OK out of the six memory dump files that you've attached, it would seem that most are indicating issues with memory in one form or another.
First recommendation is to monitor your temperatures. Use something like
Core Temp or whatever you might prefer.
Second Download Memtest86+
from this location here. Burn the ISO to a CD and boot the computer from the CD from a cold boot after leaving it off for an hour or more.
Ideally let it run for at least 7 passes / 6-8 hours. If errors appear before that you can stop that particular test. Any time Memtest86+ reports errors, it can be either bad RAM or a bad Mobo slot. Perform the test RAM sticks individually as well as all possible combinations. When you find a good one then test it in all slots. Post back with the results.
See
this Guide to using Memtest 86+
Third since there seems to be some pagefile involvement run the native Check Disk utility and see what it comes up with.
From an elevated command prompt type
chkdsk C: /R
hit enter
answer yes "Y" when prompted and reboot.
Let it run all five stages and take a look at the results. Event Viewer, Windows Logs, Application, right click "Find" chkdsk
If you are using any USB drives as ReadyBoost devices, discontinue that for the time being.
Code:
BugCheck 4E, {99, 15d708, 2, 15dd07}
[COLOR=#ff0000][U][B]Probably caused by : memory_corruption[/B][/U][/COLOR] ( nt!MiBadShareCount+4c )
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000015d708, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000015dd07, 0
Code:
BugCheck 1A, {403, fffff68000011410, f4d00001648b9867, fffff6fc00b245c8}
Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3a2 )
[COLOR=#ff0000][U][B]MEMORY_MANAGEMENT (1a)[/B][/U][/COLOR]
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff68000011410
Arg3: f4d00001648b9867
Arg4: fffff6fc00b245c8
Code:
BugCheck 50, {fffffa8086b08380, 0, fffff8800115c37e, 5}
Could not read faulting driver name
Probably caused by : fltmgr.sys ( fltmgr!FltpAllocateIrpCtrl+4e )
[COLOR=#ff0000][U][B]PAGE_FAULT_IN_NONPAGED_AREA (50)[/B][/U][/COLOR]
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8086b08380, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800115c37e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Code:
BugCheck 4E, {99, 1a6a9e, 2, 1a589d}
[COLOR=#ff0000][U][B]Probably caused by : memory_corruption[/B][/U][/COLOR] ( nt!MiBadShareCount+4c )
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000001a6a9e, page frame number
Arg3: 0000000000000002, current page state
Arg4: 00000000001a589d, 0
Code:
BugCheck 1A, {403, fffff683ff7890d8, 45b00001a34e0025, fffff6fc00d1a700}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3266c )
[COLOR=#ff0000][U][B]MEMORY_MANAGEMENT (1a)[/B][/U][/COLOR]
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff683ff7890d8
Arg3: 45b00001a34e0025
Arg4: fffff6fc00d1a700
Code:
BugCheck 4E, {99, 878da, 2, 878d8}
[COLOR=#ff0000][U][B]Probably caused by : memory_corruption[/B][/U][/COLOR] ( nt!MiBadShareCount+4c )
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000000878da, page frame number
Arg3: 0000000000000002, current page state
Arg4: 00000000000878d8, 0
If still no joy you may have to resort to Driver Verifier to zero in on what might still be the offending driver, cause I'm not seeing anything jumping out at me now. So if you decide that you need to go the Driver Verifier route, post back and I'll dig up some links as it is not generally something you want to use unless you are certain you have the requisite skill set and know how to start it, how to configure it and how to stop it. Here is one I suggest you read carefully, completely and make sure you understand before proceeding
Link Removed - Invalid URL
Regards
Randy