<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Dmp2Txt: Solving Security Problem</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 05 May 2026 14:30:50 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Sparse complete x64 memory dumps</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-49052</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Sparse complete x64 memory dumps</dc:creator>
		<pubDate>Thu, 30 Oct 2008 17:57:00 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-49052</guid>
		<description>[...] For really huge dumps WinDbg scripts collecting data on-site might be a solution too (see Dmp2Txt: Solving Security Problem for WinDbg script [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] For really huge dumps WinDbg scripts collecting data on-site might be a solution too (see Dmp2Txt: Solving Security Problem for WinDbg script [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-21832</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Fri, 28 Mar 2008 15:51:36 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-21832</guid>
		<description>Instead of .for loop we can use the following command and simplify our script:

&lt;p align="left"&gt;&lt;code&gt;!for_each_process ".process /r /p @#Process; !process @#Process; !ntsdexts.locks; lmv"&lt;/code&gt;&lt;/p&gt;</description>
		<content:encoded><![CDATA[<p>Instead of .for loop we can use the following command and simplify our script:</p>
<p align="left"><code>!for_each_process ".process /r /p @#Process; !process @#Process; !ntsdexts.locks; lmv"</code></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dreamyguy</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-3141</link>
		<dc:creator>Dreamyguy</dc:creator>
		<pubDate>Mon, 16 Jul 2007 09:26:39 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-3141</guid>
		<description>Yes, you were right! It worked this time. Thanks :-)</description>
		<content:encoded><![CDATA[<p>Yes, you were right! It worked this time. Thanks <img src='https://www.dumpanalysis.org/blog/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-3039</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Thu, 12 Jul 2007 16:59:48 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-3039</guid>
		<description>&lt;p&gt;This is because of quotes changed by Wordpress. In the original post they were "”?  but should be &lt;code&gt;""&lt;/code&gt;. I enclosed the command under code tag and quotes are shown correct now: &lt;/p&gt;
&lt;p&gt;&lt;code&gt;C:\Program Files\Debugging Tools for Windows&#62;WinDbg.exe -y "srv*c:\mss*http://msdl.microsoft.com/download/symbols" -z MEMORY.DMP -c "$$&#62;&#60;c:\WinDbgScripts\Dmp2Txt.txt;q" -Q -QS -QY -QSY&lt;/code&gt;&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>This is because of quotes changed by Wordpress. In the original post they were &#8220;”?  but should be <code>""</code>. I enclosed the command under code tag and quotes are shown correct now: </p>
<p><code>C:\Program Files\Debugging Tools for Windows&gt;WinDbg.exe -y "srv*c:\mss*http://msdl.microsoft.com/download/symbols" -z MEMORY.DMP -c "$$&gt;&lt;c:\WinDbgScripts\Dmp2Txt.txt;q" -Q -QS -QY -QSY</code></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dreamyguy</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-3027</link>
		<dc:creator>Dreamyguy</dc:creator>
		<pubDate>Thu, 12 Jul 2007 11:40:42 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-3027</guid>
		<description>I ran the following command: 

C:\Program Files\Debugging Tools for Windows&#62;windbg.exe -y "srv*C:\mysymbols*http://msdl.microsoft.com/download/symbols" -z c:\kk\memory_dipesh.dmp -c "$$&#62; "$$;q”?
       ^ Syntax error in '"$$;q”?'

When I go back and look at the script file i.e. kedmp2.txt, it's empty.

Any suggestions?</description>
		<content:encoded><![CDATA[<p>I ran the following command: </p>
<p>C:\Program Files\Debugging Tools for Windows&gt;windbg.exe -y &#8220;srv*C:\mysymbols*http://msdl.microsoft.com/download/symbols&#8221; -z c:\kk\memory_dipesh.dmp -c &#8220;$$&gt; &#8220;$$;q”?<br />
       ^ Syntax error in &#8216;&#8221;$$;q”?&#8217;</p>
<p>When I go back and look at the script file i.e. kedmp2.txt, it&#8217;s empty.</p>
<p>Any suggestions?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-1923</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Tue, 22 May 2007 09:31:29 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-1923</guid>
		<description>Today I have found that !process 0 ff is less accurate in depicting user space stack traces in some complete memory dumps than the old combination of .reload/!process. To speed up reloading symbols I would recommend .reload /user</description>
		<content:encoded><![CDATA[<p>Today I have found that !process 0 ff is less accurate in depicting user space stack traces in some complete memory dumps than the old combination of .reload/!process. To speed up reloading symbols I would recommend .reload /user</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-1897</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Mon, 21 May 2007 15:02:50 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/12/09/dmp2txt-solving-security-problem/#comment-1897</guid>
		<description>For XP/W2K3 and higher you can simplify the script at the cost of excluding process critical section locks:

$$
$$ Dmp2Txt: Dump all necessary information from complete full memory dump into log
$$
.logopen /d
!analyze -v
!vm 4
lmv
!locks
!poolused 3
!poolused 4
!exqueue f
!irpfind
!stacks
!process 0 ff
.logclose
$$
$$ Dmp2Txt: End of File
$$</description>
		<content:encoded><![CDATA[<p>For XP/W2K3 and higher you can simplify the script at the cost of excluding process critical section locks:</p>
<p>$$<br />
$$ Dmp2Txt: Dump all necessary information from complete full memory dump into log<br />
$$<br />
.logopen /d<br />
!analyze -v<br />
!vm 4<br />
lmv<br />
!locks<br />
!poolused 3<br />
!poolused 4<br />
!exqueue f<br />
!irpfind<br />
!stacks<br />
!process 0 ff<br />
.logclose<br />
$$<br />
$$ Dmp2Txt: End of File<br />
$$</p>
]]></content:encoded>
	</item>
</channel>
</rss>
