-
-
[旧帖] [求助]程序出错解释 0.00雪花
-
发表于: 2015-12-15 21:37 1314
-
1zone.exe run by Administrator in 12/15/2015 20:46:12 crashed.
The program caused an Access Violation (0xc0000005)
in module 1zone.exe at 001b:0056f7b7.
Access violation: read from location 4274fcfd
Operating system: unknown Windows version (6.1.7600).
4 processor(s), type 586.
Physical memory: Total-2048MB Free-913MB.
Paging File: Total-0MB Free-3993MB.
CallStack:
1zone.exe at 0x0056f7b7
1zone.exe at 0x0056f718
1zone.exe at 0x0056d89d
1zone.exe at 0x004f994d
1zone.exe at 0x004d68c6
1zone.exe at 0x0042c58f
1zone.exe at 0x0041c02d
endthreadex() in MSVCR71.dll at 0x7c349565
BaseThreadInitThunk() in kernel32.dll at 0x76551174
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3f5
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3c8
Context:
EDI: 0x249eff10 ESI: 0x249efb90 EAX: 0x21c00000
EBX: 0x0376ce98 ECX: 0x20b4fca8 EDX: 0x00f00000
EIP: 0x0056f7b7 EBP: 0x249efb18 SegCs: 0x0000001b
EFlags: 0x00010246 ESP: 0x249efb14 SegSs: 0x00000023
Bytes at CS:EIP: (XX means unaccessible)
83 7c 01 55 ff 74 22 8b 55 0c 6b d2 24 8b 45 fc
Variable:
endthreadex() in MSVCR71.dll at 0x7c349565
BaseThreadInitThunk() in kernel32.dll at 0x76551174
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3f5
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3c8
求大神看下什么情况
The program caused an Access Violation (0xc0000005)
in module 1zone.exe at 001b:0056f7b7.
Access violation: read from location 4274fcfd
Operating system: unknown Windows version (6.1.7600).
4 processor(s), type 586.
Physical memory: Total-2048MB Free-913MB.
Paging File: Total-0MB Free-3993MB.
CallStack:
1zone.exe at 0x0056f7b7
1zone.exe at 0x0056f718
1zone.exe at 0x0056d89d
1zone.exe at 0x004f994d
1zone.exe at 0x004d68c6
1zone.exe at 0x0042c58f
1zone.exe at 0x0041c02d
endthreadex() in MSVCR71.dll at 0x7c349565
BaseThreadInitThunk() in kernel32.dll at 0x76551174
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3f5
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3c8
Context:
EDI: 0x249eff10 ESI: 0x249efb90 EAX: 0x21c00000
EBX: 0x0376ce98 ECX: 0x20b4fca8 EDX: 0x00f00000
EIP: 0x0056f7b7 EBP: 0x249efb18 SegCs: 0x0000001b
EFlags: 0x00010246 ESP: 0x249efb14 SegSs: 0x00000023
Bytes at CS:EIP: (XX means unaccessible)
83 7c 01 55 ff 74 22 8b 55 0c 6b d2 24 8b 45 fc
Variable:
endthreadex() in MSVCR71.dll at 0x7c349565
BaseThreadInitThunk() in kernel32.dll at 0x76551174
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3f5
RtlInitializeExceptionChain() in ntdll.dll at 0x76fcb3c8
求大神看下什么情况
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
赞赏
雪币:
留言: