0xBDD6B828 0x00B76BD0 0x00B768B8 0x00000000 +0270: 0x00000008 0x09CC875C 0x76FFC340 +01D0: EBP: 0x875879E9 EAX: 0x08EF8348 0x00000000 Version: 0x004D9486 +01A0: 0x00000000 +0190: +0080: 0x3F7FE98B 0x00000102 0x0000012C 0x76FFD9A3 ESI: 0x000C0310 0x00000000 0x3F7FE98B +0050: 0x09FD2794 0x00000000 0x4517B515 0x0043E625 Registers: 0x00000000 0x00748DA0 +0220: 0x00000000 0x02F109F8 0xC309616C 0x00000000 0x0022FF78 0x59344437 0x034BFF40 +0180: 0x00000258 +0140: 0x41ACAABB 0x470, 0x000000DB 0x000000DB 0x00000000 0x0022FD6C +0040: +0210: 0x00400000 0x8758A45F 0x41ACAABB 0x0043E577 +01F0: Context: 0x3D75C28F 0x02ED7986 0x3B541172 0x3E439BDC 0x00000001 0x00000000 +0070: 0x875879E9 0x005DFB34 0x00000000 0x00000000 +0010: 0x3F800000 +0110: 0x401F0001 0xBCD6710B Game 0x0022FF88 US +0020: 0x00441088 0x0022FCAC 0x00000000 0x00400000 +01E0: 0x0000000A 0xBDD6B828 +00E0: 0x00A91DB0 EDX: +00C0: 0x00010206 0x0053ECC2 0x00000000 0x000000DB 0x0000001A 0.3e +0200: ESP: +0160: 0xC53B8000 0x00000190 0x8758A45F At 0xC4E91BD7 0x00000000 0x00000001 0x452112E1 0x451FABD7 0x008246EB 0x00B768B8 0x43A43EAC State 0x00000000 0x43C80000 0x00000001 0x00000001 +0230: 0x8758A45F 0x0000002C 0x0022FD94 Address: 0x0053E986 Stack: 0x01932185 Information: 0x0022FD38 0x0000001A 0x00000000 0x0000001A 0x76FFD9A3 0x0000000A 0xC50B928F +00F0: +01B0: 1.0 0x451715C0 0x09CC8718 0x00000000 0x00000073 0x0022F804 0xB78B4790 EFLAGS: 0xC309616C Exception 0x4F075874 0x00000000 +01C0: 0x0022FF88 0x02EEBCD4 0x00000000 0x02EA0BF6 0x01610000 0x00557CEA 0x00000320 Op: 0x00000100 0x00552901 0x00000000 lDbg: 0x00C7CB58 +00D0: 0x00000000 +0120: 0x875879E9 EBX: 0x00619B71 0x00400000 0x3A541172 0x00B76BD0 ECX: 0x4517A016 0xC4EE1573 0x00C7CB58 0x0053C0D5 0x12B42298 0x00000001 0x00000000 0x8758A45F +0240: +0030: 0x41ACAABB 0x775680E0 +0250: 0x005335EA
C++:
0x00000000 0x00B768B8 0x008246F1 0x00000000 0x00558D91 0x016110F0 +0150: 0x3A541172 0x007229D3 0x3CD6710B 0x00000000 0xFFFFFFFF +0090: +0000: 0x00000000 +00B0: 0x7FFD5000 0xB7EBCA1C SA-MP +00A0: 0x0022FD94 0x0000001A 0x00000008 +0170: SCM EDI: 0x0022FD84 0x0022FD94 0x0083CC88 0x3D06292B +0100: 0x0022FCBC Ped +0130: 0x008241AF 0x00000001 0x00000001 0xC4E91BD7 0x43960000 0xFFFFFFFF 0x00000001 +0260: 0x00000000 0x00000001 0 0x423C709E 0x08EF8320 0x0022FBF8 +0060: 0x00000000 0x00000001 0x76FFD9A3 0x00000102 0
Последнее редактирование модератором: