Can't use debug mode of GPxPatch without causing a crash

Posted by elio2012 
Hi guys

Any idea why this might be? It happens with all versions including 3.91 and 4.24 and 4.44 in my case.

This is the error log I get:


Starting log
GPxPatch version: 3.91
GPx version detected: decrypted GP3 v1.13
Verbosity level is 2
OS version info: Windows NT 6.1 Service Pack 1 build 7601
Total physical memory: 2047 MB (free: 1664 MB)
Debugging gp3v.exe
Process created:
Process ID = 0x000017b4
Process handle = 0x0000014c
Main thread ID = 0x00001660
Main thread handle = 0x00000148
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x00001660
Entry point = 0x00523473
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path ntdll.dll
base 0x77a50000
size 1310528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x77120000
size 872448
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x75cb0000
size 294400
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\USER32.dll
base 0x777a0000
size 811520
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\GDI32.dll
base 0x761b0000
size 305664
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\LPK.dll
base 0x77640000
size 26112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\USP10.dll
base 0x77510000
size 627712
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\msvcrt.dll
base 0x77460000
size 690688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\WINSPOOL.DRV
base 0x71350000
size 320000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\ADVAPI32.dll
base 0x76200000
size 644096
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\SYSTEM32\sechost.dll
base 0x75ec0000
size 92160
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\RPCRT4.dll
base 0x77940000
size 655360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\ole32.dll
base 0x75d60000
size 1414144
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\DDRAW.dll
base 0x654b0000
size 531968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x74230000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\SETUPAPI.dll
base 0x76330000
size 1667584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\CFGMGR32.dll
base 0x75a90000
size 145920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\OLEAUT32.dll
base 0x775b0000
size 572416
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\DEVOBJ.dll
base 0x75d20000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\dwmapi.dll
base 0x74480000
size 67584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\DINPUT.dll
base 0x6f580000
size 136704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\WINMM.dll
base 0x6ba90000
size 194048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\WSOCK32.dll
base 0x73240000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x77200000
size 206848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\NSI.dll
base 0x77bb0000
size 8704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\DSOUND.dll
base 0x6dc30000
size 453632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\POWRPROF.dll
base 0x74ea0000
size 145408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Users\Philip\Documents\RACING\SEASONS\85 GRAND PRIX\binkw32.dll
base 0x10000000
size 262656
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001660
First chance exception
Exception address: 0x77af0541
Module name: 'ntdll.dll' (base 0x77a50000, size 1310528)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x00523473)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\apphelp.dll
base 0x758d0000
size 295936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\AppPatch\AcGenral.DLL
base 0x5c630000
size 2178560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\SspiCli.dll
base 0x758a0000
size 99840
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\SHLWAPI.dll
base 0x77c10000
size 350208
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\UxTheme.dll
base 0x747b0000
size 249856
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\samcli.dll
base 0x741e0000
size 51200
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\MSACM32.dll
base 0x6ac50000
size 72192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\VERSION.dll
base 0x74ee0000
size 21504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\SHELL32.dll
base 0x764d0000
size 12877824
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\sfc.dll
base 0x73280000
size 2560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\sfc_os.DLL
base 0x711f0000
size 40960
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\USERENV.dll
base 0x75a50000
size 81920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\profapi.dll
base 0x75a30000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x77650000
size 1309696
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0.dll
base 0x75d10000
size 5632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0.dll
base 0x75d40000
size 9728
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
base 0x75a80000
size 10752
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
base 0x75d50000
size 4096
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
base 0x75d00000
size 3072
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0.dll
base 0x75a70000
size 2560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\normaliz.DLL
base 0x77450000
size 2048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\iertutil.dll
base 0x75f70000
size 2278912
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\WININET.dll
base 0x77240000
size 1950720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\MPR.dll
base 0x6e2f0000
size 64000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x01e10000
size 8839168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
base 0x01e10000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x01e10000
size 8839168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
base 0x01e10000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path
base 0x01e10000
size 8839168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
base 0x01e10000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\IMM32.DLL
base 0x77430000
size 118272
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\MSCTF.dll
base 0x77870000
size 828928
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001660
First chance exception
Exception address: 0x00523473
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x001f0000...
Injection succesful
Setting instruction pointer to injected code (0x001f0000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Users\Philip\Documents\RACING\SEASONS\85 GRAND PRIX\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Users\Philip\Documents\RACING\SEASONS\85 GRAND PRIX\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\imagehlp.dll
base 0x77c70000
size 159232
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
base 0x77c70000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\imagehlp.dll
base 0x77c70000
size 159232
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
base 0x77c70000
>> Starting WinMain
>> Loading library
>> WM_ACTIVATE (active)(not minimized)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001660
path C:\Windows\system32\CRYPTBASE.dll
base 0x75950000
size 36352
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001660
First chance exception
Exception address: 0x00505cc5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x002d6000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001660
Unhandled exception
Exception address: 0x00505cc5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x002d6000
Stack trace:
00505CC5: Users\Philip\Documents\RACING\SEASONS\85 GRAND PRIX\GPxPatch.ex!<no symbol><no symbol>
00505A01: Users\Philip\Documents\RACING\SEASONS\85 GRAND PRIX\GPxPatch.ex!<no symbol><no symbol>
Registers:
EAX=000009E8 ECX=00000075 ESI=002D6000
EBX=00000000 EDX=77A96BF4 EDI=00C49622
CS:EIP=001B:00505CC5
SS:ESP=0023:0012FAA0 EBP=7715F2F0
DS=0023 ES=0023 FS=003B GS=0000
Flags=00010216
Stack dump:
0012faa0: 00505a01 00c49b58 00c49b6b 7715f2f0 '.ZP.X...k......w'
0012fab0: 0012fac4 00000000 77a96bf4 0012fa9c '.........k.w....'
0012fac0: 00000001 00505599 7715f2f0 00000000 '.....UP....w....'
0012fad0: 002920f0 0051e5a9 05010c94 7ffda000 '. )...Q.........'
0012fae0: 0000000a 0051e440 00400000 002920f0 '....@.Q...@.. ).'
0012faf0: 0000000a 00000000 0012ff88 7ffda000 '................'
0012fb00: 00290000 00290000 00000000 00290000 '..)...).......).'
0012fb10: 00000000 01010000 0012fafc 00000000 '................'
0012fb20: 0012fc14 77a6e145 00216bb8 fffffffe '....E..w.k!.....'
0012fb30: 77b16b6c 77ad9dbf 00290000 50000063 'lk.w...w..).c..P'
0012fb40: 77aa63b0 77998d84 00000000 00290000 '.c.w...w......).'
0012fb50: 002bc598 0012fb7c 00000000 0012fb7c '..+.|.......|...'
0012fb60: 77a7cfe0 00000000 0012fbc8 4000006a '...w........j..@'
0012fb70: 0012fbcc 00000000 00290000 002be138 '..........).8.+.'
0012fb80: 00000000 00000011 00290000 0012fbac '..........).....'
0012fb90: 0012fad8 002be138 0012ff78 77a6e145 '....8.+.x...E..w'
0012fba0: 00216058 00000004 77aa5c13 77aa5920 'X`!......\.w Y.w'
0012fbb0: 00000024 00000000 00000000 0012fc1c '$...............'
0012fbc0: 00000012 00d21898 0000003f 00740040 '........?...@.t.'
0012fbd0: 0072007a 00730065 00000000 006c006c 'z.r.e.s.....l.l.'
0012fbe0: 002d002c 00360032 00000032 00000011 ',.-.2.6.2.......'
0012fbf0: 002bc5ba 00c6a8ed 00000000 01002c76 '..+.........v,..'
0012fc00: 002925c0 00000220 0000c5ba 0012fb44 '.%). .......D...'
0012fc10: 00c6a91b 0012ff78 77a6e145 00216078 '....x...E..wx`!.'
0012fc20: fffffffe 77aa63b0 77aa63e6 002bc590 '.....c.w.c.w..+.'
0012fc30: 002bc598 00000012 00000012 0000003f '..+.........?...'
0012fc40: 002bc590 0012fc6c 75cd2bc0 00290000 '..+.l....+.u..).'
0012fc50: 00000000 002bc598 00000220 7716f0aa '......+. ......w'
0012fc60: 00000000 002925c0 002bc598 0012fca8 '.....%)...+.....'
0012fc70: 00529a81 00000200 00000220 00d21898 '..R..... .......'
0012fc80: 00000000 00c6a8dc 0000003f 00000004 '........?.......'
0012fc90: 00000074 00000068 0012fca4 00526f00 't...h........oR.'
0012fca0: 02d00d10 0012fce4 00529960 0000000b '........`.R.....'
0012fcb0: 0052796d 00000000 0052f00c 00cde1f0 'myR.......R.....'
0012fcc0: 00000000 00000000 00000016 00000000 '................'
0012fcd0: 00000003 00000074 00010005 00000068 '....t.......h...'
0012fce0: 00000000 0012fdd4 00522f64 57101641 '........d/R.A..W'
0012fcf0: 00000004 0000000e 00000016 0000000e '................'
0012fd00: 00000019 00000001 00000000 004d0047 '............G.M.'
0012fd10: 00200054 00740053 006e0061 00610064 'T. .S.t.a.n.d.a.'
0012fd20: 00640072 00540020 006d0069 00000065 'r.d. .T.i.m.e...'
0012fd30: 0063006f 006d0075 006e0065 00730074 'o.c.u.m.e.n.t.s.'
0012fd40: 0052005c 00430041 004e0049 000a0000 '\.R.A.C.I.N.....'
0012fd50: 00050000 00000002 00000000 00000000 '................'
0012fd60: 004d0047 00200054 00610044 006c0079 'G.M.T. .D.a.y.l.'
0012fd70: 00670069 00740068 00540020 006d0069 'i.g.h.t. .T.i.m.'
0012fd80: 00000065 0045002e 00450058 77a60000 'e.....E.X.E....w'
0012fd90: 0012fe28 77a6e145 00217760 fffffffe ';(...E..w`w!.....'
0012fda0: 00030000 00050000 00000001 00000000 '................'
0012fdb0: ffffffc4 000407e0 000e0004 0012ff88 '................'
0012fdc0: 005248c5 00000000 00000000 0052f00c '.HR...........R.'
0012fdd0: 00522e6c 0051cce8 57100831 00000000 'l.R...Q.1..W....'
0012fde0: 00000080 00000080 02d01c40 77afdc10 '........@......w'
0012fdf0: 02d01cc8 77afdc7c 00000008 02d01c48 '....|..w....H...'
0012fe00: 02d01c40 02d00000 0012fe28 77ae171f '@.......(......w'
0012fe10: 00000008 02d01c40 02d00000 02d01c48 '....@.......H...'
0012fe20: 02d01c48 00000001 02d00000 0012fe70 'H...........p...'
0012fe30: 77b17055 02d00138 77b17039 77998fd0 'Up.w8...9p.w...w'
0012fe40: 00000000 02d00000 7ffda000 00000080 '................'
0012fe50: 00000080 0112fe38 0012fe3c 0012fec0 '....8...<.......'
0012fe60: 0012fec4 77a6e145 00216b18 fffffffe '....E..w.k!.....'
0012fe70: 77b17039 77ad907c 02d00000 50000061 '9p.w|..w....a..P'
0012fe80: 02d01c48 0052f014 0012fed4 00523f7a 'H.....R.....z?R.'
0012fe90: 02d00000 00000000 02d01c48 00000000 '........H.......'
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x00001660
Process exit code = -1073741819
Did you manage to get it working? I have the same problem under Windows 10.
No, sadly I have not managed to solve this yet. I think it is to do with the GPxpatch.exe file itself as changing everyting else (including the GP3.eve and contents of the gpxdata file) makes no difference. Rene Smit has said he will take a look once he is feeling well again. I can run in debug mode with GP3 2000 and other people's copy of their game (GP3 1.13 shared by Holemad) will run on my computer, although at high PO.

I'll post if I discover any solution.

Cheers,

Elio
GP32k will run on debug mode in my computer too, but it is so slow that it is not worthy.
Have you edited any strings in ldata?

René Smit, Independent Software Developer.
Download my GPx tools here.
Not me. All files dated from 2000.

Could it be that the official patch didn't run on my machine so I just copied the files from an old HD?

Starting log
GPxPatch version: 4.44
GPx version detected: decrypted GP3 v1.13
Date/time: 24-04-2016 14:37
[14:37:33.187] Verbosity level is 2
[14:37:33.187] OS version info: Windows 10 build 10586
[14:37:33.188] Total physical memory: 4006 MB (free: 911 MB)
[14:37:33.188] Debugging gp3.exe
[14:37:33.247] Process created:
Process ID = 0x00002b18
Process handle = 0x000002cc
Main thread ID = 0x000037cc
Main thread handle = 0x000002d8
Process will run on CPU 0 only
[14:37:33.253] Waiting for debug events...
[14:37:33.333] Debug event: CREATE_PROCESS_DEBUG_EVENT
[14:37:33.333] Thread ID = 0x000037cc
[14:37:33.333] Entry point = 0x00523473
[14:37:33.334] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.334] Thread ID = 0x000037cc
[14:37:33.339] path
base 0x779c0000
size 1542816
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x00dc0000
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x75280000
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x00dc0000
[14:37:33.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.876] Thread ID = 0x000037cc
[14:37:33.876] base 0x00dc0000
[14:37:33.899] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.899] Thread ID = 0x000037cc
[14:37:33.899] path C:\WINDOWS\SysWOW64\KERNEL32.DLL
base 0x75280000
size 620176
[14:37:33.899] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.899] Thread ID = 0x000037cc
[14:37:33.899] path C:\WINDOWS\SysWOW64\KERNELBASE.dll
base 0x77840000
size 1557768
[14:37:33.901] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.901] Thread ID = 0x000037cc
[14:37:33.901] path C:\WINDOWS\SysWOW64\apphelp.dll
base 0x716d0000
size 581632
[14:37:33.903] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.903] Thread ID = 0x000037cc
[14:37:33.903] path C:\WINDOWS\AppPatch\AcGenral.DLL
base 0x5bde0000
size 2478592
[14:37:33.903] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.903] Thread ID = 0x000037cc
[14:37:33.903] path C:\WINDOWS\SysWOW64\msvcrt.dll
base 0x75750000
size 773168
[14:37:33.903] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.903] Thread ID = 0x000037cc
[14:37:33.903] path C:\WINDOWS\SysWOW64\sechost.dll
base 0x74740000
size 269616
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\RPCRT4.dll
base 0x74a10000
size 707600
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\SspiCli.dll
base 0x746d0000
size 116216
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\CRYPTBASE.dll
base 0x746c0000
size 31528
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\bcryptPrimitives.dll
base 0x75840000
size 360480
[14:37:33.904] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.904] Thread ID = 0x000037cc
[14:37:33.904] path C:\WINDOWS\SysWOW64\SHLWAPI.dll
base 0x746f0000
size 276336
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\combase.dll
base 0x74fb0000
size 1824264
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\GDI32.dll
base 0x74790000
size 1371792
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\USER32.dll
base 0x758a0000
size 1337240
[14:37:33.905] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.905] Thread ID = 0x000037cc
[14:37:33.905] path C:\WINDOWS\SysWOW64\ole32.dll
base 0x759f0000
size 957608
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\OLEAUT32.dll
base 0x771d0000
size 589856
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\SHELL32.dll
base 0x75db0000
size 21124344
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\cfgmgr32.dll
base 0x75430000
size 217976
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.906] path C:\WINDOWS\SysWOW64\windows.storage.dll
base 0x77340000
size 5242496
[14:37:33.906] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.906] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\advapi32.dll
base 0x75b00000
size 499432
[14:37:33.907] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.907] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\kernel.appcore.dll
base 0x75680000
size 39792
[14:37:33.907] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.907] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\shcore.dll
base 0x74ac0000
size 569744
[14:37:33.907] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.907] Thread ID = 0x000037cc
[14:37:33.907] path C:\WINDOWS\SysWOW64\powrprof.dll
base 0x77270000
size 270672
[14:37:33.908] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.908] Thread ID = 0x000037cc
[14:37:33.908] path C:\WINDOWS\SysWOW64\profapi.dll
base 0x772d0000
size 54752
[14:37:33.909] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.909] Thread ID = 0x000037cc
[14:37:33.909] path C:\WINDOWS\SysWOW64\UxTheme.dll
base 0x722a0000
size 458752
[14:37:33.909] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.909] Thread ID = 0x000037cc
[14:37:33.909] path C:\WINDOWS\SysWOW64\WINMM.dll
base 0x70390000
size 134352
[14:37:33.909] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.909] Thread ID = 0x000037cc
[14:37:33.909] path C:\WINDOWS\SysWOW64\samcli.dll
base 0x717a0000
size 67072
[14:37:33.910] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.910] Thread ID = 0x000037cc
[14:37:33.910] path C:\WINDOWS\SysWOW64\MSACM32.dll
base 0x720b0000
size 90912
[14:37:33.910] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.910] Thread ID = 0x000037cc
[14:37:33.910] path C:\WINDOWS\SysWOW64\VERSION.dll
base 0x72e40000
size 27360
[14:37:33.911] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.911] Thread ID = 0x000037cc
[14:37:33.911] path C:\WINDOWS\SysWOW64\USERENV.dll
base 0x71d20000
size 92480
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\dwmapi.dll
base 0x6fec0000
size 94208
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\urlmon.dll
base 0x705b0000
size 1500672
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\WINSPOOL.DRV
base 0x724d0000
size 400896
[14:37:33.912] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.912] Thread ID = 0x000037cc
[14:37:33.912] path C:\WINDOWS\SysWOW64\MPR.dll
base 0x72e10000
size 85720
[14:37:33.913] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.913] Thread ID = 0x000037cc
[14:37:33.913] path C:\WINDOWS\SysWOW64\WINMMBASE.dll
base 0x70330000
size 132744
[14:37:33.913] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.913] Thread ID = 0x000037cc
[14:37:33.913] path C:\WINDOWS\SysWOW64\iertutil.dll
base 0x72e50000
size 2919320
[14:37:33.913] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.913] Thread ID = 0x000037cc
[14:37:33.913] path C:\WINDOWS\SysWOW64\bcrypt.dll
base 0x72d90000
size 107408
[14:37:33.914] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.914] Thread ID = 0x000037cc
[14:37:33.914] path C:\WINDOWS\AppPatch\AcLayers.dll
base 0x5bb60000
size 335360
[14:37:33.915] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.915] Thread ID = 0x000037cc
[14:37:33.915] path C:\WINDOWS\SysWOW64\SETUPAPI.dll
base 0x74b50000
size 4268360
[14:37:33.915] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.915] Thread ID = 0x000037cc
[14:37:33.915] path C:\WINDOWS\SysWOW64\sfc.dll
base 0x66680000
size 3072
[14:37:33.915] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.915] Thread ID = 0x000037cc
[14:37:33.915] path C:\WINDOWS\SysWOW64\sfc_os.DLL
base 0x72320000
size 41984
[14:37:33.917] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] path
base 0x011e0000
size 8835072
[14:37:33.917] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] base 0x011e0000
[14:37:33.917] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] path
base 0x011e0000
size 8835072
[14:37:33.917] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:33.917] Thread ID = 0x000037cc
[14:37:33.917] base 0x011e0000
[14:37:33.922] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.922] Thread ID = 0x000037cc
[14:37:33.922] path C:\WINDOWS\SysWOW64\IMM32.DLL
base 0x75810000
size 169928
[14:37:33.925] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x000037cc
[14:37:33.926] path C:\WINDOWS\SysWOW64\DDRAW.dll
base 0x5e500000
size 551424
[14:37:33.926] Debug event: CREATE_THREAD_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x00000dc4
[14:37:33.926] Thread handle = 0x000003a8
Start address = 0x779ec6d0
Thread local base = 0x0035a000
[14:37:33.926] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x000037cc
[14:37:33.926] path C:\WINDOWS\SysWOW64\DINPUT.dll
base 0x72070000
size 136192
[14:37:33.926] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.926] Thread ID = 0x000037cc
[14:37:33.926] path C:\WINDOWS\SysWOW64\WSOCK32.dll
base 0x70480000
size 16384
[14:37:33.927] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.927] Thread ID = 0x000037cc
[14:37:33.927] path C:\WINDOWS\SysWOW64\WS2_32.dll
base 0x756f0000
size 388896
[14:37:33.927] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.927] Thread ID = 0x000037cc
[14:37:33.927] path C:\WINDOWS\SysWOW64\DSOUND.dll
base 0x5ddf0000
size 527360
[14:37:33.928] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.928] Thread ID = 0x000037cc
[14:37:33.928] path C:\GP3\binkw32.dll
base 0x10000000
size 262656
[14:37:33.928] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.928] Thread ID = 0x000037cc
[14:37:33.928] path C:\WINDOWS\SysWOW64\DCIMAN32.dll
base 0x72120000
size 11776
[14:37:33.929] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:33.929] Thread ID = 0x000037cc
[14:37:33.929] First chance exception
[14:37:33.929] Exception address: 0x77a6ccbc
[14:37:33.929] Module name: '' (base 0x779c0000, size 1542816)
[14:37:33.929] Exception flags: 0x00000000
[14:37:33.929] Exception code: EXCEPTION_BREAKPOINT
[14:37:33.929] Setting breakpoint on entry point (0x00523473)
[14:37:33.931] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:33.931] Thread ID = 0x000037cc
[14:37:33.931] First chance exception
[14:37:33.931] Exception address: 0x00523473
[14:37:33.931] Exception flags: 0x00000000
[14:37:33.931] Exception code: EXCEPTION_BREAKPOINT
[14:37:33.931] Removing breakpoint on entry point
[14:37:33.931] Injecting DLL loading code...
[14:37:33.931] Copying code to target at address 0x00d40000...
[14:37:33.931] Injection succesful
[14:37:33.931] Setting instruction pointer to injected code (0x00d40000)
[14:37:33.931] Debug event: CREATE_THREAD_DEBUG_EVENT
[14:37:33.931] Thread ID = 0x00003130
[14:37:33.931] Thread handle = 0x000003b0
Start address = 0x779ec6d0
Thread local base = 0x0035d000
[14:37:33.976] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:33.976] Thread ID = 0x000037cc
[14:37:33.976] path C:\GP3\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 28160
[14:37:34.034] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.034] Thread ID = 0x000037cc
[14:37:34.034] path C:\GP3\GPxPSup.dll
base 0x09900000
size 40960
[14:37:34.035] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.035] Thread ID = 0x000037cc
[14:37:34.035] path C:\WINDOWS\SysWOW64\imagehlp.dll
base 0x75ae0000
size 99176
[14:37:34.036] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:34.036] Thread ID = 0x000037cc
[14:37:34.036] base 0x75ae0000
[14:37:34.037] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.037] Thread ID = 0x000037cc
[14:37:34.037] path C:\WINDOWS\SysWOW64\imagehlp.dll
base 0x75ae0000
size 99176
[14:37:34.038] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:34.038] Thread ID = 0x000037cc
[14:37:34.038] base 0x75ae0000
[14:37:34.065] >> Starting WinMain
[14:37:34.065] >> Loading library
[14:37:34.115] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.115] Thread ID = 0x000037cc
[14:37:34.115] path C:\WINDOWS\SysWOW64\MSCTF.dll
base 0x748e0000
size 1174008
[14:37:34.117] >> WM_ACTIVATE (active)(not minimized)
[14:37:34.120] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.120] Thread ID = 0x000037cc
[14:37:34.120] path C:\WINDOWS\SysWOW64\clbcatq.dll
base 0x75470000
size 526304
[14:37:34.121] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.121] Thread ID = 0x000037cc
[14:37:34.121] path C:\WINDOWS\SysWOW64\msiltcfg.dll
base 0x6f6e0000
size 18432
[14:37:34.122] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.122] Thread ID = 0x000037cc
[14:37:34.122] path C:\WINDOWS\SysWOW64\msi.dll
base 0x72540000
size 3671040
[14:37:34.123] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.123] Thread ID = 0x000037cc
[14:37:34.123] path
base 0x729c0000
size 2142048
[14:37:34.126] Debug event: LOAD_DLL_DEBUG_EVENT
[14:37:34.126] Thread ID = 0x000037cc
[14:37:34.126] path C:\Program Files (x86)\Common Files\Microsoft Shared\INK\SKCHUI.DLL
base 0x02880000
size 3072
[14:37:34.126] Debug event: UNLOAD_DLL_DEBUG_EVENT
[14:37:34.126] Thread ID = 0x000037cc
[14:37:34.126] base 0x02880000
[14:37:34.127] Debug event: CREATE_THREAD_DEBUG_EVENT
[14:37:34.127] Thread ID = 0x000036a8
[14:37:34.127] Thread handle = 0x000003dc
Start address = 0x6f6e1ff0
Thread local base = 0x00360000
[14:37:34.134] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:34.134] Thread ID = 0x000037cc
[14:37:34.134] First chance exception
[14:37:34.134] Exception address: 0x00505cc5
[14:37:34.134] Exception flags: 0x00000000
[14:37:34.134] Exception code: EXCEPTION_ACCESS_VIOLATION
[14:37:34.134] Process tried to read from virtual address 0x00f74000
[14:37:34.136] Debug event: EXCEPTION_DEBUG_EVENT
[14:37:34.136] Thread ID = 0x000037cc
[14:37:34.136] Unhandled exception
[14:37:34.136] Exception address: 0x00505cc5
[14:37:34.136] Exception flags: 0x00000000
[14:37:34.136] Exception code: EXCEPTION_ACCESS_VIOLATION
[14:37:34.136] Process tried to read from virtual address 0x00f74000
[14:37:34.136] Stack trace:
00505CC5: GP3\GPxPatch.exe! <no symbol>
00505A01: GP3\GPxPatch.exe! <no symbol>
73143E80: <no module><no symbol>
B60F5011: <no module><no symbol>
02E0C106: <no module><no symbol>
C4557005: <no module><no symbol>
58300300: <no module><no symbol>
804606EB: <no module><no symbol>
FA73143E: <no module><no symbol>
143E80C3: <no module><no symbol>
3E802F73: <no module><no symbol>
802A7408: <no module><no symbol>
2574093E: <no module><no symbol>
74033E80: <no module><no symbol>
053E801B: <no module><no symbol>
0F501174: <no module><no symbol>
E0C106B6: <no module><no symbol>
55700502: <no module><no symbol>
300300C4: <no module><no symbol>
8324EB58: <no module><no symbol>
06EB02C6: <no module><no symbol>
EB03C683: <no module><no symbol>
3E804601: <no module><no symbol>
80FA7314: <no module><no symbol>
F574083E: <no module><no symbol>
74093E80: <no module><no symbol>
033E80F0: <no module><no symbol>
3E80E674: <no module><no symbol>
C3DC7405: <no module><no symbol>
55565251: <no module><no symbol>
[14:37:35.083] Registers:
EAX=000009E8 ECX=00000074 ESI=00F74000
EBX=00000000 EDX=00000000 EDI=00C49626
CS:EIP=0023:00505CC5
SS:ESP=002B:0019FA98 EBP=7529FDE0
DS=002B ES=002B FS=0053 GS=002B
Flags=00010202
Stack dump:
0019fa98: 00505a01 00c49b58 00c49b6b 7529fde0 '.ZP.X...k.....)u'
0019faa8: 0019fabc 00000000 00000000 bb5774c7 '.............tW.'
0019fab8: 00000001 00505599 7529fde0 00523473 '.....UP...)us4R.'
0019fac8: 00f3568f 0051e5a9 05010d2d 00354000 '.V....Q.-....@5.'
0019fad8: 0000000a 0051e440 00400000 00f3568f '....@.Q...@..V..'
0019fae8: 0000000a 00000000 0019ff80 00354000 '.............@5.'
0019faf8: fffffffe 77a9e266 779fcc3e 00f54eb0 '....f..w>..w.N..'
0019fb08: bb6446ad 00f30000 00f54ea8 00f54eb0 '.Fd......N...N..'
0019fb18: 00000000 011d0000 00000000 00000000 '................'
0019fb28: 011d0000 011d0000 00000000 00000000 '................'
0019fb38: 007200e1 006f0069 00000000 00610072 '..r.i.o.....r.a.'
0019fb48: 00690073 00f30000 00000000 00000000 's.i.............'
0019fb58: 00650064 00f20000 4000006a 00000000 'd.e.....j..@....'
0019fb68: 77a40000 77a9daf4 00f30000 00000000 '...w...w........'
0019fb78: 00000b50 00000000 00000000 00f30000 'P...............'
0019fb88: 00f54ff8 00000001 40000062 00000000 '.O......b..@....'
0019fb98: 00000000 00000000 0019ff70 77a3ed50 '........p...P..w'
0019fba8: ccd691fd fffffffe 0019fbf8 779f0000 '...............w'
0019fbb8: 00000038 00000040 00000000 0019fbe8 '8...@...........'
0019fbc8: 40000062 0000001c 00001898 0000001b 'b..@............'
0019fbd8: 00f54ee6 00f54ee8 0019fc1c 7795215e '.N...N......^!.w'
0019fbe8: 00f54ee6 00c6a8f7 0019ff70 77a3ed50 '.N......p...P..w'
0019fbf8: ccd691bd fffffffe 0019fc28 779fb4c8 '........(......w'
0019fc08: 00f54ea8 00f54eb0 00000200 0000001c '.N...N..........'
0019fc18: 00f54eb0 0019fc64 7792efa5 00f54ee8 '.N..d......w.N..'
0019fc28: 0019fc64 7792efbc 00f30000 00000000 'd......w........'
0019fc38: 00f54eb0 00000220 75293880 778f77e7 '.N.. ....8)u.w.w'
0019fc48: 00000000 00f54eb0 00000000 00000000 '.....N..........'
0019fc58: 0000003f 00f35ad8 bb4e88a3 0019fca0 '?....Z....N.....'
0019fc68: 00529a81 00000000 00000220 00d21898 '..R..... .......'
0019fc78: ffffffff 00c6a8dc 0000003f 00000004 '........?.......'
0019fc88: 00000072 00000074 0019fc9c 00526f00 'r...t........oR.'
0019fc98: 00f23ca0 0019fcdc 00529960 0000000b '.<......`.R.....'
0019fca8: 0052796d 00523473 0052f00c 00cde1f0 'myR.s4R...R.....'
0019fcb8: 00000000 00000000 0000000e 00000000 '................'
0019fcc8: 00000003 00000074 00000000 00000072 '....t.......r...'
0019fcd8: 00000000 0019fdcc 00522f64 571d045e '........d/R.^..W'
0019fce8: 00000004 00000018 0000000e 00000025 '............%...'
0019fcf8: 00000022 00000000 000000b4 006f0048 '"...........H.o.'
0019fd08: 00610072 006f0020 00690066 00690063 'r.a. .o.f.i.c.i.'
0019fd18: 006c0061 00640020 0020006f 00720042 'a.l. .d.o. .B.r.'
0019fd28: 00730061 006c0069 00000000 00000000 'a.s.i.l.........'
0019fd38: 00000000 00000000 00000000 00020000 '................'
0019fd48: 00030006 003b0017 03e7003b 00000000 '......;.;.......'
0019fd58: 006f0048 00e10072 00690072 0020006f 'H.o.r...r.i.o. .'
0019fd68: 00720062 00730061 006c0069 00690065 'b.r.a.s.i.l.e.i.'
0019fd78: 006f0072 00640020 00200065 00650076 'r.o. .d.e. .v.e.'
0019fd88: 00e30072 0000006f 00000000 00000000 'r...o...........'
0019fd98: 000a0000 00030006 003b0017 03e7003b '..........;.;...'
0019fda8: ffffffc4 000407e0 00180000 0019ff80 '................'
0019fdb8: 005248c5 00000000 00523473 0052f00c '.HR.....s4R...R.'
0019fdc8: 00000080 00f233e8 00000080 00f233e8 '.....3.......3..'
0019fdd8: 77a90e83 00f23470 779c737c 00000008 '...wp4..|s.w....'
0019fde8: 00f233f0 00f20000 00f233e8 00000008 '.3.......3......'
0019fdf8: 00f233f0 00f20000 50000061 00f233f0 '.3......a..P.3..'
0019fe08: 00f20000 50000061 0019fe64 77a9ed06 '....a..Pd......w'
0019fe18: 77a4aa16 77a9ecef bb6444c9 00523473 '...w...w.Dd.s4R.'
0019fe28: 00f20000 00354000 50000061 00f20000 '.....@5.a..P....'
0019fe38: 50000061 0157fab0 00000080 0119fe18 'a..P..W.........'
0019fe48: bb6444c9 0019fe20 77a3ed50 0019febc '.Dd. ...P..w....'
0019fe58: 77a3ed50 ccd6858d fffffffe 77a9ecef 'P..w...........w'
0019fe68: 77a53f88 00f233f0 00523473 0052f014 '.?.w.3..s4R...R.'
0019fe78: 00354000 0000000d 0019fecc 00523f7a '.@5.........z?R.'
0019fe88: 00f20000 00000000 00f233f0 00523473 '.........3..s4R.'
0019fe98: 0052f014 00354000 28a14a40 b2ab95b8 '..R..@5.@J.(....'
0019fea8: 3b1d4265 00523473 00523473 0051fc40 'eB.;s4R.s4R.@.Q.'
0019feb8: 00354000 0019fec8 00526f00 00d21700 '.@5......oR.....'
0019fec8: 0019ff80 00523b67 778f05c3 00521856 '....g;R....wV.R.'
0019fed8: 0052f014 00521863 00000000 00354000 '..R.c.R......@5.'
0019fee8: 0051fc40 00523b7c bb4e8a33 0019ff80 '@.Q.|;R.3.N.....'
0019fef8: 00523553 00400000 00000000 00f3568f 'S5R...@......V..'
0019ff08: 0000000a 00523473 00523473 00354000 '....s4R.s4R..@5.'
0019ff18: c0000005 00f3568f 00000000 00000044 '.....V......D...'
0019ff28: 00f3db58 00f52300 00f52328 00000000 'X....#..(#......'
0019ff38: 00000000 00000000 00000000 00000000 '................'
0019ff48: 00000000 00000000 00000000 00000000 '................'
0019ff58: 00000000 ffffffff ffffffff ffffffff '................'
0019ff68: 0019ff0c 0019f4dc 0019ffcc 00526f0c '.............oR.'
0019ff78: 0052c810 00000000 0019ff94 752938f4 '..R..........8)u'
0019ff88: 00354000 752938d0 b9e4e833 0019ffdc '.@5..8)u3.......'
0019ff98: 77a25de3 00354000 bb644571 00000000 '.].w.@5.qEd.....'
0019ffa8: 00000000 00354000 c0000005 7797f300 '.....@5........w'
0019ffb8: 00000000 0019f4ac bb644571 0019ffa0 '........qEd.....'
0019ffc8: 0019f4ac 0019ffe4 77a3ed50 ccd68955 '........P..wU...'
0019ffd8: 00000000 0019ffec 77a25dae ffffffff '.........].w....'
0019ffe8: 77a4b7c2 00000000 00000000 00523473 '...w........s4R.'
0019fff8: 00354000 00000000 78746341 00000020 '.@5.....Actx ...'
001a0008: 00000001 000032d8 000000dc 00000000 '.....2..........'
001a0018: 00000020 00000000 00000014 00000001 ' ...............'
001a0028: 00000007 00000034 0000017c 00000001 '....4...|.......'
001a0038: 00000000 00000000 00000000 00000000 '................'
001a0048: 00000000 00000002 1a26ef4e 00000298 '........N.&.....'
001a0058: 00000044 000002e0 00000254 00000000 'D.......T.......'
001a0068: f33271ba 00000534 0000004a 00000580 '.q2.4...J.......'
001a0078: 00000336 00000000 2d59495b 000008b8 '6.......[IY-....'
001a0088: 00000032 000008ec 000002f4 00000000 '2...............'
001a0098: 32ceeacd 00000be0 00000042 00000c24 '...2....B...$...'
001a00a8: 00000324 00000000 38505fc8 00000f48 '$........_P8H...'
001a00b8: 0000005e 00000fa8 00000356 00000000 '^.......V.......'
001a00c8: b1280544 00001300 00000056 00001358 'D.(.....V...X...'
001a00d8: 00000386 00000010 00000009 000000ec '................'
001a00e8: 00000002 00000001 0000017c 0000159c '........|.......'
001a00f8: 00000001 00000002 00001718 000007a0 '................'
001a0108: 00000001 00000003 00001eb8 00000e8c '................'
001a0118: 00000001 00000004 00002d44 00000314 '........D-......'
001a0128: 00000002 00000005 00003058 00000098 '........X0......'
001a0138: 00000002 00000006 000030f0 000000cc '.........0......'
001a0148: 00000002 00000007 000031bc 000000f0 '.........1......'
001a0158: 00000001 00000009 000032ac 00000028 '.........2..(...'
001a0168: 00000002 0000000b 000032d4 00000004 '.........2......'
001a0178: 00000001 64487353 0000002c 00000001 '....SsHd,.......'
001a0188: 00000001 00000001 00000006 0000008c '................'
001a0198: 00000001 00001564 0000002c 0000005e '....d...,...^...'
001a01a8: 0000005e 00000000 00000000 00000000 '^...............'
001a01b8: 00000000 00000000 00000000 00000000 '................'
001a01c8: 00000000 00000000 00000002 00000024 '............$...'
001a01d8: 00000038 00000000 003a0043 0057005c '8.......C.:.\.W.'
001a01e8: 004e0049 004f0044 00530057 0057005c 'I.N.D.O.W.S.\.W.'
001a01f8: 006e0069 00780053 005c0073 00000000 'i.n.S.x.s.\.....'
001a0208: 1a26ef4e 0000011c 00000044 00000164 'N.&.....D...d...'
001a0218: 00000254 00000001 f33271ba 000003b8 'T........q2.....'
001a0228: 0000004a 00000404 00000336 00000002 'J.......6.......'
001a0238: 2d59495b 0000073c 00000032 00000770 '[IY-<...2...p...'
001a0248: 000002f4 00000003 32ceeacd 00000a64 '...........2d...'
001a0258: 00000042 00000aa8 00000324 00000004 'B.......$.......'
001a0268: 38505fc8 00000dcc 0000005e 00000e2c '._P8....^...,...'
001a0278: 00000356 00000005 b1280544 00001184 'V.......D.(.....'
001a0288: 00000056 000011dc 00000386 00000006 'V...............'
[14:37:38.841] Debug event: EXIT_THREAD_DEBUG_EVENT
[14:37:38.841] Thread ID = 0x000037cc
[14:37:38.841] Thread exit code = -1073741819
[14:37:38.841] Debug event: EXIT_THREAD_DEBUG_EVENT
[14:37:38.841] Thread ID = 0x000036a8
[14:37:38.841] Thread exit code = -1073741819
[14:37:38.841] Debug event: EXIT_THREAD_DEBUG_EVENT
[14:37:38.841] Thread ID = 0x00003130
[14:37:38.842] Thread exit code = -1073741819
[14:37:38.842] Debug event: EXIT_PROCESS_DEBUG_EVENT
[14:37:38.842] Thread ID = 0x00000dc4
[14:37:38.842] Process exit code = -1073741819
You need to perform a proper update of GP3 1.00 to 1.13. The 1.00 ldata files are not compatible with 1.13 and also need to be updated. So just using a newer executable doesn't work. In non-debug mode you're just lucky it works.

René Smit, Independent Software Developer.
Download my GPx tools here.
Indeed, this was the problem. I installed everything again. Now the official patched worked and GPxPatch is running fine on debug mode.
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy