Actually this is the last dump:
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ee27c0bc, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 80505f17, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: ee27c0bc
FAULTING_IP:
nt!MiLocateAndReserveWsle+51
80505f17 8b0c81 mov ecx,dword ptr [ecx+eax*4]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: explorer.exe
TRAP_FRAME: 9beeb438 -- (.trap 0xffffffff9beeb438)
.trap 0xffffffff9beeb438
ErrCode = 00000002
eax=00ffffff ebx=0000041b ecx=00000310 edx=0000060b esi=bca80008 edi=bd069000
eip=805462d0 esp=9beeb4ac ebp=9beeb4e0 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!RtlFillMemoryUlong+0x10:
805462d0 f3ab rep stos dword ptr es:[edi]
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from 80513ace to 80505f17