Loading Dump File [C:\Windows\Minidump\123121-10953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800
2ae00000 PsLoadedModuleList = 0xfffff8002ba2a1b0
Debug session time: Fri Dec 31 16:54:17.355 2021 (UTC - 5:00)
System Uptime: 3 days 9:04:06.049
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800
2b1f70d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc50cc921eff0=00000000000000fc
1: kd> !analyze -v
***
***
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff808cdddb7270, Virtual address for the attempted execute.
Arg2: 8a0000016be009e3, PTE contents.
Arg3: ffffc50cc921f220, (reserved)
Arg4: 0000000000000003, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3140
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23030
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 48147
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 123121-10953-01.dmp
BUGCHECK_CODE: fc
BUGCHECK_P1: ffff808cdddb7270
BUGCHECK_P2: 8a0000016be009e3
BUGCHECK_P3: ffffc50cc921f220
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: voicemeeter8x64.exe
TRAP_FRAME: ffffc50cc921f220 -- (.trap 0xffffc50cc921f220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000002a781e3fda0 rbx=0000000000000000 rcx=fffff7d7c0001000
rdx=000002a78aba9c44 rsi=0000000000000000 rdi=0000000000000000
rip=ffff808cdddb7270 rsp=ffffc50cc921f3b8 rbp=0000000000000000
r8=fffffffff729615c r9=000002a781e3f438 r10=fffff8002b163250
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffff808c
dddb7270 80969800000000 adc byte ptr [rsi+98h],0 ds:0000000000000098=??
Resetting default scope
STACK_TEXT:
ffffc50c
c921efe8 fffff8002b283e28 : 00000000
000000fc ffff808cdddb7270 8a000001
6be009e3 ffffc50cc921f220 : nt!KeBugCheckEx
ffffc50c
c921eff0 fffff8002b275637 : 00000000
00000011 0000000000000003 00000000
00000000 ffffc50cc921f140 : nt!MiCheckSystemNxFault+0x12dd20
ffffc50c
c921f030 fffff8002b09f55f : 00000000
00000000 0000000000000011 ffffc50c
c921f2a0 0000000000000000 : nt!MiRaisedIrqlFault+0x14237b
ffffc50c
c921f080 fffff8002b20525e : 00000000
00000001 fffff8002b0f3f00 ffffc50c
c921f748 0000000000000050 : nt!MmAccessFault+0x4ef
ffffc50c
c921f220 ffff808cdddb7270 : ffff808c
e221eab0 0000000000989680 00000000
0000270f ffff808cdddb7270 : nt!KiPageFault+0x35e
ffffc50c
c921f3b8 ffff808ce221eab0 : 00000000
00989680 000000000000270f ffff808c
dddb7270 0000000000000000 : 0xffff808c
dddb7270
ffffc50cc921f3c0 00000000
00989680 : 000000000000270f ffff808c
dddb7270 0000000000000000 ffff808c
00000000 : 0xffff808ce221eab0
ffffc50c
c921f3c8 000000000000270f : ffff808c
dddb7270 0000000000000000 ffff808c
00000000 ffffc50cc921f524 : 0x989680
ffffc50c
c921f3d0 ffff808cdddb7270 : 00000000
00000000 ffff808c00000000 ffffc50c
c921f524 0000000011652c79 : 0x270f
ffffc50c
c921f3d8 0000000000000000 : ffff808c
00000000 ffffc50cc921f524 00000000
11652c79 000002a781c8569d : 0xffff808c`dddb7270
SYMBOL_NAME: nt!MiCheckSystemNxFault+12dd20
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 12dd20
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}