Hi everyone, I had next error when using hashcat.exe (https://hashcat.net/hashcat/) and My Pc go to reboot, without Blue Screen only reboot
Here information and url to download of my minidump File:
======================
URL to download minidump file:
https://dropmefiles.com/Ld7Er
======================
Winver:
20H2 build 19042.804
======================
PC Hardware Report:
https://dropmefiles.com/JW3aa
======================
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8021fefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 61
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on USER-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 56
Key : Analysis.Memory.CommitPeak.Mb
Value: 289
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8021fefb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: hashcat.exe
STACK_TEXT:
ffff9480`2715ce18 fffff802`1f63ad0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`1fefb320 : nt!KeBugCheckEx
ffff9480`2715ce20 fffff802`1f46f9a3 : 00005ca8`5bd0b4c8 ffff9480`271e7180 00000000`00000000 ffff9480`271e7180 : nt!KeAccumulateTicks+0x1c8b0c
ffff9480`2715ce80 fffff802`1f46f48a : ffffab0b`96ce70e0 ffff900f`63c479f0 fffff802`373b3f00 00000000`00007101 : nt!KeClockInterruptNotify+0x453
ffff9480`2715cf30 fffff802`1f527ef5 : ffffab0b`96ce70e0 ffff9480`2715cf40 00000000`00000010 ffffe0c6`941ad224 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9480`2715cf60 fffff802`1f5f752a : ffff900f`63c479f0 ffffab0b`96ce70e0 ffffab0b`970e8da8 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9480`2715cfb0 fffff802`1f5f7a97 : 00001fe5`87ded6e0 00001fe5`a5ac3be0 00001fe5`a5ac3be0 00001fe5`ff146ae0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff900f`63c47970 fffff802`1f408857 : 00000000`00000000 ffff9480`271ea200 ffff900f`63c47b70 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff900f`63c47b00 fffff802`1f40792d : ffff9480`271ea240 ffffab0b`96e42000 ffff900f`63c47e90 ffff9480`00000002 : nt!EtwpLogKernelEvent+0x2a7
ffff900f`63c47bb0 fffff802`1f406b04 : ffff9480`271e7180 8b48fff1`00000000 00000000`00000008 00000000`0014580d : nt!KiExecuteAllDpcs+0x41d
ffff900f`63c47d20 fffff802`1f5fcac5 : cccc000d`4646e800 ffff9480`271e7180 ffff9480`28d90dc0 00000000`00000000 : nt!KiRetireDpcList+0x1f4
ffff900f`63c47fb0 fffff802`1f5fc8b0 : 00000000`0255be40 fffff802`1f4ec5ca ffffe20a`87e65a00 00000000`00df8b50 : nt!KxRetireDpcList+0x5
ffff900f`656129c0 fffff802`1f5fc165 : 00000000`00000000 fffff802`1f5f75f1 00000000`00000000 00000000`0f209490 : nt!KiDispatchInterruptContinue
ffff900f`656129f0 fffff802`1f5f75f1 : 00000000`00000000 00000000`0f209490 00000000`00dfe108 00000000`00dfe270 : nt!KiDpcInterruptBypass+0x25
ffff900f`65612a00 00007ffd`ce5b0241 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`00dfdf30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ce5b0241
SYMBOL_NAME: nt!KeAccumulateTicks+1c8b0c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c8b0c
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
2: kd> !analyze -show
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8021fefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
2: kd> !blackboxntfs
NTFS Blackbox Data
0 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
2: kd> lmvm nt
Browse full module list
start end module name
fffff802`1f200000 fffff802`20246000 nt (pdb symbols) c:\symcache\ntkrnlmp.pdb\5278AFF86C341677D7D7835C85B7B8441\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symcache\ntoskrnl.exe\0D8333E61046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 0D8333E6 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5938C
ImageSize: 01046000
File version: 10.0.19041.804
Product version: 10.0.19041.804
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.804
FileVersion: 10.0.19041.804 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
Here information and url to download of my minidump File:
======================
URL to download minidump file:
https://dropmefiles.com/Ld7Er
======================
Winver:
20H2 build 19042.804
======================
PC Hardware Report:
https://dropmefiles.com/JW3aa
======================
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8021fefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 61
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on USER-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 56
Key : Analysis.Memory.CommitPeak.Mb
Value: 289
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8021fefb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: hashcat.exe
STACK_TEXT:
ffff9480`2715ce18 fffff802`1f63ad0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`1fefb320 : nt!KeBugCheckEx
ffff9480`2715ce20 fffff802`1f46f9a3 : 00005ca8`5bd0b4c8 ffff9480`271e7180 00000000`00000000 ffff9480`271e7180 : nt!KeAccumulateTicks+0x1c8b0c
ffff9480`2715ce80 fffff802`1f46f48a : ffffab0b`96ce70e0 ffff900f`63c479f0 fffff802`373b3f00 00000000`00007101 : nt!KeClockInterruptNotify+0x453
ffff9480`2715cf30 fffff802`1f527ef5 : ffffab0b`96ce70e0 ffff9480`2715cf40 00000000`00000010 ffffe0c6`941ad224 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9480`2715cf60 fffff802`1f5f752a : ffff900f`63c479f0 ffffab0b`96ce70e0 ffffab0b`970e8da8 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9480`2715cfb0 fffff802`1f5f7a97 : 00001fe5`87ded6e0 00001fe5`a5ac3be0 00001fe5`a5ac3be0 00001fe5`ff146ae0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff900f`63c47970 fffff802`1f408857 : 00000000`00000000 ffff9480`271ea200 ffff900f`63c47b70 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff900f`63c47b00 fffff802`1f40792d : ffff9480`271ea240 ffffab0b`96e42000 ffff900f`63c47e90 ffff9480`00000002 : nt!EtwpLogKernelEvent+0x2a7
ffff900f`63c47bb0 fffff802`1f406b04 : ffff9480`271e7180 8b48fff1`00000000 00000000`00000008 00000000`0014580d : nt!KiExecuteAllDpcs+0x41d
ffff900f`63c47d20 fffff802`1f5fcac5 : cccc000d`4646e800 ffff9480`271e7180 ffff9480`28d90dc0 00000000`00000000 : nt!KiRetireDpcList+0x1f4
ffff900f`63c47fb0 fffff802`1f5fc8b0 : 00000000`0255be40 fffff802`1f4ec5ca ffffe20a`87e65a00 00000000`00df8b50 : nt!KxRetireDpcList+0x5
ffff900f`656129c0 fffff802`1f5fc165 : 00000000`00000000 fffff802`1f5f75f1 00000000`00000000 00000000`0f209490 : nt!KiDispatchInterruptContinue
ffff900f`656129f0 fffff802`1f5f75f1 : 00000000`00000000 00000000`0f209490 00000000`00dfe108 00000000`00dfe270 : nt!KiDpcInterruptBypass+0x25
ffff900f`65612a00 00007ffd`ce5b0241 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`00dfdf30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ce5b0241
SYMBOL_NAME: nt!KeAccumulateTicks+1c8b0c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c8b0c
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
2: kd> !analyze -show
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8021fefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
2: kd> !blackboxntfs
NTFS Blackbox Data
0 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
2: kd> lmvm nt
Browse full module list
start end module name
fffff802`1f200000 fffff802`20246000 nt (pdb symbols) c:\symcache\ntkrnlmp.pdb\5278AFF86C341677D7D7835C85B7B8441\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symcache\ntoskrnl.exe\0D8333E61046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 0D8333E6 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5938C
ImageSize: 01046000
File version: 10.0.19041.804
Product version: 10.0.19041.804
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.804
FileVersion: 10.0.19041.804 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.