I must have done something wrong. The dump is 3.24 GB yet this is all that comes up in the debugger: Microsoft ® Windows Debugger Version 6.9.0003.113 X86 Copyright © Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\zioberd\Desktop\MEMORY.DMP] Kernel Complete Dump File: Full address space is available Symbol search path is: C:\symbols;SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 6001.18063.x86fre.vistasp1_gdr.080425-1930 Kernel base = 0x82019000 PsLoadedModuleList = 0x82130c70 Debug session time: Thu Oct 9 11:17:10.989 2008 (GMT-4) System Uptime: 1 days 0:42:25.910 Loading Kernel Symbols .................................................................................................... ................................................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7E, {c0000005, 821af90b, 8bd67a24, 8bd67720} Probably caused by : ntkrpamp.exe ( nt!CmpFreeView+21 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 821af90b, The address that the exception occurred at Arg3: 8bd67a24, Exception Record Address Arg4: 8bd67720, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!CmpFreeView+21 821af90b 897204 mov dword ptr [edx+4],esi EXCEPTION_RECORD: 8bd67a24 -- (.exr 0xffffffff8bd67a24) ExceptionAddress: 821af90b (nt!CmpFreeView+0x00000021) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000001 Parameter[1]: 00000004 Attempt to write to address 00000004 CONTEXT: 8bd67720 -- (.cxr 0xffffffff8bd67720) eax=b72acdb8 ebx=bf47a9b8 ecx=bf47a688 edx=00000000 esi=b2d92c98 edi=00000000 eip=821af90b esp=8bd67aec ebp=8bd67b04 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 nt!CmpFreeView+0x21: 821af90b 897204 mov dword ptr [edx+4],esi ds:0023:00000004=???????? Resetting default scope PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. WRITE_ADDRESS: 00000004 BUGCHECK_STR: 0x7E DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE LAST_CONTROL_TRANSFER: from 821af897 to 821af90b STACK_TEXT: 8bd67af0 821af897 bf47ac4c 00000000 8bd67b60 nt!CmpFreeView+0x21 8bd67b04 821a2626 00000000 8bd67c60 80001864 nt!CmpDestroyHiveViewList+0x86 8bd67b60 821a0224 8bd67bb4 00000005 00000000 nt!CmpInitializeHive+0x3de 8bd67bd8 821998c5 8bd67c60 00000000 8bd67c4c nt!CmpInitHiveFromFile+0x19e 8bd67c18 82197d4c 8bd67c60 00000000 8bd67c7b nt!CmpCmdHiveOpen+0x36 8bd67d14 82197f81 00000005 8211159c 00000005 nt!CmpFlushBackupHive+0x2fd 8bd67d38 82272eb7 8211b13c 84b50580 8205141d nt!CmpSyncBackupHives+0x90 8bd67d44 8205141d 00000000 00000000 84b50580 nt!CmpPeriodicBackupFlushWorker+0x32 8bd67d7c 821eeb18 00000000 9e187ca6 00000000 nt!ExpWorkerThread+0xfd 8bd67dc0 82047a3e 82051320 00000001 00000000 nt!PspSystemThreadStartup+0x9d 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 FOLLOWUP_IP: nt!CmpFreeView+21 821af90b 897204 mov dword ptr [edx+4],esi SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!CmpFreeView+21 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4812bd71 STACK_COMMAND: .cxr 0xffffffff8bd67720 ; kb FAILURE_BUCKET_ID: 0x7E_nt!CmpFreeView+21 BUCKET_ID: 0x7E_nt!CmpFreeView+21 Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 821af90b, The address that the exception occurred at Arg3: 8bd67a24, Exception Record Address Arg4: 8bd67720, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!CmpFreeView+21 821af90b 897204 mov dword ptr [edx+4],esi EXCEPTION_RECORD: 8bd67a24 -- (.exr 0xffffffff8bd67a24) ExceptionAddress: 821af90b (nt!CmpFreeView+0x00000021) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000001 Parameter[1]: 00000004 Attempt to write to address 00000004 CONTEXT: 8bd67720 -- (.cxr 0xffffffff8bd67720) eax=b72acdb8 ebx=bf47a9b8 ecx=bf47a688 edx=00000000 esi=b2d92c98 edi=00000000 eip=821af90b esp=8bd67aec ebp=8bd67b04 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 nt!CmpFreeView+0x21: 821af90b 897204 mov dword ptr [edx+4],esi ds:0023:00000004=???????? Resetting default scope PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. WRITE_ADDRESS: 00000004 BUGCHECK_STR: 0x7E DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE LAST_CONTROL_TRANSFER: from 821af897 to 821af90b STACK_TEXT: 8bd67af0 821af897 bf47ac4c 00000000 8bd67b60 nt!CmpFreeView+0x21 8bd67b04 821a2626 00000000 8bd67c60 80001864 nt!CmpDestroyHiveViewList+0x86 8bd67b60 821a0224 8bd67bb4 00000005 00000000 nt!CmpInitializeHive+0x3de 8bd67bd8 821998c5 8bd67c60 00000000 8bd67c4c nt!CmpInitHiveFromFile+0x19e 8bd67c18 82197d4c 8bd67c60 00000000 8bd67c7b nt!CmpCmdHiveOpen+0x36 8bd67d14 82197f81 00000005 8211159c 00000005 nt!CmpFlushBackupHive+0x2fd 8bd67d38 82272eb7 8211b13c 84b50580 8205141d nt!CmpSyncBackupHives+0x90 8bd67d44 8205141d 00000000 00000000 84b50580 nt!CmpPeriodicBackupFlushWorker+0x32 8bd67d7c 821eeb18 00000000 9e187ca6 00000000 nt!ExpWorkerThread+0xfd 8bd67dc0 82047a3e 82051320 00000001 00000000 nt!PspSystemThreadStartup+0x9d 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 FOLLOWUP_IP: nt!CmpFreeView+21 821af90b 897204 mov dword ptr [edx+4],esi SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!CmpFreeView+21 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4812bd71 STACK_COMMAND: .cxr 0xffffffff8bd67720 ; kb FAILURE_BUCKET_ID: 0x7E_nt!CmpFreeView+21 BUCKET_ID: 0x7E_nt!CmpFreeView+21 Followup: MachineOwner --------- 0: kd> .exr 0xffffffff8bd67a24 ExceptionAddress: 821af90b (nt!CmpFreeView+0x00000021) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000001 Parameter[1]: 00000004 Attempt to write to address 00000004