*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: ffffac038d2f82a3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80055aae36e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2484
Key : Analysis.Elapsed.mSec
Value: 8712
Key : Analysis.IO.Other.Mb
Value: 15
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 23
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 19567
Key : Analysis.Memory.CommitPeak.Mb
Value: 147
Key : Bugcheck.Code.LegacyAPI
Value: 0xc5
Key : Failure.Bucket
Value: 0xC5_2_vgk!unknown_function
Key : Failure.Hash
Value: {f440937e-e808-2f2e-10ad-7db228ddf2cc}
Key : WER.OS.Branch
Value: ni_release_svc_prod3
Key : WER.OS.Version
Value: 10.0.22621.1928
BUGCHECK_CODE: c5
BUGCHECK_P1: ffffac038d2f82a3
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80055aae36e
FILE_IN_CAB: 071723-10718-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: fffff30118f46e30 -- (.trap 0xfffff30118f46e30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac0371200000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80055aae36e rsp=fffff30118f46fc0 rbp=0000000000000000
r8=ffff998fecebb530 r9=0000000000000001 r10=ffff998ff63c3628
r11=fffff30118f47048 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreePoolWithTag+0x7e:
fffff800`55aae36e f647f308 test byte ptr [rdi-0Dh],8 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
fffff301`18f46ce8 fffff800`554442a9 : 00000000`0000000a ffffac03`8d2f82a3 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff301`18f46cf0 fffff800`5543f934 : 00000000`00000130 00000000`000000b0 00000000`00000160 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff301`18f46e30 fffff800`55aae36e : 01000000`00100000 fffff800`71690998 00000000`00800000 fffff800`56048000 : nt!KiPageFault+0x474
fffff301`18f46fc0 fffff800`717b6624 : fffff800`00000000 fffff800`716bf060 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x7e
fffff301`18f47050 fffff800`00000000 : fffff800`716bf060 00000000`00000000 00000000`00000000 00000000`00000001 : vgk+0x176624
fffff301`18f47058 fffff800`716bf060 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000008 : 0xfffff800`00000000
fffff301`18f47060 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00000008 00000000`00000001 : vgk+0x7f060
SYMBOL_NAME: vgk+176624
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 176624
FAILURE_BUCKET_ID: 0xC5_2_vgk!unknown_function
OS_VERSION: 10.0.22621.1928
BUILDLAB_STR: ni_release_svc_prod3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f440937e-e808-2f2e-10ad-7db228ddf2cc}
Followup: MachineOwner
---------