Advertisement
Guest User

Untitled

a guest
Jan 21st, 2016
139
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 50.63 KB | None | 0 0
  1. Starting log
  2. GPxPatch version: 4.43
  3. GPx version detected: decrypted GP4 v1.02
  4. Date/time: 21-01-2016 17:51
  5. [17:51:25.548] Verbosity level is 2
  6. [17:51:25.548] OS version info: Windows 8 build 9200
  7. [17:51:25.548] Total physical memory: 2047 MB (free: 2047 MB)
  8. [17:51:25.549] Debugging gp4.exe
  9. [17:51:25.553] Process created:
  10. Process ID = 0x000010c0
  11. Process handle = 0x00000298
  12. Main thread ID = 0x00000f90
  13. Main thread handle = 0x00000294
  14. Process will run on CPU 1 only
  15. [17:51:25.553] Waiting for debug events...
  16. [17:51:25.553] Debug event: CREATE_PROCESS_DEBUG_EVENT
  17. [17:51:25.553] Thread ID = 0x00000f90
  18. [17:51:25.553] Entry point = 0x005ddec6
  19. [17:51:25.553] Debug event: LOAD_DLL_DEBUG_EVENT
  20. [17:51:25.553] Thread ID = 0x00000f90
  21. [17:51:25.553] path
  22. base 0x770e0000
  23. size 1533496
  24. [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
  25. [17:51:25.555] Thread ID = 0x00000f90
  26. [17:51:25.555] base 0x001c0000
  27. [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
  28. [17:51:25.555] Thread ID = 0x00000f90
  29. [17:51:25.555] base 0x74f30000
  30. [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
  31. [17:51:25.555] Thread ID = 0x00000f90
  32. [17:51:25.555] base 0x001c0000
  33. [17:51:25.555] Debug event: UNLOAD_DLL_DEBUG_EVENT
  34. [17:51:25.555] Thread ID = 0x00000f90
  35. [17:51:25.555] base 0x002a0000
  36. [17:51:25.556] Debug event: LOAD_DLL_DEBUG_EVENT
  37. [17:51:25.556] Thread ID = 0x00000f90
  38. [17:51:25.556] path C:\Windows\SysWOW64\KERNEL32.DLL
  39. base 0x74f30000
  40. size 624312
  41. [17:51:25.556] Debug event: LOAD_DLL_DEBUG_EVENT
  42. [17:51:25.556] Thread ID = 0x00000f90
  43. [17:51:25.556] path C:\Windows\SysWOW64\KERNELBASE.dll
  44. base 0x74950000
  45. size 1531376
  46. [17:51:25.557] Debug event: LOAD_DLL_DEBUG_EVENT
  47. [17:51:25.557] Thread ID = 0x00000f90
  48. [17:51:25.557] path C:\Windows\SysWOW64\apphelp.dll
  49. base 0x740e0000
  50. size 576000
  51. [17:51:25.558] Debug event: LOAD_DLL_DEBUG_EVENT
  52. [17:51:25.558] Thread ID = 0x00000f90
  53. [17:51:25.558] path C:\Windows\AppPatch\AcGenral.DLL
  54. base 0x6a790000
  55. size 2478592
  56. [17:51:25.558] Debug event: LOAD_DLL_DEBUG_EVENT
  57. [17:51:25.558] Thread ID = 0x00000f90
  58. [17:51:25.558] path C:\Windows\SysWOW64\msvcrt.dll
  59. base 0x76d50000
  60. size 773168
  61. [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
  62. [17:51:25.559] Thread ID = 0x00000f90
  63. [17:51:25.559] path C:\Windows\SysWOW64\sechost.dll
  64. base 0x75020000
  65. size 263432
  66. [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
  67. [17:51:25.559] Thread ID = 0x00000f90
  68. [17:51:25.559] path C:\Windows\SysWOW64\RPCRT4.dll
  69. base 0x74da0000
  70. size 704496
  71. [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
  72. [17:51:25.559] Thread ID = 0x00000f90
  73. [17:51:25.559] path C:\Windows\SysWOW64\SspiCli.dll
  74. base 0x741f0000
  75. size 116216
  76. [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
  77. [17:51:25.559] Thread ID = 0x00000f90
  78. [17:51:25.559] path C:\Windows\SysWOW64\CRYPTBASE.dll
  79. base 0x741e0000
  80. size 31528
  81. [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
  82. [17:51:25.559] Thread ID = 0x00000f90
  83. [17:51:25.559] path C:\Windows\SysWOW64\bcryptPrimitives.dll
  84. base 0x74180000
  85. size 365128
  86. [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
  87. [17:51:25.559] Thread ID = 0x00000f90
  88. [17:51:25.559] path C:\Windows\SysWOW64\SHLWAPI.dll
  89. base 0x75280000
  90. size 274768
  91. [17:51:25.559] Debug event: LOAD_DLL_DEBUG_EVENT
  92. [17:51:25.559] Thread ID = 0x00000f90
  93. [17:51:25.559] path C:\Windows\SysWOW64\combase.dll
  94. base 0x75070000
  95. size 1811360
  96. [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
  97. [17:51:25.560] Thread ID = 0x00000f90
  98. [17:51:25.560] path C:\Windows\SysWOW64\GDI32.dll
  99. base 0x74c50000
  100. size 1364048
  101. [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
  102. [17:51:25.560] Thread ID = 0x00000f90
  103. [17:51:25.560] path C:\Windows\SysWOW64\USER32.dll
  104. base 0x76fa0000
  105. size 1310880
  106. [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
  107. [17:51:25.560] Thread ID = 0x00000f90
  108. [17:51:25.560] path C:\Windows\SysWOW64\ole32.dll
  109. base 0x766b0000
  110. size 952968
  111. [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
  112. [17:51:25.560] Thread ID = 0x00000f90
  113. [17:51:25.560] path C:\Windows\SysWOW64\OLEAUT32.dll
  114. base 0x74e50000
  115. size 591912
  116. [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
  117. [17:51:25.560] Thread ID = 0x00000f90
  118. [17:51:25.560] path C:\Windows\SysWOW64\SHELL32.dll
  119. base 0x752d0000
  120. size 20858912
  121. [17:51:25.560] Debug event: LOAD_DLL_DEBUG_EVENT
  122. [17:51:25.560] Thread ID = 0x00000f90
  123. [17:51:25.560] path C:\Windows\SysWOW64\windows.storage.dll
  124. base 0x74340000
  125. size 5121128
  126. [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
  127. [17:51:25.561] Thread ID = 0x00000f90
  128. [17:51:25.561] path C:\Windows\SysWOW64\advapi32.dll
  129. base 0x76e10000
  130. size 497896
  131. [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
  132. [17:51:25.561] Thread ID = 0x00000f90
  133. [17:51:25.561] path C:\Windows\SysWOW64\kernel.appcore.dll
  134. base 0x74820000
  135. size 39792
  136. [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
  137. [17:51:25.561] Thread ID = 0x00000f90
  138. [17:51:25.561] path C:\Windows\SysWOW64\shcore.dll
  139. base 0x76ae0000
  140. size 565656
  141. [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
  142. [17:51:25.561] Thread ID = 0x00000f90
  143. [17:51:25.561] path C:\Windows\SysWOW64\powrprof.dll
  144. base 0x76cf0000
  145. size 269648
  146. [17:51:25.561] Debug event: LOAD_DLL_DEBUG_EVENT
  147. [17:51:25.561] Thread ID = 0x00000f90
  148. [17:51:25.561] path C:\Windows\SysWOW64\profapi.dll
  149. base 0x74c40000
  150. size 53728
  151. [17:51:25.562] Debug event: LOAD_DLL_DEBUG_EVENT
  152. [17:51:25.562] Thread ID = 0x00000f90
  153. [17:51:25.562] path C:\Windows\SysWOW64\UxTheme.dll
  154. base 0x71910000
  155. size 458752
  156. [17:51:25.562] Debug event: LOAD_DLL_DEBUG_EVENT
  157. [17:51:25.562] Thread ID = 0x00000f90
  158. [17:51:25.562] path C:\Windows\SysWOW64\WINMM.dll
  159. base 0x74070000
  160. size 134352
  161. [17:51:25.562] Debug event: LOAD_DLL_DEBUG_EVENT
  162. [17:51:25.562] Thread ID = 0x00000f90
  163. [17:51:25.562] path C:\Windows\SysWOW64\samcli.dll
  164. base 0x719c0000
  165. size 65024
  166. [17:51:25.563] Debug event: LOAD_DLL_DEBUG_EVENT
  167. [17:51:25.563] Thread ID = 0x00000f90
  168. [17:51:25.563] path C:\Windows\SysWOW64\MSACM32.dll
  169. base 0x6a770000
  170. size 90912
  171. [17:51:25.563] Debug event: LOAD_DLL_DEBUG_EVENT
  172. [17:51:25.563] Thread ID = 0x00000f90
  173. [17:51:25.563] path C:\Windows\SysWOW64\VERSION.dll
  174. base 0x740a0000
  175. size 27360
  176. [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
  177. [17:51:25.564] Thread ID = 0x00000f90
  178. [17:51:25.564] path C:\Windows\SysWOW64\USERENV.dll
  179. base 0x74050000
  180. size 93000
  181. [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
  182. [17:51:25.564] Thread ID = 0x00000f90
  183. [17:51:25.564] path C:\Windows\SysWOW64\dwmapi.dll
  184. base 0x71700000
  185. size 93184
  186. [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
  187. [17:51:25.564] Thread ID = 0x00000f90
  188. [17:51:25.564] path C:\Windows\SysWOW64\urlmon.dll
  189. base 0x6b1c0000
  190. size 1380864
  191. [17:51:25.564] Debug event: LOAD_DLL_DEBUG_EVENT
  192. [17:51:25.564] Thread ID = 0x00000f90
  193. [17:51:25.564] path C:\Windows\SysWOW64\WINSPOOL.DRV
  194. base 0x6e210000
  195. size 400384
  196. [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
  197. [17:51:25.565] Thread ID = 0x00000f90
  198. [17:51:25.565] path C:\Windows\SysWOW64\MPR.dll
  199. base 0x6aa30000
  200. size 88320
  201. [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
  202. [17:51:25.565] Thread ID = 0x00000f90
  203. [17:51:25.565] path C:\Windows\SysWOW64\WINMMBASE.dll
  204. base 0x74010000
  205. size 132744
  206. [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
  207. [17:51:25.565] Thread ID = 0x00000f90
  208. [17:51:25.565] path C:\Windows\SysWOW64\cfgmgr32.dll
  209. base 0x74ef0000
  210. size 214360
  211. [17:51:25.565] Debug event: LOAD_DLL_DEBUG_EVENT
  212. [17:51:25.565] Thread ID = 0x00000f90
  213. [17:51:25.565] path C:\Windows\SysWOW64\iertutil.dll
  214. base 0x6aef0000
  215. size 2878000
  216. [17:51:25.566] Debug event: LOAD_DLL_DEBUG_EVENT
  217. [17:51:25.566] Thread ID = 0x00000f90
  218. [17:51:25.566] path C:\Windows\SysWOW64\bcrypt.dll
  219. base 0x719e0000
  220. size 106896
  221. [17:51:25.566] Debug event: LOAD_DLL_DEBUG_EVENT
  222. [17:51:25.566] Thread ID = 0x00000f90
  223. [17:51:25.566] path C:\Windows\SysWOW64\DEVOBJ.dll
  224. base 0x73fe0000
  225. size 127592
  226. [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
  227. [17:51:25.567] Thread ID = 0x00000f90
  228. [17:51:25.567] path C:\Windows\AppPatch\AcLayers.dll
  229. base 0x6a4f0000
  230. size 335360
  231. [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
  232. [17:51:25.567] Thread ID = 0x00000f90
  233. [17:51:25.567] path C:\Windows\SysWOW64\SETUPAPI.dll
  234. base 0x76930000
  235. size 1733880
  236. [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
  237. [17:51:25.567] Thread ID = 0x00000f90
  238. [17:51:25.567] path C:\Windows\SysWOW64\sfc.dll
  239. base 0x66680000
  240. size 3072
  241. [17:51:25.567] Debug event: LOAD_DLL_DEBUG_EVENT
  242. [17:51:25.567] Thread ID = 0x00000f90
  243. [17:51:25.567] path C:\Windows\SysWOW64\sfc_os.DLL
  244. base 0x6aa10000
  245. size 40960
  246. [17:51:25.568] Debug event: LOAD_DLL_DEBUG_EVENT
  247. [17:51:25.568] Thread ID = 0x00000f90
  248. [17:51:25.568] path
  249. base 0x00e20000
  250. size 6275072
  251. [17:51:25.568] Debug event: UNLOAD_DLL_DEBUG_EVENT
  252. [17:51:25.568] Thread ID = 0x00000f90
  253. [17:51:25.568] base 0x00e20000
  254. [17:51:25.568] Debug event: LOAD_DLL_DEBUG_EVENT
  255. [17:51:25.568] Thread ID = 0x00000f90
  256. [17:51:25.568] path
  257. base 0x00e20000
  258. size 6275072
  259. [17:51:25.568] Debug event: UNLOAD_DLL_DEBUG_EVENT
  260. [17:51:25.568] Thread ID = 0x00000f90
  261. [17:51:25.568] base 0x00e20000
  262. [17:51:25.572] Debug event: LOAD_DLL_DEBUG_EVENT
  263. [17:51:25.572] Thread ID = 0x00000f90
  264. [17:51:25.572] path C:\Windows\SysWOW64\IMM32.DLL
  265. base 0x76ef0000
  266. size 168400
  267. [17:51:25.572] Debug event: LOAD_DLL_DEBUG_EVENT
  268. [17:51:25.572] Thread ID = 0x00000f90
  269. [17:51:25.572] path C:\Windows\SysWOW64\MSCTF.dll
  270. base 0x74830000
  271. size 1180704
  272. [17:51:25.574] Debug event: LOAD_DLL_DEBUG_EVENT
  273. [17:51:25.574] Thread ID = 0x00000f90
  274. [17:51:25.574] path C:\Windows\SysWOW64\d3d8.dll
  275. base 0x6a160000
  276. size 1074176
  277. [17:51:25.574] Debug event: LOAD_DLL_DEBUG_EVENT
  278. [17:51:25.574] Thread ID = 0x00000f90
  279. [17:51:25.574] path C:\Windows\SysWOW64\dinput8.dll
  280. base 0x6a120000
  281. size 172032
  282. [17:51:25.574] Debug event: LOAD_DLL_DEBUG_EVENT
  283. [17:51:25.574] Thread ID = 0x00000f90
  284. [17:51:25.574] path C:\Windows\SysWOW64\dsound.dll
  285. base 0x6a090000
  286. size 527360
  287. [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
  288. [17:51:25.575] Thread ID = 0x00000f90
  289. [17:51:25.575] path C:\Grand Prix 4\binkw32.dll
  290. base 0x30000000
  291. size 357939
  292. [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
  293. [17:51:25.575] Thread ID = 0x00000f90
  294. [17:51:25.575] path C:\Windows\SysWOW64\wsock32.dll
  295. base 0x6a310000
  296. size 16384
  297. [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
  298. [17:51:25.575] Thread ID = 0x00000f90
  299. [17:51:25.575] path C:\Windows\SysWOW64\WS2_32.dll
  300. base 0x76830000
  301. size 372912
  302. [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
  303. [17:51:25.575] Thread ID = 0x00000f90
  304. [17:51:25.575] path C:\Windows\SysWOW64\NSI.dll
  305. base 0x76d40000
  306. size 20160
  307. [17:51:25.575] Debug event: LOAD_DLL_DEBUG_EVENT
  308. [17:51:25.575] Thread ID = 0x00000f90
  309. [17:51:25.575] path C:\Windows\SysWOW64\d3d8thk.dll
  310. base 0x6a080000
  311. size 12800
  312. [17:51:25.576] Debug event: EXCEPTION_DEBUG_EVENT
  313. [17:51:25.576] Thread ID = 0x00000f90
  314. [17:51:25.576] First chance exception
  315. [17:51:25.576] Exception address: 0x77183d65
  316. [17:51:25.576] Module name: '' (base 0x770e0000, size 1533496)
  317. [17:51:25.576] Exception flags: 0x00000000
  318. [17:51:25.576] Exception code: EXCEPTION_BREAKPOINT
  319. [17:51:25.576] Setting breakpoint on entry point (0x005ddec6)
  320. [17:51:25.576] Debug event: EXCEPTION_DEBUG_EVENT
  321. [17:51:25.576] Thread ID = 0x00000f90
  322. [17:51:25.577] First chance exception
  323. [17:51:25.577] Exception address: 0x005ddec6
  324. [17:51:25.577] Exception flags: 0x00000000
  325. [17:51:25.577] Exception code: EXCEPTION_BREAKPOINT
  326. [17:51:25.577] Removing breakpoint on entry point
  327. [17:51:25.577] Injecting DLL loading code...
  328. [17:51:25.577] Copying code to target at address 0x00280000...
  329. [17:51:25.577] Injection succesful
  330. [17:51:25.577] Setting instruction pointer to injected code (0x00280000)
  331. [17:51:25.577] Debug event: LOAD_DLL_DEBUG_EVENT
  332. [17:51:25.577] Thread ID = 0x00000f90
  333. [17:51:25.577] path C:\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
  334. base 0x09a00000
  335. size 27648
  336. [17:51:25.577] Debug event: LOAD_DLL_DEBUG_EVENT
  337. [17:51:25.577] Thread ID = 0x00000f90
  338. [17:51:25.577] path C:\Grand Prix 4\GPxPSup.dll
  339. base 0x09900000
  340. size 40960
  341. [17:51:25.578] Debug event: LOAD_DLL_DEBUG_EVENT
  342. [17:51:25.578] Thread ID = 0x00000f90
  343. [17:51:25.578] path C:\Windows\SysWOW64\imagehlp.dll
  344. base 0x76690000
  345. size 90400
  346. [17:51:25.578] Debug event: UNLOAD_DLL_DEBUG_EVENT
  347. [17:51:25.578] Thread ID = 0x00000f90
  348. [17:51:25.578] base 0x76690000
  349. [17:51:25.578] Debug event: EXCEPTION_DEBUG_EVENT
  350. [17:51:25.578] Thread ID = 0x00000f90
  351. [17:51:25.578] First chance exception
  352. [17:51:25.578] Exception address: 0x74f41d3a
  353. [17:51:25.578] Module name: 'C:\Windows\SysWOW64\KERNEL32.DLL' (base 0x74f30000, size 624312)
  354. [17:51:25.578] Exception flags: 0x00000000
  355. [17:51:25.578] Exception code: EXCEPTION_ACCESS_VIOLATION
  356. [17:51:25.578] Process tried to read from virtual address 0x00c42151
  357. [17:51:25.578] Debug event: EXCEPTION_DEBUG_EVENT
  358. [17:51:25.578] Thread ID = 0x00000f90
  359. [17:51:25.578] First chance exception
  360. [17:51:25.578] Exception address: 0x74f41d3a
  361. [17:51:25.578] Module name: 'C:\Windows\SysWOW64\KERNEL32.DLL' (base 0x74f30000, size 624312)
  362. [17:51:25.578] Exception flags: 0x00000000
  363. [17:51:25.578] Exception code: EXCEPTION_ACCESS_VIOLATION
  364. [17:51:25.578] Process tried to read from virtual address 0x00c44c05
  365. [17:51:25.579] Debug event: LOAD_DLL_DEBUG_EVENT
  366. [17:51:25.579] Thread ID = 0x00000f90
  367. [17:51:25.579] path C:\Windows\SysWOW64\imagehlp.dll
  368. base 0x76690000
  369. size 90400
  370. [17:51:25.579] Debug event: UNLOAD_DLL_DEBUG_EVENT
  371. [17:51:25.579] Thread ID = 0x00000f90
  372. [17:51:25.579] base 0x76690000
  373. [17:51:25.580] >> D3D Constructor!
  374. [17:51:25.580] >> Starting WinMain
  375. [17:51:25.580] Debug event: CREATE_THREAD_DEBUG_EVENT
  376. [17:51:25.580] Thread ID = 0x00000f84
  377. [17:51:25.580] Thread handle = 0x000003a4
  378. Start address = 0x771145b0
  379. Thread local base = 0x7ffda000
  380. [17:51:25.580] Debug event: CREATE_THREAD_DEBUG_EVENT
  381. [17:51:25.580] Thread ID = 0x00000f8c
  382. [17:51:25.580] Thread handle = 0x000003a8
  383. Start address = 0x771145b0
  384. Thread local base = 0x7ffd7000
  385. [17:51:25.588] >> WM_ACTIVATE (active)(not minimized)
  386. [17:51:25.592] >> Game thread into win95_startup(0)
  387. [17:51:25.592] Debug event: CREATE_THREAD_DEBUG_EVENT
  388. [17:51:25.592] Thread ID = 0x00000f94
  389. [17:51:25.592] Thread handle = 0x000003ac
  390. Start address = 0x74073400
  391. Thread local base = 0x7feaf000
  392. [17:51:25.593] Debug event: LOAD_DLL_DEBUG_EVENT
  393. [17:51:25.593] Thread ID = 0x00000f90
  394. [17:51:25.593] path C:\Windows\SysWOW64\clbcatq.dll
  395. base 0x767a0000
  396. size 519072
  397. [17:51:25.593] Debug event: LOAD_DLL_DEBUG_EVENT
  398. [17:51:25.593] Thread ID = 0x00000f90
  399. [17:51:25.593] path C:\Windows\SysWOW64\dplayx.dll
  400. base 0x6a040000
  401. size 220160
  402. [17:51:25.595] Debug event: LOAD_DLL_DEBUG_EVENT
  403. [17:51:25.595] Thread ID = 0x00000f90
  404. [17:51:25.595] path C:\Windows\SysWOW64\dpmodemx.dll
  405. base 0x6a030000
  406. size 25088
  407. [17:51:25.595] Debug event: LOAD_DLL_DEBUG_EVENT
  408. [17:51:25.595] Thread ID = 0x00000f90
  409. [17:51:25.595] path C:\Windows\SysWOW64\TAPI32.dll
  410. base 0x69ff0000
  411. size 196608
  412. [17:51:25.595] Debug event: LOAD_DLL_DEBUG_EVENT
  413. [17:51:25.595] Thread ID = 0x00000f90
  414. [17:51:25.595] path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10240.16384_none_3bccb1ff6bcd1849\comctl32.dll
  415. base 0x71ab0000
  416. size 2117472
  417. [17:51:25.596] Debug event: CREATE_THREAD_DEBUG_EVENT
  418. [17:51:25.596] Thread ID = 0x000003b8
  419. [17:51:25.596] Thread handle = 0x000003c4
  420. Start address = 0x6a06a880
  421. Thread local base = 0x7feac000
  422. [17:51:25.596] Debug event: UNLOAD_DLL_DEBUG_EVENT
  423. [17:51:25.596] Thread ID = 0x00000f90
  424. [17:51:25.596] base 0x69ff0000
  425. [17:51:25.596] Debug event: UNLOAD_DLL_DEBUG_EVENT
  426. [17:51:25.596] Thread ID = 0x00000f90
  427. [17:51:25.596] base 0x6a030000
  428. [17:51:25.596] Debug event: LOAD_DLL_DEBUG_EVENT
  429. [17:51:25.596] Thread ID = 0x00000f90
  430. [17:51:25.596] path C:\Windows\SysWOW64\dpmodemx.dll
  431. base 0x6a030000
  432. size 25088
  433. [17:51:25.596] Debug event: LOAD_DLL_DEBUG_EVENT
  434. [17:51:25.597] Thread ID = 0x00000f90
  435. [17:51:25.597] path C:\Windows\SysWOW64\TAPI32.dll
  436. base 0x69ff0000
  437. size 196608
  438. [17:51:25.597] Debug event: LOAD_DLL_DEBUG_EVENT
  439. [17:51:25.597] Thread ID = 0x00000f90
  440. [17:51:25.597] path C:\Windows\SysWOW64\rtutils.dll
  441. base 0x69fd0000
  442. size 52224
  443. [17:51:25.603] Debug event: CREATE_THREAD_DEBUG_EVENT
  444. [17:51:25.603] Thread ID = 0x00000ad8
  445. [17:51:25.603] Thread handle = 0x000003d0
  446. Start address = 0x69ff74d0
  447. Thread local base = 0x7fea9000
  448. [17:51:25.604] Debug event: UNLOAD_DLL_DEBUG_EVENT
  449. [17:51:25.604] Thread ID = 0x00000f90
  450. [17:51:25.604] base 0x6a030000
  451. [17:51:25.604] Debug event: UNLOAD_DLL_DEBUG_EVENT
  452. [17:51:25.604] Thread ID = 0x00000ad8
  453. [17:51:25.604] base 0x69fd0000
  454. [17:51:25.604] Debug event: UNLOAD_DLL_DEBUG_EVENT
  455. [17:51:25.604] Thread ID = 0x00000ad8
  456. [17:51:25.604] base 0x69ff0000
  457. [17:51:25.604] Debug event: EXIT_THREAD_DEBUG_EVENT
  458. [17:51:25.604] Thread ID = 0x00000ad8
  459. [17:51:25.604] Thread exit code = 0
  460. [17:51:25.604] Debug event: LOAD_DLL_DEBUG_EVENT
  461. [17:51:25.604] Thread ID = 0x00000f90
  462. [17:51:25.604] path C:\Windows\SysWOW64\dpwsockx.dll
  463. base 0x6a030000
  464. size 47104
  465. [17:51:25.605] Debug event: LOAD_DLL_DEBUG_EVENT
  466. [17:51:25.605] Thread ID = 0x00000f90
  467. [17:51:25.605] path C:\Windows\SysWOW64\mswsock.dll
  468. base 0x70e80000
  469. size 306528
  470. [17:51:25.606] Debug event: LOAD_DLL_DEBUG_EVENT
  471. [17:51:25.606] Thread ID = 0x00000f90
  472. [17:51:25.606] path C:\Windows\SysWOW64\dpnathlp.dll
  473. base 0x6a010000
  474. size 61952
  475. [17:51:25.606] Debug event: LOAD_DLL_DEBUG_EVENT
  476. [17:51:25.606] Thread ID = 0x00000f90
  477. [17:51:25.606] path C:\Windows\SysWOW64\CRYPTSP.dll
  478. base 0x6e080000
  479. size 67696
  480. [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
  481. [17:51:25.607] Thread ID = 0x00000f90
  482. [17:51:25.607] path C:\Windows\SysWOW64\rsaenh.dll
  483. base 0x6e020000
  484. size 183904
  485. [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
  486. [17:51:25.607] Thread ID = 0x00000f90
  487. [17:51:25.607] path C:\Windows\SysWOW64\iphlpapi.dll
  488. base 0x716b0000
  489. size 187008
  490. [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
  491. [17:51:25.607] Thread ID = 0x00000f90
  492. [17:51:25.607] path C:\Windows\SysWOW64\WINNSI.DLL
  493. base 0x716a0000
  494. size 26848
  495. [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
  496. [17:51:25.607] Thread ID = 0x00000f90
  497. [17:51:25.607] path C:\Windows\SysWOW64\rasapi32.dll
  498. base 0x69f60000
  499. size 649216
  500. [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
  501. [17:51:25.607] Thread ID = 0x00000f90
  502. [17:51:25.607] path C:\Windows\SysWOW64\rasman.dll
  503. base 0x69f30000
  504. size 123392
  505. [17:51:25.607] Debug event: LOAD_DLL_DEBUG_EVENT
  506. [17:51:25.607] Thread ID = 0x00000f90
  507. [17:51:25.607] path C:\Windows\SysWOW64\dhcpcsvc.DLL
  508. base 0x71370000
  509. size 64000
  510. [17:51:25.607] Debug event: CREATE_THREAD_DEBUG_EVENT
  511. [17:51:25.607] Thread ID = 0x000004a4
  512. [17:51:25.607] Thread handle = 0x000003f8
  513. Start address = 0x70e97c10
  514. Thread local base = 0x7fea9000
  515. [17:51:25.707] Debug event: CREATE_THREAD_DEBUG_EVENT
  516. [17:51:25.707] Thread ID = 0x00000654
  517. [17:51:25.707] Thread handle = 0x0000021c
  518. Start address = 0x6a034b70
  519. Thread local base = 0x7fea6000
  520. [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
  521. [17:51:25.707] Thread ID = 0x00000f90
  522. [17:51:25.707] base 0x69f30000
  523. [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
  524. [17:51:25.707] Thread ID = 0x00000f90
  525. [17:51:25.707] base 0x69f60000
  526. [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
  527. [17:51:25.707] Thread ID = 0x00000f90
  528. [17:51:25.707] base 0x6a010000
  529. [17:51:25.707] Debug event: EXIT_THREAD_DEBUG_EVENT
  530. [17:51:25.707] Thread ID = 0x00000654
  531. [17:51:25.707] Thread exit code = 0
  532. [17:51:25.707] Debug event: EXIT_THREAD_DEBUG_EVENT
  533. [17:51:25.707] Thread ID = 0x000004a4
  534. [17:51:25.707] Thread exit code = 0
  535. [17:51:25.707] Debug event: UNLOAD_DLL_DEBUG_EVENT
  536. [17:51:25.707] Thread ID = 0x00000f90
  537. [17:51:25.707] base 0x6a030000
  538. [17:51:25.707] Debug event: EXIT_THREAD_DEBUG_EVENT
  539. [17:51:25.707] Thread ID = 0x000003b8
  540. [17:51:25.707] Thread exit code = 0
  541. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  542. [17:51:25.726] Thread ID = 0x00000f90
  543. [17:51:25.726] path C:\Windows\SysWOW64\napinsp.dll
  544. base 0x6a020000
  545. size 54784
  546. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  547. [17:51:25.726] Thread ID = 0x00000f90
  548. [17:51:25.726] path C:\Windows\SysWOW64\pnrpnsp.dll
  549. base 0x6a000000
  550. size 70144
  551. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  552. [17:51:25.726] Thread ID = 0x00000f90
  553. [17:51:25.726] path C:\Windows\SysWOW64\NLAapi.dll
  554. base 0x716e0000
  555. size 64000
  556. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  557. [17:51:25.726] Thread ID = 0x00000f90
  558. [17:51:25.726] path C:\Windows\SysWOW64\DNSAPI.dll
  559. base 0x6e2d0000
  560. size 534064
  561. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  562. [17:51:25.726] Thread ID = 0x00000f90
  563. [17:51:25.726] path C:\Windows\SysWOW64\winrnr.dll
  564. base 0x69ff0000
  565. size 23552
  566. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  567. [17:51:25.726] Thread ID = 0x00000f90
  568. [17:51:25.726] path C:\Windows\SysWOW64\wshbth.dll
  569. base 0x69fd0000
  570. size 51200
  571. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  572. [17:51:25.726] Thread ID = 0x00000f90
  573. [17:51:25.726] path C:\Windows\SysWOW64\fwpuclnt.dll
  574. base 0x6d3d0000
  575. size 268800
  576. [17:51:25.726] Debug event: LOAD_DLL_DEBUG_EVENT
  577. [17:51:25.726] Thread ID = 0x00000f90
  578. [17:51:25.726] path C:\Windows\SysWOW64\rasadhlp.dll
  579. base 0x6e200000
  580. size 13312
  581. [17:51:25.739] Debug event: UNLOAD_DLL_DEBUG_EVENT
  582. [17:51:25.739] Thread ID = 0x00000f90
  583. [17:51:25.739] base 0x6a020000
  584. [17:51:25.739] Debug event: UNLOAD_DLL_DEBUG_EVENT
  585. [17:51:25.739] Thread ID = 0x00000f90
  586. [17:51:25.739] base 0x6a000000
  587. [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
  588. [17:51:25.740] Thread ID = 0x00000f90
  589. [17:51:25.740] base 0x716e0000
  590. [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
  591. [17:51:25.740] Thread ID = 0x00000f90
  592. [17:51:25.740] base 0x69ff0000
  593. [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
  594. [17:51:25.740] Thread ID = 0x00000f90
  595. [17:51:25.740] base 0x69fd0000
  596. [17:51:25.740] Debug event: UNLOAD_DLL_DEBUG_EVENT
  597. [17:51:25.740] Thread ID = 0x00000f90
  598. [17:51:25.740] base 0x6d3d0000
  599. [17:51:25.740] >> MMX Enabled
  600. [17:51:25.741] Debug event: LOAD_DLL_DEBUG_EVENT
  601. [17:51:25.741] Thread ID = 0x00000f90
  602. [17:51:25.741] path C:\Windows\SysWOW64\ntmarta.dll
  603. base 0x71990000
  604. size 151360
  605. [17:51:25.742] Debug event: LOAD_DLL_DEBUG_EVENT
  606. [17:51:25.742] Thread ID = 0x00000f90
  607. [17:51:25.742] path C:\Windows\SysWOW64\nvd3dum.dll
  608. base 0x692d0000
  609. size 14103608
  610. [17:51:25.743] Debug event: CREATE_THREAD_DEBUG_EVENT
  611. [17:51:25.743] Thread ID = 0x0000119c
  612. [17:51:25.743] Thread handle = 0x0000040c
  613. Start address = 0x692d9d10
  614. Thread local base = 0x7feac000
  615. [17:51:25.757] Debug event: EXIT_THREAD_DEBUG_EVENT
  616. [17:51:25.757] Thread ID = 0x0000119c
  617. [17:51:25.757] Thread exit code = 0
  618. [17:51:25.821] Debug event: UNLOAD_DLL_DEBUG_EVENT
  619. [17:51:25.821] Thread ID = 0x00000f90
  620. [17:51:25.821] base 0x692d0000
  621. [17:51:25.821] Debug event: LOAD_DLL_DEBUG_EVENT
  622. [17:51:25.821] Thread ID = 0x00000f90
  623. [17:51:25.821] path C:\Windows\SysWOW64\nvd3dum.dll
  624. base 0x692d0000
  625. size 14103608
  626. [17:51:25.821] Debug event: CREATE_THREAD_DEBUG_EVENT
  627. [17:51:25.821] Thread ID = 0x00000688
  628. [17:51:25.821] Thread handle = 0x00000410
  629. Start address = 0x692d9d10
  630. Thread local base = 0x7feac000
  631. [17:51:25.821] Debug event: EXIT_THREAD_DEBUG_EVENT
  632. [17:51:25.821] Thread ID = 0x00000688
  633. [17:51:25.821] Thread exit code = 0
  634. [17:51:25.868] Debug event: UNLOAD_DLL_DEBUG_EVENT
  635. [17:51:25.868] Thread ID = 0x00000f90
  636. [17:51:25.868] base 0x692d0000
  637. [17:51:25.868] Debug event: LOAD_DLL_DEBUG_EVENT
  638. [17:51:25.868] Thread ID = 0x00000f90
  639. [17:51:25.868] path C:\Windows\SysWOW64\nvd3dum.dll
  640. base 0x692d0000
  641. size 14103608
  642. [17:51:25.868] Debug event: CREATE_THREAD_DEBUG_EVENT
  643. [17:51:25.868] Thread ID = 0x00000774
  644. [17:51:25.868] Thread handle = 0x00000418
  645. Start address = 0x692d9d10
  646. Thread local base = 0x7feac000
  647. [17:51:25.868] Debug event: EXIT_THREAD_DEBUG_EVENT
  648. [17:51:25.868] Thread ID = 0x00000774
  649. [17:51:25.868] Thread exit code = 0
  650. [17:51:25.899] Debug event: UNLOAD_DLL_DEBUG_EVENT
  651. [17:51:25.899] Thread ID = 0x00000f90
  652. [17:51:25.899] base 0x692d0000
  653. [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
  654. [17:51:25.899] Thread ID = 0x00000f90
  655. [17:51:25.899] path C:\Windows\SysWOW64\mscat32.dll
  656. base 0x6a030000
  657. size 11776
  658. [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
  659. [17:51:25.899] Thread ID = 0x00000f90
  660. [17:51:25.899] path C:\Windows\SysWOW64\WINTRUST.dll
  661. base 0x75230000
  662. size 265480
  663. [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
  664. [17:51:25.899] Thread ID = 0x00000f90
  665. [17:51:25.899] path C:\Windows\SysWOW64\MSASN1.dll
  666. base 0x76f20000
  667. size 49592
  668. [17:51:25.899] Debug event: LOAD_DLL_DEBUG_EVENT
  669. [17:51:25.899] Thread ID = 0x00000f90
  670. [17:51:25.899] path C:\Windows\SysWOW64\CRYPT32.dll
  671. base 0x76b70000
  672. size 1521608
  673. [17:51:25.915] Debug event: LOAD_DLL_DEBUG_EVENT
  674. [17:51:25.915] Thread ID = 0x00000f90
  675. [17:51:25.915] path C:\Windows\SysWOW64\gpapi.dll
  676. base 0x71350000
  677. size 112632
  678. [17:51:26.008] Debug event: CREATE_THREAD_DEBUG_EVENT
  679. [17:51:26.008] Thread ID = 0x00000414
  680. [17:51:26.008] Thread handle = 0x00000430
  681. Start address = 0x771145b0
  682. Thread local base = 0x7fea9000
  683. [17:51:26.008] Debug event: CREATE_THREAD_DEBUG_EVENT
  684. [17:51:26.008] Thread ID = 0x000004ac
  685. [17:51:26.008] Thread handle = 0x00000434
  686. Start address = 0x76bbedf0
  687. Thread local base = 0x7feac000
  688. [17:51:27.321] Debug event: LOAD_DLL_DEBUG_EVENT
  689. [17:51:27.321] Thread ID = 0x00000f90
  690. [17:51:27.321] path C:\Windows\SysWOW64\cryptnet.dll
  691. base 0x6b690000
  692. size 137216
  693. [17:51:27.321] Debug event: LOAD_DLL_DEBUG_EVENT
  694. [17:51:27.321] Thread ID = 0x00000f90
  695. [17:51:27.321] path C:\Windows\SysWOW64\WLDAP32.dll
  696. base 0x76f30000
  697. size 320000
  698. [17:51:27.321] Debug event: CREATE_THREAD_DEBUG_EVENT
  699. [17:51:27.321] Thread ID = 0x000011d4
  700. [17:51:27.321] Thread handle = 0x00000440
  701. Start address = 0x771145b0
  702. Thread local base = 0x7fea6000
  703. [17:51:27.321] Debug event: CREATE_THREAD_DEBUG_EVENT
  704. [17:51:27.321] Thread ID = 0x00000430
  705. [17:51:27.321] Thread handle = 0x00000444
  706. Start address = 0x771145b0
  707. Thread local base = 0x7fea3000
  708. [17:51:27.790] Debug event: UNLOAD_DLL_DEBUG_EVENT
  709. [17:51:27.790] Thread ID = 0x00000f90
  710. [17:51:27.790] base 0x6a030000
  711. [17:51:27.790] >> nvd3dum.dll
  712. [17:51:27.790] >>
  713. [17:51:27.790] >> NVIDIA GeForce GTX 970
  714. [17:51:27.790] >>
  715. [17:51:27.790] Debug event: LOAD_DLL_DEBUG_EVENT
  716. [17:51:27.790] Thread ID = 0x00000f90
  717. [17:51:27.790] path C:\Windows\SysWOW64\mscat32.dll
  718. base 0x6a030000
  719. size 11776
  720. [17:51:29.040] Debug event: UNLOAD_DLL_DEBUG_EVENT
  721. [17:51:29.040] Thread ID = 0x00000f90
  722. [17:51:29.040] base 0x6a030000
  723. [17:51:29.040] >> Device mode 640 x 480 (format 22) confirmed
  724. [17:51:29.040] >> Device mode 720 x 480 (format 22) confirmed
  725. [17:51:29.040] >> Device mode 720 x 576 (format 22) confirmed
  726. [17:51:29.040] >> Device mode 800 x 600 (format 22) confirmed
  727. [17:51:29.040] >> Device mode 1024 x 768 (format 22) confirmed
  728. [17:51:29.040] >> Device mode 1152 x 864 (format 22) confirmed
  729. [17:51:29.040] >> Device mode 1280 x 720 (format 22) confirmed
  730. [17:51:29.040] >> Device mode 1280 x 768 (format 22) confirmed
  731. [17:51:29.040] >> Device mode 1280 x 800 (format 22) confirmed
  732. [17:51:29.040] >> Device mode 1280 x 960 (format 22) confirmed
  733. [17:51:29.040] >> Device mode 1280 x 1024 (format 22) confirmed
  734. [17:51:29.040] >> Device mode 1360 x 768 (format 22) confirmed
  735. [17:51:29.040] >> Device mode 1366 x 768 (format 22) confirmed
  736. [17:51:29.040] >> Device mode 1440 x 480 (format 22) confirmed
  737. [17:51:29.040] >> Device mode 1440 x 900 (format 22) confirmed
  738. [17:51:29.040] >> Device mode 1600 x 900 (format 22) confirmed
  739. [17:51:29.040] >> Device mode 1600 x 1024 (format 22) confirmed
  740. [17:51:29.040] >> Device mode 1680 x 1050 (format 22) confirmed
  741. [17:51:29.040] >> Device mode 1920 x 1080 (format 22) confirmed
  742. [17:51:29.040] Debug event: LOAD_DLL_DEBUG_EVENT
  743. [17:51:29.040] Thread ID = 0x00000f90
  744. [17:51:29.040] path C:\Windows\SysWOW64\nvd3dum.dll
  745. base 0x692d0000
  746. size 14103608
  747. [17:51:29.040] Debug event: CREATE_THREAD_DEBUG_EVENT
  748. [17:51:29.040] Thread ID = 0x00001384
  749. [17:51:29.040] Thread handle = 0x00000450
  750. Start address = 0x692d9d10
  751. Thread local base = 0x7fea0000
  752. [17:51:29.040] Debug event: EXIT_THREAD_DEBUG_EVENT
  753. [17:51:29.040] Thread ID = 0x00001384
  754. [17:51:29.040] Thread exit code = 0
  755. [17:51:29.071] Debug event: UNLOAD_DLL_DEBUG_EVENT
  756. [17:51:29.071] Thread ID = 0x00000f90
  757. [17:51:29.071] base 0x692d0000
  758. [17:51:29.071] >> Device mode 640 x 480 (format 22) confirmed
  759. [17:51:29.071] >> Device mode 720 x 480 (format 22) confirmed
  760. [17:51:29.071] >> Device mode 720 x 576 (format 22) confirmed
  761. [17:51:29.071] >> Device mode 800 x 600 (format 22) confirmed
  762. [17:51:29.071] >> Device mode 1024 x 768 (format 22) confirmed
  763. [17:51:29.071] >> Device mode 1152 x 864 (format 22) confirmed
  764. [17:51:29.071] >> Device mode 1280 x 720 (format 22) confirmed
  765. [17:51:29.071] >> Device mode 1280 x 768 (format 22) confirmed
  766. [17:51:29.071] >> Device mode 1280 x 800 (format 22) confirmed
  767. [17:51:29.071] >> Device mode 1280 x 960 (format 22) confirmed
  768. [17:51:29.071] >> Device mode 1280 x 1024 (format 22) confirmed
  769. [17:51:29.071] >> Device mode 1360 x 768 (format 22) confirmed
  770. [17:51:29.071] >> Device mode 1366 x 768 (format 22) confirmed
  771. [17:51:29.071] >> Device mode 1440 x 480 (format 22) confirmed
  772. [17:51:29.071] >> Device mode 1440 x 900 (format 22) confirmed
  773. [17:51:29.071] >> Device mode 1600 x 900 (format 22) confirmed
  774. [17:51:29.071] >> Device mode 1600 x 1024 (format 22) confirmed
  775. [17:51:29.071] >> Device mode 1680 x 1050 (format 22) confirmed
  776. [17:51:29.071] >> Device mode 1920 x 1080 (format 22) confirmed
  777. [17:51:29.071] Debug event: LOAD_DLL_DEBUG_EVENT
  778. [17:51:29.071] Thread ID = 0x00000f90
  779. [17:51:29.071] path C:\Windows\SysWOW64\mscat32.dll
  780. base 0x6a030000
  781. size 11776
  782. [17:51:30.363] Debug event: UNLOAD_DLL_DEBUG_EVENT
  783. [17:51:30.363] Thread ID = 0x00000f90
  784. [17:51:30.363] base 0x6a030000
  785. [17:51:30.364] >> Device mode 640 x 480 (format 22) confirmed
  786. [17:51:30.364] >> Device mode 720 x 480 (format 22) confirmed
  787. [17:51:30.364] >> Device mode 720 x 576 (format 22) confirmed
  788. [17:51:30.364] >> Device mode 800 x 600 (format 22) confirmed
  789. [17:51:30.365] >> Device mode 1024 x 768 (format 22) confirmed
  790. [17:51:30.365] >> Device mode 1152 x 864 (format 22) confirmed
  791. [17:51:30.365] >> Device mode 1176 x 664 (format 22) confirmed
  792. [17:51:30.365] >> Device mode 1280 x 720 (format 22) confirmed
  793. [17:51:30.365] >> Device mode 1280 x 768 (format 22) confirmed
  794. [17:51:30.365] >> Device mode 1280 x 800 (format 22) confirmed
  795. [17:51:30.365] >> Device mode 1280 x 960 (format 22) confirmed
  796. [17:51:30.365] >> Device mode 1280 x 1024 (format 22) confirmed
  797. [17:51:30.365] >> Device mode 1360 x 768 (format 22) confirmed
  798. [17:51:30.365] >> Device mode 1366 x 768 (format 22) confirmed
  799. [17:51:30.365] >> Device mode 1440 x 480 (format 22) confirmed
  800. [17:51:30.365] >> Device mode 1440 x 900 (format 22) confirmed
  801. [17:51:30.365] >> Device mode 1600 x 900 (format 22) confirmed
  802. [17:51:30.365] >> Device mode 1600 x 1024 (format 22) confirmed
  803. [17:51:30.365] >> Device mode 1680 x 1050 (format 22) confirmed
  804. [17:51:30.365] >> Device mode 1768 x 992 (format 22) confirmed
  805. [17:51:30.365] >> Device mode 1920 x 1080 (format 22) confirmed
  806. [17:51:30.365] Debug event: LOAD_DLL_DEBUG_EVENT
  807. [17:51:30.365] Thread ID = 0x00000f90
  808. [17:51:30.365] path C:\Windows\SysWOW64\nvd3dum.dll
  809. base 0x692d0000
  810. size 14103608
  811. [17:51:30.370] Debug event: CREATE_THREAD_DEBUG_EVENT
  812. [17:51:30.370] Thread ID = 0x00000a74
  813. [17:51:30.370] Thread handle = 0x00000458
  814. Start address = 0x692d9d10
  815. Thread local base = 0x7fea0000
  816. [17:51:30.373] Debug event: EXIT_THREAD_DEBUG_EVENT
  817. [17:51:30.373] Thread ID = 0x00000a74
  818. [17:51:30.373] Thread exit code = 0
  819. [17:51:30.386] Debug event: UNLOAD_DLL_DEBUG_EVENT
  820. [17:51:30.386] Thread ID = 0x00000f90
  821. [17:51:30.386] base 0x692d0000
  822. [17:51:30.386] >> Device mode 640 x 480 (format 22) confirmed
  823. [17:51:30.386] >> Device mode 720 x 480 (format 22) confirmed
  824. [17:51:30.386] >> Device mode 720 x 576 (format 22) confirmed
  825. [17:51:30.386] >> Device mode 800 x 600 (format 22) confirmed
  826. [17:51:30.386] >> Device mode 1024 x 768 (format 22) confirmed
  827. [17:51:30.386] >> Device mode 1152 x 864 (format 22) confirmed
  828. [17:51:30.386] >> Device mode 1176 x 664 (format 22) confirmed
  829. [17:51:30.386] >> Device mode 1280 x 720 (format 22) confirmed
  830. [17:51:30.386] >> Device mode 1280 x 768 (format 22) confirmed
  831. [17:51:30.386] >> Device mode 1280 x 800 (format 22) confirmed
  832. [17:51:30.386] >> Device mode 1280 x 960 (format 22) confirmed
  833. [17:51:30.386] >> Device mode 1280 x 1024 (format 22) confirmed
  834. [17:51:30.386] >> Device mode 1360 x 768 (format 22) confirmed
  835. [17:51:30.386] >> Device mode 1366 x 768 (format 22) confirmed
  836. [17:51:30.386] >> Device mode 1440 x 480 (format 22) confirmed
  837. [17:51:30.386] >> Device mode 1440 x 900 (format 22) confirmed
  838. [17:51:30.386] >> Device mode 1600 x 900 (format 22) confirmed
  839. [17:51:30.386] >> Device mode 1600 x 1024 (format 22) confirmed
  840. [17:51:30.386] >> Device mode 1680 x 1050 (format 22) confirmed
  841. [17:51:30.386] >> Device mode 1768 x 992 (format 22) confirmed
  842. [17:51:30.386] >> Device mode 1920 x 1080 (format 22) confirmed
  843. [17:51:30.386] Debug event: LOAD_DLL_DEBUG_EVENT
  844. [17:51:30.386] Thread ID = 0x00000f90
  845. [17:51:30.386] path C:\Windows\SysWOW64\mscat32.dll
  846. base 0x6a030000
  847. size 11776
  848. [17:51:31.685] Debug event: UNLOAD_DLL_DEBUG_EVENT
  849. [17:51:31.685] Thread ID = 0x00000f90
  850. [17:51:31.685] base 0x6a030000
  851. [17:51:31.685] >> Device mode 640 x 480 (format 22) confirmed
  852. [17:51:31.685] >> Device mode 720 x 480 (format 22) confirmed
  853. [17:51:31.685] >> Device mode 720 x 576 (format 22) confirmed
  854. [17:51:31.685] >> Device mode 800 x 600 (format 22) confirmed
  855. [17:51:31.685] >> Device mode 1024 x 768 (format 22) confirmed
  856. [17:51:31.685] >> Device mode 1152 x 864 (format 22) confirmed
  857. [17:51:31.685] >> Device mode 1280 x 720 (format 22) confirmed
  858. [17:51:31.685] >> Device mode 1280 x 768 (format 22) confirmed
  859. [17:51:31.685] >> Device mode 1280 x 800 (format 22) confirmed
  860. [17:51:31.685] >> Device mode 1280 x 960 (format 22) confirmed
  861. [17:51:31.685] >> Device mode 1280 x 1024 (format 22) confirmed
  862. [17:51:31.685] >> Device mode 1360 x 768 (format 22) confirmed
  863. [17:51:31.685] >> Device mode 1366 x 768 (format 22) confirmed
  864. [17:51:31.685] >> Device mode 1440 x 480 (format 22) confirmed
  865. [17:51:31.685] >> Device mode 1440 x 900 (format 22) confirmed
  866. [17:51:31.685] >> Device mode 1600 x 900 (format 22) confirmed
  867. [17:51:31.685] >> Device mode 1600 x 1024 (format 22) confirmed
  868. [17:51:31.685] >> Device mode 1680 x 1050 (format 22) confirmed
  869. [17:51:31.685] >> Device mode 1920 x 1080 (format 22) confirmed
  870. [17:51:31.685] Debug event: LOAD_DLL_DEBUG_EVENT
  871. [17:51:31.685] Thread ID = 0x00000f90
  872. [17:51:31.685] path C:\Windows\SysWOW64\nvd3dum.dll
  873. base 0x692d0000
  874. size 14103608
  875. [17:51:31.685] Debug event: CREATE_THREAD_DEBUG_EVENT
  876. [17:51:31.685] Thread ID = 0x00000e8c
  877. [17:51:31.685] Thread handle = 0x00000464
  878. Start address = 0x692d9d10
  879. Thread local base = 0x7fea0000
  880. [17:51:31.700] Debug event: EXIT_THREAD_DEBUG_EVENT
  881. [17:51:31.700] Thread ID = 0x00000e8c
  882. [17:51:31.700] Thread exit code = 0
  883. [17:51:31.712] Debug event: UNLOAD_DLL_DEBUG_EVENT
  884. [17:51:31.712] Thread ID = 0x00000f90
  885. [17:51:31.712] base 0x692d0000
  886. [17:51:31.712] >> Device mode 640 x 480 (format 22) confirmed
  887. [17:51:31.712] >> Device mode 720 x 480 (format 22) confirmed
  888. [17:51:31.712] >> Device mode 720 x 576 (format 22) confirmed
  889. [17:51:31.712] >> Device mode 800 x 600 (format 22) confirmed
  890. [17:51:31.712] >> Device mode 1024 x 768 (format 22) confirmed
  891. [17:51:31.712] >> Device mode 1152 x 864 (format 22) confirmed
  892. [17:51:31.712] >> Device mode 1280 x 720 (format 22) confirmed
  893. [17:51:31.712] >> Device mode 1280 x 768 (format 22) confirmed
  894. [17:51:31.712] >> Device mode 1280 x 800 (format 22) confirmed
  895. [17:51:31.712] >> Device mode 1280 x 960 (format 22) confirmed
  896. [17:51:31.712] >> Device mode 1280 x 1024 (format 22) confirmed
  897. [17:51:31.712] >> Device mode 1360 x 768 (format 22) confirmed
  898. [17:51:31.712] >> Device mode 1366 x 768 (format 22) confirmed
  899. [17:51:31.712] >> Device mode 1440 x 480 (format 22) confirmed
  900. [17:51:31.712] >> Device mode 1440 x 900 (format 22) confirmed
  901. [17:51:31.712] >> Device mode 1600 x 900 (format 22) confirmed
  902. [17:51:31.712] >> Device mode 1600 x 1024 (format 22) confirmed
  903. [17:51:31.712] >> Device mode 1680 x 1050 (format 22) confirmed
  904. [17:51:31.712] >> Device mode 1920 x 1080 (format 22) confirmed
  905. [17:51:31.728] >>
  906. Win95_Startup : 1920 x 1080
  907. [17:51:31.728] >>
  908. win95_initialiseD3D : 1920 x 1080
  909. [17:51:31.728] >> Initialize3DEnvironment(1920 x 1080 TNL:1)
  910. [17:51:31.728] >> Initialize3DEnvironment() - Requested width x height x format found in mode list
  911. [17:51:31.728] >> Puredevice set
  912. [17:51:31.728] Debug event: LOAD_DLL_DEBUG_EVENT
  913. [17:51:31.728] Thread ID = 0x00000f90
  914. [17:51:31.728] path C:\Windows\SysWOW64\nvd3dum.dll
  915. base 0x692d0000
  916. size 14103608
  917. [17:51:31.728] Debug event: CREATE_THREAD_DEBUG_EVENT
  918. [17:51:31.728] Thread ID = 0x00000fb4
  919. [17:51:31.728] Thread handle = 0x0000046c
  920. Start address = 0x692d9d10
  921. Thread local base = 0x7fea0000
  922. [17:51:31.728] Debug event: EXIT_THREAD_DEBUG_EVENT
  923. [17:51:31.728] Thread ID = 0x00000fb4
  924. [17:51:31.728] Thread exit code = 0
  925. [17:51:31.744] >> D3DDevice created =
  926. [17:51:31.744] >> HAL (hw vp): NVIDIA GeForce GTX 970
  927. [17:51:31.744] >>
  928. [17:51:31.744] >>
  929. GP_win95 :: Running gfx at 32/24 bit
  930. [17:51:31.744] >> win95_startup() - Initialize3DEnvironment ok
  931.  
  932. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  933. [17:51:31.744] Thread ID = 0x00000f90
  934. [17:51:31.744] First chance exception
  935. [17:51:31.744] Exception address: 0x0054cf4f
  936. [17:51:31.744] Exception flags: 0x00000000
  937. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  938. [17:51:31.744] Process tried to write to virtual address 0x00b4a000
  939. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  940. [17:51:31.744] Thread ID = 0x00000f90
  941. [17:51:31.744] First chance exception
  942. [17:51:31.744] Exception address: 0x7711daa1
  943. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  944. [17:51:31.744] Exception flags: 0x00000000
  945. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  946. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  947. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  948. [17:51:31.744] Thread ID = 0x00000f90
  949. [17:51:31.744] First chance exception
  950. [17:51:31.744] Exception address: 0x7711daa1
  951. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  952. [17:51:31.744] Exception flags: 0x00000000
  953. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  954. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  955. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  956. [17:51:31.744] Thread ID = 0x00000f90
  957. [17:51:31.744] First chance exception
  958. [17:51:31.744] Exception address: 0x7711daa1
  959. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  960. [17:51:31.744] Exception flags: 0x00000000
  961. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  962. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  963. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  964. [17:51:31.744] Thread ID = 0x00000f90
  965. [17:51:31.744] First chance exception
  966. [17:51:31.744] Exception address: 0x7711daa1
  967. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  968. [17:51:31.744] Exception flags: 0x00000000
  969. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  970. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  971. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  972. [17:51:31.744] Thread ID = 0x00000f90
  973. [17:51:31.744] First chance exception
  974. [17:51:31.744] Exception address: 0x7711daa1
  975. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  976. [17:51:31.744] Exception flags: 0x00000000
  977. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  978. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  979. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  980. [17:51:31.744] Thread ID = 0x00000f90
  981. [17:51:31.744] First chance exception
  982. [17:51:31.744] Exception address: 0x7711daa1
  983. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  984. [17:51:31.744] Exception flags: 0x00000000
  985. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  986. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  987. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  988. [17:51:31.744] Thread ID = 0x00000f90
  989. [17:51:31.744] First chance exception
  990. [17:51:31.744] Exception address: 0x7711daa1
  991. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  992. [17:51:31.744] Exception flags: 0x00000000
  993. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  994. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  995. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  996. [17:51:31.744] Thread ID = 0x00000f90
  997. [17:51:31.744] First chance exception
  998. [17:51:31.744] Exception address: 0x7711daa1
  999. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1000. [17:51:31.744] Exception flags: 0x00000000
  1001. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1002. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1003. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1004. [17:51:31.744] Thread ID = 0x00000f90
  1005. [17:51:31.744] First chance exception
  1006. [17:51:31.744] Exception address: 0x7711daa1
  1007. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1008. [17:51:31.744] Exception flags: 0x00000000
  1009. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1010. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1011. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1012. [17:51:31.744] Thread ID = 0x00000f90
  1013. [17:51:31.744] First chance exception
  1014. [17:51:31.744] Exception address: 0x7711daa1
  1015. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1016. [17:51:31.744] Exception flags: 0x00000000
  1017. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1018. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1019. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1020. [17:51:31.744] Thread ID = 0x00000f90
  1021. [17:51:31.744] First chance exception
  1022. [17:51:31.744] Exception address: 0x7711daa1
  1023. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1024. [17:51:31.744] Exception flags: 0x00000000
  1025. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1026. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1027. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1028. [17:51:31.744] Thread ID = 0x00000f90
  1029. [17:51:31.744] First chance exception
  1030. [17:51:31.744] Exception address: 0x7711daa1
  1031. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1032. [17:51:31.744] Exception flags: 0x00000000
  1033. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1034. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1035. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1036. [17:51:31.744] Thread ID = 0x00000f90
  1037. [17:51:31.744] First chance exception
  1038. [17:51:31.744] Exception address: 0x7711daa1
  1039. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1040. [17:51:31.744] Exception flags: 0x00000000
  1041. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1042. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1043. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1044. [17:51:31.744] Thread ID = 0x00000f90
  1045. [17:51:31.744] First chance exception
  1046. [17:51:31.744] Exception address: 0x7711daa1
  1047. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1048. [17:51:31.744] Exception flags: 0x00000000
  1049. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1050. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1051. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1052. [17:51:31.744] Thread ID = 0x00000f90
  1053. [17:51:31.744] First chance exception
  1054. [17:51:31.744] Exception address: 0x7711daa1
  1055. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1056. [17:51:31.744] Exception flags: 0x00000000
  1057. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1058. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1059. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1060. [17:51:31.744] Thread ID = 0x00000f90
  1061. [17:51:31.744] First chance exception
  1062. [17:51:31.744] Exception address: 0x7711daa1
  1063. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1064. [17:51:31.744] Exception flags: 0x00000000
  1065. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1066. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1067. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1068. [17:51:31.744] Thread ID = 0x00000f90
  1069. [17:51:31.744] First chance exception
  1070. [17:51:31.744] Exception address: 0x7711daa1
  1071. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1072. [17:51:31.744] Exception flags: 0x00000000
  1073. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1074. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1075. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1076. [17:51:31.744] Thread ID = 0x00000f90
  1077. [17:51:31.744] First chance exception
  1078. [17:51:31.744] Exception address: 0x7711daa1
  1079. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1080. [17:51:31.744] Exception flags: 0x00000000
  1081. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1082. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1083. [17:51:31.744] Debug event: EXCEPTION_DEBUG_EVENT
  1084. [17:51:31.744] Thread ID = 0x00000f90
  1085. [17:51:31.744] First chance exception
  1086. [17:51:31.744] Exception address: 0x7711daa1
  1087. [17:51:31.744] Module name: '' (base 0x770e0000, size 1533496)
  1088. [17:51:31.744] Exception flags: 0x00000000
  1089. [17:51:31.744] Exception code: EXCEPTION_ACCESS_VIOLATION
  1090. [17:51:31.744] Process tried to read from virtual address 0x5807008b
  1091. [17:51:31.759] Debug event: EXCEPTION_DEBUG_EVENT
  1092. [17:51:31.759] Thread ID = 0x00000f90
  1093. [17:51:31.759] First chance exception
  1094. [17:51:31.759] Exception address: 0x7711daa1
  1095. [17:51:31.759] Module name: '' (base 0x770e0000, size 1533496)
  1096. [17:51:31.759] Exception flags: 0x00000000
  1097. [17:51:31.759] Exception code: EXCEPTION_ACCESS_VIOLATION
  1098. [17:51:31.759] Process tried to read from virtual address 0x5807008b
  1099. [17:51:31.759] Debug event: EXCEPTION_DEBUG_EVENT
  1100. [17:51:31.759] Thread ID = 0x00000f94
  1101. [17:51:31.759] First chance exception
  1102. [17:51:31.759] Exception address: 0x00509fbd
  1103. [17:51:31.759] Exception flags: 0x00000000
  1104. [17:51:31.759] Exception code: EXCEPTION_ACCESS_VIOLATION
  1105. [17:51:31.759] Process tried to read from virtual address 0x58070083
  1106. [17:51:31.759] Debug event: EXCEPTION_DEBUG_EVENT
  1107. [17:51:31.759] Thread ID = 0x00000f94
  1108. [17:51:31.759] Unhandled exception
  1109. [17:51:31.759] Exception address: 0x00509fbd
  1110. [17:51:31.759] Exception flags: 0x00000000
  1111. [17:51:31.759] Exception code: EXCEPTION_ACCESS_VIOLATION
  1112. [17:51:31.759] Process tried to read from virtual address 0x58070083
  1113. [17:51:31.759] Stack trace:
  1114. 00509FBD: Grand Prix 4\GPxPatch.exe! <no symbol>
  1115. 74F43744: Windows\SYSTEM32\KERNEL32.DLL! BaseThreadInitThunk + 36 bytes
  1116. 7713A064: Windows\SYSTEM32\ntdll.dll! RtlSetCurrentTransaction + 212 bytes
  1117. 7713A02F: Windows\SYSTEM32\ntdll.dll! RtlSetCurrentTransaction + 159 bytes
  1118. [17:51:31.759] Registers:
  1119. EAX=58070083 ECX=58070083 ESI=74087640
  1120. EBX=0050A190 EDX=00000000 EDI=00000010
  1121. CS:EIP=0023:00509FBD
  1122. SS:ESP=002B:02D5FE90 EBP=02D5FF80
  1123. DS=002B ES=002B FS=0053 GS=002B
  1124. Flags=00010202
  1125. Stack dump:
  1126. 02d5fe90: 0054e75d 00000010 74087640 02d5ff80 '].T.....@v.t....'
  1127. 02d5fea0: 02d5feb4 0050a190 00000000 0050a190 '......P.......P.'
  1128. 02d5feb0: 00000000 0050a195 74073506 00000010 '......P..5.t....'
  1129. 02d5fec0: 00000000 000a03a0 00000000 00000000 '................'
  1130. 02d5fed0: 74073400 74073400 00000000 00000000 '.4.t.4.t........'
  1131. 02d5fee0: 000a03a0 00000000 fffec315 ffffffff '................'
  1132. 02d5fef0: 00000002 00000000 00000010 00000021 '............!...'
  1133. 02d5ff00: 00000000 00000000 00000000 00000000 '................'
  1134. 02d5ff10: 00000000 00000000 00000000 00000000 '................'
  1135. 02d5ff20: 00000000 00000000 00000000 00000000 '................'
  1136. 02d5ff30: 00000000 00000000 0000025c 00000268 '........\...h...'
  1137. 02d5ff40: 000002a4 00000000 00000000 00000000 '................'
  1138. 02d5ff50: 00000000 00000000 00000000 00000000 '................'
  1139. 02d5ff60: 00000000 00000000 00000000 00000000 '................'
  1140. 02d5ff70: 00000000 00000000 00000000 6ada1587 '...............j'
  1141. 02d5ff80: 02d5ff94 74f43744 00000000 74f43720 '....D7.t.... 7.t'
  1142. 02d5ff90: 6a2ba9ba 02d5ffdc 7713a064 00000000 '..+j....d..w....'
  1143. 02d5ffa0: 69cb6b4a 00000000 00000000 00000000 'Jk.i............'
  1144. 02d5ffb0: c0000005 74a18cd0 00000000 02d5f8a4 '.......t........'
  1145. 02d5ffc0: 69cb6b4a 02d5ffa0 02d5f8a4 02d5ffe4 'Jk.i............'
  1146. 02d5ffd0: 77150d40 1c038856 00000000 02d5ffec '@..wV...........'
  1147. 02d5ffe0: 7713a02f ffffffff 7715d7e6 00000000 '/..w.......w....'
  1148. 02d5fff0: 00000000 74073400 00000000 00000000 '.....4.t........'
  1149. [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
  1150. [17:51:33.001] Thread ID = 0x00000f94
  1151. [17:51:33.001] Thread exit code = -1073741819
  1152. [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
  1153. [17:51:33.001] Thread ID = 0x00000f90
  1154. [17:51:33.001] Thread exit code = -1073741819
  1155. [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
  1156. [17:51:33.001] Thread ID = 0x00000430
  1157. [17:51:33.001] Thread exit code = -1073741819
  1158. [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
  1159. [17:51:33.001] Thread ID = 0x000011d4
  1160. [17:51:33.001] Thread exit code = -1073741819
  1161. [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
  1162. [17:51:33.001] Thread ID = 0x00000414
  1163. [17:51:33.001] Thread exit code = -1073741819
  1164. [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
  1165. [17:51:33.001] Thread ID = 0x000004ac
  1166. [17:51:33.001] Thread exit code = -1073741819
  1167. [17:51:33.001] Debug event: EXIT_THREAD_DEBUG_EVENT
  1168. [17:51:33.001] Thread ID = 0x00000f8c
  1169. [17:51:33.001] Thread exit code = -1073741819
  1170. [17:51:33.002] Debug event: EXIT_PROCESS_DEBUG_EVENT
  1171. [17:51:33.002] Thread ID = 0x00000f84
  1172. [17:51:33.002] Process exit code = -1073741819
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement