To add to my previous post I have ran GPXPatch and the first past of the error log file (124 pages long) might help.
Regards, KH
Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP4 v1.02
Verbosity level is 0
OS version info: Windows XP Service Pack 2 build 2600
Total physical memory: 1023 MB (free: 1023 MB)
Debugging gp4.exe
Waiting for debug events...
Injecting DLL loading code...
Injection succesful
First chance exception
Exception address: 0x778ebce7
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00c42151
First chance exception
Exception address: 0x778ebce7
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00c44c05
First chance exception
Exception address: 0x0054cf4f
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00b4a000
First chance exception
Exception address: 0x77dc2d86
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x580700c7
First chance exception
Exception address: 0x77dc2d86
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x580700c7
First chance exception
Exception address: 0x77dc2d86
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x580700c7
First chance exception
Exception address: 0x77dc2d86
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x580700c7
-------
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x580700c7
Unhandled exception
Exception address: 0x00509fbd
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Stack trace:
00509FBD: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
72CEA535: Windows\system32\WINMM.dll! timeEndPeriod + 1354 bytes
72CEA434: Windows\system32\WINMM.dll! timeEndPeriod + 1097 bytes
778FED6C: Windows\system32\kernel32.dll! BaseThreadInitThunk + 18 bytes
77DD377B: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 239 bytes
77DD374E: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 194 bytes
Registers:
EAX=58070083 ECX=58070083 ESI=00000010
EBX=00000000 EDX=77DB7094 EDI=0050A190
CS:EIP=001B:00509FBD
SS:ESP=0023:0266FE6C EBP=0266FEB8
DS=0023 ES=0023 FS=003B GS=0000
Flags=00010202
Stack dump:
0266fe6c: 0054e75d 0050a190 00000010 0266feb8 '].T...P.......f.'
--------
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x580700c7
Stack trace:
77DC2D86: Windows\SYSTEM32\ntdll.dll! RtlAllocateHeap + 32 bytes
643793DE: Windows\AppPatch\AcXtrnal.DLL! <no symbol>
005DEBCC: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
005DFF18: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
005DDFC0: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
778FED6C: Windows\system32\kernel32.dll! BaseThreadInitThunk + 18 bytes
77DD377B: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 239 bytes
77DD374E: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 194 bytes
Registers:
EAX=01040A60 ECX=7FFDF000 ESI=00000000
EBX=58070083 EDX=00000057 EDI=000000A0
CS:EIP=001B:77DC2D86
SS:ESP=0023:000311EC EBP=00031258
DS=0023 ES=0023 FS=003B GS=0000
Flags=00210293
Stack dump:
000311ec: 000000a0 00000008 00000080 00000000 '................'