Warning: file_get_contents(/data/phpspider/zhask/data//catemap/0/windows/16.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181

Warning: file_get_contents(/data/phpspider/zhask/data//catemap/9/visual-studio/8.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
如何从优化的windows二进制文件中大致了解崩溃转储的函数跟踪?_Windows_Crash Dumps_Objdump_Dumpbin - Fatal编程技术网

如何从优化的windows二进制文件中大致了解崩溃转储的函数跟踪?

如何从优化的windows二进制文件中大致了解崩溃转储的函数跟踪?,windows,crash-dumps,objdump,dumpbin,Windows,Crash Dumps,Objdump,Dumpbin,我有一个从windows X86-64二进制文件(XXX)生成的崩溃转储文件 我随身带着可执行文件。是否可以使用objdump或dumpbin将地址映射为函数名 谢谢, Naga您需要与可执行文件关联的符号文件。 00000000`005764aa : 00000000`00000abc 00000000`005d0c68 00000000`00000000 00000000`00000000 : kernel32!WaitForSingleObjectEx+0xdf 00000000`0057

我有一个从windows X86-64二进制文件(XXX)生成的崩溃转储文件

我随身带着可执行文件。是否可以使用objdump或dumpbin将地址映射为函数名

谢谢,
Naga

您需要与可执行文件关联的符号文件。
00000000`005764aa : 00000000`00000abc 00000000`005d0c68 00000000`00000000 00000000`00000000 : kernel32!WaitForSingleObjectEx+0xdf
00000000`00572653 : 00000000`00da0480 00000000`008e0000 00000000`00e7ac10 00000000`00d83480 : xxx+0x1764aa
00000000`00431ddd : 00000000`00da0480 00000000`004c673c 0000b9f4`17498418 00000000`01ce1e8a : xxx+0x172653
00000000`00446b4e : 00000000`007b06fe 00000000`00000000 0000b9f4`17498418 00000000`00000000 : xxx+0x31ddd
00000000`00563dbb : 00000000`0000000f 00000000`005e4b80 00000000`00000000 00000000`005e5450 : xxx+0x46b4e
00000000`00442b3e : 00000000`0000000f 00000000`008d8d00 00000000`00614e00 005d5d48`00000000 : xxx+0x163dbb
00000000`005bd5d1 : 00000000`0000000f 00000000`008d8d00 00000000`00000000 00000000`00000000 : xxx+0x42b3e
00000000`77d596ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : xxx!OVdecrypt+0xa161
00000000`00000000 : 00000000`005bd460 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseProcessStart+0x2c