Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Summary Dump File: Only kernel address space is available
- Symbol search path is: http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
- Machine Name:
- Kernel base = 0xfffff800`01c01000 PsLoadedModuleList = 0xfffff800`01e46e90
- Debug session time: Wed Mar 9 18:40:55.315 2011 (UTC + 1:00)
- System Uptime: 0 days 0:00:34.986
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- .......................................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 000007ff`fffd4018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ....
- The context is partially valid. Only x86 user-mode context is available.
- The wow64exts extension must be loaded to access 32-bit state.
- .load wow64exts will do this if you haven't loaded it already.
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck C5, {8, 2, 0, fffff80001dada9b}
- Probably caused by : Unknown_Image ( nt!ExDeferredFreePool+1df )
- Followup: MachineOwner
- ---------
- 16.6: kd:x86> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_CORRUPTED_EXPOOL (c5)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is
- caused by drivers that have corrupted the system pool. Run the driver
- verifier against any new (or suspect) drivers, and if that doesn't turn up
- the culprit, then use gflags to enable special pool.
- Arguments:
- Arg1: 0000000000000008, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff80001dada9b, address which referenced memory
- Debugging Details:
- ------------------
- BUGCHECK_STR: 0xC5_2
- CURRENT_IRQL: 0
- FAULTING_IP:
- nt!ExDeferredFreePool+1df
- fffff800`01dada9b 4c dec esp
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000000000000
- STACK_TEXT:
- 00000000 00000000 00000000 00000000 00000000 0x0
- STACK_COMMAND: .bugcheck ; kb
- FOLLOWUP_IP:
- nt!ExDeferredFreePool+1df
- fffff800`01dada9b 4c dec esp
- SYMBOL_NAME: nt!ExDeferredFreePool+1df
- FOLLOWUP_NAME: MachineOwner
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MODULE_NAME: Unknown_Module
- BUCKET_ID: INVALID_KERNEL_CONTEXT
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement