Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Show DivPrimary Analysis
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 8 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Machine Name:
- Kernel base = 0xfffff803`4fa84000 PsLoadedModuleList = 0xfffff803`4fdd05e0
- Debug session time: Thu Aug 3 16:33:10.064 2017 (UTC - 4:00)
- System Uptime: 3 days 19:50:00.765
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DPC_WATCHDOG_VIOLATION (133)
- The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
- or above.
- Arguments:
- Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
- component can usually be identified with a stack trace.
- Arg2: 0000000000000501, The DPC time count (in ticks).
- Arg3: 0000000000000500, The DPC time allotment (in ticks).
- Arg4: fffff8034fe65348
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x133
- PROCESS_NAME: System
- CURRENT_IRQL: d
- BAD_PAGES_DETECTED: 136a3
- LAST_CONTROL_TRANSFER: from fffff8034fc203d2 to fffff8034fbf04c0
- STACK_TEXT:
- fffff803`523d5bc8 fffff803`4fc203d2 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
- fffff803`523d5bd0 fffff803`4faf9899 : 00015a10`b8148960 fffff803`4e0db180 00000000`0142da31 00000000`00000002 : nt!KeAccumulateTicks+0x124ea2
- fffff803`523d5c30 fffff803`4fa0b676 : 00015a10`b81467dd fffff803`4fa09df0 fffff803`523ce290 fffff803`4fa5b460 : nt!KeClockInterruptNotify+0x599
- fffff803`523d5f40 fffff803`4fa93675 : fffff803`4fa5b3b0 ffff427c`44505ca3 00015a10`b794d152 ffffd400`16ea7a00 : hal!HalpTimerClockInterrupt+0x56
- fffff803`523d5f70 fffff803`4fbf1b5a : fffff803`523ce310 fffff803`4fa5b3b0 00000000`00000001 fffea5ef`47ecb811 : nt!KiCallInterruptServiceRoutine+0xa5
- fffff803`523d5fb0 fffff803`4fbf1fa7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
- fffff803`523ce290 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
- STACK_COMMAND: kb
- SYMBOL_NAME: PAGE_NOT_ZERO
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Unknown_Module
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- BUCKET_ID: PAGE_NOT_ZERO
- Followup: MachineOwner
- ---------
- *** Memory manager detected 79523 instance(s) of page corruption, target is likely to have memory corruption.
Advertisement
Add Comment
Please, Sign In to add comment