Your AVG Antivirus is the main culprit, remove it and use MSE
Other Dumps point to a Memory Management issue/Memory Corruption, this indicates a possible RAM Defect.
Run Memtest86+ for at least 7 passes.
RAM - Test with Memtest86+
Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads
You can use MagicDisc as an alternative.
Code:
sptd.sys fffff880`01005000 fffff880`01178000 0x00173000 0x4f524ac0 03/03/2012 20:45:52
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffac00b05ee08, 0, fffff80002f14fe8, 5}
Unable to load image \SystemRoot\system32\DRIVERS\avgidsfiltera.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgidsfiltera.sys
*** ERROR: Module load completed but symbols could not be loaded for avgidsfiltera.sys
Could not read faulting driver name
Probably caused by : fileinfo.sys ( fileinfo!FIStreamGet+52 )
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffac00b05ee08, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002f14fe8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fe100
fffffac00b05ee08
FAULTING_IP:
nt!FsRtlLookupPerStreamContextInternal+7c
fffff800`02f14fe8 48396810 cmp qword ptr [rax+10h],rbp
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: avgidsagent.ex
CURRENT_IRQL: 0
TRAP_FRAME: fffff88006cef040 -- (.trap 0xfffff88006cef040)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffac00b05edf8 rbx=0000000000000000 rcx=fffff8a0116fd728
rdx=0000000000000011 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f14fe8 rsp=fffff88006cef1d0 rbp=fffffa8007004800
r8=0000000000000000 r9=fffff88006cef2a0 r10=0000000000000000
r11=fffff88006cef1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!FsRtlLookupPerStreamContextInternal+0x7c:
fffff800`02f14fe8 48396810 cmp qword ptr [rax+10h],rbp ds:f000:fffffac0`0b05ee08=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e77c1f to fffff80002eccc80
STACK_TEXT:
fffff880`06ceeed8 fffff800`02e77c1f : 00000000`00000050 fffffac0`0b05ee08 00000000`00000000 fffff880`06cef040 : nt!KeBugCheckEx
fffff880`06ceeee0 fffff800`02ecadae : 00000000`00000000 fffffac0`0b05ee08 fffff8a0`0d59fc00 fffff8a0`116fd6f0 : nt! ?? ::FNODOBFM::`string'+0x43d41
fffff880`06cef040 fffff800`02f14fe8 : fffff6fc`00000000 fffff8a0`116fd6f0 fffffa80`07004800 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`06cef1d0 fffff880`00d8daae : fffffa80`0badcf20 fffff880`06cef330 fffffa80`07004800 fffff880`012229f4 : nt!FsRtlLookupPerStreamContextInternal+0x7c
fffff880`06cef210 fffff880`00d98da1 : fffffa80`07004800 fffff880`01224e84 fffffa80`09094010 00000000`00000001 : fltmgr!FltpGetStreamListCtrl+0x8e
fffff880`06cef270 fffff880`00e62052 : 00000000`00000000 fffff140`117d5887 fffff880`06cef4c0 fffff880`012bdbd8 : fltmgr!FltGetStreamContext+0x21
fffff880`06cef2a0 fffff880`00e60b07 : fffff140`117d5887 00000000`00000000 00000000`00000000 00000000`00000000 : fileinfo!FIStreamGet+0x52
fffff880`06cef310 fffff880`00d8d288 : 00000000`00000000 00000000`00000000 fffffa80`090713b0 00000000`00000000 : fileinfo!FIPostCreateCallback+0xf3
fffff880`06cef3a0 fffff880`00d8bd1b : fffffa80`07293030 fffffa80`0bb34e80 fffffa80`06f92bb0 fffffa80`06f92dd0 : fltmgr!FltpPerformPostCallbacks+0x368
fffff880`06cef470 fffff880`00dab2b9 : fffffa80`09071010 fffffa80`07004800 fffffa80`09071000 fffffa80`06f02900 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x39b
fffff880`06cef500 fffff880`02ba832b : fffffa80`090713f8 fffff800`02ee2dbf fffffa80`097ea060 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`06cef5b0 fffffa80`090713f8 : fffff800`02ee2dbf fffffa80`097ea060 00000000`00000000 fffffa80`0badcf20 : avgidsfiltera+0x332b
fffff880`06cef5b8 fffff800`02ee2dbf : fffffa80`097ea060 00000000`00000000 fffffa80`0badcf20 fffffa80`09071010 : 0xfffffa80`090713f8
fffff880`06cef5c0 fffff800`031c9d35 : 00000000`00000005 fffffa80`0ba73708 fffffa80`0973c010 fffffa80`0badcfb8 : nt!RtlCopyUnicodeString+0x3f
fffff880`06cef5f0 fffff800`031c65d8 : fffffa80`06ee4c50 fffff800`00000000 fffffa80`0ba73550 00000000`00000001 : nt!IopParseDevice+0x5a5
fffff880`06cef780 fffff800`031c77f6 : 00000000`00000000 fffffa80`0ba73550 fffffa80`06f02900 fffffa80`06739c90 : nt!ObpLookupObjectName+0x588
fffff880`06cef870 fffff800`031c90fc : 00000000`00000400 00000000`00000000 fffffa80`0badce01 fffff880`06cef958 : nt!ObOpenObjectByName+0x306
fffff880`06cef940 fffff800`031b4924 : 00000000`03aae498 fffff8a0`00000080 00000000`03aaecf0 00000000`03aae438 : nt!IopCreateFile+0x2bc
fffff880`06cef9e0 fffff800`02ecbf13 : fffffa80`09c54060 00000000`00000001 fffffa80`0991f060 fffff800`031c3294 : nt!NtOpenFile+0x58
fffff880`06cefa70 00000000`77ad164a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03aae3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ad164a
STACK_COMMAND: kb
FOLLOWUP_IP:
fileinfo!FIStreamGet+52
fffff880`00e62052 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: fileinfo!FIStreamGet+52
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fileinfo
IMAGE_NAME: fileinfo.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc481
FAILURE_BUCKET_ID: X64_0x50_fileinfo!FIStreamGet+52
BUCKET_ID: X64_0x50_fileinfo!FIStreamGet+52
Followup: MachineOwner
---------