Dosyaları inceledim ve her şeyden önce BIOS ayarlarınızı varsayılana döndürün. Ardından Memtest86 testi uygulayabilirsiniz. Sonrasında durumu yine gözlemlersiniz.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
user space of the system process. Parameter 2 contains the
address of the attempted write.
Arg2: 0000010000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6077
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16839
Key : Analysis.Init.CPU.mSec
Value: 1015
Key : Analysis.Init.Elapsed.mSec
Value: 13628
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
FILE_IN_CAB: 031822-16828-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 4477
BUGCHECK_P2: 10000000000
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd10a24f461a0 -- (.trap 0xffffd10a24f461a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000080
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057e45630e rsp=ffffd10a24f46330 rbp=ffffd10a24f46450
r8=0000000000000080 r9=0000000000000000 r10=ffffd384870c7300
r11=000000000000000c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x8630e:
fffff805`7e45630e ?? ???
Resetting default scope
STACK_TEXT:
ffffd10a`24f45cf8 fffff805`6149d630 : 00000000`0000001a 00000000`00004477 00000100`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd10a`24f45d00 fffff805`61276e08 : 00000000`00000000 00000000`00000000 ffffd10a`24f460c0 00000000`00000001 : nt!MiCheckFatalAccessViolation+0x22a6fc
ffffd10a`24f45d40 fffff805`612a7672 : ffffd384`79cfc6c0 fffff805`00000000 00000000`00000000 ffffa4d2`40400000 : nt!MiInPagePageTable+0x328
ffffd10a`24f45f10 fffff805`612a6ccc : ffffd10a`24f460f0 00000000`00000000 ffffd384`79cfc040 00000100`00000000 : nt!MiResolvePageTablePage+0x1e2
ffffd10a`24f45f80 fffff805`612a66eb : 00000000`00100000 fffff805`00000000 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x1ec
ffffd10a`24f46000 fffff805`614250f5 : 00000000`4d52564e 00000000`00000600 00000000`00000000 fffff805`7e470e75 : nt!MmAccessFault+0x13b
ffffd10a`24f461a0 fffff805`7e45630e : ffffd384`85874000 00000000`00000000 ffffd10a`24f465e0 ffffd10a`24f46508 : nt!KiPageFault+0x335
ffffd10a`24f46330 ffffd384`85874000 : 00000000`00000000 ffffd10a`24f465e0 ffffd10a`24f46508 ffffd10a`24f46c48 : nvlddmkm+0x8630e
ffffd10a`24f46338 00000000`00000000 : ffffd10a`24f465e0 ffffd10a`24f46508 ffffd10a`24f46c48 fffff805`7e6ae0bc : 0xffffd384`85874000
SYMBOL_NAME: nvlddmkm+8630e
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 8630e
FAILURE_BUCKET_ID: 0x1a_4477_nvlddmkm!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dbd92308-0efc-0cd1-c9f6-91688cade772}
Followup: MachineOwner
---------[/CODE]