+0190: 0x00B76BD0 +0210: 0x00000000 0x00A91DB0 0x3CD6710B State +0200: 0.3e 0xC309616C 0xB78B4790 0x02EEBCD4 0x008246F1 0x0022FD94 0x09CC8718 0x00400000 0x3F800000 0x0000000A 0x0053C0D5 +0100: 0x00000001 0x0000012C 0x00000073 0x00000000 0x00C7CB58 0xBCD6710B 0x00000000 EDX: 0x0000001A Game +0230: 0x00C7CB58 0x0022FD38 0x00552901 0x775680E0 +00F0: 0x08EF8348 0x76FFD9A3 0x0022FCBC 0xC4EE1573 +0160: 0x000000DB 0x0053E986 Registers: 0x423C709E 0x76FFD9A3 0x00010206 0x00000000 0x00000000 Exception 0x4F075874 +0170: 0xBDD6B828 0x00000000 +0040: 0x0022FBF8 0x12B42298 ECX: 0x0043E625 0x451FABD7 0xC309616C 0x0000001A 0x43A43EAC ESP: 0x4517A016 0x008246EB 0x0053ECC2 0x00748DA0 Version: 0x875879E9 0x0022FD94 0x00000190 0x0000001A 0xB7EBCA1C 0x470, 0x00000001 0 At 0x43C80000 ESI: 0xFFFFFFFF 0x3F7FE98B 0x00000000 +0060: 0x00000000 0x00000000 0x0000000A 0x0000001A 0x00000000 0x004D9486 0xC50B928F 0x00000000 +0050: +0130: +0020: 0x005335EA 0x43960000 0x000C0310 0x00000000 US +01F0: +0250: +00B0: +0080: 0x02ED7986 0x3A541172 0x401F0001 0x00000000 0x00000102 0x00441088 EBP: 0x008241AF 0x02EA0BF6 Information: 0x0000002C +0260: 0x41ACAABB +01D0: +0030: +00D0: 1.0 0x00000000 0x016110F0 Stack: 0x3B541172 0x08EF8320 lDbg: +01C0: 0x00000008 0x09CC875C 0x00400000 +01E0: 0x000000DB 0xC4E91BD7 0x00619B71 0x452112E1 0x0022FD94 0x41ACAABB 0xFFFFFFFF 0x00000000 0x00000001 0x3D06292B 0x00000001 0x0022FF78 0x00000000 +0240: 0xC4E91BD7 +0120: 0x00000000 EFLAGS: 0x8758A45F 0x00000001 0x00000001 0x3A541172 +01B0: +0180: 0x3E439BDC 0x7FFD5000 0x00000008 0x00B76BD0 +0140: 0x005DFB34 EDI: 0x00000000 0x875879E9 0x00000000 0x00000000 EAX: Ped 0x01610000 Op: 0x00000000 0x00000102 0x8758A45F 0x8758A45F 0x00000000 0x00000000 0x00000000 0x00558D91 0x00000001 SA-MP 0x09FD2794 0x4517B515 +00A0: 0x3F7FE98B 0x00B768B8 0x76FFC340 0x0022FF88 0x59344437 0x01932185 0x034BFF40 +0000: 0x00000001 0x02F109F8 0x3D75C28F +0150: Address: +0090: 0x0043E577 0x00000258 0x00000001 0x00B768B8 +00C0: 0x0022FD6C 0x00000000 0xC53B8000 0x00000000 +0270: +0010: 0x00557CEA 0x0022FD84 Context: 0x00000320 0x00000100 0x00000001 0x0083CC88 0x0022FCAC 0xBDD6B828 0x8758A45F +01A0: SCM 0x00000000 0x875879E9 0x007229D3 +0220: 0x000000DB 0x41ACAABB 0x0022FF88 EBX: 0x00B768B8
C++:
+00E0: 0x00400000 0x00000000 0x0022F804 +0110: 0x451715C0 +0070: 0x76FFD9A3 0x00000000 0
Последнее редактирование модератором: