横扫天下会 最高指挥官

 找回密码
 注册
查看: 7357|回复: 39

抛砖引玉,传63×63,10×63全金属地图三张

  [复制链接]
发表于 2013-11-14 15:38 | 显示全部楼层 |阅读模式
本帖最后由 yourananran 于 2013-11-24 00:29 编辑

不会制图,借用游戏里金属地图进行修改,第三张为后来添加的,用原版任务地图做的修改,规格为63×63,也是全金属,有点像塔台防守。方便像我这样的菜鸟。测试最多可以顺利玩6个人的,试验10个人时内存出错,不知道是什么原因

AN.rar

1.01 MB, 下载次数: 224

回复

使用道具 举报

发表于 2013-11-14 20:36 | 显示全部楼层
出错是因为玩家的出生位置不够。自己动手丰衣足食呀
回复 支持 反对

使用道具 举报

 楼主| 发表于 2013-11-14 23:07 | 显示全部楼层
xpoy 发表于 2013-11-14 20:36
出错是因为玩家的出生位置不够。自己动手丰衣足食呀

谢谢大侠指点,回去我再仔细看看,我明明是设置了10个player的啊
回复 支持 反对

使用道具 举报

 楼主| 发表于 2013-11-20 17:57 | 显示全部楼层
xpoy 发表于 2013-11-14 20:36
出错是因为玩家的出生位置不够。自己动手丰衣足食呀

大侠,1vs9时,用原子A版、B版都在10分钟左右就出现内存错误退出,1vs4则没有,出生位置全都重新设置好了的,10个一个没少,少了的话可能进去就出错了,地图占用内存设置为128MB。重装TA,重装系统都没用,请帮忙看看哪儿没设置好
回复 支持 反对

使用道具 举报

发表于 2013-11-20 19:51 | 显示全部楼层
更新TA PATCH 3.9.2试试
回复 支持 反对

使用道具 举报

 楼主| 发表于 2013-11-20 20:24 | 显示全部楼层
xpoy 发表于 2013-11-20 19:51
更新TA PATCH 3.9.2试试

更新后也不行,最多能玩1 vs 6,再多一个AI 不到10分钟就退出了
回复 支持 反对

使用道具 举报

发表于 2013-11-21 00:02 | 显示全部楼层
TA目录里面的errorlog.txt文件上传上来看看
回复 支持 反对

使用道具 举报

 楼主| 发表于 2013-11-21 10:10 | 显示全部楼层
xpoy 发表于 2013-11-21 00:02
TA目录里面的errorlog.txt文件上传上来看看

TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 15:40:22 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:28:02
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x30040008
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC1
Parameters = 00000000        30040008

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A6FE268 SS=0023 ESP=0013FC08 EBP=0982A15C
ECX=30040000 DS=0023 ESI=0982A15C FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A6FE264 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
Stack dump:
0013FC08: 30040000 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 0982A15C 0013FC8C 0A6FE264 0A6FE283 0A852C8C 01C6E7BB
0013FC48: FFF00000 00100000 FFF00000 0049E1E6 0A6FE264 0013FC8C 00000000 01C66F59
0013FC68: 0A6FE264 0A852C8C 01C790D2 00000000 0A852C8C 00000000 000001C8 00000003
0013FC88: 00000006 00008640 01C66F59 01C66F59 0A6FE14C 0A852C8C 0A6FE264 0048ADDF
0013FCA8: 0A6FE264 00000000 01C9DB04 716158F8 00000002 05000000 00000677 01C790D2
0013FCC8: 004953A2 004954F2 00000001 0013FD14 01C9DB04 00496943 00000000 01C67A0D
0013FCE8: 00000000 004995BD 00000000 0005BBE5 00000000 0000019E 00000198 00000004
0013FD08: 00002C09 00000200 00000000 00499A22 7C80934A 0005BBE5 0000019E 00000198
0013FD28: 00000004 00002C09 00000200 00000000 0000019E 00000198 00000004 00002C09
0013FD48: 00000200 00000000 00000200 00000004 0198019E 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00AD6938 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AD1038 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0005BBE5 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00091378 0015237E 0013FF34 7FFD4000 00000408
0013FE68: 00000032 00000001 00000008 0000000F 000400FE 00000200 00000004 0198019E
0013FE88: 0005BBD5 0000019E 00000198 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: 79616C00 00790000 00510000 00000002 004F264E 00CC006F 00000020 00528A28
0013FEE8: 0050104C 7C956DE9 7C829B6D 0050104C 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00091378 0015237E 7FFD4000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00091378 7C93005D 7FFD4000 007834DB 0015237E 00091378 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00091378 7C93005D 7FFD4000 8054C6ED 0013FFC8 95E893A0 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33A caused an Access Violation in
module TA33A.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 15:47:39 2013
E:\Cavedog\TOTALA\TA33A.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:41:20
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x000C000B
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC1
Parameters = 00000000        000C000B

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A3000A8 SS=0023 ESP=0013FC08 EBP=0982A4A4
ECX=000C0003 DS=0023 ESI=0982A4A4 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A3000A4 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
Stack dump:
0013FC08: 000C0003 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 0982A4A4 0013FC8C 0A3000A4 0A3000C3 0A45164C 01C6BFCA
0013FC48: 00100800 00100800 00100800 0049E1E6 0A3000A4 0013FC8C 00000000 01C66512
0013FC68: 0A3000A4 0A45164C 01C78A6C 00000000 0A45164C 00000000 00000098 00000003
0013FC88: 00000002 00006640 01C66512 01C66512 0A2FFF8C 0A45164C 0A3000A4 0048ADDF
0013FCA8: 0A3000A4 00000000 01C9D49E 716158F8 00000003 026158F8 00000296 01C78A6C
0013FCC8: 02267778 004954F2 00000001 0013FD14 01C9D49E 00496943 00000000 01C673A7
0013FCE8: 00000000 004995BD 01C673A7 0013FD38 00000000 000001F3 000001B0 00000000
0013FD08: 00005F4A 00000205 00000000 00499A22 7C80934A 000C6845 000001F3 000001B0
0013FD28: 00000000 00005F4A 00000205 00000000 000001F0 000001AC 00000000 00005F4A
0013FD48: 00000200 00000000 00000200 00000000 01AC01F0 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ADA420 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AB4050 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 000C6845 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00091378 0015237E 0013FF34 7FFD5000 00000408
0013FE68: 00000032 00000001 00000008 00000001 000900EC 00000200 00000000 01AC01F0
0013FE88: 000C6854 000001F0 000001AC C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00091378 0015237E 7FFD5000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00091378 7C93005D 7FFD5000 007834DB 0015237E 00091378 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00091378 7C93005D 7FFD5000 8054C6ED 0013FFC8 969379C0 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33A.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc8.
Exception handler called in Main Thread. Time: Wed Nov 20 15:53:45 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A608 to 00140000
Instruction pointer is 004B0BC8
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x0202AE0C
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC8
Parameters = 00000000        0202AE0C

Registers:
EAX=0202AE08 CS=001B EIP=004B0BC8 EFLGS=00010246
EBX=0A2FCF70 SS=0023 ESP=0013FC00 EBP=00000000
ECX=00360064 DS=0023 ESI=099813FC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A2FCF6C GS=00000000

Bytes at CS:EIP:
8b 58 04 56 85 db 57 89 4c 24 10 7e 3e 8b 78 1c

Call stack:
004B0BC8 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
Stack dump:
0013FC00: 099813FC 0A2FCF70 00360064 0043E3E9 005052C8 0013FC28 00000000 00000000
0013FC20: 00000000 0013FC8C 00000000 0048A2FC 099813FC 0013FC8C 0A2FCF6C 0A2FCF8B
0013FC40: 0A45164C 01C68C9B 0A45164C 01C791AB 03CA26B0 0049E1E6 0A2FCF6C 0013FC8C
0013FC60: 00000000 01C66C51 0A2FCF6C 0A45164C 01C791AB 00000000 0A45164C 00000000
0013FC80: 00000098 00000003 00000002 000055C0 01C66C51 01C66C51 0A2FCE54 0A45164C
0013FCA0: 0A2FCF6C 0048ADDF 0A2FCF6C 00000000 01C9DBDD 716158F8 00000002 02000000
0013FCC0: 00000296 01C791AB 004953A2 004954F2 00000001 0013FD14 01C9DBDD 00496943
0013FCE0: 00000000 01C67AE6 00000000 004995BD 00000000 0011FC2F 00000000 0000026B
0013FD00: 00000185 00000001 00008A20 00000200 00000000 00499A22 7C80934A 0011FC2F
0013FD20: 0000026B 00000185 00000001 00008A20 00000200 00000000 0000026B 00000185
0013FD40: 00000001 00008A20 00000200 00000000 00000200 00000001 0185026B 10008350
0013FD60: DCBAABCD 00000000 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8
0013FD80: 77D1885A 0013FD98 77D1882A 0013FE80 0013FE78 00ADBBA8 00000014 00000001
0013FDA0: 00000000 00000000 00000010 00000000 0013FD9C 00000001 00000000 00000000
0013FDC0: 0013FD8C FFFFFFFF 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD
0013FDE0: 00000000 77D193E9 77D193A8 0013FE78 00000000 00000000 00000000 00000000
0013FE00: 00AD89D0 7FFDF000 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000
0013FE20: 00000000 00000000 00000001 7C80934A 0011FC2F 00000000 716158F8 0049EC49
0013FE40: 0013FE78 00000000 00000000 00000000 0049EC68 00091378 0015237E 0013FF34
0013FE60: 7FFDC000 00000408 00000032 00000001 00000008 00000001 000E00A6 00000200
0013FE80: 00000001 0185026B 0011FC2F 0000026B 00000185 C3D3B9CA B0D35151 A5B2F4D2
0013FEA0: 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388
0013FEC0: 00000000 00000000 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEE0: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2
0013FF00: 00400000 00000000 0015237E 00000001 00091378 0015237E 7FFDC000 0013FF10
0013FF20: 0013F824 0013FFB0 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000
0013FF40: 00000000 0015237E 00000001 00091378 7C93005D 7FFDC000 007834DB 0015237E
0013FF60: 00091378 00000044 001538C0 001538D0 001538E8 00000000 00000000 00000000
0013FF80: 00000000 00000000 00000000 00000000 00000C01 00000001 00000000 00000000
0013FFA0: 00010001 00000000 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000
0013FFC0: 0013FFF0 7C81776F 00091378 7C93005D 7FFDC000 8054C6ED 0013FFC8 95F74BB0
0013FFE0: FFFFFFFF 7C839AB0 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 16:01:14 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x00000008
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC1
Parameters = 00000000        00000008

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010202
EBX=077F8F80 SS=0023 ESP=0013FC08 EBP=06A79BE4
ECX=00000000 DS=0023 ESI=06A79BE4 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=077F8F7C GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0043DD6A 004954F2 004995BD 77D18BD9
Stack dump:
0013FC08: 00000000 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 06A79BE4 0013FC8C 077F8F7C 077F8F9B 0794CFCC 01C6F614
0013FC48: 0022002E 0043D793 0013FC74 0049E1E6 077F8F7C 0013FC8C 00000000 01C67928
0013FC68: 077F8F7C 0794CFCC 01C79BEC 00000000 07940000 02FFF000 005A8000 077F8E64
0013FC88: 0240DAA0 0794CFCC 01C79BEC 0043DD6A 01C67928 077F8E64 077F8F7C 0048ADDF
0013FCA8: 077F8F7C 00000000 01C9E61E 716158F8 00000001 046158F8 0000052C 01C79BEC
0013FCC8: 02B4E50C 004954F2 00000001 0013FD14 01C9E61E 00496943 00000000 01C68527
0013FCE8: 00000000 004995BD 00000000 0018D760 00000000 000001A1 000000BF 00000004
0013FD08: 0000BEC8 00000200 00000000 00499A22 7C80934A 0018D760 000001A1 000000BF
0013FD28: 00000004 0000BEC8 00000200 00000000 000001A1 000000BF 00000004 0000BEC8
0013FD48: 00000200 00000000 00000100 00000010 402A0001 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00AD78D0 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FE78 00000001 00000000 00000000 0013FD8C 00000000
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AD9110 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0018D760 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00091378 0015237E 0013FF34 7FFDA000 00000408
0013FE68: 00000032 00000001 00000008 00000001 000C0150 00000100 00000010 402A0001
0013FE88: 0018D760 000001A1 000000BF C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00091378 0015237E 7FFDA000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00091378 7C93005D 7FFDA000 007834DB 0015237E 00091378 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00091378 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00091378 7C93005D 7FFDA000 8054C6ED 0013FFC8 95FC6C80 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 0016C000 : 8.2.2.1650
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 18:27:20 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x37383842
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC1
Parameters = 00000000        37383842

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A834558 SS=0023 ESP=0013FC08 EBP=09EB5334
ECX=3738383A DS=0023 ESI=09EB5334 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A834554 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 004B0D7E 004954F2 004995BD 77D18BD9 004F8B13
Stack dump:
0013FC08: 3738383A 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 09EB5334 0013FC8C 0A834554 0A834573 0A98730C 01C6F123
0013FC48: 038F45C0 C16E0000 3DB09FB6 0049E1E6 0A834554 0013FC8C 00000000 01C6762B
0013FC68: 0A834554 0A98730C 01C79A3A 00000000 0A98730C 00000000 000001C8 00000003
0013FC88: 00000006 004B0D7E 01C6762B 01C6762B 0A834324 0A98730C 0A834554 0048ADDF
0013FCA8: 0A834554 00000000 01C9E46C 716158F8 00000002 036158F8 000003E1 01C79A3A
0013FCC8: 0B4F3634 004954F2 00000001 0013FD14 01C9E46C 00496943 00000000 01C68375
0013FCE8: 00000000 004995BD 00000000 0007A45C 00000000 0000032F 00000383 00000000
0013FD08: 00003AB1 00000200 00000000 00499A22 7C80934A 0007A45C 0000032F 00000383
0013FD28: 00000000 00003AB1 00000200 00000000 0000032F 00000383 00000000 00003AB1
0013FD48: 00000200 00000000 00000200 00000000 0383032F 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDD000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ABF490 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AB7198 7FFDD000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0007A45C 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFDE000 000003C8
0013FE68: 00000032 00000001 00000008 0000000F 000400B0 00000200 00000000 0383032F
0013FE88: 0007A45C 0000032F 00000383 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFDE000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFDE000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFDE000 02BFFF84 0013FFC8 9670FA00 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 18:36:05 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x01010109
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC1
Parameters = 00000000        01010109

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010202
EBX=0AC373A8 SS=0023 ESP=0013FC08 EBP=09C0B2DC
ECX=01010101 DS=0023 ESI=09C0B2DC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0AC373A4 GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048A96F 004953A2 004995BD 00499A22 0049EC68 0049EDE2
004E70F2 7C81776F
Stack dump:
0013FC08: 01010101 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 09C0B2DC 0013FC8C 0AC373A4 0AC373C3 0AD8894C 01C6EBD3
0013FC48: FFF50000 00100000 FFF50000 0049E1E6 0AC373A4 0013FC8C 00000000 01C6717D
0013FC68: 0AC373A4 0AD8894C 01C791AB 00000000 00007554 00000000 00002B39 0000756B
0013FC88: 0000005A 00002B39 0048A96F 0AC3728C 01C6717D 0AC3728C 0AC373A4 0048ADDF
0013FCA8: 0AC373A4 00000000 01C9DBDD 716158F8 00000002 06000000 000007C2 01C791AB
0013FCC8: 004953A2 004954F2 00000001 0013FD14 01C9DBDD 00496943 00000000 01C67AE6
0013FCE8: 00000000 004995BD 00000000 000FA956 00000000 0000037E 000001BA 00000000
0013FD08: 00007847 00000200 00000000 00499A22 7C80934A 000FA956 0000037E 000001BA
0013FD28: 00000000 00007847 00000200 00000000 0000037E 000001BA 00000000 00007847
0013FD48: 00000200 00000000 00000200 00000000 01BA037E 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDD000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00AB6E10 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00ABC948 7FFDD000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 000FA956 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFDE000 000003C8
0013FE68: 00000032 00000001 00000008 00000001 0007003E 00000200 00000000 01BA037E
0013FE88: 000FA937 0000037E 000001BA C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFDE000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFDE000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFDE000 805D3130 0013FFC8 95F04450 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004ab0c5.
Exception handler called in Main Thread. Time: Wed Nov 20 20:15:49 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A428 to 00140000
Instruction pointer is 004AB0C5
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0xA002E6ED
ExceptionFlags = 00000000        ExceptionAddress = 004AB0C5
Parameters = 00000000        A002E6ED

Registers:
EAX=A002E6ED CS=001B EIP=004AB0C5 EFLGS=00010286
EBX=01C9C9F4 SS=0023 ESP=0013FA20 EBP=0013FAE8
ECX=0013FAE8 DS=0023 ESI=00000228 FS=0000003B
EDX=01C650E6 ES=0023 EDI=A002E6ED GS=00000000

Bytes at CS:EIP:
8b 07 56 55 8b 6c 24 24 53 8b 5c 24 2c 53 55 50

Call stack:
004AB0C5 004AB0DA 004AB187 0046A308 004969D2 004995BD 00499A22 0049EC68
0049EDE2 004E70F2 7C81776F
Stack dump:
0013FA20: 0BD40918 00000000 00000074 0000001C 00000080 004AB0DA A002E6ED 0013FAE8
0013FA40: 01C9C9F4 01C9C9F4 0013FAE8 00000228 0B95C8B4 005A0000 00000000 00484A9D
0013FA60: 3013FAE8 004AB0DA 0BD40918 0013FAE8 01C9C9F4 00000001 01C64BCD 00000228
0013FA80: 00000000 00000042 00000001 00000000 00000000 004AB187 0B95C8B4 0013FAE8
0013FAA0: 01C9C9F4 0046A308 01C650E6 0013FAE8 01C9C9F4 00000000 01C9D952 716158F8
0013FAC0: 00000001 01C66730 000000CF 00000001 0CBF5502 00000041 90E00371 0DAC5CCC
0013FAE0: 43524F43 00004D4F 00000320 00000258 00000320 0C8C5B90 00002710 FFFFFFFF
0013FB00: 00000000 00000000 00000000 0000031F 00000257 00000001 00000000 00000000
0013FB20: FFFFF871 00000000 01C65998 7A000000 D5B7E744 19316947 7A000047 1F3A2844
0013FB40: 003EDB47 7A000045 7A000044 0013FC44 00000020 00000000 00000000 00000001
0013FB60: 000001D0 0000012C 00000000 0013FC30 77D4048F 77D2C1F0 FFFFFFFF 77D2C1E9
0013FB80: 004B5FBE 000B013C 00000020 004B5CC0 02020001 004B5CC0 00000000 0013FBE0
0013FBA0: 004B5CC0 0013FC0C 77D18BD9 7FFDF000 77D18734 000B013C 00000020 000B013C
0013FBC0: 02020001 004B5CC0 DCBAABCD 00000000 0013FC14 004B5CC0 20202020 20202020
0013FBE0: 203A2020 303A3030 30303A30 00000000 00000000 010C0000 004B6D2E 00000000
0013FC00: 0013FC0C 0013FC80 0013FC8C 0013FCC8 010C0000 01500000 0048C7D8 0013FCA4
0013FC20: 00000004 000001D3 000000FC 0D970124 01C67843 0CBF5500 7FFF0000 00000000
0013FC40: 0D970188 FFF054E4 00000000 000FAB1C FFF054E4 00000000 FFF054E4 FFF054E4
0013FC60: 00000000 FFF054E4 000FAB1C 00000000 FFF054E4 000FAB1C 00000000 000FAB1C
0013FC80: FFF054E4 00000000 0000010F 000000DA 0000031F 0D970124 00000000 00000018
0013FCA0: 0047F7D8 0048BC5B 01C66730 0D970124 716158F8 00000000 01C9D952 00000001
0013FCC0: 01C9C9F4 00000001 000079F5 FFFFC47E 00000085 0CBF5502 004969D2 00000001
0013FCE0: 00000001 00000000 00000000 004995BD 01C6785B 0013FD38 00000000 000001D3
0013FD00: 000000FC 00000000 0003358A 00000202 00000000 00499A22 7C80934A 006AF8B4
0013FD20: 000001D3 000000FC 00000000 0003358A 00000202 00000000 000001D3 000000FC
0013FD40: 00000000 00033582 00000200 00000000 00000202 00000000 00FC01D3 10008350
0013FD60: DCBAABCD 00000000 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8
0013FD80: 77D1885A 0013FD98 77D1882A 0013FE80 0013FE78 00AB3590 00000014 00000001
0013FDA0: 00000000 00000000 00000010 00000000 0013FD9C 00000001 00000000 00000000
0013FDC0: 0013FD8C FFFFFFFF 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD
0013FDE0: 00000000 77D193E9 77D193A8 0013FE78 00000000 00000000 00000000 00000000
0013FE00: 00ABC948 7FFDF000 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000
0013FE20: 00000000 00000000 00000001 7C80934A 006AF8B4 00000000 716158F8 0049EC49
0013FE40: 0013FE78 00000000 00000000 00000000 0049EC68 00000000 0015237E 0013FF34
0013FE60: 7FFD5000 000003C8 00000032 00000001 00000008 0000000F 000B013C 00000202
0013FE80: 00000000 00FC01D3 006AF8B4 000001D3 000000FC C3D3B9CA B0D35151 A5B2F4D2
0013FEA0: 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388
0013FEC0: 00000000 00000000 C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEE0: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2
0013FF00: 00400000 00000000 0015237E 00000001 00000000 0015237E 7FFD5000 0013FF10
0013FF20: 0013F644 0013FFB0 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000
0013FF40: 00000000 0015237E 00000001 00000000 00000000 7FFD5000 007834DB 0015237E
0013FF60: 00000000 00000044 001538C0 001538D0 001538E8 00000000 00000000 00000000
0013FF80: 00000000 00000000 00000000 00000000 00000C01 00000001 00000000 00000000
0013FFA0: 00010001 00000000 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000
0013FFC0: 0013FFF0 7C81776F 00000000 00000000 7FFD5000 00000000 0013FFC8 95F97768
0013FFE0: FFFFFFFF 7C839AB0 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4000
TagWord = FFFFFFFF                ErrorOffset = 0045997A
ErrorSelector = 00000000        DataOffset = 004FD4C0
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc8.
Exception handler called in Main Thread. Time: Wed Nov 20 20:21:20 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A608 to 00140000
Instruction pointer is 004B0BC8
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x7F06888E
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC8
Parameters = 00000000        7F06888E

Registers:
EAX=7F06888A CS=001B EIP=004B0BC8 EFLGS=00010246
EBX=0D6C6E50 SS=0023 ESP=0013FC00 EBP=00000000
ECX=00430042 DS=0023 ESI=0CD4A5BC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0D6C6E4C GS=00000000

Bytes at CS:EIP:
8b 58 04 56 85 db 57 89 4c 24 10 7e 3e 8b 78 1c

Call stack:
004B0BC8 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
004E70F2 7C81776F
Stack dump:
0013FC00: 0CD4A5BC 0D6C6E50 00430042 0043E3E9 005052C8 0013FC28 00000000 00000000
0013FC20: 00000000 0013FC8C 00000000 0048A2FC 0CD4A5BC 0013FC8C 0D6C6E4C 0D6C6E6B
0013FC40: 0D81B98C 01C6FB38 00130766 0043D793 0013FC74 0049E1E6 0D6C6E4C 0013FC8C
0013FC60: 00000000 01C67A6B 0D6C6E4C 0D81B98C 01C7A110 00000000 0D81B98C 00000000
0013FC80: 00000098 00000003 00000002 000017C0 01C67A6B 01C67A6B 0D6C6D34 0D81B98C
0013FCA0: 0D6C6E4C 0048ADDF 0D6C6E4C 00000000 01C9EB42 716158F8 00000001 016158F8
0013FCC0: 0000014B 01C7A110 0392A770 004954F2 00000001 0013FD14 01C9EB42 00496943
0013FCE0: 00000000 01C68A4B 00000000 004995BD 00000000 0070059C 00000000 00000066
0013FD00: 0000019D 0000000C 00035C4C 00000200 00000000 00499A22 7C80934A 0070059C
0013FD20: 00000066 0000019D 0000000C 00035C4C 00000200 00000000 00000066 0000019D
0013FD40: 0000000C 00035C4C 00000200 00000000 00000100 00000010 402A0001 10008350
0013FD60: DCBAABCD 00000000 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8
0013FD80: 77D1885A 0013FD98 77D1882A 0013FE80 0013FE78 00AB6B68 00000014 00000001
0013FDA0: 00000000 00000000 00000010 00000000 0013FE78 00000001 00000000 00000000
0013FDC0: 0013FD8C 00000000 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD
0013FDE0: 00000000 77D193E9 77D193A8 0013FE78 00000000 00000000 00000000 00000000
0013FE00: 00AB3C30 7FFDF000 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000
0013FE20: 00000000 00000000 00000001 7C80934A 0070059C 00000000 716158F8 0049EC49
0013FE40: 0013FE78 00000000 00000000 00000000 0049EC68 00000000 0015237E 0013FF34
0013FE60: 7FFDB000 000003C8 00000032 00000001 00000008 00000001 000C013C 00000100
0013FE80: 00000010 402A0001 0070058D 00000066 0000019D C3D3B9CA B0D35151 A5B2F4D2
0013FEA0: 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388
0013FEC0: 00000000 00000000 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEE0: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2
0013FF00: 00400000 00000000 0015237E 00000001 00000000 0015237E 7FFDB000 0013FF10
0013FF20: 0013F824 0013FFB0 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000
0013FF40: 00000000 0015237E 00000001 00000000 00000000 7FFDB000 007834DB 0015237E
0013FF60: 00000000 00000044 001538C0 001538D0 001538E8 00000000 00000000 00000000
0013FF80: 00000000 00000000 00000000 00000000 00000C01 00000001 00000000 00000000
0013FFA0: 00010001 00000000 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000
0013FFC0: 0013FFF0 7C81776F 00000000 00000000 7FFDB000 8054C6ED 0013FFC8 96835DA0
0013FFE0: FFFFFFFF 7C839AB0 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Wed Nov 20 20:57:12 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0xB81D0009
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC1
Parameters = 00000000        B81D0009

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=0A011F10 SS=0023 ESP=0013FC08 EBP=093E9BE4
ECX=B81D0001 DS=0023 ESI=093E9BE4 FS=0000003B
EDX=FFFF8000 ES=0023 EDI=0A011F0C GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0048ADDF 00496943 004995BD 00499A22 0049EC68 0049EDE2
004E70F2 7C81776F
Stack dump:
0013FC08: B81D0001 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 093E9BE4 0013FC8C 0A011F0C 0A011F2B 0A16730C 01C6FB3D
0013FC48: 00000000 0A011D38 79A316D2 0049E1E6 0A011F0C 0013FC8C 00000000 01C66AA1
0013FC68: 0A011F0C 0A16730C 01C78EB0 00000000 0A16730C 00000000 000001C8 00000003
0013FC88: 00000006 00007CC0 01C66AA1 01C66AA1 0A011DF4 0A16730C 0A011F0C 0048ADDF
0013FCA8: 0A011F0C 00000000 01C9D8E2 716158F8 00000002 03000000 000003E1 01C78EB0
0013FCC8: 004953A2 004954F2 00000001 0013FD14 01C9D8E2 00496943 00000000 01C677EB
0013FCE8: 00000000 004995BD 00000000 0006B345 00000000 000001C5 00000196 00000000
0013FD08: 00003375 00000200 00000000 00499A22 7C80934A 0006B345 000001C5 00000196
0013FD28: 00000000 00003375 00000200 00000000 000001C5 00000196 00000000 00003375
0013FD48: 00000200 00000000 00000200 00000000 019601C5 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ACBF10 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00AC2378 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 0006B345 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFD6000 000003C8
0013FE68: 00000032 00000001 00000008 0000000F 000B0128 00000200 00000000 019601C5
0013FE88: 0006B345 000001C5 00000196 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFD6000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFD6000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFD6000 00000000 0013FFC8 95F079E8 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004339c0.
Exception handler called in Main Thread. Time: Wed Nov 20 21:13:53 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A574 to 00140000
Instruction pointer is 004339C0
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x2627FDAE
ExceptionFlags = 00000000        ExceptionAddress = 004339C0
Parameters = 00000000        2627FDAE

Registers:
EAX=2627FDAA CS=001B EIP=004339C0 EFLGS=00010206
EBX=0013FBE8 SS=0023 ESP=0013FB6C EBP=2627FDAA
ECX=2627FDAA DS=0023 ESI=000003DD FS=0000003B
EDX=2627FDAA ES=0023 EDI=01C7A195 GS=00000000

Bytes at CS:EIP:
8b 51 04 85 d2 75 03 33 c0 c3 8b 41 08 2b c2 c1

Call stack:
004339C0 004823D1 00482688 00482B63 0048617D 00403D60 0043B880 0048AF9D
004954F2 00496943 004995BD 00499A22 0049EC68 0049EDE2 004E70F2 7C81776F
Stack dump:
0013FB6C: 004823D1 000003D9 0013FBE8 000003DD 00000001 00512738 00000005 00000000
0013FB8C: 000003DD 000003D9 000007BB 00000001 00010001 01C7A195 00000000 05FCAC08
0013FBAC: 2627FDAA 000007BC FDFD4AE0 00482688 0013FBE8 00000000 09EC656C 0A01B98C
0013FBCC: 027A350D 0001000E 00482B63 0013FB00 00000000 09EC6474 027A350D 01C67CFF
0013FBEC: 09EC64EE 00000000 09EC656C 7BA80000 00010000 7B280000 0000007B 02000080
0013FC0C: 0048617D 09EC6474 09EC5DE4 038B2980 027A350D 038B29A2 0000014B 00403D60
0013FC2C: 027A350D 0001003D 7BA80000 00010000 7B280000 00000000 00000001 00000000
0013FC4C: 000000A0 038B2980 00000000 09EC5E40 09AA1B3C 00000000 0A01B98C 00000001
0013FC6C: 0A01B98C 01C7A259 09AA1B3C 0A01B98C 020FE303 0043B880 00010001 038B2980
0013FC8C: 07B207BA 01C67BB4 09EC5DE4 0A01B98C 01C7A259 09EC5E40 0048AF9D 09EC5DE4
0013FCAC: 00000000 01C9EC8B 716158F8 00000002 01000000 0000014B 01C7A259 004953A2
0013FCCC: 004954F2 00000001 0013FD14 01C9EC8B 00496943 00000000 01C68B94 00000000
0013FCEC: 004995BD 00000000 0015FA77 00000000 0000003A 00000202 00000000 0000A8CB
0013FD0C: 00000200 00000000 00499A22 7C80934A 0015FA77 0000003A 00000202 00000000
0013FD2C: 0000A8CB 00000200 00000000 0000003A 00000202 00000000 0000A8CB 00000200
0013FD4C: 00000000 00000200 00000000 0202003A 10008350 DCBAABCD 00000000 0013FDAC
0013FD6C: 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98 77D1882A
0013FD8C: 0013FE80 0013FE78 00AD01A8 00000014 00000001 00000000 00000000 00000010
0013FDAC: 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF 0013FE28
0013FDCC: 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9 77D193A8
0013FDEC: 0013FE78 00000000 00000000 00000000 00000000 00AB5828 7FFDF000 00000000
0013FE0C: 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000 00000001
0013FE2C: 7C80934A 0015FA77 00000000 716158F8 0049EC49 0013FE78 00000000 00000000
0013FE4C: 00000000 0049EC68 00000000 0015237E 0013FF34 7FFD8000 000003CC 00000032
0013FE6C: 00000001 00000008 00000001 000D0110 00000200 00000000 0202003A 0015FA77
0013FE8C: 0000003A 00000202 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079
0013FEAC: 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000 C3D3B9CA
0013FECC: B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002 000000CC
0013FEEC: 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000 0015237E
0013FF0C: 00000001 00000000 0015237E 7FFD8000 0013FF10 0013F790 0013FFB0 004E6718
0013FF2C: 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E 00000001
0013FF4C: 00000000 00000000 7FFD8000 007834DB 0015237E 00000000 00000044 001538C0
0013FF6C: 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000 00000000
0013FF8C: 00000000 00000C01 00000001 00000000 00000000 00010001 00000000 0013FF4C
0013FFAC: 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F 00000000
0013FFCC: 00000000 7FFD8000 8054C6ED 0013FFC8 968697B8 FFFFFFFF 7C839AB0 7C817778
0013FFEC: 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437855
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33B caused an Access Violation in
module TA33B.exe at 001b:004b0bc1.
Exception handler called in Main Thread. Time: Thu Nov 21 10:06:49 2013
E:\Cavedog\TOTALA\TA33B.exe, run by SSS on QT-201311171007
Executable is 1178624 bytes long and dated 11/20/2013 15:48:40
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
8 processors
2048 MBytes physical memory
Stack goes from 0012A610 to 00140000
Instruction pointer is 004B0BC1
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x63650073
ExceptionFlags = 00000000        ExceptionAddress = 004B0BC1
Parameters = 00000000        63650073

Registers:
EAX=0013FC28 CS=001B EIP=004B0BC1 EFLGS=00010206
EBX=06B01A50 SS=0023 ESP=0013FC08 EBP=06584FEC
ECX=6365006B DS=0023 ESI=06584FEC FS=0000003B
EDX=FFFF8000 ES=0023 EDI=06B01A4C GS=00000000

Bytes at CS:EIP:
8b 41 08 53 55 33 ed 8b 58 04 56 85 db 57 89 4c

Call stack:
004B0BC1 0048A2FC 0043DD6A 004954F2 004995BD 77D18BD9
Stack dump:
0013FC08: 6365006B 0043E3E9 005052C8 0013FC28 00000000 00000000 00000000 0013FC8C
0013FC28: 00000000 0048A2FC 06584FEC 0013FC8C 06B01A4C 06B01A6B 06C55CCC 01C6E8D8
0013FC48: 06C55CCC 01C78EB0 03838AC0 0049E1E6 06B01A4C 0013FC8C 00000000 01C666C0
0013FC68: 06B01A4C 06C55CCC 01C78EB0 00000000 06C55CCC 0478C000 00A58000 06B01934
0013FC88: 03838AC0 06C55CCC 01C78EB0 0043DD6A 01C666C0 06B01934 06B01A4C 0048ADDF
0013FCA8: 06B01A4C 00000000 01C9D8E2 716158F8 00000001 006158F8 00000000 01C78EB0
0013FCC8: 716158F8 004954F2 00000001 0013FD14 01C9D8E2 00496943 00000000 01C677EB
0013FCE8: 00000000 004995BD 00000000 00695AB4 00000000 000001C7 00000196 00000000
0013FD08: 0003291F 00000200 00000000 00499A22 7C80934A 00695AB4 000001C7 00000196
0013FD28: 00000000 0003291F 00000200 00000000 000001C7 00000196 00000000 0003291F
0013FD48: 00000200 00000000 00000200 00000000 019601C7 10008350 DCBAABCD 00000000
0013FD68: 0013FDAC 10008350 0013FDD8 77D18BD9 7FFDF000 0013FDD8 77D1885A 0013FD98
0013FD88: 77D1882A 0013FE80 0013FE78 00ADEF60 00000014 00000001 00000000 00000000
0013FDA8: 00000010 00000000 0013FD9C 00000001 00000000 00000000 0013FD8C FFFFFFFF
0013FDC8: 0013FE28 77D4048F 77D18830 FFFFFFFF 77D1882A 77D189CD 00000000 77D193E9
0013FDE8: 77D193A8 0013FE78 00000000 00000000 00000000 00000000 00ADD3C8 7FFDF000
0013FE08: 00000000 0013FE38 77D2A43B 0013FE78 00000000 00000000 00000000 00000000
0013FE28: 00000001 7C80934A 00695AB4 00000000 716158F8 0049EC49 0013FE78 00000000
0013FE48: 00000000 00000000 0049EC68 00000000 0015237E 0013FF34 7FFD6000 000003C8
0013FE68: 00000032 00000001 00000008 0000000F 002700A4 00000200 00000000 019601C7
0013FE88: 00695AA4 000001C7 00000196 C3D3B9CA B0D35151 A5B2F4D2 0000C5B7 004F264E
0013FEA8: 02100079 0000007F 00000002 000000CC 0013FEDC 7C813388 00000000 00000000
0013FEC8: C3D3B900 B0D35151 A5B2F4D2 0000C5B7 004F264E 02100079 0000007F 00000002
0013FEE8: 000000CC 0013FEDC 7C813388 00000000 7C920000 0049EDE2 00400000 00000000
0013FF08: 0015237E 00000001 00000000 0015237E 7FFD6000 0013FF10 0013F82C 0013FFB0
0013FF28: 004E6718 004FDAE0 00000000 0013FFC0 004E70F2 00400000 00000000 0015237E
0013FF48: 00000001 00000000 00000000 7FFD6000 007834DB 0015237E 00000000 00000044
0013FF68: 001538C0 001538D0 001538E8 00000000 00000000 00000000 00000000 00000000
0013FF88: 00000000 00000000 00000C01 00000001 00000000 00000000 00010001 00000000
0013FFA8: 0013FF4C 00000000 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C81776F
0013FFC8: 00000000 00000000 7FFD6000 8054C6ED 0013FFC8 95DCD020 FFFFFFFF 7C839AB0
0013FFE8: 7C817778 00000000 00000000 00000000 004E6FA0 00000000

Dr0 = 00000000        Dr1 = 00000000        Dr2 = 00000000
Dr3 = 00000000        Dr6 = 00000000        Dr7 = 00000000

ContextFlags = 0001003F
Control Word = FFFF127F                StatusWord = FFFF4020
TagWord = FFFFFFFF                ErrorOffset = 00437921
ErrorSelector = 00000000        DataOffset = 004FD270
DataSelector = FFFF0000                Cr0NpxState = 00000000





smackw32.DLL : 00390000 : 00018000 :
TA33B.exe : 00400000 : 0012E000 : 3.1.0.0
XPLAYX.dll : 00700000 : 00099000 : 1.0.0.546
XXRAW.dll : 10000000 : 00632000 : 0.8.4.0
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.6093
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
回复 支持 反对

使用道具 举报

 楼主| 发表于 2013-11-21 11:18 | 显示全部楼层
应该不是地图的原因,我用一张支持10个Player的原机海战图玩到10分钟也一样退出了。在另一台电脑上使用修改过的totala4.hpi里面的第25关全金属可以正常使用1 vs 9 ,但在这台电脑上同样只能玩10分钟。这是我的电脑配置,真搞不懂怎么会出现这个情况。


1.JPG
回复 支持 反对

使用道具 举报

 楼主| 发表于 2013-11-21 21:44 | 显示全部楼层

,

本帖最后由 yourananran 于 2013-11-21 22:13 编辑

不是地图问题,也不是硬件不兼容,原来装的是XP sp3,换成XP SP2 运行正常。就可惜是网吧专用,优化过头了,打印机驱动都装不了
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|横扫天下会 最高指挥官 ( 沪ICP备11033600号-1 )

GMT+8, 2021-4-18 15:53 , Processed in 0.068277 second(s), 21 queries .

Powered by Discuz! X3.4

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表