Grey
this dump isn't going to be alot of help, b ut may give us some direction. there are drivers on your system that are from 2006 and anything that old is a problem.
So find updates for anything you can bios, video,sound, usb, lan, etc
On this dump the ntkrnmp.exe triggered it but it doesn't say which file
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Mini100709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*
Symbol information
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01e0b000 PsLoadedModuleList = 0xfffff800`01fd0db0
Debug session time: Wed Oct 7 15:59:59.305 2009 (GMT-4)
System Uptime: 0 days 0:03:20.109
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3D, {0, 0, 0, fffff80001e6055a}
Probably caused by :
ntkrnlmp.exe ( nt!KiInterruptHandler+28 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: 0000000000000000
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff80001e6055a
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3D
PROCESS_NAME: System
CURRENT_IRQL: a
EXCEPTION_RECORD: fffff80002e898c8 -- (.exr 0xfffff80002e898c8)
ExceptionAddress: fffff80001e6055a (nt!KiScanInterruptObjectList+0x000000000000008a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff80002e89970 -- (.trap 0xfffff80002e89970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000aae1ba76 rbx=0000000000000000 rcx=fffffa8003da3c00
rdx=ff00fa8006494050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001e6055a rsp=fffff80002e89b00 rbp=fffff80002e89bd0
r8=00000000aadf90bb r9=00000000000ab4bd r10=00000000000a9207
r11=fffffa80048514f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiScanInterruptObjectList+0x8a:
fffff800`01e6055a 41ff542418 call qword ptr [r12+18h] ds:0002:00000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001e5f3ee to fffff80001e5f650
STACK_TEXT:
fffff800`02e888f8 fffff800`01e5f3ee : 00000000`0000003d 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff800`02e88900 fffff800`01e60228 : 00000000`00000000 00000000`00000000 00000000`00000008 fffff800`02e84000 : nt!KiBugCheckDispatch+0x6e
fffff800`02e88a40 fffff800`01e729cd : 00000000`00000000 fffff800`01e0b000 fffff800`02e8a000 fffff800`0200eefc : nt!KiInterruptHandler+0x28
fffff800`02e88a70 fffff800`01e79fef : fffff800`00000001 00000000`00000001 0000003c`00000000 fffff800`02e89b50 : nt!RtlpExecuteHandlerForException+0xd
fffff800`02e88aa0 fffff800`01e37da3 : fffff800`02e898c8 fffff800`02e892a0 00000000`00000000 fffff800`02e89970 : nt!RtlDispatchException+0x22f
fffff800`02e89190 fffff800`01e5f4a9 : fffff800`02e898c8 fffffa80`03da3c08 fffff800`02e89970 fffffa80`03da3c00 : nt!KiDispatchException+0xc3
fffff800`02e89790 fffff800`01e5e08d : fffffa80`041cd010 fffff800`01e377e5 fffff800`02e899a8 fffff800`02e899c0 : nt!KiExceptionDispatch+0xa9
fffff800`02e89970 fffff800`01e6055a : fffffa80`03da3c08 fffff800`023503c0 fffff800`0000040e fffff800`02e89b20 : nt!KiGeneralProtectionFault+0xcd
fffff800`02e89b00 fffff800`01e60342 : 00000000`00000000 00000000`00000001 fffffa80`048ab660 fffff800`023315a0 : nt!KiScanInterruptObjectList+0x8a
fffff800`02e89b50 fffffa60`00b9a7a2 : fffffa60`00b99685 00000000`aadf64b2 00000000`0000000c fffff800`01f7f680 : nt!KiChainedDispatch+0x112
fffff800`02e89ce8 fffffa60`00b99685 : 00000000`aadf64b2 00000000`0000000c fffff800`01f7f680 fffff800`01e68d9f : intelppm!C1Halt+0x2
fffff800`02e89cf0 fffff800`01e7aac8 : fffffa80`00000010 fffff800`01f82a80 fffff800`02e89db0 fffff800`01e62ced : intelppm!C1Idle+0x9
fffff800`02e89d20 fffff800`01e69e31 : fffff800`01f7f680 00000000`000a9207 00000000`00000000 00000000`00000000 : nt!PoIdle+0x148
fffff800`02e89d80 fffff800`020385c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x21
fffff800`02e89db0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInterruptHandler+28
fffff800`01e60228 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiInterruptHandler+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME:
ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 49ac93e1
FAILURE_BUCKET_ID: X64_0x3D_nt!KiInterruptHandler+28
BUCKET_ID: X64_0x3D_nt!KiInterruptHandler+28
Followup: MachineOwner
---------
Ken