Late Crash Dump

This is a binary opposition counterpart to Early Crash Dump pattern (Volume 1, page 466). It is usually saved when patterns representing a problem such as an exception thread stack trace are already gone. Most often we see one thread with process termination functions (Special Stack Trace pattern, Volume 1, page 479):

0:000> ~*k
ChildEBP RetAddr
0037fcf0 770bd55c ntdll!ZwTerminateProcess+0x12
0037fd0c 750f79f4 ntdll!RtlExitUserProcess+0x85
0037fdf8 750f339a kernel32!ExitProcessStub+0x12
0037fe04 770a9ef2 kernel32!BaseThreadInitThunk+0xe
0037fe44 770a9ec5 ntdll!__RtlUserThreadStart+0x70
0037fe5c 00000000 ntdll!_RtlUserThreadStart+0x1b
0:000> ~*k
ChildEBP RetAddr
0032faf0 77a9d55c ntdll!ZwTerminateProcess+0x12
0032fb0c 775579f4 ntdll!RtlExitUserProcess+0x85
0032fb20 74ac1720 kernel32!ExitProcessStub+0x12
0032fb28 74ac1a03 msvcr80!__crtExitProcess+0x14
0032fb64 74ac1a4b msvcr80!_cinit+0x101
0032fb74 01339bb3 msvcr80!exit+0xd
0032fbf8 7755339a App!__tmainCRTStartup+0x155
0032fc04 77a89ef2 kernel32!BaseThreadInitThunk+0xe
0032fc44 77a89ec5 ntdll!__RtlUserThreadStart+0x70
0032fc5c 00000000 ntdll!_RtlUserThreadStart+0x1b

However, sometimes it is possible to see some execution residue (Volume 2, page 239) left on a raw stack such as hidden exceptions (Volume 1, page 239), module hints (Volume 6, page 92), error codes and handled exceptions (Volume 6, page 141) that might shed light on possible problem causes.

Another variant of this pattern is when a memory dump is saved after a problem message box is dismissed or potentially disastrous exceptions such as access violations are handled until the fault in exception handling mechanism or severe corruption resulted in unresponsive process or system (hang).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset