Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff801`12200000 PsLoadedModuleList = 0xfffff801`12e2a250
- Debug session time: Wed Sep 7 11:43:47.212 2022 (UTC + 5:30)
- System Uptime: 0 days 0:00:37.880
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ...........
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00000000`0051e018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff801`125f88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffa980`668bdb70=00000000000000fc
- 4: kd> !analyze v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
- An attempt was made to execute non-executable memory. The guilty driver
- is on the stack trace (and is typically the current instruction pointer).
- When possible, the guilty driver's name is printed on
- the BugCheck screen and saved in KiBugCheckDriver.
- Arguments:
- Arg1: ffffe00ddb0ca9a0, Virtual address for the attempted execute.
- Arg2: 8a0000041b0009e3, PTE contents.
- Arg3: ffffa980668bdda0, (reserved)
- Arg4: 0000000000000003, (reserved)
- Debugging Details:
- ------------------
- BUGCHECK_CODE: fc
- BUGCHECK_P1: ffffe00ddb0ca9a0
- BUGCHECK_P2: 8a0000041b0009e3
- BUGCHECK_P3: ffffa980668bdda0
- BUGCHECK_P4: 3
- PROCESS_NAME: atkexComSvc.exe
- SYMBOL_NAME: nt!MiCheckSystemNxFault+12e90a
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
- FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement