Taken as a whole these dumps are pointing strongly at bad RAM.
One dump (the 0x1000007E) does reference mtkwl6ex.sys, a WiFi driver, and results from an integer overflow in an IDIV (integer divide) instruction in that driver...
Code:
CONTEXT: fffffe0988586930 -- (.cxr 0xfffffe0988586930)
rax=00000000ffffff7e rbx=00000000ffffffc0 rcx=ffff948300190000
rdx=00000000bab60f41 rsi=ffff94830b3b0028 rdi=ffff948300190000
rip=fffff805b00ae085 rsp=fffffe0988587358 rbp=ffff948300a10028
r8=0000000000000002 r9=ffff9483001901c5 r10=0000000000000000
r11=fffffe0987737481 r12=ffff948300a10028 r13=ffff9482fca65040
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
mtkwl6ex+0xae085:
fffff805`b00ae085 f7f9 idiv eax,ecx
Resetting default scope
That could well be a driver foul-up, though it could also be bad RAM. It's certainly well worth updating that driver however.
The other dumps are 0xBE, 0x50, 0x1A, and a 0x133.
For that last dump (the 0x133) we'd need a full kernel dump to analyse it, but you've had other BSODs since then so that dump has been overwritten. The other three dumps have no third-party drivers on the call stack leading up to the bugcheck - that is a good indication of a hardware cause.
The 0xBE occurs because the page table is corrupted. Argument 2 in the dump gives the PTE contents (8a00000000800121) which is a non-canonical address (ie. outside the allowed addressing range). That's most like due to bad RAM.
The 0x50 occurs when the kernel is accessing session Id information from RAM and references an invalid page...
Code:
TRAP_FRAME: ffffa387cf776440 -- (.trap 0xffffa387cf776440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000144d0c00 rbx=0000000000000000 rcx=ffffdf8806a660c0
rdx=ffffdf0bf8440c0b rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075c8af0a8 rsp=ffffa387cf7765d8 rbp=ffffa387cf7774e0
r8=00000000ffffffff r9=7ffffffffffffffc r10=00000000ffffffff
r11=0000000000001000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MmGetSessionId+0x28:
fffff807`5c8af0a8 8b4208 mov eax,dword ptr [rdx+8] ds:ffffdf0b`f8440c13=????????
Resetting default scope
Microsoft functions never make this kind of error so that error is most likely due to bad RAM backing the referenced address (ffffdf0b`f8440c13=????????).
The 0x1A occurs because of a page table corruption (the 0x41790 value in argument 1). It's a bit of a faff to locate the page table entry, but it's here...
Code:
8: kd> !pte ffffedf6`c01925f8
VA ffffed80324bf000
PXE at FFFFEDF6FB7DBED8 PPE at FFFFEDF6FB7DB000 PDE at FFFFEDF6FB600C90 PTE at FFFFEDF6C01925F8
contains 0A00000528767863 contains 0A00000513A80867 contains 0A0000050CE81867 contains 1A00000520047867
pfn 528767 ---DA--KWEV pfn 513a80 ---DA--UWEV pfn 50ce81 ---DA--UWEV pfn 520047 ---DA--UWEV
The flags in there (---DA--UWEV) indicate that this page table entry is mapping a user-mode page (from the U) so this could be a user-mode app or driver fouling up, but given the other dumps this is more likely to be down to bad RAM.
I would test your RAM...
- Download Memtest86 (free), use the imageUSB.exe tool extracted from the download to make a bootable USB drive containing Memtest86 (1GB is plenty big enough). Do this on a different PC if you can, because you can't fully trust yours at the moment.
- Then boot that USB drive on your PC, Memtest86 will start running as soon as it boots.
- If no errors have been found after the four iterations of the 13 different tests that the free version does, then restart Memtest86 and do another four iterations. Even a single bit error is a failure.