Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 8 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.321.amd64fre.rs1_release_inmarket.161004-2338
- Machine Name:
- Kernel base = 0xfffff803`4c615000 PsLoadedModuleList = 0xfffff803`4c919080
- Debug session time: Wed Oct 26 16:45:06.894 2016 (UTC - 4:00)
- System Uptime: 0 days 0:10:04.618
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_CORRUPTED_EXPOOL (c5)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is
- caused by drivers that have corrupted the system pool. Run the driver
- verifier against any new (or suspect) drivers, and if that doesn't turn up
- the culprit, then use gflags to enable special pool.
- Arguments:
- Arg1: 00000000760e0017, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff8034c861850, address which referenced memory
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- BUGCHECK_STR: 0xC5_2
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!ExDeferredFreePool+b0
- fffff803`4c861850 488b10 mov rdx,qword ptr [rax]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: svchost.exe
- TRAP_FRAME: ffffce8166ed2310 -- (.trap 0xffffce8166ed2310)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000760e0017 rbx=0000000000000000 rcx=fffff8034c94ed20
- rdx=00000000760e0017 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8034c861850 rsp=ffffce8166ed24a0 rbp=0000000000000000
- r8=ffffbc862831fa20 r9=fffff8034c94ea10 r10=0000000000000000
- r11=fffff8034c94ea10 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!ExDeferredFreePool+0xb0:
- fffff803`4c861850 488b10 mov rdx,qword ptr [rax] ds:00000000`760e0017=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8034c76a429 to fffff8034c75f2c0
- STACK_TEXT:
- ffffce81`66ed21c8 fffff803`4c76a429 : 00000000`0000000a 00000000`760e0017 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffffce81`66ed21d0 fffff803`4c768a07 : ffffbc86`330f2390 ffffbc86`330f2390 ffffbc86`330f2390 fffff80a`de4ac299 : nt!KiBugCheckDispatch+0x69
- ffffce81`66ed2310 fffff803`4c861850 : ffffce81`66ed25b0 fffff80a`de46455e ffff8b19`e9380004 00000000`00000000 : nt!KiPageFault+0x247
- ffffce81`66ed24a0 fffff803`4c86086d : ffffbc86`2830ca20 fffff803`4c94e600 fffff803`4c94e600 00000000`00000000 : nt!ExDeferredFreePool+0xb0
- ffffce81`66ed2520 fffff80a`e24158b1 : ffffbc86`27649a20 00000000`00000004 ffffce81`66ed2680 ffffce81`0000005f : nt!ExFreePoolWithTag+0x86d
- ffffce81`66ed2600 ffffbc86`27649a20 : 00000000`00000004 ffffce81`66ed2680 ffffce81`0000005f ffffbc86`27c50930 : acsock64+0x158b1
- ffffce81`66ed2608 00000000`00000004 : ffffce81`66ed2680 ffffce81`0000005f ffffbc86`27c50930 ffffbc86`27c509b0 : 0xffffbc86`27649a20
- ffffce81`66ed2610 ffffce81`66ed2680 : ffffce81`0000005f ffffbc86`27c50930 ffffbc86`27c509b0 ffffbc86`276b4058 : 0x4
- ffffce81`66ed2618 ffffce81`0000005f : ffffbc86`27c50930 ffffbc86`27c509b0 ffffbc86`276b4058 fffff80a`e240986e : 0xffffce81`66ed2680
- ffffce81`66ed2620 ffffbc86`27c50930 : ffffbc86`27c509b0 ffffbc86`276b4058 fffff80a`e240986e ffffbc86`272a67d0 : 0xffffce81`0000005f
- ffffce81`66ed2628 ffffbc86`27c509b0 : ffffbc86`276b4058 fffff80a`e240986e ffffbc86`272a67d0 ffffce81`66ed2da0 : 0xffffbc86`27c50930
- ffffce81`66ed2630 ffffbc86`276b4058 : fffff80a`e240986e ffffbc86`272a67d0 ffffce81`66ed2da0 ffffce81`66ed2d70 : 0xffffbc86`27c509b0
- ffffce81`66ed2638 fffff80a`e240986e : ffffbc86`272a67d0 ffffce81`66ed2da0 ffffce81`66ed2d70 ffffbc86`276ae000 : 0xffffbc86`276b4058
- ffffce81`66ed2640 ffffbc86`272a67d0 : ffffce81`66ed2da0 ffffce81`66ed2d70 ffffbc86`276ae000 ffffbc86`27c50930 : acsock64+0x986e
- ffffce81`66ed2648 ffffce81`66ed2da0 : ffffce81`66ed2d70 ffffbc86`276ae000 ffffbc86`27c50930 fffff80a`e2409678 : 0xffffbc86`272a67d0
- ffffce81`66ed2650 ffffce81`66ed2d70 : ffffbc86`276ae000 ffffbc86`27c50930 fffff80a`e2409678 fffff80a`e241fb98 : 0xffffce81`66ed2da0
- ffffce81`66ed2658 ffffbc86`276ae000 : ffffbc86`27c50930 fffff80a`e2409678 fffff80a`e241fb98 ffffbc86`276b4100 : 0xffffce81`66ed2d70
- ffffce81`66ed2660 ffffbc86`27c50930 : fffff80a`e2409678 fffff80a`e241fb98 ffffbc86`276b4100 ffffce01`66020003 : 0xffffbc86`276ae000
- ffffce81`66ed2668 fffff80a`e2409678 : fffff80a`e241fb98 ffffbc86`276b4100 ffffce01`66020003 ffffbc86`272a67d0 : 0xffffbc86`27c50930
- ffffce81`66ed2670 fffff80a`e241fb98 : ffffbc86`276b4100 ffffce01`66020003 ffffbc86`272a67d0 00000000`57d50017 : acsock64+0x9678
- ffffce81`66ed2678 ffffbc86`276b4100 : ffffce01`66020003 ffffbc86`272a67d0 00000000`57d50017 00000000`00000000 : acsock64+0x1fb98
- ffffce81`66ed2680 ffffce01`66020003 : ffffbc86`272a67d0 00000000`57d50017 00000000`00000000 00000000`00000000 : 0xffffbc86`276b4100
- ffffce81`66ed2688 ffffbc86`272a67d0 : 00000000`57d50017 00000000`00000000 00000000`00000000 ffffbc86`00000000 : 0xffffce01`66020003
- ffffce81`66ed2690 00000000`57d50017 : 00000000`00000000 00000000`00000000 ffffbc86`00000000 00000000`000200ff : 0xffffbc86`272a67d0
- ffffce81`66ed2698 00000000`00000000 : 00000000`00000000 ffffbc86`00000000 00000000`000200ff ffffbc86`27c50930 : 0x57d50017
- STACK_COMMAND: kb
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
- BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
- Followup: memory_corruption
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement