error log来啦,xpp请看看
~
TA33A caused an Access Violation in
module TA33A.exe at 001b:10025122.
Exception handler called in Global Exception Handler. Time: Sat Jun 08 22:03:11 2013
D:\ta\TA33A.exe, run by Administrator on YNJEDWSJPNPI60D
Executable is 1178624 bytes long and dated 10/22/2012 19:09:02
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
2 processors
2048 MBytes physical memory
Stack goes from 0256A4C4 to 02580000
Instruction pointer is 10025122
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x00000000
ExceptionFlags = 00000000 ExceptionAddress = 10025122
Parameters = 00000000 00000000
Registers:
EAX=00000000 CS=001B EIP=10025122 EFLGS=00010296
EBX=00000197 SS=0023 ESP=0257FD3C EBP=0257FD90
ECX=00000000 DS=0023 ESI=06A0000C FS=0000003B
EDX=00000000 ES=0023 EDI=0000029A GS=00000000
Bytes at CS:EIP:
0f bf 0c 10 69 c9 18 01 00 00 03 4d d4 89 4d dc
Call stack:
10025122 100095A4 1000C773 004C6199 004C285D 004C2A12 004E78AD
Stack dump:
0257FD3C: A7A0C3AF 0000029A 00F5526C 00000197 00F30BEC 00000000 000001DF 00052620
0257FD5C: 00052361 000002C0 00000000 00000000 736F1D11 00000019 000001E0 000002C0
0257FD7C: 06600010 0257FD3C 0257FEB0 10042390 00000000 0257FEBC 100095A4 06A0000C
0257FD9C: 0257FE28 A7A0C083 0000029A 00F5526C 00000197 00E71E48 0257FE7C 00F69BB8
0257FDBC: 00F69BB8 00F69BB8 007E6568 0257FE8C 00750000 00000001 00000197 0257FE2C
0257FDDC: 1002AAF6 0257FE8C 00000010 00E7D5C4 0257FE30 00000008 0000000B 00000000
0257FDFC: 00000000 00000000 00E7D5C4 00000003 0000000F 0257FEA0 10042A01 00000000
0257FE1C: 0257FEAC 0257FE8C 0257FE70 000001DF 000002C0 06A0000C 10026C18 A7A0C093
0257FE3C: 0257FE70 0257FE8C 00F59A60 00000000 0257FE3C 00750050 0257FEA4 7162CDA8
0257FE5C: 715F3E10 0257FE70 71611B07 0257FE67 007583E0 00000000 00000000 00000000
0257FE7C: A7A0C08F 00000197 00000000 000003DB 00000000 00000000 00000000 007E6538
0257FE9C: 00000BBE 0257FFA4 10042590 A7A0C083 0257FDA0 0257FFA4 10041840 00000000
0257FEBC: 0257FED4 1000C773 0075A438 0000029A 00000000 02EFF00C 000001AB 004C6199
0257FEDC: 00F5526C 00000000 0000029A 0051F320 000001AB 00000197 004C285D 0257FF3C
0257FEFC: 0257FF2C 0257FF1C 7C80982E 7C80934A 00000000 000E568A 0000029A 00000197
0257FF1C: 0000029A 00000197 000002A4 000001AB 0000029A 00000197 000002A4 000001AB
0257FF3C: 00000400 00000300 00000400 06786838 00002710 FFFFFFFF 00000000 00000000
0257FF5C: 00000000 0000027F 000001DF 004C29D4 004C2A12 0051F320 01BF2550 0257FFB4
0257FF7C: 01BF2550 00000000 004E78AD 0051F320 00000000 000002BC 01BF2550 C0000005
0257FF9C: 0257FF8C 0257F960 0257FFDC 004E6718 004FDD00 00000000 0257FFEC 7C80B729
0257FFBC: 01BF2550 00000000 000002BC 01BF2550 7FFDD000 8A3A5600 0257FFC0 8A1A8890
0257FFDC: FFFFFFFF 7C839AD8 7C80B730 00000000 00000000 00000000 004E7850 01BF2550
0257FFFC: 00000000
Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000
ContextFlags = 0001003F
Control Word = FFFF027F StatusWord = FFFF0020
TagWord = FFFFFFFF ErrorOffset = 00000000
ErrorSelector = 00000000 DataOffset = 00000000
DataSelector = FFFF0000 Cr0NpxState = 00000000
smackw32.DLL : 003A0000 : 00018000 :
TA33A.exe : 00400000 : 0012E000 : 3.1.0.0
DPLAYX.dll : 00700000 : 00046000 : 1.0.0.666
DDRAW.dll : 10000000 : 00075000 : 0.8.4.8
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 00141000 : 8.2.2.1381
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.5906
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33A caused an Access Violation in
module TA33A.exe at 001b:100053dc.
Exception handler called in Global Exception Handler. Time: Sat Jun 08 22:48:14 2013
D:\ta\TA33A.exe, run by Administrator on YNJEDWSJPNPI60D
Executable is 1178624 bytes long and dated 10/22/2012 19:09:02
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
2 processors
2048 MBytes physical memory
Stack goes from 0256A454 to 02580000
Instruction pointer is 100053DC
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x00000006
ExceptionFlags = 00000000 ExceptionAddress = 100053DC
Parameters = 00000000 00000006
Registers:
EAX=00000000 CS=001B EIP=100053DC EFLGS=00010202
EBX=000000BA SS=0023 ESP=0257FD58 EBP=0257FD6C
ECX=06DEF5DC DS=0023 ESI=00F5526C FS=0000003B
EDX=069F000C ES=0023 EDI=000001AC GS=00000000
Bytes at CS:EIP:
0f bf 48 06 89 4d f8 8b 55 10 0f bf 4a 0e 8b 55
Call stack:
100053DC 1000526B 10009565 1000C773 004C6199 004C285D 004C2A12 004E78AD
Stack dump:
0257FD58: 06DEF5DC 007932B4 00000000 0257FD98 0257FD80 0257FD90 1000526B 069F000C
0257FD78: 0257FE28 00000000 06DEF5DC 00000000 00000000 00000001 0257FEBC 10009565
0257FD98: 069F000C 0257FE28 05069A24 000001AC 00F5526C 000000BA 00E71E48 0257FE7C
0257FDB8: 00F67F98 00F67F98 00F67F98 007E6754 0257FE8C 00750000 00000001 000000BA
0257FDD8: 0257FE2C 1002AAF6 0257FE8C 00000009 00E7D5C4 0257FE30 00000006 00000005
0257FDF8: 00000000 00000000 00000000 00E7D5C4 00000001 00000008 0257FEA0 10042A01
0257FE18: 00000000 0257FEAC 0257FE8C 0257FE70 000001DF 000002C0 069F000C 10026C18
0257FE38: 05069A34 0257FE70 0257FE8C 00F59A60 00000000 0257FE3C 00750050 0257FEA4
0257FE58: 7162CDA8 715F3E10 0257FE70 71611B07 0257FE67 0075A508 00000000 00000000
0257FE78: 00000000 05069A28 000000BA 00000000 000001C2 00000000 00000000 00000000
0257FE98: 007E6724 0000055E 0257FFA4 10042590 05069A24 0257FDA0 0257FFA4 10041840
0257FEB8: 00000000 0257FED4 1000C773 007932B4 000001AC 00000000 02EFF00C 000000CE
0257FED8: 004C6199 00F5526C 00000000 000001AC 0051F320 000000CE 000000BA 004C285D
0257FEF8: 0257FF3C 0257FF2C 0257FF1C 7C80982E 7C80934A 00000000 00379178 000001AC
0257FF18: 000000BA 000001AC 000000BA 000001B6 000000CE 000001AC 000000BA 000001B6
0257FF38: 000000CE 00000400 00000300 00000400 04D86838 00002710 FFFFFFFF 00000000
0257FF58: 00000000 00000000 0000027F 000001DF 004C29D4 004C2A12 0051F320 01BF2550
0257FF78: 0257FFB4 01BF2550 00000000 004E78AD 0051F320 00000000 000002BC 01BF2550
0257FF98: C0000005 0257FF8C 0257F97C 0257FFDC 004E6718 004FDD00 00000000 0257FFEC
0257FFB8: 7C80B729 01BF2550 00000000 000002BC 01BF2550 7FFDD000 8A3A5600 0257FFC0
0257FFD8: 883F4868 FFFFFFFF 7C839AD8 7C80B730 00000000 00000000 00000000 004E7850
0257FFF8: 01BF2550 00000000
Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000
ContextFlags = 0001003F
Control Word = FFFF027F StatusWord = FFFF0020
TagWord = FFFFFFFF ErrorOffset = 1002F9F2
ErrorSelector = 051C001B DataOffset = 0257FE70
DataSelector = FFFF0023 Cr0NpxState = 00000000
smackw32.DLL : 003A0000 : 00018000 :
TA33A.exe : 00400000 : 0012E000 : 3.1.0.0
DPLAYX.dll : 00700000 : 00046000 : 1.0.0.666
imepng.dll : 04190000 : 0003B000 : 1.5.14.0
IMEFREETYPE.dll : 05000000 : 00073000 :
imezlib.dll : 05080000 : 00027000 : 1.2.5.0
UIPFull.dll : 098E0000 : 001FF000 : 2.5.2.116
SogouFlashDll.dll : 0A840000 : 00090000 : 1.0.0.102
Resource.dll : 0B450000 : 00073000 : 6.1.0.6700
DDRAW.dll : 10000000 : 00075000 : 0.8.4.8
gdiplus.dll : 4AE90000 : 001AB000 : 5.2.6002.22509
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 00141000 : 8.2.2.1381
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.5906
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028
TA33A caused an Access Violation in
module TA33A.exe at 001b:004339e8.
Exception handler called in Main Thread. Time: Sun Jun 09 21:49:08 2013
D:\ta\TA33A.exe, run by Administrator on YNJEDWSJPNPI60D
Executable is 1178624 bytes long and dated 10/22/2012 19:09:02
UTC link time: 35c0b9e5 - Thu Jul 30 18:22:29 1998
Library version 996. Library date Jun 30 1998 16:08:53
2 processors
2048 MBytes physical memory
Stack goes from 0012A578 to 00140000
Instruction pointer is 004339E8
ExceptionCode = C0000005 - Access Violation
Access violation: Illegal read, data address 0x00000001
ExceptionFlags = 00000000 ExceptionAddress = 004339E8
Parameters = 00000000 00000001
Registers:
EAX=00000000 CS=001B EIP=004339E8 EFLGS=00010206
EBX=00000000 SS=0023 ESP=0013FB70 EBP=0762FAB0
ECX=00000001 DS=0023 ESI=000000A4 FS=0000003B
EDX=0013FB94 ES=0023 EDI=01B2A0BC GS=00000000
Bytes at CS:EIP:
66 8b 14 81 8d 04 81 8b 4c 24 08 66 89 11 66 8b
Call stack:
004339E8 00481EEE 00482109 0048684A 0048667E 0048AFD6 004954F2 00496811
004995BD 00499A22 0049EC68 0049EDE2
Stack dump:
0013FB70: 00481EEE 00000000 0013FBA4 0013FB94 00000000 08E41CAC 00000000 0013FC94
0013FB90: 00000001 00000001 00000001 000000A4 0000006A FFF3FFFF 00000089 FFFFFFFF
0013FBB0: 01B2A0BC 00000000 0666FC0C 0762FAB0 0000002B FFF04016 00482109 0013FBD0
0013FBD0: 01B17D71 08E41D26 00000000 08E41DA4 14880000 00890000 0D880000 00030003
0013FBF0: 08E41CAC 0048684A 08E41CAC 00000000 08E41CAC 00000000 00000010 025904F8
0013FC10: 01B15E01 004619D6 025904FF 0013FC94 0000000B 00451D90 025904FF 025904F8
0013FC30: 0013FC94 0000000B 0000000B 0000014B 025904FF 0013FC94 02590402 00451F7A
0013FC50: 025904FF 02590401 0013FC94 0000000B 00000000 08E41CAC 00000000 00000010
0013FC70: 00486672 0048667E 0013FC94 00000001 01B17C26 08E41CAC 08EA73CC 01B2A180
0013FC90: 01B17C26 FA1D5C0C A1025904 08165506 0048AFD6 00000055 00000001 00000001
0013FCB0: 01B4EBB2 716158F8 00000001 02B4EBB2 00000296 01B2A180 0049564B 004954F2
0013FCD0: 00000001 0013FD14 01B4EBB2 00496811 00000001 01B18ABB 00000000 004995BD
0013FCF0: 00000000 0278C68A 00000000 000001C2 0000029F 00000000 0012FB0A 00000200
0013FD10: 00000000 00499A22 7C80934A 0278C68A 000001C2 0000029F 00000000 0012FB0A
0013FD30: 00000200 00000000 000001C2 0000029F 00000000 0012FB0A 00000200 00000000
0013FD50: 00000000 00000010 00000000 00000000 00000000 7FFD4000 7FFDF000 716122C6
0013FD70: 0013FD58 0013FD24 00000102 00000001 0013FD18 00000010 0013FF24 7C839AD8
0013FD90: 7C809680 FFFFFFFF 7C8095C0 7C80A115 00000001 0013FDE4 00000000 00000000
0013FDB0: 00000000 0013FDCC 73E714A2 00000001 0013FDE4 00000000 00000000 0013FDE8
0013FDD0: 73EAE637 00000001 00000000 00000000 0013FDE4 000001B8 0013FDF8 73E85306
0013FDF0: 0013FE1C 73E8106D 0013FE1C 73E81091 0013FE0C 00000000 7C92DA2A 7C8024C7
0013FE10: 00000090 00000000 0013FE30 73E71E05 00000090 73E81168 00000064 7C80934A
0013FE30: 0278C68A 00000000 716158F8 0049EC49 0013FE78 00000000 00000000 00000000
0013FE50: 0049EC68 00090000 0015235A 0013FF34 7FFD4000 000003C8 00000032 00000001
0013FE70: 00000000 00000001 0006055A 00000200 00000000 029F01C2 0278AFE5 000001C2
0013FE90: 0000029F 7C930435 7C93043E 00091378 00000002 004F264E 01BF007D 0000007B
0013FEB0: 00000002 000000CC 0013FEDC 7C8308D7 00000000 00000000 7C930435 7C93043E
0013FED0: 00091378 00000002 004F264E 01BF007E 0000007A 00000002 000000CC 0013FEDC
0013FEF0: 7C8308D7 00000000 7C920000 0049EDE2 00400000 00000000 0015235A 00000001
0013FF10: 00090000 0015235A 7FFD4000 0013FF10 0013F794 0013FFB0 004E6718 004FDAE0
0013FF30: 00000000 0013FFC0 004E70F2 00400000 00000000 0015235A 00000001 00090000
0013FF50: 7C93005D 7FFD4000 0073B477 0015235A 00090000 00000044 00153BE0 00153BF0
0013FF70: 00153C08 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0013FF90: 00000401 00000001 00000000 00000000 00010001 00000000 0013FF4C 00090000
0013FFB0: 0013FFE0 004E6718 004FDCF0 00000000 0013FFF0 7C817077 00090000 7C93005D
0013FFD0: 7FFD4000 808746ED 0013FFC8 87F40DA8 FFFFFFFF 7C839AD8 7C817080 00000000
0013FFF0: 00000000 00000000 004E6FA0 00000000
Dr0 = 00000000 Dr1 = 00000000 Dr2 = 00000000
Dr3 = 00000000 Dr6 = 00000000 Dr7 = 00000000
ContextFlags = 0001003F
Control Word = FFFF127F StatusWord = FFFF4020
TagWord = FFFFFFFF ErrorOffset = 004865D8
ErrorSelector = 001D001B DataOffset = 004FD6F8
DataSelector = FFFF0023 Cr0NpxState = 00000000
smackw32.DLL : 003A0000 : 00018000 :
TA33A.exe : 00400000 : 0012E000 : 3.1.0.0
DPLAYX.dll : 00700000 : 00046000 : 1.0.0.666
Resource.dll : 027A0000 : 00073000 : 6.1.0.6700
imepng.dll : 04D40000 : 0003B000 : 1.5.14.0
UIPFull.dll : 09960000 : 001FF000 : 2.5.2.116
IMEFREETYPE.dll : 09B60000 : 00073000 :
imezlib.dll : 09BE0000 : 00027000 : 1.2.5.0
SogouFlashDll.dll : 0A880000 : 00090000 : 1.0.0.102
DDRAW.dll : 10000000 : 00075000 : 0.8.4.8
gdiplus.dll : 4AE90000 : 001AB000 : 5.2.6002.22509
AcGenral.DLL : 58FB0000 : 001CA000 : 5.1.2600.5512
safemon.dll : 70200000 : 00141000 : 8.2.2.1381
AcLayers.DLL : 715F0000 : 00079000 : 5.1.2600.5906
comctl32.dll : 77180000 : 00103000 : 6.0.2900.6028