Windows 10 BSOD "ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY"

SupremeMusic

Prominent
Apr 20, 2017
5
0
510
so its been sometime that my PC crashes while im playing video games but i dont get a blue screen and now i end up getting it so i google it and i find out how to get a report i dont know what im looking at can anyone explain to me what should i do please and thank you


Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 17134 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802`84e9e000 PsLoadedModuleList = 0xfffff802`8524c170
Debug session time: Tue Sep 11 09:29:30.653 2018 (UTC - 4:00)
System Uptime: 0 days 0:54:38.378
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff808540ca468, Virtual address for the attempted execute.
Arg2: 8000000210f31929, PTE contents.
Arg3: fffffc0429e13d90, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0xFC

PROCESS_NAME: iCUE.exe

CURRENT_IRQL: 2

BAD_PAGES_DETECTED: ab75

TRAP_FRAME: fffffc0429e13d90 -- (.trap 0xfffffc0429e13d90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffc0429e13ff0 rbx=0000000000000000 rcx=00000000000001d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff808540ca468 rsp=fffffc0429e13f20 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=ffffbf817e4bc080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
fffff808`540ca468 0000 add byte ptr [rax],al ds:fffffc04`29e13ff0=0a
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8028509fc12 to fffff80285046ca0

STACK_TEXT:
fffffc04`29e13a98 fffff802`8509fc12 : 00000000`000000fc fffff808`540ca468 80000002`10f31929 fffffc04`29e13d90 : nt!KeBugCheckEx
fffffc04`29e13aa0 fffff802`84f0feaf : fffff802`8526b810 ffffbf81`7724e0b0 ffffe974`be021500 0a000001`5976b863 : nt!MiCheckSystemNxFault+0xe5906
fffffc04`29e13ae0 fffff802`84f07d88 : 00000000`00000111 00000000`00000011 ffff8000`00000000 ffffe974`ba5d2e90 : nt!MiSystemFault+0x8ef
fffffc04`29e13c20 fffff802`850543da : 00000000`00000000 00000000`00000001 00000000`00000000 fffffc04`29e13ff0 : nt!MmAccessFault+0x1f8
fffffc04`29e13d90 fffff808`540ca468 : ffffbf81`7e4bc080 ffffbf81`7cf8ec78 00000000`00000001 ffffbf81`7cf8ec30 : nt!KiPageFault+0x31a
fffffc04`29e13f20 ffffbf81`7e4bc080 : ffffbf81`7cf8ec78 00000000`00000001 ffffbf81`7cf8ec30 ffffbf81`7e2c6e00 : 0xfffff808`540ca468
fffffc04`29e13f28 ffffbf81`7cf8ec78 : 00000000`00000001 ffffbf81`7cf8ec30 ffffbf81`7e2c6e00 fffff802`85188f2e : 0xffffbf81`7e4bc080
fffffc04`29e13f30 00000000`00000001 : ffffbf81`7cf8ec30 ffffbf81`7e2c6e00 fffff802`85188f2e ffffbf81`78b16a68 : 0xffffbf81`7cf8ec78
fffffc04`29e13f38 ffffbf81`7cf8ec30 : ffffbf81`7e2c6e00 fffff802`85188f2e ffffbf81`78b16a68 ffffbf81`7d44c630 : 0x1
fffffc04`29e13f40 ffffbf81`7e2c6e00 : fffff802`85188f2e ffffbf81`78b16a68 ffffbf81`7d44c630 fffff808`1370a300 : 0xffffbf81`7cf8ec30
fffffc04`29e13f48 fffff802`85188f2e : ffffbf81`78b16a68 ffffbf81`7d44c630 fffff808`1370a300 ffffbf81`7d44c630 : 0xffffbf81`7e2c6e00
fffffc04`29e13f50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x2ce


STACK_COMMAND: kb

SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

BUCKET_ID: PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 43893 instance(s) of page corruption, target is likely to have memory corruption.