<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 18)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Wed, 06 May 2026 04:50:59 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-767711</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sat, 02 Apr 2022 12:25:37 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-767711</guid>
		<description>A laptop switched off during dump file write:

&lt;p align=left&gt;Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.&lt;/p&gt;

&lt;p align=left&gt;Dump completed successfully, progress percentage: 65&lt;/p&gt;

&lt;p align=left&gt;Symbol search path is: srv*
Executable search path is: 
Missing image name, possible paged-out or corrupt data.
Unable to load image Unknown_Module_65000000`00b7fc41, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_65000000`00b7fc41
Debugger can not determine kernel base address
Windows 10 Kernel Version 22000 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff807`3a800000 PsLoadedModuleList = 0xfffff807`3b429b90
Debug session time: Sat Apr  2 13:08:14.826 2022 (UTC + 1:00)
System Uptime: 16 days 13:25:19.305
Page 40500fe039 too large to be in the dump file.
Page 54f0b7fe91 too large to be in the dump file.
Page 9646e65230 too large to be in the dump file.
Page 5f0127b460 too large to be in the dump file.
Page 23cc8250 too large to be in the dump file.
Missing image name, possible paged-out or corrupt data.
Unable to load image Unknown_Module_65000000`00b7fc41, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_65000000`00b7fc41
Debugger can not determine kernel base address
Loading Kernel Symbols
Missing image name, possible paged-out or corrupt data.
.Unable to read KLDR_DATA_TABLE_ENTRY at 3cb77e4e`2bb76537 - NTSTATUS 0xC0000141&lt;/p&gt;

&lt;p align=left&gt;Image path too long, possible corrupt data.
Loading unloaded module list
..Image path too long, possible corrupt data.&lt;/p&gt;</description>
		<content:encoded><![CDATA[<p>A laptop switched off during dump file write:</p>
<p align=left>Loading Dump File [C:\Windows\MEMORY.DMP]<br />
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.</p>
<p align=left>Dump completed successfully, progress percentage: 65</p>
<p align=left>Symbol search path is: srv*<br />
Executable search path is:<br />
Missing image name, possible paged-out or corrupt data.<br />
Unable to load image Unknown_Module_65000000`00b7fc41, Win32 error 0n2<br />
*** WARNING: Unable to verify timestamp for Unknown_Module_65000000`00b7fc41<br />
Debugger can not determine kernel base address<br />
Windows 10 Kernel Version 22000 MP (8 procs) Free x64<br />
Product: WinNt, suite: TerminalServer SingleUserTS<br />
Edition build lab: 22000.1.amd64fre.co_release.210604-1628<br />
Machine Name:<br />
Kernel base = 0xfffff807`3a800000 PsLoadedModuleList = 0xfffff807`3b429b90<br />
Debug session time: Sat Apr  2 13:08:14.826 2022 (UTC + 1:00)<br />
System Uptime: 16 days 13:25:19.305<br />
Page 40500fe039 too large to be in the dump file.<br />
Page 54f0b7fe91 too large to be in the dump file.<br />
Page 9646e65230 too large to be in the dump file.<br />
Page 5f0127b460 too large to be in the dump file.<br />
Page 23cc8250 too large to be in the dump file.<br />
Missing image name, possible paged-out or corrupt data.<br />
Unable to load image Unknown_Module_65000000`00b7fc41, Win32 error 0n2<br />
*** WARNING: Unable to verify timestamp for Unknown_Module_65000000`00b7fc41<br />
Debugger can not determine kernel base address<br />
Loading Kernel Symbols<br />
Missing image name, possible paged-out or corrupt data.<br />
.Unable to read KLDR_DATA_TABLE_ENTRY at 3cb77e4e`2bb76537 - NTSTATUS 0xC0000141</p>
<p align=left>Image path too long, possible corrupt data.<br />
Loading unloaded module list<br />
..Image path too long, possible corrupt data.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Structural Memory Patterns (Part 1)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-186343</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Structural Memory Patterns (Part 1)</dc:creator>
		<pubDate>Fri, 24 Sep 2010 10:55:34 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-186343</guid>
		<description>[...] Truncated Dump [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Truncated Dump [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Truncated dump, spiking thread, not my version and hooked functions: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-175805</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Truncated dump, spiking thread, not my version and hooked functions: pattern cooperation</dc:creator>
		<pubDate>Fri, 13 Aug 2010 19:16:00 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-175805</guid>
		<description>[...] We also see that this thread spent more than a minute in user mode. Unfortunately we cannot see its thread stack because the dump shows signs of Truncated Dump pattern: [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] We also see that this thread spent more than a minute in user mode. Unfortunately we cannot see its thread stack because the dump shows signs of Truncated Dump pattern: [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 34)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-150571</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 34)</dc:creator>
		<pubDate>Fri, 07 May 2010 14:08:49 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-150571</guid>
		<description>[...] we introduce an icon for Truncated Dump [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] we introduce an icon for Truncated Dump [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Truncated dump, stack trace collection, waiting thread time and wait chains: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-93420</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Truncated dump, stack trace collection, waiting thread time and wait chains: pattern cooperation</dc:creator>
		<pubDate>Thu, 10 Sep 2009 15:16:32 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-93420</guid>
		<description>[...] this nonsense I checked that complete dump was truncated by half because page file was 4Gb but the amount of physical memory was [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] this nonsense I checked that complete dump was truncated by half because page file was 4Gb but the amount of physical memory was [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Sparse complete x64 memory dumps</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-49043</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Sparse complete x64 memory dumps</dc:creator>
		<pubDate>Thu, 30 Oct 2008 15:49:08 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-49043</guid>
		<description>[...] memory dumps could be smaller than the actual amount of physical memory and even when possibly truncated with many OS structures being included. For the virtual memory stats above the size of complete [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] memory dumps could be smaller than the actual amount of physical memory and even when possibly truncated with many OS structures being included. For the virtual memory stats above the size of complete [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; 10 Common Mistakes in Memory Analysis (Part 3)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-48948</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; 10 Common Mistakes in Memory Analysis (Part 3)</dc:creator>
		<pubDate>Wed, 29 Oct 2008 19:03:13 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/20/crash-dump-analysis-patterns-part-18/#comment-48948</guid>
		<description>[...] the common mistake of not looking at all stack traces. This important when the dump is partially truncated or inconsistent. For example, in one complete memory dump from one hang system WinDbg !locks [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] the common mistake of not looking at all stack traces. This important when the dump is partially truncated or inconsistent. For example, in one complete memory dump from one hang system WinDbg !locks [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
