<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 2)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 19 May 2026 00:58:41 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-741613</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Thu, 11 Jul 2013 18:00:29 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-741613</guid>
		<description>The new WinDbg 6.2.9200.20512 !analyze -v detects invalid heap calls in case "heap termination on corruption" is not enabled (by default on legacy 32-bit apps). In the past it was possible to see that only with heap verification command such as !heap -s -v or via dps ntdll!RtlpHeapFailureInfo. PS. Visual C++ 2012 enables heap termination on corruption by default even for 32-bit targets according to SDL guidelines: http://msdn.microsoft.com/en-us/library/windows/desktop/cc307399.aspx

0:001&gt; !heap -s -v
[...]
Heap address:  00580000
Error address: 005c1a2a
Error type: HEAP_FAILURE_INVALID_ARGUMENT
Details:    The caller tried to a free a block at an invalid
            (unaligned) address.
Follow-up:  Check the error's stack trace to find the culprit.


Stack trace:
                7799dff5: ntdll!RtlFreeHeap+0x00000064
                767514dd: kernel32!HeapFree+0x00000014
                0138140f: AppD8!free+0x0000001a
                0138134d: AppD8!StartModeling+0x0000001d
                0138121a: AppD8!WndProc+0x0000007a
                76f162fa: USER32!InternalCallWinProc+0x00000023
                76f16d3a: USER32!UserCallWinProcCheckWow+0x00000109
                76f177c4: USER32!DispatchMessageWorker+0x000003bc
                76f1788a: USER32!DispatchMessageW+0x0000000f
                0138109d: AppD8!wWinMain+0x0000009d
                0138152a: AppD8!__tmainCRTStartup+0x000000fd
                767533aa: kernel32!BaseThreadInitThunk+0x0000000e
                77959ef2: ntdll!__RtlUserThreadStart+0x00000070
                77959ec5: ntdll!_RtlUserThreadStart+0x0000001b

LFH Key                   : 0x3d43a3cb
Termination on corruption : DISABLED

0:001&gt; !analyze -v
[...]
BUGCHECK_STR:  APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument
[...]
STACK_TEXT:  
77a242a0 7799dff5 ntdll!RtlFreeHeap+0x64
77a242a4 767514dd kernel32!HeapFree+0x14
77a242a8 0138140f appd8!free+0x1a
77a242ac 0138134d appd8!StartModeling+0x1d
77a242b0 0138121a appd8!WndProc+0x7a
77a242b4 76f162fa user32!InternalCallWinProc+0x23
77a242b8 76f16d3a user32!UserCallWinProcCheckWow+0x109
77a242bc 76f177c4 user32!DispatchMessageWorker+0x3bc
77a242c0 76f1788a user32!DispatchMessageW+0xf
77a242c4 0138109d appd8!wWinMain+0x9d
77a242c8 0138152a appd8!__tmainCRTStartup+0xfd
77a242cc 767533aa kernel32!BaseThreadInitThunk+0xe
77a242d0 77959ef2 ntdll!__RtlUserThreadStart+0x70
77a242d4 77959ec5 ntdll!_RtlUserThreadStart+0x1b
[...]

0:001&gt; dps ntdll!RtlpHeapFailureInfo
77a24268  00000000
77a2426c  00000000
77a24270  00000009
77a24274  00580000
77a24278  005c1a2a
77a2427c  00000000
77a24280  00000000
77a24284  00000000
77a24288  00000000
77a2428c  00000000
77a24290  00000000
77a24294  00000000
77a24298  00000000
77a2429c  00000000
77a242a0  7799dff5 ntdll!RtlFreeHeap+0x64
77a242a4  767514dd kernel32!HeapFree+0x14
77a242a8  0138140f AppD8!free+0x1a
77a242ac  0138134d AppD8!StartModeling+0x1d
77a242b0  0138121a AppD8!WndProc+0x7a
77a242b4  76f162fa USER32!InternalCallWinProc+0x23
77a242b8  76f16d3a USER32!UserCallWinProcCheckWow+0x109
77a242bc  76f177c4 USER32!DispatchMessageWorker+0x3bc
77a242c0  76f1788a USER32!DispatchMessageW+0xf
77a242c4  0138109d AppD8!wWinMain+0x9d
77a242c8  0138152a AppD8!__tmainCRTStartup+0xfd 
77a242cc  767533aa kernel32!BaseThreadInitThunk+0xe
77a242d0  77959ef2 ntdll!__RtlUserThreadStart+0x70
77a242d4  77959ec5 ntdll!_RtlUserThreadStart+0x1b
77a242d8  00000000
77a242dc  00000000
77a242e0  00000000
77a242e4  00000000

0:001&gt; ~*k

   0  Id: 1d74.fd4 Suspend: 1 Teb: 7efdd000 Unfrozen
ChildEBP RetAddr  
001cfa3c 76f1790d USER32!NtUserGetMessage+0x15
001cfa58 0138106f USER32!GetMessageW+0x33
001cfa90 0138152a AppD8!wWinMain+0x6f
001cfadc 767533aa AppD8!__tmainCRTStartup+0xfd
001cfae8 77959ef2 kernel32!BaseThreadInitThunk+0xe
001cfb28 77959ec5 ntdll!__RtlUserThreadStart+0x70
001cfb40 00000000 ntdll!_RtlUserThreadStart+0x1b

#  1  Id: 1d74.e98 Suspend: 1 Teb: 7efda000 Unfrozen
ChildEBP RetAddr  
0118fbb4 779bf896 ntdll!DbgBreakPoint
0118fbe4 767533aa ntdll!DbgUiRemoteBreakin+0x3c
0118fbf0 77959ef2 kernel32!BaseThreadInitThunk+0xe
0118fc30 77959ec5 ntdll!__RtlUserThreadStart+0x70
0118fc48 00000000 ntdll!_RtlUserThreadStart+0x1b
</description>
		<content:encoded><![CDATA[<p>The new WinDbg 6.2.9200.20512 !analyze -v detects invalid heap calls in case &#8220;heap termination on corruption&#8221; is not enabled (by default on legacy 32-bit apps). In the past it was possible to see that only with heap verification command such as !heap -s -v or via dps ntdll!RtlpHeapFailureInfo. PS. Visual C++ 2012 enables heap termination on corruption by default even for 32-bit targets according to SDL guidelines: <a href="http://msdn.microsoft.com/en-us/library/windows/desktop/cc307399.aspx" rel="nofollow">http://msdn.microsoft.com/en-us/library/windows/desktop/cc307399.aspx</a></p>
<p>0:001> !heap -s -v<br />
[&#8230;]<br />
Heap address:  00580000<br />
Error address: 005c1a2a<br />
Error type: HEAP_FAILURE_INVALID_ARGUMENT<br />
Details:    The caller tried to a free a block at an invalid<br />
            (unaligned) address.<br />
Follow-up:  Check the error&#8217;s stack trace to find the culprit.</p>
<p>Stack trace:<br />
                7799dff5: ntdll!RtlFreeHeap+0&#215;00000064<br />
                767514dd: kernel32!HeapFree+0&#215;00000014<br />
                0138140f: AppD8!free+0&#215;0000001a<br />
                0138134d: AppD8!StartModeling+0&#215;0000001d<br />
                0138121a: AppD8!WndProc+0&#215;0000007a<br />
                76f162fa: USER32!InternalCallWinProc+0&#215;00000023<br />
                76f16d3a: USER32!UserCallWinProcCheckWow+0&#215;00000109<br />
                76f177c4: USER32!DispatchMessageWorker+0&#215;000003bc<br />
                76f1788a: USER32!DispatchMessageW+0&#215;0000000f<br />
                0138109d: AppD8!wWinMain+0&#215;0000009d<br />
                0138152a: AppD8!__tmainCRTStartup+0&#215;000000fd<br />
                767533aa: kernel32!BaseThreadInitThunk+0&#215;0000000e<br />
                77959ef2: ntdll!__RtlUserThreadStart+0&#215;00000070<br />
                77959ec5: ntdll!_RtlUserThreadStart+0&#215;0000001b</p>
<p>LFH Key                   : 0&#215;3d43a3cb<br />
Termination on corruption : DISABLED</p>
<p>0:001> !analyze -v<br />
[&#8230;]<br />
BUGCHECK_STR:  APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument<br />
[&#8230;]<br />
STACK_TEXT:<br />
77a242a0 7799dff5 ntdll!RtlFreeHeap+0&#215;64<br />
77a242a4 767514dd kernel32!HeapFree+0&#215;14<br />
77a242a8 0138140f appd8!free+0&#215;1a<br />
77a242ac 0138134d appd8!StartModeling+0&#215;1d<br />
77a242b0 0138121a appd8!WndProc+0&#215;7a<br />
77a242b4 76f162fa user32!InternalCallWinProc+0&#215;23<br />
77a242b8 76f16d3a user32!UserCallWinProcCheckWow+0&#215;109<br />
77a242bc 76f177c4 user32!DispatchMessageWorker+0&#215;3bc<br />
77a242c0 76f1788a user32!DispatchMessageW+0xf<br />
77a242c4 0138109d appd8!wWinMain+0&#215;9d<br />
77a242c8 0138152a appd8!__tmainCRTStartup+0xfd<br />
77a242cc 767533aa kernel32!BaseThreadInitThunk+0xe<br />
77a242d0 77959ef2 ntdll!__RtlUserThreadStart+0&#215;70<br />
77a242d4 77959ec5 ntdll!_RtlUserThreadStart+0&#215;1b<br />
[&#8230;]</p>
<p>0:001> dps ntdll!RtlpHeapFailureInfo<br />
77a24268  00000000<br />
77a2426c  00000000<br />
77a24270  00000009<br />
77a24274  00580000<br />
77a24278  005c1a2a<br />
77a2427c  00000000<br />
77a24280  00000000<br />
77a24284  00000000<br />
77a24288  00000000<br />
77a2428c  00000000<br />
77a24290  00000000<br />
77a24294  00000000<br />
77a24298  00000000<br />
77a2429c  00000000<br />
77a242a0  7799dff5 ntdll!RtlFreeHeap+0&#215;64<br />
77a242a4  767514dd kernel32!HeapFree+0&#215;14<br />
77a242a8  0138140f AppD8!free+0&#215;1a<br />
77a242ac  0138134d AppD8!StartModeling+0&#215;1d<br />
77a242b0  0138121a AppD8!WndProc+0&#215;7a<br />
77a242b4  76f162fa USER32!InternalCallWinProc+0&#215;23<br />
77a242b8  76f16d3a USER32!UserCallWinProcCheckWow+0&#215;109<br />
77a242bc  76f177c4 USER32!DispatchMessageWorker+0&#215;3bc<br />
77a242c0  76f1788a USER32!DispatchMessageW+0xf<br />
77a242c4  0138109d AppD8!wWinMain+0&#215;9d<br />
77a242c8  0138152a AppD8!__tmainCRTStartup+0xfd<br />
77a242cc  767533aa kernel32!BaseThreadInitThunk+0xe<br />
77a242d0  77959ef2 ntdll!__RtlUserThreadStart+0&#215;70<br />
77a242d4  77959ec5 ntdll!_RtlUserThreadStart+0&#215;1b<br />
77a242d8  00000000<br />
77a242dc  00000000<br />
77a242e0  00000000<br />
77a242e4  00000000</p>
<p>0:001> ~*k</p>
<p>   0  Id: 1d74.fd4 Suspend: 1 Teb: 7efdd000 Unfrozen<br />
ChildEBP RetAddr<br />
001cfa3c 76f1790d USER32!NtUserGetMessage+0&#215;15<br />
001cfa58 0138106f USER32!GetMessageW+0&#215;33<br />
001cfa90 0138152a AppD8!wWinMain+0&#215;6f<br />
001cfadc 767533aa AppD8!__tmainCRTStartup+0xfd<br />
001cfae8 77959ef2 kernel32!BaseThreadInitThunk+0xe<br />
001cfb28 77959ec5 ntdll!__RtlUserThreadStart+0&#215;70<br />
001cfb40 00000000 ntdll!_RtlUserThreadStart+0&#215;1b</p>
<p>#  1  Id: 1d74.e98 Suspend: 1 Teb: 7efda000 Unfrozen<br />
ChildEBP RetAddr<br />
0118fbb4 779bf896 ntdll!DbgBreakPoint<br />
0118fbe4 767533aa ntdll!DbgUiRemoteBreakin+0&#215;3c<br />
0118fbf0 77959ef2 kernel32!BaseThreadInitThunk+0xe<br />
0118fc30 77959ec5 ntdll!__RtlUserThreadStart+0&#215;70<br />
0118fc48 00000000 ntdll!_RtlUserThreadStart+0&#215;1b</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-741608</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Tue, 21 May 2013 20:07:14 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-741608</guid>
		<description>Sometimes we may have a buffer underflow and full page heap which places allocations at the end of pages will not catch the moment of corruption. Here we need to use backwards full page heap:

gflags /p /enable ImageFile  /full /backwards

Debugging TV frames episode 0x26 has full such example: 
http://www.debugging.tv</description>
		<content:encoded><![CDATA[<p>Sometimes we may have a buffer underflow and full page heap which places allocations at the end of pages will not catch the moment of corruption. Here we need to use backwards full page heap:</p>
<p>gflags /p /enable ImageFile  /full /backwards</p>
<p>Debugging TV frames episode 0&#215;26 has full such example:<br />
<a href="http://www.debugging.tv" rel="nofollow">http://www.debugging.tv</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-422559</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sun, 12 Feb 2012 23:17:43 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-422559</guid>
		<description>!heap -s -v verifies heap blocks:

&lt;p align="left"&gt;&lt;font size="1"&gt;&lt;code&gt;0:001&gt; !heap -s -v
**************************************************************
*                                                            *
*                  HEAP ERROR DETECTED                       *
*                                                            *
**************************************************************&lt;/code&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font size="1"&gt;&lt;code&gt;Details:&lt;/code&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font size="1"&gt;&lt;code&gt;Error address: 00740f28
Heap handle: 00740000
Error type heap_failure_multiple_entries_corruption (4)
Last known valid blocks: before - 007409e8, after - 007416b8
Stack trace:
                77b6fc76: ntdll!RtlpAnalyzeHeapFailure+0x0000025b
                77b29ef1: ntdll!RtlpCoalesceFreeBlocks+0x00000060
                77ad2d07: ntdll!RtlpFreeHeap+0x000001f4
                77ad2bf2: ntdll!RtlFreeHeap+0x00000142
                752914d1: kernel32!HeapFree+0x00000014
                010b11f0: Application+0x000011f0
                010b1274: Application+0x00001274
                010b1310: Application+0x00001310
                75293677: kernel32!BaseThreadInitThunk+0x0000000e
                77ad9f02: ntdll!__RtlUserThreadStart+0x00000070
                77ad9ed5: ntdll!_RtlUserThreadStart+0x0000001b
LFH Key                   : 0x7c150f40
Termination on corruption : DISABLED
  Heap     Flags   Reserv  Commit  Virt   Free  List   UCR  Virt  Lock  Fast 
                    (k)     (k)    (k)     (k) length      blocks cont. heap 
-----------------------------------------------------------------------------
.004c0000 00000002    1024    104    104      2     1     1    0      0   LFH
.ERROR: Block 007416b8 previous size f2 does not match previous block size 44
HEAP 00740000 (Seg 00740000) At 007416b8 Error: invalid block Previous&lt;/code&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font size="1"&gt;&lt;code&gt;00740000 00001002      64     12     64      3     2     1    0      0      
-----------------------------------------------------------------------------&lt;/code&gt;&lt;/font&gt;&lt;/p&gt;</description>
		<content:encoded><![CDATA[<p>!heap -s -v verifies heap blocks:</p>
<p align="left"><font size="1"><code>0:001> !heap -s -v<br />
**************************************************************<br />
*                                                            *<br />
*                  HEAP ERROR DETECTED                       *<br />
*                                                            *<br />
**************************************************************</code></font></p>
<p align="left"><font size="1"><code>Details:</code></font></p>
<p align="left"><font size="1"><code>Error address: 00740f28<br />
Heap handle: 00740000<br />
Error type heap_failure_multiple_entries_corruption (4)<br />
Last known valid blocks: before - 007409e8, after - 007416b8<br />
Stack trace:<br />
                77b6fc76: ntdll!RtlpAnalyzeHeapFailure+0x0000025b<br />
                77b29ef1: ntdll!RtlpCoalesceFreeBlocks+0x00000060<br />
                77ad2d07: ntdll!RtlpFreeHeap+0x000001f4<br />
                77ad2bf2: ntdll!RtlFreeHeap+0x00000142<br />
                752914d1: kernel32!HeapFree+0x00000014<br />
                010b11f0: Application+0x000011f0<br />
                010b1274: Application+0x00001274<br />
                010b1310: Application+0x00001310<br />
                75293677: kernel32!BaseThreadInitThunk+0x0000000e<br />
                77ad9f02: ntdll!__RtlUserThreadStart+0x00000070<br />
                77ad9ed5: ntdll!_RtlUserThreadStart+0x0000001b<br />
LFH Key                   : 0x7c150f40<br />
Termination on corruption : DISABLED<br />
  Heap     Flags   Reserv  Commit  Virt   Free  List   UCR  Virt  Lock  Fast<br />
                    (k)     (k)    (k)     (k) length      blocks cont. heap<br />
-----------------------------------------------------------------------------<br />
.004c0000 00000002    1024    104    104      2     1     1    0      0   LFH<br />
.ERROR: Block 007416b8 previous size f2 does not match previous block size 44<br />
HEAP 00740000 (Seg 00740000) At 007416b8 Error: invalid block Previous</code></font></p>
<p align="left"><font size="1"><code>00740000 00001002      64     12     64      3     2     1    0      0<br />
-----------------------------------------------------------------------------</code></font></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 117)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-208576</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 117)</dc:creator>
		<pubDate>Mon, 29 Nov 2010 23:48:23 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-208576</guid>
		<description>[...] to functions. Here we look at invalid heap block parameter specialization. It is different from heap corruption or double free pattern because no corruption happens in heap structures before detection and the [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] to functions. Here we look at invalid heap block parameter specialization. It is different from heap corruption or double free pattern because no corruption happens in heap structures before detection and the [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 110)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-194240</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 110)</dc:creator>
		<pubDate>Mon, 18 Oct 2010 14:14:20 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-194240</guid>
		<description>[...] Experts Magazine Online Shared Buffer Overwrite differs from Local Buffer Overflow and heap / pool memory corruption patterns in not writing over control structures situated at dynamically [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Experts Magazine Online Shared Buffer Overwrite differs from Local Buffer Overflow and heap / pool memory corruption patterns in not writing over control structures situated at dynamically [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Strong process coupling, stack trace collection, critical section coruption and wait chains, message box, self-diagnosis and hidden exception and dynamic memory corruption: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-147470</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Strong process coupling, stack trace collection, critical section coruption and wait chains, message box, self-diagnosis and hidden exception and dynamic memory corruption: pattern cooperation</dc:creator>
		<pubDate>Mon, 26 Apr 2010 19:54:31 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-147470</guid>
		<description>[...] It finally looks like a heap corruption: [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] It finally looks like a heap corruption: [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 3)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-132725</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 3)</dc:creator>
		<pubDate>Wed, 10 Mar 2010 15:39:00 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-132725</guid>
		<description>[...] Today we introduce an icon for Dynamic Memory Corruption (process heap) pattern: [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Today we introduce an icon for Dynamic Memory Corruption (process heap) pattern: [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis AntiPatterns (Part 13)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-83727</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis AntiPatterns (Part 13)</dc:creator>
		<pubDate>Thu, 09 Jul 2009 14:54:09 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-83727</guid>
		<description>[...] without questioning them or not considering possible exceptions. For example, the usual advise to heap corruption signs in process memory dumps is to ask to enable full page heap. However page heap helps to [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] without questioning them or not considering possible exceptions. For example, the usual advise to heap corruption signs in process memory dumps is to ask to enable full page heap. However page heap helps to [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Heap corruption, module variety, execution residue, coincidental symbolic information and critical section corruption: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-72896</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Heap corruption, module variety, execution residue, coincidental symbolic information and critical section corruption: pattern cooperation</dc:creator>
		<pubDate>Fri, 01 May 2009 13:54:47 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-72896</guid>
		<description>[...] environments or insufficiently tested in multi-threaded environments. Many such crashes result from dynamic memory corruption of a process [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] environments or insufficiently tested in multi-threaded environments. Many such crashes result from dynamic memory corruption of a process [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: La billeterie &#187; Blog Archive &#187; Analyse mémoire sous windows</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-71843</link>
		<dc:creator>La billeterie &#187; Blog Archive &#187; Analyse mémoire sous windows</dc:creator>
		<pubDate>Wed, 22 Apr 2009 08:56:56 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/31/crash-dump-analysis-patterns-part-2/#comment-71843</guid>
		<description>[...] des options de gflags.exe Tous les flags de gflags Gflags : Enable page heap Full/Standard enable heap checking La structure des blocs mémoire quand quand le page heap est activé appverifier The Structure of a [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] des options de gflags.exe Tous les flags de gflags Gflags : Enable page heap Full/Standard enable heap checking La structure des blocs mémoire quand quand le page heap est activé appverifier The Structure of a [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
