Not me. All files dated from 2000.
Could it be that the official patch didn't run on my machine so I just copied the files from an old HD?
Starting log
GPxPatch version: 4.44
GPx version detected: decrypted GP3 v1.13
Date/time: 24-04-2016 14:37
[14:37:33.187] Verbosity level is 2
[14:37:33.187] OS version info: Windows 10 build 10586
[14:37:33.188] Total physical memory: 4006 MB (free: 911 MB)
[14:37:33.188] Debugging gp3.exe
[14:37:33.247] Process created:
Process ID = 0x00002b18
Process handle = 0x000002cc
Main thread ID = 0x000037cc
Main thread handle = 0x000002d8
Process will run on CPU 0 only
[14:37:33.253] Waiting for debug events...
[14:37:33.333] Debug event: CREATE_PROCESS_DEBUG_EVENT
[14:37:33.333] Thread ID = 0x000037cc
[14:37:33.333] Entry point = 0x00523473
[14:37:33.334] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.334] Thread ID = 0x000037cc
[14:37:33.339] path
base 0x779c0000
size 1542816
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x00dc0000
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x75280000
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x00dc0000
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x00dc0000
[14:37:33.899] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.899] Thread ID = 0x000037cc
[14:37:33.899] path C:\WINDOWS\SysWOW64\KERNEL32.DLL
base 0x75280000
size 620176
[14:37:33.899] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.899] Thread ID = 0x000037cc
[14:37:33.899] path C:\WINDOWS\SysWOW64\KERNELBASE.dll
base 0x77840000
size 1557768
[14:37:33.901] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.901] Thread ID = 0x000037cc
[14:37:33.901] path C:\WINDOWS\SysWOW64\apphelp.dll
base 0x716d0000
size 581632
[14:37:33.903] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.903] Thread ID = 0x000037cc
[14:37:33.903] path C:\WINDOWS\AppPatch\AcGenral.DLL
base 0x5bde0000
size 2478592
[14:37:33.903] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.903] Thread ID = 0x000037cc
[14:37:33.903] path C:\WINDOWS\SysWOW64\msvcrt.dll
base 0x75750000
size 773168
[14:37:33.903] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.903] Thread ID = 0x000037cc
[14:37:33.903] path C:\WINDOWS\SysWOW64\sechost.dll
base 0x74740000
size 269616
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\RPCRT4.dll
base 0x74a10000
size 707600
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\SspiCli.dll
base 0x746d0000
size 116216
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\CRYPTBASE.dll
base 0x746c0000
size 31528
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\bcryptPrimitives.dll
base 0x75840000
size 360480
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\SHLWAPI.dll
base 0x746f0000
size 276336
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\combase.dll
base 0x74fb0000
size 1824264
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\GDI32.dll
base 0x74790000
size 1371792
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\USER32.dll
base 0x758a0000
size 1337240
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\ole32.dll
base 0x759f0000
size 957608
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\OLEAUT32.dll
base 0x771d0000
size 589856
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\SHELL32.dll
base 0x75db0000
size 21124344
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\cfgmgr32.dll
base 0x75430000
size 217976
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\windows.storage.dll
base 0x77340000
size 5242496
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\advapi32.dll
base 0x75b00000
size 499432
[14:37:33.907] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.907] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\kernel.appcore.dll
base 0x75680000
size 39792
[14:37:33.907] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.907] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\shcore.dll
base 0x74ac0000
size 569744
[14:37:33.907] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.907] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\powrprof.dll
base 0x77270000
size 270672
[14:37:33.908] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.908] Thread ID = 0x000037cc
[14:37:33.908] path C:\WINDOWS\SysWOW64\profapi.dll
base 0x772d0000
size 54752
[14:37:33.909] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.909] Thread ID = 0x000037cc
[14:37:33.909] path C:\WINDOWS\SysWOW64\UxTheme.dll
base 0x722a0000
size 458752
[14:37:33.909] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.909] Thread ID = 0x000037cc
[14:37:33.909] path C:\WINDOWS\SysWOW64\WINMM.dll
base 0x70390000
size 134352
[14:37:33.909] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.909] Thread ID = 0x000037cc
[14:37:33.909] path C:\WINDOWS\SysWOW64\samcli.dll
base 0x717a0000
size 67072
[14:37:33.910] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.910] Thread ID = 0x000037cc
[14:37:33.910] path C:\WINDOWS\SysWOW64\MSACM32.dll
base 0x720b0000
size 90912
[14:37:33.910] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.910] Thread ID = 0x000037cc
[14:37:33.910] path C:\WINDOWS\SysWOW64\VERSION.dll
base 0x72e40000
size 27360
[14:37:33.911] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.911] Thread ID = 0x000037cc
[14:37:33.911] path C:\WINDOWS\SysWOW64\USERENV.dll
base 0x71d20000
size 92480
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\dwmapi.dll
base 0x6fec0000
size 94208
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\urlmon.dll
base 0x705b0000
size 1500672
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\WINSPOOL.DRV
base 0x724d0000
size 400896
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\MPR.dll
base 0x72e10000
size 85720
[14:37:33.913] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.913] Thread ID = 0x000037cc
[14:37:33.913] path C:\WINDOWS\SysWOW64\WINMMBASE.dll
base 0x70330000
size 132744
[14:37:33.913] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.913] Thread ID = 0x000037cc
[14:37:33.913] path C:\WINDOWS\SysWOW64\iertutil.dll
base 0x72e50000
size 2919320
[14:37:33.913] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.913] Thread ID = 0x000037cc
[14:37:33.913] path C:\WINDOWS\SysWOW64\bcrypt.dll
base 0x72d90000
size 107408
[14:37:33.914] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.914] Thread ID = 0x000037cc
[14:37:33.914] path C:\WINDOWS\AppPatch\AcLayers.dll
base 0x5bb60000
size 335360
[14:37:33.915] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.915] Thread ID = 0x000037cc
[14:37:33.915] path C:\WINDOWS\SysWOW64\SETUPAPI.dll
base 0x74b50000
size 4268360
[14:37:33.915] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.915] Thread ID = 0x000037cc
[14:37:33.915] path C:\WINDOWS\SysWOW64\sfc.dll
base 0x66680000
size 3072
[14:37:33.915] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.915] Thread ID = 0x000037cc
[14:37:33.915] path C:\WINDOWS\SysWOW64\sfc_os.DLL
base 0x72320000
size 41984
[14:37:33.917] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] path
base 0x011e0000
size 8835072
[14:37:33.917] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] base 0x011e0000
[14:37:33.917] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] path
base 0x011e0000
size 8835072
[14:37:33.917] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] base 0x011e0000
[14:37:33.922] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.922] Thread ID = 0x000037cc
[14:37:33.922] path C:\WINDOWS\SysWOW64\IMM32.DLL
base 0x75810000
size 169928
[14:37:33.925] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x000037cc
[14:37:33.926] path C:\WINDOWS\SysWOW64\DDRAW.dll
base 0x5e500000
size 551424
[14:37:33.926] Debug event: CREATE_THREAD_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x00000dc4
[14:37:33.926] Thread handle = 0x000003a8
Start address = 0x779ec6d0
Thread local base = 0x0035a000
[14:37:33.926] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x000037cc
[14:37:33.926] path C:\WINDOWS\SysWOW64\DINPUT.dll
base 0x72070000
size 136192
[14:37:33.926] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x000037cc
[14:37:33.926] path C:\WINDOWS\SysWOW64\WSOCK32.dll
base 0x70480000
size 16384
[14:37:33.927] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.927] Thread ID = 0x000037cc
[14:37:33.927] path C:\WINDOWS\SysWOW64\WS2_32.dll
base 0x756f0000
size 388896
[14:37:33.927] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.927] Thread ID = 0x000037cc
[14:37:33.927] path C:\WINDOWS\SysWOW64\DSOUND.dll
base 0x5ddf0000
size 527360
[14:37:33.928] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.928] Thread ID = 0x000037cc
[14:37:33.928] path C:\GP3\binkw32.dll
base 0x10000000
size 262656
[14:37:33.928] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.928] Thread ID = 0x000037cc
[14:37:33.928] path C:\WINDOWS\SysWOW64\DCIMAN32.dll
base 0x72120000
size 11776
[14:37:33.929] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:33.929] Thread ID = 0x000037cc
[14:37:33.929] First chance exception
[14:37:33.929] Exception address: 0x77a6ccbc
[14:37:33.929] Module name: '' (base 0x779c0000, size 1542816)
[14:37:33.929] Exception flags: 0x00000000
[14:37:33.929] Exception code: EXCEPTION_BREAKPOINT
[14:37:33.929] Setting breakpoint on entry point (0x00523473)
[14:37:33.931] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:33.931] Thread ID = 0x000037cc
[14:37:33.931] First chance exception
[14:37:33.931] Exception address: 0x00523473
[14:37:33.931] Exception flags: 0x00000000
[14:37:33.931] Exception code: EXCEPTION_BREAKPOINT
[14:37:33.931] Removing breakpoint on entry point
[14:37:33.931] Injecting DLL loading code...
[14:37:33.931] Copying code to target at address 0x00d40000...
[14:37:33.931] Injection succesful
[14:37:33.931] Setting instruction pointer to injected code (0x00d40000)
[14:37:33.931] Debug event: CREATE_THREAD_DEBUG_EVENT
[14:37:33.931] Thread ID = 0x00003130
[14:37:33.931] Thread handle = 0x000003b0
Start address = 0x779ec6d0
Thread local base = 0x0035d000
[14:37:33.976] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.976] Thread ID = 0x000037cc
[14:37:33.976] path C:\GP3\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 28160
[14:37:34.034] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.034] Thread ID = 0x000037cc
[14:37:34.034] path C:\GP3\GPxPSup.dll
base 0x09900000
size 40960
[14:37:34.035] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.035] Thread ID = 0x000037cc
[14:37:34.035] path C:\WINDOWS\SysWOW64\imagehlp.dll
base 0x75ae0000
size 99176
[14:37:34.036] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:34.036] Thread ID = 0x000037cc
[14:37:34.036] base 0x75ae0000
[14:37:34.037] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.037] Thread ID = 0x000037cc
[14:37:34.037] path C:\WINDOWS\SysWOW64\imagehlp.dll
base 0x75ae0000
size 99176
[14:37:34.038] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:34.038] Thread ID = 0x000037cc
[14:37:34.038] base 0x75ae0000
[14:37:34.065] >> Starting WinMain
[14:37:34.065] >> Loading library
[14:37:34.115] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.115] Thread ID = 0x000037cc
[14:37:34.115] path C:\WINDOWS\SysWOW64\MSCTF.dll
base 0x748e0000
size 1174008
[14:37:34.117] >> WM_ACTIVATE (active)(not minimized)
[14:37:34.120] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.120] Thread ID = 0x000037cc
[14:37:34.120] path C:\WINDOWS\SysWOW64\clbcatq.dll
base 0x75470000
size 526304
[14:37:34.121] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.121] Thread ID = 0x000037cc
[14:37:34.121] path C:\WINDOWS\SysWOW64\msiltcfg.dll
base 0x6f6e0000
size 18432
[14:37:34.122] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.122] Thread ID = 0x000037cc
[14:37:34.122] path C:\WINDOWS\SysWOW64\msi.dll
base 0x72540000
size 3671040
[14:37:34.123] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.123] Thread ID = 0x000037cc
[14:37:34.123] path
base 0x729c0000
size 2142048
[14:37:34.126] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.126] Thread ID = 0x000037cc
[14:37:34.126] path C:\Program Files (x86)\Common Files\Microsoft Shared\INK\SKCHUI.DLL
base 0x02880000
size 3072
[14:37:34.126] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:34.126] Thread ID = 0x000037cc
[14:37:34.126] base 0x02880000
[14:37:34.127] Debug event: CREATE_THREAD_DEBUG_EVENT
[14:37:34.127] Thread ID = 0x000036a8
[14:37:34.127] Thread handle = 0x000003dc
Start address = 0x6f6e1ff0
Thread local base = 0x00360000
[14:37:34.134] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:34.134] Thread ID = 0x000037cc
[14:37:34.134] First chance exception
[14:37:34.134] Exception address: 0x00505cc5
[14:37:34.134] Exception flags: 0x00000000
[14:37:34.134] Exception code: EXCEPTION_ACCESS_VIOLATION
[14:37:34.134] Process tried to read from virtual address 0x00f74000
[14:37:34.136] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:34.136] Thread ID = 0x000037cc
[14:37:34.136] Unhandled exception
[14:37:34.136] Exception address: 0x00505cc5
[14:37:34.136] Exception flags: 0x00000000
[14:37:34.136] Exception code: EXCEPTION_ACCESS_VIOLATION
[14:37:34.136] Process tried to read from virtual address 0x00f74000
[14:37:34.136] Stack trace:
00505CC5: GP3\GPxPatch.exe! <no symbol>
00505A01: GP3\GPxPatch.exe! <no symbol>
73143E80: <no module><no symbol>
B60F5011: <no module><no symbol>
02E0C106: <no module><no symbol>
C4557005: <no module><no symbol>
58300300: <no module><no symbol>
804606EB: <no module><no symbol>
FA73143E: <no module><no symbol>
143E80C3: <no module><no symbol>
3E802F73: <no module><no symbol>
802A7408: <no module><no symbol>
2574093E: <no module><no symbol>
74033E80: <no module><no symbol>
053E801B: <no module><no symbol>
0F501174: <no module><no symbol>
E0C106B6: <no module><no symbol>
55700502: <no module><no symbol>
300300C4: <no module><no symbol>
8324EB58: <no module><no symbol>
06EB02C6: <no module><no symbol>
EB03C683: <no module><no symbol>
3E804601: <no module><no symbol>
80FA7314: <no module><no symbol>
F574083E: <no module><no symbol>
74093E80: <no module><no symbol>
033E80F0: <no module><no symbol>
3E80E674: <no module><no symbol>
C3DC7405: <no module><no symbol>
55565251: <no module><no symbol>
[14:37:35.083] Registers:
EAX=000009E8 ECX=00000074 ESI=00F74000
EBX=00000000 EDX=00000000 EDI=00C49626
CS:EIP=0023:00505CC5
SS:ESP=002B:0019FA98 EBP=7529FDE0
DS=002B ES=002B FS=0053 GS=002B
Flags=00010202
Stack dump:
0019fa98: 00505a01 00c49b58 00c49b6b 7529fde0 '.ZP.X...k.....)u'
0019faa8: 0019fabc 00000000 00000000 bb5774c7 '.............tW.'
0019fab8: 00000001 00505599 7529fde0 00523473 '.....UP...)us4R.'
0019fac8: 00f3568f 0051e5a9 05010d2d 00354000 '.V....Q.-....@5.'
0019fad8: 0000000a 0051e440 00400000 00f3568f '....@.Q...@..V..'
0019fae8: 0000000a 00000000 0019ff80 00354000 '.............@5.'
0019faf8: fffffffe 77a9e266 779fcc3e 00f54eb0 '....f..w>..w.N..'
0019fb08: bb6446ad 00f30000 00f54ea8 00f54eb0 '.Fd......N...N..'
0019fb18: 00000000 011d0000 00000000 00000000 '................'
0019fb28: 011d0000 011d0000 00000000 00000000 '................'
0019fb38: 007200e1 006f0069 00000000 00610072 '..r.i.o.....r.a.'
0019fb48: 00690073 00f30000 00000000 00000000 's.i.............'
0019fb58: 00650064 00f20000 4000006a 00000000 'd.e.....j..@....'
0019fb68: 77a40000 77a9daf4 00f30000 00000000 '...w...w........'
0019fb78: 00000b50 00000000 00000000 00f30000 'P...............'
0019fb88: 00f54ff8 00000001 40000062 00000000 '.O......b..@....'
0019fb98: 00000000 00000000 0019ff70 77a3ed50 '........p...P..w'
0019fba8: ccd691fd fffffffe 0019fbf8 779f0000 '...............w'
0019fbb8: 00000038 00000040 00000000 0019fbe8 '8...@...........'
0019fbc8: 40000062 0000001c 00001898 0000001b 'b..@............'
0019fbd8: 00f54ee6 00f54ee8 0019fc1c 7795215e '.N...N......^!.w'
0019fbe8: 00f54ee6 00c6a8f7 0019ff70 77a3ed50 '.N......p...P..w'
0019fbf8: ccd691bd fffffffe 0019fc28 779fb4c8 '........(......w'
0019fc08: 00f54ea8 00f54eb0 00000200 0000001c '.N...N..........'
0019fc18: 00f54eb0 0019fc64 7792efa5 00f54ee8 '.N..d......w.N..'
0019fc28: 0019fc64 7792efbc 00f30000 00000000 'd......w........'
0019fc38: 00f54eb0 00000220 75293880 778f77e7 '.N.. ....8)u.w.w'
0019fc48: 00000000 00f54eb0 00000000 00000000 '.....N..........'
0019fc58: 0000003f 00f35ad8 bb4e88a3 0019fca0 '?....Z....N.....'
0019fc68: 00529a81 00000000 00000220 00d21898 '..R..... .......'
0019fc78: ffffffff 00c6a8dc 0000003f 00000004 '........?.......'
0019fc88: 00000072 00000074 0019fc9c 00526f00 'r...t........oR.'
0019fc98: 00f23ca0 0019fcdc 00529960 0000000b '.<......`.R.....'
0019fca8: 0052796d 00523473 0052f00c 00cde1f0 'myR.s4R...R.....'
0019fcb8: 00000000 00000000 0000000e 00000000 '................'
0019fcc8: 00000003 00000074 00000000 00000072 '....t.......r...'
0019fcd8: 00000000 0019fdcc 00522f64 571d045e '........d/R.^..W'
0019fce8: 00000004 00000018 0000000e 00000025 '............%...'
0019fcf8: 00000022 00000000 000000b4 006f0048 '"...........H.o.'
0019fd08: 00610072 006f0020 00690066 00690063 'r.a. .o.f.i.c.i.'
0019fd18: 006c0061 00640020 0020006f 00720042 'a.l. .d.o. .B.r.'
0019fd28: 00730061 006c0069 00000000 00000000 'a.s.i.l.........'
0019fd38: 00000000 00000000 00000000 00020000 '................'
0019fd48: 00030006 003b0017 03e7003b 00000000 '......;.;.......'
0019fd58: 006f0048 00e10072 00690072 0020006f 'H.o.r...r.i.o. .'
0019fd68: 00720062 00730061 006c0069 00690065 'b.r.a.s.i.l.e.i.'
0019fd78: 006f0072 00640020 00200065 00650076 'r.o. .d.e. .v.e.'
0019fd88: 00e30072 0000006f 00000000 00000000 'r...o...........'
0019fd98: 000a0000 00030006 003b0017 03e7003b '..........;.;...'
0019fda8: ffffffc4 000407e0 00180000 0019ff80 '................'
0019fdb8: 005248c5 00000000 00523473 0052f00c '.HR.....s4R...R.'
0019fdc8: 00000080 00f233e8 00000080 00f233e8 '.....3.......3..'
0019fdd8: 77a90e83 00f23470 779c737c 00000008 '...wp4..|s.w....'
0019fde8: 00f233f0 00f20000 00f233e8 00000008 '.3.......3......'
0019fdf8: 00f233f0 00f20000 50000061 00f233f0 '.3......a..P.3..'
0019fe08: 00f20000 50000061 0019fe64 77a9ed06 '....a..Pd......w'
0019fe18: 77a4aa16 77a9ecef bb6444c9 00523473 '...w...w.Dd.s4R.'
0019fe28: 00f20000 00354000 50000061 00f20000 '.....@5.a..P....'
0019fe38: 50000061 0157fab0 00000080 0119fe18 'a..P..W.........'
0019fe48: bb6444c9 0019fe20 77a3ed50 0019febc '.Dd. ...P..w....'
0019fe58: 77a3ed50 ccd6858d fffffffe 77a9ecef 'P..w...........w'
0019fe68: 77a53f88 00f233f0 00523473 0052f014 '.?.w.3..s4R...R.'
0019fe78: 00354000 0000000d 0019fecc 00523f7a '.@5.........z?R.'
0019fe88: 00f20000 00000000 00f233f0 00523473 '.........3..s4R.'
0019fe98: 0052f014 00354000 28a14a40 b2ab95b8 '..R..@5.@J.(....'
0019fea8: 3b1d4265 00523473 00523473 0051fc40 'eB.;s4R.s4R.@.Q.'
0019feb8: 00354000 0019fec8 00526f00 00d21700 '.@5......oR.....'
0019fec8: 0019ff80 00523b67 778f05c3 00521856 '....g;R....wV.R.'
0019fed8: 0052f014 00521863 00000000 00354000 '..R.c.R......@5.'
0019fee8: 0051fc40 00523b7c bb4e8a33 0019ff80 '@.Q.|;R.3.N.....'
0019fef8: 00523553 00400000 00000000 00f3568f 'S5R...@......V..'
0019ff08: 0000000a 00523473 00523473 00354000 '....s4R.s4R..@5.'
0019ff18: c0000005 00f3568f 00000000 00000044 '.....V......D...'
0019ff28: 00f3db58 00f52300 00f52328 00000000 'X....#..(#......'
0019ff38: 00000000 00000000 00000000 00000000 '................'
0019ff48: 00000000 00000000 00000000 00000000 '................'
0019ff58: 00000000 ffffffff ffffffff ffffffff '................'
0019ff68: 0019ff0c 0019f4dc 0019ffcc 00526f0c '.............oR.'
0019ff78: 0052c810 00000000 0019ff94 752938f4 '..R..........8)u'
0019ff88: 00354000 752938d0 b9e4e833 0019ffdc '.@5..8)u3.......'
0019ff98: 77a25de3 00354000 bb644571 00000000 '.].w.@5.qEd.....'
0019ffa8: 00000000 00354000 c0000005 7797f300 '.....@5........w'
0019ffb8: 00000000 0019f4ac bb644571 0019ffa0 '........qEd.....'
0019ffc8: 0019f4ac 0019ffe4 77a3ed50 ccd68955 '........P..wU...'
0019ffd8: 00000000 0019ffec 77a25dae ffffffff '.........].w....'
0019ffe8: 77a4b7c2 00000000 00000000 00523473 '...w........s4R.'
0019fff8: 00354000 00000000 78746341 00000020 '.@5.....Actx ...'
001a0008: 00000001 000032d8 000000dc 00000000 '.....2..........'
001a0018: 00000020 00000000 00000014 00000001 ' ...............'
001a0028: 00000007 00000034 0000017c 00000001 '....4...|.......'
001a0038: 00000000 00000000 00000000 00000000 '................'
001a0048: 00000000 00000002 1a26ef4e 00000298 '........N.&.....'
001a0058: 00000044 000002e0 00000254 00000000 'D.......T.......'
001a0068: f33271ba 00000534 0000004a 00000580 '.q2.4...J.......'
001a0078: 00000336 00000000 2d59495b 000008b8 '6.......[IY-....'
001a0088: 00000032 000008ec 000002f4 00000000 '2...............'
001a0098: 32ceeacd 00000be0 00000042 00000c24 '...2....B...$...'
001a00a8: 00000324 00000000 38505fc8 00000f48 '$........_P8H...'
001a00b8: 0000005e 00000fa8 00000356 00000000 '^.......V.......'
001a00c8: b1280544 00001300 00000056 00001358 'D.(.....V...X...'
001a00d8: 00000386 00000010 00000009 000000ec '................'
001a00e8: 00000002 00000001 0000017c 0000159c '........|.......'
001a00f8: 00000001 00000002 00001718 000007a0 '................'
001a0108: 00000001 00000003 00001eb8 00000e8c '................'
001a0118: 00000001 00000004 00002d44 00000314 '........D-......'
001a0128: 00000002 00000005 00003058 00000098 '........X0......'
001a0138: 00000002 00000006 000030f0 000000cc '.........0......'
001a0148: 00000002 00000007 000031bc 000000f0 '.........1......'
001a0158: 00000001 00000009 000032ac 00000028 '.........2..(...'
001a0168: 00000002 0000000b 000032d4 00000004 '.........2......'
001a0178: 00000001 64487353 0000002c 00000001 '....SsHd,.......'
001a0188: 00000001 00000001 00000006 0000008c '................'
001a0198: 00000001 00001564 0000002c 0000005e '....d...,...^...'
001a01a8: 0000005e 00000000 00000000 00000000 '^...............'
001a01b8: 00000000 00000000 00000000 00000000 '................'
001a01c8: 00000000 00000000 00000002 00000024 '............$...'
001a01d8: 00000038 00000000 003a0043 0057005c '8.......C.:.\.W.'
001a01e8: 004e0049 004f0044 00530057 0057005c 'I.N.D.O.W.S.\.W.'
001a01f8: 006e0069 00780053 005c0073 00000000 'i.n.S.x.s.\.....'
001a0208: 1a26ef4e 0000011c 00000044 00000164 'N.&.....D...d...'
001a0218: 00000254 00000001 f33271ba 000003b8 'T........q2.....'
001a0228: 0000004a 00000404 00000336 00000002 'J.......6.......'
001a0238: 2d59495b 0000073c 00000032 00000770 '[IY-<...2...p...'
001a0248: 000002f4 00000003 32ceeacd 00000a64 '...........2d...'
001a0258: 00000042 00000aa8 00000324 00000004 'B.......$.......'
001a0268: 38505fc8 00000dcc 0000005e 00000e2c '._P8....^...,...'
001a0278: 00000356 00000005 b1280544 00001184 'V.......D.(.....'
001a0288: 00000056 000011dc 00000386 00000006 'V...............'
[14:37:38.841] Debug event: EXIT_THREAD_DEBUG_EVENT
[14:37:38.841] Thread ID = 0x000037cc
[14:37:38.841] Thread exit code = -1073741819
[14:37:38.841] Debug event: EXIT_THREAD_DEBUG_EVENT
[14:37:38.841] Thread ID = 0x000036a8
[14:37:38.841] Thread exit code = -1073741819
[14:37:38.841] Debug event: EXIT_THREAD_DEBUG_EVENT
[14:37:38.841] Thread ID = 0x00003130
[14:37:38.842] Thread exit code = -1073741819
[14:37:38.842] Debug event: EXIT_PROCESS_DEBUG_EVENT
[14:37:38.842] Thread ID = 0x00000dc4
[14:37:38.842] Process exit code = -1073741819