Advertisement
Guest User

Minidump

a guest
Apr 30th, 2025
17
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.52 KB | None | 0 0
  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3. ExtensionRepository : Implicit
  4. UseExperimentalFeatureForNugetShare : true
  5. AllowNugetExeUpdate : true
  6. NonInteractiveNuget : true
  7. AllowNugetMSCredentialProviderInstall : true
  8. AllowParallelInitializationOfLocalRepositories : true
  9.  
  10. EnableRedirectToV8JsProvider : false
  11.  
  12. -- Configuring repositories
  13. ----> Repository : LocalInstalled, Enabled: true
  14. ----> Repository : UserExtensions, Enabled: true
  15.  
  16. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.032 seconds
  17.  
  18. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  19.  
  20. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
  21. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  22. ----> Repository : LocalInstalled, Enabled: true, Packages count: 29
  23.  
  24. Microsoft (R) Windows Debugger Version 10.0.26100.3916 AMD64
  25. Copyright (c) Microsoft Corporation. All rights reserved.
  26.  
  27.  
  28. Loading Dump File [F:\042925-6500-01.dmp]
  29. Mini Kernel Dump File: Only registers and stack trace are available
  30.  
  31. Symbol search path is: srv*
  32. Executable search path is:
  33. Windows 10 Kernel Version 26100 MP (16 procs) Free x64
  34. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  35. Kernel base = 0xfffff804`ea400000 PsLoadedModuleList = 0xfffff804`eb2f49c0
  36. Debug session time: Tue Apr 29 22:44:24.634 2025 (UTC + 1:00)
  37. System Uptime: 0 days 2:08:28.265
  38. Loading Kernel Symbols
  39. ...............................................................
  40. ................................................................
  41. ...............................................................
  42. Loading User Symbols
  43. PEB is paged out (Peb.Ldr = 0000007c`b2efd018). Type ".hh dbgerr001" for details
  44. Loading unloaded module list
  45. .........
  46. For analysis of this file, run !analyze -v
  47. 7: kd> !analyze -v
  48. *******************************************************************************
  49. * *
  50. * Bugcheck Analysis *
  51. * *
  52. *******************************************************************************
  53.  
  54. DPC_WATCHDOG_VIOLATION (133)
  55. The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
  56. or above.
  57. Arguments:
  58. Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
  59. DISPATCH_LEVEL or above.
  60. Arg2: 0000000000001e00, The watchdog period (in ticks).
  61. Arg3: fffff804eb3c33b0, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
  62. additional information regarding the cumulative timeout
  63. Arg4: 0000000000000000
  64.  
  65. Debugging Details:
  66. ------------------
  67.  
  68. *************************************************************************
  69. *** ***
  70. *** ***
  71. *** Either you specified an unqualified symbol, or your debugger ***
  72. *** doesn't have full symbol information. Unqualified symbol ***
  73. *** resolution is turned off by default. Please either specify a ***
  74. *** fully qualified symbol module!symbolname, or enable resolution ***
  75. *** of unqualified symbols by typing ".symopt- 100". Note that ***
  76. *** enabling unqualified symbol resolution with network symbol ***
  77. *** server shares in the symbol path may cause the debugger to ***
  78. *** appear to hang for long periods of time when an incorrect ***
  79. *** symbol name is typed or the network symbol server is down. ***
  80. *** ***
  81. *** For some commands to work properly, your symbol path ***
  82. *** must point to .pdb files that have full type information. ***
  83. *** ***
  84. *** Certain .pdb files (such as the public OS symbols) do not ***
  85. *** contain the required information. Contact the group that ***
  86. *** provided you with these symbols if you need this command to ***
  87. *** work. ***
  88. *** ***
  89. *** Type referenced: TickPeriods ***
  90. *** ***
  91. *************************************************************************
  92.  
  93. KEY_VALUES_STRING: 1
  94.  
  95. Key : Analysis.CPU.mSec
  96. Value: 1937
  97.  
  98. Key : Analysis.Elapsed.mSec
  99. Value: 2615
  100.  
  101. Key : Analysis.IO.Other.Mb
  102. Value: 0
  103.  
  104. Key : Analysis.IO.Read.Mb
  105. Value: 0
  106.  
  107. Key : Analysis.IO.Write.Mb
  108. Value: 0
  109.  
  110. Key : Analysis.Init.CPU.mSec
  111. Value: 1046
  112.  
  113. Key : Analysis.Init.Elapsed.mSec
  114. Value: 15513
  115.  
  116. Key : Analysis.Memory.CommitPeak.Mb
  117. Value: 93
  118.  
  119. Key : Bugcheck.Code.LegacyAPI
  120. Value: 0x133
  121.  
  122. Key : Dump.Attributes.AsUlong
  123. Value: 21008
  124.  
  125. Key : Dump.Attributes.DiagDataWrittenToHeader
  126. Value: 1
  127.  
  128. Key : Dump.Attributes.ErrorCode
  129. Value: 0
  130.  
  131. Key : Dump.Attributes.KernelGeneratedTriageDump
  132. Value: 1
  133.  
  134. Key : Dump.Attributes.LastLine
  135. Value: Dump completed successfully.
  136.  
  137. Key : Dump.Attributes.ProgressPercentage
  138. Value: 0
  139.  
  140. Key : Failure.Bucket
  141. Value: 0x133_ISR_nt!KeAccumulateTicks
  142.  
  143. Key : Failure.Hash
  144. Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
  145.  
  146.  
  147. BUGCHECK_CODE: 133
  148.  
  149. BUGCHECK_P1: 1
  150.  
  151. BUGCHECK_P2: 1e00
  152.  
  153. BUGCHECK_P3: fffff804eb3c33b0
  154.  
  155. BUGCHECK_P4: 0
  156.  
  157. FILE_IN_CAB: 042925-6500-01.dmp
  158.  
  159. DUMP_FILE_ATTRIBUTES: 0x21008
  160. Kernel Generated Triage Dump
  161.  
  162. DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
  163.  
  164. BLACKBOXBSD: 1 (!blackboxbsd)
  165.  
  166.  
  167. BLACKBOXNTFS: 1 (!blackboxntfs)
  168.  
  169.  
  170. BLACKBOXPNP: 1 (!blackboxpnp)
  171.  
  172.  
  173. BLACKBOXWINLOGON: 1
  174.  
  175. CUSTOMER_CRASH_COUNT: 1
  176.  
  177. PROCESS_NAME: Discord.exe
  178.  
  179. STACK_TEXT:
  180. ffffab01`ffb1cb48 fffff804`ea72eec9 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`eb3c33b0 : nt!KeBugCheckEx
  181. ffffab01`ffb1cb50 fffff804`ea7a44a1 : 00000000`00000000 00000000`0000000c 00000000`00000000 00000000`00078710 : nt!KeAccumulateTicks+0x589
  182. ffffab01`ffb1cbc0 fffff804`ea7a4065 : 00000000`00047c9f 00000000`00000000 00000011`f27c08cd 00000000`0000000d : nt!KiUpdateRunTime+0xc9
  183. ffffab01`ffb1cc40 fffff804`ea68573e : 00000000`0000000d 00000000`00000000 ffffab01`ffb097e8 fffff804`eb320758 : nt!KiUpdateTime+0x2b5
  184. ffffab01`ffb1cdd0 fffff804`ea6870ed : ffffbd85`4f751fe0 00000000`00000000 ffffbd85`4f752090 fffff804`eb38e168 : nt!KeClockInterruptNotify+0x66e
  185. ffffab01`ffb1cf50 fffff804`eaa7dade : 00000000`84072c0c ffffbd85`4f751fe0 ffffcd86`e9a0edd0 00000011`f2c684e6 : nt!KiCallInterruptServiceRoutine+0x2ed
  186. ffffab01`ffb1cfb0 fffff804`eaa7e2ec : 00000011`f2c67151 ffffcd86`e9a0ee50 00000011`f2c6715b 00001a97`ce388d54 : nt!KiInterruptSubDispatchNoLockNoEtw+0x4e
  187. ffffcd86`e9a0edd0 fffff804`ea73d422 : 00000000`00000404 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x3c
  188. ffffcd86`e9a0ef60 fffff804`ea73d38b : ffffcd86`e9a0f201 ffffbd85`57cdb410 ffffcd86`e9a0f201 00000000`00000000 : nt!KiIpiStallOnPacketTargetsPrcb+0x32
  189. ffffcd86`e9a0ef90 fffff804`eadf59d5 : ffffcd86`e9a0f210 ffffcd86`e9a0fb20 ffffbd85`5fc11080 ffffbd85`5fd78080 : nt!KeFlushProcessWriteBuffers+0x10f
  190. ffffcd86`e9a0eff0 fffff804`eaee840a : 00000000`00000000 0000007c`b37fcde0 ffffbd85`4f6a97d0 00000000`00000001 : nt!PsQueryTotalCycleTimeProcess+0x25
  191. ffffcd86`e9a0f020 fffff804`eaa8ef58 : ffffbd85`5fc11080 00000000`00000000 ffffcd86`e9a0fb20 00000000`00000000 : nt!NtQueryInformationProcess+0x10e35a
  192. ffffcd86`e9a0fa30 00007ff8`aca5c2e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  193. 0000007c`b37fcda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`aca5c2e4
  194.  
  195.  
  196. SYMBOL_NAME: nt!KeAccumulateTicks+589
  197.  
  198. MODULE_NAME: nt
  199.  
  200. IMAGE_NAME: ntkrnlmp.exe
  201.  
  202. IMAGE_VERSION: 10.0.26100.3775
  203.  
  204. STACK_COMMAND: .cxr; .ecxr ; kb
  205.  
  206. BUCKET_ID_FUNC_OFFSET: 589
  207.  
  208. FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
  209.  
  210. OSPLATFORM_TYPE: x64
  211.  
  212. OSNAME: Windows 10
  213.  
  214. FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
  215.  
  216. Followup: MachineOwner
  217.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement