Dump Dateien im Ordner LiveKernelReports (2024)

Hallo,

Als erstes, ich habe mich hier im Forum Registriert, weil ich im Internet nichts zu meiner Frage gefunden habe.

Vor 2 bis 3 Tagen habe ich den CCleaner durchlaufen lassen (nur Analysiert). Dabei ist mir aufgefallen, dass die Memory Dumps am meisten Speicherplatz wegnehmen. So rund 3 GB. Daraufhin im Ordner LiveKernelReports geguckt, indem tatsächlich 2 .dmp Dateien enthalten sind.

Zugegeben, habe ich in letzter Zeit, mehr oder weniger Probleme mit meinem Pc. Wie plötzlich micro Ruckler aus dem nichts und FPS drops in CSGO (hab sogar schon ein neues Board). Ich kann ohne Vsync kein Spiel spielen, weil es mir sonst ruckelig vorkommt (wie z.B. Just Cause 3, Minecraft, Battlefield 4.....) Ab und zu, habe ich auch ein Ruckler in Minecraft. Aber ich glaube, dass es eher an Java liegt.

In den letzten paar Tagen, hatte ich auch ein Blackscreen, weil ich in CSGO die Auflösung geändert habe. Da half nur ein Reset.

Hier die specs:

Ryzen 5 1600x
MSI B450 Gaming Pro Carbon AC
Corsair Vengeance RGB Pro 3200 Mhz 16GB Dual Kit (im dual Channel) CMW16GX4M2C3200C16
Asus Dual Geforce GTX 1060 OC Edition
be quiet! Pure Power 11 500W 80 Plus Gold

SanDisk SDSSDH3256G (OS, Steam, Origin, minecraft....)
ST1000DM010-2EP102 (Daten)
WDC WD10EZEX-08M2NA0 (Spiele)

Meine Frage ist, was der Fehler oder Grund war, warum Windows 10 die Dumps angelegt hatte. Vor allem in dieser Größe.

Hier sind die Logs von WinDBG:

PoW32kWatchdog-20200326-0213.dmp

Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\LiveKernelReports\PoW32kWatchdog-20200326-0213.dmp]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18363 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff801`52e00000 PsLoadedModuleList = 0xfffff801`53248150
Debug session time: Thu Mar 26 03:13:05.015 2020 (UTC + 2:00)
System Uptime: 1 days 0:00:32.721
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000085`3a98d018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!IopLiveDumpEndMirroringCallback+0x7e:
fffff801`533aa7ce 488d8e00010000 lea rcx,[rsi+100h]
0: kd> !analyze -v
*******************************************************************************

  • *
  • Bugcheck Analysis *
  • *

*******************************************************************************

WIN32K_CALLOUT_WATCHDOG_LIVEDUMP (1a1)
A callout to Win32k did not return promptly.
Arguments:
Arg1: ffffc003ea569040, Thread blocking prompt return from a Win32k callout.
Arg2: 0000000000000000, Reserved.
Arg3: 0000000000000000, Reserved.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-7AT38GP

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 64

Key : Analysis.System
Value: CreateObject

ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x10
Live Generated Dump

BUGCHECK_CODE: 1a1

BUGCHECK_P1: ffffc003ea569040

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME: csrss.exe

FAULTING_THREAD: ffffc003ea569040

STACK_TEXT:
ffffe400`74aab000 fffff801`52f1508d : ffffd301`adc80180 003e7fff`fffffffe ffffd301`ffffffff 00000000`00000001 : nt!KiSwapContext+0x76
ffffe400`74aab140 fffff801`52f13f14 : ffffc003`ea569040 00000000`00000000 ffffc003`00000000 00000000`00000000 : nt!KiSwapThread+0xbfd
ffffe400`74aab1e0 fffff801`52f136b5 : 00000000`000000bc ffffc003`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x144
ffffe400`74aab280 fffff801`52f1692d : ffffe400`74aab458 ffffe400`0000001b 00000000`00000100 00000000`00000000 : nt!KeWaitForSingleObject+0x255
ffffe400`74aab360 fffff801`52f10c5e : ffffc003`e795fe10 ffffe400`74aab440 ffffc003`00010224 fffff801`52f5a6d0 : nt!ExpWaitForResource+0x6d
ffffe400`74aab3e0 fffff801`52f0fe2f : 00000000`00000030 00000000`00000004 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x33e
ffffe400`74aab4a0 ffffd295`a32279ef : 00000000`00000000 00000000`00000000 fffff801`538ba180 fffff801`538b8c53 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
ffffe400`74aab4e0 ffffd295`a31d2e6a : 00000000`00000005 ffffc003`e59da0c0 00000000`c000000d 00000000`00000000 : win32kbase!UserPowerInfoCallout+0x143
ffffe400`74aac5e0 ffffd295`a3d71040 : ffffc003`e59da0c0 fffff801`53268840 ffffe400`74aac930 00000000`c000000d : win32kbase!W32CalloutDispatch+0x56a
ffffe400`74aac800 fffff801`534425ac : ffffe400`74aaca70 00000000`00000000 ffffc003`e59da0c0 fffff801`52f1ca00 : win32k!W32CalloutDispatchThunk+0x10
ffffe400`74aac830 fffff801`5347cc9f : 00000000`00000010 00000000`00040082 ffffe400`74aac918 00000000`00000000 : nt!ExCallSessionCallBack+0xa4
ffffe400`74aac8f0 fffff801`533eb2a3 : ffffc003`e17f40c0 ffffe400`74aac999 00000000`00000103 00000000`00000001 : nt!PsInvokeWin32Callout+0xcf
ffffe400`74aac920 fffff801`52e2faed : 00000000`00000005 ffffe400`74aaca20 00000000`00000000 ffffc003`ea569180 : nt!PopInvokeWin32Callout+0x19f
ffffe400`74aaca00 fffff801`533e9f72 : 00000000`00000000 ffffe400`00000000 00000000`00000002 00000000`00000000 : nt!PopGetConsoleDisplayRequestCount+0x89
ffffe400`74aaca60 fffff801`52e69c6f : 00000000`00000003 00000000`00000008 00000000`00000000 fffff801`53245800 : nt!PopPolicySystemIdle+0x52
ffffe400`74aacb40 fffff801`52ef43c5 : ffffc003`00000003 ffffc003`ea569040 fffff801`52e69be0 ffffc003`db2ada20 : nt!PopPolicyWorkerThread+0x8f
ffffe400`74aacb70 fffff801`52e6bce5 : ffffc003`ea569040 00000000`00000080 ffffc003`db274040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffe400`74aacc10 fffff801`52fc99ca : ffffd301`adb0e180 ffffc003`ea569040 fffff801`52e6bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe400`74aacc60 00000000`00000000 : ffffe400`74aad000 ffffe400`74aa7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a

STACK_COMMAND: .thread 0xffffc003ea569040 ; kb

SYMBOL_NAME: win32kbase!UserPowerInfoCallout+143

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

IMAGE_VERSION: 10.0.18362.719

BUCKET_ID_FUNC_OFFSET: 143

FAILURE_BUCKET_ID: LKD_0x1A1_WIN32K_CALLOUT_WATCHDOG_win32kbase!UserPowerInfoCallout

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6c0c3561-4d71-6bb2-feb6-63d51ef17a17}

Followup: MachineOwner
---------

Und win32k.sys-20200314-2354.dmp

Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\LiveKernelReports\PoW32kWatchdog-20200326-0213.dmp]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18363 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff801`52e00000 PsLoadedModuleList = 0xfffff801`53248150
Debug session time: Thu Mar 26 03:13:05.015 2020 (UTC + 2:00)
System Uptime: 1 days 0:00:32.721
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000085`3a98d018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!IopLiveDumpEndMirroringCallback+0x7e:
fffff801`533aa7ce 488d8e00010000 lea rcx,[rsi+100h]
0: kd> !analyze -v
*******************************************************************************

  • *
  • Bugcheck Analysis *
  • *

*******************************************************************************

WIN32K_CALLOUT_WATCHDOG_LIVEDUMP (1a1)
A callout to Win32k did not return promptly.
Arguments:
Arg1: ffffc003ea569040, Thread blocking prompt return from a Win32k callout.
Arg2: 0000000000000000, Reserved.
Arg3: 0000000000000000, Reserved.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-7AT38GP

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 64

Key : Analysis.System
Value: CreateObject

ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x10
Live Generated Dump

BUGCHECK_CODE: 1a1

BUGCHECK_P1: ffffc003ea569040

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME: csrss.exe

FAULTING_THREAD: ffffc003ea569040

STACK_TEXT:
ffffe400`74aab000 fffff801`52f1508d : ffffd301`adc80180 003e7fff`fffffffe ffffd301`ffffffff 00000000`00000001 : nt!KiSwapContext+0x76
ffffe400`74aab140 fffff801`52f13f14 : ffffc003`ea569040 00000000`00000000 ffffc003`00000000 00000000`00000000 : nt!KiSwapThread+0xbfd
ffffe400`74aab1e0 fffff801`52f136b5 : 00000000`000000bc ffffc003`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x144
ffffe400`74aab280 fffff801`52f1692d : ffffe400`74aab458 ffffe400`0000001b 00000000`00000100 00000000`00000000 : nt!KeWaitForSingleObject+0x255
ffffe400`74aab360 fffff801`52f10c5e : ffffc003`e795fe10 ffffe400`74aab440 ffffc003`00010224 fffff801`52f5a6d0 : nt!ExpWaitForResource+0x6d
ffffe400`74aab3e0 fffff801`52f0fe2f : 00000000`00000030 00000000`00000004 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x33e
ffffe400`74aab4a0 ffffd295`a32279ef : 00000000`00000000 00000000`00000000 fffff801`538ba180 fffff801`538b8c53 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
ffffe400`74aab4e0 ffffd295`a31d2e6a : 00000000`00000005 ffffc003`e59da0c0 00000000`c000000d 00000000`00000000 : win32kbase!UserPowerInfoCallout+0x143
ffffe400`74aac5e0 ffffd295`a3d71040 : ffffc003`e59da0c0 fffff801`53268840 ffffe400`74aac930 00000000`c000000d : win32kbase!W32CalloutDispatch+0x56a
ffffe400`74aac800 fffff801`534425ac : ffffe400`74aaca70 00000000`00000000 ffffc003`e59da0c0 fffff801`52f1ca00 : win32k!W32CalloutDispatchThunk+0x10
ffffe400`74aac830 fffff801`5347cc9f : 00000000`00000010 00000000`00040082 ffffe400`74aac918 00000000`00000000 : nt!ExCallSessionCallBack+0xa4
ffffe400`74aac8f0 fffff801`533eb2a3 : ffffc003`e17f40c0 ffffe400`74aac999 00000000`00000103 00000000`00000001 : nt!PsInvokeWin32Callout+0xcf
ffffe400`74aac920 fffff801`52e2faed : 00000000`00000005 ffffe400`74aaca20 00000000`00000000 ffffc003`ea569180 : nt!PopInvokeWin32Callout+0x19f
ffffe400`74aaca00 fffff801`533e9f72 : 00000000`00000000 ffffe400`00000000 00000000`00000002 00000000`00000000 : nt!PopGetConsoleDisplayRequestCount+0x89
ffffe400`74aaca60 fffff801`52e69c6f : 00000000`00000003 00000000`00000008 00000000`00000000 fffff801`53245800 : nt!PopPolicySystemIdle+0x52
ffffe400`74aacb40 fffff801`52ef43c5 : ffffc003`00000003 ffffc003`ea569040 fffff801`52e69be0 ffffc003`db2ada20 : nt!PopPolicyWorkerThread+0x8f
ffffe400`74aacb70 fffff801`52e6bce5 : ffffc003`ea569040 00000000`00000080 ffffc003`db274040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffe400`74aacc10 fffff801`52fc99ca : ffffd301`adb0e180 ffffc003`ea569040 fffff801`52e6bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe400`74aacc60 00000000`00000000 : ffffe400`74aad000 ffffe400`74aa7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a

STACK_COMMAND: .thread 0xffffc003ea569040 ; kb

SYMBOL_NAME: win32kbase!UserPowerInfoCallout+143

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

IMAGE_VERSION: 10.0.18362.719

BUCKET_ID_FUNC_OFFSET: 143

FAILURE_BUCKET_ID: LKD_0x1A1_WIN32K_CALLOUT_WATCHDOG_win32kbase!UserPowerInfoCallout

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6c0c3561-4d71-6bb2-feb6-63d51ef17a17}

Followup: MachineOwner
---------

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'

Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\LiveKernelReports\win32k.sys-20200314-2354.dmp]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18363 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`1d400000 PsLoadedModuleList = 0xfffff803`1d848150
Debug session time: Sun Mar 15 00:54:48.484 2020 (UTC + 2:00)
System Uptime: 0 days 1:32:44.190
Loading Kernel Symbols
.....................................Page 3c6043 not present in the dump file. Type ".hh dbgerr004" for details
Page 3c4d42 not present in the dump file. Type ".hh dbgerr004" for details
..........................
................................................................
................................................................
..
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000cf`7c152018). Type ".hh dbgerr001" for details
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!IopLiveDumpEndMirroringCallback+0x7e:
fffff803`1d9aa7ce 488d8e00010000 lea rcx,[rsi+100h]
0: kd> !analyze -v
*******************************************************************************

  • *
  • Bugcheck Analysis *
  • *

*******************************************************************************

SESSION_HAS_VALID_POOL_ON_EXIT (ab)
Caused by a session driver not freeing its pool allocations prior to a
session unload. This indicates a bug in win32k.sys, atmfd.dll,
rdpdd.dll or a video driver.
Arguments:
Arg1: 0000000000000001, session ID
Arg2: 00000000000000c0, number of paged pool bytes that are leaking
Arg3: 0000000000000000, number of nonpaged pool bytes that are leaking
Arg4: 0000000000000001, total number of paged and nonpaged allocations that are leaking.
nonpaged allocations are in the upper half of this word,
paged allocations are in the lower half of this word.

Debugging Details:
------------------

Use !poolused 8 to dump allocation info for leaked session pooltags.
Page 3c64cd not present in the dump file. Type ".hh dbgerr004" for details
Page 3c8f9c not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-7AT38GP

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 5

Key : Analysis.Memory.CommitPeak.Mb
Value: 66

Key : Analysis.System
Value: CreateObject

ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x10
Live Generated Dump

BUGCHECK_CODE: ab

BUGCHECK_P1: 1

BUGCHECK_P2: c0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

SESSION_POOL_TAG: Usqm

IMAGE_NAME: win32kfull.sys

FAULTING_MODULE: ffffd4a1403b0000 win32k

PROCESS_NAME: csrss.exe

STACK_TEXT:
ffffae05`14db93a0 fffff803`1d99f71a : ffffffff`ffffffff 00000000`00000011 00000000`00000011 00000000`00000008 : nt!IopLiveDumpEndMirroringCallback+0x7e
ffffae05`14db93f0 fffff803`1d9aa435 : 00000000`00000000 fffff803`00000000 ffffc384`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x26e
ffffae05`14db9480 fffff803`1dc5b0fb : ffffc384`deec8d10 ffffc384`deec8d10 ffffae05`14db9758 ffffae05`14db9758 : nt!IopLiveDumpCaptureMemoryPages+0x79
ffffae05`14db9540 fffff803`1dc4e15f : 00000000`00000000 ffff9b88`8991b950 ffff9b88`8c6b5aa0 ffff9b88`8991b950 : nt!IoCaptureLiveDump+0x2e7
ffffae05`14db96f0 fffff803`1dc4e888 : ffffffff`80005388 00000000`00000000 00000000`00000000 00000000`000000ab : nt!DbgkpWerCaptureLiveFullDump+0x137
ffffae05`14db9750 fffff803`1dc4dfb1 : 00000000`00000002 00000000`00000000 ffffd4a1`400ddcf8 fffff803`00000000 : nt!DbgkpWerProcessPolicyResult+0x30
ffffae05`14db9780 ffffd4a1`3ff9beb6 : 00000000`00000000 ffffae05`14db9879 00000000`00000000 00000000`00000008 : nt!DbgkWerCaptureLiveKernelDump+0x1a1
ffffae05`14db97d0 ffffd4a1`40e07879 : ffffd4bf`00602140 00000000`00000000 ffffd4bf`006020f0 00000000`00000000 : win32kfull!CheckSessionPoolAllocations+0xe95f6
ffffae05`14db98e0 fffff803`1db25d36 : ffffc384`dec7f140 ffffc384`dec7f140 fffff803`1d86a3c0 00000000`00000000 : win32kbase!Win32KDriverUnload+0x549
ffffae05`14db9920 fffff803`1da212c7 : 00000000`00000000 ffffc384`dec7f140 ffffc384`dec35c70 ffffc384`de2c6080 : nt!MiDereferenceSessionFinal+0x86
ffffae05`14db9990 fffff803`1da87af6 : 00000000`00000000 ffffc384`00000000 00000000`0000002e ffffc384`dec7f140 : nt!MiDereferenceSession+0x3f
ffffae05`14db99c0 fffff803`1d9de469 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc384`dec7f140 : nt!MmCleanProcessAddressSpace+0x25e
ffffae05`14db9a40 fffff803`1dad1403 : ffffc384`dec7f140 ffff9b88`86da09f0 00000000`00000001 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffae05`14db9ac0 fffff803`1dacf253 : fffff803`00000000 ffffd4a1`3feb3501 00000000`00000000 00000000`000001b0 : nt!PspExitThread+0x60b
ffffae05`14db9bd0 fffff803`1d46bcff : ffffc384`de2c6080 00000000`00000080 ffffd4a1`3feb3520 00000000`00000001 : nt!PspTerminateThreadByPointer+0x53
ffffae05`14db9c10 fffff803`1d5c99ca : ffffda01`b2d39180 ffffc384`de2c6080 fffff803`1d46bc90 00000000`00000246 : nt!PspSystemThreadStartup+0x6f
ffffae05`14db9c60 00000000`00000000 : ffffae05`14dba000 ffffae05`14db4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a

SYMBOL_NAME: win32kfull!CheckSessionPoolAllocations+e95f6

MODULE_NAME: win32kfull

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: LKD_LEAKED_SESSION_POOLTAG_Usqm

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e50389c6-dcbe-c423-1805-73fcc9fe22a1}

Followup: MachineOwner
---------

Dump Dateien im Ordner LiveKernelReports (2024)
Top Articles
Tucson International Airport (TUS)
School District Welcomes Back Employees – Pasadena Now
Scooter Tramps And Beer
RS3 Mining Training Guide - 1-99/120 | Gaming Elephant
Beach Umbrella Home Depot
Andrew Tate Lpsg
Gasbuddy Costco Hawthorne
Oppenheimer Showtimes Near Cinemark Denton
Wausau Pilot Obituaries
Okc Farm And Garden Craigslist
Crestwood Funeral Home Obituaries Gadsden Al
Ellaeats Tumblr
Busted Newspaper Randolph County Missouri
Mobiloil Woodville Tx
2887 Royce Road Varysburg Ny 14167
Mhrb Near Me
Is Slatt Offensive
Highplainsobserverperryton
CHERIE FM en direct et gratuit | Radio en ligne
Otis Inmate Search Michigan
Reapers Tax Barotrauma
SuperLotto Plus | California State Lottery
27 Sage Street Holmdel Nj
3 Hour Radius From Me
The Parking Point Jfk Photos
Owyhee County Extension Office
Marketwatch Com Game
Brublackvip
Sentara Norfolk General Visiting Hours
3 Izzy Ln, Kittery, ME 03904 - MLS 1603480 - Coldwell Banker
Landwatch Ms
Ontpress Fresh Updates
Jodie Sweetin Breast Reduction
Family Naturist Contest
Wells Fargo Arena Des Moines Seating Chart Virtual View
Ma Scratch Tickets Codes
Con Edison Outage Map Staten Island
Bernadette Peters Nipple
Milepslit Ga
Sprague Brook Park Camping Reservations
Beaufort Mugfaces Last 72 Hours
Alles, was ihr über Saison 03 von Call of Duty: Warzone 2.0 und Call of Duty: Modern Warfare II wissen müsst
ARK Fjordur: Ultimate Resource Guide | Where to Find All Materials - Games Fuze
The Safe Keeper Henderson
Mcoc Black Panther
Ccga Address
Showbiz Waxahachie Bowling Hours
Personapay/Glens Falls Hospital
Petra Gorski Obituary
100.2华氏度是多少摄氏度
What Does the Bible Say About Christ In Me?
American Medical Response hiring EMT Basic - Bridgeport in Bridgeport, CT | LinkedIn
Latest Posts
Article information

Author: Golda Nolan II

Last Updated:

Views: 5981

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Golda Nolan II

Birthday: 1998-05-14

Address: Suite 369 9754 Roberts Pines, West Benitaburgh, NM 69180-7958

Phone: +522993866487

Job: Sales Executive

Hobby: Worldbuilding, Shopping, Quilting, Cooking, Homebrewing, Leather crafting, Pet

Introduction: My name is Golda Nolan II, I am a thoughtful, clever, cute, jolly, brave, powerful, splendid person who loves writing and wants to share my knowledge and understanding with you.