Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa80083b3f80, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+35054 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80083b3f80
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: dllhost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ef9b50 to fffff80002e8dfc0
STACK_TEXT:
fffff880`0a1a96e8 fffff800`02ef9b50 : 00000000`0000001a 00000000`00041790 fffffa80`083b3f80 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0a1a96f0 fffff800`02ec0b69 : 00000000`00000000 00000000`764fffff fffffa80`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x35054
fffff880`0a1a98b0 fffff800`031a0e21 : fffffa80`12b7dcb0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0a1a99d0 fffff800`031a1223 : 0000007f`00000000 00000000`763f0000 fffffa80`00000001 fffffa80`1017a010 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0a1a9a90 fffff800`02e8d253 : 00000000`00000000 00000000`764b2698 fffffa80`1278a0e0 00000000`764b12d4 : nt!NtUnmapViewOfSection+0x5f
fffff880`0a1a9ae0 00000000`770c15ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001ae328 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770c15ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+35054
fffff800`02ef9b50 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35054
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 503f82be
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35054
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+35054
Followup: MachineOwner
---------