Hi, Zebbztar, and welcome to the forum.
Bucheck F7 (2X), DRIVER_OVERRAN_STACK_BUFFER. Usual causes: Device driver, Malware.
Bugcheck FC, ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY. Usual causes: Device driver.
Because of two dumps with bugcheck F7, I recommend that you download, install and update Malware bytes. Run a scan of your system. Let's make sure you do not have a nasty on your system. Post back with your results.
Uninstall Eset NOD32 using this removal tool: Tool. Your version is known to cause BSOD's on some Win 7 systems. Download and install Microsoft Security Essentials in its place. After you get your system stable you can try Eset again; but install the 2010 version, not your current version.
Update the following driver through the link provided. It is out of date.
Follow these suggestions and see how your system runs. Plese update us and let us know. If you get another BSOD, upload it and we will go from there.
Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x8284e000 PsLoadedModuleList = 0x82996810
Debug session time: Sun Jan 16 14:34:02.613 2011 (GMT-5)
System Uptime: 0 days 2:49:46.532
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
......
1: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F7, {293f6a19, 293f6a19, d6c095e6, 0}
Probably caused by : ntkrpamp.exe ( nt!KiDeferredReadyThread+8f2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 293f6a19, Actual security check cookie from the stack
Arg2: 293f6a19, Expected security check cookie
Arg3: d6c095e6, Complement of the expected security check cookie
Arg4: 00000000, zero
Debugging Details:
------------------
FAULTING_IP:
nt!KiDeferredReadyThread+8f2
828bab89 8be5 mov esp,ebp
SECURITY_COOKIE: Expected 293f6a19 found 293f6a19
BUGCHECK_STR: 0xF7_ONE_BIT
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 8291c999 to 8292ad10
STACK_TEXT:
9cc83ba4 8291c999 000000f7 293f6a19 293f6a19 nt!KeBugCheckEx+0x1e
9cc83bc4 828bab89 86faa93c 00c83b00 00000000 nt!__report_gsfailure+0x24
9cc83c34 828bb5a9 c61e8d48 00000000 c61e8d48 nt!KiDeferredReadyThread+0x8f2
9cc83c50 828bb567 00000000 807c5120 807c5120 nt!KiReadyThread+0x30
9cc83c68 828b57b1 00000001 00000001 00000000 nt!KiProcessThreadWaitList+0x3f
9cc83ca4 828b5777 807c5120 00000000 00000001 nt!KiExitDispatcher+0x2a
9cc83cdc 82a84056 87551168 00000001 00000000 nt!KeSetEvent+0xb2
9cc83d24 8289142a 00000350 00000000 0012db4c nt!NtSetEvent+0x6f
9cc83d24 776c64f4 00000350 00000000 0012db4c nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012db4c 00000000 00000000 00000000 00000000 0x776c64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDeferredReadyThread+8f2
828bab89 8be5 mov esp,ebp
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDeferredReadyThread+8f2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
FAILURE_BUCKET_ID: 0xF7_ONE_BIT_nt!KiDeferredReadyThread+8f2
BUCKET_ID: 0xF7_ONE_BIT_nt!KiDeferredReadyThread+8f2
Followup: MachineOwner
---------
Debug session time: Sun Jan 16 15:27:24.221 2011 (GMT-5)
System Uptime: 0 days 0:26:44.141
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
......
1: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F7, {293a507e, 293a507e, d6c5af81, 0}
Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+2fa )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 293a507e, Actual security check cookie from the stack
Arg2: 293a507e, Expected security check cookie
Arg3: d6c5af81, Complement of the expected security check cookie
Arg4: 00000000, zero
Debugging Details:
------------------
FAULTING_IP:
nt!KiDeferredReadyThread+8f2
828bdb89 8be5 mov esp,ebp
SECURITY_COOKIE: Expected 293a507e found 293a507e
BUGCHECK_STR: 0xF7_ONE_BIT
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: msnmsgr.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 8291f999 to 8292dd10
STACK_TEXT:
807e5bdc 8291f999 000000f7 293a507e 293a507e nt!KeBugCheckEx+0x1e
807e5bfc 828bdb89 00000005 000f3088 00000000 nt!__report_gsfailure+0x24
807e5c6c 828be5a9 86f50b58 00000000 86f50b58 nt!KiDeferredReadyThread+0x8f2
807e5c88 828be567 00000000 807c5120 86f50bb8 nt!KiReadyThread+0x30
807e5ca0 828b87b1 00000006 00000001 86f50b58 nt!KiProcessThreadWaitList+0x3f
807e5cdc 8290b967 807c5120 00000000 00000001 nt!KiExitDispatcher+0x2a
807e5d18 828b9dff 84d6ae40 85f8de78 00000000 nt!KeInsertQueueApc+0xb9
807e5d64 8e3275e0 86f0f0d8 86f605a8 00000000 nt!IopfCompleteRequest+0x3f4
807e5d88 81f68664 000000f0 86f0f1c0 00000018 mouclass!MouseClassServiceCallback+0x2fa
807e5dbc 828b9b33 00000000 02000000 01f0f0d8 mouhid!MouHid_ReadComplete+0x53a
807e5e04 81f4f424 807e5e0c 807e5e0c 8661e6a0 nt!IopfCompleteRequest+0x128
807e5e20 81f4f5df 0261e688 86f38e00 00000009 HIDCLASS!HidpDistributeInterruptReport+0xce
807e5e5c 828b9b33 00000000 865d4428 86f5a49c HIDCLASS!HidpInterruptReadComplete+0x1a7
807e5ea0 8e340868 82891334 84da96f0 00000000 nt!IopfCompleteRequest+0x128
807e5ed0 8e341178 87404660 865d4428 84938640 USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x6e0
807e5efc 8e3449af 85f53028 85f530f0 85f53a98 USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x33b
807e5f24 8e33ed18 85f53028 85f53a98 85f53002 USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xbc
807e5f48 828b93b5 85f53aa4 85f53002 00000000 USBPORT!USBPORT_Xdpc_Worker+0x173
807e5fa4 828b9218 807c5120 87245cb0 00000000 nt!KiExecuteAllDpcs+0xf9
807e5ff4 828b89dc 8cfdec60 00000000 00000000 nt!KiRetireDpcList+0xd5
807e5ff8 8cfdec60 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c
WARNING: Frame IP not in any known module. Following frames may be wrong.
828b89dc 00000000 0000001a 00d6850f bb830000 0x8cfdec60
STACK_COMMAND: kb
FOLLOWUP_IP:
mouclass!MouseClassServiceCallback+2fa
8e3275e0 6a18 push 18h
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: mouclass!MouseClassServiceCallback+2fa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf13
FAILURE_BUCKET_ID: 0xF7_ONE_BIT_mouclass!MouseClassServiceCallback+2fa
BUCKET_ID: 0xF7_ONE_BIT_mouclass!MouseClassServiceCallback+2fa
Followup: MachineOwner
---------
Debug session time: Sun Jan 16 16:35:58.945 2011 (GMT-5)
System Uptime: 0 days 0:09:54.661
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
......
1: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FC, {90cd72aa, 27786101, a1d09914, 2}
Probably caused by : win32k.sys ( win32k!EngCopyBits+604 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 90cd72aa, Virtual address for the attempted execute.
Arg2: 27786101, PTE contents.
Arg3: a1d09914, (reserved)
Arg4: 00000002, (reserved)
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'spsys' and 'spsys.sys' overlap
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: egui.exe
CURRENT_IRQL: 0
TRAP_FRAME: a1d09914 -- (.trap 0xffffffffa1d09914)
ErrCode = 00000011
eax=fbf62d6c ebx=fbf62d6c ecx=00000000 edx=00000000 esi=a1d09b24 edi=fceced6c
eip=90cd72aa esp=a1d09988 ebp=a1d099a4 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
90cd72aa ff ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 8287f638 to 828be903
STACK_TEXT:
a1d098fc 8287f638 00000008 90cd72aa 00000000 nt!MmAccessFault+0x106
a1d098fc 90cd72aa 00000008 90cd72aa 00000000 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
a1d099a4 92cd71ea 00000002 3333ee71 fe680728 0x90cd72aa
a1d09be4 92d0cdd2 fbf1b010 fce87010 00000000 win32k!EngCopyBits+0x604
a1d09ccc 92cf4fae ffbbd550 92e452f0 ffbbd550 win32k!NtGdiBitBltInternal+0x6ab
a1d09d00 8287c44a c7010ce7 00000000 00000000 win32k!NtGdiBitBlt+0x2f
a1d09d00 777f64f4 c7010ce7 00000000 00000000 nt!KiFastCallEntry+0x12a
0012f8e8 00000000 00000000 00000000 00000000 0x777f64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!EngCopyBits+604
92cd71ea c745fcfeffffff mov dword ptr [ebp-4],0FFFFFFFEh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!EngCopyBits+604
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cbe5b31
FAILURE_BUCKET_ID: 0xFC_win32k!EngCopyBits+604
BUCKET_ID: 0xFC_win32k!EngCopyBits+604
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
82fb6000 82ffe000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8e083000 8e0dd000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
8ff0a000 8ff1c000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8d2d5000 8d2e7000 amdk8 amdk8.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
88765000 8876e000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
886cd000 886d6000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
886d6000 886f9000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
88bf1000 88bf8000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8d2a6000 8d2b4000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
82e42000 82e4a000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
915ac000 915c5000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
92ec0000 92ede000 cdd cdd.dll Mon Jul 13 21:04:18 2009 (4A5BD992)
887b3000 887d2000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
82e8c000 82f37000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
88bae000 88bd3000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
82e4a000 82e8c000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88972000 889cf000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
8fefd000 8ff0a000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
822b7000 822c4000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8d22a000 8d28e000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8d28e000 8d2a6000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8e1de000 8e1ea000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
88b9d000 88bae000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8229e000 822b7000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
822c4000 822ce000 dump_diskdump dump_diskdump.sys Mon Jul 13 19:45:49 2009 (4A5BC72D)
822f3000 82304000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
822ce000 822f3000 dump_nvstor dump_nvstor.sys Wed May 20 02:44:09 2009 (4A13A6B9)
8234d000 82357000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8fe0d000 8fec4000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1)
8fec4000 8fefd000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
91438000 91504000 eamon eamon.sys Tue Sep 29 06:51:42 2009 (4AC1E6BE)
887d2000 887ef000 ehdrv ehdrv.sys Tue Sep 29 06:52:16 2009 (4AC1E6E0)
8e1d5000 8e1de000 EIO EIO.sys Tue Jul 21 22:34:52 2009 (4A667ACC)
9141b000 91435000 epfwwfpr epfwwfpr.sys Tue Sep 29 06:46:24 2009 (4AC1E580)
887a2000 887b3000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8876e000 887a2000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
889dd000 889e6000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
88b6b000 88b9d000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
88d4f000 88d80000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82802000 82839000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8d387000 8d3a6000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
8221f000 8226f000 HdAudio HdAudio.sys Mon Jul 13 19:51:46 2009 (4A5BC892)
82328000 8233b000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
8233b000 82341480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
8231d000 82328000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868)
91527000 915ac000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
88b63000 88b6b000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8d2f1000 8d309000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8d309000 8d316000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bb8000 80bc0000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8ffb3000 8ffe7000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709)
8895f000 88972000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88b2e000 88b53000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
91504000 91514000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
82362000 8237d000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
82e26000 82e31000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
82357000 82362000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
8d316000 8d323000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
82342000 8234d000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
886b7000 886cd000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
915c5000 915d7000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
915d7000 915fa000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
8237d000 823b8000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
91400000 9141b000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8e048000 8e053000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
82e09000 82e11000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88934000 8895f000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8e1cb000 8e1d5000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
88b53000 88b63000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88a39000 88af0000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8ff34000 8ff3f000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8ff3f000 8ff61000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
8d200000 8d211000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
8e135000 8e143000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8e0dd000 8e10f000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
88af0000 88b2e000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
8e053000 8e061000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
8e1c1000 8e1cb000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82839000 82c49000 nt ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
88805000 88934000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
88bea000 88bf1000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
91fac000 91fad040 nvBridge nvBridge.kmd Sat Oct 16 13:04:23 2010 (4CB9DB17)
9160f000 91fab5a0 nvlddmkm nvlddmkm.sys Sat Oct 16 13:07:56 2010 (4CB9DBEC)
8d3a6000 8d3fac80 nvm62x32 nvm62x32.sys Fri Oct 17 17:00:39 2008 (48F8FCF7)
886f9000 8871e000 nvstor nvstor.sys Wed May 20 02:44:09 2009 (4A13A6B9)
8e116000 8e135000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
88636000 88647000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
88601000 8862b000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
886a2000 886a9000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
886a9000 886b7000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
889cf000 889dd000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9602e000 960c5000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
8226f000 8229e000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
82e31000 82e42000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8ff1c000 8ff34000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
8ff61000 8ff79000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8ff79000 8ff90000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8ff90000 8ffa7000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
8e180000 8e1c1000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8ffa7000 8ffb1000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20)
8e030000 8e038000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8e038000 8e040000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8e040000 8e048000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88dd0000 88dfd000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
91514000 91527000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
960c5000 960cf000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
8d2e7000 8d2f1000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717)
8e143000 8e15d000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D)
88dc8000 88dd0000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
9ae21000 9ae8b000 spsys spsys.sys Mon May 11 12:37:10 2009 (4A085436)
9614c000 9619d000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E)
960fd000 9614c000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165)
960cf000 960f0000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F)
8871e000 88765000 storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
8ffb1000 8ffb2380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
88c06000 88d4f000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
960f0000 960fd000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8e078000 8e083000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8e061000 8e078000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8e170000 8e180000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
92e90000 92e99000 TSDDD TSDDD.dll unavailable (00000000)
8d2b4000 8d2d5000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
8ffe7000 8fff5000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
82304000 8231b000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
8231b000 8231c700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8d378000 8d387000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
91fae000 91ff2000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
8d323000 8d32d000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8d32d000 8d378000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
8862b000 88636000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
889e6000 889f2000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
8e002000 8e023000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88d80000 88d88380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
88647000 88657000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88657000 886a2000 volmgrx volmgrx.sys unavailable (00000000)
88d89000 88dc8000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8e15d000 8e170000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
8e023000 8e030000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
82f37000 82fa8000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
82fa8000 82fb6000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8e10f000 8e116000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
92c30000 92e7b000 win32k win32k.sys Tue Oct 19 23:00:01 2010 (4CBE5B31)
82e00000 82e09000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
Unloaded modules:
9ae2b000 9ae95000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9141b000 91433000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
88bd3000 88be0000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
88be0000 88bea000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
88a00000 88a25000 dump_nvstor.
Timestamp: unavailable (00000000)
Checksum: 00000000
88a25000 88a36000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000