Windows 10 PC issues restart/freeze sound on but keyboard and monitor frozen

GuyPink

New Member
Hi ive been having issues with my pc randomly crashing when either waking it up or in a middle of the game after playing for like 1 hour my screen just freezes and all i hear is the ingame sounds then after a while my pc restarts ive logged one of the crash dumps and i cant figure out the issue ive got an rtx 2060 and a ryzen 3600 and 32gb of ram all updated and not overclocked



Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7981

Key : Analysis.IO.Other.Mb
Value: 15

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 20

Key : Analysis.Init.CPU.mSec
Value: 1312

Key : Analysis.Init.Elapsed.mSec
Value: 28872

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

0: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff804`22610000 fffff804`25e60000 nvlddmkm (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Tue Dec 6 01:36:52 2022 (638E8EA4)
CheckSum: 0375FB81
ImageSize: 03850000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
 
Hi ive been having issues with my pc randomly crashing when either waking it up or in a middle of the game after playing for like 1 hour my screen just freezes and all i hear is the ingame sounds then after a while my pc restarts ive logged one of the crash dumps and i cant figure out the issue ive got an rtx 2060 and a ryzen 3600 and 32gb of ram all updated and not overclocked



Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7981

Key : Analysis.IO.Other.Mb
Value: 15

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 20

Key : Analysis.Init.CPU.mSec
Value: 1312

Key : Analysis.Init.Elapsed.mSec
Value: 28872

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

0: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff804`22610000 fffff804`25e60000 nvlddmkm (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Tue Dec 6 01:36:52 2022 (638E8EA4)
CheckSum: 0375FB81
ImageSize: 03850000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Also This
DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7981

Key : Analysis.IO.Other.Mb
Value: 15

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 20

Key : Analysis.Init.CPU.mSec
Value: 1312

Key : Analysis.Init.Elapsed.mSec
Value: 28872

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

0: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff804`22610000 fffff804`25e60000 nvlddmkm (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Tue Dec 6 01:36:52 2022 (638E8EA4)
CheckSum: 0375FB81
ImageSize: 03850000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3343

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4420

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 1187

Key : Analysis.Init.Elapsed.mSec
Value: 11690

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\121922-24812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4077

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 48812

Key : Analysis.IO.Other.Mb
Value: 6

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 8

Key : Analysis.Init.CPU.mSec
Value: 359

Key : Analysis.Init.Elapsed.mSec
Value: 3933

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 121922-24812-01.dmp

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`0cef06e8 : fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 ffffc101`d90e1000 : nvlddmkm+0x91cca
fffff804`0cef0538 fffff804`0cef0690 : ffffc101`d926b000 fffff804`0cef0690 ffffc101`d90e1000 fffff804`226cf361 : 0xfffff804`0cef06e8
fffff804`0cef0540 ffffc101`d926b000 : fffff804`0cef0690 ffffc101`d90e1000 fffff804`226cf361 fffff804`0cef05e0 : 0xfffff804`0cef0690
fffff804`0cef0548 fffff804`0cef0690 : ffffc101`d90e1000 fffff804`226cf361 fffff804`0cef05e0 ffffc101`d926b000 : 0xffffc101`d926b000
fffff804`0cef0550 ffffc101`d90e1000 : fffff804`226cf361 fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b : 0xfffff804`0cef0690
fffff804`0cef0558 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : 0xffffc101`d90e1000
fffff804`0cef0560 fffff804`0cef05e0 : ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b 00000000`00000000 : nvlddmkm+0xbf361
fffff804`0cef0568 ffffc101`d926b000 : ffffa83f`75916f0b ffffa83f`75916f0b 00000000`00000000 fffff804`226ab1a4 : 0xfffff804`0cef05e0
fffff804`0cef0570 ffffa83f`75916f0b : ffffa83f`75916f0b 00000000`00000000 fffff804`226ab1a4 ffffc101`d90e1000 : 0xffffc101`d926b000
fffff804`0cef0578 ffffa83f`75916f0b : 00000000`00000000 fffff804`226ab1a4 ffffc101`d90e1000 ffffc101`d926b000 : 0xffffa83f`75916f0b
fffff804`0cef0580 00000000`00000000 : fffff804`226ab1a4 ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 : 0xffffa83f`75916f0b


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------
 
Back
Top
Chat with our AI Assistant ×