Çözüldü VIDEO_MEMORY_MANAGEMENT_INTERNAL mavi ekran hatası

  • Konuyu başlatan Kled4
  • Başlangıç Tarihi
  • Mesaj 12
  • Görüntüleme 1B
Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

Kled4

Hectopat
Katılım
13 Nisan 2019
Mesajlar
23
Yer
Hallownest
Daha fazla  
Cinsiyet
Erkek
Merhaba, bilgisayarım bugün mavi ekran hatası verdi. Sistem özelliklerini ve minidump dosyalarımı paylaşıyorum.

Sistem özellikleri.
AMD Ryzen 5 3600.
msI B450 GAMING Plus Max.
Crucial 8x2 Ballistix siyah DDR4 3200MHz CL16 1.35V PC RAM.
Samsung 500GB 970 EVO NVMe M.2 SSD.
Xigmatek cockpit mesh panel 4x120mm fanlı x-power 700W 80Plus MidT ATX kasa.
ASUS GeForce Dual RTX 2070 Super A8G EVO 8 GB GDDR6 256Bit DX12 ekran kartı.
Windows 10 Pro.

 
Son düzenleyen: Moderatör:
Çözüm
1) MSI uygulamalarını kaldırın. (MSI Afterburner dahil.)

2) BattlEye kaldırın.

3) Malwarebytes kaldırın.

4) BIOS sürümünüzü yükseltin. En güncel BIOS'u aşağıdan indirip kurun.

5) Aşağıdaki websiteden ekran kartınıza ait sürücüyü indirin. Daha sonra DDU ile ekran kartı sürücünüzü kaldırıp PC yeninden başladığında bu indirdiğiniz sürücüyü kurun.

Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
DDU kullanım rehberi: DDU ile Sürücü Kaldırma Rehberi

6) Aşağıdaki rehberi uygulayıp sonucun ekran alıntısını paylaşın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffc707b7376010
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 17968

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 80764

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffc707b7376010

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
ffff8c86`9725a088 fffff802`775c3ad0     : 00000000`0000010e 00000000`00000033 ffffc707`b7376010 00000000`00000000 : nt!KeBugCheckEx
ffff8c86`9725a090 fffff802`782b7a05     : 00000000`00000000 ffffc707`b7376110 ffffb30f`48f36000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
ffff8c86`9725a0d0 fffff802`7822253a     : ffffc707`b7376010 00000000`00000000 ffffc707`b36567e0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
ffff8c86`9725a110 fffff802`78290249     : ffffc707`b7376010 00000000`00000000 ffffc707`b36567e0 ffffb30f`48787010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
ffff8c86`9725a140 fffff802`7828fcb5     : 00000000`00000000 ffffc707`b36567e0 ffffc707`b7376010 ffffb30f`4cbf4080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
ffff8c86`9725a170 fffff802`7822257e     : ffffc707`cda48300 ffff8c86`9725a329 ffffb30f`48787010 01000000`001000ff : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
ffff8c86`9725a230 fffff802`773625e9     : 00000000`00000030 00000000`00000799 00000000`00000000 ffffb30f`47c3b0e0 : dxgmms2!VidMmCloseAdapter+0x1e
ffff8c86`9725a260 fffff802`7731789f     : ffffb30f`3b010100 fffff802`69ec73a2 ffffb30f`3b010340 00000000`000000ff : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
ffff8c86`9725a290 fffff802`772f36c1     : ffffc707`cda48300 ffffc707`00000002 ffffc707`cda48300 ffffb30f`48787010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
ffff8c86`9725a390 fffff802`772f1801     : ffffb30f`48783000 fffff802`00000001 ffffb30f`48783000 ffffc707`c4d41a00 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
ffff8c86`9725a420 fffff802`7731cd29     : ffffb30f`54eb5400 ffff8c86`9725a570 00000000`0000029f ffffc707`c4d41910 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
ffff8c86`9725a470 fffff802`77317f45     : ffffc707`c4d41910 00000000`00000b59 ffffc707`c4d41910 ffffb30f`577f95e0 : dxgkrnl!DXGPROCESS::Destroy+0x341
ffff8c86`9725a6e0 fffff802`77215e07     : 00000000`00000000 ffffc707`c4d41910 ffffb30f`40a52fe0 fffff802`6a8ec448 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8c86`9725a830 fffff802`6a30560f     : 00000000`00000000 ffffb30f`482de340 00000000`0000ff00 ffffb30f`4e8088f0 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8c86`9725a890 fffff802`6a2a0b4c     : ffffb30f`482de300 ffffb30f`482de340 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8c86`9725a960 fffff802`6a1e6f52     : ffffb30f`4cbf44b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff8c86`9725a990 fffff802`6a24a7ee     : ffffb30f`d00002fe 00000000`00000001 00000000`00000000 000000ae`26174000 : nt!PspExitThread+0x5b2
ffff8c86`9725aa90 fffff802`6a005fb8     : ffffb30f`482de340 ffffb30f`4cbf4080 ffff8c86`9725ab80 ffffb30f`482de340 : nt!NtTerminateProcess+0xde
ffff8c86`9725ab00 00007ffd`2622c314     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ae`25f1f7a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`2622c314


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  27799

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80637cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 21702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 190863

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 519

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff80637cfb320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff8063d06c130 -- (.trap 0xfffff8063d06c130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
rdx=fffff8063d06c278 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80649b21203 rsp=fffff8063d06c2c0 rbp=ffffc68239080000
 r8=0000000000000001  r9=0000000000000020 r10=ffffc6823905c060
r11=fffff8063d06c1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nvlddmkm+0x251203:
fffff806`49b21203 ebfe            jmp     nvlddmkm+0x251203 (fffff806`49b21203)
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff806`3d07ae18 fffff806`37487372     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`3d07ae20 fffff806`37326853     : 00004af5`0b234b5f fffff806`35129180 00000000`00000000 fffff806`35129180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`3d07ae80 fffff806`3732633a     : fffff806`37cf38c0 fffff806`3d06c1b0 fffff806`4b8e2700 00000000`0000a301 : nt!KeClockInterruptNotify+0x453
fffff806`3d07af30 fffff806`3722ecd5     : fffff806`37cf38c0 00000000`00000000 00000000`00000000 ffffa303`b4583032 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`3d07af60 fffff806`373f6cba     : fffff806`3d06c1b0 fffff806`37cf38c0 00000000`00000004 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`3d07afb0 fffff806`373f7227     : ffffc682`3e337000 00000000`00000004 00000000`00000000 fffff806`49de9987 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`3d06c130 fffff806`49b21203     : ffffc682`401d7050 ffffc682`39080000 ffffc682`3e32a000 ffffc682`38f96398 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`3d06c2c0 ffffc682`401d7050     : ffffc682`39080000 ffffc682`3e32a000 ffffc682`38f96398 00000000`00001010 : nvlddmkm+0x251203
fffff806`3d06c2c8 ffffc682`39080000     : ffffc682`3e32a000 ffffc682`38f96398 00000000`00001010 fffff806`49b21a3c : 0xffffc682`401d7050
fffff806`3d06c2d0 ffffc682`3e32a000     : ffffc682`38f96398 00000000`00001010 fffff806`49b21a3c 00000000`0001ffdf : 0xffffc682`39080000
fffff806`3d06c2d8 ffffc682`38f96398     : 00000000`00001010 fffff806`49b21a3c 00000000`0001ffdf ffffc682`3e32a000 : 0xffffc682`3e32a000
fffff806`3d06c2e0 00000000`00001010     : fffff806`49b21a3c 00000000`0001ffdf ffffc682`3e32a000 00000000`00000000 : 0xffffc682`38f96398
fffff806`3d06c2e8 fffff806`49b21a3c     : 00000000`0001ffdf ffffc682`3e32a000 00000000`00000000 fffff806`3d06c3d0 : 0x1010
fffff806`3d06c2f0 00000000`0001ffdf     : ffffc682`3e32a000 00000000`00000000 fffff806`3d06c3d0 0000397d`c1cc9000 : nvlddmkm+0x251a3c
fffff806`3d06c2f8 ffffc682`3e32a000     : 00000000`00000000 fffff806`3d06c3d0 0000397d`c1cc9000 00000000`00000000 : 0x1ffdf
fffff806`3d06c300 00000000`00000000     : fffff806`3d06c3d0 0000397d`c1cc9000 00000000`00000000 00000000`80000000 : 0xffffc682`3e32a000


SYMBOL_NAME:  nvlddmkm+251203

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  251203

FAILURE_BUCKET_ID:  0x133_DPC_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {15c3af0e-5564-7a80-2e26-65b5115ecc4d}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffba8fd8664cb0
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 17452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 67365

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffba8fd8664cb0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
fffff402`f2428ec8 fffff805`487b3ad0     : 00000000`0000010e 00000000`00000033 ffffba8f`d8664cb0 00000000`00000000 : nt!KeBugCheckEx
fffff402`f2428ed0 fffff805`4a3e7a05     : 00000000`00000000 ffffba8f`d8664db0 ffffa301`d8fbf000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffff402`f2428f10 fffff805`4a35253a     : ffffba8f`d8664cb0 00000000`00000000 ffffba8f`da8769a0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
fffff402`f2428f50 fffff805`4a3c0249     : ffffba8f`d8664cb0 00000000`00000000 ffffba8f`da8769a0 ffffa301`d8e42010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
fffff402`f2428f80 fffff805`4a3bfcb5     : 00000000`00000000 ffffba8f`da8769a0 ffffba8f`d8664cb0 ffffa301`e1a06080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
fffff402`f2428fb0 fffff805`4a35257e     : ffffba8f`da7377e0 fffff402`f2429169 ffffa301`d8e42010 01000000`00100000 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
fffff402`f2429070 fffff805`48554219     : 00000000`00000030 00000000`00000799 00000000`40009c80 00000000`00000000 : dxgmms2!VidMmCloseAdapter+0x1e
fffff402`f24290a0 fffff805`48508f6f     : ffffa301`d7d02000 00000000`00000000 ffffa301`da112b90 fffff805`39edbc43 : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
fffff402`f24290d0 fffff805`484e3d61     : ffffba8f`da7377e0 ffffba8f`00000002 ffffba8f`da7377e0 ffffa301`d8e42010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
fffff402`f24291d0 fffff805`484e1ea1     : ffffa301`d8e6f000 fffff805`00000001 ffffa301`d8e6f000 ffffba8f`d86e8c20 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
fffff402`f2429260 fffff805`4850e3f9     : ffffa301`e569d620 fffff402`f24293b0 00000000`0000035a ffffba8f`d86e8b30 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
fffff402`f24292b0 fffff805`48509615     : ffffba8f`d86e8b30 ffffa301`dddb1080 ffffba8f`d86e8b30 00000000`00040282 : dxgkrnl!DXGPROCESS::Destroy+0x341
fffff402`f2429520 fffff805`48405e07     : 00000000`00000000 ffffba8f`d86e8b30 ffffa301`d71f1620 fffff402`f2429680 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffff402`f2429670 fffff805`3a30560f     : 00000000`00000000 ffffa301`dddb1080 ffffa301`d37d97a0 fffff805`01046000 : dxgkrnl!DxgkProcessNotify+0xf7
fffff402`f24296d0 fffff805`3a2a0b4c     : ffffa301`dddb1000 ffffa301`dddb1080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffff402`f24297a0 fffff805`3a1e6f52     : ffffa301`e1a064b8 00000000`00000000 fffff402`f2429990 00000000`00000000 : nt!PspExitProcess+0x70
fffff402`f24297d0 fffff805`3a27a978     : 00000000`d00002fe 00000000`00000001 00000000`00000000 00000099`5259d000 : nt!PspExitThread+0x5b2
fffff402`f24298d0 fffff805`39ee25c7     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`484ef7cd : nt!KiSchedulerApcTerminate+0x38
fffff402`f2429910 fffff805`39ff97b0     : 00000210`60398b88 fffff402`f24299c0 ffffba8f`d86e8b30 00000000`00000000 : nt!KiDeliverApc+0x487
fffff402`f24299c0 fffff805`3a006c5f     : ffffa301`e1a06080 ffffa301`e1a06080 00000210`60398b88 00000000`00000020 : nt!KiInitiateUserApc+0x70
fffff402`f2429b00 00007ffe`5c305ac4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000099`527ff0d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5c305ac4


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  27799

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8062ee3ce02, The address that the exception occurred at
Arg3: fffff6866ba12e28, Exception Record Address
Arg4: fffff6866ba12660, Context Record Address

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 13468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 86730

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8062ee3ce02

BUGCHECK_P3: fffff6866ba12e28

BUGCHECK_P4: fffff6866ba12660

EXCEPTION_RECORD:  fffff6866ba12e28 -- (.exr 0xfffff6866ba12e28)
ExceptionAddress: fffff8062ee3ce02 (nvlddmkm+0x00000000007bce02)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  fffff6866ba12660 -- (.cxr 0xfffff6866ba12660)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8502074db1d8
rdx=0000000000000000 rsi=ffffde0c548ffc9f rdi=ffff850207445000
rip=fffff8062ee3ce02 rsp=fffff6866ba13060 rbp=ffff850207466f20
 r8=000000000000000b  r9=0000000000000000 r10=0000000000000000
r11=ffffde0c548ffd0b r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffff850207445180
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0x7bce02:
fffff806`2ee3ce02 ff5048          call    qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8061c8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061c80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8061c80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff686`6ba13060 00000000`00000000     : fffff806`2e7e8bb3 00000000`00000001 fffff806`1bfd3608 00000000`000000ff : nvlddmkm+0x7bce02


SYMBOL_NAME:  nvlddmkm+7bce02

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff6866ba12660 ; kb

BUCKET_ID_FUNC_OFFSET:  7bce02

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffc1e52b41c117, Address of the instruction which caused the bugcheck
Arg3: ffffb08858b78e90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 12671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 63094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffc1e52b41c117

BUGCHECK_P3: ffffb08858b78e90

BUGCHECK_P4: 0

CONTEXT:  ffffb08858b78e90 -- (.cxr 0xffffb08858b78e90)
rax=ffffc1a4065f62a0 rbx=ffffc1a4069a0ba0 rcx=ffffc1a4065f62a0
rdx=ffffc1a406749134 rsi=ffffc1a40674bb10 rdi=0000000000000000
rip=ffffc1e52b41c117 rsp=ffffb08858b79890 rbp=ffffb08858b79980
 r8=0000000000000010  r9=7fffc1a400616408 r10=ffffc1a40674bb34
r11=ffffb08858b798f0 r12=ffffb08858b79a78 r13=0000000000000001
r14=ffffb08858b79968 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kbase!RGNOBJ::bMerge+0xc7:
ffffc1e5`2b41c117 8b07            mov     eax,dword ptr [rdi] ds:002b:00000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
ffffb088`58b79890 ffffc1e5`2b7529af     : ffffb088`58b79968 ffffb088`58b799b0 ffffb088`58b799f0 00000000`00000008 : win32kbase!RGNOBJ::bMerge+0xc7
ffffb088`58b79930 ffffc1e5`2b753b55     : ffffc1a4`046d5af0 ffffc1a4`069a0ba0 ffffb088`58b79a70 00000000`1a121db4 : win32kfull!GrepSfmGetDirtyRgn+0x197
ffffb088`58b799b0 ffffc1e5`2b752752     : 00000000`c000000d ffffb088`58b79b80 00000000`00000038 00000000`00000000 : win32kfull!GreSfmGetDirtyRgn+0x109
ffffb088`58b79a10 ffffc1e5`2c25c281     : ffffa084`477e7080 00000266`12f14470 00000000`00000020 00000266`12ae0801 : win32kfull!NtGdiHLSurfGetInformation+0x142
ffffb088`58b79ac0 fffff805`7fe071b8     : ffffa084`477e7080 00000000`000003e8 00000000`00000000 00000000`0000024c : win32k!NtGdiHLSurfGetInformation+0x15
ffffb088`58b79b00 00007ffa`e6a46be4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`9617eea8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e6a46be4


SYMBOL_NAME:  win32kbase!RGNOBJ::bMerge+c7

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .cxr 0xffffb08858b78e90 ; kb

BUCKET_ID_FUNC_OFFSET:  c7

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!RGNOBJ::bMerge

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68b5c7e8-92bc-8fc2-e095-b06a688c5f92}

Followup:     MachineOwner
---------
1) MSI uygulamalarını kaldırın. (MSI Afterburner dahil.)

2) BattlEye kaldırın.

3) Malwarebytes kaldırın.

4) BIOS sürümünüzü yükseltin. En güncel BIOS'u aşağıdan indirip kurun.

5) Aşağıdaki websiteden ekran kartınıza ait sürücüyü indirin. Daha sonra DDU ile ekran kartı sürücünüzü kaldırıp PC yeninden başladığında bu indirdiğiniz sürücüyü kurun.

Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
DDU kullanım rehberi: DDU ile Sürücü Kaldırma Rehberi

6) Aşağıdaki rehberi uygulayıp sonucun ekran alıntısını paylaşın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffc707b7376010
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 17968

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 80764

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffc707b7376010

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
ffff8c86`9725a088 fffff802`775c3ad0     : 00000000`0000010e 00000000`00000033 ffffc707`b7376010 00000000`00000000 : nt!KeBugCheckEx
ffff8c86`9725a090 fffff802`782b7a05     : 00000000`00000000 ffffc707`b7376110 ffffb30f`48f36000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
ffff8c86`9725a0d0 fffff802`7822253a     : ffffc707`b7376010 00000000`00000000 ffffc707`b36567e0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
ffff8c86`9725a110 fffff802`78290249     : ffffc707`b7376010 00000000`00000000 ffffc707`b36567e0 ffffb30f`48787010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
ffff8c86`9725a140 fffff802`7828fcb5     : 00000000`00000000 ffffc707`b36567e0 ffffc707`b7376010 ffffb30f`4cbf4080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
ffff8c86`9725a170 fffff802`7822257e     : ffffc707`cda48300 ffff8c86`9725a329 ffffb30f`48787010 01000000`001000ff : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
ffff8c86`9725a230 fffff802`773625e9     : 00000000`00000030 00000000`00000799 00000000`00000000 ffffb30f`47c3b0e0 : dxgmms2!VidMmCloseAdapter+0x1e
ffff8c86`9725a260 fffff802`7731789f     : ffffb30f`3b010100 fffff802`69ec73a2 ffffb30f`3b010340 00000000`000000ff : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
ffff8c86`9725a290 fffff802`772f36c1     : ffffc707`cda48300 ffffc707`00000002 ffffc707`cda48300 ffffb30f`48787010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
ffff8c86`9725a390 fffff802`772f1801     : ffffb30f`48783000 fffff802`00000001 ffffb30f`48783000 ffffc707`c4d41a00 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
ffff8c86`9725a420 fffff802`7731cd29     : ffffb30f`54eb5400 ffff8c86`9725a570 00000000`0000029f ffffc707`c4d41910 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
ffff8c86`9725a470 fffff802`77317f45     : ffffc707`c4d41910 00000000`00000b59 ffffc707`c4d41910 ffffb30f`577f95e0 : dxgkrnl!DXGPROCESS::Destroy+0x341
ffff8c86`9725a6e0 fffff802`77215e07     : 00000000`00000000 ffffc707`c4d41910 ffffb30f`40a52fe0 fffff802`6a8ec448 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8c86`9725a830 fffff802`6a30560f     : 00000000`00000000 ffffb30f`482de340 00000000`0000ff00 ffffb30f`4e8088f0 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8c86`9725a890 fffff802`6a2a0b4c     : ffffb30f`482de300 ffffb30f`482de340 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8c86`9725a960 fffff802`6a1e6f52     : ffffb30f`4cbf44b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff8c86`9725a990 fffff802`6a24a7ee     : ffffb30f`d00002fe 00000000`00000001 00000000`00000000 000000ae`26174000 : nt!PspExitThread+0x5b2
ffff8c86`9725aa90 fffff802`6a005fb8     : ffffb30f`482de340 ffffb30f`4cbf4080 ffff8c86`9725ab80 ffffb30f`482de340 : nt!NtTerminateProcess+0xde
ffff8c86`9725ab00 00007ffd`2622c314     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ae`25f1f7a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`2622c314


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  27799

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80637cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 21702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 190863

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 519

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff80637cfb320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff8063d06c130 -- (.trap 0xfffff8063d06c130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
rdx=fffff8063d06c278 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80649b21203 rsp=fffff8063d06c2c0 rbp=ffffc68239080000
 r8=0000000000000001  r9=0000000000000020 r10=ffffc6823905c060
r11=fffff8063d06c1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nvlddmkm+0x251203:
fffff806`49b21203 ebfe            jmp     nvlddmkm+0x251203 (fffff806`49b21203)
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff806`3d07ae18 fffff806`37487372     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`3d07ae20 fffff806`37326853     : 00004af5`0b234b5f fffff806`35129180 00000000`00000000 fffff806`35129180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`3d07ae80 fffff806`3732633a     : fffff806`37cf38c0 fffff806`3d06c1b0 fffff806`4b8e2700 00000000`0000a301 : nt!KeClockInterruptNotify+0x453
fffff806`3d07af30 fffff806`3722ecd5     : fffff806`37cf38c0 00000000`00000000 00000000`00000000 ffffa303`b4583032 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`3d07af60 fffff806`373f6cba     : fffff806`3d06c1b0 fffff806`37cf38c0 00000000`00000004 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`3d07afb0 fffff806`373f7227     : ffffc682`3e337000 00000000`00000004 00000000`00000000 fffff806`49de9987 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`3d06c130 fffff806`49b21203     : ffffc682`401d7050 ffffc682`39080000 ffffc682`3e32a000 ffffc682`38f96398 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`3d06c2c0 ffffc682`401d7050     : ffffc682`39080000 ffffc682`3e32a000 ffffc682`38f96398 00000000`00001010 : nvlddmkm+0x251203
fffff806`3d06c2c8 ffffc682`39080000     : ffffc682`3e32a000 ffffc682`38f96398 00000000`00001010 fffff806`49b21a3c : 0xffffc682`401d7050
fffff806`3d06c2d0 ffffc682`3e32a000     : ffffc682`38f96398 00000000`00001010 fffff806`49b21a3c 00000000`0001ffdf : 0xffffc682`39080000
fffff806`3d06c2d8 ffffc682`38f96398     : 00000000`00001010 fffff806`49b21a3c 00000000`0001ffdf ffffc682`3e32a000 : 0xffffc682`3e32a000
fffff806`3d06c2e0 00000000`00001010     : fffff806`49b21a3c 00000000`0001ffdf ffffc682`3e32a000 00000000`00000000 : 0xffffc682`38f96398
fffff806`3d06c2e8 fffff806`49b21a3c     : 00000000`0001ffdf ffffc682`3e32a000 00000000`00000000 fffff806`3d06c3d0 : 0x1010
fffff806`3d06c2f0 00000000`0001ffdf     : ffffc682`3e32a000 00000000`00000000 fffff806`3d06c3d0 0000397d`c1cc9000 : nvlddmkm+0x251a3c
fffff806`3d06c2f8 ffffc682`3e32a000     : 00000000`00000000 fffff806`3d06c3d0 0000397d`c1cc9000 00000000`00000000 : 0x1ffdf
fffff806`3d06c300 00000000`00000000     : fffff806`3d06c3d0 0000397d`c1cc9000 00000000`00000000 00000000`80000000 : 0xffffc682`3e32a000


SYMBOL_NAME:  nvlddmkm+251203

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  251203

FAILURE_BUCKET_ID:  0x133_DPC_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {15c3af0e-5564-7a80-2e26-65b5115ecc4d}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffba8fd8664cb0
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 17452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 67365

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffba8fd8664cb0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
fffff402`f2428ec8 fffff805`487b3ad0     : 00000000`0000010e 00000000`00000033 ffffba8f`d8664cb0 00000000`00000000 : nt!KeBugCheckEx
fffff402`f2428ed0 fffff805`4a3e7a05     : 00000000`00000000 ffffba8f`d8664db0 ffffa301`d8fbf000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffff402`f2428f10 fffff805`4a35253a     : ffffba8f`d8664cb0 00000000`00000000 ffffba8f`da8769a0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
fffff402`f2428f50 fffff805`4a3c0249     : ffffba8f`d8664cb0 00000000`00000000 ffffba8f`da8769a0 ffffa301`d8e42010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
fffff402`f2428f80 fffff805`4a3bfcb5     : 00000000`00000000 ffffba8f`da8769a0 ffffba8f`d8664cb0 ffffa301`e1a06080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
fffff402`f2428fb0 fffff805`4a35257e     : ffffba8f`da7377e0 fffff402`f2429169 ffffa301`d8e42010 01000000`00100000 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
fffff402`f2429070 fffff805`48554219     : 00000000`00000030 00000000`00000799 00000000`40009c80 00000000`00000000 : dxgmms2!VidMmCloseAdapter+0x1e
fffff402`f24290a0 fffff805`48508f6f     : ffffa301`d7d02000 00000000`00000000 ffffa301`da112b90 fffff805`39edbc43 : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
fffff402`f24290d0 fffff805`484e3d61     : ffffba8f`da7377e0 ffffba8f`00000002 ffffba8f`da7377e0 ffffa301`d8e42010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
fffff402`f24291d0 fffff805`484e1ea1     : ffffa301`d8e6f000 fffff805`00000001 ffffa301`d8e6f000 ffffba8f`d86e8c20 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
fffff402`f2429260 fffff805`4850e3f9     : ffffa301`e569d620 fffff402`f24293b0 00000000`0000035a ffffba8f`d86e8b30 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
fffff402`f24292b0 fffff805`48509615     : ffffba8f`d86e8b30 ffffa301`dddb1080 ffffba8f`d86e8b30 00000000`00040282 : dxgkrnl!DXGPROCESS::Destroy+0x341
fffff402`f2429520 fffff805`48405e07     : 00000000`00000000 ffffba8f`d86e8b30 ffffa301`d71f1620 fffff402`f2429680 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffff402`f2429670 fffff805`3a30560f     : 00000000`00000000 ffffa301`dddb1080 ffffa301`d37d97a0 fffff805`01046000 : dxgkrnl!DxgkProcessNotify+0xf7
fffff402`f24296d0 fffff805`3a2a0b4c     : ffffa301`dddb1000 ffffa301`dddb1080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffff402`f24297a0 fffff805`3a1e6f52     : ffffa301`e1a064b8 00000000`00000000 fffff402`f2429990 00000000`00000000 : nt!PspExitProcess+0x70
fffff402`f24297d0 fffff805`3a27a978     : 00000000`d00002fe 00000000`00000001 00000000`00000000 00000099`5259d000 : nt!PspExitThread+0x5b2
fffff402`f24298d0 fffff805`39ee25c7     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`484ef7cd : nt!KiSchedulerApcTerminate+0x38
fffff402`f2429910 fffff805`39ff97b0     : 00000210`60398b88 fffff402`f24299c0 ffffba8f`d86e8b30 00000000`00000000 : nt!KiDeliverApc+0x487
fffff402`f24299c0 fffff805`3a006c5f     : ffffa301`e1a06080 ffffa301`e1a06080 00000210`60398b88 00000000`00000020 : nt!KiInitiateUserApc+0x70
fffff402`f2429b00 00007ffe`5c305ac4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000099`527ff0d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5c305ac4


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  27799

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8062ee3ce02, The address that the exception occurred at
Arg3: fffff6866ba12e28, Exception Record Address
Arg4: fffff6866ba12660, Context Record Address

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 13468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 86730

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8062ee3ce02

BUGCHECK_P3: fffff6866ba12e28

BUGCHECK_P4: fffff6866ba12660

EXCEPTION_RECORD:  fffff6866ba12e28 -- (.exr 0xfffff6866ba12e28)
ExceptionAddress: fffff8062ee3ce02 (nvlddmkm+0x00000000007bce02)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  fffff6866ba12660 -- (.cxr 0xfffff6866ba12660)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8502074db1d8
rdx=0000000000000000 rsi=ffffde0c548ffc9f rdi=ffff850207445000
rip=fffff8062ee3ce02 rsp=fffff6866ba13060 rbp=ffff850207466f20
 r8=000000000000000b  r9=0000000000000000 r10=0000000000000000
r11=ffffde0c548ffd0b r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffff850207445180
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0x7bce02:
fffff806`2ee3ce02 ff5048          call    qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8061c8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061c80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8061c80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff686`6ba13060 00000000`00000000     : fffff806`2e7e8bb3 00000000`00000001 fffff806`1bfd3608 00000000`000000ff : nvlddmkm+0x7bce02


SYMBOL_NAME:  nvlddmkm+7bce02

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff6866ba12660 ; kb

BUCKET_ID_FUNC_OFFSET:  7bce02

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffc1e52b41c117, Address of the instruction which caused the bugcheck
Arg3: ffffb08858b78e90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 12671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 63094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffc1e52b41c117

BUGCHECK_P3: ffffb08858b78e90

BUGCHECK_P4: 0

CONTEXT:  ffffb08858b78e90 -- (.cxr 0xffffb08858b78e90)
rax=ffffc1a4065f62a0 rbx=ffffc1a4069a0ba0 rcx=ffffc1a4065f62a0
rdx=ffffc1a406749134 rsi=ffffc1a40674bb10 rdi=0000000000000000
rip=ffffc1e52b41c117 rsp=ffffb08858b79890 rbp=ffffb08858b79980
 r8=0000000000000010  r9=7fffc1a400616408 r10=ffffc1a40674bb34
r11=ffffb08858b798f0 r12=ffffb08858b79a78 r13=0000000000000001
r14=ffffb08858b79968 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kbase!RGNOBJ::bMerge+0xc7:
ffffc1e5`2b41c117 8b07            mov     eax,dword ptr [rdi] ds:002b:00000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
ffffb088`58b79890 ffffc1e5`2b7529af     : ffffb088`58b79968 ffffb088`58b799b0 ffffb088`58b799f0 00000000`00000008 : win32kbase!RGNOBJ::bMerge+0xc7
ffffb088`58b79930 ffffc1e5`2b753b55     : ffffc1a4`046d5af0 ffffc1a4`069a0ba0 ffffb088`58b79a70 00000000`1a121db4 : win32kfull!GrepSfmGetDirtyRgn+0x197
ffffb088`58b799b0 ffffc1e5`2b752752     : 00000000`c000000d ffffb088`58b79b80 00000000`00000038 00000000`00000000 : win32kfull!GreSfmGetDirtyRgn+0x109
ffffb088`58b79a10 ffffc1e5`2c25c281     : ffffa084`477e7080 00000266`12f14470 00000000`00000020 00000266`12ae0801 : win32kfull!NtGdiHLSurfGetInformation+0x142
ffffb088`58b79ac0 fffff805`7fe071b8     : ffffa084`477e7080 00000000`000003e8 00000000`00000000 00000000`0000024c : win32k!NtGdiHLSurfGetInformation+0x15
ffffb088`58b79b00 00007ffa`e6a46be4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`9617eea8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e6a46be4


SYMBOL_NAME:  win32kbase!RGNOBJ::bMerge+c7

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .cxr 0xffffb08858b78e90 ; kb

BUCKET_ID_FUNC_OFFSET:  c7

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!RGNOBJ::bMerge

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68b5c7e8-92bc-8fc2-e095-b06a688c5f92}

Followup:     MachineOwner
---------
 
Çözüm
1) MSI uygulamalarını kaldırın. (MSI Afterburner dahil.)

2) BattlEye kaldırın.

3) Malwarebytes kaldırın.

4) BIOS sürümünüzü yükseltin. En güncel BIOS'u aşağıdan indirip kurun.

5) Aşağıdaki websiteden ekran kartınıza ait sürücüyü indirin. Daha sonra DDU ile ekran kartı sürücünüzü kaldırıp PC yeninden başladığında bu indirdiğiniz sürücüyü kurun.

Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
DDU kullanım rehberi: DDU ile Sürücü Kaldırma Rehberi

6) Aşağıdaki rehberi uygulayıp sonucun ekran alıntısını paylaşın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffc707b7376010
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 17968

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 80764

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffc707b7376010

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT:
ffff8c86`9725a088 fffff802`775c3ad0     : 00000000`0000010e 00000000`00000033 ffffc707`b7376010 00000000`00000000 : nt!KeBugCheckEx
ffff8c86`9725a090 fffff802`782b7a05     : 00000000`00000000 ffffc707`b7376110 ffffb30f`48f36000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
ffff8c86`9725a0d0 fffff802`7822253a     : ffffc707`b7376010 00000000`00000000 ffffc707`b36567e0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
ffff8c86`9725a110 fffff802`78290249     : ffffc707`b7376010 00000000`00000000 ffffc707`b36567e0 ffffb30f`48787010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
ffff8c86`9725a140 fffff802`7828fcb5     : 00000000`00000000 ffffc707`b36567e0 ffffc707`b7376010 ffffb30f`4cbf4080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
ffff8c86`9725a170 fffff802`7822257e     : ffffc707`cda48300 ffff8c86`9725a329 ffffb30f`48787010 01000000`001000ff : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
ffff8c86`9725a230 fffff802`773625e9     : 00000000`00000030 00000000`00000799 00000000`00000000 ffffb30f`47c3b0e0 : dxgmms2!VidMmCloseAdapter+0x1e
ffff8c86`9725a260 fffff802`7731789f     : ffffb30f`3b010100 fffff802`69ec73a2 ffffb30f`3b010340 00000000`000000ff : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
ffff8c86`9725a290 fffff802`772f36c1     : ffffc707`cda48300 ffffc707`00000002 ffffc707`cda48300 ffffb30f`48787010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
ffff8c86`9725a390 fffff802`772f1801     : ffffb30f`48783000 fffff802`00000001 ffffb30f`48783000 ffffc707`c4d41a00 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
ffff8c86`9725a420 fffff802`7731cd29     : ffffb30f`54eb5400 ffff8c86`9725a570 00000000`0000029f ffffc707`c4d41910 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
ffff8c86`9725a470 fffff802`77317f45     : ffffc707`c4d41910 00000000`00000b59 ffffc707`c4d41910 ffffb30f`577f95e0 : dxgkrnl!DXGPROCESS::Destroy+0x341
ffff8c86`9725a6e0 fffff802`77215e07     : 00000000`00000000 ffffc707`c4d41910 ffffb30f`40a52fe0 fffff802`6a8ec448 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8c86`9725a830 fffff802`6a30560f     : 00000000`00000000 ffffb30f`482de340 00000000`0000ff00 ffffb30f`4e8088f0 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8c86`9725a890 fffff802`6a2a0b4c     : ffffb30f`482de300 ffffb30f`482de340 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8c86`9725a960 fffff802`6a1e6f52     : ffffb30f`4cbf44b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff8c86`9725a990 fffff802`6a24a7ee     : ffffb30f`d00002fe 00000000`00000001 00000000`00000000 000000ae`26174000 : nt!PspExitThread+0x5b2
ffff8c86`9725aa90 fffff802`6a005fb8     : ffffb30f`482de340 ffffb30f`4cbf4080 ffff8c86`9725ab80 ffffb30f`482de340 : nt!NtTerminateProcess+0xde
ffff8c86`9725ab00 00007ffd`2622c314     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ae`25f1f7a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`2622c314


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  27799

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80637cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 21702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 190863

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 519

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff80637cfb320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff8063d06c130 -- (.trap 0xfffff8063d06c130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
rdx=fffff8063d06c278 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80649b21203 rsp=fffff8063d06c2c0 rbp=ffffc68239080000
r8=0000000000000001  r9=0000000000000020 r10=ffffc6823905c060
r11=fffff8063d06c1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nvlddmkm+0x251203:
fffff806`49b21203 ebfe            jmp     nvlddmkm+0x251203 (fffff806`49b21203)
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff806`3d07ae18 fffff806`37487372     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`3d07ae20 fffff806`37326853     : 00004af5`0b234b5f fffff806`35129180 00000000`00000000 fffff806`35129180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`3d07ae80 fffff806`3732633a     : fffff806`37cf38c0 fffff806`3d06c1b0 fffff806`4b8e2700 00000000`0000a301 : nt!KeClockInterruptNotify+0x453
fffff806`3d07af30 fffff806`3722ecd5     : fffff806`37cf38c0 00000000`00000000 00000000`00000000 ffffa303`b4583032 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`3d07af60 fffff806`373f6cba     : fffff806`3d06c1b0 fffff806`37cf38c0 00000000`00000004 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`3d07afb0 fffff806`373f7227     : ffffc682`3e337000 00000000`00000004 00000000`00000000 fffff806`49de9987 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`3d06c130 fffff806`49b21203     : ffffc682`401d7050 ffffc682`39080000 ffffc682`3e32a000 ffffc682`38f96398 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`3d06c2c0 ffffc682`401d7050     : ffffc682`39080000 ffffc682`3e32a000 ffffc682`38f96398 00000000`00001010 : nvlddmkm+0x251203
fffff806`3d06c2c8 ffffc682`39080000     : ffffc682`3e32a000 ffffc682`38f96398 00000000`00001010 fffff806`49b21a3c : 0xffffc682`401d7050
fffff806`3d06c2d0 ffffc682`3e32a000     : ffffc682`38f96398 00000000`00001010 fffff806`49b21a3c 00000000`0001ffdf : 0xffffc682`39080000
fffff806`3d06c2d8 ffffc682`38f96398     : 00000000`00001010 fffff806`49b21a3c 00000000`0001ffdf ffffc682`3e32a000 : 0xffffc682`3e32a000
fffff806`3d06c2e0 00000000`00001010     : fffff806`49b21a3c 00000000`0001ffdf ffffc682`3e32a000 00000000`00000000 : 0xffffc682`38f96398
fffff806`3d06c2e8 fffff806`49b21a3c     : 00000000`0001ffdf ffffc682`3e32a000 00000000`00000000 fffff806`3d06c3d0 : 0x1010
fffff806`3d06c2f0 00000000`0001ffdf     : ffffc682`3e32a000 00000000`00000000 fffff806`3d06c3d0 0000397d`c1cc9000 : nvlddmkm+0x251a3c
fffff806`3d06c2f8 ffffc682`3e32a000     : 00000000`00000000 fffff806`3d06c3d0 0000397d`c1cc9000 00000000`00000000 : 0x1ffdf
fffff806`3d06c300 00000000`00000000     : fffff806`3d06c3d0 0000397d`c1cc9000 00000000`00000000 00000000`80000000 : 0xffffc682`3e32a000


SYMBOL_NAME:  nvlddmkm+251203

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  251203

FAILURE_BUCKET_ID:  0x133_DPC_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {15c3af0e-5564-7a80-2e26-65b5115ecc4d}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffba8fd8664cb0
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 17452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 67365

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffba8fd8664cb0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT:
fffff402`f2428ec8 fffff805`487b3ad0     : 00000000`0000010e 00000000`00000033 ffffba8f`d8664cb0 00000000`00000000 : nt!KeBugCheckEx
fffff402`f2428ed0 fffff805`4a3e7a05     : 00000000`00000000 ffffba8f`d8664db0 ffffa301`d8fbf000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffff402`f2428f10 fffff805`4a35253a     : ffffba8f`d8664cb0 00000000`00000000 ffffba8f`da8769a0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
fffff402`f2428f50 fffff805`4a3c0249     : ffffba8f`d8664cb0 00000000`00000000 ffffba8f`da8769a0 ffffa301`d8e42010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
fffff402`f2428f80 fffff805`4a3bfcb5     : 00000000`00000000 ffffba8f`da8769a0 ffffba8f`d8664cb0 ffffa301`e1a06080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
fffff402`f2428fb0 fffff805`4a35257e     : ffffba8f`da7377e0 fffff402`f2429169 ffffa301`d8e42010 01000000`00100000 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
fffff402`f2429070 fffff805`48554219     : 00000000`00000030 00000000`00000799 00000000`40009c80 00000000`00000000 : dxgmms2!VidMmCloseAdapter+0x1e
fffff402`f24290a0 fffff805`48508f6f     : ffffa301`d7d02000 00000000`00000000 ffffa301`da112b90 fffff805`39edbc43 : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
fffff402`f24290d0 fffff805`484e3d61     : ffffba8f`da7377e0 ffffba8f`00000002 ffffba8f`da7377e0 ffffa301`d8e42010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
fffff402`f24291d0 fffff805`484e1ea1     : ffffa301`d8e6f000 fffff805`00000001 ffffa301`d8e6f000 ffffba8f`d86e8c20 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
fffff402`f2429260 fffff805`4850e3f9     : ffffa301`e569d620 fffff402`f24293b0 00000000`0000035a ffffba8f`d86e8b30 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
fffff402`f24292b0 fffff805`48509615     : ffffba8f`d86e8b30 ffffa301`dddb1080 ffffba8f`d86e8b30 00000000`00040282 : dxgkrnl!DXGPROCESS::Destroy+0x341
fffff402`f2429520 fffff805`48405e07     : 00000000`00000000 ffffba8f`d86e8b30 ffffa301`d71f1620 fffff402`f2429680 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffff402`f2429670 fffff805`3a30560f     : 00000000`00000000 ffffa301`dddb1080 ffffa301`d37d97a0 fffff805`01046000 : dxgkrnl!DxgkProcessNotify+0xf7
fffff402`f24296d0 fffff805`3a2a0b4c     : ffffa301`dddb1000 ffffa301`dddb1080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffff402`f24297a0 fffff805`3a1e6f52     : ffffa301`e1a064b8 00000000`00000000 fffff402`f2429990 00000000`00000000 : nt!PspExitProcess+0x70
fffff402`f24297d0 fffff805`3a27a978     : 00000000`d00002fe 00000000`00000001 00000000`00000000 00000099`5259d000 : nt!PspExitThread+0x5b2
fffff402`f24298d0 fffff805`39ee25c7     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`484ef7cd : nt!KiSchedulerApcTerminate+0x38
fffff402`f2429910 fffff805`39ff97b0     : 00000210`60398b88 fffff402`f24299c0 ffffba8f`d86e8b30 00000000`00000000 : nt!KiDeliverApc+0x487
fffff402`f24299c0 fffff805`3a006c5f     : ffffa301`e1a06080 ffffa301`e1a06080 00000210`60398b88 00000000`00000020 : nt!KiInitiateUserApc+0x70
fffff402`f2429b00 00007ffe`5c305ac4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000099`527ff0d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5c305ac4


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  27799

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8062ee3ce02, The address that the exception occurred at
Arg3: fffff6866ba12e28, Exception Record Address
Arg4: fffff6866ba12660, Context Record Address

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 13468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 86730

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8062ee3ce02

BUGCHECK_P3: fffff6866ba12e28

BUGCHECK_P4: fffff6866ba12660

EXCEPTION_RECORD:  fffff6866ba12e28 -- (.exr 0xfffff6866ba12e28)
ExceptionAddress: fffff8062ee3ce02 (nvlddmkm+0x00000000007bce02)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  fffff6866ba12660 -- (.cxr 0xfffff6866ba12660)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8502074db1d8
rdx=0000000000000000 rsi=ffffde0c548ffc9f rdi=ffff850207445000
rip=fffff8062ee3ce02 rsp=fffff6866ba13060 rbp=ffff850207466f20
r8=000000000000000b  r9=0000000000000000 r10=0000000000000000
r11=ffffde0c548ffd0b r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffff850207445180
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0x7bce02:
fffff806`2ee3ce02 ff5048          call    qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8061c8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061c80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8061c80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff686`6ba13060 00000000`00000000     : fffff806`2e7e8bb3 00000000`00000001 fffff806`1bfd3608 00000000`000000ff : nvlddmkm+0x7bce02


SYMBOL_NAME:  nvlddmkm+7bce02

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff6866ba12660 ; kb

BUCKET_ID_FUNC_OFFSET:  7bce02

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffc1e52b41c117, Address of the instruction which caused the bugcheck
Arg3: ffffb08858b78e90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 12671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 63094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffc1e52b41c117

BUGCHECK_P3: ffffb08858b78e90

BUGCHECK_P4: 0

CONTEXT:  ffffb08858b78e90 -- (.cxr 0xffffb08858b78e90)
rax=ffffc1a4065f62a0 rbx=ffffc1a4069a0ba0 rcx=ffffc1a4065f62a0
rdx=ffffc1a406749134 rsi=ffffc1a40674bb10 rdi=0000000000000000
rip=ffffc1e52b41c117 rsp=ffffb08858b79890 rbp=ffffb08858b79980
r8=0000000000000010  r9=7fffc1a400616408 r10=ffffc1a40674bb34
r11=ffffb08858b798f0 r12=ffffb08858b79a78 r13=0000000000000001
r14=ffffb08858b79968 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kbase!RGNOBJ::bMerge+0xc7:
ffffc1e5`2b41c117 8b07            mov     eax,dword ptr [rdi] ds:002b:00000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT:
ffffb088`58b79890 ffffc1e5`2b7529af     : ffffb088`58b79968 ffffb088`58b799b0 ffffb088`58b799f0 00000000`00000008 : win32kbase!RGNOBJ::bMerge+0xc7
ffffb088`58b79930 ffffc1e5`2b753b55     : ffffc1a4`046d5af0 ffffc1a4`069a0ba0 ffffb088`58b79a70 00000000`1a121db4 : win32kfull!GrepSfmGetDirtyRgn+0x197
ffffb088`58b799b0 ffffc1e5`2b752752     : 00000000`c000000d ffffb088`58b79b80 00000000`00000038 00000000`00000000 : win32kfull!GreSfmGetDirtyRgn+0x109
ffffb088`58b79a10 ffffc1e5`2c25c281     : ffffa084`477e7080 00000266`12f14470 00000000`00000020 00000266`12ae0801 : win32kfull!NtGdiHLSurfGetInformation+0x142
ffffb088`58b79ac0 fffff805`7fe071b8     : ffffa084`477e7080 00000000`000003e8 00000000`00000000 00000000`0000024c : win32k!NtGdiHLSurfGetInformation+0x15
ffffb088`58b79b00 00007ffa`e6a46be4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`9617eea8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e6a46be4


SYMBOL_NAME:  win32kbase!RGNOBJ::bMerge+c7

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .cxr 0xffffb08858b78e90 ; kb

BUCKET_ID_FUNC_OFFSET:  c7

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!RGNOBJ::bMerge

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68b5c7e8-92bc-8fc2-e095-b06a688c5f92}

Followup:     MachineOwner
---------
Bilgisayarımda malwarebytes yüklü değil.
 
O halde eskiden kalma olsa gerek ya da yanlış gördüm. Neyse siz o halde diğer adımları uygulayın. Özellikle de 5. adım kritik olan adım, tüm sorunların ana kaynağı bu adımdır. Eğer işe yaramazsa farklı bir yol izleyeceğiz. Bu yüzden sorunun çözülüp çözülmediğini bildirmeniz önemlidir.
 
O halde eskiden kalma olsa gerek ya da yanlış gördüm. Neyse siz o halde diğer adımları uygulayın. Özellikle de 5. adım kritik olan adım, tüm sorunların ana kaynağı bu adımdır. Eğer işe yaramazsa farklı bir yol izleyeceğiz. Bu yüzden sorunun çözülüp çözülmediğini bildirmeniz önemlidir.
Evet, eskiden yüklüydü.
 
O zaman sorun yok eski bir dosyaya bakmışım o halde. Siz şimdi diğer tüm adımları uygulayıp çözülüp çözülmediğini belirtin o halde.
 
O zaman sorun yok eski bir dosyaya bakmışım o halde. Siz şimdi diğer tüm adımları uygulayıp çözülüp çözülmediğini belirtin o halde.
1610103197203.png

Ekran kartı sürücüsünü kurmaya çalıştığımda böyle bir hata verdi.
 

Geri
Yukarı