HI there, my pc is acting really weird and slow, the discord loading logo spins at like 5 fps and my whole system feels really unresponsive. It was find a couple days ago, but is now really messed up. Anyways, here's my dump file... Any help appreciated
Microsoft (R) Windows Debugger Version 10.0.25111.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Dump completed successfully, progress percentage: 100
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff801
Debug session time: Wed Jul 20 21:33:28.035 2022 (UTC + 1:00)
System Uptime: 0 days 0:30:31.699
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801
10: kd> !analyze -v
***
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc800411bf000, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80361eca706, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2092
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6649
Key : Analysis.Init.CPU.mSec
Value: 1156
Key : Analysis.Init.Elapsed.mSec
Value: 7125
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Bugcheck.DumpVsMemoryMatch
Value: True
Key : Dump.Attributes.AsUlong
Value: 1000
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc800411bf000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80361eca706
BUGCHECK_P4: 0
READ_ADDRESS: ffffc800411bf000
MM_INTERNAL_CODE: 0
IMAGE_NAME: nvlddmkm.sys
MODULE_NAME: nvlddmkm
FAULTING_MODULE: fffff803616d0000 nvlddmkm
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffff808c2cb67000 -- (.trap 0xffff808c2cb67000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc800411be000 rbx=0000000000000000 rcx=0000000000000400
rdx=000000000007f013 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80361eca706 rsp=ffff808c2cb67190 rbp=0000000000000000
r8=0000000000002e14 r9=000000000007e069 r10=0000000000000000
r11=ffff808c2cb671d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x7fa706:
fffff803
Resetting default scope
STACK_TEXT:
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
ffff808c
SYMBOL_NAME: nvlddmkm+7fa706
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 7fa706
FAILURE_BUCKET_ID: AV_VRF_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3268b33e-4a6a-c96b-85fa-8ac0003be8dd}
Followup: MachineOwner
---------
10: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff803
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispig.inf_amd64_246e95e4066041ad\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Fri Jun 24 00:18:39 2022 (62B4F4CF)
CheckSum: 029B99BD
ImageSize: 02AA8000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Microsoft (R) Windows Debugger Version 10.0.25111.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Dump completed successfully, progress percentage: 100
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff801
5080f000 PsLoadedModuleList = 0xfffff801
51438650Debug session time: Wed Jul 20 21:33:28.035 2022 (UTC + 1:00)
System Uptime: 0 days 0:30:31.699
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801
50c26d00 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff808c
2cb66d60=000000000000005010: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc800411bf000, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80361eca706, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2092
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6649
Key : Analysis.Init.CPU.mSec
Value: 1156
Key : Analysis.Init.Elapsed.mSec
Value: 7125
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Bugcheck.DumpVsMemoryMatch
Value: True
Key : Dump.Attributes.AsUlong
Value: 1000
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc800411bf000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80361eca706
BUGCHECK_P4: 0
READ_ADDRESS: ffffc800411bf000
MM_INTERNAL_CODE: 0
IMAGE_NAME: nvlddmkm.sys
MODULE_NAME: nvlddmkm
FAULTING_MODULE: fffff803616d0000 nvlddmkm
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffff808c2cb67000 -- (.trap 0xffff808c2cb67000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc800411be000 rbx=0000000000000000 rcx=0000000000000400
rdx=000000000007f013 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80361eca706 rsp=ffff808c2cb67190 rbp=0000000000000000
r8=0000000000002e14 r9=000000000007e069 r10=0000000000000000
r11=ffff808c2cb671d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x7fa706:
fffff803
61eca706 893488 mov dword ptr [rax+rcx*4],esi ds:ffffc800
411bf000=????????Resetting default scope
STACK_TEXT:
ffff808c
2cb66d58 fffff801
50ca68db : 0000000000000050 ffffc800
411bf000 0000000000000002 ffff808c
2cb67000 : nt!KeBugCheckExffff808c
2cb66d60 fffff801
50a84cf6 : 0000000000000005 00000000
00000002 ffff808c2cb66f60 00000000
00000000 : nt!MiSystemFault+0x1d36abffff808c
2cb66e60 fffff801
50c358f5 : fffff80353b405b1 00000000
00000001 0000000000000003 00000000
00000000 : nt!MmAccessFault+0x2a6ffff808c
2cb67000 fffff803
61eca706 : ffffde867b3ce0b0 00000000
00000028 fffff80361efbf69 fffff803
61ec0100 : nt!KiPageFault+0x335ffff808c
2cb67190 fffff803
62318a22 : 0000000000000003 ffffde86
7b3ce0b0 000000000000000f 00000000
00000000 : nvlddmkm+0x7fa706ffff808c
2cb671e0 fffff803
616e3603 : ffffde867b3c5000 fffff803
0000000f 0000000000000000 00000000
00050201 : nvlddmkm+0xc48a22ffff808c
2cb67280 fffff803
622652a0 : 0000000000000001 ffff808c
2cb67329 ffffde866b877000 00953cb3
00b3fcd1 : nvlddmkm+0x13603ffff808c
2cb672c0 fffff803
6226dcfe : 0000000000000000 00000000
00000005 0000000000000001 ffffde86
6b877000 : nvlddmkm+0xb952a0ffff808c
2cb67390 fffff803
62542788 : 0000000000000001 00000000
00000005 ffffde866b855000 00000000
00000001 : nvlddmkm+0xb9dcfeffff808c
2cb67410 fffff803
62541fa7 : 0000000000000000 00000000
00000000 0000000000000000 ffff808c
00000002 : nvlddmkm+0xe72788ffff808c
2cb674e0 fffff803
6256d2e6 : ffffde866b855000 ffff808c
2cb67650 0000000000000001 00000000
00000007 : nvlddmkm+0xe71fa7ffff808c
2cb67540 fffff803
62580431 : fffff8036256d18f 00000000
00000001 0000000000000002 00000000
ffffffff : nvlddmkm+0xe9d2e6ffff808c
2cb67680 fffff803
53b405b1 : 3042323932303200 ce010a30
32313030 fffff88c38f296ed ffff808c
2cb67781 : nvlddmkm+0xeb0431ffff808c
2cb676c0 fffff803
53b3fe4e : 0000000000000080 ffff808c
2cb67781 0000000000000000 00000000
00000000 : dxgkrnl!DpiDxgkDdiSetPowerState+0x59ffff808c
2cb67720 fffff803
53b40a2a : ffffde8677efc010 00000000
00000000 0000000000000001 00000000
00000000 : dxgkrnl!DpiFdoSetAdapterPowerState+0x17affff808c
2cb677e0 fffff803
53b400c1 : ffffde866b6bf030 ffffde86
6c22a500 ffffde86697e4120 ffffde86
77efc000 : dxgkrnl!DpiFdoHandleDevicePower+0x2eaffff808c
2cb67880 fffff803
53b41a30 : ffffde8677efc010 ffffde86
6b6bf180 ffffde866b6bf030 00000000
00000000 : dxgkrnl!DpiFdoDispatchPower+0x21ffff808c
2cb678b0 fffff803
6257d230 : 0000000000000000 ffff808c
2cb67a79 0000000000000000 ffffde86
6b855000 : dxgkrnl!DpiDispatchPower+0xe0ffff808c
2cb679d0 fffff803
6257c62e : ffffde866b6bf030 ffffde86
6b855000 ffffde86767b5040 ffffde86
00000000 : nvlddmkm+0xead230ffff808c
2cb67ae0 fffff801
50bbb277 : ffffde86767b5040 ffff808c
2cb67b90 0000000000000000 ffff808c
2cb67b00 : nvlddmkm+0xeac62effff808c
2cb67b10 fffff801
50b3f415 : fffffffffa0a1f00 fffff801
50bbb070 ffffde86794f8bb0 00000000
00000094 : nt!PopIrpWorker+0x207ffff808c
2cb67bb0 fffff801
50c2adb4 : ffffc80033c40180 ffffde86
767b5040 fffff80150b3f3c0 00000000
00000246 : nt!PspSystemThreadStartup+0x55ffff808c
2cb67c00 00000000
00000000 : ffff808c2cb68000 ffff808c
2cb61000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x34SYMBOL_NAME: nvlddmkm+7fa706
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 7fa706
FAILURE_BUCKET_ID: AV_VRF_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3268b33e-4a6a-c96b-85fa-8ac0003be8dd}
Followup: MachineOwner
---------
10: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff803
616d0000 fffff803
64178000 nvlddmkm (no symbols) Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispig.inf_amd64_246e95e4066041ad\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Fri Jun 24 00:18:39 2022 (62B4F4CF)
CheckSum: 029B99BD
ImageSize: 02AA8000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Last edited by a moderator: