2 of your dumps still don't load.
Information I got from one:
BSOD Index STOP 0x0000007E: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Usual causes: Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff8800742143a, fffff880053f1618, fffff880053f0e70}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800742143a, The address that the exception occurred at
Arg3: fffff880053f1618, Exception Record Address
Arg4: fffff880053f0e70, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+31e
fffff880`0742143a 0fba635415 bt dword ptr [rbx+54h],15h
EXCEPTION_RECORD: fffff880053f1618 -- (.exr 0xfffff880053f1618)
ExceptionAddress: fffff8800742143a (dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+0x000000000000031e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000000000c4
Attempt to read from address 00000000000000c4
CONTEXT: fffff880053f0e70 -- (.cxr 0xfffff880053f0e70)
rax=0000000000000000 rbx=0000000000000070 rcx=0000000000000001
rdx=fffffa800d172ad0 rsi=0000000000000000 rdi=fffffa800c4e2000
rip=fffff8800742143a rsp=fffff880053f1850 rbp=0000000000000000
r8=0000000000000101 r9=0000000000000000 r10=0000000000000000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=fffffa800d172ad0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+0x31e:
fffff880`0742143a 0fba635415 bt dword ptr [rbx+54h],15h ds:002b:00000000`000000c4=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000000000c4
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff0e8
00000000000000c4
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+31e
fffff880`0742143a 0fba635415 bt dword ptr [rbx+54h],15h
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: CODE_CORRUPTION
LAST_CONTROL_TRANSFER: from fffff8800741e1cc to fffff8800742143a
STACK_TEXT:
fffff880`053f1850 fffff880`0741e1cc : 00000000`00000000 00000000`00000000 00000000`00000001 fffffa80`00000000 : dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+0x31e
fffff880`053f1910 fffff880`0743865d : 00000000`00000000 fffff8a0`00a45510 fffffa80`00000000 fffffa80`0db31770 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x738
fffff880`053f1ae0 fffff880`07438398 : fffff800`00b96080 fffff880`07437d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`053f1cd0 fffff880`07437e96 : 00000000`00000000 fffffa80`0db4e4c0 00000000`00000080 fffffa80`0c4bb010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`053f1d00 fffff800`0316bcce : 00000000`0296e64c fffffa80`0c4e1770 fffffa80`0973c040 fffffa80`0c4e1770 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`053f1d40 fffff800`02ebffe6 : fffff800`03040e80 fffffa80`0c4e1770 fffff800`0304ecc0 fffff880`0122b384 : nt!PspSystemThreadStartup+0x5a
fffff880`053f1d80 00000000`00000000 : fffff880`053f2000 fffff880`053ec000 fffff880`053f1400 00000000`00000000 : nt!KxStartSystemThread+0x16
CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgmms1
fffff88007421148 - dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+2c
[ 8b:8a ]
1 error : !dxgmms1 (fffff88007421148)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffff880053f0e70 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800742143a, The address that the exception occurred at
Arg3: fffff880053f1618, Exception Record Address
Arg4: fffff880053f0e70, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+31e
fffff880`0742143a 0fba635415 bt dword ptr [rbx+54h],15h
EXCEPTION_RECORD: fffff880053f1618 -- (.exr 0xfffff880053f1618)
ExceptionAddress: fffff8800742143a (dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+0x000000000000031e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000000000c4
Attempt to read from address 00000000000000c4
CONTEXT: fffff880053f0e70 -- (.cxr 0xfffff880053f0e70)
rax=0000000000000000 rbx=0000000000000070 rcx=0000000000000001
rdx=fffffa800d172ad0 rsi=0000000000000000 rdi=fffffa800c4e2000
rip=fffff8800742143a rsp=fffff880053f1850 rbp=0000000000000000
r8=0000000000000101 r9=0000000000000000 r10=0000000000000000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=fffffa800d172ad0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+0x31e:
fffff880`0742143a 0fba635415 bt dword ptr [rbx+54h],15h ds:002b:00000000`000000c4=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000000000c4
READ_ADDRESS: 00000000000000c4
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+31e
fffff880`0742143a 0fba635415 bt dword ptr [rbx+54h],15h
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: CODE_CORRUPTION
LAST_CONTROL_TRANSFER: from fffff8800741e1cc to fffff8800742143a
STACK_TEXT:
fffff880`053f1850 fffff880`0741e1cc : 00000000`00000000 00000000`00000000 00000000`00000001 fffffa80`00000000 : dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+0x31e
fffff880`053f1910 fffff880`0743865d : 00000000`00000000 fffff8a0`00a45510 fffffa80`00000000 fffffa80`0db31770 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x738
fffff880`053f1ae0 fffff880`07438398 : fffff800`00b96080 fffff880`07437d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`053f1cd0 fffff880`07437e96 : 00000000`00000000 fffffa80`0db4e4c0 00000000`00000080 fffffa80`0c4bb010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`053f1d00 fffff800`0316bcce : 00000000`0296e64c fffffa80`0c4e1770 fffffa80`0973c040 fffffa80`0c4e1770 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`053f1d40 fffff800`02ebffe6 : fffff800`03040e80 fffffa80`0c4e1770 fffff800`0304ecc0 fffff880`0122b384 : nt!PspSystemThreadStartup+0x5a
fffff880`053f1d80 00000000`00000000 : fffff880`053f2000 fffff880`053ec000 fffff880`053f1400 00000000`00000000 : nt!KxStartSystemThread+0x16
CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgmms1
fffff88007421148 - dxgmms1!VIDMM_GLOBAL::FindResourcesForOneAllocation+2c
[ 8b:8a ]
1 error : !dxgmms1 (fffff88007421148)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffff880053f0e70 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Suggestions:
Run memtest86+ on each stick for 8 passes preferably overnight:
RAM - Test with Memtest86+
Do post back results.
I've also called a friend to take a look at your problem and suggest something.