[B]KERNEL_DATA_INPAGE_ERROR (7a)[/B]
The requested page of kernel data could not be read in.
Typically caused by a bad block in the paging file or disk controller error.
[COLOR=#ff0000]Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.[/COLOR]
Arguments:
Arg1: ffffc001f5dd0e68, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, [COLOR=#ff0000]error status {Bad CRC} [/COLOR] [COLOR=#ff0000]A cyclic redundancy check (CRC) checksum error occurred.[/COLOR]
Arg3: 00000002042fc880, current process (virtual address for lock type 3, or PTE)
Arg4: fffff800ce1dd000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
5: kd> kvChild-SP RetAddr : Args to Child : Call Site
ffffd000`27285fe8 fffff803`4b77d9db : 00000000`0000007a ffffc001`f5dd0e68 ffffffff`c000003f 00000002`042fc880 : nt!KeBugCheckEx
ffffd000`27285ff0 fffff803`4b66a9e0 : 00000000`00000002 ffffd000`27286158 fffff803`4b95fec0 ffffd000`00000000 : nt! ?? ::FNODOBFM::`string'+0x1881b
ffffd000`272860e0 fffff803`4b65768a : fffff803`4b95fec0 ffffe001`79470080 00000000`00000001 00000000`00000000 : nt!MiIssueHardFault+0x184
ffffd000`272861a0 fffff803`4b75ef2f : 00000000`00000001 00000000`00000000 fffff6fc`00670e00 ffffe001`8dfaa708 : nt!MmAccessFault+0x5ba
[COLOR=#0000cd]ffffd000`27286360 fffff803`4b761880 : fffff803`4b99f7a2 ffffc001`000000bd ffffc001`f5dd0e60 ffffc001`f5de2000 : nt!KiPageFault+0x12f (TrapFrame @ ffffd000`27286360)[/COLOR]
ffffd000`272864f8 fffff803`4b99f7a2 : ffffc001`000000bd ffffc001`f5dd0e60 ffffc001`f5de2000 00000000`00000000 : nt!memset+0xc0
ffffd000`27286500 fffff803`4b9a9a97 : ffffc001`fb1a6000 00000000`00000000 ffffe001`79eac150 00000000`00001dcc : nt!MiUpdateCfgSystemWideBitmap+0x152
ffffd000`27286590 fffff803`4b9a8a1c : 00000000`77300000 00000000`00000204 ffffd000`272866f0 ffffe001`79eac150 : nt!MiRelocateImageAgain+0xe3
ffffd000`272865f0 fffff803`4b9a7f88 : ffffd000`27286840 00000000`00000000 ffffe001`00000204 ffffd000`27286838 : nt!MiCreateSection+0x2ec
ffffd000`272867e0 fffff800`c8e81f85 : 00000000`00000000 ffffd000`27286978 00000000`00000000 ffffd000`27286980 : nt!NtCreateSection+0x19c
[COLOR=#ff0000]ffffd000`27286870 00000000`00000000 : ffffd000`27286978 00000000`00000000 ffffd000`27286980 ffffd000`00000010 : aswSnx+0x27f85[/COLOR]
5: kd> .trap ffffd000`27286360
[COLOR=#0000cd]NOTE: The trap frame does not contain all registers.[/COLOR]
[COLOR=#0000cd]Some register values may be zeroed or incorrect.[/COLOR]
rax=fffff800ce1dc000 rbx=0000000000000000 rcx=fffff800ce1dd000
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034b761880 rsp=ffffd000272864f8 rbp=0000000000025c00
r8=0000000000004b80 r9=0000000000000000 r10=00000000000000ee
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!memset+0xc0:
fffff803`4b761880 488911 [COLOR=#ff0000]mov qword ptr [rcx],rdx ds:fffff800`ce1dd000=????????????????[/COLOR]
5: kd> lmvm aswSnx
start end module name
fffff800`c8e5a000 fffff800`c8f5e000 aswSnx T (no symbols)
Loaded symbol image file: aswSnx.sys
Image path: aswSnx.sys
[COLOR=#ff0000]Image name: aswSnx.sys[/COLOR] [COLOR=#008000]// Avast antivirus[/COLOR]
Timestamp: Fri Mar 20 12:44:43 2015 (550C082B)
CheckSum: 00103692
ImageSize: 00104000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4