<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 11)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Thu, 07 May 2026 03:26:18 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-767701</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Wed, 06 Oct 2021 17:24:07 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-767701</guid>
		<description>These may also result from the incorrect application of .process/.thread commands incomplete memory dumps that do not take into account process virtual memory mapping.</description>
		<content:encoded><![CDATA[<p>These may also result from the incorrect application of .process/.thread commands incomplete memory dumps that do not take into account process virtual memory mapping.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-741645</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Mon, 17 Feb 2014 00:00:06 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-741645</guid>
		<description>To check the correctness of some frames we can use the same method as described in Coincidental Symbolic Information pattern:

http://www.dumpanalysis.org/blog/index.php/2007/08/30/crash-dump-analysis-patterns-part-24/

We use backwards disassembly on a return address:

0286f430 690e6daa mshtml!CBase::PrivateInvokeEx+0x6d
WARNING: Stack unwind information not available. Following frames may be wrong.
0286f494 6915f5c5 jscript9!DllGetClassObject+0x18bb1

0:005&#62; ub 690e6daa
jscript9!DllGetClassObject+0x18b9e:
690e6d97 ff7514          push    dword ptr [ebp+14h]
690e6d9a ff7510          push    dword ptr [ebp+10h]
690e6d9d 8b06            mov     eax,dword ptr [esi]
690e6d9f 53              push    ebx
690e6da0 ff75ec          push    dword ptr [ebp-14h]
690e6da3 ff7508          push    dword ptr [ebp+8]
690e6da6 56              push    esi
690e6da7 ff5020          call    dword ptr [eax+20h]</description>
		<content:encoded><![CDATA[<p>To check the correctness of some frames we can use the same method as described in Coincidental Symbolic Information pattern:</p>
<p><a href="http://www.dumpanalysis.org/blog/index.php/2007/08/30/crash-dump-analysis-patterns-part-24/" rel="nofollow">http://www.dumpanalysis.org/blog/index.php/2007/08/30/crash-dump-analysis-patterns-part-24/</a></p>
<p>We use backwards disassembly on a return address:</p>
<p>0286f430 690e6daa mshtml!CBase::PrivateInvokeEx+0&#215;6d<br />
WARNING: Stack unwind information not available. Following frames may be wrong.<br />
0286f494 6915f5c5 jscript9!DllGetClassObject+0&#215;18bb1</p>
<p>0:005&gt; ub 690e6daa<br />
jscript9!DllGetClassObject+0&#215;18b9e:<br />
690e6d97 ff7514          push    dword ptr [ebp+14h]<br />
690e6d9a ff7510          push    dword ptr [ebp+10h]<br />
690e6d9d 8b06            mov     eax,dword ptr [esi]<br />
690e6d9f 53              push    ebx<br />
690e6da0 ff75ec          push    dword ptr [ebp-14h]<br />
690e6da3 ff7508          push    dword ptr [ebp+8]<br />
690e6da6 56              push    esi<br />
690e6da7 ff5020          call    dword ptr [eax+20h]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 114)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-201567</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 114)</dc:creator>
		<pubDate>Tue, 09 Nov 2010 12:03:08 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-201567</guid>
		<description>[...] trace may or may not be included here and it might be incorrect, heuristic and not fully discernible automatically (requires raw stack semantic analysis) like in [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] trace may or may not be included here and it might be incorrect, heuristic and not fully discernible automatically (requires raw stack semantic analysis) like in [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Incorrect stack trace, stack overflow, early crash dump, nested exception, problem exception handler and same vendor: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-198596</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Incorrect stack trace, stack overflow, early crash dump, nested exception, problem exception handler and same vendor: pattern cooperation</dc:creator>
		<pubDate>Sat, 30 Oct 2010 23:59:02 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-198596</guid>
		<description>[...] Debugging Experts Magazine Online This case study centers on 3 process dump files (two first chance exception and one second chance exception). To recall the difference between them please read first chance exceptions explained series. When we get first and second chance exception dumps together we usually open a second chance exception dump first. However, in this case, the second chance exception dump had an incorrect stack trace: [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Debugging Experts Magazine Online This case study centers on 3 process dump files (two first chance exception and one second chance exception). To recall the difference between them please read first chance exceptions explained series. When we get first and second chance exception dumps together we usually open a second chance exception dump first. However, in this case, the second chance exception dump had an incorrect stack trace: [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 19)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-141766</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 19)</dc:creator>
		<pubDate>Wed, 07 Apr 2010 14:53:57 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-141766</guid>
		<description>[...] we introduce an icon for Incorrect Stack Trace [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] we introduce an icon for Incorrect Stack Trace [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Reflecting on 2008 (Part 1)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-119533</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Reflecting on 2008 (Part 1)</dc:creator>
		<pubDate>Wed, 27 Jan 2010 00:47:59 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-119533</guid>
		<description>[...] dereferencing null debug windows crash dump analysis system_service_exception kernel32!pnlsuserinfo warning: frame ip not in any known module. following frames may be wrong. win32 error 0n2 previously announced volume is available in trade windbg script [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] dereferencing null debug windows crash dump analysis system_service_exception kernel32!pnlsuserinfo warning: frame ip not in any known module. following frames may be wrong. win32 error 0n2 previously announced volume is available in trade windbg script [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Manual dump, virtualized process, stack trace collection, multiple exceptions, optimized code, wild code pointer, incorrect stack trace and hidden exception: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-99103</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Manual dump, virtualized process, stack trace collection, multiple exceptions, optimized code, wild code pointer, incorrect stack trace and hidden exception: pattern cooperation</dc:creator>
		<pubDate>Wed, 14 Oct 2009 19:46:38 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-99103</guid>
		<description>[...] 0&#215;161dc2c so we might guess that this was an instance of wild code pointer or the case of incorrect stack trace. However using techniques to get exception context from hidden exceptions we get the following [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] 0&#215;161dc2c so we might guess that this was an instance of wild code pointer or the case of incorrect stack trace. However using techniques to get exception context from hidden exceptions we get the following [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; WOW64 process, NULL data pointer, stack overflow, main thread, incorrect stack trace, nested exceptions, hidden exception, manual dump, multiple exceptions and virtualized system: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-97625</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; WOW64 process, NULL data pointer, stack overflow, main thread, incorrect stack trace, nested exceptions, hidden exception, manual dump, multiple exceptions and virtualized system: pattern cooperation</dc:creator>
		<pubDate>Mon, 05 Oct 2009 22:20:35 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-97625</guid>
		<description>[...] there is a possibility of an exception in main GUI thread and also the stack trace itself looks incorrect, suddenly sending a Windows message without any kind of a message [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] there is a possibility of an exception in main GUI thread and also the stack trace itself looks incorrect, suddenly sending a Windows message without any kind of a message [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Virtualized process, incorrect stack trace, stack trace collection, multiple exceptions, optimized code and C++ exception: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-83536</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Virtualized process, incorrect stack trace, stack trace collection, multiple exceptions, optimized code and C++ exception: pattern cooperation</dc:creator>
		<pubDate>Wed, 08 Jul 2009 19:54:58 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-83536</guid>
		<description>[...] the shown above stack trace is incorrect but at the same time the first thread stack looks [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] the shown above stack trace is incorrect but at the same time the first thread stack looks [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; The Importance of Symbols</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-78956</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; The Importance of Symbols</dc:creator>
		<pubDate>Sat, 13 Jun 2009 23:46:45 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/04/03/crash-dump-analysis-patterns-part-11/#comment-78956</guid>
		<description>[...] post looks at incorrect stack traces in more detail and provides an example and explanation of why WinDbg is not able to get them right [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] post looks at incorrect stack traces in more detail and provides an example and explanation of why WinDbg is not able to get them right [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
