After Exploit Protections all set to "on by default" many crash/dumps appear

ravenize

Well-known member
Joined
Feb 21, 2018
Posts
213
Almost all errors are regarding

Code:
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

and
Code:
 SOFTWARE_NX_FAULT_c0000005, or stack buffer overrun - code c0000409

happens regularly, often clustered within a few minutes or hours followed by 10-20 hour silence, often windows software, often third party.

Is this to be expected?
 
Well, yes and no, the programs should have been written to take into account DEP etc.

Rich (BB code):
0:000> .exr -1
ExceptionAddress: 0000025214fa0058
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000008 << Execute operation
Parameter[1]: 0000025214fa0058 << NX-protected address
Attempt to execute non-executable address 0000025214fa0058

The exception shown above is most likely because of DEP. Having said that, I'm on the same Windows version as yourself and haven't noticed any issues. The only option which I don't have enabled is mandatory ASLR. I would set that option to off (default option) and then see if the crashes still occur.
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top