So after replacing things over and over im at my wits end, a brand new system build and I cant get it to run for a whole day sometimes. Heres what I got from my minidump. Any help appreciated. From what I read a lot of places its more than likely either my pagefile or RAM, does anyone else agree at all with this?
Debugging Details:
------------------
EXCEPTION_RECORD: fffffa60078e8ad8 -- (.exr 0xfffffa60078e8ad8)
ExceptionAddress: fffff80001ce9d37 (nt!RtlInsertElementGenericTableFullAvl+0x0000000000000097)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008
CONTEXT: fffffa60078e84b0 -- (.cxr 0xfffffa60078e84b0)
rax=0000000000000000 rbx=fffff88006922b70 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa800322a568 rdi=0000000000000000
rip=fffff80001ce9d37 rsp=fffffa60078e8d10 rbp=0000000000000000
r8=fffff880060c0030 r9=00000000ffffffff r10=0000000000000001
r11=0000000000000002 r12=fffff8800690a904 r13=0000000000000010
r14=fffffa60078e8dc8 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!RtlInsertElementGenericTableFullAvl+0x97:
fffff800`01ce9d37 4c394008 cmp qword ptr [rax+8],r8 ds:002b:00000000`00000008=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 10
PROCESS_NAME: rundll32.exe
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 1
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001e85080
0000000000000008
BUGCHECK_STR: 0x24
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffffa60010e266f to fffff80001ce9d37
STACK_TEXT:
fffffa60`078e8d10 fffffa60`010e266f : 00010000`00005ae7 fffffa80`044a17d0 00000000`00000000 fffff880`0690a900 : nt!RtlInsertElementGenericTableFullAvl+0x97
fffffa60`078e8d50 fffffa60`010b8d67 : 00010000`00005ae7 fffffa80`044a1700 fffffa60`078e93b0 00010000`00005ae7 : Ntfs!NtfsCreateFcb+0x21f
fffffa60`078e8e30 fffffa60`010de134 : fffff880`068fb660 fffffa60`078e93b0 fffffa60`078e93b0 fffffa80`044a17d0 : Ntfs!NtfsOpenFile+0x1a7
fffffa60`078e9030 fffffa60`0102410d : fffffa80`042d5e50 fffffa80`044a17d0 fffffa60`078e93b0 fffffa60`078e9201 : Ntfs!NtfsCommonCreate+0xb34
fffffa60`078e9230 fffff800`01cd23d1 : fffffa60`078e9320 fffffa80`046ab990 fffffa80`046a4330 fffff800`01d0d850 : Ntfs!NtfsCommonCreateCallout+0x1d
fffffa60`078e9260 fffffa60`0102483a : fffffa60`010240f0 fffffa60`078e9320 fffffa80`042d5e50 fffffa80`044a17d0 : nt!KeExpandKernelStackAndCalloutEx+0x2e1
fffffa60`078e92f0 fffffa60`010dc56d : 00000000`00000000 fffffa60`078e93b0 fffffa80`044a17d0 fffffa80`044a17d0 : Ntfs!NtfsCommonCreateOnNewStack+0x4a
fffffa60`078e9350 fffffa60`00a80e17 : fffffa80`0322a030 fffffa80`044a17d0 fffffa80`046e9000 fffffa80`044a1701 : Ntfs!NtfsFsdCreate+0x1ad
fffffa60`078e94f0 fffffa60`00a9d26c : fffffa80`019fe590 fffffa80`01dce550 fffffa80`044a1700 fffffa60`078e95b0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`078e9560 fffff800`01f36d83 : fffffa80`02e04cc0 fffffa60`078e99e0 00000000`00000045 00000000`00000000 : fltmgr!FltpCreate+0x25d
fffffa60`078e9610 fffff800`01f30a59 : fffffa80`02e04cc0 00000000`00000000 fffffa80`03263610 00000000`00000001 : nt!IopParseDevice+0x5e3
fffffa60`078e97b0 fffff800`01f34944 : 00000000`00000000 fffffa80`046a4101 fffffa80`00000040 00000000`00000000 : nt!ObpLookupObjectName+0x5eb
fffffa60`078e98c0 fffff800`01f032f1 : 00000000`00000080 00000000`0015e628 00000000`00000001 fffff880`05dddaf0 : nt!ObOpenObjectByName+0x2f4
fffffa60`078e9990 fffff800`01cb0df3 : 00000000`00000001 fffffa60`078e9ca0 fffffa80`046a44b0 000007fe`c0000034 : nt!NtQueryAttributesFile+0x134
fffffa60`078e9c20 00000000`77705e4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0015e468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77705e4a
SYMBOL_NAME: PAGE_NOT_ZERO_VISTA
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffffa60078e84b0 ; kb
BUCKET_ID: PAGE_NOT_ZERO_VISTA
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
Debugging Details:
------------------
EXCEPTION_RECORD: fffffa60078e8ad8 -- (.exr 0xfffffa60078e8ad8)
ExceptionAddress: fffff80001ce9d37 (nt!RtlInsertElementGenericTableFullAvl+0x0000000000000097)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008
CONTEXT: fffffa60078e84b0 -- (.cxr 0xfffffa60078e84b0)
rax=0000000000000000 rbx=fffff88006922b70 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa800322a568 rdi=0000000000000000
rip=fffff80001ce9d37 rsp=fffffa60078e8d10 rbp=0000000000000000
r8=fffff880060c0030 r9=00000000ffffffff r10=0000000000000001
r11=0000000000000002 r12=fffff8800690a904 r13=0000000000000010
r14=fffffa60078e8dc8 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!RtlInsertElementGenericTableFullAvl+0x97:
fffff800`01ce9d37 4c394008 cmp qword ptr [rax+8],r8 ds:002b:00000000`00000008=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 10
PROCESS_NAME: rundll32.exe
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 1
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001e85080
0000000000000008
BUGCHECK_STR: 0x24
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffffa60010e266f to fffff80001ce9d37
STACK_TEXT:
fffffa60`078e8d10 fffffa60`010e266f : 00010000`00005ae7 fffffa80`044a17d0 00000000`00000000 fffff880`0690a900 : nt!RtlInsertElementGenericTableFullAvl+0x97
fffffa60`078e8d50 fffffa60`010b8d67 : 00010000`00005ae7 fffffa80`044a1700 fffffa60`078e93b0 00010000`00005ae7 : Ntfs!NtfsCreateFcb+0x21f
fffffa60`078e8e30 fffffa60`010de134 : fffff880`068fb660 fffffa60`078e93b0 fffffa60`078e93b0 fffffa80`044a17d0 : Ntfs!NtfsOpenFile+0x1a7
fffffa60`078e9030 fffffa60`0102410d : fffffa80`042d5e50 fffffa80`044a17d0 fffffa60`078e93b0 fffffa60`078e9201 : Ntfs!NtfsCommonCreate+0xb34
fffffa60`078e9230 fffff800`01cd23d1 : fffffa60`078e9320 fffffa80`046ab990 fffffa80`046a4330 fffff800`01d0d850 : Ntfs!NtfsCommonCreateCallout+0x1d
fffffa60`078e9260 fffffa60`0102483a : fffffa60`010240f0 fffffa60`078e9320 fffffa80`042d5e50 fffffa80`044a17d0 : nt!KeExpandKernelStackAndCalloutEx+0x2e1
fffffa60`078e92f0 fffffa60`010dc56d : 00000000`00000000 fffffa60`078e93b0 fffffa80`044a17d0 fffffa80`044a17d0 : Ntfs!NtfsCommonCreateOnNewStack+0x4a
fffffa60`078e9350 fffffa60`00a80e17 : fffffa80`0322a030 fffffa80`044a17d0 fffffa80`046e9000 fffffa80`044a1701 : Ntfs!NtfsFsdCreate+0x1ad
fffffa60`078e94f0 fffffa60`00a9d26c : fffffa80`019fe590 fffffa80`01dce550 fffffa80`044a1700 fffffa60`078e95b0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`078e9560 fffff800`01f36d83 : fffffa80`02e04cc0 fffffa60`078e99e0 00000000`00000045 00000000`00000000 : fltmgr!FltpCreate+0x25d
fffffa60`078e9610 fffff800`01f30a59 : fffffa80`02e04cc0 00000000`00000000 fffffa80`03263610 00000000`00000001 : nt!IopParseDevice+0x5e3
fffffa60`078e97b0 fffff800`01f34944 : 00000000`00000000 fffffa80`046a4101 fffffa80`00000040 00000000`00000000 : nt!ObpLookupObjectName+0x5eb
fffffa60`078e98c0 fffff800`01f032f1 : 00000000`00000080 00000000`0015e628 00000000`00000001 fffff880`05dddaf0 : nt!ObOpenObjectByName+0x2f4
fffffa60`078e9990 fffff800`01cb0df3 : 00000000`00000001 fffffa60`078e9ca0 fffffa80`046a44b0 000007fe`c0000034 : nt!NtQueryAttributesFile+0x134
fffffa60`078e9c20 00000000`77705e4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0015e468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77705e4a
SYMBOL_NAME: PAGE_NOT_ZERO_VISTA
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffffa60078e84b0 ; kb
BUCKET_ID: PAGE_NOT_ZERO_VISTA
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.