gpxpatch with vista

Posted by mitadumapaga 
gpxpatch with vista
Date: July 31, 2011 01:55PM
Posted by: mitadumapaga
hi guys. just installed gp4 on vista and it works ok. but when i start the game from the gpxpatch this happens:

Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP4 v1.00
Verbosity level is 2
OS version info: Windows NT 6.0 build 6000
Total physical memory: 2047 MB (free: 1397 MB)
Debugging gp4.exe
Process created:
Process ID = 0x00009454
Process handle = 0x00000160
Main thread ID = 0x00009458
Main thread handle = 0x00000164
Process will run on CPU 1 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x00009458
Entry point = 0x005db0b6
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path ntdll.dll
base 0x77540000
size 1162656
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\kernel32.dll
base 0x76710000
size 874496
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\d3d8.dll
base 0x68380000
size 1039872
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\msvcrt.dll
base 0x76500000
size 681472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\USER32.dll
base 0x760c0000
size 633856
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\GDI32.dll
base 0x77470000
size 296448
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\ADVAPI32.dll
base 0x76000000
size 770048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\RPCRT4.dll
base 0x765b0000
size 789504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\VERSION.dll
base 0x75c80000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\d3d8thk.dll
base 0x722d0000
size 11264
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dwmapi.dll
base 0x729a0000
size 39936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\DINPUT8.dll
base 0x6b8e0000
size 159232
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WINSPOOL.DRV
base 0x733b0000
size 255488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\ole32.dll
base 0x761f0000
size 1314816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\DINPUT.dll
base 0x6be70000
size 136192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WINMM.dll
base 0x74fc0000
size 193024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\OLEAUT32.dll
base 0x76160000
size 558080
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\OLEACC.dll
base 0x74f80000
size 214016
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\DSOUND.dll
base 0x6b490000
size 445440
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\POWRPROF.dll
base 0x74f30000
size 96768
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\Infogrames\Grand Prix 4\binkw32.dll
base 0x30000000
size 357939
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WSOCK32.dll
base 0x744e0000
size 14848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WS2_32.dll
base 0x773f0000
size 178688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\NSI.dll
base 0x77690000
size 10240
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00009458
First chance exception
Exception address: 0x77582ea8
Module name: 'ntdll.dll' (base 0x77540000, size 1162656)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x005db0b6)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\ShimEng.dll
base 0x6dad0000
size 111104
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\apphelp.dll
base 0x75c20000
size 171008
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\AppPatch\AcGenral.DLL
base 0x68070000
size 2143232
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\SHLWAPI.dll
base 0x768c0000
size 339968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\UxTheme.dll
base 0x74ab0000
size 240640
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\NETAPI32.dll
base 0x75b00000
size 425472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path
base 0x75df0000
size 12288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\MSACM32.dll
base 0x730b0000
size 73216
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\SHELL32.dll
base 0x76920000
size 11314688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\sfc.dll
base 0x722b0000
size 4608
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\sfc_os.DLL
base 0x749a0000
size 38400
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\SETUPAPI.dll
base 0x76370000
size 1584128
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\USERENV.dll
base 0x75cb0000
size 107008
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\Secur32.dll
base 0x75c90000
size 72704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\urlmon.dll
base 0x75ed0000
size 1149952
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\iertutil.dll
base 0x77420000
size 266752
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\MPR.dll
base 0x756b0000
size 69120
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path
base 0x01670000
size 6250496
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x01670000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path
base 0x01670000
size 6250496
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x01670000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path
base 0x01670000
size 6250496
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x01670000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\IMM32.DLL
base 0x77660000
size 115200
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\MSCTF.dll
base 0x767f0000
size 805888
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\LPK.DLL
base 0x776a0000
size 24064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\USP10.dll
base 0x77700000
size 502784
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path
base 0x10000000
size 56832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.6000.16386_none_5d07289e07e1d100\comctl32.dll
base 0x75880000
size 1648128
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path
base 0x00ef0000
size 44544
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x00ef0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\imagehlp.dll
base 0x76340000
size 152576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WININET.dll
base 0x75e00000
size 822272
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\Normaliz.dll
base 0x77680000
size 2560
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00009458
First chance exception
Exception address: 0x005db0b6
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x00010000...
Injection succesful
Setting instruction pointer to injected code (0x00010000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\Infogrames\Grand Prix 4\GPxPSup.dll
base 0x09900000
size 31744
>> D3D Constructor!
>> Starting WinMain
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\SweetIM\Messenger\mgAdaptersProxy.dll
base 0x00020000
size 26928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\SweetIM\Messenger\MSVCR71.dll
base 0x7c360000
size 348160
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\ASUS Security Center\ASUS Security Protect Manager\Bin\ItClient.dll
base 0x00f20000
size 90112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.6000.16386_none_87e0cb09378714f1\Comctl32.dll
base 0x73fa0000
size 537088
>> WM_ACTIVATE (active)(not minimized)
>> Game thread into win95_startup(0)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00009464
Thread handle = 0x00000264
Start address = 0x775a0f18
Thread local base = 0x7ffde000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path
base 0x76680000
size 523776
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dplayx.dll
base 0x6b8a0000
size 212992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dpmodemx.dll
base 0x74380000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\TAPI32.dll
base 0x74610000
size 191488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\rtutils.dll
base 0x74f20000
size 36352
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00009468
Thread handle = 0x0000027c
Start address = 0x775a0f18
Thread local base = 0x7ffdc000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74380000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74610000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74f20000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dpmodemx.dll
base 0x743a0000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\TAPI32.dll
base 0x74610000
size 191488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\rtutils.dll
base 0x74f20000
size 36352
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00009470
Thread handle = 0x0000028c
Start address = 0x775a0f18
Thread local base = 0x7ffdb000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009470
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x743a0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74610000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74f20000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dpwsockx.dll
base 0x74380000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\mswsock.dll
base 0x752b0000
size 227328
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\System32\wshtcpip.dll
base 0x74f10000
size 11264
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dpnathlp.dll
base 0x6bb50000
size 56832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\rsaenh.dll
base 0x75070000
size 228968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\iphlpapi.dll
base 0x754f0000
size 89600
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dhcpcsvc.DLL
base 0x754b0000
size 204800
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\DNSAPI.dll
base 0x75720000
size 162816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WINNSI.DLL
base 0x754a0000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\dhcpcsvc6.DLL
base 0x75480000
size 120320
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\rasapi32.dll
base 0x74950000
size 280064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\rasman.dll
base 0x74930000
size 70656
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\TAPI32.dll
base 0x74610000
size 191488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\rtutils.dll
base 0x74f20000
size 36352
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000947c
Thread handle = 0x000002c4
Start address = 0x775a0f18
Thread local base = 0x7ffda000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74950000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74610000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74f20000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74930000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x6bb50000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000947c
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74f10000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00009478
Thread handle = 0x000002c4
Start address = 0x775a0f18
Thread local base = 0x7ffdb000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009478
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74380000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009468
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\NLAapi.dll
base 0x741a0000
size 48128
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\System32\winrnr.dll
base 0x716a0000
size 19968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WLDAP32.dll
base 0x776b0000
size 288768
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\napinsp.dll
base 0x71690000
size 50176
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\pnrpnsp.dll
base 0x71520000
size 62464
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\wshbth.dll
base 0x71680000
size 34304
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\rasadhlp.dll
base 0x722c0000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x741a0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x716a0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x776b0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x71690000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x71520000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x71680000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\atiumdag.dll
base 0x71f70000
size 2861056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\atiumdva.dll
base 0x03560000
size 3773952
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00009484
Thread handle = 0x000002e4
Start address = 0x775a0f18
Thread local base = 0x7ffdc000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009484
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x03560000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x71f70000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\mscat32.dll
base 0x743a0000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WINTRUST.dll
base 0x74da0000
size 171520
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\CRYPT32.dll
base 0x755b0000
size 974336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\MSASN1.dll
base 0x75700000
size 59904
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00009488
Thread handle = 0x000002f4
Start address = 0x775a0f18
Thread local base = 0x7ffdc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\ncrypt.dll
base 0x75430000
size 193024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\BCRYPT.dll
base 0x753e0000
size 265728
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000948c
Thread handle = 0x00000300
Start address = 0x775a0f18
Thread local base = 0x7ffdb000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\NTMARTA.DLL
base 0x74f50000
size 120832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WLDAP32.dll
base 0x776b0000
size 288768
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\SAMLIB.dll
base 0x75a20000
size 56320
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\GPAPI.dll
base 0x75030000
size 73728
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\slc.dll
base 0x75570000
size 221184
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00009498
Thread handle = 0x00000318
Start address = 0x775a0f18
Thread local base = 0x7ffda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\cryptnet.dll
base 0x745f0000
size 93184
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\SensApi.dll
base 0x716f0000
size 8704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\Cabinet.dll
base 0x74280000
size 68608
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x743a0000
>> atiumdag.dll>>
>> ATI Mobility Radeon HD 2400>>
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\mscat32.dll
base 0x74380000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x74380000
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 480 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 480 (format 23) confirmed
>> Device mode 1024 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1440 x 900 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 480 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\atiumdag.dll
base 0x71f70000
size 2861056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\atiumdva.dll
base 0x03b40000
size 3773952
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x03b40000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x71f70000
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 480 (format 23) confirmed
>> Device mode 1024 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1440 x 900 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 480 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 480 (format 23) confirmed
>> Device mode 1024 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1440 x 900 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 480 (format 22) confirmed
>> Device mode 1024 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1440 x 900 (format 22) confirmed
>>
Win95_Startup : 1024 x 768
>>
win95_initialiseD3D : 1024 x 768
>> Initialize3DEnvironment(1024 x 768 TNL:1)
>> Initialize3DEnvironment() - Requested width x height x format found in mode list
>> Puredevice set
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\atiumdag.dll
base 0x71f70000
size 2861056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\atiumdva.dll
base 0x03a70000
size 3773952
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000094b8
Thread handle = 0x0000033c
Start address = 0x775a0f18
Thread local base = 0x7ffd9000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000094bc
Thread handle = 0x00000340
Start address = 0x775a0f18
Thread local base = 0x7ffd8000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\IconCodecService.dll
base 0x71770000
size 9728
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\WindowsCodecs.dll
base 0x73710000
size 712192
>> D3DDevice created = >> HAL (hw vp): ATI Mobility Radeon HD 2400>>
>>
GP_win95 :: Running gfx at 32/24 bit
>> win95_startup() - Initialize3DEnvironment ok

Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\HID.DLL
base 0x74140000
size 22016
>> No joysticks found -- closing dinput
>> Closing DINPUT
>> Game thread finishing win95 startup(0)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 39424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\inetmib1.dll
base 0x74380000
size 52736
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\snmpapi.dll
base 0x718f0000
size 22528
>> HEAP[gp4.exe]: >> Heap block at 01B53540 modified at 01B53CD4 past requested size of 78c
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00009458
First chance exception
Exception address: 0x77582ea8
Module name: 'ntdll.dll' (base 0x77540000, size 1162656)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Stack trace:
77582EA9: Windows\system32\ntdll.dll! DbgBreakPoint + 1 bytes
775DC900: Windows\system32\ntdll.dll! RtlImageRvaToVa + 451 bytes
775C4B6E: Windows\system32\ntdll.dll! RtlDeleteAce + 79199 bytes
775F1CFA: Windows\system32\ntdll.dll! RtlpNtMakeTemporaryKey + 17992 bytes
775BD9FA: Windows\system32\ntdll.dll! RtlDeleteAce + 50155 bytes
775A1C21: Windows\system32\ntdll.dll! RtlTryEnterCriticalSection + 827 bytes
76757A7E: Windows\system32\kernel32.dll! HeapFree + 20 bytes
7650A097: Windows\system32\msvcrt.dll! free + 57 bytes
09B11819: <no module><no symbol>
09B1138E: <no module><no symbol>
Registers:
EAX=01B53540 ECX=775614CD ESI=01B53540
EBX=01B53CD4 EDX=0012F3CD EDI=0000078C
CS:EIP=001B:77582EA9
SS:ESP=0023:0012F610 EBP=0012F614
DS=0023 ES=0023 FS=003B GS=0000
Flags=00200202
Stack dump:
0012f610: 775f0c9a 0012f62c 775dc900 01b53540 '.._w,.....]w@5..'
0012f620: 00000000 01b53540 00f70000 0012f648 '....@5......H...'
0012f630: 775c4b6e 00000000 01b53540 00f70000 'nK\w....@5......'
0012f640: 01b53540 7758e492 0012f690 775f1cfa '@5....Xw......_w'
0012f650: 00f70000 01b53540 7758e492 0012c643 '....@5....XwC...'
0012f660: 00000000 00f70000 00f70000 00f70000 '................'
0012f670: 775bdc7e 00010000 0012f65c 775a2447 '~.[w....\...G$Zw'
0012f680: 0012f774 77548bf2 7758ccd3 00000001 't.....Tw..Xw....'
0012f690: 0012f784 775bd9fa 00f70000 50000063 '......[w....c..P'
0012f6a0: 01b53548 0012c757 00000000 00f70000 'H5..W...........'
0012f6b0: 01b53548 00000003 00000001 00000003 'H5..............'
0012f6c0: 00000004 00000001 00000002 00000001 '................'
0012f6d0: 00000004 00000014 00f70000 00000002 '................'
0012f6e0: 00000001 00000000 00000006 00000001 '................'
0012f6f0: 00000002 00000001 00000000 00000014 '................'
0012f700: 00000001 00000004 00000000 00000003 '................'
0012f710: 00000006 00000001 40000062 00000000 '........b..@....'
0012f720: 00000002 00000002 00000001 00000000 '................'
0012f730: 00000001 00000003 00f70000 00000000 '................'
0012f740: 00000000 00000001 0012f858 77548bf2 '........X.....Tw'
0012f750: 7758c483 fffffffe 775a2447 005a214c '..Xw....G$ZwL!Z.'
0012f760: 0000078c 00000000 00000100 0012f6a4 '................'
0012f770: 0000078c 0012f7f0 77548bf2 7758c4e3 '..........Tw..Xw'
0012f780: fffffffe 0012f7a0 775a1c21 01b53540 '........!.Zw@5..'
0012f790: 01b53548 01b53548 01b53cd4 0012f9bc 'H5..H5...<......'
0012f7a0: 0012f7b4 76757a7e 00f70000 00000000 '....~zuv........'
0012f7b0: 01b53540 0012f800 7650a097 00f70000 '@5........Pv....'
0012f7c0: 00000000 01b53548 4d497afe 01b53cd4 '....H5...zIM.<..'
0012f7d0: 00000015 0012f9bc 00000000 00000000 '................'
0012f7e0: 00000000 00000000 0012f7c8 00000000 '................'
0012f7f0: 0012f858 765213dd 3b0b2256 fffffffe 'X.....RvV".;....'
0012f800: 0000078c 09b11819 01b53548 09b17c70 '........H5..p|..'
0012f810: 0012f9bc 0012fa1c 00000000 01b53548 '............H5..'
0012f820: 00000015 00000007 74380000 74382210 '..........8t."8t'
0012f830: 74382020 7438205c 74382081 00000000 ' 8t\ 8t. 8t....'
0012f840: 000000a5 01b52fe8 01b53298 01b4f480 '...../...2......'
0012f850: 00000000 00000000 0012fa10 09b12a38 '............8*..'
0012f860: 00000000 09b1138e 76725f8c 760c9599 '........._rv...v'
0012f870: 0012fa1c 00000000 775f178f 775bdc7e '.........._w~.[w'
0012f880: 00f70000 50000163 775a2447 0012c9b7 '....c..PG$Zw....'
0012f890: 00f70000 00000000 00000000 7fffffe8 '................'
0012f8a0: 775a0370 767357fe 00000414 0012f8e0 'p.Zw.Wsv........'
0012f8b0: 0012f8e8 00000008 0000000e ffffffff '................'
0012f8c0: 00000005 7659e500 00001000 00000004 '......Yv........'
0012f8d0: 000006f0 00000000 00000001 00000000 '................'
0012f8e0: 00000000 0012f98c 00000000 00010300 '................'
0012f8f0: 00120877 0012fa1c 09b11342 0012f904 'w.......B.......'
0012f900: 760c9599 00000094 00000006 00000000 '...v............'
0012f910: 00001770 00000002 0012f900 00f73780 'p............7..'
0012f920: 00000000 00000001 0000003c 0012f98c '........<.......'
0012f930: 00f73780 00000000 00000000 0012f964 '.7..........d...'
0012f940: 76527b36 00f73780 0012f96c 0012f98c '6{Rv.7..l.......'
0012f950: 00f73780 00000000 fffff1f0 00000001 '.7..............'
0012f960: fffff1f0 0012f97c 76527b74 4e355e69 '....|...t{Rvi^5N'
0012f970: 0012f98c 760c9599 76725f8c 0012f990 '.......v._rv....'
0012f980: 09b09971 0012f98c 00f73780 4e354249 'q........7..IB5N'
0012f990: 0012fa1c 09b04018 09b17c70 76725f8c '.....@..p|..._rv'
0012f9a0: 760c9599 00000000 00f7ec30 0012f9b8 '...v....0.......'
0012f9b0: 7650e959 00000015 0012f9f4 00000001 'Y.Pv............'
0012f9c0: 54a519ea 00000000 00000000 00000000 '...T............'
0012f9d0: 984498ff 906ce6a1 00000000 00000000 '..D...l.........'
0012f9e0: 00000000 00000000 00000000 0000041c '................'
0012f9f0: 00000001 00000002 00441f05 09b15eb8 '..........D..^..'
0012fa00: 7650a1a5 0000041c 760c9599 0012f99c '..Pv.......v....'
>> HEAP[gp4.exe]: >> Invalid Address specified to RtlFreeHeap( 00F70000, 01B53548 )
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00009458
First chance exception
Exception address: 0x77582ea8
Module name: 'ntdll.dll' (base 0x77540000, size 1162656)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Stack trace:
77582EA9: Windows\system32\ntdll.dll! DbgBreakPoint + 1 bytes
775C4BDF: Windows\system32\ntdll.dll! RtlDeleteAce + 79312 bytes
775F1CFA: Windows\system32\ntdll.dll! RtlpNtMakeTemporaryKey + 17992 bytes
775BD9FA: Windows\system32\ntdll.dll! RtlDeleteAce + 50155 bytes
775A1C21: Windows\system32\ntdll.dll! RtlTryEnterCriticalSection + 827 bytes
76757A7E: Windows\system32\kernel32.dll! HeapFree + 20 bytes
7650A097: Windows\system32\msvcrt.dll! free + 57 bytes
09B11819: <no module><no symbol>
09B1138E: <no module><no symbol>
Registers:
EAX=01B53540 ECX=775614CD ESI=00F70000
EBX=01B53540 EDX=0012F3E9 EDI=00000000
CS:EIP=001B:77582EA9
SS:ESP=0023:0012F62C EBP=0012F630
DS=0023 ES=0023 FS=003B GS=0000
Flags=00200202
Stack dump:
0012f62c: 775f0c9a 0012f648 775c4bdf 01b53540 '.._wH....K\w@5..'
0012f63c: 00f70000 01b53540 7758e492 0012f690 '....@5....Xw....'
0012f64c: 775f1cfa 00f70000 01b53540 7758e492 '.._w....@5....Xw'
0012f65c: 0012c643 00000000 00f70000 00f70000 'C...............'
0012f66c: 00f70000 775bdc7e 00010000 0012f65c '....~.[w....\...'
0012f67c: 775a2447 0012f774 77548bf2 7758ccd3 'G$Zwt.....Tw..Xw'
0012f68c: 00000001 0012f784 775bd9fa 00f70000 '..........[w....'
0012f69c: 50000063 01b53548 0012c757 00000000 'c..PH5..W.......'
0012f6ac: 00f70000 01b53548 00000003 00000001 '....H5..........'
0012f6bc: 00000003 00000004 00000001 00000002 '................'
0012f6cc: 00000001 00000004 00000014 00f70000 '................'
0012f6dc: 00000002 00000001 00000000 00000006 '................'
0012f6ec: 00000001 00000002 00000001 00000000 '................'
0012f6fc: 00000014 00000001 00000004 00000000 '................'
0012f70c: 00000003 00000006 00000001 40000062 '............b..@'
0012f71c: 00000000 00000002 00000002 00000001 '................'
0012f72c: 00000000 00000001 00000003 00f70000 '................'
0012f73c: 00000000 00000000 00000001 0012f858 '............X...'
0012f74c: 77548bf2 7758c483 fffffffe 775a2447 '..Tw..Xw....G$Zw'
0012f75c: 005a214c 0000078c 00000000 00000100 'L!Z.............'
0012f76c: 0012f6a4 0000078c 0012f7f0 77548bf2 '..............Tw'
0012f77c: 7758c4e3 fffffffe 0012f7a0 775a1c21 '..Xw........!.Zw'
0012f78c: 01b53540 01b53548 01b53548 01b53cd4 '@5..H5..H5...<..'
0012f79c: 0012f9bc 0012f7b4 76757a7e 00f70000 '........~zuv....'
0012f7ac: 00000000 01b53540 0012f800 7650a097 '....@5........Pv'
0012f7bc: 00f70000 00000000 01b53548 4d497afe '........H5...zIM'
0012f7cc: 01b53cd4 00000015 0012f9bc 00000000 '.<..............'
0012f7dc: 00000000 00000000 00000000 0012f7c8 '................'
0012f7ec: 00000000 0012f858 765213dd 3b0b2256 '....X.....RvV".;'
0012f7fc: fffffffe 0000078c 09b11819 01b53548 '............H5..'
0012f80c: 09b17c70 0012f9bc 0012fa1c 00000000 'p|..............'
0012f81c: 01b53548 00000015 00000007 74380000 'H5............8t'
0012f82c: 74382210 74382020 7438205c 74382081 '."8t 8t\ 8t. 8t'
0012f83c: 00000000 000000a5 01b52fe8 01b53298 '........./...2..'
0012f84c: 01b4f480 00000000 00000000 0012fa10 '................'
0012f85c: 09b12a38 00000000 09b1138e 76725f8c '8*..........._rv'
0012f86c: 760c9599 0012fa1c 00000000 775f178f '...v.........._w'
0012f87c: 775bdc7e 00f70000 50000163 775a2447 '~.[w....c..PG$Zw'
0012f88c: 0012c9b7 00f70000 00000000 00000000 '................'
0012f89c: 7fffffe8 775a0370 767357fe 00000414 '....p.Zw.Wsv....'
0012f8ac: 0012f8e0 0012f8e8 00000008 0000000e '................'
0012f8bc: ffffffff 00000005 7659e500 00001000 '..........Yv....'
0012f8cc: 00000004 000006f0 00000000 00000001 '................'
0012f8dc: 00000000 00000000 0012f98c 00000000 '................'
0012f8ec: 00010300 00120877 0012fa1c 09b11342 '....w.......B...'
0012f8fc: 0012f904 760c9599 00000094 00000006 '.......v........'
0012f90c: 00000000 00001770 00000002 0012f900 '....p...........'
0012f91c: 00f73780 00000000 00000001 0000003c '.7..........<...'
0012f92c: 0012f98c 00f73780 00000000 00000000 '.....7..........'
0012f93c: 0012f964 76527b36 00f73780 0012f96c 'd...6{Rv.7..l...'
0012f94c: 0012f98c 00f73780 00000000 fffff1f0 '.....7..........'
0012f95c: 00000001 fffff1f0 0012f97c 76527b74 '........|...t{Rv'
0012f96c: 4e355e69 0012f98c 760c9599 76725f8c 'i^5N.......v._rv'
0012f97c: 0012f990 09b09971 0012f98c 00f73780 '....q........7..'
0012f98c: 4e354249 0012fa1c 09b04018 09b17c70 'IB5N.....@..p|..'
0012f99c: 76725f8c 760c9599 00000000 00f7ec30 '._rv...v....0...'
0012f9ac: 0012f9b8 7650e959 00000015 0012f9f4 '....Y.Pv........'
0012f9bc: 00000001 54a519ea 00000000 00000000 '.......T........'
0012f9cc: 00000000 984498ff 906ce6a1 00000000 '......D...l.....'
0012f9dc: 00000000 00000000 00000000 00000000 '................'
0012f9ec: 0000041c 00000001 00000002 00441f05 '..............D.'
0012f9fc: 09b15eb8 7650a1a5 0000041c 760c9599 '.^....Pv.......v'
0012fa0c: 0012f99c 0012ff90 09b128fb 00000001 '.........(......'
0012fa1c: 0012fa98 09b08c34 09b15cf4 00000003 '....4....\......'
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00009458
First chance exception
Exception address: 0x775a7036
Module name: 'ntdll.dll' (base 0x77540000, size 1162656)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x0000001c
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\System32\MMDevApi.dll
base 0x74900000
size 146944
>> Bink init completed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\spool\DRIVERS\W32X86\3\unidrvui.dll
base 0x67fb0000
size 740864
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x67fb0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Windows\system32\spool\DRIVERS\W32X86\3\unidrvui.dll
base 0x67fb0000
size 740864
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x67fb0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\dx\gpxpdx8.dll
base 0x02880000
size 528452
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00009458
base 0x02880000
>> *** GPxPSup DLLMain: Could not load gpxpdx8.dll
>>
D3DDevice GetInfo Results [CONSTRUCTOR]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> **************************************************************************
>> CGP4Manager::DebugTextures() :: ACTIVE TEXTURES LOADED AGAINST CGP4MANAGER
>> **************************************************************************
>> **************************************************************************
>> ************************************************************************
>> CGP4Manager::DebugBuffers() :: ACTIVE BUFFERS LOADED AGAINST CGP4MANAGER
>> ************************************************************************
>> VB CGP4DEVICE::RENDERBLIT 168 bytes
>> **************************************************************************
>> *****************************************************************************************
>> CGP4Manager::DebugGenericEntities() :: ACTIVE GENERIC ENTITIES LOADED AGAINST CGP4MANAGER
>> *****************************************************************************************
>> **************************************************************************
>>
D3DDevice GetInfo Results [Entering D3D_Init()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> Allocated 40000 bytes for animation replay storage.
>>
D3DDevice GetInfo Results [Leaving D3D_Init()]
*********************************************
TEXTURES_____________________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX BUFFERS_______________________________
Thrashing 0
NumEvicts 0
NumUsed 0
NumUsedInVidMem 0
WorkingSet 0
WorkingSetBytes 0
TotalManaged 0
TotalBytes 0
ApproxBytesDownloaded 0
NumUsedInVidMem 0
VERTEX_______________________________________
NumRenderedTriangles 0
NumExClippingTriangles 0
*********************************************
>> **************************
*
* Font Created!
*
************************
>> **************************
*
* Font Created!
*
************************
>> Volume = 45 - >> MUSIC:Start Music!
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000094e4
Thread handle = 0x00000370
Start address = 0x775a0f18
Thread local base = 0x7ffd7000
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009464
Thread exit code = 255
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009488
Thread exit code = 255
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009458
Thread exit code = 255
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000094bc
Thread exit code = 255
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000094b8
Thread exit code = 255
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00009498
Thread exit code = 255
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000948c
Thread exit code = 255
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000094e4
First chance exception
Exception address: 0x775a1ad5
Module name: 'ntdll.dll' (base 0x77540000, size 1162656)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00000004
>> Invalid parameter passed to C runtime function.
>> Invalid parameter passed to C runtime function.
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x000094e4
Process exit code = 255
Re: gpxpatch with vista
Date: July 31, 2011 02:04PM
Posted by: mortal
Incorrect decrypted exe, use v1.02 after patching GP4 with the v9.6 patch. Do this


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central



Edited 1 time(s). Last edit at 07/31/2011 02:06PM by mortal.
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy