New
#21
All it says is pool corruption, which is caused by a bad driver. It doesn't specifically say which one.
Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Jonathan\AppData\Local\Temp\Temp2_New WinRAR ZIP archive.zip\061310-35006-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16539.x86fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0x8324b000 PsLoadedModuleList = 0x83393810 Debug session time: Sun Jun 13 01:11:28.566 2010 (GMT-4) System Uptime: 0 days 0:00:08.143 Loading Kernel Symbols ............................................................... .................. Loading User Symbols Loading unloaded module list . ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C5, {1fc0, 2, 0, 8336b795} Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+135 ) Followup: Pool_corruption --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_CORRUPTED_EXPOOL (c5) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is caused by drivers that have corrupted the system pool. Run the driver verifier against any new (or suspect) drivers, and if that doesn't turn up the culprit, then use gflags to enable special pool. Arguments: Arg1: 00001fc0, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, value 0 = read operation, 1 = write operation Arg4: 8336b795, address which referenced memory Debugging Details: ------------------ BUGCHECK_STR: 0xC5_2 CURRENT_IRQL: 2 FAULTING_IP: nt!ExDeferredFreePool+135 8336b795 8b10 mov edx,dword ptr [eax] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System TRAP_FRAME: 80786a54 -- (.trap 0xffffffff80786a54) ErrCode = 00000000 eax=00001fc0 ebx=0000000a ecx=000001ff edx=83380c50 esi=83380c50 edi=833808c0 eip=8336b795 esp=80786ac8 ebp=80786b00 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210206 nt!ExDeferredFreePool+0x135: 8336b795 8b10 mov edx,dword ptr [eax] ds:0023:00001fc0=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 8336b795 to 8329182b STACK_TEXT: 80786a54 8336b795 badb0d00 83380c50 00000000 nt!KiTrap0E+0x2cf 80786b00 8336a8aa 833808c0 00000000 8b259f68 nt!ExDeferredFreePool+0x135 80786b68 833eed51 87ea0978 00000000 00000000 nt!ExFreePoolWithTag+0x8a4 80786ba0 835fc74e 80000168 80786bbc 8080a900 nt!IopGetDriverNameFromKeyNode+0x241 80786be8 835f887b 80810b08 8080a900 00000000 nt!IopInitializeSystemDrivers+0x5e 80786c6c 835fde6f 0080a900 851bfdd8 851bfa68 nt!IoInitSystem+0x6de 80786d48 833d647c 80786d90 834596bb 8080a900 nt!Phase1InitializationDiscard+0xce4 80786d50 834596bb 8080a900 9fd4ff6c 00000000 nt!Phase1Initialization+0xd 80786d90 8330b0f9 833d646f 8080a900 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 STACK_COMMAND: kb FOLLOWUP_IP: nt!ExDeferredFreePool+135 8336b795 8b10 mov edx,dword ptr [eax] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExDeferredFreePool+135 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MODULE_NAME: Pool_Corruption FAILURE_BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+135 BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+135 Followup: Pool_corruption --------- 3: kd> lmsmn start end module name 88e89000 88ed1000 ACPI ACPI.sys 8998a000 899e4000 afd afd.sys 891ea000 891f3000 amdxata amdxata.sys 891d7000 891e0000 atapi atapi.sys 89000000 89023000 ataport ataport.SYS 88f30000 88f3b000 BATTC BATTC.SYS 8cbf0000 8cbf7000 Beep Beep.SYS 88caa000 88cb2000 BOOTVID BOOTVID.dll 8ca11000 8ca30000 cdrom cdrom.sys 88cf4000 88d9f000 CI CI.dll 89855000 8987a000 CLASSPNP CLASSPNP.SYS 88cb2000 88cf4000 CLFS CLFS.SYS 89409000 89466000 cng cng.sys 88f28000 88f30000 compbatt compbatt.sys 8987a000 89887000 crashdmp crashdmp.sys 89844000 89855000 disk disk.sys 8ca00000 8ca11000 dump_dumpfve dump_dumpfve.sys 8ca3d000 8cbf0000 dump_iaStor dump_iaStor.sys 88c00000 88c11000 fileinfo fileinfo.sys 88fc1000 88ff5000 fltmgr fltmgr.sys 89474000 8947d000 Fs_Rec Fs_Rec.sys 89812000 89844000 fvevol fvevol.sys 89766000 89797000 fwpkclnt fwpkclnt.sys 83214000 8324b000 hal halmacpi.dll 89600000 89608000 hwpolicy hwpolicy.sys 89024000 891d7000 iaStor iaStor.sys 80ba8000 80bb0000 kdcom kdcom.dll 893b3000 893c6000 ksecdd ksecdd.sys 89572000 89597000 ksecpkg ksecpkg.sys 88c21000 88c99000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll 88f96000 88fac000 mountmgr mountmgr.sys 891e0000 891ea000 msahci msahci.sys 898d1000 898dc000 Msfs Msfs.SYS 88eda000 88ee2000 msisadrv msisadrv.sys 89388000 893b3000 msrpc msrpc.sys 897eb000 897fb000 mup mup.sys 8947d000 89534000 ndis ndis.sys 8eaa8000 8eab6000 netbios netbios.sys 8ea36000 8ea68000 netbt netbt.sys 89534000 89572000 NETIO NETIO.SYS 898dc000 898ea000 Npfs Npfs.SYS 8324b000 8365b000 nt ntkrpamp.exe 89259000 89388000 Ntfs Ntfs.sys 8ca30000 8ca37000 Null Null.SYS 8ea78000 8ea97000 pacer pacer.sys 88f17000 88f28000 partmgr partmgr.sys 88ee2000 88f0c000 pci pci.sys 88fac000 88fb3000 pciide pciide.sys 88fb3000 88fc1000 PCIIDEX PCIIDEX.SYS 89466000 89474000 pcw pcw.sys 88c99000 88caa000 PSHED PSHED.dll 8cbf7000 8cbff000 RDPCDD RDPCDD.sys 898c1000 898c9000 rdpencdd rdpencdd.sys 898c9000 898d1000 rdprefmp rdprefmp.sys 893c6000 893f3000 rdyboost rdyboost.sys 897e3000 897eb000 spldr spldr.sys 88d9f000 88df5000 SYMDS SYMDS.SYS 8922c000 89259000 SYMEFA SYMEFA.SYS 89965000 8998a000 SYMEVENT SYMEVENT.SYS 8990c000 89965000 SYMTDIV SYMTDIV.SYS 8961d000 89766000 tcpip tcpip.sys 89901000 8990c000 TDI TDI.SYS 898ea000 89901000 tdx tdx.sys 8ead9000 8eae9000 termdd termdd.sys 89597000 895de000 tos_sps32 tos_sps32.sys 8eab6000 8eac5a00 tosrfcom tosrfcom.sys 897de000 897e2100 TVALZ_O TVALZ_O.SYS 88f0c000 88f17000 vdrvroot vdrvroot.sys 89887000 89893000 vga vga.sys 89893000 898b4000 VIDEOPRT VIDEOPRT.SYS 88f3b000 88f4b000 volmgr volmgr.sys 88f4b000 88f96000 volmgrx volmgrx.sys 8979f000 897de000 volsnap volsnap.sys 8ea97000 8eaa8000 vwififlt vwififlt.sys 8eac6000 8ead9000 wanarp wanarp.sys 898b4000 898c1000 watchdog watchdog.sys 89797000 8979f000 wd wd.sys 88e0a000 88e7b000 Wdf01000 Wdf01000.sys 88e7b000 88e89000 WDFLDR WDFLDR.SYS 8ea71000 8ea78000 wfplwf wfplwf.sys 88ed1000 88eda000 WMILIB WMILIB.SYS 8ea68000 8ea71000 ws2ifsl ws2ifsl.sys Unloaded modules: 8eae9000 8eaf5000 SysTool.sys