I looked at your four most recent dumps. Each one is a different error code - including 124. This indicates a hardware problem. The fact that you are having trouble booting in the safe mode also indicates a hardware problem. Your uptimes in these dumps are 52.5 seconds, 13.0 seconds, 51.9 seconds, and 1 minute 31.1 seconds. My first thoughts are a faulty power supply unit and/or bad RAM.
You mentioned that you have run Memtest. How many passes did you let it make? You should run it for at least seven passes; this takes 6- 8 hours. Also you should run it from a cold boot after your computer has been off for a while. If you did not run Memtest as described, please run it again. Have you tried removing all but one stick of RAM and seeing how your computer boots and runs?
Do you have or can you borrow another known good power supply to try? Can you test your power supply in another computer?
Unfortunately, your dumps do give us anything specifically. Three of them blame Windows system drivers and the fourth, error code 124, blames hardware. I do see that sptd.sys is still loading in your system. Do a search of your C: drive using Windows Explore for sptd.sys. Rename or delete every occurrence you find. This driver was involved in your crashes.
See if you can update this driver. You can Google this driver and find a lot about how it misbehaves.
ASACPI.sys Wed May 13 21:25:17 2009 - Asus ATK0110 ACPI Utility (
a known BSOD maker in Win7). Also a part of the Asus PCProbe and AISuite Utilities.
ASUSTeK Computer Inc.-Support-.
You also still have this out of date driver loading on your system.
scmndisp.sys Wed Jan 17 02:48:03 2007 - Netgear Neutral Wireless Solution.
Support Home Page. If there is not an update for this driver, the adapter is obsolete. Upgrade to an adapter certified compatible with Win 7.
Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02259000 PsLoadedModuleList = 0xfffff800`02496e50
Debug session time: Sat Dec 18 10:20:23.635 2010 (GMT-5)
System Uptime: 0 days 0:00:52.509
Loading Kernel Symbols
...............................................................
..........................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff800022a5d29}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800022a5d29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800025010e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`022a5d29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: rstrui.exe
TRAP_FRAME: fffff88001efb880 -- (.trap 0xfffff88001efb880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800551c898 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800022a5d29 rsp=fffff88001efba10 rbp=fffff88001ecc180
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`022a5d29 488b5108 mov rdx,qword ptr [rcx+8] ds:2650:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800022c8ca9 to fffff800022c9740
STACK_TEXT:
fffff880`01efb738 fffff800`022c8ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`01efb740 fffff800`022c7920 : fffffa80`00000002 fffffa80`0558db60 fffffa80`05430010 fffff880`01159e92 : nt!KiBugCheckDispatch+0x69
fffff880`01efb880 fffff800`022a5d29 : fffffa80`054300e0 00000000`00000200 00000000`00000000 fffff800`0237d0e4 : nt!KiPageFault+0x260
fffff880`01efba10 fffff800`022a8fec : fffffa80`0558db60 00000000`00000002 00000000`00000000 fffffa80`0551c898 : nt!KiInsertQueueApc+0x1e9
fffff880`01efba40 fffff800`022cc55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff880`01efbaa0 fffff880`0115741a : 00000000`00000200 00000000`00000001 fffffa80`05432010 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff880`01efbb80 fffff880`01157242 : fffffa80`05432010 fffff880`01159b3b fffffa80`05430010 fffffa80`04a481b0 : ataport!IdeCompleteScsiIrp+0x62
fffff880`01efbbb0 fffff880`01151e32 : 00000000`00000000 00000000`00000000 fffffa80`04a38500 fffffa80`04a481b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`01efbbe0 fffff880`0115a7ed : fffffa80`04a371a0 fffffa80`05432010 00000000`00000000 fffffa80`05432010 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`01efbd10 fffff880`0115a0ec : fffffa80`04a371a0 00000000`00000000 fffffa80`04a371a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`01efbe40 fffff800`022d4bfc : fffff880`01ecc180 fffffa80`00000d25 fffffa80`04a37050 fffffa80`04a37118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`01efbf00 fffff800`022cf865 : fffff800`04b7c850 fffffa80`055b1b60 00000000`00000000 fffff880`01159f44 : nt!KiRetireDpcList+0x1bc
fffff880`01efbfb0 fffff800`022cf67c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`045e0b30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`0115741a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Debug session time: Sat Dec 18 09:56:27.136 2010 (GMT-5)
System Uptime: 0 days 0:00:13.010
Loading Kernel Symbols
................................................
Loading User Symbols
Mini Kernel Dump does not contain unloaded driver list
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, fffffa8005284038, 0, 0}
Probably caused by : hardware
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa8005284038, Address of the WHEA_ERROR_RECORD structure.
Arg3: 0000000000000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000000000, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_AuthenticAMD
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`01fb96f0 fffff800`02511a89 : fffffa80`05284010 fffffa80`03d22040 00000000`00000008 00000000`00000001 : nt!WheapCreateLiveTriageDump+0x6c
fffff880`01fb9c10 fffff800`023f3667 : fffffa80`05284010 fffff800`0246c5f8 fffffa80`03d22040 00000002`00000005 : nt!WheapCreateTriageDumpFromPreviousSession+0x49
fffff880`01fb9c40 fffff800`0235bc45 : fffff800`024ce360 fffffa80`04c16b88 fffffa80`04c16b80 fffffa80`03d22040 : nt!WheapProcessWorkQueueItem+0x57
fffff880`01fb9c80 fffff800`022d4961 : fffff880`00c30e00 fffff800`0235bc20 fffffa80`03d22040 00000000`00000000 : nt!WheapWorkQueueWorkerRoutine+0x25
fffff880`01fb9cb0 fffff800`0256bc06 : 00000000`00000000 fffffa80`03d22040 00000000`00000080 fffffa80`03d1b890 : nt!ExpWorkerThread+0x111
fffff880`01fb9d40 fffff800`022a5c26 : fffff880`01e5c180 fffffa80`03d22040 fffff880`01e66fc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`01fb9d80 00000000`00000000 : fffff880`01fba000 fffff880`01fb4000 fffff880`0259e540 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x124_AuthenticAMD_PROCESSOR__UNKNOWN_PRV
BUCKET_ID: X64_0x124_AuthenticAMD_PROCESSOR__UNKNOWN_PRV
Followup: MachineOwner
---------
Debug session time: Sat Dec 18 09:57:06.011 2010 (GMT-5)
System Uptime: 0 days 0:00:51.885
Loading Kernel Symbols
...............................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800022cbcd8, fffff88003c1fab0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800022cbcd8, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88003c1fab0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`022cbcd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CONTEXT: fffff88003c1fab0 -- (.cxr 0xfffff88003c1fab0)
rax=fffff88003c20428 rbx=5f5c415d4120c483 rcx=fffff88001ecc180
rdx=fffff88000e9e719 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800022cbcd8 rsp=fffff88003c20480 rbp=fffff88003c20630
r8=0000000000000100 r9=0000000000000000 r10=0000000000000002
r11=fffffa80052f14e0 r12=0000000000000000 r13=0000000000000000
r14=fffffa800551e7e0 r15=fffff88001ecc180
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KiTryUnwaitThread+0x28:
fffff800`022cbcd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:002b:5f5c415d`4120c4c3=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800022cbcd8
STACK_TEXT:
fffff880`03c20480 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`022cbcd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88003c1fab0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0x3B_nt!KiTryUnwaitThread+28
Followup: MachineOwner
---------
Debug session time: Sat Dec 18 10:10:18.642 2010 (GMT-5)
System Uptime: 0 days 0:01:37.142
Loading Kernel Symbols
...............................................................
..........................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {70f89, 0, 0, 0}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonCleanup+35ee )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 0000000000070f89
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x24
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff880012cdc24 to fffff80002288740
STACK_TEXT:
fffff880`045bef88 fffff880`012cdc24 : 00000000`00000024 00000000`00070f89 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`045bef90 fffff880`01239aa9 : fffff800`024c0808 fffff6fc`50015928 fffff880`045bf4e0 fffff880`045ae000 : Ntfs!NtfsCommonCleanup+0x35ee
fffff880`045bf3a0 fffff800`02297e5a : fffff880`045bf4e0 fffff800`0227ddff fffff6fc`50015928 00000000`00000000 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`045bf3d0 fffff880`01239662 : fffff880`01239a90 fffff880`045bf4e0 fffff880`045bf800 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`045bf4b0 fffff880`012db244 : fffff880`045bf580 fffff880`045bf580 fffff880`045bf580 00000000`00000000 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`045bf520 fffff880`00d6a23f : fffff880`045bf580 fffffa80`067e0c10 fffffa80`067e0fb0 fffffa80`065e1c20 : Ntfs!NtfsFsdCleanup+0x144
fffff880`045bf790 fffff880`00d686df : fffffa80`04bdd920 00000000`00000000 fffffa80`04a66c00 fffffa80`067e0c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045bf820 fffff800`0259ea0f : fffffa80`067e0c10 fffffa80`065b2b30 00000000`00000000 fffffa80`0649c770 : fltmgr!FltpDispatch+0xcf
fffff880`045bf880 fffff800`02584a24 : 00000000`00000000 fffff8a0`01575810 fffff8a0`04aa1050 00000000`0000062c : nt!IopCloseFile+0x11f
fffff880`045bf910 fffff800`0259e501 : fffff8a0`01575810 fffff8a0`00000001 fffff8a0`01575810 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`045bf990 fffff800`02546374 : 00000000`00000008 fffff8a0`01575810 fffff8a0`01d6b020 00000000`00000008 : nt!ObpCloseHandleTableEntry+0xb1
fffff880`045bfa20 fffff800`025462f4 : 00000000`00000004 00000000`00000000 fffffa80`065b2b30 fffff800`0252f9e1 : nt!ObpCloseHandleProcedure+0x30
fffff880`045bfa60 fffff800`0254513e : fffff8a0`01c65a01 00000000`00000001 fffffa80`065b2b30 fffffa80`065b2b30 : nt!ExSweepHandleTable+0x74
fffff880`045bfaa0 fffff800`0256dd18 : fffff8a0`01c65a50 00000000`00000000 00000000`00000000 000007ff`fffde000 : nt!ObKillProcess+0x62
fffff880`045bfae0 fffff800`0254585b : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x878
fffff880`045bfba0 fffff800`02287993 : fffffa80`065b2b30 fffff880`00000000 00000000`00283e70 fffffa80`05e3cb60 : nt!NtTerminateProcess+0x25b
fffff880`045bfc20 00000000`773d001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0019fdf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773d001a
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!NtfsCommonCleanup+35ee
fffff880`012cdc24 49837b4000 cmp qword ptr [r11+40h],0
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsCommonCleanup+35ee
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonCleanup+35ee
BUCKET_ID: X64_0x24_Ntfs!NtfsCommonCleanup+35ee
Followup: MachineOwner
---------