I already tried everything tunning the virtual memory, closing all otrher backgroun programs, I disable the auto save feature, I checked I have the last upgrade but still the game keep crashing when saving and lately it crash in the middle of the game. this is the debug report :
Application exception occurred:
App: D:\GalCiv2\galciv2.exe (pid=3416)
When: 5/22/2006 @ 09:48:46.656
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: CARLOS
User Name: Owner
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 7 Stepping 10
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization: Familia Marin Pastrana
Registered Owner: Carlos Alberto
*----> Task List <----*
0 System Process
4 System
616 smss.exe
676 csrss.exe
704 winlogon.exe
748 services.exe
760 lsass.exe
896 svchost.exe
988 svchost.exe
1028 svchost.exe
1060 InCDsrv.exe
1200 svchost.exe
1268 svchost.exe
1400 spoolsv.exe
1492 CTsvcCDA.exe
1512 HawkSvc.exe
1540 HawkTask.exe
1544 apache.exe
1576 MDM.EXE
1596 nSvcIp.exe
1724 nvsvc32.exe
1768 SDMCP.exe
1824 svchost.exe
1864 wdfmgr.exe
1924 MsPMSPSv.exe
196 Explorer.EXE
268 nSvcAppFlt.exe
412 apache.exe
2792 alg.exe
3324 nvraidservice.exe
3388 nTrayFw.exe
3524 jusched.exe
3660 CTSysVol.exe
3760 CTDVDDet.EXE
3812 CTHELPER.EXE
184 point32.exe
2616 FlashIcon.EXE
1096 type32.exe
3188 gnotify.exe
3232 hpztsb04.exe
3344 InCD.exe
3444 apdproxy.exe
3676 RunDLL32.exe
180 MsnMsgr.Exe
2552 ctfmon.exe
2964 PCLETray.exe
3624 iwctrl.exe
3540 svchost.exe
3416 galciv2.exe
2992 wmiprvse.exe
3048 drwtsn32.exe
*----> Module List <----*
(0000000000400000 - 0000000000796000: D:\GalCiv2\galciv2.exe
(00000000007a0000 - 00000000009ef000: D:\GalCiv2\d3dx9_27.dll
(0000000000f20000 - 0000000000f27000: C:\PROGRA~1\Novatix\CYBERH~1\NIProc.dll
(0000000000f30000 - 0000000000f60000: C:\PROGRA~1\Novatix\CYBERH~1\CHWAH.dll
(0000000001130000 - 0000000001140000: C:\WINDOWS\system32\ctagent.dll
(0000000001bc0000 - 0000000001be0000: D:\GalCiv2\Miles\msseax.flt
(0000000001ff0000 - 0000000001ffd000: D:\GalCiv2\Miles\msssrs.flt
(0000000010000000 - 000000001007a000: D:\GalCiv2\Lib3D.dll
(0000000018000000 - 0000000018038000: D:\GalCiv2\binkw32.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000021100000 - 000000002118c000: D:\GalCiv2\mss32.dll
(0000000022300000 - 000000002230d000: D:\GalCiv2\Miles\mssds3d.flt
(0000000023000000 - 000000002300a000: D:\GalCiv2\Miles\mssdolby.flt
(0000000024100000 - 000000002411e000: D:\GalCiv2\Miles\mssdsp.flt
(0000000026400000 - 000000002643a000: D:\GalCiv2\Miles\mssvoice.asi
(0000000026f00000 - 0000000026f2e000: D:\GalCiv2\Miles\mssmp3.asi
(000000004fdd0000 - 000000004ff76000: C:\WINDOWS\system32\d3d9.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl32.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui.dll
(0000000061210000 - 000000006121f000: C:\Program Files\Microsoft Hardware\Mouse\POINT32.dll
(0000000061220000 - 0000000061232000: C:\Program Files\Microsoft Hardware\Mouse\MSH_ZWF.dll
(000000006d910000 - 000000006d981000: C:\WINDOWS\system32\D3DIM.DLL
(000000006d990000 - 000000006d996000: C:\WINDOWS\system32\d3d8thk.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000073760000 - 00000000737a9000: C:\WINDOWS\system32\ddraw.dll
(0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\system32\DCIMAN32.dll
(0000000073ee0000 - 0000000073ee4000: C:\WINDOWS\system32\KsUser.dll
(0000000073f10000 - 0000000073f6c000: C:\WINDOWS\system32\dsound.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\usp10.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077259000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
*----> State Dump for Thread Id 0x614 <----*
eax=00000004 ebx=0012fc7c ecx=00000001 edx=00cb2fdb esi=0012fbfc edi=71652fff
eip=00668cb3 esp=0012fbc0 ebp=00000004 iopl=0 nv up ei pl nz ac pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00200212
*** WARNING: Unable to verify checksum for D:\GalCiv2\galciv2.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for D:\GalCiv2\galciv2.exe -
function: galciv2!MemManager__Duplicate
00668c9d 2410 and al,0x10
00668c9f 85f6 test esi,esi
00668ca1 741a jz galciv2!MemManager__Duplicate+0x47d (00668cbd)
00668ca3 8b4304 mov eax,[ebx+0x4]
00668ca6 57 push edi
00668ca7 8b7b0c mov edi,[ebx+0xc]
00668caa 03f8 add edi,eax
00668cac 8bcd mov ecx,ebp
00668cae 8bc1 mov eax,ecx
00668cb0 c1e902 shr ecx,0x2
FAULT ->00668cb3 f3a5 rep movsd ds:0012fbfc=ffffffff es:71652fff=????????
00668cb5 8bc8 mov ecx,eax
00668cb7 83e103 and ecx,0x3
00668cba f3a4 rep movsb
00668cbc 5f pop edi
00668cbd 8b430c mov eax,[ebx+0xc]
00668cc0 5e pop esi
00668cc1 8d0c28 lea ecx,[eax+ebp]
00668cc4 5d pop ebp
00668cc5 894b0c mov [ebx+0xc],ecx
00668cc8 5b pop ebx
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00000004 00000000 00000000 00000000 00000000 galciv2!MemManager__Duplicate+0x473
*----> Raw Stack Dump <----*
000000000012fbc0 04 00 00 00 00 fc 12 00 - ff ff ff ff d0 05 00 00 ................
000000000012fbd0 bd 8f 66 00 fc fb 12 00 - 04 00 00 00 7c fc 12 00 ..f.........|...
000000000012fbe0 60 d1 ee 42 9a 80 57 00 - fc fb 12 00 04 00 00 00 `..B..W.........
000000000012fbf0 60 d1 ee 42 48 00 21 02 - 92 54 05 00 ff ff ff ff `..BH.!..T......
000000000012fc00 00 00 00 00 7c fc 12 00 - 00 00 00 00 85 2e cb 00 ....|...........
000000000012fc10 28 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 (...............
000000000012fc20 b4 fc 12 00 42 00 00 00 - a8 7f 2a 75 f1 e2 90 7c ....B.....*u...|
000000000012fc30 b7 24 80 7c c0 00 00 00 - 7e 03 00 00 00 00 00 00 .$.|....~.......
000000000012fc40 48 00 21 02 00 00 00 00 - 7c 6d 4e 1c cc fc 12 00 H.!.....|mN.....
000000000012fc50 58 ce 6d 00 00 00 00 00 - 9c 75 60 00 7c fc 12 00 X.m......u`.|...
000000000012fc60 00 00 00 00 ec fd 12 00 - 80 85 aa 5d fc fd 12 00 ...........]....
000000000012fc70 79 01 00 00 d4 03 00 00 - 00 00 00 00 c8 79 77 00 y............yw.
000000000012fc80 28 00 9a 70 6a 21 db 00 - d7 2f cb 00 6a 21 cb 00 (..pj!.../..j!..
000000000012fc90 00 00 10 00 00 00 00 00 - b1 04 12 00 00 00 00 00 ................
000000000012fca0 8f 01 00 00 00 00 00 00 - 00 00 00 00 04 00 00 00 ................
000000000012fcb0 48 79 2a 75 53 68 69 70 - 73 00 00 00 00 00 00 00 Hy*uShips.......
000000000012fcc0 00 00 00 00 00 00 00 00 - 7c 6d 4e 1c 48 fe 12 00 ........|mN.H...
000000000012fcd0 08 0f 6e 00 00 00 00 00 - 43 94 41 00 f6 62 01 00 ..n.....C.A..b..
000000000012fce0 b0 ec b7 5d ec 83 00 10 - 44 3a 5c 4d 79 20 44 6f ...]....D:\My Do
000000000012fcf0 63 75 6d 65 6e 74 73 5c - 4d 79 20 47 61 6d 65 73 cuments\My Games
*----> State Dump for Thread Id 0xe0c <----*
eax=0154ff4c ebx=00000000 ecx=77efa15c edx=7c90eb94 esi=00143080 edi=00000000
eip=7c90eb94 esp=0154fe1c ebp=0154ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0154ff80 77e76c22 0154ffa8 77e76a3b 00143080 ntdll!KiFastSystemCallRet
0154ff88 77e76a3b 00143080 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
0154ffa8 77e76c0a 0014def8 0154ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0154ffb4 7c80b50b 00163648 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
0154ffec 00000000 77e76bf0 00163648 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000154fe1c 99 e3 90 7c 03 67 e7 77 - 88 01 00 00 70 ff 54 01 ...|.g.w....p.T.
000000000154fe2c 00 00 00 00 38 7c 16 00 - 54 ff 54 01 c0 96 08 82 ....

..T.T.....
000000000154fe3c 00 00 00 00 fc 3c 88 c0 - 18 e6 03 89 45 03 00 00 .....<......E...
000000000154fe4c 64 9b 48 b3 aa ec 51 80 - 45 03 00 00 18 e6 03 89 d.H...Q.E.......
000000000154fe5c 00 c0 fa 7f 90 9b 48 b3 - f8 1f 60 c0 6c 9b 48 b3 ......H...`.l.H.
000000000154fe6c

e9 51 80 00 c0 fa 7f - 01 00 00 00 00 00 00 00 ..Q.............
000000000154fe7c 60 fd 3f c0 00 00 00 00 - 00 00 00 00 00 d0 fa 7f `.?.............
000000000154fe8c 28 9c 48 b3 df f0 51 80 - 90 9b 48 b3 00 00 00 00 (.H...Q...H.....
000000000154fe9c 00 00 00 00 00 00 00 00 - e0 de 25 89 20 e4 03 89 ..........%. ...
000000000154feac 01 e4 03 89 00 00 00 00 - 60 fd 3f c0 00 00 00 00 ........`.?.....
000000000154febc 00 00 00 00 00 00 10 00 - df 1b 00 00 ec e4 03 89 ................
000000000154fecc ff ff bd 01 20 e4 03 89 - 00 00 00 00 01 00 00 00 .... ...........
000000000154fedc 00 00 be 01 40 9b 48 b3 - 66 08 6d 80 ff ff ff ff
[email protected].....
000000000154feec 10 50 53 80 00 c0 fa 7f - ff ff ff ff 90 75 5a 80 .PS..........uZ.
000000000154fefc 08 c8 53 80 ff ff ff ff - b8 9c 48 b3 bc 9c 48 b3 ..S.......H...H.
000000000154ff0c 00 80 00 00 14 9d 48 b3 - cc 9c c3 88 24 9c 48 b3 ......H.....$.H.
000000000154ff1c d9 9a 4f 80 e1 9a 4f 80 - 9c 9c c3 88 30 9b c3 88 ..O...O.....0...
000000000154ff2c 64 9b c3 88 80 ff 54 01 - 99 66 e7 77 4c ff 54 01 d.....T..f.wL.T.
000000000154ff3c a9 66 e7 77 ed 10 90 7c - d0 24 16 00 48 36 16 00 .f.w...|.$..H6..
000000000154ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x190 <----*
eax=72d230e8 ebx=01adfef8 ecx=0000001f edx=7c910732 esi=00000000 edi=7ffd4000
eip=7c90eb94 esp=01adfed0 ebp=01adff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr Args to Child
01adff6c 7c809c86 00000002 01adffa4 00000000 ntdll!KiFastSystemCallRet
01adff88 72d2312a 00000002 01adffa4 00000000 kernel32!WaitForMultipleObjects+0x18
01adffb4 7c80b50b 00000000 0017b568 00129da0 wdmaud!midMessage+0x348
01adffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001adfed0 ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe ad 01 ...|...|........
0000000001adfee0 01 00 00 00 00 00 00 00 - 00 00 00 00 68 b5 17 00 ............h...
0000000001adfef0 00 00 00 00 00 00 00 00 - 6c 02 00 00 64 02 00 00 ........l...d...
0000000001adff00 ff ff ff ff b8 1c 32 b4 - bc 1c 32 b4 00 80 00 00 ......2...2.....
0000000001adff10 14 1d 32 b4 ec 19 c4 88 - 14 00 00 00 01 00 00 00 ..2.............
0000000001adff20 00 00 00 00 00 00 00 00 - 10 00 00 00 84 18 c4 88 ................
0000000001adff30 f0 3d 1b 89 8e 83 63 80 - 00 40 fd 7f 00 a0 fd 7f .=....c..@......
0000000001adff40 00 a0 fd 7f 00 00 00 00 - f8 fe ad 01 00 00 00 00 ................
0000000001adff50 02 00 00 00 ec fe ad 01 - 00 00 00 00 dc ff ad 01 ................
0000000001adff60 f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff ad 01 ...|...|........
0000000001adff70 86 9c 80 7c 02 00 00 00 - a4 ff ad 01 00 00 00 00 ...|............
0000000001adff80 ff ff ff ff 00 00 00 00 - b4 ff ad 01 2a 31 d2 72 ............*1.r
0000000001adff90 02 00 00 00 a4 ff ad 01 - 00 00 00 00 ff ff ff ff ................
0000000001adffa0 a0 9d 12 00 6c 02 00 00 - 64 02 00 00 00 00 00 00 ....l...d.......
0000000001adffb0 dc e2 90 7c ec ff ad 01 - 0b b5 80 7c 00 00 00 00 ...|.......|....
0000000001adffc0 68 b5 17 00 a0 9d 12 00 - 00 00 00 00 00 a0 fd 7f h...............
0000000001adffd0 00 c6 b3 8a c0 ff ad 01 - 68 ad fa 88 ff ff ff ff ........h.......
0000000001adffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000001adfff0 00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00 .....0.r........
0000000001ae0000 08 00 00 00 60 40 00 00 - 00 00 00 00 ff ff ff ff ....`@..........
*----> State Dump for Thread Id 0xfe8 <----*
eax=011a0000 ebx=01ddfdb8 ecx=01ddfe30 edx=7c90eb94 esi=00000000 edi=7ffd4000
eip=7c90eb94 esp=01ddfd90 ebp=01ddfe2c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\dsound.dll -
ChildEBP RetAddr Args to Child
01ddfe2c 7c809c86 00000001 01ddfe80 00000000 ntdll!KiFastSystemCallRet
01ddfe48 73f114a2 00000001 01ddfe80 00000000 kernel32!WaitForMultipleObjects+0x18
01ddfe60 73f1294a 00000001 000001f4 00000000 dsound+0x14a2
01ddff80 73f12a13 000001f4 00000000 00000000 dsound+0x294a
01ddffb4 7c80b50b 01551efc 006e0069 0012aad8 dsound+0x2a13
01ddffec 00000000 73f1b94b 01551efc 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001ddfd90 ab e9 90 7c f2 94 80 7c - 01 00 00 00 b8 fd dd 01 ...|...|........
0000000001ddfda0 01 00 00 00 00 00 00 00 - ec fd dd 01 00 00 00 00 ................
0000000001ddfdb0 01 00 00 00 01 00 00 00 - 9c 02 00 00 ab 95 80 7c ...............|
0000000001ddfdc0 f4 fd dd 01 22 95 80 7c - 58 83 55 01 00 00 00 00 ...."..|X.U.....
0000000001ddfdd0 00 00 00 00 ac 03 00 00 - 14 00 00 00 01 00 00 00 ................
0000000001ddfde0 00 00 00 00 00 00 00 00 - 10 00 00 00 c0 b4 b3 ff ................
0000000001ddfdf0 ff ff ff ff 14 00 00 00 - 00 40 fd 7f 00 80 fd 7f .........@......
0000000001ddfe00 00 00 00 00 ec fd dd 01 - b8 fd dd 01 40 fe dd 01 ............@...
0000000001ddfe10 01 00 00 00 ac fd dd 01 - 00 80 fd 7f dc ff dd 01 ................
0000000001ddfe20 f3 99 83 7c 90 95 80 7c - 00 00 00 00 48 fe dd 01 ...|...|....H...
0000000001ddfe30 86 9c 80 7c 01 00 00 00 - 80 fe dd 01 00 00 00 00 ...|............
0000000001ddfe40 f4 01 00 00 00 00 00 00 - 60 fe dd 01 a2 14 f1 73 ........`......s
0000000001ddfe50 01 00 00 00 80 fe dd 01 - 00 00 00 00 f4 01 00 00 ................
0000000001ddfe60 80 ff dd 01 4a 29 f1 73 - 01 00 00 00 f4 01 00 00 ....J).s........
0000000001ddfe70 00 00 00 00 80 fe dd 01 - fc 1e 55 01 fc 1e 55 01 ..........U...U.
0000000001ddfe80 9c 02 00 00 10 b8 80 7c - f1 e2 90 7c b7 24 80 7c .......|...|.$.|
0000000001ddfe90 ac 03 00 00 00 00 00 00 - bc fe dd 01 32 26 f1 73 ............2&.s
0000000001ddfea0 ac 03 00 00 e8 1e 55 01 - ab e9 90 7c f2 94 80 7c ......U....|...|
0000000001ddfeb0 00 80 fd 7f 44 ff dd 01 - ab 95 80 7c f0 fe dd 01 ....D......|....
0000000001ddfec0 22 95 80 7c 00 00 00 00 - fc 1e 55 01 fc 1e 55 01 "..|......U...U.
*----> State Dump for Thread Id 0x688 <----*
eax=73f1b94b ebx=0017e0d0 ecx=00140778 edx=7c910551 esi=00000000 edi=7ffd4000
eip=7c90eb94 esp=0210fd88 ebp=0210fe24 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0210fe24 7c809c86 00000040 0210fe78 00000000 ntdll!KiFastSystemCallRet
0210fe40 73f114a2 00000040 0210fe78 00000000 kernel32!WaitForMultipleObjects+0x18
0210fe58 73f1294a 00000040 ffffffff 00000000 dsound+0x14a2
0210ff78 73f19fbf ffffffff 0000003f 01556448 dsound+0x294a
0210ff98 73f1297e 7c9105c8 01553bc4 73f1b993 dsound!DirectSoundCreate+0x537c
0210ffb4 7c80b50b 01553bc4 7c9105c8 00165e80 dsound+0x297e
0210ffec 00000000 73f1b94b 01553bc4 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000210fd88 ab e9 90 7c f2 94 80 7c - 40 00 00 00 d0 e0 17 00 ...|...|@.......
000000000210fd98 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000210fda8 40 00 00 00 01 00 00 00 - f0 ee 00 c0 f8 ee 00 c0 @...............
000000000210fdb8 00 00 00 00 00 00 00 00 - 38 00 00 00 23 00 00 00 ........8...#...
000000000210fdc8 23 00 00 00 c8 05 91 7c - 14 00 00 00 01 00 00 00 #......|........
000000000210fdd8 00 00 00 00 00 00 00 00 - 10 00 00 00 a8 5e 16 00 .............^..
000000000210fde8 56 08 81 7c 1b 00 00 00 - 00 40 fd 7f 00 90 fd 7f V..|.....@......
000000000210fdf8 00 90 fd 7f 00 00 00 00 - d0 e0 17 00 ff ff ff ff ................
000000000210fe08 40 00 00 00 a4 fd 10 02 - 30 db 57 b3 dc ff 10 02 @.......0.W.....
000000000210fe18 f3 99 83 7c 90 95 80 7c - 00 00 00 00 40 fe 10 02 ...|...|....@...
000000000210fe28 86 9c 80 7c 40 00 00 00 - 78 fe 10 02 00 00 00 00 ...|@...x.......
000000000210fe38 ff ff ff ff 00 00 00 00 - 58 fe 10 02 a2 14 f1 73 ........X......s
000000000210fe48 40 00 00 00 78 fe 10 02 - 00 00 00 00 ff ff ff ff @...x...........
000000000210fe58 78 ff 10 02 4a 29 f1 73 - 40 00 00 00 ff ff ff ff x...J).s@.......
000000000210fe68 00 00 00 00 78 fe 10 02 - c4 3b 55 01 c4 3b 55 01 ....x....;U..;U.
000000000210fe78 4c 01 00 00 0c 03 00 00 - 08 03 00 00 14 03 00 00 L...............
000000000210fe88 10 03 00 00 28 03 00 00 - 54 01 00 00 e8 02 00 00 ....(...T.......
000000000210fe98 ec 02 00 00 f4 02 00 00 - f8 02 00 00 04 03 00 00 ................
000000000210fea8 00 03 00 00 f0 02 00 00 - e4 02 00 00 e0 02 00 00 ................
000000000210feb8 dc 02 00 00 d8 02 00 00 - d4 02 00 00 d0 02 00 00 ................
*----> State Dump for Thread Id 0xe8c <----*
eax=000000b0 ebx=7c8024a7 ecx=01f31b28 edx=01f31020 esi=00000334 edi=00000000
eip=7c90eb94 esp=0220ff1c ebp=0220ff80 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for D:\GalCiv2\mss32.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for D:\GalCiv2\mss32.dll -
ChildEBP RetAddr Args to Child
0220ff80 7c802542 00000334 00000005 00000000 ntdll!KiFastSystemCallRet
0220ff94 211015c1 00000334 00000005 7c91094e kernel32!WaitForSingleObject+0x12
0220ffec 00000000 21101530 00000000 00000000 mss32!AIL_get_preference+0x541
*----> Raw Stack Dump <----*
000000000220ff1c c0 e9 90 7c db 25 80 7c - 34 03 00 00 00 00 00 00 ...|.%.|4.......
000000000220ff2c 50 ff 20 02 30 25 80 7c - 6e 9c 80 7c a7 24 80 7c P. .0%.|n..|.$.|
000000000220ff3c 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000220ff4c 10 00 00 00 b0 3c ff ff - ff ff ff ff 00 40 fd 7f .....<.......@..
000000000220ff5c 00 70 fd 7f 50 ff 20 02 - 6e 9c 80 7c 30 ff 20 02 .p..P. .n..|0. .
000000000220ff6c 80 22 11 21 dc ff 20 02 - f3 99 83 7c 08 26 80 7c .".!.. ....|.&.|
000000000220ff7c 00 00 00 00 94 ff 20 02 - 42 25 80 7c 34 03 00 00 ...... .B%.|4...
000000000220ff8c 05 00 00 00 00 00 00 00 - ec ff 20 02 c1 15 10 21 .......... ....!
000000000220ff9c 34 03 00 00 05 00 00 00 - 4e 09 91 7c 00 00 00 00 4.......N..|....
000000000220ffac 45 09 91 7c 34 03 00 00 - c4 00 00 00 0b b5 80 7c E..|4..........|
000000000220ffbc 00 00 00 00 45 09 91 7c - 4e 09 91 7c 00 00 00 00 ....E..|N..|....
000000000220ffcc 00 70 fd 7f 00 c6 b3 8a - c0 ff 20 02 b8 14 05 89 .p........ .....
000000000220ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
000000000220ffec 00 00 00 00 00 00 00 00 - 30 15 10 21 00 00 00 00 ........0..!....
000000000220fffc 00 00 00 00 08 00 00 00 - 00 01 00 02 ee ff ee ff ................
000000000221000c 00 00 00 00 00 00 f0 00 - 00 00 00 00 00 00 21 02 ..............!.
000000000221001c 00 02 00 00 40 00 21 02 - 00 00 41 02 00 00 00 00 ....@.!...A.....
000000000221002c 00 00 00 00 00 00 00 00 - 00 00 00 00 40 00 21 02 ............@.!.
000000000221003c 00 00 00 00 aa af 08 00 - 18 01 08 02 f3 b2 6c 44 ..............lD
000000000221004c f8 00 00 00 f8 00 00 00 - 00 00 00 00 b8 c5 31 02 ..............1.
*----> State Dump for Thread Id 0x644 <----*
eax=00000000 ebx=023c1ca0 ecx=42e4a678 edx=0365e088 esi=000001b4 edi=00000000
eip=7c90eb94 esp=05d5fef4 ebp=05d5ff58 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
05d5ff58 7c802542 000001b4 ffffffff 00000000 ntdll!KiFastSystemCallRet
05d5ff6c 005ee75b 000001b4 ffffffff 0012f3ec kernel32!WaitForSingleObject+0x12
05d5ffb4 7c80b50b 023c1ca0 0012f3ec 0012f4e6 galciv2+0x1ee75b
05d5ffec 00000000 006b35e7 023c1ca0 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000005d5fef4 c0 e9 90 7c db 25 80 7c - b4 01 00 00 00 00 00 00 ...|.%.|........
0000000005d5ff04 00 00 00 00 30 25 80 7c - 4c 9c 80 7c a0 1c 3c 02 ....0%.|L..|..<.
0000000005d5ff14 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005d5ff24 10 00 00 00 08 f7 cc 88 - 3c f7 cc 88 00 40 fd 7f ........<....@..
0000000005d5ff34 00 60 fd 7f 00 00 00 00 - 00 00 00 00 08 ff d5 05 .`..............
0000000005d5ff44 84 3c f4 b2 a4 ff d5 05 - f3 99 83 7c 08 26 80 7c .<.........|.&.|
0000000005d5ff54 00 00 00 00 6c ff d5 05 - 42 25 80 7c b4 01 00 00 ....l...B%.|....
0000000005d5ff64 ff ff ff ff 00 00 00 00 - b4 ff d5 05 5b e7 5e 00 ............[.^.
0000000005d5ff74 b4 01 00 00 ff ff ff ff - ec f3 12 00 a0 1c 3c 02 ..............<.
0000000005d5ff84 56 36 6b 00 00 00 00 00 - ec f3 12 00 e6 f4 12 00 V6k.............
0000000005d5ff94 a0 1c 3c 02 00 00 00 00 -

ff d5 05 14 01 50 80 ..<...........P.
0000000005d5ffa4 dc ff d5 05 dc 42 6b 00 - a0 5e 73 00 00 00 00 00 .....Bk..^s.....
0000000005d5ffb4 ec ff d5 05 0b b5 80 7c - a0 1c 3c 02 ec f3 12 00 .......|..<.....
0000000005d5ffc4 e6 f4 12 00 a0 1c 3c 02 - 00 60 fd 7f 00 c6 b3 8a ......<..`......
0000000005d5ffd4 c0 ff d5 05 e0 62 cf 88 - ff ff ff ff f3 99 83 7c .....b.........|
0000000005d5ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
0000000005d5fff4 e7 35 6b 00 a0 1c 3c 02 - 00 00 00 00 00 00 00 00 .5k...<.........
0000000005d60004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005d60014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005d60024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x738 <----*
eax=40700000 ebx=7c802530 ecx=3fc00000 edx=05e5fee8 esi=0000038c edi=00000000
eip=7c90eb94 esp=05e5fef0 ebp=05e5ff54 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
05e5ff54 7c802542 0000038c ffffffff 00000000 ntdll!KiFastSystemCallRet
05e5ff68 005f2fdb 0000038c ffffffff 3ffbcccc kernel32!WaitForSingleObject+0x12
05e5ffb4 7c80b50b 023c2250 3ffbcccc 48000000 galciv2+0x1f2fdb
05e5ffec 00000000 006b35e7 023c2250 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000005e5fef0 c0 e9 90 7c db 25 80 7c -

03 00 00 00 00 00 00 ...|.%.|........
0000000005e5ff00 00 00 00 00 24 00 00 00 - 00 00 00 00 30 25 80 7c ....$.......0%.|
0000000005e5ff10 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005e5ff20 10 00 00 00 95 8b 5c 00 - 1a 00 00 00 00 40 fd 7f ......\......@..
0000000005e5ff30 00 50 fd 7f 00 00 00 00 - e0 4f 86 42 04 ff e5 05 .P.......O.B....
0000000005e5ff40 bf ea 5b 00 a4 ff e5 05 - f3 99 83 7c 08 26 80 7c ..[........|.&.|
0000000005e5ff50 00 00 00 00 68 ff e5 05 - 42 25 80 7c

03 00 00 ....h...B%.|....
0000000005e5ff60 ff ff ff ff 00 00 00 00 - b4 ff e5 05 db 2f 5f 00 ............./_.
0000000005e5ff70

03 00 00 ff ff ff ff - cc cc fb 3f 50 22 3c 02 ...........?P"<.
0000000005e5ff80 50 22 3c 02 56 36 6b 00 - 00 00 00 00 cc cc fb 3f P"<.V6k........?
0000000005e5ff90 00 00 00 48 50 22 3c 02 - 00 00 00 00

ff e5 05 ...HP"<.........
0000000005e5ffa0 14 01 50 80 dc ff e5 05 - dc 42 6b 00 a0 5e 73 00 ..P......Bk..^s.
0000000005e5ffb0 00 00 00 00 ec ff e5 05 - 0b b5 80 7c 50 22 3c 02 ...........|P"<.
0000000005e5ffc0 cc cc fb 3f 00 00 00 48 - 50 22 3c 02 00 50 fd 7f ...?...HP"<..P..
0000000005e5ffd0 00 c6 b3 8a c0 ff e5 05 - 80 71 c5 88 ff ff ff ff .........q......
0000000005e5ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000005e5fff0 00 00 00 00 e7 35 6b 00 - 50 22 3c 02 00 00 00 00 .....5k.P"<.....
0000000005e60000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005e60010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005e60020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xc90 <----*
eax=03973d50 ebx=7c8024a7 ecx=0001c344 edx=7c90eb94 esi=00000410 edi=00000000
eip=7c90eb94 esp=593dff24 ebp=593dff88 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for D:\GalCiv2\binkw32.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for D:\GalCiv2\binkw32.dll -
ChildEBP RetAddr Args to Child
593dff88 7c802542 00000410 0000000c 00000000 ntdll!KiFastSystemCallRet
593dff9c 180124e1 00000410 0000000c 00000010 kernel32!WaitForSingleObject+0x12
593dffec 00000000 18012480 03929f20 00000000 binkw32!BinkGetPalette+0xe01
*----> Raw Stack Dump <----*
00000000593dff24 c0 e9 90 7c db 25 80 7c - 10 04 00 00 00 00 00 00 ...|.%.|........
00000000593dff34 58 ff 3d 59 30 25 80 7c - 20 9f 92 03 a7 24 80 7c X.=Y0%.| ....$.|
00000000593dff44 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000593dff54 10 00 00 00 40 2b fe ff - ff ff ff ff 00 40 fd 7f ....@+.......@..
00000000593dff64 00 d0 fd 7f 58 ff 3d 59 - b4 20 19 01 38 ff 3d 59 ....X.=Y. ..8.=Y
00000000593dff74 f8 98 d0 88 dc ff 3d 59 - f3 99 83 7c 08 26 80 7c ......=Y...|.&.|
00000000593dff84 00 00 00 00 9c ff 3d 59 - 42 25 80 7c 10 04 00 00 ......=YB%.|....
00000000593dff94 0c 00 00 00 00 00 00 00 - ec ff 3d 59 e1 24 01 18 ..........=Y.$..
00000000593dffa4 10 04 00 00 0c 00 00 00 - 10 00 00 00 48 ed 12 00 ............H...
00000000593dffb4 20 9f 92 03 0b b5 80 7c - 20 9f 92 03 10 00 00 00 ......| .......
00000000593dffc4 48 ed 12 00 20 9f 92 03 - 00 d0 fd 7f 00 c6 b3 8a H... ...........
00000000593dffd4 c0 ff 3d 59 50 31 f9 88 - ff ff ff ff f3 99 83 7c ..=YP1.........|
00000000593dffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
00000000593dfff4 80 24 01 18 20 9f 92 03 - 00 00 00 00 00 00 00 00 .$.. ...........
00000000593e0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000593e0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000593e0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000593e0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000593e0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000593e0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................