This is a binary opposition counterpart to Early Crash Dump pattern (Volume 1, page 466). It is usually saved when patterns representing a problem such as an exception thread stack trace are already gone. Most often we see one thread with process termination functions (Special Stack Trace pattern, Volume 1, page 479):
0:000> ~*k ChildEBP RetAddr 0037fcf0 770bd55c ntdll!ZwTerminateProcess+0x12 0037fd0c 750f79f4 ntdll!RtlExitUserProcess+0x85 0037fdf8 750f339a kernel32!ExitProcessStub+0x12 0037fe04 770a9ef2 kernel32!BaseThreadInitThunk+0xe 0037fe44 770a9ec5 ntdll!__RtlUserThreadStart+0x70 0037fe5c 00000000 ntdll!_RtlUserThreadStart+0x1b
0:000> ~*k ChildEBP RetAddr 0032faf0 77a9d55c ntdll!ZwTerminateProcess+0x12 0032fb0c 775579f4 ntdll!RtlExitUserProcess+0x85 0032fb20 74ac1720 kernel32!ExitProcessStub+0x12 0032fb28 74ac1a03 msvcr80!__crtExitProcess+0x14 0032fb64 74ac1a4b msvcr80!_cinit+0x101 0032fb74 01339bb3 msvcr80!exit+0xd 0032fbf8 7755339a App!__tmainCRTStartup+0x155 0032fc04 77a89ef2 kernel32!BaseThreadInitThunk+0xe 0032fc44 77a89ec5 ntdll!__RtlUserThreadStart+0x70 0032fc5c 00000000 ntdll!_RtlUserThreadStart+0x1b
However, sometimes it is possible to see some execution residue (Volume 2, page 239) left on a raw stack such as hidden exceptions (Volume 1, page 239), module hints (Volume 6, page 92), error codes and handled exceptions (Volume 6, page 141) that might shed light on possible problem causes.
Another variant of this pattern is when a memory dump is saved after a problem message box is dismissed or potentially disastrous exceptions such as access violations are handled until the fault in exception handling mechanism or severe corruption resulted in unresponsive process or system (hang).