ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffbe0ab2a75db8, Virtual address for the attempted execute.
Arg2: 81000001455e3963, PTE contents.
Arg3: ffffde068c1fe5e0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9088
Key : Analysis.Init.CPU.mSec
Value: 561
Key : Analysis.Init.Elapsed.mSec
Value: 2481
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 121221-9375-01.dmp
BUGCHECK_CODE: fc
BUGCHECK_P1: ffffbe0ab2a75db8
BUGCHECK_P2: 81000001455e3963
BUGCHECK_P3: ffffde068c1fe5e0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUxRender.exe
TRAP_FRAME: ffffde068c1fe5e0 -- (.trap 0xffffde068c1fe5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffab8f58385a98 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffbe0ab2a75db8 rsp=ffffde068c1fe770 rbp=ffff810189d5c180
r8=0000000100000068 r9=ffff810189dd5180 r10=ffffab8f52369080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffbe0a`b2a75db8 e85da7b20a call ffffbe0a`bd5a051a
Resetting default scope
STACK_TEXT:
ffffde06`8c1fe2f8 fffff807`16484028 : 00000000`000000fc ffffbe0a`b2a75db8 81000001`455e3963 ffffde06`8c1fe5e0 : nt!KeBugCheckEx
ffffde06`8c1fe300 fffff807`162bda76 : ffffbe0a`b2a75db8 ffffde06`8c1fe500 ffffde06`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12e000
ffffde06`8c1fe340 fffff807`1629f390 : ffffde06`8c1fe4a0 00000000`00000011 ffffde06`8c1fe660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffde06`8c1fe440 fffff807`1640545e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffde06`8c1fe5e0 ffffbe0a`b2a75db8 : ffffbe0a`00000002 fffff807`00000005 00000000`00000000 ffffab8f`00000000 : nt!KiPageFault+0x35e
ffffde06`8c1fe770 ffffbe0a`00000002 : fffff807`00000005 00000000`00000000 ffffab8f`00000000 ffffbe0a`00000000 : 0xffffbe0a`b2a75db8
ffffde06`8c1fe778 fffff807`00000005 : 00000000`00000000 ffffab8f`00000000 ffffbe0a`00000000 ffffab8f`507ce090 : 0xffffbe0a`00000002
ffffde06`8c1fe780 00000000`00000000 : ffffab8f`00000000 ffffbe0a`00000000 ffffab8f`507ce090 ffff8101`00000000 : 0xfffff807`00000005
SYMBOL_NAME: nt!MiCheckSystemNxFault+12e000
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1348
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 12e000
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner