PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8004886d10, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88003d7ffaf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
fffffa8004886d10
FAULTING_IP:
aswSP+afaf
fffff880`03d7ffaf 41f644241008 test byte ptr [r12+10h],8
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: AvastSvc.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880028466f0 -- (.trap 0xfffff880028466f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80057402c0
rdx=fffffa8007650d01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003d7ffaf rsp=fffff88002846880 rbp=fffff88002846a98
r8=fffffa8007650d00 r9=0000000000000150 r10=fffff88003db9000
r11=fffffa80069fe8f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
aswSP+0xafaf:
fffff880`03d7ffaf 41f644241008 test byte ptr [r12+10h],8 ds:4060:00000000`00000010=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d02024 to fffff80002c81700
STACK_TEXT:
fffff880`02846588 fffff800`02d02024 : 00000000`00000050 fffffa80`04886d10 00000000`00000000 fffff880`028466f0 : nt!KeBugCheckEx
fffff880`02846590 fffff800`02c7f7ee : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`063ed750 : nt! ?? ::FNODOBFM::`string'+0x427f7
fffff880`028466f0 fffff880`03d7ffaf : fffff880`028468f8 fffff800`00000001 00000000`00000003 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`02846880 fffff880`028468f8 : fffff800`00000001 00000000`00000003 00000000`00000000 00000000`00000000 : aswSP+0xafaf
fffff880`02846888 fffff800`00000001 : 00000000`00000003 00000000`00000000 00000000`00000000 fffff880`0195219a : 0xfffff880`028468f8
fffff880`02846890 00000000`00000003 : 00000000`00000000 00000000`00000000 fffff880`0195219a fffff880`0198f020 : 0xfffff800`00000001
fffff880`02846898 00000000`00000000 : 00000000`00000000 fffff880`0195219a fffff880`0198f020 00000000`00000000 : 0x3
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+afaf
fffff880`03d7ffaf 41f644241008 test byte ptr [r12+10h],8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswSP+afaf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4dc929b6
FAILURE_BUCKET_ID: X64_0x50_aswSP+afaf
BUCKET_ID: X64_0x50_aswSP+afaf
Followup: MachineOwner
---------
(This is the minidump)