Ok it did it again today this time a new message. I figured out how to use windbg and got this information. Not sure how to read it though.
Pfn_list_corrupt this go around
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 00023db5, page frame number
Arg3: 00000006, current page state
Arg4: 00000000, 0
Debugging Details:
------------------
PEB is paged out (Peb.Ldr = 7ffdc00c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffdc00c). Type ".hh dbgerr001" for details
BUGCHECK_STR: 0x4E_99
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: avgcmgr.exe
LAST_CONTROL_TRANSFER: from 80520b7c to 805339ae
STACK_TEXT:
f3beb9c8 80520b7c 0000004e 00000099 00023db5 nt!KeBugCheckEx+0x1b
f3beba0c 804f71d0 e1486dc0 01000000 00000001 nt!MmPurgeSection+0x4cd
f3beba3c 80519f86 86ecbacc 00000000 00000000 nt!CcPurgeCacheSection+0xd4
f3beba74 80573f67 0000704f f3bebaec f3bebb80 nt!CcZeroEndOfLastPage+0xdb
f3bebac8 804df06b f3bebbbc 0000000d f3bebb8c nt!NtCreateSection+0x14c
f3bebac8 804dd0d6 f3bebbbc 0000000d f3bebb8c nt!KiFastCallEntry+0xf8
f3bebb5c 8058edc8 f3bebbbc 0000000d f3bebb8c nt!ZwCreateSection+0x11
f3bebbb4 8058f392 f3bebbdc 00000081 f3bebc14 nt!CcPfGetSectionObject+0xca
f3bebc48 8058e971 f3bebc70 00000000 00000000 nt!CcPfPrefetchSections+0x2b7
f3bebc88 8058e7ed e2faa000 00080000 866e2020 nt!CcPfPrefetchScenario+0x7b
f3bebd04 80589368 866e2020 e1959958 00000000 nt!CcPfBeginAppLaunch+0x158
f3bebd50 804fa477 00000000 7c810867 00000001 nt!PspUserThreadStartup+0xeb
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmPurgeSection+4cd
80520b7c 008b431c33c9 add byte ptr [ebx-36CCE3BDh],cl
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmPurgeSection+4cd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 41108004
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MmPurgeSection+4cd
BUCKET_ID: 0x4E_99_nt!MmPurgeSection+4cd
Followup: MachineOwner
---------