Almost everytime I stream videos on youtube, both of my screens are covered in horizontal lines and then the BSOD appears. I believe that I have the latest drivers but I am not positive if I am getting the correct ones. This is a new computer installation that I put together. All of the specs are listed under User CP.
I will attach the required zip file below. I also included a file of the event after the computer restarted. This is what it gave.
Attachment 150582
Thanks for any help!
These were all caused by your Intel Ethernet driver (elq62x64.sys). Download and install a fresh copy and it should help
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\042211-12012-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c0c000 PsLoadedModuleList = 0xfffff800`02e49e50
Debug session time: Fri Apr 22 11:34:02.601 2011 (GMT-4)
System Uptime: 0 days 0:04:09.881
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {14, 2, 0, fffff8800167e2f8}
Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000014, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167e2f8, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb40e0
0000000000000014
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpPreValidatedReceive+b8
fffff880`0167e2f8 66443b01 cmp r8w,word ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880095faee0 -- (.trap 0xfffff880095faee0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000009a231a04 rbx=0000000000000000 rcx=0000000000000014
rdx=fffffa8005535024 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167e2f8 rsp=fffff880095fb070 rbp=0000000000000005
r8=fffffa8005529669 r9=0000000000000000 r10=0000000080000000
r11=fffff880095fb12a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip!TcpPreValidatedReceive+0xb8:
fffff880`0167e2f8 66443b01 cmp r8w,word ptr [rcx] ds:fdc0:00000000`00000014=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c7bca9 to fffff80002c7c740
STACK_TEXT:
fffff880`095fad98 fffff800`02c7bca9 : 00000000`0000000a 00000000`00000014 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`095fada0 fffff800`02c7a920 : 00000000`00000000 00000000`d152cabf fffff880`01677700 fffffa80`0557a540 : nt!KiBugCheckDispatch+0x69
fffff880`095faee0 fffff880`0167e2f8 : fffffa80`0552c700 00000000`00000000 00000000`00000000 fffffa80`05592000 : nt!KiPageFault+0x260
fffff880`095fb070 fffff880`01680191 : fffffa80`05599669 00000000`000014c0 00000000`00009669 00000000`00000000 : tcpip!TcpPreValidatedReceive+0xb8
fffff880`095fb120 fffff880`01677e22 : fffffa80`054dc230 fffffa80`054d7470 fffffa80`054d0006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x4a1
fffff880`095fb280 fffff800`02c8be5a : 00000000`00000000 fffff880`095f6000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`095fb2d0 fffff880`01677882 : fffff880`01677d80 fffff880`095fb3e0 00000000`00000002 00000028`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`095fb3b0 fffff880`015360eb : fffffa80`054d9010 00000000`00000000 fffffa80`04f2e1a0 00000028`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`095fb420 fffff880`014fffc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`095fb490 fffff880`01479ef1 : fffffa80`04f2e1a0 00000000`00000002 00000000`0000000a fffff880`015365ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`095fb910 fffff880`0414f219 : fffffa80`0549f000 fffffa80`05578d50 fffffa80`05577250 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`095fb960 fffffa80`0549f000 : fffffa80`05578d50 fffffa80`05577250 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
fffff880`095fb968 fffffa80`05578d50 : fffffa80`05577250 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`0549f000
fffff880`095fb970 fffffa80`05577250 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`054a3500 : 0xfffffa80`05578d50
fffff880`095fb978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`054a3500 fffff880`0414f3b4 : 0xfffffa80`05577250
fffff880`095fb980 fffffa80`00000801 : 00000000`00000009 fffffa80`054a3500 fffff880`0414f3b4 fffffa80`0557fd00 : 0xa
fffff880`095fb988 00000000`00000009 : fffffa80`054a3500 fffff880`0414f3b4 fffffa80`0557fd00 fffffa80`05578d50 : 0xfffffa80`00000801
fffff880`095fb990 fffffa80`054a3500 : fffff880`0414f3b4 fffffa80`0557fd00 fffffa80`05578d50 fffffa80`0557fd50 : 0x9
fffff880`095fb998 fffff880`0414f3b4 : fffffa80`0557fd00 fffffa80`05578d50 fffffa80`0557fd50 00000000`0000000a : 0xfffffa80`054a3500
fffff880`095fb9a0 fffffa80`0557fd00 : fffffa80`05578d50 fffffa80`0557fd50 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
fffff880`095fb9a8 fffffa80`05578d50 : fffffa80`0557fd50 00000000`0000000a 0000000a`00000000 fffffa80`0557fcc0 : 0xfffffa80`0557fd00
fffff880`095fb9b0 fffffa80`0557fd50 : 00000000`0000000a 0000000a`00000000 fffffa80`0557fcc0 00000000`00000000 : 0xfffffa80`05578d50
fffff880`095fb9b8 00000000`0000000a : 0000000a`00000000 fffffa80`0557fcc0 00000000`00000000 fffff880`095fbc18 : 0xfffffa80`0557fd50
fffff880`095fb9c0 0000000a`00000000 : fffffa80`0557fcc0 00000000`00000000 fffff880`095fbc18 00000000`00000000 : 0xa
fffff880`095fb9c8 fffffa80`0557fcc0 : 00000000`00000000 fffff880`095fbc18 00000000`00000000 fffffa80`04e296b0 : 0xa`00000000
fffff880`095fb9d0 00000000`00000000 : fffff880`095fbc18 00000000`00000000 fffffa80`04e296b0 00000000`00000000 : 0xfffffa80`0557fcc0
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`0414f219 ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000014, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167e2f8, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000014
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpPreValidatedReceive+b8
fffff880`0167e2f8 66443b01 cmp r8w,word ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880095faee0 -- (.trap 0xfffff880095faee0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000009a231a04 rbx=0000000000000000 rcx=0000000000000014
rdx=fffffa8005535024 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167e2f8 rsp=fffff880095fb070 rbp=0000000000000005
r8=fffffa8005529669 r9=0000000000000000 r10=0000000080000000
r11=fffff880095fb12a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip!TcpPreValidatedReceive+0xb8:
fffff880`0167e2f8 66443b01 cmp r8w,word ptr [rcx] ds:fdc0:00000000`00000014=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c7bca9 to fffff80002c7c740
STACK_TEXT:
fffff880`095fad98 fffff800`02c7bca9 : 00000000`0000000a 00000000`00000014 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`095fada0 fffff800`02c7a920 : 00000000`00000000 00000000`d152cabf fffff880`01677700 fffffa80`0557a540 : nt!KiBugCheckDispatch+0x69
fffff880`095faee0 fffff880`0167e2f8 : fffffa80`0552c700 00000000`00000000 00000000`00000000 fffffa80`05592000 : nt!KiPageFault+0x260
fffff880`095fb070 fffff880`01680191 : fffffa80`05599669 00000000`000014c0 00000000`00009669 00000000`00000000 : tcpip!TcpPreValidatedReceive+0xb8
fffff880`095fb120 fffff880`01677e22 : fffffa80`054dc230 fffffa80`054d7470 fffffa80`054d0006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x4a1
fffff880`095fb280 fffff800`02c8be5a : 00000000`00000000 fffff880`095f6000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`095fb2d0 fffff880`01677882 : fffff880`01677d80 fffff880`095fb3e0 00000000`00000002 00000028`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`095fb3b0 fffff880`015360eb : fffffa80`054d9010 00000000`00000000 fffffa80`04f2e1a0 00000028`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`095fb420 fffff880`014fffc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`095fb490 fffff880`01479ef1 : fffffa80`04f2e1a0 00000000`00000002 00000000`0000000a fffff880`015365ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`095fb910 fffff880`0414f219 : fffffa80`0549f000 fffffa80`05578d50 fffffa80`05577250 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`095fb960 fffffa80`0549f000 : fffffa80`05578d50 fffffa80`05577250 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
fffff880`095fb968 fffffa80`05578d50 : fffffa80`05577250 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`0549f000
fffff880`095fb970 fffffa80`05577250 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`054a3500 : 0xfffffa80`05578d50
fffff880`095fb978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`054a3500 fffff880`0414f3b4 : 0xfffffa80`05577250
fffff880`095fb980 fffffa80`00000801 : 00000000`00000009 fffffa80`054a3500 fffff880`0414f3b4 fffffa80`0557fd00 : 0xa
fffff880`095fb988 00000000`00000009 : fffffa80`054a3500 fffff880`0414f3b4 fffffa80`0557fd00 fffffa80`05578d50 : 0xfffffa80`00000801
fffff880`095fb990 fffffa80`054a3500 : fffff880`0414f3b4 fffffa80`0557fd00 fffffa80`05578d50 fffffa80`0557fd50 : 0x9
fffff880`095fb998 fffff880`0414f3b4 : fffffa80`0557fd00 fffffa80`05578d50 fffffa80`0557fd50 00000000`0000000a : 0xfffffa80`054a3500
fffff880`095fb9a0 fffffa80`0557fd00 : fffffa80`05578d50 fffffa80`0557fd50 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
fffff880`095fb9a8 fffffa80`05578d50 : fffffa80`0557fd50 00000000`0000000a 0000000a`00000000 fffffa80`0557fcc0 : 0xfffffa80`0557fd00
fffff880`095fb9b0 fffffa80`0557fd50 : 00000000`0000000a 0000000a`00000000 fffffa80`0557fcc0 00000000`00000000 : 0xfffffa80`05578d50
fffff880`095fb9b8 00000000`0000000a : 0000000a`00000000 fffffa80`0557fcc0 00000000`00000000 fffff880`095fbc18 : 0xfffffa80`0557fd50
fffff880`095fb9c0 0000000a`00000000 : fffffa80`0557fcc0 00000000`00000000 fffff880`095fbc18 00000000`00000000 : 0xa
fffff880`095fb9c8 fffffa80`0557fcc0 : 00000000`00000000 fffff880`095fbc18 00000000`00000000 fffffa80`04e296b0 : 0xa`00000000
fffff880`095fb9d0 00000000`00000000 : fffff880`095fbc18 00000000`00000000 fffffa80`04e296b0 00000000`00000000 : 0xfffffa80`0557fcc0
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`0414f219 ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------