Asus Data Security Manager Driver seems to be a problem. Please uninstall it for testing purpose. Also, check for an update of that software later.
Revo Uninstaller:
Use Revo Uninstaller to uninstall stubborn software.
MSINFO32:
- Please go to Start and type in "msinfo32.exe" (without the quotes) and press Enter.
- Save the report as an .nfo file, then zip up the .nfo file and upload/attach the .zip file with your next post.
- Also, save a copy as a .txt file and include it also (it's much more difficult to read, but we have greater success in getting the info from it).
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\YUSRA\Downloads\Compressed\LINDE-PC-ma_25_05_2015__03253,51\052215-150837-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18839.amd64fre.win7sp1_gdr.150427-0707
Machine Name:
Kernel base = 0xfffff800`0304e000 PsLoadedModuleList = 0xfffff800`03295730
Debug session time: Fri May 22 16:38:41.956 2015 (UTC + 6:00)
System Uptime: 2 days 20:38:45.782
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a011469000, 1, fffff880010a23bd, 0}
*** WARNING: Unable to verify timestamp for AsDsm.sys
*** ERROR: Module load completed but symbols could not be loaded for AsDsm.sys
Could not read faulting driver name
Probably caused by : AsDsm.sys ( AsDsm+23bd )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a011469000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880010a23bd, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ff100
GetUlongFromAddress: unable to read from fffff800032ff1c0
fffff8a011469000 Paged pool
FAULTING_IP:
AsDsm+23bd
fffff880`010a23bd 488941e0 mov qword ptr [rcx-20h],rax
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: avgidsagent.ex
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
TRAP_FRAME: fffff8800701b3c0 -- (.trap 0xfffff8800701b3c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0045004d004f0052 rbx=0000000000000000 rcx=fffff8a011469020
rdx=000001dff1686bd4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010a23bd rsp=fffff8800701b558 rbp=fffffa8002aef7d4
r8=00000000000004bc r9=0000000000000005 r10=00540041004e002e
r11=fffff8a011468c00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
AsDsm+0x23bd:
fffff880`010a23bd 488941e0 mov qword ptr [rcx-20h],rax ds:fffff8a0`11469000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000313dde7 to fffff800030c28c0
STACK_TEXT:
fffff880`0701b258 fffff800`0313dde7 : 00000000`00000050 fffff8a0`11469000 00000000`00000001 fffff880`0701b3c0 : nt!KeBugCheckEx
fffff880`0701b260 fffff800`030c09ee : 00000000`00000001 fffff8a0`11469000 fffffa80`0315a100 fffff8a0`0f5352c0 : nt! ?? ::FNODOBFM::`string'+0x4172f
fffff880`0701b3c0 fffff880`010a23bd : fffff880`010a1724 fffffa80`0000074d fffff8a0`0f5352c0 fffffa80`0315a040 : nt!KiPageFault+0x16e
fffff880`0701b558 fffff880`010a1724 : fffffa80`0000074d fffff8a0`0f5352c0 fffffa80`0315a040 00000000`000007ff : AsDsm+0x23bd
fffff880`0701b560 fffffa80`0000074d : fffff8a0`0f5352c0 fffffa80`0315a040 00000000`000007ff fffff880`010a4140 : AsDsm+0x1724
fffff880`0701b568 fffff8a0`0f5352c0 : fffffa80`0315a040 00000000`000007ff fffff880`010a4140 fffff880`0701b5c0 : 0xfffffa80`0000074d
fffff880`0701b570 fffffa80`0315a040 : 00000000`000007ff fffff880`010a4140 fffff880`0701b5c0 fffff880`010a41c0 : 0xfffff8a0`0f5352c0
fffff880`0701b578 00000000`000007ff : fffff880`010a4140 fffff880`0701b5c0 fffff880`010a41c0 fffffa80`0311c7f0 : 0xfffffa80`0315a040
fffff880`0701b580 fffff880`010a4140 : fffff880`0701b5c0 fffff880`010a41c0 fffffa80`0311c7f0 fffffa80`098e8f20 : 0x7ff
fffff880`0701b588 fffff880`0701b5c0 : fffff880`010a41c0 fffffa80`0311c7f0 fffffa80`098e8f20 fffffa80`0315a040 : AsDsm+0x4140
fffff880`0701b590 fffff880`010a41c0 : fffffa80`0311c7f0 fffffa80`098e8f20 fffffa80`0315a040 fffffa80`0315a190 : 0xfffff880`0701b5c0
fffff880`0701b598 fffffa80`0311c7f0 : fffffa80`098e8f20 fffffa80`0315a040 fffffa80`0315a190 fffff880`010a79ff : AsDsm+0x41c0
fffff880`0701b5a0 fffffa80`098e8f20 : fffffa80`0315a040 fffffa80`0315a190 fffff880`010a79ff fffff8a0`0f535201 : 0xfffffa80`0311c7f0
fffff880`0701b5a8 fffffa80`0315a040 : fffffa80`0315a190 fffff880`010a79ff fffff8a0`0f535201 fffffa80`03536790 : 0xfffffa80`098e8f20
fffff880`0701b5b0 fffffa80`0315a190 : fffff880`010a79ff fffff8a0`0f535201 fffffa80`03536790 fffffa80`03536b78 : 0xfffffa80`0315a040
fffff880`0701b5b8 fffff880`010a79ff : fffff8a0`0f535201 fffffa80`03536790 fffffa80`03536b78 fffff8a0`11468c00 : 0xfffffa80`0315a190
fffff880`0701b5c0 fffff8a0`0f535201 : fffffa80`03536790 fffffa80`03536b78 fffff8a0`11468c00 fffff880`0701b620 : AsDsm+0x79ff
fffff880`0701b5c8 fffffa80`03536790 : fffffa80`03536b78 fffff8a0`11468c00 fffff880`0701b620 fffff800`030d967f : 0xfffff8a0`0f535201
fffff880`0701b5d0 fffffa80`03536b78 : fffff8a0`11468c00 fffff880`0701b620 fffff800`030d967f 00000000`00000000 : 0xfffffa80`03536790
fffff880`0701b5d8 fffff8a0`11468c00 : fffff880`0701b620 fffff800`030d967f 00000000`00000000 fffffa80`03536790 : 0xfffffa80`03536b78
fffff880`0701b5e0 fffff880`0701b620 : fffff800`030d967f 00000000`00000000 fffffa80`03536790 fffff880`0701b9a0 : 0xfffff8a0`11468c00
fffff880`0701b5e8 fffff800`030d967f : 00000000`00000000 fffffa80`03536790 fffff880`0701b9a0 fffffa80`098e8fb8 : 0xfffff880`0701b620
fffff880`0701b5f0 fffff800`033c0b4b : 00000000`000007d4 00000000`00000045 00000000`00000040 fffffa80`098e8fb8 : nt!RtlCopyUnicodeString+0x3f
fffff880`0701b620 fffff800`033bcb5e : fffffa80`03121810 00000000`00000000 fffffa80`0930b760 00000000`00000701 : nt!IopParseDevice+0x14e2
fffff880`0701b780 fffff800`033bd646 : 00000000`00000000 fffff880`0701b900 00000000`00000040 fffffa80`02485790 : nt!ObpLookupObjectName+0x784
fffff880`0701b880 fffff800`0339c0b6 : ffffffff`ffffffff 00000000`0db8e798 fffff680`00073e01 fffff800`030e061f : nt!ObOpenObjectByName+0x306
fffff880`0701b950 fffff800`030c1b53 : 00000000`00000001 00000000`0e7d1108 fffffa80`099d6b50 00000000`05e8ef19 : nt!NtQueryAttributesFile+0x145
fffff880`0701bbe0 00000000`770bdf8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0db8e758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770bdf8a
STACK_COMMAND: kb
FOLLOWUP_IP:
AsDsm+23bd
fffff880`010a23bd 488941e0 mov qword ptr [rcx-20h],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: AsDsm+23bd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: AsDsm
IMAGE_NAME: AsDsm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49950fc2
FAILURE_BUCKET_ID: X64_0x50_AsDsm+23bd
BUCKET_ID: X64_0x50_AsDsm+23bd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_asdsm+23bd
FAILURE_ID_HASH: {9b2514a7-49b7-36cd-2353-9d3ef32878a8}
Followup: MachineOwner
---------
0: kd> lmvm AsDsm
start end module name
fffff880`010a0000 fffff880`010ad000 AsDsm T (no symbols)
Loaded symbol image file: AsDsm.sys
Image path: \SystemRoot\System32\Drivers\AsDsm.sys
Image name: AsDsm.sys
Timestamp: Fri Feb 13 12:14:26 2009 (49950FC2)
CheckSum: 0001216E
ImageSize: 0000D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4