Let's keep this to a single thread. I will ask the mods to merge the 2 threads.
I still suggest removing Norton for this one.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Jonathan\AppData\Local\Temp\Temp2_dmp.zip\061110-26832-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x83255000 PsLoadedModuleList = 0x8339d810
Debug session time: Fri Jun 11 09:19:18.114 2010 (GMT-4)
System Uptime: 0 days 0:00:17.690
Loading Kernel Symbols
...............................................................
.......................
Loading User Symbols
Loading unloaded module list
.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {5500, 2, 0, 83375795}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+135 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 00005500, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 83375795, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+135
83375795 8b10 mov edx,dword ptr [eax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
TRAP_FRAME: 807868a4 -- (.trap 0xffffffff807868a4)
ErrCode = 00000000
eax=00005500 ebx=00000006 ecx=000001ff edx=8338ac30 esi=8338ac30 edi=8338a8c0
eip=83375795 esp=80786918 ebp=80786950 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210206
nt!ExDeferredFreePool+0x135:
83375795 8b10 mov edx,dword ptr [eax] ds:0023:00005500=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 83375795 to 8329b82b
STACK_TEXT:
807868a4 83375795 badb0d00 8338ac30 83223ba9 nt!KiTrap0E+0x2cf
80786950 833748aa 8338a8c0 00000000 00000000 nt!ExDeferredFreePool+0x135
807869b8 833f8a0d 87ff5838 00000000 00000000 nt!ExFreePoolWithTag+0x8a4
80786b9c 83606853 00000001 00000000 80786bd4 nt!IopLoadDriver+0xad2
80786be8 8360287b 80810b08 8080a900 00000000 nt!IopInitializeSystemDrivers+0x163
80786c6c 83607e6f 0080a900 851bfdd8 851bfa68 nt!IoInitSystem+0x6de
80786d48 833e047c 80786d90 834636bb 8080a900 nt!Phase1InitializationDiscard+0xce4
80786d50 834636bb 8080a900 9fd2b728 00000000 nt!Phase1Initialization+0xd
80786d90 833150f9 833e046f 8080a900 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+135
83375795 8b10 mov edx,dword ptr [eax]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+135
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+135
BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+135
Followup: Pool_corruption
---------
2: kd> lmsmn
start end module name
88eaa000 88ef2000 ACPI ACPI.sys
93292000 932ec000 afd afd.sys
8900a000 89013000 amdxata amdxata.sys
891cc000 891d5000 atapi atapi.sys
891d5000 891f8000 ataport ataport.SYS
88f51000 88f5c000 BATTC BATTC.SYS
8eb8c000 8eb93000 Beep Beep.SYS
88cc2000 88cca000 BOOTVID BOOTVID.dll
8e600000 8e61f000 cdrom cdrom.sys
88d0c000 88db7000 CI CI.dll
89908000 8992d000 CLASSPNP CLASSPNP.SYS
88cca000 88d0c000 CLFS CLFS.SYS
89438000 89495000 cng cng.sys
88f49000 88f51000 compbatt compbatt.sys
8992d000 8993a000 crashdmp crashdmp.sys
898f7000 89908000 disk disk.sys
8e7e6000 8e7f7000 dump_dumpfve dump_dumpfve.sys
8e633000 8e7e6000 dump_iaStor dump_iaStor.sys
88fe2000 88ff3000 fileinfo fileinfo.sys
88db7000 88deb000 fltmgr fltmgr.sys
894a3000 894ac000 Fs_Rec Fs_Rec.sys
898c5000 898f7000 fvevol fvevol.sys
89772000 897a3000 fwpkclnt fwpkclnt.sys
8321e000 83255000 hal halmacpi.dll
898bd000 898c5000 hwpolicy hwpolicy.sys
89019000 891cc000 iaStor iaStor.sys
89991000 899b0000 Ironx86 Ironx86.SYS
80bcb000 80bd3000 kdcom kdcom.dll
893ed000 89400000 ksecdd ksecdd.sys
895a1000 895c6000 ksecpkg ksecpkg.sys
88c39000 88cb1000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll
88fb7000 88fcd000 mountmgr mountmgr.sys
89000000 8900a000 msahci msahci.sys
8ebe5000 8ebf0000 Msfs Msfs.SYS
88efb000 88f03000 msisadrv msisadrv.sys
89200000 8922b000 msrpc msrpc.sys
898ad000 898bd000 mup mup.sys
8eb71000 8eb84400 NAVENG NAVENG.SYS
8ea04000 8eb4b580 NAVEX15 NAVEX15.SYS
894ac000 89563000 ndis ndis.sys
9335e000 9336c000 netbios netbios.sys
932ec000 9331e000 netbt netbt.sys
89563000 895a1000 NETIO NETIO.SYS
8ebf0000 8ebfe000 Npfs Npfs.SYS
83255000 83665000 nt ntkrpamp.exe
892be000 893ed000 Ntfs Ntfs.sys
8eb85000 8eb8c000 Null Null.SYS
9332e000 9334d000 pacer pacer.sys
88f38000 88f49000 partmgr partmgr.sys
88f03000 88f2d000 pci pci.sys
88fcd000 88fd4000 pciide pciide.sys
88fd4000 88fe2000 PCIIDEX PCIIDEX.SYS
89495000 894a3000 pcw pcw.sys
88cb1000 88cc2000 PSHED PSHED.dll
8ebcd000 8ebd5000 RDPCDD RDPCDD.sys
8ebd5000 8ebdd000 rdpencdd rdpencdd.sys
8ebdd000 8ebe5000 rdprefmp rdprefmp.sys
89880000 898ad000 rdyboost rdyboost.sys
89878000 89880000 spldr spldr.sys
8993a000 89991000 SRTSP SRTSP.SYS
8e61f000 8e628080 SRTSPX SRTSPX.SYS
8923b000 89291000 SYMDS SYMDS.SYS
89291000 892be000 SYMEFA SYMEFA.SYS
8eb4c000 8eb71000 SYMEVENT SYMEVENT.SYS
93239000 93292000 SYMTDIV SYMTDIV.SYS
89629000 89772000 tcpip tcpip.sys
899c7000 899d2000 TDI TDI.SYS
899b0000 899c7000 tdx tdx.sys
9338f000 9339f000 termdd termdd.sys
89831000 89878000 tos_sps32 tos_sps32.sys
9336c000 9337ba00 tosrfcom tosrfcom.sys
897ea000 897ee100 TVALZ_O TVALZ_O.SYS
88f2d000 88f38000 vdrvroot vdrvroot.sys
8eb93000 8eb9f000 vga vga.sys
8eb9f000 8ebc0000 VIDEOPRT VIDEOPRT.SYS
88f5c000 88f6c000 volmgr volmgr.sys
88f6c000 88fb7000 volmgrx volmgrx.sys
897ab000 897ea000 volsnap volsnap.sys
9334d000 9335e000 vwififlt vwififlt.sys
9337c000 9338f000 wanarp wanarp.sys
8ebc0000 8ebcd000 watchdog watchdog.sys
897a3000 897ab000 wd wd.sys
88e2b000 88e9c000 Wdf01000 Wdf01000.sys
88e9c000 88eaa000 WDFLDR WDFLDR.SYS
93327000 9332e000 wfplwf wfplwf.sys
88ef2000 88efb000 WMILIB WMILIB.SYS
9331e000 93327000 ws2ifsl ws2ifsl.sys
Unloaded modules:
9339f000 933ab000 SysTool.sys