What i ment was if it started to kill those in areas with good healthcare.
Welcome to the BZU Archive dated December 24, 2009. Topics and posts are in read-only mode. Those with accounts will be able to login and browse anything the account had access granted to at the time. No changes to permissions will be made to be given access to particular content. If you have any questions, please reach out to squirrelof09/Rapazzini.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Sabre Tank on April 26, 2009, 03:05:26 PM
Here it is, it Av'ed while I was joining a game with a friend.
---- Battlezone II Log File ----
//=====================================================
App version: Patch 1.3TechAlpha5 Apr 23 2009 13:36:08
Windows version: Windows Version: 6.0.6001 'Service Pack 1' PlatformID=2
Last few battlezone.log lines (may or may not be relevant):
(done)
Exception code: C0000005 (ACCESS VIOLATION) READING from 00000000h
Message : Exception
Error occurred at 4/26/2009 16:59:24.
C:\Users\Dad\Desktop\Battlezone II Clean File\bzone.exe, run by Dad.
C:\Users\Dad\Desktop\Battlezone II Clean File\bzone.exe, run by Dad.
CPU: 1 processor(s), ?
?
Process Memory : 1874 MB free out of 2048 MB total
Physical memory: 300 MB free out of 1023 MB total
Page(swap) file: 1192 MB free out of 2310 MB total
This exe is using 35 MB, peak use 47 MB
Fault address: 00577ADF 01:00196ADF C:\Users\Dad\Desktop\Battlezone II Clean File\bzone.exe
Registers:
EAX:00000000
EBX:0459C6CC
ECX:00000001
EDX:77849A94
ESI:7FC60120
EDI:00000100
CS:EIP:001B:00577ADF
SS:ESP:0023:0226FAC8 EBP:04597068
DS:0023 ES:0023 FS:003B GS:0000
Flags:00010212
Call stack:
Address Return Function SourceFile
00577ADF 00000000 005763D1 Font::Read+0x000002AF
005763D1 00000000 00584513 FontSys::Create+0x000000F1
00584513 00000000 0042969A IFace::Init+0x000000E3
0042969A 00000000 00429606 HandledMain+0x0000044C
00429606 00000000 00429343 HandledMain+0x000003B8
00429343 00000000 00426BDF HandledMain+0x000000F5
00426BDF 00000000 0055B90F WinMain+0x00000059
0055B90F 00000000 76A64911 fabs+0x00000191
76A64911 00000000 7782E4B6 BaseThreadInitThunk+0x00000012
7782E4B6 00000000 7782E489 RtlInitializeExceptionChain+0x00000063
7782E489 00000000 00000000 RtlInitializeExceptionChain+0x00000036
Page created in 0.028 seconds with 17 queries.