Bekir Gönen
Centipat
- Katılım
- 4 Ocak 2021
- Mesajlar
- 22
Daha fazla
- Cinsiyet
- Erkek
010421-33812-01.rar
drive.google.com
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffce0b48202100, Address of the heap that reported the corruption
Arg3: ffffce0b4ac44000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5609
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15983
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffffce0b48202100
BUGCHECK_P3: ffffce0b4ac44000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff806129713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff806128283b8: Unable to get Flags value from nt!KdVersionBlock
fffff806128283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffce0b4ac44000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff584`a4a9e838 fffff806`1271a538 : 00000000`0000013a 00000000`00000012 ffffce0b`48202100 ffffce0b`4ac44000 : nt!KeBugCheckEx
fffff584`a4a9e840 fffff806`1271a598 : 00000000`00000012 ffffce0b`48202280 ffffce0b`48202100 fffff584`a4a9ebf0 : nt!RtlpHeapHandleError+0x40
fffff584`a4a9e880 fffff806`1271a1c1 : ffffce0b`4ac56740 00000000`00000000 ffffce0b`514dc990 ffffce0b`50f99858 : nt!RtlpHpHeapHandleError+0x58
fffff584`a4a9e8b0 fffff806`12606c30 : ffffce0b`4a22c150 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
fffff584`a4a9e8e0 fffff806`1246531d : ffffce0b`50a6a640 fffff584`a4a9ede8 00000000`00000000 fffff584`00000000 : nt!RtlpHpVsContextFree+0x1a3d10
fffff584`a4a9e980 fffff806`1252f3d9 : ffffce0b`502f18b0 ffffce0b`514dc990 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff584`a4a9eaa0 fffff806`158b50d8 : 00000000`00000000 fffff584`a4a9ede8 fffff584`a4a9ee00 ffffce0b`514dc990 : nt!ExFreePoolEx+0x9
fffff584`a4a9ead0 fffff806`158a1339 : ffffce0b`4ac56760 00000000`000005e0 00000000`00000001 fffff806`12436a65 : NETIO!PplGenericFreeFunction+0x58
fffff584`a4a9eb00 fffff806`1598198d : ffffce0b`4ac56760 00000000`00000001 00000000`00000001 ffffce0b`514dc990 : NETIO!WfpNblInfoDestroyIfUnused+0xd9
fffff584`a4a9eb40 fffff806`18ae3800 : 00000000`00000006 00000000`00000000 ffffce0b`508e4090 fffff584`a4a9f120 : fwpkclnt!FwpsNetBufferListRetrieveContext0+0xdd
fffff584`a4a9eba0 fffff806`1598156b : fffff584`a4a9ec79 ffffce0b`4ac56760 00000000`00000000 00000000`00000000 : Ndu!NduNblNotifyCallback+0x150
fffff584`a4a9ec00 fffff806`15e5e173 : 00000000`00000000 ffffce0b`514dc990 ffffce0b`56156e50 00000000`00000000 : fwpkclnt!FwppNetBufferListEventNotify+0xdb
fffff584`a4a9ece0 fffff806`158b3a80 : ffffce0b`514dc990 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfppTaggedContextClone+0x43
fffff584`a4a9ed10 fffff806`15e36a59 : 00000000`00000000 fffff584`a4a9eea0 ffffce0b`4effd310 00000000`0000001c : NETIO!NetioAllocateAndReferenceCloneNetBufferListEx+0x250
fffff584`a4a9ed50 fffff806`15e38692 : 00000000`00000000 00000000`00000000 fffff584`a4a9f638 fffff584`a4a9f830 : tcpip!WfpProcessInTransportStackIndication+0x649
fffff584`a4a9f1f0 fffff806`15e24083 : 00000000`00000000 ffff7e2a`d0e4312a fffff584`a4a9f400 00000000`00000000 : tcpip!InetInspectReceiveDatagram+0x2c2
fffff584`a4a9f350 fffff806`15e23925 : ffffce0b`56948ea0 00000000`00000006 00000000`00000005 ffffce0b`00000000 : tcpip!UdpDeliverDatagrams+0x333
fffff584`a4a9f790 fffff806`15e22a70 : 00000000`00000014 ffffce0b`4effd310 fffff806`1601d908 ffffce0b`4a50a000 : tcpip!UdpReceiveDatagrams+0xda5
fffff584`a4a9fb90 fffff806`15e9a442 : ffffe200`00000014 ffffce0b`4a50a000 ffffce0b`56156e50 ffffe200`534440c4 : tcpip!UdpNlClientReceiveDatagrams+0x10
fffff584`a4a9fbc0 fffff806`15e41348 : 00000000`00000000 fffff584`a4a9fd49 ffffce0b`53798ca0 fffff584`a4a9fd10 : tcpip!IppProcessDeliverList+0xd2
fffff584`a4a9fcb0 fffff806`15e964df : fffff806`1601d2e0 ffffce0b`4a4d48e0 ffffce0b`4a50a000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x228
fffff584`a4a9fdb0 fffff806`15e9617c : ffffce0b`504c6a50 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x34f
fffff584`a4a9fec0 fffff806`15e62bde : ffffce0b`56156e50 00000000`00000000 00000000`00000000 fffff584`a4a9ff44 : tcpip!IpFlcReceivePackets+0xc
fffff584`a4a9fef0 fffff806`15e620b2 : 00000000`00000001 ffffce0b`50554000 fffff806`15e50690 fffff584`a4aa0228 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25e
fffff584`a4a9ffe0 fffff806`124c18f8 : fffff584`a4aa02c0 00000000`00000002 ffffce0b`4a2fa040 fffff584`a4aa0248 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xd2
fffff584`a4aa0110 fffff806`124c186d : fffff806`15e61fe0 fffff584`a4aa0248 ffffce0b`4a297500 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff584`a4aa0180 fffff806`15e50bc1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff584`a4aa01c0 fffff806`15cab560 : 00000000`00000001 ffffce0b`5049ecd1 00000000`00000020 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x311
fffff584`a4aa0460 fffff806`15cab057 : ffffce0b`50553a20 fffff806`1611dd01 00000000`00000000 ffffce0b`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff584`a4aa0540 fffff806`15cb0ee0 : ffffce0b`4ac1c1a0 ffffce0b`00000000 ffffce0b`4ac1c1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x227
fffff584`a4aa0640 fffff806`15ce17d6 : ffffce0b`56156e50 fffff584`a4aa0711 00000000`00000000 ffffce0b`4ae27b30 : ndis!ndisCallReceiveHandler+0x60
fffff584`a4aa0690 fffff806`15cae8a4 : 00000000`001f958a 00000000`00000001 ffffce0b`4ac1c1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x206e6
fffff584`a4aa0760 fffff806`17d6f979 : ffffce0b`4ae21010 ffffce0b`4ae21010 ffffce0b`53798b20 00000000`00000002 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff584`a4aa07f0 fffff806`17cfbc71 : ffffce0b`4aec6120 00000000`00000000 00000000`00000000 ffffce0b`4af2e000 : NETwew01!doApiIndicateReceiveNbl+0x9d
fffff584`a4aa0830 fffff806`17bb4515 : ffffce0b`4ab62470 0000004b`570b608e ffffce0b`00000002 ffffce0b`4af0dc70 : NETwew01!mStatFldConstructor+0x161
fffff584`a4aa08a0 fffff806`17baf662 : ffffce0b`4aba2d01 00000000`00000000 00000000`000000ff 00000000`00000000 : NETwew01!rfdQueueProcessFragments+0x1e5
fffff584`a4aa0940 fffff806`17baace0 : ffffce0b`4a2fa000 00000000`00000000 00000000`00000000 fffff806`00000000 : NETwew01!isrHandlerRoutineInta+0x1f2
fffff584`a4aa09c0 fffff806`17d76076 : 00000000`0000001a 00000000`00000000 00000000`00000000 00000000`00000000 : NETwew01!alonExInterruptHandlerRoutine+0x1c
fffff584`a4aa09f0 fffff806`15cbedd1 : ffffce0b`4a85ecc8 00000000`00000000 ffffce0b`4a2fa180 ffffce0b`4a295e30 : NETwew01!oscHandleInterrupt+0x12
fffff584`a4aa0a20 fffff806`15cd444c : ffffce0b`4a295e10 ffffce0b`4a295e10 fffff806`15cd4200 ffffce0b`4a85ecc8 : ndis!ndisQueuedMiniportDpcWorkItem+0x1a1
fffff584`a4aa0b40 fffff806`12533585 : ffffce0b`4a2fa040 ffffce0b`4a2fa040 fffff806`15cd4270 00000000`00000000 : ndis!ndisReceiveWorkerThread+0x1dc
fffff584`a4aa0c10 fffff806`125cb128 : fffff806`0e9b3180 ffffce0b`4a2fa040 fffff806`12533530 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff584`a4aa0c60 00000000`00000000 : fffff584`a4aa1000 fffff584`a4a9b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: NETIO!PplGenericFreeFunction+58
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.18362.1171
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 58
FAILURE_BUCKET_ID: 0x13a_12_NETIO!PplGenericFreeFunction
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f4823167-06e4-ee9d-d4cb-f7b09085485c}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.