Displaying 5 results from an estimated 5 matches for "0000031c".
Did you mean:
0000001c
2007 Mar 19
1
Screen not changing from 640x480 to 800x600 - "Shogun - Total War"
Wine 9.30
Slackware 11
ATI FireGL 5200 (Propriatory drivers)
I found Shogun in a shop as a 'Classic' game and I've been trying to get
it to work using Wine.
Shogun uses Safedisc and so does not work in it's, ahem, original form.
However it can, shall we say, be persuaded to get over it's
difficulties and at least run.
This is where I am now. I have the game running and
2010 Jul 23
2
Debugging Leage of Legends
...ite access to 0x00360000 in 32-bit code (0x7eac556d).
Register dump:
CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
EIP:7eac556d ESP:0033f8c0 EBP:0033f938 EFLAGS:00010212( R- -- I -A- - )
EAX:80808081 EBX:7eb63ff4 ECX:00000000 EDX:00000067
ESI:000000ac EDI:00360000
Stack dump:
0x0033f8c0: 0000031c 00000000 00000000 00000010
0x0033f8d0: 00000010 00000000 00000000 00000010
0x0033f8e0: 00000010 7ed4c7e8 0012d2e0 00000000
0x0033f8f0: 00cc0020 00000308 00330001 7ea20001
0x0033f900: 0033f918 0000031c 0012db50 00000328
0x0033f910: 00000000 00000000 00000010 00000010
Backtrace:
=>0 0x7eac556...
2010 Aug 26
4
UT3 hangs at start
Hi!When start game through steam or shortcut on desktop,game halt when push
"launch" button, after 2-5 seconds and unreal logo becomes gray.In terminal i
have "wine: Unhandled stack overflow at address 0x34c7a12 (thread 0044),
starting debugger..." and no more.Close game with compulsory exit.Before that
game start perfectly on wine 1.2 or wine 1.3,the problem has appeared
2012 Jun 17
6
Wine with Secure Computing SofToken II
Hello
I've tried to move from my Windows7 x86_64 to my Gentoo (x86_64) SofTokenII application.
What i did:
1. moved Program Files (x86)/Secure Computing/SofToken-II directory
2. added to registry (wine regedit file.reg):
[HKEY_LOCAL_MACHINE\SOFTWARE\Secure Computing]
[HKEY_LOCAL_MACHINE\SOFTWARE\Secure Computing\Agent]
[HKEY_LOCAL_MACHINE\SOFTWARE\Secure Computing\Agent\myuser]
2011 Aug 03
5
Impulse fails to start
...ite access to 0x00360000 in 32-bit code (0x685bf54b).
Register dump:
CS:0073 SS:007b DS:007b ES:007b FS:0033 GS:003b
EIP:685bf54b ESP:0033f820 EBP:0033f898 EFLAGS:00010a02( R- --O I - - - )
EAX:80808081 EBX:6865fff4 ECX:00000000 EDX:00000067
ESI:000000ac EDI:00360000
Stack dump:
0x0033f820: 0000031c 00000000 00000000 00000010
0x0033f830: 00000010 00000000 00000000 00000010
0x0033f840: 00000010 68471d9c 00134788 00000000
0x0033f850: 00cc0020 00000000 00330001 6c4e0001
0x0033f860: 0033f878 0000031c 00134ff8 00000328
0x0033f870: 00000000 00000000 00000010 00000010
Backtrace:
=>0 0x685bf54...