Here is your minidump. I highlighted the error and probable cause:
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\Jim\Desktop\Other Dumps\Mini100109-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
http://msdl.microsoft.com/downloads/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt
Built by: 2600.xpsp_sp3_gdr.090206-1234
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Oct 1 07:42:15.140 2009 (GMT-4)
System Uptime: 0 days 3:22:18.833
Loading Kernel Symbols
............................................................................................................................................
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffb0, 0, 8054b51a, 0}
Could not read faulting driver name
Unable to load image \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS, Win32 error 2
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS
Probably caused by : SYMEVENT.SYS ( SYMEVENT+14449 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffb0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 8054b51a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: ffffffb0
FAULTING_IP:
nt!ExFreePoolWithTag+23a
8054b51a 668b4efa mov cx,word ptr [esi-6]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
TRAP_FRAME: a901ba10 -- (.trap ffffffffa901ba10)
ErrCode = 00000000
eax=ffffff00 ebx=ffffffba ecx=8055a120 edx=000006ae esi=ffffffb6 edi=00000000
eip=8054b51a esp=a901ba84 ebp=a901bab8 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!ExFreePoolWithTag+0x23a:
8054b51a 668b4efa mov cx,word ptr [esi-6] ds:0023:ffffffb0=????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8052037a to 804f9f43
STACK_TEXT:
a901b990 8052037a 00000050 ffffffb0 00000000 nt!KeBugCheckEx+0x1b
a901b9f8 80544588 00000000 ffffffb0 00000000 nt!MmAccessFault+0x9a8
a901b9f8 8054b51a 00000000 ffffffb0 00000000 nt!KiTrap0E+0xd0
a901bab8 806339fd ffffffb6 00000000 e10dbd78 nt!ExFreePoolWithTag+0x23a
a901bad4 8063402b e10dbd78 e1073288 e102921c nt!CmpCleanUpKcbValueCache+0x51
a901bae8 8063c6e6 e105d378 e582cb60 8063c802 nt!CmpCleanUpKcbCacheWithLock+0x19
a901baf4 8063c802 a901bb08 80634130 e1073288 nt!CmpGetDelayedCloseIndex+0x16
a901bafc 80634130 e1073288 a901bb14 80634572 nt!CmpAddToDelayedClose+0xa
a901bb08 80634572 e1073288 a901bb2c 80637004 nt!CmpDereferenceKeyControlBlockWithLock+0x48
a901bb14 80637004 e1073288 00000000 e1202da0 nt!CmpDereferenceKeyControlBlock+0x12
a901bb2c 805bb472 e1202db8 00000000 e1202da0 nt!CmpDeleteKeyObject+0x92
a901bb48 805266da e1202db8 00000000 000009d8 nt!ObpRemoveObjectRoutine+0xe0
a901bb60 805bc347 0000018a 000009d8 e14c13b0 nt!ObfDereferenceObject+0x4c
a901bb78 805c29eb e1ad9350 e1202db8 000009d8 nt!ObpCloseHandleTableEntry+0x155
a901bb98 8060da45 e14c13b0 000009d8 a901bbd8 nt!ObpCloseHandleProcedure+0x1f
a901bbb8 805c2ae4 e1ad9350 805c29cc a901bbd8 nt!ExSweepHandleTable+0x3b
a901bbe4 805d267b 847ddaf0 84650020 84650268 nt!ObKillProcess+0x5c
a901bc84 805d28d4 00000000 84650020 00000000 nt!PspExitThread+0x5e9
a901bca4 805d2aaf 84650020 00000000 c0000001 nt!PspTerminateThreadByPointer+0x52
a901bcd0 aa49b449 00000000 00000000 85c4f228 nt!NtTerminateProcess+0x105
WARNING: Stack unwind information not available. Following frames may be wrong.
a901bd54 8054162c ffffffff 00000000 0012f92c SYMEVENT+0x14449
a901bd54 7c90de6e ffffffff 00000000 0012f92c nt!KiFastCallEntry+0xfc
0000003b 00000000 00000000 00000000 00000000 0x7c90de6e
STACK_COMMAND: kb
FOLLOWUP_IP:
SYMEVENT+14449
aa49b449 ?? ???
SYMBOL_STACK_INDEX: 14
SYMBOL_NAME: SYMEVENT+14449
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SYMEVENT
IMAGE_NAME: SYMEVENT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a428942
FAILURE_BUCKET_ID: 0x50_SYMEVENT+14449
BUCKET_ID: 0x50_SYMEVENT+14449
Followup: MachineOwner
---------
0: kd> lmvm SYMEVENT
start end module name
aa487000 aa4ac000 SYMEVENT T (no symbols)
Loaded symbol image file: SYMEVENT.SYS
Image path: \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS
Image name: SYMEVENT.SYS
Timestamp: Wed Jun 24 16:14:58 2009 (4A428942)
CheckSum: 00024D55
ImageSize: 00025000
Translations: 0000.04b0 0000.04e0 0409.04b0 0409.04e0