0x00402BB3 0x00000000 0x03A3FB94 0x00000000 0x03A3FFD4 EDI: 0x0048B6CE 0x0307BCB0 +0070: +0050: 0x00000000 0x00000000 0x6F437265 EFLAGS: 0x79616C50 0x00000000 ECX: EBP: SA-MP 0x039519A8 0x004A4104 0x00000400 0x0047CF0B ESI: 0x0000000C 0x00000000 +0090: 0x7EFEFEFF 0x000B3258 +0080: 0x000B7214 0x63656E6E +00E0: +00D0: 0x00010216 0x00772BF0 ESP: 0x00000000 +0100: +0000: +00F0: 0x0003740C +0020: 0x0307BCB0 0x00778250 0x00000006 0x00480069 +00A0: 0x00778250 0x03988DB4 0x00778250 Server: 0x00000000 EAX: 0x000B3258 +0030: crb 0x0028EAEC 0x03520020 0x00000000 0x0028E62C 0x03A3FB84 0x039519A8 0x039587A0 0x000B71E0 [/CODE] 0x00000000
C++:
R2 код Exception 0x65747449 0x03A3FB84 0x00778250 [CODE] 0x00000000 0x000B6DD0 0x00000000 0x00778250 0x00000000 0x00000000 0x6E4F5F72 0x03A3FB84 0x0028EAFC +0130: +00B0: +0120: 0x00000100 краща Stack: 0x00000000 0x00778250 0x00000000 Address: 0x00480074 0x00000000 0x00000000 +0110: 0x00000000 +0060: 0x03950020 +0010: Registers: 0x0048C19E 0x00000000 0x00000000 0x039519A8 0x03520020 0x0028E5D4 0x43F88000 0x00778250 0x00000000 -------------------------- At 0x0028F438 0x00000000 EDX: 0x00778250 0x000B6DD0 0x00000000 +00C0: +0040: 0x00000400 0x00000000 0x00778250 0x00401096 0x00000000 0x0028E664 EBX: 0x0307BCB0 0x41200000 0x03988DB4 0x00000034 0x00000000
Последнее редактирование модератором: