I use this Version of GPXPATCH V2.03 as it is the most compatible with external graphics using WIN XP!
Just lately I now find when I race in Full race mode I get to about 30 laps and the game crashed back to Desktop with the following GPXPATCH ERROR!
Starting log
GPxPatch version: 2.03
GPx version detected: decrypted 1.13
Verbosity level is 2
OS version info: Windows XP build 2600
Total physical memory: 479 MB (free: 272 MB)
Debugging gp3.exe
Process created:
Process ID = 0x000003a4
Process handle = 0x00000060
Main thread ID = 0x0000015c
Main thread handle = 0x00000064
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x0000015c
Entry point = 0x00523473
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path ntdll.dll
base 0x77f50000
size 674304
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\kernel32.dll
base 0x77e60000
size 926720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\USER32.dll
base 0x77d40000
size 561152
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\GDI32.dll
base 0x77c70000
size 250880
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\ADVAPI32.dll
base 0x77dd0000
size 549888
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\RPCRT4.dll
base 0x77cc0000
size 463872
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WINSPOOL.DRV
base 0x73000000
size 131584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\msvcrt.dll
base 0x77c10000
size 322560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\ole32.dll
base 0x771b0000
size 1141248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\DDRAW.dll
base 0x73760000
size 267264
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\DCIMAN32.dll
base 0x73bc0000
size 7680
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\DINPUT.dll
base 0x72280000
size 151552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WINMM.dll
base 0x76b40000
size 170496
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WSOCK32.dll
base 0x71ad0000
size 21504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WS2_32.dll
base 0x71ab0000
size 75264
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WS2HELP.dll
base 0x71aa0000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\DSOUND.dll
base 0x73f10000
size 338944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\VERSION.dll
base 0x77c00000
size 16384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\F1GP3\Grand Prix 3\binkw32.dll
base 0x10000000
size 262656
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x0000015c
First chance exception
Exception address: 0x77f7f570
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x00523473)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\serwvdrv.dll
base 0x5cd70000
size 14848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\umdmxfrm.dll
base 0x5b0a0000
size 13312
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x0000015c
First chance exception
Exception address: 0x00523473
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x01320000...
Injection succesful
Setting instruction pointer to injected code (0x01320000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\F1GP3\Grand Prix 3\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 44544
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\F1GP3\Grand Prix 3\GPxPSup.dll
base 0x09900000
size 73216
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 126976
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76c90000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 126976
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76c90000
>> Starting WinMain
>> Loading library
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\uxtheme.dll
base 0x5ad70000
size 202752
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\S3appdll.dll
base 0x6b800000
size 53248
>> WM_ACTIVATE (active)(not minimized)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000065c
Thread handle = 0x000000d8
Start address = 0x77e802f4
Thread local base = 0x7ffdd000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\CLBCATQ.DLL
base 0x76fd0000
size 468480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\OLEAUT32.dll
base 0x77120000
size 569344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\COMRes.dll
base 0x77050000
size 792064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\dplayx.dll
base 0x6c750000
size 212992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\dpmodemx.dll
base 0x6c740000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\TAPI32.dll
base 0x76eb0000
size 163328
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\SHLWAPI.dll
base 0x772d0000
size 397824
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\rtutils.dll
base 0x76e80000
size 39936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.0.0_x-ww_1382d70a\comctl32.dll
base 0x71950000
size 921088
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000090
Thread handle = 0x00000100
Start address = 0x77e802f4
Thread local base = 0x7ffdc000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\dpmodemx.dll
base 0x6c740000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\TAPI32.dll
base 0x76eb0000
size 163328
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\rtutils.dll
base 0x76e80000
size 39936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\Secur32.dll
base 0x76f90000
size 52224
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000518
Thread handle = 0x00000114
Start address = 0x77e802f4
Thread local base = 0x7ffdb000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000518
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\dpwsockx.dll
base 0x6c5c0000
size 50176
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x6c5c0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\dpwsockx.dll
base 0x6c5c0000
size 50176
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\mswsock.dll
base 0x71a50000
size 228352
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\wshtcpip.dll
base 0x71a90000
size 17408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\dpnhpast.dll
base 0x6c6f0000
size 30208
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\iphlpapi.dll
base 0x76d60000
size 77312
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\netman.dll
base 0x76de0000
size 147968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\MPRAPI.dll
base 0x76d40000
size 79360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\ACTIVEDS.dll
base 0x76e40000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\adsldpc.dll
base 0x76e10000
size 139264
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\NETAPI32.dll
base 0x71c20000
size 309760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 167936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\ATL.DLL
base 0x76b20000
size 74802
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\rtutils.dll
base 0x76e80000
size 39936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\SAMLIB.dll
base 0x71bf0000
size 54784
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\SETUPAPI.dll
base 0x76670000
size 922624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\RASAPI32.dll
base 0x76ee0000
size 214528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\rasman.dll
base 0x76e90000
size 55808
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\TAPI32.dll
base 0x76eb0000
size 163328
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\SHELL32.dll
base 0x773d0000
size 8322560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WZCSvc.DLL
base 0x76da0000
size 184320
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WMI.dll
base 0x76d30000
size 5632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\DHCPCSVC.DLL
base 0x76d80000
size 98816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\DNSAPI.dll
base 0x76f20000
size 139264
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\CRYPT32.dll
base 0x762c0000
size 554496
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\MSASN1.dll
base 0x762a0000
size 51200
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WTSAPI32.dll
base 0x76f50000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WINSTA.dll
base 0x76360000
size 47104
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\comctl32.dll
base 0x77340000
size 557568
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\winrnr.dll
base 0x76fb0000
size 14848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\rasadhlp.dll
base 0x76fc0000
size 6144
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000003b4
Thread handle = 0x00000190
Start address = 0x77e802f4
Thread local base = 0x7ffdb000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x6c6f0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000003b4
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x71a90000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76fb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x6c5c0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000090
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\winrnr.dll
base 0x76fb0000
size 14848
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x76fb0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\dpmodemx.dll
base 0x6c740000
size 20992
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000004bc
Thread handle = 0x00000194
Start address = 0x77e802f4
Thread local base = 0x7ffdc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000002f0
Thread handle = 0x00000198
Start address = 0x77e802f4
Thread local base = 0x7ffdb000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000004bc
Thread exit code = 0
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000002f0
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x6c750000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\D3DIM700.DLL
base 0x73940000
size 791040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\mscat32.dll
base 0x732f0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\WINTRUST.dll
base 0x76c30000
size 166912
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\IMAGEHLP.dll
base 0x76c90000
size 126976
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000000bc
Thread handle = 0x000001a4
Start address = 0x77e802f4
Thread local base = 0x7ffdc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000100
Thread handle = 0x000001a8
Start address = 0x77e802f4
Thread local base = 0x7ffdb000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000594
Thread handle = 0x000001ac
Start address = 0x77e802f4
Thread local base = 0x7ffda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\rsaenh.dll
base 0x0ffd0000
size 131584
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000005f4
Thread handle = 0x000001b4
Start address = 0x77e802f4
Thread local base = 0x7ffd9000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\system32\userenv.dll
base 0x75a70000
size 662016
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000000f4
Thread handle = 0x000001bc
Start address = 0x77e802f4
Thread local base = 0x7ffd8000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\cryptnet.dll
base 0x73d50000
size 53248
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x732f0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x732f0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\HID.DLL
base 0x688f0000
size 22528
>> No joysticks found -- closing dinput
>> Closing DINPUT
>> In ddraw_set_screen
>> No change in cooperative level
>> changed window size
>> ddraw_set_screen finished ok.
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000638
Thread handle = 0x000001cc
Start address = 0x77e802f4
Thread local base = 0x7ffd7000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\F1GP3\Grand Prix 3\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 39936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\F1GP3\Grand Prix 3\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 7680
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\F1GP3\Grand Prix 3\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 29184
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\F1GP3\Grand Prix 3\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 38400
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\F1GP3\Grand Prix 3\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 12288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\wdmaud.drv
base 0x72d20000
size 22016
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
base 0x72d20000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\wdmaud.drv
base 0x72d20000
size 22016
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000680
Thread handle = 0x000001ec
Start address = 0x77e802f4
Thread local base = 0x7ffd6000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\msacm32.drv
base 0x72d10000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\MSACM32.dll
base 0x77be0000
size 67072
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\midimap.dll
base 0x77bd0000
size 17920
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000002bc
Thread handle = 0x000001fc
Start address = 0x77e802f4
Thread local base = 0x7ffd5000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\KsUser.dll
base 0x73ee0000
size 4096
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000004cc
Thread handle = 0x00000204
Start address = 0x77e802f4
Thread local base = 0x7ffd4000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x76b41d41
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadefe1
>> Bink init>> Bink init completed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\hpzntp05.dll
base 0x60600000
size 294912
>> Entering SimpleDocumentProperties>> inside DDPS returning sizeof>> Entering SimpleDocumentProperties>> inside DDPS returning sizeof>> Entering SimpleDocumentProperties>> inside DDPS returning sizeof>> Entering SimpleDocumentPropertiesDebug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
path C:\WINDOWS\System32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000638
base 0x732f0000
>> In ddraw_set_screen
>> No change in cooperative level
>> changed window size
>> ddraw_set_screen finished ok.
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
path C:\WINDOWS\System32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x0000015c
base 0x732f0000
>> D3D_SetDeviceSpecificFeatures: Disabling fog
>> D3D_SetDeviceSpecificFeatures: Disabling reflections
>> **** Failed to load detail map
>> Created surface
>> EnterCockpit mod 0
>> EnterCockpit mod 1
>> EnterCockpit mod 2
>> EnterCockpit mod 3
>> EnterCockpit mod 4
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000100
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000005f4
base 0x76c30000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000005f4
base 0x76c90000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000005f4
Thread exit code = 0
>> WM_ACTIVATE (inactive)(not minimized)
>> Lock failed trying to Lock() BackBuffer :>> DDERR_SURFACELOST
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
First chance exception
Exception address: 0x004b3bac
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x041e178c
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000638
Unhandled exception
Exception address: 0x004b3bac
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x041e178c
Stack trace:
004B3BAC: F1GP3\Grand Prix 3\GPxPatch.exe! <no symbol>
A0409840: <no module><no symbol>
Registers:
EAX=00000160 ECX=00000800 ESI=08733948
EBX=00000000 EDX=00000A86 EDI=041E178C
CS:EIP=001B:004B3BAC
SS:ESP=0023:01D9FE04 EBP=08800000
DS=0023 ES=0023 FS=003B GS=0000
Flags=00000202
Stack dump:
01d9fe04: 00000800 001a6000 004b420d 00453d5b '.....`...BK.[=E.'
01d9fe14: 041e17a6 00022000 00160810 041e178c '¦.... ......