I am not sure why this happen today…
It is fresh install of Windows 7, I have installed 5.0.377 program version…
I did have Avast screen saver running when this happened. I stopped and will see if it happens again…
In the mean time here is dump file from debug manager
WARNING: Whitespace at end of path element
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\012610-27781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: .sympath srvc:\symbolshttp://msdl.microsoft.com/download/symbols ;srvc:\symbolshttp://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff80002812000 PsLoadedModuleList = 0xfffff800
02a4fe50
Debug session time: Tue Jan 26 20:51:31.617 2010 (GMT+8)
System Uptime: 0 days 5:25:17.351
Loading Kernel Symbols
…
…
…
Loading User Symbols
Loading unloaded module list
…
-
*
-
Bugcheck Analysis *
-
*
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa800914feea, 0, fffff88003ed4dd1, 0}
Unable to load image \SystemRoot\System32\Drivers\aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
Could not read faulting driver name
Probably caused by : aswSP.SYS ( aswSP+5dd1 )
Followup: MachineOwner
0: kd> !analyze -v
-
*
-
Bugcheck Analysis *
-
*
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800914feea, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88003ed4dd1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aba0e0
fffffa800914feea
FAULTING_IP:
aswSP+5dd1
fffff880`03ed4dd1 f30f6f0401 movdqu xmm0,xmmword ptr [rcx+rax]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: avastSS.scr
CURRENT_IRQL: 0
TRAP_FRAME: fffff88007782220 – (.trap 0xfffff88007782220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800914e4e0 rbx=0000000000000000 rcx=0000000000001a02
rdx=fffff88003ee69ba rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003ed4dd1 rsp=fffff880077823b0 rbp=fffffa8004886701
r8=fffff8a00a847a6a r9=0000000000000041 r10=fffff800029fe660
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
aswSP+0x5dd1:
fffff88003ed4dd1 f30f6f0401 movdqu xmm0,xmmword ptr [rcx+rax] ds:6510:fffffa80
0914fee2=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800029031e4 to fffff80002883f00
STACK_TEXT:
fffff880077820b8 fffff800
029031e4 : 0000000000000050 fffffa80
0914feea 0000000000000000 fffff880
07782220 : nt!KeBugCheckEx
fffff880077820c0 fffff800
02881fee : 0000000000000000 00000000
00000000 fffff8a007c19700 fffff880
0102547e : nt! ?? ::FNODOBFM::string'+0x42907 fffff880
07782220 fffff88003ed4dd1 : 00000000
00000000 0000000000000044 00000000
00000039 fffff88003ed8222 : nt!KiPageFault+0x16e fffff880
077823b0 0000000000000000 : 00000000
00000044 0000000000000039 fffff880
03ed8222 fffff8a0`0a847901 : aswSP+0x5dd1
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+5dd1
fffff880`03ed4dd1 f30f6f0401 movdqu xmm0,xmmword ptr [rcx+rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswSP+5dd1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4b55b01b
FAILURE_BUCKET_ID: X64_0x50_aswSP+5dd1
BUCKET_ID: X64_0x50_aswSP+5dd1
Followup: MachineOwner