Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- GP4
- Starting log
- GPxPatch version: 3.93
- GPx version detected: decrypted GP4 v1.02
- Verbosity level is 2
- OS version info: Windows XP Service Pack 3 build 2600
- Total physical memory: 1023 MB (free: 1005 MB)
- Debugging GP4.exe
- Process created:
- Process ID = 0x000023b0
- Process handle = 0x00000128
- Main thread ID = 0x0000176c
- Main thread handle = 0x00000118
- Process will run on CPU 0 only
- Waiting for debug events...
- Debug event: CREATE_PROCESS_DEBUG_EVENT
- Thread ID = 0x0000176c
- Entry point = 0x005ddec6
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path ntdll.dll
- base 0x76f50000
- size 1314112
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x76b50000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x767b0000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x76b50000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x76c70000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\kernel32.dll
- base 0x767b0000
- size 1114112
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\KERNELBASE.dll
- base 0x76760000
- size 275456
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\d3d8.dll
- base 0x65480000
- size 1036800
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\msvcrt.dll
- base 0x75180000
- size 690688
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\USER32.dll
- base 0x75020000
- size 833024
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\GDI32.dll
- base 0x75500000
- size 312832
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\LPK.dll
- base 0x76750000
- size 25600
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\USP10.dll
- base 0x75240000
- size 627712
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\ADVAPI32.dll
- base 0x749f0000
- size 644096
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\sechost.dll
- base 0x74900000
- size 92160
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\RPCRT4.dll
- base 0x768c0000
- size 666112
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\SspiCli.dll
- base 0x748a0000
- size 96768
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path
- base 0x74890000
- size 36352
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\VERSION.dll
- base 0x74630000
- size 21504
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\d3d8thk.dll
- base 0x6aae0000
- size 11264
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dwmapi.dll
- base 0x70d00000
- size 67584
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dinput8.dll
- base 0x693d0000
- size 145408
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\winspool.drv
- base 0x745d0000
- size 320000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\ole32.dll
- base 0x74e10000
- size 1414144
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\winmm.dll
- base 0x72d10000
- size 194048
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dsound.dll
- base 0x65df0000
- size 453632
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\POWRPROF.dll
- base 0x69740000
- size 145408
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\SETUPAPI.dll
- base 0x765a0000
- size 1667584
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\CFGMGR32.dll
- base 0x769d0000
- size 145920
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\OLEAUT32.dll
- base 0x74960000
- size 572416
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\DEVOBJ.dll
- base 0x769b0000
- size 64512
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path
- base 0x30000000
- size 357939
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\wsock32.dll
- base 0x717e0000
- size 15360
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\WS2_32.dll
- base 0x74920000
- size 206336
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\NSI.dll
- base 0x76f20000
- size 8704
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x76ff0e14
- Module name: 'ntdll.dll' (base 0x76f50000, size 1314112)
- Exception flags: 0x00000000
- Exception code: EXCEPTION_BREAKPOINT
- Setting breakpoint on entry point (0x005ddec6)
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\apphelp.dll
- base 0x6ba40000
- size 295936
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\AppPatch\AcGenral.DLL
- base 0x64360000
- size 2178560
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\SHLWAPI.dll
- base 0x74f70000
- size 350208
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\UxTheme.dll
- base 0x70d20000
- size 245760
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\samcli.dll
- base 0x6eef0000
- size 51200
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\MSACM32.dll
- base 0x70da0000
- size 72192
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\SHELL32.dll
- base 0x75870000
- size 12881408
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\sfc.dll
- base 0x733e0000
- size 2560
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\sfc_os.DLL
- base 0x733f0000
- size 40960
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\USERENV.dll
- base 0x74d10000
- size 81920
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\profapi.dll
- base 0x74aa0000
- size 31744
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\urlmon.dll
- base 0x76a00000
- size 1312256
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\api-ms-win-downlevel-ole32-l1-1-0.dll
- base 0x75450000
- size 5632
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\api-ms-win-downlevel-shlwapi-l1-1-0.dll
- base 0x75230000
- size 9728
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\api-ms-win-downlevel-advapi32-l1-1-0.dll
- base 0x74d30000
- size 10752
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\api-ms-win-downlevel-user32-l1-1-0.dll
- base 0x76740000
- size 4096
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\api-ms-win-downlevel-version-l1-1-0.dll
- base 0x74af0000
- size 3072
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path
- base 0x754f0000
- size 2560
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\normaliz.DLL
- base 0x74ae0000
- size 2048
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\iertutil.dll
- base 0x75590000
- size 2285568
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\WININET.dll
- base 0x74b00000
- size 2121216
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\MPR.dll
- base 0x73210000
- size 64000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\AppPatch\AcLayers.dll
- base 0x692e0000
- size 562176
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\AppPatch\AcXtrnal.DLL
- base 0x5a730000
- size 211968
- >> FTH: (9136): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path
- base 0x01220000
- size 6275072
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x01220000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\SHUNIMPL.DLL
- base 0x733d0000
- size 10752
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\SortServer2003Compat.dll
- base 0x69f90000
- size 38400
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\IMM32.DLL
- base 0x75120000
- size 119808
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\MSCTF.dll
- base 0x74d40000
- size 828928
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path
- base 0x00b60000
- size 44544
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x00b60000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x005ddec6
- Exception flags: 0x00000000
- Exception code: EXCEPTION_BREAKPOINT
- Removing breakpoint on entry point
- Injecting DLL loading code...
- Copying code to target at address 0x00b60000...
- Injection succesful
- Setting instruction pointer to injected code (0x00b60000)
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
- base 0x09a00000
- size 23552
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\GPxPSup.dll
- base 0x09900000
- size 31744
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- >> D3D Constructor!
- >> Starting WinMain
- >> WM_ACTIVATE (active)(not minimized)
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\ole32.dll
- base 0x02d30000
- size 1414144
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x02d30000
- >> Game thread into win95_startup(0)
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00000c54
- Thread handle = 0x00000248
- Start address = 0x72d1a3e0
- Thread local base = 0x7efda000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\CLBCatQ.DLL
- base 0x75460000
- size 522240
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dplayx.dll
- base 0x674d0000
- size 213504
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x000021b4
- Thread handle = 0x00000254
- Start address = 0x674f9682
- Thread local base = 0x7efd7000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dpmodemx.dll
- base 0x733a0000
- size 23040
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\TAPI32.dll
- base 0x67490000
- size 192000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
- base 0x6b130000
- size 1680896
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x733a0000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x67490000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dpmodemx.dll
- base 0x697d0000
- size 23040
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\TAPI32.dll
- base 0x67340000
- size 192000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\rtutils.dll
- base 0x697c0000
- size 37376
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001604
- Thread handle = 0x00000270
- Start address = 0x76fa1697
- Thread local base = 0x7efaf000
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x000018d4
- Thread handle = 0x00000274
- Start address = 0x6734f1ac
- Thread local base = 0x7efac000
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x000018d4
- Thread exit code = 0
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x697d0000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x67340000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dpwsockx.dll
- base 0x733a0000
- size 44032
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\mswsock.dll
- base 0x71770000
- size 231424
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\wshtcpip.dll
- base 0x71760000
- size 9216
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dpnathlp.dll
- base 0x67660000
- size 57344
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\CRYPTSP.dll
- base 0x72d50000
- size 81408
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\rsaenh.dll
- base 0x71840000
- size 242936
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\iphlpapi.dll
- base 0x71420000
- size 103936
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\WINNSI.DLL
- base 0x71410000
- size 16896
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\rasapi32.dll
- base 0x71220000
- size 325120
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\rasman.dll
- base 0x71200000
- size 76800
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\dhcpcsvc.DLL
- base 0x6aab0000
- size 61952
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001ef8
- Thread handle = 0x000002a0
- Start address = 0x733a4819
- Thread local base = 0x7efac000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x71220000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x71200000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x67660000
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001ef8
- Thread exit code = 0
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x71760000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x733a0000
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x000021b4
- Thread exit code = 0
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\NLAapi.dll
- base 0x69f80000
- size 52224
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\napinsp.dll
- base 0x697e0000
- size 52224
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\pnrpnsp.dll
- base 0x68ea0000
- size 65024
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Program Files (x86)\Bonjour\mdnsNSP.dll
- base 0x6dd80000
- size 121704
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\DNSAPI.dll
- base 0x6dd30000
- size 270336
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\winrnr.dll
- base 0x69250000
- size 20992
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
- base 0x6dd00000
- size 145648
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\PSAPI.DLL
- base 0x75440000
- size 6144
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\fwpuclnt.dll
- base 0x6bdd0000
- size 216576
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\rasadhlp.dll
- base 0x6dcf0000
- size 11776
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x69f80000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x697e0000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x68ea0000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x6dd80000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x69250000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x6dd00000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x75440000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x6bdd0000
- >> MMX Enabled
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x57460000
- size 14497712
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\PSAPI.DLL
- base 0x75440000
- size 6144
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001730
- Thread handle = 0x000002cc
- Start address = 0x57469030
- Thread local base = 0x7efd7000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPI.dll
- base 0x65c40000
- size 1220424
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001730
- Thread exit code = 0
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x57460000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\mscat32.dll
- base 0x733a0000
- size 10240
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\WINTRUST.dll
- base 0x75410000
- size 179200
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\CRYPT32.dll
- base 0x752e0000
- size 1174528
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path
- base 0x757d0000
- size 34304
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00000778
- Thread handle = 0x000002e0
- Start address = 0x753182cd
- Thread local base = 0x7efd7000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\bcrypt.dll
- base 0x6ccf0000
- size 80896
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\bcryptprimitives.dll
- base 0x6ccb0000
- size 251000
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001984
- Thread handle = 0x000002ec
- Start address = 0x76fa7ad8
- Thread local base = 0x7efac000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\ncrypt.dll
- base 0x6cd10000
- size 223232
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\GPAPI.dll
- base 0x6aa80000
- size 79360
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001aa8
- Thread handle = 0x000002f8
- Start address = 0x76fa7ad8
- Thread local base = 0x7efa9000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\cryptnet.dll
- base 0x67660000
- size 103936
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\WLDAP32.dll
- base 0x74fd0000
- size 269824
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\SensApi.dll
- base 0x697d0000
- size 10752
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x733a0000
- >> nvd3dum.dll>>
- >> NVIDIA GeForce GTS 250>>
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\mscat32.dll
- base 0x69730000
- size 10240
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x69730000
- >> Device mode 640 x 480 (format 22) confirmed
- >> Device mode 720 x 480 (format 22) confirmed
- >> Device mode 720 x 576 (format 22) confirmed
- >> Device mode 800 x 600 (format 22) confirmed
- >> Device mode 1024 x 768 (format 22) confirmed
- >> Device mode 1152 x 864 (format 22) confirmed
- >> Device mode 1280 x 720 (format 22) confirmed
- >> Device mode 1280 x 768 (format 22) confirmed
- >> Device mode 1280 x 800 (format 22) confirmed
- >> Device mode 1280 x 960 (format 22) confirmed
- >> Device mode 1280 x 1024 (format 22) confirmed
- >> Device mode 1360 x 768 (format 22) confirmed
- >> Device mode 1366 x 768 (format 22) confirmed
- >> Device mode 1600 x 900 (format 22) confirmed
- >> Device mode 1600 x 1024 (format 22) confirmed
- >> Device mode 1680 x 1050 (format 22) confirmed
- >> Device mode 1920 x 1080 (format 22) confirmed
- >> Device mode 640 x 480 (format 23) confirmed
- >> Device mode 720 x 480 (format 23) confirmed
- >> Device mode 720 x 576 (format 23) confirmed
- >> Device mode 800 x 600 (format 23) confirmed
- >> Device mode 1024 x 768 (format 23) confirmed
- >> Device mode 1152 x 864 (format 23) confirmed
- >> Device mode 1280 x 720 (format 23) confirmed
- >> Device mode 1280 x 768 (format 23) confirmed
- >> Device mode 1280 x 800 (format 23) confirmed
- >> Device mode 1280 x 960 (format 23) confirmed
- >> Device mode 1280 x 1024 (format 23) confirmed
- >> Device mode 1360 x 768 (format 23) confirmed
- >> Device mode 1366 x 768 (format 23) confirmed
- >> Device mode 1600 x 900 (format 23) confirmed
- >> Device mode 1600 x 1024 (format 23) confirmed
- >> Device mode 1680 x 1050 (format 23) confirmed
- >> Device mode 1920 x 1080 (format 23) confirmed
- >> Device mode 640 x 480 (format 22) confirmed
- >> Device mode 720 x 480 (format 22) confirmed
- >> Device mode 720 x 576 (format 22) confirmed
- >> Device mode 800 x 600 (format 22) confirmed
- >> Device mode 1024 x 768 (format 22) confirmed
- >> Device mode 1152 x 864 (format 22) confirmed
- >> Device mode 1280 x 720 (format 22) confirmed
- >> Device mode 1280 x 768 (format 22) confirmed
- >> Device mode 1280 x 800 (format 22) confirmed
- >> Device mode 1280 x 960 (format 22) confirmed
- >> Device mode 1280 x 1024 (format 22) confirmed
- >> Device mode 1360 x 768 (format 22) confirmed
- >> Device mode 1366 x 768 (format 22) confirmed
- >> Device mode 1600 x 900 (format 22) confirmed
- >> Device mode 1600 x 1024 (format 22) confirmed
- >> Device mode 1680 x 1050 (format 22) confirmed
- >> Device mode 1920 x 1080 (format 22) confirmed
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x57460000
- size 14497712
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001520
- Thread handle = 0x00000310
- Start address = 0x57469030
- Thread local base = 0x7efa6000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\nvapi.dll
- base 0x59b20000
- size 2822568
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\gdi32.dll
- base 0x03600000
- size 312832
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x03600000
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001520
- Thread exit code = 0
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\gdi32.dll
- base 0x03600000
- size 312832
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x03600000
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x57460000
- >> Device mode 640 x 480 (format 23) confirmed
- >> Device mode 720 x 480 (format 23) confirmed
- >> Device mode 720 x 576 (format 23) confirmed
- >> Device mode 800 x 600 (format 23) confirmed
- >> Device mode 1024 x 768 (format 23) confirmed
- >> Device mode 1152 x 864 (format 23) confirmed
- >> Device mode 1280 x 720 (format 23) confirmed
- >> Device mode 1280 x 768 (format 23) confirmed
- >> Device mode 1280 x 800 (format 23) confirmed
- >> Device mode 1280 x 960 (format 23) confirmed
- >> Device mode 1280 x 1024 (format 23) confirmed
- >> Device mode 1360 x 768 (format 23) confirmed
- >> Device mode 1366 x 768 (format 23) confirmed
- >> Device mode 1600 x 900 (format 23) confirmed
- >> Device mode 1600 x 1024 (format 23) confirmed
- >> Device mode 1680 x 1050 (format 23) confirmed
- >> Device mode 1920 x 1080 (format 23) confirmed
- >> Device mode 640 x 480 (format 22) confirmed
- >> Device mode 720 x 480 (format 22) confirmed
- >> Device mode 720 x 576 (format 22) confirmed
- >> Device mode 800 x 600 (format 22) confirmed
- >> Device mode 1024 x 768 (format 22) confirmed
- >> Device mode 1152 x 864 (format 22) confirmed
- >> Device mode 1280 x 720 (format 22) confirmed
- >> Device mode 1280 x 768 (format 22) confirmed
- >> Device mode 1280 x 800 (format 22) confirmed
- >> Device mode 1280 x 960 (format 22) confirmed
- >> Device mode 1280 x 1024 (format 22) confirmed
- >> Device mode 1360 x 768 (format 22) confirmed
- >> Device mode 1366 x 768 (format 22) confirmed
- >> Device mode 1600 x 900 (format 22) confirmed
- >> Device mode 1600 x 1024 (format 22) confirmed
- >> Device mode 1680 x 1050 (format 22) confirmed
- >> Device mode 1920 x 1080 (format 22) confirmed
- >> Device mode 640 x 480 (format 23) confirmed
- >> Device mode 720 x 480 (format 23) confirmed
- >> Device mode 720 x 576 (format 23) confirmed
- >> Device mode 800 x 600 (format 23) confirmed
- >> Device mode 1024 x 768 (format 23) confirmed
- >> Device mode 1152 x 864 (format 23) confirmed
- >> Device mode 1280 x 720 (format 23) confirmed
- >> Device mode 1280 x 768 (format 23) confirmed
- >> Device mode 1280 x 800 (format 23) confirmed
- >> Device mode 1280 x 960 (format 23) confirmed
- >> Device mode 1280 x 1024 (format 23) confirmed
- >> Device mode 1360 x 768 (format 23) confirmed
- >> Device mode 1366 x 768 (format 23) confirmed
- >> Device mode 1600 x 900 (format 23) confirmed
- >> Device mode 1600 x 1024 (format 23) confirmed
- >> Device mode 1680 x 1050 (format 23) confirmed
- >> Device mode 1920 x 1080 (format 23) confirmed
- >> Device mode 640 x 480 (format 22) confirmed
- >> Device mode 720 x 480 (format 22) confirmed
- >> Device mode 720 x 576 (format 22) confirmed
- >> Device mode 800 x 600 (format 22) confirmed
- >> Device mode 1024 x 768 (format 22) confirmed
- >> Device mode 1152 x 864 (format 22) confirmed
- >> Device mode 1280 x 720 (format 22) confirmed
- >> Device mode 1280 x 768 (format 22) confirmed
- >> Device mode 1280 x 800 (format 22) confirmed
- >> Device mode 1280 x 960 (format 22) confirmed
- >> Device mode 1280 x 1024 (format 22) confirmed
- >> Device mode 1360 x 768 (format 22) confirmed
- >> Device mode 1366 x 768 (format 22) confirmed
- >> Device mode 1600 x 900 (format 22) confirmed
- >> Device mode 1600 x 1024 (format 22) confirmed
- >> Device mode 1680 x 1050 (format 22) confirmed
- >> Device mode 1920 x 1080 (format 22) confirmed
- >>
- Win95_Startup : 1920 x 1080
- >>
- win95_initialiseD3D : 1920 x 1080
- >> Initialize3DEnvironment(1920 x 1080 TNL:1)
- >> Initialize3DEnvironment() - Requested width x height x format found in mode list
- >> Puredevice set
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x57460000
- size 14497712
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001e70
- Thread handle = 0x00000320
- Start address = 0x57469030
- Thread local base = 0x7efa6000
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001e70
- Thread exit code = 0
- >> D3DDevice created = >> HAL (hw vp): NVIDIA GeForce GTS 250>>
- >>
- GP_win95 :: Running gfx at 32/24 bit
- >> win95_startup() - Initialize3DEnvironment ok
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\HID.DLL
- base 0x73500000
- size 22016
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\pid.dll
- base 0x733a0000
- size 36352
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001cfc
- Thread handle = 0x00000328
- Start address = 0x733a787a
- Thread local base = 0x7efa6000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWow64\WmJoyF32.dll
- base 0x10000000
- size 255496
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\DINPUT.dll
- base 0x674a0000
- size 136704
- >> Supported FF Effects for this stick...
- >> GUID_ConstantForce>>
- >> GUID_RampForce>>
- >> GUID_Square>>
- >> GUID_Sine>>
- >> GUID_Triangle>>
- >> GUID_SawtoothUp>>
- >> GUID_SawtoothDown>>
- >> GUID_Spring>>
- >> GUID_Damper>>
- >> GUID_Inertia>>
- >> GUID_Friction>>
- >> GUID_CustomForce>>
- >> End of list
- >> Device supports Saturation
- >> Device doesn't support Pos/Neg Coefficients
- >> Device doesn't support Pos Neg Saturation
- >> Device supports deadband
- >> Using Constant force
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001eb0
- Thread handle = 0x00000334
- Start address = 0x100088f0
- Thread local base = 0x7efa3000
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x000010c4
- Thread handle = 0x00000338
- Start address = 0x693d91f0
- Thread local base = 0x7efa0000
- >> Device supports Saturation
- >> Device supports Pos Neg Coeffieicents
- >> Device doesn't support Pos Neg Saturation
- >> Device supports deadband
- >> Using Constant force
- >> Game thread finishing win95 startup(0)
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxset.gxm
- base 0x0a000000
- size 20480
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxlap.gxm
- base 0x09b00000
- size 39424
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxtrack.gxm
- base 0x09d00000
- size 12288
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxcinfo.gxm
- base 0x09e00000
- size 37376
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsat.gxm
- base 0x09c00000
- size 50688
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsound.gxm
- base 0x09f00000
- size 15360
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\syswow64\imagehlp.dll
- base 0x74ab0000
- size 159232
- Debug event: UNLOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- base 0x74ab0000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Infogrames\Grand Prix 4\gp4tweak.dll
- base 0x40000000
- size 70656
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\MMDevApi.dll
- base 0x69ee0000
- size 213504
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x0000176c
- path C:\Windows\SysWOW64\PROPSYS.dll
- base 0x6b030000
- size 988160
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x000017a8
- Thread handle = 0x00000378
- Start address = 0x69ee27e1
- Thread local base = 0x7ef9d000
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00002278
- Thread handle = 0x0000037c
- Start address = 0x76fa7ad8
- Thread local base = 0x7ef9a000
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x000017a8
- Thread exit code = 0
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00000860
- Thread handle = 0x00000378
- Start address = 0x65e1e4a1
- Thread local base = 0x7ef9d000
- Debug event: LOAD_DLL_DEBUG_EVENT
- Thread ID = 0x00000860
- path C:\Windows\SysWOW64\AUDIOSES.DLL
- base 0x69e30000
- size 195584
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00002250
- Thread handle = 0x00000384
- Start address = 0x69ee27e1
- Thread local base = 0x7ef97000
- Debug event: CREATE_THREAD_DEBUG_EVENT
- Thread ID = 0x00001e38
- Thread handle = 0x00000388
- Start address = 0x65e1e4a1
- Thread local base = 0x7ef94000
- >> Bink init completed
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x0054d09c
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to write to virtual address 0x00b4a000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x00000c54
- First chance exception
- Exception address: 0x61efb610
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x61efb610
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x00000c54
- Unhandled exception
- Exception address: 0x61efb610
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x61efb610
- Stack trace:
- 61EFB610: <no module><no symbol>
- 00509FC2: <no module><no symbol>
- 72D1A535: Windows\system32\WINMM.dll! timeEndPeriod + 1354 bytes
- 72D1A434: Windows\system32\WINMM.dll! timeEndPeriod + 1097 bytes
- 767C338A: Windows\syswow64\kernel32.dll! BaseThreadInitThunk + 18 bytes
- 76F89902: Windows\SysWOW64\ntdll.dll! RtlInitializeExceptionChain + 99 bytes
- 76F898D5: Windows\SysWOW64\ntdll.dll! RtlInitializeExceptionChain + 54 bytes
- Registers:
- EAX=00400060 ECX=58070083 ESI=00000010
- EBX=00000000 EDX=00000000 EDI=0050A190
- CS:EIP=0023:61EFB610
- SS:ESP=002B:032FFE68 EBP=032FFEB8
- DS=002B ES=002B FS=0053 GS=002B
- Flags=00010202
- Stack dump:
- 032ffe68: 00509fc2 0054e75d 0050a190 00000010 '..P.].T...P.....'
- 032ffe78: 032ffeb8 032ffe90 00000000 00000000 '../.../.........'
- 032ffe88: 74642e09 00000000 0050a195 72d13af0 '..dt......P..:.r'
- 032ffe98: 00000010 00000000 003505d0 00000000 '..........5.....'
- 032ffea8: 00000000 003505d0 72d390e0 0050a190 '......5....r..P.'
- 032ffeb8: 032ffef0 72d1a535 0050a190 00000003 '../.5..r..P.....'
- 032ffec8: 00000010 00000000 003505d0 00000000 '..........5.....'
- 032ffed8: 00000000 00000000 00000000 00000000 '................'
- 032ffee8: 00000000 00000000 032fff88 72d1a434 '........../.4..r'
- 032ffef8: 00000010 00000000 00000010 00000021 '............!...'
- 032fff08: 00000000 00000000 00000000 00000000 '................'
- 032fff18: 00000000 00000000 00000000 00000000 '................'
- 032fff28: 00000000 00000000 00000000 00000000 '................'
- 032fff38: 00000000 00000000 00000144 00000150 '........D...P...'
- 032fff48: 00000180 00000000 00000000 00000000 '................'
- 032fff58: 00000000 00000000 00000000 00000000 '................'
- 032fff68: 00000000 00000000 00000000 00000000 '................'
- 032fff78: 00000000 00000000 00000000 00000002 '................'
- 032fff88: 032fff94 767c338a 00000000 032fffd4 '../..3|v....../.'
- 032fff98: 76f89902 00000000 741f9ece 00000000 '...v.......t....'
- 032fffa8: 00000000 00000000 c0000005 767e773f '............?w~v'
- 032fffb8: 767e773f 032fffa0 032ffa30 ffffffff '?w~v../.0./.....'
- 032fffc8: 76fc5845 01c7a73a 00000000 032fffec 'EX.v:........./.'
- 032fffd8: 76f898d5 72d1a3e0 00000000 00000000 '...v...r........'
- 032fffe8: 00000000 00000000 00000000 72d1a3e0 '...............r'
- 032ffff8: 00000000 00000000 '........'
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXCEPTION_DEBUG_EVENT
- Thread ID = 0x0000176c
- First chance exception
- Exception address: 0x00000000
- Exception flags: 0x00000000
- Exception code: EXCEPTION_ACCESS_VIOLATION
- Process tried to read from virtual address 0x00000000
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00000c54
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00000860
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001e38
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x000010c4
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001eb0
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x0000176c
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00002250
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00002278
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001cfc
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001aa8
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00001984
- Thread exit code = -1073741819
- Debug event: EXIT_THREAD_DEBUG_EVENT
- Thread ID = 0x00000778
- Thread exit code = -1073741819
- Debug event: EXIT_PROCESS_DEBUG_EVENT
- Thread ID = 0x00001604
- Process exit code = -1073741819
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement