[17:22:01.600] base 0x603e0000
[17:22:01.600] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:01.600] Thread ID = 0x000017b8
[17:22:01.600] base 0x71eb0000
[17:22:01.600] >> MMX Enabled
[17:22:01.600] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:01.600] Thread ID = 0x000017b8
[17:22:01.600] path C:\Windows\SysWOW64\aticfx32.dll
base 0x630c0000
size 1193904
[17:22:01.600] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:01.600] Thread ID = 0x000017b8
[17:22:01.600] path C:\Windows\SysWOW64\atiu9pag.dll
base 0x67330000
size 102616
[17:22:01.600] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:01.600] Thread ID = 0x000017b8
[17:22:01.600] base 0x67330000
[17:22:01.600] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:01.600] Thread ID = 0x000017b8
[17:22:01.600] path C:\Windows\SysWOW64\atiu9pag.dll
base 0x67330000
size 102616
[17:22:01.616] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:01.616] Thread ID = 0x000017b8
[17:22:01.616] path C:\Windows\SysWOW64\atiumdag.dll
base 0x629b0000
size 7408936
[17:22:01.616] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:01.616] Thread ID = 0x000017b8
[17:22:01.616] path C:\Windows\SysWOW64\atiumdva.dll
base 0x62210000
size 7929616
[17:22:01.647] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:01.647] Thread ID = 0x0000159c
[17:22:01.647] Thread handle = 0x00000010
Start address = 0x77844a00
Thread local base = 0x7feaf000
[17:22:01.663] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:01.663] Thread ID = 0x00000ec8
[17:22:01.663] Thread handle = 0x00000374
Start address = 0x77844a00
Thread local base = 0x7feac000
[17:22:01.663] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:01.663] Thread ID = 0x00000bd8
[17:22:01.663] Thread handle = 0x00000378
Start address = 0x77844a00
Thread local base = 0x7fea9000
[17:22:02.038] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] base 0x62210000
[17:22:02.038] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] base 0x629b0000
[17:22:02.038] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] base 0x67330000
[17:22:02.038] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] base 0x630c0000
[17:22:02.038] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] path C:\Windows\SysWOW64\mscat32.dll
base 0x5bec0000
size 11776
[17:22:02.038] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] path C:\Windows\SysWOW64\WINTRUST.dll
base 0x755c0000
size 245296
[17:22:02.038] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] path C:\Windows\SysWOW64\CRYPT32.dll
base 0x77270000
size 1612992
[17:22:02.038] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.038] Thread ID = 0x000017b8
[17:22:02.038] path C:\Windows\SysWOW64\MSASN1.dll
base 0x75520000
size 51608
[17:22:02.272] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:02.272] Thread ID = 0x000000c0
[17:22:02.272] Thread handle = 0x0000037c
Start address = 0x772762d0
Thread local base = 0x7fea6000
[17:22:02.507] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.507] Thread ID = 0x000017b8
[17:22:02.507] path C:\Windows\SysWOW64\ncrypt.dll
base 0x71e10000
size 120376
[17:22:02.507] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.507] Thread ID = 0x000017b8
[17:22:02.507] path C:\Windows\SysWOW64\NTASN1.dll
base 0x71de0000
size 165728
[17:22:02.538] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.538] Thread ID = 0x000017b8
[17:22:02.538] path C:\Windows\SysWOW64\gpapi.dll
base 0x71e30000
size 115672
[17:22:02.553] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.553] Thread ID = 0x000017b8
[17:22:02.553] path C:\Windows\SysWOW64\cryptnet.dll
base 0x72240000
size 137728
[17:22:02.553] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.553] Thread ID = 0x000017b8
[17:22:02.553] path C:\Windows\SysWOW64\WLDAP32.dll
base 0x75d80000
size 325632
[17:22:02.569] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:02.569] Thread ID = 0x000017f4
[17:22:02.569] Thread handle = 0x000003a8
Start address = 0x77844a00
Thread local base = 0x7fea3000
[17:22:02.569] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:02.569] Thread ID = 0x00001548
[17:22:02.569] Thread handle = 0x000003ac
Start address = 0x77844a00
Thread local base = 0x7fea0000
[17:22:02.632] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.632] Thread ID = 0x000017b8
[17:22:02.632] base 0x5bec0000
[17:22:02.632] >> aticfx32.dll
[17:22:02.632] >>
[17:22:02.632] >> AMD Radeon HD 8610G
[17:22:02.632] >>
[17:22:02.632] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.632] Thread ID = 0x000017b8
[17:22:02.632] path C:\Windows\SysWOW64\mscat32.dll
base 0x5bec0000
size 11776
[17:22:02.710] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.710] Thread ID = 0x000017b8
[17:22:02.710] base 0x5bec0000
[17:22:02.725] >> Device mode 640 x 480 (format 22) confirmed
[17:22:02.725] >> Device mode 800 x 480 (format 22) confirmed
[17:22:02.725] >> Device mode 800 x 600 (format 22) confirmed
[17:22:02.725] >> Device mode 1024 x 600 (format 22) confirmed
[17:22:02.725] >> Device mode 1024 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1280 x 720 (format 22) confirmed
[17:22:02.725] >> Device mode 1280 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1280 x 1024 (format 22) confirmed
[17:22:02.725] >> Device mode 1360 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1366 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1400 x 1050 (format 22) confirmed
[17:22:02.725] >> Device mode 1600 x 900 (format 22) confirmed
[17:22:02.725] >> Device mode 1680 x 1050 (format 22) confirmed
[17:22:02.725] >> Device mode 1920 x 1080 (format 22) confirmed
[17:22:02.725] >> Device mode 640 x 480 (format 23) confirmed
[17:22:02.725] >> Device mode 800 x 480 (format 23) confirmed
[17:22:02.725] >> Device mode 800 x 600 (format 23) confirmed
[17:22:02.725] >> Device mode 1024 x 600 (format 23) confirmed
[17:22:02.725] >> Device mode 1024 x 768 (format 23) confirmed
[17:22:02.725] >> Device mode 1280 x 720 (format 23) confirmed
[17:22:02.725] >> Device mode 1280 x 768 (format 23) confirmed
[17:22:02.725] >> Device mode 1280 x 1024 (format 23) confirmed
[17:22:02.725] >> Device mode 1360 x 768 (format 23) confirmed
[17:22:02.725] >> Device mode 1366 x 768 (format 23) confirmed
[17:22:02.725] >> Device mode 1400 x 1050 (format 23) confirmed
[17:22:02.725] >> Device mode 1600 x 900 (format 23) confirmed
[17:22:02.725] >> Device mode 1680 x 1050 (format 23) confirmed
[17:22:02.725] >> Device mode 1920 x 1080 (format 23) confirmed
[17:22:02.725] >> Device mode 640 x 480 (format 22) confirmed
[17:22:02.725] >> Device mode 800 x 480 (format 22) confirmed
[17:22:02.725] >> Device mode 800 x 600 (format 22) confirmed
[17:22:02.725] >> Device mode 1024 x 600 (format 22) confirmed
[17:22:02.725] >> Device mode 1024 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1280 x 720 (format 22) confirmed
[17:22:02.725] >> Device mode 1280 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1280 x 1024 (format 22) confirmed
[17:22:02.725] >> Device mode 1360 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1366 x 768 (format 22) confirmed
[17:22:02.725] >> Device mode 1400 x 1050 (format 22) confirmed
[17:22:02.725] >> Device mode 1600 x 900 (format 22) confirmed
[17:22:02.725] >> Device mode 1680 x 1050 (format 22) confirmed
[17:22:02.725] >> Device mode 1920 x 1080 (format 22) confirmed
[17:22:02.725] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.725] Thread ID = 0x000017b8
[17:22:02.725] path C:\Windows\SysWOW64\aticfx32.dll
base 0x630c0000
size 1193904
[17:22:02.725] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.725] Thread ID = 0x000017b8
[17:22:02.725] path C:\Windows\SysWOW64\atiu9pag.dll
base 0x67330000
size 102616
[17:22:02.741] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.741] Thread ID = 0x000017b8
[17:22:02.741] base 0x67330000
[17:22:02.741] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.741] Thread ID = 0x000017b8
[17:22:02.741] path C:\Windows\SysWOW64\atiu9pag.dll
base 0x67330000
size 102616
[17:22:02.741] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.741] Thread ID = 0x000017b8
[17:22:02.741] path C:\Windows\SysWOW64\atiumdag.dll
base 0x629b0000
size 7408936
[17:22:02.741] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.741] Thread ID = 0x000017b8
[17:22:02.741] path C:\Windows\SysWOW64\atiumdva.dll
base 0x62210000
size 7929616
[17:22:02.788] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.788] Thread ID = 0x000017b8
[17:22:02.788] base 0x62210000
[17:22:02.803] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.803] Thread ID = 0x000017b8
[17:22:02.803] base 0x629b0000
[17:22:02.803] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.803] Thread ID = 0x000017b8
[17:22:02.803] base 0x67330000
[17:22:02.803] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.803] Thread ID = 0x000017b8
[17:22:02.803] base 0x630c0000
[17:22:02.803] >> Device mode 640 x 480 (format 23) confirmed
[17:22:02.803] >> Device mode 800 x 480 (format 23) confirmed
[17:22:02.803] >> Device mode 800 x 600 (format 23) confirmed
[17:22:02.803] >> Device mode 1024 x 600 (format 23) confirmed
[17:22:02.803] >> Device mode 1024 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1280 x 720 (format 23) confirmed
[17:22:02.803] >> Device mode 1280 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1280 x 1024 (format 23) confirmed
[17:22:02.803] >> Device mode 1360 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1366 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1400 x 1050 (format 23) confirmed
[17:22:02.803] >> Device mode 1600 x 900 (format 23) confirmed
[17:22:02.803] >> Device mode 1680 x 1050 (format 23) confirmed
[17:22:02.803] >> Device mode 1920 x 1080 (format 23) confirmed
[17:22:02.803] >> Device mode 640 x 480 (format 22) confirmed
[17:22:02.803] >> Device mode 800 x 480 (format 22) confirmed
[17:22:02.803] >> Device mode 800 x 600 (format 22) confirmed
[17:22:02.803] >> Device mode 1024 x 600 (format 22) confirmed
[17:22:02.803] >> Device mode 1024 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1280 x 720 (format 22) confirmed
[17:22:02.803] >> Device mode 1280 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1280 x 1024 (format 22) confirmed
[17:22:02.803] >> Device mode 1360 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1366 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1400 x 1050 (format 22) confirmed
[17:22:02.803] >> Device mode 1600 x 900 (format 22) confirmed
[17:22:02.803] >> Device mode 1680 x 1050 (format 22) confirmed
[17:22:02.803] >> Device mode 1920 x 1080 (format 22) confirmed
[17:22:02.803] >> Device mode 640 x 480 (format 23) confirmed
[17:22:02.803] >> Device mode 800 x 480 (format 23) confirmed
[17:22:02.803] >> Device mode 800 x 600 (format 23) confirmed
[17:22:02.803] >> Device mode 1024 x 600 (format 23) confirmed
[17:22:02.803] >> Device mode 1024 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1280 x 720 (format 23) confirmed
[17:22:02.803] >> Device mode 1280 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1280 x 1024 (format 23) confirmed
[17:22:02.803] >> Device mode 1360 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1366 x 768 (format 23) confirmed
[17:22:02.803] >> Device mode 1400 x 1050 (format 23) confirmed
[17:22:02.803] >> Device mode 1600 x 900 (format 23) confirmed
[17:22:02.803] >> Device mode 1680 x 1050 (format 23) confirmed
[17:22:02.803] >> Device mode 1920 x 1080 (format 23) confirmed
[17:22:02.803] >> Device mode 640 x 480 (format 22) confirmed
[17:22:02.803] >> Device mode 800 x 480 (format 22) confirmed
[17:22:02.803] >> Device mode 800 x 600 (format 22) confirmed
[17:22:02.803] >> Device mode 1024 x 600 (format 22) confirmed
[17:22:02.803] >> Device mode 1024 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1280 x 720 (format 22) confirmed
[17:22:02.803] >> Device mode 1280 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1280 x 1024 (format 22) confirmed
[17:22:02.803] >> Device mode 1360 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1366 x 768 (format 22) confirmed
[17:22:02.803] >> Device mode 1400 x 1050 (format 22) confirmed
[17:22:02.803] >> Device mode 1600 x 900 (format 22) confirmed
[17:22:02.803] >> Device mode 1680 x 1050 (format 22) confirmed
[17:22:02.803] >> Device mode 1920 x 1080 (format 22) confirmed
[17:22:02.803] >>
Win95_Startup : 1600 x 900
[17:22:02.803] >>
win95_initialiseD3D : 1600 x 900
[17:22:02.803] >> Initialize3DEnvironment(1600 x 900 TNL:1)
[17:22:02.803] >> Initialize3DEnvironment() - Requested width x height x format found in mode list
[17:22:02.803] >> Puredevice set
[17:22:02.803] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.803] Thread ID = 0x000017b8
[17:22:02.803] path C:\Windows\SysWOW64\aticfx32.dll
base 0x630c0000
size 1193904
[17:22:02.819] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.819] Thread ID = 0x000017b8
[17:22:02.819] path C:\Windows\SysWOW64\atiu9pag.dll
base 0x67330000
size 102616
[17:22:02.850] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:02.850] Thread ID = 0x000017b8
[17:22:02.850] base 0x67330000
[17:22:02.850] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.850] Thread ID = 0x000017b8
[17:22:02.850] path C:\Windows\SysWOW64\atiu9pag.dll
base 0x67330000
size 102616
[17:22:02.866] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.866] Thread ID = 0x000017b8
[17:22:02.866] path C:\Windows\SysWOW64\atiumdag.dll
base 0x629b0000
size 7408936
[17:22:02.897] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:02.897] Thread ID = 0x000017b8
[17:22:02.897] path C:\Windows\SysWOW64\atiumdva.dll
base 0x62210000
size 7929616
[17:22:03.600] >> D3DDevice created =
[17:22:03.600] >> HAL (hw vp): AMD Radeon HD 8610G
[17:22:03.600] >>
[17:22:03.616] >>
GP_win95 :: Running gfx at 32/24 bit
[17:22:03.616] >> win95_startup() - Initialize3DEnvironment ok
[17:22:03.616] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.616] Thread ID = 0x000017b8
[17:22:03.616] path C:\Windows\SysWOW64\HID.DLL
base 0x5bec0000
size 26624
[17:22:03.647] >> No joysticks found
[17:22:03.647] >> Game thread finishing win95 startup(0)
[17:22:03.647] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.647] Thread ID = 0x000017b8
[17:22:03.647] path C:\Program Files (x86)\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 27136
[17:22:03.647] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.647] Thread ID = 0x000017b8
[17:22:03.647] path C:\Windows\SysWOW64\imagehlp.dll
base 0x75d60000
size 74824
[17:22:03.647] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:03.647] Thread ID = 0x000017b8
[17:22:03.647] base 0x75d60000
[17:22:03.710] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.710] Thread ID = 0x000017b8
[17:22:03.710] path C:\Program Files (x86)\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 44032
[17:22:03.710] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.710] Thread ID = 0x000017b8
[17:22:03.710] path C:\Windows\SysWOW64\imagehlp.dll
base 0x75d60000
size 74824
[17:22:03.710] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:03.725] Thread ID = 0x000017b8
[17:22:03.725] base 0x75d60000
[17:22:03.725] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.725] Thread ID = 0x000017b8
[17:22:03.725] path C:\Program Files (x86)\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 30208
[17:22:03.725] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.725] Thread ID = 0x000017b8
[17:22:03.725] path C:\Windows\SysWOW64\imagehlp.dll
base 0x75d60000
size 74824
[17:22:03.725] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:03.725] Thread ID = 0x000017b8
[17:22:03.725] base 0x75d60000
[17:22:03.741] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.741] Thread ID = 0x000017b8
[17:22:03.741] path C:\Program Files (x86)\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 44032
[17:22:03.741] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.741] Thread ID = 0x000017b8
[17:22:03.741] path C:\Windows\SysWOW64\imagehlp.dll
base 0x75d60000
size 74824
[17:22:03.741] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:03.741] Thread ID = 0x000017b8
[17:22:03.741] base 0x75d60000
[17:22:03.741] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.741] Thread ID = 0x000017b8
[17:22:03.741] path C:\Program Files (x86)\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 67584
[17:22:03.772] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.772] Thread ID = 0x000017b8
[17:22:03.772] path C:\Windows\SysWOW64\imagehlp.dll
base 0x75d60000
size 74824
[17:22:03.772] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:03.772] Thread ID = 0x000017b8
[17:22:03.772] base 0x75d60000
[17:22:03.772] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.772] Thread ID = 0x000017b8
[17:22:03.772] path C:\Program Files (x86)\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 20480
[17:22:03.772] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.772] Thread ID = 0x000017b8
[17:22:03.772] path C:\Windows\SysWOW64\imagehlp.dll
base 0x75d60000
size 74824
[17:22:03.772] Debug event: UNLOAD_DLL_DEBUG_EVENT
[17:22:03.772] Thread ID = 0x000017b8
[17:22:03.772] base 0x75d60000
[17:22:03.772] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.772] Thread ID = 0x000017b8
[17:22:03.772] path C:\Windows\SysWOW64\gp4tweak.dll
base 0x40000000
size 48640
[17:22:03.866] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.866] Thread ID = 0x000017b8
[17:22:03.866] path C:\Windows\SysWOW64\MMDevApi.dll
base 0x52920000
size 331048
[17:22:03.866] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:03.866] Thread ID = 0x0000178c
[17:22:03.866] Thread handle = 0x00000418
Start address = 0x52b08980
Thread local base = 0x7fe9d000
[17:22:03.866] Debug event: LOAD_DLL_DEBUG_EVENT
[17:22:03.866] Thread ID = 0x0000178c
[17:22:03.866] path C:\Windows\SysWOW64\AUDIOSES.DLL
base 0x528c0000
size 370424
[17:22:03.897] Debug event: CREATE_THREAD_DEBUG_EVENT
[17:22:03.897] Thread ID = 0x00000ed0
[17:22:03.897] Thread handle = 0x00000424
Start address = 0x52b08980
Thread local base = 0x7fe9a000
[17:22:03.960] >> Bink init completed
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x0054d09c
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to write to virtual address 0x00b4a000
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.975] Process tried to read from virtual address 0x580700c7
[17:22:03.975] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.975] Thread ID = 0x000017b8
[17:22:03.975] First chance exception
[17:22:03.975] Exception address: 0x77871037
[17:22:03.975] Module name: '' (base 0x77830000, size 1499920)
[17:22:03.975] Exception flags: 0x00000000
[17:22:03.975] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.991] Process tried to read from virtual address 0x580700c7
[17:22:03.991] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.991] Thread ID = 0x000010d0
[17:22:03.991] First chance exception
[17:22:03.991] Exception address: 0x00509fbd
[17:22:03.991] Exception flags: 0x00000000
[17:22:03.991] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.991] Process tried to read from virtual address 0x58070083
[17:22:03.991] Debug event: EXCEPTION_DEBUG_EVENT
[17:22:03.991] Thread ID = 0x000010d0
[17:22:03.991] Unhandled exception
[17:22:03.991] Exception address: 0x00509fbd
[17:22:03.991] Exception flags: 0x00000000
[17:22:03.991] Exception code: EXCEPTION_ACCESS_VIOLATION
[17:22:03.991] Process tried to read from virtual address 0x58070083
[17:22:03.991] Stack trace:
00509FBD: Program Files (x86)\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
774B7C04: Windows\SYSTEM32\KERNEL32.DLL! BaseThreadInitThunk + 36 bytes
7788AD1F: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 143 bytes
7788ACEA: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 90 bytes
[17:22:04.007] Registers:
EAX=58070083 ECX=58070083 ESI=6A6779C0
EBX=0050A190 EDX=00000000 EDI=00000010
CS:EIP=0023:00509FBD
SS:ESP=002B:03A1FE90 EBP=03A1FF80
DS=002B ES=002B FS=0053 GS=002B
Flags=00010202
Stack dump:
03a1fe90: 0054e75d 00000010 6a6779c0 03a1ff80 '].T......ygj....'
03a1fea0: 03a1feb4 0050a190 00000000 0050a190 '......P.......P.'
03a1feb0: 00000000 0050a195 6a664909 00000010 '......P..Ifj....'
03a1fec0: 00000000 000407be 00000000 00000000 '................'
03a1fed0: 6a664810 6a664810 00000000 000001e8 '.Hfj.Hfj........'
03a1fee0: 000001f8 0000023c 00000000 00000000 '....<...........'
03a1fef0: 00000000 00000000 00000000 00000000 '................'
03a1ff00: 00000000 00000000 00000000 00000000 '................'
03a1ff10: 00000000 00000000 00000000 00000000 '................'
03a1ff20: 00000000 000407be 00000000 ffff0320 '............ ...'
03a1ff30: ffffffff 00000002 00000000 00000010 '................'
03a1ff40: 00000021 00000000 00000000 f6578ec0 '!.............W.'
03a1ff50: 00007ffd 0000023f 00000000 00000000 '....?...........'
03a1ff60: 00000000 00000000 00000000 00001f80 '................'
03a1ff70: 00000000 00000000 00000000 4a332659 '............Y&3J'
03a1ff80: 03a1ff94 774b7c04 00000000 774b7be0 '.....|Kw.....{Kw'
03a1ff90: 57092599 03a1ffdc 7788ad1f 00000000 '.%.W.......w....'
03a1ffa0: 57c00f28 00000000 00000000 00000000 '
..W............'
03a1ffb0: c0000005 754bf580 00000000 03a1f89c '......Ku........'
03a1ffc0: 57c00f28 03a1ffa0 03a1f89c 03a1ffe4 '
..W............'
03a1ffd0: 778c74a0 23e95dc4 00000000 03a1ffec '.t.w.].#........'
03a1ffe0: 7788acea ffffffff 77870220 00000000 '...w.... ..w....'
03a1fff0: 00000000 6a664810 00000000 00000000 '.....Hfj........'
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x00000ed0
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x0000178c
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x000010d0
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x00000bd8
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x000017b8
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x000000bc
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x000000c0
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x00001548
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x000017f4
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.116] Debug event: EXIT_THREAD_DEBUG_EVENT
[17:22:06.116] Thread ID = 0x00000ec8
[17:22:06.116] Thread exit code = -1073741819
[17:22:06.350] Debug event: EXIT_PROCESS_DEBUG_EVENT
[17:22:06.350] Thread ID = 0x0000159c
[17:22:06.350] Process exit code = -1073741819