Hiddenmscorsvw

mscorsvw  时间:2021-05-23  阅读:()
WindowsMemoryDumpAnalysisDmitryVostokovSoftwareDiagnosticsServicesVersion2.
0PrerequisitesBasicWindowstroubleshootingWinDbgCommandsWeusetheseboxestointroduceWinDbgcommandsusedinpracticeexercises2013SoftwareDiagnosticsServicesTrainingGoalsReviewfundamentalsLearnhowtoanalyzeprocessdumpsLearnhowtoanalyzekerneldumpsLearnhowtoanalyzecompletedumps2013SoftwareDiagnosticsServicesTrainingPrinciplesTalkonlyaboutwhatIcanshowLotsofpicturesLotsofexamplesOriginalcontentandexamples2013SoftwareDiagnosticsServicesScheduleSummaryDay1AnalysisFundamentals(1hour)ProcessMemoryDumps(1hour)Day2ProcessMemoryDumps(2hours)Day3KernelMemoryDumps(2hours)Day4CompleteMemoryDumps(2hours)RemainingProcessMemoryDumps2013SoftwareDiagnosticsServicesPart1:Fundamentals2013SoftwareDiagnosticsServicesProcessSpace(x86)KernelSpaceUserSpaceFFFFFFFF800000007FFFFFFF000000002013SoftwareDiagnosticsServicesProcessSpace(x64)2013SoftwareDiagnosticsServicesKernelSpaceUserSpaceFFFFFFFF`FFFFFFFFFFFFF800`00000000000007FF`FFFFFFFF00000000`00000000Application/Process/Module2013SoftwareDiagnosticsServicesKernelSpaceUserSpace(PID102)FFFFFFFF800000007FFFFFFF00000000Notepad.
exeNotepaduser32.
dlluser32OSKernel/Driver/Module2013SoftwareDiagnosticsServicesKernelSpaceUserSpaceFFFFFFFF800000007FFFFFFF00000000Driver.
sysDriverNtoskrnl.
exentProcessVirtualSpace00000000.
.
.
FFFFFFFF2013SoftwareDiagnosticsServicesUserSpace(PID102)FFFFFFFF800000007FFFFFFF00000000Notepaduser32KernelSpaceDriverntProcessMemoryDumpWinDbgCommandslmvcommandlistsmodulesandtheirdescription2013SoftwareDiagnosticsServicesUserSpace(PID102)FFFFFFFF800000007FFFFFFF00000000Notepaduser32Notepad.
exe.
102.
dmpKernelSpaceDriverntKernelMemoryDumpWinDbgCommandslmvcommandlistsmodulesandtheirdescription2013SoftwareDiagnosticsServicesUserSpace(PID102)FFFFFFFF800000007FFFFFFF00000000Notepaduser32MEMORY.
DMPKernelSpaceDriverntCompleteMemoryDumpWinDbgCommands.
processswitchesbetweenprocessvirtualspaces(kernelspacepartremainsthesame)2013SoftwareDiagnosticsServicesKernelSpaceFFFFFFFF800000007FFFFFFF00000000DriverntMEMORY.
DMPUserSpace(PID102)Notepaduser32UserSpace(PID204)Calcuser32ProcessThreadsWinDbgCommandsProcessdumps:~sswitchesbetweenthreadsKernel/Completedumps:~sswitchesbetweenprocessors.
threadswitchesbetweenthreads2013SoftwareDiagnosticsServicesUserSpace(PID306)ApplicationAuser32ntdllKernelSpaceDriverntTID204TID102SystemThreadsWinDbgCommandsKernel/Completedumps:~sswitchesbetweenprocessors.
threadswitchesbetweenthreads2013SoftwareDiagnosticsServicesKernelSpaceDriverntTID306UserSpace(PID306)ApplicationAuser32ntdllThreadStackRawDataWinDbgCommandsProcessdumps:!
tebKerneldumps:!
threadCompletedumps:!
tebforuserspace!
threadforkernelspaceData:dc/dps/dpp/dpa/dpu2013SoftwareDiagnosticsServicesUserSpace(PID306)ApplicationAuser32ntdllKernelSpaceDriverntTID204TID102KernelStackforTID102KernelStackforTID204UserStackforTID204UserStackforTID102ThreadStackTraceWinDbgCommands0:000>kModule!
FunctionDModule!
FunctionC+130Module!
FunctionB+220Module!
FunctionA+110UserStackforTID102Module!
FunctionAModule!
FunctionBModule!
FunctionCSavesreturnaddressModule!
FunctionA+110SavesreturnaddressModule!
FunctionB+220Module!
FunctionDSavesreturnaddressModule!
FunctionC+130ResumesfromaddressModule!
FunctionA+110ResumesfromaddressModule!
FunctionB+220ResumesfromaddressModule!
FunctionC+130FunctionA(){.
.
.
FunctionB();.
.
.
}FunctionB(){.
.
.
FunctionC();.
.
.
}FunctionC(){.
.
.
FunctionD();.
.
.
}ReturnaddressModule!
FunctionC+130ReturnaddressModule!
FunctionB+220ReturnaddressModule!
FunctionA+1102013SoftwareDiagnosticsServicesThreadStackTrace(noPDB)WinDbgCommands0:000>kModule+0Module+43130Module+32220Module+22110UserStackforTID102Module+22000Module+32000Module+43000SavesreturnaddressModule+22110SavesreturnaddressModule+32220Module+54000SavesreturnaddressModule+43130ResumesfromaddressModule+22110ResumesfromaddressModule+32220ResumesfromaddressModule+43130FunctionA(){.
.
.
FunctionB();.
.
.
}FunctionB(){.
.
.
FunctionC();.
.
.
}FunctionC(){.
.
.
FunctionD();.
.
.
}ReturnaddressModule+43130ReturnaddressModule+32220ReturnaddressModule+22110NosymbolsforModuleSymbolfileModule.
pdbFunctionA22000-23000FunctionB32000-33000FunctionC43000–44000FunctionD54000-550002013SoftwareDiagnosticsServicesExceptions(AccessViolation)WinDbgCommandsaddress=Setexceptioncontext(processdump):.
cxrSettrapcontext(kernel/completedump):.
trapCheckaddress:!
pte2013SoftwareDiagnosticsServicesUserSpace(PID306)UserSpace(PID306)ApplicationAuser32ntdllModuleATID204UserStackforTID102UserStackforTID204TID102MinvalidmemoryaccessM00000000NULLpointerExceptions(Runtime)2013SoftwareDiagnosticsServicesUserSpace(PID306)UserSpace(PID306)ApplicationAuser32ntdllModuleATID204UserStackforTID102UserStackforTID204TID102MthrowserrorPattern-DrivenAnalysisInformationCollection(Scripts)InformationExtraction(Checklists)ProblemIdentification(Patterns)ProblemResolutionTroubleshootingSuggestionsDebuggingStrategyPattern:acommonrecurrentidentifiableproblemtogetherwithasetofrecommendationsandpossiblesolutionstoapplyinaspecificcontextPatterns:http://www.
dumpanalysis.
org/blog/index.
php/crash-dump-analysis-patterns/Checklist:http://www.
dumpanalysis.
org/windows-memory-analysis-checklist2013SoftwareDiagnosticsServicesPart2:PracticeExercises2013SoftwareDiagnosticsServicesLinksMemoryDumps:NotavailableinpreviewversionExerciseTranscripts:Notavailableinpreviewversion2013SoftwareDiagnosticsServicesExercise0Goal:InstallDebuggingToolsforWindowsandlearnhowtosetupsymbolscorrectlyPatterns:IncorrectStackTrace2013SoftwareDiagnosticsServicesProcessMemoryDumpsExercisesP1-P162013SoftwareDiagnosticsServicesExerciseP1Goal:Learnhowtoseedumpfiletypeandversion,getastacktrace,checkitscorrectness,performdefaultanalysis,listmodules,checktheirversioninformation,checkprocessenvironmentPatterns:ManualDump;StackTrace;NotMyVersion;EnvironmentHint2013SoftwareDiagnosticsServicesExerciseP2Goal:Learnhowtoliststacktraces,checktheircorrectness,performdefaultanalysis,listmodules,checktheirversioninformation,checkprocessenvironment;dumpmoduledataPatterns:ManualDump;StackTrace;NotMyVersion;EnvironmentHint;UnknownComponent2013SoftwareDiagnosticsServicesExerciseP3Goal:Learnhowtoliststacktraces,checktheircorrectness,performdefaultanalysis,listmodules,checktheirversioninformation,checkthreadageandCPUconsumptionPatterns:StackTraceCollection2013SoftwareDiagnosticsServicesExerciseP4Goal:LearntorecognizeexceptionsinprocessmemorydumpsandgettheircontextPatterns:ExceptionThread;MultipleExceptions;NULLPointer2013SoftwareDiagnosticsServicesExerciseP5Goal:Learnhowtoloadapplicationsymbols,recognizeexceptionsinprocessmemorydumpsandgettheircontextPatterns:ExceptionThread;MultipleExceptions;NULLPointer2013SoftwareDiagnosticsServicesExerciseP6Goal:LearnhowtorecognizeheapcorruptionPatterns:ExceptionThread;DynamicMemoryCorruption2013SoftwareDiagnosticsServicesExerciseP7Goal:LearnhowtorecognizeheapcorruptionandcheckerrorandstatuscodesPatterns:ExceptionThread;DynamicMemoryCorruption2013SoftwareDiagnosticsServicesExerciseP8Goal:LearnhowtorecognizeCPUspikes,invalidpointersanddisassemblecodePatterns:ExceptionThread;WildCode;CPUSpike;MutipleExceptions;NULLCodePointer;InvalidPointer2013SoftwareDiagnosticsServicesExerciseP9Goal:Learnhowtorecognizecriticalsectionwaitsanddeadlocks,dumprawstackdataandseehiddenexceptionsPatterns:WaitChain;Deadlock;HiddenException2013SoftwareDiagnosticsServicesDeadlockCriticalSection000000013fd7ef08CriticalSection000000013fd7eee0Thread2Thread2(owns)Thread1Thread1(owns)Thread2(waiting)Thread1(waiting)2013SoftwareDiagnosticsServicesExerciseP10Goal:Learnhowtorecognizeapplicationheapproblems,bufferandstackoverflowpatternsandanalyzerawstackdataPatterns:DoubleFree;LocalBufferOverflow;StackOverflow2013SoftwareDiagnosticsServicesExerciseP11Goal:Learnhowtoanalyzevariouspatterns,rawstacksandexecutionresiduePatterns:DividebyZero;C++Exception;MultipleExceptions;ExecutionResidue2013SoftwareDiagnosticsServicesExerciseP12Goal:Learnhowtoloadthecorrect.
NETWinDbgextensionandanalyzemanagedspacePatterns:CLRThread;Version-SpecificExtension;ManagedCodeException;ManagedStackTrace2013SoftwareDiagnosticsServicesExerciseP13Goal:Learnhowtoanalyze32-processsavedasa64-bitprocessmemorydumpPatterns:VirtualizedProcess;MessageBox;ExecutionResidue2013SoftwareDiagnosticsServicesExerciseP14Goal:LearnhowtoanalyzeprocessmemoryleaksPatterns:SpikingThread;ThreadAge;MemoryLeak(processheap)2013SoftwareDiagnosticsServicesParametersandLocalsDebuggingTVFramesepisode0x182013SoftwareDiagnosticsServicesSymbolTypesExportedandimportednamesFunctionandvariablenamesDatatypes2013SoftwareDiagnosticsServicesEXEDLLExerciseP15Goal:Learnhowtonavigatefunctionparametersincasesofreducedsymbolicinformationin32-bitprocessmemorydumpsPatterns:ReducedSymbolicInformation2013SoftwareDiagnosticsServicesExerciseP16Goal:Learnhowtonavigatefunctionparametersinx64processmemorydumpsPatterns:FalseFunctionParameters,InjectedSymbols2013SoftwareDiagnosticsServicesPatternLinksSpikingThreadCLRThreadC++ExceptionCriticalSectionDeadlockDividebyZeroDoubleFreeHeapCorruptionExceptionStackTraceExecutionResidueHiddenExceptionInvalidPointerLocalBufferOverflowManualDumpManagedCodeExceptionManagedStackTraceMultipleExceptionsNotMyVersionNULLDataPointerNULLCodePointerStackTraceStackTraceCollectionStackOverflowEnvironmentHintWildCodeUnknownComponentWaitChainVirtualizedProcessMessageBoxVersion-SpecificExtensionMemoryLeakFalseFunctionParametersInjectedSymbolsReducedSymbolicInformation2013SoftwareDiagnosticsServicesKernelMemoryDumpsExercisesK1-K52013SoftwareDiagnosticsServicesExerciseK1Goal:Learnhowtogetvariousinformationrelatedtohardware,system,sessions,processes,threadsandmodulesPatterns:InvalidPointer;VirtualizedSystem;StackTraceCollection2013SoftwareDiagnosticsServicesExerciseK2Goal:LearnhowtocheckandcomparekernelpoolusagePatterns:ManualDump;InsufficientMemory(kernelpool)2013SoftwareDiagnosticsServicesExerciseK3Goal:LearnhowtorecognizepoolcorruptionandcheckpooldataPatterns:DynamicMemoryCorruption(kernelpool);ExecutionResidue2013SoftwareDiagnosticsServicesExerciseK4Goal:LearnhowtocheckhookedorinvalidcodeandkernelrawstackPatterns:NullPointer;HookedFunctions(kernelspace);ExecutionResidue;CoincidentalSymbolicInformation2013SoftwareDiagnosticsServicesExerciseK5Goal:LearnhowtocheckI/OrequestsPatterns:BlockingFile2013SoftwareDiagnosticsServicesPatternLinksManualDumpInvalidPointerVirtualizedSystemStackTraceCollectionInsufficientMemoryDynamicMemoryCorruptionExecutionResidueNullPointerHookedFunctionsCoincidentalSymbolicInformationBlockingFile2013SoftwareDiagnosticsServicesAdditionalPatternLinksERESOURCEpatternsandcasestudies2013SoftwareDiagnosticsServicesCompleteMemoryDumpsExercisesC1-C22013SoftwareDiagnosticsServicesMemorySpacesCompletememory==PhysicalmemoryWealwaysseethecurrentprocessspaceContextswitchWinDbgCommandsswitchingtoadifferentprocesscontext:.
process/r/p2013SoftwareDiagnosticsServicesUserSpacecurrentprocessA(NotMyFault.
exe)KernelSpacecurrentprocessA(NotMyFault.
exe)UserSpacecurrentprocessB(svchost.
exe)KernelSpacecurrentprocessA(NotMyFault.
exe)MajorChallengesMultipleprocesses(userspaces)toexamineUserspaceviewneedstobecorrectwhenweexamineanotherthreadUserSpaceWinDbgCommandsdumpallstacktraces:!
process03f2013SoftwareDiagnosticsServicesCommonCommands.
logopenOpensalogfiletosaveallsubsequentoutputViewcommandsDumpeverythingorselectedprocessesandthreads(contextchangesautomatically)SwitchcommandsSwitchtoaspecificprocessorthreadforafine-grainanalysis2013SoftwareDiagnosticsServicesViewCommands!
process03fListsallprocesses(includingtimes,environment,modules)andtheirthreadstacktraces!
process01fThesameasthepreviouscommandbutwithoutPEBinformation(moresecure)!
process3for!
process1fThesameasthepreviouscommandsbutonlyforanindividualprocess!
thread1fShowsthreadinformationandstacktrace!
thread16Thesameasthepreviouscommandbutshowsthefirst3parametersforeveryfunction2013SoftwareDiagnosticsServicesSwitchCommands.
process/r/pSwitchestoaspecifiedprocess.
Itscontextbecomescurrent.
Reloadssymbolfilesforuserspace.
Nowwecanusecommandslike!
cs0:kd>.
process/r/pfffffa80044d8b30Implicitprocessisnowfffffa80`044d8b30LoadingUserSymbols.
threadSwitchestoaspecifiedthread.
AssumesthecurrentprocesscontextNowwecanusecommandslikek*.
thread/r/pThesameasthepreviouscommandbutmakesthethreadprocesscontextcurrentandreloadssymbolfilesforuserspace:0:kd>.
thread/r/pfffffa80051b7060Implicitthreadisnowfffffa80`051b7060Implicitprocessisnowfffffa80`044d8b30LoadingUserSymbols2013SoftwareDiagnosticsServicesExerciseC1Goal:Learnhowtogetvariousinformationrelatedtoprocesses,threadsandmodulesPatterns:StackTraceCollection2013SoftwareDiagnosticsServicesExample:BlockedThreadTHREADfffffa800451db60Cid07f4.
0b8cTeb:000007fffffd6000Win32Thread:fffff900c27c0c30WAIT:(WrUserRequest)UserModeNon-Alertablefffffa8004e501e0SynchronizationEventNotimpersonatingDeviceMapfffff8a001e84c00OwningProcessfffffa8004514630Image:ApplicationA.
exe[.
.
.
]StackInitfffff88005b7fdb0Currentfffff88005b7f870Basefffff88005b80000Limitfffff88005b77000Call0Priority11BasePriority8UnusualBoost0ForegroundBoost2IoPriority2PagePriority5Child-SPRetAddrCallSitefffff880`05b7f8b0fffff800`01a93992nt!
KiSwapContext+0x7afffff880`05b7f9f0fffff800`01a95cffnt!
KiCommitThreadWait+0x1d2fffff880`05b7fa80fffff960`0011b557nt!
KeWaitForSingleObject+0x19ffffff880`05b7fb20fffff960`0011b5f1win32k!
xxxRealSleepThread+0x257fffff880`05b7fbc0fffff960`0012e22ewin32k!
xxxSleepThread+0x59fffff880`05b7fbf0fffff800`01a8b993win32k!
NtUserWaitMessage+0x46fffff880`05b7fc2000000000`775cbf5ant!
KiSystemServiceCopyEnd+0x13(TrapFrame@fffff880`05b7fc20)00000000`022ff7c800000000`775d7214USER32!
ZwUserWaitMessage+0xa00000000`022ff7d000000000`775d74a5USER32!
DialogBox2+0x27400000000`022ff86000000000`776227f0USER32!
InternalDialogBox+0x13500000000`022ff8c000000000`77621ae5USER32!
SoftModalMessageBox+0x9b400000000`022ff9f000000000`7762133bUSER32!
MessageBoxWorker+0x31d00000000`022ffbb000000000`77621232USER32!
MessageBoxTimeoutW+0xb3>>>00000000`022ffc8000000001`3f3c1089USER32!
MessageBoxW+0x4e00000000`022ffcc000000001`3f3c11fbApplicationA+0x108900000000`022ffcf000000001`3f3c12a5ApplicationA+0x11fb00000000`022ffd2000000000`776cf56dApplicationA+0x12a500000000`022ffd5000000000`77803281kernel32!
BaseThreadInitThunk+0xd00000000`022ffd8000000000`00000000ntdll!
RtlUserThreadStart+0x1d2013SoftwareDiagnosticsServicesExample:WaitChainTHREADfffffa8004562b60Cid0b34.
0858Teb:000007fffffae000Win32Thread:0000000000000000WAIT:(UserRequest)UserModeNon-Alertable>>>fffffa8004b96ce0Mutant-owningthreadfffffa8004523b60NotimpersonatingDeviceMapfffff8a001e84c00OwningProcessfffffa8005400b30Image:ApplicationC.
exeAttachedProcessN/AImage:N/AWaitStartTickCount36004Ticks:4286(0:00:01:06.
862)ContextSwitchCount2UserTime00:00:00.
000KernelTime00:00:00.
000Win32StartAddressApplicationC(0x000000013f7012a0)StackInitfffff88005b1ddb0Currentfffff88005b1d900Basefffff88005b1e000Limitfffff88005b18000Call0Priority11BasePriority8UnusualBoost0ForegroundBoost2IoPriority2PagePriority5Child-SPRetAddrCallSitefffff880`05b1d940fffff800`01a93992nt!
KiSwapContext+0x7afffff880`05b1da80fffff800`01a95cffnt!
KiCommitThreadWait+0x1d2fffff880`05b1db10fffff800`01d871d2nt!
KeWaitForSingleObject+0x19ffffff880`05b1dbb0fffff800`01a8b993nt!
NtWaitForSingleObject+0xb2fffff880`05b1dc2000000000`7781fefant!
KiSystemServiceCopyEnd+0x13(TrapFrame@fffff880`05b1dc20)00000000`00e2f658000007fe`fda910acntdll!
NtWaitForSingleObject+0xa00000000`00e2f66000000001`3f70112eKERNELBASE!
WaitForSingleObjectEx+0x7900000000`00e2f70000000001`3f70128bApplicationC+0x112e00000000`00e2f73000000001`3f701335ApplicationC+0x128b00000000`00e2f76000000000`776cf56dApplicationC+0x133500000000`00e2f79000000000`77803281kernel32!
BaseThreadInitThunk+0xd00000000`00e2f7c000000000`00000000ntdll!
RtlUserThreadStart+0x1d2013SoftwareDiagnosticsServicesExample:HandleLeak1:kd>!
process00****NTACTIVEPROCESSDUMP****PROCESSfffffa8003baa890SessionId:noneCid:0004Peb:00000000ParentCid:0000DirBase:00187000ObjectTable:fffff8a000001a80HandleCount:558.
Image:SystemPROCESSfffffa8004277870SessionId:noneCid:011cPeb:7fffffdf000ParentCid:0004DirBase:133579000ObjectTable:fffff8a00000f3d0HandleCount:35.
Image:smss.
exePROCESSfffffa80048f3950SessionId:0Cid:016cPeb:7fffffdf000ParentCid:0154DirBase:128628000ObjectTable:fffff8a001d62f90HandleCount:387.
Image:csrss.
exe[.
.
.
]PROCESSfffffa800541a060SessionId:1Cid:0b94Peb:7fffffde000ParentCid:06ac>>>DirBase:a6ba9000ObjectTable:fffff8a0098efaf0HandleCount:20013.
Image:ApplicationE.
exe[.
.
.
]2013SoftwareDiagnosticsServicesExample:CorruptionTHREADfffffa8004514060Cid0abc.
087cTeb:000007fffffae000Win32Thread:0000000000000000WAIT:(UserRequest)UserModeAlertablefffffa800518fb30ProcessObject[.
.
.
]Child-SPRetAddrCallSitefffff880`05a6c940fffff800`01a93992nt!
KiSwapContext+0x7afffff880`05a6ca80fffff800`01a95cffnt!
KiCommitThreadWait+0x1d2fffff880`05a6cb10fffff800`01d871d2nt!
KeWaitForSingleObject+0x19ffffff880`05a6cbb0fffff800`01a8b993nt!
NtWaitForSingleObject+0xb2fffff880`05a6cc2000000000`7781fefant!
KiSystemServiceCopyEnd+0x13(TrapFrame@fffff880`05a6cc20)00000000`00dde92800000000`77895ce2ntdll!
NtWaitForSingleObject+0xa00000000`00dde93000000000`77895e85ntdll!
RtlReportExceptionEx+0x1d200000000`00ddea2000000000`77895eeantdll!
RtlReportException+0xb500000000`00ddeaa000000000`77896d25ntdll!
RtlpTerminateFailureFilter+0x1a00000000`00ddead000000000`777e5148ntdll!
RtlReportCriticalFailure+0x9600000000`00ddeb0000000000`7780554dntdll!
_C_specific_handler+0x8c00000000`00ddeb7000000000`777e5d1cntdll!
RtlpExecuteHandlerForException+0xd00000000`00ddeba000000000`777e62eentdll!
RtlDispatchException+0x3cb00000000`00ddf28000000000`77896cd2ntdll!
RtlRaiseException+0x22100000000`00ddf8c000000000`77897396ntdll!
RtlReportCriticalFailure+0x6200000000`00ddf99000000000`778986c2ntdll!
RtlpReportHeapFailure+0x2600000000`00ddf9c000000000`7789a0c4ntdll!
RtlpHeapHandleError+0x1200000000`00ddf9f000000000`7783d1cdntdll!
RtlpLogHeapFailure+0xa400000000`00ddfa2000000000`776d2c7antdll!
::FNODOBFM::`string'+0x123b4>>>00000000`00ddfaa000000001`3fa71274kernel32!
HeapFree+0xa00000000`00ddfad000000001`3fa710c3ApplicationD+0x127400000000`00ddfb0000000001`3fa71303ApplicationD+0x10c300000000`00ddfb3000000001`3fa713adApplicationD+0x130300000000`00ddfb6000000000`776cf56dApplicationD+0x13ad00000000`00ddfb9000000000`77803281kernel32!
BaseThreadInitThunk+0xd00000000`00ddfbc000000000`00000000ntdll!
RtlUserThreadStart+0x1d2013SoftwareDiagnosticsServicesExample:SpecialProcess1:kd>!
vm[.
.
.
]0744svchost.
exe19725(78900Kb)06acexplorer.
exe11444(45776Kb)0920iexplore.
exe8828(35312Kb)0354svchost.
exe5589(22356Kb)040caudiodg.
exe4003(16012Kb)0334svchost.
exe3852(15408Kb)04e4spoolsv.
exe3230(12920Kb)012csvchost.
exe2802(11208Kb)0168iexplore.
exe2106(8424Kb)0384svchost.
exe2090(8360Kb)042csvchost.
exe1938(7752Kb)0218lsass.
exe1314(5256Kb)03d4svchost.
exe1128(4512Kb)>>>0a78WerFault.
exe1107(4428Kb)0210services.
exe1106(4424Kb)0288svchost.
exe980(3920Kb)02d8svchost.
exe891(3564Kb)0438msdtc.
exe851(3404Kb)071cmscorsvw.
exe821(3284Kb)0378taskhost.
exe795(3180Kb)01a8psxss.
exe685(2740Kb)08a0jusched.
exe667(2668Kb)09e0jucheck.
exe621(2484Kb)0828mscorsvw.
exe600(2400Kb)0538mdm.
exe595(2380Kb)0220lsm.
exe595(2380Kb)[.
.
.
]2013SoftwareDiagnosticsServicesExerciseC2Goal:LearnhowtorecognizevariousabnormalsoftwarebehaviorpatternsPatterns:SpecialProcess;HandleLeak;SpikingThread;StackTraceCollection;MessageBox;WaitChain;ExceptionThread2013SoftwareDiagnosticsServicesWaitChainCriticalSection00a9b7c0CriticalSection00a9b7a8Thread886ee030Thread886ee030(owns)Thread83336a00Thread83336a00(owns)Thread886ee030(waiting)processApplicationCprocessApplicationBMutant00a9b7c0Thread832be6d8Thread832be6d8(owns)Thread83336a00(waiting)Thread830f9990(waiting)2013SoftwareDiagnosticsServicesPatternLinksSpecialProcessHandleLeakSpikingThreadStackTraceCollectionMessageBoxWaitChain(criticalsections)ExceptionStackTraceAlsootherpatternsarepresentinC2memorydump(notshowninexercisetranscript):WaitChain(windowmessaging)PagedOutDataWaitChain(LPC/ALPC)2013SoftwareDiagnosticsServicesCommonMistakesNotswitchingtotheappropriatecontextNotlookingatfullstacktracesNotlookingatallstacktracesNotusingchecklistsNotlookingpastthefirstfoundevidenceNote:Listingbothx86andx64stacktraceshttp://www.
dumpanalysis.
org/blog/index.
php/2010/02/09/complete-stack-traces-from-x64-system/2013SoftwareDiagnosticsServicesKernelMinidumpsMemoryDumpAnalysisAnthology,Volume1pp.
43-672013SoftwareDiagnosticsServicesPatternClassification2013SoftwareDiagnosticsServicesSpace/ModeMemorydumptypeHookswareWaitChainPatternsDLLLinkPatternsInsufficientMemoryPatternsContentionPatternsStackOverflowPatternsStackTracePatternsSymbolPatternsExceptionPatternsMeta-MemoryDumpPatternsModulePatternsOptimizationPatternsThreadPatternsProcessPatternsDynamicMemoryCorruptionPatternsDeadlockandLivelockPatterns.
NET/CLR/ManagedSpacePatternsExecutiveResourcePatternsPatternCaseStudies70multiplepatterncasestudies:http://www.
dumpanalysis.
org/blog/index.
php/pattern-cooperation/PatternInteractionchaptersinMemoryDumpAnalysisAnthology2013SoftwareDiagnosticsServicesResourcesWinDbgHelp/WinDbg.
org(quicklinks)DumpAnalysis.
orgDebugging.
TVWindowsInternals,6thed.
WindowsDebugging:PracticalFoundationsx64WindowsDebugging:PracticalFoundationsAdvancedWindowsDebuggingWindowsDebuggingNotebook:EssentialUserSpaceWinDbgCommandsMemoryDumpAnalysisAnthology2013SoftwareDiagnosticsServicesQ&APleasesendyourfeedbackusingthecontactformonPatternDiagnostics.
com2013SoftwareDiagnosticsServicesThankyouforattendance!
2013SoftwareDiagnosticsServices

盘点AoYoZhuJi傲游主机商8个数据中心常见方案及八折优惠

傲游主机商我们可能很多人并不陌生,实际上这个商家早年也就是个人主机商,传说是有几个个人投资创办的,不过能坚持到现在也算不错,毕竟有早年的用户积累正常情况上还是能延续的。如果是新服务商这几年确实不是特别容易,问到几个老牌的个人服务商很多都是早年的用户积累客户群。傲游主机目前有提供XEN和KVM架构的云服务器,不少还是亚洲CN2优化节点,目前数据中心包括中国香港、韩国、德国、荷兰和美国等多个地区的CN...

DiyVM:香港VPS五折月付50元起,2核/2G内存/50G硬盘/2M带宽/CN2线路

diyvm怎么样?diyvm这是一家低调国人VPS主机商,成立于2009年,提供的产品包括VPS主机和独立服务器租用等,数据中心包括香港沙田、美国洛杉矶、日本大阪等,VPS主机基于XEN架构,均为国内直连线路,主机支持异地备份与自定义镜像,可提供内网IP。最近,DiyVM商家对香港机房VPS提供5折优惠码,最低2GB内存起优惠后仅需50元/月。点击进入:diyvm官方网站地址DiyVM香港机房CN...

快云科技,美国VPS 2H5G独享20M 仅售19.8/月  年付仅需148

快云科技已稳步运行进两年了 期间没出现过线路不稳 客户不满意等一系列问题 本司资质齐全 持有IDC ICP ISP等正规手续 有独特的网站设计理念 在前几天刚是参加过魔方系统举行的设计大赛拿获最佳设计奖第一名 本公司主营产品 香港弹性云服务器,美国vps和日本vps,香港物理机,国内高防物理机以及美国日本高防物理机 2020年的国庆推出过一款香港的回馈用户特惠机 已作为传家宝 稳定运行 马上又到了...

mscorsvw为你推荐
uctuationchrome日照职业技术学院RIZHAO支持ipad支持ipad支持ipadcss下拉菜单如何使用HTML和CSS制作下拉菜单x-routerx-0.4x等于多少?联通版iphone4s怎样看苹果4S是联通版还是电信版迅雷快鸟迅雷快鸟这种强盗软件不违规吗?micromediaMacromedia Fireworks 8是什么东西,怎么用?
浙江vps vps交流 高防直连vps 域名服务器的作用 个人域名备案流程 中国万网虚拟主机 什么是域名解析 域名抢注工具 ddos sugarsync 国外bt 租空间 牛人与腾讯客服对话 150邮箱 本网站在美国维护 godaddy域名证书 我爱水煮鱼 linux空间 qq云端 网站在线扫描 更多