I looked at your three most recent dumps. None of them give us a direct cause and they all indicate memory corruption.
I recommend that while you are troubleshooting, you uninstall Avast. Avast generally runs well with Win 7; but one of your dumps shows it was involved in the crash, though not necessarily the cause. Download and install Microsoft Security Essentials. Once you get your system stable, you can try Avast again.
Next run Memtest again from a cold boot after your computer has been off for a couple of hours. Follow the instructions in this tutorial: RAM - Test with Memtest86+. Let it run for at least seven passes. I know you ran more passes before. Post back with your results.
If you find no errors with Memtest, Enable Driver Verifier following the instructions in this tutorial: Driver Verifier - Enable and Disable. Upload any and all dumps triggered by Driver Verifier.
Do you have another known good power supply that you can try? A faulty power supply can trigger the BSOD's you are having.
Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c55000 PsLoadedModuleList = 0x82d9d810
Debug session time: Wed Dec 22 12:59:54.051 2010 (GMT-5)
System Uptime: 0 days 0:00:17.988
Loading Kernel Symbols
...............................................................
...............................................................
Loading User Symbols
Loading unloaded module list
....
2: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffff, 0, 9a11d71c, 0}
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!wcsncpycch+14 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffff, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9a11d71c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from 82dbd718
Unable to read MiSystemVaType memory at 82d9d160
ffffffff
FAULTING_IP:
win32k!wcsncpycch+14
9a11d71c 0fb70a movzx ecx,word ptr [edx]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: 8e56b7a4 -- (.trap 0xffffffff8e56b7a4)
ErrCode = 00000000
eax=00b8c748 ebx=ffb8c748 ecx=879d7a60 edx=ffffffff esi=00b8c748 edi=ffb898a0
eip=9a11d71c esp=8e56b818 ebp=8e56b81c iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
win32k!wcsncpycch+0x14:
9a11d71c 0fb70a movzx ecx,word ptr [edx] ds:0023:ffffffff=????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82c9b638 to 82cda903
STACK_TEXT:
8e56b78c 82c9b638 00000000 ffffffff 00000000 nt!MmAccessFault+0x106
8e56b78c 9a11d71c 00000000 ffffffff 00000000 nt!KiTrap0E+0xdc
8e56b81c 9a0f23fb 00b8c748 ffffffff ffffffff win32k!wcsncpycch+0x14
8e56b844 9a0fc5e5 147bcf92 00000000 ffb92390 win32k!PDEVOBJ::bMakeSurface+0xe2
8e56b8bc 9a0fb312 ffb92390 ffb8b110 ffbadf20 win32k!hCreateHDEV+0x7b8
8e56ba78 9a0f9eee 00000000 00000000 00000000 win32k!DrvCreateMDEV+0x5fd
8e56bb84 9a0f917e 00000000 00000000 00000000 win32k!DrvInternalChangeDisplaySettings+0x50b
8e56bca0 9a0d62ce 00000000 00000000 00000000 win32k!DrvChangeDisplaySettings+0x3ae
8e56bcf8 9a0d4be3 00000000 00000040 00000000 win32k!InitVideo+0x60
8e56bd18 9a0d59b0 0021f538 8e56bd34 82c9844a win32k!UserInitialize+0x115
8e56bd24 82c9844a 00000040 00000044 0021f554 win32k!NtUserInitialize+0x9f
8e56bd24 770464f4 00000040 00000044 0021f554 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0021f554 00000000 00000000 00000000 00000000 0x770464f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!wcsncpycch+14
9a11d71c 0fb70a movzx ecx,word ptr [edx]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!wcsncpycch+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dbbb5
FAILURE_BUCKET_ID: 0x50_win32k!wcsncpycch+14
BUCKET_ID: 0x50_win32k!wcsncpycch+14
Followup: MachineOwner
---------
Debug session time: Fri Dec 10 23:06:12.072 2010 (GMT-5)
System Uptime: 0 days 0:04:34.384
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
3: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, c0802000, 5fd, 5ffbba}
Probably caused by : memory_corruption ( nt!MiAllocateWsle+6f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00005003, The subtype of the bugcheck.
Arg2: c0802000
Arg3: 000005fd
Arg4: 005ffbba
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: DAOriginsLaunc
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82ce7a30 to 82d2ad10
STACK_TEXT:
9eff2b3c 82ce7a30 0000001a 00005003 c0802000 nt!KeBugCheckEx+0x1e
9eff2b74 82cef944 c03b3c90 84bb8d14 00000000 nt!MiAllocateWsle+0x6f
9eff2bc4 82cf5c32 00000000 878cc900 76792e74 nt!MiCompleteProtoPteFault+0x34f
9eff2c08 82cde916 00000000 76792e74 c03b3c90 nt!MiResolveProtoPteFault+0x1e1
9eff2c90 82cd5dd5 76792e74 00000000 878cc900 nt!MiDispatchFault+0x5d6
9eff2d1c 82c94638 00000008 76792e74 00000001 nt!MmAccessFault+0x25cc
9eff2d1c 76792e74 00000008 76792e74 00000001 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012f3d8 00000000 00000000 00000000 00000000 0x76792e74
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAllocateWsle+6f
82ce7a30 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiAllocateWsle+6f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x1a_5003_nt!MiAllocateWsle+6f
BUCKET_ID: 0x1a_5003_nt!MiAllocateWsle+6f
Followup: MachineOwner
---------
Debug session time: Thu Dec 9 18:56:52.993 2010 (GMT-5)
System Uptime: 0 days 0:03:02.366
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
......
0: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 1097, 6e0069, a43c2998}
GetPointerFromAddress: unable to read from 82d77718
Unable to read MiSystemVaType memory at 82d57160
*** WARNING: Unable to verify timestamp for amdxata.sys
*** ERROR: Module load completed but symbols could not be loaded for amdxata.sys
*** WARNING: Unable to verify timestamp for ksecpkg.sys
*** ERROR: Module load completed but symbols could not be loaded for ksecpkg.sys
*** WARNING: Unable to verify timestamp for fvevol.sys
*** ERROR: Module load completed but symbols could not be loaded for fvevol.sys
*** WARNING: Unable to verify timestamp for spldr.sys
*** ERROR: Module load completed but symbols could not be loaded for spldr.sys
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
*** WARNING: Unable to verify timestamp for Rt86win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt86win7.sys
*** WARNING: Unable to verify timestamp for ks.sys
*** ERROR: Module load completed but symbols could not be loaded for ks.sys
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
*** WARNING: Unable to verify timestamp for aswRdr.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswRdr.SYS
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** ERROR: Module load completed but symbols could not be loaded for dxgkrnl.sys
*** WARNING: Unable to verify timestamp for drmk.sys
*** ERROR: Module load completed but symbols could not be loaded for drmk.sys
*** WARNING: Unable to verify timestamp for aswMonFlt.sys
*** ERROR: Module load completed but symbols could not be loaded for aswMonFlt.sys
*** WARNING: Unable to verify timestamp for aswFsBlk.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswFsBlk.SYS
*** WARNING: Unable to verify timestamp for RTKVHDA.sys
*** ERROR: Module load completed but symbols could not be loaded for RTKVHDA.sys
*** WARNING: Unable to verify timestamp for ivusb.sys
*** ERROR: Module load completed but symbols could not be loaded for ivusb.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
*** WARNING: Unable to verify timestamp for TSDDD.dll
*** ERROR: Module load completed but symbols could not be loaded for TSDDD.dll
*** WARNING: Unable to verify timestamp for cdd.dll
*** ERROR: Module load completed but symbols could not be loaded for cdd.dll
*** WARNING: Unable to verify timestamp for peauth.sys
*** ERROR: Module load completed but symbols could not be loaded for peauth.sys
*** WARNING: Unable to verify timestamp for secdrv.SYS
*** ERROR: Module load completed but symbols could not be loaded for secdrv.SYS
*** WARNING: Unable to verify timestamp for spsys.sys
*** ERROR: Module load completed but symbols could not be loaded for spsys.sys
GetPointerFromAddress: unable to read from 82d77718
Unable to read MiSystemVaType memory at 82d57160
Probably caused by : ntkrpamp.exe ( nt!ExFreePoolWithTag+1b1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 00000007, Attempt to free pool which was already freed
Arg2: 00001097, (reserved)
Arg3: 006e0069, Memory contents of the pool block
Arg4: a43c2998, Address of the block of pool being deallocated
Debugging Details:
------------------
GetPointerFromAddress: unable to read from 82d77718
Unable to read MiSystemVaType memory at 82d57160
GetPointerFromAddress: unable to read from 82d77718
Unable to read MiSystemVaType memory at 82d57160
POOL_ADDRESS: GetPointerFromAddress: unable to read from 82d77718
Unable to read MiSystemVaType memory at 82d57160
a43c2998
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82e2790d to 82d2e1b6
STACK_TEXT:
8e593c6c 82e2790d a43c2998 00000000 820e9468 nt!ExFreePoolWithTag+0x1b1
8e593c80 82e27a85 00000000 820e9468 00000000 nt!CmpCleanUpKcbValueCache+0x3e
8e593c94 82e4546d 00000000 820e9468 820e9488 nt!CmpCleanUpKcbCacheWithLock+0x25
8e593cb4 82e56c5d 820e9468 00000000 82d76080 nt!CmpDereferenceKeyControlBlockWithLock+0x8d
8e593ce4 82e27493 82d495bc 82d76070 8577ad48 nt!CmpDereferenceKeyControlBlock+0x11b
8e593d00 82c7cf3b 00000000 00000000 8577ad48 nt!CmpDelayDerefKCBWorker+0xea
8e593d50 82e1d6d3 00000001 a5277496 00000000 nt!ExpWorkerThread+0x10d
8e593d90 82ccf0f9 82c7ce2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExFreePoolWithTag+1b1
82d2e1b6 cc int 3
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExFreePoolWithTag+1b1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
FAILURE_BUCKET_ID: 0xc2_7_nt!ExFreePoolWithTag+1b1
BUCKET_ID: 0xc2_7_nt!ExFreePoolWithTag+1b1
Followup: MachineOwner
---------