抛砖引玉,传63×63,10×63全金属地图三张

不会制图,借用游戏里金属地图进行修改,第三张为后来添加的,用原版任务地图做的修改,规格为63×63,也是全金属,有点像塔台防守。方便像我这样的菜鸟。测试最多可以顺利玩6个人的,试验10个人时内存出错,不知道是什么原因

出错是因为玩家的出生位置不够。自己动手丰衣足食呀

谢谢大侠指点,回去我再仔细看看,我明明是设置了10个player的啊

大侠,1vs9时,用原子A版、B版都在10分钟左右就出现内存错误退出,1vs4则没有,出生位置全都重新设置好了的,10个一个没少,少了的话可能进去就出错了,地图占用内存设置为128MB。重装TA,重装系统都没用,请帮忙看看哪儿没设置好

更新TA PATCH 3.9.2试试

更新后也不行,最多能玩1 vs 6,再多一个AI 不到10分钟就退出了

TA目录里面的errorlog.txt文件上传上来看看

TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 15:40:22 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:28:02
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x30040008
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 30040008

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A6FE268 SS=0023 ESP=0013FC08 EBP=0982A15C
ECX=30040000 DS=0023 ESI=0982A15C FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A6FE264 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
Stack dump:
0013FC08: 30040000 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 0982A15C 0013FC8C 0A6FE264 0A6FE283 0A852C8C 01C6E7BB
0013FC48: FFF00000 00100000 FFF00000 0049E1E6 0A6FE264 0013FC8C 00000000 01C66F59
0013FC68: 0A6FE264 0A852C8C 01C790D2 00000000 0A852C8C 00000000 000001C8 00000003
0013FC88: 00000006 00008640 01C66F59 01C66F59 0A6FE14C 0A852C8C 0A6FE264 0048ADDF
0013FCA8: 0A6FE264 00000000 01C9DB04 716158F8 00000002 05000000 00000677 01C790D2
0013FCC8: 004953A2 004954F2 00000001 0013FD14 01C9DB04 00496943 00000000 01C67A0D
0013FCE8: 00000000 004995BD 00000000 0005BBE5 00000000 0000019E 00000198 00000004
0013FD08: 00002C09 00000200 00000000 00499A22 7C80934A 0005BBE5 0000019E 00000198
0013FD28: 00000004 00002C09 00000200 00000000 0000019E 00000198 00000004 00002C09
0013FD48: 00000200 00000000 00000200 00000004 0198019E 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00AD6938 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AD1038 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0005BBE5 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00091378 0015237E 0013FF34 7FFD4000 00000408
0013FE68: 00000032 00000001 00000008 0000000F 000400FE 00000200 00000004 0198019E
0013FE88: 0005BBD5 0000019E 00000198 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: 79616C00 00790000 00510000 00000002 004F264E 00CC006F 00000020 00528A28
0013FEE8: 0050104C 7C956DE9 7C829B6D 0050104C 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00091378 0015237E 7FFD4000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00091378 7C93005D 7FFD4000 007834DB 0015237E 00091378 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00091378 7C93005D 7FFD4000 8054C6ED 0013FFC8 95E893A0 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33A caused an Access Violation in
module TA33A.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 15:47:39 2013
E:\Cavedog\TOTALA\TA33A.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:41:20
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x000C000B
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 000C000B

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A3000A8 SS=0023 ESP=0013FC08 EBP=0982A4A4
ECX=000C0003 DS=0023 ESI=0982A4A4 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A3000A4 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
Stack dump:
0013FC08: 000C0003 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 0982A4A4 0013FC8C 0A3000A4 0A3000C3 0A45164C 01C6BFCA
0013FC48: 00100800 00100800 00100800 0049E1E6 0A3000A4 0013FC8C 00000000 01C66512
0013FC68: 0A3000A4 0A45164C 01C78A6C 00000000 0A45164C 00000000 00000098 00000003
0013FC88: 00000002 00006640 01C66512 01C66512 0A2FFF8C 0A45164C 0A3000A4 0048ADDF
0013FCA8: 0A3000A4 00000000 01C9D49E 716158F8 00000003 026158F8 00000296 01C78A6C
0013FCC8: 02267778 004954F2 00000001 0013FD14 01C9D49E 00496943 00000000 01C673A7
0013FCE8: 00000000 004995BD 01C673A7 0013FD38 00000000 000001F3 000001B0 00000000
0013FD08: 00005F4A 00000205 00000000 00499A22 7C80934A 000C6845 000001F3 000001B0
0013FD28: 00000000 00005F4A 00000205 00000000 000001F0 000001AC 00000000 00005F4A
0013FD48: 00000200 00000000 00000200 00000000 01AC01F0 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ADA420 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AB4050 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 000C6845 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00091378 0015237E 0013FF34 7FFD5000 00000408
0013FE68: 00000032 00000001 00000008 00000001 000900EC 00000200 00000000 01AC01F0
0013FE88: 000C6854 000001F0 000001AC C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00091378 0015237E 7FFD5000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00091378 7C93005D 7FFD5000 007834DB 0015237E 00091378 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00091378 7C93005D 7FFD5000 8054C6ED 0013FFC8 969379C0 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33A.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc8.
Exception handler called in Main Thread. Time: Wed Nov 20 15:53:45 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A608 to 00140000
Instruction pointer is 004B0BC8
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x0202AE0C
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC8
Parameters = 00000000 0202AE0C

Registers:
EAX=0202AE08 CS=001B EIP=004B0BC8 EFLGS=00010246
EBX=0A2FCF70 SS=0023 ESP=0013FC00 EBP=00000000
ECX=00360064 DS=0023 ESI=099813FC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A2FCF6C GS=00000000

Bytes at CS:EIP:
8b 58 04 56 85 db 57 89 4c 24 10 7e 3e 8b 78 1c

Call stack:
004B0BC8 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
Stack dump:
0013FC00: 099813FC 0A2FCF70 00360064 0043E3E9 005052C8 0013FC28 00000000 00000000
0013FC20: 00000000 0013FC8C 00000000 0048A2FC 099813FC 0013FC8C 0A2FCF6C 0A2FCF8B
0013FC40: 0A45164C 01C68C9B 0A45164C 01C791AB 03CA26B0 0049E1E6 0A2FCF6C 0013FC8C
0013FC60: 00000000 01C66C51 0A2FCF6C 0A45164C 01C791AB 00000000 0A45164C 00000000
0013FC80: 00000098 00000003 00000002 000055C0 01C66C51 01C66C51 0A2FCE54 0A45164C
0013FCA0: 0A2FCF6C 0048ADDF 0A2FCF6C 00000000 01C9DBDD 716158F8 00000002 02000000
0013FCC0: 00000296 01C791AB 004953A2 004954F2 00000001 0013FD14 01C9DBDD 00496943
0013FCE0: 00000000 01C67AE6 00000000 004995BD 00000000 0011FC2F 00000000 0000026B
0013FD00: 00000185 00000001 00008A20 00000200 00000000 00499A22 7C80934A 0011FC2F
0013FD20: 0000026B 00000185 00000001 00008A20 00000200 00000000 0000026B 00000185
0013FD40: 00000001 00008A20 00000200 00000000 00000200 00000001 0185026B 10008350
0013FD60: DCBAABCD 00000000 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8
0013FD80: 77D1885A 0013FD98 77D1882A 0013FE80 0013FE78 00ADBBA8 00000014 00000001
0013FDA0: 00000000 00000000 00000010 00000000 0013FD9C 00000001 00000000 00000000
0013FDC0: 0013FD8C FFFFFFFF 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD
0013FDE0: 00000000 77D193E9 77D193A8 0013FE78 00000000 00000000 00000000 00000000
0013FE00: 00AD89D0 7FFDF000 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000
0013FE20: 00000000 00000000 00000001 7C80934A 0011FC2F 00000000 716158F8 0049EC49
0013FE40: 0013FE78 00000000 00000000 00000000 0049EC68 00091378 0015237E 0013FF34
0013FE60: 7FFDC000 00000408 00000032 00000001 00000008 00000001 000E00A6 00000200
0013FE80: 00000001 0185026B 0011FC2F 0000026B 00000185 C3D3B9CA B0D35151 A5B2F4D2
0013FEA0: 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388
0013FEC0: 00000000 00000000 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEE0: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2
0013FF00: 00400000 00000000 0015237E 00000001 00091378 0015237E 7FFDC000 0013FF10
0013FF20: 0013F824 0013FFB0 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000
0013FF40: 00000000 0015237E 00000001 00091378 7C93005D 7FFDC000 007834DB 0015237E
0013FF60: 00091378 00000044 001538C0 001538D0 001538E8 00000000 00000000 00000000
0013FF80: 00000000 00000000 00000000 00000000 00000C01 00000001 00000000 00000000
0013FFA0: 00010001 00000000 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000
0013FFC0: 0013FFF0 7C81776F 00091378 7C93005D 7FFDC000 8054C6ED 0013FFC8 95F74BB0
0013FFE0: FFFFFFFF 7C839AB0 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 16:01:14 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x00000008
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 00000008

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010202
EBX=077F8F80 SS=0023 ESP=0013FC08 EBP=06A79BE4
ECX=00000000 DS=0023 ESI=06A79BE4 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=077F8F7C GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0043DD6A 004954F2 004995BD 77D18BD9
Stack dump:
0013FC08: 00000000 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 06A79BE4 0013FC8C 077F8F7C 077F8F9B 0794CFCC 01C6F614
0013FC48: 0022002E 0043D793 0013FC74 0049E1E6 077F8F7C 0013FC8C 00000000 01C67928
0013FC68: 077F8F7C 0794CFCC 01C79BEC 00000000 07940000 02FFF000 005A8000 077F8E64
0013FC88: 0240DAA0 0794CFCC 01C79BEC 0043DD6A 01C67928 077F8E64 077F8F7C 0048ADDF
0013FCA8: 077F8F7C 00000000 01C9E61E 716158F8 00000001 046158F8 0000052C 01C79BEC
0013FCC8: 02B4E50C 004954F2 00000001 0013FD14 01C9E61E 00496943 00000000 01C68527
0013FCE8: 00000000 004995BD 00000000 0018D760 00000000 000001A1 000000BF 00000004
0013FD08: 0000BEC8 00000200 00000000 00499A22 7C80934A 0018D760 000001A1 000000BF
0013FD28: 00000004 0000BEC8 00000200 00000000 000001A1 000000BF 00000004 0000BEC8
0013FD48: 00000200 00000000 00000100 00000010 402A0001 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00AD78D0 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FE78 00000001 00000000 00000000 0013FD8C 00000000
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AD9110 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0018D760 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00091378 0015237E 0013FF34 7FFDA000 00000408
0013FE68: 00000032 00000001 00000008 00000001 000C0150 00000100 00000010 402A0001
0013FE88: 0018D760 000001A1 000000BF C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00091378 0015237E 7FFDA000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00091378 7C93005D 7FFDA000 007834DB 0015237E 00091378 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00091378 7C93005D 7FFDA000 8054C6ED 0013FFC8 95FC6C80 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 18:27:20 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x37383842
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 37383842

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A834558 SS=0023 ESP=0013FC08 EBP=09EB5334
ECX=3738383A DS=0023 ESI=09EB5334 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A834554 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 004B0D7E 004954F2 004995BD 77D18BD9 004F8B13
Stack dump:
0013FC08: 3738383A 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 09EB5334 0013FC8C 0A834554 0A834573 0A98730C 01C6F123
0013FC48: 038F45C0 C16E0000 3DB09FB6 0049E1E6 0A834554 0013FC8C 00000000 01C6762B
0013FC68: 0A834554 0A98730C 01C79A3A 00000000 0A98730C 00000000 000001C8 00000003
0013FC88: 00000006 004B0D7E 01C6762B 01C6762B 0A834324 0A98730C 0A834554 0048ADDF
0013FCA8: 0A834554 00000000 01C9E46C 716158F8 00000002 036158F8 000003E1 01C79A3A
0013FCC8: 0B4F3634 004954F2 00000001 0013FD14 01C9E46C 00496943 00000000 01C68375
0013FCE8: 00000000 004995BD 00000000 0007A45C 00000000 0000032F 00000383 00000000
0013FD08: 00003AB1 00000200 00000000 00499A22 7C80934A 0007A45C 0000032F 00000383
0013FD28: 00000000 00003AB1 00000200 00000000 0000032F 00000383 00000000 00003AB1
0013FD48: 00000200 00000000 00000200 00000000 0383032F 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDD000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ABF490 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AB7198 7FFDD000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0007A45C 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFDE000 000003C8
0013FE68: 00000032 00000001 00000008 0000000F 000400B0 00000200 00000000 0383032F
0013FE88: 0007A45C 0000032F 00000383 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFDE000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFDE000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFDE000 02BFFF84 0013FFC8 9670FA00 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 18:36:05 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x01010109
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 01010109

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010202
EBX=0AC373A8 SS=0023 ESP=0013FC08 EBP=09C0B2DC
ECX=01010101 DS=0023 ESI=09C0B2DC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0AC373A4 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048A96F 004953A2 004995BD 00499A22 0049EC68 0049EDE2
004E70F2 7C81776F
Stack dump:
0013FC08: 01010101 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 09C0B2DC 0013FC8C 0AC373A4 0AC373C3 0AD8894C 01C6EBD3
0013FC48: FFF50000 00100000 FFF50000 0049E1E6 0AC373A4 0013FC8C 00000000 01C6717D
0013FC68: 0AC373A4 0AD8894C 01C791AB 00000000 00007554 00000000 00002B39 0000756B
0013FC88: 0000005A 00002B39 0048A96F 0AC3728C 01C6717D 0AC3728C 0AC373A4 0048ADDF
0013FCA8: 0AC373A4 00000000 01C9DBDD 716158F8 00000002 06000000 000007C2 01C791AB
0013FCC8: 004953A2 004954F2 00000001 0013FD14 01C9DBDD 00496943 00000000 01C67AE6
0013FCE8: 00000000 004995BD 00000000 000FA956 00000000 0000037E 000001BA 00000000
0013FD08: 00007847 00000200 00000000 00499A22 7C80934A 000FA956 0000037E 000001BA
0013FD28: 00000000 00007847 00000200 00000000 0000037E 000001BA 00000000 00007847
0013FD48: 00000200 00000000 00000200 00000000 01BA037E 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDD000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00AB6E10 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00ABC948 7FFDD000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 000FA956 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFDE000 000003C8
0013FE68: 00000032 00000001 00000008 00000001 0007003E 00000200 00000000 01BA037E
0013FE88: 000FA937 0000037E 000001BA C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFDE000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFDE000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFDE000 805D3130 0013FFC8 95F04450 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004ab0c5.
Exception handler called in Main Thread. Time: Wed Nov 20 20:15:49 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A428 to 00140000
Instruction pointer is 004AB0C5
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0xA002E6ED
ExceptionFlags = 00000000 ExceptionAddress = 004AB0C5
Parameters = 00000000 A002E6ED

Registers:
EAX=A002E6ED CS=001B EIP=004AB0C5 EFLGS=00010286
EBX=01C9C9F4 SS=0023 ESP=0013FA20 EBP=0013FAE8
ECX=0013FAE8 DS=0023 ESI=00000228 FS=0000003B
EDX=01C650E6 ES=0023 EDI=A002E6ED GS=00000000

Bytes at CS:EIP:
8b 07 56 55 8b 6c 24 24 53 8b 5c 24 2c 53 55 50

Call stack:
004AB0C5 004AB0DA 004AB187 0046A308 004969D2 004995BD 00499A22 0049EC68
0049EDE2 004E70F2 7C81776F
Stack dump:
0013FA20: 0BD40918 00000000 00000074 0000001C 00000080 004AB0DA A002E6ED 0013FAE8
0013FA40: 01C9C9F4 01C9C9F4 0013FAE8 00000228 0B95C8B4 005A0000 00000000 00484A9D
0013FA60: 3013FAE8 004AB0DA 0BD40918 0013FAE8 01C9C9F4 00000001 01C64BCD 00000228
0013FA80: 00000000 00000042 00000001 00000000 00000000 004AB187 0B95C8B4 0013FAE8
0013FAA0: 01C9C9F4 0046A308 01C650E6 0013FAE8 01C9C9F4 00000000 01C9D952 716158F8
0013FAC0: 00000001 01C66730 000000CF 00000001 0CBF5502 00000041 90E00371 0DAC5CCC
0013FAE0: 43524F43 00004D4F 00000320 00000258 00000320 0C8C5B90 00002710 FFFFFFFF
0013FB00: 00000000 00000000 00000000 0000031F 00000257 00000001 00000000 00000000
0013FB20: FFFFF871 00000000 01C65998 7A000000 D5B7E744 19316947 7A000047 1F3A2844
0013FB40: 003EDB47 7A000045 7A000044 0013FC44 00000020 00000000 00000000 00000001
0013FB60: 000001D0 0000012C 00000000 0013FC30 77D4048F 77D2C1F0 FFFFFFFF 77D2C1E9
0013FB80: 004B5FBE 000B013C 00000020 004B5CC0 02020001 004B5CC0 00000000 0013FBE0
0013FBA0: 004B5CC0 0013FC0C 77D18BD9 7FFDF000 77D18734 000B013C 00000020 000B013C
0013FBC0: 02020001 004B5CC0 DCBAABCD 00000000 0013FC14 004B5CC0 20202020 20202020
0013FBE0: 203A2020 303A3030 30303A30 00000000 00000000 010C0000 004B6D2E 00000000
0013FC00: 0013FC0C 0013FC80 0013FC8C 0013FCC8 010C0000 01500000 0048C7D8 0013FCA4
0013FC20: 00000004 000001D3 000000FC 0D970124 01C67843 0CBF5500 7FFF0000 00000000
0013FC40: 0D970188 FFF054E4 00000000 000FAB1C FFF054E4 00000000 FFF054E4 FFF054E4
0013FC60: 00000000 FFF054E4 000FAB1C 00000000 FFF054E4 000FAB1C 00000000 000FAB1C
0013FC80: FFF054E4 00000000 0000010F 000000DA 0000031F 0D970124 00000000 00000018
0013FCA0: 0047F7D8 0048BC5B 01C66730 0D970124 716158F8 00000000 01C9D952 00000001
0013FCC0: 01C9C9F4 00000001 000079F5 FFFFC47E 00000085 0CBF5502 004969D2 00000001
0013FCE0: 00000001 00000000 00000000 004995BD 01C6785B 0013FD38 00000000 000001D3
0013FD00: 000000FC 00000000 0003358A 00000202 00000000 00499A22 7C80934A 006AF8B4
0013FD20: 000001D3 000000FC 00000000 0003358A 00000202 00000000 000001D3 000000FC
0013FD40: 00000000 00033582 00000200 00000000 00000202 00000000 00FC01D3 10008350
0013FD60: DCBAABCD 00000000 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8
0013FD80: 77D1885A 0013FD98 77D1882A 0013FE80 0013FE78 00AB3590 00000014 00000001
0013FDA0: 00000000 00000000 00000010 00000000 0013FD9C 00000001 00000000 00000000
0013FDC0: 0013FD8C FFFFFFFF 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD
0013FDE0: 00000000 77D193E9 77D193A8 0013FE78 00000000 00000000 00000000 00000000
0013FE00: 00ABC948 7FFDF000 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000
0013FE20: 00000000 00000000 00000001 7C80934A 006AF8B4 00000000 716158F8 0049EC49
0013FE40: 0013FE78 00000000 00000000 00000000 0049EC68 00000000 0015237E 0013FF34
0013FE60: 7FFD5000 000003C8 00000032 00000001 00000008 0000000F 000B013C 00000202
0013FE80: 00000000 00FC01D3 006AF8B4 000001D3 000000FC C3D3B9CA B0D35151 A5B2F4D2
0013FEA0: 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388
0013FEC0: 00000000 00000000 C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEE0: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2
0013FF00: 00400000 00000000 0015237E 00000001 00000000 0015237E 7FFD5000 0013FF10
0013FF20: 0013F644 0013FFB0 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000
0013FF40: 00000000 0015237E 00000001 00000000 00000000 7FFD5000 007834DB 0015237E
0013FF60: 00000000 00000044 001538C0 001538D0 001538E8 00000000 00000000 00000000
0013FF80: 00000000 00000000 00000000 00000000 00000C01 00000001 00000000 00000000
0013FFA0: 00010001 00000000 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000
0013FFC0: 0013FFF0 7C81776F 00000000 00000000 7FFD5000 00000000 0013FFC8 95F97768
0013FFE0: FFFFFFFF 7C839AB0 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4000
TagWord = FFFFFFFF ErrorOffset = 0045997A
ErrorSelector = 00000000 DataOffset = 004FD4C0
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc8.
Exception handler called in Main Thread. Time: Wed Nov 20 20:21:20 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A608 to 00140000
Instruction pointer is 004B0BC8
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x7F06888E
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC8
Parameters = 00000000 7F06888E

Registers:
EAX=7F06888A CS=001B EIP=004B0BC8 EFLGS=00010246
EBX=0D6C6E50 SS=0023 ESP=0013FC00 EBP=00000000
ECX=00430042 DS=0023 ESI=0CD4A5BC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0D6C6E4C GS=00000000

Bytes at CS:EIP:
8b 58 04 56 85 db 57 89 4c 24 10 7e 3e 8b 78 1c

Call stack:
004B0BC8 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
004E70F2 7C81776F
Stack dump:
0013FC00: 0CD4A5BC 0D6C6E50 00430042 0043E3E9 005052C8 0013FC28 00000000 00000000
0013FC20: 00000000 0013FC8C 00000000 0048A2FC 0CD4A5BC 0013FC8C 0D6C6E4C 0D6C6E6B
0013FC40: 0D81B98C 01C6FB38 00130766 0043D793 0013FC74 0049E1E6 0D6C6E4C 0013FC8C
0013FC60: 00000000 01C67A6B 0D6C6E4C 0D81B98C 01C7A110 00000000 0D81B98C 00000000
0013FC80: 00000098 00000003 00000002 000017C0 01C67A6B 01C67A6B 0D6C6D34 0D81B98C
0013FCA0: 0D6C6E4C 0048ADDF 0D6C6E4C 00000000 01C9EB42 716158F8 00000001 016158F8
0013FCC0: 0000014B 01C7A110 0392A770 004954F2 00000001 0013FD14 01C9EB42 00496943
0013FCE0: 00000000 01C68A4B 00000000 004995BD 00000000 0070059C 00000000 00000066
0013FD00: 0000019D 0000000C 00035C4C 00000200 00000000 00499A22 7C80934A 0070059C
0013FD20: 00000066 0000019D 0000000C 00035C4C 00000200 00000000 00000066 0000019D
0013FD40: 0000000C 00035C4C 00000200 00000000 00000100 00000010 402A0001 10008350
0013FD60: DCBAABCD 00000000 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8
0013FD80: 77D1885A 0013FD98 77D1882A 0013FE80 0013FE78 00AB6B68 00000014 00000001
0013FDA0: 00000000 00000000 00000010 00000000 0013FE78 00000001 00000000 00000000
0013FDC0: 0013FD8C 00000000 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD
0013FDE0: 00000000 77D193E9 77D193A8 0013FE78 00000000 00000000 00000000 00000000
0013FE00: 00AB3C30 7FFDF000 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000
0013FE20: 00000000 00000000 00000001 7C80934A 0070059C 00000000 716158F8 0049EC49
0013FE40: 0013FE78 00000000 00000000 00000000 0049EC68 00000000 0015237E 0013FF34
0013FE60: 7FFDB000 000003C8 00000032 00000001 00000008 00000001 000C013C 00000100
0013FE80: 00000010 402A0001 0070058D 00000066 0000019D C3D3B9CA B0D35151 A5B2F4D2
0013FEA0: 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388
0013FEC0: 00000000 00000000 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEE0: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2
0013FF00: 00400000 00000000 0015237E 00000001 00000000 0015237E 7FFDB000 0013FF10
0013FF20: 0013F824 0013FFB0 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000
0013FF40: 00000000 0015237E 00000001 00000000 00000000 7FFDB000 007834DB 0015237E
0013FF60: 00000000 00000044 001538C0 001538D0 001538E8 00000000 00000000 00000000
0013FF80: 00000000 00000000 00000000 00000000 00000C01 00000001 00000000 00000000
0013FFA0: 00010001 00000000 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000
0013FFC0: 0013FFF0 7C81776F 00000000 00000000 7FFDB000 8054C6ED 0013FFC8 96835DA0
0013FFE0: FFFFFFFF 7C839AB0 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 20:57:12 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0xB81D0009
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 B81D0009

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A011F10 SS=0023 ESP=0013FC08 EBP=093E9BE4
ECX=B81D0001 DS=0023 ESI=093E9BE4 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A011F0C GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
004E70F2 7C81776F
Stack dump:
0013FC08: B81D0001 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 093E9BE4 0013FC8C 0A011F0C 0A011F2B 0A16730C 01C6FB3D
0013FC48: 00000000 0A011D38 79A316D2 0049E1E6 0A011F0C 0013FC8C 00000000 01C66AA1
0013FC68: 0A011F0C 0A16730C 01C78EB0 00000000 0A16730C 00000000 000001C8 00000003
0013FC88: 00000006 00007CC0 01C66AA1 01C66AA1 0A011DF4 0A16730C 0A011F0C 0048ADDF
0013FCA8: 0A011F0C 00000000 01C9D8E2 716158F8 00000002 03000000 000003E1 01C78EB0
0013FCC8: 004953A2 004954F2 00000001 0013FD14 01C9D8E2 00496943 00000000 01C677EB
0013FCE8: 00000000 004995BD 00000000 0006B345 00000000 000001C5 00000196 00000000
0013FD08: 00003375 00000200 00000000 00499A22 7C80934A 0006B345 000001C5 00000196
0013FD28: 00000000 00003375 00000200 00000000 000001C5 00000196 00000000 00003375
0013FD48: 00000200 00000000 00000200 00000000 019601C5 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ACBF10 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AC2378 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0006B345 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFD6000 000003C8
0013FE68: 00000032 00000001 00000008 0000000F 000B0128 00000200 00000000 019601C5
0013FE88: 0006B345 000001C5 00000196 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFD6000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFD6000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFD6000 00000000 0013FFC8 95F079E8 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004339c0.
Exception handler called in Main Thread. Time: Wed Nov 20 21:13:53 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A574 to 00140000
Instruction pointer is 004339C0
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x2627FDAE
ExceptionFlags = 00000000 ExceptionAddress = 004339C0
Parameters = 00000000 2627FDAE

Registers:
EAX=2627FDAA CS=001B EIP=004339C0 EFLGS=00010206
EBX=0013FBE8 SS=0023 ESP=0013FB6C EBP=2627FDAA
ECX=2627FDAA DS=0023 ESI=000003DD FS=0000003B
EDX=2627FDAA ES=0023 EDI=01C7A195 GS=00000000

Bytes at CS:EIP:
8b 51 04 85 d2 75 03 33 c0 c3 8b 41 08 2b c2 c1

Call stack:
004339C0 004823D1 00482688 00482B63 0048617D 00403D60 0043B880 0048AF9D
004954F2 00496943 004995BD 00499A22 0049EC68 0049EDE2 004E70F2 7C81776F
Stack dump:
0013FB6C: 004823D1 000003D9 0013FBE8 000003DD 00000001 00512738 00000005 00000000
0013FB8C: 000003DD 000003D9 000007BB 00000001 00010001 01C7A195 00000000 05FCAC08
0013FBAC: 2627FDAA 000007BC FDFD4AE0 00482688 0013FBE8 00000000 09EC656C 0A01B98C
0013FBCC: 027A350D 0001000E 00482B63 0013FB00 00000000 09EC6474 027A350D 01C67CFF
0013FBEC: 09EC64EE 00000000 09EC656C 7BA80000 00010000 7B280000 0000007B 02000080
0013FC0C: 0048617D 09EC6474 09EC5DE4 038B2980 027A350D 038B29A2 0000014B 00403D60
0013FC2C: 027A350D 0001003D 7BA80000 00010000 7B280000 00000000 00000001 00000000
0013FC4C: 000000A0 038B2980 00000000 09EC5E40 09AA1B3C 00000000 0A01B98C 00000001
0013FC6C: 0A01B98C 01C7A259 09AA1B3C 0A01B98C 020FE303 0043B880 00010001 038B2980
0013FC8C: 07B207BA 01C67BB4 09EC5DE4 0A01B98C 01C7A259 09EC5E40 0048AF9D 09EC5DE4
0013FCAC: 00000000 01C9EC8B 716158F8 00000002 01000000 0000014B 01C7A259 004953A2
0013FCCC: 004954F2 00000001 0013FD14 01C9EC8B 00496943 00000000 01C68B94 00000000
0013FCEC: 004995BD 00000000 0015FA77 00000000 0000003A 00000202 00000000 0000A8CB
0013FD0C: 00000200 00000000 00499A22 7C80934A 0015FA77 0000003A 00000202 00000000
0013FD2C: 0000A8CB 00000200 00000000 0000003A 00000202 00000000 0000A8CB 00000200
0013FD4C: 00000000 00000200 00000000 0202003A 10008350 DCBAABCD 00000000 0013FDAC
0013FD6C: 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98 77D1882A
0013FD8C: 0013FE80 0013FE78 00AD01A8 00000014 00000001 00000000 00000000 00000010
0013FDAC: 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF 0013FE28
0013FDCC: 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9 77D193A8
0013FDEC: 0013FE78 00000000 00000000 00000000 00000000 00AB5828 7FFDF000 00000000
0013FE0C: 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000 00000001
0013FE2C: 7C80934A 0015FA77 00000000 716158F8 0049EC49 0013FE78 00000000 00000000
0013FE4C: 00000000 0049EC68 00000000 0015237E 0013FF34 7FFD8000 000003CC 00000032
0013FE6C: 00000001 00000008 00000001 000D0110 00000200 00000000 0202003A 0015FA77
0013FE8C: 0000003A 00000202 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEAC: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000 C3D3B9CA
0013FECC: B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC
0013FEEC: 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000 0015237E
0013FF0C: 00000001 00000000 0015237E 7FFD8000 0013FF10 0013F790 0013FFB0 004E6718
0013FF2C: 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E 00000001
0013FF4C: 00000000 00000000 7FFD8000 007834DB 0015237E 00000000 00000044 001538C0
0013FF6C: 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000 00000000
0013FF8C: 00000000 00000C01 00000001 00000000 00000000 00010001 00000000 0013FF4C
0013FFAC: 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F 00000000
0013FFCC: 00000000 7FFD8000 8054C6ED 0013FFC8 968697B8 FFFFFFFF 7C839AB0 7C817778
0013FFEC: 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437855
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Thu Nov 21 10:06:49 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x63650073
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 63650073

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=06B01A50 SS=0023 ESP=0013FC08 EBP=06584FEC
ECX=6365006B DS=0023 ESI=06584FEC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=06B01A4C GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0043DD6A 004954F2 004995BD 77D18BD9
Stack dump:
0013FC08: 6365006B 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 06584FEC 0013FC8C 06B01A4C 06B01A6B 06C55CCC 01C6E8D8
0013FC48: 06C55CCC 01C78EB0 03838AC0 0049E1E6 06B01A4C 0013FC8C 00000000 01C666C0
0013FC68: 06B01A4C 06C55CCC 01C78EB0 00000000 06C55CCC 0478C000 00A58000 06B01934
0013FC88: 03838AC0 06C55CCC 01C78EB0 0043DD6A 01C666C0 06B01934 06B01A4C 0048ADDF
0013FCA8: 06B01A4C 00000000 01C9D8E2 716158F8 00000001 006158F8 00000000 01C78EB0
0013FCC8: 716158F8 004954F2 00000001 0013FD14 01C9D8E2 00496943 00000000 01C677EB
0013FCE8: 00000000 004995BD 00000000 00695AB4 00000000 000001C7 00000196 00000000
0013FD08: 0003291F 00000200 00000000 00499A22 7C80934A 00695AB4 000001C7 00000196
0013FD28: 00000000 0003291F 00000200 00000000 000001C7 00000196 00000000 0003291F
0013FD48: 00000200 00000000 00000200 00000000 019601C7 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ADEF60 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00ADD3C8 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 00695AB4 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFD6000 000003C8
0013FE68: 00000032 00000001 00000008 0000000F 002700A4 00000200 00000000 019601C7
0013FE88: 00695AA4 000001C7 00000196 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFD6000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFD6000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFD6000 8054C6ED 0013FFC8 95DCD020 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 00000000 DataOffset = 004FD270
DataSelector = FFFF0000 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028

应该不是地图的原因,我用一张支持10个Player的原机海战图玩到10分钟也一样退出了。在另一台电脑上使用修改过的totala4.hpi里面的第25关全金属可以正常使用1 vs 9 ,但在这台电脑上同样只能玩10分钟。这是我的电脑配置,真搞不懂怎么会出现这个情况。

不是地图问题,也不是硬件不兼容,原来装的是XP sp3,换成XP SP2 运行正常。就可惜是网吧专用,优化过头了,打印机驱动都装不了

问题出在33b没有使用TApatch,把tdraw复制一份,改名成xdraw覆盖掉原来的xdraw就可以了

谢谢xpoy热心解答,试验下来更惨,不到2分钟就退出了。我的安装顺序你看下是否有问题:安装3合1包,升级3902补丁(21.7MB+152MB),运行总修复(1次出100那个补丁),复制33B2(TA33B.exe和ta33bn.33b两个文件)和资源作弊单位.ccx到TA目录,运行5000人口补丁(已替换成TA33B.EXE),把TA33B设置成兼容win98模式启动。奇怪的是每一步检查都没有xdraw这个文件。再把tdraw复制一份,改名成xdraw覆盖掉原来的xdraw,结果仍然不行。

联想到在别的电脑上用较早系统(2012年5月的深度系统)正常运行1 vs 9 ,前天重装2013年的深度系统(和本机一样的)后也出现了玩不了的情况,以及本机用2008年的网吧XP SP2系统能正常运行,分析应该是系统集成的某个程序冲突导致。

花了一天的时间进行试验各种不同时期、不同版本的XP系统,都不行,后来干脆装原版的,也不行,以上都是在系统装好,打上驱动后安装TA来测试的。要说ghost版带的软件冲突导致,那原版的什么软件都没装也不能运行就奇怪了。甚至于原来能用的2008版的网吧系统恢复后竟然也不能用了。这可能是33B是后来开发的,运行环境已不是原来97年的了。我能运行1 vs 9估计是碰巧把一些关键文件装进去了,具体是哪些文件就不得而知的了。恢复能用的版本时为了彻底检验都是删除了原来的游戏目录重新安装的。所以缺失的文件应该是游戏目录里的。

把TA目录的文件门截图帮看看
5000人口设置成3000人口再试试安装了patch布丁,在ta目录里面几个ini文件里面修改unitlimit的值就可以,不用打人口补丁了

谢谢xpoy,小弟没有编程基础,全凭感觉连蒙带猜的想弄清问题出在何处,弄了很久都没弄明白,真的很无招,呵呵。玩来玩去就只喜欢原子版的33B,不知道其他兄弟有没有出现过我这样的情况不能1 vs 9。今天拿原版任务地图修改成对战地图时发现TA不能识别,必须新建地图再把任务地图复制进来修改才行,提醒一下后来的的兄弟。

看不出什么问题,把errorlog.txt删掉,然后等出现和之前一样的错误时,再重新发一次,出错的时候关注下是选择的哪个单位出的错,和哪个地图

什么都没建造,把40带到安全的地方等着错误出现,果然10分钟(游戏里的计时)出错退出,地图是自建的我放附件里

TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Sun Nov 24 07:50:39 2013
D:\Cavedog\TOTALA\TA33B.exe, run by SSS on AAZZBB
Executable is 1178624 bytes long and dated 11/21/2013 22:47:48
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
2 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x727700AF
ExceptionFlags = 00000000 ExceptionAddress = 004B0BC1
Parameters = 00000000 727700AF

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010202
EBX=0A3E8490 SS=0023 ESP=0013FC08 EBP=097BFAD4
ECX=727700A7 DS=0023 ESI=097BFAD4 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A3E848C GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 004B0D7E 004954F2 004995BD 77D18BD9 004F8B13
Stack dump:
0013FC08: 727700A7 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 097BFAD4 0013FC8C 0A3E848C 0A3E84AB 0A53CFCC 01C6EC43
0013FC48: 00156000 0017C000 00156000 0049E1E6 0A3E848C 0013FC8C 00000000 01C66F57
0013FC68: 0A3E848C 0A53CFCC 01C7921B 00000000 0A53CFCC 00000000 00001C77 000037CC
0013FC88: 00000000 004B0D7E 01C66F57 01C66F57 0A3E8374 0A53CFCC 0A3E848C 0048ADDF
0013FCA8: 0A3E848C 00000000 01C9DC4D 7161219E 00000001 0461219E 0000052C 01C7921B
0013FCC8: 7161219E 004954F2 00000001 0013FD14 01C9DC4D 00496943 00000000 01C67B56
0013FCE8: 00000000 004995BD 00000000 00086F3D 00000000 000001D2 000001BE 00000000
0013FD08: 00004037 00000200 00000000 00499A22 7C80934A 00086F3D 000001D2 000001BE
0013FD28: 00000000 00004037 00000200 00000000 000001D2 000001BE 00000000 00004037
0013FD48: 00000200 00000000 00000200 00000000 01BE01D2 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDD000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00AE3970 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00ADF968 7FFDD000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 77D298B2 7C92DFAC
0013FE28: 00000064 7C80934A 00086F3D 00000000 7161219E 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00091378 0015237E 0013FF34 7FFDE000 000003A0
0013FE68: 00000032 00000001 00000008 00000001 00050260 00000200 00000000 01BE01D2
0013FE88: 00085C80 000001D2 000001BE 79616C50 02100000 005109E0 00000002 004F264E
0013FEA8: 02100072 00000086 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: 79616C50 02100000 005109E0 00000002 004F264E 02100070 00000088 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00091378 0015237E 7FFDE000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00091378 7C93003D 7FFDE000 007834DB 0015237E 00091378 00000044
0013FF68: 00153978 00153988 001539A0 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00091378 7C93003D 7FFDE000 8054C6ED 0013FFC8 8F961B30 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 00437921
ErrorSelector = 001D001B DataOffset = 004FD270
DataSelector = FFFF0023 Cr0NpxState = 00000000

smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00074000 : 5.1.2600.5512
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028

一、33A打上3902补丁可稳定运行33分钟以上,但人口从3000被覆盖成了250,估

计应该没问题就没继续测试;

二、33A使用资源作弊单位也稳定运行30分钟,人口250;

33A修改人口数量为3000,再运行,稳定但人口依然为250;

三、复制33B到TA目录,人口数量修改为3000,保留资源作弊单位,稳定运行30分

钟,但人口仍为250;

四、复制“总修复”文件到TA目录运行,出现图片1错误,33B运行提示没找到

XXRAW.DLL

五、不删除TA目录,重新安装TA,再运行33B,提示没找到XXRAW.DLL,再次运行

“总修复”,33B可以进入游戏,稳定运行30分钟以上,并可一次出兵100,但人

口数量为1500;

六、在ini文件里修改人口为3000,进入游戏,人口为3000,可一次出兵100,但2

分钟后出错退出。

七、删除Dplayx.dll,运行33B,稳定运行30分钟,一次能出兵100,资源作弊单

位可用,人口3000;

八,删除Dplayx.dll,在ini文件里修改人口为5000,10分钟后出错。(未打人口

补丁)

以前5000人口时怎么正常玩的 1 vs 9呢?一点头绪都没有,在第八条后打上人口补丁依然出错。11楼时xpoy说的xdraw.dll也一直没出现,照方法复制xdraw.dll到TA目录,依然10分钟出错退出。