- Registrado
- 1 de Julio de 2017
- Mensajes
- 59
- Puntuación de reacción
- 16
Oi pessoal,
Eu tentei jogar o mod agora há pouco e o jogo fechou sozinho antes de inicializar.
Por causa do limit de palavras por post eu vou dividir o log em duas partes. A primeira está abaixo:
Hello everybody,
I tried to play this mod just now and the game crashed to desktop.
Because of the limit of the words by post I'll divide the log in 2 parts. The first is below
Starting log
GPxPatch version: 4.44
GPx version detected: decrypted GP4 v1.02
Date/time: 2-10-2017 14:04
Verbosity level is 0
OS version info: Windows 10 build 15063
Total physical memory: 4095 MB (free: 2481 MB)
Debugging gp4.exe
Process will run on CPU 0 only
Waiting for debug events...
Injecting DLL loading code...
Injection succesful
First chance exception
Exception address: 0x744c3143
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00c42151
First chance exception
Exception address: 0x744c3143
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00c44c05
First chance exception
Exception address: 0x4006d001
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x4006d001
Unhandled exception
Exception address: 0x4006d001
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x4006d001
Stack trace:
4006D001: <no module><no symbol>
776AF30F: WINDOWS\SYSTEM32\ntdll.dll! RtlDeactivateActivationContextUnsafeFast + 895 bytes
776A8BE0: WINDOWS\SYSTEM32\ntdll.dll! RtlQueueWorkItem + 1904 bytes
776A8A76: WINDOWS\SYSTEM32\ntdll.dll! RtlQueueWorkItem + 1542 bytes
776A5A1B: WINDOWS\SYSTEM32\ntdll.dll! TpCallbackIndependent + 443 bytes
776AC910: WINDOWS\SYSTEM32\ntdll.dll! LdrGetDllHandleEx + 1360 bytes
776BDD3D: WINDOWS\SYSTEM32\ntdll.dll! LdrFindEntryForAddress + 413 bytes
776C03FE: WINDOWS\SYSTEM32\ntdll.dll! LdrLoadDll + 126 bytes
74787684: WINDOWS\System32\KERNELBASE.dll! LoadLibraryExW + 324 bytes
74786096: WINDOWS\System32\KERNELBASE.dll! LoadLibraryExA + 38 bytes
74785DF2: WINDOWS\System32\KERNELBASE.dll! LoadLibraryA + 50 bytes
005372FD: <no module><no symbol>
0054BB5C: <no module><no symbol>
00537423: <no module><no symbol>
0BE0E800: <no module><no symbol>
05E80000: <no module><no symbol>
E8FFFEB9: <no module><no symbol>
FFFEC712: <no module><no symbol>
FEC31BE8: <no module><no symbol>
CBA3E8FF: <no module><no symbol>
02E8FFFE: <no module><no symbol>
B8FFFFE2: <no module><no symbol>
Registers:
EAX=00000000 ECX=4006D001 ESI=0019F6D4
EBX=00000001 EDX=40000000 EDI=40000000
CS:EIP=0023:4006D001
SS:ESP=002B:0019F6C4 EBP=0019F6E0
DS=002B ES=002B FS=0053 GS=002B
Flags=00210246
Eu tentei jogar o mod agora há pouco e o jogo fechou sozinho antes de inicializar.
Por causa do limit de palavras por post eu vou dividir o log em duas partes. A primeira está abaixo:
Hello everybody,
I tried to play this mod just now and the game crashed to desktop.
Because of the limit of the words by post I'll divide the log in 2 parts. The first is below
Starting log
GPxPatch version: 4.44
GPx version detected: decrypted GP4 v1.02
Date/time: 2-10-2017 14:04
Verbosity level is 0
OS version info: Windows 10 build 15063
Total physical memory: 4095 MB (free: 2481 MB)
Debugging gp4.exe
Process will run on CPU 0 only
Waiting for debug events...
Injecting DLL loading code...
Injection succesful
First chance exception
Exception address: 0x744c3143
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00c42151
First chance exception
Exception address: 0x744c3143
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x00c44c05
First chance exception
Exception address: 0x4006d001
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x4006d001
Unhandled exception
Exception address: 0x4006d001
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x4006d001
Stack trace:
4006D001: <no module><no symbol>
776AF30F: WINDOWS\SYSTEM32\ntdll.dll! RtlDeactivateActivationContextUnsafeFast + 895 bytes
776A8BE0: WINDOWS\SYSTEM32\ntdll.dll! RtlQueueWorkItem + 1904 bytes
776A8A76: WINDOWS\SYSTEM32\ntdll.dll! RtlQueueWorkItem + 1542 bytes
776A5A1B: WINDOWS\SYSTEM32\ntdll.dll! TpCallbackIndependent + 443 bytes
776AC910: WINDOWS\SYSTEM32\ntdll.dll! LdrGetDllHandleEx + 1360 bytes
776BDD3D: WINDOWS\SYSTEM32\ntdll.dll! LdrFindEntryForAddress + 413 bytes
776C03FE: WINDOWS\SYSTEM32\ntdll.dll! LdrLoadDll + 126 bytes
74787684: WINDOWS\System32\KERNELBASE.dll! LoadLibraryExW + 324 bytes
74786096: WINDOWS\System32\KERNELBASE.dll! LoadLibraryExA + 38 bytes
74785DF2: WINDOWS\System32\KERNELBASE.dll! LoadLibraryA + 50 bytes
005372FD: <no module><no symbol>
0054BB5C: <no module><no symbol>
00537423: <no module><no symbol>
0BE0E800: <no module><no symbol>
05E80000: <no module><no symbol>
E8FFFEB9: <no module><no symbol>
FFFEC712: <no module><no symbol>
FEC31BE8: <no module><no symbol>
CBA3E8FF: <no module><no symbol>
02E8FFFE: <no module><no symbol>
B8FFFFE2: <no module><no symbol>
Registers:
EAX=00000000 ECX=4006D001 ESI=0019F6D4
EBX=00000001 EDX=40000000 EDI=40000000
CS:EIP=0023:4006D001
SS:ESP=002B:0019F6C4 EBP=0019F6E0
DS=002B ES=002B FS=0053 GS=002B
Flags=00210246