*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {e, ffffd000a59b12b0, fffff8003594ab84, ff648856b516b281}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+dac )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Debugging Details:
------------------
BUGCHECK_STR: 0x19_e
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: [COLOR=#ff0000]chrome.exe[/COLOR]
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) x86fre
LAST_CONTROL_TRANSFER: from fffff8024a4ae61c to fffff8024a35d3a0
STACK_TEXT:
ffffd000`ba44d1a8 fffff802`4a4ae61c : 00000000`00000019 00000000`0000000e ffffd000`a59b12b0 fffff800`3594ab84 : nt!KeBugCheckEx
ffffd000`ba44d1b0 fffff800`3582e10d : ffffffff`ffffffff ffffc000`6fd5f7a0 ac08e933`d11c00c7 ffffffff`ffffffff : nt!ExDeferredFreePool+0xdac
ffffd000`ba44d280 fffff800`3677c732 : ffffc000`736cdd20 00000000`0000000f 00000000`0000000f ffffe001`469291c0 : [COLOR=#ff0000]tcpip![/COLOR]UdpTlProviderEndpoint+0xed
ffffd000`ba44d330 fffff800`3678b74b : 00000000`00000000 ffffe001`41b17010 ffffe001`46a13010 00000000`00000000 : [COLOR=#ff0000]afd![/COLOR]AfdCreate+0x5712
ffffd000`ba44d480 fffff802`4a5fa641 : 00000000`00000005 ffffd000`ba44d7e1 00000000`00000000 00000000`00000000 : afd!AfdDispatch+0x8b
ffffd000`ba44d4e0 fffff802`4a6b0114 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe001`4235b030 : nt!IopParseDevice+0x6c1
ffffd000`ba44d700 fffff802`4a607203 : 00000000`00000000 ffffd000`ba44d8a8 00000000`00000042 ffffe001`40900b00 : nt!ObpLookupObjectName+0x784
ffffd000`ba44d830 fffff802`4a66e95b : 000100e0`00000001 ffffe001`41721ba8 00000000`00000001 00000000`00000020 : nt!ObOpenObjectByName+0x1e3
ffffd000`ba44d960 fffff802`4a66e5e8 : 0000005e`0cfbe3e0 ffffd000`c0140000 0000005e`0cfbe410 ffffe001`416998c0 : nt!IopCreateFile+0x36b
ffffd000`ba44da00 fffff802`4a368bb3 : 00000000`00000102 ffffd000`ba44dad8 00000000`00000000 0000005e`00000001 : nt!NtCreateFile+0x78
ffffd000`ba44da90 00007ff8`ed660c0a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000005e`0cfbe308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ed660c0a