[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.355] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.355] Thread ID = 0x0000136c
[18:15:58.355] First chance exception
[18:15:58.355] Exception address: 0x77b3e066
[18:15:58.355] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.355] Exception flags: 0x00000000
[18:15:58.355] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.355] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066
[18:15:58.365] Module name: 'ntdll.dll' (base 0x77b10000, size 1292192)
[18:15:58.365] Exception flags: 0x00000000
[18:15:58.365] Exception code: EXCEPTION_ACCESS_VIOLATION
[18:15:58.365] Process tried to read from virtual address 0x6ddf0108
[18:15:58.365] Debug event: EXCEPTION_DEBUG_EVENT
[18:15:58.365] Thread ID = 0x0000136c
[18:15:58.365] First chance exception
[18:15:58.365] Exception address: 0x77b3e066