Hello Steve,
As Carl suggested uninstall Kaspersky Internet Security 2011 (avp.exe) completely since i see you also have Microsoft Security Essentials use the Removal Tool to clean the left over files.
Update the Following Drivers :
Code:
asusgsb.sys Thu Sep 27 18:44:50 2007
Rt64win7.sys Thu Aug 20 21:35:06 2009
supersafer64.sys Fri Dec 26 14:49:49 2008
Bugcheck:
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003024920, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880111397c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt!RtlRealSuccessor+30
fffff800`03024920 488b4908 mov rcx,qword ptr [rcx+8]
CONTEXT: fffff880111397c0 -- (.cxr 0xfffff880111397c0)
rax=f7fff8a002e30970 rbx=00000000000361ec rcx=f7fff8a002e30970
rdx=fffff88004963a78 rsi=00000000c0000017 rdi=00000000024df6c8
rip=fffff80003024920 rsp=fffff8801113a198 rbp=fffff8801113a29c
r8=0000000000000000 r9=0000000000000000 r10=fffff88004963a78
r11=0000000000000006 r12=fffff8801113a360 r13=0000000000000001
r14=00000000024df6d0 r15=0000000000000018
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!RtlRealSuccessor+0x30:
fffff800`03024920 488b4908 mov rcx,qword ptr [rcx+8] ds:002b:f7fff8a0`02e30978=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: avp.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003024920
STACK_TEXT:
fffff880`1113a198 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlRealSuccessor+0x30
FOLLOWUP_IP:
nt!RtlRealSuccessor+30
fffff800`03024920 488b4908 mov rcx,qword ptr [rcx+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!RtlRealSuccessor+30
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880111397c0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!RtlRealSuccessor+30
BUCKET_ID: X64_0x3B_nt!RtlRealSuccessor+30
Followup: MachineOwner
Hope this helps,
Captain