Crash after new Pit Crew installed

Posted by Lottech96 
Crash after new Pit Crew installed
Date: May 22, 2008 10:46AM
Posted by: Lottech96
Starting log
GPxPatch version: 3.92
GPx version detected: decrypted GP4 v1.02
Verbosity level is 2
OS version info: Windows XP Service Pack 2 build 2600
Total physical memory: 510 MB (free: 300 MB)
Debugging GP4.exe
Process created:
Process ID = 0x000008a8
Process handle = 0x00000074
Main thread ID = 0x00000238
Main thread handle = 0x00000078
Process will run on CPU 1 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x00000238
Entry point = 0x005ddec6
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path ntdll.dll
base 0x7c900000
size 708096
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\kernel32.dll
base 0x7c800000
size 984576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\d3d8.dll
base 0x6d9a0000
size 1179648
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\d3d8thk.dll
base 0x6d990000
size 8192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\GDI32.dll
base 0x77f10000
size 282624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\USER32.dll
base 0x7e410000
size 577536
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\msvcrt.dll
base 0x77c10000
size 343040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\ADVAPI32.dll
base 0x77dd0000
size 616960
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\RPCRT4.dll
base 0x77e70000
size 584192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\Secur32.dll
base 0x77fe0000
size 55808
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\VERSION.dll
base 0x77c00000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dinput8.dll
base 0x6ce10000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\winspool.drv
base 0x73000000
size 146432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\ole32.dll
base 0x774e0000
size 1285120
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\winmm.dll
base 0x76b40000
size 176128
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dsound.dll
base 0x73f10000
size 367616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\binkw32.dll
base 0x30000000
size 357939
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\wsock32.dll
base 0x71ad0000
size 22528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\WS2_32.dll
base 0x71ab0000
size 82944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\WS2HELP.dll
base 0x71aa0000
size 19968
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c901230
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x005ddec6)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\IMM32.DLL
base 0x76390000
size 110080
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\LPK.DLL
base 0x629c0000
size 22016
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\USP10.dll
base 0x74d90000
size 406528
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x005ddec6
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x01160000...
Injection succesful
Setting instruction pointer to injected code (0x01160000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 144384
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76c90000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 144384
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76c90000
>> D3D Constructor!
>> Starting WinMain
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\uxtheme.dll
base 0x5ad70000
size 218624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\PROGRA~1\COMMON~1\SYMANT~1\ANTISPAM\asOEHook.dll
base 0x67320000
size 197744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\MSVCR71.dll
base 0x7c340000
size 348160
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\msctfime.ime
base 0x755c0000
size 177152
>> WM_ACTIVATE (active)(not minimized)
>> Game thread into win95_startup(0)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000e54
Thread handle = 0x000000fc
Start address = 0x7c810659
Thread local base = 0x7ffdd000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\CLBCATQ.DLL
base 0x76fd0000
size 498688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\COMRes.dll
base 0x77050000
size 792064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\OLEAUT32.dll
base 0x77120000
size 550912
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dplayx.dll
base 0x6c750000
size 229888
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000848
Thread handle = 0x00000110
Start address = 0x7c810659
Thread local base = 0x7ffdc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\SHLWAPI.dll
base 0x77f60000
size 474112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
base 0x773d0000
size 1054208
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000814
Thread handle = 0x00000134
Start address = 0x7c810659
Thread local base = 0x7ffdb000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000814
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x669a0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\mswsock.dll
base 0x71a50000
size 245248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\hnetcfg.dll
base 0x662b0000
size 344064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\System32\wshtcpip.dll
base 0x71a90000
size 19968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dpnhupnp.dll
base 0x6c6d0000
size 60928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\rsaenh.dll
base 0x0ffd0000
size 152576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\rasapi32.dll
base 0x76ee0000
size 236544
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\rasman.dll
base 0x76e90000
size 61440
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\NETAPI32.dll
base 0x5b860000
size 332288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000b7c
Thread handle = 0x00000168
Start address = 0x7c810659
Thread local base = 0x7ffdb000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\dpnhpast.dll
base 0x6c6f0000
size 35328
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x6c6f0000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000938
Thread handle = 0x00000170
Start address = 0x7c810659
Thread local base = 0x7ffda000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76d60000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x6c6d0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000938
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x71a90000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000b7c
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x662b0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x669a0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000848
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\DNSAPI.dll
base 0x76f20000
size 148992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\System32\winrnr.dll
base 0x76fb0000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\rasadhlp.dll
base 0x76fc0000
size 8192
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76fb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x76f60000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\WINTRUST.dll
base 0x76c30000
size 176640
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\CRYPT32.dll
base 0x77a80000
size 597504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\MSASN1.dll
base 0x77b20000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\IMAGEHLP.dll
base 0x76c90000
size 144384
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000002d0
Thread handle = 0x0000018c
Start address = 0x7c810659
Thread local base = 0x7ffdc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000bc8
Thread handle = 0x00000190
Start address = 0x7c810659
Thread local base = 0x7ffdb000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000ca8
Thread handle = 0x00000194
Start address = 0x7c810659
Thread local base = 0x7ffda000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000714
Thread handle = 0x00000198
Start address = 0x7c810659
Thread local base = 0x7ffd9000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\xpsp2res.dll
base 0x20000000
size 2897920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\userenv.dll
base 0x769c0000
size 723456
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000bfc
Thread handle = 0x000001a4
Start address = 0x7c810659
Thread local base = 0x7ffd8000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\cryptnet.dll
base 0x75e60000
size 63488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\WINHTTP.dll
base 0x4d4f0000
size 351232
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\SensApi.dll
base 0x722b0000
size 6656
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x732f0000
>> ati2dvag.dll>>
>> VisionTek RADEON X300 SE Hypermemory >>
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x732f0000
>> Device mode 320 x 200 (format 22) confirmed
>> Device mode 320 x 240 (format 22) confirmed
>> Device mode 400 x 300 (format 22) confirmed
>> Device mode 512 x 384 (format 22) confirmed
>> Device mode 640 x 400 (format 22) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 848 x 480 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 320 x 200 (format 23) confirmed
>> Device mode 320 x 240 (format 23) confirmed
>> Device mode 400 x 300 (format 23) confirmed
>> Device mode 512 x 384 (format 23) confirmed
>> Device mode 640 x 400 (format 23) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 848 x 480 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 320 x 200 (format 22) confirmed
>> Device mode 320 x 240 (format 22) confirmed
>> Device mode 400 x 300 (format 22) confirmed
>> Device mode 512 x 384 (format 22) confirmed
>> Device mode 640 x 400 (format 22) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 848 x 480 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 320 x 200 (format 23) confirmed
>> Device mode 320 x 240 (format 23) confirmed
>> Device mode 400 x 300 (format 23) confirmed
>> Device mode 512 x 384 (format 23) confirmed
>> Device mode 640 x 400 (format 23) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 848 x 480 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 320 x 200 (format 22) confirmed
>> Device mode 320 x 240 (format 22) confirmed
>> Device mode 400 x 300 (format 22) confirmed
>> Device mode 512 x 384 (format 22) confirmed
>> Device mode 640 x 400 (format 22) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 848 x 480 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 320 x 200 (format 23) confirmed
>> Device mode 320 x 240 (format 23) confirmed
>> Device mode 400 x 300 (format 23) confirmed
>> Device mode 512 x 384 (format 23) confirmed
>> Device mode 640 x 400 (format 23) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 848 x 480 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 320 x 200 (format 22) confirmed
>> Device mode 320 x 240 (format 22) confirmed
>> Device mode 400 x 300 (format 22) confirmed
>> Device mode 512 x 384 (format 22) confirmed
>> Device mode 640 x 400 (format 22) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 848 x 480 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>>
Win95_Startup : 1024 x 768
>>
win95_initialiseD3D : 1024 x 768
>> Initialize3DEnvironment(1024 x 768 TNL:1)
>> Initialize3DEnvironment() - Requested width x height x format found in mode list
>> Puredevice set
>> D3DDevice created = >> HAL (hw vp): VisionTek RADEON X300 SE Hypermemory >>
>>
GP_win95 :: Running gfx at 32/24 bit
>> win95_startup() - Initialize3DEnvironment ok

Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\HID.DLL
base 0x688f0000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\SETUPAPI.DLL
base 0x77920000
size 983552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\XBCDR.dll
base 0x60a80000
size 71168
>> Supported FF Effects for this stick...
>> Constant>>
>> Ramp>>
>> Square>>
>> Sine>>
Re: Crash after new Pit Crew installed
Date: May 22, 2008 10:46AM
Posted by: Lottech96
>> Triangle>>
>> SawtoothUp>>
>> SawtoothDown>>
>> Spring>>
>> Damper>>
>> Inertia>>
>> Friction>>
>> Custom>>
>> End of list
>> Device is Polled Device
>> Device doesn't support Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device doesn't support deadband
>> Using Constant force
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000470
Thread handle = 0x000001c8
Start address = 0x7c810659
Thread local base = 0x7ffd7000
>> Game thread finishing win95 startup(0)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 39424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\inetmib1.dll
base 0x666f0000
size 33280
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\snmpapi.dll
base 0x71f60000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\MPRAPI.dll
base 0x76d40000
size 87040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\ACTIVEDS.dll
base 0x77cc0000
size 194048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\adsldpc.dll
base 0x76e10000
size 143360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\ATL.DLL
base 0x76b20000
size 58880
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\SAMLIB.dll
base 0x71bf0000
size 64000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 12288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 35328
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 50688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\gp4tweak.dll
base 0x40000000
size 70656
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\wdmaud.drv
base 0x72d20000
size 23552
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x72d20000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\wdmaud.drv
base 0x72d20000
size 23552
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000ed8
Thread handle = 0x00000210
Start address = 0x7c810659
Thread local base = 0x7ffd6000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\msacm32.drv
base 0x72d10000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\MSACM32.dll
base 0x77be0000
size 71680
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\midimap.dll
base 0x77bd0000
size 18944
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000b8c
Thread handle = 0x00000220
Start address = 0x7c810659
Thread local base = 0x7ffd5000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\system32\KsUser.dll
base 0x73ee0000
size 4096
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000009bc
Thread handle = 0x00000228
Start address = 0x7c810659
Thread local base = 0x7ffd4000
>> Bink init completed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\unidrvui.dll
base 0x4f480000
size 749568
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path
base 0x04010000
size 131584
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x04010000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path
base 0x04010000
size 131584
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x04010000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path
base 0x04010000
size 131584
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x04010000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path
base 0x04010000
size 131584
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x04010000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path
base 0x04000000
size 528452
>>
D3DDevice GetInfo Results [CONSTRUCTOR]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> **************************************************************************
>> CGP4Manager::DebugTextures() :: ACTIVE TEXTURES LOADED AGAINST CGP4MANAGER
>> **************************************************************************
>> **************************************************************************
>> ************************************************************************
>> CGP4Manager::DebugBuffers() :: ACTIVE BUFFERS LOADED AGAINST CGP4MANAGER
>> ************************************************************************
>> VB CGP4DEVICE::RENDERBLIT 168 bytes
>> **************************************************************************
>> *****************************************************************************************
>> CGP4Manager::DebugGenericEntities() :: ACTIVE GENERIC ENTITIES LOADED AGAINST CGP4MANAGER
>> *****************************************************************************************
>> **************************************************************************
>>
D3DDevice GetInfo Results [Entering D3D_Init()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> Allocated 40000 bytes for animation replay storage.
>>
D3DDevice GetInfo Results [Leaving D3D_Init()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> **************************
*
* Font Created!
*
************************
>> **************************
*
* Font Created!
*
************************
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000006d4
Thread handle = 0x00000244
Start address = 0x7c810659
Thread local base = 0x7ffaf000
>> Menu Event List Not Cleared - Not enough room in F1 Event table
>> Menu Event List Not Cleared - Not enough room in F1 Event table
>> Setting MenuEventCurrentScreenID
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000e70
Thread handle = 0x00000248
Start address = 0x7c810659
Thread local base = 0x7ffae000
>> **************************
*
* Font Created!
*
************************
>> **************************
*
* Font Created!
*
************************
>> Setting MenuEventCurrentScreenID
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000e70
Thread exit code = 0
>> D3D_InitialiseGameFromMenus()

Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
path
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000238
base 0x732f0000
>> D3D_SetDeviceSpecificFeatures: Disabling fog
>> D3D_SetDeviceSpecificFeatures: Disabling reflections
>> D3D_InitialiseGameFromMenus() ok

>> **************************
*
* Font_Released!
*
************************
>> **************************
*
* Font_Released!
*
************************
>> **************************
*
* Font_Released!
*
************************
>> **************************
*
* Font_Released!
*
************************
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000006d4
Thread exit code = 0
>> GPAudio::To3D()
>> **************************************************************************
>> CGP4Manager::DebugTextures() :: ACTIVE TEXTURES LOADED AGAINST CGP4MANAGER
>> **************************************************************************
>> **************************************************************************
>> ************************************************************************
>> CGP4Manager::DebugBuffers() :: ACTIVE BUFFERS LOADED AGAINST CGP4MANAGER
>> ************************************************************************
>> VB CGP4DEVICE::RENDERBLIT 168 bytes
>> VB GP4FONT.CPP 86400 bytes
>> VB GP4FONT.CPP 86400 bytes
>> VB GP4FONT.CPP 86400 bytes
>> **************************************************************************
>> *****************************************************************************************
>> CGP4Manager::DebugGenericEntities() :: ACTIVE GENERIC ENTITIES LOADED AGAINST CGP4MANAGER
>> *****************************************************************************************
>> **************************************************************************
>>
D3DDevice GetInfo Results [Entering D3D_MenuToGameInit()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> CGP4CARSHADER::REGISTERSHADER : 2PASS DUAL-TEXTURE METHOD
>> CGP4Cockpit::LoadMesh() No object found for name - Water_T_on

>> CGP4Cockpit::LoadMesh() No object found for name - Water_CapT_On

>> CGP4Cockpit::LoadMesh() No object found for name - Water_A_1

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_0

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_1

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_2

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_3

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_4

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_5

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_6

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_7

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_8

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_9

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_0

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_1

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_2

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_3

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_4

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_5

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_06

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_7

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_8

>> CGP4Cockpit::LoadMesh() No object found for name - Water_C_9

>> CGP4Cockpit::LoadMesh() No object found for name - lap_time_colon_on

>> CGP4Cockpit::LoadMesh() No object found for name - lap_time_point_on

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_A_-

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_B_-

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_C_-

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_D_-

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_E_-

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_Time_F_-

>> CGP4Cockpit::LoadMesh() No object found for name - Fuel_B_on

>> CGP4Cockpit::LoadMesh() No object found for name - Fuel_F_-

>> CGP4Cockpit::LoadMesh() No object found for name - Position_P_on

>> CGP4Cockpit::LoadMesh() No object found for name - Position_A_0

>> CGP4Cockpit::LoadMesh() No object found for name - Position_A_1

>> CGP4Cockpit::LoadMesh() No object found for name - Position_A_2

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_0

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_1

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_2

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_3

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_4

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_5

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_6

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_7

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_8

>> CGP4Cockpit::LoadMesh() No object found for name - Position_B_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_L_on

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_V_on

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_R_on

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_A_9

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_0

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_1

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_2

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_3

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_4

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_5

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_6

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_7

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_8

>> CGP4Cockpit::LoadMesh() No object found for name - Lap_B_9

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_1_on

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_1_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_2_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_3_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_4_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_5_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_6_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_7_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_8_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_9_off

>> CGP4Cockpit::LoadMesh() No object found for name - Aid_7_Grey_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV1_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV1_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV2_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV2_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV3_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV3_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV4_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV4_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV5_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_REV5_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_REV1_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_REV2_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_REV3_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_REV4_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_REV5_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_flag1_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_flag1_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_flag2_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_flag2_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_flag3_on

>> CGP4Cockpit::LoadMesh() No object found for name - Left_flag3_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_flag1_on

>> CGP4Cockpit::LoadMesh() No object found for name - Right_flag1_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_flag2_on

>> CGP4Cockpit::LoadMesh() No object found for name - Right_flag2_off

>> CGP4Cockpit::LoadMesh() No object found for name - Right_flag3_on

>> CGP4Cockpit::LoadMesh() No object found for name - Right_flag3_off

>> CGP4Cockpit::LoadMesh() No object found for name - Speed_A_0

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_1

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_2

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_3

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_4

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_5

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_6

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_7

>> CGP4Cockpit::LoadMesh() No object found for name - Suggested gear_off

>> CGP4Cockpit::LoadMesh() No object found for name - Left_mirror

>> CGP4Cockpit::LoadMesh() No object found for name - Right_mirror

>> CGP4Cockpit::LoadMesh() No object found for name - LCD

Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000714
Thread exit code = 0
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000bc8
Thread exit code = 0
>>
SETTING OBJECT CLASS FLAGS
>> DONE.

>> CSkyDome::CreateSkyVertexBuffers() - ok

>> ImportAnimations: Failed to load file: AnimationData\Race\in_1.anb
>> ERROR: [CTweenSys::SetupResources()] Failed in ProcessSetupFile().
>> Importing scene scripts.
>> **WARNING** D3D_DrawLoadProgress() called more than expected :: Increase gsMaxProgress in hw_io.cpp
>>
D3DDevice GetInfo Results [Leaving D3D_MenuToGameInit()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> ANIM: Entering a new session - creating animation variable storage.
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
Re: Crash after new Pit Crew installed
Date: May 22, 2008 10:47AM
Posted by: Lottech96
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Re: Crash after new Pit Crew installed
Date: May 22, 2008 10:47AM
Posted by: Lottech96
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x7c96df51
Module name: 'ntdll.dll' (base 0x7c900000, size 708096)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xbaadf005
>>
InitTimers()
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
First chance exception
Exception address: 0x004ed32d
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x000026b1
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000238
Unhandled exception
Exception address: 0x004ed32d
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x000026b1
Stack trace:
004ED32D: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
Registers:
EAX=000026B0 ECX=0000015F ESI=04E4837C
EBX=00000040 EDX=00643B00 EDI=00A4FC88
CS:EIP=001B:004ED32D
SS:ESP=0023:0012F6BC EBP=00000001
DS=0023 ES=0023 FS=003B GS=0000
Flags=00200246
Stack dump:
0012f6bc: 0049e7d9 fffffada ffffffff 0066fef0 '..I...........f.'
0012f6cc: 00866da8 3e800000 00000000 01000000 '.m.....>........'
0012f6dc: 00000010 3d282416 00000016 00003480 '.....$(=.....4..'
0012f6ec: 00000000 74cac192 00000011 00000001 '.......t........'
0012f6fc: 3f800000 00000000 00000000 00000000 '...?............'
0012f70c: 00000000 3f800000 00000000 00000000 '.......?........'
0012f71c: 00000000 00000000 3f800000 00000000 '...........?....'
0012f72c: 3ecf2be6 be7e648b 3f7f1b52 3f800000 '.+.>.d~.R..?...?'
0012f73c: 00000000 00000000 00000000 00000000 '................'
0012f74c: 00000000 00000000 00000000 00000000 '................'
0012f75c: 00000000 00000000 3e88ff5b 3e88ff5b '........[..>[..>'
0012f76c: 3e90149c 3e90149c 00000015 00000017 '...>...>........'
0012f77c: 00000011 00000013 3c62339b 3c62339b '.........3b<.3b<'
0012f78c: 3d3637cb 3d3637cb 00000016 00000018 '.76=.76=........'
0012f79c: 00000012 00000014 3f7ff653 bc8cc34e '........S..?N...'
0012f7ac: 00000000 00000000 3c8cc34e 3f7ff653 '........N..<S..?'
0012f7bc: 00000000 00000000 00000000 00000000 '................'
0012f7cc: 3f800000 00000000 3ecf2710 be816553 '...?.....'.>Se..'
0012f7dc: 3f7f1b52 3f800000 3f7fc8ca 3d2817ff 'R..?...?...?..(='
0012f7ec: 00000000 00000000 bd2817ff 3f7fc8ca '..........(....?'
0012f7fc: 00000000 00000000 00000000 00000000 '................'
0012f80c: 3f800000 00000000 00000000 00000000 '...?............'
0012f81c: 00000000 3f800000 3f800000 00000000 '.......?...?....'
0012f82c: 00000000 00000000 00000000 3f800000 '...............?'
0012f83c: 00000000 00000000 00000000 00000000 '................'
0012f84c: 3f800000 00000000 00000000 3d4ccccd '...?..........L='
0012f85c: be800000 3f800000 3f800000 00000000 '.......?...?....'
0012f86c: 00000000 00000000 00000000 3f800000 '...............?'
0012f87c: 00000000 00000000 00000000 00000000 '................'
0012f88c: 3f800000 00000000 00000000 00000000 '...?............'
0012f89c: 00000000 3f800000 3f800000 00000000 '.......?...?....'
0012f8ac: 80000000 00000000 00000000 3f800000 '...............?'
0012f8bc: 00000000 00000000 00000000 00000000 '................'
0012f8cc: 3f800000 00000000 00000000 00000000 '...?............'
0012f8dc: 00000000 3f800000 00000000 fffffada '.......?........'
0012f8ec: 00494675 01390020 00000003 00a50ac8 'uFI. .9.........'
0012f8fc: ffffffff 0066fef0 00866da8 80000000 '......f..m......'
0012f90c: 429028e1 402fb79b 445635e7 3fbec58d '.(.B../@.5VD...?'
0012f91c: 3be557e0 73f224d8 3f7ff653 bc8cc34e '.W.;.$.sS..?N...'
0012f92c: 00000000 00000000 3c8cc34e 3f7ff653 '........N..<S..?'
0012f93c: 00000000 00000000 00000000 00000000 '................'
0012f94c: 3f800000 00000000 00000000 00000000 '...?............'
0012f95c: 00000000 3f800000 3f800000 00000000 '.......?...?....'
0012f96c: 00000000 00000000 00000000 3f800000 '...............?'
0012f97c: 00000000 00000000 00000000 00000000 '................'
0012f98c: 3f800000 00000000 be800000 00000000 '...?............'
0012f99c: 00000000 3f800000 0012f9d4 6d9d5acd '.......?.....Z.m'
0012f9ac: 00000003 00a50ac8 00a50ac8 0066fef0 '..............f.'
0012f9bc: 01baaf78 3fa1da96 0012f9b4 0012ffb0 'x......?........'
0012f9cc: 6daabcf0 00000000 00000210 40013b70 '...m........p;.@'
0012f9dc: 01390020 00000003 00a50ac8 00000000 ' .9.............'
0012f9ec: 00000000 00000000 3f800000 bf0e3671 '...........?q6..'
0012f9fc: 00000000 bf54dd78 00000000 00000000 '....x.T.........'
0012fa0c: 3f800000 00000000 00000000 3f54dd78 '...?........x.T?'
0012fa1c: 00000000 bf0e3671 3f7fc8ca 3d2817ff '....q6.....?..(='
0012fa2c: 00000000 00000000 bd2817ff 3f7fc8ca '..........(....?'
0012fa3c: 00000000 00000000 00000000 00000000 '................'
0012fa4c: 3f800000 00000000 00000000 00000000 '...?............'
0012fa5c: 00000000 3f800000 00000001 ffffffff '.......?........'
0012fa6c: 0066fef0 fffffada 00866da8 00c1fddf '..f......m......'
0012fa7c: 3f1a3055 3e819a84 42a00000 00000001 'U0.?...>...B....'
0012fa8c: 00000000 3f800175 00000000 00000200 '....u..?........'
0012fa9c: 0000012c 005106a3 00510c23 ffffffff ',.....Q.#.Q.....'
0012faac: 0066fef0 fffffada 0012fac8 00866da8 '..f..........m..'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000e54
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000470
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000ed8
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000b8c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000009bc
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000238
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000002d0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000ca8
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x00000bfc
Process exit code = -1073741819
Re: Crash after new Pit Crew installed
Date: May 22, 2008 10:48AM
Posted by: Lottech96
Sorry , I had to make 5 replies , (it wouldn't let me do just one.) Anyone care to decipher this?
Re: Crash after new Pit Crew installed
Date: May 22, 2008 10:50AM
Posted by: fongu
I can't see the problem, but does it work when you use an original anim.wad? how did you install it and which pitcrews did you install?


Re: Crash after new Pit Crew installed
Date: May 22, 2008 02:04PM
Posted by: mortal
Have you replaced the cars.wad? Is it the 06 mod by any chance?

Here is a problem, anim.wad maybe.
>> ImportAnimations: Failed to load file: AnimationData\Race\in_1.anb
>> ERROR: [CTweenSys::SetupResources()] Failed in ProcessSetupFile().


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Crash after new Pit Crew installed
Date: May 22, 2008 03:15PM
Posted by: Anonymous User
This is the problem:

>> CGP4Cockpit::LoadMesh() No object found for name - Water_T_on 

>> CGP4Cockpit::LoadMesh() No object found for name - Water_CapT_On 

>> CGP4Cockpit::LoadMesh() No object found for name - Water_A_1 

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_0 

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_1 

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_2 

>> CGP4Cockpit::LoadMesh() No object found for name - Water_B_3
.
.
.

Aperently something wrong with the cockpit.

Cheers :)



Edited 1 time(s). Last edit at 05/22/2008 03:16PM by jcaranti.
Re: Crash after new Pit Crew installed
Date: May 22, 2008 05:40PM
Posted by: Bigbrother
if he updated the anim.wad and the game crashes after that it will be sure an anim.wad problem, when does the game crashes when its loaded? If its in the beginning its the cars.wad, 40 % its the anim.wad and from 50 % to end its a track problem.
Re: Crash after new Pit Crew installed
Date: May 22, 2008 06:09PM
Posted by: quickslick
i think the problem is, he updated the anim.wad with the new pitcrews and without renaming them from honda, toyota, rbr a.s.o. to the original names of the pitcrews. That's the reason why gp4 crashes
Re: Crash after new Pit Crew installed
Date: May 22, 2008 07:18PM
Posted by: Anonymous User
I think he updated the pitcrews and the cars.wad

He doesnt say when the failure accurs if its 40%, 50% or what ever :)



Edited 1 time(s). Last edit at 05/22/2008 07:20PM by jcaranti.
Re: Crash after new Pit Crew installed
Date: May 22, 2008 07:24PM
Posted by: Bigbrother
thats why i ask him were it crashes smarty
Re: Crash after new Pit Crew installed
Date: May 22, 2008 08:54PM
Posted by: Anonymous User
Funny what "smarty" has to do with the topic :)
Re: Crash after new Pit Crew installed
Date: May 22, 2008 10:52PM
Posted by: Bigbrother
not going into discussion with a loser
wow

_________________________________

Re: Crash after new Pit Crew installed
Date: May 23, 2008 12:05AM
Posted by: Lo2k
mortal and jcaranti are right:

there's a missing/damaged anim file in anim wad
>> ImportAnimations: Failed to load file: AnimationData\Race\in_1.anb

AND

there's also a problem with internal steering wheel in cars.wad
>> CGP4Cockpit::LoadMesh() No object found for name - Water_T_on

Re: Crash after new Pit Crew installed
Date: May 23, 2008 09:56AM
Posted by: gezere
regarding the anim.wad, if you use WadUpdater, I noticed you have to update the wad ONLY.

If you extract the anim.wad, and after re-create it, the new anim.wad crashes the game. I don't know the reason but it's a fact.
By updating it with the new files (update wad button) all is right.

Re: Crash after new Pit Crew installed
Date: May 23, 2008 10:57AM
Posted by: TTM
I always use old but good program - GP4Master V1.2 Beta. :)

I have anim-wad and cars-wad folders in my hard-drive and when example new car is released, i rename "??car??-lod??.gp4" files, if necessary and then i copy .gp4 and texture files to my cars-wad folder and then i create cars.wad from directory with GP4Master... ..And everything is always worked without any errors or problems..
Re: Crash after new Pit Crew installed
Date: May 23, 2008 11:44AM
Posted by: Anonymous User
With Easywad from zaztools is easier because you dont have to actually extract a .wad.
It works almost like if you have a windows explorer. Its very good and i think its faster
to update than Gp4-master and its safer .



Edited 1 time(s). Last edit at 05/23/2008 11:46AM by jcaranti.
Re: Crash after new Pit Crew installed
Date: May 23, 2008 12:08PM
Posted by: fongu
yeah I'm an easy wad man, but better than that CSM ;)


Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy