Частые BSOD на Windows 10

Частые BSOD на Windows 10

Примерно с 3 недель я получаю частые BSOD, когда я пытаюсь проанализировать их с помощью WINDBG, кажется, что причина всегда меняется. Боюсь, я не смогу разобраться в этом самостоятельно.

Ссылка на дампы

Любая помощь будет высоко оценена!

Эти причины, по-видимому, повторяются многократно:

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff4045de0f1a0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80281e1e6c3, address which referenced memory



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa93ffab5e580
Arg3: 0000400000000000
Arg4: 0000000000000000



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffaaffff807f80, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064966e410, address which referenced memory



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff803125eb760, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff803125eb6b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

EDIT: У меня установлен бесплатный антивирус Касперского.

Связанный контент