Please remove AVG and use MSE
AVG is causing these BSODs
Virus, Spyware & Malware Protection | Microsoft Security Essentials
Code:
avgfwd6x.sys 0x8d87e000 0x8d88f000 0x00011000 0x4c3a71d5 12/07/2010 05:37:25
AVGIDSEH.Sys 0x88600000 0x88609000 0x00009000 0x4c8ea9cb 14/09/2010 02:46:35
avgldx86.sys 0x8dd23000 0x8dd5e400 0x0003b400 0x4c858bc7 07/09/2010 04:48:07
avgmfx86.sys 0x82e00000 0x82e0c000 0x0000c000 0x4c858bc1 07/09/2010 04:48:01
avgrkx86.sys 0x887f6000 0x887fab80 0x00004b80 0x4c858bd0 07/09/2010 04:48:16
avgtdix.sys 0x8d8b2000 0x8d8f9380 0x00047380 0x4c858c64 07/09/2010 04:50:44
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffc2, 1, 95f37ea5, 0}
Unable to load image \SystemRoot\system32\DRIVERS\AVGIDSDriver.Sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AVGIDSDriver.Sys
*** ERROR: Module load completed but symbols could not be loaded for AVGIDSDriver.Sys
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffc2, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 95f37ea5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 829b7848
Unable to read MiSystemVaType memory at 82996e40
ffffffc2
FAULTING_IP:
AVGIDSDriver+eea5
95f37ea5 c05ec20c rcr byte ptr [esi-3Eh],0Ch
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: msiexec.exe
CURRENT_IRQL: 0
TRAP_FRAME: 821f8b78 -- (.trap 0xffffffff821f8b78)
ErrCode = 00000002
eax=00000000 ebx=a92d0d30 ecx=00000008 edx=00000000 esi=00000000 edi=00000008
eip=95f37ea5 esp=821f8bec ebp=821f8c64 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
AVGIDSDriver+0xeea5:
95f37ea5 c05ec20c rcr byte ptr [esi-3Eh],0Ch ds:0023:ffffffc2=??
Resetting default scope
MISALIGNED_IP:
AVGIDSDriver+eea5
95f37ea5 c05ec20c rcr byte ptr [esi-3Eh],0Ch
LAST_CONTROL_TRANSFER: from 8288f3e8 to 828dc3db
STACK_TEXT:
821f8b60 8288f3e8 00000001 ffffffc2 00000000 nt!MmAccessFault+0x106
821f8b60 95f37ea5 00000001 ffffffc2 00000000 nt!KiTrap0E+0xdc
WARNING: Stack unwind information not available. Following frames may be wrong.
821f8c64 82a99748 00000008 821f8c94 00000001 AVGIDSDriver+0xeea5
821f8d14 8288c1fa 00000244 0081e7b8 00000002 nt!NtQueryValueKey+0x29c
821f8d14 77c470b4 00000244 0081e7b8 00000002 nt!KiFastCallEntry+0x12a
0081e788 00000000 00000000 00000000 00000000 0x77c470b4
STACK_COMMAND: kb
FOLLOWUP_IP:
AVGIDSDriver+eea5
95f37ea5 c05ec20c rcr byte ptr [esi-3Eh],0Ch
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: AVGIDSDriver+eea5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: IP_MISALIGNED_AVGIDSDriver.Sys
BUCKET_ID: IP_MISALIGNED_AVGIDSDriver.Sys
Followup: MachineOwner