<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 178)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2012/06/27/crash-dump-analysis-patterns-part-178/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 19 May 2026 08:04:50 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2012/06/27/crash-dump-analysis-patterns-part-178/#comment-767709</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sat, 19 Feb 2022 16:09:18 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2012/06/27/crash-dump-analysis-patterns-part-178/#comment-767709</guid>
		<description>Some recent example:

0:001&#62; kc
 # Call Site
00 ntdll!NtWaitForMultipleObjects
01 KERNELBASE!WaitForMultipleObjectsEx
02 KERNELBASE!WaitForMultipleObjects
03 kernel32!WerpReportFaultInternal
04 kernel32!WerpReportFault
05 KERNELBASE!UnhandledExceptionFilter
06 ntdll!LdrpLogFatalUserCallbackException
07 ntdll!KiUserCallbackDispatcherHandler
08 ntdll!RtlpExecuteHandlerForException
09 ntdll!RtlDispatchException
0a ntdll!KiUserExceptionDispatch
0b &#60;Unloaded_Windows.UI.Immersive.dll&#62;
0c SHCore!CallNextSubclassProc
0d SHCore!MasterSubclassProc
0e user32!UserCallWinProcCheckWow
0f user32!DispatchClientMessage
10 user32!_fnDWORD
11 ntdll!KiUserCallbackDispatcherContinue
12 user32!NtUserPeekMessage
13 user32!PeekMessageW
14 Windows_UI!Windows::UI::Core::CDispatcher::ProcessMessage
15 Windows_UI!Windows::UI::Core::CDispatcher::WaitAndProcessMessages
16 Windows_UI!Windows::UI::Core::CDispatcher::ProcessEvents
17 Windows_UI_Xaml!CJupiterWindow::RunCoreWindowMessageLoop
18 Windows_UI_Xaml!CJupiterControl::RunMessageLoop
19 Windows_UI_Xaml!DirectUI::DXamlCore::RunMessageLoop
1a twinapi_appcore!Windows::ApplicationModel::Core::CoreApplicationView::Run
[...]
1d kernel32!BaseThreadInitThunk
1e ntdll!RtlUserThreadStart
</description>
		<content:encoded><![CDATA[<p>Some recent example:</p>
<p>0:001&gt; kc<br />
 # Call Site<br />
00 ntdll!NtWaitForMultipleObjects<br />
01 KERNELBASE!WaitForMultipleObjectsEx<br />
02 KERNELBASE!WaitForMultipleObjects<br />
03 kernel32!WerpReportFaultInternal<br />
04 kernel32!WerpReportFault<br />
05 KERNELBASE!UnhandledExceptionFilter<br />
06 ntdll!LdrpLogFatalUserCallbackException<br />
07 ntdll!KiUserCallbackDispatcherHandler<br />
08 ntdll!RtlpExecuteHandlerForException<br />
09 ntdll!RtlDispatchException<br />
0a ntdll!KiUserExceptionDispatch<br />
0b &lt;Unloaded_Windows.UI.Immersive.dll&gt;<br />
0c SHCore!CallNextSubclassProc<br />
0d SHCore!MasterSubclassProc<br />
0e user32!UserCallWinProcCheckWow<br />
0f user32!DispatchClientMessage<br />
10 user32!_fnDWORD<br />
11 ntdll!KiUserCallbackDispatcherContinue<br />
12 user32!NtUserPeekMessage<br />
13 user32!PeekMessageW<br />
14 Windows_UI!Windows::UI::Core::CDispatcher::ProcessMessage<br />
15 Windows_UI!Windows::UI::Core::CDispatcher::WaitAndProcessMessages<br />
16 Windows_UI!Windows::UI::Core::CDispatcher::ProcessEvents<br />
17 Windows_UI_Xaml!CJupiterWindow::RunCoreWindowMessageLoop<br />
18 Windows_UI_Xaml!CJupiterControl::RunMessageLoop<br />
19 Windows_UI_Xaml!DirectUI::DXamlCore::RunMessageLoop<br />
1a twinapi_appcore!Windows::ApplicationModel::Core::CoreApplicationView::Run<br />
[&#8230;]<br />
1d kernel32!BaseThreadInitThunk<br />
1e ntdll!RtlUserThreadStart</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2012/06/27/crash-dump-analysis-patterns-part-178/#comment-742015</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sat, 22 Aug 2020 12:00:17 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2012/06/27/crash-dump-analysis-patterns-part-178/#comment-742015</guid>
		<description>Sometimes, the module may not be shown as unloaded on the stack trace if there are no symbols for it. So we may need to see if it is in the loaded modules list (lm).</description>
		<content:encoded><![CDATA[<p>Sometimes, the module may not be shown as unloaded on the stack trace if there are no symbols for it. So we may need to see if it is in the loaded modules list (lm).</p>
]]></content:encoded>
	</item>
</channel>
</rss>
