访问侵犯问题

来源:互联网 发布:如何做好淘宝直通车 编辑:程序博客网 时间:2024/05/01 00:15

用VC编程运行后出现访问侵犯的错误,不知如何解决,大虾帮忙一下。


发生应用程序意外错误:
        应用程序:  (pid=604)
        时间: 2007-10-26 @ 11:24:41.437
        意外情况编号: c0000005 (访问侵犯)

*----> 系统信息 <----*
        计算机名: TAMER1
        用户名: NO1
        处理器数量: 1
        处理器类型: x86 Family 15 Model 15 Stepping 2
        Windows 2000 版本: 5.0
        当前内部版本号: 2195
        Service Pack: 4
        当前类型: Uniprocessor Free
        注册的单位:
        注册的所有者: NO1

*----> 任务列表 <----*
   0 Idle.exe
   8 System.exe
 196 smss.exe
 224 csrss.exe
 220 winlogon.exe
 272 services.exe
 284 lsass.exe
 456 svchost.exe
 492 spoolsv.exe
 524 svchost.exe
 552 nvsvc32.exe
 600 regsvc.exe
 652 MSTask.exe
 688 WinMgmt.exe
 744 svchost.exe
 920 Explorer.exe
1108 RUNDLL32.exe
1132 RTHDCPL.exe
1160 internat.exe
1176 Monitor.exe
 604 PegasusSenior.exe
1048 Pegasus.exe
 904 wuauclt.exe
 856 rundll32.exe
 732 rundll32.exe
 460 rundll32.exe
 868 rundll32.exe
 464 rundll32.exe
 624 drwtsn32.exe
   0 _Total.exe

(00400000 - 00452000)
(77F80000 - 77FFD000)
(6BC40000 - 6BD3B000)
(78000000 - 78045000)
(77E60000 - 77F37000)
(77F40000 - 77F7E000)
(77DF0000 - 77E55000)
(74FD0000 - 74FDA000)
(74FB0000 - 74FC4000)
(796D0000 - 79732000)
(786F0000 - 78761000)
(74FA0000 - 74FA8000)
(75E00000 - 75E1A000)
(6BC20000 - 6BC2D000)
(77800000 - 7780C000)
(77960000 - 77984000)
(77300000 - 77313000)
(774E0000 - 774E5000)
(772E0000 - 772F7000)
(750E0000 - 750EF000)
(75100000 - 7514F000)
(797B0000 - 797BF000)
(75150000 - 75156000)
(77930000 - 7795A000)
(77A30000 - 77B1F000)
(77990000 - 77A2B000)
(77370000 - 7739F000)
(77340000 - 77363000)
(777F0000 - 777FE000)
(6D990000 - 6DA3C000)
(794D0000 - 79531000)
(774A0000 - 774D3000)
(77480000 - 77491000)
(774F0000 - 77512000)
(71710000 - 71794000)
(70A70000 - 70AD5000)
(77320000 - 77339000)
(777A0000 - 777A8000)
(777B0000 - 777B5000)
(74F50000 - 74F6E000)
(74F90000 - 74F97000)
(6DD30000 - 6DD36000)

线程 ID 0x428 的状态转储

eax=00000113 ebx=0040c190 ecx=0012fdd4 edx=6bd1d660 esi=0012faf8 edi=0012faf8
eip=6bc8d263 esp=0012fa90 ebp=0012faa4 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000202


函数: Ordinal3093
        6bc8d243 8b4138           mov     eax,[ecx+0x38]         ds:00c89cba=????????
        6bc8d246 85c0             test    eax,eax
        6bc8d248 7515             jnz     Ordinal4485+0x18c (6bc9d15f)
        6bc8d24a ff742404         push    dword ptr [esp+0x4]    ss:00c89977=????????
        6bc8d24e ff7120           push    dword ptr [ecx+0x20]   ds:00c89cba=????????
        6bc8d251 ff1598d5cd6b                                    ds:6bcdd598=77df588a
                                  call    dword ptr [Ordinal6437+0x94ec (6bcdd598)]
        6bc8d257 8b4c2408         mov     ecx,[esp+0x8]          ss:00c89977=????????
        6bc8d25b 8901             mov     [ecx],eax              ds:0012fdd4=0040f3b8
        6bc8d25d eb0f             jmp     Ordinal4485+0x19b (6bc9d16e)
        6bc8d25f ff742408         push    dword ptr [esp+0x8]    ss:00c89977=????????
错误 ->6bc8d263 8b10             mov     edx,[eax]              ds:00000113=????????
        6bc8d265 8bc8             mov     ecx,eax
        6bc8d267 ff742408         push    dword ptr [esp+0x8]    ss:00c89977=????????
        6bc8d26b ff5274           call    dword ptr [edx+0x74]   ds:6c877546=????????
        6bc8d26e c20800           ret     0x8

*----> 堆栈反向跟踪 <---*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012FAA4 6BC9BE26 0000044D 0012FDD4 6BC9C126 0000044D !Ordinal3093
0012FAC4 00407CE7 0012FAF8 0000044D 0012FE3C 00133D60 !Ordinal5272
0012FB24 0040C19D 00000000 0012FBC8 00000000 DCBAABCD !<nosymbols>
0012FDD4 00000001 00000000 00000000 00000000 00000001 !<nosymbols>

*----> 原始堆栈转储 <----*
0012fa90  ac fa 12 00 46 be c9 6b - 4d 04 00 00 ac fa 12 00  ....F..kM.......
0012faa0  f8 fa 12 00 c4 fa 12 00 - 26 be c9 6b 4d 04 00 00  ........&..kM...
0012fab0  d4 fd 12 00 26 c1 c9 6b - 4d 04 00 00 f8 fa 12 00  ....&..kM.......
0012fac0  d4 fd 12 00 24 fb 12 00 - e7 7c 40 00 f8 fa 12 00  ....$....|@.....
0012fad0  4d 04 00 00 3c fe 12 00 - 60 3d 13 00 d4 fd 12 00  M...<...`=......
0012fae0  a8 af c8 6b f8 fa 12 00 - d4 fd 12 00 00 00 00 00  ...k............
0012faf0  90 c1 40 00 02 00 00 00 - 01 00 00 00 d4 fd 12 00  ..@.............
0012fb00  00 00 00 00 56 00 01 01 - c8 e7 13 00 00 00 00 00  ....V...........
0012fb10  60 3d 13 00 e8 fa 12 00 - bc fb 12 00 00 4a cd 6b  `=...........J.k
0012fb20  00 00 00 00 d4 fd 12 00 - 9d c1 40 00 00 00 00 00  ..........@.....
0012fb30  c8 fb 12 00 00 00 00 00 - cd ab ba dc 12 34 cb 6b  .............4.k
0012fb40  60 d6 d1 6b d4 fd 12 00 - 36 34 cb 6b 94 9e c8 6b  `..k....64.k...k
0012fb50  00 00 00 00 00 00 00 00 - d4 fd 12 00 d4 fd 12 00  ................
0012fb60  60 3d 13 00 56 00 01 01 - 01 00 00 00 2f 05 0a 09  `=..V......./...
0012fb70  a4 fb 12 00 00 00 00 00 - b0 fb 12 00 2a 37 e0 77  ............*7.w
0012fb80  d8 01 03 00 6a 03 00 00 - 00 00 00 00 00 00 00 00  ....j...........
0012fb90  01 00 00 00 f0 1e df 77 - d8 01 03 00 6a 03 00 00  .......w....j...
0012fba0  00 00 00 00 00 00 00 00 - 09 37 e0 77 cd ab ba dc  .........7.w....
0012fbb0  d4 fb 12 00 38 ea 40 00 - 00 00 00 00 3c fc 12 00  ....8.@.....<...
0012fbc0  e0 49 cd 6b ff ff ff ff - e8 fb 12 00 d5 99 c8 6b  .I.k...........k

线程 ID 0x384 的状态转储

eax=777f21fe ebx=00000004 ecx=0012ed64 edx=00000000 esi=77f82873 edi=00000004
eip=77f8287e esp=00e4fd24 ebp=00e4fd70 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


函数: NtWaitForMultipleObjects
        77f82873 b8e9000000       mov     eax,0xe9
        77f82878 8d542404         lea     edx,[esp+0x4]          ss:019a9c0b=????????
        77f8287c cd2e             int     2e
        77f8287e c21400           ret     0x14

*----> 堆栈反向跟踪 <---*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00E4FD70 77E68F0D 00E4FD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects
00E4FFB4 77E6438B 00000005 000B000A 79725107 00150C40 kernel32!WaitForMultipleObjects
00E4FFEC 00000000 777F21FE 00150C40 00000000 000000C8 kernel32!TlsSetValue

*----> 原始堆栈转储 <----*
00e4fd24  23 3c e6 77 04 00 00 00 - 48 fd e4 00 01 00 00 00  #<.w....H.......
00e4fd34  00 00 00 00 00 00 00 00 - 01 00 00 00 40 0c 15 00  ............@...
00e4fd44  01 00 00 00 94 00 00 00 - 98 00 00 00 a8 00 00 00  ................
00e4fd54  10 01 00 00 84 10 46 80 - 00 29 40 80 ff ff ff ff  ......F..)@.....
00e4fd64  d0 fa d2 bb 5e 1a 45 80 - f0 7d 51 f8 b4 ff e4 00  ....^.E..}Q.....
00e4fd74  0d 8f e6 77 48 fd e4 00 - 01 00 00 00 00 00 00 00  ...wH...........
00e4fd84  00 00 00 00 00 00 00 00 - b2 22 7f 77 04 00 00 00  .........".w....
00e4fd94  b0 fe e4 00 00 00 00 00 - ff ff ff ff 40 0c 15 00  ............@...
00e4fda4  07 51 72 79 0a 00 0b 00 - 34 66 db f7 10 fb d2 bb  .Qry....4f......
00e4fdb4  d8 7d 51 f8 00 00 00 00 - 01 00 00 00 38 00 00 00  .}Q.........8...
00e4fdc4  23 00 00 00 23 00 00 00 - 0a 00 0b 00 07 51 72 79  #...#........Qry
00e4fdd4  40 0c 15 00 ff ff ff ff - 64 ed 12 00 fe 21 7f 77  @.......d....!.w
00e4fde4  f8 eb fd 7f 33 43 e6 77 - 1b 00 00 00 00 02 00 00  ....3C.w........
00e4fdf4  fc ff e4 00 23 00 00 00 - 0c fb d2 bb 05 00 00 00  ....#...........
00e4fe04  51 f5 40 80 98 00 00 00 - f8 00 00 00 98 00 00 00  Q.@.............
00e4fe14  00 fb d2 bb 05 00 00 00 - 24 f0 00 e1 05 00 00 00  ........$.......
00e4fe24  fe ff f8 00 b8 66 db f7 - 34 00 00 c0 e8 5b 5a e1  .....f..4....[Z.
00e4fe34  02 00 00 00 49 03 00 00 - e8 5b 5a e1 5c fb d2 bb  ....I....[Z./...
00e4fe44  10 e8 57 f8 b4 fb d2 bb - 5e 1a 45 80 08 20 01 e1  ..W.....^.E.. ..
00e4fe54  e0 a9 57 f8 a0 db 46 80 - a8 e7 57 f8 b0 fc d2 bb  ..W...F...W.....

线程 ID 0x478 的状态转储

eax=00000002 ebx=77f82865 ecx=00139f10 edx=00000000 esi=00000000 edi=00000001
eip=77f82870 esp=00f5fda4 ebp=00f5fddc iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000286


函数: NtWaitForSingleObject
        77f82865 b8ea000000       mov     eax,0xea
        77f8286a 8d542404         lea     edx,[esp+0x4]          ss:01ab9c8b=????????
        77f8286e cd2e             int     2e
        77f82870 c20c00           ret     0xc

*----> 堆栈反向跟踪 <---*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00F5FDDC 74F59E80 00000148 0000011C 00000002 00000006 ntdll!NtWaitForSingleObject
00F5FE64 74FBA421 0000011C 00F5FED4 00000001 00F5FEEC msafd!StartWsdpService
00F5FEA8 74FD1053 0000011C 00F5FED4 00000001 00F5FEEC ws2_32!WSARecvFrom
00F5FEDC 0040775B 0000011C 00000000 000005BE 00000000 wsock32!recvfrom
00F5FF7C 780085BC 0012FAC8 001368D8 74F6A380 00343DA8 !<nosymbols>
00F5FFB4 77E6438B 00343DA8 001368D8 74F6A380 00343DA8 !endthreadex
00F5FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!TlsSetValue

线程 ID 0x100 的状态转储

eax=00000000 ebx=00000000 ecx=000000c0 edx=00000000 esi=77f82826 edi=0105fee0
eip=77f82831 esp=0105fecc ebp=0105fee8 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000202


函数: NtDelayExecution
        77f82826 b832000000       mov     eax,0x32
        77f8282b 8d542404         lea     edx,[esp+0x4]          ss:01bb9db3=????????
        77f8282f cd2e             int     2e
        77f82831 c20800           ret     0x8
        77f82834 53               push    ebx
        77f82835 51               push    ecx
        77f82836 6a00             push    0x0
        77f82838 c70701000000     mov     dword ptr [edi],0x1    ds:0105fee0=ff676980
        77f8283e ff750c           push    dword ptr [ebp+0xc]    ss:01bb9dce=????????
        77f82841 50               push    eax
        77f82842 e879fdffff       call    RtlMultiByteToUnicodeN (77f825c0)
        77f82847 e928fcffff       jmp  RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)

*----> 堆栈反向跟踪 <---*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0105FEE8 77E63A22 000003E8 00000000 004079A5 000003E8 ntdll!NtDelayExecution
77DF612C 0C7D8B57 452DC78B 0F000001 02BCA884 48E88300 kernel32!Sleep
56EC8B55 00000000 00000000 00000000 00000000 00000000 <nosymbols>

*----> 原始堆栈转储 <----*
0105fecc  4e 3a e6 77 00 00 00 00 - e0 fe 05 01 d4 9d 43 00  N:.w..........C.
0105fedc  08 00 00 00 80 69 67 ff - ff ff ff ff 2c 61 df 77  .....ig.....,a.w
0105feec  22 3a e6 77 e8 03 00 00 - 00 00 00 00 a5 79 40 00  ":.w.........y@.
0105fefc  e8 03 00 00 c8 fa 12 00 - 30 3e 34 00 7c ff 05 01  ........0>4.|...
0105ff0c  34 01 00 00 29 de c8 6b - 00 00 00 00 d8 68 13 00  4...)..k.....h..
0105ff1c  a8 3e 34 00 a8 3e 34 00 - 01 00 00 00 00 e6 cd 6b  .>4..>4........k
0105ff2c  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0105ff3c  01 00 00 00 00 00 00 00 - d8 41 13 00 00 00 00 00  .........A......
0105ff4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0105ff5c  00 00 00 00 00 00 00 00 - 00 00 00 00 30 3e 34 00  ............0>4.
0105ff6c  18 ff 05 01 a4 ff 05 01 - ac 63 cd 6b 00 00 00 00  .........c.k....
0105ff7c  b4 ff 05 01 bc 85 00 78 - c8 fa 12 00 d8 68 13 00  .......x.....h..
0105ff8c  80 a3 f6 74 a8 3e 34 00 - fb 12 43 80 00 88 d4 f7  ...t.>4...C.....
0105ff9c  88 ff 05 01 ff ff ff ff - dc ff 05 01 6a bd 00 78  ............j..x
0105ffac  20 2f 03 78 00 00 00 00 - ec ff 05 01 8b 43 e6 77   /.x.........C.w
0105ffbc  a8 3e 34 00 d8 68 13 00 - 80 a3 f6 74 a8 3e 34 00  .>4..h.....t.>4.
0105ffcc  00 b0 fd 7f 00 00 13 00 - c0 ff 05 01 00 00 13 00  ................
0105ffdc  ff ff ff ff 97 e5 e6 77 - a8 a0 e6 77 00 00 00 00  .......w...w....
0105ffec  00 00 00 00 00 00 00 00 - 32 85 00 78 a8 3e 34 00  ........2..x.>4.
0105fffc  00 00 00 00 00 00 d3 6d - 01 00 00 00 8a 00 02 00  .......m........

线程 ID 0x474 的状态转储

eax=00000000 ebx=77df612c ecx=00520650 edx=00000000 esi=77f82826 edi=0116fee0
eip=77f82831 esp=0116fecc ebp=0116fee8 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000202


函数: NtDelayExecution
        77f82826 b832000000       mov     eax,0x32
        77f8282b 8d542404         lea     edx,[esp+0x4]          ss:01cc9db3=????????
        77f8282f cd2e             int     2e
        77f82831 c20800           ret     0x8
        77f82834 53               push    ebx
        77f82835 51               push    ecx
        77f82836 6a00             push    0x0
        77f82838 c70701000000     mov     dword ptr [edi],0x1    ds:0116fee0=ff676980
        77f8283e ff750c           push    dword ptr [ebp+0xc]    ss:01cc9dce=????????
        77f82841 50               push    eax
        77f82842 e879fdffff       call    RtlMultiByteToUnicodeN (77f825c0)
        77f82847 e928fcffff       jmp  RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)

*----> 堆栈反向跟踪 <---*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0116FEE8 77E63A22 000003E8 00000000 00407DA7 000003E8 ntdll!NtDelayExecution
77E63A17 03E80824 C2000000 8B550004 565151EC 0875FF57 kernel32!Sleep
74FF006A 00000000 00000000 00000000 00000000 00000000 <nosymbols>

*----> 原始堆栈转储 <----*
0116fecc  4e 3a e6 77 00 00 00 00 - e0 fe 16 01 38 5e 43 00  N:.w........8^C.
0116fedc  4c a2 43 00 80 69 67 ff - ff ff ff ff 17 3a e6 77  L.C..ig......:.w
0116feec  22 3a e6 77 e8 03 00 00 - 00 00 00 00 a7 7d 40 00  ":.w.........}@.
0116fefc  e8 03 00 00 d0 f8 12 00 - 80 a7 34 00 7c ff 16 01  ..........4.|...
0116ff0c  3c 01 00 00 29 de c8 6b - 00 00 00 00 0c 00 00 00  <...)..k........
0116ff1c  30 5d 34 00 30 5d 34 00 - 00 88 d4 f7 00 e6 cd 6b  0]4.0]4........k
0116ff2c  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0116ff3c  01 00 00 00 00 00 00 00 - d8 41 13 00 d8 01 03 00  .........A......
0116ff4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0116ff5c  00 00 00 00 00 00 00 00 - 00 00 00 00 80 a7 34 00  ..............4.
0116ff6c  18 ff 16 01 a4 ff 16 01 - ac 63 cd 6b 00 00 00 00  .........c.k....
0116ff7c  b4 ff 16 01 bc 85 00 78 - d0 f8 12 00 0c 00 00 00  .......x........
0116ff8c  00 00 00 00 30 5d 34 00 - fb 12 43 80 00 88 d4 f7  ....0]4...C.....
0116ff9c  88 ff 16 01 ff ff ff ff - dc ff 16 01 6a bd 00 78  ............j..x
0116ffac  20 2f 03 78 00 00 00 00 - ec ff 16 01 8b 43 e6 77   /.x.........C.w
0116ffbc  30 5d 34 00 0c 00 00 00 - 00 00 00 00 30 5d 34 00  0]4.........0]4.
0116ffcc  00 a0 fd 7f 58 ed 14 00 - c0 ff 16 01 58 ed 14 00  ....X.......X...
0116ffdc  ff ff ff ff 97 e5 e6 77 - a8 a0 e6 77 00 00 00 00  .......w...w....
0116ffec  00 00 00 00 00 00 00 00 - 32 85 00 78 30 5d 34 00  ........2..x0]4.
0116fffc  00 00 00 00 0d 00 e4 04 - 01 00 3f 00 3f 00 3f 00  ..........?.?.?.
 

原创粉丝点击