I get the following crashes:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ab8c75, Address of the instruction which caused the bugcheck
Arg3: fffff8800aee3470, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetNextNode+15
fffff800`02ab8c75 48394808 cmp qword ptr [rax+8],rcx
CONTEXT: fffff8800aee3470 -- (.cxr 0xfffff8800aee3470)
rax=fffbfa80040e9e30 rbx=fffffa80042af400 rcx=fffffa80049019b0
rdx=fffffa800522c074 rsi=fffffa8004575278 rdi=fffffa80049019b0
rip=fffff80002ab8c75 rsp=fffff8800aee3e58 rbp=fffffa8005238980
r8=0000000000000005 r9=fffffa8003c36b40 r10=fffffa8003c363c8
r11=0000000000000003 r12=fffff8a008029510 r13=0000000000000000
r14=fffff8a008029600 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
nt!MiGetNextNode+0x15:
fffff800`02ab8c75 48394808 cmp qword ptr [rax+8],rcx ds:002b:fffbfa80`040e9e38=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002e1e0e0 to fffff80002ab8c75
STACK_TEXT:
fffff880`0aee3e58 fffff800`02e1e0e0 : 00000000`00000003 fffffa80`042af400 00000000`00000000 00000000`000007ff : nt!MiGetNextNode+0x15
fffff880`0aee3e60 fffff800`02ce0958 : fffffa80`04575060 fffff880`0aee3f40 00000000`00000000 00000000`00000f08 : nt!MmEnumerateAndReferenceImages+0x160
fffff880`0aee3ee0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x212a9
FOLLOWUP_IP:
nt!MiGetNextNode+15
fffff800`02ab8c75 48394808 cmp qword ptr [rax+8],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetNextNode+15
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff8800aee3470 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetNextNode+15
BUCKET_ID: X64_0x3B_nt!MiGetNextNode+15
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ad6105, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6105 498b08 mov rcx,qword ptr [r8]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b12a17 to fffff80002ad2f00
STACK_TEXT:
fffff880`09ecda48 fffff800`02b12a17 : 00000000`0000001e ffffffff`c0000005 fffff800`02ad6105 00000000`00000000 : nt!KeBugCheckEx
fffff880`09ecda50 fffff800`02ad2542 : fffff880`09ece228 00000000`00000000 fffff880`09ece2d0 00000000`0000000b : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`09ece0f0 fffff800`02ad0e4a : fffff880`09ece368 fffff880`0123bc42 fffffa80`04c3ee60 fffff880`0110f160 : nt!KiExceptionDispatch+0xc2
fffff880`09ece2d0 fffff800`02ad6105 : 00000000`00000000 fffff800`02ae2038 fffffa80`00000004 fffffa80`03e1d9b0 : nt!KiGeneralProtectionFault+0x10a
fffff880`09ece460 fffff800`02ae2038 : fffffa80`00000004 fffffa80`03e1d9b0 fffffa80`04c0fa00 fffffa80`03e1d9b0 : nt!ExpInterlockedPopEntrySListFault16
fffff880`09ece470 fffff800`02ac4883 : fffffa80`0650a860 fffffa80`06bb9070 00000000`00000403 fffff880`02fd5180 : nt!IopAllocateIrpPrivate+0xd8
fffff880`09ece4d0 fffff800`02d7288f : fffffa80`06b06c00 fffffa80`0650a840 fffffa80`0650a901 fffffa80`05bca940 : nt!IoPageRead+0x83
fffff880`09ece560 fffff800`02d32adb : 00000000`00000001 00000000`0000001f fffffa80`05f22520 00000000`00000004 : nt!MiPfExecuteReadList+0xff
fffff880`09ece5c0 fffff800`02f2e7ac : 00000000`00000002 00000000`0000002c fffffa80`05f22520 00000000`0000002c : nt!MmPrefetchPages+0xfb
fffff880`09ece620 fffff800`02f2e9cd : fffff880`09ece740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x43c
fffff880`09ece710 fffff800`02f2ee0f : 00000006`10f907d3 fffffa80`065a45e0 fffff8a0`06cb3000 00000000`00000000 : nt!PfSnPrefetchScenario+0x16d
fffff880`09ece980 fffff800`02d272bf : 00000000`00000000 00000000`3218e401 fffffa80`06448c10 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
fffff880`09ecea50 fffff800`02d9e13c : fffffa80`05c49370 fffffa80`06448c10 00000000`14050800 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x51390
fffff880`09ecea80 fffff800`02ab15b5 : fffff880`030f9180 00000000`00000000 fffff800`02d9e040 fffffa80`05c49370 : nt!PspUserThreadStartup+0xfc
fffff880`09eceae0 fffff800`02ab1537 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
fffff880`09ecec20 00000000`773f3260 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`0025fc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773f3260
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6105 498b08 mov rcx,qword ptr [r8]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!ExpInterlockedPopEntrySListFault16+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
BUCKET_ID: X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050830
Arg2: fffff8800334d6f8
Arg3: fffff8800334cf50
Arg4: fffff80002ad5d97
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
EXCEPTION_RECORD: fffff8800334d6f8 -- (.exr 0xfffff8800334d6f8)
Cannot read Exception record @ fffff8800334d6f8
CONTEXT: fffff8800334cf50 -- (.cxr 0xfffff8800334cf50)
Unable to read context, Win32 error 0n30
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x34
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8800457572d to fffff880045756e4
STACK_TEXT:
fffff800`0402fc68 fffff880`0457572d : 00000000`00000001 fffffa80`0587f850 ffffffff`fffffffe 00000000`00000028 : 0xfffff880`045756e4
fffff800`0402fc70 00000000`00000001 : fffffa80`0587f850 ffffffff`fffffffe 00000000`00000028 00000000`00000001 : 0xfffff880`0457572d
fffff800`0402fc78 fffffa80`0587f850 : ffffffff`fffffffe 00000000`00000028 00000000`00000001 fffff800`02adfa3a : 0x1
fffff800`0402fc80 ffffffff`fffffffe : 00000000`00000028 00000000`00000001 fffff800`02adfa3a 00000000`00345408 : 0xfffffa80`0587f850
fffff800`0402fc88 00000000`00000028 : 00000000`00000001 fffff800`02adfa3a 00000000`00345408 fffffa80`0588d2d0 : 0xffffffff`fffffffe
fffff800`0402fc90 00000000`00000001 : fffff800`02adfa3a 00000000`00345408 fffffa80`0588d2d0 fffff800`02c4ae80 : 0x28
fffff800`0402fc98 fffff800`02adfa3a : 00000000`00345408 fffffa80`0588d2d0 fffff800`02c4ae80 00000000`00000000 : 0x1
fffff800`0402fca0 00000000`00345408 : fffffa80`0588d2d0 fffff800`02c4ae80 00000000`00000000 fffff800`02c4ae80 : 0xfffff800`02adfa3a
fffff800`0402fca8 fffffa80`0588d2d0 : fffff800`02c4ae80 00000000`00000000 fffff800`02c4ae80 fffff800`02add697 : 0x345408
fffff800`0402fcb0 fffff800`02c4ae80 : 00000000`00000000 fffff800`02c4ae80 fffff800`02add697 00000000`ae94bda7 : 0xfffffa80`0588d2d0
fffff800`0402fcb8 00000000`00000000 : fffff800`02c4ae80 fffff800`02add697 00000000`ae94bda7 00000000`ae94bd0e : 0xfffff800`02c4ae80
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------
Any suggestions pls.
Specs:
MB: ASUS M5A97 R2.0
CPU: AMD FX8320
Ram: Corsair XMS3 4GB 1333MHz
PSU: Corsair CX500
Video: Geforce 9600GT
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ab8c75, Address of the instruction which caused the bugcheck
Arg3: fffff8800aee3470, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetNextNode+15
fffff800`02ab8c75 48394808 cmp qword ptr [rax+8],rcx
CONTEXT: fffff8800aee3470 -- (.cxr 0xfffff8800aee3470)
rax=fffbfa80040e9e30 rbx=fffffa80042af400 rcx=fffffa80049019b0
rdx=fffffa800522c074 rsi=fffffa8004575278 rdi=fffffa80049019b0
rip=fffff80002ab8c75 rsp=fffff8800aee3e58 rbp=fffffa8005238980
r8=0000000000000005 r9=fffffa8003c36b40 r10=fffffa8003c363c8
r11=0000000000000003 r12=fffff8a008029510 r13=0000000000000000
r14=fffff8a008029600 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
nt!MiGetNextNode+0x15:
fffff800`02ab8c75 48394808 cmp qword ptr [rax+8],rcx ds:002b:fffbfa80`040e9e38=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002e1e0e0 to fffff80002ab8c75
STACK_TEXT:
fffff880`0aee3e58 fffff800`02e1e0e0 : 00000000`00000003 fffffa80`042af400 00000000`00000000 00000000`000007ff : nt!MiGetNextNode+0x15
fffff880`0aee3e60 fffff800`02ce0958 : fffffa80`04575060 fffff880`0aee3f40 00000000`00000000 00000000`00000f08 : nt!MmEnumerateAndReferenceImages+0x160
fffff880`0aee3ee0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x212a9
FOLLOWUP_IP:
nt!MiGetNextNode+15
fffff800`02ab8c75 48394808 cmp qword ptr [rax+8],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetNextNode+15
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff8800aee3470 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetNextNode+15
BUCKET_ID: X64_0x3B_nt!MiGetNextNode+15
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ad6105, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6105 498b08 mov rcx,qword ptr [r8]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b12a17 to fffff80002ad2f00
STACK_TEXT:
fffff880`09ecda48 fffff800`02b12a17 : 00000000`0000001e ffffffff`c0000005 fffff800`02ad6105 00000000`00000000 : nt!KeBugCheckEx
fffff880`09ecda50 fffff800`02ad2542 : fffff880`09ece228 00000000`00000000 fffff880`09ece2d0 00000000`0000000b : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`09ece0f0 fffff800`02ad0e4a : fffff880`09ece368 fffff880`0123bc42 fffffa80`04c3ee60 fffff880`0110f160 : nt!KiExceptionDispatch+0xc2
fffff880`09ece2d0 fffff800`02ad6105 : 00000000`00000000 fffff800`02ae2038 fffffa80`00000004 fffffa80`03e1d9b0 : nt!KiGeneralProtectionFault+0x10a
fffff880`09ece460 fffff800`02ae2038 : fffffa80`00000004 fffffa80`03e1d9b0 fffffa80`04c0fa00 fffffa80`03e1d9b0 : nt!ExpInterlockedPopEntrySListFault16
fffff880`09ece470 fffff800`02ac4883 : fffffa80`0650a860 fffffa80`06bb9070 00000000`00000403 fffff880`02fd5180 : nt!IopAllocateIrpPrivate+0xd8
fffff880`09ece4d0 fffff800`02d7288f : fffffa80`06b06c00 fffffa80`0650a840 fffffa80`0650a901 fffffa80`05bca940 : nt!IoPageRead+0x83
fffff880`09ece560 fffff800`02d32adb : 00000000`00000001 00000000`0000001f fffffa80`05f22520 00000000`00000004 : nt!MiPfExecuteReadList+0xff
fffff880`09ece5c0 fffff800`02f2e7ac : 00000000`00000002 00000000`0000002c fffffa80`05f22520 00000000`0000002c : nt!MmPrefetchPages+0xfb
fffff880`09ece620 fffff800`02f2e9cd : fffff880`09ece740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x43c
fffff880`09ece710 fffff800`02f2ee0f : 00000006`10f907d3 fffffa80`065a45e0 fffff8a0`06cb3000 00000000`00000000 : nt!PfSnPrefetchScenario+0x16d
fffff880`09ece980 fffff800`02d272bf : 00000000`00000000 00000000`3218e401 fffffa80`06448c10 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
fffff880`09ecea50 fffff800`02d9e13c : fffffa80`05c49370 fffffa80`06448c10 00000000`14050800 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x51390
fffff880`09ecea80 fffff800`02ab15b5 : fffff880`030f9180 00000000`00000000 fffff800`02d9e040 fffffa80`05c49370 : nt!PspUserThreadStartup+0xfc
fffff880`09eceae0 fffff800`02ab1537 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
fffff880`09ecec20 00000000`773f3260 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`0025fc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773f3260
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6105 498b08 mov rcx,qword ptr [r8]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!ExpInterlockedPopEntrySListFault16+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
BUCKET_ID: X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050830
Arg2: fffff8800334d6f8
Arg3: fffff8800334cf50
Arg4: fffff80002ad5d97
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
EXCEPTION_RECORD: fffff8800334d6f8 -- (.exr 0xfffff8800334d6f8)
Cannot read Exception record @ fffff8800334d6f8
CONTEXT: fffff8800334cf50 -- (.cxr 0xfffff8800334cf50)
Unable to read context, Win32 error 0n30
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x34
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8800457572d to fffff880045756e4
STACK_TEXT:
fffff800`0402fc68 fffff880`0457572d : 00000000`00000001 fffffa80`0587f850 ffffffff`fffffffe 00000000`00000028 : 0xfffff880`045756e4
fffff800`0402fc70 00000000`00000001 : fffffa80`0587f850 ffffffff`fffffffe 00000000`00000028 00000000`00000001 : 0xfffff880`0457572d
fffff800`0402fc78 fffffa80`0587f850 : ffffffff`fffffffe 00000000`00000028 00000000`00000001 fffff800`02adfa3a : 0x1
fffff800`0402fc80 ffffffff`fffffffe : 00000000`00000028 00000000`00000001 fffff800`02adfa3a 00000000`00345408 : 0xfffffa80`0587f850
fffff800`0402fc88 00000000`00000028 : 00000000`00000001 fffff800`02adfa3a 00000000`00345408 fffffa80`0588d2d0 : 0xffffffff`fffffffe
fffff800`0402fc90 00000000`00000001 : fffff800`02adfa3a 00000000`00345408 fffffa80`0588d2d0 fffff800`02c4ae80 : 0x28
fffff800`0402fc98 fffff800`02adfa3a : 00000000`00345408 fffffa80`0588d2d0 fffff800`02c4ae80 00000000`00000000 : 0x1
fffff800`0402fca0 00000000`00345408 : fffffa80`0588d2d0 fffff800`02c4ae80 00000000`00000000 fffff800`02c4ae80 : 0xfffff800`02adfa3a
fffff800`0402fca8 fffffa80`0588d2d0 : fffff800`02c4ae80 00000000`00000000 fffff800`02c4ae80 fffff800`02add697 : 0x345408
fffff800`0402fcb0 fffff800`02c4ae80 : 00000000`00000000 fffff800`02c4ae80 fffff800`02add697 00000000`ae94bda7 : 0xfffffa80`0588d2d0
fffff800`0402fcb8 00000000`00000000 : fffff800`02c4ae80 fffff800`02add697 00000000`ae94bda7 00000000`ae94bd0e : 0xfffff800`02c4ae80
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------
Any suggestions pls.
Specs:
MB: ASUS M5A97 R2.0
CPU: AMD FX8320
Ram: Corsair XMS3 4GB 1333MHz
PSU: Corsair CX500
Video: Geforce 9600GT