```
>>> print dbgCommand("k1")
ChildEBP RetAddr
0469a628 7531e305 ntdll!KiFastSystemCallRet
>>> print dbgCommand(".ecxr")
eax=a285678b ebx=00000413 ecx=75d1a618 edx=00000000 esi=00000209 edi=0862c21c
eip=74199fb8 esp=0469b77c ebp=0469b77c iopl=0 nv up ei ng nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010286
propsys!ComparePropertyKeys+0xb:
74199fb8 8b5004 mov edx,dword ptr [eax+4] ds:0023:a285678f=????????
>>> print dbgCommand("k1")
ChildEBP RetAddr
0469b77c 7419ab1d propsys!ComparePropertyKeys+0xb
>>> print getProcessExeName()
<...>.exe
>>> print dbgCommand("k1")
ChildEBP RetAddr
0469a628 7531e305 ntdll!KiFastSystemCallRet
```
>>> print dbgCommand("k1")
ChildEBP RetAddr
0469a628 7531e305 ntdll!KiFastSystemCallRet
>>> print dbgCommand(".ecxr")
eax=a285678b ebx=00000413 ecx=75d1a618 edx=00000000 esi=00000209 edi=0862c21c
eip=74199fb8 esp=0469b77c ebp=0469b77c iopl=0 nv up ei ng nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010286
propsys!ComparePropertyKeys+0xb:
74199fb8 8b5004 mov edx,dword ptr [eax+4] ds:0023:a285678f=????????
>>> print dbgCommand("k1")
ChildEBP RetAddr
0469b77c 7419ab1d propsys!ComparePropertyKeys+0xb
>>> print getProcessExeName()
<...>.exe
>>> print dbgCommand("k1")
ChildEBP RetAddr
0469a628 7531e305 ntdll!KiFastSystemCallRet
```