• Welcome to Battlezone Universe.
 

News:

Welcome to the BZU Archive dated December 24, 2009. Topics and posts are in read-only mode. Those with accounts will be able to login and browse anything the account had access granted to at the time. No changes to permissions will be made to be given access to particular content. If you have any questions, please reach out to squirrelof09/Rapazzini.

Main Menu

AV (First one for me in 1.3 ta5)

Started by Sabre Tank, April 26, 2009, 03:05:26 PM

Previous topic - Next topic

Sabre Tank

Here it is, it Av'ed while I was joining a game with a friend.



---- Battlezone II Log File ----
//=====================================================
App version: Patch 1.3TechAlpha5 Apr 23 2009 13:36:08
Windows version: Windows Version: 6.0.6001 'Service Pack 1' PlatformID=2

Last few battlezone.log lines (may or may not be relevant):




(done)

Exception code: C0000005 (ACCESS VIOLATION) READING from 00000000h
Message :  Exception
Error occurred at 4/26/2009 16:59:24.
C:\Users\Dad\Desktop\Battlezone II Clean File\bzone.exe, run by Dad.
C:\Users\Dad\Desktop\Battlezone II Clean File\bzone.exe, run by Dad.
CPU: 1 processor(s), ?
     ?
Process Memory :   1874 MB free out of   2048 MB total
Physical memory:    300 MB free out of   1023 MB total
Page(swap) file:   1192 MB free out of   2310 MB total
This exe is using 35 MB, peak use 47 MB

Fault address:  00577ADF 01:00196ADF C:\Users\Dad\Desktop\Battlezone II Clean File\bzone.exe

Registers:
EAX:00000000
EBX:0459C6CC
ECX:00000001
EDX:77849A94
ESI:7FC60120
EDI:00000100
CS:EIP:001B:00577ADF
SS:ESP:0023:0226FAC8  EBP:04597068
DS:0023  ES:0023  FS:003B  GS:0000
Flags:00010212

Call stack:
Address   Return    Function            SourceFile
00577ADF  00000000  005763D1  Font::Read+0x000002AF
005763D1  00000000  00584513  FontSys::Create+0x000000F1
00584513  00000000  0042969A  IFace::Init+0x000000E3
0042969A  00000000  00429606  HandledMain+0x0000044C
00429606  00000000  00429343  HandledMain+0x000003B8
00429343  00000000  00426BDF  HandledMain+0x000000F5
00426BDF  00000000  0055B90F  WinMain+0x00000059
0055B90F  00000000  76A64911  fabs+0x00000191
76A64911  00000000  7782E4B6  BaseThreadInitThunk+0x00000012
7782E4B6  00000000  7782E489  RtlInitializeExceptionChain+0x00000063
7782E489  00000000  00000000  RtlInitializeExceptionChain+0x00000036


Killer AK

it's easy to forget, all the ones we used to get before lol!
Thanks for the work GSH