First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc