Question Multiple BSODs, most likely a hardware issue ?

Jul 1, 2024
1
0
10
Hello, I've been having issues with my PC and I need help pinpointing the cause. I built the PC last year and it was running smoothly until May of this year, when I got a dreaded FAULTY_HARDWARE_CORRUPTED_PAGE BSOD. I wrote it off as a one-time occurrence and decided to wait and see if anything would happen again, and I've had three more BSODs since then. Not only more of the one I previously mentioned, but also SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.

I'm no expert, but based on what I've seen from the minidumps using WinDbg, I strongly suspect that the hardware is the cause at this point. However, the BSODs seem to be completely random, happen every few weeks, and are impossible to replicate at will, so testing the exact cause seems like it's going to be difficult. I ran four passes of MemTest86 overnight a few weeks ago and got 0 errors. Suppose I should stress test my CPU next and give MemTest another try too. Aside from that, I updated to the latest BIOS (I have an ASRock B650M-HDV/M.2 and 7600X) and that did nothing to help. If you have suggestions of any kind for me or insight that would help decide whether the RAM/CPU/mobo or anything else is the culprit, I would be very thankful.
Important to note is that I've done zero overclocking of any kind, so that's not the problem here.

What I get when I analyze my four minidumps using WinDbg:
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000668, physical page number
Arg3: 0000027adcaccef0, zero
Arg4: ffffb6013e626000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1171

Key : Analysis.Elapsed.mSec
Value: 1223

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 171

Key : Analysis.Init.Elapsed.mSec
Value: 4760

Key : Analysis.Memory.CommitPeak.Mb
Value: 86

Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x668

Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3

Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0x1aa0f5c4

Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x1cef0

Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x27b3c1

Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x27cdc0

Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x834246

Key : Bugcheck.Code.LegacyAPI
Value: 0x12b

Key : Bugcheck.Code.TargetModel
Value: 0x12b

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

Key : Failure.Hash
Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}


BUGCHECK_CODE: 12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 668

BUGCHECK_P3: 27adcaccef0

BUGCHECK_P4: ffffb6013e626000

FILE_IN_CAB: 050324-6093-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: MemCompression

STACK_TEXT:
fffff403`5b08fbe8 fffff800`1abc4daf : 00000000`0000012b ffffffff`c00002c4 00000000`00000668 0000027a`dcaccef0 : nt!KeBugCheckEx
fffff403`5b08fbf0 fffff800`1aa5fb1b : 00000000`00000200 00000000`00000003 ffffa58e`0b68f050 0000027a`dcaccef0 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffff403`5b08fc40 fffff800`1abc5d88 : 00000000`00000004 fffff800`1abbf512 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x2c5
fffff403`5b08fd10 fffff800`1abc69e8 : 00000000`00000001 00000000`00003fe6 00000000`00000000 ffffa58e`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff403`5b08fd60 fffff800`1abc5575 : ffffffff`ffffffff ffffa58e`2afa7000 fffff403`5b08fe40 ffffa58e`11204050 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1c4
fffff403`5b08fe00 fffff800`1abbf00b : fffff403`5b090039 fffff800`00000001 fffff800`1b2694c0 ffffa58e`1891c2c0 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc9
fffff403`5b08feb0 fffff800`1abbeee1 : ffffa58e`0b68f000 ffffa58e`11204050 ffffa58e`2afa7000 ffffa58e`0b6909c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x93
fffff403`5b08ff30 fffff800`1a8294da : ffffa58e`2def20f4 ffffa58e`0b68f000 00000000`00000000 ffffa58e`2afa7000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffff403`5b08ff60 fffff800`1aa5f59e : fffff800`1abbeec0 fffff403`5b090000 00000000`00000002 ffffa58e`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff403`5b08ffd0 fffff800`1abc0de8 : fffff403`00000000 ffffa58d`ea1f21d8 00000000`000003ff ffffa58e`11204050 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xd6
fffff403`5b0900a0 fffff800`1abbe6f3 : 00000000`000003ff 00000000`000003ff fffff403`5b090150 ffffa58e`11204050 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x48
fffff403`5b0900f0 fffff800`1aa5f032 : 00000000`0000000c ffffa58e`11204050 00000000`00000010 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1d7
fffff403`5b090180 fffff800`1abc8062 : ffffa58e`1891c380 fffff403`5b090240 00000000`00000010 fffff403`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cc
fffff403`5b090200 fffff800`1aa51050 : ffffa58e`2131a47a 00000000`00000001 ffffa58e`2a189740 fffff800`1a837259 : nt!SmPageRead+0x42
fffff403`5b090240 fffff800`1a94d857 : 00000000`00000002 fffff403`5b090380 ffffa58e`1891c270 ffffa58e`1891c270 : nt!MiIssueHardFaultIo+0x102ed0
fffff403`5b090290 fffff800`1a830371 : 00000000`c0033333 00000000`00000001 00000000`ab840430 fffff800`00000000 : nt!MiIssueHardFault+0x207
fffff403`5b090340 fffff800`1aa295fa : ffffa58e`2def2080 ffffa58e`140ef540 00000000`00001a3c ffffffff`ffb3b4c0 : nt!MmAccessFault+0x331
fffff403`5b090460 00000152`b98caa52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x37a
0000003e`f13fe2e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000152`b98caa52


SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.3447

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: fb

FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807134eabe4, The address that the exception occurred at
Arg3: ffffc7084f05ebe8, Exception Record Address
Arg4: ffffc7084f05e400, Context Record Address

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0x3317f4, File: 0x338c40 - C:\ProgramData\Dbg\sym\Ntfs.sys\4B276609333000\Ntfs.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 2171

Key : Analysis.Elapsed.mSec
Value: 2158

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 187

Key : Analysis.Init.Elapsed.mSec
Value: 4227

Key : Analysis.Memory.CommitPeak.Mb
Value: 99

Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e

Key : Bugcheck.Code.TargetModel
Value: 0x1000007e

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: AV_Ntfs!NtfsFlushVolumeFlushSingleFcb

Key : Failure.Hash
Value: {0ed87bea-8110-0a6c-770e-836775b36072}


BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff807134eabe4

BUGCHECK_P3: ffffc7084f05ebe8

BUGCHECK_P4: ffffc7084f05e400

FILE_IN_CAB: 051024-5390-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

EXCEPTION_RECORD: ffffc7084f05ebe8 -- (.exr 0xffffc7084f05ebe8)
ExceptionAddress: fffff807134eabe4 (Ntfs!NtfsFlushVolumeFlushSingleFcb+0x0000000000000c30)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffc7084f05e400 -- (.cxr 0xffffc7084f05e400)
rax=004000026c4804b1 rbx=0000000000000000 rcx=ffffda8d88673230
rdx=0000000000200000 rsi=ffffda8d88673010 rdi=ffffc7084f05f020
rip=fffff807134eabe4 rsp=ffffc7084f05ee20 rbp=ffffc7084f05f480
r8=ffffda8d88673230 r9=0000000000000001 r10=ffffda8d88673050
r11=ffffda8d88673014 r12=0000000000000007 r13=ffffc7084f05efa8
r14=ffffda8d88673170 r15=ffffda8d88673230
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc30:
fffff807`134eabe4 8b4018 mov eax,dword ptr [rax+18h] ds:002b:00400002`6c4804c9=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8071191c4a8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffc708`4f05ee20 fffff807`134e927f : ffffc708`4f05f020 ffffc904`69ee31b0 ffffda8d`88673010 ffffc708`4f05efa8 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc30
ffffc708`4f05ef70 fffff807`10ed6fd5 : ffffc904`652c3bb0 ffffc904`9dc3c080 ffffc904`652c3bb0 ffffc904`00000000 : Ntfs!NtfsFlushVolumeMultiThreadFcbWalkerWorker+0x2ef
ffffc708`4f05f380 fffff807`10f6db37 : ffffc904`9dc3c080 00000000`000003db ffffc904`9dc3c080 fffff807`10ed6e80 : nt!ExpWorkerThread+0x155
ffffc708`4f05f570 fffff807`1101d554 : ffffb281`bebc5180 ffffc904`9dc3c080 fffff807`10f6dae0 d600210c`003a0000 : nt!PspSystemThreadStartup+0x57
ffffc708`4f05f5c0 00000000`00000000 : ffffc708`4f060000 ffffc708`4f059000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME: Ntfs!NtfsFlushVolumeFlushSingleFcb+c30

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

IMAGE_VERSION: 10.0.22621.1376

STACK_COMMAND: .cxr 0xffffc7084f05e400 ; kb

BUCKET_ID_FUNC_OFFSET: c30

FAILURE_BUCKET_ID: AV_Ntfs!NtfsFlushVolumeFlushSingleFcb

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0ed87bea-8110-0a6c-770e-836775b36072}

Followup: MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000495, physical page number
Arg3: 000001942c8caed0, zero
Arg4: ffff9100344ba000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1828

Key : Analysis.Elapsed.mSec
Value: 2292

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 186

Key : Analysis.Init.Elapsed.mSec
Value: 4523

Key : Analysis.Memory.CommitPeak.Mb
Value: 98

Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x495

Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3

Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xac67432e

Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x1aed0

Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x4a3b63

Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x27c969

Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x75b89a

Key : Bugcheck.Code.LegacyAPI
Value: 0x12b

Key : Bugcheck.Code.TargetModel
Value: 0x12b

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

Key : Failure.Hash
Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}


BUGCHECK_CODE: 12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 495

BUGCHECK_P3: 1942c8caed0

BUGCHECK_P4: ffff9100344ba000

FILE_IN_CAB: 060324-7125-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: MemCompression

STACK_TEXT:
fffff587`4a6afbe8 fffff805`4edc4daf : 00000000`0000012b ffffffff`c00002c4 00000000`00000495 00000194`2c8caed0 : nt!KeBugCheckEx
fffff587`4a6afbf0 fffff805`4ec5fb1b : 00000000`00000200 00000000`00000003 ffffc804`f4324050 00000194`2c8caed0 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffff587`4a6afc40 fffff805`4edc5d88 : 00000000`00000004 fffff805`4edbf512 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x2c5
fffff587`4a6afd10 fffff805`4edc69e8 : 00000000`00000001 00000000`000077b1 00000000`00000000 ffffc804`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff587`4a6afd60 fffff805`4edc5575 : ffffffff`ffffffff ffffc804`fe386000 fffff587`4a6afe40 ffffc805`2847e7d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1c4
fffff587`4a6afe00 fffff805`4edbf00b : fffff587`4a6b0039 00000000`00000001 fffff805`4f4694c0 ffffc804`d5d27260 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc9
fffff587`4a6afeb0 fffff805`4edbeee1 : ffffc804`f4324000 ffffc805`2847e7d0 ffffc804`fe386000 ffffc804`f43259c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x93
fffff587`4a6aff30 fffff805`4ea294da : ffffc804`f36210f4 ffffc804`f4324000 00000000`00000000 ffffc804`fe386000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffff587`4a6aff60 fffff805`4ec5f59e : fffff805`4edbeec0 fffff587`4a6b0000 00000000`00000002 ffffc804`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff587`4a6affd0 fffff805`4edc0de8 : fffff587`00000000 ffffc804`d01f71d8 00000000`000003ff ffffc805`2847e7d0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xd6
fffff587`4a6b00a0 fffff805`4edbe6f3 : 00000000`000003ff 00000000`000003ff fffff587`4a6b0150 ffffc805`2847e7d0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x48
fffff587`4a6b00f0 fffff805`4ec5f032 : 00000000`0000000c ffffc805`2847e7d0 00000000`00000010 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1d7
fffff587`4a6b0180 fffff805`4edc8062 : ffffc804`d5d27320 fffff587`4a6b0240 00000000`00000010 fffff587`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cc
fffff587`4a6b0200 fffff805`4ec51050 : ffffc804`2080dae5 00000000`00000001 ffffc804`f9be3700 fffff805`4ea37259 : nt!SmPageRead+0x42
fffff587`4a6b0240 fffff805`4eb4d857 : 00000000`00000002 fffff587`4a6b0380 ffffc804`d5d27210 ffffc804`d5d27210 : nt!MiIssueHardFaultIo+0x102ed0
fffff587`4a6b0290 fffff805`4ea30371 : 00000000`c0033333 00000000`00000001 00000233`2bb98028 00000000`00000000 : nt!MiIssueHardFault+0x207
fffff587`4a6b0340 fffff805`4ec295fa : ffffc804`f3620000 ffffc804`f9dd2860 00000233`2c200d00 00000000`00000000 : nt!MmAccessFault+0x331
fffff587`4a6b0460 00007ff8`ece47940 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x37a
0000006f`996fe630 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ece47940


SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.3447

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: fb

FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8013be534b6, The address that the exception occurred at
Arg3: ffffc389a3aeeba8, Exception Record Address
Arg4: ffffc389a3aee3c0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 1499

Key : Analysis.Elapsed.mSec
Value: 1553

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 186

Key : Analysis.Init.Elapsed.mSec
Value: 5063

Key : Analysis.Memory.CommitPeak.Mb
Value: 100

Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e

Key : Bugcheck.Code.TargetModel
Value: 0x1000007e

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: AV_nt!ExAcquireResourceExclusiveLite

Key : Failure.Hash
Value: {d1328bfd-2b11-7819-3ef8-5888a1d52bca}


BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8013be534b6

BUGCHECK_P3: ffffc389a3aeeba8

BUGCHECK_P4: ffffc389a3aee3c0

FILE_IN_CAB: 070124-7531-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

EXCEPTION_RECORD: ffffc389a3aeeba8 -- (.exr 0xffffc389a3aeeba8)
ExceptionAddress: fffff8013be534b6 (nt!ExAcquireResourceExclusiveLite+0x0000000000000006)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffc389a3aee3c0 -- (.cxr 0xffffc389a3aee3c0)
rax=0000000000000702 rbx=0000000000000000 rcx=00400002715004f1
rdx=ffffdd0636048101 rsi=ffff9e0e2c6f4010 rdi=ffffc389a3aef020
rip=fffff8013be534b6 rsp=ffffc389a3aeede0 rbp=ffffc389a3aef480
r8=ffff9e0e2c6f4010 r9=ffffc389a3aeefa8 r10=fffff8013be534b0
r11=ffffc389a3aeef68 r12=0000000000000003 r13=0000000040000000
r14=ffff9e0e2c6f4010 r15=ffffdd0636048100
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ExAcquireResourceExclusiveLite+0x6:
fffff801`3be534b6 440fb7411a movzx r8d,word ptr [rcx+1Ah] ds:002b:00400002`7150050b=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8013c91c4a8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffc389`a3aeede0 fffff801`3e99a2c4 : 00000000`00000000 ffffc389`a3aef480 ffff9e0e`1c690010 ffffc389`a3aef020 : nt!ExAcquireResourceExclusiveLite+0x6
ffffc389`a3aeee20 fffff801`3e9994cf : ffffc389`a3aef020 ffffdd06`360481b0 ffff9e0e`2c6f4010 ffffc389`a3aeefa8 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0xc0
ffffc389`a3aeef70 fffff801`3bece2d5 : ffffdd05`f935a010 ffffdd06`3ae72040 ffffdd05`f935a010 ffffdd05`00000000 : Ntfs!NtfsFlushVolumeMultiThreadFcbWalkerWorker+0x2ef
ffffc389`a3aef380 fffff801`3be0e957 : ffffdd06`3ae72040 00000000`00000439 ffffdd06`3ae72040 fffff801`3bece180 : nt!ExpWorkerThread+0x155
ffffc389`a3aef570 fffff801`3c01f3b4 : ffffb200`91861180 ffffdd06`3ae72040 fffff801`3be0e900 00000000`00000246 : nt!PspSystemThreadStartup+0x57
ffffc389`a3aef5c0 00000000`00000000 : ffffc389`a3af0000 ffffc389`a3ae9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME: nt!ExAcquireResourceExclusiveLite+6

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.3733

STACK_COMMAND: .cxr 0xffffc389a3aee3c0 ; kb

BUCKET_ID_FUNC_OFFSET: 6

FAILURE_BUCKET_ID: AV_nt!ExAcquireResourceExclusiveLite

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1328bfd-2b11-7819-3ef8-5888a1d52bca}

Followup: MachineOwner
---------
 
1. Please upload the minidumps themselves to a cloud service with a link to them here.

2. Those two FAULTY_HARDWARE_CORRUPTED_PAGE bugchecks strongly points at RAM so test you RAM with Memtest86...
  1. Download Memtest86 (free), use the imageUSB.exe tool extracted from the download to make a bootable USB drive containing Memtest86 (1GB is plenty big enough). Do this on a different PC if you can, because you can't fully trust yours at the moment.
  2. Then boot that USB drive on your PC, Memtest86 will start running as soon as it boots.
  3. If no errors have been found after the four iterations of the 13 different tests that the free version does, then restart Memtest86 and do another four iterations. Even a single bit error is a failure.