Unhandled exception at 0x00619521 in nfsw.exe (+0x569521): 0xC0000005: Access violation reading location 0x00000008. Register dump: EAX: 0x00000000 EBX: 0x1E306020 ECX: 0x1EAEBBD8 EDX: 0x00000000 EDI: 0x1EAEBBD8 ESI: 0x1EAEBBB0 EBP: 0x3884FCFC EIP: 0x00619521 ESP: 0x3884FCC8 EFL: 0x00010246 CS: 0x00000023 SS: 0x0000002B GS: 0x0000002B FS: 0x00000053 ES: 0x0000002B DS: 0x0000002B ST00: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] ST01: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] ST02: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] ST03: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] ST04: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] ST05: 0x00000000 0x00000000 0x00008000 0x083EC5E0 [ 0.000000 0.000000 0.000000 0.000000 ] ST06: 0xC5E00000 0xE242083E 0x0000402A 0xBADC0000 [ -7168.000000 -894815565625128124416.000000 0.000000 -0.001678 ] ST07: 0x00000000 0xB959BADC 0x0000401D 0x002B0000 [ 0.000000 -0.000208 0.000000 0.000000 ] XMM00: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] XMM01: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] XMM02: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] XMM03: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] XMM04: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] XMM05: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] XMM06: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] XMM07: 0x00000000 0x00000000 0x00000000 0x00000000 [ 0.000000 0.000000 0.000000 0.000000 ] Stack dump: 0x3884FCC8: 1EAEBBB0 002C7F05 00000000 0BC84400 00000000 00000000 0x3884FCE0: 0002BC54 00000000 002C6700 1EAEBBB0 00000000 1E30602C 0x3884FCF8: 1EAEBBD8 1E306020 00619D42 1EAEBBD8 00000E78 009A7688 0x3884FD10: 3884FD70 00619C90 027F7688 5CAC2F9A 00000000 060176C0 0x3884FD28: 00000E24 002A5B1B 1E306020 7533345E 7533345E 28EEB900 0x3884FD40: 00001000 009A76AC 0000259C 00000000 00619C90 1E306020 0x3884FD58: 3884FD34 3884F68C 3884FD98 0062D210 00903B38 FFFFFFFF 0x3884FD70: 3884FDA8 75333433 009A7688 DA174FE8 7533345E 7533345E 0x3884FD88: 28EEB900 C0000005 3884FD7C 3884F65C 3884FE10 7537CF5E 0x3884FDA0: 97AA7AE0 00000000 3884FDB4 753334C7 7533345E 3884FDC4 base: 0x38750000 top: 0x3884FCC8 bottom: 0x38850000 Backtrace (may be wrong): =>0x00619521 GThread::OnExit+0x18fe71 in nfsw.exe (+0x569521) (0x3884FCFC) 0x00619D42 GThread::OnExit+0x190692 in nfsw.exe (+0x569d42) (0x3884FD28) 0x002A5B1B GAcquireInterface::CanAcquire+0x14bf3b in nfsw.exe (+0x1f5b1b) (0x3884FD70) 0x75333433 endthreadex+0x44 in MSVCR90.dll (+0x23433) (0x3884FDA8) 0x753334C7 endthreadex+0xd8 in MSVCR90.dll (+0x234c7) (0x3884FDB4) 0x76D96359 BaseThreadInitThunk+0x19 in KERNEL32.DLL (+0x16359) (0x3884FDC4) 0x77C77C14 RtlGetAppContainerNamedObjectPath+0xe4 in ntdll.dll (+0x67c14) (0x3884FE20) 0x77C77BE4 RtlGetAppContainerNamedObjectPath+0xb4 in ntdll.dll (+0x67be4) (0x3884FE30)