Hello
I am having the same problem....
I have just reloaded Windows7 64bit to see if that will solve the problem. Its basically a slick boot. Just reinstalled Office 2007 Student Edition and uTorrent. I have a Toshiba P505-S8945.
Thats it. Here is the basics of the problem
Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.768.3
Locale ID: 1033
Additional information about the problem:
BCCode: a
BCP1: 0000000000000000
BCP2: 0000000000000002
BCP3: 0000000000000000
BCP4: FFFFF80002A0E477
OS Version: 6_1_7600
Service Pack: 0_0
Product: 768_1
Files that help describe the problem:
C:\Windows\Minidump\040210-22120-01.dmp
C:\Users\Scotty\AppData\Local\Temp\WER-51636-0.sysdata.xml
Read our privacy statement online:
Windows 7 Privacy Statement - Microsoft Windows
If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\erofflps.txt
Here is a copy of the dump file from my public skydrive folder
040210-22120-01.rar - Windows Live
This crash was caused by your network driver ( NETw5s64.sys. download and install a fresh copy and let us know if that doesnt fix it.
Ken
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\040210-22120-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
Debug session time: Fri Apr 2 08:36:56.608 2010 (GMT-4)
System Uptime: 0 days 6:33:26.418
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002a0e477}
Unable to load image \SystemRoot\system32\DRIVERS\NETw5s64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for NETw5s64.sys
*** ERROR: Module load completed but symbols could not be loaded for NETw5s64.sys
Probably caused by : NETw5s64.sys ( NETw5s64+b76b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a0e477, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'EX64' and 'ENG64.SYS' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfd0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalpDmaNextContiguousPiece+103
fffff800`02a0e477 448b08 mov r9d,dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9a360 -- (.trap 0xfffff80000b9a360)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000002c
rdx=000000000000002c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a0e477 rsp=fffff80000b9a4f8 rbp=0000000000000000
r8=000000000000001c r9=0000000000000000 r10=00000000000fffff
r11=fffffa80082ecea0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
hal!HalpDmaNextContiguousPiece+0x103:
fffff800`02a0e477 448b08 mov r9d,dword ptr [rax] ds:0001:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac6469 to fffff80002ac6f00
STACK_TEXT:
fffff800`00b9a218 fffff800`02ac6469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9a220 fffff800`02ac50e0 : fffffa80`06587270 fffffa80`07e37460 fffffa80`0606b110 fffff880`04ae0893 : nt!KiBugCheckDispatch+0x69
fffff800`00b9a360 fffff800`02a0e477 : fffffa80`08e8b4d0 fffffa80`0a929fd4 fffff800`02a0e524 fffffa80`07e37460 : nt!KiPageFault+0x260
fffff800`00b9a4f8 fffff800`02a0e524 : fffffa80`07e37460 fffffa80`082ecea0 fffffa80`082ecd00 00000000`00000000 : hal!HalpDmaNextContiguousPiece+0x103
fffff800`00b9a510 fffff800`02a114fb : fffffa80`07e37460 fffffa80`082ecea0 fffffa80`08e8b4d0 fffffa80`0a5d1fd8 : hal!HalpDmaMapScatterTransfer+0x34
fffff800`00b9a560 fffff800`02a11472 : fffffa80`07e37460 fffffa80`07e37458 00000000`0000001c 00000000`00000000 : hal!HalpMapTransfer+0x7b
fffff800`00b9a5f0 fffff800`02a1094f : 00000000`00000000 fffff800`02a0dfb9 00000000`00000000 00000000`00000003 : hal!IoMapTransfer+0x8e
fffff800`00b9a630 fffff800`02a10afd : fffffa80`07abc050 fffffa80`082ecea0 00000000`00000001 fffffa80`00000568 : hal!HalpAllocateAdapterCallback+0xc7
fffff800`00b9a6d0 fffff800`02a11156 : fffffa80`082ecea0 00000000`00000200 fffffa80`082ece00 00000000`00000003 : hal!IoFreeAdapterChannel+0x109
fffff800`00b9a700 fffff800`02a1071f : fffffa80`064f3010 00000000`00000254 fffffa80`082ecea0 fffffa80`0a19ec10 : hal!HalAllocateAdapterChannel+0x11a
fffff800`00b9a740 fffff880`015077c0 : fffffa80`0954a190 fffffa80`082ecb10 fffffa80`000000a0 fffff880`04cdac40 : hal!HalBuildScatterGatherList+0x2f3
fffff800`00b9a7b0 fffff880`04a9676b : fffffa80`07abc1a0 00000000`00000000 fffffa80`07e3fdc0 fffff880`04c3baa0 : ndis!NdisMAllocateNetBufferSGList+0x110
fffff800`00b9a850 fffffa80`07abc1a0 : 00000000`00000000 fffffa80`07e3fdc0 fffff880`04c3baa0 00000000`00000000 : NETw5s64+0xb76b
fffff800`00b9a858 00000000`00000000 : fffffa80`07e3fdc0 fffff880`04c3baa0 00000000`00000000 00000254`00000100 : 0xfffffa80`07abc1a0
STACK_COMMAND: kb
FOLLOWUP_IP:
NETw5s64+b76b
fffff880`04a9676b ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: NETw5s64+b76b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETw5s64
IMAGE_NAME: NETw5s64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4aafedb7
FAILURE_BUCKET_ID: X64_0xA_NETw5s64+b76b
BUCKET_ID: X64_0xA_NETw5s64+b76b
Followup: MachineOwner
---------