访问侵犯问题
来源:互联网 发布:如何做好淘宝直通车 编辑:程序博客网 时间:2024/05/01 00:15
用VC编程运行后出现访问侵犯的错误,不知如何解决,大虾帮忙一下。
发生应用程序意外错误:
应用程序: (pid=604)
时间: 2007-10-26 @ 11:24:41.437
意外情况编号: c0000005 (访问侵犯)
*----> 系统信息 <----*
计算机名: TAMER1
用户名: NO1
处理器数量: 1
处理器类型: x86 Family 15 Model 15 Stepping 2
Windows 2000 版本: 5.0
当前内部版本号: 2195
Service Pack: 4
当前类型: Uniprocessor Free
注册的单位:
注册的所有者: NO1
*----> 任务列表 <----*
0 Idle.exe
8 System.exe
196 smss.exe
224 csrss.exe
220 winlogon.exe
272 services.exe
284 lsass.exe
456 svchost.exe
492 spoolsv.exe
524 svchost.exe
552 nvsvc32.exe
600 regsvc.exe
652 MSTask.exe
688 WinMgmt.exe
744 svchost.exe
920 Explorer.exe
1108 RUNDLL32.exe
1132 RTHDCPL.exe
1160 internat.exe
1176 Monitor.exe
604 PegasusSenior.exe
1048 Pegasus.exe
904 wuauclt.exe
856 rundll32.exe
732 rundll32.exe
460 rundll32.exe
868 rundll32.exe
464 rundll32.exe
624 drwtsn32.exe
0 _Total.exe
(00400000 - 00452000)
(77F80000 - 77FFD000)
(6BC40000 - 6BD3B000)
(78000000 - 78045000)
(77E60000 - 77F37000)
(77F40000 - 77F7E000)
(77DF0000 - 77E55000)
(74FD0000 - 74FDA000)
(74FB0000 - 74FC4000)
(796D0000 - 79732000)
(786F0000 - 78761000)
(74FA0000 - 74FA8000)
(75E00000 - 75E1A000)
(6BC20000 - 6BC2D000)
(77800000 - 7780C000)
(77960000 - 77984000)
(77300000 - 77313000)
(774E0000 - 774E5000)
(772E0000 - 772F7000)
(750E0000 - 750EF000)
(75100000 - 7514F000)
(797B0000 - 797BF000)
(75150000 - 75156000)
(77930000 - 7795A000)
(77A30000 - 77B1F000)
(77990000 - 77A2B000)
(77370000 - 7739F000)
(77340000 - 77363000)
(777F0000 - 777FE000)
(6D990000 - 6DA3C000)
(794D0000 - 79531000)
(774A0000 - 774D3000)
(77480000 - 77491000)
(774F0000 - 77512000)
(71710000 - 71794000)
(70A70000 - 70AD5000)
(77320000 - 77339000)
(777A0000 - 777A8000)
(777B0000 - 777B5000)
(74F50000 - 74F6E000)
(74F90000 - 74F97000)
(6DD30000 - 6DD36000)
线程 ID 0x428 的状态转储
eax=00000113 ebx=0040c190 ecx=0012fdd4 edx=6bd1d660 esi=0012faf8 edi=0012faf8
eip=6bc8d263 esp=0012fa90 ebp=0012faa4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
函数: Ordinal3093
6bc8d243 8b4138 mov eax,[ecx+0x38] ds:00c89cba=????????
6bc8d246 85c0 test eax,eax
6bc8d248 7515 jnz Ordinal4485+0x18c (6bc9d15f)
6bc8d24a ff742404 push dword ptr [esp+0x4] ss:00c89977=????????
6bc8d24e ff7120 push dword ptr [ecx+0x20] ds:00c89cba=????????
6bc8d251 ff1598d5cd6b ds:6bcdd598=77df588a
call dword ptr [Ordinal6437+0x94ec (6bcdd598)]
6bc8d257 8b4c2408 mov ecx,[esp+0x8] ss:00c89977=????????
6bc8d25b 8901 mov [ecx],eax ds:0012fdd4=0040f3b8
6bc8d25d eb0f jmp Ordinal4485+0x19b (6bc9d16e)
6bc8d25f ff742408 push dword ptr [esp+0x8] ss:00c89977=????????
错误 ->6bc8d263 8b10 mov edx,[eax] ds:00000113=????????
6bc8d265 8bc8 mov ecx,eax
6bc8d267 ff742408 push dword ptr [esp+0x8] ss:00c89977=????????
6bc8d26b ff5274 call dword ptr [edx+0x74] ds:6c877546=????????
6bc8d26e c20800 ret 0x8
*----> 堆栈反向跟踪 <---*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012FAA4 6BC9BE26 0000044D 0012FDD4 6BC9C126 0000044D !Ordinal3093
0012FAC4 00407CE7 0012FAF8 0000044D 0012FE3C 00133D60 !Ordinal5272
0012FB24 0040C19D 00000000 0012FBC8 00000000 DCBAABCD !<nosymbols>
0012FDD4 00000001 00000000 00000000 00000000 00000001 !<nosymbols>
*----> 原始堆栈转储 <----*
0012fa90 ac fa 12 00 46 be c9 6b - 4d 04 00 00 ac fa 12 00 ....F..kM.......
0012faa0 f8 fa 12 00 c4 fa 12 00 - 26 be c9 6b 4d 04 00 00 ........&..kM...
0012fab0 d4 fd 12 00 26 c1 c9 6b - 4d 04 00 00 f8 fa 12 00 ....&..kM.......
0012fac0 d4 fd 12 00 24 fb 12 00 - e7 7c 40 00 f8 fa 12 00 ....$....|@.....
0012fad0 4d 04 00 00 3c fe 12 00 - 60 3d 13 00 d4 fd 12 00 M...<...`=......
0012fae0 a8 af c8 6b f8 fa 12 00 - d4 fd 12 00 00 00 00 00 ...k............
0012faf0 90 c1 40 00 02 00 00 00 - 01 00 00 00 d4 fd 12 00 ..@.............
0012fb00 00 00 00 00 56 00 01 01 - c8 e7 13 00 00 00 00 00 ....V...........
0012fb10 60 3d 13 00 e8 fa 12 00 - bc fb 12 00 00 4a cd 6b `=...........J.k
0012fb20 00 00 00 00 d4 fd 12 00 - 9d c1 40 00 00 00 00 00 ..........@.....
0012fb30 c8 fb 12 00 00 00 00 00 - cd ab ba dc 12 34 cb 6b .............4.k
0012fb40 60 d6 d1 6b d4 fd 12 00 - 36 34 cb 6b 94 9e c8 6b `..k....64.k...k
0012fb50 00 00 00 00 00 00 00 00 - d4 fd 12 00 d4 fd 12 00 ................
0012fb60 60 3d 13 00 56 00 01 01 - 01 00 00 00 2f 05 0a 09 `=..V......./...
0012fb70 a4 fb 12 00 00 00 00 00 - b0 fb 12 00 2a 37 e0 77 ............*7.w
0012fb80 d8 01 03 00 6a 03 00 00 - 00 00 00 00 00 00 00 00 ....j...........
0012fb90 01 00 00 00 f0 1e df 77 - d8 01 03 00 6a 03 00 00 .......w....j...
0012fba0 00 00 00 00 00 00 00 00 - 09 37 e0 77 cd ab ba dc .........7.w....
0012fbb0 d4 fb 12 00 38 ea 40 00 - 00 00 00 00 3c fc 12 00 ....8.@.....<...
0012fbc0 e0 49 cd 6b ff ff ff ff - e8 fb 12 00 d5 99 c8 6b .I.k...........k
线程 ID 0x384 的状态转储
eax=777f21fe ebx=00000004 ecx=0012ed64 edx=00000000 esi=77f82873 edi=00000004
eip=77f8287e esp=00e4fd24 ebp=00e4fd70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
函数: NtWaitForMultipleObjects
77f82873 b8e9000000 mov eax,0xe9
77f82878 8d542404 lea edx,[esp+0x4] ss:019a9c0b=????????
77f8287c cd2e int 2e
77f8287e c21400 ret 0x14
*----> 堆栈反向跟踪 <---*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00E4FD70 77E68F0D 00E4FD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects
00E4FFB4 77E6438B 00000005 000B000A 79725107 00150C40 kernel32!WaitForMultipleObjects
00E4FFEC 00000000 777F21FE 00150C40 00000000 000000C8 kernel32!TlsSetValue
*----> 原始堆栈转储 <----*
00e4fd24 23 3c e6 77 04 00 00 00 - 48 fd e4 00 01 00 00 00 #<.w....H.......
00e4fd34 00 00 00 00 00 00 00 00 - 01 00 00 00 40 0c 15 00 ............@...
00e4fd44 01 00 00 00 94 00 00 00 - 98 00 00 00 a8 00 00 00 ................
00e4fd54 10 01 00 00 84 10 46 80 - 00 29 40 80 ff ff ff ff ......F..)@.....
00e4fd64 d0 fa d2 bb 5e 1a 45 80 - f0 7d 51 f8 b4 ff e4 00 ....^.E..}Q.....
00e4fd74 0d 8f e6 77 48 fd e4 00 - 01 00 00 00 00 00 00 00 ...wH...........
00e4fd84 00 00 00 00 00 00 00 00 - b2 22 7f 77 04 00 00 00 .........".w....
00e4fd94 b0 fe e4 00 00 00 00 00 - ff ff ff ff 40 0c 15 00 ............@...
00e4fda4 07 51 72 79 0a 00 0b 00 - 34 66 db f7 10 fb d2 bb .Qry....4f......
00e4fdb4 d8 7d 51 f8 00 00 00 00 - 01 00 00 00 38 00 00 00 .}Q.........8...
00e4fdc4 23 00 00 00 23 00 00 00 - 0a 00 0b 00 07 51 72 79 #...#........Qry
00e4fdd4 40 0c 15 00 ff ff ff ff - 64 ed 12 00 fe 21 7f 77 @.......d....!.w
00e4fde4 f8 eb fd 7f 33 43 e6 77 - 1b 00 00 00 00 02 00 00 ....3C.w........
00e4fdf4 fc ff e4 00 23 00 00 00 - 0c fb d2 bb 05 00 00 00 ....#...........
00e4fe04 51 f5 40 80 98 00 00 00 - f8 00 00 00 98 00 00 00 Q.@.............
00e4fe14 00 fb d2 bb 05 00 00 00 - 24 f0 00 e1 05 00 00 00 ........$.......
00e4fe24 fe ff f8 00 b8 66 db f7 - 34 00 00 c0 e8 5b 5a e1 .....f..4....[Z.
00e4fe34 02 00 00 00 49 03 00 00 - e8 5b 5a e1 5c fb d2 bb ....I....[Z./...
00e4fe44 10 e8 57 f8 b4 fb d2 bb - 5e 1a 45 80 08 20 01 e1 ..W.....^.E.. ..
00e4fe54 e0 a9 57 f8 a0 db 46 80 - a8 e7 57 f8 b0 fc d2 bb ..W...F...W.....
线程 ID 0x478 的状态转储
eax=00000002 ebx=77f82865 ecx=00139f10 edx=00000000 esi=00000000 edi=00000001
eip=77f82870 esp=00f5fda4 ebp=00f5fddc iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000286
函数: NtWaitForSingleObject
77f82865 b8ea000000 mov eax,0xea
77f8286a 8d542404 lea edx,[esp+0x4] ss:01ab9c8b=????????
77f8286e cd2e int 2e
77f82870 c20c00 ret 0xc
*----> 堆栈反向跟踪 <---*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00F5FDDC 74F59E80 00000148 0000011C 00000002 00000006 ntdll!NtWaitForSingleObject
00F5FE64 74FBA421 0000011C 00F5FED4 00000001 00F5FEEC msafd!StartWsdpService
00F5FEA8 74FD1053 0000011C 00F5FED4 00000001 00F5FEEC ws2_32!WSARecvFrom
00F5FEDC 0040775B 0000011C 00000000 000005BE 00000000 wsock32!recvfrom
00F5FF7C 780085BC 0012FAC8 001368D8 74F6A380 00343DA8 !<nosymbols>
00F5FFB4 77E6438B 00343DA8 001368D8 74F6A380 00343DA8 !endthreadex
00F5FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!TlsSetValue
线程 ID 0x100 的状态转储
eax=00000000 ebx=00000000 ecx=000000c0 edx=00000000 esi=77f82826 edi=0105fee0
eip=77f82831 esp=0105fecc ebp=0105fee8 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
函数: NtDelayExecution
77f82826 b832000000 mov eax,0x32
77f8282b 8d542404 lea edx,[esp+0x4] ss:01bb9db3=????????
77f8282f cd2e int 2e
77f82831 c20800 ret 0x8
77f82834 53 push ebx
77f82835 51 push ecx
77f82836 6a00 push 0x0
77f82838 c70701000000 mov dword ptr [edi],0x1 ds:0105fee0=ff676980
77f8283e ff750c push dword ptr [ebp+0xc] ss:01bb9dce=????????
77f82841 50 push eax
77f82842 e879fdffff call RtlMultiByteToUnicodeN (77f825c0)
77f82847 e928fcffff jmp RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)
*----> 堆栈反向跟踪 <---*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0105FEE8 77E63A22 000003E8 00000000 004079A5 000003E8 ntdll!NtDelayExecution
77DF612C 0C7D8B57 452DC78B 0F000001 02BCA884 48E88300 kernel32!Sleep
56EC8B55 00000000 00000000 00000000 00000000 00000000 <nosymbols>
*----> 原始堆栈转储 <----*
0105fecc 4e 3a e6 77 00 00 00 00 - e0 fe 05 01 d4 9d 43 00 N:.w..........C.
0105fedc 08 00 00 00 80 69 67 ff - ff ff ff ff 2c 61 df 77 .....ig.....,a.w
0105feec 22 3a e6 77 e8 03 00 00 - 00 00 00 00 a5 79 40 00 ":.w.........y@.
0105fefc e8 03 00 00 c8 fa 12 00 - 30 3e 34 00 7c ff 05 01 ........0>4.|...
0105ff0c 34 01 00 00 29 de c8 6b - 00 00 00 00 d8 68 13 00 4...)..k.....h..
0105ff1c a8 3e 34 00 a8 3e 34 00 - 01 00 00 00 00 e6 cd 6b .>4..>4........k
0105ff2c 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0105ff3c 01 00 00 00 00 00 00 00 - d8 41 13 00 00 00 00 00 .........A......
0105ff4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0105ff5c 00 00 00 00 00 00 00 00 - 00 00 00 00 30 3e 34 00 ............0>4.
0105ff6c 18 ff 05 01 a4 ff 05 01 - ac 63 cd 6b 00 00 00 00 .........c.k....
0105ff7c b4 ff 05 01 bc 85 00 78 - c8 fa 12 00 d8 68 13 00 .......x.....h..
0105ff8c 80 a3 f6 74 a8 3e 34 00 - fb 12 43 80 00 88 d4 f7 ...t.>4...C.....
0105ff9c 88 ff 05 01 ff ff ff ff - dc ff 05 01 6a bd 00 78 ............j..x
0105ffac 20 2f 03 78 00 00 00 00 - ec ff 05 01 8b 43 e6 77 /.x.........C.w
0105ffbc a8 3e 34 00 d8 68 13 00 - 80 a3 f6 74 a8 3e 34 00 .>4..h.....t.>4.
0105ffcc 00 b0 fd 7f 00 00 13 00 - c0 ff 05 01 00 00 13 00 ................
0105ffdc ff ff ff ff 97 e5 e6 77 - a8 a0 e6 77 00 00 00 00 .......w...w....
0105ffec 00 00 00 00 00 00 00 00 - 32 85 00 78 a8 3e 34 00 ........2..x.>4.
0105fffc 00 00 00 00 00 00 d3 6d - 01 00 00 00 8a 00 02 00 .......m........
线程 ID 0x474 的状态转储
eax=00000000 ebx=77df612c ecx=00520650 edx=00000000 esi=77f82826 edi=0116fee0
eip=77f82831 esp=0116fecc ebp=0116fee8 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
函数: NtDelayExecution
77f82826 b832000000 mov eax,0x32
77f8282b 8d542404 lea edx,[esp+0x4] ss:01cc9db3=????????
77f8282f cd2e int 2e
77f82831 c20800 ret 0x8
77f82834 53 push ebx
77f82835 51 push ecx
77f82836 6a00 push 0x0
77f82838 c70701000000 mov dword ptr [edi],0x1 ds:0116fee0=ff676980
77f8283e ff750c push dword ptr [ebp+0xc] ss:01cc9dce=????????
77f82841 50 push eax
77f82842 e879fdffff call RtlMultiByteToUnicodeN (77f825c0)
77f82847 e928fcffff jmp RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)
*----> 堆栈反向跟踪 <---*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0116FEE8 77E63A22 000003E8 00000000 00407DA7 000003E8 ntdll!NtDelayExecution
77E63A17 03E80824 C2000000 8B550004 565151EC 0875FF57 kernel32!Sleep
74FF006A 00000000 00000000 00000000 00000000 00000000 <nosymbols>
*----> 原始堆栈转储 <----*
0116fecc 4e 3a e6 77 00 00 00 00 - e0 fe 16 01 38 5e 43 00 N:.w........8^C.
0116fedc 4c a2 43 00 80 69 67 ff - ff ff ff ff 17 3a e6 77 L.C..ig......:.w
0116feec 22 3a e6 77 e8 03 00 00 - 00 00 00 00 a7 7d 40 00 ":.w.........}@.
0116fefc e8 03 00 00 d0 f8 12 00 - 80 a7 34 00 7c ff 16 01 ..........4.|...
0116ff0c 3c 01 00 00 29 de c8 6b - 00 00 00 00 0c 00 00 00 <...)..k........
0116ff1c 30 5d 34 00 30 5d 34 00 - 00 88 d4 f7 00 e6 cd 6b 0]4.0]4........k
0116ff2c 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0116ff3c 01 00 00 00 00 00 00 00 - d8 41 13 00 d8 01 03 00 .........A......
0116ff4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0116ff5c 00 00 00 00 00 00 00 00 - 00 00 00 00 80 a7 34 00 ..............4.
0116ff6c 18 ff 16 01 a4 ff 16 01 - ac 63 cd 6b 00 00 00 00 .........c.k....
0116ff7c b4 ff 16 01 bc 85 00 78 - d0 f8 12 00 0c 00 00 00 .......x........
0116ff8c 00 00 00 00 30 5d 34 00 - fb 12 43 80 00 88 d4 f7 ....0]4...C.....
0116ff9c 88 ff 16 01 ff ff ff ff - dc ff 16 01 6a bd 00 78 ............j..x
0116ffac 20 2f 03 78 00 00 00 00 - ec ff 16 01 8b 43 e6 77 /.x.........C.w
0116ffbc 30 5d 34 00 0c 00 00 00 - 00 00 00 00 30 5d 34 00 0]4.........0]4.
0116ffcc 00 a0 fd 7f 58 ed 14 00 - c0 ff 16 01 58 ed 14 00 ....X.......X...
0116ffdc ff ff ff ff 97 e5 e6 77 - a8 a0 e6 77 00 00 00 00 .......w...w....
0116ffec 00 00 00 00 00 00 00 00 - 32 85 00 78 30 5d 34 00 ........2..x0]4.
0116fffc 00 00 00 00 0d 00 e4 04 - 01 00 3f 00 3f 00 3f 00 ..........?.?.?.
- 访问侵犯问题
- 出现问题:BOOTSTRP导致访问侵犯在IMSCUT.DL的解决办法
- ISSET-SE 导致访问侵犯在 IMSCUI.DLL问题的解决方法
- 谷歌的侵犯隐私问题严峻还是Bing亲民
- ISSET_SE导致访问侵犯在uipfull.dll地址ox2ed96a6 解决方法
- 侵犯通讯自由罪
- 网络侵犯姓名权
- 轻轻放下和不容侵犯
- 贩妖记 > 第二十章,不容侵犯
- Oracle 状告 Google 侵犯专利
- asp 数据访问问题
- .net 访问excel问题
- 访问控制的问题
- 访问限制的问题
- Blogger.com访问问题
- arrayList 的访问问题
- 关于tomcat访问问题
- oracle访问问题
- 框架页类新开一个顶级窗口
- 一个简单好用的跨浏览器XMLHttpRequest
- 八种和电脑相关的易发病
- 文件目录常用操作[转]
- 医生提供抗病六大对策
- 访问侵犯问题
- SEO优化的三个方面
- Facebook 详解
- 写在2007年12月13日南京大屠杀70周年纪念日
- 线程传参
- AJAX的WEB开发工具
- VC++[The Interesting Logic Operator]
- 字符,字节和编码
- 终端模式设定选项