Very sorry to hear you're still undergoing BSOD related issues my friend, I know how stressful they can be. I'm sure we'll all do our best here to get you BSOD free!
I took a look at multiple dumps, it's a trade off between the FE and D1 bugchecks, some 0XA bugchecks there too. (Bugcode USB Driver) or (DRIVER IRQL NOT LESS OR EQUAL). Tons of usbhub.sys errors.
BUGCODE_USB_DRIVER (fe) is generally caused by a bad USB connection / port or hub. I would recommend running your system BARE using only the keyboard and mouse. I would recommend swapping out both the keyboard and mouse (or one at a time). I would also mess around with various USB ports when running bare to ensure that it isn't a bad USB hub / port.
Onto the other things I have noticed. Whether it's a coincidence or not, the IRQL bugchecks all listed the process fault as uTorrent.exe, so for now... I'd disable uTorrent or uninstall it for testing purposes.
Another thing I have noticed is in a few dumps in mentions the inability to load the symbols and timestamps for NETw5s64.sys. NETw5s64.sys is the driver for the Intel 5100 Wifi, which can be updated here.
To uninstall your current network drivers (remember to download new version of network drivers first!!!!!!) follow these great instructions provided by writhziden:
- Click Start Menu
- Right Click My Computer/Computer
- Click Manage
- Click Device Manager from the list on the left
- Find the device you are trying to uninstall by expanding the appropriate set of devices
- Right click the device
- Click Uninstall (do not click OK in the dialog box that pops up after hitting Uninstall)
- Put a tick in Delete driver software for this device (if this option is available, otherwise just hit OK) and hit OK
- Install the latest driver for the device.
Code:
BugCheck A, {0, 2, 0, fffff800031f5477}
Unable to load image \SystemRoot\system32\DRIVERS\NETw5s64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for NETw5s64.sys
*** ERROR: Module load completed but symbols could not be loaded for NETw5s64.sys
Probably caused by : NETw5s64.sys ( NETw5s64+b76b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800031f5477, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eba0e8
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalpDmaNextContiguousPiece+103
fffff800`031f5477 448b08 mov r9d,dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff8800de4c540 -- (.trap 0xfffff8800de4c540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000018c
rdx=000000000000018c rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031f5477 rsp=fffff8800de4c6d8 rbp=0000000000000000
r8=000000000000001c r9=0000000000000000 r10=00000000000fffff
r11=fffffa8005e43970 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
hal!HalpDmaNextContiguousPiece+0x103:
fffff800`031f5477 448b08 mov r9d,dword ptr [rax] ds:0001:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c88be9 to fffff80002c89640
STACK_TEXT:
fffff880`0de4c3f8 fffff800`02c88be9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0de4c400 fffff800`02c87860 : fffffa80`0a93ddc0 fffff880`05654c2e fffffa80`045cbb20 fffffa80`04dadc10 : nt!KiBugCheckDispatch+0x69
fffff880`0de4c540 fffff800`031f5477 : fffffa80`04126b40 fffffa80`04026e74 fffff800`031f5524 fffffa80`04dadc10 : nt!KiPageFault+0x260
fffff880`0de4c6d8 fffff800`031f5524 : fffffa80`04dadc10 fffffa80`05e43970 fffffa80`05e43670 00000000`00000000 : hal!HalpDmaNextContiguousPiece+0x103
fffff880`0de4c6f0 fffff800`031f84fb : fffffa80`04dadc10 fffffa80`05e43970 fffffa80`04126b40 fffffa80`04ad1fd8 : hal!HalpDmaMapScatterTransfer+0x34
fffff880`0de4c740 fffff800`031f8472 : fffffa80`04dadc10 fffffa80`04dadc08 00000000`0000001c 00000000`00000000 : hal!HalpMapTransfer+0x7b
fffff880`0de4c7d0 fffff800`031f794f : 00000000`00000000 fffff800`031f4fb9 00000000`00000000 00000000`00000003 : hal!IoMapTransfer+0x8e
fffff880`0de4c810 fffff800`031f7afd : fffffa80`057f4050 fffffa80`05e43970 00000000`00000001 fffffa80`000003f7 : hal!HalpAllocateAdapterCallback+0xc7
fffff880`0de4c8b0 fffff800`031f8156 : fffffa80`05e43970 00000000`00000000 fffffa80`05e43900 00000000`00000003 : hal!IoFreeAdapterChannel+0x109
fffff880`0de4c8e0 fffff800`031f771f : fffffa80`0418db70 00000000`00000050 fffffa80`05e43970 fffffa80`03f812e0 : hal!HalAllocateAdapterChannel+0x11a
fffff880`0de4c920 fffff880`014f7750 : fffffa80`04720290 fffffa80`05e435e0 fffffa80`000000a0 fffff880`058a1d50 : hal!HalBuildScatterGatherList+0x2f3
fffff880`0de4c990 fffff880`0565d76b : fffffa80`057f41a0 00000000`00000000 fffffa80`043c9dc0 fffff880`05802c30 : ndis!NdisMAllocateNetBufferSGList+0x110
fffff880`0de4ca30 fffffa80`057f41a0 : 00000000`00000000 fffffa80`043c9dc0 fffff880`05802c30 00000000`00000000 : NETw5s64+0xb76b
fffff880`0de4ca38 00000000`00000000 : fffffa80`043c9dc0 fffff880`05802c30 00000000`00000000 00000050`00000100 : 0xfffffa80`057f41a0
STACK_COMMAND: kb
FOLLOWUP_IP:
NETw5s64+b76b
fffff880`0565d76b ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: NETw5s64+b76b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETw5s64
IMAGE_NAME: NETw5s64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b13ae9c
FAILURE_BUCKET_ID: X64_0xA_NETw5s64+b76b
BUCKET_ID: X64_0xA_NETw5s64+b76b
Followup: MachineOwner
Code:
BUGCODE_USB_DRIVER (fe)
USB Driver bugcheck, first parameter is USB bugcheck code.
Arguments:
Arg1: 0000000000000008, USBBUGCODE_RESERVED_USBHUB
Arg2: 0000000000000006, USBHUB_TRAP_FATAL_TIMEOUT
Arg3: 0000000000000005, TimeoutCode: Timeout_PCE_Suspend_Action3 - PortData->PortSuspendEvent
Arg4: fffffa8006793b20, TimeoutContext - PortData
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFE
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8800426ba60 to fffff80002cd1640
STACK_TEXT:
fffff880`031cbc18 fffff880`0426ba60 : 00000000`000000fe 00000000`00000008 00000000`00000006 00000000`00000005 : nt!KeBugCheckEx
fffff880`031cbc20 fffff800`02fc7f33 : fffffa80`054ed050 00000000`00000001 ffffffff`dc3a58a0 fffff800`02e6e658 : usbhub!UsbhHubProcessChangeWorker+0xec
fffff880`031cbc80 fffff800`02cdba21 : fffff800`02e6e600 fffff800`02fc7f01 fffffa80`03e75600 fffffa80`063ab980 : nt!IopProcessWorkItem+0x23
fffff880`031cbcb0 fffff800`02f6ecce : fffffa80`03ec9060 fffffa80`03e75680 00000000`00000080 fffffa80`03e5f990 : nt!ExpWorkerThread+0x111
fffff880`031cbd40 fffff800`02cc2fe6 : fffff880`02fd5180 fffffa80`03e75680 fffff880`02fdffc0 fffff800`02de4ad4 : nt!PspSystemThreadStartup+0x5a
fffff880`031cbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
usbhub!UsbhHubProcessChangeWorker+ec
fffff880`0426ba60 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: usbhub!UsbhHubProcessChangeWorker+ec
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbhub
IMAGE_NAME: usbhub.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a68e
FAILURE_BUCKET_ID: X64_0xFE_usbhub!UsbhHubProcessChangeWorker+ec
BUCKET_ID: X64_0xFE_usbhub!UsbhHubProcessChangeWorker+ec
Followup: MachineOwner
Code:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000030, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800583d524, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f060e8
0000000000000030
CURRENT_IRQL: 2
FAULTING_IP:
NETw5s64+1b4524
fffff880`0583d524 488b4930 mov rcx,qword ptr [rcx+30h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff8800b8ea760 -- (.trap 0xfffff8800b8ea760)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80049f9c88 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800583d524 rsp=fffff8800b8ea8f0 rbp=0000000000000048
r8=fffffa80047e4e70 r9=fffff8800b8ea920 r10=078bb256f3ab3276
r11=fffff8800b8ea8e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
NETw5s64+0x1b4524:
fffff880`0583d524 488b4930 mov rcx,qword ptr [rcx+30h] ds:b300:00000000`00000030=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd4be9 to fffff80002cd5640
STACK_TEXT:
fffff880`0b8ea618 fffff800`02cd4be9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b8ea620 fffff800`02cd3860 : fffffa80`044db000 00000000`00000001 00000000`00000002 fffffa80`049f9c30 : nt!KiBugCheckDispatch+0x69
fffff880`0b8ea760 fffff880`0583d524 : fffffa80`044db000 00000000`00000001 fffffa80`0657b300 fffff800`02c11472 : nt!KiPageFault+0x260
fffff880`0b8ea8f0 fffffa80`044db000 : 00000000`00000001 fffffa80`0657b300 fffff800`02c11472 fffffa80`047e4eb8 : NETw5s64+0x1b4524
fffff880`0b8ea8f8 00000000`00000001 : fffffa80`0657b300 fffff800`02c11472 fffffa80`047e4eb8 fffffa80`047e4eb0 : 0xfffffa80`044db000
fffff880`0b8ea900 fffffa80`0657b300 : fffff800`02c11472 fffffa80`047e4eb8 fffffa80`047e4eb0 00000000`00000000 : 0x1
fffff880`0b8ea908 fffff800`02c11472 : fffffa80`047e4eb8 fffffa80`047e4eb0 00000000`00000000 00000000`00000000 : 0xfffffa80`0657b300
fffff880`0b8ea910 fffff800`02c109ce : fffffa80`047e4eb8 fffff800`02c0dfb9 00000000`00000000 00000000`00000003 : hal!IoMapTransfer+0x8e
fffff880`0b8ea950 fffff800`02c10afd : fffffa80`0568e050 fffffa80`05dfc130 00000000`00000001 fffffa80`00000000 : hal!HalpAllocateAdapterCallback+0x146
fffff880`0b8ea9f0 fffff800`02c11156 : fffffa80`05dfc130 00000000`00000500 fffffa80`05dfc100 00000000`00000003 : hal!IoFreeAdapterChannel+0x109
fffff880`0b8eaa20 fffff800`02c1071f : fffffa80`044a92f0 00000000`000005da fffffa80`05dfc130 fffffa80`04cd4f10 : hal!HalAllocateAdapterChannel+0x11a
fffff880`0b8eaa60 fffff880`01500750 : fffffa80`041b9210 fffffa80`05e8fd70 fffffa80`000000a0 fffff880`058d8d50 : hal!HalBuildScatterGatherList+0x2f3
fffff880`0b8eaad0 fffff880`0569476b : fffffa80`0568e1a0 00000000`00000000 fffffa80`046eb020 fffff880`05839c30 : ndis!NdisMAllocateNetBufferSGList+0x110
fffff880`0b8eab70 fffffa80`0568e1a0 : 00000000`00000000 fffffa80`046eb020 fffff880`05839c30 00000000`00000000 : NETw5s64+0xb76b
fffff880`0b8eab78 00000000`00000000 : fffffa80`046eb020 fffff880`05839c30 00000000`00000000 000005da`00000100 : 0xfffffa80`0568e1a0
STACK_COMMAND: kb
FOLLOWUP_IP:
NETw5s64+1b4524
fffff880`0583d524 488b4930 mov rcx,qword ptr [rcx+30h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETw5s64+1b4524
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETw5s64
IMAGE_NAME: NETw5s64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b13ae9c
FAILURE_BUCKET_ID: X64_0xD1_NETw5s64+1b4524
BUCKET_ID: X64_0xD1_NETw5s64+1b4524
Followup: MachineOwner