Problem signature: APPCRASH (GPX ERROR LOG)

Posted by CHONG 
Problem signature: APPCRASH (GPX ERROR LOG)
Date: August 31, 2013 12:25PM
Posted by: CHONG
When I open grand prix 3, pop out the problem signature.

Problem signature:
Problem Event Name: APPCRASH
Application Name: gp3.exe
Application Version: 0.0.0.0
Application Timestamp: 00000000
Fault Module Name: StackHash_ef4a
Fault Module Version: 0.0.0.0
Fault Module Timestamp: 00000000
Exception Code: c00000fd
Exception Offset: 772b1234
OS Version: 6.1.7601.2.1.0.256.1
Locale ID: 1033
Additional Information 1: ef4a
Additional Information 2: ef4a0243f00cb4f4c760a46790b0551c
Additional Information 3: b815
Additional Information 4: b8158c59887e725c20d32c07382380c3

Read our privacy statement online:
[go.microsoft.com]

If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\erofflps.txt

Can somebody fix this problem.

Thank You



Edited 1 time(s). Last edit at 09/16/2013 12:23PM by CHONG.
Re: Problem signature: APPCRASH
Date: August 31, 2013 11:15PM
Posted by: mortal
This is an unknown error log, do you have gpx_patch installed? If so, set verbosity to high in gpx, and start GP3 from gpx. Post the resulting error log here. Edit topic to show gpx error log in the header please.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problem signature: APPCRASH (GPX ERROR LOG)
Date: September 16, 2013 12:17PM
Posted by: CHONG
Starting log
GPxPatch version: 4.22
GPx version detected: decrypted GP3 v1.13
Date/time: 16-09-2013 18:15
[18:15:52.765] Verbosity level is 2
[18:15:52.765] OS version info: Windows XP Service Pack 2 build 2600
[18:15:52.765] Total physical memory: 1023 MB (free: 1023 MB)
[18:15:52.765] Debugging gp3.exe
[18:15:52.775] Process created:
Process ID = 0x000013ac
Process handle = 0x0000017c
Main thread ID = 0x000022c4
Main thread handle = 0x00000178
[18:15:52.775] Waiting for debug events...
[18:15:52.775] Debug event: CREATE_PROCESS_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] Entry point = 0x00523473
[18:15:52.775] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] path ntdll.dll
base 0x77b10000
size 1292192
[18:15:52.775] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] base 0x77810000
[18:15:52.775] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] base 0x755c0000
[18:15:52.775] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] base 0x77810000
[18:15:52.775] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] base 0x77710000
[18:15:52.775] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] path C:\Windows\syswow64\kernel32.dll
base 0x755c0000
size 1114112
[18:15:52.775] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.775] Thread ID = 0x000022c4
[18:15:52.775] path C:\Windows\syswow64\KERNELBASE.dll
base 0x77310000
size 274944
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\USER32.dll
base 0x774f0000
size 833024
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\GDI32.dll
base 0x76660000
size 311296
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\LPK.dll
base 0x76c60000
size 25600
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\USP10.dll
base 0x76740000
size 626688
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\msvcrt.dll
base 0x758d0000
size 690688
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\ADVAPI32.dll
base 0x767e0000
size 640512
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\sechost.dll
base 0x76720000
size 92160
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\RPCRT4.dll
base 0x76890000
size 663552
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\SspiCli.dll
base 0x75560000
size 96768
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\CRYPTBASE.dll
base 0x75550000
size 36864
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\WINSPOOL.DRV
base 0x75420000
size 320000
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\ole32.dll
base 0x76c90000
size 1414144
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\DDRAW.dll
base 0x74140000
size 531968
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\DCIMAN32.dll
base 0x74130000
size 10240
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\SETUPAPI.dll
base 0x77170000
size 1667584
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\CFGMGR32.dll
base 0x77440000
size 145920
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\OLEAUT32.dll
base 0x75980000
size 571904
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\DEVOBJ.dll
base 0x774d0000
size 64512
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\dwmapi.dll
base 0x72970000
size 67072
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\DINPUT.dll
base 0x6e720000
size 136704
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\WINMM.dll
base 0x73050000
size 194048
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\WSOCK32.dll
base 0x730c0000
size 15360
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\WS2_32.dll
base 0x76e00000
size 206848
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\NSI.dll
base 0x76ed0000
size 8704
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\DSOUND.dll
base 0x68bd0000
size 453632
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\POWRPROF.dll
base 0x701e0000
size 145408
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path F:\Program Files\Microprose\Grand Prix 3\binkw32.dll
base 0x10000000
size 262656
[18:15:52.785] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] First chance exception
[18:15:52.785] Exception address: 0x77bb103b
[18:15:52.785] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:52.785] Exception flags: 0x00000000
[18:15:52.785] Exception code: EXCEPTION_BREAKPOINT
[18:15:52.785] Setting breakpoint on entry point (0x00523473)
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\apphelp.dll
base 0x727b0000
size 295936
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\AppPatch\AcGenral.DLL
base 0x670d0000
size 2176512
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\syswow64\SHLWAPI.dll
base 0x76ee0000
size 350208
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\UxTheme.dll
base 0x72990000
size 245760
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\samcli.dll
base 0x6fd70000
size 51200
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\MSACM32.dll
base 0x750c0000
size 72192
[18:15:52.785] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.785] Thread ID = 0x000022c4
[18:15:52.785] path C:\Windows\SysWOW64\VERSION.dll
base 0x75480000
size 21504
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\SHELL32.dll
base 0x75a10000
size 12872704
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\SysWOW64\sfc.dll
base 0x69a60000
size 2560
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\SysWOW64\sfc_os.DLL
base 0x670c0000
size 40960
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\SysWOW64\USERENV.dll
base 0x721c0000
size 81920
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\SysWOW64\profapi.dll
base 0x725f0000
size 31744
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\urlmon.dll
base 0x769e0000
size 1141248
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\api-ms-win-downlevel-ole32-l1-1-0.dll
base 0x76c50000
size 5632
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path
base 0x77100000
size 9728
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\api-ms-win-downlevel-advapi32-l1-1-0.dll
base 0x769d0000
size 10752
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\api-ms-win-downlevel-user32-l1-1-0.dll
base 0x76880000
size 4096
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\api-ms-win-downlevel-version-l1-1-0.dll
base 0x77ae0000
size 3072
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\api-ms-win-downlevel-normaliz-l1-1-0.dll
base 0x76c80000
size 2560
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\normaliz.DLL
base 0x76c70000
size 2048
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\iertutil.dll
base 0x756d0000
size 2048000
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\syswow64\WININET.dll
base 0x76f40000
size 1767936
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\SysWOW64\MPR.dll
base 0x72040000
size 64000
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\AppPatch\AcLayers.dll
base 0x745a0000
size 561664
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\AppPatch\AcXtrnal.DLL
base 0x6b180000
size 211968
[18:15:52.795] >> FTH: (5036): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path
base 0x013e0000
size 8835072
[18:15:52.795] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] base 0x013e0000
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path
base 0x013e0000
size 8835072
[18:15:52.795] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] base 0x013e0000
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path
base 0x013e0000
size 8835072
[18:15:52.795] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] base 0x013e0000
[18:15:52.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.795] Thread ID = 0x000022c4
[18:15:52.795] path C:\Windows\SysWOW64\SHUNIMPL.DLL
base 0x750f0000
size 10752
[18:15:52.805] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.805] Thread ID = 0x000022c4
[18:15:52.805] path C:\Windows\SysWOW64\SortServer2003Compat.dll
base 0x74fb0000
size 38400
[18:15:52.805] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.805] Thread ID = 0x000022c4
[18:15:52.805] path C:\Windows\SysWOW64\IMM32.DLL
base 0x77110000
size 119808
[18:15:52.805] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.805] Thread ID = 0x000022c4
[18:15:52.805] path C:\Windows\syswow64\MSCTF.dll
base 0x77370000
size 828928
[18:15:52.815] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.815] Thread ID = 0x000022c4
[18:15:52.815] path c:\windows\syswow64\appinit_dll.dll
base 0x753a0000
size 461032
[18:15:52.825] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.825] Thread ID = 0x000022c4
[18:15:52.825] path c:\windows\syswow64\nvinit.dll
base 0x75360000
size 214448
[18:15:52.825] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.825] Thread ID = 0x000022c4
[18:15:52.825] path C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\detoured.dll
base 0x0f000000
size 4096
[18:15:52.835] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.835] Thread ID = 0x000022c4
[18:15:52.835] path C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\nvd3d9wrap.dll
base 0x72a50000
size 289632
[18:15:52.835] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.835] Thread ID = 0x000022c4
[18:15:52.835] path C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\nvdxgiwrap.dll
base 0x72a10000
size 193336
[18:15:52.855] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.855] Thread ID = 0x000022c4
[18:15:52.855] path
base 0x011a0000
size 44544
[18:15:52.855] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.855] Thread ID = 0x000022c4
[18:15:52.855] base 0x011a0000
[18:15:52.925] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:52.925] Thread ID = 0x000022c4
[18:15:52.925] First chance exception
[18:15:52.925] Exception address: 0x00523473
[18:15:52.925] Exception flags: 0x00000000
[18:15:52.925] Exception code: EXCEPTION_BREAKPOINT
[18:15:52.925] Removing breakpoint on entry point
[18:15:52.925] Injecting DLL loading code...
[18:15:52.925] Copying code to target at address 0x011a0000...
[18:15:52.925] Injection succesful
[18:15:52.925] Setting instruction pointer to injected code (0x011a0000)
[18:15:52.925] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.925] Thread ID = 0x000022c4
[18:15:52.925] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 27648
[18:15:52.925] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.925] Thread ID = 0x000022c4
[18:15:52.925] path F:\Program Files\Microprose\Grand Prix 3\GPxPSup.dll
base 0x09900000
size 40960
[18:15:52.925] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.925] Thread ID = 0x000022c4
[18:15:52.925] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:52.935] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.935] Thread ID = 0x000022c4
[18:15:52.935] base 0x76c20000
[18:15:52.935] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.935] Thread ID = 0x000022c4
[18:15:52.935] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:52.935] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.935] Thread ID = 0x000022c4
[18:15:52.935] base 0x76c20000
[18:15:52.935] >> Starting WinMain
[18:15:52.935] >> Loading library
[18:15:52.945] >> WM_ACTIVATE (active)(not minimized)
[18:15:52.945] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.945] Thread ID = 0x000022c4
[18:15:52.945] path C:\Windows\SysWOW64\ole32.dll
base 0x03490000
size 1414144
[18:15:52.945] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.945] Thread ID = 0x000022c4
[18:15:52.945] base 0x03490000
[18:15:52.945] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.945] Thread ID = 0x000022c4
[18:15:52.945] path C:\Windows\SysWOW64\ole32.dll
base 0x03780000
size 1414144
[18:15:52.945] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.945] Thread ID = 0x000022c4
[18:15:52.945] base 0x03780000
[18:15:52.945] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.945] Thread ID = 0x000022c4
[18:15:52.945] path C:\Windows\syswow64\CLBCatQ.DLL
base 0x76e40000
size 522240
[18:15:52.955] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:52.955] Thread ID = 0x000023d8
[18:15:52.955] Thread handle = 0x000002b8
Start address = 0x7305a3e0
Thread local base = 0x7efda000
[18:15:52.955] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.955] Thread ID = 0x000022c4
[18:15:52.955] path C:\Windows\SysWOW64\dplayx.dll
base 0x6e280000
size 213504
[18:15:52.965] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:52.965] Thread ID = 0x0000227c
[18:15:52.965] Thread handle = 0x000002c0
Start address = 0x6e2a9682
Thread local base = 0x7efd7000
[18:15:52.965] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.965] Thread ID = 0x000022c4
[18:15:52.965] path C:\Windows\SysWOW64\dpmodemx.dll
base 0x750e0000
size 23040
[18:15:52.965] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.965] Thread ID = 0x000022c4
[18:15:52.965] path C:\Windows\SysWOW64\TAPI32.dll
base 0x6e240000
size 192000
[18:15:52.965] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.965] Thread ID = 0x000022c4
[18:15:52.965] path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
base 0x723b0000
size 1680896
[18:15:52.975] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.975] Thread ID = 0x000022c4
[18:15:52.975] base 0x750e0000
[18:15:52.975] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:52.975] Thread ID = 0x000022c4
[18:15:52.975] base 0x6e240000
[18:15:52.975] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.975] Thread ID = 0x000022c4
[18:15:52.975] path C:\Windows\SysWOW64\dpmodemx.dll
base 0x74fa0000
size 23040
[18:15:52.975] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.975] Thread ID = 0x000022c4
[18:15:52.975] path C:\Windows\SysWOW64\TAPI32.dll
base 0x6e200000
size 192000
[18:15:52.975] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:52.975] Thread ID = 0x000022c4
[18:15:52.975] path C:\Windows\SysWOW64\rtutils.dll
base 0x750e0000
size 37376
[18:15:53.975] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:53.975] Thread ID = 0x00001c10
[18:15:53.975] Thread handle = 0x000002dc
Start address = 0x77b62e65
Thread local base = 0x7ef9f000
[18:15:53.975] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:53.975] Thread ID = 0x0000231c
[18:15:53.975] Thread handle = 0x000002e0
Start address = 0x6e20f1ac
Thread local base = 0x7ef9c000
[18:15:53.975] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:53.975] Thread ID = 0x000022c4
[18:15:53.975] base 0x74fa0000
[18:15:53.975] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:53.975] Thread ID = 0x000022c4
[18:15:53.975] base 0x6e200000
[18:15:53.975] Debug event: EXIT_THREAD_DEBUG_EVENT
[18:15:53.975] Thread ID = 0x0000231c
[18:15:53.975] Thread exit code = 0
[18:15:53.975] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.975] Thread ID = 0x000022c4
[18:15:53.975] path C:\Windows\SysWOW64\dpwsockx.dll
base 0x74fa0000
size 44032
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\mswsock.dll
base 0x72160000
size 232448
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\wshtcpip.dll
base 0x72150000
size 9216
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\dpnathlp.dll
base 0x743e0000
size 57344
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\CRYPTSP.dll
base 0x72850000
size 78848
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\rsaenh.dll
base 0x72810000
size 242936
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\iphlpapi.dll
base 0x72290000
size 103936
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\WINNSI.DLL
base 0x72280000
size 16896
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\rasapi32.dll
base 0x5e170000
size 325120
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\rasman.dll
base 0x6f8c0000
size 76800
[18:15:53.985] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:53.985] Thread ID = 0x000022c4
[18:15:53.985] path C:\Windows\SysWOW64\dhcpcsvc.DLL
base 0x73ed0000
size 61952
[18:15:56.485] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x000010d0
[18:15:56.485] Thread handle = 0x0000030c
Start address = 0x74fa4819
Thread local base = 0x7ef9c000
[18:15:56.485] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x000022c4
[18:15:56.485] base 0x5e170000
[18:15:56.485] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x000022c4
[18:15:56.485] base 0x6f8c0000
[18:15:56.485] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x000022c4
[18:15:56.485] base 0x743e0000
[18:15:56.485] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x000022c4
[18:15:56.485] base 0x72150000
[18:15:56.485] Debug event: EXIT_THREAD_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x000010d0
[18:15:56.485] Thread exit code = 0
[18:15:56.485] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x000022c4
[18:15:56.485] base 0x74fa0000
[18:15:56.485] Debug event: EXIT_THREAD_DEBUG_EVENT
[18:15:56.485] Thread ID = 0x0000227c
[18:15:56.485] Thread exit code = 0
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\NLAapi.dll
base 0x72270000
size 52224
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\napinsp.dll
base 0x72260000
size 52224
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\pnrpnsp.dll
base 0x72230000
size 65024
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\wshbth.dll
base 0x72220000
size 36352
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\DNSAPI.dll
base 0x71ff0000
size 270336
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\winrnr.dll
base 0x71fe0000
size 20992
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
base 0x71e50000
size 145648
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\syswow64\PSAPI.DLL
base 0x77360000
size 6144
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path G:\Program Files (x86)\National Instruments\Shared\mDNS Responder\nimdnsNSP.dll
base 0x63560000
size 24216
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\nimdnsResponder.dll
base 0x63550000
size 28272
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\MSVCR90.dll
base 0x73340000
size 653136
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Program Files (x86)\Bonjour\mdnsNSP.dll
base 0x72c70000
size 121704
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\fwpuclnt.dll
base 0x712e0000
size 216576
[18:15:56.535] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] path C:\Windows\SysWOW64\rasadhlp.dll
base 0x72d60000
size 11776
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x72270000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x72260000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x72230000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x72220000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x71fe0000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x71e50000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x77360000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x63560000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x63550000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x73340000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x72c70000
[18:15:56.535] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x000022c4
[18:15:56.535] base 0x712e0000
[18:15:56.535] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.535] Thread ID = 0x0000118c
[18:15:56.535] Thread handle = 0x00000340
Start address = 0x6e2a9682
Thread local base = 0x7efd7000
[18:15:56.545] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.545] Thread ID = 0x000022c4
[18:15:56.545] path C:\Windows\SysWOW64\dpmodemx.dll
base 0x74f80000
size 23040
[18:15:56.545] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.545] Thread ID = 0x000022c4
[18:15:56.545] path C:\Windows\SysWOW64\TAPI32.dll
base 0x6e240000
size 192000
[18:15:56.545] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.545] Thread ID = 0x0000176c
[18:15:56.545] Thread handle = 0x0000034c
Start address = 0x6e24f1ac
Thread local base = 0x7ef9c000
[18:15:56.545] Debug event: EXIT_THREAD_DEBUG_EVENT
[18:15:56.545] Thread ID = 0x0000118c
[18:15:56.545] Thread exit code = 0
[18:15:56.595] Debug event: EXIT_THREAD_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x0000176c
[18:15:56.595] Thread exit code = 0
[18:15:56.595] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x000022c4
[18:15:56.595] base 0x74f80000
[18:15:56.595] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x000022c4
[18:15:56.595] base 0x6e240000
[18:15:56.595] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x000022c4
[18:15:56.595] path C:\Windows\SysWOW64\nvumdshim.dll
base 0x6e600000
size 925648
[18:15:56.595] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x000022c4
[18:15:56.595] path C:\Windows\SysWOW64\nvd3dum.dll
base 0x68e60000
size 12427240
[18:15:56.595] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x000022c4
[18:15:56.595] path C:\Windows\syswow64\PSAPI.DLL
base 0x77360000
size 6144
[18:15:56.595] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x00001ebc
[18:15:56.595] Thread handle = 0x00000354
Start address = 0x68e66160
Thread local base = 0x7efd7000
[18:15:56.595] Debug event: EXIT_THREAD_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x00001ebc
[18:15:56.595] Thread exit code = 0
[18:15:56.595] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x000017f4
[18:15:56.595] Thread handle = 0x00000354
Start address = 0x6e61a9d0
Thread local base = 0x7efd7000
[18:15:56.595] Debug event: EXIT_THREAD_DEBUG_EVENT
[18:15:56.595] Thread ID = 0x000017f4
[18:15:56.595] Thread exit code = 0
[18:15:56.625] >> MMX Enabled
[18:15:56.625] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.625] Thread ID = 0x000022c4
[18:15:56.625] path C:\Windows\SysWOW64\D3DIM700.DLL
base 0x6de90000
size 817664
[18:15:56.625] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.625] Thread ID = 0x000022c4
[18:15:56.625] path C:\Windows\SysWOW64\mscat32.dll
base 0x74fa0000
size 10240
[18:15:56.625] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.625] Thread ID = 0x000022c4
[18:15:56.625] path C:\Windows\syswow64\WINTRUST.dll
base 0x766f0000
size 175104
[18:15:56.625] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.625] Thread ID = 0x000022c4
[18:15:56.625] path C:\Windows\syswow64\CRYPT32.dll
base 0x775f0000
size 1166848
[18:15:56.625] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.625] Thread ID = 0x000022c4
[18:15:56.625] path C:\Windows\syswow64\MSASN1.dll
base 0x76df0000
size 34304
[18:15:56.625] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.625] Thread ID = 0x00002390
[18:15:56.625] Thread handle = 0x00000368
Start address = 0x77628295
Thread local base = 0x7efd7000
[18:15:56.635] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.635] Thread ID = 0x000022c4
[18:15:56.635] path C:\Windows\SysWOW64\bcrypt.dll
base 0x71ce0000
size 80896
[18:15:56.635] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.635] Thread ID = 0x000022c4
[18:15:56.635] path C:\Windows\SysWOW64\bcryptprimitives.dll
base 0x71ca0000
size 249680
[18:15:56.635] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.635] Thread ID = 0x00000d38
[18:15:56.635] Thread handle = 0x00000374
Start address = 0x77b63e85
Thread local base = 0x7ef9c000
[18:15:56.695] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.695] Thread ID = 0x000022c4
[18:15:56.695] path C:\Windows\SysWOW64\ncrypt.dll
base 0x71d00000
size 220160
[18:15:56.775] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.775] Thread ID = 0x000022c4
[18:15:56.775] path C:\Windows\SysWOW64\GPAPI.dll
base 0x74d70000
size 79872
[18:15:56.785] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:56.785] Thread ID = 0x00001c7c
[18:15:56.785] Thread handle = 0x00000380
Start address = 0x77b63e85
Thread local base = 0x7ef99000
[18:15:56.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.795] Thread ID = 0x000022c4
[18:15:56.795] path C:\Windows\SysWOW64\cryptnet.dll
base 0x74d50000
size 103936
[18:15:56.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.795] Thread ID = 0x000022c4
[18:15:56.795] path C:\Windows\syswow64\WLDAP32.dll
base 0x76980000
size 269824
[18:15:56.795] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.795] Thread ID = 0x000022c4
[18:15:56.795] path C:\Windows\SysWOW64\SensApi.dll
base 0x74ea0000
size 10752
[18:15:56.885] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:56.885] Thread ID = 0x000022c4
[18:15:56.885] base 0x74fa0000
[18:15:56.895] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:56.895] Thread ID = 0x000022c4
[18:15:56.895] path C:\Windows\SysWOW64\mscat32.dll
base 0x74f80000
size 10240
[18:15:57.035] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:57.035] Thread ID = 0x000022c4
[18:15:57.035] base 0x74f80000
[18:15:57.055] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.055] Thread ID = 0x000022c4
[18:15:57.055] path C:\Windows\SysWOW64\mscat32.dll



Edited 2 time(s). Last edit at 09/16/2013 12:19PM by CHONG.
Re: Problem signature: APPCRASH (GPX ERROR LOG)
Date: September 16, 2013 12:21PM
Posted by: CHONG
base 0x74fa0000
size 10240
[18:15:57.175] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:57.175] Thread ID = 0x000022c4
[18:15:57.175] base 0x74fa0000
[18:15:57.175] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.175] Thread ID = 0x000022c4
[18:15:57.175] path C:\Windows\SysWOW64\mscat32.dll
base 0x74f80000
size 10240
[18:15:57.255] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:57.255] Thread ID = 0x000022c4
[18:15:57.255] base 0x74f80000
[18:15:57.455] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.455] Thread ID = 0x000022c4
[18:15:57.455] path C:\Windows\SysWOW64\HID.DLL
base 0x74d10000
size 22016
[18:15:57.485] >> No joysticks found -- closing dinput
[18:15:57.485] >> Closing DINPUT
[18:15:57.485] >> In ddraw_set_screen
[18:15:57.485] >> No change in cooperative level
[18:15:57.725] >> changed window size
[18:15:57.725] >> ddraw_set_screen finished ok.
[18:15:57.725] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:57.725] Thread ID = 0x0000136c
[18:15:57.725] Thread handle = 0x000003a0
Start address = 0x00523185
Thread local base = 0x7ef96000
[18:15:57.725] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.725] Thread ID = 0x0000136c
[18:15:57.725] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\dx\gpxpdx7.dll
base 0x09980000
size 139332
[18:15:57.725] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.725] Thread ID = 0x0000136c
[18:15:57.725] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 25088
[18:15:57.725] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.725] Thread ID = 0x0000136c
[18:15:57.725] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:57.735] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:57.735] Thread ID = 0x0000136c
[18:15:57.735] base 0x76c20000
[18:15:57.735] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.735] Thread ID = 0x0000136c
[18:15:57.735] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 44032
[18:15:57.735] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.735] Thread ID = 0x0000136c
[18:15:57.735] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:57.745] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:57.745] Thread ID = 0x0000136c
[18:15:57.745] base 0x76c20000
[18:15:57.745] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.745] Thread ID = 0x0000136c
[18:15:57.745] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 26624
[18:15:57.745] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:57.745] Thread ID = 0x0000136c
[18:15:57.745] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:57.755] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:57.755] Thread ID = 0x0000136c
[18:15:57.755] base 0x76c20000
[18:15:58.165] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.165] Thread ID = 0x0000136c
[18:15:58.165] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 43520
[18:15:58.165] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.165] Thread ID = 0x0000136c
[18:15:58.165] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:58.175] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:58.175] Thread ID = 0x0000136c
[18:15:58.175] base 0x76c20000
[18:15:58.175] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.175] Thread ID = 0x0000136c
[18:15:58.175] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 67072
[18:15:58.185] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.185] Thread ID = 0x0000136c
[18:15:58.185] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:58.185] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:58.185] Thread ID = 0x0000136c
[18:15:58.185] base 0x76c20000
[18:15:58.185] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.185] Thread ID = 0x0000136c
[18:15:58.185] path F:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 19456
[18:15:58.185] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.185] Thread ID = 0x0000136c
[18:15:58.185] path C:\Windows\syswow64\imagehlp.dll
base 0x76c20000
size 159232
[18:15:58.195] Debug event: UNLOAD_DLL_DEBUG_EVENT
[18:15:58.195] Thread ID = 0x0000136c
[18:15:58.195] base 0x76c20000
[18:15:58.225] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.225] Thread ID = 0x0000136c
[18:15:58.225] path C:\Windows\SysWOW64\MMDevApi.dll
base 0x6d8d0000
size 213504
[18:15:58.225] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.225] Thread ID = 0x0000136c
[18:15:58.225] path C:\Windows\SysWOW64\PROPSYS.dll
base 0x72870000
size 988160
[18:15:58.245] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:58.245] Thread ID = 0x00002360
[18:15:58.245] Thread handle = 0x000003e0
Start address = 0x68bfe4a1
Thread local base = 0x7ef93000
[18:15:58.245] Debug event: LOAD_DLL_DEBUG_EVENT
[18:15:58.245] Thread ID = 0x00002360
[18:15:58.245] path C:\Windows\SysWOW64\AUDIOSES.DLL
base 0x6d850000
size 195584
[18:15:58.245] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:58.245] Thread ID = 0x00001e20
[18:15:58.245] Thread handle = 0x000003e8
Start address = 0x6d8d27e1
Thread local base = 0x7ef90000
[18:15:58.255] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:58.255] Thread ID = 0x000005a8
[18:15:58.255] Thread handle = 0x000003ec
Start address = 0x77b63e85
Thread local base = 0x7ef8d000
[18:15:58.255] Debug event: CREATE_THREAD_DEBUG_EVENT
[18:15:58.255] Thread ID = 0x00001a88
[18:15:58.255] Thread handle = 0x000003f0
Start address = 0x68bfe4a1
Thread local base = 0x7ef8a000
[18:15:58.355] >> Bink init
[18:15:58.355] >> Bink init completed
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x00505ca8
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to write to virtual address 0x00d23000
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
Re: Problem signature: APPCRASH (GPX ERROR LOG)
Date: September 16, 2013 12:23PM
Posted by: CHONG
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
Re: Problem signature: APPCRASH (GPX ERROR LOG)
Date: September 16, 2013 01:42PM
Posted by: mortal
Can you redo this please. Set verbosity to medium, and set cpu to 0. There should have been a stack dump at the end of the log, make sure all of it is posted please.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problem signature: APPCRASH (GPX ERROR LOG)
Date: September 17, 2013 08:25PM
Posted by: EricMoinet
Something wrong with ntdll.dll but it seems to be related to windows rather than GP3 if I'm correct.



Re: Problem signature: APPCRASH (GPX ERROR LOG)
Date: September 18, 2013 07:39PM
Posted by: SDI
I think you are using the GP3 1.13 executable (decrypted) with a GP3 1.00 installation. Try with the GP3 1.00 executable or properly update GP3 from 1.00 to 1.13.

René Smit, Independent Software Developer.
Download my GPx tools here.
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy