MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80022c5690
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800030b0300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13107
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 3662
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2022-07-07T18:53:00Z
Key : WER.OS.Version
Value: 7.1.7601.26022
FILE_IN_CAB: 041723-22370-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: fffffa80022c5690
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff880`0583c7a8 fffff800`02f676bd : 00000000`0000001a 00000000`00041790 fffffa80`022c5690 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0583c7b0 fffff800`02e43d0f : ffffffff`00000000 000000ce`ffffffff 00000000`00000000 00000000`00000200 : nt!MiDeleteVirtualAddresses+0x93d
fffff880`0583c920 fffff800`0323e584 : fffff8a0`090409d0 fffff880`0583cc20 fffff880`0583cc20 00000000`00000000 : nt!MmCleanProcessAddressSpace+0x3ff
fffff880`0583c970 fffff800`030d3e09 : fffffa80`80000003 00000000`80000001 000007ff`fffd3000 fffffa80`046deb50 : nt!PspExitThread+0x944
fffff880`0583ca30 fffff800`02e3d6c4 : 00000000`00000000 00000000`00000001 fffff880`02f686c0 fffff800`02e51aad : nt!PsExitSpecialApc+0x1d
fffff880`0583ca60 fffff800`02eab8e0 : 00000000`00007d00 fffff880`0583cae0 fffff800`031196a8 00000000`00000001 : nt!KiDeliverApc+0x2e4
fffff880`0583cae0 fffff800`02eb4ef7 : fffffa80`068dab50 00000000`00007d00 fffff880`0583cbf8 fffffa80`045a6a10 : nt!KiInitiateUserApc+0x70
fffff880`0583cc20 00000000`76f28d1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`05aff508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f28d1a
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+93d
MODULE_NAME: nt
IMAGE_VERSION: 6.1.7601.26022
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+93d
OS_VERSION: 7.1.7601.26022
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {c07e1216-fd41-b07c-d281-15399c0c2ddd}
Followup: MachineOwner
---------