Pretty straight forward. All of these crashes except one were caused by your xonar sound driver (cmhdav.sys). I would download the newest/ fresh driver you can and re-install it.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\072410-21013-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`0300b000 PsLoadedModuleList = 0xfffff800`03248e50
Debug session time: Sat Jul 24 06:20:21.969 2010 (GMT-4)
System Uptime: 0 days 0:31:03.764
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 0, fffff880050183a7}
Unable to load image \SystemRoot\system32\drivers\cmhdav.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for cmhdav.sys
*** ERROR: Module load completed but symbols could not be loaded for cmhdav.sys
Probably caused by : cmhdav.sys ( cmhdav+43a7 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880050183a7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b30e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
cmhdav+43a7
fffff880`050183a7 ff5008 call qword ptr [rax+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c320 -- (.trap 0xfffff80000b9c320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880059911e0
rdx=fffff8800509f978 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880050183a7 rsp=fffff80000b9c4b0 rbp=0000000000000001
r8=fffff80000b9c540 r9=11d333b5f0d71141 r10=fffff8000300b000
r11=fffffa8005a6e608 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cmhdav+0x43a7:
fffff880`050183a7 ff5008 call qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000307ab69 to fffff8000307b600
STACK_TEXT:
fffff800`00b9c1d8 fffff800`0307ab69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c1e0 fffff800`030797e0 : 00000000`00000000 fffffa80`05995210 fffff800`00b9c390 fffff880`0185a093 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c320 fffff880`050183a7 : fffff880`01969800 fffff880`0196dd40 fffff880`0196dd40 fffff880`0185a4b9 : nt!KiPageFault+0x260
fffff800`00b9c4b0 fffff880`01969800 : fffff880`0196dd40 fffff880`0196dd40 fffff880`0185a4b9 00000000`00000000 : cmhdav+0x43a7
fffff800`00b9c4b8 fffff880`0196dd40 : fffff880`0196dd40 fffff880`0185a4b9 00000000`00000000 fffff880`050165af : tcpip!Ipv6Global
fffff800`00b9c4c0 fffff880`0196dd40 : fffff880`0185a4b9 00000000`00000000 fffff880`050165af 00000000`00000001 : tcpip!Ipv6Global+0x4540
fffff800`00b9c4c8 fffff880`0185a4b9 : 00000000`00000000 fffff880`050165af 00000000`00000001 fffff880`018593e3 : tcpip!Ipv6Global+0x4540
fffff800`00b9c4d0 fffff880`050199a9 : fffff880`059911e0 fffffa80`05a6e660 00000000`00000001 fffff800`0308519a : tcpip!IppCompartmentSetTimeout+0xb9
fffff800`00b9c540 fffff880`059911e0 : fffffa80`05a6e660 00000000`00000001 fffff800`0308519a 00000000`00000000 : cmhdav+0x59a9
fffff800`00b9c548 fffffa80`05a6e660 : 00000000`00000001 fffff800`0308519a 00000000`00000000 fffff800`030876a6 : 0xfffff880`059911e0
fffff800`00b9c550 00000000`00000001 : fffff800`0308519a 00000000`00000000 fffff800`030876a6 fffff800`00b9c600 : 0xfffffa80`05a6e660
fffff800`00b9c558 fffff800`0308519a : 00000000`00000000 fffff800`030876a6 fffff800`00b9c600 fffffa80`00000000 : 0x1
fffff800`00b9c560 fffff800`03086a26 : fffffa80`05a6e5c8 00000000`0001d2af 00000000`00000000 00000000`00000000 : nt!KiTimerWaitTest+0x15a
fffff800`00b9c5e0 fffff800`0308757e : 00000004`56e3dc1d fffff800`00b9cc58 00000000`0001d2af fffff800`031f9868 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cc30 fffff800`03086d97 : 00000001`9f1c66c1 00000001`0001d2af 00000001`9f1c6677 00000000`000000af : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`03083dfa : fffff800`031f5e80 fffff800`03203c40 00000000`00000000 fffff880`0440652c : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
cmhdav+43a7
fffff880`050183a7 ff5008 call qword ptr [rax+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: cmhdav+43a7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cmhdav
IMAGE_NAME: cmhdav.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4adc2d51
FAILURE_BUCKET_ID: X64_0xD1_cmhdav+43a7
BUCKET_ID: X64_0xD1_cmhdav+43a7
Followup: MachineOwner
---------