hello tom and welcome to SF
I checked your dump files and they list among others memory corruption as a reason. That could mean defective hardware but it could also be caused by a defective driver.
For further testing I recommend you follow this tutorial and post the results. and make sure you include any new crashdumps.
Driver Verifier - Enable and Disable
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 98d7b, 2, 9547a}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000098d7b, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000009547a, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: avp.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000311df5c to fffff80003098640
STACK_TEXT:
fffff880`09b8c418 fffff800`0311df5c : 00000000`0000004e 00000000`00000099 00000000`00098d7b 00000000`00000002 : nt!KeBugCheckEx
fffff880`09b8c420 fffff800`03047cf2 : ffffffff`ffffffff 00000000`00000001 ffffffff`ffffffff 00000000`0000000f : nt!MiBadShareCount+0x4c
fffff880`09b8c460 fffff800`0319695a : fffffa80`09a98ec8 fffff880`09b8c670 00000000`00000000 fffffa80`0000000f : nt! ?? ::FNODOBFM::`string'+0x21513
fffff880`09b8c650 fffff800`032d95ed : fffffa80`0a7db060 ffffffff`00000001 ffffffff`ffffffff fffff880`09b8cca0 : nt!MiEmptyWorkingSet+0x24a
fffff880`09b8c700 fffff800`034e73ed : 00000000`00000001 fffff8a0`01a5c100 00000000`00000000 00000000`00000000 : nt!MmAdjustWorkingSetSizeEx+0xad
fffff880`09b8c780 fffff800`033eb3cb : 00000000`00000008 00000000`00000000 00000000`00000001 00000000`06f1e700 : nt!PspSetQuotaLimits+0x32d
fffff880`09b8c8d0 fffff800`030978d3 : fffffa80`0a7db060 fffff880`09b8cca0 00000000`7e5ea000 00000000`7e5ea000 : nt! ?? ::NNGAKEGL::`string'+0x4b860
fffff880`09b8cc20 00000000`770a14da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`06f1e6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770a14da
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0311df5c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
-----------------------------------------------------------------------------------------------------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {20008, a1200001ca3ca005, fffff8800a9bb990, a}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+443cb )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 0000000000020008, Virtual address for the attempted write.
Arg2: a1200001ca3ca005, PTE contents.
Arg3: fffff8800a9bb990, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
TRAP_FRAME: fffff8800a9bb990 -- (.trap 0xfffff8800a9bb990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000020000 rbx=0000000000000000 rcx=0000000000000002
rdx=fffffa8006b70f98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030cc6fe rsp=fffff8800a9bbb20 rbp=fffff8800a9bbca0
r8=fffffa8006b70fc1 r9=0000000000020000 r10=0000000000000000
r11=fffff8800a9bba60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!NtWaitForWorkViaWorkerFactory+0x45d:
fffff800`030cc6fe f04883700801 lock xor qword ptr [rax+8],1 ds:00000000`00020008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000308a807 to fffff800030e0640
STACK_TEXT:
fffff880`0a9bb828 fffff800`0308a807 : 00000000`000000be 00000000`00020008 a1200001`ca3ca005 fffff880`0a9bb990 : nt!KeBugCheckEx
fffff880`0a9bb830 fffff800`030de76e : 00000000`00000001 fffff880`0a9bbbe0 fffff880`0a9bbbc8 fffffa80`06b70f00 : nt! ?? ::FNODOBFM::`string'+0x443cb
fffff880`0a9bb990 fffff800`030cc6fe : 00000000`00000001 fffff880`0a9bbba8 fffff880`0a9bbbc8 00000000`003bdd01 : nt!KiPageFault+0x16e
fffff880`0a9bbb20 fffff800`030df8d3 : fffffa80`085e8b60 00000000`77d445c0 00000000`00000000 fffffa80`068b4430 : nt!NtWaitForWorkViaWorkerFactory+0x45d
fffff880`0a9bbc20 00000000`77c92c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01cafb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c92c1a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+443cb
fffff800`0308a807 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+443cb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xBE_nt!_??_::FNODOBFM::_string_+443cb
BUCKET_ID: X64_0xBE_nt!_??_::FNODOBFM::_string_+443cb
Followup: MachineOwner