<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 112)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2010/10/27/crash-dump-analysis-patterns-part-112/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 05 May 2026 15:59:25 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2010/10/27/crash-dump-analysis-patterns-part-112/#comment-199546</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Wed, 03 Nov 2010 11:24:04 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2010/10/27/crash-dump-analysis-patterns-part-112/#comment-199546</guid>
		<description>The excepton handler may belong to an unloaded module causing stack overflow:

&lt;p align="left"&gt;&lt;code&gt;[...]
00000000`018cd4e0 00000000`772b96c5 ntdll!RtlpCallVectoredHandlers+0xac
00000000`018cd550 00000000`772c722a ntdll!RtlDispatchException+0x25
00000000`018cdbf0 000007fe`f992acc0 ntdll!KiUserExceptionDispatcher+0x2e
00000000`018ce188 00000000`772a38bb &#60;Unloaded_ModuleA.dll&gt;+0x3acc0
00000000`018ce190 00000000`772b96c5 ntdll!RtlpCallVectoredHandlers+0xac
00000000`018ce200 00000000`772c722a ntdll!RtlDispatchException+0x25
00000000`018ce8a0 00000000`772b3738 ntdll!KiUserExceptionDispatcher+0x2e
00000000`018cee40 00000000`772b3c64 ntdll!LdrpSearchResourceSection_U+0x16e
00000000`018cef70 00000000`7716e8b0 ntdll!LdrFindResource_U+0x44
00000000`018cefb0 00000000`6eadac42 kernel32!FindResourceExW+0x84
[...]
00000000`018cfef0 00000000`772a6991 kernel32!BaseThreadInitThunk+0xd
00000000`018cff20 00000000`00000000 ntdll!RtlUserThreadStart+0x1d&lt;/code&gt;&lt;/p&gt;</description>
		<content:encoded><![CDATA[<p>The excepton handler may belong to an unloaded module causing stack overflow:</p>
<p align="left"><code>[...]<br />
00000000`018cd4e0 00000000`772b96c5 ntdll!RtlpCallVectoredHandlers+0xac<br />
00000000`018cd550 00000000`772c722a ntdll!RtlDispatchException+0x25<br />
00000000`018cdbf0 000007fe`f992acc0 ntdll!KiUserExceptionDispatcher+0x2e<br />
00000000`018ce188 00000000`772a38bb &lt;Unloaded_ModuleA.dll>+0x3acc0<br />
00000000`018ce190 00000000`772b96c5 ntdll!RtlpCallVectoredHandlers+0xac<br />
00000000`018ce200 00000000`772c722a ntdll!RtlDispatchException+0x25<br />
00000000`018ce8a0 00000000`772b3738 ntdll!KiUserExceptionDispatcher+0x2e<br />
00000000`018cee40 00000000`772b3c64 ntdll!LdrpSearchResourceSection_U+0x16e<br />
00000000`018cef70 00000000`7716e8b0 ntdll!LdrFindResource_U+0x44<br />
00000000`018cefb0 00000000`6eadac42 kernel32!FindResourceExW+0x84<br />
[...]<br />
00000000`018cfef0 00000000`772a6991 kernel32!BaseThreadInitThunk+0xd<br />
00000000`018cff20 00000000`00000000 ntdll!RtlUserThreadStart+0x1d</code></p>
]]></content:encoded>
	</item>
</channel>
</rss>
