Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-27534-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`03056000 PsLoadedModuleList = 0xfffff800`0328aeb0
Debug session time: Sat Apr 16 19:05:45.977 2011 (UTC - 4:00)
System Uptime: 0 days 0:10:50.678
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031f1f8c, fffff88005442fd0, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
Followup: Pool_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031f1f8c, Address of the instruction which caused the bugcheck
Arg3: fffff88005442fd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+100
fffff800`031f1f8c 4c8b02 mov r8,qword ptr [rdx]
CONTEXT: fffff88005442fd0 -- (.cxr 0xfffff88005442fd0)
rax=fffff8a00cc6e000 rbx=0000000000000000 rcx=fffff8a00cc62b70
rdx=3940934e1b9c2500 rsi=fffff8a00cc6e000 rdi=fffff8a00cc24010
rip=fffff800031f1f8c rsp=fffff880054439a0 rbp=000000000000001d
r8=3940934e1b9c2500 r9=0000000000000000 r10=fffff8a00cc1cb70
r11=0000000000000000 r12=fffffa8003ddf280 r13=0000000000000000
r14=000000000000001d r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExDeferredFreePool+0x100:
fffff800`031f1f8c 4c8b02 mov r8,qword ptr [rdx] ds:002b:3940934e`1b9c2500=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031f1f8c
STACK_TEXT:
fffff880`054439a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x100
FOLLOWUP_IP:
nt!ExDeferredFreePool+100
fffff800`031f1f8c 4c8b02 mov r8,qword ptr [rdx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+100
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88005442fd0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+100
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+100
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-30420-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`03019000 PsLoadedModuleList = 0xfffff800`0324deb0
Debug session time: Mon Apr 18 03:26:47.940 2011 (UTC - 4:00)
System Uptime: 0 days 0:34:53.642
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa802bd80008, 2, 1, fffff80003140607}
Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802bd80008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003140607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b80e0
fffffa802bd80008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03140607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: services.exe
TRAP_FRAME: fffff8800a18e420 -- (.trap 0xfffff8800a18e420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800bd80010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003140607 rsp=fffff8800a18e5b0 rbp=00000000ffffffff
r8=fffff8800a18e5e0 r9=fffffa800b099b30 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x87:
fffff800`03140607 480fb328 btr qword ptr [rax],rbp ds:fca0:fffffa80`0bd80010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000307eae9 to fffff8000307f580
STACK_TEXT:
fffff880`0a18e2d8 fffff800`0307eae9 : 00000000`0000000a fffffa80`2bd80008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a18e2e0 fffff800`0307d760 : 00000000`00000001 fffffa80`2bd80008 fffff8a0`14b01c00 fffffa80`0c53b780 : nt!KiBugCheckDispatch+0x69
fffff880`0a18e420 fffff800`03140607 : fffff8a0`14b01c80 fffffa80`0c53b780 fffffa80`0bac9d80 fffff8a0`14b01cb8 : nt!KiPageFault+0x260
fffff880`0a18e5b0 fffff800`030fb1d8 : ffffffff`00000080 01000000`0000000c 00000000`000000c0 00000000`03000000 : nt!MiReleaseConfirmedPageFileSpace+0x87
fffff880`0a18e630 fffff800`030c8254 : 00000000`00000000 00000000`0307ffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2a628
fffff880`0a18e7f0 fffff800`0307e7d3 : ffffffff`ffffffff fffffa80`0c53b780 00000000`00000000 00000000`00008000 : nt!NtFreeVirtualMemory+0x9d4
fffff880`0a18e900 fffff800`0307ad70 : fffff800`0330f0cf fffffa80`0b099b30 fffffa80`0c53b780 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0a18ea98 fffff800`0330f0cf : fffffa80`0b099b30 fffffa80`0c53b780 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`0a18eaa0 fffff800`03364022 : 00000000`03000000 00000000`00000000 00000000`00000000 fffffa80`0ba23e60 : nt!RtlFreeUserStack+0x27
fffff880`0a18ead0 fffff800`03367ae1 : 00000000`00000000 00000000`00000000 000007ff`fffa0000 00000000`00000000 : nt!PspExitThread+0x7ae
fffff880`0a18eb90 fffff800`03367da9 : fffffa80`0c53b780 00000000`00000000 fffffa80`0c53b780 000007ff`fffdf000 : nt!PspTerminateThreadByPointer+0x4d
fffff880`0a18ebe0 fffff800`0307e7d3 : fffffa80`0c53b780 fffff880`0a18eca0 00000000`77225270 00000000`0199f301 : nt!NtTerminateThread+0x45
fffff880`0a18ec20 00000000`7716fbea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0307f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7716fbea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03140607 480fb328 btr qword ptr [rax],rbp
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-25786-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`03293eb0
Debug session time: Sat Apr 16 19:13:06.376 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:38.702
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa802b280008, 2, 1, fffff80003186607}
Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802b280008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003186607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fe0e0
fffffa802b280008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from fffff800030c4ae9 to fffff800030c5580
STACK_TEXT:
fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802b280008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003186607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffa802b280008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from fffff800030c4ae9 to fffff800030c5580
STACK_TEXT:
fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802b280008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003186607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffa802b280008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from fffff800030c4ae9 to fffff800030c5580
STACK_TEXT:
fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-38142-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`0301b000 PsLoadedModuleList = 0xfffff800`0324feb0
Debug session time: Mon Apr 18 02:35:08.116 2011 (UTC - 4:00)
System Uptime: 1 days 3:50:06.890
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031b70bf, fffff8800d727dd0, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+233 )
Followup: Pool_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031b70bf, Address of the instruction which caused the bugcheck
Arg3: fffff8800d727dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+233
fffff800`031b70bf 4c395008 cmp qword ptr [rax+8],r10
CONTEXT: fffff8800d727dd0 -- (.cxr 0xfffff8800d727dd0)
rax=0000000000000000 rbx=0000000000000042 rcx=fffff88003f990f0
rdx=fffff900c35b6000 rsi=0000000000000000 rdi=fffff900c07f8db0
rip=fffff800031b70bf rsp=fffff8800d7287a0 rbp=0000000000000000
r8=2680914e1b9c2500 r9=fffff900c35b62c0 r10=fffff900c35b62d0
r11=0000000000000001 r12=fffff88003f98cc0 r13=0000000000000000
r14=000000000000001c r15=0000000000000001
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!ExDeferredFreePool+0x233:
fffff800`031b70bf 4c395008 cmp qword ptr [rax+8],r10 ds:002b:00000000`00000008=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: pidgin.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031b70bf
STACK_TEXT:
fffff880`0d7287a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x233
FOLLOWUP_IP:
nt!ExDeferredFreePool+233
fffff800`031b70bf 4c395008 cmp qword ptr [rax+8],r10
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+233
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff8800d727dd0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+233
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+233
Followup: Pool_corruption
---------