Loading Dump File [C:\Windows\Minidump\123121-10953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800
2ae00000 PsLoadedModuleList = 0xfffff800
2ba2a1b0
Debug session time: Fri Dec 31 16:54:17.355 2021 (UTC - 5:00)
System Uptime: 3 days 9:04:06.049
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800
2b1f70d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc50c
c921eff0=00000000000000fc
1: kd> !analyze -v
***
***
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff808cdddb7270, Virtual address for the attempted execute.
Arg2: 8a0000016be009e3, PTE contents.
Arg3: ffffc50cc921f220, (reserved)
Arg4: 0000000000000003, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3140
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23030
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 48147
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 123121-10953-01.dmp
BUGCHECK_CODE: fc
BUGCHECK_P1: ffff808cdddb7270
BUGCHECK_P2: 8a0000016be009e3
BUGCHECK_P3: ffffc50cc921f220
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: voicemeeter8x64.exe
TRAP_FRAME: ffffc50cc921f220 -- (.trap 0xffffc50cc921f220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000002a781e3fda0 rbx=0000000000000000 rcx=fffff7d7c0001000
rdx=000002a78aba9c44 rsi=0000000000000000 rdi=0000000000000000
rip=ffff808cdddb7270 rsp=ffffc50cc921f3b8 rbp=0000000000000000
r8=fffffffff729615c r9=000002a781e3f438 r10=fffff8002b163250
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffff808c
dddb7270 80969800000000 adc byte ptr [rsi+98h],0 ds:00000000
00000098=??
Resetting default scope
STACK_TEXT:
ffffc50c
c921efe8 fffff800
2b283e28 : 00000000
000000fc ffff808c
dddb7270 8a000001
6be009e3 ffffc50c
c921f220 : nt!KeBugCheckEx
ffffc50c
c921eff0 fffff800
2b275637 : 00000000
00000011 00000000
00000003 00000000
00000000 ffffc50c
c921f140 : nt!MiCheckSystemNxFault+0x12dd20
ffffc50c
c921f030 fffff800
2b09f55f : 00000000
00000000 00000000
00000011 ffffc50c
c921f2a0 00000000
00000000 : nt!MiRaisedIrqlFault+0x14237b
ffffc50c
c921f080 fffff800
2b20525e : 00000000
00000001 fffff800
2b0f3f00 ffffc50c
c921f748 00000000
00000050 : nt!MmAccessFault+0x4ef
ffffc50c
c921f220 ffff808c
dddb7270 : ffff808c
e221eab0 00000000
00989680 00000000
0000270f ffff808c
dddb7270 : nt!KiPageFault+0x35e
ffffc50c
c921f3b8 ffff808c
e221eab0 : 00000000
00989680 00000000
0000270f ffff808c
dddb7270 00000000
00000000 : 0xffff808c
dddb7270
ffffc50c
c921f3c0 00000000
00989680 : 00000000
0000270f ffff808c
dddb7270 00000000
00000000 ffff808c
00000000 : 0xffff808c
e221eab0
ffffc50c
c921f3c8 00000000
0000270f : ffff808c
dddb7270 00000000
00000000 ffff808c
00000000 ffffc50c
c921f524 : 0x989680
ffffc50c
c921f3d0 ffff808c
dddb7270 : 00000000
00000000 ffff808c
00000000 ffffc50c
c921f524 00000000
11652c79 : 0x270f
ffffc50c
c921f3d8 00000000
00000000 : ffff808c
00000000 ffffc50c
c921f524 00000000
11652c79 000002a7
81c8569d : 0xffff808c`dddb7270
SYMBOL_NAME: nt!MiCheckSystemNxFault+12dd20
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 12dd20
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}