Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting log
- GPxPatch version: 4.43
- GPx version detected: decrypted GP4 v1.02
- Date/time: 21-01-2016 17:51
- [17:51:25.548] Verbosity level is 2
- [17:51:25.548] OS version info: Windows 8 build 9200
- [17:51:25.548] Total physical memory: 2047 MB (free: 2047 MB)
- [17:51:25.549] Debugging gp4.exe
- [17:51:25.553] Process created:
- Process ID = 0x000010c0
- Process handle = 0x00000298
- Main thread ID = 0x00000f90
- Main thread handle = 0x00000294
- Process will run on CPU 1 only
- [17:51:25.553] Waiting for debug events...
- [17:51:25.553] Debug event: CREATE_PROCESS_DEBUG_EVENT
- [17:51:25.553] Thread ID = 0x00000f90
- [17:51:25.553] Entry point = 0x005ddec6
- [17:51:25.553] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.553] Thread ID = 0x00000f90
- [17:51:25.553] path
- base 0x770e0000
- size 1533496
- [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.555] Thread ID = 0x00000f90
- [17:51:25.555] base 0x001c0000
- [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.555] Thread ID = 0x00000f90
- [17:51:25.555] base 0x74f30000
- [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.555] Thread ID = 0x00000f90
- [17:51:25.555] base 0x001c0000
- [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.555] Thread ID = 0x00000f90
- [17:51:25.555] base 0x002a0000
- [17:51:25.556] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.556] Thread ID = 0x00000f90
- [17:51:25.556] path C:\Windows\SysWOW64\KERNEL32.DLL
- base 0x74f30000
- size 624312
- [17:51:25.556] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.556] Thread ID = 0x00000f90
- [17:51:25.556] path C:\Windows\SysWOW64\KERNELBASE.dll
- base 0x74950000
- size 1531376
- [17:51:25.557] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.557] Thread ID = 0x00000f90
- [17:51:25.557] path C:\Windows\SysWOW64\apphelp.dll
- base 0x740e0000
- size 576000
- [17:51:25.558] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.558] Thread ID = 0x00000f90
- [17:51:25.558] path C:\Windows\AppPatch\AcGenral.DLL
- base 0x6a790000
- size 2478592
- [17:51:25.558] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.558] Thread ID = 0x00000f90
- [17:51:25.558] path C:\Windows\SysWOW64\msvcrt.dll
- base 0x76d50000
- size 773168
- [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.559] Thread ID = 0x00000f90
- [17:51:25.559] path C:\Windows\SysWOW64\sechost.dll
- base 0x75020000
- size 263432
- [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.559] Thread ID = 0x00000f90
- [17:51:25.559] path C:\Windows\SysWOW64\RPCRT4.dll
- base 0x74da0000
- size 704496
- [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.559] Thread ID = 0x00000f90
- [17:51:25.559] path C:\Windows\SysWOW64\SspiCli.dll
- base 0x741f0000
- size 116216
- [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.559] Thread ID = 0x00000f90
- [17:51:25.559] path C:\Windows\SysWOW64\CRYPTBASE.dll
- base 0x741e0000
- size 31528
- [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.559] Thread ID = 0x00000f90
- [17:51:25.559] path C:\Windows\SysWOW64\bcryptPrimitives.dll
- base 0x74180000
- size 365128
- [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.559] Thread ID = 0x00000f90
- [17:51:25.559] path C:\Windows\SysWOW64\SHLWAPI.dll
- base 0x75280000
- size 274768
- [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.559] Thread ID = 0x00000f90
- [17:51:25.559] path C:\Windows\SysWOW64\combase.dll
- base 0x75070000
- size 1811360
- [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.560] Thread ID = 0x00000f90
- [17:51:25.560] path C:\Windows\SysWOW64\GDI32.dll
- base 0x74c50000
- size 1364048
- [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.560] Thread ID = 0x00000f90
- [17:51:25.560] path C:\Windows\SysWOW64\USER32.dll
- base 0x76fa0000
- size 1310880
- [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.560] Thread ID = 0x00000f90
- [17:51:25.560] path C:\Windows\SysWOW64\ole32.dll
- base 0x766b0000
- size 952968
- [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.560] Thread ID = 0x00000f90
- [17:51:25.560] path C:\Windows\SysWOW64\OLEAUT32.dll
- base 0x74e50000
- size 591912
- [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.560] Thread ID = 0x00000f90
- [17:51:25.560] path C:\Windows\SysWOW64\SHELL32.dll
- base 0x752d0000
- size 20858912
- [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.560] Thread ID = 0x00000f90
- [17:51:25.560] path C:\Windows\SysWOW64\windows.storage.dll
- base 0x74340000
- size 5121128
- [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.561] Thread ID = 0x00000f90
- [17:51:25.561] path C:\Windows\SysWOW64\advapi32.dll
- base 0x76e10000
- size 497896
- [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.561] Thread ID = 0x00000f90
- [17:51:25.561] path C:\Windows\SysWOW64\kernel.appcore.dll
- base 0x74820000
- size 39792
- [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.561] Thread ID = 0x00000f90
- [17:51:25.561] path C:\Windows\SysWOW64\shcore.dll
- base 0x76ae0000
- size 565656
- [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.561] Thread ID = 0x00000f90
- [17:51:25.561] path C:\Windows\SysWOW64\powrprof.dll
- base 0x76cf0000
- size 269648
- [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.561] Thread ID = 0x00000f90
- [17:51:25.561] path C:\Windows\SysWOW64\profapi.dll
- base 0x74c40000
- size 53728
- [17:51:25.562] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.562] Thread ID = 0x00000f90
- [17:51:25.562] path C:\Windows\SysWOW64\UxTheme.dll
- base 0x71910000
- size 458752
- [17:51:25.562] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.562] Thread ID = 0x00000f90
- [17:51:25.562] path C:\Windows\SysWOW64\WINMM.dll
- base 0x74070000
- size 134352
- [17:51:25.562] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.562] Thread ID = 0x00000f90
- [17:51:25.562] path C:\Windows\SysWOW64\samcli.dll
- base 0x719c0000
- size 65024
- [17:51:25.563] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.563] Thread ID = 0x00000f90
- [17:51:25.563] path C:\Windows\SysWOW64\MSACM32.dll
- base 0x6a770000
- size 90912
- [17:51:25.563] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.563] Thread ID = 0x00000f90
- [17:51:25.563] path C:\Windows\SysWOW64\VERSION.dll
- base 0x740a0000
- size 27360
- [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.564] Thread ID = 0x00000f90
- [17:51:25.564] path C:\Windows\SysWOW64\USERENV.dll
- base 0x74050000
- size 93000
- [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.564] Thread ID = 0x00000f90
- [17:51:25.564] path C:\Windows\SysWOW64\dwmapi.dll
- base 0x71700000
- size 93184
- [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.564] Thread ID = 0x00000f90
- [17:51:25.564] path C:\Windows\SysWOW64\urlmon.dll
- base 0x6b1c0000
- size 1380864
- [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.564] Thread ID = 0x00000f90
- [17:51:25.564] path C:\Windows\SysWOW64\WINSPOOL.DRV
- base 0x6e210000
- size 400384
- [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.565] Thread ID = 0x00000f90
- [17:51:25.565] path C:\Windows\SysWOW64\MPR.dll
- base 0x6aa30000
- size 88320
- [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.565] Thread ID = 0x00000f90
- [17:51:25.565] path C:\Windows\SysWOW64\WINMMBASE.dll
- base 0x74010000
- size 132744
- [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.565] Thread ID = 0x00000f90
- [17:51:25.565] path C:\Windows\SysWOW64\cfgmgr32.dll
- base 0x74ef0000
- size 214360
- [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.565] Thread ID = 0x00000f90
- [17:51:25.565] path C:\Windows\SysWOW64\iertutil.dll
- base 0x6aef0000
- size 2878000
- [17:51:25.566] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.566] Thread ID = 0x00000f90
- [17:51:25.566] path C:\Windows\SysWOW64\bcrypt.dll
- base 0x719e0000
- size 106896
- [17:51:25.566] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.566] Thread ID = 0x00000f90
- [17:51:25.566] path C:\Windows\SysWOW64\DEVOBJ.dll
- base 0x73fe0000
- size 127592
- [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.567] Thread ID = 0x00000f90
- [17:51:25.567] path C:\Windows\AppPatch\AcLayers.dll
- base 0x6a4f0000
- size 335360
- [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.567] Thread ID = 0x00000f90
- [17:51:25.567] path C:\Windows\SysWOW64\SETUPAPI.dll
- base 0x76930000
- size 1733880
- [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.567] Thread ID = 0x00000f90
- [17:51:25.567] path C:\Windows\SysWOW64\sfc.dll
- base 0x66680000
- size 3072
- [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.567] Thread ID = 0x00000f90
- [17:51:25.567] path C:\Windows\SysWOW64\sfc_os.DLL
- base 0x6aa10000
- size 40960
- [17:51:25.568] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.568] Thread ID = 0x00000f90
- [17:51:25.568] path
- base 0x00e20000
- size 6275072
- [17:51:25.568] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.568] Thread ID = 0x00000f90
- [17:51:25.568] base 0x00e20000
- [17:51:25.568] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.568] Thread ID = 0x00000f90
- [17:51:25.568] path
- base 0x00e20000
- size 6275072
- [17:51:25.568] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.568] Thread ID = 0x00000f90
- [17:51:25.568] base 0x00e20000
- [17:51:25.572] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.572] Thread ID = 0x00000f90
- [17:51:25.572] path C:\Windows\SysWOW64\IMM32.DLL
- base 0x76ef0000
- size 168400
- [17:51:25.572] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.572] Thread ID = 0x00000f90
- [17:51:25.572] path C:\Windows\SysWOW64\MSCTF.dll
- base 0x74830000
- size 1180704
- [17:51:25.574] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.574] Thread ID = 0x00000f90
- [17:51:25.574] path C:\Windows\SysWOW64\d3d8.dll
- base 0x6a160000
- size 1074176
- [17:51:25.574] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.574] Thread ID = 0x00000f90
- [17:51:25.574] path C:\Windows\SysWOW64\dinput8.dll
- base 0x6a120000
- size 172032
- [17:51:25.574] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.574] Thread ID = 0x00000f90
- [17:51:25.574] path C:\Windows\SysWOW64\dsound.dll
- base 0x6a090000
- size 527360
- [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.575] Thread ID = 0x00000f90
- [17:51:25.575] path C:\Grand Prix 4\binkw32.dll
- base 0x30000000
- size 357939
- [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.575] Thread ID = 0x00000f90
- [17:51:25.575] path C:\Windows\SysWOW64\wsock32.dll
- base 0x6a310000
- size 16384
- [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.575] Thread ID = 0x00000f90
- [17:51:25.575] path C:\Windows\SysWOW64\WS2_32.dll
- base 0x76830000
- size 372912
- [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.575] Thread ID = 0x00000f90
- [17:51:25.575] path C:\Windows\SysWOW64\NSI.dll
- base 0x76d40000
- size 20160
- [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.575] Thread ID = 0x00000f90
- [17:51:25.575] path C:\Windows\SysWOW64\d3d8thk.dll
- base 0x6a080000
- size 12800
- [17:51:25.576] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:25.576] Thread ID = 0x00000f90
- [17:51:25.576] First chance exception
- [17:51:25.576] Exception address: 0x77183d65
- [17:51:25.576] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:25.576] Exception flags: 0x00000000
- [17:51:25.576] Exception code: EXCEPTION_BREAKPOINT
- [17:51:25.576] Setting breakpoint on entry point (0x005ddec6)
- [17:51:25.576] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:25.576] Thread ID = 0x00000f90
- [17:51:25.577] First chance exception
- [17:51:25.577] Exception address: 0x005ddec6
- [17:51:25.577] Exception flags: 0x00000000
- [17:51:25.577] Exception code: EXCEPTION_BREAKPOINT
- [17:51:25.577] Removing breakpoint on entry point
- [17:51:25.577] Injecting DLL loading code...
- [17:51:25.577] Copying code to target at address 0x00280000...
- [17:51:25.577] Injection succesful
- [17:51:25.577] Setting instruction pointer to injected code (0x00280000)
- [17:51:25.577] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.577] Thread ID = 0x00000f90
- [17:51:25.577] path C:\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
- base 0x09a00000
- size 27648
- [17:51:25.577] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.577] Thread ID = 0x00000f90
- [17:51:25.577] path C:\Grand Prix 4\GPxPSup.dll
- base 0x09900000
- size 40960
- [17:51:25.578] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.578] Thread ID = 0x00000f90
- [17:51:25.578] path C:\Windows\SysWOW64\imagehlp.dll
- base 0x76690000
- size 90400
- [17:51:25.578] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.578] Thread ID = 0x00000f90
- [17:51:25.578] base 0x76690000
- [17:51:25.578] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:25.578] Thread ID = 0x00000f90
- [17:51:25.578] First chance exception
- [17:51:25.578] Exception address: 0x74f41d3a
- [17:51:25.578] Module name: 'C:\Windows\SysWOW64\KERNEL32.DLL' (base 0x74f30000, size 624312)
- [17:51:25.578] Exception flags: 0x00000000
- [17:51:25.578] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:25.578] Process tried to read from virtual address 0x00c42151
- [17:51:25.578] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:25.578] Thread ID = 0x00000f90
- [17:51:25.578] First chance exception
- [17:51:25.578] Exception address: 0x74f41d3a
- [17:51:25.578] Module name: 'C:\Windows\SysWOW64\KERNEL32.DLL' (base 0x74f30000, size 624312)
- [17:51:25.578] Exception flags: 0x00000000
- [17:51:25.578] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:25.578] Process tried to read from virtual address 0x00c44c05
- [17:51:25.579] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.579] Thread ID = 0x00000f90
- [17:51:25.579] path C:\Windows\SysWOW64\imagehlp.dll
- base 0x76690000
- size 90400
- [17:51:25.579] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.579] Thread ID = 0x00000f90
- [17:51:25.579] base 0x76690000
- [17:51:25.580] >> D3D Constructor!
- [17:51:25.580] >> Starting WinMain
- [17:51:25.580] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.580] Thread ID = 0x00000f84
- [17:51:25.580] Thread handle = 0x000003a4
- Start address = 0x771145b0
- Thread local base = 0x7ffda000
- [17:51:25.580] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.580] Thread ID = 0x00000f8c
- [17:51:25.580] Thread handle = 0x000003a8
- Start address = 0x771145b0
- Thread local base = 0x7ffd7000
- [17:51:25.588] >> WM_ACTIVATE (active)(not minimized)
- [17:51:25.592] >> Game thread into win95_startup(0)
- [17:51:25.592] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.592] Thread ID = 0x00000f94
- [17:51:25.592] Thread handle = 0x000003ac
- Start address = 0x74073400
- Thread local base = 0x7feaf000
- [17:51:25.593] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.593] Thread ID = 0x00000f90
- [17:51:25.593] path C:\Windows\SysWOW64\clbcatq.dll
- base 0x767a0000
- size 519072
- [17:51:25.593] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.593] Thread ID = 0x00000f90
- [17:51:25.593] path C:\Windows\SysWOW64\dplayx.dll
- base 0x6a040000
- size 220160
- [17:51:25.595] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.595] Thread ID = 0x00000f90
- [17:51:25.595] path C:\Windows\SysWOW64\dpmodemx.dll
- base 0x6a030000
- size 25088
- [17:51:25.595] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.595] Thread ID = 0x00000f90
- [17:51:25.595] path C:\Windows\SysWOW64\TAPI32.dll
- base 0x69ff0000
- size 196608
- [17:51:25.595] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.595] Thread ID = 0x00000f90
- [17:51:25.595] path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10240.16384_none_3bccb1ff6bcd1849\comctl32.dll
- base 0x71ab0000
- size 2117472
- [17:51:25.596] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.596] Thread ID = 0x000003b8
- [17:51:25.596] Thread handle = 0x000003c4
- Start address = 0x6a06a880
- Thread local base = 0x7feac000
- [17:51:25.596] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.596] Thread ID = 0x00000f90
- [17:51:25.596] base 0x69ff0000
- [17:51:25.596] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.596] Thread ID = 0x00000f90
- [17:51:25.596] base 0x6a030000
- [17:51:25.596] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.596] Thread ID = 0x00000f90
- [17:51:25.596] path C:\Windows\SysWOW64\dpmodemx.dll
- base 0x6a030000
- size 25088
- [17:51:25.596] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.597] Thread ID = 0x00000f90
- [17:51:25.597] path C:\Windows\SysWOW64\TAPI32.dll
- base 0x69ff0000
- size 196608
- [17:51:25.597] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.597] Thread ID = 0x00000f90
- [17:51:25.597] path C:\Windows\SysWOW64\rtutils.dll
- base 0x69fd0000
- size 52224
- [17:51:25.603] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.603] Thread ID = 0x00000ad8
- [17:51:25.603] Thread handle = 0x000003d0
- Start address = 0x69ff74d0
- Thread local base = 0x7fea9000
- [17:51:25.604] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.604] Thread ID = 0x00000f90
- [17:51:25.604] base 0x6a030000
- [17:51:25.604] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.604] Thread ID = 0x00000ad8
- [17:51:25.604] base 0x69fd0000
- [17:51:25.604] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.604] Thread ID = 0x00000ad8
- [17:51:25.604] base 0x69ff0000
- [17:51:25.604] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:25.604] Thread ID = 0x00000ad8
- [17:51:25.604] Thread exit code = 0
- [17:51:25.604] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.604] Thread ID = 0x00000f90
- [17:51:25.604] path C:\Windows\SysWOW64\dpwsockx.dll
- base 0x6a030000
- size 47104
- [17:51:25.605] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.605] Thread ID = 0x00000f90
- [17:51:25.605] path C:\Windows\SysWOW64\mswsock.dll
- base 0x70e80000
- size 306528
- [17:51:25.606] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.606] Thread ID = 0x00000f90
- [17:51:25.606] path C:\Windows\SysWOW64\dpnathlp.dll
- base 0x6a010000
- size 61952
- [17:51:25.606] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.606] Thread ID = 0x00000f90
- [17:51:25.606] path C:\Windows\SysWOW64\CRYPTSP.dll
- base 0x6e080000
- size 67696
- [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.607] Thread ID = 0x00000f90
- [17:51:25.607] path C:\Windows\SysWOW64\rsaenh.dll
- base 0x6e020000
- size 183904
- [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.607] Thread ID = 0x00000f90
- [17:51:25.607] path C:\Windows\SysWOW64\iphlpapi.dll
- base 0x716b0000
- size 187008
- [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.607] Thread ID = 0x00000f90
- [17:51:25.607] path C:\Windows\SysWOW64\WINNSI.DLL
- base 0x716a0000
- size 26848
- [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.607] Thread ID = 0x00000f90
- [17:51:25.607] path C:\Windows\SysWOW64\rasapi32.dll
- base 0x69f60000
- size 649216
- [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.607] Thread ID = 0x00000f90
- [17:51:25.607] path C:\Windows\SysWOW64\rasman.dll
- base 0x69f30000
- size 123392
- [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.607] Thread ID = 0x00000f90
- [17:51:25.607] path C:\Windows\SysWOW64\dhcpcsvc.DLL
- base 0x71370000
- size 64000
- [17:51:25.607] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.607] Thread ID = 0x000004a4
- [17:51:25.607] Thread handle = 0x000003f8
- Start address = 0x70e97c10
- Thread local base = 0x7fea9000
- [17:51:25.707] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x00000654
- [17:51:25.707] Thread handle = 0x0000021c
- Start address = 0x6a034b70
- Thread local base = 0x7fea6000
- [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x00000f90
- [17:51:25.707] base 0x69f30000
- [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x00000f90
- [17:51:25.707] base 0x69f60000
- [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x00000f90
- [17:51:25.707] base 0x6a010000
- [17:51:25.707] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x00000654
- [17:51:25.707] Thread exit code = 0
- [17:51:25.707] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x000004a4
- [17:51:25.707] Thread exit code = 0
- [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x00000f90
- [17:51:25.707] base 0x6a030000
- [17:51:25.707] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:25.707] Thread ID = 0x000003b8
- [17:51:25.707] Thread exit code = 0
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\napinsp.dll
- base 0x6a020000
- size 54784
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\pnrpnsp.dll
- base 0x6a000000
- size 70144
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\NLAapi.dll
- base 0x716e0000
- size 64000
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\DNSAPI.dll
- base 0x6e2d0000
- size 534064
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\winrnr.dll
- base 0x69ff0000
- size 23552
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\wshbth.dll
- base 0x69fd0000
- size 51200
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\fwpuclnt.dll
- base 0x6d3d0000
- size 268800
- [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.726] Thread ID = 0x00000f90
- [17:51:25.726] path C:\Windows\SysWOW64\rasadhlp.dll
- base 0x6e200000
- size 13312
- [17:51:25.739] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.739] Thread ID = 0x00000f90
- [17:51:25.739] base 0x6a020000
- [17:51:25.739] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.739] Thread ID = 0x00000f90
- [17:51:25.739] base 0x6a000000
- [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.740] Thread ID = 0x00000f90
- [17:51:25.740] base 0x716e0000
- [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.740] Thread ID = 0x00000f90
- [17:51:25.740] base 0x69ff0000
- [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.740] Thread ID = 0x00000f90
- [17:51:25.740] base 0x69fd0000
- [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.740] Thread ID = 0x00000f90
- [17:51:25.740] base 0x6d3d0000
- [17:51:25.740] >> MMX Enabled
- [17:51:25.741] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.741] Thread ID = 0x00000f90
- [17:51:25.741] path C:\Windows\SysWOW64\ntmarta.dll
- base 0x71990000
- size 151360
- [17:51:25.742] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.742] Thread ID = 0x00000f90
- [17:51:25.742] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x692d0000
- size 14103608
- [17:51:25.743] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.743] Thread ID = 0x0000119c
- [17:51:25.743] Thread handle = 0x0000040c
- Start address = 0x692d9d10
- Thread local base = 0x7feac000
- [17:51:25.757] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:25.757] Thread ID = 0x0000119c
- [17:51:25.757] Thread exit code = 0
- [17:51:25.821] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.821] Thread ID = 0x00000f90
- [17:51:25.821] base 0x692d0000
- [17:51:25.821] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.821] Thread ID = 0x00000f90
- [17:51:25.821] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x692d0000
- size 14103608
- [17:51:25.821] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.821] Thread ID = 0x00000688
- [17:51:25.821] Thread handle = 0x00000410
- Start address = 0x692d9d10
- Thread local base = 0x7feac000
- [17:51:25.821] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:25.821] Thread ID = 0x00000688
- [17:51:25.821] Thread exit code = 0
- [17:51:25.868] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.868] Thread ID = 0x00000f90
- [17:51:25.868] base 0x692d0000
- [17:51:25.868] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.868] Thread ID = 0x00000f90
- [17:51:25.868] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x692d0000
- size 14103608
- [17:51:25.868] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:25.868] Thread ID = 0x00000774
- [17:51:25.868] Thread handle = 0x00000418
- Start address = 0x692d9d10
- Thread local base = 0x7feac000
- [17:51:25.868] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:25.868] Thread ID = 0x00000774
- [17:51:25.868] Thread exit code = 0
- [17:51:25.899] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:25.899] Thread ID = 0x00000f90
- [17:51:25.899] base 0x692d0000
- [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.899] Thread ID = 0x00000f90
- [17:51:25.899] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6a030000
- size 11776
- [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.899] Thread ID = 0x00000f90
- [17:51:25.899] path C:\Windows\SysWOW64\WINTRUST.dll
- base 0x75230000
- size 265480
- [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.899] Thread ID = 0x00000f90
- [17:51:25.899] path C:\Windows\SysWOW64\MSASN1.dll
- base 0x76f20000
- size 49592
- [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.899] Thread ID = 0x00000f90
- [17:51:25.899] path C:\Windows\SysWOW64\CRYPT32.dll
- base 0x76b70000
- size 1521608
- [17:51:25.915] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:25.915] Thread ID = 0x00000f90
- [17:51:25.915] path C:\Windows\SysWOW64\gpapi.dll
- base 0x71350000
- size 112632
- [17:51:26.008] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:26.008] Thread ID = 0x00000414
- [17:51:26.008] Thread handle = 0x00000430
- Start address = 0x771145b0
- Thread local base = 0x7fea9000
- [17:51:26.008] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:26.008] Thread ID = 0x000004ac
- [17:51:26.008] Thread handle = 0x00000434
- Start address = 0x76bbedf0
- Thread local base = 0x7feac000
- [17:51:27.321] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:27.321] Thread ID = 0x00000f90
- [17:51:27.321] path C:\Windows\SysWOW64\cryptnet.dll
- base 0x6b690000
- size 137216
- [17:51:27.321] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:27.321] Thread ID = 0x00000f90
- [17:51:27.321] path C:\Windows\SysWOW64\WLDAP32.dll
- base 0x76f30000
- size 320000
- [17:51:27.321] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:27.321] Thread ID = 0x000011d4
- [17:51:27.321] Thread handle = 0x00000440
- Start address = 0x771145b0
- Thread local base = 0x7fea6000
- [17:51:27.321] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:27.321] Thread ID = 0x00000430
- [17:51:27.321] Thread handle = 0x00000444
- Start address = 0x771145b0
- Thread local base = 0x7fea3000
- [17:51:27.790] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:27.790] Thread ID = 0x00000f90
- [17:51:27.790] base 0x6a030000
- [17:51:27.790] >> nvd3dum.dll
- [17:51:27.790] >>
- [17:51:27.790] >> NVIDIA GeForce GTX 970
- [17:51:27.790] >>
- [17:51:27.790] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:27.790] Thread ID = 0x00000f90
- [17:51:27.790] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6a030000
- size 11776
- [17:51:29.040] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:29.040] Thread ID = 0x00000f90
- [17:51:29.040] base 0x6a030000
- [17:51:29.040] >> Device mode 640 x 480 (format 22) confirmed
- [17:51:29.040] >> Device mode 720 x 480 (format 22) confirmed
- [17:51:29.040] >> Device mode 720 x 576 (format 22) confirmed
- [17:51:29.040] >> Device mode 800 x 600 (format 22) confirmed
- [17:51:29.040] >> Device mode 1024 x 768 (format 22) confirmed
- [17:51:29.040] >> Device mode 1152 x 864 (format 22) confirmed
- [17:51:29.040] >> Device mode 1280 x 720 (format 22) confirmed
- [17:51:29.040] >> Device mode 1280 x 768 (format 22) confirmed
- [17:51:29.040] >> Device mode 1280 x 800 (format 22) confirmed
- [17:51:29.040] >> Device mode 1280 x 960 (format 22) confirmed
- [17:51:29.040] >> Device mode 1280 x 1024 (format 22) confirmed
- [17:51:29.040] >> Device mode 1360 x 768 (format 22) confirmed
- [17:51:29.040] >> Device mode 1366 x 768 (format 22) confirmed
- [17:51:29.040] >> Device mode 1440 x 480 (format 22) confirmed
- [17:51:29.040] >> Device mode 1440 x 900 (format 22) confirmed
- [17:51:29.040] >> Device mode 1600 x 900 (format 22) confirmed
- [17:51:29.040] >> Device mode 1600 x 1024 (format 22) confirmed
- [17:51:29.040] >> Device mode 1680 x 1050 (format 22) confirmed
- [17:51:29.040] >> Device mode 1920 x 1080 (format 22) confirmed
- [17:51:29.040] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:29.040] Thread ID = 0x00000f90
- [17:51:29.040] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x692d0000
- size 14103608
- [17:51:29.040] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:29.040] Thread ID = 0x00001384
- [17:51:29.040] Thread handle = 0x00000450
- Start address = 0x692d9d10
- Thread local base = 0x7fea0000
- [17:51:29.040] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:29.040] Thread ID = 0x00001384
- [17:51:29.040] Thread exit code = 0
- [17:51:29.071] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:29.071] Thread ID = 0x00000f90
- [17:51:29.071] base 0x692d0000
- [17:51:29.071] >> Device mode 640 x 480 (format 22) confirmed
- [17:51:29.071] >> Device mode 720 x 480 (format 22) confirmed
- [17:51:29.071] >> Device mode 720 x 576 (format 22) confirmed
- [17:51:29.071] >> Device mode 800 x 600 (format 22) confirmed
- [17:51:29.071] >> Device mode 1024 x 768 (format 22) confirmed
- [17:51:29.071] >> Device mode 1152 x 864 (format 22) confirmed
- [17:51:29.071] >> Device mode 1280 x 720 (format 22) confirmed
- [17:51:29.071] >> Device mode 1280 x 768 (format 22) confirmed
- [17:51:29.071] >> Device mode 1280 x 800 (format 22) confirmed
- [17:51:29.071] >> Device mode 1280 x 960 (format 22) confirmed
- [17:51:29.071] >> Device mode 1280 x 1024 (format 22) confirmed
- [17:51:29.071] >> Device mode 1360 x 768 (format 22) confirmed
- [17:51:29.071] >> Device mode 1366 x 768 (format 22) confirmed
- [17:51:29.071] >> Device mode 1440 x 480 (format 22) confirmed
- [17:51:29.071] >> Device mode 1440 x 900 (format 22) confirmed
- [17:51:29.071] >> Device mode 1600 x 900 (format 22) confirmed
- [17:51:29.071] >> Device mode 1600 x 1024 (format 22) confirmed
- [17:51:29.071] >> Device mode 1680 x 1050 (format 22) confirmed
- [17:51:29.071] >> Device mode 1920 x 1080 (format 22) confirmed
- [17:51:29.071] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:29.071] Thread ID = 0x00000f90
- [17:51:29.071] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6a030000
- size 11776
- [17:51:30.363] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:30.363] Thread ID = 0x00000f90
- [17:51:30.363] base 0x6a030000
- [17:51:30.364] >> Device mode 640 x 480 (format 22) confirmed
- [17:51:30.364] >> Device mode 720 x 480 (format 22) confirmed
- [17:51:30.364] >> Device mode 720 x 576 (format 22) confirmed
- [17:51:30.364] >> Device mode 800 x 600 (format 22) confirmed
- [17:51:30.365] >> Device mode 1024 x 768 (format 22) confirmed
- [17:51:30.365] >> Device mode 1152 x 864 (format 22) confirmed
- [17:51:30.365] >> Device mode 1176 x 664 (format 22) confirmed
- [17:51:30.365] >> Device mode 1280 x 720 (format 22) confirmed
- [17:51:30.365] >> Device mode 1280 x 768 (format 22) confirmed
- [17:51:30.365] >> Device mode 1280 x 800 (format 22) confirmed
- [17:51:30.365] >> Device mode 1280 x 960 (format 22) confirmed
- [17:51:30.365] >> Device mode 1280 x 1024 (format 22) confirmed
- [17:51:30.365] >> Device mode 1360 x 768 (format 22) confirmed
- [17:51:30.365] >> Device mode 1366 x 768 (format 22) confirmed
- [17:51:30.365] >> Device mode 1440 x 480 (format 22) confirmed
- [17:51:30.365] >> Device mode 1440 x 900 (format 22) confirmed
- [17:51:30.365] >> Device mode 1600 x 900 (format 22) confirmed
- [17:51:30.365] >> Device mode 1600 x 1024 (format 22) confirmed
- [17:51:30.365] >> Device mode 1680 x 1050 (format 22) confirmed
- [17:51:30.365] >> Device mode 1768 x 992 (format 22) confirmed
- [17:51:30.365] >> Device mode 1920 x 1080 (format 22) confirmed
- [17:51:30.365] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:30.365] Thread ID = 0x00000f90
- [17:51:30.365] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x692d0000
- size 14103608
- [17:51:30.370] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:30.370] Thread ID = 0x00000a74
- [17:51:30.370] Thread handle = 0x00000458
- Start address = 0x692d9d10
- Thread local base = 0x7fea0000
- [17:51:30.373] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:30.373] Thread ID = 0x00000a74
- [17:51:30.373] Thread exit code = 0
- [17:51:30.386] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:30.386] Thread ID = 0x00000f90
- [17:51:30.386] base 0x692d0000
- [17:51:30.386] >> Device mode 640 x 480 (format 22) confirmed
- [17:51:30.386] >> Device mode 720 x 480 (format 22) confirmed
- [17:51:30.386] >> Device mode 720 x 576 (format 22) confirmed
- [17:51:30.386] >> Device mode 800 x 600 (format 22) confirmed
- [17:51:30.386] >> Device mode 1024 x 768 (format 22) confirmed
- [17:51:30.386] >> Device mode 1152 x 864 (format 22) confirmed
- [17:51:30.386] >> Device mode 1176 x 664 (format 22) confirmed
- [17:51:30.386] >> Device mode 1280 x 720 (format 22) confirmed
- [17:51:30.386] >> Device mode 1280 x 768 (format 22) confirmed
- [17:51:30.386] >> Device mode 1280 x 800 (format 22) confirmed
- [17:51:30.386] >> Device mode 1280 x 960 (format 22) confirmed
- [17:51:30.386] >> Device mode 1280 x 1024 (format 22) confirmed
- [17:51:30.386] >> Device mode 1360 x 768 (format 22) confirmed
- [17:51:30.386] >> Device mode 1366 x 768 (format 22) confirmed
- [17:51:30.386] >> Device mode 1440 x 480 (format 22) confirmed
- [17:51:30.386] >> Device mode 1440 x 900 (format 22) confirmed
- [17:51:30.386] >> Device mode 1600 x 900 (format 22) confirmed
- [17:51:30.386] >> Device mode 1600 x 1024 (format 22) confirmed
- [17:51:30.386] >> Device mode 1680 x 1050 (format 22) confirmed
- [17:51:30.386] >> Device mode 1768 x 992 (format 22) confirmed
- [17:51:30.386] >> Device mode 1920 x 1080 (format 22) confirmed
- [17:51:30.386] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:30.386] Thread ID = 0x00000f90
- [17:51:30.386] path C:\Windows\SysWOW64\mscat32.dll
- base 0x6a030000
- size 11776
- [17:51:31.685] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:31.685] Thread ID = 0x00000f90
- [17:51:31.685] base 0x6a030000
- [17:51:31.685] >> Device mode 640 x 480 (format 22) confirmed
- [17:51:31.685] >> Device mode 720 x 480 (format 22) confirmed
- [17:51:31.685] >> Device mode 720 x 576 (format 22) confirmed
- [17:51:31.685] >> Device mode 800 x 600 (format 22) confirmed
- [17:51:31.685] >> Device mode 1024 x 768 (format 22) confirmed
- [17:51:31.685] >> Device mode 1152 x 864 (format 22) confirmed
- [17:51:31.685] >> Device mode 1280 x 720 (format 22) confirmed
- [17:51:31.685] >> Device mode 1280 x 768 (format 22) confirmed
- [17:51:31.685] >> Device mode 1280 x 800 (format 22) confirmed
- [17:51:31.685] >> Device mode 1280 x 960 (format 22) confirmed
- [17:51:31.685] >> Device mode 1280 x 1024 (format 22) confirmed
- [17:51:31.685] >> Device mode 1360 x 768 (format 22) confirmed
- [17:51:31.685] >> Device mode 1366 x 768 (format 22) confirmed
- [17:51:31.685] >> Device mode 1440 x 480 (format 22) confirmed
- [17:51:31.685] >> Device mode 1440 x 900 (format 22) confirmed
- [17:51:31.685] >> Device mode 1600 x 900 (format 22) confirmed
- [17:51:31.685] >> Device mode 1600 x 1024 (format 22) confirmed
- [17:51:31.685] >> Device mode 1680 x 1050 (format 22) confirmed
- [17:51:31.685] >> Device mode 1920 x 1080 (format 22) confirmed
- [17:51:31.685] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:31.685] Thread ID = 0x00000f90
- [17:51:31.685] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x692d0000
- size 14103608
- [17:51:31.685] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:31.685] Thread ID = 0x00000e8c
- [17:51:31.685] Thread handle = 0x00000464
- Start address = 0x692d9d10
- Thread local base = 0x7fea0000
- [17:51:31.700] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:31.700] Thread ID = 0x00000e8c
- [17:51:31.700] Thread exit code = 0
- [17:51:31.712] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [17:51:31.712] Thread ID = 0x00000f90
- [17:51:31.712] base 0x692d0000
- [17:51:31.712] >> Device mode 640 x 480 (format 22) confirmed
- [17:51:31.712] >> Device mode 720 x 480 (format 22) confirmed
- [17:51:31.712] >> Device mode 720 x 576 (format 22) confirmed
- [17:51:31.712] >> Device mode 800 x 600 (format 22) confirmed
- [17:51:31.712] >> Device mode 1024 x 768 (format 22) confirmed
- [17:51:31.712] >> Device mode 1152 x 864 (format 22) confirmed
- [17:51:31.712] >> Device mode 1280 x 720 (format 22) confirmed
- [17:51:31.712] >> Device mode 1280 x 768 (format 22) confirmed
- [17:51:31.712] >> Device mode 1280 x 800 (format 22) confirmed
- [17:51:31.712] >> Device mode 1280 x 960 (format 22) confirmed
- [17:51:31.712] >> Device mode 1280 x 1024 (format 22) confirmed
- [17:51:31.712] >> Device mode 1360 x 768 (format 22) confirmed
- [17:51:31.712] >> Device mode 1366 x 768 (format 22) confirmed
- [17:51:31.712] >> Device mode 1440 x 480 (format 22) confirmed
- [17:51:31.712] >> Device mode 1440 x 900 (format 22) confirmed
- [17:51:31.712] >> Device mode 1600 x 900 (format 22) confirmed
- [17:51:31.712] >> Device mode 1600 x 1024 (format 22) confirmed
- [17:51:31.712] >> Device mode 1680 x 1050 (format 22) confirmed
- [17:51:31.712] >> Device mode 1920 x 1080 (format 22) confirmed
- [17:51:31.728] >>
- Win95_Startup : 1920 x 1080
- [17:51:31.728] >>
- win95_initialiseD3D : 1920 x 1080
- [17:51:31.728] >> Initialize3DEnvironment(1920 x 1080 TNL:1)
- [17:51:31.728] >> Initialize3DEnvironment() - Requested width x height x format found in mode list
- [17:51:31.728] >> Puredevice set
- [17:51:31.728] Debug event: LOAD_DLL_DEBUG_EVENT
- [17:51:31.728] Thread ID = 0x00000f90
- [17:51:31.728] path C:\Windows\SysWOW64\nvd3dum.dll
- base 0x692d0000
- size 14103608
- [17:51:31.728] Debug event: CREATE_THREAD_DEBUG_EVENT
- [17:51:31.728] Thread ID = 0x00000fb4
- [17:51:31.728] Thread handle = 0x0000046c
- Start address = 0x692d9d10
- Thread local base = 0x7fea0000
- [17:51:31.728] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:31.728] Thread ID = 0x00000fb4
- [17:51:31.728] Thread exit code = 0
- [17:51:31.744] >> D3DDevice created =
- [17:51:31.744] >> HAL (hw vp): NVIDIA GeForce GTX 970
- [17:51:31.744] >>
- [17:51:31.744] >>
- GP_win95 :: Running gfx at 32/24 bit
- [17:51:31.744] >> win95_startup() - Initialize3DEnvironment ok
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x0054cf4f
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to write to virtual address 0x00b4a000
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.744] Thread ID = 0x00000f90
- [17:51:31.744] First chance exception
- [17:51:31.744] Exception address: 0x7711daa1
- [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.744] Exception flags: 0x00000000
- [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.744] Process tried to read from virtual address 0x5807008b
- [17:51:31.759] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.759] Thread ID = 0x00000f90
- [17:51:31.759] First chance exception
- [17:51:31.759] Exception address: 0x7711daa1
- [17:51:31.759] Module name: '' (base 0x770e0000, size 1533496)
- [17:51:31.759] Exception flags: 0x00000000
- [17:51:31.759] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.759] Process tried to read from virtual address 0x5807008b
- [17:51:31.759] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.759] Thread ID = 0x00000f94
- [17:51:31.759] First chance exception
- [17:51:31.759] Exception address: 0x00509fbd
- [17:51:31.759] Exception flags: 0x00000000
- [17:51:31.759] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.759] Process tried to read from virtual address 0x58070083
- [17:51:31.759] Debug event: EXCEPTION_DEBUG_EVENT
- [17:51:31.759] Thread ID = 0x00000f94
- [17:51:31.759] Unhandled exception
- [17:51:31.759] Exception address: 0x00509fbd
- [17:51:31.759] Exception flags: 0x00000000
- [17:51:31.759] Exception code: EXCEPTION_ACCESS_VIOLATION
- [17:51:31.759] Process tried to read from virtual address 0x58070083
- [17:51:31.759] Stack trace:
- 00509FBD: Grand Prix 4\GPxPatch.exe! <no symbol>
- 74F43744: Windows\SYSTEM32\KERNEL32.DLL! BaseThreadInitThunk + 36 bytes
- 7713A064: Windows\SYSTEM32\ntdll.dll! RtlSetCurrentTransaction + 212 bytes
- 7713A02F: Windows\SYSTEM32\ntdll.dll! RtlSetCurrentTransaction + 159 bytes
- [17:51:31.759] Registers:
- EAX=58070083 ECX=58070083 ESI=74087640
- EBX=0050A190 EDX=00000000 EDI=00000010
- CS:EIP=0023:00509FBD
- SS:ESP=002B:02D5FE90 EBP=02D5FF80
- DS=002B ES=002B FS=0053 GS=002B
- Flags=00010202
- Stack dump:
- 02d5fe90: 0054e75d 00000010 74087640 02d5ff80 '].T.....@v.t....'
- 02d5fea0: 02d5feb4 0050a190 00000000 0050a190 '......P.......P.'
- 02d5feb0: 00000000 0050a195 74073506 00000010 '......P..5.t....'
- 02d5fec0: 00000000 000a03a0 00000000 00000000 '................'
- 02d5fed0: 74073400 74073400 00000000 00000000 '.4.t.4.t........'
- 02d5fee0: 000a03a0 00000000 fffec315 ffffffff '................'
- 02d5fef0: 00000002 00000000 00000010 00000021 '............!...'
- 02d5ff00: 00000000 00000000 00000000 00000000 '................'
- 02d5ff10: 00000000 00000000 00000000 00000000 '................'
- 02d5ff20: 00000000 00000000 00000000 00000000 '................'
- 02d5ff30: 00000000 00000000 0000025c 00000268 '........\...h...'
- 02d5ff40: 000002a4 00000000 00000000 00000000 '................'
- 02d5ff50: 00000000 00000000 00000000 00000000 '................'
- 02d5ff60: 00000000 00000000 00000000 00000000 '................'
- 02d5ff70: 00000000 00000000 00000000 6ada1587 '...............j'
- 02d5ff80: 02d5ff94 74f43744 00000000 74f43720 '....D7.t.... 7.t'
- 02d5ff90: 6a2ba9ba 02d5ffdc 7713a064 00000000 '..+j....d..w....'
- 02d5ffa0: 69cb6b4a 00000000 00000000 00000000 'Jk.i............'
- 02d5ffb0: c0000005 74a18cd0 00000000 02d5f8a4 '.......t........'
- 02d5ffc0: 69cb6b4a 02d5ffa0 02d5f8a4 02d5ffe4 'Jk.i............'
- 02d5ffd0: 77150d40 1c038856 00000000 02d5ffec '@..wV...........'
- 02d5ffe0: 7713a02f ffffffff 7715d7e6 00000000 '/..w.......w....'
- 02d5fff0: 00000000 74073400 00000000 00000000 '.....4.t........'
- [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:33.001] Thread ID = 0x00000f94
- [17:51:33.001] Thread exit code = -1073741819
- [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:33.001] Thread ID = 0x00000f90
- [17:51:33.001] Thread exit code = -1073741819
- [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:33.001] Thread ID = 0x00000430
- [17:51:33.001] Thread exit code = -1073741819
- [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:33.001] Thread ID = 0x000011d4
- [17:51:33.001] Thread exit code = -1073741819
- [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:33.001] Thread ID = 0x00000414
- [17:51:33.001] Thread exit code = -1073741819
- [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:33.001] Thread ID = 0x000004ac
- [17:51:33.001] Thread exit code = -1073741819
- [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
- [17:51:33.001] Thread ID = 0x00000f8c
- [17:51:33.001] Thread exit code = -1073741819
- [17:51:33.002] Debug event: EXIT_PROCESS_DEBUG_EVENT
- [17:51:33.002] Thread ID = 0x00000f84
- [17:51:33.002] Process exit code = -1073741819
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement