Merhabalar,
LOGO SYS den lisans yenileme yaparken aşağıdaki hatayı verdi ve şu anda LOGO ürünüm açılmıyor.
Acil yardımlarınızı bekliyorum....
date/time : 2011-12-19, 12:11:38, 169ms
computer name : YERTAN-LENOVO
user name : YERTAN <admin>
registered owner : YERTAN
operating system : Windows 7 x64 Service Pack 1 build 7601
system language : Turkish
system up time : 2 hours 45 minutes
program up time : 2 hours 16 minutes
processors : 4x Intel(R) Core(TM) i5-2430M CPU @ 2.40GHz
physical memory : 4632/6058 MB (free/total)
free disk space : (C:) 614.51 GB (D:) 23.38 GB
display mode : 1366x768, 32 bit
process id : $1794
allocated memory : 81.82 MB
command line : "D:\LOGO\GO\LMAINENG.EXE" q6rleKttcLZ1RBjvAg6YHQ== 5e5Swddczu8=
executable : LMAINENG.EXE
exec. date/time : 2010-03-12 19:31
version : 2.0.0.0
compiled with : Delphi 2006/07
madExcept version : 3.0k
LMAINENG.EXE.mad : $00231850, $8bee3c6c, $181cb967
callstack crc : $82e01ede, $61ff6a3d, $61ff6a3d
exception number : 1
exception class : EAccessViolation
exception message : Access violation at address 00BB2300 in module 'LMAINENG.EXE'. Read of address 0E60FFEE.
Main ($16cc):
00bb2300 +2c4 LMAINENG.EXE segment%631 public%60064
00437764 +014 LMAINENG.EXE segment%11 public%2914
0048704e +06e LMAINENG.EXE segment%41 public%5241
7717e72d +078 ntdll.dll RtlAnsiStringToUnicodeString
74d9e315 +089 KERNELBASE.dll WriteProcessMemory
005bfe35 +0c5 LMAINENG.EXE segment%161 public%13597
0048a05c +02c LMAINENG.EXE segment%41 public%5366
00437764 +014 LMAINENG.EXE segment%11 public%2914
75350d48 +016 USER32.dll CallWindowProcW
005bf9b2 +05a LMAINENG.EXE segment%161 public%13592
00437764 +014 LMAINENG.EXE segment%11 public%2914
75347bc5 +00a USER32.dll DispatchMessageA
00559c55 +23d LMAINENG.EXE segment%128 public%9996
005605c2 +03a LMAINENG.EXE segment%128 public%10106
0048a097 +067 LMAINENG.EXE segment%41 public%5366
7716013e +00a ntdll.dll KiUserExceptionDispatcher
00bab315 +089 LMAINENG.EXE segment%631 public%59965
00baaf4b +077 LMAINENG.EXE segment%631 public%59959
00437764 +014 LMAINENG.EXE segment%11 public%2914
0048704e +06e LMAINENG.EXE segment%41 public%5241
7717e72d +078 ntdll.dll RtlAnsiStringToUnicodeString
74d9e315 +089 KERNELBASE.dll WriteProcessMemory
005bfe35 +0c5 LMAINENG.EXE segment%161 public%13597
0048a05c +02c LMAINENG.EXE segment%41 public%5366
00437764 +014 LMAINENG.EXE segment%11 public%2914
75350d48 +016 USER32.dll CallWindowProcW
005bf9b2 +05a LMAINENG.EXE segment%161 public%13592
00437764 +014 LMAINENG.EXE segment%11 public%2914
75347bc5 +00a USER32.dll DispatchMessageA
00559c55 +23d LMAINENG.EXE segment%128 public%9996
005605c2 +03a LMAINENG.EXE segment%128 public%10106
0048a097 +067 LMAINENG.EXE segment%41 public%5366
7716013e +00a ntdll.dll KiUserExceptionDispatcher
00bab315 +089 LMAINENG.EXE segment%631 public%59965
00baaf4b +077 LMAINENG.EXE segment%631 public%59959
00437764 +014 LMAINENG.EXE segment%11 public%2914
0048704e +06e LMAINENG.EXE segment%41 public%5241
7717e72d +078 ntdll.dll RtlAnsiStringToUnicodeString
74d9e315 +089 KERNELBASE.dll WriteProcessMemory
005bfe35 +0c5 LMAINENG.EXE segment%161 public%13597
0048a05c +02c LMAINENG.EXE segment%41 public%5366
00437764 +014 LMAINENG.EXE segment%11 public%2914
75350d48 +016 USER32.dll CallWindowProcW
005bf9b2 +05a LMAINENG.EXE segment%161 public%13592
00437764 +014 LMAINENG.EXE segment%11 public%2914
75347bc5 +00a USER32.dll DispatchMessageA
00559c55 +23d LMAINENG.EXE segment%128 public%9996
005605c2 +03a LMAINENG.EXE segment%128 public%10106
0048a097 +067 LMAINENG.EXE segment%41 public%5366
7716013e +00a ntdll.dll KiUserExceptionDispatcher
00bab315 +089 LMAINENG.EXE segment%631 public%59965
00baaf4b +077 LMAINENG.EXE segment%631 public%59959
00437764 +014 LMAINENG.EXE segment%11 public%2914
0048704e +06e LMAINENG.EXE segment%41 public%5241
7717e72d +078 ntdll.dll RtlAnsiStringToUnicodeString
74d9e315 +089 KERNELBASE.dll WriteProcessMemory
005bfe35 +0c5 LMAINENG.EXE segment%161 public%13597
0048a05c +02c LMAINENG.EXE segment%41 public%5366
00437764 +014 LMAINENG.EXE segment%11 public%2914
75350d48 +016 USER32.dll CallWindowProcW
005bf9b2 +05a LMAINENG.EXE segment%161 public%13592
00437764 +014 LMAINENG.EXE segment%11 public%2914
75347885 +00a USER32.dll DispatchMessageW
004a8b00 +0f4 LMAINENG.EXE segment%45 public%6337
004a8b42 +00a LMAINENG.EXE segment%45 public%6339
004a8e37 +0b3 LMAINENG.EXE segment%45 public%6344
02ae87a8 +384 LMAINENG.EXE segment%3642 public%158118
766c3398 +010 kernel32.dll BaseThreadInitThunk
thread $1a44:
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $df8: <priority:2>
00561849 +0d LMAINENG.EXE segment%128 public%10129
005618b3 +37 LMAINENG.EXE segment%128 public%10130
766c3398 +10 kernel32.dll BaseThreadInitThunk
>> created by Main ($16cc) at:
73556c8b +00 winmm.dll
thread $1b88:
74da0bd7 +fa KERNELBASE.dll WaitForMultipleObjectyasak
766c1a27 +89 kernel32.dll WaitForMultipleObjectyasak
75350864 +00 USER32.dll MsgWaitForMultipleObjectyasak
75350b64 +1a USER32.dll MsgWaitForMultipleObjects
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $324:
74da0bd7 +fa KERNELBASE.dll WaitForMultipleObjectyasak
766c1a27 +89 kernel32.dll WaitForMultipleObjectyasak
75350864 +00 USER32.dll MsgWaitForMultipleObjectyasak
75350b64 +1a USER32.dll MsgWaitForMultipleObjects
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $884:
74da0a8b +92 KERNELBASE.dll WaitForSingleObjectEx
766c118f +3e kernel32.dll WaitForSingleObjectEx
766c1143 +0d kernel32.dll WaitForSingleObject
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $1360:
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $197c:
74da0a29 +30 KERNELBASE.dll WaitForSingleObjectEx
766c118f +3e kernel32.dll WaitForSingleObjectEx
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $1270:
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $1b44:
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $1a34: <priority:1>
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $1d10:
766c3398 +10 kernel32.dll BaseThreadInitThunk
thread $1090:
766c3398 +10 kernel32.dll BaseThreadInitThunk
cpu registers:
eax = ffffffdf
ebx = 00000000
ecx = 00182bbc
edx = 0e610030
esi = 00bb203c
edi = 00000000
eip = 00bb2300
esp = 00182bcc
ebp = 00182d84
stack dump:
00182bcc d0 2e 18 00 b8 5b 40 00 - 84 2d 18 00 50 fc 61 0e .....[@..-..P.a.
00182bdc 00 00 00 00 00 00 00 00 - 00 02 00 00 00 00 00 00 ................
00182bec c3 04 06 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00182bfc 40 07 14 0d 45 07 14 0d - 00 00 00 00 28 2c 18 00 @...E.......(,..
00182c0c 4d 0d 35 75 24 a4 40 00 - 26 06 09 00 00 02 00 00 M.5u$.@.&.......
00182c1c 00 00 00 00 c3 04 06 00 - 00 00 00 00 4c 2c 18 00 ............L,..
00182c2c 01 fc 5b 00 24 a4 40 00 - 26 06 09 00 00 00 00 00 ..[.$.@.&.......
00182c3c 00 00 00 00 40 07 14 0d - 54 2c 18 00 38 75 6b 0e ....@...T,..8uk.
00182c4c 64 2c 18 00 66 77 43 00 - 00 02 00 00 00 00 00 00 d,..fwC.........
00182c5c c3 04 06 00 00 00 00 00 - 90 2c 18 00 fa 62 34 75 .........,...b4u
00182c6c 26 06 09 00 00 02 00 00 - 00 00 00 00 c3 04 06 00 &...............
00182c7c 40 07 14 0d cd ab ba dc - 00 00 00 00 00 00 00 00 @...............
00182c8c 40 07 14 0d a0 2c 18 00 - bc 2c 18 00 30 02 3b 75 @....,...,..0.;u
00182c9c 38 75 6b 0e 08 2d 18 00 - 91 6d 34 75 51 6d 34 75 8uk..-...m4uQm4u
00182cac 5e 9d 78 7a 00 02 00 00 - 40 07 14 0d 98 2f 18 00 ^.xz....@..../..
00182cbc 24 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 $...............
00182ccc 70 00 00 00 ff ff ff ff - ff ff ff ff e9 6c 34 75 p............l4u
00182cdc 91 6d 34 75 f0 2c 18 00 - 01 00 00 00 00 00 00 00 .m4u.,..........
00182cec 00 00 00 00 ac 2c 18 00 - 01 00 00 00 13 00 00 00 .....,..........
00182cfc 68 00 00 00 2c 03 00 00 - 3e 05 00 00 07 00 00 00 h...,...>.......