11.11.2013, 17:58
Код:
SA-MP 0.3x Exception At Address: 0x0072CD14 Registers: EAX: 0x00000005 EBX: 0x00010000 ECX: 0x0028FD98 EDX: 0x00000008 ESI: 0x00000005 EDI: 0x00000002 EBP: 0x0028FC6C ESP: 0x0028FC00 EFLAGS: 0x00010246 Stack: +0000: 0xFF800000 0xFF800000 0x0161C500 0x00000000 +0010: 0x00000000 0x00000000 0x00000000 0x00000280 +0020: 0x00000001 0x00000002 0x19B9CC58 0xFFFFD6FC +0030: 0x00000000 0x47C34FF3 0x00010000 0x0028FC00 +0040: 0xFFC00000 0xFF800000 0x00000001 0x00000000 +0050: 0x0028FBE8 0x19B9C8D8 0xFF800000 0x0028FCC8 +0060: 0x7F800000 0x007EDDB4 0x0028FCC8 0x7F800000 +0070: 0x00555563 0x0028FD64 0x00000005 0x00554840 +0080: 0x0028FCC8 0x0028FCC8 0x0000000D 0x0161C500 +0090: 0x0000001A 0x09E32BB0 0x75AA6C30 0x00000000 +00A0: 0x7F800000 0x7F800000 0xFF800000 0x7F800000 +00B0: 0xFF800000 0xFF800000 0x7F800000 0x19B9CC58 +00C0: 0x800034BC 0x000064C8 0x45042EBE 0x44A0C77F +00D0: 0x4139D495 0x45042EBE 0x44A0C77F 0x4139D495 +00E0: 0x45042EBE 0x44A0C77F 0x4139D495 0x45042EBE +00F0: 0x44A0C77F 0x4139D495 0x45042EBE 0x44A0C77F +0100: 0x4139D495 0x44DD8FBC 0x44B32265 0x4317B7B4 +0110: 0xFFC00000 0xFF800000 0xFFC00000 0x44E265CA +0120: 0x449EC07D 0x41D2A288 0xFFC00000 0xFF800000 +0130: 0xFFC00000 0xFFC00000 0xFFC00000 0xFF800000 +0140: 0xFFC00000 0xFFC00000 0xFFC00000 0xFFC00000 +0150: 0xFFC00000 0xFF800000 0xFFC00000 0xFFC00000 +0160: 0xFFC00000 0x42CC98CC 0x42AB730A 0x42BEE650 +0170: 0x42B152B0 0xFFC00000 0xFF800000 0xFFC00000 +0180: 0xFFC00000 0xFFC00000 0xFFC00000 0x005558E2 +0190: 0x00000001 0x00000000 0x412F4AA7 0x0053E9FE +01A0: 0x44520000 0x44034000 0x0053ECC2 0x00000001 +01B0: 0x00619B71 0x0000001A 0x00000001 0x00000001 +01C0: 0x0000000A 0x00748DA0 0x0000001A 0x00000001 +01D0: 0x76AC1245 0x00000000 0x0028FF88 0x7EFDE000 +01E0: 0x01610000 0x4F492DF0 0x016110F0 0x00000008 +01F0: 0x00000100 0x00000008 0x00000102 0x44520000 +0200: 0x44034000 0x00000000 0x00000000 0x00000690 +0210: 0x0000041A 0x00000000 0x00000001 0x001E072E +0220: 0x00000200 0x00000000 0x020D0348 0x00C6C017 +0230: 0x00000348 0x0000020D 0x0000002C 0x0028FE2C +0240: 0x00825EA4 0x76AC1245 0x00000000 0x7EFDE000 +0250: 0xFFFFFFFF 0x00821D17 0x00000065 0x00000065 +0260: 0x0028FF88 0x008246F1 0x00400000 0x00000000 +0270: 0x01AB450B 0x0000000A 0x00000094 0x00000006 SCM Op: 0x685, lDbg: 0 LastRendObj: 3361 Game Version: US 1.0 State Information: Ped Context: 0 P1 (0,0) P3 (0,0) P4 (0,0) P5 (0,0) P8 (0,0) P9 (0,0) P11 (0,0) P14 (0,0)
Код:
.text:0072CD14 loc_72CD14: ; CODE XREF: sub_72CAE0+193j .text:0072CD14 mov al, byte ptr [esp+ebx+68h+var_30] This line, when ebx 65536 .text:0072CD18 test al, al .text:0072CD1A jnz short loc_72CD4F .text:0072CD1C mov ecx, [ebp+arg_0] .text:0072CD1F fld [esp+68h+var_34] .text:0072CD23 mov eax, [esp+68h+var_48] .text:0072CD27 fadd [esp+68h+var_38] .text:0072CD2B mov edx, [ecx+ebx*8] .text:0072CD2E mov ecx, [ecx+ebx*8+4] .text:0072CD32 mov [esp+eax*8+68h+var_28], edx .text:0072CD36 fstp [esp+68h+var_38] .text:0072CD3A mov [esp+eax*8+68h+var_24], ecx .text:0072CD3E inc eax .text:0072CD3F mov byte ptr [esp+ebx+68h+var_30], 1 .text:0072CD44 mov [esp+68h+var_48], eax .text:0072CD48 mov edi, ebx .text:0072CD4A jmp loc_72CC64