SlideShare a Scribd company logo
--------------------------------2013/9/5
21:56:19-------------------------------A memory block has been leaked. The size is: 68
This block was allocated by thread 0x390, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[00832EF5] [
AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line:
452)
[007BABEE] [
AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037)
[007BAC80] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050)
[007BAD1E] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064)
[007BA9B6] [
AIMP3.dll]
AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983)
[007BA987] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1]
(Line: 972)
[007BA39A] [
AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775)
[00841110] [
AIMP3.dll]
AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636)
The block is currently used for an object of class: TAIMPBassFileInfoReader
The allocation number is: 61020
Current memory
08 1D 83 00 00
00 00 00 00 00
00 00 00 00 00
00 A6 CA 6C 75
1C 69 48 00 1C
00 00 00 00 00
1A 02 00 00 FA
00 3E 79 60 00
ED 7E 60 00 F5
00 55 E3 5A 00
55 E4 5A 00 85
00 5D B8 5A 00
30 09 00 00 36
00 1C 69 48 00
1C 69 48 00 1C
00 1C 69 48 00
. . ƒ . .
. . . . .
. . . . .
. ¦ Ê l u
. i H . .
. . . . .
. . . . ú
. > y ` .
í ~ ` . õ
. U ã Z .
U ä Z . ƒ
. ] ¸ Z .
0 . . . 6
. . i H .
. i H . .
. . i H .

dump of 256 bytes starting at pointer address 7FF8CFF0:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
69 48 00 00 00 00 00 F1 C8 F8 7F 00 00 00 00 00 00 00 00 00 00 00
71 5A 00 67 DF 5A 00 BC D4 5A 00 B9 15 5B 00 3B 16 5B 00 52 9C 5A
83 60 00 68 84 60 00 DC A5 87 00 30 09 00 00 F9 B9 5A 00 0D E4 5A
D7 60 00 43 7B 60 00 FD 7F 60 00 B7 85 60 00 D4 E3 61 00 A8 B2 5A
00 00 00 B0 04 02 00 6C 8B 2A 88 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48
.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

i

H

.

.

.

.

.

ñ

È

ø

ƒ

.

.

.

.

.

.

.

.

.

.

.

q

Z

.

g

ß

Z

.

¼

Ô

Z

.

¹

.

[

.

;

.

[

.

R

ƒ

Z

ƒ

`

.

h

ƒ

`

.

Ü

¥

ƒ

.

0

.

.

.

ù

¹

Z

.

.

ä

Z

×

`

.

C

{

`

.

ý

ƒ

`

.

·

ƒ

`

.

Ô

ã

a

.

¨

²

Z

.

.

.

°

.

.

.

l

ƒ

*

ƒ

(

f

H

.

.

i

H

.

.

i

H

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

--------------------------------2013/9/5
21:56:19-------------------------------This application has leaked memory. The small block leaks are (excluding
expected leaks registered by pointer):
53 - 68 bytes: TAIMPBassFileInfoReader x 1
Note: Memory leak detail is logged to a text file in the same folder as this
application. To disable this memory leak check, undefine
"EnableMemoryLeakReporting".
--------------------------------2013/9/5
21:57:45-------------------------------FastMM has detected an attempt to use an interface of a freed object. An access
violation will now be raised in order to abort the current operation.
The current thread ID is 0x7D4, and the stack trace (return addresses) leading
to this error is:
[005B0B5E] [
AIMP3.dll] System.@IntfClear
[007BAB11] [
AIMP3.dll]
AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByRepository [+12] (Line: 1016)
[005AAE8B] [
AIMP3.dll] System.@HandleFinally
[779C65F8] [
ntdll.dll]
[779C65CA] [
ntdll.dll]
[779A9011] [
ntdll.dll]
[75C76A95] [KERNELBASE.dll]
[75C79534] [KERNELBASE.dll]
[75C7856B] [KERNELBASE.dll]
[00AB9A7C] [FastMM_FullDebugMode.dll]
[00402FAE] [
AIMP3.exe] FastMM4.CalculateHeaderCheckSum
--------------------------------2013/9/5
21:57:50-------------------------------FastMM has detected an attempt to use an interface of a freed object. An access
violation will now be raised in order to abort the current operation.
The current thread ID is 0x7D4, and the stack trace (return addresses) leading
to this error is:
[005B0B5E] [
AIMP3.dll] System.@IntfClear
[007BAB59] [
AIMP3.dll]
AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByRepository [+19] (Line: 1023)
[005AAE8B] [
AIMP3.dll] System.@HandleFinally
[779C65F8] [
ntdll.dll]
[779C65CA] [
ntdll.dll]
[779A9011] [
ntdll.dll]
[75C76A95] [KERNELBASE.dll]
[75C79534] [KERNELBASE.dll]
[75C7856B] [KERNELBASE.dll]
[75C79D05] [KERNELBASE.dll]
[00AB9DD9] [FastMM_FullDebugMode.dll]
--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B] [
AIMP3.dll] System.@UStrFromPWCharLen
[005C9477] [
AIMP3.dll] SysUtils.FmtStr
[773E0FED] [KERNEL32.dll]
[773DC080] [KERNEL32.dll]
[779DBD4C] [
ntdll.dll]
[779DBD4C] [
ntdll.dll]
[779DBD6F] [
ntdll.dll]
[779DC806] [
ntdll.dll]
[779DC7F6] [

ntdll.dll]

The block is currently used for an object of class: UnicodeString
The allocation number is: 62430
Current memory
B0 04 02 00 01
00 69 00 6F 00
6C 00 61 00 74
00 65 00 73 00
73 00 20 00 30
00 6D 00 6F 00
64 00 75 00 6C
00 6C 00 27 00
2E 00 20 00 52
00 65 00 73 00
73 00 20 00 30
00 1C 69 48 00
1C 69 48 00 1C
00 A0 06 DF 7F
00 00 00 00 00
00 0C D2 5A 00
° . . . .
. i . o .
l . a . t
. e . s .
s .
. 0
. m . o .
d . u . l
. l . ' .
. .
. R
. e . s .
s .
. 0
. . i H .
. i H . .
.
. ß ƒ
. . . . .
. . Ò Z .

dump of 256 bytes starting at pointer address 7FDF08A0:
00 00 00 54 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 30 00 35 00 41 00 39 00 44 00 36 00 45 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 41 00 49 00 4D 00 50 00 33 00 2E 00 64 00 6C
00 65 00 61 00 64 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 72
00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 14 DC 3B 35 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 A4 3E 40 00 00 00 00 00 D8 F3 00 00 FA 71 5A 00 67 DF 5A
.

.

.

T

.

.

.

.

i

.

o

.

n

.

.

0

.

5

.

A

.

.

e

.

.

'

.

.

e

.

a

.

d

.

.

0

.

0

.

0

.

i

H

.

.

i

H

.

.

.

¤

>

@

A

.

c

.

c

.

e

.

s

.

s

.

.

v

.

a

.

t

.

.

a

.

d

.

d

.

r

9

.

D

.

6

.

E

.

.

i

.

n

.

A

.

I

.

M

.

P

.

3

.

.

.

d

.

l

.

o

.

f

.

.

a

.

d

.

d

.

r

0

.

0

.

1

.

C

.

.

.

.

Ü

;

5

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

.

.

.

Ø

ó

.

.

ú

q

Z

.

g

ß

Z

--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B] [
AIMP3.dll] System.@UStrFromPWCharLen
[005C9477] [
AIMP3.dll] SysUtils.FmtStr
[00370042] [
AIMP3.exe]
[773E0811] [KERNEL32.dll]
[773E081E] [KERNEL32.dll]
[75C7707C] [KERNELBASE.dll]
[75C770B6] [KERNELBASE.dll]
[7732A0CE] [ SHLWAPI.dll]
[7732A76C] [ SHLWAPI.dll]
The block is currently used for an object of class: UnicodeString
The allocation number is: 62424
Current memory dump of 256 bytes starting at pointer address 7FDF0A00:
B0 04 02 00 01 00 00 00 5A 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00
6C
00
73
00
64
00
2E
00
61
00
00
00
00
00
°
.
l
.
s
.
d
.
.
.
a
.
.
.
.
.

69
00
65
00
6D
00
53
00
66
00
30
00
A0
00
0C
.
i
.
e
.
m
.
S
.
f
.
0
.
.
.

00
61
00
20
00
75
00
64
00
64
00
64
06
00
D2
.
.
a
.
.
u
.
d
.
d
.
d
.
.
Ò

6F
00
73
00
6F
00
45
00
20
00
30
22
DF
00
5A
.
o
.
s
.
o
.
E
.
.
0
"
ß
.
Z

00
74
00
37
00
6C
00
6C
00
64
00
A0
7F
00
00
.
.
t
.
7
.
l
.
l
.
d
.
ƒ
.
.

00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 35 00 43 00 37 00 39 00 36 00 31 00 37 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 4B 00 45 00 52 00 4E 00 45 00 4C 00 42 00 41
00 6C 00 27 00 2E 00 20 00 57 00 72 00 69 00 74 00 65 00 20 00 6F
00 72 00 65 00 73 00 73 00 20 00 30 00 30 00 30 00 30 00 30 00 30
3A 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 A4 3E 40 00 00 00 00 00 E4 F3 00 00 FA 71 5A 00 67 DF 5A
.

.

.

Z

.

.

.

A

.

c

.

c

.

.

i

.

o

.

n

.

.

5

.

C

.

7

.

.

e

.

.

'

.

.

l

.

'

.

.

.

.

r

.

e

.

s

.

s

.

:

H

.

.

i

H

.

.

i

.

.

.

¤

>

@

.

.

.

e

.

s

.

s

.

.

v

.

a

.

t

.

.

a

.

d

.

d

.

r

9

.

6

.

1

.

7

.

.

i

.

n

.

K

.

E

.

R

.

N

.

E

.

L

.

B

.

A

.

W

.

r

.

i

.

t

.

e

.

.

o

.

0

.

0

.

0

.

0

.

0

.

0

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

ä

ó

.

.

ú

q

Z

.

g

ß

Z

--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B] [
AIMP3.dll] System.@UStrFromPWCharLen
[005C9477] [
AIMP3.dll] SysUtils.FmtStr
[00370042] [
AIMP3.exe]
[00A8FF44] [FastMM_FullDebugMode.dll]
[00A8FF4C] [FastMM_FullDebugMode.dll]
[00A8F8BC] [FastMM_FullDebugMode.dll]
[00A84195] [FastMM_FullDebugMode.dll]
[00A85DF4] [FastMM_FullDebugMode.dll]
[00A86C45] [FastMM_FullDebugMode.dll]
The block is currently used for an object of class: UnicodeString
The allocation number is: 62436
Current memory
B0 04 02 00 01
00 69 00 6F 00
6C 00 61 00 74
00 65 00 73 00
73 00 20 00 37
00 6D 00 6F 00
64 00 75 00 6C
00 53 00 45 00
2E 00 64 00 6C

dump of 256 bytes starting at pointer address 7FDF0B60:
00 00 00 5A 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 35 00 43 00 37 00 39 00 36 00 31 00 37 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 4B 00 45 00 52 00 4E 00 45 00 4C 00 42 00 41
00 6C 00 27 00 2E 00 20 00 57 00 72 00 69 00 74 00 65 00 20 00 6F
00
61
00
00
00
00
00
°
.
l
.
s
.
d
.
.
.
a
.
.
.
.
.

66
00
30
00
21
00
B2
.
i
.
e
.
m
.
S
.
f
.
0
.
!
.
²

00
64
00
5E
13
00
A3
.
.
a
.
.
u
.
d
.
d
.
^
.
.
£

20
00
30
64
DF
00
5A
.
o
.
s
.
o
.
E
.
.
0
d
ß
.
Z

00
64
00
DB
7F
00
00
.
.
t
.
7
.
l
.
l
.
d
.
Û
ƒ
.
.

00 72 00 65 00 73 00 73 00 20 00 30 00 30 00 30 00 30 00 30 00 30
75 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 54 2E 00 00 FA 71 5A 00 0F 9D 5A
.

.

.

Z

.

.

.

A

.

c

.

c

.

.

i

.

o

.

n

.

.

5

.

C

.

7

.

.

e

.

.

'

.

.

l

.

'

.

.

.

.

r

.

e

.

s

.

s

.

u

H

.

.

i

H

.

.

i

.

.

.

.

.

.

.

.

.

e

.

s

.

s

.

.

v

.

a

.

t

.

.

a

.

d

.

d

.

r

9

.

6

.

1

.

7

.

.

i

.

n

.

K

.

E

.

R

.

N

.

E

.

L

.

B

.

A

.

W

.

r

.

i

.

t

.

e

.

.

o

.

0

.

0

.

0

.

0

.

0

.

0

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

T

.

.

.

ú

q

Z

.

.

ƒ

Z

--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B] [
AIMP3.dll] System.@UStrFromPWCharLen
[005C9477] [
AIMP3.dll] SysUtils.FmtStr
[779D346F] [
ntdll.dll]
[779D349E] [
ntdll.dll]
[779D8A8F] [
ntdll.dll]
[779D6D0D] [
ntdll.dll]
[779D7407] [
ntdll.dll]
[779D6F24] [
ntdll.dll]
[779D6F9C] [
ntdll.dll]
The block is currently used for an object of class: UnicodeString
The allocation number is: 62167
Current memory
B0 04 02 00 01
00 69 00 6F 00
6C 00 61 00 74
00 65 00 73 00
73 00 20 00 37
00 6D 00 6F 00
64 00 75 00 6C
00 6C 00 27 00
2E 00 20 00 57
00 72 00 65 00
73 00 73 00 20
33 1C 69 48 00
1C 69 48 00 1C
00 01 00 00 00
00 00 00 00 00
00 0C D2 5A 00
° . . . .

dump of 256 bytes starting at pointer address 7FDF1500:
00 00 00 55 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 37 00 39 00 43 00 36 00 42 00 39 00 30 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 6E 00 74 00 64 00 6C 00 6C 00 2E 00 64 00 6C
00 72 00 69 00 74 00 65 00 20 00 6F 00 66 00 20 00 61 00 64 00 64
00 30 00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 30 B7 E5
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 E4 ED 00 00 FA 71 5A 00 67 DF 5A
.

.

.

U

.

.

.

A

.

c

.

c

.

e

.

s

.

s

.

.

v
.
l
.
s
.
d
.
.
.
s
3
.
.
.
.

i
.
e
.
m
.
l
.
r
.
.
i
.
.
.

.
a
.
.
u
.
.
s
i
H
.
.
Ò

o
.
s
.
o
.
'
.
e
.
H
.
.
.
Z

.
t
.
7
.
l
.
W
.
.
.
.
.
.

.

i

.

o

.

n

.

.

a

.

t

.

.

7

.

9

.

C

.

.

e

.

.

'

.

r

.

i

.

.

0

.

0

i

H

.

.

.

.

.

6

.

B

.

9

.

0

.

.

n

.

t

.

d

.

l

.

t

.

e

.

.

o

.

f

.

.

0

.

0

.

0

.

0

.

1

.

.

i

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

.

.

ä

í

.

a

.

d

.

d

.

.

i

.

n

.

.

.

.

d

.

l

.

a

.

d

.

d

C

.

.

.

0

·

å

.

.

i

H

.

.

.

.

.

ú

q

Z

.

g

ß

Z

l

r

--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[005D10CF] [
AIMP3.dll] SysUtils.Exception.CreateFmt
[005D1CAB] [
AIMP3.dll] SysUtils.CreateAVObject
[779A8E17] [
ntdll.dll]
[005D1DAA] [
AIMP3.dll] SysUtils.GetExceptionObject
[005AABB0] [
AIMP3.dll] System.@HandleAnyException
[779C65F8] [
ntdll.dll]
[779C65CA] [
ntdll.dll]
[779A8D3C] [
ntdll.dll]
The block is currently used for an object of class: EAccessViolation
The allocation number is: 62165
Current memory
48 FF 5B 00 0C
04 00 00 00 00
90 BE 10 9A 1C
00 00 00 00 00
E4 F2 00 00 FA
00 E3 4F 80 00
5F 6D 70 00 CB
00 0B 6D 70 00
E3 4F 80 00 5F
00 3B A1 70 00
C0 02 00 00 1A
00 1C 69 48 00
1C 69 48 00 1C
00 00 00 00 00
00 00 00 00 00
00 00 00 00 00
H ÿ [ . .
. . . . .
 ¾ .  .
. . . . .
ä ò . . ú
. ã O  .
_ m p . Ë
. . m p .
ã O  . _

dump of 256 bytes starting at pointer address 7FE05E10:
15 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 FA 9A
69 48 00 00 00 00 00 A1 3E E0 7F 00 00 00 00 00 00 00 00 00 00 00
71 5A 00 67 DF 5A 00 BC D4 5A 00 49 D5 5A 00 FD 60 70 00 D9 6A 70
63 70 00 9D 64 70 00 CE 6D 70 00 C0 02 00 00 16 72 5A 00 F9 B9 5A
6D 70 00 CB 63 70 00 9D 64 70 00 CE 6D 70 00 97 9F 5A 00 65 A1 70
00 00 00 B0 04 02 00 EB 84 14 89 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 14 7B EB 76 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.



ú



i

H

.

.

.

.

.

¡

>

à



.

.

.

.

.

.

.

.

.

.

.

q

Z

.

g

ß

Z

.

¼

Ô

Z

.

I

Õ

Z

.

ý

`

p

.

Ù

j

p

c

p

.



d

p

.

Î

m

p

.

À

.

.

.

.

r

Z

.

ù

¹

Z

m

p

.

Ë

c

p

.



d

p

.

Î

m

p

.





Z

.

e

¡

p
.
À
.
.
.
.
.

;
.
.
i
.
.
.

¡
.
i
H
.
.
.

p
.
H
.
.
.
.

.
.
.
.
.
.
.

.

.

.

°

.

.

.

ë



.



(

f

H

.

.

i

H

.

.

i

H

i

H

.

.

i

.

{

ë

v

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[005D10CF] [
AIMP3.dll] SysUtils.Exception.CreateFmt
[005D1CAB] [
AIMP3.dll] SysUtils.CreateAVObject
[779D3192] [
ntdll.dll]
[779D316E] [
ntdll.dll]
[779D79B2] [
ntdll.dll]
[779D316E] [
ntdll.dll]
[779D2D67] [
ntdll.dll]
[75C79D05] [KERNELBASE.dll]
The block is currently used for an object of class: EAccessViolation
The allocation number is: 62429
Current memory
48 FF 5B 00 AC
04 00 00 00 00
20 6B 03 AE 1C
00 00 00 00 00
D7 F3 00 00 FA
75 BC 6F 9D 77
0E 6D 9D 77 08
00 3A 1D 5D 00
38 12 BB 6F 48
77 3D 8D 9A 77
80 07 00 00 20
00 00 00 00 00
00 00 00 00 00
00 91 54 E6 7F
00 00 00 00 00
00 B2 A3 5A 00
H ÿ [ . ¬
. . . . .
k . ® .
. . . . .
× ó . . ú
u ¼ o  w
. m  w .
. : . ] .
8 . » o H
w =   w
 . . .
. . . . .
. . . . .
.  T æ 
. . . . .
. ² £ Z .

dump of 256 bytes starting at pointer address 7FE64B70:
08 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 D6 9A
69 48 00 00 00 00 00 70 49 E6 7F 00 00 00 00 00 00 00 00 A4 3E 40
71 5A 00 0F 9D 5A 00 B2 A3 5A 00 D0 10 5D 00 AC 1C 5D 00 17 96 C7
74 9D 77 70 34 9D 77 BC 6F 9D 77 D4 07 00 00 16 72 5A 00 F9 B9 5A
12 BB 6F 18 8E 9A 77 AB 1D 5D 00 B1 AB 5A 00 F9 65 9C 77 CB 65 9C
00 00 00 B0 04 02 00 C9 1B 7C 0D 48 FF 5B 00 0C 0A DF 7F 00 00 00
00 00 00 40 DE 9A 04 00 00 00 00 36 E4 83 F2 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 76 2E 00 00 FA 71 5A 00 0F 9D 5A
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

$

Ö



i

H

.

.

.

.

.

p

I

æ



.

.

.

.

.

.

.

.

¤

>

@

q

Z

.

.



Z

.

²

£

Z

.

Ð

.

]

.

¬

.

]

.

.



Ç

t



w

p

4



w

¼

o



w

Ô

.

.

.

.

r

Z

.

ù

¹

Z

.

»

o

.





w

«

.

]

.

±

«

Z

.

ù

e



w

Ë

e



.

.

.

°

.

.

.

É

.

|

.

H

ÿ

[

.

.

.

ß



.

.

.

.

.

.

@

Þ



.

.

.

.

.

6

ä



ò

.

i

H

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

v

.

.

.

ú

q

Z

.

.



Z
--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[005D10CF] [
AIMP3.dll] SysUtils.Exception.CreateFmt
[005D1CAB] [
AIMP3.dll] SysUtils.CreateAVObject
[75C79616] [KERNELBASE.dll]
[779D6FBB] [
ntdll.dll]
[779D6D0D] [
ntdll.dll]
[779D7407] [
ntdll.dll]
[779D346F] [
ntdll.dll]
[779D6FBB] [
ntdll.dll]
The block is currently used for an object of class: EAccessViolation
The allocation number is: 62423
Current memory
48 FF 5B 00 0C
04 00 00 00 00
36 E4 83 F2 1C
00 00 00 00 00
76 2E 00 00 FA
00 43 6E 74 00
F7 7F 74 00 E9
00 FD A3 5A 00
45 AE 60 00 73
00 FB 36 7F 00
C0 02 00 00 24
00 1C 69 48 00
1C 69 48 00 1C
00 11 4F E6 7F
00 00 00 00 00
00 ED 0B 5B 00
H ÿ [ . .
. . . . .
6 ä  ò .
. . . . .
v . . . ú
. C n t .
÷  t . é
. ý £ Z .
E ® ` . s
. û 6  .
À . . . $
. . i H .
. i H . .
. . O æ 
. . . . .
. í . [ .

dump of 256 bytes starting at pointer address 7FE64C20:
0A DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 DE 9A
69 48 00 00 00 00 00 91 54 E6 7F 00 00 00 00 00 00 00 00 00 00 00
71 5A 00 0F 9D 5A 00 B2 A3 5A 00 03 E1 72 00 A3 9A 64 00 7E 17 72
03 78 00 27 7B 44 00 57 F3 46 00 C0 02 00 00 16 72 5A 00 2D 9D 5A
9D 5A 00 43 19 72 00 05 6F 74 00 92 81 74 00 2D 9D 5A 00 2E 04 78
00 00 00 A4 0B 71 00 B6 13 15 89 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 49 EC EA 76 00 00 00
00 00 00 00 00 00 00 00 00 00 00 EE F3 00 00 FA 71 5A 00 0F 9D 5A
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

@

Þ



i

H

.

.

.

.

.



T

æ



.

.

.

.

.

.

.

.

.

.

.

q

Z

.

.



Z

.

²

£

Z

.

.

á

r

.

£



d

.

~

.

r

.

x

.

'

{

D

.

W

ó

F

.

À

.

.

.

.

r

Z

.

-



Z



Z

.

C

.

r

.

.

o

t

.





t

.

-



Z

.

.

.

x

.

.

.

¤

.

q

.

¶

.

.



(

f

H

.

.

i

H

.

.

i

H

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

I

ì

ê

v

.

.

.

.

.

.

.

.

.

.

.

.

.

.

î

ó

.

.

ú

q

Z

.

.



Z

--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0x7D4, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1]
[005D10CF]
[005D1CAB]
[75C79616]
[779D346F]
[779D349E]
[779D349E]
[779D6FBB]
[779D6D0D]

[
AIMP3.dll] System.@ClassCreate
[
AIMP3.dll] SysUtils.Exception.CreateFmt
[
AIMP3.dll] SysUtils.CreateAVObject
[KERNELBASE.dll]
[
ntdll.dll]
[
ntdll.dll]
[
ntdll.dll]
[
ntdll.dll]
[
ntdll.dll]

The block is currently used for an object of class: EAccessViolation
The allocation number is: 62435
Current memory
48 FF 5B 00 6C
04 00 00 00 00
0F AF 40 F8 1C
00 00 00 00 00
84 04 00 00 62
00 24 F5 74 00
C0 7F 74 00 02
00 72 97 60 00
73 9D 5A 00 65
00 13 09 48 00
C0 02 00 00 20
00 1C 69 48 00
1C 69 48 00 1C
00 C1 4F E6 7F
00 00 00 00 00
00 ED 0B 5B 00
H ÿ [ . l
. . . . .
. ¯ @ ø .
. . . . .
 . . . b
. $ õ t .
À  t . .
. r  ` .
s  Z . e
. . . H .
À . . .
. . i H .
. i H . .
H . . . .
. . . . .
. í . [ .

dump of 256 bytes starting at pointer address 7FE64E30:
0B DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0 B9 9A
69 48 00 00 00 00 00 01 4D E6 7F 00 00 00 00 00 00 00 00 00 00 00
41 40 00 09 13 7F 00 37 72 5A 00 19 9C 60 00 A4 99 60 00 95 97 60
80 74 00 E9 03 78 00 27 7B 44 00 C0 02 00 00 19 9C 60 00 D5 97 60
F3 74 00 73 9D 5A 00 BF DA 72 00 50 08 73 00 A8 B2 5A 00 5D B8 5A
00 00 00 80 1A E7 7F C0 CB 52 08 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 48 00 1C 69 48 00 3F 34 AD F7 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 ED F3 00 00 FA 71 5A 00 0F 9D 5A
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

Ð

¹



i

H

.

.

.

.

.

.

M

æ



.

.

.

.

.

.

.

.

.

.

.

A

@

.

.

.



.

7

r

Z

.

.



`

.

¤



`

.





`



t

.

é

.

x

.

'

{

D

.

À

.

.

.

.



`

.

Õ



`

ó

t

.

s



Z

.

¿

Ú

r

.

P

.

s

.

¨

²

Z

.

]

¸

Z

.

.

.



.

ç



À

Ë

R

.

(

f

H

.

.

i

H

.

.

i

H

i
.
.

H
Á
.

.
O
.

.
æ
.

i

.

H

.

.

i

H

.

?

4

.

.

.

.

.

.

í

ó

Z

.

.



Z

÷
.

.
.

i
ú

q

--------------------------------2013/9/5
21:57:55-------------------------------A memory block has been leaked. The size is: 68
This block was allocated by thread 0x780, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[00832EF5] [
AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line:
452)
[007BABEE] [
AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037)
[007BAC80] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050)
[007BAD1E] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064)
[007BA9B6] [
AIMP3.dll]
AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983)
[007BA987] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1]
(Line: 972)
[007BA39A] [
AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775)
[00841110] [
AIMP3.dll]
AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636)
The block is currently used for an object of class: TAIMPBassFileInfoReader
The allocation number is: 62396
Current memory
08 1D 83 00 00
00 00 00 00 00
00 00 00 00 00
00 26 A0 6C 75
1C 69 48 00 1C
00 00 00 00 00
08 0F 00 00 FA
00 B0 0B 61 00
23 16 61 00 A2
00 0D E4 5A 00
55 E3 5A 00 E3
00 80 D1 71 00
C0 02 00 00 36
00 1C 69 48 00
1C 69 48 00 1C
00 1C 69 48 00
. .  . .
. . . . .
. . . . .
. &
l u
. i H . .
. . . . .
. . . . ú
. ° . a .
# . a . ¢
. . ä Z .
U ã Z . ã
.  Ñ q .
À . . . 6
. . i H .
. i H . .
. . i H .

dump of 256 bytes starting at pointer address 7FF8ED30:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
69 48 00 1C 69 48 00 71 2A F9 7F 00 00 00 00 00 00 00 00 00 00 00
71 5A 00 67 DF 5A 00 0C D2 5A 00 2C 93 5D 00 E1 92 5D 00 0E 21 61
0E 61 00 10 0E 61 00 9A A5 61 00 C0 02 00 00 16 72 5A 00 F9 B9 5A
9D 5A 00 26 9D 5A 00 FD A3 5A 00 28 67 7F 00 6A A3 61 00 B8 A0 61
00 00 00 B0 04 02 00 D6 A4 3C 88 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48
.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

i

H

.

.

i

H

.

q

*

ù



.

.

.

.

.

.

.

.

.

.

.

q

Z

.

g

ß

Z

.

.

Ò

Z

.

,



]

.

á



]

.

.

!

a

.

a

.

.

.

a

.



¥

a

.

À

.

.

.

.

r

Z

.

ù

¹

Z



Z

.

&



Z

.

ý

£

Z

.

(

g



.

j

£

a

.

¸

.

.

.

°

.

.

.

Ö

¤

<



(

f

H

.

.

i

H

.

.

i

H

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

a

--------------------------------2013/9/5
21:57:55-------------------------------This application has leaked memory. The small block leaks are (excluding
expected leaks registered by pointer):
21 - 36 bytes: EAccessViolation x 4
53 - 68 bytes: TAIMPBassFileInfoReader x 1
181 - 212 bytes: UnicodeString x 4
Note: Memory leak detail is logged to a text file in the same folder as this
application. To disable this memory leak check, undefine
"EnableMemoryLeakReporting".
--------------------------------2013/9/5
22:09:52-------------------------------A memory block has been leaked. The size is: 68
This block was allocated by thread 0xF8C, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[00832EF5] [
AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line:
452)
[007BABEE] [
AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037)
[007BAC80] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050)
[007BAD1E] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064)
[007BA9B6] [
AIMP3.dll]
AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983)
[007BA987] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1]
(Line: 972)
[007BA39A] [
AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775)
[00841110] [
AIMP3.dll]
AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636)
The block is currently used for an object of class: TAIMPBassFileInfoReader
The allocation number is: 65769
Current memory
08 1D 83 00 00
00 00 00 00 00
00 00 00 00 00
00 21 A0 6C 75
1C 69 48 00 1C
00 00 00 00 00
1A 02 00 00 FA
00 3E 79 60 00
ED 7E 60 00 F5
00 55 E3 5A 00
55 E4 5A 00 85
00 5D B8 5A 00
A4 02 00 00 36
00 1C 69 48 00
1C 69 48 00 1C
00 1C 69 48 00
. . ƒ . .
. . . . .
. . . . .
. !
l u
. i H . .
. . . . .
. . . . ú
. > y ` .
í ~ ` . õ
. U ã Z .
U ä Z . ƒ
. ] ¸ Z .
¤ . . . 6
. . i H .
. i H . .
. . i H .

dump of 256 bytes starting at pointer address 7FF8CFF0:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
69 48 00 00 00 00 00 F1 C8 F8 7F 00 00 00 00 00 00 00 00 00 00 00
71 5A 00 67 DF 5A 00 BC D4 5A 00 B9 15 5B 00 3B 16 5B 00 52 9C 5A
83 60 00 68 84 60 00 DC A5 87 00 A4 02 00 00 F9 B9 5A 00 0D E4 5A
D7 60 00 43 7B 60 00 FD 7F 60 00 B7 85 60 00 D4 E3 61 00 A8 B2 5A
00 00 00 B0 04 02 00 54 7E 2A 88 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48
.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

i

H

.

.

.

.

.

ñ

È

ø

ƒ

.

.

.

.

.

.

.

.

.

.

.

q

Z

.

g

ß

Z

.

¼

Ô

Z

.

¹

.

[

.

;

.

[

.

R

ƒ

Z

ƒ

`

.

h

ƒ

`

.

Ü

¥

ƒ

.

¤

.

.

.

ù

¹

Z

.

.

ä

Z

×

`

.

C

{

`

.

ý

ƒ

`

.

·

ƒ

`

.

Ô

ã

a

.

¨

²

Z

.

.

.

°

.

.

.

T

~

*

ƒ

(

f

H

.

.

i

H

.

.

i

H

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

--------------------------------2013/9/5
22:09:52-------------------------------A memory block has been leaked. The size is: 68
This block was allocated by thread 0xE20, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[00832EF5] [
AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line:
452)
[007BABEE] [
AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037)
[007BAC80] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050)
[007BAD1E] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064)
[007BA9B6] [
AIMP3.dll]
AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983)
[007BA987] [
AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1]
(Line: 972)
[007BA39A] [
AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775)
[00841110] [
AIMP3.dll]
AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636)
The block is currently used for an object of class: TAIMPBassFileInfoReader
The allocation number is: 65744
Current memory
08 1D 83 00 00
00 00 00 00 00
00 00 00 00 00
00 72 87 6C 75
1C 69 48 00 1C
00 00 00 00 00
EC 05 00 00 FA
00 A2 64 7E 00
43 8C 7E 00 E5
00 FD A3 5A 00
DD A0 61 00 73
77 F5 B3 9D 77
A4 02 00 00 44
00 1C 69 48 00
1C 69 48 00 1C
00 1C 69 48 00
. . ƒ . .
. . . . .
. . . . .
. r ƒ l u
. i H . .
. . . . .
ì . . . ú
@ . ¢ d ~
C ƒ ~ . å
. ý £ Z .
Ý
a . s
w õ ³ ƒ w
¤ . . . D
. . i H .
. i H . .
. . i H .

dump of 256 bytes starting at pointer address 7FF8EB90:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
69 48 00 1C 69 48 00 B1 20 F9 7F 00 00 00 00 00 00 00 00 00 00 00
71 5A 00 0F 9D 5A 00 B2 A3 5A 00 5B A0 61 00 80 3F 40 00 AD 3F 40
3B 41 00 D5 48 41 00 2A 3F 41 00 A4 02 00 00 16 72 5A 00 2D 9D 5A
9D 5A 00 59 DA 7E 00 A8 B2 5A 00 5D B8 5A 00 13 09 48 00 74 11 3E
00 00 00 94 52 7E 00 62 D6 4D 76 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48
.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

i

H

.

.

i

H

.

±

ù

ƒ

.

.

.

.

.

.

.

.

.

.

.

q
.
;

Z

.

.

ƒ

Z

.

²

£

Z

.

[

a

.

ƒ

?

@

.

A

.

Õ

H

A

.

*

?

A

.

¤

.

.

.

.

r

Z

.

-

ƒ

Z

ƒ

Z

.

Y

Ú

~

.

¨

²

Z

.

]

¸

Z

.

.

.

H

.

t

.

>

.

.

.

ƒ

R

~

.

b

Ö

M

v

(

f

H

.

.

i

H

.

.

i

H

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

?

--------------------------------2013/9/5
22:09:52-------------------------------This application has leaked memory. The small block leaks are (excluding
expected leaks registered by pointer):
53 - 68 bytes: TAIMPBassFileInfoReader x 2
Note: Memory leak detail is logged to a text file in the same folder as this
application. To disable this memory leak check, undefine
"EnableMemoryLeakReporting".
--------------------------------2013/9/5
22:14:10-------------------------------FastMM has detected an attempt to use an interface of a freed object. An access
violation will now be raised in order to abort the current operation.
The current thread ID is 0xB48, and the stack trace (return addresses) leading
to this error is:
[005B0B5E] [
AIMP3.dll] System.@IntfClear
[007BAB59] [
AIMP3.dll]
AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByRepository [+19] (Line: 1023)
[005AAE8B] [
AIMP3.dll] System.@HandleFinally
[779C65F8] [
ntdll.dll]
[779C65CA] [
ntdll.dll]
[779A9011] [
ntdll.dll]
[779DE011] [
ntdll.dll]
[00AB9DD9] [FastMM_FullDebugMode.dll]
[00402FAE] [
AIMP3.exe] FastMM4.CalculateHeaderCheckSum
[779DE48B] [
ntdll.dll]
[00AB9DD9] [FastMM_FullDebugMode.dll]
--------------------------------2013/9/5
22:14:12-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B] [
AIMP3.dll] System.@UStrFromPWCharLen
[005C9477] [
AIMP3.dll] SysUtils.FmtStr
[773E0811] [KERNEL32.dll]
[773E081E] [KERNEL32.dll]
[75C7707C] [KERNELBASE.dll]
[75C770B6] [KERNELBASE.dll]
[7732A0CE] [ SHLWAPI.dll]
[7732A76C] [ SHLWAPI.dll]
[77324997] [ SHLWAPI.dll]
The block is currently used for an object of class: UnicodeString
The allocation number is: 61185
Current memory
B0 04 02 00 01
00 69 00 6F 00
6C 00 61 00 74
00 65 00 73 00
73 00 20 00 37
00 6D 00 6F 00
64 00 75 00 6C
00 53 00 45 00
2E 00 64 00 6C
00 66 00 20 00
61 00 64 00 64
00 30 00 30 00
00 00 53 3A C6
00 A1 0D DF 7F
00 00 00 00 00
00 B2 A3 5A 00
° . . . .
. i . o .
l . a . t
. e . s .
s .
. 7
. m . o .
d . u . l
. S . E .
. . d . l

dump of 256 bytes starting at pointer address 7FDF0A00:
00 00 00 5A 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 35 00 43 00 37 00 39 00 36 00 31 00 37 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 4B 00 45 00 52 00 4E 00 45 00 4C 00 42 00 41
00 6C 00 27 00 2E 00 20 00 57 00 72 00 69 00 74 00 65 00 20 00 6F
00 72 00 65 00 73 00 73 00 20 00 30 00 30 00 30 00 30 00 30 00 30
39 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 B4 2D 00 00 FA 71 5A 00 0F 9D 5A
.

.

.

Z

.

.

.

.

i

.

o

.

n

.

.

5

.

C

.

7

.

.

e

.

.

'

.

.

l

.

.

.

.

'

A

.

c

.

c

.

e

.

s

.

s

.

.

a

.

t

.

9

.

6

.

1

.

7

.

K

.

E

.

R

.

N

.

.

W

.

r

.

i

.

.

v

.

a

.

d

.

d

.

r

.

i

.

n

.

E

.

L

.

B

.

A

t

.

e

.

.

o
.
a
.
.
.
.
.

f
.
0
.
¡
.
²

.
d
.
S
.
.
£

.
0
:
ß
.
Z

.
d
.
Æ
ƒ
.
.

.

r

.

e

.

s

.

s

.

9

H

.

.

i

H

.

.

i

.

.

.

.

.

.

.

.

.

.

0

.

0

.

0

.

0

.

0

.

0

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

´

-

.

.

ú

q

Z

.

.

ƒ

Z

--------------------------------2013/9/5
22:14:12-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B] [
AIMP3.dll] System.@UStrFromPWCharLen
[005C9477] [
AIMP3.dll] SysUtils.FmtStr
[773E0FED] [KERNEL32.dll]
[773DC080] [KERNEL32.dll]
[779DBD4C] [
ntdll.dll]
[779DBD4C] [
ntdll.dll]
[779DBD6F] [
ntdll.dll]
[779DC806] [
ntdll.dll]
[779DC7F6] [
ntdll.dll]
The block is currently used for an object of class: UnicodeString
The allocation number is: 61026
Current memory
B0 04 02 00 01
00 69 00 6F 00
6C 00 61 00 74
00 65 00 73 00
73 00 20 00 30
00 6D 00 6F 00
64 00 75 00 6C
00 6C 00 27 00
2E 00 20 00 52
00 65 00 73 00
73 00 20 00 30
00 1C 69 48 00
1C 69 48 00 1C
00 A0 06 DF 7F
00 00 00 00 00
00 0C D2 5A 00
° . . . .
. i . o .
l . a . t
. e . s .
s .
. 0
. m . o .
d . u . l
. l . ' .
. .
. R
. e . s .
s .
. 0
. . i H .
. i H . .
.
. ß ƒ
. . . . .
. . Ò Z .

dump of 256 bytes starting at pointer address 7FDF0F80:
00 00 00 54 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 30 00 35 00 41 00 39 00 44 00 36 00 45 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 41 00 49 00 4D 00 50 00 33 00 2E 00 64 00 6C
00 65 00 61 00 64 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 72
00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 D1 CA F7 34 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 A4 3E 40 00 00 00 00 00 5C EE 00 00 FA 71 5A 00 67 DF 5A
.

.

.

T

.

.

.

.

i

.

o

.

n

.

.

0

.

5

.

A

.

.

e

.

.

'

.

.

e

.

a

.

d

.

.

0

.

0

.

0

.

i

H

.

.

i

H

.

.

.

¤

>

@

A

.

c

.

c

.

e

.

s

.

s

.

.

v

.

a

.

t

.

.

a

.

d

.

d

.

r

9

.

D

.

6

.

E

.

.

i

.

n

.

A

.

I

.

M

.

P

.

3

.

.

.

d

.

l

.

o

.

f

.

.

a

.

d

.

d

.

r

0

.

0

.

1

.

C

.

.

.

Ñ

Ê

÷

4

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

.

.

.



î

.

.

ú

q

Z

.

g

ß

Z
--------------------------------2013/9/5
22:14:12-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B] [
AIMP3.dll] System.@UStrFromPWCharLen
[005C9477] [
AIMP3.dll] SysUtils.FmtStr
[773E0FED] [KERNEL32.dll]
[773DC080] [KERNEL32.dll]
[779DBD4C] [
ntdll.dll]
[779DBD4C] [
ntdll.dll]
[779DBD6F] [
ntdll.dll]
[779DC806] [
ntdll.dll]
[779DC7F6] [
ntdll.dll]
The block is currently used for an object of class: UnicodeString
The allocation number is: 61020
Current memory
B0 04 02 00 01
00 69 00 6F 00
6C 00 61 00 74
00 65 00 73 00
73 00 20 00 30
00 6D 00 6F 00
64 00 75 00 6C
00 6C 00 27 00
2E 00 20 00 52
00 65 00 73 00
73 00 20 00 36
00 1C 69 48 00
1C 69 48 00 1C
00 A1 18 DF 7F
00 00 00 00 00
00 B2 A3 5A 00
° . . . .
. i . o .
l . a . t
. e . s .
s .
. 0
. m . o .
d . u . l
. l . ' .
. .
. R
. e . s .
s .
. 6
. . i H .
. i H . .
. ¡ . ß ƒ
. . . . .
. ² £ Z .

dump of 256 bytes starting at pointer address 7FDF10E0:
00 00 00 54 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 30 00 35 00 42 00 30 00 42 00 35 00 43 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 41 00 49 00 4D 00 50 00 33 00 2E 00 64 00 6C
00 65 00 61 00 64 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 72
00 39 00 46 00 31 00 36 00 35 00 42 00 34 00 00 00 01 13 33 35 48
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 D4 8A 00 00 FA 71 5A 00 0F 9D 5A
.

.

.

T

.

.

.

.

i

.

o

.

n

.

.

0

.

5

.

B

.

.

e

.

.

'

.

.

e

.

a

.

d

.

.

9

.

F

.

1

.

i

H

.

.

i

H

.

.

.

.

.

.

A

.

c

.

c

.

e

.

s

.

s

.

.

v

.

a

.

t

.

.

a

.

d

.

d

.

r

0

.

B

.

5

.

C

.

.

i

.

n

.

A

.

I

.

M

.

P

.

3

.

.

.

d

.

l

.

o

.

f

.

.

a

.

d

.

d

.

r

6

.

5

.

B

.

4

.

.

.

.

.

3

5

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

.

.

.

Ô

ƒ

.

.

ú

q

Z

.

.

ƒ

Z

--------------------------------2013/9/5
22:14:12-------------------------------A memory block has been leaked. The size is: 212
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005ADF66] [
AIMP3.dll] System.@NewUnicodeString
[005AD20B]
[005C9477]
[779D346F]
[779D349E]
[779D8A8F]
[779D6D0D]
[779D7407]
[779D6F24]
[779D6F9C]

[
[
[
[
[
[
[
[
[

AIMP3.dll] System.@UStrFromPWCharLen
AIMP3.dll] SysUtils.FmtStr
ntdll.dll]
ntdll.dll]
ntdll.dll]
ntdll.dll]
ntdll.dll]
ntdll.dll]
ntdll.dll]

The block is currently used for an object of class: UnicodeString
The allocation number is: 61014
Current memory
B0 04 02 00 01
00 69 00 6F 00
6C 00 61 00 74
00 65 00 73 00
73 00 20 00 37
00 6D 00 6F 00
64 00 75 00 6C
00 6C 00 27 00
2E 00 20 00 57
00 72 00 65 00
73 00 73 00 20
33 1C 69 48 00
1C 69 48 00 1C
00 81 14 DF 7F
00 00 00 00 00
00 37 72 5A 00
° . . . .
. i . o .
l . a . t
. e . s .
s .
. 7
. m . o .
d . u . l
. l . ' .
. .
. W
. r . e .
s . s .
3 . i H .
. i H . .
.  . ß 
. . . . .
. 7 r Z .

dump of 256 bytes starting at pointer address 7FDF17C0:
00 00 00 55 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72
00 37 00 39 00 43 00 36 00 42 00 39 00 30 00 20 00 69 00 6E 00 20
00 65 00 20 00 27 00 6E 00 74 00 64 00 6C 00 6C 00 2E 00 64 00 6C
00 72 00 69 00 74 00 65 00 20 00 6F 00 66 00 20 00 61 00 64 00 64
00 30 00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 B1 B3 E5
69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 39 EB 00 00 62 41 40 00 D9 40 40
.

.

.

U

.

.

.

.

i

.

o

.

n

.

.

7

.

9

.

C

.

.

e

.

.

'

.

r

.

i

.

.

0

.

0

i

H

.

.

.

.

A

.

c

.

c

.

e

.

s

.

s

.

.

v

.

a

.

t

.

.

a

.

d

.

d

.

r

6

.

B

.

9

.

0

.

.

i

.

n

.

.

n

.

t

.

d

.

l

.

.

.

.

d

.

l

t

.

e

.

.

o

.

f

.

.

a

.

d

.

d

.

0

.

0

.

0

.

0

.

1

.

C

.

.

.

±

³

å

.

i

H

.

.

i

H

.

.

i

H

.

.

i

H

.

.

.

.

.

.

.

.

.

.

.

.

9

ë

.

.

b

A

@

.

Ù

@

@

l

--------------------------------2013/9/5
22:14:13-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[005D10CF] [
AIMP3.dll] SysUtils.Exception.CreateFmt
[005D1CAB] [
AIMP3.dll] SysUtils.CreateAVObject
[779D3192] [
ntdll.dll]
[779D316E] [
ntdll.dll]
[779A8E17] [
ntdll.dll]
[005D1DAA] [
AIMP3.dll] SysUtils.GetExceptionObject
[005AABB0] [
AIMP3.dll] System.@HandleAnyException
[779C65F8] [

ntdll.dll]

The block is currently used for an object of class: EAccessViolation
The allocation number is: 61010
Current memory
48 FF 5B 00 CC
04 00 00 00 00
89 4E 0D 9A 1C
00 00 00 00 00
5B EE 00 00 FA
00 B1 AB 5A 00
F9 65 9C 77 CB
00 32 1D 5D 00
93 31 9D 77 6F
77 3D 8D 9A 77
48 0B 00 00 20
00 00 00 00 00
00 00 00 00 00
00 00 EC DF 7F
00 00 00 00 00
00 B2 A3 5A 00
H ÿ [ . Ì
. . . . .
 N .  .
. . . . .
[ î . . ú
. ± « Z .
ù e  w Ë
. 2 . ] .
 1  w o
w =   w
H . . .
. . . . .
. . . . .
. . ì ß 
. . . . .
. ² £ Z .

dump of 256 bytes starting at pointer address 7FE05D60:
17 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 FA 9E
69 48 00 00 00 00 00 00 EC DF 7F 00 00 00 00 00 00 00 00 A4 3E 40
71 5A 00 0F 9D 5A 00 B2 A3 5A 00 D0 10 5D 00 AC 1C 5D 00 AB 1D 5D
65 9C 77 3D 8D 9A 77 57 64 9C 77 48 0B 00 00 16 72 5A 00 22 BA 5A
31 9D 77 18 8E 9A 77 AB 1D 5D 00 B1 AB 5A 00 F9 65 9C 77 CB 65 9C
00 00 00 B0 04 02 00 BB 69 87 30 48 FF 5B 00 EC 10 DF 7F 00 00 00
00 00 00 4C F2 9E 04 00 00 00 00 44 96 78 CF 1C 69 48 00 00 00 00
00 00 00 A4 3E 40 00 00 00 00 00 61 EE 00 00 FA 71 5A 00 0F 9D 5A
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.



ú



i

H

.

.

.

.

.

.

ì

ß



.

.

.

.

.

.

.

.

¤

>

@

q

Z

.

.



Z

.

²

£

Z

.

Ð

.

]

.

¬

.

]

.

«

.

]

e



w

=





w

W

d



w

H

.

.

.

.

r

Z

.

"

º

Z

1



w

.





w

«

.

]

.

±

«

Z

.

ù

e



w

Ë

e



.

.

.

°

.

.

.

»

i



0

H

ÿ

[

.

ì

.

ß



.

.

.

.

.

.

L

ò



.

.

.

.

.

D



x

Ï

.

i

H

.

.

.

.

.

.

.

¤

>

@

.

.

.

.

.

a

î

.

.

ú

q

Z

.

.



Z

--------------------------------2013/9/5
22:14:13-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[005D10CF] [
AIMP3.dll] SysUtils.Exception.CreateFmt
[005D1CAB] [
AIMP3.dll] SysUtils.CreateAVObject
[005D1DAA] [
AIMP3.dll] SysUtils.GetExceptionObject
[005AABB0] [
AIMP3.dll] System.@HandleAnyException
[779C65F8] [
ntdll.dll]
[779C65CA] [
ntdll.dll]
[779A8D3C] [
ntdll.dll]
[779C6456] [
ntdll.dll]
The block is currently used for an object of class: EAccessViolation
The allocation number is: 61019
Current memory dump of 256 bytes starting at pointer address 7FE05E10:
48 FF 5B 00 EC 10 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4C F2 9E
04
44
00
61
77
73
00
E3
00
8C
00
00
00
00
00
H
.
D
.
a
w
s
.
ã
.

.
.
.
.
.

00
96
00
EE
C1
DC
0B
4F
3B
04
00
00
00
00
00
ÿ
.

.
î
Á
Ü
.
O
;
.
.
.
.
.
.

00
78
00
00
DC
9D
6D
80
A1
00
00
00
00
00
00
[
.
x
.
.
Ü

m

¡
.
.
.
.
.
.

00
CF
00
00
9D
77
70
00
70
00
00
00
00
00
00
.
.
Ï
.
.

w
p
.
p
.
.
.
.
.
.

00
1C
00
FA
77
41
00
5F
00
20
00
00
00
00
00
ì
.
.
.
ú
w
A
.
_
.
.
.
.
.
.

69 48 00 00 00 00 00 00 EC DF 7F 00 00 00 00 00 00 00 00 A4 3E 40
71 5A 00 0F 9D 5A 00 B2 A3 5A 00 D0 10 5D 00 AC 1C 5D 00 46 DA 9D
2B 9F 77 31 DB 9D 77 12 E0 9D 77 48 0B 00 00 16 72 5A 00 F9 B9 5A
6D 70 00 CB 63 70 00 9D 64 70 00 CE 6D 70 00 97 9F 5A 00 65 A1 70
00 00 00 B0 04 02 00 E7 68 45 54 48 FF 5B 00 8C 0F DF 7F 00 00 00
00 00 00 30 EA 9E 04 00 00 00 00 18 97 BA AB 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

L

ò



i

H

.

.

.

.

.

.

ì

ß



.

.

.

.

.

.

.

.

¤

>

@

q

Z

.

.



Z

.

²

£

Z

.

Ð

.

]

.

¬

.

]

.

F

Ú



+



w

1

Û



w

.

à



w

H

.

.

.

.

r

Z

.

ù

¹

Z

m

p

.

Ë

c

p

.



d

p

.

Î

m

p

.





Z

.

e

¡

p

.

.

.

°

.

.

.

ç

h

E

T

H

ÿ

[

.



.

ß



.

.

.

.

.

.

0

ê



.

.

.

.

.

.



º

«

.

i

H

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

--------------------------------2013/9/5
22:14:13-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[005D10CF] [
AIMP3.dll] SysUtils.Exception.CreateFmt
[005D1CAB] [
AIMP3.dll] SysUtils.CreateAVObject
[779DDA45] [
ntdll.dll]
[779DDCC0] [
ntdll.dll]
[779DDC72] [
ntdll.dll]
[779F2B40] [
ntdll.dll]
[779DDB30] [
ntdll.dll]
[779DE011] [
ntdll.dll]
The block is currently used for an object of class: EAccessViolation
The allocation number is: 61025
Current memory
48 FF 5B 00 8C
04 00 00 00 00
18 97 BA AB 1C
00 00 00 00 00
00 00 00 00 00
00 00 00 00 00
00 00 00 00 00
7F 00 00 00 00
00 00 00 00 90

dump of 256 bytes starting at pointer address 7FE05EC0:
0F DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 EA 9E
69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 36 73 00 00 D8 12 48 00 70 A5 F9 7F 10 AE E0
45 E1 7F 00 00 00 00 31 61 E0 7F 00 00 00 00 00 00 00 00 00 00 00
00
8C
00
D3
00
73
00
H
.
.
.
.
.
.

.
.

.
Ó
.
s
.

00
26
B9
6A
72
9D
1B
ÿ
.

.
.
.
.
.
.
.
&
¹
j
r

.

00
00
97
7F
97
5A
48
[
.
º
.
.
.
.
.
.
.
.



Z
H

00
00
60
00
60
00
80
.
.
«
.
.
.
.
.
.
.
.
`
.
`
.


00
69
00
C6
00
03
00

.
.
.
.
.
.
.

.
i
.
Æ
.
.
.

72 5A 00 19 9C 60 00 A4 99 60 00 95 97 60 00 6B A1 61 00 73 C0 65
47 80 00 C0 09 61 00 F1 0B 61 00 8C 04 00 00 19 9C 60 00 D5 97 60
A4 61 00 1F A4 61 00 83 C0 65 00 3C 98 60 00 6A 9B 60 00 0C 6B 7F
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

0

ê



i

H

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

6

s

.

.

Ø

.

H

.

p

¥

ù



.

®

à

E

á



.

.

.

.

1

a

à



.

.

.

.

.

.

.

.

.

.

.

r

Z

.

.



`

.

¤



`

.





`

.

k

¡

a

.

s

À

e

G



.

À

.

a

.

ñ

.

a

.



.

.

.

.



`

.

Õ



`

¤

a

.

.

¤

a

.



À

e

.

<



`

.

j



`

.

.

k



--------------------------------2013/9/5
22:14:13-------------------------------A memory block has been leaked. The size is: 36
This block was allocated by thread 0xB48, and the stack trace (return addresses)
at the time was:
[005A71F9] [
AIMP3.dll] System.@GetMem
[005A9D0E] [
AIMP3.dll] System.TObject.NewInstance
[005AA3B1] [
AIMP3.dll] System.@ClassCreate
[005D10CF] [
AIMP3.dll] SysUtils.Exception.CreateFmt
[005D1CAB] [
AIMP3.dll] SysUtils.CreateAVObject
[75C79616] [KERNELBASE.dll]
[779D346F] [
ntdll.dll]
[779D349E] [
ntdll.dll]
[779D349E] [
ntdll.dll]
[779D6FBB] [
ntdll.dll]
[779D6D0D] [
ntdll.dll]
The block is currently used for an object of class: EAccessViolation
The allocation number is: 61184
Current memory
48 FF 5B 00 0C
04 00 00 00 00
00 30 03 AE 1C
00 00 00 00 00
84 04 00 00 62
00 24 F5 74 00
C0 7F 74 00 02
00 72 97 60 00
73 9D 5A 00 65
00 13 09 48 00
8C 04 00 00 20
00 1C 69 48 00
1C 69 48 00 1C
00 91 49 E6 7F
00 00 00 00 00
00 0C D2 5A 00
H ÿ [ . .

dump of 256 bytes starting at pointer address 7FE64E30:
0A DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 DC CD 9E
69 48 00 00 00 00 00 01 4D E6 7F 00 00 00 00 00 00 00 00 00 00 00
41 40 00 09 13 7F 00 37 72 5A 00 19 9C 60 00 A4 99 60 00 95 97 60
80 74 00 E9 03 78 00 27 7B 44 00 8C 04 00 00 19 9C 60 00 D5 97 60
F3 74 00 73 9D 5A 00 BF DA 72 00 50 08 73 00 A8 B2 5A 00 5D B8 5A
00 00 00 80 1A E7 7F 58 CF 52 08 28 66 48 00 1C 69 48 00 1C 69 48
69 48 00 1C 69 48 00 1C 69 48 00 A7 30 AD F7 1C 69 48 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 61 0B 00 00 FA 71 5A 00 67 DF 5A
.

ß



.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

Ü

Í


.
.
.

.
À
.
s
.

.
.
H
.
.

.
0
.
.
$

r

.
.
.
i
.
.
.

.
.
.
.
õ
t

Z
.
.
i
H
.
.
Ò

.
®
.
.
t
.
`
.
H
.
H
.
.
.
Z

.
.
.
b
.
.
.
e
.
.
.
.
.
.

i

H

.

.

.

.

.

.

M

æ



.

.

.

.

.

.

.

.

.

.

.

A

@

.

.

.



.

7

r

Z

.

.



`

.

¤



`

.





`



t

.

é

.

x

.

'

{

D

.



.

.

.

.



`

.

Õ



`

ó

t

.

s



Z

.

¿

Ú

r

.

P

.

s

.

¨

²

Z

.

]

¸

Z

.

.

.



.

ç



X

Ï

R

.

(

f

H

.

.

i

H

.

.

i

H

i
.
.

H

.

.
I
.

.
æ
.

i

.

H

.

.

i

H

.

§

0

.

.

.

.

.

.

a

.

Z

.

g

ß

Z

÷
.

.
.

i
ú

q

--------------------------------2013/9/5
22:14:13-------------------------------This application has leaked memory. The small block leaks are (excluding
expected leaks registered by pointer):
21 - 36 bytes: EAccessViolation x 4
181 - 212 bytes: UnicodeString x 4
Note: Memory leak detail is logged to a text file in the same folder as this
application. To disable this memory leak check, undefine
"EnableMemoryLeakReporting".

More Related Content

What's hot

Speeding up Red Team engagements with carnivorall
Speeding up Red Team engagements with carnivorallSpeeding up Red Team engagements with carnivorall
Speeding up Red Team engagements with carnivorall
Nullbyte Security Conference
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
NoNameCon
 
Cameroun - Repertoire des projets prioritaires à besoins de financement
Cameroun - Repertoire des projets prioritaires à besoins de financementCameroun - Repertoire des projets prioritaires à besoins de financement
Cameroun - Repertoire des projets prioritaires à besoins de financement
investincameroon
 
기계가 선형대수학을 통해 한국어를 이해하는 방법
기계가 선형대수학을 통해 한국어를 이해하는 방법기계가 선형대수학을 통해 한국어를 이해하는 방법
기계가 선형대수학을 통해 한국어를 이해하는 방법
Kyunghoon Kim
 
The Ring programming language version 1.6 book - Part 61 of 189
The Ring programming language version 1.6 book - Part 61 of 189The Ring programming language version 1.6 book - Part 61 of 189
The Ring programming language version 1.6 book - Part 61 of 189
Mahmoud Samir Fayed
 
1024+ Seconds of JS Wizardry - JSConf.eu 2013
1024+ Seconds of JS Wizardry - JSConf.eu 20131024+ Seconds of JS Wizardry - JSConf.eu 2013
1024+ Seconds of JS Wizardry - JSConf.eu 2013
Martin Kleppe
 
2
22
Додаток 3
Додаток 3Додаток 3
Додаток 3
ymcmb_ua
 
Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...
Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...
Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...
Vlatko Kosturjak
 
Shkrubbel for Open Web Camp 3
Shkrubbel for Open Web Camp 3Shkrubbel for Open Web Camp 3
Shkrubbel for Open Web Camp 3
kitthod
 

What's hot (10)

Speeding up Red Team engagements with carnivorall
Speeding up Red Team engagements with carnivorallSpeeding up Red Team engagements with carnivorall
Speeding up Red Team engagements with carnivorall
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
 
Cameroun - Repertoire des projets prioritaires à besoins de financement
Cameroun - Repertoire des projets prioritaires à besoins de financementCameroun - Repertoire des projets prioritaires à besoins de financement
Cameroun - Repertoire des projets prioritaires à besoins de financement
 
기계가 선형대수학을 통해 한국어를 이해하는 방법
기계가 선형대수학을 통해 한국어를 이해하는 방법기계가 선형대수학을 통해 한국어를 이해하는 방법
기계가 선형대수학을 통해 한국어를 이해하는 방법
 
The Ring programming language version 1.6 book - Part 61 of 189
The Ring programming language version 1.6 book - Part 61 of 189The Ring programming language version 1.6 book - Part 61 of 189
The Ring programming language version 1.6 book - Part 61 of 189
 
1024+ Seconds of JS Wizardry - JSConf.eu 2013
1024+ Seconds of JS Wizardry - JSConf.eu 20131024+ Seconds of JS Wizardry - JSConf.eu 2013
1024+ Seconds of JS Wizardry - JSConf.eu 2013
 
2
22
2
 
Додаток 3
Додаток 3Додаток 3
Додаток 3
 
Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...
Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...
Getting access to Lantronix devices: exploring treasures of 77FEh at Confiden...
 
Shkrubbel for Open Web Camp 3
Shkrubbel for Open Web Camp 3Shkrubbel for Open Web Camp 3
Shkrubbel for Open Web Camp 3
 

Viewers also liked

Seguridad en Servicios Web
Seguridad en Servicios WebSeguridad en Servicios Web
Seguridad en Servicios Web
Hacking Bolivia
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
nomodula
 
Happy valentines day to the greatest girl ever
Happy valentines day to the greatest girl everHappy valentines day to the greatest girl ever
Happy valentines day to the greatest girl ever
Christina Love
 
Slide show
Slide showSlide show
Slide show
WestinSTL
 
Onespark kbme slide show
Onespark kbme slide showOnespark kbme slide show
Onespark kbme slide show
Dr. Eduardo Balbona
 
Portfólio Iniesta RH
Portfólio  Iniesta RH Portfólio  Iniesta RH
Portfólio Iniesta RH
Fernanda Fernandez
 
Webcaster.pro
Webcaster.proWebcaster.pro
Webcaster.pro
Alexander Svetkin
 
Art 2 Course @ CSN: A student's Perspective
Art 2 Course @ CSN: A student's PerspectiveArt 2 Course @ CSN: A student's Perspective
Art 2 Course @ CSN: A student's Perspective
reaha
 
Evolution of Computing Microprocessors and SoCs
Evolution of Computing Microprocessors and SoCsEvolution of Computing Microprocessors and SoCs
Evolution of Computing Microprocessors and SoCs
azmathmoosa
 
Low Power Memory
Low Power MemoryLow Power Memory
Low Power Memory
azmathmoosa
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
anujessy
 
Design of two stage OP AMP
Design of two stage OP AMPDesign of two stage OP AMP
Design of two stage OP AMP
azmathmoosa
 
Library automation history Anandraj.L
Library automation history Anandraj.LLibrary automation history Anandraj.L
Library automation history Anandraj.L
anujessy
 
INFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.LINFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.L
anujessy
 
Proxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеров
Proxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеровProxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеров
Proxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеров
Alexander Svetkin
 

Viewers also liked (15)

Seguridad en Servicios Web
Seguridad en Servicios WebSeguridad en Servicios Web
Seguridad en Servicios Web
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
 
Happy valentines day to the greatest girl ever
Happy valentines day to the greatest girl everHappy valentines day to the greatest girl ever
Happy valentines day to the greatest girl ever
 
Slide show
Slide showSlide show
Slide show
 
Onespark kbme slide show
Onespark kbme slide showOnespark kbme slide show
Onespark kbme slide show
 
Portfólio Iniesta RH
Portfólio  Iniesta RH Portfólio  Iniesta RH
Portfólio Iniesta RH
 
Webcaster.pro
Webcaster.proWebcaster.pro
Webcaster.pro
 
Art 2 Course @ CSN: A student's Perspective
Art 2 Course @ CSN: A student's PerspectiveArt 2 Course @ CSN: A student's Perspective
Art 2 Course @ CSN: A student's Perspective
 
Evolution of Computing Microprocessors and SoCs
Evolution of Computing Microprocessors and SoCsEvolution of Computing Microprocessors and SoCs
Evolution of Computing Microprocessors and SoCs
 
Low Power Memory
Low Power MemoryLow Power Memory
Low Power Memory
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
 
Design of two stage OP AMP
Design of two stage OP AMPDesign of two stage OP AMP
Design of two stage OP AMP
 
Library automation history Anandraj.L
Library automation history Anandraj.LLibrary automation history Anandraj.L
Library automation history Anandraj.L
 
INFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.LINFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.L
 
Proxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеров
Proxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеровProxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеров
Proxima.TV. OTT-платформа для операторов ШПД и интернет-провайдеров
 

Similar to Aimp3 memory manager_eventlog

LT SAP HANAネットワークプロトコル初段
LT SAP HANAネットワークプロトコル初段LT SAP HANAネットワークプロトコル初段
LT SAP HANAネットワークプロトコル初段
Koji Shinkubo
 
ambil aja
ambil aja ambil aja
ambil aja
muxander
 
Examining Malware with Python
Examining Malware with PythonExamining Malware with Python
Examining Malware with Python
mrphilroth
 
Big Data mit Microsoft?
Big Data mit Microsoft?Big Data mit Microsoft?
Big Data mit Microsoft?
Olivia Klose
 
Abusing archive file formats
Abusing archive file formatsAbusing archive file formats
Abusing archive file formats
Ange Albertini
 
Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...
Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...
Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...
Olivia Klose
 
crack satellite
crack satellite crack satellite
crack satellite
TecnicoAInstrumentos
 
ipython notebook poc memory forensics
ipython notebook poc memory forensicsipython notebook poc memory forensics
ipython notebook poc memory forensics
Vincent Ohprecio
 
Compilation process
Compilation processCompilation process
Compilation process
Alex Denisov
 
CAR Email 7.11.02
CAR Email 7.11.02CAR Email 7.11.02
CAR Email 7.11.02
Obama White House
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
SensePost
 
7th Semester (June; July-2014) Mechanical Engineering Question Paper
7th Semester (June; July-2014) Mechanical Engineering Question Paper7th Semester (June; July-2014) Mechanical Engineering Question Paper
7th Semester (June; July-2014) Mechanical Engineering Question Paper
BGS Institute of Technology, Adichunchanagiri University (ACU)
 
Example 006
Example 006Example 006
Example 006
klubandayak
 
Learning iPython Notebook Volatility Memory Forensics
Learning iPython Notebook Volatility Memory ForensicsLearning iPython Notebook Volatility Memory Forensics
Learning iPython Notebook Volatility Memory Forensics
Vincent Ohprecio
 
Hta r31
Hta r31Hta r31
Exploiting hash collisions
Exploiting hash collisionsExploiting hash collisions
Exploiting hash collisions
Ange Albertini
 
FLT catalog
FLT catalogFLT catalog
كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين
 كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين
كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين
mohammad505
 
Buffer Overflows Presentation
Buffer Overflows PresentationBuffer Overflows Presentation
Buffer Overflows Presentation
David Klassen
 
KILL MD5
KILL MD5KILL MD5
KILL MD5
Ange Albertini
 

Similar to Aimp3 memory manager_eventlog (20)

LT SAP HANAネットワークプロトコル初段
LT SAP HANAネットワークプロトコル初段LT SAP HANAネットワークプロトコル初段
LT SAP HANAネットワークプロトコル初段
 
ambil aja
ambil aja ambil aja
ambil aja
 
Examining Malware with Python
Examining Malware with PythonExamining Malware with Python
Examining Malware with Python
 
Big Data mit Microsoft?
Big Data mit Microsoft?Big Data mit Microsoft?
Big Data mit Microsoft?
 
Abusing archive file formats
Abusing archive file formatsAbusing archive file formats
Abusing archive file formats
 
Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...
Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...
Jumpstarting big data projects / Architectural Considerations of HDInsight Ap...
 
crack satellite
crack satellite crack satellite
crack satellite
 
ipython notebook poc memory forensics
ipython notebook poc memory forensicsipython notebook poc memory forensics
ipython notebook poc memory forensics
 
Compilation process
Compilation processCompilation process
Compilation process
 
CAR Email 7.11.02
CAR Email 7.11.02CAR Email 7.11.02
CAR Email 7.11.02
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
7th Semester (June; July-2014) Mechanical Engineering Question Paper
7th Semester (June; July-2014) Mechanical Engineering Question Paper7th Semester (June; July-2014) Mechanical Engineering Question Paper
7th Semester (June; July-2014) Mechanical Engineering Question Paper
 
Example 006
Example 006Example 006
Example 006
 
Learning iPython Notebook Volatility Memory Forensics
Learning iPython Notebook Volatility Memory ForensicsLearning iPython Notebook Volatility Memory Forensics
Learning iPython Notebook Volatility Memory Forensics
 
Hta r31
Hta r31Hta r31
Hta r31
 
Exploiting hash collisions
Exploiting hash collisionsExploiting hash collisions
Exploiting hash collisions
 
FLT catalog
FLT catalogFLT catalog
FLT catalog
 
كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين
 كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين
كيف تعمل الكاميرا وشرح الية الابصار وتشريح العين
 
Buffer Overflows Presentation
Buffer Overflows PresentationBuffer Overflows Presentation
Buffer Overflows Presentation
 
KILL MD5
KILL MD5KILL MD5
KILL MD5
 

Recently uploaded

EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
Febless Hernane
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
7lkkjxt
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
mediavestfzllc
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
SocioCosmos
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
AJHSSR Journal
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 

Recently uploaded (15)

EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 

Aimp3 memory manager_eventlog

  • 1. --------------------------------2013/9/5 21:56:19-------------------------------A memory block has been leaked. The size is: 68 This block was allocated by thread 0x390, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [00832EF5] [ AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line: 452) [007BABEE] [ AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037) [007BAC80] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050) [007BAD1E] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064) [007BA9B6] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983) [007BA987] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1] (Line: 972) [007BA39A] [ AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775) [00841110] [ AIMP3.dll] AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636) The block is currently used for an object of class: TAIMPBassFileInfoReader The allocation number is: 61020 Current memory 08 1D 83 00 00 00 00 00 00 00 00 00 00 00 00 00 A6 CA 6C 75 1C 69 48 00 1C 00 00 00 00 00 1A 02 00 00 FA 00 3E 79 60 00 ED 7E 60 00 F5 00 55 E3 5A 00 55 E4 5A 00 85 00 5D B8 5A 00 30 09 00 00 36 00 1C 69 48 00 1C 69 48 00 1C 00 1C 69 48 00 . . ƒ . . . . . . . . . . . . . ¦ Ê l u . i H . . . . . . . . . . . ú . > y ` . í ~ ` . õ . U ã Z . U ä Z . ƒ . ] ¸ Z . 0 . . . 6 . . i H . . i H . . . . i H . dump of 256 bytes starting at pointer address 7FF8CFF0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 69 48 00 00 00 00 00 F1 C8 F8 7F 00 00 00 00 00 00 00 00 00 00 00 71 5A 00 67 DF 5A 00 BC D4 5A 00 B9 15 5B 00 3B 16 5B 00 52 9C 5A 83 60 00 68 84 60 00 DC A5 87 00 30 09 00 00 F9 B9 5A 00 0D E4 5A D7 60 00 43 7B 60 00 FD 7F 60 00 B7 85 60 00 D4 E3 61 00 A8 B2 5A 00 00 00 B0 04 02 00 6C 8B 2A 88 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i H . . . . . ñ È ø ƒ . . . . . . . . . . . q Z . g ß Z . ¼ Ô Z . ¹ . [ . ; . [ . R ƒ Z ƒ ` . h ƒ ` . Ü ¥ ƒ . 0 . . . ù ¹ Z . . ä Z × ` . C { ` . ý ƒ ` . · ƒ ` . Ô ã a . ¨ ² Z . . . ° . . . l ƒ * ƒ ( f H . . i H . . i H i H . . i H . . i H . . i H . . i H . . i H --------------------------------2013/9/5 21:56:19-------------------------------This application has leaked memory. The small block leaks are (excluding
  • 2. expected leaks registered by pointer): 53 - 68 bytes: TAIMPBassFileInfoReader x 1 Note: Memory leak detail is logged to a text file in the same folder as this application. To disable this memory leak check, undefine "EnableMemoryLeakReporting". --------------------------------2013/9/5 21:57:45-------------------------------FastMM has detected an attempt to use an interface of a freed object. An access violation will now be raised in order to abort the current operation. The current thread ID is 0x7D4, and the stack trace (return addresses) leading to this error is: [005B0B5E] [ AIMP3.dll] System.@IntfClear [007BAB11] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByRepository [+12] (Line: 1016) [005AAE8B] [ AIMP3.dll] System.@HandleFinally [779C65F8] [ ntdll.dll] [779C65CA] [ ntdll.dll] [779A9011] [ ntdll.dll] [75C76A95] [KERNELBASE.dll] [75C79534] [KERNELBASE.dll] [75C7856B] [KERNELBASE.dll] [00AB9A7C] [FastMM_FullDebugMode.dll] [00402FAE] [ AIMP3.exe] FastMM4.CalculateHeaderCheckSum --------------------------------2013/9/5 21:57:50-------------------------------FastMM has detected an attempt to use an interface of a freed object. An access violation will now be raised in order to abort the current operation. The current thread ID is 0x7D4, and the stack trace (return addresses) leading to this error is: [005B0B5E] [ AIMP3.dll] System.@IntfClear [007BAB59] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByRepository [+19] (Line: 1023) [005AAE8B] [ AIMP3.dll] System.@HandleFinally [779C65F8] [ ntdll.dll] [779C65CA] [ ntdll.dll] [779A9011] [ ntdll.dll] [75C76A95] [KERNELBASE.dll] [75C79534] [KERNELBASE.dll] [75C7856B] [KERNELBASE.dll] [75C79D05] [KERNELBASE.dll] [00AB9DD9] [FastMM_FullDebugMode.dll] --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString [005AD20B] [ AIMP3.dll] System.@UStrFromPWCharLen [005C9477] [ AIMP3.dll] SysUtils.FmtStr [773E0FED] [KERNEL32.dll] [773DC080] [KERNEL32.dll] [779DBD4C] [ ntdll.dll] [779DBD4C] [ ntdll.dll] [779DBD6F] [ ntdll.dll] [779DC806] [ ntdll.dll]
  • 3. [779DC7F6] [ ntdll.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 62430 Current memory B0 04 02 00 01 00 69 00 6F 00 6C 00 61 00 74 00 65 00 73 00 73 00 20 00 30 00 6D 00 6F 00 64 00 75 00 6C 00 6C 00 27 00 2E 00 20 00 52 00 65 00 73 00 73 00 20 00 30 00 1C 69 48 00 1C 69 48 00 1C 00 A0 06 DF 7F 00 00 00 00 00 00 0C D2 5A 00 ° . . . . . i . o . l . a . t . e . s . s . . 0 . m . o . d . u . l . l . ' . . . . R . e . s . s . . 0 . . i H . . i H . . . . ß ƒ . . . . . . . Ò Z . dump of 256 bytes starting at pointer address 7FDF08A0: 00 00 00 54 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 30 00 35 00 41 00 39 00 44 00 36 00 45 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 41 00 49 00 4D 00 50 00 33 00 2E 00 64 00 6C 00 65 00 61 00 64 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 72 00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 14 DC 3B 35 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 A4 3E 40 00 00 00 00 00 D8 F3 00 00 FA 71 5A 00 67 DF 5A . . . T . . . . i . o . n . . 0 . 5 . A . . e . . ' . . e . a . d . . 0 . 0 . 0 . i H . . i H . . . ¤ > @ A . c . c . e . s . s . . v . a . t . . a . d . d . r 9 . D . 6 . E . . i . n . A . I . M . P . 3 . . . d . l . o . f . . a . d . d . r 0 . 0 . 1 . C . . . . Ü ; 5 H . . i H . . i H . . i H . . . . . . . . . Ø ó . . ú q Z . g ß Z --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString [005AD20B] [ AIMP3.dll] System.@UStrFromPWCharLen [005C9477] [ AIMP3.dll] SysUtils.FmtStr [00370042] [ AIMP3.exe] [773E0811] [KERNEL32.dll] [773E081E] [KERNEL32.dll] [75C7707C] [KERNELBASE.dll] [75C770B6] [KERNELBASE.dll] [7732A0CE] [ SHLWAPI.dll] [7732A76C] [ SHLWAPI.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 62424 Current memory dump of 256 bytes starting at pointer address 7FDF0A00: B0 04 02 00 01 00 00 00 5A 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76
  • 4. 00 6C 00 73 00 64 00 2E 00 61 00 00 00 00 00 ° . l . s . d . . . a . . . . . 69 00 65 00 6D 00 53 00 66 00 30 00 A0 00 0C . i . e . m . S . f . 0 . . . 00 61 00 20 00 75 00 64 00 64 00 64 06 00 D2 . . a . . u . d . d . d . . Ò 6F 00 73 00 6F 00 45 00 20 00 30 22 DF 00 5A . o . s . o . E . . 0 " ß . Z 00 74 00 37 00 6C 00 6C 00 64 00 A0 7F 00 00 . . t . 7 . l . l . d . ƒ . . 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 35 00 43 00 37 00 39 00 36 00 31 00 37 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 4B 00 45 00 52 00 4E 00 45 00 4C 00 42 00 41 00 6C 00 27 00 2E 00 20 00 57 00 72 00 69 00 74 00 65 00 20 00 6F 00 72 00 65 00 73 00 73 00 20 00 30 00 30 00 30 00 30 00 30 00 30 3A 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 A4 3E 40 00 00 00 00 00 E4 F3 00 00 FA 71 5A 00 67 DF 5A . . . Z . . . A . c . c . . i . o . n . . 5 . C . 7 . . e . . ' . . l . ' . . . . r . e . s . s . : H . . i H . . i . . . ¤ > @ . . . e . s . s . . v . a . t . . a . d . d . r 9 . 6 . 1 . 7 . . i . n . K . E . R . N . E . L . B . A . W . r . i . t . e . . o . 0 . 0 . 0 . 0 . 0 . 0 H . . i H . . i H . . . . . . ä ó . . ú q Z . g ß Z --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString [005AD20B] [ AIMP3.dll] System.@UStrFromPWCharLen [005C9477] [ AIMP3.dll] SysUtils.FmtStr [00370042] [ AIMP3.exe] [00A8FF44] [FastMM_FullDebugMode.dll] [00A8FF4C] [FastMM_FullDebugMode.dll] [00A8F8BC] [FastMM_FullDebugMode.dll] [00A84195] [FastMM_FullDebugMode.dll] [00A85DF4] [FastMM_FullDebugMode.dll] [00A86C45] [FastMM_FullDebugMode.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 62436 Current memory B0 04 02 00 01 00 69 00 6F 00 6C 00 61 00 74 00 65 00 73 00 73 00 20 00 37 00 6D 00 6F 00 64 00 75 00 6C 00 53 00 45 00 2E 00 64 00 6C dump of 256 bytes starting at pointer address 7FDF0B60: 00 00 00 5A 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 35 00 43 00 37 00 39 00 36 00 31 00 37 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 4B 00 45 00 52 00 4E 00 45 00 4C 00 42 00 41 00 6C 00 27 00 2E 00 20 00 57 00 72 00 69 00 74 00 65 00 20 00 6F
  • 5. 00 61 00 00 00 00 00 ° . l . s . d . . . a . . . . . 66 00 30 00 21 00 B2 . i . e . m . S . f . 0 . ! . ² 00 64 00 5E 13 00 A3 . . a . . u . d . d . ^ . . £ 20 00 30 64 DF 00 5A . o . s . o . E . . 0 d ß . Z 00 64 00 DB 7F 00 00 . . t . 7 . l . l . d . Û ƒ . . 00 72 00 65 00 73 00 73 00 20 00 30 00 30 00 30 00 30 00 30 00 30 75 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 2E 00 00 FA 71 5A 00 0F 9D 5A . . . Z . . . A . c . c . . i . o . n . . 5 . C . 7 . . e . . ' . . l . ' . . . . r . e . s . s . u H . . i H . . i . . . . . . . . . e . s . s . . v . a . t . . a . d . d . r 9 . 6 . 1 . 7 . . i . n . K . E . R . N . E . L . B . A . W . r . i . t . e . . o . 0 . 0 . 0 . 0 . 0 . 0 H . . i H . . i H . . . . . . T . . . ú q Z . . ƒ Z --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString [005AD20B] [ AIMP3.dll] System.@UStrFromPWCharLen [005C9477] [ AIMP3.dll] SysUtils.FmtStr [779D346F] [ ntdll.dll] [779D349E] [ ntdll.dll] [779D8A8F] [ ntdll.dll] [779D6D0D] [ ntdll.dll] [779D7407] [ ntdll.dll] [779D6F24] [ ntdll.dll] [779D6F9C] [ ntdll.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 62167 Current memory B0 04 02 00 01 00 69 00 6F 00 6C 00 61 00 74 00 65 00 73 00 73 00 20 00 37 00 6D 00 6F 00 64 00 75 00 6C 00 6C 00 27 00 2E 00 20 00 57 00 72 00 65 00 73 00 73 00 20 33 1C 69 48 00 1C 69 48 00 1C 00 01 00 00 00 00 00 00 00 00 00 0C D2 5A 00 ° . . . . dump of 256 bytes starting at pointer address 7FDF1500: 00 00 00 55 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 37 00 39 00 43 00 36 00 42 00 39 00 30 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 6E 00 74 00 64 00 6C 00 6C 00 2E 00 64 00 6C 00 72 00 69 00 74 00 65 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 30 00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 30 B7 E5 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 E4 ED 00 00 FA 71 5A 00 67 DF 5A . . . U . . . A . c . c . e . s . s . . v
  • 6. . l . s . d . . . s 3 . . . . i . e . m . l . r . . i . . . . a . . u . . s i H . . Ò o . s . o . ' . e . H . . . Z . t . 7 . l . W . . . . . . . i . o . n . . a . t . . 7 . 9 . C . . e . . ' . r . i . . 0 . 0 i H . . . . . 6 . B . 9 . 0 . . n . t . d . l . t . e . . o . f . . 0 . 0 . 0 . 0 . 1 . . i H . . i H . . i H . . . . . . . . ä í . a . d . d . . i . n . . . . d . l . a . d . d C . . . 0 · å . . i H . . . . . ú q Z . g ß Z l r --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [005D10CF] [ AIMP3.dll] SysUtils.Exception.CreateFmt [005D1CAB] [ AIMP3.dll] SysUtils.CreateAVObject [779A8E17] [ ntdll.dll] [005D1DAA] [ AIMP3.dll] SysUtils.GetExceptionObject [005AABB0] [ AIMP3.dll] System.@HandleAnyException [779C65F8] [ ntdll.dll] [779C65CA] [ ntdll.dll] [779A8D3C] [ ntdll.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 62165 Current memory 48 FF 5B 00 0C 04 00 00 00 00 90 BE 10 9A 1C 00 00 00 00 00 E4 F2 00 00 FA 00 E3 4F 80 00 5F 6D 70 00 CB 00 0B 6D 70 00 E3 4F 80 00 5F 00 3B A1 70 00 C0 02 00 00 1A 00 1C 69 48 00 1C 69 48 00 1C 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 H ÿ [ . . . . . . .  ¾ .  . . . . . . ä ò . . ú . ã O  . _ m p . Ë . . m p . ã O  . _ dump of 256 bytes starting at pointer address 7FE05E10: 15 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 FA 9A 69 48 00 00 00 00 00 A1 3E E0 7F 00 00 00 00 00 00 00 00 00 00 00 71 5A 00 67 DF 5A 00 BC D4 5A 00 49 D5 5A 00 FD 60 70 00 D9 6A 70 63 70 00 9D 64 70 00 CE 6D 70 00 C0 02 00 00 16 72 5A 00 F9 B9 5A 6D 70 00 CB 63 70 00 9D 64 70 00 CE 6D 70 00 97 9F 5A 00 65 A1 70 00 00 00 B0 04 02 00 EB 84 14 89 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 14 7B EB 76 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 . ß  . . . . . . . . . . . . . . . .  ú  i H . . . . . ¡ > à  . . . . . . . . . . . q Z . g ß Z . ¼ Ô Z . I Õ Z . ý ` p . Ù j p c p .  d p . Î m p . À . . . . r Z . ù ¹ Z m p . Ë c p .  d p . Î m p .   Z . e ¡ p
  • 7. . À . . . . . ; . . i . . . ¡ . i H . . . p . H . . . . . . . . . . . . . . ° . . . ë  .  ( f H . . i H . . i H i H . . i . { ë v H . . i H . . i H . . . . . . . . . . . . . . . . . . . . . . . . . . --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [005D10CF] [ AIMP3.dll] SysUtils.Exception.CreateFmt [005D1CAB] [ AIMP3.dll] SysUtils.CreateAVObject [779D3192] [ ntdll.dll] [779D316E] [ ntdll.dll] [779D79B2] [ ntdll.dll] [779D316E] [ ntdll.dll] [779D2D67] [ ntdll.dll] [75C79D05] [KERNELBASE.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 62429 Current memory 48 FF 5B 00 AC 04 00 00 00 00 20 6B 03 AE 1C 00 00 00 00 00 D7 F3 00 00 FA 75 BC 6F 9D 77 0E 6D 9D 77 08 00 3A 1D 5D 00 38 12 BB 6F 48 77 3D 8D 9A 77 80 07 00 00 20 00 00 00 00 00 00 00 00 00 00 00 91 54 E6 7F 00 00 00 00 00 00 B2 A3 5A 00 H ÿ [ . ¬ . . . . . k . ® . . . . . . × ó . . ú u ¼ o  w . m  w . . : . ] . 8 . » o H w =   w  . . . . . . . . . . . . . .  T æ  . . . . . . ² £ Z . dump of 256 bytes starting at pointer address 7FE64B70: 08 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 D6 9A 69 48 00 00 00 00 00 70 49 E6 7F 00 00 00 00 00 00 00 00 A4 3E 40 71 5A 00 0F 9D 5A 00 B2 A3 5A 00 D0 10 5D 00 AC 1C 5D 00 17 96 C7 74 9D 77 70 34 9D 77 BC 6F 9D 77 D4 07 00 00 16 72 5A 00 F9 B9 5A 12 BB 6F 18 8E 9A 77 AB 1D 5D 00 B1 AB 5A 00 F9 65 9C 77 CB 65 9C 00 00 00 B0 04 02 00 C9 1B 7C 0D 48 FF 5B 00 0C 0A DF 7F 00 00 00 00 00 00 40 DE 9A 04 00 00 00 00 36 E4 83 F2 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 2E 00 00 FA 71 5A 00 0F 9D 5A . ß  . . . . . . . . . . . . . . . . $ Ö  i H . . . . . p I æ  . . . . . . . . ¤ > @ q Z . .  Z . ² £ Z . Ð . ] . ¬ . ] . .  Ç t  w p 4  w ¼ o  w Ô . . . . r Z . ù ¹ Z . » o .   w « . ] . ± « Z . ù e  w Ë e  . . . ° . . . É . | . H ÿ [ . . . ß  . . . . . . @ Þ  . . . . . 6 ä  ò . i H . . . . . . . . . . . . . . . v . . . ú q Z . .  Z
  • 8. --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [005D10CF] [ AIMP3.dll] SysUtils.Exception.CreateFmt [005D1CAB] [ AIMP3.dll] SysUtils.CreateAVObject [75C79616] [KERNELBASE.dll] [779D6FBB] [ ntdll.dll] [779D6D0D] [ ntdll.dll] [779D7407] [ ntdll.dll] [779D346F] [ ntdll.dll] [779D6FBB] [ ntdll.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 62423 Current memory 48 FF 5B 00 0C 04 00 00 00 00 36 E4 83 F2 1C 00 00 00 00 00 76 2E 00 00 FA 00 43 6E 74 00 F7 7F 74 00 E9 00 FD A3 5A 00 45 AE 60 00 73 00 FB 36 7F 00 C0 02 00 00 24 00 1C 69 48 00 1C 69 48 00 1C 00 11 4F E6 7F 00 00 00 00 00 00 ED 0B 5B 00 H ÿ [ . . . . . . . 6 ä  ò . . . . . . v . . . ú . C n t . ÷  t . é . ý £ Z . E ® ` . s . û 6  . À . . . $ . . i H . . i H . . . . O æ  . . . . . . í . [ . dump of 256 bytes starting at pointer address 7FE64C20: 0A DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 DE 9A 69 48 00 00 00 00 00 91 54 E6 7F 00 00 00 00 00 00 00 00 00 00 00 71 5A 00 0F 9D 5A 00 B2 A3 5A 00 03 E1 72 00 A3 9A 64 00 7E 17 72 03 78 00 27 7B 44 00 57 F3 46 00 C0 02 00 00 16 72 5A 00 2D 9D 5A 9D 5A 00 43 19 72 00 05 6F 74 00 92 81 74 00 2D 9D 5A 00 2E 04 78 00 00 00 A4 0B 71 00 B6 13 15 89 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 49 EC EA 76 00 00 00 00 00 00 00 00 00 00 00 00 00 00 EE F3 00 00 FA 71 5A 00 0F 9D 5A . ß  . . . . . . . . . . . . . . . . @ Þ  i H . . . . .  T æ  . . . . . . . . . . . q Z . .  Z . ² £ Z . . á r . £  d . ~ . r . x . ' { D . W ó F . À . . . . r Z . -  Z  Z . C . r . . o t .   t . -  Z . . . x . . . ¤ . q . ¶ . .  ( f H . . i H . . i H i H . . i H . . i H . . i H . I ì ê v . . . . . . . . . . . . . . î ó . . ú q Z . .  Z --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0x7D4, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance
  • 9. [005AA3B1] [005D10CF] [005D1CAB] [75C79616] [779D346F] [779D349E] [779D349E] [779D6FBB] [779D6D0D] [ AIMP3.dll] System.@ClassCreate [ AIMP3.dll] SysUtils.Exception.CreateFmt [ AIMP3.dll] SysUtils.CreateAVObject [KERNELBASE.dll] [ ntdll.dll] [ ntdll.dll] [ ntdll.dll] [ ntdll.dll] [ ntdll.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 62435 Current memory 48 FF 5B 00 6C 04 00 00 00 00 0F AF 40 F8 1C 00 00 00 00 00 84 04 00 00 62 00 24 F5 74 00 C0 7F 74 00 02 00 72 97 60 00 73 9D 5A 00 65 00 13 09 48 00 C0 02 00 00 20 00 1C 69 48 00 1C 69 48 00 1C 00 C1 4F E6 7F 00 00 00 00 00 00 ED 0B 5B 00 H ÿ [ . l . . . . . . ¯ @ ø . . . . . .  . . . b . $ õ t . À  t . . . r  ` . s  Z . e . . . H . À . . . . . i H . . i H . . H . . . . . . . . . . í . [ . dump of 256 bytes starting at pointer address 7FE64E30: 0B DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0 B9 9A 69 48 00 00 00 00 00 01 4D E6 7F 00 00 00 00 00 00 00 00 00 00 00 41 40 00 09 13 7F 00 37 72 5A 00 19 9C 60 00 A4 99 60 00 95 97 60 80 74 00 E9 03 78 00 27 7B 44 00 C0 02 00 00 19 9C 60 00 D5 97 60 F3 74 00 73 9D 5A 00 BF DA 72 00 50 08 73 00 A8 B2 5A 00 5D B8 5A 00 00 00 80 1A E7 7F C0 CB 52 08 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 48 00 1C 69 48 00 3F 34 AD F7 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ED F3 00 00 FA 71 5A 00 0F 9D 5A . ß  . . . . . . . . . . . . . . . . Ð ¹  i H . . . . . . M æ  . . . . . . . . . . . A @ . . .  . 7 r Z . .  ` . ¤  ` .   `  t . é . x . ' { D . À . . . .  ` . Õ  ` ó t . s  Z . ¿ Ú r . P . s . ¨ ² Z . ] ¸ Z . . .  . ç  À Ë R . ( f H . . i H . . i H i . . H Á . . O . . æ . i  . H . . i H . ? 4 . . . . . . í ó Z . .  Z ÷ . . . i ú q --------------------------------2013/9/5 21:57:55-------------------------------A memory block has been leaked. The size is: 68 This block was allocated by thread 0x780, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [00832EF5] [ AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line: 452) [007BABEE] [ AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037) [007BAC80] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050) [007BAD1E] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064) [007BA9B6] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983)
  • 10. [007BA987] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1] (Line: 972) [007BA39A] [ AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775) [00841110] [ AIMP3.dll] AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636) The block is currently used for an object of class: TAIMPBassFileInfoReader The allocation number is: 62396 Current memory 08 1D 83 00 00 00 00 00 00 00 00 00 00 00 00 00 26 A0 6C 75 1C 69 48 00 1C 00 00 00 00 00 08 0F 00 00 FA 00 B0 0B 61 00 23 16 61 00 A2 00 0D E4 5A 00 55 E3 5A 00 E3 00 80 D1 71 00 C0 02 00 00 36 00 1C 69 48 00 1C 69 48 00 1C 00 1C 69 48 00 . .  . . . . . . . . . . . . . & l u . i H . . . . . . . . . . . ú . ° . a . # . a . ¢ . . ä Z . U ã Z . ã .  Ñ q . À . . . 6 . . i H . . i H . . . . i H . dump of 256 bytes starting at pointer address 7FF8ED30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 69 48 00 1C 69 48 00 71 2A F9 7F 00 00 00 00 00 00 00 00 00 00 00 71 5A 00 67 DF 5A 00 0C D2 5A 00 2C 93 5D 00 E1 92 5D 00 0E 21 61 0E 61 00 10 0E 61 00 9A A5 61 00 C0 02 00 00 16 72 5A 00 F9 B9 5A 9D 5A 00 26 9D 5A 00 FD A3 5A 00 28 67 7F 00 6A A3 61 00 B8 A0 61 00 00 00 B0 04 02 00 D6 A4 3C 88 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i H . . i H . q * ù  . . . . . . . . . . . q Z . g ß Z . . Ò Z . ,  ] . á  ] . . ! a . a . . . a .  ¥ a . À . . . . r Z . ù ¹ Z  Z . &  Z . ý £ Z . ( g  . j £ a . ¸ . . . ° . . . Ö ¤ <  ( f H . . i H . . i H i H . . i H . . i H . . i H . . i H . . i H a --------------------------------2013/9/5 21:57:55-------------------------------This application has leaked memory. The small block leaks are (excluding expected leaks registered by pointer): 21 - 36 bytes: EAccessViolation x 4 53 - 68 bytes: TAIMPBassFileInfoReader x 1 181 - 212 bytes: UnicodeString x 4 Note: Memory leak detail is logged to a text file in the same folder as this application. To disable this memory leak check, undefine "EnableMemoryLeakReporting". --------------------------------2013/9/5 22:09:52-------------------------------A memory block has been leaked. The size is: 68 This block was allocated by thread 0xF8C, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem
  • 11. [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [00832EF5] [ AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line: 452) [007BABEE] [ AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037) [007BAC80] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050) [007BAD1E] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064) [007BA9B6] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983) [007BA987] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1] (Line: 972) [007BA39A] [ AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775) [00841110] [ AIMP3.dll] AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636) The block is currently used for an object of class: TAIMPBassFileInfoReader The allocation number is: 65769 Current memory 08 1D 83 00 00 00 00 00 00 00 00 00 00 00 00 00 21 A0 6C 75 1C 69 48 00 1C 00 00 00 00 00 1A 02 00 00 FA 00 3E 79 60 00 ED 7E 60 00 F5 00 55 E3 5A 00 55 E4 5A 00 85 00 5D B8 5A 00 A4 02 00 00 36 00 1C 69 48 00 1C 69 48 00 1C 00 1C 69 48 00 . . ƒ . . . . . . . . . . . . . ! l u . i H . . . . . . . . . . . ú . > y ` . í ~ ` . õ . U ã Z . U ä Z . ƒ . ] ¸ Z . ¤ . . . 6 . . i H . . i H . . . . i H . dump of 256 bytes starting at pointer address 7FF8CFF0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 69 48 00 00 00 00 00 F1 C8 F8 7F 00 00 00 00 00 00 00 00 00 00 00 71 5A 00 67 DF 5A 00 BC D4 5A 00 B9 15 5B 00 3B 16 5B 00 52 9C 5A 83 60 00 68 84 60 00 DC A5 87 00 A4 02 00 00 F9 B9 5A 00 0D E4 5A D7 60 00 43 7B 60 00 FD 7F 60 00 B7 85 60 00 D4 E3 61 00 A8 B2 5A 00 00 00 B0 04 02 00 54 7E 2A 88 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i H . . . . . ñ È ø ƒ . . . . . . . . . . . q Z . g ß Z . ¼ Ô Z . ¹ . [ . ; . [ . R ƒ Z ƒ ` . h ƒ ` . Ü ¥ ƒ . ¤ . . . ù ¹ Z . . ä Z × ` . C { ` . ý ƒ ` . · ƒ ` . Ô ã a . ¨ ² Z . . . ° . . . T ~ * ƒ ( f H . . i H . . i H i H . . i H . . i H . . i H . . i H . . i H --------------------------------2013/9/5 22:09:52-------------------------------A memory block has been leaked. The size is: 68 This block was allocated by thread 0xE20, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [00832EF5] [ AIMP3.dll] AIMPPluginsBASS.TAIMPBassFileInfoReader.Create (Line: 452)
  • 12. [007BABEE] [ AIMP3.dll] AIMPTagLibCore.CanProcessItem [+8] (Line: 1037) [007BAC80] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+7] (Line: 1050) [007BAD1E] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.Find [+1] (Line: 1064) [007BA9B6] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByCollection [+2] (Line: 983) [007BA987] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfo [+1] (Line: 972) [007BA39A] [ AIMP3.dll] AIMPTagLibCore.TagsGetFullInfo [+1] (Line: 775) [00841110] [ AIMP3.dll] AIMPPlaylistStorage.TAIMPPlaylistScanningThread.Execute [+11] (Line: 4636) The block is currently used for an object of class: TAIMPBassFileInfoReader The allocation number is: 65744 Current memory 08 1D 83 00 00 00 00 00 00 00 00 00 00 00 00 00 72 87 6C 75 1C 69 48 00 1C 00 00 00 00 00 EC 05 00 00 FA 00 A2 64 7E 00 43 8C 7E 00 E5 00 FD A3 5A 00 DD A0 61 00 73 77 F5 B3 9D 77 A4 02 00 00 44 00 1C 69 48 00 1C 69 48 00 1C 00 1C 69 48 00 . . ƒ . . . . . . . . . . . . . r ƒ l u . i H . . . . . . . ì . . . ú @ . ¢ d ~ C ƒ ~ . å . ý £ Z . Ý a . s w õ ³ ƒ w ¤ . . . D . . i H . . i H . . . . i H . dump of 256 bytes starting at pointer address 7FF8EB90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 69 48 00 1C 69 48 00 B1 20 F9 7F 00 00 00 00 00 00 00 00 00 00 00 71 5A 00 0F 9D 5A 00 B2 A3 5A 00 5B A0 61 00 80 3F 40 00 AD 3F 40 3B 41 00 D5 48 41 00 2A 3F 41 00 A4 02 00 00 16 72 5A 00 2D 9D 5A 9D 5A 00 59 DA 7E 00 A8 B2 5A 00 5D B8 5A 00 13 09 48 00 74 11 3E 00 00 00 94 52 7E 00 62 D6 4D 76 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i H . . i H . ± ù ƒ . . . . . . . . . . . q . ; Z . . ƒ Z . ² £ Z . [ a . ƒ ? @ . A . Õ H A . * ? A . ¤ . . . . r Z . - ƒ Z ƒ Z . Y Ú ~ . ¨ ² Z . ] ¸ Z . . . H . t . > . . . ƒ R ~ . b Ö M v ( f H . . i H . . i H i H . . i H . . i H . . i H . . i H . . i H ? --------------------------------2013/9/5 22:09:52-------------------------------This application has leaked memory. The small block leaks are (excluding expected leaks registered by pointer): 53 - 68 bytes: TAIMPBassFileInfoReader x 2 Note: Memory leak detail is logged to a text file in the same folder as this application. To disable this memory leak check, undefine "EnableMemoryLeakReporting". --------------------------------2013/9/5 22:14:10-------------------------------FastMM has detected an attempt to use an interface of a freed object. An access violation will now be raised in order to abort the current operation.
  • 13. The current thread ID is 0xB48, and the stack trace (return addresses) leading to this error is: [005B0B5E] [ AIMP3.dll] System.@IntfClear [007BAB59] [ AIMP3.dll] AIMPTagLibCore.TAIMPTagsManager.GetFileInfoByRepository [+19] (Line: 1023) [005AAE8B] [ AIMP3.dll] System.@HandleFinally [779C65F8] [ ntdll.dll] [779C65CA] [ ntdll.dll] [779A9011] [ ntdll.dll] [779DE011] [ ntdll.dll] [00AB9DD9] [FastMM_FullDebugMode.dll] [00402FAE] [ AIMP3.exe] FastMM4.CalculateHeaderCheckSum [779DE48B] [ ntdll.dll] [00AB9DD9] [FastMM_FullDebugMode.dll] --------------------------------2013/9/5 22:14:12-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString [005AD20B] [ AIMP3.dll] System.@UStrFromPWCharLen [005C9477] [ AIMP3.dll] SysUtils.FmtStr [773E0811] [KERNEL32.dll] [773E081E] [KERNEL32.dll] [75C7707C] [KERNELBASE.dll] [75C770B6] [KERNELBASE.dll] [7732A0CE] [ SHLWAPI.dll] [7732A76C] [ SHLWAPI.dll] [77324997] [ SHLWAPI.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 61185 Current memory B0 04 02 00 01 00 69 00 6F 00 6C 00 61 00 74 00 65 00 73 00 73 00 20 00 37 00 6D 00 6F 00 64 00 75 00 6C 00 53 00 45 00 2E 00 64 00 6C 00 66 00 20 00 61 00 64 00 64 00 30 00 30 00 00 00 53 3A C6 00 A1 0D DF 7F 00 00 00 00 00 00 B2 A3 5A 00 ° . . . . . i . o . l . a . t . e . s . s . . 7 . m . o . d . u . l . S . E . . . d . l dump of 256 bytes starting at pointer address 7FDF0A00: 00 00 00 5A 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 35 00 43 00 37 00 39 00 36 00 31 00 37 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 4B 00 45 00 52 00 4E 00 45 00 4C 00 42 00 41 00 6C 00 27 00 2E 00 20 00 57 00 72 00 69 00 74 00 65 00 20 00 6F 00 72 00 65 00 73 00 73 00 20 00 30 00 30 00 30 00 30 00 30 00 30 39 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 B4 2D 00 00 FA 71 5A 00 0F 9D 5A . . . Z . . . . i . o . n . . 5 . C . 7 . . e . . ' . . l . . . . ' A . c . c . e . s . s . . a . t . 9 . 6 . 1 . 7 . K . E . R . N . . W . r . i . . v . a . d . d . r . i . n . E . L . B . A t . e . . o
  • 14. . a . . . . . f . 0 . ¡ . ² . d . S . . £ . 0 : ß . Z . d . Æ ƒ . . . r . e . s . s . 9 H . . i H . . i . . . . . . . . . . 0 . 0 . 0 . 0 . 0 . 0 H . . i H . . i H . . . . . . ´ - . . ú q Z . . ƒ Z --------------------------------2013/9/5 22:14:12-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString [005AD20B] [ AIMP3.dll] System.@UStrFromPWCharLen [005C9477] [ AIMP3.dll] SysUtils.FmtStr [773E0FED] [KERNEL32.dll] [773DC080] [KERNEL32.dll] [779DBD4C] [ ntdll.dll] [779DBD4C] [ ntdll.dll] [779DBD6F] [ ntdll.dll] [779DC806] [ ntdll.dll] [779DC7F6] [ ntdll.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 61026 Current memory B0 04 02 00 01 00 69 00 6F 00 6C 00 61 00 74 00 65 00 73 00 73 00 20 00 30 00 6D 00 6F 00 64 00 75 00 6C 00 6C 00 27 00 2E 00 20 00 52 00 65 00 73 00 73 00 20 00 30 00 1C 69 48 00 1C 69 48 00 1C 00 A0 06 DF 7F 00 00 00 00 00 00 0C D2 5A 00 ° . . . . . i . o . l . a . t . e . s . s . . 0 . m . o . d . u . l . l . ' . . . . R . e . s . s . . 0 . . i H . . i H . . . . ß ƒ . . . . . . . Ò Z . dump of 256 bytes starting at pointer address 7FDF0F80: 00 00 00 54 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 30 00 35 00 41 00 39 00 44 00 36 00 45 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 41 00 49 00 4D 00 50 00 33 00 2E 00 64 00 6C 00 65 00 61 00 64 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 72 00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 D1 CA F7 34 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 A4 3E 40 00 00 00 00 00 5C EE 00 00 FA 71 5A 00 67 DF 5A . . . T . . . . i . o . n . . 0 . 5 . A . . e . . ' . . e . a . d . . 0 . 0 . 0 . i H . . i H . . . ¤ > @ A . c . c . e . s . s . . v . a . t . . a . d . d . r 9 . D . 6 . E . . i . n . A . I . M . P . 3 . . . d . l . o . f . . a . d . d . r 0 . 0 . 1 . C . . . Ñ Ê ÷ 4 H . . i H . . i H . . i H . . . . . . . . . î . . ú q Z . g ß Z
  • 15. --------------------------------2013/9/5 22:14:12-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString [005AD20B] [ AIMP3.dll] System.@UStrFromPWCharLen [005C9477] [ AIMP3.dll] SysUtils.FmtStr [773E0FED] [KERNEL32.dll] [773DC080] [KERNEL32.dll] [779DBD4C] [ ntdll.dll] [779DBD4C] [ ntdll.dll] [779DBD6F] [ ntdll.dll] [779DC806] [ ntdll.dll] [779DC7F6] [ ntdll.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 61020 Current memory B0 04 02 00 01 00 69 00 6F 00 6C 00 61 00 74 00 65 00 73 00 73 00 20 00 30 00 6D 00 6F 00 64 00 75 00 6C 00 6C 00 27 00 2E 00 20 00 52 00 65 00 73 00 73 00 20 00 36 00 1C 69 48 00 1C 69 48 00 1C 00 A1 18 DF 7F 00 00 00 00 00 00 B2 A3 5A 00 ° . . . . . i . o . l . a . t . e . s . s . . 0 . m . o . d . u . l . l . ' . . . . R . e . s . s . . 6 . . i H . . i H . . . ¡ . ß ƒ . . . . . . ² £ Z . dump of 256 bytes starting at pointer address 7FDF10E0: 00 00 00 54 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 30 00 35 00 42 00 30 00 42 00 35 00 43 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 41 00 49 00 4D 00 50 00 33 00 2E 00 64 00 6C 00 65 00 61 00 64 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 72 00 39 00 46 00 31 00 36 00 35 00 42 00 34 00 00 00 01 13 33 35 48 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D4 8A 00 00 FA 71 5A 00 0F 9D 5A . . . T . . . . i . o . n . . 0 . 5 . B . . e . . ' . . e . a . d . . 9 . F . 1 . i H . . i H . . . . . . A . c . c . e . s . s . . v . a . t . . a . d . d . r 0 . B . 5 . C . . i . n . A . I . M . P . 3 . . . d . l . o . f . . a . d . d . r 6 . 5 . B . 4 . . . . . 3 5 H . . i H . . i H . . i H . . . . . . . . . Ô ƒ . . ú q Z . . ƒ Z --------------------------------2013/9/5 22:14:12-------------------------------A memory block has been leaked. The size is: 212 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005ADF66] [ AIMP3.dll] System.@NewUnicodeString
  • 16. [005AD20B] [005C9477] [779D346F] [779D349E] [779D8A8F] [779D6D0D] [779D7407] [779D6F24] [779D6F9C] [ [ [ [ [ [ [ [ [ AIMP3.dll] System.@UStrFromPWCharLen AIMP3.dll] SysUtils.FmtStr ntdll.dll] ntdll.dll] ntdll.dll] ntdll.dll] ntdll.dll] ntdll.dll] ntdll.dll] The block is currently used for an object of class: UnicodeString The allocation number is: 61014 Current memory B0 04 02 00 01 00 69 00 6F 00 6C 00 61 00 74 00 65 00 73 00 73 00 20 00 37 00 6D 00 6F 00 64 00 75 00 6C 00 6C 00 27 00 2E 00 20 00 57 00 72 00 65 00 73 00 73 00 20 33 1C 69 48 00 1C 69 48 00 1C 00 81 14 DF 7F 00 00 00 00 00 00 37 72 5A 00 ° . . . . . i . o . l . a . t . e . s . s . . 7 . m . o . d . u . l . l . ' . . . . W . r . e . s . s . 3 . i H . . i H . . .  . ß  . . . . . . 7 r Z . dump of 256 bytes starting at pointer address 7FDF17C0: 00 00 00 55 00 00 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 76 00 69 00 6F 00 6E 00 20 00 61 00 74 00 20 00 61 00 64 00 64 00 72 00 37 00 39 00 43 00 36 00 42 00 39 00 30 00 20 00 69 00 6E 00 20 00 65 00 20 00 27 00 6E 00 74 00 64 00 6C 00 6C 00 2E 00 64 00 6C 00 72 00 69 00 74 00 65 00 20 00 6F 00 66 00 20 00 61 00 64 00 64 00 30 00 30 00 30 00 30 00 30 00 30 00 31 00 43 00 00 00 B1 B3 E5 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 EB 00 00 62 41 40 00 D9 40 40 . . . U . . . . i . o . n . . 7 . 9 . C . . e . . ' . r . i . . 0 . 0 i H . . . . A . c . c . e . s . s . . v . a . t . . a . d . d . r 6 . B . 9 . 0 . . i . n . . n . t . d . l . . . . d . l t . e . . o . f . . a . d . d . 0 . 0 . 0 . 0 . 1 . C . . . ± ³ å . i H . . i H . . i H . . i H . . . . . . . . . . . . 9 ë . . b A @ . Ù @ @ l --------------------------------2013/9/5 22:14:13-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [005D10CF] [ AIMP3.dll] SysUtils.Exception.CreateFmt [005D1CAB] [ AIMP3.dll] SysUtils.CreateAVObject [779D3192] [ ntdll.dll] [779D316E] [ ntdll.dll] [779A8E17] [ ntdll.dll] [005D1DAA] [ AIMP3.dll] SysUtils.GetExceptionObject [005AABB0] [ AIMP3.dll] System.@HandleAnyException
  • 17. [779C65F8] [ ntdll.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 61010 Current memory 48 FF 5B 00 CC 04 00 00 00 00 89 4E 0D 9A 1C 00 00 00 00 00 5B EE 00 00 FA 00 B1 AB 5A 00 F9 65 9C 77 CB 00 32 1D 5D 00 93 31 9D 77 6F 77 3D 8D 9A 77 48 0B 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 EC DF 7F 00 00 00 00 00 00 B2 A3 5A 00 H ÿ [ . Ì . . . . .  N .  . . . . . . [ î . . ú . ± « Z . ù e  w Ë . 2 . ] .  1  w o w =   w H . . . . . . . . . . . . . . . ì ß  . . . . . . ² £ Z . dump of 256 bytes starting at pointer address 7FE05D60: 17 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 FA 9E 69 48 00 00 00 00 00 00 EC DF 7F 00 00 00 00 00 00 00 00 A4 3E 40 71 5A 00 0F 9D 5A 00 B2 A3 5A 00 D0 10 5D 00 AC 1C 5D 00 AB 1D 5D 65 9C 77 3D 8D 9A 77 57 64 9C 77 48 0B 00 00 16 72 5A 00 22 BA 5A 31 9D 77 18 8E 9A 77 AB 1D 5D 00 B1 AB 5A 00 F9 65 9C 77 CB 65 9C 00 00 00 B0 04 02 00 BB 69 87 30 48 FF 5B 00 EC 10 DF 7F 00 00 00 00 00 00 4C F2 9E 04 00 00 00 00 44 96 78 CF 1C 69 48 00 00 00 00 00 00 00 A4 3E 40 00 00 00 00 00 61 EE 00 00 FA 71 5A 00 0F 9D 5A . ß  . . . . . . . . . . . . . . . .  ú  i H . . . . . . ì ß  . . . . . . . . ¤ > @ q Z . .  Z . ² £ Z . Ð . ] . ¬ . ] . « . ] e  w =   w W d  w H . . . . r Z . " º Z 1  w .   w « . ] . ± « Z . ù e  w Ë e  . . . ° . . . » i  0 H ÿ [ . ì . ß  . . . . . . L ò  . . . . . D  x Ï . i H . . . . . . . ¤ > @ . . . . . a î . . ú q Z . .  Z --------------------------------2013/9/5 22:14:13-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [005D10CF] [ AIMP3.dll] SysUtils.Exception.CreateFmt [005D1CAB] [ AIMP3.dll] SysUtils.CreateAVObject [005D1DAA] [ AIMP3.dll] SysUtils.GetExceptionObject [005AABB0] [ AIMP3.dll] System.@HandleAnyException [779C65F8] [ ntdll.dll] [779C65CA] [ ntdll.dll] [779A8D3C] [ ntdll.dll] [779C6456] [ ntdll.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 61019 Current memory dump of 256 bytes starting at pointer address 7FE05E10: 48 FF 5B 00 EC 10 DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4C F2 9E
  • 18. 04 44 00 61 77 73 00 E3 00 8C 00 00 00 00 00 H . D . a w s . ã .  . . . . . 00 96 00 EE C1 DC 0B 4F 3B 04 00 00 00 00 00 ÿ .  . î Á Ü . O ; . . . . . . 00 78 00 00 DC 9D 6D 80 A1 00 00 00 00 00 00 [ . x . . Ü  m  ¡ . . . . . . 00 CF 00 00 9D 77 70 00 70 00 00 00 00 00 00 . . Ï . .  w p . p . . . . . . 00 1C 00 FA 77 41 00 5F 00 20 00 00 00 00 00 ì . . . ú w A . _ . . . . . . 69 48 00 00 00 00 00 00 EC DF 7F 00 00 00 00 00 00 00 00 A4 3E 40 71 5A 00 0F 9D 5A 00 B2 A3 5A 00 D0 10 5D 00 AC 1C 5D 00 46 DA 9D 2B 9F 77 31 DB 9D 77 12 E0 9D 77 48 0B 00 00 16 72 5A 00 F9 B9 5A 6D 70 00 CB 63 70 00 9D 64 70 00 CE 6D 70 00 97 9F 5A 00 65 A1 70 00 00 00 B0 04 02 00 E7 68 45 54 48 FF 5B 00 8C 0F DF 7F 00 00 00 00 00 00 30 EA 9E 04 00 00 00 00 18 97 BA AB 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 . ß  . . . . . . . . . . . . . . . . L ò  i H . . . . . . ì ß  . . . . . . . . ¤ > @ q Z . .  Z . ² £ Z . Ð . ] . ¬ . ] . F Ú  +  w 1 Û  w . à  w H . . . . r Z . ù ¹ Z m p . Ë c p .  d p . Î m p .   Z . e ¡ p . . . ° . . . ç h E T H ÿ [ .  . ß  . . . . . . 0 ê  . . . . . .  º « . i H . . . . . . . . . . . . . . . . . . . . . . . . . . --------------------------------2013/9/5 22:14:13-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [005D10CF] [ AIMP3.dll] SysUtils.Exception.CreateFmt [005D1CAB] [ AIMP3.dll] SysUtils.CreateAVObject [779DDA45] [ ntdll.dll] [779DDCC0] [ ntdll.dll] [779DDC72] [ ntdll.dll] [779F2B40] [ ntdll.dll] [779DDB30] [ ntdll.dll] [779DE011] [ ntdll.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 61025 Current memory 48 FF 5B 00 8C 04 00 00 00 00 18 97 BA AB 1C 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7F 00 00 00 00 00 00 00 00 90 dump of 256 bytes starting at pointer address 7FE05EC0: 0F DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 EA 9E 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 73 00 00 D8 12 48 00 70 A5 F9 7F 10 AE E0 45 E1 7F 00 00 00 00 31 61 E0 7F 00 00 00 00 00 00 00 00 00 00 00
  • 19. 00 8C 00 D3 00 73 00 H . . . . . .  . .  . Ó . s . 00 26 B9 6A 72 9D 1B ÿ .  . . . . . . . & ¹ j r  . 00 00 97 7F 97 5A 48 [ . º . . . . . . . .    Z H 00 00 60 00 60 00 80 . . « . . . . . . . . ` . ` .  00 69 00 C6 00 03 00  . . . . . . .  . i . Æ . . . 72 5A 00 19 9C 60 00 A4 99 60 00 95 97 60 00 6B A1 61 00 73 C0 65 47 80 00 C0 09 61 00 F1 0B 61 00 8C 04 00 00 19 9C 60 00 D5 97 60 A4 61 00 1F A4 61 00 83 C0 65 00 3C 98 60 00 6A 9B 60 00 0C 6B 7F . ß  . . . . . . . . . . . . . . . . 0 ê  i H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 s . . Ø . H . p ¥ ù  . ® à E á  . . . . 1 a à  . . . . . . . . . . . r Z . .  ` . ¤  ` .   ` . k ¡ a . s À e G  . À . a . ñ . a .  . . . .  ` . Õ  ` ¤ a . . ¤ a .  À e . <  ` . j  ` . . k  --------------------------------2013/9/5 22:14:13-------------------------------A memory block has been leaked. The size is: 36 This block was allocated by thread 0xB48, and the stack trace (return addresses) at the time was: [005A71F9] [ AIMP3.dll] System.@GetMem [005A9D0E] [ AIMP3.dll] System.TObject.NewInstance [005AA3B1] [ AIMP3.dll] System.@ClassCreate [005D10CF] [ AIMP3.dll] SysUtils.Exception.CreateFmt [005D1CAB] [ AIMP3.dll] SysUtils.CreateAVObject [75C79616] [KERNELBASE.dll] [779D346F] [ ntdll.dll] [779D349E] [ ntdll.dll] [779D349E] [ ntdll.dll] [779D6FBB] [ ntdll.dll] [779D6D0D] [ ntdll.dll] The block is currently used for an object of class: EAccessViolation The allocation number is: 61184 Current memory 48 FF 5B 00 0C 04 00 00 00 00 00 30 03 AE 1C 00 00 00 00 00 84 04 00 00 62 00 24 F5 74 00 C0 7F 74 00 02 00 72 97 60 00 73 9D 5A 00 65 00 13 09 48 00 8C 04 00 00 20 00 1C 69 48 00 1C 69 48 00 1C 00 91 49 E6 7F 00 00 00 00 00 00 0C D2 5A 00 H ÿ [ . . dump of 256 bytes starting at pointer address 7FE64E30: 0A DF 7F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 DC CD 9E 69 48 00 00 00 00 00 01 4D E6 7F 00 00 00 00 00 00 00 00 00 00 00 41 40 00 09 13 7F 00 37 72 5A 00 19 9C 60 00 A4 99 60 00 95 97 60 80 74 00 E9 03 78 00 27 7B 44 00 8C 04 00 00 19 9C 60 00 D5 97 60 F3 74 00 73 9D 5A 00 BF DA 72 00 50 08 73 00 A8 B2 5A 00 5D B8 5A 00 00 00 80 1A E7 7F 58 CF 52 08 28 66 48 00 1C 69 48 00 1C 69 48 69 48 00 1C 69 48 00 1C 69 48 00 A7 30 AD F7 1C 69 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 0B 00 00 FA 71 5A 00 67 DF 5A . ß  . . . . . . . . . . . . . . . . Ü Í 
  • 20. . . .  . À . s .  . . H . . . 0 . . $  r  . . . i . . . . . . . õ t  Z . . i H . . Ò . ® . . t . ` . H . H . . . Z . . . b . . . e . . . . . . i H . . . . . . M æ  . . . . . . . . . . . A @ . . .  . 7 r Z . .  ` . ¤  ` .   `  t . é . x . ' { D .  . . . .  ` . Õ  ` ó t . s  Z . ¿ Ú r . P . s . ¨ ² Z . ] ¸ Z . . .  . ç  X Ï R . ( f H . . i H . . i H i . . H  . . I . . æ . i  . H . . i H . § 0 . . . . . . a . Z . g ß Z ÷ . . . i ú q --------------------------------2013/9/5 22:14:13-------------------------------This application has leaked memory. The small block leaks are (excluding expected leaks registered by pointer): 21 - 36 bytes: EAccessViolation x 4 181 - 212 bytes: UnicodeString x 4 Note: Memory leak detail is logged to a text file in the same folder as this application. To disable this memory leak check, undefine "EnableMemoryLeakReporting".