Hi,
Your dump have error code :
0x3b = indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
0x7E = usually cause by drivers.
Start with removing avast and replace it with MSE , because I see avast driver involved in the crash.
Code:
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88002abf2a3, fffff88006772a98, fffff88006772300}
Probably caused by : aswMonFlt.sys ( aswMonFlt+52a3 )
Perform system file checker because your windows services crashed or stopped in an unsupported way.
--> command prompt(as admin) -> sfc /scannow
Update these drivers :
Log
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002ac56e0, fffff8800a3ecec0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ac56e0, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800a3ecec0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt!ObfReferenceObject+20
fffff800`02ac56e0 f0480fc11f lock xadd qword ptr [rdi],rbx
CONTEXT: fffff8800a3ecec0 -- (.cxr 0xfffff8800a3ecec0)
rax=fffff8a006930ad0 rbx=0000000000000001 rcx=0080000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=007fffffffffffd0
rip=fffff80002ac56e0 rsp=fffff8800a3ed890 rbp=fffff8800a3ed998
r8=0000000000000000 r9=0080000000000000 r10=0000000000000005
r11=0000000000000011 r12=fffff8a006930ad0 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ObfReferenceObject+0x20:
fffff800`02ac56e0 f0480fc11f lock xadd qword ptr [rdi],rbx ds:002b:007fffff`ffffffd0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: TrustedInstall
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002ac56e0
STACK_TEXT:
fffff880`0a3ec5f8 fffff800`02ab8ca9 : 00000000`0000003b 00000000`c0000005 fffff800`02ac56e0 fffff880`0a3ecec0 : nt!KeBugCheckEx
fffff880`0a3ec600 fffff800`02ab85fc : fffff880`0a3ed658 fffff880`0a3ecec0 00000000`00000000 fffff800`02ae7c90 : nt!KiBugCheckDispatch+0x69
fffff880`0a3ec740 fffff800`02adf40d : fffff800`02cd993c 00000000`00000000 fffff800`02a49000 fffff880`0a3ed658 : nt!KiSystemServiceHandler+0x7c
fffff880`0a3ec780 fffff800`02ae6a90 : fffff800`02c091a0 fffff880`0a3ec7f8 fffff880`0a3ed658 fffff800`02a49000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0a3ec7b0 fffff800`02af39ef : fffff880`0a3ed658 fffff880`0a3ecec0 fffff880`00000000 007fffff`ffffffd0 : nt!RtlDispatchException+0x410
fffff880`0a3ece90 fffff800`02ab8d82 : fffff880`0a3ed658 00000000`00000001 fffff880`0a3ed700 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`0a3ed520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`02ab85fc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner