Okay...what's the game hiding now...
I tried to hack into the Uplink Laboratories Mainframe, but when I click on the cypher button to crack it, the game crashes EVERY time I try. I've already done the other steps...and there's just this left to continue a seemingly endless wander
Any reason for the crash?
Edit: Debug log:
Quote:
Message : Tried to run an invalid screenid 7, computer 'Uplink Laboratories Central Mainframe' (66.29.142.206)
Location : .\interface\remoteinterface\remoteinterface.cpp, line 360
============== B E G I N C O R E D U M P =================
retAddress = 00402600
retAddress = 0047601A
retAddress = 005E2BB1
retAddress = 0066AA45
retAddress = 006EC29E
retAddress = 0012FE78
============== E N D C O R E D U M P =====================
Crash dump (using windbg):
Quote:
User Mini Dump File: Only registers, stack and portions of memory are available
Symbol search path is: C:\Program Files\Uplink;C:\symbols;C:\Windows\Symbols
Executable search path is:
Windows Server 2008/Windows Vista SP1 Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Mon Dec 1 21:28:07.000 2008 (GMT-5)
System Uptime: not available
Process Uptime: 0 days 0:00:24.000
........................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(16a0.13a4): Access violation - code c0000005 (first/second chance not available)
eax=0012e300 ebx=ffffffff ecx=000002b0 edx=03007368 esi=0012ec98 edi=00000000
eip=77969a94 esp=0012e2d0 ebp=0012e2e0 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!KiFastSystemCallRet:
77969a94 c3 ret
0:000> .ecxr
eax=00000008 ebx=07b1b96c ecx=00000001 edx=00000001 esi=024acf08 edi=00000007
eip=0048ab66 esp=0012fb50 ebp=0012fc20 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
*** ERROR: Module load completed but symbols could not be loaded for Onlink-SSE2.exe
Onlink_SSE2+0x8ab66:
0048ab66 c6050000000000 mov byte ptr ds:[0],0 ds:0023:00000000=??