Welcome to SevenForums1. If you have a SSD, make sure the firmware is up-to-date
Upload a screenshot of your hard disk using CrystalDiskInfo:
2. McAfee: McAfee is a frequent cause of BSOD-s, consider uninstalling it with the McAfee Removal Tool and replace with Microsoft Security Essentials (To test)
3. Microsoft Security Essentials.
Recommended from a strict BSOD perspective, compatibility & stability compared to other antiviruses/internet security software. It is free and lightweight:-
Warning
Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.
Run a full scan with both (separately) once downloaded, installed and updated.
4. Perform a System File Check:
- Click on the start
- Type CMD on Search
- Left click and Run as Administrator
- Type SFC /scannow
Full tutorial here:
5. Disk Check on your hard drive for file system errors and bad sectors on it:
6. Make scans with the following:
-Kaspersky TDSSKiller
-ESET online scanner
7. Reduce items at start-up. Nothing except anti-virus is required:
Let us know if this helps and further BSOD reports.
BSOD SUMMARY:
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {38, 2, 0, fffff88001513f08}
*** WARNING: Unable to verify timestamp for iaStorA.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStorA.sys
Probably caused by : iaStorA.sys ( iaStorA+5bf08 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001513f08, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c1100
GetUlongFromAddress: unable to read from fffff800030c11c0
0000000000000038 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
iaStorA+5bf08
fffff880`01513f08 488b4a38 mov rcx,qword ptr [rdx+38h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880047e5790 -- (.trap 0xfffff880047e5790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000fff2fbf9 rbx=0000000000000000 rcx=fffffa800b1cd590
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001513f08 rsp=fffff880047e5920 rbp=fffffa8008e4f700
r8=fffffa800efc31b8 r9=0000000000000000 r10=fffffa8008e4f388
r11=fffffa8008e4f000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
iaStorA+0x5bf08:
fffff880`01513f08 488b4a38 mov rcx,qword ptr [rdx+38h] ds:00000000`00000038=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e91569 to fffff80002e91fc0
STACK_TEXT:
fffff880`047e5648 fffff800`02e91569 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`047e5650 fffff800`02e901e0 : fffff880`009f6f40 00000000`00000000 fffff880`014d092c fffffa80`0b1cd590 : nt!KiBugCheckDispatch+0x69
fffff880`047e5790 fffff880`01513f08 : 00000000`000000ce fffffa80`0b142708 fffff880`009f6f40 fffffa80`082a3e68 : nt!KiPageFault+0x260
fffff880`047e5920 00000000`000000ce : fffffa80`0b142708 fffff880`009f6f40 fffffa80`082a3e68 fffffa80`08e4f000 : iaStorA+0x5bf08
fffff880`047e5928 fffffa80`0b142708 : fffff880`009f6f40 fffffa80`082a3e68 fffffa80`08e4f000 fffff880`01505ce9 : 0xce
fffff880`047e5930 fffff880`009f6f40 : fffffa80`082a3e68 fffffa80`08e4f000 fffff880`01505ce9 fffffa80`0b1cd590 : 0xfffffa80`0b142708
fffff880`047e5938 fffffa80`082a3e68 : fffffa80`08e4f000 fffff880`01505ce9 fffffa80`0b1cd590 fffffa80`0efc31b8 : 0xfffff880`009f6f40
fffff880`047e5940 fffffa80`08e4f000 : fffff880`01505ce9 fffffa80`0b1cd590 fffffa80`0efc31b8 00000000`00000000 : 0xfffffa80`082a3e68
fffff880`047e5948 fffff880`01505ce9 : fffffa80`0b1cd590 fffffa80`0efc31b8 00000000`00000000 fffff880`01505b8b : 0xfffffa80`08e4f000
fffff880`047e5950 fffffa80`0b1cd590 : fffffa80`0efc31b8 00000000`00000000 fffff880`01505b8b fffff880`01545140 : iaStorA+0x4dce9
fffff880`047e5958 fffffa80`0efc31b8 : 00000000`00000000 fffff880`01505b8b fffff880`01545140 00000000`00000000 : 0xfffffa80`0b1cd590
fffff880`047e5960 00000000`00000000 : fffff880`01505b8b fffff880`01545140 00000000`00000000 00000000`00000000 : 0xfffffa80`0efc31b8
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStorA+5bf08
fffff880`01513f08 488b4a38 mov rcx,qword ptr [rdx+38h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStorA+5bf08
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStorA
IMAGE_NAME: iaStorA.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50aa9204
FAILURE_BUCKET_ID: X64_0xD1_iaStorA+5bf08
BUCKET_ID: X64_0xD1_iaStorA+5bf08
Followup: MachineOwner
---------
2: kd> lmvm iaStorA
start end module name
fffff880`014b8000 fffff880`01783000 iaStorA T (no symbols)
Loaded symbol image file: iaStorA.sys
Image path: \SystemRoot\system32\DRIVERS\iaStorA.sys
Image name: iaStorA.sys
Timestamp: Tue Nov 20 02:09:40 2012 (50AA9204)
CheckSum: 000A393C
ImageSize: 002CB000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4