Отчет об ошибке - Клиент
---
Class: EAccessViolation
Text: Access violation at address 00543F5C in module 'rutview.exe'. Read of address 00000024.
Version: 67001 (0)
Id: {B14404D9-7714-4831-9847-23F5C51CAECC}
Date: 14-10-2018 17-04-50
---
Info:
date/time : 2018-10-14, 17:04:50, 121ms
computer name : HOME-PC
user name : Home <admin>
registered owner : Пользователь Windows
operating system : Windows 7 x64 Service Pack 1 build 7601
system language : Russian
system up time : 54 minutes 40 seconds
program up time : 10 minutes 31 seconds
processors : 2x AMD E-450 APU with Radeon(tm) HD Graphics
physical memory : 1467/4076 MB (free/total)
free disk space : (C
20,58 GB
display mode : 1366x768, 32 bit
process id : $1398
allocated memory : 74,64 MB
largest free block : 1,28 GB
executable : rutview.exe
exec. date/time : 2017-06-29 14:56
version : 6.7.0.1
callstack crc : $d9d24456, $e043ab73, $e043ab73
exception number : 2
exception class : EAccessViolation
exception message : Access violation at address 00543F5C in module 'rutview.exe'. Read of address 00000024.
main thread ($12d8):
00543f5c +000 rutview.exe System.Classes 15701 +0 TThread.Terminate
010d19e5 +171 rutview.exe MainForm 2652 +31 TfmMain.FormClose
006e2ad7 +017 rutview.exe Vcl.Forms 4112 +1 TCustomForm.DoClose
006e7c75 +055 rutview.exe Vcl.Forms 7085 +12 TCustomForm.Close
006e6ad0 +000 rutview.exe Vcl.Forms 6442 +0 TCustomForm.WMClose
005c6952 +2be rutview.exe Vcl.Controls 7326 +91 TControl.WndProc
005cb4b9 +5e9 rutview.exe Vcl.Controls 10160 +158 TWinControl.WndProc
006e360d +64d rutview.exe Vcl.Forms 4545 +209 TCustomForm.WndProc
00dd4b37 +323 rutview.exe dxRibbonForm TdxCustomRibbonForm.WndProc
00b7045f +007 rutview.exe cxControls TcxWindowProcLinkedObject.DefaultProc
00be2088 +02c rutview.exe dxShadowWindow TdxShadowWindow.OwnerWindowWndProc
00b706df +007 rutview.exe cxControls TcxWindowProcLinkedObjectList.WndProc
005caad8 +02c rutview.exe Vcl.Controls 9867 +3 TWinControl.MainWndProc
00546aa0 +014 rutview.exe System.Classes 17360 +8 StdWndProc
779a0107 +02b ntdll.dll KiUserCallbackDispatcher
75420d60 +016 USER32.dll CallWindowProcW
005cb5ca +0e6 rutview.exe Vcl.Controls 10201 +30 TWinControl.DefaultHandler
006e5906 +05a rutview.exe Vcl.Forms 5833 +11 TCustomForm.DefaultHandler
005cd329 +0a1 rutview.exe Vcl.Controls 11413 +20 TWinControl.WMSysCommand
006e6ba1 +055 rutview.exe Vcl.Forms 6493 +14 TCustomForm.WMSysCommand
00dd4701 +109 rutview.exe dxRibbonForm TdxCustomRibbonForm.WMSysCommand
010d3af8 +0a4 rutview.exe MainForm 3835 +18 TfmMain.WMSysCommand
005c6952 +2be rutview.exe Vcl.Controls 7326 +91 TControl.WndProc
005cb4b9 +5e9 rutview.exe Vcl.Controls 10160 +158 TWinControl.WndProc
006e360d +64d rutview.exe Vcl.Forms 4545 +209 TCustomForm.WndProc
00dd4b37 +323 rutview.exe dxRibbonForm TdxCustomRibbonForm.WndProc
00b7045f +007 rutview.exe cxControls TcxWindowProcLinkedObject.DefaultProc
00be2088 +02c rutview.exe dxShadowWindow TdxShadowWindow.OwnerWindowWndProc
00b706df +007 rutview.exe cxControls TcxWindowProcLinkedObjectList.WndProc
005caad8 +02c rutview.exe Vcl.Controls 9867 +3 TWinControl.MainWndProc
00546aa0 +014 rutview.exe System.Classes 17360 +8 StdWndProc
75417885 +00a USER32.dll DispatchMessageW
006ecfab +0f3 rutview.exe Vcl.Forms 10607 +23 TApplication.ProcessMessage
006ecfee +00a rutview.exe Vcl.Forms 10637 +1 TApplication.HandleMessage
006ed321 +0c9 rutview.exe Vcl.Forms 10775 +26 TApplication.Run
011084d0 +078 rutview.exe rutview 204 +16 initialization
75f933a8 +010 kernel32.dll BaseThreadInitThunk
cpu registers:
eax = 00000000
ebx = 052b0900
ecx = 0344a9c8
edx = 0341fa8c
esi = 0018f59c
edi = 00000000
eip = 00543f5c
esp = 0018f504
ebp = 0018f58c
stack dump:
0018f504 ea 19 0d 01 84 f7 18 00 - 94 a1 40 00 8c f5 18 00 ..........@.....
0018f514 c0 2a 6e 00 00 09 2b 05 - 00 00 00 00 00 00 00 00 .*n...+.........
0018f524 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018f534 00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018f544 00 00 00 00 ff ff 00 00 - 00 00 00 00 00 00 00 00 ................
0018f554 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018f564 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018f574 00 00 00 00 00 00 00 00 - 00 00 00 00 ff ff 00 00 ................
0018f584 00 00 00 00 00 00 00 00 - d4 f6 18 00 dd 2a 6e 00 .............*n.
0018f594 00 09 2b 05 7a 7c 6e 00 - 01 6a 6e 00 00 09 2b 05 ..+.z|n..jn...+.
0018f5a4 b4 f7 18 00 d5 6a 6e 00 - 55 69 5c 00 00 00 00 00 .....jn.Ui\.....
0018f5b4 b4 f7 18 00 b4 f7 18 00 - 5c f6 18 00 64 fa 18 00 ........\...d...
0018f5c4 15 c7 40 00 00 00 00 00 - 17 00 00 00 00 00 00 00 ..@.............
0018f5d4 2b ed ae 00 33 ed ae 00 - dc fa 18 00 f4 3c 41 03 +...3........<A.
0018f5e4 00 00 00 00 aa 3c 6b b9 - 07 00 00 00 00 00 00 00 .....<k.........
0018f5f4 ac 8f 41 00 00 00 00 00 - 0f 00 00 00 0b 00 00 00 ..A.............
0018f604 0f 00 00 00 0b 00 00 00 - 00 00 00 00 00 00 00 00 ................
0018f614 00 00 58 40 00 00 00 00 - 00 00 58 40 02 00 00 00 ..X@......X@....
0018f624 00 00 00 00 00 01 00 00 - 00 00 00 00 01 00 01 00 ................
0018f634 00 17 00 00 00 cc 01 00 - 00 00 00 00 01 00 00 00 ................
disassembling:
00543f5c public System.Classes.TThread.Terminate: ; function entry point
00543f5c 15701 > cmp byte ptr [eax+$24], 0
00543f60 jz loc_543f79
00543f62 15702 mov ecx, [$1132858]
00543f68 mov dl, 1
00543f6a mov eax, [$513b7c]
[...]