Hi ive been having issues with my pc randomly crashing when either waking it up or in a middle of the game after playing for like 1 hour my screen just freezes and all i hear is the ingame sounds then after a while my pc restarts ive logged one of the crash dumps and i cant figure out the issue ive got an rtx 2060 and a  ryzen 3600 and 32gb of ram all updated and not overclocked
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 3187
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 7981
    Key  : Analysis.IO.Other.Mb
    Value: 15
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 20
    Key  : Analysis.Init.CPU.mSec
    Value: 1312
    Key  : Analysis.Init.Elapsed.mSec
    Value: 28872
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133
    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x133
    Key  : Bugcheck.Code.Register
    Value: 0x133
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
FILE_IN_CAB:  MEMORY.DMP
BUGCHECK_CODE:  133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8040b4fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME:  fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
 r8=00000000000000a8  r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa            rep stos byte ptr [rdi]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME:  System
STACK_TEXT: 
fffff804`0cefec88 fffff804`0ac5be7a     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d     : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1     : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863     : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222     : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5     : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a     : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07     : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca     : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361     : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4     : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe     : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4     : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e     : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000     : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME:  nvlddmkm+91cca
MODULE_NAME: nvlddmkm
IMAGE_NAME:  nvlddmkm.sys
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  91cca
FAILURE_BUCKET_ID:  0x133_ISR_nvlddmkm!unknown_function
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup:     MachineOwner
---------
0: kd> lmvm nvlddmkm
Browse full module list
start             end                 module name
fffff804`22610000 fffff804`25e60000   nvlddmkm   (no symbols)          
    Loaded symbol image file: nvlddmkm.sys
    Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Dec  6 01:36:52 2022 (638E8EA4)
    CheckSum:         0375FB81
    ImageSize:        03850000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
		
		
	 
Also This 
 DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 3187
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 7981
    Key  : Analysis.IO.Other.Mb
    Value: 15
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 20
    Key  : Analysis.Init.CPU.mSec
    Value: 1312
    Key  : Analysis.Init.Elapsed.mSec
    Value: 28872
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133
    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x133
    Key  : Bugcheck.Code.Register
    Value: 0x133
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
FILE_IN_CAB:  MEMORY.DMP
BUGCHECK_CODE:  133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8040b4fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME:  fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
 r8=00000000000000a8  r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa            rep stos byte ptr [rdi]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME:  System
STACK_TEXT:  
fffff804`0cefec88 fffff804`0ac5be7a     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d     : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1     : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863     : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222     : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5     : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a     : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07     : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca     : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361     : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4     : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe     : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4     : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e     : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000     : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME:  nvlddmkm+91cca
MODULE_NAME: nvlddmkm
IMAGE_NAME:  nvlddmkm.sys
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  91cca
FAILURE_BUCKET_ID:  0x133_ISR_nvlddmkm!unknown_function
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup:     MachineOwner
---------
0: kd> lmvm nvlddmkm
Browse full module list
start             end                 module name
fffff804`22610000 fffff804`25e60000   nvlddmkm   (no symbols)           
    Loaded symbol image file: nvlddmkm.sys
    Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Dec  6 01:36:52 2022 (638E8EA4)
    CheckSum:         0375FB81
    ImageSize:        03850000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 3343
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 4420
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 1187
    Key  : Analysis.Init.Elapsed.mSec
    Value: 11690
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133
    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x133
    Key  : Bugcheck.Code.Register
    Value: 0x133
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
FILE_IN_CAB:  MEMORY.DMP
BUGCHECK_CODE:  133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8040b4fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME:  fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
 r8=00000000000000a8  r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa            rep stos byte ptr [rdi]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME:  System
STACK_TEXT:  
fffff804`0cefec88 fffff804`0ac5be7a     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d     : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1     : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863     : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222     : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5     : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a     : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07     : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca     : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361     : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4     : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe     : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4     : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e     : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000     : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME:  nvlddmkm+91cca
MODULE_NAME: nvlddmkm
IMAGE_NAME:  nvlddmkm.sys
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  91cca
FAILURE_BUCKET_ID:  0x133_ISR_nvlddmkm!unknown_function
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup:     MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\121922-24812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4077
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 48812
    Key  : Analysis.IO.Other.Mb
    Value: 6
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 8
    Key  : Analysis.Init.CPU.mSec
    Value: 359
    Key  : Analysis.Init.Elapsed.mSec
    Value: 3933
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92
    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133
    Key  : Bugcheck.Code.Register
    Value: 0x133
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
FILE_IN_CAB:  121922-24812-01.dmp
BUGCHECK_CODE:  133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8040b4fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME:  fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
 r8=00000000000000a8  r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa            rep stos byte ptr [rdi]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
STACK_TEXT:  
fffff804`0cefec88 fffff804`0ac5be7a     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d     : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1     : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863     : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222     : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5     : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a     : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07     : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca     : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`0cef06e8     : fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 ffffc101`d90e1000 : nvlddmkm+0x91cca
fffff804`0cef0538 fffff804`0cef0690     : ffffc101`d926b000 fffff804`0cef0690 ffffc101`d90e1000 fffff804`226cf361 : 0xfffff804`0cef06e8
fffff804`0cef0540 ffffc101`d926b000     : fffff804`0cef0690 ffffc101`d90e1000 fffff804`226cf361 fffff804`0cef05e0 : 0xfffff804`0cef0690
fffff804`0cef0548 fffff804`0cef0690     : ffffc101`d90e1000 fffff804`226cf361 fffff804`0cef05e0 ffffc101`d926b000 : 0xffffc101`d926b000
fffff804`0cef0550 ffffc101`d90e1000     : fffff804`226cf361 fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b : 0xfffff804`0cef0690
fffff804`0cef0558 fffff804`226cf361     : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : 0xffffc101`d90e1000
fffff804`0cef0560 fffff804`0cef05e0     : ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b 00000000`00000000 : nvlddmkm+0xbf361
fffff804`0cef0568 ffffc101`d926b000     : ffffa83f`75916f0b ffffa83f`75916f0b 00000000`00000000 fffff804`226ab1a4 : 0xfffff804`0cef05e0
fffff804`0cef0570 ffffa83f`75916f0b     : ffffa83f`75916f0b 00000000`00000000 fffff804`226ab1a4 ffffc101`d90e1000 : 0xffffc101`d926b000
fffff804`0cef0578 ffffa83f`75916f0b     : 00000000`00000000 fffff804`226ab1a4 ffffc101`d90e1000 ffffc101`d926b000 : 0xffffa83f`75916f0b
fffff804`0cef0580 00000000`00000000     : fffff804`226ab1a4 ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 : 0xffffa83f`75916f0b
SYMBOL_NAME:  nvlddmkm+91cca
MODULE_NAME: nvlddmkm
IMAGE_NAME:  nvlddmkm.sys
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  91cca
FAILURE_BUCKET_ID:  0x133_ISR_nvlddmkm!unknown_function
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup:     MachineOwner
---------