<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 27c)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2011/12/03/crash-dump-analysis-patterns-part-27c/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 19 May 2026 08:55:06 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/03/crash-dump-analysis-patterns-part-27c/#comment-741763</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sun, 24 Nov 2019 18:27:07 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/03/crash-dump-analysis-patterns-part-27c/#comment-741763</guid>
		<description>Windows 10: !findthreads</description>
		<content:encoded><![CDATA[<p>Windows 10: !findthreads</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/03/crash-dump-analysis-patterns-part-27c/#comment-741732</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Thu, 22 Dec 2016 12:30:35 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/03/crash-dump-analysis-patterns-part-27c/#comment-741732</guid>
		<description>To list 32-bit stack traces from the specific WOW64 process:

!for_each_thread ".thread @#Thread; r $t0 = @#Thread; .if (@@c++(((nt!_KTHREAD *)@$t0)-&gt;Process) == &lt;em&gt;ProcessAddress&lt;/em&gt;) {.thread /w @#Thread; .reload; kv 256; .effmach AMD64 }"</description>
		<content:encoded><![CDATA[<p>To list 32-bit stack traces from the specific WOW64 process:</p>
<p>!for_each_thread &#8220;.thread @#Thread; r $t0 = @#Thread; .if (@@c++(((nt!_KTHREAD *)@$t0)->Process) == <em>ProcessAddress</em>) {.thread /w @#Thread; .reload; kv 256; .effmach AMD64 }&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/03/crash-dump-analysis-patterns-part-27c/#comment-741703</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Tue, 10 May 2016 13:11:50 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/03/crash-dump-analysis-patterns-part-27c/#comment-741703</guid>
		<description>An example here can be service tags in TEB.SubProcessTag to identify threads from specific service in svchost.exe.</description>
		<content:encoded><![CDATA[<p>An example here can be service tags in TEB.SubProcessTag to identify threads from specific service in svchost.exe.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
