Looks like your BSOD's were caused by Norton. Please uninstall to test.
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\YUSRA\Downloads\Compressed\DAVIDS-PC-Wed_01_28_2015_232743_21\012715-50840-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18700.amd64fre.win7sp1_gdr.141211-1742
Machine Name:
Kernel base = 0xfffff800`0320e000 PsLoadedModuleList = 0xfffff800`03451890
Debug session time: Tue Jan 27 12:47:20.013 2015 (UTC + 6:00)
System Uptime: 0 days 0:03:13.888
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff8000328df3f}
*** WARNING: Unable to verify timestamp for SYMNETS.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMNETS.SYS
Probably caused by : NETIO.SYS ( NETIO!WfpExpireEntryLru+17 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000328df3f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800034bb100
GetUlongFromAddress: unable to read from fffff800034bb1c0
0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+4f
fffff800`0328df3f 488713 xchg rdx,qword ptr [rbx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) x86fre
TRAP_FRAME: fffff88003562230 -- (.trap 0xfffff88003562230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8006a2e660 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff88003562430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328df3f rsp=fffff880035623c0 rbp=0000000000000008
r8=fffff88003562430 r9=fffff88001b8ac90 r10=0000000000000000
r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f:
fffff800`0328df3f 488713 xchg rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003284429 to fffff80003284e80
STACK_TEXT:
fffff880`035620e8 fffff800`03284429 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`035620f0 fffff800`032830a0 : 00000000`00000010 fffff880`03562420 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03562230 fffff800`0328df3f : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000001 : nt!KiPageFault+0x260
fffff880`035623c0 fffff880`019399c7 : 00000000`00000008 fffff880`035626a0 00000000`00008900 fffffa80`0771a7c8 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f
fffff880`03562410 fffff880`01ae608d : fffffa80`0d87a4c0 fffffa80`0e140a70 fffff880`035626a0 00000000`00008900 : NETIO!WfpExpireEntryLru+0x17
fffff880`03562460 fffff880`01aad7b7 : 00000000`00000004 fffff880`01910030 fffffa80`0e3ed060 00000000`00000001 : tcpip!WfpAleCloseRemoteEndpointConnection+0x2d
fffff880`03562490 fffff880`01b25e5b : fffffa80`0d87a4c0 fffffa80`0d85853a 00000000`00000001 fffffa80`0d87a4c0 : tcpip! ?? ::FNODOBFM::`string'+0x20f72
fffff880`035625e0 fffff880`01b261e2 : fffff800`033fee80 fffffa80`0d858470 fffffa80`09e56410 00000000`00000001 : tcpip!WfpAleHandleSendCompletion+0xeb
fffff880`03562700 fffff880`01b306b2 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`09e5ceb8 : tcpip!WfpAlepAuthorizeSendCompletion+0x32
fffff880`03562750 fffff880`0199faf2 : fffffa80`00000089 fffff800`00000089 fffffa80`0d81ad50 00000000`00000001 : tcpip!WfpAleCompleteOperation+0x162
fffff880`035627f0 fffff880`040907bb : 00000000`00000000 00000000`00000000 fffffa80`0d338460 00000000`00000030 : fwpkclnt!FwpsCompleteOperation0+0x1e
fffff880`03562820 00000000`00000000 : 00000000`00000000 fffffa80`0d338460 00000000`00000030 00000000`00000089 : SYMNETS+0x1e7bb
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!WfpExpireEntryLru+17
fffff880`019399c7 488b4310 mov rax,qword ptr [rbx+10h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!WfpExpireEntryLru+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d
IMAGE_VERSION: 6.1.7601.18327
FAILURE_BUCKET_ID: X64_0xA_NETIO!WfpExpireEntryLru+17
BUCKET_ID: X64_0xA_NETIO!WfpExpireEntryLru+17
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netio!wfpexpireentrylru+17
FAILURE_ID_HASH: {fcdee258-ad7b-b100-5f3a-ac9544c5fd1f}
Followup: MachineOwner
---------
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\YUSRA\Downloads\Compressed\DAVIDS-PC-Wed_01_28_2015_232743_21\012815-30139-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18700.amd64fre.win7sp1_gdr.141211-1742
Machine Name:
Kernel base = 0xfffff800`0321e000 PsLoadedModuleList = 0xfffff800`03461890
Debug session time: Thu Jan 29 10:18:44.312 2015 (UTC + 6:00)
System Uptime: 0 days 0:01:48.202
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 1, fffff88001900713}
Probably caused by : NETIO.SYS ( NETIO!WfppIncrementIndexAndPurgeEntries+93 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001900713, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800034cb100
GetUlongFromAddress: unable to read from fffff800034cb1c0
0000000000000008 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!WfppIncrementIndexAndPurgeEntries+93
fffff880`01900713 48897008 mov qword ptr [rax+8],rsi
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) x86fre
DPC_STACK_BASE: FFFFF80000BA0FB0
TRAP_FRAME: fffff80000b9a130 -- (.trap 0xfffff80000b9a130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80078f8940
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001900713 rsp=fffff80000b9a2c0 rbp=fffffa80078f8938
r8=fffff80000b9a308 r9=fffff88001b8ac90 r10=0000000000000000
r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
NETIO!WfppIncrementIndexAndPurgeEntries+0x93:
fffff880`01900713 48897008 mov qword ptr [rax+8],rsi ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003294429 to fffff80003294e80
STACK_TEXT:
fffff800`00b99fe8 fffff800`03294429 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b99ff0 fffff800`032930a0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`01b7c140 : nt!KiBugCheckDispatch+0x69
fffff800`00b9a130 fffff880`01900713 : fffff880`01b7c140 fffff880`01b7c8d0 fffff880`01b7c140 fffff880`01b7c140 : nt!KiPageFault+0x260
fffff800`00b9a2c0 fffff880`01900839 : 00000000`00020004 fffff880`01b7c180 fffff880`01b7c8d0 fffff880`01b7c140 : NETIO!WfppIncrementIndexAndPurgeEntries+0x93
fffff800`00b9a330 fffff880`0190041f : fffff880`01b7c590 fffff880`01b7c8d0 00000000`00000000 fffff880`01b7c884 : NETIO!WfppLeastRecentlyUsedTimerRoutine+0x19
fffff800`00b9a380 fffff880`019002ff : fffffa80`070200ff 00000000`00000000 fffff880`01b7c5a8 00000000`00000002 : NETIO!WfpTimerWheelTimeoutHandler+0xff
fffff800`00b9a400 fffff800`0329fb5c : fffff800`00b9a520 fffff800`00b9a4c0 fffffa80`40242a88 00000000`00000000 : NETIO!WfpSysTimerCallback+0x4f
fffff800`00b9a430 fffff800`0329f9f6 : fffff880`01b7b4f0 00000000`00001b18 00000000`00000000 00000000`ffffffff : nt!KiProcessTimerDpcTable+0x6c
fffff800`00b9a4a0 fffff800`0329f8de : 00000000`407e7738 fffff800`00b9ab18 00000000`00001b18 fffff800`03411588 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9aaf0 fffff800`0329f6c7 : 00000000`0de6f7c6 00000000`00001b18 00000000`0de6f7d0 00000000`00000018 : nt!KiTimerExpiration+0x1be
fffff800`00b9ab90 fffff800`0328cb8a : fffff800`0340ee80 fffff800`0341ccc0 00000000`00000002 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff800`00b9ac40 00000000`00000000 : fffff800`00b9b000 fffff800`00b95000 fffff800`00b9ac00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!WfppIncrementIndexAndPurgeEntries+93
fffff880`01900713 48897008 mov qword ptr [rax+8],rsi
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!WfppIncrementIndexAndPurgeEntries+93
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5294760d
IMAGE_VERSION: 6.1.7601.18327
FAILURE_BUCKET_ID: X64_0xD1_NETIO!WfppIncrementIndexAndPurgeEntries+93
BUCKET_ID: X64_0xD1_NETIO!WfppIncrementIndexAndPurgeEntries+93
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_netio!wfppincrementindexandpurgeentries+93
FAILURE_ID_HASH: {57264696-559e-b8f0-6d97-e2633c3337e9}
Followup: MachineOwner
---------
Revo Uninstaller:
Use Revo Uninstaller to uninstall stubborn software.
Microsoft Security Essentials is recommended from a strict BSOD perspective, compatibility & stability compared to other internet security software. Malwarebytes is a great combo to MSE. They are free and lightweight.
Also uninstall your existing Antivirus software before you install MSE.
Good and Free system security combination.
Warning
Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.
Clean boot
Reduce items at start-up. No software except anti-virus is required plus doing this improves the time for logging into windows:
Run the System File Checker that scans the of all protected Windows 7 system files and replaces incorrect corrupted, changed/modified, or damaged versions with the correct versions if possible:
- Click on the
- Type CMD on Search
- Left click and Run as Administrator
- Type SFC /scannow
Full tutorial here: