Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [\\CECLCSRV08\Users\administrator\Desktop\WER3470.tmp\Mini011211-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

WARNING: Whitespace at end of path element
Symbol search path is: SRV*c:\Symbols*http://msdl.microsoft.com/download/symbols 
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: LanManNt, suite: TerminalServer SingleUserTS
Built by: 6002.18267.x86fre.vistasp2_gdr.100608-0458
Machine Name:
Kernel base = 0x81811000 PsLoadedModuleList = 0x81928c70
Debug session time: Wed Jan 12 10:51:09.372 2011 (UTC - 8:00)
System Uptime: 0 days 22:19:33.090
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C5, {29d0044, 2, 1, 818ff8b3}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+29c )

Followup: Pool_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is
caused by drivers that have corrupted the system pool.  Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 029d0044, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 818ff8b3, address which referenced memory

Debugging Details:
------------------


USER_LCID_STR:  ENU

OS_SKU:  7

BUGCHECK_STR:  0xC5_2

CURRENT_IRQL:  2

FAULTING_IP: 
nt!ExDeferredFreePool+29c
818ff8b3 894604          mov     dword ptr [esi+4],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

PROCESS_NAME:  System

TRAP_FRAME:  9eb38bd4 -- (.trap 0xffffffff9eb38bd4)
ErrCode = 00000002
eax=85e13ba0 ebx=00000000 ecx=000001ff edx=8191370c esi=029d0040 edi=819136e0
eip=818ff8b3 esp=9eb38c48 ebp=9eb38c80 iopl=0         nv up ei ng nz ac pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010296
nt!ExDeferredFreePool+0x29c:
818ff8b3 894604          mov     dword ptr [esi+4],eax ds:0023:029d0044=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 818ff8b3 to 8185efd9

STACK_TEXT:  
9eb38bd4 818ff8b3 badb0d00 8191370c c042f160 nt!KiTrap0E+0x2e1
9eb38c80 818fe858 819136e0 00000000 85dca008 nt!ExDeferredFreePool+0x29c
9eb38ce8 819b16b4 85dd6788 00000000 00000000 nt!ExFreePoolWithTag+0x852
9eb38d10 819b156f 00000000 85dca008 00000000 nt!EtwpFreeTraceBufferPool+0xc9
9eb38d3c 81a3db13 0000003c 00000000 85dc6238 nt!EtwpFreeLoggerContext+0xb5
9eb38d7c 819e6c42 85dca008 e8b880ea 00000000 nt!EtwpLogger+0x35a
9eb38dc0 8184ff4e 81a3d7b9 85dca008 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+29c
818ff8b3 894604          mov     dword ptr [esi+4],eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+29c

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  0xC5_2_nt!ExDeferredFreePool+29c

BUCKET_ID:  0xC5_2_nt!ExDeferredFreePool+29c

Followup: Pool_corruption
---------

