Hello,
Recently I built a Brand New PC and ever since I have it has just been a nightmare. I have tried countless times re-installing windows to try and fix the BSOD that keeps occuring. Any game I play after a short while it will BSOD. I however have the .dmp file BUT I don't actually know how to fix it. I have scanned my PC with Avast and also did a Hard drive scan with CMD which returned nothing. I have updated all my software and drivers to the latest available. I just do not know what to do anymore.
My PC Specs:
- i7 7700k OC 5ghz
- GTX 1060 6GB OC
- Gigabyte Gaming Z270 K3 ATX
- 1x8 8GB HyperX Fury DDR4 RAM
- 1TB HDD
Here is the crash file:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000001, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000001, Parameter 1 of the exception
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
+0
00000000`00000001 0000 add byte ptr [rax],al
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 0000000000000001
WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000001
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
BUGCHECK_STR: 0x1e_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: RocketLeague.e
CURRENT_IRQL: 0
EXCEPTION_RECORD: ffffb481028a8780 -- (.exr 0xffffb481028a8780)
ExceptionAddress: 0000000000000001
ExceptionCode: 00000002
ExceptionFlags: 00000000
NumberParameters: 1935904896
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000000
Parameter[4]: 0000000000000000
Parameter[5]: 0000000000000000
Parameter[6]: 0000000000000000
Parameter[7]: 0000000000000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000000000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: 0000000000000000
Parameter[13]: fffff8014f7fde57
Parameter[14]: 0000000000000000
TRAP_FRAME: ffff97886fef6c00 -- (.trap 0xffff97886fef6c00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffffff rbx=0000000000000000 rcx=00052c8200052bf0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=6565724600000008 rbp=0000000000000000
r8=0000000000000000 r9=0000008300088020 r10=0000000000000000
r11=6954524902130005 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
0008:00000000`00000000 0000 add byte ptr [rax],al ds:ffffffff`ffffffff=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8014f6b301c to fffff8014f7f4580
STACK_TEXT:
ffffb481`028a7f78 fffff801`4f6b301c : 00000000`0000001e ffffffff`c0000005 00000000`00000001 00000000`00000008 : nt!KeBugCheckEx
ffffb481`028a7f80 fffff801`4f7ff98e : ffffb481`028a8780 fffff801`00000000 ffff9788`6fef6c00 ffff9788`6fef6c00 : nt!KiDispatchException+0x23c
ffffb481`028a8630 fffff801`4f7fde57 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
ffffb481`028a8810 00000000`00000001 : 00000000`17cdfda0 00000000`02151000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x217
ffffb481`028a89a8 00000000`17cdfda0 : 00000000`02151000 00000000`00000000 00000000`00000000 ffffb481`028a8b00 : 0x1
ffffb481`028a89b0 00000000`02151000 : 00000000`00000000 00000000`00000000 ffffb481`028a8b00 ffff9788`745877c0 : 0x17cdfda0
ffffb481`028a89b8 00000000`00000000 : 00000000`00000000 ffffb481`028a8b00 ffff9788`745877c0 fffff801`4fb28ace : 0x2151000
STACK_COMMAND: kb
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
Recently I built a Brand New PC and ever since I have it has just been a nightmare. I have tried countless times re-installing windows to try and fix the BSOD that keeps occuring. Any game I play after a short while it will BSOD. I however have the .dmp file BUT I don't actually know how to fix it. I have scanned my PC with Avast and also did a Hard drive scan with CMD which returned nothing. I have updated all my software and drivers to the latest available. I just do not know what to do anymore.
My PC Specs:
- i7 7700k OC 5ghz
- GTX 1060 6GB OC
- Gigabyte Gaming Z270 K3 ATX
- 1x8 8GB HyperX Fury DDR4 RAM
- 1TB HDD
Here is the crash file:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000001, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000001, Parameter 1 of the exception
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
+0
00000000`00000001 0000 add byte ptr [rax],al
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 0000000000000001
WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000001
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
BUGCHECK_STR: 0x1e_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: RocketLeague.e
CURRENT_IRQL: 0
EXCEPTION_RECORD: ffffb481028a8780 -- (.exr 0xffffb481028a8780)
ExceptionAddress: 0000000000000001
ExceptionCode: 00000002
ExceptionFlags: 00000000
NumberParameters: 1935904896
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000000
Parameter[4]: 0000000000000000
Parameter[5]: 0000000000000000
Parameter[6]: 0000000000000000
Parameter[7]: 0000000000000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000000000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: 0000000000000000
Parameter[13]: fffff8014f7fde57
Parameter[14]: 0000000000000000
TRAP_FRAME: ffff97886fef6c00 -- (.trap 0xffff97886fef6c00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffffff rbx=0000000000000000 rcx=00052c8200052bf0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=6565724600000008 rbp=0000000000000000
r8=0000000000000000 r9=0000008300088020 r10=0000000000000000
r11=6954524902130005 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
0008:00000000`00000000 0000 add byte ptr [rax],al ds:ffffffff`ffffffff=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8014f6b301c to fffff8014f7f4580
STACK_TEXT:
ffffb481`028a7f78 fffff801`4f6b301c : 00000000`0000001e ffffffff`c0000005 00000000`00000001 00000000`00000008 : nt!KeBugCheckEx
ffffb481`028a7f80 fffff801`4f7ff98e : ffffb481`028a8780 fffff801`00000000 ffff9788`6fef6c00 ffff9788`6fef6c00 : nt!KiDispatchException+0x23c
ffffb481`028a8630 fffff801`4f7fde57 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
ffffb481`028a8810 00000000`00000001 : 00000000`17cdfda0 00000000`02151000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x217
ffffb481`028a89a8 00000000`17cdfda0 : 00000000`02151000 00000000`00000000 00000000`00000000 ffffb481`028a8b00 : 0x1
ffffb481`028a89b0 00000000`02151000 : 00000000`00000000 00000000`00000000 ffffb481`028a8b00 ffff9788`745877c0 : 0x17cdfda0
ffffb481`028a89b8 00000000`00000000 : 00000000`00000000 ffffb481`028a8b00 ffff9788`745877c0 fffff801`4fb28ace : 0x2151000
STACK_COMMAND: kb
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption