Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 109b, 405001a, fffffa8005b26c10}
GetPointerFromAddress: unable to read from fffff80002eba100
GetUlongFromAddress: unable to read from fffff80002eba1c0
Probably caused by : ndis.sys ( ndis!nullDeleteFilter+15 )
Followup: MachineOwner
your other dump file was Bugcheck A and causes include:
This bug check is issued if paged memory (or invalid memory) is accessed when the IRQL is too high.
The error that generates this bug check usually occurs after the installation of a faulty device driver, system service, or BIOS.
If you encounter bug check 0xA while upgrading to a later version of Windows, this error might be caused by a device driver, a system service, a virus scanner, or a backup tool that is incompatible with the new version.
The above dump file is most often a driver problem .Other possibilities include malware and even antivirus/antispyware/security programs and disk issues. The probable cause is ndis.sys which is part of the network interface.
As you've made some changes after the two dump files were generated I'm inclined to wait and see how you get on. If you do still get a bsod then we could try the driver verifier but let's see how you get on first.