I am not sure why this happen today....
It is fresh install of Windows 7, I have installed 5.0.377 program version...
I did have Avast screen saver running when this happened. I stopped and will see if it happens again...
In the mean time here is dump file from debug manager
WARNING: Whitespace at end of path element
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\012610-27781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: .sympath srv*c:\symbols*http://msdl.microsoft.com/download/symbols ;srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02812000 PsLoadedModuleList = 0xfffff800`02a4fe50
Debug session time: Tue Jan 26 20:51:31.617 2010 (GMT+8)
System Uptime: 0 days 5:25:17.351
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa800914feea, 0, fffff88003ed4dd1, 0}
Unable to load image \SystemRoot\System32\Drivers\aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
Could not read faulting driver name
Probably caused by : aswSP.SYS ( aswSP+5dd1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800914feea, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88003ed4dd1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aba0e0
fffffa800914feea
FAULTING_IP:
aswSP+5dd1
fffff880`03ed4dd1 f30f6f0401 movdqu xmm0,xmmword ptr [rcx+rax]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: avastSS.scr
CURRENT_IRQL: 0
TRAP_FRAME: fffff88007782220 -- (.trap 0xfffff88007782220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800914e4e0 rbx=0000000000000000 rcx=0000000000001a02
rdx=fffff88003ee69ba rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003ed4dd1 rsp=fffff880077823b0 rbp=fffffa8004886701
r8=fffff8a00a847a6a r9=0000000000000041 r10=fffff800029fe660
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
aswSP+0x5dd1:
fffff880`03ed4dd1 f30f6f0401 movdqu xmm0,xmmword ptr [rcx+rax] ds:6510:fffffa80`0914fee2=?
?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800029031e4 to fffff80002883f00
STACK_TEXT:
fffff880`077820b8 fffff800`029031e4 : 00000000`00000050 fffffa80`0914feea 00000000`00000000 fffff880`07782220 : nt!KeBugCheckEx
fffff880`077820c0 fffff800`02881fee : 00000000`00000000 00000000`00000000 fffff8a0`07c19700 fffff880`0102547e : nt! ?? ::FNODOBFM::`string'+0x42907
fffff880`07782220 fffff880`03ed4dd1 : 00000000`00000000 00000000`00000044 00000000`00000039 fffff880`03ed8222 : nt!KiPageFault+0x16e
fffff880`077823b0 00000000`00000000 : 00000000`00000044 00000000`00000039 fffff880`03ed8222 fffff8a0`0a847901 : aswSP+0x5dd1
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+5dd1
fffff880`03ed4dd1 f30f6f0401 movdqu xmm0,xmmword ptr [rcx+rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswSP+5dd1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4b55b01b
FAILURE_BUCKET_ID: X64_0x50_aswSP+5dd1
BUCKET_ID: X64_0x50_aswSP+5dd1
Followup: MachineOwner