Coming soon - Get a detailed view of why an account is flagged as spam!
view details

This post has been de-listed

It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.

1
BSOD - WinDbg Anaylze Results
Post Flair (click to view more posts with a particular flair)
Post Body

Hi everyone.

This is related to my Earlier Post I used the minidump !analyze -v from windbg to get the following results:

//

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1999

    Key  : Analysis.Elapsed.mSec
    Value: 20725

    Key  : Analysis.IO.Other.Mb
    Value: 9

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 27

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 253985

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 150

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x133

    Key  : Bugcheck.Code.TargetModel
    Value: 0x133

    Key  : Failure.Bucket
    Value: 0x133_ISR_nvlddmkm!unknown_function

    Key  : Failure.Hash
    Value: {f97493a5-ea2b-23ca-a808-8602773c2a86}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Version
    Value: 10.0.22621.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80443f1c340

BUGCHECK_P4: 0

FILE_IN_CAB:  070424-18593-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff8044985fee0 -- (.trap 0xfffff8044985fee0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000196000a1 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80474209634 rsp=fffff80449860070 rbp=ffffb183efe47b70
 r8=fffff804498600b8  r9=0000000000000000 r10=fffff80474144e00
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nvlddmkm 0xc9634:
fffff804`74209634 488b5c2430      mov     rbx,qword ptr [rsp 30h] ss:fffff804`498600a0=ffffb183efe47000
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Last Epoch.exe

STACK_TEXT:  
fffff804`49867c78 fffff804`43478f29     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`43f1c340 : nt!KeBugCheckEx
fffff804`49867c80 fffff804`43478074     : 0000229b`22df70ff fffff804`3fd0c180 00000000`000c6593 00000000`00000000 : nt!KeAccumulateTicks 0x239
fffff804`49867ce0 fffff804`43475f81     : 00000000`00000000 ffffe381`1fda7800 fffff804`3fd0c180 00000000`00000000 : nt!KiUpdateRunTime 0xf4
fffff804`49867ea0 fffff804`434759aa     : fffff804`43e5fef0 ffffe381`1fda7830 ffffe381`1fda7830 00000000`00000002 : nt!KeClockInterruptNotify 0xc1
fffff804`49867f40 fffff804`4352177c     : 0000001d`8e69954e fffff804`43f0d4b0 fffff804`43f0d560 00000000`ffffffff : nt!HalpTimerClockInterrupt 0x10a
fffff804`49867f70 fffff804`4361c44a     : fffff804`4985ff60 fffff804`43f0d4b0 ffffb183`efe47b70 00000000`00000000 : nt!KiCallInterruptServiceRoutine 0x9c
fffff804`49867fb0 fffff804`4361cd17     : 00000000`00000001 fffff804`4985ff89 ffffb183`e8a49000 fffff804`74225a7a : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa
fffff804`4985fee0 fffff804`74209634     : ffffb183`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw 0x37
fffff804`49860070 ffffb183`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm 0xc9634
fffff804`49860078 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`7423a139 : 0xffffb183`00000000


SYMBOL_NAME:  nvlddmkm c9634

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  c9634

FAILURE_BUCKET_ID:  0x133_ISR_nvlddmkm!unknown_function

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup:     MachineOwner
---------

0: kd> lmvm nvlddmkm
Browse full module list
start             end                 module name
fffff804`74140000 fffff804`77c45000   nvlddmkm T (no symbols)           
    Loaded symbol image file: nvlddmkm.sys
    Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmii.inf_amd64_f8fd6a16207068a9\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Jun 25 11:55:41 2024 (667A3FBD)
    CheckSum:         039EADBB
    ImageSize:        03B05000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:

//

Could someone help me fix this issue? What am i looking at? I am a complete noob related to these things but am willing to learn.

Thanks for your help in advance!

Author
Account Strength
100%
Account Age
6 years
Verified Email
Yes
Verified Flair
No
Total Karma
13,024
Link Karma
1,011
Comment Karma
9,948
Profile updated: 2 days ago
Posts updated: 18 hours ago

Subreddit

Post Details

We try to extract some basic information from the post title. This is not always successful or accurate, please use your best judgement and compare these values to the post title and body for confirmation.
Posted
6 months ago