Hi nireagle and Welcome.
Your dumpfiles are displaying a wide range of stop errors. This usually, but not always, indicates hardware problems.
Old and incompatible drives can and do cause issues with Windows 7 and you ought to sort those out first. But be prepared for ongoing investigations.
Based on your latest dump file
STOP 0x0000007E: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Usual causes: Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control,
Your latest dump file blames ntkrnlmp.exe which is a Windows System file and is highly unlikely to be the cause.
As a Priority:
Your Avast AV has been specifically mentioned in a couple of your dump files.
Avast has sometimes been known to be the cause of BSOD's on some Win 7 systems.
Uninstall Avast using the Avast ASW Clear Tool at least until your issue is resolved. Download Microsoft Security Essentials as its replacement. Make sure Windows firewall is enabled.
The sptd.sys driver is notorious for causing BSOD's with Windows 7. It's used by Daemon Tools /Alcohol 120 which will also have to be uninstalled.
Then use the correct (either 32bit or 64bit) download from Duplex Secure to uninstall the SPTD.SYS driver.
Make sure to select uninstall!
Virtual Drives
Some alternatives to DT/Alcohol that do not use SPTD.SYS (In no order).
DVDFab
MagicDisc
PowerISO (The program is a trial but the drive emulation is free forever).
Bugcheck Analysis
Code:
Loading Dump File [C:\DUMPS\nireagle\020111-76187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x84c0a000 PsLoadedModuleList = 0x84d4a5b0
Debug session time: Wed Feb 2 07:40:35.859 2011 (UTC + 0:00)
System Uptime: 0 days 0:02:50.453
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 84c78ab5, 80ec1a60, 80ec1640}
Probably caused by : ntkrnlmp.exe ( nt!RtlImageNtHeaderEx+4a )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 84c78ab5, The address that the exception occurred at
Arg3: 80ec1a60, Exception Record Address
Arg4: 80ec1640, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!RtlImageNtHeaderEx+4a
84c78ab5 663902 cmp word ptr [edx],ax
EXCEPTION_RECORD: 80ec1a60 -- (.exr 0xffffffff80ec1a60)
ExceptionAddress: 84c78ab5 (nt!RtlImageNtHeaderEx+0x0000004a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 7ffa0000
Attempt to read from address 7ffa0000
CONTEXT: 80ec1640 -- (.cxr 0xffffffff80ec1640)
eax=00005a4d ebx=8911a8f4 ecx=00000000 edx=7ffa0000 esi=00000000 edi=80ec1b3c
eip=84c78ab5 esp=80ec1b28 ebp=80ec1b28 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!RtlImageNtHeaderEx+0x4a:
84c78ab5 663902 cmp word ptr [edx],ax ds:0023:7ffa0000=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: GetPopupInfo.e
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 7ffa0000
READ_ADDRESS: GetPointerFromAddress: unable to read from 84d6a700
Unable to read MiSystemVaType memory at 84d4a100
7ffa0000
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+4a
84c78ab5 663902 cmp word ptr [edx],ax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 84c7fb29 to 84c78ab5
STACK_TEXT:
80ec1b28 84c7fb29 00000000 00000000 8911a6b8 nt!RtlImageNtHeaderEx+0x4a
80ec1b5c 84c1b418 876930d2 00000000 00000002 nt!RtlImageNtHeader+0x1a
80ec1bec 85013924 85013b48 8911a600 00000206 nt!EtwpCCSwapTrace+0x433
80ec1d00 84c65183 80003b28 00000000 876d0688 hal!HalpDispatchSoftwareInterrupt+0x5e
80ec1d50 84df3400 00000001 a62855b1 00000000 nt!ExpWorkerThread+0x10d
80ec1d90 84c93969 84c65076 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!RtlImageNtHeaderEx+4a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78a06
STACK_COMMAND: .cxr 0xffffffff80ec1640 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 84c78ab5, The address that the exception occurred at
Arg3: 80ec1a60, Exception Record Address
Arg4: 80ec1640, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!RtlImageNtHeaderEx+4a
84c78ab5 663902 cmp word ptr [edx],ax
EXCEPTION_RECORD: 80ec1a60 -- (.exr 0xffffffff80ec1a60)
ExceptionAddress: 84c78ab5 (nt!RtlImageNtHeaderEx+0x0000004a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 7ffa0000
Attempt to read from address 7ffa0000
CONTEXT: 80ec1640 -- (.cxr 0xffffffff80ec1640)
eax=00005a4d ebx=8911a8f4 ecx=00000000 edx=7ffa0000 esi=00000000 edi=80ec1b3c
eip=84c78ab5 esp=80ec1b28 ebp=80ec1b28 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!RtlImageNtHeaderEx+0x4a:
84c78ab5 663902 cmp word ptr [edx],ax ds:0023:7ffa0000=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: GetPopupInfo.e
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 7ffa0000
READ_ADDRESS: GetPointerFromAddress: unable to read from 84d6a700
Unable to read MiSystemVaType memory at 84d4a100
7ffa0000
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+4a
84c78ab5 663902 cmp word ptr [edx],ax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 84c7fb29 to 84c78ab5
STACK_TEXT:
80ec1b28 84c7fb29 00000000 00000000 8911a6b8 nt!RtlImageNtHeaderEx+0x4a
80ec1b5c 84c1b418 876930d2 00000000 00000002 nt!RtlImageNtHeader+0x1a
80ec1bec 85013924 85013b48 8911a600 00000206 nt!EtwpCCSwapTrace+0x433
80ec1d00 84c65183 80003b28 00000000 876d0688 hal!HalpDispatchSoftwareInterrupt+0x5e
80ec1d50 84df3400 00000001 a62855b1 00000000 nt!ExpWorkerThread+0x10d
80ec1d90 84c93969 84c65076 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!RtlImageNtHeaderEx+4a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78a06
STACK_COMMAND: .cxr 0xffffffff80ec1640 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
Followup: MachineOwner
Outdated Drivers. Update:
nvlddmkm.sys Thu May 14 21:32:27 2009 nVidia Graphics Driver.
SahdIa32.sys Tue Oct 28 03:55:58 2008
SaibIa32.sys Tue Oct 28 03:56:02 2008
SaibVd32.sys Tue Oct 28 03:56:06 2008 Sonic Solutions Drivers (used by many different CD/DVD programs). See the Mfr. of your CD/DVD programs.
Drivers:
Code:
8575f000 857a7000 ACPI ACPI.sys Sat Nov 20 08:37:52 2010 (4CE788E0)
98036000 98090000 afd afd.sys Sat Nov 20 08:40:00 2010 (4CE78960)
997b0000 997c2000 AgileVpn AgileVpn.sys Tue Jul 14 00:55:00 2009 (4A5BC954)
9976c000 997a3000 aiplejsq aiplejsq.SYS Fri Aug 07 14:29:49 2009 (4A7C2C4D)
8d8a8000 8d8b1000 amdxata amdxata.sys Fri Mar 19 16:19:01 2010 (4BA3A3F5)
997fd000 99800000 aswFsBlk aswFsBlk.SYS Thu May 06 21:33:45 2010 (4BE327A9)
8dbe2000 8dbf8980 aswFW aswFW.SYS Thu May 06 21:41:28 2010 (4BE32978)
983e7000 983fe000 aswMonFlt aswMonFlt.sys Thu May 06 21:34:09 2010 (4BE327C1)
8de03000 8de04500 aswNdis aswNdis.sys Wed Jan 06 20:04:01 2010 (4B44ECB1)
8dc36000 8dc62d80 aswNdis2 aswNdis2.sys Thu May 06 21:40:47 2010 (4BE3294F)
98090000 98094100 aswRdr aswRdr.SYS Thu May 06 21:34:25 2010 (4BE327D1)
8df64000 8dfb4000 aswSnx aswSnx.SYS Thu May 06 21:41:11 2010 (4BE32967)
9822d000 98253680 aswSP aswSP.SYS Thu May 06 21:38:58 2010 (4BE328E2)
8541b000 85424c00 aswTdi aswTdi.SYS Thu May 06 21:39:21 2010 (4BE328F9)
8d87c000 8d885000 atapi atapi.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
8d885000 8d8a8000 ataport ataport.SYS Sat Nov 20 08:38:00 2010 (4CE788E8)
82770000 827bd000 ATMFD ATMFD.DLL Sat Nov 20 09:06:57 2010 (4CE78FB1)
85400000 8540b000 BATTC BATTC.SYS Tue Jul 14 00:19:15 2009 (4A5BC0F3)
8dfbb000 8dfc2000 Beep Beep.SYS Tue Jul 14 00:45:00 2009 (4A5BC6FC)
9821f000 9822d000 blbdrive blbdrive.sys Tue Jul 14 00:23:04 2009 (4A5BC1D8)
854c3000 854cb000 BOOTVID BOOTVID.dll Tue Jul 14 02:04:34 2009 (4A5BD9A2)
a188b000 a18a4000 bowser bowser.sys Tue Jul 14 00:14:21 2009 (4A5BBFCD)
82750000 8276e000 cdd cdd.dll Sat Nov 20 11:56:35 2010 (4CE7B773)
98371000 98390000 cdrom cdrom.sys Sat Nov 20 08:38:09 2010 (4CE788F1)
8550d000 855b8000 CI CI.dll Sat Nov 20 12:05:17 2010 (4CE7B97D)
8deee000 8df13000 CLASSPNP CLASSPNP.SYS Tue Jul 14 00:11:20 2009 (4A5BBF18)
854cb000 8550d000 CLFS CLFS.SYS Tue Jul 14 00:11:10 2009 (4A5BBF0E)
8da6d000 8daca000 cng cng.sys Tue Jul 14 00:32:55 2009 (4A5BC427)
857f5000 857fd000 compbatt compbatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
997a3000 997b0000 CompositeBus CompositeBus.sys Sat Nov 20 09:50:21 2010 (4CE799DD)
a1b93000 a1b96180 cpuz132_x32 cpuz132_x32.sys Sat Mar 07 10:04:25 2009 (49B246A9)
9839a000 983a7000 crashdmp crashdmp.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
981a3000 98207000 csc csc.sys Sat Nov 20 08:44:32 2010 (4CE78A70)
98207000 9821f000 dfsc dfsc.sys Sat Nov 20 08:42:32 2010 (4CE789F8)
98197000 981a3000 discache discache.sys Tue Jul 14 00:24:04 2009 (4A5BC214)
8dedd000 8deee000 disk disk.sys Tue Jul 14 00:11:28 2009 (4A5BBF20)
983b2000 983bb000 dump_atapi dump_atapi.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
983a7000 983b2000 dump_dumpata dump_dumpata.sys Tue Jul 14 00:11:16 2009 (4A5BBF14)
983bb000 983cc000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:12:47 2009 (4A5BBF6F)
98390000 9839a000 Dxapi Dxapi.sys Tue Jul 14 00:25:25 2009 (4A5BC265)
9957f000 99636000 dxgkrnl dxgkrnl.sys Sat Nov 20 09:08:14 2010 (4CE78FFE)
99636000 9966f000 dxgmms1 dxgmms1.sys Sat Nov 20 09:07:03 2010 (4CE78FB7)
a19f2000 a1a1c000 fastfat fastfat.SYS Tue Jul 14 00:14:01 2009 (4A5BBFB9)
9972f000 9973a000 fdc fdc.sys Tue Jul 14 00:45:45 2009 (4A5BC729)
8d8e5000 8d8f6000 fileinfo fileinfo.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
98356000 98360000 flpydisk flpydisk.sys Tue Jul 14 00:45:45 2009 (4A5BC729)
8d8b1000 8d8e5000 fltmgr fltmgr.sys Tue Jul 14 00:11:13 2009 (4A5BBF11)
8dad8000 8dae1000 Fs_Rec Fs_Rec.sys Tue Jul 14 00:11:14 2009 (4A5BBF12)
8deab000 8dedd000 fvevol fvevol.sys Sat Nov 20 08:40:22 2010 (4CE78976)
8ddd2000 8de03000 fwpkclnt fwpkclnt.sys Sat Nov 20 08:39:08 2010 (4CE7892C)
8500e000 85045000 hal halmacpi.dll Sat Nov 20 08:37:38 2010 (4CE788D2)
a1806000 a188b000 HTTP HTTP.sys Sat Nov 20 08:40:17 2010 (4CE78971)
8dea3000 8deab000 hwpolicy hwpolicy.sys Sat Nov 20 08:37:35 2010 (4CE788CF)
9973a000 99752000 i8042prt i8042prt.sys Tue Jul 14 00:11:23 2009 (4A5BBF1B)
a1947000 a195b000 idmwfp idmwfp.sys Fri Sep 24 14:56:51 2010 (4C9CAE23)
98275000 98287000 intelppm intelppm.sys Tue Jul 14 00:11:03 2009 (4A5BBF07)
99752000 9975f000 kbdclass kbdclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
887d8000 887e0000 kdcom kdcom.dll Tue Jul 14 02:08:58 2009 (4A5BDAAA)
982d0000 98304000 ks ks.sys Sat Nov 20 09:50:17 2010 (4CE799D9)
8da5a000 8da6d000 ksecdd ksecdd.sys Sat Nov 20 08:38:54 2010 (4CE7891E)
8dc63000 8dc88000 ksecpkg ksecpkg.sys Tue Jul 14 00:34:00 2009 (4A5BC468)
9801a000 9802a000 lltdio lltdio.sys Tue Jul 14 00:53:18 2009 (4A5BC8EE)
983cc000 983e7000 luafv luafv.sys Tue Jul 14 00:15:44 2009 (4A5BC020)
8542d000 854b2000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 12:00:54 2010 (4CE7B876)
a1b88000 a1b93000 monitor monitor.sys Tue Jul 14 00:25:58 2009 (4A5BC286)
9975f000 9976c000 mouclass mouclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
8d866000 8d87c000 mountmgr mountmgr.sys Sat Nov 20 08:38:09 2010 (4CE788F1)
a18a4000 a18b6000 mpsdrv mpsdrv.sys Tue Jul 14 00:52:52 2009 (4A5BC8D4)
a18b6000 a18d9000 mrxsmb mrxsmb.sys Sat Nov 20 08:42:40 2010 (4CE78A00)
a18d9000 a1914000 mrxsmb10 mrxsmb10.sys Sat Nov 20 08:44:15 2010 (4CE78A5F)
a1914000 a192f000 mrxsmb20 mrxsmb20.sys Sat Nov 20 08:42:47 2010 (4CE78A07)
8dc18000 8dc23000 Msfs Msfs.SYS Tue Jul 14 00:11:26 2009 (4A5BBF1E)
857a7000 857af000 msisadrv msisadrv.sys Tue Jul 14 00:11:09 2009 (4A5BBF0D)
8da2f000 8da5a000 msrpc msrpc.sys Tue Jul 14 00:11:59 2009 (4A5BBF3F)
9818d000 98197000 mssmbios mssmbios.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
8de93000 8dea3000 mup mup.sys Tue Jul 14 00:14:14 2009 (4A5BBFC6)
8dae1000 8db98000 ndis ndis.sys Sat Nov 20 08:39:19 2010 (4CE78937)
997da000 997e5000 ndistapi ndistapi.sys Tue Jul 14 00:54:24 2009 (4A5BC930)
98287000 982a9000 ndiswan ndiswan.sys Sat Nov 20 10:07:48 2010 (4CE79DF4)
98360000 98371000 NDProxy NDProxy.SYS Sat Nov 20 10:07:39 2010 (4CE79DEB)
980ed000 980fb000 netbios netbios.sys Tue Jul 14 00:53:54 2009 (4A5BC912)
98095000 980c7000 netbt netbt.sys Sat Nov 20 08:39:22 2010 (4CE7893A)
8db98000 8dbd6000 NETIO NETIO.SYS Sat Nov 20 08:40:03 2010 (4CE78963)
8dc23000 8dc31000 Npfs Npfs.SYS Tue Jul 14 00:11:31 2009 (4A5BBF23)
98183000 9818d000 nsiproxy nsiproxy.sys Tue Jul 14 00:12:08 2009 (4A5BBF48)
84c0a000 8500e000 nt ntkrnlmp.exe Sat Nov 20 08:42:46 2010 (4CE78A06)
8d900000 8da2f000 Ntfs Ntfs.sys Sat Nov 20 08:39:08 2010 (4CE7892C)
8dfb4000 8dfbb000 Null Null.SYS Tue Jul 14 00:11:12 2009 (4A5BBF10)
98c19000 9957e940 nvlddmkm nvlddmkm.sys Thu May 14 21:32:27 2009 (4A0C7FDB)
980ce000 980ed000 pacer pacer.sys Tue Jul 14 00:53:58 2009 (4A5BC916)
857e4000 857f5000 partmgr partmgr.sys Sat Nov 20 08:38:14 2010 (4CE788F6)
857ba000 857e4000 pci pci.sys Sat Nov 20 08:37:57 2010 (4CE788E5)
8d851000 8d858000 pciide pciide.sys Tue Jul 14 00:11:19 2009 (4A5BBF17)
8d858000 8d866000 PCIIDEX PCIIDEX.SYS Tue Jul 14 00:11:15 2009 (4A5BBF13)
8daca000 8dad8000 pcw pcw.sys Tue Jul 14 00:11:10 2009 (4A5BBF0E)
a195b000 a19f2000 peauth peauth.sys Tue Jul 14 01:35:44 2009 (4A5BD2E0)
854b2000 854c3000 PSHED PSHED.dll Tue Jul 14 02:09:36 2009 (4A5BDAD0)
8d8f6000 8d8ff4c0 PxHelp20 PxHelp20.sys Tue Oct 20 18:57:50 2009 (4ADDFA1E)
997c2000 997da000 rasl2tp rasl2tp.sys Tue Jul 14 00:54:33 2009 (4A5BC939)
997e5000 997fd000 raspppoe raspppoe.sys Tue Jul 14 00:54:53 2009 (4A5BC94D)
98c00000 98c17000 raspptp raspptp.sys Tue Jul 14 00:54:47 2009 (4A5BC947)
982a9000 982c0000 rassstp rassstp.sys Tue Jul 14 00:54:57 2009 (4A5BC951)
98142000 98183000 rdbss rdbss.sys Sat Nov 20 08:42:44 2010 (4CE78A04)
982c0000 982ca000 rdpbus rdpbus.sys Tue Jul 14 01:02:40 2009 (4A5BCB20)
8dc00000 8dc08000 RDPCDD RDPCDD.sys Sat Nov 20 10:22:19 2010 (4CE7A15B)
8dc08000 8dc10000 rdpencdd rdpencdd.sys Tue Jul 14 01:01:39 2009 (4A5BCAE3)
8dc10000 8dc18000 rdprefmp rdprefmp.sys Tue Jul 14 01:01:41 2009 (4A5BCAE5)
8de55000 8de82000 rdyboost rdyboost.sys Sat Nov 20 09:00:07 2010 (4CE78E17)
8df13000 8df26000 rspndr rspndr.sys Tue Jul 14 00:53:20 2009 (4A5BC8F0)
996d4000 99725000 Rt86win7 Rt86win7.sys Thu Nov 11 06:35:06 2010 (4CDB8E9A)
8de8a000 8de93000 SahdIa32 SahdIa32.sys Tue Oct 28 03:55:58 2008 (49068D4E)
8de82000 8de8a000 SaibIa32 SaibIa32.sys Tue Oct 28 03:56:02 2008 (49068D52)
98139000 98142000 SaibVd32 SaibVd32.sys Tue Oct 28 03:56:06 2008 (49068D56)
85739000 8575f000 SCSIPORT SCSIPORT.SYS Sat Nov 20 09:50:55 2010 (4CE799FF)
a1a1c000 a1a26000 secdrv secdrv.SYS Wed Sep 13 14:18:32 2006 (45080528)
982ca000 982cff00 seehcri seehcri.sys Wed Jan 09 08:41:37 2008 (478488C1)
99725000 9972f000 serenum serenum.sys Tue Jul 14 00:45:27 2009 (4A5BC717)
980fb000 98115000 serial serial.sys Tue Jul 14 00:45:33 2009 (4A5BC71D)
8de4d000 8de55000 spldr spldr.sys Mon May 11 17:13:47 2009 (4A084EBB)
a1a26000 a1a90000 spsys spsys.sys Mon May 11 17:37:10 2009 (4A085436)
85637000 85730000 sptd sptd.sys Thu Apr 08 02:28:24 2010 (4BBD3138)
a1b0e000 a1b5f000 srv srv.sys Sat Nov 20 08:45:29 2010 (4CE78AA9)
a1abf000 a1b0e000 srv2 srv2.sys Sat Nov 20 08:44:35 2010 (4CE78A73)
a1a9e000 a1abf000 srvnet srvnet.sys Sat Nov 20 08:44:27 2010 (4CE78A6B)
98c17000 98c18380 swenum swenum.sys Tue Jul 14 00:45:08 2009 (4A5BC704)
8dc88000 8ddd2000 tcpip tcpip.sys Sat Nov 20 08:41:36 2010 (4CE789C0)
a1a90000 a1a9d000 tcpipreg tcpipreg.sys Sat Nov 20 10:07:13 2010 (4CE79DD1)
8dbd6000 8dbe2000 TDI TDI.SYS Sat Nov 20 08:39:18 2010 (4CE78936)
8df45000 8df5c000 tdx tdx.sys Sat Nov 20 08:39:17 2010 (4CE78935)
98128000 98139000 termdd termdd.sys Sat Nov 20 10:21:10 2010 (4CE7A116)
82720000 82729000 TSDDD TSDDD.dll unavailable (00000000)
a1a9d000 a1a9dd00 TuneUpUtilitiesDriver32 TuneUpUtilitiesDriver32.sys Thu Sep 17 12:54:55 2009 (4AB2238F)
98254000 98275000 tunnel tunnel.sys Sat Nov 20 10:06:40 2010 (4CE79DB0)
98304000 98312000 umbus umbus.sys Sat Nov 20 10:00:23 2010 (4CE79C37)
996c5000 996d4000 usbehci usbehci.sys Tue Jul 14 00:51:14 2009 (4A5BC872)
98312000 98356000 usbhub usbhub.sys Sat Nov 20 10:00:34 2010 (4CE79C42)
9967a000 996c5000 USBPORT USBPORT.SYS Tue Jul 14 00:51:13 2009 (4A5BC871)
9966f000 9967a000 usbuhci usbuhci.sys Tue Jul 14 00:51:10 2009 (4A5BC86E)
857af000 857ba000 vdrvroot vdrvroot.sys Tue Jul 14 00:46:19 2009 (4A5BC74B)
8dfc2000 8dfce000 vga vga.sys Tue Jul 14 00:25:50 2009 (4A5BC27E)
8dfce000 8dfef000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:25:49 2009 (4A5BC27D)
8de05000 8de0d380 vmstorfl vmstorfl.sys Sat Nov 20 09:14:37 2010 (4CE7917D)
8540b000 8541b000 volmgr volmgr.sys Sat Nov 20 08:38:06 2010 (4CE788EE)
8d806000 8d851000 volmgrx volmgrx.sys Tue Jul 14 00:11:41 2009 (4A5BBF2D)
8de0e000 8de4d000 volsnap volsnap.sys Sat Nov 20 08:38:13 2010 (4CE788F5)
98115000 98128000 wanarp wanarp.sys Sat Nov 20 10:07:45 2010 (4CE79DF1)
8dfef000 8dffc000 watchdog watchdog.sys Tue Jul 14 00:24:10 2009 (4A5BC21A)
855b8000 85629000 Wdf01000 Wdf01000.sys Tue Jul 14 00:11:36 2009 (4A5BBF28)
85629000 85637000 WDFLDR WDFLDR.SYS Tue Jul 14 00:11:25 2009 (4A5BBF1D)
980c7000 980ce000 wfplwf wfplwf.sys Tue Jul 14 00:53:51 2009 (4A5BC90F)
824c0000 8270c000 win32k win32k.sys Sat Nov 20 09:08:31 2010 (4CE7900F)
85730000 85739000 WMILIB WMILIB.SYS Tue Jul 14 00:11:22 2009 (4A5BBF1A)
98000000 9801a000 WudfPf WudfPf.sys Sat Nov 20 09:58:55 2010 (4CE79BDF)
Unloaded modules:
a1b6f000 a1b88000 drmk.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
a1b68000 a1b6f000 drmkaud.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00007000
a1b66000 a1b68000 MSTEE.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
a1b63000 a1b66000 MSKSSRV.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00003000
a1b61000 a1b63000 MSPQM.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
a1b5f000 a1b61000 MSPCLOCK.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
a192f000 a1947000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
8df13000 8df20000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
8df20000 8df2b000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
8df2b000 8df34000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
8df34000 8df45000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
8df45000 8df64000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001F00
Let us know how it goes. If you get further problems with blue screens, attach your new dump files and details and we'll move on from there.