Hi,
Most the dumps are likely blame on ntfs and avast as the cause.
Remove avast with avast-uninstall-utility and replace it wih MSE.
Then perform check disk for all your drives (CHKDSK /R /F from an elevated (Run as administrator)
Also check the hardisk condition with Hardrive Diagnostics tools.
Then let's see if the problem persist.
Logs
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {31, fffffa8003b1cc80, fffff880021f8000, fffff8a0087ac74e}
Unable to load image \SystemRoot\System32\Drivers\aswSnx.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSnx.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSnx.SYS
Probably caused by : aswSnx.SYS ( aswSnx+139a4 )
Followup: MachineOwner
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {31, fffffa8006b2d5d0, fffff88006b10000, fffff8a003a9eb72}
Unable to load image \SystemRoot\System32\Drivers\aswSnx.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSnx.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSnx.SYS
Probably caused by : aswSnx.SYS ( aswSnx+139a4 )
Followup: MachineOwner
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffff8a007953360, fffff8a007953390, 5030403}
*** ERROR: Module load completed but symbols could not be loaded for Ntfs.sys
Probably caused by : fileinfo.sys ( fileinfo!FIStreamLog+89 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002bce121, fffff88008cffe30, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpCloseHandleTableEntry+51 )
Followup: MachineOwner
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a007953360, The pool entry we were looking for within the page.
Arg3: fffff8a007953390, The next pool entry.
Arg4: 0000000005030403, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f070e0
fffff8a007953360
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002e026d3 to fffff80002ccf740
STACK_TEXT:
fffff880`0318c598 fffff800`02e026d3 : 00000000`00000019 00000000`00000020 fffff8a0`07953360 fffff8a0`07953390 : nt!KeBugCheckEx
fffff880`0318c5a0 fffff800`0311bbec : fffff800`02e70c88 fffff800`02cba407 fffff800`4b466650 fffff800`02d888ae : nt!ExDeferredFreePool+0x12c4
fffff880`0318c650 fffff800`02df0559 : fffff880`0318c860 00000000`00000000 00000000`00000000 fffff8a0`07545940 : nt!PfpRpFileKeyUpdate+0x4cc
fffff880`0318c6e0 fffff880`010ef55d : 00000000`00000000 00000000`00000000 fffff880`0318c860 00000000`00000000 : nt!PfFileInfoNotify+0x549
fffff880`0318c770 fffff880`010ef746 : fffff8a0`07517870 fffff8a0`07517870 00000000`00000000 00000000`00000000 : fileinfo!FIStreamLog+0x89
fffff880`0318c840 fffff880`00c4365e : fffffa80`05173468 00000000`00000000 ffffffff`ffffffff fffffa80`03ba8380 : fileinfo!FIStreamCleanup+0x96
fffff880`0318c890 fffff880`00c5f22d : fffff8a0`07517828 fffff880`00c35000 00000000`00000000 00000000`00000040 : fltmgr!DoFreeContext+0x7e
fffff880`0318c8c0 fffff880`00c5abc1 : fffffa80`049b6010 00000000`00000130 fffff8a0`07545940 fffff8a0`07545940 : fltmgr! ?? ::NNGAKEGL::`string'+0x1196
fffff880`0318c8f0 fffff880`00c5ab7b : fffffa80`049b6010 fffff8a0`07545ba8 fffffa80`049b6010 fffff8a0`0711a010 : fltmgr!CleanupStreamListCtrl+0x21
fffff880`0318c920 fffff800`02fbe896 : 00000000`00000001 fffff880`012ec1a7 fffff8a0`0711a010 00000000`00000000 : fltmgr!DeleteStreamListCtrlCallback+0x6b
fffff880`0318c950 fffff880`012ebbcc : fffff8a0`07545940 fffffa80`03a05680 fffff880`0318ca28 00000000`00000706 : nt!FsRtlTeardownPerStreamContexts+0xe2
fffff880`0318c9a0 fffff880`012eb8d5 : fffffa00`01010000 00000000`00000000 fffff800`02e74500 00000000`00000001 : Ntfs+0x95bcc
fffff880`0318c9e0 fffff880`0125ecb4 : fffff8a0`07545840 fffff8a0`07545940 fffff800`02e74500 fffff880`0318cb52 : Ntfs+0x958d5
fffff880`0318ca20 fffff880`012e92dc : fffff8a0`07545810 fffff800`02e745a0 fffff880`0318cb52 fffffa80`0406de40 : Ntfs+0x8cb4
fffff880`0318ca50 fffff880`01267882 : fffffa80`0406de40 fffffa80`0406de40 fffff8a0`07545810 00000000`00000000 : Ntfs+0x932dc
fffff880`0318cad0 fffff880`01300813 : fffffa80`0406de40 fffff800`02e745a0 fffff8a0`07545810 00000000`00000009 : Ntfs+0x11882
fffff880`0318cb10 fffff880`012da38f : fffffa80`0406de40 fffff8a0`07545940 fffff8a0`07545810 fffffa80`04ae7180 : Ntfs+0xaa813
fffff880`0318cbe0 fffff800`02cdc961 : 00000000`00000000 fffff800`02fcbc00 fffffa80`03a05601 fffffa80`00000002 : Ntfs+0x8438f
fffff880`0318ccb0 fffff800`02f73c06 : 00000500`00000000 fffffa80`03a05680 00000000`00000080 fffffa80`039ed040 : nt!ExpWorkerThread+0x111
fffff880`0318cd40 fffff800`02cadc26 : fffff880`02f63180 fffffa80`03a05680 fffff880`02f6dfc0 00000500`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0318cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
fileinfo!FIStreamLog+89
fffff880`010ef55d 4c8b1534c5ffff mov r10,qword ptr [fileinfo!FIGlobals+0x798 (fffff880`010eba98)]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: fileinfo!FIStreamLog+89
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fileinfo
IMAGE_NAME: fileinfo.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc481
FAILURE_BUCKET_ID: X64_0x19_20_fileinfo!FIStreamLog+89
BUCKET_ID: X64_0x19_20_fileinfo!FIStreamLog+89
Followup: MachineOwner
---------