O Kernel está bem. O último driver que é chamado antes de travar suas viúvas é o netr28x.sys, que é o Ralink 802.11 Wireless Adapter Driver . Mas isso não significa necessariamente que esse driver causou a corrupção.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800033bdb05, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+249
fffff800'033bdb05 4c395808 cmp qword ptr [rax+8],r11
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
nt!KeBugCheckEx
nt!KiBugCheckDispatch
nt!KiPageFault
nt!ExDeferredFreePool
nt!ExFreePoolWithTag
ndis!NdisFreeMemory
netr28x!PostBBPInitialization
0x0
0x0
0x0
0x0
Loaded symbol image file: netr28x.sys
Image path: netr28x.sys
Image name: netr28x.sys
Timestamp: Wed Aug 11 05:39:23 2010
Atualize o driver para a versão mais recente e, se isso não resolver, ative verificador de driver e faça o upload dos novos arquivos dmp.
A última falha é causada por um driver chamado networx.sys:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
nt!KeBugCheckEx
nt!KiBugCheckDispatch
nt!KiPageFault
nt!KeReleaseInStackQueuedSpinLockFromDpcLevel
tcpip! ?? ::FNODOBFM::'string'
tcpip!UdpTlProviderSendMessagesCalloutRoutine
nt!KeExpandKernelStackAndCalloutEx
tcpip!UdpTlProviderSendMessages
tdx!TdxSendDatagramTransportAddress
tdx!TdxTdiDispatchInternalDeviceControl
networx
0x0
0x0
0x0
nt!KiInitialPCR
0x0
0x0
0x0
networx
0x0
0x0
Image path: \SystemRoot\system32\drivers\networx.sys
Image name: networx.sys
Timestamp: Tue Nov 19 18:06:31 2013