<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 80)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2009/02/13/crash-dump-analysis-patterns-part-80/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Thu, 07 May 2026 02:49:01 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Insufficient memory, handle leak, process factory, high contention and busy system: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2009/02/13/crash-dump-analysis-patterns-part-80/#comment-175798</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Insufficient memory, handle leak, process factory, high contention and busy system: pattern cooperation</dc:creator>
		<pubDate>Fri, 13 Aug 2010 19:10:18 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2009/02/13/crash-dump-analysis-patterns-part-80/#comment-175798</guid>
		<description>[...] exploration of session 1 processes shows Process Factory pattern (5,000 launched processes) with explorer.exe ran [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] exploration of session 1 processes shows Process Factory pattern (5,000 launched processes) with explorer.exe ran [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Inconsistent dump, blocked threads, wait chains, incorrect stack trace and process factory: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2009/02/13/crash-dump-analysis-patterns-part-80/#comment-98314</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Inconsistent dump, blocked threads, wait chains, incorrect stack trace and process factory: pattern cooperation</dc:creator>
		<pubDate>Fri, 09 Oct 2009 23:12:23 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2009/02/13/crash-dump-analysis-patterns-part-80/#comment-98314</guid>
		<description>[...] checking virtual memory consumption and instantly see hundreds of rundll32.exe processes like in a process factory [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] checking virtual memory consumption and instantly see hundreds of rundll32.exe processes like in a process factory [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Software Generalist &#187; Blog Archive &#187; Reading Notebook: 15-July-09</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2009/02/13/crash-dump-analysis-patterns-part-80/#comment-84825</link>
		<dc:creator>Software Generalist &#187; Blog Archive &#187; Reading Notebook: 15-July-09</dc:creator>
		<pubDate>Wed, 15 Jul 2009 18:19:38 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2009/02/13/crash-dump-analysis-patterns-part-80/#comment-84825</guid>
		<description>[...] in Task Manager (p. 6) - Could be useful to decimate certain runaway populations of processes. See Process Factory pattern for an [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] in Task Manager (p. 6) - Could be useful to decimate certain runaway populations of processes. See Process Factory pattern for an [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
