Sat Dec 10 12:04:05.313 2011
STOP 0x0000003B: SYSTEM_SERVICE_EXCEPTION
Usual causes: System service, Device driver, graphics driver, ?memory.
Bugcheck Analysis:
	
	
	
		Code:
	
	
		*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff880010bf039, fffff8800a552990, 0}
Probably caused by : [B]fileinfo.sys [/B]( fileinfo!FIStreamGet+52 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880010bf039, Address of the instruction which caused the bugcheck
Arg3: fffff8800a552990, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP: 
fltmgr!GetContextFromStreamList+99
fffff880`010bf039 488b4820        mov     rcx,qword ptr [rax+20h]
CONTEXT:  fffff8800a552990 -- (.cxr 0xfffff8800a552990)
rax=f7fff8a00c0c4f68 rbx=0000000000000000 rcx=fffffa8007b4a6d0
rdx=fffffa80075b7bb0 rsi=fffffa8007b4a720 rdi=fffffa8007b4a6d0
rip=fffff880010bf039 rsp=fffff8800a553370 rbp=fffff8800a5534b0
 r8=0000000000000000  r9=fffff8800a5534a8 r10=fffffa8007b4a6d8
r11=0000000000000011 r12=fffff8800a5534a8 r13=fffffa8008ecccf0
r14=0000000000000000 r15=fffffa80075b7bb0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
fltmgr!GetContextFromStreamList+0x99:
fffff880`010bf039 488b4820        mov     rcx,qword ptr [rax+20h] ds:002b:f7fff8a0`0c0c4f88=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0x3B
PROCESS_NAME: [B] APB.exe[/B]
CURRENT_IRQL:  0
LAST_CONTROL_TRANSFER:  from fffff880010c9dbe to fffff880010bf039
FOLLOWUP_IP: 
fileinfo!FIStreamGet+52
fffff880`0110f052 8bd8            mov     ebx,eax
SYMBOL_STACK_INDEX:  2
SYMBOL_NAME:  fileinfo!FIStreamGet+52
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: fileinfo
IMAGE_NAME:  fileinfo.sys
DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc481
STACK_COMMAND:  .cxr 0xfffff8800a552990 ; kb
FAILURE_BUCKET_ID:  X64_0x3B_fileinfo!FIStreamGet+52
BUCKET_ID:  X64_0x3B_fileinfo!FIStreamGet+52
	 
 
Sat Dec 10 13:21:16.956 2011
STOP 0x0000001E: KMODE_EXCEPTION_NOT_HANDLED
Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.
Bugcheck Analysis:
	
	
	
		Code:
	
	
		*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by :[B] ntkrnlmp.exe[/B] ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP: 
+3038383932623437
00000000`00000000 ??              ???
EXCEPTION_PARAMETER1:  0000000000000000
EXCEPTION_PARAMETER2:  0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR:  0x1E_0
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
PROCESS_NAME: [B] APB.exe[/B]
CURRENT_IRQL:  2
EXCEPTION_RECORD:  fffff880009b05d8 -- (.exr 0xfffff880009b05d8)
ExceptionAddress: fffff800032e14f9 (nt!KiProcessExpiredTimerList+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME:  fffff880009b0680 -- (.trap 0xfffff880009b0680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80086343e8 rbx=0000000000000000 rcx=f7fffa80086343e8
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e14f9 rsp=fffff880009b0810 rbp=fffffa8007de5688
 r8=fffff88002fd7301  r9=0000000000000002 r10=000000000000009b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`032e14f9 48894108        mov     qword ptr [rcx+8],rax ds:f7fffa80`086343f0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff800032cd5fe to fffff800032d5c10
STACK_COMMAND:  kb
FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`032cd5fe 90              nop
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
	 
 
There's nothing jumping out at me in your latest dump files. APB.exe is mentioned in both dump files though. As hard as it may be, can you steer clear of cleaning up the streets for a while to see if you still get a blue screen? Say, give it a miss for 8 hours. Then try to play and see what happens.
After about 4 hours of no play you may want to enable driver verifier so that if there is a rogue driver, we can flush it out.
To start Driver Verifier:
- Create a restore point!!
 - GoTo Start and in the Search or a Run... Window type 
verifier and press 
Enter.
 - Select 
Create custom settings (for code developers) and click 
Next.
 - Select 
Select individual settings from a full list and click 
Next.
 - Select every option 
EXCEPT for 
Low Resource Simulation and click 
Next.
 - Select 
Select driver names from a list and click 
Next.
 - Select all drivers listed that are 
NOT provided by Microsoft and click 
Next.
 - Select 
Finish on the next page.
 
Reboot the system and 
wait for it to crash to the Blue Screen. If this happens as soon as Windows tries to start then try it in Safe Mode. Continue to use your system normally, if you know what causes the crash, do that repeatedly. The objective is to get the system to crash because Driver Verifier is stressing the drivers out and hopefully create a pattern.
On the extremely rare occasion that you can't get into Safe Mode, use System Restore from your installation DVD / Restore Disc to set the system back to the previous restore point that you created.
To turn off Driver Verifier when finished, Open a 
Command Prompt or 
Run... window and type 
verifier /reset and press Enter/OK.
or
GoTo Start and in the Search or a Run... Window type 
verifier. Select 
Delete existing settings and press "Finish".