{"componentChunkName":"component---src-templates-post-template-js","path":"/windows-windbg-005-kernel-dump-en","result":{"data":{"markdownRemark":{"id":"0c19f2b3-544e-5397-a5a3-5408686b2541","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/windows-windbg-005-kernel-dump\">original page</a>.</p>\n</blockquote>\n<p>My goal is to become proficient with WinDbg for Windows debugging and dump-based troubleshooting.</p>\n<p>In a previous article, <a href=\"/windows-windbg-004-kernel-debug-en\">First Steps in Kernel Debugging with WinDbg on Windows 10</a>, I covered how to get started with kernel-mode debugging using WinDbg.</p>\n<p>This time, rather than live debugging, I’ll walk through how to analyze a kernel memory dump.</p>\n<p>For a full list of articles on Windows debugging and dump analysis with WinDbg, see the index page:</p>\n<p>Reference: <a href=\"/windows-windbg-001-index-en\">Debugging and Troubleshooting Techniques with WinDbg</a></p>\n<p>This article covers the following topics.</p>\n<!-- omit in toc -->\n<h2 id=\"table-of-contents\" style=\"position:relative;\"><a href=\"#table-of-contents\" aria-label=\"table of contents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Table of Contents</h2>\n<ul>\n<li>\n<p><a href=\"#tools-used\">Tools Used</a></p>\n<ul>\n<li><a href=\"#windbg-preview\">WinDbg Preview</a></li>\n<li><a href=\"#notmyfault\">NotMyFault</a></li>\n</ul>\n</li>\n<li>\n<p><a href=\"#capturing-a-kernel-memory-dump\">Capturing a Kernel Memory Dump</a></p>\n<ul>\n<li><a href=\"#configuring-everything-with-a-powershell-script-added-july-2023\">Configuring Everything with a PowerShell Script (Added July 2023)</a></li>\n<li><a href=\"#changing-settings-via-control-panel\">Changing Settings via Control Panel</a></li>\n<li><a href=\"#obtaining-notmyfault\">Obtaining NotMyFault</a></li>\n<li><a href=\"#capturing-the-memory-dump\">Capturing the Memory Dump</a></li>\n</ul>\n</li>\n<li>\n<p><a href=\"#analyzing-the-kernel-memory-dump\">Analyzing the Kernel Memory Dump</a></p>\n<ul>\n<li><a href=\"#loading-the-dump-file-into-windbg\">Loading the Dump File into WinDbg</a></li>\n<li><a href=\"#reading-the-output-at-load-time\">Reading the Output at Load Time</a></li>\n<li><a href=\"#running-automatic-analysis-with-analyze--v\">Running Automatic Analysis with !analyze -v</a></li>\n<li><a href=\"#analyzing-the-stack-back-trace\">Analyzing the Stack Back Trace</a></li>\n<li><a href=\"#restoring-a-thread-from-a-trap-frame\">Restoring a Thread from a Trap Frame</a></li>\n<li><a href=\"#inspecting-processes\">Inspecting Processes</a></li>\n</ul>\n</li>\n<li><a href=\"#wrap-up\">Wrap-up</a></li>\n</ul>\n<h2 id=\"tools-used\" style=\"position:relative;\"><a href=\"#tools-used\" aria-label=\"tools used permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Tools Used</h2>\n<p>In this article I’m using the following two tools on a Windows 10 system.</p>\n<ul>\n<li>WinDbg Preview</li>\n<li>notmyfault64</li>\n</ul>\n<h3 id=\"windbg-preview\" style=\"position:relative;\"><a href=\"#windbg-preview\" aria-label=\"windbg preview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>WinDbg Preview</h3>\n<p>WinDbg Preview is the UWP version of WinDbg available from the Microsoft Store.</p>\n<p>Compared to the classic WinDbg included in Windows Debug Tools, it features a much more modern UI and adds support for Time Travel Debugging (TTD), among other improvements.</p>\n<p>It shares the same underlying engine as the classic WinDbg, so all existing functionality continues to work.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugging-using-windbg-preview\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Debugging Using WinDbg Preview - Windows drivers | Microsoft Docs</a></p>\n<h3 id=\"notmyfault\" style=\"position:relative;\"><a href=\"#notmyfault\" aria-label=\"notmyfault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>NotMyFault</h3>\n<p>NotMyFault is a tool for manually generating the memory dump that would normally be produced when a computer crashes.</p>\n<p>It can be obtained from the link in the following document.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/en-us/windows/client-management/generate-kernel-or-complete-crash-dump\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Generate a kernel or complete crash dump - Windows Client Management | Microsoft Docs</a></p>\n<h2 id=\"capturing-a-kernel-memory-dump\" style=\"position:relative;\"><a href=\"#capturing-a-kernel-memory-dump\" aria-label=\"capturing a kernel memory dump permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Capturing a Kernel Memory Dump</h2>\n<p>First, let’s capture a kernel memory dump for analysis.</p>\n<h3 id=\"configuring-everything-with-a-powershell-script-added-july-2023\" style=\"position:relative;\"><a href=\"#configuring-everything-with-a-powershell-script-added-july-2023\" aria-label=\"configuring everything with a powershell script added july 2023 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Configuring Everything with a PowerShell Script (Added July 2023)</h3>\n<p>The following article describes how to configure full memory dump capture settings and keyboard-crash settings all at once with a PowerShell script.</p>\n<p>Reference: <a href=\"/windows-setting-fulldump-en\">Configure Windows Full Memory Dump and Keyboard Crash Settings with a PowerShell Script</a></p>\n<h3 id=\"changing-settings-via-control-panel\" style=\"position:relative;\"><a href=\"#changing-settings-via-control-panel\" aria-label=\"changing settings via control panel permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Changing Settings via Control Panel</h3>\n<p>Open Control Panel on the machine you want to capture a dump from and navigate to <strong>System and Security</strong>.</p>\n<p>Click <strong>System</strong>, then <strong>Advanced system settings</strong> to open the <strong>System Properties</strong> window.</p>\n<p>First, under the <strong>Performance</strong> section, change the virtual memory paging file size to a value at least 300 MB larger than the physical memory size.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 850px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/0be04a73a5284ec54ca5c110d4a54a5d/ae694/image-20230409203416047.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 85.83333333333334%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/0be04a73a5284ec54ca5c110d4a54a5d/8ac56/image-20230409203416047.webp 240w,\n/static/0be04a73a5284ec54ca5c110d4a54a5d/d3be9/image-20230409203416047.webp 480w,\n/static/0be04a73a5284ec54ca5c110d4a54a5d/10237/image-20230409203416047.webp 850w\"\n              sizes=\"(max-width: 850px) 100vw, 850px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/0be04a73a5284ec54ca5c110d4a54a5d/8ff5a/image-20230409203416047.png 240w,\n/static/0be04a73a5284ec54ca5c110d4a54a5d/e85cb/image-20230409203416047.png 480w,\n/static/0be04a73a5284ec54ca5c110d4a54a5d/ae694/image-20230409203416047.png 850w\"\n            sizes=\"(max-width: 850px) 100vw, 850px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/0be04a73a5284ec54ca5c110d4a54a5d/ae694/image-20230409203416047.png\"\n            alt=\"image-20230409203416047\"\n            title=\"image-20230409203416047\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Then click <strong>Settings</strong> under the <strong>Startup and Recovery</strong> section, and change the <strong>Write debugging information</strong> setting to <strong>Kernel memory dump</strong>.</p>\n<p>The final settings should look like the image below.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/df507aee8ef651273247df2766ef4b5b/0b533/image-16.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 58.75%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/df507aee8ef651273247df2766ef4b5b/8ac56/image-16.webp 240w,\n/static/df507aee8ef651273247df2766ef4b5b/d3be9/image-16.webp 480w,\n/static/df507aee8ef651273247df2766ef4b5b/b0a15/image-16.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/df507aee8ef651273247df2766ef4b5b/8ff5a/image-16.png 240w,\n/static/df507aee8ef651273247df2766ef4b5b/e85cb/image-16.png 480w,\n/static/df507aee8ef651273247df2766ef4b5b/0b533/image-16.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/df507aee8ef651273247df2766ef4b5b/0b533/image-16.png\"\n            alt=\"image-16.png\"\n            title=\"image-16.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Restart the OS to apply the settings.</p>\n<h3 id=\"obtaining-notmyfault\" style=\"position:relative;\"><a href=\"#obtaining-notmyfault\" aria-label=\"obtaining notmyfault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Obtaining NotMyFault</h3>\n<p>Download the ZIP file containing NotMyFault from the <strong>Generate a memory dump file manually</strong> section of the following document and extract it.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/en-us/windows/client-management/generate-kernel-or-complete-crash-dump\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Generate a kernel or complete crash dump - Windows Client Management | Microsoft Docs</a></p>\n<h3 id=\"capturing-the-memory-dump\" style=\"position:relative;\"><a href=\"#capturing-the-memory-dump\" aria-label=\"capturing the memory dump permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Capturing the Memory Dump</h3>\n<p>Close all windows and open Notepad.</p>\n<p>Type some text, then initiate a save operation but stop just before the file is written, as shown in the image below.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/f943dd66de27fc0bc932bf88313edd91/0b533/image-17.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.58333333333334%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/f943dd66de27fc0bc932bf88313edd91/8ac56/image-17.webp 240w,\n/static/f943dd66de27fc0bc932bf88313edd91/d3be9/image-17.webp 480w,\n/static/f943dd66de27fc0bc932bf88313edd91/b0a15/image-17.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/f943dd66de27fc0bc932bf88313edd91/8ff5a/image-17.png 240w,\n/static/f943dd66de27fc0bc932bf88313edd91/e85cb/image-17.png 480w,\n/static/f943dd66de27fc0bc932bf88313edd91/0b533/image-17.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/f943dd66de27fc0bc932bf88313edd91/0b533/image-17.png\"\n            alt=\"image-17.png\"\n            title=\"image-17.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>With Notepad in this state, run the NotMyFault tool you extracted earlier.\nYou will be prompted to agree to a EULA — click OK.</p>\n<p>When the tool opens, leave the default selection and click <strong>Crash</strong>.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 396px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/56332a5e1b75d8bd5ca15658b2030727/db910/image-18.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 116.25000000000001%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/56332a5e1b75d8bd5ca15658b2030727/8ac56/image-18.webp 240w,\n/static/56332a5e1b75d8bd5ca15658b2030727/2a0bc/image-18.webp 396w\"\n              sizes=\"(max-width: 396px) 100vw, 396px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/56332a5e1b75d8bd5ca15658b2030727/8ff5a/image-18.png 240w,\n/static/56332a5e1b75d8bd5ca15658b2030727/db910/image-18.png 396w\"\n            sizes=\"(max-width: 396px) 100vw, 396px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/56332a5e1b75d8bd5ca15658b2030727/db910/image-18.png\"\n            alt=\"image-18.png\"\n            title=\"image-18.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>The Windows machine will blue-screen and restart.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/5f27b29b3cbaa39e7cc0bd3d8142b686/0b533/image-19.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 74.58333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/5f27b29b3cbaa39e7cc0bd3d8142b686/8ac56/image-19.webp 240w,\n/static/5f27b29b3cbaa39e7cc0bd3d8142b686/d3be9/image-19.webp 480w,\n/static/5f27b29b3cbaa39e7cc0bd3d8142b686/b0a15/image-19.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/5f27b29b3cbaa39e7cc0bd3d8142b686/8ff5a/image-19.png 240w,\n/static/5f27b29b3cbaa39e7cc0bd3d8142b686/e85cb/image-19.png 480w,\n/static/5f27b29b3cbaa39e7cc0bd3d8142b686/0b533/image-19.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/5f27b29b3cbaa39e7cc0bd3d8142b686/0b533/image-19.png\"\n            alt=\"image-19.png\"\n            title=\"image-19.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>After the restart, confirm that <code class=\"language-text\">MEMORY.DMP</code> exists directly under <code class=\"language-text\">C:\\Windows</code>.\nIn my environment it was roughly 450 MB.</p>\n<p>The kernel memory dump has now been captured.</p>\n<h2 id=\"analyzing-the-kernel-memory-dump\" style=\"position:relative;\"><a href=\"#analyzing-the-kernel-memory-dump\" aria-label=\"analyzing the kernel memory dump permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Analyzing the Kernel Memory Dump</h2>\n<h3 id=\"loading-the-dump-file-into-windbg\" style=\"position:relative;\"><a href=\"#loading-the-dump-file-into-windbg\" aria-label=\"loading the dump file into windbg permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Loading the Dump File into WinDbg</h3>\n<p>Launch WinDbg with administrator privileges.</p>\n<p>Go to <strong>File</strong> → <strong>Open dump file</strong> and import the <code class=\"language-text\">MEMORY.DMP</code> file created earlier.\n(Loading a memory dump into WinDbg can take several minutes.)</p>\n<p>Once the dump is loaded, you will see output similar to the following:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">Loading Dump File <span class=\"token namespace\">[C:\\Windows\\MEMORY.DMP]</span>\nKernel Bitmap Dump File: Kernel address space is available<span class=\"token punctuation\">,</span> User address space may not be available<span class=\"token punctuation\">.</span>\n\nSymbol search path is: srv*\nExecutable search path is: \nWindows 10 Kernel Version 19041 <span class=\"token function\">MP</span> <span class=\"token punctuation\">(</span>3 procs<span class=\"token punctuation\">)</span> Free x64\nProduct: WinNt<span class=\"token punctuation\">,</span> suite: TerminalServer SingleUserTS\nEdition build lab: 19041<span class=\"token punctuation\">.</span>1<span class=\"token punctuation\">.</span>amd64fre<span class=\"token punctuation\">.</span>vb_release<span class=\"token punctuation\">.</span>191206-1406\nMachine Name:\nKernel base = 0xfffff800`62600000 PsLoadedModuleList = 0xfffff800`6322a230\nDebug session time: Thu Oct  7 20:33:12<span class=\"token punctuation\">.</span>945 2021 <span class=\"token punctuation\">(</span>UTC <span class=\"token operator\">+</span> 9:00<span class=\"token punctuation\">)</span>\nSystem Uptime: 0 days 0:00:54<span class=\"token punctuation\">.</span>755\nLoading Kernel Symbol</code></pre></div>\n<h3 id=\"reading-the-output-at-load-time\" style=\"position:relative;\"><a href=\"#reading-the-output-at-load-time\" aria-label=\"reading the output at load time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reading the Output at Load Time</h3>\n<p>The output above gives us the following information:</p>\n<ul>\n<li>The loaded dump file is a kernel memory dump</li>\n<li>The Windows kernel version, the number of CPU cores, and the bitness</li>\n<li>The addresses of <code class=\"language-text\">Kernel base</code> and <code class=\"language-text\">PsLoadedModuleList</code></li>\n<li><strong>Debug session time</strong>: the time at which the STOP error (blue screen) occurred</li>\n<li><strong>System Uptime</strong>: how long the system had been running before the crash (54 seconds in this test environment)</li>\n</ul>\n<p><code class=\"language-text\">Debug session time</code> and <code class=\"language-text\">System Uptime</code> in particular can be important clues during troubleshooting, so it’s worth checking them.</p>\n<h3 id=\"running-automatic-analysis-with-analyze--v\" style=\"position:relative;\"><a href=\"#running-automatic-analysis-with-analyze--v\" aria-label=\"running automatic analysis with analyze  v permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Running Automatic Analysis with !analyze -v</h3>\n<p>Next, run the automatic analysis command:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\"><span class=\"token operator\">!</span>analyze <span class=\"token operator\">-</span>v</code></pre></div>\n<p>The automatic analysis in modern versions of WinDbg is quite powerful, and even this single command reveals a great deal of information.</p>\n<p>The command produces a lot of output. Let’s look at a few key excerpts.</p>\n<p>The first thing printed is the crash analysis result. During troubleshooting, this is often a good starting point.</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">2: kd> <span class=\"token operator\">!</span>analyze <span class=\"token operator\">-</span>v\n<span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span>\n<span class=\"token operator\">*</span>                                                                             <span class=\"token operator\">*</span>\n<span class=\"token operator\">*</span>                        Bugcheck Analysis                                    <span class=\"token operator\">*</span>\n<span class=\"token operator\">*</span>                                                                             <span class=\"token operator\">*</span>\n<span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span>\n\nDRIVER_IRQL_NOT_LESS_OR_EQUAL <span class=\"token punctuation\">(</span>d1<span class=\"token punctuation\">)</span>\nAn attempt was made to access a pageable <span class=\"token punctuation\">(</span>or completely invalid<span class=\"token punctuation\">)</span> address at an\ninterrupt request level <span class=\"token punctuation\">(</span>IRQL<span class=\"token punctuation\">)</span> that is too high<span class=\"token punctuation\">.</span>  This is usually\ncaused by drivers <span class=\"token keyword\">using</span> improper addresses<span class=\"token punctuation\">.</span>\n<span class=\"token keyword\">If</span> kernel debugger is available get stack backtrace<span class=\"token punctuation\">.</span>\nArguments:\nArg1: ffffd8024aaa8010<span class=\"token punctuation\">,</span> memory referenced\nArg2: 0000000000000002<span class=\"token punctuation\">,</span> IRQL\nArg3: 0000000000000000<span class=\"token punctuation\">,</span> value 0 = read operation<span class=\"token punctuation\">,</span> 1 = <span class=\"token function\">write</span> operation\nArg4: fffff80060da1981<span class=\"token punctuation\">,</span> address which referenced memory</code></pre></div>\n<p>Because we triggered the crash using NotMyFault’s <strong>High IRQL Fault (Kernel-mode)</strong> option, the output shows a <code class=\"language-text\">DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)</code> error.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check-0xd1--driver-irql-not-less-or-equal\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Bug Check 0xD1 DRIVER<em>IRQL</em>NOT<em>LESS</em>OR_EQUAL - Windows drivers | Microsoft Docs</a></p>\n<p>This error occurs when code executing at an Interrupt Request Level (IRQL) higher than <code class=\"language-text\">PASSIVE_LEVEL</code> (the lowest level) attempts to access paged pool memory.</p>\n<p>For more detail, the following article is a useful reference:</p>\n<p>Reference: <a href=\"https://sciencepark.co.jp/device_driver/dvdr/report-12/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Device Driver Lecture 12 │ Science Park Co., Ltd.</a></p>\n<p>After registry information is printed, the analysis output shows the crashing process and the stack trace:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">PROCESS_NAME:  notmyfault64<span class=\"token punctuation\">.</span>exe\n\nTRAP_FRAME:  ffffd48f77af97e0 <span class=\"token operator\">--</span> <span class=\"token punctuation\">(</span><span class=\"token punctuation\">.</span><span class=\"token keyword\">trap</span> 0xffffd48f77af97e0<span class=\"token punctuation\">)</span>\nNOTE: The <span class=\"token keyword\">trap</span> frame does not contain all registers<span class=\"token punctuation\">.</span>\nSome register values may be zeroed or incorrect<span class=\"token punctuation\">.</span>\nrax=00000000c85c00f0 rbx=0000000000000000 rcx=ffffd80241e00340\nrdx=0000000000000890 rsi=0000000000000000 rdi=0000000000000000\nrip=fffff80060da1981 rsp=ffffd48f77af9970 <span class=\"token function\">rbp</span>=0000000000000002\n r8=ffffd8024abbdc80  r9=0000000000000000 r10=ffffd80241e002c0\nr11=ffffd8024aa9bff0 r12=0000000000000000 r13=0000000000000000\nr14=0000000000000000 r15=0000000000000000\niopl=0         <span class=\"token function\">nv</span> up ei ng nz na pe nc\nmyfault+0x1981:\nfffff800`60da1981 8b03            mov     eax<span class=\"token punctuation\">,</span>dword ptr <span class=\"token namespace\">[rbx]</span> ds:00000000`00000000=????????\nResetting default scope\n\nSTACK_TEXT:  \nffffd48f`77af9698 fffff800`62a09169     : 00000000`0000000a ffffd802`4aaa8010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx\nffffd48f`77af96a0 fffff800`62a05469     : 00007ff8`f16ecc00 00000000`00000000 00000000`00000f4d 00000000`00000000 : nt!KiBugCheckDispatch+0x69\nffffd48f`77af97e0 fffff800`60da1981     : 00000000`00000000 ffffd48f`77af99c8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469\nffffd48f`77af9970 fffff800`60da1d3d     : 00000000`c85c00f0 000001e3`5fb24550 00000000`000000f0 00000000`00000000 : myfault+0x1981\nffffd48f`77af99a0 fffff800`60da1ea1     : ffff9189`4ed94d70 00000000`00000000 00000000`00000000 fffff800`62bf5e51 : myfault+0x1d3d\nffffd48f`77af9ae0 fffff800`6288f865     : ffff9189`4ed94d70 00000000`00000001 ffffd48f`77af9ec0 00000000`00000001 : myfault+0x1ea1\nffffd48f`77af9b40 fffff800`62c75328     : ffffd48f`77af9ec0 ffff9189`4ed94d70 00000000`00000001 fffff800`00000000 : nt!IofCallDriver+0x55\nffffd48f`77af9b80 fffff800`62c74bf5     : 00000000`00000000 ffffd48f`77af9ec0 00000000`00000000 ffffd48f`77af9ec0 : nt!IopSynchronousServiceTail+0x1a8\nffffd48f`77af9c20 fffff800`62c745f6     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5\nffffd48f`77af9d60 fffff800`62a08bb5     : 00000000`fffffffc ffff5121`00000000 00000000`00000001 000001e3`5f5e99a0 : nt!NtDeviceIoControlFile+0x56\nffffd48f`77af9dd0 00007ff8`f16ece54     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25\n0000007a`e6bde8d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f16ece54\n\nSYMBOL_NAME:  myfault+1981\nMODULE_NAME: myfault\nIMAGE_NAME:  myfault<span class=\"token punctuation\">.</span>sys\nSTACK_COMMAND:  <span class=\"token punctuation\">.</span>thread <span class=\"token punctuation\">;</span> <span class=\"token punctuation\">.</span>cxr <span class=\"token punctuation\">;</span> kb\nBUCKET_ID_FUNC_OFFSET:  1981\nFAILURE_BUCKET_ID:  AV_myfault!unknown_function\nOS_VERSION:  10<span class=\"token punctuation\">.</span>0<span class=\"token punctuation\">.</span>19041<span class=\"token punctuation\">.</span>1\nBUILDLAB_STR:  vb_release\nOSPLATFORM_TYPE:  x64\nOSNAME:  Windows 10\nFAILURE_ID_HASH:  <span class=\"token punctuation\">{</span>9745090a-9bce-ccba-c096-ca6e9ca04c64<span class=\"token punctuation\">}</span>\nFollowup:     MachineOwner</code></pre></div>\n<p>As you can see, <code class=\"language-text\">!analyze -v</code> alone gives you a substantial amount of information.</p>\n<h3 id=\"analyzing-the-stack-back-trace\" style=\"position:relative;\"><a href=\"#analyzing-the-stack-back-trace\" aria-label=\"analyzing the stack back trace permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Analyzing the Stack Back Trace</h3>\n<p>Next, let’s analyze the stack back trace.</p>\n<p>For documentation on stack back trace display commands, refer to:</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/k--kb--kc--kd--kp--kp--kv--display-stack-backtrace-\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">k, kb, kc, kd, kp, kP, kv (Display Stack Backtrace) - Windows drivers | Microsoft Docs</a></p>\n<p>Here I compared the output of three commands: <code class=\"language-text\">k</code>, <code class=\"language-text\">kb</code>, and <code class=\"language-text\">kv</code>.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 960px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/1143b35b663a53e8d322c8d21a49e0e2/cf8e5/image-21.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/1143b35b663a53e8d322c8d21a49e0e2/8ac56/image-21.webp 240w,\n/static/1143b35b663a53e8d322c8d21a49e0e2/d3be9/image-21.webp 480w,\n/static/1143b35b663a53e8d322c8d21a49e0e2/e46b2/image-21.webp 960w,\n/static/1143b35b663a53e8d322c8d21a49e0e2/7e452/image-21.webp 1402w\"\n              sizes=\"(max-width: 960px) 100vw, 960px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/1143b35b663a53e8d322c8d21a49e0e2/8ff5a/image-21.png 240w,\n/static/1143b35b663a53e8d322c8d21a49e0e2/e85cb/image-21.png 480w,\n/static/1143b35b663a53e8d322c8d21a49e0e2/d9199/image-21.png 960w,\n/static/1143b35b663a53e8d322c8d21a49e0e2/cf8e5/image-21.png 1402w\"\n            sizes=\"(max-width: 960px) 100vw, 960px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/1143b35b663a53e8d322c8d21a49e0e2/d9199/image-21.png\"\n            alt=\"image-21.png\"\n            title=\"image-21.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p><code class=\"language-text\">kv</code> clearly provides more information, including Frame Pointer Omission (FPO) data.</p>\n<p>Notice the line <code class=\"language-text\">(TrapFrame @ ffffd48f</code>77af97e0)`. This is the <strong>trap frame</strong> — it records the CPU registers and stack at the moment an interrupt occurred, and is critical information for restoring the thread state at that point.</p>\n<h3 id=\"restoring-a-thread-from-a-trap-frame\" style=\"position:relative;\"><a href=\"#restoring-a-thread-from-a-trap-frame\" aria-label=\"restoring a thread from a trap frame permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Restoring a Thread from a Trap Frame</h3>\n<p>Use the <code class=\"language-text\">.trap</code> command to restore the thread state from the trap frame.</p>\n<p>The output shows register values at the point captured in the trap frame:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">2: kd> <span class=\"token punctuation\">.</span><span class=\"token keyword\">trap</span> ffffd48f`77af97e0\nNOTE: The <span class=\"token keyword\">trap</span> frame does not contain all registers<span class=\"token punctuation\">.</span>\nSome register values may be zeroed or incorrect<span class=\"token punctuation\">.</span>\nrax=00000000c85c00f0 rbx=0000000000000000 rcx=ffffd80241e00340\nrdx=0000000000000890 rsi=0000000000000000 rdi=0000000000000000\nrip=fffff80060da1981 rsp=ffffd48f77af9970 <span class=\"token function\">rbp</span>=0000000000000002\n r8=ffffd8024abbdc80  r9=0000000000000000 r10=ffffd80241e002c0\nr11=ffffd8024aa9bff0 r12=0000000000000000 r13=0000000000000000\nr14=0000000000000000 r15=0000000000000000\niopl=0         <span class=\"token function\">nv</span> up ei ng nz na pe nc\nmyfault+0x1981:\nfffff800`60da1981 8b03            mov     eax<span class=\"token punctuation\">,</span>dword ptr <span class=\"token namespace\">[rbx]</span> ds:00000000`00000000=????????</code></pre></div>\n<p>The stack back trace confirms we are now viewing the state at the trap frame:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">2: kd> kv\n  <span class=\"token operator\">*</span><span class=\"token operator\">*</span><span class=\"token operator\">*</span> Stack trace <span class=\"token keyword\">for</span> last <span class=\"token function\">set</span> context <span class=\"token operator\">-</span> <span class=\"token punctuation\">.</span>thread/<span class=\"token punctuation\">.</span>cxr resets it\n <span class=\"token comment\"># Child-SP          RetAddr               : Args to Child                                                           : Call Site</span>\n00 ffffd48f`77af9970 fffff800`60da1d3d     : 00000000`c85c00f0 000001e3`5fb24550 00000000`000000f0 00000000`00000000 : myfault+0x1981\n01 ffffd48f`77af99a0 fffff800`60da1ea1     : ffff9189`4ed94d70 00000000`00000000 00000000`00000000 fffff800`62bf5e51 : myfault+0x1d3d\n02 ffffd48f`77af9ae0 fffff800`6288f865     : ffff9189`4ed94d70 00000000`00000001 ffffd48f`77af9ec0 00000000`00000001 : myfault+0x1ea1\n03 ffffd48f`77af9b40 fffff800`62c75328     : ffffd48f`77af9ec0 ffff9189`4ed94d70 00000000`00000001 fffff800`00000000 : nt!IofCallDriver+0x55\n04 ffffd48f`77af9b80 fffff800`62c74bf5     : 00000000`00000000 ffffd48f`77af9ec0 00000000`00000000 ffffd48f`77af9ec0 : nt!IopSynchronousServiceTail+0x1a8\n05 ffffd48f`77af9c20 fffff800`62c745f6     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5\n06 ffffd48f`77af9d60 fffff800`62a08bb5     : 00000000`fffffffc ffff5121`00000000 00000000`00000001 000001e3`5f5e99a0 : nt!NtDeviceIoControlFile+0x56\n07 ffffd48f`77af9dd0 00007ff8`f16ece54     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 <span class=\"token punctuation\">(</span>TrapFrame @ ffffd48f`77af9e40<span class=\"token punctuation\">)</span>\n08 0000007a`e6bde8d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f16ece54</code></pre></div>\n<h3 id=\"inspecting-processes\" style=\"position:relative;\"><a href=\"#inspecting-processes\" aria-label=\"inspecting processes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Inspecting Processes</h3>\n<p>Now let’s try to analyze the state of the Notepad process that was mid-save when the crash occurred.</p>\n<p>The following command lists all running processes:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\"><span class=\"token operator\">!</span><span class=\"token keyword\">process</span> 0 0</code></pre></div>\n<p>Reference: <a href=\"https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/-process\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">!process - Windows drivers | Microsoft Docs</a></p>\n<p>When the first argument is <code class=\"language-text\">0</code>, information is printed for all processes.</p>\n<p>To display information for a specific process only, provide a hexadecimal process address or a process ID as the first argument.</p>\n<p>The second argument controls the level of detail.</p>\n<ul>\n<li><code class=\"language-text\">!process 0 0</code> — prints time and priority statistics for all processes.</li>\n<li><code class=\"language-text\">!process 0 1</code> — additionally prints threads and events associated with each process, along with their wait states.</li>\n</ul>\n<p>Search through the output to find the Notepad process:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\"><span class=\"token keyword\">PROCESS</span> ffff9189527e9080\n    SessionId: 2  Cid: 1e90    Peb: bb6f2ac000  ParentCid: 15e8\n    DirBase: 1d822d000  ObjectTable: ffffd80249eb8040  HandleCount: 817<span class=\"token punctuation\">.</span>\n    Image: notepad<span class=\"token punctuation\">.</span>exe</code></pre></div>\n<p>Now use that process address to print its detailed information.</p>\n<p>Setting the flag (second argument) to <code class=\"language-text\">7</code> shows the complete details for a single process:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">2: kd> <span class=\"token operator\">!</span><span class=\"token keyword\">process</span> ffff9189527e9080 7\n<span class=\"token keyword\">PROCESS</span> ffff9189527e9080\n    SessionId: 2  Cid: 1e90    Peb: bb6f2ac000  ParentCid: 15e8\n    DirBase: 1d822d000  ObjectTable: ffffd80249eb8040  HandleCount: 817<span class=\"token punctuation\">.</span>\n    Image: notepad<span class=\"token punctuation\">.</span>exe\n    VadRoot ffff918953a30a20 Vads 285 Clone 0 Private 2175<span class=\"token punctuation\">.</span> Modified 340<span class=\"token punctuation\">.</span> Locked 2<span class=\"token punctuation\">.</span>\n    DeviceMap ffffd80247fe8cf0\n    Token                             ffffd8024a19c770\n    ElapsedTime                       00:00:47<span class=\"token punctuation\">.</span>378\n    UserTime                          00:00:00<span class=\"token punctuation\">.</span>000\n    KernelTime                        00:00:00<span class=\"token punctuation\">.</span>000\n    QuotaPoolUsage<span class=\"token namespace\">[PagedPool]</span>         430688\n    QuotaPoolUsage<span class=\"token namespace\">[NonPagedPool]</span>      39648\n    Working <span class=\"token function\">Set</span> Sizes <span class=\"token punctuation\">(</span>now<span class=\"token punctuation\">,</span>min<span class=\"token punctuation\">,</span>max<span class=\"token punctuation\">)</span>  <span class=\"token punctuation\">(</span>11788<span class=\"token punctuation\">,</span> 50<span class=\"token punctuation\">,</span> 345<span class=\"token punctuation\">)</span> <span class=\"token punctuation\">(</span>47152KB<span class=\"token punctuation\">,</span> 200KB<span class=\"token punctuation\">,</span> 1380KB<span class=\"token punctuation\">)</span>\n    PeakWorkingSetSize                11793\n    VirtualSize                       2101500 Mb\n    PeakVirtualSize                   2101501 Mb\n    PageFaultCount                    14745\n    MemoryPriority                    BACKGROUND\n    BasePriority                      8\n    CommitCharge                      3452\n\n        THREAD ffff91895309d080  Cid 1e90<span class=\"token punctuation\">.</span>1e94  Teb: 000000bb6f2ad000 Win32Thread: ffff9189523d0fc0 WAIT: <span class=\"token punctuation\">(</span>UserRequest<span class=\"token punctuation\">)</span> UserMode Non-Alertable\n            ffff918953118260  SynchronizationEvent\n            ffff918952d83d80  QueueObject\n        Not impersonating\n        DeviceMap                 ffffd80247fe8cf0\n        Owning <span class=\"token keyword\">Process</span>            ffff9189527e9080       Image:         notepad<span class=\"token punctuation\">.</span>exe\n        Attached <span class=\"token keyword\">Process</span>          N/A            Image:         N/A\n        Wait <span class=\"token function\">Start</span> TickCount      3492           Ticks: 12 <span class=\"token punctuation\">(</span>0:00:00:00<span class=\"token punctuation\">.</span>187<span class=\"token punctuation\">)</span>\n        Context <span class=\"token keyword\">Switch</span> Count      10798          IdealProcessor: 2             \n        UserTime                  00:00:00<span class=\"token punctuation\">.</span>140\n        KernelTime                00:00:00<span class=\"token punctuation\">.</span>328\n        Win32 <span class=\"token function\">Start</span> Address 0x00007ff7e2e85a30\n        Stack Init ffffd48f777bffd0 Current ffffd48f777bead0\n        Base ffffd48f777c0000 Limit ffffd48f777ba000 Call 0000000000000000\n        Priority 10 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5\n        Child-<span class=\"token function\">SP</span>          RetAddr               Call Site\n        ffffd48f`777beb10 fffff800`6280c970     nt!KiSwapContext+0x76\n        ffffd48f`777bec50 fffff800`6280be9f     nt!KiSwapThread+0x500\n        ffffd48f`777bed00 fffff800`628805ce     nt!KiCommitThreadWait+0x14f\n        ffffd48f`777beda0 fffff800`62c6f620     nt!KeWaitForMultipleObjects+0x2be\n        ffffd48f`777beeb0 ffffeccb`d0c3798d     nt!ObWaitForMultipleObjects+0x2f0\n        ffffd48f`777bf3b0 ffffeccb`d0b46c5e     win32kfull!xxxMsgWaitForMultipleObjectsEx+0xd9\n        ffffd48f`777bf460 ffffeccb`d15d6fd0     win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3fe\n        fffff800`62a08bb5     win32k!NtUserMsgWaitForMultipleObjectsEx+0x20\n        ffffd48f`777bfdd0 00007ff8`eed7a104     nt!KiSystemServiceCopyEnd+0x25 <span class=\"token punctuation\">(</span>TrapFrame @ ffffd48f`777bfe40<span class=\"token punctuation\">)</span>\n        000000bb`6f17e2d8 00000000`00000000     0x00007ff8`eed7a104\n<span class=\"token punctuation\">{</span><span class=\"token punctuation\">{</span> omitted <span class=\"token punctuation\">}</span><span class=\"token punctuation\">}</span></code></pre></div>\n<p>From this output we were able to retrieve information about the Notepad process at the moment it was trying to save a file.</p>\n<p> Because this is a kernel memory dump, it only contains kernel-mode process information. To inspect user-mode process information as well, a complete (full) memory dump is required.</p>\n<h2 id=\"wrap-up\" style=\"position:relative;\"><a href=\"#wrap-up\" aria-label=\"wrap up permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Wrap-up</h2>\n<p>In this article, I covered how to manually capture a kernel memory dump on Windows and how to perform basic analysis using WinDbg.</p>\n<p>Going forward, I plan to document more advanced analysis techniques as well.</p>\n<p>For other articles on Windows debugging and dump analysis with WinDbg, see the list on the following page:</p>\n<p>Reference: <a href=\"/windows-windbg-001-index-en\">Debugging and Troubleshooting Techniques with WinDbg</a></p>","fields":{"slug":"/windows-windbg-005-kernel-dump-en","tagSlugs":["/tag/win-dbg-en/","/tag/kernel-en/","/tag/reversing-en/","/tag/english/"]},"frontmatter":{"date":"2021-10-08","description":"","tags":["WinDbg (en)","Kernel (en)","Reversing (en)","English"],"title":"How to Manually Capture a Kernel Memory Dump on Windows and Analyze It with WinDbg","socialImage":{"publicURL":"/static/21701f5e36fa675d31449570ab3e9c7d/windows-windbg-005-kernel-dump.png"}}}},"pageContext":{"slug":"/windows-windbg-005-kernel-dump-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}