Few things:
1. One dump points to AsDsm.sys, which is the Asus Data Security Manager Driver. Update here.
2. After checking your drivers list, I've noticed you have dtsoftbus01.sys (Daemon Tools driver). Please fully uninstall Daemon Tools and restart. Daemon Tools is a well known causer of BSODs in W7.
3. Your Avast drivers still date from 2008. I'm not sure if this is intended, but I don't believe it should be... uninstall Avast and reinstall the latest version.
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Icarus\Downloads\Dumps\tymczasowy\022112-26925-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e70
Debug session time: Tue Feb 21 17:43:43.194 2012 (UTC - 5:00)
System Uptime: 0 days 15:20:36.396
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
.....................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a00db41000, 1, fffff880013233bd, 0}
Unable to load image \SystemRoot\System32\Drivers\AsDsm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AsDsm.sys
*** ERROR: Module load completed but symbols could not be loaded for AsDsm.sys
Could not read faulting driver name
Probably caused by : AsDsm.sys ( AsDsm+23bd )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a00db41000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880013233bd, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ab0e0
fffff8a00db41000
FAULTING_IP:
AsDsm+23bd
fffff880`013233bd 488941e0 mov qword ptr [rcx-20h],rax
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: ts3client_win3
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800c4772a0 -- (.trap 0xfffff8800c4772a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=006c003700330038 rbx=0000000000000000 rcx=fffff8a00db41020
rdx=000001dffe6aa424 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880013233bd rsp=fffff8800c477438 rbp=fffffa800c1eb024
r8=00000000000004ee r9=0000000000000007 r10=0031006c00350031
r11=fffff8a00db40c00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
AsDsm+0x23bd:
fffff880`013233bd 488941e0 mov qword ptr [rcx-20h],rax ds:f630:fffff8a0`0db41000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ef3df4 to fffff80002e735c0
STACK_TEXT:
fffff880`0c477138 fffff800`02ef3df4 : 00000000`00000050 fffff8a0`0db41000 00000000`00000001 fffff880`0c4772a0 : nt!KeBugCheckEx
fffff880`0c477140 fffff800`02e716ae : 00000000`00000001 fffff8a0`0a35e1d0 fffffa80`04b3ff00 fffffa80`0bd8e840 : nt! ?? ::FNODOBFM::`string'+0x426f7
fffff880`0c4772a0 fffff880`013233bd : fffff880`01322724 00000000`0000074d fffff8a0`0a35e1d0 fffffa80`04b3fe00 : nt!KiPageFault+0x16e
fffff880`0c477438 fffff880`01322724 : 00000000`0000074d fffff8a0`0a35e1d0 fffffa80`04b3fe00 00000000`000007ff : AsDsm+0x23bd
fffff880`0c477440 00000000`0000074d : fffff8a0`0a35e1d0 fffffa80`04b3fe00 00000000`000007ff fffff880`01325140 : AsDsm+0x1724
fffff880`0c477448 fffff8a0`0a35e1d0 : fffffa80`04b3fe00 00000000`000007ff fffff880`01325140 fffff880`0c4774a0 : 0x74d
fffff880`0c477450 fffffa80`04b3fe00 : 00000000`000007ff fffff880`01325140 fffff880`0c4774a0 fffff880`013251c0 : 0xfffff8a0`0a35e1d0
fffff880`0c477458 00000000`000007ff : fffff880`01325140 fffff880`0c4774a0 fffff880`013251c0 00000000`00000008 : 0xfffffa80`04b3fe00
fffff880`0c477460 fffff880`01325140 : fffff880`0c4774a0 fffff880`013251c0 00000000`00000008 fffffa80`0bd8e840 : 0x7ff
fffff880`0c477468 fffff880`0c4774a0 : fffff880`013251c0 00000000`00000008 fffffa80`0bd8e840 fffffa80`04b3fe00 : AsDsm+0x4140
fffff880`0c477470 fffff880`013251c0 : 00000000`00000008 fffffa80`0bd8e840 fffffa80`04b3fe00 fffffa80`04b3ff50 : 0xfffff880`0c4774a0
fffff880`0c477478 00000000`00000008 : fffffa80`0bd8e840 fffffa80`04b3fe00 fffffa80`04b3ff50 fffff880`013289ff : AsDsm+0x41c0
fffff880`0c477480 fffffa80`0bd8e840 : fffffa80`04b3fe00 fffffa80`04b3ff50 fffff880`013289ff fffff8a0`0a35e101 : 0x8
fffff880`0c477488 fffffa80`04b3fe00 : fffffa80`04b3ff50 fffff880`013289ff fffff8a0`0a35e101 fffffa80`03cc0680 : 0xfffffa80`0bd8e840
fffff880`0c477490 fffffa80`04b3ff50 : fffff880`013289ff fffff8a0`0a35e101 fffffa80`03cc0680 fffffa80`03cc0a68 : 0xfffffa80`04b3fe00
fffff880`0c477498 fffff880`013289ff : fffff8a0`0a35e101 fffffa80`03cc0680 fffffa80`03cc0a68 fffff8a0`0db40c00 : 0xfffffa80`04b3ff50
fffff880`0c4774a0 fffff8a0`0a35e101 : fffffa80`03cc0680 fffffa80`03cc0a68 fffff8a0`0db40c00 fffff880`0c477500 : AsDsm+0x79ff
fffff880`0c4774a8 fffffa80`03cc0680 : fffffa80`03cc0a68 fffff8a0`0db40c00 fffff880`0c477500 00000000`00000000 : 0xfffff8a0`0a35e101
fffff880`0c4774b0 fffffa80`03cc0a68 : fffff8a0`0db40c00 fffff880`0c477500 00000000`00000000 fffff880`0c4775d0 : 0xfffffa80`03cc0680
fffff880`0c4774b8 fffff8a0`0db40c00 : fffff880`0c477500 00000000`00000000 fffff880`0c4775d0 fffffa80`0c8e4de0 : 0xfffffa80`03cc0a68
fffff880`0c4774c0 fffff880`0c477500 : 00000000`00000000 fffff880`0c4775d0 fffffa80`0c8e4de0 fffffa80`03cc0680 : 0xfffff8a0`0db40c00
fffff880`0c4774c8 00000000`00000000 : fffff880`0c4775d0 fffffa80`0c8e4de0 fffffa80`03cc0680 00000000`00000000 : 0xfffff880`0c477500
STACK_COMMAND: kb
FOLLOWUP_IP:
AsDsm+23bd
fffff880`013233bd 488941e0 mov qword ptr [rcx-20h],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: AsDsm+23bd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: AsDsm
IMAGE_NAME: AsDsm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49950fc2
FAILURE_BUCKET_ID: X64_0x50_AsDsm+23bd
BUCKET_ID: X64_0x50_AsDsm+23bd
Followup: MachineOwner