Guest User

Untitled

a guest
Aug 3rd, 2017
114
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.03 KB | None | 0 0
  1. Show DivPrimary Analysis
  2.  
  3. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  4. Online Crash Dump Analysis Service
  5. See http://www.osronline.com for more information
  6. Windows 8 Kernel Version 15063 MP (4 procs) Free x64
  7. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  8. Machine Name:
  9. Kernel base = 0xfffff803`4fa84000 PsLoadedModuleList = 0xfffff803`4fdd05e0
  10. Debug session time: Thu Aug 3 16:33:10.064 2017 (UTC - 4:00)
  11. System Uptime: 3 days 19:50:00.765
  12. *******************************************************************************
  13. * *
  14. * Bugcheck Analysis *
  15. * *
  16. *******************************************************************************
  17.  
  18. DPC_WATCHDOG_VIOLATION (133)
  19. The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
  20. or above.
  21. Arguments:
  22. Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
  23. component can usually be identified with a stack trace.
  24. Arg2: 0000000000000501, The DPC time count (in ticks).
  25. Arg3: 0000000000000500, The DPC time allotment (in ticks).
  26. Arg4: fffff8034fe65348
  27.  
  28. Debugging Details:
  29. ------------------
  30.  
  31. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  32.  
  33. CUSTOMER_CRASH_COUNT: 1
  34.  
  35. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  36.  
  37. BUGCHECK_STR: 0x133
  38.  
  39. PROCESS_NAME: System
  40.  
  41. CURRENT_IRQL: d
  42.  
  43. BAD_PAGES_DETECTED: 136a3
  44.  
  45. LAST_CONTROL_TRANSFER: from fffff8034fc203d2 to fffff8034fbf04c0
  46.  
  47. STACK_TEXT:
  48. fffff803`523d5bc8 fffff803`4fc203d2 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
  49. fffff803`523d5bd0 fffff803`4faf9899 : 00015a10`b8148960 fffff803`4e0db180 00000000`0142da31 00000000`00000002 : nt!KeAccumulateTicks+0x124ea2
  50. fffff803`523d5c30 fffff803`4fa0b676 : 00015a10`b81467dd fffff803`4fa09df0 fffff803`523ce290 fffff803`4fa5b460 : nt!KeClockInterruptNotify+0x599
  51. fffff803`523d5f40 fffff803`4fa93675 : fffff803`4fa5b3b0 ffff427c`44505ca3 00015a10`b794d152 ffffd400`16ea7a00 : hal!HalpTimerClockInterrupt+0x56
  52. fffff803`523d5f70 fffff803`4fbf1b5a : fffff803`523ce310 fffff803`4fa5b3b0 00000000`00000001 fffea5ef`47ecb811 : nt!KiCallInterruptServiceRoutine+0xa5
  53. fffff803`523d5fb0 fffff803`4fbf1fa7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  54. fffff803`523ce290 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  55.  
  56.  
  57. STACK_COMMAND: kb
  58.  
  59. SYMBOL_NAME: PAGE_NOT_ZERO
  60.  
  61. FOLLOWUP_NAME: MachineOwner
  62.  
  63. MODULE_NAME: Unknown_Module
  64.  
  65. IMAGE_NAME: Unknown_Image
  66.  
  67. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  68.  
  69. BUCKET_ID: PAGE_NOT_ZERO
  70.  
  71. Followup: MachineOwner
  72. ---------
  73.  
  74. *** Memory manager detected 79523 instance(s) of page corruption, target is likely to have memory corruption.
Advertisement
Add Comment
Please, Sign In to add comment