Marty Frazier
New Member
- Joined
- Feb 23, 2011
- Messages
- 8
- Thread Author
- #1
I have removed Avg and changed to MS essentials. Checked device drivers and run memtest and checked mem setup in bios. It still keeps crashing! Please help.
I hope this is what you want. Sorry I put up the wrong one last time.
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022211-26109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c13000 PsLoadedModuleList = 0xfffff800`02e50e50
Debug session time: Tue Feb 22 16:22:09.760 2011 (UTC - 5:00)
System Uptime: 0 days 0:14:54.026
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80003011442}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80003011442
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c82ca9 to fffff80002c83740
STACK_TEXT:
fffff800`03ff0d28 fffff800`02c82ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`03ff0d30 fffff800`02c81172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`03ff0e70 fffff800`03011442 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`00000ad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfTAcquireEntryInfo+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02c81172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022211-27843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e50e90
Debug session time: Tue Feb 22 21:34:50.142 2011 (UTC - 5:00)
System Uptime: 0 days 2:31:58.205
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80002c9d3f1}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002c9d3f1
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: avgnsa.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c8abe9 to fffff80002c8b640
STACK_TEXT:
fffff800`00ba4d28 fffff800`02c8abe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02c890b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`02c9d3f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`00006990 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopAllocateIrpPrivate+0x71
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02c890b2 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022011-21656-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c4e000 PsLoadedModuleList = 0xfffff800`02e8be50
Debug session time: Sun Feb 20 15:15:39.267 2011 (UTC - 5:00)
System Uptime: 0 days 0:58:50.613
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff8800ff14b12}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+e8b12 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff8800ff14b12
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: javaw.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002cbdca9 to fffff80002cbe740
STACK_TEXT:
fffff800`00ba4d28 fffff800`02cbdca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02cbc172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff880`0ff14b12 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`00004e60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0xe8b12
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+e8b12
fffff880`0ff14b12 e81de9f6ff call nvlddmkm+0x57434 (fffff880`0fe83434)
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+e8b12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c37918e
FAILURE_BUCKET_ID: X64_0x7f_8_VRF_nvlddmkm+e8b12
BUCKET_ID: X64_0x7f_8_VRF_nvlddmkm+e8b12
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022211-27687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e98e90
Debug session time: Tue Feb 22 21:38:32.928 2011 (UTC - 5:00)
System Uptime: 0 days 0:03:09.975
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80002cd94c5}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002cd94c5
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002cd2be9 to fffff80002cd3640
STACK_TEXT:
fffff800`00ba4d28 fffff800`02cd2be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02cd10b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`02cd94c5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
ffffffff`ffffea90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0x45
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02cd10b2 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_VRF_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
start end module name
fffff880`00e00000 fffff880`00e57000 ACPI ACPI.sys Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`02ca6000 fffff880`02d2f000 afd afd.sys Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`0fdea000 fffff880`0fe00000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dd6000 fffff880`00de1000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`00e6a000 fffff880`00e73000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dac000 fffff880`00dd6000 ataport ataport.SYS Sat Nov 20 04:19:15 2010 (4CE79293)
fffff960`008a0000 fffff960`00901000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`04a12000 fffff880`04a46000 AVGIDSDriver AVGIDSDriver.Sys Tue Aug 03 18:24:45 2010 (4C58972D)
fffff880`01650000 fffff880`0165a000 AVGIDSEH AVGIDSEH.Sys Mon Sep 13 18:46:38 2010 (4C8EA9CE)
fffff880`047a7000 fffff880`047b3000 AVGIDSFilter AVGIDSFilter.Sys Tue Aug 03 18:23:21 2010 (4C5896D9)
fffff880`03c61000 fffff880`03cb1000 avgldx64 avgldx64.sys Tue Dec 07 21:01:55 2010 (4CFEE713)
fffff880`01588000 fffff880`01597000 avgmfx64 avgmfx64.sys Mon Sep 06 20:49:14 2010 (4C858C0A)
fffff880`01646000 fffff880`01650000 avgrkx64 avgrkx64.sys Mon Sep 06 20:49:37 2010 (4C858C21)
fffff880`02c00000 fffff880`02c61000 avgtdia avgtdia.sys Fri Nov 12 06:08:42 2010 (4CDD203A)
fffff880`019f5000 fffff880`019fc000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`01094000 fffff880`010a5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`046d3000 fffff880`046f1000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006b0000 fffff960`006d7000 cdd cdd.dll unavailable (00000000)
fffff880`01690000 fffff880`016ba000 cdrom cdrom.sys Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00e74000 fffff880`00f34000 CI CI.dll Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01616000 fffff880`01646000 CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00cf1000 fffff880`00d4f000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000 cng cng.sys Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`0fdda000 fffff880`0fdea000 CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`04ab6000 fffff880`04ac4000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02ddf000 fffff880`02dfd000 dfsc dfsc.sys Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`02dd0000 fffff880`02ddf000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01600000 fffff880`01616000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0403d000 fffff880`0405f000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04ad0000 fffff880`04ad9000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04ac4000 fffff880`04ad0000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04ad9000 fffff880`04aec000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04aec000 fffff880`04af8000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0fcdd000 fffff880`0fdd1000 dxgkrnl dxgkrnl.sys Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`0f000000 fffff880`0f046000 dxgmms1 dxgmms1.sys Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`0112f000 fffff880`01143000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e3000 fffff880`0112f000 fltmgr fltmgr.sys Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0122c000 fffff880`01236000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`019bb000 fffff880`019f5000 fvevol fvevol.sys Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`018c8000 fffff880`01912000 fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`03dc7000 fffff880`03dd4000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02c0a000 fffff800`02c53000 hal hal.dll Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`03da3000 fffff880`03dc7000 HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`0417f000 fffff880`041db000 HdAudio HdAudio.sys Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`04a85000 fffff880`04a9e000 HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`04a9e000 fffff880`04aa6080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04a77000 fffff880`04a85000 hidusb hidusb.sys Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`0460a000 fffff880`046d3000 HTTP HTTP.sys Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`019b2000 fffff880`019bb000 hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`03cf9000 fffff880`03d17000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03cd7000 fffff880`03ced000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03d17000 fffff880`03d26000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bad000 fffff800`00bb7000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`040bb000 fffff880`040fe000 ks ks.sys Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01200000 fffff880`0121b000 ksecdd ksecdd.sys Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`0155d000 fffff880`01588000 ksecpkg ksecpkg.sys Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`0405f000 fffff880`04064200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04b29000 fffff880`04b3e000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04b06000 fffff880`04b29000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c8e000 fffff880`00cdd000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`04af8000 fffff880`04b06000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`040aa000 fffff880`040b9000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04aa9000 fffff880`04ab6000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c6c000 fffff880`00c86000 mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`046f1000 fffff880`04709000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`04709000 fffff880`04736000 mrxsmb mrxsmb.sys Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`04736000 fffff880`04783000 mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`04783000 fffff880`047a7000 mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`015f5000 fffff880`01600000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e60000 fffff880`00e6a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01143000 fffff880`011a1000 msrpc msrpc.sys Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`02dc5000 fffff880`02dd0000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019a0000 fffff880`019b2000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0140a000 fffff880`014fd000 ndis ndis.sys Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`03c52000 fffff880`03c5e000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`010a5000 fffff880`010d4000 ndiswan ndiswan.sys Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0416a000 fffff880`0417f000 NDProxy NDProxy.SYS Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`02d5e000 fffff880`02d6d000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c61000 fffff880`02ca6000 netbt netbt.sys Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`014fd000 fffff880`0155d000 NETIO NETIO.SYS Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`01236000 fffff880`01247000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02db9000 fffff880`02dc5000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c53000 fffff800`0323d000 nt ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`0124b000 fffff880`013ee000 Ntfs Ntfs.sys Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`016ba000 fffff880`016c3000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fcdb000 fffff880`0fcdc180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`04a4e000 fffff880`04a77000 nvhda64v nvhda64v.sys Tue Sep 07 16:08:40 2010 (4C869BC8)
fffff880`0f049000 fffff880`0fcdae00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`03c00000 fffff880`03c51500 nvmf6264 nvmf6264.sys Thu Jul 30 19:48:18 2009 (4A723142)
fffff880`03d26000 fffff880`03d31000 nvsmu nvsmu.sys Mon Jun 29 03:36:37 2009 (4A486F05)
fffff880`02d38000 fffff880`02d5e000 pacer pacer.sys Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00d82000 fffff880`00d97000 partmgr partmgr.sys Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00d4f000 fffff880`00d82000 pci pci.sys Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00ff4000 fffff880`00ffb000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00c5c000 fffff880`00c6c000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121b000 fffff880`0122c000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04b56000 fffff880`04bfc000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04000000 fffff880`0403d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cdd000 fffff880`00cf1000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03dd4000 fffff880`03df8000 rasl2tp rasl2tp.sys Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`00de1000 fffff880`00dfc000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0406f000 fffff880`04090000 raspptp raspptp.sys Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`04090000 fffff880`040aa000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`011a1000 fffff880`011f2000 rdbss rdbss.sys Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`015da000 fffff880`015e3000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015e3000 fffff880`015ec000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015ec000 fffff880`015f5000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01966000 fffff880`019a0000 rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`04b3e000 fffff880`04b56000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`047b3000 fffff880`047be000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03ced000 fffff880`03cf9000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d6d000 fffff880`02d8a000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0195e000 fffff880`01966000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`04ea8000 fffff880`04f41000 srv srv.sys Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`04e3d000 fffff880`04ea8000 srv2 srv2.sys Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`047be000 fffff880`047ef000 srvnet srvnet.sys Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`040b9000 fffff880`040ba480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`016c4000 fffff880`018c8000 tcpip tcpip.sys Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`04a00000 fffff880`04a12000 tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`013ee000 fffff880`013fb000 TDI TDI.SYS Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01072000 fffff880`01094000 tdx tdx.sys Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`02da5000 fffff880`02db9000 termdd termdd.sys Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`005a0000 fffff960`005aa000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03cb1000 fffff880`03cd7000 tunnel tunnel.sys Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`040fe000 fffff880`04110000 umbus umbus.sys Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`04aa7000 fffff880`04aa8f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03d92000 fffff880`03da3000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`04110000 fffff880`0416a000 usbhub usbhub.sys Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`03d31000 fffff880`03d3c000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03d3c000 fffff880`03d92000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fe7000 fffff880`00ff4000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01597000 fffff880`015a5000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`015a5000 fffff880`015ca000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00d97000 fffff880`00dac000 volmgr volmgr.sys Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01912000 fffff880`0195e000 volsnap volsnap.sys Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`02d8a000 fffff880`02da5000 wanarp wanarp.sys Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`015ca000 fffff880`015da000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00f34000 fffff880`00fd8000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00fd8000 fffff880`00fe7000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d2f000 fffff880`02d38000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00040000 fffff960`00351000 win32k win32k.sys unavailable (00000000)
fffff880`0fdd1000 fffff880`0fdda000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e57000 fffff880`00e60000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
Unloaded modules:
fffff880`0165a000 fffff880`01668000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01668000 fffff880`01674000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01674000 fffff880`0167d000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`0167d000 fffff880`01690000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Here is the CPU Z memory snip
I hope this is what you want. Sorry I put up the wrong one last time.