Here it is with the symbols loaded:
These are the main 2 I get.
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Admin\Documents\dump files BSOD\Mini010408-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6000.16575.x86fre.vista_gdr.071009-1548
Kernel base = 0x81800000 PsLoadedModuleList = 0x81911e10
Debug session time: Fri Jan 4 13:25:54.643 2008 (GMT-5)
System Uptime: 0 days 2:24:10.515
Loading Kernel Symbols
.............................................................................................................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {de9a8434, 0, 818198c9, 2}
Probably caused by : memory_corruption ( nt!MiDeleteAddressesInWorkingSet+1ab )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: de9a8434, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 818198c9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 819315ac
Unable to read MiSystemVaType memory at 819117e0
de9a8434
FAULTING_IP:
nt!MiDeleteAddressesInWorkingSet+1ab
818198c9 f7401800000008 test dword ptr [eax+18h],8000000h
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: WoW.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9302b754 -- (.trap 0xffffffff9302b754)
ErrCode = 00000000
eax=de9a841c ebx=8512ca58 ecx=21701a11 edx=23093601 esi=c0118498 edi=c0801000
eip=818198c9 esp=9302b7c8 ebp=9302bc24 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!MiDeleteAddressesInWorkingSet+0x1ab:
818198c9 f7401800000008 test dword ptr [eax+18h],8000000h ds:0023
😀e9a8434=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8188fbb4 to 818a9ef2
STACK_TEXT:
9302b73c 8188fbb4 00000000 de9a8434 00000000 nt!MmAccessFault+0x106
9302b73c 818198c9 00000000 de9a8434 00000000 nt!KiTrap0E+0xdc
9302bc24 81819cc7 8512c888 8512c888 8512c888 nt!MiDeleteAddressesInWorkingSet+0x1ab
9302bc54 81a1bd12 8512c888 930207fc 84bdd120 nt!MmCleanProcessAddressSpace+0x14f
9302bcbc 81a1b5cb 00000000 85e455c0 85e45601 nt!PspExitThread+0x64a
9302bcd4 818b1410 84bdd120 9302bd00 9302bd0c nt!PsExitSpecialApc+0x22
9302bd2c 8188cb56 00000001 00000000 9302bd44 nt!KiDeliverApc+0x1dc
9302bd2c 774b0e40 00000001 00000000 9302bd44 nt!KiServiceExit+0x56
WARNING: Frame IP not in any known module. Following frames may be wrong.
16beff60 00000000 00000000 00000000 00000000 0x774b0e40
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteAddressesInWorkingSet+1ab
818198c9 f7401800000008 test dword ptr [eax+18h],8000000h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+1ab
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 470c2f52
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x50_nt!MiDeleteAddressesInWorkingSet+1ab
BUCKET_ID: 0x50_nt!MiDeleteAddressesInWorkingSet+1ab
Followup: MachineOwner
---------
second:
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Admin\Documents\dump files BSOD\Mini011608-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Kernel Version 6001 (Service Pack 1.668) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.17052.x86fre.longhorn_rc1.071129-2315
Kernel base = 0x81a1c000 PsLoadedModuleList = 0x81b33c70
Debug session time: Wed Jan 16 21:05:39.449 2008 (GMT-5)
System Uptime: 0 days 11:35:45.321
Loading Kernel Symbols
...............................................................................................................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {84f52a24, ea29e0cf, 81b11b64, a}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : dxgkrnl.sys ( dxgkrnl!VIDMM_GLOBAL::UnreferencePrimaryAllocation+f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 84f52a24, Virtual address for the attempted write.
Arg2: ea29e0cf, PTE contents.
Arg3: 81b11b64, (reserved)
Arg4: 0000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
TRAP_FRAME: 81b11b64 -- (.trap 0xffffffff81b11b64)
ErrCode = 0000000b
eax=84f52a24 ebx=8f1f9280 ecx=ffffffff edx=00000000 esi=84f52a18 edi=865ee008
eip=8bc0b3be esp=81b11bd8 ebp=81b11bdc iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
dxgkrnl!VIDMM_GLOBAL::UnreferencePrimaryAllocation+0xf:
8bc0b3be f00fc108 lock xadd dword ptr [eax],ecx ds:0023:84f52a24=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 81a4e2f4 to 81a987d1
STACK_TEXT:
81b11b4c 81a4e2f4 00000001 84f52a24 00000000 nt!MmAccessFault+0x10a
81b11b4c 8bc0b3be 00000001 84f52a24 00000000 nt!KiTrap0E+0xdc
81b11bdc 8bc0bba8 00000001 84f52a18 00000001 dxgkrnl!VIDMM_GLOBAL::UnreferencePrimaryAllocation+0xf
81b11c18 8bc0ad30 0000002a 00000000 85539000 dxgkrnl!VidSchiCompleteFlipEntry+0x10a
81b11c78 8bc075d3 8852dfb8 8853f008 8f1f9280 dxgkrnl!VidSchiProcessDpcVSyncCookie+0x26e
81b11c90 8bc076ff 8853f008 00000001 87211000 dxgkrnl!VidSchDdiNotifyDpcWorker+0x57
81b11cb4 8b438c91 87246968 871ea8e0 87246a20 dxgkrnl!VidSchDdiNotifyDpc+0x6e
WARNING: Stack unwind information not available. Following frames may be wrong.
81b11ce8 81aa8536 87246d38 87246968 00000000 nvlddmkm+0x2dc91
81b11d50 81aa82cd 00000000 0000000e 00000000 nt!KiRetireDpcList+0x147
81b11d54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x49
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!VIDMM_GLOBAL::UnreferencePrimaryAllocation+f
8bc0b3be f00fc108 lock xadd dword ptr [eax],ecx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: dxgkrnl!VIDMM_GLOBAL::UnreferencePrimaryAllocation+f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 474fe16f
FAILURE_BUCKET_ID: 0xBE_dxgkrnl!VIDMM_GLOBAL::UnreferencePrimaryAllocation+f
BUCKET_ID: 0xBE_dxgkrnl!VIDMM_GLOBAL::UnreferencePrimaryAllocation+f
Followup: MachineOwner
---------
EDIT: edited with more information