12 Dec
2016
12 Dec
'16
7:40 p.m.
https://bugs.winehq.org/show_bug.cgi?id=41977 --- Comment #1 from Bruno Jesus <00cpxxx(a)gmail.com> --- Can you explain how you patched the exe? Like allocating more memory and pretending to return an offset higher then initial pointer to ensure there is enough memory for the erroneous attempts. How far from the initial pointer the game attempts to read? -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.