R
Ryath78
im not sure what you would need the actual dump file or the one i copied to .txt
here is the text
Microsoft (R) Windows Debugger Version 10.0.19041.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\100820-49984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Error: Change all symbol paths attempts to access 'c:\myCache' failed: 0x2 - The system cannot find the file specified.
************* Path validation summary **************
Response Time (ms) Location
Error c:\myCache
Deferred SRV*Symbol information
Symbol search path is: c:\myCache;SRV*Symbol information
Executable search path is:
Windows 10 Kernel Version 20231 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`24600000 PsLoadedModuleList = 0xfffff800`25233550
Debug session time: Thu Oct 8 04:16:44.292 2020 (UTC - 5:00)
System Uptime: 0 days 2:56:02.997
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff9000d398fe70
Arg3: ffffc5081f65bf40
Arg4: fffff800248e5aed
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-89V5T4I
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : Analysis.System
Value: CreateObject
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffff9000d398fe70
BUGCHECK_P3: ffffc5081f65bf40
BUGCHECK_P4: fffff800248e5aed
STACK_OVERFLOW: Stack Limit: ffffc5081f65c000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xfffff800248e3ba2 was blamed for the stack overflow. It is using 8640 bytes of stack total in 5 instances (likely recursion).
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NoxVMHandle.ex
STACK_TEXT:
ffffc508`1f65bf40 fffff800`248e3ba2 : ffffc508`1f65c998 ffffc508`1f65c6d0 ffffc508`1f65c998 00000000`00000000 : nt!RtlDispatchException+0x3d
ffffc508`1f65c1a0 fffff800`24a2a60e : ffffc508`1f65cac0 00000000`00001000 ffffc508`1f65ca40 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f65c860 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e
ffffc508`1f65ca40 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65cd60 : nt!KiPageFault+0x41a
ffffc508`1f65cbd0 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f65cc60 fffff800`248e5cc7 : ffffc508`1f65d260 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f65ccf0 fffff800`248e3ba2 : ffffc508`1f65dc48 ffffc508`1f65d980 ffffc508`1f65dc48 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f65d450 fffff800`24a2a60e : ffffc508`1f65dd70 00000000`00001000 ffffc508`1f65dcf0 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f65db10 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e
ffffc508`1f65dcf0 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65e010 : nt!KiPageFault+0x41a
ffffc508`1f65de80 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f65df10 fffff800`248e5cc7 : ffffc508`1f65e510 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f65dfa0 fffff800`248e3ba2 : ffffc508`1f65eef8 ffffc508`1f65ec30 ffffc508`1f65eef8 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f65e700 fffff800`24a2a60e : ffffc508`1f65f020 00000000`00001000 ffffc508`1f65efa0 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f65edc0 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e
ffffc508`1f65efa0 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65f2c0 : nt!KiPageFault+0x41a
ffffc508`1f65f130 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f65f1c0 fffff800`248e5cc7 : ffffc508`1f65f7c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f65f250 fffff800`248e3ba2 : ffffc508`1f6601a8 ffffc508`1f65fee0 ffffc508`1f6601a8 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f65f9b0 fffff800`24a2a60e : ffffc508`1f6602d0 00000000`00001000 ffffc508`1f660250 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f660070 fffff800`24a2665a : 00000000`00000010 00000000`abee2000 ffffc508`1f660670 8a000000`abee2867 : nt!KiExceptionDispatch+0x10e
ffffc508`1f660250 fffff800`248e7929 : ffffca06`95c9e080 ffffc508`1f660c80 00000000`00000000 fffff800`24cf35cb : nt!KiPageFault+0x41a
ffffc508`1f6603e0 fffff800`248e88f9 : ffffc508`1f6600e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f660470 fffff800`248e5cc7 : ffffc508`1f660a70 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f660500 fffff800`248e3ba2 : ffffc508`1f661458 ffffc508`1f661190 ffffc508`1f661458 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f660c60 fffff800`24a2a60e : ffffc508`1f661580 00000000`00001000 ffffc508`1f661500 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f661320 fffff800`24a2665a : ffffca06`9708fc20 00000000`00000000 00000000`00000202 fffff800`248f04c1 : nt!KiExceptionDispatch+0x10e
ffffc508`1f661500 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
SYMBOL_NAME: nt!KiDispatchException+182
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.20231.1000
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 182
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}
Followup: MachineOwner
---------
Continue reading...
here is the text
Microsoft (R) Windows Debugger Version 10.0.19041.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\100820-49984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Error: Change all symbol paths attempts to access 'c:\myCache' failed: 0x2 - The system cannot find the file specified.
************* Path validation summary **************
Response Time (ms) Location
Error c:\myCache
Deferred SRV*Symbol information
Symbol search path is: c:\myCache;SRV*Symbol information
Executable search path is:
Windows 10 Kernel Version 20231 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`24600000 PsLoadedModuleList = 0xfffff800`25233550
Debug session time: Thu Oct 8 04:16:44.292 2020 (UTC - 5:00)
System Uptime: 0 days 2:56:02.997
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff9000d398fe70
Arg3: ffffc5081f65bf40
Arg4: fffff800248e5aed
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-89V5T4I
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : Analysis.System
Value: CreateObject
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffff9000d398fe70
BUGCHECK_P3: ffffc5081f65bf40
BUGCHECK_P4: fffff800248e5aed
STACK_OVERFLOW: Stack Limit: ffffc5081f65c000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xfffff800248e3ba2 was blamed for the stack overflow. It is using 8640 bytes of stack total in 5 instances (likely recursion).
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NoxVMHandle.ex
STACK_TEXT:
ffffc508`1f65bf40 fffff800`248e3ba2 : ffffc508`1f65c998 ffffc508`1f65c6d0 ffffc508`1f65c998 00000000`00000000 : nt!RtlDispatchException+0x3d
ffffc508`1f65c1a0 fffff800`24a2a60e : ffffc508`1f65cac0 00000000`00001000 ffffc508`1f65ca40 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f65c860 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e
ffffc508`1f65ca40 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65cd60 : nt!KiPageFault+0x41a
ffffc508`1f65cbd0 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f65cc60 fffff800`248e5cc7 : ffffc508`1f65d260 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f65ccf0 fffff800`248e3ba2 : ffffc508`1f65dc48 ffffc508`1f65d980 ffffc508`1f65dc48 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f65d450 fffff800`24a2a60e : ffffc508`1f65dd70 00000000`00001000 ffffc508`1f65dcf0 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f65db10 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e
ffffc508`1f65dcf0 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65e010 : nt!KiPageFault+0x41a
ffffc508`1f65de80 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f65df10 fffff800`248e5cc7 : ffffc508`1f65e510 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f65dfa0 fffff800`248e3ba2 : ffffc508`1f65eef8 ffffc508`1f65ec30 ffffc508`1f65eef8 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f65e700 fffff800`24a2a60e : ffffc508`1f65f020 00000000`00001000 ffffc508`1f65efa0 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f65edc0 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e
ffffc508`1f65efa0 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65f2c0 : nt!KiPageFault+0x41a
ffffc508`1f65f130 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f65f1c0 fffff800`248e5cc7 : ffffc508`1f65f7c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f65f250 fffff800`248e3ba2 : ffffc508`1f6601a8 ffffc508`1f65fee0 ffffc508`1f6601a8 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f65f9b0 fffff800`24a2a60e : ffffc508`1f6602d0 00000000`00001000 ffffc508`1f660250 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f660070 fffff800`24a2665a : 00000000`00000010 00000000`abee2000 ffffc508`1f660670 8a000000`abee2867 : nt!KiExceptionDispatch+0x10e
ffffc508`1f660250 fffff800`248e7929 : ffffca06`95c9e080 ffffc508`1f660c80 00000000`00000000 fffff800`24cf35cb : nt!KiPageFault+0x41a
ffffc508`1f6603e0 fffff800`248e88f9 : ffffc508`1f6600e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69
ffffc508`1f660470 fffff800`248e5cc7 : ffffc508`1f660a70 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89
ffffc508`1f660500 fffff800`248e3ba2 : ffffc508`1f661458 ffffc508`1f661190 ffffc508`1f661458 00000000`00000000 : nt!RtlDispatchException+0x217
ffffc508`1f660c60 fffff800`24a2a60e : ffffc508`1f661580 00000000`00001000 ffffc508`1f661500 ffff8000`00000000 : nt!KiDispatchException+0x182
ffffc508`1f661320 fffff800`24a2665a : ffffca06`9708fc20 00000000`00000000 00000000`00000202 fffff800`248f04c1 : nt!KiExceptionDispatch+0x10e
ffffc508`1f661500 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
SYMBOL_NAME: nt!KiDispatchException+182
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.20231.1000
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 182
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}
Followup: MachineOwner
---------
Continue reading...