Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting log
- GPxPatch version: 4.43
- GPx version detected: decrypted GP4 v1.02
- Date/time: 20-01-2016 21:20
- [21:20:12.264] Verbosity level is 2
- [21:20:12.264] OS version info: Windows 8 build 9200
- [21:20:12.264] Total physical memory: 2047 MB (free: 2047 MB)
- [21:20:12.264] Debugging gp4.exe
- [21:20:12.280] Process created:
- Process ID = 0x00003e40
- Process handle = 0x00000298
- Main thread ID = 0x00003e44
- Main thread handle = 0x00000294
- Process will run on CPU 1 only
- [21:20:12.280] Waiting for debug events...
- [21:20:12.280] Debug event: CREATE_PROCESS_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] Entry point = 0x005ddec6
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path
- base 0x77640000
- size 1540768
- [21:20:12.280] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] base 0x00bb0000
- [21:20:12.280] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] base 0x74390000
- [21:20:12.280] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] base 0x00bb0000
- [21:20:12.280] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] base 0x00bb0000
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\KERNEL32.DLL
- base 0x74390000
- size 620176
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\KERNELBASE.dll
- base 0x746e0000
- size 1557768
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\apphelp.dll
- base 0x72ec0000
- size 581632
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\AppPatch\AcGenral.DLL
- base 0x67bf0000
- size 2478592
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\msvcrt.dll
- base 0x75ed0000
- size 773168
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\sechost.dll
- base 0x75430000
- size 269616
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\RPCRT4.dll
- base 0x75380000
- size 707600
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\SspiCli.dll
- base 0x74370000
- size 116216
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\CRYPTBASE.dll
- base 0x74360000
- size 31528
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\bcryptPrimitives.dll
- base 0x75750000
- size 360480
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\SHLWAPI.dll
- base 0x75540000
- size 276336
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\combase.dll
- base 0x75590000
- size 1824264
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\GDI32.dll
- base 0x74fe0000
- size 1371792
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\USER32.dll
- base 0x75d80000
- size 1337240
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\ole32.dll
- base 0x75130000
- size 957608
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\OLEAUT32.dll
- base 0x75480000
- size 589856
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\SHELL32.dll
- base 0x76040000
- size 21125408
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\cfgmgr32.dll
- base 0x757b0000
- size 217976
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\windows.storage.dll
- base 0x74ae0000
- size 5237336
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\advapi32.dll
- base 0x75fc0000
- size 499432
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\kernel.appcore.dll
- base 0x74570000
- size 39792
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\shcore.dll
- base 0x748d0000
- size 569744
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\powrprof.dll
- base 0x74470000
- size 270672
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\profapi.dll
- base 0x77460000
- size 54752
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\UxTheme.dll
- base 0x73a10000
- size 458752
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\WINMM.dll
- base 0x73c90000
- size 134352
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\samcli.dll
- base 0x73ec0000
- size 67072
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\MSACM32.dll
- base 0x6fb30000
- size 90912
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\VERSION.dll
- base 0x74010000
- size 27360
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\USERENV.dll
- base 0x73fc0000
- size 92480
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\dwmapi.dll
- base 0x71fa0000
- size 94208
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\urlmon.dll
- base 0x72bb0000
- size 1505280
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\WINSPOOL.DRV
- base 0x71d90000
- size 400896
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\MPR.dll
- base 0x73f90000
- size 85720
- [21:20:12.280] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.280] Thread ID = 0x00003e44
- [21:20:12.280] path C:\WINDOWS\SysWOW64\WINMMBASE.dll
- base 0x73c60000
- size 132744
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\iertutil.dll
- base 0x728e0000
- size 2919320
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\bcrypt.dll
- base 0x73e00000
- size 107408
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\AppPatch\AcLayers.dll
- base 0x67870000
- size 335360
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\SETUPAPI.dll
- base 0x757f0000
- size 4268360
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\sfc.dll
- base 0x66680000
- size 3072
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\sfc_os.DLL
- base 0x6d950000
- size 41984
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path
- base 0x00f80000
- size 6275072
- [21:20:12.295] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] base 0x00f80000
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path
- base 0x00f80000
- size 6275072
- [21:20:12.295] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] base 0x00f80000
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\IMM32.DLL
- base 0x75f90000
- size 169928
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\d3d8.dll
- base 0x672e0000
- size 1072128
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\dinput8.dll
- base 0x6d070000
- size 172032
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\dsound.dll
- base 0x67250000
- size 527360
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\Grand Prix 4\binkw32.dll
- base 0x30000000
- size 357939
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\wsock32.dll
- base 0x74350000
- size 16384
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\WS2_32.dll
- base 0x775e0000
- size 388896
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\WINDOWS\SysWOW64\d3d8thk.dll
- base 0x6d060000
- size 12800
- [21:20:12.295] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] First chance exception
- [21:20:12.295] Exception address: 0x776ecd6c
- [21:20:12.295] Module name: '' (base 0x77640000, size 1540768)
- [21:20:12.295] Exception flags: 0x00000000
- [21:20:12.295] Exception code: EXCEPTION_BREAKPOINT
- [21:20:12.295] Setting breakpoint on entry point (0x005ddec6)
- [21:20:12.295] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] First chance exception
- [21:20:12.295] Exception address: 0x005ddec6
- [21:20:12.295] Exception flags: 0x00000000
- [21:20:12.295] Exception code: EXCEPTION_BREAKPOINT
- [21:20:12.295] Removing breakpoint on entry point
- [21:20:12.295] Injecting DLL loading code...
- [21:20:12.295] Copying code to target at address 0x00b60000...
- [21:20:12.295] Injection succesful
- [21:20:12.295] Setting instruction pointer to injected code (0x00b60000)
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
- base 0x09a00000
- size 27648
- [21:20:12.295] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.295] Thread ID = 0x00003e44
- [21:20:12.295] path C:\Grand Prix 4\GPxPSup.dll
- base 0x09900000
- size 40960
- [21:20:12.311] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.311] Thread ID = 0x00003e44
- [21:20:12.311] path C:\WINDOWS\SysWOW64\imagehlp.dll
- base 0x77440000
- size 99176
- [21:20:12.311] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.311] Thread ID = 0x00003e44
- [21:20:12.311] base 0x77440000
- [21:20:12.311] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.311] Thread ID = 0x00003e44
- [21:20:12.311] path C:\WINDOWS\SysWOW64\imagehlp.dll
- base 0x77440000
- size 99176
- [21:20:12.311] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.311] Thread ID = 0x00003e44
- [21:20:12.311] base 0x77440000
- [21:20:12.311] >> D3D Constructor!
- [21:20:12.311] >> Starting WinMain
- [21:20:12.311] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.311] Thread ID = 0x00003e48
- [21:20:12.311] Thread handle = 0x00000394
- Start address = 0x77689fa0
- Thread local base = 0x002a2000
- [21:20:12.311] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.311] Thread ID = 0x00003e44
- [21:20:12.311] path C:\WINDOWS\SysWOW64\MSCTF.dll
- base 0x774c0000
- size 1174008
- [21:20:12.311] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.311] Thread ID = 0x00003e4c
- [21:20:12.311] Thread handle = 0x00000398
- Start address = 0x77689fa0
- Thread local base = 0x002a5000
- [21:20:12.311] >> WM_ACTIVATE (active)(not minimized)
- [21:20:12.327] >> Game thread into win95_startup(0)
- [21:20:12.327] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e50
- [21:20:12.327] Thread handle = 0x0000039c
- Start address = 0x73c933e0
- Thread local base = 0x002a8000
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\SysWOW64\clbcatq.dll
- base 0x74650000
- size 526304
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\SysWOW64\dplayx.dll
- base 0x67bb0000
- size 220160
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\SysWOW64\dpmodemx.dll
- base 0x6d050000
- size 25088
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\SysWOW64\TAPI32.dll
- base 0x67830000
- size 196608
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.10586.0_none_d3c2e4e965da4528\comctl32.dll
- base 0x73440000
- size 2142048
- [21:20:12.327] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e54
- [21:20:12.327] Thread handle = 0x000003bc
- Start address = 0x67bda880
- Thread local base = 0x002ab000
- [21:20:12.327] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] base 0x67830000
- [21:20:12.327] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] base 0x6d050000
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\SysWOW64\dpmodemx.dll
- base 0x6d050000
- size 25088
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\SysWOW64\TAPI32.dll
- base 0x67830000
- size 196608
- [21:20:12.327] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] path C:\WINDOWS\SysWOW64\rtutils.dll
- base 0x6d040000
- size 51712
- [21:20:12.327] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e64
- [21:20:12.327] Thread handle = 0x000003c0
- Start address = 0x678374d0
- Thread local base = 0x002ae000
- [21:20:12.327] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e44
- [21:20:12.327] base 0x6d050000
- [21:20:12.327] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e64
- [21:20:12.327] base 0x6d040000
- [21:20:12.327] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e64
- [21:20:12.327] base 0x67830000
- [21:20:12.327] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:12.327] Thread ID = 0x00003e64
- [21:20:12.327] Thread exit code = 0
- [21:20:12.342] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.342] Thread ID = 0x00003e44
- [21:20:12.342] path C:\WINDOWS\SysWOW64\dpwsockx.dll
- base 0x6d050000
- size 47104
- [21:20:12.343] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.343] Thread ID = 0x00003e44
- [21:20:12.343] path C:\WINDOWS\SysWOW64\mswsock.dll
- base 0x74260000
- size 312160
- [21:20:12.344] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.344] Thread ID = 0x00003e44
- [21:20:12.344] path C:\WINDOWS\SysWOW64\dpnathlp.dll
- base 0x6d030000
- size 61952
- [21:20:12.345] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.345] Thread ID = 0x00003e44
- [21:20:12.345] path C:\WINDOWS\SysWOW64\CRYPTSP.dll
- base 0x73dc0000
- size 69232
- [21:20:12.345] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.345] Thread ID = 0x00003e44
- [21:20:12.345] path C:\WINDOWS\SysWOW64\rsaenh.dll
- base 0x73d90000
- size 183896
- [21:20:12.346] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.346] Thread ID = 0x00003e44
- [21:20:12.346] path C:\WINDOWS\SysWOW64\iphlpapi.dll
- base 0x73fe0000
- size 187488
- [21:20:12.346] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.346] Thread ID = 0x00003e44
- [21:20:12.346] path C:\WINDOWS\SysWOW64\rasapi32.dll
- base 0x671a0000
- size 653312
- [21:20:12.347] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.347] Thread ID = 0x00003e44
- [21:20:12.347] path C:\WINDOWS\SysWOW64\rasman.dll
- base 0x67b80000
- size 123392
- [21:20:12.347] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.347] Thread ID = 0x00003e44
- [21:20:12.347] path C:\WINDOWS\SysWOW64\NSI.dll
- base 0x74640000
- size 20152
- [21:20:12.347] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.347] Thread ID = 0x00003e44
- [21:20:12.347] path C:\WINDOWS\SysWOW64\dhcpcsvc.DLL
- base 0x73cf0000
- size 64000
- [21:20:12.347] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.347] Thread ID = 0x00003e68
- [21:20:12.347] Thread handle = 0x000003f0
- Start address = 0x74279e70
- Thread local base = 0x002b1000
- [21:20:12.425] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e6c
- [21:20:12.425] Thread handle = 0x000003f4
- Start address = 0x6d054b70
- Thread local base = 0x002b4000
- [21:20:12.425] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e44
- [21:20:12.425] base 0x67b80000
- [21:20:12.425] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e44
- [21:20:12.425] base 0x671a0000
- [21:20:12.425] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e44
- [21:20:12.425] base 0x6d030000
- [21:20:12.425] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e6c
- [21:20:12.425] Thread exit code = 0
- [21:20:12.425] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e68
- [21:20:12.425] Thread exit code = 0
- [21:20:12.425] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e44
- [21:20:12.425] base 0x6d050000
- [21:20:12.425] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:12.425] Thread ID = 0x00003e54
- [21:20:12.425] Thread exit code = 0
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\WINDOWS\SysWOW64\napinsp.dll
- base 0x74330000
- size 55808
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\WINDOWS\SysWOW64\pnrpnsp.dll
- base 0x74310000
- size 70656
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\WINDOWS\SysWOW64\NLAapi.dll
- base 0x742f0000
- size 65024
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\WINDOWS\SysWOW64\DNSAPI.dll
- base 0x73f00000
- size 535088
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\WINDOWS\SysWOW64\winrnr.dll
- base 0x73eb0000
- size 23552
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\WINDOWS\SysWOW64\wshbth.dll
- base 0x73e90000
- size 51712
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\Program Files (x86)\Bonjour\mdnsNSP.dll
- base 0x73e60000
- size 121704
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\WINDOWS\SysWOW64\fwpuclnt.dll
- base 0x73d30000
- size 269824
- [21:20:12.441] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] path C:\Windows\SysWOW64\rasadhlp.dll
- base 0x73d80000
- size 13312
- [21:20:12.441] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] base 0x74330000
- [21:20:12.441] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] base 0x74310000
- [21:20:12.441] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] base 0x742f0000
- [21:20:12.441] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] base 0x73eb0000
- [21:20:12.441] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.441] Thread ID = 0x00003e44
- [21:20:12.441] base 0x73e90000
- [21:20:12.457] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.457] Thread ID = 0x00003e44
- [21:20:12.457] base 0x73e60000
- [21:20:12.457] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.457] Thread ID = 0x00003e44
- [21:20:12.457] base 0x73d30000
- [21:20:12.457] >> MMX Enabled
- [21:20:12.457] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.457] Thread ID = 0x00003e44
- [21:20:12.457] path C:\WINDOWS\SysWOW64\ntmarta.dll
- base 0x731f0000
- size 150840
- [21:20:12.457] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.457] Thread ID = 0x00003e44
- [21:20:12.457] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x030c0000
- size 14103608
- [21:20:12.457] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.457] Thread ID = 0x00003e70
- [21:20:12.457] Thread handle = 0x00000418
- Start address = 0x030c9d10
- Thread local base = 0x002b7000
- [21:20:12.457] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:12.457] Thread ID = 0x00003e70
- [21:20:12.457] Thread exit code = 0
- [21:20:12.546] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.546] Thread ID = 0x00003e44
- [21:20:12.546] base 0x030c0000
- [21:20:12.546] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.546] Thread ID = 0x00003e44
- [21:20:12.546] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x030c0000
- size 14103608
- [21:20:12.546] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.546] Thread ID = 0x00003e74
- [21:20:12.546] Thread handle = 0x0000041c
- Start address = 0x030c9d10
- Thread local base = 0x002ba000
- [21:20:12.562] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:12.562] Thread ID = 0x00003e74
- [21:20:12.562] Thread exit code = 0
- [21:20:12.577] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.577] Thread ID = 0x00003e44
- [21:20:12.577] base 0x030c0000
- [21:20:12.577] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.577] Thread ID = 0x00003e44
- [21:20:12.577] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x030c0000
- size 14103608
- [21:20:12.593] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.593] Thread ID = 0x00003e78
- [21:20:12.593] Thread handle = 0x00000424
- Start address = 0x030c9d10
- Thread local base = 0x002bd000
- [21:20:12.609] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:12.609] Thread ID = 0x00003e78
- [21:20:12.609] Thread exit code = 0
- [21:20:12.640] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:12.640] Thread ID = 0x00003e44
- [21:20:12.640] base 0x030c0000
- [21:20:12.640] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.640] Thread ID = 0x00003e44
- [21:20:12.640] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x6d050000
- size 11776
- [21:20:12.640] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.640] Thread ID = 0x00003e44
- [21:20:12.640] path C:\WINDOWS\SysWOW64\WINTRUST.dll
- base 0x77470000
- size 268040
- [21:20:12.640] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.640] Thread ID = 0x00003e44
- [21:20:12.640] path C:\WINDOWS\SysWOW64\MSASN1.dll
- base 0x748c0000
- size 49592
- [21:20:12.640] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.640] Thread ID = 0x00003e44
- [21:20:12.640] path C:\WINDOWS\SysWOW64\CRYPT32.dll
- base 0x74960000
- size 1535024
- [21:20:12.729] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:12.729] Thread ID = 0x00003e44
- [21:20:12.729] path C:\WINDOWS\SysWOW64\gpapi.dll
- base 0x73a90000
- size 111608
- [21:20:12.745] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.745] Thread ID = 0x00003e80
- [21:20:12.745] Thread handle = 0x0000043c
- Start address = 0x77689fa0
- Thread local base = 0x002c3000
- [21:20:12.745] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:12.745] Thread ID = 0x00003e7c
- [21:20:12.745] Thread handle = 0x00000440
- Start address = 0x749905d0
- Thread local base = 0x002c0000
- [21:20:14.185] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:14.185] Thread ID = 0x00003e44
- [21:20:14.185] path C:\WINDOWS\SysWOW64\cryptnet.dll
- base 0x6fe50000
- size 136704
- [21:20:14.186] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:14.186] Thread ID = 0x00003e44
- [21:20:14.186] path C:\WINDOWS\SysWOW64\WINNSI.DLL
- base 0x71750000
- size 26848
- [21:20:14.187] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:14.187] Thread ID = 0x00003e84
- [21:20:14.187] Thread handle = 0x0000044c
- Start address = 0x77689fa0
- Thread local base = 0x002c6000
- [21:20:14.187] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:14.187] Thread ID = 0x00003e88
- [21:20:14.187] Thread handle = 0x00000450
- Start address = 0x77689fa0
- Thread local base = 0x002c9000
- [21:20:14.711] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:14.711] Thread ID = 0x00003e44
- [21:20:14.711] base 0x6d050000
- [21:20:14.711] >> nvd3dum.dll
- [21:20:14.711] >>
- [21:20:14.711] >> NVIDIA GeForce GTX 970
- [21:20:14.711] >>
- [21:20:14.711] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:14.711] Thread ID = 0x00003e44
- [21:20:14.711] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x6d050000
- size 11776
- [21:20:15.827] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:15.827] Thread ID = 0x00003e44
- [21:20:15.827] base 0x6d050000
- [21:20:15.827] >> Device mode 640 x 480 (format 22) confirmed
- [21:20:15.827] >> Device mode 720 x 480 (format 22) confirmed
- [21:20:15.827] >> Device mode 720 x 576 (format 22) confirmed
- [21:20:15.827] >> Device mode 800 x 600 (format 22) confirmed
- [21:20:15.827] >> Device mode 1024 x 768 (format 22) confirmed
- [21:20:15.827] >> Device mode 1152 x 864 (format 22) confirmed
- [21:20:15.827] >> Device mode 1280 x 720 (format 22) confirmed
- [21:20:15.827] >> Device mode 1280 x 768 (format 22) confirmed
- [21:20:15.827] >> Device mode 1280 x 800 (format 22) confirmed
- [21:20:15.827] >> Device mode 1280 x 960 (format 22) confirmed
- [21:20:15.827] >> Device mode 1280 x 1024 (format 22) confirmed
- [21:20:15.827] >> Device mode 1360 x 768 (format 22) confirmed
- [21:20:15.827] >> Device mode 1366 x 768 (format 22) confirmed
- [21:20:15.827] >> Device mode 1440 x 480 (format 22) confirmed
- [21:20:15.827] >> Device mode 1440 x 900 (format 22) confirmed
- [21:20:15.827] >> Device mode 1600 x 900 (format 22) confirmed
- [21:20:15.827] >> Device mode 1600 x 1024 (format 22) confirmed
- [21:20:15.827] >> Device mode 1680 x 1050 (format 22) confirmed
- [21:20:15.827] >> Device mode 1920 x 1080 (format 22) confirmed
- [21:20:15.827] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:15.827] Thread ID = 0x00003e44
- [21:20:15.827] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x08430000
- size 14103608
- [21:20:15.827] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:15.827] Thread ID = 0x00003e90
- [21:20:15.827] Thread handle = 0x0000045c
- Start address = 0x08439d10
- Thread local base = 0x002cc000
- [21:20:15.842] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:15.842] Thread ID = 0x00003e90
- [21:20:15.842] Thread exit code = 0
- [21:20:15.869] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:15.869] Thread ID = 0x00003e44
- [21:20:15.869] base 0x08430000
- [21:20:15.870] >> Device mode 640 x 480 (format 22) confirmed
- [21:20:15.870] >> Device mode 720 x 480 (format 22) confirmed
- [21:20:15.870] >> Device mode 720 x 576 (format 22) confirmed
- [21:20:15.870] >> Device mode 800 x 600 (format 22) confirmed
- [21:20:15.870] >> Device mode 1024 x 768 (format 22) confirmed
- [21:20:15.870] >> Device mode 1152 x 864 (format 22) confirmed
- [21:20:15.870] >> Device mode 1280 x 720 (format 22) confirmed
- [21:20:15.870] >> Device mode 1280 x 768 (format 22) confirmed
- [21:20:15.870] >> Device mode 1280 x 800 (format 22) confirmed
- [21:20:15.870] >> Device mode 1280 x 960 (format 22) confirmed
- [21:20:15.870] >> Device mode 1280 x 1024 (format 22) confirmed
- [21:20:15.870] >> Device mode 1360 x 768 (format 22) confirmed
- [21:20:15.870] >> Device mode 1366 x 768 (format 22) confirmed
- [21:20:15.870] >> Device mode 1440 x 480 (format 22) confirmed
- [21:20:15.870] >> Device mode 1440 x 900 (format 22) confirmed
- [21:20:15.870] >> Device mode 1600 x 900 (format 22) confirmed
- [21:20:15.870] >> Device mode 1600 x 1024 (format 22) confirmed
- [21:20:15.870] >> Device mode 1680 x 1050 (format 22) confirmed
- [21:20:15.870] >> Device mode 1920 x 1080 (format 22) confirmed
- [21:20:15.870] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:15.870] Thread ID = 0x00003e44
- [21:20:15.870] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x6d050000
- size 11776
- [21:20:16.876] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:16.876] Thread ID = 0x00003e44
- [21:20:16.876] base 0x6d050000
- [21:20:16.876] >> Device mode 640 x 480 (format 22) confirmed
- [21:20:16.876] >> Device mode 720 x 480 (format 22) confirmed
- [21:20:16.876] >> Device mode 720 x 576 (format 22) confirmed
- [21:20:16.876] >> Device mode 800 x 600 (format 22) confirmed
- [21:20:16.876] >> Device mode 1024 x 768 (format 22) confirmed
- [21:20:16.876] >> Device mode 1152 x 864 (format 22) confirmed
- [21:20:16.876] >> Device mode 1280 x 720 (format 22) confirmed
- [21:20:16.876] >> Device mode 1280 x 768 (format 22) confirmed
- [21:20:16.876] >> Device mode 1280 x 800 (format 22) confirmed
- [21:20:16.876] >> Device mode 1280 x 960 (format 22) confirmed
- [21:20:16.876] >> Device mode 1280 x 1024 (format 22) confirmed
- [21:20:16.876] >> Device mode 1360 x 768 (format 22) confirmed
- [21:20:16.876] >> Device mode 1366 x 768 (format 22) confirmed
- [21:20:16.876] >> Device mode 1440 x 480 (format 22) confirmed
- [21:20:16.876] >> Device mode 1440 x 900 (format 22) confirmed
- [21:20:16.876] >> Device mode 1600 x 900 (format 22) confirmed
- [21:20:16.876] >> Device mode 1600 x 1024 (format 22) confirmed
- [21:20:16.876] >> Device mode 1680 x 1050 (format 22) confirmed
- [21:20:16.876] >> Device mode 1920 x 1080 (format 22) confirmed
- [21:20:16.876] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:16.876] Thread ID = 0x00003e44
- [21:20:16.876] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x08430000
- size 14103608
- [21:20:16.876] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:16.876] Thread ID = 0x00003e94
- [21:20:16.876] Thread handle = 0x00000464
- Start address = 0x08439d10
- Thread local base = 0x002cf000
- [21:20:16.892] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:16.892] Thread ID = 0x00003e94
- [21:20:16.892] Thread exit code = 0
- [21:20:16.907] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:16.907] Thread ID = 0x00003e44
- [21:20:16.907] base 0x08430000
- [21:20:16.907] >> Device mode 640 x 480 (format 22) confirmed
- [21:20:16.907] >> Device mode 720 x 480 (format 22) confirmed
- [21:20:16.907] >> Device mode 720 x 576 (format 22) confirmed
- [21:20:16.907] >> Device mode 800 x 600 (format 22) confirmed
- [21:20:16.907] >> Device mode 1024 x 768 (format 22) confirmed
- [21:20:16.907] >> Device mode 1152 x 864 (format 22) confirmed
- [21:20:16.907] >> Device mode 1280 x 720 (format 22) confirmed
- [21:20:16.907] >> Device mode 1280 x 768 (format 22) confirmed
- [21:20:16.907] >> Device mode 1280 x 800 (format 22) confirmed
- [21:20:16.907] >> Device mode 1280 x 960 (format 22) confirmed
- [21:20:16.907] >> Device mode 1280 x 1024 (format 22) confirmed
- [21:20:16.907] >> Device mode 1360 x 768 (format 22) confirmed
- [21:20:16.907] >> Device mode 1366 x 768 (format 22) confirmed
- [21:20:16.907] >> Device mode 1440 x 480 (format 22) confirmed
- [21:20:16.907] >> Device mode 1440 x 900 (format 22) confirmed
- [21:20:16.907] >> Device mode 1600 x 900 (format 22) confirmed
- [21:20:16.907] >> Device mode 1600 x 1024 (format 22) confirmed
- [21:20:16.907] >> Device mode 1680 x 1050 (format 22) confirmed
- [21:20:16.907] >> Device mode 1920 x 1080 (format 22) confirmed
- [21:20:16.907] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:16.907] Thread ID = 0x00003e44
- [21:20:16.907] path C:\WINDOWS\SysWOW64\mscat32.dll
- base 0x6d050000
- size 11776
- [21:20:17.898] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:17.898] Thread ID = 0x00003e44
- [21:20:17.898] base 0x6d050000
- [21:20:17.898] >> Device mode 640 x 480 (format 22) confirmed
- [21:20:17.898] >> Device mode 720 x 480 (format 22) confirmed
- [21:20:17.898] >> Device mode 720 x 576 (format 22) confirmed
- [21:20:17.898] >> Device mode 800 x 600 (format 22) confirmed
- [21:20:17.898] >> Device mode 1024 x 768 (format 22) confirmed
- [21:20:17.898] >> Device mode 1152 x 864 (format 22) confirmed
- [21:20:17.898] >> Device mode 1176 x 664 (format 22) confirmed
- [21:20:17.898] >> Device mode 1280 x 720 (format 22) confirmed
- [21:20:17.898] >> Device mode 1280 x 768 (format 22) confirmed
- [21:20:17.898] >> Device mode 1280 x 800 (format 22) confirmed
- [21:20:17.898] >> Device mode 1280 x 960 (format 22) confirmed
- [21:20:17.898] >> Device mode 1280 x 1024 (format 22) confirmed
- [21:20:17.898] >> Device mode 1360 x 768 (format 22) confirmed
- [21:20:17.898] >> Device mode 1366 x 768 (format 22) confirmed
- [21:20:17.898] >> Device mode 1440 x 480 (format 22) confirmed
- [21:20:17.898] >> Device mode 1440 x 900 (format 22) confirmed
- [21:20:17.898] >> Device mode 1600 x 900 (format 22) confirmed
- [21:20:17.898] >> Device mode 1600 x 1024 (format 22) confirmed
- [21:20:17.898] >> Device mode 1680 x 1050 (format 22) confirmed
- [21:20:17.898] >> Device mode 1768 x 992 (format 22) confirmed
- [21:20:17.898] >> Device mode 1920 x 1080 (format 22) confirmed
- [21:20:17.898] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:17.898] Thread ID = 0x00003e44
- [21:20:17.898] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x08430000
- size 14103608
- [21:20:17.898] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:17.898] Thread ID = 0x00003e98
- [21:20:17.898] Thread handle = 0x0000046c
- Start address = 0x08439d10
- Thread local base = 0x002d2000
- [21:20:17.898] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:17.898] Thread ID = 0x00003e98
- [21:20:17.898] Thread exit code = 0
- [21:20:17.914] Debug event: UNLOAD_DLL_DEBUG_EVENT
- [21:20:17.914] Thread ID = 0x00003e44
- [21:20:17.914] base 0x08430000
- [21:20:17.930] >> Device mode 640 x 480 (format 22) confirmed
- [21:20:17.930] >> Device mode 720 x 480 (format 22) confirmed
- [21:20:17.930] >> Device mode 720 x 576 (format 22) confirmed
- [21:20:17.930] >> Device mode 800 x 600 (format 22) confirmed
- [21:20:17.930] >> Device mode 1024 x 768 (format 22) confirmed
- [21:20:17.930] >> Device mode 1152 x 864 (format 22) confirmed
- [21:20:17.930] >> Device mode 1176 x 664 (format 22) confirmed
- [21:20:17.930] >> Device mode 1280 x 720 (format 22) confirmed
- [21:20:17.930] >> Device mode 1280 x 768 (format 22) confirmed
- [21:20:17.930] >> Device mode 1280 x 800 (format 22) confirmed
- [21:20:17.930] >> Device mode 1280 x 960 (format 22) confirmed
- [21:20:17.930] >> Device mode 1280 x 1024 (format 22) confirmed
- [21:20:17.930] >> Device mode 1360 x 768 (format 22) confirmed
- [21:20:17.930] >> Device mode 1366 x 768 (format 22) confirmed
- [21:20:17.930] >> Device mode 1440 x 480 (format 22) confirmed
- [21:20:17.930] >> Device mode 1440 x 900 (format 22) confirmed
- [21:20:17.930] >> Device mode 1600 x 900 (format 22) confirmed
- [21:20:17.930] >> Device mode 1600 x 1024 (format 22) confirmed
- [21:20:17.930] >> Device mode 1680 x 1050 (format 22) confirmed
- [21:20:17.930] >> Device mode 1768 x 992 (format 22) confirmed
- [21:20:17.930] >> Device mode 1920 x 1080 (format 22) confirmed
- [21:20:17.930] >>
- Win95_Startup : 1920 x 1080
- [21:20:17.930] >>
- win95_initialiseD3D : 1920 x 1080
- [21:20:17.930] >> Initialize3DEnvironment(1920 x 1080 TNL:1)
- [21:20:17.930] >> Initialize3DEnvironment() - Requested width x height x format found in mode list
- [21:20:17.930] >> Puredevice set
- [21:20:17.930] Debug event: LOAD_DLL_DEBUG_EVENT
- [21:20:17.930] Thread ID = 0x00003e44
- [21:20:17.930] path C:\WINDOWS\SysWOW64\nvd3dum.dll
- base 0x08430000
- size 14103608
- [21:20:17.945] Debug event: CREATE_THREAD_DEBUG_EVENT
- [21:20:17.945] Thread ID = 0x00003e9c
- [21:20:17.945] Thread handle = 0x00000470
- Start address = 0x08439d10
- Thread local base = 0x002d5000
- [21:20:17.945] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:17.945] Thread ID = 0x00003e9c
- [21:20:17.945] Thread exit code = 0
- [21:20:17.961] >> D3DDevice created =
- [21:20:17.961] >> HAL (hw vp): NVIDIA GeForce GTX 970
- [21:20:17.961] >>
- [21:20:17.961] >>
- GP_win95 :: Running gfx at 32/24 bit
- [21:20:17.961] >> win95_startup() - Initialize3DEnvironment ok
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x0054cf4f
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to write to virtual address 0x00b4a000
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.961] Process tried to read from virtual address 0x5807008b
- [21:20:17.961] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.961] Thread ID = 0x00003e44
- [21:20:17.961] First chance exception
- [21:20:17.961] Exception address: 0x77672bee
- [21:20:17.961] Module name: '' (base 0x77640000, size 1540768)
- [21:20:17.961] Exception flags: 0x00000000
- [21:20:17.961] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.976] Process tried to read from virtual address 0x5807008b
- [21:20:17.976] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.976] Thread ID = 0x00003e50
- [21:20:17.976] First chance exception
- [21:20:17.976] Exception address: 0x00509fbd
- [21:20:17.976] Exception flags: 0x00000000
- [21:20:17.976] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.976] Process tried to read from virtual address 0x58070083
- [21:20:17.976] Debug event: EXCEPTION_DEBUG_EVENT
- [21:20:17.976] Thread ID = 0x00003e50
- [21:20:17.976] Unhandled exception
- [21:20:17.976] Exception address: 0x00509fbd
- [21:20:17.976] Exception flags: 0x00000000
- [21:20:17.976] Exception code: EXCEPTION_ACCESS_VIOLATION
- [21:20:17.976] Process tried to read from virtual address 0x58070083
- [21:20:17.976] Stack trace:
- 00509FBD: Grand Prix 4\GPxPatch.exe! <no symbol>
- 743A38F4: WINDOWS\SYSTEM32\KERNEL32.DLL! BaseThreadInitThunk + 36 bytes
- 776A56C3: WINDOWS\SYSTEM32\ntdll.dll! RtlUnicodeStringToInteger + 595 bytes
- 776A568E: WINDOWS\SYSTEM32\ntdll.dll! RtlUnicodeStringToInteger + 542 bytes
- [21:20:17.976] Registers:
- EAX=58070083 ECX=58070083 ESI=73CA7640
- EBX=0050A190 EDX=00000000 EDI=00000010
- CS:EIP=0023:00509FBD
- SS:ESP=002B:02EFFE90 EBP=02EFFF80
- DS=002B ES=002B FS=0053 GS=002B
- Flags=00010202
- Stack dump:
- 02effe90: 0054e75d 00000010 73ca7640 02efff80 '].T.....@v.s....'
- 02effea0: 02effeb4 0050a190 00000000 0050a190 '......P.......P.'
- 02effeb0: 00000000 0050a195 73c934e6 00000010 '......P..4.s....'
- 02effec0: 00000000 002404ca 00000000 00000000 '......$.........'
- 02effed0: 73c933e0 73c933e0 00000000 00000000 '.3.s.3.s........'
- 02effee0: 002404ca 00000000 fffde7f1 ffffffff '..$.............'
- 02effef0: 00000002 00000000 00000010 00000021 '............!...'
- 02efff00: 00000000 00000000 00000000 00000000 '................'
- 02efff10: 00000000 00000000 00000000 00000000 '................'
- 02efff20: 00000000 00000000 00000000 00000000 '................'
- 02efff30: 00000000 00000000 00000260 0000026c '........`...l...'
- 02efff40: 000002b0 00000000 00000000 00000000 '................'
- 02efff50: 00000000 00000000 00000000 00000000 '................'
- 02efff60: 00000000 00000000 00000000 00000000 '................'
- 02efff70: 00000000 00000000 00000000 0cbefb51 '............Q...'
- 02efff80: 02efff94 743a38f4 00000000 743a38d0 '.....8:t.....8:t'
- 02efff90: 0b303091 02efffdc 776a56c3 00000000 '.00......Vjw....'
- 02efffa0: 0800d427 00000000 00000000 00000000 ''...............'
- 02efffb0: c0000005 7481f2f0 00000000 02eff8a4 '.......t........'
- 02efffc0: 0800d427 02efffa0 02eff8a4 02efffe4 ''...............'
- 02efffd0: 776bec80 7d9c079b 00000000 02efffec '..kw...}........'
- 02efffe0: 776a568e ffffffff 776cb6fc 00000000 '.Vjw......lw....'
- 02effff0: 00000000 73c933e0 00000000 00000000 '.....3.s........'
- [21:20:19.838] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e50
- [21:20:19.838] Thread exit code = -1073741819
- [21:20:19.838] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e88
- [21:20:19.838] Thread exit code = -1073741819
- [21:20:19.838] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e84
- [21:20:19.838] Thread exit code = -1073741819
- [21:20:19.838] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e80
- [21:20:19.838] Thread exit code = -1073741819
- [21:20:19.838] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e7c
- [21:20:19.838] Thread exit code = -1073741819
- [21:20:19.838] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e4c
- [21:20:19.838] Thread exit code = -1073741819
- [21:20:19.838] Debug event: EXIT_THREAD_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e48
- [21:20:19.838] Thread exit code = -1073741819
- [21:20:19.838] Debug event: EXIT_PROCESS_DEBUG_EVENT
- [21:20:19.838] Thread ID = 0x00003e44
- [21:20:19.838] Process exit code = -1073741819
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement