Nothing works [gpx error log]

Posted by maskou 
Nothing works [gpx error log]
Date: April 29, 2013 02:26PM
Posted by: maskou
Hi to all
Well here I have a big problem. With my gp4 csm no longer works at all.
I had several error messages so I followed the instructions to reinstall the game completely.
I took care of everything uninstall according to the rules. After I reinstall the original game, then the 9.6 patch and GP4.exe.
Then, as the instructions say, I start the game with GP4.exe and nothing happens, I return to the office.
If I click on autorun.exe it asks me to install directx 8.1.
I did but I have directx 9 then nothing happens. Is it possible that four gp4 does not work on directx 9.
I think that since I did the update of directx I did not play a gp4.
I do not know if there is a way around the problem.
I know that gp4 is an old game, but with the recent mod csm and it was really great.
As I was not a big powerful machine that really suited me.
My computer runs Windows XP
I is not made ​​any configuration changes except setting a usual day.
Thank you again for your help.



Edited 3 time(s). Last edit at 04/30/2013 10:25AM by mortal.
Re: Nothing works
Date: April 29, 2013 03:13PM
Posted by: superman77m
Have you got the gxpatch installed too?



Edited 1 time(s). Last edit at 04/29/2013 03:14PM by superman77m.
Re: Nothing works
Date: April 29, 2013 03:41PM
Posted by: maskou
Not yet
Re: Nothing works
Date: April 29, 2013 04:07PM
Posted by: maskou
I did the installation is still nothing that works.
Re: Nothing works
Date: April 29, 2013 04:20PM
Posted by: superman77m
You need install the gpxpatch too. Download from this page:

[rsdi.home.xs4all.nl]

Then, open the game all time executing the gpxpatch.exe and not the gp4.exe
Re: Nothing works
Date: April 29, 2013 04:44PM
Posted by: maskou
I did what you told me, but it does not work, I always go back to the desktop.
Re: Nothing works
Date: April 29, 2013 07:57PM
Posted by: EricMoinet
Set GPxPatch to Verbosity High, run the exe and post the log here.



Re: Nothing works
Date: April 30, 2013 12:06AM
Posted by: mortal
Interesting. You say CSM no longer works, so did it work before? I'd like to see the contents of the error messages. You must start GP4 via gpx_patch. As Eric says, set gpx verbosity to high and tick the debug mode box. Post the error log that gpx generates if it does so ok.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Nothing works
Date: April 30, 2013 01:47AM
Posted by: maskou
Yes CSM functioned very well before. I send you the error log.
Thank you.

Starting log
GPxPatch version: 4.02
GPx version detected: decrypted GP4 v1.02
Verbosity level is 2
OS version info: Windows XP Service Pack 3 build 2600
Total physical memory: 2047 MB (free: 905 MB)
Debugging gp4.exe
Process created:
Process ID = 0x000009d4
Process handle = 0x000004dc
Main thread ID = 0x000006bc
Main thread handle = 0x000004e0
Process will run on CPU 1 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x000006bc
Entry point = 0x005ddec6
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path ntdll.dll
base 0x7c910000
size 743424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\kernel32.dll
base 0x7c800000
size 1055232
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\d3d8.dll
base 0x6de70000
size 1179648
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\d3d8thk.dll
base 0x6de60000
size 8192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\GDI32.dll
base 0x77ef0000
size 286720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\USER32.dll
base 0x7e390000
size 579584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\msvcrt.dll
base 0x77be0000
size 343040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\ADVAPI32.dll
base 0x77da0000
size 685568
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\RPCRT4.dll
base 0x77e50000
size 590848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\Secur32.dll
base 0x77fc0000
size 56832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\VERSION.dll
base 0x77bd0000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dinput8.dll
base 0x6d2d0000
size 187904
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\winspool.drv
base 0x72f50000
size 146944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\ole32.dll
base 0x774a0000
size 1288192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\winmm.dll
base 0x76ae0000
size 180736
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dsound.dll
base 0x73e60000
size 367616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\binkw32.dll
base 0x30000000
size 357939
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\wsock32.dll
base 0x71a10000
size 25088
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\WS2_32.dll
base 0x719f0000
size 82432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\WS2HELP.dll
base 0x719e0000
size 19968
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c91120e
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x005ddec6)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\IMM32.DLL
base 0x76320000
size 110080
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x005ddec6
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x010a0000...
Injection succesful
Setting instruction pointer to injected code (0x010a0000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 28160
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\GPxPSup.dll
base 0x09900000
size 38912
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c40000
size 148480
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76c40000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c40000
size 148480
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76c40000
>> D3D Constructor!
>> Starting WinMain
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\uxtheme.dll
base 0x5b090000
size 219648
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\NVIDIA Corporation\nview\nview.dll
base 0x10000000
size 1564008
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\PSAPI.DLL
base 0x76ba0000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\COMCTL32.dll
base 0x58b50000
size 617472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\SHLWAPI.dll
base 0x77f40000
size 474624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\SHELL32.dll
base 0x7c9d0000
size 8519168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\OLEAUT32.dll
base 0x770e0000
size 552448
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
base 0x77390000
size 1054208
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\NTMARTA.DLL
base 0x77650000
size 119808
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\SAMLIB.dll
base 0x71b50000
size 64000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f10000
size 172544
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path
base 0x01310000
size 325480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\MSCTF.dll
base 0x74690000
size 297984
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\msctfime.ime
base 0x75140000
size 177152
>> WM_ACTIVATE (active)(not minimized)
>> Game thread into win95_startup(0)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000ed4
Thread handle = 0x00000584
Start address = 0x7c810729
Thread local base = 0x7ffde000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\CLBCATQ.DLL
base 0x76f80000
size 498688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\COMRes.dll
base 0x77000000
size 851968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dplayx.dll
base 0x6cc00000
size 229888
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6cbf0000
size 24064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\TAPI32.dll
base 0x76e60000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\rtutils.dll
base 0x76e30000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000cdc
Thread handle = 0x000005a0
Start address = 0x7c810729
Thread local base = 0x7ffdd000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x6cbf0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76e60000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76e30000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6cbf0000
size 24064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\TAPI32.dll
base 0x76e60000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\rtutils.dll
base 0x76e30000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000dc4
Thread handle = 0x000005b0
Start address = 0x7c810729
Thread local base = 0x7ffdc000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000dc4
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x6cbf0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76e60000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76e30000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dpwsockx.dll
base 0x59780000
size 57344
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x59780000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dpwsockx.dll
base 0x59780000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\mswsock.dll
base 0x71990000
size 247808
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\hnetcfg.dll
base 0x62e40000
size 347136
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\System32\wshtcpip.dll
base 0x719d0000
size 19456
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dpnhupnp.dll
base 0x6cb80000
size 60928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\rsaenh.dll
base 0x68000000
size 208384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d10000
size 95744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\rasapi32.dll
base 0x76e90000
size 237056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\rasman.dll
base 0x76e40000
size 61440
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\NETAPI32.dll
base 0x6fee0000
size 337920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\TAPI32.dll
base 0x76e60000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\rtutils.dll
base 0x76e30000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\dpnhpast.dll
base 0x6cba0000
size 35328
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x6cba0000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000de8
Thread handle = 0x000005e8
Start address = 0x7c810729
Thread local base = 0x7ffdc000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76d10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x6cb80000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x719d0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000de8
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x62e40000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x59780000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000cdc
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\DNSAPI.dll
base 0x76ed0000
size 149504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d10000
size 95744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\System32\winrnr.dll
base 0x76f60000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Bonjour\mdnsNSP.dll
base 0x64000000
size 121704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\rasadhlp.dll
base 0x76f70000
size 7680
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x76f60000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x64000000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\mscat32.dll
base 0x73240000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\WINTRUST.dll
base 0x76be0000
size 177664
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\CRYPT32.dll
base 0x779e0000
size 608256
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\MSASN1.dll
base 0x77a80000
size 58880
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\IMAGEHLP.dll
base 0x76c40000
size 148480
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000c4c
Thread handle = 0x0000060c
Start address = 0x7c810729
Thread local base = 0x7ffdd000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000cc0
Thread handle = 0x00000610
Start address = 0x7c810729
Thread local base = 0x7ffdc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000d98
Thread handle = 0x00000614
Start address = 0x7c810729
Thread local base = 0x7ffdb000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path
base 0x01b70000
size 2986496
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000790
Thread handle = 0x0000061c
Start address = 0x7c810729
Thread local base = 0x7ffda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\userenv.dll
base 0x76960000
size 734720
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000a34
Thread handle = 0x00000624
Start address = 0x7c810729
Thread local base = 0x7ffd9000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\cryptnet.dll
base 0x75ed0000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\SensApi.dll
base 0x72220000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\WINHTTP.dll
base 0x4d5e0000
size 354816
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x73240000
>> nv4_disp.dll>>
>> NVIDIA GeForce 7300 GT >>
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\mscat32.dll
base 0x73240000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x73240000
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 1360 x 768 (format 23) confirmed
>> Device mode 1440 x 900 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 1360 x 768 (format 23) confirmed
>> Device mode 1440 x 900 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 1360 x 768 (format 23) confirmed
>> Device mode 1440 x 900 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
>>
Win95_Startup : 1024 x 768
>>
win95_initialiseD3D : 1024 x 768
>> Initialize3DEnvironment(1024 x 768 TNL:1)
>> Initialize3DEnvironment() - Requested width x height x format found in mode list
>> Puredevice set
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path
base 0x01720000
size 54272
>> D3DDevice created = >> HAL (hw vp): NVIDIA GeForce 7300 GT >>
>>
GP_win95 :: Running gfx at 32/24 bit
>> win95_startup() - Initialize3DEnvironment ok

Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\HID.DLL
base 0x68d50000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\SETUPAPI.DLL
base 0x778e0000
size 1005056
>> No joysticks found
>> Game thread finishing win95 startup(0)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 25088
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 42496
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 56320
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 19968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\gp4tweak.dll
base 0x40000000
size 48640
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\wdmaud.drv
base 0x72c70000
size 23552
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000f74
Thread handle = 0x00000664
Start address = 0x7c810729
Thread local base = 0x7ffd7000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\msacm32.drv
base 0x72c60000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\MSACM32.dll
base 0x77bb0000
size 72192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path
base 0x03ff0000
size 82944
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
base 0x03ff0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\midimap.dll
base 0x77ba0000
size 18944
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000728
Thread handle = 0x00000678
Start address = 0x7c810729
Thread local base = 0x7ffd6000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000006bc
path C:\WINDOWS\system32\KsUser.dll
base 0x73e30000
size 4096
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000009cc
Thread handle = 0x00000680
Start address = 0x7c810729
Thread local base = 0x7ffd5000
>> Bink init completed
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x0054d09c
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00b4a000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000006bc
First chance exception
Exception address: 0x7c9200e8
Module name: 'ntdll.dll' (base 0x7c910000, size 743424)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000ed4
First chance exception
Exception address: 0x00509fbd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000ed4
Unhandled exception
Exception address: 0x00509fbd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Stack trace:
00509FBD: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
76AFADFE: WINDOWS\system32\WINMM.dll! timeKillEvent + 953 bytes
76AFAF02: WINDOWS\system32\WINMM.dll! timeGetSystemTime + 151 bytes
7C80B729: WINDOWS\system32\kernel32.dll! GetModuleFileNameA + 442 bytes
Registers:
EAX=58070083 ECX=58070083 ESI=00000010
EBX=00000000 EDX=76B00200 EDI=0050A190
CS:EIP=001B:00509FBD
SS:ESP=0023:015BFE90 EBP=015BFEDC
DS=0023 ES=0023 FS=003B GS=0000
Flags=00000202
Stack dump:
015bfe90: 0054e75d 0050a190 00000010 015bfedc '].T...P.......[.'
015bfea0: 015bfeb4 00000000 76b00200 015bfee8 '..[........v..[.'
015bfeb0: 00000000 0050a195 76ae54e3 00000010 '......P..T.v....'
015bfec0: 00000000 00010598 00000000 00000000 '................'
015bfed0: 00000000 76b01760 76b00200 015bff18 '....`..v...v..[.'
015bfee0: 76afadfe 0050a190 00000003 00000010 '...v..P.........'
015bfef0: 00000000 00010598 00000000 00000000 '................'
015bff00: 7c97fd98 00000001 00000000 76afaee9 '...|...........v'
015bff10: 0050a190 00010598 015bffb4 76afaf02 '..P.......[....v'
015bff20: 00000010 ffffffff 00000000 00000010 '................'
015bff30: 00000021 b76f6c30 80644544 89964020 '!...0lo.DEd. @..'
015bff40: 899b2020 7ffde000 b76f6c88 80502fd0 ' .......lo../P.'
015bff50: 00780010 00000008 00000000 00000000 '..x.............'
015bff60: 00000000 804ff910 00000001 00000124 '......O.....$...'
015bff70: 00000134 000001d0 899b2020 b76f6d50 '4....... ..Pmo.'
015bff80: 00000000 899b2108 b76f6c01 00000000 '.....!...lo.....'
015bff90: 89964020 80502fb0 00000000 00000000 ' @.../P.........'
015bffa0: 00000000 80502fb8 b76f6ca0 806e7ef2 '...../P..lo..~n.'
015bffb0: 00000002 015bffec 7c80b729 00000000 '......[.)..|....'
015bffc0: 7c97fd98 ffffffff 00000000 7ffde000 '...|............'
015bffd0: c0000005 015bffc0 015bfab4 ffffffff '......[...[.....'
015bffe0: 7c839ab0 7c80b730 00000000 00000000 '...|0..|........'
015bfff0: 00000000 76afaeaf 00000000 00000000 '.......v........'
015c0000: 00000000 00000000 00000000 00000000 '................'
015c0010: 00000000 00000000 00000000 00000000 '................'
015c0020: 00000000 00000000 00000000 00000000 '................'
015c0030: 00000000 00000000 00000000 00000000 '................'
015c0040: 00000000 00000000 00000000 00000000 '................'
015c0050: 00000000 00000000 00000000 00000000 '................'
015c0060: 00000000 00000000 00000000 00000000 '................'
015c0070: 00000000 00000000 00000000 00000000 '................'
015c0080: 00000000 00000000 00000000 00000000 '................'
015c0090: 00000000 00000000 00000000 00000000 '................'
015c00a0: 00000000 00000000 00000000 00000000 '................'
015c00b0: 00000000 00000000 00000000 00000000 '................'
015c00c0: 00000000 00000000 00000000 00000000 '................'
015c00d0: 00000000 00000000 00000000 00000000 '................'
015c00e0: 00000000 00000000 00000000 00000000 '................'
015c00f0: 00000000 00000000 00000000 00000000 '................'
015c0100: 00000000 00000000 00000000 00000000 '................'
015c0110: 00000000 00000000 00000000 00000000 '................'
015c0120: 00000000 00000000 00000000 00000000 '................'
015c0130: 00000000 00000000 00000000 00000000 '................'
015c0140: 00000000 00000000 00000000 00000000 '................'
015c0150: 00000000 00000000 00000000 00000000 '................'
015c0160: 00000000 00000000 00000000 00000000 '................'
015c0170: 00000000 00000000 00000000 00000000 '................'
015c0180: 00000000 00000000 00000000 00000000 '................'
015c0190: 00000000 00000000 00000000 00000000 '................'
015c01a0: 00000000 00000000 00000000 00000000 '................'
015c01b0: 00000000 00000000 00000000 00000000 '................'
015c01c0: 00000000 00000000 00000000 00000000 '................'
015c01d0: 00000000 00000000 00000000 00000000 '................'
015c01e0: 00000000 00000000 00000000 00000000 '................'
015c01f0: 00000000 00000000 00000000 00000000 '................'
015c0200: 00000000 00000000 00000000 00000000 '................'
015c0210: 00000000 00000000 00000000 00000000 '................'
015c0220: 00000000 00000000 00000000 00000000 '................'
015c0230: 00000000 00000000 00000000 00000000 '................'
015c0240: 00000000 00000000 00000000 00000000 '................'
015c0250: 00000000 00000000 00000000 00000000 '................'
015c0260: 00000000 00000000 00000000 00000000 '................'
015c0270: 00000000 00000000 00000000 00000000 '................'
015c0280: 00000000 00000000 00000000 00000000 '................'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000009cc
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000ed4
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000f74
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000728
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000006bc
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000c4c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000cc0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000d98
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000790
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x00000a34
Process exit code = -1073741819
Re: Nothing works [gpx error log]
Date: April 30, 2013 01:09PM
Posted by: SDI
The address where it crashes is related to audio. Some audio class pointer is invalid/corrupted.

René Smit, Independent Software Developer.
Download my GPx tools here.
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy