40.911] path
- base 0x00e10000
- size 6275072
- [23:45:40.911] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:40.911] Thread ID = 0x00002348
- [23:45:40.911] base 0x00e10000
- [23:45:40.911] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.911] Thread ID = 0x00002348
- [23:45:40.911] path
- base 0x00e10000
- size 6275072
- [23:45:40.911] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:40.911] Thread ID = 0x00002348
- [23:45:40.911] base 0x00e10000
- [23:45:40.931] >> FTH: (8500): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
- [23:45:40.959] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.959] Thread ID = 0x00002348
- [23:45:40.959] path C:\Windows\SysWOW64\SortServer2003Compat.dll
- base 0x6d290000
- size 40448
- [23:45:40.992] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.992] Thread ID = 0x00002348
- [23:45:40.992] path C:\Windows\SysWOW64\IMM32.DLL
- base 0x75160000
- size 168400
- [23:45:40.992] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.992] Thread ID = 0x00002348
- [23:45:40.992] path C:\Windows\SysWOW64\MSCTF.dll
- base 0x75640000
- size 1180704
- [23:45:40.992] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.992] Thread ID = 0x00002348
- [23:45:40.992] path C:\Windows\SysWOW64\d3d8.dll
- base 0x64a50000
- size 1074176
- [23:45:40.997] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] path C:\Windows\SysWOW64\dinput8.dll
- base 0x61a90000
- size 172032
- [23:45:40.997] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] path C:\Windows\SysWOW64\dsound.dll
- base 0x73f90000
- size 527360
- [23:45:40.997] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] path E:\GP4\Grand Prix 4\binkw32.dll
- base 0x30000000
- size 357939
- [23:45:40.997] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] path C:\Windows\SysWOW64\wsock32.dll
- base 0x6b1e0000
- size 16384
- [23:45:40.997] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] path C:\Windows\SysWOW64\WS2_32.dll
- base 0x75c10000
- size 372912
- [23:45:40.997] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00000700
- [23:45:40.997] Thread handle = 0x00000378
- Start address = 0x77d543e0
- Thread local base = 0x7ffda000
- [23:45:40.997] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] path C:\Windows\SysWOW64\NSI.dll
- base 0x75630000
- size 20160
- [23:45:40.997] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] path C:\Windows\SysWOW64\d3d8thk.dll
- base 0x6d1e0000
- size 12800
- [23:45:40.997] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:40.997] Thread ID = 0x00002348
- [23:45:40.997] First chance exception
- [23:45:40.997] Exception address: 0x77dc3b15
- [23:45:40.997] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:40.997] Exception flags: 0x00000000
- [23:45:40.997] Exception code: EXCEPTION_BREAKPOINT
- [23:45:40.997] Setting breakpoint on entry point (0x005ddec6)
- [23:45:41.002] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:41.002] Thread ID = 0x00002348
- [23:45:41.002] First chance exception
- [23:45:41.002] Exception address: 0x005ddec6
- [23:45:41.002] Exception flags: 0x00000000
- [23:45:41.002] Exception code: EXCEPTION_BREAKPOINT
- [23:45:41.002] Removing breakpoint on entry point
- [23:45:41.002] Injecting DLL loading code...
- [23:45:41.002] Copying code to target at address 0x00200000...
- [23:45:41.002] Injection succesful
- [23:45:41.002] Setting instruction pointer to injected code (0x00200000)
- [23:45:41.002] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.002] Thread ID = 0x00002348
- [23:45:41.002] path E:\GP4\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
- base 0x09a00000
- size 27648
- [23:45:41.002] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.002] Thread ID = 0x00002348
- [23:45:41.002] path E:\GP4\Grand Prix 4\GPxPSup.dll
- base 0x09900000
- size 40960
- [23:45:41.002] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.002] Thread ID = 0x00002348
- [23:45:41.002] path C:\Windows\SysWOW64\imagehlp.dll
- base 0x76540000
- size 90400
- [23:45:41.002] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.002] Thread ID = 0x00002348
- [23:45:41.002] base 0x76540000
- [23:45:41.002] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.002] Thread ID = 0x00000da4
- [23:45:41.002] Thread handle = 0x00000390
- Start address = 0x77d543e0
- Thread local base = 0x7ffd7000
- [23:45:41.012] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.012] Thread ID = 0x00002348
- [23:45:41.012] path C:\Windows\SysWOW64\imagehlp.dll
- base 0x76540000
- size 90400
- [23:45:41.017] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.017] Thread ID = 0x00002348
- [23:45:41.017] base 0x76540000
- [23:45:41.017] >> D3D Constructor!
- [23:45:41.017] >> Starting WinMain
- [23:45:41.017] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.017] Thread ID = 0x000013f0
- [23:45:41.017] Thread handle = 0x00000398
- Start address = 0x64b8d550
- Thread local base = 0x7feaf000
- [23:45:41.112] >> WM_ACTIVATE (active)(not minimized)
- [23:45:41.117] >> Game thread into win95_startup(0)
- [23:45:41.117] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.117] Thread ID = 0x000011d0
- [23:45:41.117] Thread handle = 0x000003a0
- Start address = 0x74cb3400
- Thread local base = 0x7feac000
- [23:45:41.117] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.117] Thread ID = 0x00002348
- [23:45:41.117] path C:\Windows\SysWOW64\clbcatq.dll
- base 0x75b80000
- size 519072
- [23:45:41.122] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] path C:\Windows\SysWOW64\dplayx.dll
- base 0x6cf70000
- size 220160
- [23:45:41.122] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] path C:\Windows\SysWOW64\dpmodemx.dll
- base 0x6d1d0000
- size 25088
- [23:45:41.122] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] path C:\Windows\SysWOW64\TAPI32.dll
- base 0x6ce70000
- size 196608
- [23:45:41.122] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10240.16384_none_3bccb1ff6bcd1849\comctl32.dll
- base 0x726f0000
- size 2117472
- [23:45:41.122] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00000620
- [23:45:41.122] Thread handle = 0x000003b8
- Start address = 0x6cf9a880
- Thread local base = 0x7fea9000
- [23:45:41.122] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] base 0x6ce70000
- [23:45:41.122] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] base 0x6d1d0000
- [23:45:41.122] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] path C:\Windows\SysWOW64\dpmodemx.dll
- base 0x6d1d0000
- size 25088
- [23:45:41.122] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.122] Thread ID = 0x00002348
- [23:45:41.122] path C:\Windows\SysWOW64\TAPI32.dll
- base 0x6ce70000
- size 196608
- [23:45:41.122] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.127] Thread ID = 0x00002348
- [23:45:41.127] path C:\Windows\SysWOW64\rtutils.dll
- base 0x6cf50000
- size 52224
- [23:45:41.132] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00001110
- [23:45:41.132] Thread handle = 0x000003c4
- Start address = 0x6ce774d0
- Thread local base = 0x7fea6000
- [23:45:41.132] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00002348
- [23:45:41.132] base 0x6d1d0000
- [23:45:41.132] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00001110
- [23:45:41.132] base 0x6cf50000
- [23:45:41.132] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00001110
- [23:45:41.132] base 0x6ce70000
- [23:45:41.132] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00001110
- [23:45:41.132] Thread exit code = 0
- [23:45:41.132] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00002348
- [23:45:41.132] path C:\Windows\SysWOW64\dpwsockx.dll
- base 0x6d1d0000
- size 47104
- [23:45:41.132] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00002348
- [23:45:41.132] path C:\Windows\SysWOW64\mswsock.dll
- base 0x71ab0000
- size 306528
- [23:45:41.132] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.132] Thread ID = 0x00002348
- [23:45:41.132] path C:\Windows\SysWOW64\dpnathlp.dll
- base 0x6cf50000
- size 61952
- [23:45:41.137] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.137] Thread ID = 0x00002348
- [23:45:41.137] path C:\Windows\SysWOW64\CRYPTSP.dll
- base 0x6e9d0000
- size 67696
- [23:45:41.137] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.137] Thread ID = 0x00002348
- [23:45:41.137] path C:\Windows\SysWOW64\rsaenh.dll
- base 0x6ce10000
- size 183904
- [23:45:41.137] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.137] Thread ID = 0x00002348
- [23:45:41.137] path C:\Windows\SysWOW64\iphlpapi.dll
- base 0x722f0000
- size 187008
- [23:45:41.137] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.137] Thread ID = 0x00002348
- [23:45:41.137] path C:\Windows\SysWOW64\WINNSI.DLL
- base 0x722e0000
- size 26848
- [23:45:41.137] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.137] Thread ID = 0x00002348
- [23:45:41.137] path C:\Windows\SysWOW64\rasapi32.dll
- base 0x649a0000
- size 649216
- [23:45:41.137] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.137] Thread ID = 0x00002348
- [23:45:41.137] path C:\Windows\SysWOW64\rasman.dll
- base 0x6ce80000
- size 123392
- [23:45:41.137] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.137] Thread ID = 0x00002348
- [23:45:41.137] path C:\Windows\SysWOW64\dhcpcsvc.DLL
- base 0x71fb0000
- size 64000
- [23:45:41.147] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.147] Thread ID = 0x00002210
- [23:45:41.147] Thread handle = 0x000003ec
- Start address = 0x71ac7c10
- Thread local base = 0x7fea6000
- [23:45:41.281] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x000023b8
- [23:45:41.286] Thread handle = 0x000003f0
- Start address = 0x6d1d4b70
- Thread local base = 0x7fea3000
- [23:45:41.286] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x00002348
- [23:45:41.286] base 0x6ce80000
- [23:45:41.286] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x00002348
- [23:45:41.286] base 0x649a0000
- [23:45:41.286] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x00002348
- [23:45:41.286] base 0x6cf50000
- [23:45:41.286] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x000023b8
- [23:45:41.286] Thread exit code = 0
- [23:45:41.286] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x00002210
- [23:45:41.286] Thread exit code = 0
- [23:45:41.286] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x00002348
- [23:45:41.286] base 0x6d1d0000
- [23:45:41.286] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:41.286] Thread ID = 0x00000620
- [23:45:41.286] Thread exit code = 0
- [23:45:41.306] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.306] Thread ID = 0x00002348
- [23:45:41.306] path C:\Windows\SysWOW64\napinsp.dll
- base 0x61970000
- size 54784
- [23:45:41.311] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.311] Thread ID = 0x00002348
- [23:45:41.311] path C:\Windows\SysWOW64\pnrpnsp.dll
- base 0x61950000
- size 70144
- [23:45:41.311] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.311] Thread ID = 0x00002348
- [23:45:41.311] path C:\Windows\SysWOW64\NLAapi.dll
- base 0x72320000
- size 64000
- [23:45:41.311] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.311] Thread ID = 0x00002348
- [23:45:41.311] path C:\Windows\SysWOW64\DNSAPI.dll
- base 0x71a20000
- size 534064
- [23:45:41.316] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.316] Thread ID = 0x00002348
- [23:45:41.316] path C:\Windows\SysWOW64\winrnr.dll
- base 0x61940000
- size 23552
- [23:45:41.316] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.316] Thread ID = 0x00002348
- [23:45:41.316] path C:\Windows\SysWOW64\wshbth.dll
- base 0x61920000
- size 51200
- [23:45:41.321] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.321] Thread ID = 0x00002348
- [23:45:41.321] path C:\Windows\SysWOW64\fwpuclnt.dll
- base 0x6cf00000
- size 268800
- [23:45:41.321] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.321] Thread ID = 0x00002348
- [23:45:41.321] path C:\Windows\SysWOW64\rasadhlp.dll
- base 0x71a10000
- size 13312
- [23:45:41.326] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.326] Thread ID = 0x00002348
- [23:45:41.326] base 0x61970000
- [23:45:41.326] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.326] Thread ID = 0x00002348
- [23:45:41.326] base 0x61950000
- [23:45:41.326] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.326] Thread ID = 0x00002348
- [23:45:41.326] base 0x72320000
- [23:45:41.326] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.326] Thread ID = 0x00002348
- [23:45:41.326] base 0x61940000
- [23:45:41.326] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.326] Thread ID = 0x00002348
- [23:45:41.326] base 0x61920000
- [23:45:41.326] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:41.326] Thread ID = 0x00002348
- [23:45:41.326] base 0x6cf00000
- [23:45:41.326] >> MMX Enabled
- [23:45:41.326] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.326] Thread ID = 0x00002348
- [23:45:41.326] path C:\Windows\SysWOW64\ntmarta.dll
- base 0x725d0000
- size 151360
- [23:45:41.331] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:41.331] Thread ID = 0x00002348
- [23:45:41.331] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x5d8e0000
- size 14103608
- [23:45:41.341] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:41.341] Thread ID = 0x000022b4
- [23:45:41.341] Thread handle = 0x00000414
- Start address = 0x5d8e9d10
- Thread local base = 0x7fea9000
- [23:45:41.361] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:41.361] Thread ID = 0x000022b4
- [23:45:41.361] Thread exit code = 0
- [23:45:42.001] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:42.001] Thread ID = 0x00002348
- [23:45:42.001] base 0x5d8e0000
- [23:45:42.001] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:42.001] Thread ID = 0x00002348
- [23:45:42.001] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x5d8e0000
- size 14103608
- [23:45:42.006] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:42.006] Thread ID = 0x000006c0
- [23:45:42.006] Thread handle = 0x0000041c
- Start address = 0x5d8e9d10
- Thread local base = 0x7fea9000
- [23:45:42.021] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:42.021] Thread ID = 0x000006c0
- [23:45:42.021] Thread exit code = 0
- [23:45:43.560] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:43.560] Thread ID = 0x00002348
- [23:45:43.560] base 0x5d8e0000
- [23:45:43.560] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:43.560] Thread ID = 0x00002348
- [23:45:43.560] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x5d8e0000
- size 14103608
- [23:45:43.565] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:43.565] Thread ID = 0x000018bc
- [23:45:43.565] Thread handle = 0x00000424
- Start address = 0x5d8e9d10
- Thread local base = 0x7fea9000
- [23:45:43.580] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:43.580] Thread ID = 0x000018bc
- [23:45:43.580] Thread exit code = 0
- [23:45:44.035] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:44.035] Thread ID = 0x00002348
- [23:45:44.035] base 0x5d8e0000
- [23:45:44.040] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.040] Thread ID = 0x00002348
- [23:45:44.040] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6d1d0000
- size 11776
- [23:45:44.040] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.040] Thread ID = 0x00002348
- [23:45:44.040] path C:\Windows\SysWOW64\WINTRUST.dll
- base 0x755e0000
- size 265480
- [23:45:44.040] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.040] Thread ID = 0x00002348
- [23:45:44.040] path C:\Windows\SysWOW64\MSASN1.dll
- base 0x75c80000
- size 49592
- [23:45:44.040] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.040] Thread ID = 0x00002348
- [23:45:44.040] path C:\Windows\SysWOW64\CRYPT32.dll
- base 0x74e50000
- size 1521608
- [23:45:44.120] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.120] Thread ID = 0x00002348
- [23:45:44.120] path C:\Windows\SysWOW64\gpapi.dll
- base 0x6f5e0000
- size 112632
- [23:45:44.135] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:44.135] Thread ID = 0x000021e4
- [23:45:44.135] Thread handle = 0x00000438
- Start address = 0x77d543e0
- Thread local base = 0x7fea6000
- [23:45:44.135] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:44.135] Thread ID = 0x000021a0
- [23:45:44.135] Thread handle = 0x00000440
- Start address = 0x74e9edf0
- Thread local base = 0x7fea9000
- [23:45:44.405] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.405] Thread ID = 0x00002348
- [23:45:44.405] path C:\Windows\SysWOW64\cryptnet.dll
- base 0x6d590000
- size 137216
- [23:45:44.405] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.405] Thread ID = 0x00002348
- [23:45:44.405] path C:\Windows\SysWOW64\WLDAP32.dll
- base 0x75760000
- size 320000
- [23:45:44.410] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:44.410] Thread ID = 0x000016a4
- [23:45:44.410] Thread handle = 0x0000044c
- Start address = 0x77d543e0
- Thread local base = 0x7fea3000
- [23:45:44.410] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:44.410] Thread ID = 0x000003f0
- [23:45:44.410] Thread handle = 0x00000450
- Start address = 0x77d543e0
- Thread local base = 0x7fea0000
- [23:45:44.545] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:44.545] Thread ID = 0x00002348
- [23:45:44.545] base 0x6d1d0000
- [23:45:44.545] >> nvd3dum.dll
- [23:45:44.545] >>
- [23:45:44.545] >> NVIDIA GeForce GTX 970
- [23:45:44.545] >>
- [23:45:44.545] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.545] Thread ID = 0x00002348
- [23:45:44.545] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6d1d0000
- size 11776
- [23:45:44.850] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:44.850] Thread ID = 0x00002348
- [23:45:44.850] base 0x6d1d0000
- [23:45:44.887] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:44.887] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:44.887] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:44.887] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:44.887] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:44.887] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:44.887] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:44.887] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:44.887] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:44.887] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:44.887] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:44.887] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:44.887] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:44.887] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:44.887] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:44.887] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:44.887] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:44.887] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:44.887] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:44.887] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:44.887] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:44.887] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:44.887] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:44.887] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:44.887] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:44.887] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:44.887] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:44.887] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:44.887] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:44.887] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:44.887] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:44.887] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:44.887] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:44.887] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:44.887] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:44.887] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:44.887] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:44.887] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:44.887] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:44.887] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:44.887] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:44.887] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:44.887] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:44.887] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.887] Thread ID = 0x00002348
- [23:45:44.887] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x5d8e0000
- size 14103608
- [23:45:44.892] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:44.892] Thread ID = 0x00001f4c
- [23:45:44.892] Thread handle = 0x0000045c
- Start address = 0x5d8e9d10
- Thread local base = 0x7fe9d000
- [23:45:44.902] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:44.902] Thread ID = 0x00001f4c
- [23:45:44.902] Thread exit code = 0
- [23:45:44.907] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:44.907] Thread ID = 0x00002348
- [23:45:44.907] base 0x5d8e0000
- [23:45:44.912] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:44.912] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:44.912] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:44.912] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:44.912] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:44.912] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:44.912] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:44.912] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:44.912] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:44.912] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:44.912] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:44.912] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:44.912] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:44.912] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:44.912] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:44.912] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:44.912] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:44.912] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:44.912] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:44.912] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:44.912] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:44.912] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:44.912] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:44.912] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:44.912] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:44.912] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:44.912] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:44.912] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:44.912] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:44.912] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:44.912] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:44.912] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:44.912] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:44.912] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:44.912] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:44.912] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:44.912] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:44.912] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:44.912] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:44.912] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:44.912] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:44.912] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:44.912] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:44.912] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:44.912] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:44.912] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:44.912] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:44.912] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:44.912] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:44.912] Thread ID = 0x00002348
- [23:45:44.912] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6d1d0000
- size 11776
- [23:45:45.357] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:45.357] Thread ID = 0x00002348
- [23:45:45.357] base 0x6d1d0000
- [23:45:45.407] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:45.407] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:45.407] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:45.407] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:45.407] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:45.407] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:45.407] >> Device mode 1176 x 664 (format 23) confirmed
- [23:45:45.407] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:45.407] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:45.407] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:45.407] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:45.407] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:45.407] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:45.407] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:45.407] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:45.407] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:45.407] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:45.407] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:45.407] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:45.407] >> Device mode 1768 x 992 (format 23) confirmed
- [23:45:45.407] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:45.407] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:45.407] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:45.407] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:45.407] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:45.407] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:45.407] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:45.407] >> Device mode 1176 x 664 (format 22) confirmed
- [23:45:45.407] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:45.407] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:45.407] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:45.407] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:45.407] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:45.407] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:45.407] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:45.407] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:45.407] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:45.407] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:45.407] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:45.407] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:45.407] >> Device mode 1768 x 992 (format 22) confirmed
- [23:45:45.407] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:45.407] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:45.407] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:45.407] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:45.407] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:45.407] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:45.407] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:45.407] >> Device mode 1176 x 664 (format 23) confirmed
- [23:45:45.407] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:45.407] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:45.412] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:45.412] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:45.412] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:45.412] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:45.412] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:45.412] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:45.412] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:45.412] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:45.412] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:45.412] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:45.412] >> Device mode 1768 x 992 (format 23) confirmed
- [23:45:45.412] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:45.412] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:45.412] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:45.412] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:45.412] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:45.412] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:45.412] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:45.412] >> Device mode 1176 x 664 (format 22) confirmed
- [23:45:45.412] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:45.412] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:45.412] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:45.412] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:45.412] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:45.412] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:45.412] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:45.412] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:45.412] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:45.412] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:45.412] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:45.412] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:45.412] >> Device mode 1768 x 992 (format 22) confirmed
- [23:45:45.412] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:45.412] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:45.412] Thread ID = 0x00002348
- [23:45:45.412] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x5d8e0000
- size 14103608
- [23:45:45.422] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:45.422] Thread ID = 0x00001ab0
- [23:45:45.422] Thread handle = 0x00000464
- Start address = 0x5d8e9d10
- Thread local base = 0x7fe9d000
- [23:45:45.447] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:45.447] Thread ID = 0x00001ab0
- [23:45:45.447] Thread exit code = 0
- [23:45:45.452] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:45.452] Thread ID = 0x00002348
- [23:45:45.452] base 0x5d8e0000
- [23:45:45.452] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:45.452] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:45.452] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:45.452] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:45.452] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:45.452] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:45.452] >> Device mode 1176 x 664 (format 23) confirmed
- [23:45:45.452] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:45.452] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:45.452] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:45.452] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:45.452] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:45.452] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:45.452] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:45.452] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:45.452] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:45.452] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:45.457] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:45.457] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:45.457] >> Device mode 1768 x 992 (format 23) confirmed
- [23:45:45.457] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:45.457] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:45.457] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:45.457] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:45.457] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:45.457] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:45.457] >> Device mode 1176 x 664 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:45.457] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:45.457] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:45.457] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:45.457] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:45.457] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:45.457] >> Device mode 1768 x 992 (format 22) confirmed
- [23:45:45.457] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:45.457] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:45.457] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:45.457] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:45.457] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:45.457] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:45.457] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:45.457] >> Device mode 1176 x 664 (format 23) confirmed
- [23:45:45.457] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:45.457] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:45.457] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:45.457] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:45.457] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:45.457] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:45.457] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:45.457] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:45.457] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:45.457] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:45.457] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:45.457] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:45.457] >> Device mode 1768 x 992 (format 23) confirmed
- [23:45:45.457] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:45.457] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:45.457] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:45.457] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:45.457] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:45.457] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:45.457] >> Device mode 1176 x 664 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:45.457] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:45.457] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:45.457] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:45.457] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:45.457] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:45.457] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:45.457] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:45.457] >> Device mode 1768 x 992 (format 22) confirmed
- [23:45:45.457] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:45.457] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:45.457] Thread ID = 0x00002348
- [23:45:45.457] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6d1d0000
- size 11776
- [23:45:46.197] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:46.197] Thread ID = 0x00002348
- [23:45:46.197] base 0x6d1d0000
- [23:45:46.222] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:46.222] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:46.222] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:46.222] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:46.222] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:46.222] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:46.222] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:46.222] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:46.222] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:46.222] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:46.222] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:46.222] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:46.222] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:46.222] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:46.222] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:46.222] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:46.222] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:46.222] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:46.222] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:46.222] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:46.222] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:46.222] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:46.222] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:46.222] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:46.222] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:46.222] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:46.222] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:46.222] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:46.222] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:46.222] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:46.222] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:46.222] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:46.222] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:46.222] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:46.222] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:46.222] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:46.222] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:46.222] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:46.222] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:46.222] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:46.222] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:46.222] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:46.222] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:46.222] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:46.222] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:46.222] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:46.222] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:46.222] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:46.222] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:46.222] Thread ID = 0x00002348
- [23:45:46.222] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x5d8e0000
- size 14103608
- [23:45:46.227] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:46.227] Thread ID = 0x00001f78
- [23:45:46.227] Thread handle = 0x0000046c
- Start address = 0x5d8e9d10
- Thread local base = 0x7fe9d000
- [23:45:46.242] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:46.242] Thread ID = 0x00001f78
- [23:45:46.242] Thread exit code = 0
- [23:45:46.247] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [23:45:46.247] Thread ID = 0x00002348
- [23:45:46.247] base 0x5d8e0000
- [23:45:46.247] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:46.247] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:46.247] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:46.247] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:46.247] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:46.247] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:46.247] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:46.247] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:46.247] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:46.247] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:46.247] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:46.247] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:46.247] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:46.247] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:46.247] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:46.247] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:46.247] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:46.247] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:46.247] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:46.247] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:46.247] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:46.247] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:46.247] >> Device mode 640 x 480 (format 23) confirmed
- [23:45:46.247] >> Device mode 720 x 480 (format 23) confirmed
- [23:45:46.247] >> Device mode 720 x 576 (format 23) confirmed
- [23:45:46.247] >> Device mode 800 x 600 (format 23) confirmed
- [23:45:46.247] >> Device mode 1024 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1152 x 864 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 720 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 800 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 960 (format 23) confirmed
- [23:45:46.247] >> Device mode 1280 x 1024 (format 23) confirmed
- [23:45:46.247] >> Device mode 1360 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1366 x 768 (format 23) confirmed
- [23:45:46.247] >> Device mode 1440 x 480 (format 23) confirmed
- [23:45:46.247] >> Device mode 1440 x 900 (format 23) confirmed
- [23:45:46.247] >> Device mode 1600 x 900 (format 23) confirmed
- [23:45:46.247] >> Device mode 1600 x 1024 (format 23) confirmed
- [23:45:46.247] >> Device mode 1680 x 1050 (format 23) confirmed
- [23:45:46.247] >> Device mode 1920 x 1080 (format 23) confirmed
- [23:45:46.247] >> Device mode 640 x 480 (format 22) confirmed
- [23:45:46.247] >> Device mode 720 x 480 (format 22) confirmed
- [23:45:46.247] >> Device mode 720 x 576 (format 22) confirmed
- [23:45:46.247] >> Device mode 800 x 600 (format 22) confirmed
- [23:45:46.247] >> Device mode 1024 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1152 x 864 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 720 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 800 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 960 (format 22) confirmed
- [23:45:46.247] >> Device mode 1280 x 1024 (format 22) confirmed
- [23:45:46.247] >> Device mode 1360 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1366 x 768 (format 22) confirmed
- [23:45:46.247] >> Device mode 1440 x 480 (format 22) confirmed
- [23:45:46.247] >> Device mode 1440 x 900 (format 22) confirmed
- [23:45:46.247] >> Device mode 1600 x 900 (format 22) confirmed
- [23:45:46.247] >> Device mode 1600 x 1024 (format 22) confirmed
- [23:45:46.247] >> Device mode 1680 x 1050 (format 22) confirmed
- [23:45:46.247] >> Device mode 1920 x 1080 (format 22) confirmed
- [23:45:46.247] >>
- Win95_Startup : 1920 x 1080
- [23:45:46.247] >>
- win95_initialiseD3D : 1920 x 1080
- [23:45:46.247] >> Initialize3DEnvironment(1920 x 1080 TNL:1)
- [23:45:46.247] >> Initialize3DEnvironment() - Requested width x height x format found in mode list
- [23:45:46.247] >> Puredevice set
- [23:45:46.247] Debug event: LOAD_DLL_DEBUG_EVENT
- [23:45:46.247] Thread ID = 0x00002348
- [23:45:46.247] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x5d8e0000
- size 14103608
- [23:45:46.252] Debug event: CREATE_THREAD_DEBUG_EVENT
- [23:45:46.252] Thread ID = 0x000022cc
- [23:45:46.252] Thread handle = 0x00000470
- Start address = 0x5d8e9d10
- Thread local base = 0x7fe9d000
- [23:45:46.272] >> D3DDevice created =
- [23:45:46.272] >> HAL (hw vp): NVIDIA GeForce GTX 970
- [23:45:46.272] >>
- [23:45:46.272] >>
- GP_win95 :: Running gfx at 32/24 bit
- [23:45:46.272] >> win95_startup() - Initialize3DEnvironment ok
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x0054cf4f
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to write to virtual address 0x00b4a000
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.272] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.272] Thread ID = 0x00002348
- [23:45:46.272] First chance exception
- [23:45:46.272] Exception address: 0x77d5d8d1
- [23:45:46.272] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.272] Exception flags: 0x00000000
- [23:45:46.272] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.272] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.277] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.277] Thread ID = 0x00002348
- [23:45:46.277] First chance exception
- [23:45:46.277] Exception address: 0x77d5d8d1
- [23:45:46.277] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.277] Exception flags: 0x00000000
- [23:45:46.277] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.277] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.282] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.282] Thread ID = 0x00002348
- [23:45:46.282] First chance exception
- [23:45:46.282] Exception address: 0x77d5d8d1
- [23:45:46.282] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.282] Exception flags: 0x00000000
- [23:45:46.282] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.282] Process tried to read from virtual address 0x5807008b
- [23:45:46.287] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.287] Thread ID = 0x00002348
- [23:45:46.287] First chance exception
- [23:45:46.287] Exception address: 0x77d5d8d1
- [23:45:46.287] Module name: '' (base 0x77d20000, size 1532984)
- [23:45:46.287] Exception flags: 0x00000000
- [23:45:46.287] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.287] Process tried to read from virtual address 0x5807008b
- [23:45:46.287] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.287] Thread ID = 0x000011d0
- [23:45:46.287] First chance exception
- [23:45:46.287] Exception address: 0x00509fbd
- [23:45:46.287] Exception flags: 0x00000000
- [23:45:46.287] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.287] Process tried to read from virtual address 0x58070083
- [23:45:46.287] Debug event: EXCEPTION_DEBUG_EVENT
- [23:45:46.287] Thread ID = 0x000011d0
- [23:45:46.287] Unhandled exception
- [23:45:46.287] Exception address: 0x00509fbd
- [23:45:46.287] Exception flags: 0x00000000
- [23:45:46.287] Exception code: EXCEPTION_ACCESS_VIOLATION
- [23:45:46.287] Process tried to read from virtual address 0x58070083
- [23:45:46.287] Stack trace:
- 00509FBD: GP4\Grand Prix 4\GPxPatch.exe! <no symbol>
- 75AA3744: Windows\SYSTEM32\KERNEL32.DLL! BaseThreadInitThunk + 36 bytes
- 77D79CD4: Windows\SYSTEM32\ntdll.dll! RtlSetCurrentTransaction + 212 bytes
- 77D79C9F: Windows\SYSTEM32\ntdll.dll! RtlSetCurrentTransaction + 159 bytes
- [23:45:46.400] Registers:
- EAX=58070083 ECX=58070083 ESI=74CC7640
- EBX=0050A190 EDX=00000000 EDI=00000010
- CS:EIP=0023:00509FBD
- SS:ESP=002B:0489FE90 EBP=0489FF80
- DS=002B ES=002B FS=0053 GS=002B
- Flags=00010202
- Stack dump:
- 0489fe90: 0054e75d 00000010 74cc7640 0489ff80 '].T.....@v.t....'
- 0489fea0: 0489feb4 0050a190 00000000 0050a190 '......P.......P.'
- 0489feb0: 00000000 0050a195 74cb3506 00000010 '......P..5.t....'
- 0489fec0: 00000000 00320b20 00000000 00000000 '.... .2.........'
- 0489fed0: 74cb3400 74cb3400 00000000 00000000 '.4.t.4.t........'
- 0489fee0: 00320b20 00000000 fffe091a ffffffff ' .2.............'
- 0489fef0: 00000002 00000000 00000010 00000021 '............!...'
- 0489ff00: 00000000 00000000 00000000 00000000 '................'
- 0489ff10: 00000000 00000000 00000000 00000000 '................'
- 0489ff20: 00000000 00000000 00000000 00000000 '................'
- 0489ff30: 00000000 00000000 00000278 00000284 '........x.......'
- 0489ff40: 000002c0 00000000 00000000 00000000 '................'
- 0489ff50: 00000000 00000000 00000000 00000000 '................'
- 0489ff60: 00000000 00000000 00000000 00000000 '................'
- 0489ff70: 00000000 00000000 00000000 5fe3c595 '..............._'
- 0489ff80: 0489ff94 75aa3744 00000000 75aa3720 '....D7.u.... 7.u'
- 0489ff90: 5e8ab71e 0489ffdc 77d79cd4 00000000 '...^.......w....'
- 0489ffa0: 5cdc70dd 00000000 00000000 00000000 '.p.\............'
- 0489ffb0: c0000005 75098cd0 00000000 0489f8a4 '.......u........'
- 0489ffc0: 5cdc70dd 0489ffa0 0489f8a4 0489ffe4 '.p.\............'
- 0489ffd0: 77d90a50 2fb49411 00000000 0489ffec 'P..w.../........'
- 0489ffe0: 77d79c9f ffffffff 77d9d4b9 00000000 '...w.......w....'
- 0489fff0: 00000000 74cb3400 00000000 00000000 '.....4.t........'
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x000011d0
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x000022cc
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x000003f0
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x000016a4
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x000021e4
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x000021a0
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x000013f0
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x00000da4
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_THREAD_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x00000700
- [23:45:47.694] Thread exit code = -1073741819
- [23:45:47.694] Debug event: EXIT_PROCESS_DEBUG_EVENT
- [23:45:47.694] Thread ID = 0x00002348
- [23:45:47.694] Process exit code = -1073741819
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement