gp3 crashing every time

Posted by ooleeeo 
gp3 crashing every time
Date: November 12, 2011 12:09PM
Posted by: ooleeeo
The log:

Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP3 v1.13
Verbosity level is 2
OS version info: Windows XP Service Pack 3 build 2600
Total physical memory: 984 MB (free: 521 MB)
Debugging gp3.exe
Process created:
Process ID = 0x00000d18
Process handle = 0x000000ac
Main thread ID = 0x000004d0
Main thread handle = 0x000000b0
Process will run on CPU 1 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x000004d0
Entry point = 0x00523473
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path ntdll.dll
base 0x7c900000
size 718336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\kernel32.dll
base 0x7c800000
size 989696
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\USER32.dll
base 0x7e410000
size 578560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\GDI32.dll
base 0x77f10000
size 286720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WINSPOOL.DRV
base 0x73000000
size 146432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\ADVAPI32.dll
base 0x77dd0000
size 617472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\RPCRT4.dll
base 0x77e70000
size 590848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\Secur32.dll
base 0x77fe0000
size 56832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\msvcrt.dll
base 0x77c10000
size 343040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\ole32.dll
base 0x774e0000
size 1288192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\DDRAW.dll
base 0x73760000
size 279552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\DCIMAN32.dll
base 0x73bc0000
size 8704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\DINPUT.dll
base 0x72280000
size 158720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WINMM.dll
base 0x76b40000
size 176128
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WSOCK32.dll
base 0x71ad0000
size 22528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WS2_32.dll
base 0x71ab0000
size 82432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WS2HELP.dll
base 0x71aa0000
size 19968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\DSOUND.dll
base 0x73f10000
size 367616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\VERSION.dll
base 0x77c00000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path F:\GP3\binkw32.dll
base 0x10000000
size 262656
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000004d0
First chance exception
Exception address: 0x7c90120e
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x00523473)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\ShimEng.dll
base 0x5cb70000
size 65024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\IMM32.DLL
base 0x76390000
size 110080
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\LPK.DLL
base 0x629c0000
size 22016
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\USP10.dll
base 0x6f500000
size 502272
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x5cb70000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000004d0
First chance exception
Exception address: 0x00523473
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x003f0000...
Injection succesful
Setting instruction pointer to injected code (0x003f0000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path F:\GP3\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path F:\GP3\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 144384
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x76c90000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 144384
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x76c90000
>> Starting WinMain
>> Loading library
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\uxtheme.dll
base 0x5ad70000
size 218624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path F:\Fraps\FRAPS32.DLL
base 0x63570000
size 231600
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\MSCTF.dll
base 0x74720000
size 297984
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\apphelp.dll
base 0x77b40000
size 125952
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\msctfime.ime
base 0x755c0000
size 177152
>> WM_ACTIVATE (active)(not minimized)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000e38
Thread handle = 0x0000013c
Start address = 0x7c8106f9
Thread local base = 0x7ffde000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\CLBCATQ.DLL
base 0x76fd0000
size 498688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\COMRes.dll
base 0x77050000
size 792064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\OLEAUT32.dll
base 0x77120000
size 551936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dplayx.dll
base 0x6c750000
size 229888
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000b68
Thread handle = 0x00000154
Start address = 0x7c8106f9
Thread local base = 0x7ffdd000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\SHLWAPI.dll
base 0x77f60000
size 474112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
base 0x773d0000
size 1054208
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000084
Thread handle = 0x00000174
Start address = 0x7c8106f9
Thread local base = 0x7ffdc000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x6c740000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000084
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000084
base 0x76e80000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000084
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x669a0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\mswsock.dll
base 0x71a50000
size 245248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\hnetcfg.dll
base 0x662b0000
size 344064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\System32\wshtcpip.dll
base 0x71a90000
size 19456
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dpnhupnp.dll
base 0x6c6d0000
size 60928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\rsaenh.dll
base 0x68000000
size 208384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\rasapi32.dll
base 0x76ee0000
size 237056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\rasman.dll
base 0x76e90000
size 61440
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\NETAPI32.dll
base 0x5b860000
size 337408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dpnhpast.dll
base 0x6c6f0000
size 35328
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x6c6f0000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000008b4
Thread handle = 0x000001ac
Start address = 0x7c8106f9
Thread local base = 0x7ffdc000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x76d60000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x6c6d0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000008b4
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x71a90000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x662b0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x669a0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000b68
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\DNSAPI.dll
base 0x76f20000
size 149504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\System32\winrnr.dll
base 0x76fb0000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\rasadhlp.dll
base 0x76fc0000
size 7680
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x76fb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x76f60000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000c80
Thread handle = 0x000001c0
Start address = 0x7c8106f9
Thread local base = 0x7ffdd000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000cf4
Thread handle = 0x000001c4
Start address = 0x7c8106f9
Thread local base = 0x7ffdc000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000c80
Thread exit code = 0
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000cf4
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x6c750000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\D3DIM700.DLL
base 0x73940000
size 824320
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WINTRUST.dll
base 0x76c30000
size 177664
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\CRYPT32.dll
base 0x77a80000
size 599040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\MSASN1.dll
base 0x77b20000
size 58880
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\IMAGEHLP.dll
base 0x76c90000
size 144384
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000d50
Thread handle = 0x000001d8
Start address = 0x7c8106f9
Thread local base = 0x7ffdd000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000017c
Thread handle = 0x000001dc
Start address = 0x7c8106f9
Thread local base = 0x7ffdc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000894
Thread handle = 0x000001e0
Start address = 0x7c8106f9
Thread local base = 0x7ffdb000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path
base 0x01d60000
size 2897920
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000918
Thread handle = 0x000001e8
Start address = 0x7c8106f9
Thread local base = 0x7ffda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\userenv.dll
base 0x769c0000
size 727040
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000006ec
Thread handle = 0x000001f0
Start address = 0x7c8106f9
Thread local base = 0x7ffd9000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\cryptnet.dll
base 0x75e60000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\PSAPI.DLL
base 0x76bf0000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\SensApi.dll
base 0x722b0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WINHTTP.dll
base 0x4d4f0000
size 354304
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x732f0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x732f0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x732f0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x732f0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\HID.DLL
base 0x688f0000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\SETUPAPI.DLL
base 0x77920000
size 985088
>> No joysticks found -- closing dinput
>> Closing DINPUT
>> In ddraw_set_screen
>> No change in cooperative level
>> changed window size
>> ddraw_set_screen finished ok.
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000b78
Thread handle = 0x0000021c
Start address = 0x7c8106f9
Thread local base = 0x7ffd8000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path F:\GP3\gpxpdata\dx\gpxpdx7.dll
base 0x09980000
size 139332
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path F:\GP3\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path F:\GP3\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 39424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path F:\GP3\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 12288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path F:\GP3\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 37376
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path F:\GP3\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 50688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path F:\GP3\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\wdmaud.drv
base 0x72d20000
size 23552
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
base 0x72d20000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\wdmaud.drv
base 0x72d20000
size 23552
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000fac
Thread handle = 0x00000244
Start address = 0x7c8106f9
Thread local base = 0x7ffd6000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\msacm32.drv
base 0x72d10000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\MSACM32.dll
base 0x77be0000
size 71680
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\midimap.dll
base 0x77bd0000
size 18944
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000fdc
Thread handle = 0x00000254
Start address = 0x7c8106f9
Thread local base = 0x7ffd5000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\KsUser.dll
base 0x73ee0000
size 4096
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000214
Thread handle = 0x0000025c
Start address = 0x7c8106f9
Thread local base = 0x7ffd4000
>> Unknown dsound base frequency
>> Bink init>> Bink init completed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\unidrvui.dll
base 0x7e5a0000
size 744960
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\mxdwdui.DLL
base 0x3f960000
size 198656
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
base 0x3f960000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\mxdwdui.DLL
base 0x3f960000
size 198656
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
base 0x3f960000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\mxdwdui.DLL
base 0x3f960000
size 198656
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
base 0x3f960000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\mxdwdui.DLL
base 0x3f960000
size 198656
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
base 0x3f960000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
base 0x732f0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000b78
base 0x732f0000
>> In ddraw_set_screen
>> No change in cooperative level
>> changed window size
>> ddraw_set_screen finished ok.
>> ams - Setting up Secondary Device
>> MMX Enabled
>> ams - D3D_SwitchToSecondaryDevice OK !
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000004d0
base 0x732f0000
>> D3D_SetDeviceSpecificFeatures: Disabling fog
>> D3D_SetDeviceSpecificFeatures: Disabling reflections
>> Created surface
>> Palette Changed to us
>> Heap corruption detected at 0159C410
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000b78
First chance exception
Exception address: 0x7c91a343
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0xfea0fea0
>> HEAP[gp3.exe]: >> Heap block at 06860058 modified at 06872DB0 past requested size of 12d50
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000b78
First chance exception
Exception address: 0x7c90120e
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Stack trace:
7C90120F: WINDOWS\system32\ntdll.dll! DbgBreakPoint + 1 bytes
7C95F8F4: WINDOWS\system32\ntdll.dll! RtlZeroHeap + 505 bytes
7C96F1FF: WINDOWS\system32\ntdll.dll! RtlpNtMakeTemporaryKey + 27395 bytes
7C970456: WINDOWS\system32\ntdll.dll! RtlpNtMakeTemporaryKey + 32090 bytes
7C94BAFC: WINDOWS\system32\ntdll.dll! LdrAlternateResourcesEnabled + 13245 bytes
7C91A1BA: WINDOWS\system32\ntdll.dll! RtlpUnWaitCriticalSection + 1627 bytes
00522783: GP3\GPxPatch.exe! <no symbol>
0050C1A7: GP3\GPxPatch.exe! <no symbol>
Registers:
EAX=06860058 ECX=7C91D4FD ESI=06860058
EBX=06872DB0 EDX=0236F8B0 EDI=00012D50
CS:EIP=001B:7C90120F
SS:ESP=0023:0236FAB0 EBP=0236FAB4
DS=0023 ES=0023 FS=003B GS=0000
Flags=00200202
Stack dump:
0236fab0: 7c96ee31 0236facc 7c95f8f4 06860058 '1..|..6....|X...'
0236fac0: 06860058 01590000 06860058 0236fae0 'X.....Y.X.....6.'
0236fad0: 7c96f1ff 00000000 01590000 06860060 '...|......Y.`...'
0236fae0: 0236fb54 7c970456 01590000 06860058 'T.6.V..|..Y.X...'
0236faf0: 7c97060c 01590000 06860060 40000060 '...|..Y.`...`..@'
0236fb00: 00000000 00000000 0236fb9c 00000000 '..........6.....'
0236fb10: 00000000 00000000 00000001 00000000 '................'
0236fb20: 00000000 00012d68 06860058 01590000 '....h-..X.....Y.'
0236fb30: 0236fbdc 00000000 00010010 0236faf4 '..6...........6.'
0236fb40: 00000000 0236fc2c 7c90e920 7c9705e8 '....,.6. ..|...|'
0236fb50: 00000001 0236fc3c 7c94bafc 01590000 '....<.6....|..Y.'
0236fb60: 50000061 06860060 01590000 06860060 'a..P`.....Y.`...'
0236fb70: 40000060 0236fd1c 7379da74 73762fa8 '`..@..6.t.ys./vs'
0236fb80: ffffffff 73762fa5 73767208 06e069c0 '...../vs.rvs.i..'
0236fb90: 00c9eaf0 0002252f 00c9ea88 06e06910 '..../%.......i..'
0236fba0: 01590000 00000000 0159c410 00000000 '..Y.......Y.....'
0236fbb0: 00000000 01590000 7c90cffa 7c809c2b '......Y....|+..|'
0236fbc0: 00000000 00000003 01590000 0001f9c4 '..........Y.....'
0236fbd0: 01591fb0 0236fb30 7c90e920 06e06830 '..Y.0.6. ..|0h..'
0236fbe0: 7c90e920 7c910060 ffffffff 7c91005d ' ..|`..|....]..|'
0236fbf0: 00522783 01590000 00000000 015939d8 '.'R...Y......9Y.'
0236fc00: 00012d44 01590000 00000000 00000000 'D-....Y.........'
0236fc10: 0236ffa4 00526f0c 0052c7d0 060069c0 '..6..oR...R..i..'
0236fc20: 00150000 0236fb68 00526f0c 0236fcfc '....h.6..oR...6.'
0236fc30: 7c90e920 7c91a3d0 ffffffff 0236fd0c ' ..|...|......6.'
0236fc40: 7c91a1ba 01590000 40000060 06860060 '...|..Y.`..@`...'
0236fc50: 00000000 06860060 068601a4 06e06830 '....`.......0h..'
0236fc60: 06e08af4 06e08b70 0236fca8 73764fb3 '....p.....6..Ovs'
0236fc70: 73764fcb 73764fd2 06e08b70 06e08ac0 '.Ovs.Ovsp.......'
0236fc80: 06e069c0 06e06910 06e06830 06e069c0 '.i...i..0h...i..'
0236fc90: 0236fc78 739fb4da 0236fd1c 7379da74 'x.6....s..6.t.ys'
0236fca0: 73764fd8 ffffffff 73764fd2 7394d523 '.Ovs.....Ovs#..s'
0236fcb0: 73766a4a 73766a52 04db03c0 06e069c0 'JjvsRjvs.....i..'
0236fcc0: 0236fd98 02ad30c0 00179218 06e06910 '..6..0.......i..'
0236fcd0: 06e06830 01590000 06e06830 0236fccc '0h....Y.0h....6.'
0236fce0: 0236fd3c 00000008 00c9ea88 00016a90 '<.6..........j..'
0236fcf0: 00000000 0236fc50 73763674 0236fd44 '....P.6.t6vsD.6.'
0236fd00: 7c90e920 7c910060 ffffffff 0236fd54 ' ..|`..|....T.6.'
0236fd10: 00522783 01590000 00000000 06860060 '.'R...Y.....`...'
0236fd20: 00000000 0000000a 068601a4 00001800 '................'
0236fd30: 0236ffa4 7379da74 737633d0 ffffffff '..6.t.ys.3vs....'
0236fd40: 737633cd 0236ffa4 00526f0c 0052c7e8 '.3vs..6..oR...R.'
0236fd50: ffffffff 06860060 0050c1a7 06860060 '....`.....P.`...'
0236fd60: 0050ce59 06860060 005cc1f4 0092f8cc 'Y.P.`.....\.....'
0236fd70: 00000016 00b94072 00000000 0000f100 '....r@..........'
0236fd80: 00000000 0092f8cc 00000000 00000080 '................'
0236fd90: 068601a4 0000000a 06e069c0 068601a4 '.........i......'
0236fda0: 00000000 06860060 00000010 0000000a '....`...........'
0236fdb0: 0236fb38 0000195f 0236ffa4 00200000 '8.6._.....6... .'
0236fdc0: 00000000 00080000 00000000 0008ae51 '............Q...'
0236fdd0: 00000038 00000002 003261a1 000000ff '8........a2.....'
0236fde0: 00001fff 000007ff 000000ff 000c528a '.............R..'
0236fdf0: 0000195f 0703073f 000000cf 0000001f '_...?...........'
0236fe00: 00000000 00000000 00000038 00000072 '........8...r...'
0236fe10: 003261a1 000000ff 00001fff 000007ff '.a2.............'
0236fe20: 000000ff 000c528a 0000195f 0703073f '.....R.._...?...'
0236fe30: 000000cf 0000001f 00000000 00000000 '................'
0236fe40: 00000500 00000600 00000001 00000001 '................'
0236fe50: 00001000 00001000 00002000 00000800 '......... ......'
0236fe60: 00000010 c5600000 c5680000 458ff800 '......`...h....E'
0236fe70: 458bf800 00000000 000000ff 00080008 '...E............'
0236fe80: 00ffffff 00040004 ffffffff 00000000 '................'
0236fe90: 84e63de0 11cf46aa 00006f81 6e1520c0 '.=...F...o... .n'
0236fea0: 00040006 0000003f 00000000 00000000 '....?...........'
>> HEAP[gp3.exe]: >> Invalid Address specified to RtlFreeHeap( 01590000, 06860060 )
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000b78
First chance exception
Exception address: 0x7c90120e
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Stack trace:
7C90120F: WINDOWS\system32\ntdll.dll! DbgBreakPoint + 1 bytes
7C96F26E: WINDOWS\system32\ntdll.dll! RtlpNtMakeTemporaryKey + 27506 bytes
7C970456: WINDOWS\system32\ntdll.dll! RtlpNtMakeTemporaryKey + 32090 bytes
7C94BAFC: WINDOWS\system32\ntdll.dll! LdrAlternateResourcesEnabled + 13245 bytes
7C91A1BA: WINDOWS\system32\ntdll.dll! RtlpUnWaitCriticalSection + 1627 bytes
00522783: GP3\GPxPatch.exe! <no symbol>
0050C1A7: GP3\GPxPatch.exe! <no symbol>
Registers:
EAX=06860058 ECX=7C91D4FD ESI=01590000
EBX=06860058 EDX=0236F8BE EDI=06860058
CS:EIP=001B:7C90120F
SS:ESP=0023:0236FAC8 EBP=0236FACC
DS=0023 ES=0023 FS=003B GS=0000
Flags=00200202
Stack dump:
0236fac8: 7c96ee31 0236fae0 7c96f26e 06860058 '1..|..6.n..|X...'
0236fad8: 01590000 06860060 0236fb54 7c970456 '..Y.`...T.6.V..|'
0236fae8: 01590000 06860058 7c97060c 01590000 '..Y.X......|..Y.'
0236faf8: 06860060 40000060 00000000 00000000 '`...`..@........'
0236fb08: 0236fb9c 00000000 00000000 00000000 '..6.............'
0236fb18: 00000001 00000000 00000000 00012d68 '............h-..'
0236fb28: 06860058 01590000 0236fbdc 00000000 'X.....Y...6.....'
0236fb38: 00010010 0236faf4 00000000 0236fc2c '......6.....,.6.'
0236fb48: 7c90e920 7c9705e8 00000001 0236fc3c ' ..|...|....<.6.'
0236fb58: 7c94bafc 01590000 50000061 06860060 '...|..Y.a..P`...'
0236fb68: 01590000 06860060 40000060 0236fd1c '..Y.`...`..@..6.'
0236fb78: 7379da74 73762fa8 ffffffff 73762fa5 't.ys./vs...../vs'
0236fb88: 73767208 06e069c0 00c9eaf0 0002252f '.rvs.i....../%..'
0236fb98: 00c9ea88 06e06910 01590000 00000000 '.....i....Y.....'
0236fba8: 0159c410 00000000 00000000 01590000 '..Y...........Y.'
0236fbb8: 7c90cffa 7c809c2b 00000000 00000003 '...|+..|........'
0236fbc8: 01590000 0001f9c4 01591fb0 0236fb30 '..Y.......Y.0.6.'
0236fbd8: 7c90e920 06e06830 7c90e920 7c910060 ' ..|0h.. ..|`..|'
0236fbe8: ffffffff 7c91005d 00522783 01590000 '....]..|.'R...Y.'
0236fbf8: 00000000 015939d8 00012d44 01590000 '.....9Y.D-....Y.'
0236fc08: 00000000 00000000 0236ffa4 00526f0c '..........6..oR.'
0236fc18: 0052c7d0 060069c0 00150000 0236fb68 '..R..i......h.6.'
0236fc28: 00526f0c 0236fcfc 7c90e920 7c91a3d0 '.oR...6. ..|...|'
0236fc38: ffffffff 0236fd0c 7c91a1ba 01590000 '......6....|..Y.'
0236fc48: 40000060 06860060 00000000 06860060 '`..@`.......`...'
0236fc58: 068601a4 06e06830 06e08af4 06e08b70 '....0h......p...'
0236fc68: 0236fca8 73764fb3 73764fcb 73764fd2 '..6..Ovs.Ovs.Ovs'
0236fc78: 06e08b70 06e08ac0 06e069c0 06e06910 'p........i...i..'
0236fc88: 06e06830 06e069c0 0236fc78 739fb4da '0h...i..x.6....s'
0236fc98: 0236fd1c 7379da74 73764fd8 ffffffff '..6.t.ys.Ovs....'
0236fca8: 73764fd2 7394d523 73766a4a 73766a52 '.Ovs#..sJjvsRjvs'
0236fcb8: 04db03c0 06e069c0 0236fd98 02ad30c0 '.....i....6..0..'
0236fcc8: 00179218 06e06910 06e06830 01590000 '.....i..0h....Y.'
0236fcd8: 06e06830 0236fccc 0236fd3c 00000008 '0h....6.<.6.....'
0236fce8: 00c9ea88 00016a90 00000000 0236fc50 '.....j......P.6.'
0236fcf8: 73763674 0236fd44 7c90e920 7c910060 't6vsD.6. ..|`..|'
0236fd08: ffffffff 0236fd54 00522783 01590000 '....T.6..'R...Y.'
0236fd18: 00000000 06860060 00000000 0000000a '....`...........'
0236fd28: 068601a4 00001800 0236ffa4 7379da74 '..........6.t.ys'
0236fd38: 737633d0 ffffffff 737633cd 0236ffa4 '.3vs.....3vs..6.'
0236fd48: 00526f0c 0052c7e8 ffffffff 06860060 '.oR...R.....`...'
0236fd58: 0050c1a7 06860060 0050ce59 06860060 '..P.`...Y.P.`...'
0236fd68: 005cc1f4 0092f8cc 00000016 00b94072 '..\.........r@..'
0236fd78: 00000000 0000f100 00000000 0092f8cc '................'
0236fd88: 00000000 00000080 068601a4 0000000a '................'
0236fd98: 06e069c0 068601a4 00000000 06860060 '.i..........`...'
0236fda8: 00000010 0000000a 0236fb38 0000195f '........8.6._...'
0236fdb8: 0236ffa4 00200000 00000000 00080000 '..6... .........'
0236fdc8: 00000000 0008ae51 00000038 00000002 '....Q...8.......'
0236fdd8: 003261a1 000000ff 00001fff 000007ff '.a2.............'
0236fde8: 000000ff 000c528a 0000195f 0703073f '.....R.._...?...'
0236fdf8: 000000cf 0000001f 00000000 00000000 '................'
0236fe08: 00000038 00000072 003261a1 000000ff '8...r....a2.....'
0236fe18: 00001fff 000007ff 000000ff 000c528a '.............R..'
0236fe28: 0000195f 0703073f 000000cf 0000001f '_...?...........'
0236fe38: 00000000 00000000 00000500 00000600 '................'
0236fe48: 00000001 00000001 00001000 00001000 '................'
0236fe58: 00002000 00000800 00000010 c5600000 '. ............`.'
0236fe68: c5680000 458ff800 458bf800 00000000 '..h....E...E....'
0236fe78: 000000ff 00080008 00ffffff 00040004 '................'
0236fe88: ffffffff 00000000 84e63de0 11cf46aa '.........=...F..'
0236fe98: 00006f81 6e1520c0 00040006 0000003f '.o... .n....?...'
0236fea8: 00000000 00000000 00000000 00000000 '................'
0236feb8: 00487640 005cc1f4 0092f8cc 00000016 '@vH...\.........'
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000b78
First chance exception
Exception address: 0x7c919d6f
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfea0fea0
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000b78
First chance exception
Exception address: 0x00515c4e
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00000000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000b78
Unhandled exception
Exception address: 0x00515c4e
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00000000
Stack trace:
00515C4E: GP3\GPxPatch.exe! <no symbol>
Registers:
EAX=00000000 ECX=0000001F ESI=00000004
EBX=0000A3E6 EDX=015925E0 EDI=00C68040
CS:EIP=001B:00515C4E
SS:ESP=0023:0236FC48 EBP=00000000
DS=0023 ES=0023 FS=003B GS=0000
Flags=00200216
Stack dump:
0236fc48: 00000000 0000000c 00000016 0092f904 '................'
0236fc58: 00000000 00000000 6a337067 5c736d61 '........gp3jams\'
0236fc68: 6e69616d 6168635c 73697373 616a2e33 'main\chassis3.ja'
0236fc78: 0000006d 00000000 00000000 00000000 'm...............'
0236fc88: 00000000 00000000 00000000 00000000 '................'
0236fc98: 00000000 00000000 00000000 00000000 '................'
0236fca8: 00000000 00000000 00000000 00000000 '................'
0236fcb8: 00000000 00000000 00000000 00000000 '................'
0236fcc8: 00000000 00000000 00000000 00000000 '................'
0236fcd8: 7c910435 7c91043e 7ffd8bf8 00020024 '5..|>..|....$...'
0236fce8: 00c12e3e 7c90eb99 7ffd8c00 7ffd7000 '>......|.....p..'
0236fcf8: 7c901000 7ffd8bf8 00000000 00c12e3e '...|........>...'
0236fd08: 0236fd2c 7c80f376 7c910460 7c980620 ',.6.v..|`..| ..|'
0236fd18: 7c80f381 7ffd8bf8 0092f904 0208000c '...|............'
0236fd28: 00020290 0236fd44 7c83612a 7ffd8bf8 '....D.6.*a.|....'
0236fd38: 0092f904 005cc1f4 00b94072 00000016 '......\.r@......'
0236fd48: 004ef9ac 00c12e3e 0000000c 0092f904 '..N.>...........'
0236fd58: 00000000 0050c713 0050c724 0092f904 '......P.$.P.....'
0236fd68: 005cc1f4 0092f904 00000016 00b94072 '..\.........r@..'
0236fd78: 00000000 00000000 00000000 0092f904 '................'
0236fd88: 00000001 00000000 00000000 00000000 '................'
0236fd98: 00000000 00000000 00000000 00000000 '................'
0236fda8: 00000010 0000404f 0236fb38 00150000 '....O@..8.6.....'
0236fdb8: 0236ffa4 7c90e920 00000fa0 77c2e524 '..6. ..|....$..w'
0236fdc8: 00036274 77c2e556 00036274 0092f904 'tb..V..wtb......'
0236fdd8: 77c30390 00000004 77c303ad 0000002d '...w.......w-...'
0236fde8: 77c5fd00 00000000 0000002d 0236fde4 '...w....-.....6.'
0236fdf8: 0000002d 0236fe60 77c35c94 77c12580 '-...`.6..\.w.%.w'
0236fe08: ffffffff 77c303ad 77c3edb2 00000004 '.......w...w....'
0236fe18: 0003d1f8 0000002d 005cc1f4 77c3a52e '....-.....\....w'
0236fe28: 012145a0 0236fe38 77c3b967 00000014 '.E!.8.6.g..w....'
0236fe38: 0236fe70 77c3ef44 77c5fd00 77c3ef3b 'p.6.D..w...w;..w'
0236fe48: 005cc1f4 012143f0 00b94072 00000000 '..\..C!.r@......'
0236fe58: 0236fe48 0236fe44 0236ffa4 77c35c94 'H.6.D.6...6..\.w'
0236fe68: 77c14478 ffffffff 77c3ef3b 099071d6 'xD.w....;..w.q..'
0236fe78: 77c5fd00 09911e04 77c5fd00 0092f904 '...w.......w....'
0236fe88: 09907206 09911e04 0092f904 0092f904 '.r..............'
0236fe98: 00487634 005cc1f4 0092f904 00000016 '4vH...\.........'
0236fea8: 0236febc 00b94072 030cec80 000f0228 '..6.r@......(...'
0236feb8: 00487640 005cc1f4 0092f904 00000016 '@vH...\.........'
0236fec8: 0236fedc 00b94072 030cec80 000f0228 '..6.r@......(...'
0236fed8: 02fa9d00 0048766e 00487766 005cc1f4 '....nvH.fwH...\.'
0236fee8: 00b511e6 00000016 0236ff04 00b94072 '..........6.r@..'
0236fef8: 00000000 00000000 00000001 005cc1f4 '..............\.'
0236ff08: 00b511e6 00000016 0236ff24 00b94072 '........$.6.r@..'
0236ff18: 00000000 00000000 06950020 0047e6bd '........ .....G.'
0236ff28: 0047d103 0047dbed 00c49b7c 00c5bc57 '..G...G.|...W...'
0236ff38: 00000a00 0236ff50 756e6547 00000004 '....P.6.Genu....'
0236ff48: 6c65746e 0047dfc8 0047e001 0040100c 'ntel..G...G...@.'
0236ff58: 004f0459 00150000 015924d8 0236ffb4 'Y.O......$Y...6.'
0236ff68: 0236ff7c 015924d8 7c90e514 0236ffb0 '|.6..$Y....|..6.'
0236ff78: 00000b78 0051e8d1 015924d8 005231dc 'x.....Q..$Y..1R.'
0236ff88: 00000000 00150000 7c91a3cb 015924d8 '...........|.$Y.'
0236ff98: c0000005 0236ff8c 0236f86c 0236ffdc '......6.l.6...6.'
0236ffa8: 00526f0c 0052c800 00000000 0236ffec '.oR...R.......6.'
0236ffb8: 7c80b729 015924d8 00150000 7c91a3cb ';)..|.$Y........|'
0236ffc8: 015924d8 7ffd8000 c0000005 0236ffc0 '.$Y...........6.'
0236ffd8: 0236f86c ffffffff 7c839ad8 7c80b730 'l.6........|0..|'
0236ffe8: 00000000 00000000 00000000 00523185 '.............1R.'
0236fff8: 015924d8 00000000 00000034 00000000 '.$Y.....4.......'
02370008: 00000001 00000000 00000001 00000000 '................'
02370018: 00000001 00000000 00000001 00000000 '................'
02370028: 00000001 00000000 00000001 00000000 '................'
02370038: 00000001 00000000 00000001 00000000 '................'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000e38
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000fac
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000fdc
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000214
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000918
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000006ec
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000d50
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000017c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000894
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000b78
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x000004d0
Process exit code = -1073741819

Kimi forever!
Re: gp3 crashing every time
Date: November 14, 2011 09:14AM
Posted by: savinaclaudio
Every time? with every track? with every carset? with every carshape? with every cockpit shape?
Sometimes one of them is involved...
Re: gp3 crashing every time
Date: November 14, 2011 10:00AM
Posted by: mortal
I spy a faulty jam


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: gp3 crashing every time
Date: November 14, 2011 11:18AM
Posted by: ooleeeo
mortal Wrote:
-------------------------------------------------------
> I spy a faulty jam


which one?

Kimi forever!
Re: gp3 crashing every time
Date: November 14, 2011 09:15PM
Posted by: mortal
0236fc58: 00000000 00000000 6a337067 5c736d61 '........gp3jams\'
0236fc68: 6e69616d 6168635c 73697373 616a2e33 'main\chassis3.ja'
0236fc78: 0000006d 00000000 00000000 00000000 'm...............'


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy