DPC_WATCHDOG_VIOLATION (133) Error with hashcat.exe - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: DPC_WATCHDOG_VIOLATION (133) Error with hashcat.exe (/thread-9907.html) |
DPC_WATCHDOG_VIOLATION (133) Error with hashcat.exe - kivik92 - 02-27-2021 Hi everyone, I had next error when using hashcat.exe (https://hashcat.net/hashcat/) and My Pc go to reboot, without Blue Screen only reboot Here information and url to download of my minidump File: ====================== URL to download minidump file: https://dropmefiles.com/Ld7Er ====================== Winver: 20H2 build 19042.804 ====================== PC Hardware Report: https://dropmefiles.com/JW3aa ====================== DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff8021fefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 61 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on USER-PC Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 56 Key : Analysis.Memory.CommitPeak.Mb Value: 289 Key : Analysis.System Value: CreateObject BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff8021fefb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: hashcat.exe STACK_TEXT: ffff9480`2715ce18 fffff802`1f63ad0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`1fefb320 : nt!KeBugCheckEx ffff9480`2715ce20 fffff802`1f46f9a3 : 00005ca8`5bd0b4c8 ffff9480`271e7180 00000000`00000000 ffff9480`271e7180 : nt!KeAccumulateTicks+0x1c8b0c ffff9480`2715ce80 fffff802`1f46f48a : ffffab0b`96ce70e0 ffff900f`63c479f0 fffff802`373b3f00 00000000`00007101 : nt!KeClockInterruptNotify+0x453 ffff9480`2715cf30 fffff802`1f527ef5 : ffffab0b`96ce70e0 ffff9480`2715cf40 00000000`00000010 ffffe0c6`941ad224 : nt!HalpTimerClockIpiRoutine+0x1a ffff9480`2715cf60 fffff802`1f5f752a : ffff900f`63c479f0 ffffab0b`96ce70e0 ffffab0b`970e8da8 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5 ffff9480`2715cfb0 fffff802`1f5f7a97 : 00001fe5`87ded6e0 00001fe5`a5ac3be0 00001fe5`a5ac3be0 00001fe5`ff146ae0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffff900f`63c47970 fffff802`1f408857 : 00000000`00000000 ffff9480`271ea200 ffff900f`63c47b70 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffff900f`63c47b00 fffff802`1f40792d : ffff9480`271ea240 ffffab0b`96e42000 ffff900f`63c47e90 ffff9480`00000002 : nt!EtwpLogKernelEvent+0x2a7 ffff900f`63c47bb0 fffff802`1f406b04 : ffff9480`271e7180 8b48fff1`00000000 00000000`00000008 00000000`0014580d : nt!KiExecuteAllDpcs+0x41d ffff900f`63c47d20 fffff802`1f5fcac5 : cccc000d`4646e800 ffff9480`271e7180 ffff9480`28d90dc0 00000000`00000000 : nt!KiRetireDpcList+0x1f4 ffff900f`63c47fb0 fffff802`1f5fc8b0 : 00000000`0255be40 fffff802`1f4ec5ca ffffe20a`87e65a00 00000000`00df8b50 : nt!KxRetireDpcList+0x5 ffff900f`656129c0 fffff802`1f5fc165 : 00000000`00000000 fffff802`1f5f75f1 00000000`00000000 00000000`0f209490 : nt!KiDispatchInterruptContinue ffff900f`656129f0 fffff802`1f5f75f1 : 00000000`00000000 00000000`0f209490 00000000`00dfe108 00000000`00dfe270 : nt!KiDpcInterruptBypass+0x25 ffff900f`65612a00 00007ffd`ce5b0241 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1 00000000`00dfdf30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ce5b0241 SYMBOL_NAME: nt!KeAccumulateTicks+1c8b0c MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.804 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1c8b0c FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner --------- 2: kd> !analyze -show DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff8021fefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 2: kd> !blackboxntfs NTFS Blackbox Data 0 Slow I/O Timeout Records Found 0 Oplock Break Timeout Records Found 2: kd> lmvm nt Browse full module list start end module name fffff802`1f200000 fffff802`20246000 nt (pdb symbols) c:\symcache\ntkrnlmp.pdb\5278AFF86C341677D7D7835C85B7B8441\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symcache\ntoskrnl.exe\0D8333E61046000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 0D8333E6 (This is a reproducible build file hash, not a timestamp) CheckSum: 00A5938C ImageSize: 01046000 File version: 10.0.19041.804 Product version: 10.0.19041.804 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 10.0.19041.804 FileVersion: 10.0.19041.804 (WinBuild.160101.0800) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. RE: DPC_WATCHDOG_VIOLATION (133) Error with hashcat.exe - Snoopy - 02-28-2021 https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check-0x133-dpc-watchdog-violation seems to be a driver problem... reboot without BSOD is default behavior, if you want to see the blue screen u have to disable automatic restart in your system settings |