Teraz mogę przejść do meritum sprawy.
Mam ekran śmierci w momencie wracania systemu ze stanu uśpienia. korzystam z systemu win 7 ulti 32bit
płyta głowna: gigabyte MA790FX-dq6
grafika: asus radeon HD EAH4870 512
ram: 4 x 1Giga OCZ PC2 6400 CL- 4-4-4 Platinum revison 2 (800)
procek: AMD Phenom Quad core (9550) 2,2ghz
zasilacz: Chiftec 550W gps-550ab
Warto zaznaczyć też, że nie przy każdym "przywołaniu" systemu ma miejsce taka sytuacja - nie bardzo wiem dlaczego

jestem samoukiem, więc proszę o proste wytłumaczenia i instrukcje jak to naprawić.
dzięki za pomoc.
tak wygląda plik DMP:
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\060511-21840-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17592.x86fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0x82e49000 PsLoadedModuleList = 0x82f924d0
Debug session time: Sun Jun 5 13:18:34.937 2011 (UTC + 2:00)
System Uptime: 0 days 4:21:45.436
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\system32\drivers\AtihdW73.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AtihdW73.sys
*** ERROR: Module load completed but symbols could not be loaded for AtihdW73.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, a64da7ad, 8e187be4, 8e1877c0}
Probably caused by : AtihdW73.sys ( AtihdW73+187ad )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: a64da7ad, The address that the exception occurred at
Arg3: 8e187be4, Exception Record Address
Arg4: 8e1877c0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
AtihdW73+187ad
a64da7ad 8b4134 mov eax,dword ptr [ecx+34h]
EXCEPTION_RECORD: 8e187be4 -- (.exr 0xffffffff8e187be4)
ExceptionAddress: a64da7ad (AtihdW73+0x000187ad)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000034
Attempt to read from address 00000034
CONTEXT: 8e1877c0 -- (.cxr 0xffffffff8e1877c0)
eax=cea911a0 ebx=00000000 ecx=00000000 edx=8e187ce0 esi=87abe830 edi=00000001
eip=a64da7ad esp=8e187cac ebp=8e187cb8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
AtihdW73+0x187ad:
a64da7ad 8b4134 mov eax,dword ptr [ecx+34h] ds:0023:00000034=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000034
READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb2848
Unable to read MiSystemVaType memory at 82f91e20
00000034
FOLLOWUP_IP:
AtihdW73+187ad
a64da7ad 8b4134 mov eax,dword ptr [ecx+34h]
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from a64cf768 to a64da7ad
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
8e187cb8 a64cf768 00000001 8626a2c8 8748fe08 AtihdW73+0x187ad
8e187cec 8305d466 8748fe08 85a11bb8 8578b798 AtihdW73+0xd768
8e187d00 82ec6aab 8626a2c8 00000000 8578b798 nt!IopProcessWorkItem+0x23
8e187d50 83051f64 00000001 ab681811 00000000 nt!ExpWorkerThread+0x10d
8e187d90 82efa219 82ec699e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: AtihdW73+187ad
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: AtihdW73
IMAGE_NAME: AtihdW73.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce3c3ef
STACK_COMMAND: .cxr 0xffffffff8e1877c0 ; kb
FAILURE_BUCKET_ID: 0x7E_AtihdW73+187ad
BUCKET_ID: 0x7E_AtihdW73+187ad
Followup: MachineOwner
---------