Something amiss there as the two latest dumps are from 2014 and the OS concerned is Vista SP2;
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18881.amd64fre.vistasp2_gdr.130707-1535
Machine Name:
Kernel base = 0xfffff800`0344d000 PsLoadedModuleList = 0xfffff800`03611e30
Debug session time: Fri Sep 5 03:27:38.884 2014 (UTC - 4:00)
System Uptime: 8 days 0:05:59.194
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8003340b90
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 1
LAST_CONTROL_TRANSFER: from fffff8000345cbd8 to fffff800034a4150
STACK_TEXT:
fffffa60`0bd90868 fffff800`0345cbd8 : 00000000`0000001a 00000000`00041790 fffffa80`03340b90 00000000`0000ffff : nt!KeBugCheckEx
fffffa60`0bd90870 fffff800`034cdb62 : 00000000`00000011 00000000`5440dfff fffffa80`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x1c4fe
fffffa60`0bd90a00 fffff800`03722bde : 00000000`53ac0000 0007ffff`00000000 00000000`00000000 fffffa80`05f18110 : nt!MiRemoveMappedView+0xd2
fffffa60`0bd90b20 fffff800`03729d6f : 00000000`00000000 00000000`53ac0000 fffffa80`00000001 fffffa80`0760e5b0 : nt!MiUnmapViewOfSection+0x18e
fffffa60`0bd90be0 fffff800`034a3bf3 : fffffa80`120e0bb0 fffffa60`0bd90ca0 fffffa80`05f18110 00000000`00000000 : nt!NtUnmapViewOfSection+0x57
fffffa60`0bd90c20 00000000`771b711a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02b6e848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771b711a
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.