WinDBG output
ChildEBP RetAddr
006bf9f4 0082f99b MyApp!myFunc+0x1e
006bfb6c 00830749 MyApp!wmain+0x4b
006bfbbc 0083093d MyApp!__tmainCRTStartup+0x199
006bfbc4 7671919f targetapp!wmainCRTStartup+0xd
006bfbd0 77120bbb KERNEL32!BaseThreadInitThunk+0xe
006bfc14 77120b91 ntdll_770d0000!RtlInitializeExceptionChain+0x84
006bfc24 00000000 ntdll_770d0000!RtlInitializeExceptionChain+0x5a
pykd output:
```
for frame in getStack():
print hex(frame.frameOffset), hex(frame.returnOffset), pykd.findSymbol(frame.instructionOffset, True)
```
0x6bf9e4 0xffffffffccccccccL ntdll_770d0000!NtQueryInformationProcess+c
0x6bf9f4 0x82f99b ffffffffcccccccc
0x6bfb6c 0x830749 MyApp!wmain+4b
0x6bfbbc 0x83093d MyApp!__tmainCRTStartup+39
0x6bfbc4 0x7671919f MyApp!wmainCRTStartup+d
0x6bfbd0 0x77120bbb KERNEL32!BaseThreadInitThunk+e
0x6bfc14 0x77120b91 ntdll_770d0000!RtlInitializeExceptionChain+84
0x6bfc24 0x0 ntdll_770d0000!RtlInitializeExceptionChain+5a
Comments: ** Comment from web user: EreTIk **
ChildEBP RetAddr
006bf9f4 0082f99b MyApp!myFunc+0x1e
006bfb6c 00830749 MyApp!wmain+0x4b
006bfbbc 0083093d MyApp!__tmainCRTStartup+0x199
006bfbc4 7671919f targetapp!wmainCRTStartup+0xd
006bfbd0 77120bbb KERNEL32!BaseThreadInitThunk+0xe
006bfc14 77120b91 ntdll_770d0000!RtlInitializeExceptionChain+0x84
006bfc24 00000000 ntdll_770d0000!RtlInitializeExceptionChain+0x5a
pykd output:
```
for frame in getStack():
print hex(frame.frameOffset), hex(frame.returnOffset), pykd.findSymbol(frame.instructionOffset, True)
```
0x6bf9e4 0xffffffffccccccccL ntdll_770d0000!NtQueryInformationProcess+c
0x6bf9f4 0x82f99b ffffffffcccccccc
0x6bfb6c 0x830749 MyApp!wmain+4b
0x6bfbbc 0x83093d MyApp!__tmainCRTStartup+39
0x6bfbc4 0x7671919f MyApp!wmainCRTStartup+d
0x6bfbd0 0x77120bbb KERNEL32!BaseThreadInitThunk+e
0x6bfc14 0x77120b91 ntdll_770d0000!RtlInitializeExceptionChain+84
0x6bfc24 0x0 ntdll_770d0000!RtlInitializeExceptionChain+5a
Comments: ** Comment from web user: EreTIk **
PYKD 0.3.0.10 released (fixed)