I've included the whole report:
Microsoft (R) Windows Debugger Version 6.11.0001.402 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File Mini011611-02\Mini011611-02.dmp
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*C:\WINDOWS\Symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_qfe.090319-1204
Machine Name:
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d8280
Debug session time: Sun Jan 16 14:00:46.750 2011 (GMT-5)
System Uptime: 0 days 2:02:22.375
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.................
*** WARNING: Unable to verify checksum for hal.dll
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 9C, {1, fffff80000075bc0, b6000000, 181}
Probably caused by : ntkrnlmp.exe ( nt!KxMcheckAbort+77 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MACHINE_CHECK_EXCEPTION (9c)
A fatal Machine Check Exception has occurred.
KeBugCheckEx parameters;
x86 Processors
If the processor has ONLY MCE feature available (For example Intel
Pentium), the parameters are:
1 - Low 32 bits of P5_MC_TYPE MSR
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of P5_MC_ADDR MSR
4 - Low 32 bits of P5_MC_ADDR MSR
If the processor also has MCA feature available (For example Intel
Pentium Pro), the parameters are:
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
IA64 Processors
1 - Bugcheck Type
1 - MCA_ASSERT
2 - MCA_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing MCA.
3 - MCA_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
4 - MCA_FATAL
FW reported a fatal MCA.
5 - MCA_NONFATAL
SAL reported a recoverable MCA and we don't support currently
support recovery or SAL generated an MCA and then couldn't
produce an error record.
0xB - INIT_ASSERT
0xC - INIT_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
0xD - INIT_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
0xE - INIT_FATAL
Not used.
2 - Address of log
3 - Size of log
4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
AMD64 Processors
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
Arguments:
Arg1: 0000000000000001
Arg2: fffff80000075bc0
Arg3: 00000000b6000000
Arg4: 0000000000000181
Debugging Details:
------------------
BUGCHECK_STR: 0x9C_AuthenticAMD
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: Idle
CURRENT_IRQL: f
LAST_CONTROL_TRANSFER: from fffff8000080ef6c to fffff8000102e8d0
STACK_TEXT:
fffff800`00075b88 fffff800`0080ef6c : 00000000`0000009c 00000000`00000001 fffff800`00075bc0 00000000`b6000000 : nt!KeBugCheckEx
fffff800`00075b90 fffff800`0102db77 : 00000000`00000000 00000000`00000000 fffff800`011b4180 fffff800`00075ef0 : hal!HalHandleMcheck+0x12c
fffff800`00075cf0 fffff800`0102d9b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x77
fffff800`00075e70 fffff800`0102fe86 : fffff800`00069c28 00000000`000001a0 fffff800`011b4180 fffffadf`cc5d5a60 : nt!KiMcheckAbort+0xf5
fffff800`00069c30 fffff800`0081dcd2 : fffff800`0106771e fffff800`011b4180 fffff800`011b4180 fffff800`011b8540 : nt!KiInterruptDispatchNoLock+0xc6
fffff800`00069dc8 fffff800`0106771e : fffff800`011b4180 fffff800`011b4180 fffff800`011b8540 fffffadf`cc2f3bf0 : hal!HalProcessorIdle+0x2
fffff800`00069dd0 fffff800`014191d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x1e
fffff800`00069e00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemStartup+0x1bf
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KxMcheckAbort+77
fffff800`0102db77 488d8c2400010000 lea rcx,[rsp+100h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KxMcheckAbort+77
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 49c22d6e
FAILURE_BUCKET_ID: X64_0x9C_AuthenticAMD_nt!KxMcheckAbort+77
BUCKET_ID: X64_0x9C_AuthenticAMD_nt!KxMcheckAbort+77
Followup: MachineOwner