GP4 Crashing During Loading

Posted by Richard J 
GP4 Crashing During Loading
Date: November 10, 2016 11:41PM
Posted by: Richard J
I have been running GP4 on a Asus laptop under windows 7. I am using CSM to start GP4. Suddenly last week Thursday, starting GP4 using CSM, CSM loaded the carset information and tracks. When it started loading GP4, it crashed to desk top. Hoping someone can help determine cause for GP4 to crash.

Starting log
GPxPatch version: 3.94
GPx version detected: decrypted GP4 v1.02
Verbosity level is 2
OS version info: Windows XP Service Pack 3 build 2600
Total physical memory: 1023 MB (free: 1023 MB)
Debugging GP4.exe
Process created:
Process ID = 0x000013b8
Process handle = 0x0000013c
Main thread ID = 0x00001264
Main thread handle = 0x00000138
Process will run on CPU 2 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x00001264
Entry point = 0x005ddec6
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path ntdll.dll
base 0x774c0000
size 1314112
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x771c0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x753c0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x771c0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x770c0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\kernel32.dll
base 0x753c0000
size 1114112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\KERNELBASE.dll
base 0x76dc0000
size 275456
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Program Files (x86)\Norton AntiVirus\NortonData\21.3.0.12\Definitions\BASHDefs\20161102.001\UMEngx86.dll
base 0x69970000
size 234568
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\d3d8.dll
base 0x69000000
size 1036800
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\msvcrt.dll
base 0x76a10000
size 690688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\USER32.dll
base 0x74e20000
size 833024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\GDI32.dll
base 0x75090000
size 312832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\LPK.dll
base 0x75080000
size 25600
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\USP10.dll
base 0x752a0000
size 627712
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x76ad0000
size 644096
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\sechost.dll
base 0x75530000
size 92160
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\RPCRT4.dll
base 0x76510000
size 666112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\SspiCli.dll
base 0x74db0000
size 96768
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\CRYPTBASE.dll
base 0x74da0000
size 36352
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\VERSION.dll
base 0x74990000
size 21504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\d3d8thk.dll
base 0x69510000
size 11264
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dwmapi.dll
base 0x6a830000
size 67584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dinput8.dll
base 0x699c0000
size 145408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\winspool.drv
base 0x695b0000
size 320000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\ole32.dll
base 0x768b0000
size 1414144
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\winmm.dll
base 0x6a850000
size 194048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dsound.dll
base 0x691d0000
size 453632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\POWRPROF.dll
base 0x6d000000
size 145408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\SETUPAPI.dll
base 0x76370000
size 1667584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\CFGMGR32.dll
base 0x75270000
size 145920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x74fe0000
size 581632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\DEVOBJ.dll
base 0x76d40000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path D:\gp4\binkw32.dll
base 0x30000000
size 357939
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\wsock32.dll
base 0x69b60000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\WS2_32.dll
base 0x75570000
size 206336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\NSI.dll
base 0x77490000
size 8704
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001264
First chance exception
Exception address: 0x77560ed4
Module name: 'ntdll.dll' (base 0x774c0000, size 1314112)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x005ddec6)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\apphelp.dll
base 0x6b400000
size 295936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\AppPatch\AcGenral.DLL
base 0x6a910000
size 2178560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\SHLWAPI.dll
base 0x76850000
size 350208
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\UxTheme.dll
base 0x6a890000
size 245760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\samcli.dll
base 0x6c030000
size 51200
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\MSACM32.dll
base 0x6b2a0000
size 72192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\SHELL32.dll
base 0x75720000
size 12880384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\sfc.dll
base 0x6c130000
size 2560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\sfc_os.DLL
base 0x6b290000
size 40960
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\USERENV.dll
base 0x75550000
size 81920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\profapi.dll
base 0x753b0000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\urlmon.dll
base 0x75120000
size 1312256
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\api-ms-win-downlevel-ole32-l1-1-0.dll
base 0x76b80000
size 5632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\api-ms-win-downlevel-shlwapi-l1-1-0.dll
base 0x753a0000
size 9728
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\api-ms-win-downlevel-advapi32-l1-1-0.dll
base 0x77080000
size 10752
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\api-ms-win-downlevel-user32-l1-1-0.dll
base 0x76ac0000
size 4096
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\api-ms-win-downlevel-version-l1-1-0.dll
base 0x75390000
size 3072
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x75680000
size 2560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\normaliz.DLL
base 0x76840000
size 2048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\iertutil.dll
base 0x76600000
size 2287616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\WININET.dll
base 0x76e20000
size 2444800
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\MPR.dll
base 0x6d220000
size 64000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\AppPatch\AcLayers.dll
base 0x68440000
size 562176
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\AppPatch\AcXtrnal.DLL
base 0x61970000
size 211968
>> FTH: (5048): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x01530000
size 6275072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x01530000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x01530000
size 6275072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x01530000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x01530000
size 6275072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x01530000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\SHUNIMPL.DLL
base 0x697c0000
size 10752
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000169c
Thread handle = 0x0000023c
Start address = 0x001e0064
Thread local base = 0x7efda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\SortServer2003Compat.dll
base 0x69790000
size 38400
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\IMM32.DLL
base 0x76d60000
size 119808
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\MSCTF.dll
base 0x755b0000
size 829952
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x00e20000
size 44544
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x00e20000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001264
First chance exception
Exception address: 0x005ddec6
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x003b0000...
Injection succesful
Setting instruction pointer to injected code (0x003b0000)
>> D3D Constructor!
>> Starting WinMain
>> WM_ACTIVATE (active)(not minimized)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\ole32.dll
base 0x02a90000
size 1414144
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x02a90000
>> Game thread into win95_startup(0)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000055c
Thread handle = 0x00000254
Start address = 0x6a85a3e0
Thread local base = 0x7efd7000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\CLBCatQ.DLL
base 0x75690000
size 522240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dplayx.dll
base 0x698c0000
size 213504
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000f44
Thread handle = 0x00000260
Start address = 0x698e9682
Thread local base = 0x7efaf000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dpmodemx.dll
base 0x699b0000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\TAPI32.dll
base 0x69880000
size 192000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
base 0x6c4c0000
size 1680896
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x699b0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x69880000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dpmodemx.dll
base 0x69960000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\TAPI32.dll
base 0x68fc0000
size 192000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\rtutils.dll
base 0x6e010000
size 37376
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000016c4
Thread handle = 0x0000027c
Start address = 0x7750f523
Thread local base = 0x7efac000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000006f8
Thread handle = 0x00000280
Start address = 0x68fcf1ac
Thread local base = 0x7efa9000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000006f8
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x69960000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x68fc0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dpwsockx.dll
base 0x69960000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\mswsock.dll
base 0x74550000
size 231424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\wshtcpip.dll
base 0x74540000
size 9216
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dpnathlp.dll
base 0x698a0000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\CRYPTSP.dll
base 0x74930000
size 80896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\rsaenh.dll
base 0x748f0000
size 242936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\iphlpapi.dll
base 0x74970000
size 103936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\WINNSI.DLL
base 0x74960000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\rasapi32.dll
base 0x6e040000
size 325120
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\rasman.dll
base 0x6e020000
size 76800
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\dhcpcsvc.DLL
base 0x6e3a0000
size 61952
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001014
Thread handle = 0x0000033c
Start address = 0x69964819
Thread local base = 0x7efa9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x6e040000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x6e020000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x698a0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001014
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x74540000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x69960000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000f44
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\NLAapi.dll
base 0x68b10000
size 52224
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\napinsp.dll
base 0x69320000
size 52224
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\pnrpnsp.dll
base 0x69300000
size 65024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\wshbth.dll
base 0x68ad0000
size 36352
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\DNSAPI.dll
base 0x6e3c0000
size 270336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\winrnr.dll
base 0x68ac0000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\fwpuclnt.dll
base 0x6dc30000
size 216576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\rasadhlp.dll
base 0x6dc70000
size 11776
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x68b10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x69320000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x69300000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x68ad0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x68ac0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x6dc30000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiu9pag.dll
base 0x5fa30000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiumdag.dll
base 0x5d1f0000
size 3602432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiumdva.dll
base 0x5cf10000
size 2913280
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001180
Thread handle = 0x00000364
Start address = 0x7751046c
Thread local base = 0x7efaf000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x5cf10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x5d1f0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x5fa30000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\mscat32.dll
base 0x699b0000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\WINTRUST.dll
base 0x77090000
size 179200
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\CRYPT32.dll
base 0x76b90000
size 1176064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\MSASN1.dll
base 0x76e10000
size 34304
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000005e0
Thread handle = 0x00000378
Start address = 0x76bc819d
Thread local base = 0x7efa9000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\bcrypt.dll
base 0x746b0000
size 80896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path
base 0x703b0000
size 249352
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\ncrypt.dll
base 0x703f0000
size 223232
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\GPAPI.dll
base 0x70390000
size 79360
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000015e0
Thread handle = 0x0000038c
Start address = 0x7751046c
Thread local base = 0x7efa6000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\cryptnet.dll
base 0x70370000
size 106496
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\syswow64\WLDAP32.dll
base 0x75340000
size 269824
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\SensApi.dll
base 0x74950000
size 10752
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x699b0000
>> atiu9pag.dll>>
>> ATI Mobility Radeon HD 5730>>
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\mscat32.dll
base 0x69960000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x69960000
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1366 x 768 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1360 x 768 (format 23) confirmed
>> Device mode 1366 x 768 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1366 x 768 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiu9pag.dll
base 0x5fa30000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiumdag.dll
base 0x5d1f0000
size 3602432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiumdva.dll
base 0x5cf10000
size 2913280
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x5cf10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x5d1f0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x5fa30000
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1360 x 768 (format 23) confirmed
>> Device mode 1366 x 768 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1366 x 768 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1360 x 768 (format 23) confirmed
>> Device mode 1366 x 768 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1360 x 768 (format 22) confirmed
>> Device mode 1366 x 768 (format 22) confirmed
>>
Win95_Startup : 1024 x 768
>>
win95_initialiseD3D : 1024 x 768
>> Initialize3DEnvironment(1024 x 768 TNL:1)
>> Initialize3DEnvironment() - Requested width x height x format found in mode list
>> Puredevice set
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiu9pag.dll
base 0x5fa30000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiumdag.dll
base 0x5d1f0000
size 3602432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\atiumdva.dll
base 0x5cf10000
size 2913280
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001488
Thread handle = 0x000003b8
Start address = 0x7751046c
Thread local base = 0x7efa3000
>> D3DDevice created = >> HAL (hw vp): ATI Mobility Radeon HD 5730>>
>>
GP_win95 :: Running gfx at 32/24 bit
>> win95_startup() - Initialize3DEnvironment ok

Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\HID.DLL
base 0x68b80000
size 22016
>> No joysticks found
>> Game thread finishing win95 startup(0)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path D:\gp4\gp4tweak.dll
base 0x40000000
size 70656
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\MMDevApi.dll
base 0x66ad0000
size 213504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
path C:\Windows\SysWOW64\PROPSYS.dll
base 0x6b590000
size 988160
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001764
Thread handle = 0x000003cc
Start address = 0x66ad27e1
Thread local base = 0x7efa0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001764
Thread exit code = 0
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001700
Thread handle = 0x000003cc
Start address = 0x691fe4a1
Thread local base = 0x7efa0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001700
path C:\Windows\SysWOW64\AUDIOSES.DLL
base 0x65540000
size 195072
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000173c
Thread handle = 0x000003d4
Start address = 0x66ad27e1
Thread local base = 0x7ef9d000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001740
Thread handle = 0x000003d8
Start address = 0x7751046c
Thread local base = 0x7ef9a000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001744
Thread handle = 0x000003dc
Start address = 0x691fe4a1
Thread local base = 0x7ef97000
>> Bink init completed
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001264
First chance exception
Exception address: 0x76dcc54f
Module name: 'C:\Windows\syswow64\KERNELBASE.dll' (base 0x76dc0000, size 275456)
Exception flags: 0x00000001
Exception code: 0x000006ba
Exception is non-continuable
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001264
base 0x03240000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001264
First chance exception
Exception address: 0x76dcc54f
Module name: 'C:\Windows\syswow64\KERNELBASE.dll' (base 0x76dc0000, size 275456)
Exception flags: 0x00000001
Exception code: 0x000006ba
Exception is non-continuable
>>
D3DDevice GetInfo Results [CONSTRUCTOR]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> **************************************************************************
>> CGP4Manager::DebugTextures() :: ACTIVE TEXTURES LOADED AGAINST CGP4MANAGER
>> **************************************************************************
>> **************************************************************************
>> ************************************************************************
>> CGP4Manager::DebugBuffers() :: ACTIVE BUFFERS LOADED AGAINST CGP4MANAGER
>> ************************************************************************
>> VB CGP4DEVICE::RENDERBLIT 168 bytes
>> **************************************************************************
>> *****************************************************************************************
>> CGP4Manager::DebugGenericEntities() :: ACTIVE GENERIC ENTITIES LOADED AGAINST CGP4MANAGER
>> *****************************************************************************************
>> **************************************************************************
>>
D3DDevice GetInfo Results [Entering D3D_Init()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> Allocated 40000 bytes for animation replay storage.
>>
D3DDevice GetInfo Results [Leaving D3D_Init()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> **************************
*
* Font Created!
*
************************
>> **************************
*
* Font Created!
*
************************
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001264
First chance exception
Exception address: 0x005b8d3b
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00000000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001264
Unhandled exception
Exception address: 0x005b8d3b
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00000000
Stack trace:
005B8D3B: gp4\gpxpatch.exe! <no symbol>
Registers:
EAX=00000000 ECX=00B36AC0 ESI=00B36AC0
EBX=00000000 EDX=00000000 EDI=000001BE
CS:EIP=0023:005B8D3B
SS:ESP=002B:0018F944 EBP=00000000
DS=002B ES=002B FS=0053 GS=002B
Flags=00010246
Stack dump:
0018f944: 033ea230 00000080 00000000 005b7760 '0.>.........`w[.'
0018f954: 00000000 00000000 00000000 00000001 '................'
0018f964: 005b4bee 000001be 00000000 00000000 '.K[.............'
0018f974: 004fd113 000001be 00000000 00000000 '..O.............'
0018f984: 00829162 004fff63 007ab775 0084c7e3 'b...c.O.u.z.....'
0018f994: 00852de0 675c3a44 4d5c3470 44756e65 '.-..D:\gp4\MenuD'
0018f9a4: 5c617461 475c4350 30303250 00005c31 'ata\PC\GP2001\..'
0018f9b4: 00000000 00000000 00000000 00000000 '................'
0018f9c4: 00000000 00000000 00000000 00000000 '................'
0018f9d4: 00000000 00000000 00000000 00000000 '................'
0018f9e4: 00000000 00000000 00000000 00000000 '................'
0018f9f4: 00000000 00000000 00000000 00000000 '................'
0018fa04: 00000000 00000000 00000000 00000000 '................'
0018fa14: 00000000 00000000 00000000 00000000 '................'
0018fa24: 00000000 00000000 00000000 00000000 '................'
0018fa34: 00000000 00000000 00000000 00000000 '................'
0018fa44: 00000000 00000000 00000000 00000000 '................'
0018fa54: 00000000 00000000 00000000 00000000 '................'
0018fa64: 00000000 00000000 00000000 00000000 '................'
0018fa74: 00000000 00000000 00000000 00000000 '................'
0018fa84: 00000000 00000000 00000000 00000000 '................'
0018fa94: 00000000 00000000 00498597 00527507 '..........I..uR.'
0018faa4: 007ab775 0084c7e3 00400000 0018fac4 'u.z.......@.....'
0018fab4: 005a0000 00016254 00000000 0031d512 '..Z.Tb........1.'
0018fac4: 00512251 0051e500 0053742d 753fb2af 'Q"Q...Q.-tS...?u'
0018fad4: 74e47d59 00400000 0018faf0 00000000 'Y}.t..@.........'
0018fae4: 00000000 76dd388e 00001264 005089c8 '.....8.vd.....P.'
0018faf4: 00000000 00000000 0018ff88 02c00000 '................'
0018fb04: 02c03fe0 00000000 02c00000 02c000c4 '.?..............'
0018fb14: 00000000 0000007f 0018fc08 774f338d '.............3Ow'
0018fb24: 02c03760 774f42e5 02c03610 00000000 '`7...BOw.6......'
0018fb34: 774f3406 774ded2a 00000140 00000000 '.4Ow*.Mw@.......'
0018fb44: 02c00000 02c00150 02c00150 06040002 '....P...P.......'
0018fb54: 02c00150 000009c8 0018fc48 774f338d 'P.......H....3Ow'
0018fb64: 00000110 774f4204 02c00150 00000000 '.....BOwP.......'
0018fb74: 02c03610 774ded6a 0000007f 00000000 '.6..j.Mw........'
0018fb84: 0000002b 02c00150 0000007f 00000020 '+...P....... ...'
0018fb94: 02c03758 00000000 3e04013b 02c000c4 'X7......;..>....'
0018fba4: 00000064 00c13b04 02c00150 00000140 'd....;..P...@...'
0018fbb4: 0000007f 0000007f 3e04013b 000009c8 '........;..>....'
0018fbc4: 00000000 00bd0000 5000016b 00000018 '........k..P....'
0018fbd4: 02c03610 02c03610 02c0360b 00000000 '.6...6...6......'
0018fbe4: 00c113d8 02c00000 03000000 0018fb38 '............8...'
0018fbf4: 0000007f 0018fcc8 775358c5 001bd842 '.........XSwB...'
0018fc04: fffffffe 774f3406 774f3431 00000140 '.....4Ow14Ow@...'
0018fc14: 00000158 02c0360a 02c03608 00000140 'X....6...6..@...'
0018fc24: 02c00000 00000001 00000000 76dcc54f '............O..v'
0018fc34: 00000002 00000012 009ed59c ffffffff '................'
0018fc44: 005e94dd 00000000 0018fc8c 0000001c '..^.............'
0018fc54: 0018fc6c 0018fc70 76dcf11c 0018fc90 'l...p......v....'
0018fc64: 775909ae 02c00000 00000000 00000140 '..Yw........@...'
0018fc74: 02c00000 00000001 00000004 00000000 '................'
0018fc84: 02c03608 00000000 02c00000 0018fcd8 '.6..............'
0018fc94: 77591232 02c00138 77591216 774dedfa '2.Yw8.....Yw..Mw'
0018fca4: 00000000 00000000 02c00000 00000004 '................'
0018fcb4: 00000000 02c03610 0118fef0 0018fca0 '.....6..........'
0018fcc4: daa4a379 0018fdac 775358c5 001bc012 'y........XSw....'
0018fcd4: fffffffe 77591216 7754ab47 02c00000 '......YwG.Tw....'
0018fce4: 5000016b 774f3406 774dec9e 00000140 'k..P.4Ow..Mw@...'
0018fcf4: 00000000 02c00000 00690064 006b0073 '........d.i.s.k.'
0018fd04: 006f0056 0075006c 0065006d 005c0033 'V.o.l.u.m.e.3.\.'
0018fd14: 00700067 005c0034 00500047 002e0034 'g.p.4.\.G.P.4...'
0018fd24: 00780065 00000065 774decde 00000820 'e.x.e.....Mw ...'
0018fd34: 00000000 02c00000 753d51d5 00000000 '.........Q=u....'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000055c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001700
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001744
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001264
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001180
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001740
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000173c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001488
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000015e0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000005e0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000016c4
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x0000169c
Process exit code = -1073741819

Richard J
Re: GP4 Crashing During Loading
Date: November 10, 2016 11:56PM
Posted by: XenonS
Your log shows a problem with your GP4Patch install. Deinstall it and re-install the latest version (4.44). Set the verbosity mode to medium and retry. If this doesn't help consult the FAQ, I have made some entries about crashes.

XenonS
Re: GP4 Crashing During Loading
Date: November 11, 2016 01:50AM
Posted by: Richard J
XenonS

Thanks for the response. I have tried GP4Patch and on some mods it has flipped the cockpits upside downtown with version 4.44. That is why I have been using version 3.96. Will try and see if fixes problem.

Richard J
Re: GP4 Crashing During Loading
Date: November 11, 2016 12:26PM
Posted by: XenonS
I forgot to say: some mods need the PLUS TRACKPACK installed before you install the tracks for the mods. If you skip this GP4 will crash when starting with CSM.

XenonS
Re: GP4 Crashing During Loading
Date: November 11, 2016 05:40PM
Posted by: Richard J
Where can I get GP4Patch version 4.44? Tried to download from SDI site, get indication that the file download has failed on three attempts.

Richard J
Re: GP4 Crashing During Loading
Date: November 20, 2016 06:34PM
Posted by: SDI
Try to temporarily disable your virusscanner when downloading and running it (it does NOT contain a virus).

René Smit, Independent Software Developer.
Download my GPx tools here.
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy