Hi Rufus2468.
The crash dumps are pointing to avast! Antivirus Stream Filter driver.
Uninstall Avast using Avast Uninstall Utility. At least as a test. Use Microsoft Security Essentials as your antivirus with windows inbuilt firewall, and free MBAM as the on demand scanner.
Report us for any further BSOD.
__________________________________
Code:
BugCheck D1, {17851be1, 2, 1, fffffa8015426628}
*** WARNING: Unable to verify timestamp for aswStm.sys
*** ERROR: Module load completed but symbols could not be loaded for aswStm.sys
Probably caused by : aswStm.sys ( aswStm+4e68 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000017851be1, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffffa8015426628, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003d10100
GetUlongFromAddress: unable to read from fffff80003d101c0
0000000017851be1 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
+255674e2e450
fffffa80`15426628 0000 add byte ptr [rax],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
DPC_STACK_BASE: FFFFF88006122FB0
TRAP_FRAME: fffff8800611aaf0 -- (.trap 0xfffff8800611aaf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000017851be1 rbx=0000000000000000 rcx=fffffa8017161250
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa8015426628 rsp=fffff8800611ac80 rbp=00000000ffffffff
r8=fffff8800611ac48 r9=0000000000000000 r10=0000000000000000
r11=fffff8800611ac70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
fffffa80`15426628 0000 add byte ptr [rax],al ds:00000000`17851be1=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003ad6469 to fffff80003ad6ec0
STACK_TEXT:
fffff880`0611a9a8 fffff800`03ad6469 : 00000000`0000000a 00000000`17851be1 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0611a9b0 fffff800`03ad50e0 : 00000050`00000000 fffffa80`14bb8080 fffff880`00000007 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0611aaf0 fffffa80`15426628 : 00000000`00000001 fffff880`06ef9e68 fffffa80`0cb68c38 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0611ac80 00000000`00000001 : fffff880`06ef9e68 fffffa80`0cb68c38 00000000`00000000 00000000`00000000 : 0xfffffa80`15426628
fffff880`0611ac88 fffff880`06ef9e68 : fffffa80`0cb68c38 00000000`00000000 00000000`00000000 fffffa80`17161201 : 0x1
fffff880`0611ac90 fffffa80`0cb68c38 : 00000000`00000000 00000000`00000000 fffffa80`17161201 fffffa80`14bb8080 : aswStm+0x4e68
fffff880`0611ac98 00000000`00000000 : 00000000`00000000 fffffa80`17161201 fffffa80`14bb8080 fffff880`0496d9a0 : 0xfffffa80`0cb68c38
STACK_COMMAND: kb
FOLLOWUP_IP:
aswStm+4e68
fffff880`06ef9e68 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: aswStm+4e68
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswStm
IMAGE_NAME: aswStm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54f45828
FAILURE_BUCKET_ID: X64_0xD1_aswStm+4e68
BUCKET_ID: X64_0xD1_aswStm+4e68
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_aswstm+4e68
FAILURE_ID_HASH: {ea83fbeb-f3c0-af8d-d54a-4d8fc6ac7210}
Followup: MachineOwner
---------
1: kd> lmvm aswStm
start end module name
fffff880`06ef5000 fffff880`06f18000 aswStm T (no symbols)
Loaded symbol image file: aswStm.sys
Image path: \SystemRoot\system32\drivers\aswStm.sys
Image name: aswStm.sys
Timestamp: Mon Mar 02 18:01:36 2015 (54F45828)
CheckSum: 00021D72
ImageSize: 00023000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4