Advertisement
Guest User

MEMORY.DMP

a guest
Sep 10th, 2022
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.45 KB | None | 0 0
  1. ************* Path validation summary **************
  2. Response Time (ms) Location
  3. Deferred srv*
  4. Symbol search path is: srv*
  5. Executable search path is:
  6. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  7. Product: WinNt, suite: TerminalServer SingleUserTS
  8. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  9. Machine Name:
  10. Kernel base = 0xfffff801`12200000 PsLoadedModuleList = 0xfffff801`12e2a250
  11. Debug session time: Wed Sep 7 11:43:47.212 2022 (UTC + 5:30)
  12. System Uptime: 0 days 0:00:37.880
  13. Loading Kernel Symbols
  14. ...............................................................
  15. ................................................................
  16. ................................................................
  17. ...........
  18. Loading User Symbols
  19. PEB is paged out (Peb.Ldr = 00000000`0051e018). Type ".hh dbgerr001" for details
  20. Loading unloaded module list
  21. .........
  22. For analysis of this file, run !analyze -v
  23. nt!KeBugCheckEx:
  24. fffff801`125f88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffa980`668bdb70=00000000000000fc
  25. 4: kd> !analyze v
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
  33. An attempt was made to execute non-executable memory. The guilty driver
  34. is on the stack trace (and is typically the current instruction pointer).
  35. When possible, the guilty driver's name is printed on
  36. the BugCheck screen and saved in KiBugCheckDriver.
  37. Arguments:
  38. Arg1: ffffe00ddb0ca9a0, Virtual address for the attempted execute.
  39. Arg2: 8a0000041b0009e3, PTE contents.
  40. Arg3: ffffa980668bdda0, (reserved)
  41. Arg4: 0000000000000003, (reserved)
  42.  
  43. Debugging Details:
  44. ------------------
  45.  
  46.  
  47. BUGCHECK_CODE: fc
  48.  
  49. BUGCHECK_P1: ffffe00ddb0ca9a0
  50.  
  51. BUGCHECK_P2: 8a0000041b0009e3
  52.  
  53. BUGCHECK_P3: ffffa980668bdda0
  54.  
  55. BUGCHECK_P4: 3
  56.  
  57. PROCESS_NAME: atkexComSvc.exe
  58.  
  59. SYMBOL_NAME: nt!MiCheckSystemNxFault+12e90a
  60.  
  61. MODULE_NAME: nt
  62.  
  63. IMAGE_NAME: ntkrnlmp.exe
  64.  
  65. FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
  66.  
  67. FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
  68.  
  69. Followup: MachineOwner
  70. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement