MSINFO32:
Please go to Start and type in "msinfo32.exe" (without the quotes) and press Enter
Save the report as an .nfo file, then zip up the .nfo file and upload/attach the .zip file with your next post.
Also, save a copy as a .txt file and include it also (it's much more difficult to read, but we have greater success in getting the info from it).
If you're having difficulties with the format, please open an elevated (Run as administrator) Command Prompt and type "msinfo32 /nfo C:\Users\Public\Desktop\TEST.NFO" (without the quotes) and press Enter. Then navigate to the C:\Users\Public\Desktop directory to retrieve the TEST.NFO file. If you have difficulties with making this work, please post back.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff80000b9bf60
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff8800149978e
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3D
PROCESS_NAME: System
CURRENT_IRQL: b
EXCEPTION_RECORD: fffff80000b9c708 -- (.exr 0xfffff80000b9c708)
Cannot read Exception record @ fffff80000b9c708
TRAP_FRAME: fffff80000b9c7b0 -- (.trap 0xfffff80000b9c7b0)
Unable to read trap frame at fffff800`00b9c7b0
LAST_CONTROL_TRANSFER: from fffff80003092229 to fffff80003092c80
STACK_TEXT:
fffff800`00b9b6a8 fffff800`03092229 : 00000000`0000003d fffff800`00b9bf60 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9b6b0 fffff800`0308e589 : 00000000`00000000 00000000`00000000 fffff800`00b9bf60 fffff800`030bdc80 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b7f0 fffff800`030bd94d : fffff800`0329ad20 fffff800`031dbd8c fffff800`03016000 fffff800`00b9c708 : nt!KiInterruptHandler+0x29
fffff800`00b9b820 fffff800`030bc725 : fffff800`031dbd84 fffff800`00b9b898 fffff800`00b9c708 fffff800`03016000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b850 fffff800`030cd6a1 : fffff800`00b9c708 fffff800`00b9bf60 fffff800`00000000 fffffa80`091ec4e8 : nt!RtlDispatchException+0x415
fffff800`00b9bf30 fffff800`03092302 : fffff800`00b9c708 fffffa80`091dbb60 fffff800`00b9c7b0 00000000`00000000 : nt!KiDispatchException+0x135
fffff800`00b9c5d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInterruptHandler+29
fffff800`0308e589 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiInterruptHandler+29
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f558b55
FAILURE_BUCKET_ID: X64_0x3D_nt!KiInterruptHandler+29
BUCKET_ID: X64_0x3D_nt!KiInterruptHandler+29
Followup: MachineOwner