GP4 Doesn´t Start

Posted by Andree1205 
GP4 Doesn´t Start
Date: March 18, 2008 04:14PM
Posted by: Andree1205
Hello,

i have reinstall my game and then i have installed the Game.
But now i can Start the Game.
Here is the Error Log File:

Starting log
GPxPatch version: 3.92
GPx version detected: decrypted GP4 v1.00
Verbosity level is 2
OS version info: Windows XP Service Pack 2 build 2600
Total physical memory: 1023 MB (free: 439 MB)
Debugging gp4.exe
Process created:
Process ID = 0x00000dd4
Process handle = 0x00000098
Main thread ID = 0x00000de4
Main thread handle = 0x0000009c
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x00000de4
Entry point = 0x005db0b6
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path ntdll.dll
base 0x7c910000
size 733696
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\kernel32.dll
base 0x7c800000
size 1058304
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\d3d8.dll
base 0x6de90000
size 1179648
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\d3d8thk.dll
base 0x6de80000
size 8192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\GDI32.dll
base 0x77ef0000
size 282112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\USER32.dll
base 0x7e360000
size 579072
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\msvcrt.dll
base 0x77be0000
size 343040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\ADVAPI32.dll
base 0x77da0000
size 677888
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\RPCRT4.dll
base 0x77e50000
size 584192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\Secur32.dll
base 0x77fc0000
size 55808
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\VERSION.dll
base 0x77bd0000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\DINPUT8.dll
base 0x6d2f0000
size 186368
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WINSPOOL.DRV
base 0x72f70000
size 146944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\ole32.dll
base 0x774b0000
size 1285120
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\DINPUT.dll
base 0x72210000
size 163328
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WINMM.dll
base 0x76af0000
size 178176
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\DSOUND.dll
base 0x73e70000
size 367616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\binkw32.dll
base 0x30000000
size 357939
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WSOCK32.dll
base 0x71a30000
size 24576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WS2_32.dll
base 0x71a10000
size 82944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WS2HELP.dll
base 0x71a00000
size 19968
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c911230
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x005db0b6)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\ShimEng.dll
base 0x5cf00000
size 65536
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\IMM32.DLL
base 0x76330000
size 110080
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x5cf00000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x005db0b6
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x01080000...
Injection succesful
Setting instruction pointer to injected code (0x01080000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c50000
size 144384
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76c50000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c50000
size 144384
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76c50000
>> D3D Constructor!
>> Starting WinMain
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\uxtheme.dll
base 0x5b0f0000
size 219648
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\MSCTF.dll
base 0x746a0000
size 294400
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\apphelp.dll
base 0x77b10000
size 126976
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\msctfime.ime
base 0x75250000
size 177152
>> WM_ACTIVATE (active)(not minimized)
>> Game thread into win95_startup(0)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000eb8
Thread handle = 0x00000120
Start address = 0x7c810659
Thread local base = 0x7ffdc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\CLBCATQ.DLL
base 0x76f90000
size 498688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\COMRes.dll
base 0x77010000
size 1445376
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path
base 0x01450000
size 550912
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\dplayx.dll
base 0x6cc20000
size 229888
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000fd8
Thread handle = 0x00000134
Start address = 0x7c810659
Thread local base = 0x7ffdb000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6cc10000
size 48640
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\TAPI32.dll
base 0x76e70000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\SHLWAPI.dll
base 0x77f40000
size 484352
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\rtutils.dll
base 0x76e40000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
base 0x773a0000
size 1054208
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x6cc10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76e70000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76e40000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6cc10000
size 48640
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\TAPI32.dll
base 0x76e70000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\rtutils.dll
base 0x76e40000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000027c
Thread handle = 0x00000158
Start address = 0x7c810659
Thread local base = 0x7ffda000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000027c
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x6cc10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76e70000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76e40000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\dpwsockx.dll
base 0x5b6c0000
size 57856
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x5b6c0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\dpwsockx.dll
base 0x5b6c0000
size 57856
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\mswsock.dll
base 0x719b0000
size 247296
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\hnetcfg.dll
base 0x66710000
size 373248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\System32\wshtcpip.dll
base 0x719f0000
size 19968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\dpnhupnp.dll
base 0x6cba0000
size 60928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\rsaenh.dll
base 0x0ffd0000
size 152576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d20000
size 95744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\rasapi32.dll
base 0x76ea0000
size 236544
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\rasman.dll
base 0x76e50000
size 61440
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\NETAPI32.dll
base 0x597d0000
size 332288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\TAPI32.dll
base 0x76e70000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\rtutils.dll
base 0x76e40000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\MPRAPI.dll
base 0x76d00000
size 87040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\ACTIVEDS.dll
base 0x77c90000
size 194560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\adsldpc.dll
base 0x76dd0000
size 143360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f20000
size 173056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\ATL.DLL
base 0x76ad0000
size 58880
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\SAMLIB.dll
base 0x71b70000
size 64000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\SETUPAPI.dll
base 0x778f0000
size 1426944
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000ac0
Thread handle = 0x000001a8
Start address = 0x7c810659
Thread local base = 0x7ffda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\dpnhpast.dll
base 0x6cbc0000
size 35328
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x6cbc0000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000009e4
Thread handle = 0x000001b0
Start address = 0x7c810659
Thread local base = 0x7ffd9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76d20000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x6cba0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000009e4
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x719f0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000ac0
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x66710000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x5b6c0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000fd8
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\DNSAPI.dll
base 0x76ee0000
size 148480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\System32\winrnr.dll
base 0x76f70000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\Programme\Bonjour\mdnsNSP.dll
base 0x16080000
size 94208
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\Iphlpapi.dll
base 0x76d20000
size 95744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\rasadhlp.dll
base 0x76f80000
size 8192
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76d20000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x76f70000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x16080000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\mscat32.dll
base 0x73260000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WINTRUST.dll
base 0x76bf0000
size 186368
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\CRYPT32.dll
base 0x77a50000
size 602624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\MSASN1.dll
base 0x77af0000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\IMAGEHLP.dll
base 0x76c50000
size 144384
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000d70
Thread handle = 0x000001d0
Start address = 0x7c810659
Thread local base = 0x7ffdb000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000648
Thread handle = 0x000001d4
Start address = 0x7c810659
Thread local base = 0x7ffda000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000f00
Thread handle = 0x000001d8
Start address = 0x7c810659
Thread local base = 0x7ffd9000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000efc
Thread handle = 0x000001dc
Start address = 0x7c810659
Thread local base = 0x7ffd8000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\xpsp2res.dll
base 0x20000000
size 3574784
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\userenv.dll
base 0x76620000
size 733184
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000c74
Thread handle = 0x000001e8
Start address = 0x7c810659
Thread local base = 0x7ffd7000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\cryptnet.dll
base 0x76580000
size 63488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\WINHTTP.dll
base 0x4d5c0000
size 351232
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\SensApi.dll
base 0x72240000
size 6656
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x73260000
>> nv4_disp.dll>>
>> NVIDIA GeForce 7600 GS>>
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\mscat32.dll
base 0x73260000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
base 0x73260000
>> Device mode 320 x 200 (format 23) confirmed
>> Device mode 320 x 240 (format 23) confirmed
>> Device mode 400 x 300 (format 23) confirmed
>> Device mode 480 x 360 (format 23) confirmed
>> Device mode 512 x 384 (format 23) confirmed
>> Device mode 640 x 400 (format 23) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 848 x 480 (format 23) confirmed
>> Device mode 960 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1088 x 612 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 320 x 200 (format 23) confirmed
>> Device mode 320 x 240 (format 23) confirmed
>> Device mode 400 x 300 (format 23) confirmed
>> Device mode 480 x 360 (format 23) confirmed
>> Device mode 512 x 384 (format 23) confirmed
>> Device mode 640 x 400 (format 23) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 848 x 480 (format 23) confirmed
>> Device mode 960 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1088 x 612 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 320 x 200 (format 22) confirmed
>> Device mode 320 x 240 (format 22) confirmed
>> Device mode 400 x 300 (format 22) confirmed
>> Device mode 480 x 360 (format 22) confirmed
>> Device mode 512 x 384 (format 22) confirmed
>> Device mode 640 x 400 (format 22) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 848 x 480 (format 22) confirmed
>> Device mode 960 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1088 x 612 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 320 x 200 (format 23) confirmed
>> Device mode 320 x 240 (format 23) confirmed
>> Device mode 400 x 300 (format 23) confirmed
>> Device mode 480 x 360 (format 23) confirmed
>> Device mode 512 x 384 (format 23) confirmed
>> Device mode 640 x 400 (format 23) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 848 x 480 (format 23) confirmed
>> Device mode 960 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1088 x 612 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 320 x 200 (format 22) confirmed
>> Device mode 320 x 240 (format 22) confirmed
>> Device mode 400 x 300 (format 22) confirmed
>> Device mode 480 x 360 (format 22) confirmed
>> Device mode 512 x 384 (format 22) confirmed
>> Device mode 640 x 400 (format 22) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 848 x 480 (format 22) confirmed
>> Device mode 960 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1088 x 612 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 320 x 200 (format 23) confirmed
>> Device mode 320 x 240 (format 23) confirmed
>> Device mode 400 x 300 (format 23) confirmed
>> Device mode 480 x 360 (format 23) confirmed
>> Device mode 512 x 384 (format 23) confirmed
>> Device mode 640 x 400 (format 23) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 848 x 480 (format 23) confirmed
>> Device mode 960 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1088 x 612 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 320 x 200 (format 22) confirmed
>> Device mode 320 x 240 (format 22) confirmed
>> Device mode 400 x 300 (format 22) confirmed
>> Device mode 480 x 360 (format 22) confirmed
>> Device mode 512 x 384 (format 22) confirmed
>> Device mode 640 x 400 (format 22) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 848 x 480 (format 22) confirmed
>> Device mode 960 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1088 x 612 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>>
Win95_Startup : 1024 x 768
>>
win95_initialiseD3D : 1024 x 768
>> Initialize3DEnvironment(1024 x 768 TNL:1)
>> Initialize3DEnvironment() - Requested width x height x format found in mode list
>> Puredevice set
>> D3DDevice created = >> HAL (hw vp): NVIDIA GeForce 7600 GS>>
>>
GP_win95 :: Running gfx at 32/24 bit
>> win95_startup() - Initialize3DEnvironment ok Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\HID.DLL
base 0x68d90000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\NTMARTA.DLL
base 0x77660000
size 119296
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\Programme\VID_0E8F&PID_0003\LiteStar\MXVStd\GAJoyFF.dll
base 0x10000000
size 61440
>> Supported FF Effects for this stick...
>> Constant>>
>> Ramp Force>>
>> Square Wave>>
>> Sine Wave>>
>> Triangle Wave>>
>> Sawtooth Up Wave>>
>> Sawtooth Down Wave>>
>> Spring>>
>> Damper>>
>> Inertia>>
>> Friction>>
>> CustomForce>>
>> End of list
>> Device supports Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device supports deadband
>> Using Constant force
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000350
Thread handle = 0x00000208
Start address = 0x7c810659
Thread local base = 0x7ffd6000
>> Device doesn't support Saturation
>> Device doesn't support Pos/Neg Coefficients
>> Device doesn't support Pos Neg Saturation
>> Device doesn't support deadband
>> Game thread finishing win95 startup(0)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 39424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 12288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 35328
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 50688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path e:\Grand Prix 4\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\wdmaud.drv
base 0x72c90000
size 23552
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000554
Thread handle = 0x00000228
Start address = 0x7c810659
Thread local base = 0x7ffd5000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\msacm32.drv
base 0x72c80000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\MSACM32.dll
base 0x77bb0000
size 72192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\midimap.dll
base 0x77ba0000
size 42496
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000298
Thread handle = 0x00000238
Start address = 0x7c810659
Thread local base = 0x7ffd4000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00000de4
path C:\WINDOWS\system32\KsUser.dll
base 0x73e40000
size 4096
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000de0
Thread handle = 0x00000240
Start address = 0x7c810659
Thread local base = 0x7ffaf000
>> Bink init completed
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x0054a640
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00b44000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000de4
First chance exception
Exception address: 0x7c9205f8
Module name: 'ntdll.dll' (base 0x7c910000, size 733696)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270092
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000eb8
First chance exception
Exception address: 0x005078dd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270082
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00000eb8
Unhandled exception
Exception address: 0x005078dd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0xfe270082
Stack trace:
005078DD: Grand Prix 4\GPxPatch.exe! <no symbol>
76B0AE36: <no module><no symbol>
76B0AF3A: <no module><no symbol>
7C80B683: WINDOWS\system32\kernel32.dll! GetModuleFileNameA + 436 bytes
Registers:
EAX=FE270082 ECX=FE270082 ESI=00000010
EBX=00000000 EDX=76B10200 EDI=00507AA0
CS:EIP=001B:005078DD
SS:ESP=0023:0144FE90 EBP=0144FEDC
DS=0023 ES=0023 FS=003B GS=0000
Flags=00000286
Stack dump:
0144fe90: 0054bd01 00507aa0 00000010 0144fedc '..T..zP.......D.'
0144fea0: 0144feb4 00000000 76b10200 0144fee8 '..D........v..D.'
0144feb0: 00000000 00507aa5 76af54f3 00000010 '.....zP..T.v....'
0144fec0: 00000000 001200aa 00000000 00000000 '................'
0144fed0: 00000000 76b11760 76b10200 0144ff18 '....`..v...v..D.'
0144fee0: 76b0ae36 00507aa0 00000003 00000010 '6..v.zP.........'
0144fef0: 00000000 001200aa 00000000 00000000 '................'
0144ff00: 7c97d8a8 00000001 00000000 76b0af21 '...|........!..v'
0144ff10: 00507aa0 001200aa 0144ffb4 76b0af3a '.zP.......D.:..v'
0144ff20: 00000010 ffffffff 00000000 00000010 '................'
0144ff30: 00000031 b9d0dc30 806418ac 85772020 '1...0.....d. w.'
0144ff40: 862f8da8 7ffdc000 b9d0dc88 80502462 '../.........b$P.'
0144ff50: 00780010 00000008 00000000 00000000 '..x.............'
0144ff60: 00000000 804fedda 00000001 000000b0 '......O.........'
0144ff70: 000000bc 0000015c 862f8da8 b9d0dd50 '....\...../.P...'
0144ff80: 00000000 862f8e90 b9d0dc01 00000000 '....../.........'
0144ff90: 85772020 80502442 00000000 00000000 ' w.B$P.........'
0144ffa0: 00000000 8050244a b9d0dca0 80723ef2 '....J$P......>r.'
0144ffb0: 00000003 0144ffec 7c80b683 00000000 '......D....|....'
0144ffc0: 7c97d8a8 ffffffff 00000000 7ffdc000 '...|............'
0144ffd0: c0000005 0144ffc0 0144fab4 ffffffff '......D...D.....'
0144ffe0: 7c839aa8 7c80b690 00000000 00000000 '...|...|........'
0144fff0: 00000000 76b0aee7 00000000 00000000 '.......v........'
01450000: 00905a4d 00000003 00000004 0000ffff 'MZ..............'
01450010: 000000b8 00000000 00000040 00000000 '........@.......'
01450020: 00000000 00000000 00000000 00000000 '................'
01450030: 00000000 00000000 00000000 000000e8 '................'
01450040: 0eba1f0e cd09b400 4c01b821 685421cd '........!..L.!Th'
01450050: 70207369 72676f72 63206d61 6f6e6e61 'is program canno'
01450060: 65622074 6e757220 206e6920 20534f44 't be run in DOS '
01450070: 65646f6d 0a0d0d2e 00000024 00000000 'mode....$.......'
01450080: 2a4571aa 792b10ee 792b10ee 792b10ee '.qE*..+y..+y..+y'
01450090: 792a10ee 792b11d4 79761f2d 792b10e1 '..*y..+y-.vy..+y'
014500a0: 79241f2d 792b10fe 794b1f2d 792b109c '-.$y..+y-.Ky..+y'
014500b0: 79741f2d 792b10f5 79771f2d 792b10ef '-.ty..+y-.wy..+y'
014500c0: 79751f2d 792b10ef 79711f2d 792b10ef '-.uy..+y-.qy..+y'
014500d0: 68636952 792b10ee 00000000 00000000 'Rich..+y........'
014500e0: 00000000 00000000 00004550 0005014c '........PE..L...'
014500f0: 47559f03 00000000 00000000 210e00e0 '..UG...........!'
01450100: 0a07010b 0007ec00 00007a00 00000000 '.........z......'
01450110: 00001558 00001000 0007d000 770f0000 'X..............w'
01450120: 00001000 00000200 00010005 00010005 '................'
01450130: 000a0004 00000000 0008b000 00000400 '................'
01450140: 00089854 00000003 00040000 00001000 'T...............'
01450150: 00100000 00001000 00000000 00000010 '................'
01450160: 0000215c 00002712 0007dcc0 000000a0 '\!...'..........'
01450170: 00084000 000003d8 00000000 00000000 '.@..............'
01450180: 00000000 00000000 00085000 00005400 '.........P...T..'
01450190: 0007f6cc 00000038 00000000 00000000 '....8...........'
014501a0: 00000000 00000000 00000000 00000000 '................'
014501b0: 00040c10 00000040 00000000 00000000 '....@...........'
014501c0: 00001000 000004f8 00000000 00000000 '................'
014501d0: 00000000 00000000 00000000 00000000 '................'
014501e0: 7865742e 00000074 0007e72d 00001000 '.text...-.......'
014501f0: 0007e800 00000400 00000000 00000000 '................'
01450200: 00000000 60000020 70726f2e 00000063 '.... ..`.orpc...'
01450210: 000002bf 00080000 00000400 0007ec00 '................'
01450220: 00000000 00000000 00000000 60000020 '............ ..`'
01450230: 7461642e 00000061 00002058 00081000 '.data...X ......'
01450240: 00002000 0007f000 00000000 00000000 '. ..............'
01450250: 00000000 c0000040 7273722e 00000063 '....@....rsrc...'
01450260: 000003d8 00084000 00000400 00081000 '.....@..........'
01450270: 00000000 00000000 00000000 40000040 '............@..@'
01450280: 6c65722e 0000636f 00005400 00085000 '.reloc...T...P..'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000eb8
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000350
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000554
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000de0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000298
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000648
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000efc
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000de4
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000d70
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000f00
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x00000c74
Process exit code = -1073741819
Re: GP4 Doesn´t Start
Date: March 18, 2008 04:28PM
Posted by: 32BOBO32
01450040: 0eba1f0e cd09b400 4c01b821 685421cd '........!..L.!Th'
01450050: 70207369 72676f72 63206d61 6f6e6e61 'is program canno'
01450060: 65622074 6e757220 206e6920 20534f44 't be run in DOS '
01450070: 65646f6d 0a0d0d2e 00000024 00000000 'mode....$.......'

Mhhh.... how are you starting the game? ;)
Re: GP4 Doesn´t Start
Date: March 18, 2008 04:32PM
Posted by: Andree1205
Via Windows and GPxPatch
Re: GP4 Doesn´t Start
Date: March 18, 2008 09:31PM
Posted by: mortal
Doesn't look like it does it. Set the exe to run in windows 98 compatibility mode.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: GP4 Doesn´t Start
Date: March 19, 2008 05:52AM
Posted by: Andree1205
thx now the game is running
Re: GP4 Doesn´t Start
Date: March 19, 2008 08:43AM
Posted by: 32BOBO32
Re: GP4 Doesn´t Start
Date: March 19, 2008 11:47AM
Posted by: mortal
LOL :-)


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: GP4 Doesn´t Start
Date: April 15, 2008 11:57AM
Posted by: msater
i used the nocd patch. works perectly now.
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy