Problems with my GP3 :( [gpx error log posted]

Posted by Assay 
Problems with my GP3 :( [gpx error log posted]
Date: April 24, 2012 06:03PM
Posted by: Assay
Hi,

After a install with no problems, my GP3 just won't start... well, this picture of the tire appears on the screen, but then it just disappear and an error report (the standard Windows XP report, of course), which says, that the GP3.ICD has some problems.
I tried the 1.13 patch, the gp3decrypt thing (which doesn't work, so I didn't get the decrypted .exe) and the No-CD thing (which doesn't work, because of the decrypt thing).
Then I tried the compatibility settings (which made it even worse) and then I realise, that I haven't any more ideas.
I run GP3 on the Windows XP-Mode thing on Win 7 (if I install it on Win7 it doesn't work too)

I didn't found anything like this in the forums, but i hope anybody can help me ^^

[Edit]: I don't know, what you mean with "set compatibility" [right now I (just) set the compatibility of GP3.exe to XP SP2], but here the error log download file:
[uploading.com]
(I'm sorry for the hoster if you don't like it, but unfortunately mediafire doesn't work :( ... and i hope the download works)



Edited 2 time(s). Last edit at 05/01/2012 12:15AM by mortal.
Re: Problems with my GP3 :(
Date: April 25, 2012 12:16AM
Posted by: mortal
The decrypted exe is the no-cd, one and the same. It is required. Compatibility to be set to XP SP 2. Download here. A clean installation is required. After patch installation, install gpx_patch, set compatibility, in gpx, set verbosity to high, cpu to 0 and start. On a forced exit, gpx will generate an error log.
If posting an error log, edit topic and place gpx log in the topic header please. It will run on Win 7, however it can take some doing.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :(
Date: April 29, 2012 09:28AM
Posted by: Assay
Already upload the file (with the error report) -> see first post
Re: Problems with my GP3 :(
Date: April 29, 2012 10:52AM
Posted by: mortal
Set the verbosity to high, copy/paste the log. That upload site is a shocker.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :(
Date: April 29, 2012 08:11PM
Posted by: Assay
It says that there are too many letters :( you could send me your email address or I send you a private massage with the Log (If it works with it)...?



Edited 1 time(s). Last edit at 04/29/2012 08:17PM by Assay.
Re: Problems with my GP3 :(
Date: April 30, 2012 11:07AM
Posted by: mortal
The easy fix is to paste it into two posts. Therefore, your next two posts in this thread will contain the log ok.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :(
Date: April 30, 2012 04:31PM
Posted by: Assay
Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP3 v1.13
Verbosity level is 2
OS version info: Windows NT 6.1 build 7600
Total physical memory: 2047 MB (free: 2047 MB)
Debugging gp3.exe
Process created:
Process ID = 0x0000088c
Process handle = 0x00000144
Main thread ID = 0x00001540
Main thread handle = 0x00000140
Process will run on CPU 0 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x00001540
Entry point = 0x00523473
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path ntdll.dll
base 0x76f20000
size 1289536
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\kernel32.dll
base 0x75ec0000
size 868352
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\KERNELBASE.dll
base 0x75250000
size 290816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\USER32.dll
base 0x75820000
size 811520
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\GDI32.dll
base 0x77100000
size 304640
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\LPK.dll
base 0x77090000
size 26624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x75950000
size 627200
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x75490000
size 690688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\WINSPOOL.DRV
base 0x6f7b0000
size 319488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\ADVAPI32.dll
base 0x76bf0000
size 640000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\SYSTEM32\sechost.dll
base 0x75380000
size 92160
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\RPCRT4.dll
base 0x753e0000
size 652288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\ole32.dll
base 0x755f0000
size 1413632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x678b0000
size 531968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\DCIMAN32.dll
base 0x738e0000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\SETUPAPI.dll
base 0x76d80000
size 1668608
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\CFGMGR32.dll
base 0x750e0000
size 145920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\OLEAUT32.dll
base 0x76c90000
size 571904
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\DEVOBJ.dll
base 0x75110000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dwmapi.dll
base 0x73a20000
size 67072
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\DINPUT.dll
base 0x6b630000
size 136704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x733a0000
size 194048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\WSOCK32.dll
base 0x70aa0000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\WS2_32.dll
base 0x753a0000
size 206336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\NSI.dll
base 0x77080000
size 8704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\DSOUND.dll
base 0x67360000
size 453632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\POWRPROF.dll
base 0x744f0000
size 145408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Program Files\Microprose\Grand Prix 3\binkw32.dll
base 0x10000000
size 262656
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001540
First chance exception
Exception address: 0x76fbebbe
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x00523473)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\apphelp.dll
base 0x74fa0000
size 292864
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\AppPatch\AcGenral.DLL
base 0x6ab30000
size 2175488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\SspiCli.dll
base 0x74f80000
size 99840
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\SHLWAPI.dll
base 0x76d20000
size 350208
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x73cd0000
size 249856
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\samcli.dll
base 0x737a0000
size 50688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\MSACM32.dll
base 0x73120000
size 72192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\VERSION.dll
base 0x74530000
size 21504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\SHELL32.dll
base 0x75fa0000
size 12867584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\sfc.dll
base 0x6eb00000
size 2560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\sfc_os.DLL
base 0x6eaf0000
size 40960
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\USERENV.dll
base 0x74690000
size 79360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\profapi.dll
base 0x75070000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\urlmon.dll
base 0x75b80000
size 1230336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\WININET.dll
base 0x759f0000
size 981504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\iertutil.dll
base 0x75cc0000
size 2072576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\CRYPT32.dll
base 0x75130000
size 1151488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\MSASN1.dll
base 0x77060000
size 34816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\MPR.dll
base 0x70f20000
size 64000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x01120000
size 8835072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x01120000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x01120000
size 8835072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x01120000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x01120000
size 8835072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x01120000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\AppPatch\AcLayers.dll
base 0x6bf10000
size 559616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\AppPatch\AcXtrnal.DLL
base 0x621d0000
size 211968
>> FTH: (2188): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\SHUNIMPL.DLL
base 0x73f70000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\SortServer2003Compat.dll
base 0x73f60000
size 38400
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\IMM32.DLL
base 0x75360000
size 118272
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\MSCTF.dll
base 0x75750000
size 828928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x00330000
size 44544
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x00330000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001540
First chance exception
Exception address: 0x00523473
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x00330000...
Injection succesful
Setting instruction pointer to injected code (0x00330000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Program Files\Microprose\Grand Prix 3\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x75540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x75540000
>> Starting WinMain
>> Loading library
>> WM_ACTIVATE (active)(not minimized)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\CRYPTBASE.dll
base 0x74ff0000
size 36864
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\CLBCatQ.DLL
base 0x75af0000
size 522240
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001348
Thread handle = 0x00000250
Start address = 0x733aa3f5
Thread local base = 0x7fffd000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dplayx.dll
base 0x6ebd0000
size 213504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dpmodemx.dll
base 0x71570000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\TAPI32.dll
base 0x6ff80000
size 192000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000e14
Thread handle = 0x00000260
Start address = 0x6ebf9682
Thread local base = 0x7fffc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd\comctl32.dll
base 0x73f80000
size 1680896
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71570000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x6ff80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dpmodemx.dll
base 0x71540000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x6ff80000
size 192000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\rtutils.dll
base 0x73610000
size 37376
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001754
Thread handle = 0x00000274
Start address = 0x76f4ec2e
Thread local base = 0x7fffb000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000cbc
Thread handle = 0x00000278
Start address = 0x6ff8f1ac
Thread local base = 0x7fffa000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000cbc
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71540000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x6ff80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dpwsockx.dll
base 0x71570000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x74ab0000
size 232448
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\System32\wshtcpip.dll
base 0x745c0000
size 9216
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dpnathlp.dll
base 0x71530000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\CRYPTSP.dll
base 0x74af0000
size 78848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\rsaenh.dll
base 0x74890000
size 242936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\iphlpapi.dll
base 0x72ff0000
size 103936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\WINNSI.DLL
base 0x72f40000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x73640000
size 325120
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\rasman.dll
base 0x73620000
size 76800
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dhcpcsvc.DLL
base 0x72b00000
size 61952
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000039c
Thread handle = 0x000002a4
Start address = 0x74ab6f14
Thread local base = 0x7fffa000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001360
Thread handle = 0x000002a8
Start address = 0x71574819
Thread local base = 0x7fff9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x73640000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x73620000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71530000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001360
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x745c0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000039c
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71570000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000e14
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\NLAapi.dll
base 0x73360000
size 51712
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\DNSAPI.dll
base 0x74970000
size 269824
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\System32\winrnr.dll
base 0x6ea70000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\napinsp.dll
base 0x6e960000
size 52224
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\pnrpnsp.dll
base 0x6e940000
size 65024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\wshbth.dll
base 0x6e6c0000
size 35840
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
base 0x70d30000
size 145280
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\PSAPI.DLL
base 0x770a0000
size 6144
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\System32\fwpuclnt.dll
base 0x72c60000
size 216576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\rasadhlp.dll
base 0x70d20000
size 11776
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x73360000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x6ea70000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x6e960000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x6e940000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x6e6c0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x70d30000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x770a0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x72c60000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\dpmodemx.dll
base 0x71570000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\TAPI32.dll
base 0x6ff80000
size 192000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000a38
Thread handle = 0x000002d0
Start address = 0x6ebf9682
Thread local base = 0x7fffc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001538
Thread handle = 0x000002d4
Start address = 0x6ff8f1ac
Thread local base = 0x7fffa000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000a38
Thread exit code = 0
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001538
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71570000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x6ff80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x6b780000
size 513024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\atiu9pag.dll
base 0x73560000
size 22528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\atiumdag.dll
base 0x62cf0000
size 3975680
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\atiumdva.dll
base 0x629e0000
size 3058688
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000944
Thread handle = 0x000002e0
Start address = 0x76f4d466
Thread local base = 0x7fffc000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\D3DIM700.DLL
base 0x6aa60000
size 817664
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path
base 0x71570000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\WINTRUST.dll
base 0x75330000
size 172032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\bcrypt.dll
base 0x74c30000
size 80384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\bcryptprimitives.dll
base 0x74790000
size 249680
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000011b8
Thread handle = 0x000002f8
Start address = 0x75167bbd
Thread local base = 0x7fffa000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\ncrypt.dll
base 0x74c50000
size 219136
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\GPAPI.dll
base 0x74670000
size 79872
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000fdc
Thread handle = 0x00000304
Start address = 0x76f4d466
Thread local base = 0x7fff9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71570000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000fb4
Thread handle = 0x00000308
Start address = 0x76f4d466
Thread local base = 0x7fff8000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\mscat32.dll
base 0x71540000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\mscat32.dll
base 0x71570000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71570000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\mscat32.dll
base 0x71540000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
base 0x71540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\HID.DLL
base 0x73d60000
size 22016
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001540
path C:\Windows\system32\WmJoyFrc.dll
base 0x013c0000
size 255560
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001744
Thread handle = 0x00000320
Start address = 0x013c88f0
Thread local base = 0x7fff7000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001068
Thread handle = 0x00000324
Start address = 0x013c88f0
Thread local base = 0x7fff6000
>> Device doesn't support Saturation
>> Device doesn't support Pos/Neg Coefficients
>> Device doesn't support Pos Neg Saturation
>> Device doesn't support deadband
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000089c
Thread handle = 0x00000328
Start address = 0x6b637db4
Thread local base = 0x7fff5000
>> Device supports Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device supports deadband
>> Using Constant force
>> Device supports Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device supports deadband
>> Using Constant force
>> In ddraw_set_screen
>> No change in cooperative level
>> changed window size
>> ddraw_set_screen finished ok.
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000015bc
Thread handle = 0x0000032c
Start address = 0x00523185
Thread local base = 0x7fff4000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\dx\gpxpdx7.dll
base 0x09980000
size 139332
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
base 0x75540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 39424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
base 0x75540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path
base 0x09d00000
size 12288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
base 0x75540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 37376
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
base 0x75540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 50688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
base 0x75540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\system32\imagehlp.dll
base 0x75540000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
base 0x75540000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\System32\MMDevApi.dll
base 0x73d20000
size 213504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000015bc
path C:\Windows\System32\PROPSYS.dll
base 0x73e40000
size 988160
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001280
Thread handle = 0x0000036c
Start address = 0x6738e4a1
Thread local base = 0x7fff3000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001280
path C:\Windows\system32\AUDIOSES.DLL
base 0x73280000
size 195584
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000164c
Thread handle = 0x00000374
Start address = 0x73d22f69
Thread local base = 0x7fff2000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000017f0
Thread handle = 0x00000378
Start address = 0x76f4d466
Thread local base = 0x7fff1000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000e74
Thread handle = 0x0000037c
Start address = 0x6738e4a1
Thread local base = 0x7fff0000
>> Bink init>> Bink init completed
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x00505ca8
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00d23000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
Re: Problems with my GP3 :(
Date: April 30, 2012 04:33PM
Posted by: Assay
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
Re: Problems with my GP3 :(
Date: April 30, 2012 04:33PM
Posted by: Assay
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
Re: Problems with my GP3 :(
Date: April 30, 2012 04:33PM
Posted by: Assay
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
Re: Problems with my GP3 :(
Date: April 30, 2012 04:34PM
Posted by: Assay
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
First chance exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000015bc
Unhandled exception
Exception address: 0x76f720d5
Module name: 'ntdll.dll' (base 0x76f20000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Stack trace:
76F720D5: Windows\SYSTEM32\ntdll.dll! RtlAllocateHeap + 32 bytes
621D93DE: <no module><no symbol>
00527B9E: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
00524888: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
0052320A: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
75F11114: Windows\system32\kernel32.dll! BaseThreadInitThunk + 18 bytes
76F7B429: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 99 bytes
76F7B3FC: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 54 bytes
Registers:
EAX=01470A60 ECX=7FFF4000 ESI=00000000
EBX=6DDF00C4 EDX=00000057 EDI=000000A0
CS:EIP=001B:76F720D5
SS:ESP=0023:05A011A0 EBP=05A0120C
DS=0023 ES=0023 FS=003B GS=0000
Flags=00210293
Stack dump:
05a011a0: 000000a0 00000008 00000080 00000000 '................'
05a011b0: 00000000 00000000 00000000 00000000 '................'
05a011c0: 00000000 00000000 00000000 00000000 '................'
05a011d0: 00000000 00000000 00000000 00000000 '................'
05a011e0: 00000000 00000000 00000000 00000000 '................'
05a011f0: 00000000 00000000 00000000 00000000 '................'
05a01200: 00000000 00000000 00000000 05a0122c '............,...'
05a01210: 621d93de 6ddf00c4 00000008 000000a0 '...b...m........'
05a01220: 00000057 00000080 00000000 05a01274 'W...........t...'
05a01230: 00527b9e 6ddf00c4 00000008 00000080 '.{R....m........'
05a01240: 00000057 00000000 05afff78 05a012e8 'W.......x.......'
05a01250: 76f3d555 00000000 00000074 05a0126c 'U..v....t...l...'
05a01260: 75256aee 05a012e8 00526f0c 0052c9b8 '.j%u.....oR...R.'
05a01270: ffffffff 05a0129c 00524888 00000001 '.........HR.....'
05a01280: 00000080 0052c800 00000000 00527c6b '......R.....k|R.'
05a01290: 00000000 05afff78 c0000005 05afff88 '....x...........'
05a012a0: 0052320a c0000005 05a012c8 00526f57 '.2R.........WoR.'
05a012b0: 05a012d0 00000000 05a012d0 00000000 '................'
05a012c0: 00000000 00000000 05a013bc 05a013d8 '................'
05a012d0: 05a012f4 76f66449 05a013bc 05afff78 '....Id.v....x...'
05a012e0: 05a013d8 05a01390 05a01780 76f6645d '............]d.v'
05a012f0: 05afff78 05a013a4 76f6641b 05a013bc 'x........d.v....'
05a01300: 05afff78 05a013d8 05a01390 00526f0c 'x............oR.'
05a01310: 05afff78 05a013bc 05afff78 76f48b7d 'x.......x...}..v'
05a01320: 05a013bc 05afff78 05a013d8 05a01390 '....x...........'
05a01330: 00526f0c 000000a0 05a013bc 00000000 '.oR.............'
05a01340: 00000000 00000000 00000000 00000000 '................'
05a01350: 00000000 00000000 00000000 00000000 '................'
05a01360: 00000000 00000000 00000000 00000000 '................'
05a01370: 00000000 00000000 00000000 00000000 '................'
05a01380: 00000000 00000000 00000000 00000000 '................'
05a01390: 05afff78 00000072 05b00000 05a01000 'x...r...........'
05a013a0: 00000000 05a01728 76f662a7 00a013bc '....(....b.v....'
05a013b0: 05a013d8 05a013bc 05a013d8 c0000005 '................'
05a013c0: 00000010 00000000 76f720d5 00000002 '......... .v....'
05a013d0: 00000000 6ddf0108 0001003f 00000000 '.......m?.......'
05a013e0: 00000000 00000000 00000000 00000000 '................'
05a013f0: 00000000 0000027f 00000020 0000ffff '........ .......'
05a01400: 00483395 031d001b 00936344 00000023 '.3H.....Dc..#...'
05a01410: 00000000 00000000 00000000 00000000 '................'
05a01420: 00000000 00000000 00000000 00000000 '................'
05a01430: 00000000 00000000 00000000 00000000 '................'
05a01440: 00000000 00000000 00000000 00000000 '................'
05a01450: 9c400000 0000400c 00000000 400c9c40 '..@..@......@..@'
05a01460: 00000000 00000000 0000003b 00000023 '........;...#...'
05a01470: 00000023 000000a0 00000000 6ddf00c4 '#..............m'
05a01480: 00000057 7fff4000 01470a60 05a01728 'W....@..`.G.(...'
05a01490: 76f720d5 0000001b 00210293 05a016bc '. .v......!.....'
05a014a0: 00000023 0020027f 031d0000 00483395 '#..... ......3H.'
05a014b0: 0000001b 00936344 00000023 00001f80 '....Dc..#.......'
05a014c0: 0000ffff 00000000 00000000 00000000 '................'
05a014d0: 00000000 00000000 00000000 00000000 '................'
05a014e0: 00000000 00000000 00000000 00000000 '................'
05a014f0: 00000000 00000000 00000000 00000000 '................'
05a01500: 00000000 00000000 00000000 00000000 '................'
05a01510: 00000000 00000000 00000000 00000000 '................'
05a01520: 00000000 00000000 9c400000 0000400c '..........@..@..'
05a01530: 00000000 00000000 9c400000 0000400c '..........@..@..'
05a01540: 00000000 00000000 00000000 00000000 '................'
05a01550: 00000000 00000000 00000000 00000000 '................'
05a01560: 00000000 0036007b 00390039 00610034 '....{.6.9.9.4.a.'
05a01570: 00300064 002d0034 00330039 00660065 'd.0.4.-.9.3.e.f.'
05a01580: 0031002d 00640031 002d0030 00330061 '-.1.1.d.0.-.a.3.'
05a01590: 00630063 0030002d 00610030 00630030 'c.c.-.0.0.a.0.c.'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001348
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001280
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000e74
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001744
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001068
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000089c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001540
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000015bc
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001754
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000944
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000011b8
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000fdc
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000fb4
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000164c
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x000017f0
Process exit code = -1073741819
Re: Problems with my GP3 :(
Date: May 01, 2012 12:14AM
Posted by: mortal
Windows appears to be having trouble with your ntdll.dll. I don't think I've ever seen so many exceptions in the one log for it. It could be corrupt, however I'm no expert with an error log. I've edited your topic header, maybe Lo2k will see it and take a look as well.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 01, 2012 08:05AM
Posted by: Assay
Okey, thanks in advance
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 01, 2012 10:45AM
Posted by: Lo2k
Well, I'm not expert on GP3 logs (nor GP4 ones anyway :p) and I already saw ntdll.dll errors of this kind but I really don't know if it comes from Windows, from a graphical card driver or from the GP4 installation...
My advice would be to reinstall the whole original game (with no decrypt, patch, update or anything) and check if it runs correctly...

Edit : Looking at it again, I can't see any screen resolution list in your log and there should be one, so maybe it's something linked to your graphical card and/or graphical card driver.





Edited 1 time(s). Last edit at 05/01/2012 10:49AM by Lo2k.
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 01, 2012 11:55AM
Posted by: Assay
Well, everytime I install DirectX 7 (after the GP3 (re-)install), it says, that the system don't support DirectX 7 - could that the problem be?
Anyway: Now I reinstalled it (with deleted the Micropose - folder first) and then run the .exe with compatibility set to XP S2 and then with the regular Win7 - both times i tried with "run as administrator" and without. it's still not working :(
Should I install just gpxpatch and make an errorlog again?
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 01:22AM
Posted by: mortal
Before a re-install, the registry should be cleaned. Use CCleaner to do this. Please post your system specs.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 01:42PM
Posted by: pirx
could it be your install CD has an error?
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 02:45PM
Posted by: Assay
Its absolutely not the CD, because I tried to play on a friend's computer (Windows XP ... I guess SP2) and it works ABSOLUTELY fine ^^ Now I try to reinstall and clean the registry first
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 03:19PM
Posted by: Assay
Still don't work... System Specs:
Windows 7 - 32Bit
Intel Core i3 550 - 4x 3.2 GHz
4 GB DDR3
ATI Radeon HD 5670 - 512 GB
1000 GB harddrive
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 03:48PM
Posted by: mortal
That computer would run GP4. If you re-install GP3, you must have this.
gpx patch is required, cpu to 0, verbosity to medium to test. All exe must be set to XP SP2. The decrypter is a fallacy, not required.
Install off disc, run once with disc in installation drive. Exit. Patch, install no cd. Set properties. etc. etc. AFAIK, this info is in the FAQ.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy