leraxoxo
leraxoxo
Последний раз редактировалось Гocть; 08.08.2012 в 08:49.
My little pony
Ты блондинко, йа одмин,
Тибя много, йа адин,
Ты на капсе, йа пацтулом,
Щолкну мышкой плюсадин.
если
Последний раз редактировалось Гocть; 08.08.2012 в 08:46.
Да, Да, Жду бана
36922
date/time : 2012-08-07, 19:27:44, 233ms
computer name : 12123
user name : alexman <admin>
registered owner : alexman
operating system : Windows 7 x64 Service Pack 1 build 7601
system language : Russian
system up time : 8 minutes 51 seconds
program up time : 26 seconds
processors : 2x Intel(R) Celeron(R) CPU B815 @ 1.60GHz
physical memory : 651/1956 MB (free/total)
free disk space : (C:) 372,05 GB
display mode : 1366x768, 32 bit
process id : $113c
allocated memory : 38,15 MB
command line : "qip.exe" /isolated
executable : qip.exe
exec. date/time : 2012-03-23 16:55
version : 4.0.0.7221
compiled with : Delphi 7
madExcept version : 3.0n
callstack crc : $145b4b9f, $01fdb0ac, $bb6353d9
exception number : 1
exception class : EAccessViolation
exception message : Access violation at address 145B4B9F in module 'Jabber.dll'. Read of address 00000044.
main thread ($1024):
145b4b9f +000 Jabber.dll
008ae91c +048 qip.exe u_proto_svc 194 +14 TProtoSvc.SendMsgToProto
0088c2fc +08c qip.exe u_serverdb 246 +11 TServerDB.CheckChangeOfPassword
0088ca85 +06d qip.exe u_serverdb 395 +8 TServerDB.LoadProtoOptions
008ae7c3 +007 qip.exe u_proto_svc 126 +0 TProtoSvc.LoadProtoOptions
00890f7a +016 qip.exe u_coredlls 367 +12 TCoreMan.OnInfMessage
0075772f +00f qip.exe u_proman 172 +1 TProMan.OnFrmMsg
0098470f +a6f qip.exe f_proman 1123 +192 TfrmMan.OpenExistingProfile
00983be3 +a4f qip.exe f_proman 908 +196 TfrmMan.BitBtnOpenClick
004daa2c +064 qip.exe Controls TControl.Click
004b9568 +01c qip.exe StdCtrls 3479 +3 TButton.Click
00494a5d +065 qip.exe Buttons TBitBtn.Click
005b9d97 +07f qip.exe uinfbtns 847 +9 TInfuDropDownBitBtn.Click
004b965c +00c qip.exe StdCtrls 3531 +1 TButton.CNCommand
004da894 +188 qip.exe Controls TControl.WndProc
004dd8f3 +157 qip.exe Controls TWinControl.WndProc
004b9414 +06c qip.exe StdCtrls 3416 +13 TButtonControl.WndProc
00513c09 +085 qip.exe TntControls 679 +19 TWinControlTrap.WindowProc
004da664 +024 qip.exe Controls TControl.Perform
004dda2b +023 qip.exe Controls DoControlMsg
004de0e3 +00b qip.exe Controls TWinControl.WMCommand
004c384c +02c qip.exe Forms 4117 +3 TCustomForm.WMCommand
004da894 +188 qip.exe Controls TControl.WndProc
004dd8f3 +157 qip.exe Controls TWinControl.WndProc
004c18a5 +421 qip.exe Forms 3099 +103 TCustomForm.WndProc
00513c09 +085 qip.exe TntControls 679 +19 TWinControlTrap.WindowProc
004dd570 +02c qip.exe Controls TWinControl.MainWndProc
0047aba0 +014 qip.exe Classes StdWndProc
76620d48 +016 user32.dll CallWindowProcW
0051383c +048 qip.exe TntControls 564 +12 TWinControlTrap.Win32Proc
0047aba0 +014 qip.exe Classes StdWndProc
766196c0 +047 user32.dll SendMessageW
76620d48 +016 user32.dll CallWindowProcW
00513a3c +0f0 qip.exe TntControls 615 +25 TWinControlTrap.DefWin32Proc
0047aba0 +014 qip.exe Classes StdWndProc
76627945 +016 user32.dll CallWindowProcA
004f2e26 +0ee qip.exe VCLFixPack TContextMenuFixWinControl.DefaultHandler
004dae34 +010 qip.exe Controls TControl.WMLButtonUp
004da894 +188 qip.exe Controls TControl.WndProc
004dd8f3 +157 qip.exe Controls TWinControl.WndProc
004b9414 +06c qip.exe StdCtrls 3416 +13 TButtonControl.WndProc
00513c09 +085 qip.exe TntControls 679 +19 TWinControlTrap.WindowProc
004dd570 +02c qip.exe Controls TWinControl.MainWndProc
0047aba0 +014 qip.exe Classes StdWndProc
76620d48 +016 user32.dll CallWindowProcW
0051383c +048 qip.exe TntControls 564 +12 TWinControlTrap.Win32Proc
0047aba0 +014 qip.exe Classes StdWndProc
76617bc5 +00a user32.dll DispatchMessageA
004c7df3 +083 qip.exe Forms 6875 +13 TApplication.ProcessMessage
004c7e2a +00a qip.exe Forms 6894 +1 TApplication.HandleMessage
004c804a +096 qip.exe Forms 6978 +16 TApplication.Run
0099bb7f +1b7 qip.exe qip 209 +69 initialization
76903398 +010 kernel32.dll BaseThreadInitThunk
thread $5f8:
77860136 +0e ntdll.dll NtWaitForMultipleObjects
751c0bd7 +fa KERNELBASE.dll WaitForMultipleObjectsEx
76901a27 +89 kernel32.dll WaitForMultipleObjectsEx
76620864 +00 user32.dll MsgWaitForMultipleObjectsEx
76620b64 +1a user32.dll MsgWaitForMultipleObjects
004533e9 +0d qip.exe madExcept CallThreadProcSafe
00453453 +37 qip.exe madExcept ThreadExceptFrame
76903398 +10 kernel32.dll BaseThreadInitThunk
>> created by main thread ($1024) at:
769034c0 +1b kernel32.dll CreateThread
thread $4c4 (TPainterThread): <suspended>
00404b86 +36 qip.exe System BeginThread
thread $940:
77861f1f +0b ntdll.dll NtWaitForWorkViaWorkerFactory
76903398 +10 kernel32.dll BaseThreadInitThunk
thread $1158:
77861f1f +0b ntdll.dll NtWaitForWorkViaWorkerFactory
76903398 +10 kernel32.dll BaseThreadInitThunk
thread $ac4:
77861f1f +0b ntdll.dll NtWaitForWorkViaWorkerFactory
76903398 +10 kernel32.dll BaseThreadInitThunk
thread $7d4:
77860136 +0e ntdll.dll NtWaitForMultipleObjects
76903398 +10 kernel32.dll BaseThreadInitThunk
thread $1108:
77861f1f +0b ntdll.dll NtWaitForWorkViaWorkerFactory
76903398 +10 kernel32.dll BaseThreadInitThunk
thread $454:
77861f1f +0b ntdll.dll NtWaitForWorkViaWorkerFactory
76903398 +10 kernel32.dll BaseThreadInitThunk
Executor thread ($b2c):
77860136 +0e ntdll.dll NtWaitForMultipleObjects
751c0bd7 +fa KERNELBASE.dll WaitForMultipleObjectsEx
76901a27 +89 kernel32.dll WaitForMultipleObjectsEx
76620864 +00 user32.dll MsgWaitForMultipleObjectsEx
76620b64 +1a user32.dll MsgWaitForMultipleObjects
006df9f0 +a8 qip.exe u_bb_Executor 109 +26 ThreadFunc
004533e9 +0d qip.exe madExcept CallThreadProcSafe
00453453 +37 qip.exe madExcept ThreadExceptFrame
76903398 +10 kernel32.dll BaseThreadInitThunk
>> created by main thread ($1024) at:
769034c0 +1b kernel32.dll CreateThread
modules:
00240000 NSI.dll 6.1.7600.16385 C:\Windows\syswow64
00400000 qip.exe 4.0.0.7221 C:\TCPU59\Programm\Qip
126e0000 bass.dll 2.4.8.1 C:\TCPU59\Programm\Qip\Core
127e0000 openlibeay32.dll 1.0.0.4 C:\TCPU59\Programm\Qip\Core
12a20000 OPENSSLEAY32.DLL 1.0.0.4 C:\TCPU59\Programm\Qip\Core
13aa0000 cards.dll C:\TCPU59\Programm\Qip\Plugins\cards
13b00000 ogorod.dll C:\TCPU59\Programm\Qip\Plugins\ogorod
13b60000 qipradio.dll C:\TCPU59\Programm\Qip\Plugins\qipradio
13ee0000 Win7Helper.dll C:\TCPU59\Programm\Qip\Plugins\Win7Helper
14020000 InfICQ.dll C:\TCPU59\Programm\Qip\Protos\InfICQ
14540000 Jabber.dll 0.1.1.15 C:\TCPU59\Programm\Qip\Protos\Jabber
14ac0000 MRA.dll C:\TCPU59\Programm\Qip\Protos\MRA
14e00000 pics.dll C:\TCPU59\Programm\Qip\Protos\MRA
14e40000 SIP.dll 0.1.0.1 C:\TCPU59\Programm\Qip\Protos\SIP
155c0000 XIMSS.dll 0.1.4.4 C:\TCPU59\Programm\Qip\Protos\XIMSS
6f180000 Social.dll C:\TCPU59\Programm\Qip\Protos\Social
702e0000 DUI70.dll 6.1.7600.16385 C:\Windows\system32
703a0000 explorerframe.dll 6.1.7601.17514 C:\Windows\system32
71920000 DUser.dll 6.1.7600.16385 C:\Windows\system32
71950000 dwmapi.dll 6.1.7600.16385 C:\Windows\system32
719b0000 ntmarta.dll 6.1.7600.16385 C:\Windows\system32
71a20000 credssp.dll 6.1.7601.17514 C:\Windows\system32
71bf0000 uxtheme.dll 6.1.7600.16385 C:\Windows\system32
71ca0000 MSWSOCK.DLL 6.1.7601.17514 C:\Windows\system32
71d30000 snxhk.dll 7.0.1456.418 C:\Program Files\AVAST Software\Avast
71ee0000 webio.dll 6.1.7601.17725 C:\Windows\system32
71f30000 winhttp.dll 6.1.7601.17514 C:\Windows\system32
71fd0000 comctl32.dll 6.10.7601.17514 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6 975e2bd6f2b2
731f0000 dbghelp.dll 6.1.7601.17514 C:\Windows\system32
732e0000 WINSTA.dll 6.1.7601.17514 C:\Windows\system32
73330000 rsaenh.dll 6.1.7600.16385 C:\Windows\system32
73370000 CRYPTSP.dll 6.1.7600.16385 C:\Windows\system32
73410000 POWRPROF.dll 6.1.7600.16385 C:\Windows\system32
73440000 WINNSI.DLL 6.1.7600.16385 C:\Windows\system32
73450000 IPHLPAPI.DLL 6.1.7601.17514 C:\Windows\system32
73470000 apphelp.dll 6.1.7601.17514 C:\Windows\system32
734e0000 MSACM32.dll 6.1.7600.16385 C:\Windows\system32
735d0000 WindowsCodecs.dll 6.1.7601.17514 C:\Windows\system32
736d0000 PROPSYS.dll 7.0.7601.17514 C:\Windows\system32
737d0000 shdocvw.dll 6.1.7601.17514 C:\Windows\System32
73810000 dhcpcsvc.DLL 6.1.7600.16385 C:\Windows\system32
73830000 gdiplus.dll 6.1.7601.17825 C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_65 95b64144ccf1df_1.1.7601.17825_none_72d273598668a06 b
739c0000 olepro32.dll 6.1.7601.17514 C:\Windows\system32
739e0000 dhcpcsvc6.DLL 6.1.7600.16385 C:\Windows\system32
739f0000 LINKINFO.dll 6.1.7600.16385 C:\Windows\system32
73a10000 mscms.dll 6.1.7601.17514 C:\Windows\system32
73a90000 dsound.dll 6.1.7600.16385 C:\Windows\system32
74c40000 profapi.dll 6.1.7600.16385 C:\Windows\system32
74c50000 USERENV.dll 6.1.7601.17514 C:\Windows\system32
74c70000 winmm.dll 6.1.7601.17514 C:\Windows\system32
74cd0000 winspool.drv 6.1.7601.17514 C:\Windows\system32
74dc0000 msimg32.dll 6.1.7600.16385 C:\Windows\system32
74dd0000 oleacc.dll 7.0.0.0 C:\Windows\system32
74e10000 wsock32.dll 6.1.7600.16385 C:\Windows\system32
74e40000 version.dll 6.1.7600.16385 C:\Windows\system32
74f10000 CRYPTBASE.dll 6.1.7600.16385 C:\Windows\syswow64
74f20000 SspiCli.dll 6.1.7601.17856 C:\Windows\syswow64
74fb0000 CFGMGR32.dll 6.1.7601.17621 C:\Windows\syswow64
74fe0000 wininet.dll 9.0.8112.16447 C:\Windows\syswow64
75100000 sechost.dll 6.1.7600.16385 C:\Windows\SysWOW64
751b0000 KERNELBASE.dll 6.1.7601.17651 C:\Windows\syswow64
75200000 comdlg32.dll 6.1.7601.17514 C:\Windows\syswow64
75280000 SETUPAPI.dll 6.1.7601.17514 C:\Windows\syswow64
75420000 MSCTF.dll 6.1.7600.16385 C:\Windows\syswow64
754f0000 WLDAP32.dll 6.1.7601.17514 C:\Windows\syswow64
75540000 Normaliz.dll 6.1.7600.16385 C:\Windows\syswow64
75550000 WS2_32.dll 6.1.7601.17514 C:\Windows\syswow64
75590000 shell32.dll 6.1.7601.17859 C:\Windows\syswow64
76200000 iertutil.dll 9.0.8112.16447 C:\Windows\syswow64
763c0000 msvcrt.dll 7.0.7601.17744 C:\Windows\syswow64
76470000 RPCRT4.dll 6.1.7601.17514 C:\Windows\syswow64
76560000 oleaut32.dll 6.1.7601.17676 C:\Windows\syswow64
765f0000 LPK.dll 6.1.7600.16385 C:\Windows\syswow64
76600000 user32.dll 6.1.7601.17514 C:\Windows\syswow64
76700000 USP10.dll 1.626.7601.17514 C:\Windows\syswow64
767a0000 ADVAPI32.dll 6.1.7601.17514 C:\Windows\syswow64
76840000 DEVOBJ.dll 6.1.7601.17621 C:\Windows\syswow64
76860000 CLBCatQ.DLL 2001.12.8530.16385 C:\Windows\syswow64
768f0000 kernel32.dll 6.1.7601.17651 C:\Windows\syswow64
76a00000 GDI32.dll 6.1.7601.17514 C:\Windows\syswow64
76b20000 ole32.dll 6.1.7601.17514 C:\Windows\syswow64
76c80000 SHLWAPI.dll 6.1.7601.17514 C:\Windows\syswow64
76ce0000 urlmon.dll 9.0.8112.16447 C:\Windows\syswow64
76f20000 imm32.dll 6.1.7601.17514 C:\Windows\syswow64
77840000 ntdll.dll 6.1.7601.17725 C:\Windows\SysWOW64
processes:
0000 Idle 0 0 0
0004 System 0 0 0
0134 smss.exe 0 0 0
0198 csrss.exe 0 0 0
01f0 wininit.exe 0 0 0
01fc csrss.exe 1 0 0
0238 services.exe 0 0 0
0248 winlogon.exe 1 0 0
0264 lsass.exe 0 0 0
026c lsm.exe 0 0 0
02e4 svchost.exe 0 0 0
0320 ASCService.exe 0 0 0
0368 svchost.exe 0 0 0
03ac svchost.exe 0 0 0
03f8 svchost.exe 0 0 0
01a0 svchost.exe 0 0 0
01c0 stacsv64.exe 0 0 0
0428 audiodg.exe 0 0 0
0464 svchost.exe 0 0 0
04d4 svchost.exe 0 0 0
052c WLTRYSVC.EXE 0 0 0
0548 BCMWLTRY.EXE 0 0 0
0554 AvastSvc.exe 0 0 0
0620 dwm.exe 1 17 2 high
0634 spoolsv.exe 0 0 0
0660 svchost.exe 0 0 0
06ac taskhost.exe 1 26 23 normal
06e4 AESTSr64.exe 0 0 0
0700 BBSvc.EXE 0 0 0
072c explorer.exe 1 465 261 normal
079c ANIWConnService.exe 0 0 0
07ec svchost.exe 0 0 0
0174 HeciServer.exe 0 0 0
0458 PandoraService.exe 0 0 0
071c c2c_service.exe 0 0 0
0848 svchost.exe 0 0 0
0acc AvastUI.exe 1 117 32 normal C:\Program Files\AVAST Software\Avast
0bac Skype.exe 1 166 115 normal C:\Program Files (x86)\Skype\Phone
0be4 chrome.exe 1 102 55 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
0b08 SearchIndexer.exe 0 0 0
0d50 svchost.exe 0 0 0
0e74 chrome.exe 1 9 1 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
0ea8 chrome.exe 1 9 1 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
0ec8 chrome.exe 1 10 1 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
0ed4 chrome.exe 1 9 1 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
0e28 chrome.exe 1 243 1 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
0fb8 chrome.exe 1 47 1 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
1028 chrome.exe 1 13 3 normal C:\Users\alexman\AppData\Local\Google\Chrome\Appli cation
13e4 LMS.exe 0 0 0
13fc sppsvc.exe 0 0 0
1058 svchost.exe 0 0 0
1098 wmpnetwk.exe 0 0 0
10c4 WmiPrvSE.exe 0 0 0
02fc UNS.exe 0 0 0
0ba4 TrustedInstaller.exe 0 0 0
02d8 TOTALCMD.EXE 1 675 339 normal C:\TCPU59
113c qip.exe 1 827 249 normal C:\TCPU59\Programm\Qip
GDI:
827
active control:
TInfuBitBtn "BitBtnOpen" [, FreeNotification]
TfrmMan "frmMan" [, FreeNotification]
DbgHelp stack trace:
145B4B9A: Jabber.dll - CreateInfiumPROTOADV_RC +A79h
145BB4CA: Jabber.dll - CreateInfiumPROTOADV_RC +73A9h
88C2FA: qip.exe - madTraceProcess +4380E7h
88CA85: qip.exe - madTraceProcess +438872h
8AE7C3: qip.exe - madTraceProcess +45A5B0h
890F78: qip.exe - madTraceProcess +43CD65h
75772D: qip.exe - madTraceProcess +30351Ah
983BE3: qip.exe - madTraceProcess +52F9D0h
4DAA2D: qip.exe - madTraceProcess +8681Ah
4DD8F3: qip.exe - madTraceProcess +896E0h
4DDA2B: qip.exe - madTraceProcess +89818h
4DD8F3: qip.exe - madTraceProcess +896E0h
513C07: qip.exe - madTraceProcess +BF9F4h
47AB9D: qip.exe - madTraceProcess +2698Ah
766162F5: user32.dll - gapfnScSendMessage +332h
76616D35: user32.dll - GetThreadDesktop +D7h
76620D22: user32.dll - GetClientRect +C5h
76620D48: user32.dll - CallWindowProcW +1Bh
51383C: qip.exe - madTraceProcess +BF629h
47AB9D: qip.exe - madTraceProcess +2698Ah
766162F5: user32.dll - gapfnScSendMessage +332h
76616D35: user32.dll - GetThreadDesktop +D7h
76619659: user32.dll - GetWindow +3F0h
766196C0: user32.dll - SendMessageW +4Ch
720745FC: comctl32.dll - GetEffectiveClientRect +3409h
7207465E: comctl32.dll - GetEffectiveClientRect +346Bh
720744E8: comctl32.dll - GetEffectiveClientRect +32F5h
766162F5: user32.dll - gapfnScSendMessage +332h
76616D35: user32.dll - GetThreadDesktop +D7h
76620D22: user32.dll - GetClientRect +C5h
76620D48: user32.dll - CallWindowProcW +1Bh
513A3C: qip.exe - madTraceProcess +BF829h
47AB9D: qip.exe - madTraceProcess +2698Ah
766162F5: user32.dll - gapfnScSendMessage +332h
76616D35: user32.dll - GetThreadDesktop +D7h
76620D22: user32.dll - GetClientRect +C5h
76627945: user32.dll - CallWindowProcA +1Bh
4F2E26: qip.exe - madTraceProcess +9EC13h
4DD8F3: qip.exe - madTraceProcess +896E0h
47AB9D: qip.exe - madTraceProcess +2698Ah
766162F5: user32.dll - gapfnScSendMessage +332h
76616D35: user32.dll - GetThreadDesktop +D7h
76620D22: user32.dll - GetClientRect +C5h
76620D48: user32.dll - CallWindowProcW +1Bh
51383C: qip.exe - madTraceProcess +BF629h
47AB9D: qip.exe - madTraceProcess +2698Ah
766162F5: user32.dll - gapfnScSendMessage +332h
76616D35: user32.dll - GetThreadDesktop +D7h
766177BF: user32.dll - CharPrevW +138h
76617BC5: user32.dll - DispatchMessageA +Fh
4C7DF3: qip.exe - madTraceProcess +73BE0h
99BB7F: qip.exe - madTraceProcess +54796Ch
76903395: kernel32.dll - BaseThreadInitThunk +12h
77879EED: ntdll.dll - RtlInitializeExceptionChain +63h
77879EC0: ntdll.dll - RtlInitializeExceptionChain +36h
memory info:
- AvailPageFile: Integer = -1938821120
- AvailPhysicalMemory: Integer = 661299200
- AvailVirtualMemory: Integer = 1956794368
- MemoryLoad: Integer = 67
- TotalPageFile: Integer = -192364544
- TotalPhysicalMemory: Integer = 2051301376
- TotalVirtualMemory: Integer = 2147352576
cpu registers:
eax = 00000001
ebx = 00000001
ecx = 00000000
edx = 00000002
esi = 0018ec08
edi = 07e52c40
eip = 145b4b9f
esp = 0018e8a0
ebp = 0018ebb4
stack dump:
0018e8a0 08 ec 18 00 40 2c e5 07 - 00 00 00 00 40 2c e5 07 ....@,......@,..
0018e8b0 01 00 00 00 00 00 00 00 - 22 86 90 76 18 00 00 00 ........"..v....
0018e8c0 f8 00 00 00 00 eb 18 00 - 40 00 00 00 00 00 00 00 ........@.......
0018e8d0 00 00 00 00 2a 00 2a 00 - 64 f3 d3 00 00 00 00 00 ....*.*.d.......
0018e8e0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e8f0 b4 eb 18 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................
0018e900 00 00 00 00 00 00 00 00 - 00 00 00 00 01 00 00 00 ................
0018e910 40 00 00 00 08 eb 18 00 - 00 eb 18 00 bc eb 18 00 @...............
0018e920 f8 00 00 00 00 00 00 00 - f8 00 00 00 00 00 00 00 ................
0018e930 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e940 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e950 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e960 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e970 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e980 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e990 c0 5a 40 00 01 00 00 00 - bc bc 56 00 28 eb 18 00 .Z@.......V.(...
0018e9a0 d8 eb 18 00 2d 5a 40 00 - 40 00 71 00 69 00 70 00 ....-Z@.@.q.i.p.
0018e9b0 2e 00 72 00 75 00 00 00 - 00 00 00 00 00 00 00 00 ..r.u...........
0018e9c0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018e9d0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
disassembling:
[...]
008ae8f7
008ae8fc 186 mov edx, [eax]
008ae8fe cmp edx, [ebp+$c]
008ae901 jnz loc_8ae921
008ae901
008ae903 189 cmp byte ptr [eax+8], 0
008ae907 jnz loc_8ae915
008ae907
008ae909 191 mov edx, [edi]
008ae90b cmp edx, $14
008ae90e jz loc_8ae915
008ae90e
008ae910 cmp edx, $15
008ae913 jnz loc_8ae927
008ae913
008ae915 loc_8ae915:
008ae915 194 push edi
008ae916 mov eax, [eax+$c]
008ae919 push eax
008ae91a mov eax, [eax]
008ae91c > call dword ptr [eax+$10]
008ae91c
008ae91f 195 jmp loc_8ae927
008ae91f
008ae91f ; ---------------------------------------------------------
008ae91f
008ae921 loc_8ae921:
008ae921 197 dec ebx
008ae922 183 cmp ebx, -1
008ae925 jnz loc_8ae8f2
008ae925
008ae927 loc_8ae927:
008ae927 198 pop edi
008ae928 pop esi
008ae929 pop ebx
008ae92a pop ebp
008ae92b ret $c
---------- Добавлено в 21:06 ---------- Предыдущее сообщение было размещено в 21:05 ----------
shok ОМГЩТО ЭТО?
Последний раз редактировалось Гocть; 08.08.2012 в 08:43.
Поразительную находку сделал французский исследователь Антуан Лефевр – он обнаружил в черепе Наполеона Бонапарта
centenarians
Эта страница была посещена
Девушки не икают, не рыгают и не пукают. Поэтому им приходится много --------, чтоб не лопнуть
Последний раз редактировалось Гocть; 10.08.2012 в 20:11.
Their sanity I'll shatter; their dreams of conquest I will destroy.
Your future is grim.
The worst is still to come.