Jump to content

h0llywo0d

Members
  • Posts

    1
  • Joined

  • Last visited

h0llywo0d's Achievements

I ordered some spaghetti with marinara sauce and I got egg noodles and ketchup. I'm an average nobody.

I ordered some spaghetti with marinara sauce and I got egg noodles and ketchup. I'm an average nobody. (2/54)

0

Reputation

  1. I'm having a problem playing with ENB. When I try to join a server with ENB SA_DirectX, MTA crashes and this error appears (I'll list it below). I need your help, as I feel like this error only occurs with me, as nothing about it has been written about online. I'd be grateful for your help! Version = 1.6-release-23952.0.000 Time = 2026-03-13 17:53:57 Module = ntdll.dll Code = 0xC0000374 (Heap Corruption) Offset = 0x000e6ee3 IDA Address = 0x100E6EE3 EAX=00000000 EBX=00000000 ECX=0177F420 EDX=77473960 ESI=00000000 EDI=00000002 EBP=0177ECF0 ESP=0177ECB0 EIP=773C388C FLG=00000212 CS=0023 DS=002B SS=002B ES=002B FS=0053 GS=002B Stack trace: #00 ntdll.dll+0x7388C [0x773C388C] - IDA Address: 0x1007388C #01 ntdll.dll+0xBABFB [0x7740ABFB] - IDA Address: 0x100BABFB #02 ntdll.dll+0xBA6B1 [0x7740A6B1] - IDA Address: 0x100BA6B1 #03 ntdll.dll+0xE6F07 [0x77436F07] - IDA Address: 0x100E6F07 #04 ntdll.dll+0xE6EBB [0x77436EBB] - IDA Address: 0x100E6EBB #05 ntdll.dll+0xEFF84 [0x7743FF84] - IDA Address: 0x100EFF84 #06 ntdll.dll+0xF62F0 [0x774462F0] - IDA Address: 0x100F62F0 #07 ntdll.dll+0x87CC4 [0x773D7CC4] - IDA Address: 0x10087CC4 #08 ntdll.dll+0x43FC6 [0x77393FC6] - IDA Address: 0x10043FC6 #09 KERNELBASE.dll+0x121013 [0x76D01013] - IDA Address: 0x10121013 #10 d3d9.dll+0xD0DC5 [0x6D310DC5] - IDA Address: 0x100D0DC5 #11 d3d9.dll+0x60327 [0x6D2A0327] - IDA Address: 0x10060327 #12 d3d9.dll+0x9563 [0x0F039563] - IDA Address: 0x10009563 #13 D3DX9_42.dll+0x196C3 [0x621F96C3] - IDA Address: 0x100196C3 #14 core.dll+0x13C040 [0x6250C040] - IDA Address: 0x1013C040 #15 core.dll+0x13F5B8 [0x6250F5B8] - IDA Address: 0x1013F5B8 #16 core.dll+0x1432B4 [0x625132B4] - IDA Address: 0x101432B4 #17 core.dll+0x1598A7 [0x625298A7] - IDA Address: 0x101598A7 #18 core.dll+0x15BE59 [0x6252BE59] - IDA Address: 0x1015BE59 #19 client.dll+0x2847A9 [0x5FE647A9] - IDA Address: 0x102847A9 #20 client.dll+0x295F34 [0x5FE75F34] - IDA Address: 0x10295F34 #21 client.dll+0x2841FC [0x5FE641FC] - IDA Address: 0x102841FC #22 client.dll+0x27A3C3 [0x5FE5A3C3] - IDA Address: 0x1027A3C3 #23 client.dll+0x284962 [0x5FE64962] - IDA Address: 0x10284962 #24 client.dll+0x28438A [0x5FE6438A] - IDA Address: 0x1028438A #25 client.dll+0x27AF10 [0x5FE5AF10] - IDA Address: 0x1027AF10 #26 client.dll+0x13706F [0x5FD1706F] - IDA Address: 0x1013706F #27 client.dll+0x118C67 [0x5FCF8C67] - IDA Address: 0x10118C67 #28 client.dll+0xC3088 [0x5FCA3088] - IDA Address: 0x100C3088 #29 client.dll+0xC3E02 [0x5FCA3E02] - IDA Address: 0x100C3E02 #30 client.dll+0x3EFF4 [0x5FC1EFF4] - IDA Address: 0x1003EFF4 #31 client.dll+0x4D01C [0x5FC2D01C] - IDA Address: 0x1004D01C #32 core.dll+0x4917E [0x6241917E] - IDA Address: 0x1004917E Source: Windows Error Reporting (fail-fast exception) Dump: client_1.6-release-23952.0.000_ntdll_000e6ee3_374_CPM_1BEA815F_55F1_05E_9600E_20260313_1753.dmp Security Exception - Heap Corruption (0xC0000374) detected. Module: ntdll.dll Offset: 0x000e6ee3 IDA Address: 0x100E6EE3 (assuming default DLL base 0x10000000) Crash dump: client_1.6-release-23952.0.000_ntdll_000e6ee3_374_CPM_1BEA815F_55F1_05E_9600E_20260313_1753.dmp Enhanced crash capture will be attempted on next launch.
×
×
  • Create New...