So my PC locked up after I went to close a chrome window, for about 5 seconds, then did a restart. I checked the EventViewer and the most recent critical error was:
The computer has rebooted from a bugcheck. The bugcheck was: 0x0000001a (0x0000000000041792, 0xfffff73ffe007e58, 0x0000000800000000, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 19ec9136-3db4-4f4c-9da9-4bfac5cc3629.
So I ran Windbg to check the dump file and this is what I found:
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff73ffe007e58
Arg3: 0000000800000000
Arg4: 0000000000000000
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1890
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1934
Key : Analysis.Init.CPU.mSec
Value: 578
Key : Analysis.Init.Elapsed.mSec
Value: 25513
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : MemoryManagement.PFN
Value: 800000
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff73ffe007e58
BUGCHECK_P3: 800000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffe885eb38ecb8 fffff806
1ce440ca : 000000000000001a 00000000
00041792 fffff73ffe007e58 00000008
00000000 : nt!KeBugCheckEx
ffffe885eb38ecc0 fffff806
1ce9e5d6 : 0000000000000000 00000000
00000000 0000000000002126 fffff73f
fe007e58 : nt!MiDeleteVa+0x153a
ffffe885eb38edc0 fffff806
1ce9e6eb : fffff77b00000000 ffffd583
9a69c700 ffffe88500000000 ffffe885
eb38f230 : nt!MiWalkPageTablesRecursively+0x776
ffffe885eb38ee60 fffff806
1ce9e6eb : fffff77b00000000 ffffd583
9a69c700 ffffe88500000001 ffffe885
eb38f240 : nt!MiWalkPageTablesRecursively+0x88b
ffffe885eb38ef00 fffff806
1ce9e6eb : fffff77bbdcff000 ffffd583
9a69c700 ffffe88500000002 ffffe885
eb38f250 : nt!MiWalkPageTablesRecursively+0x88b
ffffe885eb38efa0 fffff806
1ce04f4b : 00000000000000c0 ffffd583
9a69c700 0000000000000003 ffffe885
eb38f260 : nt!MiWalkPageTablesRecursively+0x88b
ffffe885eb38f040 fffff806
1ce42961 : ffffe885eb38f1e0 ffffd583
00000000 0000020000000002 00000000
00000000 : nt!MiWalkPageTables+0x36b
ffffe885eb38f140 fffff806
1ce12aa0 : 0000000000000001 ffffe885
00000000 ffffd5839a69c550 ffffd583
a13dd080 : nt!MiDeletePagablePteRange+0x4f1
ffffe885eb38f450 fffff806
1d201dd9 : ffffd5839ce60bf0 00000000
00000000 ffffd58300000000 ffffd583
00000000 : nt!MiDeleteVad+0x360
ffffe885eb38f560 fffff806
1d201470 : ffffd5839ce60bf0 ffffd583
891c45e0 ffffd583a13dd080 00000000
00000000 : nt!MiUnmapVad+0x49
ffffe885eb38f590 fffff806
1d1ff73f : ffffd5839ce5e170 ffffd583
9ce5e170 ffffd5839ce60bf0 ffffd583
9a69c080 : nt!MiCleanVad+0x30
ffffe885eb38f5c0 fffff806
1d25dbf8 : ffffffff00000000 ffffffff
ffffffff 0000000000000001 ffffd583
9a69c080 : nt!MmCleanProcessAddressSpace+0x137
ffffe885eb38f640 fffff806
1d2b26b6 : ffffd5839a69c080 ffffc50b
bc84c060 ffffe885eb38f890 00000000
00000000 : nt!PspRundownSingleProcess+0x20c
ffffe885eb38f6d0 fffff806
1d2f73f8 : 0000000000000000 ffffd583
9a69c001 0000000000000001 000000ab
c6f0d000 : nt!PspExitThread+0x5f6
ffffe885eb38f7d0 fffff806
1ce0ef67 : 0000000000000000 fffff806
1ce0cb27 0000000000000000 00000000
00000000 : nt!KiSchedulerApcTerminate+0x38
ffffe885eb38f810 fffff806
1cffbbc0 : 0000000000000000 ffffe885
eb38f8c0 ffffd58300000003 00000000
00000000 : nt!KiDeliverApc+0x487
ffffe885eb38f8c0 fffff806
1d00905f : ffffd583a13dd080 00000000
00000000 0000000000000000 ffffd583
00000000 : nt!KiInitiateUserApc+0x70
ffffe885eb38fa00 00007ffc
83730764 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceExit+0x9f
000000abcefff498 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ffc`83730764
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
My PC is only 3 months old, there shouldn't be any corrupted hardware I would imagine, but I don't know how to read these dump files. What do you think I should do? This isn't the first unexpected freeze and crash I've had. If it is memory, I have 2 sticks, how do I know which one to replace? This is a RAM error, right?
Note: I did run MemTest, getting over 10000% coverage on the RAM, and zero errors were found.
Requested log files: https://drive.google.com/file/d/1iO5WnWQzi98IgVv7GekDjF5WQ_LKNU_j/view?usp=sharing