Link to home
Start Free TrialLog in
Avatar of stanzanet
stanzanet

asked on

Debug Assertion Failed!

I suddenly received this message while opening a webpage. It doesn't happen everytime but every day.

" Debug Assertion Failed!
Program C:\Program Files\Internet Explorer\iexplore.exe
File: c:\program files\microsoft visual studio.net 2003\vc7\atlmfc\include\atlwin.h
Line: 815
Expression: ::IsWindow(m_hWnd)
For information on how your program can cause an assertion failure, see the Visual C++ documentation on asserts
(Please retry to debug the application)"
Avatar of jkr
jkr
Flag of Germany image

Which DLL is this happening in? To find out more, press "Retry".
Avatar of stanzanet
stanzanet

ASKER

sorry i dont understant ur comment,
i dont know if u r asking or telling me to Retry, and also i dont know what and where to retry.
sorry hein!
The reason you get that error is because there was a script error in the page and created an IE error. The error can be because of poor scripting or because you are blocking scripts on the Internet Explorer. You also have Visual Studio installed and it is setup as the default debugger.

Open the page on a different computer and see if it gives you a script error, then reset IE settings in your computer, if you still get the error then it is a Webpage error. As far as the error message, you can simply ignore it or you can change the VS settings to disable debugging.
>>sorry i dont understant ur comment,

"(Please retry to debug the application)" should explain what I meant. Even just a DrWatson log will be helpful.
The code inside IE (written in C++) where the assertion happens is the following:

      BOOL SetWindowText(LPCTSTR lpszString) throw()
      {
            ATLASSERT(::IsWindow(m_hWnd));
            return ::SetWindowText(m_hWnd, lpszString);
      }

The ATLASSERT() command contains the command that is expected to yield true value, but it yields false value. Here the ::IsWindow(m_hWnd) is a test whether the window accessed via the m_hWnd handle exists. It does not exists in your case. The problem is that it is not possible to set the text of the window that does not exist.

Setting the text of the window may mean different things depending on of what kind the window is. If it is a "application window" or some dialog (with title), then it is the text of the title. If it is a button, then it is the text of the button. It is difficult to say somethig more without knowing the exact situation and without debugging.

P.S. I am surprised that IE is distributed in the Debug.
ok let me get this problem again and i will send u a link to see the picture.
HI!
 here is the link of the error message that i get. clik on this link and u will see a picture. and tell me as soon possible,
http://maxupload.com/img/D03370B0.jpg
and when i clik on ''ignore'', then i get the message. http://maxupload.com/img/8253BC23.jpg
and when i click on ''Abandonner'' then all the explorer windows close and i have to restart the explorer to navigate on website.
Well, 'Retry' would be of interest, the other two won't really help ;o)

To outline what I am suspecting: Such an 'ASSERT()' only occurs in debug builds of software and not in release builds that are shipped. So I assume a faulty extension DLL being the cuplprit (probably even malware). To find out more about that DLL (especially its name), you need to press "Retry" to gather as much information as possible.
i dont know  how to solve the problem of DLL and i even i dont know what is that.
u said to ''Retry'', when i clik on Retry then all the explorer windows close and it doesn't solve the problem.
OK, that helps. First of all, 'securenet.dll' is not a MS product. A quick search reveals that this is classified as spyware. I'd first try to get 'HijackThis' (http://www.hijackthis.de/en) and have ot clean your PC. If that does not work. try renameing 'securenet.dll' to e.g. 'securenet.dll.removed'

Seems that these [beep]holes who write malware are plain incompetent coders...
Ok! i use Hijackthis and cleans securenet.dll. but i think it is still there, look at this!
 
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 16:53:44, on 2007-10-22
Platform: Windows Vista  (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16546)
Boot mode: Normal

Running processes:
D:\Windows\system32\Dwm.exe
D:\Windows\Explorer.EXE
D:\Windows\system32\taskeng.exe
D:\Program Files\Common Files\Symantec Shared\ccApp.exe
D:\Windows\System32\igfxpers.exe
D:\Windows\system32\wbem\unsecapp.exe
D:\Program Files\MSN Messenger\msnmsgr.exe
D:\Program Files\uTorrent\utorrent.exe
D:\Windows\system32\conime.exe
D:\Program Files\Windows Live\Mail\wlmail.exe
D:\Program Files\Internet Explorer\IEUser.exe
D:\Program Files\Internet Explorer\iexplore.exe
D:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.islamicacademy.org/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O1 - Hosts: ::1 localhost
O2 - BHO: (no name) - {1E8A6170-7264-4D0F-BEAE-D42A53123C75} - D:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\NppBho.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - D:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\UIBHO.dll
O4 - HKLM\..\Run: [ccApp] "D:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "D:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "D:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Persistence] D:\Windows\system32\igfxpers.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
O10 - Unknown file in Winsock LSP: d:\windows\system32\securenet.dll
O10 - Unknown file in Winsock LSP: d:\windows\system32\securenet.dll
O10 - Unknown file in Winsock LSP: d:\windows\system32\securenet.dll
O13 - Gopher Prefix:
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - http://a1540.g.akamai.net/7/1540/52/20070501/qtinstall.info.apple.com/qtactivex/qtplugin.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{D2CF6D8C-F274-4334-81D8-F7B643742896}: NameServer = 216.239.64.154 216.239.64.155
O22 - SharedTaskScheduler: Windows DreamScene - {E31004D1-A431-41B8-826F-E902F9D95C81} - D:\Windows\System32\DreamScene.dll
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - D:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - D:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - D:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: COM Host (comHost) - Symantec Corporation - D:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
O23 - Service: Symantec IS Password Validation (ISPwdSvc) - Symantec Corporation - D:\Program Files\Norton Internet Security\isPwdSvc.exe
O23 - Service: LiveUpdate - Symantec Corporation - D:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Symantec Corporation - D:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - D:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
O23 - Service: NMIndexingService - Nero AG - D:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: Planificateur LiveUpdate automatique - Symantec Corporation - D:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - D:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: Symantec Core LC - Unknown owner - D:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: Symantec AppCore Service (SymAppCore) - Symantec Corporation - D:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe
O23 - Service: Windows Live Setup Service (WLSetupSvc) - Unknown owner - D:\Program Files\Windows Live\installer\WLSetupSvc.exe

--
End of file - 5689 bytes
Try to past that into the analyzer at http://www.hijackthis.de/en and follow the instructions: "Check your hard disc drive with Spybot S&D from Kolla.de or LSPFix from Cexx.org. This entry should not be fixed! Your best bet to repair it is to try the LSPFix from Cexx.org"
ASKER CERTIFIED SOLUTION
Avatar of jkr
jkr
Flag of Germany image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial