I'm having the same issue that others are having with Stripper crashing when using stripper_dump. Strangely enough, it runs fine on a local Windows listen server, but crashes on my rented dedicated Windows server with identical setup.
Server plays Hidden:Source Beta 4b
Running:
Code:
Metamod:Source version 1.4.4.705
SourceMod (1.0.4) by AlliedModders LLC
Mani Admin Plugin (1.2BetaS SMM) by Mani
Stripper (1.1b.compiled.11.Mar.08) by BAILOPAN <-- I've tried all
SDK Tools (1.0.3) by AlliedModders LLC available versions
All the .mdmp files break at the same place:
Code:
stripper.14.ep1.dll!0f582aac()
Output:
Code:
0xC0000005: Access violation reading location 0x00000010.
Trace:
Code:
0F582A2C push 30000h
0F582A31 push 10000h
0F582A36 call 0F586CFB
0F582A3B pop ecx
0F582A3C pop ecx
0F582A3D ret
0F582A3E push ebp
0F582A3F mov ebp,esp
0F582A41 sub esp,18h
0F582A44 fld qword ptr ds:[0F58BC70h]
0F582A4A fstp qword ptr [ebp-8]
0F582A4D fld qword ptr ds:[0F58BC68h]
0F582A53 fstp qword ptr [ebp-10h]
0F582A56 fld qword ptr [ebp-10h]
0F582A59 fdiv qword ptr [ebp-8]
0F582A5C fmul qword ptr [ebp-8]
0F582A5F fsubr qword ptr [ebp-10h]
0F582A62 fstp qword ptr [ebp-18h]
0F582A65 fld qword ptr [ebp-18h]
0F582A68 fcomp qword ptr ds:[0F58BC60h]
0F582A6E fnstsw ax
0F582A70 test ah,41h
0F582A73 jne 0F582A7A
0F582A75 xor eax,eax
0F582A77 inc eax
0F582A78 leave
0F582A79 ret
0F582A7A xor eax,eax
0F582A7C leave
0F582A7D ret
0F582A7E push 0F58BC94h
0F582A83 call dword ptr ds:[0F58A048h]
0F582A89 test eax,eax
0F582A8B je 0F582AA2
0F582A8D push 0F58BC78h
0F582A92 push eax
0F582A93 call dword ptr ds:[0F58A044h]
0F582A99 test eax,eax
0F582A9B je 0F582AA2
0F582A9D push 0
0F582A9F call eax
0F582AA1 ret
0F582AA2 jmp 0F582A3E
0F582AA7 push esi
0F582AA8 mov esi,dword ptr [esp+8]
0F582AAC push dword ptr [esi+10h]
0F582AAF call 0F586DCB
0F582AB4 test eax,eax
0F582AB6 pop ecx
0F582AB7 je 0F582B2B
0F582AB9 cmp esi,0F594160h
0F582ABF jne 0F582AC5
0F582AC1 xor eax,eax
0F582AC3 jmp 0F582AD0
0F582AC5 cmp esi,0F594180h
0F582ACB jne 0F582B2B
0F582ACD xor eax,eax
0F582ACF inc eax
0F582AD0 inc dword ptr ds:[0F594C74h]
0F582AD6 test word ptr [esi+0Ch],10Ch
0F582ADC jne 0F582B2B
0F582ADE push ebx
0F582ADF push edi
0F582AE0 lea edi,[eax*4+0F594A78h]
0F582AE7 cmp dword ptr [edi],0
0F582AEA mov ebx,1000h
0F582AEF jne 0F582B11
0F582AF1 push ebx
0F582AF2 call 0F58153D
0F582AF7 test eax,eax
0F582AF9 pop ecx
0F582AFA mov dword ptr [edi],eax
0F582AFC jne 0F582B11
0F582AFE lea eax,[esi+14h]
0F582B01 push 2
0F582B03 mov dword ptr [esi+8],eax
0F582B06 mov dword ptr [esi],eax
0F582B08 pop eax
0F582B09 mov dword ptr [esi+18h],eax
0F582B0C mov dword ptr [esi+4],eax
0F582B0F jmp 0F582B1E
0F582B11 mov edi,dword ptr [edi]
0F582B13 mov dword ptr [esi+8],edi
0F582B16 mov dword ptr [esi],edi
0F582B18 mov dword ptr [esi+18h],ebx
0F582B1B mov dword ptr [esi+4],ebx
0F582B1E or word ptr [esi+0Ch],1102h
0F582B24 pop edi
0F582B25 xor eax,eax
0F582B27 pop ebx
0F582B28 inc eax
0F582B29 pop esi
0F582B2A ret
0F582B2B db 33h
Hope this helps!