Windows 7 64bit is having daily BSOD
Hi, My PC started having daily random BSOD, causing the computer to restart at least twice a day. I have uploaded my mini dump files from the last few crashes to Sky Drive. Ran memory test, and no issues found. I replaced my RAM several months ago, as I was having BSOD failures it the memory was suspected. This is new RAM, and the issues started to happen on a regular basis when installed the latest updates, including SP1 about 2/3 weeks ago. Any help would be much appreciated! OS - Windows 7 Ultimate 64bit PC - HP Pavilion RAM - 4gb http://cid-9f34d7c6a45c7c90.skydrive.live.com/redir.aspx?resid=9F34D7C6A45C7C90!108
April 30th, 2011 9:30pm

Since you mention the issue start to occurs after you install the updates, in that case have you try uninstalling the recent update and see how it goes? Lastly if you could provide us the exact model of the HP Pavilion, that would helps
Free Windows Admin Tool Kit Click here and download it now
May 1st, 2011 4:53am

No, I haven't tried to restoring to an earlier state, but will give it a shot. My model number for the HP Pavilion is a6357c.Mohammd Shafaqat
May 2nd, 2011 10:02pm

Hi, From the first dump file, I notice Bug Check 0x3B: SYSTEM_SERVICE_EXCEPTION This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code. From the second dump file, I notice Bug Check 0x24: NTFS_FILE_SYSTEM This indicates a problem occurred in ntfs.sys, the driver file that allows the system to read and write to NTFS drives. From the third and fourth dump files, I notice Bug Check 0x1E: KMODE_EXCEPTION_NOT_HANDLED This indicates that a kernel-mode program generated an exception which the error handler did not catch. I suggest referring to the following methods to testing the BSOD. 1. If you are running any gadgets, please disable them or uninstall them. 2. Regarding the NTFS drive issue, please run Chkdsk /f /r from an elevated command. 3. Go to update BIOS and drivers from manufacture's site. http://h10025.www1.hp.com/ewfrf/wc/softwareCategory?os=4063&lc=en&cc=us&dlc=en&sw_lang=&product=3658915#N152 Note: I cannot find any device driver with Windows 7 64-bit for your computer model. If the computer is not compatible with Windows 7 64-bit or its SP1, it could lead to hardware issue. You should confirm HP with this. 4. Also, go to Safe Mode and check if the issue persists. Best Regards, NikiPlease remember to click "Mark as Answer" on the post that helps you, and to click "Unmark as Answer" if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
May 3rd, 2011 6:12am

******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff96000177cf1, Address of the exception record for the exception that caused the bugcheck Arg3: fffff88008b28110, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". FAULTING_IP: win32k!FindTimer+59 fffff960`00177cf1 4c396b28 cmp qword ptr [rbx+28h],r13 CONTEXT: fffff88008b28110 -- (.cxr 0xfffff88008b28110) rax=0000000000005332 rbx=004c011f005233af rcx=fffff960003a10e0 rdx=0000000000005332 rsi=0000000000000000 rdi=0000000000000000 rip=fffff96000177cf1 rsp=fffff88008b28af0 rbp=004c011f0052341f r8=0000000000000000 r9=0000000000000000 r10=fffff900c1d3cc30 r11=fffff900c1d3cc30 r12=fffff960003a14d0 r13=fffff900c0618dc0 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010203 win32k!FindTimer+0x59: fffff960`00177cf1 4c396b28 cmp qword ptr [rbx+28h],r13 ds:002b:004c011f`005233d7=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: sidebar.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff96000177e32 to fffff96000177cf1 STACK_TEXT: fffff880`08b28af0 fffff960`00177e32 : fffff900`c0618dc0 00000000`00005332 00000000`00005332 00000000`0000492c : win32k!FindTimer+0x59 fffff880`08b28b40 fffff960`00143fa8 : fffff900`c0618dc0 00000000`00005332 00000000`0000492c 00000000`00000000 : win32k!InternalSetTimer+0x9a fffff880`08b28bb0 fffff960`00143f1e : 00000000`00000000 00000000`00000000 00000000`0000492c fffff800`02eea453 : win32k!SetTimer+0x5c fffff880`08b28bf0 fffff800`02e9d8d3 : fffffa80`03bc7b60 fffff880`08b28ca0 00000000`00000001 00000000`00000020 : win32k!NtUserSetTimer+0x7e fffff880`08b28c20 00000000`76c7693a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`032ce218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76c7693a FOLLOWUP_IP: win32k!FindTimer+59 fffff960`00177cf1 4c396b28 cmp qword ptr [rbx+28h],r13 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: win32k!FindTimer+59 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f104c STACK_COMMAND: .cxr 0xfffff88008b28110 ; kb FAILURE_BUCKET_ID: X64_0x3B_win32k!FindTimer+59 BUCKET_ID: X64_0x3B_win32k!FindTimer+59 _________________________________________________________________________________________________________ Bug CHeck 0x3B: http://msdn.microsoft.com/en-us/library/ff558949(VS.85).aspx Update your graphic card driver. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff8800bd9e1d8 Arg3: fffff8800bd9da30 Arg4: fffff880012352b5 Debugging Details: ------------------ EXCEPTION_RECORD: fffff8800bd9e1d8 -- (.exr 0xfffff8800bd9e1d8) ExceptionAddress: fffff880012352b5 (Ntfs!NtfsAcquireExclusiveFcb+0x0000000000000065) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000058 Attempt to read from address 0000000000000058 CONTEXT: fffff8800bd9da30 -- (.cxr 0xfffff8800bd9da30) rax=000000000000ff7b rbx=fffff8a01eba8670 rcx=0000000000000000 rdx=fffff8a01eba8601 rsi=0000000000000000 rdi=0000000000000001 rip=fffff880012352b5 rsp=fffff8800bd9e410 rbp=fffffa8008d4acb0 r8=0000000000000000 r9=0000000000000001 r10=fffff8800bd9e4f0 r11=0000000000000000 r12=0000000000000000 r13=00000000c00000d8 r14=0000000000000702 r15=fffffa8004201180 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 Ntfs!NtfsAcquireExclusiveFcb+0x65: fffff880`012352b5 488b4958 mov rcx,qword ptr [rcx+58h] ds:002b:00000000`00000058=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000058 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bf0e8 0000000000000058 FOLLOWUP_IP: Ntfs!NtfsAcquireExclusiveFcb+65 fffff880`012352b5 488b4958 mov rcx,qword ptr [rcx+58h] FAULTING_IP: Ntfs!NtfsAcquireExclusiveFcb+65 fffff880`012352b5 488b4958 mov rcx,qword ptr [rcx+58h] BUGCHECK_STR: 0x24 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE LAST_CONTROL_TRANSFER: from fffff880012a13a4 to fffff880012352b5 STACK_TEXT: fffff880`0bd9e410 fffff880`012a13a4 : 00000000`00000000 fffff880`0bd9e720 00000000`00000001 fffffa80`08d4acb0 : Ntfs!NtfsAcquireExclusiveFcb+0x65 fffff880`0bd9e460 fffff880`012a9fad : fffffa80`08d4acb0 fffffa80`04201180 00000000`00100001 00000000`00000000 : Ntfs!NtfsFlushVolume+0x188 fffff880`0bd9e590 fffff880`012aa6b4 : fffffa80`08d4acb0 fffffa80`03a59c10 fffffa80`039cb4d0 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459 fffff880`0bd9e670 fffff880`0119fbcf : fffffa80`03a59fb0 fffffa80`03a59c10 fffffa80`08d4acb0 fffff880`0bd9e698 : Ntfs!NtfsFsdFlushBuffers+0x104 fffff880`0bd9e6e0 fffff880`0119e6df : fffffa80`0435d3e0 00000000`00000000 fffffa80`0435d300 fffffa80`03a59c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`0bd9e770 fffff800`0319671b : 00000000`00000002 fffffa80`039cb4d0 00000000`00000000 fffffa80`03a59c10 : fltmgr!FltpDispatch+0xcf fffff880`0bd9e7d0 fffff800`0312d871 : fffffa80`03a59c10 fffffa80`06a90480 fffffa80`039cb4d0 fffff880`009ea180 : nt!IopSynchronousServiceTail+0xfb fffff880`0bd9e840 fffff800`02e8d8d3 : fffffa80`06a90480 fffffa80`0366d5f0 fffffa80`0435d3e0 fffffa80`039cb4d0 : nt!NtFlushBuffersFile+0x171 fffff880`0bd9e8d0 fffff800`02e89e70 : fffff800`030cd96d fffff8a0`0222a060 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff880`0bd9ea68 fffff800`030cd96d : fffff8a0`0222a060 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff880`0bd9ea70 fffff800`0312bcce : 00000000`00000000 fffffa80`06a90480 00000000`00000080 00000000`00000001 : nt!PopFlushVolumeWorker+0x1bd fffff880`0bd9ed40 fffff800`02e7ffe6 : fffff880`009ea180 fffffa80`06a90480 fffff880`009f4f40 00000000`00000202 : nt!PspSystemThreadStartup+0x5a fffff880`0bd9ed80 00000000`00000000 : fffff880`0bd9f000 fffff880`0bd99000 fffff880`0bd9d5d0 00000000`00000000 : nt!KxStartSystemThread+0x16 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: Ntfs!NtfsAcquireExclusiveFcb+65 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce792f9 STACK_COMMAND: .cxr 0xfffff8800bd9da30 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+65 BUCKET_ID: X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+65 Followup: MachineOwner --------- ________________________________________________________ Run chkdsk /r /f ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully. FAULTING_IP: +345952f0153dfdc 00000000`00000000 ?? ??? EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x1E PROCESS_NAME: System CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff800044c82c8 -- (.exr 0xfffff800044c82c8) ExceptionAddress: fffff80002ee8549 (nt!KiInsertTimerTable+0x0000000000000189) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff TRAP_FRAME: fffff800044c8370 -- (.trap 0xfffff800044c8370) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000040c30089 rbx=0000000000000000 rcx=fffff8000304ee80 rdx=fffffa80066e4c70 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002ee8549 rsp=fffff800044c8500 rbp=0000000000000000 r8=0000800200000000 r9=00000000000000c3 r10=fffff8000304ee80 r11=fffff8800141d700 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!KiInsertTimerTable+0x189: fffff800`02ee8549 410fb74002 movzx eax,word ptr [r8+2] ds:0089:00008002`00000002=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ed3ffe to fffff80002edc610 STACK_TEXT: fffff800`044c73a8 fffff800`02ed3ffe : fffffa80`07c563d0 fffff880`016f4750 fffff800`044c7b20 fffff800`02f082a0 : nt!KeBugCheck fffff800`044c73b0 fffff800`02f07f6d : fffff800`030e3a10 fffff800`0301fc78 fffff800`02e5c000 fffff800`044c82c8 : nt!KiKernelCalloutExceptionHandler+0xe fffff800`044c73e0 fffff800`02f06d45 : fffff800`030230fc fffff800`044c7458 fffff800`044c82c8 fffff800`02e5c000 : nt!RtlpExecuteHandlerForException+0xd fffff800`044c7410 fffff800`02f17dc1 : fffff800`044c82c8 fffff800`044c7b20 fffff800`00000000 fffff800`02e5c000 : nt!RtlDispatchException+0x415 fffff800`044c7af0 fffff800`02edbcc2 : fffff800`044c82c8 fffffa80`066e4c70 fffff800`044c8370 00008002`00000000 : nt!KiDispatchException+0x135 fffff800`044c8190 fffff800`02eda5ca : 00000000`00000000 00000000`05311c9a fffff800`0304ee80 fffff800`02e1ab7f : nt!KiExceptionDispatch+0xc2 fffff800`044c8370 fffff800`02ee8549 : fffffa80`04ac6000 ffffffff`fffdb610 fffff800`03051080 fffff800`0305ccc0 : nt!KiGeneralProtectionFault+0x10a fffff800`044c8500 fffff800`02ee505a : ffffffff`fff85ee0 fffff800`02ee8062 fffff800`044c8600 00000000`00000001 : nt!KiInsertTimerTable+0x189 fffff800`044c8560 fffff800`02ee7ead : fffffa80`066e4c70 fffffa80`06847308 fffffa80`06847308 00000000`00000000 : nt!KiTimerWaitTest+0x15a fffff800`044c85e0 fffff800`02ee7dee : 00000032`b3a81188 fffff800`044c8c58 00000000`00154cc0 fffff800`03052a88 : nt!KiProcessExpiredTimerList+0x6d fffff800`044c8c30 fffff800`02ee7bd7 : 00000080`6c06bbc3 00000080`00154cc0 00000080`6c06bbd8 00000000`000000c0 : nt!KiTimerExpiration+0x1be fffff800`044c8cd0 fffff800`02ed436a : fffff800`0304ee80 fffff800`0305ccc0 00000000`00000000 fffff880`04402db0 : nt!KiRetireDpcList+0x277 fffff800`044c8d80 00000000`00000000 : fffff800`044c9000 fffff800`044c3000 fffff800`044c8d40 00000000`00000000 : nt!KiIdleLoop+0x5a STACK_COMMAND: kb FOLLOWUP_IP: nt!KiKernelCalloutExceptionHandler+e fffff800`02ed3ffe 90 nop SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e Followup: MachineOwner --------- ____________________________________________________________ Bug Check Code 0x1E: http://msdn.microsoft.com/en-us/library/ff557408(v=VS.85).aspx Try to upload a kernel/full dump for more information ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {0, 0, 0, 0} Unable to load image \SystemRoot\system32\DRIVERS\xchalVx64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for xchalVx64.sys *** ERROR: Module load completed but symbols could not be loaded for xchalVx64.sys Probably caused by : xchalVx64.sys ( xchalVx64+fcce ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully. FAULTING_IP: +345952f018bdfdc 00000000`00000000 ?? ??? EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x1E PROCESS_NAME: System CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff8800311b898 -- (.exr 0xfffff8800311b898) ExceptionAddress: fffff80002ee1116 (nt!KeReleaseSpinLock+0x0000000000000026) ExceptionCode: c0000096 ExceptionFlags: 00000000 NumberParameters: 0 TRAP_FRAME: fffff8800311b940 -- (.trap 0xfffff8800311b940) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004b3c834 rdx=fffffa8004f1ce80 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002ee1116 rsp=fffff8800311bad0 rbp=fffffa8004bd8248 r8=fffff88006e00000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000080 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KeReleaseSpinLock+0x26: fffff800`02ee1116 450f22c3 mov cr8,r11 Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ecdffe to fffff80002ed6610 STACK_TEXT: fffff880`0311a978 fffff800`02ecdffe : 00000000`00000020 fffffa80`080b8d90 fffff880`0311b0f0 fffff800`02f022a0 : nt!KeBugCheck fffff880`0311a980 fffff800`02f01f6d : fffff800`030dda10 fffff800`03019c78 fffff800`02e56000 fffff880`0311b898 : nt!KiKernelCalloutExceptionHandler+0xe fffff880`0311a9b0 fffff800`02f00d45 : fffff800`0301d0fc fffff880`0311aa28 fffff880`0311b898 fffff800`02e56000 : nt!RtlpExecuteHandlerForException+0xd fffff880`0311a9e0 fffff800`02f11dc1 : fffff880`0311b898 fffff880`0311b0f0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x415 fffff880`0311b0c0 fffff800`02ed5cc2 : fffff880`0311b898 fffffa80`04b3c000 fffff880`0311b940 fffffa80`04f1ce98 : nt!KiDispatchException+0x135 fffff880`0311b760 fffff800`02ed45ca : fffffa80`04ae61a0 00000000`00000002 00000000`00000001 fffffa80`03a73950 : nt!KiExceptionDispatch+0xc2 fffff880`0311b940 fffff800`02ee1116 : 00000000`00000000 fffff880`0311bb80 00000000`00004380 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a fffff880`0311bad0 fffff880`04c16cce : fffffa80`04f1ce98 fffff880`0311bb80 00000000`ffffffff fffffa80`04b3c000 : nt!KeReleaseSpinLock+0x26 fffff880`0311bb00 fffffa80`04f1ce98 : fffff880`0311bb80 00000000`ffffffff fffffa80`04b3c000 fffffa80`04bd52e0 : xchalVx64+0xfcce fffff880`0311bb08 fffff880`0311bb80 : 00000000`ffffffff fffffa80`04b3c000 fffffa80`04bd52e0 fffff880`04c29209 : 0xfffffa80`04f1ce98 fffff880`0311bb10 00000000`ffffffff : fffffa80`04b3c000 fffffa80`04bd52e0 fffff880`04c29209 fffffa80`03ef9e84 : 0xfffff880`0311bb80 fffff880`0311bb18 fffffa80`04b3c000 : fffffa80`04bd52e0 fffff880`04c29209 fffffa80`03ef9e84 fffffa80`04bd8248 : 0xffffffff fffff880`0311bb20 fffffa80`04bd52e0 : fffff880`04c29209 fffffa80`03ef9e84 fffffa80`04bd8248 fffffa80`04bdafe8 : 0xfffffa80`04b3c000 fffff880`0311bb28 fffff880`04c29209 : fffffa80`03ef9e84 fffffa80`04bd8248 fffffa80`04bdafe8 fffffa80`03ef9e84 : 0xfffffa80`04bd52e0 fffff880`0311bb30 fffffa80`03ef9e84 : fffffa80`04bd8248 fffffa80`04bdafe8 fffffa80`03ef9e84 fffffa80`04b3c000 : xchalVx64+0x22209 fffff880`0311bb38 fffffa80`04bd8248 : fffffa80`04bdafe8 fffffa80`03ef9e84 fffffa80`04b3c000 00000000`00000000 : 0xfffffa80`03ef9e84 fffff880`0311bb40 fffffa80`04bdafe8 : fffffa80`03ef9e84 fffffa80`04b3c000 00000000`00000000 fffffa80`04b3c000 : 0xfffffa80`04bd8248 fffff880`0311bb48 fffffa80`03ef9e84 : fffffa80`04b3c000 00000000`00000000 fffffa80`04b3c000 fffffa80`04bd52e0 : 0xfffffa80`04bdafe8 fffff880`0311bb50 fffffa80`04b3c000 : 00000000`00000000 fffffa80`04b3c000 fffffa80`04bd52e0 fffffa80`04bdafe8 : 0xfffffa80`03ef9e84 fffff880`0311bb58 00000000`00000000 : fffffa80`04b3c000 fffffa80`04bd52e0 fffffa80`04bdafe8 fffffa80`03ef9ef5 : 0xfffffa80`04b3c000 STACK_COMMAND: kb FOLLOWUP_IP: xchalVx64+fcce fffff880`04c16cce ?? ??? SYMBOL_STACK_INDEX: 8 SYMBOL_NAME: xchalVx64+fcce FOLLOWUP_NAME: MachineOwner MODULE_NAME: xchalVx64 IMAGE_NAME: xchalVx64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 48ce2536 FAILURE_BUCKET_ID: X64_0x1E_xchalVx64+fcce BUCKET_ID: X64_0x1E_xchalVx64+fcce Followup: MachineOwner _________________________________ The BSOD was caused by xchalVx64. It belongs to ViXS SCode Support Library (x64). Update it or uninstall it. This posting is provided "AS IS" with no warranties or guarantees , and confers no rights. Microsoft Student Partner Microsoft Certified Professional Microsoft Certified Systems Administrator: Security Microsoft Certified Systems Engineer: Security Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration
May 3rd, 2011 6:34am

Only ViXs hardware I have is the TV tuner card that came with the PC. How do I unstall the support library? I can't upload the Memory.dmp, it is 93MB compressed and SkyDrive allows only 50MB files. I can upload some more mini dumps if that helps. I uninstalled SP1, that do anything. I did notice a pattern with the crashes, they happen when the computer comes out of Sleep and/or hibernate mode. Never has happened on me while using the PC. I use the PC as my media center PC and it is on most of the day as it pumps media to my Xbox. Will run checkdsk tonight see if anything is found. Lastly, HP doesn't allow you to get updates for BIOS unless you are on the original OS that came on the computer (Vista in my case) or you upgrade thru them. :(Mohammd Shafaqat
Free Windows Admin Tool Kit Click here and download it now
May 5th, 2011 12:30am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics