DMP File #2
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\053024-6812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff802`65e00000 PsLoadedModuleList = 0xfffff802`66a2a7c0
Debug session time: Thu May 30 00:40:23.608 2024 (UTC - 4:00)
System Uptime: 0 days 0:00:45.227
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000037`3a7cc018). Type ".hh dbgerr001" for details
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`661fdaf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff10a`75f156a0=000000000000013a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffa58d27c00100, Address of the heap that reported the corruption
Arg3: ffffa58d36674000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1250
Key : Analysis.Elapsed.mSec
Value: 2090
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 217
Key : Analysis.Init.Elapsed.mSec
Value: 2741
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.LegacyAPI
Value: 0x13a
Key : Bugcheck.Code.TargetModel
Value: 0x13a
Key : Failure.Bucket
Value: 0x13a_12_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {a796bf4c-66c5-2334-6cf1-fb1d4a426bad}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffffa58d27c00100
BUGCHECK_P3: ffffa58d36674000
BUGCHECK_P4: 0
FILE_IN_CAB: 053024-6812-01.dmp
CORRUPTING_POOL_ADDRESS: fffff80266afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffa58d36674000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: OAWrapper.exe
STACK_TEXT:
fffff10a`75f15698 fffff802`66394a3c : 00000000`0000013a 00000000`00000012 ffffa58d`27c00100 ffffa58d`36674000 : nt!KeBugCheckEx
fffff10a`75f156a0 fffff802`66394a9c : 00000000`00000012 ffffa58d`27c00280 ffffa58d`27c00100 ffffa58d`27c00290 : nt!RtlpHeapHandleError+0x40
fffff10a`75f156e0 fffff802`663946c9 : ffffa58d`366deac8 fffff10a`75f15804 ffffb901`00000000 fffff10a`75f15804 : nt!RtlpHpHeapHandleError+0x58
fffff10a`75f15710 fffff802`6622bdc8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000060 : nt!RtlpLogHeapFailure+0x45
fffff10a`75f15740 fffff802`6602edb8 : 00000000`00000002 ffffa58d`00000500 fffff10a`75f15881 00000000`00000500 : nt!RtlpHpVsContextAllocateInternal+0x1fb138
fffff10a`75f157a0 fffff802`6602e4ff : ffffa58d`00000002 ffff940b`ebbba000 00010000`464c764e 00000000`00000002 : nt!ExAllocateHeapPool+0x888
fffff10a`75f158e0 fffff802`667b7323 : 00000000`464c764e ffff940b`eb157000 00000000`00000000 fffff802`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
fffff10a`75f15930 fffff802`8ed1341f : 00000000`000004d0 00000000`00000000 00000000`00000100 ffff940b`00000000 : nt!ExAllocatePool2+0xa3
fffff10a`75f15980 00000000`000004d0 : 00000000`00000000 00000000`00000100 ffff940b`00000000 00000000`00001001 : nvlddmkm+0xbc341f
fffff10a`75f15988 00000000`00000000 : 00000000`00000100 ffff940b`00000000 00000000`00001001 00000000`00000fff : 0x4d0
SYMBOL_NAME: nvlddmkm+bc341f
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: bc341f
FAILURE_BUCKET_ID: 0x13a_12_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a796bf4c-66c5-2334-6cf1-fb1d4a426bad}
Followup: MachineOwner
---------