How To Read A Memory Dump

Table of contents:

How To Read A Memory Dump
How To Read A Memory Dump

Video: How To Read A Memory Dump

Video: How To Read A Memory Dump
Video: Hacks Weekly #6: Memory Dump Analysis – extracting juicy data 2024, December
Anonim

The memory dump contains the necessary information about what caused the computer to malfunction. There are special tools for reading the information contained in it.

How to read a memory dump
How to read a memory dump

Necessary

Internet connection

Instructions

Step 1

Use special memory dump readers, such as the system utilities DumpCheck (Dunpchk.exe), which is included with the support programs for Windows XP and Windows 2000, WinDbg, KD.exe, and so on. If the operating system does not have a memory dump reader for any reason, download it from the official Microsoft customer support server. You can run these utilities by entering the appropriate commands in the line of the Windows operating system, be sure to specify the.exe extension after the full name of the program.

Step 2

After reading the contents of the memory dump, download and download the debug programs also from the official Microsoft server. Don't trust third party software. For timely assistance in troubleshooting the operating system, use only licensed versions of the software.

Step 3

In cases where, after reading a memory dump and debugging the system after a BSOD, certain malfunctions continue to occur in the computer, contact Microsoft technical support. Here you will need to specify the operating system data regarding the license key, which you can find on the service sticker. Usually they are glued to the case of the system unit or the back cover of the laptop (in cases when you have a preinstalled version of the operating system) or on the software package (in cases where you purchased a disc with the operating system as a stand-alone product). In some cases, it may be necessary to restore the system and even reinstall it, but this type of malfunction is quite rare.

Recommended: