<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Raw Stack Dump of all threads</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 05 May 2026 12:25:24 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Raw Stack Dump of all threads (part 4)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-191224</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Raw Stack Dump of all threads (part 4)</dc:creator>
		<pubDate>Fri, 08 Oct 2010 15:34:40 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-191224</guid>
		<description>[...] Experts Magazine Online The previously published script to dump raw stack of all threads dumps only 64-bit raw stack from 64-bit WOW64 process memory dumps (a 32-bit process saved in a [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Experts Magazine Online The previously published script to dump raw stack of all threads dumps only 64-bit raw stack from 64-bit WOW64 process memory dumps (a 32-bit process saved in a [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Raw Stack Dump of all threads (part 3)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-74073</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Raw Stack Dump of all threads (part 3)</dc:creator>
		<pubDate>Mon, 11 May 2009 14:16:03 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-74073</guid>
		<description>[...] the script featured in part 1 doesn&#8217;t work because of the lack of symbols or [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] the script featured in part 1 doesn&#8217;t work because of the lack of symbols or [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Hooksware</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-37543</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Hooksware</dc:creator>
		<pubDate>Sun, 10 Aug 2008 11:27:14 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-37543</guid>
		<description>[...] stack output of dds command reveals them but beware of Coincidental Symbolic Information. See also Raw Stack Dump of all threads (process dumps) and Raw Stack Dump of all threads (part 2) (complete memory [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] stack output of dds command reveals them but beware of Coincidental Symbolic Information. See also Raw Stack Dump of all threads (process dumps) and Raw Stack Dump of all threads (part 2) (complete memory [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-36968</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Tue, 05 Aug 2008 12:24:58 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-36968</guid>
		<description>If you get this error 

Symbol ntdll!_NT_TIB not found.

try to omit ntdll because sometimes the structure is imported into an application module or another DLL:

&lt;p align="left"&gt;0:071&gt; dt _NT_TIB
Application!_NT_TIB
   +0x000 ExceptionList    : Ptr32 _EXCEPTION_REGISTRATION_RECORD
   +0x004 StackBase        : Ptr32 Void
   +0x008 StackLimit       : Ptr32 Void
   +0x00c SubSystemTib     : Ptr32 Void
   +0x010 FiberData        : Ptr32 Void
   +0x010 Version          : Uint4B
   +0x014 ArbitraryUserPointer : Ptr32 Void
   +0x018 Self             : Ptr32 _NT_TIB&lt;/p&gt;</description>
		<content:encoded><![CDATA[<p>If you get this error </p>
<p>Symbol ntdll!_NT_TIB not found.</p>
<p>try to omit ntdll because sometimes the structure is imported into an application module or another DLL:</p>
<p align="left">0:071> dt _NT_TIB<br />
Application!_NT_TIB<br />
   +0&#215;000 ExceptionList    : Ptr32 _EXCEPTION_REGISTRATION_RECORD<br />
   +0&#215;004 StackBase        : Ptr32 Void<br />
   +0&#215;008 StackLimit       : Ptr32 Void<br />
   +0&#215;00c SubSystemTib     : Ptr32 Void<br />
   +0&#215;010 FiberData        : Ptr32 Void<br />
   +0&#215;010 Version          : Uint4B<br />
   +0&#215;014 ArbitraryUserPointer : Ptr32 Void<br />
   +0&#215;018 Self             : Ptr32 _NT_TIB</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 60)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-24966</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 60)</dc:creator>
		<pubDate>Tue, 29 Apr 2008 11:28:26 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-24966</guid>
		<description>[...] a NULL thread procedure pointer to CreateThread function. We might expect to see little in the raw stack data because there was no user-supplied thread code. In reality, if we dump it we would see lots of [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] a NULL thread procedure pointer to CreateThread function. We might expect to see little in the raw stack data because there was no user-supplied thread code. In reality, if we dump it we would see lots of [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Raw Stack Dump of all threads (part 2)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-14419</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Raw Stack Dump of all threads (part 2)</dc:creator>
		<pubDate>Mon, 24 Dec 2007 19:53:56 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/28/raw-stack-dump-from-all-threads/#comment-14419</guid>
		<description>[...] the previous part I used WinDbg scripting to get raw stack data from user process dump. However the script needs to be modified if the dump is complete memory dump. Here I use [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] the previous part I used WinDbg scripting to get raw stack data from user process dump. However the script needs to be modified if the dump is complete memory dump. Here I use [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
