Computeren blev genstartet efter et bugcheck. Bugchecket var: 0x0000001e (0xc0000005, 0xa001d449, 0x00000000, 0x03b587f0). Microsoft Windows 2000 [v15.2195] Et dump blev gemt i : C:\WINNT\Minidump\Mini010803-02.dmp.
Computeren blev genstartet efter et bugcheck. Bugchecket var: 0x0000001e (0xc0000005, 0xbd632886, 0x80403700, 0xffffffff). Microsoft Windows 2000 [v15.2195] Et dump blev gemt i : C:\WINNT\Minidump\Mini010803-01.dmp.
Er disken nyformateret, eller opgradere du? I de filer du sender kan jeg se at praktisk talt alle dine sys og dll filer er nævnt. Jeg har dog ikke noget specielt program at læse med men hvis du kan vente til i morgen kan jeg lige finde ud af noget.
nu har jeg fundet er værktøj som kan læse filerne. Her er resultatet:
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: *** Invalid *** : Verify _NT_SYMBOL_PATH setting Executable search path is: ********************************************************************* * Symbols can not be loaded because symbol path is not initialized. * * * * The Symbol Path can be set by: * * using the _NT_SYMBOL_PATH environment variable. * * using the -y <symbol_path> argument when starting the debugger. * * using .sympath and .sympath+ * ********************************************************************* Unable to load image ntoskrnl.exe *** WARNING: Unable to verify timestamp for ntoskrnl.exe *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe Windows 2000 Kernel Version 2195 UP Free x86 compatible Kernel base = 0x80400000 PsLoadedModuleList = 0x8046a4c0 Debug session time: Tue Jan 07 20:38:19 2003 System Uptime: not available ********************************************************************* * Symbols can not be loaded because symbol path is not initialized. * * * * The Symbol Path can be set by: * * using the _NT_SYMBOL_PATH environment variable. * * using the -y <symbol_path> argument when starting the debugger. * * using .sympath and .sympath+ * ********************************************************************* ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Bugcheck code 0000000A Arguments 0000001c 00000002 00000001 8044b719
ChildEBP RetAddr Args to Child WARNING: Stack unwind information not available. Following frames may be wrong. bdbbf95c 00000000 0000001c 00000002 00000001 nt+0x64b1f
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: *** Invalid *** : Verify _NT_SYMBOL_PATH setting Executable search path is: ********************************************************************* * Symbols can not be loaded because symbol path is not initialized. * * * * The Symbol Path can be set by: * * using the _NT_SYMBOL_PATH environment variable. * * using the -y <symbol_path> argument when starting the debugger. * * using .sympath and .sympath+ * ********************************************************************* Unable to load image ntoskrnl.exe *** WARNING: Unable to verify timestamp for ntoskrnl.exe *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe Windows 2000 Kernel Version 2195 (Service Pack 3) UP Free x86 compatible Kernel base = 0x80400000 PsLoadedModuleList = 0x8046d9f0 Debug session time: Wed Jan 08 19:14:37 2003 System Uptime: not available ********************************************************************* * Symbols can not be loaded because symbol path is not initialized. * * * * The Symbol Path can be set by: * * using the _NT_SYMBOL_PATH environment variable. * * using the -y <symbol_path> argument when starting the debugger. * * using .sympath and .sympath+ * ********************************************************************* ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Bugcheck code 0000001E Arguments c0000005 bd632886 80403700 ffffffff
ChildEBP RetAddr Args to Child WARNING: Stack unwind information not available. Following frames may be wrong. eb5ff730 0000001e c0000005 bd632886 80403700 nt+0x30479
WaitForEvent failed
**************************************************** Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: *** Invalid *** : Verify _NT_SYMBOL_PATH setting Executable search path is: ********************************************************************* * Symbols can not be loaded because symbol path is not initialized. * * * * The Symbol Path can be set by: * * using the _NT_SYMBOL_PATH environment variable. * * using the -y <symbol_path> argument when starting the debugger. * * using .sympath and .sympath+ * ********************************************************************* Unable to load image ntoskrnl.exe *** WARNING: Unable to verify timestamp for ntoskrnl.exe *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe Windows 2000 Kernel Version 2195 (Service Pack 3) UP Free x86 compatible Kernel base = 0x80400000 PsLoadedModuleList = 0x8046d9f0 Debug session time: Wed Jan 08 21:17:33 2003 System Uptime: not available ********************************************************************* * Symbols can not be loaded because symbol path is not initialized. * * * * The Symbol Path can be set by: * * using the _NT_SYMBOL_PATH environment variable. * * using the -y <symbol_path> argument when starting the debugger. * * using .sympath and .sympath+ * ********************************************************************* ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Bugcheck code 0000001E Arguments c0000005 a001d449 00000000 03b587f0
ChildEBP RetAddr Args to Child WARNING: Stack unwind information not available. Following frames may be wrong. bd1207b8 0000001e c0000005 a001d449 00000000 nt+0x30479
Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.