Od kiedy kupilem dziecku nowy komputer zaczeły się problemy. Mianowicie wyskakują co jakiś czas BSoD-y

Wklejam kilka raportów i proszę o pomoc w zdiagnozowaniu problemu.
1
Microsoft ® Windows Debugger Version 6.2.9200.16384 AMD64
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Grzesiu\Desktop\012913-16520-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsof...ownload/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`03068000 PsLoadedModuleList = 0xfffff800`032ac670
Debug session time: Tue Jan 29 20:21:29.598 2013 (UTC + 1:00)
System Uptime: 0 days 0:03:55.862
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 2ad7e, 3562d009}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000002ad7e
Arg4: 000000003562d009
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: WorldOfTanks.e
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003eb7380 -- (.trap 0xfffff88003eb7380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000540 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003102b38 rsp=fffff88003eb7510 rbp=0000000000000001
r8=fffffa80072452c0 r9=000000001f7a2000 r10=0000000000000540
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MmProbeAndLockPages+0x118:
fffff800`03102b38 410fb601 movzx eax,byte ptr [r9] ds:00000000`1f7a2000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030776fc to fffff800030e6fc0
STACK_TEXT:
fffff880`03eb7218 fffff800`030776fc : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0002ad7e : nt!KeBugCheckEx
fffff880`03eb7220 fffff800`030e50ee : 00000000`00000000 00000000`1f7a2000 fffffa80`07f21000 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x45f3d
fffff880`03eb7380 fffff800`03102b38 : fffffa80`00000000 00000000`00002a40 00000000`00000000 fffff800`03212350 : nt!KiPageFault+0x16e
fffff880`03eb7510 fffff880`053cfa25 : fffffa80`07245000 00000000`00000000 fffff8a0`00000002 00000000`1f750000 : nt!MmProbeAndLockPages+0x118
fffff880`03eb7620 fffff880`053cebbc : fffffa80`0896c660 fffff8a0`07f72870 00000000`00000168 00000000`00540000 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x229
fffff880`03eb76b0 fffff880`053c96a0 : fffff8a0`07f72870 fffff8a0`07f72870 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_SEGMENT::LockAllocationBackingStore+0x80
fffff880`03eb7720 fffff880`053bdaf3 : fffffa80`06dc9f70 fffffa80`0895c000 fffffa80`0895c000 fffff880`053bd6e8 : dxgmms1!VIDMM_APERTURE_SEGMENT::CommitResource+0x1c4
fffff880`03eb7770 fffff880`053ba763 : 00000000`00000000 fffffa80`06e4e000 00000000`00000000 fffffa80`08c79770 : dxgmms1!VIDMM_GLOBAL::PageInAllocations+0xbb
fffff880`03eb77d0 fffff880`053d465d : 00000000`00000000 fffff8a0`014a70d0 fffffa80`00000000 fffffa80`06d71430 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xccf
fffff880`03eb79a0 fffff880`053d4398 : fffff880`02f69f40 fffff880`053d3d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`03eb7b90 fffff880`053d3e96 : 00000000`00000000 fffffa80`0978c550 00000000`00000080 fffffa80`0893c010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`03eb7bc0 fffff800`0337de5a : 00000000`0248f81f fffffa80`08939610 fffffa80`066f2040 fffffa80`08939610 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`03eb7c00 fffff800`030d7d26 : fffff880`02f65180 fffffa80`08939610 fffff880`02f6ffc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03eb7c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
fffff880`053cfa25 4c8b1d8cd6fdff mov r11,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`053ad0b8)]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0x1a_5003_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
BUCKET_ID: X64_0x1a_5003_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
Followup: MachineOwner
---------
2
Microsoft ® Windows Debugger Version 6.2.9200.16384 AMD64
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Grzesiu\Desktop\013013-15709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsof...ownload/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`03017000 PsLoadedModuleList = 0xfffff800`0325b670
Debug session time: Wed Jan 30 10:45:24.525 2013 (UTC + 1:00)
System Uptime: 0 days 0:25:35.415
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a04c65ee58, 0, fffff800030ab810, 5}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MmCheckCachedPageStates+3f0 )
Followup: MachineOwner
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a04c65ee58, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800030ab810, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c5100
GetUlongFromAddress: unable to read from fffff800032c51c0
fffff8a04c65ee58 Paged pool
FAULTING_IP:
nt!MmCheckCachedPageStates+3f0
fffff800`030ab810 498b1c24 mov rbx,qword ptr [r12]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: WorldOfTanks.e
CURRENT_IRQL: 0
TRAP_FRAME: fffff88006ed0200 -- (.trap 0xfffff88006ed0200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=f8a04c65ee580400 rbx=0000000000000000 rcx=ffffffffffffffff
rdx=0000000000000011 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030ab810 rsp=fffff88006ed0390 rbp=fffff88006ed0400
r8=0000000000000000 r9=fffffa800262ff50 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MmCheckCachedPageStates+0x3f0:
fffff800`030ab810 498b1c24 mov rbx,qword ptr [r12] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000303c8af to fffff80003095fc0
STACK_TEXT:
fffff880`06ed0098 fffff800`0303c8af : 00000000`00000050 fffff8a0`4c65ee58 00000000`00000000 fffff880`06ed0200 : nt!KeBugCheckEx
fffff880`06ed00a0 fffff800`030940ee : 00000000`00000000 fffff8a0`4c65ee58 fffffa80`08e67b00 fffff8a0`4c65ee58 : nt! ?? ::FNODOBFM::`string'+0x437c1
fffff880`06ed0200 fffff800`030ab810 : fffffa80`075aaeb0 00000000`00000000 fffff880`01099a00 fffffa80`06f56000 : nt!KiPageFault+0x16e
fffff880`06ed0390 fffff800`0308433e : fffff980`1504b000 00000000`00001000 fffffa80`00000000 fffffa80`06f56200 : nt!MmCheckCachedPageStates+0x3f0
fffff880`06ed0540 fffff800`0337b960 : fffffa80`00000000 00000000`0bdcba49 fffffa80`06d55690 00000000`04792eb0 : nt!CcFetchDataForRead+0x10e
fffff880`06ed05a0 fffff880`012e2f88 : fffff880`00000000 00000000`00000005 fffffa80`000345b7 fffffa80`00000201 : nt!CcCopyRead+0x180
fffff880`06ed0660 fffff880`01087098 : fffffa80`06d55690 fffffa80`06f56198 fffffa80`06c0e010 fffffa80`06d55601 : Ntfs!NtfsCopyReadA+0x1a8
fffff880`06ed0840 fffff880`0108a8ba : fffff880`06ed0910 00000000`04792e03 00000000`04792e00 fffffa80`06d55600 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`06ed08a0 fffff880`010a8630 : fffffa80`06d55690 00000000`00000000 fffff880`06ed0a00 00000000`00000200 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`06ed08e0 fffff800`0337b499 : fffffa80`06d55690 fffffa80`00000001 fffffa80`067332a0 fffffa80`06d55690 : fltmgr!FltpFastIoRead+0x1d0
fffff880`06ed0980 fffff800`03095253 : 00000000`00000140 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`06ed0a70 00000000`75292e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008ec08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75292e09
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmCheckCachedPageStates+3f0
fffff800`030ab810 498b1c24 mov rbx,qword ptr [r12]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MmCheckCachedPageStates+3f0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 503f82be
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MmCheckCachedPageStates+3f0
BUCKET_ID: X64_0x50_nt!MmCheckCachedPageStates+3f0
Followup: MachineOwner
to sa dwa najczestrze