This is an important pattern for differential memory dump analysis, for example, when memory dumps were generated before and after a problem such as a CPU spike or hang. In the example below we have a normal expected thread stack trace from a memory dump saved before an application was reported unresponsive and another different thread stack trace after:
3 Id: 24b8.24e4 Suspend: 0 Teb: 7efa1000 Unfrozen ChildEBP RetAddr 037dfadc 75210bdd ntdll!ZwWaitForMultipleObjects+0x15 037dfb78 75791a2c KERNELBASE!WaitForMultipleObjectsEx+0x100 037dfbc0 7511086a kernel32!WaitForMultipleObjectsExImplementation+0xe0 037dfc14 00d17c1d user32!RealMsgWaitForMultipleObjectsEx+0x14d 037dfc3c 00ce161d ApplicationA!MsgWaitForMultipleObjects+0x2d 037dfc60 00cdc757 ApplicationA!WaitForSignal+0x1d 037dfc80 00cdaaf6 ApplicationA!WorkLoop+0x57 037dfca4 7579339a ApplicationA!ThreadStart+0x26 037dfcb0 77699ef2 kernel32!BaseThreadInitThunk+0xe 037dfcf0 77699ec5 ntdll!__RtlUserThreadStart+0x70 037dfd08 00000000 ntdll!_RtlUserThreadStart+0x1b
3 Id: 24b8.24e4 Suspend: 0 Teb: 7efa1000 Unfrozen ChildEBP RetAddr 037df38c 752131bb ntdll!ZwDelayExecution+0x15 037df3f4 75213a8b KERNELBASE!SleepEx+0x65 037df404 00d1670b KERNELBASE!Sleep+0xf 037df40c 00d350ef ApplicationA!Sleep+0xb 037df430 6a868aab ApplicationA!PutData+0xbf 037df444 6a8662ec ModuleA!OutputData+0x1b 037df464 00d351de ModuleA!ProcessData+0x16c 037df4a4 00ca8cb4 ApplicationA!SendData+0xbe [...]