date/time : 2010-04-06, 18:27:25, 316ms
computer name : BURIS_PC
user name : B_U_R_I <admin>
registered owner : Microsoft / Microsoft
operating system : Windows 7 x64 build 7600
system language : Slovenian
system up time : 11 hours 25 minutes
program up time : 10 minutes 3 seconds
processors : 2x Intel(R) Core(TM)2 CPU 6320 @ 1.86GHz
physical memory : 2150/4095 MB (free/total)
free disk space : (C:) 32,90 GB (D:) 17,25 GB
display mode : 1920x1080, 32 bit
process id : $1108
allocated memory : 187,75 MB
executable : rFactor.exe
current module : d3d9.dll
module date/time : 2010-03-17 15:50
version : 0.4.0.3
compiled with : BCB 2006/07
madExcept version : 3.0l
callstack crc : $6ac51655, $00b1689b, $00b1689b
exception number : 1
exception class : EAccessViolation
exception message : Violation d'acces a l'adresse 6AC51655 dans le module 'atiumdva.dll'. Lecture de l'adresse 00000004.
main thread ($10e4):
6ac51655 +000 atiumdva.dll
00f26bac +010 d3d9.dll System 320 +0 @IntfClear
00fcdaf2 +022 d3d9.dll Unit_RF1255_DX Finalization
00f24cc1 +039 d3d9.dll System 320 +0 FinalizeUnits
00f6f100 +054 d3d9.dll madExcept InterceptFinalizeUnits
00f24fde +056 d3d9.dll System 320 +0 @Halt0
00f272f0 +040 d3d9.dll SysInit @InitLib
00fcf82f +00b d3d9.dll d3d9 86 +0 initialization
77b7dcdd +13c ntdll.dll LdrShutdownProcess
77b7db7f +06f ntdll.dll RtlExitUserProcess
75f5735d +00f kernel32.dll ExitProcess
75f53675 +010 kernel32.dll BaseThreadInitThunk
disassembling:
00f26b9c public System.@IntfClear: ; function entry point
00f26b9c 320 mov edx, [eax]
00f26b9e test edx, edx
00f26ba0 jz loc_f26bb0
00f26ba2 mov dword ptr [eax], 0
00f26ba8 push eax
00f26ba9 push edx
00f26baa mov eax, [edx]
00f26bac > call dword ptr [eax+8]
00f26baf pop eax
00f26bb0 ret