Your old Avast Antivirus is the cause, please remove it and use MSE instead
Upgrade to the newest version of Avast if you don't want to use MSE
Code:
aswFsBlk.SYS fffff880`03bb1000 fffff880`03bba000 0x00009000 0x4c86506d 07/09/2010 18:47:09
aswFW.SYS fffff880`04187000 fffff880`041a9000 0x00022000 0x4c86521c 07/09/2010 18:54:20
aswMonFlt.sys fffff880`03b77000 fffff880`03bb1000 0x0003a000 0x4c865084 07/09/2010 18:47:32
aswNdis.sys fffff880`017e5000 fffff880`017ec000 0x00007000 0x4b48f37b 10/01/2010 01:22:03
aswNdis2.sys fffff880`01660000 fffff880`016a1000 0x00041000 0x4c8651f3 07/09/2010 18:53:39
aswRdr.SYS fffff880`04350000 fffff880`0435a000 0x0000a000 0x4c865093 07/09/2010 18:47:47
aswSnx.SYS fffff880`0405b000 fffff880`040d2000 0x00077000 0x4c865210 07/09/2010 18:54:08
aswSP.SYS fffff880`04512000 fffff880`04535000 0x00023000 0x4c865197 07/09/2010 18:52:07
aswTdi.SYS fffff880`041a9000 fffff880`041b9000 0x00010000 0x4c8651ab 07/09/2010 18:52:27
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88003bec7e9, 8, fffff88003bac7e9, 0}
Unable to load image \??\C:\Windows\system32\drivers\aswMonFlt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswMonFlt.sys
*** ERROR: Module load completed but symbols could not be loaded for aswMonFlt.sys
Could not read faulting driver name
Probably caused by : aswMonFlt.sys ( aswMonFlt+357e9 )
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88003bec7e9, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff88003bac7e9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb30e0
fffff88003bec7e9
FAULTING_IP:
aswMonFlt+357e9
fffff880`03bac7e9 483bfb cmp rdi,rbx
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: rundll32.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88009d1bc20 -- (.trap 0xfffff88009d1bc20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c0000225 rbx=0000000000000000 rcx=0000000000000010
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003bac7e9 rsp=fffff88009d1bdb0 rbp=0000000000000000
r8=fffffa80083b2c60 r9=fffff88009d1bdf8 r10=fffffa8005e80cc8
r11=fffff88009d1bd50 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
aswMonFlt+0x357e9:
fffff880`03bac7e9 483bfb cmp rdi,rbx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002afc024 to fffff80002a7b700
STACK_TEXT:
fffff880`09d1bab8 fffff800`02afc024 : 00000000`00000050 fffff880`03bec7e9 00000000`00000008 fffff880`09d1bc20 : nt!KeBugCheckEx
fffff880`09d1bac0 fffff800`02a797ee : 00000000`00000008 00000000`00000000 fffffa80`043dfc00 fffff800`02a7dd26 : nt! ?? ::FNODOBFM::`string'+0x427f7
fffff880`09d1bc20 fffff880`03bac7e9 : fffffa80`05e80cc0 00000000`00000000 fffff880`09d1bf18 fffff880`09d1bf18 : nt!KiPageFault+0x16e
fffff880`09d1bdb0 fffffa80`05e80cc0 : 00000000`00000000 fffff880`09d1bf18 fffff880`09d1bf18 fffffa80`043df930 : aswMonFlt+0x357e9
fffff880`09d1bdb8 00000000`00000000 : fffff880`09d1bf18 fffff880`09d1bf18 fffffa80`043df930 fffff800`02a8ab7c : 0xfffffa80`05e80cc0
STACK_COMMAND: kb
FOLLOWUP_IP:
aswMonFlt+357e9
fffff880`03bac7e9 483bfb cmp rdi,rbx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswMonFlt+357e9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswMonFlt
IMAGE_NAME: aswMonFlt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c865084
FAILURE_BUCKET_ID: X64_0x50_aswMonFlt+357e9
BUCKET_ID: X64_0x50_aswMonFlt+357e9
Followup: MachineOwner
---------