BSOD: Lovely, Lovely, BSOD.


  1. Posts : 2
    Windows 7 Ultimate x64
       #1

    BSOD: Lovely, Lovely, BSOD.


    Well, I'm here again. I've been at this BSOD for quite awhile now and I've hit a wall and I'm not sure where else to go or what to do at this point.
    I've already attempted Diskchecking and such. I've uninstalled drivers which I've read lead to this problem, I've tried re-installing windows all together and all that good stuff.

    I'm sorry, I'm not making this sound all that professional. As a regular user, my knowledge of windows is pretty limited and I had to step way outside my comfort zone just to attempt what I've tried so far.

    The files should be included.

    Thank you for your time. <3 (With more thanks to come!)
      My Computer


  2. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #2

    Hi KingLordFluffy.

    Download and install Drivers for Atheros AR5BWB222 and Windows 7. Follow the guide Driver Install - Device Manager if needed.

    Plus, you need to do some maintenance jobs. Daemon Tools, Alcohol 120% and Power Archiver Pro uses SCSI Pass Through Direct (SPTD), which is a well known BSOD causer. Uninstall Daemon Tools at first. Then download SPTD standalone installer from Disk-Tools.com, and execute the downloaded file as guided below :

    • Double click to open it.
    • Click this button only:
    • If it is grayed out, as in the picture, there is no more SPTD in your system, and you just close the window.

    Free up the startup. Windows does not need any other program to auto start with it, but the auto start programs often conflicts and causes various problems including BSODs.

    1. Click on the Start button
    2. Type “msconfig (without quotes), click the resulting link. It will open the System Configuration window.
    3. Select the “Startup” tab.
    4. Deselect all items other than the antivirus and the mouse driver.
    5. Apply > OK
    6. Accept then restart.

    Let us know the results.

    ________________________________________________________________________________________
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 406f8, fffff80002cf9437}
    
    *** WARNING: Unable to verify timestamp for athrx.sys
    *** ERROR: Module load completed but symbols could not be loaded for athrx.sys
    Probably caused by : athrx.sys ( athrx+15866d )
    
    Followup: MachineOwner
    ---------
    
    7: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000406f8
    Arg4: fffff80002cf9437
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff88011f25418 -- (.exr 0xfffff88011f25418)
    ExceptionAddress: fffff80002cb6a15 (nt!DebugPrint+0x0000000000000015)
       ExceptionCode: 80000003 (Break instruction exception)
      ExceptionFlags: 00000000
    NumberParameters: 1
       Parameter[0]: 0000000000000001
    
    TRAP_FRAME:  fffff88011f254c0 -- (.trap 0xfffff88011f254c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=fffff88011f256c0
    rdx=000000000000004f rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cb6a15 rsp=fffff88011f25658 rbp=fffff80002e64280
     r8=0000000000000050  r9=0000000000000000 r10=0000000000000000
    r11=fffff88011f25570 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po cy
    nt!DebugPrint+0x15:
    fffff800`02cb6a15 c3              ret
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cbe169 to fffff80002cbebc0
    
    STACK_TEXT:  
    fffff880`0317ade8 fffff800`02cbe169 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
    fffff880`0317adf0 fffff800`02cbc632 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0317af30 fffff800`02cf9437 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`11f24c40 fffff800`02cbe242 : fffff880`11f25418 00000000`0000004f fffff880`11f254c0 fffff880`051d1880 : nt!KiDispatchException+0xab
    fffff880`11f252e0 fffff800`02cbd8f3 : 00000000`00f80060 fffff8a0`0cda5800 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`11f254c0 fffff800`02cb6a15 : fffff800`02cfdd75 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDebugServiceTrap+0xf3
    fffff880`11f25658 fffff800`02cfdd75 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!DebugPrint+0x15
    fffff880`11f25660 fffff800`02cf9878 : 00000000`00000000 fffff880`05194e60 fffff880`11f25b68 fffff880`04e55353 : nt! ?? ::FNODOBFM::`string'+0xc4c2
    fffff880`11f25910 fffff880`04fac66d : fffff880`051d1880 00000000`00000200 fffff880`051d1880 00000000`ffffffff : nt!DbgPrintEx+0x30
    fffff880`11f25950 fffff880`051d1880 : 00000000`00000200 fffff880`051d1880 00000000`ffffffff fffffa80`04d33000 : athrx+0x15866d
    fffff880`11f25958 00000000`00000200 : fffff880`051d1880 00000000`ffffffff fffffa80`04d33000 fffff880`04fcdf35 : athrx+0x37d880
    fffff880`11f25960 fffff880`051d1880 : 00000000`ffffffff fffffa80`04d33000 fffff880`04fcdf35 fffff880`05194e60 : 0x200
    fffff880`11f25968 00000000`ffffffff : fffffa80`04d33000 fffff880`04fcdf35 fffff880`05194e60 fffff880`11f25b68 : athrx+0x37d880
    fffff880`11f25970 fffffa80`04d33000 : fffff880`04fcdf35 fffff880`05194e60 fffff880`11f25b68 fffff880`00000000 : 0xffffffff
    fffff880`11f25978 fffff880`04fcdf35 : fffff880`05194e60 fffff880`11f25b68 fffff880`00000000 fffff880`11f25b68 : 0xfffffa80`04d33000
    fffff880`11f25980 fffff880`05194e60 : fffff880`11f25b68 fffff880`00000000 fffff880`11f25b68 00000000`00000000 : athrx+0x179f35
    fffff880`11f25988 fffff880`11f25b68 : fffff880`00000000 fffff880`11f25b68 00000000`00000000 01000018`00000800 : athrx+0x340e60
    fffff880`11f25990 fffff880`00000000 : fffff880`11f25b68 00000000`00000000 01000018`00000800 745f7874`5f687461 : 0xfffff880`11f25b68
    fffff880`11f25998 fffff880`11f25b68 : 00000000`00000000 01000018`00000800 745f7874`5f687461 66756264`64617178 : 0xfffff880`00000000
    fffff880`11f259a0 00000000`00000000 : 01000018`00000800 745f7874`5f687461 66756264`64617178 65725f64`6c6f6820 : 0xfffff880`11f25b68
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    athrx+15866d
    fffff880`04fac66d ??              ???
    
    SYMBOL_STACK_INDEX:  9
    
    SYMBOL_NAME:  athrx+15866d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: athrx
    
    IMAGE_NAME:  athrx.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4fd99f6d
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_athrx+15866d
    
    BUCKET_ID:  X64_0x7f_8_athrx+15866d
    
    Followup: MachineOwner
    ---------
    
    7: kd> lmvm athrx
    start             end                 module name
    fffff880`04e54000 fffff880`051ff000   athrx    T (no symbols)           
        Loaded symbol image file: athrx.sys
        Image path: \SystemRoot\system32\DRIVERS\athrx.sys
        Image name: athrx.sys
        Timestamp:        Thu Jun 14 13:53:09 2012 (4FD99F6D)
        CheckSum:         0039179C
        ImageSize:        003AB000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 08:38.
Find Us